Saturday, 3 May 2014

Big Rock Blogger

How to set up Bigrock custom Domain for Blogger

Posted by Vinay Kumar at 02:43 
Set up bigrock custom domain for blogger blog     Recently I have shared a post related to   Advantage of having custom domain name for your  blog. As you know, Most of us newbie blogger start their blogging career with the free blogger blog which can be hosted by Google. But when you create your blogwith blogger, your blog URL looks like domain.blogspot.com or domain.blogspot.in which is sub-domain. But I suggest to you that you should remove “.blogspot.in” or “.blogspot.com” from your URL of a blogger blog. For this you have to spend some money to buy your own wishes domain name from any domain provider companies. You can buy your domain name from Godaddy.com or BigRock.com. But I am using BigRock domain, so I suggest you to buy domain from BigRock. Bigrock is trusted network. If you are going to buy domain name form BigRock.com, I think that you should our DISCOUNT COUPON CODE to get maximum discount.


  • See Also: How to set up Godaddy custom Domain for Blogger  ---  Coming soon!

Here are 11 Steps to Setup BigRock as Custom Domain for Blogger

If you have already purchased custom domain name from Bigrock, please follow these steps to set up your domain to your blogger blog and cheers.

Step-1- Login in your BigRock Account and select your domain.
Log in Bigrock account

Step-2- Now Find “DNS Management” and then click on “Manage DNS” button.
Manage DNS

 Step-3- Now one popup window will appear, in which click on “A Records” tab. And Click on “Add A Record Button”.

Add A Record  

Step-4- Now leave name field as a blank and in IPV4 address field insert following code.
"216.239.32.21"
 After It, click on “Modify Record” button.

Modify Record

 Step-5- Now repeat step-4 three times more to add following three “A Records” in same way.

"216.239.34.21
 216.239.36.21
 216.239.38.21"

add following three A Records

Step-6- After creating 4 different “A Records” for your domain, Go to CNAME tab to add “CNAME Records”. Now click on “CNAME Records” tab and then click on “Add CNAME Record” Button.

Add CNAME Record

Step-7- In Host Name field write “www” and in value field insert following URL. 
ghs.google.com 
 Then, Click on “Add Record” button.


Add CName Record


After completing all above sixth steps, you have to setup your Bigrock domain to your blogger blog destination and verify to you blog with BigRock.

Setup Domain Name to Blogger blog and verify your Blog

  Step-8- Log in your blogger Account, Go to setting > click basic button. Click On Add Custom DomainSwitch to advanced settings > Type your domain name with www (e.g.www.24problogging.com) and click Save button. Then your blog ask you to verify authority on that domain name. Now you have to create another CNAME record in Domain DNS to verify.

Add Custom Domain

Step-9- Go to your “CNAME Records” tab and then click on “Add CNAME Record” Button. Copy first code and paste it in Host Name field. Similarly copy second code and paste it in “www” and in value field. Then finally click “Add Record”.  
add www CNAME record

Step-10- Now you need to repeat Step No.7 to verify your domain. For this, go to blogger Account. Setting > Basic button, Click on Add Custom Domain> Switch to advanced settings> Type your domain name with www (e.g. www.24problogging.com) and click Save button.
This time, you find there is no error.
 It will take 2 hours more to updates DNS settings; See your blog with custom domain after 2 hours and cheer.
Type your domain name with www

 Step-11- After 2 hours, Log in your blogger Account, Go to setting > click basic button. Click On EDIT.Then Tick redirect to without www.Domain name to with www.Domain name and clicksave button.
Click On  EDIT

redirect to without www.Domain name to with www.Domain name

Thursday, 1 May 2014

Google Launches New Standalone Docs, Sheets, and Slides Mobile Apps


Google Launches New Standalone Docs, Sheets, and Slides Mobile Apps




Android/iOS: Not to be outdone by Microsoft Office on the iPad, Google has announced new dedicated mobile apps for Google Docs, Sheets, and Slides. They work offline and get you to your files more quickly.
P
When you open one of these apps, your most recently edited files will be shown, saving you the hassle of digging through Drive for them.
Docs and Sheets are available now in Google Play and the iTunes App Store, with Slides coming soon. You can read more at Google's official blog, but that's pretty much it in a nutshell.P
Docs (Free) in Google Play and iTunes App Store | via TechCrunchP
Sheets (Free) in Google Play and iTunes App Store

Buy domain for your website at just 163 Rupees from godaddy.com

You can buy domain for 1 year in just 163 Rs







SPECIAL OFFER! .COM just Rs.163.00*! Additional .COMs just Rs.689.00* per year!
Plus ICANN fee of Rs.11.54 per domain name per year. Rs.163.00 price good for the first year of one new or transfer .COM per customer. Additional years or .COMs may be purchased for Rs.689.00 per year. Discounts cannot be used in conjunction with any other offer or promotion. Customers may not use gift cards, In-Store Credit, Skrill, PayPal® or AliPay to redeem this offer. Your discount will be applied in your shopping cart. After the initial purchase term, discounted products will renew at the then-current renewal rate. Go Daddy reserves the right to deny use of this offer and/or cancel domains purchased using this offer if the offer is abused or used fraudulently, as determined by Go Daddy in its sole discretion.

Click Here


Google to stop scanning student email accounts for ads


SAN FRANCISCO: Google will stop looking for advertising ideas in the emails of students using a suite of the internet company's free products tailored for schools.

The changes announced Wednesday affect Google's "Apps for Education" service that has been offered to schools for the past seven years
.

Among other things, Google says it will no longer pore through Gmails sent through Apps for Education for clues about students' interests. The scanning helps the Mountain View, California, company figure out what types of ads might appeal to the students.

Although Google didn't show ads in Apps for Education unless school administrators choose to allow the commercial pitches, the company could still use the personal data collected in Gmail scanning to peddle products when students might be using other online services.

More than 30 million students, teachers and administrators use the Apps for Education suite.

"Earning and keeping their trust drives our business forward," Bram Bout, Google's director of education wrote in a blog post. "We know that trust is earned through protecting their privacy and providing the best security measures."

Google's habitual scanning of Gmail had become the focal point of a federal lawsuit alleging the practice violated users' privacy. The case included claims by students at the University of Hawaii and the University of the Pacific in Stockton, California that they were required to use Apps for Education as part of their enrollment in schools.

US District Judge Lucy Koh dealt the lawsuit a setback last month when she denied a request to certify it as a class action representing tens of millions of Gmail users.

Google's scanning of Gmail in schools also had been facing questions about whether it violated the 40-year-old Family Educational Rights and Privacy Act, which is meant to protect student privacy.

Bout's blog post didn't cite the legal issues facing Gmail-scanning in his blog post outlining the revisions to Google's Apps for Education policies.

"Google executives are always pushing the limits and only back off when their hands are caught in the cookie jar," said John Simpson, privacy project director for Consumer Watchdog, a group that has railed against Google's data-collection practices for years.

Google is also removing the option that allowed school administrators to show Gmail ads when students were using Apps for Education.

Source

Facebook introduces Anonymous Login, mobile ad network

mark_zuckerberg_facebook_mobile_keynote_ap.jpg


Facebook moved Wednesday to bolster the trust of its more than one billion users by providing new controls on how much information is shared on the world's leading social network.
In a major shift away from the notion long preached by Facebook co-founder and chief Mark Zuckerberg of having a single known identity online, people will be able to use applications anonymously at Facebook.
The social network also provided a streamlined way for people to control which data applications can access and began letting people rein in what friends can do with shared posts at Facebook.
Zuckerberg announced the changes, along with moves to make Facebook a more stable platform for applications, at the social network's sold-out f8 developers conference.
"By giving people more power and control, they are going to trust all the apps we build more and over time use them more," Zuckerberg told an audience of about 1,700 conference attendees.
"That is positive for everyone."
In a statement Facebook explained its new "Anonymous Login" as an easy way for people to try an app without sharing personal information from Facebook..
"People tell us they're sometimes worried about sharing information with apps and want more choice and control over what personal information apps receive," the company said. "Today's announcements put power and control squarely in people's hands."
People are scared
In coming weeks, Facebook will also roll out a redesigned dashboard to give users a simple way to manage or remove third-party applications linked to their profiles at the social network.
"This is really big from a user standpoint," JibJab chief executive Gregg Spiridellis said of what he heard during the keynote presentation that opened the one-day Facebook conference.
"I think they are seeing people are scared. They realize that long-term, they need to be trusted."
A JibJab application that can synch with Facebook lets people personalize digital greeting cards with images of themselves or friends.
In a major move that promises to help application makers bring in more money and to further challenge Google for online marketing revenue, Facebook is expanding a test of putting its ad-targeting prowess to work for developers.
A Facebook Audience Network will what people share publicly about themselves and their interests to pinpoint marketing messages in third-party apps linked to Facebook on desktop computers or mobile devices.
Better targeted ads promise to be more effective and, by extension, more attractive to marketers as well as app makers.
"These guys are so smart," Spiridellis said of the Facebook team. "Every publisher is going to switch to Audience."
Hacker way
Facebook revived its popular developers conference after a two-year hiatus and promised that the event will take place annually for the foreseeable future.
Zuckerberg said the overarching themes at f8 were ways to help developers "build, grow, and monetize" applications that synch with Facebook.
While Zuckerberg still proudly endorses a "hacker way" of creatively bending software in innovative directions, he promised developers that the Facebook platform on which they rely will deliver "stability and consistency."
"My goal is building a culture of loving the people we serve that is as strong as hacking it," Zuckerberg said as he wound up his presentation on a personal note.
He described being in a personally reflective period triggered by Facebook turning 10 years old in February and him marking his 30th birthday in just a few weeks.
It has also been 10 years since he first met his wife, Priscilla Chan, he added.
"It's a time to reflect in life, family, philanthropy and what is important in the 10 years ahead," Zuckerberg said.

Trick to Zoom Windows 7 or Windows 8 Screen



A simple trick by which we can zoom our computer screen is by pressing Windows + +(plus) and Windows+-(minus) to zoom out our Computer Windows. it is a shortcut key to enable Magnifier of Windows.





Have Fun

Wednesday, 30 April 2014

Control your PC/ LAPTOP with you Hand Gestures






While surfing on internet i found and amazing application which use small feature of Kinetic Energy we see in Xbox and Sony play-station by which we control the game by our Hand and other gestures. Camera installed on the devices detects our gestured and reacts on that. No sensors or any device is needed to be attached to our body. Camera attached on the device detects our movements and reacts on them Latest Television LED's are also equipped with this feature where we don't need to press Remote Keys to change the channel or control the volume just hand gestures are enough to control the volume or change the channel and they are not like bio-metric, anybody can use the gesture to control the TV. This will be really amazing to see Brother and Sister fight for one channel because Brother hides the Remote Control so he can watch his favorite Programs. Now Sisters can handle the TV with Gestures which is great news for Girls. Basically this feature is already in market since 3-4 years but now its developing and coming on low prices.  

We don't need to buy such very expansive TV's to feel the gesture control. We can experience it on our own Computer or Laptop by using a very small app i just installed.

Download the app from https://flutterapp.com/ and click on For Windows if you are running Windows platform or you can also use this app on your MAC OS.
Install the app and enjoy your VLC player PLAY/PAUSE with just showing your hand to the web camera and you can also control Youtube and Netflix by installing Flutter extension on your Google Chrome web browser.

Its just for FUN but i enjoyed the my 1 minute by playing with this app.

Tested app not a hack tool and not dangerous. Uninstall after playing with it if you feel insecure. as i explained in previous articles that people can use our webcams without our permission. just play with it and uninstall the app and also keep your webcamera removed if you don't use it.

This will surely make smile on your face.

Have Fun

Flexible Paper thin Tablets, mobiles and TV Screens will be next




WASHINGTON: Scientists have used a focused beam of electrons to create some of the smallest nanowires ever made, an advance that paves the way for flexible, paper-thin tablets and television displays.

Junhao Lin, a Vanderbilt University student and visiting scientist at Oak Ridge National Laboratory (ORNL), used a finely focused beam of electrons to create the flexible metallic wires only three atoms wide: One thousandth the width of the microscopic wires used to connect the transistors in today's integrated circuits.

According to Lin's advisor Sokrates Pantelides, University Distinguished Professor of Physics and Engineering at Vanderbilt University, and his collaborators at ORNL, the technique represents an exciting new way to manipulate matter at the nanoscale and should give a boost to efforts to create electronic circuits out of atomic monolayers, the thinnest possible form factor for solid objects.

Lin made the tiny wires from a special family of semiconducting materials that naturally form monolayers.

These materials, called transition-metal dichalcogenides (TMDCs), are made by combining the metals molybdenum or tungsten with either sulfur or selenium.

The best-known member of the family is molybdenum disulfide, a common mineral that is used as a solid lubricant.

Atomic monolayers are the object of considerable scientific interest because they tend to have a number of remarkable qualities, such as exceptional strength and flexibility, transparency and high electron mobility.

Other research groups have already created functioning transistors and flash memory gates out of TMDC materials.

So the discovery of how to make wires provides the means for interconnecting these basic elements.

Next to the transistors, wiring is one of the most important parts of an integrated circuit. Although today's integrated circuits (chips) are the size of a thumbnail, they contain more than 32 kms of copper wiring.

"This will likely stimulate a huge research interest in monolayer circuit design," Lin said.

"Because this technique uses electron irradiation, it can in principle be applicable to any kind of electron-based instrument, such as electron-beam lithography," Lin added.

One of the intriguing properties of monolayer circuitry is its toughness and flexibility.

It is too early to predict what kinds of applications it will produce, but "If you let your imagination go, you can envision tablets and television displays that are as thin as a sheet of paper that you can roll up and stuff in your pocket or purse," Pantelides said.

The study included a group headed by Kazu Suenaga at the National Institute of Advanced Industrial Science and Technology in Tsukuba, Japan. Other collaborators at ORNL, the University of Tennessee in Knoxville, Vanderbilt University, and Fisk University contributed to the project.

The study was published in the journal Nature Nanotechnology

Hack Internet Modem of Unsecured users

Internet is very dangerous i already explained in my almost every post. here today i am going to give you a specimen to you which is just for your study purpose. Never ever try this at home you will be trapped and can be sent to jail for this action. i have used a software Angry IP Scanner which scans a range of IP's. An attacker scans all the IP range of any ISP(Internet Service Provider) with open ports of the computer. What does ports means? Ports are basically virtual doors to reach a computer and every Software we use such as Internet Explorer, Yahoo messenger, Skype etc works on some port No. Port no. of both client and server must be same to make communication. Server knocks the door of client and then client receives the message and shows us, if the port no is wrong then we don't receive the message because our Antivirus Program or Windows Firewall blocks the message which is not meant for us. So here the simple example showing how we can reach to the Internet Modem of any user who is not secured.



I took a range of IP's and scanned Port No. 80 which is meant to reach the victim through Internet Web Browser. All the users with RED icon are safe and i cant reach their Internet Modem but the users whose icon are GREEN i can open their Internet Modems and can change their settings without their permission.

Here are the steps. 

Step 1. Open the web browser such as internet explorer, google chrome or mozilla firefox.
Step 2. Now enter the IP address whose icon is GREEN.
Step 3. Now it will ask for username and password enter admin in username and admin in password.
Step 4. Now do whatever you want to do with the Modem of the victim.
Step 5. Please do not change the setting of any user because it will take you in trouble because every task we perform is saved in the log files of our ISP servers.

Screenshot of victims Internet Modem










You can save yourself by changing Modem password from admin to anything by typing 192.168.1.1 or 192.168.0.1(whichever works) in your web browser and giving user name and password as admin. or enable your firewall or use good antivirus software. If a layman like me can reach to Modem then a trained hacker can do anything. An attacker can use your computer to hack someone else by using ur IP address which will create trouble.


See how secure we are on internet.
Never use such things to hack anybody. Everybody has their own personal life and everybody has right to life life in their own way.

Be safe!!!!!!!!!!!!!!!!!!!!


What is Keylogger?

In February 2005, Joe Lopez, a businessman from Florida, filed a suit against Bank of America after unknown hackers stole $90,000 from his Bank of America account. The money had been transferred to Latvia.

An investigation showed that Mr. Lopez’s computer was infected with a malicious program, Backdoor.Coreflood, which records every keystroke and sends this information to malicious users via the Internet. This is how the hackers got hold of Joe Lopez’s user name and password, since Mr. Lopez often used the Internet to manage his Bank of America account.

However the court did not rule in favor of the plaintiff, saying that Mr. Lopez had neglected to take basic precautions when managing his bank account on the Internet: a signature for the malicious code that was found on his system had been added to nearly all antivirus product databases back in 2003.

Joe Lopez’s losses were caused by a combination of overall carelessness and an ordinary keylogging program.(Source)

Now let me explain what is keylogger?

Keylogger can be a small piece of software or hardware which records every keystroke and it monitor all the activities of the user. They can be programmed in any programming language such as C, C++,VB, VB.NET, JAVA etc. the simple coding to record all the keystrokes is available in almost every programming language. So this programming skills can be used to send the keystrokes and the website where those keystrokes are used through an an email to the attacker. So all the information of Victims Computer can be sent through just a very small piece of software to the attacker who can use that information anytime he wants.

Types of Keyloggers.

There are two types of keyloggers one is programmed Software keyloggers and other is Hardware keyloggers. 

1. Software Keyloggers: Software keyloggers are programmed keyloggers which are written in some programming language to record all the keystrokes with the website or software name which we are using. For Example: If we are buying products online and we are entering Credit Card, Internet Banking details on our banking website and if keylogger is installed on our PC/Laptop then it will email the information we enter in the webpage of banking website and hacker can use that details to transfer or use your money for his shopping. Most of the Paid Antivirus software's can trace keyloggers but smart hacker can remove the Antivirus Signature from the keylogger so it can not be detected by the Antivirus Software. Because Nothing is Impossible. Govt of some countries also use keyloggers to trap the victims and because of that Antivirus Companies do not detect the keylogger software's Govt's use. Basically keylogger softwares are hidden from the taskmaneger because they are programmed to steal the information and the existence of the keylogger can be hided very easily with just 2-3 lines of code.

How to be safely enter credit card/online banking details online?
Now the question is for a layman person its nor possible to detect if his/her computer is infected by any keylogger or not. Because most of the people use pirated Windows and they cant even take assistance from Microsoft, and the guys who installs windows can also install trojans or keyloggers on your computer to steal your information. So if you ahve any doubt that your PC/Laptop is infected then you can use virtual keyboard which is present on almost every online banking website and we can also use on screen keyboard utility which is present in almost all Windows Operating systems which also use mouse to press keystrokes, because we need to press the buttons from the mouse and we don't need to press keystrokes so our information is not recorded. 






There is a special case if smart keylogger is transmitting every screenshot of our PC to attacker then attacker can easily get details through that screenshots too but its very bad technique because every screenshot will be in the form of image and uploading every image after 1 sec means 60 images per minute is very tedious work which will slow down the internet of the victim. But if attacker knows that the victim has an internet with very good speed then the attacker can use that method too. Nothing is safe. 


2. Keylogger Hardware: There is an another way of recording keystrokes using a special hardware which saves all the keystrokes in separate memory and that information then can be used anytime.


Keyboard Hardware :A special hardware is installed on the back of the CPU cabinet prior to the PS/2 adapter of the keyboard as shown in the figure and that hardware records the keystrokes pressed by the user. Cyber Cafe owners use such kind of unethical things to steal the user information of their clients.

USB Keyloggers: There is an another way of recording the keystrokes usiing a USB stick. USB stick stores each keystroke of the user and then saves all the keystrokes USB memory and later that keystrokes can be seen by the attacker to steal the personal information or banking details of the victim.


Never ever use E-Banking in Cafe, Hotels, or Shopping Malls they can also steal our keystroke information through their internet using sniffers which keeps track of every data packet sent and received.

Be Safe!!!!!!!!!!!!!!!!!!!!!!!


or more details Read This and This

Tuesday, 29 April 2014

What is Cloud Computing?

Term Cloud Computing is used as the server side computing in which applications are installed on server end and clients use that applications online via a network.which saves space of the client computer and client computer do not need to be configured with high level hardware, what it needs is high speed network or internet and that network is refereed as cloud. Applications can also be executed over the internet publicly, the common example of cloud computing is Google Drive which has special features by which we can create and edit Document files, Excel Worksheet and PowerPoint presentations. we don't need to install MS-Office on our computer to run these applications. We only need an internet and cloud service provider. There are many other cloud service providers which provide more applications online so users can do their work without installing the software's on their client machines. Same cloud storage is also the term in which users store the data which is accessible anywhere in the world(previously we use FTP servers to store and access files over the internet which was not very safe and user friendly environment) So cloud computing made it very user friendly and easy. users can automatically store the images of their mobiles in cloud storage client such as Google Drive, Dropbox etc. When we click any Photo from our mobile then that photo automatically uploaded to our Cloud storage user id and then later we can access that files from anywhere by login to our cloud storage account.

There are many applications which provide cloud storage for our mobile such as Google Drive, Dropbox, Azure etc. They are available free with some limited storage and we can buy more storage if we need more storage space on cloud. This feature is very useful in case of companies data which can easily be accessed from anywhere from the world. Email clients has size limitations for attachment files but these cloud storage servers can easily store large files on cloud account.

Friday, 25 April 2014

How ATM's are hacked?

Its very unsafe to use ATM on ATM machines because people can easily hack ATM machines with simple tricks without having Computer Knowledge or anything. Simple tricks includes Social Engineering and ATM tempering can do this task very easily.

If you think like a hacker or thief then u can never be caught in this trap. Only smartness is not enough to be safe. We must be aware and conscious every time we use ATM's on ATM machines. 

Things i noticed while using ATM's which may result in ATM hacking are.


1. A case i just experiences was my ATM was not working on a machine and ATM Machine was not accepting my ATM, one guy came to me and said may i help you being a techie geek i denied but what i noticed he was having one more same ATM in his hand, and his plan was to help me and get my PIN and swap his ATM with mine so he could withdraw my money from some other place.Then i noticed why my ATM was not working, when i checked then someone tempered the place where we swipe the ATM with an IRON PIN. There wasn't much space so my card was not accepted by the ATM. when i removed that thing from the Swipe machine my ATM worked like a charm.

2. Second case i noticed many times but seen today on a newspaper that a thief placed a BLADE below the enter key. We don't need to press ENTER key while entering PIN or choosing Withdraw option, we use ENTER key after entering the Amount we withdraw. And if ENTER key is not working then we people think that ATM machine is hanged and is not working, So we leave the ATM machine. in the mean time the Thief who waits us to leave the ATM comes and removes the blade from the ATM and get the money.

3. Never Allow anybody to enter the ATM place if you are doing any transaction. He/She can see your PIN and then later can do anything to get your ATM.

4. Try not to use ATM on the places which are very desolate.

5. Never leave the ATM until you see the message Transaction is failed or Welcome Screen asking to input an ATM card in the machine.

6. If ATM machine is not withdrawing money then call the help center of the BANK and tell them the problem. Your all conversation will be recorded to the CCTV Camera installed in ATM.

7. Never swipe ATM card while shopping, If u are very much aware of all this social engineering ang tricks only then use ur Credit or Debit Card while shopping on showrooms. Showroom owners can also steal your ATM details through Cameras installed on their cash counter. what they need to use your Debit or Credit card is just ATM no, Name on Card and PIN and everything is saved in the video footage of CCTV installed on Cash Counter.

8. If you have used the ATM and you feel that the place was not safe then immediately go to any ATM and then change the PIN or call the customer care to block your ATM. Always keep Customer Care no of your ATM Bank in your Mobile.

9. While shopping online try not to pay online if you have an option to pay cash on Delivery. Because leaving Debit Card information on some websites can be the reason of your money loss.

10. Always keep your eyes open while doing transactions and if you can then always keep small amount in the Account which you use for Online Banking and Debit Card Shopping.

11. Never use Salary Accounts for Online Banking this can be very dangerous.

Always keep your eyes Open while doing Electronic Transaction such as online payments, Debit and Credit card payments.







Start Button menu on Windows 8 and Windows 8.1

Windows 7 like Start button is missing in Windows 8 and Windows 8.1. So you can still access some features of start button through third party software's such as Start8. and still if you don't want to use any software then there are two ways to open Start Menu on Windows 8/8.1




1. Right click on the Windows 8 or Windows 8.1 Start Button.

2. You can open the Start Button menu by pressing Windows key+x Key combination from the keyboard.

How to create a Like Page on facebook for you Company. and promote on Facebook Ads Manager





Step 1. Login to your facebook account.(If you want to make a page for your company then create a separate facebook account on the name of your company with company email address).



Step 2. Now click on the Down Arroa Button on the Top Left corner of the facebook webpage and then click on Create Pagesb option



Step 3. Now choose the type of organisation or interest for which you want to create a facebook page. If you want to create a page for your Company then Click on Company,Organization and Institution.



Step 4. Now choose the Type of your company from the drop down list.


Step 5. type the name of your Company and click on Get Started.


Step 6. now add Company details and Company Photo and other information. Such as website url etc.


Dont forget to choose the option use facebook as: to make your page as default in your company's facebook account.



Now you can promote your company page on facebook Ad Campaign by paying some amount so people can visit your facebook page or website.

Steps to promote your facebook page are:

Step 1. Click on the Ads Manager button displayed on the Top Right Corner of your created page.


Step 2. Now click on Create an Ad button and choose the option you want to advertise. You can promote your website as well as facebook page if money is not and option. These two options will help you to get traffic. You can use this method as trial basis for atleast 4-5 days.




Remember to create a page after 12:00 Midnight(12:05 a.m will be good) according to your country because you will get full 24 hours for 1st day.

Thursday, 24 April 2014

How to Blur Picture in MS-Paint

Sometime we need to apply blur effect on the Images and we can do it with Adobe Photoshop very easily, but if we don't have Photoshop installed then we can do this in MS-Paint which is installed on every Microsoft Windows Operating System. We can do this with Windows Vista/7/8/8.1 MS Paint only.

Steps to blur and image in MS paint are as : 
Step 1. open the image in MS-Paint by right clicking on the Picture and clicking on Edit option.

Step 2. Now click on the shape such as Rectangle, Circle or any other which you want to use to blur the area of an image, i want to blur the face so i am using Circle shape.





Step 3. Now click on the Color 2 Box on MS-Paint Window and choose some light color such as Grey or White. I am choosing Grey.



Step 3. Now click on the option Fill and choose between Crayon, Market, Oil, Natural pencil and Watercolor to apply effect.


Step 4. Drag the shape on the area you want to blur or hide.


Happy Blurring ;)

How Much Money Big Tech Companies Make In Just One Second



We all know the major tech companies have a ton of money. But just how much money do these companies bring in everyday? How about every second?
WorldPayZinc is a website that visualizes this data, showing how their profits grow over time

The above image shows how much they make in one second. In just ONE second, Apple makes $1,997, whileGoogle makes $658. Facebook brings in $81.
This GIF shows how much they make over 10 seconds.


64 Bit vs 32 BIT Operating System RAM utilisation

If you have more than 2 GB RAM in your PC or Laptop then install Windows Operating System with 64 BIT, i.e Windows Vista/7/8/8.1 64 Bit edition.

Because 32 Bit Windows Operating System such as Windows Vista/7/8/8.1  can not utilize more than 2 GB RAM. So if you have 4 GB RAM then u will be able to use only 2 GB RAM in 32 Bit Operating System and remaining 2 GB will be wasted.

BSNL Broadband All Lights ON but Internet is not working


ALL Lights on modem are ON and Static but still Internet is not working?

The common problem in BSNL Broadband is DNS Overload or DNS Down, means the Domain Name Server of BSNL is not responding properly, 
So to access your internet either you can wait for DNS to work again or we can change the DNS address of our Modem/PC/Mobile/IP Camera

BSNL uses its own DNS Server but we can also use OpenDNS or Google DNS to overcome this issue..

How to check that the problem is with DNS?

Open Google website by typing its IP Address 74.125.200.105 in addressbar (Where we type www.google.com) instead of www.google.com. If you can see Google webpage then the problem is in BSNL DNS.

I personally use Google DNS 

8.8.8.8

and

8.8.4.4

Next step is to Change the DNS Address of PC/Modem/Mobile/IP Camera
We can use OPenDNS or Google DNS to overcome this issue

OpenDNS IP's

208.67.222.222 (Primary)
208.67.220.220 (Secondary)

Google Public DNS IP's

8.8.8.8 (Primary)
8.8.4.4 (Secondary)




If PC is directly Connected to Modem/Hub/Switch


For Windows XP

Step 1: Open Control Panel.
Step 2: Choose Network and Connections.
Step 3: Click on View Network Connections from the taskpane shown on the left side of the Network and Connections Window
Step 4: Now Right Click on Local Area Connection and Choose Properties.
Step 5: Now in the properties window choose Internet Protocol TCP/IP and then click on Properties Button.
Step 6: Now Click on Use the following DNS Server addresses Radio Button
Step 7: Now type DNS IP addresses of OpenDNS or Google Public DNS as shown above.
Step 8: Now Click on OK and the Close.

Now surf internet on your PC.


For Windows Vista/7/8/8.1
Step 1: Open Control Panel.
Step 2: Choose Network and Sharing Centre
Step 3: Choose Change Adapter Setting from the taskpane shown on the left side of the Window.
Step 4: Now Right Click on Local Area Connection and Choose Properties.
Step 5: Now in the properties window choose Internet Protocol IPv4 and then click on Properties Button.
Step 6: Now Click on Use the following DNS Server addresses Radio Button
Step 7: Now type DNS IP addresses of OpenDNS or Google Public DNS as shown above.
Step 8: Now Click on OK and the Close.

Now surf internet on your PC.






 If using Wifi/Wireless Networks



For Windows XP


Step 1: Open Control Panel.
Step 2: Choose Network and Connections.
Step 3: Click on View Network Connections from the taskpane shown on the left side of the Network and Connections Window
Step 4: Now Right Click on Wireless Network Connection and Choose Properties.
Step 5: Now in the properties window choose Internet Protocol TCP/IP and then click on Properties Button.
Step 6: Now Click on Use the following DNS Server addresses Radio Button
Step 7: Now type DNS IP addresses of OpenDNS or Google Public DNS as shown above.
Step 8: Now Click on OK and the Close.

Now surf internet on your PC.




For Windows Vista/7/8/8.1

Step 1: Open Control Panel.
Step 2: Choose Network and Sharing Centre
Step 3: Choose Change Adapter Setting from the taskpane shown on the left side of the Window.
Step 4: Now Right Click on Wireless Network Connection and Choose Properties.
Step 5: Now in the properties window choose Internet Protocol IPv4 and then click on Properties Button.
Step 6: Now Click on Use the following DNS Server addresses Radio Button
Step 7: Now type DNS IP addresses of OpenDNS or Google Public DNS as shown above.
Step 8: Now Click on OK and the Close.


Now surf internet on your PC.

Happy Surfing.........................!!!!!!!!!!!!!!!!


If u want this configuration for Mobile Phone or Modem then leave the model No. of your Mobile or Modem.