Showing posts with label How to. Show all posts
Showing posts with label How to. Show all posts

Friday, October 27, 2017

Android 8.1 Oreo Beta Download Now


Google has made a developer preview version of Android 8.1 Oreo available to download on Pixel and select Nexus devices, before the full public version launches in December.
Android 8.1 will bring with it improvements to Android Go, the lighter version of Android that's used on phones with 1GB of memory or less and a new Neural Network API that will effectively turn on the Pixel Visual Core that features in the Pixel 2 phones, but will also improve on-device machine intelligence of other Android devices.
By unlocking the Pixel Visual Core's full potential, it means third-party apps will be able to benefit from the Pixel 2's impressive camera skills. At the moment, only Google's own camera app can take pictures with HDR+ technology, so if you use the camera directly through WhatsApp for example, images probably won't look as good as if they're taken with the dedicated camera app.
The Pixel Visual Core is designed to change this, so there should be no need to switch between apps to take the perfect picture.

As we said, it's not just the Pixel 2 phones that will benefit from the Android 8.1 beta, as the original Pixel phones, along with the Pixel C, Nexus 5X, Nexus 6P and Android emulator can all be updated too. Following the update, the machine learning capabilities will see a significant improvement thanks to frameworks such as TensorFlow Lite, Caffe2 and others.

Android Go devices will get a performance boost too thanks to better memory optimisation of apps and password managers will be able to better integrate with Google's Autofill framework.
To download the Android 8.1 Oreo developer preview, you need to have a Pixel 2, Pixel 2 XL, Pixel, Pixel XL, Pixel C, Nexus 5X, Nexus 6P or a device running the Android emulator and enroll in the Android beta program. You will automatically get an over-the-air update after you've enrolled.
If you're already enrolled, then you don't need to do anything, as the update should be made available to you automatically.

Link Aadhar With Your Mobile Number Online

Now your aadhar can be linked to your mobile number online..!!


Mobile users can now link their Aadhaar number with their phone number online, instead of visiting their service provider to abide by the norm.
For online linking, submit unique identification number (Aadhaar) using a One Time Password (OTP) based option to be made available soon, or log on to the service provider's mobile App and link Aadhaar with mobile number.
Subscribers can also link their Aadhaar using IVRS (Interactive Voice Response System).
The Department of Telecommunications (DoT) on Wednesday issued "comprehensive instructions” for linking of Aadhaar with mobile numbers in its bid to expedite compliance with the Supreme Court's order.


"As per the new rules, the DoT has introduced three new methods to link a registered mobile number with Aadhaar i.e. OTP (One Time Password) based, App based and the IVRS facility. These new methods will help subscribers get their mobile number linked to Aadhaar without visiting the stores of the telcos,” the department said in a statement.
For the ease of senior citizens and people with disability or chronic illness, the DoT has also recommended re-verification at subscribers’ doorstep.
According to the new guidelines, the telecom operators should activate an online mechanism for people to request such service and based on their availability, they could pay a visit and complete the process, the Ministry added.
"Mobile penetration is increasing rapidly in the country and the subscribers need to be provided with the ease of linking Aadhaar number with mobile number. It is the government’s endeavour to improve convenience and reduce the time and energy spent by consumers to access government information and services that are their right,” Communications Minister Manoj Sinha said.
The Aadhaar number was designed to enable all residents of the country to access critical government services and important information, he added.
Industry welcomes
"The latest clarification from the DoT are aligned with what industry and the subscribers need. While it will take a little time to implement the directions, we are working closely with the government to improve and enhance the convenience of our consumers for undertaking Aadhaar based e-KYC linking of their mobile number,” Cellular Operators Association of India (COAI) said.
In a circular in August, the DoT had given instructions to the telecom service providers to provide for iris or fingerprint based authentication of Aadhaar. In keeping with privacy rules, the DoT also mandated that telecom service providers' agents should not have access to the subscribers' e-KYC data and only the name and address of the subscribers should be visible.

Friday, May 3, 2013

Activate Windows 7 for free



Tired of downloading and installing different types of windows 7 loaders and failing to activate windows 7.?
We have a perfect solution for this.!

Try these simple steps 100% working.!
Here is what you have to do.!

Install any of the loaders.( even though not working). Now restart your system and go to search box and type "command prompt" now right click on it and run as administrator.
Type  "slmgr -rearm" and press Enter.

Now Within a few seconds you’ll normally see this dialog show up, saying that 

the command has completed successfully, at which point you’ll 

want to reboot

.




Saturday, October 27, 2012

Add slow motion effects in windows live movie maker


Step 1. Add photos and videos to Windows Live Movie Maker
Click "Add videos and photos" to browse and select videos and photos from you computer to add. You can also drag and drop videos and photos to the storyboard.

Step 2. Slow down videos in Windows Live Movie Maker
To slow down videos, select the video clip and on the Edit tab under "Video Tools" choose a speed (depending on how much you want to speed the video up or slow it down).

windows live movie maker split

Tuesday, October 16, 2012

Remove System Defragmenter - How To Remove FAKE Malware From Your Computer, Uninstall Guide.

What is System Defragmenter?

System Defragmenter is a noxious program that imitates a computer optimization tool that scans computer system and detects disc problems. This rogue application is installed to random computers through malware infections and uses typical methods in order to trick computer users and rip them off by selling a fake program.

Right when System Defragmenter is downloaded and installed to computer, it is enabled to be run each time Windows is started. As a consequence, you will experience tons of unwanted actions on your system, such as displaying fake alerts that warn about hardware failure, etc. The warnings read:

"Critical Error
Hard Drive not found. Missing hard drive.

"Critical Error
RAM memory usage is critically high. RAM memory failure.

"Critical Error
Windows can't find hard disk space. Hard drive error

"Critical Error!
Damaged hard drive clusters detected. Private data is at risk.

"Critical Error!
Windows was unable to save all the data for the file \System32\496A8300. The data has been lost. This error may be caused by a failure of your computer hardware.

"Critical Error
A critical error has occurred while indexing data stored on hard drive. System restart required.

"System Restore
The system has been restored after a critical error. Data integrity and hard drive integrity verification required.

System Defragmenter also pretends to scan infected computer system and reports about some disc errors which in fact are absolutely fake. However, the program will attempt to convince you to find a bunch of problems on your system. Here are a few examples of the messages you can receive after System Defragmenter finishes its scan:
Read time of hard drive clusters less than 500 ms
32% of HDD space is unreadable
Hard drive does not respond to system commands
Bad sectors on hard drive or damaged file allocation table
Drive C initializing error

and many more...

Do not take these notifications for granted under any circumstances as SystemDefragmenter doesn't have any properties of a legitimate optimization tool. You are strongly adviced to remove System Defragmenter as soon as possible instead of trusting any information it provides.

Manual System Defragmenter removal
Important Note: Although it is possible to manually remove System Defragmenter, such activity can permanently damage your system if any mistakes are made in the process, as advanced spyware parasites are able to automatically repair themselves if not completely removed. Thus, manual spyware removal is recommended for experienced users only, such as IT specialists or highly qualified system administrators. For other users, we recommend using Reimage Repair or other malware and spyware removal Tips and Tricks found on this blog www.eongo.co.cc

Runtime Error R6002 Floating Point Support Not Loaded solution


If you are like most people, it can be very frustrating, and even cause you to wonder which way to turn when you get a runtime error r6002 floating point support not loaded on your pc. Most people are in the dark about what is to blame for these problems and what they can do to fix them. Before deciding to hire a computer technician at great expense, read the following article carefully since it will teach you a simple method to rid your computer of these troubles without delay.

Before going any further, allow me to give you some background information in order for you to understand why these errors are a problem with your pc. Much of the time runtime errors can be traced back to a corrupted or damaged registry - this being the part of windows that tracks what occurs on your computer, so whenever you install, uninstall, or update any software or hardware component, your windows application 'registers' what you've done.

This record-keeping system includes many types of data; it includes the many links and paths which are needed to inform your windows system where the files that run your software and hardware programs are located. It can sometimes happen that an incorrect software installation or removal might cause non-functioning links in your registry system, which means that windows is unable to run that software or some part of it, and as a result you might get a runtime error r6002 floating point support not loaded and numerous other issues which include slow response time, lock ups, and blue screens. These kinds of errors are simple to take care of if you are a computer expert and you have the skills to work on your registry, for most non-professionals, it's not wise to try to do this alone - you can make a bad situation even worse!
Luckily, there is a simple and risk-free way to remedy a runtime error r6002 floating point support not loaded even though you may not be a whiz at computers - this can be done by using a professional registry repair utility. These software solutions specialize in detecting various errors on your computer and taking care of repairing them and rapidly restoring your pc to its best condition. Because many of these applications give useful free-of-charge scans and even repairs, it is recommended to download such tool and let it do its job and get rid of those errors.


remove csrcs.exe


START-RUN,type there regedit(this will open system registry)
ctrl+F
Write csrcs(search now)
It'll show you some results, you'll find there "csrcs.exe",just delete it immediately.

Its not over yet, again do the same search you may see "explorer.exe csrcs.exe" , left click then modify and remove the csrcs.exe part(leave the explorer.exe as it is)

There you go congrats you just removed csrcs.exe

Stop svchost.exe High CPU Usage


Svchost.exe is known to cause high CPU usage problems. I'm sure you've been in a situation like this: you're working on your computer and enjoying yourself when all of a sudden it becomes agonizingly slow and even starts freezing up. You press CTRL+ALT+DEL to open the Task Manager, click on theProcesses tab,  and see that there are several instances of svchost.exe running and one of them is using up 90% - 100% of CPU! Some people will think: "OMG! My computer's got a virus!!!". Well, that might be true, because some malware masks itself as svchost, but most likely it's just Windows being Windows.So, what does svchost.exe do and why is it there in the first place?Svchost is there to host services and run DLLs. You might have noticed that most programs have their own .exe files and can run on their own. DLLs are different - they can't launch themselves. Svchost.exe launches them and runs them. You can check out the FileInspect Process Library to find out more about the svchost.exe process.
Now the question is how to stop svchost.exe from stealing CPU usage. First of all, you'll need to find out which of the svchost.exe instances is the culprit and is causing your computer to slow down. Also you need to identify the actual application running it.

Luckily, it's easy.  There is a very useful free Microsoft (originally Sysinternals) tool called Process Explorer, that gives you detailed information for each running process. All you need to do is download it and click the .exe file - no installation is required.

Once you've got it running, hover the mouse point over each svchost.exe process and a tooltip windows with all the information needed will appear.


Fix It


First of all, if the process that is eating up CPU is not a Windows process, kill it and uninstall the program that runs it. Also scan your computer for viruses and other malware.

However, most likely it will be a Windows process, such as Task Scheduler, firewall, or Windows Update. Sometimes simply restarting your computer gets rid of the problem. If not, try downloading the most recent Windows Updates. If for some reason you can't, go to the Control Panel - Administrative Tools - double-click the Services shortcut (or click Start - Run - type in services.msc - hit Enter), find the required service, right-click on it, go to Properties and select Disabled from the Startup type box. You can always re-enable it later, so don't worry. Reboot your computer and then go to the Microsoft website and download updates. Install them, re-enable the service that you have stopped, and restart again. Hopefully everything will be working now.

Another way to get rid of svchost.exe high CPU usage problem is to open the Task Manager (CTRL+ALT+DEL), find the process that is causing the problem, right-click on it, go to Set Priority and set it to Below Normal (or Idle if Below Normal doesn't help). Keep in mind that setting it to Idle might interfere with your networking services, especially if you're at work and part of a large network.

Clean the Registry

Also if you're repeatedly getting svchost.exe errors, cleaning the Registry might help. If svchost was malware that you removed some time ago, and you are still getting the errors, there might be some bits of malware left in the Registry. You can download a good free Registry cleaner from Auslogics website.

Maximize the Battery Life of Your MacBook Pro



1. Every time you turn on your MacBook Pro, make sure that its battery is fully charged.

2. During Software Updates installation, keep them running as these updates sometimes improve the life of your MacBook Pro’s battery.

3. Once in a while, discharge the battery of your MacBook Pro – about once a month should be enough. Run it until it shuts down or outs itself to sleep. Then when the battery is already drained, plug the MacBook Pro to recharge.

4. Make sure that you use and store your MacBook Pro under recommended room temperature which is between 50 and 95 degrees Fahrenheit. Anywhere higher or lower than these temperatures might damage not only the battery, but your MacBook Pro, as well.5. To minimize battery usage, keep the brightness level of your MacBook Pro to a minimum. The brighter the screen is, the more power the battery consumes. Also, turn off the backlight on your keyboard by using the F5 key to minimize power consumption.

6. Turn off the Bluetooth function on your MacBook Pro when you are not using it as it uses a lot of power. To turn off Bluetooth, Open System Preferences, click on Bluetooth, and mark as uncheck the box next to “ON”.

7. Turn off or disable AirPort (Wi-Fi function) when you are not using it. To turn it off, Open System Preferences, click on Network, and click on the Turn AirPort Off button.

8. If you will keep your MacBook Pro plugged in or stored for a long period of time, it is best to remove the battery. In storing the battery, keep it under room temperature and away from heat to prolong its life.

While you can always have a replacement for your damaged or dead MacBook Pro battery from Apple stores, it is still best to preserve and prolong its life to avoid any more hassles. By keeping in mind these simple but important safety tips, you can be sure that the battery of your MacBook Pro will last long.


Make a bootable antivirus cd


1. Go to http://ubcd4win.com/downloads.html
2. Select a mirror with a green status. (like "Mirror#3" for example)
3. When you click on the mirror it will take you to another site where the download will be available.
4. Click the download link for Ultimate Boot CD and save the download to wherever you download stuff.
5. Once the installer has been downloaded double click it.
6. Choose your language
7. Click next about 3 more times and select the file path where you would like to install ultimate boot cd 4 win. Please note that you should have a drive with at least 5-10 gb of free space to allow for future plugin growth. I will choose C:UBCD4Win. The install should take a few minutes.
8. Click Yes to the MD5 Hash Check. The install will continue once the hash check succeeds.
9. Click Yes to see if a patch file exists.
10. Click the checkbox to launch ubcd4winbuilder.exe.

11. Click the "i agree" button.
12. Click "NO" to searching for windows files.
13. Obtain a windows xp operating system disc w/SP2.
14. Explore the disc and copy the entire content (all the folders and files on the windows xp cd) to any location on your computer. You should allocate at least 700 MB of free space for the windows xp disc.
15. Open UBCD4win (if it's not already open). Click Source browse button (3 dots ...) and browse to your i386 folder. My path was C:WindowsXPcd for example.
16. Next go to the media output section and choose a spot for your ISO image to be created. This ISO can be burned with almost any burning software. Once the ISO is burned it will be bootable.
17. Next, click the plugins button. Don't be too overwhelmed here, actually you should be very happy! Look at all those plugins!
18. Now it's time to update our anti-malware software packages.
19. The first one I have on my list is a-squared free anti-spyware. Click that line and then click the config button. A command prompt will automatically open and start downloading the latest updates for that program...totally awesome, isn't it!
20. So, now you need to update all the anti-malware programs in our plugin list. Click each one and then hit the config button.
21. After you're done configing/updating your plugins click the close button.
22. Next, click Build.
23. Click yes to create a directory and then click i agree.
24. At this point your ISO is created and is ready to be burned.


Friday, October 5, 2012

How To Search On Facebook By Email ID


Facebook Is A Social Networking Website. Facebook Has More Than 845 Million Active Users. Almost Every Internet User Have Account On Facebook. You Can Easily Search Or Invite Your Friends On Facebook With Their Email IDs. To Search Friends On Facebook Follow These Steps.
  1. Login To Your Facebook Account.
  2. In Search Bar Type Email ID Of Person(Friend) Whom You Want To Search.
  3. If Search Show Result, This Means That Is Profile Of Person Whom You Are Searching.
  4. Otherwise There Is No Person With That Email ID Or He/She Hide Their Profile From Search Results.
NOTE: You Can Easily Invite Your Friends By Their Email ID.

Sunday, August 26, 2012

How To Encrypt Data


Using GnuPG (GPG) to Encrypt/Sign Data

Currently, almost every computer is connected to the Internet, some more securely than others. With the rapid growth of the Internet, and it becoming an essential part of our life, we tend to use it to store personal information. For example, text files with phone numbers, e-mail addresses, sometimes even passwords or PINs, thinking that as long as the computer has anti-virus software installed, and can not be logged into without a password, the data is safe. That is a fallacy. Anyone with malicious intent can find numerous ways to access your personal data.
GnuPG (GNU Privacy Guard) is a free implementation of the OpenPGP (PGP = Pretty Good Privacy) standard, and that is what we will be using to encrypt and secure your data. These instructions are specific to the Microsoft Windows Operating System, however, GPG can be used on any Unix variant, like Linux, Mac OS, Solaris, etc.
  1. Download the software.  The software for Windows is available at www.gpg4win.org
  2. Install the software.  You will need to be an Administrator on your computer to install this software. Double-click on the downloaded file and when given the choice to choose Components, select all and keep clicking Next and then the Install button to install. You may be asked to reboot after installation is complete. Please do so after saving your work.
  3. Creating your digital key.  Once your computer has rebooted, you are ready to use the software. However, first you need to create a digital key (to "lock" your data). A keypair consists of a public key and a private key. You keep your secret key, and distribute your public key to people you intend to communicate with. For example, if someone who has your public key wants to encrypt some data and send it to you, he will encrypt it using your public key, and you, upon receipt, will decrypt it using your private (secret) key. Similarly, you canencrypt files on your computer using your public key, and decrypt it using your private key. To create the key, please follow the steps:
    1. Launch GPA (Gnu Privacy Guard) by going to Start -> Programs -> GnuPG for Windows -> GPA. As this is your first time, you will be prompted to generate one now. Click Generate Key Now.
    2. Enter your real name, for example, Joseph Smith. Then click on Forward.
    3. Now enter your e-mail address, and click Forward.
        1. Enter a passphrase and then repeat it in the next field. Make sure you remember this passphrase, as you will need it when encrypting and/or signing. Click Forward, and then start using other applications, as that will increase the quality of the key.
        2. Once the key has been generated, you will be prompted to back up your keys. It is recommended to copy this file from the hard drive to a removable drive (USB, CD-ROM, etc.), and delete the one saved on the hard drive.
      1. Importing your contacts' public keys.  Now that you have your keypair, you might want to get your contacts' Public Keys in case you need to encrypt/sign data to send to them. To do so, follow the steps below:
        1. Launch WinPT (Windows Privacy Tray) from Start -> Programs -> GnuPG for Windows -> WinPT.
        2. Click on the Key menu and select Import.
        3. Select the Public Key that your contact sent to you and click Open. This will import their Public Key to your Key Manager.
      2. Now you are ready to send encrypted/signed data or e-mails to your contact.
      3. Using the software to encrypt and/or sign data.  To encrypt and/or sign a certain file, you simply right-click on the file, go to the GPGee sub-menu and select Sign/Encrypt or just Encrypt (PK) or Encrypt (Symmetric), depending on what you want to do. If you are justencrypting, select Encrypt (PK) and you will be prompted to select a key. If encrypting for yourself, then you select your own key, and click OK. If you are encrypting to send to a contact, you select that contact's public key and click OK. This will encrypt and/or sign the file.
      4. Using the software to encrypt and/or sign e-mails.  Based on which e-mail program you use, you can sign/encrypt directly from the program. Gpg4win comes with an Outlook plug-in (I've tested it with Outlook 2007 as well) that you can use to sign/encrypt by clicking a button or have it done automatically when sending. This can be done through Outlook Options, where a GnuPG tab is added for you to select various options.
      If you don't use Outlook or any other application that supports GPG, then you can sign/encrypt by writing your e-mails in an editor of your choice and encrypting/signing them using the GPGee menu by right-clicking on the file, selecting Sign&Encrypt. This will open a separate window - select the public-key of your contact and your signing key. Under Misc. Options, select Text Output (ASCII Armor) and click OK. This will create a file with an .asc extension that you can open in notepad, copy the text and paste it into the e-mail you are sending to your contact.
      If you use Gmail, there is a great plug-in that works on Firefox with Gmail, called FireGPG, which allows you to Sign and/or Encrypt directly from within the Gmail interface. It will even check for signatures in e-mails.