Thursday 31 July 2014

iPhone tips you'll wish you knew all along

iPhone tips you'll wish you knew all along


 Picture Courtesy trbimg.com

Close three apps at once


Need to force-close multiple apps fast? At the risk of looking like you're clawing at your phone, you can close up to three apps at once by swiping up with three fingers.

Quickly shut off the flashlight


Included in iOS's Control Center is access to a flashlight. Once enabled, you can quickly shut it off by using the camera shortcut from the lock screen.

Hidden bubble level


Leave your lime-green bubble level in the drawer. iOS's built-in leveling tool uses the phone's gyroscope to help you find out if an object is perfectly horizontal (or vertical).
To access it, launch the compass, then swipe right to reveal the level.

Use bold, italics, and underlining


In some apps like Mail, you can use rich formatting to make text bold, italics, or underlined. But if you don't know it exists, you might miss it.
Just highlight the text you want to edit, and tap the arrow in the copy/paste pop-up. Then, choose "U" to access the formatting options.

Quickly 'go back'


Unlike Android, the iPhone doesn't have a dedicated "back" button. But, a little-known gesture makes that completely acceptable.
In Messages, Mail, and even Safari, simply swipe right from the edge of the screen to go to the previous window. The gesture even works in some third-party apps like Instagram.

10 earbud controls

The stock earbuds are full of hidden talents. With them, you can snap a photo, ignore calls, and more. There are 10 shortcuts in total, and they're all outlined right here.

Create custom vibration alerts


Want to know if your best friend is calling without ever looking at the phone? Buried in the contact settings, a fun option lets you create custom vibration patterns for your contacts.
To do it, go to Contacts, choose a contact, and tap Edit in the upper-right corner.
Then, scroll down and navigate to Vibration > Create New Vibration. In the interactive screen, tap and hold to create a pattern, using long presses for long vibration notes, and so on.

Lock focus and exposure


When the camera is active, tapping the screen sets the focus and exposure for that object. But, the moment the camera moves, these settings are lost.
To lock the focus and exposure, tap and hold until you see a yellow bar appear at the top of the screen, Even if you change your composition, the focus and exposure will be unaffected.

Be more frugal with data


If you're watching your data usage, it's a good idea to use a feature introduced in iOS 7: cellular data management.
With this tool, you can decide which apps get to use cellular data, and which apps can load only over Wi-Fi.
Head over to Settings > Cellular to disable cellular data usage for any installed apps.

Find out what the locals use


When you're traveling, it's a good idea to find out which apps the locals love most -- especially public transportation apps.
To see what locals are downloading, go to the App Store and tap Near Me at the bottom.

Search text messages

Here's another one you might only stumble upon. To find a specific text message, use the search bar at the top of the message interface.
Don't see it? Pull down to reveal it, or tap the top bar.

Long-press for more characters


Hidden beneath the unassuming characters of the iOS keyboard is a world of letters and symbols only available with a long-press.
For example long-pressing the dash key reveals em and en dashes, while long-pressing the numeral 0 lets you insert a degree symbol.

Charge your phone much faster


Sometimes you need to charge your phone fast. The fastest way to do that? Airplane mode.

With all sending and receiving of data cut off, your phone will charge much faster. Just be sure to leave the backlight off, too.

Shoot in burst mode


Thanks to the iPhone 5S's fast processor, the camera now lets you shoot in burst mode, snapping multiple photos per second.
It's great for capturing sports, kids, and special moments you want every bit of.

Increase battery life


Spotlight is really useful for quickly surfacing data on your phone. In order to do that, however, the tool needs to constantly survey your phone for new data and index it.
To temper the effects on your battery, go to Settings > General >Spotlight and uncheck the items you don't necessarily need indexed.

8 Jobs That Can Make You Happy AND Rich

Most people believe "a happy career" and "a fat paycheck" are mutually exclusive, but online jobs community CareerBliss.com recently found these two things sometimes do go hand in hand.  
CareerBliss compiled its new list of jobs that can make you happy and rich by analyzing more than 50,000 independent company reviews from 2013 and 2014.
The reviews are from employees all over the U.S. who evaluated 10 factors that affect work happiness on a five-point scale:  one's relationship with one's boss and coworkers; workplace environment; job resources; compensation; growth opportunities; company culture; company reputation; daily tasks; and job control over the work performed on a daily basis.
CareerBliss combined those numbers to find an average rating of overall happiness for each respondent and sorted the results by job title and salary to determine which jobs pay well and make professionals the happiest.
The No. 1 job on the list is chief technology officer. People in this position gave the profession a "bliss score" of 3.4 out of 5. They earn  $117,000 a year, on average, more than double the national average salary of  $46,440. 
"We find that people often settle for just a job, when there are many careers out there that take extra effort but pay off with huge dividends," says   Heidi Golledge, CEO and cofounder of CareerBliss.  "If you look for the opportunity to build something great while learning and earning a piece of the action, your career and bank account will thank you for it."
Here are the happiest high-paying jobs in 2014:

Tuesday 8 July 2014

Xolo A500 Camera problem ( Solved )

Dear Friends,

Today i am going to Explain how to solve the camera problem in Xolo A500  Camera Problem.with simple settings,

Few days back i am searching for a smart phone below Rs : 6000 /- ,i find the Xolo A500 Club,
i have look forwarded for user reviews in online stores,

All are given rating **** ( 4/5 ),but only reason camera black screen & low flash light,

I am using the same Mobiles from last one week,on earlier of purchase i also feel the same as other users,finally while i am doing R&D on camera,i am surprised that with  small settings problem has been solved,

XOLO A500 Series ( CLUB )


image : ndtv.in

First we look the Phone Specifications,

  • 5MP primary camera with LED flash and 0.3MP front facing camera
  • 4-inch WVGA capacitive touchscreen with 480 x 800 pixels resolution and 16M color support
  • Android v4.2 Jelly Bean operating system with 1.3GHz MTK 6572 dual core processor, 512MB RAM, 4GB internal memory expandable up to 32GB and dual SIM (GSM+GSM)
  • 1400mAH battery providing talk-time up to 15 hours on 2G, 8 hours on 3G networks, standby time up to 466 hours on 2G and 400 hours on 3G networks
  • 1 year manufacturer warranty for device and 6 months manufacturer warranty for in-box accessories including batteries from the date of purchase,

You can Purchase at Leading Online stores : Flipkart.com / amazon.in / snapdeal.com


Steps to follow : 

  1. Open ' Camera '  Select ' Options '  
  2. Select " Professional Mode'
  3. Face Detection = ' On'
  4. Capture Mode = " Normal "
  5. Scene Mode = ' Auto '
  6. white Balance = 'Day Light'
  7. Select ' Camera Settings ' 
  8. store Location = ' OFF'
  9. Select ' Done '
  10. Capture the photo with Camera You fell the difference,
If Content is helpful Share it,

Give your valuable suggestions,

Thank you for visiting my blog,click on subscribe for latest updates,











Monday 7 July 2014

protecting Facebook profile from hackers

 

Hi friends,

Today i am going to explain how to protect our social networking profiles from Hackers,

Now a Days hacking is a simple thing even non technical persons are hacking social networking profiles & also help of some online hacking portals,they work done easily,

Todays Vision,

How to Protect Yourself ( Simple steps )
  • Don't click on links through email. If an email tells you to login to Facebook through a link, be wary. First check the URL (Here's a great guide on what to look out for). If you're still doubtful, go directly to the main website and login the way you usually do.
  • Phishing isn't only done through email. It can be any link on any website / chat room / text message / etc. Even ads that pop up can be malicious. Don't click on any sketchy looking links that ask for your information.
  • Use anti-virus & web security software, like Norton or McAfee.  
  • See below more Facebook Privacy Settings                                                                                                                                                                                                                                   

 Stealing Cookies

Cookies allow a website to store information on a user's hard drive and later retrieve it. These cookies contain important information used to track a session that a hacker can sniff out and steal if they are on the same Wi-Fi network as the victim. They don't actually get the login passwords, but they can still access the victim's account by cloning the cookies, tricking Facebook into thinking the hacker's browser is already authenticated.

Firesheep is a Firefox add-on that sniffs web traffic on an open Wi-Fi connection. It collects the cookies and stores them in a tab on the side of the browser.
From there, the hacker can click on the saved cookies and access the victim's account, as long as the victim is still logged in. Once the victim logs out, it is impossible for the hacker to access the account.




How to Protect Yourself
  • On Facebook, go to your Account Settings and check under Security. Make sure Secure Browsing is enabled. Firesheep can't sniff out cookies over encrypted connections like HTTPS, so try to steer away from HTTP.
  • Full time SSL. Use Firefox add-ons such as HTTPS-Everywhere or Force-TLS.
  • Log off a website when you're done. Firesheep can't stay logged in to your account if you log off.
  • Use only trustworthy Wi-Fi networks. A hacker can be sitting across from you at Starbucks and looking through your email without you knowing it.
  • Use a VPN. These protect against any sidejacking from the same WiFi network, no matter what website you're on as all your network traffic will be encrypted all the way to your VPN provider.

Protecting Yourself: Less Is More

Social networking websites are great ways to stay connected with old friends and meet new people. Creating an event, sending a birthday greeting and telling your parents you love them are all a couple of clicks away.
Facebook isn't something you need to steer away from, but you do need to be aware of your surroundings and make smart decisions about what you put up on your profile. The less information you give out on Facebook for everyone to see, the more difficult you make it for hackers.

If your Facebook account ever gets hacked, check out our guide on getting your hacked Facebook account back for information on restoring your account.

Bonus: If you're interested in who's checking you out, there are some ways you can (kind of) track who's viewed your Facebook profile.



Saturday 5 July 2014

Simple Ways to Crack the facebook Password & How to protect our profile from Hackers


Simple Ways to Crack the facebook Password & How to protect our profile from Hackers

Now a days everyone have a account in social networking site like Facebook,twitter Etc.,

but they don't know how to protect our profiles from hackers, in the current situation hacking a profile is made easy, some websites are providing the online hacking services at free of cost just by completing small surveys & software downloads,

Today I am going to explain how our profiles are hacking by a hackers easily,what is the steps should follow to protect our Social network Profiles from unknown peoples,

Despite the security concerns that have plagued Facebook for years, most people are sticking around and new members keep on joining. This has led Facebook to break records numbers with over one billion monthly active users as of October 2012—and around 600 million active daily users.

We share our lives on Facebook. We share our birthdays and our anniversaries. We share our vacation plans and locations. We share the births of our sons and the deaths of our fathers. We share our most cherished moments and our most painful thoughts. We divulge every aspect of our lives. We even clamor to see the latest versions even before they're ready for primetime.
But we sometimes forget who's watching.

We use Facebook as a tool to connect, but there are those people who use that connectivity for malicious purposes. We reveal what others can use against us. They know when we're not home and for how long we're gone. They know the answers to our security questions. People can practically steal our identities—and that's just with the visible information we purposely give away through our public Facebook profile.


The scariest part is that as we get more comfortable with advances in technology, we actually become more susceptible to hacking. As if we haven't already done enough to aid hackers in their quest for our data by sharing publicly, those in the know can get into our emails and Facebook accounts to steal every other part of our lives that we intended to keep away from prying eyes.
In fact, you don't even have to be a professional hacker to get into someone's Facebook account.
It can be as easy as running Firesheep on your computer for a few minutes. In fact, Facebook actually allows people to get into someone else's Facebook account without knowing their password. All you have to do is choose three friends to send a code to. You type in the three codes, and voilà—you're into the account. It's as easy as that.
In this article I'll show you these, and a couple other ways that hackers (and even regular folks) can hack into someone's Facebook account. But don't worry, I'll also show you how to prevent it from happening to you.





Method 1: Reset the Password

The easiest way to "hack" into someone's Facebook is through resetting the password. This could be easier done by people who are friends with the person they're trying to hack.
  • The first step would be to get your friend's Facebook email login. If you don't already know it, try looking on their Facebook page in the Contact Info section.
  • Next, click on Forgotten your password? and type in the victim's email. Their account should come up. Click This is my account.
  • It will ask if you would like to reset the password via the victim's emails. This doesn't help, so press No longer have access to these?
  • It will now ask How can we reach you? Type in an email that you have that also isn't linked to any other Facebook account.
  • It will now ask you a question. If you're close friends with the victim, that's great. If you don't know too much about them, make an educated guess. If you figure it out, you can change the password. Now you have to wait 24 hours to login to their account.
  • If you don't figure out the question, you can click on Recover your account with help from friends. This allows you to choose between three and five friends.
  • It will send them passwords, which you may ask them for, and then type into the next page. You can either create three to five fake Facebook accounts and add your friend (especially if they just add anyone), or you can choose three to five close friends of yours that would be willing to give you the password.

How to Protect Yourself

  • Use an email address specifically for your Facebook and don't put that email address on your profile.
  • When choosing a security question and answer, make it difficult. Make it so that no one can figure it out by simply going through your Facebook. No pet names, no anniversaries—not even third grade teacher's names. It's as easy as looking through a yearbook.
  • Learn about recovering your account from friends. You can select the three friends you want the password sent to. That way you can protect yourself from a friend and other mutual friends ganging up on you to get into your account.

Method 2: Use a Keylogger

Software Keylogger
A software keylogger is a program that can record each stroke on the keyboard that the user makes, most often without their knowledge. The software has to be downloaded manually on the victim's computer. It will automatically start capturing keystrokes as soon as the computer is turned on and remain undetected in the background. The software can be programmed to send you a summary of all the keystrokes via email.
CNET has Free Keylogger, which as the title suggests, is free. If this isn't what you're looking for, you can search for other free keyloggers or pay for one.

Hardware Keylogger
These work the same way as the software keylogger, except that a USB drive with the software needs to be connected to the victim's computer. The USB drive will save a summary of the keystrokes, so it's as simple as plugging it to your own computer and extracting the data. You can look through Keelog for prices, but it's bit higher than buying the software since you have the buy the USB drive with the program already on it.

How to Protect Yourself

  • Use a firewall. Keyloggers usually send information through the internet, so a firewall will monitor your computer's online activity and sniff out anything suspicious.
  • Install a password manager. Keyloggers can't steal what you don't type. Password mangers automatically fill out important forms without you having to type anything in.
  • Update your software. Once a company knows of any exploits in their software, they work on an update. Stay behind and you could be susceptible.
  • Change passwords. If you still don't feel protected, you can change your password bi-weekly. It may seem drastic, but it renders any information a hacker stole useless.

Method 3: Phishing

This option is much more difficult than the rest, but it is also the most common method to hack someone's account. The most popular type of phishing involves creating a fake login page. The page can be sent via email to your victim and will look exactly like the Facebook login page. If the victim logs in, the information will be sent to you instead of to Facebook. This process is difficult because you will need to create a web hosting account and a fake login page.

The easiest way to do this would be to follow our guide on how to clone a website to make an exact copy of the facebook login page. Then you'll just need to tweak the submit form to copy / store / email the login details a victim enters. If you need help with the exact steps, there are detailed instructions available by Alex Long here on Null Byte. Users are very careful now with logging into Facebook through other links, though, and email phishing filters are getting better every day, so that only adds to this already difficult process. But, it's still possible, especially if you clone the entire Facebook website.

How to Protect Yourself

  • Don't click on links through email. If an email tells you to login to Facebook through a link, be wary. First check the URL (Here's a great guide on what to look out for). If you're still doubtful, go directly to the main website and login the way you usually do.
  • Phishing isn't only done through email. It can be any link on any website / chat room / text message / etc. Even ads that pop up can be malicious. Don't click on any sketchy looking links that ask for your information.
  • Use anti-virus & web security software, like Norton or McAfee.

Method 4: Stealing Cookies

Cookies allow a website to store information on a user's hard drive and later retrieve it. These cookies contain important information used to track a session that a hacker can sniff out and steal if they are on the same Wi-Fi network as the victim. They don't actually get the login passwords, but they can still access the victim's account by cloning the cookies, tricking Facebook into thinking the hacker's browser is already authenticated.
Image via chrislehusdurs.co.uk
Firesheep is a Firefox add-on that sniffs web traffic on an open Wi-Fi connection. It collects the cookies and stores them in a tab on the side of the browser.
From there, the hacker can click on the saved cookies and access the victim's account, as long as the victim is still logged in. Once the victim logs out, it is impossible for the hacker to access the account.

How to Protect Yourself

  • On Facebook, go to your Account Settings and check under Security. Make sure Secure Browsing is enabled. Firesheep can't sniff out cookies over encrypted connections like HTTPS, so try to steer away from HTTP.
  • Full time SSL. Use Firefox add-ons such as HTTPS-Everywhere or Force-TLS.
  • Log off a website when you're done. Firesheep can't stay logged in to your account if you log off.
  • Use only trustworthy Wi-Fi networks. A hacker can be sitting across from you at Starbucks and looking through your email without you knowing it.
  • Use a VPN. These protect against any sidejacking from the same WiFi network, no matter what website you're on as all your network traffic will be encrypted all the way to your VPN provider.

Protecting Yourself: Less Is More

Social networking websites are great ways to stay connected with old friends and meet new people. Creating an event, sending a birthday greeting and telling your parents you love them are all a couple of clicks away.
Facebook isn't something you need to steer away from, but you do need to be aware of your surroundings and make smart decisions about what you put up on your profile. The less information you give out on Facebook for everyone to see, the more difficult you make it for hackers.
If your Facebook account ever gets hacked, check out our guide on getting your hacked Facebook account back for information on restoring your account.
Bonus: If you're interested in who's checking you out, there are some ways you can (kindof) track who's viewed your Facebook profile.


Images by Digital Trends, Avitricks, eSecurity Planet, Phishing1122, Tech-Glide

 


Tuesday 1 July 2014

small hints to secure your smartphone

small hints to secure your smartphone








Now a days 8 out of 10 people using smartphones but some people don't know how to secure their smartphones,


From my knowledge i am providing the small hints i hope the content is helpful,


  • Set a lock code


From email to texts, phonebook entries, and pictures, your phone has lots of personal information that's potentially accessible to prying eyes. Bottom line: if you take your phone out of your house, you should definitely use a lock code. You can use a 4-digit PIN or an actual password with letters, numbers, and characters, This will help keep nosy people or thieves from easily accessing your information.

  • Enable 'Do Not Track' in your mobile Web browser



Any information you provide on a website is collected and likely used for serving you relevant advertisements. The Do Not Track option asks websites to refrain from collecting your data. The Google Chrome browser for Android and Safari on iOS will allow you to set up Do Not Track. While enabling this option does not guarantee that your data will not be collected, some websites will adhere to your preference.

  • Avoid answering spam calls


There are a lot of telemarketing services that will call your phone just to determine if the number actually reaches a person. Once that happens, your number is put on a list that is sold to other companies, and you'll receive even more spam calls and possibly texts. If you’re not on an unlimited plan, you may incur additional charges for text messages you didn’t want to receive in the first place.

Instead of picking up and confirming your number, use a caller ID solution to figure out who is trying to reach you. On Android, check out Current Caller ID by Whitepages, which will display caller information as small window on the incoming call screen. On iOS, you’ll have to use a slightly different approach: install Truecaller and take a screenshot of an incoming call for the app to identify the caller (the app creators say that currently there is no way to intercept the call process).

  • Add owner contact info to your device

If your device gets lost in the wild and some good samaritan finds it, how will they find you? For this reason, you should add enough contact information to the device that can be used to contact you. For instance, you don’t need to provide your whole name -- maybe just a first name and last initial-- and a phone number of a friend or relative that can get in touch with you about your lost device. Think of it like a pet tag for your Android or iPhone.

  • Stay physically secured

Despite all your efforts blocking access to your apps, number, or other information, you are still faced with the threat of someone physically stealing your device. To combat this keeping a firm grip, putting the device in a hard-to-access place (tight front pocket, deep pocket in bag), and refraining from advertising the fact that you have an amazing new device. Hopefully these tips will keep your phone from taking an unwanted excursion with a thief.

  • Use a recovery app to find a lost or stolen device

Panic strikes as you realize that your smartphone isn’t in your pocket. Where was I last?! When did I set the phone down? Did I drop it when I got out of my car? With the recovery apps on Android and iOS, you can lock down access to your device and even find its current GPS location.

  • Block your phone number when necessary


When you call a business that might collect your number, it’s a good idea to thwart its efforts. As many places will collect your number, any information attached to it, and then use it for profit.
If you don’t want to toggle number blocking on and off just for businesses, you might consider using Google Voice to call businesses. Then you can very easily block any incoming call that isn’t in your phone book.


Thanks for Visiting my Blog

Give Your Valuable suggestions about my blog & share if content helpful

Jobs in Apple



Apple is seeking candidates with a BS or MS in Computer Science or equivalent industry experience.

Apple is 'Overhauling' the Backend of Maps

Apple is recruiting engineers for a major rewrite of the Maps application programming interface, notes AppleInsider.

Apple's roadmap involves significant changes to the backend for the Maps services hosted from the company's servers. The details were revealed in a pair of new job postings this week for senior software engineers on the Maps API team.

"The Maps API is the doorway to all systems powering the Apple Maps service for our various clients. It receives requests and actions, dispatches them to appropriate services, and composes responses for a broad range of request types with vastly different scaling profiles. Working on the Maps API, you’ll be a key cross-functional contributor to almost all new projects for Maps.

We’ve got big plans for our API - we’re looking for leaders that can design and build clean, scalable, and performance APIs, as well as design and build systems to trace, monitor, and debug requests once they enter our distributed backend systems with their complex dependancies. We’re overhauling things front-to-back and want engineers that live and breath distributed systems and services."


Click Here To Apply  >>>>  : Apple Jobs


why Orkut is shutting down

Ten years ago, Orkut was Google’s first foray into social networking. Built as a “20 percent” project, Orkut communities started conversations, and forged connections, that had never existed before. Orkut helped shape life online before people really knew what “social networking” was.

Over the past decade, YouTube, Blogger and Google+ have taken off, with communities springing up in every corner of the world. Because the growth of these communities has outpaced Orkut's growth, we've decided to bid Orkut farewell (or, tchau). We'll be focusing our energy and resources on making these other social platforms as amazing as possible for everyone who uses them.

We will shut down Orkut on September 30, 2014. Until then, there will be no impact on current Orkut users, to give the community time to manage the transition. People can export their profile data, community posts and photos using Google Takeout (available until September 2016). Starting today, it will not be possible to create a new Orkut account.

Orkut, the service, may be going away, but all of those incredible communities Orkut users have created will live on. We are preserving an archive of all public communities, which will be available online starting September 30, 2014. If you don't want your posts or name to be included in the community archive, you can remove Orkut permanently from your Google account. Please visit our Help Center for further details. 

It's been a great 10 years, and we apologize to those still actively using the service. We hope people will find other online communities to spark more conversations and build even more connections for the next decade and beyond.