HOW TO
All the tutorials or as we call it nowadays 'How To' related posts will go here.

0 2

android-spy

While conducting a recent study, researchers found that several Android apps screen data on your device on a regular basis and share it with various sources. Some Android apps do this in all innocence but many others have a malicious intent. They drain out the data in your phone and use it against you. Once detected, malicious apps like these should be removed quickly in order to secure the data in your device.

So how do you get rid of malicious apps from your phone and keep your data safe?

Removing spy apps from your Android smartphone

As intruders and eavesdroppers increase in number, so does their access to computing systems. And with new developments and trends take over the tech world, hackers have also innovated new ways to extract data from a device and then use it for criminal purposes. One such way is getting people’s confidential data with the help of android spy apps.

On discovering a malicious app, its removal is the first action the smartphone owner should take for a happier digital life. If the user is not comfortable with technology and its twists and turns, taking the device to a smartphone supplier is going to solve this problem or simply factory reset the device.

Back up your Android device first

A factory reset means that the smartphone is going to the state it was in when you first purchased it. You are going to lose all the data that you have stored in your phone including your images, videos, music and other apps that are downloads as well as the spy app. You need to create a backup of all the data in your device before a factory reset. You can retrieve all the data that was in your device and download the apps you have lost later. Though it does involve a bit of a hassle, a safer smartphone is guaranteed.

Removing spy apps with OS updates

Re-installing the Android operating system is more or less similar to a factory reset but stops on a much lower level. The reinstallation of the operating system is not going to remove all the data and apps from the device but it will rid you of the spy software in it.

An OS update works this way because each spy software is designed according to operating systems. When the OS is updated the spy software starts facing compatibility issues and stops working. It is not as reliable as a factory reset but most of the times; it manages to remove the spy app in your smartphone.

Manual Removal

Removing spy software manually is not a thing for the layman. Only techies can manage it with ease. Once it has been detected, the user needs to know the exact location and names of the EXE files in the device. The software’s files have to be deleted from the root so that its entire functionality can be removed completely.

Protect your smartphone

When you have removed the spy app from your Android device, you need to build a fortress around your phone so that it is protected from further threats. Here are some ways to protect your Android device:

Use a Password App:

Google Play store is swamped with advanced security apps. Both free and paid, these apps allow you to configure a personal code to keep your data secure.

Install a Security App:

Many security apps help the user build a protection around your phone so that hackers and intruders cannot surpass. Antivirus apps also work the same way.

At the end of the day what you need to remember is that keeping your phone safe and secure is primarily upto you. If you go about it right then your phone will be fine. It only takes one bad app to expose you!

1 0

Are you tired of losing your CDs in your car or finding them scratched after you’ve listened to them so many times? If so then an iPod may be just what you need. There are various models of iPod available, but all of them are designed to let you listen to your favorite tunes no matter where you are. Most new car stereos these days come with an iPod connection point. The question is how can you get your iPod to work via your car stereo?

ipod-to-car-audio

The different connection options

There are three main options you have when it comes to hooking up your iPod. They include:

  • · Using a FM radio frequency
  • · Through the cassette adapter
  • · Plug directly into stereo

If you have an older car then the cassette adapter may be your best option. Older stereos don’t tend to come with a connection point for MP3 players. It’s also worth keeping in mind that this is the cheaper, easiest option. The only downside is the quality of the sound. Cassette adapters don’t provide anywhere near the same quality sound as a FM radio frequency or direct car stereo connection will. Basically the cassette manages to convert the audio signals from the iPod so that they can easily be understood and picked up by the car.

FM radio frequency tends to offer higher quality sound than cassette adapters and they come either wired or wireless. The adapter will connect your iPod to an FM radio station and use that to play your favorite songs. With the most modern FM adapters you can actually choose which station you want the sound to come out of. It would be a good idea to choose a station that has a weak signal as this will avoid any interference from any local, live stations.

The direct connections do tend to be the best. As mentioned earlier, all newer car stereos will typically have an MP3 connection port. If your stereo doesn’t have this then there are some adapter kits you can invest in. There are Jacks available for auxiliary devices on the front plate of the stereo. The only thing to consider with this option is that they can be quite expensive.

How to fit them

If you’ve invested in a cassette adapter then all you need to do is plug the jack cord into the cassette and then into your iPod. Then place the cassette in the player and voila, you have a working connection.

With an FM transmitter it will depend whether you have invested in a wired or wireless version. If you want to install a wired transmitter then you’ll need to install a ground wire from your vehicle to the module. The module can be found between the stereo and the cars antenna. You will then need a mini-Jack-to-RCA input connector. This will help to connect the iPod to the FM transmitter. The wireless models are much simpler and trick your stereo into thinking that your iPod is a radio station. You simply need to set the modulator so that it connects to a specific station.

Finally for a direct connection you will typically need to remove the head unit of the dash of the car. You’ll then need to install an adapter and cable to the CD changer port. Then a separate cable will run from the adapter, straight into your iPod. You can purchase special kits that can help you with this type of connection.

Overall you need to think about the age of your car stereo, your budget and your skill level before you install any type of iPod connection.

1 0

Sending large files over the internet can be a real hassle. E-mail doesn’t work very well because most e-mail servers have strict limits on the sizes of attachments. If you’ve ever tried to send a large file over e-mail, you were likely met with frustration and timed-out uploads.

Not long ago, it was easier to just copy large files over to DVDs or flash drives and physically send those devices over to whoever needed the file. Things are a little different today thanks to increased access to high speed internet and an exploding cloud storage industry.

There are dozens of companies now that support the sharing of large files. Most of these companies offer both paid and free file sharing options. Here’s a quick look at what I consider to be the best websites for sending big files online.

1. Sendspace.com

Sendspace.com will let you send files up to 10 GB in size to your friends. A free account at Sendspace.com maxes out at 300 MB files with “basic” download speeds. You can upgrade to a pro account for $8.99 per month to send files up to 4 GB in size with a limit of 100GB shared per month. A pro-plus account costs $19.99 per month and supports files up to 10 GB in size.

The nice thing about Sendspace.com is that it is easy to use. You can visit the main website to drag-n-drop any file right now. You’ll get a download link that you can then give to anyone who needs to download the file.

2. DropCanvas.com

DropCanvas.com is one of the simplest online file sharing solutions of them all. All you have to do is visit the website and drag-n-drop files on the front page. This will create a “canvas” that you can share with anyone. Each canvas is limited to 5 GB of storage space and you can attach as many files as you want to each canvas.

This is by far the fastest way to send large files online. You don’t even need to sign up for an account. You can visit the site anonymously, upload a few files and share those files with anyone else.

The drawback is that Dropcanvas.com is still relatively new and we don’t know much about the security standards or future of the company. For that reason, you probably shouldn’t use Drop Canvas to send sensitive files with other people. Save this service for nonessential videos and mundane homework files.

3. JustCloud

JustCloud is an online backup and file syncing tool that competes against the likes of Dropbox and Mozy. The thing I like about JustCloud is that it offers unlimited storage space and can be used to send any file in your account to other people.

The only limitation to file sharing with JustCloud is that individual files are limited to 1 GB or 5 GB depending on your account. The nice thing about JustCloud is that you can store and share an unlimited amount of data. This is the best solution if you have large, recurring file sharing needs.

The biggest downside to JustCloud is that it does not have a free account option. If you want to share files with JustCloud, you’ll need to pay for an account. That’s another reason why JustCloud is best if you plan on sharing files regularly. The upside is that a paid account will also get you unlimited online storage, file syncing and automatic backups for your personal computer.

Other File Sharing Services

These are just three of many services that can be used to send large files online. The reason I like these the most is that they have so far proven to be reliable. There are other services out there that can be used to share files, but I’ve found many of those services are widely used to distribute pirated material.

As we learned from the Megaupload.com takedown, the government does not look kindly upon piracy. File sharing services that are used by pirates are best avoided because it’s only a matter of time before they get shut down. Many people lost legitimate files on Megaupload.com thanks to the piracy issues that surrounded that company and its founder.

The services mentioned above are your best bet for simple and fast file sharing. These services are not widely used for piracy, and that makes them a safer bet for important files. If you decide to use a service not listed here, make sure you do your research first.

1 0

wet-phone

A cell phone is the most prized possession for almost everybody and it is very annoying and disturbing if something happens to the cell phones. However, we are all human and bound to make mistakes and as it so happens, sometimes the cell phone becomes wet owing to rains or falling off in water. We are highly panic stricken at these times and do not know what to do. Here is a suggestion; Calm down, and pull your cell phone away from the water as quickly as you can.

First and foremost, make sure you do not dismantle your Smartphone come what may. This will hamper the warranty of your phone. So, do not dismantle your phone right away. Take a while, clean it with a cloth and then dismantle it. Also, do not immediately begin pressing the buttons of your phone. Take a while, before you frantically begin to press all the buttons of your phone to check if it is working.

dismantle-phone

If your phone is in a phone case then take it out immediately. Also, detach all the wires from the phone. Extract all the SIM cards, memory cards and SD chips from your phone to allow ventilation inside the hardware system. When you are doing this make sure not water drains into the hardware from anywhere. Wipe it off with a clean towel one more time. Clean the battery, the SIM, the memory card and as well as your handset with the towel.

phone-rice-partburied

Once done with all of that you will either have to bury your phone in a handful of rice or will have to make use of silica gel packets. Keep it buried for around 24 to 48 hours.

silica-gel

These things will take away the left off moisture from your phone and now you can turn on your Smartphone. It will mostly work for you. Do not try to heat the phone with devices like hair drier etc. It may harm your cell phone. Most importantly, do not freeze it. This will cause extensive damage to your operating system. A common method is inserting a toothpick wrapped with a tissue into the phone. It is very incorrect to do so because you do not know the stick is reaching out to what part of the phone. You may lose your phone forever like this.

A better method is over charging your phone and letting the heat dry up your wet phone. However, there is a huge risk of wet current in this method. Once you have succeeded with drying out your phone and your phone is working well make sure that you get a professional shop keeper to help you avoid metal corrosion of your phone. Metal corrosion is harmful for the phone and you will not be able to use it for a very long time. If you have successfully dried your phone and the warranty of the phone has not become null then you are good to go and you can now use your phone normally and regularly. Ensure you keep it away from water.

1 0

Server-SecurityAnti-virus software? Check. Firewall? Check. Complicated password, complete with letters, numbers and symbols? Check.

You might think that incorporating those common security protocols is guaranteed protection for your company’s servers, and to a certain extent, you are right. Up-to-date anti-virus protection, firewalls and intricate passwords can protect your company’s servers from some unauthorized access and harmful software. The average person or unsophisticated hacker will be thwarted by common protocols, and older or known viruses, malware, spyware and phishing programs are blocked by antivirus programs.

Criminals are becoming more sophisticated, though, and the old methods of protecting your server are not adequate to keep your sensitive systems and data safe. Most servers are attacked by potentially harmful programs or would-be hackers dozens of times each day; it’s important for security managers to recognize the threats and take the proper steps to protect servers from security breaches.

If you are wondering if you are doing enough to keep your networks and data safe, consider this checklist of the most effective precautions.

Install Security Software

Security software is more than just antivirus protection. According to organizations such as Trend Micro, your server security should involve methods of encryption, especially if the network is accessed virtually or remotely. If the server contains particularly sensitive information, such as that governed by federal privacy regulations or financial data, consider installing a host-based or network firewall that only allows access from designated IP addresses.

Enact Strict Login Policies

By now, most of us have seen the news reports regarding passwords and know what constitutes a strong password. Even with these warnings, though, some people still continue to use common or easy-to-guess passwords in multiple locations – and never change them. This is just one way that login protocols can put your servers at risk, so you need to create a comprehensive policy regarding how and where employees and customers can access the system. For example, give every user his or her own access credentials and avoid sharing login information among several individuals or customers. Develop a comprehensive password management program as well, one that requires regular password changes and a certain level of password strength.

Use Authentication Methods Other than Passwords

While requiring passwords for access to sensitive areas of the network provides a layer of protection, additional methods of authentication are also important. Even the most complex passwords can be cracked thanks to malware or keylogging software, so for maximum security, consider implementing a key-based authentication system. The most secure keys require the use of an external device; more simple systems use images, phrases or other means to provide authentication and prevent unauthorized access.

Routinely Maintain and Update Computers

You see the notification that your computer needs to be updated flashing in the corner of your screen – and ignore it, or postpone it multiple times. While that might keep you from experiencing a few moments of downtime, you’re actually putting your computer and the network itself at risk by failing to install timely updates. When your operating system releases these updates, they often include security updates or patches that reduce vulnerabilities. Pay attention to them and keep your system safe and secure.

Physically Secure Your Server

While most of the dangers to your server come via the computers connected to the network, failing to physically secure it also presents dangers. Keep the server in a controlled-access location and keep a log of those who access the room. Use keyboard locking or password protected screen savers on the main computer connected to the server, and habitually update the access credentials needed for the server. Restricting physical access to the server prevents individuals from compromising its security, deliberately or unintentionally.

Securing your server is one of the most important steps you can take to ensure that your company’s data, network and individual devices stay secure and free of harmful software. When something attacks your server, it’s not long before it spreads throughout the company – and a security breach can lead to wasted time and money, as well as a public relations nightmare. Taking these important steps to secure your server, though, will keep your data safe – and your employees productive.

0 0

Not long ago latest Android tablets and smartphones have begun to get the latest Android 4.1 Jelly Bean operating system. For example, Nexus smartphones and tablets are already updated. If we take as an example Nexus 7, then we’ll see that new theme allows working not only in a portrait mode, but in a long-awaited landscape mode as well. Notification board has also been changed. Android developers have done a great job and have created the fastest mobile platform which is at the same time is very stable.

But you should be aware of the fact that if you have got root rights earlier for your device, then after Jelly Bean update the ‘superuser’ rights will disappear. The same is with custom recovery. In general, after the update you’ll get an absolutely new device with new capabilities. This instruction is for saving the installed recovery and root rights.

Here’re the instructions on how to install an update on your Nexus tablet without losing root rights. Take into consideration the fact that though this method works on all devices, concrete steps and actions may differ, especially if a custom theme is installed (like CyanogenMod 10).

How to save root rights after Android update

In order to keep your root rights on a tablet or a smartphone you need OTA RootKeeper application to be installed before you’ll update your OS. This app can be downloaded from Google Play Market for free. After the first launch you’ll be offered to give it root rights. Press “yes”.

Then you to click on the big “Protected Root” button in the app’s main window. Don’t forget to tick “Protected su copy available” option.

Now you can install new version of Android OS on your tablet. After the update root rights and alternative recovery, such as ClockWorkMod and TWRP, will be lost.

Android updates installation

If you see a notification about available updates, just click on it. If your tablet doesn’t find the updates automatically, you may check for updates manually in the settings menu, section “About the tablet”.

Apart from that, you may go to the apps management section, clear Google Services Framework data and reboot the tablet – this trick helps a lot of devices to see updates.

Finally, you may download Android 4.1.2 updates for Google Nexus 7 from Google’s server by yourself and install it with the help of TWRP or ClockWorkMod recovery.

Root rights restore for Android

In order to restore root rights after the OS update you’ll need an OTA RootKeeper app again. Launch this app and choose the option “Restore Root”. That’s it. Now you have your root rights back and you may use the apps that require root.

Alternative recovery installation

Alternative, or “modified” recovery allows you to make a full back-up of current tablet or smartphone firmware with all user data and apps, install system updates and different patches, restore settings, etc.

After you’ve got root rights on your Nexus 7 it won’t be hard for you to install alternative recovery on it. In order to do that install a free app GooManager from Google Play Market and from its menu choose the option “Install OpenScript Recovery”. After that the app will download and install the latest TWRP recovery version on your tablet.

Apart from that, with the help of this app you may reboot your device into recovery mode any time – just choose the option “Reboot Recovery”.

 

1 1

Think of a BlackBerry phone like a room. Without any file inside it, then you should expect an empty, spacious room with nothing but the basics like windows, doors, floor, and the ceiling. You know you can do many things with the room but without anything inside, you cannot fully maximize the potential of the room. So, in order to use the room, you need to put things inside it. You may add sets of furniture, additional lighting, and other accessories that you see fit the aesthetics and function of the room. Thus, you get a useful room. With phones, you might sell used BlackBerry phones when it has nothing inside it. You can see that files can play an important part for any smartphone.

How can you get files? You can have many ways to get files. The good thing is BlackBerry phones are smartphones to begin with. This gives you many options to choose from. You have a multitude of options and what you prefer most, the most convenient ones are what most people choose. Whatever you choose, BlackBerry phones still make it a point to provide what you choose. RIM has even redesigned their phones just to make it consumer and user friendly. Here are several options to transfer files to your BlackBerry phones:

Memory Card to Move and Store Data

This method is probably the easiest way to transfer data to your phone. What you need, besides the obvious, is the memory card reader that can connect to your personal computers. All you have to do is remove the micro SD card from the BlackBerry phone and connect the former to the card reader. Then, you connect the reader to the PC. Computer operating systems like Linux and Windows consider card readers removable devices. Once the system recognizes the device, you can drag and drop your files from the PC to your card.

If you don’t have a card reader with you, sell your BlackBerry for cash. But seriously, you can still have your BlackBerry phone connected to the PC and enable Mass Storage Mode. This time, you connect your phone to the computer via the USB cord. Once your phone has connected to the PC, the latter will recognize this as a removable device. Once you choose Memory from the Options menu, you may change the Mass Storage settings mode.

Make sure that you have already disconnected the card before physically disconnecting the phone because it may corrupt the files inside the card reader. On OS X, drag the SD card icon from the desktop to trash to formally disconnect it. On a Windows OS, choose ‘Safely Remove Hardware and Eject Media’ to do the same process.

Transfer Via the Internet

You should have a data plan to do this. You simply will receive e-mail attachments to download the files. You now can transfer the data to your SD card or phone. You may also want to download files from the internet, which also gives you the option of selling BlackBerrys.

Transfer Via the Bluetooth

You just need a PC with Bluetooth to continue:

  1. Turn on Bluetooth. Make it Discoverable.

  2. Make sure the Serial Port Profile is on for Desktop Connectivity and Data Transfer.

  3. Just follow what the PC instructs you to do. Once both are synced, you may now transfer files to and from your phone.

2 0

I think almost every Android user have heard about the root rights for their devices. And many users actively use the rights of a ‘superuser’, while some people are afraid to do so because they don’t know much about it. So what are these root rights and how to use them?

The notion of ‘root rights’ has come from Linux terminology because Linux is a base for Android OS. In very general terms this is an account of the main administrator, or a ‘superuser’. The user who owns these rights gets a wide range of abilities that are hidden from regular users.

Image and video hosting by TinyPic

 

There are three types of superuser’s rights:

1.Temporary Root:

These are temporary root rights (after the first reboot the rights of superuser disappear);

2. Shell Root

Permanent root rights but without access to changing /system catalogue;

3. Full Root

Full and permanent root rights without any limitations.

It’s important! Officially not a single device that is sold in the shops doesn’t support root rights “out of box”. That’s why it is important to remember that the process of rooting your device will lead to the loss of official warranty for it.

Another reason for not rooting your device is the possibility to turn your device into a useless thing. If you don’t read instructions well or simply don’t understand what you’re doing, you risk destroying the “brains” of your device.

And thirdly, having got the rights of a superuser you reject official software updates from a manufacturer.

Why ROOT your android device?

So why most of the Android fans still want to root their gadgets? Simply because there’re more advantages of it than drawbacks. This is what you can do after rooting your device:

  1. You may install any custom firmware, for example, CyanogenMod, MIUI and others. Custom firmware are usually more functional, more effective, and has the capability of full customizing both of the interface and gadget’s performance.
  2. You may launch special applications that broadens the capabilities of you device, for example, Task Manager for Root, Root Explorer, Titanium Backup, etc.
  3. The installed apps may easily be transferred to microSD card.
  4. You can easily make a screenshot. You may use any screenshot app to do so, though it should be mentioned that the latest Android version have already got this function.
  5. You may install Firewall – the app that controls the use of your Internet traffic. One of the best examples is Droidwall, which will control apps’ access to the Internet.

You may get root right practically on any device. But there’re some devices that won’t allow you to install full rights (or it is very difficult to do it): NAND lock (manufacturer’s protection) doesn’t allow making any changes to /system partition, thus not allowing installing SuperUser app. On such devices you may get only Shell Root or Temporary Root rights. Mainly these are the 2011 HTC devices.

To learn more about Rooting HTC devices Click Here

How to ROOT your Android device?

There are many ways to get root rights: some will let you to get these rights in a couple of clicks while others will make you spend 20-30 minutes to accomplish your goal. Here’re the most popular ways.

First, most reliable and simplest way is the program called Universal Androot. The program works with Android 2.2 and older. Another similar program is Z4Root. It also works with versions from 2.1 to 2.2.1 All you have to do is to install the app and press the “un-root” button.

If you have latest Android versions installed on your device, then you’ll need a universal tool that works with most of Android smartphones. The app is called Unlock Root and works with Android versions from 2.1 to 4.0.3. Here’s video instruction how to use it.

And if you have the most recent device that is updated to Android 4.0 or 4.1, there’s another way. You’ll need to download one .bat file and follow the instructions from xda-developers forum.

So now you know why Android users root their devices. Whether to do it or not is up to you. But remember that the risk is your own.