skip to main | skip to sidebar

Check It-

Photoshop Design Designers

Friday, May 20, 2011

10 interesting things about NOKIA

0 comments

1) The ringtone "Nokia tune" is actually based on a 19th century guitar work named "Gran Vals" by Spanish musician Francisco Tárrega. The Nokia Tune was originally named "Grande Valse" on Nokia phones but was changed to "Nokia Tune" around 1998 when it became so well known that people referred to it as the "Nokia Tune."

Reset Your Mobile Memory Card Password

0 comments

We usually set password for our memory card for privacy and security, but the common mistake every one does at least once in out life time forgetting password. If you set password for mobile memory card, then you should be not forget the password. If you does then the only option is to formate your memory card with the help of the card reader and eventually the loss of all your data stored on it. There is a way to break the security wall. If you are a Symbian device lover then no need to worry about the password. You can crack them in few minutes.

The History Of Hewlett-Packard (HP)

0 comments

Hewlett-Packard is a Technology Corporation located in California that was founded in 1935 by Will Hewlett and Dave Packard in a garage in Palo Alto. They formed the corporation based on an arrangement with a professor at Stanford College. In 1947, they incorporated the business. In 1957, the corporation went public.

The Story Of Yahoo

0 comments

Yahoo Inc, is the owner of famous search engine and email client, Yahoo.com. Yahoo is the second most popular visited website in the world and the U.S.. It is thriving and has been around for 10+ years, but how did Yahoo! get started and who was behind this sensational site? Here is the history of Yahoo Inc.

Thursday, May 19, 2011

Some Common Mobile Viruses

0 comments

A mobile virus is an electronic virus that targets mobile phones or wireless-enabled Pads.

As wireless phone and PDA networks become more numerous and more complex, it has become more difficult to secure them against electronic attacks in the form of viruses or other malicious software.