Friday 30 September 2016

Instagram is going to have a Massive Change coming in new update.

The New Update is going to bring a Massive change in Instagram's daily usage 

Security Checks

As a Beta user of Instagram there have been following changes in Instagram:-

Click on the change you want to know about.

Thursday 29 September 2016

How To Hack Instagram.

The Most used and Easy way to Hack Instagram without using any Tool, Surveys or Paying.

Easy and Most used way for Hacking Instagram.
If you have been looking for how to hack instagram account, then you should look no further, as we gives you the ability to hack any instagram account. We work by providing you the password to the instagram account which allows you to be able to log into the instagram account. All you need to hack an instagram account with us is the username of the account you intend to hack and you are good to go.


Click on any Link below to get Started:-

                                                                        Click Here






                                                                        Click Here



***This Method is to be used for education Purpose only and If used for any other purpose the author of this post in not going to be Responsible.

How to become a hacker


Computer hackerAlthough hacker has many definitions, we believe most people asking this question are interested in malicious coding. Computer Hope does not teach or condone cracking, stealing, breaking, or otherwise illegal cyber activity. However, a hacker may also be defined as someone with an advanced understanding of computers and programming. If you want to learn more about this side of hacker, see the suggestions below.

Learn more about computers

Computer basics - Having a good understanding of a computer, its components, and how it works is essential for anyone, not just hackers.
Books - Make it a goal to read computer books that cover your interests. Visiting popular online bookstores, such as Amazon, and browse through the top 100 books on your subject is a great place to start. Audible has an enormous selection of e-books, if you prefer that method of reading.
Know the jargon - The computer industry has thousands of acronyms and terms, visit the Computer Hope dictionary to find the ones you are most likely to run across.
Online news - Visit the Computer News pages at least a few times weekly to keep up with all the latest computer news. Visit our computer news links for a list of great news sites.
Participate in forums - The Internet is full of online forums, where thousands of other users participate with each other in answering questions or talking about what they love to do. Participating in these forums will not only allow you to test your understanding of the subject, but also learn from others. A great example of an online forum would be theComputer help forums.
Build a computer - If you want to learn more about the hardware aspect of a computer, there is nothing more educational than putting one together. Not only will this help broaden your knowledge of computer hardware, but can help with diagnosing hardware problems, and teach you more about how computers work. There are plenty of websites with instructions on how to build your own machine.

Pick up a programming language

Learning how software works by studying a programming language is an invaluable tool. It teaches you how to create your own programs, and how to debug them. It also gives you a better understanding of how programs work. Our programming language definition lists many of the more popular programming languages.
Also, learning scripting languages such as Perl and PHP and even the basics of HTML web design, are advantageous for anyone interested in setting up and tweaking websites.
If you need more experience with programming, creating your own open source project or helping with another open project can be a helpful learning experience. Creating your own website can also be another great learning experience as it shows the details behind website design and setup.

Learn alternative operating system

Many people today run some version of Microsoft Windows, which is fine for home and office use, but it is also a good idea to learn alternative operating systems such as Linux. Learning a Linux distro not only helps broaden your experience, but is a necessity when wanting to navigate Linux based servers running websites and other web services.
Tip: If you have access to a server that is hosting your website, you may have access to SSH, which allows you to connect to a server and is another good way to learn the Linux command line.
If you are new to Linux, Ubuntu is a good distro for new users to try. This distro of Linux can also be run by booting it off of a CD. However, if you want a full experience, it is better to install Ubuntu or another distro on the computer.
Also, having a good understanding of the Linux command line commands is also a must. See our Linux page for a full listing of commands and the syntax for those commands.

Learn more on networking

Networks run the Internet and connect home or office computers together. It is important to know as much as you can on how networks operate, including basics like anIP addressOSIportprotocolrouter, and subnet mask.
Also, setting up your own home network, especially a network with multiple computers and different operating systems, can be a very helpful.

Related Questions

Will you teach me to hack?
Everything you need to know is mentioned above.
How old do you have to be to hack?
There is no age requirement for someone to become a hacker. It often comes down to that individual's drive and overall knowledge of computers, networking, and programming.
Who are some famous hackers?
See our list of computer hackers for a list of some of the good and bad hackers.
How will I know when I am a hacker?
If you are doing or have already done all of the above, you are consider a hacker. If you are hacking for good you are considered a white hat hacker if you are doing anything malicious you are considered a black hat hacker.
How do I know if someone else is a hacker?
Anyone who is good with computer, programming, and networking may be considered a hacker. However, trying to determine if a malicious hacker hacked into your computer is difficult, since it usually requires a hacker or computer expert to detect malicious activity.

source : http://www.computerhope.com/issues/ch001183.htm

Wednesday 28 September 2016

Windows XP support is ending April 8, 2014

\
Microsoft first released Windows XP on October 25, 2001. Support for this operating system ended April 8, 2014, which means that they will no longer be providing any updates, patches, or further software security.
If you are still running Windows XP it will continue to work after this date, but if a security vulnerability is discovered after this date it will not be fixed by Microsoft. However, Microsoft will continue to offer anti-malware support (MSE) for Windows XP until July 14, 2015 and other anti-virus developers also announced extending their support up to a year. While this will offer some protection for your computer it still will not protect against any new vulnerabilities not yet released or discovered.
Some people argue that since Windows XP is such an established operating system that it is not likely that any new security vulnerabilities will be discovered. However, most experts recommend upgrading to a later version of Windows, either Windows 7 or the latest version of Windows, Windows 8.
If your computer is over four years old or does not meet the system requirements of a new versions of Windows we suggest getting a new computer with a more up-to-date version of Windows. Alternatively if you want to keep the older computer and don't need Windows you may also consider switching to Linux distro.
Tip: Microsoft is offering a free data transfer program for users upgrading from Windows XP to Windows 7, 8, or 8.1.
Tip: If your hesitation of upgrading Windows is because you have an older program designed for Windows XP, Windows XP Mode can help older programs run in new versions of Windows.

What if I still want to run and use Windows XP?

If you plan on continuing to use Microsoft Windows XP after April 8, 2014 following the below suggestions.
  1. Don't use an administrator account - Use a limited account and not a adminaccount. If you use an account with not enough rights spywaremalware, and other exploits wont work or be much less likely to work.
  2. Use an alternative, supported browser - Internet Explorer and Chrome are no longer supported in Windows XP. Instead, use an alternative browser that is still supported and being updated, such as Opera or Firefox.
  3. Keep your browser plugins and extensions updated - Plug-ins like Java andFlash are one of the most common methods of attacking a computer. Keep your browser and all of its plug-ins up-to-date. You can find the latest version of all your plug-ins through our system information tool. If you don't use a plug-in that is installed (e.g. Java, uninstall it from the computer.)
  4. Keep the computer offline - If this is a work computer that doesn't need to be online keep it offline. Without having access to the Internet the computer cannot be attacked.
  5. Follow all the steps on how to protect yourself while online.

Related questions

Can Windows XP still be installed and activated after April 8, 2014?
Yes. You'll still be able to run, install, and activate Windows XP after April 8, 2014.
What about Windows XP Embedded?
Windows XP Embedded support will remain until January 12, 2016.

source : Computerhope

Facebook told to stop collecting German WhatsApp data


WhatsApp on smartphoneImage copyrightPA

Facebook has been ordered by a German privacy regulator to stop collecting and storing the data of German users of its messaging app WhatsApp.
The Hamburg Commissioner for Data Protection and Freedom of Information said that the social network had not obtained effective approval from WhatsApp's 35 million German users.
Facebook bought WhatsApp for $19bn (£14.6bn) in 2014 as a way to reach out to a younger audience.
It is to appeal against the order.
"We will work with the Hamburg DPA in an effort to address their questions and resolve any concerns," it said in a statement.
The data watchdog said that Facebook and WhatsApp were independent companies and should process their users' data as such.
"After the acquisition of WhatsApp by Facebook two years ago, both parties have publicly assured [users] that data will not be shared between them," said commissioner Johannes Caspar in a statement.
WhatsApp caused controversy in August when it announced that it was changing its privacy policy to allow its data to be shared with its parent company.
It said that better co-ordination with Facebook would help it to fight spam as well as allowing Facebook to offer "better friends suggestions and show you more relevant ads if you have an account with them".
It will share phone numbers and the details of the last time that users signed on to WhatsApp.
EU and US regulators reacted with caution, saying that the update needed to be investigated. The UK's Information Commissioner is also looking into the changes.
source : BBC

Microsoft scam man is sentenced in 'landmark' case


A man who ran a Microsoft computer scam tricking people into paying for free anti-virus software has received a suspended four-month jail sentence.
Mohammed Khalid Jamil, 34, from Luton, hired people at an Indian call centre to falsely tell victims their computers had a serious problem.
The targets would be charged between £35 and £150 for software Microsoft made available for free.
As well as the suspended sentence, Jamil was ordered to pay a £5,000 fine.
He must also pay £5,665 compensation and £13,929 in prosecution costs.
The decision has been hailed as a "landmark" case by Trading Standards.
"We believe it may be the first ever successful prosecution of someone involved in the Microsoft scam in the UK," said Lord Harris, chairman of the National Trading Standards Board, which oversees the work of the National Trading Standards e-crime team.
"It's an important turning point for UK consumers who have been plagued by this scam, or variants of it, for several years.
"Many have succumbed to it, parting with significant sums of money, their computers have been compromised and their personal details have been put at risk.
"Now that one of the many individuals who've been operating this scam has been brought to justice, it's a stark warning to anyone else still doing it that they can be caught and will be prosecuted."

Remote access

Jamil had set up Luton-based company Smart Support Guys, which employed people based in India to cold-call Britons and claim to be working for Microsoft.
The victims, unaware of the scam, would offer remote access to the fraudsters - meaning their computers could be controlled from a different location.
Once given this access, targets' computers would be made less secure, at which point the scammers would offer, in return for a fee, to install software to fix the problem.
The software installed was available for free on Microsoft's website.
In court, Jamil admitted to unfair trading by allowing his staff to make false claims regarding computer support services.
He claimed he had tried but failed to control call centre staff and not adequately supervised them.
His jail term is suspended for 12 months.
source: BBC NEWS

How to remotely shutdown another Windows computer



Microsoft Windows 2000, XP (XP home users read section below) and later users can remotely shutdown another computer in their network by utilizing the shutdown command.
To start the GUI version of this command, follow these steps:
Windows 8 and 10 users
  1. Press the Windows key + X on the keyboard to open the Power User menu.
  2. Select the Search option in the menu.
  3. In the Search text box, type shutdown -i and press Enter.
Windows Vista and 7 users
  1. Click the Start button.
  2. In the Search text box at the bottom of the Start menu, type shutdown -i and press Enter.
Windows 2000 and XP users
  1. Click the Start button, then select the Run option.
  2. In the Run window, type shutdown -i and press Enter.
After running this command you should see a dialog window shown in the example below.

As you can see in the example above, you'll have different options to choose from in the Remote Shutdown Dialog.
Tip: You need administrative privileges to access and shut down the computer remotely to complete the steps below.
  1. Specify the name or IP address of the computer you want to shutdown by clicking the Add button.
  2. Select Shutdown from the list of values under "What do you want these computers to do".
  3. Keep the Warn users of the action option checked if you want to warn the user of the shutdown before it occurs.
  4. In the "Shutdown Event Tracker" section, choose the option in the list of values that you want the Event Log to show when the computer shuts down and enter a comment.
  5. Click OK to initiate the shutdown of the remote computer.

For Windows Home edition computers

If the remote computer you're attempting to shutdown is running a Home edition of Microsoft Windows, you need to enable guest remote shutdown privileges before the above steps will work. To do this, follow the steps below.
  1. Download and install the Windows Resource Kit on the computer you are wanting to remotely shutdown.
  2. Once downloaded and installed, copy the NtRights.exe file from the "Program Files\Windows Resource Kits\Tools" directory into the "Windows\System32" directory.
  3. After the file has been copied, open a command prompt window by clicking Start, Run, and typing cmd and pressing Enter. At the prompt, type the below commands exactly as you see them here (unless your Windows directory is in a different path).

    cd\windows\system32
    NtRights –u Guest +r SeRemoteShutdownPrivilege
    NtRights –u Guest +r SeShutdownPrivilege
  4. If successful after typing each of the above NtRights commands, you should get a success message. Once this has been completed, exit the command prompt window and restart your computer.
Once the above steps have been completed, you should be able to remotely shutdown that computer from another Windows computer.

Unable to get remote shutdown to work

Inoperable remote shutdown could be caused by any of following reasons.
  • The domain administrator has group policies in place to prevent remote shutdown.
  • Remote administration or the $ADMIN share is disabled.
  • You're logged into an account that does not have administrative privileges.

Alternative solutions

If you're still unable to remotely shutdown a computer or are using an earlier version of Windows, there are dozens of software utilities that can be used. Our alternative recommended solutions are PowerOff and PsShutdown.exe, which is part of the freePsTools suite.
source: http://www.computerhope.com/

How do I create a computer virus?

Note: This page does not provide information on how to create a computer virus. Computer Hope does not condone the creation of or use of computer viruses, and therefore we will not provide training on how to create a virus. This page is intended to discuss reasons for not creating viruses and alternate options that you could pursue.
If you are interested in creating a computer virus,trojanwormmalware, or other malicious program as revenge, payback, or as a prank, we suggest you rethink. Creating a virus that deletes files or causes other issues resolves nothing and will result in prosecution by the law. In other words, you could be fined or sent to prison.
Instead of creating computer viruses or other malware, consider learning a computer programming language. You will learn a lot more by learning one or more programming languages and become more qualified in getting hired at a company that designs programs or analyzes viruses. No one ever got hired because they wrote a computer virus.

I only want to write a virus to learn how they work.

You will learn a lot more about how computer programs and viruses work by learning to program than you ever will by writing and tinkering with computer viruses. A computer virus is a program solely designed to do malicious tasks, such as deleting files or inserting its code into other files to corrupt them. It accomplishes these tasks by copying itself to other areas in memory or by spreading to computers with access to a machine that has the virus. By learning to program, you will understand how viruses work in addition to ganing other skills.

I need to test my virus scanner.

You can create test virus files that can be used to test your computer's anti-virus scanner without having to create your own virus. See the link below for additional information and code on how to create a test virus.
  • How do I test a virus scanner?

If I create a good computer virus, I will be famous.

No, the only fame you may get is a brief news article or a picture of you being handcuffed and sent to prison. Once incarcerated, it will go on your record and make it next to impossible to get hired at any respectable computer company and impossible to get hired by any government agency.
If you were to write a computer virus that was successful, you would want to remain anonymous in fear of being prosecuted by the law. Also, if you think about it, almost everyone knows who Bill Gates is and what he has done for computers, but have no clue about Jeffrey Parson.

If I write a good virus, a security firm or antivirus company will hire me.

False, no respectable security firm or antivirus company wants to be affiliated with a virus or malware creator that infected potential customer computers. If you are interested in getting a job with a security firm or antivirus company, you have a much better chance by learning to program. Doing things like becoming a participant in security discussions, being a beta tester, or finding and reporting program vulnerabilities are recommended. Companies such as Google will even pay good money to anyone who reports bugs or security vulnerabilities about any of their products.

In need details, examples, or other information about creating viruses.

Computer Hope will not send anyone any other additional information about creating computer viruses, worms, or trojans. This document was only created to help deter people from creating computer viruses and learn computer programming instead.

What programming languages should I learn?

Programming languages such as CC++C#JavaPerlPHP, and Python are all good programming languages for new computer programmers. See the link below if you are not exactly sure what language to start learning first.
source:http://www.computerhope.com/

Tuesday 27 September 2016

HTC LAUNCHING A VIRTUAL REALITY ACCELERATOR

THEY WANT TO SCOOP UP ALL THE VR TALENT BEFORE THE COMPETITION DOES



HTC announced today that it's taking applications for an accelerator program focused on virtual reality innovation.





Accelerators like HTC's Vive X offer monetary and non-monetary assistance to startups to incubate their ideas. Competitive programs like Y Combinator take the best seed ideas and fund them toward success, in exchange for a share of equity. Think Shark Tank with tech ideas. HTC's Vive X works the same way, but focuses on developing VR ideas, apps, and games.
HTC released its $800 Vive VR headset earlier this month. The company is now hoping to bring together talent in the field with accelerator offices in Taipei, Beijing, and San Francisco.
Vive X is open to all applicants who have a passion and an idea in mind to help HTC take the lead in the virtual reality market.
source : Popsci

After IPhone HTC MIGHT BE NEXT TO DROP HEADPHONE JACKS.

LOOKS LIKE AN HTC 10 MISSING ONE LITTLE THING...




And so the dominos begin to fall on the life of the headphone jack. The upcoming HTC Bolt is rumored to be announced later this year, and in the meantime it looks a lot like the current HTC 10 device, without one major development: a jack.
If you're reading this you're probably aware that Apple made a lot of customers frustrated this year by eliminating the headphone jack from the iPhone 7 (to be fair, a Moto phone was released without a headphone jack even before that). HTC jumping on board would pose a new set of problems. First, they'd be tipping the boat seriously enough that all devices might drop it in the near future, effectively rendering most people's headphones useless no matter what device they select.
But second, HTC doesn't have a lightning port--and the USB jack both HTC and many other phone brands tend to pick for changing doesn't have a lot of headphones on the market.
That would change, obviously, if headphone makers suddenly needed to change, but right now most people haven't had to consider that as an option.



source : www.popsci.com

Apple Watch Design Guidelines.

 What You Should Have Known Already.


If you are one of the many individuals who believe that the Apple Watch was designed with the sole intent of making all other Apple products obsolete in nature, you may want to think again. The intent of the Apple Watch is to simply provide an alternative device in terms of weight and accessibility. This specific watch will definitely allow you to make the most of your time, especially with the state-of-the-art smart screen.
The screen of the Apple Watch is available in two different sizes: 38 millimeters and 42 millimeters. As expected, the screen is touch-sensitive, though actual gestures are not supported; however, the Apple Watch screen is able to differentiate between taps and holds thanks to the pressure-sensitive setting that the screen contains.
A digital crown on the watch’s side acts as a form of scrolling up and/or down in order to allow the user to not have to continuously touch the screen. The crown can also work for pressing buttons and zooming in and out of the screen.

Get your own IP Addresses




If your organization relies on the Internet, you may want to consider building your networks’ infrastructure with your own IP addresses and AS numbers.
APNIC is the Regional Internet Registry for the Asia Pacific and delegates IP addresses to the region.
To get your own independent IP addresses and take control of your network, apply below.

Google is Offering Business Internship 2017

Google is offering several business internships opportunities


Google is offering several business internships opportunities at its offices across the world. Interns at Google bring questions and build answers.  Interns at Google bring questions and build answers. Google offer a range of internships across EMEA and durations and start dates vary according to a project and location. Applications will be reviewed on a rolling basis and our recruitment team will determine where you fit best based on your resume.
Business Internships are offered in the following areas:
  • SMB Sales and Operations
  • Large Customer Sales
  • Google for Work
  • People Operations
  • Marketing
  • Trust and Safety
  • Google Technical Services
  • YouTube Partner Product Solutions
Eligibility:
Minimum qualifications:
  • Currently enrolled in a Bachelor’s or Master’s degree program and maintaining student status throughout the internship. Priority given to students graduating end of 2017 or in 2018.
  • Returning to education on a full-time basis upon completing the internship.
  • Ability to commit to a minimum of 10 weeks and up to 6 months at Google.
Preferred qualifications:
  • Previous internship experience in Sales, Advertising, Consulting, Analysis, Customer Service, Marketing, Finance or related fields.
Submit your application here.
Note: By applying to this position your application is automatically submitted to the following locations: Amsterdam, Netherlands; Copenhagen, Denmark; Bratislava, Slovakia; Prague, Czech Republic; Nairobi, Kenya; Athens, Greece; Warsaw, Poland; Johannesburg, South Africa; Kiev, Kyiv city, Ukraine; Oslo, Norway; Brussels, Belgium; Helsinki, Finland; Vienna, Austria; Stockholm, Sweden; Dubai – United Arab Emirates; Munich, Germany; Bucharest, Romania; Milan, Italy; Hamburg, Germany; Zagreb, Croatia; Paris, France; Zürich, Switzerland; Moscow, Russia; Tel Aviv-Yafo, Israel; Lagos, Nigeria; Madrid, Spain; Lisbon, Portugal; Istanbul/İstanbul, Turkey; Budapest, Hungary; Wrocław, Poland.

source : Youthop