Recent Comments

  • 2 Ways to Spy on Whatsapp

    Whatsapp is very popular instant message application for smartphone, Now a days many people they are using this app including our children.

  • How to Hack WiFi Using Anroid Device

    Without a software or application hacking is not easy, but with application and software hacking is simple. I Know this sound crazy to you How? don't worry just read this article you will find out how easy it is.

  • How to Remove Virus From Computer Without Antivirus

    computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.

  • How to Hack Android Lock Patterns

    The main reason to set up some sort of lock screen security on your android phone is to keep someone or friends and family from checking out your messages or private pictures or you don’t want anyone who steal your android to get full access to your e-mails, Facebook, Internet Banking pictures or other sensitive data.

Thursday, December 17, 2015

How to Hack Android's Lock Screen Patterns, PIN or Password

The main reason to set up some sort of lock screen security on your android phone is to keep someone or friends and family from checking out your messages or private pictures or you don’t want anyone who steal your android to get full access to your e-mails, Facebook, Internet Banking pictures or other sensitive data. But what if you’re the one who cannot access your phone? You could forget your PIN or pattern, Or someone pranks you by setting up a lock screen pattern and just leaves you struggling with it.
           In any case, there’s quite an easy solution to this problem without throwing your phone against a wall.    The only thing you need is to have Android Device Manager enabled on your device (before you locked yourself out of your phone).




Method 1:
Unlock Your Android Using Android Device Manager (ADM) 
Note:   The following method only applies to devices that have Android Device Manager enabled.

Step 1 : 
On a computer or other mobile phone, lunch your browser and visit:  google.com/android/devicemanager 

Step 2:
Sign in using your Google login details that you also used on your locked android.

Step 3:
In the Android Device Manager (ADM) interface, select the device you need to unlock.

Step 4:
Select Lock

Step 5:
In the appearing window, enter a temporary password. You don’t have to enter a recovery message. Now click ‘Lock’ again.

Step 6:
If it was successful, you should see a confirmation message below the box with the buttons Ring, Lock and Erase.

Step 7: 
On your phone you should now see a password field in which you should enter the temporary password. This should unlock your phone.

Final Step:
Now go to your phone’s lock screen settings and disable the temporary password. That's all.

METHOD 2:

Disable your Lock Screen Using Custom Recovery and Pattern Password Disable

Note: For this method to work for you memory card is needed and your phone must have a custom recovery installed and SD card slot.




This method is for more advanced Android users that know what the terms Rooting and custom recovery means

Things you need to do

  1. Download the Pattern Password Disable ZIP file on your computer and put it on an SD card.
  2. Insert the SD card into your phone.
  3. Reboot your phone into recovery.
  4. Flash the ZIP file on your SD card.
  5. Reboot.
  6. Your phone should boot up without a locked screen. Should there be a password or gesture lock screen, don’t panic. Just type in a random password or gesture and your phone should unlock.

Share:

Tuesday, October 6, 2015

Simple Way To Download Facebook Videos






We enjoy watch videos on Facebook uploaded by our friends and family members but sometimes we want to download videos from Facebook on our Android phone.


Although, Facebook does not offer a direct link for you to download a video, but you can download the Facebook videos on your Android phone using a third-party app, which you can find A lot of them in play store.

If you want to download Facebook videos in Android and enjoy watching the videos offline when you don’t have internet access on your Android smartphone then read the rest of my article where you will find a way to download Facebook videos in Android.

Without wasting your time goto play store and search for MyvideoDownloader or click this link to download it directly from play store.

HOW TO USE MYVIDEODOWNLOADER





  1. Once installed, launch the app and log in to your Facebook account.
  2. Swipe in to the right to access the menu. In the menu, select ‘News Feed’ to search for the video you want to download.
  3. Once you have found a video you like, tap on the little tick icon beside the video you would like to download, and hit the download icon located on the top-right corner of the screen.
  4. Your downloaded video will be saved to you phone’s SD card by default, but you can choose to save videos to your phone SD card from the Setting’s menu.  
If you enjoy this post dont forget to share it with your friends Thanks
Share:

Tuesday, July 7, 2015

Best Collection of Free Spy Apps for Android



Before you proceed to read the full article and try some of the apps mentioned below, I should remind you a few things. Spying on someone without his permission is illegal which may put you in serious trouble with law. There is Apps which i mentioned below that will allow you to snooping and find out who has been calling your wife or your kid.

1. Ear Spy

 Ear Spy lets you appear immersed in your music but in secret, it amplifies the sounds around you via your device microphone all the way to your earphones. Have your earphones in your ears and under your hoody, but leave your smartphone bare to pick up conversations in its surroundings. The app also has an equalizer to enhance the listening conditions of your surroundings.



  

 2. Spy Message

 Want to send a confidential message to your business partner but doesn’t want it to be kept in his/her phone? Time your message to be automatically deleted over time without leaving a trace. Spy Message allows you to exchange secretive messages and appointments, then have the message self-destruct (minus the explosions) after a configured time frame. 



This last app is Secret Agent, a complete toolbox that every spy should have. It contains useful tools and sensor features for you e.g. a spy torch, a fun (fake) infrared-style camera filter, a compass, a spectrum analyzer, secret audio recording, sensor data and many more!


4.  M-SPY

A Simple yet easy to use “audio” spy app for android. M-spy android app allows to listen conversation secretly from a place where you kept the phone. Install the app and set a Set a PIN then put the phone in silent mode and hide the phone where you want to spy. Send an SMS to the phone and it will call you back.




This not truly a spy app for android. However if you just want to know what your kids are up to then this might be very good tool. The app silently records calls and able to upload them in cloud using dropbox account. Can also configured which calls not to record.


An open source android app project to allow users to capture images secretly. The app provide a smart way to shoot photos with an invisible camera so people wouldn’t notice that you are taking pictures.




If you enjoy my article dont forget to share it with friends





Share:

Monday, March 23, 2015

How to Change WhatsApp chat wallpaper

Are you bored of seen your default chat wallpaper, in this tutorial I am going to teach you how to update your chat wallpaper. It is very easy just follow this simple steps:-

Step 1

Lunch your whatsApp Application on your android or iOS.

Step 2

Tap Settings in your navigation menu then tap on Chat Setting.

Step 3

Under your chat setting Tap on Chat Welpaper.

Step 4

Choose your new wallpaper. Choose
between searching through the
default Whatsapp Wallpaper Library or your Camera Roll for a new wallpaper.

Step 5

Tap on the image you would like to select
as your new wallpaper. To view it,
go to any of your existing conversations
under "Chat" or start a new chat with
someone.

To reset your wallpaper

Tap the "Reset Wallpaper" button under "Chat
Wallpaper."

If you enjoy this tutorial don't forget to share it with your friend by clicking on the one of the following share button.

Share:

Saturday, March 14, 2015

How to remove virus from computer without using antivirus

Computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.
Viruses can also replicate themselves.
All computer viruses
are man-made. A simple virus that can
make a copy of itself over and over again
is relatively easy to produce. Even such
a simple virus is dangerous because it
will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.
One of the ways by which a virus can infect your PC is through USB/Flash drives.
Common viruses such as 'Ravmon' ,
'New Folder.exe', 'Orkut is banned' are spreading
through USB drive .
Most anti virus programs are unable to
detect them and even if they do, in most
cases they are unable
to delete the file, only quarantine it.So in
This tutorial I am going to teach you how  to delete this type of virus from your computer without using any antivirus software.
Step 1:
Click on start menu go to all program click on accessories under accessories right click on command prompt click on run as administrator.
Step 2:
Select an affected drive e.g drive C:, F:, D:, etc.
By typing:  cd F:/  and press enter
F:/ is your affected drive.
Step 3:
type attrib -s -h *.* /s /d then press enter.
STEP 4:
type 'dir'
the dir command shows you the
content of the drive.
STEP 5:
check if there is an unusual .exe file
if there's an autorun.inf file
rename it
( rename filename.extension
new filename ).
STEP 6:
by doing all of the above steps you can now access the drive without affecting the virus Go to my computer.
STEP 7:
Select the drive and delete the harmful files from the drive e.g auto run.inf or you can delete it using your cmd by typing: del autorun.inf syntax of this command is del file name extension.




Share:

Wednesday, March 11, 2015

You can now Customize your Moto 360 smartwatch with Moto Maker

Motorola just added the Moto 360 to the Moto Maker Web service, letting you add personal touches to your smartwatch like custom case finishes, band styles and your choice of 11 watch faces.

The customization options on Motorola’s device include a dark or light metal finish, or a rose gold option (for a $30 premium), as well
as three leather strap options, plus
three different types of metal link bracelets in various colors (metal is $50 more expensive than leather).

Face options are, of course,
software features, but your watch will come sporting the design of you choice right out of the box. Motorola is clearly looking to take advantage
of the Moto 360’s popularity by extending the personalization of the product, given potential shoppers an ability to create something in line
with their own tastes. It’s a strategy that pretty closely resembles Apple’s own approach with the sales of the Apple Watch, which will come in three different collections
“curated” by the company to mix and match both case finish and case size, as well as a variety of band options.

Apple’s approach still offers more in the way of customization, but Motorola’s play is a clever,
and fairly easy-to-implement way to add a range of personalization to an existing product, in a way that Android Wear competitors probably can’t match quite as easily.

I’m still a little sore about the fact that the Moto 360’s initial concepts presented a fully circular display, which gained a black bar across the bottom to mar the roundness when
it eventually shipped, owing to design limitations related to sensors and hardware engineering. But this customization tool is avsmart, timely shift in their market strategy, and should help the company keep a lead on their Android Wear peers.

Share:

Monday, March 2, 2015

2 Ways to Spy on Friends whatsapp Activities

Whatsapp is very popular instant message application for smartphone, Now a days many people they are using this app including our children.
So in other for we to maintain the safety of our children online, we need to monitoring there activities, we need to know who they are chatting with which kind of agreement they have met and so on.
That is why in this tutorial I have come with two simple solution that does not require you to be a computer geek before you perform this job and it does not require a computer system only your phone and internet connection that's all.
Let us quickly jump and start our tutorial don't run it is not a race, just follow this simple tutorial because it is not require much time you can do it in less than 30 minutes is depend with your internet connection speed.
Solution One
Install Monitoring Application
Monitoring app this are type of application that let you to spy on someone else phone remotely by using this kind of software is not only a whatsApp that you can spy it will let you to spy on the following
1. WhatsApp group chat
2. WhatsApp chat
3. Shared Audio
4. Shared images
5. Shared location
6. WhatsAssp contact
7. Facebook chat
6. Browsing history
7. Viber
Etc
And the most lovely  thing about this,  the victim may not know that you are spying on him since the app will run in an invisible background.
Here are list of this Applications
Second option
Using Mac Address of the victim
To use this method follow these steps. But this method it is a bit little harder than the first one, but the lovely part it is free no money is required.
1. Uninstall your WhatsApp
2. After that you are required to get Media Access Control (MAC) address of the victim. 
Here are the ways to get Mac address of the victim
For android:-
- Go to settings - About Phone - Status and Wi-Fi Mac address.
For iPhone:-
- Goto Settings - General - About and wi-if address.
3. On your android phone, install BusyBox and terminal app. Lunch the terminal app and go through the instructions and spoof the MAC given in the link. You will get Spoofed MAC address after going through all the steps.
4. Now you can install your Whatsalp on your Android device. Enter the phone number of the victim and verify it by given the verification code sent by Whatsapp on your victims smart phone.

Share:

Sunday, March 1, 2015

The 'Sensor tech' makes predicting the future easier to do

These technologies give insights into how products are performing. Sensors record vibration, temperature, pressure and voltage, among other conditions, and
provide data for real-time analysis.
Sensors can help lead to discovery of faulty parts in products weeks before they actually fail.

Initial deployments of sensors have been in large and expensive industrial platforms, such as electrical generation systems and
jet engines. In time, sensors connected to analytical platforms will be found in nearly every product.

The belief is that this technology will make machinery and systems more reliable.

Sensors and analytics will alert users and vendors to problems days, weeks and months before a problem becomes visible.

This insight into performance will also significantly reduce unplanned failures.

"We will know more about when they are going to fail, and how they fail," said Richard Soley, CEO of the Object Management Group, a nonprofit technology standards consortium.

Businesses will also benefit from learning how customers are using their products, which will shape how products are made, Soley said.

Predictive analytics capability in industrial applications is not a new concept. Big machinery has long used sensors. What is new is the convergence of three major trends that will make deployment ubiquitous, say people working in this area.

First, sensor technology is declining in price as it gets smaller and more efficient; second, wireless communication systems
have become reliable and global; third, is that cloud-based platforms that can be used for analytics and development are emerging rapidly. Collectively, these trends underpin the Internet of Things.

At IBM's big conference, InterConnect, this week, the University of South Carolina was
showing off a sensor-equipped gear box on an Apache helicopter that is part of study for the U.S. Army.

There were four sensors on the gear box collecting temperature and vibration data.

One of the big savings in the use of this technology, aside from predicting failure, is correctly planning maintenance. Many
maintenance activities may be
unnecessary, wasteful and can introduce new problems.

"If you can reduce improper maintenance processes and improve the identification of faulty maintenance, you can directly
impact safety," said Retired Maj. Gen.

Lester Eisner, with South Carolina's
National Guard, who is deputy director of the university's Office of Economic Engagement.

There is much optimism that this
technology will reduce equipment failures.

Having the ability to see a little further into the future and reducing the need to rely on the benefit of hard-learned hindsight is the
goal. But no one is predicting that this technology will eliminate failure all together.

"There are a lot of variables" that can contribute to equipment failure, said Sky Matthews, the CTO of IBM's Internet of Things effort, but this technology "can certainly dramatically reduce them."

Share:

Wednesday, February 25, 2015

Google 'warn' porn blogger owners

New google rules require any blog with “sexually explicit or graphic nude images or video” to take remove them before 23 March, or the blog will be made private by Google. A private blog can only be seen by the owner or admins of the blog, and people who the owner has shared the blog with.

None of the blogs will be deleted, but they will no longer be publicly visible, the tech giant says.

People currently posting adult content are advised to either remove it or make their blogs private themselves.

Blogs created after the March deadline may be taken down if they contain adult material.

Under the updated adult policy terms, nudity will be allowed on Blogger blogs only if it "offers a substantial public benefit, for example in artistic, educational, documentary, or scientific contexts".
Bloggers are already asked to use the tag "adult" if their site contains explicit material, which means a warning page appears before
the site can be accessed.

Under its current terms, Google reserves the right to add that tag itself even if the blog author disagrees.

In 2013 the company banned Blogger sites from carrying adverts for adult websites.

Censorship

Yahoo-owned Tumblr also adjusted its policies on hosting sexual content in 2013, hiding "adult" themed sites from its search tool but
reinstated them after a social-media backlash.

Critics have dismissed Google's move as an unnecessary form of censorship.

Share:

Saturday, February 21, 2015

Youtube will lunch a kid App

YouTube is going to lunch a new application which is mainly for kids.

The app will initially be available for Android and in the U.S. only,  but it is understood that it will be rolled-out in the UK others countries later.

The move has been welcomed by the NSPCC child protection charity.
A spokesman for the charity said: "Keeping children safe online is the biggest child protection challenge of this generation. So it's good to hear about the launch of YouTube Kids.

"I'm sure it will be embraced by parents wanting increased reassurance that their younger children won't be exposed to
inappropriate material."

The parental controls will include the ability to limit the amount of time children can spend watching videos, as well as a tool allowing the search function to be switched off, it is
understood.

YouTube Kids will have channels and playlists organised into four categories: Shows, Music, Learning and Explore. Users will also be able to search for individual topics.

The app will be free, but it will be available on Google's Android devices only.

Share:

UK and US hacked mobile SIM card

US and UK intelligence agencies reportedly hacked into a major manufacturer of SIM cards to gain access to large amounts of data
worldwide.

The Intercept says the revelations came from US intelligence contractor turned whistleblower
Edward Snowden.

The Intercept alleges that the hack organised by Britain's GCHQ and the US National Security Agency (NSA) began in 2010, and was organised by operatives in the "Mobile Handset
Exploitation Team". Neither agency has commented directly on the allegations.

However GCHQ reiterated that all its activities were "carried out in accordance with a strict legal and policy framework which ensures that
our activities are authorised, necessary and proportionate".

Intercept said GCHQ targeted the company's engineers to gain information that gave them access to the company's networks.

Encryption keys were then reportedly stolen that allow the data that passes between mobile phones and cell towers and unscramble calls,
texts or emails to be decoded.

A GCHQ spokeswoman said they do not comment on intelligence matters.

But she said: "Furthermore, all of GCHQ's work is carried out in accordance with a strict legal
and policy framework, which ensures that our activities are authorised, necessary and
proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the parliamentary Intelligence and Security Committee.

Gemalto, the company which was allegedly targeted, manufactures an estimated 30% of all Sim cards worldwide. And crucially, it creates
the security key for each item. All security agencies needed to do was obtain (by hacking, allegedly) the list of security keys from the firm.

Then, as security expert Karsten Nohl says, they could snoop on phone calls with a "few hundred dollars worth of radio equipment in
strategically important locations".
This contrasts with security procedures used, for example, for chips in passports. Many are
are also manufactured by Gemalto.

These are delivered to the relevant authorities as a blank chip, and the Passport Office - not the company - creates the security key.

Many of Edward Snowden's allegations have shone a light on complex surveillance tactics
by the NSA. But perhaps this latest leak has done more to highlight how a single company is in control of millions of people's private data.

Share:

Friday, February 20, 2015

mogul Hunter Revenge 'porn site operator' pleads guilty to hacking

This summary is not available. Please click here to view the post.
Share:

Tuesday, February 17, 2015

Sony SmartEyeglass now cost $840 or £520

Sony's augmented reality smart glasses will go on sale in ten
countries next month, the tech giant has announced.

Pre-orders for the SmartEyeglass, costing $840 (£620), are now being taken in the UK and Germany, with Japan and the US to follow
shortly.

The black-framed glasses are compatible with recent Android operating systems.

Last month Google announced that it was withdrawing its smart glasses for redevelopment.

Sony's initial model will come with a software development kit to encourage people to design apps for it, the company said.

The glasses, which weigh 77g, contain an accelerometer, gyroscope, compass, image
and brightness sensors, 3-megapixel camera and a microphone.

They also come with a controller, designed to be attached to clothing, which contains a speaker, touch sensor and the device's battery.

Text is displayed in front of the wearer in monochrome green.
'Intrusive' Apple chief executive Tim Cook has been open about his dislike of glasses as a wearable
device.

"We always thought that glasses were not a smart move, from a point of view that people would not really want to wear them," he told
the New Yorker .

"They were intrusive, instead of pushing technology to the background, as we've always
believed."

Stuart Miles, editor of tech site Pocket Lint, said: "I think [Sony is] wasting their time, energy and effort.
"Google Glass obviously needed a complete rethink... I can't see how something thick- rimmed and more invasive-looking than Google
Glass is going to catch on.
"People are keen on wearables like fitness bands and watches, but they care about their faces. Wearing something on your head is a lot
stronger than wearing something on your arm," he added.

"The industry keeps pushing it but consumers just don't want it."


Share:

Saturday, February 14, 2015

Cyber security Tech firms urged to sharePrivate data with US government

The United state president Mr Barrack Obama urged all Private tech firms to share more information with each other to tackle cybercrime.

During his speech Mr Obama at white house he said we have to work together 'cybersecurity summit hosted in Silicon Valley.

The issue has become a White House priority since a widely publicised hack of Sony Pictures
at the end of 2014.

But some key tech firms are concerned about government surveillance.

Senior Google, Yahoo and Facebook executives turned down invitations to the summit, held at Stanford University.

Relations between the US government and tech firms have been strained relations since
electronic surveillance practices were exposed by former National Security Agency contractor
Edward Snowden.

Mr Obama is backing the creation of
information sharing and analysis organisations (ISAOs) to help firms and government share material on potential threats.

The plan calls for the development of a common set of voluntary standards for organisations to follow to ensure civil liberties protection, according to the White House.

Mr Obama has also launched an intelligence unit to co-ordinate cyber-threat analysis.

"Just as we're all connected like never before, we have to work together like never before, both to seize opportunities but also meet the challenges of this information age," Mr Obama said.

"Government cannot do this alone. But the fact is that the private sector can't do it alone either because it's government that often has the
latest information on new threats."
But one cybersecurity analyst said the proposals "face significant headwinds" from both Congress and large US tech companies.

"Based on the Snowden leaks, these
companies believe they've already been badly burned by the government, and have very little
to gain by publicly backing the president's proposals," Ben Desjardins, director of security
solutions at cybersecurity firm Radware told the Associated Press.

According to Bloomberg, Mark Zuckerberg and Marissa Mayer - chief executives of Facebook
and Yahoo, respectively - and Google's Larry Page and Eric Schmidt all declined invitations.
Facebook, Yahoo, Google and Microsoft have all sent less senior executives to the conference.

Obama's cybersecurity push follows similar efforts by British Prime Minister David Cameron, who said in January that forms of communication that are resistant to
surveillance measures should not be allowed.

His comments were interpreted as a direct attack on encrypted communications, such as Apple's FaceTime and Microsoft's Skype,
among others.

The conference also took place in the aftermath of the hacking scandal that hit Sony Pictures and which the US authorities blamed on North
Korea.

America and China have also taken more aggressive stances towards each other over cybersecurity recently, with the US charging a
series of Chinese people with hacking last year.

The French authorities beefed up their security efforts after claiming to have detected attempts to launch cyber-attacks in the aftermath of the
Paris terror attacks.

And this week the Dutch government fell victim to a distributed denial of service attack, which took many of its websites down by flooding
them with traffic.

Share:

Google boss (Vint Cerf) warns of 'forgotten century' with email and photos at risk

Digital material including key historical documents could be lost forever because programs to view them will become inactive.

Humanity’s first steps into the digital world could be lost to future historians, Vint Cerf told the American Association for the Advancement of Science’s annual
meeting in San Jose, California, warning that we faced a “forgotten generation, or even a forgotten century” through what he called “bit rot”, where old computer files become useless junk.

Cerf called for the development of
“digital vellum” to preserve old software and hardware so that out-of-date files could be recovered no matter how old they are.

“When you think about the quantity of documentation from our daily lives that is captured in digital form, like our interactions by email, people’s tweets, and all of the world wide web, it’s clear that we stand to lose an awful lot of our history,” he said.

“We don’t want our digital lives to fade away. If we want to preserve them, we need to make sure that the digital objects we create today can still be rendered far into the future,” he added.

The warning highlights an irony at the heart of modern technology, where music, photos, letters and other documents are digitised in the hope of ensuring their long-term survival. But while researchers are making progress in storing digital files for centuries, the programs and hardware needed to make sense of the files are continually falling out of use.

Inventing new technology is only half the battle, though. More difficult still could be navigating the legal
permissions to copy and store software before it dies. When IT companies go out of business, or stop supporting their products, they may sell the rights on, making it a nightmarish task to get approval. 

“To do this properly, the rights of
preservation might need to be
incorporated into our thinking about
things like copyright and patents and licensing. We’re talking about
preserving them for hundreds to
thousands of years,” said Cerf.

Share:

Friday, February 13, 2015

SanDisk Ultra 32GB Review


The best micro SD card that I have been used for the past six month without experiencing any problems.

If I needed to buy a microSD card for
storing videos and apps on my smartphone or I want record high
definition video  I'd to buy the SanDisk Ultra.

Before we get into specifics about what makes the Ultra such a good microSD, it's worth noting that microSD cards don't actually have too many uses these days, and you should make sure you actually need one before buying one. (Duh, but it needs to be said.) Most high-end smartphones–Android, iPhone and even Windows Phone–only offer internal storage and no microSD
slots. There are a few exceptions that do support microSD like the Samsung Galaxy S III, the Barnes & Noble Nook tablet, and cheaper Windows Phones.

So if you're getting a new phone, don't just assume you need a big microSD card for it. Check! And if you do need one, this is the card to get–but I don't recommend buying a microSD card to use with an adaptor in a digital camera with a full-size SD slot. More on that in
a sec.

SanDisk Ultra 32GB UHI-I/Class 10 Micro SDHC Memory Card Up to 48MB/s With Adapter- SDSDQUAN-032G-G4A [Newest Version]

Why I recommend this

Because With the SanDisk Ultra microSDHC UHS-I Card, you'll never have to choose what to keep and what to delete on your Android smartphone or tablet. With a generous capacity of large GB

(1)  this card lets you shoot and store more photos and videos without running out of space. You'll have enough room for thousands of high-resolution photos or hours of Full HD (2) video.
Capture, carry, and keep your videos, photos, and music at your fingertips with large GB of storage.
Shoot and store hours of Full HD video on your Android smartphone or tablet.

Features

1. Up To 48MB/s Read Speed
2. 10-Year Warranty
3. Easily Back Up Files With "SanDisk Memory Zone" App
    Includes SD Adapter

Available Capacities

1. 128GB

2. 64GB

3. 32GB

4. 8GB

Overview


Up to 128GB to Capture, Carry, and Keep It All

Today's cameras feature advanced photo

and video capabilities, so you can record all

of life's exciting moments. SanDisk Ultra

microSDHC and microSDXC UHS-I memory

cards allow you to capture, carry, and keep

all those moments at your fingertips. Add

storage up to 128GB ** to eliminate the

dilemma of choosing what to keep and what

to delete.

Fast Data Transfer

With transfer speeds of up to 48MB/s ** , the

card brings faster read speeds so you can

save time transferring data.

Class 10 Speed Rating for Full HD Video

Capture

This memory card features Class 10 video

rating for high-quality video recording, so

you can capture Full HD ** without dropouts

and stuttering. And with up to 128GB ** of

storage space, the cards allow you to store

plenty of Full HD video files before you have

to transfer files to your computer.

Includes SD Adapter for Versatility

This microSD card comes with a convenient

SD card adapter, so you can capture and

access data on the card with any device

with an SD card slot. You'll be able to use

your card with SD enabled cameras,

camcorders, tablets, and laptops.

Share:

Thursday, February 12, 2015

Samsung Put Ads in Others TVs apps

Samsung company investigating why some of it is smart TVs are adding  advert to television and film programme via a third party apps.

A spokeswoman for Samsung said it was only aware of the glitch affecting customers in Australia at this time.

The fault comes days after the company faced controversy over the way its TVs made use of voice recordings.

Owners have complained of a silent ad for Pepsi interrupting playback several times an hour.

"We are aware of a situation that has caused some smart TV users in Australia to experience programme interruption in the form of an
advertisement," the spokeswoman said.

"This seems to be caused by an error, and we are currently conducting a full and thorough
investigation into the cause as our top priority.

"This situation has so far been reported only in Australia. We would like to apologise for any inconvenience experienced by our customers."

Users of at least two smart TV apps have complained about the issue:

1. Plex - media centre software that allows owners to stream video files stored on a hard disk to other equipment. In most cases, the user would not expect to see any ads at all when using this.

2. Foxtel Play - an app installed by default on Samsung's Australian TVs, which provides access to the pay TV network's channels, which have ads of their own.

News site Ars Technica noted that Samsung and Yahoo had been working together on a way to show pop-up ads on Samsung's smart
TVs and suggested that the software involved might be the cause of the fault.

Share:

Tuesday, February 10, 2015

Facebook create new way to sell items in group

Facebook on Tuesday announced the addition of a new feature for Facebook Groups designed to make it easier for members of a “For Sale”
group to list their items. The new “Sell” feature, which is now starting to roll out globally to more groups, will allow members to create a
post where you can add a description of the item for sale, set a price and set a pick-up or delivery location.

The social network today already hosts tens of millions of groups based around a variety of interests, and “For Sale” groups are one of the
most popular categories. In these groups, members use Facebook as an alternative to something like Craigslist for local selling, or as
an alternative to eBay for selling collectibles or other items of broad interest, like books or electronics.

Currently, members in these “For Sale” groups generally post photos and text descriptions of their items, but the addition of the “Sell”
feature will make filling out the necessary information a bit more structured than before.

That will go a long way to help out group admins, who often have to remind members that they’re required to list a price, for example, or that they need to specify their
general location or neighborhood.
Fellow group members will also benefit from the addition, as they’ll no longer need to comment or message the item’s owner in order to get basic information about the listing, which can be the case today when sellers forget to add these important details.

The problem with the older system is that even these sorts of exploratory comments – the
requests for information – can cause the old post to jump up to the top of the Groups page, overshadowing newer listings. It’s also frustrating for members who may want to purchase items but need to know if the item is nearby, or if it’s only available for pick-up, not
delivery.

In addition, with the new enhancements, sellers will now be able to mark their posts as “Available” or “Sold,” which will help keep groups and their members better informed about which items are for sale and which should be removed. Again, this sort of item
management was something that group members were already doing – often just typing in “sold” in the comments section to alert an admin, or deleting the post as need
be. But now there’s a more official means to designate items as sold.
Sellers will also be able to see their catalog of previously sold items by using this feature, Facebook notes. This aids individuals like local artisans who sell their items to
friends and other community members using Facebook’s Groups, as is often the case with many women-owned, home-based
businesses which are a popular sub-category of Facebook’s “For Sale” groups.

Plus, getting in touch with members who are doing the selling is still a challenge, as private messages to sellers inexplicably default to
users’ “Other” Inbox on Facebook, which isn’t available within Facebook Messenger, and is
fairly difficult to get to from mobile period. Still, that Facebook Groups, and in particular these For Sale groups, have grown to become so
popular despite these issues, is a testament to how powerful Facebook’s platform is for connecting people.

Facebook says that it will continue adding more features that will enhance these For Sale Groups in the months ahead that will make it
easier for members to connect with each other, browse and search.

Share:

Monday, February 9, 2015

Taxi aggregators to form association following Uber case

MUMBAI: Taxi aggregators, who are under intense regulatory glare following the alleged rape of an uber rider in Delhi last December, are
planning to form an association to better represent themselves before various governments.

"We are in touch with each other and thinking of forming an association so that there is uniformity in our representations to the governments.

"Following the ban on many taxi aggregators after the Uber incident, we have been in touch informally and nothing has been finalised as
yet, though we feel the need for an association of sort," Taxiforsure founder and director
Aprameya Radhakrishna told PTI here.

What we are looking for is a unified national body to judge the industry and not the regional RTOs, he added.
Radhakrishna, however, denied allegations that services being offered by companies like his are
less safe for a rider.

"In fact, there is a complete mapping of the travel records and the cab and cabie's details with our services.

Which cab operator offers such a track of records? So the allegation that we are not safe is not based on facts," Radhakrishna said.

He also claimed that his company is fully compliant with all the regulations required to ply in different states and is also working to improve the consumer safety aspect because we are here for the long run.

He also said the company, having successfully roped in autowallahs and Nano cars in Bangalore recently, is set to do an encore of the same in the megapolis shortly.

"We will soon be aggregating the autowallahs and also the Nanos which are being run as taxis in Mumbai. The decision follows the
humungous response we have received in Bangalore with these two modes of transport, primarily due to cheaper riding cost than normal cabs," Radhakrishna said.

The company had introduced Tata Motors' Nano as part of its fleet in Bangalore last December and soon it added autos. As of now, there are 100 Nanos registered but the demand is much higher.

He also denied rumours that TFS is up for sale, saying over the next five months, their services will be available in 100 cities, wherein the focus will be on small towns.

Since the launch in June 2011 in a small Bangalore roof-top bungalow, along with Raghunandan G, who is co-founder and chief executive, TFS today makes 40,000 rides a day
across 47-odd cities, Radhakrishna said.

TFS is in talks with private equity firms to raise $ 60-80 million, having already raised $ 30
million last August from Accel Partners and $ 10 million in April.

Share:

Mozilla Firefox Tips

Mastering your web browser will make your work easy, many people they think surfing internet through web browser is just a typing a URL in address bar. If you are one of them let me tell you, there are a lot of tips that you need to know, and here I compiled some for you. This tips will help you even if you a web designer.

Send a web page to a friend
When visiting a webpage you found a very interesting page and you want to share the page to your friend and that page it doesn't have send to a friend link. Following the below simple steps can allow you to send a link to him via email.

In your Firefox browser

- Right-click on the you want to send.
- In the menu option click Send link.

Shortcut key to get into address bar
Quickly get into your address bar will save you a time, sometimes you are at the bottom of the webpage and you want to visit another website I know how scrolling to the top is bothering you. That is why I  wrote this process for you. Without wasting your time just press Ctrl + L
in your keyboard that's all.

Move back faster in your Firefox
The most commonly used feature in Firefox is back button. To use this feature either click on the small down arrow next to back buttons or hold the back button down.

Holding The back button down or click the down arrow shows the most recent pages you have visited and allow you to go back to the page of your choice.

Hide and show Firefox download window
To hide this window that appear while you are downloading in Mozilla Firefox. Edit the about:config settings as shown below to disable this window from displayed for you.

1. Open a new tab in Firefox
2. In your address bar type: about:config
3. Locate browser.download.manager.showWhenStarting by copying and pasting the bold text into the Filter box.
4. Double-click the name or value to change the value from True to False. Once you finished close the tab.

To show a hidden download window
Click on Tools > Downloads or by pressing Ctrl + j from your keyboard.

Save any type of media on a web page

Note: this doesn't work all media because of how website it is programmed like YouTube videos.

We all love media files sometimes you will come across the media file that you want to download here is what you will do to quickly save any media including embedded content to an alternate source by right-clicking on a page click "View Page Info", click the media tab, locate the media file you want to save and click the Save As button. 

Make Mozilla Firefox window full screen
To make your Mozilla Firefox window full screen without the toolbars press the F11 key. To restore it again press F11.

Print only sections of a web page
To print only a one section from a web page this will save your printer ink, to do this highlight portions of text you want to print and click the print icon  or press Ctrl + p in the printer dialog window under Page Range choose the option selection.

Share:

Samsung is warning customers to avoid discussing personal information in front of their smart tv

Samsung had warned there customers to stop discussion in front of their smart tv

The warning applies to TV viewers who control their Samsung Smart TV using its voice activation feature.

Such TV sets 'listen' to every conversation held in front of them and may share any details they hear with Samsung or third parties, it said.

Privacy campaigners said the technology smacked of the telescreens, in George Orwell's
1984, which spied on citizens.

The policy explains that the TV set will be listening to people in the same room to try to spot when commands are issued. It goes on to
warn: "If your spoken words include personal or other sensitive information, that information will
be among the data captured and transmitted to a third party."
Corynne McSherry, an intellectual property lawyer for the Electronic Frontier Foundation (EFF) which campaigns on digital rights issues,
told the Daily Beast that the third party was probably the company providing speech-to-text conversion for Samsung.

She added: "If I were the customer, I might like to know who that third party was, and I'd definitely like to know whether my words were being transmitted in a secure form."

George Orwell's description of the telescreens in his novel 1984 that listen to what people say in their homes.

In response to the widespread sharing of its policy statement, Samsung has issued a statement to clarify how voice activation works.

It said the privacy policy was an attempt to be transparent with owners in order to help them make informed choices about whether to use some features on its Smart TV sets, adding that it took consumer privacy "very seriously".

Samsung said: "If a consumer consents and uses the voice recognition feature, voice data is
provided to a third party during a requested voice command search. At that time, the voice data is sent to a server, which searches for the
requested content then returns the desired content to the TV."

It added that it did not retain voice data or sell the audio being captured.

Smart-TV owners would always know if voice activation was turned on because a microphone icon would be visible on the screen, it said.

The third-party handling the translation from speech to text has not been named.

Samsung is not the first maker of a smart, net- connected TV to run into problems with the data the set collects. In late 2013, a UK IT consultant found his LG TV was gathering information about his viewing habits.

Publicity about the issue led LG to create a software update which ensured data collection was turned off for those who did not want to
share information.

Share:

Saturday, February 7, 2015

13 Cool tips to extend battery life on Android device

One of the biggest problem with android phone  is there battery,  drain faster like jet.

But do you know there is a lot of things that you can do to slow it down like bicycle, it is not secrete as many people knew it, but that is not my point even if you knew it there is a lot of cool things that you did not know,  if you don't believe me you can skip this post but if you believe me keep reading.

First of all let me begin by telling you the most simplest one to the top one.

1. Darker Application
Using darker application backgrounds/themes on your android will ruin your battery life most especially if your device has AMOLED screen.

2. Vibrate
Turn off vibrate on your android. Sometimes you are typing with your android and you will feel your phone is vibrating. Turn off that vibrating because it is drain your battery.
To switch vibrate on android follow this steps:-
-Goto settings under setting goto All setting.
-under all setting locate to sound and vibrate.
-then scroll to vibrate and click on it
-then switch it off.

3. Set timeout
Set your screen display  time very short. The longer your screen light display the more battery charge you waste.
To set display timeout follow this steps:-
- Goto settings > Display
-then scroll to Sleep.
-select the display time I recommend use 15s for better saving.

4. Turn of smart features
Turn off your smart features like air gestures, unless if you are really use it because it is just using your battery.

5. Turn off all connection
Turn off all your android connection like Mobile data, Bluetooth, GPS, WiFi whenever you don't need them.

6. Keep your application update
Make sure your application is up to date because there is a reason developers regularly update there apps, and most of that reason are memory and battery optimizations.

7. Turn off auto-syncing for Google account
Turning auto-syncing will also extends the your battery life.

8. Turning 3G or 4G network off
If you don't need to use higher speed network turn off your 3G or 4G network. This may help your battery life.

9. Reduce your brightness display
     Most people want to see there phone is lighting like sun I don't why? this may effect even your health, reduce it for safety of your battery.

10. Do not leave application running
Close all the applications after you use them don't and return to home screen.

11. Reduce your email, Twitter, and Facebook polling.
Set your various messaging apps to
"manual" for the polling or refresh frequency, just as a test, and you'll instantly extend your device's battery life by a significant amount.
Once you see what a difference that makes, try re-enabling just the most important ones, and possibly reducing their polling frequency in the process.

12. Saving mode
If your phone is lessthan 40% put it in saving mode it will extend your battery life.

13. Remove unnecessary widget from your home
Remove all, unnecessary widget and live wallpaper that is placed in your home, just because they sitting like non living thing don't think they are not consuming your battery remove them.

Share:

Thursday, February 5, 2015

Android adware infects over millions of tablets and phones

Dont be a victim since Android users are being warned that several
popular apps that were on the official Google Play store appear to have contained hidden code that made malicious ads pop up.

Security firm Avast said that one of the apps involved - a free version of the card game Durak - had been downloaded up to 10 million times, according to Google Play's own counter.

Google has now blocked access.
But one expert noted that the problem might be less widespread than feared.

Avast said that it first became aware of the issue after a member of the public contacted it after carrying out his own investigation into his Nexus 5 smartphone had come to be infected with malicious code.

The "adware" was causing spurious pop-up messages to appear that had been made to look like system notifications. These told him his phone was running "slow" and that he needed to install new software to fix the problem.

If he followed the on-screen prompts he was then directed to download other apps, only some of which were legitimate.

"You get re-directed to harmful threats on fake pages, like dubious app stores and apps that attempt to send premium SMS behind your
back or to apps that simply collect too much of your data for comfort while offering you no additional value," wrote Avast's malware
analyst Filip Chytry.

The original apps were said to have held off showing the pop-ups until seven or more days after being installed, which the analyst suggested was intended to mask the fact that they were responsible.
"Most people won't be able to find the source of the problem and will face fake ads each time they unlock their device," he wrote.

"I believe that most people will trust that there is a problem that can be solved with one of the app's advertised 'solutions' and will follow the recommended steps, which may lead to an investment into unwanted apps from untrusted sources."
In addition to the Durak card game, other apps alleged to be involved include:

1. A Russian language IQ test, which Google Play indicates had been downloaded up to five million times
2. A Russian history educational tool, which Google Play indicates had been downloaded up to 50,000 times

The publishers involved have not replied to requests for comment.

A spokesman for Google said: "We're just confirming that all of the apps in the report have been suspended and nothing more."

Inflated numbers Although Google Play's own site indicated the software had been downloaded many millions of times, one security researcher was cautious about the figures.

"I would take the numbers with a pinch of salt because one thing that malware authors might do is deliberately up the amount of downloads in order to make an app appear more popular than it really is," said Dr Steven Murdoch from
University College London's information security research group.
"Google does scan for malware that it knows about and it also has some more advanced techniques to detect malicious behaviour.

"But these don't work 100% of the time and some apps do slip through the checks - and there is a continual cat and mouse game of people looking for malware and the authors
trying to bypass the checks."

Several people who had downloaded the Durak card game had posted warnings on Google Play as far back as November 2013, that they
suspected it was forcing pop-up ads to appear.

"But that's still not going to catch everything," Dr Murdoch added.
"Phone users ultimately have to trust the operating system vendor - whether that's Google or Apple [or someone else] to protect
them."

Share:

The China's biggest internet retailer Alibaba begins drone delivery

According to Alibaba the China's biggest internet retailer says it has begun testing drone-based deliveries to hundreds of customers.

It says the trial will last three days and be limited to areas within a one-hour flight of its distribution centres in Beijing, Shanghai and Guangzhou.

Amazon, Google and parcel service UPS are among other companies carrying out more private trials of such aircraft.

Alibaba is using its drones to deliver orders for a specific type of ginger tea, helping limit the maximum weight of the packages to 340g
(12oz).

The Tech in Asia blog, which was one of the first to report the development, said the experiment was being undertaken by Alibaba's
Taobao division - an eBay-like marketplace that connects third-party sellers and buyers - and would involve 450 shoppers.

"Even though it's very limited in scope, Taobao is delivering real goods to real people, which is a step further than its Western counterpart
Amazon has gone," Tech in Asia's Paul Bischoff told the BBC.

"That said, which company will actually roll out a fully functioning drone-based delivery service
remains to be seen and [such a deployment] is still a long way off."
In 2013, a much smaller Chinese company - the InCake bakery - began delivering cakes to customers in Shanghai using remote-controlled
drones. However, the trade was quickly halted by a local aviation watchdog, for operating without a licence.

Safety concerns Alibaba's founder, Jack Ma, has said he aims to expand his company's operations across the globe in order to reach a target of having two billion customers by 2025.

In 2014, the company raised a record $25bn (£16.4bn) when it listed its shares on the New
York Stock Exchange.

However, its ambitions were threatened last week by a high-profile spat with one of China's
regulators, which alleged that Alibaba had not done enough to tackle the sale of counterfeit
goods on Taobao, letting this "abscess fester until it became a danger".

The tests provide Taobao with a chance to generate more positive headlines.

But one expert said it would be wrong to dismiss them as a PR stunt, even if drone- based deliveries were still years away from becoming the norm.

"It's well established that drones can be flown autonomously above the tree-line - but below it, there are still a lot of issues," said Ravi Vaidyanathan, a robotics lecturer at Imperial College London.

"They will need to get around moving obstacles like children and pets when they come to land below the roof of your house. And
the kind of co-ordination it would take to get airspace reserved for drone flights is also a big issue too.

"I don't think these problems are
insurmountable, but the safety considerations must be addressed, and obstacle-free take-off
and landing zones may need to be considered in the near term."

A video released by Alibaba indicates it will use quadcopter drones that fly far beyond the
sightlines of their operators, travelling over roads, rivers and buildings before landing in
open spaces close to apartment blocks.

However, the company has not provided technical details abut how it intends to achieve this.

Share:
Powered by Blogger.

Facebook

Recent Posts

Random Posts

Advertising


Theme Support