Sunday 6 March 2016

HOW TO POST CUSTOM VIA STATUS ON FACEBOOK

Leave a Comment

Today I will share a short but a Fun Facebook trick with all you Readers, Most of us Use Facebook and update statuses. Normally when you update your status from mobile, then it shows “via Mobile ” or the Name of the brand of mobile you used to update that status. But what if I tell you we can Post Custom Via Status on Facebook which shows like ” Updated via Macbook Pro ” or “iPhone 5” or any other gadget or thing that you don’t even own.


There may be more fun things coming in your mind already, How about “via Potato ” or “via GTA 5″ or ” via Calculator” why not, it can be anything that you can best think of. So let's move on and see how to Post Custom Via Status on Facebook. Continue reading the below Simple steps, and you will learn it easily.

STEPS TO POST CUSTOM VIA STATUS ON FACEBOOK


Step 1: First of all To Post Custom Via Status on Facebook, you will need to create an app on Facebook, Nope that's not hard at all, you don't need to do any Coding, Follow me while I show you how to do it.
Step 2: Click here to go to the Facebook Developer page, there if you are asked to register as a developer, read this step and if you are not asked and you are already registered then skip to Step 3.




Click on Register as a developer and Check the box ” I accept the Facebook Platform Policy and the Facebook Privacy Policy” and Click on Continue > Continue > Done.
Step 3: Now you are Registered as Developer, Now click on Create a new app, Next Step is to name your App so Name it anything that you want to show as “updated via XYZ”. Here in my case it will show ” updated via Smarttricks.net ” as I have named it Smarttricks.net as you can see in the below picture. Now click on Continue, Leave everything else as it is.




Step 4:  On the next page you will be filling some more details like App domain and Site URL, As you can see I have entered my site URL in both the Cases. Everything is done now Click on Save Changes. Note the APP ID we will need it in Next Step



Step 5: You app is Ready, Now its time to use it. Simply Copy the Below URL, Open a new tab in your Browser, Paste it in the address bar, You will have to Replace my APP ID with yours in following URL which is Highlighted in Green Color,

Also Understand that if you want to Redirect your Friends to your own blog when they try and click on your Custom Via Status, then Replace www.smarttricks.net with yours in the above URL.
Step 6: Once you have Replaced the app id and Pasted the URL in your address bar, hit enter and boom, you will see something like below Pic, obviously with your app name.

Step 7: Now its time to let your friends know about this, Write your status and click on Share. You will be redirected to Smarttricks.net but its time to check your timeline to see your Custom via Facebook Status.
Conclusion :
So Now in this article, you learned how to create your own App and how to Post Custom Via Status on Facebook. If In Case you find it Tedious, then I will share one more method, you simply go and click on any name you want as updated via of your choice and you will be taken to the status update page directly.
You might be thinking why so long process when you can do it with this site way to easy? Well, My main aim was to explain the whole process of how it works. and on the above-mentioned site, you are limited to choose the name from the option provided. it's always better to make your own choice of a custom name.
Read More

HOW TO PROTECT WI-FI NETWORK FROM HACKERS

Leave a Comment



Do you use a wireless network like Wi-Fi at your home or office? And afraid of it getting hacked by other people (hackers)? Now a day hacking has become key stress or tension for the peoples and are you one among them getting stressed? Then now you don’t need to get worried about it and let me handle that stress and problem, you just have to do is go through this article and try the stated tips on your own and learn How to Protect Wi-Fi network.


Wireless Networking (Wi-Fi) has made it so easy for anyone to use the Internet on your computer, mobile phones, tablets, and other wireless devices anywhere in the house without the clutter of cables.

With traditional wired networks, it is extremely difficult for someone to steal your bandwidth but the big problem with wireless signals is that others can access the Internet using your broadband connection even while they are in a neighboring building or sitting in a car that’s parked outside your apartment.
This practice, also known as piggybacking, is bad for three reasons:
  • It will increase your monthly Internet bill especially when you have to pay per byte of data transfer.
  • It will decrease your Internet access speed since you are now sharing the same internet connection with other users.
  • It can create a security hazard* as others may hack your computers and access your personal files through your own wireless network.
[*] What do the bad guys use – There have been quite a few instances where innocent Internet users have been arrested for sending hate emails when in reality, their email accounts where hacked though the unsecured Wi-Fi networks that they had at home. Wireshark is a free packet sniffing tool for Linux, Mac, and Windows that can scan traffic flowing through a wireless network including cookies, forms, and other HTTP requests.

How to Secure Your Wireless Network

The good news is that it is not very hard to make your wireless network secure, which will both prevent others from stealing your internet and will also prevent hackers from taking control of your computers through your own wireless network.
Here a few simple things that you should secure your wireless network:

Step 1. Open your router settings page

First, you need to know how to access your wireless router’s settings. Usually, you can do this by typing in “192.168.1.1” into your web browser, and then enter the correct user name and password for the router. This is different for each router, so first, check your router’s user manual.
You can also use Google to find the manuals for most routers online in case you lost the printed manual that came with your router purchase. For your reference, here are direct links to the manufacturer’s site of some popular router brands – LinksysCiscoNetgearApple AirPortSMCD-LinkBuffalo, TP-LINK3ComBelkin.

Step 2. Create a unique password on your router

Once you have logged into your router, the first thing you should do to secure your network is to change the default password* of the router to something more secure.
This will prevent others from accessing the router and you can easily maintain the security settings that you want. You can change the password from the Administration settings on your router’s settings page. The default values are generally admin/password.
[*] What do the bad guys use  This is a public database of default usernames and passwords of wireless routers, modems, switches, and other networking equipment. For instance, anyone can easily make out from the database that the factory-default settings for Linksys equipment can be accessed by using admin for both username and password fields.

Step 3. Change your Network’s SSID name

The SSID (or Wireless Network Name) of your Wireless Router is usually pre-defined as “default” or is set as the brand name of the router (e.g., Linksys). Although this will not make your network inherently* more secure, changing the SSID name of your network is a good idea as it will make it more obvious for others to know which network they are connecting to.
This setting is usually under the basic wireless settings in your router’s settings page. Once this is set, you will always be sure that you are connecting to the correct Wireless network even if there are multiple wireless networks in your area. Don’t use your name, home address or other personal information in the SSID name.
[*] What do the bad guys use  Wi-Fi scanning tools like inSSIDer(Windows) and Kismet (Mac, Linux) are free and they will allow anyone to find all the available Wireless Networks in an area even if the routers are not broadcasting their SSID name.

Step 4. Enable Network Encryption

To prevent other computers in the area from using your internet connection, you need to encrypt your wireless signals.
There are several encryption methods for wireless settings, including WEP, WPA (WPA-Personal), and WPA2 (Wi-Fi Protected Access version 2). WEP is basic encryption and therefore least secure (i.e., it can be easily cracked*, but is compatible with a wide range of devices including older hardware, whereas WPA2 is the most secure but is only compatible with hardware manufactured since 2006.
To enable encryption on your Wireless network, open the wireless security settings on your router’s configuration page. This will usually let you select which security method you wish to choose; if you have older devices, choose WEP, otherwise, go with WPA2. Enter a passphrase to access the network; make sure to set this to something that would be difficult for others to guess, and consider using a combination of letters, numbers, and special characters in the passphrase.
[*] What do the bad guys use  AirCrack and Chowpatty are some free tools that allow even non-hackers to crack the WEP / WPA (PSK) keys using a dictionary or brute force techniques. A video on YouTube suggests that AirCrack may be easily used to break WiFi encryption using a jail-broken iPhone or an iPod Touch.

Step 5. Filter MAC addresses

Whether you have a laptop or a Wi-Fi enabled mobile phone, all your wireless devices have a unique MAC address (this has nothing to do with an Apple Mac) just like every computer connected to the Internet has a unique IP address. For an added layer of protection, you can add the MAC addresses of all your devices to your wireless router’s settings so that only the specified devices can connect to your Wi-Fi network.
MAC addresses are hard-coded into your networking equipment, so one address will only let that one device on the network. It is, unfortunately, possible to spoof a MAC address*, but an attacker must first know one of the MAC addresses of the computers that are connected to your Wireless network before he can attempt spoofing.
To enable MAC address filtering, first make a list of all your hardware devices that you want to connect to your wireless network**. Find their MAC addresses, and then add them to the MAC address filtering in your router’s administrative settings. You can find the MAC address for your computers by opening Command Prompt and typing in “ipconfig /all”, which will show your MAC address beside the name “Physical Address”. You can find the MAC addresses of Wireless mobile phones and other portable devices under their network settings, though this will vary for each device.
[*] What do the bad guys use – Someone can change the MAC address of his or her own computer and can easily connect to your network since your network allows connection from devices that have that particular MAC address. Anyone can determine the MAC address of your device wireless using a sniffing tool like Nmap and he can then change the MAC address of his own computer using another free tool like MAC Shift.

Step 6. Reduce the Range of the Wireless Signal

If your wireless router has a high range but you are staying in a small studio apartment, you can consider decreasing the signal range by either changing the mode of your router to 802.11g (instead of 802.11n or 802.11b) or use a different wireless channel.
You can also try placing the router under the bed, inside a shoebox or wrap a foil around the router antennas so that you can somewhat restrict the direction of signals.
Apply the Anti-Wi-Fi Paint – Researchers have developed a special Wi-Fi blocking paint that can help you stop neighbors from accessing your home network without you having to set up encryption at the router level. The paint contains chemicals that block radio signals by absorbing them. “By coating an entire room, Wi-Fi signals can’t get in and, crucially, can’t get out.”

Step 7. Upgrade your Router’s firmware

You should check the manufacturer’s site occasionally to make sure that your router is running the latest firmware. You can find the existing firmware version of your router using the router’s dashboard at 192.168.*.

Connect to your Secure Wireless Network

To conclude, MAC Address filtering with WPA2 (AES) encryption (and a really complex passphrase) is probably the best way to secure your wireless network.
Once you have enabled the various security settings in your wireless router, you need to add the new settings to your computers and other wireless devices so that they all can connect to the Wi-Fi network. You can select to have your computer automatically connect to this network, so you won’t have to enter the SSID, passphrase and other information every time you connect to the Internet.
Your wireless network will now be a lot more secure and intruders may have a tough time intercepting your Wi-Fi signals.

Who is Connected to your Wireless Network

If you are worried that an outsider may be connecting to the Internet using your Wireless network, try AirSnare – it’s a free utility that will look for unexpected MAC addresses on your Wireless network as well as to DHCP requests. Another option is that you open your router’s administration page (using the 192.168.* address) and look for the DHCP Clients Table (it’s under Status > Local Network on Linksys routers). Here you will see a list of all computers and wireless devices that are connected to your home network.

Read More

Saturday 5 March 2016

RESIZE IMAGE WITHOUT LOOSING QUALITY – HOW TO GUIDE

Leave a Comment



People hate to visit websites that require more time for loading. So one should always seek to improve the webpage load time, so to do so you have to look at many things like loading sources, page cache, media files, etc. One among such media file is images, adding beauty to your page, but at the same time, it is regarded as the bulkiest resources which takes much time to load on the page, thereby causing inconvenience to the visitors.
But one can improve the page load time by cutting the size of an image to a significant amount. But even resizing the image without any proper knowledge may be troublesome as you may lose the quality it had. Though photoshop provides a nice feature to save the original quality of the pic, it is not preferred much as it’s too expensive to purchase the photoshop application for desktop or web version. So here I’m going to provide you with free online tools to Resize Image without losing Quality

WEB-BASED TOOLS TO RESIZE IMAGE WITHOUT losing QUALITY


1.KRAKEN.IO :

JPEG, PNG, GIF, SIV are some of the image formats that can be compressed with this online application. This reduces the image to a quite considerable point without losing the image size.
This application is also available in Chrome and Firefox extensions

2.IMAGEOPTIMIZER.NET:

After uploading the image from your computer, give the size of the image and quality you wish to have after processing. This provides only some control of the output and compression ratio But Greatly Helps to Resize Image without losing Quality.

3.SMUSH.IT:

Smush.it is the best and popular online application you can have to compress images. It is present with an up-loader as well as a URL box to have the image. In this, you will not be provided with the ‘enter’ option to enter the image quality as that of the previous one because it automatically optimizes the image by compressing it to a limit.

4.COMPRESSJPG.COM & COMPRESSPNG.COM :

I would suggest you have this application, for more control of the image quality. A slider appears as soon as you upload an image to auto control the quality of the last image. A preview panel is provided for showcasing the changes according to the quality slider change. So before downloading the image, you can have a review of your final image. This application is available on different domains for JPG and PNG images.

5.PUNYPNG.COM :

This application is available to compress the PNG files. Upload an image and you can get a compressed size of the image. Besides this, tinypng.com, a quick tool to compress the PNG images to the best level without affecting the image quality.

DESKTOP TOOL TO RESIZE IMAGE WITHOUT losing QUALITY


If you need a Desktop tool to do this task then I would suggest you to have PNG Gauntlet as your first choice, You will need. Microsoft Net Framework 4.0 to run this tool on your Windows.
Resize Image without loosing Quality

You won’t face any difficulty in Using this tool as it is very User-Friendly. While Optimizing the images PNG Gauntlet will show you the older size and Optimized size of the image. this Program is not that Fastest at its work but Useful.
Read More

WATCH YOUTUBE VIDEOS IN VLC MEDIA PLAYER

Leave a Comment




You can not only Watch single Video in VLC  but also Watch Youtube Playlists in VLC to watch them in Sequence, Some More Advantages of Watching Youtube Videos In VLC Media player are:
  • Watch Youtube Videos without Ads, Means no Disturbance While Watching your Favourite Video.
  • Use Loop Button To Watch a Video, Again and again, Many times.
  • Increase or Decrease the Speed of the Video
  • Take Snapshots of any particular Screen of a Song or Movie.

HOW TO WATCH YOUTUBE VIDEOS IN VLC MEDIA PLAYER


Now let us Get Started With Steps to Watch Youtube Videos In VLC, Follow the Below Simple Steps.
Step 1: Open VLC media player, Click on File > Open Network Or Simply Use CTRL+N Keys to Open up Network URL Dialog box.
Step 2: Open Youtube, Navigate to Whatever Video you want to Play in VLC, Copy the Url of that video and Paste it in the Dialogue Box. and click on Play.
Step 3: Enjoy Your Video.
Simple Enough hah, Now Let us see How to Watch Youtube Playlist In VLC Media Player.
Step 1: To Watch Youtube Playlists in VLC we will be Using an addon, So Click here to Goto the Downloading Page of the VLC addon Called VLC Playlist Parser. Make sure you have the Latest Version of VLC Running on your system.
Step 2: Download the addon, Copy it and paste it in the Videos Installation folder which in most cases would be C:\Program Files\VideoLAN\VLC\lua\playlist. 
Step 3: Everything is done, Now Open VLC, Press CTRL+N Paste Video Playlist URL Which needs to be Public. Click on Play and Enjoy all the Videos.
I Just Hope this tutorial on How to Watch Youtube Videos in VLC Media Player Helps all you Youtube Lovers
Read More

UNINSTALL PROGRAMS EASILY WITH THESE THIRD-PARTY UNINSTALLERS

Leave a Comment




In Windows One Can not Just Click on “Delete” to Uninstall a program in Windows, you have to run the Software Uninstaller or you Can do it with Control Panel. Many times People Find it Difficult to uninstall a Specific program. You might not be aware of the Fact that Uninstalling Programs through Control panel does not always uninstall it Completely. Traces are still left in Registry and Program Files folder.
To Overcome this Problem and Uninstall Programs once and for all, you need to use third-party Uninstallers. I will Mention 3 best Uninstallers which will help you to uninstall any program completely and easily including the registry entries. These uninstallers also come with additional features such as Batch Uninstall, Program Sorting which makes them much easier to use.

3 THIRD-PARTY UNINSTALLERS TO UNINSTALL PROGRAMS IN WINDOWS


1) Iobit Uninstaller 3: Iobit Uninstaller is my Preferred Program to Uninstall Applications from my PC without keeping any Leftovers. Iobit uninstaller 3 is Free to use and  Comes with beautiful and user-Friendly Interface, Big advantage of Iobit Uninstaller 3 is the fact that it is Portable and Light. which means you don’t need to Install this Program and can Carry it anywhere you want.
Iobit uninstaller 3 Also Creates System Restore Point for you, It shows you the list of programs that have been installed on your Windows so that you Can easily Uninstall them, or Can even Batch Uninstall Programs to Speedup the Process.

2) Comodo Program Manager: Comodo Program manager is another Program to Uninstall Programs from Windows Easily. Besides Uninstalling Programs, Comodo Program Manager Comes with Many more Useful Features. It is Simple to use as it comes with User-friendly interface. this Program also helps you to remove Drivers, services and Windows Updates.
Comodo Program Manager Is always Active and running in the Background, So whenever you try to run a setup, it checks for Malwares using their Cloud Technology. The only Disadvantage I Find with this Program is it may use a Fair amount of your Computer resource as it is always Actively running in Background.

3) Revo Uninstaller: Revo Uninstaller is one of the Popular Third-Party software that is used by many to Uninstall Programs. Revo uninstaller is Fast and reliable, you can uninstall single and multiple Programs easily and fast.
It is not available to download for Free from their official site but you can enjoy all the features by downloading 30 days free trial pack. You may think of Purchasing if none of the above two programs Interests you Which are Free and much Better. 

Read More

TIPS TO IDENTIFY FAKE FACEBOOK ACCOUNT EASILY

Leave a Comment






Fake Facebook Accounts is Proving out to be a new Trend on Facebook. Probably 20-30% of total Facebook Accounts are fake or even more, This Number is Anticipated to be Increasing in Future. Fake accounts on Facebook are mainly Created with an intention to Spam all over Facebook and Spread Virus. Many people Create Fake Girl’s Profiles to Dupe Some innocent Fb Users too.
Sadly, Facebook Can’t Identify Fake Facebook Account and Delete them all Manually, and One Should not expect it from Facebook because of obvious reasons. But yes they will Definitely Block your account if you send lots of Friend requests to Unknown People and if you post or Comment Spammy Links over and over again. Facebook Catches you and then next time when you try to log in again, it asks you to Identify Photos of Friends, This is where Fake Account Users Get Caught.
But This Don’t Stop Spammers to Create another Fake Facebook account, So in this article, we will Discuss Some Tips that will help you to Identify Fake Facebook Account easily, So that you don’t fell in their Traps, Report that Account to Facebook which will Help to Make Facebook Safer to all of us.

4 TIPS TO IDENTIFY FAKE FACEBOOK ACCOUNT


1) Profile Picture :
  • First Thing we see about any Facebook account is their Profile Picture, If you Find any Facebook Account on your Friendlist suspicious, First thing you will do is Use Reverse Image Search. This helps you find out if Similar Pictures are available on the Internet.  First Download the Profile Picture of the account you find suspicious
  • Go to Google images Click on Camera icon which says Search by image, Click on Upload an Image, now choose the Picture you had downloaded earlier, Now once the uploading Completes, google will show you Similar Images that already exist over the internet.
2) Timeline:
  • The Facebook timeline of Facebook accounts says a lot about that Profile. Most Fake Profiles have “Female” as a gender, this doesn’t Mean all fb accounts with “Female” Genders are Fake, There are many other things to Identify Fake Facebook Account.
  • if their photos folder shows only 1 or 2 Pictures that too of random Celebrities then probably it's fake.
  • if the Person does not update Status, or if he does, the Comments does not read like his Real friends or the profile does not comment on others status, then its likely to be a Fake profile
  • The “About” tab will give you More information about the Profile if the “About” tab doesn’t show you any info about the person profile then that's an indication about the fake profile
3) Wait for 1st january:
  • This is kind of Funny, Why Would one Wait for 1st Jan to Identify Fake Facebook Account, Well Fake Profile Makers Most Probably Enter 1st Jan as their birth date while creating a Fake account. So on 1st Jan, Facebook will Show you People who have birthdays today. Go through that list and Unfriend them if you dont know them Personally.
  • On 1st Jan 2014, I was shocked to see 28 people Having their birthday, Guess what I performed the above Process.
4) Girls Profile :
  • Most of the Fake profiles are created with Girl Identity and with a Beautiful face as a Profile Picture, You may even find Cell phone Number, Girls Hardly will Share thier Contact number in Public.
  • A girl Profile with Lots of Friends and Followers indicates a Fake Profile.
These were some tips to Identify Fake Facebook Account, which I wanted to share with you all, if you find any Fake profile then you and your friends can report it to Facebook.
Read More

COMPUTER SECURITY TIPS TO PROTECT YOUR SYSTEM INFORMATION

Leave a Comment





We hear a lots and lots of concerning cases of hacking, softwares, malwares, viruses, etc, Here are some Computer Security tips to safeguard your PC/laptop against hacker intrusions, malware and different viruses that exploits your PC or Laptops.

Computer Security Tips to Protect your System information



6 COMPUTER SECURITY TIPS


1) USE A FIREWALL

A firewall is a software system that will handle outgoing and incoming Internet connections of your computer. You’ll be able to clearly use the one engineered into Windows by default, however this can be by no means the foremost Efficient. i will like to recommend Comodo Firewall which is free and straightforward to use. Using Firewall is just one of Computer Security tip that i want to mention

2) USE ANTIVIRUS

There are obvious reasons to use Anti virus Programs, but there are People that don’t have any antivirus or those who have, they have not upgraded thier antivirus since their permit has lapsed.. However there are quite powerful free antivirus Available. One must Install Antivirus to Protect and Keep thier Computer Secure

3) UPDATING SOFTWARE SYSTEM:

New vulnerabilities are found in software system or operative systems like Windows each day. So one must always updates thier software system. Keeping your installed Softwares upto date is Important, as it will Keep hackers away from breaking into your System and its Said that any upto date program Works smooth without any glitch.

4) USE COMPLICATED PASSWORDS

Users like you and me use too weak  passwords that are very simple to detect for hackers, there are so many software which will try all Possible Combinations to Crack your Password, this is known as Bruteforce technique .  If your secret word(password) Consists of just 4 or 5 characters, it will easily discover it.
Your Password becomes harder to crack if it consists of 8 or 9 characters which also includes numbers, letters and special characters.To check the strength of your Password, there are plenty tools over internet. This is an important Computer Security tip that everyone must Consider.

5) USE TOTALLY DIFFERENT PASSWORDS

Most common mistake people make is that they use same password everywhere over internet. Yes, its very hard to remember passwords for all accounts but its highly advisible to have different passwords for different accounts.
This Practice Comes handy if one of your account gets Compromised/Hacked, then your other accounts are still safe.

6) ALWAYS BEWARE:

  • Finally, Abstain from getting hacked,  Always beware while Browsing Internet, don’t transfer and install everything and anything on your PC or Laptop.
  • Always check the sources of software system and websites that you just use to download programs.
  • Don’t be silly and amateur hackers won’t be able to do  anything to you (while serious and skilled hackers will not have any interest to hack you)
Do you have any Computer Security tip that you will like to share ? Feel free to comment below.

Read More