Friday, 27 February 2015

3 Things You Can Do With Cortana In Windows 10

Personal assistance apps coming to the desktop was only a matter of time and the Windows 10 preview build released a few days ago gives us a look at how Cortana will work on your desktop. Integrated with the search feature that debuted with Window 10, it’s more than just a way to push people to use Bing. We took it for a spin and here are three things you do with Cortana, and a guess at what else you will be able to do with it once the feature rolls out in the final version. 1. Look Up Weather This is a seriously old trick for personal assistant apps/features. Siri can do it, Cortana can do it on the Windows Phone, Google Now does it, you can ask Chrome to look up the weather for you and with Windows 10, all you have to...

Set iPhone Screen Brightness Far Lower Than What Apple Allows [No Jailbreak]

Have you ever picked up your phone in the middle of the night to check the time or  if see you have a new message/email, only to be blinded by the screen’s brightness? It happens to the best of us. The pain aside, the light from your display might even wake someone you’re sharing a bed with while you’re busy bringing up the control center to reduce the brightness. There’s a simple little way to reduce the screen’s brightness to one far lower than what you can set from the brightness slider in Control Center and Settings. It’s actually built right into iOS and takes a little setting. Here’s how you can enable it and activate it with a little shortcut. Go to Settings>General>Accessibility and tap the Zoom option. Turn this...

Spam Uses Default Passwords to Hack Routers

In case you needed yet another reason to change the default username and password on your wired or wireless Internet router: Phishers are sending out links that, when clicked, quietly alter the settings on vulnerable routers to harvest online banking credentials and other sensitive data from victims. Sunnyvale, Calif. based security firm Proofpointsaid it recently detected a four-week spam campaign sent to a small number of organizations and targeting primarily Brazilian Internet users. The emails were made to look like they were sent by Brazil’s largest Internet service provider, alerting recipients about an unpaid bill. In reality, the missives contained a link designed to hack that...

New Features In Firefox 36 For Desktop And Android

Firefox 36 is out and this version is easily one of the least exciting versions ever released if you’re an end user. It’s got bug fixes and the usual security improvements but little else. The one major security improvement is that the HTTP/2 protocol is now fully supported. It has been implemented for both the desktop and Android versions of Firefox. The mobile version has also gotten a new tablet interface. The desktop version will now sync tiles for frequently visited web sites that appear on the new tab page across devices. For mobile users running Android Lollipop, Maithili language is now supported, and for desktop users support for the Uzbek language has been added. Firefox 36 Desktop For end users the tiles for top...

Brute Force Attacks – Definition and Prevention

There are many methods hackers use to get into a computer, computer network, a website or an online service. Carrying out a Brute Force Attack is one of them. It is one of the simplest, yet time consuming method to hack a server or a normal computer. The Brute force attack mechanism has its advantages – it can also used to check network security and to recover forgotten passwords. In this post we will try and understand Brute Force Attack definition and see the basic prevention method. Brute Force Attacks A Brute Force Attack is a type of Cyber Attack, where you have a software spinning up different characters to create a possible password combination. The Brute Force Attack password cracker software simply...

How to use Your Pen drive as a Password in Windows 7

Computers are the most important storage area to store valuable files, documents and data, etc., for any individual person or an organization. Security is also necessary for these computers. So Security is most crucial for the computing world. Admin Password is not enough to protect your PC because hackers have various ways to hack your PC or they can easily steal your valuable data. Today we learn a cool trick that is to carry your PC password with yourself. It means using Pendrive as PC password. Yes, it is possible to carry your PC password in pendrive. You can log into your PC by using pendrive as a password. There is no need to remember your password. Simply insert your pendrive and log into your PC without...

How to Download from Torrents when Torrent is Block in Your Network

From Wikipedia Tribler is an open source anonymous peer-to-peer decentralized Bit Torrent client. Tribler is based on the Bit Torrent protocol and uses an overlay network for content searching, which makes the program operate independent of external websites and renders it immune to limiting external action, for example, government restraint. Due to this overlay network Tribler does not require an external website or indexing service to discover content. The user interface of Tribler is very basic and focused on ease of use, instead of diversity of features. Tribler is available for Linux, Windows, and OS X. First Download Tribler from here and install in your...

Record-breaking 1Tbps Speed achieved Over 5G Mobile Connection

New Generations usually bring new base technologies, more network capacity for more data per user, and high speed Internet service, for which Internet service providers usually advertise. However, it is believed that the fifth generation (5G Technology) of mobile network will be beyond our thoughts. 1TBPS OVER 5G Security researchers from the University of Surrey have just achieved Record-Breaking data speeds during a recent test of 5G wireless data connections, achieving an incredible One Terabit per second (1Tbps) speed – many thousands of times faster than the existing 4G connections. After 4G, 5G is the next generation of mobile communication technology that aims at offering far greater capacity and be faster, more...

Tor Browser 4.0.4 Released

Tor — a privacy oriented encrypted anonymizing service, has announced the launch of its next version of Tor Browser Bundle, i.e. Tor version 4.0.4, mostly supposed to improve the built-in utilities, privacy and security of online users on the Internet. Tor Browser helps users to browse the Internet in a complete anonymous way. The powerful Tor Browser Bundle, an anonymous web browser developed by the Tor Project, received some updates in its software. Tor Browser Bundle is basically an Internet browser based on Mozilla Firefox configured to protect the users’ anonymity via Tor and Vidalia. The anonymity suite also includes 3 Firefox extensions: Torbutton, NoScript and HTTPS-Everywhere. NEW FEATURES The...

Sunday, 22 February 2015

What Does the “+” in Supported DDR4 RAM Memory Types Mean?

If you are preparing to replace hardware in your computer or build one of your own, then some of the supported memory types shown for motherboards may be a bit confusing. What does the “+” that is sometimes shown for DDR4 RAM really mean? Today’s SuperUser Q&A post has the answer to a confused reader’s question. Today’s Question & Answer session comes to us courtesy of SuperUser—a subdivision of Stack Exchange, a community-driven grouping of Q&A web sites. Photo courtesy of Tecnomovida Caracas (Flickr). The Question SuperUser reader Karl Richter wants to know what the “+” in supported DDR4 RAM memory types means: Some motherboard producers add a “+” to the specification of supported memory types (i.e. ASRock...

What is the Difference Between BIOS and Firmware?

When a person is just getting into computers, there is a lot of new vocabulary to learn and sometimes it can all get a bit confusing. Take the terms BIOS and Firmware, for instance, do they mean the same thing or are they different? Today’s SuperUser Q&A post comes to the rescue to help a confused reader with terminology. Today’s Question & Answer session comes to us courtesy of SuperUser—a subdivision of Stack Exchange, a community-driven grouping of Q&A web sites. Photo courtesy of John C Bullas (Flickr). The Question SuperUser reader Koray Tugay wants to know what the difference between BIOS and Firmware is: Could anyone elaborate on what the difference between BIOS and Firmware is please? What is the...

What Is Spoofing Technology

The word "spoof" means to hoax, trick, or deceive. Therefore, in the IT world, spoofing refers tricking or deceiving computer systems or other computer users. This is typically done by hiding one's identity or faking the identity of another user on the Internet. Spoofing can take place on the Internet in several different ways. One common method is through E-mail spoofing involves sending messages from a bogus e-mail address or faking the e-mail address of another user. Fortunately, most e-mail servers have security features that prevent unauthorized users from sending messages. However, spammers often send spammessages from their own SMTP,which allows them to use fake e-mail addresses. Therefore, it...

Saturday, 21 February 2015

What is HTTP/2 ? Next-Gen Protocol For Faster and Safer Internet

Good news for Internet folks! Get Ready as the entire web you know is about to change. The new and long-awaited version of HTTP took a major step toward becoming a reality on Wednesday – It is been officially finalized and approved. Mark Nottingham, chairman of the Internet Engineering Task Force (IETF) working group behind creating the standards, announced in a blog post that the HTTP 2.0 specifications have been formally approved. Now, the specifications will go through a last formality – Request for comment and editorial processes – before being published as a standard. LARGEST CHANGE IN HTTP OVER LAST 16 YEARS HTTP, or Hypertext Transfer Protocol, is one of the web standards familiar to most as the http://...

Page 1 of 8512345Next
Related Posts Plugin for WordPress, Blogger...
Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
TRICKS AND TIPS CREATED BY SUSHIL UPADHYAY| Grants for single moms