5 Private Search Engines that Value Your Privacy

Tags

Privacy is of the highest concern in 2017. We know that Google has a prying eye on every user and keeps a track of your searches to give you more relatable results and also to hit you with adds.

So, today we provide 5 search engines that do not track you. You can use these search engines without having to worry about your privacy.

1.DuckDuckGo

When the discussion is about the private search engines, our first thought would obviously be the DuckDuckGo. The primary user base of this search engine is the people who would like to surf the internet anonymously. DuckDuckGo provides fast results without tailored ads. This search has a very fast growing user base. If you want to try something other than Google, try DuckDuckGo.

2.WolframAlpha

This is an awesome search engine which provides accurate answers. WolframAlpha does not track you and it is a knowledge packed search engine.

There is an option to use dynamic calculations to get search results specifically about calculations, health and much more.

3.Startpage

Startpage is a powerful search engine which provides you search results while not tracking any your searches. It allows you to browse through proxy servers to prevent websites from tracking your IP address or location.

4.Yippy

Yippy is another search engine which values your privacy. The speciality of this is it manuclly filters the reults into various categories and flags any inappropriate results. Unlike many other search engines, Yippy allows searching of many types of content including news, jobs, web, images, etc.

Yippy allows you to view cached pages and filter results in by tag clouds, websites, sources. One more thing to note is that Yippy does not shoot personalised advertisements in your face.

5.Gibiru 

Gibiru is a fully uncensored search engine and also completely encrypts the search data to prevent any possible data leaks to the third parties. Gibiru is faster than most other private search engines because it uses the ‘Google Custom Search‘ to provide its service.

Moto Z2 Play Review, Is it worth Buying?

Tags

Let us review the Moto Z2 Play, the second generation of Motorola’s popular mid-range phone that they released last year. As Moto Z2 play is the successor of Moto Z Play, we will compare the Moto Z2 play with Moto Z play.

The biggest difference this year is that the phone has a slightly better camera and a somewhat brand-new design. Is it still worth it buy the phone?

Moto Z2 Play Review

Design:
The biggest difference between this year’s model and last year’s model is the design of the phone. Last year it was one millimeter thicker, but they decided to shave off a millimeter and made it a little bit thinner to hold in hand. Now, there are consequences with shaving off the thickness which the phone is going to lose some battery life. Overall it feels nice and looks stunning to hold.

Features:
The Moto Z2 Play has no water resistance whatsoever which is okay, as this is a mid-range device. There it is splash proof which is good and also dust resistant. The fingerprint scanner on last year’s model didn’t have capacitive buttons. The new fingerprint scanner which is great by the way is they allowed you to use gestures on the fingerprint scanner to move around the operating system. The phone has 4GB RAM and 64GB ROM.

There is an audio jack(they removed it on the regular Moto Z).

The phone feels big compared to the latest smartphones that are currently on the market. They have reduced bezels, reduced the size in your hand, so the phone is a lot easier to hold.

Sound:
Don’t expect too much of a difference when it comes to sound quality. The device is not using a mono speaker on the bottom of the phone. It is not using dual speakers; it is still even that same front facing speaker which is on the front of the device. It is still not the loudest speaker on the market now.

Performance:
The new Snapdragon 626 processor which is about 15 to 17 percent faster than last year’s Snapdragon in 625. We can’t notice much of a difference regarding performance, but it performs well for everyday tasks like checking an email browsing the web and even playing games. The phone is great to get stuff done. Phone software is still the same, Motorola does a great job with software. They keep everything nice and clean with stock Android. They only add a few tweaks that are useful.

Also, read 50+ Hidden Secret Codes for Android Mobile Phones.

Screen:
The screen on the Moto Z2 play is still 1080p, full HD but it is AMOLED, and the device is not that bright so when you are outdoors in the sunlight. We need to handle up the brightness to see everything, but it is an excellent screen. Snapdragon 626 inside is not powerful enough for a 4k display, but 5.5 inches 1080p is fine.

Camera: 
The camera, one of the things they improve this year on the Moto Z2 Play. It is a little bit better they reduced the megapixels down from 13 to 12. Reducing megapixels is not worse, but they increased the aperture to F 1.7, so technically you should get a little bit better low-light. 5MP Front Camera.

Battery:
This is what made the Moto Z Play last year a huge success. This is what everyone talked about it. It had two-day battery life you can go on forever. Last year it was around 3500 milliamps, this year it is a little bit smaller because they reduce the size of the phone. It is still good, but you are not going to get that amazing two-day battery life.

The Bottom Line:
The Moto Z2 Play is a fantastic smartphone does all the basics right for a mid-range phone, good display, good battery life (even though it is not as great as last year). It has decent sound, great design. The phone is priced at ₹27,999 in Flipkart.

Now the question is it worth buying?
Yes, if you are going to or wanted to purchase a new good looking, stylish, powerful smartphone this phone doesn’t disappoint you.

No, if you want to upgrade your phone.

F1 to F12: Function Key Shortcuts Everyone Should Know

Tags

What do Keyboard F1 to F12 Function Keys do?

Most of us work with Windows or MAC. But many wonder what are the uses and features of the Functions keys F1 to F12. In this article, we will look into the function keys features and its uses.

Uses and Features of F1 to F12

F1 KEY Features and Uses:

F1 key is used for “Help.” If you are a Windows OS user and want the help of the particular program then press the F1 key, it will open up help window for you.
In few cases, the F1 key is used to enter the BIOS mode. Press F1 when your computer is about to boot then your system opens into BIOS mode.
Pressing the Win + F1 keys both together will open Help and Support Microsoft in Windows.

F2 KEY Features and Uses:

F2 is used to rename the selected file or folder(shortcut to rename file or folder). F2 works in all versions of Windows.
Alt + Ctrl + F2, Opens the Document as a Microsoft Word.
Ctrl + F2, Opens the Preview window in Microsoft Word.

F3 KEY Features and Uses:

In the MS-DOS charge line or Windows, press F3 to rehash the last summons.
Win + F3, Advanced Search window opens in Microsoft Outlook.
Shift + F3, Changes the content in Microsoft Word, from upper to lower case or capital letters at the start of each one expression.
If I am not mixed up, it is the F3 key which will cause the Application«Control» computers Apple, running Mac OS X.

F4 KEY Features and Uses:

Opens the location bar when you press F4 in Windows Explorer and Internet Explorer.
Rehash the last activity (MS Word )
Ctrl + F4, Closes the window open in the present window, for example, a tab in the program
Alt + F4, Closes the system window in Windows.

F5 KEY Features and Uses:

F5 Refreshes the page or desktop. F5 helps running a slide to demonstrate in PowerPoint.

F6 KEY Features and Uses:

F6 moves the cursor in the location bar.
Ctrl + Shift + F6 , opens Document in Microsoft Word

F7 KEY Features and Uses:

F7 is commonly used to check the spelling and grammar in any document programs of Microsoft like Word, Outlook and few other.

Also, read How to Reset Your Windows Local Admin Login Password

F8 KEY Features and Uses:

F8 key makes your PC to enter safe mode while PC is about to boot.

F9 KEY Features and Uses:

The F9 key mostly does not have any functionality in Windows. This key can be used in few programs like AutoCAD.

F10 KEY Features and Uses:

F10 key activates Menu in the open organizer window.

Shift + F10, works same as the right mouse click.

When your system is booting, and you press F10, it will show you BIOS Information.

F10 is also used to enter the hidden recovery partition on few computers.

F11 KEY Features and Uses:

F11 Key helps you to enter Full-screen mode in few programs and software, and it can be utilized and work in any Browser.

F12 KEY Features and Uses:

The F12 key opens the “Save As” in Microsoft Word.

Shift + F12, Saves a document in Microsoft Word.
Ctrl + Shift + F12, Prints a document in Microsoft Word.

The F12 key helps to open the inspect element box in Browsers.

Petya Outbreak Stoppage Expected As Microsoft Cracks The Petya Mystery

Tags

Microsoft has partly solved the mystery behind one of the Wanacrypt’s successors

Petya, or what some researchers are calling as NoPetya is a ransomware that has came into highlight after it hit Ukrain and some other European countries. It has been compared with Wanacry in terms of catastrophe although it has a shorter attack arena till now.

In a blog post, Microsoft has revealed the working of Petya ransomware. Contrary to what security firms have believed , Microsoft says that it has “good evidence” that a software supply chain attack method was used for malware propagation.

Microsoft has quoted the malware initiation process as:

“Microsoft now has evidence that a few active infections of the ransomware initially started from the legitimate MEDoc updater process. As we highlighted previously, software supply chain attacks are a recent dangerous trend with attackers, and it requires advanced defense.

We observed telemetry showing the MEDoc software updater process (EzVit.exe) executing a malicious command-line matching this exact attack pattern on Tuesday, June 27 around 10:30 a.m. GMT.”

and its propagation inside the LAN as:

“Once the ransomware has valid credentials, it scans the local network to establish valid connections on ports tcp/139 and tcp/445. A special behavior is reserved for Domain Controllers or servers: this ransomware attempts to call DhcpEnumSubnets() to enumerate DCP subnets all hosts on all DHCP subnets before scanning for tcp/139 and tcp/445 services. If it gets a response, the malware attempts to copy a binary on the remote machine using regular file-transfer functionalities with the stolen credentials.”

A soft reminder to our readers:

As referenced in our previous articles, Eternal Blue is a leaked NSA tool that uses the outdated IPC protocol SMBv1 to spread itself. This tool is being used by all the current and surfacing ransomware. So it is advisable to disable SMBv1 on your system(s) as soon as possible.

How to protect yourself:

1. First of all disable SMBv1.
2. Patch your system(s) against EternalBlue
3.Use Amit Seper’s kill switch
” create a new file named prefc in the C:\Windows directory without any extension”
Note that this is a temporary fix which will work until hackers modify the malware code.
4. Stay informed on the internet to stay safe on the internet.

What is a Ransomware and how does it work? Explained

Tags

Ransomware has become one of the major topics of discussion these days with the huge attacks on government offices, schools, and hospitals. Let’s have a look at what a ransomware is and how it works.

What are malware and ransomware?

The term Malware refers to a program which is harmful to your computer. Ransomware is a kind of malware which essentially takes the control over a computer and then prevents the users from accessing the data on it until they pay the ransom to the creators of the Ransomware.

How does your computer get infected with ransomware?

The most general scenario is that you click on a link in a file or an attachment which redirects to a malicious web server. This kind of attacks are known as Phishing attacks and the most common medium for phishing is the emails.

The best way to protect yourself from these phishing attacks is to be very careful when you open an email from an unknown source. Make sure you do not click on any of the links in such suspicious emails. This is because the main aim of ransomware is to make the user believe that the link is legit and make him fall pray for them.

The major ransomware attacks which occurred recently, including the infamous WannaCry and the one spreading this Tuesday, borrowed from leaked National Security Agency code which permits software to spread quickly within the network of an organization.

How does ransomware work?

Just like the name suggests, a Ransomware is s software that holds your files and encrypts the data only to be made available once the user pays the ransom. It crawls through your hard drive and encrypts all the data it can get in touch with. Once the encryption is done, the user can access only one page which shows the message from the creators of that specific Ransomware. It usually contains the threats and the address to which the user has to send the money.

Computer Running Slow? Here are few things you can do to fix It.

Having a slow computer is one of the most annoying things one can come across. In this article, we will cover not just how to increase the boot speeds, but the overall performance of your Windows machine.

Reboot

If it has been a while since you have rebooted your PC, do it before you proceed to any of the below-mentioned tricks.

Kill Lousy Background programs

Hefty background processes are one of the main reasons for a slow computer.Disable or remove the startup programs that automatically start every time your computer boots.

If you have an antivirus (which you probably would have), then make sure it is not scanning your PC in the background. Anti-virus programs drastically slow down the computer when they are scanning. If you choose to have a scan then wait until the scan is complete and this should improve the overall speed.

Free hard drive space

Make sure that you have at least 400-500MB of free space on your hard drive. The reason to have at least 500MB free space is to allow for a good swap file size and also for the temporary files.

Scan for viruses and malware

If your computer is infected with a virus or a malware, it can cause your computer to run slow. If you do not have an antivirus installed on your computer, you can try any of the free antivirus software in the market.

Keep Windows Updated

Make sure you have installed all the latest major Windows updates. This helps in making you safe from potential threats and also run your operating system fluently.

Increase Memory

If you are a heavy Chrome user like I am and see that your computer is running slow, there is a great chance that Chrome is eating up all your RAM. So, make sure you have enough ram to run all tasks smoothly.

Top 5 Best VPN Services Right Now

Tags

Best VPN Services

There are many reasons why we might need to use a VPN service whether we are trying to keep your data and traffic hidden from the eyes of your internet service provider or agencies within your government these are just a couple of the reasons why we might need to use a VPN.

In this article, we rated top 5 best VPN services based on several factors. Some of these factors include logging of your data, DNS leak protection, the number of server locations, ease of use and price.

Top 5 VPN Services Right Now

5. Private Internet Access

Private Internet Access VPN has over 3,000 servers in 37 locations in 25 countries. It has a ton of options which include encryption levels, DNS leak protection, and a kill switch. These features enable you to configure PIA to suit your needs. The user interface is incredibly easy to navigate. If you are someone that’s into torrenting, it is only allowed on certain servers so PIA would not be the best choice for you on this list. Private Internet access is a solid VPN especially if pricing is an issue with plans starting at 3.33$ a month if you pay annually on up to 6.95$ if you pay monthly. It is available on several platforms including Windows, Mac, Linux, iOS, and Android.

4. ExpressVPN

ExpressVPN have over a thousand servers than 145 locations across 94 countries which are more than triple the countries offered by Private Internet Access(PIA). They are one of the fastest VPN services out there which comes in handy when watching HD TV shows or movies. ExpressVPN also packs in a lot of features including zero logging and 24-hour customer service. Pricing is as low as 8.30$ monthly if you pay annually plus they are offering an additional three months of service for free. It is available on Windows, Linux, Mac, iOS, and Android with setup tutorials for each platform.

Also, read Methods used By Hackers to Hack Facebook Accounts.

3. VyprVPN

VyprVPN put some high emphasis on security they have a technology called chameleon which further reduces the chance of data being recognized which is useful in countries where they monitor their citizens online usage behavior. VyprVPN has more than 700 servers in at least 70 locations around the world. They also own and manage their servers with no third party interference with no restrictions. VyprVPN premium is the better of the two options as it includes chameleon pricing at 6.67$ per month if billed annually otherwise it is 12.95$ it’s billed monthly. VyprVPN is available on a ton of platforms including Windows, Mac, Linux, Android, and iOS. It is even available if you have a QNAP.

2. NordVPN

NordVPN tells itself as the world’s most advanced VPN. Setup for Nord is super easy when compared to other VPN services. It has double data encryption which as implied encrypts your data twice. The automatic kill switch and the strict no logs policy are nice features. Nord also has 821 servers in 57 countries worldwide. Nord VPN pricing is excellent 5.75$ per month it is billed annually. It is available on so many platforms. All of the platforms available along with the instructions are available on their downloads page.

1. IPVanish

IPVanish has over 40,000 shared IPS 750 plus servers in more in 60 countries. It has a no logging policy with five simultaneous connections and unlimited server switching. It has great speeds for torrenting with unlimited person-to-person traffic. They also have 24/7 customer support and a seven-day money-back guarantee if you are not satisfied. The pricing is 6.49$ a month billed annually or $10 a month if billed monthly. It is available on Windows, Mac, iOS, and Android, Linux support is limited.

Google Fined Record $2.7 Billion by the EU for manipulating search results

Tags

Google has been fined with a record-breaking $2.7 billion(174231000000 Indian Rupee) by the European Union for breaking antitrust law. This decision was made after a seven-year investigation into the US company’s search algorithms, which ended with the judgment that Google had “abused its dominant position by systematically favoring” its shopping comparison service.

The fine is the largest antitrust judgment handed out by the executive body of the EU, the European Commission, topping a €1 billion penalty given to Intel in 2009.

The main reason of the case is Google Shopping, a price comparison specialty built into the Google’s search engine. The commission’s antitrust filing states that Google showed users results from Google Shopping “irrespective of [their] merits,” depriving rival price comparison sites of traffic. The EU argues that because Google is so overwhelmingly dominant in Europe, it should not be allowed to undermine competitors actively.

As part of today’s decision, Google will have to make changes how its search algorithm ranks websites, to “comply with the simple principle of giving equal treatment to rival comparison shopping services and its service.” This is a major imposition that Google will take it seriously. If it does not end its current conduct, the EU says the company faces daily penalties of up to five percent of its average daily turnover.

Microsoft To Drop SMBv1 In Its Upcoming Windows Update

Tags
The 30-year-old distributed IPC protocol is being dropped by Windows for users’ online security. SMBv1, the earliest version of Server Message Block protocol used for resource sharing and Inter Process communication among nodes on a network will be deprecated in the forthcoming Windows update. Almost everyone who had even a little familiarity with computers and the Internet heard about Wanacry. The ransomware which wreaked havoc last month and was the reason for a spike in cyber security awareness. Although this “awareness” among common people is expected to dump soon, tech companies are not going to get away with it in a similar way. Wanna cry used NSA’s exploit leaked by Shadow Brokers in a data dump in April. This exploit was based on a vulnerability present in SMBv1. Although Microsoft patched the same in an update released in March most of the users remained unaware of it. After the havoc and the “kill switch” solution, it was advised that the best way is to disable SMB on user systems if they do not need it. Microsoft is doing the work on the users’ behalf by deprecating the old SMBv1 in its next update of Windows. Ned Pyle, the principal program manager for Microsoft’s Windows Server High Availability and Storage division, has also published a blog post this month, enlisting products from other vendors that are still using SMBv1 and begged them to stop using it now. Pyle also hinted that the company has been planning to remove SMBv1 from Windows 10 Fall Creators Update (Version 1709), which is expected to release in September/October 2017.

Segun wire blasts falz

Chache Master,SegunWire who went viral after he said He wanted to be a Yahoo Yahoo Boy in the Future, has blastedFalzfor his comment on entertainers to stop praising Internet fraudsters.In an Instagram post, Obviously not written by the 8 year old, Segun ripped into the Lawyer turned Singer.. and it’s not funny.He Wrote:-You know not the struggle!! So why speak ill of it please. How many futures have the yahoo boys destroyed abeg?Shebi na judge they collect bribe for back even before court case and so na senior advocates never destroy futures?!! You speak of SOFT WORK.. Only GOD knows your own definition of SOFT WORk and why is nobody coming out to judge you forthat term SOFT WORK ..now person talk CHACHE you they complain shey na your lappy them they use?….Because you are privileged to shine withMUSIC and not the witty occupation called LAW full of lies and deceit …Let’s take us back to the foreign music we listen to most of the musicians over there speak of drugs and ammunition just to tellthe tale of their experiences but there wasn’t any foolish advocate or whatsoever…MIND you every artist in this country is entitled to the kind of message they want to pass out there to their fans …so why complain bitterly out of ignorance …if you so want to help , first of remove the BHAD GUY in your name as it portrays a bad example to the young ones and please MRman avoid tapping ass In all your videos with those half Nakked girls !!!Check your self properly before throwing shades at anybody!! Many are out there unprivileged, unlike you born with a silver spoon from a better school in Nigeria to schooling abroad !! While the poor massesare out here hawking pure water just to send their kids to school and yet they are still been harassed by law makers like yourself ..MY GUY the beautiful ones are not yet born as the country is full of corruption…even your PAPA gather do corruption if na lie ….make we investigate!!Many awesome Yahoo boys and kind hearted artist are at least using those money to open foundations programs and helping the poor masses !!They are the new generation ROBIN HOOD!! Stealing from the rich to feed the poor…at least BABA they don do something……instead make you mind your state you they use media take they feed your hungry self with Pep talk …shebi na your mate send small boy go school still they build house for him parents ….how many people have you helped ?? BABA AMVCA with no lens ….

Do you need a degree to make a living as a Programmer ?

Tags

Programmers and Software Developers is one of the highest paid people in our society. The main reason for this is that the skillset needed to become a good programmer is not commonly seen in everyone. But, it comes this one question, do you need a degree to be a successful programmer?

Read: How to become a Good Programmer?

A degree in computer science is a symbol of dedication and stands as a proof that you have spent a lot of your time reading and researching various technologies. When a company wants to hire an individual, they have to judge the individual based on some criterion, so they choose the degree. But this is not going fine now. A lot of degree holders are not really good at programming which is sad to hear.

Nowadays various companies are considering the efforts an individual has put into doing projects or contributing to open source software or having a good GitHub profile. These provide an insight to the recruiter that the individual has a real world experience in dealing with projects.

Now coming to our question, do you need a degree to make a successful career in CS? The answer is a resounding No. Most of the companies are not stuck with the old ways of judging you based on your degree and grades, They want some practical proof that you can deal with the stress, programming and all. Without a degree, you can gain a sufficiently good knowledge in CS from online courses, MOOC, educational websites like Treehouse and Linda.

You might face a little tough time in the beginning since you got no proof to show that you are good. But in time, you will get better. The most important part is not to lose the curiosity to learn new technologies because without that, you cannot survive in CS.

Just remember, more than 14% employees at Google has no professional degree. So, you always have a chance. This is possible because unlike any other course or profession, you don’t need to know a lot of stuff to start learning the CS concepts. Which makes it a simple and newbie friendly profession.

Sean Tizzle Begs instagram to verify him

Nigerian musician, Sean Tizzle has left many people wondering after he crawled toInstagram’s page to beg for the verificationof his page.Nigerians have reacted after musician, Morihanfen Oluwaseun aka Sean Tizzle crawled to Instagram’s official page in the middle of the night to beg for verification of his account. The singer who boasts of a 1 million followers has been advised to take the official step if he wants to get verified instead of the route he chose.Many people have wondered if the musician is not knowledgeable enough to know that there is a process to follow for verification of accounts and not by commenting on the official page of Instagram.“On a serious note his account needs to beverified cuz he got more followers than some so called celebrities on here who accounts are verified.” someone wrote.Another added: “There’s natin wrong with him asking to be verified! He’s a â­�ï¸� in Nigeria pls @instagram verify @iamseantizzle.”

What is the Difference between NTFS, FAT32, and exFAT File system?

Tags

“Maze VR: Ultimate Pathfinding” – a Beautiful Mobile VR Exploration Game

Tags

“Maze VR: Ultimate Pathfinding” is a Mobile VR Exploration Game with Beautiful Graphics

Exploring mazes can be lots of fun in real life, but translating them into computer/mobile games can be rather challenging and sometimes plain boring. Maze VR: Ultimate Pathfinding is a VR maze game developed by RiseAngle, Inc. that wants to change all of that by integrating an exciting new feature. The addition of VR makes this game extremely appealing to people of all ages!

Right off the bat, I have to say that I tried Maze VR: Ultimate Pathfinding with the Gear VR headset and the game works very well. Unlike other VR games that induce motion sickness, here you get none of that. I played the game for roughly 1 hour and a half, and I didn’t end up dealing with any problems whatsoever. So, performance-wise, you get a very fluid and fun gameplay that you will enjoy quite a bit.

When it comes to the game itself, this is an exploration title first and foremost. You do need to figure out your way out of your maze, but the adventure on its own comes from exploring the mazes and seeing their uniqueness and benefits. I believe the game does an excellent job when it comes to sharing 24 different mazes as those are distinct and they have a unique feel.

The graphics are magnificent. Usually, a VR game focuses more on the experience rather than the graphics, but here you do get an immersive game world that you want to be a part of. They did a magnificent job at making you memorize the map.

You will end up dealing with some mazes that are a bit hard to solve, but then again this is where you get to have the authentic experience. Right off the bat, I have to say that the game is easy to get into. Sure, it does get harder along the way, but as you play, you will get very familiar with the controls.

The thing I like a lot in Maze VR: Ultimate Pathfinding is that you don’t need touch features or a controller. You just need to gaze towards a certain location, and you will go that way. It helps you build up a state of immersion, and that does work to your advantage.

Going through mazes is a lot of fun, and a large number of mazes just encourages replayability even more. While memorizing some of the mazes can be a bit confusing, you will still enjoy exploring the unique gameplay ideas shared here. There’s a huge replay value to be had in the game, and in the end, you will always come back to the game for another run, be it for just 20-30 minutes.

Should you purchase Maze VR: Ultimate Pathfinding? Yes, this game is one of the best VR experiences on Android, and it works amazingly well. Not only does it have distinct VR elements that work very well, but the gameplay is fun, and there’s a lot of content as a whole. It’s definitely worth your time, all you need is to check it out, and you will not be disappointed!

Boost Your Broadband Internet Speed with CMD

Tags

We have shared a lot of articles related to Windows Command Prompt. It is the most interesting tool in Windows where you are free to do most of the tasks which are usually restricted in GUI.

In my last article, I’ve shared How To Find Passwords of All Connected Wi-Fi Networks using CMD and many people found it interesting. So this time I am sharing some other interesting CMD commands which can boost your Broadband Internet Speed.

It is not actually an extra speed, it’s what you’ve got from ISP but for some reasons, you don’t get the maximum speed your ISP provides you. Though the broadband speed depends on various external factors, you can improve the internal factors by these simple commands

How to Boost Broadband Internet Speed with CMD?

Step 1: Open CMD as an administrator, type netsh int tcp show global and Press Enter.

Step2: Now change the TCP parameters. Open notepad and type these commands:

cd\
netsh int tcp show global
netsh int tcp set global chimney=enabled
netsh int tcp set heuristics disabled
netsh int tcp set global autotuninglevel=normal
netsh int tcp set global congestionprovider=ctcp

Step 3: Save this file as Boostspeed.bat

Step 4: Run BoostSpeed.bat in administrator mode.

That’s all. These commands will boost your broadband speed and You will notice 30-35% increase in the speed.

To reset TCP global parameters to default values Type these in notepad

cd\
netsh int tcp show global
netsh int tcp set global chimney=default
netsh int tcp set heuristics enabled
netsh int tcp set global congestionprovider=none

and save it as say Reset.bat to reset the TCP global parameters to their respective default values. You will have to run this file as an administrator.

5 Most Deadly Linux Commands – Don’t use them when You’re drunk

Tags

Linux is the most precious operating system for programmers and hacker. Linux user can perform numerous such tasks that a Windows or Mac user can’t even imagine. It’s an Open Source Operating system which is the best choice for a server. Linux also provides Graphical User Interface but if you want do get the best of Linux, You’ll go for its Command Interface. Sometimes Linux can go extremely up to the extent that it can do serious damage to the system.

Read: 10 Reasons: Why should we use Linux?

But there’s a problem. Sometimes Linux can go extremely up to the extent that it can do serious damage to the system. Linux system doesn’t even ask the user for confirmation once the command is given and simply performs its task

Because of these harmful activities of Linux, it is recommended to use it only if you are good at giving commands and have in-depth knowledge of Linux commands list.

5 Most Deadly Linux Commands

1. rm -rf /

This command will Delete Everything from your computer. It is a combination of three keywords. rm will remove all the files followed by this command. -rf will run rm command in the more effective way and will remove all files and folders inside the specified folder without asking confirmation from the user. “/” will start removing the data from the root directory and will delete everything from the computer including the data of removable media.

2. :(){ :|: & };: Sh

This command creates a shell function, which once gets initialized starts to create multiple copies of itself. It results in taking quickly all the memory and power of CPU. It makes computer freeze or not responding. This is also known as Denial Of Service Attack.

3. mkfs.ext4 /dev/sda1

This command will format the hard disk. This command is again composed of two keywords. mkfs.Ext4 command will create a new ext4 file system on the following device where this command will get executed. /dev/sda1 specifies the 1st partition on the first hard disk which is probably in use by the user. Similarly, This Command > mkfs.ext3 /dev/sdb2 will Format the second partition on the second hard disk with ext3 File system.

4. /dev/sda 

This command will Write Any content Directly to a Hard Drive. This command will execute normally as other commands in Linux do. But the output of this command will directly be sent to the file system (NTFS or FAT ) of the Hard Drive. It will result in damaging the file system of the computer.

5. mv ~ /dev/null

This command will turn your home directory into a Black hole. Moving any of your content and data to following path : /dev/null means you want to destroy it. It means /dev/null is a black hole where once anything sent , can not be recovered back.

Samsung’s new Widest Computer Monitor Makes Everyone go nuts

Tags

Microsoft To Drop SMBv1 In Its Upcoming Windows Update

Tags

The 30-year-old distributed IPC protocol is being dropped by Windows for users’ online security.

SMBv1, the earliest version of Server Message Block protocol used for resource sharing and Inter Process communication among nodes on a network will be deprecated in the forthcoming Windows update.

Almost everyone who had even a little familiarity with computers and the Internet heard about Wanacry. The ransomware which wreaked havoc last month and was the reason for a spike in cyber security awareness. Although this “awareness” among common people is expected to dump soon, tech companies are not going to get away with it in a similar way.

Wanna cry used NSA’s exploit leaked by Shadow Brokers in a data dump in April. This exploit was based on a vulnerability present in SMBv1. Although Microsoft patched the same in an update released in March most of the users remained unaware of it.

After the havoc and the “kill switch” solution, it was advised that the best way is to disable SMB on user systems if they do not need it. Microsoft is doing the work on the users’ behalf by deprecating the old SMBv1 in its next update of Windows.

Ned Pyle, the principal program manager for Microsoft’s Windows Server High Availability and Storage division, has also published a blog post this month, enlisting products from other vendors that are still using SMBv1 and begged them to stop using it now.

Pyle also hinted that the company has been planning to remove SMBv1 from Windows 10 Fall Creators Update (Version 1709), which is expected to release in September/October 2017.

“SMB1 is being removed (fully or partially, depending on SKU) by default in the RS3 release of Windows and Windows Server. This is coming, folks,” Pyle wrote.

In the meantime, it is advised to disable SMBv1 and use the newer SMBv2 and SMBv3 instead. Microsoft has published a document, which describes registry settings, PowerShell commands as well as group policy settings to disable SMBv1 in your Windows environment manually.

How to Remove Duplicate Files on Windows

Tags

We all have a load of duplicate files waiting to be found and deleted. These duplicate files consume a lot of memory which could be used for something new. There are a lot of ways to remove duplicate files on Windows, but the easiest one is to use a duplicate file finder applications. These duplicate file finders basically scan your hard drive completely for unnecessary duplicated files and help you to remove them. There are many duplicate file finders, here is what we consider easiest and very obvious one.

Note: You are not advised to use any of the duplicate remover tools to remove duplicates in system folders like the Program Files folders. Many programs you use may actually need these duplicate files in different locations to for a smooth functionality.

Read: How to Lock and unlock your computer with a USB Pendrive?

CCleaner To Remove Duplicate Files

The CCleaner is a very popular tool which needs no introduction. There is also a good chance that you have used this earlier for some purpose. The main function of CCleaner is to remove the junk files, which frees up a lot of space on your hard drive by removing the unnecessary and temporary files. Ccleaner also comes with a built-in tool which is a duplicate file finder.

Open the CCleaner and select Tools > The Duplicate Finder. This is available on all versions of CCleaner and you don’t need the pro version to use this feature.

CCleaner’s default settings are sensible, and will allow you to search for duplicate files on your C: drive while ignoring system files and hidden files. You could also choose to search a specific directory by clicking the “Add” button on the Include pane and selecting that folder. Be sure to select “Include files and subfolders” option while adding a new folder to ensure CCleaner searches any folders inside the folder you specify, too.

The interface of the tool to find the duplicate files is not so fancy. It has a good feature which is, it allows you to easily have a look at the duplicate files and delete them and also save the names of the duplicate files in a text file. You can right-click a file in the list and select “Open containing folder” if you want to view the file itself on your system.

You can now right-click a file in the list and then select “Open containing folder” if you want to view the file itself on your system.

How to Customize Folders With Different Colors In Windows

Tags

How to Lock and unlock your computer with a USB Pendrive?

Tags

If you’ve ever watched any Hollywood movie based on Hacking, you must have seen how the hackers protect and hack computers just by using USB Pendrive. It seems like a cool idea. You can Lock down your PC using Pendrive and then unlock it using the same Pendrive.

Also Read: How to boost lock screen security?

How to Lock and Unlock a Computer with USB Pendrive?

It is a very simple process. I’ll guide step by step but make sure a working USB Pendrive without any virus or malware. It’s okay if you already have some important files on your Pendrive, this software does not require empty Pendrives.

Step 1: Download and install a software: Predator.

This software locks your PC when you are away, even if your Windows session is still active.
It uses a regular USB flash drive as an access control device.

Step 2: Once Predator launches plug in the Pendrive.

When you’re away from your PC, you simply remove the USB drive:
– once it is removed, the keyboard and mouse are disabled and the screen darkens
when you return back to your PC, you put the USB flash drive in place:
– keyboard and mouse are immediately released, and the display is restored.

Step 2:  When you insert the USB Pendrive, Predator will ask you whether you want to create a password. Click OK to continue.

Step 3: In the Preferences window, enter a secure password in the “New password” field. That is if you lose your USB pen drive, you can use this password to unlock your computer.

This software also allows you to use a password in addition to USB lock/unlock. If you want this facility, check the Always Required box and you’ll be asked to enter the password each time you use your thumb drive to unlock your PC.

Finally, in the section under Flash Drives, ensure that the correct USB flash drive is selected. When you’re done, click “Create key” and then OK.

Step 4: Predator will exit. Click the Predator icon in the taskbar to restart the program. A few seconds later, the icon will turn green, alerting you that Predator is running. Once done, Predator will check every 30 seconds to see that your USB Pendrive is plugged in. If it isn’t, your computer will dim and lock down.

You can pause Predator at any time select “Pause monitoring” from the taskbar menu. You can also check if someone accessed your PC/laptop while the Predator was switched on using USB drive from the Predator activity log.

The only issue with using Predator on your computer is that it locks down one USB port exclusively for the lock/unlock purpose.

What is a Firewall and Why do you need it?

Tags

Most of us have heard of the word firewall at some point. There are many misconceptions about firewall which we will clear today. If you are running any of the modern and popular operating systems, it is very likely that you have a firewall enabled.

What Is a Firewall?

First of all, in a firewall, there are no flames or actual wall involved which is obvious.

A firewall is basically a shield that is meant to protect your Computer, Smartphone from various malware present on the Internet.

Every time you browse a web page, a series of requests are sent by your browser to the respective web server in the form of data packets. The role of a firewall is to keep a close eye on these data packets and determine if they are safe or not.

The firewall finds the tampered data packets by following the rules which are set up. Depending on these rules, the data packets are either rejected or accepted.

Firewall

Here are a few reasons why you should have a Firewall enabled.

To protect your computer

Many malware on the Internet enables an unknown man across the globe to have control over your computer. This is easily one of the worst situations you can ever face and a firewall actively stops something like that from happening.

To Play Games Online Safely

Online gaming is very common these days and everyone loves to spend some time relaxing. But, there is various malware which targets the online games existing on various compromised or unsecured game servers.

You can block unwanted content with a firewall

So far we have only talked about the ability of the firewall to block various dangerous content. But the firewall can do more than that. Other that protecting you against ransomware, a firewall allows you to block various online locations of your choice.

Even though the firewall does a lot, it is still ineffective against various viruses, keyloggers, and worms. So, it is safe to say that a firewall is your last resort. You should always use it along with a goo anti-virus tool.

Top 10 Methods used By Hackers to Hack Facebook Accounts

Tags

Facebook has become an essential part of our daily life. We share our life moments, photos, videos and text msgs on Facebook. But, when it comes to your privacy and security, you can never be sure on the internet. Facebook and similar websites try their best to ensure the user’s privacy and security but there are still many issues that can cause the hacking of Facebook accounts.

So let’s not ignore this and try to understand how a hacker can hack the Facebook accounts and let’s understand how to safeguard Facebook accounts against hackers.

Top 10 Methods used By Hackers For Hacking Facebook Accounts

1. KeyLogging

Keylogging is one of the easiest ways to hack a Facebook account. A keylogger is a program that records and monitors the user’s input and keeps a log of all keys that are entered. The keylogger can actively send your inputs to hackers via the Internet. You have to be very careful while dealing with keyloggers because even the computer experts become victims of keylogging.

How to detect Keyloggers?

  • Scan your USB drives before using them
  • Download software from trusted sites only
  • Use a good antivirus

2. Phishing

Phishing is very easy and considered as n00b technique but it is one of the most effective techniques of Hacking a Facebook account. There is 50-50 chance for a hacker to get victims password using Phishing if your victim is not aware of basic internet terminologies. There are various ways of carrying out a phishing attack. The most common one is where a hacker creates a replica of a login page which looks like the real Facebook page. The victim will then think it’s the usual login

The most common Phishing to create a duplicate of a login page which looks like the real Facebook page. The victim thinks it’s the usual Facebook login page so he enters his login details in phishing page. Once the victim is logged in through the fake page, the email address and password are stored in a text file or in hacker’s database.

How to detect Phishing Page?

  • Check URL of the login page.
  • Never login your Facebook account on other devices.
  • Use Modern web browsers that identify the phishing page.
  • Avoid emails or text msgs that ask you to log into your Facebook account.

3. Session hijacking

When you log in to your Facebook account, your browser and the facebook’s server maintains a session for user authentication. The session details are saved in your browser’s cookie files. In session hijacking, the hacker steals those cookies and then access the victim’s account. Session hijacking is most common when accessing Facebook on an HTTP (non-secure) connection and it is widely used on LAN and Wi-Fi connections.

How to avoid Session Hijacking

  • Do not use Facebook when connected to shared Wi-Fi or LAN.
  • Try to clear cookies every 2-3 days or if possible daily

4. Saved passwords

Most of the time we share our login and credit card details in the web browser. Anyone can see your Facebook account from your browser’s password manager. A hacker can get physical access to your computer and insert a USB programmed to automatically extract or retrieve saved passwords in the Internet browser or any other information the hacker may need.

How to avoid Password Hacking?

  • Try not to save passwords in web browsers
  • Do not share your device with people
  • Block the device connectors

5. Sidejacking with Firesheep

Firesheep is a tool that used to carry out sidejacking attacks. It only works if the victim is connected to the same Wi-Fi. It is similar to session hijacking but it only works in Wi-Fi networks.

How to avoid Sidejacking

  • Do not use Facebook when connected to a public Wi-Fi network.

6. DNS spoofing

If a hacker is on the same network which is connected to the Victim, he can change the original page and replace it with his own fake page and easily gain access to the victims Facebook account.

How to Avoid DNS Spoofing?

  • Always configure it to be secure against cache poisoning
  • Manage your DNS servers securely

7. Man in the middle attacks

In this method, the hacker secretly relays and possibly alters the communication between the server and victim who believe they are directly communicating with each other.

The hacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the hacker.

The Hacker must be able to intercept all relevant messages passing between the two victims and inject new ones. This is straightforward in many circumstances; for example, an attacker within reception range of wireless access point can insert himself as a man-in-the-middle.

How to avoid MIME attacks?

  • Use VPN services
  • Use a proxy server to access the internet
  • Use good antivirus with good firewall options

8. Social engineering

Social engineering is a simple method that’s based on collecting as much info from the victims as possible. The information may include the date of birth, phone number, security questions etc. Once a hacker gains access to this info, he can brute force the info or use recovery methods to get login passwords.

How to avoid Social Engineering

  • Never share personal info via email or phone
  • Avoid links from unknown or suspicious sites

9. Botnets

Basically, botnets are networks made of remote-controlled computers or bots. These bots have been infected with malware that allows them to be remotely controlled. It’s expensive to set up botnets and this makes them be minimally used in cases of hacking Facebook accounts. Some very popular botnets include spy eye and Zeus.

How to avoid Botnets 

  • Keep all your software up to date
  • Ensure that your firewall is always on

10. Email ID hacking

With this method, the hacker only needs to access the connected email id of any account and then reset the Facebook password manually.

How to avoid email ID hacking

  • Enable 2 step authentification in your Gmail account
  • Use strong passwords
  • Avoid entering email on scrupulous sites

How To Find Passwords of All Connected Wi-Fi Networks using CMD

Tags

What is the Difference between 32-Bit and 64-Bit Processors?

Tags

There are many things to consider when buying a new Computer. We look for RAM size, Processor, CPU, GPU, Hard Disk and display etc. But when it comes to select a Processor’s category, we prefer 64-bit Processor. In fact, Most people want 64-bit Processor PC without even knowing what does it mean to have 64-bit Processor and What is the Difference between 32-Bit and 64-Bit Processors?.

It’s good to have knowledge of many terms which are used daily but people don’t give much attention. In this article, let’s discuss 32-Bit and 64-Bit Processors and what does it mean for your PC.

Difference between 32-Bit and 64-Bit Processors

Whenever you buy an operating system, a software or a game, you probably see 32-bit and 64-bit options available. If you’re a Windows user, you must have noticed that you have two Program Files folders — one simply “Program Files” and the other labeled “Program Files (x86).”  This “Program Files” folder is used for storing the DLL files of 64-bit applications only. The x86 folder is used for storing the DLL files of 32-bit applications.

To install a 64-bit version of Windows, you need a CPU that’s capable of running a 64-bit version of Windows. The benefits of using a 64-bit operating system are most apparent when you have a large amount of random access memory (RAM) installed on your computer, typically 4 GB of RAM or more.

In such cases, because a 64-bit operating system can handle large amounts of memory more efficiently than a 32-bit operating system, a 64-bit system can be more responsive when running several programs at the same time and switch between them frequently.

A computer with a 64-bit processor can have a 64-bit or 32-bit version of an operating system installed. However, with a 32-bit operating system, the 64-bit processor would not run at its full capability.

How can 64-bit Processor handle more RAM?

The computer system only supports binary counting. There is either 0 or 1. Each one is a considered a “bit.” That means for 1-bit computing, you get two possible values; 2-bit means four values; then at 3 bits, you double that to eight (2³).

Keep going exponentially and you eventually get 32-bit (2 to the 32nd power) worth 4,294,967,296 and 64-bit (or 2 to the 64th power) is worth 18,446,744,073,709,551,616 values.

That’s a lot of bits, and the numbers show just how much more powerful a chip that supports higher bit computing can be. It’s a lot more than double. So It’s pretty obvious that 64-bit processor is capable of doing more computing than 32-bit.

These days, you are most likely already running 64-bit chips with 64-bit operating systems, which in turn run 64-bit apps (for mobile) or programs (on the desktop, to settle on some nomenclature). But not always. Windows 7, 8, 8.1, and 10 all came in 32-bit or 64-bit versions, for example.

Easy Ways To Increase Google Chrome Speed

Tags

How to Increase Google Chrome Speed?

As many of you know, Google Chrome is not the quickest browser out there, especially on older computers. We tell you easy ways that you can speed up Chrome to make it work faster.

1. Remove unnecessary web apps

Even though web apps don’t load resources as websites do. It is still best to remove the web apps you do not need anymore.

To get to your apps, you can either go into the address bar and type in chrome://apps, or in the bookmarks bar you can select apps

On the apps, you choose the apps no longer require right-click on the app and select remove from chrome then click remove.

2. Disable Extensions

Extensions are helpful to increase the functionality of the Chrome browser sometimes there are extensions that we no longer need that are using up resources. It is better to disable or delete them entirely.

Go to Options Menu and select more tools then Select Extensions untick the extensions you no longer use, or you can select the trash bin to delete extension forever.

3. Update Chrome

Sometimes running the latest version of Chrome will increase speed

Go to the Options Menu(three vertical dots)in the upper right-hand corner and select move your mouse over help in the drop down menu and select about Google Chrome.

It will check for an update and install the latest version of Chrome and if it updated click on Relaunch.

Also, read Hidden Google Chrome Tricks And Features That Will Make Your Life Easier.

4. Turn Page Prefetch On

Make sure to turn on the network action predictions also known as the prefetch. This makes Chrome web pages open faster.

Go to options select settings at the bottom of the page select show advanced settings go into the Privacy, make sure the boxes use a prediction service to help complete searches and use a prediction service to load pages more quickly are checked this should make web pages open faster.

5. Experimental Features

Experienced users, some of you know that Chrome has a lot of experimental features that you can mess with that can boost the rendering engines and increase the loading of pages in the browser. If you don’t like Experimental features or if they don’t work for you. It can always revert to normal at any time.

In the address bar type in chrome://flags

On the top of the page, there is a warning. It is up to you if you want to experiment with some of the features. Some of the features might hurt your Chrome. So be careful if you want to experiment with it. We request no to use it unless and until only if you know what you are doing.

6. Disable Unnecessary Plugins

Plugins are much like extensions. They provide extended functionalities to the browser. Chrome comes with few built-in plugins provided by Google (like Chrome PDF Viewer, Native Client, etc.), and may carry plugins by other software installed in your computer. Plugins, like extensions, can slow down the browser and clog memory and network resources.

To disable plugins you do not need:

Type “chrome://plugins” in your Chrome’s address bar.
Click Disable to disable the plugin you no longer need.

What is Overclocking? All You Need to Know About It

Tags

What is Overclocking?

If you have never heard of Overclocking before, it is the dark heart forcing your electronics to perform better than the manufacturer intended. Computer CPU’s tablet, phone and any other modern computing devices you own have processors inside them that all have something in common. Their performance is dictated by the design or architecture and the number of cycles that they can perform per second which is usually represented as frequency or clock speed. This is where the term overclocking comes from.

You are taking the clock speed and turning it up over the manufacturer’s recommendation to get more performance. Clock speed is not the only factor so it is not like you can overclock a calculator to perform as well as a gaming PC, but can make the calculator faster relative to its original state.

How do you do it?

If you want to overclock, it often requires other aspects of your device to be run outside of specifications. The device will become unstable as you turn up the speed you can compensate by turning up the voltage, but that can cause additional power consumption and more heat output.

Also, read How to overclock your graphics card easily and safely?

Seasoned overclockers will have experience with anything from large heat sinks with fans for cooling to liquid cooling or even more exotic sub-zero cooling if they are trying to get maximum performance. More voltage also increases the risk of failure.

So, for this reason, many manufacturers will refuse outright to provide warranty service on overclocked electronics. Still, want to do it you are not alone lots of people are willing to make these trade-offs that I just mentioned for more performance. There are comprehensive guides that exist for overclocking pretty much any device that would benefit from it.

Many Android phones can be overclocked with a simple app download, and PC overclocking is a very popular pastime with gamers, video editors or anyone else who needs more performance from his or her computer.

Ethernet vs Wi-Fi: Is Wired Connection really better?

Tags

Wireless is the general standard of every emerging technology so much so that it is not a flashy feature anymore. With the world becoming wireless, the usage of Ethernet cables makes less sense, but they do provide a lot more options.

Nobody has seen people using Ethernet cables with their smartphones, but it is a good option to consider in many use cases like using your backup devices, gaming and all. Even though it is not as comfortable as using a wireless network, Ethernet has three great advantages more reliable connection, faster speeds, lower latency.

Also Read: How Airplane Wi-Fi Works? How does Wi-Fi work in an Aeroplane?

Speed

When it comes to speed of data transmission, Ethernet has a slight upper hand on Wi-Fi but you are trading a marginal speed difference for the comfort of taking your device to anywhere with-in the Wi-Fi range.

When Wi-Fi first hit the market with its 802.11g standard, it became a bottleneck for the people with great internet speeds since 54Mbps is the band limit compared to 1000Mbps of Ethernet. However, with the latest Wi-Fi standards like 802.11ac, this is no longer a problem. The band limit is now 3200Mbps(Theoretical) which is far greater than the internet speeds in most houses nowadays.

Reliability

Even though Wi-Fi offers great speeds now, they are theoretical only. In the practical use case, the signals are susceptible to various disturbances like Radio waves, walls can weaken the signals even the atmosphere can change the signal strength. Ethernet really shines here, since it gives a stable speed as expected of a bounded medium of data transfer.

This difference is a signal strength is normally seen when you are downloading a huge file or streaming a video in 1080p or above.

Security

Security is undoubtedly the best feature Ethernet has to offer compared to Wi-Fi. The data sent via Ethernet can only be accessed by the sender and the receiver of the data at the both ends of the cable. However, in the case of Wi-Fi, the data is sent through the air, anyone who can crack the encryption has your data. Using open Wi-Fi in places like Train stations, coffee shops is not at all secure and pose a great threat to your security.

Even though Ethernet has many advantages over Wi-Fi, it doesn’t make sense to use a wired connection all the time with your laptop. The performance factor is almost same in both the cases, but if you are picky then Ethernet is the one for you

15 Important Run Commands Every Windows User Should Know

Tags

Top Problems Every Gamer Has Faced | Gamer Problems

Tags

Looking at the problems that we as gamers have faced both in and out of games.

Top Gamer Problems

10. Toxic Communities

Gaming has evolved over the years we had managed to move beyond the realms of our living rooms and into the online world. The internet became, more mainstream games took advantage of the changing landscape and brought online multiplayer to competitive games. Unfortunately not having to see everyone face to face brought an even greater rise to toxic communities. Players who blame everyone else for their problems, people who spam, irritating noises into their microphones. These people make the communities sometimes make it difficult to enjoy the games.

9. Parents

We have all been there when we were younger, parents who do not approve of our gaming habits. If your parents were fine with you playing video games, there was, of course, the issue of having them buying the games for you and dictating what you could and could not play at least until you could save up your allowance for yourself. It is sad to be missing out on a lot of amazing titles when you were young.

8. Budget

On the other hand while getting games as a kid was tough purchasing games. As an adult comes with its set of real-life obstacles you know the ones that your parents kind of warned you about with most games costing as much as a week’s worth of groceries for some and consoles in the hundreds of dollars it can be quite difficult to manage our money especially when we see our friends all have that shiny new console. Being a PC gamer can be even more pain trying with upgrades reaching into the thousands regarding a full-on upgrade all in a quest to get that 60 frames-per-second.

7. Your Favorite Franchise Ruined

Every gamer has had a franchise that gave new meaning to their favorite hobby. Some game series live spanning years it can be quite difficult to maintain that high standard that fans have come to expect and there are bound to be flops. Unfortunately, those flops can sometimes end up ruining our perception of the entire franchise in general. It can be disheartening when a follow-up to one of your favorite games of all time turns out to be nothing short of a disaster.

6. Stereotyping

As gaming has evolved and changed so has the culture in communities so when we see TV shows movies or even other communities label or depict us as the classic nerd stereotype, it could be kind of frustrating. The most insulting and one of the most common as gaming communities as a whole are very diverse in nature it seems like the term nerd is meant to label a community that doesn’t adhere to popular standards. Gaming is becoming one of the biggest forms of media it is questionable as to why people still feel the need for that label.

5. Dying When you didn’t save your progress

While the autosave and checkpoint systems have been a blessing, there was a time, and depending on the game where saving was completely manual or taken out of your hands. If you died, then you have to go back to where you last saved. Sometimes you get so immersed in your game that you lose track of time and forget to save your progress. Then when you die, you are reminded of your mistake, and you could be crushed by losing how much time you have played. Sometimes it is even several hours worth just remember to always check up on your saves especially before a boss fight come on.

4. Save file corrupted

As if losing some of your in-game time from forgetting to save was bad enough. Imagine losing all of your progress in one fell swoop. Save file corruption means in almost all cases that you cannot return to the game from that file. All that time you spent has gone forever. It is almost as bad as deleting a save accidentally, but corruption is typically out of your control with reasons ranging from unexpected power outages to bugs, or just the game is dumb. The result is always the same, and your time it is just gone.

Also, read Funny Gaming Meme: Every Gamer Agrees

3. Time Management

Speaking of time even if we had enough money to spend on all the games we wanted. Time will always be an issue we still need to work our jobs or go to our classes deal with the family or just get enough sleep. These are a bit of hassle if you are a major gamer. Setting aside enough time to play your game can feel more like scheduling an appointment rather than just having fun. This is troublesome to all gamers.

2. Broken Console and Scratched Games

Nothing breaks a gamer’s heart more than their games being physically broken or their game discs scratched. Replacing a game can be expensive. But replacing the system is what makes things hard spending hundreds or thousands of dollars for a device to play games on is costly and repairing it or replacing it can add up. With many gamers using games as a means for relaxation and escaping the stresses of the real world being unable to play and being out quite a bit of money is what hits us where it hurts the most.

1. Lag

Another problem that is typically out of your control. Lagging is extremely frustrating for online gamers caused by the internet slowing down either locally or server-side. It creates hiccups to gameplay from players teleporting and running in place, your shots not connecting with the enemy. It can make any online match unplayable. If you are the only one lagging, you appear to everyone else as just kind of like a bad player

Few other problems we can add:

  • Parents not understanding some games don’t have pause.
  • Buying a highly anticipated game and didn’t result what you expected.

How Airplane Wi-Fi Works? How Wi-Fi works in an Aeroplane?

Tags

How Airplane Wi-Fi Works?

Have you ever wondered how actually the Wi-Fi in an airplane works? Traveling in the airplane has been a phone-free zone for a lot of years. We have to turn off our electronic devices and rely instead on movies and in-flight magazines for fun. But times have changed.

Airplanes have tried to make flying a little more enjoyable by offering us in-flight wireless internet, but have you ever wondered how exactly does Wi-Fi work when you are on an airplane?

When Wi-Fi first became a thing in the airplane in the early to mid-2000s, it usually worked by transmitting an internet connection to a transponder attached to the plane using satellites, similar to how folks in rural areas without cable DSL or fiber infrastructure use satellite dishes to get online.

Even in the present days, those old systems are still in use. There is a system named air-to-ground transmission or also called as ATG. These are similar to cell phone towers. These have the benefit of being a cheaper than satellite internet, but they work over land, and there are few disadvantages not only do these towers suffer from geographical restrictions, but the service they provide can be painfully slow as anyone who’s ever tried to stream anything on a plane probably knows.

Also, read How to turn Windows Into A WiFi Hot spot?

The ATG systems don’t offer speeds that are high. The speed would be somewhere around five megabytes per second, but the satellite internet is faster with speeds of up to 50 megabytes per second. There are Ku band, the same range of spectrum used to be satellite TV which we use in our house. With many people flying on airliner, a 50 megabytes connection can be very slow if lots of passengers are connected at the same time. The tech we have available requires airlines to get large antennas onto their planes; these will be heavy enough to have a heavy effect on the plane’s weight and aerodynamics which leads to higher fuel costs that are passed along to you.

Nowadays, major air carriers are now starting to install cob Ka-band satellite antennas which have the potential due to their higher bandwidth to reach hundreds of megabytes per second, enough for streaming even on a full plane where lots of people are trying to connect.

What is 5G Network? 5G Explained, Release Date, Latest Update

Tags

No matter what kind of mobile technology that you have in your pocket it quickly becomes yesterday’s news and that may never be more evident than right now as telecommunications providers worldwide are working on 5G. The industry is hoping that 5G will be good enough and will be a game changer in the telecommunication industry.

What is 5G?

5G is a network system which has much higher speed and capacity, and much lower latency. 5G is centered around the idea that the Internet of Things that is connected devices that enable self-driving cars automated homes and more.

It will become crucial shortly, and that mobile data networks will be very robust to handle it all with wearables appliances vehicles mobile AR and VR devices and so on. 5G, however, is not only aiming to reduce latency to as low as one millisecond to allow real-time operation of important devices.

It also boasts a maximum speed of 20 gigabits per second way faster than the quickest LTE networks today or in Google Fiber connections.It looks like the bare minimum for the average user will be about a hundred megabits.

It will become crucial shortly, and that mobile data networks will be very robust to handle it all with wearables appliances vehicles mobile AR and VR devices and so on. 5G, however, is not only aiming to reduce latency to as low as one millisecond to allow real-time operation of important devices.

It also boasts a maximum speed of 20 gigabits per second way faster than the quickest LTE networks today or in Google Fiber connections.It looks like the bare minimum for the average user will be about a hundred megabits.

It also boasts a maximum speed of 20 gigabits per second way faster than the quickest LTE networks today or in Google Fiber connections.It looks like the bare minimum for the average user will be about a hundred megabits.

Also, read How will the 5G network work?

5G is hitting the market sometime in 2019 with it becoming widespread around 2025 since providers not only are trying to make 5G more uniform standards than what exists today to ensure better compatibility around the world, but they also need time to build more infrastructure.

Infrastructure would include signal boosters since 5G is shorter wavelength means it’s more prone to signal degradation across great distances but even though most of us will have to wait awhile to experience 5G trials are already underway in a few places in the United States. Small scale deployments are expected at the 2018 and 2020 Olympics to give attendees an early look at the tech before it reaches the mainstream.

Infrastructure would include signal boosters since 5G is shorter wavelength means it’s more prone to signal degradation across great distances but even though most of us will have to wait awhile to experience 5G trials are already underway in a few places in the United States. Small scale deployments are expected at the 2018 and 2020 Olympics to give attendees an early look at the tech before it reaches the mainstream.

How to Save Money with Google Chrome Extensions?

Tags

Save Money with Google Chrome Extensions

For many of us out there shopping online has become your preferred method when shopping. Of course, we would like to get the best price for your purchases. Google Chrome has a lot of great extensions that can help you when shopping online to find the best deal. If Chrome is not your preferred browser and some of these extensions may be available for your browser as well.

1. The Camelizer

Many of you out there may be familiar with the Amazon price tracking site like camelcamelcamel.com. There is a Chrome extension similar to the site The Camelizer. It shows you the price history of an item that you are looking at to purchase and helps you determine whether you should buy that product now or wait. Once you have installed The Camelizer, it shows up in your chrome bar. The extension shows the price history of the product, and also you can set the price the amount you want to buy the product and subscribe to an email alert.

2. Wallaby

If you have several credit cards deciding which one to use to get the most rewards or cash back can be confusing. Using the Wallaby, it can help you decide which card to use for your purchase and save few bucks. You won’t need to enter in any credit card information. Go to the product page on any shopping site and select the Wallaby icon in the chrome bar now you will see a list of the cards that you have listed within wallaby, and then you cycle through the cards to try to find the best savings and the best rewards on your card.

Also, read Hidden Google Chrome Tricks And Features That Will Make Your Life Easier.

3. Coupons at Check Out

Searching for coupon codes can be tedious this handy extension will display coupons and add the codes automatically upon checkout. While Check Out clicks on Find Coupons. The extension finds the best coupon available. Coupons at checkout make saving money easy and quick.

4. Honey

This extension is very similar to coupons at checkout sometimes. It is better to use both extensions to see which one finds the best coupon deals. Honey is probably the better known of the two, and it is extremely popular. It works same as Coupons at Check Out.

5. InvisibleHand

InvisibleHand saves hundreds of dollars while shopping. InvisibleHand lets you know prices for other retailers to get you the best price. Use it on Amazon and then see if there is a better deal elsewhere. Open any product you would like to purchase and click on InvisibleHand bar select compare prices. The bar shows the product prices from other sites.

The extension mentioned above can save you a lot of money.

How Android Media Picker is Changing the Face of WordPress

Tags

Today, it’s easier than ever to create your own personal or professional website. Online publishing software and content management systems (CMS) offer an easy way for even the tech illiterate to get their voice on the Internet.

WordPress is currently the most widely used self-hosting tool online, powering over one-quarter of all web traffic, with over 500 new sites created each day, although many organizations also use a managed WordPress hosting service as a cost-effective approach to keeping their platform secure.

Security Updates

WordPress recently released their 4.7.3 update, which in addition to fixing several security issues and cross-site scripting errors, also includes features designed to improve the user’s experience. Users can quickly browse through comments with infinite scroll and keep track of conversations with improved comment notifications. Previously unsupported formats such as TIFF files can also now be converted into an acceptable format when uploading to make the process easier. But perhaps the most significant upgrade to WordPress is the introduction of their new Media Picker, launched in May this year for Android users.

A Better Browsing Experience

Android users know that the WordPress interface can be a bit clunky on mobile devices, especially when it comes to uploading and organizing media. The site has gotten rid of its “seven-item menu,” which was notoriously difficult for users to navigate due to confusing and often overly complicated menu options. While something as simple as saving a photograph used to be a headache, the new WordPress Media Picker streamlines the entire process for both new and experienced users.

Easier Media Management

Android Media Picker allows you to browse your media library, view and select recent photos, and even take a picture from your phone or tablet, all through the WordPress mobile service. Whereas before users might have to navigate through multiple apps to update their blog or website, they can now save time by doing it all in just a few clicks.  Instantly access your camera, photo albums, or other media files using a simple drop-down menu. This makes it easier to keep followers posted in real time and without delay, and to keep your work organized between updates.

Work Anytime, Anywhere

Android Media Picker makes is easy to manage the WordPress app from your phone, tablet, or any other mobile device that runs on the Android platform. With a working internet connection, users can read comments, connect with their followers, and post updates from anywhere with ease, while the camera function allows them to upload pictures the instant you take them. Media Picker is expected to make it easier for bloggers, business owners, and other online entrepreneurs to manage their website whenever and wherever they need to.

Neuralink to develop a brain implant that can Link Human Brains With Computers

Tags

What would you do if you’re stuck in traffic for hours? You would probably blame the transportation authority for not creating alternative options for you to travel safely and wait for the traffic to clear up. Not Elon Musk. Once he got in traffic, he got bored with waiting and started to lay plans for a new underground transportation system that will help very much to counter the transportation problem.

Neuralink

Elon Musk, probably the greatest visionary in the world right now with his projects such as Space X (Mars tour), Tesla, etc. comes to the company Neuralink, a company that is trying to develop a brain implant that connects the Computer with the human brains. The company was first founded in 2016 with San Francisco as its headquarters.

Mr. Musk hopes to achieve this within 4 years of time. After acquiring the name and the logo, Elon Musk started this venture in early 2016. These implant devices are just on the size of microns. The device aims at creating a link between computers and our human brain with the support of the implantable devices.

This initial aim of the device is for the medical purposes in the shorter run. For instance, this device will work at understanding the communication with patients with serious brain diseases who can’t be able to communicate with others or have trouble in communicating with others. But in the longer term, the device aims at human enhancement.

Every day we strive to unlock our potential to learn new things. But we have a limit that our body and the mind cannot exceed. The Neuralink was created for that purpose. The human enhancement would be one of the major long-term application if the Technology was developed successfully by Elon Musk and co.

Elon Musk got this idea from a fictional technology called as Neural lace. The Neural lace is a concept that includes various options items such as telepathy, human enhancement, it connects with databases, and it stores data of our brain, and it can be used after the death of someone. You can read and receive thought just like you do with the text messages or a phone call. If such technology was developed, the possibilities are enormous. This technology will take us to a new technological revolution in the long run.

If Neuralink is proven to be successful, just think about the changes that it will bring to the current technology. The technology we have now will be obsolete in a decade, and new technologies will be developed that is beyond our comprehension. We started out as a single cell organism, and now after taking leaps and bounds with our innovation, we are here where a company is developing a computer system that will connect our brain to a neural network.

In case we have learned anything the changes is the only thing that will withstand time. At this growth rate, you can’t help but wonder what all the achievements we can achieve in the future with a visionary like Elon Musk leading the technological revolution are.

Difference between a coder, a programmer, a developer and a software engineer

Maybe you have heard about these job titles in the past, but what exactly is the difference between them? Some people claim that it mostly depends on your education and on what you have achieved; in some way, this may be true, but some others claim that sometimes the company you are working for decides if you are a programmer, a developer or other, making it merely a job title. Let’s take a closer look to this.

What is the exact difference Between a coder, a programmer, a developer and a software engineer?

1. Coder

A Coder is a person in charge of writing the code that makes most of our apps run properly. Those who are coders have the ability to create software that can be used not only in apps but also in video games, social media platforms, and many others. Coders sometimes cannot do all the phases required in the making of a software, like designing or testing, they mostly take part only in the phase of writing the base code. In some cases, there are people who may get offended If you call them a coder.

2. Programmer

A Programmer is a bit more specialized person. They are able to create computer software in any primary computer language, like Java, Python, Lisp, etc. Programmers are said to go beyond coders, they may specialize themselves in one area or may even write instructions for a wide variety of systems.
They also understand quite well algorithms. Programmers can be similar to Developers but the ones who implements are not the same as the ones who can design or do a well class structure within the software. They can take care of many details.
Read: How to become a good programmer?

3. Developer

A Developer can write and create a complete computer software out of nowhere taking care of the design and other features. They are key for the development of any software applications; they are also experts in at least one programming language. Some people consider them true professionals that can take care of all the generals. Developers can sometimes be more general when it comes to the development of a software, unlike Programmers.
Read: How to become a good app developer?

4. Software Engineer

A Software Engineer is an individual that applies the principles and techniques of computer science or software engineering to everything regarding the development of a new independent software; from analyzing what the particular needs of the user are, going through the design, maintenance and testing, and even the final evaluation of the software. They are able to create software’s for any kind of system as operating systems software, network distribution, compilers and so on. They often have a college degree and can prove things theoretically.
Another way for understanding the differences between a Coder, a Programmer, a Developer and a Software Engineer is seeing them as a hierarchy or as stair, where the Coder can be found in the low section of the stair and the Software Engineer can be found at the top. Maybe to you all these job tittles may mean the same because you once knew a Developer that could do everything a Software Engineer can, but there are really some differences between them are worth knowing.
If some companies take special attention in the name of their employees or not, it is not such a big deal to worry about; what really matters is knowing what you can do and how well you can do it.

What is the meaning of Seeders, Leechers and Trackers in Torrent?

Tags
If you have ever used Torrent, you must have come across some terms likes Seeds, Peers, Leeches, and Trackers etc.  Many people just don’t give a damn about the meaning of such terms when they are able to download what they want. But, it really matters for us to know. It can we very easy for a user to use torrent if he/she knows the meaning and importance of such terms.
Before going further in understanding the meaning of Seeds and Peers, we first need to understand about Torrent (uTorrent / BitTorrent)

Torrent

BitTorrent / uTorrent is a communication protocol for peer-to-peer file sharing which is used to distribute large amounts of data and electronic files over the Internet, such as digital video files containing TV shows or video clips or digital audio files containing songs.
In peer-to-peer network topology, there can be either two communicating parties without any external server or a couple of computers connected via a USB to transfer files.
This way there is no central server in Torrent for distributing files. BitTorrent protocol allows users to join a “swarm” (a group of people downloading and uploading the same file) of hosts to download and upload from each other at the same time.

Seeders

When a user wants to upload a file, he/she first creates a small torrent descriptor file that can be distributed by conventional means (the web, email, etc.). They then make the file itself available through a BitTorrent node acting as a seed. A number of peers who have already downloaded the files, and are currently uploading them are called Seeders. A Seeder is someone from whom you can download a piece of the file. Seeders share the file with peers but do not download any parts of the file from others.

Leechers

A leecher is any peer that does not have the entire file and is downloading the file. If the file is not downloaded successfully, it remains as a leech. Once the file has been downloaded, a leecher does not share it back to the P2P network (Or he/she do not seed). Hence, the overall availability of file decreases.
seeders,leechers,peers
The middle PC acts as Seed, Rest of them are peers

Peer

A Peer is someone who is downloading and uploading the file in the swarm. Files are downloaded in pieces. When a user downloads some pieces, he then automatically starts uploading it. A file will be downloaded faster if more people are involved in the swarm. A peer becomes a seed when he has completed 100% of the file and wishes to continue uploading.

Tracker

A tracker is a server that keeps track of seeds and peers. Clients report information to the tracker periodically and in exchange, receive information about other clients to which they can connect. The tracker is not directly involved in the data transfer and does not have a copy of the file.

Google’s New operating system ‘Fuchsia OS’ gets a new UI


Google’s New operating system ‘Fuchsia OS’ gets a new UI

Google’s upcoming operating system ‘ Fuchsia OS ‘ has finally got its graphical user interface called Armadillo. Google has been working on this new operating system for a long time and it was having a command line interface. Now Google has added an early user interface to the Fuchsia OS that is featuring a card-based design [Source].
This is going to be a unique operating system by Google. Fuchsia is built on a new Google-built kernel called “Magenta”. Google’s other two operating systems, Android and Chrome OS are based on Linux-kernel.

Fuchsia OS User Interface Armadillo

Armadillo is said to serve as “the default system UI for Fuchsia.” Armadillo and rest Fuchsia Os apps are built in Google’s Flutter SDK, which is used to create cross-platform code that can run on multiple operating systems like Android, iOS, and apparently Fuchsia.
It’s possible to download the source and compile Fuchsia’s System UI into an Android APK and install it on an Android device. We have downloaded the APK and tested it. The UI consists of a wild reimagining of a home screen along with a home button, a keyboard, and a window manager. There is a bunch of placeholder interfaces that don’t do anything. Here is how it looks like:
As we have seen in above video and a website Ars Technica’s own compiled version of Armadillo, it looks like Fuchsia OS is a smartphone and tablet-focused operating system, built largely around a card-based system for managing different apps. Armadillo allows for different cards to be dragged around for use in a split-screen or tabbed interface. It seems to include some Google Now-style suggestions too.
Fuchsia OS UI
Source: Arstechnica.net Fuchsia OS UI

Fuchsia OS and Magenta Kernel

Magenta is the core platform that powers the Fuchsia OS. Magenta is composed of a microkernel and small set of userspace services and drivers. It contains libraries necessary for the system to boot, talk to hardware, load userspace processes and run them, etc. Fuchsia builds a much larger OS on top of this foundation.
The Magenta Kernel provides syscalls to manage processes, threads, virtual memory, interprocess communication, waiting on object state changes and locking. Magenta targets modern phones and modern personal computers. Devices with fast processors, non-trivial amounts of ram with arbitrary peripherals doing the open-ended computation. [Source]