After NameCheap’s Twitter Holiday Trivia Contest, now, another great registrar, is going to start holidays celebration -offering Tweleve days of Domain Names with a variety of specials on some of your favorite domain extensions. The offer will run from December 14 to December 25, 2008.

Name’s offer is not like NameCheap’s Twitter contest, in which you have to participate in contest to win prize. You have to visit each day in order to see what is available to grab as a special offer.  A new special offer will be unveiled each day and will be available for just 24 hours.

Read the rest of this entry »

Tags: , , , , , ,

I am sure you know about Twitter and NameCheap. If you are unaware what they are, here is their brief intro.

What is Twitter? Twitter Logo

Twitter FAQ define itself as:

Twitter is a service for friends, family, and co–workers to communicate and stay connected through the exchange of quick, frequent answers to one simple question: What are you doing?

You have to write in 140 characters about what you are doing at the moment. Its also termed as tweet. You can say anything, whether you are taking breakfast, planning your vacations or just going to leave your office. This video also presents a good overview of Twitter usage.

Read the rest of this entry »

Tags: , , , , ,

Kashif on November 19th, 2008

Hold on! This is not another crack, warez blog promoting piracy. And yes title of this post is also correct.  In celebration of Check Point’s 15th anniversary,  Check Point Software (parent company of ZoneAlaram) is offering ZoneAlarm Pro 2009 for 1 year for a single PC free of cost to everyone.

ZoneAlaram! What is that?

If you really don’t know, then you must need to use it. Please grab your copy as soon as possible and be protected. ZoneAlarm Pro contains a Firewall, Antispyware and ID Protection Service (including Credit Monitoring) normally costs $40. This offer includes a full year license for one PC and is limited to only one download per user.

Read the rest of this entry »

Tags: , , ,

Kashif on November 4th, 2008

Many people might argue that getting massive amount of traffic is important to their website, it might be true, but these traffic are useless if these visitors are not laser targeted and don’t even care about the content that you have on your website. If you ask me to choose 5000 non targeted hits from 1000 targeted hits, I will definitely go for the latter one.

So, how do you get these targeted traffics to your website?

Read the rest of this entry »

Tags: , , , , ,

Kashif on October 22nd, 2008

Data loss is a serious problem that most of the computer or notebook users have to suffer from. You store all your important documents, family pictures and other files in your system and suddenly losing all such data can cause a serious problem. Most of the time hardware failure or virus attack is the major cause of data loss. You may also lose your data if suddenly your PC gets restarted or by mistake you pressed the power button of CPU.

Read the rest of this entry »

Tags: , , , , , ,

Kashif on October 17th, 2008

Most people find that financial troubles happen occasionally. This is precisely true if you are young and just beginning your career. One of the options you have for getting out of debt is declaring Bankruptcy. However, this is not the best option nor should it be done by the majority of people. Individuals can announce bankruptcy depending on how much debt has been obtained and how much money is made every month, according to the given law. An important part of this financial process is setting goals. By setting your financial goals you can stay out of debt and reduce the risk of bankruptcy. Also, you may rebuild your credit after have already declared bankruptcy. If you set goals and reach for them, you can live a happy and successful life easily even in this period of financial crisis.

Read the rest of this entry »

Tags: , , , , , ,

Kashif on October 3rd, 2008

Page Rank is one of the many criteria webmasters use to assess popularity and worth of any website. There are many tools available on the web to measure Page Rank like Google Toolbar, one of the popular browser addon also accompanying with Page Rank tool. But here arises some problems:

  • You have to install this toolbar before using Page Rank tool and it is not a great idea to install a software for using just one feature if you do not want to use all features;
  • You have to install this toolbar to every browser on every computer you have. What if you want to use Google Chrome, a Google browser, there is no such addon available for this and some browsers;
  • Google toolbar has some privacy issues too;

Read the rest of this entry »

Tags: , ,

Kashif on September 29th, 2008

Mathematicians at UCLA have discovered a 13 million-digit prime number, a long-sought milestone that makes them eligible for a $100,000 prize.

The group found the 46th known Mersenne prime last month on a network of 75 computers running Windows XP. The number was verified by a different computer system running a different algorithm.

“We’re delighted,” said UCLA‘s Edson Smith, the leader of the effort. “Now we’re looking for the next one, despite the odds.”

Read the rest of this entry »

Tags: , , , , , , , ,

Kashif on September 22nd, 2008 is truly unique. was designed for busy research professionals who have to do multiple searches and would like to save time. allows users to search Google, Yahoo, MSN and ASK with the same search query, then toggle between engines by using the toolbar in the wizard mode. In the classic mode, users are able to compare results from the 4 search engines side by side, based on the users search options.

[ad name=”post-banner-01″]

You can even add to your list of IE search providers by clicking here, then copying and pasting the following URL where you are prompted:

Just name it as Nomez, click install and now in your IE search box you can select Nomez as your default search engine, and have the results for Google show first, then you can swap to the results of the other search engines, by clicking their logo on the top toolbar!  Now that will save you some time!

Feel free to share or post this entry in your blog.

Tags: , ,

Apple iPhone 2.0.2, in some configurations, allows physically proximate attackers to bypass intended access restrictions, and obtain sensitive information or make arbitrary use of the device, via an Emergency Call tap and a Home double-tap, followed by a tap of any contact’s blue arrow.


SecurityTracker Alert ID: 1020763

SecurityTracker URL:

CVE Reference: CVE-2008-3876

Updated: Sep 3 2008

Original Entry Date: Aug 27 2008

Impact: User access via local system

Exploit Included: Yes

Version(s): 2.0.2

Impact: A physically local user can bypass the password locking feature to obtain information from the device.
Solution: No solution was available at the time of this entry.
Vendor URL:
Cause: Access control error

Description: A vulnerability was reported in Apple iPhone. A physically local user can bypass the password locking feature to obtain information from the device. Ver 2.0.2 gives almost full access to the iPhone even while under password protection…

Steps to Reproduce

  1. Set iPhone to use passcode lock, have contacts marked as Favorites with links, phone numbers, addresses, etc in address book entry.
  2. Tap “Emergency Call” keypad from passcode entry screen.
  3. Double-tap home button.
  4. Tap blue arrow next to contact’s name.

You now have full access to applications such as Safari, complete Contacts list, SMS, Maps, “full” Phone access, and Mail by accessing various entries on the Favorite’s page, i.e. tapping their home page brings up a full, unrestricted Safari.


It is reported that this activity can also be performed on iPhone 2.0.1.



Tags: , , ,

Gravityscan Badge