Thursday, December 26, 2013

How to turn off iPhone screen when using Skype [Tips]

This is one of those posts that a few of you might think – “I already knew this” or “Does this really deserve a post?“. But I am gonna post it anyway, because its one hell of a useful tip if you’re a regular user of this iPhone application and didn’t figure this out before.
The Skype Application supports calls using the iPhone headphones, and of course it comes with loads of features – one of which is to turn off the screen using iPhone’s built in proximity sensor.


To disable the iPhone screen when using the headphones, flip the phone so that the screen lies on a solid surface when you’re on call.
Voila, that was the tip – Apparently when we do this, the proximity sensor not only turns off the screen/back light but also(indirectly) helps give you longer battery life and doesn’t heat up the iPhone.
The other versions of this tip would of course be to put a business card on the iPhone’s proximity sensor and something similar, but I found flipping the phone to face a soft surface to be the simplest.
You could also use a slip in case which has the same effect.
Beware to place the screen only on a soft surface or if you already use a case, it’d help you keep the phone a few mm’ above the surface, still triggering the proximity sensor.
credits to: http://woikr.com/

Monday, December 23, 2013

Hidden folder without name or icon

Quick little tutorial on how to make a hidden folder in Windows 7.
The folder will have no name and it will be completely invisible unless you highlight it.

What you need:

1) Windows 7

2) The Windows 7 sidebar (Preferably the Calender app)

3) Some computer knowledge

And that's about it!

Tutorial:

First, make a new folder on the desktop: [1]



Step 2): Right click on the Folder and go to customization: [2]

Step 3): Click on "Change Icon..." And scroll right till you see an icon with nothing like as shown: [3]

 

Step 4): Now click Ok then click Apply and you should get something like this: [4]

Step 5): Now click start then type in character map in the search bar. Open it and find a blank space. I will show you the slot to make it easier to find: [5] Click select then copy. You will see nothing in the "Characters to Copy" bar, that is perfectly fine.
 

Step 6): Now right click on the folder and click rename. Press CTRL + V and you will get nothing as the name. When you click apply, nothing should show up as the name: [6]


Step 7): Now find the folder and the calendar sidebar app. Drag the Calender out of the way and put the invisible folder where the Sidebar is. Drag the Calender app infront of the folder and you won't be able to see it anymore: [7]


And that's about it! Put whatever you want it in it and nobody but you should be able to find it unless they have a strong eye or they highlight everything and look closely. Hope you liked the tutorial!

Credits :  http://tips.paddyonline.net/ 

AK-47 rifle inventor Mikhail Kalashnikov dies at 94

PanARMENIAN.Net - Mikhail Kalashnikov, the 94-year-old inventor of the world’s most popular firearm, the AK-47, died Monday, Dec 23, in a Russian hospital, a local government official said, according to RIA Novosti.
“We received sad news today: legendary small-arms inventor Mikhail Kalashnikov died at the age of 94 after a prolonged illness,” Viktor Chulkov, a spokesman for the head of the Udmurtia republic, Kalashnikov’s home region, said in Facebook post.
Kalashikov had been recently admitted to an intensive care unit at a hospital in Udmurtia’s regional capital, Izhevsk, while “in serious but stable condition,” according to the local branch of Russia’s Health Ministry.
In June, the famed weapons designer underwent an operation in Moscow to have a pacemaker implanted.
Photo: RIA Novosti

Saturday, December 21, 2013

A trick to figure out which apps to keep on your first Home Screen

 The first Home Screen of your iPhone or iPad is pretty important, when you think about it. It’s the easiest screen to reach with the Home button, so a lot of people want to keep their most important apps on it. But how do you decide which apps should be there?
One obvious approach is simply to think about the tasks you do on your device most frequently, then arrange apps and folders accordingly. Unless you roll with daytime and nighttime iPhones, your first Home Screen might be all work, all play, or a mix of both.
A handy trick that might help you pick the best apps for your first Home Screen is to check the app switcher every now and then. If you double-tap the Home button, you’ll see the apps, in order, that you used most recently. Swipe to the left and you’ll see more.
At least some of the apps you see regularly in the first 1-3 collections of the app switcher are probably prime candidates for your first Home Screen. You may find that apps you previously buried in a folder on the last page are the ones you use most frequently, and moving them to your first Home Screen can save you some daily time and effort digging to find them.

Via: http://finerthings.in/featured/  by creative commons licence

How to: Enable Multiple User Accounts on Android 4.2 and Above

by Jeffrey Taylor
Recently, my assistant approached me about a certain Android tablet. Of course, the question was, “is [off brand tablet] good?” And of course, I’d never heard of the off-brand tablet. The purpose of my assistant’s request was to get a tablet for her 3 year-old son, and the off-brand tablet promised “kid controls” and “parent protection.” I really questioned my assistant’s decision, especially since she received the Nexus 7 tablet for Christmas last year.

The best part of Android is user accounts

Okay, well maybe they’re not the best part, but if your tablet runs any version of Android above 4.2, then you have the ability to set up various user accounts. As I explained to my assistant, she could set up a user account for her son that would only allow particular apps.
Android 4.2 really revolutionized how people can interact and protect their Android devices. The introduction of user accounts means that multiple people can all use the same tablet. In my house, that means the kids have their own account with specific apps (mostly games).

The separate account gives the users an ability add the apps (you) they want, set the features they want, and enjoy the Android experience.

Making user accounts happen

Setting up the account is quite easy.
Open Settings.
Click Users under Device.
After you click Add user or profile, you’ll have the option of setting up two different types of user profiles: restricted and regular.
My assistant will use the restricted profile to keep her son from accessing inappropriate apps.

A few words about user settings

Remember, only restricted profiles will allow you to control what content is available on the user’s account.
The Application and content restrictions screen will give you the ability to turn “on” or “off” particular apps already installed on your Android tablet.

Simply click the on/off button to allow the user to access the app.

Making user accounts work

Here are a few tips for making good use of user accounts, and possibly limiting some frustration for you.
First, these tips only apply to restricted profiles. Regular user accounts function like the main user’s account, except the original user controls what accounts are on the device.
Second, the restricted profile will still have access to some settings, such as location or applications (to uninstall apps from the profile). Android restricts access to core processes, but you need to know the user can modify some settings.
Third, even with restricted accounts enabled, you should still monitor the types of apps your kids have access to. Further, Android 4.3+ gives you greater “tuning” ability for particular app settings, but the developer still needs to enable that feature.
Finally, I recommend that you restrict any Google Play purchases and require that you enter a password. You can set up that restriction by clicking Use password to restrict purchases in Google Play settings (Google Play > Menu > Settings).
That setting will help limit (or eliminate) costly, unapproved app purchases. Note: a restricted profile shouldn’t be able to download and install apps, but just in case.

Getting a good tablet means good results

Hopefully, my assistant will read this post and make the most of the awesome tablet she already has. User profiles give Android devices running Android 4.2 a greater advantage over older models. If you’re looking for a way to give your kids a tablet, why not restrict a profile on the one you have?

Via:http://thedroidlawyer.com/

Thursday, November 7, 2013

What is Peer-to-Peer P2P

P2P is the acronym for the words “peer to peer”, which means communication between equals. Computers connect and communicate with each other without using a central server, building, optimizing and managing the bandwidth used so that the best path between all nodes or computers is found.
Due to its characteristics, it’s used to exchange files such as music, videos, documents and complete software packages. Some Internet telephone systems use P2P networks to streamline the transmission of voice and sometimes also stream video (take Skype for instance). Another use of P2P networks is for processing and handling large amounts of information.

Types of P2P networks according to their design

Centralized

It maintains a directory on a central server, to which computers make requests to find the nodes that contain the desired content. Its main shortcoming is that the central server is a weak point: if it crashes, nothing works.

Decentralized and structured

Also known as hybrid P2P. There’s no  directory on a central server, but on several independent computers placed in different locations that make the network easily accesible to other computers.

Decentralized and unstructured

There are no existing computers or nodes that function as central request controllers. All nodes can act both as clients and servers.

Characteristics of decentralized P2P

  • Anonymity: users should be able to connect without worrying about their privacy. However, this standard is not always met 100%.
  • Scalability: implies more security, by not relying on a central server and its capabilities.
  • Independence: the user interface does not require an Internet browser and every computer can run as a client or server.
  • Decentralization: handles connections and temporary variables and temporary addresses , and all connected computers are considered equal.

Pros and cons

Advantages

  • Cost: many programs are free, which makes them an attractive option for those looking for free content (the legality of this practice is questionable). P2P programs with legal content also exist and, despite having to pay for membership, are a good choice if you want a good price.
  • Efficiency: using file sharing is easy and fast.

Disadvantages

  • Legality: P2P programes have been questioned for sharing music and videos illegally. This has been a source of controversy.
  • Spyware: many programs are riddled with spyware or malware, causing a sluggish performance of your computer, or for it to stop working.
  •  
Via: http://fikobservatory.com/  by creative commons licence.

Monday, March 11, 2013

Forget Where You Parked? This Iphone App Reminds You


Remembering where you park in a big city can be a headache. But a new iPhone app called Find My Car Smarter works with a a small Bluetooth device that you place in your car to relieve it.
The Find My Car Smarter project raised $40,177 on Kickstarter earlier this year in order to manufacture the system's Bluetooth smart devices.

The car finder app is available in the Apple App Store for $0.99. It only works with the iPhone 4S. The Find My Car Smarter device is $25 -- or $30 with a car USB adapter.
To use the app, simply sync the car plug-in with your phone once it's in the car. Upon launching the app, it automatically displays where you parked, how far away the car is and how long you've parked in that location -- great for knowing when the meter's up.
Do you frequently forget where you park? Tell us in the comments if you would use this app to track your vehicle.
Photo courtesy of iStockphoto, PeterMcKinnon
From: t.opne.ws

Wednesday, February 27, 2013

Facebook Privacy(ish) Settings

Written by Tom 'Johnsee' Johns on . Posted in FBHive, Privacy & Security, Tips & Tricks
Facebook privacy settings are great. Just a few minutes of tweaking allows you to create complex rules that makes sharing on Facebook easy AND safe.
Or so we thought.
I’ll start by prefacing this with two recent developments. The first is that Facebook is now one of Americas most trusted companies, and the second that around 65 million users are now accessing Facebook from mobile devices. It’s these two factors that make the following so concerning.
Have a look at the privacy settings below:
These settings allow friends to see wall posts with the exception of the “Employees” group. This group has specifically been removed rights to see wall posts. Or so the setting says…
This setting is does not work correctly and does NOT work at hiding any wall posts made from Facebook mobile (including the Facebook iPhone app). This bug is a massive privacy concern.
A friend of the above account in the “Employees” group could not only see wall posts from mobile devices, but also post to the wall, clearly against the privacy settings that were in effect. Wall posts from non-mobile devices were not visible.
The following screenshot shows a wall viewed from an account which has been added to the ‘Employees’ group with the privacy settings as above.
 We have no way of proving we haven’t ‘shopped the screenshots above but feel free to try the settings with a friend to prove it to yourself. We also hope the previous hole we uncovered should give some credibility to our claims.
So there you have it. If you have your boss hidden from seeing wall posts, you’d better stop your friends posting on your wall from their phones…
On a side note, the privacy setting does work for status updates made from mobile devices. For concerns about your social networking posts showing up on search engine results, you may want to look into a service like Reputation.com which can help clean up your personal image.
From: www.fbhive.com/page

Monday, February 25, 2013

Safeguarding Your Digital Life : How to Remain Safe in 2013

Review:batasoi
therefore what have we learnt from yesteryear year along with what do we out to be'>really need to be wary of in 2013 out to guarantee that each our knowledge and our wallet stay protected ?

despite common beliefs, something you need we've got learnt in 2012 is the idea that apple positively isnt immune from malware. in the past year we've got seen a big rise within the variety of attacks targeting macos x computers - possibly the most notable being the flashfake/flashback trojan.

appearing late in 2011, the trojan became very fashionable in 2012 with estimations so it infected nearly 700, 000 macs, creating it the largest macos x infection to-date. exploiting a vulnerability in java, the malware occurs when victims visit infected web sites, allowing the trojan to remain downloaded directly onto their computers. infected users will then have their computers watched and controlled remotely by hackers, leaving them liable to knowledge theft and fraud.

its no surprise that macs became key targets for attack. apple product are fashionable with many influential politicians and distinguished businessmen ; thus the knowledge stored on these devices is significantly sensitive and important out to cybercriminals. therefore mac users be warned - this threat is simply going out to proceed to grow !

and its not simply apple users who really should be worried. in the past year the quantity of malicious threats targeting the android platform has continued out to rise, demonstrating that could be a key space of interest fro cyber criminals. in reality, 99% of all mobile malware discovered in 2012 targeted android devices - little question a worrying statistic for our avid android user.

the trouble is the idea that android os ticks all the boxes for cybercriminals : its widely used, its quite simple to develop for, and also the wide form of ( unofficial ) application markets mean that those by using the system are able out to download programs ( as well as malicious programs ) from wherever they actually opt for. its for that reason that there's unlikely to remain any slow-down within the development of malicious apps for android - therefore if youre planning on taking out a new phone next year, you would possibly need out to take this into consideration.

2012 too saw variety of high profile privacy breaches. on june 5th, linkedin was hacked and also the passwords of a little over 6. 4 million individuals leaked publically across the web, whereas fashionable web sites dropbox and last. fm too became targets. after all this is often not really a new problem, along with the hacking and leaking of knowledge first gaining media attention whenever the sony playstation network was hacked around the time of 2011, other then its clear that such huge leaks aren't merely a factor as to the past. in reality the trouble might well be a lot of worse than it looks if youve used the exact password for every online account.

in spite of this its not simply the illegal hacking of personal info that will be changing into a difficulty, other then the wider erosion, or loss, of privacy inside the internet. lots of individuals routinely bank, look and socialise online and each time they actually check in to have an online account, they actually are needed out to disclose info concerning ourselves. what lots of individuals fail out to realise is the idea that corporations aggregate and work with this info for advertising and promotional purposes, typically while not us even knowing concerning it, and its not continually clear how out to opt away from this method.

the worth of personal knowledge - out to cybercriminals and legitimate businesses - can no more than grow in the long run, and by it the potential threat out to our privacy will increase. therefore you would possibly need out to suppose double concerning specifically what info you can giving away online.

as each online and mobile threats continue to start to be a lot of refined every one of us want in order to make certain we are arranging the necessary precautions to remain protected. the year of 2013 appearance set to start to be another busy year for cybercriminals, therefore certain to'>make sure to take care when giving away personal info each online and on mobile devices. certain you'>ensure you dont venture into the internet while not a basic level of protection, use secure passwords and feel careful when visiting third party sites. only by having that further an element of care - you might want to look forward out to a worry free 2013.
Safeguarding Your Digital Life : How to Remain Safe in 2013 Originally published in Shvoong: http://www.shvoong.com/how-to/computers-and-internet/2358052-safeguarding-digital-life-remain-safe/

Saturday, February 23, 2013

4 Reasons Why You Need to Have Sex

Sex is part of human life.Discuss sex seems endless. Though still considered taboo, but the discussions about sex is still a topic of interest to be listened to.The activity of sex with a partner is not just a form of sheer lust overflow. More than that, having sex on a regular basis can make life more healthy and happy.
Here are 4 reasons why you are having sex

1. Sex prevent flu Research conducted at Wilkes University in Wilkes Barre, Pennsylvania found that couples who avidly have sex one to two times a week have A or IgA's levels. This antibody is responsible for protecting the body from infection and cold weather causes the flu
2. Sex helps lose weightYou're dieting? We recommend that you increase your sex activity with a partner. The American Journal of Cardiology mentioned, activity sex can burn 85 – 250 calories. In fact, according to Harvard Medical School, mild to moderate sexual activity just like those doing sports that can burn fat.
3. Sex reduces the risk of prostate cancerAccording to a study published in the Journal of the American Medical Association, the more frequently a man ejaculates in a month, then the smaller the risk of the person is suffering from prostate cancer.
4. Sex reduces the mortality rateHarvard Medical School research team States, the guy who does orgasm three times or more a week are reported to have a chance is 50 percent lower than the danger of death.

Researchers from the State University of New York and the University of Liverpool also found that either the man or woman who is sexually active and rarely use condoms less experienced depression, and more productive in their work.So, don't delay any longer having sex with a partner!

Thursday, February 21, 2013

How to lock your folder without any software?

  1. Open notepad.
  2. Copy and paste the code highlighted below:
  3. Save it as locker.bat
  4. Open locker.bat. you'll see a folder namely "tellhowto"
  5. Put all your things to be hidden in it.
  6. Again go to locker.bat and lock the folder.
  7. Voila you've done. Now you are free from anybody's interference from your data.

cls
@ECHO OFF
title Folder tellhowto
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST tellhowto goto MDLOCKER
:CONFIRM
echo Are you sure u want to lock the folder(Y/N). Y : Yes, N : No
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren tellhowto "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set /p "pass=>"
if NOT %pass%==password goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" tellhowto
echo Folder unlocked successfully
goto End
:FAIL
echo Invalid password 
goto UNLOCK2
:FAIL2
echo Invalid password
goto end
:MDLOCKER
md tellhowto
echo Folder created successfully
goto End
:UNLOCK2
echo Last chance to enter correct password to unlock folder
set /p "pass=>"
if not %pass%==mylocker goto FAIL2
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" tellhowto
echo Folder unlocked successfully
:End

REMEMBER : The by default password is mylocker . If you want to change the password simply search out for mylocker and replace it with your own.
 

How to create an invisible folder in Windows XP?

This trick is neither protecting your folder with password nor making it hidden, but it's all about making it invisible.
  1. Create a folder and name it "my folder".
  2. Select that folder, press F2 and type Alt + 0160.
  3. Hit enter.
  4. Now right click on folder and go to properties.
  5. Under "Customize" tab, click on change icon.

  6. Now choose blank folder icon.

  7. Click "OK" and apply changes.
  8. Try to find the folder you made
From: tellhowto.blogspot.com.

Tuesday, February 19, 2013

How to Remove Deadlinks From Your Bookmarks Using Free Software

Review:Saffana

How to detect and remove broken links bookmarks from browsers?


After sometimes, some of your favorites bookmarks may contain broken links if pages or websites are no longer available. In this case, a little cleaning is required. Of course it will take a times to remove it manually test it and delete broken links one by one.

Fortunately AM-DeadLink program for Windows can take the job and perform this task easily. Download the software from the official site, then install the programs on your computer.
Remove broken links processDouble click on AM-Deadlink executable file then follow the install direction :

Choose your language and click “OK” Scroll down the list at the top left side and select your browser:

Note: It is also possible to select a backup file (csv, html) containing your favorites. Then click green button to Check bookmarks

AM-DeadLink then test each link from your bookmarks. At the end of the audit, click “Sort bookmarks error into top of the list” for better visibility. Bookmarks pointing to a link unavailable appear in red with a 404 error. To delete them, select them and click the Delete button confirm by clicking “Yes”:

Here now outdated favorite bookmark are deleted from your browser. AM-Deadlinks also have the ability to detect and remove duplicates in your bookmarks.

more info @
http://masndol.com

How to Remove Deadlinks From Your Bookmarks Using Free Software Originally published in Shvoong: http://www.shvoong.com/internet-and-technologies/software/2356877-remove-deadlinks-bookmarks-using-free/

How to Accelerate Internet Connection and Download

Review:kutilitil

  • Activities searching, downloading, uploading and other activities on the internet is very related to your internet connection. how not, with a slow connection, I'm sure you would not like / lost comfort while continuing your online habits, especially for bloggers who like to download and certainly keenly felt tired because of long download time and slow connection. For those of you who have a problem discussed previously, the following step-how to accelerate the download speed as well as searching on the internet.

    Speed ​​up Internet Browsing Connection
    Basically this is just an attempt optimization tips and additional power connections only, the rest depends on the package you take the internet, the following tips:

    1. PC Health Check
    Check your pc health is also very important to increase your connection. Why? Simple viruses, spyware, adware, malware and its allies 80% will disrupt your internet connection because they also use it to spread the virus to other computers so natural that you'll slow internet! Solution is to install an antivirus that you see fit with PC specs you, for example: Bitdefender Total Security, Norton 360 Premier, Kaspersky PURE, ESET NOD32 Smart Securtiy, and so on. Remember, do not forget to update it continues to be increasingly shunned by the viruses.

    2. Install Tool and Software Optimization Internet Connection
    In the virtual world, many software developers who aim to optimize your connection, ping power of the addition, optimization of the Internet, making the Internet to another (hacking internet access / netcutting). I only discuss the optimization of internet hacking white without taking the rights of others. The solution is, use tools such as Agasta, Speed ​​Conect, and others.

    3. Change DNS Internet
    Internet control is a very important element especially in accelerating browsing and downloading, internet concept: The more you use the DNS is getting weaker "ping" is, the fewer the users, the faster internet service offered by the provider connection especially usb modem provider. The solution is to change the DNS that can accommodate many users, so that the "ping" produced more stable, the following list is:
    • Google Public DNS 8.8.8.8 - 8.8.4.4
    • ScrubtIt DNS 67.138.54.100 - 207.225.209.66
    • Open DNS 208.67.222.222 - 208.67.220.220
    Guidelines and How to change DNS:

    Database Design Tool  Draw ER Diagrams with DeZign. Create, design & import databases. 
    www.datanamic.com
    curso de Excel - DIGICAD  Básico, Av., Excel p/ Engenheiros matr abertas - Intensivão de férias 
    www.portaldigi.com.br/digicad
    1. Search the internet connection on your taskbar
    2. Right-click and select "Open network and sharing center"
    3. Select "Local area connection"
    4. Select Properties, Double click on "Internet Protocol Version 4"
    5. Change DNS numbernya suit your tastes!
  • 4. Tweaking the Windows Registry
    Press the "Windows + R" then typing in windows windows run "regedit"
    Search address:
    "HKEY_LOCAL_MACHINE / SYSTEM / Current ControlSet / services / Tcpip / ServiceProvider"
    ServiceProvider directory change the following values:
    • DnsPriority = 1
    • HostsPriority = 1
    • LocalPriority = 1
    • NetbtPriority = 1
    • Restart the computer
    5. Set Bandwidth in Windows
    • Start -> Run
    • Type "gpedit.msc" -> OK
    • In Computer Configuration, Administrative Templates select
    • Click Network -> QoS Packet Scheduler
    • In the right window, double-click the limit reservable bandwidth
    • Change the setting to be enabled
    • Change the bandwidth limit to 0 (zero), OK

    6. Using a wakeup
    • Run wakeup.exe
    • Replace timenya with 30 sec (though internet connection ngak dashed)
    • Klick apply. If you want to hide it so as not to interfere with the view J

    Speeding Speed ​​Download
    1. Install Internet Downloader (IDM) 2. Setting settings with IDM 2 ways: - Install IDM Optimizer
    2. Search tab download => Speed ​​Limiter => Settings
    3. Then in the "Maximum download speed for one file" fill in the numbers in the box is "1000000" and then click "ok"
    4. Then select the "option"
    5. Find the tab "Connection"
    6. Select "Default max conn number", select the number "16" (by default it will choose 8)
    7. Click "ok"
    good luck...;)

    How to Accelerate Internet Connection and Download Originally published in Shvoong: http://www.shvoong.com/internet-and-technologies/software/2356888-accelerate-internet-connection-download/
    Licencia Creative Commons
    Este obra está bajo una licencia de Creative Commons Attribution 3.0 Unported.