Showing posts with label How To. Show all posts
Showing posts with label How To. Show all posts
Friday, December 26, 2014
Тоdау i will write a tutоrіаl tо Hide Drives with CMD wіthout any thіrd раrtу расkаgе. Тhеrе аrеа sеvеrаl frее аnd duе sоftwаrе’s ассеssіblе tо hide local drіvеs, hоwеvеr і аm nоt gоnnа mеntіоn to hіdе а local drіvе еmрlоуіng а расkаgе. In thіs tutоrіаl і wіll shоw уоu an еаsіеst mеthоd tо hide nаtіvе drіvе with CMD. thіs mау sаvе уоur еасh саsh аnd tіmе.
Tuesday, October 28, 2014
Whatsapp Trick: How To Use It Free For Lifetime
4:07 AM | No comments |
Whatsapp is one of the most successful chat messenger at present and is very popular among youngsters. When we create account on Whatsapp we get validity of 9 months to 1 year and after that we need to pay a small amount to use it again for another year. But here we are sharing an awesome trick by which you don't need to pay anything. By this trick you can extend validity of your account to another 1 year.
Friday, October 24, 2014
Thursday, February 27, 2014
Tips To Protect Your Adsense From Click Bombing And Invalid Clicks
10:35 AM | No comments |
![]() |
8 Tips To Protect Your Adsense From Click Bombing And Invalid Clicks |
Adsense is one of the most popular ad network.Adsense pays you more than another ad network.It is difficult to approving your adsense account.Every blogger has a dream to approve their adsense account and earn lot of money through adsense.Sometime after approving your account you will get banned from adsense due to invalid activity.There are many reason's for banning adsense account like invalid clicks,click bombing,etc.So here i am going to tell you some tips on How to protect your adsense from invalid activity.
Sunday, February 23, 2014
Was Your Account Hacked? How to Find Out
10:49 AM | No comments |
Secure Way For Your Account |
News of credit card hacks and other data breaches have made headlines on an almost daily basis lately. With so many attacks at major national chains, from Target to Neiman Marcus to Michaels, affecting millions of customers, it's very possible that your credit card has been compromised.
Tuesday, February 18, 2014
iPhone Tweak: Directly Call From Your iPhone's Passcode Screen
1:32 AM | No comments |
![]() |
iPhone Tweak: iPhone's Passcode Screen |
We set passcode to our phone to avoid interfere in your phone by other peoples.Suppose you have to call to your friend,you need to unlock your device using passcode and call your friend.It take long time as compared to your emergency work.Is it possible to dial contact directly from your lock screen? Answer is Yes!! It is possible to call using lock screen by using different passcode's.Using PassDial jailbreak tweak.Passdial increase your lock screen functionality.
Friday, February 14, 2014
How To Optimize Images For The Webpages
6:40 AM | No comments |
![]() |
How To optimize Images For The Webpages |
Traffic of your website is also depends on image optimization.Not optimizing images for your website and large size of images which take long time to download leads to be loosing your potential traffic from search engines.You should proper optimize your website images for indexed in search engine.Some search engines reject your webpage if your images are not optimized.You need to optimize your image to index your webpage correctly in search engine.So in this article we will posting about How to optimize images for website.
Tuesday, February 11, 2014
Monday, February 10, 2014
Moving Your Non-Movable Android Apps Into SD Card Without Root
7:47 AM | No comments |
![]() |
Moving Your Non-Movable Android Apps Into SD Card Without Root |
If your phone is not rooted,you can't move some apps like whatsapp,facebook messenger and more into SD card.Here i am going to post tutorial on How to move non-movable android apps into SD Card.There is another method using android sdk but this is lengthy process.So i am posting here very short method for moving non-movable apps in SD Card without root.
Tuesday, February 4, 2014
Install Android x86 On Virtual Machine
5:55 AM | No comments |
Android is no doubt the most widely used operating system for mobile. With a great user base , their are a number of Android application developers developing applications fro Android. While developing applications is becomes quite hectic to build an application and test it after installing on Mobile and for every succeeding build you have to do the same. So, Here is a method to test the applications on your system without installing them in your mobile on ANDROID installed in your Virtual Machine.
![]() |
Install Android x86 on Virtual Machine Vmware Player |
Make Your Usb Drive Write Protected To Protect From Viruses
5:50 AM | No comments |
Their may be a number of reasons to make your USB Drive read only. In read only mode , user can only read and copy the data stored on the disk but, can't write or delete any data from the USB Drive. This is quite useful when you are going to copy some data to a system containing lot of viruses. However, there may be a number of reasons a user want to make its USB read only or Write Protected.
![]() |
Write Protect USB Disk |
Saturday, February 1, 2014
How To Setup IIS Web Server On Windows
10:39 AM | No comments |
IIS , Internet Information Services is the Web Server module developed by Microsoft for the use with Windows NT family. Microsoft IIS supports HTTP, HTTPS, FTP, FTPS, and SMTP. IIS web module comes preloaded with all Windows Operating Systems but, user need to configure it manually in order to use it.
![]() |
Configuring IIS Server on Windows 8 and Windows 8.1 |
How To Create Dummy Files Of Any Size And Format
10:37 AM | No comments |
Dummy file is basically a file which contains nothing i.e random garbage data and used for a number of purposes like Enhancing security and protection . A dummy file can be of any size and any format i.e The size and format of file depends on user. If user needs a dummy zip, it can be created or else if he need an .exe it can also be created.
![]() |
Dummy File Creator for Windows |
How To Install Operating System Virtually In Vmware Player
10:34 AM | No comments |
Vmware Player is a software visualization package provided by Vmware . Vmware can be used to run any Operating system virtually within an already installed operating system as an application.
Vmware Player offers Enhanced Graphics, Faster performance and Tighter Integration support for many Operating Systems and supports almost of available operating systems.
Vmware Player offers Enhanced Graphics, Faster performance and Tighter Integration support for many Operating Systems and supports almost of available operating systems.
![]() |
Methods To Avoid Your Smart-Phone Being Sniffed From NSA
10:32 AM | No comments |
Media reports recently informed that spy agencies have been gathering the data transmitted by popular smart-phone applications.
The National Security Agency [NSA] and its British equivalent used uncovered power-point slides hasindicated that these spy agencies were continuously intercepting personal data that was transferred by 'leaky' smart-phone applications. According , to the documents provided by former NSA contractor Edward Snowden showed that the agency and Britain's GCHO gathered data transmitted "in clear" by "Angry Birds, Facebook, Flicker, Google Maps, Linked In and Twitter".
The National Security Agency [NSA] and its British equivalent used uncovered power-point slides hasindicated that these spy agencies were continuously intercepting personal data that was transferred by 'leaky' smart-phone applications. According , to the documents provided by former NSA contractor Edward Snowden showed that the agency and Britain's GCHO gathered data transmitted "in clear" by "Angry Birds, Facebook, Flicker, Google Maps, Linked In and Twitter".
Smart-Phone Applications To Unlock Rooms In Hotels
10:29 AM | No comments |
Now you easily get into your Hotel room just by smart-phone application that automatically unlocks the door when you are closer to your room.
This new lock system is connected via Bluetooth to an iOS or Android application. The benefits of this application are immense and very soon will replace Key Cards and could actually prove secure and convenient if properly implemented . The risk of loosing a key is now at the verge of extinction .
This new lock system is connected via Bluetooth to an iOS or Android application. The benefits of this application are immense and very soon will replace Key Cards and could actually prove secure and convenient if properly implemented . The risk of loosing a key is now at the verge of extinction .
Saturday, January 25, 2014
How To Perform A Clean Install Of Windows Easily
1:08 PM | No comments |
Thinking of reinstalling Windows on your PC or laptop? Here's how you can prepare for and perform a clean install of Windows efficiently.
Remember the sweet plasticky smell of your freshly unpacked computer? How it smoothly turned on, and seamlessly took you to your gloriously plain desktop? Not that it’s necessarily a worthless piece of junk now, but power users who crack software and generally experiment with new and innovative uses of software end up visiting hundreds of infected web pages which inadvertently infect their own PCs no matter how protected or careful they are. Even if you don’t live on the edge, years of bloat start showing sometime down the line.
How To Thoroughly Disinfect Your Windows PC In Case Of A Virus
1:07 PM | No comments |
If you’re in a situation where a virus has infested your PC to the point of hair-tearing frustration, don’t panic. We’ve all had this problem at some point of time in our lives, so just follow our instructions and you’ll be fine
Computers have their own shelf life, but virus and malware issues cut that time exponentially. Even if you follow preventive measures to the letter, computer viruses are so named because they have the knack of evolving faster than people can find a way to counteract them. They are a seemingly never-dying breed, but then it’s an occupational hazard that comes with owning technology.
Popular Posts
-
Samsung Galaxy J~5-inch 1080p~3GB RAM launched in Taiwan Samsung unveiled the Galaxy J with 3GB of RAM and similar specifications as...
-
Click Here For 18+ plus Click Here For 18+ plus
-
Three new budget smartphones have been now spotted on the official website of Intex. These devices belong to the Cloud series and carry a ...
-
Google's MDK provides details about how best to create a modular smartphone. Time to get designing, mobile developers: Googl...
-
San Francisco : Google is selling Motorola's smartphone business to Lenovo for $2.9 billion, a price that makes Google's bigges...
-
**Nokia Lumia 1320** Nokia Lumia 1320 is a cool phablet and Nokias first experiment with mid-range, large phablets. However, with the lau...
-
Today every Indian cinema lover knows Nawazuddin Siddiqui for his superb talent but in early 90’s he was a struggling actor. He faced a l...
-
MediaTek to announce an octa-core LTE chipset in January MediaTek recently announcedits first true-octa core processor, as part of th...
-
The “robot” is not much more than a UV lightbulb on wheels at his point, but it is perhaps a preview of more evolved defenses yet to come....
-
You could spend an entire lifetime waiting for your favorite celebrity. Or you could get to work on snagging one of their incredibly simil...
Blog Archive
Powered by Blogger.