Saturday, 6 July 2013

I Want My Phone to Be Smartest Not Only Smart

My smart phones are much more than phones for me —Smart Phones are powerful, networked multimedia computers. The first smartphones combined the functions of a personal digital assistant (PDA) with a mobile phone. Later models added the functionality of portable media players, low-end compact digital cameras, pocket video cameras, Web Browser , High Resolution touch screen and GPS and many more. Over the next 10 years they will get more advanced. Their are some awesome features which will create revolutionary change in phone market.


1 - Bio-metric Password : Advance sensors in phone will make it possible . Rather than accessing my different account , different site i will be able to access data on my smart phone through finger prints or eyes or any bio- metric feature . Like when  i touch the screen, it will recognize me based on my fingerprint or  my  phone’s front-facing camera will use facial recognition to identify me or through voice recognition . Bio - metric usage should be according to the requirement of security . Like if i am accessing my mail , Facebook , Twiter , then it finger touch verification if ok . but when somebody try to open bank account then their should be multiple bio-metric to verify authentication .

2- 3-D Display and 3- D browser : It will be a awesome feeling if i will see 3 - D movies on my phone and play 3 - D game on my phone. It will change overall gaming experience. With 3- D browser instead of just viewing web pages or access site on your smart phone, you’ll be able to go into environments and maneuver around in them, just as you do on devices like the Xbox.

3- E-Card Or E- Wallet : E - Wallet make transaction and shopping easier and safer. Like Google Wallet is a mobile payment system developed by Google.  Google Wallet allows users to store debit cards, credit cards, loyalty cards, and gift cards , as well as redeeming sales promotions on their mobile phone.Google Wallet make secure payments  fast and convenient by simply tapping the phone.

4- Intelligent assistant :  Intelligent assistant which store my interest ,my preference , my likes and my need .  As Siri-like it will turn into personal assistants and will be able to search the web for you and bring back focused, highly relevant information. my ultra intelligent agent will have a face when you are looking at the screen and a personality that you choose.

5 - Connected Gaming Experience : It will be a awesome feeling to play multi player game in real time on my mobile phone with my friends , share same screen , create a same environment and finally win the game .
As google started to create a game where two main things :
Room: A virtual meeting space where games take place. Players can be invited to join rooms, or be automatically matched into them. Players that are connected to the same room can exchange game data with each other.
Participant: Players that can participate in a game. A local player can send invitations to other players from their circles to join a room, or request to be auto-matched to random players. A player who is sent an invitation will see a notification to accept the game invitation. If the player accepts the invitation, they are joined to the room. The state of the participants in a room is managed by Google Play game services and is sent to the game clients.
One more advance feature we can store our gaming states on Google cloud and start playing from the same place. 

6 - Easiest and Fastest  Data transfer : It will be great if we touch our phone and data will get transferred in seconds . The group of many companies involved in the development of TransferJet  and includes many industry giants such as Sony, Canon, Kodak, Nikon, Pioneer, Toshiba, Samsung and many others. With this new technology, there will be no need for access points or complex data transfer setups. By touching the two devices together, intuitive operation will kick in and the files will be transferred automatically.

7- Screen Less Phones : This will be revolutionary idea to have a phone with out screen .This will be touch and voice activated. When i  tap it,  i will be connected to my ultra-intelligent agent, which is part of a super computer in the cloud. Whatever i  need, my ultra intelligent agent will be able to verbally give me the information, such as emails and phone attend phone calls , read email and whatever i say to do it will do for me then my phone become my best friend.

Wednesday, 3 July 2013

Beware Microsoft And Google - Apple is Going To Compete You With Office on Web

Apple announced it's working on the browser based version of the iwork productivity application .
Apple’s solution,  iWork for iCloud, built with one goal -  to make a web-based app experience that’s as good as a desktop application. The results are going to be impressive. It’s a sharp contrast with Google’s strategy with web-based Google Drive. According to the Tech Experts "Google is really going to up it’s game when iWork for iCloud goes public. It’s not just good, it’s miles ahead. "

iWork for iCloud is to be a full featured application that will run on browser on any OS and allows documentation creation and editing . According to Apple " iWork has always been the best way to be productive on the Mac. And iWork for iOS made it easy to create beautiful documents on iPad and iPhone. With iWork for iCloud we’re bringing Pages, Numbers, and Keynote to the web — on Mac and PC. And thanks to iCloud, your work is always up to date on all your devices. " 

It's Provide beautiful features .
PAGES FOR iClOUD : 

1 - Now your are able to create great-looking letters, reports and more in your browser  using the power of Pages for iCloud. It's provide awesome feature of text around an image or editing a document you imported from Microsoft Word. It's so fast that you will forget you are on web .


2-  Provides the easy formatting option with Right in your browser,  formatting tools you need to make your documents look just the way you imagined. You can try the preset styles, or change things up with your own ideas.You can rotate, mask, and resize images and enhance them with shadows and reflections.


NUMBERS FOR iClOUD :

1- Numbers for iCloud makes it easy to bring simplicity, clarity, and even beauty to your spreadsheets in your browser on Mac or PC. With prebuilt functions, tables, and formulas, you can organize and analyze just about anything . Even you can work on Microsoft Excel files only by dragging then you can work on this .


2-  iWork For iCloud enables you to open a browser and get started with a well-designed template. Tables are already built. Formulas have been figured out. They’re all ready to go. Just add data, graphics, photos, and words to make it your own. Or start with spreadsheets you’ve created on your other devices. Numbers is very accommodating.



3- Numbers tables are prebuilt — You need to choose data according to your data only . Working on the free-form canvas in your browser, it’s easy to sort your tables, merge cells, and use headers to freeze rows and columns. Simply drag and drop rows and columns to reorder them, or hide some to see only what you need.


KEYNOTE FOR iCLOUD:

1Keynote for iCloud gives  flexibility to create awesome  presentations, and even present them, directly in your browser. KeyNote come with incredible transitions and slide animations, Keynote brings presentations to life on Mac or PC. KeyNote also provides feature of editing and importing Microsoft PowerPoint files .




Monday, 24 June 2013

How To Block Website on Google Chrome

Now blocking of website is so easy . Some time blocking of website is  organizations need and some time you don't want to make visible site to your family and children. You can block thousands of website even you don't need to follow complex step (like change host file ) .

For blocking website on Google Chrome you need to follow these simple steps . 

Step 1 : Open Google Chrome Browser . 

Step 2 : Type "Google Chrome Extensions" and Click on the First Link.


Step 3 : Type Site Block in text box. 


Step 4 : . Add Site block to Chrome by click on button "ADD TO CHROME".


Step 5 : Go to Settings - > Extensions and Click on the option button 



Step 6 : Type the websites which you want to block and Click on the "Save option". 


Step 7 : Now close the tab and try to open blocked websites . These sites will not open in Google Chrome .




Wednesday, 5 June 2013

Downgrade Window 8 to Window 7

If you don't like window 8 and want to install window 7 again then you will be happy to know you can degrade Window 8.

The Professional edition of Windows 8 comes with “downgrade rights.” If you’re not happy with Windows 8 on a new computer, you can downgrade it to Windows 7 for free – as long as you have Windows 8 Pro.


You have to follow following steps for degrading window .

Step 1 - Open "Elevated Power Shell" in window 8 . 
Go to "Apps" and type in search box "Powershell" .

Step 2 - Now type Confirm-SecureBootUEFI.


Step 3 - Verify the output 


If system returns true that means BIOS is set to Secure Boot and go to step no 4 .
If system returns false that means BIOS is not set to Secure Boot and go to step no 5 .

Step 4 - Reset BIOS to default . 

a) Go to settings -> Change PC settings -> General -> Advance Start-up - > Restart Now -> Troubleshoot -> Advanced option -> UEFI Firmware Settings then select Restart .
b) Now select setup defaults (may be F9 )
c) Select option "Save and Exit" (may be F10)
d) Disable secure boot control (Optional if  popup window came )

Step 5 - To Boot up your DVD .
Click on the UEFI and Press Enter.


Now you can install window 7 in your system .




Monday, 3 June 2013

Increase System Speed - Using External USB (Pen Drive) as RAM

By connecting a USB stick to a window computer you can speed up your system using Ready Boost .Window Vista and above include a new feature Called Ready Boost that enable you to plug in a flash memory or SD card to store commonly used files for quicker access.

For increasing speed you need to follow just a simple steps :

1:  Insert a Flash memory (Pen Drive ) or SD card into system .



2- Click on the "Speed up my system " icon of the the "Autoplay " popup window . 


3- Click on the option " Dedicate this device to Ready Boost" and then "OK" button .


4- Verify the Flash Drive memory status.



Now use device and you will get increased speed . Enjoy a increased speed of system .









Sunday, 30 December 2012

Google Hacking Techniques

Google hacking Tricks : 

Google hacking is a technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites use. Some search techniques are used for extracting exact information from the Google database .  You can find special operators here :

1. Use the "+" sign to focus a search for an overly common word . Use "- " sign to exclude a term from search . 
eg. Mullet usually used for two things 1) Haircut and 2) Fish . If you simply search for the mullet then Google shows the mixed result like 

If you search smartly then you will get smart and best result . If you want mullet fish then search  mullet -haircut . Then you will get result related to mullet fish 
             
2. To search for a phrase , use " " surround the phrase . like " Sand sharks" . This will search about the sand fish instead of sand and sharks.

3. A period (.) serves as a single character wild card  

4. An asterisk represent the any world - not a completion of world .

Google advanced operators uses a syntax that refine the search . you can find more operators in following video . 






Saturday, 29 December 2012

What is Google Hacking


Google Hacking :

Google hacking is a technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites use. It involves using advanced operators in goggle search engine to locate specific text/file within search result . There are generally two types of vulnerabilities to be found on the Web: software vulnerabilities and misconfigurations . Although there are some sophisticated intruders who target a specific system and try to discover vulnerabilities that will allow them access, the vast majority of intruders start out with a specific software vulnerability or common user misconfiguration that they already know how to exploit, and simply try to find or scan for systems that have this vulnerability. Google is of limited use to the first attacker, but invaluable to the second.

Today there are scanners that automatically query IP addresses to see what proxy for exploits. A proxy is an intermediary system that an attacker can use to disguise his or her identity.

The following search query would locate all web pages that particular test contained within them . It is normal for default installation of applications to include their running version in every page they serve , eg. , “ Powered by XOOPS 2.2.3 Final “ .

Google hacking aims to find the things on web which can be useful for hackers .  Hackers mainly focus on these juicy information :

     
Error MessageReally retarded error message that say WAY TOO MUCH . Eroor messages  Like Error: No user found with name mike+AND+ , Microsoft OLE DB Provider for ODBC Drivers error '80040e37'

Advisories and Vulnerabilities : The search locate vulnerable servers . These serches are often generated by the various advisory ports and in many case are product or version specific .

File containing important information : No username password but these files contain interesting stuff 

File containing Password : Passwords , For Love ! Google found password 

File containing username : These file contain Usernames , but no password still Google finding username on web site . 

Footholds : Examples of queries that can help a hacker gain a foothold into web server .

Page containing login portals : These are the login pages for the various services . Consider them the front door of website's more sensitive function . 

Pages containing network or vulnerability data : These pages contain such things as firewall logs , honey pot logs , network information , IDS logs  all sorts of functions .

Sensitive directories : Google's collection of web site sharing sensitive directories , 
the file contained in here will vary from sensitive to uber - secret . 

Sensitive online shopping information : Example of queries that can reveal online shopping info like containing customer data , suppliers order , credit card no . , credit card info , etc . 

Web server detection : These links demonstrate Google ability to profile web servers .  

Vulnerable files : Hundred of Vulnerable files that Google can search on web site .