Showing posts with label How to. Show all posts
Showing posts with label How to. Show all posts

Tuesday 30 August 2016

Watch ASCII Star Wars in Windows XP, Vista, 7, 8 & 10

Leave a Comment

Every one of us has watched Star Wars on television, computer or in a theater. It is the same movie with aliens fighting each other for galaxies and such stuff. There is nothing new in it. But wait, have you watched an ASCII (American Standard Code for Information Interchange) version of Star Wars and that too in Windows using telnet? A network protocol is known only to computer wizards. Well if you have not, then you must do it now!

There is a complete copy of Star Wars done entirely in ASCII characters that you can watch in the Windows operating system (or any OS that supports telnet). The only thing required to watch it is an internet connection; speed does not matter. To watch it on Windows XP, Mac OS X and Linux
  1. Go to Start, Run. (Only for Windows users)
  2. Now type "telnet towel.blinkenlights.nl" without the quotes and press Enter. Users of Mac OS X and Linux can directly execute this code in the terminal window.
windos features
\


On Windows 10, Windows 8, Windows 8.1, Windows 7 and Windows Vista

Telnet is turned off by default in the latest versions of Windows. So, to watch star wars, you must first enable telnet by going to Control Panel › Programs › Turn Windows Feature On or Off and ticking both the telnet checkboxes. After doing that, follow the steps given below:-

  1. Go to Start, Search in Windows Vista and Windows 7 and Windows 10. On Windows 8 and Windows 8.1, open the main Start page.
  2. Type telnet and press Enter.
  3. In the following command prompt window, type "o" without quotes and press Enter.
  4. Now type "towel.blinkenlights.nl" without the quotes and press Enter.
towel.blinkenlights.nl



If you do not need telnet anymore, you can turn it off.

command prompt window like the one in the image will open with the movie being played in it. See the movie yourself. Did you enjoy watching this new version of Star Wars? Well, I did and know it for sure that you would have too.


watch and enjoy


NOTE: While the title says Windows 10, this is possible to replicate on any OS after Windows XP by following the above steps, the main focus should be on enabling the Telnet Client, which most commonly is done in Vista, 7 and 8 the same way.
With the above step, we have now reached the end of the guide on how to watch Star Wars in Windows 10.
The reason we went through activating the Telnet client should now be apparent. In Windows XP, Telnet client was accessible without any barriers, but of course, re-enabling this needs to work.
Keeping in mind that the entire movie is being presented in ASCII, you can rest assured that you will be glued to your seat for two to three times the original run time of the cinematic masterpiece.
Keep in mind, that there are no bathroom breaks in between. You won’t be able to pause, rewind or otherwise interact with the movie once it starts.
If you are brave enough to watch the entire movie in a single sitting without a bathroom break, the force is indeed strong in you and you deserve a seat on the Jedi council!

Read More

How to Unblock Websites at School, Work, Home or Anywhere

11 comments

Internet censorship has grown drastically over the past few years with countries like China, Pakistan, Saudi Arabia, Iran taking the lead over others in blocking sources of free unbiased information. China is known to have even forced Google to filter its search results. Government censorship is not the only reason why websites are blocked. Some network administrators also prevent users from accessing certain websites which they believe are of no use in places such as schools and sometimes, even offices. In such times, you may need to access a website that is blocked. This article explains how.

Which websites are most commonly Blocked?
Unblock website's most commonly blocked websites include websites about pop culture, health, medicine, women, religion, and politics. Social websites are also often blocked and include the likes of Facebook, Twitter, YouTube, Quora!, Pinterest, Instagram, MySpace, Reddit, Digg, Hulu, LinkedIn, Tumblr, Blogger (Blogspot), Bebo, Flickr, Yahoo! Messenger, Typepad, Technorati, StumbleUpon and Delicious. Sites like Google News, Wikipedia, Wikileaks, and eBay! are also blocked at certain places.
Access Blocked Websites at School, Work or Anywhere

There are many genuine reasons for which you might want to visit blocked websites at your school or office. Given below are the ways you can use to regain access to the blocked website you wish to visit. 

1. Cache method: Most search engines maintain a cache of web pages indexed by them. You can search for a website on Google, Yahoo! or Bing and click on the cached link that is given next to the result. To load the web pages more quickly, you can visit the text-only version. Since the website is provided from the search engine's servers, it can be used to overcome IP address and URL based filtering.


2. Using Google Web Light: For users browsing on a slow mobile internet connection, Google Web Light removes all CSS styling and JavaScript to present a stripped-down version of the web page from Google's own servers. As the content is provided from Google's servers, the blocking software feels that you are visiting Google, whereas, in reality, you are viewing the blocked website. Go to Google Web Light. To visit the website of your choice, just replace top.com in the URL with the address of the website. Despite being designed for mobile devices with a slow internet connection, Google Web Light can be accessed from your computer as well.

3. Access blocked websites with Google Translate. You can use translation service from Google to visit blocked websites. To do so, enter a language different from the website's language in the 'From' field and English in the "To" field. You can also use this method to bypass software that blocks websites based on specific keyword mentions. Just translate the URL you wish to visit in a different language to overcome the keyword block.


4. Create a 2 layered unblocker: Go to Google Translate, open any proxy website inside it and then use that proxy website to access your blocked website. In this way, you can achieve a two-layered website unblocking.

5. Use RSS Readers for accessing restricted blogs: All blogs syndicate their content via RSS feeds which you can subscribe to in web-based RSS readers like Feedly to access blocked content. For example, the RSS feed of this blog is located at http://feeds.@

6. To access a blocked website, you can enter its IP address instead of the URL in your browser's address bar. This can bypass the most basic forms of website blocks. Although if the blocking software maps the IP address to the website domain, the website will still remain blocked. You can find the IP address of any website by pinging the website domain name in the Command Prompt in Windows (Terminal in other operating systems) and noting its IP address. Execute ping top-trick-for-pc.blogspot.com in the Command Prompt to ping top-trick-for-pc.blogspot.com.


7. Use IP Address to Decimal conversion: If you cannot access your blocked website by entering its IP address, you can enter the decimal equivalent of the URL's IP address to get access to it. Search Google for IP to Decimal + IP Address of the banned website and Google will convert it into decimal. Enter that into your browser's address bar and see if the blocked website opens.

8. Nyud.net: To unblock blocked websites, just add nyud.net to their URL. For example, if this blog (top-trick-for-pc.blogspot.com) is blocked, you can visit it by going to top-trick-for-pc.blogspot.com.

9. Opera Mini Simulator: Opera Mini, the mobile browser for users with a slow internet connection, can be installed on your computer. You can use this PC version to visit blocked websites as Opera Mini accesses content from Opera's servers instead of accessing it from the servers on which the website is hosted. Most websites will load through this method, although the quality of the results obtained may not be that good for JavaScript-heavy websites.


10. TOR: TOR or The Onion Router is free software that protects the privacy and security of its users by channeling data through multiple nodes to prevent the original data from being unscrambled. Although browsing through TOR is a bit slow, it is one of the most effective ways of bypassing restricted websites and protecting your privacy.

11. Proxy websites: There are many proxy websites (anonymizers) that open blocked websites on their servers and present the data to you. This hides the address of the website you are trying to visit from your internet service provider. Few popular free ones include Anonymouse and KProxy.

12. VPN software: VPN or Virtual Private Network software can be described as a tunnel under the public network that offers more anonymity than proxy websites as it also encrypts the data transferred by the blocked website thus, offering complete anonymity. Although most VPN software is available as paid software only, HotSpotShield is a popular free alternative.


13. IP hiding software: Sometimes, websites block users on a particular IP address from visiting themselves. In such cases, free IP hiding software like UltraSurf can be used to visit them. While free software offers very fewer features as compared to paid ones, they are still effective for overcoming the most common blocks.

14. Changing DNS servers: A common way of blocking websites is preventing DNS servers from giving the locations of the blocked website's servers. In such a scenario, changing your DNS servers to those of OpenDNS or Google DNS will be your best option to get over the block. As an additional advantage, this can also increase your internet speed.


15. Edit your host files: Some malware and blocking software edit your host files and add a website's address in them to prevent you from visiting it. In such a scenario, you can edit your host file with Notepad by visiting “C:\WINDOWS\system32\drivers\etc” if C is your system drive. In Windows 10, Windows 8(.1), Windows 7, a warning from UAC might be displayed.

Read More

How to Follow Search Terms and Keyword Mentions on Twitter

Leave a Comment



How to Follow Search Terms and Keyword Mentions on Twitter




Following a certain keyword or a search term on Twitter can be useful for multiple reasons. For example, we can understand how people reacted to a particular event, follow news on a certain topic, know what people say about a brand, find all job postings in our area or know about the latest giveaways of our favorite software. Everything that gets written most probably will get tweeted. Therefore, Twitter is the best place to follow the latest trends and conversations on any topic. 

You don't have to have a Twitter account to follow keywords on Twitter, but it definitely is desirable. Let's have a look at some of the best ways to track Twitter search terms.

1) Twitter Search

Go to Twitter search, enter the desired keyword and follow its mentions. You can also refine your search results by using many criteria like people or places. If you have a Twitter account, you can even save your searches. Additionally, you can also see tweets posted near your area or by the people you follow.

How to Follow Search Terms and Keyword Mentions on Twitter 2




2) TweetDeck

TweetDeck is a Twitter-owned social media dashboard application for the management of Twitter accounts and is the best option when it comes to following search terms. It supports tracking of multiple keywords and following searches in the form of columns.

To use TweetDeck, you need to have a Twitter account.

Follow Twitter SearchesTo follow any keyword on TweetDeck, search for it and click Add Column that comes at the bottom of Search popup.

TweetDeck allows you to filter searches to include tweets written in a particular language, include or exclude tweets containing certain keywords, and to decide whether you want to include retweets or not.


You can also filter searches based on users to include tweets posted by a particular user on a particular topic. You can also decide whether you want to include tweets posted by verified users only.

You can also filter searches to include tweets that have been retweeted, liked or replied to more than a certain number of times to find which tweets are attracting people's attention.

Once a column is added, you can select whether you wish to be alerted once a new tweet is posted fulfilling all the criteria that you have selected. You can either chose to get alerted by sounds or in the form of Desktop notifications. Aside from the web app, TweetDeck is also available as an app for Chrome.

Read More

Sunday 7 August 2016

How To Access Unlimited Internet Without Entering Username And Password In Universities,Colleges And Schools

1 comment







Hello Friends Today I am going to show you how to access unlimited internet at universities, colleges, and Schools without entering username and password
Here I will give you software which enables us to access the internet without entering username and password, this will mostly be helpful for students


THIS IS FOR EDUCATIONAL PURPOSE ONLY, I AM NOT RESPONSIBLE FOR ANY 

ILLEGAL ACTIVITIES DONE BY VISITORS, THIS IS FOR ETHICAL PURPOSE ONLY


In this software you can access VPN, SSH, SSH+  And You Can Enjoy Surfing Speed To The Max 


What is VPN:: 

A virtual private network (VPN) extends a private network across a public network, such as the Internet. It enables a computer or Wi-Fi-enabled device to send and receive data across shared or public networks as if it were directly connected to the private network while benefiting from the functionality, security and management policies of the private network.
A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryptions. Major implementations of VPNs include OpenVPN and IPsec.



What is SSH::

Secure Shell (SSH) is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers. It connects, via a secure channel over an insecure network, a server and a client running SSH server and SSH client programs, respectively. The protocol specification distinguishes between two major versions that are referred to as SSH-1 and   SSH-2. The best-known application of the protocol is for access to shell accounts on Unix-like operating systems, but it can also be used similarly for accounts on Windows. It was designed as a replacement for Telnet and other insecure remote shell protocols such as the Berkeley rsh and rexec protocols, which send information, notably passwords, in plaintext, rendering them susceptible to interception and disclosure using packet analysisThe encryption used by SSH is intended to provide confidentiality and integrity of data over an unsecured network, such as the Internet.





There are some limitations for this software

1) You can use a VPN unless you log in and you can not use both VPN And SSH at a time

2) You can not get 100% Speed By using this software 

3) While Downloading your Downloading Speed Decreases By 25%-30%


Download It from Here




            Thank You for Reading My Post, I Hope It Will Be Useful For You


Read More

Saturday 5 March 2016

TIPS TO IDENTIFY FAKE FACEBOOK ACCOUNT EASILY

Leave a Comment






Fake Facebook Accounts is Proving out to be a new Trend on Facebook. Probably 20-30% of total Facebook Accounts are fake or even more, This Number is Anticipated to be Increasing in Future. Fake accounts on Facebook are mainly Created with an intention to Spam all over Facebook and Spread Virus. Many people Create Fake Girl’s Profiles to Dupe Some innocent Fb Users too.
Sadly, Facebook Can’t Identify Fake Facebook Account and Delete them all Manually, and One Should not expect it from Facebook because of obvious reasons. But yes they will Definitely Block your account if you send lots of Friend requests to Unknown People and if you post or Comment Spammy Links over and over again. Facebook Catches you and then next time when you try to log in again, it asks you to Identify Photos of Friends, This is where Fake Account Users Get Caught.
But This Don’t Stop Spammers to Create another Fake Facebook account, So in this article, we will Discuss Some Tips that will help you to Identify Fake Facebook Account easily, So that you don’t fell in their Traps, Report that Account to Facebook which will Help to Make Facebook Safer to all of us.

4 TIPS TO IDENTIFY FAKE FACEBOOK ACCOUNT


1) Profile Picture :
  • First Thing we see about any Facebook account is their Profile Picture, If you Find any Facebook Account on your Friendlist suspicious, First thing you will do is Use Reverse Image Search. This helps you find out if Similar Pictures are available on the Internet.  First Download the Profile Picture of the account you find suspicious
  • Go to Google images Click on Camera icon which says Search by image, Click on Upload an Image, now choose the Picture you had downloaded earlier, Now once the uploading Completes, google will show you Similar Images that already exist over the internet.
2) Timeline:
  • The Facebook timeline of Facebook accounts says a lot about that Profile. Most Fake Profiles have “Female” as a gender, this doesn’t Mean all fb accounts with “Female” Genders are Fake, There are many other things to Identify Fake Facebook Account.
  • if their photos folder shows only 1 or 2 Pictures that too of random Celebrities then probably it's fake.
  • if the Person does not update Status, or if he does, the Comments does not read like his Real friends or the profile does not comment on others status, then its likely to be a Fake profile
  • The “About” tab will give you More information about the Profile if the “About” tab doesn’t show you any info about the person profile then that's an indication about the fake profile
3) Wait for 1st january:
  • This is kind of Funny, Why Would one Wait for 1st Jan to Identify Fake Facebook Account, Well Fake Profile Makers Most Probably Enter 1st Jan as their birth date while creating a Fake account. So on 1st Jan, Facebook will Show you People who have birthdays today. Go through that list and Unfriend them if you dont know them Personally.
  • On 1st Jan 2014, I was shocked to see 28 people Having their birthday, Guess what I performed the above Process.
4) Girls Profile :
  • Most of the Fake profiles are created with Girl Identity and with a Beautiful face as a Profile Picture, You may even find Cell phone Number, Girls Hardly will Share thier Contact number in Public.
  • A girl Profile with Lots of Friends and Followers indicates a Fake Profile.
These were some tips to Identify Fake Facebook Account, which I wanted to share with you all, if you find any Fake profile then you and your friends can report it to Facebook.
Read More

COMMON USES OF F1-F12 KEYS IN WINDOWS

2 comments





You might be Using Windows for a long time but I am sure the majority of you guys don’t know all the features and Uses of F1-F12 keys on your keyboard. We all know Common shortcuts like CTRL+C to Copy and CTRL+V to Paste, But you might not know what F1, F2, F3…….F12 keys actually do and where and when to use them.
In this article, we will see Common features and Uses of F1-F12 keysand also how these keys can be used with the Combination of CTRL and ALT keys.


VARIOUS USES OF F1-F12 KEYS IN WINDOWS


USES OF F1 KEY:

  • F1 key almost everywhere is used for “Help”.  if you are using windows OS and want help anywhere then press the F1 key, this will open up help window for you.
  • Sometimes F1 key is used to enter the BIOS (press F1 when your computer is about to boot).
  • A combination of Win + F1 keys will open the “Help and Support» Microsoft Windows.

USES OF F2 KEY:

  • Rapidly rename the chosen file or folder. Works in all adaptations of Windows.
  • Alt + Ctrl + F2 – Opens the Document as a Microsoft Word.
  • Ctrl + F2 – Opens the Preview window in Microsoft Word.
  • Frequently to enter the BIOS.

USES OF F3 KEY:

  • In the MS-DOS charge line or in Windows, press F3 to rehash the last summon.
  • Win + F3 – Advanced Search window opens in Microsoft Outlook.
  • Shift + F3 – Changes the content in Microsoft Word, from upper to lower case or capital letters at the start of each one expression.
  • If I am not mixed up, it is the F3 key which will cause the Application«Control» computers Apple, running Mac OS X.

USES OF F4 KEY:

  • This opens the location bar if you press F4 in Windows Explorer and Internet Explorer.
  • Rehash the last activity (MS Word )
  • Ctrl + F4 – Closes the window open in the present window, for example, a tab in the program
  • Alt + F4 – Closes the system window in Windows.

USES OF F5 KEY:

  • Refreshes the present page (works in all advanced programs), and additionally redesign the desktop or open organizers in Windows.
  • Running a slide demonstrate in Powerpoint.

USES OF F6 KEY:

  • Move the cursor in the location bar (additionally works in numerous advanced programs).
  • Ctrl + Shift + F6 – opens Document in Microsoft Word

USE OF F7 KEY:

  • Mostly used for spelling and grammar in a document programs Microsoft (Word, Outlook, etc.)

USE OF F8 KEY:

  • Pressing the F8 key while your PC is about to boot will result in booting your PC in Safe mode.

USE OF F9 KEY:

  • The F9 key does not have any functionality in Windows. It may however, be used in some individual programs. To find out if it is available in the program you are using, bring up the program’s help screen and type in the words function key.

USES OF F10 KEY:

  • Activates “Menu” in the open organizer window.
  • Shift + F10 – works the same as the right mouse click.
  • Pressing F10 while your system is booting will show you BIOS Information.
  •  F10 is used to enter the hidden recovery partition on computers Sony.

USE OF F11 KEY:

  • F11 Key will take you to Full-screen mode and it can be used and work in any Browser.

USES OF F12 KEY:

  • Opens the “Save As” in Microsoft Word.
  • Shift + F12 – Saves a document in Microsoft Word.
  • Ctrl + Shift + F12 – Prints a document in Microsoft Word.
  • F12 key will open up the Inspect element box in any Browser.
Fn + F1 or F2 or …. F12 keys will normally do the task that is Printed on the respective keys, This is basically for Laptop Users.
With this it Concludes my list of uses of F1-F12 keys in windows, if you know any more uses then please add to this article by Commenting Below.

Read More