Saturday, May 17, 2014

10 Epic Foot-In-The-Mouth Comments Against Modi

Narendra Modi has led the BJP-led National Democratic Alliance (NDA) to a sweeping win in the 2014 Lok Sabha Elections. The Modi-tsunami has also left these people red-faced.

Have a look at what they had said.

image
Nothing says “losing” like winning 71 seats in Uttar Pradesh.


image
Great. Mr. Gowda, how about retiring to the calming environs of Pondicherry or Goa? Or even taking Modi’s offer to move to Gujarat?


image
Mr. Sibal, you could have spent more time worrying about your own constituency where you are trailing behind BJP and AAP.


image
Mr. Khan, how soon do you think we can see you as Ms. Khan?


image
Mr. Jha… LOLOLOL… never mind.


image
How do you like the sound of “Charu Prasad Yadav”?


image
Mr. Aiyar, would you like some salt and pepper on that foot of yours?


image
Because nothing says “stumbling” like losing 22 seats to BJP in Bihar.


image
Looks like Congress thwarted itself.


image
This isn’t 2004, Mr. Narayanasamy. Get yourself a new leader, and maybe you’ll have a chance five years down the line.

Know some more of these? Share the gems with us in the comments below.

Friday, May 16, 2014

INDIA Won !!!



Finally, here is the historical win for the @BJP4India
There is clean wipe-out of Indian National Congress this time and BJP got their mission of 272+ accomplished.

INDIA IS LEADING NOW!!!!


Saturday, March 8, 2014

Download Battlefield 4 Game For PC , XBOX , Playstation For Free

Download Battlefield 4 For Free 2013 Online

Download battlefield 4 online  as it Arrives on the internet ready to download the Open Beta version of Battlefield 4 for Xbox 360, in English and fully functional.

Download Battlefield 4 for Xbox 360 Beta

The big day has arrived: Starting  today  you can download Battlefield 4  for  PC , PlayStation 3  and  Xbox 360 .download battlefield 4 online for free
Downloading the beta you can play the map  Siege of Shanghai  in cooperative mode, but not all owners of  Battlefield 3  and  Medal of Honor: Warfighter  (Digital Deluxe) and those who have already made ​​a preorder for  Battlefield 4  by Origin (always in Digital Deluxe version) will have the privilege to test a beta full of exclusive extras.
As mentioned, then, Electronic Arts  has a few minutes kicked off the beta exclusive and you can Download Battlefield 4  for PC, Playstation 3 and Xbox 360 absolutly free. To access the test build, even now, one must have booked the Digital Deluxe Edition of the title, be premium users in  Battlefield 3  or own the Limited / Digital Deluxe Edition of Medal of Honor: Warfighter . All other players will instead try the new title  DICE  from Friday, October 4.

For PC download simply go into your library Origin, while on the console, you must look for Download Battlefield 4  in their store.
In conjunction with the announcement of open beta  EA  also revealed the release date of  Battlefield 4 for next-gen consoles: the version of  Xbox One  is scheduled for  November 22 , that of  PlayStation 4  to November 29 .
The issues  PC ,  Xbox 360  and  Playstation 3  will come out instead a month earlier, on  October 29 .

The following technical requirements for the Windows version:
Processor: AMD Athlon X2 2.8 GHz or higher Intel Core 2 Duo 2.4 GHz or higher
Video Card: AMD Radeon 3870 or higher, NVIDIA GeForce 8800 GT or higher
RAM: 3GB
HDD Space: 30GB
Operating system: Windows 64-bit (the final version will also support 32-bit versions)

Recall that, in Battlefield 4, players will experience huge environments, a playground of destruction, access to an arsenal of vehicles, the ability to direct teammates, and much more in the first entry in the first person shooter franchise to run on Frostbite technology 3. The game aims to once again offer a premier multiplayer online gaming experience while providing an engaging and exciting story campaign.

DOWNLOAD BATTLESHIP 4 Video

 

WARNING: Beta only available for JTAG / Rgh

You can find it by doing a search on Google . Recall that, being a beta, it’s completely free and you can download it absolutely for free and legally.

How to use your computer from another place – Desktop Remote

Desktop Remote

Is it possible to use computer remotely which is known as Desktop Remote ?
The answer is Yes, It is possible that you can use your computer which is present at your home from anywhere you just need stable internet connection .
There are many method to use your computer form any place other than it is located but here we will use a third party software called TeamViewer for desktop remote
You can use this software for free for non-commercial use. It is easily available on internet.

Requirements and Use

  1. Your computer you want to use should be power on and should have stable internet connection and the software called Teamviewer at remote place .
  2. On remote pc you should have your ID for Unauthorize acess that means for the use of your computer you just need to put Username and Password and you can use your computer remotely present even before the dekstop that means from logon screen from any computer anywhere in the world through internet .

 How to install TeamViewer for Desktop Remote :

1. Click on the setup you downloaded from internet.
2. After that a popup window will appear will give you two options
a.  Install
b.  Run
Click on install and then click next as shown in figure below:
tmviewer1
3. The window will appear after clicking on next will ask you for three options
a. Personal / non-commercial use
b. Company /commercial use
c. Both of the above
You will select personal / non-commercial use for free licence
if you want to use for business or commercial purpose that will be paid.
choose any one of them and then click next
Window will look like the below figure:-
tmviewer2
4. Next window will be of License Agreement
This contains the terms and condition , click on the check boxes after reading the licence agreement and then Next.
Figure:

teamviewer3
5. After accepting the lincence you will be asked for installation type as shown in figure below:-
teamviewer4
6. Above five steps will complete the installation. team viewer will look like :
temvierewer
now your team viewer is ready to use

Working Of Team Viewer:

1.  Put your partner ID in the empty white field and click on Connect to Partner as shown in fig below:
temvierewer
2. TeamViewer Authentication Window will appear and will ask for Password , put the password of your partner machine and click on logon and this will connect you to your partner’s computer .
teamviwer
3. Now you can use your partners pc from your home sitting at a long distance ( remote desktop ), below is the window giving an example how your partner computer will look like on your pc:-
temvierremote
4. You can also communicate with the help of  Teamviewer through msg chat , Voice chat and Vedio Chat
Message chat:
Capture
Voice Chat:
highlght
Video Chat:
vedio team
Above is the example of very useful software .

Thus, you can see that, just by following a few simple steps, you can use a remote computer by sitting at your own home easily .

Finally, we would love to hear from you. If you have any doubt regarding this tutorial, please comment below using below given comment box.

How To Find Who Is Using Your Wireless Connection

The Fear: Who Is Using Your Wireless Connection

One of the fears often expressed by users having a router supporting WiFi is that is there might be someone using internet connection through the users wireless network illegally without the user’s notice. Sometimes we use very simple to guess password, sometimes there are those who even does not add any password to protect their connectivity. If one or more people gets an access to your wireless connection they can take advantage of the bandwidth you have available causing slowdowns of the general navigation or, in the worst case commit some offense against the user unaware.
How To Find Out Who Is Using Your Wireless Network -wifi logo
The best thing to do is to check from time to time if someone is connected to your home WiFi wireless network without our knowledge. This can be checked by getting into the router settings (but this procedure may not be easy for everyone), or rely on small programs which are really simple to use and complete in functionality. Below CodeMink present some free programs that will help you in scanning the WiFi wireless network to find out who is using your wireless connection and will show any abnormalities associated with it, like some unwanted guest who managed to sneak into your wireless connection.

If You really: Don’t Want Anyone To Access Your Wi-Fi? Follow This:

If however you discovered that someone has intruded into the wireless network, my advice is to immediately change the password of your WiFi network and reboot the router!

Windows Users

Wireless Network Watcher
Wireless-Network-Watcher- How To Find Out Who Is Using Your Wireless Connection
Wireless Network Watcher  is a tool that allows you to  constantly monitor incoming connections to your router. Once launched, the tool automatically searches the network adapters present and find the one that provides the connection to the Internet. If it does not, you can manually select the network interface that you are interested by pressing F9.
The application will carry out a  scan of the entire range of IP addresses for the network under consideration and provide you a list of all the connected devices.  If you want, you can also export the list in HTML, TXT, CSV or XML. For each connected device you can have a variety of information including the ‘IP address , the  MAC address  and the  name .
AutoScan-Network
AutoScan-Network is a network scanner practically professional. It does not require any configuration, but with a simple click you will have the list of networked equipment. Among the features are:
  • Fast network scanning
  • Automatic Network Detection
  • TCP / IP scanner
  • Wake on LAN feature
  • Multi-threaded Scanner
  • Port Scanner
  • Low surcharge on the network
  • VNC client
  • Telnet Client
  • SNMP scanner
  • Simultaneous subnetworks is scaned without human intervention
  • Findings in realtime any related equipment
  • Supervision of any equipment (router, server, firewall …)
  • Supervision of any network service (smtp, http, pop, …)
  • Automatic detection of known operating system (brand and version), you can also add any other resources unknown to the database
  • The graphical interface allows you to connect one or more agents scanner (local or remote)
  • Intrusion detection
  • The whole structure of complete network can be saved in an XML file

Linux Users

If you are a user of the penguin you can rely on  AutoScan-Network  (also available for Windows and Mac), or learn to be familiar with the command netstat .
Incoming Search String: Software which Helps User to Find Who Is using Your Wireless Connection

Don’t Want Anyone To Access Your Wi-Fi?

You own a wireless router and you can see your routers LED blinking continuously even if none of you connected with your wireless router, that definitely means someone is accessing your network.

Who may be accessing?

To know who may be accessing your network, just login into your router settings using routers IP (Address may not be similar in every router) then go to the Router Status and check the connected device table. The table will list all the MAC addresses and IP address of the system connected. (Linksys users go to status-> network status->DHCP Server)

Ways to prevent Wi-Fi getting accessed by strangers

One way is to block signals to reach to your neighbour or block in some way that the signal does not leave your house. But in case it extends and leaves your house then here are some ways you can secure your network and prevent its access by strangers by logging into router.

router-login

#First: Use Mac Address Filtering to filter devices to be connected. If you want selected devices to be connected then bind only those devices with the router and others will not be able to access. To find the MAC address of your device type “cmd” in “RUN” and type “ipconfig/all” to view the physical (MAC) address of all the hardware attached to your system.
MAC-Address- acess list
MAC-Address-acess list-2

#Second: Set a password (Keyphrase), so that  only those devices can access your network who will be knowing this password/keyphrase. To set a password open router settings->wireless settings-> wireless security-> choose WPA or WPA2 ->choose a password and click save.
wpa wpa2_security_SSID

#Third: Use awkward SSID name: Using some awkward name as wireless network can do something better, for example making it ” This Network Contains Virus”  or “e:/virus.exe” will force stranger not to connect with your wireless network. Some other suggested names you can use is “Police headquarter”, “Service not available”. To change the network name(SSID) head towards the basic wireless settings after logging into your router.
scary_wifi_networks

#Fourth: Disable SSID Broadcast: One of the best option is to disable the broadcast of your wireless name (SSID). If its done then strangers will not be able to find your SSID name and will require to way process to get connected (SSID name and passphrase).
SSID broadcast



Related Post :

How To Find Who Is Using Your Wireless Connection?




Google Wallet will allow payments via Gmail

Surely we all know the very well known payment system PayPal and all forms of payment and securities. But You may not be much aware of Google Wallet which provide same services what Paypal provides. After the introduction of the Google Wallet Card a few months ago , which was used to make payments via NFC thanks to full compatibility with Android (since version 2.3.3. Onwards), today was presented with a big news.
 gofreebieplus.com
Just to re-launch this product, Google has proposed a method certainly innovative and interesting . From now on, for the time being for U.S. users,you can send money via email by attaching it to a simple Gmail email (Payments Via Gmail) ! In other words when you send an email to a client or to a store you can send a sum of money in attachment, by writing the symbol of your currency. Among the symbols that we will have, which will pop icon next to the Google Drive and other symbols that are understood. You will find the dollar and the euro of course, just simply choose the amount and send the email.



As you can see in the video above there is certainly implementation of various security levels so that the transaction  get completed successfully without running into problems of various kinds. Its a nice way to send money and it will be a breakthrough in the way of transferring currency.