Friday 25 March 2016

comeing day's Router Will Transmit Both Internet and Energy With New WiFi Technology

coming day's Router Will Transmit Both Internet and Energy With New WiFi Technology

 A new technology called Po-WiFi is here to      change the way we use our devices.                                                                                             According to a team of engineers at the University of Washington, who is behind the Po-WiFi, for the first time it’s possible to use WiFi devices to power the sensors and other devices. 

The Power Over WiFi (Po-WiFi) system uses a WiFi router and its WiFi signals to power the devices.

According to the team of engineers at the University of Washington, who is behind the Po-WiFi, for the first time it’s possible to use WiFi devices to power the sensors and other devices.

“We also made a system that can co-exist as a WiFi router and a power source — it doesn’t degrade the quality of your WiFi signals while it’s powering devices,” they said.

The final paper based on the Po WiFi technology will be presented in December at the Association for Computing Machinery’s CoNEXT 2015 conference in Heidelberg, Germany.

The Internet of Things is becoming a much bigger phenomenon with each passing day, and this Po-WiFi tech could make IoT more relevant in the upcoming future years. Using Po-WiFi, one could harvest the energy in WiFi signals and meet the needs of low-power sensors in devices like cameras, wearable's etc.

During the research, it was found that the peak energy in the ordinary WiFi signals is enough to charge/run these little gizmos, but it still remains utilized due to the power leakage.

The research team has optimized a router to send more power packets on WiFi channels that are not being used and added some sensors into low-power devices to feed on these signals. This way, the team was able to make Po-WiFi a reality.

“In the future, Po-WiFi could leverage technology power scaling to further improve the efficiency of the system to enable operation at larger distances and power numerous more sensors and applications,” said co-author Shyam Gollakota, assistant professor of computer science and engineering.

Right now Po-WiFi generates small amounts of power. However, the team believes that Po-WiFi could be developed further and made more efficient.

Monday 21 March 2016

HOW TO REMOVE REMOVE WRITE PROTECTION IN PENDRIVE ?


HOW TO REMOVE REMOVE WRITE PROTECTION IN PENDRIVE ?

 Plug in your pen-drive into your USB 2.0 on your computer.make sure the computer has read your pen-drive, you can go down to your bottom left on Windows, you will notice a small USB drive icon. If you click that, it will say “Removable Disk.” This means that the pen-drive has been read successfully.

 You can take a backup of your files from the pen-drive or Memory card, Because we here are going to format it Completely.

Next we need to open up command prompt. You can do this by going to “Start”, then just search for “Command Prompt”, or you can simply just type in “cmd” and command prompt should pop up.

In the command prompt, type in the drive letter of your pen drive with a colon at the end, like this: “ F: ” but without the quotation marks.

After putting in the previous command, type in “format” without the quotation marks. Here’s how to do it: “format F:” and then press “Enter.”

This should get the process started to Remove write protection in Pendrive. Make sure that you are entering the right command with the right drive letter. If you have more than one pen drive plugged in, make sure that you do select the right one as you can accidentally format the wrong drive, causing loss of data.

 After the process is complete, proceed to closing command prompt.

Thursday 17 March 2016

Sending Self Destructing Message To Anyone simply

Send Self Destructing Message To Anyone Confidentially

The method is very simple as you’ve to just follow the steps

First of all open https://privnote.com in your browser .

Now in the New note field type your secret message in the box .

There is no limit EX: you can type whatever you want.

After, Click on Show option which is located on the right-hand side down corner.

Now set the options with per your requirements.

You can select self-destruct option by which you can select when to automatically delete messages.

You can choose any options:: 1 hours from now, 24 hours from now, 7 days from now, or even 30 days from now.

 You can set it to auto-self-destruct within 1 to 30 days.

                     
You can also set password for private and secure reading.

Now click on Create Note

After that,  you will get a link, link will get generated for your corresponding note
Now copy that link and send it to your friends or anyone whom you want to send.

The note will self-destruct after being read by the recipient.

How To Send Encrypted Mails In Gmail

How To Send Encrypted Mails In Gmail (it work in only Google Chrome)

Open Google Chrome

download and install the extension named as Secure Mail for Gmail Extension.

Now in the extension page , click on Add to Chrome button and then a pop up will appear where you required to click on the button Add.

After that wait for the extension to get downloaded.

after downloading it’s get added to your Chrome Browser.

open the Gmail from which you want to send encrypted mails.

Now you will see a lock sign after Compose

Click on that lock sign.

Now you will see a box to send encrypted mails.

From There enter all your details regarding mail address, mail subject ,etc and then finally click on send.

You need to enter the password there to secure your email with password .

Now simply send the mail and your encrypted mail will get sent .

Now if the want to open this mail , there will need of this extension and the same password to decrypt the mail.

That’s it. You’re done now.

Tuesday 15 March 2016

WhatsApp is going to start encrypting voice calls and group messages in the coming weeks



Whats-app is going to start encrypting voice calls and group messages 


Whats-app will planning to encrypt voice calls and groups messages.  The report also highlighted Whats-app's troubles in Brazil, where authorities arrested a Facebook executive on March 1.Whats-app had told investigators that it lacked the technical ability to provide messages sent by drug traffickers. Whats-app already offers Android and iPhone users encrypted messaging. 


As per the report, Facebook, Google, and Snap-chat may also be working to improve the encryption provided by their services. Facebook is planning to improve the security of Messenger and offer encryption on voice calls. while Google is looking into encrypted email technology. All this focus on encryption and security comes after Apple’s battle with the FBI in which Apple refused to grant the agency access to the iPhone belonging to the accused in the San Bernardo shooting. 

Sunday 13 March 2016

We Can Use Iphone As Microphone in Windows PC

We Can Use iPhone As Microphone in Windows PC

Today, I show you How To Use I phone As Microphone . Yes, it’s possible.

Requirements :

3.5 mm AUX cable
Megaphone App

Steps to To Use iPhone As Microphone :

 you need to download and install the app named as  Megaphone Free that will allow you to get your device Mic accessed on PC in your iPhone.

After downloading and installing the app launch it in your iPhone and then adjust the sensitivity by using the volume buttons of the device.

After that connect the one end of the AUX cable to your iPhone and the other end to your PC’s microphone jack in order to make physical connectivity between them.

Now form your Windows PC , Right click on the sound icon and then select Playback Devices. From there click on Recording section.



After that make sure that when you speak in your iPhone then the bars move on which will make sure that the setup is working perfectly.

Bypass Android Lock Screen Pattern from Recovery Mode

Bypass Android Lock Screen Pattern from Recovery Mode

  

             Follow the instruction carefully to get into the recovery mode and Bypass Android Lock Screen Pattern from Recovery Mode.


  1.  Switch off your Android Mobile for 1-2 minutes.
  2. After switching off Mobile for 1-2 minutes, press volume button, First Up and Secondly Down ( Means, First Increase your volume and then decrease ) for one time only.
  3. Now, Press Power Button ( Switch off/on button ) and hold it too long with Volume Up Button.
  4. You will now see Android Recovery mode
  5. In Android Recovery mode you will get many option like ‘Wipe cache partition’, ‘Wipe Data/Factory Reset’, ‘Apply Updates’, ‘Reboot System’
  6. From there select ‘Delete all user Data’ / ‘Factory Reset’
  7. You are Done. You have successfully unlock your Android Pattern and Bypass Android Lock Screen Pattern from Recovery Mode. 

        Note : You will lost your Android Data using this method

              It Not Works goto Google And Search:: How to Bypass Android Lock Screen Pattern from Recovery Mode in (YOUR MOBILE MODEL).