Powered by Blogger.

Saturday 28 December 2013

,

How to Track Who Views Your Facebook Profile

Why can't I see who is stalking my Facebook profile?
There are other social networks that do let you see who's viewed your profile, mainly LinkedIn and its "Who's Viewed Your Profile" feature.

Regular users can see a recent list of who has been spying on you, along with some basic analytics, while paid users can see up to 90 days worth of viewers, as well as more detailed analytics. It's great for seeing potential job interest and company prospects.

And what's better than finding a hot girl that has a great job? Finding one that viewed your profile. So, why doesn't Facebook jump on board? How great would it be to know when a girl you just friended viewed your profile and photos? It would be pretty clutch.

While there isn't a built-in feature to see who exactly has checked you out, you still might be able to get some information on how often your Facebook friends are viewing your profile.

Can You Use Facebook's "InitialChatFriendsList"?

Many rumors on the web claim that Facebook secretly exposes your recent visitors in an array variable (aka: a list of IDs) in the page source code called the InitialChatFriendsList. While this variable does not actually contain the IDs of people stalking your profile, it does give us an interesting peek into how Facebook's algorithms rank your relationships with your friends.
Facebook prioritizes the friends in your chat list using an internal (not-publicly documented) algorithm that appears to be based off of how often you communicate with each of your friends. From my research it appears to take into account recent interactions (in messages, chat, or comment threads) and frequency of recent chats.
It's rumored across the web that the person located at the very top of your "InitialChatFriendsList" is the person who last looked at your profile, but this is wrong. People you never have contact with will most likely be at the very bottom, and those that you communicate with more frequently will probably be up top.

Debunking the InitialChatFriendsList Stalker Rumor...

For me, the first three profiles that showed up were with people that I messaged or chatted with yesterday. To substantiate my claim that this does not show people viewing you, I had my roommate check out my profile about 25 times in an hour. I went back in to check my list, and it remained unchanged.
So, it most definitely does not prioritize people checking out your profile at the top of the list. But still, it's a fun way to check out who you have contact with most (though, you should probably already know that).

Finding the InitialChatFriendsList

If you'd like to view it for yourself, you can easily find this list by viewing the source code of your profile page. To do this, just go to your profile page, right-click in an empty area on the side, and select "View Page Source."
This will you show the page's source code. From here, go ahead and press Command+F (Mac) or Control+F (Windows) to open the find feature. In the search field, enter InitialChatFriendsList and you'll be taken to the list in the code.
However, it will not show names or links to your friends' profiles. Instead, it shows their Facebook IDs (numbers).
This large list of profile IDs (each separated by commas) is actually your full list of friends.

Turning Numbers into Names

To see whose face matches a number, go ahead and copy the number ID of who you want to check out. You only need to copy the full number that appears in-between the quotation marks, and before the hyphen (the last number after the hyphen doesn't matter).
Then just paste it into a new tab or window using the URL below, substitute NUMBERID for your friend's actual ID number.
Hit enter and you'll be taken to your friend's profile.

A More Visual Approach...

If diving into the source code seems too intimidating, you can see a visual representation of the top few people in your InitialChatFriendsList by doing the following:
  1. From the desktop view (this won't work on mobile), make sure your browser window is small enough to hide the sidebar, making the chat window float at the bottom right of your browser window.
  2. If you're logged into chat, turn off chat for all friends (you can do this using the gear icon). You'll need to do this as chat will reorder the list based on who's online whenever you're signed in.
  3. Refresh the browser window (this makes sure it doesn't remember who's online and who isn't).
  4. Click the little "Chat (off)" bar at the bottom right to switch it on, and pay close attention to the list of friends you initially see.
  5. For a second or two, the friends you'll see will be the ones from your InitialChatFriendsList.
  • Note 1: You'll have to look closely as the moment chat finishes logging you in, it'll get an updated list based on who's currently online. Once you see green dots next to anyone's name, you'll know it's now showing your online friends instead of your InitialChatFriendsList.
  • Note 2: You can always repeat steps 2-4 if you miss it the first time.
  • Note 3: Once chat is online, those who are online are pushed up to the top, with the secondary sort being based off of the InitialChatFriendsList order.

Faster Alternative Method...

If you have the updated Facebook look, it's easier to do the reverse and expand the width of your browser window until you see the combo Ticker and Chat sidebar. This will actually show you a list of your friends whether you have Chat turned on or off, so you have all the time in the world to look at the top of the InitialChatFriendsList.
You can adjust the slider to make the Chat box bigger to see more friends. If you still see the grey "Chat (off)" box in the bottom, you probably don't have the updated look yet.
Really, this is just a more visual way to debunk the theory that the people listed first are the people spying on your profile.

The Next Best Thing: Groups and Messages

The notorious "Seen By" feature is built into the Messages and Group sections. Anytime a post or photo is uploaded, you can check to see who saw the item right there in the message.
Of course, this isn't the same as seeing everyone that viewed your profile, but you can at least see everyone that viewed your message or group post. Since I hate this feature, I'm glad this hasn't leaked out to any other Facebook applications.

Beware of False Prophets

Do not give any Facebook application that claims to show you who's viewed your profile access to your account data, and do not download any third-party program onto your computer that promises the same. They do not work. These are basic phishing attempts meant to spam you and your friends or steal your login data. Never click any links on facebook claiming to know who viewed yours, or your friends profiles. They're all scams. Guaranteed.

Will There Ever Be a Way?

So, while there is no current way to see who has actually viewed your Facebook profile, you can see who has recently been in some sort of contact with you through the InitialChatFriendsList, and see who has viewed your comments or posts in a Group or Message.
Given the number of (fairly successful) scams based on seeing who's viewed your profile, it's clear that the demand for such a feature is there. But the current anonymity does allow for worry-free browsing of friends profiles without worrying about them thinking (realizing?) you're stalking them. It's a delicate balance that I doubt they'll change, as doing so would ultimately change many people's behavior on the site.
Let us know in the comments if you think Facebook should create a "Viewed By" feature or if you like the anonymity as that's currently provided.
Publisher: Unknown - 20:58

How to Disable the Parallax Effect in iOS 7 to Reduce Motion on Your iPhone

Several subtle changes to the user interface have been made in iOS 7, the biggest one being animations, which brings the device to life through the engagement of advanced physics and other visual effects.
One of these animations is the new parallax effect, which gives the illusion that the home screen is multilayered, with the applications and background wallpaper each on their own separate planes. Tilting the device around brings the feature to life, using the iPhone’s gyroscope and accelerometer to change the orientation of certain planes.
While the feature may be good-looking and fun to play with, it uses up battery, just like every other feature on your device. If you want to save a little bit of battery and aren't really feeling the parallax view, here's how you disable it.

How to Turn Off the Parallax Effect

If you want to disable parallax, simply head over to Settings -> General -> Accessibility -> Reduce Motion and turn it ON.
Once Reduce Motion is enabled, you'll see the parallax effect reduced in the icons, background, and alerts.
Publisher: Unknown - 20:47

How to Make the Fingerprint Sensor Work Perfectly on Your iPhone 5S Every Time by AmanAhad

The iPhone 5S arrived to the same fan fervor as sugar-hyped tweens waiting in line for the latest Hunger Games movie (which was pretty good actually). Much of the glory and headlines went to the fingerprint scanner on the 5S. No longer relegated to CIA buildings, users were thrilled to see this new feature, Touch ID, included on their phones.
Touch ID uses a sensor to scan your finger print in order to unlock your iPhone. You can store up to five different fingerprints, which your phone will remember.
Of course, with any new technology, there are going to be some issues. While the Touch ID feature has been met with plenty of positive reviews, many users have reported the sensor having issues reading their fingerprint. To fix that, here are some helpful tips on getting your sensor to work correctly—all of the time.

Tip #1 - Scan Right-Side Up or Upside Down

Even though the scanner pushes you towards scanning your finger right-side up, you can scan your finger upside down as well. If you find this more comfortable or more accurate, go ahead and use it. And you can try angles as well, since the Touch ID sensor has 360-degree readability, but other angles may be harder to replicate.

Tip #2 - Five Is Greater Than One

You can store up to five fingers in Touch ID, but this is only useful if you have multiple people that you want to be able to access your iPhone. You could also use it just for your own fingers—scanning each one individually. It will cause Touch ID take longer, since it has to decide which finger you're actually scanning, but you won't have to worry about it rejected all five of your prints.

Tip #3 - Five of the Same

Since the Touch ID can remember up to five fingers, you can actually use all five spots for your one finger. This gives the Touch ID sensor 5 times the amount of information for your one finger. So, instead of deciphering between five different fingerprints, it will have a better grasp of your main finger (most likely your thumbprint) and open more accurately and consistently. This is a very simple trick, but has been reported to work very well.

Tip #4 - Organize Your Fingers

If you did go ahead and store multiple fingers, you can easily identify each one by scanning it in Touch ID Settings. When scanning a particular finger, the matching print will briefly be highlighted in the list. That way, if something goes wrong, you know which one needs to be updated.

Tip #5 - Try, Try, Try, Try, Try Again

When unsuccessfully trying to unlock your iPhone 5S, you'll get a passcode prompt after three incorrect tries. But you should know that you actually have two more tries before being asked to try your passcode.

Tip #6 - Cover the Whole Home Button

Like Siri, Touch ID is supposed to get better with time, but if you want a quicker improvement, make sure to have your finger cover as much of the Home button as possible. This helps improve the sensors accuracy, and make sure that it's ready your full print.

Publisher: Unknown - 20:41

Tuesday 24 December 2013

,

RUN WINDOWS on Android (With QEMU & Bochs) by AmanAhad



Early Introduction
Once done try Linux Ubuntu, this time I want to try the Windows Operating System on my Android tablet, IMO SingLe Z5-Core Processor Allwinner A10 A10/BOXCHIP with max speed. 1.2 GHz ARM Cortex A8, ARMv7. WHY NOT ......???

I'll try to experiment Operating System Windows 95 and Windows XP, although not dual boot but it's better to use a PC emulator for Android called QEMU and Bochs.


I. Windows 95

A. Introduction.


First I would try to run Windows 95 on Z5 IMO, why I initially tried the previous version of Windows before this?

Sure was predictable, because he wanted to test if Win 95 is running well on my Android tablet or not?


B. Ingredients


Prepare application and the following materials:

1. QEMU Emulator (libSDL)

2. Windows 95 image file.

Description: Both materials can be downloaded at 4shared with following link: www.4shared.com/rar/qt5mh6is/qemu95eng.html

C. Steps.

1. Once the download is complete, the file will contain SDLapp.apk qemu95eng.rar and sdcard folder

2. Install SDLapp.apk in Android

3. Ektrasikan SDL folder and its contents to / sdcard /

4. Run libSDL and will next appear booting "Starting Windows 95 Please Wait"

5. Please wait, and Windows 95 already available on Android

6. Run the cursor to swipe the screen, and more optimal with the keyboard in Leather Case.



(But alas, the screen is not Stretch (full) with the screen on my Z5 IMO)



To watch a video overview of the following

www.youtube.com/watch?feature=player_embedded&;v=O6xbah7hvrU #!


II. Windows XP

A. Introduction.

Its the same thing with Windows 95, Windows XP which I have given is also run by the emulator and not make a dual boot.

B. Materials.

1. Install in Android Emulator Bochs which can be downloaded at XDA Developers.



Link: forum.xda-developers.com/showthread.php?t=1389700

(Download the Attachment (Bochs, and SDL.zip)



2. Install in PC Bochs and Qemu for the PC version.

a. Bochs: bochs.sourceforge.net/getcurrent.html

b. Qemu: wiki.qemu.org/Download

c. Virtual Box (optional if Qemu difficult to use): www.virtualbox.org/



3. Prepare the image of Windows XP (ISO files).


C. Steps.


1. Put Bochs on Android.

2. Prepare a Windows XP installation CD image file form. Iso then setting the Virtual Hard Disk Virtual Box or Qemu on your PC.



With the following provisions:

a. Open Qemu or Virtual Box

b. Select "New Virtual Machine"

c. Create a blank virtual hard drive named "c.img"

d. Configure the CD-ROM to the Windows XP iso image directly to a CD or no CD that is.

e. Give to Virtual RAM 256 MB

f. Run Virtual Machine.

g. Install Windows as usual to fill the vitual disk "c.img".

h. After reaching the desktop shutdown the Virtual Machine page.

i. Find and Prepare (to be copied) file "c.img"



3. Create a Folder SDL in / sdcard /

4. Salinkan extraction of SDL.zip to / sdcard / SDL /

5. Salinkan also c.img file to / sdcard / SDL / c.img

6. Open bochsrc.txt file and replace its content with this reply:



megs: 256

cpu: count = 1, ips = 6000000, reset_on_triple_fault = 1, ignore_bad_msrs = 1

# Filename of ROM images

romimage: file = BIOS-bochs-latest

vgaromimage: file = VGABIOS-lgpl-latest

vga: extension = cirrus, update_freq = 25

pci: enabled = 1, chipset = i440fx, slot1 = cirrus

ata0: enabled = 1, ioaddr1 = 0x1f0, ioaddr2 = 0x3f0, irq = 14

ata1: enabled = 1, ioaddr1 = 0x170, ioaddr2 = 0x370, irq = 15

ata0-master: type = disk, path = "c.img

# Ata0-slave: type = disk, path = "d.img"

# Ata1-master: type = disk, mode = vvfat, path = / sdcard / HDD, journal = vvfat.redolog # type = cdrom, path = "CD.ISO", status = inserted

boot: c

config_interface: textconfig

# Display_library: x

# Other choices: win32 sdl wx carbon AmigaOS beos macintosh nogui RFB term SVGA log: bochsout.txt

SB16: enabled = 1

mouse: enabled = 1

SB16: wavemode = 1, dmatimer = 500000

clock: sync = none, time0 = 1

More information: bochs.sourceforge.net/doc/docbook/user/bochsrc.html



7. Bochs run on Android (but Boot will run approximately 30 minutes) LOL XD

8. Windows XP ready to be enjoyed.

CONCLUSION:

It turns out that my Windows XP SP2 running on my Android tablet they will not be optimal SingLe-Core Processor with 512MB RAM, a result Opening windows jd bgtu Lama. Not SPTI on Linux Ubuntu or Windows 95 that runs will Smooth.Kemungkinan Smooth for Android with dual-core processor 1 GB RAM.

With additions and adaptations of me for adjustments.
Publisher: Unknown - 19:39

Monday 23 December 2013

The Advantages of Rooting An Android Phone by AmanAhad

Android has become the most used mobile operating system today and accounts for two-thirds of all smartphones sold in the world. It is an open-source platform and has been made by Google, the highly reputed search engine company. The success of Android can be judged from the fact that in just a few short years of being launched, it has displaced the mighty iPhone to become the most popular operating system for smartphones.  In this post we will be talking about what is rooting and advantages of rooting an Android phone.
The advantages of rooting an android phone

What is Rooting

Being an open-sourced software, Android offers incredible features to developers and they can access most system files of the OS. However, to prevent the misuse of the OS, Google has set certain limitations on Android. Rooting is the process of gaining complete access to the lowest levels of the Android file system.

How to Root My Android Phone

Android is available in multiple versions, or flavors, and rooting is different for each version. Google also allows phone manufacturers to customize their Android phones. You can easily find a rooting tool that has been created specifically for your phone model. Development community for Android is highly active and simple software solutions are made available within weeks of an Android phone being launched. The xda-developers forum in particular is very active and has dedicated groups for most of the popular Android devices. You can easily find the rooting tool for your Android phone and the step by step instructions to use it on these groups.

The Advantages of Rooting an Android Phone

Rooting gives applications complete access to the Android operating system. With these special privileges, developers are able to create applications that can offer many functions which are not possible on a device without root. Features like complete advertisement blocking for ad-supported applications, complete ROM and data backup of device and using core hardware features are made possible when you root your Android phone. Misuse of this access is also possible and there are special applications that control who is allowed this access and you can set access control. The biggest advantage of rooting is that you can install custom ROMs on your device.

What is a Custom ROM

A custom ROM for Android is a ROM that a third party developer has created. These ROMs are highly optimized, remove all the bloat-ware that comes with the device and add a lot of features. Custom ROMs are also the only way many older Android devices can get newer versions of Android which are not officially available for them. The Cyanogen mod is a great example of a custom Android ROM and is the most popular Android ROM in use today. It is available for almost a hundred Android devices and offers every popular flavor of Android.

Rooting – For a Better Phone

Part of the reason behind the success of Android phones is the amount of freedom the OS gives to developers. All kinds of apps are available for these devices and there is practically no limit on the customization you can do with these devices. Rooting allows you to use all of these applications and truly benefit from all the amazing platforms that the Android development community has created.
We are sure this small post would have given basic understanding of rooting and the advantages of rooting an Android phone. by AmanAhad
Publisher: Unknown - 01:45

Samsung Galaxy S5 to ditch AMOLED screen for LCD?

According to sources cited by Korean sites, the Galaxy S5 could be the first-ever handset in the line to feature an LCD panel. Samsung’s shift is purportedly to make cost savings.
Samsung Galaxy S5 mock-up
The move, news of which was brought to us in the West by the Galaxy-fixated folk over at Sam Mobile and G for Games, could free up funding for extra features, with LCD screens cutting Samsung's outlay by as much as 20%.
The cheaper screen tech could clear the way for the metal shell that many industry-watchers have been lobbying Samsung to include in a Galaxy S smartphone for some time.
Although by no means badly received overall, the Galaxy S4's plastic build came in for heavy criticism and was widely unfavourably compared with the HTC One’s handsome aluminium unibody construction.
An LCD screen could also help deflect carping in recent years that AMOLED screens don’t offer the same, true-to-life colour reproduction as rival technologies.
Other mooted features for the Galaxy S5 included a Touch ID-style biometric technology, albeit using a retina-scanner, and a 20-megapixel camera.
Via:
Sam Mobile
Publisher: Unknown - 00:24

Hybrid cloud storage: is it right for you? by AmanAhad

In Depth It needs a strategy and the right choice of provider

Hybrid cloud storage: is it right for you?
Hybrid cloud storage entails keeping some of your data on premises and some offsite in the cloud. It's becoming an increasingly popular option for small and midsize businesses.
How it's best to start by segmenting information, storing locally any data you need to access quickly, and archiving other information in the cloud.
Security is also an essential element of the implementation of hybrid cloud storage, but it must come alongside a plan. SMBs should assess what data is being stored, how it is going to be protected, and ensure that it is encrypted and properly protected.
It makes sense to use the same vendor for security as for the cloud service itself, especially if they offer consultancy - just check your intended supplier's credentials before you start. Also, as part of your research it's important to check how your data will be used by the cloud provider before signing up.

The strategy

Hybrid cloud storage can be very secure, says Clive Longbottom, Analyst at Quocirca. But SMBs should ask the vendor about how the store the data, as cheaper isn't always better.
"Some of the vendors will offer cheap cloud storage because they are using de-duplication at the back end, using all of their customers as the feeds," Longbottom warns. "This can work well for them then as they are working against a massive set of data files, and so the compression they can get will be well in excess of 80%."
But if you don't want your and other people's data being used together in this way, you will need a dedicated service, where only your data is being de-duplicated. This will cost more.
"The best performance for de-dupe is on files in the clear as well – so the use of encryption will do less de-dupe." says Longbottom.
He recommends that where possible, SMBs should use an appliance that does the de-duplication before sending it across to the cloud. "You get the benefits of smaller data sizes, less traffic over the interconnection between you and the cloud – and still get the option for the data to be encrypted before it is sent to the web," he adds.

Changing perceptions

But cloud's real challenge comes in many firms' perception of the technology. "What the cloud vendors have to prove is the security of the data is better and stronger than on-premises," says Tom Holmes, Founder and Managing Director of HR cloud consultant Veran Performance.
The risk of data storage in the cloud is far less than those taken in some parts of the business already, he says, citing HR storage as an area which can often be outsourced.
Holmes cites the example of one of the firm's previous clients, which had all onsite data stored in a "shed", without proper cooling devices, using out-of-date servers. "What they get by taking reasonably secure data storage in the cloud is far less risk and backup which they do not have. Yet intrinsically it feels like it's higher risk to put things in the cloud, no matter how clunky things are."

Consultancy

It's often wise to get some expert advice on cloud security before you even segment your data. SMBs should look to invest in an approach which offers them a combination of consultancy and high quality technology where possible.
This should incorporate the underlying infrastructure, SLA management security, and advice and guidance, says Andrew Carr, CEO, Bull UK and Ireland. Such services are becoming more available, with vendors offering made-to-measure hybrid cloud models that come with integrated security capabilities.
"Today we are seeing this kind of approach become increasingly popular with SMBs as issues around cloud security dissipate," Carr says.
But SMBs must first make sure onsite data is secure. "I think this is where vendors and the channel can come in," says Longbottom. "They can provide corporate security services as part of putting in place a hybrid solution, making sure that the customer meets all its regulatory data and information requirements as part of the project."
Although many vendors aim at the midmarket and above, Longbottom recommends looking at Ctera, which offers a service to the SMB via the channel; or for more high end services, Nasuni, Nirvanix or StorSimple, which was recently bought by Microsoft.
Securing a hybrid cloud involves a strategy, but you have to make sure you choose the right provider. Once you've secured some of the data onsite, with thorough research your offsite data will be just as, if not more secure.
Publisher: Unknown - 00:23

6 Things to look for in 2014 for the enterprise cloud by AmanAhad

6 Things to look for in 2014 for the enterprise cloud 
Next year is likely to be one of consolidation as cloud becomes more prevalent and businesses embrace the trend as they look to transform the way they work. Here are some predictions as to how the cloud will evolve over the next few months.

The cloud will become more mainstream

In 2014, I believe that the cloud will become more mainstream. Many businesses will finally admit they can make savings and gain a competitive edge by moving to the cloud while the laggards will slowly move into the cloud. Cloud email management and productivity will be the easy and early wins for businesses next year.
This quick and simple investment will help IT managers control the Shadow IT created by consumer cloud services like Dropbox, Evernote or Box.net. With cloud certification, IT managers are confident that their security requirements are being met, and will be keener to move to the cloud to take the business to the next step.

Leveraging third party cloud providers

In 2014, businesses who can't wait for their chosen cloud service to mature enough to be comparable to their expectations will start to leverage third party cloud providers in a hybrid cloud model. This will be possible by using two cloud providers who cooperate to provide an enhanced level of functionality. This collaboration will in turn solve their current problems and help them move to the cloud, and get the service they really need faster.

The rise of personal cloud

We expect the cloud to be the main location where growing data can be stored, accessed and analysed. One of the key developments for providers seeking to attract customers will be to add software and services to enhance their offering and jump on the mobile trend. By getting those added services in place, IT managers will be more able to control the Shadow IT of hidden data this switch will create.

Greater innovation

In 2014 I think the cloud will start to offer significant upticks in technology and functionality for customers. As per their nature, cloud vendors are capable of being more dynamic and innovative than on-premise vendors of classic technologies like email archiving. Add-ons and updates are automatically made by the vendor so delivering innovation is far easier.
As an example, email archiving that is rigidly stuck to the LAN will be eclipsed by cloud vendors (like Mimecast) who can offer more than simply the storage model, so many are locked into to. Offering ways of exploiting data to drive business value and business intelligence is a good example of how this might work.

Security will be key

I believe that security has become mainstream for both individuals and companies. For example, email is the first point of contact in any company and represents a massive amount of corporate data. However, it is often underestimated as a potential security threat.
Most companies only see inbound spam as a threat, but in reality there are more issues with outbound emails. As spammers, scammers, botnets and phishers struggle to get emails past the classic email security defences, they are increasingly turning to the use of compromised corporate accounts.
Access to corporate accounts in many large multinational organisations can be rented for this purpose; or more increasingly targeted phishing attacks are compromising corporate accounts to allow the attack long term access under the radar. Due to recent events that made the headlines, I think 2014 will be the year for companies to concentrate on security and see those threats with a new eye.

Information will not just be for storage

We're getting quite good at amassing information, but in 2014 the emphasis will change to the use we are making of it. Compliance is the key driver for archiving decisions, which means huge amounts of data being stored – much of it in the cloud – ostensibly for nothing more than long term data retention. From email archives, we now add files, voice, social media streams, and so on.
The archive is getting richer and richer, but as yet there is insufficient focus on the potential utility of that data. So, in 2014 we'll see data science, analytics, big data if you will, emerge around the archiving ecosystem, with business decision makers keen to gain insights and understanding from the data, and metadata, that they are storing.
Publisher: Unknown - 00:20

How to find version of installed IE, Chrome, and Firefox. by AmanAhad


It's highly recommended you keep your Internet browsers running the latest version, to avoid any security issues and to have the most current features available to use. Knowing the version number of your browser is key to determining if you need to upgrade your browser. To determine what version you're running view the About page for each browser, as mentioned in the steps below. by AmanAhad
Tip:
Internet Explorer
Firefox
Chrome
Microsoft Internet Explorer users
To view the About page in Internet Explorer, on the menu bar, click Help and then About Internet Explorer.
Tip: If you don't see the File, Edit View menu press the Alt key.
Internet Explorer File menu
This will open the Internet Explorer About page, where you can view the Version number, as shown below.
About Internet Explorer Window
Mozilla Firefox users
To view the About page in Mozilla Firefox, on the menu bar, click Help, About Mozilla Firefox.
Tip: If you don't see the File, Edit View menu press the Alt key.
Firefox menu
This will open the Mozilla Firefox About page, where you can view the Version number, as shown below.
Firefox about menu
Google Chrome users
To view the About page in Google Chrome, click the Wrench icon near the top right of the Chrome window (just below the X button that closes the window), the click About Google Chrome.
Chrome menu
This will open the Google Chrome About page, where you can view the Version number.  Google Chrome will even let you know if your version is up to date.
Chrome about box
Publisher: Unknown - 00:09

Sunday 22 December 2013

How To Fix Internet Download Manager Mozilla Firefox Integration Error By AmanAhad

When it comes to download manager; Internet Download Manager is one of the best you can ever have with it unique and great features. Currently I formatted my computer and i wanted to reinstall Internet download manager back which I did but I could not download videos from YouTube and other files with IDM due to IDM integration problem with Mozilla Firefox Browser.
firefox idm problemNormally, You know that internet download brings out a pop up that sticks to your browser which you can click and download but the pop up download button don’t show on my Mozilla Firefox and also other browsers. Then I started my research and I notice that the extension that comes with my Internet download manager is not compatible with my updated browser.
Idm sticky download button
And since the Extension is not compatible with the browser I need update it and since the extension is not available in Mozilla plugin store so you need to download it and install the extension which I will show you where to download it and how to install it because doubling clicking it won’t install it.

Where To Download And Install Internet Download Manager Updated  Extension On Mozilla Firefox

Now first before you start you need to find out if the IDM extension is not compatible with your firefox browser, to know this is quiet easy.
firefox_menu

To locate your Mozilla browser extensions; Follow these steps

  1. Open your Mozilla Browser
  2. Click on the Tools tab
  3. On the Drop down menu click on the Add-ons
  4. Then Locate Extension in the new window that will pop up
Once you are there it will list out all the Extensions you have installed in your firefox browser, then locate IDM CC and you will see that the extension is not compatible and you can not update it from that tab so you need to download it.
To download the updated IDM CC extension Click Here to download it.
After downloading it, go back to the Add-on tabs that open showing your browsers extension then click on the Gear icon at the top right corner of the browser.
how to install extension from file
After clicking on the gear button, a drop down menu will show, click on the Install Add-on from file then locate the downloaded extension and install it.
install idm extension on mozilla
You will get a confirmation that your extension have been installed successfully, so you just restart your browser and you are done.
So I hope you understand the post here on how to solve the internet download manager firefox integration problem and also how to install extension from file. Thanks for reading please kindly subscribe below to get updated with tips like this. AmanAhad
Publisher: Unknown - 23:51
,

How to Cange wallpaper in the windows 7 log in screen by AmanAhad




                                                                              
This is simple.
To change the the wallpaper  first RUN regedit.
Right click on HKEY_LOCAL_MACHINE and select find.
Give this word OEMBackground.

After finding OEMBackground  ,change its value 0 to 1.

Then go to the directory C:\Windows\System32\oobe.

Create there a folder and give the name INFO

Open that folder and inside that again create another folder then give the name BACKGROUNDS.

There paste the wallpaper you want to place instead of the default.

Give the name backgroundDefault to that picture.


Note: Size should be < 254 KB
Publisher: Unknown - 20:46