Thursday, 24 October 2013

Disable Startup Items and Boost your Computer


Is your computer Running slowly during the boot in Windows XP? When your computer starts there are many unusual programs that starts with your computer and decrease your computer speed. It may be caused by the many programs that starts with the system. How to get ride of this? Let's learn this effective way and speed up the start of system. Now we are going to learn a best tricks to optimize your system processing speed.

Disable Startup Items and Boost your Computer
1.  Click on Start button.

2.  Now click on Run.

3.  Then type this command :

    msconfig

4.  Click on OK button in Run Dialog box.

5.  A window will pop up (System Configuration Utility).    msconfig

4.  Click on OK button in Run Dialog box.

5.  A window will pop up (System Configuration Utility).

6.  Click on "Startup" tab.
You will see all programs that run when your device starts up each time. 
 Just look at "Command" section, any programs that begin by "C:\Program Files\...".just uncheck. (Click on checked checkbox) them.
Important : Don't uncheck items that start by (C:\WINDOWS\).

Disable any unknown program , Leave the antivirus checkbox because it is helpful when  the system starting .
7.  Click on OK button.
8.  You will be asked to restart you computer or not, It is recommended to Restart now

How to Transfer Pictures from Android Device to Computer

  How to Transfer Pictures from Android Device to Computer

Have you been using your new Android smartphone as a replacement for your Digital Camera? If so, I’m sure you’ve taken lots of great pictures! Taking pics on your Droid is a lot more convenient than carrying around another camera. But what if you lost your smartphone? Wouldn’t you like to store the pictures on your computer as a backup? If so, just follow the simple steps in this lesson and I’ll show you how to backup your photos and transfer them to your PC.
Copying pics and videos from the micro-SD Card in your Android device to a computer, allows you to back up and use them on your PC for editing, sharing or viewing. The process of copying photos and videos from your phone to a computer is fairly simple, just follow our step-by-step instructions below to get started!
 Instructions:

1. Connect your smartphone using the USB sync cable. An USB icon will appear in the notification area of your phone.
 2. On the smartphone, drag the notifications bar down and then tap it. Next tap USB connected, and then Mount.
 3. On the computer, click the START button and then select Computer or My Computer. The micro-SD card in your phone will be recognized and listed as a Removable Disk.

4. Double-click this removable disk to open it. Double-click the folder DCIM, and then the folder Camera.

5. From this folder, you can copy all pictures and videos taken with the Digital Camera of your Android smartphone.

6. To disconnect your Android, just go to the notifications area on your phone and tap on the USB sign to disconnect.

7. That’s it! Enjoy the peace of mind of knowing that you have a backup of all your pics & videos stored on your PC. In addition, you now have an alternative way to view, share, and edit all of the pics that you’ve taken on your Droid!



Looking for other ways to transfer the files? How about without cables and via WiFi? Check out one of our other tutorials for more Advanced users:How to transfer files via WiFi from PC to Android (Wirelessly)

Differences Between Win 8 and Win 7

Major Differences Between Windows 7 and Windows 8

  •     Boot time: win7 48 sec. win8 10 sec.
  •     Desktop : Microsoft has replaced the normal shortcut icons with dynamic tiles. You can change their size and place similar applications around each other- or anything else that my suit you.
  •     Mounting iso images: Windows 7 could only burn an ISO image to a DVD but Windows 8 actually betters this by offering you the option to mount the image too. In Windows 7, you didn’t have the option to make virtual drives to use the ISO image’s content but Windows 8 allows you to create a virtual drive to mount the ISO image so that you can easily use it just like a normal DVD.
  •     Built-in Antivirus(bad news for hackers): Windows 8 has an antivirus present inside the kernel of the operating system. This means that your system won’t boot if a corrupt USB device is plugged in. It sounds impressive though I don’t know whether it would pass the test of time…. and viruses! All in all, I do expect Windows 8 to be a serious upgrade on Windows 7 and with Microsoft working on the things that require some tweaking; I genuinely believe that Microsoft is finally ready to launch an OS which will take the world by storm.
  •     Multiple monitors support in Windows : Microsoft announced that customers can use more than one monitor to connect with Windows 8 operating system. Windows 8 PC management allows customers to use multiple monitors at same time. It means Windows 8 offers flexibility by allowing start screen at one monitor and desktop in another. Customer can also choose taskbar on both screens with different icons on each monitor. Moreover, you can play with background images as well by changing it separate on each monitor. Such support is not available with Windows 7 operating system.
  • Windows based apps store Windows 8 operating system introduces new app store in which different apps is implemented for various devices and settings on right of the screen. The settings section includes contextual apps like volume, brightness, restart and power options. You can share content, links, app reviews, contacts, metro apps, Facebook and twitter applications with your friends or colleagues. Windows 8 store offers both desktop apps and ecosystem for developers. On the other hand, Windows 7 OS is missing all these features.
  • Inbuilt Windows Touch features: The main difference between Windows 7 and Windows 8 comes with its metro style interface that provides live title of rectangle shape which has replaced the icon pattern in Windows.
  •  In Windows 7 operating system, software shortcuts are in the form of icons. As far as the touch interface is concerned then Windows.
  • supports touch interface but not that much, what was expected. So, Windows 8 comes with true touch interface for Metro style apps. It is fast way of accessing data by using an improved on-screen keyboard and handwriting recognition

How to convert 2g sims to 3g without any cost

                  How to convert 2g sims to 3g without any cost




BSNL-To convert Bsnl 2G Prepaid to 3G Prepaid Send SMS M3G120 to 53733
Then you will get Confirmation SMS Confirm your SMS Send SMS M3G120Y to 53733.
If you realy want to get high speed net with your BSNL SIM.convert it in 3G and recharge ur sim with 100 Rs.you will get 30 days validity 300mb of 3G data

VODAFONE 3G -You have to send a message  ACT 3G to 111 now just wait for the conformation message now your 3G will be activated and select the WCDMA or UMTS mode for 3G usage and high speed surfing


AIRTEL 3G-Send message  3G to 121 and wait for the conformation  .It will be activated in about one hour and after activation select 3G mode i.e. UMTS OR WCDMA for high speed surfing

IDEA-For converting idea 2G to 3G just send a message ACT3G to 12345 OR 3G TO 54777 simply wait for the conformation then choose 3G gode in phone or data card and start surfing

MTNL 3G-Send a sms  ACT3G to 444 after receiving conformation just switch to 3G mode and start surfing 

TATA DOCOMO 3G-Send a message ACT3G to 53333 OR 3GLIFE TO 53333 after reciving conformation just use 3G sim  in 3g device

AIRCEL 3G - For aircel 3G just send a message START 3G to 121on reciving conformation messsage just insert the sim in the 3G device and ejoy the 3G network

Airtel 3G resumable proxy trick 2013

               Airtel 3G resumable proxy trick 2013


HI, Guys after long time posting a trick of Airtel 3G  (Airtel 3G Proxy Trick Working @ Null Balance July 2013)
 

1.     Account Name: alltricks.co.in
2.     APN (Access point)  : airtelgprs.com
3.     Proxy: 63.141.241.221
4.     port:  80
That’s it! after entering a working home page of your state, just save the settings and you are done.



Some free home pages for airtel :-

m.airtellive.com
airtellive.com
live.airtelworld.com
203.115.112.27/
203.115.112.5/

Vodafone Dhamaka Unlimited 3G Octuber 2013

                  Vodafone Dhamaka Unlimited 3G Octuber 2013


In this Vodafone 3G tricks, you are not required to recharge any BBM or even 3G pack to get work this trick. In case after connecting if you are not getting 3G speed then you will require to recharge with small or low price Vodafone 3G Pack.
The one and only working Vodafone trick in August/September 2013 is Vodafone 3G Twitter trick which is been confirmed working till November 2013 as Vodafone free twitter service is official launched till 30th November 2013.




Features of Vodafone unlimited 3G tricks 2013 :

  • Not require to recharge with any 3G or Paid pack
  • This trick works in high balance also, but I recommend you to keep balance zero
  • Important : You must activate Vodafone free twitter pack
  • This trick is based on TCP protocol and having awesome 3G speed
  • Trick is confirmed working in most states of India
  • IDM, Torrents and other client are also supported with this trick
  • No disconnection   
  • Steps for getting Vodafone unlimited 3G GPRS hack :

    • First of all you are required to call Vodafone Customer care and say them to start Vodafone free twitter service in your number
    • Vodafone free twitter service will activate instantly on your number
    • Now download and install NMD VPN : Download NMD VPN    link1    link2
    • Now, Download Vodafone 3G Config from this link
    • After downloading, extract this zip file and paste it into NMD VPN config folder
    • Now connect with apn Portalnmms or www
    • Run NMD VPN software with Administrator privilligies
    • Connect with the config you have pasted in NMD VPN Config
    • Now you have done with this trick, your connection will now be established successfully.
    • Enjoy Vodafone twitter tricks with awesome 3G Speed.
                                                                                                                                                                             

Thursday, 3 October 2013

How to Protect an Email Account from being Hacked

Today in this post I’ll teach you how to protect your email account from being hacked. Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”. Now one question which arises in our mind is: “Is it so easy to hack an email accountOR Is it so difficult to protect an email account from being hacked?”. The single answer to these two questions is “Absolutely NOT!”. It is neither easy to hack an email nor difficult to protect an email account from bieng hacked.

If this is the case, then what is the reason for many people to lose their accounts?
The answer is very simple. They don’t know how to protect themselves from being hacked! In fact most of the people who lose their email accounts are not the victims of hacking but the victims of Trapping. They lose their passwords not because they are hacked by some expert hackers but they are fooled to such an extent that they themselves give away their password.
Are you confused? If so continue reading and you’ll come to know…
Now I’ll mention some of the most commonly used online scams which fool people and make them lose their passwords. I’ll also mention how to protect your email account from these scams.

1. WEBSITE SPOOFING
Website spoofing is the act of creating a website, with the intention of misleading the readers. The website will be created by a different person or organisation (Other than the original) especially for the purposes of cheating. Normally, the website will adopt the design of the target website and sometimes has a similar URL.
For example a Spoofed Website of Yahoo.com appears exactly same as Yahoo Website. So most of the people believe that it is the original site and lose their passwords. The main intention of spoofed websites is to fool users and take away their passwords. For this,the spoofed sites offer fake login pages. These fake login pages resemble the original login pages of sites like Yahoo,Gmail,Orkut etc. Since it resemble’s the original login page people beleive that it is true and give away their username and passwordsby trying to login to their accounts.
Solution:
§  Never try to login/access your email account from the sites other than the original site.
§  Always type the URL of the site in the address bar to get into the site. Never click on the hyperlink to enter the site.
2. BY USING KEYLOGGERS

The other commonly used method to steal password is by using a Keylogger. A Keylogger is nothing but a spyware. The detailed description of keylogger and it’s usage is discussed in the post Hacking an email account. If you read this post you’ll come to know that it is too easy to steal the password using a keylogger program. If you just access your email account from a computer installed with keylogger, you definitely lose your password. This is because the keylogger records each and every keystroke that you type.
Solution:
Protecting yourselves from a keylogger scam is very easy.Just install a good anti-spyware program and update it regularly. This keeps your PC secure from a keylogger. Also there is a program called Anti-keylogger which is specially designed to detect and remove keyloggers. You can use this program to detect some stealth keyloggers which remain undetected by many anti-spyware programs.
3. ACCESSING YOUR EMAIL ACCOUNT FROM CYBER CAFES

Do you access your email from cyber cafes?  Then definitely you are under the risk of loosing your password.In fact many people lose their email account in cyber cafes. For the owner of the cyber cafe it’s just a cakewalk to steal your password. For this he just need’s to install a keylogger on his computers. So when you login to your email account from this PC, you give away your password to the cafe owner. Also there are many Remote Administration Tools (RATs) which can be used to monitor your browsing activities in real time.
This doesn’t mean that you should never use cyber cafes for browsing the internet. I know, not all the cyber cafe owners will be so wicked but it is recommended not to use cafes for accessing confidential information. If it comes to the matter of security never trust anyone, not even your friend. I always use my own PC to login to my accounts to ensure safety.
So with this I conclude my post and assume that I have helped my readers to protect their email accounts from being hacked. Please pass your comments…