Cablegate and the aftermath: a few observations
Wikileaks released a set of United States diplomatic cables on Nov 28, 2010, popularly referred to as Cablegate. Let’s consider the events which happened afterward.
Technology, books, travel, and linguistics
Wikileaks released a set of United States diplomatic cables on Nov 28, 2010, popularly referred to as Cablegate. Let’s consider the events which happened afterward.
If you are looking for how to avoid or recover: read this one instead. In the past few weeks, a lot of Facebook users have received the following (or similar) messages posted by their friends Hi Friends see Face-book images […]
Nokia is facing some serious issues some of them are technical, but the major issue right now is how it can rebrand itself as a smartphone manufacturer (rather than just a mobile phone manufacturer).
The post is written in honor of Sh. Hari Prasad, the winner of EFF Pioneer Award 2010
This article illustrates some examples of how the Indian government deals with (Information) Technology. Some of these projects are unheard of while some generated unnecessary hype.
An article on how the internet-centric era supplemented by smartphones is giving tough time to Intel and Microsoft and why the two giants of Desktop-centric computing era are not able to retain their stronghold in the consumer market anymore.
CERT-In is a low-profile (Indian) government organization. The Government of India established the Computer Emergency Response Team (“CERT-IN”) to ensure Internet security. Many institutions, including the Ministry of Home Affairs, courts, the intelligence services, the police, and the National Human […]
If you have visited a HTTPS site and got an error message which you do not understand, then this article is for you. Here I cover the common errors encountered while browsing HTTPS sites.
So, today morning I received an email saying I received an Orkut scrap from a friend with contents “Bom Sabado”. Within a minute, I received the same scrap from another friend. Now getting the feeling that this must be some […]
We all use HTTPS and vaguely understands it as a more secure form of communication. This article is aimed at better understanding of HTTPS and how secure it is.