Showing posts with label from. Show all posts
Showing posts with label from. Show all posts

Tuesday, April 25, 2017

Troubleshooting After upgrading from Vista to Windows 7 cant download anything and Youtube shows a black screen Error

Troubleshooting After upgrading from Vista to Windows 7 cant download anything and Youtube shows a black screen Error


After upgrading from Vista to Windows 7, cant download anything and Youtube shows a black screen.

Hello,
I upgraded from Vista to Windows 7 Home Premium.
I bought the full version, but just chose to upgrade, not fully install.
I did this because a Windows Update caused a problem with my network card software and I lost my Internet Connectivity (my computer could not "see" the network.)
After the update, which ran fine, I got my Internet back, but now I cant download a thing.
If I try to go to Youtube it doesnt play anything, the screen is just black.
Any suggestions? Very frustrated.
I am running AVG Internet Security with Windows Defender Firewall.
Thank very much.

Anwsers to the Problem After upgrading from Vista to Windows 7, cant download anything and Youtube shows a black screen.

Download Error Fixer (Free)

Hi,
úÿÿÿÿÿÿÿÿ Do you receive any error message while downloading the files?
úÿÿÿÿÿÿÿÿ Which browser are you using to download the files?
ÿ
Let?s follow the steps provided below and check if that helps:
Method 1:
I would suggest you to use the Internet Explorer in No Add-on mode.
To run in No Add-on mode follow the steps below ?
a.
Click Start, and then type Internet Explorer in the Start Search box.
b.
Click Internet Explorer (No Add-On).
Internet Explorer opens without add-ons, toolbars, or plug-ins.
c.
Test Internet Explorer to verify that it works correctly.
If the issue is not present in No Add-on mode you may check which particular Add-on is interfering referring to the links provided.
You may also refer to the below links for further assistance on the issue ?
http://windows.microsoft.com/en-US/windows7/Internet-Explorer-add-ons-frequently-asked-questions
ÿ
Method 2:
If the issue persists I suggest you to reset Internet explorer settings and check if you can resolve the issue ? Use the below steps to reset the Internet Explorer manually:
a.
Open Internet Explorer.
b.
Clickÿ Tools, and then clickÿ Internet Options.

c.
Click the Advanced tab.
d.
Under Reset Internet Explorer Settings, click Reset.

For more assistance refer to the link mentioned below ? To optimize Internet Explorer:
http://support.microsoft.com/kb/936213
If the above steps did not help then follow the steps provided belolw.
Method 3: Try to download and install the Adobe flash player and check for the issue.
Click on the link provided below to download and install Adobe flash player:
http://www.adobe.com/support/flashplayer/downloads.html#fp10.2
ÿ
Disclaimer: The Reset Internet Explorer Settings feature might reset security settings or privacy settings that you added to the list of Trusted Sites.
The Reset Internet Explorer Settings feature might also reset parental control settings.
We recommend
that you note these sites before you use the Reset Internet Explorer Settings feature.

How to Avoid Downloading Malware

Where are you getting the download?

There are malicious people who download valid copies of a popular download, modify the file with malicious software, and then upload the file with the same name. Make sure you are downloading from the developers web page or a reputable company.


Cancel or deny any automatic download

Some sites may automatically try start a download or give the appearance that something needs to be installed or updated before the site or video can be seen. Never accept or install anything from any site unless you know what is downloading.

Avoid advertisements on download pages

To help make money and pay for the bandwidth costs of supplying free the software, the final download page may have ads. Watch out for anything that looks like advertisements on the download page. Many advertisers try to trick viewers into clicking an ad with phrases like "Download Now", "Start Download", or "Continue" and that ad may open a separate download.

Recommended Method to Repair the Problem: After upgrading from Vista to Windows 7, cant download anything and Youtube shows a black screen.:

How to Fix After upgrading from Vista to Windows 7, cant download anything and Youtube shows a black screen. with SmartPCFixer?

1. Click the button to download Error Fixer . Install it on your computer.  Open it, and it will scan your system. The errors will be shown in the list.

2. After the scan is finished, you can see the errors and problems need to be fixed. Click Fix All.

3. The Repair part is finished, the speed of your computer will be much higher than before and the errors have been fixed. You can also use other functions in SmartPCFixer. Like dll downloading, windows updating and print spooler error repair.


Related: Fast Solution to Problem: Error http//go.microsoft/fwlink/?linkId=144689 occurs at every reboot,,Troubleshooting:I tried to download the latest version of Internet Explorer 9, but it will not update the download due to a message that states "Wrong version of Internet Explorer installer" Error,Fast Solution to Error: IE9 Search Taking Me to Web Pages Rather Than Search Results,Random freezing after updating to SP1 (Windows 7) Tech Support,[Anwsered] Thinkpad 8611 Boot,How to Resolve - Svchost Helper?,Fast Solution to Problem: L30 101 Driver Windows 7,Troubleshooter of Error: Io Device,How to Fix Error - Dell Laptop Code 39?
Read More: Solution to Error: after scanning a word document, why are some words missing and other words scrunched together,Fast Solution to Problem: Aligning Metro Tiles in a Single File column?,How Can I Fix - ALGEBRA EQUATION graph IN EXCEL?,Troubleshooting:After performing Norton scan, lost all inbox emails.,[Solved] after os reinstall windows 7 ultimate will not do a complete system restore because it doesnt recognize the image on the external hard drive,Able To Install Multiple Versions Of Office?,A couple of years ago I downloaded a homeccounting template I cant find now is there a place where I can look for other templates that are not lis ated?,add on information bar - Preventing me from being able to download anything,addin for excel doesnt exist in "C:Program FilesMicrosoft OfficeOffice121033",Adding degrees on Calculator

Available link for download

Read more »

Monday, April 17, 2017

The Most Important Passages From Apples Challenge to the FBI BusinessWeek

The Most Important Passages From Apples Challenge to the FBI BusinessWeek


"GovtOS" may make us all part of a police state, and other stark warnings from Apple.

GovtOS. Thats what Apple Inc. calls the newest product in its pipeline. Its not the brainchild of the gadget masters in Cupertino but rather an iPhone operating system conceived by some buttoned-down folks in Washington, D.C. Unlike the latest iPhone or iPad, it wasnt revealed on a stage before thousands of the faithful. Instead, it was unveiled in a stark response to the Obama administrations attempt to force the computer maker to assist in a terrorism probe. And, Apple has warned, it may someday lead to every American being made an unwilling assistant to law enforcement.

In a 65-page federal court filing on Thursday in Riverside, Calif., Apple said making it override the encryption of an iPhone belonging to one of the San Bernardino shooters was wild overreach. As a legal matter, Apples lawyers swiftly disassembled the governments use of an 18th century law (the All Writs Act) to justify its demand and described in minute detail how forced compliance would play out, both for Apples technicians and whoever else is next. 

Although Apple has a growing number of lawyers in this fight, it may have telegraphed its intent to make a First Amendment argument a pillar of the case. Forcing someone to write code is like forcing them to speak, Apple suggested, and thats usually a constitutional no-no. The briefs main author, Ted Boutrous of Gibson Dunn & Crutcher LLP, is one of the nations premier media lawyers. Here are some highlights:

A Broader Threat

"Under the same legal theories advocated by the government here, the government could argue that it should be permitted to force citizens to do all manner of things necessary to assist it in enforcing the laws, like compelling a pharmaceutical company against its will to produce drugs needed to carry out a lethal injection in furtherance of a lawfully issued death warrant, or requiring a journalist to plant a false story in order to help lure out a fugitive, or forcing a software company to insert malicious code in its autoupdate process that makes it easier for the government to conduct court-ordered surveillance. " 

A Threat to Privacy on a Global Scale

"This is not a case about one isolated iPhone. Rather, this case is about the Department of Justice and the FBI seeking through the courts a dangerous power that Congress and the American people have withheld: the ability to force companies like Apple to undermine the basic security and privacy interests of hundreds of millions of individuals around the globe."

A Trifecta of Illegality

"No court has ever authorized what the government now seeks, no law supports such unlimited and sweeping use of the judicial process, and the Constitution forbids it."

Christmas for Criminals and Spies

"The government wants to compel Apple to create a crippled and insecure product. Once the process is created, it provides an avenue for criminals and foreign agents to access millions of iPhones. And once developed for our government, it is only a matter of time before foreign governments demand the same tool."

The Internet of Big Brothers Things

"If Apple can be forced to write code in this case to bypass security features and create new accessibility, what is to stop the government from demanding that Apple write code to turn on the microphone in aid of government surveillance, activate the video camera, surreptitiously record conversations, or turn on location services to track the phone?s user? Nothing."

"Compelling Apple to create software in this case will set a dangerous precedent for conscripting Apple and other technology companies to develop technology to do the government?s bidding in untold future criminal investigations."

Forgot to Call Tech Support

"Unfortunately, the FBI, without consulting Apple or reviewing its public guidance regarding iOS, changed the iCloud password associated with one of the attacker?s accounts, foreclosing the possibility of the phone initiating an automatic iCloud back-up of its data to a known Wi-Fi network, which could have obviated the need to unlock the phone and thus for the extraordinary order the government now seeks. Had the FBI consulted Apple first, this litigation may not have been necessary."

Congress Already Said No

"Congress has never authorized judges to compel innocent third parties to provide decryption services to the FBI. Indeed, Congress has expressly withheld that authority in other contexts, and this issue is currently the subject of a raging national policy debate among members of Congress, the President, the FBI Director, and state and local prosecutors. Moreover, federal courts themselves have never recognized an inherent authority to order non-parties to become de facto government agents in ongoing criminal investigations."

We Just Made It, We Dont Own It

"Apple is no more connected to this phone than General Motors is to a company car used by a fraudster on his daily commute." 

"Nothing connects Apple to this case such that it can be drafted into government service to write software that permits the government to defeat the security features on Apple?s standard operating system. Apple is a private company that does not own or possess the phone at issue, has no connection to the data that may or may not exist on the phone, and is not related in any way to the events giving rise to the investigation."

Thin End of the Wedge

"The government?s flawed suggestion to delete the program and erase every trace of the activity would not lessen the burden, it would actually increase it since there are hundreds of demands to create and utilize the software waiting in the wings. If Apple creates new software to open a back door, other federal and state prosecutors?and other governments and agencies?will repeatedly seek orders compelling Apple to use the software to open the back door for tens of thousands of iPhones."

"This enormously intrusive burden?building everything up and tearing it down for each demand by law enforcement?lacks any support in the cases relied on by the government, nor do such cases exist."

"The alternative?keeping and maintaining the compromised operating system and everything related to it?imposes a different but no less significant burden, i.e., forcing Apple to take on the task of unfailingly securing against disclosure or misappropriation the development and testing environments, equipment, codebase, documentation, and any other materials relating to the compromised operating system."

It Cannot Be Destroyed

In an affidavit attached to the court filing (formally called "Apple Inc.s Motion to Vacate Order Compelling Apple Inc. to Assist Agents in Search, and Opposition to Governments Motion to Compel Assistance"), Apples manager of user privacy, Erik Neuenschwander, summed up the governments "use and destroy" idea this way: "The virtual world is not like the physical world. When you destroy something in the physical world, the effort to recreate it is roughly equivalent to the effort required to create it in the first place. When you create something in the virtual world, the process of creating an exact and perfect copy is as easy as a computer key stroke because the underlying code is persistent. Even if the underlying computer code is completely eradicated from Apple?s servers so as to be irretrievable, the person who created the destroyed code would have spent the time and effort to solve the software design, coding and implementation challenges. This process could be replicated. 

Thus, GovtOS would not be truly destroyed."


Available link for download

Read more »

Monday, April 3, 2017

Stop the Obama administration from surrendering authority over the Internet

Stop the Obama administration from surrendering authority over the Internet


The "IANA Transition" took a big step forward this month and we are one step closer to the US government handing control over the DNS and IP numbering to a vaguely-defined group accountable, effectively, to nobody.

What with the weirdest Presidential election in my lifetime going on its easy to imagine important public policy events going unnoticed. One of them is that the Obama administration is moving closer to surrendering the US governments stewardship of the Internets numbering and naming systems.

To put it bluntly, I dont understand why we would do this. The only changes it could bring are bad ones. Once our authority over the parties administering core Internet infrastructure is gone, ultimate political control over it is gone. I think this is a bad thing. The US has done an admirable job of supervising the development of the Internet and theres no evidence that it has ever exerted untoward influence over the processes. I like the idea that the administrative bodies are clearly accountable to some clearly independent body.

We all know now that the Internet began as a US government project. Administration of parts of it was eventually outsourced, first to Network Solutions Inc and then to a non-profit corporation created just for the task: ICANN (the Internet Corporation for Assigned Names and Numbers). ICANN operates autonomously, but under a contract from the US government, specifically from the NTIA (National Telecommunications and Information Administration) in the US Department of Commerce.

In early March Lawrence E. Strickling, Assistant Secretary for Communications and Information and NTIA Administrator, reiterated the Obama administrations commitment to transfer their authority over the IANA, the part of ICANN which controls the numbering system, to "the global multistakeholder community." The community he names, in the form of the IANA Stewardship Transition Coordination Group (ICG), has delivered to the NTIA a formal proposal for the transition. Strickling says that the NTIA will be reviewing the proposal to make sure it meets their requirements, some of which are pure bureaucratic blather and some uncontroversial niceties.

This particular agreement deals only with the numbering system, not naming. Naming, in the form of control of the DNS root zone, is run by Verisign under a separate agreement with the NTIA, in cooperation with ICANN. But the administration has also announced their intention to surrender that authority.

The NTIA is much more directly involved in the DNS administration process (see image below). All changes to the root zone, the root-servers.net zone, and the root hints file must be approved by the NTIA acting as Root Zone Administrator.

The processes shown in the diagram have been significantly modernized in recent years, and public input is always sought when changes are proposed.

The NTIA function as Root Zone Administrator is just an extra check and so Verisigns proposal is simply to remove it. As a test, parallel authentication processes would be run for a time and compared for consistency. If there are none for some agreed period of time , success is declared and the new system goes hot.

This leaves ICANN and Verisign as the authoritative bodies controlling the DNS. A new agreement would be needed between ICANN and Verisign or, theoretically, whatever other body ICANN and the vaunted global multistakeholder community choose to operate as Root Zone Maintainer. No such agreement has yet been revealed.

Who is the "global multistakeholder community" to which the NTIA refers? Its basically the same shifty technocracy that has been running ICANN for a while, the one that makes gobs of money for themselves by creating top-level domains like .christmas and .florist. To replace the NTIA oversight functions they will create new entities, all part of ICANN. In other words, ICANN will police itself. The supervisory bodies will, in theory, have the ability to change operators for the numbering or naming systems, but Im skeptical.

There are potential legal problems with the proposed transition. See section 539(a) of the "Consolidated Appropriations Act, 2016" (i.e. the Federal budget), which forbids funds from being used "to relinquish the responsibility of the National Telecommunications and Information Administration, during fiscal year 2016..."

Then theres Article IV, Section 3 of the US Constitution: "The Congress shall have Power to dispose of and make all needful Rules and Regulations respecting the Territory or other Property belonging to the United States." Is the NTIAs authority over the naming and numbering systems on the Internet "Property belonging to the United States?" To my mind, obviously yes. Its certainly valuable and there are plenty of parties who would pay a lot of money to have it.

But Im not a lawyer. Internet law scholar and retired law professor David Post, blogging at the Volokh Conspiracy, disagrees with me, basically arguing that this authority is not "property" in any relevant sense. Obviously there is more than one way to look at this.

Many of you non-Americans are wondering why the US gets such authority. Easy. We made the Internet. Weve made sure that it could be as free and open as it is. Dont like it? Call your congressman. Its a good thing that the US government and not (oh, for example) the United Nations, has been in charge. The plan is not to put them in charge, but once clear authority is gone, who knows where it will end up.


Available link for download

Read more »

Friday, March 31, 2017

Successfully recover photo files from an unrecognisable Sandisk 16GB Ultra card

Successfully recover photo files from an unrecognisable Sandisk 16GB Ultra card


This is a how-to guide to help you to ecover photo files from Sandisk 16GB Ultra card that cannot be recognised by CF Card reader. So that you can easily access and recover inaccessible Sandisk Card File with easy.  

"I have a Sandisk 16GB Ultra card that occasionally had the camera reporting inability to access the card. The card is similarly unrecognisable on my computer CF card reader. I think the filesystem is toast, but I suspect the photo files are still intact. I would like to find ways where I can inspect the raw binary data in the card and hopefully recover the photos?"

Which is best to recover photos from corrupted Sandisk CF Card?

TestDisk allows direct access to disk data and file recovery from corrupt partition tables. PhotoRec is specifically targeted at recovering photos by identifying byte patterns in images (& video) files. However, TestDisk/PHotoRec would not recognise a corrupt card despite it showing up on "My Computer" as a non-formatted drive.

H-Data Recovery Master did the job.

If you are looking for solution when your SanDisk CF card was formatted or reformatted mistakenly, or the CF card has some problems, cannot read, memory card error on the camera? H-Data Recovery Master is able to recover lost photos from formatted CFcard (over 85% success rate) or from corrupted CF card (over 65% success rate). What makess the CF Card Recovery software fail to recover corrupted card photos: If you have taken many new pictures on the SD card after deletion or formatting (almost fill out the memory cards space in full), or your memory card was damaged badly, or physically broken, the lost photos are usually not recoverable.

View H-Data Recovery Master on Softonic 

How to recover pictures/photos from 16 GB Compact Flash (CF) card



Note: Please do note that any attempt to recover data from a drive does require knowledge of the process and further damage can occur, so if you are unsure of what you are doing then do not write any further data to the SD Card and consult someone for help.

Step 1: Connet formatted CF card to Computer

Connect the compact falsh card to your computer via the card reader or via the USB drive.

Step2: Run H-Data Android Data recovery program on windows OS (Windows 8.1/8/7/Vista/XP...)



Step 3: Scan deleted files or lost data on Galaxy S6 microSD card

Select the "USB disk/Card recovery" then press "Next" to start scanning for recoverable photos, videos, and music files.

Step4: Preview and recover files stored on Galaxy SD card

After the program finish scanning all files, you can preview the files you wanted. Then mark the files you need. Click the ?Recover? button to recover deleted data on htc one.



Vist more posts:

What Is The Best Useful Compact Flash Card (CF Card) Photo Recovery
How to recover lost photos quickly from a formatted SD card
Recovery accidentally lost 3 weeks of pictures from digital camera SD card
Free H-Data Android SD Card Recovery- Detect & Recover 350+ file formats
Access and recover lost photos from SD Card with not formatted error

Available link for download

Read more »

Wednesday, February 22, 2017

Will I get my deleted songs and videos back from my iPod

Will I get my deleted songs and videos back from my iPod



Are you a music lover? Are you fond of listening to music? Do you use iPod for listening music everywhere, say home to college, back to home from college, and so on? IPod is a great companion for music lovers. They can enjoy music wherever they want, however, deletion of songs and videos from iPod can end up their joy. For example, you accide

How do you recover the lost data now? Do you know any method to get the lost data back? Yeah, restoring backup is the best way but what if you do not have backup and you even do not know any other method to recover the lost data. Do not worry! One of the solutions that can help doing iPod music recovery is Kernel for iPod Data Recovery.

The software automatically recovers all data from the iPod that you have accidentally deleted. The software has the capability to help recovering deleted data. You just need to execute the following steps:
ntally deleted all music files stored in the iPod. Now, you do not have backup of those music files and collecting them again is a tedious and time-consuming task for you.
  1. Download the iPod music recovery software.
  2. Install the software.
  3. Attach iPod to the computer USB port.
  4. Launch the software. Kernel for iPod data recovery software appears, as shown below:
  5. Click the Standard Scan button.
  6. The software automatically detects the iPod and starts scanning it. Once the scanning process is done, the iPod music recovery software displays all recovered music files and videos. The software lists the recovered data in the left panel.
  7. Select any of the recovered files to check if it is working. The software displays the file preview, as shown below:
You can listen to the file by switching on the speakers or headphone attached to the computer. Once you have made sure that the data is recovered with good quality, select the music files that you want to save. You can, however, save all recovered data.

Kernel for iPod Music Recovery software can be installed on Windows 7, Windows Vista, Windows XP, Windows 2003, and Windows 2000 operating systems. For more information about tool, features and GUI, visit : http://www.softwaredatarecovery.net/ipodrecovery.html

Available link for download

Read more »

Tuesday, January 31, 2017

System Image Recovery From OEM Partition

System Image Recovery From OEM Partition


Gigabyte Xpress Recovery2

Gigabyte Xpress Recovery2 supported motherboard provide system image recovery from OEM Partition for desktop computer with just pressing F9 while booting, when your computer face any problem. Xpress Recovery2 back up data on hard disks on SATA and PATA IDE controllers.

System Requirements:
  • Intel x86 platforms.
  • At least 64M bytes of system memory.
  • VESA-supported VGA cards.

Note:

1. Everything from your hard disk will be deleted. So backup your important file and data before proceeding.
2. Xpress Recovery2 will backup system image file at the end of the hard disk, so you must have enough (At least 4 GB recommended. But in actual you must have free unallocated space depending on the size of the data to be backed up) unallocated hard drive partition space in advance.
3. If you have not enough hard disk unallocated space then delete and make free unallocated space for data backup. As Xpress Recovery2 will backup image at the end of the Hard Disk so the last partition must be unallocated and must have enough space(As shown in the picture below) otherwise you will be given an error message like "Not enough Hard Disk space".
Gigabyte Unaalocated Space
4. As you can see in the above picture, Ive deleted all the partition. And made only one Partition to install Windows (System Reserve partition has been created automatically) and left the remaining partition unallocated. After the completion of data backup you can create other partition with remaining unallocated partition.
5. To install Xpress Recovery2  with clean Windows installation, boot from your Windows Installation disc. Go to window installation page. Delete all hard drive partitions. Just create one partition(Drive C:) and install window in the very partition and left the remaining partition unallocated for data backup(as Ive already mentioned in Step 3)


Steps:

1. Go to BIOS setting and make you CD/DVD ROM as your first device.Save setting and exit.
2. Insert your motherboard driver CD and restart your computer. After restart a message will be displayed.. "Boot from CD/DVD:"... "Press any key to boot from CD..." Press any key to enter Xpress Recovery2 setup
3. Xpress Recovery2 takes a few second to load.
Xpress Recovery2

4. Now Xpress Recovery2 setup page will start.
5. Select backup(with keyboard) and press enter.
Xpress Recovery2

6. Data backup will start. And it may takes a long time depending upon the size of your data to be backed up.
Xpress Recovery2

7. After completion restart. Data backup with Xpress Recovery2 has been done.

Additional Info:

1. The driver CD is just required for the first time only to install Xpress Recovery2. Thereafter user can access Xpress Recovery2 just by pressing F9 while booting.
2. Install Xpress Recovery2 immediately after installing OS, all required drivers and softwares.
3. Data restoration will replace everything of Drive C: with the backed up System Image.

Some Errors:

1. Not enough Hard Drive space- That means youve not sufficient space to backup in the last unallocated drive in your hard disk.
Xpress Recovery2

2. All primary partition is in use or IDE Drive not detected- That means youve no unallocated space at the end of your hard disk.
For other limitation and requirement go to Gigabyte Official Xpress Recovery2 page.

Available link for download

Read more »

Wednesday, January 25, 2017

UNetbootin to create a Linux USB from Linux

UNetbootin to create a Linux USB from Linux


How to Install and Use UNetbootin from Linux: UNetbootin is a Live USB creation tool that can be used to create a Live Linux USB flash drive. One nice feature of UNetbootin is that the tool is offered for Windows and Linux. In the following, I will cover how to quickly get UNetbootin up and running within an Ubuntu Linux Operating Environment.
UNetbootin was created by Geza Kovacs, released under GNU GPL v2.
Official UNetbootin Homepage:  http://unetbootin.sourceforge.net
How to Install and Run UNetbootin under Ubuntu Linux
  1. Open a terminal (applications > accessories > terminal)
  2. Type wget unetbootin.sourceforge.net/unetbootin-linux-latest
  3. Type chmod +x ./unetbootin-linux-*
  4. Type sudo apt-get install p7zip-full
  5. Type sudo ./unetbootin-linux-*
  6. Alternately, you can double click the unetbootin-linux-* file to run it, since it was marked executable in step 3.
How to Use UNetbootin under Ubuntu Linux
Insert your USB flash drive and Start UNetbootin (See step 5 above)
Option One ? Distribution: Let UNetbootin fetch the Select Linux Distribution files from the internet to put on your USB.
(1) Select a Linux Distribution (2) Select a  specific Version (3) Make sure the correct USB Drive is detected and Click OK Using UNetbootin - Fetch the files from the Net
Or you can use Option Two?
Option Two ? Diskimage: Browse to an ISO and have UNetbootin copy its contents to your USB.
(1) Browse to the ISO Image you would like UNetbootin to put on USB (2) Make sure the correct USB Drive is detected and Click OK UNetbootin DiskImage ISO Option
Once the UNetbootin installer has completed, click Reboot Now 
Set your system BIOS or boot menu to boot from the USB device and enjoy your favorite Live Linux on USB

Available link for download

Read more »

Monday, January 16, 2017

Unpredictable cases that may lead to photo loss and how to recover deleted photos from Samsung Mobile Phone

Unpredictable cases that may lead to photo loss and how to recover deleted photos from Samsung Mobile Phone



You may delete a picture of memory value from your Phone SD card for many unpredictable cases that may lead to photo loss. Want to get back deleted photos, pictures from Samsung Galaxy Mobile Phone? Here we go!

Unpredictable cases that may lead to photo loss from Samsung mobile phones, such as:

Accidental Deletion: Delete important pictures instead of some not so insignificant ones by accident.
Unintentional Formatting: Reset Samsung phone and formatted the memory card without backing up those data.
Memory Card Corruption: Samsung external memory card is corrupted and all the data inside become inaccessible.
Virus Attack: Virus infected the Samsung mass memory and turned all files into shortcuts.

How to recover deleted photos pictures from Samsung Mobile Phone

Have you ever suffered experience with Samsung data loss and want to get back those lost photos and videos? Don?t panic. Samsung saved all photos taken on its memory card. When photos are deleted from Samsung Android phone  by mistake, the data are not permanently gone. With a good data recovery tool, you can get them back in just a few clicks of mouse. Here H-Data Photo Recovery for Windows is recommended. It is a powerful as well as easy-to-use tool to recover deleted photos from Samsung mobile phones, such as Samsung Galaxy S6, Samsung Galaxy S5, Galaxy S4, Samsung Galaxy S3, Samsung Galaxy S2, Samsung Galaxy S, Samsung Galaxy Note III, Samsung Galaxy Note II, Samsung Galaxy Note, Samsung Galaxy S3 Mini, Samsung Galaxy S2 Plus, Samsung Galaxy Ace, Samsung Galaxy Y.

Simple Steps to Restore Pictures from Samsung Mobile Phones

Download photo recovery for Samsung, the software is available for Windows, but not Mac or mobile platforms.
Windows 2000/2003/XP/Vista/2008/Windows 7/Windows 8/Windows 8.1 supportted

Free Download file of photo recovery demo from softonic



Click here to get Pro Version H-Data Recovery Master


Step1. Connect android phone to computer. Then in Computer, check whether the smart phone shows as a drive letter (e.g. drive E: ).

Step 2. Run Galaxy phone recovery,  select the "USB disk/Card recovery" then press "Next" to start scanning for recoverable photos, videos, and music files.


Step 3. You will see a list of recoverable files when scanning complete. Select those files you want to recover and press "Recover" button to save recovered files on computer.


View more post about free Samsung Galaxy Data Recovery

How to Recover Deleted Photo, Video from Samsung Galaxy S6/S5/S4/S3
Best Recovery App 2015 To Recover Deleted Files On Android SD Card
Get Free H-Data Card Recovery  V4.6.00.000154 Full Version Crack
H-Data Deleted File Recovery Full Version Free Download
Whtas New with H-Data Recovery Wizard V4.6.00.000154 for recovering 500+ file formats
Free H-Data Android SD Card Recovery- Detect & Recover 350+ file formats

Available link for download

Read more »

Tuesday, December 20, 2016

This 1 28 Million New Watch Is Made From Transparent Sapphire

This 1 28 Million New Watch Is Made From Transparent Sapphire


The Double Tourbillon 30ø Technique in an all-sapphire case.
The Double Tourbillon 30ø Technique in an all-sapphire case. 

Transparency isnt just a buzzword in politics: For a few years now, it?s been a genuine trend in the world of luxury watches. For example, earlier this year, Hublot introduced its Big Bang Unico Sapphire timepiece cut straight from the sapphire?the first time the material had ever been cut on this scale.

And now from Greubel Forsey, maker of what are some of the most supercomplicated timepieces in the world, comes the Double Tourbillon 30ø Technique. Its a watch the companys made for a while, but now its offered in, you guessed it, an all-sapphire case. Greubel Forsey calls it the ?pinnacle of transparency,? and it?s easy to see why. No metal is used at all in the creation of the dial and case (save for the winding pin), allowing for a panoptic view of as much of the movement architecture?and its dynamic interactions?as possible.

Cut from a single large sapphire crystal, including the rounded, multi-angular case horns, the entire movement is flooded with light within its 38.4mm case, allowing a view into its multi-tiered design from all angles. This is a more complicated watch than the Hublot, and uses sapphire in more places, including the crown. 

The reverse of the Double Tourbillon 30ø Technique in all-sapphire.
The reverse of the Double Tourbillon 30ø Technique in all-sapphire.

Its actual 396-part movement may not be new?the patented tourbillon movement was first unveiled in platinum?but now its prowess is on full display. The hand-wound caliber, with 120-hour power reserve, packs two tourbillon escapements, one inside the other. Two tourbillons that rotate at different speeds are showcased here: An outer tourbillon rotates every four minutes while an inner tourbillon, every 60 seconds. All of this has helped the movement achieve a never-before-seen 915 out of a possible 1,000 points at the International Chronometry Competition.

Exclusive to the U.S. market in an edition of eight pieces to be individually created by hand over the course of the next three years, the watch is priced at $1.275 million.

The Double Tourbillon 30ø Technique in sapphire, from the side.
The Double Tourbillon 30ø Technique in sapphire, from the side

Available link for download

Read more »

Monday, December 12, 2016

TabletSMS Android Application to Send SMS and MMS from Tablet

TabletSMS Android Application to Send SMS and MMS from Tablet



TabletSMS

For Android tablet users, new application called TabletSMS this could be your best choice to make it easier to send messages. TabletSMS lets you can use to send SMS Android tablet using your mobile number.

TabletSMS is an extension of the application DeskSMS. To be able to use it, you need to install DeskSMS on your phone and install TabletSMS in tablets. That way you are then you receive an SMS message on your phone will be directly accessible in the Android tablet.

If you have not used DeskSMS, this is an Android app that allows you to send and receive messages from Gmail, Google Talk or Chrome extension. Now with TabletSMS, you can bring all the features DeskSMS to your Android tablet. That way you do not need to connect the mobile phone and tablet via Bluetooth just to access a variety of e-mail messages as well.

You can download. DeskSMS and TabletSMS free on Play Store (service $ 5 / year) and enjoy easy access to a variety of text messages directly on your Android tablet

Available link for download

Read more »

Saturday, November 26, 2016

Tips iOS how to prevent iphone from heating up

Tips iOS how to prevent iphone from heating up



Each new version of the platform that was released could certainly still have bugs and imperfections here and there, it should be recognized. Looking at the history of releases earlier iOS versions, has always given a minor upgrade to remove various bugs so you can predict Apple will give you a similar minor update iOS 7 after the final version was released.

Problems on WiFi, wasteful batteries, bugs in the App Store as well as the latest and easy Passbook lockscreen cracked, never went to iOS 6. You certainly do not expect similar problems will arise in iOS 7 but from the reports of the developers who have been using iOS beta 7, their iPhone quickly overheating.

Heat source coming from the components inside the iPhone is not going to cause any permanent damage but it certainly would feel uncomfortable if you hold the iPhone in hot conditions.

To overcome the problem of overheating in the iPhone, you can unlock iOS setting 7 to make some changes: Privacy> Location Services> System Services.

From there you please change some of the options below to the OFF position:
- Diagnostics & Usage (function for reporting errors and problems to Apple).
- Location-based iAds (display ads based on your location).
- Cool Near Me (featuring popular events from friends on Facebook and Twitter via the notification).
- Wi-Fi Networking (look for the location where you are located via Wi-Fi hotspots when you are outside the reach of services).


In addition to the above options, you also need to know that GPS is a source of heat faster iPhone. For that you need to turn off all GPS-based services if you do not really need it. Applications such as Camera, Passbook, Safari, Shazam and Twitter always detect your position via GPS, for that you can change all the apps to the OFF position when not required.


To see if the location services are used or not, you can change the status bar icon to the ON position, located at the bottom of the System Setvices. In this way the purple location services icon will appear in the status bar at the top of the screen.


Another way to prevent overheating iPhone:
1. Replace car adapter.
2. Remove and set up your iPhone as a new device (no restore).
3. Do not attach the case when charging.
4. Charge your iPhone before traveling to the hot temperature
5. Turn off all unused services (Bluetooth, push notifications, etc..).
6. Position the screen brightness as low as possible
7. Turn off the turn-by-turn directions.

Tips to prevent overheating in the general can be used in all versions of iOS, including iOS 7. Good luck and hopefully you can avoid the iPhone overheating

Available link for download

Read more »

Tuesday, November 8, 2016

The Incredible Story Of How Hackers Stole 100 Million From The New York Fed

The Incredible Story Of How Hackers Stole 100 Million From The New York Fed


The story of the theft of $100 million from the Bangladesh central bank - by way of the New York Federal Reserve - is getting more fascinating by the day.

As we reported previously, on February 5, Bill Dudleys New York Fed was allegedly ?penetrated? when ?hackers? (of supposed Chinese origin) stole $100 million from accounts belonging to the Bangladesh central bank. The money was then channeled to the Philippines where it was sold on the black market and funneled to ?local casinos? (to quote AFP). After the casino laundering, it was sent back to the same black market FX broker who promptly moved it to ?overseas accounts within days.?

That was the fund flow in a nutshell.

As we explained, the whole situation was quite embarrassing for the NY Fed, because what happened is that someone in the Philippines requested $100 million through SWIFT from Bangladeshs FX reserves, and the Fed complied, without any alarm bells going off at the NY Feds middle or back office.

"Some 250 central banks, governments, and other institutions have foreign accounts at the New York Fed, which is near the centre of the global financial system," Reuters notes. "The accounts hold mostly U.S. Treasuries and agency debt, and requests for funds arrive and are authenticated by a so-called SWIFT network that connects banks."

Well, as it turns out, Bangladesh doesnt agree that the Fed isnt ultimately culpable. "We kept money with the Federal Reserve Bank and irregularities must be with the people who handle the funds there," Finance Minister Abul Maal Abdul Muhith said on Wednesday. ?It can?t be that they don?t have any responsibility," he said, incredulous.

Actually, Muhith, the New York Fed under former Goldmanite Bill Dudley taking zero responsibility for enabling domestic and global crime is precisely what it excels at.

But what really happened?

As it turns out there is much more to the story, and as Bloomberg reports today now that this incredible story is finally making the mainstream, there is everything from casinos, to money laundering and ultimately a scheme to steal $1 billion from the Bangladeshi central bank.  In fact, the story is shaping up to be "one of the biggest documented cases of potential money laundering in the Philippines. It risks setting back the Southeast Asian nation?s efforts to stamp out the use of the country to clean cash, and tarnishing the legacy of President Benigno Aquino as elections loom in May."

And yes, it does appear that hackers managed to bypass the Feds firewall:

?Even as banks continue to harden their defenses against such sabotage, hackers too have upped their game to breach servers by utilizing both technical skills and rogue elements within the financial institutions,? said Sameer Patil, an associate fellow at Gateway House in Mumbai who specializes in terrorism and national security.

* * *

The story begins in Bangladesh, a country of about 170 million people that?s recently found itself with record foreign reserves thanks to a low wage-fueled export boom and inward remittances. Some of those reserves were held in an account at the Federal Reserve Bank of New York.

Finance Minister Abul Maal Abdul Muhith this week accused the Fed of ?irregularities? that led to the unauthorized transfer of $100 million from the account. The Bangladesh central bank said the funds had been stolen by hackers and that some had been traced to the Philippines.

As reported previously, a Bangladesh central bank official who is part of a panel investigating the disappearance of the funds said Wednesday that a separate transfer of $870 million had been blocked by the Fed, something the Fed refused to comment on. It does not, however, explain why $100 million was released.

Essentially the dispute is about whether the Fed went through the right procedure when it received transfer orders.

Naturally, the Feds story is that it did nothing wrong. Bloomberg writes that according to a Fed spokeswoman, instructions to make the payments from the central bank?s account followed protocol and were authenticated by the SWIFT codes system. There were no signs the Fed?s systems were hacked, she said.

The problem is that the counterparty on the other side of the SWIFT order was not who the Fed thought, and what should have set off red lights is that the recipients was not the government of the Philippines but three casinos!

On the other hand, Bangladesh is quite - understandably - furious: a local official said the Fed should?ve checked the payment orders with the central bank to ensure they were authentic, even if they used the correct SWIFT codes. The official also said there are plans to take legal action against the Fed to retrieve missing funds.

Aquino spokesman Sonny Coloma said he had no information on reports that funds from the Bangladesh central bank reached the Philippines. The case is being handled by the AMLC, an independent body, Coloma said. Bangko Sentral ng Pilipinas Governor Amando Tetangco, who heads the AMLC, did not reply to mobile-phone messages seeking comment.

If at this point flashing light bulbs are going off above the heads of some of our more industrious readers, we can understand why: after all if a fake SWIFT money order is all it takes to have the Fed send you $100 million dollars then...

Separately, a Reuters report digs into the details of the SWIFT wire requests: it notes that the hackers breached Bangladesh Banks systems and stole its credentials for payment transfers, two senior officials at the bank said. They then bombarded the Federal Reserve Bank of New York with nearly three dozen requests to move money from the Bangladesh Banks account there to entities in the Philippines and Sri Lanka, entities which as will be revealed shortly were... casinos.

Four requests to transfer a total of about $81 million to the Philippines went through, but a fifth, for $20 million, to a Sri Lankan non-profit organization was held up because the hackers misspelled the name of the NGO, Shalika Foundation.

Hackers misspelled "foundation" in the NGOs name as "fandation", prompting a routing bank, Deutsche Bank, to seek clarification from the Bangladesh central bank, which stopped the transaction, one of the officials said.

There is no NGO under the name of Shalika Foundation in the list of registered Sri Lankan non-profits. Reuters could not immediately find contact information for the organization.

Luckily, the Fed stopped some of the $1 billion in total requested funds. The unusually high number of payment instructions and the transfer requests to private entities - as opposed to other banks - raised suspicions at the Fed, which also alerted the Bangladeshis, the officials said. The details of how the hacking came to light and was stopped before it did more damage have not been previously reported. Bangladesh Bank has billions of dollars in a current account with the Fed, which it uses for international settlements.

The transactions that were stopped totaled $850-$870 million, one of the officials said. At least$80 million made it through without a glitch.

* * *

Meanwhile, back in the Philippines, the gaming regulator said it is investigating reports that as much as $100 million in suspicious funds were remitted to the bank accounts of three casinos it didn?t identify.

The Philippine Daily Inquirer has led reporting on the theft. It wrote last month that cash may have entered the Philippines via the Jupiter Street, Makati City, branch of Rizal Commercial Banking Corp. The money was converted into pesos and deposited in the account of an unidentified Chinese-Filipino businessman who runs a business flying high net worth gamblers to the Philippines.

The funds were used to buy casino chips or pay for losses at venues including Bloomberry Resorts Corp.?s Solaire Resort & Casino and Melco Crown Philippines Resort Corp.?s City of Dreams Manila, according to the paper. There was no suggestion in the report the banks or casinos named were complicit with any improper movement of funds.

In other words, the Fed was funding gamblers, only these were located in Philippine casinos, not in the financial district. Ironically, thats precisely what the Fed does, only it normally operates with gamblers operating out of Manhattans financial district.

Bloomberry Resorts investor relations director Leo Venezuela and City of Dreams Manila Vice President Charisse Chuidian didn?t reply to calls and phone messages.

And then, once the "gamblers" were done having their fun laundering freshly received Fed money, they moved the cash offshore: funds were later dispatched into accounts outside the Philippines, the paper said, including to Hong Kong. The Hong Kong Monetary Authority declined to comment, as did the Hong Kong police. The Inquirer separately reported the head of the Rizal branch where the transactions occurred had made a statement that top bank officials were aware of the transactions ?at every stage."

Were the banks in on this unprecedented theft? Probably, although it will be nearly impossible to prove.

Rizal?s shareholders ?are fully committed to comply with all banking laws and regulations, in particular those on money laundering,? Vice Chairman Cesar E.A. Virata said in a statement Wednesday. In a separate statement, the bank?s Chief Executive Officer Lorenzo Tan condemned ?any insinuations that the top management of the bank knew of and tolerated alleged money laundering activities in one branch.?

* * *

The exact amount stolen from Bangladesh is still not exactly clear, as is what happens next in the dispute with the Fed.

While Muhith said the Fed was responsible for at least $100 million, another Bangladeshi central bank official who asked not to be identified said $20 million of a $101 million total had been recovered from an account held in Sri Lanka, leaving $81 million unaccounted for. That figure matches the amount Rizal?s Virata said the bank was investigating.

What we would like to know, is whether this is merely the Feds way of testing its level of preparedness for the moment it has to wire helicopter money around the globe, in lieu of using drone delivery of cash, especially if cash has been banned previously as so many "famous economists" demand, clearly unaware that cash has to be present when in the last ditch step to boost inflation, the Fed has no choice but to hand out physical money to every willing recipient.

For a few lucky recipients in the Philippines, it already worked out.

Available link for download

Read more »