Showing posts with label PC. Show all posts
Showing posts with label PC. Show all posts

Monday, August 10, 2015

8:21 AM

IDM 6.23 Serial Key and Crack

Before Your Proceed Please Note This: Give any Email, First name, Last Name. You Should Turn off Your Internet Connect Before Proceeding to Apply Keys.
Here is Your Keys for IDM 6.23 or previous version Guys Enjoy!
Again i’m telling you to Turn Off Your Internet Connection and Apply Any one these Keys to Work Properly
F9TZ9-P6IGF-SME74-2WP21
CJA0S-K6CO4-R4NPJ-EKNRK
N0Z90-KJTTW-7TZO4-I27A1
629U7-XLT5H-6SCGJ-2CENZ
L67GT-CE6TR-DFT1D-XWVCM
XONF7-PMUOL-HU7P4-D1QQX
F9TZ9-P6IGF-SME74-2WP21
CJA0S-K6CO4-R4NPJ-EKNRK
N0Z90-KJTTW-7TZO4-I27A1

7:59 AM

See The Reasons Why the Tablet Phone Won’t Die in Market

To those who own tablets, the decline of the device sounds like a proper reason to panic. For those who don’t, it’s perhaps something they’ve been expecting for awhile. Despite the many things one can do with a tablet, it just seems that their surge in the consumer market was just a fad that will never catch up to the smartphone’s sales figures. But after all that has been said and done, there really is no reason to think that the tablet will ever die. Let’s outline some of the most obvious reasons.
First and foremost, the tablet will – at worst – become a niche device. It’s likely, however, that it will still remain mainstream for a very long time for one simple reason. The fact that there’s a bigger screen may turn off some people who are looking for a device that fits in their pockets, but to others this is a selling point. There’s also the fact that regardless of how powerful smartphones become, tablets will always be one step ahead simply because of the fact that you can fit more hardware in the amount of space provided by one.
All of these things make you more likely to read a book, browse the web, participate in video conferencing, and play a game from of a tablet rather than from your phone. As long as you don’t mind having a device that won’t fit in your pocket, you’re likely going to prefer a tablet to a smartphone. And there are many people who feel this way.
The argument for utility alone should convince anyone that tablets are here to stay. So, why are their sales declining?
Analysts in the technology sector often overlook the fact that every new device that experiences what we would call “success” in the market has a small explosion in sales, followed by steady increases, and then a slight downward curve when new devices are no longer in such high demand. I guarantee that if tablet manufacturers introduced something revolutionary we would see the embers rekindle as if we were back in 2010. Tablets aren’t selling for the same reason people don’t buy new personal computers and laptops every year.
With smartphones we also have to take into account the offers that carriers make. Purchasing a phone as part of your new contract provides the incentive to upgrade frequently. If the smartphone market relied purely on sales outside of the carrier’s reach, sales would probably follow the same downward trend.
Workplaces have recently been adopting various technologies to help them keep in touch with their workers on the field. Fleet management, video conferencing, and task management all depend on software that runs on mobile devices or desktops. Since it would be inconvenient to ask someone to bring their desktop PC or laptop outside of the office, the tablet has become the go-to device for communication in this situation. According to a report by Forrester Research, about a third of companies are now providing tablets to their workers to facilitate the process of their duties.
Even through sales are declining, the amount of people with tablets out there amounts to about one-tenth of the world population. The device is slowly becoming a business-worthy item and may eventually evolve as time goes by to fit various niches in the market. I don’t doubt for a second that we will be continue to see tablets for years to come governing the way we do business and communicate.
Do you have a tablet? How is it most useful for you? Tell us in a comment!

7:57 AM

How to Check If Your Windows 10 Is Activated or Not

Windows 10 has been out for a little over a week now, and a good portion of Windows users have already utilized their free Windows 10 upgrade. As soon as you upgrade your system,Microsoft automatically activates your Windows 10 copy in the background, assuming that you’ve upgraded from genuine Windows 7 or 8 versions.
Since the Windows system doesn’t display any “Successfully Activated” type of messages, there will be a bit of confusion whether the installed or upgraded version of Windows is activated or not. The confusion is particularly true if you’ve reinstalled Windows 10.
So, if you ever need to, here is how you can check to see if your Windows 10 system is activated or not through different methods.
One of the easiest ways to check the Windows 10 activation status is to look at the System applet window. To do that simply press the keyboard shortcut “Win + X” and select the “System” option. Alternatively, you can also search for “System” in the Start menu.
Once the System window has been opened, scroll down and you will find the wording “Windows is activated” under the Windows Activation section if your system is activated.
This window even displays the option to change the product key if you ever need it, like when you are upgrading from one edition to the other.
Other than using the regular Windows System applet to check the activation status, you can also use the Modern control panel. This is particularly useful if you are using Windows 10 in tablet mode.
To start, click on the Notifications icon on the bottom right corner of the taskbar and select the “All Settings” option.
The above action will open the Settings panel. Here, select the “Update and Security” option.
In the “Update and Security” window, navigate to the Activation tab and you will find your Windows activation status in the right pane. If your Windows is activated, you will see the “Windows is activated” message next to “Activation.”
Just like in the System applet, the window also hosts the “Change product key” button if you need it.
You can also use the regular old Command Prompt to check your Windows Activation status. To do that press “Win + R,” type cmd and press the Enter button to open the Command Prompt. Alternatively, you can also use the power user menu (Win + X).
Once the Command Prompt window has been open, enter the below command and press the Enter button.
slmgr /xpr
As soon as you press the Enter button, Windows will display a new window showing the activation status. Since I’m using Home edition on my laptop, it is displayed as the Core edition. If you are using the Pro version, then the change will be reflected in the window.
It is that simple to check your Windows system activation status using different methods.
Do comment below sharing your thoughts and experiences after using the above methods to check whether your Windows system is activated or not.

Saturday, August 8, 2015

10:15 AM

5 Best WordPress Plugins to Backup Your Blog

Last year, i posted on How to Backup WordPress Site to Dropbox Automatically, If you own a WordPress-powered website, or any website for that matter, it’s extremely important for you to make regular backups so that you don’t have to lose everything if your website or hosting company gets hacked.
Some hosting services claim to provide regular backups, but most of them are unreliable. Besides, it never hurts to have an alternative solution. If you own a WordPress website, you’re in luck as there are plenty of custom backup solutions available.
Here are five of the best of them:

VaultPress is a subscription-based full backup service developed by the same folks behind WordPress: Matt Mullenweg (WordPress co-founder) and his team at Automattic.
Starting at $5 per month, you can get backups of your website once a day for a 30-day period. The basic plan ($15/month) offers real-time backups which roughly amounts to a full backup every hour. It keeps your backups for as long as you use the service.
Backups are stored on the same servers that power the WordPress.com website, so you can be assured of their reliability. Restoring your backup is just a click away. You can restore a backup from any time or choose to download it to your computer as a zip file.
Price: Starting from $5 per month.
BackupBuddy is a premium developed by iThemes that offers a complete backup solution for WordPress websites.
It allows you to choose between a full backup of a database-only backup and sending it to various locations such as Amazon S3, DropBox, FTP, GoogleDrive or its own custom storage location called BackupBuddy Stash.
You can easily automate your backups and restore files from any time. A couple of its other features are email notifications, malware scan, database mass text replacement, and individual file restore.
Price: $80 (per year) for the lowest package.
UpDraftPlus is a completely free WordPress backup solution that simplifies backups and restoration.
With over 500,000 installations and a massive 4.9/5 rating on the WordPress repository, it’s one you should definitely try if you’re looking for a free solution.
Like BackupBuddy, it supports backups to different locations such as GoogleDrive, RackSpace Cloud, Amazon S3, Copy and several others. You can select which files to back up, decide to split your backups if they are very large or schedule automatic backups.
Its premium version includes added features such as site migration, database encryption, no adverts, and support from the developers.
Price: Free (Premium version between $70 and $145 per year)
BackWPUp is another backup solution available for free on the WordPress repository.
It allows you to make your backups in several formats such as zip, tar, tar.gz or tar.bz2 and to push your backups to several storage locations. You can also recieve backups and logs via email.
Other features include database backup, database optimization, WordPress XML export and multi-site support. It also has a premium version with added features and support.
Price: Free (Premium from $75 per year)
BackupWordpress is a highly-rated simple backup plugin with only the most basic backup features.
It allows you to back up your entire website including your database on a schedule that suits you. It works on Linux or Windows servers and allows you to choose which files to back up and which ones to exclude.
It’s completely free, so don’t hesitate to try it. A 4.7/5 rating and over 200,000 downloads are a testament to it’s viability as a good backup solution.
Price: Free
Have you tried any of the backup plugins? Share your experience in the comments section below.
Image credit: Backup

Monday, July 20, 2015

2:46 AM

Three Good Ways To Educate Yourself Right Now About Internet Censorship

The idea that someone else can decide what you can or can’t access on the Internet is abhorring. Yet, this is the reality in many countries around the world.
The Internet isn’t free.
Governments, institutions and even individuals have arbitrarily assigned themselves the responsibility of deciding what is or isn’t good for your eyes and ears. To play your part in protecting Internet freedom, you must educate yourself about Internet censorship.
The information below is also valuable if you plan to travel to a foreign country. Take time to learn about the censorship policies of the destination country to avoid nasty surprises.
This article examines three of the best online resources where you can learn about Internet censorship.
The OpenNet initiative or ONI is a partnership of three institutions, the Ottawa-based SecDev Group, the Citizen Lab at the Munk School of Global Affairs at the University of Toronto and the Berkman Center for Internet & Society at Harvard University. ONI investigates, analyzes and exposes censorship in a non-partisan approach. They report on censorship using a number of methods as follows:

Access Books

ONI and MIT Press have published the Access series of books documenting trends and patterns shaping information controls around the world for over a decade. The following three books are available for purchase on Amazon.com:
  1. Access Denied: The practice and policy of global Internet filtering (2008)
  2. Access Controlled: The shaping of power, rights, and rule in cyberspace (2010)
  3. Access Contested: Security, identity, and resistance in Asian cyberspace (2011)

Country Profiling

ONI also publishes brief reports on its findings and conclusions regarding the censorship situation in different countries around the globe. These summaries include background information, factors influencing the country’s decision to filter and the results of empirical testing for filtering. The profiles also look at the impact, relevance, and efficacy of Internet censorship in the country in question. Each country gets a score on a five-point scale that reflects the level of filtering in four themes: political, social, conflict/security and Internet tools. The level of filtering in each of the four themes is classified as: pervasive, substantial, selective, suspected or no evidence. Reports are downloadable as PDFs.

Regional Reviews

Regional reviews provide broad summaries for eight regions:  Asia, Australia and New Zealand, Commonwealth of Independent States, Europe, Latin America, Middle East and North Africa, Nordic Countries, Sub-Saharan Africa, United States and Canada. The reviews offer a general picture of the state of Internet censorship in these regions. The reports are also available as downloadable PDFs.

Global Summaries

This is a summary of global censorship data. It is available as a downloadable CSV file under a Creative Commons license. The reports give a general overview of recent ONI reports in 74 countries in the four content themes mentioned earlier. ONi also publishes regular articles and reports on larger section projects carried out by the organisation. Articles include bulletins and advisories on notable events related to Internet censorship. ONI also has an interactive map that depicts the countries and regions where censorship is most prevalent across the four content themes as well as annual collection of the top instances of Internet censorship and other nefarious activities by governments and regulatory bodies across the globe.
reporters-without-borders
reporters-without-borders
Based in France, Reporters Without Borders or Reporters Sans Frontières (RSF) was founded in 1985 by four journalists. The organization initially worked to promote alternative journalism but soon gravitated towards advocating for greater press freedoms. Today, RWB is focused on two spheres of activity; Internet censorship and the new media and assisting journalists working in dangerous areas.
RWB publishes Enemies of the Internet, an important resource that educates the public about Internet censorship in the world.
This list was first published in 2006. Countries are classified as enemies of the Internet if they display a capacity to censor news and information online and systematically repress Internet users. The following countries have consistently made enemies of the Internet list: Vietnam, Uzbekistan,Turkmenistan, Syria, Saudi Arabia, North Korea, Iran, Cuba, China, Burma, Belarus and Bahrain.
freedom-house freedom-house
Freedom House is an independent watchdog organization that carries out research and advocacy on human rights, political freedom and democracy. One of their reports is known as Freedom on the Net which assesses the degree of internet and digital media freedom around the world.
The first edition was in 2009, and it has now become one of the leading authorities on the subject of Internet freedoms and censorship.
The report features an interactive map that allows you to see the current status of a country at a glance. Each country report includes a detailed narrative and numerical score created by Freedom House. The scoring methodology uses a three-pillared approach to capture the level of Internet freedom: obstacles to access, limits on content and violation of user rights.
For all of the three resources above, it is clear that the number of countries that limit access to the Internet are, surprisingly, increasing rather than decreasing. The reasons being forward mainly have to do with national security, protection of intellectual property rights, preserving cultural norms and protecting minors from inappropriate content.
But, upon closer examination, it is clear that filtering and censorship has more to do with taking away a platform where people can freely express themselves to the world, silencing government critics and cracking down on political opponents.
These resources give you a broad view of where censorship is taking place and how it is carried out. You can take appropriate measures to avoid such regions, bypass Internet censorship or support causes that advocate for a freer Internet.
Do you know of any other ways to learn about Internet censorship? Please share your insights with us in the comments below.
Image credit: Jeffrey Ogden via Wikimedia Commons
2:38 AM

You Can Monitor Your Windows Registry Changes with Regshot Easily

Long ago, all the system and application configurations were stored in their respective directories, but this method was so clumsy. To solve this, Microsoft introduced Windows registry which virtually hosts all the settings and configurations. In fact, Windows registry is much like a database for all the configurations and settings. Since all the settings reside in one place, Windows registry is where you can do all kinds of advanced stuff like changing operating system configurations, hardware device settings, software settings, etc.
Moreover, every little change you make in your system, such as installing software or changing the wallpaper, is reflected and can be tracked in the Windows registry. Sometimes, tracking those changes will help you in debugging the problem from the root. So if you ever want to track the changes made to the Windows registry, here is a great tool to monitor those changes.
Regshot is a simple open source utility which is capable of taking snapshots of the Windows registry as needed and can compare them to find any alterations that happened while changes were made in the system. The changes include any new keys or values created, deleted and modified. You can download Regshot from its official Sourceforge.net website. Since it is a portable application, you can use it without any installation whatsoever.
1. Once you have downloaded the application, extract the contents onto your desktop using 7-zip or another equivalent tool. Now depending on your system architecture (32-bit or 64-bit), open up the relevant executable file. Don’t worry with the ANSI or Unicode stuff; just open the one you prefer.



2. As you can see, the user interface is mostly straight forward. If you need to, the first thing you can do is change the output directory. By default, the output directory is set to the “temp” folder located under “Appdata.” Once you are done setting up the output directory, you need to take an initial snapshot of the current Windows registry. To do that, click on the button “1st shot” and select the option “shot.”
regshot-first-snapshot
3. Once you have done that, Regshot will scan the entire registry and will create a snapshot of the current state. If you look closely at the bottom of the Regshot window, you will notice that it displays overall data like the keys, values and time taken to execute the script. Don’t close the Regshot application yet.
regshot-changed-values
4. Now proceed with the changes you want to make to the system before taking a second snapshot. For instance, I’m installing FileZilla FTP client.
regshot-software-installation
5. Once you are done making the changes, navigate to the Regshot window and take a second snapshot by clicking on the “2nd shot” button and selecting the option “shot.”
regshot-second-snapshot
6. Regshot again displays the overall modified data at the bottom of the window. Now to track the changes, simply click on the “Compare” button.
regshot-compare
7. The above action will display all the results in the notepad detailing all the keys and values that are added, modified and deleted. In my case, the comparison of the two snapshots revealed that there is a total of 54053 changes made to the Windows registry. But do note that not all of them are because of the installation of software; most of the changes reflect the new installation and can be tracked down to the very last key.
regshot-changed-values-notepad
That’s all there is to do, and it is that simple to use Regshot to monitor and track registry changes in Windows. Regshot is a simple yet powerful utility with a no-nonsense working style, and if used correctly, it makes your life easier tracking and debugging problems with Windows or other software.
Hopefully that helps, and do comment below to share your thoughts on this free and open-source application.


2:35 AM

How To Bypass Windows XP, Vista, 7, 8, 8.1 Password Login Screen?

In this tutorial, I will teach you how to bypass the Windows Password Login Screen using KON-Boot.It helps in bypassing the default windows password protection and upon reboot, it leaves no trace. The password isn’t changed nor any system settings, it will be just bypass the login screen and deletes all the its temporary files after reboot. At the end of
this tutorial, you will be able to log into password protected Windows OS ( Tested on: Windows XP, Windows 7, Windows 8, Windows 8.1).


What is KON Boot?

Kon-Boot is an application that modifies the contents of the Windows kernel on the fly / at boot time, bypassing the authorization system and allowing Windows to enter a password- protected user account without a password. Whatever is your favorite password, it is not overwritten when you restart Windows and the original contents of the nucleus and its authorization procedure restored. Kon-Boot
boot from floppy / cd / usb, runs in a quiet mode automatically Requirements
The following will be required to successfully execute this hack.
1.

DOWNLOAD KON-Boot v2.4

– You can download it from here for free and then you will need to install it onto a Bootable USB.
2. USB Pendrive – You need to have a pendrive which is formatted to FAT32. Note: It is important that is formatted to FAT32 for this to work. For formatting, just right click on the USB drive and select “Format” and select “FAT32″ from the File System drop down list.

How to Install KON-Boot onto USB

1. First Extract the .zip file. Go to the folder “kon-bootUSB”.
2. Now, insert your USB drive into your computer. Make sure, no other USB drive is attached.
3. If you are using Windows 7 or higher,Right click on “usb_install_RUNASADMIN.bat” and click on “Run as Administrator”. We need to run this .bat file using administrator rights. Once you open this file, you will get a series of notifications, for which you will have to click on “Okay”. If you are using Windows XP or lower.Click on “USB_INSTALL_DIFF.vbs” and follow the instructions.
4. If there has been no problem, you will get the below confirmation dialogue box.
kon-boot-confirmation
Now that we have successfully installed KON-Boot onto our computer, we can now move into our main step, that is, how to bypass your victim’s loging screen.

Bypassing Windows Password Protection

1. You will need to open the BIOS setup. For this, you will need to switch on their computer and as soon as it turns on, you will get a series of options at the lower screen. Click on the appropriate action to ” Enter BIOS Setup”.It depends entirely on which computer brand your victim uses. My Lenovo computer for instance, opens BIOS when I press “Fn+F10″. You can Google for more details.
2. Once you have entered the BIOS setup, you will have to find the ” Boot Options”. In those options you have to change the order of priority such that the first priority is given to “USB Drive” and then to your Hard Disk. Doing so, will let your computer boot through USB first, instead of the usual Windows
through your Hard Disk.
3. Additionally, if your computer has EFI support, please ” Disable EFI” in the BIOS settings. It will be near the BIOS settings.
4. After the above changes have been made to the BIOS, you save it and exit. Let the computer restart. You will get 2 options where you click on ” KON-Boot (Current Version)” for Windows 7 and higher versions and “KON- Boot (Old Version)” for Windows XP and
lower.
5. It might take some time initially to boot the first time, you will also be displayed the KON- Boot logo.That is completely normal. After which the default Windows OS will load.
6. That’s it! Now when the Login screen appears, DO NOT type anything for the password, just click the login button and you would have logged on without any problem!

If you are haveing any problem, do check out all the steps above and comment for any other queries!

Saturday, July 18, 2015

6:41 AM

How to Flash Nokia PHONES using JAF

Now I’m here to explain How to flashing Nokia 5800 using JAF with latest version 21.01.101. Flashing process can be done in three simple stages
Download Required stuff
Download all software’s mentioned below and Install them (Works only on Windows)
. NOKIA SUITE”
. Navifirm (To Download original firmwares)
JAF (A software which performs Flashing )
. OGM_JAF_PKEY_Emulator_v 5 (used to start JAF)
. JAF_ NOKI4MODELS.INI (This file included all Nokia Models)
.
Downloading Required Firmware
Before Downloading your phones firmware, check your current firmware version and Phone’s RM. This can be checked by dialing *#0000# from normal dialing pad
Now open Navifirm and wait until data loads. Now select your Phones model in products tab including RM and select firmware version you need to flash your mobile. (In this case Nokia 5800)
Download all files to C:Program Files/Nokia/Phoenix/Products/RM-XXX
Replace XXX with your phones RM. In my case my phone RM is 356 so, i created C:Program Files/Nokia/Phoenix/Products/RM-356. If this directory does not exists in your computer, create it manually
4. Be careful while selecting firmwares version. Always select higher version firmware. Flashing with lower versions may brick/damage your phone
NAV
So, Lets Flash your Mobile
Before flashing your phone, Backup important data like contacts, Messages etc
Replace/overwrite JAF_ NOKI4MODELS.INI file in C:Program Files/ODEON/JAF
Open OGM_JAF_PKEY_Emulator_v 5.exe and tick Random PKEY Raskal SN, JAF (main) and click GO. Wait for few seconds and an error popups notifying “BOX DRIVER NOT INSTALLED”, ignore it and click ok, JAF will startup automatically
JAF
When JAF starts navigate to BBS tab and tick Manual Flash, Normal flash, Dead USB and untick CRT 308. At last click use ini and wait for few seconds. Entire Nokia phone models would open in new window and select your phone exactly including RM (Most Important Step)
If everything goes fine MUC, PPM, CNT, APE Variant buttons turns green
Now, switch-off your mobile and connect to computer using Data cable
Click Flash, Ignore warning and click Yes
Flashing process would starts and shows a message PRESS POWER ON NOW. Now, press and hold Power button for just for one second
JAF 2
That’s it, take a cup of coffee and your computer do the remaining process.
Optional Steps
After flashing Nokia mobile 5800 or any other, Remove the phone’s battery and replace it again
Reset your mobile by dialing *#7370# to remove any bugs (if present)
Precautions
Never flash any mobile with lower version software
Charge your phone battery completely (at least up to 50%)
Never disconnect the mobile from computer while Flashing
DO THIS AT UR OWN RISK, POWERED BY HOPE TECHNOLOGY!
6:40 AM

HOW TO FORMAT OR WIPE YOUR BLACKBERRY EASILY

Is yur Blackberry Giving u Problems?
How to Format or Wipe Your Blackberry!
Before you sell, donate or throw
away your
BlackBerry phone, it’s important
to ensure that all
of your data is wiped from the
phone. This wipe is called a “format”
and occurs when
you erase all of the personal
data on the phone via
the BlackBerry operating system
on the phone itself. You may also want to
perform a format on
your phone if it is not working
properly or you
want to install an updated
software package to the phone.
SIX SIMPLE STEPS TO GET IT
DONE

1. Turn on your BlackBerry.
2. Open the “Options” menu.
3. Select the “Security Options” menu.
4. Select the “General Settings”
option.
5. Select “Wipe Handheld.”
6. Type “blackberry” when you
are prompted to confirm the wipe.
Enjoy!
Share and Tweet This to all Your Friends!

Monday, July 13, 2015

11:34 AM

Tip on How to Set a Master Password in Firefox


Mozilla Firefox allows you to save the login details, such as username and password, for the websites that you visit on your computer. So the next time you visit that particular website, the login details automatically get filled in. That way, you don’t have to remember the login credentials for each of the websites you have registered yourself on.
While that is a really nice feature, it has a drawback: your confidential data is not secure. Any user who accesses your computer can see your stored logins and then get access to your website accounts without your permission. This usually happens when you share your computer with others.
Well, Mozilla knew that things like this would happen in the future, so they have a feature in place called Master Password. What this Master Password does is prompt the user to enter a password before he or she can access the saved password. Once you have set this up in your browser, all the users who want to access the stored logins in your browser will be required to enter this password. They will not be able to see any of your logins if they fail to enter the password.
Note: This guide is done on a Mac version of Firefox. The steps may be slightly different for other operating systems.
1. Launch Mozilla Firefox on your computer.
2. Click on “Firefox” in the top-left corner followed by “Preferences….” You will be taken to the Settings panel where you can modify the settings for your browser.



3. You should land on the General settings panel. The option for setting up a master password is located in the “Security” panel. So click on it and you will be taken there.
firefoxpassword-general
4. Once you are on the Security panel, you should see an option saying “Use a master password.” Click on it and it will be enabled.
firefoxpassword-security
As soon as you click the button in the above step, you should see a dialog that prompts you to enter a password. This is the master password that users will be required to enter before they can see your login details. Make sure you enter a really strong password, as it will lead to passwords for all of your website accounts saved in your browser.
5. When you have entered a password, click on “OK” to save the changes.
firefoxpassword-password
Once a password has been set up, you should see a confirmation message that looks like the below image. It means everything went well and you have successfully configured your browser with a master password.
firefoxpassword-success
You are done.
If you wish to confirm that the master password really works, you can click the “Firefox” menu followed by “Preferences….” Then, click the Security panel followed by “Saved Passwords….”
firefoxpassword-confirm
You will be asked to enter the password you chose in the above guide before you can view your stored logins. It worked!
If you happen to share your computer with others and just don’t want them to be able to see what website logins you have saved in your browser, the above guide should help you set a master password that acts as a blocking gate to prevent access to your login credentials.
Happy sharing (of your computer and not your logins)!
11:18 AM

You can Now Access WhatsApp on Opera & Firefox on PC!

When WhatsApp launched a desktop version of its messaging service last month, it worked only with Google Chrome. But that’s not the case anymore, as the company has announced that the client is now also compatible with Firefox and Opera.




Read Our Recent Post on: How to Access WhatsApp on Your Chrome Browser Using Pc
The sign up process remains the same, which means Firefox and Opera users will also have to scan a QR code from within WhatsApp on their handset, something which can be done through a new Menu option, labeled WhatsApp Web.

Screenshot

whatsapp on pc
A point worth mentioning is that the aforementioned option is going to be available to you if you use the app on Android, BlackBerry, Windows Phone, or Nokia’s old S60 OS, which means that iOS users are currently out of luck.

Conclusion

Just vist web.whatsapp.com on your PC to connect your devices or Click here to read more about how to connect your WhatsApp on PC. Drop your Comments Here!!!!!

Saturday, July 4, 2015

6:30 PM

Hopetechlink Explains: The Uses of the “Published by” Entry on Software Installers


Installing software on most modern operating systems has become so easy that you could probably do it in your sleep. As a result, many people fly through the install process and overlook elements of the process.
Sign-Installer-DetailsUAC
The window that appears, prompting you to run the installer, is one of these easily-overlooked aspects. At a glance it contains nothing you’re not already aware of – but it might. One single line of text makes the window worth a second look, and it’s the “signature.”
Installers aren’t signed in the traditional sense like a legal document, but some are signed in their own way. If you’ve ever seen this before and wondered, or if you haven’t taken much notice until now, then we’ll explain just what’s going on.
Microsoft reckons that signing software installers can highlight programs that have been tampered with. If they are signed, then it is clear where they came from, and any issues can be brought to bear on the developers, if necessary.
Sign-Installer-Unknown
Peace of mind can also be considered a reason, as many users are going to be more comfortable installing software from a recognisable company or developer. The Mozilla Firefox web browser is signed off by the Mozilla Corporation, which makes sense and provides a degree of legitimacy “Unknown” does not.
Sign-Installer-Details
Microsoft’s tool for signing software installers, the imaginatively named “SignTool.exe,” works with a large variety of files, including .exe and .msi installers. If you are unsure of the differences in these two installer formats, we covered these in a recent article.
SignTool.exe does work as a standalone piece of software, but Microsoft’s own website demonstrates using it with a Visual Studio command prompt and a pre-existing signing certificate. The certificate is not generated through another Visual Studio command, requiring further steps.
Sign-Certificate-Suppliers
If you are not using Visual Basic, you still need a code signing certificate alongside Microsoft’s SignTool.exe. Companies shown on this Microsoft-maintained list provide certificates in either standard or Extended Validation (EV) formats, which can be used in conjunction with a Microsoft Dev Centre account. Certain actions require an EV certificate, though the majority can be performed with a standard certificate.
A standard certificate requires shorter processing times and as a result costs less to procure. The level of identity validation is not as high as that of an EV certificate, and it does not support LSA or UEFI code signing as stated by Microsoft.
Sign-Installer-Mozilla
After deciding on a certificate type, the company requires some of your information, such as a photographic ID and documents bearing your name. Certificates are not given out freely, and applications from a company may need bank account statements or other paperwork that is not usually publicly available.
Having received the certificate, developers can begin to sign installers, lending their products an air of greater legitimacy.
Sign-Installer-MoreDetails
As you have seen, there are quite a few more steps to gaining this single line of text than meets the eye. Many programs are still distributed without their code being signed in this manner without endangering your PC, and there is no reason to suspect something amiss with programs lacking a certificate.
Knowing the purpose of publisher names on software warnings is not a bad thing; people should be encouraged to be more aware of what they are choosing to install on their computers. If something seems off, it pays to be that much more cautious.