Showing posts with label Software. Show all posts
Showing posts with label Software. Show all posts

Friday, April 1, 2016

Here's a password for Google Chrome development and prevent others from accessing it way!

Is Google Chrome browser most used in the world, the thing that makes its users are leaving open their data and their own cookies recorder for fast browsing, and there are those who want to their browsers personal stays and not used by the other one (in his computer, of course), and if you're also you want it this subject Senasbk.

إليك طريقة وضع كلمة سر لجوجل كروم و منع الاخرين من الوصول إليه !

The topic of the day I will give you added enables you to privatize your browser (Google Chrome), and through its password mode, and therefore will be difficult for anyone else use it if you do not know your password.
Addition called "LockPW" You'll find a link loaded bottom of the topic, now a tiger to the method of operation and are easy too, where sufficient downloaded after you follow the steps that will be outlined to you in private it enforceable until it reaches the relay password set on this form:



In the first option, choose your own Basord, in the second option, reinstatement, and the last column is a special type the password in the case of the first forgotten and it is better to be contrary to it.
That's all there is to it, now, close your browser and reopen it and you'll find that you are so you can access it and use it you need the password, enter it and start browsing normally



Addition link: LockPW


Baca selengkapnya

Saturday, March 26, 2016

A list of the most important protection software compatible with Windows 10

After you install Windows 10 on a particular computer, it is necessary protection software is installed as you want and the quality of the program that you want to, but just as everyone van Windows 10 is still a new and software companies in the programming and the development of programs developed in order to be compatible with the new Windows knows. . On the subject of the day we will give a list of the most important protection software compatible with Windows 10.

لائحة بأهم برامج الحماية المتوافقة مع ويندوز 10

Before they offer you programs that are compatible with Windows 10, it is supposed to refer to Windows Defender, which is by default is on Windows, which enjoys a modest protect the system, but many users prefer to disable it, the you who prefer Windows Defender and the transition to disabled other programs here's the list:

* Bitdefender

* Avira

* AVG

* Avast

* Comodo

* ESET

* Norton

* Malwarebytes

* Trend Micro

Note: KasperSky program operates with some problems due to some restrictions, who is the same system, but it is expected that these problems are solved in the future.
Baca selengkapnya

Wednesday, March 23, 2016

Exclusive !! Now get nine programs worth $ 440 free with a legal activation code (limited offer)

Often we need some paid programs, the thing that drives us to search and get them in any way, whether legal or not, and often be illegal because it is too expensive or you do not have Internet private bank card, and the topic of the day I will We paid a package of programs for the price of more than $ 400 for free.

حصري !! أحصل الان على 9 برامج قيمتها $440 بالمجان مع كود تفعيل قانوني (عرض محدود)

The presenter of the site VideoConverterFactory a limited course, and therefore I advise you to hasten to download the software you need (you can download them all), As for the existing programs are varied and really useful, where there is:
WonderFox DVD Video Converter: a program that specializes in converting videos and downloaded formats quite easily.
Wise Care 365 Pro: is a wonderful program where you will provide strong protection for your device and clean it, the thing that will increase the performance of the system
AOMEI Partition Assistant Pro: and is a program that specializes in disk management by splitting them and convert them to different formats ..
AquaSoft SlideShow: If you are interested in the establishment of videos and edited them, it might be helpful to the program inevitably.
Adguard For Windows Pc: of the best specialized programs in order to remove the ads from the surf fast and comfortably.
HDR Project 3: special program magnificent pictures spirited
TunsKit DRM Audiobook Converter: program special audio files easier for you to manage the process.
Image Resizer: This program will greatly benefit lovers of high-resolution images, it also provides you the ability to add effects and modifications to your photos.
Mini Tool Data Recovery: by name emerges his job, and is not to retrieve deleted files in an effective manner.
As for how to download and run programs are simple simply choose the program you want and then clicking on the "Get It Now" button to the file is loaded, and then opened it to find the inside Word another direct link to download the software Facility legal Balsraal file.



Now, after downloading and installing the software then enabled this through serial content in a Word file you have and you'll find in red on this form



That everything in it, I wish I could be the subject of today has helped you and do not forget to share it with your friends so that also benefit.

Display link:Video Converter Factory
Baca selengkapnya

Tuesday, March 22, 2016

22 thing you could do with Linux and not with Windows or Mac

Linux or GNU / Linux (more correctly), is an operating system kernel or open source operating system that is developed by thousands of programmers and developers all over the world. This system was able worthily to prove how powerful All other systems as evidenced by its use in a broad spectrum of platforms from servers to giant home computers and mobile phones, and developed user interfaces for operating it supports almost all the world's languages.
So in the post we will learn together about the most important 22 things you can do with Linux and not Windows or Mac. This list you can call whatever you can not convince someone you know how powerful this system or GNU Linux :).



1. Update the system legally to the latest version available and free.
2. The latest version of the operating system will run faster than the previous version on the same machine.
3. Easily install and run different graphical interfaces.
4. 20 Install program about one thing.
5. Update all the software automatically



6. Install the same version of your operating system (Ubuntu) on multiple computers without worrying about the restrictions imposed on the license or operating keys.
7. Give copies of the operating and other software for your friends system without fear of violating any law or property rights.
8. Full control over your device without worrying about the presence of secret doors and open gaps can be exploited by malicious software, companies or governments.
9. You need to antivirus software or restart your computer for several months, even updating the system with the latest security updates.



10. It is not necessary to defragment your hard disk defragmentation engine.
11. You can install and uninstall programs, knowing that this does not leave any trace on the record!
12. Perform a complete reinstallation of the system in less than an hour.



13. System run entirely on a computer to the age of 3 years, with good desktop effects such as Windows Vista and only 40 seconds.
14. Customize everything you want in the system and you can also access the site software developers to ask questions, contribute ideas and participate in the creation of programs.
15 . There are many open source programs without loss of performance....



16. Use "dpkg -get-selections> pkg.list" command to get a complete and detailed list of all the programs you have installed, and the creation of a backup copy it on a separate partition.
17. Changing the size of the hard disk partition or deleted without data loss.
18. Use your system to Linux for more than five years without the need for a favor of a more modern.
19. "linux live cd" feature to test the operating system and know what I am about to install it



20. Get the entire source code, including the operating system kernel.
21. Preparation urged the "kernel" of the non-use of damaged sectors of RAM.
22. Surf the Internet during the installation of the operating system.



Baca selengkapnya

Friday, March 18, 2016

Here are turning your device off mode automatically after a period you are determined and without software!

We all know the amortization of computer mode manually, this is normal, but often we need some time until Ntefih, the thing that we need to wait until he finished, the one who in the topic of the day I wanted to share with you turn off your computer automatically and way after the duration you're determined, and all this without no software and no applications and easy and simple way.

إليك طريقة إطفاء جهازك أوتوماتيكيا بعد مدة أنت من يحددها و بدون برامج !


Extinguish the computer automatically There are many specialized programs in it, but as I mentioned earlier and the way in which Soharkk them does not require the installation of anything, all you have to do is open the notes "Notepad" window and type the following command "shutdown -s -t 3600" and then save the file as "shut-pc.bat" then, as shown in the picture:


Now you only need to open the file from where you saved it to show you small it enforceable telling you that your device extinguish, after the period you have chosen and is 3600 again any hour, and note, 3600 Instead of writing you can write how long you want provided that you type the number of seconds.
Baca selengkapnya

How to participate Aloeva with your friends through the use program notepad / bloc notes only

كيف تشارك الويفي مع أصدقائك بالإستعانة ببرنامج notepad /bloc notes

This trick is very simple and keeps the Aloeva sharing programs, where you can create your special applet only through the notepad s / bloc note in which you can participate online when I loved very simply.
The trick, which I would like to share with you in this post is to open the text editor program notepad was then copy and paste these two lines:
-------------------------------------------------- --------------------------
netsh wlan set hostednetwork mode = allow ssid = "name-wifi" key = "Password"
netsh wlan start hostednetwork
-------------------------------------------------- ---------------------------
Well now Rotate your Nmov to any name you want to appear when others, either Password Vgerha on your password that you want to use it to your friends before you share Aloeva them. Of course the second line is the one who initiates ordering the Windows operating post Aloeva.
Now that the necessary settings Save the file on this form is also in the picture, change the name of start.bat to the name you want and do not forget that this stretch Cleaning bat. After the file name saw the picture.



In the second column select all files and save. Now if you operate on Windows ڤasta / Windows 7 or Windows 8 in all their publications click on the file outclass the right mouse and choose Run powers manager run as administrator. After that, you will notice the appearance of the access point you created when everyone in their devices.

It is that in order to stop sharing, create a new file, the same as the first line setting, but is only the second of the netsh wlan start hostednetwork to netsh wlan stop hostednetwork as shown in the second picture



Save the file name in the same way that you have made with the first file but just choose another name differently. For example, if the first file name start.bat Chose second name stop.bat order to differentiate between the two files


Thus we can Aloeva stopped and restarted without the programs and using only notepad program :)



Baca selengkapnya

Thursday, March 17, 2016

A wonderful addition to greatly benefit while surfing sites

If you are using the Internet to visit sites dramatically, you will undoubtedly encounter some sayings or brilliant ideas, and thus be binding on the recorded so as not to forget it, and so this process be easy to suggest you add a help of fantastic.

إضافة رائعة ستفيدك كثيرا أثناء تصفح المواقع

Addition called Papier, you can download from chrome shop, and will help you too much not to forget the ideas that you may encounter as you browse the site, and by allowing you to record and record what they want quite easily, with the possibility of adding some effects task of the Notes Ktkber line and Malanh and through Ctrl + B and Ctrl + I.


Perhaps most significantly distinguishes it is the ability to take advantage of them without having to register or something like that, where all you have to do is install it directly to your browser and start typing your thoughts and feedback.
Addition link: Papier

Baca selengkapnya

mousejack: serious way to penetrate any computer, just 100 meters without being connected to the Internet!

In the informational and technological know very well that there is no security system completely, fi information system has to be that it be security vulnerabilities that may be dangerous in some cases, the more evolved methods of protection also evolved with the methods of penetration, but do you think that is penetrated your PC 100 meters and without to be connected to the Internet!

mousejack: طريقة خطيرة لاختراق اي حاسوب على بعد 100 متر بدون أن يكون متصلاً بالانترنت !

Regardless of the protection that followed in order to protect your computer from the eyes of hackers policy, it is always easy to be access to your computer in ways that were not to their credit account. This was disclosed by a group of researchers in the field of security and protection, and has sacrificed Kidd can any hacker that penetrates your computer without even being connected to the Internet or Bluetooth devices.



This innovative way of penetration depends on the security weaknesses of most wireless keyboards, as well as even the mouse, which relies on the same Alambdo.kev that?
 

We know that the mouse or wireless keyboard often comes with a USB key is piped a small computer in order to connect and transfer data between them. The big problem and the danger lies in the fact could accept any order, regardless of the device that came from it. Thus can the hacker to send a little something to this key and thus can Tetbit any malicious programs on the computer and controlled remotely.


The dangerous thing is that most of the keyboards and wireless mouse with this security flaw and is used widely available all over the world, so the millions of computers vulnerable to hackers. ... And vulnerable to the so-called attacks MouseJack.
Baca selengkapnya