Monday, 12 September 2016

4 Alternatives to Skype on Linux for Those Having Trouble

4 Alternatives to Skype on Linux for Those Having Trouble
[​IMG] ​


Skype. Everyone’s heard of it. Chances are when you think of video or audio chatting on a computer, Skype comes to mind. Recently Microsoft updated their Skype platform (on everything but Linux). This has caused Linux Skype users to not be able to place calls or use the service in general.

With Skype (Microsoft) dumping Linux users, you might also want to return the favour. Here’s a list of decent alternatives to Microsoft’s ever-popular program. Each one on the list has its own strengths and weaknesses. There are many alternatives to Skype, and this list covers the four most popular.

1. Google Hangouts
[​IMG]
The most serious contender to Microsoft’s Skype: Google Hangouts. Hangouts is to Google as Skype is to Microsoft. It’s the search giant’s cross-platform messaging system. You can add your friends and talk to them via instant message on all available platforms. You can also video and voice chat via a web browser.

The reason Hangouts is number one is this: It doesn’t need a client to run, and almost everybody has a Google Account. That’s really the barrier to entry for this program. If you’re looking to get into an audio or video call with friends, you don’t need much. All that’s required to be installed on your Linux computer is the Google Hangouts plugin and a modern browser (though Chrome is recommended). If you have a browser, you can use Hangouts.

2. Firefox Hello
[​IMG]
Those who want a viable Skype alternative yet are anti-Google should check out Firefox Hello. It’s Mozilla’s answer to both Microsoft and Google. All that’s required is an installation of Firefox (the default browser on 99% of Linux distributions). Hello itself is powered by Telefonia.

The best part about Hello is that there’s no sign-in required. You can use it just fine without an account, and everything works well. However, it would probably be a good idea to click the sign-up button inside the App. To launch Hello, just click the speech bubble in Firefox.

3. Jitsi
[​IMG] 
Meet Jitsi: a free and open-source alternative to Skype that supports video, calling and messaging. All messaging done with Jitsi is with the XMPP protocol and is encrypted end-to-end to respect your privacy. The project claims to also respect your software freedom, as it’s completely open-source via the GNU general public licence.

What sets Jitsi apart from the rest on this list is the fact that it has support for other platforms. Surge, by default it’s preferable that you use the Jitsi XMPP service, but if you’re not a fan of that it’s possible to add your own SIP account information in, as well as add other networks like Facebook, Google, AIM and others. If you’re looking for a feature-filled replacement for Skype, give Jitsi a go.

4. Tox
[​IMG]
Tox is an alternative to Skype that is built on the idea that conversations should be private. The project aims to lock out the rise of government monitoring systems and provide a private area where users can video, voice or text chat with family and friends. This service is available on Linux via qTox but on all other major platforms as well. Even BSD!

Note: Tox is ultimately a protocol, and thus has other clients. If you can’t find qTox, try uTox.
If you’re annoyed at what Microsoft has done to Skype on Linux and aren’t interested in relying on a company that doesn’t have Linux in mind, check out Tox. It’s not as polished as something like Hello or Hangouts, but it’s still worth your time nonetheless.

Conclusion
Microsoft has never taken Linux seriously when it comes to their products. They don’t see it as a gain. The only real reason that Linux even has a Skype client is because before Microsoft purchased it there was a client. If you’re a Linux user you need to get away from this service as soon as possible.

Microsoft has shown in the past that they have no interest in supporting Linux, and that fact is even more solidified with the latest update to the platform. Every alternative on this list is a great alternative and worthy of taking the place Skype has in your life on the Linux platform.

Tags:-video calling,alternative ways to do video calling,windows,

5 Tips to Tighten Your Browser’s Security

5 Tips to Tighten Your Browser’s Security
tricksalpha.net 

Security is one of the biggest concerns of Internet users, and there seems to be no bulletproof way to protect yourself in this online world. However, you can still take some security measures to tighten up online security. As the browser is the gateway to the Internet, it is best to ensure your browser is secure and the least vulnerable to attacks.

Below we have listed five browser security tips that should work on all types of browsers and keep you secure while browsing the web.


1. Check the Browser’s Privacy and Security SettingsThere are some common Privacy and Security settings in all browsers that you should check out and configure according to your needs. These options are mostly located inside the main settings of the browser, but you will have to explore a bit as each browser has a different user interface. The following are some of the most common privacy and security options for browsers.

Click to play Plug-ins: You should set plug-in content to “Click to play.” This will not play any plug-in content (like audio and video) automatically until you allow it to play, thus protecting you from malicious plug-in content.

Disable JavaScript: You should only disable JavaScript if you don’t want to take any risks at all because most websites use JavaScript to provide important features. However, JavaScript is also known to be vulnerable, so it is best to disable JavaScript if it doesn’t affect your browsing too much.

Disable Autofill: The autofill feature of your browser is great and lets you automatically fill forms, but this also means anyone can access your personal data if they get access to your PC. You should disable autofill if you think anyone else might access your PC (this includes remote access as well).

Disable Third-party Cookies: If you are concerned about your privacy, then you should disable third-party cookies. Disabling all types of cookies isn’t recommended as they are required for logins, etc., but you can disable third-party cookies to avoid usage tracking.

2. Keep Your Browser Updated

[​IMG] ​
It is extremely important to use the latest version of your browser all the time. Browsers are frequently updated with security measures against the latest threats, and using an updated browser is the only way to ensure you benefit from the protection. Most popular browsers update themselves automatically, but make sure you keep the updater running all the time even if it uses some of your PC’s resources.
3. Keep a Tab on Extensions and Plugins

[​IMG] ​
Sometimes malicious extensions sneak in while installing programs and harm your browsing experience and may even steal information. Check all the extensions/plugins installed in your browser, and delete the ones you don’t use or the ones you don’t remember installing. Repeat this process often, especially when your browser is acting up. If you are skeptical about any extension, just do a search on Google to check its reputation and see what it does.
4. Use a Good Anti-Virus Program

[​IMG] ​
Having a good anti-virus is extremely important for a PC’s security as well as a browser’s security. Adware and PUP (potentially unwanted programs) can damage your browsing experience including tracking web sessions, show ads or clutter your browser. A good anti-virus program will keep most of these programs at bay – even the free anti-virus programs can do that. You can use Avast, Bitdefender or the new SecureAPlus anti-virus program.
5. Use Third-Party Security Extensions
There are many third-party extensions that will secure your browsing experience one way or another. Below are two popular ones.

Web of Trust: This is a community-based extension that rates websites to easily check their reputation. It marks trusted websites as “Green,” malicious websites as “Red,” and doubtful ones as “Yellow.” These ratings are based on millions of users of Web of trust who rate and comment. It also supports all the popular browsers.

[​IMG] ​
HTTPS Everywhere: It replaces “http” access of the sites with “https.” HTTPS is an encrypted access to protect against hijacking and surveillance, and this extension will help encrypt the connection with unsupported websites. It doesn’t make all the websites “https” but still covers most of them. It supports Chrome, Firefox and Opera.
[​IMG]
Conclusion
To surf the Internet securely, you need to make sure your browser is configured to offer optimum protection. The above-mentioned tips should tighten up your browser security and help you securely browse the Web. Apart from these tips, there are also many other ways to secure your browser. Do a little search and you may find the right solution for your needs. Maybe a good VPN service will give you all the protection you need – the options are there; you just need to explore.

Tags:security,privacy,Tips to Tighten Your Browser’s Security

Sunday, 11 September 2016

How to Fix Runtime Error 217

How to Fix Runtime Error 217
[​IMG]

Did you find issues related to runtime while dealing with the PC at your place? The write-up is about the runtime errors and how to fix such issues. They are the issues that evolved due to installation problems. Apart from these problems there is little more notable stuff that creates such issues. Nevertheless you surely want to get rid of this right? Runtime error 217 is one such irritating error message, that you often get. Here are the basic reasons, for which you get such message.

Reasons to get message of Runtime error 217
  • During installation of a program, DLL registration errors are often found. The runtime error 217 is often found due to failure of DLL registration.​
  • If you are having a related program, then a collision between them at the booting session is quite possible. The error is shown at that time too.​
  • If some of the windows registry files are missing, the message pops up in your screen.​
  • Chances of showing the message is more, if your PC is infected with virus or malware.​
  • If the installation is incomplete, chances to find the message is more.​


                                      How to resolve the issue in windows 7?

The error message of 217 is seen more often at the time of start-up. For windows 7 and windows 8 or 10, the method of resolving the issue is different. Here is the method of resolving the issue in Windows 7.
  • Go to the search box, after clicking on the start icon, at the screen’s right corner. Type there – msconfig.exe and put enter. You might need to give the administrator password there to proceed.​
  • Click selective start-up option from general tab and from the list uncheck the option – Load start-up.​
  • After that, get to the service tab and you will find a checkbox to hide all Microsoft services. Check out that and disable the button stating all. Once you do this, at the time of start-up, only the Microsoft items will be invoked and all other performance will be disabled.​
  • After you have completed the level, press OK and restart the system, the problem is resolved.​

How to Clear Cache and Cookies in Google Chrome with Shortcuts

How to Clear Cache and Cookies in Google Chrome with Shortcuts
[​IMG]

Google Chrome’s cache can be easily cleared from settings tab of through the keyboard shortcut. It is totally your choice to clear data and apart from selecting that, you can as well choose the time period until when you want to clear data. Clearing cache in Chrome will help your hard drive function smoothly and also, it is an effective way to deal with troubleshooting browser problems and make your browser work fast without crashing.
Steps for How to Clear Cache and Cookies in Google Chrome with Shortcuts

These steps are ideally suitable for the latest version of Google chrome. However, the steps won’t differ much in any other (older) version of Google chrome either. The steps to be followed are quite simple and once you clear chrome cache, it will help you use your system more efficiently.


Step 1: First of all, go to the chrome menu situated on the right end, near the address bar.

Step 2: From here, go to Tools -> Clear browsing data. In case you are a person more inclined towards working with keyboard shortcuts, you can do the same withCtrl + Shift + Delete and do away with the previous steps. This step will directly do the work for you.


Step 3: Next, you will get a popup on your screen where you will be able to clear cache in Chrome. This will allow you to clear browser cache in chrome and similar browsing data. (if you want to delete it)


Step 4: Here, we will be focusing on how to clear cache chrome, simply tick mark on theEmpty the cache and untick mark rest of the options. In order to clear cache Chrome, it is advisable that you choose beginning of time in the drop down. Here, click on Clear browsing data and you will be done.

How to Block Caller ID on iPhone 4,5,6- Disable or Hide Caller Id

How to Block Caller ID on iPhone 4,5,6- Disable or Hide Caller Id
[​IMG] 

Caller ID is the (yours) name and number displayed on iPhones while you call someone. Whereas, once you block caller id on iPhone, the person receiving the call will not be able to view your details. Some people be like I would rather block my number on iPhone rather than let them have my number. You can as well permanently block Caller ID, or some particular calls, etc. However, it depends on if you are using a cell phone or the regular landline.

Note: There are certain countries which do not let people block caller id on iPhone, and therefore, if you don’t have the option available, it means your country does not support the same.

And there you have your answers to how to block my number on iPhone. These two simple and easy methods shall help you block your number on iPhone.

I hope the article was helpful and now you have successfully managed to block your caller ID on iPhone. So the next time you are calling somebody you don’t wish to have your number or call you back again, you know what you should do. Pretty much simple and easy!

Or maybe you could as well prank someone, but only unless its within the limit and not harmful to anyone in anyway. No more of irritating calls from random people having your number!


Temporarily blocking your Caller ID (Specific contact/call)
This is more of a country specific kind of an option and the code that is to be used here shall be different for different places. Also, different phone carriers have different codes that will let you hide your caller ID on iPhone. For example, here if we use the number 212-555-5555, you will need to find the code that shall disable the viewing of your caller ID.

Here, for example, the number after the disabler code, looks like #31# 555-5555. This was for in case you want to block your caller ID for a particular call.

However, if you want to block iPhone caller ID for a particular contact, you must save the contact number and the next time or every time you called, your caller ID shall remain hidden.




How to Check Your Laptop Battery Condition Health

How to Check Your Laptop Battery Condition Health
[​IMG] 

Guys today I am sharing with you such a knowledge which every laptop user should know for using it’s laptop battery safely and in optimized way; as we have seen that our laptop battery goes to dead condition after a little time. Now I will share with you such a useful information by using it you can be aware about your battery health, performance and also can increase the laptop battery lifetime. You will know what your battery lifetime charging, discharging, charging capacity, battery company and many other information required for a battery even the full report on battery with just simple and easy steps. First discussion is about battery health; so test it.

How to Check Laptop Battery Health ?

Battery health is very important for lifetime of a battery; if you know about battery health; you can use your laptop battery in better and economic way. For checking your battery health
 just follow these simple steps :

Run the Command Prompt on your windows as an administrator

After opening cmd; just write this code ” powercfg -energy ” and wait for a minute
Now goto the default directory which will be given in cmd for checking your laptop battery health report


Now examine everything regarding your battery health and many other things

Here is some screenshots of my laptop battery health; and now I am using it in safe and easy way after knowing about my battery health as It was decreasing day by day and now it is stable ;

                                                               Screenshots

[​IMG]
[​IMG] 


Tags:-windows

HOW TO SEE WHO IS STEALING YOUR WI-FI AND BLOCK THEM

HOW TO SEE WHO IS STEALING YOUR WI-FI AND BLOCK THEM
[​IMG]
Hey guys so here i am back again teach you new thing, It's been a long time since i posted any article due to some reasons,now come back to the the point.
As we all know that now a days every have a smartphone and almost everyone is using internet by wifi. everyone who have installed wifi at therer home and want that only limited person use  it.So,for this purpose i will tell you about two apps which will help you to know that how many people are connected to your wifi and also you will have authorisation to block their internet access.

FIRST APPLICATION IS FLING
After the installation of this application, open it, then all devices connect to your wireless router in detail will be present. To get more information about any device in its name, touch, there will be more information. The task of this application is finished here, to put an end to unnecessary connections  best way is  that you change the password for your Wi-Fi. 





[​IMG]

BUT if you want to block other people internet  access you must  use wifikill pro
This application is very interesting. Through this you can easily save your internet. The funniest thing is that the device you want to stop Internet  device will be connected to the network but will not get any internet access.
[​IMG]



Tags:- internet,educational,security







Monday, 8 August 2016

Recover Deleted Files From Pendrive & Memory Card.

Recover Deleted Files From Pendrive & Memory Card.
[​IMG] 
Today, Computer is used in every field like in Banking, Business, Education, Entertainment etc. Computer reduces the human efforts and workload. Computer data is stored in Hard drive and which is processed in RAM. But for transferring data from one device to another we use USB devices like memory Card or pendrive are used to store and transfer data. As normally SD cards are used to store data in mobiles and can also be used as pendrive using card readers. USB drives are portable device and allow to expand storage capacity of device. USB devices can also used for various different task like making bootable usb pendrive.


Step 1. Download Stellar Phoenix data recovery tool and install it.
Step 2. Choose drive recovery option if you want to recover drive.
Step 3. Select drive from the given list that you want to recover.

Step 4. After selecting the drive you have to choose delete recovery if you want to recover deleted files.
Step 5. Select advance option if you want to recover a formatted drive. Select drive and press scan button.
Step 6. After scanning it will give you a list of deleted files.

Step 7. Tick the files you want to recover and press recover button.
Step 8. It will save your deleted files in the recovery folder.

3 ways to share files between Macs

3 ways to share files between Macs

[​IMG] 

If you have more than one Mac, you probably need to exchange files between the two computers from time to time. There are lots of ways to do this, and which method you choose may depend on the type of file, or how you manage your workflow. Here are 9 ways you can exchange files between two Macs.

File Sharing
The basic way to share files between Macs is to use File Sharing. To use this feature, you must activate it in the Sharing pane of System Preferences. Check File Sharing. If you want to only share specific folders, or allow certain users to access them, add folders to the Shared Folders list, and then select a folder and add users in the Users list. If not, any user with an account can access your filesTo access another Mac’s files in the Finder, choose Go > Network, double-click one of the computers or devices that displays, and enter your username and password. You can then browse that Mac’s folders and files, and drag files to and from that computer

[​IMG] 

AirDrop
In the Finder, choose Go > AirDrop on both Macs; the one you want to send files to, and the one you’re sending from. Drag a file onto the icon of the computer you want to send a file to. Unfortunately, AirDrop isn’t always reliable, and it does need to be active on both Macs, so you can’t easily copy files to a server or other computer, but it can be easier that messing with File Sharing if you only need to send files occasionally.
iCloud Drive
Apple’s iCloud Drive is mostly designed for apps to store files, but you can add files to it as well, which you can later access from another Mac. Choose Go > iCloud Drive in the Finder, and you’ll see a number of folders. Just add a file to the top level of the iCloud Drive hierarchy or create your own folder, and you’ll be able to access the file on your other Mac. This works best for small files, as well as files you may want to access on iOS devices.

Saturday, 6 August 2016

SECURE FACEBOOK ACCOUNT FROM BEING HACKED

SECURE FACEBOOK ACCOUNT FROM BEING HACKED
[​IMG]
Secure Facebook your Account from Being HACKED (Full Tutorial)


[​IMG]
The growing popularity and increasing use of social services, as well as their security is also an important question. Some services "2 Step verification" by the are trying to ensure that the user are protected from hacking. Facebook also has several features to protect your users account. A feature of these 'Facebook Trusted accounts is.
Do not stay in the claim that you can never forget your Facebook password, because you almost do not forget the question for this type it in. You can go through the mail or forgotten password reset by phone to your account configured. But if you forget your password or account can be hacked and changed the e-mail address and phone number to the trust account last resort is able to get back dude hacker account.
[​IMG]
Let us tell you how to add trusted contacts, and is accessed via their account back. To get back your hacked account through trusted accounts actually is another option. Add 5 from three friends can be in it. When you're in trouble and your account is opened, not seek the help of their friends could be found. Sends the selected friends to your Facebook security code. Take the code to provide Facebook friends account is get back to you. The entire system is how the process works, it detailed today.

Select Trusted friends
The act with foresight always use the security features. Trusted contacts should you keep in your account. Click the Facebook account after login, click on the gear icon in the 'Account Settings' option to add contacts.
After one of the options on the left, click on the 'Security' on Trusted accounts.
Will open a pop-up, read it, you can find that in fact the Trusted accounts and how they work. Click on the Choose Trusted Contacts.
Now select the type of your friends think that you trusted. There are at least three and no more than five friends can be add.

[​IMG]
After you do this you will require a password again to verify the same OK. Type the password of your account please click the Submit button. When the list of the trusted contacts also require can be changed or completely. When you will see the Edit trusted contacts in security again, and there will be the option of Removal All.
[​IMG]

How to Fix Windows 10 Brightness Control Not Working Issue

Some users are upgrading their PCs and experiencing some issues with display brightness adjustment. Imagine watching a movie or working on some design, and your display starts giving you problems. Well, there’s a fix for this issue. In some Windows 10 PCs, this bug doesn’t allow you to decrease or increase the screen brightness. Face it. Low battery is running low and you can decrease the display brightness. You can’t imagine a worse situation that this, right? Here I’m going to tell you how to fix Windows 10 brightness control issue.                                         

How to Fix Windows 10 Brightness Control Not Working Issue?
To start with the procedure, search Device Manager in the desktop search on your Windows 10 PC and open the application.

Look up for the Display Adapters in the list. Click on it to expand and right click on the relevant drivers. Select the Update Driver Software from the menu to fix the Windows 10 brightness control not working issue.




Now, your PC will use your internet connection to download the drivers that are necessary for proper functionality.
 

You will see the driver being installed automatically and a message that Windows has successfully updated your driver software message along with the details of the hardware.

If the Windows 10 brightness control issue still persists, it means that your graphics card manufacturer hasn’t provided any update. Now, you need to continue with the next step.

Repeat the above step of opening Device Manager and updating the display drivers. From the How do you want to search for driver dialogue box, selectBrowse my computer for driver software and then select Let me pick from a list of device drivers on my computer.



From the Show compatible hardware option, choose Microsoft Basic Display Adapter and click on Next to proceed to fix the Windows 10 brightness control not working issue.
Now your PC will install the selected driver and your Windows 10 brightness control issue will be solved. You can check it by increasing and decreasing the brightness of your PC.

Did you find this solution for Windows 10 brightness control issue helpful? Tell us in comments below. ​

How to Restore Lost or Deleted Contacts On Android

How to Restore Lost or Deleted Contacts On Android
Hey tricksalpha users so here after so many holidays am back with a very useful trick. As we all know that once in  everyone life we lost all our contacts from our mobile accidentally and after that we  get  frustrated and forget that there is a way to get all the deleted contacts back. So today i will teach you the way to restore Lost or Deleted contacts back.  

[​IMG] 

How to Restore Lost or Deleted Contacts On Android :

To recover deleted contacts in your android we have two methods by which you can easily restore any of your deleted contacts. Just follow up the below methods to proceed.
#1 Method – Restore Lost or Deleted Contacts on Android Using Gmail​
In you android device when you fill up your google account in it then your all android data including your contacts get sync with your google and if you had lost your contacts then you can revert them back. You just have to follow some simple steps to proceed.
  1. First of all open the link https://www.google.com/contacts/ in your browser.
  2. Now login with your google account that you have registered in your android device.
  3. Now there you will see all your contacts listed, even the contacts that might gets accidently deleted by you.
  4. Now you can explore any of your contacts and save them in your android.
  5. Also when you sync the same google account with your android again the all your contacts will get automatically restore.
#2 Method – Restore Lost or Deleted Contacts on Android Using Android Data Recovery​
In your android device there is copy of your contacts that had been stored in your storage and when it get deleted your contact get deleted and Android data recovery is a software for pc which can easily restore all your deleted contacts of your android. Just follow up the below steps to restore.
  1. First of all download and install the software Android Data Recovery in your pc.
  2. Now connect your android device with your Pc using USB data cable.
  3. When the software detects your android then simply restore the data.
  4. Now after the restore when you open your android all your data and contacts will be restored
NOTE:- Don't forget to share this article; \m/

Saturday, 18 June 2016

TUTORIAL - HOW TO HIDE FILES BEHIND THE IMAGES IN WINDOWS

[​IMG]

Hey tricksalpha users... So Today in this tutorial - I will show you how to hide files inside a picture .As we all know there are some important files or document we want to hide from others on our computer.To do that we use some softwares and tools,but if you are looking for something different you can do it by hiding a file behind a jpg image.In order to do this job,you will need to have either WinZip or WinRAR installed on your computer.You can download it from internet for free.So lets get started.

How To Hide File Behind Image ?
    • Select an image which you want to use for hiding file behind the image.
    • Now select a file to hide behind the image and make it in.RAR format.With the help of the WinRAR.
    • Paste both the files on desktop.
  1. Now open cmd by going toStart>Accessories>Command Promptand type following commands in it.
cd desktop
[​IMG]

5. CD stands for change directory by typing above command you change your directory to desktop. After that type command given below.
Copy /b imagename.jpg + filename.rar finalimage.jpg
[​IMG]
  • Replaceimagename.jpgwith the name of image you want your file to be hidden behind. Don't forget to add image format (Eg: .jpg,.png,.gif)
  • Replacefilenamewith name of your file you want to hide. It must be in .rar format.
  • Finally Replacefinalimage.jpgwith whatever name you want your final image with hidden files should be. This is the image where your file will be hidden.
6. Now when you will try to open this newly created image it will open as normal image, but to open you hidden file you need follow steps given below.

How To Access Hidden File ?
To access your hidden file you need to open the newly created image in winrar. Just follow simple steps given below to do that.
1. Open winrar.
2. Now locate your image and open it or simply drag your image in winrar.
3. Extract the file and done.
 

How to Increase Your internet speed

How to Increase Your internet speed
Hey tricksalpha users...
                    So here without wasting time i am going to teach you that how you can surf internet fast by increasing internet speed....

Steps:-


  • Google Transcoder is a way in which you can convert a Website into a WAP site just by entering the URL of the Website..
  • This trick saves a lot of time as which was before passing in to waiting & waiting to appear your webpages on the screen.
  • Go through the following steps to access the internet with Great Speed 
★ Steps →

1. Open any of your browser, and goto 
'Google Transcoder' page

http://www.google.com/gwt/n

2. Now copy & paste your website link in the given URL box on that page.

3. Then click 'Go' and your page will be open in few seconds.

★ Tips: To view the sites directly click ''View page directly' at the bottom of each page''

TUTORIAL : MAKE WI-FI HOTSPOT IN WINDOWS USING NOTEPAD *SIMPLE STEPS*

TUTORIAL : MAKE WI-FI HOTSPOT IN WINDOWS USING NOTEPAD *SIMPLE STEPS*
Hey tricksalpha users...
                          NOw you can also create hotspot on your laptop without using any third party app like connectify me. You can create hotspot on laptop just by following below steps:-

Steps :

1) Open Notepad.
2) Type paste below code into it. 

netsh wlan set hostednetwork mode=allow ssid=FreeWIFIkey=12345

netsh wlan start hostednetwork 

3) Now you can change the SSID by changing code in blue color and you 

can change the security code in red color. 

4) Now make sure to save this file as "Start.bat" and its done. 

5) Now create another new Notepad file and paste below code into it.:-

netsh wlan stop hostednetwork

6) Save this file as "Stop.bat" and your Wi-Fi Hotspot stopping process is up. 

7) So, when ever you want to start the Wi-Fi Hotspot simply double 
click the Star.bat file and your Wi-Fi hotspot will start to 
broadcast. 

8) As soon as you are done you can double click the Stop.bat file and your broadcast will be stopped.  

How To SECURE Your Computer By Automatically Blocking dangerous IP

[​IMG]
The method we are going to show is very easy and depends on a tool that will work similarly like the firewall on your PC, but it will block all dangerous IP address that resembles spyware or any data theft programs. And this will secure your computer to a high extent. Follow the below guide to proceed.

Bot Revolt
Bot Revolt monitors all inbound communication to your computer. The software scans automatically every .002 seconds looking for any suspicious or unauthorized communication.
Features Of Bot Revolt:
  • Monitors program installation, registry and file changes, keyboard and mouse code control, and other potentially dangerous behaviors.
  • Monitors all inbound communication to your computer.
  • Bot Revolt shows you who and shows you where they are coming from!
  • Bot Revolt updates itself each day automatically so you are protected from NEW threats.

Steps To Block Ip Addresses In Computer Using Bot Revolt Tool:
Step 1. First of all download and install the tool Bot Revolt in your windows PC. You have to enter your name and your email address to get this software for free.


How To Secure Your Computer By Automatically Blocking Dangerous IP’s
Step 2. Now you will get the downloading link in your email address visit the link and download the tool to your PC. Now after installing it launch the tool and it will start updating its packages which will take a very short while depending upon your internet speed.

Step 3. After that tool will start and will keep on track on packages received from every package and their IP’s and will automatically block the IP’s that are suspicious or say dangerous.

Step 4. You can also use the incognito feature of this tool which requires the upgrade version that is paid.

[​IMG]
How To Secure Your Computer By Automatically Blocking Dangerous IP’s
That’s it your computer system is now protected from all the malicious IP’s and no one will now harm your data and all your credentials will be secure with you on your PC.

So above is all about How to Secure Your Computer By Automatically Blocking Dangerous IP’s. With this method, you can easily secure from spyware’s that may be in a form of freeware tools by blocking their respective IP’s on your system using this cool tool that we had discussed right above. Hope you like this cool post, do share with others too. Leave a comment below if you have any related queries with this.

ALL HIDDEN SECRET CODES FOR ANDRIOD

ALL HIDDEN SECRET CODES FOR ANDRIOD
Hey tricks alphausers..
                       In this modern world everyone is using android  So today i will tell you all hidden secret codes for android to access information from your android easily and very fast.

[​IMG]

  • *#*#4636#* #*
  • Phone Informations

  • *#*#3264#*#*
  • Memory version

  • *#*#7780#*#*
  • Factory Reseting

  • *2767*3855#
  • Formates Your Phone

  • *#*#197328640#*#*
  • Service Mode Lancher

  • *#*#232339#*#*
  • Wifi Tester

  • *#*#232338#*#*
  • Mac Address of your WiFi

  • *#*#8255#*#*
  • Gtalk Moniter

  • *#*#1472365#*#*
  • GPS Tester

  • *#*#1575#*#*
  • GPS Tester 2

  • *#*#232331#*#*
  • Bluetooth tester

  • *#*#1234#*#*
  • Phone's PDA*

  • *#*#1111#*#*
  • SW version Of Your FTA

  • *#*#2222#*#*
  • HW version Of Your FTA

  • *#*#0283#*#*
  • Packet Lockbacker

  • *#*#0*#*#*
  • LCD tester

  • *#*#0673#*#* or *#*#0289#*#*
  • Melody test

  • *#*#0588#*#*
  • Sencer Tester

  • *#*#0842#*#*
  • Device Tester

  • *#*#2663#*#*
  • Mobile Display's Version

  • *#*#2664#*#*
  • Touch-Screen tester

  • *#*#232337#*#
  • Bluetooth physic address 

Sunday, 12 June 2016

3 Cool YouTube Secrets You Might Not Know

Hey tricksalpha users...
               Today i have some cool secres of Youtube. i hope that you will like those secrets.

1. Use the Force Luke
“Use The Force Luke” is one of the most impressive tricks on YouTube. If you are an enthusiast of Star Wars, then you will have more fun using this Use The Force Luketrick. Type “Use the Force Luke” in the search box of YouTube. What actually happens when you type this in the search box of YouTube is, the screen starts to hover from one side to the other. This makes all your search results fly from left to right or vice versa.
It looks like everything on the screen is floating back and forth and you can make it move even more just by swiping your mouse across the screen. If you want to stop it, you need to search for something else so that it gets back into normal mode as YouTube. You can show this trick to any of your friends and dazzle them for some time. Try it out!




2. Beam me up Scotty

If you are a damn fan of Star Trek, then you will be familiar with this Line. Type the command “Beam me up Scotty” into the Youtube Search Bar and watch the results shown on your search page.It then displays the classic Star Trek effect by ‘beaming’ the videos onto the search results page. Check it out and watch the beaming effect.



3. Doge meme
Are you bored watching at the same old font o YouTube? If you wish to see your YouTube page in a colorful way, then just follow the steps. Visit the YouTube website and type Doge Meme in the search box.You can now observe the change that happens on your search results page. The font on the search page will be automatically converted to Comic Sans and text will be displayed in distinct colors.