FILTER RESULTS
FILTER RESULTS
close.svg
Search Result for “com facebook”

Showing 1 - 10 of 34,325

TECH

INTERNETSITE of the Week

Database, Gotfried. K, Published on 06/01/2010

» For all you fans of instant messaging services on the Internet, this week's Internet Site of the Week promises to be just what you've been looking for. It's called Meebo.com and it collects several chat facilities under one web page.

TECH

When you need to hide hard drives

Database, Wanda Sloan, Published on 13/01/2010

» I'm not ordinarily a big fan of tricks to replace real security. But when a friend asked me recently how to hide drives from his home's rug rats, I recommended she try NoDrives Manager.

Image-Content

TECH

3D TV, cloud computing and USB 3.0 to lead way in 2010

Database, Sasiwimon Boonruang, Published on 13/01/2010

» 2010 will be the year in which storage and connectivity play a key role for consumers, while social networking will find its way deeper into enterprises where virtualisation and cloud computing are moving forward.

TECH

More fun apps for iPhone cameras

Database, Graham K. Rogers, Published on 13/01/2010

» Although I carry an SLR camera about with me, I find that increasingly I use the iPhone 3G to take pictures, partly because there are now so many apps, allowing special effects to be used easily.

TECH

Cracking good time

Database, Published on 13/01/2010

» German tech nerd Karsten Nohl showed off at the Chaos Communication Conference in Berlin how he cracked the encryption that you were trusting to keep your phone calls un-tappable throughout Thailand; the researcher proved it would be pretty simple to crack any GSM encryption; he said the 20-year-old encryption algorithm used by most GSM companies is simply too weak, and can be cracked by anyone who really cares; he released all the data, cracking tables and instructions, but did not give away an actual cracking program, because that might be illegal.

Image-Content

TECH

Mobile operators focus on social sites

Database, Suchit Leesa-nguansuk, Published on 13/01/2010

» The popularity of global social network sites in Thailand has led mobile operators to leverage their opportunities in this channel to increase their new revenue streams.

TECH

A bite of the Apple

Database, Published on 20/01/2010

» Google released the Nexus One smart phone, an impressive gadget that will push more improvements in the iPhone, but will not immediately take much more than a nibble out of the Apple; the new phone runs on the Google operating system, and starts life with more than 18,000 apps - about 15 percent of the Apple selection but, on the other hand, able to multi-task, something the iPhone apps won't do; the big deal about Nexus One, however, is only about US and Canada, where Google aims to be, very roughly, what Number 2 yuppiephone firm DTAC was when the Norwegians took it over and it unlocked its phones; that is what Google is doing with Nexus, which is made by HTC of Taiwan and costs $529 or 17,500 baht in real money - but which is unlocked and will work with any carrier; this is a revolution in the US wireless industry, where phones are totally locked into carriers, and if you want an iPhone, you sign a two-year, near-usurious contract with AT&T; phone companies will feature the Nexus One - T-Mobile subsidises it for $179 for Americans who agree in writing to pay $79.99 a month for the next two years, or 6,000 plus 2,700 baht in real money; but Google will sell you the phone for use with any carrier from its website (google.com/phone) and this is the first crack in the phone-company control of the business.

TECH

book marks

Muse, Published on 23/01/2010

» H2O for good health

Image-Content

TECH

Data-interception technology sparks privacy vs safety arguments

Database, Suchit Leesa-nguansuk, Published on 27/01/2010

» Experts have raised concerns over whether using Sniffer software to resolve suspicious internet activity violates the Computer-related Crime Act B.E. 2550.

TECH

Social sites, cloud computing pose new threats

Database, Suchit Leesa-nguansuk, Published on 27/01/2010

» The increasing popularity of social networking and new technology development in cloud and virtualisation environment as well as new operating systems create loopholes for security threats in 2010.