Search My Blog

Sunday, September 29, 2013

What Is Rooting and What Are Its Benefits?

Many people hear smartphone geeks throwing around terminology that they seem to think everyone understands, and yet most people are left totally baffled. This is something of which I, myself, am guilty--on a daily basis, even! The biggest term that you may have heard being thrown around on cell phone blogs, or news sites, or forums, is "Rooting." What does that mean, and why would you ever want to do something to your phone that sounds like the horrible torture your mother used to inflict on unsuspecting weeds in the garden? That's what we're going to discuss.

At its most basic, "rooting" is the term widely used among computer and cell phone technicians alike to refer to the process by which one gains access to the administrative commands and functions of an operating system.

If you're thinking, "Hey that's no help, I'm still confused," that's normal. Even a simple definition of rooting seems complex at first. What it means when you root an Android phone, is that you give yourself, rather than Sprint/Verizon/T-Mobile/AT&T's software, the permission to act like the administrator of the phone. There are a ton of reasons why people want to do this--the biggest being either to install an updated version of the operating system, or to save battery life. The two more often than not go hand-in-hand.

There are other benefits of rooting, as well. When you gain access to administrative phone functions, it is simpler to freeze system processes that drain battery life. Among the smartphone geek crowd, applications like these are referred to as "bloatware:" they do nothing but bloat the software by existing as unnecessary applications.

Having a rooted Android phone is also beneficial because there are several Android applications which are extremely useful and also require root menu access. "Titanium Backup" is my personal favorite of these. It allows you to back up all your applications with their data on a regular basis, so that if you do install a new version of the operating system, or if you have to factory reset your phone, you don't have to go back and start Angry Birds all over again from Level 1. (And trust me, I've been there. I've felt that pain.) Other applications allow you to uninstall bloatware entirely, and so on, and so forth, from basic functions to extremely technical on a level that even I fail to entirely understand.

But like Uncle Ben Parker said in Spider-Man: "With great power, comes great responsibility." Benefits of rooting an android phone to gain access to the functions and menus normally inaccessible to the typical cell phone user are many, but rooting is not a process that should be taken on halfheartedly. These benefits come at a cost-- almost all manufacturers' warranties become void once you root your phone. So, either be prepared to accept that, or learn how to "un-root" in case of an emergency.

Do plenty of research--there are a ton of sites with how-to videos and device-specific instructions, because no two phones are rooted the same way. Ask plenty of questions--never assume you know what you're doing, because it's the best way to end up with a phone that's as useful as a paperweigt.


What AreThe Benefits Of Rooting? 

1. Custom Software (ROM’s)
If you have superusers rights means you can install Custom ROM’s on your android cell phone. Basically custom Rom is own version of Android, a new Operating System which is developed by developers. Using these ROM’s  you can alter your Smartphone experience, it changes the color of your icons, app dock, an app menu etc. With custom rooms you can uncap the full potential of your Smartphone which a normal user can’t get.
2. Custom Themes
After rooting your android device you get a full ability to customize every graphic on your device. There are  hundreds of custom themes over the web which you can load  to completely change the look and feel of your device.
3. Cool Applications
There are a number of applications which work only on a rooted android device like screenshot apps, Overlocking apps, ROM Manager, Wireless Tether for Root Users, Root Explorer, Titanium Backup and many more
4. Speed and Performance
We all know that kernels are behind the performance of the processor of your Smartphone. So if you change the kernel version, you can change your processor and that will also improve the speed and performance of your Smartphone.
5. Increasing Battery life.
There are many apps specially made for rooted devices which access system settings and increase the device’s battery life by optimizing it to a great extent.
6. Installing Unsupported apps
There are lots of apps which are not supported by your device, but after rooting your Smartphone you can install them by editing your build.prop file.
7. Backing Up your device.
After rooting your Smartphone you can also install a custom bootloader and perform an android backup of your device. It is a backup which when restored, restores your device to the same state as it was during performing the backup.
So these are the advantages and benefits which you are going to get when you root your Android Smartphone. But if you feel I missed any good advantage then feel free to share with us.

How to Root Sony Xperia Tipo St21i

 

How to Root Sony Xperia Tipo St21i - Sony Xperia Tipo is a mid-range smartphone with 800 Mhz smartphone from Sony. If you want to extend abilities of Sony Xperia Tipo, then you must Root Sony Xperia Tipo. In this article I’m going to show working guide to Root Sony Xperia Tipo. Once you are done Rooting Sony Xperia Tipo you will be able to use Custom ROM’s, install Special Apps and improve hardware performance. So here is the full procedure on How to Root Sony Xperia Tipo St21i.

Disclaimer: Rooting will void warranty of your device, rooting is a process which also has risk of bricking your device. We are not repsonsible for any damage occurs to your device by following this tutorial. Carry on at your own risk!


Sony Xperia Tipo Features and Specifications

Screen: 3.2″ TFT capacitive touchscreen
Processor: 800 MHz
Chipset: Qualcomm MSM7225AA
RAM: 512 MB
Battery: Li-Ion 1500 mAh battery
Camera: 3.15 MP
Colors: Black, White

Prerequisite

  1. Charge your phone’s battery at least 60%.
  2. Enable USB Debugging on your phone by going to Menu > Settings > Manage Applications > Development > Check USB debugging box
  3. Do backup everything important like contacts, logs, messages with Super Backup.

Required Downloads to Root Sony Xperia Tipo

  1. Unlock Root Pro [Download Link]

How to Root Sony Xperia Tipo

  1. Extract All the Downloaded files to your desktop.
  2. Open UnlockRoot.exe file and select Root button.
  3. Follow the instructions given.
  4. Once your device reboots your Sony Xperia Tipo is rooted.
  5. You have successfully rooted your Sony Xperia Tipo now.

iPhone 5S vs iPhone 5C: What's the difference?

It's the morning after the night before, and Apple's two new iPhones have been fully revealed. On the surface, one's more colourful and made of plastic while the other is sleeker and made from metal, but what are the differences underneath? We compare specifications to help you decide which one is right for you.

DESIGN


The iPhone 5s should look familiar to iPhone 5 owners, as it hasn't really changed bar the three new colour choices. Whereas the old model was available in either black or white, the iPhone 5s comes in slate grey, silver or gold. The gold colour has more of a champagne hue to avoid looking overly tacky. Regardless of colour, each handset it built from glass and aluminium, with new laser-cut edges which give it a premium appearance.
Dimensions: 123.8x58.6x7.6mm (4.87x2.31x0.3in)
Weight: 112g (3.95oz) iPhone 5S vs iPhone 5C
The iPhone 5c, meanwhile, uses polycarbonate plastic to keep manufacturing costs down. Underneath the outer shell is a steel-reinforced frame, which should give the handset the kind of rigidity not normally seen in a plastic smartphone. It's not nearly as rounded or bulbous as previous plastic iPhones have been, although it is still thicker than the iPhone 5s. The front is still made from glass. It's available in green, blue, yellow, pink and white colours, with a range of both contrasting and complimentary cases available directly from Apple.
Dimensions: 124.4x59.2x8.97mm (4.9x2.33x0.35in)
Weight: 132g (4.65oz)
iPhone 5S vs iPhone 5C

DISPLAY


Both the iPhone 5s and iPhone 5c have the same 4in diagonal "retina-class" display seen in the iPhone 5. Apple has frequently said there's no point adding more pixels without increasing screen size, as you can't see individual pixels from an average viewing distance, so you'll get the same screen quality from both phones.
Screen size: 4in diagonal
Resolution: 1,136x640
Pixel density 326ppi
contrast ratio:800:1 iPhone 5S vs iPhone 5C

PERFORMANCE


The iPhone 5c re-uses the Apple A6 processor last seen in the iPhone 5. It's a dual-core chip running at 1.3GHz, paired with 1GB of RAM and a triple-core PowerVR SGX 543MP3 graphics chip. It's roughly twice as fast as the A5 processor used in the iPhone 4s. It's available with either 16GB or 32GB of internal storage. The iPhone 5s is powered by the latest A7 CPU. It's still a dual-core chip, but runs at a faster 1.7GHz and is 64-bit, to take advantage of the 64-bit version of iOS 7. According to Apple, it's roughly twice as fast again as the A6 processor, and is paired with the M7 motion coprocessor to take accelerometer and gyroscope duties away from the main CPU. As well as 16GB and 32GB models, there's also a 64GB variant available.
If you're after the best performance from an Apple smartphone, the iPhone 5S is the clear winner.

SECURITY


The iPhone 5c continues Apple's original approach to security, with a choice of password or passcode to lock the handset. It's basic, and if you aren't careful your fingerprints can show would-be criminals where to press to unlock your phone. You also need to enter an iTunes password every time you want to buy apps or content from the iTunes or App stores. iPhone 5S vs iPhone 5C
The iPhone 5s goes one step further with Touch ID. It's a fingerprint sensor built into the home button that can unlock your handset and confirm your identity when prompted for logins or passwords - assuming Apple allows specific apps access to the feature.
Touch ID is still unproven in terms of apps, but for locking your phone it's a clear step forward from a simple password. Another win for the iPhone 5s.

CAMERA


Apple has made the smallest of changes to the iPhone 5c camera. It keeps the same 8-megapixel, backside illuminated (BSI) sensor, ƒ/2.4 aperture and LED flash as the iPhone 5, but upgrades the camera lens to sapphire crystal to prevent scratches. iPhone 5S - new iSight camera
For the iPhone 5s, however, Apple has pulled out all the stops. Although the number of pixels stays the same (8-megapixels), it uses larger 1.5 micron pixels to take in more detail in low-light conditions. It's paired with a wider ƒ/2.2 aperture and sapphire crystal lens. Finally, the twin LED flash uses "True Tone" LEDs to adjust white balanced based on lighting conditions. One LED fires cool white light while the second fires warmer amber - the combination should result in more natural looking images.

CONCLUSION


Was there ever any doubt that Apple wouldn't put its best new technology in its flagship phone? The iPhone 5s clearly has more features than the iPhone 5c, but it also costs more - £549 for the basic 16GB model compared to £469 for the 16GB iPhone 5c. That's SIM-free, of course, so the networks may make it cheaper, but right now you'll have to pay a considerable premium to get the newest features

Wednesday, July 10, 2013

How To Know Who Is Visiting Your Facebook Profile?


  Ever wondered who is visiting your Facebook profile or is trying to spy on you?
This is the easiest way to know is visiting your Facebook Profile from the most to the least manually by following these easy steps and don't forget to share your views with me and others.

  • Open up Your Browser and log in to Facebook.
 
  •  Right click anywhere on your news feed and click "View page source"
 
  • Press Ctrl+F and type "FriendsList".
  • Following it should be a list of random numbers in hyphens. Each one of those numbers are the profiles of the people who visit your Facebook profile the most from most to least. 
 

  • Paste the number into your address bar after "Facebook.com/"

Tuesday, May 28, 2013

Where do Computer Viruses Come From?



It seems like over half the time I am called out on a client site to remove a virus from someone's computer, I get asked the universal question, "Where do viruses come from?"  Or "Why do viruses even exist?"  I'll explain what I tell them.

Viruses don't occur in cyber space naturally like biological viruses do, of course.  A programmer has to create them.  So, we are at fault for all of the headaches we deal with when trying to prevent or remove viruses infected on our systems.  So why do we do it?  Or maybe I should say, "Why do THEY do it."  Here are a few reasons why:

-  Identity Theft/Restricted Data Theft

-  Bragging Rights

-  To Gain Remote Control of Your PC

-  To damage organizations or competing business entities

I'll explain a bit more in detail.

Identity Theft/Restricted Data Theft

How to Protect Yourself From Getting Hacked??

 



After writing somethings about hacking, i was thinking to let the innocent people know about hacking and how hackers perform their hacking operation to get your accounts. So that you can protect yourself from getting hacked!!!!!!


I am giving here tips that ' what you should not to do' with explanation that ' why not to do'.




Tip 1. Use strong passwords: 
  • Always use passwords that hard to guess (mix of digits + letters in upper case and lower case both) for your all accounts. the longer your password, the better.
  •  never use any common word, your name, spouse, parents, birthdate etc.

Explanation 1:
  • Week passwords and be easily  hacked using a brute force method which do combination of numbers and letters until the real password comes.
  • Common passwords containing name, birthdate can be easily guessed by your friends, any known to you.



Best Operating systems Of 2013


-->

 Operating system in simple language, is a program that helps you to communicate and use your computers Hardware in whichever way you want.

Operating system has a collection of software's that manages computer hardware. Operating system performs the vital tasks such as inputting text from user, displaying something on output screen . In this Technological world , we have less time & we need better performances . On the basis of this criterion , we have provided the list of best operating system of year 2013.
There are various types of operating system like Microsoft's Windows , Linux Distros , Apple Macintosh & Various other operating systems.

We have tested all of the operating system on our machine & concluded following rankings of the various operating systems .

Thursday, May 23, 2013

Different ways to hack Facebook!

-->





1. Facebook Phishing Attack:



I am explaining this method first because its the most easiest and also the most popular method for hacking Facebook password. You can also search on Google the various famous Facebook hacking methods and you will find Phishing technique on the top always. And I am explaining the methods according to their popularity.



Now you want to know which is my favorite method for Hacking Facebook account passwords and i will undoubtedly tell its simply phishing 

What Is Phishing???

Phishing is the most widely used hacking method for hacking Facebook passwords. The most widely used technique in phishing is the use of Fake Login Pages, also known as spoofed pages. These fake login pages resemble the original login pages of sites likeYahoo , Gmail, MySpace etc. The victim is fooled to believe the fake facebook page to be the real one and enter his/her password. But once the user attempts to login through these pages, his/her facebook login details are stolen away. However phishing requires specialized knowledge and high level skills to implement. So I recommend the use of Phishing to hack facebook account since it is the easiest one.









Here is a tutorial about phishing.>>



Step 1) 

First you must sign for a free webhosting service like www.byethost.com or www.t35.com  or www.000webhost.com  And register your subdomain.

after signing you will have a subdomain like www.yourname.byethost.com



Step 2) 

Now login to your account go to "control panel" then in site management option go to "online file manager" and open the folder "htdocs".



Step 3) 

Now Click Here to DOWNLOAD THIS FILE to your computer add extract the file. Inside the folder you will find three files index.php and hello.php and login_again.htm.



Step 4) 

Now replace the index.php file in the "htdocs" of the "online file manager" with the file index.php of the phisher folder in your computer and also upload hello.php and login_again.htm files in "htdocs" thats it! you are done.



Step 5) 

Now your homepage www.yourname.byethost.com has become a phisher. open it, you will see that your page www.yourname.byethost.com has become the login page of the site you want to hack.now all you have to do is send this link to the person whose account you want to hack.when he tries to login through it you will receive a file password.html in your "htdocs" folder of your phpnet.us account which contains the username and password of your victim.



Step 6)

Go to http://www.yourname.byethost.com/lol.htm for see the stored passwords !


Personal Note:- The attacker must have a very good convincing power to hack the facebook password with this method. Please try this method carefully as now it is widely known and the target may soon guess the attacker's intentions. The target may report the fake site and you may get in trouble.


The facebook not allow to share your fake facebooksite on facebook. You can use Domain hiding system to share your fake facebook site. (Eg: http://www.dot.tk/)

2. Hacking Facebook account password remotely using Keyloggers and RAT's:



Best method for advanced Hackers and my second favorite too. Its popularity is little but lower than Phishing only because it involves you to download hack tool and then create your keylogger and send it to victim which is a lengthy process and also unsecured too as you don't aware that the keylogger that you downloading is himself contain some spyware or simply a keylogger attached with it. Keylogging becomes more easy if you have physical access to victim computer as only thing you have to do is install a keylogger and direct it to your destination so that it will send all recorded keystrokes to pointed destination. What a keylogger does is it records the keystrokes into a log file and then you can use these logs to get required Facebook password and thus can hack Facebook password. 



3. Hacking the Primary Email address: 



If Facebook hacker or any specific Keylogger, by some means, hacks your primary Gmail or yahoo account which you are using as primary email address, then this information account can easily hack your Facebook password using "Forgot password" trick. The Hacker will simply ask Facebook to send password to the primary email address and ask Facebook administrators to send the reset email to your primary email address- which is already hacked. Thus, your Facebook account password will be reset and it will also be hacked. 

So, always remember to protect your primary email address that you have used to create Facebook account and try to keep unknown or useless mail id as your primary email address in Facebook.



4. Social Engineering or Guessing Passwords:



A social engineering attack is one in which the intended victim is somehow tricked into doing the attacker's bidding. An example would be responding to a phishing email, following the link and entering your banking credentials on a fraudulent website. The stolen credentials are then used for everything from finance fraud to outright identity theft. An old adage comes to mind here, "it pays to be suspicious". With socially engineered attacks, the opposite is also true - if you aren't suspicious, you likely will end up paying. In addition to phishing, social engineering attacks can come in many forms - email that masquerades as breaking news alerts, or greeting cards, or announcements of bogus lottery winnings. Pump and dump stock scams are also a form of social engineering, playing on the recipients' natural desire to take advantage of a good deal. It's important to remember that if something sounds too good to be true, it's probably a scam. Social engineering attacks are also often used to trick users into infecting their own systems - for example, by disguising the malware as a video codec or Flash update. An email is sent enticing the recipient to view a bogus video clip, the victim visits the link contained in the email and installs the "codec/update" which turns out to be a backdoor Trojan or keystroke logger.



Remember: with social engineering scams, the attacker is relying on you to make the wrong choice. Choose not to be a victim.



Some Common passwords that you can try on your friends are : 



1. Their mobile number or their girlfriend or boyfriend mobile number. 

 (always try his previous or old mobile number as they are not as much as fool that they appears)

2. Their Girlfriend or boyfriend names or their own names concatenating with their Girlfriend or boyfriend names.

3. Date of births

4. Their favorite movie names , cartoon character names or favorite music band names or simply the hero names like batman,dark knight, Superman,Godzilla, Spartacus and much more..

5. Most important now most website ask that password should be alphanumeric now what users do they just adds 1,2,3 in their normal passwords and some more smart guys adds !,@,# in their passwords and amazingly all in Sequence.


Monday, February 18, 2013

CBSE Problem Solving Assessment (PSA) Answer Key 2013

CBSE


CBSE Problem Solving Assessment PSA 2013 Answer Key for class IX and XI (Class 9 and 11) : Central Board Secondary Education (CBSE) every year conducts Problem Solving Assessment PSA examination for class IX and IX students. And lot’s many students for both classes appear for this CBSE PSA exam. Same way CBSE conducts Problem Solving Assessment PSA 2013 exam on this 16th February 2013 and lot many students been appear for this examination . And all students who been appear for this exam are looking and searching for CBSE Problem Solving Assessment PSA 2013 Answer Key.
So none of students have to worry about CBSE Problem Solving Assessment PSA Answer Key 2013 just because we here going to provide answer key for all paper set A B C D provided by well authentic sources and coaching classes .
As all students have idea that CBSE Problem Solving Assessment PSA exam paper have three papers in English and Hindi are language conventions,  Qualitative Reasoning and Quantitative Reasoning . Here is all Section and all paper set A B C D answer key exam.

CBSE Problem Solving Assessment PSA 2013 Answer Key

All students appear for exam will have answer key for both Hindi and English Language Paper Set A1 B1 C1 D1 E1 F1 G1 H1 I1 J1 K1 L1 M1 N1 O1 P1 Q1 R1 S1 T1 U1 V1 W1 X1 Y1 Z1. All students will have CBSE Problem Solving Assessment PSA Answer Key 2013 using link provided below. So take a look at answer key and students will have idea that how much marks been scored by him or her.

CBSE Problem Solving Assessment PSA 2013 Answer Key for Class IX

CBSE Problem Solving Assessment PSA 2013 Answer Key for Class XI

Take a look at provided answer key for CBSE PSA 2013 and if have any problem and query then just drop a comment in below box. And don’t forget to subscribe us using your Email Address so that we can send result to all candidates to mail address.

Wednesday, February 6, 2013

Easyduplicatefinder – Find & Remove Duplicate Files In Windows 7

We sometimes take backup in our computer and forget where we kept the file, so creating or copying it another time on our computer. This way we are ultimately storing the same file two times in our computer and it occupy space on our hard disk.Even I was facing this issue sometimes so thought to discover a software that automatically find duplicate files from my computer and show me the detailed report.
Easy Duplicate Finder Easyduplicatefinder   Find & Remove Duplicate Files In Windows 7
The software is only around 8 MB with lots of interesting features.Easy Duplicate Finder is a powerful tool to find duplicate photos, documents, spreadsheets, MP3′s, and much more! Removing duplicates will also help to speed up indexing and reduces back up size and time. Your computer isn’t fully optimized until you have removed all unnecessary duplicate files. Duplicate finder files mainly looks for the similar contents either with similar names or similar size.
Easyduplicatefinder features:
  • Search for True Duplicates (files with same contents).
  • Flexible File Scan Settings.
  • Scan Multiple Sources and Devices.
  • Duplicate File Management – remove only unnecessary duplicates.
  • Export a report of duplicates to Excel in CSV format.
You can give a try to this freeware software @ http://www.easyduplicatefinder.com

How To Add Dislike Button On Your Facebook Account

So many times, you have liked a status of your friends on Facebook.What you were doing when you dislike it??, probably you might comment on his/her status.I would say Facebook has dislike button, have you ever seen dislike button on Facebook?
Facebook dislike How To Add Dislike Button On Your Facebook Account
You can not see it but you can see the dislike button when you are installing it on your browser. You can install Google Chrome extension called Dislike button. Once you installed it on your computer, you will see dislike button whenever you see anyone’s status update on your Facebook account.
I had never heard about, but searching on useful chrome extensions,I found this entertaining Google chrome’s extension. Please share any other entertaining social extension you are using on your browser by commenting on the comment section below

How To Copy Audio Tracks of CD/DVD files into MP3 Format

Recently one of my friend gave me a gift of audio CD with speech of swami vivekananda.I have entered it on my PC and played it on my PC, but since I was busy with my work I could not listen to it via PC so I thought to add it on my mobile so I can listen it anywhere at anytime.When I tried to copy that CD audio tracks to my android phone, suddenly I got shocked, I saw the files property and it was saying only 4 KB.I searched lot on internet and finally I found the solution for my question.
Copy Audio Disc as MP3 How To Copy Audio Tracks of CD/DVD files into MP3 Format
That is done by audio creator and main intention of creating track of audio is that it could not be copied by anyone.You will need to convert audio tracks into MP3 or other audio file formats to copy it and than you can copy it on your storage media.
Now the question is how to copy audio tracks as MP3 files?
Well, After lots of research, I found one best software that allow us to save audio tracks as MP3 file format and I have saved that audio track on my android phone successfully.Using CD to MP3 conversion you create MP3 music files. MP3 is the most popular “compressed” audio format. It allows to encode CD to compressed MP3 files, that occupy less of disk space. The balance between quality of sound and file size may vary. MP3 files may sound very similar to original CD if they set to a maximum quality. However MP3 files cannot keep 1:1 CD quality. Anyway converting CD to MP3 format is recommended in most cases because of its popularity.
All you need to do is just download the CDtoMP3converter from cdtomp3.net.After installing the program, whenever you wish to copy any audio tracks into any audible format, just right click the mouse button and choose the option extract to and convert into any audible extension you like.You will find your converted audio files into C:\My Documents\My Music folder.
CD to MP3 conversion How To Copy Audio Tracks of CD/DVD files into MP3 Format
CD to MP3 Converter’s feature:
  • Extract any audio tracks into your computer or storage drive easily.
  • Convert any audible extension.
  • Software size is only about 3 MB, so easy to install.
  • Easy to use software.
You can download  CD to MP3 converter @ http://www.cdtomp3.net
back to top