Skip to main content

Posts

Showing posts from 2015

How to Hack Trial Softwares to Use them Lifetime

In this computer world we use lots of software in our desktops and laptops no matter we are in whatever field we always need software to do work. And there are many software that are freely available for lifetime to make our work easy, but there are many of the software that come with only for limited trial period that is around 30 days or 60 days. And after the free trial days you have to buy the key to use them more. And for key you have to pay money. Yes you can do this with a simple and straight method discussed below. How to Hack Trial Softwares to Use them Lifetime There is a perfect tool that will do this and the name of tool is RunAsDate. With the help of this tool you can use any of software for free even after the trial period is over. You just have to follow some of the simple steps discussed below: First of all download and install the tool RunAsDate from  here . Now in your computer run the trial software and note down the date of installation. Now when the tria

Top 10 Tips and Tricks of WhatsApp which all the users of this addictive app should know

WhatsApp has almost half billion users across the world. Its the most commonly used app however wonder how many users would claim to know the app thoroughly in the sense there are minute details which most of the users are not aware of like how to lock the app or say how to avoid downloading unwanted media files or simple methods to send the important data across to some friend. In this article we will try to go through certain  tips and tricks  useful in day to day activities of the users while using the WhatsApp : Get connected to WhatsApp without any phone number : User needs to get connected to Internet via Wi-Fi or modem and get WhatsApp installed in the smartphone. For installation user needs to  visit the official site of WhatsApp and click the application to get it downloaded. Once the app gets downloaded it gives the welcome screen, just click the “Agree to the terms” and then user would be asked to provide the phone number so user needs to type their phone number and

Powerful words from Steve Jobs on his sick bed

Powerful message. Steve Jobs’ Last Words - I reached the pinnacle of success in the business world. In others’ eyes, my life is an epitome of success. However, aside from work, I have little joy. In the end, wealth is only a fact of life that I am accustomed to. At this moment, lying on the sick bed and recalling my whole life, I realize that all the recognition and wealth that I took so much pride in, have paled and become meaningless in the face of impending death. In the darkness, I look at the green lights from the life supporting machines and hear the humming mechanical sounds, I can feel the breath of god of death drawing closer… Now I know, when we have accumulated sufficient wealth to last our lifetime, we should pursue other matters that are unrelated to wealth… Should be something that is more important: Perhaps relationships, perhaps art, perhaps a dream from younger days ... Non-stop pursuing of wealth will only turn a person into a twisted being, just l

Facebook starts collecting data to serve ads, here is how to stop it

Don’t like Facebook’s personalized ads that follow you around the Internet? The social network is now giving users a tool to block them. Facebook will now start be using your Web-browsing data to target you with advertising.  All this will be done thanks to Like and Share buttons placed on websites and apps that collect data about things you’re reading, watching, and interested in. The company announced it would use this data collected off Facebook in personalized ads last year, and on Tuesday, said it is beginning to use it more broadly. However Facebook has also given a way for users to opt out of this targeted advertisements. “Today, we’re introducing an additional way for people to turn off this kind of advertising from the ad settings page right on Facebook,”wrote Stephen Deadman, Facebook’s global deputy chief privacy officer. “We are continuing to roll out online interest-based advertising,” Deadman wrote, “and will now begin including information from pages that use F

New Android adware reportedly “nearly impossible” to remove.

Lookout  has discovered a new form of adware that roots a device after the user installs it, then entrenches itself as a system application. This makes it impervious to any normal means of deleting it, even factory resetting the device. This is a new, more sophisticated version of typical adware, which tends to make itself annoying by constantly pushing ads at the user. Since this form of malware has root access, it doesn’t need to annoy the reader, and most users probably won’t even know they’ve been infected. It’s effectively a family of trojan viruses. Lookout discovered  that this family of trojans hides inside legit apps like  Candy Crush , Google Now ,  Facebook , NYTimes, Okta,  Twitter , WhatsApp ,  Snapchat , and over 20,000 others. Infected versions of these applications are not available on the Google Play store and must be downloaded from third party stores. Since most instances of this malware leave the host app virtually unaltered, users may not notice the

Hack any game on Android

Today   millions of people are using android phone. Now an Android device become major part of our life. Everyone loves to play games in an android device. There are lots of cool games that are today available for your android device in Google Play Store. But sometime while playing our favorite game we get short on our resources needed to play that game like power, weapons or lives etc. That moment really become irritating, so to overcome this we are here with the trick  How To Hack Any Game On Android . How To Hack Any Game On Android Hack Any Game On Android Now its time to hack into game and use the any resources that you want or play any level of the game that you want with this method of  Hack Any Game On Android . The method is really working and will let you to alter the game according to your wish. Just proceed with simple steps below. Requirements: Rooted Android Device ( How To Root Android ). GameCIH App Steps To Hack Any Game On Android First of all af

How to remove password on any memory card

The method to remove password from memory card is very simple and easy and this can be done by two ways, either from Pc or from android device. Also you can even view your current password too. Just follow the below steps to proceed. Steps To View & Remove Password Of Memory Card Using Android: First of all insert your password protected memory card in your android device. Now download the ES file Explorer in your android and open it. Now there go to system folder and locate the file mmcstore. Now rename it as mmcstore.txt and open it. Now there you can see the current password of your memory card,note it down. Now in memory card option click on remove password and then paste the password that you have noted. Thats it you are done. Steps To Remove Password Of Memory Card Using PC: With this method all your data will get lost as you will be going to format your memory card in this method, so i recommend to use above method and if it doesn’t work then go for this me

Inkless Printer generates images by making micro-holes

Inkless Printer generates images by making micro-holes The good researchers at Missouri University of Science and Technology are hard at work to end our printer-ink woes. Since, the printer ink is very expensive, many alternatives are being researched by the team at Missouri Tech. An inkless printer that works by perforating special paper with thousands of microscopic holes in it. However, in order to share it, it has to be done through a peer electron microscope as it works on a microscopic level. The paper that is used is just 170 nanometers thick and made up of two layers of silver separated by a layer of silica in between. Images are produced by drilling microscopic holes into the material’s top layer of silver and then shining a light through them. By varying the location, density, and size of all those tiny holes, different colors are produced as light shines through and is absorbed and reflected in different ways. The quality of the images still has to be honed, but they a

How to Send SMS to any number anonymously

In this technology era, many of us want to send messages anonymously! the reasons might be maintaining privacy, franking etc. But many sees it as impossible! Today I'm going to take you through steps to send SMS/Text message without exposing your identity. This method is actually based on sending SMS using some online websites that will allow you to send SMS without entering any personal details. So just have a look on the websites to send free Anonymous SMS. List of Websites To Send Anonymous SMS To Any Number :- 1   Seasms.com This is the one of the best site that supports 160 character message to send to any number online and you will not need to register any personal details and can send free SMS to any of number. Must try this. 2   Spicesms.com This site only allows you to send SMS in india. The message service of this site is very fast as the message will be send instantly to the receiver end. 3   Smsti.in This website allows to send SMS in India onl

Turn your Word doc into a PDF with a live table of contents

A long report needs to be broken up into sections. Readers will want shortcuts to the chapters that most interest them. So, if you’re distributing your reports as PDFs, you’ll want live tables of contents in which readers can easily go to the chapters they want to read. Fortunately, this is easy to do in Word 2010 or 2013 (I haven’t tested this in earlier versions). First of all, you need to set up your document properly. Use Word’s outline styles— Heading 1, Heading 2 , and so on—to organize your report. For instance, you might want to assign large section titles as Heading 1, chapter titles as Heading 2, sub-chapters as Heading 3, and so on. By the way, using these headings has other advantages. You can select View>Outline and work on your document as a collapsible outline. Also, the left tab of the Navigation pane uses these styles. But back to the table of contents. When you’re ready to distribute your document, select the References tab and click

Know if your system is infected with virus and what to do

 How do you know your computer is infected?there is no particular way to identify that your computer has been infected with malicious code. Some infections can completely destroy files and shut down your computer, while others can only  affect your computer’s normal operations. Be aware of any unusual or unexpected behaviors. If you are running anti-virus software, it may alert you that it has found malicious code on your computer. The anti-virus software may be able to clean the malicious code automatically, but if it can’t, you will need to take additional steps. What can you do if you are infected? Minimize the damage :- If you are at work and have access to an IT department, contact them immediately. The sooner they can investigate and clean your computer, the less damage to your computer and other computers on the network. If you are at your home computer or a laptop, disconnect your computer from the internet. By removing the internet connection, you prevent virus from bei

Avoid locking out of facebook or other social sites

Many people due to some reasons end up loosing their social media accounts especially Facebook, it happens due to forgotten password or Facebook locked their accounts due to suspicious activities detected on the account! Innocently many ended up creating another redundant accounts! Due to activities of hackers that tried as much as they can to steal data or defraud people on social media! I always refuse to accept double or redundant friend request! My reasons are simple why will a sane human own more than one account on social media and secondly the fear of fraudulent activities by cyber thief's! I later realised many are not creating redundant account for fun, rather that's the only option left to them! Below are the most common reasons and solutions to lost of control over your social media accounts:- Phone number Problem The most common problem people face in social media opening account with phone numbers. I'm not saying its not good nor secured to

Some powerful Ms word shortcuts

Everyone knows how to use Microsoft Word. These keyboard shortcuts will put you on the path to Word mastery. Google Docs is great and all, but Microsoft Word is still the  de facto  standard when it comes to putting words to digital page. But how well do you know this decades-old program? Familiarity breeds complacency. Most of us just keep on using Microsoft's productivity powerhouse the same way we have for years. If you want to up your Word game, here are 15 extremely useful keyboard shortcuts you'll want to master, ranging from basic to little known. These shortcuts work for both Word for Windows 2013 and 2016. Keyboard Access to the Ribbon:  Just like Excel, Word has a method that lets you access menu items using only your keyboard. Just press  Alt  or  F10  and letters will appear next to each visible menu item. Press the corresponding letter to activate a particular menu option. To get rid of the labels, press  Esc . Ctrl  +  F1:  Display or hide the Ribbo

How to create screencapture in 80s

Creating screen-capture in 80s is so cool! Lol!

How to Bypass site SMS verification

Google, Facebook, Youtube, Twitter is just a few online services that require SMS verification to beat spammers and persons with more then one account. To keep your privacy, don’t give them your number. In this article you will find how to bypass SMS verification using online service that provide virtual numbers to receive SMS. There are many free SMS receive services available online. Some of them are given below: http://receivesmsonline.in http://hs3x.com http://sms-receive.net http://www.receive-sms-now.com http://www.receivesmsonline.net http://receive-sms-online.com http://receive-sms.com http://receivesmsonline.com http://receivefreesms.net  Steps: Choose any site from the list Choose the country number you want to use and copy the number Go to website that require verification and paste the number from last step and click on Verify/Submit Go to site you chosen in first step and click on SMS you received from service that needs verification.  Copy the code

Windows 10 shortcuts

With Windows 10, Microsoft has added a ton of new keyboard shortcuts to give you easier access to the new Action Center, Cortana, Task View, and virtual desktops. So much so, in fact, that Microsoft recently released a handy-dandy Word document with Windows 10’s Windows key shortcuts to aid in your study. If you’re new to keyboard shortcuts, however, one glance at that list can be overwhelming—and there are plenty of keyboard shortcuts that don't involve the Windows key whatsoever. To help you streamline it a bit, here’s a list of 20 must-know shortcuts for Windows 10.  This isn’t just a list for Windows 10, however. Many of these shortcuts work with older versions of Windows, and you'll find a few standard browser shortcuts as well. If you’re on Windows 7 or 8.1 but new to shortcuts this list will also help you take control of your Windows machine and make you more efficient by lessening your dependence on the mouse. Windows 10’s newest features Windows key +  A :  

Email Tracking made easy

Here is all the things that you need to track an email address : Google Chrome (or a good and fast browser) Fast internet connection Access to a Google Account on which you received the mail Now follow the steps below to track an email address. Open Google Chrome. Click here to visit the website, which will help you to track the email address. Open a new tab, and open your mail. Now find the mail which you want to track and open it. Now click on the down arrow, near the reply button and click on Show Original .   Now Copy all text which you see on this tab. Now go back to the previous tab, where you opened this link. Scroll down and find the empty text box.   Paste the copied code here and click on Get Source . Now wait for a few seconds to let the text upload. Scroll down a lot more and you would be able to see a map with the location of the Sender.   Via: Hacking News