Wednesday, 5 October 2016

'Shark stepping on a Lego' photo goes viral; here's the real story

The shark knows our pain.
When Robert Petersen, a student in Reno, Nevada, spotted a photo of a shark emerging from the water, its mouth open as if wincing, he made a smart and funny connection with the very human agony of stepping on a Lego brick. Then he tweeted the photo Thursday with the words "Rare image of a shark stepping on a Lego."


Google Introduces Pixel – A Smartphone Made By Google


Last night, Google unveiled its first ever Smartphone, the Google Pixel. Ditching the Nexus name, this time around Google has worked on both the software and hardware of the phone itself. Previously Google would partner with other smartphone manufacturers to release a flagship set.
phone_hero-module_hero-image_1440_2x

A powerful phone with a complete package

According to Google, the Pixel holds the highest rated camera ever on a Smartphone, a battery that lasts longer than most phones and unlimited free storage for all the photos and videos you capture through it. Moreover, it is the first Smartphone to come preinstalled with Google Assistant, a voice activated assistant.
Video Thumbnail
Introducing Pixel, Phone by Google

Pixel is preinstalled with Google Assistant, the only phone of its kind

opa-animated-answers-sunglasses-en_us
The Google assistant is a new voice activated assistant just like Siri and Cortana on iPhone and Windows.
The assistant will help you:
Get answers – You can find out the local places near you or ask the assistant if it is going to rain in the upcoming days or ever ask it see if your favorite sports team won their match last night.
Manage tasks – it will allow you to set reminders, make dinner reservations or text valuable information to your friends without typing.
Entertainment – Google Assistant will help you play music of your favorite artist and then find out if they will be near your town for a tour.
Quickly find photos – Ask the assistant to quickly find photos on your phone by simply recalling the memory or day they were taken.
Keep travel records – If you travel a lot, Google Assistant can help you manage your flight schedule or help you find addresses to local hotels and other places to visit.

Pixel Features A Powerful Camera

pixel-burst
Google has produced one of the highest rated cameras on a smartphone. The Pixel camera scored 89 DxOMark score, a way to judge the performance of a camera. This is the highest rating a smartphone camera has ever reached.
Technical specs of the camera are as follows:
  • 12.3 MP for sharp and crisp images
  • Large 1.55um pixels for excellent shots in any kind of light
  • f/2.0 Aperture for brighter photos

Unlimited storage for all the photos and videos you capture

pixel-storage
Google has promised that with Pixel, you will never have to face the ‘storage if almost full’ warning message. They have included free unlimited storage for all your photos and videos over the cloud.

Facetime like application that works cross platform

google-duo
A new application called the Google Duo will come preinstalled in Pixel. It is a facetime like application that will connect two phones via video chat. The app will also be available on iPhones.

Design of the Google Pixel

pixel
The Pixel is exclusively made by Google. It has both software and hardware that was worked on by Google engineers.
The design features
  • A seamless glass-aluminium body carrying smooth surfaces and curved edges for easy grip
  • On the back of the phone Google has installed Pixel Imprint, a fingerprint detector that will allow you to quickly unlock your phone by swiping on it or access your notifications easily.
  • Pixel features a very sharp and brilliant AMOLED display that has true blacks and a 16.77 million colors profile.
  • Pixel also features a rapid charging battery that gives you 7 hours of battery life in just 15 minutes of charge.
  • Pixel will run on Android 7.1 Nougat

Switching from other phones will no longer require a PC

pixel2

In order to help you move from your previous Android powered device or an iPhone, Google is packing a Quick Switch Adapter with the Pixel.
The quick switch adapter allows you to connect the Pixel with any other phone and transfer all your data via the data cable. No PC is necessary for this process.

Pixel is available in 3 colors with several custom made cases by Google

The Pixel will launch in 3 colors:
  • Quite Black
  • Very Silver
  • Really Blue (US only)
pixel-cases
Apart from the basic colors, Google has also introduced Pixel cases with varying designs that offer protection and style for your phone.

Google Pixel features DayDream VR – A direct competitor to Samsung Gear VR

google-daydream
Partnered with Google Pixel, the company also launched a new VR headset ‘DayDream View’. This new headset will only work with phones that support DayDream View.
The VR headset is aimed at casual VR users allowing them to watch immersive 3D content and play video games. The headset will also feature a remote control and will be separately sold for $79
source : Trending

Friday, 30 September 2016

Instagram is going to have a Massive Change coming in new update.

The New Update is going to bring a Massive change in Instagram's daily usage 

Security Checks

As a Beta user of Instagram there have been following changes in Instagram:-

Click on the change you want to know about.

Thursday, 29 September 2016

How To Hack Instagram.

The Most used and Easy way to Hack Instagram without using any Tool, Surveys or Paying.

Easy and Most used way for Hacking Instagram.
If you have been looking for how to hack instagram account, then you should look no further, as we gives you the ability to hack any instagram account. We work by providing you the password to the instagram account which allows you to be able to log into the instagram account. All you need to hack an instagram account with us is the username of the account you intend to hack and you are good to go.


Click on any Link below to get Started:-

                                                                        Click Here






                                                                        Click Here



***This Method is to be used for education Purpose only and If used for any other purpose the author of this post in not going to be Responsible.

How to become a hacker


Computer hackerAlthough hacker has many definitions, we believe most people asking this question are interested in malicious coding. Computer Hope does not teach or condone cracking, stealing, breaking, or otherwise illegal cyber activity. However, a hacker may also be defined as someone with an advanced understanding of computers and programming. If you want to learn more about this side of hacker, see the suggestions below.

Learn more about computers

Computer basics - Having a good understanding of a computer, its components, and how it works is essential for anyone, not just hackers.
Books - Make it a goal to read computer books that cover your interests. Visiting popular online bookstores, such as Amazon, and browse through the top 100 books on your subject is a great place to start. Audible has an enormous selection of e-books, if you prefer that method of reading.
Know the jargon - The computer industry has thousands of acronyms and terms, visit the Computer Hope dictionary to find the ones you are most likely to run across.
Online news - Visit the Computer News pages at least a few times weekly to keep up with all the latest computer news. Visit our computer news links for a list of great news sites.
Participate in forums - The Internet is full of online forums, where thousands of other users participate with each other in answering questions or talking about what they love to do. Participating in these forums will not only allow you to test your understanding of the subject, but also learn from others. A great example of an online forum would be theComputer help forums.
Build a computer - If you want to learn more about the hardware aspect of a computer, there is nothing more educational than putting one together. Not only will this help broaden your knowledge of computer hardware, but can help with diagnosing hardware problems, and teach you more about how computers work. There are plenty of websites with instructions on how to build your own machine.

Pick up a programming language

Learning how software works by studying a programming language is an invaluable tool. It teaches you how to create your own programs, and how to debug them. It also gives you a better understanding of how programs work. Our programming language definition lists many of the more popular programming languages.
Also, learning scripting languages such as Perl and PHP and even the basics of HTML web design, are advantageous for anyone interested in setting up and tweaking websites.
If you need more experience with programming, creating your own open source project or helping with another open project can be a helpful learning experience. Creating your own website can also be another great learning experience as it shows the details behind website design and setup.

Learn alternative operating system

Many people today run some version of Microsoft Windows, which is fine for home and office use, but it is also a good idea to learn alternative operating systems such as Linux. Learning a Linux distro not only helps broaden your experience, but is a necessity when wanting to navigate Linux based servers running websites and other web services.
Tip: If you have access to a server that is hosting your website, you may have access to SSH, which allows you to connect to a server and is another good way to learn the Linux command line.
If you are new to Linux, Ubuntu is a good distro for new users to try. This distro of Linux can also be run by booting it off of a CD. However, if you want a full experience, it is better to install Ubuntu or another distro on the computer.
Also, having a good understanding of the Linux command line commands is also a must. See our Linux page for a full listing of commands and the syntax for those commands.

Learn more on networking

Networks run the Internet and connect home or office computers together. It is important to know as much as you can on how networks operate, including basics like anIP addressOSIportprotocolrouter, and subnet mask.
Also, setting up your own home network, especially a network with multiple computers and different operating systems, can be a very helpful.

Related Questions

Will you teach me to hack?
Everything you need to know is mentioned above.
How old do you have to be to hack?
There is no age requirement for someone to become a hacker. It often comes down to that individual's drive and overall knowledge of computers, networking, and programming.
Who are some famous hackers?
See our list of computer hackers for a list of some of the good and bad hackers.
How will I know when I am a hacker?
If you are doing or have already done all of the above, you are consider a hacker. If you are hacking for good you are considered a white hat hacker if you are doing anything malicious you are considered a black hat hacker.
How do I know if someone else is a hacker?
Anyone who is good with computer, programming, and networking may be considered a hacker. However, trying to determine if a malicious hacker hacked into your computer is difficult, since it usually requires a hacker or computer expert to detect malicious activity.

source : http://www.computerhope.com/issues/ch001183.htm

Wednesday, 28 September 2016

Windows XP support is ending April 8, 2014

\
Microsoft first released Windows XP on October 25, 2001. Support for this operating system ended April 8, 2014, which means that they will no longer be providing any updates, patches, or further software security.
If you are still running Windows XP it will continue to work after this date, but if a security vulnerability is discovered after this date it will not be fixed by Microsoft. However, Microsoft will continue to offer anti-malware support (MSE) for Windows XP until July 14, 2015 and other anti-virus developers also announced extending their support up to a year. While this will offer some protection for your computer it still will not protect against any new vulnerabilities not yet released or discovered.
Some people argue that since Windows XP is such an established operating system that it is not likely that any new security vulnerabilities will be discovered. However, most experts recommend upgrading to a later version of Windows, either Windows 7 or the latest version of Windows, Windows 8.
If your computer is over four years old or does not meet the system requirements of a new versions of Windows we suggest getting a new computer with a more up-to-date version of Windows. Alternatively if you want to keep the older computer and don't need Windows you may also consider switching to Linux distro.
Tip: Microsoft is offering a free data transfer program for users upgrading from Windows XP to Windows 7, 8, or 8.1.
Tip: If your hesitation of upgrading Windows is because you have an older program designed for Windows XP, Windows XP Mode can help older programs run in new versions of Windows.

What if I still want to run and use Windows XP?

If you plan on continuing to use Microsoft Windows XP after April 8, 2014 following the below suggestions.
  1. Don't use an administrator account - Use a limited account and not a adminaccount. If you use an account with not enough rights spywaremalware, and other exploits wont work or be much less likely to work.
  2. Use an alternative, supported browser - Internet Explorer and Chrome are no longer supported in Windows XP. Instead, use an alternative browser that is still supported and being updated, such as Opera or Firefox.
  3. Keep your browser plugins and extensions updated - Plug-ins like Java andFlash are one of the most common methods of attacking a computer. Keep your browser and all of its plug-ins up-to-date. You can find the latest version of all your plug-ins through our system information tool. If you don't use a plug-in that is installed (e.g. Java, uninstall it from the computer.)
  4. Keep the computer offline - If this is a work computer that doesn't need to be online keep it offline. Without having access to the Internet the computer cannot be attacked.
  5. Follow all the steps on how to protect yourself while online.

Related questions

Can Windows XP still be installed and activated after April 8, 2014?
Yes. You'll still be able to run, install, and activate Windows XP after April 8, 2014.
What about Windows XP Embedded?
Windows XP Embedded support will remain until January 12, 2016.

source : Computerhope

Facebook told to stop collecting German WhatsApp data


WhatsApp on smartphoneImage copyrightPA

Facebook has been ordered by a German privacy regulator to stop collecting and storing the data of German users of its messaging app WhatsApp.
The Hamburg Commissioner for Data Protection and Freedom of Information said that the social network had not obtained effective approval from WhatsApp's 35 million German users.
Facebook bought WhatsApp for $19bn (£14.6bn) in 2014 as a way to reach out to a younger audience.
It is to appeal against the order.
"We will work with the Hamburg DPA in an effort to address their questions and resolve any concerns," it said in a statement.
The data watchdog said that Facebook and WhatsApp were independent companies and should process their users' data as such.
"After the acquisition of WhatsApp by Facebook two years ago, both parties have publicly assured [users] that data will not be shared between them," said commissioner Johannes Caspar in a statement.
WhatsApp caused controversy in August when it announced that it was changing its privacy policy to allow its data to be shared with its parent company.
It said that better co-ordination with Facebook would help it to fight spam as well as allowing Facebook to offer "better friends suggestions and show you more relevant ads if you have an account with them".
It will share phone numbers and the details of the last time that users signed on to WhatsApp.
EU and US regulators reacted with caution, saying that the update needed to be investigated. The UK's Information Commissioner is also looking into the changes.
source : BBC

Microsoft scam man is sentenced in 'landmark' case


A man who ran a Microsoft computer scam tricking people into paying for free anti-virus software has received a suspended four-month jail sentence.
Mohammed Khalid Jamil, 34, from Luton, hired people at an Indian call centre to falsely tell victims their computers had a serious problem.
The targets would be charged between £35 and £150 for software Microsoft made available for free.
As well as the suspended sentence, Jamil was ordered to pay a £5,000 fine.
He must also pay £5,665 compensation and £13,929 in prosecution costs.
The decision has been hailed as a "landmark" case by Trading Standards.
"We believe it may be the first ever successful prosecution of someone involved in the Microsoft scam in the UK," said Lord Harris, chairman of the National Trading Standards Board, which oversees the work of the National Trading Standards e-crime team.
"It's an important turning point for UK consumers who have been plagued by this scam, or variants of it, for several years.
"Many have succumbed to it, parting with significant sums of money, their computers have been compromised and their personal details have been put at risk.
"Now that one of the many individuals who've been operating this scam has been brought to justice, it's a stark warning to anyone else still doing it that they can be caught and will be prosecuted."

Remote access

Jamil had set up Luton-based company Smart Support Guys, which employed people based in India to cold-call Britons and claim to be working for Microsoft.
The victims, unaware of the scam, would offer remote access to the fraudsters - meaning their computers could be controlled from a different location.
Once given this access, targets' computers would be made less secure, at which point the scammers would offer, in return for a fee, to install software to fix the problem.
The software installed was available for free on Microsoft's website.
In court, Jamil admitted to unfair trading by allowing his staff to make false claims regarding computer support services.
He claimed he had tried but failed to control call centre staff and not adequately supervised them.
His jail term is suspended for 12 months.
source: BBC NEWS

How to remotely shutdown another Windows computer



Microsoft Windows 2000, XP (XP home users read section below) and later users can remotely shutdown another computer in their network by utilizing the shutdown command.
To start the GUI version of this command, follow these steps:
Windows 8 and 10 users
  1. Press the Windows key + X on the keyboard to open the Power User menu.
  2. Select the Search option in the menu.
  3. In the Search text box, type shutdown -i and press Enter.
Windows Vista and 7 users
  1. Click the Start button.
  2. In the Search text box at the bottom of the Start menu, type shutdown -i and press Enter.
Windows 2000 and XP users
  1. Click the Start button, then select the Run option.
  2. In the Run window, type shutdown -i and press Enter.
After running this command you should see a dialog window shown in the example below.

As you can see in the example above, you'll have different options to choose from in the Remote Shutdown Dialog.
Tip: You need administrative privileges to access and shut down the computer remotely to complete the steps below.
  1. Specify the name or IP address of the computer you want to shutdown by clicking the Add button.
  2. Select Shutdown from the list of values under "What do you want these computers to do".
  3. Keep the Warn users of the action option checked if you want to warn the user of the shutdown before it occurs.
  4. In the "Shutdown Event Tracker" section, choose the option in the list of values that you want the Event Log to show when the computer shuts down and enter a comment.
  5. Click OK to initiate the shutdown of the remote computer.

For Windows Home edition computers

If the remote computer you're attempting to shutdown is running a Home edition of Microsoft Windows, you need to enable guest remote shutdown privileges before the above steps will work. To do this, follow the steps below.
  1. Download and install the Windows Resource Kit on the computer you are wanting to remotely shutdown.
  2. Once downloaded and installed, copy the NtRights.exe file from the "Program Files\Windows Resource Kits\Tools" directory into the "Windows\System32" directory.
  3. After the file has been copied, open a command prompt window by clicking Start, Run, and typing cmd and pressing Enter. At the prompt, type the below commands exactly as you see them here (unless your Windows directory is in a different path).

    cd\windows\system32
    NtRights –u Guest +r SeRemoteShutdownPrivilege
    NtRights –u Guest +r SeShutdownPrivilege
  4. If successful after typing each of the above NtRights commands, you should get a success message. Once this has been completed, exit the command prompt window and restart your computer.
Once the above steps have been completed, you should be able to remotely shutdown that computer from another Windows computer.

Unable to get remote shutdown to work

Inoperable remote shutdown could be caused by any of following reasons.
  • The domain administrator has group policies in place to prevent remote shutdown.
  • Remote administration or the $ADMIN share is disabled.
  • You're logged into an account that does not have administrative privileges.

Alternative solutions

If you're still unable to remotely shutdown a computer or are using an earlier version of Windows, there are dozens of software utilities that can be used. Our alternative recommended solutions are PowerOff and PsShutdown.exe, which is part of the freePsTools suite.
source: http://www.computerhope.com/