Total Pageviews

Sunday 28 August 2011

How To Use Gesture Shortcuts on Your iOS Lockscreen

LockGestures is a great app for those of you who don’t want to unlock and enter a password every time you want to adjust brightness or make a quick call. The functionality’s also pretty inconspicuous, in case someone does take your phone. At only $1, it’s also really cheap compared to other options on Cydia. You may also want to check it out if you’ve moved to iOS from CyanogenMod, which has a similar functionality.


Jailbroken iOS devices have a lot of useful apps. If you want easy access to simple tasks, but don’t want to unlock your phone or compromise your security to do it, LockGestures is for you.
To Jailbreak your Phone Click here.



LockGestures is a Cydia app for iOS that lets you easily access various functions using gesture shortcuts from your lock screen. Once installed, head into Settings.


At the top, you’ll find a setting for which application you want to launch when using that action.


When you use the gesture to launch that app, you’ll be taken straight to it from the lockscreen, though you’ll still have to enter your security code if you have one set.


You can turn individual gestures on or off, and there’s a wide variety of actions you can configure, like adjusting brightness and controlling your music. One particular option – Quickcall – bypasses the security code and takes you right to the dial pad so you can make a call.


You can even bring up the Power Options dialog.

@@@ Follow us on Facebook and Twitter @@@

    Share/Bookmark

    Saturday 27 August 2011

    How to Hide Text Behind Images without any Software

    In this post I am going to teach you How you can easily Hide your text Behind Images without any Software. You can securely send your Text to your friend and then your friend can encrypt it and can see your Text. Watch the Video to Hide your text easily.

    Shop Now - Artfrost.com


    !!!Watch it in HD!!!

    Follow these Steps to Hide your Text Behind Image: -


    1) Copy image to your Windows drive, If your Windows drive is C drive, copy image to C drive.
    { Example: - I copy Simran.gif to C drive, On location C:\ }
    2) Now write the text on notepad which you want to copy behind image. Selecting it, right clicking it and then copy it.
    3) Now open CMD by going as
    Start -> All Programs -> Accessories -> Command Prompt or Start -> Run -> CMD -> Enter
    4) In CMD type:
    cd\
    echo Write text to hide >> Simran.jpg
    5) If above command successfully run then it means that text is being hidden behind the image. Yes you are successfully to do it. Now send it as secret image, containing secret text.

    Unhide text behind the image

    Now right click on Simran.jpg --- open with --> Notepad. You will be able to see hidden text at the end of image content.


    @@@ Follow us on Facebook and Twitter @@@


    Share/Bookmark

    Tuesday 23 August 2011

    Number of Cyberattacks on Social Networks Increasing


    • More cyberattacks hitting social networks            
      Cybercriminals are increasingly targeting social networks, prompting people to take more steps to protect their online privacy, according to a new survey from security company Webroot.
    • Kaspersky study finds Adobe software is biggest security risk
      According to its newly released threat report for Q2 2011, software from anti-virus specialist Kaspersky Labs detected an average of twelve security vulnerabilities on its users’ Windows systems. The company reports that all of the top ten most frequently detected vulnerabilities are to be found in Adobe or Oracle products.
    • Google reports on four years of experience in malware detection
      Google has announced the publication of a technical report entitled “Trends in Circumventing Web-Malware Detection”. This report describes the results of analysing four years of data – from 160 million web pages hosted on approximately eight million sites – collected through the company’s Safe Browsing initiative.
    • More Bitcoin malware: this one uses your GPU for mining
      Security researchers have spotted a new strain of malware that targets Bitcoin, the peer-to-peer virtual currency that exploded onto the tech scene earlier this year. In a report issued last week, Symantec researchers described a Trojan that uses the user’s computer to mine Bitcoins on behalf of the intruder.
    • Android malware masquerading as Google+ app
      A new flavor of Android malware is disguising itself as a Google+ app in an attempt to capture instant messages, GPS, location, call logs, and other sensitive data.
    • Dog Wars app for Android is Trojanized
      An older version of a controversial Android app called “Dog Wars” has been modified to include a Trojan horse that takes actions without the device owner knowing it, according to security firm Symantec.
    • Beware of rising phone hacking incidents
      Phone hacking incidents are on the rise and users need to take measures to prevent their phone conversations from being breached, warn industry watchers who say hackers today deploy various tactics to intercept conversations on landline as well as mobile phones.
    • Accelerometer used to log smartphone keystrokes
      Security researchers have demonstrated that it is possible to record keystrokes entered on a smartphone’s on-screen keyboard using the device’s built-in accelerometer.
    • Legal dispute over “eternal” cookies
      For over two weeks a lawsuit has been outstanding against the tracking metrics company KISSmetrics because its customers web sites – including Hulu, Spotify, Etsy and GigaOm – place an almost indestructible cookie on visitors’ machines.
    • Microsoft Disables Supercookies Code
      Microsoft has disabled the code responsible for creating supercookies on the computers of users navigating to its websites, designed to harvest browsing data even though plain vanilla cookies were not available.
    • Anti-malware vendors unite to fight cybercriminals
      It’s not publicly known, but antivirus companies like F-Secure, Symantec, McAfee, Trend Micro and others help each other out all the time.
    • Facebook’s ‘Like’ button illegal in German state
      A German state would very much like for its residents to keep their fingers–and other assorted pointers or cursors–away from Facebook’s “Like” button. The state of Schleswig-Holstein has ordered all government offices to remove the button from their Web presence and shut down any Facebook “fan” pages, on the grounds that these things violate German and European data privacy laws.
    • Windows 8 vs. webOS, It Could Have Been Epic
      For a minute, it appeared that Windows 8 would have a bit of extra competition in 2012 from newcomer webOS, a platform that Hewlett Packard was planning to ship on its TouchPad tablet, new smartphones as well as on every PC, pre-installed alongside Windows.
    • New Aurora 8 works on memory, guts, and add-ons
      Mozilla upgraded its developer’s edition of Firefox this past Friday to version 8, including changing how forced third-party add-ons are handled and debuting a series of under-the-hood tweaks that continue a renewed assault on performance gains made in Firefox 7 Beta.
    • Browser compatibility for corporate sites a must
      Corporate sites should be built and tested across different Web browsers in order to achieve better customer reach, consistency and professionalism, stress market players.

    @@@ Follow us on Facebook and Twitter @@@


    Share/Bookmark

    Monday 22 August 2011

    Download Firefox 6 Final And Firefox 7 Beta 1


    Mozilla has adopted the Rapid-release strategy with new major browser version number release channels for each version (alpha, beta and stable) of it's Firefox web-browser, sticking to the plan Mozilla has made Firefox 6 Final (stable channel) and Firefox 7 Beta 1 (Beta Channel) available publicly to Windows, Mac and Linux users.
    !!! Domain Highlighting !!!

    Firefox 6 Final claims to provide better startup-speed, memory-consumption and performance to it's predecessors, the release also feature numerous fixes and fortify's overall browser security. The other release Firefox 7 Beta 1 (Beta Channel) features major memory optimizations by incorporating Mozilla's MemShrink optimizations and better Javascript garbage collector, Firefox 7 will also feature tools to help developers measure load times and offer faster Synchronization of bookmarks and passwords.
    Download Links of Firefox 6 Final and Firefox 7 Beta 1: -

    @@@ Follow us on Facebook and Twitter @@@



    Share/Bookmark

    Sunday 21 August 2011

    Download iOS 5 Beta 6 And Sn0wbreeze 2.8 For iPhone 4, 3GS, iPod touch, iPad

    Apple has posted live the latest BETA version download links for it's upcoming iOS 5 mobile operating-system to developers, IPSW download links for the latest dev-release iOS 5 Beta 6 is meant only for Apple iOS Developers and is restricted to registered Apple developer's only via Apple Developer SiteApart from the usual bug-fixes The latest beta makes video content in applications and websites automatically AirPlay enabled.


    To complement the iOS 5 Beta 6 released by Apple, iH8snOw released SnOwbreeze 2.8 allowing Jail-breaking on previous Apple iOS 5 Beta release.

    iOS 5 Beta 6 SnOwbreeze 2.8 Download Links: -


    2) iOS 5 from Apple Developer Site


    Share/Bookmark

    Friday 19 August 2011

    How to Reveal Hidden Password Behind Bullets - New Method


    We have seen tricks on How to Reveal Hidden Saved Passwords in Firefox, Internet Explorer and Opera. In latest versions of Windows hidden fields are shown as bullets instead of asterisks and BulletsPassView is a simple, fast and portable solution for Windows allowing users to reveal previously saved passwords stored behind these bullets/asterisks.
    The 100% working free password recovery tool for current operating-system like Windows 7/Vista/2008BulletsPassView also supports unicode passwords, command-line operation and options to save revealed passwords as text/html/csv/xml file.

    Hidden Password Behind Bullets

    It must be noted that web-browsers like Chrome, Firefox, Opera and system-tools like Dialup/network passwords in Windows no longer save passwords in text-boxes and this tool wont work with them anymore, you can still use the JavaScript Password Reveal trick with web-browsers as demonstrated here - Firefox, Internet Explorer and Opera

    @@@ Follow us on Facebook and Twitter @@@


    Share/Bookmark

    Thursday 18 August 2011

    How To Backup and Restore Your Android Phone with Titanium Backup

    If you want to get serious about backing up your Android phone, including everything from system app data to saved Wi-Fi nodes, Titanium Backup can help. Read on to learn how to backup your Android phone from A to Z.

    Why Bother With a Third Party Backup Application?


    Android phones already come with some handy backup features; anyone who has purchased a new Android phone and plugged in the Google Account login they were using on their previous Android phone has surely been impressed with the ease in which their old contacts appeared. Newer versions of Android (2.2+) even have some extra backup features like the ability to backup your wallpaper and some applications (if the developer allows it).


    While that’s great and certainly eleventy-billion times better than dealing with transferring contacts from phone to phone in the age of “dumb phones” it’s not a perfect or complete solution. If you want fine control over your backup process and the ability to backup every application and its associated data, system settings, and more, you’re going to need to rely on a third-party solution. In this tutorial we’ll show you how to backup all data with the powerful and popular Android backup app Titanium Backup.

    What You’ll Need: -


    1) A rooted Android phone
    2) A Copy of Titanium Backup

    Why a rooted phone? Rooting an Android phone simply means modifying your phone so that applications can have root (administrator) access to the Android operating system. Titanium Backup requires root access to Android in order to effectively backup every aspect of the system. If Titanium Backup did not have root access it would not be able to access systems files to backup system data and it would not be able to access restricted applications in order to copy the application itself and (sometimes) the data for backup.

    Phone-by-phone rooting instructions are beyond the scope of this tutorial but don’t worry. If your phone isn’t rooted already there are some excellent resources available to help you root. One of the best resources around is the XDA Development forums. Search for your specific phone/carrier for detailed guides on how to root your device. In the process you’ll learn more about your phone than you ever thought possible. Avoid simply searching Google for a rooting guide as many guides are outdated and will lead to big headaches—XDA’s forum posts and guides are frequently updated and it’s easy to make sure you’re looking at a current version.

    Finally, a word on Titanium Backup. It comes in two flavors: free and premium ($6.56). We’ll be using the free version for this tutorial; it’s a more than adequate program loaded with great features. The premium version adds in some additional features power users may find useful like versioned backup, backup encryption, unlimited backup scheduling, and such. You can compare the free and premium features here.



    Installing Titanium Backup: -



    If your phone is rooted and Superuser is installed, installing Titanium Backup is a breeze. If you’ve skipped the rooting process and/or installing Superuser, jump back to the previous section and check out the XDA forum to read more about your device. If you’ve done the prep work grab a copy of Titanium Backup from the Android Market and install it.

    There’s only two things you really need to pay attention to during the installation process to make sure your future Titanium Backup use goes smoothly. First, you’ll get an initial prompt to elevate Titanium Backup’s user privileges. If you’re going to be using the schedule feature for automated backups (and you should be using that feature) you’ll want to check the Remember box here so that Titanium Backup doesn’t need your attention every time it goes to backup. Second, if you haven’t enabled installation of application files from unknown sources (which Titanium Backup needs in order to restore your apps from backup later) make sure to enable it.
    Now that Titanium Backup in installed a small caution is in order. Do not just start clicking willy nilly around menus. Titanium Backup is a powerful application designed for power users. Unlike nearly every other application on your phone where it’s hard to even make an error let alone a really serious one, Titanium Backup gives you direct access to your system in a way that makes it significantly easier to send a wrecking ball through the guts of your phone. Read every item twice before clicking it and when you have even the slightest bit of doubt about what a function does, refer to the detailed Titanium Backup wiki for clarification before proceeding.

    Performing Your First Backup: 



    Once Titanium Backup in installed and you’ve repeated “I will not click on buttons that perform unfamiliar tasks!” three times, you’re ready for your first backup. Click on theBackup/Restore tab. Click the Menu button on your phone. From the menu that pops up at the bottom of the screen select Batch. From the large Batch menu select [RUN] Backup all user apps + system data. You can opt to only backup user apps or system data by themselves, but we installed Titanium Backup so we could do fast and total backups of our entire system and we suggest you do the same—it’s no fun to find out one data catastrophe too late that the thing you really wanted backed up wasn’t.


    Once you select your backup roster, you’ll be prompted one more time. Titanium Backup wants to know if you want to kill the active apps or exclude them. You can also choose not to include certain applications in the backup. Since we have nothing pressing going on in any of our active applications we opted to Kill active apps and left all applications checked. Comprehensive backup is where it’s at. When you’re done with the batch selection menu click Run the batch operation.
    Depending on the processing power of your phone and the number of applications you have installed the initial backup process can take anywhere between a minute or two to a quarter hour or more. Plug your phone in to charge and leave it be until it’s done. When’s complete you’ll see the Backup/Restore menu again. Now instead of a bunch of caution triangles beside each application (the not-backed up indicator) you’ll see a variety of smiley faces and check marks. If you’re curious what each smiley face and other marks means, click the Menubutton and then click Legend to get a run down. If you see all red/M, yellow/M smileys, and check marks, everything was backed up as intended. If you see caution triangles mixed in there it’s time to run the batch again—unless the missing backups are the apps you didn’t want to kill and/or excluded from the batch list.
    If everything looks good, what now?
    Navigate to /TitaniumBackup/ on your SD card; there you’ll find all your backups. Copy the entire directory to your computer for safekeeping, sync it to your cloud storage, or otherwise back it up. Titanium Backup is only worth as much as the backups you keep. No backups after a catastrophic data lose (that may or may not have taken your SD card with it), no restoration points to work with.
    That’s it! Your first backup is complete! From here you can Schedules tab and schedule a weekly backup (upgrade to Pro to enjoy a more flexible and unlimited scheduling system). You can also tap on an individual app in the Backup/Restore list at any time to perform an immediate and one-off backup.

    Restoring a Backup: -


    When it comes time to restore there are several options. Just like you can batch backup everything on your phone you can also batch restore everything. Navigate to the batch menu you as you did above by going to Menu-> Batch while on the Backup/Restore screen. Scroll down until you see the Restore subheading. There you can select the option that suits your batch restoration needs just as you did for your batch backup needs—see the first two panels of the above image.
    A less drastic approach, let’s say you just want to restore your Angry Birds unlocked levels that have gone missing in action, is to tap on an individual application in theBackup/Restore list and click Restore—see the last panel above the above image.
    In 99% of the situations restoration is a snap. For the more complicated restoration procedures like restoring data when you’ve updated your phone with a custom ROM or migrated to a new phone make sure to check out the Titanium Backup wiki for pointers.
    NOTE: If You Have any Question Please Let me know that!!!

    Share/Bookmark

    Wednesday 17 August 2011

    How To Control Spotify and iTunes From the Dock in Mac


    With a quick download, you can now control either iTunes or Spotify straight from your dock, while the music player runs in the background. Keep reading to see how they work, and where you can download them for free.
    These Automator applications, created by the author, were a simple solution to control music programs running in the background without opening the window of the application itself. In addition to checking out the apps, tell us in the comments about your favorite apps and tricks to make Spotify and iTunes better!

    Download DockPlay for Spotify or for iTunes: -


    Downloading and installing DockPlay for either program couldn’t be easier. Simply download either version (for iTunes or Spotify) from the author’s site, drop the unzipped files in your Applications folder, and then slide them into your dock. Voila! Installed.

    Keep in mind, that the downloads page we’re linking to is a work-safe link, although the rest of the site has some NSFW content. Browse at your own risk!


    How To Use DockPlay: -

    With the iTunes or Spotify application open and in the background, simply click to run the different workflows that control the program.
    • If you’ve been playing any playlist, or you have one selected, the Play button will play and pause Spotify or iTunes.
    • If you’ve got any playlist selected, the “Next” application will skip to the next track.
    • If you’ve got any playlist selected, the “Previous” application will rewind, and then go to the previous track.

    Simple, right? That’s all there is to it—easy peasy.
    Have your own favorite apps and custom solutions to make iTunes or Spotify better? Let us hear about them in the comments below!
    @@@ Follow us on Facebook and Twitter @@@


    Share/Bookmark

    Tuesday 16 August 2011

    Fake Firefox Update contains Trojan

    The Fake Firefox Update contains Trojan, which will definitely harm your computer as well as your web contant. The trojan can steal your password as well as automatically delete your files stored in it!!! This trojan can even delete your web accounts!!! So update your Firefox untile surely come to know that it is safe!!! I have no clue which update is Trojan Free, but Update only when your Browser notify you to do it. Turn On your Browser Notifications. If you have Internet Security then you are probably safe. 

    Below Some of the Harm and Incidents which are already happened: -
    • Fake Firefox update includes password-stealing trojan
      Security specialist Sophos reports that it has discovered new spam email messages that claim to be an advisory related to an update to the open source Firefox web browser. The fake advisory asks users to update their Firefox installations, “for security reasons”, and includes a download link to the supposed update.
    • Malware network gains from new malvertising attack
      A malware delivery network said to be the world’s largest has tapped on Web advertisements as its latest modus operandi for fake antivirus attacks, according to Blue Coat Systems.
    • Images used to break into BlackBerry servers
      RIM has issued a warning of a critical security hole in its BlackBerry Enterprise Server, which attackers can use to compromise a system remotely.
    • Consumers Union: Beware when buying by cell phone
      T-Mobile USA customers who purchase digital goods online and opt to have the charge show up on their phone bill are vulnerable to fraud, according to Consumers Union.
    • Hong Kong stock exchange halts trading after hack attack
      Hackers broke into the Hong Kong stock exchange news Web site this past Wednesday, forcing the exchange to suspend trading of seven companies, according to The Wall Street Journal.
    • Google also passes on European data to US authorities
      Google is making data that is stored in its European data centres accessible to authorities in the United States. When asked by the German language WirtschaftsWoche magazine, a company spokesperson said that Google has passed on European user data to US intelligence services on several occasions.
    • Apple updates malware definitions for fake Flash Player trojan
      With the most recent trojan threat in the fake Flash installer, Apple has again updated its XProtect definitions property list, so in the next day or two OS X systems will be updated to automatically handle this threat if exposed to it.
    • 22 holes closed in Microsoft’s August Patch Tuesday
      As announced, Microsoft has issued 13 bulletins to close a total of 22 vulnerabilities on its August Patch Tuesday. Most of the holes are in Internet Explorer, as described in bulletin MS11-057.
    • Adobe fixes critical vulnerabilities in four products on patch day
      On its official patch day, Adobe has released updates to fix security vulnerabilities in five products: Shockwave Player, Flash Media Server, Flash Player, Photoshop CS5 and RoboHelp.
    • North Korea’s army of online game hackers
      The New York Times reports that North Korea has unleashed a squad of hackers to infiltrate South Korean gaming sites. The two countries have technically been at war for almost 60 years, and cyber-attacks are the modern-day equivalent to a slap in the face.
    • Free web service cracks internet kiosks
      At the Defcon hacker conference, which ended on Sunday, New Zealand security specialist Paul Craig released version 5 of iKAT (Interactive Kiosk Attack Tool). iKAT is a free web service that tries to bypass the protective mechanisms of internet kiosk PCs and gain control of the systems.
    • Firefox 8 to tell aggressive add-ons to back off
      Mozilla is taking steps to protect users from programs that install add-ons in Firefox without user permission, citing numerous reasons including security concerns and the desire to make sure that the person using Firefox has ultimate control of the add-ons installed.
    • Twitpic founder says Heello to Twitter clone
      Noah Everett is looking to take out the bird with one clone. The Twitpic founder appears to be serving up a bit of revenge with his latest venture, Heello, a feature-for-feature Twitter clone, right down to the “@” symbol and the pastel tones.
    • Cisco and Twitter join Linux patent protection pool
      Cisco, the networking giant and Twitter, the social networking company, have joined the Linux patent protection organization, Open Invention Network, along with a host of other companies.
    • Researchers: Anonymous and LulzSec need to focus their chaos
      The online vigilante groups Anonymous and LulzSec are weakening their cause with scattershot attacks and need to get more intelligent and focused, according to a panel of computer security experts at the DefCon hacker conference in Las Vegas.

    @@@ Follow us on Facebook and Twitter @@@



    Share/Bookmark

    Monday 15 August 2011

    Direct Download Windows 7 - All Editions

    Microsoft windows 7 Service Pack 1 (SP1) is now available for download since past few months, the free SP1 update to Windows 7 was pushed as KB976932 via Windows Updates publicly in February this year. Microsoft has now mad available official direct download links to bootable Windows 7 SP1 integrated disc images in standard .iso format, these new SP1 slipstreamed images has the added advantage that users will have an up-to-date installation just after the initial setup.

    Shop Now - Artfrost.com


    The direct download links are from Microsoft Official mirror provided by Digital River and allows users with the usual 30 days of evaluation time after which they need to activate using a legitimate key. These .iso files can be burnt as bootable DVD discs or bootable usb sticks as demoed. 

    Official Windows 7 SP1 ISO Download Links (English): -


    To Activate The Windows 7 Key (All Editions): -

    To make Bootable DVD or Bootable USB: -


    Share/Bookmark

    Saturday 13 August 2011

    How to Host your Website with Fully Featured Web-Hosting for Free

    Hello Guys, In this post am going give you a Chance to Grab a Full-Year of Free Web-Hosting Powered by another popular server management software Plesk
    The Free year Hosting offer comes from known Premium Web-hosting service provider JumpLine and you can rest assured you are into good hands while looking to kick-start your Website.


    Free One Year Hosting Package Includes the Following Features: -

    1) 10GB Storage.
    2) 100GB Bandwidth (monthly)
    3) Daily Backups
    4) Powered By Plesk 9.5 Control panel.
    5) 140+ Applications
    6) Ability to Host up to 10 Domains

    @@@ Follow us on Facebook and Twitter @@@


    Share/Bookmark

    Friday 12 August 2011

    Apple iPhone 5 Rumored Images And Video Roundup

    Apple iPhone 5 would be the most eagerly awaited gadget of this year, with an expected announcement and public availability in September or October this year here is an complete rumor roundup (images and video) of the yet to be announced device








    @@@ Follow us on Facebook and Twitter @@@


    Share/Bookmark