Friday 16 October 2015

Game of a life time .CHECK IT OUT¡!!!!!!!!!!!!

Racing Fever is pretty cool. Check it out on Google Play Games. See if you can beat my score! https://play.google.com/store/apps/details?id=mobi.gameguru.racingfever&pcampaignid=GPG_shareGame

Wednesday 14 October 2015

Racing fever

Racing Fever is pretty cool. Check it out on Google Play Games. See if you can beat my score! https://play.google.com/store/apps/details?id=mobi.gameguru.racingfever&pcampaignid=GPG_shareGame

Friday 9 October 2015

Hide Folders on Android devices; learn how to hide files/folders on your Android smartphones and tablets

Easy way to secure your Files and Folders
in Android, here is how to hide files and
folders on Android devices
Android smartphone has become the
greatest boon in today’s life and most of
the people would love to own an Android
device, this is true for youngsters as well
as oldies. Android is an operating system
which provides many features to the user
and hence it has gained such a vast
publicity in a small time span.
Now, users also happen to save some
important documents or personal videos
and images or information in the Android
for their convenience. It could happen that
the smartphone may be accessible to
friends or some family members and could
be a case wherein they might land up
getting access to this extremely
confidential information which user does
not want to share with anyone. If you are
one of those who want to hide your files or
folders from such unwanted access please
read the below instructions and safely hide
your files and folders from anyone who
gets access to your phone:
Check if your Android device has
the file explorer; mostly it would be
available; however if your device
does not have one then download
the very versatile ES File Explorer
File Manager from https://
play.google.com/store/apps/
details?
id=com.estrongs.android.pop&hl=en
Open the file explorer also known
as file browser and search for your
file which has your confidential
data that you do not wish to share
with anyone
You need to select the file or the
folder and click on the “rename”
option
Now put “a dot” in the prefix that
means put this sign prior to the
name of the file or folder (for e.g.
If you want to save some folder
which has images then you need to
put dot in front of the name of the
folder as given here – .images )
Basically Android is Linux based
and when we use a (.) it thinks that
this is a system file and by default
it will hide this file or the respective
folder……easy isn’t it?
If you want to open this hidden file
it is simple, just go to your file
explorer and select this option
“Show hidden file or folder”
Suppose someday you feel that
now that folder need not be in a
hidden state all you need to do is
rename the file by removing the (.)
for e.g. if your file was “.image”
now make it “image”….as simple as
that.
Just by following these simple steps user
can easily hide their files or folders from
unwanted intrusions. So the data is now
totally secured in the Android system and
it cannot be seen either in gallery or in
explorer. Not only that if user wants to get
their file back from hidden mode even that
is possible and user can hide and unhide
their important data umpteen times.
Besides this user can also use the
Applock to protect their applications from
intruders. As the name suggests it
provides privacy to the users. Important
videos or pictures, chats and even sms,
contacts and other apps like Facebook,
Gmail……many more can be password
protected from other users who might use
their Android device, for e.g. friends or kids
borrowing the Android device to play
games.
User needs to open the Applock, go to the
Left side menu and in the settings they
can lock the required applications from
intruders. To unlock these applications
either user can enter “ #password ” in their
dial pad, and tap call button to open
AppLock. Or the Applock can be unlocked
by putting “domobile.com/applock” and
opening the website in the browser. User
can also protect other users from
unlocking their Applock by using the
advanced settings option given in the main
menu of Applock. The Applock is available
in 3 methods: 1) Paid 2) Free and with ads
3) Free version.
Users can avail Applock through this
site: This Applock can be downloaded from
here
To ensure that all the files and contents of
the Android device is always protected
users need to follow the above given
steps. So wishing all users and era of
privacy!!

The Different Types of Computer Viruses

A computer virus is a program designed to harm or cause harm on an infected computer. Its
spreads through e-mail attachments, portable devices, websites containing malicious scripts
and file downloads. A computer virus attaches itself to the host files and always activate whenever you open the infected files. The virus
can replicate itself and then infect the other files on your computer causing more damage. Below
is a list of different types of computer viruses and what they do
These viruses infect the files created using some applications or programs that contain macros
such as doc, pps, xls and mdb. They
automatically infect the files with macros and also templates and documents that are
contained in the file. They hide in documents shared through e-mail and networks.
Macro viruses include:
Relax
bablas
Melissa.A
097M/Y2K
They usually fix themselves inside the computer memory. They get activated every time the OS
runs and end up infecting other opened files.
They hide in RAM.
Memory Resident Viruses Include:
CMJ
meve
randex
mrklunky
These types of viruses delete any information in a file they infect, leaving them partially or
completely useless once they are infected. Once in the computer, they replaces all the file content but the file size doesn’t change.
Overwrite Viruses Include:
Trj.Reboot
way
trivial.88.D
These viruses mainly replicate or take action once they are executed. When a certain condition is met, the viruses will act by infecting
the files in the directory or the folder specified in the AUTOEXEC.BAT. The viruses are generally found in the hard disk’s root directory, but they
keep on changing location.
Direct Action Viruses Include:
Vienna virus
Also known as cluster virus or file system virus.
They infect the computer’s directory by changing the path indicating file location. They are usually
located in the disk but affect the entire directory.
Directory Viruses Include:
dir-2 virus
Most web pages include some complex codes in order to create an interactive and interesting
content. Such a code is often exploited to cause certain undesirable actions. They mostly
originate from the infected web pages or browsers.
Web Scripting Viruses Include:
JS.Fortnight – a virus that spreads via malicious
emails.
These type of viruses spread in many different ways. Their actions vary depending on the OS
installed and presence of certain files. They tend to hide in the computer’s memory but do not
infect the hard disk.
Multipartite Viruses Include:
flip
invader
tequila
These lardy viruses attack the file allocation table (FAT) which is the disc part used to store
every information about the available space,location of files, unusable space etc.
FAT Viruses Include:
the link virus
These types of viruses infect files just like the direct action and the resident types. Once inside
the computer, they ‘accompany’ other existing files.
Companion Viruses Include:
Asimov.1539
stator and terrax.1069
They encode or encrypt themselves in a different way every time they infect your computer. They use different encryption and algorithms. This makes it difficult for the antivirus software to locate them using signature or string searches
(since they are very different in each
encryption).
Polymorphic Viruses Include:
Marburg
tuareg
Satan bug
elkern
This program is very similar to a virus and has the ability to self-replicate leading to negative
effects on your computer.
Worm Viruses Include:
lovgate.F
sobig.D
trile. C
PSWBugbear.B
Mapson
Trojans can illegally trace important login details of users online. For example E-Banking is very common among users, therefore, vulnerability of tracing your login details whenever your PC is working without any strong powerful antivirus
installed.This is a virus spread via an email. Such a virus will hide in an email and when the recipient
opens the mail.This virus can spread in many different ways including a voluntary download. If infects certain
browser functions especially in form of re-directing the user automatically to certain sites.A good example is
Browser Hijackers Include:
the cool web search
They include the boot sector plus master boot record types. All the viral codes can be separate
location; however they infect the hard disks or the floppy.
Boot Infectors Include:
the brain virus -it is the very first wild virus to be created.From what we have seen, the many types of
computer viruses and their effects are very harmful and can completely damage your system. Always make sure your system is up to
date. Also install antivirus software. The antivirus program protects your computer and the personal information in it

World’s 10 most famous hacking groups who have had most success in recent times

Like the animals, hackers also hack their prey in groups. Sometimes these groups become famous for perceived good deeds like hacking ISIS websites done by Anonymous but most of the time these
hacker groups operate against the law.Some of the hacker groups have sincedisbanded after being in public eye. The prime example of infamous hackers group is Lizard Squad. They DDoSed the PlayStation and Xbox servers right during the time of Christmas weekend earning
them many villains.
Today we are listing top such 10 most notorious hackers of all time.
1. Lizard Squad
The DDoS attack on Facebook that lowered the popular social media network as well the cyber attacks on Malaysia Airlines website that directed visitors to a page
which read “404 – plane not found,” were carried out by the Lizard Squad. While Facebook refused to accept being hacked,Malaysia Airlines stated that their domain had been temporarily redirected elsewhere
and that they had not been hacked. Lizard Squad has also hacked Microsoft and Sony.
The intentions of Lizard Squad look dark and gloomy due to the diverse history of their work. They are not totally computer hackers as most of the hack they do is comedy. The group is responsible for a
high-profile hack of Microsoft Xbox Live and Sony’s Playstation Network. In August 2014, the group posted the ISIS flag on Sony’s servers and made other indirect references to the “cyber caliphate.” The group was arrested by the authorities in
the U.S. and England after the Xbox and Playstation hacks.
2. Syrian Electronic Army
The Syrian Electronic Army claims to
target political opposition groups and claims to support the Syrian President Bashar al-Assad. It calls itself “a group of enthusiastic Syrian youths who could not stay passive towards the massive distortion of facts about the recent uprising in Syria”.It becomes involved in the use of malware,phishing, defacement, spamming, and denial of service (DDoS) attacks with often
posting the Syrian flag on a victim’s
website. Some have even assumed as a fact that the group is connected with the Syrian state. The group have targeted the Facebook pages and Twitter accounts of President Barack Obama and French President Nicolas Sarkozy, as well as technology companies and news
organizations. Their tone is “serious and political to ironic and humorous.”
3. LulzSec
After the HBGary Federal hack of 2011,
LulzSec – Lulz Security abbreviated –
formed as an Anonymous spinoff. It’s
slogan was “Laughing at your security
since 2011.” The group announced itself
with a hack against Fox.com, then Sony
Pictures in 2011. The group took the CIA
website offline.
LulzSec had become well known for
ridiculing its victims after an attack, which
made the analysts compare them to the
hacks to internet pranks. In June 2011, a
‘50 days of Lulz’ statement announced that
the group had fallen out. However, on July
18, the News Corporation was hacked by
the group, who had posted false news
about the death of Rupert Murdoch.
In 2012, the LulzSec members were
arrested by the FBI after the group’s
leader, Sabu, turned them in. Prosecutor
Sandip Patel said the group thought of
themselves as “latter-day pirates.”
4. Anonymous
“We are Anonymous. We are Legion. We
do not forgive. We do not forgive…. Expect
us.”
Known most for its hacking and Guy
Fawkes masks, Anonymous is a
decentralized open online creation group.
Reports conceive that Anonymous is made
up of thousands of “hacktivists.” The group
has compromised religious, corporate and
government websites.
The group has declared war on Scientology
and hacked the Pentagon. In 2012’s
Operation Payback, they also attacked
MasterCard, Visa and PayPal for refusing
to process payments to WikiLeaks, which
in turn led WikiLeaks to choose the
cryptocurrency Bitcoin. Anonymous
supported Occupy Wall Street and hacked
the New York Stock Exchange website in
2011.
For being involved in Anonymous,
individuals have been arrested in the U.S.,
UK, Netherlands, Australia, Spain, and
Turkey.
5. The Level Seven Crew
Rumored to be encouraged by the seventh
level of hell from Dante’s Inferno, ‘the
violent’ level, this hacking group hacked 60
high profile computer systems (NASA, The
First American National Bank, Sheraton
Hotels) in 1999. They also hacked into the
US Embassy in China’s website. However,
this group broke up and stopped
functioning in 2000.
6. Network Crack Program Hacker
(NCPH) Group
It was alleged that the NCPH Group was
formed in China in 1994, whose leader Tan
Dailin was apparently working for the
Chinese army. It is believed that the
People’s Liberation Army was funded by
the NCPH. The group appears to be based
out of Zigon in Sichuan Province.
7. Chaos Computer Club (CCC)
The mission of the Chaos Computer Club is
to uncover the security flaws, which
basically does not only depend upon illegal
activities. It was founded in Berlin during
the early 1980s and is one of the largest
European hacking groups. The group made
its point after they used the Bildschirmtext
page to steal 134,000 Deutsch Marks from
a Hamburg bank, only to send the money
back after having completed its mission
the next day, which was to expose a
security flaw.
Early CCC member Andy Müller-Maguhn in
an interview with OWNI stated: “we needed
a lot of legal experts to advise us what we
could or could not hack, and to help us
distinguish between legal activities and
grey areas of legality”. The group’s kindly
approach has allowed the CCC to become
“an accepted and recognized entity
because it has worked to educate the
public about technology since the 1980s,”
Müller-Maguhn added. The group’s most
recent focus has been on the mass
surveillance complex, in order to fit in a
German hacker ring. CCC Member Falk
Garbsch stated:
There have to be consequences.
The work of intelligence services
has to be reviewed – as does
their right to exist. If necessary,
their aims and methods will have
to be redefined. …We have to
think about how these
[shared]data are processed and
where they can be allowed to
resurface. And this is not just
the challenge for 2015, but for
the next 10 years.
The group has strongly objected French
nuclear tests, made full use of COMP128
encryption algorithm of a GSM customer
card, stole money on live TV via
Microsoft’s ActiveX; and examined the
German federal government’s own
malware. The group’s press release on the
topic reads:
“The malware can not only
siphon away intimate data but
also offers a remote control or
backdoor functionality for
uploading and executing arbitrary
other programs. Significant
design and implementation flaws
make all of the functionality
available to anyone on the
internet.”
The CCC may have characteristics of a
Marxist, after being caught selling source
code from U.S. corporations and
governments to the Soviet Union’s secret
police KGB.
8. globalHell
globalHell was founded by street-gang
member Patrick Gregory. Data on 115
websites were reportedly destroyed by the
group charging millions in damages. In
order to get away from street gang life,
Gregory had turned to computer. His crew
of hackers behaved basically the same as
a street gang. “global hell will not die” was
reportedly written by the group on the
United States Army’s website. Gregory
confessed in court to causing $2.5 million
in hacking damages.
9. Iran’s Tarh Andishan
Looks like the Tarh Andishan wants to
control the world’s web-based systems.
Mostly based in Tehran, Iran, the group is
approximated to have 20 members. A
talented hacker group, Tarh Andishan looks
like grew out of a Stuxnet worm virus,
which Iran claimed the US and Israel had
created.
The Iranian government doubled-down on
its cyber warfare. The group uses self-
propagating software, backdoors, SQL
injection, systems, and other techniques.
The group is best known for one of the
attacks called “Operation Cleaver.” This
hacker group has apparently hacked
security systems and airline gates. Most
findings were not taken into consideration
due to the “grave risk to the physical
safety of the world” the group reportedly
poses, according to the report.
10. TeaMp0isoN:
A 16-year-old hacker with a pseudonym
TriCk started this group in 2010.
TeaMp0isoN hacked into Facebook, NATO,
the English Defense League, including
Tony Blair’s email account. The group
broke up and stopped functioning in 2012.
However, in 2015, the group rebranded
itself as a white-hat computer security
research group.
There are several other hacking groups
who may be more deadlier than the above.
We have listed only those hacker groups
who have consistently been able to be in
public eye due to their hacking exploits.

www.mwascomz.blogspot.com

Thursday 8 October 2015

31 Things You Know Only If You’ve Been Pro User

1. Shift + Delete button combination in
Keyboard delete your file and folder
permanently and you can’t recover it
through Recycle bin.
Shift + Delete Delete Your Files
Permanently
2. Download Youtube Videos from Adding SS
before youtube.com
Download Youtube Video from Adding SS
3. Install and update All Windows Software at
one click from Ninite.
Download All Windows at once from
Ninite Installer
4. Recover your deleted Data and files from
Recuva Software.
Recuva File Recovery Software for
Windows
Also Read: Best Free Data Recovery
Software for all iOS Devices | iPhone/iPad/
iPod Recover
Deleted Photos and Videos from Android
Mobile (Full Guide)
5. Speed up your PC from CCleaner
software.
Speed up Your from CCleaner
Also Read: Best Feature in CCleaner
Software for Speed up Your PC
How to Speed up a Slow Computer 2015
6. Convert all type of files like audio , video,
documents, pictures from into any
formats from Zamzar.com .
Zamzar File Converter
7. Download Facebook Backup Data from
Facebook Website. Open Facebook
Settings and Download Copy of Your
Facebook Data.
Facebook Backup Data
Read More: Best 40 Facebook 2015 Hacks
,Tips & Tricks that Make Your Facebook
Life Better
8. Type like a hacker from Hackertyper
website.
Hackertyper for Make your Computer
look like hacker
9. Edit your Photos Like a pro from Autodesk
Pixlr.
Autodesk Pixlr Edit Photos Like a Pro
10. Control Your PC through RDP Connection
from any android mobile.
RDP App for Android
Read More: Remotely Control Your Window
7 and 8 PC with Microsoft RDP from
Android Phone
11. Calculate any values from searching on
google.
Google search calculator
Also Read: How to Use Google Like a Pro
in Searches
12. Listen Free Music from Soundcloud.com .
Listen Free Music SoundCloud
13. See the Space in your Mobile from
Starchart Android App
Starchart Android App
14. Change the Color of your Windows Folder
from Folder Colorizer.
Folder Colorizer
15. Enhance Your Windows Desktop from
Rainmeter
Iron-Man-Rainmeter-Skin
16. Edit PSD Files without installing Photoshop
in Computer from Onlinephotoshopfree.net
Online Photoshop
17. Save your Important Data on Cloud from
Using Google Cloud Drive.
Google Cloud Drive
18. Turn your Computer into a WiFi Hotspot
and share internet connection with other
devices. Download Mhotspot software or
you can use command method .
Windows-PC-Hotspot
19. Kodi one of the best Media Player for any
PC.
Kodi Best Media Player for Windows
20. Download Sumatra PDF Reader for
windows(Only 4MB), Adobe Reader give
you limited features and take lots of time
in installing.
Sumatra PDF Reader
21. Change the Login Screen Wallpaper
from Windows Login Wallpaper Changer.
Window 7 Login Background Changer
22. Use DNS Changer software for increasing
your internet speed.
DNS Jumper for fast DNS
23. Turn your android mobile into mouse and
keyboard from Unified App.
Unified-Remote-App
.Also Read: Best Android Apps that
Everyone Should Install in Android Phone
24. Increase the Download Speed in Internet
Download Manager from these IDM
amazing Tricks .
IDM Speed
25. Get Ownership of any file in windows from
simple registry hack.
Take ownership of files in windows
26. Remove all program shortcuts and widgets
from Window Desktop , increase your
computer speed.
A Clean Desktop Means A Faster
Computer
27. Run android apps in windows from
Bluestack android app.
Bluestacks Android App in Windows
28. Change the Password of Windows without
Knowing Old Password.
Change Password of Windows
29. Unlock Window Computer from Your
Android Smartphone. New way of security
can protect your pc from unidentified
login.
unlock pc from android phone
30. Increase the Size of Your HardDisk up to
2TB by Creating Virtual HardDisk
Increase the Size of Harddisk
31. How to Change Windows 7 Boot Screen
Animation
Windows-custom-boot

Thursday 1 October 2015

95% people don’t know these hidden features of GOOGLE


Chat With Aliens
Every day Google answers more than one billion
questions from around the world. But here are 15
things you might not have ever known you can
do with the world’s most powerful search
engine.
For example, the Mars Feature on Google Earth
5 allows users to explore the surface of the red
planet and even talk with an alien! Just enter
“Meliza” into the search box and watch as your
taken to a section of the planet where you can
“chat” with a local alien. It’s just a chat bot, but
it’s fun to try. Give it a shot.
Do a Barrel Roll
You can make your Google page roll on end by
entering the phrase “do a barrel roll” into the
search box and hitting enter. It’s a fun reference
to the classic video game Star Fox!
Track a Flight
Just enter the desired airline and flight number
into Google’s search box and instantly see the
arrival and departure times right in the results.
Now you can keep up-to-date with any flight
without having to constantly check the airline’s
website.
Fly Using Google Earth
Visit Google Earth, press CTRL + Alt + A
(Command + Option + A for Mac), choose your
aircraft, and fly! You can even simulate flying an
F16 Fighter Jet.
Search Faces Only
Sometimes an image search can lead to a
number of unwanted results. just click search
tools, hit “Type”, and select the “Face” option to
narrow your results to exactly what you’re
looking for. It works for .gifs too! Just choose
the “Animated” option.
Use Google as a Proxy
If your school or office stops you from visiting
certain sites, just use type
“cache:WEBSITENAME.com” into the search box
and avoid the block. It’s that easy.
Search in Klingon
If you’re a big fan of Star Trek, try using
Google’s custom Klingon search. It’s a fun way
to put a new spin on Google. It will even correct
your grammar! And if you don’t speak Klingon,
don’t sweat it. Google has their own Klingon
translator and dictionary to help you out.
Track Packages
Just enter any package tracking number into
Google to see exactly where it is. Now there’s
no need to log in to the USPS, UPS, or FedEx
website!
Reformat Your Gmail Address With Dots
You can create multiple email addresses by
simply adding a dot (.) anywhere in your Gmail
username. Because Gmail doesn’t recognize
dots as characters, messages sent
to yourusername@gmail.com and y.o.u.r.u.s.e.r.n.a.m.e@gmail.com will
all go to the same place!
Synonym Search With a Tilde
Adding a tilde (~) to your search terms will tell
Google to include any related search terms or
synonyms you mayhave missed. This improves
your results page and can help find exactly what
you’re looking for.
Beatbox With Google Translate
It may sound odd, but typing a random string of
letters into Google Translate, then hitting the
listen icon will prompt Google to beatbox
whatever you wrote down. Try it yourself by copy
pasting “pv kkk pkkk pvpvpv ppkk pddd bschk
bschk pv zk pv bschk pv pv pv bschk bschk
bschk kkkkkkkkkk bschk bsch” into Google
Translate and giving it a listen.
Cut Down Email Length
If you only want to reply to a particular section
of text someone sent you, just highlight that
area before hitting reply. This will add only the
chosen section to the quoted text and leave the
rest out of your reply!
Search Like Elmer Fudd
That’s right, Google Preferences lets you search
in any language. Even Elmer Fudd. This is a
great trick to show the kids. Just go to
Preferences, click “Language” and choose “Elmer
Fudd” There’s even Pig Latin!
Browse The Classics
Google Book Search lets you thumb through the
pages of classic books, all from the comfrot of
your computer. It’s a great way to see if you’ll
enjoy a book before you buy, check out, or
borrow it! You can even find the latest
magazines.
Play Games on Youtube
Visit YouTube, pick a random video, and simply
type 1980. This will automatically bring up a
missle defense game where you will have to
protect your video from an impending attack!
Fail, and your video will crack apart. This is the
perfect way to kill time while waiting for your
video to buffer.

Sunday 26 July 2015

Internet Hack : Top 10 Simple and useful Internet tricks for you


There are some simple keyboard shortcuts
which one can use while using Internet and
it would help the user to avoid typing a lot
and also at certain places the mouse can
be completely avoided by these tricks.
Entering a new website: Normally
users would have to type http:// or
www before they want to enter a
new website however now just type
the name of the website and
press <Ctrl><Enter> . By default this
will add “http://www.” in front and
“.com” towards the end of the
website. Users can also just type
out the name of the website for eg:
“xyz.com” and press <Enter> this
will automatically give “http://
xyz.com”. Now if the website has
“.org” then user would need to use
<Ctrl ><Shift><Enter> keys and for
websites with “.net” they need to
use <Shift><Enter> keys to get the
full website name.
Online applications clues:
Toggling between Multiple
columns : Suppose user is
filling the online forms then
using <Shift><Tab> helps
user move to previous
column / field while just
using <Tab> takes user to
the next column / field.
Thus user can avoid using
mouse in this case to move
from one column or field to
another.
Choosing from multiple
options: Most of the times
while filling the information
online, the form displays
huge data from which user
needs to choose the right
information. For example:
Most of the times the data
would require user to fill the
details of the country that
they belong to and this is a
vast data, now user can just
type out the initial alphabet
of their country and then the
search would be restricted
to the list of names starting
with the alphabet that they
typed. This procedure is
very useful when someone
has to choose from vast
data and is applicable to
similar situations.
Using Tabs for smooth browsing:
Here again we will discuss certain
shortcut keys with the help of
which users can surf the internet
browser in much better way.
Suppose user needs to open
a new Tab then use
<Ctrl><T>.
For closing any open Tab
press <Ctrl><W> .
For moving from one Tab to
another <Ctrl><Page Up> or
<Ctrl><Page Down> .
Suppose user has closed
some tab and now wants to
reopen it then just press
<Ctrl><Shift><T> user can
open the last window that
was closed.
Press “ F11″ key to get full
screen view of the Internet
browser. Re press F11
key to resume the normal
view.
Suppose users need to find
something in a web page
then they can open a find
tool by clicking <Ctrl><F>
and thus carry on with their
search.
Hold the <Ctrl> and press
“+” or “-” this will increase
or decrease the size of the
text respectively.
Hold the <Ctrl> and press
“O” the size of the text gets
reset.
Opening link in a new tab: This can
be done by using the mouse. Just
right click the mouse and from the
drop down choose the option “open
link in new tab”. Another option is
press the <Ctrl> key and click the
link this will lead to opening of the
link in a new tab. There is one
more alternative wherein press the
<Ctrl> key and press the wheel of
the mouse keeping the cursor on
the link.
Improvised Search: Most of the
times when user is searching for
something and uses two or more
words then the search engine gives
a mixture of result because it
considers the two words individually
for its search. For eg: In case of
:School help, the search will
consider ‘School’ and ‘help’ as two
words and give results accordingly,
instead if user types “School help”
in quotes then this helps the search
engine to search the correct
information. So by using quotes
user can improvise their searches.
Highlight the address bar : Suppose
user needs the access bar then just
press <Alt><D>, without using the
mouse one can access the address
bar. One can also make use of “F6″
key for the same purpose.
Bookmark : Most of the times we
come across some good
information and this information
can be saved by using the
bookmark option which can be done
by using the mouse. Now users
can use the shortcut keys to avoid
using mouse. Just press <Ctrl><D>
and then <Enter> your page has
been bookmarked for you! Further,
to open the Internet bookmarked
page press <Ctrl><B>.
Reloading and refreshing of a page :
Sometimes due to the cache issue
the webpage does not come up and
then users can reload the page
using < Ctrl >< Shift>< R > . Users can
also refresh a web page by
pressing “F5″ key.
Pause the video : While viewing the
YouTube videos the easiest way to
pause it by clicking the “K” key and
to resume the video users would
just need to press the same key
(“K”)again.
Try alternative browsers : Usually
the computers use the default
browsers which comes with it when
it is bought. For example: Microsoft
has the Internet Explorer. However,
users can even change their
browser to Google Chrome, Mozilla
Firefox which can be downloaded
for free of cost. The benefit of
getting these browsers is to get the
different add-ons and plug-ins
which are available in these
browsers which give additional
features that can further improvise
the browsing experience like users
can change the color and also add
more features to some particular
window in their browser. User can
get the Firefox addons and get the
color changes done as per their
wish.
These are few Top 10 simple tips and
tricks, our readers might be using some
other shortcuts for working faster. Feel
feel to leave other shortcuts which you
feel is much better in the comments
section.

Wednesday 22 July 2015

How to create hotspot on debian

Hotspot share your computer's Internet
connection with other devices over Wi-Fi.
Find wireless driver and make sure that driver is
ath5k or ath9k, this solution will only work for
those drivers.
For others wireless cards and drivers for now
doesn't work...
1. In terminal type: lspci
If you use usb wireless adapter type command
lsusb.
We now need to install 2 additional tools to make
out hotspot, 1st one is hostapd(hotspot server),
2nd one is dnsmasq(dns dhcp server).
2. apt-get install hostapd dnsmasq
3. Stop those services if started already, and
prevent them from starting on system start up.
in terminal type:
sudo service hostapd stop
sudo service dnsmasq stop
sudo update-rc.d hostapd disable
sudo update-rc.d dnsmasq disable
4. Now we need to set up config files.
in terminal type: gedit /etc/dnsmasq.conf
or kate /etc/dnsmasq.conf if you use kde...
add those lines to the config file:
__Code:___________________________________________
____________
# Bind to only one interface
bind-interfaces
# Choose interface for binding
interface=wlan0
# Specify range of IP addresses for DHCP
leasses
dhcp-range=192.168.150.2,192.168.150.10
__________________________________________________
__________
5. hostapd config
In terminal type: gedit /etc/hostapd.conf
and add those lines:
_____Code:________________________________________
_______________
# Define interface
interface=wlan0
# Select driver
driver=nl80211
# Set access point name
ssid=myhotspot
# Set access point harware mode to 802.11g
hw_mode=g
# Set WIFI channel (can be easily changed)
channel=6
# Enable WPA2 only (1 for WPA, 2 for WPA2, 3
for WPA + WPA2)
wpa=2
wpa_passphrase=mypassword
__________________________________________________
_______
You can change ssid name and password for
anything you want here. Current config will
create hotspot named myhotspot with password
mypassword.
6. Now create anywhere you want a file named it
hotspot.sh (best way to save script on Desktop)
Edit it with any text editor like this:
________ Code:
___________________________________________
#!/bin/bash
# Start
# Configure IP address for WLAN
sudo ifconfig wlan0 192.168.150.1
# Start DHCP/DNS server
sudo service dnsmasq restart
# Enable routing
sudo sysctl net.ipv4.ip_forward=1
# Enable NAT
sudo iptables -t nat -A POSTROUTING -o ppp0 -j
MASQUERADE
# Run access point daemon
sudo hostapd /etc/hostapd.conf
# Stop
# Disable NAT
sudo iptables -D POSTROUTING -t nat -o ppp0 -j
MASQUERADE
# Disable routing
sudo sysctl net.ipv4.ip_forward=0
# Disable DHCP/DNS server
sudo service dnsmasq stop
sudo service hostapd stop
__________________________________________________
____________
You will probably need to change ppp0 in this to
eth0 or any other number which refers to your
wired connection.
7. Last step. Now you can start your hotspot by
starting script. Just run it...
For me it looks like this:
root@distro:~# cd /root/Desktop/
root@distro:~# chmod +x hotspot.sh
root@distro:~/Desktop# ./hotspot.sh
Because I have it on my Desktop.

Best we sites to learn programming

----- * Ada * -----
http://www.adahome.com/Tutorials/Lovelace/
master.htm
http://www.adahome.com/Ammo/Cplpl2Ada.html
http://www.computer-books.us/ada95.php
http://goanna.cs.rmit.edu.au/~dale/ada/aln.html
http://www.freeprogrammingresources.com/
adatutr.html
http://en.wikibooks.org/wiki/Ada_Programming
http://libre.adacore.com/
----- * Assembly * -----
http://101.lv/learn/asm/index.htm
http://www.youtube.com/watch?v=K0g-twyhmQ4
----- * Awk * -----
http://www.grymoire.com/Unix/Awk.html
----- * Bash * -----
http://www.freeos.com/guides/lsst/
http://tldp.org/LDP/abs/html/index.html
----- * C#/Mono * -----
http://csharp-station.com/Tutorial/CSharp/
----- * C/C++/C++11 * -----
Tutorials:
http://www.cplusplus.com/doc/tutorial/
http://thenewboston.org/list.php?cat=16
http://www.cprogramming.com/tutorial.html
http://www.iu.hio.no/~mark/CTutorial/
CTutorial.html
http://c.learncodethehardway.org/book/
Reference :
http://en.cppreference.com/w/
http://cppannotations.sourceforge.net/c
++annotations/html/
http://www.mindview.net/Books/TICPP/
ThinkingInCPP2e.html/
http://www.open-std.org/jtc1/sc22/wg21/docs/
papers/2011/n3242.pdf
http://cpp-next.com/
http://en.wikipedia.org/wiki/C%2B%2B11
FAQ:
http://www.parashift.com/c++-faq/
http://www2.research.att.com/~bs/C
++0xFAQ.html (redirects to http://
www.stroustrup.com/ )
Book Recommendations:
http://stackoverflow.com/questions/388242/the-
definitive-c-book-guide-and-list
http://cboard.cprogramming.com/cplusplus-
programming/74078-cplusplus-book-
recommendations.html
http://hackershelf.com/browse/
Interesting articles:
http://www.dreamincode.net/forums/
topic/264061-c11-fun-with-functions/
http://www.developerfusion.com/article/133063/
constructors-in-c11/
http://cpp-next.com/archive/2009/08/want-
speed-pass-by-value/
http://www.informit.com/articles/article.aspx?
p=1914190
http://www.drdobbs.com/cpp/c11-
uniqueptr/240002708
http://blog.pureabstract.org/2012/06/09/
choosing-an-stl-sequence-container/
----- * D * -----
http://en.wikipedia.org/wiki/D_
(programming_language)
http://dlang.org/
----- * Delphi * -----
http://101.lv/learn/delphi/
http://sheepdogguides.com/dt100/
dt100index.htm
http://sheepdogguides.com/tut.htm
http://www.delphi-central.com/tutorials/
http://delphi.about.com/od/database/a/
databasecourse.htm
----- * GTK+ * -----
http://www.gtk.org/
http://learngtk.org/
----- * Haskell * -----
http://learnyouahaskell.com/chapters
http://book.realworldhaskell.org/read/
----- * Java * -----
http://www.javavideotutes.com/lessons
http://docs.oracle.com/javase/tutorial/java/
index.html
----- * Lisp * -----
http://nostoc.stanford.edu/jeff/llisp/index.html
----- * Lua * -----
http://lua.gts-stolberg.de/en/index.php?uml=1
http://www.phailed.me/2011/02/learn-lua-the-
hard-way-1/
----- * Objective-C * -----
http://cocoadevcentral.com/d/learn_objectivec/
http://mobile.tutsplus.com/tutorials/iphone/
learn-objective-c-day-1/
https://developer.apple.com/library/mac/
#documentation/Cocoa/Conceptual/ObjectiveC/
Introduction/introObjectiveC.html#//apple_ref/
doc/uid/TP30001163
----- * Pascal * -----
http://www.taoyue.com/tutorials/pascal
http://www.pascal-programming.info/
lessonindex.html
----- * Perl * -----
http://www.perl.org/books/beginning-perl/
----- * Python * -----
http://learnpythonthehardway.org/book/
http://docs.python.org/tutorial/
http://www.awaretek.com/tutorials.html
http://www.sthurlow.com/python/
----- * Qt * -----
http://qt.nokia.com/learning
http://sector.ynet.sk/qt4-tutorial/
----- * Regex * -----
http://regex.learncodethehardway.org/book/
----- * Ruby * -----
http://ruby.learncodethehardway.org/book/
http://tryruby.org
http://koans.heroku.com/
----- * SQL * -----
http://sql.learncodethehardway.org/book/
----- * Tcl/Tk * -----
http://www.bin-co.com/tcl/tutorial/contents.php
----- * VB.NET/Mono * -----
http://www.homeandlearn.co.uk/net/vbnet.html

World’s 20 most expensive domains

This summary is not available. Please click here to view the post.

My thoughts

In this new world .technology must emulated since in every aspect of life and the many fields-engineering,medicine,education,transport etc all depend on technology .
Robots work efficiently and fast .technology agencies and the world large should follow suit etc

Saturday 18 July 2015