I 'm changing my Blog Template on Blogmytuts.net
I test the template on my test blog with no errors , then I upload it on blogmytuts.net and test it again.. I got a error share button which are embedded on the template when I click the Share button instead it open new tab and share it on social media it open a blog post " PAGE NOT FOUND".
I observed the behavior of the scripts .
On blogspot.com it needs data:blog post which works perfect on blogspot with no Domain.
While on blogger with domain its open it targets a site page which cause the "Page Not Found".
To fix this we need to replace the scripts with direct social network links.
On your Template Search Share buttons or Share-post with data:post
Replace then with this new Facebook , Twitter, Google Plus share buttons.
Looking for firmware? and New Algo Code click that Bookmark because this are website with firmware collection of most Sim Base modem /router. If you are a techi you can fallow their instruction and unlocked your own modem for Free!.
Unlockmodemfree.biz
Huge list of different models of Huawei LTE CPE Router firmware, which you can download totally free. There is no charge of firmware and also, all are direct download links. Just click on the download link and download will start.
You can Unlock Totally Free via Firmware Upgrade Process – You may already know that after unlock the modem you can use any another network provider sim on your modem in the world.
They have tutorials how to unlock your modem free.
NOTE: Total Unlock Code you can generate is up to 6
3. Input your IMEI number and Modem Model
Sample here.. then click calculate.
4. You must click G +1 to continue DO NOT CLICK "Click Here"
5. Get your Free New Algo Code or try all the 3 code (you have 10 attempt to unlock) to unlocked your modem.NOTE: Total Unlock Code you can generate is up to 6
6. Plug your Modem insert a new SIM Card from different Provider. SUPPORTED DEVICE:
How to unlock?
First insert other network Sim and then...
With PC and login to your device’s
dashboard at 192.168.1.1/simlock.asp OR 192.168.1.1 OR 192.168.8.1. Go
to Advanced Settings – SIM Settings – Unlock Device – Enter Unlock Code –
Click on Apply.
Or http://Your Modem Gateway IP/html/simlockrequired.html http://192.168.254.254/html/simlockrequired.html
NOTE: IP Address and User vary with your Internet Provider Firmware Check your Modem IP and user at the back of your modem sticker
(OR)
Open your Settings – Dial-up – Unlock SIM card – Enter 8 digits unlock
code (NCK Code) in your Huawei modem/router. Click OK and the device will reboot to
display the new network.
(OR)
If you have USB Modem like Huawei download and install Mobile Partner insert other network sim, the Mobile Partner will prompt or ask you for NCK Code or New Algo Code.
Future of identification would not rely on Passwords, according to PayPal’s global head of developer evangelismJonathan Leblanc. Embeddable, Injectable and Ingestible Devices the next generation of identification for mobile payments and other sensitive online interactions will depend on embeddable, injectable, and ingestible devices, completely replacing passwords with the identification of your body.
LeBlanc has recently started giving a presentation titled "Kill all Passwords" at various security and tech conferences in the United States and Europe.
In the presentation "Kill all Passwords," LeBlanc is claiming that the future generation will be represented by "true integration with the human body."
By True integration with the human body, LeBlanc means…
...instead of using "antiquated" external body functions such as Fingerprints and IRIS scans for the identification of online users, internal body functions such as Vein and Heartbeat recognition are used.
And the embedded, injected and ingestible devices will allow these "natural body identification."
These devices include:
Brain implants and attachable computer systems that "put users in charge of their own security," LeBlanc toldWSJ.
And when he talk about Ingestible devices, he mean devices that could be powered by your stomach acid, which will run the batteries of those devices, LeBlanc added.
But, Why Killing Passwords?
As we have reported many times, the human nature to keep passwords for their online accounts is easy to guess and break, and according to LeBlanc, it is the right time to replace the traditional username and password verification concepts and methods.
But, when we could use more accurate and secure method, so why sticking to traditional methods?
Identity verification methods, such as thin silicon chips embedded into the skin, could results in an accurate and unique identity of a person, according to LeBlanc.
These chips can have in-built ECG sensors that could help monitor the unique electrical activity of a person’s heart, and communicate via "wireless wearable computer tattoos."
Moreover, ingestible capsules can be used to detect and analyze glucose levels and other unique internal parameters of a person’s body as a method to identify the actual identity of that person.
PAYPAL IS MOVING A STEP FORWARD
PayPal is also working with developers to build these kinds of futuristic ID verification devices, such as heartbeat recognition bands and vein recognition technology.
However, this does not mean PayPal is thinking to adopt these new biometric verification technologies; rather the company just wants to be at the forefront in the research of this field.
As LeBlanc said, "I can’t speculate as to what PayPal will do in the future, but we’re looking at new techniques – we do have fingerprint scanning that is being worked on right now – so we’re definitely looking at the identity field."
US Fugitive and Hacker Charles Harvey Ecclestone arrested in Philipines On a operation of NBI and FBI on Makati.
Charles Harvey Ecclestone was expert in computer and bank hacking, fraud, expert cyber espionage, collecting confidential doc and file of a company and sell it.
New individuals have been added to the FBI’s Cyber Most Wanted list for their roles in domestic and international hacking and fraud crimes collectively involving hundreds of thousands of victims and tens of millions of dollars in losses.
Pakistani nationals Farhan Arshad and Noor Aziz Uddin, wanted for their alleged involvement in an international telecommunications hacking scheme. Between 2008 and 2012, the pair gained unauthorized access to business telephone systems, resulting in losses exceeding $50 million. Arshad and Uddin are part of an international criminal ring that the FBI believes extends into Pakistan, the Philippines, Saudi Arabia, Switzerland, Spain, Singapore, Italy, Malaysia and elsewhere
A bunch of Bulgarians were arrested in Paraguay in 2011, after stealing thousands of dollars from billionaire Bill Gates with a cloned credit card. At the time the fraudsters were said to have stolen over $4 million from American consumers (including Gates), laundering their ill-gotten gains by purchasing luxury items on eBay.
Now at least one of the gang, 31-year-old Konstantin Simeonov Kavrakov, appears to have got himself into a spot of bother again.
The so-called "king of super-hackers" was caught while allegedly up to no good on Thursday last week, using counterfeit credit cards to withdraw money from an ATM in Quezon City, Philippines.
Police recovered seven credit cards from Karakov during the arrest, as well as a number of ATM receipts and 76,570 Pesos (approximately £1100) in cash.
Reginald Villansanta, the executive director of PAOCC (the Presidential Anti-Organized Crime Commission), says that Kavrakov is suspected of being part of an international fraud and cybercrime gang that has been hunted by authorities in many countries since 2004.
The arrest of Karakov comes in the wake of a PAOCC's "Operation Jugador", which is targeting foreign nationals engaged in cybercrime and illegal online gambling.
Kavrakov is said to have been arrested following a tip-off from a Filipino informant, and police say they will be exercising a search warrant to search his current residence - a condominium in a nearby hotel complex.
A local media report reported that police had claimed that Kavrakov had attempted to bribe officers into not arresting him, by offering them $12,000.
It's unclear whether he was planning to get the money to fund the alleged bribe from the ATM...
The easiest way to operate your PC is with your hands whether you're navigating a touch screen, or using a mouse and keyboard. But for some people that's just not possible, especially when it comes to typing.
Maybe you broke your finger or you suffer from a repetitive strain injury that makes typing impossible. Or perhaps you simply want to get work done while running on a treadmill.
But just because you can't type doesn't mean you can't create documents. All you need is a microphone for your PC and Microsoft Word to take the stress off your hands and start using your voice.
Here's how.
Commanding voice
Get started with speech recognition via the Windows Control Panel.
To start in Windows 8.1, open the Control Panel and typespeechinto the Control Panel search box, then selectStart Speech Recognitionfrom the search results.
Next, Windows will take you through a quick set-up to make sure your PC is ready for accepting speech. As I mentioned earlier, your best bet is to use a USB headset, although desktop microphones and other input devices will also work.
Simply follow the instructions as you click through the set-up wizard. You'll be asked to read a few sentences to test your system, and whether you want to allow Windows to scan your documents and stored e-mail to improve speech recognition.
A speech recognition system test in Windows 8.1.
You'll also be asked whether you want to use manual or voice activation mode. If you want to turn on speech recognition by clicking a button with your mouse or keyboard, then choose manual activation mode. If you'd rather use the phrase "start listening" to turn on speech recognition then choose voice activation mode.
In both cases, you can turn off speech recognition by saying "stop listening."
After that, you're pretty much set. You can take an online tutorial to learn how to use speech recognition (I didn't bother), or you can just dive in and start dictating.
If you opt for the more adventurous course, I recommend you bookmark thisMicrosoft help pagethat includes several lists of how you can use speech recognition with your PC.
Dictating text
Speech Recognition is system wide and can be used for more than just dictation.
Once you're ready to go, you'll see a small window at the top of your screen with a microphone icon and a small window that saysListening.
Open Word normally or just say "Open Word" into your microphone. Now, dictating text is just as simple as talking into your microphone. Whenever you need to insert a punctuation mark just say the mark's name, such as "period," "comma," or "question mark.""
To learn how to navigate your document with new lines, paragraphs and so on, check out the dictation section Microsoft's help page.
It may take some getting used to, and at first speech recognition may not be as accurate as you'd like, but over time it will improve. The pace of dictation will also be a hurdle if you were a particularly fast typist.
As for the apps you can use with Dictation, you'll have no problem with Microsoft apps like Word or Notepad. But some third-party apps may not work at all. In my tests, for example, text editors like Sublime Text 2 and GitHub's Atom didn't work, but Notepad++ did.
More than just dictation
Once you've got dictation down, you can use the built-in speech recognition feature in Windows for all kinds of tasks such as to open and close apps, navigate menus, control windows, scroll, and even right-click. Again, Microsoft's help pages can help you expand your voice command chops.
SAMPLE:
Buti pa Lappy ko nag sabing I love you too sakin wahahahah Girl pala si Noob ko ahihihi give me time.. gusto nya daw i upgrade ko siya :/ .. baliw kaya pala delay responds siya.. trip lang po eto :v Bernard David Jhen Canlas Yam Yam Carlo Cadenas Paller
Posted by Jaime Lacson on Monday, 28 April 2014
Download Windows Speech Recognition Macros Software. (CLICK HERE)
After Installing, you will need to configure it as per your needs. We'll use the Windows Speech Macros.You must already have downloaded this software from the given link and installed it.It is recommended to put its shortcuts in two places, one in the desktop and other in the start-up folder, allowing it to the second your computer starts.Here is how to set up the commands :
Double Click The Macros Icon, and when the window pops up asking "What should the macro do?" Then click "Advanced." For those of you familiar with creating websites, this should be a welcome site. WSRM uses XML for commands... which makes creating custom commands relatively simple and fun. For those of you who aren't aware of XML, it's still easy. Here is what you need to learn.
<speechMacros> - This is the starting Tag, it just tells the computer that this XML file uses the Speech Macros to execute.
<command> - This is the command to be executed. Each command is basically one action... in most cases you will only need one, but for some automations you'll want to include more than one. You'll see an example of this later.
<listenFor></listenFor> - This tells the computer what word or phrase to listen for in order to do an action. Notice that there is a closing tag (</listenFor>), this tells the XML that this spot in the code is where to stop doing whatever function... in this case stop listening for a word or phrase once the computer hears it.
</command> - The closing tag for the "Command" tag... again, in XML every tag will have an opening/closing tag and what happens between the two is how it knows what to execute. In this case it knows that the command is finished once the word/phrase has been detected.
</speechMacros> - This is the closing tag of the first tag!
<listenfor> tags will be used by your computer to identify what they have to listen for to execute any action
If you want your computer to greet you when you say "Wake Up JARVIS", then use the below macros
_________________________________________________________________________________
<speechMacros>
<command>
<listenFor>Wake Up Jarvis</listenFor>
<speak>Systems Online, Database Check, Good Morning Sir !</speak>
</command>
</speechMacros>
_________________________________________________________________________________
I love this one the most!
An Speech Macro For Getting The Weather :
_________________________________________________________________________________
<?xml version="1.0" encoding="UTF-16"?>
<speechMacros>
<command>
<listenFor>Pull up the weather in [CityName]</listenFor>
<run command="http://www.weather.com/weather/local/{[CityName.zipCode]}"/>
</command>
<command>
<listenFor>Is it cold in [CityName]?</listenFor>
<speak>Let me check... just a moment.</speak>
<script language="JScript">
<![CDATA[
<var xml_doc = new ActiveXObject("Microsoft.XMLDOM");
<xml_doc.async = false;
<xml_doc.load("http://www.rssweather.com/zipcode/{[zipCode]}/rss.php");
<var titles = xml_doc.getElementsByTagName("title");
<var descriptions = xml_doc.getElementsByTagName("description");
<Application.Speak(titles.item(2).text + " in {[*CityName]}");
<Application.Speak(descriptions.item(2).text);]]>
</script>
</command>
<listenForList name="CityName" propname="zipCode">
<item propval="65201">Columbia</item>
<item propval="37201">Nashville</item>
</listenForList>
</speechMacros>
_________________________________________________________________________________
A Macro To Restart The Computer :
You will just have to say "Nuke It!" and the computer will restart :
_________________________________________________________________________________
Macro To Shut Down The Computer :
You will have to say "Goodbye Jarvis" And the Pc Will Shut Down :
_________________________________________________________________________________
A Ubuntu live drive can be used as a digital Swiss army knife to troubleshoot all sorts of problems with any PC, whether you need to recover files from a failing computer, diagnose hardware problems, perform a deep virus scan from outside Windows, or even reset a forgotten Windows password.
We’ll be getting our hands dirty with some Linux terminal commands here, but don’t worry—the Linux terminal won’t bite. You can even copy-paste most of these commands directly into the terminal.
We’ve all been there. Your PC may not boot, Windows may be showing errors and blue-screening, or—even worse—you may hear that dreaded mechanical hard drive clicking.
Even if you can’t boot Windows, there’s a good chance you can read the drive from within Linux and recover some files before the hard drive dies completely. Or, if the Windows system is corrupted and the drive itself is fine, you can recover all of the files from outside Windows.
Recovering Windows-stored files with Ubuntu is as easy as opening a folder.
There’s no Linux terminal involved here. Just click the folder icon on Ubuntu’s launcher to open the file manager. You’ll see your Windows drive under Devices in the sidebar; click it and you’ll see your Windows file system. If you have multiple partitions or hard drives, you’ll see multiple devices here.
Connect an external drive or USB stick to your computer and it will appear under Devices, too. Copy and paste the files you want to back up from the Windows system to your external drive, just as you would on Windows. You could even fire up a web browser and upload the files directly to Dropbox oranother cloud storage service, or open the Brasero Disc Burner application included with Ubuntu to burn them to disc.
Reset your Windows password
Ubuntu can also edit your Windows user account passwords, which is great if you’veforgotten your Windows password. We tested this on a modern Windows 8.1 Update system and it worked perfectly. We’ll be modifying the Administrator account here—after you unlock it and clear its password, you can log into Windows as Administrator and reset your other passwords.
Open a terminal by clicking the Ubuntu logo in the top-left corner of the launcher, typingTerminal, and pressingEnter. Run the following commands to install the password-changing utility you’ll need. (If you’ve already run the first two commands, you don’t need to run them again—just run the third one here.)
Be sure to open the file manager from the launcher and click your Windows drive under Devices to view its contents if you haven’t yet. This will “mount” the drive and make it available in the terminal.
Finding the Windows directory using the Terminal.
Next, start typing the following command into the terminal, but donotpressEnter:
cd /media/
Now, press theTabkey twice. You’ll see an alphanumeric label that corresponds to your hard drive. Type the first few characters and pressTabagain to automatically fill the label in. Now type/Windows/System32/configso you end up with a command that looks like the following, and then finally press Enter:
cd /media/9A72A08872A06AA9/Windows/System32/config
Run the following command and pressEnterto start modifying the Administrator account. SAM is the name of the Windows system file containing the hashed user account passwords.
sudo chntpw SAM
If your Administrator account is locked—and it is by default—type4at the prompt and pressEnterto unlock it. Typeyat the confirmation prompt and pressEnterto confirm.
Unlocking the Windows admin account.
You’ll have to run thesudo chntpw SAMcommand again to get back into the program. Type1and pressEnterat the prompt to clear the Administrator’s password and make it blank. Typeyat the prompt and pressEnterto confirm again. Important: Donotuse the change password option here, as it could cause problems.
You can now log into Windows with the username Administrator and a blank password. From there, you can open the Control Panel and reset other user account passwords. (Worried about other people doing this to your Windows system?Set a BIOS passwordto ensure they can’t boot to removable media and mess around with it.)
Scan for malware
Rootkits are a nasty type of malware that burrow deep into Windows and start at boot-up, pulling strings in the background so they’re invisible to antivirus programs and hidden even from the Windows Task Manager. Even if you have bog-standard malware, it’s often easier to remove malware from outside Windows. Antivirus companies often makededicated antivirus boot discsyou can use to scan your system from outside Windows, but you can do this all from within Ubuntu.
We’ll useClamAVhere because it’s open source and easily installable on Ubuntu. It isn’t the only option, though; you may also want to look at commercial antiviruses like AVG Free for LinuxorBitDefender for Unices.
To install ClamAV, open the terminal and copy-paste or type each of the following commands into the terminal in order, pressingEnterafter each. (Again, if you’ve already run the first two commands performing another task, you don’t need to run them again—just start at the third.)
Next, run the following command to update your virus definitions:
sudo freshclam
Be sure to have ClamAV scan all files and directories.
You can now run theclamtkcommand in the terminal or open ClamTk from your list of installed applications. Be sure to click the Preferences button and enable the “Scan all files and directories in a directory” option after you do.
Selecting a recursive scan while ClamTk is open.
To actually scan your Windows drive for malware, click the Scan option on the menu at the top of ClamAV's screen and select Recursive Scan. Select your Windows drive in the sidebar and clickOK. ClamTk should scan every file on your Windows drive with the ClamAV antivirus engine.
Give your hard drive a check-up
Ubuntu can also check for hardware-related issues.
The SMART hard drive status system allowsa failing hard driveto warn you before it goes down in flames. To check a drive’s SMART status from Ubuntu, click the Ubuntu logo icon at the top-left corner of your screen, search for "Disk Utility" and pressEnter. Select your Windows drive and look next to SMART Status to see the drive’s health status. You can click theSMART Databutton to see more details and perform self-tests.
Checking your disk drive's health is SMART. Get it? Hey, stop groaning.
SMART isn’t perfect. A drive may be failing and reporting that everything is fine even as it grinds to a halt. Another drive may report a serious problem and continue working fine for months. But, if you see a serious warning, you should get your files off the drive and replace it as soon as possible.
Test your RAM
Ubuntu comes with the popularmemtest86+ memory-testing utilitybuilt-in. This utility will write data to your computer’s RAM, read it back, and check if it’s correct. If your RAM has a problem, memtest86+ will notice when the RAM returns different data. In normal computer use, these problems can lead to application crashes, file corruption, and even the dreaded blue screen of death.
This utility must be chosen at boot, so you’ll have to restart your computer if you’re already at the Ubuntu desktop. When Ubuntu starts booting, repeatedly pressEscapeand you’ll see the normally hidden boot menu. Select theTest Memoryoption here to launch memtest86+.
You want the "Test Memory" option.
Give memtest86+ some time alone with your computer after it begins. After a single successful batch of tests, known as a pass, you’ll see the message “Pass complete, no errors, press Esc to exit.” You can exit memtest86+ after the message appears or allow it to perform multiple passes. If you see an error, you likely need to replace one or more of the RAM sticks in your PC.