Sunday, 5 October 2014

HOW TO ENABLE AND DISABLE EVERYTHING IN WINDOWS

The windows operating of this tries to make it hard for users to hide or display various options, features and looks. However, it fails miserably at doing so. The windows registry holds the key operating system. In other words, system administrators can place restrictions on all aspects of the user’s experience using the Windows registry. The easiest way to improve restriction on a user’s activities is by following the steps below:- 

STEP 1:- Click on Start Menu and open run command and type regedit. (WINDOWS + R)

STEP 2:- Search for the following registry key:-

HKEY_CURRENT_USER\Software\Microsoft\CurrentVersion\Policies\Explorer 

STEP 3:- Under this registry key one cam improve a number of interesting restriction that are discussed in detail later in this section. The following new DWORD values can be created in the right pane to improve specific restrictions on the user:-

HideClock: - 

This DWORD value can be used to either disable/hide or enable the system clock normally displayed in the right bottom corner of the screen. A data value of 1 hide the clock, while a data value of 0 displays it.

NoDrives: - 

This DWORD value can be used to hide all drives that are normally accessible through My Computer. A data value of 1 hide the Run option, while a data value 0 displays it. These hidden features of the Windows Registry can be used as a very good prank to play on your unsuspecting friends! However, on a more serious note, system administrators can also use the NoDrives value to restrict the access privileges of a particular user.

NoRecentDocsHistory: - 

Each time one opens a document or a file on a Windows system; it automatically gets added to the Recent Documents list accessible through the Start menu. This list contains the local file access history of a computer and is quite comparable to a browser’s history list. The NoRecentDocsHistory DWORD value can be used to prevent documents from getting added to this list. A data value of 1 removes the list from the start menu, while a data value of 0 enables the list.

NoDesktop: - 

This DWORD value can be used to hide the entire desktop (including all file and folder and system folder). A data value of 1 hide the desktop and all contents on it, while a data value of 0 displays the desktop.

NoSetFolders: - 

This DWORD value can be used to either remove the entire settings folder (including all sub-folder like control panel, printers and taskbar) normally accessible through the Start Menu. A data value of 1 hide the folder, while a data value of 0 display it.

NoSetTaskbar: - 

It removes Taskbar system folder them the Settings option on the Start Menu. This restriction removes the Taskbar and Start Menu items from the Control Panel, and it also removes the properties item from the Start Menu context menu.

NoSaveSettting: -

This DWORD value can be used to prevent your desktop settings from being changed by the user. A data value of 1 protects the desktop settings, while a data value of 0 allows the user to change desktop settings.

DisableRegistryTools: - 

Disable registry editing tools. If you disable this option, the Windows registry editor too will not Word. Create new DWORD and called DisableRegistryTools and its value 1 to disable it and 0 to enable it.

NoClose: - 

It disables Shut Down and prevents the user from normally shutting down Windows. Create new DWORD and called NoClose and Put its value 1 for disable it.

NoAddPrinter: - 

This DWORD value is quite similar to be previous restriction feature, except that it imposes restriction on a user’s ability to add new Printers.

NoFind: - 

This DWORD value can be used to either disable/hide or enable the find option normally accessible through the Start menu. A data value of 1 hide the Find option from the Start menu, while a data value of 0 displays it.

NoStartMenuMyMusic: - 

This DWORD value can be used to either disable/hide or enable the My Music Option normally accessible by clicking on start > Libraries. A data value of 1 hide the option from the Start Menu, while a data value of 0 displays it.

NoSMMyDocs: - 

This DWORD value can be used to either disable/hide or enable the My Documents option normally accessible by clicking on Start Libraries. A data value of 1 hide the option from start menu, while a data value of 0 displays it.

NoSMMYPictures: - 

This DWORD value can be used to either disable/hide or enable the My Pictures option normally accessible by clicking on Start Libraries. A data value of 1 hide the option from start menu, while a data value of 0 displays it.

NoSMHelp: - 

This DWORD value can be used to either disable/hide or enable the Help option normally accessible through the Start Menu. A data value of 1 hide the option from the Start menu, while a data value of 0 displays it.

NoNetworkConnections: - 

This DWORD value can be used to either disable/hide or enable the network and Dial-up connections option normally accessible through the Start Menu. A data value of 1 hide the option from Start Menu, while a data value of 0 displays it.

NoFavoritesMenu: - 

This DWORD value can be used to either disable/hide or enable option normally accessible through the Start Menu. A data value 1 hide the option from the Start Menu, while a data value of 0 displays it. 

NoTrayItemsDisplay: - 

Normally, there are a number of Application Tray Icon displayed in the right button corner of the screen next to the system clock. With the help of a simple registry tweak, it is possible to prevent these items from being displayed. The NoTrayDisplay DWORD entry with a value of 1 means that the tray items shall be hidden, while a value of 0 shall display them.

NoToolbarsOnTaskbar: -

The newer version of the windows operating system allow user to create toolbars that get embedded into the taskbar for quick accessibility. For example, the quick Launch, Address, and Links. The NoToolbarsOnTaskbar DWORD entry with a value of 1 can hide all such toolbars, while a value of 0 enables them again. 

NoNetHood: - 

This DWORD value can be used to hide the Network Neighborhood icon from the desktop. A data value of 1 hides the icon, while a data value of 0 display it.

NoCommonGropus: - 

This DWORD value can be used to hide the common group folders that are normally accessible through the Start Menu. A data value of 1 hide the common group folders, while a data value of 0 displays them. 

ClearRecentDocsOnExit: - 

It is also possible to automatically clear the Recent Documents List each time Windows exits. The ClearRecentDocsOnExit value of 1 enables this features, while a value of 0 disable it.

Wednesday, 24 September 2014

iPhone 6 Plus Some Users Report Bending Phone in Pocket

Multiple iPhone 6 and users area unit news accidental bending of their handsets whereas within the front pocket. in addition, a YouTube video has surfaced on the net that puts the iPhone 6 and through the 'bend test'.
Numerous reports have appeared on-line citing multiple iPhone 6 and users who suffered accidental bending on the far side repair whereas carrying the telephone set in their pockets.
A user elaborated the problem on a MacRumors forum post titled, 'iPhone 6 and slightly bent once two days'. He said he'd detected a small bend on his iPhone vi and once he unbroken the device in his front pocket for regarding eighteen hours. Another user noted that his iPhone 6 and had bent whereas it had been unbroken within the front pocket.

Following reports of bending incidences, Lewis of unpack Therapy care determined to place the iPhone 6 and through a bend check. within the video, Lewis is seen victimisation simply his hands for exerting pressure on the iPhone 6 and from the rear panel and through the course of the check, a bend is seen just under the quantity rocker. Lewis points out that the place housing the ability, and volume keys can be the weakest spot.
After the completion of the iPhone 6 and bend check, the telephone set was still operating fine; but Lewis educated 9to5mac that the show cracked once he tried to bend the body back to form.
9to5mac conjointly points that Apple isn't willing to exchange the bent iPhone 6 and units for free of charge, and is nonetheless to retort to the problem formally. Of course, like the iPhone four wireless 'death grip' issue, Apple could okay tell users they are holding (or during this case, pocketing) the smartphone wrong. User comments on multiple iPhone 6 and bending reports conjointly joke regarding Apple going to introduce a brand new vary of attire which will defend the iPhone.
For those unaware, the iPhone 6 and is slim seven.1mm-thick smartphone designed out of metal and glass, and sports a five.5-inch screen. metal could be a malleable metal, in fact, is taken into account one in all the foremost malleable metals, second solely to gold. Apple looks to possess created a heavy error in judgement once selecting the 'premium materials' for its new large-screen smartphones, a problem that Samsung splendidly avoids with its plastic phone bodies for the Galaxy Note phablet series, whereas LG recently took the problem on directly with the G Flex, making a very versatile phone which will regain its form and face up to up to 40kgs of weight.
Following the iPhone 6 and bend check, unpack medical care went on to post a bend check of the five.7-inch Galaxy Note three (151.2x79.2x8.3mm) compared, and located that whereas the phone will flex, it regains its form. the thickness of the smartphone is additionally an element in serving to defend from bending stresses.
Considering the breadth, height and thickness of the iPhone 6 plus (158.1x77.8x7.1mm), carrying the new Apple smartphone in a very pocket that has very little house for the telephone set to slip in or out is risky, and may cause bending of the phone, as according by several users. inserting it within the back pocket may have even a lot of calamitous consequences. The pressure placed on the device whereas sitting currently seems to possess the next probability to break the device, not like previous iPhone variants.

While this seems to be terribly dangerous news for iPhone 6 Plus adopters, it for sure implies that case manufacturers can have a field day providing cases that reinforce the structure. Of course, Apple could okay gift free bumpers, because it did within the iPhone four wireless death grip issue. The new bending issue is being termed 'bendgate' by users.
Apple on Mon had proclaimed that it oversubscribed over ten million units of iPhone 6 and iPhone vi Plus and globally, setting a brand new record for iPhone sales throughout the gap weekend.

WhatsApp Confirms Voice Calling Feature Launch Imminent

Voice calling, the one massive feature missing from WhatsApp's arsenal, is coming back to the favored platform shortly. We've been hearing regarding this feature since February, once WhatsApp chief operating officer Jan Kuom proclaimed that the voice line of work feature would be additional to mechanical man and iPhone initial, followed by BlackBerry, Nokia and Microsoft platforms.

Now, NDTV Gadgets has noticed a mention of the feature in WhatsApp's iPhone app, that virtually confirms that the feature is so nearing launch.
With the newest WhatsApp update that was discharged for iPhone on Gregorian calendar month eight, WhatsApp additional many options like improved location sharing and quick camera access. What the app's unharness notes don't mention is that it's additional a pop-up, that requests access to the electro-acoustic transducer each time the app is opened. As you'll see within the screenshots higher than, this pop-up reads, "WhatsApp needs electro-acoustic transducer access to send Voice Messages, record Videos with sound, build and receive Voice Calls."
This pop-up can seem as long as users haven't allowed WhatsApp access to the electro-acoustic transducer. to envision this, attend Settings> Privacy> Microphone WhatsApp> flip the slider to Off. currently open WhatsApp to seek out mention of the voice line of work feature.
Previously, WhatsApp's voice line of work feature was seen in Hindi translation requests and later in leaked pictures of the programme for voice line of work. However, this can be the primary time that mention of this feature has been noticed within the app itself.
With over 600 million active users, WhatsApp is that the world's most well-liked electronic communication app. it had been non inheritable by Facebook earlier this year, in an exceedingly deal reportedly price $19 billion

Monday, 22 September 2014

5 Ways to Change Your IP Address and Browse Securely

Before you'll get pleasure from the net and browse safely, net security is that the terribly very first thing you need to consider. firmly aquatics the net provides you total freedom as you would like however unknown to several, anytime you connect your laptop to the net, equally of your info is exposed and should be compromised beginning along with your information processing then to your browsing location, browser, devices, page you visited, your personal knowledge may be accessed even while not you knowing it.


Besides, browsing firmly offer you access to several restricted websites. perhaps your native information processing has been restricted or your country is being restricted and you don’t have access to bound sites, firmly and anonymous browsing provides you access to such restricted websites.
And to my fellow bloggers and webmasters, secure browsing ensures your knowledge and your info area unit well secured, encrypted and not accessible to intruders. it'll shield your personal knowledge, your login details. This reduces the possibility of your web site obtaining hacked to an excellent extent.

1. Virtual Private Network

Abbreviated as VPN, Virtual non-public Networks are premium tools that amendment your science address mechanically as before long as you set it courant your pc. Not of these VPN programs ar free, to use most of them you want to take the service with alittle quantity.
For higher performance with a VPN supplier, a paid service is worthwhile. I even have been exploitation VPN for quite two years currently and it's been serving to plenty Here ar the list of VPN you may take into account using Some Website:-

2. Manually Change your IP

To be ready to browse firmly and anonymously, like I steered you want to get your real science address modified. to go looking for science addresses for a particular location attend hidemyass.com, there are several sites wherever you'll be able to explore for proxies however I continually use hidemyass.com. currently i'll in short show you ways to alter your science address manually. On Firefox, click on Tools choices click on Network tab Settings click on manual Proxy Configuration enter your Proxy and Port within the area provided and click on OK.

3. Web Proxy

There are several sites on-line during which ever-changing of science to associate anonymous location is their main service or among their services. you'll be able to use this free proxy to surf anonymously on-line, secure your web affiliation, hide your web history, defend your on-line identity and additional significantly, hide your science address.
I’m not giving 100 percent assurance in exploitation on-line proxy web sites to access restricted site and to alter science as generally those free net proxy are sometimes tousled and don’t provide desired results.

4. Free Proxy Software

Just like VPN programs, there are free proxy software package you'll be able to use to browse firmly and anonymously and to cover your identity on-line. when you've got with success put in one on your pc,connect usually to web, and connect your free proxy software package to alter your science and browse anonymously and firmly.
you'll have to be compelled to manually amendment your browser settings before you'll be able to get these programs to figure. Here are the lists of Free proxy Server Software:-

5. Browser Addons or Extensions

Internet usage is obtaining plenty easier and better! Browsers add-ons and extension can even be accustomed amendment your science address. There ar several Mozilla and Google Chrome Add-ons & extension to alter your science address, this can be a really straightforward task to try and do, you simply have to be compelled to install the add-ons or extension on your browser to urge your science address modified.
Some Famous and Popular Addons for Mozilla and Chrome:-

Friday, 19 September 2014

Top Fastest Proxy Server List/Website 2014

We find numerous websites restricted or blocked for our access. Sometimes, our net service supplier blocks torrents sites, YouTube videos and different sites. colleges and schools block bound websites and social networks to students. Offices block several websites for workers so they are doing their work solely.

You can bypass these restrictions. you'll be able to even access websites that area unit blocked for your location or country. The answer is proxy servers. With proxy servers, you'll be able to browse any website while not obtaining copied. There area unit variety of proxy servers.
These sites disagree by the standard of service they provide, charges, security, obscurity and plenty of different options. we have a tendency to area unit presenting a listing of prime seven FREE Proxy Websites with that you'll be able to surf the net anonymously.So here is the Top Proxy server list/website of 2014.





 







Sunday, 31 August 2014

Top 5 Android Games: August 2014

The end of August as return, therefore it’s time to seem at the simplest golem games that crossed our desks. This month, we tend to saw the discharge of a number of nice Indie games, which means that the titles didn’t have major backers funding their development. in a very few cases, these games find yourself being a number of the simplest, however after all, there's little question that success publishers will obtrude nice work too, as we tend to saw with Game loft within the unleash of contemporary Combat 5.

A couple of the games we tend to list this month feature addictive characteristics, which means it's straightforward to die within the game, however even easier to press “replay.” In addictive games, you wish to undertake once more, hoping to try and do higher than you probably did the last spherical. different games for this month embody a puzzle, platformed, and a Federal Protective Service title.

1. Thomas Was Alone 

Thomas Was Alone is a remarkable game, with all of the characteristics of a basic platformer. However, TWA is most quite a generic platform game, as there's narration throughout the title by Danny Wallace.
You play as a acutely aware parallelogram, attentive to his own existence in an exceedingly mysterious world. Your goal is beat levels, whereas conjointly befriending alternative shapes within the game. It’s a rather cute game, however that small parallelogram may tug at your compassionateness.
For the worth of $5.39, skip that morning low from Starbucks and check it out.

2. Modern Combat 5: Blackout 

The next installment within the fashionable Combat series, Blackout is presumably the primary FPS from Gameloft that options zero IAPs. Once you get the sport, you get the complete title with no hidden gimmicks.
The game itself kicks major butt, filled with sweet 3D graphics, action-packed gameplay, and a lot of weapons in your armory to require down cyber terrorists round the world.
 If you're a lover of taking part in FPS titles on your mobile device, check this one out.


3. Blek 

At first, Blek is Associate in Nursing surprisingly developed puzzle, however once you reach the upper levels during this game, you may feel your fingers running up your head, able to rip your hair out. It will be quite frustrating.
Using your finger to creature gestures, the gestures then move a couple of level, bouncing around attempting to gather dots. however if your gesture hits a wall or object, it vanishes and you need to begin everywhere with a replacement gesture. It’s terribly difficult to master, however the gameplay is contemporary and also the music is amazing.
For only $2.99, it’s a requirement obtain.

4. Timberman 

Timberman isn’t specifically a replacement game on Google Play, however it appears to possess been “discovered” this month, because of it creating the rounds across the online. within the game, you play as a lumberjack UN agency is {attempting|trying|making Associate in Nursing attempt} to chop down an impossibly tall tree, whereas avoiding branches.
While chopping, you need to dodge branches by standing on the correct or left aspect of tree, with the most goal being to visualize however so much you'll be able to get. I need to regarding sixty cuts, that was spectacular on behalf of me, however there ar others UN agency rise to 200+.
It’s a awfully addictive , however fun game. And for the worth of free, it’s a no brainer.

5. Don’t Touch The Spikes 

Being somewhat paying homage to Flappy Bird, Don’t bit The Spikes could be a terribly fun, {yet Associate in Nursingother|yet one more|one more} addicting game that includes an loveable very little bird. Moving from left to right, your goal is to not hit spikes (obviously), whereas conjointly aggregation apples to upgrade your bird’s look.
The feel of the sport is extremely responsive, that is useful, considering that one wrong faucet may send your bird into deadly spikes. It’s cute, easy, and straightforward to choose up and drop at a moment’s notice.
The game is completely free, however will feature some annoying ads. If you'll be able to handle some ads, check it out. 

Wednesday, 27 August 2014

How to Secure a Wireless Wi-Fi Network ??

With the globe going wireless in each sphere of technology, the question of security has usually been raised. a similar is true for wireless web networks or Wi-Fi networks with hackers and Wi-Fi intruders invariably searching for ways in which to realize access to unsecured networks. There area unit many reasons why you may need to safeguard your Wi-Fi network. distinguished among them embrace higher privacy, reduced web bills and quicker web speeds.This post contains few easy techniques you'll use to form positive that your wireless network is as secure because it attainable may be.

1) Encrypt your Wi-Fi Network:

Encrypt your Wi-Fi Network: once you use a Wi-Fi network for accessing the web, each piece of knowledge you send and receive over the air are often simply snooped by anyone with the proper set of tools. Packet sniffers are often employed by even the foremost novice of users to smell your information. this implies that a hacker can't solely see that websites square measure you accessing however additionally get the login details of your personal and skilled accounts.

Encryption primarily involves scrambling the information that's transmitted and received by you whereas employing a wireless network. this suggests that even though a hacker intercepts your information transmission, (s)he won't be ready to exploit the knowledge contained at intervals it.
Protect WLAN net Network

There square measure 2 coding standards out there that you simply will use: WEP (Wired Equivalent Privacy) and WPA (Wireless Protected Access). WEP is that the older normal of coding and might currently be bypassed in a very matter of minutes. WPA is comparatively newer however it still has security holes. AirCrack and coWPAtty square measure 2 free tools that permit anyone to simply crack WEP and WPA coding mistreatment bruteforce technique. WPA2 is that the latest normal and is what you need to use if you would like the best level of protection for your wireless network. The coding keys used modification whenever a tool accesses the network creating WPA tougher to hack.

The coding employed by all devices within the network should be identical for the network to figure properly. Your network can solely be as secure as its least secure device. confirm all devices you employ support WPA2 coding. Use a robust coding key. confirm that it's longer than ten characters and contains a mix of capital and tiny letters, numbers and symbols. don't use common words and stuff that individuals will guess concerning you as your parole.

2) Replace default passwords on your router with strong passwords:

The biggest mistake most wireless web users build isn't ever-changing default passwords on their routers. Hackers utilize public databases that contain default passwords and usernames from just about each manufacturer. this permits them to alter the protection settings of your router in line with their wants. employing a sturdy positive identification for your router ensures that hackers and miscreants cannot amendment your network's security settings. to alter the positive identification on your router, visit Administration settings on your router's settings page. Also, don't store passwords in browsers as they will be simply created visible.

3) Change default SSID :

Your network's SSID or Service Set symbol is that the name of your wireless network. Usually, the SSID is that the name of the router's manufacturer together with the model range of the router. ever-changing it to not show this data prevents you from giving further data concerning your router to prospective hackers.

4) Do not broadcast your SSID:

Hiding SSID prevents unsophisticated and inexperienced hackers and wireless fidelity intruders from decisive that your network exists. activity your SSID is comparatively straightforward and also the choice to do therefore is sometimes underneath basic wireless settings on your router's settings page. However, it's necessary to notice that some devices, together with those running newer versions of Windows, can show each network notwithstanding they can't establish its name. Moreover, your network can still contain the SSID in information packets creating expose laughably straightforward with tools like inSSIDer, destiny and Commview for wireless fidelity.

5) Use scary names to discourage Wi-Fi theft  

If your wireless network incorporates a name like C:\virus.exe, most of the people UN agency would possibly otherwise access your network won't for the concern of obtaining their devices infected. you'll use your creative thinking to search out a lot of dangerous names for your wireless network.

6) See Connected Devices List:

Almost each new router can have a page that displays the list of each device that's connected to the network. you ought to check this page at regular intervals to examine that unknown devices aren't leeching your network. after you see associate degree unknown device, you'll be able to be sure that somebody has broken your network. you'll be able to attempt AirSnare, a free utility that scans your network for surprising waterproof addresses and conjointly appearance into DHCP requests.

7) Enable MAC address based filtering:  

Media Access management or raincoat address identifies every device connected to your network. raincoat address is AN alphanumerical key separated by colons. sanctionative raincoat address primarily based filtering permits solely devices having explicit raincoat addresses to access your network. you wish to enter the raincoat address of each device you want to permit to attach to your network on your router's settings page. This prevents unknown devices from connecting to your network although they understand your word. to seek out the raincoat address of your pc, open electronic communication and execute “ipconfig /all” while not quotes.

While it should stop inexperienced users from obtaining access to your network, veteran hackers and advanced users will use a wireless network instrument like Nmap and so amendment the raincoat address of his pc with another free tool raincoat Shift.