Total Pageviews

JUST CLICK HERE ONCE!!!

JUST CLICK BELOW FOR MORE!!!

Wednesday 21 November 2012

Know Name Of Your SIM Techno Teenz

Social Engineering - Study Of Breaking Network Security Through Manipulation



Social engineering is a nontechnical method of breaking into a system or network. It's the process of deceiving users of a system and convincing them to give out information that can be used to defeat or bypass security mechanisms. Social engineering is important to understand because hackers can use it to attack the human element of a system and circumvent technical security measures. This method can be used to gather information before or during an attack.


The following is an example of social engineering recounted by Kapil Raina, currently a security expert at Verisign, based on an actual workplace experience with a previous employer. "One morning a few years back, a group of strangers walked into a large shipping firm and walked out with access to the firm's entire corporate network. How did they do it? By obtaining small amounts of access, bit by bit, from a number of different employees in that firm. First, they did research about the company for two days before even attempting to set foot on the premises. For example, they learned key employees' names by calling HR. Next, they pretended to lose their key to the front door, and a man let them in. Then they "lost" their identity badges when entering the third floor secured area, smiled, and a friendly employee opened the door for them. The strangers knew the CFO was out of town, so they were able to enter his office and obtain financial data off his unlocked computer. They dug through the corporate trash, finding all kinds of useful documents. They asked a janitor for a garbage pail in which to place their contents and carried all of this data out of the building in their hands. The strangers had studied the CFO's voice, so they were able to phone, pretending to be the CFO, in a rush, desperately in need of his network password. From there, they used regular technical hacking tools to gain super-user access into the system. In this case, the strangers were network consultants performing a security audit for the CFO without any other employees' knowledge. They were never given any privileged information from the CFO but were able to obtain all the access they wanted through social engineering." 


The most dangerous part of social engineering is that companies with authentication processes, firewalls, virtual private networks, and network-monitoring software are still wide open to attacks, because social engineering doesn't assault the security measures directly. Instead, a social-engineering attack bypasses the security measures and goes after the human element in an organization.

Easiest Hacking Trick - Manipulation

We all, who have not yet tasted the fun of hacking, have a misconception that hacking needs a mastery on programming languages and logical skills.

But its neither truth nor false. 

Yes hacking needs these two weapons. But there is a style of hacking which requires a much required technical skilland more of a coning skill. This style is well known as MANIPULATION.



An example of the using the art of manipulation is illustrated in the following example. The facilitator of a live Computer Security Institute demonstration showed the vulnerability of help desks when he dialed up a phone company, got transferred around, and reached the help desk. "Who's the supervisor on duty tonight?" "Oh, it's Betty." "Let me talk to Betty." [He's transferred.] "Hi Betty, having a bad day?" "No, why?…Your systems are down." She said, "my systems aren't down, we're running fine." He said, "you better sign off." She signed off. He said, "now sign on again." She signed on again. He said, "we didn't even show a blip, we show no change." He said, "sign off again." She did. "Betty, I'm going to have to sign on as you here to figure out what's happening with your ID. Let me have your user ID and password." So this senior supervisor at the help desk tells him her user ID and password. In a few minutes a hacker is able to get information that might have taken him days to get by capturing traffic and cracking the password. It is much easier to gain information by social engineering than by technical methods. People are usually the weakest link in the security chain. A successful defense depends on having good policies in place and teaching employees to follow the policies. Social engineering is the hardest form of attack to defend against because a company can't protect itself with hardware or software alone.


Saturday 17 November 2012

Top 5 Free Keyloggers Techno Teenz











I was just finding a good KEYLOGGER as requested by a friend and I was stunned to see that its like finding a needle in a haystack to find a good KEYLOGGER thats free of cost. Here after much effort is the list that may help you. 

Note: you wont be able to use the right click in my blog so just select the download linc and paste it on address bar. 

5 Free Keyloggers to monitor your 
Local PC or Laptop! 
Here is an exclusive list of top 10 free 
local keyloggers. However If you are 
planning to monitor only your PC or any 
PC which you have control of, then you 
can blindly go for "Hardware 
Keyloggers" as they are the safest 
keyloggers and operate in a complete 
stealth. If you Still wanna Prefer Free 
Keyloggers then below is the list of 
Free keyloggers that will really help 
you monitor your PC. 
1) REFOG Free Edition 
Refog Free Keylogger beats 
competition in two respects: it's simple 
to use and it's free. REFOG Free 
Keylogger can look after your children 
without them even noticing. Even 
technically minded children won't 
detect the key logger when it runs in a 
stealth mode. The program removes all 
the shortcuts and can be accessed only 
through a hot key combination. 
Running unobtrusively from the 
moment the system boots, REFOG Free 
Keylogger keeps track of all typed or 
pasted text. 
Download link: http://www.refog.com/ 
trial2.html or click here
2) Black box express 
Simple to use monitoring of one local 
computer; Monitor Screen recordings, 
Programs, Keystrokes typed, Websites, 
Web Searches, Emails/Webmails/ 
Instant Messenger Chat sent and 
received. Alerts and Warnings instantly 
or as a summary on your e-mail or cell 
phone. everything for 100% Free. No 
strings attached. 
Download link: www.asmsoftware.com/ 
MyAccount/Downloads/ 
Download.ashx?ProductId=1c3ff8b2- 
f4c6-434e-9810-95de152cdce0  OR click here


3) Personal keylogger 
The Personal Keylogger application was 
designed to be a small tool that will 
allow you to secretly record all 
keystrokes and other input. All specific 
instructions are explained in the 
application. To exit it and receive your 
logs, you will need to enter in your 
keycode. If you have forgotten your 
keycode, you will need to restart the 
computer. Keycode is like password. To 
stop Personal keylogger, you can enter 
your keycode anywhere on the screen. 
Once you type-in your keycode, the 
keylogger will stop monitoring and the 
log.txt file will be created in your 
selected destination folder. 
Download link:  www.nfyre.com/prog/ 
Personal%20Keylogger.zip OR click here 
4) Py keylogger 
PyKeylogger is an easy-to-use and 
simple keylogger written in python. It is 
primarily designed for backup 
purposes, but can be used as a stealth 
keylogger, too. It does not raise any 
trust issues, since it is a short python 
script that you can easily examine. It is 
primarily designed for personal backup 
purposes, rather than stealth 
keylogging. Thus, it does not make 
explicit attempts to hide its presence 
from the operating system or the user. 
That said, the only way it is visible is 
that the process name shows up in the 
task list, so it is not immediately 
apparent that there is a keylogger on 
the system. 
#Tip: Press and hold 'left-CTRL + Right- 
CTRL + F12′ keys simultaneously to 
bring up the Control Panel (default 
password is blank). 
Download link: http://sourceforge.net/ 
projects/pykeylogger/files/ 
pykeylogger/1.2.1/pykeylogger-1.2. 
1_win32_installer.exe/download OR click here


5) Heretic Macro 
Heretic is a powerful tool that is able to 
record user events, such as mouse 
clicks and keys, into a C/Java-like 
script, and play that script either once 
or repeatedly. It has many commands 
for dynamic pixel-based botting, 
window based botting, and static 
botting/macro-ing (i.e. key presses, 
mouse clicks, mouse moves, and 
pauses). 
Download link: http://zone-dev.com/ 
downloads/Hereticsetup.exe   OR click here 

Monday 12 November 2012

***Registry Hack to Tweak Your Windows PC*** Disable USB Devices

Microsoft Windows offers a feature-rich interface and several customization options that make it one of the most user friendly operating systems in the world. However, computer geeks would still love to hack the Windows Registry so as to add more extra features and functionalities to their operating system.

If you're one such geek who would like to customize Windows in your own way, here is a list of 8 interesting registry hacks that you need to try:

1. Disable USB Devices: 
Disabling USB ports can be a smart idea 
to add security to the computer. This 
can be really handy if the computer is 
on a public place where the chances of 
virus and other malware infection is 
really high. You can easily disable 
access to USB ports with the following 
registry hack: 
Open the Registry Editor (Start -> Run - 


> Type regedit and hit Enter) 
In the registry, navigate to the 
following key: 
HKEY_LOCAL_MACHINE\SYSTEM\Curr 
entControlSet\Services\UsbStor 
In the right-side pane, double-click on 
"Start". 
In the "Value data" field enter 4 and 
click on "OK". 
Close the Registry Editor and reboot. 
To enable USB devices, follow the same 
procedure as above except in the 

step-4 enter 3 in the "Value data" field. 
Works on Windows XP, Vista and 7.


Saturday 10 November 2012

START MENU in Windows8 - A confusing stop

Office 2010 Recommends Windows 8 Users to Click on the "Start Menu" Windows 8 is considered one of the most confusing Windows versions ever released by Microsoft, mostly because it doesn't comprise the traditional Start Menu available since the debut of Windows 95. Instead, Windows 8 comes with a Start Screen, but Office 2010 advises users to launch the built-in apps, such as Word, by clicking on the Start Menu. Now, we know that this has nothing to do with Microsoft and the Office 2010 installer was designed when Windows still had a Start Menu, but given the fact that Windows 8 adopters are confused by every minor modifications on their computers, such a thing would only make things worse. So, in case you've already deployed Windows 8 on your computer and you plan to use Office 2010 too, the installer is just outdated. Don't trust it, there's no such thing as a Start Menu in Windows 8!


Thursday 8 November 2012

3G Hack - Unlimited 3G free on DOCOMO

Hia Fellas I guess you all have been waiting for a rockig trick just to chill around in network world in a better way. Till previous month I was just fed up of the slow speed internet in my mobile. No matter I buy an expensive set or a new sim the 2G speed iritates me.

  
Here is what I actually did. OMG!!! Till now my download speed in mobile varies from 500kbps to 1000kbps. 


Here are the simple steps that will clear all fog that has been created by search results till now. 



REQUIREMENTS 

1. Tata Docomo SIM Card with 
a balance of more than Rs. 1 
2. 3G enabled cellphone 
STEPS 
1. Create New Access Point 
Using Below Configuration 
and restart your cellphone. 
Name : Tata Docomo 
or any 
Access Point ( APN ) 
– 
tata.docomo.dive.in 
Homepage : 
www.google.com or 
any 
Proxy : 
202.87.41.147 
Proxy Port : 8080 
Username : leave 
blank 
Password : leave 
blank 
2. Download Operamini 4.2 
Handler Browser that you will find 
here 
www.plunder.com/ 
OperaMini4-2HandlerMod-jar- 
download-7317b80fa2.htm 
3. Open your Opera mini 
handler and do the 
following changes in the 
Setiings: 
• Set Divein Settings 
as Default Settings 
• For Opera Mini 
Set http in Custom 
Field in your Opera 
Mini handler 
• Set Socket Server to 
http://203.115.112.5.server4. 
operamini.com 
OR 
http://10.124.72.171.server4. 
operamini.com 
• Keep Proxy Type as 
blank (Don't Enter 
Anything in Proxy 
Server Field) 
4. Done!! Now use your free 
unlimited 3G service. 
Enjoy!!

FACEBOOK 2013 NEW LOOK



Good Morning Guys n Gals 

All facebook fans its for you. Just few hours ago FB launched this pic as a sample page of the new look of it. We gonna have this new avatar of FB in 2013. 

HTC 8S - Techno Teenz Review

♥ HTC 8S with 4-inch display, 1 GHz 
processor officially launched in India for 

Rs.19,260 ♥ 



Quick Specs:- 

1. 4 inch Super LCD display 
2. WVGA display resolution 
3. Gorilla Glass Protection 
4. Dual-tone Polycarbonate Unibody 
design 
5. 1 GHz Dual-Core Snapdragon S4 
processor 
6. 512 MB RAM 
7. 5 MP camera on the back 
8. 4 GB internal memory 
9. Expandable to 32 GB via microSD 
card 
10. Windows Phone 8 OS 
11. Beats Audio Enhancement 
12. 1700 mAh battery

Wednesday 7 November 2012

WINDOWS 8 PRODUCT KEY first on TECHNO TEENZ

Windows 8 Release Preview Universal 
Product key::: 



TK8TP-9JN6P-7X7WW-RFFTV-B7QPF 

If you want to enable Windows 8 Media 
Center use the below product key:

MBFBV-W3DP2-2MVKN-PJCQD-KKTF7 

NOTE THAT THESE KEYS ARE PROVIDED OFFICIALLY BY MICROSOFT.I DO NOT SUPPORT OR PROMOTE SOFTWARE 
PIRACY.THESE KEYS WORK ONLY ON WINDOWS 8 RELEASE PREVIEW AND WONT WORK ON OTHER VERSIONS OF 
WINDOWS..

-Is your computer male or female--

This is funny trick that let you know the gender of your computer whether it is male or female. 


So let get started. 
1. Open Notepad and paste the following 
codes:- 
CreateObject("SAPI.SpVoice").Speak"i 
love you i love you " 
Save the file as gender.vbs 
2. Now, open the save file. 
If you hear male voice then your 
computer is male and if you hear 
female voice then its female.

Simple now if you are single then dont worry technology is your new DARLING!!! ♥♡♥


Tuesday 6 November 2012

HACKING NEWS - UNESCO website hacked

Hacking group #NullCrew deface 
UNESCO Etxea website (unescoetxea.org), 
which is an internationally oriented 
NGOs working for the culture of 
peace, sustainable human 
development and human rights, at 
local and global levels. 
Deface page reads, "Welcome to the new front page of unesco etxea You 
have been targeted by NullCrew, as 
part of the FuckTheSystem 
movement. We have began the war, 
once again; but this time, good-luck 
even coming close to winning." 

.    
"The united nations, just a bunch of 
corrupt nations; united by one source 
of power.. And for that reason, we 
have came back; to repeat the 
process. Enjoy the candy." 
After watching the data dumped on 
deface page including the kernel 
version of server and wordpress 
database configuration file we can 
judge that, hacker is able to upload 
the php shell on website of UNESCO 
Etxea and he deface the web page. 
#NullCrew today also hack UK Ministry 
of Defence and 
dump database online. Hackers 
threatened to hack "U.S Department 
of Homeland Security" next.

{ VIRUS ATTACK } DOWNLOAD VIRUS


GET DOWNLOAD VIRUS COLLECTION PART 1, PART 2, PART 3 !! 






Go to the above link to download virus. 
Dont worry it will not affect your system till you click on it.

Now send them to ur target's system through any data transfer device. And click on the VIRUSES oncr transferred to VICTIM. 

Thursday 28 June 2012

Android 4.1 Jelly Bean First On Techno Teenz

First on Techno Teenz 


Rejoice Andro lovers its for you
Android 4.1, codenamed "Jelly Bean," is the latest version of Android, which was announced by Google at its fifth annual developer conference - Google I/O 2012. Adding new features to the latest version of Android, Google claims to have made improvements throughout the platform. Google previewed it at a conference in San Francisco.

Let's see what all Google's latest Android operating system - Android 4.1 (Jelly Bean) has to offer. 
1. Faster ways to search content on the Internet and share photos between two phones are promised in the next version of Google's Android operating system for mobile devices. 
2. Google has also added offline voice typing to Android 4.1 Jelly Bean, thereby making the voice dictation system work even when your handset lacks an Internet connection. 
3. One of the new features in Android will be Google Now, which is supposed to get you the right information at the right time automatically, if you activate the feature. If you say "traffic," for example, it will look at your usual commute to work and show you alternative routes if there's a lot of traffic. It will tell you the scores of your favourite sports teams automatically, and it will keep you up to date on the status of your flights if you're traveling.
4. Jelly Bean will also come with the ability to share photos by tapping two phones together, using an emerging wireless technology called near-field communications. The current version of Android, Ice Cream Sandwich, has limited ability to share data through NFC. Samsung Electronic Co.'s new Galaxy S III phone has a feature for sharing photos and video by tapping, but it works only with other S III phones.
5. The new Android also promises a smarter keyboard, with a feature for predicting your next word before you type.

6. Notifications have long been a unique and popular feature on Android. Android 4.1 brings a major update to the Android notifications framework. Apps can now display larger, richer notifications to users that can be expanded and collapsed with a pinch. Notifications support new types of content, including photos, have configurable priority, and can even include multiple actions.
7. Android 4.1 introduces improved App Widgets that can automatically resize, based on where the user drops them on the home screen, the size to which the user expands them, and the amount of room available on the home screen.
8. Android 4.1 is optimised to deliver Android's best performance and lowest touch latency, in an effortless, intuitive UI. To ensure a consistent framerate, Android 4.1 extends vsync timing across all drawing and animation done by the Android framework. 
9. Android 4.1 also adds triple buffering in the graphics pipeline, for more consistent rendering that makes everything feel smoother, from scrolling to paging and animations. 
10. Jelly Bean will be available in mid- July. Some devices - the Galaxy Nexus, Motorola Xoom and Nexus S - will get it automatically as an over- the-air update. Google's new tablet computer, the Nexus 7, will also come with Jelly Bean.



Wednesday 27 June 2012

Techno Teenz Around The World

<P style="margin-top:0px; margin-bottom:0px">       We started Techno Teenz as a brand on 22nd June and just in a week we goy a positive response from people of India,.Alaska and South America. Thanks to you folks your support is precious to us thats what stats show us</P>     <P style="margin-top:0px; margin-bottom:0px">       &nbsp;<a href=" 53D%253Futf-8%253Fb%253Fd29ybGQucG5n%253F%253D-701321"  border="0" alt="" id="BLOGGER_PHOTO_ID_5758913779241890162" /></a></IMG></P>     <P style="margin-top:0px; margin-bottom:0px">       &nbsp;</P>     <P style="margin-top:0px; margin-bottom:0px">       We expect the world green with updated technology from Techno Teenz.</P>     <P style="margin-top:0px; margin-bottom:0px">       &nbsp;</P>     <P style="margin-top:0px; margin-bottom:0px">       Subscribe</P>     <P style="margin-top:0px; margin-bottom:0px">       &nbsp;</P>     <P style="margin-top:0px; margin-bottom:0px">       www.techno-teenz.blogspot.com</P>  

@[4:0]

Aakash II Ready For Release

From the sources of Techno Teenz latest news has come The Aakash dream may be very close to realisation yet again and we hope that it gets better this time. 

 

According to reports, the launch of the upgraded version of the Aakash tablet, Aakash-II may be as close as early next month and if a statement by Datawind CEO Sunit Singh Tuli is to be believed then the specifications of the upgraded tablet have met with the approval of the government.

 

Kapil Sibal has said that the tablet is now ready for release and that it is packed with more features and enhanced speed. He added, "Unlike other tablet devices, Aakash can also be used to create computer programs, in Python, C, C++ and Scilab." UK-based Datawind, which had submitted about 100 tablets to IIT- Bombay for testing, said the government has approved the specifications for the upgraded version and it will be launched soon in the market, elaborated the report further. 

 

 

((TECHNO-TEENZ : BLOCKBUSTER)) -- THE BUG ON FACEBOOK !! .

This fact you'll never find anywhere else ....
Just type
@[4:0]
In the comment section and see the magic..


Tuesday 26 June 2012

Android Watch Techno Teenz Future Tech

Sony's Rs 6,299 SmartWatch phone 

 

 

Android watch: Sony's latest accessory for their smartphones has been doing the rounds abroad and finally, the company has decided to launch the SmartWatch in India.

 

 

 

Sony's Rs 6,299 SmartWatch phone 

 

Sony India has confirmed this on their Facebook page that the SmartWatch will be launched in India by the end of June at a price of Rs 6,299.

 

It syncs with your Android phone and lets you read SMS, email, calendar reminders as well as social networking updates from Twitter and Facebook.

 

You can even reject and mute calls and receive one through Bluetooth headset.

 

The watch is compatible with other Android phones as well, so you doNt have to own a Sony branded phone to use it.

TORRENT THROUGH MOBILE ...

Forr using torrent through mobile follow these simple steps.
( works with - android, iphone OS)
1). Intall " tTorrent Lite "
2). Once you have downloaded
tTorrent Lite and installed it in your
android mobile or tablet you need
to download required torrent file,
3). Now open the app and browse
the torrent file which you have
download it.
4). Once the file is added click on
the Download button and download
will be started.


Monday 25 June 2012

3 Reasons To Buy Samsung GALAXY S III


Techno Teenz went deep in GOOGLE to do some homework on { Galaxy S3} the new launch by Samsung. And actually speaking we found nothing. All the pages all the blogs had the same stuff. I would rather present that stuff in brief.

Samsung GALAXY S III has everything that has been known in mobile world. With Android Ice Cream Sandwitch it makes this mobile a witch in world throwing spells on humans.

But it has 3 things that no other set has-

1) Direct Call

Knows when you want to talk! When you are messaging someone and decide to call them instead, simply lift the phone to your ear and Direct Call will dial their number for you. No more fumbling through call logs or contacts. Let Samsung GALAXY S III do the work.

2) Smart Stay

Stays with you, always! With Smart Stay on the new Samsung Galaxy S III, it is now your look that commands your phone! The front camera looks deep into your eyes and maintains a bright display for continued viewing pleasure. What a bright idea!

3) Buddy Photo Share

Recognizes your friends! With the Buddy Photo Share feature on the Samsung Galaxy S III, managing and sharing photos could not get easier. The phone recognizes faces and links those for you, using your group profiles for guidance. Now you are one touch away from sharing with everyone instantly.

Perfect use of your Rs. 43180/-

Good competetion to Iphone 5 if it releases!!!

Sunday 24 June 2012

WHC WORLD HACKING CHAMPIONSHIP

There's a hunt going on and an all- out hack-off competition among hackers to discover who the best digital ninja is, dubbed a zNinja. This is the only competition where cheating is allowed and even recommended! Today is a great day to be a hacker since Zimperium kicked off the first ever penetration testing tournament. — 

Welcome to the Pentester's Worldcup! Zimperium, a mobile security software start-up was founded by Itzhak " Zuk" Avraham, a world-renowned hacker, in 2011. The Pentester's World Cup is part of Zimperium's efforts to increase awareness about mobile security, and simultaneously enhance the security of its range of award-winning products.  


NOW EVERYTHING IS FREE....!!

Note -: we are writing this post just for increasing the knowledge of our readers ...  please avoid the trick if possible ....


FREE FREE FREE






Today we are going to provide you all the hack which you wont get any where else ....
..... Each one of us Avoid some softwares due to its HIGH COST ......
today i am going to provide you a hack through which you mayuse any software for free....... just follow some simple steps -
1) GO TO www.keygenguru.com
2) In the search box type the
name of the software/
application with
accurate version..
3) never choose trusted
downloads instead choose the
column below ...
4) click on any one of them and
copy the code to your software
ENJOY !!!

((TECHNO TEENZ : SPECIAL))CHANGING YOUR I.P. ADDRESS

Changing IP address is the first step to be a great hacker. Many times you need to hide or change your IP address IP addresses so that it doesnt match with the noted in the visited directory of the **** site. 


Here it may help -








1.click on "start"
2. Click on "Run"
3. Type in "cmd" and hit enter
4. Type "ipconfig /release" without quotes and press enter
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or
"My Network Places" on your
desktop.
7. Click on "properties"
You should now be on a screen with
something titled "Local Area
Connection", or something close to
that, and, if you have a network
hooked up, all of your other
networks.
8. Right click on "Local Area
Connection" and click "properties"
9. Double-click on the "Internet
Protocol (TCP/IP)" from the list
under the "General" tab
10. Click on "Use the following IP
address" under the "General" tab
11. Create an IP address (It doesn't
matter what it is. I just type 1 and 2
until i fill the area up).
12. Press "Tab" and it should
automatically fill in the "Subnet
Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again
You should now be back to the
"Local Area Connection" screen.
15. Right-click back on "Local Area
Connection" and go to properties
again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP
address automatically"
tongue.gif
18. Hit "Ok"

Saturday 23 June 2012

Apple IPhone 5 -Techno Teenz Inside Report

All eyes are now focusing on Apple's next hardware announcement, which is highly expected to be that of the iPhone 5.
Since Apple stuck with the same design for the iPhone 4S, a lot of talk surrounding the design of the upcoming iPhone has been surfacing. However, there is also interest generating as to what other features will be thrown into it. Commenting on this is a research done by Techno Teenz, which states that the next iPhone will be a true 3G/ 4G world phone, along with having significant improvements over the iPhone 4S.


The sixth- generation iPhone is expected to sport three big improvements-
1. 4G technology
2. Slightly bigger screen.
3. Intel as supplier.

These features should help the upcoming iPhone outscore the iPhone 4 and 4S at picking up new customers and enticing existing ones to upgrade.

The phone (iPhone5) will work with China Mobile's proprietary TD-SCDMA 3G network, says the analyst. Both China Mobile and China Unicom have been testing 4G LTE. But full adoption of LTE is a few years away, so support for 3G is crucial if Apple is to gain further traction in the Chinese market. Thus ensuring better market in Asia.

The other major news surrounding the upcoming iPhone pertains to the redesign that it is expected to feature. The screen size of the iPhone has remained the same, since it was first launched. Apple is expected to increase the size of the display to 4-inch diagonally. While the width will not change, the brand will raise the height, thereby giving it an aspect ratio of 1136 x 640.

(( **TECHNO TEENZ :BLOCKBUSTER)) INCREASING YOUR INTERNET SPEED UPTO 70%

Tired of that LOADING... on your system screen.
Here is what you want -


















Microsoft reserves 20% of
your available bandwidth for their
own purposes like Windows
Updates and interrogating your PC
etc
You can get it back:
Click Start then Run and type
" gpedit.msc " without quotes. This
opens the group policy editor.
Then go to:
--> Local Computer Policy
--> Computer Configuration
--> Administrative Templates
--> Network
--> QOS Packet Scheduler
--> Limit Reservable Bandwidth.
Double click on Limit Reservable
bandwidth.






It will say it is not configured, but
the truth is under the 'Explain' tab
i.e." By default, the Packet
Scheduler limits the system to 20
percent of the bandwidth of a
connection, but you can use this
setting to override the default."
So the trick is to ENABLE
resergvable bandwidth, then set it to
ZERO. This will allow the system to
reserve nothing, rather than the
default 20%.It works on Win 2000
as well.

Friday 22 June 2012

Spice Stellar Mi-425. Techno Teenz Review









Budget Android phones may have been selling well, but the Android experience on these low-powered devices isn't something I can recommend. The good news is that Android on a budget is now on the verge of change with the entry of power-packed sub-Rs 10,000 devices such as the Spice Stellar Mi-425.

Phones from Indian companies such as Spice, Micromax and others may give great features at a budget, but they have to battle the general perception that the cheap in the price tag also extends to the quality. Many people whom I showed the phone to seemed to be very impressed with the phone until they noticed the brand. I think devices such as the Mi-425 can give the brand the value they have been striving for. While they are at it, maybe they can also get the phone's information booklet designed a little better.


Detailed official specs for Spice Stellar 
Mi-425 
Dimensions: 125 x 63.5 x 12.5mm 
Weight: 110g 
Input: Full Touch 
Colour: White 
Display: Screen: 10.16 cm 480 x 800 
pixels 
Battery: 2000 mAh 
Operating frequency: GSM 900/1800, 
WCDMA 2100 
Data networks: GPRS/EDGE/Wi-Fi/ 
HSPA 
Connectivity: GPRS/EDGE/Wi-Fi/ 
Bluetooth/3G 
SAR (W/kg): 0.357 Watt/kg 
Memory Card: microSD upto 32 GB 
Phone memory: 149 MB 
Camera: rear 5 megapixel autofocus 
with LED flash and 3.9x digital zoom 
and front VGA 
Radio: FM 
Package contents: USB cable, CD, 
Charger, user manual, headset, 
battery and warranty card

Spice Stellar Mi-425. Techno Teens Review




Budget Android phones may have been selling well, but the Android experience on these low-powered devices isn't something I can recommend. The good news is that Android on a budget is now on the verge of change with the entry of power-packed sub-Rs 10,000 devices such as the Spice Stellar Mi-425.

Phones from Indian companies such as Spice, Micromax and others may give great features at a budget, but they have to battle the general perception that the cheap in the price tag also extends to the quality. Many people whom I showed the phone to seemed to be very impressed with the phone until they noticed the brand. I think devices such as the Mi-425 can give the brand the value they have been striving for. While they are at it, maybe they can also get the phone's information booklet designed a little better.


Detailed official specs for Spice Stellar 
Mi-425 
Dimensions: 125 x 63.5 x 12.5mm 
Weight: 110g 
Input: Full Touch 
Colour: White 
Display: Screen: 10.16 cm 480 x 800 
pixels 
Battery: 2000 mAh 
Operating frequency: GSM 900/1800, 
WCDMA 2100 
Data networks: GPRS/EDGE/Wi-Fi/ 
HSPA 
Connectivity: GPRS/EDGE/Wi-Fi/ 
Bluetooth/3G 
SAR (W/kg): 0.357 Watt/kg 
Memory Card: microSD upto 32 GB 
Phone memory: 149 MB 
Camera: rear 5 megapixel autofocus 
with LED flash and 3.9x digital zoom 
and front VGA 
Radio: FM 
Package contents: USB cable, CD, 
Charger, user manual, headset, 
battery and warranty card