Monday, 25 August 2014

TSF Shell 3D Launcher

A third-party launcher is one of the ways to make your Android run faster. Some of the customizations that OEMs make to their devices can be heavy-handed. If you want to change the feel of navigating around & tweak some settings to make it feel speedier, then you might find that a third-party launcher does the trick. Experiment with the settings & you should find that your device feels a lot faster.
TSF Shell 3D Launcher:
TSF Shell is a brand-new 3D launcher that will subvert your concept of the mobile device home screen operations. It offers smooth, unique & customized man-machine interactive operation experience. You are allowed to define all the elements of the home screen freely & efficiently. TSF Shell keeps creating new features & exclusive 3D widgets that will bring you amazing operation experience & unprecedented visual. 

Main features:
1.Fantastic animation transition effects. All operations, including deletion, addition, menu showing-up or vanishing, are provided with natural, glaring & butter-smooth animation transition effects.
2.Miraculous & effective 3D home screen switching mode & freewheeling home screen element layout mode. More than 10 independent layout home screens supported. 
3.Unlimited dock bar. Ability to change its position, length & angle as well as to modify the size & the status (hidden or showed) of icons & folders in the dock bar. You can open the apps & the folders in the dock bar with wave-sliding mode. 
4.Batch icon selecting for home screens, folders & dock bar.
5.More than 10 TSF Shell exclusive widgets, such as Message, Clock, Weather, Memo, Music, Gallery etc. All 3D widgets provide unique visual & operative experience.
6.More than 9 gestures supported for Android shortcuts, e.g. app launching, phone call, sms, as well as TSF Shell shortcuts, e.g. home screen switching, status bar hiding, TSF Shell side bar hiding. 
7.TSF Shell Arch Shortcut Menu with special animation effects & operative experience. Ability to complete quick custom shortcut operations on any home screen.
8.Pioneering icon editing tool. Ability to customize icon back image, upon image, text label style, etc.
9.Many nice free third-party themes are available.
10.Funny & intuitive TSF Shell settings menu. You can preview the corresponding settings directly.

Click the following link to watch the official video:

Thursday, 6 March 2014

NFC mechanism.

NFC stands for “Near Field Communication” & as the name implies, it enables short range communication between compatible devices. This requires at least one transmitting device & another to receive the signal. A range of devices can use the NFC standard and can be considered either passive or active, depending on how the device works.

Passive NFC devices include tags & other small transmitters, that can send information to other NFC devices without the need for a power source of their own. However, they don’t really process any information sent from other sources & can’t connect to other passive components. These often take the form of interactive signs on walls or advertisements.

Active devices are able to both send & receive data & can communicate with each other as well as with passive devices. Smartphones are by far the most common implementation of active NFC devices but public transport card readers & touch payment terminals are also good examples of this technology.

NFC came out of RFID. RFID or radio-frequency identification, is the technology used by shipping companies and in superstores to keep track of goods, it uses electromagnetic induction in order to transmit information. NFC is similar technology but standardized for consumer smartphones. NFC standards are defined by a group called the NFC Forum which includes Nokia, Sony and Philips.

How NFC works?
NFC is a means of sending data over radio waves. In that sense it is similar to Wi-Fi or Bluetooth but unlike those protocols (& like RFID) NFC can be used to induce electric currents within passive components as well as just send data. It is faster than Bluetooth, in general. Indeed the two are closely linked, Samsung Beam uses NFC to pair devices, and then Bluetooth to transfer data.

NFC can work with passive devices that don't require their own power supply, such as travel card readers. NFC's data-transmission frequency is 13.56MHz. NFC can transmit data at either 106, 212 or 424 Kbps (kilobits per second).

NFC standard has three modes of operation
(i) The peer-to-peer mode that lets two smartphones swap data.
(ii) A read/write mode in which one active device picks up info from a passive one.
(iii) Card emulation, in which an NFC device such as a smartphone can be used like a contactless credit card.

Uses Of NFC:

NFC technology is used in five basic sectors.

(i) Commerce: NFC devices can be used in contactless payment systems, similar to those currently used in credit cards & electronic ticket smart-cards & allow mobile payment to replace or supplement these systems.
Example: Google Wallet allows consumers to store credit card & store loyalty card information in a virtual wallet & then use an NFC-enabled device at terminals that also accept MasterCard PayPass transactions.
[Google Wallet is an NFC based wireless payment system that allows its users to store debit and credit card information to make payments at PayPass-enabled terminal at checkouts.]

(ii) Bluetooth & Wi-Fi connections: NFC offers a low-speed connection with extremely simple setup & can be used to bootstrap more capable wireless connections.
Example: The Android Beam software uses NFC to complete the steps of enabling, pairing & establishing a Bluetooth connection when doing a file transfer. Nokia, Samsung, BlackBerry & Sony have used NFC technology to pair Bluetooth headsets, media players, and speakers with one tap in its NFC-enabled devices. The same principle can be applied to the configuration of Wi-Fi networks.

(iii) Social Networking: NFC can be used in social networking situations, such as sharing contacts, photos, videos or files & entering multiplayer mobile games. In the field of social networking, NFC is very useful to exchange contacts & other files.

(iv) Identity & access Tokens: The NFC Forum promotes the potential for NFC-enabled devices to act as electronic identity documents & keycards. As NFC has a short range & supports encryption, it may be more suitable than earlier, less private RFID systems.

(v) Smartphone automation & NFC tags: Smartphones equipped with NFC can be paired with NFC Tags or stickers which can be programmed by NFC apps to automate tasks. These programs can allow for a change of phone settings, a text to be created & sent, an app to be launched, or any number of commands to be executed, limited only by the NFC app & other apps on the smartphone.

These applications are perhaps the most practical current uses for NFC since it does not rely on a company or manufacturer but can be utilized immediately by anyone anywhere with an NFC-equipped smartphone & an NFC tag.

Friday, 13 December 2013

Encrypt A Folder In Mac

Encrypting Folders in Mac

  1. Firstly, open up Disk Utility.
    Disk Utility
  2. Then, click on File > New > Disk Image From Folder.
    New Image from Folder
  3. Select the folder you want to encrypt, and click Image.
    Select Folder to Image
  4. Choose ‘read/write’ if you want your folder to be edit-able (if not, just choose another format), and choose ’128-bit AES encryption’.
    Choose Image Format and Encryption
  5. Type in any password you desire, and very importantly, make sure the checkbox for ‘Remember password in my keychain’ is NOT ticked, else it will defeat the whole purpose of encrypting your folder.
    Description of Image
And that’s it! A password-protected .dmg file will be created based on the folder you selected.Larger folders may take longer to encrypt. Once that is done, you can delete the original folder.
Encrypted DMG File
To access the encrypted disk image, just double-click the .dmg file to mount it in the Finder and punch in the password whenever you try to access the folder. Always uncheck the box saying "Remember password in my keychain" to make sure it is always protected by passwords.
Access Encrypted DMG File
After a disk image is mounted, you’re able to access the folder like normal. Now, putting any files in the folder will put the file under encrypted protection too.
Access Mounted Disc Image
After you’re done working with the folder and want it to be password protected again, just unmount the folder from Finder.
Unmounted Disc Image

Wednesday, 30 October 2013


What is a Vanity URL?

A vanity URL is a URL or domain name, created to point to something to which it is related and indicated in the name of the URL, very similar to a personalized URL. In many cases this is done by a company to point to a specific product or advertising campaign micro-site  In theory, vanity URLs are creatively linked to something making them easier to remember than a more random link.

I'm giving you the example of my G+ account.
Look at the Red Highlighted area in both Screenshots below.

This Customized shortened URL is called the Vanity URL & provided by Google, here in this particular example. 

Following requirements are needed to get a Vanity URL:-

1. You must have a Profile photo.
2. You must have at least 10 Followers.
3. Your account must be 30 days old or more.
4. Most important thing is that you must have registered your valid Cell Phone number with Google to get this benefit.

Thursday, 24 October 2013

Cyber Threats

Cyber threats are those related to being connected to the Internet or other networks. These threats consist of many types, but well-known and common online threats are those which take advantage of email and web services.

However, just connecting your computer to the Internet provides a range of other potential ways your computer can be attacked even when you are not using the web (through your web browser) or reading or accessing email.

Types of Internet threats:


Network worms
Spyware / Adware
Other Malware
Other Threats
Viruses, worms & Trojan horses

A virus is a program that replicates itself, usually by attaching itself to other files and program. A worm is a program that does not infect other programs but makes copies of itself. Trojan horse programs do not replicate nor make copies of themselves, but rely on other “manual” method of distribution. We use the term “Virus” on this page to cover all forms of infections.Virus are spread in a variety of ways.

Some Examples:

  • Email attachments (such as klez, Badtrans, myparty)
  • Instant messages links and attachments (such as Aplore)
  • Compromised web services (such as Nimda)
  • Usenet news groups
  • Internet relay Chart channels
  • USB Storage
  • File downloads (many backdoor Trojans are embedded with other files)
All viruses are different. Some activate on a certain day, but remain dormant until then. Others being the attack as soon as the machine has been infected. Viruses can be very damaging and some are just annoying. More than 1,00,000 known viruses exists in the world today several hundred new Viruses are discovered every month.

[This picture shows the statistics of Online Threats in the world: Updated report until 22nd October'13.]

[This picture shows the statistics of Local infections in the world: Updated report until 22nd October'13.]

Protecting from viruses:

A good way to protect yourself is to have virus protection program and keep it up-to-date. Before running a download from an unknown site, or opening an email attachment, always be sure to scan it to ensure that it is not infected. If you do not know that source of a file does not open it. Even it you know the person who sent you a file, if you were not expecting it you may want to contact them before opening it. This is because many viruses automatically send themselves out to addresses it finds in file on the infect computer.

Anti-Virus program:

An anti-virus program designed to protect your computer from possible viruses infection. Most viruses are designed to operate in the background in a that the user will not notice. Virus protection program search for, detect, and attempt to remove these viruses. Anti-virus program must be kept up to date in order for them to provide adequate protection. New viruses are being created every day and your antivirus program can’t always predict what they will be able to do or how they will work. Due to the nature of the operating system, Linux, and other UNIX kinks operating system are not as susceptible to viruses. Thus an anti-virus program is not necessary.

Network Worm:

  1. Self-replicating Viruses that reside in the active memory of a computer.
  2. Worms send themselves out to the Internet from infected system.
  3. Either include tiny e-mail servers or search for unprotected shared network
Trojan Programs:

Programs that installed themselves stealthy via Internet & provide access for malicious use.
  • Threats enabled by (/through) Trojans
  1. DDos attacks(distributed denial-of-service attack)
  2. Data stealing
  3. Distributed spam emails
  4. Do not replicate

Spyware / Adware:

  1. Cookies-Track you online.
  2. Browser Hijackers-Changes default home page.
  3. Tracking Cookies-Gathers info of web usage.
  4. Trickles-Re-installs spyware when detected.
  5. Keyloggers-Records anything you type.

Other Malware:

  1. Dos & DDos attacks
  2. Flooders
  3. FileCryptors & PoluCryptors
  4. Nukers …Etc.

Other Threats:

  1. Phishing
  2. Confidential information stealing by fraud emails & web sites (author falsified)
  3. Several millions of phishingg messages have been sent world wide
  4. Fastes growing threat today:SPIM
  5. Instant message SPAM
Diagnosing (or) Detecting Infections:

  1. Slow computer, System reboots
  2. Mouse moves by itself
  3. Browser goes to unexpected web sites
  4. Slow internet access
  5. Endless popup ads
  6. New desktop toolbars

  1. Disabled antivirus scanner or firewall
  2. Check startup programs groups regulation for software you didn't install
  3. Add/Remove programs for software’s you didn't install (make a list of install items on a new machine and check the list regularly)
  4. Check running services monthly
  5. Check running processes in task manage
  6. Monitor open ports
  7. Monitor outgoing and incoming connections.
Methods against Threats:
  1. Updating
  2. Antivirus software
  3. Antispyware Tools
  4. Firewall

Know about Top 10  Security Vulnerabilities.

Download the PDF file from my Google Drive with following link.

Friday, 23 August 2013

Free E-book - 55 Ways To Have Fun With Google

There are various tricks & funs which you can do with Google. Get this free e-book from the following link.

Download Here  
[Link closed]

Folder Lock Without Any Software

Folder Lock With Password Without Any Software.

Paste the code given below in notepad and 'Save' it as batch file (with extension '.bat').
Any name will do. 
Then you see a batch file. Double click on this batch file to create a folder locker. 
New folder named 'Locker' would be formed at the same location. 
Now bring all the files you want to hide in the 'Locker' folder. Double click on the batch file to lock the folder namely 'Locker'. 
If you want to unlock your files,double click the batch file again and you would be prompted for password. 
Enter the password and enjoy access to the folder.

N:B--> Password can be dynamic since there ain't any restriction.


if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
echo Invalid password
goto end
md Locker
echo Locker created successfully
goto End