Sunday, June 29, 2014

Building Internet Firewalls

- 0 comments
Author(s)
D. Brent Chapman
Elizabeth D. Zwicky
Edition
1st
Date Published
November 1995.
Description:

In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated "Building Internet Firewalls" to address these newer risks.

What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines.

Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down.

Like the bestselling and highly respected first edition, "Building Internet Firewalls," 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes:

Firewall technologies: packet filtering, proxying, network address translation, virtual private networks

Architectures such as screening routers, dual-homed hosts, screened hosts, screenedsubnets, perimeter networks, internal firewalls

Issues involved in a variety of new Internet services and protocols through a firewall

Email and News

Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo)

File transfer and sharing services such as NFS, Samba

Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000

Real-time conferencing services such as ICQ and talk

Naming and directory services (e.g., DNS, NetBT, the Windows Browser)

Authentication and auditing services (e.g., PAM, Kerberos, RADIUS);

Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics)

Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP)

Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server)

The book's complete list of resources includes the location of many publicly available firewall construction tools.
[Continue reading...]

AUTOCAD 2010 FULL VERSION FREE DOWNLOAD

- 0 comments

Autocad 2010 :
AutoCAD 2010 software lets you design, visualize, and document your ideas clearly and efficiently
Watch as AutoCAD guru Lynn Allen walks by way of new features,
parametric drawing, and many extra new capabilities.
Dramatically slash your design revision time with parametric drawing.
By defining persistent relationships between objects, parallel strains stay parallel, 
all automatically. you'll be able to free download AutoCAD 2010 now.

DOWNLOAD LINK

[Continue reading...]

Forensic Toolkit

- 0 comments
Tools to help examine NTFS for unauthorized activity.

The Forensic ToolKit™ contains several Win32 Command line tools that can help you examine the files on a NTFS disk partition for unauthorized activity. We built these tools to help us do our job, we hope they can help you as well.

Key Features
AFind is the only tool that lists files by their last access time without tampering the data the way that right-clicking on file properties in Explorer will. AFind allows you to search for access times between certain time frames, coordinating this with logon info provided from ntlast, you can to begin determine user activity even if file logging has not been enabled.

HFind scans the disk for hidden files. It will find files that have either the hidden attribute set, or NT's unique and painful way of hiding things by using the directory/system attribute combination. This is the method that IE uses to hide data. HFind lists the last access times.

SFind scans the disk for hidden data streams and lists the last access times.

FileStat is a quick dump of all file and security attributes. It works on only one file at a time but this is usually sufficient.

Hunt is a quick way to see if a server reveals too much info via NULL sessions.
Command Line Switches
afind [dir] /f [filename] /ns=no subs /a after /b before /m between
time format =

hfind [dir] /hd=find dir/system attribs /ns=no subs

sfind [dir] /ns=no subs

filestat [filename]

hunt [\\servername]

System Requirements
Windows NT 4.0 SP3
16MB Memory
Administrator privileges
Audit log enabled with searchable records
Set NT command line buffer to 500 or more lines. 1200 or more lines works well

Site URL: 
http://www.mcafee.com/us/downloads/free-tools/forensic-toolkit.aspx

Download URL: 
http://downloadcenter.mcafee.com/products/tools/foundstone/ForensicToolkit20.zip
[Continue reading...]

Password Recovery on Windows XP

- 0 comments
Introduction:

Lost or forgotten the password to your Windows XP computer? Don't worry, it can be easier to retrieve than you think. What's described below is for educational purposes and to be used only on your own system or that you have permission to do so, also these only work for local system accounts.

Using Safe Mode:

This method will only work if the Safe Mode Administrator account is not password protected (the case more often than you think!) but in a pinch it might be your only option to check.

1) Reboot the computer by whatever means you deem appropriate at that time.

2) Once the Bios notices loads take note of the hot key to enter Safe Mode and hit it.

3) Enter any of the Safe Mode versions but I'd recommend sticking to Safe Mode with no networking.

4) You have 3 options to get to the same end (that I know of at least).

4.1) Navigate to the Control Panel and enter the User Accounts screen, select the user account(s) in question, and select the option to "Remove Password". If this is not available skip to bullet #5.

4.2) Reboot the computer once more and enter the account(s) that were specified in bullet #4 without the need to enter a password.

5) Enter DOS if possible.

5.1) Enter Run (if available) and type in "control userpass2" to the Users Panel. If the Run option is not available for some reason skip to bullet 6.0, if these options are not available skip to the Software portion of this.

5.2) From here either reset or blank out the password on the account(s) in question or even create a new account with whatever user level you want.

5.3) Reboot the computer once more and enter the account(s) that were specified in bullet #5.2.

6.0) If Run isn't available you can make a batch file to get you there as well. Enter Notepad or whatever text editor available that supports saving "All Files".

6.1) Type out the command "control userpass2", perform a "Save As", name it whatever you want but be sure to name the extension a *.bat (which is why the "All Files" part comes in.

6.2) Double click the batch file to run the command you saved in it and you're in the Users Panel, move back up to bullet 5.1.

Using Third Party Software:

7) Two very useful utilities I've found that work (with a bit of time) 99.99% of the time if the above options are not available are EBCD and Ophcrack. You need to insert one of these CD's and reboot in order to use them. Refer to their documentation at the time of use for the most up to date information.

7.1) The fastest option is called EBCD (Emergency Bootable CD) found at http://www.prime-expert.com/ebcd/. It's a Linux Live CD (aka an operating system that runs without needing to be installed) that attempts to remove the password on specified account(s) completely and of course doesn't need to be logged into Windows to run so security is at a minimal. Unfortunately to download it now is behind a pay wall but older versions can probably be found easily enough.

7.2) The best option by far, since it leaves the existing password intact on the system is using a Linux Live CD called Ophcrack which has a very robust brute force password cracker. Length of time need to crack the password will depend on the speed of the PC's RAM and CPU, length/complexity of the password, speed/condition of the CD drive optics and rotating components. In my experience it usually takes 5-15 minutes at worst for an average user's password. A Windows Vista version exists as well.

7.3) Reboot the computer once more and enter the account(s) that were specified in bullet #7.2.

Keep in mind there a a LOT of other ways to go about this process but the above has always been as much as I ever needed.

Reference: 
http://www.prime-expert.com/

http://ophcrack.sourceforge.net/
[Continue reading...]

DVD or CD-ROM Not appearing My Computer

- 0 comments
Sometimes after installing or uninstalling an application especially those that
contain virtual hardware like Daemon Tools and Clone CD You end up
unable to use your CD/DVD-ROM which despite the efforts of all known
methods of reboots and system restore cannot fix.

So How Do I Fix This Issue?

Most people go through the long process of reinstallation where as others try
to find a way to solve this problem once off by doing so you can save
yourself a world of trouble in the future. This weekend it struck yet again as
a poor soul updated his Daemon tools.

So on with the show here is the process I use to resolve this issue

Open regedit using the run command
Go though the following keys Hkey_Local_Machine -> System ->
CurrentControlSet -> Control -> Class -> {4D36E965-E325-11CE-
BFC1-08002BE10318}
Within this key delete all the content One key will usually give you
the finger which I think it is the default within Properties nevermind
it. Next up close the regeditor and reboot the computer if you had no
success then well I guess you will need to reinstall. Also note some people
say just have to delete the upper or lower filter key I find it better to just
go clean out the entire thing.
[Continue reading...]

Monday, June 2, 2014

Facebook Launches New Social News Reader App Called Paper

- 0 comments
Although not available yet, Facebook’s new Paper mobile app has already been getting so much hype as soon as Facebook officially announced it. The app which is scheduled to become available on February 3 exclusively for iPhone users in the U.S., is described by Facebook as a new app that will help you explore and share stories from friends and the world around you.
Paper iPhone app will curate Facebook stories posted and shared by your Facebook friends. What makes it different from the Facebook news feed is the fact that it will be presented in a more immersive design and fullscreen layout on your iPhone. The app will also make it easier to craft and share stories. Paper will be composed of stories and themed section that will let you follow your favorite interestes. Its first section will contain the Facebook News Feed including photos and videos. You will be able to customize your Paper view by sections covering various themes and topics.
Being an iPhone app, Paper will respond to touch gesture following simple, natural movements. Tilting your iPhone will let you explore panoramic photos from corner to corner. Videos can be autplayed in fullscreen. The app will also feature detailed covers and more.
More details about Paper for iPhone can be found at the  Facebook newsroom.
[Continue reading...]

Smart Bro Offers Samsung ‘Selfie’ Camera under Smart Bro Gadget Plus Plan

- 0 comments
If you’re fond of taking selfies then this one’s for you. Smart Bro has announced the availability of the Samsung Smart Camera DV150F under its Gadget Plus Plan. For only Php 699 per month, subscribers can enjoy this dual-view camera with 50 surfing hours, covered by SMART’s Anti-Bill shock.
The Samsung Smart Camera DV150F can capture up to 16.2 MP photos and HD 720p videos. It has a 5x optical zoom, a 2.7 inch rear LCD and best of all, a front LCD – perfect for taking selfies.
A ‘Smart’ camera, the DV150F can be controlled remotely by a smartphone and can be easily set to connect to other mobile devices for sharing your photos. You can also instantly share your photos on Facebook, videos on YouTube or send photos as text message or email from the camera via the bundled Smart Bro Pocket WiFi.

“We welcome another first from Smart Bro with the introduction of the Samsung Smart Camera DV150F to our quickly expanding Gadget Plus Plan lineup,” said Michele Curran, Data and International Services Marketing Head at mobile leader Smart Communications, Inc. (Smart).
“With superfast and reliable mobile broadband connectivity from Smart Bro, taking a quick selfie, documenting travel adventures and instantly sharing them to friends online has now become easier than ever,” Curran added.
Subscribers can also avail of the Samsung Smart Camera DV150F bundled with Samsung Galaxy Tab 3 Lite DV150F at Gadget Plus Plan 999 (with P500 One-Time Fee) or with a Samsung Galaxy Note at Gadget Plus Plan 1299 (with P3,000 cash-out upon application). Both bundles come with a Smart Bro Pocket WiFi and 50 surfing hours per month.

To know more about the Smart Gadget Plus Plans, check out smart.com.ph/bro or call 888-1111 via landline or dial *888 for existing Smart subscribers
[Continue reading...]

iPhone Secret Codes Reveal

- 0 comments
Today tip will help you to enjoy some secret codes of iPhone mobiles. You can try these tricks to all latest iPhone mobiles. You can display the hidden information of mobile sets and troubleshoot the routine problems using these codes. 

Follow the list of latest iPhone codes list: 



Code Action 

*#61# and tap Call To verify the number of unanswered calls 

*#62# and tap Call Use to verify the number for call forwarding 

*#06# To display the IMEI Number of the mobile 

*777# and tap Call To display the account balance information for prepaid iPhone 

*225# and tap Call To display the account balance information for Postpaid iPhone 

*#67# and tap Call To display the number for call forwarding when the iPhone is busy 

*3001#12345#* To display many of the inner settings of your iPhone 

*#21# To verify the call forwarding is enabled or disabled 

*646# and tap Call To display the Post-paid minute balance 
*#33# and tap Call To Check for call control bars
[Continue reading...]

Nokia Secret Codes Tips and Tricks

- 0 comments
To check the IMEI (International Mobile Equipment Identity) Type- 
*#06# 
Information you get from the IMEI- 
XX X 
TAC FAC SNR SP 

· TAC = Type approval code 
· FAC = Final assembly code 
· SNR = Serial number 
· SP = Spare 
To check the phones Software revision type- 
*#0000# 
Information you get from the Software revision- 
V 05.31 
18-02-99 
NSE-3 
· 1ST Line = Software revision 
· 2ND Line = The date of the software release 
· 3RD Line = Phone type 
To enter the service menu type- 
*#92702689# (*#WAR0ANTY#) 
· Serial number (IMEI) 
· Production date (MM/YY) 
· Purchase date (MM/YY) You can only enter the date once. 
· Date of last repair (0000=No repair) 
· Transfer user data to another Nokia phone via Infra-Red 
Clock Stopping 
To check weather your SIM Card supports clock stopping type- 
*#746025625# (*#SIM0CLOCK#) 

Revealing the Headphone and Car-Kit menus 
Please note that if you do these next tricks, the new menus can't be erased without retoring the factory default settings. To do these tricks you need to short-circuit the pins on the bottom of the phone next to where you plug in you charger. 

1. To activate the "Headset" menu, you need to short-circuit pins "3" and "4". After a short time the word "Headset" will be shown in the display. Menu 3-6 is now enabled. 
2. To activate the "Car" menu, you need to short-circuit pins "4" and "5". After a short time the word "Car" will be shown in the display. Menu 3-7 is now enabled. 

THE REBOOT TRICK 
This should work on all software versions of the 6110. 
1. Go to the Calendar (Menu)
2. Make a note or reminder. 
3. Enter some text into the edit box. 
4. Hold "Clear" until the whole text is cleared, then press "Back". 
5. Press "0". The main screen will now be showing but a space appears on the screen. (you can't see it) 
6. Enter 4 digits (e.g. 1234). 
7. Use the down arrow to move the cursor to the left side of the numbers and the space (Down arrow twice). 
8. Now enter 6 digits and press the call button. 

Wait for a few seconds, the screen should start to flash and reboots. It should alsowork on other menus like the "Profiles" menu. 

EFR CALL QUALITY 
To activate EFR (Enhanced Full Rate) Enter the code- 
*3370# 
This improves call quality but decreases batterylife by about 5% 
To deactivate it, Enter the code- 
#3370# 

THE JAMES BOND TRICK 
If you short-circuit theleft middle and right pins on the bottom of the phone with all connections touching each other, the Nokia software hangs! The profile "Headset" will be activated. Before you do this just activate the "Automatic Answer" in the headset profile and set the ringing volume to "Mute". Now you can use your phone for checking out what people are talking about in a room. Just place it under a table in a room and call it. The phone receives the call without ringing and you can listen to what people are saying. 

NETWORK MONITOR 
There is a hidden menu inside your Nokia phone. If you want to activate it, you'll have to re-program some chips inside of your phone. 
1. Check your software version. You can only continue if you have v4.33, v4.73 or v5.24. 
2. Take apart the phone. 
3. De-solder the EEPROM (ATMEL AT 24C64). 
4. Read out the data with an EEPROM programmer and save it to a file (Backup). 
5. If you have v.33 or v4.73, change the address "03B8" from "00" to "FF". 
6. If you have v5.24 then change the address "0378" from "00" to "FF". 
7. Write the new data to the EEPROM and solder it back to the phone, 
8. Power on your phone and you should have "Netmonitor" enabled. 
The Network Monitor gives you the following information. 

· Carrier number 
· MS RX Level in DBM 
· Received signal quality 
· MS TX power level 
· C1 (Path loss criterion, used for cell selection and reselection). The range is -99 to 99. 
· RTL (Radio link timeout). 
· Timeslot 
· Indication of the transmitter status 
· Information on the Network parameters. 
· TMSI (Temporary Mobile Subscriber Identity). 
· Cell identification (Cell ID, Number of cells being used). 
· MCC (Mobile country code) 
· MCN (Mobile network code) 
· LAC (Location area code) 
· Ciphering (On/Off) 
· Hopping (On/Off) 
· DTX (On/Off) 
· Discard cell barred information 

CHECK SIM-LOCK 
Note - If you bought your Nokia on UK Vodafone or UK Cellnet you do not need to check this because they both transmit on GSM900, and they don't lock the phones. However if you bought your phone on UK Orange or UK One2one your phone may be blocked. The reason is that they both transmitt on GSM1800. To make a call on GSM1800 you need what is known as a "Dual band" phone. A dual band phone is able to transmit on both GSM900 and GSM1800, so they lock the phones so you can't use it with any other network simcard. If you find that your phone is locked you can try different software to unlock it. (we havn't found one that works yet), or you can ask your service provider who will gladly exchange the 10 digit code for about £35. 
This is how to check the status of the 4 different locks. Aslo don't try entering the wrong number, because after 3 times it will block the phone for good. 

There are 4 different locks on your Nokia phone. 
· COUNTRY-LOCK 
· NETWORK-LOCK 
· PROVIDER-LOCK 
· SIMCARD-LOCK 
The code to read out the sim-lock status of your phone is 

#PW+(MASTERCODE)+(Y)# 
· # = DOUBLE-CROSS 
· W = PRESS "*" THREE TIMES 
· P = PRESS "*" FOUR TIMES 
· + = PRESS "*" TWO TIMES 
· MASTERCODE = 1234567890 
· Y = NUMBER 1 TO 4 
The master code is a secret code. The code has 10 digits, To read out the sim-lock status you can enter every combination you want! 
"Y" Shows the status of the network-lock. Here you can enter a number from "1" to "4". The "4" is for the sim-card lock. 

SIM-LOCK CHECKS 
· #PW+1234567890+1# = GIVES PROVIDER-LOCK STATUS 
· #PW+1234567890+2# = GIVES NETWORK-LOCK STATUS 
· #PW+1234567890+3# = GIVES COUNTRY-LOCK STATUS 
· #PW+1234567890+4# = GIVES SIM-CARD-LOCK STATUS. 

Hope this helped
[Continue reading...]

5 Best Alarm Clock Apps For Android Devices

- 14 comments
The person who invented the Snooze button in alarm clocks, is definitely a favorite person for many people around the world. Hitting the snooze button and sleeping for some more time is definitely 0ne of the best things in the morning, but it will not be suitable all the time. Not only for waking up, but alarms are used in reminders, task management and in many more situations in our day to day activities. Since alarms have become a part of our daily life, the features of the default alarm app will not be enough for us. So, today I’ve come with a list of alarm clock apps for people who need to wake up and finish tasks on time.

Alarmpad

The Alarmpad is a pretty smart application than the default alarm app on your Android device. Once you dismiss the alarm, it will automatically open the calendar app and read the notes you have entered. Also, you can see the complete weather information on your location right after you dismiss the alarm. One of the important features of this application is, you can set your own voice or any custom recording as an alarm tone. The app can be connected to your Bluetooth device for dismissing or activating the alarm using voice commands.

Wave Alarm


Unlike other alarm apps, Wave Alarm works based on motion technology. Similar to the name, you have to wave your hand above the screen to dismiss or snooze the alarm. This simple gesture will turn off the alarm quickly without touching your phone. All you need is a front facing camera on your device to capture to gesture. All the basic features like weather update, inbuilt ringtones, brightness control, etc., are available in the application. For the app to work properly, it should not be moved to the SD card of your device.


Alarm Clock Xtreme

Alarm Clock Xtreme has all the possible ways to wake up you from the bed. The alarm will gently increase the volume to a higher level than the normal alarms to wake you up. To avoid cancelling the alarms accidentally, it has large snooze buttons and puzzle solving methods to cancel the alarm. The large snooze button will decrease the time between normal snooze to wake you up. You can also choose different math puzzles to stop the alarm. This will be very helpful for you to wake up on time. It has both free and paid versions, the free version is ad supported.

Puzzle Alarm Clock

The Puzzle Alarm Clock is an ultimate alarm application for Android devices. As mentioned in the name of the app, you have to solve a puzzle to cancel the alarm. The puzzles are available in three difficulty levels, you can choose the one according to your need. Also, it supports NFC and QR Codes to cancel or disable the alarms. It has a loud explosion sound, which gives a great effect if you connect your device to the external speakers. The app has an option to send an SMS to the emergency contact, if you don’t turn off the alarm on time.

I Can’t Wake Up Alarm Clock

If you think you couldn’t wake up on time, then you should try this app on your Android device. It has eight different tasks to wake you up. The app will not turn off the alarm until you finish that task. The tasks are like math puzzles, rewrite the random text, scanning the barcode in a random area of your place and much more interesting activities. Instead of having a boring alarm every morning, these tasks will be very helpful to give a different atmosphere to wake you up every morning. There is an awake test on the app, which will pop up a notification after you wake up, if you don’t cancel that, then the alarm will start ringing again.

If you are struggling to wake up with your regular alarm app, these apps are worth giving a try. Share your experience with  these apps in the comments. Thanks for reading, do share this post with your friends.
[Continue reading...]

Sunday, June 1, 2014

How to Turn an image into text in Photoshop

- 0 comments
In this tutorial you are going to learn how to turn an image into text . If you notice it , this type of works called Typography ( from the Greek words (typos) means “form” and (graphe) means “writing” ) . So in this tutorial you well get some creative ideas about designing with typography style in Photoshop . And don’t worry , the tutorial is very simple and intelligible even for beginners .


[Continue reading...]

HOW TO COMBINE STOCK PHOTOS INTO A GIF ANIMATION

- 0 comments
Inspirational quotes are the easiest way to win over the internet. And since Tumblr is known as the land for great quotes and animations, this tutorial is a mash up of both, inspired by its creative users using stock photos! Learn how to add flair to one of your favorite quotes with this fun GIF animation!

Step 1

Open all your images in Photoshop. The main image we’ll be using today is the vintage 
camera (Image ID: 21437279). Double click the background layer and rename it “Layer 
1.” Place the first galaxy image (Image ID: 14718596) onto the canvas by dragging the file 
over to the camera image. Name this second layer, “Layer 2.” Create a new group 
and add Layer 2 into the group, to help with future organization.


Step 2


A) Using the Move Tool (V) position the galaxy image over the camera. Bring down the opacity of the galaxy layer so that you can see some of the camera through it. Select the Pen Tool (P) and begin tracing the black section on the front of the camera’s body. Make sure to include both sides. Right-click to create a vector maskand unlink the galaxy layer from the mask. Unlinking the layer will allow us to freely switch up the placement of the galaxy image.


B) Using the Pen Tool again, select the vector mask. Trace around the front handle. Right-click to make a selection and fill the selection with black. This will allow the handle to peek through the galaxy without interfering with the image or animation. When you’re done, return the galaxy layer to full opacity.


Step 3


Right now the galaxy looks too flat on the camera. To add more dimension you’ll have to create a new layer, and with a soft round brush set to low opacity, paint black shadows on the left and right sides of the camera that will match up well with the shadows already present. Set the layer to Multiply and adjust the opacity accordingly, in this case, 46%. Right-click to create a Clipping Mask.


Step 4


Since the vector mask allows you to move the galaxy around without disturbing anything, we’re going to use only this image for the animation part. Select the galaxy layer and duplicate it three times to have a total of four options. When you select the galaxy layer it will automatically include the clipping mask. For each new layer move the image around so that the galaxy is in a new position. You can even flip one of the images to change it up even more.


Step 5


Now that we’ve set the image up for the animation we’ll finish the general edit. On a new layer above Group 1, drag the second galaxy image we’ll be using for this tutorial (Image ID: 15159001). Position the image so that the center of the galaxy is at the center of the camera lens. Set the layer to Screen.


Step 6


To enrich the wood grain even further, add a new layer above the second galaxy and select the Brush Tool (B). Using a soft brush set to a low opacity, paint the color black onto the wood, deepening it further around the edges of the camera. Set this layer to Overlay.

Step 7

A) To fit the theme of the vintage camera, we’ll give the overall image more retro inspired elements. The first element is to add the quote. With the Type Tool (T), type your quote using a font with a very vintage feel, in this case, Courier New. Set the font size at 72 pt. Hold the Alt key and use the left and right arrow keys between each letter to further adjust the kerning.
B) Under this type layer, add a new layer. To help the text stand out from the wood, paint the color white using a soft round brush. Paint it so that the white is more concentrated towards the center. Then set this layer to Overlay.

Step 8


A) The next vintage element we’ll add is the color. Add two new layers. Fill one layer with the color yellow (#d8ee1e) and the layer above it with the color purple (#7f1bdb). Set the yellow layer to Color and bring down the opacity to 15%.

B) Set the purple layer above it to Exclusion with opacity at 24%. Now the image is beginning to look like one of the retro inspired pictures we see on Tumblr!

Step 9


A) Before we move onto the animation we will bump up the lighting and contrast of the image. Go to Layer > New Adjustment Layer > Brightness/Contrast. Set the Contrast to +69 and lower the Brightness to -29.

B) Above that layer add another New Adjustment Layer, this time using Levels. Set the RGB Input Levels at 0, 0.75, and 235.

Step 10


A) Now that the image is edited we can move onto the animation. Open your animation panel in Photoshop by going to Window > Animation. Select the “Convert To Frame Animation” option. Select the first frame and set the delay time to “No delay.”

B) Now select “duplicates selected frames” and make four duplicates of your first frame for a total of five frames. Each frame will act a new frame for your animation.

Step 11

Go back to the original Group 1 with your masked galaxy layers. For each new frame, keep only one galaxy layer visible while the rest remain hidden. The first and the last frame should be the same so that when you play the animation, the galaxy changes between frames. 

Step 12

If you play the frames now it’s a fast and jerky animation. To smooth the effect, select the first two frames hit the Tween button and set the value for “Frames to Add” to 3. Continue this step for the remaining frames that switch abruptly. Now you should have a smooth and blended transition. Also make sure the looping option is set to play Forever, so that you have one continuous loop. Now your animation is done!

Step 13

Save this file by Saving For The Web as a GIF. You can adjust settings to bring down the file size or even make the image itself smaller. Once you are done have fun posting your animation to any social media site. Get to tumblin’!


That’s it! Feel free to try this technique with your favorite stock photos!
[Continue reading...]

Nokia XL now available for Php8,990

- 0 comments
The Nokia XL has just landed in the Philippines and is now available in all Nokia stores with a suggested retail price of Php8,990.

The Nokia XL was launched in Barcelona back in February along with the Nokia X which arrived earlier in the Philippines.



Nokia XL specs:
5.0-inch IPS LCD display @ 800×480 pixels, 187ppi
Qualcomm Snapdragon S4 1.0GHz dual-core
768MB RAM
4GB internal storage
up to 32GB via microSD
Single-SIM (micro-SIM) or Dual-SIM
3G/HSPA 7.2Mbps
WiFi 802.11 b/g/n
Bluetooth 3.0 + HS
5MP rear camera with LED flash
141.4 x 77.7 x 10.9mm
190 grams
Li-Ion 2000mAh
Nokia X software platform 1.0 (Android Jellybean based platform)

The dual sim Nokia XL is now available at all Nokia stores and authorized resellers for Php8,990.
[Continue reading...]

Globe switches UnliSurf to GoSurf in MySuperPlan

- 0 comments
Last month, we reported that Globe is consolidating its mobile internet plans under the new GoSurf label replacing both PowerSurf and SuperSurf. Globe has denied it will phase out SuperSurf but it looks like they’ve actually started doing so this month.

In 3 separate conversations with Globe Customer Service on the phone over the week-end, we received multiple confirmations that the new default mobile surfing plans will now be GoSurf and SuperSurf is no longer offered in the plans.



Some of the new Globe MySuperPlan packages are as follows:

MySuperPlan 1799:
GoSurf 5GB – 999
Consumable – 800
Unlimited Calls & Text to Globe/TM – Php599
iPhone 5S 16GB – free

MySuperPlan 1799:
GoSurf 10GB – 1499
Consumable – 300
Unlimited Calls & Text to Globe/TM – Php599
iPhone 5S 16GB – free

Both plans will net you Php2,398 for the MSF and there’s some cash-out depending on the contract period and the type of handset availed.

When asked about the old SuperSurf plans, the CSR has stated that it has been phased out in favor of the new GoSurf offers. Old SuperSurf subscribers will not be swicthed to the new GoSurf plans. However, once old subscribers renew their 24-month contract, the new GoSurf plans will be offered instead of SuperSurf.

The 1GB/day or 3GB per month FUP on the old SuperSurf still remains, which makes the GoSurf at 5GB more palatable.


The new GoSurf plan is probably Globe’s way to address the FUP issue and clarify the bandwidth allocations for mobile internet by its subscribers (thereby adhering to the “truth in advertising” complaints a lot of subscribers have been hurling against them).
[Continue reading...]

Sen. Recto calls for 10 Mbps minimum Internet speed

- 0 comments
After filing Senate Bill No. 2232 or the “Free Metro Manila WiFi Act of 2014“, Senate President Pro Tempore Ralph Recto files another Senate Bill called “Bilis Konek Act of 2014” that will require ISPs to offer a minimum Internet speed of 10 Mbps.

The Senate Bill 2238 or “Bilis Konek Act of 2014″, would empower the National Telecommunications Commission (NTC) to require all ISPs and telcos in the country to provide its consumers a minimum of 10 Mbps speed for mobile broadband/Internet access. Those subscribed to fixed and fixed wireless broadband/Internet access should have at least 20 Mbps.


“The national march towards a broader Internet or Wi-Fi access should be in cadence with a decent Internet speed. Aanhin mo ang Wi-Fi kung puro ka naman antay?” Recto said.

In a report by Rappler, the NTC has also proposed to make Internet a “basic service” instead of “value added service”, enabling the agency to regulate speed and price.

“Internet is not a basic service [now], meaning the NTC cannot fully regulate it and I think it can be. It is already recognized as a human right,” said Senator Bam Aquino

Senator Loren Legarda, on the other hand, suggested that rates should be reviewed and adjusted. “Fair is fair. The rates should be adjusted lower. Mali ba ako?”


[Continue reading...]

Cherry Mobile Ultra now official, LTE smartphone under 9k Php

- 0 comments
The Cherry Mobile W900 LTE is no longer the lone LTE-capable device from CM’s stable as it’s now joined by the newly launched Cherry Mobile Ultra.


Cherry Mobile Ultra specs:
5-inch HD IPS display, 1280×720 @293ppi
1.2GHz Snapdragon 400 MSM8926 quad-core processor
Adreno 305 GPU
1GB RAM
Expandable 8GB internal memory
13MP BSI rear camera with LED flash
1080p video recording @30fps
2MP front-facing camera
LTE, HSPA
WiFi 802.11 b/g/n, DLNA, Wi-Fi Hotspot
Bluetooth 4.0 LE
FM Radio
GPS w/ A-GPS, GLONASS
Single SIM (Micro)
Android 4.3 Jellybean
2,000mAh battery


The Cherry Mobile Ultra is slated to hit the shelves starting next week and will be retailed for Php8,999.
[Continue reading...]

SAMSUNG GALAXY S5

- 0 comments
The Galaxy S5 is the 5th-generation of Samsung’s flagship Galaxy S line and, like the Apple iPhone, has gone thru many years of refinement. Check out our full review of the Samsung Galaxy S5 after the break.

Announced in Mobile World Congress in Barcelona back in February, the Galaxy S5 tried to incorporate features and functions to make itself the singular, most-compelling handset in Samsung’s line-up.


In this review, we gave more attention and focus on those new features to see if the improvements were apt or it was another round of gimmicky inclusions.

Design & Construction.

The design signature of the Galaxy S5 has minimally changed compared to the Galaxy S4 from last year. The size, form and shape are almost the same. In fact, looking at it for the first time will confuse you that the S5 is indeed still the S4.

The handset looked plain and simple with its two-tone color (our review unit is black with silver trimming) and all-glass front panel surrounded by a metallic silver frame.

The unit is thin and feels light on the hands, has a good grip and just right to hold with one hand.

The volume control is on the upper left side while the power button is on the right. The 3.5mm audio port is on top along with the noise-cancelling mic and the IR blaster. At the bottom end is the USB 3.0 charging port which is sealed by a flap cover.

At the back is the 16MP rear camera with the LED flash just below it. The back cover is removable and has a rubbery feel to it with dimpled markings, probably to add grip especially when the device is subjected to water.

The polycarbonate material used in the body of the Galaxy S5 remains part of the genetic make-up of the Galaxy line. At least the device maintains its light weight and allows for removable back cover despite the water and dust resistance.

The corners are less rounded compared to the Galaxy S4, but device is still taller than the latter making it look closer to the Note 3. The bottom corner of the front panel has 2 soft buttons, Back & Recent Apps, while the middle physical button is for Home which also serves as the finger print scanner.

We’re really torn about the Galaxy S5 in the design department — on one hand, it’s a nicely done and upgraded version of the Galaxy S4 Active; on the other hand, it looks like a ruggedized yet uglier version of the Galaxy S4 with all the best hardware tucked inside.

Display.

The S5 features a 5.1-inch display using their very own Super AMOLED technology. With a resolution of 1080×1920 pixels, that brings the pixel density to 432ppi.

Super AMOLED is a Samsung standard for their flagship devices and the one they used in the Galaxy S5 looked stunning. Images are crisp and clear, the colors are bright and rich with a deep dark contrast. We still noticed that little bit of greenish hue for white backgrounds or images though.

One thing that we notice though is that the screen-to-bezel ratio of the Galaxy S5 is lower than the Galaxy S4. The bezels on the sides are thicker and the top and bottom bezels are also taller or wider. We don’t have a definitive reason why but it could be due to the IP67 rating that they had to implement the changes.

AMOLEDs have problems with outdoor visibility due to their level of brightness but it looks like Samsung has improved their display in the Galaxy S5 as it is now able to stand along other IPS LCD displays in terms of outdoor visibility and brightness levels.

OS, Apps and UI.

The Galaxy S5 came with Kitkat right out of the box, an advantage they had since partnering with Google in the Nexus program many years back.

The new TouchWiz UI looks spiffy, with a flat vector design. Samsung did a lot of refinements with the custom UI, themes and icons. Samsung continued its efforts from the Galaxy S4 to bring additional software features to the Galaxy S5 which includes an improved S Health, S Voice and S Planner.

There were a few more bloatwares that got introduced — Galaxy Gifts, Galaxy Essentials, Samsung Apps. The Smart Remote is the native app controller as remote control for IR-based devices like TVs, air conditioners, DVD players, etc (the app is powered by Peel).

Camera and Multimedia.

Samsung has been doing good with their cameras since the Galaxy S2 and they’ve continued to improve it since then. The Galaxy S5 is no exception with its powerful 16MP sensor that can capture 4K videos at 30fps.
The sensor can focus on the subjects really fast, captures the fine details and take really good low-light images. Photos and videos look rich and vibrant as well as the videos.
[Continue reading...]

Free Desktop Wallpaper

- 0 comments

The ultimate inspiration is the deadline” as illustrated by designer Burcu B. Koken. If you don’t know 
(I didn’t), Bushnell is inventor of Pong and founder of Atari and Chuck E. Cheese chain restaurants.

Click on the size below to download:


1024×768 \\\ 1280×1024 \\\ 1680×1050 \\\ 1900×1200 \\\ iPhone \\\ iPad
[Continue reading...]

How to Increase Your PC Performance For Gaming

- 0 comments
Gaming on a computer (PC Gaming) is a great choice in 2014 as it is a very large platform with a massive variety of games from the past 20 years. The problem with PC gaming at the moment is how fast it’s growing. A majority of the computers in the world aren’t built to handle a wide range of games, especially resource-heavy modern games. Because of this, you may find yourself unable to run games at the desired settings or how they were designed to be played. However, there are several things you can do to improve performance which will allow you to get the best experience possible out of your current hardware and software, all of which are free and easy to do.

System cleaning
A system that is clogged up with old files, folders and programs is going to run slower than it should. This is because these old items are taking up your computers resources, leaving less power for your system to run games. This can be alleviated by removing your computers unnecessary burdens. You can do this manually (not recommended) or with a program. The most commonly recommended program is CCleaner. This easy to use program scans your computer for any leftover deleted program files and unused registry entries and completely removes them while also freeing up hard drive space for storage.

Disabling unnecessary start up items
When we start our computer, it loads several programs in the background in case they need to be launched later. This process may be convenient for some programs, but it can also hog system resources which leads to reduced gaming performance.
By disabling the hidden start up programs the processor (CPU) is able to work harder on processing your game. The steps for disabling startup items are easy to follow and can be done by anyone:

(Windows XP)
Hit Start, Click Run, type “msconfig”, in the configuration window click the startup tab at the top, disable unnecessary programs and click ok.
(Windows Vista/7)
Start, type “msconfig” in the search box, in the configuration window click the startup tab at the top, disable unnecessary programs and click ok.

Overclocking
System overclocking is the process of altering certain values that determine how hard your computer hardware works. It can be performed on your processor (CPU) and your Video/Graphics card (GPU). Since there are so many different types of processors
and video cards, there is no single method to overclock. You can find the relevant information based on your hardware through Google. Please note: you can damage your hardware by overclocking. Overclocking is not recommended for beginners to computing and hardware.

Freeing system RAM
Random Access Memory (RAM) is where your programs and files that are currently open are stored. They are stored on RAM because it is much faster to fetch them from RAM than if they needed to be fetched from the hard drive, since the hard drive has a much slower transfer rate than RAM. By freeing system RAM, your processor has less information to sort and is able to find the game data much faster. To do this, simply close anything you are not using including items in the system tray (the system tray is the icons next to your clock in the bottom left corner).

These steps should be followed before every gaming session. Some users will see a significant performance increase, while others may see a negligible amount. It really depends on your software and hardware configuration. Happy Gaming!
[Continue reading...]

Free Text Alerts (Be Careful)

- 0 comments
You may have heard this message on a radio station in your city: “For breaking news text alerts, text the word ‘news’ to…” Or your bank may tell you how you can get free text alerts about your checking account. Is it a good idea to sign up for free text alerts from a business?

Yes and no. Yes, because texting on a cell phone is a great way to stay informed on a moment’s notice. And no, because you can end up on a “mailing” list and never be able to take yourself off that list.

A warning for consumers: text alerts are the latest technique in the “list generation” arsenal. Contests are one of the oldest methods of list generation. Whenever you receive or hear about an offer to participate in a sweepstakes, what that company really wants is your name and contact information. The offer of a prize is usually legitimate, but the reason a company holds a contest is to expand its contact list for direct mail offers, coupons and sales announcements.

That company may sell its lists to 50 other companies. That’s why you can never eliminate junk mail completely (either in your U.S. Postal Service mailbox or your e-mail box) unless you move or change your e-mail address and never, ever share your contact information again with anyone other than family and close friends who promise not to pass along your information without your permission.

Free text alert offers work in a similar fashion. Why would a radio station a newspaper, an Internet site or a bank offer to send you free text alerts? Because it wants you as part of a captive, interactive audience, and it may want to be able to sell your cell phone contact information as another source of revenue. A for-profit organization always has a profit motive. So if one day you feel like responding to that promise of free text alerts about traffic problems in your area, you could be stuck on a list forever, and you could receive dozens of unwanted text messages every week.

If you have two cell phone lines and you don’t use one very often but do have an unlimited texting feature on that phone as part of your package, you might want to try out accepting a free text alert offer to see how you like it. You can also gauge how many unwanted messages you receive without it impacting the cell phone you use more often. Then, if you like the text alert feature, you can add it to the phone you use most often.

Text alerts can be a convenience, but they also can be a headache. Be smart before accepting a text-alert offer from a business, even if you like the business a lot.
[Continue reading...]

How To Turn Off The Location Services On Facebook

- 0 comments
PROTECT YOURSELF ONLINE

Geolocation services certainly have their place on social media. Those location services make it easy for your friends to find you and catch up with you during the day. Unfortunately, those same services can draw the bad guys right to your door.

If you are about to leave for vacation or go away from home, it makes sense to turn those location services off at least a few days ahead of time. That is because thieves are actively targeted social media – looking for people they know will be out of town and burglarizing their homes.

Turning off the location services on your smartphone is easy to do. Whether you have a iPhone or an Android-based device, all you need to do is follow a few simple steps.

Use these steps to turn off the location services on your iPhone.

.   Go to Settings

.   Choose Privacy

.   Go to Location Settings

.   Select System Services

.   Scroll down the status bar icon

.   Uncheck each tracking service you want to turn off

The steps for turning off location services on your Android-based device are similar. Just use these steps to stop your smartphone from tracking you.

.   Go to Settings

.   Select Location Services

.   Go to the GPS option and turn it off when you do not need it
[Continue reading...]

How To Secure Your Home Wi-Fi Network

- 0 comments
An unsecured wireless network can leave your personal information wide open to the kind of prying eyes that you don’t want. It can also allow criminals to use your home Internet connection as a base for their shady operations, which can in turn get you in trouble with both your ISP and the local authorities.

To learn how to secure your home Wi-Fi network, you only need to follow these short and simple steps.

1. Change Your Usernames and Passwords from their Defaults
Default usernames and passwords, whether on your wireless router or your networked devices, are as vulnerable as having no password at all. That means it’s important to change your usernames to something unique while pairing them with unique passwords.

When deciding on passwords to use, shy away from anything that makes sense. You shouldn’t use words, phrases or a combination of dates, nor should you use any online password generators. Pick a random string of letters, numbers and, if your software allows for it, characters like periods and semicolons. This will create the most secure passwords.

2. Change Your Router’s Default SSID
Routers have something called an SSID. It functions much like their name and helps you deduce which router is the router you want to connect to when there are multiple access points available.

Unfortunately, most routers have default SSIDs that are both uninformative and risky. For example, having a Linksys router named “Linksys” gives off signals to any cyber thieves that your router is likely configured to a factory default setting. This in turn makes your router a prime target for attacks.

You can usually change your router’s SSID from within your router’s configuration panel.

3. Enable WEP or WPA Encryption
Most Wi-Fi technology supports WEP or a form of WPA encryption. This allows the messages that travel from your devices to your router to be encrypted, which in turn makes it that much more difficult for malicious individuals to sift through your data.

The strongest form of encryption available on most routers exists in the form of WPA 2 encryption, followed by WPA and WEP encryption. While newer routers tend to support WPA or WPA 2 encryption, you will generally be limited to the type of encryption that your devices support. To maximize your security, you should update your network hardware to something that supports these more advanced forms of encryption.

4. Disable Auto-Connecting to Public Wi-Fi Networks
The devices you allow to connect to your Wi-Fi network are just as important to secure as your network. That’s why it’s important to disable automatic connection to public Wi-Fi networks; they may not be secured and could play host to a variety of malicious applications and software just waiting to infect your computer.

If you have automatic connections enabled, your computer may try to connect to these networks if you home wireless network ever goes down.

5. Reposition Your Router and Wireless Access Points
Most wireless routers and access points should be located in the center of your home to maximize the quality of connections devices can achieve. This also reduces the quality of any connections that people outside of your home can achieve, as your wireless signals won’t travel as far.

For additional security, your router may be able to reduce the signal strength. This allows you to further limit the range of your wireless network.
[Continue reading...]
 
Copyright © 2012. Triple "T" - Posts · Comments
Theme Template by BTDesigner · Powered by Blogger