#Post Title #Post Title #Post Title
Sunday 7 September 2014

USEFULL COMMAND TO PLAY WITH CMD

1. Accessibility Controls - access.cpl
2. Accessibility Wizard - accwiz
3. Add Hardware Wizard - hdwwiz.cpl
4. Add/Remove Programs - appwiz.cpl
5. Administrative Tools - control admintools
6. Automatic Updates - wuaucpl.cpl
7. Bluetooth Transfer Wizard - fsquirt
8. Calculator - calc
9. Certificate Manager - certmgr.msc
10. Character Map - charmap
11. Check Disk Utility - chkdsk
12. Clipboard Viewer - clipbrd
13. Command Prompt - cmd
14. Component Services - dcomcnfg
15. Computer Management - compmgmt.msc
16. Control Panel - control
17. Date and Time Properties - timedate.cpl
18. DDE Shares - ddeshare
19. Device Manager - devmgmt.msc
20. Direct X Troubleshooter - dxdiag
21. Disk Cleanup Utility - cleanmgr
22. Disk Defragment - dfrg.msc
23. Disk Management - diskmgmt.msc
24. Disk Partition Manager - diskpart
25. Display Properties - control desktop
26. Display Properties - desk.cpl
27. Dr. Watson System Troubleshooting Utility - drwtsn32
28. Driver Verifier Utility - verifier
29. Event Viewer - eventvwr.msc
30. Files and Settings Transfer Tool - migwiz
31. File Signature Verification Tool - sigverif
32. Findfast - findfast.cpl
33. Firefox - firefox
34. Folders Properties - control folders
35. Fonts - control fonts
36. Fonts Folder - fonts
37. Free Cell Card Game - freecell
38. Game Controllers - joy.cpl
39. Group Policy Editor (for xp professional) - gpedit.msc
40. Hearts Card Game - mshearts
41. Help and Support - helpctr
42. HyperTerminal - hypertrm
43. Iexpress Wizard - iexpress
44. Indexing Service - ciadv.msc
45. Internet Connection Wizard - icwconn1
46. Internet Explorer - iexplore
47. Internet Properties - inetcpl.cpl
48. Keyboard Properties - control keyboard
49. Local Security Settings - secpol.msc
50. Local Users and Groups - lusrmgr.msc
51. Logs You Out Of Windows - logoff
52. Malicious Software Removal Tool - mrt
53. Microsoft Chat - winchat
54. Microsoft Movie Maker - moviemk
55. Microsoft Paint - mspaint
56. Microsoft Syncronization Tool - mobsync
57. Minesweeper Game - winmine
58. Mouse Properties - control mouse
59. Mouse Properties - main.cpl
60. Netmeeting - conf
61. Network Connections - control netconnections
62. Network Connections - ncpa.cpl
63. Network Setup Wizard - netsetup.cpl
64. Notepad - notepad
65. Object Packager - packager
66. ODBC Data Source Administrator - odbccp32.cpl
67. On Screen Keyboard - osk
68. Outlook Express - msimn
69. Paint - pbrush
70. Password Properties - password.cpl
71. Performance Monitor - perfmon.msc
72. Performance Monitor - perfmon
73. Phone and Modem Options - telephon.cpl
74. Phone Dialer - dialer
75. Pinball Game - pinball
76. Power Configuration - powercfg.cpl
77. Printers and Faxes - control printers
78. Printers Folder - printers
79. Regional Settings - intl.cpl
80. Registry Editor - regedit
81. Registry Editor - regedit32
82. Remote Access Phonebook - rasphone
83. Remote Desktop - mstsc
84. Removable Storage - ntmsmgr.msc
85. Removable Storage Operator Requests - ntmsoprq.msc
86. Resultant Set of Policy (for xp professional) - rsop.msc
87. Scanners and Cameras - sticpl.cpl
88. Scheduled Tasks - control schedtasks
89. Security Center - wscui.cpl
90. Services - services.msc
91. Shared Folders - fsmgmt.msc
92. Shuts Down Windows - shutdown
93. Sounds and Audio - mmsys.cpl
94. Spider Solitare Card Game - spider
95. SQL Client Configuration - cliconfg
96. System Configuration Editor - sysedit
97. System Configuration Utility - msconfig
98. System Information - msinfo32
99. System Properties - sysdm.cpl
100. Task Manager - taskmgr
101. TCP Tester - tcptest
102. Telnet Client - telnet
103. User Account Management - nusrmgr.cpl
104. Utility Manager - utilman
105. Windows Address Book - wab
106. Windows Address Book Import Utility - wabmig
107. Windows Explorer - explorer !
[ Read More ]
Saturday 9 August 2014

How to Create an Ubuntu Live Cd

How to Create an Ubuntu Live Cd

 

Steps

  1. Create an Ubuntu Live Cd Step 1.jpg
    1
    Go to http://www.ubuntu.com/download/ubuntu/download.
  2. Create an Ubuntu Live Cd Step 2.jpg
    2
    Select the 11.10 Version. This is the most recent stable release as of October 2011.
  3. Create an Ubuntu Live Cd Step 3.jpg
    3
    Select 32 bit or 64 bit from the drop down menu below the version menu.
  4. Create an Ubuntu Live Cd Step 4.jpg
    4
    Click the big orange button with the words "Start Download".
  5. Create an Ubuntu Live Cd Step 5.jpg
    5
    Wait for the ISO file to finish downloading. You may want to play a game such as solitaire.
  6. Create an Ubuntu Live Cd Step 6.jpg
    6
    Download a freeware ISO Burner such as "Active@ ISO Burner".
    • if you are using windows 7, you can use "Windows Disc Image Burner".
  7. Create an Ubuntu Live Cd Step 7.jpg
    7
    Open up Active@ ISO Burner and select the ISO file in the file menu.
    • if using Windows Disc Image Burner, right click on the .iso file and hover over "open with" and select "Windows Disc Image Burner".
  8. Create an Ubuntu Live Cd Step 8.jpg
    8
    Insert a Blank CD in to the CD-R and wait for ISO Burner to ID the device.
  9. Create an Ubuntu Live Cd Step 9.jpg
    9
    Start burning the file.
[ Read More ]

How to Enable Regedit

How to Enable Regedit

If you try to open the Registry Editor on your Windows computer and you get a message denying you access, the Regedit program is disabled on your system. You will need to change the configuration of your system to enable Regedit and allow use of the Registry Editor. To enable Regedit on your computer, see Step 1 for more details.

Steps

  1. 1
    Make sure that you are logged in as the administrator on your computer if you are using Windows Vista or Windows 7. Click the "Start" button and then click the arrow button next to the "Shut Down" button. Choose "Switch user" and then click on the administrator account name. Enter the administrator password if prompted.
  2. Enable Regedit Step 2.jpg
    2
    Click the "Start" button. Click "Run" if you are using Windows XP. Type "GPEdit.msc" in the text box and hit the "Enter" key. If you are using Windows Vista or Windows 7, do not hit the "Enter" key after typing "GPEdit.msc" into the text box. Instead, wait for the "GPEdit.msc" icon to appear and then click it.
  3. Enable Regedit Step 3.jpg
    3
    Look at the options on the left sidebar on the window "Local Group Policy Editor" that appears. Choose "User Configuration," "Administrative Templates," and then "System."
  4. Enable Regedit Step 4.jpg
    4
    Find the "Settings" heading in the right side of the window. Scroll down to find the option for "Prevent access to the registry editor" and double click it.
  5. Enable Regedit Step 5.jpg
    5
    Check to see if the radio button for "Enabled" is checked. If so, click the radio button for either "Disabled" or "Not Configured" and click the "OK" button. Restart your computer so that the changes take effect.
  6. Enable Regedit Step 6.jpg
    6
    Go back to the "Start" menu. Click "Run" if you are using Windows XP. Type "regedit" into the text box and press the "Enter" key. If you are using Windows Vista or Windows 7, do not hit "Enter" after typing "regedit" in the text box. Instead, wait for the "regedit.exe" icon to appear and double click it to open the Registry Editor. If the screen flashes and asks for permission to access the Registry Editor, click the "Accept" or "Allow" button.
[ Read More ]
Thursday 17 July 2014

Lock and unlock your computer with a USB drive, secret-agent style


Lock and unlock your computer with a USB drive, secret-agent style



 With Predator, you can turn your USB drive into a "key" that unlocks your computer when plugged in, and locks it when it's removed.
if you prevent access to your computer with just a password, you are missing out on an alternate (and more secure) way to lock down your computer.
Predator, a free Windows program, turns your USB drive into a key that locks your computer when it's removed. To unlock your computer, you'll have to plug the USB drive back in. (Talk about having secret-agent-style security.)
Anyone who attempts to access your computer without the USB flash drive will be hit with an epic "Access Denied" message. To get started, follow this guide:
Step 1: Download and install Predator.
Step 2: Once Predator launches, plug in your USB flash drive. None of the contents of the drive will be deleted or altered in any way, so feel free to use your primary thumbdrive.
When you insert the drive, a dialog box will appear asking you to create a password. Click OK to continue.
Step 3: In the Preferences window, take note of a few key settings. First, enter a secure, unique password in the "New password" field. If you lose your USB drive, you'll use it to unlock your computer.
If you'd like, you can check the Always Required box and you'll be asked to enter the password each time you use your thumbdrive to unlock your PC.
Finally, in the section under Flash Drives, ensure that the correct USB flash drive is selected. When you're done, click "Create key" and then OK.
Predator
Step 4: Predator will exit. When it does, click the Predator icon in the taskbar to restart the program. A few seconds later, the icon will turn green, alerting you that Predator is running.
Every 30 seconds, Predator will check to see that your USB drive is plugged in. If it isn't, your computer will dim and lock down.
Here are some extra tips:
  • To pause Predator at any time select "Pause monitoring" from the taskbar menu.
  • If someone tried to access your PC while it was locked down, you'll see the activity log when you log back in. You can see the log at any time by clicking "View log" from the taskbar menu.
  • Predator's Web site has several cool how-tos, including one that shows you how to program your computer to take a snapshot each time someone tries and fails to log in to your computer. Check it out.
One obvious flaw comes with this setup: you'll always be down one USB port. But if you're sold on Predator, consider purchasing a USB hub to compensate.
[ Read More ]

Find your lost Android device with Android Device Manager


Find your lost Android device with Android Device Manager



Find your lost or stolen Android device and remotely wipe your personal data with Google's new Android Device Manager Google announced last week that it would release a new locator feature for Android devices called Android Device Manager, which helps owners find their lost or stolen phones and tablets. It was supposed to roll out later this month, but in a Google+ posting Wednesday, Google announced its immediate availability.
The feature works similarly to other locator services, like Lookout and Samsung's Find My Mobile , but now you get the feature natively on your Android device. Here's how to get started with Android Device Manager:

Enable Android Device Manager

On your Android device, go to the Google Settings app, then tap on Android Device Manager. The locator feature is enabled by default, but to enable remote data wipe, tap on the box next to "Allow remote factory reset," then tap "Activate."

Enable Android Device Manager in Google Settings
Screenshot by Ed Rhee/CNET

Use Android Device Manager

To use Android Device Manager, go to https://www.google.com/android/devicemanager and log in with your Google account. You may get a prompt asking you for permission to allow Android Device Manager to use location data. Click on the "Accept" button to continue.

Android Device Manager
Screenshot by Ed Rhee/CNET
  • Location: The location of your Android device will appear automatically on the map, along with the name of the place, when it was last used, and when it was last located. You can zoom in and out of the map to check out the location.
  • Ring: The location data is an approximation and may not help you figure out if it's hiding somewhere in your home. Instead of having someone call your phone to help you find it, you can choose to ring your device from Android Device Manager. This will cause your device to ring for 5 minutes at the highest volume, even if it's set on silent or vibrate.
  • Lock: Locking your device remotely can be useful if you want to lock your Android device so no one can access your data while you're trying to recover your lost device. To lock your device, click on the "Lock" option. Enter your new password twice, then click the Lock button. Once the command is sent to your device, it will lock it immediately, even if it's being used.
  • Erase Device: If you think you've lost your device for good and would like to force a factory reset to protect your personal data, choose "Erase Device." This will erase all your apps, photos, music, and settings from your device. If your device is offline when you send the "Erase Device" command, it will perform the reset the next time it comes online. Once your device has been wiped, you will no longer be able to access it from Android Device Manager. Also keep in mind that a remote factory reset may not wipe external SD memory cards.
Remember, if your device has been stolen, contact the police and let them do their jobs. With Android Device Manager, your data is safe, so make sure you stay safe as well by not attempting to retrieve the device on your own.
[ Read More ]
Wednesday 16 July 2014

best free sites to learn programe

These four sites offer step-by-step tutorials that take very different approaches to programming instruction. One of them is perfect for your level of coding experience.
Not so long ago, typing was for secretaries, journalists, and would-be authors. Now we're all tapping away at keyboards and screens from morning until night.
The number of people who spend their workday coding continues to soar. In the not-too-distant future, writing code may be as commonplace as typing and other forms of text-keying are today.
Learning how to code has never been easier. Whether you're a programming newbie or an old hand looking to learn a new skill or two, these four free services have you covered. (Note that all but W3Schools.com requires that you register to use the service by providing an e-mail address and password.)
All four of the coding tutorials I tested have their positive attributes (ahem), but my favorite is LearnStreet's Ruby for Beginners, which was just my speed. The lessons prompt you to write and run the code for each step, and when you make a mistake -- which is key to learning how to program -- the correction hints are clear.
The video lessons in Khan Academy's Programming curriculum keep you engaged in the subject and are perfect for folks starting at square one. However, the complete program could easily take weeks to complete.
I made it through 24 percent of the Codecademy's Ruby tutorial before I hit a lesson that stopped me in my tracks: in the loops section, of course. If you've done a little coding in the past, you'll likely have better luck than I did with Codecademy's write-it-yourself approach.
The simplest of the coding tutorials I tried was W3Schools.com's JavaScript tutorial, which you can complete without having to register (unlike the other three services). Each of its dozens of lessons includes plenty of "Try it yourself" options for practicing the technique the step covers.
LearnStreet puts the focus on the code
The first thing you notice when you start the lessons on LearnStreet is the prominent code-entry screen on the right side of the window. Under the code is the run environment that demonstrates the code you write. The instructions are listed on the left side of the screen.
LearnStreet Ruby tutorial: method definition
LearnStreet's Ruby tutorial prompts you with hints and answers when you make a mistake in its coding exercises. Screenshot by Dennis O'Reilly/CNET
It took me about two hours to work my way through the first five lessons in LearnStreet's 12-lesson Ruby for Beginners. Once you finish the site's programming courses, you can turn your attention to the dozens of coding projects for JavaScript, Python, and Ruby. The projects can be sorted by level (beginner, intermediate, advanced) and by category (tools, games, and algorithms).
LearnStreet also offers free courseware for teachers who want to instruct their students in coding.
Khan Academy lays a solid programming foundation
The Khan Academy is famous for its ground-breaking video tutorials covering nearly every subject a student is likely to encounter. Rather than focus on a particular programming language, the Khan Academy's programming module uses JavaScript to illustrate concepts that apply to coding in general while also teaching some practical JavaScript skills.
The courses are divided into about a dozen categories, each of which has from three to 12 separate lessons. Each video lesson animates the coding technique in a window on the left and shows the result of the code running in a window on the right.
After you watch the coding in action, you're challenged to write code that duplicates the operation. When your code isn't quite right, the tutorial provides hints to help you spot and correct the problem.
Khan Academy programming tutorial
After the coding technique is demonstrated in a video, you're challenged to write code that executes the technique. Screenshot by Dennis O'Reilly/CNET
It's easy to navigate the Khan Academy lessons and jump between them and the site's other features. A space is provided for creating your own programs, which you can save in your profile and share with the world. You can also browse the programs written by other students.
Like LearnStreet, teachers can sign up to be "coaches" for their students and manage their students' progress. You can monitor your own progress and set goals for yourself in your dashboard, which prominently displays the badges you've won and your "energy points."
Expand your programming horizons with Codecademy
As much as I appreciate Codecademy's polished interface and interactive tutorials, more than once I was stymied by the lack of help when the code I wrote failed to execute as expected.
Admittedly, my programming experience is limited to HTML and JavaScript. The lessons in Codecademy's Ruby tutorial had me backing up and restarting several individual steps, even with the hints that the lessons offer to us tyro programmers when something's not running as expected.
Most of the Codecademy lesson screen is taken up by the window in which you enter code. The instructions for the step are in the left pane. After you enter your code and click the Save & Submit Code button, the code runs in a pop-up window on the right side of the screen.
Codecademy Ruby tutorial: loops and iterators
The code window is prominent in the Codecademy's Ruby tutorial. The hints for correcting your coding mistakes aren't always as helpful as they could be. Screenshot by Dennis O'Reilly/CNET
I was making fairly good progress through the Ruby tutorial until I reached the Loops & Iterators module. When I took a class years ago in C++ I recall struggling through the same subject. After about a half-dozen attempts, I threw in the towel. (As with most tutorials, you can't proceed to the next module until you complete the current one successfully.)
Keeping it simple pays off for W3Schools.com
At first glance, the JavaScript tutorial on W3Schools.com looked too basic to be useful. After I had stepped through the first half-dozen lessons, I found the pace of the lessons kept me interested without overwhelming me.
The site offers tutorials in HTML, CSS, XML, SQL, PHP, JQuery, and other Web technologies in addition to JavaScript. There are also demos for building a Web site, server technologies, and Web databases.
The lessons are at a slower pace than those of the other three tutorials I tried, and they entail lots of scrolling down the page. You read the instructions and are then shown the code. Click the Try It Yourself button to open a new browser window that lets you write and run the lesson's code.
W3Schools.com JavaScript tutorial: manipulating HTML elements
W3Schools.com's JavaScript tutorial explains the coding technique, presents the code, and then lets you duplicate the code in a run environment. Screenshot by Dennis O'Reilly/CNET
The Basic section of W3Schools.com's JavaScript tutorial has 19 separate lessons, each of which will take most people 15 minutes to a half hour to complete. There are eight more Advanced lessons, as well as eight to 12 lessons for HTML DOM and Browser BOM. Another dozen or so modules provide libraries, examples, and references.
What a difference an hour makes
This is Computer Science Education Week, and Code.org is honoring the occasion by sponsoring the Hour of Code program that encourages teachers to spend an hour teaching their students how to code. (My certificate of completion is shown at the top of this post.)
The Computer Science Education Week site has tutorials that let students as young as 6 years old write their first program in an Angry Birds-like environment. The site also has the Khan Academy's Introduction to JavaScript intended for students in middle school and up, in addition to other app-development resources for students of all ages, many of which are designed to be used offline.
[ Read More ]

Print photos, docs, and more from your Android to any printer

Want to print from Android to old-fashioned paper? Quickly get started using Google Cloud Print
If sending an email to your desktop is still your method of printing from your Android, now's the time that changes. Using Google Cloud Print, you can print just about anything from your Android phone or tablet to any printer, even if it's an older model.
Cloud Print -- which is technically in beta, like many Google things -- works by processing the print jobs over the Web. So, if you like, you can send items to your printer at home, even when you're at a friend's house.
It gets better. Google Cloud Print doesn't only work with Android -- it also works with any device running Chrome, including iOS and any desktop or laptop. Let's set it up.

Step 1: Is your printer Cloud Ready?

If your printer is Wi-Fi-capable, it's probably "Cloud Ready." What that means is that you can print to your printer, even if your computer is turned off. Because the printer has Wi-Fi, it can connect directly to your Android device without the help of the computer.
Find out if your printer is Cloud Ready by visiting the Cloud Print site and looking for your printer model. Once you find it, click the link in the description to get the setup istructions. The step-by-step will vary for each printer, which is why we won't walk through them here. Once that's set up, come back and continue to the next step.

Not Cloud Ready? No problem.

The beauty of Google Cloud Print is that it's compatible with even the eldest printers. As long as your computer is turned on, connected to the Internet, and your printer is plugged in, you can print to it.
  1. Head to your computer and launch Chrome. There's no getting around this -- you need Chrome to make Cloud Print work.
  2. In Chrome, open the menu and check to see that you're signed in with your Google account. It should be the same one you use with your Android device.
  3. In the same Chrome menu, go to Settings. Scroll down and click Show Advanced Settings, then click Manage under Google Clount Print. Here's where you'll associate a printer with your Google account.
  4. Click Add Printers, and check the boxes for the printer(s) you'd like to print to from your Android device. Click add printers again, and you're set.
cloudprint.jpg
Sharon Profis/CNET

Step 2: Set up your Android device

The setup on your Android device is dead simple. Head to the Google Play store and download Google Cloud Print. It's essentially a plug-in that enables printing for a number of Google apps (like the Gallery), and lets you manage your print jobs.
On Android versions older than KitKat, it'll appear as a standalone app. On KitKat, it works in the background, and will appear in the notification shade when you've initiated a print job.

Step 3: Start printing

At this point, you're ready to start printing from the Gallery or Chrome. Just tap the menu button in either app and choose Print. A window will appear, letting you choose your printer from a drop-down, along with various settings, like paper size and color. Hit Print, and the item will be sent to your printer.
But Android printing doesn't stop at photos and Web pages. Using third-party apps like Cloud Print Plus, you can expand that selection to text messages, contacts, email attachments, and files stored on your device. You can even use Cloud Printer to print from Firefox, if that's your default Android browser.
Google's has a page listing all apps compatible with Cloud Print.
[ Read More ]

Share a hard drive with everyone on your Wi-Fi network

 Share a hard drive with everyone on your Wi-Fi network


Take advantage of your router's USB port with a little trick that lets you share a hard drive with anyone on your Wi-Fi network.Cloud storage is expensive, but it's not the only way to share a bunch of files across many devices. Instead, you can use an external hard drive and your router to create networked storage accessible to anyone on your Wi-Fi network.
When it's set up, any files stored on that drive can be accessed by all devices on your network -- even phones and tablets. Here's how to set it up on Windows.

Step 1: Choose your drive

The drive you share can be as small as thumb drive, or as large as a 3TB external hard drive. Check your router's manual to find out if there are any storage limitations, since some routers have a storage cap.
Once you've chosen your drive, plug it in.

Step 2: Enable USB drive sharing

On any computer connected to your Wi-Fi network, launch a browser, and navigate to your router's IP address. You can find this on the back of the router, in the device manual, or by searching for it online. In most cases, it looks like 192.168.X.X.
When the page loads, you'll be asked to log in with your username and password. If you changed it, you should know it. If you didn't, it's probably still admin (username), and admin (password).
Those who fall into the latter category, please change your password as soon as you can, and before proceeding to the next step.
Every router's interface is different, but if yours has a USB port, you'll find a link entitled something like File Sharing under the Administrator settings. In this window, enable the file sharing server (also called SAMBA). Apply the settings, and exit.
enablefilesharing.jpg
Screenshot/Sharon Profis

Step 3: Access the drive

You're now ready to read and write to your attached hard drive. Open a file explorer window, and navigate to the Network folder in the left sidebar. Then, clear out the path at the top of the explorer window, and enter \\[your IP address]. So, for example, it might look like: \\192.168.1.1
networkfolder.jpg
Screenshot/Sharon Profis
With that, your drive will appear. Open it to access its contents, just like any other folder. If you're asked to log in, simply use your router's login credentials (the same one used to log into the Web interface.)
If you plan on leaving your hard drive attached, so that you can easily access it from any Explorer window. To do that, right-click the drive and select "Map network drive..." Give it a name, and the folder will appear in the sidebar.
mapdrive.jpg
Screenshot/Sharon Profis
To access the drive on other computers on the network, repeat step 3.
[ Read More ]
Saturday 1 February 2014

Bypass email and SMS account verification

Bypass email and SMS account verification

Is a common use in a lot of web site, like forums and similar, to ask for a valid email address during registration phase. The way how is possible to verify the email you inserted is a valid address is well known. The site send to the email address you provided an automatic message containing a link to visit for activate the account just registered. If no valid email is provided you can not activate the account. Some other big networks of Internet, like Facebook or Google, recently started to ask for a valid cell phone number to send an SMS containing a code for unlock or verify the account. If you want to avoid to hand in your personal info is there some tricks that, if you are lucky, can help you to keep your life a little more private.


Email verification
Bypass an email verification request is really easy. It exist a lot of services that, for free, allow you to create a temporary email address to use just for receive the verification message. Once received the message and validated the account thought the link provided you can forget the email address just used. This email address will exist for 10 minutes, one hour, one day and so on. Depends on the service you selected. Just for give a short reference follow a list of some of these web services. These are only an example, you can find a lot of other alternatives just googling around.
Please note that, usually, these services allow to create an email address only for receive, you can not use these service for send mails.
SMS verification
Bypass an SMS verification is much more difficult. Basically you need an "alternative" phone number where to receive the SMS with unlock or verification code. If you live in the Unites States is strongly suggested to activate a Google Voice account. This service give you a phone number for free that you can use for call someone and send or receive SMS as well. Unfortunately, at the moment, this service is available only for US residents. For all the other people around the world there are some alternatives but not all are free and not all can work well for your purposes. The most direct way to try as first is to use what is called "shared numbers". Some web site make available one or more "public" phone numbers you can use for receive the SMS verification message. The main advantage of this kind of service is that, usually, you don't need a registration. Browsing into the site is possible to see on real-time all the message arrived to the specific numbers you chose to use. Simply provide this number to the site requiring verification and wait for the SMS containing the unlock code that should appear in the list as soon as is received. For make an example regarding the service I'm talking about this is a link to one of them:
These kind of service born and die very fast so if the link just provided doesn't work tell me through the comment of this post. The disadvantages of this approach is basically that the messages received are public, anyone who browse the site can see them. This mean you must not use them for receive important verification like, for example, the banking account, PayPal and so on. The other disadvantages is that these services (and the site linked above in particular) is know by a lot of other people that continuously try to use them for every kind of verification. In particular, if you are planning to use these number for receive Facebook SMS verification code, you need to know that Facebook keep a list of the last numbers used for verify every accounts. This mean when you'll insert one of these numbers into Facebook field for ask for the SMS is quite sure an error will be show telling you that this number was already used by another person. However it seem that Facebook "reset" this number list after some time so, if you really are obstinate, you can try to continuously insert this number waiting for the moment Facebook will "forget" this number was used and allow you get the verification code through this way. Good luck.
Other kind of services allow to keep more privacy but, in consequence of this, require a registration and most of them are not free. Quite all of these services can assign you a personal "virtual" phone number based to VOIP technology. The few free services around can allow you to use this number only for send or receive SMS in US region (but for our purposes is enough). Other more sophisticated act like a personal answering machine and have a lot of features that can be surely useful but you have to pay for them. Follow a short example list of some of them (mixed free and pay), as before you can find more just googling a little:


Regarding pay services is a common commercial use to give you a short trial period for test the service itself. You can use this time for verify if the service is working for you and, in case, decide to pay for it. Again if you are planning to use one of these services for get Facebook SMS it seem Facebook have some problem to send SMS to VOIP number (I read around the SMS doesn't arrive but I didn't tested personally so I don't know for sure). On the contrary, always reading around, no problem with Google SMS.

If you know some other way to bypass account verifications feel free to add your suggestion using the comment on this post. Thank you just in case ;-)
[ Read More ]

increase facebook like

How To Increase Facebook Page Like | Post Like Free just in 10 Minute

 How To Increase Facebook Page Like | Post Like Free just in 10 Minute

Facebook is the leading social network which is among top 10 website .so its global Alexa rank is 2. So the most of the user want to some trick how to use it , how to increase page like ,how to increase post and lot more .so then you can share your link to your friends and family and then you request that Please like my page so its very difficult for you so here it’s very simple trick how to increase a page, post and photo like increase. So then lets start.

What is addmefast?

Addmefast is a promotional website so that user can increase Facebook like , Facebook followers , Facebook post like , Facebook post share and lot more

How to use this method and increase Facebook likes.

STEP#01:

Signup a free account and go to addmefast and register yourself with the correct email address because the addmefast verify your account from your email. go to the website.
  

click here

or
How To Increase Facebook Page Like | Post Like Free
Step # 02:

Then this is a important step sing in to your account then you have get more point to increase you points these point help to increase your like and the more you can earn point .  The extra point like you will get
Following the list service

1.      1.   Facebook Likes
  1. Facebook Subscribers
  2. Twitter Follow
  3. Google Plus Circle
  4. Google Plus one
  5. YouTube Subscriber
  6. YouTube Views
  7. Pinterest Followers
  8. Sound Cloud
  9. Stumbleupon Followers
And lot more .like below .

increase free facebook twitter google+ followers and likes
Step#3:

Adding Facebook Page or other Site so Now when you have some amount of earned points then you will add your Facebook Page , subscriber , Facebook post like and Facebook post share  etc etc . So click on the  Add Site/Page  and present on the left side of your Screen.

increase followers and likes facebook twitter google+ free


  1. Type; in the section select on which social website’s you want to get the followers since you are using it to increase the Facebook likes so then you will select ‘Facebook Likes’ then you can select anything according to your choice
  2. Title; Enter a title of your page. It’s your choice to take any tittle.
  3.  Site/Page URL; insert the URL of Facebook page or its your choice 
  4.  CPC; Here you have to select that how much point’s you want to give the person who will like your page or post. If you select 1 to 4 then your page like very slowly and if you select 5 to 10 then increase you like faster.
[ Read More ]
Thursday 30 January 2014

combine several internet connection into one

Connectify Dispatch combines multiple internet connections into high speed bandwidth

An example of an extreme setup that Dispatch can turn into some extreme bandwidth goodness...
An example of an extreme setup that Dispatch can turn into some extreme bandwidth goodness (Image: Connectify)


Connectify, a company known for software that can turn your computer into a wireless hotspot, is at work on a new project called Dispatch that will turn all internet connections available to your device into one glorious (and hopefully faster and more stable) stream of high-speed bandwidth.
The project appears to take some of its cues from live video broadcasting companies like LiveU, which sells custom made backpacks wired up with 3G/4G and Wi-Fi transceivers. These backpacks then spread the traffic load over whatever available networks it can connect to in order to maximize bandwidth, which is obviously a major plus if you're streaming live video.
Dispatch, however, is planned as a software-only solution for the masses – no special backpack required. It will dynamically manage the traffic based on which networks provide the greatest bandwidth and have the clearest signal, which also means that even if one of the networks drops out entirely, you'll still have internet access on another network.
The number of simultaneous connections will depend entirely on what hardware you have on your system, but a user that has, say, a netbook with inbuilt Wi-Fi, tethered smartphone, Ethernet and an extra Wi-Fi or mobile data card for good measure (a reasonably common setup for many) will be able to have four connections going at once.
The Dispatch software manages multiple network connections on the fly (Image: Connectify)
The plan to launch an API for Dispatch also sounds like a good move, allowing programmers to integrate the tech into their own applications.
Connectify has made a video that showcases an extreme-power setup using Dispatch (below), but we'll be interested to see how the software performs when it's actually out in the wild. We imagine the most likely use-case scenario for the majority of people will probably be a desktop machine with both an available Ethernet and Wi-Fi connection, which both end up connecting to the same router/access point. Will we actually see much of an improvement in these cases, or will the real performance improvements be seen when using entirely different networks (i.e. 3G/4G and Wi-Fi)?
Connectify says that Dispatch can potentially double or triple speeds in torrent applications like BitTorrent, but we'll just have to wait and see.
The Kickstarter page for the project has, at time of writing, raised about $30,000 of the $50,000 funding goal, with 15 days left to go.
[ Read More ]
Thursday 23 January 2014

what is dvd ripping

A DVD ripper is a software program that facilitates copying the content of a DVD to a hard disk drive. They are mainly used to transfer video on DVDs to different formats, to edit or back up DVD content, and to convert DVD video for playback on media players and mobile devices. Some DVD rippers include additional features such as Blu-ray support, DVD and Blu-ray Disc decryption, copy protection removal and the ability to make discs unrestricted and region-free. While most DVD rippers only convert video to highly compressed MP4 video files, there are other rippers that can convert DVDs to higher quality compressed video. These types of DVD rippers are used by the television and film industry to create broadcast quality video from DVD. Video ripped by these professional DVD rippers is an exact duplicate of the original DVD video.

 

 

[ Read More ]
 
 

Labels