Reliance Free Internet



Google+ the social magic of Google.Get your Google invite Here

Play Mobile Games In Pc

Play Mobile Games on your PC.
Java has got its way into cell phones.Java give so many thing explore the world,java make our mobile to feel more attractive and give a standard to our cell,like java give so much of games and application to entertain us....

Make your Nokia Sony mobile phones as wireless router(HOTSPOT)

your pohne is very usefull thing just you have to give some time to know about your phone, your phone can provide so many things like some time it is work as web cam,sometime remote etc etc,so today i will tell how to make your phone as a hotspot(wireless router) and you can carry a wireless router(HOTSPOT) in you pocket,you can share you 3G INTERNET,WIRELESS INTERNET,GPRS,using you hotspot(your phone only).....

Download Torrent File with high speed

sometime it is really frustrating to download movie using some third party torrent software(because they wont give high speed as you have your bandwidth).....


How it happens only when your friend type the username and password and leave the pc for a while :) or he saved the password using any browser or you typed the password and forgot your password.....

Hide your tab in mozila firefox

You can hide you tab using one extension name of hidetab ,this is firfox extension and it is developed by Diego A. Ruiz.....

Tuesday, July 12, 2011

Google Plus(Get your Google+ invitation here)

Google Plus(+)
Google Plus
The most basic of human needs is the need to connect with others, With a smile, a laugh, a whisper or a cheer, we connect with others every single day.

Today, the connections between people mostly happen online,and there are sharing are sometime awkward,broken,lovely, romentic etc etc.

By including you, your relationships,your emotions,your loves and your interests. And so begins the Google+ project

So Google + Project having lots of stuff to do:

+Circles: share what matters, with the people who matter most Not all relationships are created equal. So in life we share one thing with college buddies, another with parents, and almost nothing with our boss. The problem is that today’s online services turn friendship into fast food—wrapping everyone in friend paper—and sharing really suffers:

    It’s sloppy. We only want to connect with certain people at certain times, but online we hear from everyone all the time.
    It’s scary. Every online conversation (with over 100 friends) is a public performance, so we often share less because of stage fright.
    It’s insensitive. We all define friend and family differently—in our own way, on our own terms—but we lose this nuance online.

+Sparks: strike up a conversation, about pretty much anything,Healthy obsessions inspire sharing, and we’ve all got one (or two, or three...). Maybe it’s muscle cars, or comic books, or fashion, but the attraction is always the same: it comes up in conversation, we immediately jump in, and we share back and forth with other fans. Often for hours. The trick is getting things started, and getting over that initial hump. Fortunately, the web is the ultimate icebreaker.

The web, of course, is filled with great content—from timely articles to vibrant photos to funny videos. And great content can lead to great conversations. We noticed, however, that it’s still too hard to find and share the things we care about—not without lots of work, and lots of noise.

+Hangouts: stop by and say hello, face-to-face-to-face
Whether it's inside a pub or on a front porch, human beings have always enjoyed hanging out. And why not? It's how we unwind, recharge, and spend unscheduled time with old and new friends alike. Hanging out is deceptively simple though, and the nuance gets lost online.

Just think: when you walk into the pub or step onto your front porch, you're in fact signaling to everyone around, Hey, I've got some time, so feel free to stop by." Further, it’s this unspoken understanding that puts people at ease, and encourages conversation. But today’s online communication tools (like instant messaging and video-calling) don’t understand this subtlety:

    They’re annoying, for starters. You can ping everyone that’s available, but you’re bound to interrupt someone’s plans.
    They’re also really awkward. When someone doesn't respond, you don't know if they’re just not there, or just not interested.

+Mobile: share what’s around, right now, without any hassle
These days a phone is the perfect sharing accessory: it's always with you, it's always online, and it's how we stay close with our closest friends. We didn’t want just a mobile experience, however, so with Google+ we focused on things (like GPS, cameras, and messaging) to make your pocket computer even more personal

In life, the places we visit shape conversations in lots of meaningful ways. If we call John from the airport, he’ll likely ask about our trip. Or if Jane texts from a nearby restaurant, we might join her for dessert. With Google+ you can add your location to every post. (Or not. It’s always up to you.)

+Instant Upload
Getting photos off your phone is a huge pain, so most of us don't even bother. Of course pictures are meant to be shared, not stranded, so we created Instant Upload to help you never leave a photo behind. While you're snapping pictures, and with your permission, Google+ adds your photos to a private album in the cloud. This way they're always available across your devices—ready to share as you see fit.

Coordinating with friends and family in real-time is really hard in real life. After all, everyone's on different schedules, in different places, and plans can change at any moment. Phone calls and text messages can work in a pinch, but they're not quite right for getting the gang together. So Google+ includes Huddle, a group messaging experience that lets everyone inside the circle know what's going on, right this second.

Get Your Google + Invite here 

If you want Google Plus Invite than please leave your Email-ID here i will invite you to try  magic of Google Plus.
If you got any problem regarding about this post please let me know by leaving you comments.

Sunday, May 29, 2011

Make your Nokia Sony mobile phones as wireless router(HOTSPOT)

Hi Friends today i will tell you to one of important  use of your phone, your phone is very useful thing just you have to give some time to know about your phone, your phone can provide so many things like some time it is work as web cam,sometime remote etc etc,so today i will tell how to make your phone as a hotspot(wireless router) and you can carry a wireless router(HOTSPOT) in you pocket,you can share you 3G INTERNET,WIRELESS INTERNET,GPRS,using you hotspot(your phone only).

1 : one mobile phone which has wireless connectivity and operating system like Symbian OS v3,v5(ex:Nokia n85,96,97,E5,E7,some Sony series etc.

2 : one software JoikuSpot Premium

Download JoikuSpotPremium software from here , If you like this software then please buy it please support the developer,you can buy the software from here .

Now you next step is to install software in your mobile,if you have free space in pone memory(C drive) than install in phone memory only,otherwise install in memory card only(E drive).

After installation of the software in your mobile phone follow the screen shot to make your phone as Hot Spot(Wireless Router).

>>Open joikuspot and follow the screen shots:





Now open your laptop go to Network connection you will find you mobile wireless connection

Now click on connect

If you any wap or wep key than enter your password and enjoy your internet(password will make your connection  secure)


Monday, April 4, 2011

Download Torrent With High Speed

hi everybody today I'm going to write about how to download torrent file at maximum speed,
sometime it is really frustrating to download movie using some third party torrent
software(because  they wont give high speed as you have your bandwidth),
so today i will tell you one trick that help you out to download your torrent file
at maximum speed (according to your bandwidth),so may be heard about third party
download accelerators(like: IDM, DAP, ORBIT  ) they use some technique because of
that you are able to download your file at maximum speed,
so here is trick you don have to install a third party torrent software you can download your torrent using your third party download accelerators.
You have just follow the instruction it is very easy and fast.check the instruction below.....

1: open your browser and open

2: open any torrent website (like your favorite torrent site) and download your torrent and follow the pictures:

 3: now open and follow the pictures

4: Enjoy your downloading, if you have any query please leave a comment

Sunday, February 27, 2011

Most dangerous viruses

Computer viruses have a relatively short history, but the damages caused by some of them pushed cyber-experts to opening a new chapter on computer viruses. Some viruses led to serious damages and affected a large number of companies, universities and even governments. Here are some of the most dangerous computer viruses in history:

Jerusalem - 1987

This is one of the first MS-DOS viruses in history that caused enormous destructions, affecting many countries, universities and companies worldwide. On Friday 13, 1988 the computer virus managed to infect a number of institutions in Europe, America and the Middle East. The name was given to the virus after one of the first places that got "acquainted" with it - the Jerusalem University. Along with a number of other computer viruses, including "Cascade", "Stoned" and "Vienna" the Jerusalem virus managed to infect thousands of computers and still remain unnoticed. Back then the anti-virus programs were not as advanced as they are today and a lot of users had little knowledge of the existence of computer viruses. Morris (a.k.a. Internet Worm)

November 1988

This computer virus infected over 6,000 computer systems in the United States, including the famous NASA research Institute, which for some time remained completely paralyzed. Due to erratic code, the worm managed to send millions of copies of itself to different network computers, being able to entirely paralyze all network resources. The damages caused by the Morris computer virus were estimated at $96 millions. To be able to spread, the computer virus used errors in such operating systems as Unix for VAX and Sun Microsystems. The virus could also pick user passwords.

Solar Sunrise - 1998 A decade later the situation didn't change, in fact it even got worse. Using a computer virus, hackers, in 1998, penetrated and took control of over 500 computer systems that belonged to the army, government and private sector of the United States. The whole situation was dubbed Solar Sunrise after the popular vulnerabilities in computers that run on the operating system called Sun Solaris. Initially it was believed that the attacks were planed by the operatives in Iraq. It was later revealed that the incidents represented the work of two American teenagers from California. After the attacks, the Defense Department took drastic actions to prevent future incidents of this kind.

Melissa - 1999

For the first time computers got acknowledged with Melissa computer virus on March 26, 1999, when the virus shut down the Internet mail system, which got blocked with e-mails infected by the worm. It is worth mentioning that at first Melissa was not meant to cause any harm, but after overloading the servers, it led to serious problems. For the first time it spread in the Usenet discussion group alt.s3%. Melissa was hidden within a file called "List.DiC", which featured passwords that served as keys to unlocking 80 pornographic websites. The original form of the virus was sent through e-mail to different users. Melissa computer virus was developed by David L. Smith in Aberdeen Township, New Jersey. Its name comes from a lap dancer that the programmer got acknowledged with while in Florida. After being caught, the creator of the virus was sentenced to 20 months in federal prison and ordered to pay a fine of $5,000. The arrest was made by a team of representatives from FBI, New Jersey State Police and Monmouth Internet. Melissa had the ability to multiply on Microsoft Word 97 and Word 2000, as well as on Microsoft Excel 97, 2000 and 2003. In addition, the virus had the ability to mass-mail itself from Microsoft Outlook 97 and Outlook 98.

I Love You - May 2000

Using a similar method as the Melissa, the computer virus dubbed "I Love You" managed to infect millions of computers around the world overnight. Just like Melissa this computer virus sent passwords and usernames, which were stored on the attacked computers, back to the developer of the virus. After authorities traced the virus they found that a young Filipino student was behind the attack. The young man was released due to the fact that the Philippines did not have any law that would prevent hacking and spreading malware. This situation served as one of the premises for creating the European Union's global Cybercrime Treaty .

The Code Red worm - July 2001

This 21st century computer virus managed to penetrate tens of thousands of systems that ran Microsoft Windows NT and Windows 2000 server software. The damages caused by the Code Red computer virus were estimated at $2 billion. Core Red was developed to use the power of all computers it infected against the official website of the White House at a predetermined date. In collaboration with different virus hunters and tech firms, the White House managed to decipher the code of the Code Red virus and stop traffic as the malware started its attacks.

Nimda - 2001

Shortly after the September 11 tragedy this computer virus infected hundreds of thousands of computers worldwide. Nimda was considered to be one of the most complicated viruses, having 5 different methods of infecting computers systems and being able to duplicate itself.

Downadup - 2009

The latest and most dangerous virus is the "downadup" worm, which was also called "Conficker". The computer security company F- Secure stated that the computer virus has infected 3.5 million computers worldwide. This malicious program was able to spread using a patched Windows flaw. Downadup was so "successful" in spreading across the Web, because it used a flaw that Microsoft patched in October in order to distantly compromise computers that ran unpatched versions of Microsoft's operating system. But the greatest power of the worm is believed to be the ability of computers, infected with the worm, to download destructive code from a random drop point. F- Secure stated that three of the most affected countries were China, Brazil and Russia.


Stuxnet is a Windows computer worm discovered in July 2010 that targets industrial software and equipment. While it is not the first time that hackers have targeted industrial systems, it is the first discovered malware that spies on and subverts industrial systems,and the first to include a programmable logic controller (PLC) rootkit. The worm initially spreads indiscriminately, but includes a highly specialized malware payload that is designed to target only Siemens Supervisory Control And Data Acquisition (SCADA) systems that are configured to control and monitor specific industrial processes. Stuxnet infects PLCs by subverting the Step-7 software application that is used to reprogram these devices The probable target of Stuxnet is widely suspected to be uranium enrichment infrastructure in Iran;Symantec noted in August 2010 that 60% of the infected computers worldwide were in Iran. Although Siemens initially stated that the worm had not caused any damage, on November 29, Iran confirmed that its nuclear program had indeed been damaged by Stuxnet.The infestation by this worm may therefore have damaged Iran's nuclear facilities in Natanz and eventually delayed the start up of Iran's Bushehr Nuclear Power Plant. Kaspersky Labs concluded that the sophisticated attack could only have been conducted "with nation-state support"and it has been speculated that Israel may have been involved.


The worm was first reported by the security company VirusBlokAda in mid-June 2010, and roots of it have been traced back to June 2009.It contains a component with a build time stamp from 3 February 2010. Kaspersky virus experts believe that Stuxnet started spreading around March or April 2010.In the United Kingdom on 25 November 2010, Sky News reported that it had received information that the Stuxnet worm, or a variation of the virus, had been traded on the black market. The name is derived from some keywords discovered in the software.


Twitter Delicious Facebook Digg Stumbleupon Favorites