Archive for February 2014

WHY ANTIVIRUS SOFTWARES ARE NEEDED ?

                WHY ANTIVIRUS SOFTWARES ARE NEEDED ?



 Without an antivirus software your computer is at high risk to be infected during you chat with friends, download files from the Internet, open email attachments, launch various applications and games, visit websites, etc.

Virus infections can cause the system to freeze, applications to close unexpectedly, display unwanted popups, redirect home and search page, block the Internet, delete and modify system and user files and many more unwanted malicious behavior.

Computer viruses affect every PC user in every part of the world. They are transmitted through e-mails, web pages, networks, and digital media such as ipods, USB Flash drives and even CDs. I recommend to use the good Anti Virus Software.But to get a reliable software you have to spend some money !!!!

most of the cases we are not interested to spend our pocket money to buy a internet security.

now I am giving you the most reliable antivirus in free with a 365 days license .
note : it is not like so called trial version .

Now follow some simple steps

  1. Open Kaspersky 2012 or 2013 License Manager (from lower right corner).
  2. Click ‘Activate the application with a new license’ button. (Delete any trial key first, by clicking the red X next to the key).
  3. Select ‘Activate commercial version’ and enter the activation license code as 11111-11111-11111-1111X
  4. Wait activation wizard message->Click OK
  5. Wait for wrong activation code message->Click OK->
  6. Screen will appear with KEY FILE BROWSE
  7. Browse to the key location and activate kaspersky   .
  • download link :    downlaod   , download 2 .

    Thank you .Take a deep breathe .
    Have a nice day . keep in touch with techelectro . 
Sunday 16 February 2014

Free cell phone tracking software

Free cell phone tracking software -Cell phone locator-GPS tracker


Cell phone tracking softwares are now widely for funny or track lost/stole mobile devices either via GPS or GSM, especially giving iPhone and Android devices are so popular around the world, the demand for mobile locator softwares reached a record high. In order to help our readers to choose the best mobile trackers, we compared the cell phone GPS tracking softwares available and recommend the five best to smartphone users.

MobiWee

MobiWee currently supports Windows Mobile, Android, iPhone, and BlackBerry devices. Users can remotely Locate and track their device, retrieve their information, then lock, wipe, encrypt, delete certificates (for the corporate user), and shutdown their device from any web browser- even if the SIM card has been removed.

Find My iPhone

Once you enabled Find My iPhone on your handset, you can:
1. Locate your iPhone on a map.
2. Set a passcode lock remotely.
3. Display a message or play a sound on your lost handset.
4. Protect your privacy with Remote Wipe.

InstaMapper

InstaMapper is a free service that allows you to track a GPS-enabled mobile devices online in real time.
1. Lots of storage.
2. Access to raw data.
3. Location sharing.

Buddyway

Buddy is a free GPS track maker for mobile devices that allows you to track any handset or PDA with built-in GPS (or with Bluetooth GPS receiver) in real time.
1. Track any GPS-enabled device in real-time online.
2. Save trips for later reference.
3. Share the trips with desired people or keep them private.
4. Capture and comment on particular locations of your trip (in real-time) directly from your handset.
5. Import and save trips to Google Earth to visualize them in 3D-mode and more.
6. View route statistics and charts: route length, route duration, avg. & max. speed, altitude changes, etc.
7. Setup alerts on desired regions and get alerted when nearby.
8. See the list of supported devices on the website.

Mobile tracking system

Mobile Tracking System 1.51 is a free mobile phone tracker, it allows you tracing a handset’s location via Gps.
1. Tracking a mobile device’s location from a GSM mobile device or GPS receiver.
2. Tracing your current location from a GSM cell phone or GPS receiver.
3. Add or edit a cellid directly from the mobile client.
4. Realtime any user tracking (if allowed by user).
5. Send and receive e-mail messages directly to and from the MTS client.
6. Send and receive MTS chat messages.
7. Send and receive files.

 

Tag :

Hide your IP address

How do you hide your IP address?

The most common method to hide your IP address is to use a proxy server in one form or another. A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server and then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. In some cases, the proxy may alter the client's request or the server's response for various purposes.
There are several implementations of proxy servers that you can use to hide your IP address (in an attempt to remain anonymous on the internet):

VPN Services

A virtual private network (VPN) protects your data and identity over public networks, like the Internet and wireless hotspots. Various protocols are used to create an encrypted tunnel that transports data securely. While a firewall may protect the data on your computer, a VPN will protect your data on the Internet. The goal of a VPN is to implement the same level of security provided by private networks at substantially lower costs. VPN services provide different gateway cities where the IP address assigned to your computer is located. This allows users to access websites only available to users from a certain country. This application is particularly important for travelers who need to access websites from their home country and for people living in regions rife with censorship, like China and Iran.

Website-Based Proxy Servers

A Website-based proxy server is a website that provides a form for you to enter the URL of a website that you wish to anonymously visit. When you submit the form the website proxy server makes a request for the page that you want to visit. The machine usually does not identify itself as a proxy server and does not pass along your IP address in the request for the page. The features of these sites vary (ad blocking, javascript blocking, etc) as does their price. Some are free and some charge. Examples of website proxy services are:

Browser Configured Proxy Servers

There are also stand alone proxy servers that allow for you to configure your browser to route your browser traffic through that machine, which then makes a request for a page on your behalf, and then sends you the results. These are usually used at no cost to the user. Since they are accessible to the public these are often quite slow. Please see instructions for using a proxy server and proxy risks.
There are a variety of types of these proxy servers:
  • Transparent Proxy
    This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy  will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.) This type of proxy server does not hide your IP address.
  • Anonymous Proxy
    This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users. This type of proxy server will hide your IP address.
  • Distorting Proxy
    This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers. This type of proxy server will hide your IP address.
  • High Anonymity Proxy
    This type of proxy server does not identify itself as a proxy server and does not make available the original IP address. This type of proxy server will hide your IP address.

Computer - Number System

               Computer - Number System



When we type some letters or words, the computer translates them in numbers as computers can understand only numbers.
A computer can understand positional number system where there are only a few symbols called digits and these symbols represent different values depending on the position they occupy in the number.
A value of each digit in a number can be determined using
  • The digit
  • The position of the digit in the number
  • The base of the number system (where base is defined as the total number of digits available in the number system).

Decimal Number System

The number system that we use in our day-to-day life is the decimal number system. Decimal number system has base 10 as it uses 10 digits from 0 to 9. In decimal number system, the successive positions to the left of the decimal point represent units, tens, hundreds, thousands and so on.
Each position represents a specific power of the base (10). For example, the decimal number 1234 consists of the digit 4 in the units position, 3 in the tens position, 2 in the hundreds position, and 1 in the thousands position, and its value can be written as
(1x1000)+ (2x100)+ (3x10)+ (4xl)
(1x103)+ (2x102)+ (3x101)+ (4xl00)
1000 + 200 + 30 + 1
1234
As a computer programmer or an IT professional, you should understand the following number systems which are frequently used in computers.
S.N.Number System & Description
1Binary Number System
Base 2. Digits used: 0, 1
2Octal Number System
Base 8. Digits used: 0 to 7
4Hexa Decimal Number System
Base 16. Digits used: 0 to 9, Letters used: A- F

Binary Number System

Characteristics
  • Uses two digits, 0 and 1.
  • Also called base 2 number system
  • Each position in a binary number represents a 0 power of the base (2). Example 20
  • Last position in a binary number represents a x power of the base (2). Example 2x where x represents the last position - 1.

Example

Binary Number: 101012
Calculating Decimal Equivalent:
StepBinary NumberDecimal Number
Step 1101012((1 x 24) + (0 x 23) + (1 x 22) + (0 x 21) + (1 x 20))10
Step 2101012(16 + 0 + 4 + 0 + 1)10
Step 31010122110
Note: 101012 is normally written as 10101.

Octal Number System

Characteristics
  • Uses eight digits, 0,1,2,3,4,5,6,7.
  • Also called base 8 number system
  • Each position in a octal number represents a 0 power of the base (8). Example 80
  • Last position in a octal number represents a x power of the base (8). Example 8x where x represents the last position - 1.

Example

Octal Number: 125708
Calculating Decimal Equivalent:
StepOctal NumberDecimal Number
Step 1125708((1 x 84) + (2 x 83) + (5 x 82) + (7 x 81) + (0 x 80))10
Step 2125708(4096 + 1024 + 320 + 56 + 0)10
Step 3125708549610
Note: 125708 is normally written as 12570.

Hexadecimal Number System

Characteristics
  • Uses 10 digits and 6 letters, 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F.
  • Letters represents numbers starting from 10. A = 10. B = 11, C = 12, D = 13, E = 14, F = 15.
  • Also called base 16 number system
  • Each position in a hexadecimal number represents a 0 power of the base (16). Example 160
  • Last position in a hexadecimal number represents a x power of the base (16). Example 16x where x represents the last position - 1.

Example

Hexadecimal Number: 19FDE16
Calculating Decimal Equivalent:
StepBinary NumberDecimal Number
Step 119FDE16((1 x 164) + (9 x 163) + (F x 162) + (D x 161) + (E x 160))10
Step 219FDE16((1 x 164) + (9 x 163) + (15 x 162) + (13 x 161) + (14 x 160))10
Step 319FDE16(65536+ 36864 + 3840 + 208 + 14)10
Step 419FDE1610646210
Note: 19FDE16 is normally written as 19FDE.

 


Name:
Email Address:
Nationality :


What do you want to Say :


Form provided by Freedback.
Tag :

Popular Post

- Copyright © Electro Magic -Electro Magic- Powered by Blogger - Designed by Masud Pervez Apu .