A short URL expanding service can be used to detect spam, malwares, porn and phishing content. This application expands the short URL to the original long form and traces it back to the site. This enables you to know if the link is a potential threat for your computer. It retraces the root IP address […]
News
Time to Celebrate, TechWalls is One Year Old
Today is an important day for TechWalls as this blog has turned 1 year old now. Actually TechWalls is 1 year and 7 day old at the time of publishing this post, I could not celebrate the anniversary on time because of busy work this week. TechWalls was officially founded on February 9th, 2011 and […]
5 Amazing Shooter Games for Mac
Games are the one of the best entertainment among the youths worldwide. With gaming contests and gaming shows taking place all round the year, there’s a feverish demand for games among the public. The demand of the gaming industry has also risen exponentially with the launch of gaming platforms and top-notch multimedia companies entering the […]
Batch Extract WinRAR And Zip Files With The Extractor
While zip and 7zip formats are quite widely used for creating compressed archives, the RAR format is also one of the most commonly used format. However, the RAR format is native to the paid WinRAR application, whereas, 7Zip is available for free. Furthermore, most operating systems have a built-in zip archive creation (and unzipping) utility […]
5 Web Apps Which Show Us How to Make Use of QR Codes Differently
The Quick Response Code or the QR Code is the trademark of a two dimensional matrix bar code. Originally developed for application in the automotive industry, today it has a wide range of applications. With the help of the QR Code various tasks are simplified for the user.
How to Set Up Microsoft Outlook for Google Apps Mail
You must have heard about setting up 2-step verification for Google Apps mail to protect your Google Apps account better from hackers. As only you can get the verification code via your mobile phone, your accounts will be more secured with the 2-layer protection. However, after setting up the 2-step verification, many people using email […]