Why can't I see who is stalking my Facebook profile? There are other social networks that do let you see who's viewed your profile, mainly LinkedIn and its "Who's Viewed Your Profile" feature.
Regular users can see a recent list of who has been spying on you, along with some basic analytics, while paid users can see up to 90 days worth of viewers, as well as more detailed analytics. It's great for seeing potential job interest and company prospects.
And what's better than finding a hot girl that has a great job? Finding one that viewed your profile. So, why doesn't Facebook jump on board? How great would it be to know when a girl you just friended viewed your profile and photos? It would be pretty clutch.
While there isn't a built-in feature to see who exactly has checked you out, you still might be able to get some information on how often your Facebook friends are viewing your profile.
Can You Use Facebook's "InitialChatFriendsList"?
Many rumors on the web claim that Facebook secretly exposes your recent visitors in an array variable (aka: a list of IDs) in the page source code called the InitialChatFriendsList. While this variable does not actually contain the IDs of people stalking your profile, it does give us an interesting peek into how Facebook's algorithms rank your relationships with your friends. Facebook prioritizes the friends in your chat list using an internal (not-publicly documented) algorithm that appears to be based off of how often you communicate with each of your friends. From my research it appears to take into account recent interactions (in messages, chat, or comment threads) and frequency of recent chats. It's rumored across the web that the person located at the very top of your "InitialChatFriendsList" is the person who last looked at your profile, but this is wrong. People you never have contact with will most likely be at the very bottom, and those that you communicate with more frequently will probably be up top.
Debunking the InitialChatFriendsList Stalker Rumor...
For me, the first three profiles that showed up were with people that I messaged or chatted with yesterday. To substantiate my claim that this does not show people viewing you, I had my roommate check out my profile about 25 times in an hour. I went back in to check my list, and it remained unchanged. So, it most definitely does not prioritize people checking out your profile at the top of the list. But still, it's a fun way to check out who you have contact with most (though, you should probably already know that).
Finding the InitialChatFriendsList
If you'd like to view it for yourself, you can easily find this list by viewing the source code of your profile page. To do this, just go to your profile page, right-click in an empty area on the side, and select "View Page Source."
This will you show the page's source code. From here, go ahead and press Command+F (Mac) or Control+F (Windows) to open the find feature. In the search field, enter InitialChatFriendsList and you'll be taken to the list in the code. However, it will not show names or links to your friends' profiles. Instead, it shows their Facebook IDs (numbers).
This large list of profile IDs (each separated by commas) is actually your full list of friends.
Turning Numbers into Names
To see whose face matches a number, go ahead and copy the number ID of who you want to check out. You only need to copy the full number that appears in-between the quotation marks, and before the hyphen (the last number after the hyphen doesn't matter). Then just paste it into a new tab or window using the URL below, substitute NUMBERID for your friend's actual ID number.
Hit enter and you'll be taken to your friend's profile.
A More Visual Approach...
If diving into the source code seems too intimidating, you can see a visual representation of the top few people in your InitialChatFriendsList by doing the following:
From the desktop view (this won't work on mobile), make sure your browser window is small enough to hide the sidebar, making the chat window float at the bottom right of your browser window.
If you're logged into chat, turn off chat for all friends (you can do this using the gear icon). You'll need to do this as chat will reorder the list based on who's online whenever you're signed in.
Refresh the browser window (this makes sure it doesn't remember who's online and who isn't).
Click the little "Chat (off)" bar at the bottom right to switch it on, and pay close attention to the list of friends you initially see.
For a second or two, the friends you'll see will be the ones from your InitialChatFriendsList.
Note 1: You'll have to look closely as the moment chat finishes logging you in, it'll get an updated list based on who's currently online. Once you see green dots next to anyone's name, you'll know it's now showing your online friends instead of your InitialChatFriendsList.
Note 2: You can always repeat steps 2-4 if you miss it the first time.
Note 3: Once chat is online, those who are online are pushed up to the top, with the secondary sort being based off of the InitialChatFriendsList order.
Faster Alternative Method...
If you have the updated Facebook look, it's easier to do the reverse and expand the width of your browser window until you see the combo Ticker and Chat sidebar. This will actually show you a list of your friends whether you have Chat turned on or off, so you have all the time in the world to look at the top of the InitialChatFriendsList. You can adjust the slider to make the Chat box bigger to see more friends. If you still see the grey "Chat (off)" box in the bottom, you probably don't have the updated look yet. Really, this is just a more visual way to debunk the theory that the people listed first are the people spying on your profile.
The Next Best Thing: Groups and Messages
The notorious "Seen By" feature is built into the Messages and Group sections. Anytime a post or photo is uploaded, you can check to see who saw the item right there in the message.
Of course, this isn't the same as seeing everyone that viewed your profile, but you can at least see everyone that viewed your message or group post. Since I hate this feature, I'm glad this hasn't leaked out to any other Facebook applications.
Beware of False Prophets
Do not give any Facebook application that claims to show you who's viewed your profile access to your account data, and do not download any third-party program onto your computer that promises the same. They do not work. These are basic phishing attempts meant to spam you and your friends or steal your login data. Never click any links on facebook claiming to know who viewed yours, or your friends profiles. They're all scams. Guaranteed.
Will There Ever Be a Way?
So, while there is no current way to see who has actually viewed your Facebook profile, you can see who has recently been in some sort of contact with you through the InitialChatFriendsList, and see who has viewed your comments or posts in a Group or Message. Given the number of (fairly successful) scams based on seeing who's viewed your profile, it's clear that the demand for such a feature is there. But the current anonymity does allow for worry-free browsing of friends profiles without worrying about them thinking (realizing?) you're stalking them. It's a delicate balance that I doubt they'll change, as doing so would ultimately change many people's behavior on the site. Let us know in the comments if you think Facebook should create a "Viewed By" feature or if you like the anonymity as that's currently provided.
Several subtle changes to the user interface have been made in iOS 7, the biggest one being animations, which brings the device to life through the engagement of advanced physics and other visual effects. One of these animations is the new parallax effect, which gives the illusion that the home screen is multilayered, with the applications and background wallpaper each on their own separate planes. Tilting the device around brings the feature to life, using the iPhone’s gyroscope and accelerometer to change the orientation of certain planes. While the feature may be good-looking and fun to play with, it uses up battery, just like every other feature on your device. If you want to save a little bit of battery and aren't really feeling the parallax view, here's how you disable it.
How to Turn Off the Parallax Effect
If you want to disable parallax, simply head over to Settings -> General -> Accessibility -> Reduce Motion and turn it ON.
Once Reduce Motion is enabled, you'll see the parallax effect reduced in the icons, background, and alerts.
The iPhone 5S arrived to the same fan fervor as sugar-hyped tweens waiting in line for the latest Hunger Games movie (which was pretty good actually). Much of the glory and headlines went to the fingerprint scanner on the 5S. No longer relegated to CIA buildings, users were thrilled to see this new feature, Touch ID, included on their phones. Touch ID uses a sensor to scan your finger print in order to unlock your iPhone. You can store up to five different fingerprints, which your phone will remember.
Of course, with any new technology, there are going to be some issues. While the Touch ID feature has been met with plenty of positive reviews, many users have reported the sensor having issues reading their fingerprint. To fix that, here are some helpful tips on getting your sensor to work correctly—all of the time.
Tip #1 - Scan Right-Side Up or Upside Down
Even though the scanner pushes you towards scanning your finger right-side up, you can scan your finger upside down as well. If you find this more comfortable or more accurate, go ahead and use it. And you can try angles as well, since the Touch ID sensor has 360-degree readability, but other angles may be harder to replicate.
Tip #2 - Five Is Greater Than One
You can store up to five fingers in Touch ID, but this is only useful if you have multiple people that you want to be able to access your iPhone. You could also use it just for your own fingers—scanning each one individually. It will cause Touch ID take longer, since it has to decide which finger you're actually scanning, but you won't have to worry about it rejected all five of your prints.
Tip #3 - Five of the Same
Since the Touch ID can remember up to five fingers, you can actually use all five spots for your one finger. This gives the Touch ID sensor 5 times the amount of information for your one finger. So, instead of deciphering between five different fingerprints, it will have a better grasp of your main finger (most likely your thumbprint) and open more accurately and consistently. This is a very simple trick, but has been reported to work very well.
Tip #4 - Organize Your Fingers
If you did go ahead and store multiple fingers, you can easily identify each one by scanning it in Touch ID Settings. When scanning a particular finger, the matching print will briefly be highlighted in the list. That way, if something goes wrong, you know which one needs to be updated.
Tip #5 - Try, Try, Try, Try, Try Again
When unsuccessfully trying to unlock your iPhone 5S, you'll get a passcode prompt after three incorrect tries. But you should know that you actually have two more tries before being asked to try your passcode.
Tip #6 - Cover the Whole Home Button
Like Siri, Touch ID is supposed to get better with time, but if you want a quicker improvement, make sure to have your finger cover as much of the Home button as possible. This helps improve the sensors accuracy, and make sure that it's ready your full print.
Early Introduction Once done try Linux Ubuntu, this time I want to try the Windows Operating System on my Android tablet, IMO SingLe Z5-Core Processor Allwinner A10 A10/BOXCHIP with max speed. 1.2 GHz ARM Cortex A8, ARMv7. WHY NOT ......???
I'll try to experiment Operating System Windows 95 and Windows XP, although not dual boot but it's better to use a PC emulator for Android called QEMU and Bochs.
I. Windows 95
A. Introduction.
First I would try to run Windows 95 on Z5 IMO, why I initially tried the previous version of Windows before this?
Sure was predictable, because he wanted to test if Win 95 is running well on my Android tablet or not?
7. Bochs run on Android (but Boot will run approximately 30 minutes) LOL XD
8. Windows XP ready to be enjoyed.
CONCLUSION:
It turns out that my Windows XP SP2 running on my Android tablet they will not be optimal SingLe-Core Processor with 512MB RAM, a result Opening windows jd bgtu Lama. Not SPTI on Linux Ubuntu or Windows 95 that runs will Smooth.Kemungkinan Smooth for Android with dual-core processor 1 GB RAM.
With additions and adaptations of me for adjustments.
Android has become the most used mobile operating system today and accounts for two-thirds of all smartphones sold in the world. It is an open-source platform and has been made by Google, the highly reputed search engine company. The success of Android can be judged from the fact that in just a few short years of being launched, it has displaced the mighty iPhone to become the most popular operating system for smartphones. In this post we will be talking about what is rooting and advantages of rooting an Android phone.
What is Rooting
Being an open-sourced software, Android offers incredible features to developers and they can access most system files of the OS. However, to prevent the misuse of the OS, Google has set certain limitations on Android. Rooting is the process of gaining complete access to the lowest levels of the Android file system.
How to Root My Android Phone
Android is available in multiple versions, or flavors, and rooting is different for each version. Google also allows phone manufacturers to customize their Android phones. You can easily find a rooting tool that has been created specifically for your phone model. Development community for Android is highly active and simple software solutions are made available within weeks of an Android phone being launched. The xda-developers forum in particular is very active and has dedicated groups for most of the popular Android devices. You can easily find the rooting tool for your Android phone and the step by step instructions to use it on these groups.
The Advantages of Rooting an Android Phone
Rooting gives applications complete access to the Android operating system. With these special privileges, developers are able to create applications that can offer many functions which are not possible on a device without root. Features like complete advertisement blocking for ad-supported applications, complete ROM and data backup of device and using core hardware features are made possible when you root your Android phone. Misuse of this access is also possible and there are special applications that control who is allowed this access and you can set access control. The biggest advantage of rooting is that you can install custom ROMs on your device.
What is a Custom ROM
A custom ROM for Android is a ROM that a third party developer has created. These ROMs are highly optimized, remove all the bloat-ware that comes with the device and add a lot of features. Custom ROMs are also the only way many older Android devices can get newer versions of Android which are not officially available for them. The Cyanogen mod is a great example of a custom Android ROM and is the most popular Android ROM in use today. It is available for almost a hundred Android devices and offers every popular flavor of Android.
Rooting – For a Better Phone
Part of the reason behind the success of Android phones is the amount of freedom the OS gives to developers. All kinds of apps are available for these devices and there is practically no limit on the customization you can do with these devices. Rooting allows you to use all of these applications and truly benefit from all the amazing platforms that the Android development community has created. We are sure this small post would have given basic understanding of rooting and the advantages of rooting an Android phone. by AmanAhad
According to sources cited by Korean sites, the Galaxy S5 could be the first-ever handset in the line to feature an LCD panel. Samsung’s shift is purportedly to make cost savings.
The move, news of which was brought to us in the West by the Galaxy-fixated folk over at Sam Mobile and G for Games, could free up funding for extra features, with LCD screens cutting Samsung's outlay by as much as 20%. The cheaper screen tech could clear the way for the metal shell that many industry-watchers have been lobbying Samsung to include in a Galaxy S smartphone for some time. Although by no means badly received overall, the Galaxy S4's plastic build came in for heavy criticism and was widely unfavourably compared with the HTC One’s handsome aluminium unibody construction. An LCD screen could also help deflect carping in recent years that AMOLED screens don’t offer the same, true-to-life colour reproduction as rival technologies. Other mooted features for the Galaxy S5 included a Touch ID-style biometric technology, albeit using a retina-scanner, and a 20-megapixel camera. Via: Sam Mobile
In Depth It needs a strategy and the right choice of provider
Hybrid cloud storage entails keeping some of your data on premises and some offsite in the cloud. It's becoming an increasingly popular option for small and midsize businesses. How it's best to start by segmenting information, storing locally any data you need to access quickly, and archiving other information in the cloud. Security is also an essential element of the implementation of hybrid cloud storage, but it must come alongside a plan. SMBs should assess what data is being stored, how it is going to be protected, and ensure that it is encrypted and properly protected. It makes sense to use the same vendor for security as for the cloud service itself, especially if they offer consultancy - just check your intended supplier's credentials before you start. Also, as part of your research it's important to check how your data will be used by the cloud provider before signing up.
The strategy
Hybrid cloud storage can be very secure, says Clive Longbottom, Analyst at Quocirca. But SMBs should ask the vendor about how the store the data, as cheaper isn't always better. "Some of the vendors will offer cheap cloud storage because they are using de-duplication at the back end, using all of their customers as the feeds," Longbottom warns. "This can work well for them then as they are working against a massive set of data files, and so the compression they can get will be well in excess of 80%." But if you don't want your and other people's data being used together in this way, you will need a dedicated service, where only your data is being de-duplicated. This will cost more. "The best performance for de-dupe is on files in the clear as well – so the use of encryption will do less de-dupe." says Longbottom. He recommends that where possible, SMBs should use an appliance that does the de-duplication before sending it across to the cloud. "You get the benefits of smaller data sizes, less traffic over the interconnection between you and the cloud – and still get the option for the data to be encrypted before it is sent to the web," he adds.
Changing perceptions
But cloud's real challenge comes in many firms' perception of the technology. "What the cloud vendors have to prove is the security of the data is better and stronger than on-premises," says Tom Holmes, Founder and Managing Director of HR cloud consultant Veran Performance. The risk of data storage in the cloud is far less than those taken in some parts of the business already, he says, citing HR storage as an area which can often be outsourced. Holmes cites the example of one of the firm's previous clients, which had all onsite data stored in a "shed", without proper cooling devices, using out-of-date servers. "What they get by taking reasonably secure data storage in the cloud is far less risk and backup which they do not have. Yet intrinsically it feels like it's higher risk to put things in the cloud, no matter how clunky things are."
Consultancy
It's often wise to get some expert advice on cloud security before you even segment your data. SMBs should look to invest in an approach which offers them a combination of consultancy and high quality technology where possible. This should incorporate the underlying infrastructure, SLA management security, and advice and guidance, says Andrew Carr, CEO, Bull UK and Ireland. Such services are becoming more available, with vendors offering made-to-measure hybrid cloud models that come with integrated security capabilities. "Today we are seeing this kind of approach become increasingly popular with SMBs as issues around cloud security dissipate," Carr says. But SMBs must first make sure onsite data is secure. "I think this is where vendors and the channel can come in," says Longbottom. "They can provide corporate security services as part of putting in place a hybrid solution, making sure that the customer meets all its regulatory data and information requirements as part of the project." Although many vendors aim at the midmarket and above, Longbottom recommends looking at Ctera, which offers a service to the SMB via the channel; or for more high end services, Nasuni, Nirvanix or StorSimple, which was recently bought by Microsoft. Securing a hybrid cloud involves a strategy, but you have to make sure you choose the right provider. Once you've secured some of the data onsite, with thorough research your offsite data will be just as, if not more secure.
Next year is likely to be one of consolidation as cloud becomes more prevalent and businesses embrace the trend as they look to transform the way they work. Here are some predictions as to how the cloud will evolve over the next few months.
The cloud will become more mainstream
In 2014, I believe that the cloud will become more mainstream. Many businesses will finally admit they can make savings and gain a competitive edge by moving to the cloud while the laggards will slowly move into the cloud. Cloud email management and productivity will be the easy and early wins for businesses next year. This quick and simple investment will help IT managers control the Shadow IT created by consumer cloud services like Dropbox, Evernote or Box.net. With cloud certification, IT managers are confident that their security requirements are being met, and will be keener to move to the cloud to take the business to the next step.
Leveraging third party cloud providers
In 2014, businesses who can't wait for their chosen cloud service to mature enough to be comparable to their expectations will start to leverage third party cloud providers in a hybrid cloud model. This will be possible by using two cloud providers who cooperate to provide an enhanced level of functionality. This collaboration will in turn solve their current problems and help them move to the cloud, and get the service they really need faster.
The rise of personal cloud
We expect the cloud to be the main location where growing data can be stored, accessed and analysed. One of the key developments for providers seeking to attract customers will be to add software and services to enhance their offering and jump on the mobile trend. By getting those added services in place, IT managers will be more able to control the Shadow IT of hidden data this switch will create.
Greater innovation
In 2014 I think the cloud will start to offer significant upticks in technology and functionality for customers. As per their nature, cloud vendors are capable of being more dynamic and innovative than on-premise vendors of classic technologies like email archiving. Add-ons and updates are automatically made by the vendor so delivering innovation is far easier. As an example, email archiving that is rigidly stuck to the LAN will be eclipsed by cloud vendors (like Mimecast) who can offer more than simply the storage model, so many are locked into to. Offering ways of exploiting data to drive business value and business intelligence is a good example of how this might work.
Security will be key
I believe that security has become mainstream for both individuals and companies. For example, email is the first point of contact in any company and represents a massive amount of corporate data. However, it is often underestimated as a potential security threat. Most companies only see inbound spam as a threat, but in reality there are more issues with outbound emails. As spammers, scammers, botnets and phishers struggle to get emails past the classic email security defences, they are increasingly turning to the use of compromised corporate accounts. Access to corporate accounts in many large multinational organisations can be rented for this purpose; or more increasingly targeted phishing attacks are compromising corporate accounts to allow the attack long term access under the radar. Due to recent events that made the headlines, I think 2014 will be the year for companies to concentrate on security and see those threats with a new eye.
Information will not just be for storage
We're getting quite good at amassing information, but in 2014 the emphasis will change to the use we are making of it. Compliance is the key driver for archiving decisions, which means huge amounts of data being stored – much of it in the cloud – ostensibly for nothing more than long term data retention. From email archives, we now add files, voice, social media streams, and so on. The archive is getting richer and richer, but as yet there is insufficient focus on the potential utility of that data. So, in 2014 we'll see data science, analytics, big data if you will, emerge around the archiving ecosystem, with business decision makers keen to gain insights and understanding from the data, and metadata, that they are storing.
It's highly recommended you keep your Internet browsers running the latest version, to avoid any security issues and to have the most current features available to use. Knowing the version number of your browser is key to determining if you need to upgrade your browser. To determine what version you're running view the About page for each browser, as mentioned in the steps below. by AmanAhad
Tip:
Internet Explorer Firefox Chrome
Microsoft Internet Explorer users
To view the About page in Internet Explorer, on the menu bar, click Help and then About Internet Explorer.
Tip: If you don't see the File, Edit View menu press the Alt key.
This will open the Internet Explorer About page, where you can view the Version number, as shown below.
Mozilla Firefox users
To view the About page in Mozilla Firefox, on the menu bar, click Help, About Mozilla Firefox.
Tip: If you don't see the File, Edit View menu press the Alt key.
This will open the Mozilla Firefox About page, where you can view the Version number, as shown below.
Google Chrome users
To view the About page in Google Chrome, click the Wrench icon near the top right of the Chrome window (just below the X button that closes the window), the click About Google Chrome.
This will open the Google Chrome About page, where you can view the Version number. Google Chrome will even let you know if your version is up to date.
When it comes to download manager; Internet Download Manager is one of the best you can ever have with it unique and great features. Currently I formatted my computer and i wanted to reinstall Internet download manager back which I did but I could not download videos from YouTube and other files with IDM due to IDM integration problem with Mozilla Firefox Browser.
Normally, You know that internet download brings out a pop up that sticks to your browser which you can click and download but the pop up download button don’t show on my Mozilla Firefox and also other browsers. Then I started my research and I notice that the extension that comes with my Internet download manager is not compatible with my updated browser.
And since the Extension is not compatible with the browser I need update it and since the extension is not available in Mozilla plugin store so you need to download it and install the extension which I will show you where to download it and how to install it because doubling clicking it won’t install it.
Where To Download And Install Internet Download Manager Updated Extension On Mozilla Firefox
Now first before you start you need to find out if the IDM extension is not compatible with your firefox browser, to know this is quiet easy.
To locate your Mozilla browser extensions; Follow these steps
Open your Mozilla Browser
Click on the Tools tab
On the Drop down menu click on the Add-ons
Then Locate Extension in the new window that will pop up
Once you are there it will list out all the Extensions you have installed in your firefox browser, then locate IDM CCand you will see that the extension is not compatible and you can not update it from that tab so you need to download it.
To download the updated IDM CC extensionClick Here to download it.
After downloading it, go back to the Add-on tabs that open showing your browsers extension then click on the Gear icon at the top right corner of the browser.
After clicking on the gear button, a drop down menu will show, click on the Install Add-on from file then locate the downloaded extension and install it.
You will get a confirmation that your extension have been installed successfully, so you just restart your browser and you are done.
So I hope you understand the post here on how to solve the internet download manager firefox integration problem and also how to install extension from file. Thanks for reading please kindly subscribe below to get updated with tips like this. AmanAhad