Monday 25 July 2016

Instagram gives celebrities power to block internet trolls

Taylor Swift
Taylor Swift has been targeted by online bullies CREDIT: AP


Social media attacks on celebrities have been thwarted after Instagram handed Taylor Swift and other high-profile users the special ability to block thousands of internet trolls.

The photo-sharing website, beloved of the American popstar and fellow celebrities including Beyoncé and Kim Kardashian, has granted its most popular users a new tool allowing them to automatically prevent slurs and insults.

The move is a new defence against armies of online bullies, which have forced several high-profile users off Twitter and have been blamed for causing stress and depression.

Read more Telegraph

Friday 8 April 2016

Customizing Android Contacts With Photos

Q. How do I add my own photos to the blank entries on the Android Contacts app?
A. In Android 5.0 and later, open the Contacts on your Android device and tap the entry you want to use. Tap the pencil-shaped Edit icon. Once you are in editing mode, you can change any of the information in the contact file and add a picture.

In the picture area at the top of the contact screen, tap the camera icon in the bottom-right corner. In the Change Photo box, choose Take Photo (to summon the device’s camera and snap a picture right there) or Choose Photo (to pick a picture from the device’s photo library). Tap the checkmark-shaped Save icon when you are satisfied. On some Android devices, you may see a Change button near the photo instead of a camera icon to get you started with picking a new picture for the contact file.

If the contacts you edit on your Android device are synchronized with the contacts in your Google Account, the changes you make on your phone or tablet will also appear on the Contacts screen you use with your Gmail account on the web. Likewise, if you are syncing Google Account contacts with your Android device, you can edit the files and add photos from the Google Contacts screen in your web browser — the contacts will automatically update over your device’s network connection.


Source: New York Times

Thursday 7 April 2016

Ten Simple Steps To Create bootable USB using CMD

create usb bootable
1. open cmd and run as admistrator

2. type "diskpart" inside the cmd and hit enter

3. type " list disk" and hit enter

4. type "select disk 1" and hit enter

5. type "clean" and hit enter

6. type "create partition primary" and hit enter

7. type "select partition 1" and select enter

8. type "format fs=ntfs quick" and hit enter

9. type "active" hit enter

10. type "exit" hit enter to close disk part



congrat your usb is now bootable.

DETAILED STEP BY STEP APPROACH TO PARTITION YOUR HARD DRIVE WITHOUT ANY THIRD PARTY SOFTWARE

JUST FOLLOW THE STEPS AND YOU WILL NEVER MISS.


 1. Click on the start menu and type in the search box “DISK PARTITION”

 2. A window will appear with title “disk management”.

3. Locate which drive you wish to partition

4. Right click on the selected drive you wish to partition and select “SHRINK VOLUME”

5. A menu will pop up showing: “total size before shrink”, size of available shrink”, “enter the amount of space to shrink” and “total size after shrink”

6. Select the “amount of space to shrink” and enter the desired size but it cannot exceed the total size of the disk

7. After entering the desired size, clink on the “SHRINK” tab/button to begin the process

8. You will see among the partitioned drives “UNALLOCATED”. That is the newly created partition

9 Right click on it and select “NEW SIMPLE VOLUME”

10. A “welcome to the new simple volume wizard” will appear. Click on the “NEXT” button

11. A “specify volume size” wizard will follow. Just click on the “NEXT” button

12. A “assign drive letter or path” wizard will follow and still click on the “NEXT” button. Don’t change the letter already assigned.

13. In the “format partition” wizard click on the “NEXT” button again to format the newly partitioned drive. In the “volume label” you can choose to change the name or maintain it. Please don’t uncheck anything in this window. 

14.  A “completing the new simple volume wizard” will appear. Click finish to complete the procedure.


THIS IS TO GIVE YOU A DETAILED STEP BY STEP APPROACH WITHOUT ANY HELP FROM ELSEWHERE.

Apple's copycats are turning into true iPhone competitors

From the very beginning of Android, Apple has been complaining that its Android competitors are ripping off its iPhone designs.

 Whether the culprit is the Samsung Galaxy S, the HTC One A9, or the ZTE Whatever, Apple is all too happy to remind the world that it's the leader and Android device makers are its followers.

Well, things have been changing lately, and today's debut of the Huawei P9 adds momentum to a growing tide of distinctive new phones coming out of China — ones that aren't defined by a religious adherence to photocopying the iPhone. 

The Huawei P9 and the Xiaomi Mi 5 before it are the harbingers of a much more dangerous rival to Apple, a set of Chinese manufacturers capable of crafting their own, attractive, even premium designs.


Read more at MSN

Wednesday 6 April 2016

Toyota and Microsoft team up to connect drivers to the future

Toyota announced on Monday that it’s creating a new company called Toyota Connected to serve as the carmaker’s data science hub as it seeks to connect cars to people’s daily lives. Microsoft Azure will be the cloud computing platform, providing a hybrid solution for everything Toyota Connected creates as it works to make driving more personal, more intuitive and safer.

“We’ve all been talking about big data for a long time, but we are at a unique point in history where the technology is catching up with what we hope to achieve by delivering new services and capabilities into the vehicle,” said Zack Hicks, president and chief executive officer of Toyota Connected.

With the new venture, Toyota and Microsoft envision a world where cars are giant smartphones you ride in, with a virtual assistant that knows the best routes, whom to notify if traffic will make you late for a meeting, what your blood pressure is doing during stop-and-go, and which restaurants at the next exit might be most to your liking.


Read more at Transform

What WhatsApps End-to-end encryption means to you

WhatsApp yesterday announced it has finally rolled out end-to-end encryption to all users globally, making the IM safer to third party access.

The move means a user’s WhatsApp message will not be read by any other person but only be read by the intended recipient. With end-to-end encryption, eavesdroppers, hackers, cyber-criminals and ISPs and government agencies cannot access or read people’s communication.

Jan Koum, in Facebook Post said, “WhatsApp has always prioritized making your data and communication as secure as possible. And today, we’re proud to announce that we’ve completed a technological development that makes WhatsApp a leader in protecting your private communication: full end-to-end encryption. From now on when you and your contacts use the latest version of the app, every call you make, and every message, photo, video, file, and voice message you send, is end-to-end encrypted by default, including group chats.”

Koum added: “when you send a message, the only person who can read it is the person or group chat that you send that message to. No one can see inside that message. Not cybercriminals. Not hackers. Not oppressive regimes. Not even us. End-to-end encryption helps make communication via WhatsApp private – sort of like a face-to-face conversation.”

WhatsApp’s end-to-end encription comes weeks after Apple rejected FBI’s plea to Apple to access one of its customer’s iPhone. Apple rejected the request but FBI said it went further on its own to acess the phone. WhatsApp supported Apple’s move.

WhatsApp has been working on end-to-end encryption for nearly two years and the roll out brings a new era in user data safety which is likely to be taken up by more tech giants against repressive regimes. Encryption will promote safety and security as the world goes digital.

“While we recognize the important work of law enforcement in keeping people safe, efforts to weaken encryption risk exposing people’s information to abuse from cybercriminals, hackers, and rogue states,” Koum said. “While WhatsApp is among the few communication platforms to build full end-to-end encryption that is on by default for everything you do, we expect that it will ultimately represent the future of personal communication.”


Source: TechMoran
}, 10);