Monday, 24 February 2014

Friends of Technology: The reason behind whatsapp outage on saturday

Friends of Technology: The reason behind whatsapp outage on saturday: Whatsapp founder Jan Koum has issued an apology and blamed a network router for Saturday's outage of the mobile messaging app. &quot...

The reason behind whatsapp outage on saturday

Whatsapp founder Jan Koum has issued an apology and blamed a network router for Saturday's outage of the mobile messaging app.
"We are sorry about the downtime," wrote Koum. "It has been our longest and biggest outage in years. It was caused by a network router fault which cascaded into our servers."
"We worked with our service provider on resolving the issue and making sure it will not happen again."
WhatsApp was down for more than three hours on Saturday just days after Facebook bought it for $19 billion.
The five-year old company currently has about 450 million users worldwide and is the leading smartphone-based messaging app.

Saturday, 22 February 2014

Friends of Technology: **How To Remove New Folder Virus**

Friends of Technology: **How To Remove New Folder Virus**: How to fix Newfolder.exe manually? (For advanced users only) This problem can be solved manually by deleting all registry keys and file...

Friends of Technology: Get back Deleted # Whatsapp Messages-Manually

Friends of Technology: Get back Deleted # Whatsapp Messages-Manually: Step 1) First of all Navigate to the Whatsapp database folder, you will require file explorer for this task. the path is > sdcard/Wha...

Get back Deleted # Whatsapp Messages-Manually


Step 1) First of all Navigate to the
Whatsapp database folder, you will
require file explorer for this task.
the path is > sdcard/WhatsApp/
Databases.
Step 2) In the Database folder you
will see Chat files which are with
names similar like msgstore-2014-0
1-04.1.db.crypt. You may notices the
file names have dates as well. but
there is a File which is
msgstore.db.crypt, we need to
rename it. you can add any word
before msgstore.db.crypt.
Step 3) After renaming that file,
From the other Files just select the
file which shows appropriate date
before you accidently deleted your
whatsapp messages, and then
rename that file to msgstore.db.cry
pt. This Renaming process can also
be done on your PC by Connecting
your device.
Step 4) Now the Final step, Goto
Setting>Applications>manage
applications>Whatsapp and Click on
Clear Data. Now open Whatsapp,
Choose Restore when it prompts.
Thats it, the chat file saved as
msgstore.db.crypt will be restored
and hence your messages too.

**How To Remove New Folder Virus**


How to fix Newfolder.exe manually?
(For advanced users only)
This problem can be solved
manually by deleting all registry keys
and files connected with this
software, removing it from starup list
and unregistering all corresponding
DLLs. Additionally missing
DLL's should be restored from
distribution in case they are
corrupted by Iddono. To fix this
threat, you should:
1. Kill the following processes and
delete the appropriate files:
* libedit.dll
* newfolder.exe
* shelliddono.dll
* srv0104.ids
* srvidd20.exe
2. Delete the following malicious
registry entries and\or values:
* Key: SOFTWARE\Microsoft\Windows
\CurrentVersion\Run for nwiz.exe
Value: @
* Key: software\microsoft\windows
\currentversion\run\alchem Value: @
* Key: software\microsoft\windows
\currentversion\run\zzb Value: @

Friends of Technology: How to "Delete administrator Password" without any...

Friends of Technology: How to "Delete administrator Password" without any...: Method 1 Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive. Now when you boot u...

How to "Delete administrator Password" without any software


Method 1

Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive. Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT kind.

Method 2

Step 1. Put your hard disk of your computer in any other pc .
Step 2. Boot that computer and use your hard disk as a secondary hard disk (D'nt boot as primary hard disk ).
Step 3. Then open that drive in which the victim’s window(or your window) is installed.
Step 4. Go to location windows->system32->config
Step 5. And delete SAM.exe and SAM.log
Step 6. Now remove hard disk and put in your computer.
Step 7. And boot your computer

Friday, 21 February 2014

Friends of Technology: What is spyware ? How it comes to your pc? Prevent...

Friends of Technology: What is spyware ? How it comes to your pc? Prevent...: Often you can heard a word spyware. Is it important to know about spyware ? Yes! We are in advanced technology world. Day by day the t...

What is spyware ? How it comes to your pc? Prevent it


Often you can heard a word spyware. Is it important to know about spyware ? Yes!

We are in advanced technology world. Day by day the technology is developing. At the same time crime is also increasing. One of the crime is spyware method.

Spyware:

Spywareis software that resides on a computer and sends information to its creator. That information may include surfing habits, system details or, in its most dangerous form, passwords and login information for critical applications such as online banking. Many spyware programs are more annoying than dangerous, serving up pop-up ads or gathering e-mail addresses for use inspamcampaigns. Even those programs, however, can cost you valuable time and computing resources.

According to a number of sources, the first use of the term spyware occurred in a 1994 posting that made light of Microsoft's business model. Later, the term was used to describe devices used for spying, such as small cameras and microphones. In 2000, a press release from security software provider Zone Labs used the current meaning of spyware for the first time and it's been used that way ever since.

How it comes to ur pc

Often, spyware comes along with a free software application, such as a game or a supposed productivity booster. Once it's downloaded to your computer, the functional element of the software works exactly as promised, while the information-gathering system sets up shop behind the scenes and begins feeding your personal data back to headquarters.

Internet security

The Best way to avoid and remove spywares is installing a best internet security software or spyware remover softwares. Get a original internet security and update it properly. Scan daily your pc using internet security while scanning you better to avoid doing other things in your pc. My advice is use KASPERSKY INTERNET SECURITY for better security.

Other than internet security, you prevent your system from getting infect. Becareful when you download files from websites and mail.

Follow The Admin :- http://www.jahsent932.blogspot.com

Thursday, 20 February 2014

Friends of Technology: What is Firewall -Introduction to Firewalls

Friends of Technology: What is Firewall -Introduction to Firewalls: Introduction to firewalls When you use internet in your college/school/offfice , You may not be access some websites, right? Do you kn...

What is Firewall -Introduction to Firewalls


Introduction to firewalls

When you use internet in your college/school/offfice , You may not be access some websites, right? Do you know how they block those websites? They use firewalls for block websites. Firewall prevent the system from hackers attack. Lets us know what is firewall.

What is Firewall?

Firewall is working like a security guard standing outside the office. Usually, What the security guard do? He will allow those who has identity card and block those who has not the identity card. Right? Likewise, The firewall will block unauthorized access to the system.

Firewall may be a software or hardware. It will work based on the set of rules defined by the administrator. Using Firewall administrator can block certain website from being accessed.

All traffic from inside and outside of the network must pass through the firewall.

Only authorized trafic will be allowed to pass (based on the set of rules)

Types of Fire Walls

Packet Filtering

Appliction level gate way

Circuit level gate way.

Packet Filtering (Network Layer)

A packet filtering router applies a set of rules to each incoming IP packet and then forwards or discards the packets. Router is configured such that it can filter incoming and outgoing packets. The packets will filtered based on the source and destination IP address.

IP spoofing attack is possible in this packet filtering. IP spoofing can be achieved by changing the source IP address of packets.

Stateful Inspection Firewalls

A stateful inspection packet filters tightens the rules of TCP traffic by creating a state table of out bound TCP connection. If the packet matches with existing connection based on the state table, it will be allowed. If it does not match, It will be evaluted according to the rule set for new connections.

Aplictaion Level Gateway

Application level gateway is also known as proxy server. The user communicate with the gateway using application layer of TCP/IP stack. The gateway asks the user for the name of the remote host to be connected. When the user enters valid user ID, gateway will give access to the remote application. This will block the malicious activity and correct the application behavior. This will ensure the safety of company.

More secure than packet filtering. Easy to log and audit all incoming traffic at the application level. Application-level filtering may include protection against spam and viruses as well, and be able to block undesirable Web sites based on content rather than just their IP address.

Circuit Level Gateway

The circuit level gateway works at session layer of OSI model. Monitor TCP handshaking between packets to make sure a session is legitimate. Traffic is filtered based on the session rules. Circuit-level firewalls hide the network itself from the outside, which is useful for denying access to intruders. But they don't filter individual packets. This firewall is used when the administrator trusts internal users.

Why Firewall?

Firewall block unauthorized users, prohibits vulnerable services from entering or leaving the network.

Protection from IP spoofing and routing attacks.

Protection against Remote login, Trojan backdoor, Session hijacking, cookie stealing,etc.

Limitation of Firewalls

The fiewall cannot protect against attacks that by pass the firewall.

The firewall does not protect against internal threats

The firewall cannot protect against the transfer of virus infected progams (or) files. It would be impossible for the firewall to scan all incoming files, emails for viruses.

Follow The Admin :- http://www.facebook.com/hackernamit

Wednesday, 19 February 2014

Friends of Technology: HAPPY (belated) 50th ANNIVERSARY to COMMUNICATIONS...

Friends of Technology: HAPPY (belated) 50th ANNIVERSARY to COMMUNICATIONS...: This huge, 100ft-diameter balloon was one of the first communications satellites ever launched. Made of mylar polyester just 0.0127 mi...

HAPPY (belated) 50th ANNIVERSARY to COMMUNICATIONS SATELLITES!


This huge, 100ft-diameter balloon was one of the first communications satellites ever launched.

Made of mylar polyester just 0.0127 millimeters thick and weighing in only 150lbs, the balloon could be inflated with just a few pounds of gas.

Known as “Echo satellites” the first was launched in 1960 and the second launched just over 50 years ago on January 25, 1964.

Initially the satellites were sent up into space to test the atmosphere, but pioneering engineers soon realized they'd be great for bouncing signals from Earth to space and back again!

The Gulf of Alaska

 where two oceans meet, but do not
mix!

Friday, 14 February 2014

Windows 8.1 Tips

Here's a quick ‪#‎WindowsTip‬ for those must-share moments

Friends of Technology: Google Chrome's "V8" JavaScript compiler is now cl...

Friends of Technology: Google Chrome's "V8" JavaScript compiler is now cl...:  By rearranging how it does on-the-fly JavaScript optimization, it's recorded performance increases of up to 27%. Here are the detail...

Google Chrome's "V8" JavaScript compiler is now cleverer.

 By rearranging how it does on-the-fly JavaScript optimization, it's recorded performance increases of up to 27%. Here are the details.

http://jahsent932.blogspot.com/cloud-computing/23536/google-chrome-v8-faster-itbwcw?source=cwfb

Friends of Technology: How termite-inspired robots could build for us

Friends of Technology: How termite-inspired robots could build for us:  Human construction projects are generally centrally planned, with people in leadership roles supervising how everything is...

How termite-inspired robots could build for us



 Human construction projects are generally centrally planned, with people in leadership roles supervising how everything is put together, and builders aware of the overall progress.
But termites and other animals go about building in a different way, working independently. Each termite reacts directly to what it encounters, rather than having a preconceived notion of what to do. Collectively, the insects can create a mound much larger than themselves.
"They do all of their coordination indirectly, by changing their shared environment," says Justin Werfel of the Wyss Institute for Biologically Inspired Engineering at Harvard University.
Werfel and colleagues used this model of decentralized, reactive building to create robots operating under those principles. Robots that behave this way could be useful for construction projects that would be too dangerous for humans, such as underwater research stations or in outer space. Another possible application would be building levees out of sandbags in flood zones, Werfel said.
 
"If you had a robot system to handle that kind of building automatically, that would let you keep people out of harm's way," Werfel said.
The findings are published in the journal Science and presented at the American Association for the Advancement of Science meeting this week.
These robots are small -- 4.7 inches high, with a footprint of about 4 x 7 inches. The "bricks" that they can manipulate, made of expanded urethane foam, are bigger than these critters: 8.5 x 8.5 x 2 inches.
Researchers created algorithms governing the behavior of the robots, so that they know what to do when they encounter specific situations. It's not the blueprint that guides the robots, but rather these predefined simple rules.
The construction begins with a single "seed" brick in a particular location.
The robots can move forward, backward and turn in place. They were designed to be able to climb up or down a step that is the height of one brick and build staircases with the bricks to get themselves higher up.
Importantly, these robots only detect bricks and other robots that are in their immediate area; they have no idea how far along the overall structure is or what more distant robots are doing.
"Robots obtain information about where bricks have been attached only through direct inspection," researchers wrote.
The design of the robots in this research wasn't intended to be "cute," although they may appear that way -- some researchers call them "frog-bots" or "squirrel-bots," said Kirsten Peterson, a co-author on the study. They have rounded features for the sake of simplicity and using less material.
The robots have four types of sensors, Peterson said. A pattern-recognition system, composed of seven infrared sensors, can detect black and white patterns on the bricks and helps with navigation.
In addition to tactile sensing, the robots have a pattern recognition system, an accelerometer to sense tilt, and five ultrasound sonar units to detect other robots and help maintain distance from the perimeter of the structure.
To move around, the robots have wheel-legs called "whegs."
This study did not optimize the robots for speed. It took three robots half an hour to build a "trident" structure with eight blocks, Peterson said.
A decentralized system of robots has some advantages over a centrally planned method of building. If individuals perish, the plan doesn't fall apart, because it doesn't depend on how many builders there are.
When everything is planned out, you'd have to go back to the drawing board if some of the robot builders bit the dust. But a decentralized system readily adapts to the loss of participants, Werfel said, just like what happens in nature with termites.
"If half the colony gets eaten by an aardvark, the rest can carry on," he said.
There are still some engineering challenges that would need to be solved to ramp this up to large-scale projects on Earth, the study said, but Werfel said it's conceivable that designing robot systems such as these for disaster zones would in the realm of years away, Werfel said.
For more extreme environments such as other planets, scaling these kinds of robots up to the task might take decades, Werfel said. But conceivably the principle of this study could be applied to send robots to build a base on Mars.
If they build it, maybe we will come.
Scientists designed these robots to react their immediate environment.

Wednesday, 12 February 2014

Friends of Technology: WhatsApp without using your phone number

Friends of Technology: WhatsApp without using your phone number: 1. Download and install WhatsApp for your device. 2. During verification process, you will notice that it sends the verification message...

WhatsApp without using your phone number



1. Download and install WhatsApp for your device.

2. During verification process, you will notice that it sends the verification message to its server.

3. At the same time, you need block this message to be transferred to their server, this can be easily done by keeping your phone on flight mode.

4. Don't worry, WhatsApp has an alternative way for the verification, so choose the verify through message option and fill up your email address and then click on the send option and as soon as that cancel the sending message option.

5. Now you need to do is message spoofing. Enter the mobile number for which you want to create an account. You will receive messages for the spoofed number of your device, and then you can use your WhatsApp to communicate with people with your spoofed number.

Sunday, 9 February 2014

Friends of Technology: How 2 delete viruses from pen drive with out any s...

Friends of Technology: How 2 delete viruses from pen drive with out any s...: it's very cool tricks.i think it will be helpful tricks for everyone.so you want do it,follow this steps. Steps are here : 1). Conn...

How 2 delete viruses from pen drive with out any soft--


it's very cool tricks.i think it will be helpful tricks for everyone.so you want do it,follow this steps.

Steps are here :

1). Connect your pendrive and do not open it by using autorun.

2). Open Run and type cmd and press enter.

3). In the Command Prompt, Type the drive letter of your pendrive(you can check it from my computer) and then press enter.

4). Type dir/w/o/a/p and press Enter.
It will display list of files.

5). Now in that list search for virus files like:

Autorun.inf

New Folder.exe

Bha.vbs

Iexplore.vbs

Info.exe

New_Folder.exe

Ravmon.exe

RVHost.exe

any other files with .exe Extension . *

6). If it contains any of the files above file then type attrib -h -r -s -a *.* and press Enter.

7). Delete each of that file using delete Command
del filename (For exaple: del New_Folder.exe)

that's all.now you can hunting the viruses without any tool.so is it cool?

Friends of Technology: How To Put Your Name After Time In Taskbar

Friends of Technology: How To Put Your Name After Time In Taskbar: Step 1:- Open Control Menu From Start Menu Step 2:-Click On Clock Language and region option Step 3:-  Click On Region Option .A new ...

How To Put Your Name After Time In Taskbar

Step 1:- Open Control Menu From Start Menu

Step 2:-Click On Clock Language and region option
Step 3:-  Click On Region Option .A new pop-up Window Will Open .
Step 4:- Click On Additional Settings... . A new Window Will Open .
Step 5:- From the pop-up Window  Select Time Tab.

Step 6:- Change "AM" And "PM" Into your Own Name.



Step 7:-After Changing Click on OK Button To Save It .
Now In task bar It will show name which you have assigned instead of AM And PM

Friends of Technology: How To View Profile Picture On Facebook With Priva...

Friends of Technology: How To View Profile Picture On Facebook With Priva...: Step 1 :- Open any profile on Facebook with locked profile picture which you want to see. Step 2 :- Then Right Click on the profile pic...

How To View Profile Picture On Facebook With Privacy Hidden From You !

Step 1 :- Open any profile on Facebook with locked profile picture which you want to see.
Step 2 :- Then Right Click on the profile picture and click on copy image URL Or Some times it appears as Copy Image Location 
Step 3 :- Paste the URL in Address bar of your browser and press enter to go .
Step 4:- Then you will see the profile picture of that person in small size and notice the Url of that picture it would be like this :-
https://fbcdn-profile-a.akamaihd.net/hprofile-ak-frc1/c96.64.404.404/s160x160/1002968_588298524544152_915702439_n.jpg
Step 5 :- Replace the red highlighted code s160x160/ With s720x720 and then press enter.
https://fbcdn-profile-a.akamaihd.net/hprofile-ak-frc1/c96.64.404.404/s720x720/1002968_588298524544152_915702439_n.jpg
Step 6 :- Now you will see the enlarged size of that persons profile picture So That it guys,isn't is easy ? So When ever you came across such profile with locked profile picture use this trick and unlock it and have fun guys :) 
if you got any problem in any step ten comment , i will try to reply as soon as it would be possible

Friends of Technology: Post On Timeline Of All Friends Automatically On F...

Friends of Technology: Post On Timeline Of All Friends Automatically On F...: Step 1 :- Login your facebook account . Step 2 :- Click on view script and copy all the code present there. View Script Step 3 :- ...

Post On Timeline Of All Friends Automatically On Facebook

Step 1 :- Login your facebook account.
Step 2 :-
Click on view script and copy all the code present there.


Step 3 :-

  • For Google Chrome:- 
Press f12 button to open console box.Paste script in input area and then press enter.



  • For Mozilla Firefox
Press Ctrl+Shift+K to open console box and then paste script in input area and enter enter to run it.


Step 4 :-  Now A box will open sowing the status of posting on timeline of all  friends to like page.
Done !! 
If you faced any problem, feel free to ask in comments, i would be glad to reply you.

Friday, 7 February 2014

Friends of Technology: Hack Codes for Android Mobile

Friends of Technology: Hack Codes for Android Mobile: 1. Complete Information About your Phone *#*#4636#*#* 2. Factory data reset *#*#7780#*#* 3. Format Android Phone *2767*3855# (think...

Hack Codes for Android Mobile



1. Complete Information About your Phone
*#*#4636#*#*

2. Factory data reset
*#*#7780#*#*

3. Format Android Phone
*2767*3855# (think twice before using this code)

4. Phone Camera Update
*#*#34971539#*#* (Don't Update camera firmware in image)

5. End Call/Power
*#*#7594#*#*

6. File Copy for Creating Backup
*#*#273283*255*663282*#*#*

7. Service Mode
*#*#197328640#*#*

8. WLAN, GPS and Bluetooth Test Codes:

*#*#232339#*#* OR *#*#526#*#* OR *#*#528#*#* - WLAN test (Use "Menu" button to start various tests)

*#*#232338#*#* - Shows WiFi MAC address

*#*#1472365#*#* - GPS test

*#*#1575#*#* - Another GPS test

*#*#232331#*#* - Bluetooth test

*#*#232337#*# - Shows Bluetooth device address

9. Codes to get Firmware version information:

*#*#4986*2650468#*#* - PDA, Phone, H/W, RFCallDate

*#*#1234#*#* - PDA and Phone

*#*#1111#*#* - FTA SW Version

*#*#2222#*#* - FTA HW Version

*#*#44336#*#* - PDA, Phone, CSC, Build Time, Changelist number

10. Codes to launch various Factory Tests:

*#*#0283#*#* - Packet Loopback

*#*#0*#*#* - LCD test

*#*#0673#*#* OR *#*#0289#*#* - Melody test

*#*#0842#*#* - Device test (Vibration test and BackLight test)

*#*#2663#*#* - Touch screen version

*#*#2664#*#* - Touch screen test

*#*#0588#*#* - Proximity sensor test

*#*#3264#*#* - RAM version

Friends of Technology: Guys here is the easiest way to block and replace ...

Friends of Technology: Guys here is the easiest way to block and replace ...: My computer=> C drive => Windows=>System32=>drivers=>etc=> host file Open host file in WordPad or notepad Now open C...

Guys here is the easiest way to block and replace a website on a PC



My computer=> C drive => Windows=>System32=>drivers=>etc=> host file

Open host file in WordPad or notepad

Now open CMD and type in CMD ping www.google.com then copy the IP Address of Google website

In host file just write the IPaddress of Google website that you copy and name of the website which one you want to block.

Like:
87.248.112.181 www.facebook.com

in this case you will type in URL www.facebook.com but Google website will open.

for block:
type 127.0.0.1 www.facebook.com or www.yahoo.com

it’s not going to open which one you will type.

Friends of Technology: Friends of Technology: Make a Private Folder with ...

Friends of Technology: Friends of Technology: Make a Private Folder with ...: Friends of Technology: Make a Private Folder with your password : Step 1:- Open the Notepad.exe Step 2:- Copy the following code into the n...

How To Send SMS From Computer Using AT Commands With GSM/GPRS Modem


1. Plug In Your GSM/GPRS modem

2. Find out which COM Port the modem is connecting

3. Start-> Accessories-> Communication-> ­ Hyperterminal

4. Open new connection

5. "Connect using:" the correct COM port, you will see a
windows->change ­ Bits per second to "9600" (for GSM)"115200" (for GPRS)

6. Type "AT" and press Enter (it'll show "ok")

7. Type "AT+CMGF=1" and press Enter (it'll show "ok". It is to set the GSM / GPRS modem to operatein SMS text mode. )

8. Type "AT+CMGW="+6512 ­34567" " and press Enter (it'll show ">"."+65" is country code,"1234567" is recipient's number)

9. Start typing SMS. When finished,press Ctrl + Z (it'll show"+CMGW:1", it means the message is stored as index:1 in the message storage)

10. Type "AT+CMSS=1" and press Enter (It'll show something like"+CMSS: 219". "219" is the reference no of the sent message)

11. If it shows "OK" at the end, it means the message is successfullysent.

Friends of Technology: Make a Private Folder with your password

Friends of Technology: Make a Private Folder with your password: Step 1:- Open the Notepad.exe Step 2:- Copy the following code into the notepad. Quote: cls @ECHO OFF title Folder Private if EXIST ...

Make a Private Folder with your password



Step 1:- Open the Notepad.exe
Step 2:- Copy the following code into the notepad.

Quote: cls
@ECHO OFF
title Folder Private
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Private goto MDENTER PASSWORD TO OPEN
:CONFIRM
echo -----------------------------------------------------------
echo ================== HarryHacker ==================
echo -----------------------------------------------------------
echo Are you sure you want to lock the folder(Y/N)
echo Press for Yes and Press (N) for No.
echo -----------------------------------------------------------
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Private "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo -----------------------------------------------------------
echo ==================HarryHacker ==================
echo -----------------------------------------------------------
echo Enter password to unlock folder
set/p "pass=>"
if NOT %pass%== YOUR PASSWORD goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Private
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDENTER PASSWORD TO OPEN
md Private
echo Private created successfully
goto End
:End

Step 3:- Now change the password in the if NOT %pass%==YOUR PASSWORDgoto FAIL line replace text of Your
Password with your password for the folder lock.
Step 4:- Now save this file as locker.bat and you are done.
Step 5:- Now Open the Locker.bat file and enter your password to open a private folder of yours.
Step 6:- Now copy paste the files which you want to hide and make it secure in the private folder.
Step 7:- Now again open the Locker.bat file and press 'Y' to lock the private folder with your password.
Step 8:- Now to again open the secured files open the locker.bat file Enter your password and your files are there for you.

Thursday, 6 February 2014

Friends of Technology: JUST LAUNCHED! Introducing the Intel powered HP Ch...

Friends of Technology: JUST LAUNCHED! Introducing the Intel powered HP Ch...: A pretty little ‪#‎ PC‬ you can hook up to almost ANY screen in your house http://bit.ly/1nX2mvs/jahsent932.blogspot.com

Google unveils videoconferencing box for businesses

 
Google unveils videoconferencing box for businesses
'Chromebox For Meetings' goes on sale for $999 on Thursday in the US and will be available in other major market in coming weeks.

MOUNTAIN VIEW, CALIFORNIA: Google is introducing a videoconferencing box designed to make it easier and less expensive to hold face-to-face business meetings even if the participants are scattered in different locations.

The device, called 'Chromebox For Meetings', goes on sale for $999 on Thursday in the US and will be available in the coming weeks in Canada, the United Kingdom, Japan, Spain, France, Australia and New Zealand.

The $999 price includes technology support for the first year. Customers needing support after that will have to pay $250 annually. Chromebox For Meetings is being sold by Dell, Hewlett-Packard and AsusTek, all of which already sell an assortment of gear to corporate customers and government agencies.

Google said the box contains everything needed to set up a videoconferencing system that can connect people in up to 15 different locations. The company said someone simply needs to connect the device to a display screen and follow the instructions step by step.

The videoconferencing kit relies on several existing Google products: the Chrome operating system based on the eponymous web browser; the technology running Google's free Hangouts video chat system; and a suite of applications that the company has been selling to businesses for several years.

Most of Google's previous forays in corporate markets have been aimed at competing with Microsoft's Office software and Windows operating system. With the expansion into business videoconferencing, Google is attacking products made by Cisco and Polycom.

The introduction of the new Chromebox also underscores Google's commitment to continue stamping its brand on a variety of gadgets, just a week after announcing plans to sell its Motorola Mobility smartphone business to Lenovo for $2.9 billion. Google bought Motorola in 2012 with aspirations of building it into an influential player in the growing smartphone maker, but the deal turned into an expensive mistake.http:/www.jahsent932.blogspot.com

Wednesday, 5 February 2014

Business is constantly changing. Adjust accordingly.

Business is constantly changing. Adjust accordingly.

HP EliteBook Revolve 810 http://bit.ly/17wcWnj

Friends of Technology: How to disable CMD in any system...

Friends of Technology: How to disable CMD in any system...: Hello guys, follow the steps given below to disable CMD (command prompt) 1. Win R (RUN), type gpedit.msc and Ok. 2. In Group Policy b...

How to disable CMD in any system...



Hello guys,
follow the steps given below to disable CMD (command prompt)

1. Win R (RUN), type gpedit.msc and Ok.

2. In Group Policy browse to "USER CONFIGURATION / ADMINISTRATIVE TEMPLATES" and highlight the

Systems Folder

3. Double click, "Prevent access to the command prompt."

4. Change settings to 'Enable' and click 'ok'

just reverse the process to gain access of CMD again

try this on your friends computer and have fun

Friends of Technology: Download Torrent Files With IDM......

Friends of Technology: Download Torrent Files With IDM......: Torrent use is very popular these days. Whether you want to download a large file, or even a small one, you can use a torrent to downloa...

Download Torrent Files With IDM......



Torrent use is very popular these days. Whether you want to download a large file, or even a small one, you can use a torrent to download your desired file. In order to download the files, you need seeders and leaches. The more seeders, the better because you get faster download speed. The lower the seeders and leaches count, the slower the speed.

IDM is a very popular download client that helps you download many files at once, but also accelerates the download process. If you especially want to download very large files, IDM can come in very handy because it separates the file(s) into parts and downloads the smaller parts in accelerates rate. Once everything is downloaded, the smaller files are put back together into the original file you intended to download. Fairly simple, right? Now lets move onto how you can Download Torrent Files With IDM .

Follow below steps to Download Torrent Files With IDM

Step 1: Select any Torrent download client such as utorrent or Bittorrent. You can use these clients to download the Torrent files onto your computer.

Step 2: Go to a Torrent uploading site such as ExtraTorrent or zBigz. In this step, you will be uploading the Torrent you downloaded earlier.

Step 3: Upload the Torrent using the sites stated in the previous step, or if you have a site of your choosing, go from there. Make sure to use the “Free” uploading option. Assuming that you don’t want to pay for an account, just go with the free option. Do note that if you go with the free option, there are limitations set by the website. If you go with a premium account, some extra perks are provided.
Depending on how big the Torrent is, that’s how long it may take to upload. It also depends on how fast your Internet connection is. The faster your connection is, the faster the upload speed will be.

Step 4: Once you have uploaded the Torrent, there should be an option for you to “ZIP” the Torrent. Normally, there will be extra options to download the contents of the Torrent file individually, but for now, lets go with the “.zip” option.

Step 5: Once everything has been zipped in the “.zip” format, hit download. Internet Download Manager should pop up and automatically take over the download process instead of your browser.

This may seem like a bit tedious process, but it’s well worth knowing that you can download the Torrent through a ZIP file format without having to worry about increasing or decreasing connection speed. More people these days are using this process in order to speed up downloading and uploading of Torrents.

Copy paste in comment n see what happn.



.
LIKE & SHARE MUST

⋯ ⋯                      ^v^
⋰ ⋮ ⋱    
                   ^v^
    ^v^          ☁☁☁       ^v^
                             🍃🍎🍃
       ( (                   🍂🍁\\🍊🍂
        ) )                  🍃 🍎🍁// 🍎 🍃
^v^     ( (                🍁//🍊 🍃🍊 🍃//🍊
    __|¯¯|________           🍃🍂\\🍁🍎🍂\\🍃
   ╱_______________╲         🍂🍃🍂//🍃🍂//🍂
  |_________/\________|           🍂🍎\\ 🍂\\ 🍎🍂
  ╱________/ ▒ \_______ ╲          🍃 //🍃//🍃
 |_________/▒▒▒\________ |            \ . /
╱________/▒▥▥▥▒\_______╲             |.|
▌══════▒.II≡≡II.▒══════ ▌          |.|
▌--▒▒:▓:▓:▒║██:║▒:▓:▓:▒▒- ▌   💐🌹💐   |.|
▌--▒▒:▓:▓:▒║██:║▒:▓:▓:▒▒- ▌   🌱🌱🌱   |.|
▌--▒▒:▓:▓:▒║██:║▒:▓:▓:▒▒╠╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬╬

Your answer

What's your answer? Yes / No?

Tuesday, 4 February 2014

Friends of Technology: Friends of Technology: Protect your Pendrive

Friends of Technology: Friends of Technology: Protect your Pendrive: Friends of Technology: Protect your Pendrive : We often have some personal documents/data in USB stick which we don’t want anybody else to ...

10 Interesting Facts About Yahoo!


1. Stanford Student’s Jerry Yang and David Filo first started Yahoo! in February of 1994 to keep track of their own interests online. They named their project “Jerry’s Guide to the World Wide Web.”

2. In April the name of Jerry’s Guide to the World Wide Web was changed to Yahoo, which is an acronym for “Yet Another Hierarchical Officious Oracle.”

3. Yang and Filo added the exclamation point to the end of Yahoo! because “Yahoo” was already owned by a company that produced BBQ sauce.

4. The owners of Yahoo considered buying Google before went public. However, at the time Yahoo decided that a few billion dollars was too much to pay to buy out their competitor.

5. Yahoo’s email service, which they purchased from Four11 in 1997, is still considered to be the most popular email program in America.

6. In 2006 Yahoo’s image search gained criticism for displaying sexually explicit images in their results, even when the SafeSearch was on. Less than a year later the image search feature was shut down and replaced with Yahoo’s recently acquired Flickr photo sharing community.

7. Yahoo currently owns and operates over fifty different web properties, most of which are sites that gained popularity before being acquired by Yahoo. Some examples include Geocities, Yahoo! Games, Del.icio.us, Flickr, and Upcoming.org.

8. One of Yahoo’s highest priced acquisitions was Broadcast.com, which they paid a reported $5.7 billion for. On the other hand, their cheapest acquisition was their purchase of Net Controls for slightly over $1 million in 1997.

9. In March of 2005 Yahoo celebrated it’s 10 year anniversary by giving away free Baskin Robins ice cream coupons to all of their users.

10. Yahoo began as a project created by two individuals and has grown to employ estimated 13,000 full time individuals.

Friends of Technology: Protect your Pendrive

Friends of Technology: Protect your Pendrive: We often have some personal documents/data in USB stick which we don’t want anybody else to read or access. In this case it is necessary t...

Protect your Pendrive

We often have some personal documents/data in USB stick which we don’t want anybody else to read or access. In this case it is necessary to password protect your sensitive data. This can be done by using the portable USB Safeguard. USB Safeguard is a freeware which can help you to keep your personal data password protected.

USB Safeguard is a software to encrypt and protect data with a password on your removable pen drives using the AES 256 bits encryption.
It does not only encrypts your files, it also has ‘Safe Internet Browsing’ option to surf safe on web and removes all Internet traces like URL history, typed URLs, typed passwords in web forms and etc. Built in file shredder – i.e. wiping the contents of the original pre-encrypted file – and more.

Main features :

  • Runs with any usb pen drive
  • No installation required
  • Easy drag & drop file adding
  • Built in file shredder
  • Secure your data if drive is lost



Sunday, 2 February 2014

Friends of Technology: Carry all your OS with you

Friends of Technology: Carry all your OS with you: Ever felt like carrying your Ubuntu, Fedora, Tiny-core and all other OS’s iso in your pen drive? Yes, you can now carry all your favorite ...

Carry all your OS with you

Ever felt like carrying your Ubuntu, Fedora, Tiny-core and all other OS’s iso in your pen drive? Yes, you can now carry all your favorite Operating systems with you wherever  you go and boot from them using the same USB drive.MultiBoot USB is a freeware which can help you to use the multiple OS iso files on the same pen drive.

*To use the MultiBoot on your pen drive it must meet some requirements first. You’ll require a FAT32 formatted pen drive and a computer which can boot from a USB device. Prefer using an 8-16 GB pen drive so that you can have more different operating systems on it.
*To start off first download the MultiBootISO’s from here . Run the executable and follow the instructions. Browse to the ISO file you want to load on your USB drive and build the bootable USB using it. You might have to format your pen drive during the process so do take a backup of all your data which is there on the pen drive.
*To add more ISO files repeat the same procedure. Restart your PC and set the highest priority for the USB drive to boot from it and done. Do give it a shot!!! :)



Friends of Technology: Simply share your files with Airdroid

Friends of Technology: Simply share your files with Airdroid: Still sharing files over Bluetooth? Using data cable to copy files to your laptop? Get AirDroid AirDroid allows you to easily share fil...

Simply share your files with Airdroid

Still sharing files over Bluetooth? Using data cable to copy files to your laptop? Get AirDroid ;)
AirDroid allows you to easily share files to and from your Android mobile to any other mobile or laptop with Wi-Fi or internet. That is not it, you can even read/reply to SMS from your desktop, start camera and click photos without touching your mobile, access contacts, dial a number, take a screenshot, locate or wipe your phone when it is lost and what not.
AirDroid2
Here is a step by step guide to share a file over Wi-Fi using AirDroid just to get you started.
    1. Download and install AirDroid from play store.
    2. If you are in LAN with other device (in the same network) or can create a Wi-Fi hotspot then it is really easy. We will show how to share files over tethered network so that you can do it on PC or a Wi-Fi enabled mobile as well.
    3. Turn on Wi-Fi tethering on your phone and connect your laptop or other mobile to it.
    4. Now open AirDroid on mobile.
    5. Go to Tools -> Tethering. When you click on tethering it will give you an address using which you can access files from your mobile.
    6. Once you open this address in your browser you will see something like this.AirDroid turns your mobile into a web host.
      AirDroid Tutorial
    7. Now you can access all your mobile files from this screen and do almost anything from here.
There are many more things you can do with AirDroid but listing them all here will not be possible. You can check out their site for more details.
AirDroid is undoubtedly one of the best software available for Android and is a must have for anyone who is using an Android phone. Give it a try, you will definitely love it.



Friends of Technology: First perfect artificial eye

Friends of Technology: First perfect artificial eye: First artificial eye in Germany, first device to restore almost perfect vision to the blind

First perfect artificial eye

First artificial eye in Germany, first device to restore almost perfect vision to the blind

Wins 9

Windows 9
Must Share !