What is special in Speaking Photo app?

Turn your pictures into stories with Speaking Photo, an app that lets you add sound to any photo. It allows you to tell a story along with the image before you share it on Facebook, YouTube or via email. The storyboard feature gives users a chance to select multiple photo/audio pairs and customize their play order, creating a larger movie to share. Available for iOS and Android.

With SpeakPic, the voice of the translator will be really fun for you and friends.
Have you thought about making your friend sing his/her team's anthem? Or maybe an unexpected declaration of love. With SpeakPic, anything is possible.

You can change the voice with different effects to make the end result even funnier.
There are dozens of voices to choose from, in multiple languages.

Picture Credit : Google

What is special in GoCam app?

Lovers of the selfie rejoice! GoCam is a new app that uses touchless technology to let snap selfies. Developed by Swedish tech start-up Crunchfish, the iOS app lets users trigger photos or videos from a distance of up to 10 feet with simple gestures to control your smartphone camera. They can be edited with the included high quality filters and editing tools, and shared on social networks. So no more rushing into your best pose, take your time and trigger the shot when ready!

This unique app has been appropriately named GoCam for iOS devices.  By using gestures to control your camera, the app provides an amazing camera for taking selfies and groupies without touching your phone screen. Now the user doesn't need to rush into her favourite pose or hold it for long time intervals just to get that perfect click. With GoCam, you just have to set your phone and click a photograph whenever you are ready with the app intelligent detect your gesture and click the photo.

The company boosts that GoCam is the very first touchless camera application in the market with video recording, which allows the user to record videos touchless. The app lets the user capture spontaneous moments and then make the photos personal with filters and editing tools before sharing it with friends and family.

Picture Credit : Google

How do you block Facebook game invites?

Log into Facebook. On the homepage click on the small lock icon on the upper right side. It will drop a settings menu. Click on 'See More Settings'. This will take you to a new page of settings. On the left sidebar, click on 'Blocking' to reach the 'Manage Blocking' page. Look for 'Block app invites' to block requests from a friend. To block requests from all friends for the given app, look for 'Block apps'. For either of the options, start searching for a friend or an app in the respective boxes. Once you find them, click to add to the blocked list. That's it. No more annoying game invitations.

Facebook has a page dedicated to letting you manage how apps interact with your account. It shows all of the apps you've used Facebook to log into, so it's worth reviewing while you're managing blocking on your account.

Head to Settings > Apps and Websites on Facebook to access this. You'll see three boxes under Preferences, which we'll discuss in a moment.

Also on the Apps and Websites page, you'll see a second box titled Game and App Notifications. Click Edit, then Turn Off to hide all notifications from games and apps.

If you don't care about any content from these apps or don't want to block them individually using the above controls, this is a handy way to stop all notifications in one sweep. It doesn't affect the games themselves, so you can continue to play them.

Picture Credit : Google

How many mickeys did Mickey Mouse move his Mickey Mouse mouse?

Mickey is the unit of measurement for the speed and movement direction of a computer mouse. One mickey is approximately 1/200th of an inch. The speed can be measured in "pixels per mickey", the ratio between how many pixels the cursor moves on the screen and how many centimetres you move the mouse on the mouse pad. The directional movement is called the horizontal mickey count and the vertical mickey count.

Clock speed is measured by how many ticks per second the clock makes. The unit of measurement called a hertz (Hz), which is technically one cycle per second, is used to measure clock speed. In the case of computer clock speed, one hertz equals one tick per second. The clock speed of computers is usually measured in megahertz (MHz) or gigahertz (GHz). One megahertz equals one million ticks per second, and one gigahertz equals one billion ticks per second.

You can use clock speed as a rough measurement of how fast a computer is. A 2.0GHz computer will run faster than a 1.4GHz computer with the same processor and the same amount of memory. However, you cannot use clock speed to compare computers with different types of processors or computers with different amounts of memory.

Picture Credit : Google

What is Spyware?

Spyware is a type of malware that is designed to steal your data. Once a spyware is activated, it monitors your activity and tracks your login, password and other data you input. It begins stealing your personal information and relays it to advertisers or third party users. On a more serious level, it can steal your credit card and bank account details, costing you your hardearned money. The best way to protect yourself from spyware is to install an antivirus software and be mindful of what you click and install on your system.

For mobile phones, it's best to download apps from Google Play for Android phones and the App Store for iOS mobiles. "Rooting" an Android handset or "jailbreaking" an iPhone should also be avoided if you're concerned about spyware. In an enterprise environment, it’s wise to make this a policy. Using mobile device management (MDM) software that limits the download to approved apps only is also a good option.

In addition, although it's unlikely that someone is going to physically access your phone to install spyware on it, always create a lock code for your phone that only you know. This is a requirement in many corporate environments.

Even if you're careful about the links you click, the attachments you open, and the files you download, you still may be targeted by drive-by infections. Since drive-by attacks often depend on browser vulnerabilities to infect their victims, the risk of drive-by infections can be reduced by keeping your browser version up to date.

Picture Credit : Google

What is CAPTCHA?

Coined in 2003 by Luis von Ahn, Manuel Blum, Nicholas J. Hopper, and John Langford, CAPTCHA is short for "Completely Automated Public Turing test to tell Computers and Humans Apart". It is a type of challenge-response test used by most websites to distinguish between a human user and a robot as a security measure to keep spam away. CAPTCHA can be just letters, pictures, numbers or a combination of two or more of these.

This CAPTCHA type relies on a human’s ability to generalize and recognize novel patterns based on variable past experience. In contrast, bots can often only follow set patterns or input randomized characters. This limitation makes it unlikely that bots will correctly guess the right combination.

Since CAPTCHA was introduced, bots that use machine learning have been developed. These bots are better able to identify traditional CAPTCHAs with algorithms trained in pattern recognition. Due to this development, newer CAPTCHA methods are based on more complex tests. For example, reCAPTCHA requires clicking in a specific area and waiting until a timer runs out.

Picture Credit : Google

What is malware?

A portmanteau of "malicious" and "software", malware is any software written with the intention of causing harm to a user such as stealing data, damaging devices, and spying, among others. Trojans, spyware and ransomware are all different kinds of malware. Usually, malware is created by hackers looking to make quick money by stealing data or blocking users access to their data Malware can make its way to users' computers in the form of an email link, social media or any executable file. To safeguard oneself against malware, one must install an antivirus software that can detect malware and protect one's data.

Malware authors use a variety of physical and virtual means to spread malware that infects devices and networks. For example, malicious programs can be delivered to a system with a USB drive or can spread over the internet through drive-by downloads, which automatically download malicious programs to systems without the user's approval or knowledge. Phishing attacks are another common type of malware delivery where emails disguised as legitimate messages contain malicious links or attachments that can deliver the malware executable file to unsuspecting users.

Picture Credit : Google