Pages

Thursday 31 July 2014

EASY WAY TO FIND YOUR LOST ANDROID PHONE


Theft has become an annoying thing today ,many peoples loose their Android Phone at different places and its very difficult for then find their stolen Android Phone.There is an easy way to find your lost phone by using the method below 


Recently,Google announces an new feature for Android Operating System called Android Device Manager.It allow us to Track or Locate our Android Phones and If you found that your Android Device is in wrong hands then you can also Lock your Android Phone.If you think that you have Personal date in your stolen Android Phone then you can also clear your Person Data by Factory Resetting.If you want secure your Android then follow below steps.
Step 1First of all Enable Android Device Manager on your Android Phone.You can enable the Android Device Manager on your Android Phone by tapping Settings >> Android Device Manager.The Remote Locate The Device Feature is activated by default but you need to enable the Remote Factory Reset manually to erase all the data when your Android Device is Lost.

Step 2. Now if your Android Phone is loses then you can locate or trace your Phone by visiting Android Device Manager's official Website https://www.google.com/android/devicemanager.If you lost your Android Phone at your Home then you can Ring your Android Phone by Clicking on Ring Phone button and If you not able to find your Device then you can also erase all data of your Device.

Now you can find your lost or stolen Android Phone by using above method.But if you're not enabled the Android Device Manager before losing then its very difficult to locate your Phone.But using Android Lost,You can still get your Android Phone back in your Hands.So if you have not installed any Android Tracking App and still want to find your Lost Android Phone then follow below steps.


Step 1. First of all visit Google Play Store on your Pc/Laptop and Log in using your Google account.
Step 2. Now search for Android Lost app and click on Install button to install the Android Lost app on your Stolen Android Phone.
Step 3. Now send the SMS to your Android Phone with Text 'androidlost register' from any Mobile Numberto activate the Android Lost app.
Step 4. Now after Installation is completed,You can control and track your Phone by visiting Android Lost'sofficial Website.

Now you can easily find your lost Android Phone.

KINDLY SHARE THIS INFORMATION WITH YOUR FRIENDS AND HAVE FUN ,IF YOU HAVE ANY QUERIES LEAVE IT IN THE COMMENT BELOW

Steps To Reset the Pattern Lock in Android Phones

 The major security in the android smart phones is using pattern locks ,people use it because it is more reliable.But if you draw the Pattern wrong for 3-5 times then you will be blocked from accessing your Phone and You can only reset the Pattern Locker by Signing with your Google account.Some Peoples also forget their Google accounts password so its very difficult for them to reset the Pattern Locker.so here is a simple way to deal with this problem.You can unlock your Android Phone by using two methods.


Method 1 :
You can Reset your Pattern Locker on Android Phones by Signing with your Google Account.If you forget your Google Accounts Password then you can recover your Password by using the recovery option in the google account
 Clicking Here to recover the account.Here you'll need to provide information about you and your Google account.After providing the correct information,a verification code will  be sent  to your Mobile  or to your Recovery Email.This is the easiest method to reset the PatternLocker and you just need to sign in with your Google account to reset Pattern locker.If this method don't work for you then you can use second method to reset Pattern Locker.

Method 2 :

You can also reset the Pattern Locker by Factory Resetting your Android Phones.
1. Switch off your Android Phone.
2. Now Turn On your Phone by Pressing together 'Volume Up' 'Home' and 'Power' Keys.You device should be start in Recovery Mode.If your Device doesn't have Home key then you should press 'Volume UP and'Power' Keys to start in Recovery Mode.
3. Now scroll down to 'Restore Factory Defaults' or 'Clear All User Data.


 You can navigate in Android Recovery Mode using Volume Up and Volume Down Keys.

4. After clicking on above Option,Reboot your Device by selecting 'Reboot System' Option

Now you can use your Android Phone again by resetting your Pattern Lock.

Note- dont forget to back up your files before you reset your phone


KINDLY SHARE THIS INFORMATION TO YOUR FRIENDS AND HAVE FUN IF YOU HAVE ANY DOUBTS LEAVE IT IN COMMENTS BELOW

A SIMPLE WAY TO CLOSE ALL BACKGROUND APPLICATION IN ONE CLICK

Many of us use android smart phones these days,an major problem is the background application we have to close all of themone by one which is quite annoying and if left as it is it may comsume some charge a simple way to solve this problem is using a software called'ASK ME TASK KILLER' it is easy to use 



Task Manager (Task Killer) - screenshot thumbnail


Task Manager (Task Killer) - screenshot thumbnail


Task Manager (Task Killer) - screenshot thumbnail


Task Manager (Task Killer) - screenshot thumbnail

Task Manager (Task Killer) - screenshot

Task Manager (Task Killer) - screenshot


Task Manager (Task Killer) - screenshot

Task Manager (Task Killer) - screenshot


Task Manager (Task Killer) - screenshot

Tuesday 29 July 2014

SIMPLE WAY TO HIDE YOUR PERSONAL FILES

Some of us have some personal files that we would like to keep away from others , here is a simple way to hide your files

STEP-1

Select the folder you want to hide , then Right click and go to properties



STEP-2

Select the properties and a dialouge box will open



STEP-3

Now click the hidden option and press apply now your file will become transparent,then go to organize in the menu bar and click folder option

STEP-4

Now click the folder option and an dialouge box will appear, in that click view option.In that you will find two options as 'show' and 'dontshow' click the dont show the hidden files option 
Now your file is hidden .Repeat the process in the reverse manner to unhide the file


HOPE YOU ALL FOUND IT USEFUL ,,,,KINDLY SHARE THIS INFORMATION TO YOUR FRIENDS AND HAVE FUN

IF YOU HAVE ANY SUGGESTION  LEAVE IT IN COMMENTS

Monday 28 July 2014

To download and Install Whatsapp on PC using BlueStacks

 To download and Install Whatsapp on PC using BlueStacks

Step 1: Download BlueStack (free Windows Application)
Step 2: After Finishing the Download Double Click on Downloaded File, Click ContinueClick Install.

Step 3: Now Download WhatsApp APK File

Step 4: After Finishing the Download Double Click on Downloaded WhatsApp APK file.


Step 5: Now whatsApp will install in your PC.


Step 6: Now Open BlueStacks (Click on BlueStacks icon in your Desktop)


Step 7: Now in BlueStacks >> Click on My Apps.


Step 8: Now you’ll see WhatsApp >> Click on it.


Step 9: Accept Terms and Condition 


Step 10: Type your Mobile Number in the Field
Note: First type your Country Code like 91 for India and then your Mobile Number
Step 11: Now WhatsApp will try to verify your number, but it will show fail message.
Step 12: Now click on Call Me >> You’ll receive a automatic call with a confirmation number, write down that number .
Step 13: Now type the received number in verification field and your done!
SHARE THIS WITH YOUR FRIENDS AND ENJOY

TO OPEN A EPUB FILE

How To Open an EPUB File

The easiest way to open an EPUB file is to double-click on it and let your PC decide which default application should open the file. If no program opens the EPUB file then you probably don't have an application installed that can view and/or edit EPUB files.
 Take great care when opening executable file formats received via email or downloaded from websites you're not familiar with. See my List of Executable File Extensionsfor a listing of file extensions to avoid and why.
EPUB files can be opened in most eBook readers, like the B&N Nook and Kobo eReader. EPUB files have to be converted before they're usable on the Amazon Kindle (see How To Convert an EPUB File below).
EPUB files can also be opened on a computer with various free programs including Calibre,Adobe Digital Editions and many more.
Plenty of iPhone and Android apps also exist that allow viewing of EPUB files. There's even a Firefox Add-on, EPUBReader, that allows you to read EPUB files in the browser just like other documents.

STEPS TO FIND YOUR OWN IP ADDRESS


How To Find My IP Address On A PC


For Windows users, here is how I can find my IP address. First, click the Start Menu, and select Run. Next, type ''cmd'' into the box and click the ''OK'' button. Finally, at the prompt, type ''ipconfig'' and information about your IP Address will be displayed.
{ How to find my IP Address on a PC picture }


How To Find My IP Address On Linux


Next, how do I find my IP address on a machine running Linux? On a Linux system, I can find my IP address by typing ''ifconfig'' at the prompt, which will output information about my IP Address.
{ How to find my IP Address on a PC picture }

How To Find My IP Address On A Mac


For Mac users, the question of how to find my IP address can be answered by opening up your Terminal program, and typing ''ifconfig'' at the prompt. (Terminal is a program that comes free and installed by default on every Macintosh, and is located in Applications, under the Utilities folder.)
{ How to find my IP Address on a Mac picture }



SHARE WITH YOUR FIRENDS AND HAVE FUN

SOURCE-WEB

IF YOU HAVE ANY SUGGESTION LEAVE IT IN COMMENTS BELOW 

SIMPLE WAY TO FIND IP ADDRES OF A WEBSITE

Each Web site on the Internet possesses at least one Internet Protocol (IP) address. Knowing a Web site IP address can be useful to determine its physical location, but this address is not automatically shown in Web browsers. How can you find the IP address of a Web site?
Answer: First, you can use the ping utility to look up Web site IP addresses. Ping attempts to contact the Web site by name and will report back the IP address it finds. For example, to find the IP address of about.com, entering the command
    ping about.com
will return a result similar to the following that contains the IP address:
    Pinging about.com [207.241.148.80] with 32 bytes of data: . . .
Note that many larger Web sites do not return replies to ping commands, but the site IP address can usually still be obtained. The ping method will fail if the Web site is temporarily unreachable or if the computer used to perform the ping is not connected to the Internet.

The Internet WHOIS System

An alternative method to find Web site IP addresses relies on the Internet WHOIS system. WHOIS is a database that tracks registration information for Web sites including the owner and IP address.
To look up Web site IP addresses with WHOIS, simply visit one of the many public sites (like whois.net or networksolutions.com) that offer WHOIS database query services. Searching for a particular site name like about.com, for example, produces a result similar to the following:
    Current Registrar: REGISTER.COM, INC.
    IP Address: 207.241.148.80 (ARIN & RIPE IP search) . . .
In the WHOIS method, note that the IP addresses are stored statically in a database and thus do not require the Web site actually be online or reachable over the Internet.
SHARE THIS INFORMATION WITH YOUR FRIENDS AND HAVE FUN

A SIMPLE WAY TO PROTECT YOUR FILES WITH PASSWORD


Tip: Before password protecting any document you may want to create a backup of the non-password protected folder and files in case you forget the password in the future.
The majority of Microsoft Windows operating systems do not come with a method of password protecting your sensitive files and folders. If you're using Microsoft Windows 3.xWindows 95Windows 98, you need to download or purchase a third-party program to password protect your files and folders in Windows; skip down to the other security solutions section if you're using one of these operating systems.

Microsoft Windows XP professional users

The steps below for encrypting the files on Windows XP professional applies to users who are using a computer that has different accounts. If you are using a single account see the other security solutions section.
  1. Select the folder you want to encrypt.
  2. Right-click the folder and click Properties.
  3. Click the Advanced button.
  4. Check "Encrypt contents to secure data" option.
  5. Click Apply and then Ok.
Encrypt contents to secure data is grayed out
This will be grayed out if you're using the home edition of Microsoft Windows XP. See the steps below for securing the contents of your folders in Windows XP home.
Show "Encrypt" on the context menu
The newest version of TweakUI also enables you to show the Encrypt option in the context menu. To do this, follow the steps below.
  1. Open TweakUI.
  2. In the TweakUI window, select Explorer
  3. In the right side of the window under Settings, locate Show 'Encrypt' on context menu and check the box. This option should be below Prefix 'shortcut to' on new shortcuts and above Show 'View workgroup computers' in NetPlaces.

Microsoft Windows XP home users

  1. Select the folder you want to encrypt.
  2. Right-click the folder and click Properties.
  3. Click the Sharing tab.
  4. Check the box Make this folder private
  5. Click Apply and then Ok.
Make this folder private is grayed out
In order for this option to work in Microsoft Windows XP home you must meet the below requirements.
  1. The hard drive must be formatted in NTFS and not FAT32 File System.
  2. The folder you're attempting to encrypt must be in your own personal folder. For example, if your name is bob, you must be encrypting a folder that is or that is contained within the below folder:

    C:\Documents and Settings\Bob\

    You cannot encrypt any folders outside of this folder. If you want to encrypt outside this folder see the below other security solutions.

Other security solutions for protecting your files and folders in Windows

File and folders not frequently used
If you need to password protect files or folders that you do not frequently use, one of the simplest ways is to compress the folder and files with a compression utility and password protect the compressed file. However, each time you want to work or modify the files you need to uncompress the files using the password.
Windows ME and Windows XP users - Microsoft Windows ME and Windows XP come with their own compression utility. This utility can also be used to compress and password protect files.
Tip: When a file is compressed, users can still view a listing of the files in the compressed file. If you want for both your file names and the contents to be hidden, move all the files into a single folder and password protect that folder.  
File and folders frequently used or accessed
If you need to password protect or encrypt data you frequently use, you need to install a third-party program that allows you to protect your files and folders. Below are some free and commercial solutions.
  • AxCrypt - An excellent free encryption utility that enables users to encrypt all files within a folder and not allow those files to be viewed unless a passphrase (password) is known.
  • WinCry - A freeware utility that enables your files to be encrypted, secure deletion, as well as other helpful methods of protecting your files.
  • Folder Guard - A commercial version of a password protection software that enables you to password protect files, folders, and other Windows resources.
Click here to search for more solutions to password protect files and folders in Windows.

Things to remember when encrypting or password protecting files and folders

  1. There is no such thing as a 100% protected file. There are numerous tools, utilities, and instructions for how to break encryption and passwords on files. However, the protection methods listed above will protect your files from the majority of users who may encounter them. If you are working with really sensitive data we suggest a commercial product for protecting your files and data.
  2. Even though a file or folder may be password protected it still can be deleted (unless the program supports the ability to protect files from being deleted). Always remember to backup all your files, even those protected by passwords.
  3. If you forget the password, unless you're willing to spend the time attempting to break it or pay someone else to break the password, all your file data will be lost. Unless you've made a backup of the non-password protected data.

Additional information



SHARE THIS WITH YOUR FRIENDS AND HAVE FUN

STEPS TO SECURE YOUR WI-FI CONNECTION

  1. 1
    Connect to your router via your browser, by inputting something called a Gateway IP Address.
    • To find your Gateway IP Address and connect to it in Windows
      Secure Your Wireless Home Network Step 1Bullet1.jpg
      • Click Start > Run > type 'cmd' > Click 'Enter'
      • Once the Command Prompt window opens, type 'ipconfig /all' and hit 'Enter'
      • Locate the line labeled 'Gateway' and make note of the number that follows. It will look similar to '192.168.1.1'
      • Open Internet Explorer (or your favorite browser)
      • Enter the Gateway IP Address into the address bar and click 'Enter
    • To find your Gateway IP Address and connect to it on a Mac
      • Open your Finder and run 'Terminal' inside of Applications > Utilities
      • Once the terminal window opens, type 'ipconfig -a' and hit 'Enter'
      • Locate the line labeled 'Gateway' and make note of the number that follows. It will look similar to '192.168.1.1'
      • Open Safari (or your favorite browser)
      • Enter the Gateway IP Address into the address bar and click 'Enter'
    Ad
  2. Secure Your Wireless Home Network Step 2.jpg
    2
    Enable encryption on your access point. Using 128-bit encryption or higher makes your Wireless Network more secure. WEP and WPA are entirely different encryption schemes. WEP has been proven insecure and can be cracked in a few minutesusing free utilities that can be downloaded from the Internet. Using at least WPA is recommended, because it is much more secure, but is sometimes a bit harder to set up correctly than WEP is, and isn't completely secure.[1][2] Some older access points or wireless cards do not support WPA2. If you have one of these, it is recommended that you purchase a newer one that supports WPA2, depending on how important you consider your security. However, WPA2 still uses static Pre-Shared Key, which is easy to capture and break. You have an option to use a very long network password (at least 10 alphanumeric characters) or use a RADIUS server and the WPA2-Enterprise mode that uses username/password combination and generates a temporary session encryption key. As it might be challenging to configure your own authentication server, you might want to use a commercial Virtual RADIUS server.[3]
  3. Secure Your Wireless Home Network Step 3.jpg
    3
    Set the router access password. Anybody who gains access to the router configuration settings can disable the security you have set up. If you forget the password, most routers have a hardware reset that will restore all of the settings to factory defaults. The best option is to use a random sequence of the maximum length of characters - you only have to type that once, so it is not a big thing. When you connect to the router via LAN cable while setting it up, you can copy and paste the password onto the router and onto your local setting, so you never need to type it again.
    • Use a secure password. Don't use easily guessed passwords for your WPA2 or router access passwords, such as "ABC123", "Password", or a string of numbers in order. Use something hard to guess that contains both upper and lowercase letters as well as numbers. Special characters such as !@#$% are not supported by some routers. The longer the key, the better, although the WPA2 key has a minimum and maximum length. Try to make a little mental effort -- good passwords might be hard to remember, but they are harder to crack.
    • If you use a weak key then even WPA and WPA2 can be easily cracked within a day using a combination of special precomputed tables and dictionary attacks. The best way to generate a secure key is to use an offline random number generator or write the entire alphabet in uppercase and lowercase and numbers 0-9 on separate pieces of paper, mix the paper up and randomly pick up pieces and return them, mixing them up again each time; each character you pull out becomes a character in your key. You can also try throwing a pair of dice and using the resulting numbers as your password.
  4. Secure Your Wireless Home Network Step 4.jpg
    4
    Change the Service Set Identifier (the network name or "SSID") from the default to something unique. A default SSID indicates to hackers that the network was set up by a novice and that other options (such as the password) are also left as the default. Use a name you can remember and identify, as the SSID has no influence on the security of your network (not even if you choose not to broadcast it).
  5. Secure Your Wireless Home Network Step 5.jpg
    5
    Enable MAC Address filtering on your Access Point or router. A MAC (not to be confused with the computer model 'Mac') address is a code unique to every wireless networking card in existence. MAC Address filtering will register the hardware MAC Address of your networked devices, and only allow devices with known MAC Addresses to connect to your network. However, hackers can clone MAC addresses and still enter your network, so MAC address filtering should not be used in place of proper WPA2 encryption.
  6. Secure Your Wireless Home Network Step 6.jpg
    6
    Don't disable the 'SSID Broadcast'. Do not disable the 'SSID Broadcast' feature of your Access Point or router. This seems counter-intuitive, but it is actually a bad idea.[4] Although this would make your network invisible to your neighbors, any determined hacker can still sniff out your SSID; and you are implicitly forcing your computer to shout out your SSID anywhere you are, while it is trying to connect to it. Anyone could then impersonate your router with that SSID, and get your credentials that way.
  7. Secure Your Wireless Home Network Step 7.jpg
    7
    Disable remote login. The first router worm brute forces its way into the router in this manner. Most default usernames are set to Admin. It isn't hard for a virus/worm to crack the password if the username is known. The good thing is that routers normally have this disabled by default. Be sure to confirm that it is disabled when you first set up your router and periodically thereafter. If you need to update your router setting remotely, only set up access for the time you are going to be connected.
  8. Secure Your Wireless Home Network Step 8.jpg
    8
    Disable wireless administrating. Finally, change the setting that allows administrating the router through a wireless connection to 'off' (meaning that you need to connect with a LAN cable for administration). This disables any wireless hacking into the router.

SHARE WITH YOUR FRIENDS AND  HAVE FUN

SOURCE-WEB