Visual identity

If you want promote your business, then you have come to the right place. more »

Unique solutions

If you want promote your business, then you have come to the right place. more »

Live support

If you want promote your business, then you have come to the right place. more »

3 HIDDEN MODES IN ANDROID MOBILE PHONES

Posted by Admin
3 HIDDEN MODES IN ANDROID MOBILE PHONES

3 Hidden Modes in Android Mobile Phones.
1. Fast Boot mode
2. Download mode
3. Recovery mode


DISCLAIMER: This information is intended for experienced users.

Please do not try any of following methods if you are not familiar with mobile phones. We'll not be responsible for the use or misuse of this information, including loss of data or hardware damage.
So use it at your own risk.

1. Fast Boot Mode
This mode is used to flash the phone firmware using command line tools.

To access this mode:
Power off your Phone.
Press and hold Call and End Call/Power keys.


2. Download Mode
This mode is also used to flash the phone firmware.

Mostly this mode is used by GUI tools for easier and quicker flashing.
To access this mode:
Power off your phone.
Press and hold Volume Down, OK and End Call/Power keys.


3. Recovery Mode
This mode is used for recovery purposes like to reset the phone firmware.

To access this mode:
Power off your phone.
Press and hold Volume Down, Call and End Call/Power keys.
Once the alert triangle is shown on screen, press "Menu" key to reset the firmware or press "Home" and "End Call/Power" keys to show recovery menu.


– – – – – –
Don’t miss more webexciting articles, published daily – subscribe to Webexciting by RSS.
– – – – – –
more »

EXTRACT TEXT FROM IMAGES

Posted by Admin
EXTRACT TEXT FROM IMAGES


Sometimes when you want to get text from an image file to a text file you have to type it all into notepad. This is really difficult especially if the text is long and you are a novice typer. An easier alternative is using an OCR (Optical Character Recognition) software. There are many online services providing you with this. But I am going to teach you a little trick to extract text from images using a software included in the Microsoft office package called OneNote.

Step 1: Go to Start menu > All programs > Microsoft Office > Microsoft OneNote.

Step 2: Copy and paste the image into OneNote.

Step 3: Right click the image in one note and select Copy Text from Picture.

Step 4: Now open notepad and press Ctrl + V.

Step 5: Correct any spellings errors.

Hope you found this useful and informative.

Remember to leave your ratings and like and share the blog! Keep tuned for more great posts.

– – – – – –
Don’t miss more webexciting articles, published daily – subscribe to Webexciting by RSS.
– – – – – –
more »

DIFFERENT TYPES OF ATTACKS

Posted by Admin
DIFFERENT TYPES OF ATTACKS 


















This is about Different Types of Attacks.

RTE:
Rich Text Editor

DNN:
Dot Net Nuke mathot also called Portal Hacking

SQL INJECTION:
The most common and dangerous kind of attack.It is a code injection technique that exploits a security vulnerability in some computer software.An injection occurs at the database level of an application (like queries).

JAVASCRIPT INJECTION:
Java script Injection is a facility by which we can insert our own javascript codes into the websites, either by entering the code into the address bar, or by finding an XSS(Cross site Scripting) vulnerability in a website.It is generally used in spoofing too.

SPOOFING ATTACK:
A spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.

PHISHING:
Phishing is a way of attempting to acquire information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

CROSS SITE SCRIPTING:
Cross-site Scripting (XSS) is an attack technique that involves echoing attacker-supplied code into a user's browser instance.

MAN IN THE MIDDLE ATTACK:
It is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker.

DNS POISONING:
It is a security or data integrity compromise in the Domain Name System (DNS). The compromise occurs when data is introduced into a DNS name server's cache database that did not originate from authoritative DNS sources.

DOS ATTACK:
It is an attempt to make a computer resource unavailable to its intended users.

– – – – – –
Don’t miss more webexciting articles, published daily – subscribe to Webexciting by RSS.
– – – – – –
more »

WINDOWS 8 FEATURES

Posted by Admin
WINDOWS 8 FEATURES

Windows 8 the latest version of Microsoft’s Windows operating system has many new features. Some of these are minor improvements to existing features. Others are entirely new. Many sites have already posted list of new features. But most of them are only about new touch gestures or metro interface. Here is a list of top 10 features that are really useful:

1. Easy screenshots
Up till now to take screenshot you would press Prt-Sc and paste the result in Paint or any other image editor. Now you can take and save a screenshot simply by following key combination:

Win + Prt Sc

The screenshots are saved automatically in PNG format in Pictures folder and are also numbered.

2. Hidden start menu
Well it’s not actually a start menu. But a menu containing very useful options like Device Manager, Disk Management, Admin Command Prompt and many more. Hit the following keys to pop up this menu:

Win + X

3. Mount ISO files without any external software
Now there is no need for any external software to mount/view ISO files. Just double click the ISO file or right click and select ‘Mount’. A new virtual drive will appear in Computer.

4. Built in Anti-virus and Anti-spyware
Now there is no need for external Anti-virus as it is built into Windows 8. The Windows defender has now bee upgraded to a full fledged Anti-virus. It uses the same definitions as Microsoft Security Essentials. The detection rate is also very good. I recommend it over external Anti-virus. Moreover if you install any third party solution like Avira Or Avast then it will automatically turn off to prevent any conflict.

5. Reset and Refresh

When your mobile phone becomes slow or bloated you simply ‘Reset’ it to factory default setting . Now you can do the same in Windows 8. Hit Win + W and type ‘reset windows’. Select ‘Remove everything and reinstall Windows’. Your PC settings will be restored to default and your files and apps will be removed. If you want to keep you files and apps then there is also an option to ‘Refresh’.

6. Inbuilt PDF reader
There is a default Reader App that opens PDF and XPS files. Only drawback of this app is that it takes full screen.

7. Better file handling
This is a welcome features. Now you can pause and resume while copying/moving files. You can also view a neat speed vs time graph by clicking ‘More details’. Moreover several file operation are grouped in one window.

8. Synchronize your settings
If you use Microsoft Live Account then you can synchronize you personalization settings, passwords, app settings and other Windows settings with your online account. These settings can be synchronized across multiple PC’s.

9. Improved task manager
The task manager is overhauled and now presents a lot of information. Also it tells the impact of start up items.

10. Faster boot
This is a major improvement in Windows 8. The boot tie in Windows 8 is under 20 seconds( even less for SSD). This is thanks to a clever optimization by Microsoft. Is is called Hybrid Boot. It is the best of both Shutdown and Hibernate. You must have noticed that the computer boots very fast after hibernation. This is because all the content of ram is saved to hibernate.sys and restored on boot. Now in case of Hybrid Boot when you shutdown the user applications are closed but the portion up to Kernel loading(device drivers, services, etc.) is hibernated. As a result the boot time decreases.


– – – – – –
Don’t miss more webexciting articles, published daily – subscribe to Webexciting by RSS.
– – – – – –
more »

KEYBOARD LIGHTS INTO DISCO LIGHTS

Posted by Admin

KEYBOARD LIGHTS INTO DISCO LIGHTS


Copy this in notepad and save it with the name "disco.vbs" without Quotes.

Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
wshshell.sendkeys "{NUMLOCK}"
wshshell.sendkeys "{SCROLLLOCK}"
loop 


After saving open it and see the keyboard lights will start blinking like Disco Lightsss...!!
more »

MEN'S FASHION TRENDS THAT WILL ROCK IN 2014

Posted by Admin
With every new season, new trends come up with a hoard of new styles that do not let the fashion lovers to take off their eyes. Where the last year was spoiled for choices, current year has brought trendy clothes that are more fleeting than others.

MEN'S FASHION TRENDS THAT WILL ROCK IN 2014












Here is good news for fashion lovers! The year is perfect time to revamp your wardrobe. After all, for a trendy man, there is nothing like updating yourself from time to time. Here is the preview of the clothing that will keep you stylish throughout the year.

Stripes:


This style of clothing has truly transformed the traditional fashion. Without going overboard, the visual appeal of stripes has provided a different look to a wearer. Numerous celebrities can be seen wearing these in fashion clothes at various events. Making your upper body the stripe bearer is frequently the most triumphant way of amalgamating them into your current clothing. The great thing about stripes styles is that even if the new modernism aren’t according to your taste, the classic options are always available, which will remain in fashion forever.

Camouflage:


Well it’s all up to you, whether you love it or not but camouflage is back with the bang. From previous some years, this military style clothing is enhancing the personality of a fashion lover, so it’s obvious that Camo will rock this year too. There are various types of clothes of this category but the best option still lies in sweatshirt and t-shirt. Camo pant is the history, but tees are still in fashion and will be for a long time.

Checks:


Well, this style is from history. There was a time, when men used to wear this style and the history is repeating itself again. Checks are for the people who want serious dress in their wardrobe.  According to fashion experts, checks will be on everything from t-shirts and coats to trousers and shirts. The style of this outline is actually very versatility and interesting. Full length pants can set a new proclamation while a flash of pocket square check is enough to exude a sense of style. In fashion world, this trend is easy to pick up and run with.

Blue:


Favorite menswear is back! Yeah it’s blue! Don’t get confused with dull navy and monochrome, as these colors are very similar to blue. The stylish catchy color leaves all traces of winter tedium in the past. The season is offering you an outfit that will keep the fashion vibrant. The color was very famous in late 80. It seems that history is repeating itself.

So, overall, what’s better than a several new styles to help reinvent your personal clothing and wardrobe? Like them or hate them, but that’s it you will see all the year.


– – – – – –
Don’t miss more webexciting articles, published daily – subscribe to Webexciting by RSS.
– – – – – –
more »

POST BLANK COMMENT OR STATUS ON FACEBOOK

Posted by Admin































First Go To Comment Field Where You Want To Post Comment or Status.
Then Hold Alt Key And Type 0173 From Numeric Pad.
Press Enter To Post Comment.


– – – – – –
Don’t miss more webexciting articles, published daily – subscribe to Webexciting by RSS.
– – – – – –
more »