Recent Comments

  • 2 Ways to Spy on Whatsapp

    Whatsapp is very popular instant message application for smartphone, Now a days many people they are using this app including our children.

  • How to Hack WiFi Using Anroid Device

    Without a software or application hacking is not easy, but with application and software hacking is simple. I Know this sound crazy to you How? don't worry just read this article you will find out how easy it is.

  • How to Remove Virus From Computer Without Antivirus

    computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.

  • How to Hack Android Lock Patterns

    The main reason to set up some sort of lock screen security on your android phone is to keep someone or friends and family from checking out your messages or private pictures or you don’t want anyone who steal your android to get full access to your e-mails, Facebook, Internet Banking pictures or other sensitive data.

Saturday, January 31, 2015

Google is Now Upgraded With Cards From Your Favorite App

Google’s service focused on bringing you real-time information to your mobile device – including things like traffic updates, scores, stock changes, travel times, your flight status, and much more – is getting a notable update today. The company says that, going forward, the Google app will show
users updates from their favorite apps, too.

At launch, Google is offering relevant
information from over 40 applications , in order to show things like “last-minute hotel deals to
home-buying tips,” the company says.

“In the morning, catch up on news of the day with cards from The Guardian. On your commute, Pandora can give you
recommendations for music to play, based on what you like, or you can be reminded to complete your daily French lesson on Duolingo,” writes Google, explaining how the new system can work as an alternative to launching the apps directly.
Google Now has previously used data from marked-up email updates to inform some of its previous services, but for this feature Google worked directly with the developers of the apps to enable a more diverse set of use cases for this initial launch. It’s not directly linked to Google’s app indexing project that
can surface information from and take you directly into apps from search results, but that effort is related to this, Google says.

There are over 30 developers – including apps like Airbnb, Lyft, eBay, Instacart, Pandora and
Zillow, to name a few – supported as the new feature goes to launch this afternoon. It’s currently only available on Android devices,
but likely this will come to the Google app on iOS in the near future.
Google says that other apps will be added in the future, and the feature itself will be expanded over time, as well.

Share:

Microsoft gives more windows 10 upgrade details for business users

Microsoft is advising business users to keep non-mission critical end user Windows 10 devices on the Current branch for Business
with updates set to happen automatically via Windows Update.

After providing Windows consumers with details about its planned free upgrade promotion for Windows 10 , Microsoft has started providing business users with some early guidance, as well.
In a January 30 blog post, Microsoft
officials said user running Windows 7 Pro, Windows 8 Pro and Windows 8.1 Pro will be eligible for the free
Windows 10 promotion.

Via that promotion, users running these versions of Windows will have the option to upgrade to Windows 10 for free for the first year it is commercially available. (Microsoft
officials have said Windows 10 will launch by this fall.) Microsoft will provide ongoing feature and security updates and fixes to these customers via Windows Update for the period their devices are supported by their manufacturers, Microsoft officials have said.

Exactly what constitutes that supported device period is still a bit squishy, but according to fine print on a Microsoft site:

Microsoft officials reiterated in yesterday's blog post that Windows 7 Enterprise, Windows 8 Enterprise and Windows 8.1 Enterprise won't
be covered by the free first-year upgrade promotion for Windows 10. As Microsoft execs said last week, business users with paid Software Assurance volume-licensing
contracts will, as usual, be able to upgrade to the latest versions of Windows as part of their contract terms.

Microsoft still hasn't released details about how much Windows 10 will cost or which editions it will make available when the product will be released.

Yesterday's blog post also explained how Microsoft will allow customers to update their Windows 10 deployments at different speeds.
Microsoft is introducing what it's calling "Long Term Servicing branches" for Windows 10.

These branches will provide users with the latest security and critical updates, but not deliver new features for the duration of mainstream support (five years) and extended
support (five additional years). Long Term Servicing branches will give users the right to use Windows Server Update Services (WSUS)
to have more control over delivering security updates and fixes using their existing management infrastructure, such as System
Center Configuration Manager or Windows Update -- as many Windows shops do today.

Microsoft officials said they plan to deliver the first Windows 10 Long Term Servicing branch
"in the same time frame as Windows 10 market availability."
Microsoft is also going to offer "Current branch for Business," which is aimed at customers who are willing to receive not just the regular
security updates to Windows 10, but also feature updates "after their quality and application compatibility has been assessed in the consumer market." Users on this branch
will give IT departments time to validate updates before they deploy them to their employees. Customers using this branch will have the option to receive updates automatically, via Windows Update or via WSUS.

Microsoft is advising business users to keep non-mission critical end user Windows 10 devices on the Current branch for Business
with updates set to happen automatically via Windows Update.

Microsoft is expected to provide customers who take advantage of the free Windows 10 promotion with regular, free feature and security updates on an ongoing basis via
Windows Update, most likely with little or no opportunity to decline or delay either.

Officials reiterated that Microsoft is designing Windows 10 to have the same overall minimum hardware requirements as Windows 7 and Windows 8, while noting that "some new features may require new hardware capabilities, and software or firmware updates from device manufacturers and ISVs."

Share:

Google has agreed to rewrite its privacy policy with data watchdog

The firm must make it easier for users to find out how their data is collected and what it is used for and submit to a two-year review.

The deal follows an investigation by the regulator. Similar reviews are continuing elsewhere in Europe.

It is understood that Google will seek to strike a similar deal with other European regulators.

The Information Commissioner's Office (ICO) found that Google was "too vague when describing how it uses personal data gathered from its web services and products".
Investigation The regulator - along with its continental counterparts - began looking into the Mountain
View firm after its controversial privacy policy update in March 2012, which combined 70 existing documents.

It was joined by other data regulators, which form the European Article 29 Data Protection Working Party.

Following the investigation, Google has agreed to ensure that its privacy policy is more accessible and redesign its account settings
feature to allow users to find its controls more easily.

It will also provide "unambiguous and comprehensive information regarding data processing, including an exhaustive list of the types of data processed by Google and the
purposes for which data is processed". Appeals Among other clarifications, Google will have to
include information about who may collect "anonymous identifiers" - which are similar to cookies - and the purposes to which they put
that data.

It will also be made to ensure that "passive users are better informed about the processing of their data".

The ICO defines passive users as
people who use Google, but who are not signed in.

Google has until 30 June 2015 to implement the changes and it is believed it will roll out a single policy across the European Union in
order to satisfy each of the regulators that opened investigations.

It has also dropped appeals related to investigations being undertaken by the French and Spanish watchdogs. 'Pleased'
"This undertaking marks a significant step forward following a long investigation and extensive dialogue," said Steve Eckersley, the
ICO's head of enforcement.

He added: "Whilst our investigation concluded that this case hasn't resulted in substantial damage and distress to consumers, it is still
important for organisations to properly understand the impact of their actions and the requirement to comply with data protection
law."

A Google spokesman said: "We're pleased that the ICO has decided to close its investigation.

We have agreed improvements to our privacy policy and will continue to work constructively with the Commissioner and his team in the
future."

Share:

Wednesday, January 28, 2015

YouTube Start Default Playing using HTML5

Latest browsers like Google chrome, Firefox internet explorer begging showing youtube video by default using Html5 video.

For some time, YouTube has offered its HTML5 beta, but not all videos were able to be served with it. In particular, support in HTML5 for Encrypted Media Extensions (EME) has allowed YouTube to provide a ubiquitous digital rights management solution.

The last holdout on EME, Mozilla, folded on the issue in May last year.
"Encrypted Media Extensions separate the work of content protection from delivery, enabling content providers like YouTube to use a single HTML5 video player across a wide range of platforms," said YouTube Engineering manager Richard Leider in a blog post.
"Combined with common encryption, we can support multiple content protection technologies on different platforms with a
single set of assets, making YouTube play faster and smoother."
The move to HTML5 video element has also allowed YouTube to begin deprecating its old object-based embed code, and move to
iframes.
"We encourage all embedders to use the
<iframe> API, which can intelligently use whichever technology the client supports," Leider said.

The HTML5 player replaces YouTube's video player based on Adobe's Flash plugin, which
has once again fallen foul of a cascade of zero-day attacks.

YouTube is also touting the use of its VP9 codec, which YouTube said it has served up "hundreds of billions" of times already, and adaptive bitrate streaming as mechanisms to
reduce the bandwidth needed to stream high- quality video with less buffering.

"These advancements have benefited not just YouTube's community, but the entire industry.
Other content providers like Netflix and Vimeo, as well as companies like Microsoft and Apple,
have embraced HTML5 and been key contributors to its success," said Leider.

Share:

Tuesday, January 27, 2015

Simple Ways to track your lost android phone

Nowadays technology is growing beyond your expectation, you don't need to become a tech savvy to recover your lost android phone.

I know how pain it is if you lost your phone may be because you keep your important document inside.

To catch your theft is very simple as I said above if you can follow these simple guide I wish you best luck.

First way remote installation

Remote installation is the process that allow you to remotely install application on your device from play store. For this method to work for you, it requires that your phone is still connected with your Google
account.  in case of theft, disconnect your phone from your account, you may not have access to this method so you have to hurry.

Step 1: Install Android Lost app remotely via Google Play in your browser and it will be
installed on your phone remotely. As already mentioned, your phone still needs to be connected to your Google account. Otherwise, this won’t work.

Step 2: After you intalled Activate Android Lost

Then after you installed and activate your Android lost, register your device remotely, send an SMS
with the text “androidlost register” to your phone. This SMS can be sent from any phone.

This will make Android Lost to register itself using your Google account credentials.

Step 3: Log in to the Android Lost
website

So after you follow all the above step then Visit the Android Lost website and sign in using
your Google account. After doing that, you should have access to all remote control features such as the following:

1. You can Get the location of your device

2. Format your entire document from your phone.

3. Sound an Alarm

4 Get the location of your phone

Using Android Device Manager

Before you can use Android Device Manager, you have to enable it on your device and
associate your device with your Google account.

You can turn on Android Device Manager using your device, Android Device Manager on the web, or the Device Manager app:

To turn Android. Device Manager on your phone

1. From your device's apps menu, open Google Settings.
2. Touch Security.
3. Under "Android Device Manager," you
have the option of turning on.
Remotely locate this device.

i. You can use Android Device
manager to show your device's
location. Move the switch next
to "Remotely locate this
device" to allow Android Device
Manager to show your device's
location on Android Device
Manager.

ii. Allow remote lock and factory
reset. You can use Android Device Manager to remotely lock your device, erase everything on it, or change the lock screen passcode. Touch the box next to "Allow remote
lock and factory reset." When
the "Activate device administrator" screen appears, read the text and touch Activate to turn on the device
administrator.

For more information about this visit Google support.

I hope you enjoy this article.

Share:

Monday, January 26, 2015

Facebook under attack

Today I am trying to access my Facebook but unfortunately there server is down.
I don't know the causes but I am trying to contact the Facebook for the reason of this, you can try it yourself Facebook.

I have never experience this problem since the date that I joined Facebook I hope this is not the end of the world.

Share:

Lizard Squad Compromised Malaysia Airlines website "hackers"

The national carrier's homepage currently shows a photograph of a lizard in a top hat and tuxedo.

Malaysia Airlines confirmed its site was compromised but said customers' bookings and data were not affected.

The airline is still recovering from two disasters; the disappearance of MH370 and shooting down of MH17.

On Monday morning, the main page of its website was replaced by the words "404 - Plane Not Found" and "Hacked by Lizard Squad".

"404 Page not found" is the common error message displayed when a website cannot be loaded.

Initially the words "ISIS will prevail" appeared in the browser tab for the page, but that has since disappeared.

The words "404 - Plane Not Found" and "Hacked by Lizard Squad" appear on the screen It is not clear why Malaysia Airlines has become the target of a cyber attack nor what
connection the hack has to Islamic State, the militant group sometimes referred to as ISIS which has declared an Islamic caliphate in
parts of Syria and Iraq.

Lizard Squad claimed on Twitter that it would release data from Malaysia Airlines, but did not
specify what information it might have.

'Not been hacked' Malaysia Airlines confirmed in a statement that
its "Domain Name System (DNS) has been compromised where users are re-directed to a hacker website".

But it said its own web servers were intact and the website itself had not been hacked into.

It said "this temporary glitch does not affect [customer] bookings" and user data "remains secured". It added that it would take 22 hours
to restore the website.
In March last year, flight MH370 disappeared from radar and is believed to have crashed 1,800km (1,100 miles) off Australia's west
coast. A few months later MH17 was shot down over Ukraine, killing everyone on board.

The hacker group Lizard Squad previously claimed to have disrupted Sony and Microsoft operations, with gamers unable to log on to
XBox Live and PlayStation platforms over Christmas.

Share:

China Has blocks virtual private network use

China has blocked several popular services that let citizens skirt state censorship systems.

Three providers of Virtual Private Network (VPN) systems reported that updates to China's firewall had hindered people using their services.

The providers affected are Astrill, StrongVPN and Golden Frog.

Many Chinese people use VPNs to visit websites outside the country that they would not be able to reach without the aid of such tools.

Sites blocked in China include services operated by web giants such as Google, Facebook and Twitter.

China operates a very sophisticated net censorship system that both limits the places people can go online and what they can search
for and discuss.

A VPN works by setting up a dedicated, encrypted link between a person's computer and the website or service they want to use and makes spying on the data flowing across the connection difficult.
Chinese state media said the blocks had been imposed "for safety".

Reuters reported that a
cybersecurity expert at a state-backed think tank said the upgrades to the nation's firewall had been carried out to preserve China's
"cyberspace sovereignty".

The renewed attempt to stifle use of VPNs comes as the ruling Communist party seeks to
clamp down on corruption by top officials, Prof Xiao Qiang from Berkeley's School of Information told AP.

The clampdown was "a very clearly related fact with the amount of political rumours and information related to China's high politics
showing up in websites outside of China,'' he said.

The services that have been hit are almost exclusively used by individuals and are often accessed via mobile phones. China has not put any restrictions on the use of VPNs inside large corporations.

Sunday Yokubaitis, president of the Golden Frog VPN service, told Reuters: "This week's attack on VPNs that affected us and other VPN providers is more sophisticated than what we've seen in the past."
Despite this, Golden Frog said access to some of its servers was still unimpeded.

StrongVPN said via its blog that it was "working diligently" to restore access to servers it had in China. In addition, it said customers
should attempt to connect at non-peak hours to limit the load on its network.

Share:

Sunday, January 25, 2015

How To Check if A Windows Operating System (OS) is 32 - Bit or 64 - Bit

Sometimes people are confusing about what type of OS they are running on their computer, it is very important to know the OS type you are using for example you want to download software from internet and they give you to options one for 32bit and other 64bit.
So what are you going to do are you going to guess or you will look for someone to do it for you, the thing that even a kid can do it, it is embracement.

So today we are going to discuss about a simple way to do this no software required, it is only your brain and 5minutes from your time.

Just read this step below and find out.

Step 1:
Click on start Menu

Step 2:
Under a start menu click on My Computer or press windows trade mark + E on your keyboard.

Step 3:
System dialog will appear for you.

Step 4:
Inside system dialog take a clear look  you will see something
Like this
System Type: 64-bit or 32-bit.

That is it if you see 64-bit Operating System, x64-based processor that is mean you are running windows 64 operating system based on x64 based processor.

If you found this post useful please share it to your friends.
If you found any difficulty don't forget to leave me a comment I will help you.

Share:

How To Recover Deleted Files From Sd card on Android

As I promise I fulfilled my promised, This tutorial is not totally for beginners but it is very easy and the steps are clearly understandable.
I know how painful it is if you loose someone photo that you love him so much must especially your girlfriend or your boyfriend.
Don't worry all your media data can recover if you follow this guide.
I hope you are following let us continue.
This tutorial is based on Android Data Recovery , which can retrieve
pictures and videos from SD cards on Android devices, as well as messages and contacts on
SIM cards.

How to use Android Data Recovery to recover Android files

Step 1. After you Download Android Data recovery Run the program and connect your  Android to the computer, and move to the next step.

Step 2. Enable USB debugging on your Android device
If you didn't enable USB debugging on your Android device Enable it by following this procedures below is depends on your OS type.

1) For Android 2.3 or earlier: Enter "Settings" <
Click "Applications" < Click "Development" <
Check "USB debugging"

2) For Android 3.0 to 4.1 : Enter "Settings" <
Click "Developer options" < Check "USB
debugging"

3) For Android 4.2 or newer: Enter "Settings" <
Click "About Phone" < Tap "Build number" for
several times until getting a note "You are
under developer mode" < Back to "Settings" <
Click "Developer options" < Check "USB
debugging"
Then move to the next steps

Step 3 Analyze and scan your Android SD card Then Android recovery software will detect your
phone. Before scanning your device, the program needs to analyze it at first. Click "Start " to begin.

After that, you can scan your device now. A window will pop up click on
"Allow " button on the homescreen, then click on "Start " again to begin scan the SD card.

The scan will at least take few minutes before it is complete just relax and wait until it has finished, then move to the next step which is the final step.

Step 4 Preview and recover data from Android SD cards After finish scanning the SD card, you will be
able to preview found data such as photos, Messages, contacts and videos, so as to check
whether your lost files are found or not. Then you can mark the data you want and click
"Recover " button to save them on your computer

Apart from videos you may be able to restore messages if they have saved on SD Card.

That's all if you found out this post useful don't forget to share with your friends on twitter or via Facebook by clicking on there icon below. For any difficulty don't for get to leave me a comment.

Share:

Monday, January 19, 2015

Hackers Start World War III, US & UK Trade In Online Attacks

Hackers create fake news headlines, launching cyber war games, Windows Phone gets Lumia Denim, Be My Eyes helps blind people, no
more free iTunes singles, and Jimmy Kimmel asks “ What Is Your Password? ”

Hackers Start War On Twitter
The Twitter accounts of both the New York Post and United Press International (UPI) were hacked on Friday (Jan 16), leading to a series of bogus headlines being tweeted as fact . One of the tweets posted to the UPI account quoted the Pope as
stating, “World War III has begun. ” This, coupled with a fake NYP tweet claiming a U.S. aircraft carrier was
“ engaged in active combat ” with Chinese warships led to a certain amount of panic in some quarters.

All of the bogus tweets have now been deleted, and both news organizations have taken back control of their Twitter accounts. However, with this incident coming just one week after the Twitter account of the U.S. military command was hijacked , we wouldn’t be surprised if this
kind of attack didn’t punctuate the whole of 2015.

US and UK Plan Cyber War Games
The U.S. and the U.K. are gearing up to launch cyberattacks on each other for the first of a series of
virtual war games. The two countries will work together to counter online threats, with President Obama and Prime Minister Cameron appearing to agree that the Internet represents a threat to national security .

The first planned attack will see the two countries attacking each other’s
financial sectors and will take place sometime in 2015.

Further attacks will then be planned, including “exercises to test critical national infrastructure. ” The actual
timing of these war games and how they will work in practice are obviously being kept under wraps.

Microsoft is currently rolling out the new Lumia Denim update to Windows Phone users , although when you personally get it will depend on your carrier’s attitude to
updates. In the meantime, Microsoft is keen to talk up the significance of this update for Windows Phone
8.1 .

Features of the Lumia Denim
update include improvements to Cortana, more customization options for Live Folders, faster download speeds from the mobile Web browser, a built-in VPN for use on unprotected WiFi networks, and a vastly improved Lumia Camera app .

 Be My Eyes Helps Blind People See
A new iOS app called Be My Eyes pairs blind people with sighted people to make the world a little bit easier to understand. A blind person
with the app installed on their phone can request help from a volunteer. At which point the volunteer can use the phone’s camera to assist the
blind person by being their eyes for a specific task.

This is one of those apps that it seems incredible no one thought of until now.

After all, the technology enabling it to work has existed for some time. In the end, it took Hans Jørgen
Wiberg to invent the app with
help from Danish software studio Robocat .

Apple Drops Free Singles On iTunes
Apple has stopped offering iTunes users a free Single Of The Week. According to Business Insider , the
promotional effort that has gifted iTunes users with a free single every week since 2004 has ended.

Apple has yet to officially announce the shuttering of this iTunes institution, but all signs point to it being dead as a dodo. Which means
iTunes just got a little crappier than it was already.

What Is Your Password?
And finally, it turns out that hackers and cybercriminals are missing a trick when it comes to obtaining people’s passwords. Because while
most of us are wary of phishing emails and the like, some of us will happily give our password to a stranger in the street. As long as the
stranger is being filmed and claiming to represent Jimmy
Kimmel Live!

For more tech news keep visiting go4techblog.

Share:

How to use Whatsapp on Computer Using Airdroid

Whatsapp is an instant messaging app for smart phones that operates under a subscription business model. The whatsapp enables users of selected phones to use the internet to transmit communication.
In addition to text messaging,  whatsapp can be used to send images, video and audio media messages.

However, Whatsapp is only available for mobile platforms like Android, iOS, Windows phone, Symbian and Blackberry. Although WhatsApp has not been created for PCs, there are ways to run it on PC and use it.

If you want to use whatsapp on computer there is a lot of waus , but today I am going to discuss this one it is Airdroid. Airdroid allows users to connect and control their Android devices from their browser. It is more than that it allows you to connect to your Android device over the network to control files, music, photos, video, apps, and even contacts.

1. Download and install AirDroid on your Android phone

2. Sign in into the app or Sign up with a new account.

3. Once you’ve signed in, the app will ask you to enable real time notifications on your PC. Tap on ‘Enable’ button.

4. Enable the Android Notification Mirror feature.

5. Now head over to the www.airdroid.com and download the respective Airdroid client for your
Mac os or Windows PC from the download links provided.

6. Install the application on your computer.

7. Sign in to your AirDroid account using the same username and password that you used to sign up on your Android phone.

That’s all! Now whenever you receive Whatsapp’s message on your Android phone, the same message will be also displayed on
your PC in real time. Click on the message notification to reply.

Please note that you should have your Android phone and PC connected to the same network
to get notifications.

Share:

Saturday, January 17, 2015

New York Post and UPI Twitter accounts hacked

The Twitter accounts of the New York Post and United Press International (UPI) have been
hacked with fake tweets on economic and military news.

In one post, the Pope was quoted on UPI's Twitter feed as saying that "World War III has begun".

Meanwhile, the New York Post's account said that hostilities had broken out between the United States and China.

It is the latest hack of a high-profile social media account, four days after US military command was compromised.

UPI, which is based in Washington, confirmed in a statement that both its Twitter account and news website had been hacked.

Six fake headlines were posted on its Twitter account and a breaking news banner was added to a fake story about the Federal Reserve on its homepage, the statement
added.

A tweet on the New York Post's account said the USS George Washington, an aircraft carrier,
was "engaged in active combat" against Chinese warships in the South China Sea.

A Pentagon official said the tweet about hostilities with China was "not true", AFP reports. The tweets have all since been deleted.

The New York Post says it is investigating the hack. It comes just days after US President Barack
Obama unveiled proposals to strengthen cyber security laws after a spate of attacks on high-
profile US targets, including the Pentagon Twitter feed and Sony Pictures .

The Twitter account of the US military command was suspended last Monday following an attack by hackers claiming to support Islamic State.

In November hackers also released reams of confidential data stolen from Sony Pictures, and in recent years cyber criminals have
attacked other US companies such as Home Depot and Target.
A number of media organisations, including AFP and the BBC, have also been subjected to cyber attacks over the past two years.

Share:

Charlie Hebdo: 'Islamist cyber attacks' hit France

Numerous French media websites have gone down a day after warnings of a wave of Islamist
cyber attacks.

The sites of Le Parisien, Marianne and 20 Minutes were among those affected, although most were soon restored.

The French government said some 20,000 sites had been targeted after terror attacks in Paris left 17 dead.
The media sites' web host said that it was investigating whether it was one of them but it has ruled out an external distributed denial of service attack.

On Thursday, the head of cyber security for the French military, Vice Admiral Arnaud Coustilliere, said that "structured" groups and "well known Islamist hackers" were behind the attacks against the 20,000 sites, but did not elaborate.

The outage among the media websites began the following day. It is not yet known if the two are linked.

The web host Oxalide told the BBC that no line of enquiry was being dismissed, but that its initial investigations had ruled out the
possibility of an external distributed denial of service attack.

Such an attack involves flooding servers with requests to render the target site, thereby causing it to fail to load.

The company told the BBC it was still in the process of determining who was behind the attack.

It said it would release a report in the early afternoon on Friday. None was forthcoming at the time of publication.

'Attacks'
That came after the vice admiral said he believed the first wave of attacks was a retaliation against Sunday's solidarity march in
Paris, itself held in response to the Paris terror attacks.

According to to Agence France-Presse (AFP), he said "people who do not adhere to a certain number of values" expressed on that march
were to blame.

Vice admiral Coustilliere added that some of the first wave of cyber attacks involved French army regiments and that the defence ministry "has decided to boost its security vigilance".

Besides the three named above, AFP reported that Friday's outage affected the websites of
L'Express, Mediapart and France Info.

Those for France Inter, Slate and ZDNet were also among those affected from around 8am
GMT on Friday.

High demand
The BBC checked the sites over the next five hours and most were quickly restored. Le Parisien and 20 Minutes remained down for a
longer period but were available again by around 1pm.

The news came as it was announced that Charlie Hebdo, the magazine whose headquarters were attacked with the loss of 12
lives, has released its latest edition as a smartphone app to meet demand.

The magazine's front cover featured a weeping Muhammad and the message "all is forgiven".

Millions of copies were printed - many times more than its usual circulation of around 60,000.

The print magazine went on sale in the UK on Friday.

Many French outlets sold out within
minutes and queues began forming in Britain early in the morning.
The app was available on iOS, Android and Windows Phone.

Share:

Friday, January 16, 2015

How to change your friend computer without old password

This tutorial is very easy and funny, I don't know why Microsoft leave this vulnerability in windows 7.

I have used this trick on many computers and all of them is work perfectly, but make sure you didn't do on the computer that you don't have access to it, because it will lead you to jail.

This tutorial is required a basic command prompt command or never run a command prompt before.

Command Prompt: Command Prompt is a command line
interpreter application available in most Windows operating systems. you can perform alot of windows operation in cmd if you know there command.

Let us back to our tutorial Here we go:

Step 1:
Click on start menu and then click on All Program.

Step 2:
On All program item click on Accessories under accessories you will see command prompt.

Step 3:
Right click on Command Prompt click Run as Administrator a black screen will appear for you.

Step 4:
Inside that black screen type the following command:

net user yourComputerName new password.

E.g

net user alkasima 1234567

I wish you best luck thanks for reading this post.

Share:

Simple way to Hack windows 7 password

Forgetting your password is not a new problem, many people they have many things in their life so they are easier to forgot there password, but luckily there’s a really easy way to reset the password.

All you need is a copy of the
Windows 7  installation disk and one simple command line trick.

Resetting Your Forgotten Windows Password are follows below:

Boot off the Windows disk and select the

“Repair your computer” option from the lower left-hand corner.

Follow through until you get to the option to open the Command Prompt, which you’ll want
to select.

First you’ll want to type in the following command to backup the original sticky keys file:

copy c:\windows \system32\sethc.exe c:\

Then you’ll copy the command prompt
executable (cmd.exe) over top of the sticky.

keys executable:
copy c:\windows
\system32\cmd.exe c:\windows
\system32\sethc.exe

Now you can reboot the PC.
Resetting the Password
Once you get to the login screen, hit the Shift key 5 times, and you’ll see an administrator mode command prompt.

Now to reset the password—just type the following command, replacing the username
and password with the combination you want:

net user yourComputerName your newPassword.

E.g net user alkasima 1234567

That’s all there is to it. Now you can login. Of course, you’ll probably want to put the original sethc.exe file back, which you can do
by rebooting into the installation CD, opening
the command prompt, and copying the

c:\sethc.exe file back to c:\windows
\system32\sethc.exe.

If you found this tutorial useful please me a comment

Share:

Introduction to Unix Operating System

What is UNIX?

UNIX is an operating system which was first
developed in the 1960s, and has been under
constant development ever since. By operating
system, we mean the suite of programs which
make the computer work. It is a stable, multi-
user, multi-tasking system for servers,
desktops and laptops.
UNIX systems also have a graphical user
interface (GUI) similar to Microsoft Windows
which provides an easy to use environment.
However, knowledge of UNIX is required for
operations which aren't covered by a graphical
program, or for when there is no windows
interface available, for example, in a telnet
session.

Types of UNIX

There are many different versions of UNIX,
although they share common similarities. The
most popular varieties of UNIX are Sun Solaris,
GNU/Linux, and MacOS X.
Here in the School, we use Solaris on our
servers and workstations, and Fedora Linux on
the servers and desktop PCs.
The UNIX operating system
The UNIX operating system is made up of three
parts; the kernel, the shell and the programs.
The kernel
The kernel of UNIX is the hub of the operating
system: it allocates time and memory to
programs and handles the filestore and
communications in response to system calls.
As an illustration of the way that the shell and
the kernel work together, suppose a user types
rm myfile (which has the effect of removing
the file myfile ). The shell searches the filestore
for the file containing the program rm , and then
requests the kernel, through system calls, to
execute the program rm on myfile . When the
process rm myfile has finished running, the
shell then returns the UNIX prompt % to the
user, indicating that it is waiting for further
commands.

The shell

The shell acts as an interface between the user
and the kernel. When a user logs in, the login
program checks the username and password,
and then starts another program called the
shell. The shell is a command line interpreter
(CLI). It interprets the commands the user
types in and arranges for them to be carried
out. The commands are themselves programs:
when they terminate, the shell gives the user
another prompt (% on our systems).
The adept user can customise his/her own
shell, and users can use different shells on the
same machine. Staff and students in the school
have the tcsh shell by default.
The tcsh shell has certain features to help the
user inputting commands.
Filename Completion - By typing part of the
name of a command, filename or directory and
pressing the [Tab ] key, the tcsh shell will
complete the rest of the name automatically. If
the shell finds more than one name beginning
with those letters you have typed, it will beep,
prompting you to type a few more letters before
pressing the tab key again.
History - The shell keeps a list of the
commands you have typed in. If you need to
repeat a command, use the cursor keys to
scroll up and down the list or type history for a
list of previous commands.
Files and processes
Everything in UNIX is either a file or a process.
A process is an executing program identified by
a unique PID (process identifier).
A file is a collection of data. They are created
by users using text editors, running compilers
etc.

Examples of files:
a document (report, essay etc.)
the text of a program written in some high-level
programming language
instructions comprehensible directly to the
machine and incomprehensible to a casual
user, for example, a collection of binary digits
(an executable or binary file);
a directory, containing information about its
contents, which may be a mixture of other
directories (subdirectories) and ordinary files.
The Directory Structure
All the files are grouped together in the directory
structure. The file-system is arranged in a
hierarchical structure, like an inverted tree. The
top of the hierarchy is traditionally called root
(written as a slash / )
In the diagram above, we see that the home
directory of the undergraduate student
"ee51vn" contains two sub-directories ( docs
and pics ) and a file called report.doc .
The full path to the file report.doc is "/home/
its/ug1/ee51vn/report.doc"
Starting an UNIX terminal
To open an UNIX terminal window, click on the
"Terminal" icon from Applications/Accessories
menus.
An UNIX Terminal window will then appear with
a % prompt, waiting for you to start entering
commands.

Share:

How to Enable Text console in Ubuntu

There are three ways to access the
command line interface in Ubuntu, as on
any Linux and UNIX distribution. One is
launching the terminal emulator program
within the graphical user interface. The
other two are about accessing the console
directly, independent of the graphical user
interface and the windowing system
powering it (typically X server), and that's
what we're concerned with here.
The quickest way to get to the console in
Ubuntu is to just press

Ctrl-Alt-F1 . You

will immediately be thrown out of the GUI
and into the clean Linux console where
you can log in and use the command line.
Multiple console terminals are available
this way if you press

Ctrl-Alt-F2, Ctrl-Alt-F3, and so on.
However, what you might want is to get
into the text console when you boot into
Ubuntu instead of booting directly into the
graphics mode. For that you'll need to
make some configuration changes to your
GRUB bootloader.

The configuration file
you will need to modify is

/etc/default/

grub , and it is a good idea to make a
backup of it first in case you ever want to
come back to the original configuration:

sudo cp /etc/ default /grub /etc/default / grub .backup

With that out of the way you can start
modifying the configuration file by
opening it, with superuser privileges, in a
text editor such as nano:

sudo nano / etc/default / grub

Enter your password and the file will
open. Then look for this line:

GRUB_CMDLINE_LINUX_DEFAULT="quiet
splash" . Using nano you can search for
this line by pressing the Ctrl-W shortcut
and typing that line in. You just need to
comment it out by putting a hash character
in front of it so it looks like this:

#GRUB_CMDLINE_LINUX_DEFAULT="quiet
splash"

As you might guess this disables booting
with the splash screen, and the "quiet"
mode, meaning it wouldn't hide the
console output during boot.
Next enable the text mode finding
GRUB_CMDLINE_LINUX and adding the
"text" option to it. The line will then look
like this:
GRUB_CMDLINE_LINUX = "text"
This will ensure that you see the text
output, but still doesn't enable the console
login. For that find the #GRUB_TERMINAL
line, which is likely commented out,
uncomment it by removing the #
character, and add the "console" option to
it so it reads like this:
GRUB_TERMINAL = console
Finally save the file, which in nano you
can do by pressing Ctrl-X and then enter,
and make sure to update GRUB with the
new configuration using the update-grub
command:
sudo update - grub
Now you can reboot and Ubuntu should
boot in the text mode, and allow you to log
in to the console and run the desired
commands.

Share:

How to use Google To Repair A PC

To use Google to repair a computer is simple as ABC if you can read this tutorial throughout. Sometimes a small problem can cause a computer error, which can be repair in a small time or effort instead of for you to repair it you take it to the repair shop which is lead you to spend a hundred dollars. Let me tell you one thing must of the repair shop in your local they use Google to repair a system why not you cannot do it maybe because you didn't read my post before. But for now I believe after you read this post you will hate yourself for what you did.
Don't say why I said this I know you are doubt now OK let me remove this doubt from you.

Just follow this simple steps

Step 1
identify your problem:
What I mean with these take note of the problem you encounter in your system.
Example:
Let say your computer there is not sound.

Step 2
We take example of having no sound in computer let us see.
Goto Google and type "How to fix a computer sound problem" By typing this you will get thousand of result that you can use to repair your system.

Step 3:
Make sure your problem is fixed if not try another phrase e.g "window 7 no sound" you will see alot of result with different solution.

By following the above procedures I hope you can troubleshoot many computers in your locale, Thanks for reading my post I hope you enjoy it don't forget to leave a comment.

Share:

Setting Up An Email Account Using Outlook Express

Today I am going to teach you how to set up an email Account using Outlook Express the most popular Email software.
Your Internet Service Provider has probably
given you the option to set up more than one
email address. Most come with at least five. So
you're not limited to just the one. So if someone want you to configure his/her own after reading this post you should be able to do it.

To set up an email address, make sure you are
looking at an Outlook Express screen and not a
New email screen. Then do the following.

1. From the menu bar, click on Tools
2. From the drop down menu that appears, click
on Accounts (one click, left mouse button)
When you click on Accounts, you get the
3. Internet Accounts dialogue box popping up.

4. Click the Mail tab at the top to see the

following:
The Mail tab shows you all the email accounts
that you have set up. In above, there
are no email accounts set up yet. To set up an
email account, do the following:

1. Click on the Add button in the top right hand
corner
2. A popup menu appears
3. Click Mail with your left mouse button
4. When you click on Mail, you get an Account
5. Wizard popping up, which will ask you a series
of question.

When the Wizard start:

1. Type in a name you want for display purposes.
You can type in anything you like here. It
doesn't really matter because Outlook Express
will completely ignore the name you pick!

2. Click the "Next" button when you're done. The
screen will change:

You need to type in an email address. Type in
the email address you got from your Internet
Service Provider.

- Once you have entered the email address, click Next.
You'll get the another screen let me break it
down.

Your Incoming mail server is probably a POP3
one, so leave the drop down box as it is. The
first text box is Incoming mail (POP3, IMAP or
HTTP) server . You can usually get these details
from your Service Provider's homepage. But
yours will probably be a POP or POP3 address.
This is a method used to receive emails. The
format to type into the text box is this
                  pop.provider.com
So if your Service Provider was Home and
Learn, you'd enter this
                           pop.go4techblog.blogspot.com

The next text box to fill in is "Outgoing mail
(SMTP) server". SMTP is the method used for
sending emails. The format to use is

                  smtp.provider.com

So if your Service Provider was Home and
Learn, you'd enter this

         smtp.go4techblog.blogspot.com

we have entered some
fake POP and SMTP details

- Click the "Next" button at the bottom when you
are finished

- The next screen will appear:

- The Account name is the one you got from your
Service Provider. They might have given you a
password, too. If they did, enter your Password
in the text box. Unless your Service Provider
has told you otherwise, DON'T put a tick in the
box for Log on using Secure Password
Authentication .

- When you're done, click the "Next" button

- There's nothing left to fill in, and you are invited
to click the Finish button. Click the Finish
button and you'll return to the Internet Accounts dialogue box
Your new Account will be there:

The Account name is a bit messy. Outlook
Express has simply taken the name of the
Incoming Server -
pop.type_your_isp_here.com . To change this
to something more memorable, click the
Properties button to the right, or simply double
click the name of your account. You'll see a
dialogue box:
Delete the text at the top, the one the one in the first field of dialog box Then type something of your
own:
Click OK and you'll get back to the Internet
Accounts screen. You should see your new
name appear, under Account:
When you're done, click the Close button on the
Internet Accounts dialogue box. You'll be taken
back to the main Outlook Express screen. To
check if the account has been set up, we can
click on the Send/Recv icon in the main Outlook Express screen.
As you can see, your new account has been
added at the bottom. It was a success!

I hope you enjoy this tutorial if you have any questions don't forget to leave me a comment.

Share:

8 Useful Android Tips For Everyone

Whether you are novice or advance android user this simple tips will help you.
Before we go you have to take note that the steps may vary a little from one
Android phone to another due to the differences
in the build and the OS version, but if you play
around with it, the next step isn’t too far off.

1. Disable Mobile Data
Whenever you don’t need to stay connected,
disabling the Mobile Data can help keep your
smartphone battery from draining too quickly and your mobile data too.
Turning off mobile data is as easy as:

1. Going to Settings > Data Usage.

2. Disable Mobile data by toggling the setting
from ON to OFF .

2. Add Multiple Google Accounts
You need a Google account to use an Android
phone but did you know you can choose to run
more than one Google account on your Android
device. This is convenient if you use more than
one account for several of your Google services.
To add multiple Google accounts:

1. Go to Settings > Add account .

2. Select Google and setup your New or Existing Google account.

3. Once added, choose what you want to sync with the account.

Repeat all the steps above if you want to add some more accounts.

3. How To Check For Android System Updates
For Android users that are using stock ROM,
you may want to look for new updates to your
system. To check for updates:
1. Go to Settings > About phone/tablet .

2. Tap on System updates .

3. Tap Check now to look for system updates.

4. Changing Default Apps
If you have already set some default apps for
particular tasks (e.g. using Chrome for opening
web links) but wish to change this:
1. Go to Settings > Apps .

2. Swipe right and look for the All tab.

3. Select the app you want to remove as default.

4. Tap on Clear defaults .

5. Disable App Notifications
Bugged by annoying app notifications that just
keep coming? If you don’t know already, these
app notifications also drain your phone’s
battery. If you want to turn them off, and you
are on Jelly Bean 4.1 and above, here’s how:

1. On any of your unwanted notifications in your notification bar, long press on the notification
for a message box to appear.

2. Tap on App Info > Untick Show Notifications >
OK.

6. Set Mobile Data Limit
Want to keep track of how far your usage is
from your monthly mobile data limit? If you
have ICS and above, there is a feature which
lets you keep track of how much of the quota
you have left.
1. Head over to Settings > Data Usage.

2. Set your data limit by dragging the orange line to reflect your monthly quota.

3. Set your data usage cycle based on when your "month" starts and ends, and you’re done.

You will be alerted once you hit the limit you
have set. Note that the tracked data usage of your phone may vary slightly than your carrier’s
tracking.

7. Disable Automatic App Updates
Prefer to read through app permissions and manually pick which app updates to adopt?
You can, but first you need to disable your
automatic app updates. Here are the steps:
1. Open Play Store and head over to Settings .

2. Tap on Auto-update apps .

3. Choose Do not auto-update apps .
If you want to enable the auto updates, follow the same path and choose Auto-update apps at any time or via Wi-Fi (available for certain Android devices only).

To do A Manually Update Follow This:
To update your apps manually, just open Play Store , and on the main page swipe in from the
left and tap on My apps . You can tap on apps
with pending updates and update them
manually, or if you like to update them all at
once, just tap on Update All.

8 How To Turn Off Auto-Correction
Hate the fact that your phone is going English
teacher mode on you? Turn off auto-correction.

1. Go to Settings > Language & input.

2. Tap on the settings icon next to the keyboard that you are using, e.g. Google Keyboard.

3. Look for Auto-correction and tap on it.

4. Select Off to turn auto-correction off.

Share:

7 Useful Android Apps For Blogging

Everybody now has a smartphone and majority of us has a blog. Some they are blogging for money or just for fun. Whatever you are blogging for money or fun you need to keep your blog update and sometimes we are far away from our computer, don't worry as technology continue growing all this problems was solved. You can use your smartphones, Android has many Apps for this task. I compiled some great 7 Application that can help you create content, intersect with fans, track site traffic.
Have fun!

Blogger
One of my favorite Apps for blogging in android is this application it will allow you to create post, edit post, embed images from phone add location. It is also allow you to save and publish your post later. You can use this apps to update your blog even if you are in toilet.

Facebook Page Manager
Managing a Facebook pages with phone is very difficult. Thankfully to Facebook has an official pages manager app for android. This application allow you to post in your page and reply users in an easy way, it can also allow you to edit your profile.

Google Adsense
Making money with Google AdSense is easy if you have more visitors in your site. This application allow you to track your earnings, as well as things like page views, clicks, and other traffic stats.

Google Analytics
If you want to make your blog successful you need to track your traffic. Google Analytics is the best free tool for tracking things like pageviews , search term, and other stuff. You will know were the people read your blog are from, what device they use, and other things that can help you create content that certisfy there need.

Buffer
Buffer is a great way to share content across your social Media accounts. You can easily share to Facebook, twitter, LinkedIn. It also allow you to share content on a custom schedule. Simply create a schedule for things to post, add content to your buffer ,  and let the buffer do the job for you.

Pocket
Pocket allows you to save webpages, photos, videos, articles, or anything from the web for later use. Simply add it to your Pocket and use it when you have time.

Twitter
Twitter is allow you to share the content of your blog. If you are serious and you want to get more visitors I recommend you to use a twitter.

Share:

11 Tricks For iphone That Make You Laugh

This simple tricks must of the apple user (iso) they dont know about them and the funny thing about it is very simple.

Here go:

Camera Trick
As long as the camera app is open, you can
use the volume buttons to take a photos.

Or
By holding down the capture button in the
camera app, your phone will take a series of
photos so you can get the perfect shot.


Timestamp Trick
You can see the timestamps of your text
messages by sliding your texts over to the left.


airplane Trick
Your phone will charge much faster if you
turn on "Airplane Mode" while charging.


LED Trick
Instead of having your phone vibrate or
ring when you get a call or text, you can have
it emit an LED flash. Go to Settings > General
> Accessibility, then scroll down and turn on
“LED Flash for Alerts.”

Pass code Trick
You can create a longer passcode with
letters instead of numbers. Go to Settings >
General > Passcode Lock and turn off “Simple Passcode.”

Shortcut Trick
Create shortcuts in no time. Go to Settings
> General > Keyboard > Shortcuts > Add New
Shortcut. Enter a word or phrase that you use a lot and what you want the shortcut to be. Now, every time you type that shortcut, the
whole word/phrase will appear.

Undo Function Trick
There is an undo function that allows you to go back if you make a mistake writing a text message, email, or editing a photo. Simply shake your phone and this option will pop up.

Space bar Trick
Double-tapping the spacebar will
automatically end the sentence with a period
and start a new one for you.

Timer Trick
You can set a timer for listening to music
or audiobooks before bed. Just launch your Clock app, choose the Timer button in the lower right and set the timer for however long you want your media to play. Then, tap "When Timer Ends," scroll to the bottom and choose "Stop Playing". Now you'll never have to turn
off your music again after falling asleep.

Read Text
Your phone will read texts aloud. Start by going into the Settings app. Choose General, tap Accessibility, then turn on the Speak Selection feature. After you've done this, the
"Speak" option will always appear when you highlight text.

Share:

2 Steps to Update Your iOS software on your iphone, ipod and ipad

Today I am going to teach how to update your iOS device wirelessly or using iTunes.

First of all let me tell you iOS software updates introduce new features that let you do even more with your iPhone, iPad, or iPod touch. Make sure you keep your device up to date so that you will not miss some latest features.

Before you update
Be sure to Backup your device to I cloud or iTunes.

If you use your devices Personal Hotspot for your computers Internet connection, update your device wirelessly or connect your computer to another network.

To update your Device Wirelessly which is the easiest way are follow below.

UPDATE YOUR DEVICE WIRELESSLY

1. plug in your device to a power source.
2. Tap Setting > General > Software Update.
3. Tap Download and Install Updates might download automatically while your device is connected to Wi-fi and a power source.
4. Tap Install, or tap Later to install the update later. If you use a pass code, you will need to enter it before installing the update.

If you don't have enough free space on your device delete it manually or if you are not able to update using wireless because some iOS software update are not available as over-the-air updates. VPN or proxy connection might prevent your device from contacting the iOS update server.

Updating iOS Using iTunes
If the above step is not working for you follow this step which I think it will work because it is tested by me.

1. Download and Install the latest version of iTunes on your computer.
2. Plug in your device to your computer.
3. In iTunes, select your device.
4. In the Summary pane, click Check for Update.
5. Click Download and Update.

Note: if you don't have enough free space in your space you will encounter error to avoid this delete contents manually in your device.

Thanks for reading my post if you have any problem leave me a comment  I am willing to help you we are friend.

Share:

Intel's Q4 revenue in line, surpassed tablet shipment goal by 6 million units

Intel has been very vocal about how the Internet of Things plays into its long-term revenue strategy, and the newer department appears to be pulling its weight based on the
latest earnings report.

Processor giant reported a net income of $3.7 billion ( statement ). Non-GAAP earnings were 74 cents per share on a revenue of $14.7
billion, up six percent year-over-year.

Wall Street was expecting earnings of 66 cents per share with $14.7 billion in revenue.

For the full year, Intel produced $55.9 billion in revenue -- also up six percent on an annual basis -- with a net income of $11.7 billion and EPS of $2.31.

At the beginning of 2014, Intel also touted a goal to ship at least 40 million tablets worldwide. The company surpassed that goal
with roughly 46 million units shipped by year's end.

Looking closer by department, the Internet of Things unit is demonstrating rapid growth with
revenue of $591 million last quarter, up 12 percent sequentially and 10 percent annually.

But for the whole year, the Internet of Things department climbed 19 percent from 2013 to be worth $2.1 billion in revenue.

Still the datacenter group appears to be Intel's best bet, with $4.1 billion in Q4 revenue alone, accumulating $14.4 billion for the year overall,
up 18 percent from 2013.

Software and services revenue flattened out sequentially to $557 million, which was down six percent year-over-year.

The PC Client department also dropped three percent sequentially and annually to $8.9 million in revenue last quarter, while the mobile and communications group soured with negative revenue of $6 million, consistent with expectations.
Nevertheless, Intel CEO Brian Krzanich remained upbeat in prepared remarks,
describing the fourth quarter as "a strong finish to a record year."
"We met or exceeded several important goals: reinvigorated the PC business, grew the Data
Center business, established a footprint in tablets, and drove growth and innovation in new areas," Krzanich said, promising more in
2015, including boosting "profitability in mobile." Earlier this month, Intel kicked off the year as
Krzanich took to the stage at the 2015 Consumer Electronics Show in Las Vegas to unveil Curie, a button-sized open source computer touted to "change the game" in the
still-nascent wearable technology space.

For the first quarter of 2015, Wall Street expects Intel to deliver earnings of 51 cents per share on top of $13.77 billion in revenue.

Intel followed up a Q1 revenue goal slightly wavering the line with a forecast of $13.7 billion, plus or minus $500 million.

For 2015 overall, Intel is projecting revenue "growth in the mid-single digit percentage points."

Share:

Tata Consultancy Services profit up 4 percent amid soft Q3

Tata Consultancy Services (TCS) has reported that its operating profit was up 3.9 percent to $1.06 million during the third quarter of the 2015 financial year.

The IT services, consulting, and business solutions firm also reported that revenue increased 14.3 percent year on year to $3.93 billion.

At the same time, net income for the same period was up 4.4 percent year on year, at $873 million.

TCS has attributed the third-quarter growth to being driven by strong growth in industries such as telecom, hi tech, and life sciences.
The company said it achieved growth across Europe, North America, and emerging markets
in Latin America, the Middle East, and Africa.

Europe led the growth, which was mainly driven by investments the company made in the market.

TCS CEO and managing director N
Chandrasekaran said the results are evidence of the company's ability to maintain momentum in a traditionally weak quarter for the IT industry. "Based on our progress this quarter, we are well on our way to post industry-leading growth for FY15. In areas like digital, simplification, and governance, we continue to partner closely with customers to help them prepare their businesses to succeed in an
economy where the default is digital," he said.

Chandrasekaran added that the company's diversified industry portfolio, particularly in global consulting, asset leveraged solutions, infrastructure services, and assurance services, also helped the company overcome soft seasonal demand in some sectors.
During the quarter, TCS won a number of key
partnerships, including one with a British mutual financial institution to manage its application portfolio, and another with a beverages company to manage and build a private cloud for its global infrastructure operations.

Share:

Marriott hotels do U-turn over wi-fi hotspot blocks

Hotel group Marriott International has announced it will stop blocking guests from using personal wi-fi kits.

The firm was fined $600,000 (£395,000) last year by a US watchdog after a complaint that it
had jammed mobile hotspots at a hotel in Nashville.

Marriott responded at the time saying it wanted to block such devices only in its conference and meeting spaces and believed it had the right to do so.

But it has changed tack after facing a backlash from customers and the press. "Marriott International listens to its customers,
and we will not block guests from using their personal wi-fi devices at any of our managed hotels," the company, which is based in
Bethesda, Maryland, said in a statement . 'Unacceptable' behaviour
The US Federal Communications Commission launched an investigation into the hotel's
practices in March 2013 after being contacted by a hotel guest who said they had been unable to connect to the net via a mi-fi device at Marriott's Gaylord Opryland Resort &
Convention Center.

An investigation by the regulator subsequently confirmed that the hotel was using a wi-fi monitoring system that de-authenticated
guest-created hotspots. This meant that if a guest connected their
laptop, smartphone or tablet to either a mi-fi add-on or a hotspot created by a device already linked in to the hotel's internet system,
then it would disconnect after a short time.

The FCC described the action as
"unacceptable", noting that Marriott was charging conference attendees between $250 and $1,000 per device for internet access.

On top of a fine, the watchdog ordered the firm to submit compliance reports every quarter for
the following three years to ensure it ended the practice.

Marriott, however, defended its right to block mobile hotspots used outside guest bedrooms on the grounds that it needed to tackle
interference and security issues.
It said failure to do so would lead to "unreliable wi-fi performance, spotty coverage, and dropped connections" and that criminals might use hotspots to threaten "guests' privacy - for example, by attempting to obtain guests' credit card or other personal information".

The company found support for its claims from the American Hotel & Lodging Association lobby group, which accused the FCC of trying
to tie Marriott's hands at a time of a growing number of cybersecurity threats.

But Google , Microsoft and the Consumer Electronics Association were among those to retort that such action was against the public
interest, illegal and malicious, adding that the security claims being made were misleading.
'Marriott is bad' The company subsequently faced a rash of
negative press, with the Economist going so far as to headline an article earlier this month:

"Marriott is bad, and should feel bad."

But while it has now changed its policy, Marriott has not backed away from claims that the move could play into the hands of hackers.
"We will continue to look to the FCC to clarify appropriate security measures network operators can take to protect customer data,
and will continue to work with the industry and others to find appropriate market solutions that
do not involve the blocking of wi-fi devices," it
said.

Share:

Tuesday, January 13, 2015

Best Online Site To Learn Computer

Being a computer guru in today's world is not difficult. As internet provide a free lesson for computer, there are a lot of free site that offer free information technology tutorial from beginner to professional. Below are those site that offer that free lesson, either you want to be a computer hacker or a programmer from scratch to professional. Keep learning like no tomorrow.

PROGRAMMING CODE LESSON
Programming is my favorite thing in IT let us ride by following this links bellow

Coursera

Code Schools

Code Avengers

Learn Python The Hardway

CodingBat

Ruby Monk

University Of WaterLoo

Extension Harvard

Codehs

WEB PROGRAMMING SITES
I don't believe I will become a web developer before visiting this site but now the story has changed I am a proudly web developer by professional. Follow this site below to become like me.

W3Schools

Tizag

Tutorials Point

Code Academy

ANDROID PROGRAMMING SITE
Learning Android programming is very sweet as we know how popular it is now in the world.

Developer Android

Raywenderlich

Vogella

SitePoint

TutorialsPoint

Coreservlets

IOS PROGRAMMING
Learning IOS is more interesting must especially for those that want to make money for design mobile Apps.

Developer Apple

RayaWenderlich

Tutorialspoint iOS

AppCoda

Lynda


INFORMATION SECURITY (Ethical Hacking)
Every computer novice today want to bee a computer hacker. Let me tell you one thing been a computer hacker is not a day job you must work hard in other to achieve your dreams. Unless if you want to be a script kiddie. "Tools dont make hacker, hackers make tools". Always shine your eyes keep your brain update, as security guys are busy working on encrypting and secure network. To become  a computer hacker or info security let me help you by following this site.

Hackthissite

Enigma Group

EvilZone

Hacking Tutorial

Hack A Day

HackersHandbook

HackForums

Explorehacking

CONCLUSION
By following all the above links I beleive withing a short period of time, your friend will start calling you "computer geek" don't run is not a race read slowsly, if you have any problem don't forget to leave me a comment....

Share:
Powered by Blogger.

Facebook

Recent Posts

Random Posts

Advertising


Theme Support