tag:blogger.com,1999:blog-35451777045240486582024-03-06T00:06:05.317-08:00Tech StuffsIt's a university for tech-savvy's to sharpen their brain with news, technologies, softwares and much more…Techstuffshttp://www.blogger.com/profile/02481127963759289385noreply@blogger.comBlogger47125tag:blogger.com,1999:blog-3545177704524048658.post-64980262386417883752017-05-22T07:22:00.001-07:002017-05-22T07:22:47.163-07:00Here comes God Father of WANNACRY<div dir="ltr" style="text-align: left;" trbidi="on">
love to Share<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcZWAMJWZdG6vqa3n5bBbCQKJ57n7NtpRCPt2HfZrgMoK36za_opmcqOHC-OH_VAxI_Egh9k2F8hFlk6XorK8Jh7WrPRix1CFxTiCBt3a1EqwX8sxRvKEjwdKx1sipjrHJqLHnshJDOhs/s1600/malware-digital-bkgd-shutterstock-510px.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="Tech Stuffs - Eternal Rocks Wannacry" border="0" height="177" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcZWAMJWZdG6vqa3n5bBbCQKJ57n7NtpRCPt2HfZrgMoK36za_opmcqOHC-OH_VAxI_Egh9k2F8hFlk6XorK8Jh7WrPRix1CFxTiCBt3a1EqwX8sxRvKEjwdKx1sipjrHJqLHnshJDOhs/s320/malware-digital-bkgd-shutterstock-510px.jpg" title="EternalRocks" width="320" /></a></div>
<br />
<h2 style="text-align: left;">
Eternal Rocks - The God Father</h2>
<br />
So at ths moment everyone shouting out wannacry, wannacry wannacry, that too almost 150 countries being affected by wannacry, Here comes the God Father of Wannacry - "<b>EternalRocks</b>"<br />
<br />
So what is this?<br />
<br />
We all know Wannacry is a frightening trojan, an ransomeware which is spreading around. So what is this<b> EternalRocks?</b><br />
<b><br /></b>
<b>Read: <a href="http://allstuffsforyou.blogspot.in/2017/05/wannacry-all-you-need-to-know.html" target="_blank">WannaCry - All you need to know</a></b><br />
<b><br /></b>
<h2 style="text-align: left;">
EternalRocks - The BiG Boss</h2>
<div>
This EternalRocks is similar to Wannacry but this is more frightening than that. Yes!! This eternalrocks is a new malware which exploits same vulnerability as Wannacry and it is very stronger than the latter. </div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkYa_CdV8ERHdGEXDL9dDKAAfqfRDRLab_iXFo6yJApQf8ccNFl5Sfo_L2nipJABqKp_NLLpbeze_62s6p3Ja9Qlq5C8SN9F59xZPL5CZKpUpuxC3nh4MYMqNSxsEKQ1Gtj3fgtqzpsXo/s1600/ompany+introduction.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="boss of wannacry - eternalrocks" border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkYa_CdV8ERHdGEXDL9dDKAAfqfRDRLab_iXFo6yJApQf8ccNFl5Sfo_L2nipJABqKp_NLLpbeze_62s6p3Ja9Qlq5C8SN9F59xZPL5CZKpUpuxC3nh4MYMqNSxsEKQ1Gtj3fgtqzpsXo/s320/ompany+introduction.jpg" title="Wannacry head" width="320" /></a></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
This EternalRocks as similar to wannacry, uses "<b>EternalBlue</b>" a tool from NSA to spread itself from one computer to another. In addition to that it also utilizes other NSA tools to make it spread faster than wannacry.</div>
<div>
<br /></div>
<div>
So how to protect from it? Here are few tips from our side.</div>
<div>
Read: <a href="http://allstuffsforyou.blogspot.in/2017/05/how-to-avoid-computer-viruses-on-your.html" target="_blank">How to avoid Computer Viruses on your Windows PC?</a></div>
<div>
<br /></div>
<div>
Share and Care!!</div>
<div>
<br /></div>
</div>
Techstuffshttp://www.blogger.com/profile/02481127963759289385noreply@blogger.com0tag:blogger.com,1999:blog-3545177704524048658.post-88194071133607888022017-05-21T04:52:00.000-07:002017-05-22T06:51:21.123-07:00 WannaCry - All you need to know<div dir="ltr" style="text-align: left;" trbidi="on">
love to Share<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBaDYU4yu5tko4H4XbMKfnf9bRw-RGehzk2qXa2ZZ-bbybisVlN85Q_PIz9sD-Q7yoTt40_7Tfv0qAxS8hkxkbXBnjS0-PGHqSaSxQryIoLtRK1WPRxLrAzOe8Xufc5aU9iSOnX8qenkD6/s1600/wannacry-2_051317024735.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="242" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBaDYU4yu5tko4H4XbMKfnf9bRw-RGehzk2qXa2ZZ-bbybisVlN85Q_PIz9sD-Q7yoTt40_7Tfv0qAxS8hkxkbXBnjS0-PGHqSaSxQryIoLtRK1WPRxLrAzOe8Xufc5aU9iSOnX8qenkD6/s320/wannacry-2_051317024735.jpg" width="320" /></a></div>
<br />
<br />
This malware strike that was unprecedented started last week, crossing the world, and security researchers estimated that of the day on Friday. Almost 57,000 computers in more than 150 nations were infected. It was barely stopped while the spread of the terrifying ransomware was impeded on Saturday.<br />
<br />
WannaCry is far and away the most serious malware attack up to now in 2017, as well as the spread of the ransomware that is troubling is far from over. In this post, we’ll tell you what WannaCry, the best way to guard yourself, and what found in the last eight days.<br />
<br />
<h3 style="text-align: left;">
What's WannaCry?</h3>
Above all, let’s clarify just what WannaCry is. This malware is a frightening sort of trojan virus<br />
<h3 style="text-align: left;">
<br />Just what does WannaCry do?</h3>
By encrypting most or even all the files on a user’s computer RansomWare like WannaCry operates. Subsequently, the application's requires a ransom be paid so that you can get the files. In case the user does pay the ransom ain't the amount doubles to $600. After seven days without payment, WannaCry will delete every one of the files that are encrypted and all information is going to be lost.<br />
<br />
<h3 style="text-align: left;">
Was WannaCry created?</h3>
When a band of hackers called Shadow Brokers released the information on the exploit to people, the security hole was subsequently made.<br />
<br />
<h3 style="text-align: left;">
Is the strike over?</h3>
No.<br />
<br />
European nations were hit the hardest, and company ground to some halt at organisations and several big businesses, including government agencies, and banks, hospitals.<br />
<br />
On Saturday, a 22-year old security researcher named the spread of the WannaCry virus accidentally impeded when he filed a domain name concealed inside the virus’ code in an endeavour to monitor the spread of WannaCry, unintentionally discontinuing its advancement in the procedure. It's possible for you to read Hutchins’ narrative in his blog post titled to Unintentionally Quit a Worldwide Cyber Attacks.”<br />
<br />
Sadly, the spread of WannaCry wasn’t really quit, but instead impeded.<br />
<h3 style="text-align: left;">
<br />How to shield myself?</h3>
Especially, Windows users with machines that run Windows Server 2003, Windows 8, or Windows XP should promptly install this security update. Also, read <a href="http://allstuffsforyou.blogspot.com/2017/05/how-to-avoid-computer-viruses-on-your.html" target="_blank">How to protect yourself from viruses?</a><br />
<h3 style="text-align: left;">
<br />If my computer is infected with WannaCry exactly what do I do?</h3>
Unfortunately, there isn't any confirmed fix for WannaCry accessible only at that time. Cybersecurity specialists and antivirus businesses are hard at work seeking approaches to decrypt files on computers that are infected, but no means of third party decryption are accessible now. Hopefully, users that are affected have back-ups in their data accessible, as the sole other choices right now which is proven to operate would be to follow along with the directions offered in the application to cover the ransom.<br />
<br />
<h3 style="text-align: left;">
Want to decrypt the encrypted files?</h3>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivq61tXuxXdXs83sGb-QSmhQ0g_tFVU52RvKdjBf5mju8oKEqusp1egECF-s17pW2jDs35xqJhS6pjPTn9xiufBv4CyrD50kS6dwJxlEU7Ir_eaA1nSnL5qlucO4P3xGQe676Z6oRuDuI2/s1600/wann.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="167" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivq61tXuxXdXs83sGb-QSmhQ0g_tFVU52RvKdjBf5mju8oKEqusp1egECF-s17pW2jDs35xqJhS6pjPTn9xiufBv4CyrD50kS6dwJxlEU7Ir_eaA1nSnL5qlucO4P3xGQe676Z6oRuDuI2/s320/wann.png" width="320" /></a></div>
<div>
<br /></div>
Researchers have released tools to help people hit by the global WannaCry ransomware. The researchers have released a key to unlock their computers without paying the ransom. The tools, called 'WannaKey' and 'WanaKiwi,' extract the keys to WannaCry encryption codes using prime numbers. However, the tools work only if the affected computers have not been rebooted since being infected with the malware.<br />
Download Wannakey here: <a href="https://github.com/aguinet/wannakey" target="_blank">WANNAKEY</a><br />
<br />
Hope this is helpful. Share it to world!!</div>
Rakesh Shanmugamhttp://www.blogger.com/profile/05239307734840019806noreply@blogger.com0tag:blogger.com,1999:blog-3545177704524048658.post-71075839967090770912017-05-21T04:15:00.002-07:002017-05-21T04:15:25.959-07:00How to avoid Computer Viruses on your Windows PC?<div dir="ltr" style="text-align: left;" trbidi="on">
love to Share<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgD0-NUMwxyFG7IgY0gJegIh9DaqNRQwVrquKrknktEhTS4txT95MdhiwgTzunrljsvJa0MVDM0I5uMHzdddq5FmBppXiVAGcDIOIpkKXgL26_MgkeMMdF3mcOFU9SmQpuLkT5xkAS8s6db/s1600/virr.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="How to avoid Computer Viruses on your Windows PC?" border="0" height="239" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgD0-NUMwxyFG7IgY0gJegIh9DaqNRQwVrquKrknktEhTS4txT95MdhiwgTzunrljsvJa0MVDM0I5uMHzdddq5FmBppXiVAGcDIOIpkKXgL26_MgkeMMdF3mcOFU9SmQpuLkT5xkAS8s6db/s320/virr.jpg" title="How to avoid Computer Viruses on your Windows PC?" width="320" /></a></div>
<br />
<br />
<h2 style="text-align: left;">
Guide on avoiding computer Viruses on your Windows PC</h2>
<br />
So have you experienced your <b>computer slowing down</b> or recurring shortcuts or popups when plugged in? This may be because of the viruses. So how to save yourself from <b>viruses in your PC</b>?<br />
Here are few tips..<br />
<br />
1. Never click on a link or attachment in an email that you are not positive that it's from a trusted source. If you think the e-mail looks suspicious, it may probably be. It never hurts to send an email to verify that it is legitimate.<br />
If you use an email retrieving program, disable the image previews option. Email applications like Outlook, Thunderbird, and others often automatically load attachments for your convenience, but this takes away your ability to decide whether a file is safe to open or not. Check your preferences to disable these settings.<br />
<br />
2. Beware of files that have double extension such as .txt.vb or .jpg.exe. As a default setting, Windows often hides common file extensions (normally), meaning that a program like Paint.exe will appear to you as simply Paint. Double extensions exploit this. They hide the second and dangerous extension and reassure you with the first, the safe extension – which is utterly meaningless to your computer. Your system recognises only the extension to the extreme right and runs the file as such. If a common file type whose extension you never see normally suddenly becomes visible for no apparent reason, right-click on it, select Properties, and look for the complete file name with extension. You may be surprised to find out what kind of extension it really has.<br />
To make your file extensions visible, find Folder Options in your Control Panel. Under the View tab, scroll down to Hide Extensions for Known File Types and make sure it is unselected. This way you can ensure before opening any program.<br />
<br />
3. Use USB drives with caution. Plugging someone else’s USB drive into your computer (or plugging your own into a computer at, say, an internet café/college) can spread an infection via the drive itself, not the file you’re actually trying to share. Whenever possible, try transferring files via email to keep potentially infected hardware out of the equation. Also, check out any shortcuts available when you plug external hardware.<br />
<br />
4. Beware of internet pop-ups. The real danger is that some pop-ups are designed to look like they’ve originated from your computer, which makes you click on it. If you see a pop-up that looks like Windows (or another trusted program’s) anti-virus software but warns you of a problem that needs to be fixed with an extreme level of urgency, it may be a scam. (To be sure, simply close the warning, then open that anti-virus software from your computer to see if the warning is still mentioned.) Other programs report false errors and then offer to fix them if you purchase their software. If you see a new type of anti-virus pop-up that you have not seen before, or if it appears to be from an anti-virus program that you did not install, it is fake. Close the pop-up, update your anti-virus program, and run a full scan. Many of these browser-related apps keep some temporary files on your computer and can store a virus there. To avoid this risk, make sure you clear your browser’s cache regularly.<br />
To clear cache Goto Start - Run - type "temp" and click enter. Delete all the files in the temp folder.<br />
<br />
5. Beware of unusual emails from companies you do business with. If you receive an email from a company that you otherwise trust requesting information or recommending that you run a particular file, log into your account on that company’s page and see if there’s a notification there as well. Some scammers will get your trust by copying legitimate businesses’ email styles and using a similar-sounding reply-to address to lower your guard.<br />
Note that good businesses will never request sensitive information, transaction details via email, which is one of the least secure ways of communicating.<br />
<br />
6. Install an anti-virus program. Paid versions include Norton, McAfee, F-Secure, and Sophos. Free versions include AVG, Avast, Comodo, BitDefender, and Avira AntiVir. You can download the free versions from their official sites. Make sure you keep your virus definitions updated. Run a full system scan/quick scan weekly.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLUfcufIlIPvjtfjFE54S8BnWMhufGK5VuWJOlPMoevtEfLL6Gv5q9ENlxjDh68DeObS_YHVbeuF8cx1RGhajMhWXGKNGERDC2XoAb9ri4ICMHfy8JJNf_Jwk3dXp_ztVeoRGzpehG5VW6/s1600/anti.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="Antivirus" border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLUfcufIlIPvjtfjFE54S8BnWMhufGK5VuWJOlPMoevtEfLL6Gv5q9ENlxjDh68DeObS_YHVbeuF8cx1RGhajMhWXGKNGERDC2XoAb9ri4ICMHfy8JJNf_Jwk3dXp_ztVeoRGzpehG5VW6/s320/anti.jpg" title="How to avoid Computer Viruses on your Windows PC?" width="320" /></a></div>
<br />
<br />
7. Install an anti-spyware program. Ad-Aware SE, Windows Defender, Malwarebytes, and Spybot Search and Destroy operate against internet malware and spyware that anti-virus programs overlook. Just like anti-virus software, keep it updated and do a full system scan weekly. You can also download Malware bytes, hitman, for free from the web which helps you remove malware from your PC.<br />
<br />
8. Use a firewall. Make sure your Windows Firewall is turned on (run a search for Windows Security Center on your computer to configure). You can also install a trustworthy firewall program to help block unwanted internet traffic. Windows firewall is mostly preferred.<br />
Note: You should not run two firewalls at the same time, as this will cause errors and can actually make your computer more vulnerable. If you’ve purchased or downloaded another firewall, make sure to disable Windows Firewall.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9ATl2v-68GU9_WhhTag3-pd_shu0RB59VQAXDEC0ONBWDrohzXu-mN1J_-BqDqRs6wow-Y_CbUxvi3-ONIQRAboLVcNK5U69uw89KBnr2tX3DxDbVymA7CB-QN2EDgQ8NfJ9cW0V6zPz7/s1600/firew.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="firewall" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9ATl2v-68GU9_WhhTag3-pd_shu0RB59VQAXDEC0ONBWDrohzXu-mN1J_-BqDqRs6wow-Y_CbUxvi3-ONIQRAboLVcNK5U69uw89KBnr2tX3DxDbVymA7CB-QN2EDgQ8NfJ9cW0V6zPz7/s1600/firew.jpg" title="How to avoid Computer Viruses on your Windows PC?" /></a></div>
<br />
<br />
9. Set up your Windows Update to automatically download patches and upgrades. This will allow your computer to automatically download any updates to both Windows and Internet Explorer. These updates will fix security problems and block many spyware programs and viruses. Note that viruses sometimes piggyback onto trusted updates to infect your computer; however, this is much more typical of outdated updates, as they are less closely monitored. Therefore, it’s best to keep your updates as current as possible.<br />
<br />
10. Consider switching to a different web browser. Some web browsers are more customizable than others like tor, mozilla etc., allowing you more control over pop-ups, ads, tracking, and other concerns that all of us face on the internet. Firefox, for example, has a large array of privacy- and security-related add-ons that will allow you to reclaim control over your web experience. Additionally, you can use ad blocker extensions on your browser to avoid annoying ads.<br />
<br />
11. Google it. When in doubt about an email, file, warning, email address, advertisement, or anything else that seems suspect, do an online search to see what other people are saying. Throw in the word “scam” to weed out results that may have been placed there by the very people who are trying to cheat you.<br />
<br />
We hope this article helped you. If you have any questions feel free to comment down.<br />
Share it so this may help few!!</div>
Rakesh Shanmugamhttp://www.blogger.com/profile/05239307734840019806noreply@blogger.com0tag:blogger.com,1999:blog-3545177704524048658.post-7561780062105572372015-11-26T19:47:00.000-08:002015-11-26T19:47:01.948-08:00Remove all your information From Truecaller Database<div dir="ltr" style="text-align: left;" trbidi="on">
love to Share<br />
<br />
Hello readers!! Here is a shocking news for you. Your phone number as well as your identity is stolen. Yes its true. The <b>true caller</b> database has been <b>hacked</b> by <b>Syrian
hackers</b>. They stole around 10 lakhs Indian profiles. Your information can also
be at stake. Here is he article that is been released in the times of India
regarding the hacking of truecaller database..<br />
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal" style="text-align: center;">
<o:p><a href="http://timesofindia.com/tech/tech-news/internet/TrueCaller-hacked-1-million-Indians-data-at-risk/articleshow/21144470.cms" rel="" style="background-color: #0084ff; color: white; cursor: pointer; font-family: 'Helvetica Neue', 'Segoe UI', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 17.92px; white-space: pre-wrap;" target="_blank">Truecaller Hacked By Syrians - TOI</a> </o:p></div>
<div class="MsoNormal">
<o:p><br /></o:p></div>
<div class="MsoNormal">
Ok now we teach you how to remove your number and details
from the app. So that, you may protect it as soon as possible. Do you think
just uninstalling the app protects you and your information. If you are not a techie
guy/gal then please know this. App is just a medium to help you and earn. All
the details login etc is stored in a database. Even this post information is
also going to store in a database which is allocated by google for blogger.com.
So to remove your details, please Follow the below steps..<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b>Step 1.</b> First open your true caller app. <o:p></o:p></div>
<div class="MsoNormal">
<b>Step 2.</b> Press on the people icon in the upper left corner <o:p></o:p></div>
<div class="MsoNormal">
<b>Step 3</b>. Click Settings <o:p></o:p></div>
<div class="MsoNormal">
<b>Step 4.</b> Click About <o:p></o:p></div>
<div class="MsoNormal">
<b>Step 5.</b> Click the Deactivate account.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
Howdy!! You just deactivated your account. But your
information is still in their database. How to remove it?<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
Follow these steps to remove your number and details fully
from their database. Here is a image tutorial for you.<o:p></o:p></div>
<div class="MsoNormal">
Click this link <a href="http://www.truecaller.com/unlist">www.truecaller.com/unlist</a> <o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZ9YsYFz0SQVrhd1bTjckg60F0uDARHQTUQTlDFHO82YNoN5mkELmqYTwWxv_QGITbGlOkEzO9ShTZP7My-0W2l73jB85TRmxiyCULYXdi_rporvWxYekIksarL8cSTTqASxe3PcWLDXE/s1600/True+caller+unlist+form.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="331" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZ9YsYFz0SQVrhd1bTjckg60F0uDARHQTUQTlDFHO82YNoN5mkELmqYTwWxv_QGITbGlOkEzO9ShTZP7My-0W2l73jB85TRmxiyCULYXdi_rporvWxYekIksarL8cSTTqASxe3PcWLDXE/s400/True+caller+unlist+form.JPG" width="400" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<br />
<div class="MsoNormal">
Next type your number followed by the country code (+91 for India)<o:p></o:p></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbnC9IdeG_SRN1_0b6s_0x9YTbhI4LhyphenhyphenYL2rst8oGn6auxfIwVEVsZuw4pdXaKPfeuqKCSK35y1WWhtv5KX6_fVWf46SwF92ALkIJDtXLObkUp6BCZZs6KVgq2YXTneSr5xOl0b7XkjHQ/s1600/True+caller+unlist+form+2.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="336" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbnC9IdeG_SRN1_0b6s_0x9YTbhI4LhyphenhyphenYL2rst8oGn6auxfIwVEVsZuw4pdXaKPfeuqKCSK35y1WWhtv5KX6_fVWf46SwF92ALkIJDtXLObkUp6BCZZs6KVgq2YXTneSr5xOl0b7XkjHQ/s400/True+caller+unlist+form+2.JPG" width="400" /></a></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
Select any reason. Just select “I do not want people to see
my name when I make a call”<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
Leave the other untouched. Write the verification code as
shown. (Case Sensitive)<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjf3BH6TByYmWuot7ibc25qGvJ1kqVljFZ7su3Mu0d4eN3K9R6FeeMNQNlKjODZwcay4bMNzQ_x6QqU0m3pTUuhW0pd5uz-PU5WAcqM_WavFNY4_WR7eCMOrg2hlFnDE8vGUX4yPHkGq3Y/s1600/True+caller+unlist+form+3.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="341" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjf3BH6TByYmWuot7ibc25qGvJ1kqVljFZ7su3Mu0d4eN3K9R6FeeMNQNlKjODZwcay4bMNzQ_x6QqU0m3pTUuhW0pd5uz-PU5WAcqM_WavFNY4_WR7eCMOrg2hlFnDE8vGUX4yPHkGq3Y/s400/True+caller+unlist+form+3.JPG" width="400" /></a></div>
<br />
<div class="MsoNormal">
Then click unlist. That’s it ..<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
You are done with this. Your all information currently from
the database will be cleared and your personal information will be safe.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
Follow us for more useful info’s …<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
</div>
Techstuffshttp://www.blogger.com/profile/02481127963759289385noreply@blogger.com0tag:blogger.com,1999:blog-3545177704524048658.post-47105932847499698562015-08-12T04:57:00.001-07:002015-10-02T20:39:00.378-07:00Get free Domains!!<div dir="ltr" style="text-align: left;" trbidi="on">
love to Share<br />
<br />
Hello readers today I am going to post one thing which will be very helpful to many bloggers and others. Do you want to pay for buying a domain? No! Not at all.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhM_hO6ezusClbK9BPUJF0jU9G_24DjRWhFYH3VEMIl5zFFgKIEbLrRfEdtAe4iBK8l5ad3EgWw3tWGPwVuh0CkLyUL0hyphenhyphena83xn85p-s0Cca5zLcA01HqmkC-r6xGiX0y6LilSluIgoGpw0/s1600/logo.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="www.allstuffsforyou.blogspot.com" border="0" height="66" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhM_hO6ezusClbK9BPUJF0jU9G_24DjRWhFYH3VEMIl5zFFgKIEbLrRfEdtAe4iBK8l5ad3EgWw3tWGPwVuh0CkLyUL0hyphenhyphena83xn85p-s0Cca5zLcA01HqmkC-r6xGiX0y6LilSluIgoGpw0/s400/logo.png" title="Domain for free" width="400" /></a></div>
<br />
Get free domains with different extensions here.<br />
<br />
<h4 style="text-align: left;">
<a href="https://getdotbit.com/" rel="nofollow" target="_blank">GetdotBit</a> - Here you can get free .bit domain name</h4>
<h4 style="text-align: left;">
<a href="https://go.college/" rel="nofollow" target="_blank">Go college</a> - Here you can get free .college domain name</h4>
<h4 style="text-align: left;">
<a href="https://www.mindsandmachines.com/" rel="nofollow" target="_blank">mindsandmachines</a> here you can get free .casa and .work domain names</h4>
<h4 style="text-align: left;">
<a href="https://pop.co/" rel="nofollow" target="_blank">Pop</a> here you can get free .co but is only for Canada and United States </h4>
<div>
Comment here if you got it :-)<br />
<br />
<div style="text-align: center;">
--- CLICK THE ADD'S ON SIDES AND HELP US ----</div>
</div>
</div>
Rakesh Shanmugamhttp://www.blogger.com/profile/05239307734840019806noreply@blogger.com0tag:blogger.com,1999:blog-3545177704524048658.post-85033985045139159012015-08-09T06:46:00.000-07:002015-08-09T06:50:32.090-07:00Learn Python for free<div dir="ltr" style="text-align: left;" trbidi="on">
love to Share<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhs1fZp6Vq4f2_L3hs9NQb9OPrrEk6sTSuKibIYoZ4XYMEPsiK74NNHch9A1rlce37thUVFfE7IMyE4AiRGFDWx_gQZGbOpQ8o9o3AoE1icPqy9O4Sic7ZUqr9kgt-9Ta1lOORmXmo6JYwb/s1600/python-logo-master.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="171" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhs1fZp6Vq4f2_L3hs9NQb9OPrrEk6sTSuKibIYoZ4XYMEPsiK74NNHch9A1rlce37thUVFfE7IMyE4AiRGFDWx_gQZGbOpQ8o9o3AoE1icPqy9O4Sic7ZUqr9kgt-9Ta1lOORmXmo6JYwb/s400/python-logo-master.png" width="400" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Python to specialize</td></tr>
</tbody></table>
<br />
Hi coders!<br />
<br />
Here is a opportunity for you all to learn another programming language for free.<br />
<br />
<h3 style="text-align: left;">
What is PYTHON?</h3>
<blockquote class="tr_bq">
Python is an interpreted, object-oriented programming language similar to PERL, that has gained popularity because of its clear syntax and readability.</blockquote>
<br />
<a href="https://www.cybrary.it/register/" rel="nofollow" target="_blank">Learn Python here</a><br />
<br />
Join with us on mail for more.</div>
Rakesh Shanmugamhttp://www.blogger.com/profile/05239307734840019806noreply@blogger.com0tag:blogger.com,1999:blog-3545177704524048658.post-33303317987807376442015-07-25T06:36:00.000-07:002015-07-25T06:36:23.353-07:00Download Videos from popular sites without any software<div dir="ltr" style="text-align: left;" trbidi="on">
love to Share<br />
<br />
I just wanna keep my tongue to the point. No more stories :v. Want to download videos from popular websites like youtube, vimeo, dailymotion etc.,<br />
<br />
Just follow the steps. No software's required.<br />
<br />
<b>Step 1:</b><br />
First copy the link of the video you want to watch<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGtuD_kblSdM9M_ZEGC31bdDlLFl9ndlsU1Tn-PAt3iYabwqPofoeoLxuJR4EZXibhcJGvJnoodFoAMJPwXpE4-PSbBxd4oXSh3qOagMOnVZWA4gdKt4wVam_gVEu6WLyRsuUMXHrXmDYR/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGtuD_kblSdM9M_ZEGC31bdDlLFl9ndlsU1Tn-PAt3iYabwqPofoeoLxuJR4EZXibhcJGvJnoodFoAMJPwXpE4-PSbBxd4oXSh3qOagMOnVZWA4gdKt4wVam_gVEu6WLyRsuUMXHrXmDYR/s320/1.png" width="320" /></a></div>
<br />
<b>Step 2:</b><br />
Now go to <a href="http://en.savefrom.net/" target="_blank">savefrom.net</a> site by clicking here<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-JTqOfpWUXt6EuJjhvZmwVSyGyA7RzBiJXA5zuJuVR90bbhS3-L0hrmpPHD6kXORjF7TbG3Pl-oKHaHUu3vh-Nwhs65UpNPNCO7FsSn9Q0IoTrNFlYu0f2NTzzeujov9Q93QR9xIvgB-X/s1600/2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-JTqOfpWUXt6EuJjhvZmwVSyGyA7RzBiJXA5zuJuVR90bbhS3-L0hrmpPHD6kXORjF7TbG3Pl-oKHaHUu3vh-Nwhs65UpNPNCO7FsSn9Q0IoTrNFlYu0f2NTzzeujov9Q93QR9xIvgB-X/s1600/2.png" width="400" /></a></div>
<br />
<b>Step 3:</b><br />
Now paste the link in the box and proceed.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYrhKDDL5wOozP6Y9Nq8-3R7pkFNWUhUbytGtBySCeLrx2RvBlj58HAl7dTl-GX2UTylRc4nGk59gGyNOfMmo-x_dVCYL1YxGUtpDVgmyse5iZy0lupCw_OvNGFbXlMJ6RL32SobkntCTr/s1600/3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYrhKDDL5wOozP6Y9Nq8-3R7pkFNWUhUbytGtBySCeLrx2RvBlj58HAl7dTl-GX2UTylRc4nGk59gGyNOfMmo-x_dVCYL1YxGUtpDVgmyse5iZy0lupCw_OvNGFbXlMJ6RL32SobkntCTr/s400/3.png" width="400" /></a></div>
<br />
Step 4:<br />
Click the download button. That's it you are done.<br />
<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjQU6PslarvhqcKjF7JEJVl07-iUchEUjFEkN42kxRPLrLc6kOZJaLtEQ1vtc7Sp-Afx0MD3JcCsVNOH3Rkxw5igjkwov72rnPPZ5p4ZA2H8jPlJDK8iYApO2T8lFpYeHVdf00FPcrkHA8/s1600/4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjQU6PslarvhqcKjF7JEJVl07-iUchEUjFEkN42kxRPLrLc6kOZJaLtEQ1vtc7Sp-Afx0MD3JcCsVNOH3Rkxw5igjkwov72rnPPZ5p4ZA2H8jPlJDK8iYApO2T8lFpYeHVdf00FPcrkHA8/s320/4.png" width="320" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
Is this post useful for you? Subscribe us for more updates.</div>
</div>
Rakesh Shanmugamhttp://www.blogger.com/profile/05239307734840019806noreply@blogger.com0tag:blogger.com,1999:blog-3545177704524048658.post-79241820002745601692015-07-01T08:47:00.001-07:002015-07-01T08:47:16.816-07:00How to get free genuine windows 10 even if you don't have windows 7 or 8<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjraTyJ8qfkmfUd_NdujXJbKSQ5FP5P_IjQokPxYpPfReGll6o5Mb-TY69KuTXLENvhyxAOk3-PFMiWpS2KD9wAx-D6noGePUoA5MJRJKm0-92pVGEXIFuDFd1296GhMmfnZX2XCegqr6Q/s1600/free-windows-10-how-to.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="169" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjraTyJ8qfkmfUd_NdujXJbKSQ5FP5P_IjQokPxYpPfReGll6o5Mb-TY69KuTXLENvhyxAOk3-PFMiWpS2KD9wAx-D6noGePUoA5MJRJKm0-92pVGEXIFuDFd1296GhMmfnZX2XCegqr6Q/s320/free-windows-10-how-to.jpg" width="320"></a></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;"><br></span></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;"> It’s an old
news that Windows 10 will be available as a free download to Windows 7 and
Windows 8 users. This upgrade will be available to the users free of cost if
they will avail this upgrade offer within one year starting from July 29. Now
what if you don’t have Windows 8 or 7 and you want to get your hands on Windows
10?<o:p></o:p></span></div>
<div class="MsoNormal">
<br></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;">According to
a new process highlighted by Microsoft in a new blog post, you can avail free
Windows 10 without Windows 7 or 8. If you are running the Insider Preview of
Windows 10, build number 10130, you will be able to get the final release build
on July 29 and further releases. Microsoft highlights that this version will be
genuine.<o:p></o:p></span></div>
<div class="MsoNormal">
<br></div>
</div><a href="https://allstuffsforyou.blogspot.com/2015/07/how-to-get-free-genuine-windows-10-even.html#more">Read more »</a>Techstuffshttp://www.blogger.com/profile/02481127963759289385noreply@blogger.com0tag:blogger.com,1999:blog-3545177704524048658.post-69835281680061793282015-07-01T08:36:00.000-07:002015-07-01T08:38:46.084-07:00Set up VPN on android devices (No Software Needed)<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;"> </span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://allstuffsforyoublogspot.com/-MAkRGluIdXg/VZQIe5vT5jI/AAAAAAAAAFc/MuArEZnZJ40/s1600/setup-vpn-520x245.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSLxAqfk17cLWNGPEm4SQye7UjmWD_jqCzcJPgheq7P-eh5Y1XWXBvZNjqEOx5-uLq1TlO26oLzl4qIlmqeCkTxG_uyBp-pNcmX7lZRpRi5_bB-Yb8wJAaFS4mYuMskah8haVTPyPlqwo/s320/setup-vpn-520x245.jpg" width="320"></a></div>
<br>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;"> Hello readers!! Usually public Wi-Fi
networks seem really convenient don’t they! Whether you are at McDonald’s (or
just any other food joint offering an open Wi-Fi network for that sake),
roaming around your college campus, just one tap of a button on your smartphone
and voila the power of an internet connection rests in your hands.<o:p></o:p></span></div>
<div class="MsoNormal">
<br></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;">With hackers
and in fact sometimes our own governments lurking around, looking for just one
opportunity to steal your data, you might want to give serious reconsideration
before connecting. Somehow the idea of my bank credentials and personal
information resting in someone else’s hands doesn’t seem to be very enthralling
to me.<o:p></o:p></span></div>
<div class="MsoNormal">
<br></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;">So how to
overcome this problem? Simple just configure a Virtual Private Network (VPN).<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;">A VPN would
allow you to connect your device up to a secure connection to another network
over the internet. In fact you can use it to access your home/company network
while you are away, download apps which are not available in your country or
simply keep your browsing and data secure over the public network.<o:p></o:p></span></div>
<div class="MsoNormal">
<br>
</div></div><a href="https://allstuffsforyou.blogspot.com/2015/07/set-up-vpn-on-android-devices-no.html#more">Read more »</a>Techstuffshttp://www.blogger.com/profile/02481127963759289385noreply@blogger.com0tag:blogger.com,1999:blog-3545177704524048658.post-5107510027853391572015-06-29T19:52:00.000-07:002015-06-29T19:52:20.972-07:00Tuesday has one second extra!! What will happen to Internet?<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: left;">
Love to Share</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQ8kyLeUgv1VS82eR4_PKbzLn7eewWjlEIsu7i5D7bXNuZt5FZ50-wL34SvetuNTqLrWjgOKDU-IVAcSxax8tKBgVEBY4ThVWFRRS9zYacTmZnEEXCPWHkWgPUqryhaAZeBbzOJu4SvrU/s1600/leap_second_NASA.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQ8kyLeUgv1VS82eR4_PKbzLn7eewWjlEIsu7i5D7bXNuZt5FZ50-wL34SvetuNTqLrWjgOKDU-IVAcSxax8tKBgVEBY4ThVWFRRS9zYacTmZnEEXCPWHkWgPUqryhaAZeBbzOJu4SvrU/s320/leap_second_NASA.jpeg" width="320" /></a></div>
<div class="MsoNormal" style="text-indent: 36.0pt;">
<span style="font-size: 13.0pt; line-height: 107%;"><br /></span></div>
<div class="MsoNormal" style="text-indent: 36.0pt;">
<span style="font-size: 13.0pt; line-height: 107%;">This Tuesday, a single second will be added to clocks around
the world to help counter Earth’s rotation slowing down.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;">Called a
“leap second,” it has been added approximately every 18 months since 1972 to
rectify ‘lost’ time from the slowing rotation, ensuring that the atomic clock
is in sync with Earth.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;">Humans can
handle the additional second without even being aware of it, but computers
aren’t quite accustomed to the path of time suddenly changing.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;">A leap
second was last added to the clock in 2012, during a weekend, which wreaked
havoc online.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;">It caused
Reddit, Foursquare, Yelp, LinkedIn, Gawker and StumbleUpon to be knocked
offline entirely, as well as hundreds of flights to be delayed in Australia.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;">Many issues
were caused by a bug in the Network Time Protocol used to keep Linux system
clocks in sync. The flaw caused NTP to lock up some systems entirely, requiring
a reboot before they could recover.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;">When the
leap second comes around, it means the system clock sees an additional figure,
like so:<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;">2011-12-31
23.59.57<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;">2011-12-31
23.59.58<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;">2011-12-31
23.59.59<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;">2011-12-31
23.59.60 <– leap second<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;">2012-01-01
00.00.00<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;">2012-01-01
00.00.01<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;">2012-01-01
00.00.02<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;">The second
will be inserted into network time services at the exact same moment worldwide,
on June 30th at 23:59:60 UTC.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;">This time
around it’s critical that businesses are ready, with the leap second being
added during a time when trading on stock markets is open.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;">Some
businesses are ready for the leap second to be added, like Google and Amazon,
which adjust server clocks gradually over a number of weeks so that it’s not a
sudden change.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;">Others that
rely on time-critical systems — like stock markets and utilities — are nervous
about it going wrong. A single second of downtime for a stock market means up
to $4.6 million could be lost.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;">Linux
systems shouldn’t break tomorrow — the bug that affected them last time has
since been resolved, along with other issues found in Java and other operating
systems.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;">The leap
second is mostly a headache for system administrators who need to ensure their
services are highly available and need to plan how to handle the change.
Hardware providers such as Cisco now provide detailed advice on how their
hardware handles the leap second, but the side effects are unpredictable.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<br />
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;">Leap seconds
might not be around for much longer with the International Telecommunications
Union planning to vote on a proposal to eliminate the leap second in November
2015.<o:p></o:p></span></div>
</div>
Techstuffshttp://www.blogger.com/profile/02481127963759289385noreply@blogger.com0tag:blogger.com,1999:blog-3545177704524048658.post-91154393414050413692015-06-18T03:33:00.000-07:002015-06-18T03:33:19.278-07:00Redirect to any website using Google<div dir="ltr" style="text-align: left;" trbidi="on">
love to Share<br>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9HrRW2iviLXzkPdHLxr2WL_vvnc2XLAS2nDQqyYYTD4UQKsoZc6KYWcdB_JcTDMhkRdxkDNJ4ARY5m0jfoQSWKHgq8MSwuWajBArqOCcTXF5lIvvXXpTgdOwnMRp8e2rjzLSn50r2V30/s1600/aei.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="125" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9HrRW2iviLXzkPdHLxr2WL_vvnc2XLAS2nDQqyYYTD4UQKsoZc6KYWcdB_JcTDMhkRdxkDNJ4ARY5m0jfoQSWKHgq8MSwuWajBArqOCcTXF5lIvvXXpTgdOwnMRp8e2rjzLSn50r2V30/s320/aei.png" width="320"></a></div>
<br>
<div class="MsoNormal" style="text-indent: 36.0pt;">
<span style="font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;">Google
redirect exploit is very popular in web world. It seems like a simple link for
Google page but when user click on that link they get redirected to other
webpage which may contain spam or other exploits.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-indent: 36.0pt;">
<span style="font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;">You
can simply build your own google redirect exploit, you dont need any special
tool or programming for this exploit.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-indent: 36.0pt;">
<span style="font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;">Today
I will show you to make google link that redirects you to any webpage you wish.
This url will start with www.google.com and followed with some characters and
symbols. You can trick users to visit your site by changing your webpage url
that look like google. As no one will doubt google. </span></div>
<div class="MsoNormal">
<span style="font-size: 13pt; line-height: 107%;">so lets get into it</span></div>
<div class="MsoNormal">
<span style="font-size: 13pt; line-height: 107%;"></span></div>
</div><a href="https://allstuffsforyou.blogspot.com/2015/06/redirect-to-any-website-using-google.html#more">Read more »</a>Techstuffshttp://www.blogger.com/profile/02481127963759289385noreply@blogger.com0tag:blogger.com,1999:blog-3545177704524048658.post-28596236517179226202015-06-15T19:39:00.000-07:002015-06-15T19:39:52.214-07:00How to enable copy paste in CMD Windows<div dir="ltr" style="text-align: left;" trbidi="on">
<br>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjQi3p1MQQUVSMU9eMHZXeBPCJBkFcMtJN2eDwjtFK0MfQ8s7TqZLMOl9Su6NbarPr6MF1aC50wbzkT6A8ha_89WBouEXiXe6aj080cS5hb-5OwvfgtULg06gxGTQQX0FEMOWgJq6iVcwe/s1600/images.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjQi3p1MQQUVSMU9eMHZXeBPCJBkFcMtJN2eDwjtFK0MfQ8s7TqZLMOl9Su6NbarPr6MF1aC50wbzkT6A8ha_89WBouEXiXe6aj080cS5hb-5OwvfgtULg06gxGTQQX0FEMOWgJq6iVcwe/s1600/images.jpg"></a></div>
Hello Users!! By Default Windows do not allow users to Copy text and Paste it in Command prompt Or Copy text from Command prompt and paste it elsewhere. But there is an option in CMD itself to enable Copy & Paste Text in Windows Command Prompt.<br>
Today in this tutorial we will learn how to Enable Copying and Pasting Texts in Windows Command prompt. One of the main advantage of this will be that you can copy any command that you find on the internet or from any word/excel file and paste it directly in CMD and execute that command just like that.<br>
<br>
</div><a href="https://allstuffsforyou.blogspot.com/2015/06/how-to-enable-copy-paste-in-cmd-windows_15.html#more">Read more »</a>Rakesh Shanmugamhttp://www.blogger.com/profile/05239307734840019806noreply@blogger.com0tag:blogger.com,1999:blog-3545177704524048658.post-9607439558072640412015-06-13T00:30:00.001-07:002015-06-13T00:30:45.772-07:00How to increase laptop battery life<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgK1j96MRim9mhAmtq1Vm1c1Vtr5UdEcT8ZGZg3vYpYLoBYXIS0YFBYRJ4Pp4ArXvEmQjTucVGtjsLlgRVLXrZMqnLc8aE15RlSPUwtn0V8J-vKE3zUfo6rsIzJUpzn-uklhdkIQSvi5v8/s1600/battery-life-2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="178" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgK1j96MRim9mhAmtq1Vm1c1Vtr5UdEcT8ZGZg3vYpYLoBYXIS0YFBYRJ4Pp4ArXvEmQjTucVGtjsLlgRVLXrZMqnLc8aE15RlSPUwtn0V8J-vKE3zUfo6rsIzJUpzn-uklhdkIQSvi5v8/s320/battery-life-2.jpg" width="320"></a></div>
<div class="MsoNormal" style="text-indent: 36.0pt;">
<span style="font-size: 13.0pt; line-height: 115%;"><br></span></div>
<div class="MsoNormal" style="text-indent: 36.0pt;">
<span style="font-size: 13.0pt; line-height: 115%;">One of the most critical parts of your laptop is its battery.
If the battery wears out, the laptop just doesn’t seem usable at all. The speed
goes for a toss and the heating goes so high that you can start using the
laptop as a heater as well.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 115%;">While people
will recommend you to change your laptop battery frequently, its advisable that
you use your current laptop battery to its maximum potential before going for
the new one. In this article, I will tell you how to maximise the efficiency of
your laptop battery so that you can take it that extra mile before getting a
new battery altogether.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 115%;"><br></span></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 115%;">Lets get
right into it –<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 115%;"><b></b></span></div>
</div><a href="https://allstuffsforyou.blogspot.com/2015/06/how-to-increase-laptop-battery-life.html#more">Read more »</a>Techstuffshttp://www.blogger.com/profile/02481127963759289385noreply@blogger.com0tag:blogger.com,1999:blog-3545177704524048658.post-60814064346914759842015-06-12T21:05:00.000-07:002015-06-12T21:05:53.571-07:00Prank Calling - Tips and Tricks<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYQAGdiS77KEeS1YsFYwMOIIseeDOkHSkHGL21SVeoEWLrwYF6TTRbMkx1mPyCApSeJO9Hardb0c0zumw2Mpsy-qxQP0GCi1MWO1UH49I1em21OpWIBlcVehVM1TfTQWF0qQWj2JSIbrs/s1600/banner-3.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="118" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYQAGdiS77KEeS1YsFYwMOIIseeDOkHSkHGL21SVeoEWLrwYF6TTRbMkx1mPyCApSeJO9Hardb0c0zumw2Mpsy-qxQP0GCi1MWO1UH49I1em21OpWIBlcVehVM1TfTQWF0qQWj2JSIbrs/s320/banner-3.jpg" width="320"></a></div>
<br>
<div class="MsoNormal" style="text-indent: 36.0pt;">
<span style="font-size: 13.0pt; line-height: 115%;">Hello Users!! One of the oldest pranks in the book is prank
calling. Prank calling has been around for a very long time , and no matter how
often you do it, it never gets stale. Prank calling has its types, one where
you call someone you know from an unknown number and confuse the hell out of
him or her. The other is to use an unknown number to call an unknown person.
Now, while all this sounds easy and entertaining, the prank does not
necessarily go down well with the victims. While some take it sportingly, there
are few who go as far as threatening legal action over you. So, before I start
this tutorial, keep in mind, that the trick I am sharing is traceable, and I am
not responsible for any damage or hard feeling caused due to this. With that on
the record, lets begin –<o:p></o:p></span></div>
<div class="MsoNormal">
<br></div>
</div><a href="https://allstuffsforyou.blogspot.com/2015/06/prank-calling-tips-and-tricks.html#more">Read more »</a>Techstuffshttp://www.blogger.com/profile/02481127963759289385noreply@blogger.com0tag:blogger.com,1999:blog-3545177704524048658.post-91819254767885451762015-06-12T07:05:00.000-07:002015-06-13T02:11:19.981-07:00Feature's you gonna miss in Windows 10 <div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormal" style="text-indent: 36.0pt;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlOZTO1C8HpKVb_eVo7SBXzyxEglLcrtCGPZdqXk5pruEZF02FpyTxcnK6p36fJOR6i7OUtu0qzmytkBWrPDOG0InkOBSqiCPgykWbRHlZgeyk5z_yeK76CVGf_75tcsoA44e4H3tId54L/s1600/windows-10-features.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="149" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlOZTO1C8HpKVb_eVo7SBXzyxEglLcrtCGPZdqXk5pruEZF02FpyTxcnK6p36fJOR6i7OUtu0qzmytkBWrPDOG0InkOBSqiCPgykWbRHlZgeyk5z_yeK76CVGf_75tcsoA44e4H3tId54L/s320/windows-10-features.jpg" width="320"></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br></div>
<span style="font-size: 13.0pt; line-height: 107%;"><br></span>
<span style="font-size: 13.0pt; line-height: 107%;">Hello readers!! As July 29, the release of Windows 10 comes
closer, new features and functions are making their appearance each day. But
there are some features from your Windows 7 and Windows 8 PC that will no
longer work when you’ll upgrade your PC to Windows 10.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;">In this
article, we try to mention some of the worst sacrifices that you’ll be making
with Windows 10.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%;"></span></div>
</div><a href="https://allstuffsforyou.blogspot.com/2015/06/features-you-gonna-miss-in-windows-10.html#more">Read more »</a>Rakesh Shanmugamhttp://www.blogger.com/profile/05239307734840019806noreply@blogger.com1tag:blogger.com,1999:blog-3545177704524048658.post-29975994743061564632015-06-08T07:50:00.000-07:002015-06-08T07:50:27.661-07:00Find if anyone has logged into your Computer without Permission<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxs7P0vL7T5HlNXA7y9xVld1fMECAGhPmHvGG4bVMFkqNOFCYFwcJg0Ul-9pRLQ6Pf71_F1DOMSLZXO2tPvn1CwRkqhg_deM6yaEnDD7N2J1zL7zNs6bZRjXDfeN5X3blvU5Jm8yr_BIxk/s1600/a92d0061-28ab-4972-8f8f-eec6eda1fd59_61.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="251" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxs7P0vL7T5HlNXA7y9xVld1fMECAGhPmHvGG4bVMFkqNOFCYFwcJg0Ul-9pRLQ6Pf71_F1DOMSLZXO2tPvn1CwRkqhg_deM6yaEnDD7N2J1zL7zNs6bZRjXDfeN5X3blvU5Jm8yr_BIxk/s320/a92d0061-28ab-4972-8f8f-eec6eda1fd59_61.jpg" width="320"></a></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><br></span></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;">Hello readers, today let us know how
to know Who logged into your Computer and When?<o:p></o:p></span></div>
<div class="MsoNormal" style="text-indent: 36.0pt;">
<span style="font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><br></span></div>
<div class="MsoNormal" style="text-indent: 36.0pt;">
<span style="font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;">In
Windows, there is one in-built too will records all events in your computer
called “Event Viewer”. This application records all your computer activities
from login to log off etc.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-indent: 36.0pt;">
<span style="font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"></span></div>
</div><a href="https://allstuffsforyou.blogspot.com/2015/06/find-if-anyone-has-logged-into-your.html#more">Read more »</a>Rakesh Shanmugamhttp://www.blogger.com/profile/05239307734840019806noreply@blogger.com0tag:blogger.com,1999:blog-3545177704524048658.post-25279742280922690362015-06-07T11:20:00.000-07:002015-06-08T08:13:46.506-07:00How to hide your IP Address?<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormal" line-height: 20.4pt; margin-bottom: 19.2pt; text-align: justify; vertical-align: baseline;">
<span style="color: #202020; font-size: 13.0pt; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;"> </span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://allstuffsforyou.blogspot.com/-0jQ2c6PQvAI/VXPi8HxtPjI/AAAAAAAAB9g/uUK-1gzwDno/s1600/hide_my_location.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="123" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAKYToeXvuk7rsITvskHaBbfvXB_T2sG8nCn5F-OzREORPJPvQmuES-HqF6JeWDqFxCS4g8NhUvk1DhQa246BuBTDQTkjnEDRM3pD-4y10mYp4J9I47yJuXGyz_KIWSzRonCLqXMSA9xYV/s320/hide_my_location.jpg" width="320"></a></div>
<br>
<div class="MsoNormal" line-height: 20.4pt; margin-bottom: 19.2pt; text-align: justify; vertical-align: baseline;">
<span style="color: #202020; font-size: 13.0pt; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;"> Every
computer on the Internet has a unique IP address allotted to it which makes it
possible to trace it back to its exact location. Even though the concept of IP
address has been designed for its transparency and traceability, in some cases
this questions the privacy of the Internet users where one would not like to
reveal his/her identity to the outside world.<o:p></o:p></span></div>
<div class="MsoNormal" line-height: 20.4pt; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify; vertical-align: baseline;">
<span style="color: #202020; font-size: 13.0pt; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;">Well, if you are one such person who is in search of ways to <b><span style="border: none windowtext 1.0pt; mso-border-alt: none windowtext 0cm; padding: 0cm;">hide your IP address</span></b>, then you are at the right place.
In this post, I will discuss some of the easy and popular ways to mask your IP
address so that your identity and privacy is kept safe.<o:p></o:p></span></div>
<div class="MsoNormal" line-height: 17.85pt; margin-bottom: 10.8pt; mso-outline-level: 2; vertical-align: baseline;">
<b><span style="font-size: 13pt;">Why
Hide IP Address?<o:p></o:p></span></b></div>
<div class="MsoNormal" line-height: 20.4pt; margin-bottom: 19.2pt; text-align: justify; vertical-align: baseline;">
<span style="color: #202020; font-size: 13.0pt; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;">The
following are some of the common reasons why people want to mask their IP
address online:<o:p></o:p></span><br>
<span style="color: #202020; font-size: 13.0pt; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;"></span><br>
</div></div><a href="https://allstuffsforyou.blogspot.com/2015/06/how-to-hide-your-ip-address.html#more">Read more »</a>Rakesh Shanmugamhttp://www.blogger.com/profile/05239307734840019806noreply@blogger.com0tag:blogger.com,1999:blog-3545177704524048658.post-74689474703214337172015-06-06T23:15:00.000-07:002015-06-08T08:10:13.627-07:00Format pendrive using CMD – How to guide<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="MsoNormal" margin-bottom: 18.75pt; text-indent: 36pt;">
<div class="separator" line-height: 22.3pt; text-align: center;">
<a href="http://allstuffsforyou.blogspot.com/-R9zaiLRHVGg/VXPglH_iq0I/AAAAAAAAB9U/g9-iMZvbXSA/s1600/Prevent-Pendrives-from-Viruses-690x335.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="155" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGbkuqfIuXNc_0Pmaj5MSTnrAVLeTITC72ZY4MBUxmSUIyqZbCe7lYjMUUVZMQ821NnIGS_SukEM5xe-OlV3J1Q02nlCDUswCOlkxcl7KhhZ2t1pIGwh0zjgDyrUlDCc3cX7Ju-yWV5Wyf/s320/Prevent-Pendrives-from-Viruses-690x335.jpg" width="320" /></a></div>
<div>
<div style="line-height: 22.3pt;">
<br /></div>
<span style="font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;">Formatting is a valuable and essential tool when dealing with any type of storage disk and can help to solve a lot of errors and headaches. But what do you do if your USB flash drive needs to be formatted but, every time you try through the property menus it comes up with an error, or won’t even recognise the drive properly at all. Don’t despair because here is something you can do.</span><br />
<span style="font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;">Format pendrive using cmd is a common process that may need to be undertaken quite frequently, but unless you have gone through this procedure before it can be a mine field. The last thing you want is to finish the process and end up with an unusable pendrive . Here is a quick step by step guide to Format pendrive using cmd</span><br />
<div style="text-align: center;">
<span style=“font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;”>________________________________________</span></div>
<div style="text-align: center;">
<span style=“font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;”> STEPS TO FORMAT PENDRIVE USING </span></div>
<div style="text-align: center;">
<span style="line-height: 29.7333335876465px; text-indent: 36pt;"> CMD</span></div>
<div style="text-align: center;">
<span style="font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;">______________________________________</span></div>
<span style="font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;">This guide formats your flash drive as FAT32, to format as NTFS simply substitute the term in the command box. FAT32 is the recommended formatting style by this guide but many do prefer NTFS. Follow the Below steps to Format an unformatable Pendrive.</span><br />
<span style=“font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;”>Step 1. Turn on computer as normal</span><br />
<span style=“font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;”>Step 2. Once you are in your desktop insert Pendrive into USB port</span><br />
<span style=“font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;”>Please note: if you know the letters associated with your disk locations or can use a utility such as disk part to list this information then skip steps 3 and 4</span><br />
<span style=“font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;”>Step 3. Go into my computer (accessible from the start menu or desktop) and look down the navigation panel on the left hand side, this lists down to the popular and root menu folders and locations on your computer.</span><br />
<span style=“font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;”>Step 4. Your Pendrive should be listed in one of these locations, it may be referred to by brand, as portable storage or something similar. Next to this label will be a letter,</span><br />
<span style=“font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;”>For example “G: removable storage device ” if the device does not show up you may need to test the port to find the letter with another USB device. This letter needs to be written down or remembered in order to complete this process.</span><br />
<span style=“font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;”>Step 5. Go to the windows start menu, click start or the Windows symbol depending on your edition of Windows, then click run.</span><br />
<span style=“font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;”>Step 6. Type cmd into the run dialog box and click OK, this is to start the command prompt window from which you will be able to choose your format style and name your drive.</span><br />
<span style=“font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;”><br /></span>
<span style=“font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;”>Step 7. Then the command prompt window is opened and you will need to type “ Format G: ”</span></div>
</div>
<div class="MsoNormal">
<div class="separator" style="clear: both; text-align: center;">
<img border="0" height="161" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBZbSZpIOdCSJmbC6ovebDOZNrBS38V_1os-d196p4BcTXXH6LdPaXpP3H1GByHn9d-JzijOYlHQ1dgbJqfCYtYSW9-iKtWVpv9d1-Kb7UTrgvYKbYm661EacSRgfNLabLb1lOhbtpUk1o/s320/Format-pendrive.jpg" width="320" /></div>
<br /></div>
<div class="MsoNormal">
<div class="MsoNormal" style="text-align: center;">
<span style="font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;">if you want to Format it as FAT32 then type ” Format G: /FS: FAT32 ”<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><br /></span></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><b>Step 8</b>. The G in this instance refers
to our example Pendrive location, instead you would enter the letter that you
remembered or wrote down from the mycomputer side panel<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;">After you have typed the above command
press enter.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><b>Step 9</b>. Here, you will be asked to
press enter again and then to give a name for your drive. Follow these prompts
then click on enter again.<o:p></o:p></span></div>
<br />
<div class="MsoNormal">
<span style="font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;">You have completed the process of
Formating pendrive using cmd; go back into my computer to check that the
formatting has been completed successfully.<o:p></o:p></span></div>
</div>
<div align="center" style="background: white; line-height: 22.3pt; margin-bottom: 18.75pt; margin-left: 0cm; margin-right: 0cm; margin-top: 0cm; text-align: center;">
<br /></div>
<div style="background: white; line-height: 22.3pt; margin-bottom: 18.75pt; margin-left: 0cm; margin-right: 0cm; margin-top: 0cm;">
<br />
<span style="font-size: 13.0pt; line-height: 107%; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;">Also read <a href="http://allstuffsforyou.blogspot.in/2015/06/3-steps-to-show-hidden-files-caused-by.html" target="_blank">3 Steps to show hidden files caused by virus infection</a></span></div>
</div>
Rakesh Shanmugamhttp://www.blogger.com/profile/05239307734840019806noreply@blogger.com2tag:blogger.com,1999:blog-3545177704524048658.post-58246189741896632302015-06-04T15:28:00.000-07:002015-06-05T05:39:20.001-07:00Secret Hacking Codes for iPhone<strong> </strong> Hello TechStuff users here is another post which excites you most. Every day there are new mobiles launching in world. But still iPhone has its strike towards the people community. Here are some hacking codes for iPhone 4 or 4s<br><br><strong>Secret Hacking Codes for iPhone</strong><br><br>*#43#<br><br><span style="line-height:1.6;">Use to verify if call waiting is enabled</span><br><br><a href="https://allstuffsforyou.blogspot.com/2015/06/secret-hacking-codes-for-iphone.html#more">Read more »</a>Techstuffshttp://www.blogger.com/profile/02481127963759289385noreply@blogger.com0tag:blogger.com,1999:blog-3545177704524048658.post-68182511676892988372015-06-04T13:14:00.000-07:002015-06-05T05:39:19.988-07:003 Steps to show hidden files caused by virus infectionWe do believe that everyone have experience with computer viruses and most of it is bad experience. Today we will share 3 Steps to Show Hidden Files Caused by Virus Infections. This tips and trick purpose is to help you who have difficulties showing hidden files because of virus infection.<br><br>This tips and trick is for Windows users, because most virus in the wild is targeting Windows operating system since they have the largest users in the world.<br><br><strong>Requirements:</strong><br><ul><br> <li> Command prompt</li><br></ul><br><strong>3 Steps to Show Hidden Files Caused by Virus Infections :</strong><br><br><a href="https://allstuffsforyou.blogspot.com/2015/06/3-steps-to-show-hidden-files-caused-by.html#more">Read more »</a>Techstuffshttp://www.blogger.com/profile/02481127963759289385noreply@blogger.com0tag:blogger.com,1999:blog-3545177704524048658.post-5248639523729748332015-06-03T11:32:00.000-07:002015-06-05T05:39:19.961-07:00Download windows 8, 8.1 legally without Product keyInstalling a fresh Windows 8.1 hasn’t been the easiest thing in the world till now as Windows 8 users needed a licensed product key for upgrading their systems to the latest version of<span style="font-style:inherit;font-weight:inherit;"> Windows operating system. Other problems were you couldn’t use your old Windows 8 key to install Windows 8.1 or choose the installation architecture.</span><br><br>To solve these trifling issues, Microsoft has quietly released a tool that solves all of them. This tool is called Windows Installation Media Creation Tool. This applies for Windows 8 and Windows 8.1 How to use this tool to download Windows 8.1 Pro legally without product key is pretty straightforward and simple but here’s how to do this:<br><h2><strong>Download Windows 8.1 Pro Legally Without Product Key:</strong></h2><br><a href="https://allstuffsforyou.blogspot.com/2015/06/download-windows-8-81-legally-without.html#more">Read more »</a>Techstuffshttp://www.blogger.com/profile/02481127963759289385noreply@blogger.com2tag:blogger.com,1999:blog-3545177704524048658.post-8258816915681299942015-05-30T03:35:00.000-07:002015-06-05T05:39:19.950-07:00Meet TARS; A Whatsapp based personal assistantCo-founded by Vinit Agarwal and Ish Jindal, Tars is an on demand service which uses Whatsapp to take users’ requests like Google search, making phone calls and reservations, read through reviews, compare prices, order a Pizza, call for a Plumber, Meaning of any word, etc. TARS, a startup based out of Bangalore, India has created a <strong>Whatsapp based personal assistant</strong> that will answer all your questions, as long as they are within it’s purview. It is a sort of artificial intelligence program which is partially based on the local agents to work. TARS personal assistant is available to you from 10 AM to 10 PM.<br/><br/>If you are curious of the name <strong>TARS</strong> – it is the name of a robot in hit Hollywood movie “Interstellar” who helps astronauts in their inter-galactic travels. The website claims, Tars is partially an artificial intelligence that operates with aids from local experts.<br/><br/>WhatsApp has 70 million users in India. There seems to be a big opportunity of business for TARS in near future. Before this, Hike Messenger had also introduced a personal assistant in their app through which user could gather a lot of information about movies, Wikipedia, dictionary, Jokes and a lot of other entertainment things. But TARS is has real humans answering your questions and hence gives much useful results.<br/><br/><strong>How Do You Use Tars?</strong><br/><br/>The process is extremely user-friendly and time saving. All you have to do is, save <strong>9900876785</strong> to your contact and just send a ‘Hello TARS’ message through Whatsapp. Put forth your query and receive the response accordingly, quickly.<br/><br/>It will ask you the relevant information like your mail or address the first time it needs to serve you. After that, TARS knows and remembers who you are. The services are offered throughout the week from 10 AM to 10 PM.<br/><br/><a href="https://allstuffsforyou.files.wordpress.com/2015/05/tars-11.png"><img class="alignnone size-medium wp-image-163" src="https://allstuffsforyou.files.wordpress.com/2015/05/tars-11.png?w=300" alt="tars-1" width="300" height="170" /></a><br/><br/><strong>Are its Services Chargeable?</strong><br/><br/>Payment will depend on the kind of service demanded. For query like – “Which are the best dining places in any specific area? Tars would furnish a list of best known restaurants in that locality. Also, it would offer its own suggestions, based on its expertise. Chat services like this, are totally <strong>free</strong>.<br/><br/>If you want to book a train ticket or order for a product, the service would be chargeable. Tars will take care of the entire process except the transaction. For payment, it will send you a secured payment link powered by Instamojo where you can fill up the details. The booking would be made on your behalf. There won’t be any booking charges or additional/hidden charges, rather it adds relevant coupons too, if applicable.<br/><br/>Currently TARS’s database is updated with Bangalore city only but you can still use it if you live in different city. Agents of TARS use Google search to get the best results for you. It has only been a month that its services have been rolled out. Given the fact that it is a newbie in the market, its back-end services are still at their workshop stage.<br/><br/>As of now the service is free of cost but, in future there is a strong possibility that the service will be paid. If they keep it free, they may charge commissions on orders placed through TARS. We will see…<br/><blockquote>Visit <a href="http://www.hellotars.com" target="_blank">Tars Here</a></blockquote>Techstuffshttp://www.blogger.com/profile/02481127963759289385noreply@blogger.com0tag:blogger.com,1999:blog-3545177704524048658.post-81142611601054711282015-04-13T09:44:00.000-07:002015-06-05T05:39:19.941-07:00Schedule an email to be sent laterHello Tech stuffs users,<br/><br/>Everyone in the world are so busy on their works. In the mean time you want to enjoy your life too. But sometime due to some problems we may fail in some thing. one of the most thing is with a job. Especially we fail to mail the details at correct time.<br/><br/>To overcome this we have a solution for you. Now you can schedule the mail on gmail to be sent at any time even if your computer is off..<br/><blockquote><a href="http://www.boomeranggmail.com/" target="_blank">Boomerang</a> for Gmail lets you take control of when you send and receive email messages.</blockquote><br/>A new innovation which will be more useful for everyone. You can schedule your email to be sent at any time by this small extension. Its now for firefox, chrome and saafari. It works on gmail and google apps mail.<br/><br/>Have fun....Techstuffshttp://www.blogger.com/profile/02481127963759289385noreply@blogger.com0tag:blogger.com,1999:blog-3545177704524048658.post-49115203384502873272015-03-27T16:48:00.000-07:002015-06-05T05:39:19.933-07:00Earn unlimited Flipkart vouchersHello users!!<br/><br/>Its been a long time after my last post.. but today I am here with a great post which will be more interesting for you.<br/><br/>Ya you heard it correct. earn unlimited flipkart vouchers.. A new website is offering free flipkart vouchers of 50 rs.<br/><br/>STEP !: <a href="https://app.ship2myid.com/web/#/register/?referral_code=017999" target="_blank">Click here</a> to go to the website<br/>STEP 2: Just fill in your details and submit your application.<br/>STEP 3: Validate your id by email sent to you.<br/>STEP 4: connect your fb with that<br/><br/>After 24 hours you will get rs 50 flipkart money. The details regarding that will be mailed to you from the website<br/><br/>Enjoy :-)Techstuffshttp://www.blogger.com/profile/02481127963759289385noreply@blogger.com0tag:blogger.com,1999:blog-3545177704524048658.post-5773018200062368412015-03-07T12:30:00.000-08:002015-06-05T05:39:19.925-07:00Report Suicidal posts on facebook to help othersLove to share<br/><br/>A few ago, in order make its product more helpful, Facebook updated its tool to report suicidal posts. Facebook claims that this tool will make it easy to report a person if he is having any kind of suicidal tendency. You can report a friend’s suicidal post and that friend will be provided help using different measures.<br/>Today, I am going to tell you how to report suicidal posts on Facebook.<br/>Step 1:Click on the arrow in top right corner of the post and then click on “I don’t like this post.”<br/><br/><img class="alignnone size-medium wp-image-151" src="https://allstuffsforyou.files.wordpress.com/2015/03/01.png?w=300" alt="01" width="300" height="73" /><br/>Step 2: Now click on “I think it shouldn’t be on Facebook” and continue.<br/><br/><a href="https://allstuffsforyou.files.wordpress.com/2015/03/02.png"><img class="alignnone size-medium wp-image-152" src="https://allstuffsforyou.files.wordpress.com/2015/03/02.png?w=300" alt="02" width="300" height="167" /></a><br/>Step 3: Select “It’s hurtful, threatening or suicidal” and continue.<br/>Step 4:Now select “I think they might hurt themselves.”<br/>Step 5: Now Facebook will give you different options to reach to your friend who is having some suicidal tendency. This option may vary in number depending upon the services provided in your region.<br/><br/>By using this feature you can also block users account .. have fun.<br/><br/>Visit us for more :-)Techstuffshttp://www.blogger.com/profile/02481127963759289385noreply@blogger.com0