Tuesday, 24 December 2013

// // Leave a Comment

Apple has 'big plans' for 2014, says CEO Tim Cook

NEW YORK: Apple enthusiasts across the globe are in for a treat as the iconic creator of iPhone smartphone and iPad tablet has "big plans" lined up for the next year.

"We have a lot to look forward to in 2014, including some big plans that we think customers are going to love," Apple CEO Tim Cook said in a letter to its employees.

Extending greetings for the Christmas and the New Year, Cook said, "This holiday season, tens of millions of people around the world, from all walks of life, are experiencing Apple products for the first time."

He expressed "pride" on the stellar performance by the California-headquartered firm in 2013.

"We introduced industry-leading products in each of our major categories in 2013, showing the breadth and depth of innovation at Apple," he said.

See More
Read More

Thursday, 19 December 2013

// // Leave a Comment

If your Pen Drive is infected with any of the following viruses:

* Autorun.inf
* new folder.exe
* Iexplorer.vbs
* Bha.vbs
* nfo.exe
* New_Folder.exe
* ravmon.exe
* RVHost.exe or any other files with extension.
Actually this viruses are hidden and can't be seen even after
you enable show hidden folders.
Following simple dos command will change the attributes of
these files ,there after you can remove it by pressing delete
key.
Follow these steps:
Step1.:Type cmd in Run
Step2.: Switch to the drive on which pen drive is connected
(like C:\> h: enter)
Step3.: type exactly as attrib -s -h *.* /s /d and hit enter
(don't forget spaces).
Now you can see hidden virus files and you can delete them.
Done NjOy.....!!!
Read More
// // Leave a Comment

Facebook launches 'dislike' button for Messenger

WASHINGTON: Facebook has updated its Messenger app that includes a 'dislike' button.

However, the 'dislike' option is only available on the desktop and mobile versions of Facebook Messenger, Fox News reports. The dislike button is not available for the newsfeed and cannot be used in statuses and other posts.

In order to access the new sticker pack, users will have to download it from the Sticker Store inside the Messenger app.
Read More

Wednesday, 18 December 2013

// // Leave a Comment

See, what was most searched on Google in 2013

SAN FRANCISCO: Death, devices and celebrity drove the quest for more information on Google's search engine this year.

Three of the world's four fastest-rising search requests on Google were triggered by the deaths of famous men.

Former South African President Nelson Mandela, who died earlier this month, occupied the top spot, followed by "Fast & Furious" movie star Paul Walker, who died in a November 30 car crash. "Glee" TV series cast member Cory Monteith, who died of a drug overdose in July, ranked fourth in an annual retrospective
 See More                
 
                                          
 
Read More

Monday, 16 December 2013

// // Leave a Comment

Komli Media: The Digital Ad-tech firm that wants to take on Google and Facebook

In just under a month, Amar Goel experienced the thrills and spills of being an entrepreneur. This October, the co-founder and chairman of Komli Media, a digital advertising solutions provider, closed the latest round of funding for his sevenyear-old firm—nearly $100 million (about RS 600 crore) in total—only to discover a few weeks later that Prashant Mehta, the company's chief executive of five years, had resigned.

For a company tracking to be a $100 million entity by December 2014 and turn profitable this month, this was an unexpected and unpleasant surprise. And, for Goel, a former Microsoft employee in New York, it meant taking on extra executive responsibilities—by retaking the reins of Komli, to go with another startup he was focusing on. And pressure: to grow faster and turn profitable, to take on the likes of Google and InMobi, to justify the $100 million bet that private capital has taken on it and to make its six overseas acquisitions sweat.

Big Technology Break

Goel, along with Akshay Garg, started Komli in 2006, when digital advertising was in its infancy—a $25-50 million opportunity in India—with just the slightest hint of interest from marketers.

See More
Read More

Saturday, 14 December 2013

// // Leave a Comment

Balance Transfer Trick for All Indian Mobile Operators 100% Working-

This trick working on almost all the networks like – BSNL, Airtel, Idea, Tata Docomo, Vodafone, Aircel, Reliance, Uninor. If you are already using this service provider well and good, if not, to enjoy this you may have to port to these networks.

1) Balance Transfer for BSNL
If you are using BSNL , then balance transfer is most simple for you .All you have to need is send a message. Follow these following steps –
BSNL also utilises SMS to provide balance transfer service. To use this service, you need to type SMS in this format: Gift < SPACE > < Receiver’s Number > < SPACE >< Amount > and send it to either 53733 or 53738. For example, Gift 9876543210 50. 9876543210 is receiver’s number and 50 is transfer amount.e done with it.
Limitations -You can transfer amount from Rs.5 to Rs.50 only. The receiver should be active from atleast for 30 days and sender should be active for atleast 3 months .

2) Balance Transfer for Airtel
To transfer balance for your Airtel operator, follow the steps –
Just Dial USSD code *141#
A window will appear where you can see many option.
Select first option i.e Share Talk Time .
Just type mobile number ( receiver’s no ).
Limitations - You can transfer Rs. 5 to Rs. 30 only. And after you have done with the transfer , you should have at least Rs. 10 balance . You can do this 5 times a day. 


See More
Read More
// // Leave a Comment

Smartphones’ future: Bendable screens, Iron Man tech

   SAN FRANCISCO: This may be remembered as the year smartphones became boring.    Although high-definition displays on smartphones have gotten bigger and their cameras have gotten better, the pace of gee-whiz innovation has dawdled.    

Smartphone and software makers are working on ways to snap out of this technological lull, although it probably will be at least another year or two before breakthroughs revolutionize the design and function of mobile computing devices.

In a foreshadowing of things to come, LG Electronics is boasting about the G Flex, a new phone with a curved display. Previously available in Korea and Singapore, the concave device arrived in Hong Kong on Friday.

"We want to claim this as the future of smart devices," Ramchan Woo, the head of LG's mobile product planning division, said during a recent demonstration in San Francisco.

If such visions are realized, smartphones and tablets will be equipped with display screens that can be rolled up like a scroll or folded like a wallet.

The G Flex provides a peek at the shape of things to come. Despite its name, the G Flex isn't pliable. The device is slightly bowed from top to bottom, allowing it to curve toward a person's mouth when used for phone calls. It also has a curved battery, something LG says is a first for smartphones. LG applied a "self-healing" protective coat on the G Flex to automatically repair any minor scratches.

More than anything, the G Flex is meant to begin the smartphone's evolution from the primitive state of flat screens. In theory, the curved-screen technology will lead to bendable screens, which will then pave the way to foldable screens. If that progression plays out, it would be possible to fold a larger smartphone so it can easily fit into a pocket.
See More    
Read More

Tuesday, 10 December 2013

// // Leave a Comment

Aim In Hackers:

Aim In Life:

1. Learn Hacking(✔)
2. Start Hacking (✔)
3. Stop Hacking (✔)
4. Teach Hacking (✔)
5. Help People (✔)
6. Write E-Books (✔)
7. Finish Education (✘)
8. Graduate From College (✘)
9. Get a Job (✔)
10. Find a Girlfriend (✔ / ✘ )
Read More

Saturday, 7 December 2013

// // Leave a Comment

How to Protect Your Facebook Account from Rogue Applications

A rogue application is a Facebook application developed by someone with fraudulent or deceitful intentions. The application often doesn’t perform its stated objectives. They are designed to obtain account information of the user, and they can be used to spread spam, scams or other malware to friends of the infected account. Typical examples are:
  • Profile Viewer Apps
  • Apps that redirect to phishing links and forms
  • Apps that lead to malicious downloads
  • Apps that lead to survey scams
The best way to guard against rogue applications is to avoid any third-party Facebook applications entirely. If this approach is too extreme for you, there are some steps you can take to help protect your account.
1. Be very selective in the applications you install. Stick with applications from well known developers and software companies. If you are tempted to install a more obscure application, then research it thoroughly before doing so.
2. Double check the permissions you have granted to Facebook applications currently installed. You can access this list either by the privacy settings or account settings. Click the padlock or the gears icon located in the top right corner of your Facebook page, or use this link to be taken straight there. If you navigate  to the page manually, you’ll want to look for the Apps icon in the left column.
app_settingsHere, you can click the Edit link to review the permissions of any apps you have installed or simply click the ‘x’ to remove them.
edit_app
Here you can see what Facebook data the application has access to, the last time it accessed your data, and you can set privacy settings for the application in question. Notice there is also a “Remove app” link on this screen as well. If you find an app is too intrusive, then you can click this link to easily remove it from your account.
It is a good idea to check these settings from time to time. Application developers have been known to change required application permissions. Always be mindful of what data access a third party developer requests. Be especially suspicious of applications requesting the following:
  • Complete and total access to your Facebook account – An app requesting too many permissions is a big warning sign.
  • Access to Facebook Chat – You don’t want the app spamming malicious links via chat messages to your friends.
  • The right to manage your Pages or Events – It is a common ploy for scammers to create bogus pages and events to spread their messages virally across Facebook.
Keep this information in mind the next time you think about installing a Facebook application! One rogue application can impact a large number of innocent users, and you don’t want the infection traced back to you!
Read More

Friday, 6 December 2013

// // Leave a Comment

Must Read If You Truly want to become a true hacker :-


1) Never trust sites that ask
you for money in return of
Hacking Softwares or who
claim to Hack Email Id’s in
return of money. All such
things are Scam . Nothing Works.

"2) There is NO DIRECT
SOFTWARE to Hack Facebook ,
Google , Yahoo or any other
big website. All the softwares
that claim to do so are scam.
They are just meant to take your money and in worse
cases, those softwares have
trojans or keyloggers in them.
As a result your account gets
hacked trying to hack others.

3) NEVER EVER use the
keyloggers or trojans you find
as freeware on internet.
Hackers are not fools. They
compile keyloggers and
trojans almost with any such software and when you install
them , you are already hacked
before even trying to hack
others.

4) You are never going to be a
good hacker without the
knowledge of programming
and scripting languages. When
you are going to use only
ready made softwares and would depend on them for
hacking anything then your
functionality would be limited
upto the functionality of the
software. When you are not
going to use your brain , just doing the copy paste thing,
then how can you even think
of being a good hacker.

5) If you are a good Hacker,
you already become a good
programmer , a good script
writer , a good web developer
and an excellent security
expert. Well any good Hacker will/should have good
knowledge of various aspects
and programming languages.
to do XSS (Cross Site
Scripting ) , PHP INJECTION , SQL
INJECTION , PHISHING , FOOTPRINTING etc… you will
have to be good at
programing and scripting. And
when you know the Various
loop holes , vulnerabilities and
security tips, you already become a Computer Security
Expert. So Never Ever Under estimate
the term Hacker. A Hacker Is
Not a person who just hacks
email id’s or servers but a True
Hacker is a Computer Genius
who the knowledge of computers more than anyone.
Read More
// // Leave a Comment

Top 10 Computer Mouse Tips & TricksCOMPUTER, TIPS AND TRICKS

Top 10 Computer Mouse Tips & TricksCOMPUTER, TIPS AND TRICKS

Computer Mouse
We all use Mouse while sitting on Computer but most of us don't take Full Advantage of the Computer Mouse. But don't worry now there are some Computer Mouse Tips and Secrets given below that will help you Get the Full Potential of your Computer Mouse and Increase your Overall Productivity while on the Computer.


So here are those Top 10 Computer Mouse Tips :

1) Shift Key and Mouse Click.
Computer Mouse - Left Click
Many Text Editors and Programs allow us to Highlight All or Portions of Text using the Shift Key and the Mouse.
For an example and giving it a try, place the Cursor at the Beginning of a Paragraph, Hold down the Shift Key and Click at the End of the Paragraph to Highlight the Full Paragraph.

2) Take Full Advantage of the Scroll Wheel.
Computer Mouse - Scroll Click
We all know that the Mouse Wheel ( Scroll ) is used to Scroll Up and Down on a Page. However, this Wheel can also do Much more like :

&gt;&gt; The Mouse Wheel can also be used as a Button. Pressing down on the Wheel will act like a Third Mouse ButtonThis can be used to Open a Web Page in a New Tab. Simply Click the Wheel on any Link and the Web Page will be Opened in New Tab.
Computer Mouse - Ctrl plus Scroll
&gt;&gt; We can quickly Zoom In and Out on a Web Page, Word Document, Excel Spreadsheet, etc. by Holding down the Ctrl Key and Scrolling Up to Zoom In and Scrolling down to Zoom Out.

&gt;&gt; We can move Forward and Backwards while Browsing the Internet by simply Holding down the Shift Key and Scrolling Up and Down. Scrolling down goes Back and Scrolling Up goes Forward.

3) Select with Double and Triple Click.
Computer Mouse - Double Click
We can Select any Word by Double Clicking on that Word and if you want to Highlight the Whole Paragraph, click the Mouse Button Three times on any Text in the Paragraph.

4) Take Full Advantage of Right Click.
Computer Mouse - Right Click
If you Right Click on any File Drag it while holding the Right Button of Mouse, when you let go you will be given the Option to Move or Copy that File. This saves you the Extra Step of having to Right Click where you want to Paste the Item ( File ).

5) Ctrl Key and Mouse Click.

&gt;&gt; We can also Open a Web Page in New Tab, while in a Browser by Pressing and Holding Ctrl Key while Clicking on any Link.. 
Computer Mouse - Ctrl plus Click
&gt;&gt; While holding down the Ctrl key we can Left Click to Select Multiple Objects or Highlight Multiple Sections of Text.

6) Use Mouse Side Buttons.
Computer Mouse - Side Buttons
Many New Computer Mice have Buttons on the Side of the Mouse. These Buttons can be Programmed to do Anything ( all possible Navigation ), however by default the Left Thumb Button can be used to go Back in a Web Browser or Windows Explorer. This makes Browsing the Internet more Enjoyable since you do not need to move the Mouse Cursor to the Browser Back Arrow Icon in order to go back a Page.

7) Use the Windows " Snap To " Feature.
Computer Mouse - Snap To Feature
This Feature if enabled will Automatically move your Mouse to Buttons that appear in a Dialog Box.
For example, if you Delete a File or Close a Window you may get a Prompt asking you if you are sure you want to perform the Task. With the Snap To Feature Enabled, the Mouse Cursor Automatically moves to the Ok buttonso all you will have to do is Click the Mouse Button if you Agree. This saves you the time of having to move the Mouse Cursor over to the Ok Button and then Click Ok.

To Enable the " Snap To " Feature follow these simple Steps :
&gt;&gt; Open Control Panel  &gt;&gt;  Mouse Properties  &gt;&gt;  Pointer Options  &gt;&gt;  Check the " Snap To " Check Box.

For more Productivity, we would suggest you to Modify some more Options available in Mouse Settings Like :
&gt;&gt;  Increasing the Motion Speed of Mouse Pointer can also help Increase your Productivity while using the Mouse.

8) Manage the Open Window with the Mouse.
Computer Mouse - Maximize or Minimize Window
Double Click the Top of Title Bar of any Window to Maximize or Minimize a Window. You can also Double Click at the Top Left Corner of the Window to Close that Window instead of Clicking on Red Cross Button i.e. for Closing Window.

9) Move the Mouse with your Keyboard.
Computer Mouse - Use via Keyboard Number Pad
Instead of using the Mouse, we can also Enable Windows to use the Number Pad as a Mouse.

10) Customize the Mouse.
Computer Mouse - Customized
If you have New Mouse with more than Two Buttons, then Installing the Included Mouse Software will allow you to Customize the Mouse even more.
For Example, if you don't use the Side Buttons to Move Back and Forth in a Web Browser then you can Change it to something you do more often, such as Switching between Open Windows or Opening any of your Folder or File
Read More
// // Leave a Comment

To open blocked sites at your School, Office,

Open blocked websites: http://bit.ly/IRjwuM

100% working tricks and hacks to open blocked sites at your School, Office, College and at your work places.
Access Facebook, Twitter, G+, Torrent and almost all the blocked sites http://bit.ly/IRjwuM
Read More
// // Leave a Comment

Cyber experts uncover 2 million stolen passwords to websites including Facebook, Google, Twitter and Yahoo

BOSTON: Security experts have uncovered a trove of some 2 million stolen passwords to websites including Facebook, Google, Twitter and Yahoo from Internet users across the globe.

Researchers with Trustwave's SpiderLabs said they discovered the credentials while investigating a server in the Netherlands that cyber criminals use to control a massive network of compromised computers known as the "Pony botnet."

The company told Reuters on Wednesday that it has reported its findings to the largest of more than 90,000 websites and Internet service providers whose customers' credentials it had found on the server.

The data includes more than 326,000 Facebook Inc accounts, some 60,000 Google Inc accounts, more than 59,000 Yahoo Inc accounts and nearly 22,000 Twitter Inc

accounts, according to SpiderLabs. Victims' were from the United States, Germany, Singapore and Thailand, among other countries.

Representatives for Facebook and Twitter said the companies have reset the passwords of affected users. A Google spokeswoman declined comment. Yahoo representatives could not be reached.

SpiderLabs said it has contacted authorities in the Netherlands and asked them to take down the Pony botnet server.

See more
Read More

Wednesday, 4 December 2013

// // Leave a Comment

**Hack To Change Your IP Address**

**Hack To Change Your IP Address**
1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "cmd" and hit ok You should now be at an
MSDOS prompt screen.
4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places"
on your desktop.
7. Click on "properties You should now be on a screen
with something titled "Local Area Connection", or
something close to that, and, if you have a network
hooked up, all of your other networks.
8. Right click on "Local Area Connection" and click
"properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from
the list under the "General" tab
10. Click on "Use the following IP address" under the
"General" tab 11. Create an IP address (It doesn't matter
what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the
"Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again
You should now be back to the "Local Area Connection"
screen.
15. Right-click back on "Local Area Connection" and go to
properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif
18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address With a little practice,
you can easily get this process down to 15 seconds.



www.ipprotocol.in
Read More
// // Leave a Comment

How to Get Back the Start button in Windows 8

How to Get Back the Start button in Windows 8

Have you used Windows xp or Windows 7 and now you are Using Windows 8? if yes then very first thing you will miss in windows 8 is the Start button. for some good reason may be microsoft Decided to drop the idea of Start button in windows 8 like we had in earlier version. Many people kind of didn’t liked this change because they were addiced to the habbit of start button,
Get Back the Start button in Windows 8
Meanwhile there was a Recent upgrade to windows 8, ie windows 8.1 and the Start button is back. this article is  for windows 8 users who have not upgraded or can’t upgrade and wish to Get Back the Start button in Windows 8. So I have Come up with interesting Solution which I wish to share with you all which will help you to Get Back the Start button in Windows 8.

Steps to Get Back the Start button in Windows 8


I will Show you two Easy methods to Get Back the Start button in Windows 8.

1.Have a Windows Start Menu Toolbar:

Yes , you can have or create a start Menu on the toolbar, and this can be done by following below mentioned easy steps.
  • Firstly enable the Show hidden files option.
  • Now Create a New Folder, Now Copyand paste all Files, Docs, Setups or Programs that you Use Daily and Wish to have it within seconds in this new Folder.
  • Now  a right click on the Taskbar , Hover your mouse on Toolbar then select a new Toolbar from the Toolbar option.
And finally browse to the New Folder you Created and click select folder. With these above mentioned steps you will see a new start menu folder on the Right hand side of the task bar. this is not your start button like we had in windows 7 and xp but this is very close to it.

 2. Get Back the Start button in Windows 8 Using Softwares.

You can also have few more softwares or options by which start button or start menu can be installed with more features to be enjoyed, and without any defects/problems that you can face after the installation.
1.Classic shell : This is an outstanding free software that you can have to add up a start menu button to the Taskbar, and not only this but you are lucky enough to get a few more features that come with it.
2.ViStart 8 : This is another outstanding software which I personally recommend as I have personally tried it out in my Windows 8 PC and got a positive result from this with an amazing Start button on my taskbar which made it easy for me, and along with this I also got additional features which are cool like the ability to change the skin and much more.
3.Pokki : Up to now we have seen Couple softwares to Get Back the Start button in Windows 8 and trust me the best by far is Pokki, I can say that because many of my Friends are Using Pokki, they Never had any problem with it.
With this it Concludes my list of Softwares to Get Back the Start button in Windows 8, If you Know any other good quality Software then feel free to share with us in Comments.
Read More

Monday, 2 December 2013

// // Leave a Comment

Amazon unveils futuristic mini-drone delivery plan

WASHINGTON: Amazon CEO Jeff Bezos revealed Sunday that his company is looking to the future with plans to use "octocopter" mini-drones to fly small packages to consumers in just 30 minutes.

The US retail giant's ambitious project still requires additional safety testing and federal approval, but Bezos estimated that Amazon "Prime Air" would be up and running within four to five years.

A demo video posted on the company's website showed the tiny robotic devices picking up packages in small yellow buckets from Amazon's fulfillment centers and then whizzing through the air to deliver the items to customers just 30 minutes after they made their purchase on Amazon.com.

"I know this looks like science fiction. It's not," Bezos told CBS television's "60 Minutes" program.



CEO Jeff Bezos revealed that Amazon plans to use "octocopter" mini-drones to fly small packages to consumers in just 30 minutes.
Read More