Friday, April 29, 2011

Iphone 5


App store developer FutureTap revealed via twitter that they got their first crash report from a device using the new iOS 5. What does this mean? This means that apple is field testing the iOS 5 for the iPad, iPhone, and iPod Touch with applications in the App Store. The application crash was related to the iOS 5 maps and location function.
This could mean Apple has changed their Maps and Location API, which may cause problems for GPS Apps and the like made for the iOS 4. Apple be officially unveiling the iOS 5 at the Apple’s World Wide Developers Conference this coming June. Apple will likely be releasing the iOS 5 alongside the iPhone 5 sometime in September 2011.


Thursday, March 17, 2011

Using Hamachi to Play LAN Games

Hamachi is a program that allows you to form connections over the internet that usually could only be done physically-basically making it computer networking software. It's free and is available for compatibility with Microsoft Windows (Vista included), Linux, and Mac OS X. 


Once Hamachi is downloaded and installed the rest of the process is relatively simple and anyone can set up a private server. Once Hamachi is opened up, there are three icons that show up along the bottom of the rectangular menu. Clicking on the triangular icon opens up the networking menu, where you can join a network if you have the proper information or set one up. Setting one up is as simple as choosing a name and creating a password.


Download free Hamachi here.

Saturday, March 12, 2011

Autocad tutorial


This web site consist of free AutoCAD Video Tutorial
This web site as one stop center for AutoCAD Tutorial in this planet. This web site consists
of online cad training, cad drawing ready for download, Auto CAD software, free dwg download,
dwg free viewer download, autocad tutorial, cad drawing, cad forum ,AutoCAD 2006,AutoCAD 2007,
AutoCAD 2008,AutoCAD 2009,AutoCAD 2010 and AutoCAD 2011 AutoCAD Tutorials.


Follow this link and read full tutorial how to use Autocad.

Sunday, March 6, 2011

How to morph photo

I recived one tutorial on my mail from my good friend Ange from Florida and its very simple and useful,check it out.

make all pics the same size,(view at 50 or 100%) center, add morph points in area/on main pic- move with the arrow in the other pics, then add more if needed/again move so you don't loose track of them.

When saving -Morph speed 100,
PERIOD *20 -30 The higher the period the slower the speed on saved version.

I always pick reverse in Morph so it will cycle and MORPH VERSION 2 instead of 1 or wild, but thats the basics. Have fun! Save as gif and if pic is too large reduce % when saving.





This is sample how it can looks at end.

Saturday, March 5, 2011

Protect your facebook account


1.10 privacy settings for Facebook users.  THIS SITE.
2.Protect Facebook account from hackers and phishing scams.  THIS SITE.
3.5 tips to protect your Facebook account :


1. Make your profile ‘PRIVATE”. You could do under the “Privacy setting tap” in your Facebook. When the “Private” option is on, only your friends that you are accepted will be able to see your photos and walls. This is a way that you could protect from people you don’t know to look at your information.
2. Block people that you don’t want to show your information to. You can simply go to their photograph and there should be a block option for you to choose. When this is activated, this person no longer to be able to see anything that related to your account and this a great options to avoid people that is bothering you.
3. When you block a person, there will be a window pops up and ask you for the reason. You must REPORT them if they have cyber stalking or harassment. It is important to REPORT if this is really happening, because people will not stop if no one reports.
4. Only add people that you really know and this is the best internet security in any ways. By building your list to 1000 of people doesn’t mean you really have a big group of friends. Think what is your purpose for using this Face Book, if you just want to keep on adding people, I am so sure you will not put any personal or photos in here, however, if you are use this as for your friends, then you should stop adding people you don’t know for security reasons.
5. Do not buy anything through Facebook. I know there are lots of applications that you need to pay for, but try to ignore it and use the “FREE” things they offers. It is not clever to give out your financial information to 3rd party just because you want to send a picture of a birthday cake to your friends

Follow those simple rules if you want to keep your facebook account safe.Obey the RULES and TERMS of Facebook.



In order to protect your Facebook account against hackers check this site for full info how to set up your settings.


DONT SHARE YOUR PERSONAL INFORMATION WITH ANYBODY NO MATHER HOW GOOD YOU KNOW THEM.THEY MIGHT NOT STEAL YOUR ACCOUNT BUT THEIR PC CAN BE INFECTED AND THAT MEANS BOTH ACCOUNTS ARE COMPROMISED !!!













Protect Your Computer from Spyware and Adware



Adware is software that displays advertisements on your computer. These are ads that inexplicably pop up on your display screen, even if you're not browsing the Internet. Some companies provide "free" software in exchange for advertising on your display. It's how they make their money.


Spyware is software that sends your personal information to a third party without your permission or knowledge. This can include information about Web sites you visit or something more sensitive like your user name and password. Unscrupulous companies often use this data to send you unsolicited targeted advertisements.



Is Your PC Affected by Spyware?


The main problem that most people notice with either kind of program is that they cause performance issues with their computers. For example, Internet Explorer might not work properly any more, your computer might hang more frequently, or your computer might slow down significantly. Removing spyware successfully is difficult enough to make preventing it in the first place a priority.
Unauthorized adware and spyware usually install on your computer covertly by using one of two methods:
Tricking you into clicking a link that installs it. Links to spyware can be deceptive. For example, a Web site that's trying to push spyware onto your computer might open a window that looks like a Windows dialog box, and then trick you by installing when you click a Cancel button to close the dialog box. Sometimes, spyware pushers will put a fake title bar in an empty window, and then install spyware when you try closing the window.
Installing freeware that includes it. For example, you might install a free file-sharing program that surreptitiously installs spyware on your computer. File-sharing programs can be a major conveyor of adware.
For full info and how to protect your pc from threats check this site.
Keep in mind some kinds of adware can break your anti-spyware tools.






PHP For the Absolute Beginner



This area is intended for everyone new to PHP. It opens with a series of informal, entertaining tutorials written by Vikram Vaswani, founder and CEO of Melonfire. These tutorials build on a previously-published 5-part series which has now been updated and extended to embrace PHP 5, making parts of it suitable for those of you who already have worked with PHP 4 in the past.


If you want to learn about elementary PHP 4 or basic PHP 5 visit this site for more info.

What is Aspect-Oriented Software Development?


Aspect-Oriented Software Development (AOSD), sometimes just called Aspect-Oriented Programming (AOP), is a new approach to software design that addresses modularity problems that are not handled well by other approaches, including Structured Programming and Object-Oriented Programming (OOP). AOSD complements, but doesn't replace those approaches.
Typical enterprise and internet applications today have to address "concerns" like security, transactional behavior, logging, etc.. The subsystems that provide these services can be implemented in a modular way. However, to use these services, you must insert the same "boilerplate" code fragments into various places in the rest of the application to invoke these services. This violates the "don't repeat yourself" (DRY) principle and it compromises the overall system modularity, because the same invocation code is scatteredthroughout the application.
For example, if you want to control access to certain services in your application, you could insert authorization-checking boilerplate at the beginning of every method that needs this control. Because this redundant boilerplate appears in many places in the code, it would now be difficult and error prone to modify or replace this security approach later, should that become necessary. Also, your application code is now tangled with code for the security (and probably other) concerns, which both compromises clarity and makes it hard to reuse your code in another context, since you would have to drag along the same security approach, which may not be appropriate.
Because concerns like security typically cut across a number of application module boundaries (e.g., classes). We call them cross-cutting concerns.
Note that the loss of modularity is at the intersection between the different concerns. AOP restores modularity by developing the cross-cutting concerns, or aspects, in isolation and then combining them with other modules using declarative or programmatic mechanisms that are modular. That is, the points of intersection are defined once, in one place, making them easy to understand and maintain. The other modules require no modifications to be advised by the aspects. This "intersection" process, sometimes called weaving, can occur at build or run time. AOSD weaving is a key innovation that provides very fine grained query and composition semantics. Where traditional code linking has the ability to resolve method and variable names, weaving adds the ability to replace method bodies with new implementations, insert code before and after method calls, instrument variable reads and writes, and even associate new state and behavior with existing classes, typically for adding "mixin" behaviors.

For more info check AOSD web site.

Friday, March 4, 2011

Iphone jailbraking !


Unlocking vs Jailbreaking

Jailbreaking and unlocking the iPhone are two different hacks which allow you to take control of your mobile device in different ways. Jailbreaking is a type of hack that lets you install unapproved third-party applications on your iPhone or iPod Touch from searchable repositories provided by apps like Cydia and Icy. Unlocking, on the other hand, is a hack that lets you use your iPhone on another cellular network. Here in the U.S., that means you can use the iPhone on T-Mobile instead of AT&T. You have to first jailbreak your phone before you can unlock it, but you don't have to unlock a phone in order to jailbreak it.
Unfortunately, what was once a relatively simple process has gotten more complex over time as new iPhone models were introduced and new hacking tools were being put out by multiple parties, often with confusing names like Pwnage Tool, Purplesn0w and redsn0w. With each release of iPhone firmware, it seems as if there's a whole new lexicon of terms to master and new procedures to follow. The 3.1.2 jailbreak is no exception. However, this jailbreak works on all versions of the iPhone and even on the latest iPod Touch

Full tutorial and software downloads you can find on this great site.

Thursday, March 3, 2011

Keylogger !

I know most of you are new to the concept of keyloggers. For some of you, this might be the first time you heard about the term “keylogger”.A keylogger (also called as spy software) is a small program that monitors each and every keystroke a user types on a specific computer’s keyboard.
FAQ about keylogger are:
What is a Keylogger?
How Keylogger works?
How to install the keylogger?
Can I be traced back if I install the keylogger on some other computer?
-- Answers on this questions you can find on great site i discovered here.




The most popular keyloggers you can find on this site and they are not free.Price is around 30$-100$ or you can download free one here.This free version is mostly for home use.
note: dont use it for criminal activity and i am sure you all already know that :)

Monday, February 28, 2011

GIMP tutorials!

GIMP (GNU Image Manipulation Program) is a freely available open source application for creating and manipulating graphic images that runs onLinux, other Unix-based operating systems, and also on Windows and Mac OS X. GIMP is distributed under licensing terms defined by the GNU project. You are likely to find GIMP as one of the optional applications that come in any large Linux package such as those distributed by Debian and Red Hat. You can also download it directly.


Tutorial to use GIMP software you can find here.



How to setup your home wireless network.


What you’ll need to set up your wireless network?

1.An operating system that supports wireless networking
2.A wireless router, a DSL modem, or a cable modem with built-in wireless networking support
3.A computer with built-in wireless networking support or a wireless network adapter

Full tutorials for all operation systems you can find on this page.
Page Microsoft at home have all information you will need to setup your wireless network,and it also including shopping links for (wireless routers,computers with built-in wireless networking support,wireless network adapters).

This image will show you wireless router setup map.

This table shows the default addresses, user names, and passwords for some common router manufacturers. If the address is not listed here, you can read the documentation that came with your router or go to the manufacturer's webpage to find it.


Monday, February 21, 2011

VPN clients and tutorial

What exactly is VPN?

A VPN supplies network connectivity over a possibly long physical distance. In this respect, a VPN is a form of Wide Area Network (WAN). VPNs enable file sharing, video conferencing and similar network services. Virtual private networks generally don't provide any new functionality that isn't already offered through alternative mechanisms, but a VPN implements those services more efficiently / cheaply in most cases.

A key feature of a VPN is its ability to work over both private networks as well as public networks like the Internet. Using a method called tunneling, a VPN use the same hardware infrastructure as existing Internet or intranet links. VPN technologies includes various security mechanisms to protect the virtual, private connections.

-You can download free loki VPN client 1.7.4.119 for windows users here.
-Or Cisco VPN client 4.9.01.0180 for mac users here.
-Cisco client also supports Linux users (intel)
-Ultra VPN for windows 7 here


-Tutorial how to setup and use VPN client in windows xp pro can be read on this site.
-Tutorial for windows 7 here.
-Tutorial for mac users here.
-Tutorial for linux users here. But i will recommend visit ubuntu forums for better info. http://ubuntuforums.org/.

Sunday, February 20, 2011

Free IP trace software and tutorials.

Visual IP Trace 2007 3.0c
Visual IP Trace helps identify hackers, validate websites, and investigate IP addresses. Trace analysis reports provide detailed information including the estimated physical location, network provider contact information, domain registartion info.



CallerIP 4.0d
CallerIP monitors connections to your system, identifies harmful backdoor's used for hacker attacks. The country location is identified for each IP, worldwide WHOIS lookups show domain and network contact info, including abuse reporting information.



VisualRoute 2008 12.0i
VisualRoute combines several essential network tools to analyze Internet connections and identify bottlenecks that cause slow response. The path of each connection is shown on a world map, domain and network Whois lookups enable quick reporting.



Check this site for more info and downloads.

Sunday, February 13, 2011

Keep your pc clean!

I found great tutorial how to keep your pc clean.You just need to follow few simple steps to maintain your pc performance.,Great job guys.

Check this site for more info.

Tutorials for open office.


  • How to use our tutorials If you have not used our tutorials before, please read this first.
  • Install Install OpenOffice either by downloading a file or from a CD
  • Writer This is the word processing feature in OpenOffice (similar to MS Word)
  • Calc This is the spreadsheet feature in OpenOffice (similar to MS Excel)
  • Impress This is the presentation feature in OpenOffice (similar to MS PowerPoint)
  • Draw This is the drawing feature in OpenOffice (similar to MS Draw)
  • Base This is OpenOffice database feature.
For full info follow this site.

Convert Youtube video in to MP3 online for free.

All you need to do is copy url of video song you like and paste it into converter.He will convert video in MP3 file in few seconds and all you need to do is download converted file.

To use online converter follow this link.

The Java tutorials!

The Java Tutorials are practical guides for programmers who want to use the Java programming language to create applications. They include hundreds of complete, working examples, and dozens of lessons.

The Java SE Tutorials primarily describe features in Java SE 6. For best results, download JDK 6.

For full tutorial check this site.

photoshop tutorial

You can learn all about photoshop on this web site.Its very good and one of the best online tutorials for photo editing software Photoshop.

Basic comands ubuntu

All of available comands you can find on ubuntu official page here.
Post under will explain you which commands you can find on ubuntu official page,enjoy.

Table of Contents
Using this guide
Starting a Terminal
Commands
sudo: Executing Commands with Elevated Privileges
File & Directory Commands
System Information Commands
Adding A New User
Options
"Man" and getting help
Searching for man files
Other Useful Things

Pasting in commands

Save on typing
Change the text

Saturday, February 12, 2011

Free security software.

1.Avast antivirus: it provides great protection against viruses and spyware.You can download free version here.Or if you want full protection you can upgrade it for 49.95 € per year here.


2.CCleaner is the number-one tool for cleaning your Windows PC. It protects your privacy online and makes your computer faster and more secure. Easy to use and a small, fast download.


3.Defraggler-Use Defraggler to defrag your entire hard drive, or individual files - unique in the industry. This compact and portable Windows application supports NTFS and FAT32 file systems.Free download here.


4.Recuva -Accidentally deleted an important file? Lost something important when your computer crashed? No problem! Recuva recovers files deleted from your Windows computer, Recycle Bin, digital camera card, or MP3 player. And it's free!


5.Speccy is an advanced System Information tool for your PC. Need to find out what's inside your computer? No problem! Speccy will give you all the information you need.Free download here.


6.Malwarebytes has developed a variety of tools that can identify and remove malicious software from your computer. When your computer becomes infected, Malwarebytes can provide the needed assistance to remove the infection and restore the machine back to optimum performance.Keep in mind to keep it up to date for full protection.Free download here.

Ubuntu 10.10 OS.

-Ubuntu is a secure,intuitive operating system that powers desktops,servers,netbooks and laptops.The best thing of all is that Ubuntu is totaly free OS.
- Download Ubuntu here.


-Install Ubuntu using USB stick:

  1. Insert a USB stick with at least 2GB of free space
  2. Download the Universal USB Installer
  3. Click 'Run' when prompted





4.If the security dialog appears, confirm by clicking 'Run' 


5.Read the licence agreement and choose 'I Agree' to continue




6. Select Ubuntu Desktop Edition from the dropdown list




7.Click 'Browse' and open the downloaded ISO file



8.Choose the USB drive and click 'Create'


Your USB is now ready for use .