Twitter Facebook Delicious Digg Stumbleupon Favorites More
                      
Showing posts with label updates. Show all posts
Showing posts with label updates. Show all posts

Monday, August 8, 2016

Top Ways People End Up Getting Hacked and how to stay safe ?

In this day and age, internet users are under constant threats from hackers and cybercriminals. Additionally, said users know very little of the precautions that need to be taken in order to protect themselves. As difficult as it may sound, it is really entirely impossible and extremely simple for internet users to protect their presence online, and it can be made simpler if one is aware of the most common ways people end up getting hacked. Keeping this in mind, here are the top 5 ways that hackers mostly resort to in order to victimize internet users.

1. Brute Force Attack

It is important to note that cracking a password as simple as '12345' can take no more than a second, so it really does not come as a surprise at all that hackers rely on brute force attacks to get access to confidential information and files. Seeing how people, including Mark Zuckerberg, tend to use simple passwords,hacking becomes a breeze that is unless users start using stronger passwords and avoiding using them over and over again while creating new accounts.

2. Password Reuse Attacks

As mentioned earlier, using simple passwords can put users at great risk – Mark Zuckerberg – co-founder and chairman of Facebook too made the same mistake which resulted in several of his accounts being compromised in the process. If he had used several different passwords, the problem would not have been so difficult to deal with in the first place. Since most users tend to make the very same mistake, hackers find it to be one of the most effective ways to compromise several different accounts of the same user.
To avoid this problem, it is necessary for users to create strong and unique passwords for each account. Additionally, if they find it difficult to remember these passwords, they should utilize a password manager rather than make things incredibly easy for hackers and cybercriminals.

3. Social Engineering

Social engineering includes several techniques like whaling, vishing, phishing, spear phishing and privilege misuse. The method is used to trick users into giving out confidential information. This could be in the form of an email from a service provider or even a colleague, which makes it all the more legitimate for users to let their guard down thus giving hackers and cybercriminals the edge they need to achieve their goals.

4. Malware

Another common way people end up getting hacked is by involuntarily downloading malware programs. These programs are usually transmitted via email attachments, emails that link to other pages and websites that offer free downloads. To prevent this from happening, users need to make sure their emails are originating from a reliable source. Moreover, they should also stay clear from unknown and unreliable sites.

5. Physical Theft

A lot of people tend to make the terrible mistake of noting down their credentials on post-it notes or in their diaries/journals. Even though the method is not necessarily a high-tech hack, it still counts seeing how many people end up losing their information through physical theft.

6.Phishing scams

Lucky you! A Nigerian prince has selected you to help smuggle millions out of his country. For a little bit of effort — a few simple wire transfers — you'll get a substantial cut. What could be easier?
bet you're asking yourself, "Who would fall for that?" Well, tens of thousands of people do every year. That's why Nigerian scams, known as 419 scams, are still very popular.

Also See: How to protect your phone and avoid being hacked


Other versions might say you won a contest or have a job offer. Maybe someone wants to meet you, or you can make money for shipping some goods.

The catch is that you have to send in personal or banking information, or pay a fee. Of course, your information and money is going straight to hackers.
Use common sense before reacting to any e-mail. Scams rely on making you act quickly. If you think about things long enough, you can usually see through them. Just remember the old saying, "If it looks too good to be true … "

7. Trojan horse

Many hackers want to slip a virus on your computer. Once installed, a virus can record everything you type and send it back to the hacker. It can send out spam e-mail or attack other computers.
To do this, the hackers disguise the virus as something harmless. This is called a Trojan horse, or just Trojan.
One of the most popular ways to deliver a Trojan is a variation of the phishing e-mail scams.

For example, the e-mail might say it's from a shipping service, bank or other reputable company. There's been a problem with a transaction! To learn more, you have to open an e-mail attachment.

The attachment might look like a normal file, but it really contains a Trojan. Clicking on the file installs it before you can do anything.


See Also: Steps to Maximize your Wireless Network Security


Similar scams appear on Facebook and Twitter. You think you're going to watch a funny video your friend posted. Instead, a popup tells you to update your video player. The "update" file it provides is really a Trojan.
The key to defeat this tactic, as with phishing e-mails, is common sense. However, up-to-date security software is essential as well. It should detect and stop most Trojans before they can install.

8. Drive-by downloads

Security software is good, but it isn't always enough. Programs on your computer might have weaknesses that hackers can use to bypass security software.
To take advantage of these weaknesses, hackers set up websites embedded with viruses. You might get there by clicking a malicious link in a phishing e-mail or on social media. You can even find these sites in a search for popular programs or topics.

It isn't just malicious sites, though. Hackers can sneak malicious code on to legitimate websites. The code scans your computers for security holes. If it finds one, a virus can download and install without you doing anything.

To stay safe, you have to keep your programs up-to-date. Every month, Microsoft releases updates for Windows and Internet Explorer. These updates close critical security holes that hackers exploit.
Other critical programs to patch are Adobe's Flash and Reader, and Oracle's Java. Using old versions of these programs is like sending hackers an engraved invitation.

You should also be using the latest version of your programs. Anyone using Internet Explorer 6, 7 or 8 needs to update or switch browsers immediately.

9. Bypassing passwords

Hackers are masters of guessing account passwords. In the real world, however, very few hackers bother.
Instead, they go around passwords. They might get your password from a data breach at a company or website you use.

It's important that you use a different password for every account. That way, if a hacker discovers one, they can't get in to every account.
Perhaps the hacker slipped a virus on to your system. It records your passwords and sends them to the hacker; no guessing needed.
As mentioned above, you can stop viruses with up-to-date security software and programs.

A hacker might tackle your account's security question. Most security questions can be answered with information people post publicly.

You should change how you answer security questions. Give a random answer that has nothing to do with the question. That way, no one can guess it.

10. Using open Wi-Fi

sure you have a Wi-Fi network at home. Is it encrypted? If you don't know the answer, then it's probably, "no."
That means hackers, and neighbors, can connect to your network from outside. They can see and record everything you do. They can surf to bad websites and download illegal files on your connection. You might be getting a visit from the police.

You need to take a few minutes and secure your network. Trust me; it's worth it. The instructions will be in your Wi-Fi router's manual.


That being said, now that you know of the top 5 ways people end up getting hacked, you will be able to better protect yourself. Furthermore, you can also ensure you do not end up making similar mistakes. But then again, if you are not sure where to start and how to simplify the process of protecting yourself online, you can start by taking advantage of what PureVPN has to offer. Not only will you be able to enhance your online security and anonymity, but you can make sure nobody monitors or tracks your online traffic.
Share:

Security tips for Web Bloggers to stay protect online

Nowadays, people access blogs for exchanging ideas with others. Bloggers retain their blogs and constantly update them either for financial benefits of just out of passion.

Worldwide Blogging is considered as a serious business by many people as for some it is the main source of income, while other bloggers just get some extra income out of it. Keeping this in mind and also the fact that blogs are considered being the 5th most trustworthy source of information that you can find on the internet, if you own a blog you should definitely consider any available options for protecting it.

Malware infection on blogsMalware infection is a common “harm” that can be caused to your blog, believe it or not, as cyber criminals are very creative in doing their malicious work. Some sources of infection for your blog can be:

  • Your web hosting control panel
  • Infected advertisement banners
  • Breaking the administrator password
  • Code injections in the blog’s HTML
  • Plugins integrating with your blogging platform

Checking whether your blog is infectedWhen you created your blog, you may had thought that marketing and writing skills are all you needed to have. Well that would be wrong. A blog owner needs to know how to keep the blog data protected and which measures to take for staying protected against cyber-attacks. You can define whether your blog is infected by the presence of these symptoms:

  • The appearance of your blog has changed and your content and graphics replaced by others (website defacement).
  • Your blog’s visitors are prompted to download and install apps like Java or Flash player just upon their visit to the blog’s page.
  • You receive an error message when you try to access the blog.
  • You see banners about guns, drugs etc. appearing.
  • Immediately when you try to access the blog you get redirected to another site (URL redirects).
  • You receive notifications from your hosting providers about spam alerts coming from your site.
Here are 7 important tips for keeping your blog secure

1) Set strong passwords
Any accounts that are connected to your blog should have a strong password while you should avoid using the same password (despite its complexity) for all your accounts and apply 2 factor authentication. All the above should be combined with frequent password changes.

2) Control access to the blogYou should create a new administrator account and delete the existing default one as the cyber criminals tend to target these accounts. You also need to define the access rights for all the user accounts and delete those that belong to users to post irrelevant content.

3) Maintain an updated blogging platformBe sure to immediately apply any updates that are released for your platform as these will also close any recently discovered security holes.

4) Regularly backup your blogYour blog’s database needs to be regularly backed-up, so be sure to include this in your schedule. This can be done either with the use of a web hosting package (which includes automatic back-ups) or can be performed manually. At least 2 copies of the blog’s database should be retained.

5) Update your pluginsAlways keep your plugins updated as cyber criminals will use the vulnerabilities that exist for harming your blog and also delete any old plugins that you don’t use anymore.

6) Use only themes from trusted sourcesIf you plan to install a theme that was not obtained from a trusted source, just don’t as you risk of having malicious code installed on your website.

7) Protect your computer from malwareWhile ensuring your blog’s security is important, retaining a clean and safe computer, equipped with a good antivirus and a malware blocking tool is important too and of course always keeping it up to date by installing the latest application and security updates.

Share:

Best Free Email Client Software for Windows.

If you are looking for an alternative to Windows Mail or Outlook, or if you just bought Windows 7 and are now sans email management software, there are a plethora of email client options available for free.


An email client is, quite simply, a software program that enables you to effectively manage your email. Effective email management means you can improve and automate your lead management. This is especially important for people who have multiple email accounts or want multiple user access.

The email client doesn't replace your current email software, but it does help you to manage your emails and save them in ways that make them easy to access and search. You may need to try a few of these to find one that matches your requirements and provides the day to day lead management functionality you need.


Also Read: Why do we use the '@' symbol in email addresses?

Mozilla Thunderbird

This is a powerful email client tool for managing email and content. It allows you to work both online and offline so that lead management doesn’t have to stop when you don’t have internet access.
One of the best Mozilla Thunderbird features is its speed. It loads quickly even when contending with multiple RSS feeds and folders. Mozilla Thunderbird has excellent HTML support, junk mail filters and virus protection. Additional features include:
  • Tabbed e-mail
  • New search tools and indexing
  • Smart folders
  • Support for Firefox’s Personas
  • Simplified setup wizard
You can rest assured your email is secure with the S/MIME, message encryption, digital signing and phishing filters. Speed is also a positive Thunderbird feature and the comprehensive search tool is able to sync with results on desktop searches. Lead management is improved with the fast and powerful search tool. Find a list of features here.

Opera

Still a leading contender, although not as innovative as it once was, Opera is a solid email client with exceptional functionality.  Opera has an excellent search function with a customizable search bar, tab browsing and advanced bookmarking tools so you can remember all your favorite sites.
Opera integrates easily with chat and email and installation will only take a couple of minutes. Emails are stored on your hard drive, so you can continue with lead management tasks even when you are not online.
Get a full list of the Opera features here.

DreamMail

DreamMail is specifically designed for the user who has multiple email accounts which they need to access simultaneously. DreamMail supports POP3, eSMTP, Yahoo, Google SMTP, and even RSS feeds. You can customize your email templates and utilize the email signature management function. Advanced spam and message filtering helps you to manage your email effectively.
Additional features include:
  • Multiple users
  • Auto detection of server settings
  • Messages filtering
  • Filtering, sorting and searching
DreamMail has some drawbacks; it doesn’t support Thunderbird or IMAP which makes it unsuitable for many users who want to utilize it for effective lead management. 
Find a full list of features here.

Postbox Express

This is a feature-limited free version of Postbox’s emailing software. Postbox Express has the unique ability to import settings from any other mail client you currently employ. This makes setup a breeze as Postbox Express will sync with your current email seamlessly.

One of Postbox Express’ most handsome features is the search function; the speedy search engine will help you find what you are looking for in record time. It also organizes folders and messages in tabs (much like a web browser) which makes for a far more efficient workspace.

Postbox Express has extended social media functionality which adds a new dimension to your CRM. You can easily post things to your social media platforms, import profile photos and address books or update your status directly to LinkedIn, Facebook and Twitter.

Use add-ons to extend the functionality or make use of the community-translated language packs. Postbox Express is a functional, customizable email client that is definitely on the first-class mail client list. 
Have a look at a comprehensive list of all the Postbox Express features here.

Windows Live Mail

Compact and functional, Windows Live Mail offers users some nifty features. Installation takes some time and effort and you will have to enter your account server names, details and ports manually and importing your account details and emails from your other email programs may take a little fancy footwork. Once it’s up and running though, Windows Live Mail is impressive and easy to use. Some additional features include:
  • POP3 and IMAP support
  • Excellent junk mail filter
  • Accessible interface
  • Support for RSS feeds
  • Calendar
  • News groups
  • Excellent integration with other Microsoft programs
Get a full list of Windows Live Mail features here.

eM Client

The best thing about eM Client is its extensive features list. The free version gives users access to these fantastic features, but does limit you to 2 accounts. This makes it unsuitable for effective lead management of multiple accounts, but the free version is a good way to sample the goods.  Take eM Client for a test drive and, if you don’t have a ton of email accounts, you will really be able to take advantage of the extensive features list. You can import all your files from just about everywhere (including Outlook, Outlook Express, Thunderbird, Windows Mail etc.) Other attractive features include:
  • Import contacts from Facebook, Google or even CSV and vCard files
  • Support got S/MIME, SMTP, IMAP, POP3, SSL/TLS
  • Import messages from .eml files
  • Customize signatures
  • Templates
  • Calendar
  • Customizable contacts database
  • Skype integration
  • Google maps for address location
Get a full list of the extensive features here.

This is by no means an exhaustive list of the email client programs available for free use. However, it is a comprehensive collection of the most notable players and the ones that have the best functionality and widest range of features. You can utilize the free software for personal mail and to try out each email client until you find your perfect fit.

Most of the programs offer widgets and add-ons that you can choose to pay for to improve lead management functionality.
Share:

Saturday, August 6, 2016

HowTo Wirelessly Synchronize Contacts and Calendar on BlackBerry OS 10

if you use a device running BlackBerry OS 10 and need to figure out how to sync your contacts and calendar, you’ve come to the right place. These steps will lead you through the whole process, from downloading Outlook Hotmail Connector to performing your first sync.

1. Make Sure You Have a Microsoft Email Account

This might seem obvious, but to perform a wireless sync of your contacts and calendar on BlackBerry OS 10 using Outlook Hotmail Connector, you’ll first need a Microsoft email account. If you already have an Outlook, Hotmail or Windows Live email account, you’re good to go. If not, go to Outlook.com or Windows Live and set one up. Then jump back here for the next step.

2. Download and Install Outlook Hotmail Connector

Now you need to get Outlook Hotmail Connector on your PC. There are a couple of different versions depending on your computer’s hardware. If you have a 32-bit PC, click here. If you have a 64-bit PC, then click here. Follow the download and installation instructions, then move on to the next step.

3. Add Your Microsoft Email Account to Microsoft Outlook

Now you’re ready to add your Microsoft email account to Outlook on your computer. Start by opening Outlook and clicking File in the menu bar. Now click +Add Account, then select Email account. You’ll be prompted to enter your name, the email address you’re adding and the associated password. Do so and click Next. Then click Finish.

4. Copy Your Current Contacts and Calendar Data to Your New Email Profile in Outlook

Now you can copy over your existing contacts and calendar data to your new email profile in Outlook. Just follow the instructions, verifying that the Sync Contacts & Sync Calendar toggle is set to On. And that’s it. Now the contacts and calendars on your phone and computer will automatically synchronize via wireless connection.

Share:

Friday, August 5, 2016

How to Customize Your Windows 10 Experience

Windows 10 seems to be a winner. But, the only way to really know if a new operating system will meet the public’s needs and wants is to wait and see how they react. If they keep it when they buy a new computer, it’s a good system. 
If they put an older OS on a new computer, then it’s probably not. 





The reception of Windows 10 is positive overall. 
With Windows 10, as with all of Microsoft’s operating systems so far, there are programs, apps, and other tools that can be turned on and used. However, they’re not necessary or useful for every user, so it’s important to choose what’s right for you.

 ALSO READ: keyboard shortcuts for Windows10


According to a report about personal technology in the New York Times, many of the optional features are related to networking, system administration, and software development, but as with earlier versions of Windows, there are also options that “regular” users may wish to use. The first step is to go to the Windows Features option box and look at the different menus and screens and determine what is possible for the version of Windows you have.

The Windows Features box, when selected, will show the user a list of different applications and programs that can be enabled or disabled. If there is a checkmark in the box next to the option, the option is already on. The “Start” menu is one of the first places the technophiles suggest a new user of Windows 10 begins their search to see what they do want to turn on or off.

The Start Menu

Most people will be perfectly satisfied with the default version of the start menu. It is the same version of “Start” that they accessed with Windows 7 with a few nuggets from Windows 8.1 that proved popular. One difference is there is a Tablet mode with this version of Windows and it has been made for 2 in 1 devices and allows easy access to the start menu when the keyboard has been removed.

ALSO READ: Windows 10: tips and tricks


The folders that the user sees when they go to the start menu can also be customized. This allows the user to have the folders they use the most at a convenient location. All the user has to do is go to settings, then personalization, then start and add to or remove apps or folders, or other things that they use a lot. Perhaps it is Netflix that the user wants to have access easily and quickly. It is easy to add this program to the Start Menu.

Cortana



Windows 10 has its own personal assistant called Cortana. Setting up Cortana is easy as it will ask (in writing), very simply what you want to be called, and if you want different customization for Cortana too. If you think that Cortana is a little too Big Brother to your Winston Smith, you can leave this program off too.  If you like Cortana, you can teach her to know your voice only, or you can let any voice access her.

Update Apps
When you upgrade to Windows 10, you can upgrade many of the apps that you have already received from Windows by going to the Windows Store and following the prompts from the Downloads and Installs pages as they relate to Windows 10. This is also where a user can ensure they have all of the updates to Windows 10 installed on their computer and their system.

Microsoft Edge


Windows 10 has a new Microsoft browser called Microsoft Edge. Using Microsoft Edge will not stop you from using other browsers, but Edge will be there for you to use if you like, and if you choose, you can make it your default browser. 

Quick Action Buttons



There is now an Action Center on the desktop for different devices. This Action Center will alert users about apps and systems that might need to have upgrades or changes made for them. As part of the Action Center, there are also Quick Action buttons that allow the user to click them and go to different options that the user visits often. 

Optional Features on Windows 10
The truth is, there are dozens of features that users can turn off or turn on with any operating system. Most users won’t even know that these options exist, and if they did know of their existence, they wouldn’t mess with them. 

Examples (there are dozens of optional features):

    .NET Framework 3.5 — This is needed for people who want to run certain applications
    Active Directory Lightweight Director Services — This is used to authenticate users on a network
    Embedded Shell Launcher — Use this if you want to replace Windows 10’s Explorer.exe shell with a custom shell. 
    Hyper V — This is a virtualization tool

People very involved in technology may turn these optional features (and the dozens of other options) on or off, but some will automatically turn on if a new download requires it. Most people won’t consider changing the factory settings, but should know that they are there if needed.

Windows 10 is proving to be popular with users and is recognized as a convenient and improved operating system.
Share:

Free Video Apps to Capture Your Creativity

All you need now are some apps to make the most of both. We’ve rounded up a handful of great apps designed for mobile videographers of all levels, from budding auteurs to friends capturing friends’ antics to families looking for fun creative outlets for their kids. The best part? You can get started with all of them without paying a penny up front.



This one has potential to keep kids – and geeky grown-ups – busy for hours on end by turning anyone who can hold a camera steady into an expert special-effects director. All you have to do is select one of the available scenes or effects – like a meteor smashing into the ground, say, or an avalanche – and then point the camera at your subject. Press record for the specified amount of time, hit the OK button afterwards, and around five seconds later you’ll have your very own professionally rendered CGI Hollywood action scene starring your friends, family and even your toys or pets. It comes with plenty of free scenes to choose from – including one in which a Star Wars BB-8 will zap the subject of your choice (the app was built by J.J. Abrams’s Bad Robot production company) – and you can purchase more scenes in packs for just a couple of bucks each.
Action Movie FX
Free with in-app purchases | iOS


Hailing from the image gurus at Instagram, Boomerang doesn’t capture true video but instead short bursts of photos that it then runs back and forth in an infinite loop, a bit like a GIF. Boomerangs can make their subjects appear to defy physics – like a drink forever pouring and un-pouring itself – or transform a friend’s casual smile into a study in muscle movement. And it’s incredibly easy to use: just point your phone at your subject and hit record. The app takes care of the rest. Another couple of taps will let you instantly share your boomerangs however you like; not just on Instagram but also Facebook, Twitter, text message or email.
Boomerang from Instagram
Free | Android, iOS




This awesomely accessible video editor is so well designed that it was recently purchased by GoPro to give its extreme-sports camera customers the power to quickly and easily edit footage on mobile devices. But you don’t need a GoPro camera to use it. You can import videos (and photos) from your device or a cloud service. Then in just a few simple steps, Splice will stitch everything together, automatically adding transitions and the music of your choice. Once all of your scenes have been put together, you can edit speed, add effects, crop out bits of the frame you don’t want, and add text or narration. It’s a quick and painless way to put together professional-looking videos from your library while on the go.
Splice
Free with in-app purchases | iOS



Give a tablet loaded with this app to an imaginative kid and you probably won’t see them again for the rest of the day. They can get started with virtually no instruction. Just open the app, point it at a scene – like a table set up with action figures or dolls – and then start tapping the onscreen shutter button, moving subjects a smidgeon at a time between shots to create a sense of movement. You can play back your progress at any point, adjusting speed and adding your own voice. It’s as simple and easy as animation gets, yet it opens the door to endless possibilities, from Lego movies to cartoons made from paper cutouts. No kids? Consider using it to document the progress of a home reno or backyard project, capture the magic of blooming flowers, or record the gathering of storm clouds.
Stop Motion Studio
Free with in-app purchases | Android, iOS, Windows Phone


Want quick Web celebrity? Triller could be the ticket. It will let you put together an (almost) MTV-worthy music video in a matter of minutes. Just pick a song from the app’s featured list of top 40 artists or one your own library, select the length you’d like your video to be, then record yourself performing it as many times and using as many filters and effects as you like. Once you’re done, the app will create a preliminary video by automatically stitching together segments from each of your takes. Unhappy with the final cut? No problem. You can easily shorten or lengthen each segment with a quick slide of your finger. When finished, you can share it with your friends or upload it to the Triller community. Then just sit back and wait (hope?) for a bit of viral fame.
Triller
Free | Android, iOS

Share:

VMware Launches AirWatch Express to Speed Up and Simplify Mobile Device Management

 VMware, Inc. (NYSE: VMW), a global leader in cloud infrastructure and business mobility, today releasedAirWatch® Express™, a simple mobile device management (MDM) cloud solution designed to get devices up and running quickly. AirWatch Express makes it easy to configure devices with apps, email and Wi-Fi, while enabling the data encryption and security that is necessary in today’s environment. 

AirWatch Express delivers an affordable, consumer-friendly MDM built on the same platform as VMware AirWatch, the leading enterprise mobility management solution. With this simplified solution, more organizations globally can protect their company by securing their employee’s devices in just a few clicks.

“The transformative nature of mobility has cause the mobile endpoint to become the primary computing device for many businesses, and these same organizations are struggling to keep up with the device and app proliferation. The truth is managing mobile devices can be a timely and complicated process,” said Blake Brannon, vice president of Product Marketing, End-User Computing, VMware. “Without the need for technical knowledge or additional IT staff, AirWatch Express empowers organizations to support an ever increasing mobile workforce.”

Companies with smaller or no IT departments still have the same basic mobile needs as enterprises, and AirWatch Express is an affordable and intuitive solution that doesn’t require extensive set up or training to keep up with the fast pace of mobile technology. The cloud-based solution delivers an intuitive MDM experience and is available for iOS, macOS, Android and Windows 10.

AirWatch Express also takes into account the security risks associated with employees using their smartphones, tablets and laptops for work purposes. According to the 2016 Data Breach Investigations Report1, prepared by Verizon, the three most common mobile security breach incidents were a result of configuration or end user issues. AirWatch Express reduces these security risks by enabling companies to control these configurations, prevent data leakage, remotely wipe the device of work data if it’s lost or stolen, and more.

AirWatch Express is the start for an organization’s enterprise mobility program. When facing more advanced use cases, customers can simply upgrade to another AirWatch bundle to support an expanded business mobility strategy.
Share:

Things You Didn't Know Your Android Smartphone

As smartphones have become more powerful, they've taken on more and more roles: digital camera, MP3 player, GPS navigator, flashlight and more. Add a third-party app store such as the Google Play Store to the mix and the number of ways you can use your phone grows even further.


You can take a screen shot on your Android device just by swiping your hand across the screen. Or, if you need to swiftly silence a pesky call, place your hand over the phone to mute it. To set this up, go into Settings, then choose My Device. Select Motions and Gestures and you’ll have the option to enable features such as Air gesture, Motion and Palm motion.

Use Your Device as a Hard Drive

Why carry around thumb drives when your Android device doubles as an external hard drive? Simply connect your device to a computer using its USB cable and follow these instructions here for set-up. Once you’ve done so, you can instantly start uploading and saving files onto your phone.  

Turn on Tethering

Away from home and need to access the Web from your laptop? Tethering is your best bet. It allows your computer to go online using your phone’s data. To do this on a Samsung S4, S5 or S6, first connect your Android device to your computer with its USB cable. Then go into your phone’s Settings and look under your Network connections. Select More Networks and then Tethering. Make sure USB tethering is turned on and voilĂ , you can now browse the internet on your laptop. It sure beats looking for a coffee shop with free Wi-Fi or having to pay for Wi-Fi at a hotel. Click here to learn more about tethering your Android phone.

Also Read: What is an Android mobile phone ?


Control Your Data

Worried about overage charges? We don’t blame you. Luckily, the latest Android devices allow you to keep a stern eye on your data usage. All you have to do is go into your Settings and select Data usage. You can set mobile data limits, see exactly how much data you use per cycle and find out which apps have been eating up most of your data. You even have the option to turn your data off (don’t worry: you can always switch it back on). Click here to learn more about controlling your data usage.

Say Cheese!

Did you know you can snap photos and selfies on your Android device without even lifting your finger to click the shutter button? Launch the camera app, select the Gear icon and then tap the Microphone icon or tap on Voice Control to enable voice-control features. Now you can take pictures via voice command, by saying words such as “cheese,” “smile” and “shoot.”

Snap a Pic While Recording

Want to take a picture while recording a video? No problem. Once you’ve begun shooting, just tap the camera icon on the screen. A still photo will be saved in your gallery while you carry on shooting your video.

Share with Your Android Friends

Thanks to near-field-communication (NFC) technology, you can share just about anything – files, videos, music, photos, apps, etc. ­– with other Android users by touching one NFC-enabled device to another. Click here to see how it’s done.

Here’s to Your Health

The latest Samsung Galaxy phones come with the S Health app, which can check your heart rate and blood pressure. Simply press your finger into the app’s sensor and it will document all your health levels. It can also help you get in shape by tracking your daily activities, meals and fitness goals. Click here to learn more about S Health.

Face Unlock

You can unlock your phone with passwords, patterns and PINs, but did you know you can also open it with your face? That’s right: your Android device can recognize your face and, upon seeing you gazing into the front-facing camera, will unlock immediately. Click here to see how it’s done.

You May Like: 10 Innovative Ways of Using a Smart phone


DIY Speakers

Need to amplify your phone’s sound in a pinch? Place your Android device, speaker-end down, into a cup or bowl. The rounded shape of the object will give your device a louder, fuller sound. Click here to learn more about making your own smartphone speakers.
Share:

Search This Blog

Popular Posts

Blogger Tutorials

Sample Text

Copyright © Cebause | Powered by Blogger
Design by SimpleWpThemes | Blogger Theme by NewBloggerThemes.com