KiranPro

Here You can get PC tips & tricks.

Sunday 5 February 2017

W3Schools Android Application

Best android app to learn web development

Download

Sunday 3 July 2016

Make Facebook Photos & Posts Private

Do you have private pictures of yourself or your family on Facebook which you don't want the entire world to see? This guide will help you change your Facebook privacy settings to only allow your friends or people you know to see your Facebook photos (and everything else you do). You can even customize the privacy settings of individual albums to share them with a small group of people like your co-workers or relatives.

Make Facebook Photos & Posts Private
There are three ways in which you can do this. Either, you can customize each wall post's or photo's settings individually, or set the preferences for specific albums or use a general setting for all posts and photos you have.

1: Choosing an individual wall post's or photo's privacy settings

While posting your photo or post, click on the down arrow left to the post button. Select Custom from the drop-down menu. Using the pop-up, select who you wish to make a post visible to. You can select if you wish to show a post to friends, friends of friends or specific people or a specific list of people.

Make Facebook Photos Private
Select Custom Privacy Options
You can even hide a photo from specific people or a list of people. This will be especially useful in situations where you don't want your colleagues to see a certain picture that makes fun of them or something similar. Normally, when someone is tagged in a photo, every friend of that Facebook user gets to know about it. So, if you chose to make a photo visible to friends and someone is tagged in that picture, all their friends will see that image. To prevent this, uncheck the Friends of those tagged checkmark.

Facebook Pictures & Posts Private

2: Limiting the Audience for an entire album

This is much similar to setting the audience for an individual picture. Just go to your albums, click on the Settings icon on the bottom right of the album whose privacy settings you wish to customize. Then select Custom from the drop down menu. The options Facebook offers are almost the same as those for an individual photo, however there is one difference.

Private Pictures Facebook Posts

All those people who are tagged and their friends would still be able to see the photos in your album. To prevent this, you will have to change the privacy settings of each individual photo.

Facebook photos & posts privacy settings

3: Making all your Photos and Posts Private

This is the permanent solution against worrying about your Facebook content. However, it doesn't offer much customization options and should only be used if you are sure how you will use Facebook. This is a 2 step process and involves customizing the audience for your past posts as well as those you will make in future.

Step 1: Limiting Past Posts & Photos
Go to your Privacy Settings, and then go to "Limit the audience for posts you've shared with friends of friends or Public?." Then click on the "Limit Old Posts" button. In the pop-up, click Confirm. This is a permanent change and cannot be undone. However, all those tagged and their friends would still be able to see your posts. To prevent this, you will have to change each post's settings individually.

Step 2: Limiting Future Posts and Photos

Facebook Content & Photos Private

While in the privacy center, click on "Who can see your future posts?" This will open a non-functional status update box. However, the privacy options that open when clicking on the down arrow right next to the post button are functional and act as global defaults for the content you post on Facebook in the future. Make sure to select friends if you only wish to share content with your friends. You can however, change this according to your needs; but for most people, friends would be the best option. You can further improve your privacy by selecting Custom and then unchecking the check box that appears next to "Friends of those tagged". This will customize your Facebook settings to show your Facebook activity only to your friends and those tagged.

You can also select who gets tagged in your content to further prevent your content from appearing in front of unwanted eyes. To do this, go to your Privacy Settings from the Settings icon located at the top right of the blue Facebook bar. Then, in Privacy Settings, click on Timeline and Tagging. Then under, "How can I manage tags people add and tagging suggestions?", select Enabled to review tags that friends add to your posts.

Facebook's privacy settings take some time to adjust but once you are done, you will never have to worry about your content ending up in front of unwanted users.

Related: Stop Hackers on Facebook

Facebook Scams and How to Tackle Them

Online scams are ever increasing. Almost in every phase of the online world, you will come across scams. Social networks are no exception for such malicious activity. Recently, millions of accounts from LinkedIn and eHarmony were compromised. Facebook seeing danger has updated its security and is advising its users regarding various scams and how to fight them back.

Facebook Scams

‘Please send money scam’
An unknown account sends a message stating that he/she has been mugged. Descriptions of events seem accurate including real names and places. Finally, the sender requests a certain sum, which will enable him/her to return home safely.

Facebook has attributed such scams as ‘Please send money scams’. The sender’s account is either fake or has been taken over by cyber criminals. On receiving ‘please send money scam’ messages, Facebook advices to report/block the account.

Phishing
Phishing is a common way to to hack account(s). Phishing links are sent within messages or through chats.

Phishing links through messages:
A message, which has scrambled words with funny fonts, is the first indication of a Phishing attack. Typo errors and misspelled words are other significant signs to look for. Such messages will be themed around offering gifts such as coins, jewels or any other artifacts. Finally, you will be asked to click on a link placed at the bottom of the message. Immediately report accounts who send such messages.

Phishing links in chats:
If any strange links appear while chatting, then beware. The account through which phished links appeared while chatting is probably compromised. Report the link immediately. However, doing so will not affect the account. Only the link will be considered for review by Facebook’s security team.

What to do if I had clicked on Phishing link accidentally?
If accidentally, a phishing link is clicked, go to password settings  in your profile and change your password immediately. This will eliminate any Phishing threat. It is important to ensure that your new password is hard to crack.

Malicious Script Scam
Often you will come across Facebook applications requesting to copy a certain script and paste it in your browser. Such scripts are malicious in nature. For instance, some applications will provide a list of your profile visitors when the script is pasted in your browser. Apart from showing recent visitors, these applications send events and messages to your friend list. These applications and scripts should be avoided. A screenshot of one such application is shown below:

Malicious Scrip Scam

Suspicious emails:
Occasionally, some emails will request to reset your password, give a warning or will be about notifications. These mails are so convincing that they appear to be from Facebook. A request to click at the link provided at the bottom of the message should alert you. To check the validity of the link, right click and copy it. Later paste it on a separate tab and make sure that the URL starts as www.facebook.com.

Note: Facebook will never request your password through emails.

Suspicious Notifications:
Never click on links within suspicious notifications. For instance, you will receive a notification stating that you had requested a password reset albeit you never had requested. Other suspicious notifications include the ones notifying you of registration of a new Facebook account. With the help of your email provider, mark these mails as spam.

Cyber criminals are on the rise. It is your responsibility to safeguard your Facebook account. Next time you are using Facebook, be extra cautious.

How hackers hack Facebook Account & How to stop them?

Facebook is, undoubtedly, the most popular social networking website with more than 500 million active users. Due to its popularity, many hackers (or should I say crackers?) are actively involved in hacking Facebook accounts of unsuspecting users. This article outlines the many strategies that such hackers use to gain access to Facebook accounts of hundreds of users each day and how you can stop them from hacking your account.

hack facebook account
Facebook is one of the prime target of hackers!

Email Address Hack

I have always been puzzled by Facebook's leniency in this matter. All a hacker needs to do is know your name and he will be conveniently shown your email address at your profile. How easily a hacker can then hack your Facebook account (and everything else associated with that email id) if he 'guesses' your password (if you use a weak password) or answers your security question! This is something I hope Facebook improves on quickly. Until Facebook does so, here are some tricks you can use to protect yourself from this vulnerability.

How to safeguard your Email Address?
Just follow these steps:-

  1. Hide your Email Address from everyone by going to Edit Profile>Contact Information>Clicking on the icon beside your email address> checking 'Only Me'.
  2. Change your primary email address to a one that is only known to you by going to Account Settings>Email> and changing your primary email to the new one (known only to you) and removing your previous email address.
  3. For additional security, when in Account Settings, check 'Secure browsing' and 'Send me an email when a new computer or mobile device logs into this account' and click Save.

hack facebook
A hacker at work!

Phishing

Phishing is one of the easiest ways to trick users into giving out their login credentials. All a hacker does is setup a webpage similar in design to that of the Facebook homepage, attach a server sided script to track the username and password entered and store it in a log. Sending people emails stating that someone tagged a photo of them on Facebook in the same format as Facebook and giving a link below to the phishing website further reduces the chances of it being detected as a fake. Sometimes, spam Facebook apps, like those promising to tell who viewed your Facebook profile, automatically post links to phishing websites. A new trend amongst phishers is creating Facebook look-a-like widgets for stealing user's login credentials.

How to prevent yourself from being phished?
At all costs, avoid clicking on suspicious links. Moreover, always check the URL in the address bar before signing in. Avoid logging in through various "Facebook widgets" offered by websites and blogs. Instead, use Facebook's homepage to sign in. Always try to use Safe Search while searching. If you do manage to get phished, report the website so that others may get a warning before visiting it.


hack facebook password

Keylogging through Keyloggers

Keylogger is a type of computer virus that tracks key strokes. Keyloggers can be installed remotely on a computer system by a cracker to record all the activity that is going on the victim's computer. Keylogging gets more easy if the hacker has physical access to the victim's computer.

How to stop keyloggers?
Install a good antivirus and update it frequently. Do not click on suspicious links and avoid downloading illegal software. Also, avoid installing free toolbars and other such spam software. Always scan third-person's flash and pen drives before using them on your computer.

Some more basic tips can be found here:PC Security tips to make computer secure

Social Engineering

Social engineering involves using any trick to fool the user into making himself vulnerable to exploits. This could involve anything from sending spoof emails, pretending to be from Facebook, telling you to change your password to 12345678 to a hacker maliciously getting out the answer to your security question in a friendly chat or discussion.

How to prevent yourself from being socially engineered?
Stay aware during chats and discussions. Use a tough security question, preferably one whose answer you would never disclose to anyone. Moreover, Facebook, or any other company for that matter, will never ask you to change your password to 12345678 or do something as silly as asking you to send out your login details to prove that you are an active user. Always think before taking actions and your e-life on Facebook will be safe from hackers looking to hack Facebook accounts.


20 Windows Keyboard Shortcuts You Might Not Know

20 Windows Keyboard Shortcuts You Might Not Know



Mastering the keyboard will not only increase your navigation speed but it can also help with wrist fatigue. Here are some lesser known Windows shortcuts to help you become a keyboard ninja.
Image by Remko van Dokkum


Global Windows Shortcuts

Win+1, 2, 3, 4, etc. will launch each program in your taskbar. It is helpful then to keep your most used programs at the beginning of your task bar so you can open them one right after another. This also works in Windows Vista for the quick launch icons.

Win+Alt+1, 2, 3, etc. will open the jump list for each program in the taskbar. You can then use your arrows to select which jump list option you want to open.

Win+T will cycle through taskbar programs. This is similar to just hovering over the item with your mouse but you can launch the program with Space or Enter.

Win+Home minimizes all programs except current the window. This is similar to the Aero shake and can be disabled with the same registry key.
Win+B selects the system tray which isn’t always useful but can come in very handy if your mouse stops working.

Win+Up/Down maximizes and restores down the current window so long as that window has the option to be maximized. It is exactly the same as clicking on the middle button on your windows.
Alt+Esc is like Alt+Tab but switches windows in the order they were opened and does not have the fancy window preview overlay.
Win+Pause/Break will open your system properties window. This can be helpful if you need to see the name of a computer or simple system statistics.

Ctrl+Esc can be used to open the start menu but will not work as a Windows key replacement for other shortcuts.
Ctrl+Shift+Esc will open the task manager without needing to hit Ctrl+Alt+Del first.

Alt+Space will open the window system menu which can be used to maximize (x), minimize (n), close (c), or move (m) the window which can be especially helpful if your window is somehow off-screen. This shortcut can also be helpful with windows that don’t close with the Alt+F4 shortcut such as the command window.

Windows Explorer Shortcuts

Here are handy shortcuts built into Windows Explorer which may have similar features in other programs too.
Alt+Up will navigate up one folder level since the up arrow on the menu bar was removed in Windows Vista. Alternatively, you can also make Backspace go up one folder level with a handy AutoHotKey script.
Shift+F10 opens the contextual or “right click” menu for a file/folder. This can be very handy for speed especially if you know which option you want to select. Look for an underlined letter in each option to know which letter you can press for faster access.

Shift+Del deletes a file without sending it to the recycle bin because who wants to empty their recycle bin anyway?
Ctrl+Shift+N creates a new folder in your current directory.
Alt+Enter opens the file properties so you can view file size, sharing settings, and creation date.

F2 renames a file or folder.
F3 will open explorer and select the search bar. If you already have an explorer window open it will highlight the search bar. In some programs it will also open the search dialog to search within that program.

F6 cycles objects in the current window. In explorer this will cycle between the location bar, options bar, left pane, and right pane. It also works with varying success in other programs.
F10 toggles the file menu in explorer.

100 IoT Open Source Development Tools And Resources




100_iot_development_tools_



Internet of things is raging with an unprecedented speed. Before we tell you about the Internet of Things (IoT) open source development tools there is something else you should know first. With IT sector cashing on the hype created by the predictions from likes of Gartner and Cisco that claim that by the end of 2020 more than 50 billion devices will be connected by IoT, all of a sudden everyone wants to be the part of Internet of Things. Well it is no wonder that you are also looking forward to be part of soon to be a $1.9 trillion industry.
KEVIN ASHTON-“THE INTERNET OF THINGS HAS THE POTENTIAL TO CHANGE THE WORLD, JUST AS THE INTERNET DID. MAYBE EVEN MORE SO.”
Since the first concept of “Internet of Things” coined by Kevin Ashton in 1999, the actualdefinition of internet of things has gone through many changes. Still in simple words IoT can be termed as the environment where physical devices are connected with each other via internet and collect and exchange data for smart response. This is a highly intelligent M2M or Machine-to-Machine technology which has potential to revolutionize how we live and work.
Big players in field of information technology and internet are already working and innovating in the field of IoT one way or the other. ARM concluded in one of its surveys that more than 75% of enterprises already have put their steps into this domain while the mark is expected to reach 96% by the end of 2016.
“IF WE HAD COMPUTERS THAT KNEW EVERYTHING THERE WAS TO KNOW ABOUT THINGS—USING DATA THEY GATHERED WITHOUT ANY HELP FROM US—WE WOULD BE ABLE TO TRACK AND COUNT EVERYTHING, AND GREATLY REDUCE WASTE, LOSS AND COST. WE WOULD KNOW WHEN THINGS NEEDED REPLACING, REPAIRING OR RECALLING, AND WHETHER THEY WERE FRESH OR PAST THEIR BEST.”- KEVIN ASHTON

Why Internet of Things Open Source Development Tools is so popular?

Reasons for the popularity of the IoT open source development tools are the community of users. This community wants to have the open market for utilizing consumer technology devices and not to be dominated by a single vendor. Another reason of going open source is to provide an ecosystem where the IoT devices and applications developed can be integrated without hassles and many efforts. Finally going open source means your device or application can support numerous vendors as you will not be developing code for any specific vendor.
Internet of Things (IoT) open source development tools are mostly developed by the open source community which had worked from early on in the IoT domain. You can deploy the IoT applications making use of these tools sooner than ever before. If you are beginning to build your first internet of things application then this open source tool guide is exclusively for you.
Here we list 100 most widely used and reliable open source tools for developing IoT apps. We have tried our best to include IoT hardware platforms, development tools, software, integrations tools, operating systems and monitoring tools.
Anyhow if you are aware of any tools that are relevant in this context not listed here, please feel free to mention them in the comments below.

IoT Development Tools

  1. ThingBox
  2. Node-RED
  3. M2MLabs Mainspring
  4. Kinoma
  5. Eclipse IoT Project
  6. Arduino
Now all the above listed development tools are very user-friendly yet before you choose any of these tools, we recommend to go through their complete profile here.

IoT Hardware Platforms

Most important part of developing any IoT application is to choose the right hardware platform. Getting started with simple platform like Arduino Yun to progressing to UDOO it is all about the resource requirement of an application. Here are the best IoT Hardware Platforms to choose from
  1. Apio
  2. Arduino Nano
  3. Arduino Pro Mini
  4. Arduino Uno
  5. Arduino Yún
  6. Arietta G25
  7. BeagleBoard
  8. Flutter
  9. Flutter
  10. IMUduino BTLE
  11. Intel Edison
  12. Intel Galileo  
  13. Libelium Waspmote
  14. LightBlue Bean
  15. Local Motors Connected Car
  16. Microduino
  17. Nanode
  18. OpenKontrol Gateway
  19. OpenPicus
  20. panStamps
  21. PicAxe
  22. Pinoccio
  23. Raspberry Pi 2
  24. RasWIK
  25. SAM R21 Xplained Pro
  26. SmartEverything
  27. SODAQ
  28. SparkFun RedBoard
  29. Tessel
  30. Tessel 2
  31. The AirBoard
  32. The Rascal
  33. TinyDuino
  34. UDOO
  35. WIOT
  36. XinoRF 

Home Automation Software

We recommend before you make a choice from any of the below listed software go through this excellent piece of information on How to Choose a Home Automation System by HomeToys.
43.Eclipse SmartHome
44.Home Gateway Initiative (HGI)( Home Automation)
45.Ninja Blocks
46.openHAB
47.PrivateEyePi
48.RaZberry
49.The Thing System 

Middleware

Many of first time Internet of Things Application developers underestimate the importance of choosing the right middleware. Middleware is that mechanism that enables smooth communication among all the different components.
In simple words a ‘Middleware’ facilitates communication between the ‘Internet’ and the ‘Things’.
Choose the right middleware according to your needs from these:
  1. IoTSyS
  2. Kaa
  3. OpenIoT
  4. OpenRemote 

Operating Systems

After choosing the right hardware platform it’s time to choose the right IoT operating system for your application. Selection should be based on the application level, API requirements and hardware needs. Here are the top IoT Operating Systems to choose from.
  1. AllJoyn
  2. Contiki
  3. Raspbian
  4. RIOT
  5. Spark

IoT Integration Tools and Horizontal Platforms

Next in the list of IoT open source tools is the integration platform you will be interested in selecting. Listed below are some of the best IoT integration tools available right now.
  1. Canopy
  2. Chimera IoT
  3. DeviceHive(IoT Integration Tools and Horizontal Platforms )
  4. net
  5. Distributed Services Architecture (DSA)
  6. IoT Toolkit
  7. M2MLabs Mainspring
  8. Mango
  9. Nimbits
  10. Open Source Internet of Things (OSIOT)
  11. OpenRemote
  12. Pico Labs (Kynetx open source assigned to Pico Labs)
  13. prpl Foundation
  14. RabbitMQ
  15. SiteWhere
  16. SiteWhere
  17. ThingSpeak
  18. webinos
  19. Yaler

IoT Development APIs

  1. 1248.io
  2. BipIO(APIs)
  3. Qeo Tinq
  4. Zetta
  5. Motion Shadow

Miscellaneous Tools

  1. Ehcache(In-memory data grids)
  2. Freeboard(Data visualization)
  3. Hazelcast(In-memory data grids)
  4. IoT Toolkit(Toolkits)
  5. KinomaJS(Toolkits)
  6. Thingful(Search)
  7. ThingSpeak(Data visualization)

IoT App Development Protocols

Finally you are at the stage of choosing the right communication platform for your IoT application. Here are best suggestions:
  1. Advanced Message Queuing Protocol (AMQP)( Protocols)
  2. OASIS Message Queuing Telemetry Transport (MQTT)
  3. Very Simple Control Protocol (VSCP)
  4. Constrained Application Protocol (CoAP)
  5. Extensible Messaging and Presence Protocol (XMPP)

IoT Open Source Resources

At last if you need any reference of specialized resource, you might want to check out the ones listed below.
  1. e-Health Sensor Platform(IoT In Health)
  2. HabitatMap Airbeam(IoT In Health)
  3. Open Garden(IoT In Mesh networks)
  4. Open Source Robotics Foundation(IoT In Robotics)
  5. OpenWSN(IoT In Mesh networks)
  6. Oxford Flood Network(IoT In Water)
We have done the best we could to curate this list of top 100 IoT open source tools and resources. However if you feel any addition to the list is mandatory feel free to mention it with your comments below.
AddThis Sharing Buttons

Saturday 2 July 2016

Reverb's Event on 16th July 2016

Reverb's Event on 16th July 2016