Showing posts with label Tips And Tricks. Show all posts
Showing posts with label Tips And Tricks. Show all posts

Thursday, 21 July 2016

How to Create an Android App Without Any Coding Skills


In this post I am going to share the simplest way to Create an Android App without coding and without any skill. Android app Development is very complicated but with this method you can easily create apps online without ant coding.

In these days Android is the most popular OS for smartphone and tablets. Android is free and open source OS by Google. If you want to create an application for android and you don't have any coding experience than don't worry, with the help of this post you can create an Android app without any coding skills.


How to Create an Android App Without Any Coding Skills

There are many sites you can find on internet that provide a feature to create android app without coding, but we will tell you the best and user friendly only. Just follow the instruction to create an app.

#1 AppsGeyser
Appsgeyser is a free provider that converts your content material into an app and makes you cash. Your app could have all you want including messaging, social sharing, tabs and complete support for html5 upgrades. But overlook approximately the app, assist you build a commercial enterprise and make the most of mobile! they help you monetize your content successfully.

#2 Appypie
Appy pie is the quickest developing cloud primarily based cell apps builder software program (app maker) that lets in customers with no programming abilities, to create android & iphone applications for mobiles and smartphones; and post to google play & itunes. Appy pie’s closed beta become launched on jan 14th, 2013 in noida, india. Appy pie shot to recognition immediately after its out of beta launch. Locating big acknowledgment from global press and the blogosphere, appy pie’s market scored over 850 cell apps within a month.

#3 Buzztouch
Buzztouch is an open source "app engine" that powers tens of thousands of iPhone, iPad and android applications. Buzztouch is used together with the ios and android software developer kits (sdk's). The buzztouch middle (ios and android) serves as the inspiration for any mobile project. This properly examined and extendable project saves developers time and increases the high-quality of their cell apps. All supply documents included in venture downloads are introduced in plain textual content for max hack-potential.

#4 Appyet
The use of appyet, anyone can create a professional android app. There is no programming expertise required, handiest take short time to build your first app. All you need to offer is links to rss/atom feed or website, they're automatically converted into stunning one 100% natural native apps for android. You've got freedom to list/promote app on google play and plenty of other android markets. Earn ad money with embedded advert or get thousand of installations deliver new constant site visitors to your internet site.

#5 Appclay
Appclay , conceived and created via core development professionals at shephertz technologies, is an esteemed intuitive interface that enables each one people- grow to be an app developer results easily with none coding, software installation, renovation and economic funding. Anyone can use appclay to create html5 and android local apps supported through all extensively famous gadgets. App’s functions which include home page, object lists, menus, map, photo gallery, audio-video uploads, social join, about us web page and plenty of extra can be created on the fly.

Conclusion:
So its all about How to Create an Android App Without Any Coding Skills. If you understand any comparable website online to create the app without coding then remark below. If you like this article useful share it with friends. Thank you
Read more

Wednesday, 20 July 2016

How Data Recovery Softwares Work


We’ve all dealt with data loss, whether it was from a hard drive failure, data corruption or accidentally deleting a file. If you’ve ever experienced a major loss of data, you’ve probably wondered about data recovery — how does it work?  How effective is it?  How much does it cost? We set out to find out.

Data Loss and Data Recovery
Data loss can take many forms — accidental deletion, hard drive failure, software bugs, data corruption, hacking, even a simple power failure can cause you to lose data. And, of course, there are more extreme cases, like when a hard drive is recovered from a plane crash; amazingly, some data recovery specialists can retrieve data from storage media that’s been almost completely destroyed.

If a piece of data used to be on your hard drive, solid-state drive, USB stick, RAID, or other storage media, you might be able to hire someone (or purchase some software) to perform data recovery. Data recovery is, simply, the salvaging and repair of data that has been lost.

Of course, data recovery won’t always be possible; sometimes a system can be too corrupted or damaged to get much of the data back. However, data-recovery technology has become extremely advanced; for example, Kroll Ontrack, an Australian data recovery company, was able to recover 99% of the data from a hard drive that was on the Challenger space craft when it disintegrated upon re-entry.

How Does Data Recovery Work?
The methods used to recover lost data depend on how the data was lost in the first place; let’s take a look at some of the most common forms here.

File Deletion
Interestingly, any file that’s deleted actually stays on your drive until it’s overwritten with another file. This means that if you act fast, you actually have a pretty good chance of getting the file back. In the case of file deletion, you can use file recovery software like TestDisk, which uses complex algorithms that look at pieces of information that’s left on the hard drive in order to guess where the file was physically stored. If it guesses correctly, you’ll get the file back. If not, you’re out of luck.

However, doing just about anything on your computer can result in the file being overwritten and likely lost forever. Even browsing the Internet can result in cookies or cache files being stored in that location, overwriting the information you’re hoping to retrieve. And installing file recovery software can do the same thing. If the file hasn’t been overwritten, the chances of getting it back vary depending on the format of your file system.

For example, the Windows NTFS system retains file description information after the file has been deleted, making it relatively easy for file recovery software to find the file. Other systems, however, like UTF and FAT, destroy more information about the file when it’s deleted, making it more difficult for file-recovery algorithms to guess the location of the file on the disk.

File Corruption
If you’ve ever gotten one of the dreaded “corrupt hard drive” errors, you know how disheartening it can be. However, it’s still possible that data could be recovered. If you attach the hard drive to another computer, you might find that only the operating system has been corrupted, and that the rest of your data is fine—in this case, it’s just a matter of copying everything to another hard drive.

Another problem that could get you to this point is a corrupted partition table, which might be possible to repair using the correct software. If you can successfully repair the table, it should be easy to get all of your files back. If not, you still might be able to recover enough information from the table to get your files back, though it depends greatly on the level of corruption.

Even if the files you’re trying to recover have been corrupted, there’s a chance that you’ll be able to get usable portions of them back by using recovery software; as long as the software can find the file, it will try to recover it. While you might not be able to use what you get, there’s always a chance that you’ll get a portion of the file back, which could potentially save you a lot of time in trying to recreate it.

File System Format or Damage
Similar to deleting a file, formatting a file system destroys information about the previous files and structure of the disk, but the amount of data that’s erased depends on the system format.

For example, formatting with FAT results in the destruction of a large amount of data and rewriting that section of the disk with zeroes, significantly reducing the likelihood that you’ll be able to recover your data. Some file systems, like NTFS, will have a higher likelihood of recovery if they’re overwritten with the same file system, while others actually have a smaller chance if they’re overwritten with the same system — writing XFS over FAT makes it more likely for the FAT files to be recovered.

In the case of file system damage, the number of files that can be recovered depends on the extent of the damage and what allocation information is still available to the recovery software. If enough information is present for the recovery software to repair the file system and accurately locate previous files, you should be able to recover quite a bit.

Physical Drive Damage
Recovering files that have been deleted or formatted is one thing — getting files off of a drive that’s been damaged is another. While it doesn’t take impressive technical skills to install and run recovery software, dealing with a heavily damaged drive is best left to the professionals, as it usually requires that the drive be taken apart.

Taking a drive apart without damaging it is very difficult — the professionals only open them up in clean rooms, which are highly controlled environments that are free of almost all environmental pollutants. Even a single speck of dust that lands on a hard drive plate can cause the read/write head to crash and multiply the drive’s problems. Static electricity can also damage the drive, so these rooms, these equipment used in them, and the clothing that technicians wear are all specially designed to minimize static.

When a hard drive fails because of physical damage, it can be related to a number of factors, such as a broken controller board or a crashed head. Occasionally these issues can be fixed by replacing the broken part, but in general, if there’s physical damage to the hard drive, you’re going to need some serious work done by the professionals.

If you get your drive to a data recovery specialist, they’ll take a number of steps, from rebuilding parts of the hard drive to creating a disk image and doing their best to repair the corrupted parts using sophisticated software. The cost of the rebuilding, proprietary imaging technologies, and maintenance of the clean rooms is what can drive the cost of professional data recovery upwards of several thousand dollars (though some providers are now able to offer more affordable rates).

Solid State Drive Data Recovery
Solid state drives are becoming more and more popular, especially with the rise of the ultrabook. Obviously, because they haven’t been around as long, recovering data from an SSD is more difficult than it is to recover from a traditional hard drive. However, a number of the same techniques can be used to recover data that’s been deleted or formatted.

However, recovering data from a physically damaged solid state drive can be very expensive, as the technology is still new. When my SSD crashed, the estimate for data recovery on it was about $3,500. A recent white paper estimated that this was average for SSD recovery if the recovery specialist had not received tools and specifications from the manufacturer; that cost was reduced to about $700 if the manufacturer provided support. Hopefully we’ll be seeing this cost come down in the near future.

Your Best Bet: Don’t Lose Your Data
Data recovery software and specialists can do a great job of getting your data back, but it’s risky, time-consuming, and expensive. The best measure you can take to prevent long-term data loss is the one we’ve been advocating for a long time: make lots of backups! Use a cloud backup provider, keep a backup hard drive in your home, and make sure you don’t get caught out by a power surge or an accidental formatting. And take steps to prevent file corruption in the first place.
Read more

Sunday, 17 July 2016

10 Awesome PC Tips That Help You Alot


Hello Guys As you know that everyone owns a computer or laptop. but most of you doesn't know about shortcuts in it because that are hidden or we can say that these codes are secret because most of you don't use it. but if you use it i am sure that'll definitely you can save much of your time. so here are the list i hope you can use it and save your precious time.


1. Press Window key and U twice in quick succession to shutdown the computer.
2. Press Alt+F4 as many times as your running applications to close them down after they get closed press Alt+F4 one more time which will open up power off window and pressing enter that'll power off your computer.
3. Press Ctrl+Z for undo and Ctrl+Y for redo, this may come handy while editing pictures or data.
4. Press Ctrl+F to quickly open search bar to find any data or folder.
5. Just type the name of the site you want to visit on the search bar of your browser and press Ctrl+Enter , this will automatically add www. prefix and .com suffix.
6. Annoyed of your username popping up in facebook log in page then try pressing Shift+Delete to permanently delete it. This Shift+Delete also works for deleting the files permanently from computer (they doen't stay on re-cycle bin).
7. Just press Alt+Print Screen to take the screen shot of only the current window.
8. Point the cursor onto the link and press Ctrl+left click to open the link in new window.
9. Press Ctrl+Shift+N to open a new incognito window, which doesn't save the search history and cookies.
10. Press Ctrl+N to do any thing new for example while your are browsing the net press Ctrl+N to open new browser window.

These are the Top 10 amazing and useful computer short cuts that'll help you..Hope you like the article, Please don't forget to like and share the article. and comment if you have any problem.

Read more

Monday, 11 July 2016

How To Rename Your Recycle Bin


In computer the recycle bin  is temporary storage for files that have been deleted in a file manager by the user, but not yet permanently erased from the file system. Typically, a recycle bin is presented as a special file directory to the user (whether or not it is actually a single directory depends on the implementation), allowing the user to browse deleted files, undelete those that were deleted by mistake, or delete them permanently (either one by one, or by the "Empty Recycle Bin" function).
Microsoft's Recycle Bin is implemented as a special folder with columns like Date deleted and Original location. Typically only files deleted via Windows Explorer (but not necessarily other Windows graphical interfaces such as file selection dialogs) will be put into the Recycle Bin; files deleted via the Command Prompt are permanently deleted, as (by default) are files deleted via operating system APIs and applications other than Windows Explorer. Some operating system APIs do, however, allow applications to recycle files rather than delete them. In previous Windows operating systems and in MS-DOS, undeletion was the only way to recover accidentally or intentionally deleted files.

The Recycle Bin only stores files deleted from hard drives, not from removable media, such as memory cards, thumb drives, or floppy disks. Nor does it store files deleted from network drives.

The Recycle Bin has a setting to configure the amount of deleted files it can store. Free disk space allocated for this is not actually used until files are deleted from folders and stored in the Recycle Bin. In versions of Windows prior to Windows Vista, the default configuration of the Recycle Bin is a global setting for all drives to hold 10% of the total capacity of each host hard drive volume to store deleted files. For example, on a volume with a capacity of 20 gigabytes, the Recycle Bin will hold up to 2 gigabytes of deleted files. This can be changed anywhere from 0 to 100% of the drive space, but will not be allowed to exceed 3.99GB of space, even if the user-indicated % of the drive space is larger than 3.99GB. If the Recycle Bin fills up to maximum capacity, the oldest files will be deleted in order to accommodate the newly deleted files. If a file is too large for the Recycle Bin, the user will be prompted to immediately and permanently delete the file instead. This 3.99GB limit does not apply in Windows Vista and later Windows versions.[citation needed]

The actual location of the Recycle Bin depends on the type of operating system and file system. On older FAT file systems (typically Windows 98 and prior), it is located in Drive:\RECYCLED. In the NTFS filesystem (Windows 2000, XP, NT) it is Drive:\RECYCLER. On Windows Vista and Windows 7 it is Drive:\$Recycle.Bin folder.

The Recycle Bin can be accessed from the desktop or Windows Explorer.
In Windows Explorer, files are moved to the Recycle Bin in a number of ways:

  • By right-clicking on a file and selecting delete from the menu
  • Selecting the file and pressing the delete key
  • Selecting delete from the Task pane in Windows XP
  • Selecting the file and choosing delete from the File menu (in Windows XP Explorer)
  • By dragging and dropping a file into the Recycle Bin icon
  • From the Send To menu
  • From a context menu command or some other function in a software application (usually configurable)

It is possible to bypass the Recycle Bin and directly delete a file by holding the SHIFT key while performing an action that would normally send a file to the trash

  1. Click Start / Run
  2. Type regedit and press enter
  3. Open the HKEY_CLASSES_ROOT folder
  4. Open the CLSID folder
  5. Open the {645FF040-5081-101B-9F08-00AA002F954E} folder
  6. Open the ShellFolder folder
  7. Change the "Attributes" data value from "40 01 00 20" to "50 01 00 20". Once


completed change the "CallForAttributes" dword value to "0x00000000" (doubleclick
and change value data to 0). You must change both of these values to get the
rename to appear.
After performing the above steps you will be able to rename the icon like any other
icon. Right-click the Recycle Bin icon on the desktop and click Rename and rename it
to whatever you wish.

Hope You Like My Article And Found It Useful Keep Like And Comment If you have any problem

Read more

Tuesday, 5 July 2016

Use Whatsapp With Fake US Number


WhatsApp has become the best and most used application for all mobile users. Not only it is available for every mobile system or operating system like android, iphone, blackberry mobile phones, symbian, htc etc. but also it is the most used app in these systems too. If you having an internet in your mobile phone then with the help of this application you can send unlimited messages to any one in the world. Message type can be text, audio, video, images etc. If you are one who daily updates their whatsapp status then check out this awesome cool whatsapp status. As we all know that the popularity of WhatsApp has grown tremendously that many whatsapp tricks and tips coming in the internet.

Many times, we need to use WhatsApp for sending or receiving messages/media without showing or using our real mobile number or even trick our friends and message without revealing our Identity. Now, by using the following tutorial you will be able to create a fake WhatsApp account with a spoofed U.S.A number in any country, that too will all the normal functioning of WhatsApp . The tutorial will work for Android, and iOS devices (iPhone) too!

Follow These Steps To Use Whatsapp Without Number Or With Spoof Number:


  1.  Install Whatsapp With Latest Version (Skip This Step If You Already Install Whatsapp).
  2.  Now Download This App From Playstore.
  3.  Create Account In This App And Verify It With Your Current Mobile Number.
  4.  Now Open The App You'll See US Number In The Option List. Remeber This Number And  Open Whatsapp
  5.  Now Paste The Number Which Is In The App And Click On Verify. Wait For Second You'll  Receive Message In The App.
  • Note: If you didn't receive the message then click on call me and receive the code through call.
Conclusion:
This Trick is 1000% workable checked by me. this trick will also helpful for other online verification sites. hope you like my article comment if you have any problem. and share if you found this article helpful.
Read more

Sunday, 3 July 2016

Remotely Shutdown PC Using Android


Almost every one own a android smart-phone ,which can several cool things one can imagine. But not many are unaware tricks which are very cool and easy to implement. Let us show one of the 100’s of tricks an android can do.

How cool is that you can remotely shutdown PC using android ? You can surprise every one around you with this trick. By following few tips and tricks you can Remotely Shutdown PC.

How To Remotely Shutdown PC Using Android
Yes , your reading the right! You can now shut your PC down using an app , anywhere at any time. Sometimes we  a download larger files , at the same time we have to attend a friend regular meet but we avoid it till the download finishes. Which is not only annoying but socially uncool. Things like this can be solved using this very app to shutdown.
In this tutorial we are discussing about how to shut down PC remotely using android phones in 2016

Step 1 : Go to browser and search for Airytec switch off program and install it.

Step 2 : After installation complete, click on notification tray & there is shutdown icon.

Step 3 : Tap on the icon , a window pops up on your screen. Select the options of your choice like Force shutdown.

Step 4 : As you see there are 2 more options , select it to ” Remote” , once there select “Edit Web interface Settings”

Step 5 : Tap on ” enable Web interface” , leave “enable Authentication unchecked “ alone.

Step 6 : We are reaching the end point so be patient.select on ” view / update static addresses ” , You will be redirect to browser , time ti bookmark that “URL” on your mobile device. Double click on “shutdown icon” icon on your notification tray & Enable task.

Step 7 : Connect to wi-fi or data plan of your smart-phone and fire up browser then type in the saved “URL“, Just as shown on below image.
Step 8: Now you can click on shutdown button to shut down your computer.

Final Step: Now you can shutdown you PC. Thank you for hanging on for so long.
It wasn’t that difficult , right ? Thats one of the benefits you get having a smart-phone around. There are plenty of more tricks to explore and learn to implement using our android smart-phone.

So This Is The Way You Can Remotely Shutdown PC Using Android. its a very best trick to impress your friends so now use your android and try this trick. comment if you have any problem.
Read more

Sunday, 26 June 2016

Biometrics and Authentication


Authentication using passwords and PINs are no longer considered to be safe. We have seen a couple of recent incidences of data breach where user data is compromised and exploited for even further attacks. Two factor authentication is one option of dealing with it. But, that also cannot be considered to be sufficient. A two factor authentication system also can be compromised. We need some authentication mechanism in which the authentication data can be provided by the individual only and cannot be tampered with. And, that is the main motivation behind using biometric system.

What is Biometrics
The word “biometrics” is derived from the Greek word “bio” which means life and “metric” which means to measure. Biometrics refers to the automatic identification of a person based on his or her unique physiological or behavioral characteristics, such as fingerprints, voice pattern, iris, keystroke rhythm etc. These characteristics are unique to every individual and cannot be tampered easily. And, that is why biometric systems are today widely used for authentication purposes.

History of Biometrics
The history of biometrics dates back to 1870, with the measurement system of Alphonse Bertillon. In this measurement system, human body measurements such as skull diameter, arm and foot length etc used to be used to identify a person uniquely. Until 1920's, this system used to be used for identifying prisoners.

Later in 1960s, identification through fingerprints and facial measurements was proposed. In 1960's, the techniques of digital signal processing were developed and that enabled convenient processing and storing of the biometric data. And, that led to identification of individuals in an automated way.

Voice and fingerprints recognition systems were later developed and their applications included high security access control, personal locks and authentication of financial transactions since 1960's.

Later, biometric system based on face recognition and iris recognition was developed. And, today biometric systems based on fingerprints and face recognition, iris pattern recognition or keystroke rhythm and voice recognition are widely used.

Why Biometrics

There are a number of reasons for which biometrics are supposed to be reliable enough to be used for authentication purposes :

Biometric data of an individual can be produced by the individual only and the individual has to be physically present at the time of authentication. It is not easy to tamper with biometric data. And, this biometric system much reliable, as it can prevent illegitimate access based on stolen credentials.
As biometric data is unique for every individual and can be produced by the individual only, it can provide negative identification. If an individual is enrolled in a biometric system, he cannot later deny his enrollment.
In biometrics, one does not need to remember a huge number of credentials, as it happens in case of passwords or PINs. A password or PIN can be easily forgotten or broken if not strong enough. But, biometric data of an individual is strong enough not to guess or break.
In biometrics, one does not need to carry any physical tokens for authentication, as it is done for smart cards, magnetic stripe cards, photo ID cards, physical keys etc. So, biometric authentication is much more convenient for an individual.

Characteristics of Biometric Data

A biometric data should have the following characteristics so that it can reliably be used for authentication purposes :


  • Biometric data should be constant over a long period of time. There should be no significant differences in the biometric data based on factors like age, disease etc.
  • Biometric data of an individual should be unique and significantly different from another individual.
  • The captured biometric data should be conveniently stored in a format, which is easy to handle.
  • Biometric data of an individual should be impractical to mask or manipulate.
  • Biometric data of an individual should be digitally comparable with that of another individual.
  • Biometric data must be irreproducible by other means, unless the individual himself or herself produces the data.
  • Biometric data has to be accurate. It should not have any false acceptance or false rejection rate.




How does Biometric System work

A biometric system typically works in the following way :

An individual produces his or her biometric data. Normally, the biometric data is captured by a sensing device like a fingerprints scanner or a video camera.
Distinguishing characteristics are extracted from the raw biometric sample and converted into a biometric template.
The mathematical representation of the biometric template is registered and stored in the database.
Later, when an individual tries to authenticate producing his or her biometrics, the stored biometric data is compared with the given data for verification.

Types of Biometrics
Biometrics can be of two types :

  • Physiological Biometrics
  • Behavioral Biometrics

Physiological biometrics is based on some physiological characteristics of an individual, such as fingerprints, iris pattern, face recognition etc.

Behavioral biometrics is based on behavioral characteristics of an individual, such as keystroke rhythm, signature, voice recognition etc.

The main differences between these two biometrics is, physiological biometrics does not get influenced by psycho-emotional state of an individual. It remains unchanged over time and emotional state. But, behavioral biometrics can be influenced by factors like emotional state or disease of an individual. So, physiological biometrics is supposed to be more reliable than behavioral biometrics.

Let's look at a couple of biometric systems and their advantages and disadvantages.

Face Recognition
Each individual has distinctive features in his facial image based on eyebrows, width of eyes, breadth of nose etc. The facial recognition system first captures the facial image of an individual and then differentiates the face from the background. It then extract features from the facial image.

There are around 80 features that a facial recognition system can make use of and these include jaw line length, eye socket depth, distance between the eyes, cheekbone shape, width of the nose etc.

The distinctive features are then suitably represented in a mathematical format and stored in the database. Later, this data is retrieved and compared with the collected data for authentication.


Advantages

  • It is not intrusive.
  • It is hands-free and convenient.
  • It can be done from a distance. This can be useful if used responsibly for surveillance purpose for identifying criminals from a crowd.


Disadvantages

  • A facial recognition system should be resistant to factors like facial expressions etc.
  • Face recognition may not work properly with factors like poor lighting, sunglasses, partially covered face, low resolution images etc.
  • If not used responsibly with the permission of the individual, face recognition can be a major privacy violation.

Iris Recognition
The iris is the colored ring around the pupil of a human being. It eyes has complex random patterns, which are unique and can be seen even from a certain distance. An iris recognition system anlyzes the complex random patterns of an iris and detects a person's identity based upon that.


Advantages

  • Iris recognition technology is not very intrusive as it does not need direct contact between the subject and the camera.
  • Iris recognition can be done using simple video technology.
  • Error rates of iris recognition system is very low and it can be reliably used for authentication purpose.



Disadvantages

  • Scanning iris may be inconvenient, as it can be covered by objects like eyelid or eyelashes.
  • Iris recognition biometrics may prove difficult for people with blindness or cataract.
  • The camera involved for taking iris image should have correct amount of illumination, otherwise it may prove difficult to capture the accurate image of the iris.




Fingerprints Recognition
In this method, digital representation of a fingerprint is scanned using a fingerprint scanner and then features are extracted based on ridges and valleys of the finger. Later, these features are used to identify and authenticate an individual. Among all biometric techniques, fingerprint recognition is the most popular method and is widely used.

Advantages
Fingerprints of an individual develops at the age of about seven months and remains unchanged for the rest of the life. These characteristics do not change easily and so, can be used reliably for authentication.

Disadvantages
For some people it is intrusive, as it is still related to criminal identification.
Captured biometric data is large and needs compression to store efficiently.

Keystroke Rhythm Recognition
Each individual has his own typing rhythm and based on that biometric authentication can be done. The main features used in this technology are :

Latencies between two successive keystrokes.
Finger placement.
Pressure applied on the keys.
Overall typing speed.

Advantages
It is simple to implement and does not require any specialized hardware.

Disadvantages
Keystroke rhythm can be influenced by various circumstances like psycho-emotional state, hand injury, fatigueness of the individual etc. So, it has limited accuracy.

Challenges of Biometric Authentication

There are a couple of challenges of using biometric authentication :
If stored biometric data is compromised, it would be a major privacy concern. Biometric data of an individual, unlike other credentials like passwords or PINs, cannot be changed.
One has to make sure the collected biometric data is not influenced by noise or errors. Biometric systems must endure failures within a rational bound and give reliable results.

Are Biometric Systems vulnerable to hacking ?


Biometric system is still in its infancy and cannot be considered to be 100% secure. A biometric system can be compromised in a number of ways :

Attackers can use a backdoor to bypass authentication and gain unauthorized access of the system.
Attackers can provide facsimile of the actual biometrics to gain access. In the worst case, the attacker can use body parts not attached to the owner to gain access. A biometric system should be able to tell the difference between a live body part and an amputated one.
At the time of enrollment, biometric data of an individual is collected and stored in a database, so that it can later be compared with the collected biometric data for authentication. An attacker can perpetrate a Man-In-The-Middle Attack while storing the biometric data and manipulate the data to take advantage of that later.

So, biometric systems cannot be considered to be fully secure. However, two factor authentication comprising of biometric data of an individual and something you know like a password or PIN will increase the security to a great extent and provide effective countermeasures.

Biometrics and Privacy
Privacy is a big concern for biometrics. We have seen couple of incidences where the use of biometrics call for questions for privacy advocates. For example, using face recognition technology, one can monitor public places and use the scanned images to indentify known criminals. But, if the scanning is done without the knowledge of the public and utilizing a technology which is not fully understood for its impacts, then it is a big privacy concern.

Privacy concern also exists about how the biometric data stored in a database can be used. Using or sharing the biometric data without the individual's knowledge is also a big privacy concern.

Also, biometric systems should be safeguarded from fraudulent activities and data breaches. Biometrics of an individual, unlike other credentials, cannot be changed.

Applications of Biometrics

Biometrics are used in a number of places :

  • It is used in military programs.
  • To survey a busy place to identify known criminals.
  • To access accounts in banks.
  • For ATM transactions, using special purpose kiosks.
  • To secure online banking.
  • For PC or network access.
  • In air travel, to reduce the inspection processing time for authorized travellers.
  • To control travelers crossing the national or state border.
  • Some countries include biometric information in passports, in terms of barcode or smart chips.

So, no authentication system is fully secure. But, biometrics if used responsibly with caution, can enhance security to a large extent. This article just gave some basic information on biometrics. Hope you liked it.
Read more

Tuesday, 21 June 2016

How to stop Startup Services Forever?



How to stop Startup Services Forever?

Hello visitors welcome to iSoft and Hack. todays article about how to stop startup services in windows. whenever you install a new software, it install some of its components with it and you don't notice it and it'll run in background data. this will slow down your computer's speed, sometimes it'll create annoying error that can't be stopped and your computer will shutdown automatically. but if you uninstall those components individually or delete it from the root folder of that software it cause to damage that software and it'll not be start correctly. so this trick is for you this trick will stop those services in startup but when you start the software all those services/components start automatically with their softwares but this time it'll not slow down your computer. and you'll be free from all errors and sudden restart. so lets start stopping these services.

Steps 1:
First of all stop all these services from Task Manager. for Task Manager Press CTRL + ALT + Delete on your keyboard.
Now Right Click On The Service You Want To Stop. And Click On End Process. See In Screen Shot. Stop All Those Services Which Are Started Automatically. Remember that never stop services of microsoft.


Step 2:
Now If You Have Windows XP. Click On Start Button And Click On Run And Type msconfig.exe. a screen will open.
To open this in windows 7, 8 And 10. Click on start button and then simply search for msconfig.exe and click on it.
Now go to Startup tab and stop all the services which you don't want to run in computer's startup. Here is a screen shot.

Now navigate to services and check hide all microsoft services. now you see that the list will reduce and there are the services which is not using microsoft. so uncheck also them. Click on apply.

Conclusion:
this is the simple trick to stop unwanted services from your computer. this trick will stop all your services which is started at computer's start up. basically this is not a trick this is a feature or we say that this is a tool in microsoft windows which can help you to stop services. this tool will never damage your computer.

Note: never go to boot tab if you don't know much about computer it will brick or crack your computers operating system and effect on windows. and your windows will not be start if you do something wrong in boot tab.
Read more

Monday, 20 June 2016

Change Your Folder Color In Windows

Hello Visitors Welcome To iSoft And Hack. today is i am back again with new trick. this trick is about how to change your folders color in windows? are you guys bored with your old color of your folders in windows. Microsoft Windows has been around since 1985, and one of the only things about it that hasn't changed is Windows Explorer (File Explorer in Windows 8). We still have the yellow folder tree-like structure. but today i am going to share this simple trick to change your old yellow color folder to any color you want. basically this is not a trick -- this is a software which change the folder color in windows. it is easy to use and it is very light and can be run on any platform.

Steps To Change The Folder Color In Your Windows:

Step 1:
First Of All You Need To Download The Software. Download Here

Step2:
After the software is downloaded to install the software. Now that you want to customize the folder, right-click on the folder. If you right-click on the folder, you here, a new option in the context menu look, called Colorize !. Now just go to the same place in another submenu will appear. Now you want to assign to this folder can select any color. here is a screenshot.


Conclusion:
The very first time you will be using this software while everyone use it, but is a free software, it’s just the implementation of the software will ask for your email id. By entering your e-mail account, you will need to confirm the activation, but no need to worry. With this software developers do not wish to share your e-mail id, even if you enter any email id will be automatically activated once the product because you can do it. If you want, you can enter any ID.
Read more

Friday, 17 June 2016

5 Useful Tips For Whatsapp


WhatsApp has become an important messaging app in phones of people. It has also allowed people to send data in an encrypted security. They have allowed internet calls too. But there are certain things that you would like to do in WhatsApp . The things are very small and can be smartly performed. So this article focuses on 5 simple but very useful whatsapp tricks

How to read a message in whats app without letting the sender know?
When you receive a WhatsApp message, you get a notification in the notification tray. Now without opening the message from their. Now go to settings tray (by sliding downwards the notification tray). Switch to flight mode. Now open whatsapp and read the message that you want to read. When done close whatsapp and disable the flight mode. The sender will not know whether you have read the message or not.

How to create shortcut of a whatsapp contact?
This can be used to create shortcut of a whatsapp contact which is used by you most frequently. Open whatsapp and go to chat view. Select the contact and go to menu > more > add shortcut. Thats it , the shortcut is ready.

How to send a message to all contacts in whatsapp?
In whatsit tap the menu button to open main menu. Tap on new broadcast and then tap on the plus (+) sign to select all the contacts that you need to send message. Tap on done and then select create option. Type the message in the screen and hit the send button.

How to know when the receiver read your message?
You can easily know whether the receiver has read your message or not, as the double tick marks turn blue.But what if you want to know exact time when the receiver read your message. Just long press on the message and thats it.The simple trick will tell you when the receiver actually read your message.

How to schedule whatsapp messages?
download whatsapp message scheduler lite from google play store.Open the app and it will have 2 buttons at bottom. Go to pending messages option and click new message icon. write the number and message that you want o schedule. Enter date and time for the message.

Read more

Sunday, 5 June 2016

Android Play Store Not Working Or Opening

Google play store is one of the most important and best app store for android. However, sometimes it stops working for many reasons. Below are some fixes for play store not working issue.

Some common reason for "Google play store not working"

Outdated application
Network problems
Using 3rd part application for hacking purposes
Incorrect date and time
Other issues with your ROM.


1.) Clear cache and data of Play store
Cache feature is to save your time and bandwidth. And to serve the best apps of your need. However, sometime it causes some error. So clear cache in

  •   Settings-> App manager-> Play store.
  • clear cache to fix google play store error


2.) Correct date and time of your android device.
Sometime many people set their device time at future or past to cheat some games (me too). And for that reason Google play service start facing issue. This is one the reason behind "no connection" issue. To change Go to

  • Settings-> Date and time -> Check the Automatic date&time




3.) Uninstall Updates of Play store
Sometime, the updates cause the issue. If you facing the issue after an update, try to uninstall update. T o uninstall Go to

  • Settings-> Apps/App manager --> Play store --> Uninstall update

To find the version right behind that update version, Go to APKMirror and download suitable version.
uninstall updates of play store to fix the issue


4.) Check your Download manger
Play store Download all apps with download manager. And what if the background data of download manager is restricted. And if your Download manger is disabled. In both case its impossible to download any app.
To enable

  • Settings--> apps --> Download manager--> enable
  • To remove restriction of background data
  • Settings--> Data usage --> Download manager --> Un-check background data



5.) Update Google play services
Google play services is like the soul of Android. So keep it up to date. By default Google play service update automatically but sometimes the background data is disabled which stop it from update.

6.) Reset your Google account
If all of process are not working then remove and add your Google account. To do this Goto:

  • Settings--> Accounts--> Google--> Tap on menu button or three dots at top corner. --> Remove account.

To add it again tap on create a account.
reset google account to fix google play store


7.) Edit host file
Warning: This method need root and only for advance users. 
1. Download Total Commander from Play Store or click HERE.
2. Install it
3. Open Total Commander and Go to Root of System. (/ )
4. Open the etc folder.
5. Find the file named "hosts", and hold it for 3 seconds. Choose edit file, and choose Total Commander Text Editor if prompted.
6. Delete everything and paste this at the first line: " 127.0.0.1 localhost".
7. Save the file (Overwrite).

Conclusion:-
So here are all possible fixes for "Google play store not working". If you facing any problem than this tips and tricks will help you. I recommend the last one step to rooted users, as it need less time and have a success rate of 99%

If you have any problem then please comment. we're feel great to help.
Read more

Thursday, 2 June 2016

Remove Bios Password Easily


How can I remove Bios Password easily?

In this post you can learn how to remove bios password  easily.

What is BIOS?
Bios Stand For Basic Input/Output System. It Is A Firmware that is necessary to start a PC. the bios is used in all computers and laptops,The fundamental purposes of the BIOS in modern PCs are to initialize and test the system hardware components, and to load a boot loader or an operating system from a mass memory device. The BIOS additionally provides an abstraction layer for the hardware, i.e., a consistent way for application programs and operating systems to interact with the keyboard, display, and other input/output (I/O) devices. Variations in the system hardware are hidden by the BIOS from programs that use BIOS services instead of directly accessing the hardware.

What Occurred If I Forgot My BIOS Password?
If you set a password for your bios and you forgot the password. it'll caused great loss to you in some cases the PC would not start and just be a useless machine. many computers will start but you can't add any new hardware or OS in your computer.so many people search about how to remove the bios password easily? if you're also searching for this topic then you're at right place. i am going start the process of password remove from your bios.


Press “Del” = for Bios setup

Press “F12” : for Boot menu options etc.

When you press “Del” button so you can see your computer “prepare being setup”. Some time later you can see the Bios menu options. You can see many options like below>>
  • MB intelligent setup
  • Standard CMOS Feature
  • Advanced Bios Features
  • Advanced Chipset Features
  • Integrated Peripherals
  • Power Management Setup
  • PCI Configurations
  • And others options. I have just select in the “Gigabyte” motherboard bios menu options.
When you want to install the window operating system this time you have need to change some settings in on Bios .This time you have need to select on “Advanced Bios Features” option. This time you can see many options under the “Advanced Bios Features” menu.

These settings in below

Bootable options

Or

Change boot menu or change first device option.
If you want to setup or install any kinds of operating system on your computer so you have need to select on “First Boot Device” option under the “Advanced Bios Features” option .This time you have need to select on “CD/DVD” drive on the “First Boot Device” option. And then save the setting and exit for setup operating system.

This time you can able to setup operating system in your computer easily. Without the “Advanced Bios Features” option , you can see many others options in the Bios menu. All these option I very essential to operate computer.

This is called Bios!

If you setup Bios” password for your security .But you have lost or forget the Bios passwords. Other site you have need to setup the operating system emergency. But you have lost you password. So what can you do ?

This time you can’t able to setup operating system on your computer. What a bothersome problem!!!

Don’t worry !!!

I help you to broke or remove or disable the bios password easily. No require any kinds of software and no require to know programming language.

Just follow my some steps to disable the Bios Password easily….

So let’s go to our main point.

1st steps:

At first disconnect all electric connection and then open your CPU catching very carefully.

2nd step:

When you have opened the CPU catching, this time you can see many hardware in your computer. Now just open the battery from the Motherboard.

3rd and final steps:

When you have unplug the battery form the Computer motherboard , now just wait some movement and insert the battery in his place.

Insert the battery on this exact place after some time of unplug.

Now connect your all electric connection in your computer. Then press power button and then press “Del” button from your keyboard.

Now what can you see!!!!!!

Your Bios function opened easily without any password!!!! Now setup your personal password again and try to remember it. If you forget it again so no problem!!!

Follow this post again and reset Bios password easily. If you follow all steps in this post so you can also able to remove or disable the Bios password from your laptop easily.

How is this post?

Please leave a comment and never forget to share this post in your friends circle.

Keep a visit from your precious site to our site to check out new amazing tricks
Read more

Watch Torrent Movies Without Downloading


Torrent is growing nowadays. it connect through a p2p network. people use torrent file to download movies and games because its easy to use and founded easily. over internet because there are lots of site for torrent. the extension for torrent is .torrent. you can also download the torrent files using u torrent  or BitTorrent. because they are fast and easy to use. but what about if you can watch the torrent videos online without downloading it. and wait for hours (depends on your internet connection).
When the question “How to watch Torrent Videos without Downloading” arises, then Roxplayer is the bet response for this. Roxplayer is the current prevailing media player with imaginative and fascinated principle of streaming torrent files. This player help users to enjoy video files from torrent without downloading them on your system. It is to stream both for audio and video files. Another feature to check is the quality of the torrent file prior to downloading. Most of the torrent does not feature sample and after downloading we watch that either audio is not sync or video is not view-able. To avoid such kind of problems, copy the torrent magnet URL in the Roxplayer and judge the quality and choose whether to download the whole file or not.

How to Watch Torrent Movies Without Downloading

Roxplayer, an ultimate software application to watch movies without downloading. What to do firstly is to download and install it on your system PC. You are opening the player for the first time, you will watch a spick and span interface just as VLC Media Player.
Steps to Watch Torrent Movies Without Downloading:

Step 1: First of all download and install the roxplayer in your PC and then click on File menu and select Open Torrent option. It will show you further three options from which you have to select Torrent Magnet Link option.

Step 2: After clicking on .torrent magnet link, you will see a dialog box which asks you to paste the ink to the magnet URL.


Step 3: You can get the Magnet URL from maximum torrent sites. Here, we are using kickass.to, you can visit any movie or video torrent and then right click on the link below .

Step 4: Now paste the copied URL in the Roxplayer field and boom. It will start to get your torrent file.


Step 5: After few seconds, you will see the files in the torrent, just select the main movie file and double click on it. Roxplayer took 3-4 minutes for buffering while starting playing media without really downloading the file on your system.

Step 6: That’s it you are done, now the file will start playing and you can easily check the quality of the torrent file.
Read more

Wednesday, 1 June 2016

Fix There is a Problem Parsing the Package Error For Android

If You're An android owner then you have see this error ever. it is annoying error. if the error occurred you will not be able to install the specific application to your android. so i have thought over it and found the actual problem why the error is occurred so i am writing this complete guide to help other if they also get the same address. i am pretty sure that this article will help you if you got this error in your android mobile device also. there are many errors which are common in android and i'll discuss that error in my upcoming articles.


Reasons of There is a Problem Parsing the Package Error

You may get this Error Due to following Reasons:
The Downloaded .apk file is Currupted or not fully downloaded
You might have turned off “Allow installation of apps from Unknown Sources”
If the App is not Compatible with the Hardware or the Version of OS you are using.

How to Fix There is a Problem Parsing the Package Error
So Now that we know why There is a Problem Parsing the Package error occurs, we can now easily find a fix to this Problem.

1. Allowing Installation from Unknown Sources:

We tend to download .APK files from Google Play store but sometimes We even download it from unknown sources and hence android don’t Allow us to install the app.
One of the most Common fix to this problem is to Turn on “Allow installation of apps from unknown Sources”. To do so Follow the Below Simple steps

  • Go to your Device Setting Menu
  • Scroll down and Click on Applications
  • Now Check the Box of Unknown Sources to allow installation of non Market Applications

After Completing the Above Simple steps you may now try and install the app which was showing error.

2.Inspect Your APK File:

If the Above Fix do not work to fix the error then you may now try to inspect the apk file that you downloaded. Check it the file is Fully downloaded and is not Corrupted.

3.App is not Compatible with your Device or OS:

If you are still not able to Get rid of There is a Problem Parsing the Package Error then it clearly indicates that the file that you have downloaded is not Compatible with your Device hardware or Operating System.
Try to Install it on another Android Device which has better hardware and Higher Version of Android Installed in it.

Conclusion:

So these were Some of the Fixes that will help you to Tackle with the There is a Problem Parsing the Package Error Message. if these Methods works for you or you have any other solution to this Problem then Feel free to share it with Us in Comments below.
Read more

Free Calls Worldwide

Hello guys today's article is about how to make free international calls. as you know guys that its too costly to make international calls from your mobile. and also sometime the call will drop down due to signal and connectivity problem. and you lost your credit without talking with your relative. and you feel worst and disappointed with your network courier. nowadays most of abroad people use Skype or Facebook to connect with their loves and relatives but it'll not goes right all the time. what about if the person's internet connection is not working properly and also it'll suck all the data.Have you ever thought of making a free call to your friends or relatives in abroad? Sounds good right! Now we have brought you the best ways to make free international calls from PC/Laptop to mobile. By using these simple tricks you can save your money in making international calls. So let’s have a look over the best ways to make free international calls from PC / Laptop to mobile.

How to Call For Free From Internet To Mobile Number/Landline Number?
If you want to make free international call you just need these things.
  1. A Good Speed Internet Connection.
  2. Microphone.
  3. And A Best Web Browser (It Doesn't Matter All Time)
Now Follow These Steps:
  • Just go to this website
  • Put the Code And Remeber to put the country code
  • Now just click on the call button your call will be placed.
  • you'll have 5 free minutes to call with the person after that use a proxy to get the 5 minutes again.
Conclusion:
Above is the steps for free call from internet or PC to mobile or landline number. now what are you waiting for just follow these steps and call to your relative or any other person from internet.

Like share and comment if you found this article helpful to you. comment if you have any problem. we're feel glad to help you.
Read more

How to Unlock Password Protected Memory Cards Without Formatting



How to Unlock Password Protected Memory Cards Without Formatting

The memory card is one of the best inventions for this modern generation. It is a small drive to store our large digital files. The use of Memory card/SD-card has increased dramatically in last 2 years. Peoples are using a memory card to store their files like music, videos, images, important documents or so on. When there are all data stores on a small device so everyone tries to protect it from others. And using a password is a best way to protect it from unauthorized access.

While a password is the best way to protect our SD-card, at the same time it also creates problem when we forget it. Forgetting memory card password has become a common problem for most of the people. And after forgetting password, we will lose the access to the whole memory card and its data.

Remove memory card password - easy way
After forgetting our password, we start searching for “How To Remove Memory Card Password”. While searching, we often come to know about some memory card password remover tools that claims to remove password from memory card. There is a number of memory card password Unlocker tool available on the web, but most of them didn’t work and some are paid. If you are one of them who searching for a genuine way to Remove memory card password, then this article is for you. Here I will share some basic and easy methods on How to Remove Memory Card Password without using any software.


How To Remove Memory Card Password With PC?
Below are the some basic methods to remove the memory card password with the help of a PC.

First Method:

For Android Users.
If you are using an Android device, then follow the below steps to remove memory card password.


  • First of all download ES file explorer from the store and open it.
  • Go to system folder and locate for a file named mmcstore.
  • Then send that file to your PC or laptop via data cable or via any other way.
  • Open that file with notepad on your PC.
  • After opening the file, you will able to see your password there.
  • Now apply that password to open your locked memory card.

Second Method:
If the above method is not working, then you can follow this method. Follow this method when you only want to recover memory card, because with this method we are going to format the memory card.


  • Firstly insert that locked the memory card to your phone.
  • Now connect your phone to the PC via data cable.
  • Now right click on the memory card drive and then select the format. (It will not ask for password)
  • After formatting your memory card, your memory card will be unlocked.
  • Note– Use this method only when you don’t have any other choice, as this method will delete all of your data.


Third Method: 

If you are not an android user then you can follow this method. To use this method you need to arrange a nokia s60 device and then follow the below steps.  Hay Day for PC.


  • Firstly, download any File Explorer app and install it. (Use FExplorer for Better result)
  • Now insert your locked memory card in it. (Don’t open)
  • Then run File Explorer, and go to the path C:system.
  • Here you will find a file named mmcstore.
  • Rename mmcstore to mmcstore.txt 
  • Connect your phone to the PC via data cable and transfer that file to your PC.
  • Open that file (mmcstore.txt) with notepad.
  • Here you will able to see your Password.
How to Remove Memory Card Password Without a PC?

Fourth Method:

To use this method you have to arrange a Nokia N series or a Nokia E series phone.


  • Insert your locked memory card in Nokia N series or Nokia E series phone.
  • And then format it (It will not ask for password)
  • Your memory card will unlock. But in this process, you will lose all of your data.
  • Note– It is strongly recommended to use nokia N series or E series phone. If you want, then you can also use other phone, but on your own risk.


Conclusion
So we are at the end of this tutorial on How to remove memory card password. I think the above 4 methods are very basic and effective way to remove memory card password. If you are facing problem in any methods, then try another one, you will surely get success.

So how you liked this article? Do you know any other basic way to remove the password from memory card? Then share with us in the below comment section. If you think this post has helped you then you can show your love by sharing this article with your friends.
Read more

Restore Lost or Deleted Contacts on Android Using Gmail


Restore Lost or Deleted Contacts on Android Using Gmail
In you android device when you fill up your google account in it then all your android data including your contacts get sync with your google and if you had lost your contacts, then you can revert them back. You just have to follow some simple steps to proceed.

 

Step 1. First of all open the link https://www.google.com/contacts/ in your browser. Now login with your google account that you have registered in your android device.
Step 2. Now there you will see all your contacts listed, even the contacts that might get accidently deleted by you. Now you can explore any of your contacts and save them in your android.
Also, when you sync the same google account with your android again the all your contacts will get automatically restore.

keep visiting and share. comment if you have any problem
Read more

Sunday, 29 May 2016

Find Out Hidden CCTV Security Camer.



Closed-circuit television (CCTV), also known as video surveillance, is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly transmitted, though it may employ point to point (P2P), point to multipoint, or mesh wireless links. Though almost all video cameras fit this definition, the term is most often applied to those used for surveillance in areas that may need monitoring such as banks, casinos, airports, military installations, and convenience stores. Videotelephony is seldom called "CCTV" but the use of video in distance education, where it is an important tool, is often so called.

In industrial plants, CCTV equipment may be used to observe parts of a process from a central control room, for example when the environment is not suitable for humans. CCTV systems may operate continuously or only as required to monitor a particular event. A more advanced form of CCTV, utilizing digital video recorders (DVRs), provides recording for possibly many years, with a variety of quality and performance options and extra features (such as motion detection and email alerts). More recently, decentralized IP cameras, some equipped with megapixel sensors, support recording directly to network-attached storage devices, or internal flash for completely stand-alone operation. Surveillance of the public using CCTV is particularly common in many areas around the world. In recent years, the use of body worn video cameras has been introduced as a new form of surveillance.
The first CCTV system was installed by Siemens AG at Test Stand VII in Peenemünde, Germany in 1942, for observing the launch of V-2 rockets. The noted German engineer Walter Bruch, Wayne Cox, and Tashara Arnold were responsible for the technological design and installation of the system.

In the U.S. the first commercial closed-circuit television system became available in 1949, called Vericon. Very little is known about Vericon except it was advertised as not requiring a government permit. Marie Van Brittan Brown invented the home security system. The patent was granted in 1969. Brown's system had a set of 4 peep-holes and a camera that could slide up and down to look through each one. The system included a device that enabled a homeowner to use a television set to view the person at the door and hear the caller's voice.


How To Find Hidden Cameras?

In todays modern world everywhere hidden or cctv cameras are attached. its good to place a cctv or hidden camera for security. but some of people using it in wrong way e.g: blackmailing, if you go to a hotel for holiday or honeymoon some hotel placed a security camera which they used to blackmail you.
so how to know that there is a hidden camera?
its so simple just turn all the room lights off, then closed the door and windows now open your mobiles camera remember that you have to put the flash light off now navigate the camera everywhere in the room. wherever you see the red dot. it means that there is a hidden camera.

so beware to this blackmaling, because most of cases are made and life lost cause of this blackmaling.

keep visiting my blog and share my articles.

hope you like this
Read more

Sunday, 22 May 2016

Block Any Website Without Any Software


There are lots of website which you don't want to be opened in your computers specially if your PC is at home and you're willing to block all that website which is not better for your family. many men don't allow their family to use any social networking website in that case they buy costly software or find software over internet that are free. a lot of software were not work correctly or can be removed by uninstalling it and blocked website were accessible again. but what about if you can do this without buying or downloading any software. its simple to block desire websites which you don't want to access it.
Want to block a website on your computer, then you just follow the simple step which is shown below. In this article you have to learn how to block any website with-out any software.
Follow the steps:

Step-1:
At first Open “Run” from the start menu or press WinKey + R. Just copy paste the following path and press ENTER.
notepad %windir%\system32\drivers\etc\hosts
or
 Go to C:\Windows\System32\Drivers\Etc and find the file “hosts”. Then open with notepad file.

Opening hosts file

Step-2:
When this hosts file is opened in Notepad, at the end of the file you will see something like “127.0.0.1 localhost”.

Step-3:
Under “127.0.0.1 localhost” just add another website URL that you want to block.
For Example:-
127.0.0.1 localhost
127.0.0.2 www.youtube.com
127.0.0.3 www.allgovtjobs.in

Step-4:
Make sure every time you add another website, the last digit of the address 127.0.0.x should not be the same.

Step-5:
Save the file and exit.

So, here you go. Restart your browser if it is opened and changes will take place immediately.
The good thing is that no message, no pop ups nothing will be displayed when someone tries to open a blocked website. Your browser will just fail to open those websites without any error messages.

Keep visiting my website and share my articles if you like. comment if you have any questions
Read more

Matrix Falling Code Effect - Notepad CMD



This trick is an awesome, look like real matrix. It’s inspired by the matrix movie, this is known as falling code trick and it’s extremely popular on social networking websites. At first open notepad and then copy and paste the following code below, and then save it with the file name“Matrix.bat”. Go to your save location and run this batch file which is created by you.

i). Open notepad ® Copy and paste following code below:

@echo off
color 02
:tricks
echo %random%%random%%random%%random%%random%%random%%random%%random%
goto tricks

ii). Then save it “matrix.bat” filename extensions.

Matrix Falling Code Effect - Notepad Trick



iii). Now go to your save location and run it to see what happen.

Read more