Posts

Showing posts from 2017

What is Happiness?

Hi Guys, After a long time I am writing this post. Actually, I am busy in my studies But something happened with me which I want to share with You. Today I understood what is happiness. Today at 1:30 PM, I was looking for a food stall on a road. I was very Hungry because I didn't have breakfast. I couldn't find any shop and suddenly I saw a cake shop. I know this is not the right place where a person can go when they hungry. But I had no choice, So I decided to go. When I was entering into shop, a girl having age 6-7 yrs stopped me and beg some money. I asked why you need money then she gave a gesture that she was hungry [ actually I was talking in hindi and that girl don't know hindi. she knew only local language that's why she gave gesture]. I told that I will not give you money but I can give you food, is it ok? then she replied Yes. [she shook her head and answered]. Then I entered in shop and suddenly noticed that I don't have much money. Ohh Damn! I for

What’s difference between HTML and HTTP ?

Image
Many folks get confused between these two terms which are associated with the Web. Are they really same? First thing first. HTML is a Language while HTTP is a Protocol. Doesn’t make much sense..? it’s okay! We’ll discuss it in more detail. HTML ( H yper t ext M arkup L anguage) is a language for marking the normal text so that it gets converted into hypertext. Again, not so clear. Basically, HTML tags (e.g. “<head>”, “<body>” etc.) are used to tag or mark normal text so that it becomes hypertext and several hypertext pages can be interlinked with each other resulting in the Web. Please note that the HTML tags are used to help render web pages as well in the Browser. On the contrary, HTTP ( H yper t ext T ransfer P rotocol) is a protocol for transferring the hypertext pages from Web Server to Web Browser. For exchanging web pages between Server and Browser, an HTTP session is setup using protocol methods (e.g. GET, POST etc.). This would be expl

How to disable auto-playing videos in the Facebook mobile app

Image
It seems like Facebook is constantly making changes to our newsfeeds. Every once in a while they’ll make a change I actually like, but most of their changes end up irritating me in some way. One of the changes I detest most is how videos now start playing automatically when they scroll into view on our newsfeeds. There are three options for controlling auto-playing videos in the mobile app:  On , Wi-Fi only or Off . Simply follow the steps below for your device to select the auto-play option of your choice for your newsfeed. Also Read : How to Use your old smart phone as a wireless security camera To disable auto-playing videos in the Android Facebook app: 1 – Tap the  Menu icon (it looks like three horizontal lines stacked atop once another). 2 – Scroll down and tap App Settings . 3 – Tap Video Autoplay . 4 – Select  one of the available options for preventing auto-play. To disable auto-playing videos in the iOS Facebook app: 1 – Tap the Menu icon (it

How to Use your old smart phone as a wireless security camera

Image
Like most households these days, yours probably has one or more old smart phones that have been retired to a junk drawer after upgrading, but a simple downloaded app can turn them all into wireless security cameras! Just download and install the app, mount the phone where it can “see” the area you wish to monitor, then view everything that happens there via the browser on any computer or active smart phone.  IP Webcam is a great app that uses your old phone’s camera to capture and send streaming video directly to any web browser in the world. Android users can download the app from the Google Play Store for free. If you have an old iPhone laying around you can download it from iTunes . Also Read :  How to find a misplaced phone when you don’t have another phone to call it with The app is easy to install, set up and use. Simply download, install and run the app, then place the phone with the camera facing the area you wish to monitor. You’ll need to enter your

How to charge your Apple devices with any standard microUSB charger

Image
Have you ever needed to charge your iPhone, iPad or iPod only to discover that you forgot to bring your lightning cable or charger with you? If so, you’ll be glad to know there’s a simple way to charge all of your lightning compatible Apple devices using a standard wall or car charger.  This nifty  AmazonBasics MicroUSB to Lightning Adapter will let you plug virtually any charger that’s equipped with a standard microUSB connector into your Apple device. It will even let you use a microUSB cable to transfer files between your device and your computer! In a nutshell, this tiny adapter lets you use whatever standard charger or microUSB cable that you happen to have on hand in place of your lightning cable. Pretty neat, huh? Here’s a photo that illustrates how it works: Also Read :  How to back up your iPhone, iPad or iPod Touch to your iCloud account Apple has always taken great pride in making products that are well-built and just a little bit different from the

How to broadcast a live event on Facebook using your smartphone or tablet

Image
Modern smartphones and tablets make it easy to document the world around us by taking photos and capturing video with just a couple of taps on the screen. We can then easily (and instantly) share those photos and videos with others by posting them on Facebook. Well, the folks at Facebook have taken the ability to share our videos to an entirely new level with an awesome feature called Facebook Live . Also Read : Accounts Locked: Facebook Kicking out the Users from Their Accounts In a nutshell, Facebook Live lets you record live audio and video of virtually any event in real time and share it on your Facebook Timeline so your Facebook friends can witness the event as it unfolds.  For example, you could easily broadcast a youngster’s first T-Ball game, a wedding or most any other live event right on your Timeline to allow those who are unable to attend the event in person to watch it with their own eyes, in real time. Your Facebook Live videos can be up to four h

How to find a misplaced phone when you don’t have another phone to call it with

Image
If you ask 100 people what’s the easiest way to find a cell phone that has been misplaced, chances are 99 of them will say call it with another phone and track it down by the ringtone. That does indeed work most of the time, but what if you don’t have another phone on hand to place the “locator” call from? Also Read :  Give your smartphone or tablet a fully functional clipboard Well, here’s one possible solution to your predicament: Visit a great website called WheresMyCellPhone.com and type in your lost phone’s number. The website will place a call to your lost phone, allowing you to track down its hiding place by listening to it ring. The service is free, and it works just as well as calling your lost phone from another telephone. What’s more, you don’t have to plead for assistance from your friends on Facebook! Pretty neat, huh? Like this post? If so, I hope you’ll consider sharing it with your friends.

Give your smartphone or tablet a fully functional clipboard

Image
Just like desktop and laptop computers, all smart phones and tablets have a rudimentary clipboard that allows you to “copy” and “paste” text from one app to another. Unfortunately, that’s about all you can do with it. Even worse, the contents of the clipboard are overwritten every time you “copy” something else. The good news is you can download a clipboard app that will give your phone a fully functional clipboard. Also Read :  How to back up your iPhone, iPad or iPod Touch to your iCloud account Most of the available apps allow you to copy and store multiple snippets which you can then paste into any app, at any time.  There are several great clipboard apps available for both iOS and Android devices. The ones I like best are Clipper (for Android) and Clips (for Apple iOS). Simply download the app that works with your device. Like this post? If so, I hope you’ll consider sharing it with your friends.

How to back up your iPhone, iPad or iPod Touch to your iCloud account

Image
Just as with a traditional laptop or desktop computer, it’s important to always have a current backup on hand for your mobile devices in case you ever have to restore your files. Thanks to Apple’s popular cloud storage service known as iCloud, keeping your iPhone, iPad or iPod Touch backed up is as easy as 1-2-3. And trust me, there will come a time when you will need it. Here’s how to enable automatic iCloud backups on your Apple device:  1 – Connect your device to a Wi-Fi network. 2 – Tap the Settings icon to launch the Settings app. 3 – Tap the iCloud icon. 4 – Tap  Backup . 5 – Toggle the  iCloud Backup setting to the On position.   Also Read : Great news: You can install Adobe Lightroom on your iOS and Android devices for free! ICloud backups are now enabled on your device. The backup process will start automatically the next time your iPhone or iPad is plugged into a charger AND connected to a Wi-Fi network. Note: You can tap Back Up Now to start

Warning: Apple will soon start ‘analyzing’ your iCloud data and personal files

Image
Apple is planning to release iOS 10.3 before long, and with that update will come several significant changes to the operating system. I believe most of those changes will be good ones, but there’s one that concerns me. Beginning with iOS 10.3, Apple will start “analyzing” your iCloud data to “help them improve intelligent features and services such as Siri and other similar or related services. ” In a nutshell, that means Apple will soon start scanning your email, your notes, your contacts, your photos, your calendar, Keychain, Find My iPhone, your iTunes items and all the various files you have stored on iCloud.  What’s more, if your device is running the recently released iOS 10.3 beta, they’re already scanning those items from your iCloud account as we speak. You might disagree, but this new “iCloud Analytics” program sounds fairly ominous to me. Of course Apple is promising to “analyze” your most personal data with only the best of intentions, and I have no dou

Great news: You can install Adobe Lightroom on your iOS and Android devices for free!

Image
Adobe Lightroom has long been recognized as one of the world’s best photo editing programs. In fact, I often recommend it over the full-blown Adobe Photoshop program for those who don’t really need Photoshop’s powerful graphic design capabilities. In a nutshell, Lightroom is a lean, yet powerful program that includes all the best image editing capabilities of Photoshop without all the extras that many users will never need or use. While Lightroom is a lot cheaper than Photoshop, if you want to install it on your computer it’ll still cost you a considerable amount in most cases. But now you can install it on your mobile device for free!  Adobe’s free Lightroom app lets you edit photos like a pro right on your iOS or Android phone or tablet. It’s packed with many of the full-blown Lightroom program’s features and capabilities, including support for RAW files. With the Lightroom app, you’ll be able to manage the entire creative process, all the way from taking a ph

7 Great Ways to Reduce Your PC’s Power Consumption Immediately

Image

Streaming vs. Downloading: Which One Should You Use

Image
When you see a movie or an audio file online, you can either stream it live or download it locally and watch/listen to it from there. If you are on an unmetered broadband plan, you hardly care about bandwidth, but if you pay per use, or if you are the owner of a website with lots of videos/audios, then you are probably wondering if streaming an online video/audio consumes more data than downloading the file outright. 1. What Is Streaming and What Is Downloading? First, let’s make sure we have the same idea about what streaming and downloading are. When you download a file, you copy it from the Internet onto your local device. You physically have the file, the whole of it, at your disposal. You can play it as many times you like. When you stream a file, you don’t physically have it on your computer. The file is somewhere on a server, and you are receiving portions (i.e. streams of data) of it at a time. Streaming is very similar to listening to the radio or watch

Information Security

Image
My last post is about Iot . In which I have introduced you all about Iot but the main problem is arising with this technology is Security. When we connect all objects with internet ( Iot technology ) then what about our security? Is it be secure? If yes then Okay but what will we do if answer is NO. In this post we will learn about how we our information on internet will be secure in Iot technology. This process to make user's information secure is known as Information Security i.e. the state of being protected against the unauthorized use of information, especially electronic data, or the measures taken to achieve this. In the short form it is also known as InfoSec ( Info rmation Sec urity). How it Works? Whatever a user gives information to internet it is in Plain Text. If  unfortunately any unauthorized user got your information in Plain Text then they will know everything whatever information present in it and your security will not be secure. So, to remove this proble

Internet Of Things (IoT)

Image
Today I attended a seminar on Iot and I got a lot of information about it. I like to share this information to all of you. Iot stands for Internet Of Things i.e it is a ecosystem of connected physical object that are accessible through internet. this system is not like connected device, it is like connected device with intelligency. Iot is vast network of devices connected to the Internet, including smart phones and tablets and almost anything with a sensor on it – cars, machines in production plants, jet engines, oil drills, wearable devices, and more. These “things” collect and exchange data. Machine-to-machine (M2M) technology behind it – are bringing a kind of “super visibility” to nearly every industry. Imagine utilities and telcos that can predict and prevent service outages, airlines that can remotely monitor and optimise plane performance. The business possibilities are endless with it. Needless to say that the current hype around the Internet of Things (IoT) is

Dhanush missile: All you need to know

Image
Yesterday, I have attended a study tour at  Defence Research & Development Organisation(DRDO), Chandipur, Balasore, Odisha. Where i know a lot about missiles. I am going to share with you about One of them Which is Dhanush. So let us know some of it. Dhanush is a naval version of the nuclear-capable ballistic missile Prithvi which has been developed for the Indian Navy. The Missile was test-fired successfully on 5 October 2012, on 23 November 2013, 9 April 2015, and 24 November 2015 from Indian Navy ship INS Subhadra (P51) in the Bay of Bengal off the Orissa coast. The missile gives the Indian Navy capability to strike enemy targets with great precision. It is one of the five missile developed by Defence Research & Development Organisation ( DRDO ), under the Integrated Guided Missile Development Programme ( IGMDP ). Here are key points you need to know: 1. The Strategic Force Command (SFC) of the defence force organised the launch at the Chadipur Integrated Test

What is Doxing???? How it works????

Image
Doxing simply refers to the process of gathering or deducing other people’s information such as name, age, email, address, telephone number, photographs etc. using publicly available sources such as the Internet. Doxing is done by initially taking a piece of information (such as “name” or “email address”) and keeping it as a base to find out other possible details about the person. The term “doxing” is derived from the word “document tracing” which means to retrieve documents about a particular person or company in order to learn more about them. It can be slightly irritating and embarrassing when private data fall in the hands of people who are not intended to have access to such information. However, things can go even worse if the doxed information such as a person’s social activities, medical history, sexual preference and other vital bits of information is made public. This can have a serious threat to health, livelihood or relationship of the victim. Doxing

How to Remove Shortcut Virus from Your Pen Drive.

Image
When we insert any USB drive (Pen drive or flash drive) to our system then often we get a shortcut of that USB drive and we cannot access our document present in that USB drive. It is Ok if we have not any important file in our USB drive But what will we do if any important file present in that USB drive? How we can get back our important document from that USB drive? SO, today I am going to solve this problem. I am going to tell you a trick from which you can get access your all files present in that USB drive and you can remove that Shortcut Virus from your USB drive. To remove Shortcut virus from your Pen Drive We have two methods but first of all you have to insert that Pen drive in your system and follow methods given below Remove Shortcut Virus By Using CMD [Method 1] you can simply remove shortcut virus from your PC/laptop or pendrive by using a command prompt (CMD). Even if you are a non-techy person then also you can easily remove shortcut virus from your pendriv

Use Two or More Internet Connection at Same Time With Faster Speed

Image
In this post I am sharing specially awesome tricks for you. Many people search many time for how to increase speed of internet connection . Now, here is share articles for use two or more internet connection at same time. So you can use double speed and that way you can use fast internet speed. You can also connect more than two connection with this tricks. Here is given tricks which you never see in your life. You can increase Internet connection speed with use of Connectify Dispatch Software. Connectify Dispatch software is high powerful software which is allow you to connect more internet connection source at simultaneously. Also many people try to connect more internet connection like one connection use from mobile dial up connection and one connection used with dongle. You can do it but never use of two connection with this. Because Internet Protocol only access from last connected internet when your one internet connection will be unused.   But, With use of Conn

Connect WiFi Without Enter Password ( QR Code Scanner )

Image
Many people try to search on Google for WiFi password trick and many wifi related search. In many post are also available related wifi but most of the post are not working and fake post for wifi password. WiFI very useful for connect internet. Today, many place have WiFi Router and you may be also use WiFi router. In this post, we share to you for connect WiFI without enter password. You not need to enter any key for connect to your WiFi. Here is given post for how to connect WiFi without enter password. You not need to enter any password or key for connect WiFi. Many time if you have WiFi router and your Friends or other person like guest come to your home. At that time they want to use your WiFi and asked for WiFI password. At that time if you want to not shared WiFi password but given access to Internet than you can use this trick. You can share your internet connection and connect to your WiFi without given password to other people. You just need to share only QR C

How to Remotely Sign Out of Gmail on Multiple Device

Image
There are many situations when we forget to Sign Out our Gmail account on ant other device like on friends mobile, colleagues system etc. Then there is a chance to misuse your Gmail account by your friends or colleagues. So in this post I will tell you that how you can secure your Gmail account by Sign Out your Gmail account from another device to every device i.e. If you forget to Sign Out your Gmail account on your friends Mobile or System then you can easily Sign Out your account without using your friends System or mobile. This process is known as Remotely Sign Out of Gmail account. For Sign Out you have to follow these steps :- 1.  Just Log in to your Gmail account in any browser on any System. 2.  Scroll to the bottom of your inbox and just below the last of your received email, to the right, is a section detailing your "Last account activity" alongside a link for more "Details". 3. Click on details and a new window will popup up wi

HTTrack???? How to download a website?????

Image
Today I am going to share with you about a software from which you can save any website for lifetime. When you come across any useful site, you generally love to read the articles and may save them to your computer for future reference. But if you are a kind of person like downloading the entire website to your computer so that you can access it whenever you want, then this article is for you. In this article, I’ll show you how to download a website using HTTrack . HTTrack is an open source and easy to use offline browser utility. It enables us to download any site to our computer by getting HTML, images and other files from server to our local computer. Well! Let us see How to use HTTrack Website copier . To download a site using HTTrack , follow these simple steps. First you need to download HTTrack software . It’s a free tool and you can get it  Here After the software is downloaded, install it on your computer and launch the software. You can see a window same as belo

What is MAC Address? MAC Address Spoofing?

Image
We always listen about MAC address  but we never tried to know what it is. So friends today i will tell you about what it is. MAC address is stands for Media Access Control address. It is a physical address which is set by the company factory when Our electronic device (Smartphone, laptop etc) is made for identification. It is permanent Means It cannot be changed at any cost normally. But at sometime it can be changed which is known as MAC Spoofing. Spoofing your MAC address is legal and can be done safely within Windows without any external software. If you use this to spoof you MAC address for Malicious purposes I cannot be held responsible. To change MAC address of any pc you have to follow these steps Step 1 :- Finding the device that you want to Spoof  -   The first step in spoofing your MAC address is to find the network interface device that you want to spoof. Go to Start>Control Panel>Network Connection. Then double click on the device that you want to spoof. T

HTTP Vs HTTPS ? Online Security? SSL Certificate? SSL Encryption?

Image
We all are using internet everytime But we got confused when our favourite website address are not in same format, some times it was HTTP in starting of address or sometimes it was in HTTPS. So today i am going to tell you about what is the main difference between both of them and who is the better for you and how you can maintain your basic privacy on internet.Concept between both of them is very clear, Simple and exciting. If you understood this concept then you can escape your privacy from any hacker or attacker. Here http stands for Hyper Text Transfer Protocol. which is some set of rules on which internet is working and we can exchange any information frequently. Means whatever information we are sending on that website server or whatever information we are accessing from that website server is opened and link between our system to that web server is in plain text. If any hacker or attacker want to monitor your system and they are sniffing the packets which are goi

What Is SEO / Search Engine Optimization (SEO)???!

Image
Today I am going to share to all of you a technique from which you can be on the first page of any Search Engine Result Page (SERPs) i.e. Google, Yahoo, Bing etc. This technique is SEO which stands for Search Engine Optimization. Search engine optimization is a methodology of strategies, techniques and tactics used to increase the amount of visitors to a website by obtaining a high-ranking placement in the search results page of a search engine (SERP) -- including Google, Bing, Yahoo and other search engines. It is common practice for internet search users to not click through pages and pages of search results, so where a site ranks in a search results page is essential for directing more traffic toward the site. The higher a website naturally ranks in organic results of a search, the greater the chance that that site will be visited by a user.SEO helps to ensure that a site is accessible to a search engine and improves the chances that the site will be found by the search engine.