Fashion Era

Wednesday 25 June 2014

cracked connectify Hotspot PRO v7.1.0.29279

Download Free ConnectifyHotspot Pro:

This connectify Application will turn your windows laptop into WiFi HOTSPOT to share the internet with your friends, family, co-workers, and your mobile devices. Connectify is running in the notification tray next to the system clock. It might not be visible, bcoz windows has cleaned up the notification tray to hide the icons that you don't frequently use. if you click on the small white triangle it will show all of the icons, including the connectify radio wave icon.
connectify hotspot pro free download
Connectify Hotspot Pro 

When it is RUN in "Access Point" mode, connectify is real WiFi Access Point running on the your computer. Any other devices that can connect to a regular access point, can connect to a Connectify Hotspot, with no special setup or software require.
When Connectify run in "Ad Hoc" mode it sets everything up for you ( Wireless Card, Internet Sharing, Firewall, ETC.) in one press of a button.

Connectify also provide advance features:

  • 1. Showing you what computer are connected
  • 2. How many devices connected to your hostpot
  • 3. You can easily manage user Allow or Disallow
  • 4. Right click them to explore their shared drivers and printers
INSALL NOTE
  1. Install Connectify Hostpot (using  ConnectifyInstaller.exe).
  2. After installation when asked for reboot then just select 'I want to manually  reboot later' and close the installer.'
  3. Run the file "ConnectifyExit.bat".
  4. Copy all the contents from cracked folder to install directory. [C:\Program Files (x86)\Connectify\]
  5. Now restart your PC.
  6. Whenever the software ask for update ? just cancel it. never update.

Download Links

Monday 23 June 2014

Hackers begin targeting your home appliances. refrigerators, ovens, and more

Latest news About Hackers:

They say "the Internet of things" is coming, and indeed, more and more devices, from televisions to small appliances, are becoming "smart," meaning that they can be accessed and controlled wirelessly
latest hacking news
news about hacking

                                                           

What's more, with everything that we use in our daily lives being connected, eventually, to the Internet, technology experts and analysts are warning that those items will also be in danger of being hacked.

 save your home appliance
Save your home appliance

Reported by Bloomberg News:

Come home to a hot iron and smoldering clothes this afternoon? Soon, it may not be a sign of forgetfulness, but rather evidence that you've been hacked.

In coming years, your smartphone will be able to lock your house, turn on the air conditioning, check whether the milk is out of date, or even heat up your iron. Great news, except that all that convenience could also let criminals open your doors, spy on your family or drive your connected car to their lair.

"As these technologies become more sophisticated, it opens up a broader spectrum of threats," Gunter Ollmann, chief technology officer of IOActive, a tech security firm in Seattle, told Bloomberg. A world of connected devices makes it possible "for the bad guys to have permanent entry into your household."


'There's an app for that'

The Internet of things is being championed as the next wave of tech riches, and it is expected to be massive. In the not-too-distant future -- by 2020 -- there could be as many as 26 billion devices connected to the Internet, up from just 3 billion today, according to Gartner Inc., a tech industry researcher. That's nearly four times the number of smart phones, PCs and tablets that will be in use.

The goal is to connect nearly everything, from our cars to our refrigerators, lamps and, yes, even our toilets. If you forget to flush, well, there will be an app for that.

And while data security is not typically something you might consider for your toilet, it is a big deal. Ditto for your frig, baby monitor and home security system. That's because security lapses on such devices might just allow people with bad intentions to throw major disruptions into your life, gather invaluable information about your personal life or even use stolen information to defraud other victims, said Ollmann.


A Chicago company, Trustwave, helps corporate clients battle cybercrime. It hijacked a Bluetooth connection recently that controls toilets made by Japan's Lixil Group and could allow hackers to open or close the lid and even blast a stream of water at the user's buttocks, Trustwave officials said.

Sunday 22 June 2014

Latest 2014 adsense approval Trick

Super idea tp get approval in 2 hours:

People use to say that blogging is the easiest way to earn money by seating at your home, but actually money making is not an easy job, you have to pay a lot to earn. Most of the people join Blogging platform with the hope that they will earn money by placing ads on their sites or may be some other ways. But many bloggers leave blogging with disappointments because they can't even get the approval from AdSense.Today in this tutorial. I am going to show you how to get approval from AdSense just in a 2hours. As we know that to every problem there is a nicer way of solution, so problem of not getting approved by AdSesne can be resolved by tweaking. We can create an AdSense account through YouTube  and later on we can add our website to that AdSense account and finally show off ads on the site.

 idea adsense account approval
your adsense account approved




Google Adsense Approval Trick Within 2 Hour






Latest new google adsense account approval::

create an Adsense account through YouTube,
1) Sign Up to YouTube using your Gmail ID which is associated with your blog
2) Now go youtube and set an account over there then go Video Manager > Channel Settings then enable you account for monetization.
3) After enable, then go to Channel Settings > Monetization.
4) Now Click on "How I be Paid ?" then click on associate an AdSense account.
5) After that you will get a confirmation email from AdSense team it will take a 2 hours max.
6) After successfully creating your AdSense account link your website to that AdSense account.
7) After that, go your google adsense account, open My Ads tab and create ads.
This Trick is working 100% and checked by me.

link your website to AdSense:

1) Sign in to your Adsense account and click on Account settings.2) Scroll down to the bottom and you will see a link like Sites authorized to show ads.3) Click on that link and type your website address for example (www.site.com).You are done, now you can place ads to your site.

         

How to remove autorun.inf virus from USB Pen Drive

Remove Autorun.inf Virus from USB:

Hi everyone, getting annoyed of this damn Autorun virus and found no way and finally came here by Googles search...! Don't worry your problem will be solved shortly reading this article. Read the full article, follow the steps and you can remove the Autorun successfully. If you have an Autorun virus on your Hard disk, then take a long breath and check out here.


remove autorun.inf viruse




" HOW TO REMOVE AUTORUN VIRUS FROM USB DRIVE "








Steps to be followed:


  • Press ( win+R ) > type ( cmd )
  • If you are in the root directory or any other directory, just you move to your USB directory ( my PC is an H directory )
  • Type ( attrib -h -r -s autorun.inf ) without using brackets and hit enter.
  • Type ( del autorun.inf ) again hit enter.
autorun virus removal
Remove autorun virus
After deleting finish then just make a restart your system.

after finishing autorun.inf is permanently delete

THANK YOU

Saturday 21 June 2014

SEO landscape is changing a lot with every assing in a day

Stop all the black hat SEO techniques

Google is continuously invigilating all the websites and is changing its algorithm in order to stop all the black hat SEO techniques that are being done by the web masters or the website owners in order to move up the ladder of the search engine ranking. Recently Google’s Panda and Penguin update has changed the way in which websites were being ranked in the search engine results and while some websites have been over-rated, there are some others that have dropped in ranking in order to the penalization of the Panda. There are too many myths that are surrounding the entire SEO industry and therefore when you wish to let go of the myths, you should know the facts. Read on to know the most common SEO.
stop black hat seo
SEO AND SOCIAL MEDIA

Keywords require being an exact match for SEO:::

The keywords don’t need to be repeated throughout the entire content. There are people who think that it is necessary to use the keywords in the content, in the title and in the Meta tags, almost everywhere! But the actual fact is that keywords should be placed only in those places where it fits accordingly and it makes most sense. You should try writing a stellar headline that focuses on explaining the entire content of the article. Nothing can be worse than reading a headline that is keyword stuffed or rather with a repeated use of the keyword phrase. Although there’s no magic number as to how many times you should use the keywords in your article, you should certainly use it in accordance with the total number of words of the article.

SEO and social media aren’t at all related:::

There is another myth that says that social media and SEO are not related in any manner. The intersection of SEO and social media is referred to as “social search” and this is a very important thing. The fact is that there is an increasingly formal relation between ‘social’ and ‘search’ and Google has been struggling hard to prove this with Google+ and Google Authorship. Even in social search, the content that has a social connection to you will always be given higher priority, especially when you’re linked through Facebook, Twitter and some other social networking websites.

More links is better than more content:::

A very common question that often arises is why you should invest in content creation or link building? Inbound links might seem to be an important part of your website but if you have enough money to invest in your website, you should hire someone for writing content for your website. Too often, when the business organizations hire someone for building links, they focus on the quantity and not on the quality but this game is no more. Instead it is more important to focus on attracting relevant and diverse resources through which you can get relevant links to your website.

Therefore, when you’re an SEO expert, you need to ensure that you’re not the kind who takes amateurish steps that can affect you in the long run. You should rather go through the above mentioned points in order to know the exact steps that you should take in order to get increased traffic through SEO.

Wednesday 11 June 2014

iPhone 6 images leaked from "FOXCONN"

Leaked iphone 6 images from 'Foxconn'

WASHINGTON:-
Rumours about apple developing large screened iphones been doing the rounds for a while now.
however a new series of image of iphone 6 allegedly by leaked apple product supplier Foxconn is the latest in the rumour mill, CNET reports.

Genuine image leaked iphone 6 

leaked iphone 6 images
iphone 6 leaked genuine image 
 Image is much anticipated iphone 6 surfaced this weekend of chines network Wei Feng. It is reported that is the 3D schematics in the images cloud have been use to generate some of the dummy iphone 6 units that recently appeared.

One of the images shows frame with the height of 5.4 inches [138mm] and a width of 2.6-inches [67mm].
Iphone 6 (5.4_inches)
Round corners and a rounded LED along with less rounded volume control buttons are the other features seen in the images.
thier are one more which is define the iphones between old Iphone and new Iphone 6.

 iphone 6 image leaked
Iphone 6 (138MM)
Mean while, the power button it self switched location from the top of the Iphone to the side, the report adds.

Wednesday 28 May 2014

Hackers exploit Apple's 'Find My Phone' feature, lock users out, ask for ransom

San Francisco: Multiple users on Apple Inc's online support forum and Twitter have reported an unusual smartphone and tablet hack in which cyber attackers were said to have locked Australian users' smartphones and demanded payment in return for unlocking them.

The alleged cyber attackers, first reported by The Sydney Morning Herald, appeared to use Apple's "Find My Phone" feature to lock the devices' screens and send a message demanding money be sent to a PayPal account, according to multiple users. The anti-theft feature locks phones that are reported lost.


Apple, in response to inquiries about the hacking, confirmed there had been an incident. The technology giant said in an emailed statement it "takes security very seriously and iCloud was not compromised during this incident".

It recommended affected users change their passwords as soon as possible and avoid using the same username and password for multiple services.

Alleged cyber attackers appear to use Apple's "Find My Phone" feature to lock the devices' screens and send a message demanding money be sent to a PayPal account

An Apple spokeswoman in Sydney said by telephone Apple did not have any details on how widespread the incident was or whether it was contained to Australia.

Multiple users requested information on Apple's support forum about how to reset their phones or otherwise circumvent the lock, while other users also tweeted their concerns.

"I went to check my phone and there was a message on the screen saying that my device(s) had been hacked by 'Oleg Pliss' and he/she/they demanded $100 USD/EUR," said "veritylikestea", a user from the Australian city of Melbourne, on an Apple discussion board.
Other users replied that they had received the same message.

Telstra Corp Ltd, Australia's largest telecommunications provider, said it was aware of the issue, while Vodafone Hutchison Australia said it was encouraging worried customers to contact Apple.
Reuters could not immediately verify the identity of the users, or the accuracy of their claims.
Ref: IBNlive

Google's Self-Driving Car Prototype Ditches the Steering Wheel

Google plans to build about 100 prototypes, and test them this summer. Early versions will have manual controls.


Google this week showed off a prototype of a self-driving car that the search giant created itself.

Google-self-driving-front-beauty

The small, Volkswagen Bug-esque vehicle does not have a steering wheel, accelerator pedal, or brake pedal, "because they don't need them," Google said in a blog post. Just get in, and Google's car will take you to your destination with the push of a button.

"Ever since we started the Google self-driving car project, we've been working toward the goal of vehicles that can shoulder the entire burden of driving," wrote Chris Urmson, director of Google's Self-Driving Car Project. "Just imagine: You can take a trip downtown at lunchtime without a 20-minute buffer to find parking. Seniors can keep their freedom even if they can't keep their car keys. And drunk and distracted driving? History."

Google plans to build about 100 prototypes, and this summer, it will test early versions of these cars that have manual controls.

Google-self-driving-rear-beauty

"If all goes well, we'd like to run a small pilot program here in California in the next couple of years," Urmson said.

On the safety front, Google pointed to sensors that remove blind spots, and can detect objects up to two football fields away in all directions. Right now, the cars also don't go more than 25 mph, so Google's vehicle doesn't exactly have a lead foot.


Google-self-driving- The Brain

"On the inside, we've designed for learning, not luxury, so we're light on creature comforts, but we'll have two seats (with seatbelts), a space for passengers' belongings, buttons to start and stop, and a screen that shows the route—and that's about it," Urmson wrote.

News of Google making its own self-driving car emerged last summer, when The Information's Amir Efrati reported that Google had talked with "contract manufacturers" to build a self-driving car. Efrati said Google failed to reach a deal with a major auto maker, so it pursued its own vehicle.

On Twitter, Efrati said last night that "one person on the Google car project told me last year that some [people] on the project believed that the traditional auto makers would win. But that they were happy they lit a fire under Detroit's arse and were pushing the industry forward. So didn't matter who won."

Google-self-driving- The Brain zoom

Google has largely been relying on a tricked-out Toyota Prius (see above) to test its self-driving car technology. In fact, it recently announced that it had logged 700,000 autonomous miles of testing.

Earlier this month, the California Department of Motor Vehicles approved new rules for autonomous vehicle testing in the state. Come Sept. 16, companies will be able to start testing self-driving vehicles on the open road, provided they have a trained driver behind the wheel, ready to take over in the event of a malfunction, and at least $5 million worth of liability insurance.

Google is not the only company pursuing self-driving cars, though. Car makers likeAudi, Mercedes, Nissan, and Toyota have autonomous vehicles in the works. Recently, Freescale Semiconductor announced a multi-year collaboration with Neusoft and Green Hills Software to develop a platform that will usher in semi-autonomous vehicles as early as 2017 and pave the way for fully automated cars, trucks, and buses within the next decade.

Saturday 24 May 2014

eBay hack: how you can stay safe online

Hackers have stolen the personal details of 145m customers from eBay, including names, email and postal addresses, phone numbers and dates of birth. How worried should you be, what can they do with this data and what steps can you take to limit the damage?

eBay
eBay has handled the loss of data extremely poorly, with experts and MPs castigating the company for what appeared to be serious delays in informing their customers after the initial breach at the end of February
Hackers have stolen the personal details of 145m customers from eBay, including names, email and postal addresses, phone numbers and dates of birth. How worried should you be, what can they do with this data and what steps can you take to limit the damage?

Encrypted passwords were also snatched, so the company is taking the precaution of telling users to choose new ones, even though it’s unlikely they can be deciphered on a wide scale. No financial data has been lost, eBay claims, so any credit card information stored with PayPal is also safe.

Ebay Hack

The main threat is that the data will be used to commit identity theft and as a handy database for spammers. With those personal details hackers will be able to craft convincing messages which appear to come from eBay, your bank or any other reputable organisation - many people will be fooled into handing over yet more data that exposes them further.

Imagine a nefarious character who spots someone complaining on Facebook about being unable to log-in to online banking. They look up their name in the list of stolen eBay records and find a match; they now have an address, date of birth and phone number which can lend a sense of authenticity to a faked email from the bank requesting account numbers and sort codes in order to resolve the problem. Once this is handed over, the hacker is one step closer to stealing the victim’s money.

Or, in a less targeted attack, they could send 145m people an email purporting to be from a certain bank and requesting that they follow a link and reset their password - the link will point to a fake version of the bank’s website which is there to harvest data. This scattergun approach needs only a tiny percentage of people to comply in order to prove hugely lucrative.

This spam email could also be used to get people to click on links or download files which infect their computers with malware. This could be used for a range of reasons: to send yet more spam email, to mine Bitcoins or even to spy on people through their webcam.

Of course, not everyone will fall for these tricks, but they don’t need to - with 145m records there will be enough who do. Someone will be making a fortune with this data. The stolen details will likely be treated like a commodity, sold and resold on underground websites and used to con money out of vulnerable people by various groups for years to come.

We’ve already seen criminals trying to con each other; several different samples of data purporting to be from the eBay leak have been published online, acting as proof of possession in a form of underground advert which demands money for the full file. We’ve been told by security researchers that this data is old information from previous hacks, crafted to look new. One of these adverts requests payment in Bitcoin - we have investigated and verified that nobody has yet fallen for the trick.

In truth, there is little that can be done about this loss of personal details - the cat cannot be put back in the bag. It is worth checking your credit rating with services like Experian, as an unexpected change in credit rating could be a warning sign that you've become a victim of identity theft.

Changing your eBay password is a vital step which should be taken quickly. You should also change any other website passwords where you've used the same phrase, as hackers will often try the same email and password at other sites knowing that many struggle to remember multiple passwords.

But what should your new password be? The more simple it is, the easier it is to crack.

Often an attacker will use a “brute force” approach, which uses a computer to rapidly try every possible combination of characters until it finds the correct one. Obviously, the shorter a password is, the less time it will take to break. But a long password is both hard to type in and to remember, so a sensible balance must be struck.

Brute force attack software will often use dictionary files that contain regularly used combinations of letters or numbers, inputting them one-by-one until the correct one is found. Some are clever enough to also try common words typed both forwards and backwards, and abbreviations.

So it is advisable to be as random as possible and perhaps use intentionally misspelled or fictitious words. Certainly, choosing names, birth dates or places is not the best way to protect your account.

Microsoft recommends that passwords are at least eight characters long, while many websites will demand that it is made up of both numbers and letters, often both uppercase and lowercase. As much complexity as you can practically live with is advised. Some sites will allow the use of symbols such as %, &, * and #.
It is also advisable to change your passwords regularly, so that if any are exposed, the attacker will only have a limited opportunity to use your account.

One thing worth considering is using a password manager such as LastPass. These products will keep all of your passwords in one place, protected by a master password. They will automatically generate long, secure passwords for you, and prompt you to regularly change them.

If you change your eBay password and have not used the same password for other services, then you should be safe.
Ref: The Telegraph!!

Apple launches 8GB iPhone 5C at Rs 37500 in India,its lamest gamble yet!!!

Apple has unveiled the 8GB iPhone 5C in India for a super-premium price of Rs 37500, making it even costlier than the 16GB model which is being offered at a lower amount through online retailers. It’s the sort of pricing policy that would make sense in another world, in a galaxy far away from ours.

The higher capacity handset was launched at Rs 41900 and is now being vended at Rs 34,400 on Infibeam, while other retailers have nailed it a little higher. The Rs 37500 tag for the 8GB option is being reported by NDTV. The website has also mentioned that the phone will be sold at an introductory price of Rs 34500 for a limited time. Additionally, the company will throw in a free case with even unit, and this is valued at Rs 2300.
iphone 5c
iPhone 5C 8GB

Apple needs to rethink the price for the 8GB iPhone 5C, and compare it to what retailers are offering the 16GB handset at. We could picture the device reaching stores for a lower amount, but we’re still likely to see it compete with its higher capacity variant that’s not far up the price chart. The version in question was originally launched in numerous markets across Europe and in China amongst other areas. In India, it will occupy the entry-level spot that was recently manned by the now-deceased iPhone 4.

Highlighted features of the Apple iPhone 5C:
- 4-inch Retina display
- Dual core Apple A6 chipset
- 8GB internal storage
- iOS 7 platform
- 8MP rear camera, 1.2MP front snapper
- 59.2mm x 124.4mm x 8.97mm dimensions
- 132 grams weight

If Apple truly wants its 8GB iPhone 5C to sell in India, it will have to push the price at least below Rs 30000.


Friday 23 May 2014

Google Developing 3D Tablet With Advanced Vision Capabilities To Capture 3D images

Google is developing a new tablet with advanced vision capabilities that can be used to capture 3D images.
Google 3D TAB

The Company plans to produce about 4000 of the prototype tablets beginning next month according to people briefed on the company's plans. The new tabletcould be ready before Google's developer conference Google I/O kicks off on June 25, the Journal said.

The tablet will have a 7-inch screen, infrared depth censors, two back cameras and software for processing 3D images, and will be part of Google's Project Tango, according to the newspaper.

Project Tango is Google's attempt to create a mobile device that shares a human's sense of space and movement and understands and perceives the world the same way we do.

A Google spokesman declined to comment on the tablet plans on Friday.

In February, Google launched a 5-inch Project Tango prototype Android smartphone combining technology from the worlds of computer vision and robotics to create a 3D model of the phone's surroundings.

This technology could for instance be used to quickly find the exact shelf where a product is located in a store or to make a 3D floor plan of a house before going out to shop for furniture. Project Tango could also guide the visually impaired around unfamiliar indoor places and provide step-by-step directions in stores.

These are all possibilities for the tablet too, reported the Wall Street Journal, adding that the technology could also be used for immersive videogames.

Two Project Tango phones are heading to the International Space Station during the upcoming Orbital 2 commercial resupply mission scheduled to launch on June 10. The phones will be attached to self-powered soccer-ball-sized robots called "Spheres" that will fly around inside the space station.

NASA will test how well the 3D modeling and visual odometry can be used to let the Spheres learn their environment based on what it sees, rather than relying on fixed sensors in the environment. One day, the 3D phones could also be used to fly around the outside of the space station or even for NASA's plans to land on an asteroid.


 

     (See video of the Tango phone and Spheres at NASA in a YouTube video.)

Google is not the only company investing in advanced 3D tech. Facebook is also interested and is in the process of buying Oculus VR, the developer of the Oculus Rift virtual-reality headset for about US$2 billion. That acquisition is about much more than gaming though. Facebook CEO Mark Zuckerberg sees it as the next major computing platform, one that will be used for shopping, communication, education and more.

Wednesday 21 May 2014

Facebook bows to pressure on privacy settings for new users

Facebook has responded to frustration over its privacy policies by switching off the default setting that led many Facebook users to accidentally share their posts with the entire world wide web.


facebook settings

Anyone joining newly to Facebook from Thursday will only share their posts with friends and family, unless they explicitly choose to make their information open to everyone online, according to a post on the company's blog. The change will not affect its existing 1.28 billion account holders, who will be prompted to carry out a "privacy check-up".

Facebook is facing stiff competition from a wave of social apps such as Snapchat, Secret and WhatsApp – which it recently acquired for $19 billion (£11 billion) – that have made discretion a selling point. The company's privacy product manager, Mike Nowak, said the decision to reduce the risk of new users over-sharing was taken in response to feedback from its subscribers.

"If people share more publicly than they want to be sharing, that doesn't benefit us because it leads to bad experiences over time ", said Nowak. "We want people's first impressions of Facebook to be as awesome as possible, and we know it's worse to accidentally overshare than to accidentally undershare."

When it first allowed users to share posts publicly in 2009, the default setting was public, allowing anyone else online to see them. Facebook's decision was a hit with online advertisers eager to glean as much data as possible on its millions of users, but has been a constant source of concern for the public.

In 2011, the company was forced into a settlement with the Federal Trade Commission, vowing to never make deceptive claims about its privacy procedures and agreeing to independent reviews of its practices.

Most recently, Facebook is being sued by a group of parents on whether it can use their children's images in adverts without consent.

For the last decade, Facebook has pushed the boundaries of privacy, encouraging and occasionally forcing account holders to share increasing amounts of information. But Edward Snowden's revelations about the NSA have encouraged Silicon Valley's technology companies to take a stand on protecting their users' information, and regulators in Europe and America have begun to act to protect the rights of individuals online.

Last week, the European court of Justice ruled against Google, in favour of a complainant arguing for the right to be forgotten by the search engine.

"They have gotten enough privacy black eyes at this point that I tend to believe they realised they have to take care of consumers a lot better," said Pam Dixon, executive director of the campaign group World Privacy Forum.

This spring, Facebook introduced a privacy mascot in the shape of a blue dinosaur, dubbed "Zuckersaurus" after the social network's founder, Mark Zuckerberg, which pops up as people are about to release posts, prompting the user to make sure they are not sharing more widely than they intended.

In its post on the change, Facebook said: "While some people want to post to everyone, others have told us that they are more comfortable sharing with a smaller group, like just their friends. We recognize that it is much worse for someone to accidentally share with everyone when they actually meant to share just with friends, compared with the reverse."