Wednesday, November 27, 2013

Two (2) New Mobile Devices, hits Nigeria Market.


World’s third largest PC manufacturers, Asustek, last week joined technical forces with Intel corporation to launch two Intel-powered devices comprising the Asus fonepad 7 and the Asus Transformer Book T100, saying the features suited the Nigerian market.
Both tablets are powered by Intel Atom processors, Intel Atom Z2560 and Intel Atom Bay Trail-T Z3740 quad-core processor respectively.

Unveiling the devices, Regional Director of ASUS for Africa, Turkey and Israel, Mr. Shawn Chang, said that “the two devices that we’ve launched today, the Fonepad 7 and the Transformer Book T100, are all run by the latest Intel processors. They are  designed to fit the Nigerian market. From battery life to the performance of their processors, and to their retail prices, everything is right. These are the devices you want to offer to your loved ones as  Christmas gift”

Also Country Manager of Intel West Africa, Mr. Bunmi Ekundare said the partnership between Intel and Asus was a welcome development, adding that “Intel is glad to be able to extend our long collaborative history, including our most recent, the Ultrabook and Intel-based tablets and again, to Asus. Our partnership with this company is recurring and we are pleased with that.”

Ekundayo also saidContinuing, he added that “Intel’s new Atom Z2560 and Intel Atom Bay Trail-T Z3740 quad-core processor not only deliver power, they are also guaranteed to drive the quality of performance and flexibility that accommodates a range of devices and market needs”.  The Asus Fonepad promises to offer the dual value of voice communication of a Smartphone and the entertainment opportunities afforded by a tablet, and comes with the convenience of carrying just one device.

Specification:
GENERAL2G NetworkGSM 850 / 900 / 1800 / 1900
3G NetworkHSDPA 850 / 900 / 1700 / 1900 / 2100
SIMMicro-SIM
Announced2013, September
StatusAvailable. Released 2013, October
BODYDimensions196.8 x 120 x 10.5 mm (7.75 x 4.72 x 0.41 in)
Weight328 g (11.57 oz)
DISPLAYTypeIPS LCD capacitive touchscreen, 16M colors
Size800 x 1280 pixels, 7.0 inches (~216 ppi pixel density)
MultitouchYes
SOUNDAlert typesVibration, MP3 ringtones
LoudspeakerYes
3.5mm jackYes
MEMORYCard slotmicroSD, up to 32 GB
Internal8/16/32 GB storage, 1 GB RAM
DATAGPRSYes
EDGEYes
SpeedHSDPA, 42 Mbps; HSUPA, 5.76 Mbps
WLANWi-Fi 802.11 a/b/g/n, dual band
BluetoothYes, v3.0
USBYes, microUSB v2.0
CAMERAPrimary5 MP, 2592х1944 pixels, autofocus
FeaturesGeo-tagging
VideoYes, 1080p@30fps
SecondaryYes, 1.2 MP, 720p
FEATURESOSAndroid OS, v4.2 (Jelly Bean)
ChipsetIntel Atom Z2560
CPUDual-core 1.6 GHz
GPUPowerVR SGX544MP2
SensorsAccelerometer, proximity, compass
MessagingSMS(threaded view), MMS, Email, Push Mail, IM
BrowserHTML5
RadioNo
GPSYes, with A-GPS support and GLONASS
JavaYes, via Java MIDP emulator
ColorsSapphire black, Diamond white
- SNS integration
- MP3/WAV/WMA/AAC player
- MP4/H.264/H.263 player
- Organizer
- Document editor
- Photo viewer/editor
- Voice memo/dial
- Predictive text input
BATTERYNon-removable Li-Po 3950 mAh battery (15 Wh)
Stand-by(2G) / Up to 840 h (3G)
Talk timeUp to 10 h (multimedia) (2G) / Up to 28 h (3G)


SOURCE: Vanguard

Saturday, September 14, 2013

How To Change Your IP Address In Less Than 1 Minute

The acronym “IP”, in computing terminology, refers to an “Internet Protocol address.” It is number that identifies your computer or network and separates it from all other computers or networks on the Internet. It allows other computers and networks to identify your own connection and initiate communication, which is the basis of how the Internet actually operates. Because of the important job of an IP address, it is equally important that you take steps to protect your own, especially if you own and operate a business. If your IP address is used in the wrong way by a person with malicious intentions, it could potentially cause irreparable harm to your network, your computer or even your business.


How To: Change it:

1. Click on "Start" in the bottom left hand corner of screen

2. Click on "Run" 

3. Type in "command" and hit ok You should now be at an MSDOS prompt screen.

4. Type "ipconfig /release" just like that, and hit "enter"

5. Type "exit" and leave the prompt

6. Right-click on "Network Places" or "My Network Places" on your desktop.

7. Click on "properties" You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.

8. Right click on "Local Area Connection" and click "properties"

9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab 

10. Click on "Use the following IP address" under the "General" tab

11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).

12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.

13. Hit the "Ok" button here 

14. Hit the "Ok" button again You should now be back to the "Local Area Connection" screen.

15. Right-click back on "Local Area Connection" and go to properties again.

16. Go back to the "TCP/IP" settings

17. This time, select "Obtain an IP address automatically" tongue.gif 

18. Hit "Ok" 

19. Hit "Ok" again 

20. You now have a new IP address With a little practice, you
can easily get this process down to 15 seconds.

NB: This only changes your Dynamic IP Address, not your ISP/IP address. If you plan on gaining an unauthorized access on  a website with this trick, then know that you might be caught...

Friday, September 6, 2013

Types of Viruses



The different types of viruses are as follows-

1) Boot Sector Virus :- Boot sector viruses infect either the master boot-record of the hard disk or the floppy drive. The boot-record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.
Examples of boot- sector viruses are: Michelangelo and Stoned.


2) File or Program Viruses:- Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN,.DRV and .SYS .
Some common file viruses are: Sunday, Cascade.


3) Multipartite Viruses:- A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector.

This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated. 

Ghost-ball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.
Other examples are: Invader, Flip, etc.


4) Stealth Viruses:- These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program clean image of the file or boot sector.


5) Polymorphic Viruses:- Polymorphic viruses have the ability to mutate implying that they change the viral code known as the "Signature" each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presence.


6) Macro Viruses:- A macro virus is a computer virus that infects a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless. A macro virus is often spread as an e-mail virus. 
Well-known examples are: Concept Virus and Melissa Worm.

Feel Free to Comment....

ICT TIP>>>>-4 WAYS TO BE ANONYMOUS ONLINE.




Want to be anonymous online to view blocked websites, protect yourself from hackers or want to trace a Culprit?. In the following post i will explain 4 easy ways by which you can stay anonymous online!


1. Using Proxies
A proxy is an address ( IP address) of a Server (proxy server) that is placed between your computer and the Internet The advantage of a proxy is that your real IP address is Hidden so when you hack your given the IP address of the proxy sever and not your real IP address Same way if your a normal Internet user the hacker won't get your real IP but the IP of the proxy server. You can use it to enter site or forum that your IP is banned.


2. Using Tor
Tor-proxy is a free proxy-server service that Internet users can use to hide their IP address while surfing the Web. Tor (The Onion Router) is free software for enabling online anonymity. Tor directs Internet traffic through a free, worldwide volunteer network consisting of more than three thousand relays to conceal a user's location or usage from anyone.


3. SSH Tunneling
SSH tunnel is an encrypted tunnel created through an SSH protocol connection. SSH tunnels may be used to tunnel unencrypted traffic over a network through an encrypted channel. In easy language, you can surf net without being monitored and even surf blocked sites too. 


4. Using VPN
Virtual Private Network. Basically it’s a private network which lets users to connect to other users or remote sites using a public network usually Internet. It uses “virtual” connections routed through the Internet from the company’s private network to the remote site or employee instead of physical connections. In short, it is private network constructed within a public network infrastructure, such as the global Internet. The Biggest difference between proxy and VPN is everything in a VPN is encrypted which gives an additional layer of security. There are some paid And free VPN services.


Feel free to Comment...

Sunday, September 1, 2013

COMPUTER ADDICTS


SHORTCUTS TO ANY PC BROWSER


Following are Some Keyboard Shortcuts That You Can Use on Any Browser.
Managing Tabs

Ctrl+1-8 – Switch to the specified tab, counting from the left.

Ctrl+9 – Switch to the last tab.

Ctrl+Tab – Switch to the next tab – in other words, the tab on the right. (Ctrl+Page Up also works, but not in Internet Explorer.)

Ctrl+Shift+Tab – Switch to the previous tab in other words, the tab on the left. (Ctrl+Page Down also works, but not in Internet Explorer.)

Ctrl+W, Ctrl+F4 – Close the current tab.

Ctrl+Shift+T – Reopen the last closed tab.

Ctrl+T – Open a new tab.

Ctrl+N – Open a new browser window.

Alt+F4 – Close the current window. (Works in all applications.)
Managing Tabs With Mouse
Middle Click a Tab – Close the tab.

Ctrl+Left Click, Middle Click – Open a link in a background tab.

Shift+Left Click – Open a link in a new browser window.

Ctrl+Shift+Left Click – Open a link in a foreground tab.
Navigation
Alt+Left Arrow, Backspace – Back.

Alt+Right Arrow, Shift+Backspace – Forward.

F5 – Reload.

Ctrl+F5 – Reload and skip the cache, re-downloading the entire website

Escape – Stop.

Alt+Home – Open homepage.
Zooming

Ctrl and +, Ctrl+Mousewheel Up – Zoom in.

Ctrl and -, Ctrl+Mousewheel Down — Zoom out.

Ctrl+0 – Default zoom level.

F11 – Full-screen mode.
Scrolling
Space, Page Down – Scroll down a frame.

Shift+Space, Page Up – Scroll up a frame.

Home – Top of page.

End – Bottom of page.

Middle Click – Scroll with the mouse. (Windows only)
Address Bar
Ctrl+L, Alt+D, F6 – Focus the address bar so you can begin typing.

Ctrl+Enter – Prefix www. and append .com to the text in the address bar, and then load the website. For example, type facebook.com into the address bar and press Ctrl+Enter to openwww.facebook.com

Alt+Enter – Open the location in the address bar in a new tab.
Search
Ctrl+K, Ctrl+E – Focus the browser’s built-in search box or focus the address bar if the browser doesn’t have a dedicated search box. (Ctrl+K doesn’t work in IE, Ctrl+E does.)

Alt+Enter – Perform a search from the search box in a new tab.

Ctrl+F, F3 – Open the in-page search box to search on the current page.

Ctrl+G, F3 – Find the next match of the searched text on the page.

Ctrl+Shift+G, Shift+F3 – Find the previous match of the searched text on the page.
History & Bookmarks

Ctrl+H – Open the browsing history.

Ctrl+J – Open the download history.

Ctrl+D – Bookmark the current website.

Ctrl+Shift+Del – Open the Clear Browsing History window.
Other Functions
Ctrl+P – Print the current page.

Ctrl+S – Save the current page to your computer.

Ctrl+O – Open a file from your computer.

Ctrl+U – Open the current page’s source code. (Not in IE.)

F12 – Open Developer Tools. (Requires Firebug extension for Firefox.)

I Hope these Shortcuts will Help you Now and in Future. Stay Connected


5 THINGS YOU SHOULD NEVER POST ON FACEBOOK


Facebook has become the Google of social networks. If you're not updating your status right now, chances are that you are uploading photos or taking some sort of odd quiz. We post tons of intimate details about our lives that we normally wouldn't share with anyone. We think that as long as we make sure our privacy settings are set correctly that we are safe and snug within our circle of friends.

The problem is that we never know who's really looking at our information. Our friend's account could have been hacked when they installed some rogue application, or their creepy uncle might be using their account because they forgot to log out. For the sake of the safety of you and your family, there is some information that you should never post on Facebook. Here are 5 things you should consider removing or not posting to Facebook and/or other social networks.

1. YOU OR YOUR FAMILY'S FULL BIRTH DATES
We all love getting “happy birthdays” from our friends on our Facebook wall. It makes us feel all warm inside knowing that people remembered and cared enough to write us a short note on our special day. The problem is when you list your birthday you are providing identity thieves with one of the 3 or 4 pieces of personal information that is needed to steal your identity. It’s best to not list the date at all, but if you must, at least leave out the year. Your real friends should know this info anyway.

2. YOUR RELATIONSHIP STATUS
Whether you are in a relationship or not, it may be best not to make it public knowledge. Stalkers would love to know that you just became newly single. If you change your status to "single" it gives them the green light they were looking for to resume stalking now that you're back on the market. It also lets them know that you might be home alone since your significant other is no longer around. Your best bet is to just leave this blank on your profile.

3. YOUR CURRENT LOCATION
There are a lot of people who love the location tagging feature on Facebook that allows them to let people know where they are 24/7. The problem is that you have just told everyone that you're on vacation (and not at your house). If you add how long your trip is then thieves know exactly how much time they have to rob you. My advice is not to provide your location at all. You can always upload your vacation pictures when you get home or text your friends to let them know how jealous they should be that you're sipping an umbrella drink while they toil away at work.

4. THE FACT THAT YOU ARE HOME ALONE
It is extremely important that parents make sure their children never put the fact that they are home alone in their status. Again, you wouldn’t walk into a room of strangers and tell them you are going to be all alone at your house so don’t do it on Facebook either.
We may think that only our friends have access to our status, but we really have no idea who is reading it. Your friend may have had their account hacked or someone could be reading over their shoulder at the library. The best rule of thumb is not to put anything in your profile or status that you wouldn’t want a stranger to know. You may have the most stringent privacy settings possible, but if your friend’s account gets compromised than those settings go out the window.

5. PICTURES OF YOUR KIDS TAGGED WITH THEIR NAMES
We love our kids. We would do anything to keep them safe, but most people post hundreds of tagged pictures and videos of their kids to Facebook without even giving it a second thought. We even go so far as to replace our profile pictures with that of our children.
Probably 9 out of 10 parents posted their child’s full name, and exact date and time of birth while they were still in the hospital after delivery. We post pictures of our kids and tag them and their friends, siblings, and other relatives. This kind of information could be used by predators to lure your child. They could use your child’s name and the names of their relatives and friends to build trust and convince them that they are not really a stranger because they know detailed information that allows them to build a rapport with your child.

If you must post pictures of your children then you should at least remove personally identifying information such as their full names and birth dates. Untag them in pictures. Your real friends know their names anyway.
I would be a hypocrite if I said that I have completely removed all tagged pictures of my kids on facebook. It is a daunting task given the amount of pictures that we take as proud parents, but I have started on it and I'll do a little bit each day until it's finished.
Lastly, think twice before you tag pictures of the children of friends and relatives. They might not want you tagging their kids for the reasons mentioned above. You can send them a link to the pictures and they can tag themselves in place of their children if they want to.



7 Things VLC Can Do!!


VLC media player is one of the most popular player for most people.It has got almost all codecs. VLC can do a lot of other things beyond your imagination. Find out how many of these listed below you knew, and how many you did not.

1. Rip DVDs:

VLC includes a basic DVD ripper. You probably would never use it when there are better DVD rippers available, but it helps to know that you can in fact, get a decent quality DVD rip with VLC. To rip a movie follow these steps: Go to the Media menu and choose Convert–>Save. Click on the Disc tab.
Here you can adjust the Starting Position and rip only specific titles or chapters.
Enter file name making sure to end with .MPG, and start ripping.
Click Save.

2. Record Videos:

With the new VLC, you can record videos during playback. The record button is hidden by default. To see it, click on View–>Advanced Control. The record button will now appear. Clicking on the button while playing a movie or video will start recording. Clicking again will stop recording.

3. Play RAR files:

Do you know VLC can play videos zipped inside RAR files? They play like normal video files and you can even use the seek bar. If the RAR file is split into several files, no problem. Just load the first part (.part001.rar ) and it will automatically take the rest of the parts and play the whole file.

4. Play in ASCII Mode:

VLC media player has an amusing ability, to playback movies in ASCII art. To enable ASCII mode, open VLC media player and click on Tools –>Preferences. Open the section “Video” section and under “Output” select “Color ASCII art video output” from the drop down menu. Save it. Now play any video file to enjoy the ASCII art.

5. Listen to Online Radio:

VLC includes hundreds of Shoutcast radio stations. You just need to enable it through Media –>Services Discovery –> Shoutcast radio listings. Now, open the Playlist and browse through the stations.

6. Convert Audio and Video formats:

In VLC you can convert video and audio files from one format to another. Several different formats are supported like MP4, WMV, AVI, OGG, MP3 etc. To access the converter:
* Go to Media –>Convert/Save.
* Load the file you want to convert using the Add button and click Convert.
* Now choose the output format and output file location.

7. Download YouTube and other online videos:

First grab the URL of the YouTube video page. Now click on Media –>Open Network stream. Paste the URL and click Play.
Once VLC starts streaming the video, click Tools –>Codec Information and at the bottom of the window you will see a Location box. Copy the URL and paste it on your browser’s address bar. The browser will now download the file which you can save it to your hard disk. Alternatively, you can record the video.


ShareThis