Your Library for the latest IT Security News, Alerts, Threats and Tips and Android Games
Recent Articles
Showing posts with label Tech. Show all posts
Showing posts with label Tech. Show all posts

Sunday 25 January 2015

Whatsapp 5 features that are not in the web browser

Sunday 25 January 2015 - 1 Comment




All of the web application was Whatsapp forward. This app has now arrived, but it has limitations. Look forward 5 features which are not in Whatsapp web app:

1. It does not support iPhone

Between the web browser on your smartphone for Whatsapp  and syncs message through your server. This service is currently not supported iPhone. Whatsapp said, because of Apple's platform Limitations iPhone users can not find this service. According to reports, the future will support it for the iPhone. But then peeping-looked in the phone will make do.

2. Internet connection is Required in the phone 

QR Code image after scanning Whatsapp pair your phone to the Web client, your browser will show a message. But if the phone was switched data, the browser will not work on this service. Ie, to run web browser must be connected to the phone all the time.

3. browsers other than Chrome

In addition to the web interface Whatsapp Google Chrome browser does not support any more. So if you have Firefox, Safari or Internet Explorer Use this service if you will not. This is the explanation for the chrome push Whatsapp better technology.

4. Users can not block

Has greatly increased the number of spam messages Whatsapp. The only way to avoid them is to block users. However, Whatsapp can not block users on the Web client.

5. You can not create group or leave

You can send a message to those who are part of groups and can receive. But you can not create a new group and can not leave the old group. Web client broadcasts a message can not be either.

Saturday 24 January 2015

By September 10, the flagship Windows Phone will come

Saturday 24 January 2015 - 1 Comment



Microsoft's new flagship device with Windows 10 is expected by September 2015.

Wednesday's report states that Windows Central, Product Marketing Director of Microsoft Mobile Devices Majid told Ifi flagship Lumia phones by the end of the summer, is expected to come to market. Between June and September, the device may come anytime.

However, in this regard, and no information in this report has been just. However, this time The other Lumia devices is set to be released Windows 10 update.

Friday 16 January 2015

Microsoft Corporation is Planning App Marketplace Upgrades for Windows 10

Friday 16 January 2015 - 0 Comments



Microsoft is making it easier for developers to monetize their apps when the highly anticipated Windows 10 operating system arrives in 2015, according to Todd Brix, general manager of Windows Apps and Store. The software giant is working to beef up Windows Store, Microsoft's take on app marketplaces like Apple's App Store and Google Play. Despite trailing them in app count and popularity, Windows Store did make some big gains in 2014, revealed Brix in a company blog post.

"We made good progress by both attracting over 30 percent more active users and by exceeding a 110 percent year-over-year increase in app downloads and gross sales," stated Brix. "In addition, the ecosystem has grown, with an 80 percent increase in registered developers and 60 percent increase in app selection year-over-year." Microsoft's mission in the new year is to keep this momentum going and help improve the Windows app ecosystem. - See more at:

"Providing a platform where developers can be successful remains our number one goal as we look to 2015," said Brix. Priorities include enabling app developers to target various device classes and regions, as well as "reducing the amount of time and effort it takes to move from ideas to installs."

To start, Microsoft will continue to pursue carrier billing—the ability to apply app purchases to cell phone bills—in emerging markets. Carrier billing has led to an eightfold increase in average transaction volume in high-growth markets. Currently, Windows Store carrier billing is available in 46 regions, including Argentina, Brazil, Chile, China, India and Vietnam.

"You will also see us work with carriers to more aggressively promote this purchase [option] to their subscriber base," Brix said. "Carrier billing rounds out a range of payment choices that includes credit cards, Alipay, PayPal and—new this year—app-gifting with digital gift cards (available in Canada, France, Germany, the U.K. and the U.S.) and Bitcoin (U.S. only)."

Microsoft also plans to help developers earn more money from in-app ads.
"We are increasing our focus on in-app advertising to help improve fill rates and grow developer revenue," stated Brix. "The recent release of Windows ad mediation for Windows Phone developers is one example, improving fill rates to over 95 percent and increasing revenue up to 200 percent."
Microsoft will continue to refine the Windows Store user interface to improve app discoverability, he added. Even novice coders can get in on the act.

"Windows App Studio Beta enabled those with great ideas but no development experience to bring their ideas to life," Brix said. "We will continue to enhance this toolset in 2015, integrating new capabilities like the recent addition of TouchDevelop."

Finally, the company plans to continue streamlining the complete Windows Store app publishing process, an effort the company kicked off in 2014 with the shift to Windows Dev Center lifetime registrations. "We have much more work to do to simplify and unify the experience and you can expect the evolution to continue over the coming months," said Brix.

Wednesday 14 January 2015

The charger will charge the smartphone in 2 minutes

Wednesday 14 January 2015 - 0 Comments



The extremely high speed of Israel Stordot a new company has developed a mobile phone charger, which can charge the smartphone batteries is just two minutes. Recently held in Las Vegas' Consumer Electronics Show on display in the batteries lasted a short period, but the beauty is that only about five hours after the two-minute run charge.

The company said in a statement that the battery is charged in the two minutes, twice a day, so there will be no difficulty in taking charge. The company also showed during a presentation in Tel Aviv being developed in the laboratory of Bio-Organic charger system, a smartphone can charge the battery in just 30 seconds.

According to the BBC, the company's chief executive officer, said Doron Maiersdorf that the charger, battery technology has been designed to develop anew. The battery in the Reaction normal battery are different from the Reactions specially designed and includes synthetic organic atom.

This Device Convert Your TV into Personal Computer!!




Intel is bringing you a full-Fledged dongle to your computer can be turned into TV. Intel compute stick Windows 8.1 or Linux in the name of the device comes pre-initialised.

The 4-inch quad-core Intel Atom processor in the device is long. The built-in wireless connectivity, on-board storage and micro SD card slot for additional storage facilities. Intel compute the stick will be launched this year.

Intel compute Stick storage and 2 GB to 32 GB of RAM in Windows 8.1 is Version. It costs about $ 149, the 9315 is priced at Rs. While it costs $ 89, or about Linux Version 5565 is priced at Rs. It has 8 GB of storage and 1 GB RAM.

Specifications stick compute:

CPU: Intel Atom Processor Z3735F
Pmic Dollar Cove AXP 288
Memory: 2 GB DDR3L
Storage: eMMC 16 GB / 32 GB / 64 GB
Expandable Storage: Micro SD card slot
Display: HDMI (Mail Connector)
WiFi: IEEE 802.11bgn
Bluetooth: Bluetooth 4.0 HD uART (Single WiFi / Bluetooth combo chip)
Antenna: 30mm x 6.5mm x 2 mm, U shaped dipole antenna
USB: USB2.0 Cut Type A x 1
Power Input: USB 2.0 Micro-B connector
Power Button: Yes
Adapter: 10W (5V / 2A)
LED indication: Power Status Indicator
OS: Windows (8.1, with Bing, 32-bit)
Accessories: 20 cm HDMI cable (optional)
Dimensions: 110.9mm x 38mm x 9.8 mm (with HDMI connector)

Saturday 3 January 2015

Xolo's Octa-core SoC of phone Available soon

Saturday 3 January 2015 - 0 Comments




Xolo's  new smartphone Play the Xolo Officially 8X-1020 soon to be launched. The company does not have it yet but Official Announcement on an e-commerce site is to get Rs 9,999. However, according to a Mumbai (India)-based retailer is available for Rs 9,700 in the phone market.

The phone has 5 inch 720p HD IPS LCD display, 1.4GHz Cortex A7 MT6592M SoC based Octa-core processor, Mali 450 GPU and 1 GB of RAM are Specifications. It has 8 GB internal memory which can be extended up to 32 GB via the MicroSD card slot. This phone runs on Android KitKat 4.4.2.

Play Jholo in 8X-1020 Dual Flash 8 megapixel rear camera and a 5 megapixel front camera Sony Exmor sensor. The battery is 2500 mAh.

Thursday 1 January 2015

50 Dos and Don’ts of Internet Security for the Year of 2015

Thursday 1 January 2015 - 0 Comments



This post is to say thank you to all the fans of Daily Blogg Tips with a recap of some of the most important dos and don’ts of Internet Security. Read on.


The first official post on our blog was live on October 19th, 2006. And since then, we have been diligently striving to keep you updated with the latest happenings in the computer security world. As we are just a couple of days away from welcoming yet another new year, we would like to thank all our fans, readers, and followers for their readership and contribution to this blog. And as a thank you note, we are recapping one of our most commented and read posts – The Dos and Don’ts of Internet Security. We hope that the following tips help enhance your digital experience for the coming year.

Dos and Don’ts of Internet Security


#1. While giving away personal or financial information on any website, check if its URL begins with ‘https’. Also look for the lock icon, which indicates that the connection is secure.

#2. Never shop online, make financial transactions or login into accounts over free, unsecured WiFi networks.

#3. Create long, unique, and hard to guess passwords. Never keep the same password for different online accounts.

#4. Enable Secure Browsing for your Facebook account.

#5. Keep your computer’s Firewall ON

#6. Avoid making your personal information public on social media sites and Internet in general.

#7. Avoid checking ‘Keep me logged in’ or ‘Remember me’ options on websites, especially on public computers.

#8. Use your primary email address to stay in touch with people you know or are acquainted with.

#9. Never use your official email address for social media sites.

#10. For social media sites, use an email address that you do not use for important communications.

#11. Tighten your privacy settings on Facebook so that only your friends are notified about your activity.

#12. Never use any of your personal information such as name, date of birth, address, etc., as your password.

#13. While you are online in a public setting such as a coffee shop, mall, airport, etc., watch your back to make sure no one’s snooping on you.

#14. Never trust emails asking for your personal or banking information. Be extra cautions against links or attachments in unknown or unwanted emails. Verify any such communication with the sender first.

#15. Do away with old accounts that you do not use anymore.

#16. Do not make your photos or videos public on social media sites. Keep them visible to friends you know, and your family.

#17. Never respond to pop up ads that may come up on your screen. Close such pop ups from the the task manager; press Alt+Ctrl+Delete.

#18. Before downloading any free software, research on the software and the website hosting it.

#19. Avoid visiting inappropriate websites or websites that you are not fully aware of.

#20. Beware of files with multiple extensions.

#21. Always log out of online accounts when you are done. This is especially important when you are using a public computer.

#22. Do not click or share posts on Facebook that claim to show any unusual content such as shocking videos or magical illusions. Verify such news from other sources.

#23. Access your bank’s website by manually typing its URL in the address bar.

#24. Do not click any links in emails to access your bank’s website.

#25. Keep your software and operating system up-to-date.

#26. Do not install software that comes as an attachment in emails.

#27. Always shop from reputed and know online stores.

#28. Update the Internet browsers and software on your computer.

#29. Use up-to-date security software that offers multilayered protection.

#30. Increase your awareness of cyber security and share the same with friends and family.

#31. Avoid online shopping on public computers or networks.

#32. If you are buying from an online website for the first time, do a little research about the site and go through its privacy policies.

#33. Change your Internet banking passwords at periodical intervals and never share them with anyone.

#34. Avoid saving your credit/debit card information on websites and web browsers.

#35. Never share your financial details on phone or email, even if the caller/sender seems genuine. Remember, people in cyberspace are not always what they seem to be.

#36. Avoid downloading software from unverified publishers.

#37. Always lock your computer when not in use. Do not leave it unattended, especially in public places.

#38. Keep passwords that have a mix of uppercase and lowercase letters, numbers, special characters, and are at least 8 characters long.

#39. Avoid public networks for accessing websites that require you to sign in to access any information.

#40. If you store any critical information such as social security number, credit card number, bank account details, passwords, etc., in external storage devices, ensure that the data is encrypted.

#41. Accept friend requests only from people you know and have met with in person.

#42. Treat an online stranger in the same way as you would treat a stranger in the real world.

#43. If you suspect that a message from a friend is fraudulent or strange, call or meet the friend to discuss it.

#44. Protect your device with a screen lock. Turn the automatic screen lock function ON.

#45. Don’t root or jailbreak your device. It will make your device vulnerable to attackers.

#46. Install apps only from trusted and official sources.

#47. Turn OFF Wi-Fi, Location Services and Bluetooth when not in use.

#48. Avoid sending or saving personal & overly sensitive information on your mobile device.

#49. Avoid mobile apps that ask for unnecessary permissions.

#50. Install a mobile security app with features such as Anti-malware, Anti-theft, Call & SMS filter, Privacy Protection and Remote Device Management.

And that would be all for the top 50 dos and don’ts of Internet security that will protect you from online threats and hackers this year and the years to come. Have A Happy and Splendid New Year 2015!

Hacker fakes German minister’s fingerprints from HD photos




Security analysts have always believed that fingerprints are a foolproof replacement for passwords and authentication protocols. However, a new development in this matter has literally toppled this theory and altered the game. When fingerprints are used as an authentication protocol, the single biggest concern is what to do if the fingerprint in question gets copied. This is exactly what has been demonstrated by a German hacker at a recent technology convention.
Jan Krissler, a hacker also known as Starbug, recently showcased some rather interesting news at the Chaos Communication Congress (CCC) in Germany. Interestingly, the CCC happens to be Europe’s largest association of hackers so it’s no surprise that this was the location for such a noteworthy revelation. Revealingly, Starbug demonstrated his technique for stealing fingerprints by simply analyzing a few High-Definition pictures of his target, in this case – German Minister of Defence, Ursula von der Leyen.

According to Krissler, faking these fingerprints was far easier than he thought possible. All he needed were a few close-range photos of his target in order to reverse engineer the fingerprints. He gained these photos from several press releases issued by the minister’s office and another that he took himself from a few meters away. With the help of commercially available software called VeriFinger he was then able to replicate the fingerprints of the Defence Minister of Germany, the country with the world’s 4th largest GDP and a leader in several technological and military fields.

After the demonstration, Krissler jokingly added – “After this talk, politicians will probably wear gloves when talking in public.” While that seems like a logical expectation, we doubt that will be the case. But we sincerely hope that politicians heed this warning and demonstration and take care to avert such cases in this modern age of cyberespionage, international cyberwarfare and other technology related crimes.

Krissler aka Starbug, is certainly not new to the hacking of biometric security and authentication techniques. When the Apple iPhone 5S was released in 2013, he successfully spoofed the highly publicized Apple TouchID sensors within 24 hours. He achieved this feat with the help of a finger smudge on the screen, wood glue and sprayable graphene. However, for his latest hack demonstration, it is scary that he does not need physical access to either a device or a finger. Makes you wonder how secure high-level authentication protocols really are.

A notable workaround for this is for users to not think of biometric security as a replacement for passwords or other authentication. While your fingerprints may be unique to you, the fact is they are not a secret. Anyone who is adequately motivated can easily get hands on your fingerprints through several innovative techniques. Instead, biometric security and fingerprint authentication should be used as a supplement for passwords. Starbug also agreed in 2013 by stating – “I consider my password safer than my fingerprint. My password is in my head, and if I’m careful when typing, I remain the only one who knows it.”

Interestingly, another novel hack technique was also showcased at the conference and this is known as “Corneal Keylogging”. This trick allows a hacker to gain someone’s passwords by simply gaining control of the camera of his smartphone. With this control, a hacker can simply read what someone is typing on the screen by analyzing HD photographs of the reflection of the screen in the user’s eyes. This technique may sound implausible to some, but the secondary cameras or front-facing cameras of smartphones today are strong to make this possible.

So while we all hope for and look towards a safe and secure 2015, advanced hack attacks such as this are constantly being built and showcased in all corners of the globe. It just goes to show that when it comes to security, there is no rest for the wicked.

Sunday 28 December 2014

Worlds Lowest Priced Quad core Smartphone Launched

Sunday 28 December 2014 - 0 Comments




Smartphone Mobile Manufacturer "JIVI" the budget smartphone has launched its new phone Jivi JSP Q56. The company claims that it is India's most expensive smartphone Quad core processor. It calls for Rs 4300 only Amazon can be purchased from India.

It has 4.5 inch IPS FWVGA touchscreen display Jivi JSP Q56, 512 MB RAM, 4 GB internal memory, 32 GB Micro Card slot, 1.2 GHz Quad core  processor, also it have 8-megapixel rear and 2 megapixel front camera has features like. The phone SIM slot Micro and Mini are two different size. In addition, the phone battery 2000 mAh, 240 hours of stand-by time and talk time is 10 hours. 4.4 operating system that runs on the phone Android KitKat. It has also 3G, Wifi, Bluetooth, EDGE, GPRS, GPS is the Support. Also Hindi, Urdu, Bengali and Arabic languages are also Support.

As a reminder, the first call in a few months JSP20 Jivi launched the Rs 1,999. With this phone, the smartphone market Jivi was debuted.

Wednesday 24 December 2014

LG Launched the first Transparent Phone Fxo

Wednesday 24 December 2014 - 0 Comments




LG has Launched the Transparent Phone Fxo. The company teamed up with Mozilla Firefox in Japan its first smartphone operating system is launched. The phone will start selling in Japan yesterday. The good thing about this phone is that its front, side and back of the panel are completely Transparent. Its price is around Rs 26,300.


Firefox 2.0 running on the operating system of the phone 4.7 inch display, quad-core 1.2 GHz Qualcomm Snapdragon 400 processor, 1.5 GB of RAM, 16 GB inbuilt storage, 64 GB Micro SDXC card slot, 8-megapixel rear camera with LED flash, 2.1 megapixel front camera, 2370 mAh battery that features such as. The phone 4G LTE and NFC is the Support.


The striking feature of LG Fx0 is its neatly packaged transparent back-cover, which might appear dainty but is capable of protecting the phone during accidental fall. Other notable aspect is the gold hued home button with earth embellishment.

Though the new LG FxO's design language is praise worthy, its internal hardware seem little sub-par for its price-tag of ¥50,000 Japanese Yen (around ₹26,350/$415/€341).

The new LF Fx0 is expected to go on sale initially in Japan later this month. However, there is no word on whether the phone will made available in other regions. As of now, Firefox OS based devices are sold in 29 countries including India.


Tuesday 23 December 2014

Finally! Windows 10 Preview and Download 32 bit and 64 bit eng

Tuesday 23 December 2014 - 0 Comments



Windows 10 Preview: The Start Menu Returns

The most obvious thing about Windows 10 is that, yes, the Start Menu is back, and it’s just as welcome as you might expect. The Start Screen was a UI design fail of epic proportions and being able to go back to the familiar pop-up menu is so much more efficient.

Of course, it isn't just that the Start Menu is back. It has also changed. Now the Live Tiles of the Start Screen are embedded within the Start Menu, providing yet another area for shortcuts (along with the taskbar, normal menu items and desktop) to opening your apps. Those Tiles that are actually Live will also show previews of app information, such as a message notification or the day’s weather.

It’s quite a nice addition both visually and because there is the potential there to provide a useful snapshot of your other apps. We’re not quite at the stage of finding it useful yet, but we can see the possibilities.

Things we’re not so keen on are that by default there is both a search button and a search function in the Start Menu right next to each other; that the Control Panel is removed from the list of apps by default; and that the power options are at the top of the menu, tucked away between the Live Tiles and user profile button.

But the search is at least quite powerful now, with results from Bing included along with Windows Store matches and local file matches, and this is a preview so there's plenty of time for Microsoft to tweak and complete the design.

If the Start Menu didn't already, it’s the inclusion of virtual desktops that really marks out how directly Microsoft is trying to please the desktop power users with this release of Windows. It isn't as slick as the virtual desktop integration in Mac OS, but it's a really useful addition.

New desktops can be added by either pressing Windows Tab or clicking the new Task View button. These bring up a new live app-switching interface below which is the option to add new desktops.

Once you've added a new desktop you can, from the same interface, move apps between them and rearrange them. Apps that are open in other desktops are underlined in the taskbar where if you click them it’ll switch to that desktop, which can actually be a little annoying if you just want to open another instance of that app and don’t know the keyboard shortcut.

Another really, really obvious nod towards ingratiating power users is that Microsoft has finally updated the Command Shell, at least a little bit.

Now users can use the familiar keyboard shortcuts of the rest of the Windows interface, with Copy and Paste and Ctrl/Shift cursor based character selection now available.

The most obvious benefit of this is that you can copy and paste complicated command instructions from the web straight into the prompt, which you couldn't do before. Sadly, you still can’t delete a highlighted selection but at least it’s a step in the right direction.

License Key For Windows 10: NKJFK-GPHP7-G8C3J-P6JXR-HQRJR

32 Bit Version

64 Bit Version

Monday 22 December 2014

Simple Tips For Your Website Or Blogs Traffic

Monday 22 December 2014 - 0 Comments




Most online businesses dream of having a highly popular blog. It’s good for your brand and ultimately serves to drive wave after wave of potential customers your way.

There are an almost unlimited number of ways to increase traffic to your blog, but if you’re stuck for ideas, here are 101 simple tips to get you started. Enjoy!

Content Makes King


  1. Write eye-catching headlines.
  2. Write excellent content — make a name for blog as a source of informative, useful, funny, entertaining, or inspiring articles.
  3. Write longer posts — expand on your content, fill out your blog posts and create truly epic content.
  4. Write shorter posts — follow Seth Godin’s example with short but sweet posts.
  5. Write more often — the more content you can produce, the better.
  6. Blog on a consistent schedule so your readers know when to expect new content.
  7. Write list blog posts — they get more traffic than any other kind of post.
  8. Write about current news stories.
  9. Write about topics trending on Twitter and in Google trends.
  10. Search forums in your niche to see what people are talking about and write an article about it.
  11. Ask your readers what they’d like you to write about.
  12. Write about something controversial and start a debate.
  13. Use link bait techniques to write content that promotes massive sharing.
  14. Explore your analytics, find out which is your most popular content and create more of the same.
  15. Interview influential people in your niche/industry.
  16. Create a “best blogs” list post and let the bloggers know you’ve included them — a bit of flattery can go a long way.

Enhance with Multimedia like Youtube etc.


  1. Use eye-catching photos and graphics to draw attention to your posts.
  2. Create Pinterest-friendly graphics with text on top of images to encourage people to pin your posts.
  3. Create an interesting infographic and share it with everyone you can think of.
  4. Upload videos to YouTube and Vimeo — make sure a link to your site is in the description and the video.
  5. Produce a podcast and distribute it through iTunes.
  6. Convert some of your content into a presentation and upload it to SlideShare.
  7. Host or take part in a webinar.
  8. Transcribe your videos and webinars for extra content.

Be Social on facebook, Twitter, Pinterest etc.


  1. Create a Facebook page for your blog. Use it to communicate with your readers and post a notification every time you publish a new blog article.
  2. Tweet all your posts when you publish them.
  3. Link to your posts on your Google+ page when you publish them.
  4. Use social media scheduling software like Buffer to post automatically on social media at the best times of the day.
  5. Link to your old posts periodically from your social media accounts.
  6. Join a collaborative Pinterest board and tap into the audiences of all the other bloggers pinning to that board.
  7. Regularly pin images from other sites. The more you pin, the more followers you’ll attract on Pinterest. Make sure your blog address is in your profile!
  8. Create a Tumblr blog and add content related to your niche as well as re-blogging content from your own site.
  9. Set up an Instagram account and tell your followers when you publish a new post.
  10. Comment on other blogs with insightful, useful comments.
  11. Link out to other bloggers generously.
  12. Share others’ posts on Facebook and retweet useful information to your readers.
  13. Reach out to other bloggers through their blog, by email or on social media — build relationships.
  14. Follow all the followers of other influential bloggers in your niche on Twitter.
  15. Include social sharing buttons on all your posts.
  16. Swap sidebar links and buttons with other sites.
  17. Include quotable phrases in your content and use Clicktotweet to encourage sharing on Twitter.
  18. Encourage engagement on your blog by ending your posts with a question.
  19. Link to all your posts with StumbleUpon.
  20. Add some of the users Twitter recommends you to follow every day — a percentage will follow you back.
  21. Reply to your comments and emails — show your readership that you’re interested in what they have to say
  22. Join blogger Facebook groups and communities to share knowledge and help to promote each other’s content.
  23. Create a LinkedIn profile with a link to your blog and contribute to groups and discussions in your field.
  24. Submit your best posts to Digg and Reddit.
  25. Add your favorite blogs to your blogroll – they’ll notice and may return the favor.
  26. Ask your blogger friends to include you in their blogroll.
  27. Collaborate with other bloggers to produce and share content.

Guest Posting And Link Building


  1. Guest post on other blogs — try pitching to one new blog every week.
  2. Include a link to your blog in every single online profile you have.
  3. Set up a free blog related to your niche with supplementary content on Blogger, Livejournal, Typepad etc. and reference back to your main blog.
  4. Invite others to guest post on your blog — they’ll send traffic your way when they link to the post.
  5. List your blog in as many free blog directories as you can find.
  6. Do interviews for other blogs.
  7. Take part in link parties and blog carnivals.
  8. Include your blog’s URL in your email signature.
  9. Post helpful information in forums related to your niche and include your blog’s URL in your signature.
  10. Post helpful articles on sites like Hubpages and Squidoo with links back to your blog.
  11. Submit articles to syndicated article directories like Ezine Articles. If your article is re-published on another blog you’ll benefit from extra links.
  12. Write and syndicate a press release linking back to your blog.
  13. Use a link inspection tool like Open Site Explorer to find where your competitors are getting links from and copy them.
  14. Add your blog to Technorati.
  15. Syndicate your blog on Amazon Kindle.

Search Engine Optimization


  1. Interlink your blog posts — link to old posts from new ones and edit old posts to link to more recent ones.
  2. Install a related content plugin to link each post to several other related posts.
  3. Use keyword research tools to write about the things that many people are searching for.
  4. Install an SEO plugin like All in One SEO Pack or the Yoast SEO plugin and optimize your site for search engines.
  5. Use relevant keywords in your image file names and alt tags.
  6. Use keywords in your post title and subheadings.
  7. Link out to authority sites in your niche.
  8. Set up Google authorship on your blog.

Use E-books And Freebies for More Traffic


  1. Run a blog giveaway or competition.
  2. Put an opt-in form on your website and send out a free newsletter.
  3. Publish an e-book and sell it or offer it for free on Amazon Kindle. Make sure your web address is in the first 10% of the book so it shows up in the sample.
  4. Write an e-book and offer a generous affiliate commission to encourage others to distribute it and link to your site.
  5. Create a free report and get site visitors to tweet or post about your site on Facebook to access it
  6. Offer a free e-course or digital product and encourage your readers to tell people about it.

Always Use as Many Offline Ideas


  1. Include your blog’s URL on your printed business cards and give them out to everyone you meet.
  2. Attend blogging conferences and networking events — distribute your business cards!
  3. Speak at conferences and special events.
  4. Tell your friends and family about your blog.

Other Miscellaneous Ideas

  1. Enter blogging competitions — your blog will usually be promoted on the website hosting the competition and social media for free.
  2. Answer questions on Yahoo! Answers and leave a link to your website.
  3. Ping your blog posts with a tool like Pingomatic.
  4. Create a WordPress theme and include a link to your site in the footer.
  5. Choose a beautiful theme for your blog.
  6. Review products and share your content with brands. They may link to your site from their social media accounts
  7. Ask a bigger blogger to be your mentor and start a case study about improving your blog.
  8. Submit photographs to free stock photography sites and Flickr and ask for a credit link back to your site.
  9. Include a link to your RSS feed.
  10. Include links to read your blog via Bloglovin‘.
  11. Link to your best and most popular posts from your sidebar.
  12. Go back to old posts and edit them to update and improve them from time to time
  13. Optimize your website for viewing on mobile devices.
  14. Include different ways to access your content such as category and date archives
  15. Include a search function on your blog.
  16. Create an app for iPhone or Android.
  17. Be helpful and be nice — be likeable and help to solve people’s problems and they will send traffic your way with no encouragement required.

Sunday 21 December 2014

10 Simple and Common Tips to make a slow computer run faster

Sunday 21 December 2014 - 0 Comments





A tired, old PC really can make your blood boil. But sometimes even new PCs can clog up and run slowly. The Independent came up with 10 great quick fixes anyone can perform.

1. Uninstall Unused Programs



When you buy a new PC the chances are there are a load of programs pre-installed onto it. Old PCs can simply accumulate these over time. Most of these you'll never use and some of them can often run in the background without you knowing, slowing your computer down in the process.
To remove these click "Start" then go to "Control Panel" then click "Programs and Features" and scroll through the list, uninstalling the ones you never use.
If you're unsure what should stay or go, use PC Decrapifier - a free piece of software that recommends what is worthwhile or not.


2. Delete Temporary Files

Whenever you use internet Explorer all your browsing history remains in the depths of your PC. The same thing happens when you install something. It's like never throwing away the packaging when you buy a new TV and by doing so it'll free-up space on your system. To get rid of all this clutter open "My Computer", select your main drive, click the "Windows" folder then open the folder inside that called "Temp". 


Or Also 

Goto: Run and Type Temp and Enter you will see a window. Delete all the things you seeing inside this folder. Otherwise use your mouse to right-click on the folder, and in the "View" options, choose "Details". Once this is done, select all the files that are older than the current date and press the delete key. Then go to the Recycle Bin on your desktop and empty it.


3. Install a solid state drive




If your PC takes an age or long time to turn on and be ready for action your hard drive might be the fault. Typically they have loads of moving components and can take a long time to fire up. A solid state drive uses flash memory (like a massive USB stick) and can read data a lot quicker therefore speeding up your start-up.

4. Get More Hard Drive Storage




No matter if you keep your computer tidy, if your hard drive becomes too full, it will affect the speed of your PC. If you use your system for processor-heavy tasks, such as recording video and media the likelihood will be that your drive will get chokka before you know it. Nowadays you can get mega storage drives over 1TB which is good for thousands of HD movies.

5. Stop Unnecessary Start ups




Whenever you switch on your PC some programs will automatically start to run in the background. Things like Skype and Spotify are guilty of this. All the applications running will use your computer's memory so ditch the ones you don't need running.
To do this click Start and type "Run". In the box that appears type "msconfig" and a box will appear, at the top click the "Startup" tab listing all the applications that run when your computer starts up. Either manually untick the ones that are unnecessary or click "disable all", but be sure to keep vital things like antivirus going.

6. Get more RAM (Random Access Memory) For PC



Have you noticed when you try to work on several applications at once, such as email, internet, and word your computer has a minor stroke when flicking between them? This is because you don't have enough RAM. This is memory used by your PC to run the programs and can be easily upgraded (and quite cheaply) if you know where to look.

7. Run a disk defragment



Don't be scared by the description, it's essentially a way to optimise your hard drive's efficiency.
To do this go to "My Computer", right-click on the hard drive and select "Properties". Under the "Tools" tab there should be an option to "Defragment Now".

8. Run a disk clean-up



Spring clean your whole system using this built-in tool which looks for unnecessary large files.
To perform this click "Start" then go to All Programs > Accessories > System Tools > Disk Cleanup



9. Vacuum out the dust From Motherboard


If you open up your PC and you won't believe how much dust gets sucked into it through the cooling fan. Dust can clog airflow, which is vital to keeping your system temperature down and if it overheats, its performance will slow.

Use a vacuum on a low setting to clean out the insides, but ensure the PC has been off for at least 30-minutes and it's disconnected from the mains. Also, go easy when you're poking around in there as you could dislodge some important cables.

10. Buy a new PC



Simple advice, but most effective if you've got a PC that should be cashing-in its pension. With the rise of tablet PCs and the low cost of components, prices of new laptops and desktop computers are so much more affordable than years ago. Save yourself a heap of trouble and think about it.

Micromax Low priced New Canvas Tab P470 Launched




Micromax has launched a new 7-inch Android Tablet. Canvas tab called P470 Tablet price has been fixed at Rs 6,999. December 20 has begun its sales.

Classy silver gray color will get P470 and Mystique Canvas tab. The 7-inch 1024 x 600 pixel IPS display in the tab Resolution, 1.3 GHz MediaTek MT 8312 chip, 1 GB RAM, 8 GB internal memory, MicroSD card slot up to 32 GB are such features. Android 4.4 operating system it runs on KitKat.

5 megapixel rear camera with all the tabs and 0.3 megapixel front camera. The tab with the 3200 mAh battery talk time and 158 hours standby time of 11 hours would be. As far as connectivity is concerned, P470 Canvas Tab Wi-Fi, Bluetooth, 3G is the Sport.

The Canvas Tab P470 also features support for 21 Indian languages, including Hindi, Gujarati, Punjabi, Malayalam, Tamil, and Kannada.


Micromax last month launched a new 8-inch Android tablet called the Canvas Tab P666, priced at Rs. 10,999. Notably, the Micromax Canvas Tab P666 is the first tablet from the popular handset maker packing an Intel chipset. It is powered by a 1.2GHz dual-core Intel Atom Processor Z2520 (4 threads, 1MB Cache) coupled with 1GB of RAM.

Some of the other key specifications of the Canvas Tab P666 are an 8-inch WXGA IPS display; 8GB of inbuilt storage which is expandable via microSD card (up to 32GB); a 5-megapixel rear autofocus camera; a 2-megapixel front-facing camera, and a 4400mAh battery.

Saturday 20 December 2014

How To Crack or Activate an EXE File

Saturday 20 December 2014 - 0 Comments




AFTER A VERY LONG Time blogged up…with this very new post on reverse engineering!!!


Today…we are going to learn how to crack a simple application…i.e an EXE file!!!!

Note: All Experiments are for only Educational Purposes. Dont Try hard.

Most of you might have encountered a scenario where the software you installed asks for the SERIAL key or LICENSE key!!! THIS IS ANNOYING ! :)

So…how to go about this….??????

Well, today most of the softwares are well secured and well-proofed from reverse engineering! But still…some aren’t!

This is a very simple tutorial which will let you a know a basic approach towards cracking a simple exe file…

SO LET US START!

1. This is a simple application which asks us for the license key..


2. We need to install a disassembler software to crack this application.

3. You may use any disassembler you want..
4. I am using IDA PRO Link Below
5. Install it and launch the application….you will see the following window after launching it.



6.  Drag and drop your exe file into the panel…

7.  Choose “load file as” MS-DOS Executable…click OK and Continue.

8.  By default its IDA View-A…Please choose “HEX VIEW-A”

9. Scroll down to find the line saying ” ENTER YOUR LICENSE KEY” (different for different applications,in my case it is this).


10.  Some where near that we found Google word next to the line saying “ENTER THE LICENSE KEY”..

11. AWESOME THIS IS  our LICENSE KEY!!! :P

12. Let us try “Google” as our key!


13. YEAH!!! IT WORKED!!!!

Ain’t that aweosme!!!  try building your own application and reverse engineer it to crack it!


THANKS! :)

Warning:

Reverse engineering any software without proper authorization and permissions is illegal. This tutorial is for education purposes only.

Offensive Hacking will not be responsible for any cyber crimes as it doesn’t encourage the same.



Friday 19 December 2014

Microsoft's cheap Lumia 638 4G phone launch

Friday 19 December 2014 - 0 Comments





Microsoft Lumia 638 smartphone launched its most affordable 4G is ready. It has been brought through Amazon. Its price is set at Rs 8299.

This Smartphone has Clear 4.5 inch 480 x 854 pixels Resolution, Gorilla Glass 3,
 LCD display back to the phone,  1.2 GHz Qualcomm Snapdragon 400 quad-core processor,
 1 GB RAM, 8 GB internal memory, expandable memory up to 128 GB with micro SD card,
1830 mAh features such as batteries. In addition, the phone has a 5 megapixel auto focus
 camera, front camera, but it is not. It runs on Windows 8.1.


The Physical keyboard BlackBerry 'CLASSIC' Launched





Your new BlackBerry smartphone classic has launched. Physical QWERTY keyboard BlackBerry with this phone is expected to get its old market share.

The company says that the new 'classic' smartphone BlackBerry Bold and Curve handsets largely resembles. There are also large screen, long battery life. However, 3 times faster than the phone is the first device browser.

BlackBerry chief Executive John Chen said, "Given the demand for its BlackBerry fans Option command once again brought the phone to be easy to use."

Blackberry 'classic' 3.5-inch square shape screen, 8 megapixel rear camera and a 2 megapixel camera Frnc, 1.5 GHz dual-core Snapdragon processor, 2 GB RAM, 16 GB internal memory, 128 GB Micro SD Card Sport, 2515 mAh battery , are features such as 17.2 hours of talk time GSL. LTE is classic. Sport is also the NFC and Wi-Fi. It runs on BlackBerry operating system 10.3.1. In addition to the classic non-removable battery, which makes it different from other Blackberry phones.

BlackBerry in the US "classic" ie about US $ 450 price is Rs 28-29. BlackBerry says that by the end of this month, the phone will be available in UM. In India, about how long it would have been a Official information but is expected that soon it will meet in India.

Thursday 18 December 2014

Cyanogen Operated Micromax YUREKA launches, Price Rs 8,999 (150$)

Thursday 18 December 2014 - 1 Comment




YU series, the first of its smartphone Micromax YUREKA (Eureka) has been launched. The phone will run on the operating system Cyanogen. The company has fixed the price of Rs 8,999. This phone can be purchased from Amazon India. The registration will begin at 2 pm on December 19.


This dual SIM phone 615 SoC processor Qualcomm Snapdragon 1.5 GHz, 64-bit Octa-core chipset will. The 4G will also Sport. The 5.5-inch HD screen, 720 pixels display, Gorilla Glass 3, 267 ppi, 16 GB expandable memory, 2 GB RAM, 2500 mAh battery, has features such as a 5 megapixel camera, front and rear 13 megapixels. The phone chip Cortex A-7, A-53 of the cortex is updated. Moonstone in Eureka will finish back panel. The company claimed that the phone service you will be at home.

Everyone Soon be able to sell things on Facebook, Said!





If you are active on Facebook to be a local group that you have seen a post on which people are selling their stuff. Looks like Facebook, on groups 'cell' is preparing to give the feature. If that happens, you will be able to sell things on Facebook via groups.


The Next Web reports on the group, some FB users 'Sell Something' is said to see the button. These people say that this button Right Post "button is the next one. After clicking on this button opens a form on which the name of the item, the price of the item of information is required to be paid. In addition to attach photos of the item, the option to pick up and delivery information is the beginning. After all, your post is seen as a classified listing contains all the information about the item, but also about how to pay Transaction or some do not.

According to the Next Web 'Sell Something' right to the point of appearing as a Facebook button that says this is a new feature on Facebook Groups Facebook testing so that people who want to sell your stuff on your items methodically in that post. It was on Facebook a small test groups were those who are active on the sailing community. However, Facebook has a link to a help page which explained that Facebook is not responsible for any purchase.

Wednesday 17 December 2014

Credit Card Security Tips While Online Shopping or Else

Wednesday 17 December 2014 - 1 Comment



With holidays around the corner and most ecommerce sites throwing away huge offers and discounts, we have to be extra careful against online scams and frauds. In this post today, we have listed down some helpful tips that you can use for safe credit card usage on the Internet.

So, if you usually shop online with your credit card, here are some safety tips you must consider.


Choose Credit Cards Over Debit Cards

If you use your credit card most of the time for online shopping, then you are already following an important security tip. If any fraudulent charges occur on your credit card, you will still have time to report it to your bank and avoid paying for the transaction made on the card. On the other hand, for a debit card, ‘real money’ gets debited instantly, and it may take days before you can reclaim the money. Also, most banks offer zero liability on lost credit cards. If we take HDFC bank into consideration, it states, “If you lose your card, report it immediately to our 24-hour call centre. After reporting the loss, you have a zero liability on any fraudulent transactions made on your card.”

Go a step further – Use a Virtual Credit Card

Another credit card security tip that works effectively, is using a virtual credit card. As the name suggests, this is not a ‘physical card’ and not issued physically. The following are the benefits of using a virtual credit card:


  1. A virtual credit card is mostly valid for 21 – 48 hours only, depending on the bank that has issued it.
  2. The card can be used for making one payment only.
  3. Any unused amount left in the card gets credited back to the customer’s account.
  4. A virtual credit card cannot be stolen or cloned, as it is an intangible property.


Know your Online Shoppe

Always go for trusted, well-known, reputable, online shopping sites. This is more important when you are purchasing expensive items. It is also wise to go through the privacy and security policy of the site that you are shopping from. You might come across a site that offers unbelievable deals; but odds are, the deals are fake or not what they appear to be.

Understand What Information Your Online Shoppe Needs

A standard checkout/payment page of most online shopping sites require you to give the following details:


  1. Full name as printed on the card
  2. Credit card number
  3. Expiration date
  4. CVV number
  5. Shipping/Billing address


But, if the payment page asks for your ATM pin, net banking login ID and password, mother’s maiden name, etc., then you have enough reasons to treat this as a phishing attack. Immediately close the browser, and report the website to the right authority such as Google.

Avoid Public and Free Wi-Fi Networks

This credit card security tip also applies to all kinds of financial transactions that you do online. Avoid using your credit card over public computer network such as cyber cafes and free Wi-Fi. These networks are less secured or have no security against hackers who can spy on your information and misuses it for illegal purpose.

Look for “HTTPS” and pad lock symbol

Before giving away your credit/debit information on the checkout page of any site, always ensure that the URL in browser’s address bar begins with “https://” and is accompanied by a “locked padlock” symbol. If it is otherwise, then do not proceed with the purchase. Go for a safer option such as cash-on-delivery.

The Better way to Protection Against Phishing and Threats be Sure you have a Better Antivirus System on your Computer or Laptop.

Don’t Follow Links in Emails

If you receive an email from your online shopping site about a great offer, and asks you to follow a link to view it, then here’s what you should do. Go to the website by typing its URL in the browser or Google, and verify if it is really hosting any such offers. Never click such links in emails even if they seem to have come from your favorite or a popular retailer.

Have Anti-phishing Protection on Your Computer

Nowadays, it is impossible for normal users to differentiate a fake, phishing website from a real one. Even a professional, neatly done website that seems innocuous, can be a compromised site waiting for you to fall into its trap. Hence, having an anti-phishing protection on your computer can be extremely beneficial. This feature, as the name suggests, automatically restricts user from landing on a fraudulent or phishing website.

If you think you have some more credit card security tips to add to this post, please feel free to leave them in the comment box below. Stay safe!

Get Our App

Subscribe

Please Enter Your Email Id

© 2013 Blogger World. All rights reserved.
Designed by Think Exchanger