AllShare Play technology

Posted by Unknown Kamis, 30 Agustus 2012 0 komentar
Do you know the AllShare Play technology? Access all your content anywhere and anytime! http://bit.ly/OkCGnF


Baca Selengkapnya ....

Galaxy S3 leak the official ROM Android 4.1.1 Jelly Bean [TUTORIAL]

Posted by Unknown 0 komentar
Samsung Galaxy S3, the official ROM Android 4.1.1 Jelly Bean signed I9300XXDLH8 already available to download



If you do not want to wait for the official update Galaxy S3 Android 4.1.1 Jelly Bean initially expected tonight, know that ROM signed, stamped version number I9300XXDLH8 has just fuiter and is of already available for download.
To install, without waiting, Android Jelly Bean 4.1.1 on your Galaxy S3

  • Download the following file containing the ROM and Odin 4.3
  • Unzip the archive
  • Start Odin 3.4
  • Reboot your phone into download mode by pressing the Home button, Volume Down and Power
  • Connect your Galaxy S3 to your computer and wait to see the logo appear yellow Odin
  • Add to I9300XXDLH8_I9300OXADLH8_I9300XXLH8_HOME.tar.md5 PDA
  • Make sure the Re-Partition is unchecked
  • Reflash the ROM and wait a few minutes

If you encounter problems with the firmware

  • Switch to Recovery mode by simultaneously pressing the Home, Volume Up and Power
  • Make a WIPE FACTORY RESET


Baca Selengkapnya ....

The Samsung Galaxy Note 2 revealed: Samsung Unpacked 2012

Posted by Unknown Rabu, 29 Agustus 2012 0 komentar
The wait is over. After months of rumors and leaks, it is now that we know what it's like Samsung Galaxy Note 2. Samsung Unpacked The event starts at 19h Berlin.

Demonstration of the Galaxy Note 2
The S-Pen is anything but an accessory. Use Note 2 seems unthinkable without him. It starts to make me really want the Galaxy Note 2!


functionality of the Galaxy Note 2
The convenience of Note 2 is highlighted with its system of preview and S-Pen in the heart of the use of "phablet."


Galaxy Tab 2 and Galaxy Tab 10.1 the perfect combo

Specifications confirmed




Technical characteristics of the Galaxy Note 2!

The event has not started it already leaking everywhere! Here are the first technical characteristics:
Android Version: 4.1.1Jelly Bean
Display: 5.5 "Super AMOLEDHD with 1280 × 720 Resolution (720p - 16:9)
CPU: Samsung's Exynos4412@1.6GHz
GPU: ARM Mali-400MP's @ 400MHz
RAM: 2GB
Storage: 16GB, 32GB and64GB
MicroSD Slot: Yes
Camera: 8MP (1080p HD) Rear Facing Camera 1.9MP + (720p HD) Front Facing Camera
Battery: 3,100 MAh



Baca Selengkapnya ....

TUTORIAL: Installing Android 4.1 Jelly Bean on Galaxy S i9000 via CyanogenMod 10

Posted by Unknown 0 komentar

with CyanogenMod10 your Galaxy S i9000 will go under 4.1 Jelly Bean through this tutorial.
Owners of Samsung Galaxy S i9000 can rejoice, he will be able to take advantage of Android 4.1 Jelly Bean by CyanogenMod 10!
Without having not directly Samsung Cyanogen arrange things and has put together a nice Custom ROM. We'll see how to install it!
It is important to note that this is the moment a version of CyanogenMod Nightly 10 which evolves very quickly.


Before starting anything, back up your data! This is very important and it allows you to manipulation without fear. There are several useful applications to save your SMS, contacts, call log.


Once installed Custom ROM, you just simply re-download the Google Play application is to restore.
Jelly Bean to install 4.1, your Galaxy S must be rooted. We'll see how in the following. If your Galaxy S is already Roote, skip to the next step.

How rooter its Samsung Galaxy S i9000 and install CWM Recovery


Download here footer kernel for your firmware. To find out which is your firmware on your Galaxy S go to Settings -> About device -> Build number. You will find some echoes that looks like this: FROYO.xxJPy.
Unzip the archive you télécahrgé for a file. Tar
Download the software and open Odin Windows, check the box Re-Partition is unchecked.
Place. Tar file in PDA box
Skip the phone to Download by pressing the Volume Down + Power + Home
Connect to the computer via USB
Start flashing and wait
At the end of the process, your device will reboot. You can disconnect your phone from your computer when Odin display PASS!
To verify that the root is enabled, install Root Checker from the Android Market.


Install Android 4.1.1 CyanogenMod 10 on Galaxy s i9000


Prerequisites:
A Galaxy S i9000
The latest version of CyanogenMod Custom ROM you will find 10 available on the website of CyanogenMod.

Installation:
Connect the Galaxy S to the PC via the USB cable.
Enable USB storage on the phone. If it does not appear automatically, disconnect the cable, go to "Settings> No son and Networking> USB> Mass Storage." Click on it and then connect the USB cable.
Drag the downloaded archive on the CyanogenMod site in the mobile memory.
Disconnect the USB cable and turn off the mobile.
  Turn on the Galaxy S in Recovery mode by pressing, without order and without releasing the "Volume Up + Home + Power" (key "Home" is the black square at the bottom of the screen).
Once in ClockworkMod Recovery, navigate using the buttons "Volume" to "Install zip from sdcard".
Confirm by pressing "Power" and "Home".
Select "Choose zip from sdcard" or "Choose zip from sdcard Internal".
Search the archive and install CyanogenMod ("YES-Install update-cm-10-20120820-NIGHTLY-galaxysmtd.zip")
To "Back"> "Back"> "Reboot system Now".
Wait until the phone turns on completely.

Installing Google apps


Prerequisites:
The archive, which can be found HERE.
Installation:
Connect the Galaxy S to the PC via the USB cable.
Enable USB storage on the phone. If it does not appear automatically, disconnect the cable, go to "Settings> No son and Networking> USB> Mass Storage". Click on it and then connect the USB cable.
Drag archive archive Google applications in the mobile memory.
Disconnect the USB cable and turn off the mobile.
  Turn on the Galaxy S in Recovery mode by pressing, without order and without releasing the "Volume Up + Home + Power" (key "Home" is the black square at the bottom of the screen).
Once in ClockworkMod Recovery, navigate using the buttons "Volume" to "Install zip from sdcard".
Confirm by pressing "Power" and "Home".
Select "Choose zip from sdcard" or "Choose zip from sdcard Internal".
Search the archive and install CyanogenMod ("YES-Install gapps-ics-20120317-signed.zip")
To "Back"> "Back"> "Reboot system Now".
Wait until the phone turns on completely.
You can now enjoy Android 4.1 Jelly Bean on your Galaxy S i9000 :)







Baca Selengkapnya ....

Cheecoting: 3D Game for iOS and Android

Posted by Unknown 0 komentar

We appreciate everything in this game, since the 3D effects to music, playing marbles is one or more (up to 4) to share a nice moment with sometimes a bit of adrenaline.

This can of course choose the color of his balls, turning the circuits with dishes and fast straights with obstacles, holes and jumps.

We just hit a ball at our fingertips to run it in the hope that the trajectory will be the best.

The rules of games are those games Beaches Italian beads.



Can share their score with friends via FaceBook. The game works on all platforms from Android V2.1.

Baca Selengkapnya ....

Apple iPhone 4S now your resumes ... So you can buy ...

Posted by Unknown 0 komentar

If we had yet another sign of the impending arrival of the new iPhone (but there was no need) it comes from Apple, which has extended its program to buy products to its latest model: iPhone 4S.
We had discussed the implementation of this service by Apple last January here.
Now, the iPhone 4S that were not available until recently to recovery under the U.S. as noted by TechCrunch, have a market value at Apple, in addition to other conventional recovery services and reselling used eg on our forum.
For example, a 16 GB iPhone 4S in good condition, functioning and have never been in contact with the water will be taken 309 euros.


The price drops to 200 euros if ever the screen is broken.
You can play with the assessor by Apple
One way to ensure that the machine will be based on its condition, after re-sold or recycled properly. But it will also certainly happy around you or selling opportunity. We had discussed this issue through the study discussed here
Who has used the service from Apple? What solution do you intend to use to possibly buy an iPhone 5?


Baca Selengkapnya ....

How to Write Colorful Text On Facebook Chat!

Posted by Unknown Kamis, 23 Agustus 2012 0 komentar
Whenever am chatting with friends on Facebook, I always make my chatting moments with friends interesting and unique by changing the text color in the chat box. Colors they say it influence the mood of humans and it gives extra pleasure & excitement on Facebook chat.
Facebook Trick Logo
Facebook itself doesn’t support the use of colors and fonts because of some reasons. Facebook put restrictions on the use of fonts and colors for the sake of efficiency and speed.

Fonts and colors can cause delay and overloading so they are not allowed in Facebook wall section.
Facebook Colored text
Facebook Color Text Generator: In Facebook chat section, you can make use of colorful text. This can be done with some kind of free Facebook colored text generator that will make your chatting moments with buddy on Facebook look cool & fun.

Now, all you got to do with this generator is to copy and paste the code generated into your Facebook chat and the result will be a colorful large font in your Facebook chat. A preview will also be shown to you as you type the text into the generator.
Facebook Chat Box
Please feel free to comment if you liked this trick!

Baca Selengkapnya ....

Samsung tease l’annonce du Galaxy Note 2

Posted by Unknown Selasa, 21 Agustus 2012 0 komentar
August 29 Add to your calendar, the Samsung Galaxy Note 2 will be announced!


After the success of the first Galaxy Tab (sold several million copies), Samsung is riding the wave "tablet? smartphone? "And announce the IFA successor. The screen will be this time bigger, with a diagonal of 5.5 inches near!

Major announcements manufacturer all take place in events "Unpacked," and the next is scheduled for August 29. To raise the buzz, the Korean just put online a video that does not help unfortunately not new information. The emphasis here is focused on the stylus, thanks to embedded applications that would be the best tool to draw in all circumstances according to Samsung.

Baca Selengkapnya ....

Samsung Galaxy Player 5.8: Some information has leaked ...

Posted by Unknown 0 komentar
Samsung should take the IFA to unveil the Samsung Galaxy Player 5.8. The Galaxy Player is the iPod Touch killer Android, Samsung has already released many models ... In reality, it does not lack much to be a smartphone, just a GSM/3G compatibility.



In fact, the Galaxy Player incorporates a GPS, an accelerometer, a compass, Bluetooth, WiFi ... prerequisites to see a camera signed by Google (and integrate Google services including Google Play). In short, a great player - and this little tablet - unfolds on SAMOBILE timidly with a photo and a few characteristics:

5.8 inch screen resolution 960 x 540 pixels (qHD)
Dual-core processor
1 GB of RAM
Sensors 3 and 1.3 megapixel
2500 mAh battery
Android 4.0 (ICS)
In short, the new Galaxy Player 5.8 Player join the family consisting of 2.8, 3.2, 4, 4.2 and 5. We have no price or release date, however the screen resolution does not motivate us to investigate further ...

Baca Selengkapnya ....

Practice iOS 5: Use the iPhone as a flash signal during a call

Posted by Unknown 0 komentar

Waiting to guide you to discover the new iOS 6 is a feature with iOS 5 appeared that we had not yet discussed in our many tutorials to find here on which this article will focus practice.
Thus, typically alerts sound or vibration resulted in (you can even customize) also be identified through this flash on the iPhone 4 and 4S. These are all alerts: call, SMS and other notifications that can trigger the flash on the iPhone.
The start is very simple, though the setting is a bit hidden in accessibility options:
To turn this option:

  • Go to the application "Settings"
  • Choose the "General" and then Accessibility
  • Scroll down the list of options until you find "LED Flash for Alerts"
  • Then go to option 1
  • There you are, your iPhone will now "flash" when you get a alert!


Baca Selengkapnya ....

For the impatient: the front and the screen of the iPhone 5

Posted by Unknown 0 komentar

Certainly, leaks about the next iPhone hardware are surprisingly numerous this year, as we have seen in recent weeks.
This steady stream did not seem to dry up, because after we saw this weekend sets appear screen + touch sensors, today, it goes one step further:
Similar parts are now sold on a site Asian ...


Baca Selengkapnya ....

Motorola complaint against Apple for violation of patents and demanded a ban on sale of iPhone, iPad and Mac ...

Posted by Unknown Minggu, 19 Agustus 2012 0 komentar


While the U.S. lawsuit against Apple and Samsung coming to an end, it is another battle that will engage the courts and between two other giants always around the phone and iPhone. Indeed we learn via Bloomberg Motorola, now owned by Google which was referred to the plans here this week filed a complaint against Apple.
This concerns in particular Siri but overall are seven patents that Motorola would be affected. Motorola asks for a ban on sales to U.S. iPhone, iPad and Mac computers:
Among the patents, there is Siri, the voice recognition system and an intelligent assistant offered by Apple on the iPhone 4S and iPad third generation, but also localized alerts (see the application to recall in detail here ) notification for incoming emails or media player.
Motorola says mail trying to solve these problems with Apple patent but the company would not want to discuss a solution license.
Another complaint of Motorola in Germany had found a favorable echo in court last December without real consequences have been identified to date. Another judgment on a case between Motorola should already see a judgment on August 24.
Remains that the only winners so far in the clashes that multiply are lawyers patents in these areas ... Who will be the new bread on the board!


Baca Selengkapnya ....

The AudioGlove

Posted by Unknown 0 komentar

Accessory manufacturers have often turned to the passive amplification to try to boost the sound of our little machines. This included leading the AirCurve Griffin, but also less conventional solutions such as the horn or iPhone it less cumbersome.
But the solution proposed by the AudioGlove or audio glove literally is more discreet and undoubtedly more convenient:
It is a shell iPhone quite outside, but which has the property of sliding down to produce an effect sounding.





Production will be launched if the sum of $ 30,000 is reached, the knowledge that is now over $ 11,000. The shells are available in several colors sold about $ 35, but can be pre-booked from $ 20.
A draft hull amp is also thinking for the iPad.

Baca Selengkapnya ....

Download Windows 8 Evaluation Copy for developers!

Posted by Unknown Jumat, 17 Agustus 2012 0 komentar
About This Evaluation: This evaluation provides a 90-day trial of Windows 8 Enterprise edition. Both 32-bit and 64-bit versions are available as ISO images in the following languages: Chinese (Simplified), Chinese (Traditional), English, English (UK), French, German, Italian, Japanese, Korean, Portuguese (Brazil), and Spanish.

In order to use this evaluation, you must register and the product must be activated online with Microsoft-hosted activation and validation services. Microsoft does not provide technical support for this software.
Windows 8 logo Wallpaper
System Requirements
Windows 8 works on the same hardware that powers Windows 7:
  • Processor: 1 gigahertz (GHz) or faster
  • RAM: 1 gigabyte (GB) (32-bit) or 2 GB (64-bit)
  • Hard disk space: 20 GB
  • Graphics card: Microsoft DirectX 9 graphics device with WDDM driver
Additional requirements to use certain features:
  • To use touch, you need a tablet or a monitor that supports multitouch.
  • To access the Windows Store and to download and run apps, you need an active Internet connection and a screen resolution of at least 1024 x 768.
  • To snap apps, you need a screen resolution of at least 1366 x 768.
  • Internet access (ISP fees might apply)
Note: Please read this official article from Microsoft before download!

Select the Version You Want to Download

Download the 32-bit (x86) version
Download the 64-bit (x64) version

Please feel free to leave comment!

Baca Selengkapnya ....

Ek Tha Tiger [pDVD] Full Movie Direct Download Link!

Posted by Unknown Rabu, 15 Agustus 2012 0 komentar
Hello Salman fans, Can't wait to watch the latest movie 'Ek Tha Tiger'! so go on... here i m providing you the one click direct download link of this movie.
Ek Tha Tiger Poster
Ek Tha Tiger
Short Story: In the dark world of intelligence and espionage. all information is guarded in the name of national security... But some stories escape the fiercely guarded classified files... stories that become legends. This is one such story... a story that shook the very foundation of this dark world.

In a government neighborhood in New Delhi, there lived a rugged, handsome and mysterious bachelor about whom his neighbors knew nothing. That was because he was India`s top spy, an officer with the Research and Analysis Wing (RAW), India`s external intelligence agency.

This man was known even in official corridors as TIGER (Salman Khan). Tiger is sent on a relatively easy and safe mission to Dublin, Ireland to observe a scientist of Indian origin who is suspected of sharing his research findings with the Pakistan defense establishment. Tiger attempts to meet the scientist but is not successful. He tries to befriend the scientist`s part time home caretaker, Zoya (Katrina Kaif).

As Tiger begins to get closer to Zoya... he begins to discover his human side. For the first time in his life, Tiger falls in love... What follows is a tumultuous journey that Tiger and Zoya embark upon, battling the dark world of intelligence and espionage that forbids its soldiers from falling in love.

Released : Aug 15, 2012
Source : pDVD
Genre : Action, Romance, Thriller
Star cast : Salman Khan, Katrina Kaif, Ranvir Shorey, Girish Karnad
Duration : 1:44
Size : 124mb
Views : 35488

Download Link Part 1
Download Link Part 2

Please feel free to comment or share this post with your friends!

Baca Selengkapnya ....

Galaxy S3: updating Jelly Bean 4.1 announced on August 29?

Posted by Unknown 0 komentar
The rumor of the day evokes the August 29 announcement of the next update of the Galaxy S3 to Android 4.1 Jelly Bean.


These rumors come from sources inside SamMobile GSM Arena and report the possible announcement of the long-awaited update of the Galaxy S3 Jelly Bean on 29 August. This is the date of the invitation that Samsung has launched to the press for unpacking the Galaxy 2 rating, but that date could also be the occasion of this announcement other.
Usually when an OTA update is coming soon we see her soon appear on XDA forums or other Android. Nothing yet, but do not lose hope, Samsung took very seriously the protection of information are output to the Galaxy S3 and could lock in the same way this update.
The only thing certain is that Samsung is working well on this update, trying to make it as complete as possible and not to deploy too fast and then have bad feedback from users. The expectation is huge for the Galaxy S3 exploding all sales records.
No room for error for Samsung so. Do you believe in this announcement for August 29?

Baca Selengkapnya ....

How Do You Detect if Someone are Stealing or Using Your WiFi Connection!

Posted by Unknown Selasa, 14 Agustus 2012 0 komentar
Since you can't see who's got a computer hooked up to your wireless router, is there any way to know for sure if someone else has hijacked your signal?
Detect WiFi Stealer
It may be hard to imagine, but just a mere 20 years ago, the Internet was nothing more than a novelty -- a way for incredibly smart college professors and researchers to share information, and for a few people to network across the newly developed World Wide Web. E-mail was nothing like it is today. The primitive e-mail systems found at universities or even through accounts offered with the first Internet service providers (ISPs) such as Prodigy and America Online were often difficult to use.

Fast forward to 2009 and things have changed significantly. Back in the day, you paid for Internet access by the minute. That's not the case anymore. Like virtually every technology, changes occur quickly and often for the better. On top of that, the technology becomes cheaper and easier to use. The Internet has certainly gone through this transformation.

The most recent advance in digital communication is wireless internet or WiFi. Found in coffee shops, libraries and airports throughout the world, WiFi has made using the Internet almost as common as using your cellular phone -- which in itself is technology that exploded over the past decade. Unfortunately, unsavory activities inevitably find a way to enter even the most benign settings like the Internet, and that's (probably) why you're here.

Chances are you're reading this article because you suspect someone is piggybacking or using your WiFi without your permission and you want to learn how to determine if you're correct. When wireless squatters steal your WiFi, they slow down your bandwidth and what's worse, they can even steal information off your computer or infect machines on your network with a virus. Fear not, this article will give you the ammunition to fight back. Let's begin by taking a quick look at what makes up your WiFi network so you can prepare yourself to take control of the Internet connection you pay for.

Understanding Your WiFi Network

Before you can detect if someone is ripping off your wireless Internet connection, it's important to understand some basic computer networking lingo. For more information on how to set up a wireless network, take a look at How WiFi Works. Now, let's look at a few of the areas in a wireless network that will give you a baseline for determining if your WiFi signal is being sapped unexpectedly.

A wireless network is comprised of a broadband Internet connection from a DSL, cable or satellite modem. You attach the modem to the wireless router, which distributes the signal and creates a network.

This is what's called a local area network (LAN). This LAN is where you set up computer peripherals such as your desktop or laptop computer and printer. Your router will have what's called a dynamic host client protocol (DHCP) table. In essence, your DHCP table is your guest list of every allowed piece of computing equipment.

Each device has its own media access control (MAC) address. Think of this as its signature. MAC addresses are assigned by the manufacturer, but can be changed by users, if they know how. Your router uses these addresses to assign each machine on your network an Internet protocol or IP address. The MAC and IP addresses of your equipment will be useful in a moment when we look at ways to detect whether or not someone is stealing your WiFi. For a more in-depth understanding of IP addresses, read What is an IP address?

If you're confused by some of this computer rhetoric, don't be. What's important is that you know what to look for when we get ready to diagnose your WiFi connection. Speaking of which, let's get to it in the next section. After all, that's what you came here for.

Detecting Wireless Piggybacking

Okay, it's time to get down to it. Is your wireless network running slowly? Do you have intermittent losses in Internet access and you can't figure out why? Chances are, you've already detected a WiFi squatter and didn't even know it. If you regularly experience these problems, maybe you have something wrong with your wireless connection. But if you're suddenly having intermittent problems with your Internet performance, especially at the same time each day, it's a red flag that someone is piggybacking off your wireless connection and it's time for you to diagnose your WiFi network.

The first and simplest thing you can do is check out your wireless network connection and see if it's secure. When you install your router, you're given the option of setting a wireless encryption protocol (WEP) key. Basically this is a password-protected method for you to log on to your own wireless network. If you don't have one, you're operating an open network. That means anyone within range can use your wireless for free. While it's not hacking, it is debatable as to whether this is actually stealing. In any case, if you don't have a WEP key, you're vulnerable to WiFi squatting and certainly not deterring squatters.

Even if you have a WEP key, that doesn't necessarily mean your neighbor hasn't bypassed it. To determine if he or she is logging onto your wireless network, you can do so by checking your wireless network log. The exact steps vary depending on your computer's operating system, but in general, if you look at your network and see more devices connected than you have allowed on your network, you have WiFi thieves.

A similar method to determining the status of your WiFi user list is to check your router's DHCP client table. Much like viewing your network, your DHCP client table will list the machines on your network. If the number exceeds what you've set up, you have someone stealing your WiFi.

Nobody wants to be taken advantage of. What's more, you certainly don't want illegal information flowing through your wireless network. That's why you need to take matters in your own hands. The final section will give you the power to thwart off Internet thieves and protect your wireless connection. Are you ready to fight back?.

Stopping Digital Thieves

A WEP key is an absolute must for any wireless network; however, even those are vulnerable. While WEP protection will stop the guy parking in front of your house, it may not stop a more determined user like your neighbor. In that case, you can use a security protocol such as WiFi protected access (WPA); or even better the newer WPA2. This route is more secure but can still be hacked by a determined WiFi thief; though again WPA2 will make this a lot more difficult.

You can also use manual DHCP assignment. To do this, simply set your router's DHCP to the manual setting and enter in each of your computer's physical addresses. This will restrict your network to allow only those computers recognized by the router.

If the manual DHCP route isn't comfortable for your level of computer expertise, you may want to consider generating a MAC access list which usually can be created through the browser interface of the router. Unfortunately, MAC address lists can also be bypassed by savvy WiFi thieves; nevertheless, when used in conjunction with other security methods, they're probably enough on a small home network.

Internet monitoring software is also a viable option. Monitoring software will walk you through some of these methods and is user friendly for those who aren't as comfortable setting up wireless security methods. In addition, monitoring software makes it easy to see what is going on with your wireless connection. Your WiFi router may have some built-in software that will help you monitor your network. Explore the user guide and help section to see if there's a built-in application that will help.

Finally, turn off your router's SSID broadcasting. This effectively makes your network invisible. It's much harder to steal WiFi from a network that doesn't appear on anyone's radar.

Next time you suspect WiFi theft, peek out the front window and see if an unfamiliar car is parked in front of or close to your home. If so, you'll probably find someone in the car sapping your Internet. It sounds simple, but it could be just that easy to determine if someone is stealing your WiFi.

Courtesy to: Original Content.

Baca Selengkapnya ....

Discounts on the iPhone in the U.S. confirm the impending new iPhone

Posted by Unknown 0 komentar

The next iPhone is coming soon, it's a near certainty fueled by rumors and many spare parts including views last week and therefore, the U.S., the price war on the current iPhone is raging between different distributors. Many of them offer lower prices on the iPhone 4S to prepare for the arrival of the new model.
True to its policy, so far Apple has not lowered its prices but the site MacRumors has obtained a document indicating that Apple stores will be able to match the prices of distributors. While this information is anecdotal for us, yet it confirms that Apple is about to launch the iPhone soon:
Indeed, knowing how to make Apple is hard to imagine the firm at the apple offer discounts of about $ 50 on its latest model without having something to offer in the bend at full price very soon. These reductions are undoubtedly a new positive sign for those who are eagerly awaiting the iPhone 5 or 6.


Baca Selengkapnya ....

AppleInsider confirms a decision to dock equilateral turnout for the new iPhone

Posted by Unknown 0 komentar

Apple Insider indicates without confirming a feature that seemed to emerge in recent days about the new decision-sync (dock) of the iPhone coming in September, but also other Apple products in the months and years ahead .
Thus, the sources of the webzine, decision would be equipped with 8-pin + 1 for a total of nine contacts but more importantly, it could be plugged in either one direction or the other as the connectors recharge Mac.
We had discussed this possibility in detail in this article due to indiscretions gathered by iLounge and saw what could be the charging socket of the next iPhone this Saturday in this article.
The new iPhone or iPhone 5 could happen as early as September this year, in any case many clues suggest an impending arrival: price declines have already appeared on the current iPhone, numerous hardware leaks, leaks recent of at ATT for launch in late September but also an unusually active month of July in Apple subcontractor.

Baca Selengkapnya ....

Keyboard Shortcuts to Make Symbols Using Alt Key

Posted by Unknown Senin, 13 Agustus 2012 0 komentar
Do you need to type some kind of special symbols like  © ® ™ ♥ ① ② ③ ④ ⑤ ⑥ ⑦ ⑧ ⑨ ⑩ ♬ ✔  X etc on Microsoft word, excel or Facebook status updates? but you don't have any visual key on your keyboard to type this kind of symbols! no problem, after finishing this article you should have the key to make or write those and lots of symbols.
keyboard Shortcuts

Yes, I'm talking about the Alt key of your keyboard. it can make about a thousand types of computer symbols. you just need to press Alt and then any key from your keyboard numpad. each time you press Alt+ any key a new symbols will appear.

Keyboard

Some Examples:

Alt+0169= © , Alt+0174= ® , Alt+0153= ™ , Alt+0188= ¼ , Alt=0189= ½ , Alt+175= »
More Examples:
Symbol list Using Alt key
Open in a new tab to Enlarge it
Symbol list Using Alt key1
Open in a new tab to Enlarge it
Please feel free to leave your comment or share your suggestions!

Baca Selengkapnya ....

Apple vs. Samsung: 132 pages edifying show how Samsung has inspired iOS

Posted by Unknown Minggu, 12 Agustus 2012 0 komentar

You are aware that Samsung and Apple currently compete in the U.S. courts. the firm at the apple accuses his rival of having a little too inspired by the iPhone and iOS in the design of its products. Samsung pleads not guilty, but of course ...
An internal document of 132 pages Samsung has just been released and shows how Samsung has scrutinized every bit of IOS for inspiration. __This Document is dated 2010 that is to say before the release of Galaxy SII. This document is available online (link below), but here are excerpts:




The least we can say that there is much work to analyze differences and do not miss the "leadership for improvement" catch ...
South Korea fought for this document can not in the hands of jurors and one understands why.
If you want to see in its entirety, is available here. ca and worth the trip!
The trial continues, he gave us the opportunity to see numerous preproduction iPhone iPad here and also here at the hearings last week, now it is that document, there will be other nuggets in the coming days!



Baca Selengkapnya ....

Find accessories for the Samsung Galaxy SIII!

Posted by Unknown Sabtu, 11 Agustus 2012 0 komentar
Case with flap

Resistant protective case

Pouch ultrathin

Dock

Kit extra battery / extra battery and charging cradle for the battery

Cast AllShare dongle (available soon). Wireless content sharing. HDMI TV connection, MicroUSB charging

Navigation Kit

C-Pen, capacitive stylus / Fine point and precise writing. Handwriting recognition dedicated Galaxy SIII

HDTV Adapter - Connectivity MicroUSB / HDMI dedicated Galaxy SIII


Baca Selengkapnya ....

Google Translate 2.5 now translates your images

Posted by Unknown 0 komentar
The application Google translation is updated and can now translate from images.


This is a big update that Google has just made its application for translation. The biggest update comes from the ability to translate pieces of images using the camera in your androphone.
The feature can be used by simply pressing the camera button. Once the picture is taken, you have to point your finger portion of the photo you want to translate. It takes a little time to get used to it, but it works pretty well actually.
The update is available if you have at least Android 2.3 Gingerbread. Other features have been updated as the recognition of several Japanese characters at a time or the opportunity to choose a preferred language for the voice inputs.
The application is complete and will quickly become indispensable during your travels during which you do not necessarily master the language. A small photo of a sign or on a card and you win.

Baca Selengkapnya ....

[Olympic Games] London 2012 Olympic Games America TVC

Posted by Unknown 0 komentar

Baca Selengkapnya ....

How to Hack or Remove Computer BIOS Password

Posted by Unknown 0 komentar
Have you forgotten your computer BIOS password? Or just want to hack/creak someones BIOS password protected computer and get into it without BIOS password! If so, go on..
BIOS password Hack
First of all let me clear, why don't computer forget the BIOS password, time or date even if we keep it unplugged from power source for a long time. Yeah, It’s because it has got some power back up,or a battery inside it. 
You may have noticed a small coin sized battery on the mother board of your computer if you opened up your CPU cover ever!
BIOS Battery
Let's do some engineering:
1. Have a screw driver.
2. Open up your CPU cover.
3. Remove that small thing, i mean that battery. Play with it and after sometimes, keep it back on its place.
Remove BIOS Battery
4. You are done! Now start the computer and see the magic, your BIOS password has gone!

Please let me know if you have any complicity with above steps or have any suggestion!

Baca Selengkapnya ....

How to Change Windows 7/8 User Password Without Old Password

Posted by Unknown Jumat, 10 Agustus 2012 0 komentar
Do you want to change your school labs pc password or change your friends or someone else? If so, then read this article..Because here i m going to show you the most easy and simple way to change windows 7 or 8 useraccount password without knowing old password.
Step1: Go to Start > run > cmd.
User password Change
Step2:  Type net user user name passwords.
User password Change1
Passwords Changed!

Please leave comment if you have any complicity!

Baca Selengkapnya ....

e-Book Download | The Secret of Hacking 1st Edition!

Posted by Unknown 0 komentar
The secret of hacking has revolved ! Who do you want to know about real hacking? Do you, if so..Then download this eBook and learn the greatest secrets of the hacking.
The secret of hacking
The Secret of Hacking 1st Edition
In The secrets of hacking 1st edition you should find...

1. Introduction to Real Hacking.
2. Advance Maleware Research.
3. Windows Hacking
4. Password Hacking
5. Email Hacking
6. Web Application Hacking
7. Website Defacement and Domain Hacking
8. Miscellaneous Hacking.
9. Mobile and Computer Forensic
10. VOIP and Wireless Hacking
11. Vulnerability Discovery and Penetration Testing.
12. Advance Hacking With Metasploit
13. Firewall, IDS and Honey Pot Hacking.
14. Securing Systems and Wireless.

Download link:
Thank You
Please feel free to leave your feedback.

Baca Selengkapnya ....

Computer graphics: new iPhone, rumors in an image

Posted by Unknown Selasa, 07 Agustus 2012 0 komentar

For some time we read a lot about the upcoming iPhone model. Screen longer, smaller connector although some rumors seem more likely that others may be more far-fetched.

Rather than write a long article, we decided to put it into an image. Thus, a single glance, you will see all the rumors currently identified and the likelihood of seeing them come to our next iPhone:
90%, because with Apple nothing is ever certain, 30%, here are our predictions for the new iPhone is expected for September. And you what do you think?


Baca Selengkapnya ....
Trik SEO Terbaru support Online Shop Baju Wanita - Original design by Bamz | Copyright of android amazon.