Wednesday, 30 March 2016

FBI Hacks San Bernardino Gunman’s iPhone Without Apple’s Help

The FBI has finally managed to break into the San Bernardino iPhone without Apple’s help. This development has also resulted in putting an end to the ongoing FBI vs. Apple battle in the court. It’s been speculated that the government has taken the help of some mysterious third party who remains unidentified.
The FBI has managed to break into the iPhone of San Bernardino gunman without Apple’s help, according to the US justice department. This has finally put an end to the ongoing FBI vs. Apple battle that going back and forth in the court.
The official filing states:
 
The government has now successfully accessed the data stored on Farook’s iPhone and therefore no longer requires the assistance from Apple Inc. mandated by Court’s Order Compelling Apple Inc. to Assist Agents in Search dated February 16, 2016.
In the past, Apple has been resisting a court order that asked the firm to create a backdoor in the Syed Rizwan Farook’s phone. But, on Monday, officials said that it has asked the order to be withdrawn.
It should be noted that Farook and his wife killed 14 people in San Bernardino shooting in December. Later, they were shot dead by the Police.
It’s been speculated that the government has taken the help from some mysterious third party who remains unidentified. It’s being hoped that Apple will ask for the details about this hack to make its devices more secure, but it remains unclear if Apple will get any details about the same.

According to the Department of Justice, this method only works on this iPhone 5c in particular. But, the people related to the case are finding it hard to believe that FBI won’t be unlocking other iPhones running the same iOS 9 version.
If we talk about the winner of this battle, Apple has been able to resist the government’s request. Over the past years, the company has been working hard to make its devices more secure and this incident established Apple’s place as a privacy advocate.
Here’s what Apple had to say about this outcome:
From the beginning, we objected to the FBI’s demand that Apple build a backdoor into the iPhone because we believed it was wrong and would set a dangerous precedent. As a result of the government’s dismissal, neither of these occurred. This case should never have been brought.
This case raised issues which deserve a national conversation about our civil liberties, and our collective security and privacy. Apple remains committed to participating in that discussion.
What are your views regarding this FBI vs. Apple? Share your views in the comments below.

Tuesday, 29 March 2016

31 Things You Know Only If You’ve Been Pro Computer User


Things You need to know If you are not a Basic User of PC. If you are an Advanced user , you know mostly tricks. But here we collect tricks and I think you know most of them. Try these tricks in your PC and Be a Pro User.

  • Shift + Delete button combination  in Keyboard delete your file and folder permanently and you can’t recover it through Recycle bin.Shift + Delete Delete Your Files Permanently

    1. Shift + Delete Delete Your Files Permanently


    2.  Download Youtube Videos from Adding SS before youtube.comDownload Youtube Video from Adding SS
    3. Download Youtube Video from Adding SS

    4. Install and update All Windows Software at one click from Ninite.Download All Windows at once from Ninite Installer
      Download All Windows at once from Ninite Installer
    5. Recover your deleted Data and files from Recuva Software.Recuva File Recovery Software for Windows
      Recuva File Recovery Software for Windows
    6. Speed up your PC from CCleaner software.Speed up Your from CCleaner
      Speed up Your from CCleaner
    7. Convert all type of files like audio , video, documents, pictures from  into any formats fromZamzar.com .Zamzar File Converter
      Zamzar File Converter
    8. Download Facebook Backup Data from Facebook Website.  Open Facebook Settings and Download Copy of Your Facebook Data.Facebook Tricks 2015
      Facebook Backup Data
    9. Type like a hacker from Hackertyper website.Hackertyper for Make your Computer look like hacker
      Hackertyper for Make your Computer look like hacker
    10. Edit your Photos Like a pro from Autodesk Pixlr.Autodesk Pixlr Edit Photos Like a Pro
      Autodesk Pixlr Edit Photos Like a Pro
    11.  Control Your PC through RDP Connection from any android mobile.RDP App fpr Android
      RDP App for Android
    12. Calculate any values from searching on google.Google search calculator
      Google search calculator
    13. Listen Free Music from Soundcloud.com .Listen Free Music SoundCloud
      Listen Free Music SoundCloud
    14.  See the Space in your Mobile from Starchart Android AppStarchart Android App
      Starchart Android App
    15. Change the Color of your Windows Folder from Folder Colorizer.Folder Colorizer
      Folder Colorizer
    16. Enhance Your Windows Desktop from RainmeterIron-Man-Rainmeter-Skin
      Iron-Man-Rainmeter-Skin
    17. Edit PSD Files without installing Photoshop in Computer from Onlinephotoshopfree.netOnline Photoshop
      Online Photoshop
    18. Save your Important Data on Cloud from Using Google Cloud Drive.Google Cloud Drive
      Google Cloud Drive
    19. Turn your Computer into a WiFi Hotspot and share internet connection with other devices. Download Mhotspot software or you can use command method.Windows-PC-Hotspot
      Windows-PC-Hotspot
    20. Kodi one of the best Media Player for any PC.Kodi Best Media Player for Windows
      Kodi Best Media Player for Windows
    21. Download Sumatra PDF Reader for windows(Only 4MB), Adobe Reader give you limited features and take lots of time in installing.Sumatra PDF Reader
      Sumatra PDF Reader
    22. Change the Login Screen Wallpaper from Windows Login Wallpaper Changer.Window 7 Login Background Changer
      Window 7 Login Background Changer
    23. Use DNS Changer software for increasing your internet speed.DNS Jumper for fast DNS
      DNS Jumper for fast DNS
    24. Turn your android mobile into mouse and keyboard from Unified App.Unified-Remote-App
      Unified-Remote-App
    25. Increase the Download Speed in Internet Download Manager from these IDM amazing Tricks.IDM Speed
      IDM Speed
    26. Get Ownership of any file in windows from simple registry hack.take ownership of files in windows
      Take ownership of files in windows
    27. Remove all program shortcuts and widgets from Window Desktop , increase your computer speed.A Clean Desktop Means A Faster Computer
      A Clean Desktop Means A Faster Computer
    28. Run android apps in windows from Bluestack android app.Bluestacks Android App in Windows
      Bluestacks Android App in Windows
    29. Change the Password of Windows without Knowing Old Password.Change Password of Windows
      Change Password of Windows
    30. Unlock Window Computer from Your Android Smartphone. New way of security can protect your pc from unidentified login.unlock pc from android phone
      unlock pc from android phone
    31. Increase the Size of Your HardDisk up to 2TB by Creating Virtual HardDiskIncrease the Size of Harddisk
      Increase the Size of Harddisk
    32. How to Change Windows 7 Boot Screen Animationwindows-custom-boot
      Windows-custom-boot
    33. How to Stream Songs From Phone to Computer Over Bluetooth

      Let me tell you an incident that happened a few days back. I went to my sister’s house and while talking about the latest movies, I remembered an amazing song which I thought of playing to her. When I played the song on my HTC One X, both of us were very disappointed by the quality of the inbuilt speakers.
      I told my sister that I will transfer the song to her computer so she could listen to it on better speakers, but later I recalled that I was not carrying my data cable. This is the kind of challenge geeks like me love, and I started thinking about how I could play the song on my phone using the laptop’s speaker. Finally, after an hour-long struggle, I was able to play the song wirelessly using Bluetooth on both the devices.
      So let’s see how I did it.
      Note: I have tested this guide on my computer bundled with Microsoft Bluetooth Emulator, which is the default Bluetooth device driver/software that’s shipped on most of the laptops and desktops these days. The Android phones I used for testing were HTC One X, Samsung Galaxy S and HTC Sensation XE. It worked like a charm on all of them. Basically, this guide will work for all the phones having A2DP (The Advanced Audio Distribution Profile) support.

      Streaming Songs to PC Over Bluetooth

      Step 1: Download and install Microsoft Windows Mobile Device Center 6.1 on your computer. Users who are on the 64-bit operating system should download the appropriate version.
      Step 2: Now turn on Bluetooth on both the devices – the computer and the phone – and make both of them visible.
      Bluetooth-on-phone-3
      Step 3: Right-click on the Bluetooth icon in the Windows system tray and select the option Add a device. Now search for your mobile you want to stream the music from and add it. When you add your mobile, Windows will install all the necessary peripheral drivers for your phone.
      add-a-device
      Step 4: After both the phone and your computer are paired with each other, right-click again on the Bluetooth icon in the system tray and select Show Bluetooth Devices this time.
      show-bluetooth-device
      Step 5: On the Devices and Printers window, right-click on your paired phone and click on the Bluetooth Operations. Windows will now scan your phone for the types of services available. If A2DP support is available on the phone, it will show an option to Play Music under Audio and Video operation section. Click on the link to activate the control.
      play-music.png
      connection-established.png
      Step 6: After the service is connected, a small player control will appear on your taskbar. If it does not appear automatically, right-click on the taskbar and select Bluetooth Remote Control under the Toolbars menu.
      Bluetooth-remote-control-activate.png
      bluetooth-remote-control.png
      That’s all. All the music you play on your phone, you can now listen to it on your computer’s speaker as long as both the devices are connected to each other. You can manage the phone’s music player using the remote control on the taskbar. When you want to stop playing, just disconnect Bluetooth on either of the devices.

      Conclusion

      So next time you want to hear songs on your mobile phone using your laptop’s speaker, no need to look for PC connectivity wires. Just switch on the Bluetooth and stream the songs.

      Scientists Might Have Just Resolved The Mystery Of The Bermuda Triangle

      Scientists may have got a breakthrough in the mystical case of the Bermuda Triangle. They believe that methane gas explosions may be linked to the mystery of the Bermuda Triangle where until now as many as 8,127 people have disappeared.
      For the one and a half century, numerous ships and airplanes have disappeared in Bermuda Triangle area, usually under mysterious circumstances. But a new research from the scientists at Arctic University in Norway takes cues from the multiple giant craters on the floor of the Barents Sea.
      A massive deposit of methane gas may have exploded in the craters surrounding the seabed caused by gas leaking from oil and gas deposits buried deep in the sea floor.
      In the past two years, scientists have also documented methane gas bubbling up from the seafloor off the some parts of the west and the east coasts of the United States. One of the topics that need further analysis is whether methane gas explosions on the seabed could threaten the safety of ships.
      Multiple giant craters exist on the sea floor in an area in the west-central Barents Sea … and are probably a cause of enormous blowouts of gas. The crater area is likely to represent one of the largest hotspots for shallow marine methane release in the Arctic.
      Researchers at the Arctic University of Norway say.
      This is not the fist time the possibility of methane gas eruptions in the Bermuda Triangle has been suggested. Last year a group of researchers led by Igor Yelstov of the Trofimuk Institute in Russia said that the mysterious disappearances in the Bermuda Triangle were the effects of hydrant gas reactions. When the craters start to actively decompose, methane ice is transformed into gas.
      If the theory of methane gas explosions being the cause of so many disappearances in the Bermuda Triangle proves to be correct, then we can chalk one up for science. But would the theory explain the magnetic anomalies associated with the area? It will be interesting to hear.
      Did we miss something? Let us know in comments below…..

      How To Create Bootable USB Without Any Software In Windows 10 (Using Command Prompt)

      Creating bootable USB without any software in Windows 10 is the cleanest and easiest way to make a bootable USB without errors. Just follow the steps below to create bootable USB drive which you can use to install Windows on your machine. 
      These days very few people burn ISO images on disks and use them as bootable media. Now, USB drives have replaced them as they are faster and a more convenient method to install an operating system on a machine.
      While there are many tools to make bootable USB drive, there’s one provided by even Microsoft, there’s a way to do the same without any software. All you need to do is fire up Command Prompt and follow some simple instructions. Let’s take a look at it:

      Create Bootable USB without any software on Windows 10:

      • Insert your USB flash drive to your computer.
      • Search for ‘cmd’ in Windows 10 from the taskbar, Command Prompt will appear. Alternatively, you can also open the  Command Prompt by pressing windows+R at the same time and typing in ‘cmd’ in the ‘Run’ window and hitting enter.
      • Right click on Command Prompt and select ‘Run as Administrator’ in case you have searched for cmd in the Windows 10 Taskbar.
      • Once the Command Prompt window appears, type diskpart and hit enter. Wait until the diskpart utility runs in another window.
      • In the new diskpart window, type list disk and hit enter. It will show you all active disks on your computer.
      Most probably, you will see two Disk types.
      • Disk 0 for hard drive and,
      • Disk 1 for your USB Flash Drive with its total capacity.

      Since we are going to work on to create bootable USB drive, we will work with Disk 1.
      • Type select disk 1 in the same windows and hit Enter. You will get a message ‘Disk 1 is now the selected disk’. That means, any further operation that you do will affect your disk 1 directly.
      • Type clean and hit Enter to remove all of the data in the USB drive. Clean command will format your bootable drive. You will get a message like ‘Diskpart succeeded in cleaning the disk’.
      • Type create partition primary and hit Enter. You will get a message like Diskpart succeeded in creating the specified partition.
      • Type select partition 1 and hit Enter. It will choose partition 1 for setting up it as an active partition.
      • Type active and hit Enter. It will activate the current partition.
      • Type format fs=ntfs quick and hit Enter. This command will format your current partition as NTFS file system quickly.
      • Type exit and hit Enter. Exit command will close the Diskpart program. But do not close the command prompt Windows.
      Now before we proceed, let us assume that the USB drive is the G: drive and the DVD installer is located on drive E:. And, you also have inserted a DVD inside the DVD drive from where you want to copy the data to create a bootable USB drive.
      By default, Command Prompt’s active directory for Administrator permission is on C:\Windows\System32>. We will navigate Command Prompt to set on DVD (E:) as its active directory. Remember there should be a DVD inside DVD installer.
      • Just type E: then hit Enter, and then the active directory is changed to E.
      • Type cd boot and hit Enter. Now the active directory is changed to E:\boot>
      • Type bootsect /nt60 g: and hit Enter. It will create the boot sector on G: drive (USB Flash drive).
      • Type exit and hit Enter to close the Command Prompt.
      Until this step, we have been successfully able to create a bootable USB drive and the flash drive is ready to be used as a boot media.
      To install Windows from a bootable USB drive, we just need to copy the whole installation files contained on the DVD installer to the USB flash drive.
      • To do this, open the Command Prompt as in previous steps.
      • Once the command prompt is open, type xcopy e: \ *. * G: \ / E / H / F and then press Enter. Wait until all the files in the DVD installer are copied onto the flash drive.
      Now bootable USB drive is ready to be used for installing Windows from the Flash drive and you’re done

      How To Find The Batcave And Batmobile From ‘Batman v Superman’ On Google Maps?

      Warner Bros. has partnered with Google to present a nice easter egg for DC Comics fans. On Google Maps, you can explore Bruce Wayne’s residence and enter the mysterious Batcave to take a closer look at Batmobile. Go ahead, give it a try.
      While Batman v Superman: Dawn of Justice is receiving bad receiving bad ratings from the critics, the movie is busy collecting gold at the worldwide box and earning praises from the comic book fans. Nonetheless, we can safely bet that the movie will do great business, thanks in no little part to the marketing strategy of WB.
      Along the same lines, Google has partnered to introduce a promotional easter egg on Google Maps that lets you take a 360-degree tour of Bruce Wayne’s residence and his Batcave.
      The invitation to the Dark Knight’s home was announced on movie’s official Facebook page. Just follow this link and take a look at the superhero’s house of Google Maps.
      For those for those who are curious to know about the location of Bruce Wayne’s residence, it’s in Orion Charter Township, Michigan.
      This interactive tour is great opportunity for the movie fans to see the Batmobile and check out Batman’s personal work area. Here’s what I found:
      Batman’s residence is located just outside Detroit!

      bruce-wayne-residence-batcave-batman-google-map-.jpg
      On my way to Batcave!
      bruce-wayne-residence-batcave-batman-google-map-2.jpg
      Here comes the beast – Batmobile!
      bruce-wayne-residence-batcave-batman-google-map-3.jpg
      Going upstairs, I found Bruce Wayne’s personal working space!
      bruce-wayne-residence-batcave-batman-google-map-4.jpg
      What else did you find in Bruce Wayne’s residence? Feel free to share with us in the comments below.

      Facebook’s New Surprise — How To Play Basketball In Messenger App

      Celebrating March Madness, Facebook has rolled out an update that lets you play basketball in Messenger app. Just update your instant messaging app and send a basketball emoji to your friend to start the game. Read more to know more about the game.
      Facebook is here to make your boring office and school hours a little bit exciting. To celebrate the basketball fever, the company has rolled a little update into its Facebook Messenger app that lets you play basketball in Messenger app.
      Just like everybody else, it looks like Mark Zuckerberg is very much excited about March Madness. Earlier, Facebook vowed its users by embedding a secret chess game inside its instant messaging application. So, are you wondering how to play basketball in Messenger app?

      How to play basketball in Messenger app?

      To get started with the basketball game in your Facebook Messenger app, all you need to do is fire up a conversation with a friend and send him/her a basketball. Note that you need to send a basketball emoji from your keyboard, not a sticker. If you are unable to locate it in your plethora of emojis, here’s one for copying and pasting – ?
      Before doing this jugglery, make sure that you’ve updated your Messenger app from App Store.
      After sending the ball to your friend, click on it to start the game. As soon as you do this, you’ll see a basketball on your screen and you need to swipe the ball up at the bottom of the screen to take shots. After each try, your starting position will change and the game will get tougher as you score 10 points.


      facebook-basketball-game-messenger
      Depending upon the result of your performance in the game of basketball in Messenger app, you’ll be greeted with a frowning face or a flexing bicep. The game tracks people in chat, so that die-hard fans are able to show off their skills in this virtual basketball game. This game of basketball in Messenger app also shows the player with the highest score in the upper-right corner.
      Go ahead, give it a try and tell us your highest score in the comments below.

      How To Get The Best Wi-Fi Signal In Your House | Tips And Tricks

      If you want to increase your Wi-Fi speed, the first criteria would be to get the best Wi-Fisignal. There is no way out where you can leverage your Wi-Fi data without getting the best Wi-Fi signal with a good strength. fossbBytes has come up with an article covering all the aspects of getting the best Wi-Fi signal by telling you how interference, Wi-Fi channel, the line of sight etc. matters.
       
      Getting the best Wi-Fi signal in your own house is like finding a solution to come out of the maze while being stuck in the maze. We take our Wi-Fi router for granted and we just place it anywhere knowing that all of us are getting the internet connection.Since we are all paying for the data usage, it’s our right to utilize the Wi-Fi to its fullest which we ignore because we take life as it comes. So, we have come up with some tricks and tweaks on how can we get the best Wi-Fi signal in our house.

      How to Get the Best Wi-Fi signal in your house:

      • Put the Wi-Fi router ideally in the central location of the house as a Wi-Fi router extends the Wi-Fi signal in every direction.
      • Avoid keeping the Wi-Fi router in one of the corners of your house because more than half of our Wi-Fi signals are ended up providing connections in the neighborhood.
      • If your data port lies on one of the corners of the house then consider running a long ethernet cable to the center of the house, it does not cost much.
      • Remember, any solid structure like a wooden wall or a concrete wall are impediments to the Wi-Fi signal.
      • Do not forget the Wi-Fi antenna. They have some serious effect on the quality of the signal you receive. If you have not one, better buy one to get more coverage and stronger signal.
      • You can use a plenty of apps available out there for free of cost to measure your Wi-Fi signal strength. This way, you can easily decide the perfect or at least, close-to-perfect location for your Wi-Fi router.
      • Wi-Fi router should be kept in line-of-sight to your device to get a strong Wi-Fi signal.
      • Dark spots are the points in our room where Wi-Fi signals get canceled out after reflection. So if you are not getting a good signal at a particular location, try switching your position a little bit. Here is the video explaining that:
      • Many materials absorb a quite bit of the signals and a concrete wall absorbs the most.
      • Some of the things which should be avoided when planning to keep a Wi-Fi router nearby are:
        • Concrete wall
        • Water body like an aquarium, the little fountain, microwave etc.
      • A vertical antenna position helps make a better in horizontal space and Vice versa to get the best Wi-Fi signal.
      Besides, the above observations which are mostly based on the physical locations of placing a Wi-Fi router, there are some other technical tweaks which help you improve your Wi-Fi router’s performance. Some of the tricks to get a strong Wi-Fi signal are:
      • Update router firmware
      • Choose correct wifi channel
      • Disconnect old devices from Wi-Fi router
      • Replace antenna
      • Restarting your router etc.

      How to choose the best channel for your Wi-Fi router?

      These days every other house has their personal Wi-Fi routers. These intelligent routers have the capability of choosing the best channel for a better performance but sometimes, that does not work as the perfect solution.  This article talks about the different channels, their frequency range, co-channel, channel interference and also running some diagnostics test on Mac and Windows to find the right channel for you.
      I hope this article on how to get the best Wi-Fi signal in your house has been informative as it talks about all the aspects of a Wi-
      WiFi router like interference, channel etc. If you are also aware of some tricks which are capable of boosting the Wi-Fi and getting us a strong Wi-Fi signal, kindly share that in the comments below.

      iPhone SE — Apple Introduces The Most Powerful 4-inch Phone Ever Made

      Apple has finally launched iPhone SE with a 4-inch screen and powerful A9 processor and M9 motion coprocessor. The company has listened to the demands of the users who wanted a small form factor iPhone that feels good to hold in hands. The phone comes in 16GB and 64GB variants with its price starting from $399.
      Its Spring 2016 event, Apple has officially introduced the much-awaited iPhone SE. The spoilers that leaked ahead of the event, as it turns out, were pretty accurate.
      This 4-inch phone borrows its looks from the familiar iPhone 5S and feels good to hold in hands just like the older models. iPhone SE comes with no camera protruding and has a matter chamfered curvature on edges. The phone comes in silver, gold, space grey and rose gold.

      Apple iPhone SE is the most powerful 4-inch phone:

      If we talk about the internal specs of the new member of iFamily, it looks pretty solid. Its A9 processor and M9 motion coprocessor make it 2X faster than the iPhone 5S. It also comes with an NFC chip for Apple Pay. The phone also comes with my favorite always-on “Hey Siri” functionality.
      apple-iphone-se
      The phone’s camera has seen an upgrade with a 12-megapixel iSight sensor, Retina flash and 4K video capture. Just like flagship models iPhone 6s and 6s Plus, you get the ability to capture Live Photos.

      Another key thing to remember, Apple has also included its latest cellular and Wi-Fi technology in iPhone SE. As a result, the company claims that it can reach LTE speeds that are 50 percent faster than its predecessors.
      While SE brandishes Apple’s trademark Touch ID, it lacks the 3D touch technology that allows deeper interactions with the screen.
      Starting from $399, iPhone SE comes with 16GB internal storage. The higher end model costs $499 for 64GB storage. The phone will be available for pre-order on March 24 and will hit Apple Stores on March 31. All things considered, Apple iPhone SE looks like a promising device.

      What is VPN (Virtual Private Network)? How it Works?

      VPN is a technology used to setup a private network over the internet to share the resources of a corporate intranet with remote users and other office locations of the company. 
      Virtual Private Network or simply VPN is a personal network created over the internet, so that the devices connected over it can have an uninterrupted communication, regardless of any physical or digital barriers in the mid-way.

      How it works?

      The working of VPN is not a tough deal to understand, though it is. But, before that, you need to get an idea about the protocols or set of rules in laymen terms, used by VPN in providing a secure personal network. Let’s tell you more about it:
      SSL (Secured Socket Layer): It uses a 3-way handshake method for assuring proper authentication between the client and server machines. The authentication process is based on cryptography where certificates behaving as cryptographic keys already stored in the client and server, are used for initiating the connection.
      IPSec (IP Security): This protocol can work on transport mode or tunnelling mode, so that it can do its job of securing the VPN connection. The difference between the two is, transport mode only encrypts the Payload in the data i.e. only the message present in the data, whereas tunnelling mode encrypts the whole data to be transmitted.
      PPTP (Point-To-Point Transfer Protocol): It connects a user located at some remote location to a private server in a VPN network, and also uses the tunnelling mode for its operations. Its low maintenance and simple working makes it the most widely adopted VPN protocol, further credit goes to the inbuilt support provided by Microsoft Windows.
      L2TP (Layer Two Tunnelling Protocol): It facilitates the tunnelling of data between two geographical sites over the VPN network, often used in combination with the IPSec protocol which further aids to the security layer of the communication.
      So, you have a rough idea about the various protocols used in a VPN. We shall proceed further and see how it works. When you are connected to a public network such as internet, you can assume that all your data is flowing through a big tunnel along with the data of other users.
      So, anyone who wants to spy on you, can easily sniff your data packets from the network. When VPN comes into the scene, it actually provides you a personal tunnel inside that big tunnel. And all your data is transformed into garbage values, so no one can recognize it.

      Setting up a VPN Connection involves Three Phases:

      Authentication: In this phase, data packets are first encapsulated, basically wrapped inside another packet and some headers and other stuff are attached, all done to conceal the identity of the data packets. Now, your device initiates the connection by sending a Hello request to the VPN server, which replies with an acknowledgement and asks for the user credentials to clarify the authenticity of the user.
      Tunnelling: After the authentication phase is finished, what we say, an imaginary tunnel is created which provides a direct point to point connection through the internet. We can send whatever data we want to via that tunnel.
      Encryption: After we’ve successfully created the tunnel, we can send whatever information we want to, but that information is still not safe if we are connected to a free VPN service, which is also used by other people. So, we encrypt the data packets before sending them over the tunnel, thus barring any other user to peep into our packets, as he will only see some unrecognisable rubbish data flowing through the tunnel.
      Say, you want to access a website, your device will send the access request to the VPN server which will then forward the request to the website in its name and receive the data from it. This data will then be transferred back to your device. And the website will think, the VPN server is the user and will find no trace of your device as the actual user.
      18hwrzl3r7yupjpg
      Remote User Access: A VPN connection is used to provide direct access of a corporate network to a user who is not in the geographical coverage of the corporate network. Logically, the remote user is connected just like a normal user who is using the network within the corporate premises.
      Site to Site: VPN is also used to provide a homogenous network environment to a corporate firm having its office locations in different parts of the world. Thus, creating an uninterrupted sharing of resources bypassing the geographical hurdles.
      Other uses include, accessing those services on the internet which are not available in a particular country or region, accessing censored content or if a user simply wants to remain anonymous on the internet.

      Pros and Cons:

      The biggest advantage of using a VPN is the cost effectiveness it facilitates in providing a single private network in comparison to using separate leased lines which can burn the pockets of corporate firms. All credited goes to the internet, for acting as the medium for uninterrupted VPN connections.
      Apart from all the good things VPN does for us, it has its weak sides too. Not having a streamlined procedure for ensuring Quality of Service (QoS) over the internet, is the biggest incapacity VPN technology has in its possession. Furthermore, the level of security and authenticity outside the private network is beyond the purview of VPN technology. The incompatibility between different vendors only adds to its bunch of drawbacks.

      Popular VPN services:

      HideMyAss, PureVPN, VyprVPN, all these are well known the QoS and security they provide in their VPN connections.
      Cyber Ghost, Surf Easy, Tunnel Bear are some free VPN services you can use if you don’t want to shell out your pocket. But you’ll have to satisfy yourself with less features, download limits, or advertisements. Also, these free services can’t beat the paid services, note that.

      VPN on Android:

      You can also setup a VPN connection on your smartphones running on Android OS. This allows you to access your company’s private network right on your Android Devices. VPN also facilitates the network administrator to control your device, add or delete data and track your usage.

      Winding Up:

      VPN has so far equipped us with an extraordinary level of security and anonymity we can accomplish while sharing our confidential data over the internet. Corporate giants have always admired the ease and uniformity they can engineer in their network while using VPN. Though, it has its limitations, but so far it has outperformed our expectations and should be praised for the cost effectiveness it provides in its operations.
      Have a look at this video about VPN:
       Writing is a good habit, if you use your creative mind and write some good stuff, it would make you sound more intelligent among your friends. So, don’t wait, just use your keyboard and type your imagination in the comments section below.

      What Is The Difference Between HTTP And HTTPS?

      You might have seen that a website URL generally starts with HTTP or HTTPS. Do you know what is the difference between the two? Read further to find out more.
      In your browser’s address bar, the URL of every website you visit always starts with either HTTP or HTTPS, the latter one considered more secure. You might have noticed that numerous times while you were busy with your internet life, didn’t you? Even Facebook with almost a billion daily active users flaunts its status as of a HTTPS website and you confidently post your personal information without giving it a second thought. What if it gets into the wrong hands? Well, you know chances are less such blunder ever happens on the Facebook planet.So, whether it is Facebook or online payments involving your credit card information, all you want is HTTPS written as the URL. So, why the simple HTTP website isn’t used for online payments or storing your personal data? There is an obvious difference between the two.

      What is HTTP?

      Hypertext Transfer Protocol it stands for, which your teacher made you learn by heart in your 4th grade. It is a request/response protocol based on the client/server communication mode. A client or user agent is your web browser or any other device which can access, receive, and display web content.
      The client sends a request message to a server which hosts HTML content, replies with the response message that may contain the requested HTML content by the client. The response message is a confirmation that the server has successfully received the Request message.
      So, HTTP can be considered as a rule book that your web browser refers, like, what to do when you press enter after typing a website address. It is a Stateless protocol which means there is no relation between two consecutive HTTP commands given to a website. Furthermore, there is a list of Status Codes used by the web server to inform your browser if there is any problem. For example, “404 Not Found” is used when the webpage is not present at the URL entered in the browser.
      The credit for the original development of HTTP goes to Tim Berners-Lee – who proposed the idea of the ‘World Wide Web’ – and his CERN team, which was developed alongside the HTML (Hypertext Markup Language). The very first HTTP documentation was published in 1991 as HTTP/0.9 which consisted of only one method GET. The development progressed, with HTTP/1.0 in 1996 and HTTP/1.1 in 1997.
      HTTP/1.1 facilitated persisted connections (more than one request/response on the same HTTP connection), improved caching, new status code, Enhanced compression support, OPTION method for Cross Origin Resource Sharing in web application and much more.
      HTTP uses the reliable TCP (Transmission Control Protocol) Port 80 to send and receive data packets over the network for internet applications like email, World Wide Web, File Transfer, etc. However, it also utilizes UDP (User Datagram Protocol) which is an unreliable protocol but contributes to reduced network latency used for live streaming (not to be confused with preloaded videos on YouTube) which requires continuous packet flow done at the cost of minor packet loss during the transmission.
      The latest addition to the family is HTTP/2, developed by Hypertext Transfer Protocol Working Group of the Internet Engineering Task Force. This specification was approved as a Proposed Standard by IESG in February 2015 and was published in May 2015. It has been adopted by all the famous web browsers.

      What is HTTPS?

      The development of HTTPS began in 1993 by Netscape Communications, an AOL company, who had their famous Netscape Navigator web browser in the 1990s. Originally implemented with SSL (Secure Socket Layer), the HTTPS protocol was later upgraded to use SSL’s newer transformation TLS (Transport Layer Security). It also uses TCP to send/receive the data packets but uses a different Port 443 in order to do so.
      The ‘S’ stands for secure in HTTPS. Now, what does it mean in laymen terms? A website which uses HTTPS protocol establishes an encrypted connection with your device. So, if you try to send some data to the website, say any name, like Steve Jobs. The encrypted form will look somewhat like ‘xkndsoumnkjbktkctfc’. And you can’t understand it, do you?
      The data to be transmitted is encrypted using a Public Key which is then used by the recipient to decrypt it. The public key is created by a server administrator or a user, which is included in a digital certificate known as SSL Certificate and is signed by certification authorities like VeriSign. Any act which involves sharing of the Public key to unknown devices must be prohibited, as it may compromise the level of encryption, ultimately leading to disclosure of personal information or user credentials.
      Most modern web browsers now feature inbuilt support for HTTPS protocol. A web browser integrated with HTTPS protocol requires SSL Certificate signed by certification authorities in order to authenticate a server or a website. You might have seen a green coloured padlock placed before HTTPS in the Google Chrome address bar. Once you click it, the certification authority information of the website will be presented to you.
      The HTTPS website you’re visiting must provide a valid certificate to your web browser in order to gain browser’s trust. If it is unable to do so, the browser will display a warning message. So, the website obtains it either for free or after paying some bucks to the certification authorities.
      Basically, HTTPS is simply an HTTP connection wrapped in SSL/TLS encryption layer. All done to protect the integrity and privacy of the data being transmitted and the assurance that it won’t fall into wrong hands while in transit. Its main motive is to check the authenticity of the website being visited. An unsecured connection like a public WiFi network might serve as the medium for man-in-the-middle attacks and eavesdropping.

      The Difference between HTTP and HTTPS

      In a nutshell, HTTPS can be regarded as an advanced modification to HTTP equipped with more security. However, HTTP uses Port number 80 while HTTPS uses Port number 443 by default and that differentiates the two a separate connection types.
      The sole intention of HTTP is to display the information on the recipient device without bothering about how the data gets transmitted between two devices. And it is the same for HTTPS, the only advantage is, it packs an extra layer of security by using SSL/TLS which is also utilized by VPNs to encrypt data, thus protecting from eavesdroppers.

      What Is Network Topology And What Are Its Different Types?

      Network topology is defined by two types — physical topology and the logical topology. While physical topology talks more about the geometry and physical placement of the devices on the same hand, logical topology is more about the way data communication or signalling happens among the devices.

      What is Network Topology?

      Network topology is the arrangement of the different networking elements like network links, computers, switches, nodes, Wi-Fi access points, laptops and other network devices in a computer network.There are two types of Network Topologies:
      • Physical Network topology and,
      • Logical Network topology

      What is a Physical topology?

      A Physical topology defines how all the network devices are connected physically in a computer network. It mostly defines the physical connections among the devices.

      What is a Logical topology?

      A logical topology defines the logical connectivity of network devices on a computer network. So, it might happen that the devices connected in one type of physical topology might have different underlying logical topology.
      If we elaborate more on the physical topology, it is essentially the placement of the various network components in a computer like the placement of the devices, the connection among the devices, installation of the cables etc. On the other hand, logical connection defines how data flows among the devices.
      For example, let say there are five devices (A, B, C, D and E) that are connected in a row. This configuration of network devices might look more like a Bus topology. But let’s say device A can directly transmit the data to the device E. That means it looks more like a Circle which a Ring topology logically but a bus topology physically.
      We will talk about different kinds of topologies — physical and logical — one by one in the next article. If you want articles on some particular topic, feel free to ask us in comments below.

      Microsoft’s Windows 10 Wants To Replace Your PC Antivirus With WDATP

      To make your Windows 10 PC experience more secure, Microsoft is launching a new service called Windows Defender Advanced Threat Protection (WDATP). Acting as a complementary service to Windows Defender, this mixed service of a cloud service and client technology will help detect threats that go undetected past other security measures.
      Back in July 2015, Redmond released Windows 10 with the hopes of attracting 1 billion installations in a record time. With the help of its free Windows 10 upgrade offer for Windows 7 and 8.1 PCs, the operating system managed to find its place on millions of computers in a short span of time. While the operating system was praised for its new features like voice search like Cortana, its inbuilt antivirus remained a disappointment.But, Microsoft is claiming that it’s going to change the scenario with Windows Defender Advanced Threat Protection. It’s supposed to be a protection for a large company-wide network that will keep an eye on the complete network. Instead of looking out for individual files, it’ll shift the focus to the system’s behaviour as a whole by keeping an eye on the symptoms.
       WDATP will add an extra security layer to the already existing features like Windows Hello, Credential Guard, Device Guard, and Enterprise Data Protection. WDATP gives the systems admins a choice to scan the activities during the past six months to investigate the state of a machine regarding a simple attack timeline.
      windows-wdatp-2-768x416@2x
      This service, built on top of the existing Windows Defender service, WDATP provides a new post-breach layer of protection to Windows 10. Using a mixed service of a cloud service and client technology, it will help detect threats that go undetected past other security measures.
      On its blog, Microsoft lists 3 actions taken by WDATP:
      • Detects Advanced Attacks
      • Response Recommendations
      • Complements Microsoft Advanced Threat Detection Solutions
      With an upcoming update, WDATP will be built into Windows 10 and kept up-to-date to lower the cost and enhance the performance. Due to a cloud backend or on facility infrastructure, no type of maintenance is required — another plus point.
      “Just like we developed Windows 10 with feedback from millions of Windows Insiders, we worked with our most advanced enterprise customers to address their biggest security challenges, including attack investigations and day-to-day operations, to test our solution in their environments,” Microsoft writes on its blog.

      Here’s The Hidden Purpose Of Facebook’s New Reactions Buttons

      World’s biggest social networking company Facebook has rolled out the new Reactions buttons that will allow a user to express its emotions in a better way. But, what is the hidden purpose of Facebook’s new addition? Yes, you guessed it right — it’s all about money and data collection.
      Facebook has just rolled out its new ‘Reactions’ buttons globally. These six new emojis — ‘love’, ‘haha,’ ‘yay,’ ‘wow,’‘sad,’ and ‘angry’ — were launched to give people more freedom to express their emotions. In its Facebook post, the social media company explained that it has been listening to people to receive feedback and bring the right set of reactions. To see the new buttons, all you have to do is just hover over the like button or hold it down. However, just like any other feature on Facebook, the new Reactions buttons serve a dual purpose for Facebook. The company aims to collect data about how you react to smileys and improve your News Feed.
      Every time you open your Facebook account, you witness a series of posts and pictures that are a result of one of the world’s most influential and controversial algorithms. Facebook believes that feeding its algorithm more and more data is the key to longevity.
      In the past, Facebook’s Like button has been as a key source of data for the company that are used to customize your digital life. If you like more pictures, you’ll be shown more pictures — the same goes for other types of content.
      Giving users six reactions allows the company to gather more focused data. It will now tell the company if the people are enjoying the posts, finding them happy, or becoming sad.
      In a blog post, Facebook hinted at a similar possibility: “Over time we hope to learn how the different Reactions should be weighted differently by News Feed to do a better job of showing everyone the stories they most want to see.”
      Facebook primarily earns its money from advertising and shares the data with advertisers to improve their targeting. Although Facebook’s privacy policy states that it doesn’t share the personally identifiable information about its users, it does share the bulk information of users.
      What do you think about the new Reactions buttons? Tell us your views in the comments below.

      How To Enable Windows 10 Fast Startup: The Ultimate Windows 10 Guide

      Windows 10 Fast Startup feature is an inbuilt feature of Windows 10 which saves some Windows 10 files upon shutdown and when the computer is turned on, Windows 10 does not need to reload the complete system again from scratch. Thus, its gives a better startup performance and fast boot which helps to make Windows 10 faster.

      What is Windows 10 Fast Startup?

      Windows Fast startup is one of the built-in features that can help us accomplish fast boot of Windows 10 by combining the hibernation and shutdown properties to make Windows 10 faster.When the fast startup is enabled, Windows 10 will save some of your computer’s system files to a hibernation file upon shutdown. And when you turn your computer back on, Windows will use these saved files to boot up quicker. In short, Windows 10 will boot from the hibernate mode instead from the scratch. You can also turn on this feature if you are using older version of Windows.

      Turn on Fast startup on Windows 10:

      • Open settings on your Windows 10 PC.
      Untitled
      • A settings Window will pop up. Select the ‘System’, the first option in the image below
      Settings-Options-Windows-10-300x161@2x
      • Under the System Window, click on ‘Power & Sleep’. Under this window, click on ‘Additional Power Settings’
      Power-and-sleep-under-system-settings-300x161@2x
      • When the Additional Power Settings option opens up, you will see ‘Choose what the power buttons do‘ option in the left panel, click on it,
      Power-Options-Windows-10-300x212@2x.jpg
      • Once you click on ‘Choose what the power buttons do’, you will see a checkbox under the shutdown settings with text as ‘Turn on Fast Startup (recommended)’. Check the checkbox and Save changes.
      Turn-on-Fast-startup-on-Windows-10-300x161@2x
      Once you have saved the changes, you have turned on the fast startup for your Windows 1o PC. This will make your Windows 10 system faster with fast boot up on startup.
      I hope that you would have found this article helpful. If you are aware of some other tips which can make Windows startup faster, do share with us in the comment section below.