Contact@gazswebservices.org.uk
+44 0330 043 5176
Mon to Fri: 9AM - 5PM | Sat: 10AM - 4PM

Your cart

Behind The N-Gage PDA

If you’re old enough you may remember the Nokia N-Gage which was a very different mobile phone at that time as opposed to mobiles manufactured by other companies, the N-Gage was a PDA combined with a telephone and was developed from 2003-2005 and as you can see it only lasted 2 years before Nokia discontinued it.

The original N-Gage ran on the Symbian OS v6.1, but was a very different phone considering its competition and gained the nickname “Taco Phone” as according to most people it resembled a Taco (We can’t see why!).

The Symbian OS that it ran on is itself now discontinued, the N-Gage could not live up to its rival the Nintendo and was noted as a commercial failure.

It was one of the weirdest looking mobile phones and was quite something to own for the time it was developed, image is below.

Google And Blogger

As you may know already, blogger is a free blogging platform which is owned by Google, but what do actually know about the platform? If you’re like us, not much…. So lets try and explain.


Blogger is a blog-publishing service that allows multi-user blogs with time-stamped entries. It was developed by Pyra Labs, which was bought by Google in 2003. The blogs are hosted by Google and generally accessed from a subdomain of blogspot.com. Blogs can also be served from a custom domain owned by the user (like www.example.com) by using DNS facilities to direct a domain to Google’s servers. A user can have up to 100 blogs per account.

Up until May 1, 2010, Blogger also allowed users to publish blogs to their own web hosting server, via FTP. All such blogs had to be changed to either use a blogspot.com subdomain, or point their own domain to Google’s servers through DNS.

As you may know, even after reading this, well not much is know.

Facebook Live And Verification

As we all know many disturbing things have been seen live using Facebook, such as murders and if you search “Is there verification needed to use Facebook Live?” many of the answers are the same and state that only people with verified Facebook pages can use the service, but as I just found out this answer isn’t actually true as many people can use Facebook Live without issue on their Facebook account, so why isn’t there enforced verification needed to use Facebook Live services first? Surely the answer to many of the questions like “how can murders be shown live using Facebook” is because NO verification is actually needed to use Facebook live, surely verification like official government ID can be added so that people whom have gone through the verification process successfully can use the services which would in most if not all cases would make Facebook live a sought after and more safe service to use? Today 31/03/2019 Mark Zuckerberg stated that Facebook has too much power and that government’s need to step in to help, but wouldn’t Facebook making a start on this make government want to and be happy to assist? Facebook need to take the first steps to tackle the surge of violence being shown through their platform.

What Does My IP Address Show?

Many people think that every separate computer or mobile device have got their very own IP address, but that’s not quite true nor is saying it tells people what you’re called because it doesn’t, but it does list some of the following that maybe you didn’t expect it to show people that have got your IP.

[ninja_tables id=”785″]

and it even shows more than that however they are some of the things your IP shows, so once someone has your IP they can find out certain things but even more can be accessed by the police and other law enforcement agencies.

We hope that by reading this short post, you learnt a lot.

By-Passing Website Blocks

We all know what it’s like when your at work or college and you get 5 minutes free, thinking you can quickly check social media but they’ve been blocked by college or work… Its bad, and your thinking to yourself well I’ve not got anything to do right at this minute so why can’t I check my Facebook, right? Well no longer, follow the quick and simple instructions to by-pass the blocks put in place.


  1. Open a new tab and go to KProxy.
  2. Type the website address you want into KProxy, so Facebook.com (For example).
  3. Enter your login details.
  4. Enjoy using social media, by-passing all blocks.

Its that easy, but the organisation wishes it wasn’t!

Enjoy 🙂

Behind The Inner Working’s Of Blogger

We have all heard of Blogger and most of us know that it is currently owner and developed by Google however, blogger was originally owned and operated by a company called Pyra Labs before the service was purchased by Google way back in 2003.

Blogger is used not just by consumers but some companies too and you may also find blogs ran using the service but under the domain name blogspot.com although the service using this domain is exactly the same.

Blogger is written in the Python language and was first launched on 23/08/1999. Although Blogger is still active its use is slowly dwindling and may therefore soon be shut down for good, unless Google do something drastic that is.


We hope you have learnt something by reading this post.

About The Product Serial Number

Nearly everyone has heard of and have seen a product serial number and most of us know that it is basically a product finger print that identifies them specifically however most don’t really know much about them, so in this post we’re going to tell you a bit about them.


A serial number is a unique, identifying number or group of numbers and letters given to an individual piece of hardware or software, passports, bank notes and other documents.

We’ll give you an example… A model number for a Samsung Galaxy S8 will always be Samsung Galaxy S8 and that’s true for every Samsung Galaxy S8 mobile phone therefore the model numbers are identical whilst each of their serial numbers is unique to a specific device.

If your item is stolen but you have got the serial number of that item it means that the police can log the serial number and they happen to come across the exact model as yours and they have reason to check it then they can take a look at the serial number and see if it matches the serial number that you provided them with when you reported that item lost or stolen, they are guaranteed that the item in their possession is yours meaning they can return it to you. So you can understand that even if it seems pointless it is in fact absolutely worth it.


You can see why the product serial number was a brilliant idea and is still used millions if not billions of times globally everyday.

Is This A Piece Of The Oldest Computer?

Is this the piece of the worlds oldest computer? Lets give you some insight into the computer this is from.

The world’s oldest analog computer is the Antikythera mechanism, an ancient Greek device designed to calculate astronomical positions. Media outlets are now reporting that a lost piece, which somehow survived looters, has been discovered on the Aegean Seabed.

The Antikythera Mechanism was lost over 2,200 years ago when the cargo ship carrying it was shipwrecked off the coast of the small Greek Island of Antikythera (which is located between Kythera and Crete). The Mechanism was initially discovered in 1901, when Greek sponge divers found an encrusted greenish lump.

They brought the mechanism, which they believed to be a rock, to archaeologist Valerios Stais at the National Archaeological Museum in Athens. Over the ensuing decades the site was looted, trampled on by explorers, and, in 1976, the famous French explorer Jean-Jacques Cousteau inadvertently destroyed much of what remained of the ship’s hull.

Initially, no one knew what the lump was. Two millennia had eaten away at the ship and its cargo. Stais’ cousin, Spyridon Stais, a former mathematician, was the first to identify the gears in the mechanism.


We hope that helps but will this be confirmed as that missing piece? Time will tell.

32-Bit VS 64-Bit

In the computer world, 32-bit and 64-bit refer to the type of central processing unit (CPU), operating system, driver, and more that utilizes that particular architecture.

You will have seen the option to download a piece of software as a 32 or 64 Bit version and the difference does in fact matter because the two were programmed for completely separate systems.

32-bit systems utilize data in 32-bit pieces while 64-bit systems utilize data in 64-bit pieces. In general, the more data that can be processed at once, the faster the system can operate.

There are several other reasons to use a 64-bit system as well, most practically the ability to use significantly greater amounts of physical memory (more than the 4 GB allowed by a 32-bit machine).


We hope that helped if you was asking that certain question.

Truth Behind TOR

Anyone that is tech savvy will have heard of the TOR browser, but what do we actually know about the browser itself and what it is used for? Time to find out maybe.....

There is loads more you can learn about TOR.... We may expand on this soon.