January 2014
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
tip101tricks.blogspot.com/images


Trying to bring the heat to WhatsApp in India, African cross-platform messaging app and mobile social network has come to the country. The app was launched officially in India on Wednesday.


Mxit is available for download on not just smartphone OSes like Android, iOS, Windows Phone and BlackBerry, but is also available on Java and Symbian platforms. The company says that over 8,000 different feature phones, smartphones and tablets can run the application. Its USP is the fact that it can work on basic-data enabled feature phones too and can run on even plain-old 2G connections.


The app comes across a mix of multiple mobile based cross-platform messaging apps and social networks like WhatsApp and WeChat. Mxit borrows design elements from WhatsApp heavily, including the double tick to send and receive messages. Unlike WhatsApp, though, you can create a complete social networking profile on the app.


You can also use apps and games inside Mxit on your phones. It also provides for allowing business and NGOs a platform on the service. Organisations can set up and personalise the platforms from communicate with each other on it, says the company. There are a few mobile education, healthcare and community apps available on the service too.

You can send chat messages of up to 2,048 characters and the company aims to make Mxit a viable replacement for SMS, especially for users with feature phones. Mxit has appointed former South African cricketer, Gary Kirsten, as its brand ambassador in India. Having coached the Indian cricket team on its way to winning the World Cup, Kirsten now has a pretty huge fan following in the country. To capitalise on this, Mxit also has a Gary Kirsten app on the service, using which you can ask him questions and get replies.


To check out a list of platforms Mxit is available on, you can head on to the company’s website.
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
tip101tricks.blogspot.com/images
The Indian-American could soon be Microsoft's CEO

In his university days in India, Satya Nadella, likely the next chief executive officer of Microsoft, was a relentless questioner. “When all other students will quietly listen to what I would teach, he will ask a lot of questions – ‘why does it have to be like this, why can’t we do it like this?’,” said Harishchandra Hebbar, who taught digital electronics to Nadella at Manipal University.


Sometimes it felt like he was just testing my patience,” said Hebbar, laughing. That questioning nature has served Nadella well in his 22-year career at Microsoft, the world’s largest software company. Last year he was promoted to run the company’s fast-expanding cloud, or Internet-based, computing initiatives. His elevation to the top spot at Microsoft would end a five-month search for a tech-savvy heavy-hitter to lead the company co-founded by Bill Gates. A source familiar with the matter told Reuters on Thursday that Nadella’s appointment was likely, although the board had not yet met to finalize it.


Nadella grew up in the southern Indian city of Hyderabad, a technology hub that is home to the biggest Microsoft research and development center outside of the United States. His father was a member of the elite Indian Administrative Service and a member of the Planning Commission during 2004-2009 under Prime Minister Manmohan Singh. His father, B. N. Yugandhar, who still lives in Hyderabad, declined to speak with Reuters when reached by phone.


Born in 1967, Nadella attended the prestigious Hyderabad Public School, where he met his future wife. Nadella studied electronics and communication engineering, at Manipal University, where people who knew him at the time described him as friendly, modest and well-spoken.


Manipal is a mid-ranking private institution, and does not have the cachet of the elite Indian Institute of Technology (IIT) and Indian Institute of Management (IIM) where many of India’s global power players were educated. If he gets the top job at Microsoft, Nadella would join the growing list of Indian-born executives to head a major global corporation. They already include PepsiCo Inc CEO Indra Nooyi and Deutsche Bank co-CEO Executive Anshu Jain.


After graduating in 1988, Nadella, like many ambitious Indians, moved to the United States to study, earning a master’s degree in computer science from the University of Wisconsin-Milwaukee.

Ganesh Prasad, a classmate of Nadella at Manipal who remains in touch with him, recalled a conversation in 1991 when Nadella was working at Sun Microsystems.“We were having a conversation and talking about Sun as the future of hardware … and he was like: ‘you know where I need to go? I need to be in software and I need to be in marketing and I need to be in Microsoft’,” Prasad recalled by phone from Bangalore, where he now lives.

Prasad, who worked for 20 years in the United States with Intel Inc, said Nadella started with a base in technology and then became interested in how to market it – a skill set that will be called upon in his new role. By comparison, Microsoft’s previous CEO, Steve Ballmer, was regarded more as a salesman and cheerleader than a technology visionary.


While he comes from a very strong technology background, his outlook over the years has changed to: ‘so, what, what am I going to do with this thing? How do I position it? How do I make sense of it all?’,” said Prasad.
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
tip101tricks.blogspot.com/images

With news of more hacks and leaks emerging every day, its pretty safe to say that you’re not necessarily paranoid if you constantly worry about your email being hacked. What with online vigilante hacker groups like the SEA and Anonymous leaking millions of passwords onto the web, and the NSA snooping on the email accounts of even world leaders, the chances that your mail could be hacked are not really that slim. But the good news is that if you have a 

Gmail account, you can easily check whether or not you have been hacked.

Google has provided users with tools right within the Gmail inbox that can help keep your account secured. Here’s how it works:

To check if your account has been targeted and hacked into without your knowledge, you need to log into your Gmail account using a desktop browser.

Now scroll down to the bottom of your inbox and locate a link called “Details”. When you click on it, a pop-up window will appear, and it will show you a detailed list of the last ten times you – or anyone else –has accessed your account. It will also show you not just when your account was accessed but also how it was viewed. You’ll know if the inbox was opened using an email app, browser, smartphone app and the IP address through which it was accessed.


If you see a suspicious device or IP address, you may want to change your password as soon as possible.
To strengthen the security on your Gmail account, you can even turn the two-factor authentication system on. You can store your IP addresses of the various computers and devices you use to access Gmail, in order to ensure nothing fishy is going on around your account.
While Google has been very particular about ensuring account safety from sleuths, it has been going through a rough couple of weeks with Gmail. An outage late last week caused about 10 percent of Google’s global users to lose access to their Gmail accounts for a good 30 minutes or so. This week, it was also revealed that a bug affecting certain Gmail apps was marking out wrong messages to be deleted or sent into spam folders.
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
tip101tricks.blogspot.com


It’s becoming a bit of an annual ritual now; Pakistani hackers deface Indian websites and Indian hackers hit back.

This year too leading up to and on Republic Day, a massive number of Indian websites were attacked and defaced by Pakistani hackers. In response, Indian hackers broke into more than 100 Pakistani websites yesterday. Sources in the Global Cyber Security Response Team (GCSRT) in Bangalore told The Hindu that the seemingly retaliatory attacks are expected to continue. The attacks are signed by the ‘Indian Cyber Rakshak’ with the affected sites displayed the group’s message “Hacked by Indian Cyber Rakshak”.

On Republic Day, Pakistani hackers defaced 2,118 Indian websites, including those of the Central Bank of India and the website of model-turned-actress Poonam Pandey. Her website fell victim to a group calling itself ‘Team Madleets’ and it had graffiti left behind that displayed messages such as “Pakistan Zindabad.”

Cyber security experts told the paper that some hackers who broke into the Indian websites have been identified, though only by their hacker names. These include “StrikerRude”, “KashmirCyberArmy”, “PakCyber Expert”, “HUnter Gujar”. The operation, if one can call it that, was called “#OP26jan”. The January 26 attack came two weeks after 1,400 other Indian websites had been hacked, the sources said.

Hitting back at Pakistani sites seems like exactly the kind of response one would expect from hackers. Though one can’t help but shake the feeling that there’s little point in this altercation beyond showing off. Instead, perhaps Indian hackers should consider using their “mad skills” to help keep websites from getting hacked into in the first place. Surely that would be of greater help to the sites affected.
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
tip101tricks.blogspot.com/images
Amazon into gaming??
Amazon could well be venturing into gaming, if reports are to be believed. The company is supposed to be prepping an Android-powered game console, to be released this year.

According to VG247, the Amazon game console will be priced just under $300 and will compete with products from the likes of Sony, Microsoft and Nintendo, as well as the likes of Ouya and other Android-based consoles. Besides gaming, the console will allow for streaming of games, movies and other multimedia content. The news comes not too long after Amazon was first rumoured to be contemplating releasing a gaming console or a TV streaming device. As rumours suggest now, both types will be seemingly packed into one unit.

Sources have told the publication that publishing sources from various companies have been meeting up with Amazon’s executives to get a lowdown on the hardware of the console. While the console is being referred to using multiple codenames within the company, it doesn’t seem to have found a final name yet.

Word is that the console’s hardware production will be taken care of by Kindle designers, Lab 126. The prototype version being shown to publishers right now reportedly looks like the revamped PSone, as it is grey and oblong in shape and about the same size, but with sharper edges. Currently, publishers are being shown the console’s abilities to run Android and iOS games. Of course, it is possible that a lot of things, including the console’s looks, will end up changing before it is finally released to the public.

Signs that Amazon could be looking at targeting the living room have been around for a while. The company already has the Prime Instant Video service that allows for unlimited streaming of movies and TV shows. And the company has even taken to producing original content for the same, just like Netflix. Amazon surely seems to have plans to take this service into the fold too.

Amazon had earlier this month sent out invites to a recruitment event in Bostonfor “a new revolutionary V1 [Version 1] product that will allow us to deliver Digital Media to customers in new ways and disrupt the current marketplace.” The invite went on to read, “We believe this new product will be even bigger than Kindle!” Consider us intrigued!
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.



As instances of cyber impersonation on social networking sites rise, an Israel-based start-up has developed an application, FakeOff, that helps to identify fake accounts on Facebook.

The app on the world’s largest social networking platform claims to protect users from scams devised by fake Facebook users, who are mistaken for genuine ‘new friends’. “Recent statistics show that at least 10 per cent of about 1.35 billion Facebook users are not authentic. Besides, there are millions of users who create fake identities and appear as regular users,” FakeOff creator Eliran Shachar told PTI.

Fake profiles are divided into several groups including criminals, commercial and psychological, that can risk reputations (identity theft), children (paedophiles and sexual abuse), property (home break-ins) and personal safety, he added. “FakeOff app uses sophisticated algorithm to investigate the behaviour of suspect ‘friends’ and rank them according to 1-10 credibility score. It scans up to 365 days of timeline activity for every suspect Facebook friend and checks for abnormal activity,” Shachar said.

The app checks timeline activity of the suspect and tries to locate abnormal activity that indicates a non-normal way of usage. It allows the user to scan the photos of the suspect to find out if it was stolen from someplace online, he added. FakeOff crosses information from all investigations and calculates results of user based on other investigations on the same suspect, he said. FakeOff has been live for two months now and has over 15,000 users so far.

“Twenty-four per cent of investigations conducted in the app return as fake. A fake profile can be very complex and some of the fakes that we help the users find is only for their eyes so we can’t know the final result from the photo scan results, but the user easily can,” he said. According to Facebook, about 14.3 crore accounts on the social networking site may be false or duplicate, with a major chunk of them coming from developing markets like India and Turkey.

The firm said it estimates up to 7.9 per cent accounts being duplicate and up to 2.1 per cent and up to 1.2 per cent accounts being user-misclassified and un-desirable, respectively. Facebook’s monthly active users (MAUs) stood at 1.19 billion as of September 30, 2013.
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
Image creadit: The Verge

The last couple of weeks have not been smooth sailing for Google. Days after Gmail and a handful of other Google services went down for a huge chunk of users globally, it has been revealed that yet another bug affected users this month. This one apparently affected the mail delete action.

The Verge has reported that this recent bug saw some emails being erroneously deleted when in fact other mails had been selected for this action. Similarly, some mails were being marked and reported as spam instead of other messages. The bug appeared as a result of a software update, according to Google.

The company has announced that updates to Gmail’s iOS app, the mobile browser and offline version of Gmail were mainly behind this bug. Noticeably, the issue did not crop up on the desktop or Android versions of the service. Google says that this bug that messed up messages did not affect all users.

The Internet giant has said that this issue has been fixed but is maintaining silence over how many users were affected by this issue. Google has also urged users to take a second look at their spam and trash folders in their inboxes to see if any messages sent between 12 and 21 January have been erroneously placed there.

Late last week , Google’s services, including Gmail went down for users across the world, as well as in India. About 10 percent of users globally were affected for around 25 to 30 minutes.

According to Google, an internal system that generates configurations – information that tells other systems how to behave – generated an incorrect configuration due to a software bug. The incorrect configuration was sent to live services over the next 15 minutes. This caused users’ requests for their data to be ignored, and those services, in turn, generated errors
.
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
BBM is coming soon to Gingerbread. Image from BlackBerry blog

BlackBerry’s popular messaging app, BBM which was recently launched for the Android and iOS mobile platforms, will be coming to lower-end Android devices that are running on Gingerbread in February this year.

BBM’s head of product and market branding Jeff Gadway made the announcement on BlackBerry’s blog saying,”BBM will soon also be available on Android Devices running Gingerbread(v2.3.3+).”

He adds that the team has been busy in getting the product ready for Android phones running Gingerbread and that they will put out an external beta ahead ahead of the official launch in February. It’s not clear whether the launch will take place early February or towards the end.

According to the most recent Android Developer Dashboard which was published on January 8, 2014 , Gingerbread represented about 21 percent of the total Android platform. This means that old, the platform is still relevant in developing countries where most entry level budget smartphones are launched with the Android 2.3 build. For example some of the lower-end smartphones from Micromax such as Bolt A26, A27 still run Gingerbread.

For BlackBerry it might be a smart move to try and expand its user base on Android by offering the BBM app to more Android users. BBM app for Android and iOS saw over 20 million new users within the first week of its launch.

A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
tip101tricks.blogspot.com/images
No Google Play for Nokia's Android phone

As we get closer to the Mobile World Congress next month, rumours around the Nokia Android phone are getting stronger. A new leak has revealed that the Nokia Android phone aka Normandy aka Nokia X will ditch the Google Play Store and have support for the Nokia Store instead. So, if you were thinking of getting your hands on the best of Android apps using the Nokia phone, then you may be disappointed. A tweet by prolific tipster evleaks reveals a list of specs for the Android phone including support for the Nokia store. And there’s no mention of Google Play Services either, which enables the cloud-syncing and app updates, as well as updates to Google apps.

The phone is believed to run a heavily skinned version of Android 4.4. KitKat, making it look more like a Windows Phone, rather than your average Android phone. The specs leaked by evleaks appear to be similar to the ones listed earlier by a Vietnamese retailer. However, there was no mention of the Google app store.


Normandy’s leaked colour palette matches the Nokia Asha lineup

The rumoured Nokia X is likely to sport a 4-inch 800×480 display and come powered by a dual-core 1GHz processor with 512MB of RAM. It is expected to support dual SIM functionality along with 4GB onboard storage, microSD card slot, 5-megapixel camera and 1500MAh battery.

Though rumours and leaks are dime a dozen, Nokia has been tight lipped about the device. A company spokesperson reportedly refused to acknowledge any smartphone named Nokia X. We have previously seen the Normany leak in six vivid colours, and the colour palette resembles the one seen in the latest Nokia Asha devices. In fact we’ve seen several engineering prototypes or renders of the Normandy so far. We’ve also seen the screenshots of the UI.

There has been wide speculation that Nokia may push out its low-end Asha series running on Android OS, and camouflage it with a completely different UI, something we’ve seen Amazon do in the past. On the other hand, company’s high-end Lumia device would still run on Windows Phone OS. Going by the leaks and rumours so far, this looks more and more likely.


A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
tip101tricks.blogspot.com/images

Facebook Inc’s executive in charge of revolutionising data centres on Tuesday lauded low-energy server technology that is expected to compete against heavyweight Intel Corp.
The social networking firm’s three-year push to help companies design better data centre gear is gaining momentum and paying off with a range of cost-saving improvements, Open Compute Project head Frank Frankovsky told an industry conference here.

He pointed to plans by some companies to launch server chips based on low-power technology licensed from ARM Holdings, whose technology is widely used in smartphones.

It might be coming to fruition about six months after the most optimistic among us thought, but we are absolutely going to see a much more rich ecosystem in CPU choice as we move through 2014 and into 2015,” said Frankovsky.

Servers are the brains and guts of online networks, handling computations and managing tasks.

Intel dominates the server market with its powerful Xeon processors and stands to lose if server chips based on a rival architecture catch on. It has launched its own low-power chips in anticipation of a move toward microservers by major Internet players like Facebook and Google.

For some kinds of data-center workloads, several chips drawing minimal amounts of electricity and working together can work more efficiently than one of Intel’s brawny server chips, proponents of microservers say.

Struggling with a shrinking PC industry, chipmaker Advanced Micro Devices has been developing and testing ARM-based chips for servers. Sunnyvale, California-based Applied Micro Circuits is also launching its own ARM-based server processors. Both companies said they would soon start sampling their chips with customers.

With off-the-shelf data center products falling behind Facebook’s growing technical requirements, the world’s top social media network in 2011 launched the Open Compute Project to push major technology companies to design and build hardware better-suited to running its massive Internet services.

Over the past three years, efforts by Facebook to make its infrastructure more efficient have saved the company over $1.2 billion, said Jay Parikh, vice president of infrastructure.

Its collaborative approach, with Facebook sharing its data center standards and asking partners to improve on them, is inspired by open source software projects like Linux, in which developers from different companies contribute and share improvements.

Microsoft Corp, a New Open Compute member but a technology heavyweight not traditionally known for sharing its expertise, has contributed cloud-server specifications that it says significantly reduce costs, as well as source code.

Since it started, the project has focused on improved standards for information storage, power supply, hardware racks and other data-center components.

While the Open Compute Project’s new standards and products have benefited Facebook, it is not clear how much they are helping smaller companies with different, less-demanding data-center requirements, said Patrick Moorhead, an analyst at Moor Insights and Strategy, who was at Tuesday’s event.

"After three years … you would expect many, many enterprises to get up and talk about how they’ve purchased OCP-compliant hardware, but that’s not really happening," Moorhead said.
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
tip101tricks.blogspot.com/images
Marissa Mayer is seen in this file photo.
Yahoo Inc’s online ad prices slid again in the fourth quarter and Alibaba, the Chinese e-commerce giant in which it owns a big stake, saw revenue growth decelerate from its recent rip-roaring pace.

Yahoo’s overall revenue fell 6 percent in the last three months of the year to $1.266 billion, marking four consecutive quarters of eroding revenue. The company said that prices for both online display ads and search ads declined in the fourth quarter.

The company’s shares were down 3.7 percent at $36.82 in after-hours trading on Tuesday.
Normally you get better pricing in Q4,” said BGC Partners analyst Colin Gillis. “The core business is shrinking.

Yahoo’s efforts to revamp its slumping business have come to the forefront following Chief Executive Officer Marissa Mayer’s decision to fire Chief Operating Officer Henrique de Castro this month, after only slightly more than a year on the job.

The move marked the first major change of plans since Mayer took the helm in July 2012, and underscored Yahoo’s ongoing challenge to rekindle revenue growth.

Mayer has moved aggressively to kick-start the company with product makeovers, acquisitions and big media hires, including celebrity newswoman Katie Couric. But the ad sales business continues to struggle at a time when rivals such as Google, Facebook and Twitter are posting strong revenue growth.

Yahoo’s stock has more than doubled since Mayer, a former Google executive, took the helm in July 2012. But analysts say much of the gain is due to aggressive stock buybacks and the expected IPO of Alibaba, in which Yahoo owns a 24 percent stake.

Yahoo repurchased $3.3 billion worth of its stock in 2013, the company said. Yahoo’s quarterly results also included some of Alibaba’s financial results from the third quarter.

The Chinese company’s revenue increased 51 percent year-over-year to $1.776 billion. While still robust, that growth rate was slower than the 61 percent clip that Alibaba delivered in the second quarter and the 71 percent growth rate in its first quarter.


"Alibaba was a big disappointment,” said B Riley analyst Sameet Sinha, noting that the Chinese company’s cooling revenue growth raised questions about whether it was losing its competitive edge, or whether some other factor might be the cause.

In a conference call with analysts on Tuesday, Mayer and Finance Chief Ken Goldman said that Yahoo’s revenue would begin to grow again in 2014, thanks to the past year’s investments and efforts boosting traffic to Yahoo’s web properties.

But the company declined to provide a financial forecast for the full year, providing only an outlook for the current quarter. Yahoo said that net revenue, which excludes fees paid to third-party websites, would range between $1.06 billion and $1.1 billion in the first quarter, a range whose midpoint matched the average analyst expectation of $1.08 billion.

In the fourth quarter, Yahoo’s revenue from display ads was down 6 percent year-over-year, while the price per ad, excluding Korea, declined 7 percent.

Yahoo’s fourth-quarter net income of $348.2 million rose from the $272.3 million earned in the year-ago period. Excluding certain items, Yahoo said it earned 46 cents a share, beating the average analyst expectation of 38 cents, according to Thomson Reuters I/B/E/S.

A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
tip101tricks.blogspot.com/images

The new State of the Internet report for Q3 2013 has been released by Akamai and it makes for very bad reading if you are an Indian. While the global average connection speeds have risen 29 percent year-over-year to 3.6Mbps in Q3 2013, the average connection speed in India is just 1.4 Mbps. That by the way is the lowest average connection speed recorded by Akamai in its survery for the Asia Pacific region. This is despite an 11% quarterly increase in the average connection speed.

The same goes for the average peak connection; India’s 9 Mbps average peak connection speed was the lowest in the region and also saw a 15 percent quarterly decline. Akamai’s July 2013 report had predicted that India’s average connection speed will jump by over 40 percent to 1.8 Mbps in the next 12 months on the back of investments in high-speed fibre network and affordable data plans. But the real number is far lower than that expectation.


tip101tricks.blogspot.com/images
India stands last among the listed countries in the Asia Pacific region
Akamai has listed 123 countries/regions that are experiencing an increase in average connection speeds year-over-year. For instance the increase is 0.5 percent in Namibia (to 1.1 Mbps) and a massive 76 percent increase in Nepal (to 3.6 Mbps). Among the nations, there are 18 nations that saw a quarter-over-quarter decline. The losses range from 0.4 percent in Bahrain (to 2.2 Mbps) to a drop of 19 percent in El Salvador (to 1.9 Mbps).
In the third quarter of 2013, we observed that long-term growth in average and average peak connection speeds remained strong, as did growth in global broadband and high broadband adoption rates,” David Belson, the report’s editor, said in a statement. “We believe these trends point to continued improvement in the quality and performance of Internet connectivity in countries around the world.
The report further claims that global broadband adoption (rated at speeds of 4Mbp), increased by 5.8 percent last quarter and global high broadband (rated as 10 Mbps) witnessed 19 percent increase over the previous quarter. According to the survey, the mobile data traffic has increased by 80 percent in the last year. Akamai cites data collected by Ericsson that has disclosed a voluminous mobile data traffic jump by 80 percent year-over-year. In Q3 2013, average connection speeds on mobile network operators were ranging between 0.6 Mbps and went as high as 9.5 Mbps.


A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
It was confirmed from the Victim that the phone was on charging with the original Micromax charger, He was talking on the phone and after some voltage fluctuation in current from power port, this happened and phone busted in his hands and caused injuries to his hand and face.

Reports of exploding iPhones, BlackBerry and Samsung Galaxy S4s are not unheard of on the Internet, and today we came across India’s number 2 selling smartphone brand Micromax’s Phone burst into flame in New Delhi, India. The issue is concerning because the particular owner of Micromax Canvas 2.2 A114 who user was injured.

tip101tricks.blogspot.com

The Phone in question is Micromax Canvas 2.2 A114, which houses the low cost MT6582 quad core processor clocked at 1.3 GHz. The phone burst in to flames which lead to some burn injuries on Victims hand and faceMicromax may not be at fault as there could be various possible reasons for the incident. The exploding could be due use of faulty third party local charger while making phone calls also. It is always advice to not charge your phones while attending phone calls.

Smartphones are among our most intimate companions and the exploding of one is quite scary.Whatever the reason might be, it makes us seriously ponder on the safety issues and testing standard of the Domestic brands. It is the first incident concerned with a domestic brand, which has come to light and should be thoroughly investigated so that such incidents don’t repeat themselves in the future. 
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.

Binary code is the language that computers communicate with and use to process information. Our human ability to communicate with others is done in a number of ways, through letters, numbers, symbols, signs, and sounds. In other words, we use our senses to communicate with others. However, a computer’s ability to communicate information is done in a much different way (through “0s” and “1s”). This method of communication or computer language is what’s called “binary code”. To understand it, it is important to know how it all works.

How binary code works


Binary code works by representing content (letters, symbols, colors) in a form that computers can understand. This is done by breaking the content down into a numeric system of two digits “0” and “1”. To accomplish this, computers use electrical impulses switching OFF and ON to represent these two digit numbers. This can be better understood by understanding how a computer chip works.

A computer chip is made of millions of transistors that act as switches much like a light bulb in your home. If you want light you move the switch to “ON” to allow electricity to flow through the light bulb thus giving you light, but if you switch back to “OFF” the light goes away because the electrical signal is interrupted. The switching behavior from a computer chip is similar in the sense that it can only understand two results, “ON” and “OFF”. These results correspond well with the two digits numeric system of “1” and “0” best described as binary (“1” representing “ON” and “0” representing “OFF”).

Every command that we give to computers is interpreted in binary language (“0s” and “1s”), and everything that computers display back to us is display in a way that we can comprehend. For example the binary numbers for the letters “A”, “B”, and “C” are as follow: 01000001 = A; 01000010 = B; and 01000011 = C.

Here is another example: 01010101 01101110 01100100 01100101 01110010 01110011 01110100 01100001 01101110 01100100 01101001 01101110 01100111 00100000 01000010 01101001 01101110 01100001 01110010 01111001 00100000 01000011 01101111 01100100 01100101.

If you can guess what the above zeros and ones mean, then congratulations! If not, here is the answer: it is this page title – How Binary Code works. Every set of numbers of zeros and ones contain eight characters and each of these sets in the example represent one character (whether a letter or a space).

As you can imagine, we don’t use 0s and 1s in our human language as a method of communication. It would take us forever to express ourselves. Computers on the other hand do this in seconds. The faster the computer hardware is, the faster it can perform this binary way of communication.
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.

Understanding computers really isn’t a subject to be afraid of at all. In fact computers are easy to learn when you start with a good foundation of the basics. Learning how computers are put together and what happens under the hood is the key to acquiring that foundation.

The next few Basic concepts below are essential for understanding computers. Become familiar with them before moving on.

What is Computer?

A computer is an electronic device with the ability of processing information. It allows you to manipulate, retrieve, store, and/or edit all types of data. For example, you can browse the internet, send emails, create documents and save them as files in your computer. You can also move files to different locations within the operating system or even to external storage devices such as a hard drive, CD/DVD, or USB memory. Computers give you the power to manipulate the information anyway you want it.

All computers consist of two parts – hardware and software.

What is hardware?

Hardware comprises all the physical components of a computer such as the keyboard, mouse, monitor, computer case. The parts inside of the case such as the mother board, video card, sound card, system memory (RAM), power supply, CD player, DVD player, Floppy drive, hard drive, and any other internal peripheral that may go inside the computer case. Also external peripherals like speakers, external hard drive, printers, etc. All of these are examples of hardware.

What is software?


Software is the bridge that connects and communicates with the hardware. It consists of any set of instructions that tells the computer what to do. The mouse pointer for example, the arrow that you see on the screen, moves because of the set of instructions given by the Operating system (the software) to communicate with the mouse (the hardware) when it’s connected to the computer.

We can conclude then that a computer as a whole is the combination of hardware and software capable of processing and manipulating information.

What types of computers are there?


The types of computers are another important concept to learn when understanding computers. There are two main types of personal computers that consumers purchase. Whether they are categorized as Macs or PCs – these two main types are desktops, and laptops. We will study them in more detail later so for now just remember these two types. There is one other type of computer worth mentioning which we will cover as well later and it is the tablet computer. I’m leaving it as a third option separate from the main two to point out that tablet computers were not really popular a few years ago, but they have now gained their popularity with the rest of the computers.

Although we are talking about the different types of personal computers, it is important to note that a personal computer isn’t the only type that exists. They come in many shapes and sizes and they can all achieve specific tasks depending on what they are made for. For example, a calculator which is designed to calculate numbers, a gaming system which is designed namely for playing games, or a teller machine designed to manipulate our money. Although not as complex as personal computers are, these devices are also categorized as computers and they are capable of handling their individual tasks by combining hardware and software together to make them work.

A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
If you need a fresh style to the threaded comments of a standard Blogger template, here's a simple CSS that will help you to apply a different background, make your avatars rounded, add a border with rounded corners and a triangle which is actually an HTML entity to get that speech bubble look on your comments.

You can see demo HERE

To have this style in your comments, all you need to do is to paste the below code inside the CSS part of the template, which is between <b:skin> and </b:skin>

Styling nested comments with CSS

Step#1: From the blogger dashboard go to Template.

Step#2: As we are going to edit our html it is better to download the full template first, because if somehow something went wrong then we have the full template downloaded. :)

Step#3: Now click on edit html button


Step#4: Click anywhere inside the code area press Ctrl+F to open the search box.
tip101tricks.blogspot.com/images
Step#5: Paste or type the ]]</b:skin> tag inside the search box and hit Enter. After you found the highlighted code, click on the arrow next to it to expand the code, then search it again by hitting Enter.

Step#6: Just above ]]></b:skin add this CSS code.


 .comments .comment-block {
background: #F9F9F9;
color: #555;
box-shadow: 0 4px 10px #EEEEEE;
position: relative;
margin-top: 10px;
margin-left: 60px;
padding: 10px;
border: 4px solid #EEEEEE !important;
border-radius:10px;
font: 1.190em/1.2 Cambria,Georgia,sans-serif;
}
.comment-thread li .comment-block:before {
position: absolute;
display: block;
left: -26px;
color: #EEEEEE;
content: "\25C4";
font-size: 30px;
}
.comments .avatar-image-container {
width: 60px;
height: 60px;
max-height: 60px;
margin:0px 0px 0 -28px;
padding: 0px;
border: 7px solid #EEEEEE;
border-radius:60px;
}
.comments .avatar-image-container img {
overflow:hidden;
width: 60px;
height: 60px;
max-width: 60px;
border:0 !important;
border-radius:60px;
}
.comments .comment-thread.inline-thread {
background: none;
}
.comments .continue {
border-top: 0px solid transparent;
}
.comments .comments-content .datetime {
float: right;
font-size: 11px;
}
.comments .comments-content .user a{
font-size: 15px;
color: #498EC9;
}
.comments .comments-content .datetime a:hover{
color: #777;
text-decoration: none;
}
.comments .comments-content .comment:first-child {
padding-top: 0px;
}
.comments .comments-content .comment {
margin-bottom: 0px;
padding-bottom: 0px;
}
.comments .continue a {
padding: 0px;
}
.comments .comments-content .icon.blog-author {
background-image: none;
}

How to Change Blogger Threaded Comments Background, Border and Colors

- replace the #F9F9F9 value to change the background color of the comments;
- #555 to change the text comments color;
- #EEEEEE to change the color of the shadow around comments;
- 4px solid #EEEEEE to change the border width (4px), style (solid) and color (#EEEEEE) around comments;
- 1.190em to change the comments font size;
- to change the arrow color, replace the #EEEEEE value from color: #EEEEEE;
- to change the border width (7px), style (solid) and color (#EEEEEE) around avatars, modify this part: 7px solid #EEEEEE;
- to change the avatars' size and roundedness, change the 60px value;

Step#7: Finally!!!! Save your template and You're done!!!
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
tip101tricks.blogspot.com/images

On Friday, India’s Central Bureau of Investigation arrested an individual from Pune as part of an international law enforcement operation against cybercriminals. More details have been provided by the FBI.

The operation targeted the operators and the customers of websites that had offered email hacking services.

Law enforcement agencies from Romania, China, India and the US have been involved in this operation. In the US, five people have been charged with hacking email accounts. They’re expected to plead guilty.

Two of the US-based suspects are Mark Anthony Townsend, 45, and Joshua Alan Tabor, 29, both of Arkansas. They’re said to have been running an email hacking service called needpassword.com.

The FBI says the two have hacked into a total of around 6,000 email accounts. Their customers simply provided the email address to which they wanted access to. Payments were made via PayPal. Each of the suspects faces a five-year prison sentence.

The other three people charged in the US are customers of such services. One of them, a 30-year-old California man named John Ross Jesensky, has paid a Chinese website $21,675 (€15,847) for email account passwords.

In Romania, the Directorate for Combating Organized Crime (DCCO), under the authority of the Directorate for Investigating Infractions of Organized Crime and Terrorism (DIICOT), searched the residences of individuals believed to be operating various hacking websites such as e-mail-hackers.com, spyhackgroup.com, rajahackers.com, clickhack.com and zhackgroup.com.

Four people have been charged. They’re said to be responsible for hacking 1,600 email accounts between February 2011 and October 2012.

In India, the Pune-based individual that has been arrested is Amit Tiwari, the man behind hirehacker.net and anonymiti.com. Tiwari and his accomplices are accused of hacking into close to 1,000 email accounts, 171 of which belong to people in India.

A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
tip101tricks.blogspot.com/images

India’s Central Bureau of Investigation (CBI) has searched several locations in Pune, Mumbai and Ghaziabad, and arrested one individual as part of an international law enforcement operation against cybercriminals.

According to the Press, the CBI received information on the suspects from the US Federal Bureau of Investigation (FBI). In addition to the US, law enforcement agencies from Romania and China are also involved in the operation.

No details have been provided regarding the targeted cybercriminal rings as the investigation is ongoing, but the suspects have been allegedly involved in hacking US-based websites and defrauding people.

The individual who has been detained is from Pune. He has been arrested for Information Technology Act violations.

In December, representatives of Indian and American police agreed to set up a new cybercrime portal that would enable them to cooperate more efficiently on investigations.
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.


                            tip101tricks.blogspot.com/images
One of the smartphones that Micromax has been recently unveiled to plan on launching in India in the not-too-distant future is the Micromax Canvas Turbo Mini A200, which can already be seen listed at Flipkart.

The smartphone has landed on the retailer’s website with a price tag of Rs. 14,490 ($231/€169) attached to it, which could make it a popular device in the country, based on its specs.

The official renders with the mobile phone also show that it might arrive on the market with a metal body.

The yet-unannounced handset sports a 4.69-inch touchscreen display capable of delivering a 1280 x 720 pixels resolution, while being powered by a 1.3GHz quad-core processor.

Moreover, the upcoming mobile phone features 1GB of RAM inside, paired with 4GB of internal memory, and a microSD memory card slot that will allow users to add up to 32GB of additional storage space to it.

On the back, the new Micromax Canvas Turbo Mini A200 sports an 8-megapixel camera with LED flash, which should be capable of recording videos in full HD resolution. The phone also packs a 5MP front camera for making video calls.

The specs list of the handset also includes 3G HSPA+ connectivity, along with WiFi 802.11 b/g/n and Bluetooth capabilities, and a built-in GPS receiver. Moreover, the mobile phone will land on shelves with dual-SIM support, with dual-standby.

Micromax Canvas Turbo Mini A200 sports an 1800mAh battery inside and lands on shelves with a 3.5mm audio jack and FM Radio capabilities, while measuring only 7.9mm thick.

Micromax Canvas Turbo Mini A200 Specifications

  • 4.69-inch (1280 x 720 pixels) HD capacitive touch screen display
  • 1.3 GHz (GSM + GSM) quad-core processor
  • Android 4.2 (Jelly Bean)
  • Dual SIM Dual Standby
  • 8 MP rear camera with LED flash
  • 5 MP front-facing camera
  • 7.9 mm thick
  • 3.5 mm audio jack, FM radio
  • 1GB RAM, 4GB internal memory, expandable memory up to 32GB with microSD
  • 3G HSPA+, WiFi 802.11 b/g/n, Bluetooth, GPS
  • 1800 mAh battery
The handset runs under Google’s Android 4.2 Jelly Bean operating system at the moment, yet chances are that it will receive an update to a newer OS version in the near future. The smartphone is expected to become available as soon as the next week, in White and Blue versions.

  


A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.

tip101tricks.blogspot.com

More than 200 Shortcut keys of Windows 8 operating system are listed below,Be an Windows 8 expert buddy :)



General Key Board Shortcuts
F1 - Display Help
F2 - Rename the selected item
F3 - Search for a file or folder
F4 - Display the address bar list in Windows Explorer
F5 - Refresh the active window
F6 - Cycle through screen elements in a window or on the desktop
F10 - Activate the menu bar in the active app
Alt+F4 - Close the active item, or exit the active app
Alt+Esc - Cycle through items in the order in which they were opened
Alt+underlined letter - Perform the command for that letter
Alt+Enter - Display properties for the selected item
Alt+spacebar - Open the shortcut menu for the active window
Alt+left arrow - Back
Alt+right arrow - Forward
Alt+Page Up - Move up one screen
Alt+Page Down - Move down one screen
Alt+Tab - Switch between open apps (except desktop apps)

Ctrl+F4 - Close the active document (in apps that allow you to have multiple documents open simultaneously)

Ctrl+A - Select all items in a document or window
Ctrl+C (or Ctrl+Insert) - Copy the selected item
Ctrl+R (or F5) - Refresh the active window
Ctrl+V (or Shift+Insert) - Paste the selected item
Ctrl+X - Cut the selected item
Ctrl+Z - Undo an action
Ctrl+Y - Redo an action
Ctrl+plus (+) or Ctrl+minus (-) - Zoom in or out of apps pinned to the Start screen
Ctrl+scroll wheel - Zoom in or out of apps pinned to the Start screen
Ctrl+ mouse scroll wheel - Change the size of desktop icons
Ctrl+right arrow - Move the cursor to the beginning of the next word
Ctrl+left arrow - Move the cursor to the beginning of the previous word
Ctrl+down arrow - Move the cursor to the beginning of the next paragraph
Ctrl+up arrow - Move the cursor to the beginning of the previous paragraph
Ctrl+Alt+Tab - Use the arrow keys to switch between all open apps
Ctrl with an arrow key+spacebar - Select multiple individual items in a window or on the desktop
Ctrl+Shift with an arrow key - Select a block of text
Ctrl+Esc - Open the Start screen
Ctrl+Shift+Esc - Open Task Manager
Ctrl+Shift - Switch the keyboard layout when multiple keyboard layouts are enabled
Shift+F10 - Display the shortcut menu for the selected item

Shift with any arrow key - Select more than one item in a window or on the desktop, or select text within a document

Shift+Delete - Delete the selected item without moving it to the Recycle Bin first
Right arrow - Open the next menu to the right, or open a submenu
Left arrow - Open the next menu to the left, or close a submenu
Esc - Cancel the current task

Ctrl+plus (+) or Ctrl+minus (-) - Zoom in or out of apps pinned to the Start screen
Ctrl+scroll wheel - Zoom in or out of apps pinned to the Start screen
Windows logo key+C - Open the Charms
Windows logo key+C - Open the commands for the app
Windows logo key+F - Open the Search charm to search files
Windows logo key+H - Open the Share charm
Windows logo key+I - Open the Settings charm
Windows logo key+J - Switch the main app and snapped app
Windows logo key+K - Open the Devices charm
Windows logo key+O - Lock the device orientation
Windows logo key+Q - Open the Search charm to search apps
Windows logo key+V - Cycle through notifications
Windows logo key+Shift+V - Cycle through notifications in reverse order
Windows logo key+W - Open the Search charm to search settings
Windows logo key+, - Temporarily peek at the desktop
Windows logo key+Z - Show the commands available in the app
Windows logo key+spacebar - Switch input language and keyboard layout
Windows logo key+Ctrl+spacebar - Change to a previously selected input
Windows logo key+Tab - Cycle through open apps (except desktop apps)

Windows logo key+Ctrl+Tab - Cycle through open apps (except desktop apps) and snaps them as they are cycled

Windows logo key+Shift+Tab - Cycle through open apps (except desktop apps) in reverse order

Windows logo key+PgUp - Move the Start screen and apps to the monitor on the left (Apps in the desktop won’t change monitors)

Windows logo key+PgDown - Move the Start screen and apps to the monitor on the right (Apps in the desktop won’t change monitors)

Windows logo key+Shift+period (.) - Snaps an app to the left
Windows logo key+period (.) - Snaps an app to the right

Dialog Box Shortcut Keys
F1 - Display Help
F4 - Display the items in the active list
Ctrl+Tab - Move forward through tabs
Ctrl+Shift+Tab - Move back through tabs
Ctrl+N (Number 1-9) - Move to Nth tab
Tab - Move forward through options
Shift+Tab - Move back through options
Alt+underlined letter - Perform the command or select the option for that letter
Enter - Replace clicking the mouse for many selected commands
Spacebar - Select or clear the check box if the active option is a check box
Backspace - Open a folder one level up if a folder is selected in the Save As or Opendialog box
Arrow keys - Select a button if the active option is a group of option buttons

Windows logo Key Shortcut Keys
Windows logo key+F1 - Open Windows Help and Support
Windows logo key - Display or hide the Start menu
Windows logo key+B - Set focus in the notification area
Windows logo key+C - Open the Charms
Windows logo key+C - Open the commands for the app
Windows logo key+D - Display and hides the desktop
Windows logo key+E - Open Computer
Windows logo key+F - Open the Search charm and search file
Windows logo key+G - Cycle through gadgets on the desktop
Windows logo key+H - Open the Share charm
Windows logo key+I - Open the Settings charm
Windows logo key+J - Switch the main app and snapped app
Windows logo key+K - Open the Devices charm
Windows logo key+L - Lock your PC or switch users
Windows logo key+M - Minimize all windows
Windows logo key+O - Lock device orientation
Windows logo key+P - Choose a presentation display mode
Windows logo key+Q - Open the Search charm and search apps
Windows logo key+R - Open the Run dialog box
Windows logo key+T - Cycle through apps on the taskbar
Windows logo key+U - Open Ease of Access Center
Windows logo key+V - Cycle through notifications
Windows logo key+Shift+V - Cycle through notifications in reverse order
Windows logo key+W - Open the Search charm and search settings
Windows logo key+X - Opens the Quick Link menu
Windows logo key+, - Temporarily peek at the desktop
Windows logo key+Z - Show the commands available in the app
Windows logo key+Pause - Display the System Properties dialog box
Windows logo key+Ctrl+F - Search for PCs (if you’re on a network)
Windows logo key+Shift+M - Restore minimized windows on the desktop

Windows logo key+number - Start the desktop app pinned to the taskbar in the position indicated by the number. If the app is already running, switch to that app.

Windows logo key+Shift+number - Start a new instance of the desktop app pinned to the taskbar in the position indicated by the number

Windows logo key+Ctrl+number - Switch to the last active window of the desktop app pinned to the taskbar in the position indicated by the number

Windows logo key+Alt+number - Open the Jump List for the desktop app pinned to the taskbar in the position indicated by the number

Windows logo key+Ctrl+Shift+number - Open a new instance of the desktop app located at the given position on the taskbar as admin

Windows logo key+Tab - Cycle through open apps (except desktop apps)

Windows logo key+Ctrl+Tab - Cycle through open apps (except desktop apps) and snaps them as they are cycled

Windows logo key+Ctrl+B - Switch to the app that displayed a message in the notification area
Windows logo key+up arrow - Maximize the desktop window
Windows logo key+down arrow - Minimize the desktop window
Windows logo key+left arrow - Maximize the desktop window to the left side of the screen
Windows logo key+right arrow - Maximize the desktop window to the right side of the screen

Windows logo key+Home - Minimize all but the active desktop window (restores all windows on second stroke)

Windows logo key+Shift+up arrow - Stretch the desktop window to the top and bottom of the screen

Windows logo key+Shift+down arrow - Restore/minimize active desktop windows vertically, maintaining width

Windows logo key+Shift+left arrow or right arrow - Move a window in the desktop from one monitor to another

Windows logo key+spacebar - Switch input language and keyboard layout
Windows logo key+Ctrl+spacebar - Change to a previously selected input
Windows logo key+Enter - Open Narrator

Windows logo key+PgUp - Move the Start screen and apps to the monitor on the left (Apps in the desktop won’t change monitors)

Windows logo key+PgDown - Move the Start screen and apps to the monitor on the right (Apps in the desktop won’t change monitors)

Windows logo key+Shift+period (.) - Snaps an app to the left
Windows logo key+period (.) - Snaps an app to the right
Windows logo key+Tab - Cycle through opens apps (except desktop apps)

Windows logo key+Shift+Tab - Cycle through opens apps (except desktop apps) in reverse order

Windows logo key+Ctrl+Tab - Cycle through opens apps (except desktop apps) and snaps them as they are cycled

Windows logo key+/ - Initiate IME reconversion
Windows logo key+Alt+Enter - Opens Windows Media Center
Windows logo key+plus (+) or minus (-) - Zoom in or out (in Magnifier)
Windows logo key+Esc - Exit Magnifier

File Explorer Shortcut Keys
Alt+D - Select the address bar
Ctrl+E - Select the search box
Ctrl+F - Select the search box
Ctrl+N - Open a new window
Ctrl+W - Close the current window
Ctrl+mouse scroll wheel - Change the size and appearance of file and folder icons
Ctrl+Shift+E - Display all folders above the selected folder
Ctrl+Shift+N - Create a new folder
Num Lock+Asterisk (*) - Display all subfolders under the selected folder
Num Lock+plus (+) - Display the contents of the selected folder
Num Lock+minus (-) - Collapse the selected folder
Alt+P - Display the preview pane
Alt+Enter - Open the Properties dialog box for the selected item
Alt+right arrow - View the next folder
Alt+up arrow - View the parent folder
Alt+left arrow - View the previous folder
Backspace - View the previous folder
Right arrow - Display the current selection (if it’s collapsed), or select the first subfolder
Left arrow - Collapse the current selection (if it’s expanded), or select the parent folder
End - Display the bottom of the active window
Home - Display the top of the active window
F11 - Maximize or minimize the active window

Taskbar Shortcut Keys
Shift+click on a taskbar button - Open a app or quickly open another instance of a app
Ctrl+Shift+click on a taskbar button - Open a app as an administrator
Shift+Right-click on a taskbar button - Show the window menu for the app
Shift+Right-click on a grouped taskbar button - Show the window menu for the group
Ctrl+Click on a grouped taskbar button - Cycle through the windows of the group

Ease of Access Shortcut Keys
Right Shift for eight seconds - Turn Filter Keys on and off
Left Alt+Left Shift+PrtScn - Turn High Contrast on or off
Left Alt+Left Shift+Num Lock - Turn Mouse Keys on or off
Shift five times - Turn Sticky Keys on or off
Num Lock for five seconds - Turn Toggle Keys on or off
Windows logo key+U - Open the Ease of Access Center

Magnifier Shortcut Keys
Windows logo key+plus (+) or minus (-) - Zoom in or out
Ctrl+Alt+spacebar - Preview the desktop in full-screen mode
Ctrl+Alt+D - Switch to docked mode
Ctrl+Alt+F - Switch to full-screen mode
Ctrl+Alt+I - Invert colors
Ctrl+Alt+L - Switch to lens mode
Ctrl+Alt+R - Resize the lens
Ctrl+Alt+arrow keys - Pan in the direction of the arrow keys
Windows logo key+Esc - Exit Magnifier

Narrator Shortcut Keys
Space or Enter - Activate current item
Tab and arrow keys - Move around on the screen
Ctrl - Stop reading
Caps Lock+D - Read item
Caps Lock+M - Start reading
Caps Lock+H - Read document
Caps Lock+V - Repeat phrase
Caps Lock+W - Read window
Caps Lock+Page Up/Down - Increase or decrease the volume of the voice
Caps Lock+plus (+) or minus (-) - Increase or decrease the speed of the voice
Caps Lock+spacebar - Do default action
Caps Lock+left or right arrows - Move to previous/next item
Caps Lock+F2 - Show commands for current item
Press Caps Lock twice in quick succession - Turn Caps Lock on or off
Caps Lock + Esc - Exit Narrator

Narrator touch Shortcut Keys
Tap once with two fingers - Stop Narrator from reading
Tap three times with four fingers - Show all Narrator commands (including the ones not in this list)
Double-tap - Activate primary action
Triple-tap - Activate secondary action
Touch or drag a single finger - Read what’s under your finger
Flick left/right with one finger - Move to next or previous item
Swipe left/right/up/down with two fingers - Scroll
Swipe down with three fingers - Start reading on explorable text

That's All!!!
Thank You..!!!
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
tip101tricks.blogspot.com/images



In the gaming world, everyone likes a showoff.

It's true. Whether you're demonstrating how to beat a particularly difficult boss in Grand Theft Auto or bragging about how you beat Bioshock using nothing but the wrench and your plasmids (true story), if you record it and post it to YouTube, you're bound to find an audience for it.

Any forum or message board will tell you that there is no one right way to share your gaming footage on YouTube. Your platform, equipment, budget and skill will determine the quality of the footage you end up with. There are, however, three tried-and-true methods that should work just fine for most users.

1. Use a Camcorder

If you have a camcorder that supports direct video input, you can easily record your console's output into your camcorder. This method is simple; just make sure you have an RCA or digital splitter cable from the console to both the TV and the camcorder, so you can play and record at the same time.

To record audio, you can either need to use the camcorder's mic or use a separate mic — just remember to turn the TV volume down.

When you're finished recording, simply upload the camera's footage through the USB cable or memory card onto your computer. You can then edit the file using your choice of video editing software, and you're ready for Youtube.
2. Use a Capture Card

Another option is to use a capture card, a small device that converts audio and video signals carried by RCA cables so that they're USB ready. If you're on a budget or just aren't comfortable installing the internal version on your computer or console, an external capture card is relatively inexpensive and can plug into your USB port.

However, external cards encode the video as they capture, meaning that there will be a significant video delay (about 2 seconds). Any gamer who has suffered lag can tell you that 2 seconds is a lifetime, so be sure only to use an external capture card for games that allow you to save instant replays. That way, you can play, save the replay and then record the replays on the external card later.


For better quality and no lag time, we recommend investing in an internal capture card


For better quality and no lag time, we recommend investing in an internal capture card that you can install into your PCI slot on your computer or console. This option is more expensive and requires basic knowledge of computer installation to set them up (you'll need to actually open up your computer and place the internal card on your motherboard), but it's worth it if you're serious about capturing your footage.

If you're using an external card, you're going to need that RCA splitter cable again so you can record the console's output on the capture card as you play on the TV. Internal cards don't require a splitter. Once you're finished, use the software that came with the capture card (the card's purchase should have included some) to convert the recorded footage into a video file.

Now you'll want to edit your video for YouTube. If you use a capture card, you'll want to record the audio commentary now and add it in using the video editing software, rather than record as you play.

If you're going the capture card route, Hauppauge is one of the most trusted brands. Check out their wide selection of both internal and external capture cards.
3. Capture Directly From Your Computer

For PC gamers, you'll have the best luck capturing your footage straight from your computer. All you need is software that will record your computer screen's video output, such as Fraps orGameCam for Windows, and Snapz Pro X for Mac (Mac Users: if you know of a cheaper, but still worthwhile, option, let us know in the comments).

We don't really recommend this option for console gamers, but if you really want to use this method, you will need to install an emulator for your specific console and download the ROM file for the particular video game so you can play via your PC. You'll also need a USB gaming controller (or a console controller with a USB adapter) to use with your computer.

Note: Check the legality of owning and distributing ROM files in your area, as it varies between jurisdictions. Generally, owning a ROM file of a game you already own is OK, as is owning a ROM file for gaming consoles that are no longer in production.

Open your video capture software, open your emulator and then load the ROM file. Then just record with your chosen software and play. When you're finished, save the file for editing.

Like we said above, these are by no means the only ways of recording your gaming software, but they are the most widely accepted and commonly used. If you know of any hacks and tricks to get better quality, or if you simply prefer a specific type of software, let us know in the comments below.
no image
A page about Blogging Tricks and Computer, Android, Hacking, and Windows Tricks.
Get the serial number you need ! (For Certain Things)

* Go to Google.

* In the search field type: "Product name" 94FBR

* Where, "Product Name" is the name of the item you want to find the serial number for.

* And voila - there you go - the serial number you needed.

HOW DOES THIS WORK?

Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things. 1) The pages that are returned are pages dealing specifically with the product you're wanting a serial for. 2) Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.

See these example searches:

"Photoshop 7" 94FBR

"Age of Mythology" 94FBR

"Nero Burning Rom 5.5" 94FBR

& if u cannot find from here, u can visit this site http://www.findserialnumber.me

Get Serial keys from Serials Search Engines
Here i also want to present you a list of "clean" crack/Serial Search sites for all the latest warez to unlock your software.Please note that the site reviews herein only include information about each site, not the contents of the 'cracks' themselves. Always use a reputable antivirus and antispyware program on cracks & keygens before using them. The same goes for Craagle

* www.serials.ws
* www.keygen.in
* www.smartserials.com
* www.keygenguru.com - Popular site with hundreds of thousands of results.
* www.serialkey.net
* www.zcrack.com
* www.subserials.net
* www.serialportal.com
* supercracks.net
* www.serialcrackz.com
* www.serials.be
* www.cracktop.com
* www.cracksfm.com
* www.cracklib.net
* www.crackdb.org
* www.theserials.com