Thursday, 26 June 2014

10 Easy Steps to Speed Up Your Computer Without Upgrading

10 Easy Steps to Speed Up Your Computer Without Upgrading



             It seems that the longer you own your computer, the slower it gets! A lot of people will keep their computer until it gets so slow that they feel they need a newer, faster model. Some feel like the reason it is getting slower is because it is getting older, when that is just not the case. Your computer should run just as fast as the day you brought it home – if you follow these 10 Easy Steps to Speed Up Your Computer.


1). Empty the Temp directory regularly:

                Every time you launch a program, it creates a temporary file, until you either save or close the file. The reason it does this is in case your system crashes or gets turned off (before saving the file), it will be possible to recover the unsaved file you were working on. This is a good idea, but rarely works. Every time your system crashes, locks up, or gets turned off while you have open files, these temp files get created and just sit there in the Temp directory. Then, every time you launch a program, it looks through all of the temp files (to see if one needs to be recovered) and slows the open process, and in some rare cases, even locks up when trying to launch. In any event, the launch process is slowed.

Other ways of getting unneeded temp files is by installing programs. Most programs that get installed extract temp files (needed during the installation) to the temp directory, but a lot of times don’t get deleted when the installation is complete.

Windows also uses the temp directory for its temp files, for recovery purposes and ongoing use.

After a short while, the temp directory fills up with hundreds (and I have even seen thousands) of temp files that always get scanned over when Windows starts up and when programs launch. This slows everything down immensely.

Rule of thumb for Temp Files: If you don’t have any programs open (and nothing minimized in the bar below), then you shouldn’t have ANY temp files in your temp directory. If you do, delete them.

To delete Temp files, make sure NO programs are open, and…

a. In Windows 95, 98 or Me, go to C:WindowsTemp and delete everything inside the Temp folder.

b. In Windows 2000 or XP, it is a little trickier. First, make sure that you can see hidden folders. Double-click My Computer. Click on the Tools pull-down menu, and then on Folder Options. Click on the View tab. Scroll down and click on Show Hidden Files and Folders. Click Ok. Now you can go to the

C:Documents and SettingsAdministratorLocal SettingsTemp folder. Delete everything here.
Also, look in the
C:Windows(or Winnt)Temp or Tmp folders. Delete everything here, as well.

Note: this assumes that your logon ID is Administrator. If the main account is not Administrator, or if there are more than one account, substitute “Administrator” for the account names, and delete the temp files from all of the C:Documents and Settings(account name)Local SettingsTemp folders.


2). Empty the Temporary Internet Files regularly:

                 This is similar to the Temp directory, but for images and cookies while browsing websites. Every time you go to a website, your browser will look through your list of temporary Internet files, to see if you have all of the images needed to view your requested web page. If it is a very long list, it will delay your view time. However, if you have a dial-up, this is the lesser of two evils. If you already have the needed images, it is quicker (for a dial-up) to look through your temporary Internet files, than to download new images every time you visit a website.

On the other hand, if you have a broadband Internet connection (highspeed CableModem, DSL, Wireless, etc.), and you want a little more snap in your surfing, then you should delete your Temporary Internet Files on a regular basis, and choose to Check for Newer Images on Every Visit to a web page.

To empty Temporary Internet Files:
               Go to your Control Panel, by click on the StartSettingsControl Panel (or in Windows XP, just StartControl Panel) and double-click the Internet Options icon. Choose to Delete Cookies, and to Delete Files. This will clear all of your Temporary Internet Files.

To have Internet Explorer always check for new images and content on every visit to a web page, to the right of the Delete Files button, is the Settings button. Click this button and choose Every Visit to the Web Page. This option never has Internet Explorer look through your Temporary Internet Files to see if you already have the images needed. This way, Internet Explorer will just automatically download every image, every time, without looking through a list. If you have a good Internet connection, this is the better way to go. Don’t forget to delete your Temporary Internet Files every once in a while (see above).


3). Check your hard disks for problems:

                   There are two different types of disk checks: one is a file check, which checks the state of your operating system, checks all of your files, your file structure, and other software checks. If there are software problems (such as a corrupt FAT (file allocation table), etc., this check will attempt to fix it. The other is a physical hardware disk check. This checks the surface of your hard disks, to see if there are bad sectors (sections) of your hard drive, to see if your drive is physically experiencing problems. This disk check will attempt to repair the bad sectors, but if it can’t, it will mark the sector as bad and attempt to move the file(s) or file “pieces” to a good sector(s) of the disk. By marking the sector as bad, it knows not to write any future files to this section of the hard drive.

To run a disk check (or scan disk), here are the steps:

a. For Windows 95, 98, or Me, double-click My Computer. Right-click the C-drive and click on Properties. Click on the Tools tab and choose to check the computer for problems. If you choose to do a Thorough Scan, this will do the hardware check for physical disk damage or sector damage. Otherwise, the Standard Scan does the software file check. In either case, you can choose to have the scan automatically fix any errors it finds. The Thorough Scan does take quite a bit longer. You may want to let this run over night. Only do the Thorough Scan when you think there may be a problem with your drive itself, or if you haven’t run it in a few months, otherwise, run the Standard Scan once a week or so.

b. For Windows 2000 and XP, double-click My Computer. Right-click the C-drive and click Properties. Click on the Tools tab and choose to check the computer for problems. Click on Check Now. You will then have two check boxes. The top option is for the file check, and the second option is for the hardware (physical disk) check. Check either one, or both. At least check the top one. Again, if you think you may be having problems with the hard disk itself, then check the second one, as well. And just like the Windows 98 Thorough Scan, this will take quite a bit longer to run, so let it run over night. One thing, though: For Windows 2000 and XP, you won’t be able to run the check right then. After clicking the Start button (once the check boxes are checked), you will need to reboot to run the disk check. It will ask you if you want the system to run the CHKDSK on reboot. Choose Yes and reboot. Just before getting back into Windows, the system will do its CHKDSK, and depending on which options you chose, will take either a few minutes, and sometimes up to an hour or so, to run. Let it run.


4). An even more thorough disk check (and tune-up):

                     It would be to use a 3rd party utility (a stand-alone program outside of Windows) to check everything for you, automatically. One of my favorites is TuneUp Utilities 2004. It costs $39.99, but they do offer a FREE download trial of 15 days, to check it out to see if it speeds up your computer and/or fixes any problems. This program does a really good job of not only checking your computer’s file structure, master boot record, file allocation table, and files, but also an extremely good job of detecting and fixing bad sectors of your physical disk drives. And not only that, it also tunes up your system for increased speed, checks and cleans your registry, adjusts memory for you, tweaks your Internet settings for faster downloads and browsing (whether you use a dial-up or broadband), and streamlines your operating system for peak performance.


5). Don't want the TuneUp Utilities:

                   If you don’t want to get the TuneUp Utilities 2004, you can do a few of the performance tweaks yourself, if you have Windows XP. By default, EVERYTHING is turned on in Windows XP. It isn’t very streamlined for performance, but rather for appearance. You can turn off a few of the unnecessary features, and Windows will still work just fine, and maybe a little faster.

             To do this, right-click on My Computer and click on Properties. Click on the Advanced tab. Under the Performance section, click on the Settings button. On the Visual Effects tab, you will see a list of check boxes. By default, these are all on. You really don’t need any of them. If you choose one of the radio buttons at the top, say, Adjust for Best Performance, then all of the check boxes will turn off. This will noticeably speed up your computer. You can go through the check boxes one by one, and determine which ones you can and can’t live without. The one that will make the biggest effect is the very last one in the list. This is the Themes. If you turn it off, it will free up a lot of system resources and give you quite a bit more memory to work with, but Windows XP will look more like Windows 2000. For most people, this isn’t a problem. It is all eye-candy, anyway. Your pretty green pasture picture will disappear; your pretty green and blue buttons and task bar will go to a gray. If you can live with these things, then you will have much more performance. You will find that menus open up much more quickly and everything responds more immediately.



6). Turn off Active Desktop:

                  Active Desktop turns your desktop into a web page, and allows you to have things like a real-time calendar, and up-to-the-minute weather or stocks. These things are really neat, but your system takes a performance hit when they are running in the background all the time. And even if you don’t use Active Desktop for anything, just having it active can cause a performance decrease. Turn it off.

a. In Windows 95, 98 and Me, right-click on the desktop and in the pop-up menu, choose Active Desktop. Inside that option, uncheck Active Desktop. If there is no check next to it, then it isn’t on. Don’t choose it. Instead, just click the desktop again to get out of the menu.

b. In Windows 2000, right-click on the desktop and in the pop-up menu, choose Active Desktop. Inside that option, uncheck Show Web Content. Again, if there is no check next to it, then it is not on. Do not check it.

c. In Windows XP, right-click on the desktop and in the pop-up menu, choose Properties. On the Desktop tab, choose Customize Desktop. Now, on the Web tab, make sure that there are no websites chosen here. If there aren’t any, then Active Desktop is not on. Cancel and go back to the desktop.


7). Install and run a good AntiVirus program: 

                  Install and run a good AntiVirus program to keep out viruses and Trojan horses that can take over your system. If you have a virus(s), your system performance can be dramatically decreased. Viruses can do all kinds of nasty things to your computer. They can take over your computer, erase your hard drive, use your computer as a server, give you a bunch of illegal music or programs and tell all of their friends to download it all from you – leaving you holding the bag and supplying the computer space and bandwidth for their hobby. So, protect yourself with a good AntiVirus program. One of my favorites is AVG. It is not only a really good AntiVirus program, but it is also FREE! If you don’t have any AntiVirus software on your computer, get AVG AntiVirus NOW by downloading HERE. If you already have an AntiVirus program, and you want to use AVG instead, do NOT install AVG. First, uninstall your current AntiVirus program, reboot and install AVG. You do NOT want to have two AntiVirus programs installed at the same time. They will work against each other and can cause problems.


8). Get rid of Spyware:

                 A lot of computer users have Spyware and don’t even know they have it, much less how to get rid of it. If your computer has been taking you to websites that you don’t want to go to, or if you get pop-ups when you aren’t even on the Internet, or if your computer has been running extremely slowly lately, for no reason, you probably have Spyware.

On all of the computers that I setup, I install two different AntiSpyware programs: AdAware SE and SpyBot. These two programs are highly recommended by TechTV (G4) and other computer authorities (including my own research on Spyware) and work very well together. They compliment each other and catch Spyware that the other misses, but together, do a very good job.

SpyBot is not only a good program for getting rid of Spyware, but also as a preventative Spyware-catcher. It sits there and looks for known Spyware coming into your system, as well as suspicious-looking content. If you use the Tea-Timer feature, it can be a little annoying, but ANY suspicious-looking program, trying to be installed on your system, is flagged and your permission is asked for it to be installed (now and always).

AdAware SE has a little better Spyware database in it, but is not setup as a preventative AntiSpyware program. It does do a good job when you keep up on the updates and manually scan your system with AdAware.

If, after downloading and installing, updating, and running both of these AntiSpyware program, you still can’t get rid of your Spyware, you may need to enlist the services of a professional. Some Spyware is so intelligent that it looks to see if AntiSpyware programs delete the Spyware part of its programming and, if it’s gone, reinserts it back in place. This can be very frustrating for the user (and in some cases, even for the professional). There are stronger measures that can be taken to get rid of the Spyware, in cases like this, but can be very devastating to the user’s computer, if not handled perfectly. At this point, leave it to the professional. Call a local computer repair company and have them come out to your home or business and get rid of the Spyware for you.

In some cases, when the Spyware has become too entwined into your system, even a computer repair technician can’t get rid of the Spyware. At this point, it is better to just backup only what you need and have the operating system reinstalled. Believe me, when your computer gets to this point, you don’t want to just put a “band-aid” on it. Just start from scratch with a clean system. It’s the best way to go.


9). Streamline MSCONFIG:

                  One thing that really causes a HUGE performance decrease is to have unnecessary programs running in the background. Some of these programs can be seen in your System Tray (located next to the clock, in the lower-right corner of your screen). These are tiny programs that are robbing you of memory and processing power. Some of them you need, while most you don’t. Some of the programs you DON’T need are printer icons, CD burning icons, shortcuts to programs (such as video settings), AOL, any Instant Messaging Programs, etc. Just because these programs aren’t always running, doesn’t mean that you still can’t print, burn CDs or Instant Message. They can be run when you need them, from a shortcut.

You can use a utility, called MSCONFIG, to turn OFF unnecessary Start Up items.

a. In Windows 98, Me, and XP, click on StartRun and type msconfig. Click on the Startup tab. This is a list of everything that is running in the background, some of which show up in the System Tray. Now, be careful, some of these you do need. Some items to keep are Ctfmon.exe (XP), Scan Registry (Win98, Me), Task Monitor (Win98, Me), System Tray (Win98, Me), LoadPowerProfile (Win98, Me), Rundll.32, any AntiVirus programs (such as McAfee, Norton, or AVG). Others, you can uncheck, such as NeroCheck, ypager, qttask, AOL, and any other Instant Messaging programs, or printing programs. Remember, if something doesn’t work, because you turned it off, it can always be turned back on. You just have to reboot every time you make a change here. But, as you uncheck the unnecessary programs that run in the background, you will see that Windows loads much faster, that there are less icons in the System Tray, and that your system is much more “snappy” and quick to respond.

b. In Windows 2000, MSCONFIG wasn’t supplied. You actually have to download and run an MSCONFIG utility. A Google Search on "MSCONFIG utility" leads you to the download page, you can download this software from there. And if you copy it into your C:Windows(or Winnt)System32 folder, you can access it the same way as Windows 98 or XP (by the Run command in the Start menu). Or, you can just double-click it and use it that way, too. See above for what to leave checked and unchecked.

After you reboot, you will have a window that says that the configuration utility was edited. Just check not to show that in the future, a check box at the bottom. This just means that there was a change made to the MSCONFIG.


10). Defragment your hard drives:

                  If you have never done this, or it has been a few months since the last time, this step is one of the most important things that will give you more performance. As you use your computer, your drives become fragmented, by creating and deleting files. Just because a file is 10mb in size, doesn’t mean that it is sitting there on the drive (all 10mb) all in one spot on the drive. It fills in from the inside of the drive, outward, as the drive finds room. So your one file can be in pieces, in several spots on the hard drive. Don’t worry, your file allocation table keeps track of where the pieces are, however, it takes longer to access a file that is in pieces (fragmented), than a file that IS all in one spot on the hard drive. This is where defragmenting comes in. When you defragment your hard drive, this process copies all of the pieces to temporary spots on the hard drive, and then fills in all of the files (in their entirety) from the inside, out, so that no files are split into pieces. This dramatically speeds up the seek time, as well as speeds up the use of your files and programs.

How to Recover Erased Files from Computer Hard Drive

How to Recover Erased Files from Computer Hard Drive


How to Recover Erased Files from Computer Hard Drive

             Every day we may have to delete some useless files from our computer to save some space, and then we empty the recycle bin. But sometimes, we always accidentally delete something that we still need. The deleted files are stored in recycle bin. But if you empty the recycle bin, the lost files cannot be recovered anymore by hands. But there is chance to recover erased files with recovery software. The problem is how to find the best recovery tool.

There is a recovery tool you can use: WiseRecovery

               WiseRecovery is the best recovery software that can help you recover erased photos, video files, music, emails and other multimedia files from your computer hard driveSD card and other storage media. It works very efficiently and can do a good job in recovering lost files of all kinds. After recovery, WiseRecovery will take you to the destination folder where the recovered files are stored. WiseRecovery has a simple working system. You don’t need to be a professor of computer, and just in a few minutes you will get the erased files back.

Note: This Software is Paid Version, You need to pay to recover files.

Features Of WiseRecovery:

  • WiseRecovery supports all common file formats, including Image, Video, Music, Document, Emails and Archives. You can recover every kind of files due to any reason.
  • WiseRecovery supports all situations of file lost, such as accident deletion, formatting, device corruption, etc.
  • Support all digital devices, such as hard disk, SD card, memory stick, raid, and other multimedia device.
  • Support all file systems, FAT, Windows exFAT, Linux, RAID.
  • WiseRecovery can fix all the error messages given by all the digital devices.

The steps you need to follow to recover erased files with WiseRecovery:

1.) Run WiseRecovery software, and click on Start scan.


2.) Choose the drive to start scanning.


3.) Now, the scanning process will commence. After scanning, list of file types will be displayed in the left pane.


4.) Click each file type to view files in it. You will see thumbnails when you click on the file type.

5.) You can either recover all or selected files by clicking the Recovery button.

That's it.

How To Make A Folder Invisible?

How To Make A Folder Invisible?



Hai friends! here is an awsome trick to Hide a folder without any software or hardwork.

Using this trick You can do two things,
  1. Creating A Folder Without Name.
  2. Making An Invisible Folder.
The Later is derived from the former one.

Creating a folder without name:


  • Create a New Folder on the desktop or elsewhere.
  • Rename the folder as follows, Hold Alt and type 0160 Using the numbers on the right of your keyboard.
  • Now remove Alt and press Enter.
  • That's it, Now u have created a folder without Name. :)

Making An Invisible Folder:



Creating an invisible folder is very simple. Just do the above things and create a folder without name. Then follow the below steps.
  • Right click the folder and go to Properties.
  • Select the Customize Tab.
  • In the Folder icons section, click the Change Icon button.
  • Move the navbar, you can find empty spaces in between various icons. Select any one empty spaceamong them and press Ok.
  • Now, you will see nothing unless you click that place, where your folder was previously present.
If you have any problem in doing this just leave a comment. I will help you.

What are Cloud Services?

What are Cloud Services?



If you work in business and computers, chances are you would have heard about cloud services. It’s something that is talked about a lot but rarely explained to those who don’t know. If you are starting a job in this area or are just curious about the service and how it can help you, it’s important it is explained clearly to you.

Below is a guide on cloud services. This article covers what it means, what cloud services are and how they can help you and your company. Hopefully, after reading you should have a better understanding of cloud services.

What does the term “cloud” mean?

The term cloud in computing refers to internet based computing. It is when all your resources, files, software, programs and information you share on it are available to other computers and internet enabled devices. It means everything you store on your cloud is easily available online.

What are cloud services?

Cloud services are when a business offers secure cloud space to individuals, businesses and organisations.

With a cloud service you can have programs such as word processing programs, spread sheet programs, in-house data systems and email programs easily available without the use of downloading the software onto your computer or device. The result is easy accessibility to files and programs from any device so that you can work from any device and share files and information with others. It works great with families, who may want to share photographs and files, and it works for businesses that may need to work on shared files and access informationeasily and regularly.

How can cloud services help me and my business?

Cloud services can help your business if you rely on your team to access the same files and if your company is computer based. When you work in an office, frequently you will need to access a file someone else has been working on or updating. With a cloud service, anyone of your staff members with the right permissions can access these shared files, saving you time and money. With a cloud service you don’t need to waste time emailing things or downloading them onto external hard drives, this in turn can save you money.Using cloud services can mean if an employee can’t come in because their child is sick off school or it’s a snow day, your employee can still work that day from home by just logging onto the cloud service where all the files they’ve been working on are stores.

What companies provide cloud services?

There are many types of companies that supply cloud services. The first thing to take into consideration is security and reliability. Consider how there are three different types of cloud: public, private and hybrid. Work out which type will serve your needs best, for example if you are using the service for personal use, private is good for you.Do some research on companies before committing to a service as there are many companies now offering this and therefore, a lot of competition. Companies that specialise in technology solutions usually offer this service and tend to be reliable due to their specialised field.

Trick to Use Android Smartphone as WebCam

Trick to Use Android Smartphone as WebCam

If you do not own a WebCam, then you can now easily use your smartphone as Web Camera. If your Smartphone have good Camera quality then its even better. Web Camera Comes really handy when you wish to video chat with your friends or family members.
Use Android Smartphone as WebCam

By using your Android Smartphone as Web camera, you will even save Money and its very useful when you need a web cam urgently and your web cam don't Work Proberly.

We will Be using an APP to perform this trick. Other things you need is a USB cable to Connect your Smartphone to PC.


Steps to use Android Smartphones as Web Camera


Step 1: Download and Install DroidCam app on your Android Smartphone.

Step 2: Now Download DroidCam Windows Client and install it on your PC.
Install it as just you install other Softwares. it will automatically Install all the required Drivers.

Step 3: Once you have Downloaded and installed DroidCam on your Smartphone and PC, its time to connect your Smartphone to PC using USB Cable, Make sure to enable USB Debugging on your Smartphone.

Step 4: Once your smartphone is connected to your PC, Its Time to open DroidCam app on your Smartphone and the Windows Client on your PC. Click on USB icon and then Click "START"

Step 5: Thats it, now you will see the Magic On your Screen. Enjoy!!

These above steps should work well but if you find it difficult to Perform this trick then Visit this link to know more.

If you Still have any Trouble then Feel free to Comment in below Comment box.

Secret Codes For Your Android Mobile

Secret Codes For Your Android Mobile



Hai friends, here is a wide collection of secret codes for your mobile with Android OS. These codes enables you to access the hidden options which are not shown by default on your device, and can be used for testing the functions of various utilities used by your mobile.

Note: We Cannot guaranty that these codes will work on all Android mobiles!

General Codes:



*#06# – To Display's IMEI number.

*2767*3855# – To format your device i.e To delete everything on the phone memory (Can be customized).

*#*#4636#*#* – This code will display your usage statistics and battery.

*#*#273282*255*663282*#*#* – This code helps you to back up all media files on your mobile.

*#*#197328640#*#* – This code will send you to the test mode, to test various functionality of your mobile.

*#*#1111#*#* – This code will display FTA software version.

*#*#1234#*#* – This code will show PDA and firmware version.

*#*#232339#*#* – For wireless LAN tests.

*#*#0842#*#* – This code is used  for Backlight/vibration test.

*#12580*369# – Display's Software and hardware info.

*#*#2664#*#* – This code is used for Testing the touchscreen.

*#9900# – System dump mode.

*#9090# – Diagnostic configuration.

*#*#34971539#*#* – Will display Detailed camera information.

*#872564# – USB logging control.

*#301279# – HSDPA/HSUPA Control Menu.

*#7465625# – This code will display phone's lock status.

*#0*# – This code will enable you to enter the service menu on newer phones like Galaxy S III.

*#*#7780#*#* – Reset the /data partition to factory state.


Basic Codes:

*#*#7780#*#*   - This code is used for factory restore setting.This will remove Google account setting and System and application data and settings.

*2767*3855#   -  This code is used for factory format, and will remove all files and settings including the internal memory storage. It will also re install the firmware.

*#*#4636#*#*   - This code show information about your phone and battery.

*#*#273283*255*663282*#*#*    - This code opens a File copy screen where you can backup your media files e.g. Images, Sound, Video and Voice memo.

*#*#197328640#*#*    -  This code can be used to enter into Service mode. You can run various tests and change settings in the service mode.

*#*#7594#*#*   -  This code enable your "End call / Power" button into direct power off button without asking for selecting any option(silent mode, aero plane and power-off).

*#*#8255#*#*  -  This code can be used to launch G Talk Service Monitor.

*#*#34971539#*#*    -  This code is used to get camera information. Please avoid update camera firmware option.

W-LAN, GPS and Bluetooth Test Codes:

*#*#232339#*#* OR *#*#526#*#* OR *#*#528#*#*   -  W-LAN test (Use “Menu” button to start various tests).

*#*#232338#*#*    -  Shows WiFi MAC address.

*#*#1472365#*#*    -  GPS test.

*#*#1575#*#*    -  Another GPS test.

*#*#232331#*#*   -  Bluetooth test.

*#*#232337#*#    -  Shows Bluetooth device address.

Codes to launch various Factory Tests:

*#*#0842#*#*   - Device test (Vibration test and BackLight test).

*#*#0588#*#*    - Proximity sensor test.

*#*#0*#*#*    -  LCD test.

*#*#2664#*#*   -  Touch screen test.

*#*#2663#*#*    -  Touch screen version.

*#*#0283#*#*   -  Packet Loopback.

*#*#0673#*#* OR *#*#0289#*#*    -  Melody test.

*#*#3264#*#*    -  RAM version.

Code for firmware version information:

 *#*#1111#*#*   -  FTA SW Version.

*#*#2222#*#*   - FTA HW Version.

*#*#44336#*#* - PDA, Phone, CSC, Build Time, Changelist number.

*#*#4986*2650468#*#*   - PDA, Phone, H/W, RFCallDate.

*#*#1234#*#*  - PDA and Phone.

Advantages And Disadvantages Of Rooting

Advantages And Disadvantages Of Rooting

rooting-android-phone_cyberstream.in Android OS (Operating System) being open “Open Source” mobile operating system.
Rooting Nowadays  is a fairly easy Task, and you can find many tools that will help you get your Smartphone or tablet Rooted .
Owning a iPhone and wondering what actually rooting is?
Rooting is a similar process called Jail-breaking which we do to device running Apple iOS .
So why actually we root our Android devices?
Today Android Smartphones  in the market come with a few limitations.
Pr-installed Apps , No higher end permission to your Android based  Smartphone, Can’t install the Apps the requires root or you can say Super user permission.
Root-Android-cyberstream.in

Advantages And Disadvantages Of Rooting :-
Advantages of Rooting An Android Smartphone
Rooting our Android Phone will allow us to customize our Phone, In usual cases these customization are kept away from normal users because of security factor .
You can add custom fonts with this app Font Installer to you Device.

After rooting your device, you can install Custom Rom , if you are not satisfied with the stock configuration of your device.
You can get better performance and even all new user – experiences Plus more Battery backup a big advantage of Rooting your device.

You can run special applications that require root access on your phone E.G Droid-VpnGreenify ,Font Installer and many more.
Having low internal storage in your phone so after rooting you can also  transfer any application from internal memory to SD card.
Disadvantages Of Rooting Android Phone
So when come come to the point disadvantages there are not too many disadvantages of Rooting a phone or we can say we can carry on with those changes.
Main Disadvantage Rooting voids your warranty. You are responsible to take care of your device if you root it.

Your Phone Might Get BrickedBricking is rare in the Androidcommunity but does happen, Bricking which mean your device’s software is corrupted to the level that you can not fix it yourself.
Although device manufacturers can resolve it but as your phone’s warranty is void, you can not ask them for any help. so you have to be really very careful while rooting your Device.

How to Identify and Avoid Phishing Scams

How to Identify and Avoid Phishing Scams

Phishing_Alert1-300x171Phishing is a form of social engineering technique used by hackers to gather sensitive information such as usernames, passwords and credit card details by posing as a trustworthy person or organization. Since most online users are unaware of the techniques used in carrying out a phishing attack, they often fall victim and hence, phishing can be very effective.
With the dramatic increase in the number of phishing scams in the recent years, there has also been a steady rise in the number of people being victimized. Lack of awareness among the people is the prime reason behind such attacks. This article will try to create awareness and educate the users about such online scams and frauds.
Phishing scams usually sends an email message to users requesting for their personal information, or redirects them to a website where they are required to enter their personal information. Here are some of the tips to identify various phishing techniques and stay away from it:

Identifying a Phishing Scam:

  1. Beware of emails that demand for an urgent response from your side. Some of the examples are:
    • You may receive an email which appears to have come from your bank or financial organization stating that “your bank account is limited due to an unauthorized activity. Please verify your account asap so as to avoid permanent suspension”. In most cases, you are requested to follow a link (URL) that takes you to spoofed web page (similar to your bank website) and enter your login details over there.
    • In some cases, phishing emails may ask you to make a phone call. There may be a person or an audio response waiting on the other side of the phone to take away your credit cards details, account number, social security number or other valuable data.
  2. Phishing emails are generally not personalized. Since they target a lagre number of online users, they usually use generalized texts like “Dear valued customer”, “Dear Paypal user” etc. to address you. However, somephishing emails can be an exception to this rule.
  3. When you click on the links contained in a phishing email, you will most likely be taken to a spoofed web page with official logos and information that looks exactly same as that of the original web pages of your bank or financial organization. Pay attention to the URL of a website before you enter any of your personal information over there.
    Even though malicious websites look identical to the legitimate site, it often uses a different domain or variation in the spelling. For example, instead of paypal.com, a phishing website may use different addresses such as:
    • papyal.com
    • paypal.org
    • verify-paypal.com
    • xyz.com/paypal/verify-account/

Tips to Avoid Being a Victim of Phishing:

  1. Do not respond to suspicious emails that ask you to give your personal information. If you are unsure whetheran email request is legitimate, verify the same by calling the respective bank/company. Always use the telephone numbers printed on your bank records or statements and not those mentioned in the suspicious email.
  2. Don’t use the links in an email, instant messenger or chat conversation to enter a website. Instead, always type the URL of the website on your browser’s address bar to get into a website.
  3. Legitimate websites always use a secure connection (https://) on those pages which are intended to gather sensitive data such as passwords, account numbers or credit card details. You will see a lock icon GetContent in your browser’s address bar which indicates a secure connection. On some websites like paypal.com which uses an extended validation certificate, the address bar turns GREEN as shown below.
    HTTPS_Address-Bar
    In most cases, unlike a legitimate website, a phishing website or a spoofed web page will not use a secure connection and does not show up the lock icon. So, absence of such security features can be a clear indication of phishing attack. Always double-check the security features of the web page before entering any of your personal information.
  4. Always use a good antivirus software, firewall and email filters to filter the unwanted traffic. Also ensure that your browser is up-to-date with the necessary patches being applied.
  5. Report a “phishing attack” or “spoofed emails” to the following groups so as to stop such attacks from spreading all over the Internet:
    You can directly send an email to reportphishing@antiphishing.org orspam@uce.gov reporting an attack. You can also notify the Internet Crime Complaint Center of the FBI by filing a complaint on their website:www.ic3.gov.
I hope the information presented in this article will help you detect and avoid various phishing scams that are waiting to rip off innocent Internet users. If you’ve anything to say, please pass your comments.