Sunday, August 28, 2011

Which precautions to take while using internet?

The technology revolution ensures that everyone has a use for the internet. The Internet is an indispensable source for the life today, thanks to this device we can do many things from a computer, either using e-mail, browser, download multimedia files, chat, via online play and games, among other activities.

 However, we must be careful when we use the Internet, because it always runs the risk that a hacker wants to infiltrate in our system to alter the private documents that are stored on the hard disk. That is why we will cite below some precautions to be taken into account to avoid running the risk that our data is altered or removed. To use the Internet we should take a lot of precautions, because the computer can be attacked by a virus or spyware, to prevent such an act we should install a good antivirus program on our computers, so that way it can locate immediately any suspicious activity that may be executed when we use the Internet. It also must be installed an antispyware to complement the antivirus, which will help to control the adware and malicious files that are spread on the Internet.

 Precautions to take while using internet in Cyber Cafes

When you are going to to seek any information, you must be very careful with advertising messages, as these situations can redirect us to sites of dubious origin. Closing those windows or omitting them would be best to not be swayed by advertising and messages displayed on web pages.There are many browsers today to help solve this type of problem; an example is the Mozilla Firefox and Google chrome, which are browsers that show the websites with the least possible publicity, so the user can view a site clean and free of junk mail. It is also recommended removing temporary files and cookies stored by your regular browser, because the spyware often stay in that direction.
The first important rule is to never tell the cyber cafe owner (or anyone else for that matter) your email ID and password to check your mail. This may sound dumb but keep in mind that many old folks and small kids have no idea about the risks of spam and information theft. Email IDs and passwords should always be entered by their owners. At most, they should ask for guidance to the log-in screen to enter their details personally. Another important rule is the practice of people coming with their floppies, CDs or pen-drives to send their resumes via email. Usually, the individual computers have neither floppy nor CD drives (and some places prohibit independent use of pen- drives for security reasons). The media is hence run through the server itself before being transferred to the relevant individual’s PC. After sending these documents, the user forgets about deleting the documents on the original server. More than simply emptying the Recycle Bin, you should ensure the cyber cafe has a file shredder program to properly delete the files. Resumes contain many personal details, and you should avoid all risk of these being exposed.
Other options you should be aware of when surfing include disabling the option for “Remember my ID on this Computer” when surfing. Make sure to turn off the autocomplete option in the browser. This can be done by accessing the Tools > Internet Options > Autocomplete tab in Internet Explorer and Tools > Options > Privacy > Password tab in Firefox. There are also options to clear your private history / temporary internet files while surfing in case you don’t want your browsing history known.
Always make sure to logout properly when using messenger software or mail accounts. Some people make the mistake with IM software in simply closing the program, which does not shut it down but minimizes it into the system tray. This should be taken care of to ensure the next user doesn’t use your IM account as he wishes. As specified above, make sure the options for remembering passwords or IDs is disabled. You should also take care to disable options that allow archiving of messages as text files. This helps in keeping conversations private and personal info usually shared online safe. Finally, whenever you go to a cyber cafe, ensure it has the most up-to date anti-virus and spyware definitions. These will help root out Trojan horses and keyloggers responsible for tracking your activity and recording your passwords/IDs.

Safety Precautions while using Social Networking Sites

There will be some identities that will add you up in your social networking site. The thing is, if you don’t know those identities; even if they are a friend of your friends, still, DO NOT accept their requests. There are already users who have been a victim of stolen pictures, malicious comments and posts on their walls. Accept only those who are known to you.
Even on your yahoo messenger, Skype or any other online communication accounts, do not
automatically add people who will try to befriend you. Some of these people have malicious intents and might try to lure you like giving you money and will lead to online pornography.
On social networking dating sites, make sure you don’t give too personal information right away, especially your bank accounts, you r specific locations or any information that might give your mutual contact access to your personal life. Know your contact first very carefully before giving on a meeting.


Be keen about your posts, your photos and disclosed information that you put online. Remember that these things can be seen by people around the world and it maybe deleted online but it can somehow be used and saved in someone else’s computer and you don’t want your identity to be stolen from you.
There are a lot of precautions you need to know online but the bottom line is keep your personal information safe.

Internet banking is not safe. Here are some precautions to secure your account


 The internet banking is safe provided you take some security measures.
Internet banking facilitates the customers for online financial transactions on the banks web sites.
We can find the following features in online internet banking system:
• Financial transaction such as account to account transfer, bill payment, wire transfer etc.
• Electronic bill display and payment.
• Funds transfer between customers.
• Financial transactions for sales and purchases.
• Loan payment.
• Update of savings accounts.
• Online bank statement status. 


Here are some tips to secure your account.
~ First of all, Buy good antivirus, It is very important to protect against viruses. Such antivirus is Quick heal, Kasper sky, Net Protector etc.
~ Scan Your Computer Daily with antivirus to ensure your system is safe.
~ Enable Firewall for better protection.
~ Avoid access net banking from cyber cafe or any other PCs having virus.
~ With in periodical intervals, change your net banking password.
~ There is Last log-in Date in your net banking account. Check it daily.
~ Use Latest version of Browser like Mozilla Firefox 3.1 and above,IE 7.0 and above,Opera 9.5 and above,Safari 3.5 and above, Google chrome,etc.
~ Use Newer Operating System.
~ Do Not Disclose your Password to anyone.
~ Before log-in into your account check the website URL having https:// . it means it is secured site.
~ Do not click on any link showing Update Your Password .
~ There are lots of Pishing Cases . it is a fraudulent attempt made through phone calls, sms, email etc.
There are a lot of precautions you need to know online but the bottom line is keep your personal information safe.

Keep Your Child Safe on the Internet


What's even more troubling was is that a majority of parents of kids 10 and under seemed largely unconcerned by their children's use of the site! Guess they haven’t seen the obscene content doing the rounds and haven’t heard of online abuse and cyber-bullying either, huh?
Children cannot help but be fascinated with the vast resources that they encounter on the internet. About 90% of school age children have access to the internet either at school or at home. With this accessibility, children have become so skilled that they can search many different sites. However, they forget that there are privacy and safety issues to think about. Internet surfing is different from going to the park where you see different things without anything to worry about. Make sure they understand that online people are not always who they say they are, and that there are some dangers to using the internet. The more you openly talk to your children about your concerns and invite them to keep you informed about anything that makes them uncomfortable, the safer they’ll be.
I suggest the following general  precautions for child safety on the internet.
  • Don’t share personal information.
  • If someone crosses the line and makes you feel uncomfortable about what is happening, stop and report it immediately.
  • Don’t meet anyone in person without your parents’ permission and without being accompanied by them.
Well, for those of you who want to know how to protect your kids from harmful content on the Internet, here are a few parenting tips to help you out:
  •  Encourage your child to hang out with friends, go for movies or have sleepovers rather than connect with friends on social networking sites that open them up to all kinds of dangerous elements.
  •  While kids must learn to use computers and that includes the Internet, avoid unlimited usage. Allot a specific time in the day (preferably when you are in the house) for your child to browse the Internet or download child-friendly content. About half an hour of surfing should be good enough unless she needs to get a school project done.
  • If your kid likes playing games on the computer, install softwares for him that don’t require Internet access.
  •  Help your child use the Internet wisely. You could recommend certain sites that might be educational or fun too. However, this does not mean your child will never come across harmful/ disturbing content. Also explain to him why you’d like her to stay away from social networking sites till she is of the right age.  Educate your child about the evils of the Internet – adult content, hate sites and violence. Ask him to inform you in case he comes across such content so that you can take the necessary precautions to protect him from these in future.
  •  Install blocking software on your computer that blocks access to certain objectionable sites and prevent children from disclosing personal information on the Internet. This will help you restrict your child’s access to certain sites you feel aren’t appropriate.

It may take some time to work things out between parents and children when comes to internet exploration, but this is not much of a problem with those who show real concern for one another. Parents must admit that their children have to use the internet. In their school work, they need it to easily access information that would normally take a long time when going to the public library. Parenting for the internet is an emerging new facet of raising children in the information age.



Saturday, August 27, 2011

Secure your Android phone with Antivirus and Antimalware

 Android mobile users are highly secured by using Antivirus free application which is provided  on Android market.Whenever a new application is added to your phone, antivirus detects that app and scans  by checking it in its own database which contains known malicious apps.This functionality makes you free from viruses, malware and exploitation of OS and ensures the security for your applications and data. We are very well aware of the fact that everyone uses electronic mail, cyberspace, chiting chat, pasturing, downloading, uploading, and many other real life adroitnesses and 90 % or more opportunities for virus are these applications with. exe extensions so for safety precautions firewalls or something like that is always deployed to protect OS of your device. So if we talk about surety, it may include Telephone set and number drawing, malware detective work, spyware espial, and many other features.Remember that never ever try to partake in you personal information at any land site or anywhere in web browser like Countersign, Credit card particulars, and many others.

Malware threat:
Malicious soft wares are created to interrupt your operation and gain access to your resources.By installing the antivirus free app, Android user can scan all the applications using malware scanner.Malware threats are surprisingly increasing these days and a recent study shows that 3 out of 10 Android users are getting these threats every year.Android Trojan is a new malware attack that can listen and record the phone conversations. In addition, network security threats and threats by SMS also increased.
Malware protection by Antivirus free:
Upon considering all these attacks and threats Android is updating its malware scanner.Now, it has increased its malware alerts to the users by a huge percentage.Juniper Networks stated that Android increased its malware alerts by 400%.
So, Antivirus free is an advisable app for every Android user.In addition to the malware protection, this app provides you spyware protection and Trojan protection.DroidSecurity SMS gives protection to your content by blocking spam text messages.DroidSecurity alerts you whenever you are trying to open a application that has virus, thus preventing you to open that malware application.

You can download this Antivirus Free app from the Android market.


Tuesday, August 9, 2011

Wi-Fi Internet Saftey Tips

Today, as the more and more people get connected to the internet, the public places offer the internet thru free Wi-Fi facilities to all people stop by. This is good news for most people, but remembers that the facility is in public domain. It means, the bad people could harm
you and your activities on the internet. Just because most wireless routers have a firewall to protect you from the internet doesn’t mean you’re protected from others connected to the same network. Lots of wireless hotspots these days are completely unencrypted, usually so
they’re easier to connect to. “When people are at the Airport often they will take the time while waiting for the flight schedule, with WiFi access using a laptop though just to see and reply to multiple e-mail. What is not known to WiFi is a security risk of data especially related to data traffic that occur when starting Access.
Login credentials and the traffic that occurs within the network-sniffing going to happen even before an e-mail sent over a Wi-Fi hotspots, so it is generally the mode of data theft in the network, without being detected, “explained Cameron Camp, malware researcher ESET.
One thing that really look out for is when there is a hotspot network with an unknown name or a name similar to the official network. Increase vigilance when in the hotspot network is not secure, especially the access that doesn’t require a password. Problems can occur from the proxy connection, which could intrudes WiFi communication, capture, copy and store copies of data on computer players who are in the local network and then sends it via a real Wi-Fi. Symptoms of the scam could be felt from the very slow data transferred which doesn’t realize by users that think that a normal situation because they use public WiFi. Associated with the level of security in public spaces that provide wireless access, Yudhi Kukuh, Technical Director of PT. Prosperita-ESET Indonesia adds, “When you make purchases online, or conduct financial transactions, make sure the web address begins with” https “instead of” http “means that data traffic that uses the web address will be encrypted. So it needs to be underlined that the ease of not serve as the primary reference when in public areas with hotspots – always use the mode of early warning and notice of any warning given.
Some of the threat that threatens the use of Wi-Fi connection:
• Evil twin login interception: a network set up by hackers to masquerade as the Wi-Fi hot spots is official.
• 0-day OS / app attack attempts: threat attacks through exploits that are not known.
• Sniffing: intercept attempts to achieve both software and hardware and computer to log traffic in a network.
• Data leakage (man-in-the-middle attack): Actors of cybercrime can modify network traffic and make the user unaware as if he was conducting transactions with banks, when in fact the data sent by the user sent to computer crimes The ”
ESET Smart Security 5 would be the latest version of ESET Antivirus provides the features that will be useful to secure data connection and the user when performing a WiFi connection. One of them is the warning given to alert the user whenever the user is connected with WiFi in public places, and then provide protection. Antivirus products that once a new generation of products ESET categorize WiFi connection at the maximum security level.
Here are few tips to use public WiFi securely:
Use a personal Firewall
You may never know how secure or protected a public WiFi network is.
Hence it is best to have your personal Firewall which will prevent malicious content from infecting your laptop.
Secure yourself with VPN
Most offices offer VPN (Virtual Private Network) for accessing their data. This is specially used by employees who have to access official data from outside the office. VPN provides secure access to official information.
Disable Wi-Fi Ad-hoc Mode
You should only allow access point networks that you have created using your Wi-Fi software or you can use network connections in Windows XP. Don’t allow instant network connections that you have not approved of or are aware of. When in a hot spot you may pick up other
Wi-Fi networks that you do not want to access or allow access to your laptop. Disable ad-hoc mode before entering a hot spot.
Avoid doing financial transactions
While many of the bank websites are SSL protected, it is advisable not to do any bank related transactions in a public hotspot. You are at risk of exposing your login credentials to eavesdroppers.
Don’t Show Off Your Wi-Fi
When mobile users are in public areas such as a hot spot, it is not the time to brag to strangers about your Wi-Fi capabilities. Always be discreet when working and don’t let others view your work. You could end up making yourself and your mobile gear a target for theft.
Do not share files and folders
If you are a frequent public hotspot user, it is best you do not share any files or folders on your laptop. In case it is essential to share folders, then protect them with a password.
Folders should be private
Making your folders private on your laptop will make it less appealing for a hacker to try and gain access to your documents. In a hot spot you don’t know who is working around you or who might be attempting to access your laptop.
Potect your Files with password
Another step to securing your data and making your work a less desirable target is to password protect specific files. There are a variety of software programs available which can provide you with password protection and the added peace of mind that it will bring.
Remember to password protect any important files before using a hot spot.

Monday, August 8, 2011

Free multi-user video chat application on Facebook

Social Hangouts is a free multi-user video chat application on Facebook. An app developed by Social Hangouts released a self named app that works within Facebook, that allows you to have group video chats with your friends on Facebook. Social Hangouts allows up to 20 users to join in on the group video chat. The availability of highly provocative features in Group Video Chat makes it worth using.
social hangouts
Group Video Chat is a simple, easy to use application; you can access the app without even leaving Facebook and you could all be having a live video chat in no time! The video calling feature was launched in conjunction with Skype, and is accessible through Facebook Chat.
It allows Facebook users to have one-on-one video chat with friends and family members as well. The best bite is that it is extremely a kid’s play to Start Using Facebook Video Calling. To use Social Hangouts, all you have to do is to allow this application and send requests to your friends and family members to join Social Hangouts.
Here is how to use Social Hangouts in a simple step-by-step process:
Step 1: Select “Allow” on the request for permission page.
permission for social hangouts
Step 2: Click on the “Get Started” button on this page.
Step 3: Now click on the name of contact you want to chat with and then click on the Video calling icon in the chat window.
Step 4: You will be prompted to download a plug-in for your browser.
Step 5: That is it, you will now be able to video call and group chat with your friends using Facebook.
social hangouts calling screen

Once the application is installed on your Facebook account and your friends have accepted the invite, just choose your friends from your friends list and invite them over for a video chat. Not forgetting the quality of the call, it is absolutely magnificent if you call someone.

 Here is the Link: Click Here

Sunday, August 7, 2011

LG mobile Codes

Today tip will help you to play with your LG mobile phones using secrets codes. These secret codes will work on most of the LG mobile handsets. You can display the hidden information of LG handsets and troubleshoot the routine problems with the help of these codes.
Follow the list of latest LG codes list: 

Code                                        Action 
2945#*#                                                To access the test mode of the set
2945*#01*#                                          Use to display the secret menu of LG mobile set
*8375#                                                   Use to display the mobile software version
*#06#                                                     To display the IMEI Number of the mobile
2945#*70001#                                     Use to manage Simlock menu for LG (LG 7010, 7020)
277634#*#                                            To set the defaut settings of mobile
1945#*5101#                                       Use to manage Simlock menu for LG (LG B1200)
2945#*5101#                                       Use to manage Simlock menu for (LG 5200, 510W )
2947#*                                                   Use to manage Simlock menu for (LG 500, 600)

Saturday, August 6, 2011

Free Android Apps


In the constant quest to offer you some new and interesting apps that you’ve never heard of before, I decided to take a stroll through the “Just In” pile of apps and see if there were any unique or interesting ones that caught my eye. The following five apps interested me because, at least in my opinion, they are quite useful – though so far they’ve been hidden in obscurity.

Display Your Own Sign With LEDr

One app that appears fairly simple, but is actually pretty useful, is the LED sign app called LEDr. The app is pretty easy to use – you just type in the message that you want to display, the lighting style, and the light color – red, blue, green, yellow, purple or white. You can even choose multi-colored lights!

 

The types are LED and square. Now, the LED sign scrolling across your Android screen looks pretty cool from. However, close-up it can look a little fuzzy. The square layout on the other hand, actually fills squares in a grid on the screen, rather than little, simulated LED bulbs, making for a well-defined message from up close. The scrolling motion distorted the snapshot below a little bit.
If you’re creative, you could really put this little scrolling LED sign to good use. Put it up near your office computer when you have to run off for a little bit, with a message for your co-workers. Or leave it on the counter with a scrolling message on it for your kids to read when they get home from school. Be creative!

Another really cool app that has not received its fair share of notoriety yet, is Droidin’. Given, that’s probably because not everyone has discovered it yet, but when Facebook and Twitter mobile apps are so wildly popular, I have to suspect that a mobile LinkedIn app will be just as popular.
Just about all of the core LinkedIn components are included, including posting updates, searching jobs, checking your inbox, or browsing and managing your groups.

Figure Out Your Sleep Patterns With Sleepmeter

Now, if you’re anything like me – a workaholic – then you probably also don’t get a whole lot of sleep. This isn’t anything to brag about – lack of sleep can really hurt your health after a while. So, if you’re really not sure how much sleep your getting or what quality of sleep it is, you may want to give Sleepmeter a try.
With Sleepmeter, you basically keep a running diary of how much sleep you had, as well as the quality of the sleep, including whether you had any dreams and what type of dreams you had.
All of your sleep history is logged, and you can view it under “History” and “Statistics”, but by far the coolest feature is the “Graphs” tab, where you can see a running graph that shows you just how much sleep you’ve been getting each week.
Having such a chart and a daily log lets you identify any patterns that you may be able to fix with just a small lifestyle change.

Another category of Android apps that’s really popular is exercise and fitness. There are countless apps out there in the genre. However, when it comes to the specific exercises that help the most – doing repetitions for a certain period of time – there aren’t many apps that are specialized enough to handle that.
A HIIT Timer actually lets you build an entire routine of exercises, with the number of repetitions and the amount of time for each set, and it’ll actually coach you through the entire routine.
During the session, the screen offers a big display of the time remaining per rep, the number of reps, the exercise you should be doing during this round, and of course the overall remaining time at the bottom.

The final app that I wanted to cover is one of those things that you just don’t think about until you get yourself in trouble.  One great way to protect yourself from any sort of your mobile phone activity getting out there is quite simple – delete it. An awesome app simply called History Eraser offers to clear every area in your Android phone that stores a log or history of your activities.
It’ll wipe out your Internet history and cache, your call logs, your text message logs, and more. You can even configure the program to auto-start when you boot your phone, and you can have it automatically clear everything each time you turn the screen off. This ensures that even if someone grabs your Android and starts searching through it, there won’t be anything left for them to find.

Your Android Phone is old and outdated? Dont worry..Read Below!

If anyone were to craft a Toy Story homage based on smartphones, it would be a depressing tale. Smartphones are bought, loved, and then discarded – often all within two or three years. While these older smartphones can sometimes be sold or traded, they’re usually left to be forgotten in a bottom drawer or the bottom of a trash can. These out of date smartphones aren’t useless, however. They can often be adapted to other purposes, makes it possible to squeeze a little extra value from them.

Portable Audio Player

Even the oldest smartphones have sufficient power to play portable audio, and the small size and excellent battery life makes discarded devices the perfect candidates for an audio player.
If you’re interested in using your Android in this manner, I suggest downloading a mobile player such as Winamp to manage your mobile library. Put your chosen player’s widget on the primary screen and then par down the number of screens to just one.
However, you don’t have to stop there. While you may not have data service, you can still connect to WiFi, which means your Android can access online radio services like Pandora and can use podcast management software like BeyondPod.

Handheld Gaming System

Chances are your newer Android smartphone can play more games than your older one, or play them more smoothly. So why turn your old device into a game system?

Battery life is one reason. Games require the display to be one and often place a heavy load on the hardware, which can tear through a battery in three or four hours. If you use your phone constantly, having an alternative device that can be used solely for games can take a load off your primary phone’s battery.
This can also be a great toy to hand off to a young child. He or she will be able to play games, and you don’t have to worry if the device is smashed – it may cause some heartache, but at least you won’t be out some cash.

WiFi Phone

Your old smartphone may not have data service, but that doesn’t mean you can’t make calls. By using Skype, it’s possible to make calls via a WiFi connection, which will continue to work. Google Voice is also an option.
Whatever you choose to use, your old phone can be used just like a normal one as long as it’s on your WiFi network and the VoIP app you are using is active. The WiFi phone can be used as a backup and/or used as a landline replacement.

Portable Hard Drive

Android phones connect to PCs for data transfer quite easily, which makes them candidates for use as mobile storage devices. My current Thunderbolt, for example, has almost 40GB of storage space available. Although older phones may not have quite that much, they likely can support at least 16GB with a SD card upgrade.
Old phones are not the most ideal portable storage solutions, as they’re larger than USB drives. However, because a smartphone has a display it’s possible to browse the files currently on the device, something no USB drive or portable hard drive can do.

Alarm Clock

If all else fails, you may want to throw your old smartphone on your night stand – and leave it there.
Using a smartphone as an alarm clock is nothing new. However, dedicating an old smartphone to use as an alarm clock has its advantages. Your phone no longer has to be beside you at night, which means you can eliminate the annoyance of 4am texts from not-so-sober friends.
If you want to dedicate yourself to this use, you can even buy a dock for your old Android phone. This will keep your device charged, and some docks offer speakers as well, turning your device into a bedside audio player as well.

Improve Your Cell Phone Battery Life

By far one of the most disappointing features in just about every smartphone these days is thebattery life, which for most of us requires at least one charge per 24-hour period. That’s not too bad, but what if your phone isn’t quite lasting the day?Are you a power-user or do you simply need a few quick tips on battery maintenance?
It’s time to get a grip and take control of your power consumption. Below you will find power-saving tips to help squeeze as much juice out of your smartphone as possible.


It’s no secret that your phone’s display is the largest drain on power that your device encounters. The brighter your screen, the more energy is required to power the backlight. By limiting your screen’s maximum brightness, your battery should see less use and you’ll have more power left at the end of the day.
Most models these days come with a light sensor that detects ambient lighting conditions and adjusts the screen brightness accordingly. Whilst this is great at night, or for checking your cell phone in the cinema without blinding everybody, in full sunlight your phone will be maxing out it’s brightness setting, and eating up a lot of power. By limiting the brightness you can stop this happening, though you might need to duck into the shade to read your email.

The time it takes your backlight to time-out can also affect battery life, so to boost your cell phone battery life, try reducing this to no more than a minute (after all, it won’t take you a minute to read a small screen’s worth of text).

Unfortunately wireless technology is still not that efficient when it comes to power usage. In a few years we’ll be laughing all the way to the power bank, but for now it’s best to disable Wi-Fi if you don’t intend on using it for a while. Some phones will automatically connect to any public network they encounter, so your phone could be wasting your battery in your pocket with absolutely no benefit to you whatsoever.
As for Bluetooth – I never understood the benefit of leaving it on constantly anyway. Unless your life is incomplete without that little blue “B” in your status area then ditch it, it doesn’t take long to turn on when you need it anyway.

Similarly, GPS is another big drain on cell battery. Sure, it’s great for checking in on FourSquare or adding your location to a tweet but constant use will severely affect your battery life. Whilst on battery power, it’s best to avoid GPS intensive applications like mapping tools (save them for the car).
On the iPhone if an application or web page requests your location then granting permission permanently allows that app to use GPS. If you never use the location aspect, or simply don’t see the point then denying these requests will limit potential GPS use, thus saving battery. Disabling use of GPS altogether might appeal to those who literally find no use for satellite navigation in their lives.

If you find yourself in a situation where you need your phone simply for SMS or calls, and have no idea when your next charge will be, then disabling 3G will help save you precious battery. I have experienced this first-hand on my iPhone, after a day without any 3G (or indeed GSM) use at all I can make it to the evening with around 50% charge. Under similar usage with 3G enabled, a day of my phone sitting in my pocket results in around 25% or less charge in the evening.

cell phone battery life

If you don’t need the mobile web, aren’t sending multimedia messages or video calling then you won’t need 3G and will inevitably be grateful for that extra juice. If your device supports it, switching off data altogether will leave you without the net but still able to make calls should you desperately need to.

Multitasking on Android and iOS is handled slightly differently by each operating system. iOS freezes the application in its current state, though apps like iTunes and media players will continue downloading or playing in the background. Android operates similarly, but with greater scope for true multitasking with apps able to stay awake in the background, sucking up power more-so than they would on a friend’s iPhone.

extend cell phone battery life

To stay on top of greedy applications try an app like Autorun Manager to stop unwanted software starting up when you boot your phone and JuiceDefender to better manage your Android device’s power. Conversely I’m not going to recommend an “app killer” as I’ve read conflicting reports over whether killing background apps is any good or not, considering many consume more power starting up once you’ve killed them an hour or so ago.
For both iOS and Android phones avoid apps that require a lot of resources, such as capturing video or playing games.

Your phone’s vibrate setting consumes far more power than a simple audible alert, so by disabling it you can save some juice. Similarly notifications in general consume power, switching on your phone or causing it to buzz in your pocket. If you find yourself simply dismissing them constantly then disabling the least useful will save you both battery and patience.

Modifying your phone’s software can really make all the difference, especially when it comes to Android phones. Rooting your Android allows you to replace your bloated branded OS to something a little more lightweight without all the power-consuming bells and whistles you never use.
Similarly jailbreaking your iPhone allows you to install something like SBSettings which provides quick access to toggle bluetooth, wireless and so on.



Tuesday, August 2, 2011

Apple Iphone Secret Codes 2011


Hi Friend I list out some iPhone Secret codes,but it is your own risk.

*3001#12345#* + tap Call – You will enter the enter Field mode.

note : Field Mode include in more then inner settings in your IPhone, so use carfully.

*#06# Shows your IMEI – See the IME number

*#21# + tap Call – To access call forwarding enabled or disabled.

*#30# + tap Call - To enabled or disabled the presentation of the calling line, presumably the number of the party placing the call.

*#43# + tap Call – To call waiting is enabled,similar to fax,sms,mms, packet data etc..

*#76# + tap Call – Check whether the connected line presentation is enabled or not.

*#61# + tap Call – To see the number for unanswered calls.

*#67# + tap Call - Check the how many calls forwarding when the iPhone is busy.

*#33# + tap Call – Check for call control bars. Call barring is enabled or disabled for outgoing.

Useful Codes of Android Phones

        Recently I got a Google Android mobile phone "Samsung Galaxy I7500". While I'm loving playing with it, I also found some interesting secret codes which can enable/disable lots of hidden settings in the mobile phone. These codes can also show many useful information about the phone.

So in this topic, you'll get several hidden secret codes which can be used in any Google Android mobile phone to access things which are not accessible by default.

FYI These codes have been obtained by decoding various .apk files present in the phone firmware.

    *#*#4636#*#*

This code can be used to get some interesting information about your phone and battery. It shows following 4 menus on screen:

    * Phone information
    * Battery information
    * Battery history
    * Usage statistics

    *#*#7780#*#*

This code can be used for a factory data reset. It'll remove following things:

    * Google account settings stored in your phone
    * System and application data and settings
    * Downloaded applications

It'll NOT remove:

    * Current system software and bundled applications
    * SD card files e.g. photos, music files, etc.

PS: Once you give this code, you get a prompt screen asking you to click on "Reset phone" button. So you get a chance to cancel your operation.

    *2767*3855#

Think before you give this code. This code is used for factory format. It'll remove all files and settings including the internal memory storage. It'll also reinstall the phone firmware.

PS: Once you give this code, there is no way to cancel the operation unless you remove the battery from the phone. So think twice before giving this code.

    *#*#34971539#*#*

This code is used to get information about phone camera. It shows following 4 menus:

    * Update camera firmware in image (Don't try this option)
    * Update camera firmware in SD card
    * Get camera firmware version
    * Get firmware update count

WARNING: Never use the first option otherwise your phone camera will stop working and you'll need to take your phone to service center to reinstall camera firmware.

    *#*#7594#*#*

This one is my favorite one. This code can be used to change the "End Call / Power" button action in your phone. Be default, if you long press the button, it shows a screen asking you to select any option from Silent mode, Airplane mode and Power off.

You can change this action using this code. You can enable direct power off on this button so you don't need to waste your time in selecting the option.

    *#*#273283*255*663282*#*#*

This code opens a File copy screen where you can backup your media files e.g. Images, Sound, Video and Voice memo.

    *#*#197328640#*#*

This code can be used to enter into Service mode. You can run various tests and change settings in the service mode.

    WLAN, GPS and Bluetooth Test Codes:

*#*#232339#*#* OR *#*#526#*#* OR *#*#528#*#* - WLAN test (Use "Menu" button to start various tests)

*#*#232338#*#* - Shows WiFi MAC address

*#*#1472365#*#* - GPS test

*#*#1575#*#* - Another GPS test

*#*#232331#*#* - Bluetooth test

*#*#232337#*# - Shows Bluetooth device address

    *#*#8255#*#*

This code can be used to launch GTalk Service Monitor.

    Codes to get Firmware version information:

*#*#4986*2650468#*#* - PDA, Phone, H/W, RFCallDate

*#*#1234#*#* - PDA and Phone

*#*#1111#*#* - FTA SW Version

*#*#2222#*#* - FTA HW Version

*#*#44336#*#* - PDA, Phone, CSC, Build Time, Changelist number

    Codes to launch various Factory Tests:

*#*#0283#*#* - Packet Loopback

*#*#0*#*#* - LCD test

*#*#0673#*#* OR *#*#0289#*#* - Melody test

*#*#0842#*#* - Device test (Vibration test and BackLight test)

*#*#2663#*#* - Touch screen version

*#*#2664#*#* - Touch screen test

*#*#0588#*#* - Proximity sensor test

*#*#3264#*#* - RAM version

NOTE: All above codes have been checked on Google Android phone Samsung Galaxy I7500 only but they should also work in other Google Android phones.

In this topic, I'll reveal 3 hidden modes in the phone:

    * Fast Boot mode
    * Download mode
    * Recovery mode

WARNING: All these modes are used to flash/reset phone firmware. Think twice before entering in these modes.

  •     Fast Boot Mode

This mode is used to flash the phone firmware using command line tools. To access this mode:

    * Power off your phone.
    * Press and hold Call and End Call/Power keys.
  •     Download Mode

This mode is also used to flash the phone firmware. Mostly this mode is used by GUI tools for easier and quicker flashing. To access this mode:

    * Power off your phone.
    * Press and hold Volume Down, OK and End Call/Power keys.
  •     Recovery Mode

This mode is used for recovery purposes like to reset the phone firmware. To access this mode:

    * Power off your phone.
    * Press and hold Volume Down, Call and End Call/Power keys.

Once the alert triangle is shown on screen, press "Menu" key to reset the firmware or press "Home" and "End Call/Power" keys to show recovery menu.

Recently I got my hands on the new stylish and awesome phone "Samsung Wave GT-S8500" which comes with Samsung's new Bada OS.

While playing with the new phone, I found some interesting hidden secret codes which can enable/disable various hidden options and can also provide lots of useful information about the phone which is not available in default menus.

You just need to type the codes using Keypad:

    *2767*3855#

Think before you give this code. This code is used for factory format. It'll remove all files and settings including the internal memory storage. It'll also reinstall the phone firmware.

PS: Once you give this code, there is no way to cancel the operation unless you remove the battery from the phone. So think twice before giving this code.

    *#197328640#

This code can be used to enter into Service mode. You can run various tests and change settings in the service mode.

    *#0228#

This code can be used to get detailed information about phone .

    *#7465625#

This code can be used to check the status of Sim Lock and Network Lock.

    Codes to get Firmware version information:

*#4986*2650468# - SW Version, HW Version, MP, RF Cal Date, CSC Version, CSC Model Spec, FFS Version, RC2 Version

*#1234# - SW Version and CSC Version

*#1111# - FTA SW Version

*#2222# - FTA HW Version

    Wi-Fi and Bluetooth Test Codes:

*#526# - Wi-Fi Manual MFG Test Mode

*#232337# - BT RF Test Mode

    Codes to launch various Factory Tests:

*#0*# - LCD test

*#0673# OR *#0289# - Melody test

*#0842# - Vibration test

*#2663# OR *#2664# - TM Command

Some FQA
(1)can i update android 2.1 TO android 2.2
     if yes How??


Ans. if your phone company provides the official update you can get from your settings in case it doesn't you can root it and flash with ROMs (but its not safe and you can get it bricked)
You can get custom ROMs and stuff from here
http://forum.xda-developers.com/


(2) Where can I find for LIVE WALL PAPER and GAMES for WAVE-2?
Ans. Goto  http://www.noeman.org/gsm/bada-os-forum/
        you can get wallpapers of required size from bing
      http://www.samsungwave2forum.com/samsung-wave2-apps/

      http://badawaveapps.blogspot.com/



  DISCLAIMER: This information is intended for experienced users. It is not intended for basic users, hackers, or mobile thieves. Please do not try any of following methods if you are not familiar with mobile phones. We'll not be responsible for the use or misuse of this information, including loss of data or hardware damage. So use it at your own risk.

Difference Between Edge and GPRS

Hello Friends..!!

Have You See Sometime Sign Of GPRS And Sometime Edge In Your Mobile ?

What's Difference Between Them ?



Edge vs GPRS

EDGE or Enhanced Data Rates for GSM Evolution is a digital mobile phone technology attuned backwards. This technology, also termed as Enhanced GPRS or Enhanced Data rates for Global Evolution or IMT Single Carrier makes superior data transmission rates possible. This happens as an extension adding to the standard GSM technology. It is a 3G Radio technology and also belongs to the 3G definition owned by the ITU. On the other hand GPRS or General Packet Radio Service is a mobile data service that is essentially packet oriented. This technology can be availed by users opting to the 2G and 3G communication systems of the global system for mobile communications or GSM.


Further enhancements to GSM networks are provided by Enhanced Data rates for GSM Evolution (EDGE) technology. EDGE provides up to three times the data capacity of GPRS. Using EDGE, operators can handle three times more subscribers than GPRS; triple their data rate per subscriber, or add extra capacity to their voice communications. EDGE uses the same TDMA (Time Division Multiple Access) frame structure, logic channel and 200kHz carrier bandwidth as today's GSM networks, which allows it to be overlaid directly onto an existing GSM network. For many existing GSM/GPRS networks, EDGE is a simple software-upgrade.

EDGE allows the delivery of advanced mobile services such as the downloading of video and music clips, full multimedia messaging, high-speed colour Internet access and e-mail on the move.




Given the recent technological updates it has become more than obvious that EDGE is a technology which is not just going to bring it hard on the GPRS technology but surpass it as well. This is precisely so because EDGE gives the users the inimitable chance to increase the throughput capacity and the data speed at least 3 to 4 times higher to what GPRS offers. Moreover, EDGE also allows the existing TDMA and GSM carriers to provide the much needed and sophisticated 3G services. EDGE provides a single symbol for each 3 bits. So there itself what becomes evident is the EDGE rate is single handedly 3 times that of the GPRS rate. It has a higher bit rate precisely because the technology is based on a modulation structure of 8PSK. Hence the bit rate improves over the air Interface. As the very name suggests, EDGE is the enhanced and upgraded form of GPRS surpassing it in a number of technical aspects.
GPRS is unable to allow the service providers and operators to have an access to extended wireless data application which is otherwise possible with the use of EDGE. With EDGE it is possible to access web based email, wireless multimedia, the upgraded technology of video conferencing which is a ground breaking procedure, and not to forget web based infotainment as well. GPRS is unable to offer the entire assortment. Further more the evolved form of EDGE exists with Release 7 as well of the 3GP standard, provides decreased latency and a performance level that is two times higher than the prior form

Summary:
1. EDGE stands for Enhanced Data Rates for GSM Evolution whereas GPRS stands for General Packet Radio Service.
2. EDGE is a digital mobile phone technology but GPRS is a mobile data service.
3. EDGE allows existing TDMA and GSM carriers to provide 3G services whereas GPRS allows both 2G and 3G communication systems

TUTORIAL MAKE DOUBLE ANTENNA FOR GPRS/EDGE/3G/HSDPA

Here I will teach you how to make double antenna for GPRS/EDGE/3G/HSDPA

Useful Material:


Board (used for the template attached) copper wire (taken from the electrical cable size 2.5mm) <- already long enough 1M
Pigtail <- adjust to the type of modem, for example Sierra 881U
RPSMA Bulkhead jack (Female) used to connect to Pigtail Cable (YAGI antenna could take from yesterday did not buy) n-male connector RG58 female / one pair
RG58 cable <- recommended search of the interior fibers of the color yellow (made of copper)
Empty PCB (for reflectors) can be made also from aluminum or brass
Equipment needed:
Pliers
Cuter
Isolation
Solder
Tenol
Coffee
ESTIMATED COST:
Blank PCB = $ 8
• N-Male Connectors RG58 = $ 1
N-Female Connector RG58 = $ 1
RG58 cable per meter = $ 1
NYM Power Cables 2.5mm size = $ 2
Pigtail = pretty expensive <- tutors make Pigtail Siera 881U can read here
RPSMA Bulkhead jack (Female) to make the connection Pigtail = $ 4
STEP:
Template used to create double biquad appropriate form of copper wire template
PCB cutting / plate aluminum / brass plate suitable size do not forget to make hole the middle (center) of appropriate size n-female connector RG58 copper wire pairs of the templates at no.4 RG58 n-female connector pairs of n-connector RG58 to RG58 cable one end (the shorter the better) I had a 12m long <- do not imitate this was possible only 10M RPSMA pairs Bulkhead jack (Female) at the end of RG58 cable for connect to another 1nya Pigtail completed, attach the antenna positioned high, while putar2 find the best way to get a signal GPRS/EDGE/3G/HSDPA
ADJUSTED FORM WITH ANTENNA taste
J1 = use the inner of the coaxial cable TV antenna (recommended take away from the antenna coaxial cable satellite TV, I do not have to use the commonly used coaxial UHF TV.
J2 = created from a blank PCB with a size of 5-6 mm width with a length to adjust the size of the reflector with a wire spacing (NYM).
This antenna has been shown to increase the signal 3G and GPRS

Total Pageviews

 
Design and Bloggerized by Rakesh Patil - GetBest4all

Receive All Free Updates Via Facebook.