scroll post

Blogger Tips and TricksLatest Tips And TricksBlogger Tricks

4 Key Skills That Will Get You Hired!

Freshers who understand what recruiters want and prepare themselves for the job market, have an edge

IT and ITeS companies are no longer mass hirers of technical talent but refined recruiters who are looking for a combination of skills. Thus the best jobs will go to freshers who understand what the industry wants and work on getting there.

So how do you stand out against the few lakhs who are vying for the same job?
Some key influencers who device hiring strategies. A few excerpts:

Fix Common Problems with your Computer!.....

1. MONITOR LED IS BLINKING
Check all the connections like Monitor Cable, Data cables,RAM, Display Card , CPU connections.

2. CONTINUOS THREE BEEPS
Problem in RAM Connection.

Microsoft extends security support for Windows XP

Despite so many warnings from Microsoft and Cyber Security Experts, Windows XP is still being used by a number of Government organizations, Financial institutions as well as big Corporations all around the world.

SEA gather evidence that Microsoft selling your information to FBI

A document recently leaked by Syrian Electronic Army shows that Microsoft is charging FBI secret division to legally view customer information.  The documents are said to have been taken from Microsoft.

Syrian Electronic Army(SEA) is known for hacking social media accounts and websites of top organizations including Microsoft, CNN, Daily dot and more.

8 UNKNOWN FACTS ABOUT ANDROID

Well today we gonna learn 8 Unknown Facts About Android OS. Yes you heard right “Unknown and Unusual Facts about Android”. One of the most popular, gazing, and stunning (I cannot say elegant) Smart-Phones Operating System. I really don’t need to define it. You’ll really wonder about facts

1. Android wasn’t Google’s Idea

Dropped your phone in water? - Here's what to do next......

Accidents happen with phones and water but it doesn't always mean that all hope is lost. Below is a brief guide as to what you should do if your phone has been totally immersed in water.

1. Take the phone out of the water as quickly as possible.


2. Do not attempt to switch it on as this may cause further damage.

3. Remove the battery as quickly as you can, also remove the memory and sim cards.

The Birth and history of C Programming Language

The C language shook the computer world. Its impact should not be underestimated, because it fundamentally changed the way programming was approached and thought about. The creation of C was a direct result of the need for a structured, efficient, high level language that could replace assembly code when creating systems programs.

Facebook launches election tracker app for India

Way2Computerworld: In a bid to gear up for the general election, social media network Facebook India has launched a tracker for the upcoming polls. The 'India Election Tracker' is a new dashboard that will track mentions of candidates and parties throughout the election period.

Bitcoin- A brief intro......!!

What is BitCoin?

Bitcoin is a new currency that was created in 2009 by an unknown person using the alias Satoshi Nakamoto. Transactions are made with no middle men – meaning, no banks! There are no transaction fees and no need to give your real name. More merchants are beginning to accept them: You can buy webhosting services, pizza or even manicures.

Nokia announces Android running Nokia X and Nokia X+

Nokia announced its first Android-app running smartphones - the Nokia X and Nokia X+. The phones pack a 4" LCD display and come with Nokia and Microsoft app preloaded.

The Nokia X, X+ and XL are powered by a 1GHz dual-core Qualcomm Snapdragon 8225 chipset with 512MB of RAM and 4GB of internal storage. Happily, it's expandable via the microSD card slot and supports up to 32GB cards.

15 interview questions banned by Google

Google has been known to be among those companies that have an exhaustive process of interviewing, but this is a class apart. All of us may have often wondered what did the questions we were asked in a job interview had to do with our suitability to the role we were being interviewed for.

Add Facebook Invite Friends Button To Blogger


What is the Invite Friends button?


You typically see this sort of button on Facebook Pages only. Page administrators can invite their friends to like their page. Other people who visit the page, and have liked it can also invite their friends. This helps with generating a new audience for your Facebook page, and hence your website or blog.

How to recover scratched CD’s

Tips to recover scratched CD’s:

1. Spread a cloth on a flat surface and place the CD on it.

How to Play YouTube Playlist in VLC Media Player?

Hello Readers, Do you know that VLC Media Player, the world’s favorite video player that supports nearly every video format, can also play YouTube videos on your desktop without requiring the web browser or the Adobe Flash player.

Linux Basics: How to Compile & Execute C Programs

It's Time to Learn Linux Friends you know what, after April 8, 2014, technical assistance for Windows XP will no longer be available, including automatic updates that help protect your PC.

How to remove last name from facebook account?

Some people want to show only the Single name on their Facebook profiles so here I am with a trick to do this by using Firefox

Follow the steps given bellow:

Login to your facebook account

How to create a Nameless Facebook page?

Follow the steps to create a nameless page on facebook

Steps:

Login to Facebook and Create a Page. (from options upper right).

TIOBE Programming Community index Jan 2014

The TIOBE Programming Community index is an indicator of the popularity of programming languages. The index is updated once a month. The ratings are based on the number of skilled engineers world-wide, courses and third party vendors. Popular search engines such as Google, Bing, Yahoo!, Wikipedia, Amazon, YouTube and Baidu are used to calculate the ratings. Observe that the TIOBE index is not about the best programming language or the language in which most lines of code have been written.

Hack Facebook Account by Phishing Method

Facebook is one of the best social networking website. All of you want to hack your friend's facebook account to know what they are doing. Even I have posted many advanced methods some of my viewers are asking for phishing method. So This post is for all of you who were asking me how to hack a facebook account by phishing method.

New Facebook Hack: Cookie Stealing And Session Hijacking

What is Session Hijacking?Session Hijacking is Stealing the existing active Session. The main purpose of Session Hijacking is to bypass authentication process and gain unauthorized access to the computer or Website.

Session Hijacking- A Hackers way to Hack!

What is Session Hijacking?
Session Hijacking is Stealing the existing active Session. The main purpose of Session Hijacking is to bypass authentication process and gain unauthorized access to the computer or Website. In simple words , hackers will login as some other client using their Sessions.

Hack the Hacker!

Hello friends, today i am going to teach you how to see the hackers illegal phish pages password file using Google, where all the passwords of victims are stored.

Saved Password Locations

Hello Guys, Do you know when you press Remember Password Button on your Browser where those passwords are stored? In this Post let us look at which location all the passwords are stored.

Exploit Win7 Remote PC: MetaSploit Framework

Hello friends, Today I'll teach you you can exploit Windows 7 PC by using metasploit on BackTrack 5.

What is BackTrack?
BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking.

Comparison of Linux Commands and DOS Commands

Many Linux commands typed at a shell prompt are similar to the commands you would type in MS-DOS. In fact, some commands are identical.

So, let's look at the Similarities.

Linux Intro on Way2Computerworld

What is Linux?

                          Linux, often described as a technical user’s operating system, is quite popular in many circles of computer processing because of its versatility and easy-to-use framework.

Linux Commands with corresponding MS-DOS Commands

Type these commands in shell/console/Terminal.

startx – to open KDE from login shell (win in MS-DOS)
ifconfig – shows IP Configuration (ipconfig in MS-DOS)

Assassin's Creed IV Black Flag - Torrent




Minimum System Requirements:
 
OS: Win Vista SP 64bit, or Win 7 SP1 64bit, or Win 8 64bit 
CPU: Intel Core2Quad Q8400@2.6 GHz / AMD Athlon II X4 620@2.6 GHz
RAM: 2GB System Memory
GPU: Nvidia GeForce GTX 260 / AMD Radeon HD 4870
GPU RAM: 512MB VRAM with Shader Model 4.0 or higher
DX: DirectX June 2010 Redistributable
HD: 30 GB
AUDIO: DirectX Compatible Sound card with latest drivers

Call Of Duty - Black Ops 2 PC Game - torrent



It does not need any update or patch coz it includes everything you just need to extract it and play . So guys do not download and apply any patch or update or do it at your own risk.

Call Of Duty Modern Warfare 2 PC Game - Torrent


SYSTEM REQUIREMENTS

Minimum System Requirements
Processor : Intel Pentium 4 3.2 GHz or AMD Athlon 64 3200+ processor or better
Video Card : 256 MB NVIDIA GeForce 6600GT or better / ATI Radeon 1600XT or better
Memory : 1 GB RAM

Call of Duty 4 Modern Warfare 1 - Torrent

 
 
System requirements:
Operating system: Windows 7 / Vista / XP
Processor: Pentium or AMD 2.4 GHz
Memory: 512MB RAM

CyberGate RAT Tutorial for beginners on Way2Computerworld

1)What is a R.A.T?
                    R.A.T is remote administration tool. In other words, if a RAT is set up correctly, then a person (hacker) would gain acces on victim's computer. That hacker can do any stuff in victim's pc.

Advanced Phishing Tactics on Way2Computerworld!

Hello friends today I'd like to tell you one story Once in our college we're having Ethical Hacking workshop, he asked me to login from his system (social engg), I thought

Free Download Microsoft Office ProPlus VL 2013 (32 bit + 64 bit) with Activator - Torrent



Microsoft Office ProPlus VL 2013 (x86/x64) with Activator - Torrent
System Requirements:
Computer and processor: 1 GHz or greater x86/x64 Processor with SSE2 instruction set
Memory: 1 GB RAM (32-bit) / 2 GB RAM (64-bit)

Free Download Easy GIF Animator 6.0 Pro PreActivated


Easy GIF Animator is powerful yet very easy to use software for creating and editing animated GIF images.

How to Find Unsecure Admin Panel: Google Dorks

Google Search indexes everything that is made public on the web and Google dorks are used to find & hack targets using google search engine. here are the list of the most used  ones.

Windows 8: Top 5 Cloud Storage Apps

Cloud storage is a fast-moving arena, with advancements including the ability to store files and folders in the cloud along with meta data on your PC replicating the actual file. The file isn't there and isn't taking up space, but you can see relevant attributes.

How to Remove Write-Protection from USB Drives...



My Pen Drive is showing some error while I'm copying some data into USB drive and it was “Write Protected”

How to Download Facebook Videos........

Today I will show you how can one download the Facebook videos. Nowadays we see our group members upload many amazing videos and we may want to save it. So here now how to do is.