COMPUTER GENIUS

Welcome Hackers This is Your Dimension for Freedom.

COMPUTER GENIUS

Welcome Hackers This is Your Dimension for Freedom

COMPUTER GENIUS

Welcome Hackers This is Your Dimension for Freedom

COMPUTER GENIUS

Welcome Hackers This is Your Dimension for Freedom

COMPUTER GENIUS

Welcome Hackers This is Your Dimension for Freedom

Monday 31 March 2014

How To Download YouTube Video Easily In Any Mobile

How To Download YouTube Video Easily In Any Mobile


%SEO friendly image.jpeg How To Download YouTube Video Easily In Any Mobile
YouTube is worlds best video blog nowadays ,if you want to see all the video on YouTube it will take 2,000 years :o . In YouTube you can find any video easily in the world, You can Sign-up and Upload your own video and publish in the YouTube world and you can also earn money from YouTube. But we are here to talk about How To Download YouTube Videos Easily In Any Mobile, There is lot of app in Android and iPhone to download video’s but how to Download in Java and Symbian Mobile’s. Actually download youtube video’s is not a good thing to do but we can download for educational purpose. we can download music from youtube, download video from youtube. you can download youtube videos free of coast but how, here is easy way that works on all types of mobile like Nokia , Samsung, Android ,iPhone etc So Lets find the way How To Download YouTube Videos Easily In Any Mobile

How To Download YouTube Videos Easily In Any Mobile

Follow The Simple Steps
  1. Open YouTube.com
  2. Find any Video You Want To Download In Your Mobile Or Pc.
  3. Open That Video To Watch In your Mobile.
  4. Then Do This Small Change In The Address Bar Link.
  5. Like I Open This Link “https://www.youtube.com/watch?v=IEwJvPpWV9w”
  6. Go To Address Bar And Change The Link, Replace https://www. With SS.
  7. Change it To “ssyoutube.com/watch?v=IEwJvPpWV9w”
  8. Then It Will Redirect To Download Page Like Below Pic %SEO friendly image.jpeg How To Download YouTube Video Easily In Any Mobile
  9. You Can See That You Can Download Video In Any Formate Here HD to Low Quality In Any Formate Like FLV or Mp4 Etc.

Some of WhatsApp Tricks You Never Know

Some of WhatsApp Tricks You Never Know


WhastaApp is the mostly used Instant messaging app Now days for iPhone and Android. This is the most user friendly app that provide all basic need for chat, you can easily share images, audio notes, live recordings, share your current location and even upload small videos. you can set your best status for whatsapp in status to show what you feel now. there is lot of status for whatsapp in status option you can set easily .i recently post so manny whatsApp trick in my blog so Today gonna show you all new and some old trick in one post. there is lot of whatsApp trick in the web so i gonna write all the trick’s in this So Here we go Some of  WhatsApp Tricks You Never Know.

Some of  WhatsApp Tricks You Never Know

#1. Prank your Friends by Changing their Profile Picture

I have found this awesome trick in the web that you can change your friends profile pic’s to make there amazed you can make a dirty or not good looking pic of your friend and show then . and tell then what type of pic you have set in your DP. Actually by doing some files replacement you can change the actual profile pic of you friend pretty easily to any image. %SEO friendly image.jpeg Some of  WhatsApp Tricks You Never Know
  1. Well just search for some nice scary or funny image that you think could easily paralyze your friends on how they actually look. (just search these images on Google Image search).
  2. Now after you have found a nice image just make sure to resize the image to 561 X 561 Pixel dimension as its must.
  3. Now you need to navigate to the following path SD Card > Whatsapp > Profile Pictures.
  4. Now you will see your friends profile pictures with name’s similar to their phone numbers with prefix attached to it.
  5. Now just rename your new image to that same file name and then replace the old image with the one.
  6. Well for iOS device use iFunBox to do this same trick and on android you can use a nice file manager to achieve this effect.
Now simply restart your device and your new profile pic will be rocking, now simply show and ask your friend what kind of profile picture they have uploaded it looks ugly, they will be amazed :p

#2. Hide Last Seen Time from your WhatsApp Profile

Don’t like to display that last seen time to the another person, just want to stay hidden, well earlier it was not possible and we use to use some 3rd party apps, well now it can done officially.
  1. Open WhatsApp application on your device.
  2. Navigate to Settings > Chat Settings > Advanced > Last Seen Timestamp.
  3. It will be one just disable it and that’s it now no one can see your last seen timestamp. So its officially disabled.
Or Check This post

#  How To Hide WhatsApp Last Seen


#3. Getting back Deleted Messages on Whatsapp !

Deleted few conversations mistakenly, wanted to get all those conversation back as it means you a lot, well you might not be aware about the automated Whatsapp backup that it creates everyday @ 4PM which is actually store in the SD Card of your Android Device, well we are going to see how you can easily restore that database.
  1. Navigate to the Whatsapp Database folder, SD Card > Whatsapp > Databases.
  2. In the database folder you will see some files something like msgstore-2014-01-04.1.db.crypt. So as you can see these files even contain the date on which its created + you will also see a file msgstore.db.crypt, well this is the main file.
  3. So now just rename this file msgstore.db.crypt to

    something like backup-msgstore.db.crypt.
  4. Now after you have successfully renamed your file, just change the another file that contains the appropriate date like choose the one that’s latest or the one you think that might contain your chat conversation.
  5. So now rename that file to msgstore.db.crypt and then the last step is to navigate to Setting > Applications > manage applications > Whatsapp, and click on Clear Data option to remove all the data.
  6. That’s it now your msgstore.db.crypt will be restored and obviously that the file that contains your chat conversation.
  7. So now as soon as you open your WhatsApp again it will ask you to restore from the Backup.
  8. Just press Restore option and everything will be restores pretty easily.
So guys this was the easiest but little but lengthy way to restore your deleted conversation on WhatsApp. So now do no worry in case you have to delete those conversation you know where and how to restore then later %SEO friendly image.jpeg Some of  WhatsApp Tricks You Never Know

How to View WhatsApp Messages Backup File Online !

%SEO friendly image.jpeg Some of  WhatsApp Tricks You Never Know
Well thinking if there is any easy way by not restoring your file onto the whatsapp messenger but still wanna have a look on what conversation you had, well there is awesome online service called “RecoverMesages.com” that allows you to upload your .crypt file that you got from your SD Card online and view your messages easily, well just visit the above mentioned website , upload your date and hit SCAN. 

#4. Hide One Image into Another for Nice Prank :p

Well you might have faced this thing but you might ignored as you thought it could not be possible, but yes you can easily fake any image by just simply using original image as your masked image and using another image as your fake image.
Well we will be using the Magiapp for Android that will allow you to hold two images one your True Image and the other one will be your Fake image that will shown when someone clicks on your original image.
  1. Download & Install Magiapp for android.
  2. Now after installing this wonderful app just fire it up and then you will see interface something lie in the image on the right.
  3. Now just click on the True Image option and choose your original image and then click on the Fake Image option and choose your pranky image.
  4. Now after selecting your images just press Do Magic ! option and voila! its done now just share your image with everyone.

#5. Hacking your Friends WhatsApp Conversation %SEO friendly image.jpeg Some of  WhatsApp Tricks You Never Know

Well now the same trick mentioned in the first step can be used in order to hack your friends WhatsApp conversation. You can easily snatch the .crypt files from your friends SD Card and then view them online using the RecoverMessages website.
  1. Just try to explore the friends SD Card and navigate to SD Card > Whatsapp > Database folder.
  2. Here you will two files -msgstore-yyyy..dd..db.crypt which will exactly contain date and year when the backup was created.
  3. Simply copy this files to your computer and then upload this file to “RecoverMesages.com” to view them online.
That’s it now you have easily hacked your friends Whatsapp Database, now you can view all the conversation and even ask him about his or her crush ;p, so guys this how hacking Whatsapp conversation works, so enjoy.

#6. Password Lock your WhatsApp Application

Are you really serious about the security and privacy for your Whatsapp conversation, well now just add a nice password on your Whatsapp application, so that no one else except you can open your Whatsapp account.
  1. Download & Install WhatsApp Lock for Android.
  2. It’s a simple application that allows you to add a four digit lock passcode to your Whatsapp application.
  3. Now after installing the application it will ask you to store a four digit passcode, just do that.
  4. It even contains an Auto Locking feature that will lock your Whatsapp automatically after sometime.
The best thing about this application is that if someone enters wrong passcode few times then if your phone contains the front camera then it will capture the image of the intruder and store it safely.

How to recover reduced memory storage capacity of storage devices

How to recover reduced memory storage capacity of storage devices

On last Friday, I was transferring my data from my Acer notebook to my Compaq desktop. I transferred all of my data to my desktop except a 2 GB folder full of important data. I had connected my pen drive with my notebook, right clicked on the 2 GB folder, clicked on send to &  an error window prompt that my pen drive is full, i was like What ???
Because, my pen drive was of 8 GB & was completely empty. Then, I opened drives index & got surprised that storage capacity of my 8 GB hp pen drive was reduced to 286 MB, then I formatted it 5 times but nothing worked, I Googled about this issue, there was a forum from where I got my solution, Active@ KillDisk a powerful and compact software that allows you to destroy all data on hard disks, USB drives and floppy disks completely, excluding any possibility of future recovery of deleted files and folders. It’s a hard drive and partition eraser utility, which uses low level format technique.
I downloaded it from its official website, it is a free utility with upgrade option to some more features, but free one was enough to save my money from buying new pen drive. I installed this utility & formatted my pen drive with this utility & magic ! The storage capacity of my USB pen drive was back to 8 GB. You can recover storage space of almost any memory storage device using this software including memory cards, hard disk.

Lesson learned from this incident that, You Should unmount your  portable storage devices before removing it  from your computer.
Download Active@ KillDisk

How To Use IDM Free For Lifetime

How To Use IDM Free For Lifetime

IDM is extremely helpful software for all net users. it’s smart however not free. you’ll get thirty days trial in beginning, after that we have purchase it’s licence . therefore this post  is for people who don’t want to pay any bucks. when reading and following this post you’ll be able to simply come back to grasp the way to use IDM at no cost. Here are some steps given below simply browse and follow them rigorously..

How To Use IDM Free For Lifetime

  1. Download And install latest version of IDM
  2. Download IDM Here
  3. Now search for Notepad and Right Click > Run As Administrator.
  4. In file menu, Click Open. In the dialog, Navigate to Windows Drive(Mine is C:)> Windows> System32> drivers> etc and open the file named hosts.
  5. Now paste the following lines in it
    127.0.0.1 tonec.com
    127.0.0.1 www.tonec.com
    127.0.0.1 registeridm.com
    127.0.0.1 www.registeridm.com
    127.0.0.1 secure.registeridm.com
    127.0.0.1 internetdownloadmanager.com
    127.0.0.1 www.internetdownloadmanager.com
    127.0.0.1 secure.internetdownloadmanager.com
    127.0.0.1 mirror.internetdownloadmanager.com
    127.0.0.1 mirror2.internetdownloadmanager.com
  6. save the file and close it.
  7. Now go to tray icon of idm in tray and click it, and it`s windows open up like this. Now go to Registration Menu and click Registration. Now use any of the keys given below:
    RLDGN-OV9WU-5W589-6VZH1
    HUDWE-UO689-6D27B-YM28M
    UK3DV-E0MNW-MLQYX-GENA1
    398ND-QNAGY-CMMZU-ZPI39
    GZLJY-X50S3-0S20D-NFRF9
    W3J5U-8U66N-D0B9M-54SLM
    EC0Q6-QN7UH-5S3JB-YZMEK
    UVQW0-X54FE-QW35Q-SNZF5
    FJJTJ-J0FLF-QCVBK-A287M
  8. Click OK and you are done! IDM is registered now.

What Is VPN And How It Works

What Is VPN And How It Works


VPN stands for virtual private network, the private network (not for public access) that uses a non-personal medium (eg, the Internet) to connect between remote-site safely. The application of certain technologies in order to even use a common medium, but traffic (traffic) between the remote site can not be intercepted easily, nor allow others to smuggle undue traffic to the remote site.


According to the IETF, the Internet Engineering Task Force, a VPN is an emulation of [a] private Wide Area Network (WAN) IP using shared or public facilities, such as the Internet or private IP backbones.VPN is a form of public private network via the internet ( internet), with emphasis on data security and global access via the internet. This relationship is built through a tunnel (tunnel) between 2 virtual nodes.

is a private network (usually for a particular agency or group) in the Internet network (public), which is a private network as if they were accessing its local network but using public networks

VPN is a virtual connection that is private why are so called because in essence this network does not exist physically only a virtual network and why it is called private because this network is a network of private nature that not everyone can access it. VPN Connecting the PC to the public network or internet but its nature private, because it is private so not everyone can be connected to the network and access it. It is therefore necessary data security
VPN working concept basically requires a VPN server that berfungsing as a liaison between PCs. If pictured something like this
Internet <-> VPN Server <-> VPN Client <-> Client
when used to connect 2 computers with a private network such as the internet then this: A Computer <-> VPN clinet <-> Internet <-> VPN Server <-> VPN Client <-> Computer B
So all connections are set by the VPN Server VPN Server so it needs adequate skills so connections can be smoothly.

then what the hell do this VPN?? first of all VPN Server must be configured first and then in the VPN client program must be installed only after that can be connected. VPN on the client side will be making some sort of virtual connections so it will appear sort of VPN network adapter adater network (Lan card) but virtual. The task of VPN Client is doing authentication and encryption / decryption.
Well once connected then later when the client accessing the data tell a client wants to open the site http://www.google.com. This request before it is sent to the VPN server is encrypted by the first instance encrypted VPN Client with a formula that will contain the data request codes. After arriving to the VPN server by the server to decrypt this data in the formula A, having previously been configured between the server and the client, the server will have the same algorith to read an encryption. Vice versa, from server to client

Thus, the concept of security with VPN network offers security and untraceable, can not be detected so that our IP is not used is known as Public IP belongs to VPN servers. With no encryption and decryption of the data through the internet network is not accessible by others even by another client connected to the same VPN server though. Because the key to unlock the encryption is only known by the VPN server and client are connected. Encryption and decryption can cause data to be modified and read so keamananya guaranteed. To break down the data pirate decryption process data must pass the course to find the right formula takes a very long time so it is common to use super computing to break down and of course not everyone has a PC with this super abilities and the process is complicated and takes a long time, the agents FBI or CIA usually have this kind of computer to read confidential data that is sent through the VPN.

Is using a VPN connection is faster????? It depends on the connection between the client and the VPN server for the data processing is done on the VPN automatically all the data is entered into our computer from the Internet will go first to the VPN server so that when a client connection to a VPN server connection is good then it will also be much faster. Usually what happens is a slight decrease in speed is slower because it must first pass through 2 pathways including the encryption process. The VPN connection can be used to accelerate external (international) how???
for example, we have a local connection (IIX) equal 384kbps 1mbps and external connections use VPN so that we could be the same as the international connection local connection 1mbps. Ways to use VPN to VPN routed Local Affairs

Internet <-> VPN Affairs <-> VPN local <-> Client

why this network model can be faster because access to the outside network by external VPN and then forwarded by the local VPN nah we access to the local network, which means the access speed of 1mbps. Certainly needed a VPN with a large bandwidth so that connections can be smoothly.

Well why the HSDPA connection macem Telkomsel and Indosat get faster??? Operators to limit the bandwidth of the internet we say IM2 with 256kbps package if we use 3G and HSDPA networks sebenarny then we have a bandwidth of 384 kbps and 3.6 Mbps for HSDPA but only use 256kbps because the operator is restricted to the VPN server limitation can be broken ways will be discussed further.

Is able to make the Internet free and non-quota??? answer can be used as long as the gap is unknown operator. How to do this is to use a VPN to access a particular port server. Operators typically use a specific port for billing calculations and total unused data which can be exploited this loophole. For example there are certain ports that can be used to connect to the VPN server can be used free internet and free qouta. Why is that??? Port is not used for the calculation of billing so we did not pass well to the billing server port, then we can connect to the VPN server over the network internet.kita connect to the internet but do not pass through our automatic billing server not be charged and count calculated if the data does not count for very little pinging the server. By connecting to the VPN server then all access will be performed by the VPN server and transmitted through an open port earlier so that we could freely access the intenet. Such technique less there may be other techniques due to VPN has many advantages

Another advantage of a VPN is access anywhere. We have access to a computer at home through a VPN network for Internet-connected computer at home and we have Internet access required only for  VPN Client software configuration and authentication process. That way we can access the internet safely and undetected



Then How VPN works.?


Let's use an example to explain how the VPN works. Virtual Entity Networks Inc.. (VEN Inc.) Has two branches, London and Sydney. If the Australian branch in Sydney decided to contract the dealer, then the London office had to know right away. The main part of the IT infrastructure is provided in London. In Sydney there are twenty people whose jobs depend on the availability of data hosted on Server London.



Both locations are equipped with a permanent internet lines. Internet is a gateway router is set up to provide Internet access to staff it. Successor is set to protect the local network location from unauthorized access from the side, which is the "evil" internet. Successor as it provides for blocking specific traffic can be called a firewall and must be found within the individual branches are thought to take part in the VPN.

VPN software must be installed on the firewall or a server or appliance that is protected by it. Many firewalls modern equipment from manufacturers such as Cisco or Bintec include these features, and no VPN software for all hardware and software platforms.

In the next step, the VPN software must be set up to establish a connection to the VPN server instance lainnyasebagai London must accept connections from Sydney server, and the server must connect Sydney to London or vice versa. If this step is successfully completed, the company has a Virtual Network. Both branches are connected to the internet and can work together as in a real network. Here, we have a VPN without any privacy, because many internet roter between London and Sydney can read data exchange. A competitor who gained control of the internet on a roter can read all relevant business data network that actually was. So how do we create a Virtual Private Network? The solution is encryption. VPN path between two branches locked with a special key, and only the person or computer that has the key that can open and look at the data sender.



All data sent from Sydney to London or from London to Sydney should be encrypted before transmission and decrypted after. Encryption protects data in such connection from the walls of a train tunnel to protect the mountain around it. This explains why it is often known as a VPN tunnel (tunnel) or VPN tunneling, and tunneling technology is often referred to-even if no other Kwantum mechanics involved.

Proper encryption methods and provide the key to all partitions involving one of the main differentiating factor between different VPN solutions. A VPN connection is normally established between two routers internet access that comes with a firewall and VPN software. The software must be set up to connect to the VPN partner, the firewall must be set up to be able to access and exchange data between the VPN partner with encryption. Encryption keys must be presented for all VPN partner, so that exchanged data can only be read by authorized VPN partner.

How To Check Your Website Value

How To Check Your Website Value


if you have a blog, then you can calculate the price of your blog by using a web that provides services to calculate the price of your blog / website. To see prices blog, simply visit the website and enter your blog URL will then be calculated automatically. Here's the trick to finding out if the sale price of your blog:
1. Through the web site value calculator
     http://www.sitevaluecalculator.com/

2. Through your website value website
     http://www.yourwebsitevalue.com/

3. Information via the website biz
     http://bizinformation.org/

Of the three sites above assessment on the same blog, might make you confused because there is no clarity about the formula used to calculate the price of a blog. While the variables used to calculate the price of a blog is page rank (Google pagerank), Alexa (traffic), link popularity.

how hackers attack your cpanel


how hackers attack your cpanel

let me show you that methodology hacker... uses for getting supply as out to the config files of your respective web-site as an example wp-config. php and that i can show you ways to minimize this. 

) he login to cpanel currently being a normal user http ://ip-address/cpanel then jenis login and password to login 
2 ) then he open file manager ( show hidden files dotfiles ) after which creates new. htaccess file with following supply : 
#. htaccess file supply 
choices indexes followsymlinks 
directoryindex doesnt-metter. htm 
addtype txt. php 
addhandler txt. php 
#end of. htaccess file 
3 ) then he creates symbalic link ( soft link ) with perl scripts or barely uses cron job to make symbalic link of top level directory / typing : ln -s / topdir 
4 ) after that, he open browser and typing http ://server-ip/~his-home-dir/topdi... /wp-config. php after which barely looking supply as out to the page, all data present currently being a txt( text ) data. thats all. user has actually been hacked. 
------------------------------------------------------------------------------------------------------- 
answer : 
) open your php. conf along with your favorite ubahor : nano /usr/local/apache/conf/php. conf 
2 ) commit : #addtype application/x-httpd-php5. php5. php4. php. php3. php2. phtml 
3 ) add these lines : 
filesmatch. ph( p2-6 ?|tml )$ # this add up to :. php, . php2, . php3, . php4, . php5, . php6. phtml 
sethandler application/x-httpd-php5 
/filesmatch 
4 ) save your changes and shut php. conf 
5 ) restart httpd server typing : /etc/init. d/httpd restart 
6 ) done

how to disable symlink in cpanel

how to disable symlink in cpanel


open this file via putty or terminal 

/usr/local/apache/conf/httpd.conf

paste this code and save it


<Directory "/">
    Options -ExecCGI -FollowSymLinks Includes IncludesNOEXEC Indexes -MultiViews SymLinksIfOwnerMatch
    AllowOverride All
</Directory>

<Directory "/usr/local/apache/htdocs">
    Options IncludesNOEXEC Indexes -FollowSymLinks +SymLinksIfOwnerMatch -ExecCGI
    AllowOverride None
    Order allow,deny
    Allow from all

</Directory>


<Directory "/home">
    Options All -ExecCGI -FollowSymLinks -Includes -IncludesNOEXEC -MultiViews +SymLinksIfOwnerMatch
    AllowOverride AuthConfig Indexes Limit Fileinfo
</Directory>

<Directory "/home2">
    Options All -ExecCGI -FollowSymLinks -Includes -IncludesNOEXEC -MultiViews +SymLinksIfOwnerMatch
    AllowOverride AuthConfig Indexes Limit Fileinfo
</Directory>

How do I overburn a CD with Nero

How do I overburn a CD with Nero

How do I overburn a CD with Nero?

 Start Nero

From the action-bar select File and select Preferences.



In the Preferences window, select Expert Features(1) and check the Enable overburn disc-at-once(2).



Choose a Maximum CD Length(3) and click OK(4) (*82:59:59 is the maximum value I suggest, but as you can see from the screen capture above I have set mine significantly higher. The reason is because I frequently use 99min 850 MB CD media).

For a more accurate test you can use a nero tool called nero speed test to see how much a specific CD is capable of being overburned . get it here

From the action-bar select File and select Write CD.



A window will appear when you have exceeded expected length, click OK to start the overburn copy.

Remember to set disk to burn Disc at Once, you cannot overburn in Track at Once Mode.

How to modify .exe files

How to modify .exe files

learn how to change *.exe files, in 5 easy steps:

1) Don't try to modify a prog by editing his source in a dissasembler.Why?
Cause that's for programmers and assembly experts only.

try to view it in hex you'll only get tons of crap you don't understand.
First off, you need Resource Hacker(last version). It's a resource editor-
very easy to use, You can download it at h**p://www.users.on.net/johnson/resourcehacker/

2) Unzip the archive, and run ResHacker.exe. You can check out the help file too


3) You will see that the interface is simple and clean. Go to the menu FileOpen or press Ctrl+O to open a file. Browse your way to the file you would like to edit. You can edit *.exe, *.dll, *.ocx, *.scr and *.cpl files, but this tutorial is to teach you how to edit *.exe files, so open one.

4) In the left side of the screen a list of sections will appear.
The most common sections are
-String table;
-RCData;
-Dialog;
-Cursor group;
-Bitmap;
-WAV.
*Icon: You can wiew and change the icon(s) of the program by double-clicking the icon section,chossing the icon, right-clicking on it an pressing "replace resource". After that you can choose the icon you want to replace the original with.
*String table: a bunch of crap, useful sometimes, basic programming knowladge needed.
*RCData: Here the real hacking begins. Modify window titles, buttons, text, and lots more!
*Dialog:Here you can modify the messages or dialogs that appear in a program. Don't forget to press "Compile" when you're done!
*Cursor group: Change the mouse cursors used in the program just like you would change the icon.
*Bitmap: View or change images in the programs easy!
*WAV:Change the sounds in the prog. with your own.


5) In the RCData,Dialog,Menu and String table sections you can do a lot of changes. You can modify or translate the text change links, change buttons, etc.


TIP: To change a window title, search for something like: CAPTION "edit this".
TIP: After all operations press the "Compile Script" button, and when you're done editing save, your work @ FileSave(Save as).
TIP: When you save a file,the original file will be backed up by default and renamed to Name_original and the saved file will have the normal name of the changed prog.
TIP: Sometimes you may get a message like: "This program has a non-standard resource layout... it has probably been compressed with an .EXE compressor." That means that Resource Hacker can't modify it because of it's structure.

7 Things Not Owned iPhone 5

7 Things Not Owned iPhone 5


Present as an Apple's most advanced smartphone, the iPhone 5 does seem to have it all. He has specifications, performance, and also the best features.

However, no product is absolutely perfect in this world, as well as the iPhone 5. There are still some things that can not be done by a device that reportedly will soon get the next generation.

Here are 7 important functions that are not owned by the iPhone 5, as quoted by Business Insider.

1. Yet equipped with NFC

Smartphones that are circulating these days, be it a middle class to upper class, most are equipped with NFC. Unfortunately, up to the 6th generation, Apple still has not embed these components.

NFC is actually the development of card technology Radio Frequency Identification (RFID). By using NFC, the user can perform payment activities simply by attaching the phone to a reader.

Apple itself is already "replace" NFC with Passbook system which became available in iOS 6. Through these features, users can store tickets, gift cards (gift cards), boarding passes, and much more.

This feature can also run some (not all) of the NFC. For example, users can not use the NFC to wirelessly send money to other people's PayPal account.

With the proliferation of stores that support NFC, Apple has had to apply these components to the new device.

2. Typing is more comfortable

Typing on the touchscreen is never as comfortable as typing on a physical keyboard. Developers are trying hard to develop applications that make typing typing comfort level has increased.

One application that has managed to accommodate the matter is Swype. Unfortunately, this app is only available in Android only.

Instead of having to type in letter by letter, the application user can drag (move finger without lifting your finger from the screen) to make the word.

In fact, Apple gave auto-text/autocorrect function that is able to predict what word typed by the user wants. However, often resulting word is not right. Of course it makes users more sluggish and reduce the level of comfort in typing.

3. Support for SD cards

Almost all Android based phones on the market these days are backed by a microSD port. Given these ports, users can expand the storage capacity of their devices.

On average, the device supports microSD cards up to 64GB.

4. Capacity seems inadequate

By the way the problem of storage media, the capacity provided by Apple for its iPhone devices is between 8, 16, 32, and 64GB.

Currently, the most widely circulated in 16 and 32GB capacities.

Users themselves many have complained that the lack of storage capacity.

Perhaps, for the future, Apple can deliver a device with a larger internal capacity, as they once present in the iPod Classic. At that time, it has the largest capacity is 160GB.

5. Standard USB cable

Whether intentional or not, Apple is trying to be different for the affairs of the USB cable. Apple does not use a standard USB cable for charging and also the problem of data transfer.

In fact, smartphones on the market today use an average of the same micro USB cable.

6. Watching videos on the other display

Most smartphones on the current class already has a micro-HDMI port. Through these ports, users can move the phone screen to other screens, such as TV.

Unfortunately, Apple does not provide the port to the iPhone. Users have to pay an extra few hundred thousand dollars to buy a special adapter, if you want to do that.

7. The battery can be removed

IPhone 5 battery life is increased compared to the iPhone 4S. Users can call for 8 hours on 3G networks, 8 hours of surfing the internet, watching 10 hours of video, and 40 hours of music listening.

However, what if the battery is damaged? Users should go to the after-sales service to replace the battery. Unibody design that is owned by the iPhone does not allow the user to replace the battery yourself.

How To Use .Htaccess

How To Use .Htaccess


Htaccess is a configuration file provided by the Apache web server, which is usually used to change the default settings of Apache. We know that the majority of web hosting on the internet using Apache as the server so that the web administrators / webmasters have to learn a little more about. Htaccess so that we can change the default settings of the server. Files. Htaccess is a simple ASCII text file which is usually located in the root directory. Is required to file in ASCII format instead of binary and to file permissions (file attributes) on the hosting server should be set to 644 (rw-rr). It is intended that the server can access the file. Htaccess, but prevents the user to access the file. Htaccess from their browser. Files. Htaccess is placed in the root directory can be used to change the configuration of the subdirectories in it, so in one website we usually sufficient to have 1 file. Htaccess are placed in the root directory.

Command code in the .Htaccess should be placed in a row, so when we create .Htaccess by using a text editor like notepad then we have to disable word wrap function (line cut) first.


.Htaccess can be used to :

1. Custom Http Error 
Error message on a website is very important because it can help the visitors to find out what was going on. With htaccess we can turn the page on a server error, by defining our own liking. An example is the transfer of messages according to their function as follows:

ErrorDocument 400 /errors/400.html 
ErrorDocument 401 /errors/401.html 
ErrorDocument 403 /errors/403.html 
ErrorDocument 404 /errors/404.html 
ErrorDocument 500 /errors/500.html


2. Override Ssl Setting


By default, only the web pages that have the extension. Shtml that can run server-side includes SSI on the server. By using the. Htaccess we can change the default setting so that SSI can work with HTML format.
To change these settings, we can add the following code in the file. Htaccess

AddType text/html .html 
AddHandler server-parsed .html

If we want a page with extension. Html and. Htm to be able to run SSI, then the file. Htaccess you can add the following code

AddType text/html .html 
AddHandler server-parsed .html
AddHandler server-parsed .htm

3. Change Default HomePage

It means that . htaccess can be used to change the default name of the web page. So that users can access our website only with domain name only (http://www.Your-web.com) without having to write clearly filename (http:Your-web.com/file.html), we must have index file in the root directories. Acceptable file names such as index.html, index.htm, index.cgi, index.php etc.. Make sure that the file named index. *

There are levels in the naming. If we had index.cgi index.html in the root directory and the server will display index.cgi since. Cgi has a higher level than. Html
With. Htaccess, we can define an additional index file or can also change the order of precedence. To define mainpage.html as index pages, we can add the following code to the file. Htaccess

DirectoryIndex mainpage.html


4. Block User From IP Address

order deny,allow
deny from 123.456.789.000 
deny from 456.78.90.
deny from .facebook.com
allow from all 


5. Rewriting Urls

RewriteEngine On 
RewriteBase / RewriteCond %{REQUEST_FILENAME} !-f 
RewriteCond %{REQUEST_FILENAME} !-d 
RewriteRule . /index.php [L] 

6. Cache Control

# 480 weeks Header set Cache-Control "max-age=290304000, public" 
# 2 DAYS Header set Cache-Control "max-age=172800, public, must-revalidate"
# 2 HOURS Header set Cache-Control "max-age=7200, must-revalidate"

How To Message All Your Facebook Friends in Single Click

How To Message All Your Facebook Friends in Single Click

Hey friends are you worried about sending messages to all your facebook friends one by one during special days such as christmas , new year? Don t worry mate we are here to give you a trick which really works. Tested many times on our profiles. So dont forget to give a try on it. By this method you will me able to send messages to all your friends in a simple ways. No need of messaging them one by one.
Trick-To-Message-Friends-in-a-click

Message all your friends in a single click:

For google chrome:

  • First login to your account 
  • Press F12 and you will get a window at the bottom. 
  • Go to console and paste the codes given here. 

For Mozila Firefox

  • First login to your account 
  • Press Ctrl+Shift+K . Now the console tab will be opened. 
  • Paste the codes and give enter. 

Explanation Images:

Codes:



After giving enter you will have to wait based on your friends list. Dont panic or think its error. After successful posting you will get a confirmation and you will have to refresh the window.

Enjoy friends. Please inform us through comments if you have any trouble.