Saurabh Says
5 views | +0 today
Follow
Saurabh Says
Sap Business One | Database | Linux | Programming | Security | SMS | VOIP
Curated by Saurabh Gupta
Your new post is loading...
Your new post is loading...
Scooped by Saurabh Gupta
Scoop.it!

Website Screenshot

As the price of fuel is going up day by day and petrol/diesel being limited natural resource, it is imperative that necessary means to save fuel are taken up by each individual. I have jotted down some points that might be useful for saving fuel in day to day activities and contribute our part of greenery

more...
No comment yet.
Scooped by Saurabh Gupta
Scoop.it!

Mobile Phone Buying Guide!!

Mobile Phone Buying Guide!! | Saurabh Says | Scoop.it

You went out the other night with friends and saw some cool smart phones. You want to buy one too which is cost effective and fully loaded with functions. How to find a right phone according to your need and pocket?

Here is a small guide which might help you in choosing just the right phone for you.…
What to look for:

more...
No comment yet.
Scooped by Saurabh Gupta
Scoop.it!

Checking Google Page Rank for Websites

Knowing your Google page rank is critical for your SEO success and your visibility in search engine. Google Page Rank means how valuable Google think your website is and is ranked between 0-10. For example, more important sites are ranked above score of 5. When google blocks your site from search engine that it can go down to status “N/A”.

more...
No comment yet.
Scooped by Saurabh Gupta
Scoop.it!

Practical Guide to Fuel Saving !!

As the price of fuel is going up day by day and petrol/diesel being limited natural resource, it is imperative that necessary means to save fuel are taken up by each individual. I have jotted down some points that might be useful for saving fuel in day to day activities and contribute our part of greenery

more...
No comment yet.
Scooped by Saurabh Gupta
Scoop.it!

Computer hacking basics?

Computer hacking basics? | Saurabh Says | Scoop.it

Hacking means getting access to information/resources that you are not authorized to view/use. For example getting inside somebody’s computer to steal information, corrupt their system or use their computer/mobile to send or receive information etc.

more...
No comment yet.