Skip to main content

Posts

Showing posts from March, 2019

Should I Buy Redmi Note 6 Pro?

    Xiaomi Redmi Note 6 Pro.... Nowadays most popular smartphone in cheap rate. If you are going to buy a latest smartphone which is under 15,000, then i'll only suggest you to buy Xiaomi Redmi Note 6 Pro.     As compare to other smartphones Xiaomi Redmi Note 6 Pro has more features. But you know "there are two sides to every coin". Every Smartphone has good as well as bad things also. let's talk about its good features first. Pros:: Good Camera:- Quad Camera(4 cameras, it's a highlightof this product. Actually it has best low light performance as compare to other smartphones. Also best portrate mode. It has electronic stabilization Reliable Performace Battery:-Excellent battery life that is *4000mAh built-in battery 10W charger, Qualcomm Quick Charge 3.0* Display:-display is 6.26-inch FHD+ (2280×1080 pixels) 19:9 IPS display with Gorilla Glass (version unspecified) Cons::  Design :- Not excitement about desing as compare to Redmi Not

A Hacker Should Know These Informations(Full Forms)

These Are Some Important Information That A Hacker Need to Know 👇         Guys, Here are some full forms that you should know if you are from Technical Field. This information is mostly been asked in interviews, so don't just read it, store it in your mind.  GOOGLE - Global Organization Of Oriented Group Language Of Earth.  YAHOO - Yet Another Hierarchical Officious Oracle.  WINDOW - Wide Interactive Network Development for Office work Solution.   COMPUTER - Common Oriented Machine Particularly United and used under Technical and Educational Research.   VIRUS - Vital Information Resources Under Siege.   UMTS - Universal Mobile Telecommunicati ons System.   AMOLED - Active-matrix organic light-emitting diode.   OLED - Organic light-emitting diode.   IMEI - International Mobile Equipment Identity.   ESN - Electronic Serial Number.   UPS - Uninterruptible power supply.   HDMI - High-Definition Multimedia Interface.   VPN - Virtual private

📞 PHONE SHORT CUTS AND TECHS

       We all are using mobile phones in our daily life and 2 billion people are using SmartPhones ( 1.91 billion to be exact). But most of us don't know the shortcuts about our phone, that can help us a lot to find sufficient information about our phone that we actually don't know or have to search in setting or somewhere else in our mobile phone.        So I came with the new trick which will help you a lot.      Dial the following code (in bold format) in your phone's DialBox. ✅ ##4636## Display information about Phone, Battery and Usage statistics ✅ ##7780## Resetting your phone to factory state-Only deletes application data and applications ✅ *2767*3855# It’s a complete wiping of your mobile also it reinstalls the phones firmware ✅ ##34971539## Shows completes information about the camera ✅ ##7594## Changing the power button behavior-Enables direct poweroff once the code enabled ✅ ##273283*255*663282*## For a quick backup to all your m

CREATE AN ANTIVIRUS USING COMMAND PROMPT

In this article we are going to create an antivirus using simply a notepad. It will delete all simple micro viruses in your system. Type the following code into Notepad: @ echo off echo off turn off the active virus taskkill / F / IM  virus1.exe / IM  virus2.exe echo Deleting all of viruses based on size for / RC: \%% a in (*. exe) do if%% ~ za 157,184 equ del / A: HSRA "%% a" echo deleting hidden virus echo for drive c and subfolders for / R C: \%% a in (*. doc.exe) do del "%% a" echo for drive d an d subfolders for / R D: \%% a in (*. doc.exe) do del "%% a" echo Unhide Documentcd / d c: \ echo for drive C and subfolders *. doc attribHSA / S cd / d d: \ echo for drive D an d subfolders *. doc attribHSA / S exit Here, text in green is alert message and text in red are the program that your system will search for those and delete these files. Now, Save the file with .bat extension , For example antivirus.bat. then go

SHORTCUT KEYS FOR SPECIAL CHARACTERS

 Some Shortcut keys for Special Characters            We all love to set our social media nicknames in special characters . We want to type some special characters but in fact we don't know the shortcut key for those characters, so we have to go somewhere, copy that special character and paste in the field, because we don't know the special character for the particular words......      So don't worry i'm here with shortcut keys for most special characters for you..... Alt + 0224 – à Alt + 0232 – è Alt + 0236 – ì Alt + 0242 – ò Alt + 0241 – ñ Alt + 0228 – ä Alt + 0246 – ö Alt + 0252 – ü Alt + 0248 – ø Alt + 0223 – ß Alt + 0198 – Æ Alt + 0231 – ç Alt + 0191 – ¿ Alt + 0176 – ° (degree symbol) Alt + 0177 – ± (plus/minus symbol) Alt + 0153 – TM Alt + 0169 – © Alt + 0174 – ® Alt + 0128 – € (Euro currency) Alt + 0162 – ¢ (Cent symbol) Alt + 0163 – £ (British Pound currency) Alt + 0165 – ¥ (Japanese Yen currency)        Share with your fr

What is Surface Web, Deep Web and Dark Web

         Ladies and Gentlemen, in daily life we are surfing internet for various purpose. Nowadays Internet has become an integral of everyone’s life. But do you know the internet you are using in daily life is the smallest part of the internet and the another largest part of the internet that you might be not using. In this article I’m gonna clear all the things about internet so this article till the end.          The largest part of internet which doesn’t appear on google. And that can be accessed by those who have the direct link or authentications of that part to access. In fact internet is divided into three parts. In fact Internet is divided into three parts. Surface Web Deep Web Dark Web SURFACE WEB:          Surface web is the piece of www(world wide web) which is easily available for all common internet users and which can be accessed by all the search engines, anywhere anytime without any special permission

5 Amazing Tech Facts You Definitely Haven't Heard About

Qwerty Keyboard Was Designed To Slow You  Down        This keyboard design is for latin-script alphabets. The name QWERTY (pronounced as kwirti) came from the first 6 letter in order of kays from top left letter row.        When the type writer was invented, its keys was arranged like piano keys and they were in better manner to type easily and fast for everyone. The typer used to type faster than we simply write by hands. so the typing speed was very high and because each type bar hits the same place on the device causes the type bar jams together. so in response to this Christopher Lantham Sholes invented the QWERTY Keyboard layout in early 1870s not to slow down the typer.... (yes you are right..).. He invented the this QWERTY layout to solve this jam problem of type bars by placing the most commonly used characters forever away from each other.        It was the first type writer which includes the Shift key to easily shifting all of the letter between upper and

What Actually Black Hat Hackers, White Hat Hackers & Gray Hat Hackers Are?

       We all are aware from the term hacking and one who perform this activity is called as hackers. Basically hackers is a skilled computer expert who uses their knowledge (technical) to break the security or just to overcome a security problem.          There are three types of hacke rs in the world. Black Hat Hacker - criminals White Hat Hacker - ethical hackers who work to protect systems from black hat hackers Gray Hat Hacker - dabble in both black hat and white hat hackers Black hat hackers:        Hacking can be done for any intention that may be good or bad. The Black hat hackers performs hacking for bad intention. They do hacking unethically. These types of hackers usually hack systems for following gains: Personal Gain- for example stealing personal data like credit card number, harvesting personal information for sale to identity thieves etc. Destroy Data – black hat hackers are very dangerous that if