About All Tech Buzz

5 Ways to Change Your IP Address and Browse Securely

Before you'll get pleasure from the net and browse safely, net security is that the terribly very first thing you need to consider. firmly aquatics the net provides you total freedom as you would like however unknown to several, anytime you connect your laptop to the net, equally of your info is exposed and should be compromised beginning along with your information processing then to your browsing location, browser, devices, page you visited, your personal knowledge may be accessed even while not you knowing it.


Besides, browsing firmly offer you access to several restricted websites. perhaps your native information processing has been restricted or your country is being restricted and you don’t have access to bound sites, firmly and anonymous browsing provides you access to such restricted websites.
And to my fellow bloggers and webmasters, secure browsing ensures your knowledge and your info area unit well secured, encrypted and not accessible to intruders. it'll shield your personal knowledge, your login details. This reduces the possibility of your web site obtaining hacked to an excellent extent.

1. Virtual Private Network

Abbreviated as VPN, Virtual non-public Networks are premium tools that amendment your science address mechanically as before long as you set it courant your pc. Not of these VPN programs ar free, to use most of them you want to take the service with alittle quantity.
For higher performance with a VPN supplier, a paid service is worthwhile. I even have been exploitation VPN for quite two years currently and it's been serving to plenty Here ar the list of VPN you may take into account using Some Website:-

2. Manually Change your IP

To be ready to browse firmly and anonymously, like I steered you want to get your real science address modified. to go looking for science addresses for a particular location attend hidemyass.com, there are several sites wherever you'll be able to explore for proxies however I continually use hidemyass.com. currently i'll in short show you ways to alter your science address manually. On Firefox, click on Tools choices click on Network tab Settings click on manual Proxy Configuration enter your Proxy and Port within the area provided and click on OK.

3. Web Proxy

There are several sites on-line during which ever-changing of science to associate anonymous location is their main service or among their services. you'll be able to use this free proxy to surf anonymously on-line, secure your web affiliation, hide your web history, defend your on-line identity and additional significantly, hide your science address.
I’m not giving 100 percent assurance in exploitation on-line proxy web sites to access restricted site and to alter science as generally those free net proxy are sometimes tousled and don’t provide desired results.

4. Free Proxy Software

Just like VPN programs, there are free proxy software package you'll be able to use to browse firmly and anonymously and to cover your identity on-line. when you've got with success put in one on your pc,connect usually to web, and connect your free proxy software package to alter your science and browse anonymously and firmly.
you'll have to be compelled to manually amendment your browser settings before you'll be able to get these programs to figure. Here are the lists of Free proxy Server Software:-

5. Browser Addons or Extensions

Internet usage is obtaining plenty easier and better! Browsers add-ons and extension can even be accustomed amendment your science address. There ar several Mozilla and Google Chrome Add-ons & extension to alter your science address, this can be a really straightforward task to try and do, you simply have to be compelled to install the add-ons or extension on your browser to urge your science address modified.
Some Famous and Popular Addons for Mozilla and Chrome:-

10 Funny and Amazing Firefox Tricks

Firefox is best browser of the world and there are some funny tricks that you can do with your Firefox browser. These will not harm your browser and they are tested in the latest version of Firefox. So Why Not Just Try It? Here are Some Funny Firefox Tricks.

To perform these tricks open your Firefox browser and copy/paste the following Codes in your address bar And Press Enter.


chrome://global/content/alerts/alert.xul

-=> This will show you dancing Firefox. Your Firefox window will automatically popup anywhere at screen.

chrome://browser/content/browser.xul

-=> This will open another Firefox within in a new tab. So you will have Firefox within Firefox.

chrome://browser/content/preferences/preferences.xul

-=> This will open Firefox options dialog box in new tab.

chrome://browser/content/bookmarks/bookmarksPanel.xul

-=>This will open your firefox bookmark manager in new tab.

chrome://browser/content/history/history-panel.xul

-=> This will open your history in new tab.

chrome://mozapps/content/extensions/extensions.xul?type=extensions

-=> This will open your extensions tab in your current window.

chrome://browser/content/preferences/cookies.xul

-=>This will open the “cookies window” inside a tab in the Firefox window.

chrome://browser/content/preferences/sanitize.xul

-=> This will Open the “Clear Private Data” window inside the current tab.

chrome://browser/content/aboutDialog.xul

-=>This will Open the “About Firefox” Dialog box inside the tab. 

chrome://browser/content/credits.xhtml

-=> This will Open a scrolling list of names. The one’s who we must thank for creating Firefox.

How to Increase Your Followers on Google +

After Facebook, Google + fastest growing Social Networks. It is also consider into Google search engine, and your search result could depend on it. It is best network for content marketers.



Google+ is just like any other social network. In order to be social, you need to have friends. You need other people on that social network to interact with, people who are active members of that social network. If they don’t log in on a regular basis and keep their profile active, they can’t interact with you. In order to build up your social media presence, you need to be active, as well. This gives you targeted followers.  All you have to do is just some 10-15 minutes research.


Let’s see how to Increase your followers on Google +:-
STEP 1:- Open you Google Plus Account.
STEP 2:- Go ahead and fill your profile picture and other field.
STEP 3:- Search for #SharedCircles. 


So many circle are open in your home page, now select any circle and click Add people.

STEP 4:- You can create a new circle or add them to any of your exisiting circles. I recommend making a new circle everytime. 



After you create the circle, you will start getting followers. Here's a snap showing my 1 day Google+ Notifications. 80% of the notifications I get are of followers

Top 10 Android Tools for Hacking

Android has a got very important place in our Tech World Now in market you can get many devices running on Android like Smartphone to Tablets, Tablets to Camera and I can simply say that the major Portable device in the market are running on Android. 


The Google is providing more and more hacking tools and tester application for Android user and Developers. The use of these tools is security purpose and stop the cyber crime are targeting Android users.

Let’s see 10 Android tools that are meant for hacking and hackers.
 1. Hack code : - The hack mode is most famous, and every Ethical and tester or IT expert is using this tools. Hack code is use for perform different tasks or scanning exploits and reconnaissance method.

2. Androrat: - Androrat is Remote administration tool for Android hacking. It is developed in java Android for client side and in java swing to server.

3. APKInspector: - This tool is use for GUI analysts to analyze the Android application and it operation research. Other features of these tools are to aide analysts and reverse engineers to view complied package and DEX code are embedded.

4. DroidBox: - This Android hacking tools is used for dynamic analysis of Android apps.

5. Burp Suite : - The best tools for security testing of web apps are Burp Suite. It works all testing process, from mapping and analysis of any application to attack on surface. Any vulnerability are execute in any programs and apps that find it and solved that problem.

6. zANTI: -  It is used for network diagnostics toolkit and provide cloud reporting network safety.

7. Droid Sheep: - Droid Sheep can be easily used by anybody who has an Android device and only the provider of the web service can protect the users. So anybody can test the security of his account by himself and can decide whether to keep on using the web service.

8. DSploit: - dSploit is an Android network analysis and penetration suite which aims to offer to IT security experts/geeks the most complete and advanced professional toolkit to perform network security assessments on a mobile device.

9.AppUse – Android Pentest Platform Unified Standalone Environment:-  This Apps is basically use for mobile application testing, it is add unique concept for made a tools for testing criteria and other apps are testing and check the apps working condition are not. It is developed by App use Virtual Machine.

10. Shark for Root: - 
The Shark Reader is basically based on TCPDUMP. It is use to dump wire Shark network (Work on 3 G and WiFi) for Traffic sniffer. It is nice tool for sniffing traffic network.


@@Thanks!! For visit Difftrick. Keep watching android Tips and tricks on Difftricks.

Like to visit Latest Android Tricks:-

HOW TO ENABLE AND DISABLE EVERYTHING IN WINDOWS

The windows operating of this tries to make it hard for users to hide or display various options, features and looks. However, it fails miserably at doing so. The windows registry holds the key operating system. In other words, system administrators can place restrictions on all aspects of the user’s experience using the Windows registry. The easiest way to improve restriction on a user’s activities is by following the steps below:- 

STEP 1:- Click on Start Menu and open run command and type regedit. (WINDOWS + R)

STEP 2:- Search for the following registry key:-

HKEY_CURRENT_USER\Software\Microsoft\CurrentVersion\Policies\Explorer 

STEP 3:- Under this registry key one cam improve a number of interesting restriction that are discussed in detail later in this section. The following new DWORD values can be created in the right pane to improve specific restrictions on the user:-

HideClock: - 

This DWORD value can be used to either disable/hide or enable the system clock normally displayed in the right bottom corner of the screen. A data value of 1 hide the clock, while a data value of 0 displays it.

NoDrives: - 

This DWORD value can be used to hide all drives that are normally accessible through My Computer. A data value of 1 hide the Run option, while a data value 0 displays it. These hidden features of the Windows Registry can be used as a very good prank to play on your unsuspecting friends! However, on a more serious note, system administrators can also use the NoDrives value to restrict the access privileges of a particular user.

NoRecentDocsHistory: - 

Each time one opens a document or a file on a Windows system; it automatically gets added to the Recent Documents list accessible through the Start menu. This list contains the local file access history of a computer and is quite comparable to a browser’s history list. The NoRecentDocsHistory DWORD value can be used to prevent documents from getting added to this list. A data value of 1 removes the list from the start menu, while a data value of 0 enables the list.

NoDesktop: - 

This DWORD value can be used to hide the entire desktop (including all file and folder and system folder). A data value of 1 hide the desktop and all contents on it, while a data value of 0 displays the desktop.

NoSetFolders: - 

This DWORD value can be used to either remove the entire settings folder (including all sub-folder like control panel, printers and taskbar) normally accessible through the Start Menu. A data value of 1 hide the folder, while a data value of 0 display it.

NoSetTaskbar: - 

It removes Taskbar system folder them the Settings option on the Start Menu. This restriction removes the Taskbar and Start Menu items from the Control Panel, and it also removes the properties item from the Start Menu context menu.

NoSaveSettting: -

This DWORD value can be used to prevent your desktop settings from being changed by the user. A data value of 1 protects the desktop settings, while a data value of 0 allows the user to change desktop settings.

DisableRegistryTools: - 

Disable registry editing tools. If you disable this option, the Windows registry editor too will not Word. Create new DWORD and called DisableRegistryTools and its value 1 to disable it and 0 to enable it.

NoClose: - 

It disables Shut Down and prevents the user from normally shutting down Windows. Create new DWORD and called NoClose and Put its value 1 for disable it.

NoAddPrinter: - 

This DWORD value is quite similar to be previous restriction feature, except that it imposes restriction on a user’s ability to add new Printers.

NoFind: - 

This DWORD value can be used to either disable/hide or enable the find option normally accessible through the Start menu. A data value of 1 hide the Find option from the Start menu, while a data value of 0 displays it.

NoStartMenuMyMusic: - 

This DWORD value can be used to either disable/hide or enable the My Music Option normally accessible by clicking on start > Libraries. A data value of 1 hide the option from the Start Menu, while a data value of 0 displays it.

NoSMMyDocs: - 

This DWORD value can be used to either disable/hide or enable the My Documents option normally accessible by clicking on Start Libraries. A data value of 1 hide the option from start menu, while a data value of 0 displays it.

NoSMMYPictures: - 

This DWORD value can be used to either disable/hide or enable the My Pictures option normally accessible by clicking on Start Libraries. A data value of 1 hide the option from start menu, while a data value of 0 displays it.

NoSMHelp: - 

This DWORD value can be used to either disable/hide or enable the Help option normally accessible through the Start Menu. A data value of 1 hide the option from the Start menu, while a data value of 0 displays it.

NoNetworkConnections: - 

This DWORD value can be used to either disable/hide or enable the network and Dial-up connections option normally accessible through the Start Menu. A data value of 1 hide the option from Start Menu, while a data value of 0 displays it.

NoFavoritesMenu: - 

This DWORD value can be used to either disable/hide or enable option normally accessible through the Start Menu. A data value 1 hide the option from the Start Menu, while a data value of 0 displays it. 

NoTrayItemsDisplay: - 

Normally, there are a number of Application Tray Icon displayed in the right button corner of the screen next to the system clock. With the help of a simple registry tweak, it is possible to prevent these items from being displayed. The NoTrayDisplay DWORD entry with a value of 1 means that the tray items shall be hidden, while a value of 0 shall display them.

NoToolbarsOnTaskbar: -

The newer version of the windows operating system allow user to create toolbars that get embedded into the taskbar for quick accessibility. For example, the quick Launch, Address, and Links. The NoToolbarsOnTaskbar DWORD entry with a value of 1 can hide all such toolbars, while a value of 0 enables them again. 

NoNetHood: - 

This DWORD value can be used to hide the Network Neighborhood icon from the desktop. A data value of 1 hides the icon, while a data value of 0 display it.

NoCommonGropus: - 

This DWORD value can be used to hide the common group folders that are normally accessible through the Start Menu. A data value of 1 hide the common group folders, while a data value of 0 displays them. 

ClearRecentDocsOnExit: - 

It is also possible to automatically clear the Recent Documents List each time Windows exits. The ClearRecentDocsOnExit value of 1 enables this features, while a value of 0 disable it.
Remote Desktop is software that allows a user to remotely access and control application on some other system on the internet. Just the way it is possible to use a remote control to control electronic devices at your home (like your television, air conditioner, music system and others), remote desktop software is like a remote control to some others system on the internet.
Remote desktop software usually works by transmitting images of the controlled computer to the controlling computer at period intervals of time. It is almost like a live video feed of the controlled computer being watched on the controlling computer. The controlling computer can also control the controlled computer using their mouse and keyword. Typically, remote desktop tools are used by the technical helpdesk of a company or manufacture to diagnose and fix technical issues on the controlled computer. Remote Desktop tools can also be used by users to access their home computer from your collages or company remotely. Most importantly, they can also be used to bypass blocking mechanisms and access blocked website and applications.
If you are working for a company or studying in a collage, then chances are that they would have blocked access to all your favorites’ websites on the internet (like Facebook, YouTube and Google Talk, Skype and others) and even blocked applications like instant messengers. However, if you still want to access those blocked websites and applications from your office or collage computer then Remote Desktop Software can be very useful.
One of my favorite’s remote desktop tools is a software called Team Viewer, Which is available as a free on internet. You can download from http://www.teamviewer.com
Some others popular free Remote desktop software are the following:-
Team 
Log Me in
Real VNC
Tight VNC
Ultra VLC
Windows Remote Desktop

How Search Engine Works?

Search engines perform many activities so as to deliver search results:-
 
Crawling - is that the method of winning all the net pages coupled to an online website. This task is performed by a computer code, known as a crawler or a spider (or Google bot, as is that the case with Google).


Indexing - is that the method of making index for all the fetched sites and keeping them into a large information from wherever it will later be retrieved. basically, the method of assortment is distinctive the words and expressions that best describe the page and distribution the page to explicit keywords.


Processing - once a hunt request comes, the program processes it . i.e. it compares the search string within the search request with the indexed pages within the information.

Calculating Relevancy - Since it's probably that quite one pages contains the search string, that the program starts shrewd the connection of every of the pages in its index to the search string. 

Retrieving Results - The last step in search engines' activities is retrieving the simplest matched results. Basically, it's nothing quite merely displaying them within the browser.

"Search engines like Google and Yahoo! usually update their connection formula dozens of times per month. after you see changes in your rankings it's because of Associate in Nursing algorithmic shift or one thing else outside of your management."

Although the essential principle of operation of all search engines is that the same, the minor variations between their connection formula cause major changes in results connection.

What is SEO Copywriting?

SEO Copywriting is that the technique of writing the seeable text on an online page in such the simplest way that it reads well for the natator, and conjointly targets specific search terms. Its purpose is to rank extremely within the search engines for the targeted search terms.

As well because the see able text, SEO Copywriting sometimes optimizes different on-page components for the targeted search terms. These embrace the Title, Description and Keywords tags, headings and angular position text.

The idea behind SEO Copywriting is that search engines need real content pages and not further pages (often known as "doorway pages") that a
re created for the only purpose of achieving high rankings.

What is Search Rank?

When you search any keyword employing a program then it displays thousands of results found in its information. A page ranking is measured by the position of sites displayed within the program results. If program is putt your online page on 1st position then your online page rank are no 1 and it'll be assumed like a high rank.
SEO is that the method of coming up with and developing an online website to attend a high rank in program results.

http://www.difftrick.com