Smartphone Security

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg
Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Sunday, 3 November 2013

Ten Tips to Smartphone Security

Posted on 01:51 by Unknown
Ten Tips to Smartphone Security
Smartphones continue to grow in popularity and are now as powerful and functional as many computers. It is important to protect your smartphone just like you protect your computer as mobile cybersecurity threats are growing. These mobile security tips can help you reduce the risk of exposure to mobile security threats: 

1. Set PINs and passwords. To prevent unauthorized access to your phone, set a password or Personal Identification Number (PIN) on your phone’s home screen as a first line of defense in case your phone is lost or stolen. When possible, use a different password for each of your important log-ins (email, banking, personal sites, etc.). You should configure your phone to automatically lock after five minutes or less when your phone is idle, as well as use the SIM password capability available on most smartphones.

2. Do not modify your smartphone’s security settings. Do not alter security settings for convenience. Tampering with your phone’s factory settings, jailbreaking, or rooting your phone undermines the built-in security features offered by your wireless service and smartphone, while making it more susceptible to an attack.

3. Backup and secure your data. You should backup all of the data stored on your phone - such as your contacts, documents, and photos. These files can be stored on your computer, on a removal storage card, or in the cloud. This will allow you to conveniently restore the information to your phone should it be lost, stolen, or otherwise erased.

4. Only install apps from trusted sources.  Before downloading an app, conduct research to ensure the app is legitimate. Checking the legitimacy of an app may include such thing as: checking reviews, confirming the legitimacy of the app store, and comparing the app sponsor’s official website with the app store link to confirm consistency.  Many apps from untrusted sources contain malware that once installed can steal information, install viruses, and cause harm to your phone’s contents. There are also apps that warn you if any security risks exist on your phone.

5. Understand app permissions before accepting them. You should be cautious about granting applications access to personal information on your phone or otherwise letting the application have access to perform functions on your phone. Make sure to also check the privacy settings for each app before installing.

6. Install security apps that enable remote location and wiping. An important security feature widely available on smartphones, either by default or as an app, is the ability to remotely locate and erase all of the data stored on your phone, even if the phone’s GPS is off.  In the case that you misplace your phone, some applications can activate a loud alarm, even if your phone is on silent. These apps can also help you locate and recover your phone when lost.

7. Accept updates and patches to your smartphone’s software. You should keep your phone’s operating system software up-to-date by enabling automatic updates or accepting updates when prompted from your service provider, operating system provider, device manufacturer, or application provider. By keeping your operating system current, you reduce the risk of exposure to cyber threats.

8. Be smart on open Wi-Fi networks. When you access a Wi-Fi network that is open to the public, your phone can be an easy target of cybercriminals. You should limit your use of public hotspots and instead use protected Wi-Fi from a network operator you trust or mobile wireless connection to reduce your risk of exposure, especially when accessing personal or sensitive information. Always be aware when clicking web links and be particularly cautious if you are asked to enter account or log-in information.

9. Wipe data on your old phone before you donate, resell, or recycle it. Your smartphone contains personal data you want to keep private when you dispose your old phone. To protect your privacy, completely erase data off of your phone and reset the phone to its initial factory settings. Then, donate, resell, recycle, or otherwise properly dispose of your phone.

10. Report a stolen smartphone. The major wireless service providers, in coordination with the FCC, have established a stolen phone database. If your phone is stolen, you should report the theft to your local law enforcement authorities and then register the stolen phone with your wireless provider. This will provide notice to all the major wireless service providers that the phone has been stolen and will allow for remote “bricking” of the phone so that it cannot be activated on any wireless network without your permission.
Read More
Posted in Security, Smartphone, Tips | No comments

Friday, 15 February 2013

Windows 8 Security Tips

Posted on 19:52 by Unknown

Windows 8 Security Tips
Windows 8 is being touted as a major change in the way that people will use and interact with their PCs, tablets and other devices. Much of the change is evident in the user interface, with its tiled appearance and app-friendly setup. But there are some important changes behind the scenes, as well, and many of them are designed to make life online safer and more secure for users.

Here’s eleven quick tips on how to keep Windows 8 running securely:

1. Turn on Family Safety. This feature allows parents to set up separate accounts for each child and have the option of receiving reports on the kids’ activities online. Parents can create lists of allowed sites and will be able to see which sites their kids visited, how much time they spent on them and which blocked sites they tried to visit, as well

2. Use automatic updates. This should be one of the first things you do on any new Windows PC. Using automatic updates removes the worry from the patching process and instructs Windows to download and install new updates as soon as they’re available.

3. Be smart. Microsoft has added a new anti-phishing feature to Windows 8 called SmartScreen, which helps protect users against fraudulent sites or malicious apps. It checks downloaded apps against a reputation database to see whether they’re known to be malicious. The feature also is deployed in Internet Explorer and warn users when they hit a reported attack site. Heed these warnings.

4. Encrypt your data. Math is hard, even for attackers with lots of time and powerful computers at their disposal. So take advantage of the beauty of massive integers and use the built-in data encryption feature in Windows 8, known as BitLocker. Once enabled, this system will automatically encrypt any files or other data stored on designated drives, making it useless to hackers.

5. Run antimalware software. This should go without saying at this point, but you need to run antimalware software on all of your computers. Windows 8 includes an application called Windows Defender that provides basic protection against viruses and other threats, but you also should install a premium antimalware product, such as Kaspersky Internet Security or Kaspersky PURE, that is designed to work with Windows 8. This will defend your PC against the broadest set of threats, including unknown malware.

6. Use picture passwords. Typical alphanumeric passwords are easy prey for attackers, so Microsoft has added a new feature that allows users to select an image from their photo library and then perform several gestures on the photo, either with a mouse or on the touchscreen. Those gestures on the photo become part of the authentication method and are required to be performed in the same way on the same photo in order to unlock the machine.

7. Turn on the firewall. Windows includes a built-in firewall, which helps prevent malicious traffic from getting through to your PC. It’s enabled by default, so unless you have a 'very' good reason, leave it alone.

8. Remove Java. There’s no good reason to have Java installed on your PC these days, and there’s a very good reason not to have it: attackers target Java more than almost any other software. Java vulnerabilities are plentiful and easily exploitable and so hackers love to use them in attacks. If Java is installed on your Windows 8 PC, disable it or remove it.

9. Use the Windows 8 style UI version of Internet Explorer
By default, plugins are disabled, blocking a major target for exploit kits and Blackhole attacks.

10. Disable hard drive encryption hibernation
Hard drive encryption is a cornerstone of data protection. If possible, disable the hibernation option in Windows 8 through group policy, as it doesn’t always work well with encryption.

11. Treat Windows RT (ARM) devices like any other mobile devices
Make sure you impose the same security levels on Windows RT devices as all others. You should have the ability to control, track, remote wipe and encrypt them.

You should still run a full security suite for superior filtering and centralized management and reporting. While Microsoft has included a minimalist antivirus and firewall, most organizations will still require commercial-grade security.  And of course, all the old security rules also apply with Window 8. It’s still a bad idea to allow automatic log-on. Above all, remain vigilant.

Read More
Posted in 8, Security, Tips, Windows | No comments
Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • N.T. Rama Rao
    N.T. Rama Rao Nandamuri Taraka Rama Rao, also known as NTR, was born in 1923 in a well-to-do family in Andhra Pradesh. He showed interest in...
  • Breaking the Wishbone for Luck
    Breaking the Wishbone for Luck The tradition of pulling apart the wishbone, or clavicle, may be as much as 2,500 years old. Ancient Etruscan...
  • Celebrities before and after Photoshop
    Celebrities before and after  Photoshop Here is an interesting look at celebrities photos before and after photoshop. These can give you a f...
  • Soldering Tips
    Soldering Tips Soldering is accomplished by quickly heating the metal parts to be joined, and then applying a flux and a solder to the matin...
  • 20 Ugliest Celebrities
    20 Ugliest Celebrities By nature or personal choice, they are rich and famous and yet... ugly as hell!Ugliness is confined to external appea...
  • Interesting Facts About Typewriters
    Interesting Facts About Typewriters One of the first typewriters to allow typists to see work in progress was invented in 1855 by Giuseppe R...
  • 100 YEARSOF INDIAN CINEMA
    100 YEARS OF INDIAN CINEMA About a century ago, in 1912, Dadasaheb Phalke completed the first Indian feature film, Raja Harischandra and rel...
  • The Mysterious Nazca Lines
    The Mysterious Nazca Lines 1. The Nazca were an ancient people that lived in Peru, in South America, about 2,000 years ago. The people are w...
  • Ten Tips to Smartphone Security
    Ten Tips to Smartphone Security Smartphones continue to grow in popularity and are now as powerful and functional as many computers. It is i...
  • The Longest Mustache In The World
    The Longest Mustache In The World Ram Singh Chauhan of India is the proud owner of the world's longest moustache,officially recorded by ...

Categories

  • 10
  • 100
  • 101
  • 111
  • 12
  • 132
  • 148
  • 15
  • 16
  • 17
  • 17.RULES.TO.LIVE.BY.
  • 18
  • 19
  • 20
  • 2013
  • 21
  • 22
  • 25
  • 26
  • 3
  • 30
  • 35
  • 4
  • 47
  • 5
  • 50
  • 51
  • 56
  • 64th
  • 67
  • 67th
  • 7
  • 8
  • 9
  • a
  • ABORTION
  • about
  • achilles
  • Acidity
  • Acne
  • Actor
  • Actress
  • ADDICTION
  • Address
  • ADHD
  • Admin
  • Adopts
  • Ads
  • After
  • AGING
  • Aid
  • AK
  • ALCOHOL
  • alcoholism
  • alert
  • All
  • All About Albert Einstein
  • Allen
  • Almonds
  • Amazing
  • AMAZING FACTS ABOUT TATTOOS
  • Amazingly
  • American
  • Anatomy
  • and
  • Android
  • anger
  • Animal
  • animals
  • Annual
  • Anonymity
  • ANOTHER
  • Ant
  • ANTI
  • Antivirus
  • antivrus
  • Anxiety
  • any
  • Appetizing
  • Apple
  • Apple’s
  • applications
  • April
  • Archicebus
  • Armadillos
  • Around
  • ARP
  • arrow
  • Art
  • Articles
  • Artist
  • Arugula
  • Aspirin
  • Assign
  • Astronomical
  • Atlas
  • Attacks
  • Attitude
  • automatic
  • Awesome
  • Baatara
  • Back
  • Badger
  • Baking
  • ball
  • balls
  • BandWidth
  • Banner
  • Baroque
  • Basic
  • BASIL
  • Bat
  • Bathroom
  • Battery
  • Be
  • Bear
  • Beard
  • Beatles
  • beautifu
  • Beautiful
  • BEAUTY
  • Bee
  • Beep
  • Before
  • BELLY
  • Ben
  • Benefits
  • BERMUDA
  • BEST
  • Better
  • Big
  • biggest
  • Bill
  • BIOS
  • Birth
  • Bizarre
  • Black
  • Blog
  • Blood
  • blowing
  • Blue Hole
  • Body
  • Bodypainting
  • Bollywood
  • Bone
  • Boots
  • Bowling
  • Boys
  • BRAIN
  • BREAkfAsT
  • Breaking
  • BREATHING
  • Bridge
  • BROWN
  • Browser
  • Browsing
  • Bub
  • Buddhism
  • Build
  • Bundy
  • BURNING
  • Business
  • Bypass
  • Cabbage
  • Cactus
  • Cafe
  • Cake
  • Calculations
  • CALM
  • Camera
  • Can
  • Canada
  • Car Care Tips II
  • CARACAL
  • Carambola
  • Care
  • Careful
  • Caribbean
  • Castle
  • Cat
  • Cats
  • Cave
  • CD
  • celebrates
  • Celebrations
  • celebrities
  • Celebrity
  • Celebs
  • cell
  • CEREAL
  • Changes
  • Chapa
  • Chariot
  • check
  • CHILDREN’S DAY
  • China
  • Chinese
  • Chock
  • CHOCOLATE
  • Cholesterol
  • Christian
  • Chuck
  • Cider
  • CINEMA
  • CIRCLES
  • Circlism
  • Circus
  • City
  • ClickJacking
  • Clock
  • Clocks
  • Clown
  • Coca
  • cockroaches
  • Coconut
  • Code
  • Codes
  • Coffee
  • Cola
  • Colosseum
  • Command
  • Commandments
  • Committed
  • Common
  • Communication
  • Companies
  • Competition
  • completely
  • Computer
  • Computer.Pranks.50.in.1.AIO
  • Congress
  • Conjunctivitis
  • CONTACT
  • Conversation
  • Convert
  • Cookie
  • Cookies
  • Cool
  • Coping
  • Cosmetic
  • Cow
  • CRAVINGS
  • Crazy
  • Cream
  • Creative
  • Creatures
  • Crimes
  • Crocodile
  • Cross-sections of bullets
  • Crow
  • Cruz
  • ctr+c
  • ctr+v
  • Customize
  • Dairy
  • dam
  • DAMAGING
  • Dandruff
  • DARK
  • Day
  • Death
  • Deformities
  • Depression
  • Desk
  • desktop
  • Destructive
  • Devices
  • Devils
  • Diamond
  • Die
  • Diet
  • Different
  • Digital
  • dimples
  • DINING
  • Disable
  • Disciplines
  • Disease
  • disk
  • Disorder
  • Disorders
  • Display
  • Diwali
  • DNA
  • DNA Facts
  • DNS
  • do
  • Doctors
  • DOES
  • dog
  • Dogs
  • DONTS
  • Doong
  • Doppelgangers
  • Drag
  • Dragon
  • Drawbridge
  • Drawings
  • Dreams
  • Drinks
  • Drive
  • Drives
  • Dunns
  • Each
  • Early
  • Earthquake
  • EARTHWORM
  • easier
  • Easter
  • EASY
  • Echidna
  • Eckman
  • Ecstasy
  • Effective
  • Eggs
  • EIFFEL
  • EJACULATION
  • Elata
  • ELEGANT
  • Elephant
  • Eliminate
  • EMAIL
  • English
  • Enlightenment
  • Entire
  • Environment
  • Error
  • Espiritu Santo
  • Ethics
  • etiquette
  • Everyday
  • Everyone
  • Evil
  • evolution
  • Exam
  • Examination
  • Examples
  • Exercise
  • Exotic
  • Explained
  • express
  • Extrafine
  • EYE
  • Eyecare
  • Eyeglasses
  • EYES
  • Facebook
  • Faces
  • facts
  • Facts.About.Riboflavin.Vitamin. B.2.
  • fake
  • Falling
  • Falls
  • Fame
  • Family
  • Famous
  • Fascinating
  • Fast
  • Fat
  • favourite
  • FESTINA
  • Festival
  • FEVER
  • Fiji
  • FILES
  • film
  • find
  • Firewalls
  • First
  • Fish
  • Fit
  • Flash
  • Flax
  • FLOW
  • Fly
  • Flying
  • Foil
  • font
  • Food
  • FOODS
  • Fools
  • for
  • FORCIBLY
  • Forever
  • FOUL
  • Foxy
  • France
  • Free
  • Fried
  • Friends
  • Friendship
  • Frogs
  • from
  • Fruit
  • Ful
  • Fun
  • Fungus
  • funny
  • Fushun
  • Fussen Germay
  • Gacy
  • Gadjets
  • Garage
  • Garden
  • GARLIC
  • Gates
  • Gateshead Millennium Bridge
  • Gelatin
  • Genetic
  • Genetics
  • getting
  • Giraffe
  • girl
  • Girls
  • Glass
  • Glass Gem PopCorn
  • Globes
  • Glycerine
  • GOATS
  • God
  • Gold
  • golden
  • Golf
  • Gomateshwara
  • Good
  • Google
  • Gorge
  • GOUT
  • Grand
  • Gravies
  • Great
  • Green
  • GREYING
  • Grooming
  • Grouse.
  • GRRRREAT
  • Guide
  • Guinness World Records 1
  • Gun
  • Gunnison
  • Guns
  • guys
  • Habits
  • Hachiko
  • Hack
  • Hackers
  • Hagia
  • Hair
  • HAIRFALL
  • Half
  • Hall
  • Halloween
  • Happiness
  • Happy
  • HEADED
  • Health
  • Healthier
  • healthy
  • HEAT
  • Heine
  • help
  • Herbs
  • Hidden
  • Hide
  • High
  • Highly
  • Hijacker
  • HINDUISM
  • Hints
  • History
  • Holy
  • HOME
  • Hometown
  • Honey
  • Hookah
  • Hooker
  • Horse
  • Hot
  • Household
  • How
  • Howler
  • Human
  • Humans
  • HYPERTENSION
  • I
  • I.Q
  • Ice
  • icons
  • identify
  • II
  • Illustrations
  • IMPOTENCE
  • improve
  • in
  • Increase
  • Independence
  • India
  • INDIAN
  • Indias
  • Infamous
  • Infected
  • Installing
  • Int.
  • interesting
  • Internet
  • Introduction
  • iPhone
  • IRON
  • Is
  • Island
  • Jack
  • jackfruit
  • Jamaica
  • January
  • Japan
  • Jesús
  • John
  • jokes
  • Jr
  • Juice Fasting
  • Junk
  • Just
  • Kapok
  • keep
  • keeping
  • Keira
  • Key Loggers
  • Keyboard
  • Kidney
  • Kids
  • Kilimanjaro
  • Killer
  • killing
  • kinds
  • Kissing
  • Kitchen
  • kitten
  • Klementinum
  • Knife
  • Knightley
  • Know
  • Koalas
  • KONARK
  • l of
  • Lake
  • LANGUAGE
  • Lanka
  • Lantern
  • LAPTOP
  • laptops
  • Largest
  • Latitude
  • Laundry
  • Lavaredo
  • LEANING
  • Learning
  • Leg
  • Lego
  • LENTE
  • Lessons
  • Libra
  • Library
  • life
  • Light
  • lightening
  • Lights
  • likes
  • Lil
  • Lincoln
  • Lines
  • Linux
  • lion
  • Lips
  • LITTLE
  • LIVING
  • Lofoten
  • log
  • Longest
  • Longitude
  • LOOP
  • Loss
  • Lost
  • Louise
  • Love
  • low
  • Lowering
  • Luck
  • Mac
  • machine
  • Macropinna Microstoma
  • Made
  • Mafia
  • MAGNESIUM
  • Magnets
  • Maintain
  • make
  • makeup
  • MAKING
  • Malacara
  • Malware
  • manage
  • Manatee
  • Mango
  • Manual
  • Many
  • Marilyn
  • MARKS
  • Mathematics
  • MEAN
  • MEANING
  • Meats
  • Medicinal
  • Megatrends
  • Memory
  • Men
  • Mental
  • Mercury
  • message
  • Metal
  • Micro
  • Might
  • Milk
  • mind
  • Mobile
  • MOLES
  • Monkey
  • monolithic
  • Monroe
  • Mont
  • MoRaIne LaKe -20 dollar view
  • Moral
  • Moringa
  • MORNING
  • Most
  • Moth
  • Mothers
  • Mount
  • MS
  • MSWindows
  • Mug
  • Multiple
  • Mustache
  • my
  • MYOPIA
  • Mystery
  • Mystical
  • N
  • Nail
  • names
  • Natural
  • Nazca
  • Neodymium
  • Network
  • Neuschwanstein
  • Never
  • New
  • Nights
  • Nike Spoof and Copycat Logos
  • Noodles
  • Norris
  • Norway
  • Not
  • November
  • NTFS
  • Nutrition
  • Nutritional
  • NZ
  • O
  • OATsTAnDing
  • occasions
  • Ocelot
  • Of
  • office
  • Okapi
  • Oldest
  • OMG
  • on
  • Onion
  • online
  • OOo
  • OPOSSUMS
  • Optimum
  • Orange
  • Orchid
  • Oresund
  • Organic
  • organisms
  • organization
  • Original
  • os
  • out
  • Own
  • Oxymoron
  • Pagoda
  • Painting
  • paintings
  • Palace
  • Paper
  • Parents
  • Parrot
  • Part
  • Partition
  • password
  • Passwords
  • Pattaya
  • Patty
  • PCSX2
  • peace
  • peaks
  • Peel
  • Pegasus
  • Penelope
  • People
  • PERFECT
  • Performance
  • Phoenix
  • Phone
  • Photographers
  • Photos
  • Photoshop
  • Piano
  • Pie
  • Piercing
  • Pigs
  • Pilot
  • Pirates
  • PISA
  • Pistachio
  • Pomeranian
  • Pop
  • Popular
  • Portraits
  • POSITIVE
  • Positive Thinking
  • Potala
  • Prague
  • Pranks
  • Precepts
  • PREGNANCY
  • PREMATURE
  • Presidents
  • Pressure
  • prevent
  • PRICKLY
  • primate
  • Programs
  • Promote
  • Prompt
  • protect
  • Protocol
  • Psychotria
  • Puzzle
  • Quack
  • Queens
  • QUETZAL
  • Quick
  • Quotes
  • Raccoon
  • rajnikanth
  • Rama
  • Rambo
  • Rao
  • Rat
  • Rayong
  • Read
  • Real
  • Reasons
  • Recipes
  • recording
  • recover
  • REDUCE
  • Registry
  • REMEDIES
  • Remove
  • Reporting
  • Reptile
  • Republic Day
  • Resolution
  • restart
  • restrict
  • Rewire
  • RICE
  • Ring
  • Risks
  • River
  • Roboy
  • Rock
  • Rolex
  • Rolls
  • ROM
  • Roman
  • Room
  • Roraima
  • ROSE
  • Royce
  • Rugby
  • Rules
  • RulesThumb
  • Rupee
  • Safari
  • Safety
  • Sage
  • Salt
  • Samsung
  • Sanctuary
  • saving
  • Saying
  • Scan
  • Schimmel
  • SCORPIO
  • screen
  • Scribbles
  • Sculpture
  • Sculptures
  • Sea
  • Seasonings
  • Secret
  • Secrets
  • Secure
  • Security
  • Seed
  • SEMINAL
  • Serial
  • Sewing
  • SEX
  • SEXUAL DEBILITY
  • Shocking
  • Shoes
  • Short
  • shortcut
  • shortcuts
  • SHORTSIGHTEDNESS
  • Shot
  • Shots
  • Should
  • Shutdown
  • Shwedagon
  • SICKNESS
  • Sign
  • SIMPLE
  • Simply
  • Six
  • Skills
  • skin
  • SkinType
  • Slauerhoffbrug
  • Sleep
  • slim
  • Small
  • Smallest
  • Smartphone
  • smartphone photos
  • Smoothie
  • Snow
  • Soap
  • Soccer
  • Social
  • Soldering
  • Solutions
  • Solved
  • Some
  • Son
  • Sophia
  • Sorvagsvatn
  • Soybean
  • space
  • Speed
  • SPERMATORRHEA
  • Spider
  • Spirit
  • Split
  • spot
  • SPRAINS
  • Sprouts
  • Squirrel
  • Sri
  • Star
  • Start
  • StartIsBack
  • States
  • Statue
  • stay
  • Steampunk
  • STEPS
  • stick
  • StMichel
  • Stones
  • Story
  • Stress
  • Structure
  • studying
  • Success
  • Sucking
  • Sucks
  • Sugar
  • Sun
  • Super
  • Surgery
  • Swami
  • Sweaters
  • switch
  • System
  • System Tray
  • T
  • Taina
  • TAKE
  • taking
  • Tale
  • Talents
  • Talk
  • Tallest
  • Tattoo
  • Tattooed
  • Tattoos
  • Teachers
  • Techies
  • Technics
  • Ted
  • Television
  • Ten
  • Terminator
  • TERMITE
  • Terms
  • TEST
  • Text
  • Thai
  • Thailand
  • Than
  • Thanksgiving
  • that
  • The
  • their
  • Things
  • think
  • this
  • three
  • Thumbsucking
  • Tiger
  • Tilting
  • Time
  • Tips
  • TISSUE
  • To
  • to Do
  • Toads
  • Tobacco
  • Tollywood
  • Tooth
  • Toothache
  • Top
  • Top 14 Tips To Improve Your Sleep
  • Top 4 Substitutions Tips
  • Top Digital Cameras In India
  • Topics
  • Toting
  • TOWER
  • Toy
  • TRAIN
  • Treat
  • Tree
  • Trees
  • Trevor Williams
  • Triangle
  • Trio
  • Trivia
  • Trojan
  • Truth
  • Tulsi
  • Tweaks
  • Twenty
  • Types
  • Typewriters
  • UAC
  • Ubuntu
  • Ugliest
  • UNDER
  • United
  • Unlikely
  • UNsuccessful
  • Untranslatable
  • Up
  • Upgrading
  • Uptime
  • US
  • USB
  • Useless
  • Uses
  • using
  • Value
  • Vanuatu
  • Varanasi
  • Vardzia
  • Vegetables
  • Venus
  • Version
  • very
  • Via
  • Victoria
  • video
  • Vinegar
  • viruses
  • Vivekananda
  • Vivi
  • voice
  • vs
  • Waist
  • Water
  • Waterfall
  • way
  • Wayne
  • Ways
  • WEAKNESS
  • web
  • Weight
  • Wet
  • What
  • Which
  • while
  • Why
  • Wilderness
  • Win
  • Window
  • Windows
  • Windows 8
  • WINKING
  • Wisdom
  • Wishbone
  • with
  • without
  • Women
  • Wooden
  • Words
  • World
  • World!
  • worlds
  • WOW
  • X
  • XP
  • Year
  • Years
  • You
  • Young
  • your
  • YUCK
  • Zambia
  • Zebra

Blog Archive

  • ▼  2013 (478)
    • ▼  November (35)
      • Breaking the Wishbone for Luck
      • Thanksgiving Day 28-11-2013
      • A Reptile of Many Talents
      • Some Amazing Facts
      • Fun facts about Pomeranian dogs
      • Uses of Neodymium Magnets
      • Common Computer Terms
      • Fungus facts
      • EARTHWORM FACTS
      • Amazing Facts About Cats!
      • Animal fun facts
      • Chuck Norris Jokes
      • World Television Day - November 21
      • Story of a Famous dog in Japan - Hachiko
      • Different kinds of Malware
      • SPEED UP WEB BROWSING WITH GOOGLE DNS
      • Son Doong - the world’s largest cave
      • Lofoten Island, Norway
      • Installing Ubuntu from a USB memory stick
      • CHILDREN’S DAY
      • How to protect your USB from getting infected
      • Glass Gem PopCorn
      • Slauerhoffbrug ‘Flying’ Drawbridge
      • Mount Kilimanjaro: 25 fun facts
      • Fun facts About Micro-Organisms
      • AMAZING FACTS ABOUT COFFEE
      • Ten Tips to Smartphone Security
      • Mobile Phone Tips
      • Soldering Tips
      • ‘Diwali’ -the Festival of Lights
      • 10 tips to spot a fake Rolex
      • Parrot Facts
      • Amazing Facts About Human Body
      • Amazing Bone Facts
      • Fun facts about the Presidents of the United States
    • ►  October (49)
    • ►  September (58)
    • ►  August (75)
    • ►  July (42)
    • ►  June (32)
    • ►  May (27)
    • ►  April (8)
    • ►  March (56)
    • ►  February (28)
    • ►  January (68)
  • ►  2012 (22)
    • ►  December (22)
Powered by Blogger.

About Me

Unknown
View my complete profile