Sunday, 16 September 2012


By Ishant GuptaQR CODES
Quick Response codes are QR codes in short.These codes store numbers, websites and text. Popularity of QR codes is increasing very fast.
QR code is a special graphic in a white square box. It has more capabilities than Bar code, due to based on digital technique. You can scan any QR code of any advertisement by your smartphone's QR code reader and get their website. You can use QR code in many ways.

1. Reminder for Friends:-
Do your friends not understand your handwriting? In this case you can use QR codes to tell them some important thing. For that you need to generate your QR code. Take a print and send it to your friend. Now if your friend want to read this QR code, he will scan QR code with the help of his phone or tablet and get the message. He can save QR code as an image also. It's benefit is that no other can easily read your message until he has QR code reader.

2. Secure Wi Fi Network:-
If you generate a QR code on for your Wi Fi, then people can connect with the network after scanning the code. For that you have to enter Wi Fi network name, password and security type in the website. Once you have done this, then if anyone wants to connect to your network he/she need to scan the code first.

3. QR code on T-Shirt:-
You can generate QR code on You have to sign up on the website for working on it. You can insert every type of information in this QR code. Interesting thing is that you can choose colors and look for the QR code. You can show pictures also in background or foreground. Now you can print this QR code on T-Shirts and Key-Chains and can share information.

4. QR Tattoo:-
If you want, you can recreate a working QR code on your body by a skilled tattoo artist. This QR tattoo can consists of your personal website, number, facebook account information etc. Important thing is that the tattoo should be enough large to read easily by scanner and lines should be sharp.

5. Use in Email Signature:-
Everyone use email facility these days and mention some details at the end of email, like name and designation. You can use QR code in your signature. Generally QR code copies the thing, which you want to share by text signature. It depends on you that you want to share personal things or professional things. For that you have to create a QR code first and then upload that image to any image hosting website ( Then get the link of image and mention with your email signature.

6. Visiting Card:-
Almost all QR code generation websites provide you the facility to insert your personal details to create a QR code and can create a Virtual Visiting Card (VCard). If this type of code is printed on your visiting card, then anyone can get your details by scanning the code.

7. Code for sale:-
If you want to sale your car and print the information related to it on a paper. If anyone does not have the time to read all that information, you can send him a QR code. Whenever he will get the time, he'll scan it and get all the information. You can mention a link in QR code of pic of car from Flicker or Picasa.

How to generate and read QR codes?
You can generate QR codes absolutely free and can save in PNG / JPEG image file or PDF format. Open, or Here you can create a QR code with simple information or with Google map location, Websites, Facebook or Twitter page links. These websites create a QR code in free. You can read these QR codes with the help of QR code scanner in your smartphone. You can use Google Goggles or NeoReader apps. These apps. work free for Android, Windows and iPhone devices.


Internet world is very wide. Here people always plan to steal your data, identity and money. If you access internet from different different devices then security on internet is very necessary. You need to secure your web-browsing, downloading and mobile device along with your PC. 'Security Sweets' and 'Firewall' helps you in it.

Security Sweets:-
1. Outpost Security Sweet:-
It is a security sweet which provide you Antivirus, Firewall and Anti-Malware in a single package. It provide Email and Web-browsing security also. It checks the behavior of applications to maintain the speed of computer. It is absolutely free. It has some limitations also. It updates only once in a day and it does not have any identity protection and technical support facility.

2. Norton 360 (Version 6.0):-
Norton 360 is a 'All in One' sweet. Its cost is around $30. It has an 'Online Identity Theft Protection' tool set. It warns you for dangerous websites and downloads. It has a facility of monitoring of Email and Instant messaging. It has a 2GB cloud storage also.

1. Comodo:-
Comodo is a free firewall. It uses cloud based data to protect your PC from online threats and programs. It mostly find out Trojans, Worms and Hackers attack. It has a 'Sandbox Mode' in which you can run new programs virtually in a safe environment.  It has a built in 'Trust Connect' Wi Fi feature. This feature provides security during data transfer via public networks.

2. Zone Alarm Pro:-
Zone Alarm's firewall pro version is available in $30/year. It keeps safe your computer from hackers and hide information from unreliable people. It's 'Built in Anti Fishing Tool' prevent your PC from duplicate and unreliable websites. It provides 2GB cloud storage, in which you can upload programs and back up your data.

Security of Mobile Devices:-
avast for androidAndroid: Avast
This free app of avast provides you a 'real time antivirus' protection. It provides a firewall, which stops all apps to access internet. It provides SMS and Call Filtering facilities also. It works as a task manager. It has a strong 'Anti Theft' feature, which notifies you on Sim lock and Sim change. 
It has a 'Remote Start' and 'Remote Wipe' facility. It can be very useful for android phones.

iOS: Virus Barrier
You can buy Virus Barrier app in just $2.99. It is very useful for iOS devices. It can scan the content which you download to your mobile. It scans Malware, Adware and hacker tools. It check that no malware, adware or virus should transfer to iOS when it connects to PC. It can scan zip files and email attachments also. It can scan files stored online in Dropbox and FTP server also. It also scan websites with fishing links and other dangerous data.

Options for Advance Users:-
Security during downloading:-
Use of Torrents is not illegal.  With the help of torrents you can download target file separately. If you are a target user and unhappy with your internet service provider, that he is strict for target speed or worried about the privacy, you should try and BT Guard's paid service provides you a secure and encrypted root for target data, which hide IP address of the PC. Peerblock is an open source and it works with

Security of your Laptop:-
It is very rare that your lost laptop find again. In this situation you should use 'Prey.' Create your account on "" It is free and available for Windows, Mac and Linux. 'Prey' installs in stealth mode. It does not appear anywhere on computer. Instead you need it to control online. Prey always remain silent. It starts work when you give any signal of misplacing of laptop. After that when anyone connects your laptop with a network, Prey trace that location. You can take a screenshot also that what is going on your laptop. Also you can take photos with the help of webcam.

Ispy CCTV:-
Open Download free software for windows. It converts webcam into surveillance device. It provides video recording, motion detection and face detection facilities.

Related Posts Plugin for WordPress, Blogger...