Move over stock nature images, personal photos, and trippy ,
pre- installed moving scenes, screensavers just got way more useful.
Earlier this week, Life hacker shared a tool that allows users to use
live websites as their screensaver in just a few simple steps. Whether
it's your favorite cat-related Tumblr or the site beloved by curious
knowledge junkies everywhere, your away screen can now display what's
happening in real time out there on the world wide web.
To get it, download the Web View Screensaver program
posted by Github user liquid. Once installed, the program will present
you with a window like the one shown above, where you can add or change
the URL for a new screensaver. The preview will show how the page will
appear when your computer takes a nap, and there are other settings to
tweak the new gadget to perfection.
Life hacker came up with the smart idea to use one of Giphy's TV pages
as a screensaver so that the animated images can play automatically on
your screen. A weather site or news site would also be helpful; since
the program loads the screensaver from the URL, you can still see all
the updates even when we're not actively browsing.
The
Web ViewScreensaver program also works with GIF URLs and has sound
capabilities, so at the very least you can have a little fun with your
coworkers by using classic videos in the place of pretty pictures.
Its cool and amazing you get the latest web updates whether its music ,news ,videos or whatsoever while your offline.
Monday
WHATSAPP CAN QUOTE MESSAGES YOU WANT TO RESPOND TO
WhatsApp now has the ability to quote messages you want to reply to, which sounds especially useful for group chats with friends or family. Only problem is, it's unclear if everyone already has access to it. It first came out a day ago or so as an experimental feature for the Android app's beta version (v.2.16.118). However, we were able to quote messages on our stable apps (v. 2.16.6) for Android and iOS without having to update either of them. Note that we also didn't see a new update on iTunes or Google Play.
According to NDTV and some other sources, the Facebook-owned application already began rolling the feature out to the general public, so it's possible that you can already use it. To find out if you have access to it, simply press on the message you want to respond to for a few seconds until the action bubble/bar pops up. Next to star, trash, copy and forward is a new option that looks like the arrow typically associated with reply. Click that, and the message you want to quote will show up right above your text box like in the screenshots below. If you can't seem to make it work, try reinstalling your app or checking again in a day or two -- you might have it then
All the images and information from MSN.
Labels:
Tech
Saturday
TEN THINGS IMPORTANT THAT EVERY COMPUTER USERS SHOULD HAVE KNOWN TO DO.
There are certain things every one of us has to deal with when using a computer—and we don’t always deal with them in the most efficient ways. Here are 10 things that everyone can learn to keep their computer fast, safe, and easy to use.Most common is on how to set system back up,avoidance of viruses and also using computer shortcuts.
Keep your personal information and data safe and secure.
Unfortunately, the internet isn’t always a safe place, which means everyone needs to make sure they’re keeping their personal information safe. Make sure you use strong passwords,remove personal information from photos and files and never use open public networks without protections.
Important secure procedures you can undertake when your online for your safety are;
Use a password manager: We get it, you have a lot of passwords and you don't want to remember them all. Instead of reusing the same junky password, a password manager is a simple way to save them all securely.
Use two-factor authentication whenever possible: Two-factor authentication is a simple way to lock your computer to an account so you have to verify your identity when you log onto a different computer.
Shut down and unlink services you don't use: If you're the type to try out a lot of different web apps or mobile apps then you probably have a ton of passwords scattered around everywhere. When you decide you don't want to use a service anymore, remember to delete your account. This way, if the service is hacked you don't have to fumble around trying to remember your login information.
ADBLOCKplus; Adblock Plus isn't just an ad blocking extension, it also helps keep the likes of Twitter, Facebook, and Google+ from transmitting data about you.
GHOSTERY;Ghostery is an extension that's all about eliminating tracking cookies and plug-ins used by ad networks. With Ghostery installed, no advertiser can snoop on what you're doing online.
DONOT TRACK EXTENSION; Do Not Track is an extension that eliminates sites with Facebook and Google+ buttons from tracking you. By default, a data exchange happens when you visit a site with one of these buttons, even if you don't click on them. Do Not Track stops that from happening.
The above bolded extensions will help you in making safe browsing experience when using internet.
Easy find your lost or stolen gadgets
You never know when you might misplace your phone, laptop, or other tech, so set up some safeguards now. iPhone users can enable Find My iPhone, and Android users should enable the Android Device Manager, which allows you to track your phone if you lose it. Of course, you can always get a more check the video by following the below link.Sharing files between two computers
So you’ve got some files you want to give to your friend sitting next to you, but your flash drive has mysteriously gone missing. Well guess what? You don’t need it! It’s very easy to transfer a file between two computers over your wireless (or wired) network, whether it’s between you and a friend or between multiple computers you own. Here are our favorite ways to share files with a nearby computer, but if you want to share them between multiple computers in your house, Windows’ Homegroup feature is a great option.Keeping your computer in regular maintainance
Computer maintenance has gotten really confusing over the years. Between defragging, cleaning up temporary files, and other tasks, it’s almost like trying to maintain a car. Luckily, it’s gotten a lot
easier in recent years: you only really need to do one or two things to
keep your computer running fast and smooth. Check out our guides to Windows maintenance and Mac maintenance for more info and keep your PC running like new. And if your phone’s feeling a little sluggish, we have guides for iOS and Android, too.
Understanding routers, modems, and the other things that make up your
network can seem daunting, but there are a few basics that can fix most
problems that come your way.For the problem with most routers is overheating you can check the link as it follows showing some major ways to resolve the problem,http://lifehacker.com/5910788/why-do-i-have-to-keep-resetting-my-router-and-how-can-i-fix-it.But also you can boost up your wifi network if its speed is not fast enough and low range follow the link , http://lifehacker.com/5931743/top-10-ways-to-boost-your-home-wi+fi.Protecting your PC from viruses and spywares
Windows users have long known the pain of viruses and other malware, but the good news is it’s pretty easy to avoid.But its first important to know the differences between the viruses,trojan horse worms and other malicious wares.hen, install some good, free antivirus software to protect yourself . You can even get antivirus for your Android phone, if you so choose. But in the end, the best way to avoid viruses is to use common sense: don’t open links that look suspicious, don’t install programs from untrusted sources, and if a window pops up saying your computer’s infected, make sure it’s actually your antivirus software saying that and not a fake web page.Using of computer shortcuts.
The great thing about computers is that they can do a lot of things much
faster than a human. Say you’re looking for a specific word on a web
page. Instead of scanning it yourself, all you need to do is press
Ctrl+F and type the word you’re looking for. There are mountains of
shortcut like this, from pressing Ctrl+S to instantly save the file
you’re working on, Ctrl+P to print it out, or Ctrl+T to open a new tab
in your web browser. It may seem like more trouble than its worth at
first, but after you use a shortcut one or two times
you’ll wonder why
you ever did anything with the mouse.some important computer keys to be known .
Setting a system backup system
We all know we should back up our computers, but it’s always one of those things that you’ll set up “one day”. Setting up a backup only takes minutes, though, so you can do it right now
and forget about it until you need it—and when you do need it, you’ll
be glad you set it up. If you’re just backing up to an external drive,
you can just use the simple tools built in to your computer, like Windows Backup or Apple’s Time Machine.
However, that’ll only keep you safe if your computer fails. If you lose
your home in a fire, get all your gear stolen, or experience any other
kind of disaster, you’ll have lost all those important
documents, family photos, and other files forever. So, we recommend
using a service like CrashPlan to back up your computer online. That way, it can back up no matter where you are, and that data will be safe no matter what happens to your hardware.
Accessing your computer anywhere.
Ever go out with your laptop and realize you left something important on
your computer at home? One way to solve this problem is to use a
service like Dropbox, so your files are with you everywhere you go. However, it’s also handy to know how to use your home computer from anywhere. With a simple app like TeamViewer,
you can log into your home computer from another machine and use it as
if you were sitting right at your desk—whether you just need to grab a
quick file or access a program you don’t have elsewhere.
Keeping your PC away from a crap.
I love free apps. Who doesn’t love getting something for nothing? There’s just one problem: on the other side of that download link, every developer has to choose whether to charge money for their app, or offer it for free and find some other way to make money. And when we refuse to pay, we make that decision for them. We’ve created a demand for bundled crapware.
Ever wonder how that Yahoo toolbar got on your system, or why there’s so
much junk installed on your brand new machine? Crapware is a huge problem in the world of Windows, but that doesn’t mean you have to take it lying down. With the right tools and a little know-how,
you can avoid that crapware forevermore: just uninstall the stuff that
came with your system, and learn the ways companies trick you into
installing stuff you don’t want. You’ll keep that system nice and clean,
and beat the scammers at their own game.
THE DIFFERENCE BETWEEN VIRUSES , TROJAN , WORMS AND SOME OTHER MALWARE
The term computer virus is often used interchangeably with malware, though the two don't actually have the same meaning. In the strictest sense, a virus is a program that copies itself and infects a PC, spreading from one file to another, and then from one PC to another when the files are copied or shared.
Most viruses attach themselves to executable files, but some can target a master boot record, autorun scripts, MS Office macros, or even in some cases, arbitrary files. Many of these viruses, like CIH, are designed to render your PC completely inoperable, while others simply delete or corrupt your files—the general point is that a virus is designed to cause havoc and break stuff.
You can protect yourself from viruses by making certain your antivirus application is always updated with the latest definitions and avoiding suspicious looking files coming through email or otherwise. Pay special attention to the filename—if the file is supposed to be an mp3, and the name ends in .mp3.exe, you're dealing with a virus.
Spyware is any software installed on your PC that collects your information without your knowledge, and sends that information back to the creator so they can use your personal information in some nefarious way. This could include keylogging to learn your passwords, watching your searching habits, changing out your browser home and search pages, adding obnoxious browser toolbars, or just stealing your passwords and credit card numbers.
Since spyware is primarily meant to make money at your expense, it doesn't usually kill your PC—in fact, many people have spyware running without even realizing it, but generally those that have one spyware application installed also have a dozen more. Once you've got that many pieces of software spying on you, your PC is going to become slow.
What many people don't realize about spyware is that not every antivirus software is designed to catch spyware. You should check with the vendor to make sure the application you are using to protect you from malware is actually checking for spyware as well. If you come across a PC that is already heavily infected, run a combination of MalwareBytes and SuperAntiSpyware to clean it thoroughly.
Scareware is a relatively new type of attack, where a user is tricked into downloading what appears to be an antivirus application, which then proceeds to tell you that your PC is infected with hundreds of viruses, and can only be cleaned if you pay for a full license. Of course, these scareware applications are nothing more than malware that hold your PC hostage until you pay the ransom—in most cases, you can't uninstall them or even use the PC.
If you manage to come across a PC infected with one of these, your best bet is to Google the name of the virus and find specific instructions on how to remove it, but the steps are usually the same—run a combination of MalwareBytes, SuperAntiSpyware, and maybe ComboFix if you need to.
Trojan horses are applications that look like they are doing something innocuous, but secretly have malicious code that does something else. In many cases, trojans will create a backdoor that allows your PC to be remotely controlled, either directly or as part of a botnet—a network of computers also infected with a trojan or other malicious software. The major difference between a virus and a trojan is that trojans don't replicate themselves—they must be installed by an unwitting user.
Once your PC has been infected with the trojan, it can be used for any number of nefarious purposes, like a denial of service (DoS) attack against a web site, a proxy server for concealing attacks, or even worse—for sending out buckets of spam. Protection against trojans works the same way as viruses—make sure that your antivirus application is up to date, don't open suspicious attachments, and think long and hard before you try and use a downloaded crack for Photoshop examplified.
Computer worms use the network to send copies of themselves to other PCs, usually utilizing a security hole to travel from one host to the next, often automatically without user intervention. Because they can spread so rapidly across a network, infecting every PC in their path, they tend to be the most well-known type of malware, although many users still mistakenly refer to them as viruses.
One of the most famous worms include the ILOVEYOU worm, transmitted as an email attachment, which cost businesses upwards of 5.5 billion dollars in damage. The Code Red worm defaced 359,000 web sites, SQL Slammer slowed down the entire internet for a brief period of time, and the Blaster worm would force your PC to reboot repeatedly.
Because worms often exploit a network vulnerability, they are the one type of malware that can be partially prevented by making sure your firewall is enabled and locked down—you'll still need an updated antivirus software, of course.
rootkit: software designed to illicitly gain administrative control of the computer by surreptitiously modifying OS software. Rootkits usually hide themselves from detection by the same modifications to the OS.
Rootkits can be used to install other harmful software, to monitor user activity, to steal user data, or to steal computing resources.
Also, it's probably better to divide malware along two orthogonal axes: attack vector and payload.
Things like virus, Trojan horse, rootkit, phishing are attack vectors. Things like stealing user data and causing data loss are payloads.
But these can be avoided by running on the firewall on your browser that can protect you against the malwares.
..All images with Google.
Subscribe to:
Posts (Atom)