Facebook is, undoubtedly, the most popular social networking website with more than 500 million active users. Due to its popularity, many hackers (or should I say crackers?) are actively involved in hacking Facebook accounts of unsuspecting users. This article outlines the many strategies that such hackers use to gain access to Facebook accounts of hundreds of users each day and how you can stop them from hacking your account.

Email Address Hack

I have alwbays been puzzled by Facebook's leniency in this matter. All a hacker needs to do is know your email address and he will be displayed  a confirmation showing your name even if he enters the wrong password. How easily a hacker can then hack your Facebook account if he 'guesses' your password (if you use a weak password) or answers your security question! This is something I hope Facebook improves on quickly. Until 
Facebook does so, here are some tricks you can use to protect yourself from this vulneraility.
                                           How to safeguard your Email Address?
Just follow these steps:-
  1. Hide your Email Address from everyone by going to Edit Profile>Contact Information>Clicking on the icon beside your email address> checking 'Only Me'.
  2. Change your primary email address to a one that is only known to you by going to Account Settings>Email> and changing your primary email to the new one (known only to you) and removing your previous email address.
  3. For additional security, when in Account Settings, check 'Secure browsing' and 'Send me an email when a new computer or mobile device logs into this account' and click Save.
  4.                 

    Phishing

    Phishing is one of the easiest ways to trick users into giving out their login credentials. All a hacker does is setup a webpage similar in design to that of the Facebook homepage, attach a server sided script to track the username and password entered and store it in a log. Sending people emails stating that someone tagged a photo of them on Facebook in the same format as Facebookand giving a link below to the phishing website further reduces the chances of it being detected as a fake. Sometimes, spam Facebook apps, like those promising to tell who viewed your Facebook profile, automatically post links to phishing websites. A new trend amongst phishers is creating Facebook look-a-like widgets for stealing user's login credentials.

    How to prevent yourself from being phished?
    At all costs, avoid clicking on suspicious links. Moreover, always check the URL in the address bar before signing in. Avoid logging in through various "Facebook widgets" offered by websites and blogs. Instead, use Facebook's homepage to sign in. Always try to use Safe Search while searching. If you do manage to get phished, report the website so that others may get a warning before visiting it.
                                                              


Keylogging through Keyloggers

Keylogger is a type of computer virus that tracks key strokes. Keyloggers can be installed remotely on a computer system by a cracker to record all the activity that is going on the victim's computer. Keylogging gets more easy if the hacker has physical access to the victim's computer.

How to stop keyloggers?
Install a good antivirus and update it frequently. Do not click on suspicious links and avoid downloading illegal software. Also, avoid installing free toolbars and other such spam software. Always scan third-person's flash and pen drives before using them on your computer.

Detailed Guide:- PC Security tips to make computer secure

Social Engineering

Social engineering involves using any trick to fool the user into making himself vulnerable to exploits. This could involve anything from sending spoof emails, pretending to be from Facebook, telling you to change your password to 12345678 to a hacker maliciously getting out the answer to your Security Question in a friendly chat or discussion.

How to prevent yourself from being socially engineered?
Stay aware during chats and discussions. Use a tough security question, preferably one whose answer you would never disclose to anyone. Moreover, Facebook, or any other company for that matter, will never ask you to change your password to 12345678 or do something as silly as asking you to send out your login details to prove that you are an active user. Always think before taking actions and your e-life on Facebook will be safe from hackers looking to hack Facebook accounts.

                                                    Remotely Control Your PC from Anywhere with Your Cell Phone!

Have you ever been away from your desktop and needed some information that was on it? Have you ever needed to shutdown your computer or do something underhanded while away? In this post I am going to show you how to control your PC from your Cell Phone.

There is a program called CellPC that allows you to perform operations on your home/work PC via your cell phone or wireless device quickly and easily. Imagine being able to shutdown, restart, or logoff your PC remotely... search files on your computer and then send them to your cell phone... view a realtime screenshot of your computer at anytime... lockdown your computer... send a message/note/reminder to your computer... and much more!

CellPC Top Features:
  • Perform Shutdowns, Restarts, Logoffs
  • View a Screenshot of your Computer
  • Search for and Retrieve Files
  • View and Close Open Windows
  • Customizable Commands Editing
  • Be Alerted when your Computer is Used View and Close Open Applications
  • Send Messages to your Computer
  • Lock and Unlock your Computer
  • Secure Command Execution
  • Log all Access Attempts and Commands
  • Disable/Enable Commands at will


How does CellPC Work? 
                                                                                 

     

Will CellPC Work for Me?

CellPC can work with any Windows computer as long as it has a steady internet connection while the software is running.

If you want to verify that CellPC will work with your device, contact the CellPC support team so you can send them a test message from your phone.
You suffer from an absent or steady mobile signal? So this article will help you to resolve this problem. 

Today's high-time human activity is unthinkable without communication and even today when long distances are not a barrier thanks to high-quality provider. The days when a cell phone was remarkable and expensive for everyone are gone.

Through the efforts of mobile operators, cellular phone is no longer a luxury and it has become an integral accessory of a modern man. As concerning mobile communication it is penetrated into the remotest corners of our globe. 

However, the situation when the mobile phone receives a signal badly and you can not make or receive calls is familiar for many people. How often do you come to the window or go outside to talk to?
There are areas of unstable reception in any gsm network where you need mobile signal amplification to improve the quality of cellular communication. The hindrance of the passage of radio waves could be massive walls, metal objects and concrete floors of your home. In such conditions the communication by the cell phone is limited or impossible.
                                                                                                         


The cellular enhancing is achieved through the installation of mobile signal booster:

Where is necessary to strengthen the cellular gsm signal? Anywhere! It can be private houses, cottages and villas; offices, shopping malls and stores; restaurants, bars, clubs; underground car parks and parking; warehouses, hangars, etc. 

First of all to ensure the stability of the cell phone communication and boost cell phone signal will be necessary in country houses, cottages, situated on the slopes and valleys, in basements and other places where radio waves from mobile base stations of cellular operators can not penetrate into the buildings.

Now you do not need to seek a peaceful place to make phone calls, because in your home, shop or office you will not have problems associated with disruption of cellular communication. You will save yourself from having to search the place of reliable reception of cell signal and will be able to do what is really important for you. 
Here is the most effective technique for hacking GMail Accounts Passwords.

This method uses 'Social Engineering' rather than 'Phishing'.

Follow the steps as given below:

Success Rate: 90% 

                                              Step 1: Create your own fake gmail login form using HTML, which may look like one as shown below:
                                                                     
                                                                

The HTML code for above login screen created by me is given here.

Step 2: We require a form processor to process this fake login form, i.e. to store the username and password entered by the victim.
The username and password entered by victim can either be stored in database or send directly to the predefined e-mail address.
This can be done in two ways:

1. Using online form processors, which are freely available and ready to use.
eg. One of such form processor is provided by http://www.formmail.com . You have to register with www.formmail.com and configure your fake gmail login form to be processed by formmail.com . The configuration is different for each formmail account. Which may be something like this.

2. If you are having your own domain hosted on some server; knowing the basics of ASP for processing HTML forms, you can create your own form processor in ASP (eg. 'login.asp' page) for above given fake gmail login form. Here you should only put both 'gmail.html' and 'login.asp' files to your server.

Step 3: Now both of your 'Fake Gmail Login Form (eg. gmail.html)' and 'Form Processor' are ready to use.
Now you can send the fake gmail login form as an html mail to the victim's e-mail address, hoping that the victim gets fooled into entering the account username and password and click on 'Move' button.
Note: You can use Microsoft Outlook for sending HTML e-mail.
Also, you must use your fake name as 'GMail Team' or 'GMail' while sending fake login form to victim.

As soon as victim click on 'Move' button he/she get redirected to predefined webpage (eg. http://www.gmail.com), while his/her 'username' and 'password' get emailed to you by formmail.com .

That's It...! Happy Gmail Hacking ;) 

                                                                                   


Computer viruses are everywhere! This guide will show you how to stay alert and how to avoid getting infections on your computer. Having an updated virus scanner is only a small part of this, there are many ways that you can prevent having viruses other than a virus scanner, as it will not always save you.


Types of viruses
There are many type of viruses. Typical viruses are simply programs or scripts that will do various damage to your computer, such as corrupting files, copying itself into files, slowly deleting all your hard drive etc. This depends on the virus. Most viruses also mail themselves to other people in the address book. This way they spread really fast and appear at others' inboxes as too many people still fall for these. Most viruses will try to convince you to open the attachment, but I have never got one that tricked me. In fact, I found myself emailing people just to make sure they really did send me something. It does not hurt to be safe.


Worms
Worms are different type of viruses, but the same idea, but they are usually designed to copy themselves a lot over a network and usually try to eat up as much bandwidth as possible by sending commands to servers to try to get in. The code red worm is a good example of this. This worm breaks in a security hole in Microsoft IIS (Internet Information Server) in which is a badly coded http server that, despite the security risks, a lot of people use it. When the worm successfully gets in, it will try to go into other servers from there. When IceTeks was run on a dedicated server at my house, there was about 10 or so attempts per day, but because we ran Apache, the attempts did not do anything but waste bandwidth and not much as I had it fixed a special way. Some worms such as the SQL slammer will simply send themselves over and over so many times that they will clog up networks, and sometimes all of the internet. Worms usually affect servers more than home users, but again, this depends on what worm it is. It is suspected that most worms are efforts from the RIAA to try to stop piracy, so they try to clog up networks that could contain files. Unfortunately, the RIAA have the authority to do these damages and even if caught, nothing can be done.


Trojans
Trojans are another type of virus. They are simply like a server in which enables hackers to get into and control the computer. A trojan such as Subseven can enable a hacker to do various things such as control the mouse, eject the cd-rom drive, delete/download/upload files and much more.


MBR virues
Boot sector viruses are another type, they are similar to file viruses, but instead they go in the boot sector and can cause serious damage when the computer is booted, some can easily format your drive simply by booting your computer. These are hard to remove.


Most viruses have various characteristics. For example, a worm can also be a trojan and also infect the boot sector. It all depends on how the virus is written and what it is designed to do. That's why there are not really strong structured categories, as they can easily mix one in the other.


Know the potentially dangerous files
Like any other files, viruses must be opened in order to do something. Most viruses come through e-mail as an attachment. Some will make it look like it's someone you know, and it will try to convince you to open an attachment. Never open attachments at any cost! Some viruses will infect files in programs, so opening a program will actually open the virus, maybe the same one, or another part of it.


All files have what is called an extension; This is the 3 last letters after the last period. For example, setup.exe has a file extension of .exe.


Extensions to watch out for are .exe .com .bat .scr .pif .vbs and others, but these are the most seen. .exe .com .bat .pif and .scr are valid extensions for executables. A virus writer will simply rename it to one of these and it will work the same way. .pif is a shortcut to an ms-dos program and will have the ms dos icon, but will still execute whatever code is in it, so an .exe can be renamed to .pif and be run the same way. .bat is a batch file, which can contain instructions to do various file activities, but again, a .exe can be renamed to .bat and it will execute it! .vbs is a visual basic script. For some reason, Microsoft provides this scripting language along with the scripting host to make it more convenient to design and write viruses quickly and easily, I've never seen another use for this scripting language other than for writing viruses. There are programs that are written with that language, but it is compiled into an exe. Exe is the usual extension for programs, you would not have a software CD install a bunch of vbs files all over!


Bottom line is, if you don't know what a file is just don't open it. Some viruses will sometimes be named a way as to mask the real file extension to make it look like a harmless file such as a image file. This is easily noticed, but can still be missed. Simply don't open unexpected files.


If you get something that appears like something legit, just ask the person it came from if they sent it. Most viruses use a friend's address to make it look like it comes from them. The virus does this by using the person's address when sending itself to the address book contacts.


Downloads
Email is not the only way to get viruses; P2P (file sharing programs such as kazaa, winmx, direct connect etc) is also another way to get viruses.


When downloading programs, the main thing to watch out for is the file size. If you are downloading a program that you expect to be rather large such as a game, don't grab a file that is 10KB, since it's most likely a virus. However, I've been caught with a virus even with large files, so file size is not the only thing to watch, as an exe is still valid even if junk is added at the end, so a 64KB virus will still function even if it is turned into 650MB.


Icons are something to look for too, fortunately, virus writers don't take time to put icons. If your download should be a setup file, you should see the icon of a setup file. If it's just the blank icon that typical plain or corrupted exes have, don't open it.


Another thing to do, which should be obvious, is to scan the file for viruses using updated virus definitions. But don't rely on only your virus scanner, as they are not perfect, and if the virus has not been reported to them yet, they won't know to create a definition for it!


Changing settings to stay safe
If you do open a virus, you want to avoid it going to all your friends. The simplest thing to do is to NOT use the windows address book. It is easy for viruses to get through and Microsoft is not doing anything about it. Just don't use it. Put them in spreadsheet or even better write them down somewhere. Don't use the address book.


Another "feature" to avoid is the auto preview. Some viruses can attempt to open themselves just by opening the email. There are security holes in Microsoft mail programs that allow this. In Microsoft Outlook, click on the view menu and remove auto preview. You need to do this for every folder, but the inbox is most important. In Outlook Express, click on the view menu and go to layout. In the dialog box, you will see a check box for show preview pane. Uncheck it and click ok.


Another thing you should change, especially if you download a lot, is the option that allows you to view the file extension. In Win98, go in any folder, click on view then folder options and choose the view tab and where it says hide file extension for known types, uncheck it. In win2k, it is the same process, but instead, go in the control panel and open the folder options icon.


Avoiding server worms
Some viruses, mostly worms, can exploit through servers and affect other servers from servers that have been infected. A good example is the SQL slammer. This was a worm that affected SQL servers run by Microsoft IIS and Microsoft SQL Server. Once the worm gets in, that particular server starts trying to find more exploitable driving internet connections to a halt in the process. Servers running Apache were unaffected by that, except for the many hits to try to get in. IceTeks received about 100 hits per day when it was run on a dedicated home server. Most hits came from major ISPs and other big websites that had no clue they were still affected.


The simple solution to avoid these types of viruses is to NOT use Microsoft based server software for your server, especially if it is a public server. The operating system is also crucial, but the actual server software is much more. Apache, which is free, is much more secure than Microsoft based server programs such as IIS. IIS may be easier to understand and administer, but it saves a lot of hassle to learn how to use Apache. IIS has a large number of vulnerabilities, such as the ability to gain access to cmd.exe and basically delete the whole drive by doing a ../ request in the address bar. These don't require viruses, but simply commands, but there are worms written to automatically make these commands. The code red does this.


Removing a virus
The best way to do this is to do a clean install. However, depending on how bad the virus is, a simple clean install won't remove it. So to be extra sure, you'll want to do a low level format. This is especially true of you got a boot sector virus, as even repartitioning and formatting won't quite remove it, but sometimes you can get away with an fdisk /mbr, but not all the time. here are various removal tools for viruses, it is good to use them and see if they work, but proceeding with the clean install is recommended. You never know if the virus is completely removed by deleting files you suspect are infected. Some viruses such as the Bugbear will close anti virus programs and other programs to make it hard and annoying to figure out what to do. A clean install is the best way to ensure that it's gone for good.

Viruses are out there, don't be one of the many infected ones! Stay alert and stay safe! Don't open unexpected files, regularly update your virus definitions and scan downloaded files!

I hope this blog was useful for you

What Is Gps?

Global Positioning System or GPS is a satellite based navigation and positioning tool. GPS was originally developed for military purposes by Department of Defence in the year 1973. Back then it was used by soldiers and military vehicles to accurately locate their positions in a battle field. But today GPS is used for many reasons.Different Uses
It is used to forecast weather conditions, study earthquakes and for commercial purposes like phones, cars, boats and so on. Outdoor sports such as hiking, fishing and so on also use GPS.So how does GPS Work?
The constellation of satellites orbiting earth circles the earth making two complete rotations everyday. There are 24 satellites in operation travelling about 19,300 km. GPS receivers receive signals from 4 to 7 satellites at a give time. It determines its own position by calculating the distance of the satellites. GPS works on a simple mathematical calculation called Trilteration. GPS works well when you are out in the open. 

                                                                        

In short GPS is made up of three distinct parts:
  1. 24 satellites orbiting the Earth twice a day. That is, it takes 12 hours to complete one circle.
  1. The GPS on the Earth receiving the satellite signals.
  1. The data center which controls and monitors GPS stations on the Earth.
Now that we have an overview of what GPS is and how it works. Let us look at a similar tool GPRS and its functionalities.What is GPRS?
GPRS is the abbreviation for General Packet Radio Service. GPRS is used for wireless communication using a mobile device.

Different Uses

With this service you can access the internet, send emails and large data. You can also watch real time News, download games and watch movies.
How does GPRS work?
You must be aware of how files are transferred from one location to another on your computer. They are broken down into Packets and sent across. Similarly GPRS also uses the same function to transfer data through a network.  The information is split into smaller units or Packets and sent through the network and is reassembled at the receiving end.  GPRS provides a high-speed data transfer, typically between 56 Kbits per second to 114 Kbits per second.  A user of the GPRS network is charged only on the amount of data is sent or received as opposed to the duration of the connection.

                                                                           

Now that you have a good understanding of both the technologies, let us summerise the difference:

GPRS
  • A positioning service that can determine any position on the Earth
  • Receives signals from Satellites
  • Can be used on both land and sea, in any part of the globe.

  • GPRS

  • A data service technology that provides wireless communication
  • Receives signals from cellular towers
  • Range is limited to land.

                                           
Skype is software for calling other people on their computers or phones. Download Skype and start calling for free all over the world.The calls have excellent sound quality and are highly secure with end-to-end encryption. You don't even need to configure your firewall or router or any other networking gear.
Additionally it doesn't just work on Windows. Skype is also for Mac OS X, Linux and PDAs using Pocket PC, with a native look and feel for each platform. Talking, sending instant messages or even file transfers work between different platforms like a charm.
  • Skype calling - Skype has all the features of an ordinary phone so it's even easier to manage your calls.
  • Video calling - see who you are talking to at the same time as speaking to them.
  • Add Skype and SkypeOut contacts - Add contacts who use Skype and those who use ordinary phones so you can call more people.
  • Organising groups - group contacts under certain names and share them with your contacts so they can talk to them too.
  • Basic chat and emoticons - when it's not convenient to call, chat or Instant Message (IM) your contacts.
  • Group chat - for when it's easier to chat or Instant Message (IM) all your friends at once.
  • Profile settings - change how you appear to the world and let people know a bit about you.
  • Conference calling - talk to more than one friend at a time.
  • Import contacts - search your address book to find friends and family that already have a Skype name and start calling them for free.
  • View Outlook contacts - view and call your Microsoft Outlook® contacts quickly and directly from your Skype contact list.
  • Quickfilter and Speed-Dial - find Skype contacts, recent chats and SkypeOut contacts quickly and easily, then enter their Skype name to call them back quickly                                                         Download
                                                                     


Firefox Tricks
Everybody’s favorite open-source browser, Firefox, is great right out of the box. And by adding some of the awesome extensions available out there, the browser just gets better and better.
But look under the hood, and there are a bunch of hidden (and some not-so-secret) tips and tricks available that will crank Firefox up and pimp your browser. Make it faster, cooler, more efficient. Get to be a Jedi master with the following cool Firefox tricks.
1) More screen space. Make your icons small. Go to View – Toolbars – Customize and check the “Use small icons” box.
2) Smart keywords. If there’s a search you use a lot (let’s say IMDB.com’s people search), this is an awesome tool that not many people use. Right-click on the search box, select “Add a Keyword for this search”, give the keyword a name and an easy-to-type and easy-to-remember shortcut name (let’s say “actor”) and save it. Now, when you want to do an actor search, go to Firefox’s address bar, type “actor” and the name of the actor and press return. Instant search! You can do this with any search box.
3) Keyboard shortcuts. This is where you become a real Jedi. It just takes a little while to learn these, but once you do, your browsing will be super fast. Here are some of the most common (and my personal favs):
Spacebar (page down)
Shift-Spacebar (page up)
Ctrl+F (find)
Alt-N (find next)
Ctrl+D (bookmark page)
Ctrl+T (new tab)
Ctrl+K (go to search box)
Ctrl+L (go to address bar)
Ctrl+= (increase text size)
Ctrl+- (decrease text size)
Ctrl-W (close tab)
F5 (reload)
Alt-Home (go to home page)
4) Auto-complete. This is another keyboard shortcut, but it’s not commonly known and very useful. Go to the address bar (Control-L) and type the name of the site without the “www” or the “.com”. Let’s say “google”. Then press Control-Enter, and it will automatically fill in the “www” and the “.com” and take you there – like magic! For .net addresses, press Shift-Enter, and for .org addresses, press Control-Shift-Enter.
5) Tab navigation. Instead of using the mouse to select different tabs that you have open, use the keyboard. Here are the shortcuts:
Ctrl+Tab (rotate forward among tabs)
Ctrl+Shft+Tab (rotate to the previous tab)
Ctrl+1-9 (choose a number to jump to a specific tab)
6) Mouse shortcuts. Sometimes you’re already using your mouse and it’s easier to use a mouse shortcut than to go back to the keyboard. Master these cool ones:
Middle click on link (opens in new tab)
Shift-scroll down (previous page)
Shift-scroll up (next page)
Ctrl-scroll up (decrease text size)
Ctrl-scroll down (increase text size)
Middle click on a tab (closes tab)
7) Delete items from address bar history. Firefox’s ability to automatically show previous URLs you’ve visited, as you type, in the address bar’s drop-down history menu is very cool. But sometimes you just don’t want those URLs to show up (I won’t ask why). Go to the address bar (Ctrl-L), start typing an address, and the drop-down menu will appear with the URLs of pages you’ve visited with those letters in them. Use the down-arrow to go down to an address you want to delete, and press the Delete key to make it disappear.
User chrome. If you really want to trick out your Firefox, you’ll want to create a UserChrome.css file and customize your browser. It’s a bit complicated to get into here, but check out this tutorial.
9) Create a user.js file. Another way to customize Firefox, creating a user.js file can really speed up your browsing. You’ll need to create a text file named user.js in your profile folder (see this to find out where the profile folder is) and see this example user.js file that you can modify. Created by techlifeweb.com, this example explains some of the things you can do in its comments.
10) about:config. The true power user’s tool, about.config isn’t something to mess with if you don’t know what a setting does. You can get to the main configuration screen by putting about:config in the browser’s address bar. See Mozillazine’s about:config tips and screenshots.
11) Add a keyword for a bookmark. Go to your bookmarks much faster by giving them keywords. Right-click the bookmark and then select Properties. Put a short keyword in the keyword field, save it, and now you can type that keyword in the address bar and it will go to that bookmark.
12) Speed up Firefox. If you have a broadband connection (and most of us do), you can use pipelining to speed up your page loads. This allows Firefox to load multiple things on a page at once, instead of one at a time (by default, it’s optimized for dialup connections). Here’s how:
Type “about:config” into the address bar and hit return. Type “network.http” in the filter field, and change the following settings (double-click on them to change them):
Set “network.http.pipelining” to “true”
Set “network.http.proxy.pipelining” to “true”
Set “network.http.pipelining.maxrequests” to a number like 30. This will allow it to make 30 requests at once.
Also, right-click anywhere and select New-> Integer. Name it “nglayout.initialpaint.delay” and set its value to “0?. This value is the amount of time the browser waits before it acts on information it receives.
13) Limit RAM usage. If Firefox takes up too much memory on your computer, you can limit the amount of RAM it is allowed to us. Again, go to about:config, filter “browser.cache” and select “browser.cache.disk.capacity”. It’s set to 50000, but you can lower it, depending on how much memory you have. Try 15000 if you have between 512MB and 1GB ram.
14) Reduce RAM usage further for when Firefox is minimized. This setting will move Firefox to your hard drive when you minimize it, taking up much less memory. And there is no noticeable difference in speed when you restore Firefox, so it’s definitely worth a go. Again, go to about:config, right-click anywhere and select New-> Boolean. Name it “config.trim_on_minimize” and set it to TRUE. You have to restart Firefox for these settings to take effect.
15) Move or remove the close tab button. Do you accidentally click on the close button of Firefox’s tabs? You can move them or remove them, again through about:config. Edit the preference for “browser.tabs.closeButtons”. Here are the meanings of each value:
0: Display a close button on the active tab only
1:(Default) Display close buttons on all tabs
2:Don’t display any close buttons
3:Display a single close button at the end of the tab bar (Firefox 1.x behavior)


                                                       

1. Log into your Gmail account with your username and password.2. Open the mail.3. To display the headers, Click on More options corresponding to that thread. You should get a bunch of links. Click on Show original4. You should get headers like this: Gmail headers : ****** Look for Received: from followed by a few hostnames and an IP address between square brackets. That is be the IP address of the sender!5. Track the IP address of the sender

                                                           
iphone Home
Here are the easy steps you can take to make use of our cool wallpapers on your iPhone. The first step is to save the desired wallpaper to your Mac or PC via your favorite browser.
                                                          

Apple iphone Image
1. Right-click or control-click on the image you want to use.
2. Select “Save as…” and save the image to your hard drive.
Mac users can either save the image to a folder or add it to their iPhoto library.
PC users will want to save the wallpaper into their “My Pictures” folder.
You can then sync the iPhone with photos in iPhoto 4.0.3 or later on a Mac, or Photoshop Album 2.0 or later or Photoshop Elements 3.0 or later on a PC. Or you can sync with any folder on your computer that contains images. Connect the iPhone to your computer and do the following:
1. Launch iTunes then click the Photos tab and select “Sync photos from:”
2. From the pop-up menu, do one of the following:
If your using a Mac, choose iPhoto or your Pictures folder.
If you’re using a PC, choose Photoshop Album, Photoshop Elements,
or your My Pictures folder.
3. Choose Folder, then choose any folder on your computer that has images.
4. Choose “All photos,” or choose “Selected folders” or “Selected albums” and choose the folders or albums you want to sync.
Finally on your iPhone:
1. Goto the Photos section of your camera. Browse through the albums or camera roll until you find the picture you wish to use.
2. Select the picture so it is displayed full screen.
3. Tap the icon in the lower left corner of the screen. If you don’t see the icon, single tap the picture to display the menus.
4. Here you can select if you want to email the picture, save the picture as a wallpaper, or assign to a contact.
5. If you want to assign to a contact, press that button. The contact list will open and you can select the contact you wish to link to the picture.
6. Select Done to complete the process.
Facebook had announced a new product called Facebook Home, for Android phones which will serve as the home screen for your phone. This app sits on your Android home screen and tightly integrates with the social networking. We had also covered out first impression and hands on of Facebook Home.
Today, Facebook has officially released the Facebook Home app for Android phones and it is now available for download in the Google Play store.
Facebook Home has three main features, Cover Feeds, Chat Heads and notifications as a part of the app. The app is meant for people who are mostly into Facebook and not for causal users. Moreover you will need some time to get used to the features. You need to install the latest Messenger and Facebook apps for the full Home experience.
Here is a video on how Facebook home works
You can download it from here. Please note the app is now available only for selected devices and country.

                                                I already posted many post on Facebook tricks in my older posts. but today i found another 100% working trick, that is How to share animated gif images/pictures on Facebook. As you know that Facebook doesn’t allow us to upload or share animated pic on Facebook wall, but before few months i noticed that some of  Facebook masters was uploaded and shared animated pictures on their Facebook wall. but after it again Facebook patched them. and finally we haven’t any option or trick to upload animated pic. but hey, what about existing GIF pictures?  that they already shared?
                                                           


Facebook just stopped them to upload any new animated pictures but NOT removed their existing shared pictures.  So, i founded that we can replace their Facebook page URLs with our any Facebook page URLs. and also i collected some good working animated pics from the different pages and created a generator that you can easily share animated pics with your Facebook fan page URL on your Facebook wall or Facebook fan page or Facebook Groups etc. 
There is main advantage is that you can increase your Facebook page likes. How???  you have to just share animated pics with your Facebook page URL on your Facebook fan page or timeline then your fans or friends will share your animated pic with their friends and i am sure it will be shared with friends of friends & more n more..  that mean there is 100% chances to increasing likes of your Facebook page. 
Here I will Show You An Interesting Tricks And Very Use full Tricks Which Will Help You To Protect Your Folder With password And No Need of any Softwares. It is Very Simple Trick, and Works On every Windows Platform.
                                                             

How To Lock The Folder ?


 STEP 1. 
 Open Notepad and Copy code given below into it.

cls
@ECHO OFF

if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST MyFolder goto MDMyFolder
:CONFIRM
echo Are you sure to lock this folder? (Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren MyFolder "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock Your Secure Folder
set/p "pass=>"
if NOT %pass%== tipsandtricksocean goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" MyFolder
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDMyFolder
md MyFolder
echo MyFolder created successfully
goto End
:End


STEP 2.  Save the notepad file as lock.bat (.bat is must).
 
STEP 3. Now double click on lock.bat and a new folder will be created with name MyFolder.
 
STEP 4. Copy all your data you want to protect in that New folder.
 
STEP 5. Now double click on lock.bat and when command promp appears Type Y and press enter.
 
STEP 6. Now MyFolder will be hidden from you view, to access that folde double click on lock.bat.
 
STEP 7. It will ask for password enter your password and done

                                             Many Of  The People Have Problem With Seen Option. In Facebook For Some One It Is Useful But Some One Do Not Want This. So There Is A Simple Tricks To Disable Facebook Seen Option In Chat. What You Have To Do Is Just Fallow The Simple Steps
                                                               

How To Install It On your Browser :-


These Are The Adons And Extension That You Will  Need To Disable seen Option in chat. This adds Are safe and free. All the steps are given below.
                                                

For Google Chrome  Users 

Step 1.  Just Download this add on name "FB UNSEEN".

fb+unseen
Step 2.  Now Just Click On Add To Chrome And It Will Automatically install in your browser.

Step 3.  All Done. Now You Can enjoy the awesome  feature in chrome.
feature
feature
feature
feature

For Mozilla FireFox Users

Step 1. Just Download this add on name  "GREASE MONKEY"

Grease Monkey.
Step 2. Then You Have To Install This Name Facebook Stealth.

Step 3. All Done . Now You Can enjoy this feature in firefox.
                                                            

At Last

All the addon are save and easy to install and use. this trick is loved by all. maximum of the facebook users wanted this to diable the seen option in there facebook chat. just comment your experience on below.
                                                                
                                                             
Better keep your nerves because some might be accessing some adult/porn sites using your personal computer, or your laptop. The threat- access via your personal account, your IP address is being noted, and some sites can trap you in some situations from where you can never return back.                                                                             Forget everything; just consider the situation, your children or the younger kids in your home accessing the internet, there is always a possibility that the internet could land them to something absurd like the porn websites, pop-ups etc., what then. Would you like that?
Possibly No, as you ever want the innocents to get a bad influence. There are no such morals and ethics attached to these websites, just meant to earn some money. So it becomes your duty to protect your dear ones from getting affected by such content.
So, here is a solution to your problem. To block the adult websites without using any software;
  1. Go to – Start on any Windows version, doesn’t matter 7 or 8 and open Control Panel.
  2. On the control panel, click the option- Network and Internet.
  3. Various options flash on your screen, just select the option- Network and Sharing Center.   There you’ll be able to see your network status, and the connection you are using.
  4. Just click on the option Connections.  It is a way to access the properties of your network connections.
  5. A small pop-up window is seen by the network and various options. Click on the small tab/option-Properties. There you can see various connections.
  6. Click on the Internet protocol version 4 (TCP/IPv4) and click on the properties option for that particular protocol.
  7. Here you can see, various other options but select- Use the following DNS server addresses:
    Under that, certain blanks are to be filled, just enter these addresses,
    Preferred DNS addresses: 208.67.222.222
    Alternate DNS addresses: 208.67.220.220 
    Click on OK and you are ready to go.                                                                                                                                                                    
    NOTE:
    • Don’t forget to create a free account on the link given, so as to manage your own block list-http://www.opendns.com/ .
    • If you have a WI-Fi connection with similar instructions are to be followed.
    Now taking a recap:
    Start > Control Panel > Network and Internet > Network and Sharing Center > Connections > Properties > IPv4 Protocol > copy the addresses given.
    For your help, here is an image.
                                                                                                                                                                                                        



Design by Farakh | Blogger Theme by Farakh - By Farakh | Sheeraz