Monday, 20 May 2013

HOW TO OPEN LOCK WITHOUT KEY

The most asked question on Google

So today I will teach you how to open lock without key
Well it is little complex but hope you will learn it

Understand how your lock works. The pin-and-tumbler lock consists of a cylinder that can rotate within its housing (see the illustrations below). When locked, the cylinder is kept in place by several pairs of pins. The top pin of each pair protrudes into both the cylinder and the housing, thus preventing the cylinder from turning. When the correct key is inserted, it pushes the pairs of pins up so that the top pins no longer enter the cylinder. When this happens, the cylinder can be turned and the lock will open.

Note the five pairs of pins. The yellow pins enter both the cylinder and the silver housing around it. The springs provide resistance to keep the pins in place.
When the key is inserted, the grooves and ridges on the key push the pins up to the correct heights so that all the yellow pins are completely out of the cylinder, thus allowing the cylinder to turn and the lock to open.

2
Purchase a pick and tension wrench. Each pick is specialized for a different problem. A tension wrench, or torque wrench, is the device you use to apply pressure to turn the lock cylinder. Professional-grade picks and tension wrenches can be purchased in sets (see picture), but many lock picking hobbyists make good quality sets of their own. See the Things You'll Need section below for information on how to make your own picks and tension wrenches.

3
Place the tension wrench into the lower portion of the keyhole.

4
Determine which way the cylinder must be turned to unlock the lock. If you commonly use the lock, you probably already know which way you turn the key to open the lock. If you don’t know, use the tension wrench to apply torque to the cylinder, first clockwise and then counterclockwise. The cylinder will only turn a fraction of an inch before it stops. Try to feel the firmness of the stop. If you turn the cylinder the wrong way, the stop should feel very firm and stiff. If you turn it the right way, there should be a bit more give.

Some locks, especially among padlocks, will open regardless of which way the cylinder is turned.
5
Apply light torque to the tension wrench in the correct direction, and hold. The required torque will vary from lock to lock and from pin to pin, so this may require some trial and error. Start gently, though.

6
Insert the pick into the upper part of the keyhole and feel the pins. With the pick in the keyhole, you should be able to press up and feel the individual pins with the tip of the pick. You should be able to push them up and feel them spring back down when you release the pressure. Try to push each one all the way up. Identify which one is the hardest to push up. If they're all very easy to push up, turn the tension wrench more to increase the torque. If one won’t go up at all, ease the torque until you can push it up. Alternatively, you may wish to “rake” the pins before this step (see Tips below).

7
Push the stubborn pin up until it “sets.” Press the stubborn pin with just enough pressure to overcome the downward pressure of the spring. Remember, the pin is actually a pair of pins. Your pick is pushing against the lower pin, which in turn pushes against the upper pin. Your goal is to push the upper pin completely out of the cylinder. Then, when you stop pushing, the lower pin will fall back down into the cylinder, but the torque on the cylinder will result in a misalignment of the hole in the cylinder with the hole in the housing, and the upper pin should then rest on the cylinder without falling back down. You should hear a faint click as the upper pin falls back down on top of the cylinder. You should also be able to push the lower pin up a little with no resistance from the spring—when this occurs you most likely have the upper pin “set.”

8
Continue applying torque and repeat the last two steps for each of the remaining pins. It is imperative that you maintain torque on the cylinder to prevent the set pins from dropping back down. You may need to make slight increases or decreases in torque for each pin.

9
Use the tension wrench to turn the cylinder and unlock the lock. Once all the pins are set, you should be able to turn the cylinder. Hopefully you have already ascertained the correct direction to turn it. If you have chosen the wrong direction, you will need to start over and reset all the pins.

So have you learned it
If not turn up the images
Video tutorial soon

**************HACKER MANISH********


View the original article here

3 REASON WHY THIS BLOG IS DIFFERENT THAN OTHERS

1. The first and finest thing
This blog provides you everything
Life hacks
Android hacks
Symbian hacks
Java hacks
Windows hacks
Advance hack

2. This blog provides you even ban information
For eg
Post like cctv hacks and many more

3. This blog provides you accurate data

Do share our blog on Facebook and spread it

And please share your reviews

And one more important thing

THIS BLOG KEEPS YOU UPDATED
AS WE UPDATE OUR BLOG DIALY

********-*HACKER MANISH**********


View the original article here

HOW TO EDIT EBOOK ON ANDROID PHONE

Yes it is possible by a Android application known as
ezPDF READER

THIS IS THE EBOOK READER WITH UNIQUE STYLE

JUST DOWNLOAD IT BELOW

http://www42.zippyshare.com/d/73114684/863085/ezPRMPv2.1.2.0.apk

*************HACKER MANISH******-*


View the original article here

How to COMPRESS 1GB Data into 10MB

How to COMPRESS 1GB Data into 10MB
It is an open source compression tool like zip and winrar but the compression rate is much better then any other compression tool. It uses AES-256encryption to encrypt archives . The disappointing thing with KGB Archiver is due to its high compression rate its minimum hardware requirements is high (Recommend processor with 1.5 GHz and 1GB RAM) and compression and decompression process is time consuming. encryption to encrypt archives . The disappointing thing with KGB Archiver is due to its high compression rate its minimum hardware requirements is high (Recommend processor with 1.5 GHz and 1GB RAM) and compression and decompression process is time consuming.Strength: Very high compression power with very accurate result and no loss of data.Weakness: -Due to high compression rate, the time requires to compress and decompress the file is high.Download Link- www.sourceforge.net/projects/kgbarchiver

View the original article here

hack facebook using firesheep

Public wifi access
winpcap(download) Firesheep(download) Follow the steps properly :

1. First of all download "Firesheep" from the above link and use the "openwith" option in the firefox browser.
2. Once you have installed firesheep on firefox web browser, Click on view at the top, then goto sidebar and click on Firesheep
3. Now click on the top left button "Start capturing" and it will start to capture the session cookies of people in your wifi network, This will show you the list of those people whose cookies are captured and have visited unsecured website known to firesheep, Double click on the photo and you will be logged in instantly
Remember Few Points
Install Wincap its Necessary else it won't capture data packets.
Make sure you are on Public Wifi with some active Facebook users :).
Run Mozila as Administrative if it does't work.

View the original article here

wifi hacking using cmd

Here are few commands that will help you in wifi /wireless hacking.

To know/acquire list of available Wireless Networks
Go to command prompt
Click Start, click Run, type cmd, and then click OK, to open a command prompt.

At the command prompt, type

netsh wlan show networks mode=bssid

How to Connects to a Wireless Network

netsh wlan connect name=mostofblog

Replace mostofblog with your own profile name (Available Network )

How to disconnect to a Wireless Network

netsh wlan disconnect

How to show available Wireless Network profiles your PC

netsh wlan show profile


How to Saves wlan profiles as XML files to the specified location

netsh wlan export profile name=mostofblog

How to Block a Wireless Connection

netsh wlan add filter permission=block ssid=netgear networktype=mostofblog

If you want to block this computer from accessing all wireless network use denyall option in the command.

netsh wlan add filter permission=denyall networktype=adhoc

How to show the blocked network

netsh wlan show blockednetworks


How to show the installed Wireless drivers


netsh wlan show drivers

SO Friends these are few commands that will help you in wifi hacking via windows operating System next time i will put some more interesting commands thank you enjoy :).


View the original article here

SEND FAKE SMS TO ANY OF NUMBER

Step 1:
First of all you need to sign up herehttp://smsglobal.com/signup/signup_page.php
step 2:

After signing in, you will receive your username and password on your phone.

Now login in your SMS global Account with your provided Username and Password.
After loging in, you will see the welcome screen, just click on Send SMS to Number 


Step 3:
Then remove the sender ID while sending to send a spoofed SMS after that enter the mobile number of both the victim and now you can send a spoofed SMS/send sms anynomously 

View the original article here

how to find admin panel of any website


so first of all Go to Google and search this words : www.websitename.com/robots.txt
Robots.txt is a text file which is add by admin on the site to tell search robots which pages that admin would like them not to visit while.
so as you can see above , there are many secret pages are hidden from search engines .like :administrator,images,templates,tmp etc ...
so by typing www.websitename.com/administrator you will find the admin panel of that site !
now,
let's see the 2nd way to find admin panel ,

so lets talk about cPanel , so cPanel is a graphical user interface to control the whole website.
to get into cpanel it's very Easy , just type www.websitename.com:2082
you can replace the port numbers after the ":"


Port 2082 Cpanel default port
Port 2083 Cpanel over SSL
Port 2086 Cpanel Webhost Manager (default)
Port 2087 Cpanel Webhost Manager (with https)
Port 2095 Cpanel Webmail
Port 2096 Cpanel secure webmail over SSL

okay, so now third way


Download the ADMIN FINDER tool from below link
here

View the original article here

increase internate browsing speed

By changing your DNS you can increase your internet browsing speed by optimally yes this is genuine truth.
So Lets Begin...

To do this First of all you have to do is download this small program
NAME BENCH

Fire it up and choose your settings. Keep the top two boxes checked. If you're concerned about network censorship, check the third box, check the last box.


Click Start Benchmark and wait while Namebench runs its tests. It should take several minutes. A browser tab should pop open when
Namebench is done and give you a list of DNS servers and how much faster they are than the one you're currently using, unless yours are already the fastest possible.

Now Just Change your DNS in Preferred DNS server in your Ipv4 settings ...use the best DNS and get maximum internet speed.

Namebench does not change your settings, but it's generally pretty easy to do it yourself. Check with the instructions you got from your ISP to set up your modem and/or router and just substitute the DNS addresses you received from Namebench for the addresses given by your ISP. It's best to do this with your router, as it will assign that DNS address for all the devices attached to it.

That's it! This can dramatically improve your browsing speed, and it's fairly easy to work through.


View the original article here

Download Swipe and Share App

Download Swipe and Share App No need to open & close bluetooth again & again.No Need of any kind data charge to transfer files over internet.No need of wifi anymore.

View the original article here

how to hack adsense

Firefox Browser Refcontrol Auto Refresh Script  Auto Clicker IP Hiding Software Web Page with High Paying Adsense Keywords IP Hider must be running. Open the web page with firebox and click on your adsense advertisement. Now change your IP Address from IP hider and delete your cookies then once gain click on your adsense advertisement. Click as much you want. After this run the addon refcontrol. Now it’s time to get some page impression open the adsense advertisement page  run Autoclicker and set above 1000 as clicks per second then press start and quickly click on the url of adsense advertisement page then wait a little. After sometimes go and check your adsense earning. Note: We do not take any responsibility. This article is for educational purpose only

View the original article here

how to hide text file behind any image


1) Create a new folder named test in any drive (say C: Drive)
2) In  the test folderCreate a text file in it named – hi.txt
3) Copy any default windows picture from my pictures say – desert.jpg in the test folder

Now the game begins.
Type anything you want to in the  Text file and make its font big so that its easily readable
1) Open command prompt
2) Open the test folder.
      You may use the following commands to do that
    2.1)   C:
    2.2)   cd test
3) Now use the following command
      COPY /B desert.jpg+hi.txt new.jpg
       ie… the syntax is
      Copy /B name of file in which you want to embedded the content+ name of file which you want to embedded name of new file
And that’s it. You are done.
Open the test folder and you will see a new image named new.jpg.
When you preview it you will see the normal image but now right click it and open the image with notepad. At the end of the file you can see the text that you wrote in the document.
Well this was just the beginning.
Now the more interesting use of it.
If you want to bind rar files to images. You can do that as well.
(You may put anything you want in the rar file)..

now u send this your target


View the original article here

how to get full version of any software


Just write the name of the software in the Google search box and then write FBR94

 then you download any one of them


View the original article here

use facebook in hacker's language

1. log in your facebook account
2. go to privacy setting

3. change language with1337

Sorry, I could not read the content fromt this page.

View the original article here

wordpress defacing

Wordpress Defacing without uploading Shell

usually after gaining admin acess on wordpress website we upload shell on website, its takes some extra time, even you can deface wordpress's index page without uploading shell !
Goto wordpress dashboard than theme editor and you'll see 2-3 thmes there like twenty ten and twenly eleven.
Look there for active Theme on That website and edit index.php of that theme. and you'll see your deface pages on website's home Page.



Bypassing Permission Denided for index.php in wordpress

sometimes after upload shell on wordpress website when you'll try to replace index.php's socurce code in public_html/ directory with you deface page, it will show error like permission denided, can't write in file etc, and sometimes permission change dones't work, then follow the same method whic is give above, change active theme's index.php file and home will chnage with your deface page.


View the original article here

HOW TO BLOCK OR UNBLOCK ANY SITE


Procedure to block an unblock internet sites
Go to Start and type RUN .
Type C:\WINDOWS\system32\drivers\etc
Open the file "HOSTS" in a notepad
Under "127.0.0.1 localhost" . Add IP Name
IP - IP of the site to be blocked
Name - Name of the site (see the pic below for example

Example
www.sifymall.com

To know ip of the sifymail.com goto cmd promt (window key +R)and type
ping www.sifymail.com

 
Get the ip and just use it on the "hosts" file as mentioned on the steps.

For window7 seven users you have to open the hosts file with administrative permissions (which can be easily achieve using right click on hosts file and choosing administrative permissions to open it )
and then follow that simple steps and yeh ..you have successfully block the site.

127.0.0.1 localhost
210.210.19.82 www.sifymall.com 

                                                      Now Sifymall is now unaccessable

View the original article here

stop unwanted photo tags in facebook

step 1: Go to your Facebook Privacy Settings

step 2: Simple go to “Privacy Settings > Timeline and Tagging > Review posts friends tag you in before they appear on your Timeline” and Set “On” This option.

step 3:Below mentioned screen shots will help you in enabling this feature:
Click on Edit settings of Timeline and Tagging Option

step 4: You will see an option “Review posts friends tag you in before they appear on your Timeline”, Now click on “Off” and set it to “On” to enable this feature for you.

Step 5:And Now Finally Enable this Feature.

After saving the changes if someone tag you on facebook then you will get Options to either Approve or Disapprove the posts. These posts will not visible on your Timeline until you manually approve them.I think for girls it would be very much helpful .


View the original article here

download hacking book

download hacking book
Attack Basics
Password Basics
Account Basics
Denial of Service Basics (DOS)
Logging Basics
Spyware
Port Scanning
Unix remote attack
SQL injection
Spoofing and Hijacking
Social Engineering
How to become hacker in 15 minutes
Making money as Hacker

View the original article here

how do i unlock window xp using SAM file

Windows XP’ password stored in Windows \ System32 \ Config under the SAM file
.Ok,the you may know how to do.

Step 1:Login to a Computer that has Windows XP system.

Step 2:Copy the SAM file to a floppy disk.

Step 3: Then turn to your locked pc and insert the floppy disk Reboot the PC and enter into MS-DOS.

Step 4:In dos,type : del c: windows\system32\config\sam ,then you will delete the SAM file.

Step 5: type : Copy a:\sam c:\ windows\system32\config,copy the other’s SAM file to your PC.


View the original article here

increase internal memory of android phone

    
       Requirements 
2) Clock work mod(cwm) Installed
Steps To Increase The Internal Memory
1) First of all make a backup of your sdcard.2) Now connect sdcard with your device & boot in recovery mode. (cwm recovery)3) Now use your volume key or menu keys to choose the “Advanced” option from there & select it.4) Now Select “Partition SD Card“.5)Now enter the ext size you want( like:128M, 256M, 512M, 1024M, 2048M or 4096M- depend on your sdcard size, if you have any problem ask in comment) 6) Now select  0M (zero)  as the Swap Size.7) Done , now it will take some time to format your sdcard & partition it.8) After its done, restart your cell9) Now intall the Link2sd.apk.
10)Now open the link2sd and a popup menu will appear.
(Check this picture for reference)11) Select the Ext2 partion & click Ok.13) Now open the link2sd again, & now you will be able to see all the apps installed in your device, so now tap on any of the app you want to move & select the option “Create Link”(Check this picture for reference)14) Now after clicking on Create Link , you will get another menu. 15)In that menu tick all the option then click Ok.

View the original article here

insert image in facebook chat

Just Go to your profile or any other profile or any official page you want to use as an emotion ot want to use the image in Facebook chat.See the url and copy the username or if there is no username specified then copy the profile id. For example http://www.facebook.com/mostofblog.                                                                               From this url you need to copy   mostofblog Just paste this in chat window within double brackets such as [[mostofblog]] and send it to your friend then the profile id associated with the username or profile id will show in chat box

View the original article here

How To Bypass Sony Xperia Z Lock Screen

How To Bypass Sony Xperia Z Lock Screen 1) Goto Your Lockscreen
2) Click on Emergency Call Option.
3) Dial *#*#7378423#*#*
4) Now you will be in service menu
5) Click on Service Tests
6) Scroll Down & Select NFC
7) Now Screen Will Loads up after Few Sec.
8) Click On the Home Button

View the original article here

10 Reasons Why PC Crash?


computer-crash“Fatal error: the system has become unstable or is busy,” it says. “Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications.” You have just been struck by the Blue Screen of Death. Anyone who uses Microsoft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these
settings is to press the F2 or delete button during the first few seconds of a boot-up.biosOnce inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's
display.
Microsoft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.
For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware
conflict is through the following route:
* Start-Settings-Control Panel-System-Device Manager.
Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice,
two devices may be using it.Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is
www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the
motherboard (be careful about opening your computer, as you may void the warranty).When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to
discharge any static electricity.To be fair to Microsoft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs
using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to
defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to
* Start-Programs-Accessories-System Tools-Disk DefragmenterThis will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimization. This
can be adjusted by going to
* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free
some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents
(not the folder) can free a lot of space.Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors.
Go to
* Start-Programs-Accessories-System Tools-ScanDiskOtherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.5 Fatal OE exceptions and VXD errorsFatal OE exception errors and VXD errors are often caused by video card problems.These can often be resolved easily by reducing the resolution of the video display. Go to
* Start-Settings-Control Panel-Display-SettingsHere you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most
desktops, high colour 16-bit depth is adequate.If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to
* Start-Settings-Control Panel-System-Device ManagerHere, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.Another useful way to resolve video problems is to go to
* Start-Settings-Control Panel-System-Performance-GraphicsHere you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to
graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).Look up your video card's manufacturer on the internet and search for the most recent drivers for it.Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error.
A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with
60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is
overworked.computer-ramOne way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable.Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of
them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold
connections, as they can be easily damaged.Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory
problems often linked to old Dos-based programmes.A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the
software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly.
This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from http://www.jv16.org/Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages
(Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to
disable the Level 2 (L2) cache if that doesn't work.Remember to restore all the BIOS settings back to their former settings following installation.virusOften the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to
* Start-Settings-Control Panel-Add/Remove ProgramsHere, look for the Start Up Disk tab. Virus protection requires constant vigilance.A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file.DAT files should be updated weekly from the website of your antivirus software manufacturer.
An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus
2000, made by Symantec ( http://www.symantec.com/).The action of sending a document to print creates a bigger file, often called a postscript file.Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a
considerable amount of CPU power. This will also slow down the computer's performance.If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes
printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer
for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you
may be able to carry on.With all the new construction going on around the country the steady supply of electricity has become disrupted. A power
surge or spike can crash a computer as easily as a power cut.If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean
power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power
cut.It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.overheating-laptopCentral processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may
start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from
www.computernerd.com or http://www.coolit.com/CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly,
but it should also be more stable.Author Image He is a Professional Blogger & an addicted Web Developer. He is just a techie who likes to share ideas with you. He has performed the roles of experienced Ethical Hacker, Cyber Security Expert, Penetration Tester. He has also served IT industry by taking care of Network Security , System Security. He Has Found his Deepest Passion To Be Around The World Of PHP, HTML, Oracle, Red Hat, CSS ,etc.know more..

View the original article here

UC Browser for PC Download Free


UC Browser for PC (free download) is the fastest and one of the leading Mobile Browser provided which is popularly known for its extra intensive technology which makes users’ Internet Browsing experience very better.Its an official announcement that Ucweb already crossed the mark of 3 Million downloads which is record breaking. Previously it was not available for Computer but now, people can easily Download UC Browser for PCBut, its sorry to say that this application is from unofficial source and not have been provided by Ucweb directly. Though the point to note is that, one can experience same interference as you use in Mobile screen.
Similar downloading and browsing speed is must. This UC Browser PC Version even supports flash support which was lacking in other previous versions.UC Browser PC Its noticeable that the official website provides UC Browser for most of the mobile operating systems i.e Java, Android, iPhone, Symbian, Windows Pocket, etc but the only verdict is that, same is not available for Computer OS like Windows and Mac.Recently, an group of developers from China has successfully developed UC Browser for Computer keeping the same technology as its used in mobile, and so the application we are going to provide here is also in Chinese language.As I described above also, you can easily get this application which is developed by individual people. In this article I’ll mention two methods, one is easy and the other is tough.UC Browser For ComputerMethod #1 needs you to download the software and enjoy the application while second one has bit complicated procedure, though I’ve detailed the both for betterment of readers.(Please Do Share this on Facebook and Google Plus)
There’s one software available for computer which is mainly used to run mobile (Java) applications on computer and same you can use. Follow step-by-step tutorial listed below :1. Download & Install JRE (JAVA)2. Then go for Kemulator and install it in your systemFirst you have to install JRE and Kemulator from above mentioned links, then you can easily fetch Java application and can use it onto your PC without any extra efforts.As this is unofficial app, its my responsibility to make you update with any tips or FAQ which can make your using experience very easy. Just go through below mentioned recommendations for better flexibility.1. Keep App in Folder : Because, when you will start the app, it will automatically create few system files.2. Wait for Few Seconds : When you start software for the first then please do wait for sometime, as it takes bit time to load.This software is derived form the mobile technology which has been used in Mobile version, so that users can enjoy and experience the same functions and specifications. As some people are fond of features I have described the same below :Supports Windows Operating System including Win XP & Win 7Highly Compressed Technology for better browsing experienceSuper fast Downloading SpeedNo installation process requiredKnown General User InterferenceSupport WAP sites on ComputerMakes Internet Browsing faster by 90%And many extra functions                                       This application comes with one cons i.e its available in Chinese Language only and not in English, so users may find it bit confusing to use. But T’m sure on researching and playing with, you will become familiar with this UC Browser for PC Version which works with your Windows OS as well as Laptop.So folks, this is the new and revolutionary step taken for delivering thrilling experience to users by getting UC Browser for Computer. I hope by now, you have already about new app and please do comment. I’ll try to respond your complements and problems as soon as possible. Also stay tuned for more updates.Author Image He is a Professional Blogger & an addicted Web Developer. He is just a techie who likes to share ideas with you. He has performed the roles of experienced Ethical Hacker, Cyber Security Expert, Penetration Tester. He has also served IT industry by taking care of Network Security , System Security. He Has Found his Deepest Passion To Be Around The World Of PHP, HTML, Oracle, Red Hat, CSS ,etc.know more..

View the original article here

Fitbit Aria Wi-Fi Smart Scale REVIEW

fitbit aria wifi smart scale review Fitbit Aria Wi Fi Smart Scale Review and GiveawayThe Fitbit Aria Wi-Fi Smart Scale retails at $129.95 and supports up to 8 users. The only competitor on the market is the $150 Withings WS50 Smart Body Analyzer, also supporting 8 users but with the added feature of monitoring air quality and temperature to ensure a good night’s sleep (assuming you place it in your bedroom, which is kind of weird to be honest).






For many, stepping on a scale on a regular basis is a pretty confrontational thing. Watching the needle soar past several digits is an unnerving experience that you want to keep as private as possible. So why in the world would Fitbit decide to make a product that encourages people to do it more often while posting their weight publicly online? Maybe that’s the rationale: If it’s not fear of public judgement that pushes you to reach your goal weight, what will?Perhaps I’m over-exaggerating this notion. There are a lot of other interesting take on the ability to weight yourself consistently and keeping track on the Web. For those who want to take more control of overall fitness, the Fitbit Aria might be a handy tool to help reach your goal weight.Billed as a Wi-Fi-enabled “smart scale,”  the Fitbit Aria works locally in your home’s wireless network to transmit data between your scale and an online account. At 4.5 pounds, this is no ordinary scale, nor is it easy to carry around. The idea is you set the Aria up once and leave it be in your bathroom or bedroom, any place that you will access on a daily basis to do your routine weight-in. The Aria is a fine piece of craftsmanship, which comes as no surprise since it was designed by NewDealDesign, the same company behind the Lytro camera. Available in black or white, the futuristic scale has an backlit LED display and a glass surface that feels delicate to step on. One should beware not to use the scale after showers as the surface can be slippery.According to Fitbit, this glass contains electrodes that shoot up one leg and down the other to help calculate your body mass index (BMI). Virtually undetectable, the sensors are built-in the four-leaf clover-like design outlined on the surface. For this reason, Fitbit advises against users with pacemakers or other internal medical device as the signals mere interfere with one another. It also advises against those who are or may be pregnant, which seems ironic considering you have the option of selecting “pregnant” when creating your online profile. Speaking of which…Upon unboxing the Fitbit Aria, you will note a sticker that prompts a visit to Fitbit.com/start to begin your setup. This will require you to download the Fitbit software before activating your scale (which comes complete with four AA batteries) and syncing it with your Wi-Fi network. The process is relatively painless, and took a few minutes to accomplish. While it is unclear what the Wi-Fi range is on the scale, it seems that it is as powerful as any mobile device you’d have functioning in your home.On your profile, you are asked for your current weight, height, and initials, along with what you want to name your scale. Setup is near complete when the software asks you to take that leap onto the scale and weight yourself. Once the numbers compute, the data is automatically transferred to your online account. Not only will you get your weight in digital numbers, down to the first decimal, Aria will also determine a BMI percentage. This is particularly helpful for those who may not seem heavy but are unfit due to excessive fat. I believe I might just fall into this case.As with all scales, smart or dumb, you should always place it on a flat, hard surface. I made the mistake of weighing myself on a carpet and the scale told me I was 1.5 pound lighter than my expected weight. This was immediately corrected during a second weighing on wood floor. The weighing process takes a bit longer than traditional scales as the Aria need to send those electrodes through your body to calculate BMI. After about 30 seconds, the scale tells me my weight, BMI percentage, and my initials to confirm the person weighed. The Aria is certainly not for the impatient.With your online account, you can access a line graph of your weight fluctuations. And yes, while this information can be rather public, you have the option of privatizing your account so no one ever has to peep those digits. You can also link your profile onto an iOS or Android app to keep this information on the go, though naturally more limited from sleep pattern entries, heart rate or glucose logs, to name a few.fitbit-aria-whiteAt $130, the Fitbit Aria is pretty expensive scale. For those who are obsessed about reaching their goal weight, however, the scale is a neat and informative tool that pushes you to continue confronting your actual weight and attempt to reach your goals. I know that each time I walk onto the scale, I keep wanting the online chart to show a decrease in BMI so I can actually be proud of weighing under 110 pounds. If you need some gamification to get your some competitive juices flowing, Fitbit also offers badges for each task accomplished, such as earning your goal weight.Those not looking to completely change their diet and fitness should probably think twice before purchasing the Fitbit Aria. It’s clearly not made for the average person who weighs himself just for curiosity’s sake; you can do that at the doctor’s office. The Fitbit Aria is designed for those serious about getting results and will keep weighing in until the numbers reach a satisfactory digit. Again, it’s also not made for those with pacemakers or recommended for pregnant women. If you can reasonably factor in how often you plan to use the scale to adjust your lifestyle choices, by all means, the Aria would be a fine accommodation to a better and fitter you.Author Image He is a Professional Blogger & an addicted Web Developer. He is just a techie who likes to share ideas with you. He has performed the roles of experienced Ethical Hacker, Cyber Security Expert, Penetration Tester. He has also served IT industry by taking care of Network Security , System Security. He Has Found his Deepest Passion To Be Around The World Of PHP, HTML, Oracle, Red Hat, CSS ,etc.know more..

View the original article here

MAKE YOUR COMPUTER TALK LIKE IRON MAN'S JARVIS

You Must have Watched The Movie "IRON MAN","The Avengers" and Tony Stark's Talking Computer "jarvis". Despite being busy, i saw the movie "iron" few months ago and since then I was thinking to make something like "Jarvis"

The project development on "human computer interface" and "Gestural interface" has already been started by my side, which are capable of having feature like voice recognition,gestural interfaces. Some of those projects have been partially developed and working in desired manner, but few features and modules are yet to implement and on their way of completion in very short span of time.
So lets come to the body of this article.The reason of writing this post for my readers is to share what I've achieved till yet in this journey of Artificial Intelligence. Here is one gift GIFT for my readers in the form of a PROJECT with the topic "how make your computer talk like Jarvis".
Jarvis is totally based on Artificial intelligence aka Artificial Brain. Eventually, we can't such a huge artificial brain by using these following steps because of the simplicity and efficiency of this project. But I can make you assure that after this you make your computer talk, and this will be your first interestingly step in the world of Artificial intelligence. And later, you can go in more deeper as soon as you'll come to know its depth.So Lets start with your first step in this world with this example :
Example 1 :
Give a Name to your Computer  Like "Jarvis" and when you'll say "Jarvis" it will reply "Hello sir" or "Hello Mr. (Your Name)".
 or
You : Who are you ??
Computer : I'm chitti The robo Speed, 1 terahertz, memory, one  zettabyte
(Just Like Rajnikanth's Moive "robot", (Enthiran) in Tamil.)

Example 2 :
YOU:  Good Morning Jarvis !
COMPUTER : Good Morning Mr. Stark ! how are you Today !

So, Little wondering how these things going to work out ? Here you can transform your wondering into reality. Follow these codes :

Example 1 : 
Jarvis
Hello Mr. STark

Example 2 :
Good Morning Jarvis
Good Morning Sir. how are you today

Further, more you can use these lines of codes for Shutting down Computer :


Nuke it
Restarting Windows


To make it more intresting and realastic you need a bit knwoledge of VB.NET
here is one example



Time
Give me the Time
What is the time
Tell me the time
What time is it

now i have ms exel work then..


  insert row above
  {ALT}jla


  insert row below
  {ALT}jle


  insert column before
  {ALT}jll


  insert column after
  {ALT}jlr


  merge cells
  {ALT}jlm


  split table
  {ALT}jlq


  delte row
  delte rows
  {ALT}jdr


  delete column
  delete columns
  {ALT}jdc


  ?show table properties
  {ALT}jdo


  ?show ?hide table gridlines
  {ALT}jltg

Track chnages in Music   next change  accept changeTo click  ?mouse click  
if you need codes of any command leave comment below, and i will try to give you source codes.How to Get Started  ??
Things you need -
A microphone or internal Microphone
windows 7 and windows speech macros, download it from hereinstall it then make Macros to start work Now open notepad and paste code in notepad Author Image He is a Professional Blogger & an addicted Web Developer. He is just a techie who likes to share ideas with you. He has performed the roles of experienced Ethical Hacker, Cyber Security Expert, Penetration Tester. He has also served IT industry by taking care of Network Security , System Security. He Has Found his Deepest Passion To Be Around The World Of PHP, HTML, Oracle, Red Hat, CSS ,etc.know more..

View the original article here

How to fix CSS errors, Troubleshooting CSS Problems

When validating the CSS of a website, you may get some unknown CSS errors that are most easy to fix if you’re a web designer or developer. But, if you’re a learner or novice css designer and developer, then seeking help online on fixing CSS bugs or errors will help you code better.

CSS Lint is a one stop solution to all CSS problems. It can tell you whether your CSS code is non problematic. CSS Lint is a tool to help point out problems with your CSS code. It does basic syntax checking as well as applying a set of rules to the code that look for problematic patterns or signs of inefficiency. The rules are all pluggable, so you can easily write your own or omit ones you don’t want.

Just paste your CSS code in the CSS lint text box and hit the Lint button. Before that you can set your own rules, you can define the system what you want to check in the css code such as adjointing classes, avoiding duplicate properties, too many web fonts and so on. So just pick few rules and hit the lint button.

When you hit the lint button, it will display all the errors and warning messages with the error code and message. You can view the list of errors where it has occured and rectify them. The error messages are displayed with line, col, description – so will be helpful for novice learners.

VISIT :: http://www.csslint.net/

Author Image He is a Professional Blogger & an addicted Web Developer. He is just a techie who likes to share ideas with you. He has performed the roles of experienced Ethical Hacker, Cyber Security Expert, Penetration Tester. He has also served IT industry by taking care of Network Security , System Security. He Has Found his Deepest Passion To Be Around The World Of PHP, HTML, Oracle, Red Hat, CSS ,etc.know more..

View the original article here

HOW TO GET MORE VICTIMS TO YOUR RAT


Maybe you saw some people get hundreds of victims every day They rely on the penetration of random And all their victims from popular forums and torrent Today I will explain to you the ways in which they use .

Sources of the victims :

Torrrent
Social networks & Forums
Sites publish the files like dvb-upload.com
Chat rooms

How to get victims : Create a fake software  Has become a widespread phenomenon in youtubeYou can experiment and you'll get thousands of victims But you first have to increase the number of Views I advise you to use vagex.com and Of course you you must to disable comment on your videoTorrent the best source of victim you can easily create your account in thepiratebay.com and create a torent using Any program that supports torrent just choose a software and inject or bind this software with your clean server and do not forget to add trackers  in your torrentThis video explain how to create a torrent :
from the forums you can get a lot of victims Some times I put private software and remember Do not put a download link But (Pm Me :D for mediafire link) To target members :) So this method is not in all forums you can put the link in the warez site There is no need not explain :)Some professional hackers Use other ways They scan  A large number of Random Ip To discover Exploit Will generally put a special topic in this type ... And finally offer you a program named  Spread Robot With this program you can spread your server in(Shareaza - Areas - eMule )The main interface of the program:and choose the path of your server and Make Warez File :Then the software will create a file in which each of these programs and share the files in (Shareaza - Areas - eMule ) Always select Icon Setup or Install the Server and pumb the files  Even up to 2mg  using hex workshopAuthor Image He is a Professional Blogger & an addicted Web Developer. He is just a techie who likes to share ideas with you. He has performed the roles of experienced Ethical Hacker, Cyber Security Expert, Penetration Tester. He has also served IT industry by taking care of Network Security , System Security. He Has Found his Deepest Passion To Be Around The World Of PHP, HTML, Oracle, Red Hat, CSS ,etc.know more..

View the original article here

5 BEST CREDIT CARD HACK SOFTWARE

1 *Awesome Credit Card Generator 

2 *CC Generator AT_T

3 *Credit Card Creator

4 *Credit Card No Gernerater

5 *Credit Card Verifier

 *****Download Link*****
-----------------------------------------------------------
http://www.mediafire.com/?24ehuq37s67zl8c
-----------------------------------------------------------


                                                                                            POSTED via SOURCE

Author Image He is a Professional Blogger & an addicted Web Developer. He is just a techie who likes to share ideas with you. He has performed the roles of experienced Ethical Hacker, Cyber Security Expert, Penetration Tester. He has also served IT industry by taking care of Network Security , System Security. He Has Found his Deepest Passion To Be Around The World Of PHP, HTML, Oracle, Red Hat, CSS ,etc.know more..

View the original article here

Google Nexus 10 Reviews


Google Nexus 10 Full Review                                                            

Google has recently come out with a number of intriguing products; including the Nexus 4, Nexus 7, Nexus 10, and multiple different Chromebooks. I’ve recently reviewed a Samsung Chromebook, and Jackson has taken a look at the Nexus 4 and Nexus 7.Naturally, we have to take a look at the Google Nexus 10 and see how it performs, how useful it is in real life scenarios, and whether it’s worth the price. The best part is, you’ll have the chance to win this incredible tablet for yourself! Read the review and giveaway details below.Today’s modern tablets have physical advantages that can potentially make them better than other personal computing devices. They’re slimmer, lighter, include touchscreen capabilities, and some have relatively large screen sizes. In other words, it’s possible that tablets may replace your laptop for everyday work — something that can’t be said for smartphones. Last year, Ryan put forth the idea of using an Android table to complement his desktop computer for work. A few months later, Angela wondered if her Windows RT tablet could replace her laptop. Unconvinced, Christian decided to test the idea out himself with an experiment: going tablet-only for a week, while trying to stay productive.The Nexus 10 is a flagship Android tablet from Google. It’s true that it competes with other heavyweights such as the Samsung Galaxy Tab 2 10.1 (ironically, both the Nexus 10 and Galaxy Tab 2 tablets are made by Samsung). The $349.99 Galaxy Tab 2 10.1 is slightly more competitive in terms of pricing but they only offer a 16 GB model, expandable to 48 GB with a microSD card. Other competitors include the ASUS Transformer Pad Infinity, and the Kindle Fire HD 8.9.google nexus 10 reviewUltimately, the Nexus 10 leads the Android tablet pack against its main rival, the infamousiPad from Apple.The Nexus 10 packs in a good amount of quality hardware that ensures smooth performance. The list includes:10.005-inch WQXGA screen at 2560 x 1600 resolution (300 ppi)Corning Gorilla Glass 2263.9 x 177.6 x 8.9mm603 grams32 GB of storage (16 GB option available; no microSD expansion)2GB of RAMDual-core A15 CPUQuad-core Mali T604 GPU5 MP back camera; 1.9 MP front camera9000 mAh batteryWiFi and Bluetooth (no built-in carrier connectivity — look at tethering instead)Dual-side NFCMicro USBMagnetic Pogo pin charging portMicro HDMI3.5 mm headphone jackThe tablet which we’re offering in this giveaway is the 32 GB variant, and sells from the Google Play Store at $499. You can also nab the 16 GB version for $399 instead. If this impressive list of specs doesn’t mean much to you just yet, I’ll be explaining it all below.The packaging was very elegant yet quite simple. The tablet and all related accessories were packaged within a minimal black box, and the box was held together by two sticker-style binders as well as a Nexus 10-branded cover that slides around the box.google nexus 10 reviewOnce opened, you’ll immediately find the tablet on the very top. Underneath the tablet, you’ll find the following:a USB cablea power supply without wall plug (to make the power supply internationally friendly)an appropriate wall plug for the power supply for your regionwarranty informationOtherwise, there’s nothing else in the box, and I wouldn’t expect anything else to be included either. Everything else is considered accessories that should be bought separately.After taking off the protective wrapping from the tablet, I can take my first good look at the device. It feels very good to hold in my hands as it includes a rubberized finish on the backside of the device. I’ve heard some people say that it makes the device feel a bit cheap, but I have to disagree — on the contrary, it definitely helps with my grip on the device. And I certainly don’t want to drop this $500 monster by accident.Otherwise, I like the general design of the tablet — the rounded corners are appealing and prevent it from poking through any bags that I might put it in, and the “Nexus” and “Samsung” branding is kept away from the front and imprinted on the back in the rubber finish.google nexus 10 reviewThe tablet feels really nice to use. When pressing a bit harder on any parts of the device, I don’t hear any creaking or notice any other signs of poor build quality. The weight distribution is also very nice, so it won’t feel awkward to hold the tablet in a number of different ways. Overall, I feel like it was built very sturdy, and with quality components. There are certainly plenty of other tablets where the build quality is far poorer.The Nexus 10 doesn’t include a whole lot of ports, but honestly it doesn’t really need to — besides maybe a few more microUSB ports. There’s a single microUSB port on the left side of the device to data connectivity and charging.google nexus 10 reviewAlong the bottom side of the Nexus 10, you’ll find a port to plug in a Pogo magnetic charging cable. The advantage of the Pogo cable is that it can easily come off if someone trips over it without taking the tablet with it, but charging speeds are only marginally faster compared to microUSB. There is no Pogo chaging cable included with the tablet and must be bought separately.google nexus 10 reviewOn the right side, you’ll find the micro HDMI port which you can use (with the appropriate cable) to connect to a monitor, TV, or projector. Android doesn’t offer any display settings for the HDMI connectivity, so it’ll simply mirror what’s shown on the tablet by default. Finally, at the top you’ll find the power button as well as the volume rocker.google nexus 10 reviewThe biggest selling point of the tablet is its large high resolution screen. And while it looks nice even when the device is off, you really get to appreciate the screen in all its glory once it’s turned on. I have to admit, the high pixel per inch (300 ppi) makes the screen absolutely stunning. Everything on the tablet looks crisp and clean, especially on user interface elements. Of course, when it comes to media you’ll need to have images and videos that has at least the same resolution if not more. Therefore, even YouTube videos in HD quality will not appear entirely crisp. However, the fact that the screen is of a good size makes that small detail less of an issue for the overall experience. The only thing that I have to note is that I noticed a warm color tint on the Nexus 10's screen. I have to admit that I’m a bit spoiled by my laptop’s 95% NTSC color gamut display, but it looks warmer even when compared to my Nexus 4. This doesn’t really change the experience, but it’s something I’ve discovered when comparing them.google nexus 10 reviewThe Nexus 10's battery life is also superb thanks to the 9000 mAh battery that it holds. Under relatively heavy use, the battery drops about 10-15% per hour, so you can easily expect the tablet to last 7 to 10 hours. Of course, if you’re out and about during the day, you won’t be using it the entire time, so the tablet should last you all day long for whatever you need to do.I think that the Nexus 10 is fantastic to use. In addition to its physical convenience, it’s quite responsive, and the touchscreen is accurate. Using it isn’t any different than using an Android smartphone — it’s simply a lot bigger. In fact, I only see two major differences. First, you can’t put a SIM card into the device to receive carrier-provided Internet, so you’ll need to be around WiFi whenever you want to use the Internet on it or look into tethering options. Also, some apps aren’t tablet optimized, so some may look strange as they’re made for the much smaller screens. An example would be the Facebook app on Android, where the top two bars are simply stretched across the screen, and all posts are stretched across the screen as well, with only pictures scaling to fill up all that space. This can be remedied however, as some apps (such as the Adobe Photoshop Touch apps) have tablet and phone versions, where you’ll only be able to install the respective app on the correct device. The Gmail app on the Nexus 10, for example, looks great and is incredible to use.Overall, is the Nexus 10 worth your money? It honestly depends on if you really need it. It’s an impressive device no matter how you look at it — easily one of the best Android tablets yet, in fact. However, I already have a Nexus 4 and powerful laptop. There aren’t any tasks that the Nexus 10 is capable of that I’m not already doing on my smartphone and laptop. I don’t do any artsy work where a touchscreen would be ideal, and taking notes is actually simplified with a physical keyboard. Yes, you can get a Bluetooth keyboard for the tablet, but I’d rather just use my laptop and save the money. Otherwise, the Nexus 10 is still a very convenient device to bring along for the entire day or to use for entertainment purposes.google nexus 10 reviewWhen determining whether the Nexus 10 is better than the iPad, you can’t just look at the specifications — you won’t find much difference. Instead, it’s really a matter of in which ecosystem you have the most data stored, or which ecosystem you prefer the most. If you are invested in the Apple ecosystem, then an iPad is better for you. If you are invested in Google’s ecosystem or are looking at getting started with smart devices, then the Nexus 10 is best.Author Image He is a Professional Blogger & an addicted Web Developer. He is just a techie who likes to share ideas with you. He has performed the roles of experienced Ethical Hacker, Cyber Security Expert, Penetration Tester. He has also served IT industry by taking care of Network Security , System Security. He Has Found his Deepest Passion To Be Around The World Of PHP, HTML, Oracle, Red Hat, CSS ,etc.know more..

View the original article here

WolframAlpha v1.3.0.4229002.apk Download



Requirement - Android 2.1+

Overview-
Remember the Star Trek computer? It's finally happening--with Wolfram|Alpha. Building on 25 years of development led by Stephen Wolfram, Wolfram|Alpha has rapidly become the world's definitive source for instant expert knowledge and computation.
Across thousands of domains--with more continually added--Wolfram|Alpha uses its vast collection of algorithms and data to compute answers and generate reports for you.
Parts of Wolfram|Alpha are used in the Apple Siri Assistant; this app gives you access to the full power of the 
Wolfram|Alpha computational knowledge engine. 

Domains covered by Wolfram|Alpha include::
MATHEMATICS
Elementary Math
Numbers
Plotting
Algebra
Matrices
Calculus
Geometry
Trigonometry
Discrete Math
Number Theory
Applied Math
Logic Functions
Definitions
STATISTICS & DATA ANALYSIS
Descriptive Statistics
Regression
Statistical Distributions
Probability
PHYSICS
Mechanics
Electricity & Magnetism
Optics
Thermodynamics
Relativity
Nuclear Physics
Quantum Physics
Particle Physics
Statistical Physics
Astrophysics
Physical Constants
CHEMISTRY
Elements
Compounds
Ions
Quantities
Solutions
Reactions
Chemical Thermodynamics
Protecting Groups
MATERIALS
Alloys
Minerals
Crystallography
Plastics
Woods
Bulk Materials
ENGINEERING
Acoustics
Aeronautics
Electric Circuits
Fluid Mechanics
Steam Tables
Psychrometrics
Refrigeration
Structures
ASTRONOMY
Star Charts
Astronomical Events
PLANETS
Moons
Minor Planets
Comets
Space Weather
Stars
Pulsars
Galaxies
Star Clusters
Nebulae
Astrophysics
EARTH SCIENCE
Geology
Geochronology
Geodesy
Earthquakes
Tide Data
Atmosphere
Climate
LIFE SCIENCES
Animals & Plants
Dinosaurs
DNA Sequence Lookup
SNPs
Proteins
Human, Mouse & Fruit Fly Genomes
Metabolic Pathways
COMPUTATIONAL SCIENCES
Cellular Automata
Substitution Systems
Turing Machines
Computational Complexity
Algebraic Codes
Fractals
Mathematica
Image Processing
UNITS & MEASURES
Conversions
Comparisons
Dimensional Analysis
Industrial Measures
Batteries
Bulk Materials
Paint
DATES & TIMES
Date Computations
Time Zones
Calendars
Holidays
Geological Time
WEATHER
Current & Historical Weather
Forecasts
Wind Chill
Hurricanes
Clouds
Climate
PLACES & GEOGRAPHY
Maps
Projections
Geodesy
Navigation
Distances
Geomagnetism
Geocoding
Countries
Cities
Elevation Data
Oceans
Lakes
Rivers
Islands
Mountains
PEOPLE & HISTORY
People
Genealogy
Names
Occupations
Political Leaders
Historical Events, Periods & Countries
Historical Numerals & Money
CULTURE & MEDIA
Books
Periodicals
Movies
Video Games
Fictional Characters
Mythology
Television Networks & Programs
Awards
MUSIC
Musical Notes
Intervals
Chords
Scales
Audio Waveforms
Instruments
Songs
WORDS & LINGUISTICS
Word Properties
Dictionary Lookup
Word Puzzles
Anagrams
Languages
Document Length
Morse Code
Soundex
Number Names
SPORTS & GAMES
Football
Baseball
Olympics
Stadiums
Lotteries
Card Games
COLORS
Color Names & Systems
Color Addition
Temperatures
Wavelengths
MONEY & FINANCE
Stock Data
Indices
Mutual Funds
Futures
Mortgages
Present Value
Currency Conversion
Tips
Bonds
Derivatives Valuation
Wages
Sales TAX
SOCIOECONOMIC DATA
Demographics
Countries
US States
US Counties
Cities
Economics
Agriculture
Energy
Salaries
Unemployment
Cost of Living
Health Care
Housing
Social Statistics
Crime
Military
Religion
HEALTH & MEDICINE
International Organizations
TRANSPORTATION
Airports
Airlines
Aircraft
Flight Data
Road Transport
Gasoline Prices
Bridges
Tunnels
Tides
TECHNOLOGICAL WORLD
Communications
Satellites
Space Probes
Photography
Barcodes
WEB & COMPUTER SYSTEMS
Website Data
IP Lookup
Notable Computers
DATA TRANSFER
Port Numbering
String Processing
Hashing
Unicode Lookup
Body Measurements 
Growth Charts
Exercise
Diseases
Mortality Data
Medical Test Data
Teeth
Vision
Drug Data
Hospitals
FOOD & NUTRITION
Foods
Dietary
References
EDUCATION
International Education
Universities
School Districts
Public Schools
Standardized Tests
ORGANIZATIONS
Companies
Hospitals
Foundations

******************
Google Play Store
Cost:- Rs.164.24
******************
D
ownload Full Version Here:-


File size:-2.1 mb

Author Image He is a Professional Blogger & an addicted Web Developer. He is just a techie who likes to share ideas with you. He has performed the roles of experienced Ethical Hacker, Cyber Security Expert, Penetration Tester. He has also served IT industry by taking care of Network Security , System Security. He Has Found his Deepest Passion To Be Around The World Of PHP, HTML, Oracle, Red Hat, CSS ,etc.know more..

View the original article here

Make FREE call to mobile from PC

Author Image He is a Professional Blogger & an addicted Web Developer. He is just a techie who likes to share ideas with you. He has performed the roles of experienced Ethical Hacker, Cyber Security Expert, Penetration Tester. He has also served IT industry by taking care of Network Security , System Security. He Has Found his Deepest Passion To Be Around The World Of PHP, HTML, Oracle, Red Hat, CSS ,etc.know more..

View the original article here

Rooting An Android Device


Rooting? Are you gonna plant trees? :) Let's face it, most of us don't know what is rooting, and what do we get from it. It can be easier to understand for someone who is a Linux user, but for others, it could be a big mystery. So here is my attempt to explain what I know.
When you buy a shiny new Android phone, you have many limitations imposed by the manufacturer. For example, you can install apps, uninstall them, make calls, send messages etc. But if you don't like a preinstalled application, can you remove it? The short answer is, "No". Can you change the system files? "No". And many things you cannot do with your phone. This is where rooting comes into action.

Did you ever used Windows? If yes, then you must have heard of the "Administrator" account. Having an Administrator account means you have more control over the system. Similarly, in Linux, the Administrator account is called "root", and so in Android. After all, Android is Linux, isn't it? Rooting can also be explained as a process which enables 'su'(Superuser) access to the underlying operating system.

When you root your phone, you gain the ultimate control over the phone. You can do anything you want. You can modify the system files, you can enhance the features and you can brick your phone too! Compare it to "Jailbreaking" on an iPhone.

Why I'm restricted?

              It is your phone, so why are you restricted so much? This is because of your safety. If you don't know what you are doing, you could make your phone unusable, and no one would be responsible for it.

Should I root my phone?

              Rooting is not that much hard, thanks to many hard working developers. Mostly, rooting doesn't involve breaking your bootloader and in most cases, can be easily undone. Keep in mind that rooting doesn't give ultimate power to all apps installed, you must confirm if you want to allow an app. This is done via an app called "Superuser".

              But should you really root your phone? If you are happy with your phone, no need to take the risk. Remember, rooting can void your warranty. If something goes wrong, you are on your own and no one will be responsible.

Also, rooting means, the apps you download can have access to the internal file system of the phone which can be dangerous if it is a malicious app.

How rooting works?

              Rooting includes exploiting a known vulnerability in the Operating System to gain root access, then it pushes the "su" binary and the "Superuser" app to the system, which then help in retaining the root.

Why to root?

Rooting can give you lots of advantages, the list being endless. Here are few of the examples you might be interested in,

Access and modify the internal file systemOptimize system for faster operationFree up space by removing preinstalled appsUse the phone as a Wi-Fi hotspot, in case your operator blocked itInstall new Kernel for a better experienceTry out new ROMs and updates even if your manufacturer has ceased itModify the visual appearance and theme of your phoneInstall a Recovery for easy backup and restore of the entire ROMRun many applications supported only on rooted And much more... Before rooting...

Before rooting your phone, you should keep few things in mind...
 Search for your specific phone model: Though it is Android, the different versions and manufacturer customization make the process of rooting different for different phones. If you follow incorrect procedures, the damage might be irreparable.
Follow trusted sources: Before attempting anything on your precious phone, see if it is already tested by other users. Read the comments and you can make sure if you want do do it or not. It is always advisable to search in well known sites such as ocen-developers.

 Learn how to revert the changes: First learn how to un-root. Rooting is reversible in most phones. So it is a good idea to know how to un-root in case you need to, for example take your phone to service center.
Have the battery fully charged: The rooting operation is very sensitive and you must have a fully charged phone before attempting to hack your phone. Otherwise something might go wrong if your phone turns off in the middle of the process.
Don't be Greedy: Often you may read methods to increase performance to max, which mostly include overclocking etc. Remember, it can damage the phone hardware and only you will be responsible for it.


Some Apps For Rooted PhonesSuperuser: It should be automatically installed when you rooted your phone. It manages the root permissions of different apps, grants or denies root permission etc.
Root Explorer: It lets you access and modify the internal file system of the OS.
Titanium Backup: It can backup your applications and their data.
App Manager: Another backup utility, have more features than free version of Titanium Backup.
SetCPU: It can be used to overclock your phone. Works only with supported kernels.
ROM Manager: It can manage installation of custom ROMs. Be warned though! It might be unsupported on some phones and brick them.
Barnacle Wifi Tether: If you are on a older Android version which don't have native tether capabilities, this will certainly come handy in sharing your phone's internet connection.
And Much More.....

Author Image He is a Professional Blogger & an addicted Web Developer. He is just a techie who likes to share ideas with you. He has performed the roles of experienced Ethical Hacker, Cyber Security Expert, Penetration Tester. He has also served IT industry by taking care of Network Security , System Security. He Has Found his Deepest Passion To Be Around The World Of PHP, HTML, Oracle, Red Hat, CSS ,etc.know more..

View the original article here