Authorlovejeet

Forgot your WiFi network’s Password? Here’s how you can Recover it easily

F

In our everyday lives, we regularly make use of passwords in order to access many online services such as our email account and social networks. This is why it becomes easy for us to remember most passwords as we keep using them regularly. However there are passwords like the one we set up for our WiFi network, which once set up and used for connecting to the WiFi network through a device, has no...

Epic Games Forums Hacked, Hackers gain access to Username, Email id’s, Passwords and more

E

As per an email received by us, Gears of War developer Epic games has become the latest victim of cyber hacking. In the email received by us, Epic games has notified its forum users about their forums being compromised by an hacker. According to Epic games, the incident may have resulted in unauthorized access to their users username, email address, password, and the date of birth provided at...

How to Fix the Disappearing Dock on Mac OS X

H

Have you booted into your Mac desktop only to find that the Dock has disappeared? Well, this is a common problem that happens randomly on most versions of Mac OS X. In my case it happened with me on my Macbook Air which was running on Mac OS X Yosemite. There is nothing to be worried about here. Logically, the dock can only disappear when you turn it off, but as reported by many Mac users on the...

How to Update Google Chrome Manually

H

Google Chrome is one of the most exciting web browsers, simply because of the numerous features that are pushed by google via regular updates. Every now and then the web goes abuzz about interesting new features that are being added into Chrome. Most people receive the updates instantly as Chrome automatically updates itself every time you launch it. This process happens in the browsers...

15 Free Temporary and Disposable Email Services to Avoid Inbox Spam

1

Thanks to the generosity of Gmail, Yahoo and Hotmail, we have been able to access email services for free. The world has changed a lot since the introduction of email to the general mass. Millions of emails are sent and received everyday, however a major portion of these emails are simply spam. There’s no doubt that email has changed our lives, but at the same time some of its  byproduct, such as...

How to Check and Monitor the CPU Temperature on Windows

H

One of the major causes of the dreaded Blue Screen Of Death on windows is usually related to the rise in the CPU temperature above the maximum operational limit. The blue screen is triggered in order to protect the CPU from being damaged. This is one of the many cause which causes a blue screen of death to be triggered. The temperature of the CPU can be viewed from the Bios a PC. But...

How to Cut or Trim videos using VLC media player

H

On the first look, the VLC media player might look as a simple and plain, but sometimes looks can be deceiving and the same happens in the case of VLC media player. The VLC media player has been my primary media player for more than a decade. The reason being, It supports and plays almost all major audio and video formats without any hiccups and adding to this it even has a lot of additional...

How much RAM does Windows support?

H

Windows is the most popular and widely used operating system in the world. Starting from personal computers to supercomputer and beyond, windows is an omnipresent entity in almost every other computer. Windows was first introduced on November 20, 1985 as a graphical operating system shell for MS-DOS in response to the growing interest in graphical user interfaces (GUIs). Within a very short span...

How to Increase the Maximum Usable Memory on Windows

H

There is a clear difference between the then term installed memory and usable memory. The term Installed Memory refers to the amount of physical memory installed on your PC, whereas usable memory refers to the amount of memory that can be used by windows ( or what is available for windows after sharing some of the installed memory with other hardware ). Recently I noticed that my PC has become...

Install TWRP Custom Recovery on the Samsung Galaxy Note 4

I

Rooting your Samsung Galaxy Note 4 is the first step to completely gain complete control of the smartphone. This is usually followed by installign a custom recovery such as TWRP and then you should be able to gain complete control over your Note 4 and install any custom Android ROM of our choice. Unfortunately rooting will void your phone’s warranty and unlike previous Samsung phones, the Note...

lovejeet

Get in touch

Quickly communicate covalent niche markets for maintainable sources. Collaboratively harness resource sucking experiences whereas cost effective meta-services.