Thursday, August 25, 2016

Uburyo wakora ifoto igenda ubudahagarara ivuye muri video.

Ibwirizwa: Kugira ubikore bikoroheye urafungura tab ya YouTube n’iya Gif YouTube muri tabs nshya.


    1. Fungura YouTube unashake video ushaka gukuramo ifoto inyeganyega. Koporora URL(inzira y’ihuza) yiyo video ushaka gukoresha. Urugero rwacu turakoresha ino nzira y’ihuza iri aha hasi.



https://youtu.be/MKVWBUwoV4o

  1. Fungura GifYouTube hanyuma uhome inzira y’ihuza(URL) aho bandika(text box) uhite ukanda kuri buto ya Create GIF.

  2. Mu kugena imiterere y’indeshyo ya GIF yawe, urahitamo igihe n’aho itangirira, igihe imara, unahitemo izina rya GIF yawe hanyuma ukande kuri buto ya Create GIF.

  3. Igihe ifoto yawe iraba yamaze gukorwa ushobora kuyisangiza abandi ku mbuga nkoranyambaga cg ukaba wakoporora inzira zayo ukaba wayikoresha kuzindi mbuga za murandasi cg ukaba wanayimanura ukayibika muri mudasobwa yawe. Aha hasi hari urugero rw’ifoto yakozwe hifashishijwe iri koranabuhanga.


animated-youtube

Agakoryo: Uburyo bworoshye bwo gukora ifoto yinyeganyeza mubihe bigezweho aruko wamenya ko uzajya wongeraho “gif” imbere y’inzira y’ihuza(URL) ya YouTube uhita ujyanwa kuri site igufashya kuba wakora iyo foto.

Nk’urugero,

https://www.youtube.com/watch?v=MKVWBUwoV4o ubwo yaba https://www.gifyoutube.com/watch?v=MKVWBUwoV4o.

Friday, August 19, 2016

How to do percentages in Excel

Today, I’m going to blaze through a few things you need to know about percentages in Excel. Of all topics, why percentages? Well, because whenever I review search data on Office.com, I frequently see search terms such as “percentages” and “percent increase” and “percent difference.”  Now, maybe you’re confused by how Excel handles number formatting. Or maybe you simply fell asleep in math class and need help creating the necessary formulas for calculating percentages. Or maybe I’m projecting. 🙂 Whatever the case, I hope this quick review helps.

Percentages 101


While Excel can do a lot of things, it can’t really teach you math. If you need a quick refresher on percentages, I recommend starting with a few excellent videos from The Khan Academy:

Displaying values as percentages


To show a number as a percent in Excel, you need to apply the percentage number format. To apply this format, select the cells that need formatting, and then click the Percent Style button in the Number group on the ribbon’s Home tab.

Percent Style button

Of course, it’s even faster to use the keyboard shortcut for applying the format, which is Ctrl + Shift + %.

In Excel, the underlying value is always stored in decimal form. So, even if you’ve used number formatting to display something as a percentage (10%), that’s just what it is — formatting, or a symbolic representation of the underlying value. Excel always performs calculations on that underlying value, which is a decimal (0.1). To double-check the underlying value, select the cell, press Ctrl + 1, and look in the Sample box on the General category.

Underlying value

Percentage formatting can be (*ahem*) interesting. There’s a method to the madness, but you need to consider the following:

  • Format existing values: When you apply percentage formatting to a cell that already has a number in it, Excel multiplies that number by 100 and adds the % sign at the end. This causes confusion, so let me explain what’s happening. Let’s say that you type 10 into cell A2, and you then apply the percentage number format. Because Excel multiples your number by 100 to show it as a percentage (remember that 1% is one part of one hundred), you’ll see 1000% displayed in the cell, not 10%. To get around this, you can calculate your numbers as percentages first. For example, if you type the formula =10/100 in cell A2, Excel will display the result as 0.1. If you then format that decimal as a percentage, the number will be displayed as 10%, as you ‘d expect. You can also just type the number in its decimal form directly into the cell — that is, type 0.1 and then apply percentage format.

  • Format empty cells: Excel behaves differently when you pre-format empty cells with percentage formatting andthen enter numbers. Numbers equal to and larger than 1 are converted to percentages by default; numbers smaller than 1 that are not preceded with a zero are multiplied by 100 to convert them to percentages. For example, if you type 10 or .1 in a preformatted cell, you’ll see 10% appear in the cell. (Now, if you type 0.1 in the cell, something different happens. If you want details, see the More Information section in this KB article.)

  • Format as you type: If you type 10% directly in the cell, Excel will automatically apply percentage formatting. This is useful when you want to type just a single percentage on your worksheet, such as a tax or commission rate.


If you’re still confused, I recommend that you watch Mike Girvin explain the percentage number format. Mike does a fine job describing the gotchas associated with this format.

Calculating percentages


As with any formula in Excel, you need to start by typing an equal sign (=) in the cell where you want your result, followed by the rest of the formula. So, I hear your next question in my head — which formula do I use to get the result I desire? Well, that depends. The basic formula for calculating a percentage is part/total = percentage, which might look something like this:

Example of formula for calculating percentage

Now, let’s say that you want to reduce a particular amount by 25%, like when you’re trying to apply a discount. Here’s a formula that would get you that result. (Think of the 1 in the formula below as a stand-in for 100%.)

Example of formula for reducing an amount by a percentage

To increase the amount by 25%, replace the minus sign in the formula above with a plus sign.

The next example is slightly more complicated. Say the earnings for your department are $2,342 in November and $2,500 in December. What is the percentage change in earnings between these two months? To find the answer, divide the difference between December and November earnings ($158) by the value of the November earning ($2,342). Then, format the difference as a percentage with two decimal places.

Example of formula for calculating percentage change

You can find these and other examples in the Display numbers as percentages article on Office.com.

Need help with your formulas?


If you create formulas in Excel, you know that coming up with the right formula is often more art than science. The examples above are pretty simple. They’re meant to serve only as a jumping off point for creating your own formulas. If you need a more sophisticated formula for solving a percentage problem, or if you want troubleshooting advice, the best thing to do is ask a question in the Excel forum on the Microsoft Answers site.

You might also review the following videos, which cover common scenarios and formulas in more detail:

A few last tips before we part…



  • Decimal places: Press Ctrl + 1 to open the Format Cells dialog box, and then click Percentage. In the Decimal places box, enter the number of decimal places that you want to display. For example, if you want to see 10% instead of 10.00%, enter 0. You can also use the Increase Decimal and Decrease Decimal buttons in the Numbergroup (Home tab).

  • Rounding issues: Note that sometimes what you see in a cell (e.g., 10%) doesn’t match the number you expected to see (e.g., 9.75%). To see the true percentage in the cell, rather than a rounded version, increase the decimal places. Again, Excel always uses the underlying value to perform calculations.

  • Negative percentages: If you want negative percentages to be formatted differently — for example, to appear as red text or within parentheses — you can create a custom number format such as 0.00%;[Red]-0.00% or 0.00%_);(0.00%). This technique is outlined in the Display numbers as percentages article.


Do you have other tips or formulas to share? If so, leave a comment. We’d love to hear from you.

Thursday, August 18, 2016

How to use PowerISO as ISO Mounter?

PowerISO has a built-in virtual drive, which can mount iso files and other CD / DVD image files. There is no need to install any other virtual drive software to mount ISO file. It is very convenient to mount an ISO file. You can mount it using the main program, using the shell context menu, or using the PowerISO virtual drive manager.


Click Here To Download it


Usage1: Mount  ISO file using the main program:






  • Click the "Mount" button on toolbar. PowerISO shows the iso mounter menu.




  • Click a virtual drive from the popup menu.




  • Choose the iso file you want to mount, then click "Open" to mount it.







Usage2: Mount ISO file using the shell context menu:





  • Open "My Computer" and select the iso file which you want to mount.






  • Right-click on the file selected, the shell context menu will popup.




  • Choose the menu "Mount Image to Drive[X:]".





Usage3: Mount ISO file using the shell context menu:





  • Open "My Computer" and select the virtual drive created by PowerISO.






    • Right-click on the drive selected, the iso mounter shell context menu will popup.






  • Choose the menu "Mount Image to drive".




  • Choose the iso file you want to mount, then click "Open" to mount it.







Usage4: Mount ISO file using the PowerISO Virtual Drive Manager:





  • Right- click the PowerISO sys-tray icon, PowerISO Virtual Drive Manager shows a popup menu.






  • Click a virtual drive from the popup menu.




  • Choose the iso file you want to mount, then click "Open" to mount it.




Wednesday, August 10, 2016

The first Video Uploaded to youtube!!!!

The domain name "YouTube.com" was activated on February 14, 2005, and during the next few months the website was developed. It was opened for uploads on April 23, 2005. The first YouTube video uploaded on April 23, 2005 was titled Me at the zoo, and shows co-founder Jawed Karim at the San Diego Zoo.

https://youtu.be/jNQXAC9IVRw

Me at the zoo is the first-ever video that was uploaded to YouTube. It was uploaded at 8:27 p.m. on Saturday, April 23, 2005 by the site's cofounder Jawed Karim, with the username "jawed" and recorded by his high school friend Yakov Lapitsky.

He created an account on YouTube the same day

The nineteen-second video was shot by Yakov Lapitsky at the San Diego Zoo, featuring Karim in front of the elephants, professing his interest in their "really, really, really long trunks"

Comment below for any Question that you want to know.

Is Computer Hacking a Criminal Activity?

theft-cybrary

First of all, I would say “No,” because computer hacking is an act of manipulating a computer to do what you want it to do and it’s a very valuable skill in the Tech world. Actually, that’s not a criminal activity. You can sit in your home and hack your own computer legally.

The only situation when it becomes a crime is based on the intent or motive of the person sitting behind the computer.

Whenever most people hear someone is a Hacker, the first thing that comes to mind is the person is a criminal. He/She must be responsible for some of those malicious emails in their inbox. But, that’s a very wrong ideology in generalizing a Computer Hacker.

Asking if Computer hacking is a criminal activity is like asking: “Is it a crime for a Policeman to hold a gun?”

It only becomes a crime when the Policeman starts  killing innocent  people with that gun on street like his Playing Call Of Duty. And, that policeman will face justice for sure, right? But, if the police uses that same gun to kill an armed robber who’s a threat on the street, it’s not a crime because the police has the authority to do so.

The same analogy can be applied to Computer Hacking. If prior rights and authority have been given by the owner of a computer infrastructure to hack and find security Vulnerabilities/Weakness, there’s no crime because you’ve been giving prior authority to do so.

So, who are the Criminals?

The cyber criminals are those hackers who have not been given any rights and authority to hack a computer infrastructure. There aim is to find security Vulnerabilities/Weakness in computer infrastructure and human behavior, then exploit/hack them for different aims, objectives and goals.

And, that’s what brings about different classifications of computer hackers based on their skills and intent.

  • White Hat Hacker: White Hat Hackers are professional hackers who have been given prior authority and they use their Professional skills to try to Penetrate or Hack a computer infrastructure so as to patch any Vulnerabilities/Weakness before other hacker with different motive try to exploit them.



  • Black Hat Hacker:  Black Hat Hackers are professional hackers(The Bad Guys) who have not given prior authority to hack a Computer infrastructure. They find security Vulnerabilities/Weakness in computer infrastructure, exploit them for Personal gain, motive and intent.  They perform random mass attacks, like sending spam emails. They also perform targeted attacks, like attacking corporate bodies/organizations for financial gain.



  • Gray Hat Hacker: Gray Hat Hackers are professional hackers, too, but they use their computer skills for both white hat hacking and black hat hacking.



  • Script Kiddies: Script Kiddies are hackers that do a lot of harm to computer infrastructures, including DDOS attacks, Defacing Websites, etc.. They use borrowed tools from Professional hackers they found on the internet. They have no prior knowledge of Cyber Security or even Computer programming. Once they see a script and knows what it does, they just take it and run it against the network without knowing what the script is doing. Maybe it’s even a script that will destroy their own computer but they don’t know.



  • Hacktivists: These are hackers who are motivated by Political and Religious causes, like the famous “Anonymous Hacktivist group.”


I may have changed some of your ideologies about computer Hackers after reading this post to the end. So, now you know all hackers are not Cyber criminals.

 
Hope you have enjoyed this post. If you have recommendations or questions, you can drop them in the comment section below

Tuesday, August 9, 2016

Apple Online Store Now Offering Refurbished 12.9-Inch iPad Pro

iPadPro_Pencil_Lifestyle1-PRINT-1024x683

For anyone that has been waiting to get their hands on the 12.9-inch iPad Pro, specifically for when Apple offers refurbished models, the wait is finally over.

As initially discovered by iPhone in Canada, the 12.9-inch iPad Pro is now available in the Apple Online Store, via the dedicated section for refurbished products. However, as noted in the original report, there isn’t a dedicated sub-section just for the iPad Pro lineup just yet. However, the tablet can be found in the iPad area, and scrolling to the bottom of the page.

Each of the models available are tagged with a 14 to 15 percent discount from the standard retail pricing. For instance, the iPad Pro with Wi-Fi and Cellular, with 128GB of built-in storage, will set a buyer back $919.00 — which saves the buyer $160.00.

Both the Wi-Fi and Wi-Fi + Cellular options are available, in a variety of storage options, so there should be a good match for anyone looking to pick up the 10 month old tablet.

Do you plan on buying a refurbished model?

Monday, August 8, 2016

A-Z Kali Linux: Useful Commands Everyone Should Know

a
apropos Search Help manual pages (man -k)
apt-get Search for and install software packages (Debian)
aptitude Search for and install software packages (Debian)
aspell Spell Checker
awk Find and Replace text, database sort/validate/index

b
basename Strip directory and suffix from filenames
bash GNU Bourne-Again SHell
bc Arbitrary precision calculator language
bg Send to background
break Exit from a loop
builtin Run a shell builtin
bzip2 Compress or decompress named file(s)

c
cal Display a calendar
case Conditionally perform a command
cat Concatenate and print (display) the content of files
cd Change Directory
cfdisk Partition table manipulator for Linux
chgrp Change group ownership
chmod Change access permissions
chown Change file owner and group
chroot Run a command with a different root directory
chkconfig System services (runlevel)
cksum Print CRC checksum and byte counts
clear Clear terminal screen
cmp Compare two files
comm Compare two sorted files line by line
command Run a command – ignoring shell functions
continue Resume the next iteration of a loop
cp Copy one or more files to another location
cron Daemon to execute scheduled commands
crontab Schedule a command to run at a later time
csplit Split a file into context-determined pieces
cut Divide a file into several parts

d
date Display or change the date & time
dc Desk Calculator
dd Convert and copy a file, write disk headers, boot records
ddrescue Data recovery tool
declare Declare variables and give them attributes
df Display free disk space
diff Display the differences between two files
diff3 Show differences among three files
dig DNS lookup
dir Briefly list directory contents
dircolors Colour setup for `ls’
dirname Convert a full pathname to just a path
dirs Display list of remembered directories
dmesg Print kernel & driver messages
du Estimate file space usage

e
echo Display message on screen
egrep Search file(s) for lines that match an extended expression
eject Eject removable media
enable Enable and disable builtin shell commands
env Environment variables
ethtool Ethernet card settings
eval Evaluate several commands/arguments
exec Execute a command
exit Exit the shell
expect Automate arbitrary applications accessed over a terminal
expand Convert tabs to spaces
export Set an environment variable
expr Evaluate expressions

f
false Do nothing, unsuccessfully
fdformat Low-level format a floppy disk
fdisk Partition table manipulator for Linux
fg Send job to foreground
fgrep Search file(s) for lines that match a fixed string
file Determine file type
find Search for files that meet a desired criteria
fmt Reformat paragraph text
fold Wrap text to fit a specified width.
for Expand words, and execute commands
format Format disks or tapes
free Display memory usage
fsck File system consistency check and repair
ftp File Transfer Protocol
function Define Function Macros
fuser Identify/kill the process that is accessing a file

g
gawk Find and Replace text within file(s)
getopts Parse positional parameters
grep Search file(s) for lines that match a given pattern
groupadd Add a user security group
groupdel Delete a group
groupmod Modify a group
groups Print group names a user is in
gzip Compress or decompress named file(s)

h
hash Remember the full pathname of a name argument
head Output the first part of file(s)
help Display help for a built-in command
history Command History
hostname Print or set system name

i
iconv Convert the character set of a file
id Print user and group id’s
if Conditionally perform a command
ifconfig Configure a network interface
ifdown Stop a network interface
ifup Start a network interface up
import Capture an X server screen and save the image to file
install Copy files and set attributes

j
jobs List active jobs
join Join lines on a common field

k
kill Stop a process from running
killall Kill processes by name

l
less Display output one screen at a time
let Perform arithmetic on shell variables
ln Create a symbolic link to a file
local Create variables
locate Find files
logname Print current login name
logout Exit a login shell
look Display lines beginning with a given string
lpc Line printer control program
lpr Off line print
lprint Print a file
lprintd Abort a print job
lprintq List the print queue
lprm Remove jobs from the print queue
ls List information about file(s)
lsof List open files

m
make Recompile a group of programs
man Help manual
mkdir Create new folder(s)
mkfifo Make FIFOs (named pipes)
mkisofs Create an hybrid ISO9660/JOLIET/HFS filesystem
mknod Make block or character special files
more Display output one screen at a time
mount Mount a file system
mtools Manipulate MS-DOS files
mtr Network diagnostics (traceroute/ping)
mv Move or rename files or directories
mmv Mass Move and rename (files)

n
netstat Networking information
nice Set the priority of a command or job
nl Number lines and write files
nohup Run a command immune to hangups
notify-send Send desktop notifications
nslookup Query Internet name servers interactively

o
open Open a file in its default application
op Operator access

p
passwd Modify a user password
paste Merge lines of files
pathchk Check file name portability
ping Test a network connection
pkill Stop processes from running
popd Restore the previous value of the current directory
pr Prepare files for printing
printcap Printer capability database
printenv Print environment variables
printf Format and print data
ps Process status
pushd Save and then change the current directory
pwd Print Working Directory

q
quota Display disk usage and limits
quotacheck Scan a file system for disk usage
quotactl Set disk quotas

r
ram ram disk device
rcp Copy files between two machines
read Read a line from standard input
readarray Read from stdin into an array variable
readonly Mark variables/functions as readonly
reboot Reboot the system
rename Rename files
renice Alter priority of running processes
remsync Synchronize remote files via email
return Exit a shell function
rev Reverse lines of a file
rm Remove files
rmdir Remove folder(s)
rsync Remote file copy (Synchronize file trees)

s
screen Multiplex terminal, run remote shells via ssh
scp Secure copy (remote file copy)
sdiff Merge two files interactively
sed Stream Editor
select Accept keyboard input
seq Print numeric sequences
set Manipulate shell variables and functions
sftp Secure File Transfer Program
shift Shift positional parameters
shopt Shell Options
shutdown Shutdown or restart linux
sleep Delay for a specified time
slocate Find files
sort Sort text files
source Run commands from a file `.’
split Split a file into fixed-size pieces
ssh Secure Shell client (remote login program)
strace Trace system calls and signals
su Substitute user identity
sudo Execute a command as another user
sum Print a checksum for a file
suspend Suspend execution of this shell
symlink Make a new name for a file
sync Synchronize data on disk with memory

t
tail Output the last part of file
tar Tape ARchiver
tee Redirect output to multiple files
test Evaluate a conditional expression
time Measure Program running time
times User and system times
touch Change file timestamps
top List processes running on the system
traceroute Trace Route to Host
trap Run a command when a signal is set(bourne)
tr Translate, squeeze, and/or delete characters
true Do nothing, successfully
tsort Topological sort
tty Print filename of terminal on stdin
type Describe a command

u
ulimit Limit user resources
umask Users file creation mask
umount Unmount a device
unalias Remove an alias
uname Print system information
unexpand Convert spaces to tabs
uniq Uniquify files
units Convert units from one scale to another
unset Remove variable or function names
unshar Unpack shell archive scripts
until Execute commands (until error)
uptime Show uptime
useradd Create new user account
userdel Delete a user account
usermod Modify user account
users List users currently logged in
uuencode Encode a binary file
uudecode Decode a file created by uuencode

v
v Verbosely list directory contents (`ls -l -b’)
vdir Verbosely list directory contents (`ls -l -b’)
vi Text Editor
vmstat Report virtual memory statistics

w
wait Wait for a process to complete
watch Execute/display a program periodically
wc Print byte, word, and line counts
whereis Search the user’s $path, man pages and source files for a program
which Search the user’s $path for a program file
while Execute commands
who Print all usernames currently logged in
whoami Print the current user id and name (`id -un’)
wget Retrieve web pages or files via HTTP, HTTPS or FTP
write Send a message to another user

x
xargs Execute utility, passing constructed argument list(s)
xdg-open Open a file or URL in the user’s preferred application.

y
yes Print a string until interrupted

Saturday, August 6, 2016

After Kickass Torrents, Torrentz.eu Shuts Down

Capture

Weeks after torrents site Kickass Torrents was shut down following the arrest of alleged founder Artem Vaulin in Poland, another major player Torrentz.eu appears to have shut its portals on Friday, a media report said.

Torrentz.eu, considered the largest torrent meta-search engine, announced "farewell" to its millions of users.

Founded in 2003, Torrentz.eu had millions of visitors per day the site grew out to become one of the most visited torrent sites.

After more than 13 years of service, the popular site announced its farewell just a few hours ago, that too without any warning, Torrent Freak reported.

While the homepage is still active, Torrentz has completely disabled its search functionality and has similarly removed all torrent links. Torrent Freak claims it was contacted by the owner of Torrentz.eu, who "prefers not to comment at the moment."

"Torrentz was a free, fast and powerful meta-search engine combining results from dozens of search engines," a text read while searching for content.

The site's users are no longer able to login either. Instead, they see the following message: "Torrentz will always love you. Farewell."

Two weeks ago, Artem Vaulin, the alleged 30-year-old Ukrainian owner of Kickass Torrents, was detained in Poland after being charged with a four-count US criminal indictment which was followed by shutdown of the search engine.

Vaulin was charged with money laundering and violations of several copyright laws.

Friday, August 5, 2016

22 Sites that will help you to Learn & practice Hacking Skills

InfoSec skills are in such high demand right now. As the world continues to turn everything into an app and connect even the most basic devices to the internet, the demand is only going to grow, so it’s no surprise everyone wants to learn hacking these days.

However, almost every day I come across a forum post where someone is asking where they should begin to learn hacking or how to practice hacking. I’ve compiled this list of some of the best hacking sites to hopefully be a valuable resource for those wondering how they can build and practice their hacking skill set. I hope you find this list helpful, and if you know of any other quality hacking sites, please let me know in the comments, so I can add them to the list.

1. CTF365


On CTF365 users build and defend their own servers while launching attacks on other users’ servers. The CTF365 training environment is designed for security professionals who are interested in training their offensive skills or sysadmins interested in improving their defensive skills. If you are a beginner to infosec, you can sign up for a free beginner account and get your feet wet with some pre-configured vulnerable servers.

2. OVERTHEWIRE


OverTheWire is designed for people of all experience levels to learn and practice security concepts. Absolute beginners are going to want to start on the Bandit challenges because they are the building blocks you’ll use to complete the other challenges.

3. HACKING-LAB


Hacking-Lab provides the CTF challenges for the European Cyber Security Challenge, but they also host ongoing challenges on their platform that anyone can participate in. Just register a free account, setup vpn and start exploring the challenges they offer.

4. PWNABLE.KR


pwnable.kr focuses on ‘pwn’ challenges, similar to CTF, which require you find, read and submit ‘flag’ files corresponding to each challenge. You must use some sort of programming, reverse-engineering or exploitation skill to access the content of the files before you are able to submit the solution.

They divide up the challenge into 4 skill levels: Toddler’s Bottle, Rookiss, Grotesque and Hacker’s Secret. Toddler’s Bottle are very easy challenges for beginners, Rookiss is rookie level exploitation challenges, Grotesque challenges become much more difficult and painful to solve and, finally, Hacker’s Secret challenges require special techniques to solve.

5. IO


IO is a wargame from the createors of netgarage.org, a community project where like-minded people share knowledge about security, AI, VR and more. They’ve created 3 versions, IO, IO64 and IOarm, with IO being the most mature. Connect to IO via SSH and you can begin hacking on their challenges.

6. SMASHTHESTACK


SmashTheStack is comprised of 7 different wargames – Amateria, Apfel (currently offline), Blackbox, Blowfish, CTF (currently offline), Logic and Tux. Every wargame has a variety of challenges ranging from standard vulnerabilities to reverse engineering challenges.

7. MICROCORRUPTION


Microcorruption is an embedded security CTF where you have to reverse engineer fictional Lockitall electronic lock devices. The Lockitall devices secure the bearer bounds housed in warehouses owned by the also fictional Cy Yombinator company. Along the way you’ll learn some assembly, how to use a debugger, how to single step the lock code, set breakpoints, and examine memory all in an attempt to steal the bearer bonds from the warehouses.

8. REVERSING.KR


reversing.kr has 26 challenges to test your cracking and reverse engineering abilities. The site hasn’t been updated since the end of 2012, but the challenges available are still valuable learning resources.

9. HACK THIS SITE


Hack This Site is a free wargames site to test and expand your hacking skills. It features numerous hacking missions across multiple categories including Basic, Realistic, Application, Programming, Phonephreaking, JavaScript, Forensic, Extbasic, Stego and IRC missions. It also boasts a large community with a large catalog of hacking articles and a forum for to have discussions on security related topics. Finally, they’ve recently announced they are going to be overhauling the dated site and codebase, so expect some big improvements in the coming months.

10. W3CHALLS


W3Challs is a pentesting training platform with numerous challenges across different categories including Hacking, Cracking, Wargames, Forensic, Cryptography, Steganography and Programming. The aim of the platform is to provide realistic challenges, not simulations and points are awarded based on the difficulty of the challenge (easy, medium, hard). There’s a forum where you can discuss and walkthrough the challenges with other members.

11. PWN0


pwn0 is the VPN where (almost) anything goes. Go up against pwn0bots or other users and score points by gaining root on other systems.

12. EXPLOIT EXERCISES


Exploit Exercises provides a variety of virtual machines, documentation and challenges that can be used to learn about a variety of computer security issues such as privilege escalation, vulnerability analysis, exploit development, debugging, reverse engineering, and general cyber security issues.

13. RINGZER0 TEAM ONLINE CTF


RingZer0 Team Online CTF offers a ton of challenges, 234 as of this post, that will test your hacking skills across multiple categories including Cryptography, Jail Escaping, Malware Analysis, SQL Injection, Shellcoding and more. After you successfully complete a challenge, you can write up your solution and submit it to the RingZer0 Team. If your write up is accepted, you’ll earn RingZer0Gold which can be exchanged for hints during future challenges.

14. HELLBOUND HACKERS


Hellbound Hackers offers traditional exploit challenges, but they also offer some challenges that others don’t such as web and app patching and timed challenges. The web and app patching challenges have you evaluating a small snippet of code, identifying the exploitable line of code and suggesting a the code to patch it. The timed challenges have the extra constraint of solving the challenge in a set amount of time. I thought these two categories were a cool differentiator from most other CTF sites.

15. TRY2HACK


Try2Hack provides several security oriented challenges for your entertainment and is one of the oldest challenge sites still around. The challenges are diverse and get progressively harder.

16. HACK.ME


Hack.me is a large collection of vulnerable web apps for practicing your offensive hacking skills. All vulnerable web apps are contributed by the community and each one can be run on the fly in a safe, isolated sandbox.

17. HACKTHIS!!


HackThis!! is comprised of 50+ hacking levels with each worth a set number of points depending on its difficulty level. Similar to Hack This Site, HackThis!! also features a lively community, numerous hacking related articles and news, and a forum where you can discuss the levels and a security related topics that might be of interest to you.

18. ENIGMA GROUP


Enigma Group has over 300 challenges with a focus on the OWASP Top 10 exploits. They boast nearly 48,000 active members and host weekly CTF challenges as well as weekly and monthly contests.

19. GOOGLE GRUYERE


Google Gruyere shows how web application vulnerabilities can be exploited and how to defend against these attacks. You’ll get a chance to do some real penetration testing and actually exploit a real application with attacks like XSS and XSRF.

20. GAME OF HACKS


Game of Hacks presents you with a series of code snippets, multiple choice quiz style, and you must identify the correct vulnerability in the code. While it’s not nearly as in depth as the others on this list, it’s a nice game for identifying vulnerabilities within source code.

21. ROOT ME


Root Me hosts over 200 hacking challenges and 50 virtual environments allowing you to practice your hacking skills across a variety of scenarios. It’s definitely one of the best sites on this list.

22. CTFTIME


While CTFtime is not a hacking site like the others on this list, it is great resource to stay up to date on CTF events happening around the globe. So if you’re interested in joining a CTF team or participating in an event, then this is the resource for you.

Thursday, August 4, 2016

Create a Tri fold Real Estate Brochure Photoshop Tutorial

https://youtu.be/e7UZ6gyxTiM?list=PLdFEK22_Dg_kFo0qFreHrkd1y3o19PGBc

How to create a banner in Photoshop

https://www.youtube.com/watch?v=YRchsA8FjdM

Hacker's hacked Twitter Account of Pokémon GO's CEO

pokemon-go-hack

Twitter account of another high-profile CEO has been hacked!

This time, it's Niantic CEO John Hanke, the developer behind the world's most popular game Pokémon GO.

And it seems like Hanke is so busy with its newly launched game Pokémon GO that he hasn't noticed or took any measures against it even after over 12 hours of the hack, as the tweets made by hackers are still displaying on his Twitter timeline (at the time of writing).

OurMine claimed responsibility for the hack, which was spotted after the hacking group managed to post a series of messages on Hanke's Twitter timeline.



OurMine is the same group of Saudi Arabian hackers that previously compromised social media accounts of other CEOs including:

It appears that OurMine managed to post on Hanke's Twitter timeline after hacking his Quora account.

One of the tweets posted by the group claimed the hack was for Brazil, where Pokémon GO has yet to be released.





Pokémon GO has become the world’s most popular mobile game and people are getting crazy to catch 'em all. The location-based augmented reality game allows players to catch Pokémon using their device's camera and is officially available in only a few countries.

And Niantic CEO's Twitter Password Was...


Another tweet claimed that Hanke's password was "nopass."

OurMine claims it is testing out the security of accounts and teaching people to secure their online accounts better, though it also offers its support to those it targets, charging up to $5,000 for a "scan" of their social media accounts, site security holes, and other security flaws.

The hacks of high-profile CEOs social media accounts could be due to recent mega breaches in LinkedIn,MySpace, and Tumblr that exposed almost one billion credentials.

You are advised to change your passwords for all social media sites as well as other online accounts immediately, especially if you are using the same password for multiple websites.

Also use a good password manager that allows you to create complex passwords for different sites as well as remember them. We have listed some best password managers here that could help you understand the importance of password manager and choose a suitable one.



How to Find What Google Knows About You




You can view what Google knows and erase only the things that you don't want Google to consider when serving up your ads. Here's an example. What if someone mentioned a Justin Bieber song and you Google it.

Hey, you don't even like Justin Beiber, but now the banner ads in half your favorite websites are showing nothing but Justin Bieber. Erase it!


First step: log into your Google account and go to history.google.com 

You should see something pretty similar to the screen capture I made of my history. No Justin Bieber here, but I did search for demotivational posters. Maybe I want to delete those.







Delete It from Google!








Once you review your Google history, you can remove anything you don't want to sit around in your Google history causing embarrassing ads or new and exciting discoveries for your children to accidentally find in your search history.





Just check the box to the left of the item and then click on the remove button.

You could do the same thing by clearing your browser history and cookies, but that only works on the computer you're using.

Clearing it from your Google history works for searches from any computer where you were logged into your Google account.


But wait, there's more. You can go beyond just deleting your history. You can actually download it, too.






3 of 3

Download Your History








 If you'd like, you can download your Google history. Click on the settings icon and then click download. You'll get a gigantic warning.




Download a copy of your data

Please read this carefully, it's not the usual yada yada.

Create an archive of your search history data. This archive will only be accessible to you. We will email you when the archive is ready to download from Google Drive. Learn more

Important information about your Google data archives



  • Do not download your archive on public computers and ensure your archive is always under your control; your archive contains sensitive data.

  • Protect your account and sensitive data with 2-Step Verification; helping keep bad guys out, even if they have your password.

  • If you have decided to take your data elsewhere, please research the data export policies of your destination. Otherwise, if you ever want to leave the service, you may have to leave your data behind.





Why such the big warning? Well, Google can make inferences about your gender, age, and shopping preferences, and so can anyone else with that data. If you've ever visited an embarrassing website or Googled something that could potentially be used against you, you may want to think carefully about how you store this data.

NB: Please Comment below if you have more question.


Snowden Puts His Mind to Designing Spy-Proof Smartphone Cases

NSA Snowden Puts His Mind to Designing Spy-Proof Smartphone Caseswhistle-blower Edward Snowden and noted hacker Andrew "Bunnie" Huang on Thursday published a paper on their collaboration to design a smartphone case that will protect user privacy.


 

The pair developed a prototype compatible with the 4.7-inch iPhone 6, as it's "driven primarily by what we understand to be the current preferences and tastes of reporters," the paper states. "We assume any platform ... can and will be compromised by state-level adversaries."

That's good thinking, observed Rob Enderle, principal analyst at the Enderle Group.

"There are some really nasty rootkits in China that self-install when you go to a compromised website and pretty much open your phone up to complete remote control," he told TechNewsWorld, "and this malware came from an identified and otherwise legitimate firm. You can imagine what a government could do."

The introspection engine, which will be housed in the phone case, will be able to alert the user of a dangerous situation in real time.

If the phone's radio is supposed to be off, the introspection engine will sound an alert when it's turned on by anyone other than the user.


battery case style introspection engine
Conceptual rendering of a 'battery case' style introspection engine, piggybacked on an iPhone6.


Turning off radios by entering airplane mode is no defense, as GPS has been active in airplane mode since iOS 8.2, the two noted. Further, airplane mode is a soft switch, meaning the graphics put up on the screen have no correlation with the hardware state, and readily available malware packages can activate radios without any indication from the user interface.


The introspection operations will be performed by an execution domain separated from the phone's CPU. It will be difficult to trigger a false positive or induce a false negative, even with signed firmware updates. The system should be passive and difficult to detect by the phone's OS, and it should be usable on a daily basis with minimal impact on workflow.

The introspection engine will be completely open source and user-inspectable; users will be able to field-verify whether the introspection system is working properly.

"This is a relatively simple fix to what's a massive problem right now," Enderle remarked. "McAfee has demonstrated repeatedly that phones can remotely be turned into spying devices without the users' knowledge."

The idea "seems obvious, but that's the mark of good innovation," said Michael Jude, a program manager atStratecast/Frost & Sullivan.

"Once you see an innovative solution, you ask why someone hasn't thought of it before," he told TechNewsWorld.

Project Challenges


It is possible to manufacture affordable cases based on their design, according to Huang and Snowden.

However, "the market for this is pretty small at the moment," noted Enderle, "so producing enough to make it [affordable] would be difficult."

Also, size would be an issue, he suggested. "You don't want it to be obvious, as some governments might arrest you for just having it. It wouldn't be just reporters that would want this -- criminals and terrorists would as well."

On the other hand, mass producing this case "would probably be no more complex than [making] the smart battery packs one can buy right now," Frost's Jude pointed out. "It could simply be an added chip to such battery packs, so that the device not only watches over your phone's security but also maintains its charge."

Tuesday, August 2, 2016

How to Increase Internal Storage Space of Android

insufficient storage available“Recently, I always received a warning “insufficient storage available” on my android phone when trying to install a new app on it. I was especially confused because I had plenty of storage left. And as we know, android only limits the installation of new app when we have less than 15 MB of storage remaining. ”

Therefore, in this case, what should I do?

Can I fix the "insufficient storage available" error message on android? I asked our friends for help, and one of them told me to try using this method provided by the video increase internal storage up to 32Gbs on any android lg f6 etc.. .

However, after watching the above video, some users don’t really understand this method and want to find more solutions to solve this problem. Now, this article will show more detailed information about this issue and introduce several different ways.

7 Ways to Help to Increase Internal Storage Space of Android


 



    • Method 1: Delete unwanted apps and clean all the history and cache



    • Sometimes, as a matter of fact, users don't really need more storage, they just need to make better use of what they've got. No doubt, there are several apps users have no interest in using or have never used them. Therefore, if users don't use them, they can uninstall them. If they later find they need these apps, they can just download them again.(


Any app users have paid for at Google Play will be available to any android device on which they are logged into their Google account.

      )


 

      On the other hand, even some apps users keep in their devices will take up more space than they require. To be specific, as time goes by, every app on users’ phone fills space with cached files. At this time, users can clear these out to release more free space to store more data. Meanwhile, clearing app cache won't delete any important files on phone. If users want to completely clean cache from all their apps using android’s built-in settings, here's how:


settings storage

      Step 1: Click “


Settings > Storage

      ”. After that, users will see total storage and other useful information related to


Storage

      such as


Used space

      ,


System memory

      ,


Cached data

      and


Available space

      , etc. (as shown below)


cached data

      Step 2: Click “


Cached data

      ”. Then, a pop up will show up saying “


This will clear cached data for all apps

      ”. At this time, users just tap “


OK

      ”.


 



    • Method 2: Use USB OTG storage





USB OTG storage

      If users are technicians, they may know many android phones support


USB OTG

      (On The Go), which allows them to plug in peripherals such as storage drives to add more space for their phone.


Tips: if users don’t know whether their device supports OTG, they can download USB OTG Checker app to check it.

      If users’ device supports OTG, they can insert a micro SD card or add an external hard drive to it via using an OTG adaptor (such as the Inateck HB3001G). If users are going to insert a micro SD card to a phone that doesn't support removable memory then the phone should be able to power the device by itself. However, if users want to increase internal storage space by adding an external hard drive, they will probably need to also power the OTG adaptor (a USB power cable is provided).


 



    • Method 3: Turn to cloud storage



    • Another really good option for freeing up space on android is to use cloud storage to share users’ pictures, videos and other files.


cloud storageCloud storage

      apps such as Dropbox and SkyDrive allow users to share files from their phone to the cloud and then access them from their computer. And, once files are shared in the cloud, users can free up space by deleting them from their phones.


 

      The only disadvantage of using cloud storage is that users will be able to access those files only when they have an active internet connection.


Twitt what you find

 

      Want to know the best part?


 



    • Method 4: Use memory card to increase storage space



    • Can we spare 1GB space of our memory card for the internal memory? Some users might have this question when they receive the insufficient storage available warning. However, can this really be true? For more information, please see the following content.


 

      In general, to use part of memory card’s space to successfully solve this issue, users have to prepare some necessary tools as follows.


 

      1: Android phone must be rooted.


 

      2: 2 GB or above memory card with class 4 or higher.


 

      3: Memory card reader.


 

      4: Excellent partition software.


 

      5: Link2SD app installed on phone.


Tips: This app allows android phone to use a part of the memory card as an internal memory, so users can move some data and apps to the memory card.

      To use a memory card as an internal memory, users have to partition this memory card at first since the Link2SD app requires a second partition on memory card. And, it's not working "out-of-the-box" as native app2sd, users need to root their device and create a second partition on their memory card themselves. Detailed steps of using memory card to increase storage space are shown below.


 

Step 1: Partition memory card



      As a matter of fact, there are two ways by which users can


partition memory card/SD card

      , and here they go.


 

      MiniTool Partition Wizard, a green, concise and professional partition tool, is recommended here.


 

Tip, although Windows built-in disk management tool can also help to partition SD card, it has some limitations. For instance, users are unable to delete memory card’s partitions. This Why Can’t Delete Volume on USB Flash Drive and How to Fix the Issue post will tell you what you want to know.



Procedure

      :


 

      1: First of all, download and install MiniTool Partition Wizard on computer.


 

      2: Remove memory card from phone, insert it in card reader, and connect it to computer.


 

      3: Launch the partition management tool. Then, users will see all their disk drives as well as the memory card which they have just connected.


delete all paritions

      4:Right-click the memory card and select “


Delete All Partitions

      ”. (


Note: This will delete all data saved on this card, so please back up everything before doing this step. Here, you might be interested in this post Clone SD Card to PC for Transferring Data or Making a Backup.

      ) After that, the memory card becomes unallocated.


 

      5:Click memory card again and select “


Create Partition

      ” from the left action panel.


fat partition

      6:Select the partition as primary and specify its file system and size.


ext 2

      7: Then select the unallocated space and click “


Create

      ” to create a Ext2/3/4 primary partition.


 

      8: Click “


Apply

      ” to perform all changes.


 

      Video for partition SD card:




      In fact, here is an alternate method to make a partition on memory card. However, this method requires ClockwordMod. Therefore, if users don’t have CWM installed, they had better use the above method. Of course, if users have CWM installed, they can choose either.


Note: This method works for both Stock ROM and Custom ROM

      .


Procedure

      :


 

      1: Backup all files on memory card.


 

      2: Go into the recovery mode of phone.


 

      3: Select “


Advanced

      ”, and then choose “


Partition SD Card

      ”.


 

      4: Then Choose SD-ext size (


if users have a 2GB Memory Card, choose 512 MB; if users have a 4 GB Memory card, choose 1024 MB

      ).


 

      5: Select “


0 Swap

      ”.


 

      6: Wait for the process to finish, and then reboot the phone.


 

      Thus, users have finished partitioning the memory card.


 

Step 2: Increase Internal Memory by Link2SD



      After partitioned memory card, users need to increase the internal storage of android to store more data and apps. To be honest, this is the easiest part of this whole work, as users are going to need few steps to get the whole stuff completed and placed on automation. Please follow these steps below.


 

      1: Insert memory card back to android phone.


 

      2: Download and install the Link2SD app. Note: This app needs root access, so this trick would only work if users have rooted their phone.


 

      3: Open Link2SD. Users will be prompted to choose between ext2,ext3,ext4 and FAT32. They can select a suitable one according to actual needs.


ext234

      4: The app will then ask to reboot device. So reboot.


 

      5: After rebooting, launch the Link2SD app again. Now, click “


Setting> Check the autolink

      ” to automatically move apps upon installation.


create link

      6: If users already have some apps, select “


Create link

      ” (be sure to check the files: app, dalvic-cache, and library files).


 

      7: Check the memory, select “


Storage Info

      ” to view the current status of the internal memory.


storage infro
    Now, all work has been done and users can install as many apps as they want.




    • Method 5: Use Terminal Emulator App



    • If users don’t want to install Link2SD app, they can try using the following method with Terminal Emulator app.


Requirements

      :


 

      Memory card of class 4 or higher.


 

      Terminal Emulator app installed on phone.


Procedure

      :


 

      Step 1: Partition memory card via using MiniTool Partition Wizard software.


 

      Step 2: Download and install Terminal Emulator App on phone.


 

      Step 3: Launch the app.


 

      Step 4: Type “


su

      ” and press enter.


 

      Step 5:Type “


a2sd xdata

      ” and press “


Enter

      ”.


 

      Step 6: As soon as users type this command & press “


Enter

      ”, the app will ask them whether to continue with the process or not. Here, type “


y

      ” and press “


Enter

      ”.


 

      Step 7: Now the app asks to reboot phone. Again type “


y

      ” to restart the phone.


Terminal Emulator App

      At this time, users have successfully increased their internal storage space on their android, and they can click “


Menu>Settings>Storage

      ” to check it.


Note: if users want to undo the process and revert the phone back the way it was before, please type “su > a2sd noxdata >y” commands (each type ends with pressing on “Enter” key).



    • Method 6: Use INT2EXT





Prepare

      :


 

      INT2EXT4+ (for new ROMs).


 

      INT2EXT+ (for older ROMs).


Procedure

      :


 

      Step 1: Download the INT2EXT4+ zip file on computer to a specific folder, and remember not to extract it.


 

      Step 2: Power off phone completely until it vibrates. Then, users need to enter into CWM recovery mode.


Note: Touch won’t work here in recovery mode. So users can use volume keys for navigation and power/home button for selection.

advanced

      Step 3: In the


Advanced Menu

      window, select the “


partition sdcard

      ” option.


 

      Step 4: Select the “


ext size

      ”.


Note: this size should be less than memory card size. And, Select “swap size as Zero”.

      Step 5: The partitioning SD card process will begin. Wait for a few minutes to complete it.


mount usb storage

      Step 6: select “


++++go back++++ then

      ” to enter the


Mounts and Storage Menu

      window, and select the “


mount USB storage

      ” option.


 

      Step 7: Now connect phone to PC and copy the downloaded INT2EXT4+ zip file as it is without extracting on SD card.


mountsystem

      Step 8: Again go back and navigate to the


Mounts and Storage Menu

      window, and select the “


mount/system

      ” option.


 

      Step 9: Return back to the main menu and select the “


install zip

      ” from “


sdcard

      ” option, then select “


choose from sdcard

      ”. This will show all the contents present on the memory card. Just navigate to the INT2EXT4+ zip file and select it to start the installation process.


 

      Now, users need to restart their phone by navigating to the “


reboot system now

      ” option located on the recovery mode itself. They can view their phone internal memory storage via clicking “


Menu>Settings>Storage

      ”.


 



    • Method 7: Use Mounts2SD app





Download

      :


 

      Mounts2SD App.


Procedure

      :


 

      Step 1: Download and install Mounts2SD app on phone.


 

      Step 2: Launch the app and grant Superuser permissions.


Configure Busybox

      Step 3: Click the “


Configure Busybox

      ”.


Install Script option

      Step 4: Be patient until it completes. A green colored tick mark will confirm the completion. Then, click the “


Install Script

      ” option to get the following window.


Applications, Data, Dalvik cache, Cache

      Step 5: Click “


Configure

      ” and tick all these options:


Applications

      ,


Data

      ,


Dalvik Cache

      , and


Cache

      .


 

      Step 6: Scroll further down and click the “


Disable Safe-mode

      ” option.


 

      Step 7: Now exit the app and restart phone.


 

      Step 8: After rebooting, users should launch the app again. Then, they will see their phone internal storage space has been increased.


Note: If users see any kind of error or warning in their notifications due to this app, don’t panic as it is caused by swap. They just need to reboot it again, and all errors will disappear.

 

Simon Petrus Invents Simless Phone That Doesn’t Use Airtime In Namibia

A Namibian schoolboy in the country’s Ohagwena Region has come up with a sim-less mobile phone that does not require airtime to make calls.

The Grade 12 learner, Simon Petrus, a pupil at Abraham Iyambo Senior Secondary School created the phone using spares from a phone and television set, New Era reports.

Complete with a light bulb, fan and charger socket, the handset functions off power supplied through a radiator and is able to make calls to anywhere through the use of radio frequencies.

The invention, which is made up of a radio system, is attached to a box and also allows the user to view one TV channel on it.

Petrus is reported to have won a gold medal at national level last year for his invention of a two-in-one machine that that works as both a seed drier and cooler.

His invention of two years has been highly sponsored by his unemployed parents, the schoolboy admitted and he hopes the invention would be successful and be able to be carried further.

The development marks the latest in a series of innovative projects by students within the southern African nation.

Joshua Nghaamwa, a self-taught inventor, is reported to have created a satellite using parts from radios, cellphones and other electronics, The Namibian reports.

The satellite, believed to strengthen internet connectivity, is small enough to fit in a laptop bag and has a USB port that allows it to be connected to a modem, router or cellphone, increasing internet speed and allows for a better online experience.

Nghaamwa says he wants to introduce the device throughout the African market, so as to boost ICT on the continent.

Monday, August 1, 2016

Nyuma yo guhagarika urubuga Kickass ubu hari izindi nyinshi zasohotse nkayo.

Nkuko twabibabwiye ku munsi w’ejo ko kickass yarafunzwe hamwe nu muyobozi wayo. Ariko ifungwa ryayo ntiryabujije kuvuka indi iyisimbura.

Umwe mubanyamuryango ba ISOHUNT yahise akora indi yise “kickasstorrents.website” aho ubungubu ushobora kuyisura ukobonaho Torrent zose wifuza.

hakaba ahrimo kugenda haduka nizindi ziyisimbura ariko icyahindutse akaba ari izina gusa, nkaho ushobora kuyisanga kuri kat.am
Ariko uwo munyamuryango wa ISOHUNT yongeyeho avuga ko nubwo Iyo yakoze isa na kickass twari dusanzwe tuzi ntabwo ikora neza cya Kickass yari isanzwe yafunzwe ku munsi w’ ejo..


Yongeho avuga ko niba ushaka kumanura (download) amafilime, Ama porogarame nibindi ubishoboye wabikora hakiri Kare kuko nayo ntagihe izamaraho ngo ubundi nayo ifungwe.
Abagize ISOHUNT ni abantu bazwi cyane mu bintu byama Torrent kuko ninabo basubijeho urundi rubuga tuzi nka PIRATEBAY mugihe narwo rwari rwafunzwe.
Iyo ufunguye kickass nshyashya ubona ubutumwa ISOHUNT yanditse isaba ko uwashinze kickass torrent yafungurwa akava mu maboko ya polisi.
Mu gihe ufite icyo wakongera kuri iyi nkuru cyangwa ikindi twagufashamo wajya ahandikirwa comment

Menya Ubusobanuro bw'inyuguti nibimenyetso ukunda kubona mu gihe urimo gukoresha internet.

Uri mu bantu bakoresha Murandasi ya telefone, niba rero ujya witegereza neza utu tunyuguti [ G , E , 3G , H , H+ , 4G ] ndahamya ko hari aho waba waratubonye, niba kandi utaratubonye twose, harimo duke uzi.mobile_phone_network_comparison
Ubu tugiye kurebera hamwe ibyerekeye izi nyuguti akenshi umuntu akunze
kubona hamwe hejuru kuri telephone hitwa “NOTIFICATION BAR”,cyangwa se “STATUS
BAR” hahandi urebera umuriro usigaranye, aho isaha igeze,n’ibindi…
Niba nawe wajyaga wibaza uti ese ibi ni ibiki?, guhinduka kwatwo biterwa n’iki? cyane ko aka kanya ushobora kubona 3G, mukanya ugasanga handitse H, ibyo ibibazo byose nibyo tugiye
kurebera hamwe ibisubizo byabyo.
Mbere na mbere kugirango ibi bimenyetso bihinduke, bishobora guterwa na n’urusobemuyoboro(network) operator wahisemo muri settings zawe, ariko
na none ahanini bigenda bihinduka bitewe n’ahantu uherereye cyangwa ugeze ingufu za murandasi ihari.
Buriya rero iyo ubonye kimwe muri ibi bimenyetso gisimbuye ikindi jya umenya ko
ibintu byahindutse, umenye icyo gukora, kuko biba bikwereka ko ingufu cg umuvuduko wa
murandasi yawe wagabanutse cyangwa wiyongereye!, urumva ko ibi bimenyetso bifite igisobanuro gikomeye mu ikoresha rya internet.
Mu gihe ubonye ikimenyetso kimeze gutya ”G” aka kamenyetso gahagarariye GPRS, nukabona menya ko uri gukoresha internet iri ku muvuduko wo hasi cyane bishoboka.
Mu gihe rero ubona aka kamenyetso ka “E”, aka nako kagaragaza ko internet uri
gukoresha iri ku muvuduko wo hasi bidakabije gusa uruta uw’akambere ”G”.
Nubona “2G”, menya ko ufite murandasi iri ku muvuduko uringaniye, mbese utari muke kandi utari mwinshi.
Naho mu gihe ubonye “3G” ; iyo yo iri ku muvuduko uhagije!!, amenshi muma telefoni ya verisiyo ziherutse akoresha murandasi iri ku muvuduko wa 3G.
Naho mu gihe ubonye akamenyetso ka “H”, menya ko uri gukoresha internet ifite
umuvuduko uruta uwa 3G gusa na none nubona akamentso kameze gutya “H+”, bivuze
ko inyaruka cyane kurusha n’iya H.
Nubona akamenyetso ka *“4G”* cg “LTE” cg se “L” menya ko uri gukoresha internet ya mbere ibangutse cyane kandi yemewe ko ariyo iri kw’isonga ku isi, Gusa mu by’ukuri ntago iri terambere rya 4G ryari ryagerwaho neza dore ko nubwo iyi LTE bayita 4G, iyi 4G ubundi ikwiye kurangwa n’umuvuduko wa 1GB/s mu gihe iyi “LTE” ifite umuvuduko wa 100Mbs/s.

Abahanga mu by’amageneration y’urusobemuyoboro bavuga ko muwi 2020 aribwo hazasohoka generation ya 5G ifite umuvuduko uhambaye wa 1GB/S, akaba ariyo izaba ifite umuvuduko wifuzwaga kugerwaho na 4G.

Hari amakuru avuga ko 5G iri mu igeragezwa muri Korea y’amajyepfo.

Hari n’akandi kamenyetso ka *R* ushobora kubona, aka ko rero gakunze kugaragara nkiyo uri hanze y’igihugu ugakoresha ubufasha bwa ROAMING, Nyine network providers bawe
iminara yabo utari kuyifatisha hanyuma bigasaba ko ukoresha indi ibonetse.

Tanga Ibitekerezo kuri bino tumaze kubagezaho.

Menya ukuntu wahindura ibara rya Folder ya we.

Customize-your-folders-with-different-colorsBimenyerewe ko ubusanzwe Folder iba ifite ibara ry'umuhondo, ariko ubu birashoboka ko folder za we waziha amabara atandukanye ibyo bikaba byagufasha mu buryo bwo kumenya gutandukanya aho wabitse amakuru ya we.

Uyu munsi turabageza porogarame wakwifashisha muguhindura amabara ya ma fishiye muri windows , byagufasha mugushyira ibintu neza kumurongo no ongera isuku mu ma fishiye yawe

Customize-your-folders-with-different-colorsKuri kiza izi ntambwe mukugira ubashe guhindura amabara ya fishiye yawe

  1. Manura (Download) porogarame yitwa Folder Coloriser  DOWNLOAD FOLDERCOLORIZER

  2. Insitala iyo porogaramu umaze kumanura

  3. Umaze kwe insitala iyo porogaramu Kanda right click kuri fishiye runaka urebe ahanditse coloriser aha niho ushobora guha ibara ushaka fishiye yawe.


right-click-and-colorize

 

Dore porogarame igiye gucyemura byabibazo byo kubura ibyo uganiriza umuntu.

Iyo uhuye nu muntu mutari musanzwe muziranye rimwe na rimwe hari igihe ubura ibyo muganira, ugasanga ni hahandi umuntu muvuganye nyuma y’ iminota micyeya mwese mugahita mubura ibyo muganira bikaba ngo mbwa ko mwese muhita muceceka byaba ngombwa umwe muri mwe agahitamo kwigendera Kandi bitari ngombwa.
‘A Curious Question‘  ni porogarame usanga kuri smartphone za Android na iPhone, iyi ni porogarame Ije kugufasha uburyo ibiganiro byawe byagenda neza.

Iyi porogarame iguha ibibazo birenga 300 byibanze byo kubaza cyangwa kuganiraho n’ umuntu mugihe wabuze ibyo waganiriza umuntu.

Iyi porogarame ikoze m’ ururimi rw’ icyongereza bivuze ko umuntu utazi icyongereza bya mugora kuyikoresha.


Ariko nanone buriya bigaragara nabi kureba muri telephone yawe mugihe murimo kuganira kuko biba bigaragara ko utishimiye uwo muntu muri kuganira ariyo mpamvu abakoze iyi porogarame bakugira inama yo kuba wafata ibi bibazo mumutwe kugirango utazakenera telephone yawe.

Nuramuka wifashishije iyi porogarame bizatuma ugira ikiganiro cyiza kuburyo uwo muzaba muhuye bwambere azajya asigara akwibazaho.

Mugihe ushatse kumanura (download) iyi porogarame niba ukoresha Android Kandahano nanone mugihe ukoresha iPhone kanda hano.

Uramutse ufite icyo wakongera kuri iyi nkuru cyangwa niba wifuza gusangira natwe ibitekerezo byawe watwandikira ahandikirwa ibitekerezo (comment).