Read posts on technology, gadgets, science and lot more!

I’m talking at the range of 2,200 degrees! These materials are used for the safety of shuttles. Due to the drag produced when they enter the earth’s atmosphere, temperatures of unbelievable range are produced.

See the temperature?

Take a look at this video, filmed at the Kennedy space station.You’d be awed!

This is a small trick in PC’s. Did you know that it is possible to disable the folder name and icon? Looks boring? Try this, You can even make the icon/folder invincible!

Process(For name less folder creation): select some folder-> right click and select rename-> now press ‘Alt’ key

(For invincibility!): select a folder-> click on properties-> go to Customize-> change icon-> search for blank space(present mostly at the end)-> click ‘ok’ and you are done!

Now, it is difficult for any one to locate the folder, ‘because it is invincible! :P’

PDFMyURL at a website URL and it will convert the site into a PDF document. Not only can you do a simple conversion just by plugging in a URL but you can also modify the PDF with a wide variety of flags—see the advanced menu for a full list—that let you set the page orientation and size, header information, print orientation, and more. PDFMyURL also has a bookmarklet you can drag to your toolbar for easy access to the PDF creation service.

PDFMyURL is a free service and doesn’t watermark or otherwise alter the site you are converting to PDF.

If you’re a Windows 8 user frustrated with the paltry selection of apps, or a Mac OS X user who wants an Android experience without having to buy any additional hardware, BlueStacks offers a virtual Android environment, complete with access to the Google Play store.Believe me this is totally cool!


It’s available for Windows XP, Vista, 7 and 8, and Mac OSX.

Interface: It is pretty cool and fluidly good. Just check out.

To find apps in BlueStacks, we clicked the Search button. After typing what we wanted and tapping “Find,” it only took a couple of seconds for BlueStacks to return all of the relevant results.

After we tapped Install, we were asked to log into our Google account. BlueStacks then asked to set up 1-Click Sync, requiring us to log into the Google account that we used on the device we wanted to send apps to. Then, we selected all the devices we wanted to sync with BlueStacks. The app will detect all the gadgets that you use to log into that particular Google account.

Just take a look at the official website:

This is how you install bluestacks(It is a bit boring):


Revo Uninstaller solves an all-too-common problem: Programs whose uninstallation routines are sloppy. Not uncommonly, when you uninstall programs in Windows, they leave bits and pieces of themselves behind, such as Registry entries. This program promises to find all those bits and pieces and zap them so that when you uninstall software, your computer gets truly clean.


Revo Uninstaller


The program does more than just uninstall software. Revo Uninstaller also includes other cleaning tools, including an Autorun manager, that will show you all the programs that start on system startup–and lets you kill or remove any that you don’t want run. And there’s a very useful “Tracks Cleaner” that will remove traces of your browsing history, as well as traces left behind by Microsoft Office applications.

Know more about it’s uses and stuff from the official web site:

Take a look at the video:

The new eye tracker!

Tobii’s technology uses your eyes to replace your mouse cursor, and the company’s monitor-mounted REX peripheral now allows virtually anyone to take advantage of it. At CES 2011, startup Tobii and Lenovo launched a custom-designed notebook that used Tobii’s eye-tracking technology.

The REX attaches to the underside of your LCD monitor. After about 30 seconds of training, the REX’s electronic eyes follow your own, allowing you to control your cursor with just your eyes. It’s amazingly accurate, although you’ll still need to “click” with your keyboard.

You may like the following categories:



This could be hard to believe, but is true. There is also a TED talk regarding this. I couldn’t find it but, do try to find. Who knows, you may find it!

As more cars become connected to smartphones and wireless data networks, they present new challenges for automakers and new opportunities for crooks.A Nissan Leaf owner, for example, recently discovered that he could track a car’s position and speed using a simple Web-based data-feed program.


Landline voicemail:

The phone-hacking scandal in the U.K. should remind us how easily most cellular carrier’s voicemail systems can be accessed.Unfortunately, landline number voicemail systems work the same way. Many providers use a common set of dial-in numbers for voicemail.


Baby monitors:

Security experts used to make a habit of demonstrating how they could tap into the video and audio feeds of numerous nanny cams while driving through suburban neighborhoods!


 Portable game players:

Can you just believe it! I just can’t! Some older consumer electronics devices, such as the original Nintendo DS and the Nintendo DS Lite, will only work with the older, insecure WEP encryption standard in order to access a Wi-Fi network.


Your front door!:

Electronic keypads and wireless remote security systems were once only for businesses.Now there are innumerable home electronic security systems, such as Schlage Link, but if they aren’t installed correctly, they can make your home more vulnerable to technically adept thieves.Hackers can lift the code, for example, from a stolen smart phone or intercept the wireless signal when you open the door so that they can return later and empty your house.


Medical implants:

Can you just imagine? Hackers can also switch off your pacemaker! God..!!


You may like the following categories:


Greener technology


Tag Cloud

%d bloggers like this: