Your Library for the latest IT Security News, Alerts, Threats and Tips and Android Games
Recent Articles
Home » All posts
Wednesday, 19 November 2014
Wednesday, 19 November 2014
- 0 Comments
Phishing is one of the oldest tricks in the book of hackers. But as old as it might be, phishing still remains the most lucrative tool for cyber criminals; as they say, old is gold. This post tells you about phishing and measures you can take to avoid it.
What is Phishing?
Phishing is a fraudulent activity that is designed to trick the victim into revealing their personal and confidential information. This information usually includes bank account details, credit card numbers, and social security numbers to name a few. There are different ways a hacker can launch a phishing attack on his targets.
Phishing by Email
This is the most common phishing technique deployed by cyber criminals. Fake emails posing as crucial communication from a bank, ecommerce site or known legitimate entities are sent to the victim. These emails contain links to a fake Web site, which usually appears like a legitimate site and prompts the victim to sign in or divulge their personal information. In some instances, the phishing email itself contains an attachment of a form to be filled out by the victim. To trick the victim into visiting the fake Web site or fill out the form, such emails show a sense of urgency or a threatening situation. For instance, the target is informed that their bank account is at a risk of identity theft. To fix the issue, the user must verify their account by providing their banking details. The email might also claim that unverified accounts will be discontinued.
Here is an example of a phishing email that looks like it has come from Lloyds Bank:
[Source: http://www.banksafeonline.org.uk]
Phishing by Call
Phishing is no more dependent on emails. Fraudsters have started using the telephone as their new pawn. In a phishing call scam, the victim will receive a phone call from a person posing as an employee of a bank, a software firm, or any other known organization. If it is from a bank, then the issue will be usually related to the security of the victim’s bank account. The caller instructs the victim to call another number, which in most cases, will be an automated attendant. The attendant will ask the caller for their bank account details like account number, pin number, password, etc. In some instances, a phishing email may instruct the victim to call a number, instead of urging them to visit a website or open an attachment. Phishing by phone is also called vishing.
This is how a phishing call might go:
“Is this Mr. Brown? This is a call for you from (a popular) Bank. We have received reports of illegal withdrawals from your bank account. In order to contain the situation, and safeguard your account, we need to confirm your account number, expiration date, four digits at the back…” and so on.
SMiShing
Cyber criminals leave no stone unturned when it comes to having their way. Recently, there has been a sharp surge of phishing attacks that involve Short Message Service (SMS). Targets will be sent SMSs where they will be asked to click a link to a spoofed website. The website might ask the target for their personal information, or infect their computer with a malware. In some SMSs, the target is asked to call a certain number (sometimes toll free) and verify their personal information. Even here, phishers use scare tactics to trick the target. For instance, you might receive an SMS reading that your ATM card has been suspended or deactivated. To reactivate the service, you must call xxxxxxxxxxxx immediately.
Example:
Credit Union N.A. Please call us immediately at 1-888-xxx-xxxx regarding a recent restriction placed on your account. Thank you. [Source: www.t-mobile.com]
How to Avoid Phishing Attacks
Here are some simple measures you can take to prevent phishing attacks.
- Never entertain unsolicited emails, calls or SMSs.
- Your bank will never ask you for confidential information via emails, calls or texts. If you do receive any such communication, do not respond; even better, report the incident to your bank.
- Avoid accessing websites via links in email messages; especially those asking for personal information. It is always a safe bet to type the URL manually into the web browser.
- Do not fill any kind of form that comes along with an email.
- Provide your personal information only on secure websites. A secure website’s URL should always begin with “https” instead of “http”. Also important is the presence of a lock symbol on the website (see figure A). Clicking the lock icon should display the digital certificate that verifies the authenticity of the website.
Fig A.
- Look for spelling mistakes, grammatical errors or bad language in any email you receive; especially the ones you were not expecting. Emails from a genuine organization are proofread and edited before they are sent out to the customers.
- If you receive an email containing link(s), do not click it. Hover your mouse over the link and take a look at the left hand corner of the browser. It will display a link. Check if this link matches the one in the email. If it doesn’t, then suspect it as a phishing attack.
- If you receive any email from your bank that conveys a sense of urgency or threat, then call up your bank and verify the situation.
- Keep your system’s operating system updated and patched
- Go for an antivirus program that is capable of blocking phishing emails and websites.
- Keep a regular check on your bank account. Even if there is anything amiss, you will have enough time to contain the situation.
- Keep your web browsers updated and patched.
There is no silver bullet for phishing attacks or cybercrime for that matter. But taking the right precautionary measures, seeking help from the right authorities, and using the right security solution, do place us at a safer spot.
Password leaks and targeted attacks are nothing new and the latest security bug related to a massive loss of passwords across the world is ‘Heartbleed’. This bug has received a lot of media coverage over the last few days, so there is a lot of confusion about what it is and what one needs to do to fix the issue.
This blog post aims to help you better understand what Heartbleed really is and what you need to do in order to secure your presence online. Heartbleed has affected about 17% (close to 500,000) of the web servers across the world, so there is a high chance that you are affected by this too. With that in mind, here’s what you need to know now.
Heartbleed is a security bug that affects servers that use OpenSSL (Secure Sockets Layer) technology. When you log in to your email account, or make a financial transaction online, the server that hosts this activity is protected by the SSL technology, which is denoted by the symbol of the padlock near the address bar and the unmistakable presence of “HTTPS” as a prefix of the URL itself.
Heartbleed is a bug that afflicts this very protective measure and exposes information that SSL attempts to protect. What this means then, is that sensitive information like passwords, credit/debit card details and more are susceptible to this bug and can be stolen.
What this means is that there is nothing wrong with your PC or your antivirus software. This is an issue that needs to be dealt with by the people who run the websites that make use of SSL. Moreover, if you are surfing the Internet you will not be able to tell if a service you are using is affected by Hearbleed or not.
While most of the sites that have been affected have taken corrective steps already, there are bound to be many more which are still working on it. If you use some of the following services then there is a high chance that your password and details may have been leaked.
As you can see, the list is huge. There are several more services that have been affected, so the potential damage here is substantial.
This online tool can also help you ascertain whether a particular URL is afflicted or not. If you carry out online banking transactions, then we highly recommend that you change your account passwords. Also, check this tool to see if your bank’s online portal is affected by Heartbleed or not.
While there is nothing specific that you can do to combat Heartbleed, one major precaution you should take is change ALL your online passwords right away. This will ensure that if any of the services you use have been afflicted by Heartbleed, then at least your passwords will be safe. Apart from this, stay alert about any unusual activity on your accounts. If you feel something is out of the ordinary, take the necessary corrective steps as soon as possible. Moreover, spread the word about Heartbleed and inform your friends and family members as well.
WARNING: Be on the lookout for fake password reset emails
With such widespread activity occurring simultaneously with regards to password changes all over the world, this is bound to lead to several phishing emails about password resets. Be on the lookout for such emails and stay away from fake emails that ask you to change your passwords. Read here for some tips on how to recognize fake phishing emails.
Quick Heal will keep you updated about any further developments and news regarding Heartbleed, so keep checking back for more information.
This blog post aims to help you better understand what Heartbleed really is and what you need to do in order to secure your presence online. Heartbleed has affected about 17% (close to 500,000) of the web servers across the world, so there is a high chance that you are affected by this too. With that in mind, here’s what you need to know now.
Fact # 1: What exactly is Heartbleed?
Heartbleed is a security bug that affects servers that use OpenSSL (Secure Sockets Layer) technology. When you log in to your email account, or make a financial transaction online, the server that hosts this activity is protected by the SSL technology, which is denoted by the symbol of the padlock near the address bar and the unmistakable presence of “HTTPS” as a prefix of the URL itself.
Heartbleed is a bug that afflicts this very protective measure and exposes information that SSL attempts to protect. What this means then, is that sensitive information like passwords, credit/debit card details and more are susceptible to this bug and can be stolen.
What this means is that there is nothing wrong with your PC or your antivirus software. This is an issue that needs to be dealt with by the people who run the websites that make use of SSL. Moreover, if you are surfing the Internet you will not be able to tell if a service you are using is affected by Hearbleed or not.
Fact # 2: Which websites and online services are affected?
While most of the sites that have been affected have taken corrective steps already, there are bound to be many more which are still working on it. If you use some of the following services then there is a high chance that your password and details may have been leaked.
Facebook
|
Gmail
|
Amazon
|
SoundCloud
|
Instagram
|
Yahoo Mail
|
Flickr
|
YouTube
|
Pinterest
|
Google
|
Minecraft
|
Wikipedia
|
Tumblr
|
GoDaddy
|
Netflix
|
Dropbox
|
As you can see, the list is huge. There are several more services that have been affected, so the potential damage here is substantial.
This online tool can also help you ascertain whether a particular URL is afflicted or not. If you carry out online banking transactions, then we highly recommend that you change your account passwords. Also, check this tool to see if your bank’s online portal is affected by Heartbleed or not.
Fact # 3: What do you need to do?
While there is nothing specific that you can do to combat Heartbleed, one major precaution you should take is change ALL your online passwords right away. This will ensure that if any of the services you use have been afflicted by Heartbleed, then at least your passwords will be safe. Apart from this, stay alert about any unusual activity on your accounts. If you feel something is out of the ordinary, take the necessary corrective steps as soon as possible. Moreover, spread the word about Heartbleed and inform your friends and family members as well.
WARNING: Be on the lookout for fake password reset emails
With such widespread activity occurring simultaneously with regards to password changes all over the world, this is bound to lead to several phishing emails about password resets. Be on the lookout for such emails and stay away from fake emails that ask you to change your passwords. Read here for some tips on how to recognize fake phishing emails.
Quick Heal will keep you updated about any further developments and news regarding Heartbleed, so keep checking back for more information.
There’s a new security bug in town. Technically, it is called CVE-2014-3566, and elsewhere, as the Poodle Bug. Three Google engineers have discovered this security vulnerability in SSL version 3. Let’s know how this vulnerability may affect you.
How POODLE bug affects SSL 3.0
SSL 3.0 is an 18-year old technology. Although stronger encryption technologies such as TLS (Transport Layer Security) are now in force, SSL 3.0 is still used in 1% of web traffic, and supported by 95% of web browsers.
Coming to POODLE, it stands for ‘Padding Oracle On Downgraded Legacy Encryption’. It is a security flaw that exists in SSL version 3. Under the right conditions, the POODLE bug can allow an attacker to access your session cookies. With this information at hand, an attacker can take control of your online accounts including your email, banking and social networking account.
Now all this may sound scary, but the POODLE bug is not as threatening as Heartbleed or Shellshock that took the Internet by storm. It is hard to exploit.
So, Why POODLE should not worry you much? Here’s why!
An attacker who intends to use the POODLE vulnerability, has to come in between you and the website you are visiting. And one of the most likely ways an attacker can do this is when you are accessing your online account on an unsecured public Wi-Fi network.
While disabling SSL 3.0 support will mitigate the risk, it might present compatibility problems with older web browsers and servers. So, for now, end users can take the following measures:
1. Avoid accessing online accounts on unsecured Wi-Fi; this even includes your instant messaging services like WhatsApp.
2. Ensure that your browser is configured to automatic updates.
The POODLE bug story is developing. We will keep you posted about this as we collect more information. Stay tuned to our blog, and stay safe!
What is SSL?
SSL (Secure Sockets Layer) is an encryption service that keeps your Internet communications (such as your connection to your bank’s website, online shopping site, etc.) private and from getting into the wrong hands.How POODLE bug affects SSL 3.0
SSL 3.0 is an 18-year old technology. Although stronger encryption technologies such as TLS (Transport Layer Security) are now in force, SSL 3.0 is still used in 1% of web traffic, and supported by 95% of web browsers.
Coming to POODLE, it stands for ‘Padding Oracle On Downgraded Legacy Encryption’. It is a security flaw that exists in SSL version 3. Under the right conditions, the POODLE bug can allow an attacker to access your session cookies. With this information at hand, an attacker can take control of your online accounts including your email, banking and social networking account.
Now all this may sound scary, but the POODLE bug is not as threatening as Heartbleed or Shellshock that took the Internet by storm. It is hard to exploit.
So, Why POODLE should not worry you much? Here’s why!
An attacker who intends to use the POODLE vulnerability, has to come in between you and the website you are visiting. And one of the most likely ways an attacker can do this is when you are accessing your online account on an unsecured public Wi-Fi network.
So, is disabling SSL 3.0 support a solution?
While disabling SSL 3.0 support will mitigate the risk, it might present compatibility problems with older web browsers and servers. So, for now, end users can take the following measures:
1. Avoid accessing online accounts on unsecured Wi-Fi; this even includes your instant messaging services like WhatsApp.
2. Ensure that your browser is configured to automatic updates.
The POODLE bug story is developing. We will keep you posted about this as we collect more information. Stay tuned to our blog, and stay safe!
From creating strong and unique passwords to avoiding phishing attacks, we have listed out some of the most essential dos and don’ts of Internet safety. Scroll down to see which ones you follow and which ones you don’t.
#1. While giving away personal or financial information on any website, check if its URL begins with ‘https’. Also look for the lock icon, which indicates that the connection is secure.
#2. Never shop online, make financial transactions or login into accounts over free, unsecured WiFi networks.
#3. Create long, unique, and hard to guess passwords. Never keep the same password for different online accounts.
#4. Enable Secure Browsing for your Facebook account.
#5. Keep your computer’s Firewall ON
#6. Avoid making your personal information public on social media sites and Internet in general.
#7. Avoid checking ‘Keep me logged in’ or ‘Remember me’ options on websites, especially on public computers.
#8. Use your primary email address to stay in touch with people you know or are acquainted with.
#9. Never use your official email address for social media sites.
#10. For social media sites, use an email address that you do not use for important communications.
#11. Tighten your privacy settings on Facebook so that only your friends are notified about your activity.
#12. Never use any of your personal information such as name, date of birth, address, etc., as your password.
#13. While you are online in a public setting such as a coffee shop, mall, airport, etc., watch your back to make sure no one’s snooping on you.
#14. Never trust emails asking for your personal or banking information. Be extra cautions against links or attachments in unknown or unwanted emails. Verify any such communication with the sender first.
#15. Do away with old accounts that you do not use anymore.
#16. Do not make your photos or videos public on social media sites. Keep them visible to friends you know, and your family.
#17. Never respond to pop up ads that may come up on your screen. Close such pop ups from the the task manager; press Alt+Ctrl+Delete.
#18. Before downloading any free software, research on the software and the website hosting it.
#19. Avoid visiting inappropriate websites or websites that you are not fully aware of.
#20. Beware of files with multiple extensions.
#21. Always log out of online accounts when you are done. This is especially important when you are using a public computer.
#22. Do not click or share posts on Facebook that claim to show any unusual content such as shocking videos or magical illusions. Verify such news from other sources.
#23. Access your bank’s website by manually typing its URL in the address bar.
#24. Do not click any links in emails to access your bank’s website.
#25. Change your banking and other Internet account passwords at periodic intervals.
#26. Do not install software that comes as an attachment in emails.
#27. Always shop from reputed and know online stores.
#28. Update the Internet browsers and software on your computer.
#29. Use up-to-date security software that offers multilayered protection.
#30. Increase your awareness of cyber security and share the same with friends and family.
And that would be all for some of the important dos and don’ts that each one of us must follow to keep our online world safe, sound, and healthy.
a) You follow all of these dos and don’ts
b) You follow some of them
c) You follow none of them
d) You will start following them now
Dos and Don’ts of Internet Safety
#1. While giving away personal or financial information on any website, check if its URL begins with ‘https’. Also look for the lock icon, which indicates that the connection is secure.
#2. Never shop online, make financial transactions or login into accounts over free, unsecured WiFi networks.
#3. Create long, unique, and hard to guess passwords. Never keep the same password for different online accounts.
#4. Enable Secure Browsing for your Facebook account.
#5. Keep your computer’s Firewall ON
#6. Avoid making your personal information public on social media sites and Internet in general.
#7. Avoid checking ‘Keep me logged in’ or ‘Remember me’ options on websites, especially on public computers.
#8. Use your primary email address to stay in touch with people you know or are acquainted with.
#9. Never use your official email address for social media sites.
#10. For social media sites, use an email address that you do not use for important communications.
#11. Tighten your privacy settings on Facebook so that only your friends are notified about your activity.
#12. Never use any of your personal information such as name, date of birth, address, etc., as your password.
#13. While you are online in a public setting such as a coffee shop, mall, airport, etc., watch your back to make sure no one’s snooping on you.
#14. Never trust emails asking for your personal or banking information. Be extra cautions against links or attachments in unknown or unwanted emails. Verify any such communication with the sender first.
#15. Do away with old accounts that you do not use anymore.
#16. Do not make your photos or videos public on social media sites. Keep them visible to friends you know, and your family.
#17. Never respond to pop up ads that may come up on your screen. Close such pop ups from the the task manager; press Alt+Ctrl+Delete.
#18. Before downloading any free software, research on the software and the website hosting it.
#19. Avoid visiting inappropriate websites or websites that you are not fully aware of.
#20. Beware of files with multiple extensions.
#21. Always log out of online accounts when you are done. This is especially important when you are using a public computer.
#22. Do not click or share posts on Facebook that claim to show any unusual content such as shocking videos or magical illusions. Verify such news from other sources.
#23. Access your bank’s website by manually typing its URL in the address bar.
#24. Do not click any links in emails to access your bank’s website.
#25. Change your banking and other Internet account passwords at periodic intervals.
#26. Do not install software that comes as an attachment in emails.
#27. Always shop from reputed and know online stores.
#28. Update the Internet browsers and software on your computer.
#29. Use up-to-date security software that offers multilayered protection.
#30. Increase your awareness of cyber security and share the same with friends and family.
And that would be all for some of the important dos and don’ts that each one of us must follow to keep our online world safe, sound, and healthy.
Use the comment space below to leave us your choice for the following options:
a) You follow all of these dos and don’ts
b) You follow some of them
c) You follow none of them
d) You will start following them now
As the tree of Facebook is growing exponentially and making the world even smaller, it is also getting crowded with scrupulous hoaxes and scams. For an unaware user, it is difficult to tell these hoaxes from genuine Facebook posts or status updates. In this blog post we have outlined some of the most common scam and hoax posts that have been and are doing the rounds on the social network. If you come across any of these, be sure to delete them and advise your friends to do the same and avoid spreading them further.
Social media platforms were created to bring people closer. There is nothing social about spreading unconfirmed news, viral posts, and scams. So, whenever you come across any shocking, terrifying, or unusual posts, confirm the same from other sources before you hit the ‘Like’ or ‘Share’ button. Stay safe!
#1. Shocking Video Posts
Just recently I came across a Facebook post that claimed to show a ‘shocking video’ of the biggest snake in the world. The post had a teaser image of a giant snake and a man, as you can see in the image below. Not only is the image a bad example of Photoshop, but the entire thing is a hoax designed to scam curious users. Clicking the video will take the user to a third party website (that may look like Facebook) and ask them to share the link publicly or complete a fake online survey before they can see the video. Even if the user does all that, they will never get to see the video, because there isn’t any.#2. Your Favorite Celebrity Just Died Posts
If online scammers had their way, then all celebrities would have vanished from the face of the earth. Back in the month of August 2013, a hoax video on how Eminem got stabbed, went viral on Facebook. And just recently, Rihanna became a victim of fake celebrity death reports. Even these videos work in the same fashion as the ‘Shocking video’ scams.#3. Fake Facebook App Scams
Orkut, the long-lost social media hero, allows its users to know who all visited their profile. Imagine the hoo-ha if such a feature comes into Facebook. The ‘Know Who Visited Your Profile App’ or ‘Facebook Profile Viewer App’ claims to do the same thing for Facebook users. Installing such apps will only drop a nasty malware on your system, and let attackers steal your profile information.#4. Free! Free! Free!
Free giveaways are a classic example of social media scams that have stuck to Facebook like a bad stain. The word ‘Free’ is good enough to grab just anyone’s attention. And this is what scammers capitalize on. In exchange of some information (personal and otherwise) or downloading a software, the user will be eligible for the free goodies.#5. Fake Virus Warning Posts
When the element of terror drops onto social networking sites such as Facebook, there is but fire all over the place! And one classic example of this are fake virus warnings. Most users take such warnings for real and share them with others, and end up promoting the scammer’s cause.Social media platforms were created to bring people closer. There is nothing social about spreading unconfirmed news, viral posts, and scams. So, whenever you come across any shocking, terrifying, or unusual posts, confirm the same from other sources before you hit the ‘Like’ or ‘Share’ button. Stay safe!
Tuesday, 18 November 2014
Tuesday, 18 November 2014
- 0 Comments
As we near the end of yet another terrific year, we bring to you the top Whatsapp security blog posts. These posts were the most read . Scroll down to begin.
Simple Privacy Tips for WhatsApp Users
Interestingly, WhatsApp’s largest user base resides in India and amounts to more than 50 million active users. With this in mind, we would like to post some security tips and advice for our Quick Heal readers, and inform them about some steps they can take to protect their privacy over WhatsApp.
Safety tips to follow while using WhatsApp:
Never send private information like bank account details, PINs or passwords through WhatsApp.
Never accept files or begin downloads from messages sent to you by strangers or unknown numbers.
Never respond to suspicious messages that come through from unknown numbers.
WhatsApp as a service will never contact you through a WhatsApp message. Never trust any message that claims to come from WhatsApp and demands some payment for the service.
Some scams say they can connect your PC with WhatsApp and send messages from a desktop. Do not believe these as this is not possible.
Keep automatic downloads disabled so that you can always keep a check on what is being downloaded.
Avoid using WhatsApp when you are connected to open Wi-Fi networks. These are hunting grounds for malware authors and data sniffers.
Always keep an updated antivirus security solution installed and updated on your mobile device.
Tips for privacy settings over WhatsApp
While the aforementioned tips are useful for generic purposes, there are some steps you can take to protect your privacy over WhatsApp. Usually, messages can be received from anyone so this is a major loophole in the app. However, this is something that is a salient feature of the app, do not expect this to be disabled anytime soon. Nevertheless, you can take these steps to safeguard your privacy over WhatsApp.
# Step 1 – Go to Settings and click on Account.
Dailybloggtips# Step 2 – Now click on Privacy.# Step 3 – Over here you can view and change settings for Last Seen, Profile Photo and Status. It is advisable that for all these 3 options, you select My Contacts. | Unfortunately, blocking all messages from unknown numbers is not possible over WhatsApp. However, if you have received a message from an unknown number and wish to receive no more messages from that number, you can open that particular chat window and block the contact from there. With these small privacy tips for WhatsApp in mind, you can definitely ensure that your usage over this app is as secure as possible | . |
Thursday, 6 November 2014
Thursday, 6 November 2014
- 0 Comments
Some more time free
Whatsapp in countries with developed economies, including India, it has decided to free up some more time. In developed countries like Europe and America for the use of whatsapp has to pay an annual fee of $ 1. Although it is free Subscriptions N replace all of the first year. The company believes that relatively little use of debit and credit cards in india online payment due will be very difficult. So after a year in India will also use it now for free. Here again some years later whatsapp to-use fee may be charged, because the company wants to earn advertising rather than subscription. The nearly 7 million users in India are whatsapp. The company has been bought by whatsapp Facebook is one of the largest markets in India.
Vts
App new gifts
By August 2014, 60 million users worldwide have joined the biggest mobile messaging company whatsapp to the target figure is great. For this he is constantly bringing users to the new Experience. Some of these have already been launched and some preparations have been completed.Voice calling soon
Users can get the voice call feature whatsapp soon. Some pictures were leaked on the Internet in recent indications it. Voice calling on these photos for a given whatsapp icons and have been told about whatsapp dial tone. Users had to wait that long, the company also hinted several times to start it. But how long it would have never been told about it. In 2015. Now the company can offer voice calling features. It will be available only on mobile, the Facebook Messenger calls from Wi-Fi networks can be on the iPad or tablets. (NBT)
Message read or not............
WhatsApp recently made the announcement on its website.
However, if someone doesn't open the app to look at your message (but they see it via a push notification), it won't show up as read. Sneaky.
Facebook officially closed its acquisition of WhatsApp last month, which cost $19 billion. The popular messaging app boasts 600 million users.
whatsapp this feature you will know that your message has been read or not. After sending the message down the two blue tick mark its arrival would mean that the message has been read. Group mark the message as it will be blue, when all people will read message. whatsapp has started rolling out this feature. The offer hikes such as the Indian app already has this feature, read the message written on the Hour comes. There are more than 60 million worldwide users of whatsapp.
For Android:
Download Now
Google has finally confirmed Android 5.0 'Lollipop', the biggest update to Android in years, will be arriving in the next few months. Announced alongside the Nexus 9 tablet and Nexus 6 smartphone, both of which will ship with Lollipop out of the box, it's one of the most hotly anticipated Android updates ever and one that promises to give Google's mobile OS a major visual overhaul.
Lollipop, which was first announced back at June's Google I/O conference as Android L, will also introduce 64-bit processor support and make battery life a priority as it goes up against Apple's iOS 8.
Google has been drip-feeding new features and announcements over the past few months, but now that an official release is almost upon us, we've rounded up all the facts to let you know what to expect – and when you'll be getting it on your smartphone.
Anyone with an older Nexus device such as the Nexus 5 smartphone, or Nexus 7 and Nexus 10 tablets, will get over-the-air (OTA) updates - eventually. The Lollipop source code was released on the 4th of November, but OTA updates aren't expected to follow until at least the middle of the month. Google Play Edition handsets are also expected to get swift updates, and we're pleased to see the older Nexus 10 still getting some love from Google – even if it has now finally been discontinued.
Early rumours from AndroidPolice suggested the first OTA update would be released on the 3rd of November, but only for the Wi-Fi versions of the 2012 and 2013 Nexus 7, and Nexus 10. The Nexus 5 and two-year-old Nexus 4 would have to wait, as Wi-Fi and cellular devices take a little longer to develop updates for. Google seemingly confirmed that date in a note to app developers, revealing that the Lollipop software development kit (SDK) was available and that they could start testing their apps or publishing them to the Google Play store. It closed by saying consumers would get their first lick of Lollipop on the 3rd of November. However, this appears to be referring to the Nexus 9 - we're still waiting for OTA updates for other devices.
Android 5.0 Lollipop updates for other phones
THE VOCAL
HTC has pledged to update both the current HTC One (m8) and last year's One (m7) within 90 days of receiving the Lollipop source code from Google. Considering that AOSP code was made available on the 4th of November (not mid-October as originally reported), that means HTC customers should get an update by the 4th of January at the latest – assuming mobile phone networks don't slow down the process. The HTC One Mini and One Mini 2 will eventually get Lollipop too, but likely at a later date.
Motorola's strong ties to Google means it will almost certainly be the first manufacturer to get Lollipop updates on to customers' phones. It has promised to upgrade the original and 2nd generation Moto X (2014), the original and second generation Moto G (2014), and the Moto E, as well as the older DROID Ultra, DROID Maxx and DROID Mini, although there's no exact date for release yet.
Android 5.0 Lollipop features
Lollipop isn't all about looks; it will also include lots of clever new features. Personalised unlocking is one of our favourites. Essentially it makes your smartphone or tablet search for familiar Bluetooth gadgets, Wi-Fi networks, locations and even voice imprints to deactivate any lockscreen protections, letting you jump straight into your phone when it knows you're nearby. If the device can't detect any of these metrics, anyone trying to use it will be presented with the standard lockscreen.The recent apps page will become the recent content page, displaying all your content in one list of Google Now-styled cards. You'll be able to jump between apps and the web, with links in Google search results jumping straight from the browser into the relevant part of an app. Although not strictly built into Android 5.0 Lollipop, Google will also be giving its mobile webpages and search an overhaul in time for its release. The Material Design will be carried across, along with smooth animations and a slicker interface.
Android 5.0 Lollipop performance
DirectX 11-level graphics will finally make their way to Android using the Android extension pack. This set of APIs support advanced effects such as tessellation, geometry shaders, texture compression and compute shaders, and have the potential to put mobile devices on par with games consoles and PC games.
Android 5.0 Lollipop battery life
Google has concentrated on improving battery life in Lollipop with Project Volta. Similar to how Jelly Bean's Project Butter was an effort to make animations feel smoother and more responsive, Project Volta includes a new battery historian to better visualise battery discharge. This will help users work out what a device was doing at any given point in a battery cycle to find out which apps are draining the most power.A battery saver mode will be included in stock Android for the first time with Lollipop, after being a common tweak for third party manufacturers. It will activate automatically when your battery drops below a certain percentage, downclocking the CPU, disabling extra features like location reporting and dimming the display. Google says a Nexus 5 running Lollipop gets around 90 minutes of extra use over the course of a typical day, without actually changing how a customer uses their phone.
The World’s largest Online Retailer Amazon has unveiled its first Smartphone. The Amazon CEO Jeff Bezos has introduced the new Smartphone “Fire Phone” to the World. If you are in the US, you can get the First Phone of Amazon on AT&T starting $199 with two years contract.
Fire Phone Features and Specification Details
The Fire Phone has got the 4.7 inch IPS LCD HD Display which is bigger that Apple’s iPhone and smaller than Google’s Nexus 5. The display has come up with a circular polarizer which will improve viewing angles in outdoor.
The new Fire Phone powered by the 2.2 GHz Qualcomm processor with 2Gigs of RAM, as well as, It is packed with Adreno 330 Graphics chip. It sports 13 Megapixel Rear-facing camera with Optical Image Stabilization feature. The phone has got the dedicated camera button to fire the camera app to take shots in a fraction of seconds.
Moreover, the Amazon has offered the unlimited online storage feature for your photos in their Amazon Cloud Drive. Reports claim that Fire Phone can take 3D image using multiple cameras in the device.
Besides that, Amazon Fire Phone has deeply integrated with Amazon’s core features. It has May Day, X Ray the familiar features of Amazon, added to that you can access to e-books to borrow for the members of Amazon prime program. Using X Ray, you can get the details of the product using the camera, ‘May day’ is 24 hours customer service tool to help the users who have the issues in the phone or want to know how to use the particular feature. And also, Prime Music and prime video etc are available.
Another Amazing Tool “Fire Fly” has introduced in the event. This tool can automatically recognize what it is hearing and seeing, using that input, the tool will suggest the relevant or exact items to buy.
Key Features of Fire Phone
Fire Phone got the 4.7 inch IPS LCD HD Display
Runs on the 2.2 GHz processor with 2Gigs of RAM
13 Megapixel Rear Camer with OIS
Forked version of Android “Fire OS”
Other Amazon tools and services.
Fire Phone Availability
The AT&T is the exclusive carrier that will sell the phone with two years contract in the price of $199. Before that, Apple has released its first iPhone in 2007 only with AT&T.
Update:
Amazon Fire Phone arrives on July 25 from AT&T. There is two variant of fire Phone available for all customers. The only difference is the internal storage capacity. You can get the 32GB Fire Phone model for $199 and 64GB for $299.
Sunday, 2 November 2014
Sunday, 2 November 2014
- 0 Comments
Real Working you tube bot only is here Try only first time but you guys use it every time trust me its Amazing
More Click link Below:
http://cur.lv/f81u5
Friday, 31 October 2014
Friday, 31 October 2014
- 0 Comments
1. Create a Facebook page for your app
Post relevant non-sales content your target audience would enjoy and invite everyone you know to like your page. Post updates on your business page, then share them on your personal page. Don’t forget to include links to your app in the market on each story. You can also drive installs for your app using Facebook’s mobile app paid promotion tools available here.
2. Create a Twitter feed for your app
Follow people tweeting about your app's niche, other app developers, leaders in your industry. Retweet and use hashtags deliberately!
3. Update your LinkedIn profile with picture/link to app
Your app link can be positioned in the "other" website slot so you can rename it. You could also add a company page and add your app as a product. We’ve also seen some people create a custom image promoting their app, and including the QR Code, to upload under the images/media inclusions at the bottom of each section on your LinkedIN profile / company page - find out how, here.
4. Post a demo video of your app on YouTube
Make sure you upload videos of your app with a link to download! You can also develop a video showing your app in action. This is useful to add to your YouTube page as well as your blog. Use the appropriate keywords and tags. Here’s a great blog post with all the tools / tips you’ll need to make a great mobile app demo video.
5. Set up a Google + account for your app
Remember that Google’s favorite social network is their own Google Plus, so if you want great search results, this is a key step. Follow communities in your industry and post/+1 interesting content publicly. Try Google Hangouts On Air to broadcast your app launch, live stream and auto saved to YouTube.
6. Add a Download Link in Your Email Signature
We love services like WiseStamp for including social updates and promotional ads linking to the market download pages for your new mobile app. There’s a free version, and it’s super easy to do. Make your emails work for you!
7. Send out a Press Release
Numerous mobile app target specific industries – for example, gardeners, sports enthusiasts, or music fans. Search for an online magazine or blogs that cover your niche and send them a notice that your app is on the market. Don’t forget to include screenshots and a link to download the app. There are free newswire / press release services available across the web, but we prefer some of the paid services like Vocus and SB Wire that have the broadest distribution and can really help from an SEO perspective as well.
8. Ask your users for ratings
Ask your colleagues, friends, and your users too, to give your app a review; and not just once, but through as many social networks, emails, etc. as possible. All comments and feedback is useful, and according to a survey, 84% of users said that app ratings are necessary to them when deciding whether to download an app or not. Don’t be shy. Never tell them what to say, but remember that ALL feedback is helpful. Don’t forget also to respond to those reviews, especially if there are suggestions / criticisms in them. Users will respect your new app business much more if they know you are listening.
9. Start a newsletter or let your existing users know about your new mobile app
If you’ve already got a current community of users subscribed to a newsletter, definitely take advantage of it as another way to let them know about your new app. If not, this is as good a time as any to start one. Just don’t fall for the trap of talking endlessly about yourself; instead offer various and useful content. We’re big fans of MailChimp as a fast, easy and free way to get started with your eMail newsletters.
10. Post QR codes in your store, on your product and other offline media.
When we publish your app you will have received a free unique QR Code that links to your app’s page in all the markets. Place these on your menus, business cards, window stickers, etc. Make sure that you include a call-to-action to encourage use. There are great ideas on sites like moo.com for all sorts of fun things you can print your links on.
11. Feature your mobile app on your website.
This doesn’t mean a small link in the footer. You need to bolster it prominently where appropriate. Take into account using a special offer to get customers to download your app to make it worth their time. Be sure to use your icon or screenshots to really make them pop.
12. Run a contest
Encourage people to tweet and share content on their social networks promoting your app in exchange for entry into some contest to win a great incentive/prize. A random person every week can win a promo code to download your app for free if it is a paid one. Here is a great blog post to help you to be sure that your app sweepstake / contest is legal and following best practices.
Thursday, 30 October 2014
Thursday, 30 October 2014
- 0 Comments
Wednesday, 29 October 2014
Wednesday, 29 October 2014
- 0 Comments
IDM Any Version Make Full Version with your any Name
This Tool Is Free for use and don't abuse it.
Download below and please share us.
Download Patch
This Tool Is Free for use and don't abuse it.
Download below and please share us.
Download Patch
Removal instructions
Remove autorun.inf virus on USB drive
plug the USB drive into your computer, a window dialogue may appear, don’t click on Ok , just choose ‘Cancel’.
Go to command prompt and type your USB drive letter.
Type dir /w/a and press enter, this will display a list of the files in in your flash drive. Remove the files: Ravmon.exe, ntdelect.com, New Folder.exe, kavo.exe svchost.exe, autorun.inf If you find them.
To delete the virus just type del and the filename example. F:\del autorun.inf and hit enter.
Run a antivirus scan on your USB drives just to make sure that all threats are removed successfully
Delete autorun.inf on hard drive of computer
Boot your system in the safe mode and then open a command prompt.
Delete the following files:
%System%\config\csrss.exe
%WinDir%\media\arona.exe
%System%\logon.bat
%System%\config\autorun.inf
C:\autorun.inf
D:\autorun.inf
E:\ autorun.inf
F:\autorun.inf
autorun.inf files in all drives.
Open the registry editor and delete following parameters:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System]
DisableTaskMgr = 1
[HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
NoFolderOptions = 1
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"Worms" = "%System%\logon.bat"
Reboot your computer
See more information about Win32.AutoRun.
The method for removing autorun virus above is useful for some types of simple autorun viruses. If the autorun.inf come back again after removal and reinstall itself onto flash drive or local drive, even the antivirus could not detect it, that means the you have infected a new variant virus, which is unable to be removed manually.
In this case, you need to use the effective autorun removal tool.
Using Autorun Removal Tool
Autorun Virus Remover is not a common product like other antivirus products in the market, it focus on solving the autorun virus problem completely.Remove 2000+ types of autorun viruses permanently, easily and quickly
Prevent any viruses from infecting PC via USB drive
Recover hidden files and folders on root of hard disk and USB drive
Fix system, registry errors caused by viruses
For 6 year experience on analyze and solve autorun.inf virus problem, We develop advanced antivirus engineer which can detect and remove autorun virus effectively that may be ignored by other antivirus product. Virus samples from users all over the world are collected and analyzed to improve our product constantly, to make sure that it can detect and get rid of all kind of autorun viruses .
Also, Autorun Remover prevent any attack from USB port, before opening the external USB device, the autorun antivirus would execute an indepth scan of files on USB automatically to keep it safe.
Our product can not only remove the virus, but also fix system errors caused by viruses at the same time, we provide full threat removal and repair solutions for our clients.
With our product, you can solve the autorun.inf virus problem in 3 minutes.
This is trial Version But Here is a key to make its full version please share our site to your freinds to make us better.
Serial Key:-
Name: DSSerial: HY
Download Autorun Remover Tool
Kingo Android ROOT helps you start the process of rooting your Android phone, but it doesn't do much more than give you access. Think of it as a key to your phone's developer features: it's useful, but what you do once you're inside is entirely up to you. If you need that sort of kick start, this app is a fine way to do it.
Kingo Android ROOT automatically detects any gadget you connect to your computer to start the rooting process. Don't mistake this for a custom ROM, though; you'll still need one of those once you root your phone and this app doesn't give you many options in that respect. It will sync your data to a second app before you root just in case something goes wrong. Once you've done that, the app presents you with a single button that lets you root your phone. All you need to do is click it and it goes to work. The whole process takes a few minutes, which is standard among rooting programs. In addition to its smooth performance, Kingo Android ROOT has a futuristic layout, which is nice for the small amount of time you spend looking at it.
There's not much you can do with this program, but anyone who needs help rooting their phone will just love it. Kingo Android ROOT takes so much of the guesswork out of rooting your Android phone or tablet. If you need this type of help, this program provides it and does it with style.
Download Now
Monday, 27 October 2014
Monday, 27 October 2014
- 0 Comments
I have come to say that Google Adsense has scammed many people. If you go on webmaster forums these days, you will find thousands of accounts from decent, honest people who say that Google Adsense scammed them.
First off, let me explain what Adsense is. Adsense is a third-party ad network for publishers. Advertisers buy advertisements on Google Adwords. Website owners can enroll in Adsense to enable text, image, and video advertisements on their websites. Google puts those Adwords advertisements on websites that use Google Adsense.
Every time a user clicks on a Google Adsense advertisement, the advertiser pays money. That money gets divided amongst Google and the website owner who's Adsense advertisement was clicked on. Before acceptance, the webmaster who's applying for an Adsense account must agree that he/she will not click on his own Adsense advertisements, nor will he provide an incentive for users to click on advertisements. Google Adsense does this to prevent website owners from clicking on their own advertisements. This is good, because Google is trying to prevent website owners from defrauding advertisers.
The following is how webmasters who use Google Adsense get paid. Adsense will only pay you when your Adsense account reaches above $100. Then, on the month when you're account reaches $100, you will get paid in 30 days. For example, I have an account, and my account reached $50 on Febuary 28, 2011. Google will not pay me, because I haven't reached the $100 payment threshold yet. Then, by the end of March (which is March 31, 2011), my Adsense account has $120. Google will pay me that $120 30 days after March 31, 2011, which is April 30, 2011.
Now this is where the story gets interesting. Google sometimes deletes Adsense accounts whose webmasters are clicking on their own advertisements. This is the right thing to do, because they are trying to prevent people from scamming Adsense and the advertisers. But thing is, Google has deleted thousands of accounts, and the website owners who own those accounts DIDN'T click on their own advertisements. Is this not a scam or what?
Let me explain how this works. I've recently been scammed by them, and no, I absolutely did not click on my own advertisements.
As you might know if you've been following my articles, I have my own website. I started putting Google Adsense advertisements on my website since Febuary 16, 2011. My total Adsense earnings at the end of Febuary 28, 2011 was $67. By the end of yesterday (March 14, 2011), my earnings had reached $190. so, that meant, by the end of March, my Adsense earnings will have been above the $100 payment threshold. That also means, that Google Adsense would have to pay me soon.
And for some reason, Google banned my account today (March 15, 2011). Just like that. I didn't click on any of my own advertisements. I didn't give my website viewers any incentives to click on my own advertisements. Since they banned my account (pub-3089811986405667), I don't get paid a single cent of that $190 I had in my Adsense account. Now I'm currently trying to appeal to Google, but I know that it will be useless. Thousands of other honest people have had their accounts banned, and they've also tried to appeal to Google. But maybe, MAYBE, 1 in 10,000 banned accounts get unbanned.
Problem is, I have no proof that I didn't click on my own Adsense advertisements. Google does not share any data or analytics about who clicked on my ads, and where these clickers' IP addresses are from. All I know is how much money I made from Adsense, and how many people viewed my Adsense Ads. In other words, there is no way for me to prove to Google that I did not click on my own ads.
And about that $190 I had in my Adsense account. What happens to that money? I don't get that money. Google "says" that they will return the money to advertisers. But I doubt it. They probably just keep the money themselves. And isn't it coincidental that Google banned my account, just when I had reached the payment threshold? I don't think it's coincidental at all.
I am not trying to bemoan my own misfortune. I am just trying to warn the general public, and other website owners who use Adsense. Google can choose to delete your Adsense account at any time. All they need to do is say that you've clicked on your own Adsense ads (even if you haven't), and they can ban your account. Just like that. After all, how are you going to collect the proof showing that you didn't click on your own ads?
A case like mine has happened to thousands of people who haven't clicked on their own advertisements. Think about it. Google might ban around 5000 accounts a day (there are approximately 3 million Adsense accounts ). Of that 5000 banned accounts on any particular day, 4000 are banned because those accounts clicked on their own ads. The other 1000 were banned because Google had "evidence" saying the account owner clicked on his own ads, when in fact they actually didn't do anything wrong.
There are two types of people(s) who have Adsense accounts. One type: the website owner makes probably a few dollars every day. The second type: the website has millions of pageviews, and makes hundreds of thousands every day from Adsense. Funny thing is, it's always the small accounts that don't make much money who get their accounts banned.
First off, let me explain what Adsense is. Adsense is a third-party ad network for publishers. Advertisers buy advertisements on Google Adwords. Website owners can enroll in Adsense to enable text, image, and video advertisements on their websites. Google puts those Adwords advertisements on websites that use Google Adsense.
Every time a user clicks on a Google Adsense advertisement, the advertiser pays money. That money gets divided amongst Google and the website owner who's Adsense advertisement was clicked on. Before acceptance, the webmaster who's applying for an Adsense account must agree that he/she will not click on his own Adsense advertisements, nor will he provide an incentive for users to click on advertisements. Google Adsense does this to prevent website owners from clicking on their own advertisements. This is good, because Google is trying to prevent website owners from defrauding advertisers.
The following is how webmasters who use Google Adsense get paid. Adsense will only pay you when your Adsense account reaches above $100. Then, on the month when you're account reaches $100, you will get paid in 30 days. For example, I have an account, and my account reached $50 on Febuary 28, 2011. Google will not pay me, because I haven't reached the $100 payment threshold yet. Then, by the end of March (which is March 31, 2011), my Adsense account has $120. Google will pay me that $120 30 days after March 31, 2011, which is April 30, 2011.
Now this is where the story gets interesting. Google sometimes deletes Adsense accounts whose webmasters are clicking on their own advertisements. This is the right thing to do, because they are trying to prevent people from scamming Adsense and the advertisers. But thing is, Google has deleted thousands of accounts, and the website owners who own those accounts DIDN'T click on their own advertisements. Is this not a scam or what?
Let me explain how this works. I've recently been scammed by them, and no, I absolutely did not click on my own advertisements.
As you might know if you've been following my articles, I have my own website. I started putting Google Adsense advertisements on my website since Febuary 16, 2011. My total Adsense earnings at the end of Febuary 28, 2011 was $67. By the end of yesterday (March 14, 2011), my earnings had reached $190. so, that meant, by the end of March, my Adsense earnings will have been above the $100 payment threshold. That also means, that Google Adsense would have to pay me soon.
And for some reason, Google banned my account today (March 15, 2011). Just like that. I didn't click on any of my own advertisements. I didn't give my website viewers any incentives to click on my own advertisements. Since they banned my account (pub-3089811986405667), I don't get paid a single cent of that $190 I had in my Adsense account. Now I'm currently trying to appeal to Google, but I know that it will be useless. Thousands of other honest people have had their accounts banned, and they've also tried to appeal to Google. But maybe, MAYBE, 1 in 10,000 banned accounts get unbanned.
Problem is, I have no proof that I didn't click on my own Adsense advertisements. Google does not share any data or analytics about who clicked on my ads, and where these clickers' IP addresses are from. All I know is how much money I made from Adsense, and how many people viewed my Adsense Ads. In other words, there is no way for me to prove to Google that I did not click on my own ads.
And about that $190 I had in my Adsense account. What happens to that money? I don't get that money. Google "says" that they will return the money to advertisers. But I doubt it. They probably just keep the money themselves. And isn't it coincidental that Google banned my account, just when I had reached the payment threshold? I don't think it's coincidental at all.
I am not trying to bemoan my own misfortune. I am just trying to warn the general public, and other website owners who use Adsense. Google can choose to delete your Adsense account at any time. All they need to do is say that you've clicked on your own Adsense ads (even if you haven't), and they can ban your account. Just like that. After all, how are you going to collect the proof showing that you didn't click on your own ads?
A case like mine has happened to thousands of people who haven't clicked on their own advertisements. Think about it. Google might ban around 5000 accounts a day (there are approximately 3 million Adsense accounts ). Of that 5000 banned accounts on any particular day, 4000 are banned because those accounts clicked on their own ads. The other 1000 were banned because Google had "evidence" saying the account owner clicked on his own ads, when in fact they actually didn't do anything wrong.
There are two types of people(s) who have Adsense accounts. One type: the website owner makes probably a few dollars every day. The second type: the website has millions of pageviews, and makes hundreds of thousands every day from Adsense. Funny thing is, it's always the small accounts that don't make much money who get their accounts banned.
Make Your System More Smoother Try These Settings in your Computer But only Then If You Understand hardware and Software knowledge otherwise you Lose your Personal data or Computer Hardware.
Method:1
Goto:- START
Method:1
Goto:- START
And Type MSCONFIG.EXE and Press ENTER
Then You will See window like this
And Goto BOOT>Advance options then You look like this window
Now Click First Option >Number of Processor>and select how much cores in your cpu>then click Maximum Memory it will show your maximum RAM try to it as it is and click ok.
And Now Goto> Startup Tab>Like this...
And Uncheck Which one you Dont Want to start with your computer When its Turn on.
Thats it you'll be done...... Enjoy!!!!!! (:
With These Settings No One can Face Problems in Browser.
Just to be sure you don't have google blocked lets check your hosts file.you all guys try this Method to load google Just a minute with these easy but uknown trick.
First Go to: C:\Windows\system32\drivers\etc.
It is located in C:\ drive
Now Right click the hosts file or you can even delete the host file totaly and come back in your Chrome or Internet browser try relode it and see the magic.
Working Keys.....
Windows 7 Ultimate Serials
9JBBV-7Q7P7-CTDB7-KYBKG-X8HHC
P72QK-2Y3B8-YDHDV-29DQB-QKWWM
BCGX7-P3XWP-PPPCV-Q2H7C-FCGFR
- Vista Keys For All
Vista|Ultimate|Acer|3YDB8-YY3P4-G7FCW-GJMPG-VK48CVista|Ultimate|Advent|39MVW-K8KKQ-BGJ9B-24PMW-RYQMV
Vista|Ultimate|Alienware|7QVFM-MF2DT-WXJ62-XTYX3-P9YTT
Vista|Ultimate|Asus|6F2D7-2PCG6-YQQTB-FWK9V-932CC
Vista|Ultimate|Dell|2QBP3-289MF-9364X-37XGX-24W6P
In this article, I will show you how to create a .cmd file. This post is actually created to support my previous article on Windows Azure: How to Enable Classic ASP Support. It is actually very simple to create a .cmd command file. Here’s how to do it.
- Launch Notepad by clicking on Start then type Notepad on the search bar. Click on Notepad to launch the program.
- Type in your commands in Notepad. For example: start /w pkgmgr /iu:IIS-ASP
- Save your file with a name of your choice BUT with an extension of .cmd.
NOTE: Make sure that the Save as type is All Files, and Encoding is ANSI
That’s it!! You have created your own .cmd file.
Subscribe to:
Posts (Atom)