Using Google Authenticator can secure your login to Non-Google websites

Normally, when logging in to a website, you require your username and password. In case of simple passwords, you can compromise with the security of your account. The two step authentication from Google, allows you to safeguard your account on Non-Google sites. By configuring your account for this free feature and installing a mobile app (available for iOS and Android devices), you can log in securely to sites like Outlook.com, WordPress.com etc. Details – http://tek.io/11ZAsVd

Facebook’s Instagram Videos are full TV commercials

Instagram the photo sharing app, which was succeeded over by Facebook, has added the functionality to post videos. The videos being posted can be up to 15 seconds, which is equivalent to normal TV commercial. With this, Facebook has leaped forward to display video ads on it’s site, which is a major boost, as Video Advertising is still a major chunk of Corporate Budgets. Details – http://bit.ly/12Ye3eh

Yahoo shuts down classic mail. The new Avatar scans user emails to display ads

Starting June 3rd, 2013 – Yahoo shuts down it’s classic email services. All the users are forced to migrate to the new version. The new version scans user emails to display Ads accordingly. Those who refuse to comply with the new policies – either have to ditch their Yahoo account or will have to use some IMAP client to access emails. The silver lining is – you can refuse to show ads, but you email contents, will, still be scanned. Details – http://tcrn.ch/17MEjdb

Can Apple Macs get virus

As compared to their Windows counterparts, Mac Computers are less prone to virus infection. Based on Unix OS, which is inherently a secure and safe operating system; is not widely used as compared to Windows. More number of users, lead to more options for getting infected. One of the most common ways that the “bad guys” are able to attack a Mac is through browser applications and browser plug-ins such as Adobe Flash, Adobe Reader, Java and others, which are installed on almost all computers. Though less vulnerable to viruses, Macs are operated by Humans who are flawed and become victims of Trojans, phishing etc. – http://bit.ly/11iCvGo

Latest Yahoo apps in Android and iOS, integrate Summly

Days after buying Summly for $30 million, Yahoo integrated the same into it’s latest iOS and Android apps. The looks of apps on both the platforms is almost identical. Summly creates a summary of news article in 400 characters, which enables readers to quickly glance through the news. Though this update is available in US, for the time being. Details – http://bit.ly/157vJEK

CERN recreating first web-page as devotion to early ideals

A team at the European Organisation for Nuclear Research (CERN) has launched a project to re-create the first web page, which aims to preserve the original hardware and software associated with the birth of the web. This initiative coincides with the 20th anniversary of the research organisation, which gave web to the world. The world wide web was developed by Prof Sir Tim Berners-Lee while working at Cern. It was Sir Tim Berners’s idea to provide a free, decentralised information system, easily accessible to the world. – http://bbc.in/157s75K

Microsoft to embed Skype in Outlook.com

When Microsoft acquired Skype in 2001, it intended add voice and video communications facility in it’s free email service Outlook.com. The plugin available for the recent versions of Internet Explorer, Chrome and FireFox, enables users to start an audio or video call, while reading an email.The service currently available in UK, is being readied for US and Germany – http://www.pcworld.com/article/2036822/microsoft-previews-skype-for-outlookcom.html

Worst BYOD scenarios and the preventive steps for same

Does your company allows its employees to “Bring Your Own Device” (BYOD)? Are you facing problems like decline in net productivity of the employee, data security breaches/lapses, and virus etc. When implementing BYOD culture, you need to be pro-active as a network administrator, than repent later on. Offence is the best form of defense. Here are 10 mistakes, network admins do and how to avoid the same. http://www.techrepublic.com/blog/10things/10-worst-case-byod-scenarios-and-how-to-prevent-them/3673

How to calculate ISO week number in SQL 2005

The purpose of ISO week number is to provide an unambiguous and well-defined method of representing dates and times, so as to avoid misinterpretation of numeric representations of dates and times, particularly when data is transferred between countries with different conventions for writing numeric dates and times ( – WikiPedia). SQL Server 2008 and above provide ISO_WEEK DATEPART function to calculate the ISO week number, but no such function exists in SQL Server 2005 or less.  Check here – http://www.sqlservercentral.com/articles/T-SQL/97910/