Posts

Showing posts from April, 2018

HOW I TERRIBLY UNDERESTIMATED SMARTPHONE GAMING...

Image
Last week, I was reading an article on why smartphone gaming is shit because the author of that blog deep down felt that smartphone gaming might replace their much more friendly computer-gaming. So I went away with it, thus deleting all my smartphone games and hence including myself into the so called 'Master PC Race'. The next day, I had to travel to a city via train. So I boarded the train and then made myself comfortable in my seat. After listening to a bunch of songs and watching an episode on Netflix (which I fortunately had offline), I was getting bored by every second. The Realisation Considering that my trip was 26 hours long and I had just passed 3 hours entertaining myself, the thought of those deleted games came to my mind and it forced me to conclude that I had taken the wrong decision But some of you guys might say that, hey Tanay (yeah that's my real name), can't you afford a Gaming Laptop?  Then you can carry it anywhere without

WHY BUDGET SMARTPHONES MIGHT OVERTAKE THE FLAGSHIP RANGE.

Image
As the ASUS Zenfone 5 have made into a the budget smartphone range (~$200) with having a notch (like an iphone) and about 3 GB ram with 32 GB rom; for some critics, it seems like budget smartphones might replace  flagship range smartphones. But what are flagship  smartphones? Can you elaborate? Flagship range of phones simply mean that these phones are designed to hit the price range of ~$700.  Simply put, these phones are for what you can say, 'High Profile' buyers. But why are these flagship phones even existing then? There are a bunch of reasons why some people still prefer these flagship phones. 1. These phones have 'premium processors'. Though the performance might not differ in the real time, but you know the apple thing! 2. These phones have polished design and better camera. 3. Using these phones show How premium you are. Huh! Ok for all that but why are these budget phones going to take over the market? Take it this way, suppose t

HOW TO TERRIBLY LOSE YOUR PRIVACY ON PUBLIC WIFI

Image
After Facebook and Jio network have started placing free WiFi zones in Metropolitan cities of India, a question have been lingering in my mind for a bit while. Is using the free public WiFi secure? Now most of you guys might not care about that so much but it is a serious point of concern for every single person using those network in the greed of getting a FREE daily internet limit of 1 GB (which is still some good data plan competitor). I mentioned about Protecting your online privacy in this blog.   Now the question is what risks exist and how you should avoid them. The existing Risks. As you guys can think by yourself, risks that exist are pretty big. Take for instance, someone can easily sneak into the public network using Hacking softwares like MetaSploit or Aircrack-ng. And then, the hacker can either get into your device or send malicious files all over the network to every connected user thereby putting everyone at risk. So this makes publ

HAVE YOU HEARD ABOUT ENCRYPTION, NO? WELL YOU SHOULD NOW.

Image
In the digital age, where leaks, hacks and online fraud is no more of a surprise, people needed to safeguard their online details they send to each other.  But with today's unpredictable events and hyper-advancements in Technology, this whole password-protection  idea seems a little bit janky and less protected. So what's next? Encryption is. This would be really wrong if I told that encryption is new, as it is around from the mid 80s but most of the people have just heard it's name. Though it might not be sorcery but is a really cool thing to learn about. What in the world is exactly Encryption? To put it simple, suppose you are a magician and you want to send a box full PS4 games to your friend who is a magician too. But here is the catch, you want that only your friend can see what's inside the box (PS4 games) and every other person, when seeing in the box (if they open it), will see random garbage which is of no use. So to make th

7 REASONS WHY YOUR OLD ANDROID PHONE IS MORE USEFUL THAN YOU THINK.

Image
So I recently bought a new android phone and was happy about that. But as the happiness flushed out of mind a few hours later, I was left in a turmoil of questions on what to do with my Old Android? Although I can't use it very well as it is a bit old and also can't throw it away as it is not in that bad condition. And then a wave of thought engulfed me and I suddenly got a bunch of different ways to use my old android. So I thought to share it with you guys so you can benefit from it too. I haven't yet decided which one of these 7 ways, I am going to use my old android for but I think we will decide by the end of this blog. 1. Back-up Device. This was the very first idea that came to me. You can use your old android as a back-up or let's just say a substitute  for your current phone.  Suppose that your new android phone gets damaged/breaks(ouch!)/gets lost. What now? After a bit of grief, you need to continue your work.  So the back-up phone will help you in that time

THE FUTURE OF FILE STORAGE IS ALREADY HERE! SSDs-Oversimplified!

Image

THE MOST MIND-BLOWING OS YOU CAN EVER USE!

Image
Yesterday when I was writing my rather different blog on Increasing Productivity , My Windows 10 popped me up with an irritating update (The Meltdown one).  And considering how important the update was, I was left with no other  option other than to let it install. But then an old thought striked my mind. Why is it so that windows can be infected with so many different types of viruses and malwares but the other OS don't (at least that much)? So I did a little bit of research and found out that windows is vulnerable because; It gives root access to all programs by just asking you once. Being the most popular OS, most of the virus programmers and hackers try to target this OS for cyber-attacks. So, I got my answer. I was satisfied. OK, not completely though! So I thought to myself about an OS that resolves both problems.  And you guessed it right! The OS is Linux . And you might ask, isn't that true that Linux requires good Technical Knowledge t

HERE IS THE METHOD WHICH IS INCREASING PRODUCTIVITY LIKE A MACHINE

Image

MACHINE LEARNING-OVERSIMPLIFIED

Image
Last night I was watching the Movie: I, Robot (Yeah, I know that's a bit old but I like it!). And then I stumbled across an Idea. The idea was that, can I create a computer program that can accurately (too some extent) tell me about upcoming events.  No, not foreseeing future but about certain selected things that can be predicted to some good extent. But in order to that, I need to have some things ready beforehand; 1.A good amount of data (past occurrences) on the event I want to predict. 2. A good computer (which I don't have!) 3. Good programming knowledge. But in order to do all that, I need to know Machine learning . But what exactly is Machine Learning? Take it this way, Suppose you are an infant (sorry!), and you want to pick something, say a pencil. Now you and I (grown-ups) already know how to do that, but for a person who is born only some months ago is like a computer with very little programs.    Their mind works something like

MEET YOUR ONLINE PRIVACY DEFENDER THAT ONLY FEW CAN PENETRATE!

Image
Nowadays, online privacy has become a major concern for even the most down-to-business online citizens out there. But apart from our previous blog, where I showed you guys What VPN is ; In this blog I am gonna show you guys the real big bad boy of this online privacy talk. The one whose name is what most of those privacy loving geeks are both Loving and Feared off. You can imagine this guy (not exactly a guy, but a software) which is both Harry Potter (saviour) and the Voldermort (whose name is what some are afraid to call upon) of this privacy-thing. Let me Present you guys, The TOR. But what is TOR anyways? Tor stands for T he O nion R outer (not exactly an onion though!). This piece of software  was developed in the mid-1990s by United States Naval Research Laboratory  employees,  Paul Syverson,  Michael G. Reed and David Goldschlag, with the purpose of protecting U.S. intelligence  communications online. TOR in it's old days was called The Onion Routing Method (in a

Subscribe to our mailing list

* indicates required