Join 2000+ Readers

Use URL Uncover to check if a shortened links is sacure

Use URL Uncover to check if a shortened links is sacure



There is no shortage of Web services to help you verify that a shortened link is legit and not something that's going to load you up with malware or steal personal information. But when it comes to online privacy, it's always good to have options. Instead of adding a "+" to the end of a bit.ly link, or using Unshorten.it, give URL Uncover a look the next time you get suspicious.

Now Boootube brings the worst YouTube videos

Now Boootube brings the worst YouTube videos



Boootube is a roundup of the worst videos posted to YouTube, ranked by the number of down votes each one has received. But, the best part is, these videos aren't just horrible, they're also extremely entertaining.

Automatically pause one audio stream in Firefox when another begins [2013]

Automatically pause one audio stream in Firefox when another begins [2013]



when it is playing a song when I try to watch a YouTube clip. With the Be Quiet add-on for Firefox, you can prevent two audio streams from bombarding you simultaneously.
How to install Android apps on your BB10 Mobile

How to install Android apps on your BB10 Mobile

How to install Android apps on your BB10 Mobile


No matter how slick the new hardware is or how hard BlackBerry strives to convince us that its new BB10 handsets are the cat's meow, there's still one massive stumbling block quality apps. Apparently even the BlackBerry faithful agree and intrepid tweakers have stepped in to fix the situation themselves.Read on to learn how you can quickly take advantage of free BlackBerry 10 apps that others have kindly ported from Android. Best of all, the entire process takes minutes and loading apps to your Z10 or Q10 just a matter of seconds.
How to Change privacy settings for shared posts in Facebook for Android

How to Change privacy settings for shared posts in Facebook for Android

How to Change privacy settings for shared posts in Facebook for Android


When sharing a post from the previous version of Facebook for Android, you may have forgotten to tap the itsy-bitsy people-sharing icon before you sent it off to the Interwebs. This icon controls the settings for who can see your post, be it Public, Friends, or other groups you're part of on Facebook. Fortunately, this icon hasn't gone anywhere, but in case you forget to use it, there's a fix -- and it doesn't involve logging in on the desktop Web site.

Smart Driver Updater 3.3.1.2 + regfile by RaBBiT. Genial78

Smart Driver Updater 3.3.1.2 + regfile by RaBBiT. Genial78

79

Description:

Get the most out of your computer, printer, speakers and other devices by updating your drivers. Smart Driver Updater quickly scans your PC and external devices to provide you with the best new drivers available for your system.

DvdFab 9.0.4.5 Incl Patch.XenoCoder

DvdFab 9.0.4.5 Incl Patch.XenoCoder



Here come a P2P with patch version of this well known DVD/BD tool – DVDFab. Changelogs available here.

Description: 
DVDFab is the most powerful and flexible DVD copying/burning software. You can back up any DVD to DVDR in just a few clicks. DVDFab is brand new, is completely rewritten, is based on more than 8 years of DVD copy software development. DVDFab is simply the easiest way to copy a DVD movie. Just insert the movie and a blank DVD then press Start. Your entire movie – including menus, trailers and special features – is copied to a single DVD with just one click, and everything happens automatically. Backup your entire DVD – including menus, trailers, and special features – onto one or multiple discs.

For Download Links Look @ Below

Microsoft Windows Embedded Compact 2013 ISO.TBE

Microsoft Windows Embedded Compact 2013 ISO.TBE


TBE has released “Microsoft Windows Embedded Compact”. Application Builder for Windows Embedded Compact 2013 provides the tools you need to develop apps that target Windows Embedded Compact 2013.
Description: It is a family of operating systems from Microsoft designed for use in embedded systems. Microsoft makes available four different categories of operating systems for embedded devices targeting a wide market, ranging from small-footprint, real-time devices to point of sale (POS) devices like kiosks. Windows Embedded operating systems are available to OEM system builders, who make it available to end users preloaded with the hardware.



  1. Release Name: Microsoft.Windows.Embedded.Compact.2013.ISO-TBE
  2. Size: 2.00 GB
  3. Links: Homepage  NFO 

DOWNLOAD LINKS 
(Must Comment Before Download) 



 Dont Forget To Like Our FB Page

ImTOO Audio Converter Pro v6.5.0.20130313.LAXiTY

ImTOO Audio Converter Pro v6.5.0.20130313.LAXiTY



LAXiTY has released the latest version of ImTOO Audio Converter Pro. This application can open more than 50 different audio and video file types, including MP3, AC3 or MPEG. In fact, you will find it really difficult to find an audio or video codec that this tool cannot handle.


Description: Assembling the functionalities of audio converting, audio extracting, CD ripping and CD burning in one tool, ImTOO Audio Converter Pro provides the most comprehensive solutions for music fans to transform between different audio formats, extract audio from popular HD and general video formats, rip CDs to music files and burn music CD from audio/video files.


Allowing you to add and adjust audio effects (fade-in, fade-out, volume normalize, bandpass, chorus, flanger, echo, speed), this professional audio converter software helps you get music files with the special effects to your taste.


Features:

  • Audio Converter
  • Video to Audio Converter
  • CD Ripper
  • CD Burner


Release Name: ImTOO.Audio.Converter.Pro.v6.5.0.20130313-LAXiTY
Size: 31.74 MB
Links: Homepage: NFO 

DOWNLOAD LINKS 

(Must Comment Before Download) 





Xilisoft iPhone Magic Platinum v5.­4.­10.­20130509.­LAXiTY

Xilisoft iPhone Magic Platinum v5.­4.­10.­20130509.­LAXiTY


LAXiTY has released the updated version of “Xilisoft iPhone Magic Platinum”. A complete suite for the management of your iPhone, fast an easy, also with high quality.
Description: Featured as all-in-one iPhone manager, Xilisoft iPhone Magic integrates iPhone converter, transfer, ringtone maker and contacts manager. It enables you to backup all multimedia files in iPhone to computer or iTunes, move files from computer to iPhone, convert home DVD or other video and audio files to iPhone format, download online videos to iPhone, make personalized iPhone ringtones, and restore/backup iPhone contacts. Now importing contacts exported from Incredimail is possible.
Delete Foursquare check-ins using the Android, iOS app

Delete Foursquare check-ins using the Android, iOS app


Delete Foursquare check-ins using the Android, iOS app


After a rough night out on the town, looking at your Foursquare history is a good way to figure out where you were (assuming you were coherent enough to use your phone). Sometimes you may not like what you see and want to delete any trace of where you were as fast as possible.
Or you could have innocently checked into the wrong venue and need to delete the error from your history.
Well, you can delete any check-ins directly from your Android or iOS device. I'm not sure when the feature was added to either app, but previously deleting a check-in was only possible via the Web site.

Android


Deleting a check-in in the Android app is very simple and the option is in plain sight. Launch the Foursquare app, visit your last check-in or your check-in history (under the Profile & History section) and view the details page. In the bottom-right corner you'll see the Delete button. Confirm your intention and the check-in will vanish.

iOS


Using the iPhone, you'll need to view your check-in from the home screen or check-in history (under the Profile & History section). When viewing the detail screen for a particular check-in, tap on the share button at the bottom next to the text field. You'll be presented with the various options to share through, but you'll also find a red button to delete the check-in at the bottom of the list.
This isn't the most amazing feature in the world, but one that's sure to come in handy from time to time. I know I have had to navigate the Web site using mobile Safari more than once to delete an accidental 
check-in.
How to troubleshoot software-update problems

How to troubleshoot software-update problems


How to troubleshoot software-update problems

Computer malware authors exploit weaknesses in software. Developers combat computer crooks by patching their programs to block malware attacks. That's why we're encouraged to keep our software up-to-date. Every now and then, a software update fails, leaving our systems a little less secure.
I got a first-hand look at the problem the other day when the Apple Software Update program balked at installing iTunes version 11.0.3 on my Windows 7 PC. The installer reported "insufficient privileges" and suggested I log on as an administrator or contact my system administrator. Of course, I was logged on as an administrator, and like most Windows users, I have no system administrator to contact.
Fortunately, the solution to this update glitch was relatively easy to find: I repaired the Apple Software Update program in Win7's Programs and Features app, restarted my PC, and tried the update again, this time successfully.other software-update failures aren't as simple to diagnose and cure.

An easy solution to an iTunes update failure

It took only a few minutes of searching on the iTunes "insufficient privilege" error message to find a forum post recommending a repair of the Apple Software Update applet to allow the installation of iTunes 11.0.3 to proceed. To do so, press the Windows key, type Programs and Features, and press Enter. Select Apple Software Update and click the Repair button.


Note that in a post on the Apple Support Communities in March 2012, K Gazow described a fix for a failed iTunes update that involves changing Windows User Account Control settings.
It turns out "insufficient privilege" and other access-denied errors are associated with just about every piece of software ever distributed, including Office, Firefox, and Windows 8.

Change the folder's properties to accept the update

A common suggestion when an insufficient-privilege problem is reported in a forum is to make sure you're running as an administrator. The most common response to this suggestion is a form of "Duh!"
Several people recommend changing the attributes of the folder the update is being saved to so that "everyone" has access to the folder. For example, on the Skype Community site, a contributor named Tamim explains how to change the properties of the Skype folder in C:Program Files to enable the program to be reinstalled (the precise location of a program's folder depends on your version of Windows).
Tamim provides a link to a Fix-it wizard on the Microsoft Support site that offers to repair the problem associated with the "Error 1606" message. Two other Microsoft error numbers that involve insufficient privileges are 1303 and 1321.
Rex Zhang, a moderator on the Microsoft TechNet Office Forum, suggests that if Error 1303 occurs when installing Office Professional Plus 2010, ensure the SYSTEM group and the Everyone group of the destination folder have Full Control privileges.
Similarly, Raju S. Das, who moderates Microsoft's Office 2010 Forum, replied to a person who encountered an Error 1321 when attempting to install Office 2010 by recommending they change the permissions of a specific file in the installer's destination folder.
The Microsoft Support site provides tips for troubleshooting installation glitches when using Windows Update, Microsoft Update, or Windows Server Update. Windows Phone 7 users experiencing update woes may find a solution on the Microsoft Support page with article ID 2484484.
The Xbox support site offers troubleshooting tips for various Xbox 360 system update error codes.

Other resources for software update/installation solutions

On several occasions I have had to uninstall the Firefox browser to update the program to its most-recent version. It hasn't happened recently, but if the problem recurs I'll go to the Mozilla Support page that explains how to fix the Update Failed error message when updating Firefox.

Should you encounter difficulties when attempting to update the Thunderbird e-mail program, visit the Mozilla Thunderbird Support page that describes five different potential solutions. The site also explains how Thunderbird's automatic updates work and how to manually update the program.
When a Mac OS X software update fails, check the X Lab's Installing Software Updates FAQ for a possible remedy. The Google Chrome support site provides advice for people unable to update the Chrome browser on a Mac.
The solution to my system's inability to install the new version of iTunes may not cure your iTunes-update hiccup. Apple's support site explains iTunes update and restore error messages and advanced troubleshooting, as well as how to resolve iOS update and restore alert messages.


How to send money via Gmail

How to send money via Gmail


How to send money via Gmail


For years PayPal has cornered the market on sending money to friends, family members, and businesses. Last week during the chaos of Google I/O announcements, Google took a first step toward giving PayPal a run for its money by making it possible to send money via Gmail. The feature is set to roll out to all users over the coming weeks, but if you know someone who currently has it, that person can send you money and after you've claimed the funds the new feature will be enabled on your account as well.The service, which makes use of your Google Wallet account, lets you quickly send money to anyone with a U.S.-based e-mail address.

Secure your account

Since Google Wallet requires you to attach a bank account and other payment methods to your Google account, you're going to want to take the appropriate steps to keep your information secure. The last thing you want is someone accessing your e-mail account, but when that same account also holds your bank account information, you want to be doubly sure it's protected.
In order to protect your account, be sure to enable two-step authentication. After enabling this extra layer of security, you'll be required to enter your password as well as a six-digit code before you can access your account. The code can be sent to your smartphone via a text message, or you can view it using the Google Authenticator app. For complete instructions on setting up Google's two-step authentication, be sure to read CNET contributor Matt Elliot's tutorial.

Set up your Google Wallet


Once you've secured your account, you'll need to add payment information to your Google Wallet account. If you add a credit or debit card you'll be able to send money, and if you add a bank account you'll be able to transfer any received money from your Google Wallet account into your bank account. To add a form of payment visit Google.com/Wallet and log in to your Google account.
The first thing you'll see is the transaction history for your Wallet account. If you've purchased anything with Google Wallet, be it Android apps (both free and paid are listed) or devices from the Play Store or items from a third-party vendor that uses Wallet, you'll see it listed here. Add a bank account or credit card by clicking on the Payment Methods option on the right-hand side, and then click on "Add Credit or Debit Card" at the top of the page. Follow the prompts to verify your account and have the card added to your account.

Send and receive money

Now that you have a payment method added, you're ready to send and receive money, assuming your account has access.To claim funds, you'll need to verify that you are you. You'll be asked a few questions such as your current address and the last four digits of your Social Security number.
Once you've claimed the funds, the money can take 24 hours to be made available in your Wallet account. From there you can either spend it through Wallet, or have it deposited in your connected bank account.


To send money once you have access to the feature, log in to your Gmail account and compose a new e-mail. Along the bottom you'll see a plus symbol that reveals various services one of which is the option to send money, indicated by a dollar sign. Clicking on the symbol will start the process of attaching money to your e-mail. Enter the amount of money you'd like to send, and which account you'd like to fund the transaction from. Enter the recipient's e-mail address, and a subject and body as you see fit, and hit send. The e-mail will then be sent to the recipient, with money attached, and they'll have to go through the same claim process outlined above.

This is a convenient way of sending money, and with no fees for using your Google Wallet balance or when transferring from a linked bank account. Also, right now there's no fee for using a debit or credit card while the service is initially rolled out, though after the introductory period, the fee will go up to 30 cents per transaction.

How to enable Twitter's two-factor authentication

How to enable Twitter's two-factor authentication


How to enable Twitter's two-factor authentication


Going a week without a major brand having its Twitter account compromised was starting to become a rare occurrence. Critics and users alike repeatedly called upon Twitter to release two-factor (or step) authentication. The added layer of security requires you to enter your password, and then a subsequent six-digit access anytime you try to log into Twitter. The short code is sent via text message to your cell phone, which means that any would-be hackers would need to not only crack your password, but to also have physical possession of your cell phone.
Twitter, on Wednesday, finally rolled out its first iteration of two-factor authentication.

Enabling the extra security on your account takes just a few seconds and is something every Twitter user should activate. It may require you to take a few extra seconds to log into the service, but having a secure account is worth it.


Setting up Twitter's two-factor authentication requires you to use a computer and visit your account settings page. Once logged into your account and viewing the settings page, scroll down until you find the "Access Security" option. It should be listed right above your country selection. Check the box next to "Require a verification code when I sign in." Once the box is checked, you'll be given a couple of prompts letting you know that the service is about to be enabled, and that it requires you to connect your mobile phone number to your Twitter account.


You'll receive a test text message, verifying that you have the right number added to your account. After indicating that you received the message, you're done setting up two-factor authentication.


The next time you try to log into the Web site, you'll use the same password you have now, but after entering it you'll be prompted to enter the code sent to your phone.


Now there are going to be times when apps and services aren't set up to deal with the added verification step properly, and when that does happen you'll need to have a random password generated to log in with. To get the temporary password, you'll need to visit your account's application settings page and click on the "Generate" button at the top of the page. Use this temporary password in place of your standard password when logging into the app or service.
I tested out how this would work by deleting and re-adding my Twitter account to my iOS device; I was forced to use a temporary password, and was able to log in without issue. But while using the Carbon app on Android, I wasn't able to use a generated password or the short code. Clearly there's some work yet to be done here, but it's a step in the right direction for both Twitter and its users.
An article published by Forbes brings up a good point about being forced to tie a phone number to your account. What happens should you lose your phone, or be in an area where cell signal is mediocre at best? By using a Google Voice number as your phone number with Twitter, you're able to view text messages through the Voice Web site, or any compatible Google Voice app. Due to limitations with Google Voice, it cannot forward any messages from Facebook, Skype or Twitter as SMS to a phone number, so if you need to receive it on a mobile device make sure you enable forwarding to e-mail. Doing so will ensure you'll always have access to your six-digit code, and in turn have access to your Twitter account. As the article mentioned above points out, this is also an ideal situation for brands and corporations who have more than one person accessing the Twitter account at any given time.


Play Google's Chrome Racer game across multiple screens


Play Google's Chrome Racer game across multiple screens


The multidevice game demo during the Google I/O keynote? If you missed it, running Chrome on several devices, Google was able to show a game taking advantage of every screen on the desk. By drawing a race track across all of the devices, various colored cars were able to race around the track, from screen to screen, device to device.
Thankfully, Google isn't keeping the game, called Racer, to itself. You can use Chrome on your Android or iOS device to play the game with friends and family members right now.
Before you begin playing the game, make sure everyone who's going to be playing has Chrome installed on his iOS or Android devices. Then everyone will need to visit Chrome.com/Racer or g.co/racer.


Once there, you'll need one user to start a race and the other users to join a race. The user who started the race will have a short code for everyone else to enter and connect to the same race. The best part is, you don't even have to be connected to the same Wi-Fi network or a Wi-Fi network at all; Racer works across multiple devices over a cellular connection.


Once everyone is connected and has picked a color, the race creator can select a difficulty level, and then you'll need to line up the devices using the onscreen instructions. After that, the race is on. Touch the screen to go, release to slow down or stop.

Put Twitter in your Mac's menu bar with BirdDrop


Put Twitter in your Mac's menu bar with BirdDrop



 The little birdie by accessing only the mobile version of Twitter on your Mac with BirdDrop. Then again, perhaps having one-click access to any form of Twitter from your Mac's menu bar will only increase the time you spend on Twitter. How you use it is up to you. I'm here only to inform you of the app's existence and how it works.
BirdDrop is a free app that installs a Twitter button in your Mac's menu bar. After logging into Twitter through the app, you'll have quick access to Twitter's mobile client. With the app, you are able to view your Twitter timeline, compose tweets, retweet, respond to tweets, search, and more.



Clicking on a link in a BirdDrop opens the link in the app itself. Most of the time the page formatted correctly in the app, but not all the time. For example, reading a Bon Appetit article required some sideways scrolling.



If you like the idea of accessing social networks from your Mac's menu bar, MenuTab for Facebook may be of interest.

Adobe Acrobat XI v11.0.3 Professional NoGRP


Adobe Acrobat XI v11.0.3 Professional NoGRP


Information

Adobe® Acrobat® X Pro software lets you deliver professional PDF communications. Create and edit PDF files with rich media included, share information more securely, and gather feedback more efficiently.

1) Disconnect from Internet. Install Acrobat in a trial mode.
2) Start the program. Accept persons. agreement. In the following window press
to license it ON. Start keygen and generate a serial for Adobe Acrobat X v10x
(don’t close it) enter it in the following window. Press to be connected later.
3) Go Help – product registration – isn’t possible to be connected to the Internet – offline >>
activation -create an inquiry code.
Run keygen X-FORCE (xf-mccs6.exe) in the field of serial enter a serial from first keygen, in the field >>
of request enter an inquiry code, press generate received code of activation (field “Activation”), copy >>
and we insert into a field a response code.

The program is activated.

Now close Acrobat and open the C:\Program Files\Common Files\Adobe\ARM\1.0 folder

Find files
– AdobeARM
– Armsvc
– AcrobatUpdater

Also rename them, for example so AdobeARMold, armsvcold, AcrobatUpdateold
If there is a message that the file can’t be renamed, find in the processes, close them, repeat procedure.

Block any attempts of the program to contact the Internet a firewall.


DOWNLOAD LINKS 
(Must Comment Before Download)

Link 1 Click Here

Link 2 Click Here

Avast Internet Security 8.0.1488.286-P2P


Avast Internet Security 8.0.1488.286-P2P


Information
Avast! Antivirus software provides complete virus protection for your computer. Antivirus engine is complemented by anti-spyware, firewall and antispam modules to protect you against phishing schemes, identity theft and internet-distributed web viruses. Automatic updates for greater user convenience and safety. Top user ratings among free antivirus software. The new avast! Free Antivirus includes a spyware detection engine. To protect you from identity theft as well as viruses. avast! Pro Antivirus – better protection during web surfing. Full-featured antivirus software. Better than our free antivirus, especially for web surfing, but without the firewall and antispam included in avast! Internet Security. Also if you wish to customize your security, this is the recommended software.

 Install the program using the patch or the keys to your liking

- Install
- Restart the computer
- Open the Control Panel
- Select Settings in the top right
- Select Troubleshooting, last entry at the bottom left
- Remove the check mark: Enable the form of self-defense Avast and click OK
- Click Yes on the next screen
- At this point, ONLY for XP users use Patch XP, open the file and double-click AVAST XP ZeNiX.reg OK
- Open the Patch2050, select ENGLISH from the menu and click the left mouse button
- Advance and during installation write as password: ZeNiX
- Reboot, renable self-defense module and have the license until 2050.

Enjoy!


DOWNLOAD LINKS 
(Must Comment Before Download and Like our page)

Link 1 Click Here

Link 2 Click Here

Easily import Astrid tasks to Any ,Do on Android, iOS


Easily import Astrid tasks to Any on Android, iOS



The most important feature your to-do list needs is accessibility. A written grocery list you forgot on your kitchen counter doesn't help you much at the store. For this reason, among others, many people use a to-do list manager on their mobile device. But what happens when the app you're using shuts down their service? That's the thought on many users' minds following Yahoo's recent acquisition of Astrid
Fortunately, some of the other to-do list apps are stepping up to help you migrate your data. Such is the case with Any.Do, which released an update today that makes switching to their app supereasy. This feature is available to new and current users.



To get started, you will need to be using the mobile version of Astrid. Then, install a copy of Any.Do on your mobile device. There are both Android and iOS versions.
Once you open the app, you'll be prompted to create an account or log-in with an existing one. Any.Do also offers the option to log in with Facebook if you want to skip past most of the account creation process.


A pop-up will appear that asks if you'd like to import your tasks from Astrid. After clicking Import, the amount of time needed will depend on the amount of tasks that need to be migrated.



Important note: According to Omer Perchik, Any.Do founder and CEO, Astrid and Any.Do implement their task descriptions and subtasks in different manners. For this reason, descriptions of tasks will not migrate from Astrid to Any.Do, and any subtasks in Astrid will appear as new tasks in Any.Do.
If you decided to skip on importing so you could use Any.Do and see if the app fits your needs, the import feature can be found in the Settings menu.


Delete unwanted Facebook comments using the Android app


Delete unwanted Facebook comments using the Android app



You can now moderate the comments on your own Facebook posts from your Android device. With an update to the Android app last week, Facebook enabled the ability for Android users to delete comments in just a few short steps.

Related stories
Easily import Astrid tasks to Any.Do on Android, iOS
Share files between Android and Windows with ES File Explorer
Use Mokriya Craigslist app on Android for Craigslist alerts
The next time someone leaves an inappropriate comment, or an old flame starts proclaiming his undying love for you, you'll be able to delete the comment without having to rush to a computer.
The first thing you'll need to do is update to the latest version of Facebook for Android. After you've updated, you'll need to wait for an inappropriate comment. Or you could test the process of deleting a comment on any of your posts; ensuring you're ready to spring into action.


Tap on the comment you'd like to banish from Facebook and you'll see a pop-up asking if you want to delete the comment, or cancel. Tap on delete and the comment will disappear, never to be seen again.


Prepare for and respond to a lost or stolen smartphone


Prepare for and respond to a lost or stolen smartphone


San Francisco District Attorney George Gascon accuses phone companies of profiting from stolen phones, as Michael Scherer reported last month on Time's Swampland site. Gascon is one of several leading law-enforcement officials calling for carriers to be required to implement technology that permanently deactivates stolen phones. It is simply too easy for thieves to resell smartphones.
One year ago, the major cellphone services announced via the CTIA Wireless Association plans to create a database "designed to prevent GSM smartphones reported as stolen from being activated or provided service." The database was pledged to be operating by October 31, 2012.
The U.S. carriers also promised to "create a common database for LTE smartphones designed to prevent smartphones that are reported stolen by consumers from being activated or provided service on any LTE network in the U.S. and on appropriate international LTE stolen mobile smartphone databases. This database will be completed by November 30, 2013," according to the CTIA.

By the end of this month the companies promised to instruct their customers when they buy a phone or soon thereafter on how to apply a password to the phones to prevent unauthorized access. The cell providers also pledged to "[e]ducate consumers about applications to remotely lock/locate/erase data from smartphones" by the same date.
All four of the programs are "voluntary commitments." All but the creation of the stolen-phone database rely on phone users to activate screen locks, install remote lock/locate/erase apps, and report lost and stolen phones. On December 28, 2012, the CTIA released its most-recent progress report for each of its members (PDF).
The carriers now share their stolen-phone databases, but the companies' approach to theft prevention still relies on their customers. Until that changes, the only way to stem the tsunami of smartphone thefts is for users to change their behavior, before and after the phone goes AWOL.
Step one-and-a-half: Set a passcode for your phone
If you think some benevolent person who finds your lost phone will access its information only to determine the rightful owner so it can be returned, think again. In March 2012, security firm Symantec joined with Security Perspectives Inc. to purposely lose 50 smartphones and then tracked what happened next. As Kevin Haley reports on the Symantec blog, 96 percent of the time the person who found the phone viewed its data.

The Symantec Smartphone Honey Stick Project (PDF) reports that 60 percent of the finders attempted to access social media information and e-mail on the phones, which had been set up with simulated personal and corporate data. Eighty percent of the finders tried to open the corporate files stored on the phones, which had labels such as "HR Salaries" and "HR Cases."
In a post from last September, I explained how to prevent phone and tablet theft. That tip focused on iPhones and iPads; a follow-up post explained how to lock down and find Android and Windows phones. Both posts include the steps for enabling your phone's passcode feature.
But the single most important preventive measure -- even more important than using a passcode -- is to be aware of your surroundings. People become so wrapped up in whatever is on their phone's screen that they tend not to notice trouble approaching. Since thieves consider your smartphone their personal ATM, maybe you should treat the device like cash. That means keep it out of sight, don't leave it unattended, and don't lend it to strangers who just need to make a quick call to make sure their grandmother is OK.

Are automated cellphone-purchasing kiosks making things worse?
Cellphone theft is an international problem. Washington, D.C., Police Chief Cathy Lanier recently accused businesses of facilitating the sale of stolen phones overseas, as reported by the Washington Post in February.
According to the Washington Post's Cecilia Kang, the Washington, D.C., police recently found six phones stolen from residents of the District in an ecoATM automated cellphone-purchasing kiosk located in the suburbs.
Debbi Baker reported last week on the U-T San Diego site that a woman whose iPhone was stolen while she was shopping used the free Find My iPhone app to locate the device in an ecoATM at a nearby mall.

Baker quotes El Cajon, Calif., police Lt. Jeff Arvan as applauding ecoATM's willingness to work with law-enforcement agencies to deter the resale of stolen phones, but Arvan points out that criminals don't worry much about anticrime procedures.

Let Firefox understand your mistyped URLs


Let Firefox understand your mistyped URLs with Nbar extension

Are typos slowing down you and your Web-surfing ways? If you are typo king or queen, give Nbar a whirl. It uses fuzzy string matching to guess the meaning behind incorrectly entered URLs in Firefox. For example, if you enter "hugg" in Firefox's URL bar, the extension will suggest The Huffington Post, should that be a site in your history.



The extension does not require a restart and provides two settings. The first, Search threshold, controls how many suggestions will appear in the drop-down menu as you type. The second, Word distance, adjusts the sensitivity of the extension to your typos. The higher the number you enter, the more forgiving the extension is to your typos.

Get Automatic Lifelogging with Saga for Android


Get Automatic Lifelogging with Saga for Android


Meet Saga, the "Automatic Lifelogging" app. This is the app you've never known you needed. Remember what you were doing last Thursday? Saga remembers. OK, I guess that sounds a bit creepy. But really, here's what the app does...
Instead of forcing you to write a journal each day to talk about everything you did, in perhaps an overlong narrative, Saga keeps everything in a neat list for you. Checked in at the grocery store on Foursquare last Monday? Saga recorded it. Tweeted about an upcoming movie you want to see? Yep, Saga got that, too. What's great about this app is that it requires little to no action from you once you link some of your social media accounts to it -- yet the details of the app are only visible to you. Here's how to start your automatic lifelog:

Get a copy of Saga  Automatic Lifelogging for your Android device. This app only supports Android 4.0 and up at the present time.



Open the app, and tap the New User button to set up an account. After that, you'll need to start teaching Saga about yourself. Press on the Me tab along the top of the app, and then tap on the pencil icons next to Home and Work to let the app know their locations.


Now you'll want to press the Settings icon that appears in the upper right-hand corner. Link as many of the social media/sharing apps as you can for Saga to keep thorough records of what you're doing.



Press on the Now tab and help Saga locate you. You can also search for another location by tapping the Somewhere Else choice in the menu.
As Saga learns the places you go, it will ask you to verify the locations by filling the check box next to Confirm. You can also add some quick snapshots and notes to locations, if you want to little extra detail on your lifelog.
Here's an example of what Saga recorded about me from Thursday, May 10:



I did notice a couple of bugs in relation to tweets displaying on the wrong day. However, since this app is new to Android, I'm sure there are other bugs to be found.

Popular Posts

Blogger Tutorials

Ordered List