Friday, November 28, 2014

Android 5.0 (Lollipop): 16 new features

After what feels like a long time since we saw the L Preview first appear, Google is now rolling out the final version of Android 5.0 Lollipop to its existing Nexus devices, and it also appears on the brand new Nexus 6 and Nexus 9 gadgets. Get to know the best version of Android yet by working through this selection of tips and tricks, covering all of the major and minor new features that are built into the operating system.
Tap and go

When you're setting up your new Lollipop device for the first time, you'll be presented with the option to "tap and go." This NFC-and-Bluetooth-powered data transfer lets you move all of your Google Account details, configuration settings, data and apps over to a new device just by placing your old phone or tablet against it. Widgets and wallpaper are swapped over as well.
Use the flashlight
Flashlight apps have always been popular on Android, so Google has decided to roll one into Lollipop to save you the trouble of having download a third-party one. Pull down the notification drawer then tap the top bar to reveal the flashlight app alongside other options like airplane mode. The app will only appear if your device has an LED flash alongside its camera.
Prioritize your apps
Android 5.0 Lollipop lets you set up a list of important apps that are allowed to disturb you even when most aren't. Head to Settings -> Sound & notification -> App notifications and you can choose to block each app or mark it as a priority one. Tap the volume slider on your device to activate priority mode indefinitely or for one hour (a star will appear in the status bar).
Deal with notifications from the lock screen
In Lollipop all of your app notifications appear on the lock screen ready for viewing. Not only that, but you can interact with them as well. Swipe to dismiss, tap to reply and so on, depending on the app in question. A double-tap gets you into the relevant app. Head to Settings -> Sound & notification -> When device is locked if you want to hide sensitive alerts.
Pin apps
If you want to hand over your device to one of your kids or a friend, you can "pin" them inside one single app. First, activate the feature via Settings -> Security -> Screen pinning. Then, when you activate the multitasking screen via the square Overview button, you'll see a pin icon appear in the lower right-hand corner of the bottom app (drag it up if you can't see it).

Holding down the Back and Overview buttons is enough to exit the pinned mode and get back to other apps. When you activate the pin, you'll be asked if you want to use a code or pattern to unlock it. This is tied to the same protection applied to your device, so if your lock screen isn't protected by a code or pattern then the option won't appear when you're pinning apps.
Jump to app settings
The lock screen has been given a major overhaul with Android 5.0 Lollipop update, and the improvements include the ability to jump straight to an app's settings or information panel right from the lock screen. Long-press on any notification and (depending on the app) and you'll see a cog icon (the app settings shortcut) and an info icon (the app notification settings shortcut).
Predict battery life
New to Android 5.0 Lollipop is the ability to see how much time is left before the battery runs out of juice, or how long you need to wait before your device is fully charged up. Tap on the battery icon in the notification drawer to see either reading (the time-until-charged information also appears on the lock screen a few minutes after you've connected your device to a power source).
Search settings and networks
Google's search bar is getting more ubiquitous with each passing version of Android, and in Lollipop it's made it into the Settings app. Tap the magnifying glass icon to use it. It can be a quick way of finding a particular option you're looking for, especially if you don't already know what menu or heading it's under. You can use the same feature to bring up saved Wi-Fi networks too.
Enter Guest Mode
Sharing devices with other people (friends, colleagues, family members, distracted children) can be a real pain, but Lollipop's new Guest Mode eases it somewhat. You can access Guest Mode by dragging down the notification drawer, tapping on your user account avatar, and then selecting Add guest from the menu (or just Guest if you've been through the process before).
Improve text legibility
If you were wondering if the Accessibility menu within Settings would get overlooked in the Android 5.0 upgrade, there's a new experimental feature here called High Contrast Text. Essentially, it gives white or difficult-to-read text a black outline when it's being viewed on a light background. It's applied to the "OK Google" text inside the home screen search bar, for example.
Chromecast more quickly
There's an official Chromecast app from Google that lets you screencast from any device running Android 4.4.2 or higher, but the functionality is built right into Android 5.0, which is great news for anyone with one of the compact streaming dongles to hand. It's right in the notification drawer-tap on the Cast screen icon to locate your Chromecast and begin screencasting.
Add trusted devices
A trusted device is a specified Bluetooth or NFC-enabled gadget that will automatically disable the security code or pattern on your your Android phone or tablet when it's in range. This means you don't have to fiddle around unlocking the Lollipop device when you're at home or in the car, for example. Head to Settings -> Security -> Smart Lock to set up the feature.
Hang a 'do not disturb' sign
This works a little bit like the priority app notifications we mentioned earlier, but it's based around times and days more than apps. Go to Settings -> Sound & notification -> Interruptions to set it up — it's perhaps best used overnight when you don't want to be disturbed, but there is the option to let certain contacts through as well as messages and alarms, if necessary.
Get back to your apps after a reboot
If you reboot your device in any version of Android before 5.0, all of your recently opened apps will disappear. In Lollipop, they're still present on the Overview screen, so you can quickly get back to a previous conversation or website if you need to (not all apps will remember exactly where you were in the app). To remove a card from the list, swipe it away to the left or right.
Play Google's Flappy Bird clone
Like earlier versions of Android, Lollipop has an Easter egg to unlock. Go to Settings -> About phone then tap quickly four times on the Android version entry. Once the Lollipop graphic appears, tap quickly on it several times then finish with a long press to launch a clone of Flappy Bird with an Android robot in place of the bird. It's just as frustrating to play as the original too.
Save the battery
Android 5.0 Lollipop includes a built-in battery saver mode that you can get to kick in at 15%, 5% battery or never (you can also switch it on and off manually). It cuts off some background syncing and vibrations and makes various other tweaks as well. If you select Battery from the Settings app, you'll find the battery saver on the menu behind the three vertical dots.

Facebook's Latest Prank : Suggest Your Friends To Themselves

Have you ever got a friend request from yourself to yourself? Sounds weird and quite amazing, right? lemme explain this to you.Suggest your friends to yourself Chrome extension will suggest your friends to their own account. You can send friend request to yourself ! 



Your friends will start to think that someone may have created their fake account or someone may have succeeded to hack their account but that wrong ! You haven't been hacked or someone hasn't created your face profile, instead its a kind of bug of Facebook found out by a geek boy Dinesh Bhosale.. Your friends will go crazy when they will see that you suggested them to their own account.

YOU CAN DOWN THIS EXTENSION BY CLICKING HERE!

This extension is developed by Dinesh Bhosale.

This Prank Is Made For Fun, But Don't Take It Seriously, Enjoy It And Share With Your Friends And Make The Extension Popular :D

  1. It is just a prank and doesn't produce any harm.
  2. No Facebook bans and no data is saved by the extension.
  3. You can suggest your friends to themselves for any number of times without getting blocked or reported.
  4. Extension is 100% free and it works with all Facebook accounts.
  5. You can use this extension on infinite number of accounts.

Steps To Suggest Your Friends To Themselves

  1. Install Facebook social toolkit chrome extension from chrome web store.
  2. Start Facebook Social Toolkit chrome extension.
  3. Click on suggest friends to themselves button (as shown in the screenshot)
  4. Enjoy!

How Does It Work? 

Extension sends a confusing request to Facebook servers and that's how it works.

Wednesday, November 26, 2014

HOW TO USE A PENDRIVE AS A KEY TO START YOUR COMPUTER!!

             Hello friends,i am back with a another cool trick to hide and securr your some importand and private file/picture.
                  

Follow step :-

STEP  1: GOTO START AND TYPE "DISK MANAGEMENT"

STEP  2: PRESS ENTER

STEP  3: WATCH OUT FOR YOUR PENDRIVE NAME 

STEP  4: RIGHT CLICK ON IT AND CLICK ON "CHANGE DRIVE LETTERS OR PATHS"

STEP  5: ASSIGN IT "A" ALPHABET

STEP  6: NOW GO TO RUN PROMPT (WIN+R) AND TYPE "syskey" 

STEP  7: CLICK "UPDATE"

STEP  8: NOW CLICK ON "STORE STARTUP KEY ON FLOPPY DISK"

STEP  9: CLICK OK 

STEP 10: TO UNDO IT DO SAME PROCEDURE AND CLICK ON "SAVE STARTUP KEY                          LOCALLY"  



Any que. Or dout then write in comment 
& if u want any trick then also you can ask me…

Feel free to write comment :)
           

Monday, November 17, 2014

How To Recover Deleted Files From Hard Drive

                   When you delete any file in windows it goes to Recycle bin where you can easily restores it as it has restore option. But how you can recover your files when you delete it permanently (In windows by pressingShift+DEL) ?. Sometimes we accidently deletes photos, videos or important document files from your computer, USB drive, SD card or anything else then how can you recover it ? Well don’t worry about it there are many powerful file recovery software available on the internet which let you to recover permanently deleted files from your system. As I told you that there are a lots of  hard drive recovery services. But I searched around the internet and tested several recovery softwares so, now I’m going to tell you the top best disk/data recovery softwares.

How To Recover Deleted Files From Hard Drive

How To Recover Deleted Files From Hard Drive How To Recover Deleted Files From Hard Drive

1. Recuva

Recuva is one of the most popular and powerful file recovery tool for Windows. You will find it very easy to navigate because of it’s clean interface user-friendly options. It has following features :
  • Undelete files on your computer
  • Recover deleted emails
  • Securely delete files you want to erase forever
  • Restore unsaved Word documents
Recuva How To Recover Deleted Files From Hard Drive
Recovering files vis Recuva  is very easy you have to simply download and install the Recuva then after opening it now select what you want to restore. You can search for deleted Pictures, music, documents, videos, compressed files or emails. If you’re not sure about file name, just select ‘All Files’ option. Now select the file, either right-click on it press Recover button to recover it.

2. Panda Recovery

Panda recovery is the another best hard drive recovery service/tool for recovering files. It helps to recover deleted files from hard drive, USB, Network drives etc. It is best because of following features :
  • Browse, Search, Preview and Recover deleted files.
  • Recover Archived, Hidden, Encrypted, Compressed files.
  • Recover Images, Documents, Movies, or any other type of files.
  • Recover to Local Hard Drive, Network Drive, or Flash Drive.
panda recovery1 How To Recover Deleted Files From Hard Drive
The process of recovering files from Panda recovery is very simply you have to just follows wizard and its instructions.

3. Test Disk

This is also the one of best hard drive recovery service providing software. It is a powerful free data recovery software which helps to recover lost partitions andor make non-booting disks bootable again when these symptoms are caused by faulty software, certain types of viruses or human error (such as accidentally deleting your partition table). TestDisk is available for lots of operating systems, including Linux, Windows, and Mac OS, and supports lots of file systems. It has following features :
  • Fix partition table, recover deleted partition.
  • Rebuild NTFS boot sector.
  • Undelete files from FAT, exFAT, NTFS and ext2 file system.
  • Recover NTFS boot sector.
test disk1 How To Recover Deleted Files From Hard Drive
You need to be careful for using this and better to use on screen instructions while using it.

4. Reclai Me 

This is another data recovering software. It is simple tom use because if it’s user friendly interface more ever it can recover files under Windows (FAT16, FAT32, exFAT, NTFS, ReFS file systems), Linux (EXT2, EXT3, EXT4 and XFS file systems), Mac(HFS, HFS+ and UFS file systems). It has following features :
  • Undelete a single file or multiple files.
  • Unformat a hard drive (desktop and laptop).
  • Recover RAW file system drive.
  • Recover data in case of boot failure.
reclaime1 How To Recover Deleted Files From Hard Drive
Just simply follow on screen instruction to recover data using ReclaiMe.

5. Restoration

Last but not least, this one very simple to use. Restoration works with FAT and NTFS as well as digital cameras cards. It is also powerful tool for recovering lost/deleted data. It has following features :
  • Recover deleted files.
  • Undelete files.
  • Unformat a hard drive.
  • Photo recovery.
restoration1 How To Recover Deleted Files From Hard Drive
Just as others to use it simply follows the on screen instructions.
So, this is all about hard drive recovery service/tools. I hope this helped you a lot. If you are facing any problem just comment it below. Feel free to share Thanks !!

Saturday, November 15, 2014

How to Block Candy Crush Requests on Facebook

If you’re on Facebook ,chances are you have at least one friend that incessantly sends you invitations to play “Candy Crush Saga,” the smartphone puzzle game that has become the most popular game on the social networking site. The invites may come from ex-girlfriends (or ex-boyfriends), distant family members or childhood friends you haven’t spoken to in a decade — Candy Crush’s addictive allure knows no bounds.
Candy Crush makes money for its developer, King.com, by forcing users to pay for new levels, though users can get around this by inviting their Facebook friends to the game. Given the reward for sending invites, it’s unlikely you’ll ever get the Candy Crush addict in your social network to stop, but it turns out that there is a way to turn off Candy Crush announcements.
It’s hard to avoid the masses of people playing Candy Crush Saga, the addictive hit game by King.com. But you can avoid them and the annoying notifications they send you on Facebook.

The process of blocking Candy Crush Saga notifications from friends takes all of two seconds. Here’s how to do it.

  1. Log on to Facebook and pull down the notifications tab on the top right of your home screen.
  2. Hover over the X next to one of your Candy Crush notifications, which will prompt you to “turn off.”
    stop candy crush - requests for - PC
  3. Click the X, and it will give you the option to turn off all notifications from Candy Crush Saga.
    stop- candy crush requests for - PC
  4. Click “Turn Off” and voila! Candy Crush Saga is banned from sending you alerts. You can also alert Facebook if you feel it or another app is spamming you.
    stop candy crush requests for - PC
  5. To make sure you did this correctly, go into your notifications settings and make sure the Candy Crush Saga app box is unchecked and enjoy a more quiet Facebook.
    stop candy crush requests for PC
Whenever you feel the need of unblocking any specific apps you can come back to the same page, and click on unblock specific app.Hope you like this way of Blocking the Candy Crush Requests form Friends.

Thursday, November 13, 2014

How To Open Number Of Sites With A Single Click ?

 Open Number Of Sites With A Single Click
Today i will show you how to make a batch filewhich will open number of websites with just one click. You can also use this method to open different computer programmes like internet explorer, notepad etc.

How To Do ?

  1. Open Notepad and copy below codes
    @echo off
    start www.db9virus.blogspot.in
    start www.google.com
    start www.facebook.com
      2. Save this file as batch.bat
      3. Now open your save file and it will open three websites with just one click.
      4. You can also add more sites by writingStart followed by websites URL.

    Wednesday, November 12, 2014

    What is RAT Or Remote Access Trojan ?

    remote access trojan or rat
    RAT stands for Remote Access Trojan orRemote Administration Tool. It is one of the most dangerous virus out their over the internet. Hacker can use RAT to get complete control to your computer. He can do basically anything with your computer. Using RAThacker can install keylogger and other malicious viruses remotely to your computer, infect files on your system and more. In this post i will tell you about what hacker can do with your computer using RAT and tell you about some commonly use RAT by hackers.

     What is RAT ?

    As i have told you in my introduction paragraph RAT is Remote Access trojan. It is a peace of software or program which hacker uses to get complete control of your computer. It can be send to you in form of images, videos or any other files. Their are some RAT that even your antivirus software can not detect.  So always be sure about what you are downloading from the internet and never save or download files that anonymous user send you  over the mail or in chat room.

     What You Can do With RAT ?

    Once a RAT is installed on any computer hacker can do almost anything with that computer. Some malicious task that you can do with RAT are listed below:
    • Infecting Files
    • Installing Keyloggers
    • Controlling Computer
    • Remotely start webcam, sounds, movies etc
    • Using your PC to attack Website (DDOS)
    • View Screen

     Harmless RAT or Good RAT

    As you have seen how harmfull RAT are for your computer, but their are some good RAT which some of you might be using daily. You might have heard of TeamViewer, it is a software which you use to control some one's computer with his permission for file transfer, sharing your screen and more.

     Some Commonly Used RAT

    • ProRAT
    • CyberGate RAT
    • DarkComet RAT

    Monday, November 10, 2014

    6 Most Common Password Cracking Methods And Their Countermeasures

    6 method used to crack passwords
    There are number of methods out their used by hackers to hack your account or get your personal information. Today in this post i will share with you guys 6 Most commonly used method to crack password and their countermeasures. You must check out this article to be safe and to prevent your online accounts from hacking.

    1. BruteForce Attack

    brute force attack
    Any password can be cracked using Brute-force attack. Brute-force attacks try every possible combinations of numbers, letters and special characters until the right password is match. Brute-force attacks can take very long time depending upon the complexity of the password. The cracking time is determined by the speed of computer and complexity of the password.

    Countermeasure: Use long and complex passwords. Try to use combination of upper and lowercase letters along with numbers. Brute-force attack will take hundreds or even thousands of years to crack such complex and long passwords.
    Example: Passwords like "iloveu" or "password"can be cracked easily whereas computer will take years to crack passwords like "aN34lL00"


    2. Social Engineering

    Social engineering is process of manipulating someone to trust you and get information from them. For example, if the hacker was trying to get the password of a co-workers or friends computer, he could call him pretending to be from the IT department and simply ask for his login details. Sometime hackers call the victim pretending to be from bank and ask for their credit cards details. Social Engineering can be used to get someone password, to get bank credentials or any personal information.

    Countermeasure: If someone tries to get your personal or bank details ask them few questions. Make sure the person calling you is legit. Never ever give your credit card details on phone.

    3. Rats And Keyloggers

    keylogger
    In keylogging or RATing the hacker sends keylogger or rat to the victim. This allows hacker to monitor every thing victim do on his computer. Every keystroke is logged including passwords. Moreever hacker can even control the victims computer.

    Countermeasure: Never login to your bank account from cyber cafe or someone else computer. If its important use on-screen or virtual keyboard while tying the login. Use latest anti-virus software and keep them updated. Check out below article to know more about Rats and Keyloggers.

    4. Phishing

    phishing hacking
    Phishing is the most easiest and popular hacking method used by hackers to get someone account details. In Phishing attack hacker send fake page of real website like facebook, gmail to victim. When someone login through that fake page his details is send to the hacker. This fake pages can be easily created and hosted on free web-hosting sites.

    Countermeasure: Phishing attacks are very easy to avoid. The url of this phishing pages are different from the real one. For example URL of phishing page of facebook might look like facbbook.com (As you can see There are two "b"). Always make sure that websites url is correct. Check out below article to know more about phishing.

    5. Rainbow Table

    A Rainbow table is a huge pre-computed list of hashes for every possible combination of characters. A password hash is a password that has gone through a mathematical algorithm such as md5 and is transformed into something which is not recognizable. A hash is a one way encryption so once a password is hashed there is no way to get the original string from the hashed string. A very commonly used hashing algorithm to store passwords in website databases is MD5. It is almost similar to dictionary attack, the only difference is, in rainbow tables attack hashed characters are used as passwords whereas in dictionary attack normal characters are used as passwords. 

    Example: ‘hello’ in md5 is5d41402abc4b2a76b9719d911017c592 and zero length string ("") is d41d8cd98f00b204e9800998ecf8427e

    Countermeasure: Make sure you choose password that is long and complex. Creating tables for long and complex password takes a very long time and a lot of resources

    6. Guessing

    password guessing
    This seems silly but this can easily help you to get someones password within seconds. If hacker knows you, he can use information he knows about you to guess your password. Hacker can also use combination of Social Engineering and Guessing to acquire your password.

    Countermeasure: Don't use your name, surname, phone number or birthdate as your password. Try to avoid creating password that relates to you. Create complex and long password with combination of letters and numbers.