Friday, June 15, 2012

How to keep android safe and secure


The popularity of Android devices seems evident from its 48% hold in thesmartphone market. Being an open source operating system, it evidently remains vulnerable to cyber crime and hacking. With increasing number of downloadable Android apps, the concern for keeping your device healthy and protected can be demanding.
What’s your Device
Android can be a tempting platform for both users and hackers alike. Going by March 2011 data, about 260,000 devices got infected creating security concerns. With the credible community of developers, there has been a boost to Android based utility apps and functionality providing easy and appealing avenues for users.
It is practical to know your device in a closer context (if you are already not aware of the smart phone features). Much of the resolution to security concerns is obtainable by knowing your gadget and its functionality. Even though no application can be 100% secure, you can watch out for the android phone updates providing latest security platforms to your device.
Adopt simple security measures like password and backup of (important) files. Avoidrooting your device. Instead of surrendering to the easily accessible applications, judge their credibility and usability before allowing them to access your device. Rely on the official android market for applications. It can be dangerous to increase vulnerability by risking your confidential information.
Being open to endless applications does not necessarily mean you should attempt all. Be selective and logical and stick to those you actually need. Do some research before exposing yourself to keep potential threats at bay.
Your smartphone’s security features can also play significantly in keeping the phone safe. Consider configuring its location and security settings in order to keep the phone from falling into wrong hands. Important considerations include keystroke pattern, password lock option and fingerprint lock option. Keep away from unsecured Wi-Fi connectivity and other unreliable sources. Open wireless networks can be detrimental to the crucial data in your device.
Tips to Deal with Security Concerns
There can be several techniques to handle security threats and viruses to keep your device in the pink of its health.
Applications
There are many applications which can secure Android phones from bugs, Trojans and viruses. The Lookout Security & Anti-virus app for Android is one such application. It can protect your device from local network or online threats. With the application, you can also protect crucial data and locate phone (if misplaced). It also facilitates backup for your important files and documents. Its ‘Routine Check’ feature allows you to schedule scan of the downloadable apps.
Another useful Android based application is the AVG Antivirus. This popular software enables to scan apps, set files and media card (in real time) and deal with threats like Trojan and spyware. The incoming screening of SMS is another useful attribute of this software. The AVG Antivirus is an advantage for your device as it ensures maximum speed of your phone by implementing a task manager to kill off any apps and tasks that slow the device down.
A renowned mobile protection app, McAfee WaveSecure, can be your rescuer in the event you lose your mobile. It is an award-winning app which can track your device and also wipe data from getting accessed by hackers. It can serve the preferred portal to backup and restore personal data.
The Norton Antivirus & Security is another security application for Android devices ( iOS 2.1 and above). It can be implemented in case of theft and malware attacks. The leading software company’s application can do many tasks including searching and removing mobile security threats and remote wiping of data.
There are many other promising applications, like Avast Mobile Security and NQ Mobile Security & Antivirus to keep your device and data safe. Judicious usage of the device can minimize potential threats although it is better to be prepared with a support system before the hue and cry begins.

Samsung Galaxy S III Features and Specifications







The new wave in the smartphone segment, the Samsung galaxy S III, is gaining popularity in the markets. The S III is designed with curves and the sleek look gives it an edge over other smartphones in the market. Further, this phone can be termed as one of the most sophisticated devices present in the market. Its intelligence is advanced with S Voice and the S Beam feature enables it to share updates in quick time. Let’s have a look on the features and specifications of Samsung GALAXY S III.










Specifications

Network/Bearer and Wireless Connectivity 2G EDGE/GPRS (850/900/1800/1900 MHZ)
3G HSPA+
Bluetooth Profiles 4.0 LE
NFC Yes
OS Android 4.0 (ICS)
Display Technology HD Super AMOLED
Color Depth 16M
Size 12.192 cms
Resolution 720*1280 (HD)
Chipset Type (Dual, Quad) Quad Core Application Processor
CPU Speed 1.4GHz
Camera Camera Resolution(Rear) 8 Megapixels Camera Resolution (Rear)
Camera Resolution(Front) CMOS , 1.9 MP
Physical Specification Dimension (HxWxD) 70.6X136.6X8.6
Battery Capacity 2100 mAh
Talk Time (2G / 3G) Up to 1350Min (2G)/up to 700Min hours (3G)
Standby Time Up to 830Hr (2G)/up to 770Hr hours (3G)

Saturday, June 2, 2012

Samsung Galaxy Tab 680 Features and Specifications




Samsung Galaxy Tab 680 supports 1.2GHz Processor, 720p VGA Recording, G-Sensor, Touchscreen Bar. It’s powered by 5100mAh Li-Ion Battery. Samsung Galaxy Tab 680 has Pre Loaded Apps Twitter and Facebook.

Friday, May 25, 2012

Remove thumb.db file | Remove thumb.db file



Thumb.db is is a cache of the current picture in that directory.to remove it go for following
step1 > open "WINDOWS EXPLORER".
2>go to "TOOLS".
3>open "FOLDER OPTIONS".
4>go to "VIEW".
5>see 1st section "FILES & FOLDERS".
6>click on the "DO NOT CACHE THUMBNAILS".
now the thumbnail file will be removed from ur computer once u do this the file will be never created.

see who used your pc in your absence

Want to know Who Used Your Pc In Your Absence & what Did He Do?

just follow these simple steps

start > run >eventvwr.msc


Events are stored in three log files: Application, Security, and System.

These logs can be reviewed and archived.

For our purposes we want the System log. Click on "System" in the left-hand column for a list of events.

Look for a date and time when you weren't home and your computer should have been off.

double click on the eg: info n it will show u the detail.

You can also use this log to see how long someone was on the computer.

Just look at the time the computer was turned on and off for that day.

Hide data in mobile without any softwares


Have you ever wanted to hide folders in your phone? If yes,there here is very interesting solution for you to hide folders in your phone and youdont even need any software for that.
This trick can be used for any JAVA phone from Nokia,Samsung,Motorola,LG or any other company.
JUST FOLLOW SIMPLE STEPS
  1. Create any new folder or you can use any existing folder that is to be hidden.
  2. Rename the folder to any name but with the extension of .jad like if I want to hide my images folder then I will name it as IMG.jad
  3. Now create a new folder with the same name in the same directory but with the extension of.jar So, I would create the folder with the name IMG.jar
  4. And thats it!! My orignal images folder which has been renamed with .jad gets hidden and only folder with.jar extension is visible which is empty.So,my data is protected/hidden from unwanted eyes.

To unhide the orignal folder you have to remove the .jar extension from the new folder and your orignal folder with all the files and with .jad will become visible.

Monday, May 21, 2012

Microsoft word shortcuts | MS word shortcuts


    Are you looking for MS-Word Keyboard Shortcuts?? You are in right Place. Because everybody want to save time that’s why previously I wrote a Post on Windows Shortcuts and In this guide I am going to share all Microsoft Word Shortcut keys which helps you to save your time as well as make your work faster as never before. There are many shortcuts for common commands in Microsoft Word but here is a collection some of the best Shortcuts and also Download Pdf. So let's start..

MS-Word Keyboard Shortcuts:


  • Ctrl + b : you can order your favorite file by this command
  • ctrl + f : you can search for some word
  • ctrl + s : save the work you've done
  • ctrl + shift or right index makes the writing go to the left
  • alt + f4 : is useful to close the windows
  • alt + esc you can move from window to window
  • alt + tab : is very useful if there are many windows open you can choose the required window
  • alt + shift : switch between languages
  • f2 : very useful and fast to change the name of a specific file
  • Ctrl + C : Copy
  • Ctrl + X : Cut
  • Ctrl + V : Paste
  • Ctrl + Z : Undo
  • Ctrl + A : Select all
  • Ctrl + ESC : task list (Start)
  • Ctrl + Enter : Starting a new page
  • Ctrl + END : Move to end of file
  • Ctrl + F5 : Thumbnail file window
  • Ctrl + F6 : move between files
  • Ctrl + F2 : preview the page before printing
  • = + Ctrl : zoom in and out, one degree
  • F4 : repeat the last process
  • Alt + Enter : repeat the last process
  • Ctrl + Y : repeat the last process
  • Shift + F10 : Bullets and digital
  • F12 : Save As
  • Shift + F12 : Save the file
  • Ctrl + Home : the first document
  • Ctrl + End : Latest document
  • Shift + F1 : information about type of coordination
  • Ctrl + U : line under the text
  • Ctrl + F4 : Exit from the file
  • Ctrl + N : New File
  • Ctrl + H : Replacement
  • Ctrl + I : slash
  • Ctrl + K : Document Format
  • Ctrl + P : Print
  • Ctrl + O : open area
  • Alt + S : List Format
  • Alt + J : Help Menu
  • [+ Alt : List Table
  • ] + Alt : Tools Menu
  • Alt + U : View menu
  • Alt + P : Edit Menu
  • Alt + L : file list
  • "+ Alt : window List
  • Alt + Q : modified procedure
  • Ctrl + E : Center text
  • Ctrl + F : Search
  • Ctrl + B : black line
  • Ctrl + Shift + P : font size
  • Ctrl + Shift + S : Style
  • Ctrl + D : line
  • Ctrl + Shift + K : character conversion - Capital
  • Shift + F3 : character conversion - Capital
  • Ctrl + Shift + L : point at the beginning of the text
  • Ctrl + Alt + E : footnotes numbered Romanian
  • Ctrl + Alt + R : Mark ®
  • Ctrl + Alt + T : Mark ™
  • Ctrl + Alt + C : Mark ©
  • Ctrl + Alt + I : preview the page before printing
  • Shift + F7 : Thesaurus
  • Ctrl + Alt + F1 : System Information
  • Ctrl + Alt + F2 : Open Directories
  • Ctrl + J : resolving the text from both sides
  • Ctrl + L : the beginning of the text from the left side
  • Ctrl + Q : the beginning of the text from the right side
  • Ctrl + E : Center text
  • Ctrl + M : changing the size of the top paragraph
  • Shift + F5 : To return to the position that you finished it when you close the file
  • = + Ctrl + Alt : Customize
  • F3 : AutoText entry
  • F9 : Check fields
  • F10 : Move the framework to open windows
  • F1 : Help
  • F5 : Jump to
  • F7 : Spelling
  • F8 : Select Zone

How to save computer crash from crash | save computer crash from crash


    The main disadvantage of PC Crash is loss of your Important files or data and This is very common problem in these days. So Today in this Trick I am going to share some reasons why your PC crashes and their solutions. There are many signs when your PC creash But The comman fetal error that comes when your pc crash.
    Fatal error: When the system has become unstable or is busy then it says. "Enter to return to Windows" or "press Control-Alt-Delete to restart your computer". If you do this you will lose any unsaved information in all open applications."
    You have just been struck by the Blue Screen of Death. Anyone who uses Microsoft Windows will be familiar with this.
    What can you do? More importantly, how can you prevent it happening?

Hardware conflict:

    The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device. For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself. If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen.
    The way to check if your computer has a hardware conflict is through the following route:
  • Goto Start >> Settings >> Control Panel >> System-Device Manager.
    Often if a device has a problem a yellow sign '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.
    Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.
    Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity. To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

Bad Ram:

    Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing. But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.
    One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.
    Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.
    EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

BIOS settings:

    Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.
    Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.
    A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.
    Microsoft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).

Viruses:

    Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk.
  • Go to >> Start-Settings >> Control Panel >> Add/Remove Programs
    Here, look for the Start Up Disk tab. Virus protection requires constant vigilance. A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer. An excellent antivirus programme is McAfee VirusScan by Network Associates(www.nai.com). Another is Norton AntiVirus 2000, made by Symantec (www.symantec.com).

Printers:

    The action of sending a document to print creates a bigger file, often called a postscript file.
    Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.
    If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.

Software:

    A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.
    The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.
    Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.
    Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.
    Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.
    Remember to restore all the BIOS settings back to their former settings following installation.

Overheating:

    Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to. One remedy is to get a bigger better fan and install it on top of the CPU.
    CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.

Power supply problems:

    With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.
    If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.
    It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.
    So these are some causes and precautions of why your PC crash. If you know something more then Please Share in the comment section below.