tag:blogger.com,1999:blog-48759831663037079572023-11-17T00:46:07.462+06:00Fahim's BlogTech from Ashfaq Afzal Chowdhury (FAHIM)Anonymoushttp://www.blogger.com/profile/01030512546628251633noreply@blogger.comBlogger38125tag:blogger.com,1999:blog-4875983166303707957.post-19591426738823639692018-07-11T19:33:00.001+06:002018-07-12T21:07:11.054+06:00Data Science and Data Engineering<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikqsjB7lI5AijvcWSIeMqX8hOtGYh_qaQ-n6nepxl6pSRlhC67h8770vldGgbS-JyYJ1Z7F2-AcBRzjNK_9y4Re_Ljgwg96_kFVzMDTlqiGOh5NnzcM0AZq6_QiqMs8eZ-DEnFQoVHS2Eb/s1600/content_screenshot_2017-02-23_14_26_33.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="442" data-original-width="793" height="356" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikqsjB7lI5AijvcWSIeMqX8hOtGYh_qaQ-n6nepxl6pSRlhC67h8770vldGgbS-JyYJ1Z7F2-AcBRzjNK_9y4Re_Ljgwg96_kFVzMDTlqiGOh5NnzcM0AZq6_QiqMs8eZ-DEnFQoVHS2Eb/s640/content_screenshot_2017-02-23_14_26_33.jpg" width="640" /></a></div>
<br />
<br />
<br />
So this is the world of technology. And This entire world is now almost relying on technology. And Yes! that is true. Our business our education our technical life each and everything is depending on technology and science of course. And when there are technology and science there is also a word appears behind which is DATA. Data is everywhere. We are using data to find results of anything.<br />
No matter what is happening data is mainly responsible for everything. And thus Data has been introduced in the field of science and technology. And then it was divided into two more parts in terms of its usability and productivity, which is <i>Data Science and Data Engineering. </i><br />
Most of the people out there often mix up between Data Science and Data Engineering.<br />
But the truth is these both are totally different. They both have their own task but they are both connected with each other.<br />
<br />
So let's start with <i>Data Science.</i><br />
<br />
<i><br /></i>
<br />
<div style="text-align: left;">
</div>
<h3>
<ul style="text-align: left;">
<li><i>What is Data Science?</i></li>
</ul>
</h3>
<div>
<i>Data Science involves using automated methods to analyze massive amounts of data and to extract knowledge from them.</i></div>
<div>
<i><br /></i></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigKOEPpf_utHB-zNv22nyGaLJOwwpOSSq0tdeeG5V3C72EHQFNh4YgSif3mVEfVvT1uPYsd3UeVcQfISygLzk40yTmFP2t8wWQqLJI6JaxwDR80iooy8MUZnraBtSDnUjTTtYS57zbrWq9/s1600/main-qimg-8f136ca872d80f96826c5b1502291b60.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="300" data-original-width="300" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigKOEPpf_utHB-zNv22nyGaLJOwwpOSSq0tdeeG5V3C72EHQFNh4YgSif3mVEfVvT1uPYsd3UeVcQfISygLzk40yTmFP2t8wWQqLJI6JaxwDR80iooy8MUZnraBtSDnUjTTtYS57zbrWq9/s200/main-qimg-8f136ca872d80f96826c5b1502291b60.png" width="200" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div>
Data science is everywhere. It uses for Statistical research, Mathematics, Data processing and most importantly on Computer science as well as Machine Learning which is now a great game changer on technology. </div>
<div>
In terms of mathematics, data science contributes a lot. But in present in the field of computer technology and science machine learning and deep learning are ruling the most. </div>
<div>
<br /></div>
<div>
<i>Machine Learning</i> explores the study and construction of algorithms that can learn from and make predictions on data. It is closely related to computational statistics. Besides, it used to devise complex models and algorithms that lend themselves to a prediction which in commercial use is known as predictive analytics.</div>
<div>
<br /></div>
<div>
Side by side<i> Deep learning</i> is one of the only methods by which we can circumvent the challenges of feature extraction in machine learning. This is because deep learning models are capable of learning to focus on the right features by themselves, requiring little guidance from the programmer.</div>
<div>
<div>
Therefore, we can say that Deep Learning is:</div>
<div>
1. A collection of statistical machine learning techniques</div>
<div>
2. Used to learn feature hierarchies</div>
<div>
3. Often based on artificial neural networks.</div>
</div>
<div>
<br /></div>
<div>
<br /></div>
<div style="text-align: left;">
<i><span style="font-size: x-small;">Reference: <a href="https://www.quora.com/" target="_blank">https://www.quora.com</a></span></i></div>
<div style="text-align: left;">
<i><span style="font-size: x-small;"><br /></span></i></div>
<div style="text-align: left;">
<i><span style="font-size: x-small;"><br /></span></i></div>
<div style="text-align: left;">
<i><span style="font-size: x-small;"><br /></span></i></div>
<div style="text-align: left;">
<ul style="font-size: 18.72px; font-weight: 700;">
<li><i>What is Data Engineering?</i></li>
</ul>
<div>
Data engineering includes what some companies might call Data Infrastructure or Data Architecture. The one who gathers and collects the data, stores it, does batch processing or real-time processing on it and serves it via an API <i>(application programming interface)</i> to a data scientist who can easily query it. And one who does all these is called a Data Engineer.</div>
<div>
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOukaccXwO_IO_SXbYYcEB_24jC0452N4hhx78iq8MJMf34ggNH__7OJM88tOxNx9TDb7xsoRlSXoOwISt9bIbUe9A-Y4avwg4P8HSHmtmW9aKGhiz0Br3xPuy30au6SL7d34de6CM4Xtc/s1600/Data-Engineering.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="250" data-original-width="592" height="168" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOukaccXwO_IO_SXbYYcEB_24jC0452N4hhx78iq8MJMf34ggNH__7OJM88tOxNx9TDb7xsoRlSXoOwISt9bIbUe9A-Y4avwg4P8HSHmtmW9aKGhiz0Br3xPuy30au6SL7d34de6CM4Xtc/s400/Data-Engineering.jpg" width="400" /></a></div>
<div>
<br /></div>
</div>
<div style="text-align: left;">
<i><span style="font-size: x-small;"><br /></span></i></div>
<div style="text-align: left;">
<i><span style="font-size: x-small;"><br /></span></i></div>
<div>
Data engineering means a good Data engineer has to gain good computing skills along with extensive knowledge on databases and best engineering practices. This includes some backend systematic skills like handling and login errors, monitoring the system, building human-fault-tolerant pipelines, understanding what is necessary to scale up, addressing continuous integration, knowledge of database administration, maintaining data cleaning, ensuring a deterministic pipeline and so on.</div>
<div>
It all requires several types of software engineering skills and experience. </div>
<div>
<br /></div>
<h3 style="text-align: left;">
<i>Data Engineers' Responsibilities</i></h3>
<div>
The data engineer is someone who develops, constructs, tests and maintains architectures, such as databases and large-scale processing systems. The data scientist, on the other hand, is someone who cleans, massages, and organizes (big) data. </div>
<div>
<br /></div>
<div>
Data engineers deal with raw data that contains human, machine or instrument errors. The data might not be validated and contain suspect records; It will be unformatted and can contain codes that are system-specific. </div>
<div>
<br /></div>
<div>
Lastly, to deliver the data to the data science team, the data engineering team will need to develop dataset processes for data modeling, mining, and production. </div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<h3 style="text-align: left;">
<i>Data Scientists' Responsibilities</i></h3>
<div>
<br /></div>
<div>
Data scientists will usually already get data that has passed the first round of cleaning and manipulation, which they can use to feed to sophisticated analytics programs and machine learning and statistical methods to prepare data for use in predictive and prescriptive modeling. Of course, to build models, they need to do research industry and business questions, and they will need to leverage large volumes of data from internal and external sources to answer business needs. This also sometimes involves exploring and examining data to find hidden patterns.</div>
<div>
<br /></div>
<div>
Once data scientists have done the analyses, they will need to present a clear story to the key stakeholders and when the results get accepted, they will need to make sure that the work is automated so that the insights can be delivered to the business stakeholders on a daily, monthly or yearly basis. </div>
<div>
<br /></div>
<div>
The data scientist needs to be aware of distributed computing, as he will need to gain access to the data that has been processed by the data engineering team, but he or she'll also need to be able to report to the business stakeholders: a focus on storytelling and visualization is essential. </div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<h3 style="text-align: left;">
<span style="font-size: small;">Finally,</span></h3>
<div style="text-align: left;">
Both are different in terms of task and perspective.</div>
<div>
But Both are also connected with each other. A data scientist cannot do their job without a data engineer. Data engineers enable data scientists to do their jobs more effectively! And thus the entire technical process works on.</div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<i><span style="font-size: x-small;">Reference: </span></i><span style="font-size: x-small;"><i><a href="https://blog.insightdatascience.com/data-science-vs-data-engineering-62da7678adaa" target="_blank">https://blog.insightdatascience.com</a></i></span></div>
<div>
<span style="font-size: x-small;"><i><br /></i></span></div>
<div>
<span style="font-size: x-small;"><i><br /></i></span></div>
<div>
<span style="font-size: x-small;"><i><br /></i></span></div>
<div>
<span style="font-size: x-small;"><i><br /></i></span></div>
<div>
<span style="font-size: x-small;"><i><br /></i></span></div>
<div>
<span style="font-size: x-small;"><i><br /></i></span></div>
<div>
<span style="font-size: x-small;"><i><br /></i></span></div>
<div>
<span style="font-size: x-small;"><i><br /></i></span></div>
<div>
<span style="font-size: x-small;"><i><br /></i></span></div>
<div>
<span style="font-size: x-small;"><i><br /></i></span></div>
<div>
</div>
<div>
<i><br /></i></div>
<i><br /></i></div>
Anonymoushttp://www.blogger.com/profile/01030512546628251633noreply@blogger.com0tag:blogger.com,1999:blog-4875983166303707957.post-10954558084509645832016-03-02T18:09:00.001+06:002016-03-02T18:09:24.883+06:00Keeping Facebook account secure<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhholatI_AzsF_Ohc3y_Mxhtcv1s7D23ZAHm5xbchgZmHmTaJSvcxHT4AHmkmnPzVxWlB5xTo-f9pP_8eiszD6vvoKx_jHCkBYn8azaIh4AMVJKSK27XYYHrUc-t5mJ8w0SsNjiUbAnl8mB/s1600/images.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="225" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhholatI_AzsF_Ohc3y_Mxhtcv1s7D23ZAHm5xbchgZmHmTaJSvcxHT4AHmkmnPzVxWlB5xTo-f9pP_8eiszD6vvoKx_jHCkBYn8azaIh4AMVJKSK27XYYHrUc-t5mJ8w0SsNjiUbAnl8mB/s400/images.jpg" width="400" /></a></div>
<br />
<br />
<br />
Nowadays Facebook is a very strong and popular social site in the world. Most of the internet users has their own Facebook account and they love to use that frequently. Facebook is now a part of our lives. Facebook stores many memorable thoughts,pictures,videos and many other things. It is a very good way of communication also. So Facebook is a very important and useful thing for every users! But as it is getting famous some people are also trying to break the security of a facebook account to grab or deface those important stuffs! Which is called Facebook Hacking which is also a Cyber Crime as well. Day by day Facebook Inc. is improving a lot security issues on their system so that hackers can not break into their system OR steal someones account. But still there are some ways to hack someones facebook account's password. It depends on the users. So there are some things to keep notice on. Here are some steps to ensure account privacy and security.<br />
<br />
<b>1. Protect your Password: </b>Password is a very essential thing to protect your account(s) from accessing other. Be sure that your Password is long including numbers,letters and symbols. Don't use your Birth date,name or anything that related with you as a password. Try something unique that no body knows. Do not use the same password that you have used already in other online accounts such as Email accounts. Use different passwords for different accounts. You can use password manager app (download only verified ones) to save your passwords to recall those.<br />
<br />
<b>2. Turn On the Login Approval: </b>Login approval is pretty helpful for securing your account. It applies an extra security layer on your account which is also known as two step authentication system. If anybody steals your password then he/she cannot login OR get fully access on your account. After putting the username/email and password you have to put another code on the next box after login. That code will be sent on the users phone as a text message OR the user can get that code from his/her Facebook App. If that code is entered on that box then the user can gain access to his/her account otherwise its impossible to gain access. So login approvals can make hackers far away from defacing your important stuffs. If anybody knows your password then he/she has to get that one time use code also. This system can be added by setting and verifying your mobile number on your account.<br />
<br />
<b>3. Secure your Email account(s) : </b>Since your facebook is connected with your email account(s), you have to protect those emails also. Because hackers can hack your Email account to reset your facebook account's password. So use a strong password and Two step authentication on your linked email account.<br />
<b><br /></b>
<b>4. Think before you Click: </b>Facebook and other social account users often face this threat. It is called Phishing Attack. The hacker tries to grab somebody's password by phishing links. It totally depends on the user.If that user click on those kind of links and follow that site's instructions,his/her accounts password will be stolen instantly. Normally this method is quite famous and still workable.This links contains a replicated image and information of a particular site (e.g Facebook.com ) that's why the users often puzzle and so they login with their email and password on that fake site/phishing site. As a result the hacker can get your password then can login in your account. But if you have turned on your Login Approval then that hacker can not login in your account! That guy has to input another code which is sent to your phone. So you can see that login approvals can help your account getting secured! To check any links/URL that you doubt,you can scan from here: <a href="https://www.virustotal.com/" target="_blank">https://www.virustotal.com/</a><br />
<br />
<b>5. Remove untrusted apps: </b>Untrusted apps that is installed on your facebook id is not fully safe! Since you have given the permission to post something and other access of your account to those apps so those untrusted apps are not fully safe! So it is good to remove those apps from your account.<br />
<br />
<b>6. Remove the untrusted browsers and seasons: </b>Removing untrusted browsers and seasons from your account ensure more privacy of your account. Sometimes many browsers saves the season that you forgot to logout. You can remotely remove those seasons so that other person cannot use your account from that season from that place.<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br /></div>
Anonymoushttp://www.blogger.com/profile/01030512546628251633noreply@blogger.com0tag:blogger.com,1999:blog-4875983166303707957.post-18363625235438765322016-02-26T20:00:00.003+06:002016-02-26T20:00:53.975+06:00Reaction Buttons are here in Facebook! <div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiT2PJU17oTYB_rLEA5vjF37jjOlgAs2JZ8d5Cj8Z2FRdponxr4GBhkgO0RTHQ2Evk5qijHzlKAHGE23YSoWd9Or3jlVroc07S3TdrogNc3IvymM0GWbm2EfjP0HF-GFnwoy52LBCGsS28I/s1600/reactions-image-en_us.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="" border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiT2PJU17oTYB_rLEA5vjF37jjOlgAs2JZ8d5Cj8Z2FRdponxr4GBhkgO0RTHQ2Evk5qijHzlKAHGE23YSoWd9Or3jlVroc07S3TdrogNc3IvymM0GWbm2EfjP0HF-GFnwoy52LBCGsS28I/s640/reactions-image-en_us.png" title="Reactions" width="640" /></a></div>
See in the world of online social communication there are a lots of lots of stuffs out there,many features are here and improving according to the era of technology. Facebook is one of the most vast using social media sites in this planet! From 2004 to 2016 today, Facebook Inc. has improved many features and helped us for making our communication a bit more easier than before! It helps us to express our mind, helps us to share what we have in our minds. Within a seconds we can rapidly share our thoughts,pictures,videos life event around the world and its not the end we can also select the peoples who can see the post. So facebook ensures our right of sharing and also ensures our online privacy as well. The celebrities can go live with their Facebook accounts and share what they are going to do and what they are doing just in real time! so Facebook is trying hard to give all the possible features. Apart from these there are much more things to explain!<br />
Another interesting thing is LIKE button. Its a very unique thing in Facebook product! People uses this LIKE button on people's post so that other people and the user himself can know how amount of people likes that particular post. But as the time goes on people got bored with that Button. Many of them requested to give a Dislike button with the LIKE button because all the post are not worthy for Like. In many Townhall Q&A of Facebook, CEO Mark Zuckerberg faced the same question that why he don't launch Dislike Button.<br />
<br />
<br />
LIKE button is not suitable for all posts like if anyone posts sad or ill news then its not the right place to give a like button because you are not going to show other people that you are liking this post besides you are also not going to give a Dislike instead of that because its also not looks good where you need to show Sympathy here. In Facbeook all the users has the right to post something good according to their taste and if anybody Dislikes this it looks mean or rude thats why facebook doesn't want to create a harsh situation. We’ve been listening to people and know that there should be more ways to easily and quickly express how something you see in News Feed makes they feel. That’s why after a huge thinking and working on it today Facebook has launched Reactions, an extension of the Like button, to give you guys more ways to share our reaction to a post in a quick and easy way. From that button there is Love,Laughing,Amazed,Sad and Angry and of course there will be LIKE button also so that people can get a meaningful expression for their posts. So these are the reaction button which is launched in Facebook. All they need is to press the Like button for a few seconds and then they will able to see the 5 new reaction button and click/tap on that icon of reaction.<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br /></div>
Anonymoushttp://www.blogger.com/profile/01030512546628251633noreply@blogger.com0tag:blogger.com,1999:blog-4875983166303707957.post-7861048137687999862015-06-14T22:16:00.000+06:002015-06-15T17:51:15.979+06:00Clearing the confusion the reason behind Facebook Hacking<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9RYWk7rbGW58LSCg9N5JHht9vIj4Tux0LaEqkb7ry7eSmK2xoD0P_1jl3B5NIf1eMB32bYj6MZsCRDSyGCa774T7IB78NM1Bn8eYBIp-kHDROg2wxp48E833CfujUHgZ12QzcquVFSLBm/s1600/ea6bf251654e36c8009b76e437bb1f73.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="364" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9RYWk7rbGW58LSCg9N5JHht9vIj4Tux0LaEqkb7ry7eSmK2xoD0P_1jl3B5NIf1eMB32bYj6MZsCRDSyGCa774T7IB78NM1Bn8eYBIp-kHDROg2wxp48E833CfujUHgZ12QzcquVFSLBm/s640/ea6bf251654e36c8009b76e437bb1f73.jpg" width="640" /></a></div>
<div>
<br /></div>
<div>
<br /></div>
<div style="text-align: justify;">
Some of the people out there often request me to Hack someones Facebook account or any social network's account. This post is for those who often ask me to Hack. **SORRY TO THOSE WHO KNOWS MUCH BETTER ABOUT THIS, I AM JUST HIGHLIGHTING ABOUT THIS POINT ** </div>
<div>
<div style="text-align: justify;">
<br /></div>
</div>
<div>
<div style="text-align: justify;">
So Talking about Hacking- It is a way, it is a technique or a trick to bypass someone’s login panel or make access without any authorization or something. It means the breaching of an online security system. Please guys stop creating rumours about hacking. SOME of the people don't know what actually Hacking is! Trust me i don't know the H of hacking, all I want to say that i got only the meaning of Hacking and i know a FEW things about Hacking but NOT about all. Yes i'm really passionate about hacking but true to say I don't have that skill properly. I m here to let you guys know what is hacking or what is Facebook hacking. Actually Nowadays a Facebook Account can not be Hacked! By reading this line most of u wondering that facebook is still hacking so this line is not true. Yeah its true that nowadays people's Facebook accounts are being hacked and perhaps many accounts are being hacked at this moment somewhere! So how does it happen?</div>
<div style="text-align: justify;">
Basically nowadays everyone can be a hacker. And this type of hackers uses Phishing attack to grab somebody's facebook account's login credentials. so all they need a fake facebook login page and send that link to the victim and as he/she clicks that link and login to that fake facebook page with his/her facebook username and password, that hacker/phisher instantly catch that login credentials from his specific email which came from that victim! see it is that easy! It is an example of phishing attack. there are many other phishing trick out there to grab somebody's password but this example is quite famous. Most of the people have already beware about this and they know enough about this. Another way is Keylogging. Its a simple Software/tool that may installed in a computer or any other device that can be used to grab your keystrokes and when you are typing your password on the keyboard the keylogger tool can grab your password and store that password into its specific location or send it to any specific email remotely! and after that when you are gone the hacker can easily open that file of Keylogger and find your all keystrokes including your passwords,email and pin number! One more trick is guessing. I think that I don't need to say anything about this.You guys know about this very well.</div>
<div style="text-align: justify;">
<br /></div>
<div>
<div style="text-align: justify;">
So these are some common reason behind hacking/stealing passwords. </div>
<div style="text-align: justify;">
Except these a Facebook account can NOT be hacked because Facebook Inc has improved their security system very strongly and they are still improving their system everyday and as far as i know that's why Facebook is the most famous Social Network in the entire world! Facebook has a lot of brilliant engineers to give much security codings. Now if anybody can break into their security system he must go to Facebook HQ for a job with a huge amount of salary.</div>
<div>
<div style="text-align: justify;">
<br /></div>
</div>
<div>
<div style="text-align: justify;">
<br /></div>
</div>
<div>
<div style="text-align: justify;">
<br /></div>
</div>
<div>
<div style="text-align: justify;">
<br /></div>
</div>
<div>
<div style="text-align: justify;">
<br /></div>
</div>
<div>
<div style="text-align: justify;">
<br /></div>
</div>
</div>
</div>
</div>
Anonymoushttp://www.blogger.com/profile/01030512546628251633noreply@blogger.com0tag:blogger.com,1999:blog-4875983166303707957.post-30026782148691246032015-06-12T22:16:00.000+06:002015-06-12T22:16:28.619+06:00WhatsApp can be Hacked by the Loophole!<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgynsm6mOK1PXbYSDPT1nvDOg83VdHZFBLFNKUITl6hnKmtyXAF1ircnJ90lLRItNN_fNub-M8CqrQWcBzVKMDWKm5O_3v4S3-me5Tdt40oLfuFiHTaaHT5P1ixU0BacCxGlJMF8tYSyE3M/s1600/fb-post.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgynsm6mOK1PXbYSDPT1nvDOg83VdHZFBLFNKUITl6hnKmtyXAF1ircnJ90lLRItNN_fNub-M8CqrQWcBzVKMDWKm5O_3v4S3-me5Tdt40oLfuFiHTaaHT5P1ixU0BacCxGlJMF8tYSyE3M/s640/fb-post.jpg" width="640" /></a></div>
<br /><br /><br />Smartphone messaging service WhatsApp was acquired by the corporate giant Facebook for over $20 billion last year, and it seems that news of a potential hack has reportedly been found that could undermine all of their forecasted profits.<br />Prone to hijacking without unlocking or even knowing your device’s password, this hack is making its hundreds of millions of users vulnerable to, not just hackers, but even small children.<br /><br /> <br /><br />This trick lets any random stranger to get effectively control over your WhatsApp account. The attacker needs nothing more than the phone number of the target person, and is able to access to the target’s mobile phone for a few seconds, even if it is locked.<br /><br /> <br /><br />This is not even a loophole or vulnerability in WhatsApp… rather, it is simply the way WhatsApp and its account setup mechanism works.<br /><br /> <br />NOTE: We aren’t encouraging users to <a href="http://thehackernews.com/search/label/hacking%20WhatsApp">hack others WhatsApp account</a>, but the purpose of publishing this article is to warn and remind our readers that you should be extra careful to whom you lend your mobile phone…. and not to leave it unattended for longer durations than necessary, particularly with strangers around.<br /><br /> <br />This trick allows the non-technical-hacker to get full control over the victim’s WhatsApp account in no time at all, and the most surprising part is that it works on ALL mobile platforms, including Android, Windows and Apple’s iOS.<br /><br /> <br /><div>
Below are the clear steps to hack the WhatsApp account on any Smartphones:<br /><br /></div>
<div>
Step 1: Begin by setting up a WhatsApp account on a new mobile phone using the phone number of your target.<br /><br /><br />Step 2: During the setup process, WhatsApp will call the target’s phone number and will provide a PIN that needs to be entered for the authentication of the account.<br /><br />Step 3: If you already have access to the victim’s phone, you can just answer the phone call and grab the code with no effort at all. Even if the victim has a lock screen enabled on the phone, you can <b>receive the phone call</b> to get the “secret” PIN.<br /><br /> <br /><br />Step 4: Profit?<br /><br /> <br /><br /><b>Think your fancy iPhone is “safer” than other models? Think again</b>.<br /><br /> <br /><br />Things get even worse on the iPhone if the users have configured their iPhones with Siri authentication for the lock screen, because all their contact details are available for access via Siri’s settings, effectively giving EVERYONE access to their phone number, bypassing their PIN.<br /><br /> <br /><br />Thus, if you try to steal the account information of their WhatsApp, without even having the phone number of the target user, you can just call the number from the target’s phone using Siri.<div>
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe width="320" height="266" class="YOUTUBE-iframe-video" data-thumbnail-src="https://i.ytimg.com/vi/uIZhSNgpmOY/0.jpg" src="https://www.youtube.com/embed/uIZhSNgpmOY?feature=player_embedded" frameborder="0" allowfullscreen></iframe></div>
<div>
<br /></div>
<br />Just check the given video demonstration that explains the simple trick of taking control of anyone’s WhatsApp account.<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
</div>
</div>
Anonymoushttp://www.blogger.com/profile/01030512546628251633noreply@blogger.com0tag:blogger.com,1999:blog-4875983166303707957.post-19083623721625763172015-06-11T13:59:00.001+06:002015-06-11T13:59:49.688+06:00Meet Android M <div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqOeHzNrDmjTgrD5WKG0_2Tg-b-khZjWt7-NmVc65D1dNVOV5lR3_ylxJpy3tK3VoIP0yT-8-KfpRKrvQqAkNS4eMS1ietWgXK0Ft5-r66galNjwCx50RsOL5uhyphenhyphensutyVIgVbWEcFFN6Ut/s1600/android-m-logo-smaller-w782.jpg" imageanchor="1"><img alt="" border="0" height="491" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqOeHzNrDmjTgrD5WKG0_2Tg-b-khZjWt7-NmVc65D1dNVOV5lR3_ylxJpy3tK3VoIP0yT-8-KfpRKrvQqAkNS4eMS1ietWgXK0Ft5-r66galNjwCx50RsOL5uhyphenhyphensutyVIgVbWEcFFN6Ut/s640/android-m-logo-smaller-w782.jpg" title="Android M logo" width="640" /></a></div>
<h4 style="text-align: left;">
<br />The Android M developer preview was recently launched at Google I/O 2015 in San Francisco. At the conference, Google senior VP of Products Sundar Pichai said the company had "gone back to basics" with this new version of Android. While Android Lollipop introduced a new visual aesthetic, Android M brings some much-needed stability and usability improvements which might not be as eye-catching, but may prove to be significant additions for a while to come.</h4>
<h2 style="text-align: left;">
1. App permissions </h2>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyBQ1Z3XdTkt9OLzkbgZjz_RQSnbHhsckC2lpni7TyaHr4Zbr0tt6REGy4bp6Z9vRF8OzoBUu0CDipG0QT_SvUcpQEIRM_eOB1mwhh3tNwQe2FfGUBd9VeVz3n1VC3_SajOLo73c8CDoSK/s1600/h3yG8uF1.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="371" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyBQ1Z3XdTkt9OLzkbgZjz_RQSnbHhsckC2lpni7TyaHr4Zbr0tt6REGy4bp6Z9vRF8OzoBUu0CDipG0QT_SvUcpQEIRM_eOB1mwhh3tNwQe2FfGUBd9VeVz3n1VC3_SajOLo73c8CDoSK/s640/h3yG8uF1.jpeg" width="640" /></a></div>
<div>
<br /></div>
<br />
First up, app permissions. As had previously been speculated, app permissions have been overhauled in Android M, with users now being able to choose to accept or deny individual permissions as they see fit. Permissions have also been simplified. <br />
<br />
Permissions will now be requested the first time you try to use a feature, not at the point of installation. "You don't have to agree to permissions that don't make sense to you," Burke said, and used WhatsApp to give an example of how this works. <br />
<br />
If you want to record a voice message, WhatsApp will prompt you with a one-time request for permission to use your mic: if you still wish to give it access and record the message, you can, but you don't have to. Android M is giving users greater control of the information apps can access, and this is a truly positive step forward for Android. <br />
<br />
You can modify the permissions granted to apps at a later date in your Settings, or you can view permissions by type and see which apps have that permission granted. It's all about giving the user complete control over their Android.<br />
<h2 style="text-align: left;">
<br />2. Web experience</h2>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkY_lFvWlDlOdG-CCCeA2iVH3tXpuK5aGTVINDRbhC-BeMBRqIq92P9XHZd3Q7fUDWCyvP6QrHcZB47Rqu_dOgr9TjSZayQzfPU0obCB2Jxlo8fUJc2T5Cpbo6z64PhyphenhyphenTf4-KKDf-z5u10/s1600/chromecustomtab.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="354" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkY_lFvWlDlOdG-CCCeA2iVH3tXpuK5aGTVINDRbhC-BeMBRqIq92P9XHZd3Q7fUDWCyvP6QrHcZB47Rqu_dOgr9TjSZayQzfPU0obCB2Jxlo8fUJc2T5Cpbo6z64PhyphenhyphenTf4-KKDf-z5u10/s640/chromecustomtab.png" width="640" /></a></div>
<div>
<br /></div>
<br />
Google has been exploring trends in the way web content is consumed to provide a better user-experience when interacting with websites and apps. "Chrome Custom Tabs is a new feature that gives developers a way to harness all of Chrome's capabilities, while still keeping control of the look and feel of the experience," said Burke.<br />
<br />
Chrome Custom Tabs will allow apps to open a customized Chrome window on top of the active app, instead of launching the Chrome app separately. This will provide a faster and more intuitive user-experience when navigating between apps and the web. <br />
<br />
Chrome Custom Tabs supports automatic sign-in, saved passwords, autofill, and multi-process security to assist the integration of the app and web experience. So, for example, a Pinterest custom tab will have a Pinterest share button embedded in it, can include custom overflow menu options and doesn't require the Pinterest developers to build their own web browser.Android M will introduce standardized fingerprint support.<br />
<h2 style="text-align: left;">
3. Fingerprint support</h2>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKXW303L71X8CeT6KdV25v64CUKvLb9cElm7wKTP93RgY_1Cg-kZPJaE4K16g4pBRAnEktKnWPwoBmb5PfhVB5o5Ei3j6RM8X1VsjBrDHWWJndxFTByqlDuiCoL5R5YLwYvf85JU5X5ZWa/s1600/Fingerprint-support-Android-M.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="324" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKXW303L71X8CeT6KdV25v64CUKvLb9cElm7wKTP93RgY_1Cg-kZPJaE4K16g4pBRAnEktKnWPwoBmb5PfhVB5o5Ei3j6RM8X1VsjBrDHWWJndxFTByqlDuiCoL5R5YLwYvf85JU5X5ZWa/s640/Fingerprint-support-Android-M.jpg" width="640" /></a></div>
<div>
<br /></div>
<br />
Google will "standardize support" for fingerprint scanners on phones running Android M. The new functionality will allow fingerprint scanners to be used not only to unlock phones, but to make purchases shopping in real-life or within Play Store apps.<br />
<br />
Of course, your device will need a hardware fingerprint scanner to begin with, but with Google's full support, expect to see these appear on many more devices in the future. <br />
<h2 style="text-align: left;">
4. Mobile payments</h2>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUFhIqA70G8MUsCdhEJjiZERjhbxIdPXN48gPxcBzbX3vU9QP4W9-uRrdK2t9rhs1tdA5NSNXpt6gunPeFT9muA3KRYAitdmSQWEWucsVv3Mef3x_RHHon7PKvRFRpp4obpJZUG2Y83-yR/s1600/150529-android-m-developer-preview-google-io-android-pay.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="428" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUFhIqA70G8MUsCdhEJjiZERjhbxIdPXN48gPxcBzbX3vU9QP4W9-uRrdK2t9rhs1tdA5NSNXpt6gunPeFT9muA3KRYAitdmSQWEWucsVv3Mef3x_RHHon7PKvRFRpp4obpJZUG2Y83-yR/s640/150529-android-m-developer-preview-google-io-android-pay.jpeg" width="640" /></a></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
Android Pay is Google's new mobile payments system designed to make the checkout process easier and faster. Google is aiming to provide "simplicity, security, and choice," with Android Pay, allowing you to use your existing credit cards to pay for products in more than 700,000 stores in the US.<br />
<br />
Compatible with any device housing NFC capabilities (and running 4.4 KitKat or above), the Android Pay platform is being supported by American Express, Visa, Mastercard, and Discover, as well as carriers such as AT&T, Verizon and T-Mobile. Google's response to Apple pay is here. <br />
<h2 style="text-align: left;">
<br />5. App links </h2>
<br />
"When a user selects a weblink from somewhere, Android doesn't know whether to show it in a web-browser, or some other app that claims support for the link," this was the problem facing the Google developers before Android M. <br />
<br />
You may be familiar with the "Open with" dialogue box which appears when you try to open a link within an app on Android. You might be asked if you want to open a link with YouTube, or with Chrome, for example. <br />
<br />
App links are being changed in M so that Android has a greater awareness of which apps can open content directly, instead of stopping users every time with the dialog box. If you tap a Twitter link in an email, for example, the Twitter app will open automatically instead of prompting you to ask if you want to use Twitter to view it.<br />
<br />
This is almost a blink-and-you'll-miss-it improvement, but it's representative of Google's attention to detail: Android M is probably going to feel more usable without the user ever understanding why. <br />
<h2>
6. Power and charging</h2>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrF7keIFK13-Qej2glpWP19JBUziKPYeLd5grlfr6Os9aZf7EbYZAC5OCwHn3K_4M9j3OKikwwGIlONbSIoyR3Z4Hob49WsR9ypCKMvmICGOsZ8zScVZOvrpyweOiRbWdhe6IXO_G6vUTN/s1600/Android-M-power-and-charging-2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="354" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrF7keIFK13-Qej2glpWP19JBUziKPYeLd5grlfr6Os9aZf7EbYZAC5OCwHn3K_4M9j3OKikwwGIlONbSIoyR3Z4Hob49WsR9ypCKMvmICGOsZ8zScVZOvrpyweOiRbWdhe6IXO_G6vUTN/s640/Android-M-power-and-charging-2.jpg" width="640" /></a></div>
<br />
<br />
Android M makes use of a new function known as Doze to improve device standby time. By using motion detectors, Android will recognize when devices haven’t been interacted with for a while, such as when a person is asleep or a device has been left on a table, to reduce background processes.<br />
<br />
Burke said that Google tested two Nexus 9 devices, one running Lollipop and one running the Android M preview, and learned that M will provide up to two-times longer standby time. Even in Doze mode, your Android can still start alarms or notify you of priority notifications.<br />
<br />
Android M also supports USB Type-C which provides faster charging, and lets users charge other devices with their phone.Doze is going to bring up to two-times longer standby time compared to Android.<br />
<h2 style="text-align: left;">
Android M release date</h2>
<br />
The Android M Developer Preview is available now for Nexus 5, Nexus 6, Nexus 9 and Nexus Player, and the final version is due to launch in Q3, 2015. <br />
<h4 style="text-align: left;">
What else is in new in Android M?</h4>
<h3 style="text-align: left;">
Auto Backup and Restore for Apps</h3>
<br />
Possibly the most interesting aspect of Android M not discussed in Google’s I/O keynote speech was Android Auto Backup and Restore for Apps. This feature will be used in conjunction with Google Drive to automatically backup app data and settings with a file size of 25 MB or less.<br />
<br />
These backups occur no more than once per day, and run only when the device is idle and connected to Wi-Fi and power. The uploaded data does not count towards your Google Drive storage quota, and is encrypted.<br />
<br />
If you lose your device or delete the app, your previous progress will be restored the next time you install it, and it even works with apps which are side-loaded or accessed through a third-party app store.<br />
<br />
<h3 style="text-align: left;">
New app drawer</h3>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqA3okT8FX9Gs-HPUKHEWSgOx1NGMjoiA18A-InxAQp86srejqknOdted9CjAKWku1-4UwITS20CVd5CZRnOmeSOGaDySJV8L09zrYIV5WaxCyxI8-fRpliV5-reYzjOrHWRUy-Tadw1EM/s1600/15-1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqA3okT8FX9Gs-HPUKHEWSgOx1NGMjoiA18A-InxAQp86srejqknOdted9CjAKWku1-4UwITS20CVd5CZRnOmeSOGaDySJV8L09zrYIV5WaxCyxI8-fRpliV5-reYzjOrHWRUy-Tadw1EM/s400/15-1.png" width="223" /></a></div>
<div>
<br /></div>
<br />
One of the most immediately noticeable visual changes to Android M is the new app drawer. This now scrolls vertically instead of horizontally, and is held against a white background, rather than a muted shade of your homepage wallpaper. Across the top of the menu you will see your four most recently used apps, and down the left-hand side are the letters of the alphabet. <br />
<br />
<br />
<h3 style="text-align: left;">
Android M RAM manager </h3>
<br />
Google has introduced a new RAM manager to Android M with the aim of providing users with more accurate and comprehensible information regarding the maximum and average RAM usage of apps.<br />
<br />
The menu can be found in Settings > Apps > Options (three dots button) > Advanced > Memory. Though it's a little hard to navigate to, the page offers a far clearer insight into app demands, and the overall effect they will have on your device.<br />
<br />
With a reading of an individual app's RAM consumption, as well as how often it is running in the background, users will be able to better determine which apps should be removed in endless bid to increase device performance and battery life.<br />
<br />
Android M even includes a simple bar at the top of the page displaying the current performance status of a person's handset; if it says "good performance", you're likely running an efficient set of apps.The Android M logo.<br />
<br />
<h3 style="text-align: left;">
Adoptable Storage Devices</h3>
<br />
Though Google has in the past tried to step away from external storage use (the reason why none of its Nexus devices house a microSD card slot), it appears that Android M is striking a compromise.<br />
<br />
Adoptable Storage Devices is Google's new storage feature which essentially takes an external storage source (such as an SD card or USB drive) and formats it like an internal storage space. This means that app and personal data can be moved freely between a devices internal storage and its "adopted" storage source.<br />
<br />
Adopted storage devices are wrapped in a layer of encryption to soothe security concerns and both microSD cards and USB OTG drives are currently supported. <br />
<br />
<h3 style="text-align: left;">
Dark Theme</h3>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitNZ5xTYQJ87kbvFLjeeyWXsMg3uSkVM3uUJXVTjvTuPhFu_PeAv8Efd9-cziblVIFXXBcc1EtDnE4QDnreFl33EwWLseyMASGA0ONwPkiY2sUuBIUJT4nWhbbUAg68nDqwm5F0-CPBYjD/s1600/android-m-dark-light-theme-700x394.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitNZ5xTYQJ87kbvFLjeeyWXsMg3uSkVM3uUJXVTjvTuPhFu_PeAv8Efd9-cziblVIFXXBcc1EtDnE4QDnreFl33EwWLseyMASGA0ONwPkiY2sUuBIUJT4nWhbbUAg68nDqwm5F0-CPBYjD/s640/android-m-dark-light-theme-700x394.jpg" width="640" /></a></div>
<br />
<br />
Buried within the Android M settings is a "Dark theme" option which transforms the menu background to a dark grey color rather than the normal pale shade. Currently this only affects the settings menu, not the app drawer, and its function is purely cosmetic. Still, it looks nice on our Nexus 6 and we hope it gets developed further.<br />
<br />
<br />
<h3 style="text-align: left;">
Google Now </h3>
<br />
Google Now has been improved upon once again in Android M. Focusing on three key ares: being aware of different contexts, providing answers and helping you take action, Google Now is now smarter than ever.<br />
<br />
Google Now's context awareness understand over 100 million different places, so when you ask ''How far is it to there?'' Google Now know exactly which ''there'' you're referring to. This awareness is compounded by Google's Knowledge Graph, which understands one billion different entities, from sports teams to gas stations, TV shows to recipes.<br />
<br />
<br />
Google Now is also rolling out a pilot program called ''Now on Tap'' with 100 popular apps. Now on Tap provides Google Now-like content right where you are, without having to leave the app you're in. So if you're in Spotify and say ''Ok Google, what is his real name?'' Now on Tap will know you're talking about the musician you're listening to and provide search results right there an then.<br />
<br />
The same goes for content in emails. If someone asks you a question about a restaurant and to not forget something on your way home, Now on Tap can automatically pop up a restaurant card with Maps info, Yelp, OpenTable and the dialer, as well as offer to set a reminder for whatever it was you were supposed to not forget.<br />
<br />
<h3 style="text-align: left;">
Google Chrome </h3>
<br />
Chrome is also leaner and faster than ever before. Initially revamped with Android One devices in mind, where stable and speedy internet connections are not always possible, Chrome's new optimizations are set to arrive for everyone.<br />
<br />
Chrome is now aware of network strength and can modify what you see as a result. For example, if your connection is bad, you might see colored squares rather than preview images in Search results. Optimized web pages will load four times faster and use 80 percent fewer bytes. You'll also see a memory usage reduction of up to 80 MB. Chrome will also support offline mode.<br />
<br />
<br />
<h3 style="text-align: left;">
Google Photos </h3>
<br />
As expected, Google pulled the wraps off its new Google Photos service. Previously a part of Google+, Google Photos is now standalone photo and video storage and sharing service that provides unlimited free storage for up to 16 MP photos and 1080p video. That is seriously impressive.<br />
<br />
The Google Photos service stores high-quality compressed versions of your photos and movies but doesn't store anything on your device, so you can search through thousands of photos at high speed and without bogging your device down with gigabytes of photos.<br />
<br />
<br />
Popular features like Auto-Awesome and Stories are a key highlight, accessible through a new Assistant feature, which will automatically suggest creative uses of your images and footage. Through simple pinch gestures you can see tiled images for particular days, weeks, months or even years and then zoom right back in at any point you like.<br />
<br />
Google Photos is also powerful for search, as you'd expect. You can search by People, Places, Things and Types, which are all automatically created, and you can drill down in each of those categories to see, for example, every picture you have of a particular person, all without ever tagging them. <br />
<br />
Sharing is also a breeze. You don't even need you contacts to have the Google Photos app. You can simply share a link that they can view in Chrome. If they are logged in they can easily download an entire album in seconds.</div>
</div>
Anonymoushttp://www.blogger.com/profile/01030512546628251633noreply@blogger.com0tag:blogger.com,1999:blog-4875983166303707957.post-82832656576326819922015-04-21T00:19:00.000+06:002015-04-21T00:19:03.873+06:00Browse free internet using internet.org<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEii_q9u6F12SjWfo1NoIKqAcs86eyyCYgsP62iglRMQFh1N_tmSe_9L_Qc3_6MlyUkSoeS5xBEfjetbMvzwR02-T2g9CZhQOTpviUTUGJRJQiy-F7AzLWhyphenhyphenxZqt6Q0e9x4DsAQ_Tb7-kDDw/s1600/Internet.org_Logo.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEii_q9u6F12SjWfo1NoIKqAcs86eyyCYgsP62iglRMQFh1N_tmSe_9L_Qc3_6MlyUkSoeS5xBEfjetbMvzwR02-T2g9CZhQOTpviUTUGJRJQiy-F7AzLWhyphenhyphenxZqt6Q0e9x4DsAQ_Tb7-kDDw/s1600/Internet.org_Logo.jpg" height="223" width="400" /></a></div>
<br />
<br />
Thanx to Mr Mark Zuckerberg and his team as well as to our Government for giving us the Internet.org service in Bangladesh. From today that means from 21st of April anyone can access into the internet free of cost. This service will be available to another countries very soon and already this service is available in many countries.<br />
<br />
<br />
Lot of people does not know what is actually Internet.org is… so Internet.org is a Facebook-led initiative bringing together technology leaders, nonprofits and local communities to connect the two thirds of the world that doesn’t have internet access.Internet.org is making the internet available to every person on earth is a goal too large and too important for any one company, group or government to solve alone. Everyone participating in Internet.org has come together to meet this challenge because they believe in the power of a connected world.<br />
<br />
>> For using the free internet via Internet.org, a user has to download the internet.org app in his/her phone and those who doesn’t have the app he can easily visit <a href="http://www.internet.org/">www.internet.org</a> site to use free internet. so it is really easy to use <<<br />
<br />
internet.org app download link (apk file)---<br />
<br />
Google Play: <a href="http://is.gd/pbKTSU"><b>http://is.gd/pbKTSU</b></a><br />
<br />
mirror link: <a href="http://is.gd/TcLM96"><b>http://is.gd/TcLM96</b></a><br />
<br />
Shared link: <span style="font-family: "Calibri","sans-serif"; font-size: 11.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: Vrinda; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;"><b><a href="https://shared.com/ze2lql6kjy?s=l">https://shared.com/ze2lql6kjy?s=l</a> </b></span><br />
<div>
<br />
<div>
From Today Internet.org is available in Bangladesh and now anyone can access Facebook,Facebook Messenger,Whatsapp,Accu Weather, BBC News,Facts for Life,Newshunt,Social blood,USPN, cricinfo,Translator,Bing search,OLX,Wikipedia,Internet Basics,WikiHow and many other according to our country’s background free of cost!But sad thing is we can’t access to Google.com. So whatever it’s a very new beginning in connecting with the world in a very new way. <br />
<br />
<br />
<br />
<br /></div>
</div>
</div>
Anonymoushttp://www.blogger.com/profile/01030512546628251633noreply@blogger.com7tag:blogger.com,1999:blog-4875983166303707957.post-73263638300653637872015-03-22T16:10:00.000+06:002015-03-22T16:10:01.546+06:00Be Careful from KeyLogger!<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimL1y5NsVHBWuMaPS0yVcywFHOkahtQK3lJHcNsli75eiV8ZKygjf5BYHsSy_HnVUpU3-mH0T4tPRr4EZt-mTHmDFiRVtj1NfP3zLaxk3MIDLvXPXm1RXQMj3XtVLzQA7Sqce75WHevuGo/s1600/Keylogger.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimL1y5NsVHBWuMaPS0yVcywFHOkahtQK3lJHcNsli75eiV8ZKygjf5BYHsSy_HnVUpU3-mH0T4tPRr4EZt-mTHmDFiRVtj1NfP3zLaxk3MIDLvXPXm1RXQMj3XtVLzQA7Sqce75WHevuGo/s1600/Keylogger.png" height="320" width="320" /></a></div>
<h3 style="text-align: left;">
<br /></h3>
<h3 style="text-align: left;">
<br /></h3>
<h3 style="text-align: left;">
Know how it works:</h3>
Knowing how it works will help you make a better decision. A keylogger is a little piece of software that normally stays hidden in your system and collects information on the keys you press on your keyboard. This coupled with its ability to match these keystrokes with the application for which they are being pressed, make a keylogger an extremely dangerous hacking tool. As normally it resides in a system hidden, it can steal your information without you even noticing anything.<br /><br /><h3 style="text-align: left;">
Use good quality anti-keylogger software:</h3>
Anti-virus anti-malware software are a requirement for every user. But they may not be able to detect and remove keylogger software. For this, you should use specific anti-keylogger software. In fact, according to a report almost all anti-virus software failed to detect a keylogger in a controlled lab test. Only a specifically tailored anti-keylogger can make sure that your information stays safe and secure.<br /><h3 style="text-align: left;">
<br />Use secure communication channels:</h3>
As important and useful the worldwide web is, it is as much dangerous because of some people who use it for their nefarious designs. Some steal your information while others just like to bog down a system with excessive virus attacks. Make sure that you are using only secure websites for your communication, like emails, instant messaging and video calls etc. It is these unprotected sites that can spread these keylogger software easily. Avoid them at all costs for your communication needs.<br /><h3 style="text-align: left;">
<br />Be on alert:</h3>
The best possible way to protect your computer and your information is to be on alert. It is almost always when you do not take care and follow security precautions that you fall victim to these tricks and get your system infected with viruses. Putting your information at risk is not a good idea. But thinking that anti-virus software, or anti-keylogger software for that matter, will keep your system 100% secure is a mistake. If you are not on your guard, anyone can access your system physically and compromise your security wall, thus eliminating the need of tackling anti-virus over the internet. You also need to know which sites you are visiting and whether there is any Google or other security software advisory on that site. You should also avoid clicking on suspicious links, particularly those appearing in your email, asking for your private information.<br /><br /><h3 style="text-align: left;">
Stay updated:</h3>
You should also make sure that your system is updated with the latest system and anti-virus software security patches. This will ensure that your system is protected and can withstand attacks over the internet. In any case, you are the one who needs to be on guard more than your system.<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
</div>
Anonymoushttp://www.blogger.com/profile/01030512546628251633noreply@blogger.com0tag:blogger.com,1999:blog-4875983166303707957.post-4035947415506417302014-12-19T15:09:00.001+06:002014-12-19T15:13:46.208+06:00Now Anyone can Learn Programming with Code.org<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEignH1FQBYoCjBkXf3vO2atD4rHcXIaMWzT-biGP-87Z2D2h3f40VsvXZo1JTKzh0DiqexAymVxBkzbke-Ra5aGdW5xVi1qyQ655THTIuyS5l5qllpRfM_lEz_w6B2jhnPMf0jqpmHBIbUy/s1600/fuNTwVS2qst544YQtMjLMA-code-logo-640x640.png" imageanchor="1"><img alt="" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEignH1FQBYoCjBkXf3vO2atD4rHcXIaMWzT-biGP-87Z2D2h3f40VsvXZo1JTKzh0DiqexAymVxBkzbke-Ra5aGdW5xVi1qyQ655THTIuyS5l5qllpRfM_lEz_w6B2jhnPMf0jqpmHBIbUy/s1600/fuNTwVS2qst544YQtMjLMA-code-logo-640x640.png" height="320" title="Code.org" width="320" /></a></div>
<div>
<b><br /></b></div>
<b></b><br />
<div>
<b><b><br /></b></b></div>
<b>
<a href="http://code.org/" target="_blank">Code.org</a></b> is a non-profit organization and eponymous website led by brothers Hadi and Ali Partovi that aims to encourage people, particularly school students in the United States, to learn computer science. The website includes free coding lessons, and the initiative also targets schools in an attempt to encourage them to include more computer science classes in the curriculum. On December 9, 2013, they launched the Hour of Code 2013 challenge nationwide to promote computer science during computer science week until December 15, 2013. Major tech companies and their founders, including Bill Gates and Facebook’s Mark Zuckerberg, have put up about $10 million for Code.org.<br />
<h2 style="text-align: left;">
<br /></h2>
<h2 style="text-align: left;">
Goals:</h2>
<h4 style="text-align: left;">
According to its website, Code.org has the following goals:</h4>
<div style="text-align: left;">
Bringing Computer Science classes to every K-12 school in the United States, especially in urban and rural neighborhoods.</div>
Demonstrating the successful use of online curriculum in public school classrooms<br />
Changing policies in all 50 states to categorize C.S. as part of the math/science "core" curriculum<br />
Harnessing the collective power of the tech community to celebrate and grow C.S. education worldwide<br />
Increasing the representation of women and students of color in the field of Computer Science.<br />
<h2 style="text-align: left;">
<br /></h2>
<h2 style="text-align: left;">
Launch and first video release:</h2>
Code.org was launched in January 2013 by Hadi and Ali Partovi, with the goal of making programming accessible to everyone. Their initial focus was on creating a database of all computer science classrooms in the United States. The launch was covered in a number of technology publications online, includingTechCrunch,and Geekosystem. In late February 2013, a month after launch, they released a video featuring Mark Zuckerberg, Bill Gates, Jack Dorsey and other programmers and entrepreneurs on the importance of learning to code. This video was covered in a number of news sources. Two weeks after the launch, TechCrunch reported that the video had been a "blockbuster hit".<br />
<h2 style="text-align: left;">
<br /></h2>
<h2 style="text-align: left;">
Hour of Code challenge:</h2>
During Computer Science Education Week from December 9 to December 15, 2013, Code.org launched the "Hour of Code Challenge" on its website to teachcomputer science to school students, enticing them to complete short programming tutorials. The challenge involved getting people to write short snippets of code to achieve pre-specified goals using Blockly, a visual programming language of a similar flavor as Logo. The initiative had been announced about two months in advance. At the time of launch, the initiative was supported by United States President Barack Obama as well as leaders of many technology companies such as Microsoft and Apple Inc..About two weeks later, it was announced that over 20 million people had participated and over 600 million lines of code had been written as part of the challenge.<br />
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
</div>
Anonymoushttp://www.blogger.com/profile/01030512546628251633noreply@blogger.com0tag:blogger.com,1999:blog-4875983166303707957.post-58384810026689793562014-11-28T14:48:00.000+06:002014-11-28T14:48:24.839+06:00Why using VPN is important<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWcpE3S_mz74cGavxXBnxplOTT4p5uKJzwsqRuqMi_Yh7CMXChMGBQG7Aga5H6OO_6Luch55WPtQU5guAYcYYY2qmuVGjknP5f1lGalCQLUblwmPApZnmT0qw8H4FUiy1f-nLFX6E9f-Y1/s1600/What-is-a-VPN-650x250.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWcpE3S_mz74cGavxXBnxplOTT4p5uKJzwsqRuqMi_Yh7CMXChMGBQG7Aga5H6OO_6Luch55WPtQU5guAYcYYY2qmuVGjknP5f1lGalCQLUblwmPApZnmT0qw8H4FUiy1f-nLFX6E9f-Y1/s1600/What-is-a-VPN-650x250.png" height="244" width="640" /></a></div>
<div>
<br /></div>
<div>
<br /></div>
Here are three words for you: Virtual Private Network (more commonly referred to as VPN). If you’ve never heard of the term, or aren’t sure about its exact nature in our info tech world, then chances are you’ve never utilized one. A VPN is facilitated for several reasons, by individuals and the business sector alike. Anyone who initiates one for their time on the internet will have a variety of reasons. They can vary according to the individual’s needs and wants; scaling from minimal personal usage to access international television programs not available in their region, to encryption and security during time spent in cyberspace. In essence, a VPN is used to secure and encrypt communications when using an untrusted network which is in the public domain.<br /><br />The latter is the more common theme. In this day and age where big brother seems to lurk in every corner of our internet browser, more and more people, and companies, are resorting to the use of a VPN provider. In fact, as people are educating themselves on the realms of the digital jungle that is fast becoming a second home, the VPN is becoming a common household name. And why not? With hackers at the ready to steal your sensitive information, and government regimes watching and monitoring your every move, the VPN is now an essential addition to add to our daily internet rituals. In essence, public networks are cesspits, and if we dwell in them too long, without the correct protective elements, then we tend to ‘pick up’ those bugs which dwell in them.<br /><br />When you use a VPN, the usual presentation is to launch a VPN client on your personal computer. You log in; your computer then “exchanges trusted keys with a server,” and once both systems have been authentically verified, your communication on the internet is secure.<br /><br />However, not all VPNs are created equally. When searching for the right VPN for your own use, it is important to know what it is you are signing up for, and who with. You need to take into consideration connectivity protocols, features and server locations. The best VPNs will offer a good selection on these criteria. Most importantly, the VPN Provider should have a so called ‘no-logging policy’ which ensures that no user activity will be logged.<br /><br />You need to be aware of other considerations such as trusting your provider with your data. In other words, what do they log? Everything outside of your VPN server is secure from eavesdropping, but those sharing the same provider may have access to your data. Some VPN providers keep logs in case a government requests them, so decide what is acceptable to you when it comes to logging. AnonHQ recommends IPVanish as it fulfills all criteria regarding speed, security, support of all mobile devices and most importantly anonymity and safety: <b>“IPVanish does not collect or log any traffic or use of its Virtual Private Network service”</b><br /><br />Other features you may want to consider are:<br />Does your VPN provider offers Anti Malware/Spyware?<br />Do you have the option of securing your phone along with your computer via Mobile Apps?<br />Pricing of the provider.<br />Exit Servers if you want a country specific VPN.<br /><br />Essentially, the million dollar question to ask yourself when you are considering a VPN (or not) is: how secure do you want to be next time you surf the net?<div>
<br /></div>
Links: <a href="http://ipvanish.com/?a_aid=anonymous">IPVanish VPN</a> (recommended by AnonHQ.com)<div>
<br /></div>
<div>
.................................................................................Collected From <b>http://anonhq.com</b>/ </div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
</div>
Anonymoushttp://www.blogger.com/profile/01030512546628251633noreply@blogger.com0tag:blogger.com,1999:blog-4875983166303707957.post-35049894306344511982014-11-08T17:16:00.003+06:002014-11-08T17:16:54.733+06:00First Microsoft Lumia phone to be revealed on 11th November 2014<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidObAIlwF6_VAWrrN9IECndzI52YbzFnFwrvwLNir1kfKpZC34KjFxEgFcKXR_l7OoIoGlP2VSujWW9CTYuI3O3Yf-IS18kmIWCb-sKwP0TLyKd5asOAY3oNzPFIn6iZf0AxgwSNZLdCMQ/s1600/Lumia+copy.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidObAIlwF6_VAWrrN9IECndzI52YbzFnFwrvwLNir1kfKpZC34KjFxEgFcKXR_l7OoIoGlP2VSujWW9CTYuI3O3Yf-IS18kmIWCb-sKwP0TLyKd5asOAY3oNzPFIn6iZf0AxgwSNZLdCMQ/s1600/Lumia+copy.jpg" height="428" width="640" /></a></div>
<br />
<br />
<br />
The first Microsoft Lumia smartphone is looming, with its unveiling set for Tuesday,11.11.2014<br />
<br />
The company posted late Thursday a teaser of a smartphone with #MoreLumia hashtag, showing off an orange frame around what is presumably the front of the camera.<br />
<br />
The new Lumia smartphone will mark the first time the product line drops the Nokia moniker in favor of Microsoft's name, signifying a new chapter for the mobile devices, which have struggled in the marketplace. The smartphones, which have featured bright colors and a reputation for powerful cameras, barely make a dent as far as sales go, except in a few emerging markets. But Lumia smartphones may have a new lease on life under Microsoft -- at least that's the company's hope.<br />
<br />
"Microsoft is delivering the power of everyday mobile technology to everyone," states the new post on the renamed Conversations blog where Microsoft and previously Nokia share Lumia-related news.<br />
<br />
The Windows Phone operating system likewise needs a spark. The OS has yet to catch on and powers just 2.5 percent of the world's mobile devices, according to market researcher IDC. In comparison, Google's Android OS runs on nearly 85 percent of mobile devices worldwide.<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8wTd6lE7L7tWCidq6I5Ivh09FHdBu3qnDEBIw_Tixw6MthPq9GJ-i1VTtJ_hDf2mvcPlmkRyyVPO4jN4bFx58QYP2Bru6BhRN3l9QaDkqglgJa5hwKgT6RC_sMj64zjlnzVpd-OyMSQoF/s1600/microsoft-lumia-logo-orange.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8wTd6lE7L7tWCidq6I5Ivh09FHdBu3qnDEBIw_Tixw6MthPq9GJ-i1VTtJ_hDf2mvcPlmkRyyVPO4jN4bFx58QYP2Bru6BhRN3l9QaDkqglgJa5hwKgT6RC_sMj64zjlnzVpd-OyMSQoF/s1600/microsoft-lumia-logo-orange.jpg" height="238" width="320" /></a></div>
<br />
<br />
The orange frame of the teaser image ties together with the orange image that Microsoft revealed last month that touted the Microsoft logo alone. Although the image showed only part of what could be a new smartphone, the company name and Windows-shaped logo aren't actually joined by the word Lumia.<br />
<br />
<br />
"We are looking forward to unveiling a Microsoft Lumia device soon," Tuula Rytilä, senior vice president of marketing of phones for Microsoft, said at the time, while denying that the name change would render today's Nokia Lumia phones obsolete.<br />
<br />
The logo switch is part of Microsoft's effort to more fully take control over its new smartphone business. The Lumia line plays an important role as an ambassador of sorts for the company's Windows Phone platform. Even before Microsoft acquired Nokia's mobile devices unit for $7.2 billion in April, the Lumia smartphone line was often used to tout the latest version of Windows Phone.<br />
<br />
Microsoft has increasingly attempted to push its platforms through its own efforts in hardware. On the Windows side, Microsoft has its Surfacetablets, which despite a rough start are beginning to see momentum. The company reported revenue of $908 million on Surface sales in its fiscal first quarter that ended September 30, up 127 percent from a year ago. It's hoping to do the same with the Lumia line of smartphones.<br />
<br />
Even as Microsoft's logo begins to take over, the company has said the Nokia name will remain on entry-level devices, which continue to resonate in emerging markets.<br />
<br />
<br />
<br />
<br />
<br /></div>
Anonymoushttp://www.blogger.com/profile/01030512546628251633noreply@blogger.com0tag:blogger.com,1999:blog-4875983166303707957.post-75447377956345804542014-11-06T23:33:00.000+06:002014-11-06T23:36:06.582+06:00Researchers Discover New 'WireLurker' Malware Affecting Macs and iOS Devices in China<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjacbxK6PmzXBCg_9aZUOXLLXPOBw6c0TobUnH8V0VAR14tKJlUq9loQkDM75WOsGAytTPiEtYHGQ2bCByMbwBQCHPQhcswKRduh7YKFwAd9MBNpSGoYj1zr1a-SYHraiIwYPwMNiIU_Pol/s1600/wirelurker-malware-20141106.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjacbxK6PmzXBCg_9aZUOXLLXPOBw6c0TobUnH8V0VAR14tKJlUq9loQkDM75WOsGAytTPiEtYHGQ2bCByMbwBQCHPQhcswKRduh7YKFwAd9MBNpSGoYj1zr1a-SYHraiIwYPwMNiIU_Pol/s1600/wirelurker-malware-20141106.jpg" height="360" width="640" /></a><span style="text-align: left;"></span></div>
<div class="separator" style="clear: both; text-align: center;">
<span style="text-align: left;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<o:p style="text-align: left;"> </o:p><span style="text-align: left;">Most people today know that Apple products aren’t bulletproof, but 350,000 Mac and iPhone users in China are finding that out the hard way. New malware called WireLurker is quietly stealing data from their devices.</span></div>
It’s a nasty little infection, too. Once it has infected a Mac, WireLurker waits in the shadows for an iOS device to be plugged it. It then takes advantage of Apple’s trusted pairing to siphon specific data off the device, including its serial number, phone number, and iTunes store identifier.<br />
The device doesn’t have to be<a href="http://aacfahim.blogspot.com/2014/11/jailbreak-ios-8-or-81.html" target="_blank"> jailbroken</a> for WireLurker to infect it (the malware abuses Apple’s enterprise provisioning plumbing to pull that off), but jailbroken devices do get special attention. WireLurker steals additional info from the iMessage history, address book, and a handful of other files. According to security researcher Johnathan Zdziarski, WireLurker’s primary target doesn’t appear to be the data in the devices it infects. Rather, it seems as though it’s trying to identify software pirates — nice to know, but not necessarily all that reassuring. Someone is still pushing your personal information to a remote server.<br />
<br />
<a href="http://www.geek.com/wp-content/uploads/2014/10/iMac-2.jpg"><img border="0" src="file:///C:/Users/Fahim/AppData/Local/Temp/msohtmlclip1/02/clip_image001.jpg" /></a><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOmzofDWUtN3olN4yK_Y81N_uQwm_EzmZcPan1a2aEn8InV41Pd7bpX321TPACmVsf4NbYU79-uogQtDgVmq4R_MdXW4ripoCXt-KjOLd9sSwvqsrkqEIaneko6j9di05J1kwfPHH-B6nW/s1600/iphone-malware.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOmzofDWUtN3olN4yK_Y81N_uQwm_EzmZcPan1a2aEn8InV41Pd7bpX321TPACmVsf4NbYU79-uogQtDgVmq4R_MdXW4ripoCXt-KjOLd9sSwvqsrkqEIaneko6j9di05J1kwfPHH-B6nW/s1600/iphone-malware.jpg" height="260" width="400" /></a></div>
<div>
WireLurker also tries to sneak malicious apps onto the device while it’s connected — and many users won’t even notice their installation. Zdziarski says that “user education is the biggest problem” when it comes to WireLurker, adding that “Apple has a poor reputation for helping their users make smarter decisions about security.”<br />
<br /></div>
<div>
The good news is that there are tools out there to combat WireLurker. Palo Alto Networks offers a free WireLurker detector, and you’re probably not in any danger of infection if you don’t download warez from shady websites.</div>
<div>
If your Mac is clean, then you should be fine. Just don’t go plugging your iPhone or iPad into someone else’s Mac for a little recharge or to swap some files without knowing whether or not it’s clean. You could end up transferring more than you wanted to.</div>
<div>
<br />
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
</div>
Anonymoushttp://www.blogger.com/profile/01030512546628251633noreply@blogger.com0tag:blogger.com,1999:blog-4875983166303707957.post-53741767248271538092014-10-30T22:37:00.001+06:002014-10-30T22:38:46.339+06:00Remove Shortcut Virus permanently from your Computer<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEvHW030fRriCb6V7uvQmThhIf7IuSeUIppWb0HUzoGBSmA2sRsYF9ddSmQ8blbk57up3FbbmhKKW_bLcRqAIq-jxhlmy7kC6HIzV-l77-U_fGrldpIFNAwZPpm2LyzVhLVh00khuKhyphenhyphen4z/s1600/COMMAND2.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEvHW030fRriCb6V7uvQmThhIf7IuSeUIppWb0HUzoGBSmA2sRsYF9ddSmQ8blbk57up3FbbmhKKW_bLcRqAIq-jxhlmy7kC6HIzV-l77-U_fGrldpIFNAwZPpm2LyzVhLVh00khuKhyphenhyphen4z/s1600/COMMAND2.gif" height="257" width="320" /></a></div>
<br />
Shortcut virus has become a common problem in almost all the computer users. actually its not a virus its a VBS Script. To get rid of this problem You have to do some simple task on your computer system. so here's some method>>>><br />
<h3 style="text-align: left;">
<br /></h3>
<h3 style="text-align: left;">
Using CMD</h3>
<br />
1. Open CMD (Command Prompt – DOS, go to start then search cmd)<br />
2. Type the command word foe word<br />
<div>
<b><br /></b></div>
<div>
<b>attrib -h -s -r -a /s /d DriveName:*.*</b></div>
<div>
<b><br /></b></div>
<div>
Now Type the drive letter which you want to delete the short cut virus in stead of <b>DriveName </b>For example: if you want to make virus free C drive then it will be : attrib -h -s -r -a /s /d c:*.*<br />
3. Hit the Enter button<br />
4. So you'll see that your computer is back to normal now.<br />
<h3>
<br /></h3>
<h3>
Using <b>.bat</b></h3>
</div>
<div>
Bat file is a executable file that is written in notepad. once it is cliked it will start its action.</div>
<div>
<br />
1. Open Notepad</div>
<div>
2. Copy this code :<br />
<br />
<b>@echo off<br />attrib -h -s -r -a /s /d </b><b>DriveName</b><b>:*.*</b></div>
<div>
<b>attrib -h -s -r -a /s /d </b><b>DriveName</b><b>:*.*</b></div>
<div>
<b>attrib -h -s -r -a /s /d </b><b>DriveName</b><b>:*.*</b></div>
<div>
<b>@echo complete.</b><br />
<br />
3. Now Type the drive letter which you want to delete the short cut virus in stead of <b>DriveName </b><br />
4. Give this file's name <b>removevirus.bat</b> and save it in your convenient place of your PC<br />
5. Now close the file and open it by double click<br />
6. Now Your Computer is virus free (*not all kind of virus*)<br />
<br />
<h3 style="text-align: left;">
To save from victimised pendrive</h3>
</div>
<div>
1. Go to RUN<br />
2. Type <b>wscript.exe </b> then press ENTER<br />
3. Type <b>1 </b>in <b>Stop script after specified number of seconds:</b> and then APPLY .</div>
<div>
<br />
<h3>
To save victimised PC</h3>
</div>
<div>
<br />
1. Type <b>CTRL+SHIFT+ESC</b> from your keyboard<br />
2. Go to <b>PROCESS </b>tab<br />
3. Select <b>wscript.exe </b>file<br />
4. Click <b>End Process</b><br />
5. Now Go to <b>C:/ </b>drive on your computer<br />
6. search <b>wscript </b>in search box<br />
7.<b> SHIFT+DELETE </b>all the file<b> </b>named <b>wscript</b><br />
8. skip those file which are not deleting<br />
9. Now go to RUN</div>
<div>
2. Type <b>wscript.exe </b> then press ENTER<br />
3. Type <b>1 </b>in <b>Stop script after specified number of seconds:</b> and then APPLY .</div>
<div>
<br /></div>
<div>
Thats it! Now your computer is free from ShortCut Virus!</div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
</div>
Anonymoushttp://www.blogger.com/profile/01030512546628251633noreply@blogger.com0tag:blogger.com,1999:blog-4875983166303707957.post-39292663586290930032014-10-20T17:33:00.000+06:002014-10-20T17:38:38.380+06:00Brute-Force Attacks Explained: How All Encryption is Vulnerable<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVwGJid_am50PlKW3vGLyTc-3xR0dkMyUiwmfBJLFjz5nxTRmZ_brm2DAg3m4c3AsQvvsSA1VXNejIddVLtbhcylC0R31c-7OkC6qzLkvk5VtUwmi-SZFRBM1XIhKbgdxVhsKtAonwVuy0/s1600/term-bruteforce.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVwGJid_am50PlKW3vGLyTc-3xR0dkMyUiwmfBJLFjz5nxTRmZ_brm2DAg3m4c3AsQvvsSA1VXNejIddVLtbhcylC0R31c-7OkC6qzLkvk5VtUwmi-SZFRBM1XIhKbgdxVhsKtAonwVuy0/s1600/term-bruteforce.png" height="240" width="320" /></a></div>
Brute-force attacks are fairly simple to understand, but difficult to protect against. Encryption is math, and as computers become faster at math, they become faster at trying all the solutions and seeing which one fits.<br />
These attacks can be used against any type of encryption, with varying degrees of success. Brute-force attacks become faster and more effective with each passing day as newer, faster computer hardware is released.<br />
<h2 style="text-align: left;">
</h2>
<h2 style="text-align: left;">
</h2>
<h2 style="text-align: left;">
Brute-Force Basics</h2>
<br />
Brute-force attacks are simple to understand. An attacker has an encrypted file — say, yourLastPass or KeePass password database. They know that this file contains data they want to see, and they know that there’s an encryption key that unlocks it. To decrypt it, they can begin to try every single possible password and see if that results in a decrypted file.<br />
<br />
They do this automatically with a computer program, so the speed at which someone can brute-force encryption increases as available computer hardware becomes faster and faster, capable of doing more calculations per second. The brute-force attack would likely start at one-digit passwords before moving to two-digit passwords and so on, trying all possible combinations until one works.<br />
<br />
A “dictionary attack” is similar and tries words in a dictionary — or a list of common passwords — instead of all possible passwords. This can be very effective, as many people use such weak and common passwords.<br />
<h2 style="text-align: left;">
<br /></h2>
<h2 style="text-align: left;">
Why Attackers Can’t Brute-Force Web Services</h2>
<br />
There’s a difference between online and offline brute-force attacks. For example, if an attacker wants to brute-force their way into your Gmail account, they can begin to try every single possible password — but Google will quickly cut them off. Services that provide access to such accounts will throttle access attempts and ban IP addresses that attempt to log in so many times. Thus, an attack against an online service wouldn’t work too well because very few attempts can be made before the attack would be halted.<br />
<br />
For example, after a few failed login attempts, Gmail will show you a CATPCHA image to verify you aren’t a computer automatically trying passwords. They’ll likely stop your login attempts completely if you managed to continue for long enough.<br />
<br />
<img alt="" border="0" src="http://cdn8.howtogeek.com/wp-content/uploads/2013/07/650x554xgmail-captcha.png.pagespeed.ic.tLlrclI418.png" title="Gmail" /><br />
<br />
On the other hand, let’s say an attacker snagged an encrypted file from your computer or managed to compromise an online service and download such encrypted files. The attacker now has the encrypted data on their own hardware and can try as many passwords as they want at their leisure. If they have access to the encrypted data, there’s no way to prevent them from trying a large number of passwords in a short period of time. Even if you’re using strong encryption, it’s to your benefit to keep your data safe and ensure others can’t access it.<br />
<h2 style="text-align: left;">
<br /></h2>
<h2 style="text-align: left;">
Hashing</h2>
<br />
Strong hashing algorithms can slow down brute-force attacks. Essentially, hashing algorithms perform additional mathematical work on a password before storing a value derived from the password on disk. If a slower hashing algorithm is used, it will require thousands of times as much mathematical work to try each password and dramatically slow down brute-force attacks. However, the more work required, the more work a server or other computer has to do each time as user logs in with their password. Software must balance resilience against brute-force attacks with resource usage.<br />
<h2 style="text-align: left;">
<br /></h2>
<h2 style="text-align: left;">
Brute-Force Speed</h2>
<br />
Speed all depends on hardware. Intelligence agencies may build specialized hardware just for brute-force attacks, just as Bitcoin miners build their own specialized hardware optimized for Bitcoin mining. When it comes to consumer hardware, the most effective type of hardware for brute-force attacks is a graphics card (GPU). As it’s easy to try many different encryption keys at once, many graphics cards running in parallel are ideal.<br />
<br />
At the end of 2012, Ars Technica reported that a 25-GPU cluster could crack every Windows password under 8 characters in less than six hours. The NTLM algorithm Microsoft used just wasn’t resilient enough. However, when NTLM was created, it would have taken much longer to try all these passwords. This wasn’t considered enough of a threat for Microsoft to make the encryption stronger.<br />
<br />
Speed is increasing, and in a few decades we may discover that even the strongest cryptographic algorithms and encryption keys we use today can be quickly cracked by quantum computers or whatever other hardware we’re using in the future.<br />
<br />
<img border="0" src="http://cdn8.howtogeek.com/wp-content/uploads/2013/07/650x488x25-gpu-password-cracking-cluster.jpg.pagespeed.ic.XeITcXZIbV.webp" /><br />
<h2 style="text-align: left;">
<br /></h2>
<h2 style="text-align: left;">
Protecting Your Data From Brute-Force Attacks</h2>
<br />
There’s no way to protect yourself completely. It’s impossible to say just how fast computer hardware will get and whether any of the encryption algorithms we use today have weaknesses that will be discovered and exploited in the future. However, here are the basics:<br />
<div>
<br />
●<span style="font-family: Verdana, sans-serif; font-size: 14.5pt;"> </span>Keep your encrypted data safe where attackers can’t get access to it. Once they have your data copied to their hardware, they can try brute-force attacks against it at their leisure.</div>
<div>
<br />
● If you run any service that accepts logins over the Internet, ensure that it limits login attempts and blocks people who attempt to log in with many different passwords in a short period of time. Server software is generally set to do this out of the box, as it’s a good security practice.</div>
<div>
<br />
●<span style="font-family: Verdana, sans-serif; font-size: 14.5pt;"> </span>Use strong encryption algorithms, such as SHA-512. Ensure you’re not using old encryption algorithms with known weaknesses that are easy to crack.</div>
<div>
<br />
● Use long, secure passwords. All the encryption technology in the world isn’t going to help if you’re using “password” or the ever-popular “hunter2″.<br />
<br />
Brute-force attacks are something to be concerned about when protecting your data, choosing encryption algorithms, and selecting passwords. They’re also a reason to keep developing stronger cryptographic algorithms — encryption has to keep up with how fast it’s being rendered ineffective by new hardware.<br />
<br />
<br />
<br /></div>
</div>
Anonymoushttp://www.blogger.com/profile/01030512546628251633noreply@blogger.com0tag:blogger.com,1999:blog-4875983166303707957.post-33260310756266633142014-10-15T23:44:00.001+06:002014-10-15T23:44:57.633+06:00Things to do after being Hacked ? part 2<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfSggXykYOo6C51wHlN5isnCeM7YYr8CtxhGXZ4qdURoqc-iKxXtGX5A8aZcoJkhtMQmrynpE5qLjRdZhC9mfA3lV0UD2dp25RhxfaLq0_NwyfHfuXw5E5hXAdt62FpkeW7bSztGFoP2se/s1600/GAAGAA.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfSggXykYOo6C51wHlN5isnCeM7YYr8CtxhGXZ4qdURoqc-iKxXtGX5A8aZcoJkhtMQmrynpE5qLjRdZhC9mfA3lV0UD2dp25RhxfaLq0_NwyfHfuXw5E5hXAdt62FpkeW7bSztGFoP2se/s1600/GAAGAA.jpg" height="246" width="400" /></a></div>
<br />You opened an e-mail attachment that you probably shouldn't have and now your computer has slowed to a crawl and other strange things are happening. Your bank called you saying there has been some strange activity on your account and your ISP has just "null routed" all traffic from your computer because they claim it is now part of a zombie botnet. All this and it's only Monday.<br /><br />If your computer has been compromised and infected with a virus or other malware you need to take action to keep your files from being destroyed and also to prevent your computer from being used to attack other computers. Here are the basic steps you need to perform to get back to normal after you've been hacked.<br /><h3 style="text-align: left;">
1. Isolate Your Computer</h3>
In order to cut the connection that the hacker is using to "pull the strings" on your computer, you need to isolate it so that it can't communicate on a network. Isolation will prevent it from being used to attack other computers as well as preventing the hacker from continuing to be able to obtain files and other information. Pull the network cable out of your PC and turn off the Wi-Fi connection. If you have a laptop, there is often a switch to turn the Wi-Fi off. Don't rely on doing this through software, as the hacker's malware may tell you something is turned off when it is really still connected.<br /><h3 style="text-align: left;">
2. Shutdown and remove the hard drive and connect it to another computer as a non-bootable drive</h3>
If your computer is compromised you need to shut it down to prevent further damage to your files. After you have powered it down, you will need to pull the hard drive out and connect it to another computer as a secondary non-bootable drive. Make sure the other computer has up-to-date anti-virus and anti-spyware. You should probably also download a free rootkit detection scanner from a reputable source like Sophos.<br /><br />If you don't feel comfortable removing a hard drive yourself or you don't have a spare computer then you may want to take your computer to a reputable local PC repair shop.To make things a little easier, consider purchasing a USB drive caddy to put your hard drive in to make it easier to connect to another PC. If you don't use a USB caddy and opt to connect the drive internally instead, make sure the dip switches on the back of your drive are set as a secondary "slave" drive. If it is set to "master" it may try to boot the other PC to your operating system and all hell could break loose again.<br /><h3 style="text-align: left;">
3. Scan your drive for infection and malware</h3>
Use the other host PC's anti-virus ,anti-spyware, and anti-rootkit scanners to ensure detection and removal of any infection from the file system on your hard drive.<br /><h3 style="text-align: left;">
<br />4. Backup your important files from the previously infected drive</h3>
You'll want to get all your personal data off of the previously infected drive. Copy your photos, documents, media, and other personal files to DVD, CD, or another clean hard drive.<br /><br /><h3 style="text-align: left;">
5. Move your drive back to your PC</h3>
Once you have verified that your file backup has succeeded, you can move the drive back to your old PC and prepare for the next part of the recovery process. Set your drive's dip switches back to "Master" as well.<h3>
6. Completely wipe your old hard drive (repartition, and format)</h3>
Even if virus and spyware scanning reveals that the threat is gone, you should still not trust that your PC is malware free. The only way to ensure that the drive is completely clean is to use a hard drive wipe utility to completely blank the drive and then reload your operating system from trusted media.<br /><br />After your have backed up all your data and put the hard drive back in your computer, use a secure disk erase utility to completely wipe the drive. There are many free and commercial disk erase utilities available. The disk wipe utilities may take several hours to completely wipe a drive because they overwrite every sector of the hard drive, even the empty ones, and they often make several passes to ensure they didn't miss anything. It may seem time-consuming but it ensures that no stone is left unturned and it's the only way to be sure that you have eliminated the threat.<h3 style="text-align: left;">
7. Reload the operating system from trusted media and install updates</h3>
Use your original OS disks that you purchased or that came with your computer, do not use any that were copied from somewhere else or are of unknown origin. Using trusted media helps to ensure that a virus present on tainted operating system disks doesn't reinfect your PC.<br /><br />Make sure to download all updates and patches for your operating system before installing anything else.<br /><br /><h3 style="text-align: left;">
8. Reinstall anti-virus, anti-spyware, and other security software prior to any other programs.</h3>
Before loading any other applications, you should load and patch all your security related software. You need to ensure your anti-virus software is up-to-date prior to loading other applications in case those apps are harboring malware that might go undetected if your virus signatures aren't current<br /><h3 style="text-align: left;">
9. Scan your data backup disks for viruses before your copy them back to your computer</h3>
Even though you are fairly certain that everything is clean, always scan your data files prior to reintroducing them back into your system.<br /><br /><h3 style="text-align: left;">
10. Make a complete backup of your system</h3>
Once everything is in pristine condition you should do a complete backup so that if this ever happens again you won't spend as much time reloading your system. Using a backup tool that creates a bootable hard drive image as a backup will help speed up future recoveries immensely.<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
</div>
Anonymoushttp://www.blogger.com/profile/01030512546628251633noreply@blogger.com0tag:blogger.com,1999:blog-4875983166303707957.post-78324470720305358362014-10-12T23:11:00.002+06:002014-10-13T11:06:37.423+06:00What's a verified facebook profile or Page and How To Get Verified on Facebook ?<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhE1v7xgMFiwKfJt9Fp5iks9FeYSlO3RZb7mYUr9nczJy-iKyCmaT0SbFRxe4HJRGPQt6YuSNiS94HEs5P284CL3qxB4rkjO49kCWSKKkiecXFhepVRuUYBgmKmQvQbY7FyIrdiEZhIj3P/s1600/Facebook-Verified-Account-Logo.png" style="margin-left: 1em; margin-right: 1em;"><img alt="" border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhE1v7xgMFiwKfJt9Fp5iks9FeYSlO3RZb7mYUr9nczJy-iKyCmaT0SbFRxe4HJRGPQt6YuSNiS94HEs5P284CL3qxB4rkjO49kCWSKKkiecXFhepVRuUYBgmKmQvQbY7FyIrdiEZhIj3P/s1600/Facebook-Verified-Account-Logo.png" title="blue badge" width="200" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div>
<br /></div>
Some well-known public figures and Pages with large followings are verified by Facebook as having an authentic identity. You'll see a blue badge next to a verified profile or Page's name. These profiles and Pages may include:<br />
<br />
◄ Celebrities<br />
<br />
◄ Journalists<br />
<br />
◄ Government officials<br />
<br />
◄ Popular brands and businesses<br />
<br />
Facebook Inc.verify profiles and Pages to help you be sure that they are who they claim to be. Keep in mind that not all authentic profiles and Pages are verified and that you can't request to have your profile or Page verified. You can <a href="https://www.facebook.com/help/167722253287296" target="_blank">report fake accounts</a> that are impersonating you, your business or your brand.<br />
<br />
If your profile or Page isn't verified, there are other ways to help your followers or the people who like your Page know that your identity is authentic. For example, you can:<br />
<br />
Link to your Facebook profile or Page from your official website<br />
Complete the About section of your profile or Page to provide more information<br />
<br />
<h4 style="text-align: left;">
<b>* How To Get Verified ?</b></h4>
<div style="text-align: left;">
<span style="font-weight: normal;">If your profile or any Page whose your are official representative and also based on above mention categories then their are chances of your page to get verified. Actually Facebook does not have any request form to claim verified this is totally automatic process done from Facebook side. So to become verified in future you should have to do some changes in your Profile or Page</span></div>
<div style="text-align: left;">
<span style="font-weight: normal;"><br /></span></div>
◄ Your page should be official represent your local business or any personality and may be have some popularity on Facebook.<br />
For Facebook claiming process your page or profile must have minimum details because if you add full details accurately then Facebook automatically check your provided information if they find your page or profile details accurate and helpful then verify your page here are two parts mention by Facebook to become verified<br />
<br />
◄ Link To Your Profile or Page From Official Website and also link website on your page or profile.<br />
<br />
◄ Provide accurate information in details about your business in About Section of Page or Profile<br />
In About section must add significant long and short description, keyword who represent your business, Email, Website, Products and verified page location with claimed business address and other details in Page Info tab.<br />
<div>
<br /></div>
<div>
In About section must add significant long and short description, keyword who represent your business, Email, Website, Products and verified page location with claimed business address and other details in Page Info tab<br />
<br />
<br />
<br /></div>
</div>
<!-- Blogger automated replacement: "https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhE1v7xgMFiwKfJt9Fp5iks9FeYSlO3RZb7mYUr9nczJy-iKyCmaT0SbFRxe4HJRGPQt6YuSNiS94HEs5P284CL3qxB4rkjO49kCWSKKkiecXFhepVRuUYBgmKmQvQbY7FyIrdiEZhIj3P/s1600/Facebook-Verified-Account-Logo.png" with "https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhE1v7xgMFiwKfJt9Fp5iks9FeYSlO3RZb7mYUr9nczJy-iKyCmaT0SbFRxe4HJRGPQt6YuSNiS94HEs5P284CL3qxB4rkjO49kCWSKKkiecXFhepVRuUYBgmKmQvQbY7FyIrdiEZhIj3P/s1600/Facebook-Verified-Account-Logo.png" --><!-- Blogger automated replacement: "https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2F4.bp.blogspot.com%2F--QkjCvFbRIo%2FVDq1L2Klv1I%2FAAAAAAAAA-U%2FWBaPmp-XHKs%2Fs1600%2FFacebook-Verified-Account-Logo.png&container=blogger&gadget=a&rewriteMime=image%2F*" with "https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhE1v7xgMFiwKfJt9Fp5iks9FeYSlO3RZb7mYUr9nczJy-iKyCmaT0SbFRxe4HJRGPQt6YuSNiS94HEs5P284CL3qxB4rkjO49kCWSKKkiecXFhepVRuUYBgmKmQvQbY7FyIrdiEZhIj3P/s1600/Facebook-Verified-Account-Logo.png" -->Anonymoushttp://www.blogger.com/profile/01030512546628251633noreply@blogger.com0tag:blogger.com,1999:blog-4875983166303707957.post-85829955501837775472014-10-02T15:43:00.001+06:002014-10-02T15:55:12.110+06:00What is Ello? Ello vs. Facebook !<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVauL_Elyknhwr3BpdQKFk7Bw97MdDKy-jKppJGkfUxn-S-9svKUK81dBZ2IKpGXG35-U0FaKK31VKejY3f4ETwtXTyRRDYD5zqzUUDZ48J0YExQIhUjLJmSuLZtIIDnmtFABvzqNZiNPk/s1600/Ello.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVauL_Elyknhwr3BpdQKFk7Bw97MdDKy-jKppJGkfUxn-S-9svKUK81dBZ2IKpGXG35-U0FaKK31VKejY3f4ETwtXTyRRDYD5zqzUUDZ48J0YExQIhUjLJmSuLZtIIDnmtFABvzqNZiNPk/s1600/Ello.png" height="225" width="400" /></a></div>
<br />
Ello is a simple, beautiful, and ad-free social network created by a small group of artists and designers.<br />
<br />
here is the link:<b> <a href="https://ello.co/" target="_blank">https://ello.co</a> </b><br />
<br />
<h3 style="text-align: left;">
<b>======== Ello vs. Facebook=========</b></h3>
originally built Ello as a private social network. Over time, so many people wanted to join Ello that we built a public version of Ello for everyone to use.<br />
<br />
The eight-week-old social network Ello has a manifesto: no ads, no data-mining, no algorithms that make decisions about what you should see, no turning users into products. If you hit the “I agree” button after the manifesto, the site puts you on the waiting list for an invitation. If you click “disagree,” it sends you to Facebook’s privacy page.<br />
<br />
The site’s creator, Paul Budnitz, initially comes across as the male version of the ‘Manic Pixie Dream Girl.’ “I create beautiful things that change the world,” he says in his Ello profile. He lives in Burlington, Vermont selling the “most beautiful city bicycles in the world.” He founded Kidrobot, which makes designer toys such as a silver Homer Simpson buddha statue. According to his personal biography, he writes books, makes films, and collects “cultural wearable artifacts,” such as a classic pair of Air Jordans that he sold for $16,000. His eyes shoot lasers.<br />
<br />
"We see Facebook as an advertising platform not a social network,” says Ello creator Paul Budnitz.<br />
“We see Facebook as an advertising platform not a social network,” says Ello creator Paul Budnitz.<br />
<br />
Right now, those lasers are aimed at Facebook. “We see Facebook as an advertising platform not a social network,” says Budnitz. “Users are products at Facebook. They want to know as much as possible to advertise to you.”<br />
<br />
Ello has garnered a huge amount of media attention and a desperate stampede to get on the site thanks to a huge misstep by Facebook: last month, it booted drag performers such as Sister Roma and Lil Hot Mess off the site for not using their real names. Budnitz says the booted performers’ protest triggered a flood of requests to Ello last week from the LGBTQ community who wanted to know if they could use whatever names they wanted. “On Sunday or Monday, we got 50 emails over several hours, and we were looking at sign-ups and they were going up and up and up.”<br />
<br />
Budnitz said they started getting 4,000 interested new users per hour. It’s snowballed from there. Budnitz won’t release user numbers, “because I don’t want to play that game,” but has been telling people Ello is now getting “50,000 sign-ups per hour.” But that’s a bit hyped; when I asked him if that meant 50,000 new users per hour, he says the number is actually a combination of people creating new accounts, sending out invites and requesting invitations. At this point, Ello is basically only honoring invitations from existing users to control its growth and “not melt our servers.” If nothing else, it’s a great way to make Ello the hot club with a red velvet rope and a long line out front. I suspect there are more people talking about Ello right now than actually using it.<br />
<br />
Facebook realized the mistake it made, leading Chief Product Officer Chris Cox to apologize Wednesday. “The spirit of our policy is that everyone on Facebook uses the authentic name they use in real life,” explained Cox, saying that Facebook now realized that for the hundreds of users who got booted, the names they were using weren’t their legal names but were their “authentic” ones. So drag queens are back on Facebook, but Budnitz hopes that his site will continue to serve a need.<br />
<br />
“It is beautiful and uncluttered,” he says. “Everything is in chronological order. People will only see what they want to see.”<br />
<br />
Budnitz initially launched Ello in the summer of 2013 as a private social network for 90 friends because he was sick of existing social networks. “Facebook thinks I’m a middle-aged women of color, based on the ads I was seeing for high heels, stockings and African-American women magazines,” he says. “I wanted something simple and beautiful.”<br />
<br />
He says other friends started clamoring to join, so he took the site down, got $435,000 in venture funding, and then relaunched an invitation-only site on August 7. “We thought we’d be where we are in 6 months and it happened in 6 days,” he says. As for the making-money part, Budnitz plans to charge users for features. For example, recent users have been clamoring for the ability to maintain multiple profiles with one log-in. “We’ll introduce that and then charge $1 or $2 for it to those power users who want it.”<br />
<br />
Budnitz sees the site as a true beta one, a work in progress. Early users complained that they couldn’t block other users. This week the site will introduce block and mute features, he says. “We’re testing them now.”<br />
<br />
The site has a feature list that explains what’s been added and what’s coming. Hilariously, I can’t link to it because some enterprising user stole its url by establishing a profile named “Feature List.” The site definitely has some bugs, and I wouldn’t be surprised if “Ello Just Got Hacked” appears in the headlines in the near future.<br />
<br />
<br />
<br />
<div>
<br /></div>
</div>
Anonymoushttp://www.blogger.com/profile/01030512546628251633noreply@blogger.com0tag:blogger.com,1999:blog-4875983166303707957.post-35712503999654857412014-08-25T14:55:00.001+06:002014-08-26T22:46:29.323+06:00Things To Do Immediately When Your Facebook Account Is Hacked!<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgg0zMgx2Jy-Yr12B5D8QBpjyY70vToXxJwMpXFA1vp5pbIJaQ2tjwU5ilrA_4r2yFj2LUQS6lR0_2aIxZyl38TWahBaF-ME1Xk0D_MmcjBlFDKWJNd-QpoZ4RfGKQZDfLvh32efv-kYxES/s1600/Facebook+hacked+in+Zero-Day+Attack+with+Malware.jpg" imageanchor="1"><img alt="" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgg0zMgx2Jy-Yr12B5D8QBpjyY70vToXxJwMpXFA1vp5pbIJaQ2tjwU5ilrA_4r2yFj2LUQS6lR0_2aIxZyl38TWahBaF-ME1Xk0D_MmcjBlFDKWJNd-QpoZ4RfGKQZDfLvh32efv-kYxES/s1600/Facebook+hacked+in+Zero-Day+Attack+with+Malware.jpg" height="240" title="Hacked" width="640" /></a></div>
<br /><br /><br /> Nowadays Peoples Facebook ID are hacking by some black hat hackers! even some of my frndz are also being victimized of this problem, so again I'M posting a post where I'll describe u guyz how to retrieve your beloved Facebook account :)<br /><br /><div>
N.B: *You should aware by clicking on some alluring post on your news feed that can be a malware or something like that which can be adjutant for the hackers to hack your account*<br /><br />Here’s what to do when that happens:<br /><br />1. Change your password. Just because that’s easy to do. Go to the upper right corner and click on Account and then Account Settings and then your Password can be changed there.<br /><br />2. Check your Applications. Again in the upper right, Account, then Privacy Settings. Then in the lower left under Apps and Websites click the Edit your settings link. This will show you all the Applications that have access to your profile. Some of these Applications have the ability to post on your wall or your friends wall. Delete any App that you don’t recognize.<br />Now maybe your account has really been hacked and you can’t get back in and bad things are happening. In that case, you can lock it down by going to <a href="http://www.facebook.com/hacked">http://www.Facebook.com/hacked</a><span class="text_exposed_show" style="background-color: white; color: #141823; display: inline; font-family: Helvetica, Arial, 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 14px; line-height: 20px;"><br /></span>
<span class="text_exposed_show" style="background-color: white; color: #141823; display: inline; font-family: Helvetica, Arial, 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 14px; line-height: 20px;"><br /></span>
<span class="text_exposed_show" style="background-color: white; color: #141823; display: inline; font-family: Helvetica, Arial, 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 14px; line-height: 20px;"><br /></span>
<span class="text_exposed_show" style="background-color: white; color: #141823; display: inline; font-family: Helvetica, Arial, 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 14px; line-height: 20px;"><br /></span>
<span class="text_exposed_show" style="background-color: white; color: #141823; display: inline; font-family: Helvetica, Arial, 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 14px; line-height: 20px;"><br /></span></div>
</div>
Anonymoushttp://www.blogger.com/profile/01030512546628251633noreply@blogger.com0tag:blogger.com,1999:blog-4875983166303707957.post-10702049948386221782014-08-24T18:58:00.004+06:002014-08-26T22:51:41.779+06:00Sync your Twitter Account & FaceBook Fan page so that they update each other automatically<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSfzjgcTsTZMxUD4TP5BzSDYsY0GiVBocrq0i2J0CfgOOzN3LSPMePF9S3r3dNoTq9gvsa0-VZbPpoYdzpuFUsVOwN94A_lqdoK8Pgph3oga7yFnL6WPwStSVy0PfVzUhykvurmZ4xTwBB/s1600/facebookandtwitter1.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSfzjgcTsTZMxUD4TP5BzSDYsY0GiVBocrq0i2J0CfgOOzN3LSPMePF9S3r3dNoTq9gvsa0-VZbPpoYdzpuFUsVOwN94A_lqdoK8Pgph3oga7yFnL6WPwStSVy0PfVzUhykvurmZ4xTwBB/s1600/facebookandtwitter1.png" /></a></div>
<span style="background-color: white; color: #141823; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 14px; line-height: 20px;">I have had a few people ask me how to link their Twitter & FaceBook accounts, and even more specifically their FaceBook fan page. So he</span><span class="text_exposed_show" style="background-color: white; color: #141823; display: inline; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 14px; line-height: 20px;">re’s how I do it…</span><br />
<span class="text_exposed_show" style="background-color: white; color: #141823; display: inline; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 14px; line-height: 20px;"><br />By going to this link <a href="http://twitter.com/widgets/facebook" rel="nofollow nofollow" style="color: #3b5998; cursor: pointer; text-decoration: none;" target="_blank">http://twitter.com/widgets/facebook</a> you can add Twitter to your Facebook Profile itself or any Pages of which you may be an admin.<br /><br />And on this page <a href="http://www.facebook.com/twitter" rel="nofollow" style="color: #3b5998; cursor: pointer; text-decoration: none;">http://www.facebook.com/twitter</a> you can assign any Facebook Pages that you are admin of to the Twitter account of your choice!<br /><br />By doing this no matter whether you update your Twitter or FB page, both feeds will be updated!</span></div>
Anonymoushttp://www.blogger.com/profile/01030512546628251633noreply@blogger.com0tag:blogger.com,1999:blog-4875983166303707957.post-35418690534862672002013-12-22T14:05:00.002+06:002014-08-26T22:46:29.320+06:00Make your Skype account primium for free!<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrJ8wdJRM_ynNySTgcHbD66ufUEoXnKCVRuSguLNuw8wi7ZsxI_sHDZq_BeLOxLlpeECcA4lCklvPTgcA54NY7Spix3pQz_sNmhyJQNlwbc0hVPeyTuhbECbWD4oP8LS0FJ4-oBMcV8xkX/s1600/295179752_640.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="225" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrJ8wdJRM_ynNySTgcHbD66ufUEoXnKCVRuSguLNuw8wi7ZsxI_sHDZq_BeLOxLlpeECcA4lCklvPTgcA54NY7Spix3pQz_sNmhyJQNlwbc0hVPeyTuhbECbWD4oP8LS0FJ4-oBMcV8xkX/s400/295179752_640.jpg" width="400" /></a></div>
HeY guys,today i'll tell you how to make your Skype account primium for free of cost.You can save €71.88 without paying a single penny.After making your account primium you can make group video calls with your skype friends,share your screen on the time of video calling and do many more things....<br />
<br />
<br />
<br />
<br />
First go to this link>> <a href="https://collaboration.skype.com/promotion/" style="background-color: white; border-bottom-color: rgb(12, 56, 110); border-bottom-style: dotted; border-bottom-width: 1px; color: #0c386e; font-family: SolaimanLipi, Arial, Vrinda; font-size: 16px; line-height: 24px; text-decoration: none;" target="_blank">https://collaboration.skype.com/promotion/</a> to be a member of skype primium account.<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOqApT62MZq9kojjYefQVzk3MjA_89Jv_R24TceiJTA4zfuV1lDzavirD63P1j2X9ejYuOqLvrQDoe2fVYCl4mTWDx0b2qana1AEdIY_Ae_hl3ilHYbTF8fr47UkOJzXUbWV6Vq59yLlV1/s1600/skype+collabration.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="270" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOqApT62MZq9kojjYefQVzk3MjA_89Jv_R24TceiJTA4zfuV1lDzavirD63P1j2X9ejYuOqLvrQDoe2fVYCl4mTWDx0b2qana1AEdIY_Ae_hl3ilHYbTF8fr47UkOJzXUbWV6Vq59yLlV1/s320/skype+collabration.png" width="320" /></a></div>
<br />
in the email box enter your email address and then click send button.After that go to your email id which you have typed in the email address box.<br />
then open the email named Skype.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi51V2tZK4mY6EIzq27WZkLmy9BXx_hyphenhyphenPGDUDxWeZRRjO-V-w9nwgxL0ypq9918XTIcgjf9ZbqCzvodlVdJeJ4n-n4FH6TctTu8Y-cSSNXbuqdhW53lO4BVV5YliN2JeAoY0T6NLR6tkDTV/s1600/skype+collabration+redeem.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="263" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi51V2tZK4mY6EIzq27WZkLmy9BXx_hyphenhyphenPGDUDxWeZRRjO-V-w9nwgxL0ypq9918XTIcgjf9ZbqCzvodlVdJeJ4n-n4FH6TctTu8Y-cSSNXbuqdhW53lO4BVV5YliN2JeAoY0T6NLR6tkDTV/s400/skype+collabration+redeem.png" width="400" /></a></div>
<br />
Now copy the <b>voucher code</b> from the email and click on<b> Redeem</b>.The Redeem will take you to skype's website and there you have to log into your skype account.After login you will asked to type the Voucher code,then paste the Voucher code and click on <b>Reddem</b>.Thats it then you have to wait 15 minutes.Then your Skype account will be primium.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgik3g1xrb7Jp0pi34EMDYUgFEDVyxtEUybxQ4sv4vJ7Edt2cvFa3b2LEmj71clM3VHu6lC-7aP6noum0lmRJ-KZKdEpohFYRnB2qnuLCdXuKyoSItITBL5dPWL2zlndhkj9DVcvBEIANhe/s1600/skype+confurm.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="206" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgik3g1xrb7Jp0pi34EMDYUgFEDVyxtEUybxQ4sv4vJ7Edt2cvFa3b2LEmj71clM3VHu6lC-7aP6noum0lmRJ-KZKdEpohFYRnB2qnuLCdXuKyoSItITBL5dPWL2zlndhkj9DVcvBEIANhe/s400/skype+confurm.png" width="400" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
After making your account primium you will get a mail to your email address where you can see like this...</div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1dT425s3pYkcel7cpI4rThb-llUwPmSZnWqCm8GNXiwz1HfanOUx6HF-JQY90kNK8gDIRNERIoVJ4hPX3BJDVdBBNaypa6C5sdxpIzo7UFMow_1cI1fQZqwoutcTUkhzM1OrufahFgWCr/s1600/skype+profile.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1dT425s3pYkcel7cpI4rThb-llUwPmSZnWqCm8GNXiwz1HfanOUx6HF-JQY90kNK8gDIRNERIoVJ4hPX3BJDVdBBNaypa6C5sdxpIzo7UFMow_1cI1fQZqwoutcTUkhzM1OrufahFgWCr/s400/skype+profile.png" width="400" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<br /></div>
Anonymoushttp://www.blogger.com/profile/01030512546628251633noreply@blogger.com1tag:blogger.com,1999:blog-4875983166303707957.post-12614619658652920362013-12-19T18:32:00.002+06:002014-08-26T22:51:41.788+06:00How to Disable Blogger Redirection to Local Domains?<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjD-s1zmhdl4nuBW3cmQIQBNT-P4JP06alTSPiRxC4gr6wYSF5aaHzTlTRt0mbSIKRvpwb8qBldhMsjAzCAcEt2J_Rj8uhjB9DVxNnQ-m4SU0KrV5jVpBwjvAHwqCt1MUefdKk332-gAkCB/s1600/blogger-country-redirect.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjD-s1zmhdl4nuBW3cmQIQBNT-P4JP06alTSPiRxC4gr6wYSF5aaHzTlTRt0mbSIKRvpwb8qBldhMsjAzCAcEt2J_Rj8uhjB9DVxNnQ-m4SU0KrV5jVpBwjvAHwqCt1MUefdKk332-gAkCB/s1600/blogger-country-redirect.jpg" /></a></div>
If you're running a blog in blogger platform, you should notice, sometimes your site is redirected to local domains. I mean your site is redirected to country specific URL. But it doesn't happen in all countries. Maybe 15 - 20 countries have their own blogger domain. But Google will implement the local domains for blogger blogs in other countries very soon! <br />
<h3 style="text-align: left;">
</h3>
<h3 style="text-align: left;">
</h3>
<h3 style="text-align: left;">
</h3>
<h3 style="text-align: left;">
</h3>
<h3 style="text-align: left;">
</h3>
<h3 style="text-align: left;">
</h3>
<h3 style="text-align: left;">
</h3>
<h3 style="text-align: left;">
</h3>
<h3 style="text-align: left;">
</h3>
<h3 style="text-align: left;">
</h3>
<h3 style="text-align: left;">
</h3>
<h3 style="text-align: left;">
</h3>
<h3 style="text-align: left;">
</h3>
<h3 style="text-align: left;">
</h3>
<h3 style="text-align: left;">
<u>
Let's give me an example: </u></h3>
<br />
You know the URL of Fahim's Blog is - http://aacfahim.blogspot.com<br />
<br />
If you're Italian you will see my site's URL as- http://aacfahim.blogspot.it<br />
A Canadian will see my site's URL as - http://aacfahim.blogspot.ca<br />
An Indian will see my site's URL as- http://aacfahim.blogspot.in<br />
<br />
<br />
Okay fine! Blogger has its own local domains for different countries. But what's wrongwith this country specific URL? There are a number of problems: <br />
<br />
Your social stats (+1, Likes, Tweets) may fall dramatically due to the variations in domain. <br />
Your search ranking might be affected. <br />
If blogger is banned in a country with the help of local domain, your site can't be visited from there! <br />
Though Google says, they are trying to minimize the negative consequences of hosting blogger. But why are you waiting for Google's effort? You can force local domains to redirect to .com version of your site with a simple code! <br />
<br />
<br />
<h3 style="text-align: left;">
Prevent Blogger's from Redirection:</h3>
<br />
Officially Google never mentioned any permanent way to stop redirecting. But it said if you type /ncr just after the domain name for example- http://aacfahim.blogspot.com/ncr, then it will not redirect to your local domain. <br />
<br />
And if you want to do this for individual post then it should be like that:<br />
http://aacfahim.blogspot.com/ncr/exaplepage<br />
<br />
Anyway, as a blog master your shouldn't let the visitors follow any boring way to prevent redirection. Because you can control the redirection by the code below! Okay let's try:<br />
<br />
<br />
Make sure you're signed in to your blogger's control panel I mean design or dashboard.<br />
Now go to the template option. (Backup your template if necessary)<br />
Click on Edit HTML. Now you can see the code of your template. <br />
Hit on the template box and Press Ctrl+F to enable search within the code box.<br />
find the <head> of your template and then copy the code below and place it just below the head tag. (Look at the image below)<br />
Save the template. Done! <br />
<br />
<br />
<b><script type='text/javascript'></b><br />
<b>var blog = document.location.hostname;</b><br />
<b>var slug = document.location.pathname;</b><br />
<b>var ctld = blog.substr(blog.lastIndexOf(&quot;.&quot;));</b><br />
<b>if (ctld != &quot;.com&quot;) {</b><br />
<b>var ncr = &quot;http://&quot; + blog.substr(0, blog.indexOf(&quot;.&quot;));</b><br />
<b>ncr += &quot;.blogspot.com/ncr&quot; + slug;</b><br />
<b>window.location.replace(ncr);</b><br />
<b>}</b><br />
<b></script></b><br />
<br />
<br />
<br />
<br />
<br />
<a href="http://munnamark.blogspot.com/2013/06/disable-blogger-redirection-to-local-domains.html"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJR8iGdVXn7lcQd-qql92vjYaWWns9xJ0gPLseDoEU1FUzz0nhc_nlmOT_uGHpBchLb2cD3tDPwe-GffN7uwpvpAoXCsWJSHkZ2ocOKb3S11kFj1Z7D1dkS_HeM9Tr-3XO7CSfdNsD/s1600/Prevent+Redirection+Code+in+Blogger+Template.PNG" /></a><br />
<br />
<br />
<br />
<br />
From now and then your visitors will only be able to visit the .com version of your site. I mean like that: http://aacfahim.blogspot.com<br />
<br />
<br />
You can also test whether it works or not. Type http://aacfahim.blogspot.it in your browser. But it will redirect you to http://aacfahim.blogspot.com. Also check this for your site. <br />
<h3 style="text-align: left;">
Removing the Code: </h3>
<br />
<br />
I don't think it is necessary. For any reason, if you are reluctant to use this code, follow the steps above again. And then at the 5th step, delete the code and save your template. Or if you have a backup of your template, you can also restore it. But deleting the code is much easier. <br />
<br />
<h3 style="text-align: left;">
What about the Registered/ Custom Domain? </h3>
<br />
If you blogger blog is registered I mean if you have a custom domain like .com or .org you don't need implement this code. Because the redirection is not applicable for a site with custom domain. <br />
<br />
<h3 style="text-align: left;">
What happened if blogger is banned in a country? </h3>
<br />
Naturally when blogger is banned by the Govt. of a country the visitors from that country will not be able to see your site. But they will be able to visit the .com version of your site by using /ncr just after the domain. But if you use the above code in your site, visitors will automatically be able to visit your site! <br />
<br />
<br />
I think now you understand the importance of using this code ..... :)</div>
Anonymoushttp://www.blogger.com/profile/01030512546628251633noreply@blogger.com0tag:blogger.com,1999:blog-4875983166303707957.post-53113366467109416982013-12-18T21:55:00.000+06:002014-08-26T22:51:41.800+06:00What you will do when you forget to logout your Facebook acoount from another device.....<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8JbH530SgxyoEDxaW8QYpQOkDqYZ5vEJIExMscyRZl5KNay5JuwB3zKK9gVVRbul1bMWv2pH3ibK1HoeWlVFKDJQE6bUr4lfXJM0QlKTR782pDdCUXDqCjweDk1V4dpJL-gwOeC6-SGpG/s1600/facebook_logout.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8JbH530SgxyoEDxaW8QYpQOkDqYZ5vEJIExMscyRZl5KNay5JuwB3zKK9gVVRbul1bMWv2pH3ibK1HoeWlVFKDJQE6bUr4lfXJM0QlKTR782pDdCUXDqCjweDk1V4dpJL-gwOeC6-SGpG/s1600/facebook_logout.jpg" /></a></div>
Suppose you are using your Facebook on another computer or mobile phone.after using the facebook you forget to logout, what you will do then? Its a great problem.for your this activity anyone can easily access to your account but dont worry,you can logout your facebook account remotly.. just follow my instructions>><br />
First log in to your facebook with your computer and go to <b>Account settings</b> and then goto <b>Security</b>.Now click on <b>Active Sessions</b>.Here you can see <b>Current Session </b>and <b>Also Active</b>.If you see that <b>Also Active </b>is online so you can understand that your facebook account is now online in other device. The <b>Also Active </b>system will tell the all information about that device. so if you find a situation like this just click on <b>End Activity </b>then your facebook account will be log out.</div>
Anonymoushttp://www.blogger.com/profile/01030512546628251633noreply@blogger.com0tag:blogger.com,1999:blog-4875983166303707957.post-88529113138754042222013-12-18T20:29:00.000+06:002013-12-18T20:29:34.850+06:00How to see the viewer of your Facebook profile without any software.<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQNsjGSIw1-wJ_KJuZqTubecXavmUNwdhWmPODnAdDIkvca9_egoWgINgc9BFae9gWtxnWz2n81zXa3Piw0ihmR-ja7lv5d-aV9fbchV1lnag1zhGPrw5QbRHlFWVdkYP6fnmOobrZiEqn/s1600/facebook_logo.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQNsjGSIw1-wJ_KJuZqTubecXavmUNwdhWmPODnAdDIkvca9_egoWgINgc9BFae9gWtxnWz2n81zXa3Piw0ihmR-ja7lv5d-aV9fbchV1lnag1zhGPrw5QbRHlFWVdkYP6fnmOobrZiEqn/s200/facebook_logo.png" width="200" /></a></div>
Hello everyone,today i''l tell you how to see the viewer of your Facebook profile without any software.You can see that who has visited your facebook profile.so lets start... just follow my instructions<br />
<br />
1.First log in your facebook and go to your profile<br />
2.Then type <b>Ctrl+U </b>from your keyboard. It will open a Source code of your facebook page.<br />
3.Then type <b>Ctrl+F </b>to open the search box<br />
4.After that type <b>[],{“list”: </b>in the search box.then you can see that a list will open which is related to your facebook profile. it will be like this---<br />
<b><br /></b>
<b>[],{“list”: 100000428218692-2″,”100001796535546-2″,”100000421373889-2″,”100002977140210-2″,”100001299735489-2″,”100002049586594-2″,”1845456613-2″,”100005899852714-5”</b><br />
<b><br /></b>
In the first id you are seeing is the most visited id of your facebook profile,and the last id you are seeing is the lowest visitor of your facebook profile.<br />
Now copy any id of them and paste to your adress bar. example: <b>www.facebook.com/</b><b>100000428218692 </b><br />
Now go to that URL. after loading the URL you can see that profile id ...</div>
Anonymoushttp://www.blogger.com/profile/01030512546628251633noreply@blogger.com0tag:blogger.com,1999:blog-4875983166303707957.post-12268312508691645882013-12-16T23:54:00.001+06:002014-08-26T22:51:41.782+06:00How To Change The Default Location For Installing Applications<div dir="ltr" style="text-align: left;" trbidi="on">
Windows uses the System Disk for installing any new applications, That is, if your Windows is installed on the C Drive, the default folder where all the applications you install would automatically show up as C:\Program Files , unless of course you change it manually while installing the application’s locations. If you almost always prefer to NOT install on the System Disk, but instead on another partition, say, the D drive, then rather then changing the default location every time, you can change it just once.<br />
<div>
<br /></div>
<h3 style="text-align: left;">
<b><i>Instructions:</i></b></h3>
<br />
1.To change the default location for installing application we will need to make a registry hack, for this we need to backup the registry before making any changes to it. To get into the registry, click on <b>Start</b>, then click on <b>Run</b> and type in <b>regedit</b> and press Enter.<br />
<br />
2.To backup the registry, click <b>File </b>and then<b> Export</b>.<br />
<br />
3.Now navigate it to the following location in the registry:<br />
<b>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion</b><br />
and look for a key titled <b>ProgramFilesDir</b><br />
<br />
4.Now double click on <b>ProgramFilesDir key</b> and change its Value data from <b>C:\Program Files</b> to <b>D:\Program Files </b>or any other drive of your choice, then Click <b>Ok</b> then Exit. From now the default directory for installation of all you programs shall be on the D drive.</div>
Anonymoushttp://www.blogger.com/profile/01030512546628251633noreply@blogger.com0tag:blogger.com,1999:blog-4875983166303707957.post-55559246432500697672013-12-16T23:45:00.002+06:002014-08-26T22:51:41.802+06:00Make your Notepad as your Personal Dairy<div dir="ltr" style="text-align: left;" trbidi="on">
<span style="font-family: inherit;">First of all open Notepad and type <b>.LOG </b>and then press Enter.Now save it with any name and close it.After saving and closing when you open this notepad file again you can see that where you wrote <b>.LOG</b> current date and time has been saved just near the <b>.LOG. </b>Now whenever you write something to this file the date and time will be saved.</span></div>
Anonymoushttp://www.blogger.com/profile/01030512546628251633noreply@blogger.com0