Popular Posts

Monday 28 August 2017

How To Make Google Chrome Browse More Faster With These 4 Steps

How To Make Google Chrome Browse More Faster With These 4 Steps
The method is very simple and we will be editing some hidden feature of chrome in this method and with that you chrome speed will boost up and it will browse webpages faster. So follow up the below methods to proceed:
#1 Method: Editing Chrome Flag Settings To Make It Faster
1. First of all open the address chrome://flags/ in your Google chrome.
2. Now there you will see lots of settings there.
3. Search out for "Maximum tiles for interest area" and change its value to 512 that is maximum RAM that you will be allocating to the Chrome.( You can use ctrl+f to find these options).
4. Now search For the "Number of raster threads" and change its value to 4.
5. Now enable "Enable fast tab/window close".
6. That's it now relaunch your browser and enjoy the faster performance of your browser.
#2 Method: Using Google Chrome Extension
1. Download and install a cool plugin
Web Boost in your Google chrome.
2. Thats it this extension will get added to your browser and you can see icon at the right top corner, just click on it to start it.
#3 Method: Changing The Settings In Google Chrome
1. First of all go to three line button at the the top right corner of your Google chrome.
2. Then click on "settings" and then "Show Advanced Settings"
.
3. Now under privacy look for "Prefetch resources to load pages more quickly" and tick on it.
4. There you will have 3 options listed in your android chrome which can be set according to as:
Always :- If you want to load pages both on cellular and wifi network.
Wifi – If only wifi connection is there then only it will load prefetch pages.
Never :- It will never prefetch pages and this can save your data on your limited connection.
#4 Method: Clearing Cache & unnecessary Plugins and Extensions
1. Type chrome://plugins/ in your google chrome and clear out or say remove the plugins that are unnecessary in your browser.
2. Type chrome://extensions/ in your chrome browser and clear all the extension that you don’t need in your browser.
3. Type chrome://settings/clearBrowserData and clear all your history from beginning including history, cache file and all other saved data of your browser to make it faster.
With these ways you can easily boost up your browser speed and can enjoy fast switching speed between tabs.

HOW TO SOLVE VARIOUS GOOGLE PLAY ERRORS

HOW TO SOLVE VARIOUS GOOGLE PLAY ERRORS

✳️How to solve Google Play - Error 504✳️

Problem
App could not be downloaded due to an error.

First solution
The usual, please: go to Settings > Apps > All > Google Play Store and Clear cache and Clear data. Also Clear cache and Clear data for Google Services Framework.

Second solution
Try removing your GMail account

✳️How to solve Google Play – Error 501✳️

Problem
If you can't open the Google Play Store or perform downloads, then surely you have the 501 error.

Solution
To fix it, you must go to the Settings, then open these two applications: Google Play Services and Play Store – then you have to tap Clear Cache. Once you have done this, go into Accounts and delete your Google Account. Then restart your phone, input and synchronize your Google account again, then let your phone sit for five minutes without touching it. After these five minutes are over, the 501 error should not bother you anymore.

✳️How to solve Google Play - Error 498✳️

Problem
Interruption of downloads from the Google Play Store.

Solution
The problem is that the cache of your device is full. Delete unneeded applications and files. Restart your smartphone in recovery mode by pressing the volume down, power and home buttons (for Samsung devices), or volume down and power (for most other devices).

This mode provides a few more options. Select Wipe cache partition by navigating between options with the volume rocker. Confirm using the power button.

✳️How to solve Google Play Store - Error 497✳️

Problem
Difficulty updating installed apps

First solution
Clear out your Play Store data. Go to Settings > Applications > All > Google Play Store and hit Clear cache, Clear data and Uninstall updates.

Second solution
Disable your SD card, if you have one. Go to Settings > Storage > Unmount SD card.

Third solution
If your phone is rooted, you can delete the app's APK and reinstall it. To do so, open up Root Explorer, or a similar application, and navigate to System / app > Mount R / W > Delete application. Or you can play it safe and rename the offending APK to to something like GoogleSearch.apk.backup, so you can revert it if anything goes wrong.

✳️How to solve Google Play - Error 413✳️

Problem
Downloading applications or updates is impossible. If you use a proxy, remember that it may cause problems with the operation of the Google Play Store.

Solution
In Settings, find Apps (or Application manager), then swipe to All. Scroll down to Google Services and tap on Clear data and then Force stop. Do the same with the Google Play Store app and clear the cache from your internet browser.

✳️How to solve Google Play Error - 403✳️

Problem
The download is impossible and the request is 'forbidden'. This usually happens when two Google accounts are used to buy applications on one device.

Firs solution
Go the Google Play Store with the correct Google account. Uninstall the application in question. Try to get the app from Google Play again and click the purchase button.

Second solution
Clear the proxy you have possibly set up, by going into the Settings, then choose Wireless and Networks (or More networks) and then Mobile Network. Select APN, which stands for Access Point Name and hit Clear Proxy Option. You can always reinstate the proxy afterwards.

Third solution
Another solution would be to erase your entire search history which you can do in the Play Store itself by choosing the Settings button. Next, select Clear search history.

Fourth solution
Try creating a new Google account and using it instead for the Play Store. Go to the Google Play, and select the menu button again. Then select Accounts and choose the New Gmail account. Then reinstall the app.

5 Security Measures that leave Hackers Stranded

5 Security Measures that leave Hackers Stranded

There are a lot of people out there who want to get ahold of private data. These aren’t just regular hackers either; these are governments overstepping their boundaries to gain information about people overseas or even their own citizens.
There are a lot of people out there who want to get ahold of private data. These aren’t just regular hackers either; these are governments overstepping their boundaries to gain information about people overseas or even their own citizens. In fact, 64% of Americans have been victims of a major data breach. It’s no wonder such a large amount of people lack confidence that they and the institutions and websites they use can keep their information secure.

But not all bets are off. As hackers gain cyberspace territory, a response from the private and business sector is emerging. Industry leaders and innovators are finding new ways to protect internet users’ private information, and their solutions can get pretty creative. Here are five examples of the most capable, easy internet security measures that keep your information away from prying eyes.

1.Secure Your Data in Your Photos

Cloaksys is a brilliant method that keeps data safe by securing it where hackers don’t expect. It enables you to secure everything from simple account passwords to entire files inside any of your pictures. This allows your information to be stored without hackers knowing what it really is. They can search your files all they want, but they’re not likely to find what they’re looking for if it’s hidden away inside a photo.

Should someone gain either physical or remote access to your system, they will attempt to find whatever information about you they can, most likely through your social media accounts, memos, bookmarked sites, cookies and much more. The one place that they will never think to look is inside a simple photo. This photo that contains your data that is encrypted in 256 bit AES encryption and you can camouflage your passwords in plain sight as your background wallpaper, just like a chameleon does (hence Cloaksys’s chameleon logo).

The fun part about Cloaksys is that you can choose any photo you want to store your data in. Anything from a family vacation photo to a celebrity wallpaper can become your digital safe to keep your information secure.

Cloaksys helps preserve your privacy with 256 bit AES encryption inside your photos. This is the same technology used in the banking industry, with encryption strength approved by the Secretary of Commerce, so you can be confident that your information is safe within your beloved photos.

2.Encrypted Messaging

A popular new trend in messaging is to use encrypted messaging services such as WhatsApp or Signal to communicate. Your communication is private and you will need to have the key to unscramble your data.

Services like these also use 256 bit AES encryption and similar techniques to protect your communications. This helps to protect your privacy, even when overseas. Many of these apps require that the people you communicate with have these apps too. However, you can also encrypt Facebook Messenger and Allo (Google).

To encrypt a Facebook Messenger conversation, go to the conversation you want and click the i button up at the top. Select “Go To Secret Conversation.” This will open a new window with a black design that bears the words, “Secret Conversation.” Only users with the most recent version of Facebook Messenger can use Secret Conversations. If you don’t see that option, either you or the other party needs to update their Facebook Messenger App.

Allo users must first go to their settings and enable incognito chat (Google’s term for encrypted chat), and then click the new message icon. This will give you the standard option to enter a name, but two new icons will also appear: start incognito chat and start group incognito chat.

3.Trust Rating Websites and Plugins

Some tech companies have begun to analyze and report the trustworthiness of websites, so that internet users can check their safety before they visit. Web of Trust (a Chrome plugin) makes that even easier. This plugin sits in your browser bar and indicates whether a site you are visiting is considered safe.

The information being used to determine whether a website is safe or not is not just provided by a company; Web of Trust also relies on real users to report privacy and security problems on the sites they visit. This is what makes these services so helpful. You get real feedback from real people.

4.Smart Firewalls

Firewalls protect the devices in your home from being compromised, but smart firewalls do more than that. They help you protect all the devices on your home network that use the internet. In a world of smart TVs, smart appliances, and even smart security devices, there is a greater potential for your personal information to be compromised. Smart firewalls monitor the internet usage on your smart devices and protects them from hacking and malicious use.

Cujo Smart Firewall is just one example of this type of device. It is available at many electronics stores and protects everything from your computer to your smart appliances.

Although viruses, scams and security breaches happen all the time, there are many ways to preserve your privacy without living disconnected from the online services you’ve become accustomed to. Consider taking advantage of some of these emerging security options so that you can stay a step ahead of the cyber threats around us and be safer on the internet. And keep looking out for new security services that find innovative ways to protect yourself in this technological arms race.

5.Fingerprint Sensors for Credit/Debit Cards

In the United States, the most recent update to credit/debit cards has been the chip, and we still see plenty of companies who don’t have the option to use it. However, Taiwanese company Jinco Universal has come up with a way to make their financial cards even more secure, by putting biometric readers on the cards. These new cards have both a chip system and a fingerprint reader; card users will need to scan their fingerprint before making a purchase. The card contains a battery that lasts for about 300 uses and can be recharged so you don’t have to replace it.

In collaboration with lan Microelectronics Corporation and KSID, Jinco Universal has recently begun mass-producing the new biometric cards. They are also developing contracts to use these cards to secure other types of data, such as taxi licenses.

Sunday 27 August 2017

HOW TO MAKE SYMBOLS WITH KEYBOARD.

HOW TO MAKE SYMBOLS WITH KEYBOARD.

Alt + 0153..... ™... trademark symbol
Alt + 0169.... ©.... copyright symbol
Alt + 0174..... ®....registeredtrademark symbol
Alt + 0176 ...°......degree symbol
Alt + 0177 ...±....plus-or-minus sign
Alt + 0182 ...¶.....paragraph mark
Alt + 0190 ...¾....fraction, three-fourths
Alt + 0215 ....×.....multiplication sign
Alt + 0162...¢....thecent sign
Alt + 0161.....¡......upside down exclamation point
Alt + 0191.....¿.....upside down question mark
Alt + 1...........smiley face
Alt + 2 ......☻.....black smiley face
Alt + 15.....☼.....sun
Alt + 12......♀.....female sign
Alt + 11.....♂......male sign
Alt + 6.......♠.....spade
Alt + 5.......♣......Club
Alt + 3............. Heart
Alt + 4.......♦......Diamond
Alt + 13......♪.....eighth note
Alt + 14......♫......beamed eighth note
Alt + 8721.... ∑.... N-ary summation (auto sum)
Alt + 251.....√.....square root check mark
Alt + 8236.....∞.....infinity
Alt + 24.......↑.....up arrow
Alt + 25......↓......down arrow
Alt + 26.....→.....right arrow
Alt + 27......←.....left arrow
Alt + 18.....↕......up/down arrow
Alt + 29......↔... left right arrow..

Don't Forget to Share it on your Wall..!!
[8/19, 3:42 AM]  +91 81379 67796 : More than 100 Keyboard Shortcuts must read & Share.
=================
1. CTRL+C (Copy)
2. CTRL+X (Cut)
3. CTRL+V (Paste)
4. CTRL+Z (Undo)
5. DELETE (Delete)
6. SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
7. CTRL while dragging an item (Copy the selected item)
8. CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
9. F2 key (Rename the selected item)

10. CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
11. CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
12. CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
13. CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
14. CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
15. CTRL+A (Select all)
16. F3 key (Search for a file or a folder)
17. ALT+ENTER (View the properties for the selected item)
18. ALT+F4 (Close the active item, or quit the active program)
19. ALT+ENTER (Display the properties of the selected object)
20. ALT+SPACEBAR (Open the shortcut menu for the active window)

21. CTRL+F4 (Close the active document in programs that enable you to have multiple documents opensimultaneously)
22. ALT+TAB (Switch between the open items)
23. ALT+ESC (Cycle through items in the order that they had been opened)
24. F6 key (Cycle through the screen elements in a window or on the desktop)
25. F4 key (Display the Address bar list in My Computer or Windows Explorer)
26. SHIFT+F10 (Display the shortcut menu for the selected item)
27. ALT+SPACEBAR (Display the System menu for the active window)
28. CTRL+ESC (Display the Start menu)
29. ALT+Underlined letter in a menu name (Display the corresponding menu) Underlined letter in a command name on an open menu (Perform the corresponding command)
30. F10 key (Activate the menu bar in the active program)

31. RIGHT ARROW (Open the next menu to the right, or open a submenu)
32. LEFT ARROW (Open the next menu to the left, or close a submenu)
33. F5 key (Update the active window)
34. BACKSPACE (View the folder onelevel up in My Computer or Windows Explorer)
35. ESC (Cancel the current task)
36. SHIFT when you insert a CD-ROMinto the CD-ROM drive (Prevent the CD-ROM from automatically playing)
Dialog Box - Keyboard Shortcuts
1. CTRL+TAB (Move forward through the tabs)
2. CTRL+SHIFT+TAB (Move backward through the tabs)
3. TAB (Move forward through the options)
4. SHIFT+TAB (Move backward through the options)
5. ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
6. ENTER (Perform the command for the active option or button)

Please share this article if you find it useful!

Friday 25 August 2017

9Mobile Unlimited free browsing using shadowsocks

9Mobile cheat code has been blazing since but the problem is that is capped with 60mb. This limits people browsing and download daily because they have to manage the MB.
It's time to enjoy 9mobile Unlimited Free Browsing and downloading with
Shadowsocks . Natewap says goodbye to 60MB daily limit in 9Mobile cheat code.
9mobile Unlimited Free Browsing With Shadowsocks Vpn 2017
Follow the procedure carefully :
REQUIREMENTS
✔ Your 9mobile sim
✔ A strong 3g/4g network
✔ Download Shadowsocks apk
✔ Download Connection Stabilizer
1] After you've downloaded the Shadowsocks VPN , install and launch it.
2] So after doing this,  click on the plus sign icon above at the right and tap on manual settings as seen in the screenshot.
And use the following details for this Profil settings;
Profile name= Natewap
Server= 79.137.5.27
Remote port= 10010
Local port= 1080
Password= www(dot)kxss(dot)me
Encrpt method= AES-256-CFB
or
Profile name= 9Mobile
server= 79.137.5.27:10014
Remote port= 10014
Password= www(dot)kxss(dot)me
Encrpt method= AES-256-CFB
Make sure you used (.) instead of dot, I only used this to prevent it from shrinking into the page title which will look totally confusing.
or
Profile name= NateWap
server= 106.186.116.88
Remote port= 443
Password= 33805430
Encrypt method= So make you select [RC4-MD5 ] for this server.
So after inputing any  of the aboveconfiguration settings, the hit the save button and Connect it back clicking on the triangle icon below.
And that's, it will connect in an instantly as seen in the Screenshot below ;
Then go back to your connection stabilizer, and connect it to make it stable.
So here are the manual shadowsocks account I created by myself and much more are going to be released. So this server is currently slow and the first can access WhatsApp while the second and th third cannot power WhatsApp and we're still working to bring up another blazing server for you guys. And very slow in downloading but stillmanageable if you're not that greedy lols. I will still elaborate more on how this shadowsocks work for my fellow team's members.

Thursday 24 August 2017

How to Unlock Your Cell Phone (So You Can Bring It to a New Cellular Carrier)

How to Unlock Your Cell Phone (So You Can Bring It to a New Cellular Carrier)

Most cell phones sold in North America  — especially on contract — are “locked” to a particular cellular carrier. They can only be used on that carrier’s network, so you can’t switch to another carrier without “unlocking” it first.

Phone locking applies to nearly any type of cell phone, from the lowest, cheapest dumb phone to the highest end smartphone. Unlocking is different from jailbreaking and rooting, which bypass other software restrictions on mobile devices.

Unlocking Won’t Make Phones Completely Portable
First, it’s important to bear in mind that phones won’t always be capable of working on another carrier even after they’re unlocked. For example, in the USA, AT&T and T-Mobile use the GSM wireless standard, while Verizon and Sprint use the CDMA wireless standard. These are incompatible with each other, which means that you can’t unlock a CDMA phone purchased on Verizon and take it to AT&T’s GSM network, or vice versa.

CDMA is also a more restrictive type of network — while you can unlock an AT&T phone and take it to T-Mobile, you can’t unlock a Verizon phone and take it to Sprint, as Sprint’s CDMA network will reject the phone.

Luckily, most of the world has chosen the less-restrictive GSM standard. Before you consider unlocking a phone and taking it to another carrier, ensure that your phone will actually be capable of functioning on that carrier’s network.

Phone Locking Explained
The CDMA/GSM difference is a legitimate technical barrier to moving phones between carriers. However, there are also artificial barriers. Carriers “lock” phones to make them only function on that carrier’s network.

For example, let’s say you walk into AT&T and pick up any smartphone on contract. That phone will then function on AT&T’s network, but if you try to place a T-Mobile SIM card into the phone and switch to T-Mobile’s network, the phone will reject the T-Mobile SIM card. There’s no legitimate technical reason for this — it’s compatible — but the AT&T phone is “locked” to AT&T’s network and will only accept AT&T SIM cards.

This would also get in your way if you were travelling and wished to use a local carrier in the country you were visiting rather than paying expensive roaming fees — your locked phone would reject anything but an AT&T SIM card.

Why Are Phones Locked?
Cellular carriers argue that phone locking is a necessary part of their business. By locking phones they sell on contract, they’re able to keep customers on their network so they’ll continue paying their monthly bills. Remember, phones aren’t actually worth their on contract prices — they’re subsidized. No phone is actually “free” and the latest iPhone actually costs more than $199 — so the carrier needs to recover the cost of the on-contract phone over the lifetime of the contract. If consumers were able to take their phones to other networks, carriers argue that they would have difficulty recovering the price of the phone and their business model would take a hit.

In reality, this is a fairly silly argument. If you buy a phone on contract, you’re signing a two-year contract. If you want to take that phone to another carrier, you’d have to break your contract and pay an early termination fee or keep paying the monthly bill for the lifetime of the contract. This contractual obligation would still be binding even if the phone itself was sold unlocked and you took it to another carrier. Some smartphones may even be sold locked if you buy them from a carrier store at full price, without signing a contract, which shows how silly this argument is.

Cell phone locking is really just a way to create additional friction for average people switching carriers, encouraging them to stick with their current carrier instead of looking around for a better price and switching carriers. It’s one of the many horrible business practices carriers employ to gouge their customers.

Unlocking Your Phone
So you want to unlock your phone. Maybe your contract has expired and you want to switch to another carrier, maybe you’re visiting another country, or maybe you just want to pay an early termination fee and get out of your contract early.

There are several ways to unlock a phone:

Call and Ask Nicely: Your carrier may unlock your phone for you. Call your carrier and ask nicely — if your contract has expired, they’ll hopefully unlock your phone for you. If you tell your carrier you’ll be travelling and wish to use a SIM card from another country to save on roaming fees, they may also unlock your phone for you. They may charge a fee for this, but it’s worth a shot. Update: most carriers in the US will unlock your phone as long as you’ve paid off anything you owe on the phone.
Unlock It Yourself
cell phone unlocking is now legal in the US. However, if you live in another country or are willing to be a rebel and flout a law everyone agrees should be changed, you can often unlock phones on your own without anyone’s permission. The exact process will vary from phone to phone, so you’ll have to perform a web search and find instructions for your specific mobile phone.

Of course, not all phones are sold locked. Often, phones sold directly from the manufacturer instead of by a carrier come unlocked. You’ll generally have to pay full price to get an unlocked phone that you can move between carrier networks, as there’s no carrier to subsidize the phone’s full cost.

Wednesday 23 August 2017

Android Oreo - See the amazing features of the upcoming Android OS

Android Oreo - See the amazing features of the upcoming Android OS


One of the annual announcements that comes from the stables of Google is the unveiling of a new version of the her Android Operating System. This OS announcement is also arguably one of the most anticipated news from Google all across the world.


And as it has been a long time tradition of the company to keep details about all upcoming OS secret, the Android O is no different as it also follows name hide-and-seek trend. However, the Android O can be safely to be that OS that exposes Google as a poor “hider” after all.

The Android O or Android Version 8.0 will be called the Android Oreo… and it was just too damn easy! Numerous Android expert, developers and even smartphone users had hinted that Google would most likely adopt the popular chocolate milk cookie, Oreo as the base name for her Android 8.0 OS and it happened. Guess we are all psychics after all.


Yeah, that’s enough bragging about our psychic abilities, let’s now cut to the chase and list some of the features of the Android 8.0 Oreo

Android 8.0 Oreo features
Picture-in-Picture (PIP) mode

Android 8.0 Oreo Picture-in-Picture multitasking mode
Anyone that uses the YouTube app would be familiar with what Picture-in-Picture means. The PIP mode allows Android smartphone users operate two applications at the same time on the display. So, instead of minimizing an app to the background, the PIP mode is quite better as it allows you to monitor the activities of two applications simultaneously.

The PIP mode should not be mistaken for the Split-screen mode native to the Android 7.0 Nougat. They are different features in entirety.

New Emojis

Android 8.0 Oreo Emojis
The Android O also packs along new native set of livelier and fun emoji to bring a whole new experience to texting and new feel to the OS entirely.

App Notification Dot

On the Android 8.0, applications on the home screen and app tray will now have its individual notification dot to alert users of new stuff, update, message or information within the app. Just the same way instant messaging apps display notifications on their logo. The difference here is, all applications will have a tiny notification dot as soon as there is an update within the app.

Instant Apps
Although this is a feature that Android users running previous versions (Lollipop and above) have been enjoying, it however launched officially with the Android 8.0 Oreo.

The Instant App feature confers users with the ability to use compatible applications without having to install them on their devices. Users cam simply run the app through the Google Chrome browser and it will function like a stand-alone app.

Smart Auto-fill
Google put in a lot of work on the Android i.0 Oreo OS and the smart auto-fill feature is a proof of magnitude of work imputed.

Your login credentials from your favorite applications are stored by Google and when you need to login again, it automatically inputs them and logs you in like you were logged in before. Watch the demo below for a clearer picture.