How to use Whatsapp On jio Phone (Working with proof added)

How to use Whatsapp On Jio Phone (Working with proof added)


Jio Phone WhatsApp: How to use Whatsapp on Jio Phone Most of the people are using Jio phone which was launched by the Reliance Company.It is considered as one of the lowest cost smartphones until now and has several features & functions which you can check on our site. Jio Phone Specifications

Jio Phone Tips & Tricks for Whatsapp

The users are using Jio phone with lots of excitements but they are not so happy because the user cannot use Whatsapp feature on this phone, jio phone Whatsapp download is not possible or. JIO Phone WhatsApp support, However, almost every user is unhappy and wants to use Whatsapp in Jio phone.

Can We Use WhatsApp on JIO Phone? Yes You Can

If truly says then there is not any Whatsapp for Jio phone but the exciting news is that it is possible to use Whatsapp in Jio phones.This trick is real and 100% working which is already tested by expert’s team and reveals that the user can use Whatsapp in Jio phone without having any problem without jio phone WhatsApp download.


This is really an amazing trick to use Whatsapp feature on your Jio phone without using an app.This trick is unknown to many users and they even don’t have hope to use Whatsapp feature on their Jio phone.You have to follow all the instructions step by step so that you cannot face any problem while using Whatsapp in your Jio phone.

Step by Step Method to Use Whatsapp in Jio phone

  1. The first step is to open the browser in Jio phone to search the link “browser ling.”
  2. Then click the first site which you see in the browser and open it.
  3. In this site, select the browser like opera, chrome, Firefox but do not select Internet Browser.
  4. After selecting the browser, search the link. http://web.whatsapp.com.
  5. You can see QR Code for Whatsapp when you open the link which is used to run Whatsapp on the web page.
  6. This code will appear in the zoom screen you can zoom out while using the ‘1’ key and for zoom in use key ‘2’.
  7. The final step is to scan this code from the phone in which you are using Whatsapp.
  8. Finally, the full format of Whatsapp will appear in your Jio phone and you can use Whatsapp all functions there.
 Please Share !!!


 

what is Ransomware and How to Protect It ?

                    What is Ransomware.




Why is Ransomware ?
  The Biggest Threat To your Computer ? And How Ransomware Helps !!


  Ransomware .

       Ransom = Money demanded in Return of a captured victim ;

            Ware  = Computer Software ;

 Is a malware crafted To carry out this action ; 

  •  A ransomware infection can cost its victim anywhere Between Rs 10000 to 6,00,000 ( $200 to $10000)

  • A ransomware locks the Infected computer screen & make it completely in-accessible to user .
  • It can also encrypt the infected computer file  (convert the file into unreadable form , which can only read with the help of key )
  •  Demands a Ransom from victim and it can ask for money & if it is not paid then this information is deleted By hacker 


How Does Ransomware Infected To Your Computer ? 

A Ransomware can entered to your computer through many ways including :

  • Visiting an infected site 
  • Clicking on malicious link
  • Open an Infected mail attachment
  • Through  USB Drive
  •  Through unpatched security vulnerabilities.

Spread of Ransomware .
 The method of infection varies for most viruses, but ransomware is typically packaged with installation files masquerading as official software updates. They are advertised as updates for Adobe Acrobat, Java and Flash Player. If you’ve opened underground websites such as torrent sites, you’ve probably come across some of the ads used to distribute malware. Typically, a popup opens telling you that you need to update Adobe Acrobat. 
  
Several antivirus companies have come up with ways to remove the virus, but that doesn’t decrypt the files. Unfortunately, you don’t have many options unless you have backups of your data, but you can protect your computer with some common sense.
First, don’t ever download from a site that tells you software on your computer is outdated. Websites aren’t able to detect outdated software unless you give the website permission to read your hard drive. If you think your software needs an update, go to the official product developer’s site and download it directly from there.
Next, always keep the latest antivirus definitions installed on your computer to defend against all types of malware. The one main issue with ransomware is that once you get infected, there is nothing you can do to reverse the damage. It’s better to be proactive with antivirus updates than wait until you’ve already become a victim.
Finally, always keep backups of your files. Hackers know that most people don’t keep backups. Even some businesses fail to keep regular backups, and it’s a big mistake that usually leads to some kind of data loss. Always keep regular backups in a safe place. Note that you can’t keep them on your local hard drive, because these backups might also get encrypted. One safe place is keeping them in the cloud such as Google Drive or Microsoft’s SkyDrive.

Some Anti-ransomware Tools Are -
 

1 ) BitDefender anti-ransomware  

     BitDefender’s tool is intended to act as a protection against being infected by CTB-Locker, Locky, Petya, and TeslaCrypt ransomware. 

2 )Trend Micro Lock Screen Ransomware Tool

 Trend Micro’s tool is designed to detect and rid a victim of 'lock screen' ransomware, a type of malware that blocks users from accessing their PC or systems, and like with all ransomware, attempts to force the victim to pay to get their data back.
Trend Micro lays out two situations in which its tool will be effective. Firstly, when your PC's normal mode is blocked, but its 'safe mode' is still accessible and secondly when lock screen ransomware is blocking both 'normal mode' and 'safe mode'.

3 )Malwarebytes anti-ransomware (formerly CryptoMonitor)

 Previously one of the most dedicated utilities out there, CryptoMonitor was another real-time protection product that used two techniques to do its job, ‘entrapment’ and ‘count protection’.
CryptoMonitor was acquired by Malwarebytes and was as a result renamed Malwarebytes anti-ransomware. The idea is that it prevents ransomware from actually encrypting your computer's files in the first place.
Like many products listed Malwarebytes will run in the background and monitor activity on your network to determine suspicious patterns.

4 ) Kaspersky anti-ransomware tool

Kaspersky's tool is designed for small to medium sized businesses and like Bitdefender, it comes with a tool to prevent ransomware attacks before they demobilise your systems.
Kaspersky's anti-ransomware tool will run along in the background and monitor network activity for anything that matches known ransomware behaviour or patterns.

5 ) Kaspersky Lab decryptors

Kaspersky Lab hosts a wide range of decryptors claiming to decrypt lots of nasty types of ransomware. We've listed them with the ransomware they can decrypt. All listed are free and can be downloaded here.

Rakhni Decryptor
Decrypts files affected by Rakhni, Agent.iih, Aura, Autoit, Pletor, Rotor, Lamer, Cryptokluchen, Lortok, Democry, Bitman and Dharma ransomware.

Rannoh Decryptor

Decrypts files affected by Rannoh, AutoIt, Fury, Cryakl, Crybola, CryptXXX (versions 1, 2 and 3) and Polyglot.

Wildfire Decryptor

Decripts file infected with Wildfire ransomware, which previously infected large groups in Holland and Belgium.

CoinVault decryptor

Created in cooperation with The National High Tech Crime Unit (NHTCU) in the Netherlands, the CoinVault decryptor decrypts files affected by CoinVault and Bitcryptor ransomware.

 

6 ) Avast anti-ransomware tools

Not all ransomware are the same or work in the same way. In fact, in most cases, you'll have to find a decryptor that is specifically made for a certain type of ransomware.
Avast provides 16, which are listed here.
All of Avast's decryptors are free and check for viruses at the same time.
Additionally, Avast provides an installation and decryption wizard. It will then ask you for two copies of your files, one encrypted and one not in order to compare and determine the password. This is much quicker if you've got backups, but if not Avast will recommend locations on your system that uninfected files may be.

Keep Safe !!!
Sharing Is caring !!! 

 


 

 


Read WhatsApp Messages Without Sender Know

4 Simple Methods to Read WhatsApp Messages Without Sender Know

 

As we all know WhatsApp is know showing the blue check marks which lets senders know the recipient has read the message. This particular feature has an advantage as well as disadvantage.
The advantage is you will know whether the receiver has read the message or not. But at the same time, the disadvantage is if you do not reply to the sender right away, the sender may feel awkward and will assume that you have ignored them.
To avoid such awkward situations, here are few simple methods you can use to read WhatsApp messages without alerting the sender’s attention to their action by triggering the blue ticks.

1. Disable Read Receipts Option

Disabling “Read receipts” option is the probably the easiest method to read a Whatsapp message without notifying the sender. By doing so, you’ll disable the ability of WhatsApp to show blue ticks to the sender that tells them that you’ve read their message. But the downside is that you will not be able to see the double blue check marks when someone has read your message as well. Here’s how to disable it.
  • Open WhatsApp and go to the ‘Settings’ menu
  • Tap on ‘Accounts’ and then on ‘Privacy’.
  • Untick the ‘Read Receipts’ option
disable whatsapp read receipt option

2. Peep from the Notification Bar

This is another simple method to read WhatsApp message without alerting the sender. Whenever you get a message on WhatsApp, it shows a notification on your notification bar. Simply swipe down the notification area from the top of the screen and you can easily read the complete or partial message from the notification bar without opening the app. The blue ticks show only when you open the app to read messages.

3. Turn Off WiFi/ Mobile Data Connection

Once you get a message don’t open the app immediately, turn off the WiFi or mobile data and this will take WhatsApp offline. Now go ahead and read the message and you won’t alert the sender since you’ll be reading the message from app cache. To ensure you don’t blow your cover make sure to close WhatsApp app before turning off your WiFi/ mobile data connection.

4. Place WhatsApp Widget to Your Home Screen

If you don’t want to go the extreme length of turning off all your phone’s connectivity. You can place WhatsApp widget on your home screen to read the message at a glance. Since reading message via widget doesn’t open the app so you can keep the blue ticks from showing up. You can even reply to other messages without having to send read receipts to the sender you wish to ignore. But the problem of this method is you can see text messages and emoticons only, images, videos, and voice notes are not supported.
To add the WhatsApp widget to your home screen, tap and hold on a clear area of the screen, then choose Widgets. Keep swiping until you find WhatsApp, tap and hold on the WhatsApp widget, then drag it to where you want it to appear on your home screen.
 Enjoy !!!
Must Share !!!

How To Use Google Maps Offline On Your Android Device

How To Use Google Maps Offline On Your Android Device

How To Use Google Maps Offline On Your Android Device

Google Maps is one of the best android application if you are going somewhere out. Google maps is one of the best invention of google because it has many features and most of the times this application is preinstalled in your android device. This is something exciting feature of this application.
You can locate any address with the help of Google maps and view it with the help of street view, traffic view and satellite views. This application needs GPS to be turned on if you want to search for any places around you. Google Maps can help you to find your way home.
Use Google Maps Offline On Android
As we all know that Google Maps is online Android Application and a cross platform. There are applications which uses Google Maps configuration settings such as WhatsApp, Facebook and many other sites. Which are having good and highest rankings of the application and sites.

How To Use Google Maps Offline On Android Device

You can easily use Google Maps offline with the help of this article. It is easy and you can take out one part of the map. Then after that it will automatically give you offline map. This procedure is simple and we are going to teach you below. As we all know that Google maps takes high amount of data and you need 3G / 4G or WiFi. Using your data connection is something tough and google map is going to consume your all data.
If you accidentally you close google maps then it will again consume your data and then you need to save it again. Just to follow all those steps again and again you can simply follow this steps to save your map offline in your Android device for easy and fast process. Then after saving your map offline this map will be saved in your places and it will be saved for 30 days. You can put any place data and it will automatically do all those settings. Many of the users thinks that this is impossible and no one can do it. But you can do it and it is simple and easy process.
In this method you will be downloading a particular area of map and you can name that area such as your home or any other area of your choice and then you can look at that area whenever you want to view. No matter if you have internet connection or not. But this method will work absolutely fine. Let’s get started with the method.

Methods To Use Google Maps Offline On Android Device

  • Firstly download and install Google Maps on your Android Device – Play Store.
Use Google Maps Offline On Android
  • Open the application and click on Accept and Continue.
Use Google Maps Offline On Android
  • Now, click on top left corner and there you will see an option of 3 line menu screen click on it.
Use Google Maps Offline On Android
  • Now, click on “Your Places” to add the map to offline.
Use Google Maps Offline On Android
  • There you will see an option to save the map offline click on it.
Use Google Maps Offline On Android
  • Now, you will get a window to save the map offline and then zoom in the particular part of area
  • Now, name your name or any name of your choice.
  • The map will automatically start downloading easily.
Use Google Maps Offline On Android
  • Now, it is done you have successfully download the map.

How to Access Saved Google Map

  • Open Google maps and you will see an swipe left.
Use Google Maps Offline On Android

  • Now, click on the option and click on “Places”.
Use Google Maps Offline On Android
  • Their your will see your map and click on it
  • Now, you can access your map offline easily with the help of google map.

Terms & Conditions.

  1. The area can be selected which is just a small part of the map.
  2. The saved map will be deleted/Erased after 30 days.
  3. Accessing the location might be slow because of no internet connection
You won’t be able to access the step to step map. Because you are not having internet connection.

Enjoy Offline Map !!!
Must Share.

How To Remove Your Phone Number From True Caller

How To Remove Your Phone Number From True Caller

How To Remove Your Phone Number From True Caller.

Nowadays we receive many of the unknown calls, and we use the software to search the number is True caller. Whenever we get an unknown call we ask from our friends (True Caller Hai) :P. Many of times we get an error of number not found so in today’s trick, I will be showing you how can you delete the number from true caller.
Whenever we don’t get any result in true caller that is the reason that no one has save that number in their phone book, and you don’t find any search results. Many of times in landline number. Your all details are given even sometimes in your phone number. So in this case if you have to delete the number and you don’t want to share your details with strangers? What can you do?
Today, I am going to show you how can you delete your number from true caller from iPhone, Android, & Windows.

How To Delete Your Phone Number In iPhone (iOs).

  • Download the True caller application and open it
  • Now click on Me section in lower right section
  • In the Top right you will find a Gear option
  • Click on About True Caller and now scroll down
  • You will see an option called as Deactivate Your Account .

How To Delete Our Phone Number In Android

  • Open the true caller application and on the top left, click on your profile
image
  • Now click on  Settings and now the main screen will be started
image
  • Now, Click on About Screen by scrolling down in the last
image
  • Scroll down and you will see an option called as Deactivate Your Account

How To Delete Our Phone Number In Windows Mobile

  • Open the true caller application and click on Top Right 3 Dots Menu
  • Click on Settings and scroll Down
  • Now, click on Deactivate Your Account
Now You have deactivated your phone number now in the next step you have to remove your phone number from TrueCaller

How to Remove Your Phone Number From True Caller Unlist Page

  • First of all head up to this link from here – True Caller Unlist Page
  • Open the page and enter your phone number with the proper country code (Eg. +919773986279)
  • Select the reason and enter the Captcha code
Now You’re Done and now the true caller will take approx 24 hours to delete your phone number from true caller and this was the guide how can you delete your number from true caller. I hope you liked this guide,

Search For Any Phone Number Without Installing True Caller

Search For Any Phone Number Without Installing True Caller



True Caller Script – Search For Any Phone Number Without Installing True Caller


Everyone would have heard if you have not then don’t worry about that because true caller application is the one application which helps you to search number which is calling you anonymously or else the one who whom you don’t know.

For that you have to download the application in your phone and then register yourself on to true caller and then try the number which ever you have to search on the true caller.
If you are having Computer then open true caller site and access the information as the same way you do in the app that is registration.


What if you don’t have true caller app on your mobile and if you have to access to the number details at that time, or you are having low data in your device what would you do in the following situation?
There is nothing you can do. Then today I am here with the script from which you can easily take out the information about the number of this script is available for free to all our Xtreme Tricks viewers you can search anything your numbers and other details with the help of this script.
True Caller Script

What Can This True Caller Script can do?

This true caller script does the same thing which true caller does which is searching for the details and you will get the number details which is entered in your true caller account name.
Which is a great feature of this script? With all this you can also know the location of the mobile number and find out the location where is this sim card or we can say of which state the sim card belongs.

Along with the carrier name which sim card you are using. Which is a great feature of the site which makes this script super fast? We have made this script super fast so that you can search for the number without any issues and errors.
If the number has registered their name on true caller so they can also view the email account of the person which makes this script more unique.
So you can easily search for the number. This script is having some advantage and disadvantages too which you should follow or else this script may get blocked

Advantages:

  • Searches for any number
  • Give the same details which are available on true caller
  • Gives the details such as Email I’d, city, area which is good for tracking the phone details

Disadvantages:

  • Doesn’t give the phone exact location
  • Don’t use this script more or the API will get blocked.
Note – Please Don’t use this script for fun purpose or else it may get blocked and then you won’t be able to search the number again so please use once don’t get carried away by searching every number

How To Search For Number With This True Caller Script

Step 1: Enter your phone number details which you have to search
Step 2: Now, Select the Track Button and wait for some time
Step 3: Boom! You will get the number details
Note- If you are not getting the script below so the script is been blocked we will surely post the new script soon.

 Changelog:

  • Some Bugs Fixed from Script.
  • 7 errors are removed from script.
  • Only (1 error is left to solve)
                                                 True Caller Script

Conclusion:

This was the tutorial about the script of the true caller you can easily access the script by visiting our site I hope you liked this tutorial if you like our tutorial share on Facebook and stay tuned for more tips and tricks. If any difficulty feel free to comment below thank you for visiting and peace out

How to remove shortcut virus from USB drive, computer?

How to remove shortcut virus from USB drive, computer?

A virus infected computer really turns out to a big issue. When our virus scanner detects any threat on our system it becomes a matter of concern and we immediately seek for solutions to fix them. Similarly, the shortcut virus affects our PC and hides all the original files and folders, including in pen drives, memory cards and flash drives too.
In this article, you will learn about shortcut virus, its types, “how to remove shortcut virus easily from your computer or pen drive” and how to prevent it from appearing again in your computer, pen drive.

What is Shortcut virus?

It is the new generation virus which makes all the original files and folders hidden and replaces them with a shortcut icon. When any program is replaced with the shortcut files you won’t be able to use them, which turns out an absolutely frustrating issue. The shortcut virus also stretches itself to other connected PC’s and external drives via Bluetooth and internet connections. Shortcut virus is commonly named as autorun.inf in removable drives and it keeps on spreading by creating multiple shortcut files and folders. This virus might occur in most Windows systems, including Windows 7, Windows 8, Windows 8.1 and Windows 10.



Types of Shortcut Virus

This appears to be of two kinds which most users come across in their Windows system.

(1) Files and Folders
The files and folders shortcut virus are normally discovered by most Windows users. This happens due to an outdated antivirus program or usage of highly infected removable drives in your system. Files and folders shortcut virus easily reproduces the original files and make them hidden or inaccessible. Clicking on such shortcut files may endanger your system and steal your private data in the background.
(2) USB flash/ Pendrive
USB flash/ Pen drive shortcut viruses are Trojans and they can seriously infect your PC. It puts each and every folder of your pen drive to a hidden folder by creating an executable (.exe) file with the same icon. Such viruses leave no other option other than clicking on it and spread malicious scripts on your PC.

How does USB shortcut virus appear?

Possibly a shortcut virus might appear due to several reasons:
  • You have connected a third party malicious removable drive to your system.
  • You have connected your USB stick to someone else’s system which contained a virus.
  • You downloaded an executable (.exe) file from untrusted third party software that contained the virus.
  • You have probably turned on Bluetooth in your system and your antivirus is outdated. This is why the malicious files have been transferred automatically to your system because of inappropriate virus protection.

How to remove shortcut virus from pen drive and computer?

Normally in such situations, people do a system scan, but does that really work out? After researching a lot on the web, I came across a few solutions which can help eradicate the shortcut virus problems and give you a virus-free system. Today, I am going to share few of those tricks to recover from the shortcut malware from your computer, as well as removable drives.

Ways to remove shortcut virus from USB and PC

(1) Using CMD
If you want to avoid using any virus removal programs then simply try out the basic solution to delete shortcut virus trouble. Use the computer CMD program to erase it, simply follow the process below:
  • Go to Run > type CMD > Enter, to open the Command Prompt.
  • Connect your USB storage to your computer.
  • Type the drive letter of your removable storage followed by a colon and hit Enter.
  • Now type the letter of your removable storage followed by *.* /d /s -h -r -s(For example, if your removable drive is F then type f *.* /d /s -h -r -s). 
  • Hit Enter.
how-to-remove-shortcut-virus
(2) Use Shortcut virus remover software
In case you are scared to run the command prompt with the fear that you might mess up with your system, then try installing a shortcut remover tool. Using such tools will automatically fix out the trouble and that you won’t need to put any effort to it. It is an effective program that eradicates all shortcut malware from PC as well as USB drives.
  • Download the Shortcut virus remover on your PC.
  • Since this a click to run the application, this does not require any installation.
  • Once it is downloaded, open the application and select either from Pen drive or computer.
  • Select the drive which is affected –> press the Scan button.
  • Shortcut virus remover” automatically detects the shortcut malware and provides you the option to select and delete all viruses with a single click.
virus-remover-tool

(3) How to remove shortcut virus with USB Fix?
USB Fix is an all in one “virus shortcut” remover tool that detects any shortcut virus and erases it from your system. This tool can remove any external drive, including USB flash stick, memory cards, digital cameras, external hard drives, etc. Before using USB Fix make sure you close all programs from the taskbar because when it starts working, it closes all the programs and hence, you might lose your data. To use USB Fix on your Windows PC,
  • Download USB Fix from here.
  • Run the program.
  • Connect your external drives to your computer > Select Clean.
USB Fix automatically detects the shortcut viruses and cleans them up.
shortcut-virus-remover
(4) Use VBScript to remove shortcut virus
VBScript is not an application, but it is a simple script which is coded to scan files to trace the virus. This script takes just 30 seconds to get its work done and cleans up all the infected files and folders containing the virus. Simply download the script from here and run it and it will automatically perform the tasks. A pop-up box will appear and you need to click ‘OK’ in it. Perform the same task for 4-5 times and run it. The shortcut viruses will be disappeared from your system. VBScript supports Win 10 systems also.

(5) Create a BAT file
If the above methods fail to remove shortcut virus from the computer then try creating a BAT file. BAT file is nothing but it’s just creating a file on your Windows PC using a notepad. To create a BAT file,
  • Open Notepad from your Windows start menu.
  • Copy and paste the following code on the notepad:
  • Replace the ‘Drive’ name with your removable drive.
  • Click on File > Save as > Save as type ‘All files’ > rename the file as removeshortcutvirus.bat.
  • Save it to your desktop.
  • Now close the notepad.
  • Go to desktop and open the BAT file you have just created.
All shortcut viruses will be removed from your laptop.
(6) Remove virus shortcut by tweaking registry files
Another way to eradicate the short virus is by tweaking the registry files. To apply this method, you do not require any third party tools or downloads. This method is recommended only if you are aware of this otherwise I would not suggest it in case you mess up with your system.
  • Press Ctrl + Shift + Esc to open the Task Manager or Right click on your Taskbar > Open Task Manager.
  • Under the Processes tab, scroll down to find wscript.exe.
  • Click on it > click End Processes.
  • To open the Registry Editor, open Run by pressing Win + R keys > type Regedit > Enter.
  • On the left pane of the Registry Editor window, navigate to HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/Run
  • Look for the Registry key odwcamszas > right click on it > Delete.
remove-shortcut-virus
The Registry key might differ according to the height of the virus. In case it differs or you don’t find the specified key, you can skip this method.

How to prevent virus shortcut to appear in your system?

Although you have learned a big lesson from shortcut viruses, you should not sit calmly predicting that your system is malware free. To prevent such viruses to appear again in your system, you should be very cautious about it and take some prevention measures to keep them away.
  • Keep your anti-virus up to date.
  • Update virus definitions regularly.
  • Access any removable disk after scanning them properly.
  • Turn off your Bluetooth if you are not using any antivirus program.
  • Do not plug in any USB drive if your antivirus is outdated.
  • Run boot scans once in 2-3 weeks.
  • Do not open a file by double-clicking on it since some malicious scripts are likely to be hidden there or the folders are executed when someone double clicks on it. To keep it safe, right-click on a file and click Open.

Conclusion

Hence, you are now aware of what shortcut virus is and how to erase and prevent them. It is always advisable to use updated antivirus program on your Windows PC and do a proper scanning of any removable media or hard disk before you access them.

Create Android App For Your Website Without Coding



Create Android,Windows,Iphone App For Your Website Without Coding


These days usage of smart phones and tablets are higher than laptops and personal computers comparatively. Your existing website  you have created will not provide good user experience considering the small size of tablets and smart phones.
As an alternative, you have to create either mobile optimized website or create apps for all major mobile OS. If you want to create inly basic app and don’t want many more advance functionalities then you can do it without coding.There are many website which can develop android, ios, windows app for your website.This list includes,

Using this, you have to just submit your site url, app icon,Name , description  and on click the app will be created.


(2) http://www.appsbar.com/AppManager/


Using this website , you can create dynamic app too. You can choose from different varieties and select the one which suits to your app.


(3) http://www.appyet.com/





To create Stunning android app, this website also you can use.
You can also monetize the apps created using these websites.


Sharing is caring !!!!







Make a special Holi Greeting With Your Name

      Make a special Holi Greeting With Your Name.

  • ENTER YOUR NAME TO WISH YOUR FRIENDS AND FAMILY MEMBERS 





Click Below link To Make Your Name...


http://festival.royalgovtjobs.com/create.html

What is A Firewall ???

What is A Firewall and Reasons Why You Should Use it.

Facebook
https://codingsec.net/2016/07/what-is-a-firewall-and-why-you-should-usit
We all heard about firewall at some point of time, what are they used for ? Do they stop viruses
Well actually, there is a great chance that you are now using a firewall,  if  your are running a modern OS on your computer, there is be one built in, or else your security suite will have a firewall.
But what is this firewall for? Keep reading for reasons why you do, need it.

What Is a Firewall?

Lets start it with what a firewall actually is. You should understand that there are no sparks, no flames, no fuel of any kind of that stuff involved,
A firewall is a shield or barrier which is intended to protect your PC, phone or tablet from data-based malware dangers that exist everywhere on the Internet. 
Data is usually exchanged between your computer and servers and routers in cyberspace while you are using internet, and the purpose of firewalls is to monitor this data (sent in packets) and check if they are safe or not.
Firewalls do this by establishing whether the packets meet the rules that have been set up. Depending on on these rules, packets of data are rejected or accepted.
Most operating systems (both desktop and mobile) will have a basic built-in firewall, but the best results can be seen by using a dedicated firewall application. Here are 5 reasons why you should use  a Firewall.

1. A Firewall Can Protect Your Computer From Unauthorized Remote Access

The worst thing that can happen to a computer user is someone attempting to take control of it remotely. Seeing mouse of your PC move around your monitor as a remote intruder usurps your digital world, assuming control of your personal data, is petrifying.
with a well configured firewall (and a modern OS) you will have remote desktop access disabled, and thus preventing hackers from taking charge of your computer.

2. Firewalls Can Block Messages Linking to Unwanted Content

There are still people out there running older versions of Windows(i mean very old like Windows XP). Worse part is that they are using XP without any firewall, and the built-in firewall is not enabled by default.
You read that right. The Internet has a lot of malware traversing the cyberspace, waiting to pounce on the unprotected PCs. Even though your ISP can help prevent this, it is unlikely that they will be able to in a long run.

3. Firewalls Make Online Gaming Safer

In the history of video games, online gaming is one of the most significant development and it it also a potential security risk. Many kinds of malware has been developed which targets online gamers, who use an unsecured or compromised game servers.

4. You Can Block Unsuitable Content With a Firewall

So far, we have been talking mainly about blocking hackers and other types of remote access threats like  malware, but firewalls are capable of more than just that. Apart from protecting you from ransomware directories, firewall applications also have an option to block particular online locations.

5. Firewalls Can Be Hardware or Software

As we said above, firewalls don not necessarily have to be just software. Hardware firewalls are also found in most homes, built into your router. You can access these firewalls by using the administrative credentials for the router, and once you’ve signed in you should be able to review the options and change them if necessary.
Hope you like this article, please comment your opinion below.

password protect folder without using any software

password protect folder without using any software



password protect folder without using any software using batch file programming. This trick will work on all windows platform (Win XP, Win 7 win 8). Follow below tutorial to learn this trick.

How To Lock Folder ?

   1. Open Notepad and Copy code given below into it.
cls
@ECHO OFF
title coolhacking-tricks.blogspot.com
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST MyFolder goto MDMyFolder
:CONFIRM
echo Are you sure to lock this folder? (Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren MyFolder "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock Your Secure Folder
set/p "pass=>"
if NOT %pass%== Techsagar goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" MyFolder
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDMyFolder
md MyFolder
echo MyFolder created successfully
goto End
:End
   2. Save the notepad file as lock.bat (.bat is must)
   3. Now double click on lock.bat and a new folder will be created with name MyFolder
   4. Copy all your data you want to protect in that New folder
   5. Now double click on lock.bat and when command promp appears Type Y and press enter.
   6. Now MyFolder will be hidden from you view, to access that folde double click on lock.bat
   7. It will ask for password enter your password and done. (Default password is techsagar)
  • To change the password replace techsagar with  new password in the above code

How To Further Secure ?

You might be thinking that anyone can access the password by opening that lock.bat file in Notepad or any other text editor. To make it more secure hide lock.bat in some secure location after following the above tutorial To access the secured file double click on lock.bat. I would suggest copying lock.bat file into Pendrive and copying it into your computer whenever you required to access to your protected files.

How You Can Say ‘Hello World’ In 20 Different Programming Languages

How You Can Say ‘Hello World’ In 20 Different Programming Languages

Let’s get started with the syntax and programs which you can say in programming. Some of them are easy and some of them are little bit tough.

1. C

#include
int main(void)
{
puts(“Hello, world!”);
}

2. C++

#include
int main()
{
std::cout << “Hello, world!”;
return 0;
}

3. C#

using System;
class Program
{
public static void Main(string[] args)
{
Console.WriteLine(“Hello, world!”);
}
}

4. Java

import javax.swing.JFrame; //Importing class JFrame
import javax.swing.JLabel; //Importing class JLabel
public class HelloWorld {
public static void main(String[] args) {
JFrame frame = new JFrame(); //Creating frame
frame.setTitle(“Hi!”); //Setting title frame
frame.add(new JLabel(“Hello, world!”));//Adding text to frame
frame.pack(); //Setting size to smallest
frame.setLocationRelativeTo(null); //Centering frame
frame.setVisible(true); //Showing frame
}
}

5. JavaScript

document.write(‘Hello, world!’);

6. HTML

Hello World!

7. Python

print “Hello, world!”

8. Pascal

program HelloWorld;
begin
WriteLn(‘Hello, world!’);
end.

9. Ruby

puts “Hello, world!”

10. Visual Basic .NET

Module Module1
Sub Main()
Console.WriteLine(“Hello, world!”)
End Sub
End Module

11. MatLab

disp (‘Hello, world!’)

12. jQuery

$(“body”).append(“Hello world!”);

13. Bash

echo “Hello World”

14. Perl 5

print “Hello, world!”;

15. Basic

PRINT “Hello, world!”

16. Objective-C

#import
#import
int main(void)
{
NSLog(@”Hello, world!”);
return 0;
}

17. XSLT

Hello World

18. CoffeeScript

console.log ‘Hello, world!’

print [Hello, world!]

20. VBScript

MsgBox “Hello, World!”

Must Share !!!

 

How to Turn An Old Android Phone into a Networked Security Camera

How to Turn An Old Android Phone into a Networked Security Camera

 If you want to have your home, office or even your toilet (really bruh…) under CCTV surveillance but don’t want to spend a significant amount of cash on those pricey cameras or those smart cameras and having any old smartphone then you’re in luck.

3 Best app are...

1. IP WEBCAM

IP Webcam is an Android app that lets you transform your phone into a network camera which will let you remotely view videos that are captured real-time. You can view the video via a browser or stream it over your phone

android phone as a web cam
After installing the app on your phone, you need to configure the settings which include the login and password, resolution, frames per second, image quality, and TCP port. Once you are set, press “˜Start Server’ on the app and it will display the URL of the video so you can view it remotely.
Keep in mind that you need a Java browser plugin to view the video in your browser. Furthermore, you may also take snapshots using the “˜Take Immediate Photo’ feature.



  IP Webcam is a great solution if you do not have a remote camera around. It is available for free in the Google Play Store.

2. HOME SECURITY CAMERA – Alfred



Alfred is a video monitor that allows you to check on your home from your smartphone or tablet, wherever you are, thanks to a Wi-Fi or 3G/4G connection.
It’s very simple to use Alfred, you just need to install the app on your devices and select one of them to be the Camera and another to be the Viewer.
Alfred allows you to communicate directly with whoever in front of the Camera via the microphone of their device. This functionality sends your voice across. You can sing to your baby, talk to your baby, or deter an intruder.
Check on your home even without Wifi connection. Alfred also works on 3G/4G
Alfred is compatible with the majority of smartphones and tablets, you won’t need to have two identical devices at home anymore! Consider looking at the Help Center for more information on the installation of Alfred.
A WebViewer is also available to watch your video feeds from your computer.
Upon movements in front of the Camera, Alfred immediately detects motion and you will receive notifications with video clips on your Viewer. Motion Detection sensitivity can be set within the application settings.
If your Camera is watching over a dark place, try Alfred’s night vision. Or, turn on the flashlight on your Camera remotely from your Viewer device.
Motion detection videos are saved in the app for 7 days.
Your phone comes with two camera lenses. Switch from the front to the back camera remotely from your Viewer device.
[BE REASSURED]
Don’t miss a thing! Alfred shows the battery level of your Camera, as well as the signal quality.

3. HOME SECURITY CAMERA – WardenCam

WardenCam turns your spare Android smartphones and tablets into home surveillance cameras that you can watch while you’re away.