Tuesday 23 May 2017

DO YOU KNOW GOOGLE IS KEEPING EYES ON YOU???

                                          
Hii friends today I am going to tell you that if you are an internet user but you are not aware of this thing that could be riskful for you. Then this content is useful for that user.

Today GOOGLE is the biggest search engine of the world almost all internet user use that search engine but some of that people know that google keeps all the activity you perform at google search engine. That means that google saves you all history, all your searches, all your password, all you youtube history. If you clear your history yet they do not remove.

Google can use these things against you. Therefore I am here to tell how to remove all your activity on google search engine.
follow this simple steps.
1. open your Gmail in google search engine.
2. Open the following URL in your google browser.
https://myactivity.google.com/myactivity


3. After that click on DELETE THIS ACTIVITY.




4.Then click on the TODAY  and then select ALL THE TIME and then REMOVE to delete your whole history.
To get more information about the technical things keeps on this blog.
                                         written by: - KAPIL GAHLOT






Thursday 9 March 2017

How to recover lost Photo, Video, Music and Archive from Hard Drive?

To manage data is the most exhausting job in the world and it can wreak havoc if it dissappears accidently or gets deleted by a silly mistake from your side or your kin.
Deleting important files is a mistake that anybody can commit. Once your data is deleted, if you don’t belong to the computer expert category, your wish to get your data back seems impossible, but it isn’t what it looks like.

How to recover lost Photo, Video, Music, and Archive from Hard Drive

The deletion of data is not permanent. There is simply a small reference deletion from your computer. This means that your data doesn’t find its end if it gets deleted. Your computer shows your data as ‘deleted’ because it can’t find the reference.

Nowadays’s recovering your deleted data is easy and it can be achieved by using a good data recovery software. Let’s see how you can do it.

Today we will see how you can recover your data using Wondershare, one of best data recovery software of the present times. It’s  widely popular and its biggest positive is that it is a non-destructive data recovery route that lets your retrieve deleted or formatted data from your PC devices like USB drives.

 Wondershare, as the name indicates works wonders in comparison to the other data recovery tools and is user-friendly. The installation process does not involve any hiccups and is pretty smooth. As the installation process is over, you simply need to open the application and subsequently, you will be presented with four choices.

The four choices will be as follows:

Lost File Recovery
Raw File Recovery
Partition Recovery
Resume Recovery

We will be detailing the first two for you.

The first option which every user needs to know about is the ‘Lost File Recovery’ option. It is important because it forms the basis of how you proceed to recover your data. So let’s see how you do it.

Lost File Recovery is the fastest way to get back your files. If you have exact information about the particulars of your deleted data, you need to check out this option. It allows you to recover your formatted and deleted files, files deleted by Command-Delete, or permanently deleted from trash It takes barely one or two minutes to scan the entire hard disk and show up the list along with their address. The recovered files are listed in a tabular manner and you also get the option to see a preview, which by far is the best option of Wondershare and no other data recovery software lets you do that.
If the Lost File Recovery fails to do what you aspired for i.e., recover your data you need to go for the Raw Recovery method. This method will definitely overcome the shortcomings you faced in the first option. The Raw Recovery methods work with a variety of types of partitions and take more time to recover the files than the Lost Recovery option. You can also go for this method if Virus or Trojan attack have caused the data loss.

Supported devices and file formats
Wondershare works with NTFS, FAT16, FAT32, exFAT, HFS+ and HFSX file systems are supported. These devices include desktops, laptops, digital cameras, memory cards, flash drives, removable drives, solid state drives etc. Interestingly, storage devices like Floppy Disk, iPod, and cell phones are also supported.
Wondershare software also supports multiple types of files–document, images, video, audio, email, and archive.

Wednesday 8 March 2017

Robot Solves Rubik’s Cube In ‘Just 0.637 Seconds’, Breaks Guinness World Record

In February this year, we have seen Robot manages to beats the Google’s captcha test and makes himself count as human. Recently, a robot named Sub1 Reload solved the famous Rubik’s Cube puzzle in just 0.637 seconds


Robot Solves Rubik’s Cube In ‘Just 0.637 Seconds’, Breaks Guinness World Record

We are already in 2017, well if we look back at the previous year then we will see some never-ending stream of bad news regarding technology that hints it was an average year. However, we all must admit that 2016 also have some significant tech breakthrough that changes how we think, like, play and work.
Well, in January this year we have seen Google’s AI defeats human experts in Lip-Reading. So, all suggests that robotics and Artificial intelligence are advancing. Well, some critics have to say that such rapid changes can lead to widespread job losses.
In February this year, we have seen Robots manages to beats the Google’s captcha test and makes himself count as human. Recently, a robot named Sub1 Reload solved the famous Rubik’s Cube puzzle in just 0.637 seconds which is less that a minute.
The previous record of Sub1 was 0.887 seconds. So, it had beaten its record by solving Rubik’s Cube puzzle in just 0.637 seconds. After verifying that the scrambled cube met the requirements of the World Cube Association and several other things. The Guinness World Record has confirmed that Robot Sub1 Reloaded has created a new world record.
The robot uses six motors that are connected to each side of the cube, and it just took 21 moves to twist and turn the sides after its camera shutters opened. You can even watch the video uploaded by Guinness World Records.
So, what do you think about this? Share your views in the comment section below.




Thursday 23 February 2017

Difference Between 32-bit and 64-bit Smartphones

A smartphone is a mobile phone (otherwise called) with a propelled portable working framework which consolidates components of a PC working framework with different elements valuable for versatile or handheld utilize.







Most can get to the Internet and can run an assortment of outside programming segments (“applications“). They commonly have a shading show with a graphical UI that spreads at least 70% of the front surface. The show is regularly a touchscreen, which empowers the client to utilize a virtual console to sort words and numbers and press onscreen symbols to actuate “application” highlights.

Difference Between 32-bit and 64-bit Smartphones

  • A 64-bitphone is an improvement over a 32-bit phone.
  • A 64-bit processor has a lot more processing space than a 32-bit processor, which sounds impressive on paper.
  • When a processor is labeled as 32- or 64-bit, it’s referring to some values that can be stored in that particular processor’s register. Processors use their register to store data as they perform their job, so more room means more values can be stored.,

32 bit64 bit
Processor

The 32-bit processors can get fewer data as per second.With the extra space that 64-bit processors have, they can get more data per second
The 32-bit Processor does not have more room to work with large volume of data

After all, they have much more room to store more data, which means they can work on larger volumes of data without having to go back to memory.
As a result, 32-bit Processor can take the processing of data slow.Thus, 64-bit processors can take in and process data faster
A 32-bit processor has room for 2^32 values (around 4 billion, rounded down)A 64-bit processor can store 2^64 of them (18 quintillions, rounded down). This means that 64-bit processors have four billion times more addresses at their disposal than 32-bit processors
RAM

The size of a 32-bit register means that software is restricted to using 4GB of memory at an absolute best. This means that if we install more than 4GB of RAM in a phone with a 32-bit processor, the extra RAM can’t be used by software and “goes to waste” as a result.

64-bit processors increase the amount of RAM that can be practically used in a device.

 To consider a limit-
It contains a less amount of data which make the processing very slow.
To consider a limit-
By simply installing a 64-bit processor, the size of its register allows us to use up to 16 exabytes (17 billion GB) of RAM in a device, which means we can have more than 4GB  of RAM on our phones.
Apps

If the apps make in 32-bit than the speed of that application become very slow as compared to 64-bitIf the apps make in 64-bit than the speed of that application become very fast as compared to 32-bit


Not at all like something like circle space, the subject of 32-bit versus 64-bit for Android telephones isn’t clear as crystal. Ideally, you’ll now realize what the particular is, the thing that it implies for cell phones, and regardless of the possibility that your telephone is 64-bit or not.


Latest Exynos made on 10nm FinFET process

Samsung Electronics has launched the Exynos 9 Series 8895 applications processor, manufactured on a 10nm FinFET process. The eight core processor integrates four of Samsung’s second generation custom designed CPU cores, as well as four ARM Cortex-A53 cores. The heterogeneous system architecture is said to enable faster computing in applications such as artificial intelligence and deep learning.

The Exynos 8895 also delivers what Samsung calls ‘unsurpassed’ multimedia experience, with a multi format codec (MFC) and the ARM Mali-G71 GPU. Using MFC, the processor is said to support 4K video recording and playback at up to 120frame/s.

A separate processing unit provides enhanced security, while an embedded vision processing unit (VPU) can recognize and analyze items or movements for improved video tracking, panoramic image processing, and machine vision technology.

Ben Hur, Samsung Electronics’ vice president of system LSI marketing, said: “With industry leading technologies like VPU, the Exynos 8895 will drive the innovation of next-generation smartphones, VR headsets, and automotive infotainment systems.”

Wednesday 22 February 2017

Indian Government Launches Free Antivirus For PCs & Mobile Phones

The Indian government has launched a malware analysis center called the Cyber Swachhta Kendra (CSK) with a project cost of Rs 90 crore spread over the period of five years. Users will be able to download anti-virus or anti-malware tools to disinfect their devices.



With an aim to promote cyber security and to make sure the people of India remain protected online, the government has launched a malware analysis center called the Cyber Swachhta Kendra (CSK) with a project cost of Rs 90 crore spread over the period of five years.
MEITY (Ministry of electronics and information technology) launched the malware analysis center. It will work with different ISPs, academia, banks and antivirus companies in the industry for providing users the digital tool to protect data by removing viruses, malware from their computers and mobile phones.
IT Minister Ravi Shankar Prasad said at the launch of Botnet Cleaning and Malware Analysis Centre “I would like ISPs (Internet Service Provider) to encourage their consumers to come on board, there is a free service available. Come and use it in the event some malware has sneaked into the system.”
Well, if we look back from the year 2014 to 2016, cyber security incidents are on the rise in India. Therefore, cyber security is highly essential, especially at the time when India is investing heavily in digitization.
Users will be able to download anti-virus or anti-malware tools to disinfect their devices. The government launched dedicated tools like for USB protection they launched USB Pratirodh, M-Kavach for mobile security and AppSamvid which works on Windows computers and laptops.
Aruna Sundararajan, Secretary, MeitY said “With the increased penetration of ICT infrastructure in our country, the threat of cyber security has become more serious and visible. There is a need to collaborate and come forth with solutions like the Cyber Swachhta Kendra in order to ensure a safe and secure cyber world for the citizens.”
However, if any user needs to try the apps then here are the links:

Tuesday 21 February 2017

Antivirus Firm Kaspersky Launches Its Own Hackproof OS, Based On Microkernel

The popular cyber security and antivirus company Kaspersky has unveiled its new hack-proof operating system: Kaspersky OS.
The new operating system has been in development for last 14 years and has chosen to design from scratch rather than relying on Linux.
Kaspersky OS makes its debut on a Kraftway Layer 3 Switch, CEO Eugene Kaspersky says in his blog post, without revealing many details about its new operating system.

The Layer of 3-switch is the very first tool for running the Kaspersky OS, which is designed for networks with extreme requirements for data security and aimed at critical infrastructure and Internet of Things (IoT) devices.









What's new in Kaspersky OS than others?


Kaspersky OS is based on Microkernel Architecture: The new secure OS is based on microkernel architecture that enables users to customize their own operating system accordingly.

So, depending on a user's specific requirements, Kaspersky OS can be designed by using different modifications blocks of the operating system.

Kaspersky OS is non-Linux: Yes, one of the three major distinctive features of the new OS mentioned by Kaspersky is that the GUI-less operating system has been constructed from scratch and does not contain "even the slightest smell of Linux.".


"All the popular operating systems are not designed with security in mind, so it is simpler and safer to start from the ground up and do everything correctly. Which is just what we did," says Kaspersky."

But what makes Kaspersky OS Hack-Proof?

It is the operating system's inbuilt security system. Yes, Kaspersky OS inbuilt security system has the ability to control the behavior of applications and the OS modules.
Kaspersky OS claims itself as practically unhackable OS , because for gaining unauthorized access, any hacker would need to break the digital signature of an account holder, which is possible only with a quantum computer.





"All the popular operating systems are not designed with security in mind, so it is simpler and safer to start from the ground up and do everything correctly. Which is just what we did," says Kaspersky.


Kaspersky talked about the recent DDoS attacks that affected numerous websites in past few months. He guaranteed that Kaspersky OS would protect devices, such as industrial control systems, SCADA or ICS, and IoTs, from cyber attacks.

The most severe one was the recent massive DDoS attack on Dyn's DNS servers, which knock down popular sites like Amazon and Twitter. The attack was carried out by Mirai botnets that had infected smart devices like security cameras.

So, Kaspersky says it is mandatory to protect the IoT and other critical infrastructure (like industry, transport, and telecoms) from IT threats.
"I also hope it's clear that it's better – no matter how difficult – to build IoT/infrastructure devices from the very beginning in such a way that hacking them is practically impossible. Indeed, that is a fundamental goal with Kaspersky OS," he says.
More details about Kaspersky's secure operating system is coming soon. Stay Tuned! :-