sdr

Click TO See Android Tricks Click To See Facebook Tricks Windows 8 Launchs

ads

How to jailbreak your iOS device on 5.1.1

Absinthe 2.0 has been released, bringing with it an untethered jailbreak for iOS devices running iOS 5.1.1. The jailbreak is compatible with almost every iOS device, with the lone exception being the revised $399 iPad 2 with 32nm A5 chip. A solution for the "new" iPad 2 will be released at a later date.

The jailbreak process using Absinthe 2.0 couldn't be easier. In fact, the developers of the jailbreak claim "it's so easy, your grandma could do it." If your device isn't currently jailbroken, then follow the instructions below:

1. To start, you'll need to head on over to the Greenpois0n Web site to download Absinthe 2.0 for your respective operating system.

2. With your device connected to your PC, open iTunes and right-click on the device you want to jailbreak. Select Back Up from the menu. Wait for the backup to finish and then close iTunes.


3. On your iOS device, go into Settings > General > Reset > Erase All Content and Settings.

4. Open Absinthe 2.0 on your PC, verify that the correct iOS device has been detected, and then click Jailbreak. The jailbreak process will only take a few minutes.

5. Once the jailbreak is complete, close Absinthe 2.0 and launch iTunes again. Right-click on your device name, but this time select "Restore from Backup." Select the backup you just made. Let your device restore and finish syncing before disconnecting.

Once the restore is complete, you'll have a jailbroken device, complete with all of your apps and information as it was before you began.

If you're having issues with the instructions above, give this Reddit link a try. It worked for me.

If you were using a tethered iOS 5.1.1 jailbreak, open Cydia and search for "Rocky Racoon 5.1.1 Untether" and install it.
READ MORE - How to jailbreak your iOS device on 5.1.1

How To Password-protect your folders with free docLock

docLock
If you share your PC with friends, family members, co-workers, the occasional IT guy, etc., there may be files and folders you want to keep private. You know, financial data, company secrets, certain sensitive video files--that kind of thing. (Hey, I'm not here to judge.)

Out of the box, Windows doesn't give you the tools you need to password-protect files and folders. For that, you'll need a third-party utility. Most of them cost anywhere from $30-50, but if you're quick with your clicking finger, you can score one absolutely free.

Today only, Giveaway of the Day is giving away docLock for Windows. It regularly sells for $49.95 (though it's currently on sale for $29.95 from developer Large Software).

docLock provides military-grade security for any files and folders you want to protect. You can assign your own password or let the software generate one for you. And locking/unlocking is as simple as dragging and dropping to the docLock window or right-clicking the item and choosing docLock from the context menu.

If you need to share a protected file/folder with someone or take it with you, docLock gives you the option of making it portable--meaning it can be unlocked just by supplying the password (i.e. docLock itself doesn't need to be present).

Like all Giveaway of the Day deals, this one expires at midnight. To take advantage of it, you must download and install the program today. (And, yes, if you reformat your hard drive or migrate to another PC down the road, you'll lose access to the software. It's really intended to be a kind of extended trial.)

Bonus deal: Also today only, you can score a TrendNet TPL-303E2K Powerline Adapter Kit for $49.99 shipped. It uses your existing electrical wires to establish a high-speed Ethernet connection between your router and a PC, game console, Blu-ray player, or whatever. These kits normally sell for at least $100.
READ MORE - How To Password-protect your folders with free docLock

Top 10 Best & Most Popular Torrent Sites of 2012

This list is based on traffic rank and reports from Compete and Alexa, though we are all aware that Alexa isn't perfect and that Compete has plenty of flaws, but putting the two services to use at the same time on similar niche proved worthwhile.

So here we are, a compiled list of the 10 most-visited torrent sites at the start of the new year.

1. The Pirate Bay

The Pirate Bay (commonly abbreviated TPB) is a Swedish website that hosts magnet links, which allow users to share electronic files, including music, computer games and software, via BitTorrent. The Pirate Bay bills itself as "The world's most resilient BitTorrent site" (as of 2012, "The galaxy's most resilient...") The Pirate Bay is currently ranked as the 78th most visited website in the world and 20th in Sweden by Alexa Internet, has over 5.5 million registered users and, as of February 2012, hosts more than 4 million torrent files. According to the Los Angeles Times, The Pirate Bay is "one of the world's largest facilitators of illegal downloading" and "the most visible member of a burgeoning international anti-copyright or pro-piracy movement".

2. Torrentz

Torrentz is a Finland-based[2] meta-search engine for BitTorrent that is run by an individual known as Flippy. It indexes torrents from various major torrent sites such as yourBittorrent and offers compilations of various trackers per torrent that are not necessarily present in the default .torrent file, so that when a tracker is down, other trackers can do the work. It was the second most popular torrent website after The Pirate Bay in 2010[3], and it currently has a traffic rank of 145 on Alexa.

3. KickassTorrents

Founded in 2009, KickassTorrents is one of the youngest sites in the list, and this year it moved up to the top 3. Responding to the increasing worries about domain seizures, the site moved from its kickasstorrents.com domain to kat.ph a few months ago. The site continues to innovate and release new features every other week, and it currently ranks 257 on Alexa.

4. IsoHunt

IsoHunt is a BitTorrent index with over 1.7 million torrents in its database and 20 million peers from indexed torrents. With 7.4 million unique visitors as of May 2006, isoHunt is one of the most popular BitTorrent search engines. Thousands of torrents are added to and deleted from it every day. Users of isoHunt perform over 40 million unique searches per month. On October 19, 2008, isoHunt passed the 1 petabyte mark for torrents indexed globally. The site is the third most popular BitTorrent site as of 2008. According to isoHunt, the total amount of shared content was more than 13.44 petabytes as of September 29, 2011.

5. BTjunkie

BTJunkie was a BitTorrent search engine operating between 2005 and 2012. It used a web crawler (similar to Google) to search for torrent files from other torrent sites and store them on its database. It had nearly 4,000,000 active torrents and about 4,200 torrents added daily (compared to runner-up Torrent Portal with 1,500), making it the largest torrent site indexer on the web. During 2011, BTJunkie was the 5th most popular BitTorrent site.

6. ExtraTorrent

ExtraTorrent is one of those robust torrent indexes that doesn’t make the news very often. Compared to last year the site has moved up a spot and is now the 6th most popular torrent venue.

7. Demonoid

Demonoid is a website and BitTorrent tracker created by an anonymous programmer (supposedly of Serbian origin) known only by the pseudonyms "Deimos" and "Zajson". The website indexes torrents uploaded by its members. Demonoid.com was ranked the 538th most popular website overall in December 2010, according to Alexa. Demonoid's torrent tracker had an estimated three million peers in September 2007. The site had over 252,427 torrents indexed as of May 3, 2009 (torrents uploaded prior to August 4, 2005 were removed to free server resources).

8. EZTV

Unlike the other sites in the top 10, TV-torrent distribution group EZTV is a niche site specializing in TV content only. Despite its fair share of downtime this year, EZTV has managed to get a spot in the top 10 for the first time in its six year existence.

9. Bitsnoop

BitSnoop is another newcomer that gained a large audience this year. This didn’t go unnoticed by the RIAA, who filed a complaint at the U.S. District Court of Columbia and obtained a subpoena to reveal the identity of BitSnoop’s owner a few months ago.

10. 1337x

1337x is also new to the top 10, and focuses more on the community aspect than some competitors. The site’s owners say they started 1337x to “fill an apparent void where it seemed there was a lack of quality conscience ad free torrent sites with public trackers.” Its 10th place this year proves that they’re getting the success formula right.
READ MORE - Top 10 Best & Most Popular Torrent Sites of 2012

Android Malware Found in Angry Birds Add-On Apps

Google recently removed at least 10 applications from the Android Market, all of which contained malicious code disguised as add-ons to one of the most popular apps of all time.

Each of the removed apps posed as a cheat or an add-on to Angry Birds, the much-lauded mobile application created by Finnish game development studio Rovio.

A number of the apps in question contained a spyware program called Plankton, which connects to a remote server and uploads phone information like the IMEI number, browser bookmarks and browsing history.

“Market descriptions for these apps included the statement ‘brought to you free sponsored by Choopcheec Platform,’” Lookout Security spokesperson Alicia diVittorio told Wired.com. “[They include] a link to an EULA that does seem to accurately describe the behavior observed to date. We do not see these as desirable behaviors and classify it as Spyware.”

Xuxian Jiang, an assistant professor of computer science at North Carolina State University, initially discovered the malicious applications last week, and reported them to Google on June 5. Google suspended the questionable applications the same day, “pending further investigation.”

Jiang found malicious programs other than Plankton in his research. YZHCSMS, for example, is a Trojan horse virus that jacks up your phone bill by sending large amounts of SMS messages to premium numbers. Jiang says apps containing the virus were available on the Android Market for at least three months before Google pulled them.

Jiang found a similar application, DroidKungFu, circulating Chinese application markets before YZHCSMS made its way to the Android Market. “DroidKungFu can collect various information about the infected phone, including the IMEI number, phone model and Android OS version,” according to a Lookout Security blog post.

For many app developers, the Android Market offers a freedom not found in other application retail outlets. Unlike Apple’s strict application review process, apps submitted to the Android Market are published almost instantaneously. Many appreciate the freedom given to push programs out to the public at such a speed.

However, the Android Market’s app submission process comes at a cost. Google’s lack of vetting applications lends the Market to security vulnerabilities like these. Google mostly relies on a self-policing community — including researchers like Jiang — to spot offending apps, which means malware can sit in the market for months before someone spots it.

With a relatively open submission process like Android’s, this obviously isn’t Google’s first run-in with malicious app removals. Google pulled nearly two dozen malware-infected applications in early March, but not before close to 200,000 downloads occurred.
READ MORE - Android Malware Found in Angry Birds Add-On Apps

Which is the most popular antivirus software?

In an over-crowded antivirus software market, end and corporate users are often finding it difficult to differentiate between a value-added market proposition, next to the “me too” vendors of solutions. As in every other market segment, any scientific insight into the market share of various vendors offers an invaluable perspective into the market dynamics, what are customers purchasing, and most importantly, are they living in a world of ‘false feeling of security’.

Using a data set consisting of 120,000 data points, researchers from OPSWAT recently released an informative overview of the antivirus market, answering an important question - which is the most popular antivirus vendor?

According to their findings, that’s avast! Free Antivirus, followed by Microsoft Security Essentials and ESET NOD32 Antivirus.

Detailed market share statistics:

Avast - 17.4% worldwide market share
Microsoft - 13.2% worldwide market share
ESET - 11.1% worldwide market share
Symantec - 10.3% worldwide market share
AVG - 10.1% worldwide market share
Avira - 9.6% worldwide market share
Kaspersky - 6.7% worldwide market share
McAfee - 4.9% worldwide market share
Panda - 2.9% worldwide market share
Trend Micro - 2.8% worldwide market share
Other - 11.1% worldwide market share

Microsoft is the market leader in North America, followed by Symantec and AVG. Not surprisingly, the market leading avast! Free Antivirus is relying on the so called “freemium” business model, where the company grows and gains market share by offering a free alternative of their software, and earns revenue thanks to the successful conversion of free users to paid ones. Earlier this year, the company announced that it has 150 million active users worldwide, a clear indication of a working “freemium” business model.
READ MORE - Which is the most popular antivirus software?

How To Hack Your Facebook Account with Greasemonkey & Javascript

Facebook is pretty awesome, but it is far from perfect. More than once, I’ve heard complaints about some of Facebook’s technical aspects. Sadly, Facebook isn’t open-sourced, so users can’t change anything themselves – or can they?

By using simple pieces of Javascript code, or by applying Firefox Greasemonkey userscripts, users can change the appearance and workings of Facebook themselves.

Learn how to hack Facebook accounts for fun, or tweak something useful. Believe me, it really is all in your hands.

Facebook Account Javascript Hacks

In these following hacks we’ll be using basic Javascript to toy around with Facebook. Note that we’re not going to hack into Facebook accounts, or anything of the like. Most of these ‘hacks’ are temporary and will disappear once you refresh the page. They also won’t be visible to users on other computers. So why are we doing it? – Because it’s fun!


These Javascript snippets, which we’ll supply below, simply need to be pasted into the address bar. Hit enter, et voila!

Changing Profile Colour

This will change the colour of your Facebook bar to a color of choice.


Just paste the following code in your address bar and hit enter. You can replace ‘red’ with any color you want – black, white, green or even orrange. If you want to reverse the effect, press Ctrl+F5 for a hard reload of the page.

javascript:void(document.getElementById('fb_menubar').style.background='red');

View Chat History with Offline Friends

Unfortunately, you can’t normally view the chat history of online friends. If you’re trying to remember something that was said, waiting for them to come back online is one hell of a bother. Instead, you can just use this – pretty useful – Javascript hack.

First of all, we need to get your friend’s Facebook ID. When you visit his page indirectly (through your friends list or by using the search engine), you’ll be able to see it as a number in the address bar.


Another way to retrieve someone’s ID is by going to the Friends widget on their page, and right-clicking See All. Then you’ll have to copy the link location and paste it in your address bar.


Once you’ve got someone’s ID, simply paste the following code in your address bar, replacing 1122334455 with the relevant number.

javascript:buddyList.itemOnClick(1122334455);


Other Javascript hacks

The preceding two hacks are without doubt the most impressive or useful ones. Below are some of the other tricks you can pull off by using Javascript. We’re not going to deep on this because they’re all things you can do manually as well.

Change chat status to invisible:

javascript:statusControl.sendVisibility(false);

Change chat status to visible:

javascript:statusControl.sendVisibility(true);

Close all chat windows with person 1122334455:

javascript:chatDisplay.tabs[1122334455].tabXOnClick();

Open application tab:

javascript:applicationDock.toggleTab();

Bring up notifications:

javascript:presence.toggleTab('chat_status_control','chat_status_control_tab');

Bring up friends list:

javascript:buddyList.toggleTab();

Facebook Greasemonkey Hacks


Greasemonkey is one of the best firefox add-ons in existence. By using ‘userscripts’, you can customize nearly every website. Read more about Greasemonkey in .

Today we won’t be focusing too hard on Greasemonkey itself, but on some of the great Facebook-specific userscripts.

Facebook Auto-login – One of the simplest, but perhaps also one of the most useful userscripts you’ll find. This one will automatically log into Facebook, as long as Firefox remembers your password, saving you a lot of hassle.

Auto-Colorizer for Facebook – This script will recolor your Facebook page by applying the color scheme of the most dominant picture currently showing on the page. As you can imagine, this can create some exciting, and also ambient effects.

FacebookDeletes – If you want to get rid of a lot of people at once, this is your man. This script can bulk delete friends, making the masacre all the easier.

Remove All Facebook Ads – Adblock still tends to miss a lot of Facebook ads. This script, frequently updated, will remove all thinkable Facebook ads, creating a completely click-safe Facebook environment.

External Apps Blocker – One of the most irritating things on Facebook are the abundance of quizzes, quote generators, and the like. Filtering all external app ‘stories’ from your homepage will be a lot easier if you use this script.
READ MORE - How To Hack Your Facebook Account with Greasemonkey & Javascript

Linkedin hacked; 6.46 million Passwords Leaked Online

Linkedin-hacked
A user on a Russian forum has claimed to have downloaded 6.46 million user hashed passwords from LinkedIn.

It looks as though some of the weaker passwords — around 300,000 of them — may have been cracked already. Other users have been seen reaching out to fellow hackers in an apparent bid to seek help in cracking the encryption.

Finnish security firm CERT-FI is warning that the hackers may have access to user email addresses also, though they appear encrypted and unreadable.

A source said they had searched and discovered their password in the cache. It has been reported that the passwords were encrypted using the SHA-1 algorithm — which is known for its flaws — but unless a password is weak, it may take a while to decrypt the remaining cache.

LinkedIn has more than 150 million users worldwide. This apparent hack could affect less than 10 percent of its user base, but it will strike a damaging blow to the ‘professional’ social network’s reputation.

It is advised users change their passwords as a precautionary measure.
READ MORE - Linkedin hacked; 6.46 million Passwords Leaked Online

Hands on Fonetab Android tablet

It has SIM slot for voice calling and is priced at Rs 6,999.

A couple of days back, Delhi based company Go Tech launched two tablets - Fonetab and Funtab Fusion. We have already carried the first hand review of the Fusion tablet.


Now, here is first experience of Fonetab which has a SIM slot that makes voice calling from the tablet possible.
READ MORE - Hands on Fonetab Android tablet

Google to release Siri rival?

Google is expected to announce its own voice-controlled assistant for Android on June 27th. With Google's vast language resources this new rival has huge potential.

 

Google, the company behind Android, is expected to release its own voice assistance capability for Android at this week's I/O conference.
While Android already has, though slightly limited, a voice assistant in the form of Android Voice Actions system, this new product which has been code-named Majel is expected to be a significant one.
Google to release Siri rival
HTC on Saturday hinted at a possible Siri rival through its Twitter and Facebook page, Samsung already has something called S-Voice recently released on the Samsung Galaxy SIII, even LG week revealed Quick Voice, a personal voice-control assistant which features natural-language processing technology, to let its smartphone users search, write emails and so on-with built-in support for interactivity with 11 apps at its start, though right now it's confined to Korea. Even our home grown Micromax has rolled out something called AISHA.
While Siri on iPhone is by far most praised voice assistance service, if Google manages to use its resources well, this new product will have fabulous capabilities. Google has capabilities in almost all the spoken language in the world and a deep understanding of them thanks to its Translation engines and ample research that has already gone behind this capability.
But then knowing a language and using that knowledge to devise a new application are two entirely different things. But given Google's track record in creating technologies, we are very hopeful of a well made and useful application that can potentially be a game changer especially given the fact that it will bring voice activation tech to the masses as Android phones are much cheaper than that of iPhone.

 

READ MORE - Google to release Siri rival?

Top 4 mobile phones with 12 megapixel camera

A camera phone is a perfect mix between a camera and a mobile.

 Who would have thought that mobile phones will one day converge into such a unique device that would allow us to carry our world in our pocket encapsuling functions such as communication, entertainment, games, and photography.
In the process, mobile phones have robbed many other gadgets of their importance such as MP3 players, game consoles and even cameras.
Cameras are the worst affected by the growth of cellphones. With the rise in the number of companies manufacturing camera phones, it has replaced cameras surely in the basic or the start up user range.
But with cellphones donning better and more powerful cameras, the traditional lenses in the middle and the enthusiast category are now feeling the pinch.
Today most of the handsets feature two to five megapixel cameras. While, some high end handsets also feature an unbelievable 12 megapixel camera.
Here is a round up of the top four 12 megapixel camera phones that are available in the Indian market.
Sony Ericsson Satio (Rs 30,000)
After the very successful W995, Satio was Sony Ericsson's display of expertise in camera phones. To begin with, the Satio has a bigger camera sensor to accommodate the whole 12 megapixels in to it. The inclusion of tracking light and a Xenon flash is a welcome gift for the Satio.
The best feature of the Satio is its protective back cover which doubles up as the short cut key for activating the camera.
Overall the camera quality, as expected from a Sony Ericsson phone, is superb with great outdoor and indoor shots. But low light shooting is only good till a distance as the Xenon flash provided feels a little underpowered for a distant shot.
Samsung Pixon 12 (Rs 30,000)
The update to the Samsung Pixon 8 is built on almost similar lines with the same black colour overall finish and a protruded lens mechanism.
However Pixon 12 is slightly more protruding than the Pixon 8 due to its bigger sensor size.
The Pixon 12 also features a variable aperture wide angle lens which means no more moving away from the objects and is a life saving feature when comes to camera phones because of their limited range. With a touch to focus feature just like the one found on the iPhone 4 users can choose to focus on selected subject.
A xenon flash and a LED based tracking beacon power this up in low light conditions. Daylight photography is good as the low light photography and thanks to the bright Xenon flash from near to medium distance objects come our just fine but not too distant.
Nokia N8 (Rs 28,000)
Nokia's flagship multimedia cellphone is a result of Nokia's years of research and development. Everything right from the built quality to the performance of this phone is without any doubts excellent.
The on-board 12 megapixel camera outperforms any other 12 megapixel camera phone but the Xenon flash feels a little underpowered. With its face detection and advanced camera features like smile detection and image stabilisation, it makes up for everything.
The absence of a camera cover starts showing up after some days of use as dust and dirt starts to build up on and around the lens. But ultimately it is one of the best 12 megapixel cameras available as of today.
Spice S1200 (Rs 15,000)
The best part about this phone is not its 12 megapixel camera or the 3x optical zoom but is its price point. For Rs 15,000, this phone features what no other 12 megapixel camera offers.
Against all expectations Spice managed to keep things sleek and comfortable while keeping the overall weight close to all other contenders with 130 grams of total weight.
The camera offers decent quality in both bright light and low light conditions, and the inclusion of a Xenon flash help in lightening things up. Although some people might feel it a little tacky to use as compared to the other 12 megapixel camera phones but for the this price its a good deal.
READ MORE - Top 4 mobile phones with 12 megapixel camera

Airtel's 4G launch plans in Delhi, Mumbai

Competition commission has asked Qualcomm to file fresh application after Airtel bought 49 per cent stake in its broadband wireless venture.

Airtel's plans to launch 4G services in Delhi and Mumbai is in trouble as the Competition Commission of India has asked Qualcomm to apply afresh for merging its four broadband subsidiaries (a subsidiary each for 4 circles that it acquired spectrum for) into Qualcomm Asia Pacific.
Airtel has recently bought 49 per cent stake in the BWA venture of Qualcomm (after it had applied with competition commission) and that is the reason why the commission wants Qualcomm to submit fresh application again.
Qualcomm secured 4G spectrums of Delhi, Mumbai, Haryana and Kerala in the auctions held in 2010. Qualcomm's BWA venture has been trouble ever since it applied for it, first with the FIBP (foreign investment promotion board) clearance, then with DoT with regards to ISP license (Internet service provider), then it was denied the spectrum and now this new clearance hurdle from Competition commission.
4G launch plans in Delhi
The commission has told Qualcomm that since Airtel bought the stake in the venture after it had applied with the commission, and Airtel being already present as telecom operator it would be important for the commission to look into how it affects competition in the sector.
The Commission, in its order, said that in its current form, the combination of Airtel and Qualcomm is likely to give rise to adverse competitions and the directed the parties in question to apply with fresh details.
Qualcomm had approached the anti-monopoly watchdog for combination of its four subsidiaries. At the time of the application, Qualcomm had 74 per cent equity share capital of each of the four subsidiaries. The balance 26 per cent equity was owned by Tulip Telecom and Global Holding Corporation. On May 29, Bharti Airtel acquired 49 per cent stake in Qualcomm's 4G business in India for Rs 923 crore.
The US based chip maker will continue to hold 51 per cent till it exits India in the next two years. Bharti will take Qualcomm's Rs 4,000-crore debt on its books when it will acquire 100 per cent stake in the venture in 2014.
READ MORE - Airtel's 4G launch plans in Delhi, Mumbai

Mozilla Firefox Mobile WAP Browser – Coming soon for Mobile Phone Download

Mozilla firefox has launched Mobile version browser to download as beta for Nokia
When it’s about Mobile internet browsing Opera Mini is widely used as a wap browser worldwide. Now, there is a good news for Firefox Likers. Mozilla Firefox is working hard these days to come up with their Mobile browser version. As a beta version, it is currently available for Nokia N900.

Download Firefox for mobile:

Visit Firefox.com/m 

Download Firefox 1.1 beta:

Visit Firefox.com/m/beta on your Nokia N900

Features: Firefox, a well known browser, is preparing to unveil its version for mobiles. Jay Sullivan who was in charge of the project said that the mobile version underwent various tests and would be launched by the end of the year. He also added a user would not have to sit in the evening and work on their PC, instead he would be able to walk. In case he received some urgent documents that he had to read there would be no necessity to back home and check his e-mail, as his mobile would be equipped withFirefox mobile version.
READ MORE - Mozilla Firefox Mobile WAP Browser – Coming soon for Mobile Phone Download

How to disable the right click functionality on the desktop

Follow the given steps to disable the right click functionality on desktop:
To use this feature, you will need to be logged into your computer with administrative rights.
Click Start button and type regedit in Run option then press Enter for next.

Here locate the location to:
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer

Here in right side panel, right click to create a new DWORD value with the name NoViewContextMenu (it is case sensitive), then assign number 1 in value data box.

Now close the registry editor and restart your computer after any changes to go into effect.

But next time, if you want to enable right click functionality on desktop then simply change the value of data box or delete the NoViewContextMenu DWORD item.
READ MORE - How to disable the right click functionality on the desktop

Access Facebook.com Using IP Address

To open Facebook using an IP address has its advantages. Chances are that the administrator has blocked Facebook from the Windows host file. Following are the steps involved to open Facebook with an IP address:
1. Open the command prompt and type “Ping facebook.com”
Know the IP address of Facebook
2. You will see the IP address as shown in the above image. Just enter the IP address in the browser address bar and if you are lucky, Facebook may open.
Note: If you do not have administrative rights in the computer and you are unable to open command prompt for any reason, try to find the IP address of Facebook with this Online tool.
Online tool to know the IP address of facebook homepage
READ MORE - Access Facebook.com Using IP Address

Microsoft tackles iPad with Surface tablet


Microsoft has introduced its own line of tablets,The new tablet line, named Surface, includes a consumer device aimed directly at the Apple iPad. Both include a keyboard that doubles as a cover, and both will be powered by versions of the new Windows 8 operating system.It will be available for the Christmas shopping season. The lighter, thinner version of the Surface tabs, built on an Nvidia chipes designed by ARM Holdings, will be the first to the market at the same time as the general releases of Windows 8, and it will feature Microsoft's popular Office suite of applications. It is compartable to Apple's new iPad, heavier but slightly thinner. It has a 10.6 inch screen and comes in 32 GB and 64 GB memory sizes. and its betterry life is so good comparisons of other tablets.
READ MORE - Microsoft tackles iPad with Surface tablet

How to detect that a keylogger is installed on a computer or not

Key loggers are software that traces the key strokes on your computer. It is done in such a way that a person using the computer is unaware of the fact that a key logger is installed on a particular PC.

How does  keyloggers enters your computer ?

There are several ways in which a key logger can get into your computer either it is directly installed or it is indirectly transferred to your computer. Most of the time, this malicious file enters a computer when the user downloads an infected application like movies, music or other software applications.

So how to get rid of  keyloggers that is installed on a computer

1. Use updated antivirus and anti spyware
Some of the good anti viruses have capability to detect key loggers. So you should update your antiviruses regularly so that it gets updated for new keyloggers.


2. Use Anti keyloggers
There are anti keyloggers available that will make the task easy for you in finding a keyloggers. Use these softwares if you think there is a high possibility of keyloggers on a computer. The anti keyloggers that i will suggest you is Cyberhawk. Even  Kasperky does a good job in this area too. Also check anti-spy.info. More examples:

3. Search for keyloggers yourself
Keyloggers have the capability that they hide them self from the user but are active in the background. There are some shortcuts that are used to see them live on screen
For example : Ctrl + Alt + X or Ctrl + Alt + Wondows Key + X or desktopshark  etc.


4. Use special tools
KL-Detector
Freeware on demand keylogger scanner.
SnoopFree
Freeware antikeylogger that block hook based keyloggers as well as screen captures. For Windows XP.
PSMAntiKeyLogger
PSMAntiKeyLogger is a real-time protecting software which protects you against Keyloggers. No scanning is needed.
I Hate Keyloggers
Freeware antikeylogger that block hook based keyloggers. For Windows 2000 and XP.
READ MORE - How to detect that a keylogger is installed on a computer or not

Airtel Ucweb Handler Trick For Android Mobiles

 
Hello Friends!

Today I Posting A New Airtel Ucweb Handler Trick For Android Mobiles.This Is The First Android Handler Trick From Me.This Ucweb Handler Trick Is Working 100% In Gujarat.Try This Trick And Comment here...

♦ Download Ucweb 7.2 Handler.apk From Here

Then Make Settings

Proxy- 80.239.242.253

Port - 80

APN - airtelgprs.com

In Handler , Use "http" as Proxy And Put "fb.me" in Proxy Server.

Or

Use Default MO Settings , Select "Real Host" as Proxy Type And Put "fb.me" in Proxy Server.

You Can Also Use "live.airtelworld.com" or " 100.1.200.188" As Proxy Servers

and now you able to use free net
READ MORE - Airtel Ucweb Handler Trick For Android Mobiles

Avast Mobile Security-Android AntiVirus

Hey Guys,

Avast Mobile Security-The Best Anti-Virus For Android Mobiles.Avast Had An Awesome Option That Rejects The Calls From Blacklisted Mobile Numbers.It Automatically Reject Sms And Calls From Blacklisted Mobile Numbers.

Features Of Avast Mobile Security Android 2012:

1. SD Card Scanning And Application Scanning

2. Scheduled Scanning.

3. Automatic Deletion For Unknown Or Potentially Dangerous Objects And Files

4. Privacy Report.

5. SMS/CALL Filtering (Automatically Reject Calls From Blacklisted Mobile Numbers)

6. Application Manager For Android.

7. Web Protection With Web Shield.

8. Special Firewall For Android Mobiles.

Download Avast Mobile Security For Android Mobiles From Below Link



READ MORE - Avast Mobile Security-Android AntiVirus

Adobe Photoshop Touch App For Android, IPhone And IPad

The new Adobe Photoshop Touch app allows you to quickly combine images, apply professional effects, share the results with your friends and family via social networking sites like Facebook and more, all from the convenience of your smartphones. This is optimized version of Adobe Photoshop application with core Photoshop tools designed for tablet devices with touch control bringing the layers, gradients, and text with several different special effects. You can create layer and interacts with other layers with the help of built in camera feature from the tablet. Let's have a look at the feature of this app:




Adobe Photoshop Touch Features

  1. Use Photoshop features designed for the tablet such as layers, selection tools, adjustments, gradients, and filters to create mind-blowing images.
  2. Use camera to create and fill layers.
  3. Select area of an image to extract by scribbling with the Scribble Selection feature. With Refine Edge, use your fingertip to capture even hard-to-select image elements, like hair, with ease.
  4. Google Image Search integrated for search and acquire images
  5. Share images with your friends on Facebook and view comments right within the app.
  6. Explore an inspirational gallery for the styles and results you would like to achieve. Then follow step-by-step tutorials to learn techniques the pros use for great-looking results.
  7. Sync projects with Adobe Creative Cloud and open layered files from Adobe Photoshop Touch in Photoshop.
  8. Image resolution: 1600 x 1600 pixels

Adobe Photoshop Touch Screenshots


 




 


Adobe Photoshop Touch Video




Download Adobe Photoshop Touch App



Android iPhone iPad
READ MORE - Adobe Photoshop Touch App For Android, IPhone And IPad

How to disable/enable USB Port in Windows 7 ?


Hello All my Friends , I hope you Are visiting  my Website Daily For New  Tips , many people ask how to How To Disable / Enable Access Of USB Port  in school ,clg, sybercafe etc.   so Today I am showing  here how to How To Disable / Enable Access Of USB Port.  Just Fallow Simple  Steps And got Disable / Enable Access Of USB Port.

1)   windows Key

 
2) Type regedit  and press enter 


3) It will open the Registry Editor " click yes "

4) Find This HKEY_LOCAL_MACHINE 



5) Double Click on Defult Button 
After opening Registry edit browse the following path in reght side bar of registry editor
The Path to go: “HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesUSBSTOR”
Step4: Then right click the registry “Start” which is rectangled in red color in the below screenshot of registry editor



6) then Right Click “Start” and Click modify
  • if u want To enable USB ports: change the value from “4? to “3?
  • if u want To disable USB ports: change the Value for “3? to “4?
READ MORE - How to disable/enable USB Port in Windows 7 ?

Create a New Partition on a Windows 7 Hard Disk

The Windows 7 Disk Management tool provides a simple interface for managing partitions and volumes.

Here’s an easy way to create a new partition on your disk.


  1. Open the Disk Management console by typing diskmgmt.msc at an elevated command prompt.

    partition1.jpg

  2. In Disk Management’s Graphical view, right-click an unallocated or free area, and then click New Simple Volume. This starts the New Simple Volume Wizard. (Note: If you need to create unallocated space, see the Tip Easily Shrink a Volume on a Windows 7 Disk for information on how to do this.)

    partition2.jpg

  3. Read the Welcome page and then click Next.
  4. The Specify Volume Size page specifies the minimum and maximum size for the volume in megabytes and lets you size the volume within these limits. Size the partition in megabytes using the Simple Volume Size field and then click Next.

    partition4.jpg

  5. On the Assign Drive Letter Or Path page, specify whether you want to assign a drive letter or path and then click Next. The available options are as follows:

    partition5.jpg


    Assign The Following Drive Letter
    Select an available drive letter in the selection list provided. By default, Windows 7 selects the lowest available drive letter and excludes reserved drive letters as well as those assigned to local disks or network drives.
    Mount In The Following Empty NTFS Folder
    Choose this option to mount the partition in an empty NTFS folder. You must then type the path to an existing folder or click Browse to search for or create a folder to use.
    Do Not Assign A Drive Letter Or Drive Path
    Choose this option if you want to create the partition without assigning a drive letter or path. Later, if you want the partition to be available for storage, you can assign a drive letter or path at that time.
  6. Use the Format Partition page to determine whether and how the volume should be formatted. If you want to format the volume, choose Format This Volume With The Following Settings, and then configure the following options:

    partition6.jpg


    File System
    Sets the file system type as FAT, FAT32, or NTFS. NTFS is selected by default in most cases. If you create a file system as FAT or FAT32, you can later convert it to NTFS by using the Convert utility. You can’t, however, convert NTFS partitions to FAT or FAT32.
    Allocation Unit Size
    Sets the cluster size for the file system. This is the basic unit in which disk space is allocated. The default allocation unit size is based on the size of the volume and, by default, is set dynamically prior to formatting. To override this feature, you can set the allocation unit size to a specific value. If you use many small files, you might want to use a smaller cluster size, such as 512 or 1,024 bytes. With these settings, small files use less disk space.
    Volume Label
    Sets a text label for the partition. This label is the partition’s volume name and by default is set to New Volume. You can change the volume label at any time by right-clicking the volume in Windows Explorer, choosing Properties, and typing a new value in the Label field provided on the General tab.
    Perform A Quick Format
    Tells Windows 7 to format without checking the partition for errors. With large partitions, this option can save you a few minutes. However, it’s usually better to check for errors, which enables Disk Management to mark bad sectors on the disk and lock them out.
    Enable File And Folder Compression
    Turns on compression for the disk. Built-in compression is available only for NTFS. Under NTFS, compression is transparent to users and compressed files can be accessed just like regular files. If you select this option, files and directories on this drive are compressed automatically.
  7. Click Next, confirm your options, and then click Finish.

    partition7.jpg
The Windows 7 Disk Management tool will now show the space configured as a new partition.



partition8.jpg
READ MORE - Create a New Partition on a Windows 7 Hard Disk

How to run Turbo C++ in Windows 7 in full Screen

  1. Create a new folder in your C:  and rename it to ‘turbo’ [or anyone you feel like]. Reason for doing it will be mentioned as you read.
  2. Now, run the installed setup file [TC3setup.exe] and give the extraction position as
  3. Now, download the DosBox setup from here
  4. Install DosBox in your system.
  5. Now run DosBox. A command prompt type window will appear. Now note that there is a difference between the command prompt our system is equipped with and this version of command prompt. This emulator is 32-bit in contrary to native 16-bit prompt, therefore, allowing you to run it in full screen mode.
  6. In this window, we now need to mount the folder via this command:   This tells about the reason behind creating another directory while extracting TC3setup.exe. Mounting works relative to a folder, here Turbo.
  7. Work is almost done. Now, type “C:” to mount above mounted drive.
    To list the content of this mounted space, type ‘dir’
  8. Type
    >cd tc
    >cd bin
    to reach within subdirectories for tc.exe
    Now type tc and press Enter.
    Press Alt + Enter to go in Full Screen Mode.
This task may look all so tedious. But, everything can be automated in a single go.
Once you have successfully managed to run it in full screen mode, you can easily automate the process by editing configuration file. You can drop comments below in case of any problem to get through.
To run TC automatically on running DosBox:
Search for “DosBox” in start menu.
Nowclick onDosBox 0.74 Options
A configuration file in Notepad will be opened.
Go till the end of the document and add following lines there:
mount c c:\turbo
c:
cd tc/bin
tc
Save this file and exit from notepad.
Run DosBox again. Voilla! It will take you straight to TuboC++.








READ MORE - How to run Turbo C++ in Windows 7 in full Screen