Monday, March 23, 2015

New Android feature keeps phone unlocked in user’s pocket

New Android feature keeps phone unlocked in user’s pocket
The security option has been joined by other useful security options like trusted places, trusted devices, and trusted faces which might appeal some users.
WASHINGTON: Google may soon come up with a new Android feature that would help smartphone users get rid of the hassle of unlocking their phones dozens of times a day when it's simply unnecessary. 

The tech giant is working on a feature, known as 'on-body detection', that would make sure that a smartphone remained unlocked while the user had it on person, which could possibly solve the problem of unlocking it multiple times. 

Some Android Police readers, who posted its screenshots to the site, recently spotted the new feature and explained that it would disable the lock screen once in the user's hand, pocket or purse and revert it back to the lock as soon as it was placed onto some other surface, The Verge reported. 

The security option has been joined by other useful security options like trusted places, trusted devices, and trusted faces which might appeal some users. 

However, the feature would not be able to identify the user and the smartphone would most likely remain unlocked even if it was with someone else or a pickpocket, since it uses the device's accelerometer to determine its continual move.

Sunday, March 22, 2015

RIP, Internet Explorer: Did You Think Nobody Would Miss IE? These 5 People Will



It's the end of an era. By now, everyone knows, or ought to know, that Internet Explorer, the once-beloved Microsoft browser that so many of us learnt to navigate the world wide web with  will soon find its name etched in the extinct column. Microsoft is working on an all-new browser for Windows 10 which is tentatively called Project Spartan, thus putting an end to the Internet Explorer brand name.
For several users, Internet Explorer was not just a gateway to the web, it was also synonymous with the Internet itself. With digital evolution, however,  IE transitioned into something of a dinosaur - from being the browser netizens loved, it became the browser they loved to hate.
And so, social media bids goodbye to IE and while many are declaring it good riddance, there are some who are lamenting its passing. We've compiled a list of five people who we're pretty sure will miss IE a lot:
1. Bill Gates: Who could feel the pain about IE shutting down more than the former Microsoft boss? After all, Internet Explorer reigned supreme up until the advent of Firefox and Chrome.
2. Sheldon Cooper: TV's most exasperating and endearing brainiac uses IE, believe it or not. Someone tell him he will no longer be able to - and watch the Big Bang that ensues from the safety of the other side of the TV screen.
3. Everyone who grew up in the '90s: For the dial-up generation at least, IE was the king of browsers. For most logging on to the Internet meant clicking on that Internet Explorer tab. It's time to keep calm and carry on, people.
4. All the other browsers: No one would've known how good or bad they are in the absence of Internet Explorer.
5. All the IE meme makers: It's time to find a new patsy. Start lookin
g

Saturday, March 21, 2015

WhatsApp Voice Calling Already Banned by UAE's Etisalat: Report

whatsapp_logo_white.jpg
To say the WhatsApp voice calling feature has captured the attention of the masses would be an understatement, and among the latest developments regarding the rollout of the feature is a report that a United Arab Emirates (UAE) telecom operator has blocked the VoIP functionality.

A report by Emirates 24/7 cites an unnamed company source to claim Etisalat - one of two licensed telecom operators in the UAE, the other being Du - started blocking WhatsApp voice calls over its network from Monday, and that the ban would take four to six days to affect all its customers in the UAE. It is being speculated that those users who've managed to activate the feature can still continue to use it over Wi-Fi networks.

The Emirates 24/7 report adds that subscribers of Du are still able to use the WhatsApp voice calling feature, implying the telecom operator has not yet blocked the service. This leniency is not expected to last however, with a statement by the country's Telecommunications Regulatory Authority (TRA) clarifying the rules surrounding the offering and usage of VoIP services in the UAE.

(Also seeWhatsApp Voice Calling - Everything You Need to Know)

The TRA in its statement says that "VoIP services are still a prerogative of the licensed providers who reserve the right to provide such services through their networks. Companies wishing to offer such services must co-ordinate with the licensed telecom providers in the UAE." The regulator's VoIP policy from 2013 states only Etisalat and Due are licensed to provide telecommunications services in the UAE, and this includes VoIP.

(Also see:What Is Net Neutrality? Here's a Simple Explanation)

Of course, with such a rule in place, WhatsApp voice calling is not the only VoIP service that is affected. Skype, perhaps the most popular VoIP service in the world, is only allowed to offer text messaging in the UAE, and the TRA confirmed that no change has been made to the VoIP policy with specific reference to the Microsoft-owned service.

"As to what the licensees have done in unblocking Skype's website in the UAE, this action does not change the position of the TRA or amend the policy as this service is considered a Regulated Activity, therefore, it must be provided by a licensee. Should the service be provided through a partnership with a third party, both licensees must seek approval to provide such service after fulfilling the regulatory and technical requirements of the TRA, which has not happened in the case of Skype. VoIP services through Skype are still unauthorised," the TRA said.

The regulator added that Viber, which also offers VoIP services elsewhere in the world, is also not licensed in the UAE.

Etisalat's reported reaction to ban WhatsApp voice calling in the UAE is not very surprising, with other telecom operators having already made clear their reluctance to freely allow VoIP and other OTT services to operate. Specifically, India's leading operator, Bharti Airtel, had back in December announced plans to rollout VoIP calling packs in the country, attributing the move to the potential loss in investment of rolling out data network infrastructure across the country.

Airtel later reversed its decision, saying it would wait for Telecom Regulatory Authority of India (Trai) to release its consultation paper on OTT services, which essentially includes all apps and services that make use of the Internet

Saturday, March 14, 2015

HACKER VS CRACKER

Who is a Hacker?
A Hacker or White Hat Hacker, also known as Ethical Hacker, is a computer security expert, who is specialized in penetration testing or other testing methodologies to ensure that a company’s information systems are secure. Such people are employed by companies where these professionals are sometimes called as Sneakers.
Who is a Cracker?
Black Hat Hackers, who may also be known as Crackers, are Hackers, who specialise in unauthorized penetration of information systems. They may use computers to attack systems for profit, for fun, or for political motivations, as part of a social cause. Such penetration often involves modification and/or destruction of data, and is done without authorization. They also may distribute computer viruses, Internet Worms, and deliver spam through the use of bot nets.

Take Ownership of Files and Folders in Windows 7

If you are a Windows 7 user, then you are most likely to be aware of the fact that you need to TAKE OWNERSHIP of files and folders before you can make any changes to them. This feature was introduced first in Windows Vista and later in Windows 7 in order to prevent any unauthorized changes from being made to the system files.
However, it can be little annoying to follow a long list of procedure every time you want to take ownership of a certain file or folder. So, to make this job simpler, I have found a nice tool called Take Ownership Shell Extension which adds the “Take Ownership” option to the Windows context menu itself. This makes taking ownership too simple and requires no more than a click.
Take Ownership of Files and Folders
Just run the portable tool kit and click on the “Install” button. This will add the “Take Ownership” option onto the context menu. To take ownership of a file or folder, all you need to do is just right-click on it and click the option “Take Ownership“.
Take Ownership Menu
In case if you wish to uninstall this tool at any time, you can just run the tool again and click on the “Uninstall” button. I hope you like this tool. This works on both Windows 7 and Windows Vista. You can download it from the following link.

How to take the Ownership Manually?

In case if you are interested to know how to take the ownership manually, here is how you can do that:
  1. Right-click the file or folder on which you want to take the ownership and then click on Properties.
  2. Now go to the Security tab, click on Advanced button and then click the Owner tab.
  3. Now, click on Edit and do the following:
    • Under the “Change owner to:” section, select the user or group to which you would like to grant the permissions and then click on the OK button.
    • If the user or the group to which you would like to grant permissions is not listed under theChange owner to: section, just click on Other users and groups and, under Enter the object name to select (examples), type the name of the user or group, and then click OK.
  4. Now you should get the confirmation dialog box stating that the ownership is granted.

How to Retrieve Clipboard History in Windows

Retrieve clipboard history using alternative clipboard managersEver copied a code snippet or text from the web and forgot to paste it before you copied something else? So, wondering to know how to retrieve clipboard history?
Well, all of us will have an experience of something like this where we want to desperately retrieve those information that was once copied to the clipboard. But since Windows clipboard will only remember the last item that was copied onto it, it would seem impossible to recover the information that was copied earlier. However, this problem can be solved using any of the following alternative clipboard managers in place of the default one.
In this post you will find a few such alternative clipboard managers for Windows using which it would be possible to save and retrieve every piece of information that was copied to the clipboard. Here’s a quick list:

1. Clipdiary

How to Retrieve Clipboard History
This tool is a powerful clipboard manager which will store every piece of information that was copied to the clipboard including text, images or any other file. Clipdiary automatically loads upon Windows startup and maintains a database to store the history of all copied items.
This makes it possible to retrieve the information that was once copied to the clipboard, be it the last hour or the last week. Clipdiary is a shareware tool which comes with a 30 day fully functional evaluation period.

2. ClipMagic

ClipMagic is similar to Clipdiary but includes a few extra features that could seem handy for advanced users. The following are some of the extra features of ClipMagic that are not present in Clipdiary:
  • Categorize/organize your clips. You can also create filters/rules for your incoming clips
  • You can store/categorize your ideas to research fast
  • Assign often used text like email signatures to hotkeys

3. Ditto

Ditto is a powerful alternative to the default Windows clipboard manager which is an open source tool. It keeps track of all the copied items such as text, images and other files so that you can retrieve them whenever necessary. The following are some of the highlights of Ditto:
  • Assign hotkeys to frequently used clippings
  • Search and organize the clippings based on task or project
  • Supports unicode so that you can copy foreign and non-standard characters without any issues
  • Get a preview of all the copied items including thumbnails of images just by pressing the assigned hotkey
  • Ditto comes as a freeware so that you can enjoy all of its features free of cost
Even though Ditto is a freeware, it is still comparable to the two shareware tools discussed earlier. So in my opinion Ditto is always the first choice. You may still download and try all the three and keep the one that you like

Tips to Enable or Disable Toast Notifications on Windows 8

Toast Notification
Windows 8 is among the most incredible and interesting kind of Windows version from Microsoft. It has visually eye catching design, which is found in modern user interface that is meant for redesigning a number of operating systems, worked out for users. If you have used or seen someone using Windows 8 you could have noticed the toast notifications in this modern version of windows, which simply appears the moment you install or uninstall any application. There are many users who are well versed with the bubble notifications, which were found in the earlier versions of Windows seen via the taskbar. The new application platform in Windows 8 comes with an integrated notification system for installing or uninstalling a number of modern applications.
The Windows 8 style application can employ a number of notifications types including the traditional toast notifications, live titles and lock screen. These can be managed by either disabling or enabling the notification of your application for certain accounts or simply silencing the notifications temporarily so that you are not often bugged by them. Unfortunately, this new version of Windows 8 simply doesn’t carry any notification center, which allows you to view the history of your notifications in just one place. The pop up notification of Windows 8 is very much transient wherein its lock screen application and live tiles portray a more permanent kind of notifications. Well, let’s check out the step by step tips to enable Toast Notifications found in Windows 8 as under:

Enabling Toast Notifications on Windows 8

You have a number of options when it comes to enabling or even disabling the Toast Notifications in Windows 8. This feature is very much beneficial; however, at times it can be annoying while you see them popping up time and again. Hence you have some simple ways to enable and disable the same. Once you have disabled it and after some time want to enable it, don’t get disheartened. Unlike the simple ways of disabling, the steps involved for enabling the toast notifications in Windows 8 too are very much simple. Let’s check them step by step.
Steps for Enabling Toast Notifications:
The users have the option to receive the toast notifications by simply changing the PC settings found over the OfficeScan client PC. This is the place where you have the option of enabling the toast notifications.
Step 1 – If you are keen to enable the same, the first step you need to do is to move the pointer of your mouse at the right corner of your screen just at the bottom side so that you end up displaying the Charms bar.
Step 2 – Once you carry out the first step, it’s time to move to the second, wherein you need to click at Settings and then to – “Change PC Settings” then you will see the PC Settings screen appearing before you.
Step 3 – Once you are done with the second step, it’s time to head on to the third step wherein you need to click over the option called “Notifications”. The moment you click over this section, you are supposed to choose the “On button” so that you enable the Toast Notifications in your Windows 8 based computer system.
Step 4 – This is the final step, wherein you have to choose on the option of “ON” to the three things. These include the “Show App Notifications”, “Play Notification Sounds” and the “Show Application Notifications” on the Lock Screen. The first one is mandatory while the last two are are optional and the choice to enable them is upto you.

Final Word

Microsoft has come up with this feature only in the latest versions of Windows – the Windows 8. However, if you are using operating systems like Windows 7, Windows XP or Windows Vista then make sure you do not have this notification to bug you. In your initial days, you may find a bit difficult doing whole lot of these steps as discussed above, hence it is vital to jot down all these steps in your notepad and start doing it as and when you need them. Doing them several amount of times can enable you to remember the same.
Windows 8 is a new and the most modern kind of operating system and hence different than the previous versions. You need some time to get accustomed to the same before you start using them proficiently. This certainly includes the enabling and disabling of the Toast Notifications

C Program to Print its Own Source Code

C Program to Print its Own Source CodeEver wondered how to write a C program to print its own source code? Well, here is the source code of a C program that when executed will print its own source code. In other words, the output of this program is exactly same as its source code.
Here’s the program:


#include<stdio.h>
char *program=”#include<stdio.h>%cchar *program=%c%s%c;%cvoid main()%c{%cprintf(program,10,34,program,34,10, 10,10,10);%c}”;
void main()
{
printf(program,10,34,program,34,10,10,10,10);
}

How to Spy on a Cell Phone

How to Spy on Cell phonesWith the advancement in the technology, cell phones have just turned themselves into powerful mini-computers. While some people use cell phones to exchange secret messages and maintain illicit relationships, many children also misuse cell phones for storing and watching inappropriate content. Therefore, in order to investigate the truth it becomes inevitable for people to spy on cell phones of their loved ones or children.

What’s the Best Software to Spy on Cell Phone?

To spy on cell phones, there exists hundreds of spy programs on the market where a majority of them are nothing more than a crap. However, there are a few genuine spy programs as well and mSpy is one among them. After testing a handful of popular cell phone spy programs, I conclude mSpy as the clear winner and best among all.
mSpy is one of the best and most popular software out there to spy on cell phones. It offers an effective means to monitor the target cell phone and record activities like phone calls, text messages, GPS location, emails, web activities and much more. All the monitoring/recording process takes place in a complete stealth mode, so that the target user never gets to know that he/she is under surveillance. mSpy has every feature that a true spy software should have. This makes it a complete cell phone spying kit.
 
Mobile Spy
 

mSpy Features:

Here is a list of mobile spying features that you get with mSpy:
  • Phone Call Logs – Each incoming and outgoing number on the target cell phone is logged along with duration and time stamp.
  • SMS Logging – Records both incoming and outgoing SMS.
  • Phone Book Access – Gain access to all the contacts that is stored on the target cell phone.
  • Record Web Activity – The program records all web activities including emails, websites visited, Facebook, WhatsApp, YouTube and more.
  • GPS Location Tracking – Track the exact location of the cell phone user at any given time.
  • Cell ID Tracking: – With this option, it is possible to track the cell phone’s location during the absence of GPS.
  • SMS Commands – Remotely send SMS commands to lock/unlock the cell phone usage or delete call history, SMS logs, photos and videos from the target phone at any time.
  • Remote Device Lock or Wipe – You can remotely lock the target cell phone or wipe all its data at anytime you wish.
  • Keylogging – Records keystrokes typed which includes passwords and other sensitive infrmation.
  • Stealth Operation – Operates in a covert mode so that the presence of the spy software remains unnoticed.
  • No Jail-Break Required – Unlike most other spy programs, mSpy can operate successfully without the need to jail-break the cell phones.
If you are a parent, mSpy can offer you an additional help as it supports a handful of control features as well:
  • Application Blocking – You have the option to block certain applications from being accessed on the target cell phone.
  • Incoming Call Blocking – Block unwanted incoming calls on the target cell phone.
  • Remote Lock – Remotely lock the cell phone or restrict its usage.
  • Remote Delete – Remotely delete unwanted contacts, call logs, SMS and photos from the target cell phone.

How mSpy Works?

Mobile-Spy-WorkingAfter your purchase, you can directly download mSpy onto the target cell phone. Installation process takes only a few minutes (2-3 min approx).
After the installation, each activity on the target cell phone is recorded and uploaded to the mSpy servers. You can login to your mSpy online account from your PC (or any computer in the world) to spy on the logs at any time. The logs contain Text messagesContacts ListCall HistoryGPS Locationsand many other information as mentioned above.

Compatible Cell Phones:

mSpy is compatible with most types of cell phones currently available in the market including:
  • Android Phones
  • Blackberry
  • Windows Mobile
  • iPhone
  • iPod and Tablets
You can download mSpy from the following link:
Download mSpy – Android, iOS, BlackBerry & Windows Mobile

How to Spy on BBM Messages

Spy on BBM Messages
Just when we thought that BlackBerry was dead and gone, or perhaps on its last breath, the BlackBerry Corporation (formerly known as Research In Motion) released a new series of handsets at the beginning of the year with the latest version of their OS the BlackBerry 10 OS. As soon as the set was released the initial worldwide reception was enough to get just about any BlackBerry critic to admit the comeback.
So BlackBerry sets are being seen sported around again which consequently means that the company’s legendary BlackBerry Messenger service is kicking and roaring back into action. The service is an in platform messaging software which allows individuals who use the BlackBerry platform to communicate with each other through messages without incurring any extra data plan or package fee. If someone close to you owns a BlackBerry then you will be only too familiar with this service and might also get the itch to read the messages that are being exchanged. Whether you are a concerned parent or suspicious spouse, to know what’s happening in their life, you must know how to access their BBM messages. Here is how to go about it.
1. Look For BBM Spy Software: In order to get into their BBM messages, you will need the help of specially designed software that can retrieve the desired data. However, there is a dearth of good programs that will specifically target the messaging service. Many apps will allow you to access phone conversations or call logs but not the actual messages exchanged in BBM chat. So when looking for software to use, make sure it specifies itself as a Blackberry Spy app.
2. Evaluate the Options: Once you find software that can access BBM messages, pick one that suits your needs the best. If you are unable to figure out any at all, then there is one of my favorite apps for starters that you can try. mSpy is a good option that solves many problems when it comes to spying. With this one you can access BBM conversations, emails, texts and even ongoing phone calls. Additional features of mSpy include recording videos, photos, YouTube activity, iMessages, contacts, phone call info and much more. but not live calls. This app will allow the user to monitor the target BlackBerry remotely. With mSpy you can access the recorded data from an online dashboard from any web browser across the globe. Download mSpy from the link below:

Compatible Phones: Android, BlackBerry, Apple iPhone, Windows Mobile, iPod and Tablets.

 
3. Download and Install: Once you have decided on BBM spy software, you need to purchase it. In order for it to work it needs to be accessed from the target’s phone. That means you must physically retrieve the BlackBerry you wish to monitor and access the Internet. Stealth would be required on your side of course. After that you proceed to downloading it from the source site. Once download is complete, begin the installation process. Once the notification of installation completion appears, you can be sure that the spy software is successfully in place. Simply wait for conversations to take place and then monitor them!

How to Track Lost Android Phone and Tablet

Track Android Phones
Your Android gadgets are the most important things in your life. It contains all your important contacts and information. If you lose your equipment, you will be losing all those sweet memories with the photos and video. But there is some good news to android phone/tablet users, you can now easily find or at least know where your missing phone is with or without using android application.
Let’s first look at the way of finding your lost phone which doesn’t contain any app installed on it.

Use the IMEI Number

Every android phone carries a unique IMEI number (International Mobile Equipment Identity Number). It will be printed at the back of your device. If you are unable to find the number, you have to launch your phone app and dial the number *#06#. This will give you the IMEI number of your phone. Store this number in a safe place so that it helps you in locating your phone when it is lost.
When you file a complaint, this number has to be added in the report. Your service provider uses this number to track your phone and tell you where it is. No matter if the person using the phone is using a different SIM card or has switched off the phone. Once the device is traced, you can request your service provider to block it from using.
This is one of the easy ways of locating your lost Android phone or tablet.

Plan B

Another way of tracking your lost Android gadget in no time is through Plan B app. This app does not require you to install any recovery software previously but still helps in finding your lost phone. All you need to do is log on to your Google play account. Lookout mobile security offers free software called Plan B. Download the software from play store to your phone. This will be possible only if your phone is within the Internet coverage area. Wait for some time and then send the keyword “locate” without the quotes through SMS to your phone. And a map showing where your equipment is will be sent to your Gmail account. This app is very much useful in situations where you don’t have IMEI number.
If you have installed and configured any of these below android software previously, there is good chance of finding it.
You can log on to Google Play store > My Android Apps, on your computer and check if you have installed any of the following apps previously.

Lookout Security and Antivirus

Lookout is the best android app for security and antivirus. So far, it has received millions of downloads. Just recall if you have installed this on your phone.
If you have activated the option “Missing Device” in this app, it is easy to find your device. If you have also enabled “Signal Flare” option, you can trace the last known location of your android device. This is helpful in case your phone battery is dead or tablet is switched off.
Now sign in Lookout to locate your device. The map shows the location of your phone. If you are at a short distance from the tablet, you can choose Scream option to make a loud noise to find it.

Android Device Manager

Google has recently released a new locator feature for Android gadgets called Android Device manager, which helps its users locate their lost or stolen phones and tablets. It functions in the same way as Lookout and Samsung’s “Find My Mobile”. Here’s how to use Android Device Manager.
Go to the Google Settings app, then select Android device manager. By default the locator feature is activated but to activate remove data wipe, select the box next to “Allow remote factory reset”, then select “activate”.
To use this feature, open the site https://www.google.com/android/devicemanager and sign in to your Google account. You may be prompted for permission to allow Android Device Manager to use location data. Select the Accept tab to continue.
Now you will be provided with a map that shows the location of your device along with other details such as the name of the place, when it was last used and more. The location data doesn’t help you if your phone is misplaced somewhere in your home. Instead of making a call to your phone using other’s phone, you can call your phone directly from Android Device Manager. This will make your device to ring with high volume for 5 minutes, even if it’s in silent or vibrate mode.
One feature that is missing in Android Device Manager is remote locking, which can be useful in preventing a stranger from accessing your data, while you’re tracking its location.
Apart from these, there are other apps such as Android Lost, Where do My Droid and GadgetTrak that help you in finding your lost Android phone/Tablet