Posts

Showing posts from November, 2016

Pac-Man on Messenger; Facebook adding ability to play games on messenger with phone

Image
Instant games including Pac-Man, Space invaders and others will roll out to 30 countries starting from today. Although the social network giant has previously tried this feature before which stars a basketball game that has been played over 1.2 billion times. To play the game, all you have to do is to start a conversation with a friend (or friends), then tap on the new game icon below the message bar, and choose your game of choice. Facebook has announced that this game will only be available on the latest iOS and Android Operating system giving out hints that it might not work on phones of those who hasn't upgraded their phone yet. The game will come with a score-based league tables and an in game chat. 'Your scores are only shared with the Messenger Groups you're playing with, and your top score is visible to just your friends so it's easy to find new people to challenge,' said Facebook in a statement.   LIST OF THE AVAILABLE GAMES YOU WILL BE ABLE TO PLAY The Ins

How to delete yourself completely from the Internet with just a click

Image
 A swedish website is offering everyone a chance to erase all their online activities the with a click button. Once you simply input your email and password then all internet traces linked to the email will be erased completely. The service is called Deseat.me, it was designed by two swedish researches.Using Google’s OAuth protocol to access users’ data, it then provides them with delete links for each of their accounts, enabling the user to wipe the slate clean. Don't forget to share this post via share buttons below, for the benefit of others. Kindly use the comment box below for any questions and suggestions.

Organizations that can see your entire online browsing history even if you delete it

Image
Here are the lists of organization that you see and know your internet history if the newly proposed bill passes Royal Assent to become Law. Metropolitan police force City of London police force Police forces maintained under section 2 of the Police Act 1996 Police Service of Scotland Police Service of Northern Ireland British Transport Police Ministry of Defence Police Royal Navy Police Royal Military Police Royal Air Force Police Security Service Secret Intelligence Service GCHQ Ministry of Defence Department of Health Home Office Ministry of Justice National Crime Agency HM Revenue & Customs Department for Transport Department for Work and Pensions NHS trusts and foundation trusts in England that provide ambulance services Common Services Agency for the Scottish Health Service Competition and Markets Authority Criminal Cases Review Commission Department for Communities in Northern Ireland Department for the Economy in Northern Ireland Department of Justice in Northern Ireland Fi

Hacking Into A Computer Without Internet

Image
No matter how safe you think you are or your computer is, there is always a possibilities of you being hacked. This hacked has been proved by a ground of security researcher. Back to the post, yes it's really possible to hack into your system without Internet through a wireless devices such as mouse and keyboard and install Malware or Rootkit into your computer. As convenient as it is by using a wireless device on your phone, it has it own disadvantages. Security researchers firm 'Bastille' has revealed that wireless keyboard and mouse are vulnerable  to MouseJack attacks because the connection between the receiver and the mouse/keyboard is not encrypted therefore it will accept any valid command. HOW IT WORKS Wireless device communicate via radio frequency with a USB dongle inserted to the system then it follows the mouse/keyboard command.  With the use of long-range radio dongle and some few codings, hackers will be able to attack within 100 meters range. During their tes

Facebook test new iPhone features that will help you find free Wi-Fi within your Locality

Image
Facebook has released a new feature for iPhone that will enable some few lucky users device to search and connect to any free Wi-fi hotspots available and also marking their location of a map. To know if you are chanced to get this feature just scroll through the menu options to find 'Enable Find Wi-Fi'. If you do this the app will detect all available Wi-fi within your vicinity and marked it down for you. A facebook spokesperson has confirmed this feature existence. and he states that this idea is to ;help people stay connected to the friends an experiences they care about'. . Don't forget to share this post via share buttons below, for the benefit of others. Kindly use the comment box below for any questions and suggestions.

Apple iPhone trick for more storage space

Image
Forget about deleting picture, video and music there is a new way to convince your iPhone into thinking there is still enough space on the device. As you all know many app waste memory space in a device by downloading cache's to the phone. This hack is revealed by Thorin Klosowki, and the process is this; If an iPhone user tries to install a large app that they don't havee a space for, iOS software will automatically start clearing out unused cache. Once all the space is freed uo you can simply stop the download. You can also view this process by heading to Settings > General > Storage & iCloud Usage > Available, users can see their storage levels going up and down. Here you will see the memory of the device gradually reducing. Don't forget to share this post via share buttons below, for the benefit of others. Kindly use the comment box below for any questions and suggestions.

How to check the password of a connected wireless PC

Image
From today I will be releasing some HOW TO's videos on youtube, although this videos is not for the main gurus, its just some tweaks and other reasonable things a computer operator should know how to do. So this first video on our collection is on ' How to check the password of a connected wireless PC'. This video would be useful to you, if have a PC that is already connected to WiFi and you want to know the password. All you have to do is to follow the steps taken on this Video.  Click on the below Youtube URL to watch the video https://youtu.be/T9BUh896hkA Thanks for watching. Don't forget to share this post via share buttons below, for the benefit of others. Kindly use the comment box below for any questions and suggestions.

An iPad game to cure lazy eye in Children

Image
Children with eye problem could soon be treated with video game.Experts have develop an app that can encourages the weaker eye to work harder. Retina Foundation Researchers has in Dallas has tested the process on youths aged between four (4) to ten (10) years old. They studied over two dozens children who were given an iPad game called 'Dig Rush'; the game involve users to return pieces of gold to carts quickly while minding obstructions. We can show that with this new binocular treatment we get visual acuity improvement, and maybe now we should be thinking that amblyopia is more of a binocular disease rather than monocular. 'We still need to do a lot of research to figure out if it's going to be worth doing something like this rather than patching.' The researchers claim their findings could be replicated to movies and not just games and are now developing more games to try and replicate their findings. Dr David Allamby, founder of London's Focus Clinic, says a

Future of Novels; Over to the ROBOTS

Image
Its just a matter of time until robots will do all the hard work for novel writers. Robin Sloan (Author and Technology Expert) claim it just a matter of time until 'Al'(a servo-robots created to write dystopian science fiction novel) is tasked with writing emails, document and even novels. Mr. Sloan created the bot to be able to compose a back catologue of science fiction magazine novels from 1960s to 1970's. 'They can use grammar and put words together in interesting and convincing ways — and I think unexpected and beautiful ways,' Mr Sloan said. While the AI's writing isn't yet up to the standards of H.G. Wells, future models could work as a useful gadget for writing inspiration, Mr Sloan suggests. 'I am 100 per cent sure, in some number of years, that text editors will have some version of this,' Sloan said. For example, one of these intelligent programmes could digest an entire archive of corporate email. The bot would then put forward suggestion

Facebook smiley update

Image
If you like a friend's post on Facebook, soon all you may have to do is smile and they will know. Facebook has purchased FacioMetrics, a facial recognition software firm, in a push to integrate the technology into the platform. By scanning the faces of millions of users around the world, the software could measure reactions to develop gesture-based controls, such as smiling for a like. 'How people share and communicate is changing and things like masks and other effects allow people to express themselves in fun and creative ways,' a Facebook spokesperson told press agency AFP. WHAT CAN FACEBOOK DO WITH FACIAL RECOGNITION?  Facebook has been rolling out new ways for users to share content and interact for a while. Newly acquired FacioMetrics says that its potential applications include augmented reality, animation and measuring audience reaction. This could mean better filters, stickers and sliders for multimedia - competing with Snapchat. It could also potentially help Fac

Coca-Cola reveals smart bottle that can take a snap as you swing

Image
Coca-Cola has designed a selfie bottle with an in-built camera at the base. It uses sensors that take pictures if the bottle is tilted as you take a drink. All the image captured by the camera are automatically shared to the firm facebook, Instagram and Snapchat. This program is inspired by Israel Coca-cola team “Gefen Team” but it has not been confirmed If this product will be for the masses or for just promotion piece. HOW DOES IT WORK?  Coca-Cola Israel has designed a gadget that doesn't make you decide between taking a selfie or sipping on its soda - the firm has combined the two. The selfie bottle is designed with a built-in camera attached at the bottom. Sensors are housed inside that know when the bottle is being tilted and will automatically snap a picture of you mid-drink.     Don't forget to share this post via share buttons below, for the benefit of others. Kindly use the comment box below for any questions and suggestions.

Unlock Android Pattern or Password Lock Without Resetting Device

Image
In these days android is popular used operating system and everybody adopting android phones. Android operating system is administered by Google. Freshly, we discovered another trick to unlock android pattern, pin or password but a modification of that method or trick is to format all user data (losing all data). So, In this assignment, we are going to share the trick to unlock android pattern without loosing any data. Steps for Unlocking Pattern Lock or Password on Android Devices Without Losing Data The first step you need to do is download the Aroma File Manager for successful operation. For free download click here . Once you have downloaded the file, move the file to the memory card and insert the card to your device .  Open the Stock Recovery of your device , there are different ways for different devices to enter into stock recovery but i ensure go along with google and your android device name. Once you got it, enter into stock re

Hackers Could Hijack Your System When You Open MS Word Doc file

Image
Locky ransomware is spreading at the rate of 4000 new infections per hour, which means approximately 100,000 new infections per day. Locky ransomeware is being distributed in a Microsoft doc form (which embeds vicious macro function) . WHAT IS LOCKY Its a malware that uses macros that is been embed to a Microsoft word file type, However the real hacking comes if the file got downloaded to the system and a popup comes  up requesting you to enable macros. Once you enable the macros, it will force download an executable malware from a  server and run it. And this file is the 'LOCKY' we are talking about, which will encrypt all the files on the computer and make them all .locky files. Locky ransomware asks victims to pay ($208 - $800) in order to decrypt their files.  A researcher named Kevin Beaumont along with Larry Abrahms of BleepingComputer initially discovered the existence of Locky encrypted virus. Among the highly impacted countries include Germany, Netherlands, Unit