Friends of Technology is an IT base firm which seeks to empower both the youth and adults through ICT
Monday, 24 February 2014
Friends of Technology: The reason behind whatsapp outage on saturday
Friends of Technology: The reason behind whatsapp outage on saturday: Whatsapp founder Jan Koum has issued an apology and blamed a network router for Saturday's outage of the mobile messaging app. "...
The reason behind whatsapp outage on saturday
Whatsapp founder Jan Koum has issued an apology and blamed a network router for Saturday's outage of the mobile messaging app.
"We are sorry about the downtime," wrote Koum. "It has been our longest and biggest outage in years. It was caused by a network router fault which cascaded into our servers."
"We worked with our service provider on resolving the issue and making sure it will not happen again."
WhatsApp was down for more than three hours on Saturday just days after Facebook bought it for $19 billion.
The five-year old company currently has about 450 million users worldwide and is the leading smartphone-based messaging app.
"We are sorry about the downtime," wrote Koum. "It has been our longest and biggest outage in years. It was caused by a network router fault which cascaded into our servers."
"We worked with our service provider on resolving the issue and making sure it will not happen again."
WhatsApp was down for more than three hours on Saturday just days after Facebook bought it for $19 billion.
The five-year old company currently has about 450 million users worldwide and is the leading smartphone-based messaging app.
Saturday, 22 February 2014
Friends of Technology: **How To Remove New Folder Virus**
Friends of Technology: **How To Remove New Folder Virus**: How to fix Newfolder.exe manually? (For advanced users only) This problem can be solved manually by deleting all registry keys and file...
Friends of Technology: Get back Deleted # Whatsapp Messages-Manually
Friends of Technology: Get back Deleted # Whatsapp Messages-Manually: Step 1) First of all Navigate to the Whatsapp database folder, you will require file explorer for this task. the path is > sdcard/Wha...
Get back Deleted # Whatsapp Messages-Manually
Step 1) First of all Navigate to the
Whatsapp database folder, you will
require file explorer for this task.
the path is > sdcard/WhatsApp/
Databases.
Step 2) In the Database folder you
will see Chat files which are with
names similar like msgstore-2014-0
1-04.1.db.crypt. You may notices the
file names have dates as well. but
there is a File which is
msgstore.db.crypt, we need to
rename it. you can add any word
before msgstore.db.crypt.
Step 3) After renaming that file,
From the other Files just select the
file which shows appropriate date
before you accidently deleted your
whatsapp messages, and then
rename that file to msgstore.db.cry
pt. This Renaming process can also
be done on your PC by Connecting
your device.
Step 4) Now the Final step, Goto
Setting>Applications>manage
applications>Whatsapp and Click on
Clear Data. Now open Whatsapp,
Choose Restore when it prompts.
Thats it, the chat file saved as
msgstore.db.crypt will be restored
and hence your messages too.
**How To Remove New Folder Virus**
How to fix Newfolder.exe manually?
(For advanced users only)
This problem can be solved
manually by deleting all registry keys
and files connected with this
software, removing it from starup list
and unregistering all corresponding
DLLs. Additionally missing
DLL's should be restored from
distribution in case they are
corrupted by Iddono. To fix this
threat, you should:
1. Kill the following processes and
delete the appropriate files:
* libedit.dll
* newfolder.exe
* shelliddono.dll
* srv0104.ids
* srvidd20.exe
2. Delete the following malicious
registry entries and\or values:
* Key: SOFTWARE\Microsoft\Windows
\CurrentVersion\Run for nwiz.exe
Value: @
* Key: software\microsoft\windows
\currentversion\run\alchem Value: @
* Key: software\microsoft\windows
\currentversion\run\zzb Value: @
Friends of Technology: How to "Delete administrator Password" without any...
Friends of Technology: How to "Delete administrator Password" without any...: Method 1 Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive. Now when you boot u...
How to "Delete administrator Password" without any software
Method 1
Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive. Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT kind.
Method 2
Step 1. Put your hard disk of your computer in any other pc .
Step 2. Boot that computer and use your hard disk as a secondary hard disk (D'nt boot as primary hard disk ).
Step 3. Then open that drive in which the victim’s window(or your window) is installed.
Step 4. Go to location windows->system32->config
Step 5. And delete SAM.exe and SAM.log
Step 6. Now remove hard disk and put in your computer.
Step 7. And boot your computer
Friday, 21 February 2014
Friends of Technology: What is spyware ? How it comes to your pc? Prevent...
Friends of Technology: What is spyware ? How it comes to your pc? Prevent...: Often you can heard a word spyware. Is it important to know about spyware ? Yes! We are in advanced technology world. Day by day the t...
What is spyware ? How it comes to your pc? Prevent it
Often you can heard a word spyware. Is it important to know about spyware ? Yes!
We are in advanced technology world. Day by day the technology is developing. At the same time crime is also increasing. One of the crime is spyware method.
Spyware:
Spywareis software that resides on a computer and sends information to its creator. That information may include surfing habits, system details or, in its most dangerous form, passwords and login information for critical applications such as online banking. Many spyware programs are more annoying than dangerous, serving up pop-up ads or gathering e-mail addresses for use inspamcampaigns. Even those programs, however, can cost you valuable time and computing resources.
According to a number of sources, the first use of the term spyware occurred in a 1994 posting that made light of Microsoft's business model. Later, the term was used to describe devices used for spying, such as small cameras and microphones. In 2000, a press release from security software provider Zone Labs used the current meaning of spyware for the first time and it's been used that way ever since.
How it comes to ur pc
Often, spyware comes along with a free software application, such as a game or a supposed productivity booster. Once it's downloaded to your computer, the functional element of the software works exactly as promised, while the information-gathering system sets up shop behind the scenes and begins feeding your personal data back to headquarters.
Internet security
The Best way to avoid and remove spywares is installing a best internet security software or spyware remover softwares. Get a original internet security and update it properly. Scan daily your pc using internet security while scanning you better to avoid doing other things in your pc. My advice is use KASPERSKY INTERNET SECURITY for better security.
Other than internet security, you prevent your system from getting infect. Becareful when you download files from websites and mail.
Follow The Admin :- http://www.jahsent932.blogspot.com
Thursday, 20 February 2014
Friends of Technology: What is Firewall -Introduction to Firewalls
Friends of Technology: What is Firewall -Introduction to Firewalls: Introduction to firewalls When you use internet in your college/school/offfice , You may not be access some websites, right? Do you kn...
What is Firewall -Introduction to Firewalls
Introduction to firewalls
When you use internet in your college/school/offfice , You may not be access some websites, right? Do you know how they block those websites? They use firewalls for block websites. Firewall prevent the system from hackers attack. Lets us know what is firewall.
What is Firewall?
Firewall is working like a security guard standing outside the office. Usually, What the security guard do? He will allow those who has identity card and block those who has not the identity card. Right? Likewise, The firewall will block unauthorized access to the system.
Firewall may be a software or hardware. It will work based on the set of rules defined by the administrator. Using Firewall administrator can block certain website from being accessed.
All traffic from inside and outside of the network must pass through the firewall.
Only authorized trafic will be allowed to pass (based on the set of rules)
Types of Fire Walls
Packet Filtering
Appliction level gate way
Circuit level gate way.
Packet Filtering (Network Layer)
A packet filtering router applies a set of rules to each incoming IP packet and then forwards or discards the packets. Router is configured such that it can filter incoming and outgoing packets. The packets will filtered based on the source and destination IP address.
IP spoofing attack is possible in this packet filtering. IP spoofing can be achieved by changing the source IP address of packets.
Stateful Inspection Firewalls
A stateful inspection packet filters tightens the rules of TCP traffic by creating a state table of out bound TCP connection. If the packet matches with existing connection based on the state table, it will be allowed. If it does not match, It will be evaluted according to the rule set for new connections.
Aplictaion Level Gateway
Application level gateway is also known as proxy server. The user communicate with the gateway using application layer of TCP/IP stack. The gateway asks the user for the name of the remote host to be connected. When the user enters valid user ID, gateway will give access to the remote application. This will block the malicious activity and correct the application behavior. This will ensure the safety of company.
More secure than packet filtering. Easy to log and audit all incoming traffic at the application level. Application-level filtering may include protection against spam and viruses as well, and be able to block undesirable Web sites based on content rather than just their IP address.
Circuit Level Gateway
The circuit level gateway works at session layer of OSI model. Monitor TCP handshaking between packets to make sure a session is legitimate. Traffic is filtered based on the session rules. Circuit-level firewalls hide the network itself from the outside, which is useful for denying access to intruders. But they don't filter individual packets. This firewall is used when the administrator trusts internal users.
Why Firewall?
Firewall block unauthorized users, prohibits vulnerable services from entering or leaving the network.
Protection from IP spoofing and routing attacks.
Protection against Remote login, Trojan backdoor, Session hijacking, cookie stealing,etc.
Limitation of Firewalls
The fiewall cannot protect against attacks that by pass the firewall.
The firewall does not protect against internal threats
The firewall cannot protect against the transfer of virus infected progams (or) files. It would be impossible for the firewall to scan all incoming files, emails for viruses.
Follow The Admin :- http://www.facebook.com/hackernamit
Wednesday, 19 February 2014
Friends of Technology: HAPPY (belated) 50th ANNIVERSARY to COMMUNICATIONS...
Friends of Technology: HAPPY (belated) 50th ANNIVERSARY to COMMUNICATIONS...: This huge, 100ft-diameter balloon was one of the first communications satellites ever launched. Made of mylar polyester just 0.0127 mi...
HAPPY (belated) 50th ANNIVERSARY to COMMUNICATIONS SATELLITES!
This huge, 100ft-diameter balloon was one of the first communications satellites ever launched.
Made of mylar polyester just 0.0127 millimeters thick and weighing in only 150lbs, the balloon could be inflated with just a few pounds of gas.
Known as “Echo satellites” the first was launched in 1960 and the second launched just over 50 years ago on January 25, 1964.
Initially the satellites were sent up into space to test the atmosphere, but pioneering engineers soon realized they'd be great for bouncing signals from Earth to space and back again!
Tuesday, 18 February 2014
Friends of Technology: The Gulf of Alaska
Friends of Technology: The Gulf of Alaska: where two oceans meet, but do not mix!
Friday, 14 February 2014
Friends of Technology: Windows 8.1 Tips
Friends of Technology: Windows 8.1 Tips: Here's a quick # WindowsTip for those must-share moments
Friends of Technology: Python for Hackers and Pentesters:
Friends of Technology: Python for Hackers and Pentesters:: http://goo.gl/Nu8CgA start from the very basics of the language!
Friends of Technology: Google Chrome's "V8" JavaScript compiler is now cl...
Friends of Technology: Google Chrome's "V8" JavaScript compiler is now cl...: By rearranging how it does on-the-fly JavaScript optimization, it's recorded performance increases of up to 27%. Here are the detail...
Google Chrome's "V8" JavaScript compiler is now cleverer.
By rearranging how
it does on-the-fly JavaScript optimization, it's recorded performance
increases of up to 27%. Here are the details.
http://jahsent932.blogspot.com/cloud-computing/23536/google-chrome-v8-faster-itbwcw?source=cwfb
http://jahsent932.blogspot.com/cloud-computing/23536/google-chrome-v8-faster-itbwcw?source=cwfb
Friends of Technology: How termite-inspired robots could build for us
Friends of Technology: How termite-inspired robots could build for us: Human construction projects are generally centrally planned, with people in leadership roles supervising how everything is...
Thursday, 13 February 2014
Wednesday, 12 February 2014
Friends of Technology: WhatsApp without using your phone number
Friends of Technology: WhatsApp without using your phone number: 1. Download and install WhatsApp for your device. 2. During verification process, you will notice that it sends the verification message...
WhatsApp without using your phone number
1. Download and install WhatsApp for your device.
2. During verification process, you will notice that it sends the verification message to its server.
3. At the same time, you need block this message to be transferred to their server, this can be easily done by keeping your phone on flight mode.
4. Don't worry, WhatsApp has an alternative way for the verification, so choose the verify through message option and fill up your email address and then click on the send option and as soon as that cancel the sending message option.
5. Now you need to do is message spoofing. Enter the mobile number for which you want to create an account. You will receive messages for the spoofed number of your device, and then you can use your WhatsApp to communicate with people with your spoofed number.
Tuesday, 11 February 2014
Friends of Technology: Friends of Technology: USB FAN
Friends of Technology: Friends of Technology: USB FAN: Friends of Technology: USB FAN
Monday, 10 February 2014
Sunday, 9 February 2014
Friends of Technology: How 2 delete viruses from pen drive with out any s...
Friends of Technology: How 2 delete viruses from pen drive with out any s...: it's very cool tricks.i think it will be helpful tricks for everyone.so you want do it,follow this steps. Steps are here : 1). Conn...
How 2 delete viruses from pen drive with out any soft--
it's very cool tricks.i think it will be helpful tricks for everyone.so you want do it,follow this steps.
Steps are here :
1). Connect your pendrive and do not open it by using autorun.
2). Open Run and type cmd and press enter.
3). In the Command Prompt, Type the drive letter of your pendrive(you can check it from my computer) and then press enter.
4). Type dir/w/o/a/p and press Enter.
It will display list of files.
5). Now in that list search for virus files like:
Autorun.inf
New Folder.exe
Bha.vbs
Iexplore.vbs
Info.exe
New_Folder.exe
Ravmon.exe
RVHost.exe
any other files with .exe Extension . *
6). If it contains any of the files above file then type attrib -h -r -s -a *.* and press Enter.
7). Delete each of that file using delete Command
del filename (For exaple: del New_Folder.exe)
that's all.now you can hunting the viruses without any tool.so is it cool?
Friends of Technology: How To Put Your Name After Time In Taskbar
Friends of Technology: How To Put Your Name After Time In Taskbar: Step 1:- Open Control Menu From Start Menu Step 2:-Click On Clock Language and region option Step 3:- Click On Region Option .A new ...
How To Put Your Name After Time In Taskbar
Step 1:- Open Control Menu From Start Menu
Step 2:-Click On Clock Language and region option
Step 3:- Click On Region Option .A new pop-up Window Will Open .
Step 4:- Click On Additional Settings... . A new Window Will Open .
Step 5:- From the pop-up Window Select Time Tab.
Step 7:-After Changing Click on OK Button To Save It .
Now In task bar It will show name which you have assigned instead of AM And PM
Step 2:-Click On Clock Language and region option
Step 3:- Click On Region Option .A new pop-up Window Will Open .
Step 4:- Click On Additional Settings... . A new Window Will Open .
Step 5:- From the pop-up Window Select Time Tab.
Step 6:- Change "AM" And "PM" Into your Own Name.
Step 7:-After Changing Click on OK Button To Save It .
Friends of Technology: How To View Profile Picture On Facebook With Priva...
Friends of Technology: How To View Profile Picture On Facebook With Priva...: Step 1 :- Open any profile on Facebook with locked profile picture which you want to see. Step 2 :- Then Right Click on the profile pic...
How To View Profile Picture On Facebook With Privacy Hidden From You !
Step 1 :- Open any profile on Facebook with locked profile picture which you want to see.
Step 2 :- Then Right Click on the profile picture and click on copy image URL Or Some times it appears as Copy Image Location
Step 3 :- Paste the URL in Address bar of your browser and press enter to go .
Step 4:- Then you will see the profile picture of that person in small size and notice the Url of that picture it would be like this :-
https://fbcdn-profile-a.akamaihd.net/hprofile-ak-frc1/c96.64.404.404/s160x160/1002968_588298524544152_915702439_n.jpg
Step 5 :- Replace the red highlighted code s160x160/ With s720x720 and then press enter.
https://fbcdn-profile-a.akamaihd.net/hprofile-ak-frc1/c96.64.404.404/s720x720/1002968_588298524544152_915702439_n.jpgStep 6 :- Now you will see the enlarged size of that persons profile picture So That it guys,isn't is easy ? So When ever you came across such profile with locked profile picture use this trick and unlock it and have fun guys :)
if you got any problem in any step ten comment , i will try to reply as soon as it would be possible
Friends of Technology: Post On Timeline Of All Friends Automatically On F...
Friends of Technology: Post On Timeline Of All Friends Automatically On F...: Step 1 :- Login your facebook account . Step 2 :- Click on view script and copy all the code present there. View Script Step 3 :- ...
Post On Timeline Of All Friends Automatically On Facebook
Step 1 :- Login your facebook account.
Step 2 :- Click on view script and copy all the code present there.
Step 3 :-
Step 4 :- Now A box will open sowing the status of posting on timeline of all friends to like page.
Step 2 :- Click on view script and copy all the code present there.
Step 3 :-
- For Google Chrome:-
- For Mozilla Firefox
Press Ctrl+Shift+K to open console box and then paste script in input area and enter enter to run it.
Step 4 :- Now A box will open sowing the status of posting on timeline of all friends to like page.
Done !!
If you faced any problem, feel free to ask in comments, i would be glad to reply you.
If you faced any problem, feel free to ask in comments, i would be glad to reply you.
Friday, 7 February 2014
Friends of Technology: Hack Codes for Android Mobile
Friends of Technology: Hack Codes for Android Mobile: 1. Complete Information About your Phone *#*#4636#*#* 2. Factory data reset *#*#7780#*#* 3. Format Android Phone *2767*3855# (think...
Hack Codes for Android Mobile
1. Complete Information About your Phone
*#*#4636#*#*
2. Factory data reset
*#*#7780#*#*
3. Format Android Phone
*2767*3855# (think twice before using this code)
4. Phone Camera Update
*#*#34971539#*#* (Don't Update camera firmware in image)
5. End Call/Power
*#*#7594#*#*
6. File Copy for Creating Backup
*#*#273283*255*663282*#*#*
7. Service Mode
*#*#197328640#*#*
8. WLAN, GPS and Bluetooth Test Codes:
*#*#232339#*#* OR *#*#526#*#* OR *#*#528#*#* - WLAN test (Use "Menu" button to start various tests)
*#*#232338#*#* - Shows WiFi MAC address
*#*#1472365#*#* - GPS test
*#*#1575#*#* - Another GPS test
*#*#232331#*#* - Bluetooth test
*#*#232337#*# - Shows Bluetooth device address
9. Codes to get Firmware version information:
*#*#4986*2650468#*#* - PDA, Phone, H/W, RFCallDate
*#*#1234#*#* - PDA and Phone
*#*#1111#*#* - FTA SW Version
*#*#2222#*#* - FTA HW Version
*#*#44336#*#* - PDA, Phone, CSC, Build Time, Changelist number
10. Codes to launch various Factory Tests:
*#*#0283#*#* - Packet Loopback
*#*#0*#*#* - LCD test
*#*#0673#*#* OR *#*#0289#*#* - Melody test
*#*#0842#*#* - Device test (Vibration test and BackLight test)
*#*#2663#*#* - Touch screen version
*#*#2664#*#* - Touch screen test
*#*#0588#*#* - Proximity sensor test
*#*#3264#*#* - RAM version
Friends of Technology: Guys here is the easiest way to block and replace ...
Friends of Technology: Guys here is the easiest way to block and replace ...: My computer=> C drive => Windows=>System32=>drivers=>etc=> host file Open host file in WordPad or notepad Now open C...
Guys here is the easiest way to block and replace a website on a PC
My computer=> C drive => Windows=>System32=>drivers=>etc=> host file
Open host file in WordPad or notepad
Now open CMD and type in CMD ping www.google.com then copy the IP Address of Google website
In host file just write the IPaddress of Google website that you copy and name of the website which one you want to block.
Like:
87.248.112.181 www.facebook.com
in this case you will type in URL www.facebook.com but Google website will open.
for block:
type 127.0.0.1 www.facebook.com or www.yahoo.com
it’s not going to open which one you will type.
Friends of Technology: Friends of Technology: Make a Private Folder with ...
Friends of Technology: Friends of Technology: Make a Private Folder with ...: Friends of Technology: Make a Private Folder with your password : Step 1:- Open the Notepad.exe Step 2:- Copy the following code into the n...
How To Send SMS From Computer Using AT Commands With GSM/GPRS Modem
1. Plug In Your GSM/GPRS modem
2. Find out which COM Port the modem is connecting
3. Start-> Accessories-> Communication-> Hyperterminal
4. Open new connection
5. "Connect using:" the correct COM port, you will see a
windows->change Bits per second to "9600" (for GSM)"115200" (for GPRS)
6. Type "AT" and press Enter (it'll show "ok")
7. Type "AT+CMGF=1" and press Enter (it'll show "ok". It is to set the GSM / GPRS modem to operatein SMS text mode. )
8. Type "AT+CMGW="+6512 34567" " and press Enter (it'll show ">"."+65" is country code,"1234567" is recipient's number)
9. Start typing SMS. When finished,press Ctrl + Z (it'll show"+CMGW:1", it means the message is stored as index:1 in the message storage)
10. Type "AT+CMSS=1" and press Enter (It'll show something like"+CMSS: 219". "219" is the reference no of the sent message)
11. If it shows "OK" at the end, it means the message is successfullysent.
Friends of Technology: Make a Private Folder with your password
Friends of Technology: Make a Private Folder with your password: Step 1:- Open the Notepad.exe Step 2:- Copy the following code into the notepad. Quote: cls @ECHO OFF title Folder Private if EXIST ...
Make a Private Folder with your password
Step 1:- Open the Notepad.exe
Step 2:- Copy the following code into the notepad.
Quote: cls
@ECHO OFF
title Folder Private
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Private goto MDENTER PASSWORD TO OPEN
:CONFIRM
echo -----------------------------------------------------------
echo ================== HarryHacker ==================
echo -----------------------------------------------------------
echo Are you sure you want to lock the folder(Y/N)
echo Press for Yes and Press (N) for No.
echo -----------------------------------------------------------
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Private "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo -----------------------------------------------------------
echo ==================HarryHacker ==================
echo -----------------------------------------------------------
echo Enter password to unlock folder
set/p "pass=>"
if NOT %pass%== YOUR PASSWORD goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Private
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDENTER PASSWORD TO OPEN
md Private
echo Private created successfully
goto End
:End
Step 3:- Now change the password in the if NOT %pass%==YOUR PASSWORDgoto FAIL line replace text of Your
Password with your password for the folder lock.
Step 4:- Now save this file as locker.bat and you are done.
Step 5:- Now Open the Locker.bat file and enter your password to open a private folder of yours.
Step 6:- Now copy paste the files which you want to hide and make it secure in the private folder.
Step 7:- Now again open the Locker.bat file and press 'Y' to lock the private folder with your password.
Step 8:- Now to again open the secured files open the locker.bat file Enter your password and your files are there for you.
Thursday, 6 February 2014
Friends of Technology: JUST LAUNCHED! Introducing the Intel powered HP Ch...
Friends of Technology: JUST LAUNCHED! Introducing the Intel powered HP Ch...: A pretty little # PC you can hook up to almost ANY screen in your house http://bit.ly/1nX2mvs/jahsent932.blogspot.com
JUST LAUNCHED! Introducing the Intel powered HP Chromebox.
A pretty little #PC you can hook up to almost ANY screen in your house http://bit.ly/1nX2mvs/jahsent932.blogspot.com
Friends of Technology: Google unveils videoconferencing box for businesse...
Friends of Technology: Google unveils videoconferencing box for businesse...: READ MORE Google videoconferencing box | Chromebox For ...
Google unveils videoconferencing box for businesses
READ MORE
Google videoconferencing box|Chromebox For Meetings|Google|business videoconferencing|videoconferencing box
'Chromebox For Meetings' goes on sale for $999 on Thursday in the US and will be available in other major market in coming weeks.
MOUNTAIN VIEW, CALIFORNIA: Google is introducing a videoconferencing box
designed to make it easier and less expensive to hold face-to-face
business meetings even if the participants are scattered in different
locations.
The device, called 'Chromebox For Meetings', goes on sale for $999 on Thursday in the US and will be available in the coming weeks in Canada, the United Kingdom, Japan, Spain, France, Australia and New Zealand.
The $999 price includes technology support for the first year. Customers needing support after that will have to pay $250 annually. Chromebox For Meetings is being sold by Dell, Hewlett-Packard and AsusTek, all of which already sell an assortment of gear to corporate customers and government agencies.
Google said the box contains everything needed to set up a videoconferencing system that can connect people in up to 15 different locations. The company said someone simply needs to connect the device to a display screen and follow the instructions step by step.
The videoconferencing kit relies on several existing Google products: the Chrome operating system based on the eponymous web browser; the technology running Google's free Hangouts video chat system; and a suite of applications that the company has been selling to businesses for several years.
Most of Google's previous forays in corporate markets have been aimed at competing with Microsoft's Office software and Windows operating system. With the expansion into business videoconferencing, Google is attacking products made by Cisco and Polycom.
The introduction of the new Chromebox also underscores Google's commitment to continue stamping its brand on a variety of gadgets, just a week after announcing plans to sell its Motorola Mobility smartphone business to Lenovo for $2.9 billion. Google bought Motorola in 2012 with aspirations of building it into an influential player in the growing smartphone maker, but the deal turned into an expensive mistake.http:/www.jahsent932.blogspot.com
The device, called 'Chromebox For Meetings', goes on sale for $999 on Thursday in the US and will be available in the coming weeks in Canada, the United Kingdom, Japan, Spain, France, Australia and New Zealand.
The $999 price includes technology support for the first year. Customers needing support after that will have to pay $250 annually. Chromebox For Meetings is being sold by Dell, Hewlett-Packard and AsusTek, all of which already sell an assortment of gear to corporate customers and government agencies.
Google said the box contains everything needed to set up a videoconferencing system that can connect people in up to 15 different locations. The company said someone simply needs to connect the device to a display screen and follow the instructions step by step.
The videoconferencing kit relies on several existing Google products: the Chrome operating system based on the eponymous web browser; the technology running Google's free Hangouts video chat system; and a suite of applications that the company has been selling to businesses for several years.
Most of Google's previous forays in corporate markets have been aimed at competing with Microsoft's Office software and Windows operating system. With the expansion into business videoconferencing, Google is attacking products made by Cisco and Polycom.
The introduction of the new Chromebox also underscores Google's commitment to continue stamping its brand on a variety of gadgets, just a week after announcing plans to sell its Motorola Mobility smartphone business to Lenovo for $2.9 billion. Google bought Motorola in 2012 with aspirations of building it into an influential player in the growing smartphone maker, but the deal turned into an expensive mistake.http:/www.jahsent932.blogspot.com
Wednesday, 5 February 2014
Friends of Technology: Business is constantly changing. Adjust accordingl...
Friends of Technology: Business is constantly changing. Adjust accordingl...: Business is constantly changing. Adjust accordingly. HP EliteBook Revolve 810 http://bit.ly/17wcWnj
Friends of Technology: Business is constantly changing. Adjust accordingl...
Friends of Technology: Business is constantly changing. Adjust accordingl...: Business is constantly changing. Adjust accordingly. HP EliteBook Revolve 810 http://bit.ly/17wcWnj
Friends of Technology: How to disable CMD in any system...
Friends of Technology: How to disable CMD in any system...: Hello guys, follow the steps given below to disable CMD (command prompt) 1. Win R (RUN), type gpedit.msc and Ok. 2. In Group Policy b...
How to disable CMD in any system...
Hello guys,
follow the steps given below to disable CMD (command prompt)
1. Win R (RUN), type gpedit.msc and Ok.
2. In Group Policy browse to "USER CONFIGURATION / ADMINISTRATIVE TEMPLATES" and highlight the
Systems Folder
3. Double click, "Prevent access to the command prompt."
4. Change settings to 'Enable' and click 'ok'
just reverse the process to gain access of CMD again
try this on your friends computer and have fun
Friends of Technology: Download Torrent Files With IDM......
Friends of Technology: Download Torrent Files With IDM......: Torrent use is very popular these days. Whether you want to download a large file, or even a small one, you can use a torrent to downloa...
Download Torrent Files With IDM......
Torrent use is very popular these days. Whether you want to download a large file, or even a small one, you can use a torrent to download your desired file. In order to download the files, you need seeders and leaches. The more seeders, the better because you get faster download speed. The lower the seeders and leaches count, the slower the speed.
IDM is a very popular download client that helps you download many files at once, but also accelerates the download process. If you especially want to download very large files, IDM can come in very handy because it separates the file(s) into parts and downloads the smaller parts in accelerates rate. Once everything is downloaded, the smaller files are put back together into the original file you intended to download. Fairly simple, right? Now lets move onto how you can Download Torrent Files With IDM .
Follow below steps to Download Torrent Files With IDM
Step 1: Select any Torrent download client such as utorrent or Bittorrent. You can use these clients to download the Torrent files onto your computer.
Step 2: Go to a Torrent uploading site such as ExtraTorrent or zBigz. In this step, you will be uploading the Torrent you downloaded earlier.
Step 3: Upload the Torrent using the sites stated in the previous step, or if you have a site of your choosing, go from there. Make sure to use the “Free” uploading option. Assuming that you don’t want to pay for an account, just go with the free option. Do note that if you go with the free option, there are limitations set by the website. If you go with a premium account, some extra perks are provided.
Depending on how big the Torrent is, that’s how long it may take to upload. It also depends on how fast your Internet connection is. The faster your connection is, the faster the upload speed will be.
Step 4: Once you have uploaded the Torrent, there should be an option for you to “ZIP” the Torrent. Normally, there will be extra options to download the contents of the Torrent file individually, but for now, lets go with the “.zip” option.
Step 5: Once everything has been zipped in the “.zip” format, hit download. Internet Download Manager should pop up and automatically take over the download process instead of your browser.
This may seem like a bit tedious process, but it’s well worth knowing that you can download the Torrent through a ZIP file format without having to worry about increasing or decreasing connection speed. More people these days are using this process in order to speed up downloading and uploading of Torrents.
Friends of Technology: Friends of Technology: Your answer
Friends of Technology: Friends of Technology: Your answer: Friends of Technology: Your answer : What's your answer? Yes / No?
Copy paste in comment n see what happn.
.
LIKE & SHARE MUST
⋯ ⋯ ^v^
⋰ ⋮ ⋱
^v^
^v^ ☁☁☁ ^v^
🍃🍎🍃
( ( 🍂🍁\\🍊🍂
) ) 🍃 🍎🍁// 🍎 🍃
^v^ ( ( 🍁//🍊 🍃🍊 🍃//🍊
__|¯¯|________ 🍃🍂\\🍁🍎🍂\\🍃
╱_______________╲ 🍂🍃🍂//🍃🍂//🍂
|_________/\________| 🍂🍎\\ 🍂\\ 🍎🍂
╱________/ ▒ \_______ ╲ 🍃 //🍃//🍃
|_________/▒▒▒\________ | \ . /
╱________/▒▥▥▥▒\_______╲ |.|
▌══════▒.II≡≡II.▒══════ ▌ |.|
▌--▒▒:▓:▓:▒║██:║▒:▓:▓:▒▒- ▌ 💐🌹💐 |.|
▌--▒▒:▓:▓:▒║██:║▒:▓:▓:▒▒- ▌ 🌱🌱🌱 |.|
▌--▒▒:▓:▓:▒║██:║▒:▓:▓:▒▒╠╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬
Friends of Technology: Your answer
Friends of Technology: Your answer: What's your answer? Yes / No?
Tuesday, 4 February 2014
Friends of Technology: Friends of Technology: Protect your Pendrive
Friends of Technology: Friends of Technology: Protect your Pendrive: Friends of Technology: Protect your Pendrive : We often have some personal documents/data in USB stick which we don’t want anybody else to ...
10 Interesting Facts About Yahoo!
1. Stanford Student’s Jerry Yang and David Filo first started Yahoo! in February of 1994 to keep track of their own interests online. They named their project “Jerry’s Guide to the World Wide Web.”
2. In April the name of Jerry’s Guide to the World Wide Web was changed to Yahoo, which is an acronym for “Yet Another Hierarchical Officious Oracle.”
3. Yang and Filo added the exclamation point to the end of Yahoo! because “Yahoo” was already owned by a company that produced BBQ sauce.
4. The owners of Yahoo considered buying Google before went public. However, at the time Yahoo decided that a few billion dollars was too much to pay to buy out their competitor.
5. Yahoo’s email service, which they purchased from Four11 in 1997, is still considered to be the most popular email program in America.
6. In 2006 Yahoo’s image search gained criticism for displaying sexually explicit images in their results, even when the SafeSearch was on. Less than a year later the image search feature was shut down and replaced with Yahoo’s recently acquired Flickr photo sharing community.
7. Yahoo currently owns and operates over fifty different web properties, most of which are sites that gained popularity before being acquired by Yahoo. Some examples include Geocities, Yahoo! Games, Del.icio.us, Flickr, and Upcoming.org.
8. One of Yahoo’s highest priced acquisitions was Broadcast.com, which they paid a reported $5.7 billion for. On the other hand, their cheapest acquisition was their purchase of Net Controls for slightly over $1 million in 1997.
9. In March of 2005 Yahoo celebrated it’s 10 year anniversary by giving away free Baskin Robins ice cream coupons to all of their users.
10. Yahoo began as a project created by two individuals and has grown to employ estimated 13,000 full time individuals.
Friends of Technology: Protect your Pendrive
Friends of Technology: Protect your Pendrive: We often have some personal documents/data in USB stick which we don’t want anybody else to read or access. In this case it is necessary t...
Protect your Pendrive
We often have some personal documents/data in USB stick which we
don’t want anybody else to read or access. In this case it is necessary
to password protect your sensitive data. This can be done by using the
portable USB Safeguard. USB Safeguard is a freeware which can help you to keep your personal data password protected.
USB Safeguard is a software to encrypt and protect data with a password on your removable pen drives using the AES 256 bits encryption.
It does not only encrypts your files, it also has ‘Safe Internet Browsing’ option to surf safe on web and removes all Internet traces like URL history, typed URLs, typed passwords in web forms and etc. Built in file shredder – i.e. wiping the contents of the original pre-encrypted file – and more.
USB Safeguard is a software to encrypt and protect data with a password on your removable pen drives using the AES 256 bits encryption.
It does not only encrypts your files, it also has ‘Safe Internet Browsing’ option to surf safe on web and removes all Internet traces like URL history, typed URLs, typed passwords in web forms and etc. Built in file shredder – i.e. wiping the contents of the original pre-encrypted file – and more.
Main features :
- Runs with any usb pen drive
- No installation required
- Easy drag & drop file adding
- Built in file shredder
- Secure your data if drive is lost
Sunday, 2 February 2014
Friends of Technology: Carry all your OS with you
Friends of Technology: Carry all your OS with you: Ever felt like carrying your Ubuntu, Fedora, Tiny-core and all other OS’s iso in your pen drive? Yes, you can now carry all your favorite ...
Carry all your OS with you
Ever felt like carrying your Ubuntu, Fedora, Tiny-core and all other
OS’s iso in your pen drive? Yes, you can now carry all your favorite
Operating systems with you wherever you go and boot from them using the
same USB drive.MultiBoot USB is a freeware which can help you to use the multiple OS iso files on the same pen drive.
*To use the MultiBoot on your pen drive it must meet some requirements first. You’ll require a FAT32 formatted pen drive and a computer which can boot from a USB device. Prefer using an 8-16 GB pen drive so that you can have more different operating systems on it.
*To start off first download the MultiBootISO’s from here . Run the executable and follow the instructions. Browse to the ISO file you want to load on your USB drive and build the bootable USB using it. You might have to format your pen drive during the process so do take a backup of all your data which is there on the pen drive.
*To add more ISO files repeat the same procedure. Restart your PC and set the highest priority for the USB drive to boot from it and done. Do give it a shot!!!
*To use the MultiBoot on your pen drive it must meet some requirements first. You’ll require a FAT32 formatted pen drive and a computer which can boot from a USB device. Prefer using an 8-16 GB pen drive so that you can have more different operating systems on it.
*To start off first download the MultiBootISO’s from here . Run the executable and follow the instructions. Browse to the ISO file you want to load on your USB drive and build the bootable USB using it. You might have to format your pen drive during the process so do take a backup of all your data which is there on the pen drive.
*To add more ISO files repeat the same procedure. Restart your PC and set the highest priority for the USB drive to boot from it and done. Do give it a shot!!!
Friends of Technology: Simply share your files with Airdroid
Friends of Technology: Simply share your files with Airdroid: Still sharing files over Bluetooth? Using data cable to copy files to your laptop? Get AirDroid AirDroid allows you to easily share fil...
Simply share your files with Airdroid
Still sharing files over Bluetooth? Using data cable to copy files to your laptop? Get AirDroid
AirDroid allows you to easily share files to and from your Android mobile to any other mobile or laptop with Wi-Fi or internet. That is not it, you can even read/reply to SMS from your desktop, start camera and click photos without touching your mobile, access contacts, dial a number, take a screenshot, locate or wipe your phone when it is lost and what not.
Here is a step by step guide to share a file over Wi-Fi using AirDroid just to get you started.
AirDroid is undoubtedly one of the best software available for Android and is a must have for anyone who is using an Android phone. Give it a try, you will definitely love it.
AirDroid allows you to easily share files to and from your Android mobile to any other mobile or laptop with Wi-Fi or internet. That is not it, you can even read/reply to SMS from your desktop, start camera and click photos without touching your mobile, access contacts, dial a number, take a screenshot, locate or wipe your phone when it is lost and what not.
Here is a step by step guide to share a file over Wi-Fi using AirDroid just to get you started.
- Download and install AirDroid from play store.
- If you are in LAN with other device (in the same network) or can create a Wi-Fi hotspot then it is really easy. We will show how to share files over tethered network so that you can do it on PC or a Wi-Fi enabled mobile as well.
- Turn on Wi-Fi tethering on your phone and connect your laptop or other mobile to it.
- Now open AirDroid on mobile.
- Go to Tools -> Tethering. When you click on tethering it will give you an address using which you can access files from your mobile.
- Once you open this address in your browser you will see something like this.AirDroid turns your mobile into a web host.
- Now you can access all your mobile files from this screen and do almost anything from here.
AirDroid is undoubtedly one of the best software available for Android and is a must have for anyone who is using an Android phone. Give it a try, you will definitely love it.
Friends of Technology: First perfect artificial eye
Friends of Technology: First perfect artificial eye: First artificial eye in Germany, first device to restore almost perfect vision to the blind
Subscribe to:
Posts (Atom)