Abstract— In this paper, Steganography technique has been explained which deals with the art of hiding data in files. Digital Steganogra...
Home / Other Articles
Showing posts with label Other Articles. Show all posts
Showing posts with label Other Articles. Show all posts
Introduction to the UNIX Operating System on IT Systems
What is UNIX? UNIX is a powerful computer operating system originally developed at AT&T Bell Laboratories. It is very popular among t...
Wait..Did you know This? :- Email id from Google profile
If you have a Google account and your profile is searchable by name, then anyone can find their way to send emails into your Gmail inbox (...
Old best version Browsers
As this is first post in Software column so we would like to start from basic. We all use browser to surf internet . Many of us mostly use...
Hydrogen Line 1.42Ghz RF Front End - Radio Astronomy
After finally completing the power supply for my RF front end last week, I spent some time tonight assembling the power supply onto the ba...
Format or Flash Nokia Mobile Using Nokia Service Software ( Phoenix)
Hi!... This post is related how to format or Flash our Nokia mobiles having OS likely S40, S60, Anna, Belle or Lumina etc. Recent I tried...
Helpful E-book while preparing for job interview
7 Little Known Success Secrets Of The Rich & Famous By Clifford Mee 29 Leadership Secrets From Jack Welch By McGraw Hill.pdf Interv...
BatteryCare - An software to extend lappi's Battery Life
BatteryCare - a program that helps extend battery life of laptops and netbooks. BatteryCare can analyze the running processes and pause m...
OPTICAL SOLITON PULSES FOR ULTRA FAST OPTICS
ABSTRACT We are at the edge of another industrial revolution, namely the information age. Although we may have not noticed, the amount ...
Stage Fear (Glossophobia)– How to Reduce and Overcome Stage Fear
This article will be useful for people who wants to speak in front of a crowd without any fear. Glossophobia or speech anxiety is the f...
Download Torrent Directly upto 10 Times Fast
Many members of the computer-fluent community engage daily in an activity called peer to peer sharing or sometimes called “torrenting.” ...
Secure Your Wireless Network From Hackers
The reason we secure a wireless network is to stop people from using the services of our network who don’t have permission to utilize th...
How To Unlock ZTE HSDPA Modem Free
Earlier I made a post about how to unlock Huawei and ZTE HSDPA modem free. But some modems asking 12 digit unlock codes.SO using earli...
'SixthSense' project our future
'SixthSense' is a wearable gestural interface that augments the physical world around us with digital information and lets us us...
Seminar Report on NFSˆSquare
NFS IN A NUTSHELL NFS was originally designed and implemented by Sun Microsystems for use on its UNIX based workstations. Other...
Subscribe to:
Posts
(
Atom
)