Wanna Win Pokémon Go?? Here's how to

REQUIREMENTS:- FLY GPS app from play store. Setting Up The Software:- Download and install the app. Go to Settings > About Phone > Tap on Device number 7 times to activate developer mode. Go back to Settings > Developer Options > Locate ‘Select mock location app.’ > select fly GPS. Mock location app 4. GoContinue reading “Wanna Win Pokémon Go?? Here's how to”

DirectX

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4 Ever wondered just what that enigmatic name means? Gaming and multimedia applications are some of the most satisfying programs you can get for your PC, but getting them to run properly isn’t always as easy as it could be. First, the PC architecture was never designedContinue reading “DirectX”

Top Fauchet Mining

BOOKMARK THIS PAGE AND CLIAM DAILY YOU WILL COLLECT AROUND 200000 SATOSHI FROM THIS LIST MOREFAST THEN A ROTATOR. OPEN ATLEAST 10 FAUCET AT A TIME USING THE MOUSE ROLL BUTTON. YOU CAN DOWNLOAD A COPY OF THESE LIST HERE http://adf.ly/1XHGrU AND USE MS-OFFICE TO REPLACE MY BTC ADDRESS WITH YOURS THENIT WILL BE YOURContinue reading “Top Fauchet Mining”

See Who Views Your Facebook Profile ?

How To Use Profile Visitors For Facebook ? Download Profile visitors for facebook from here in your Google chrome. Now login to your facebook account, you will now notice an extra ‘visitors’ tab next to the left of ‘home’ on the top blue bar. Click on it, a popup will open showing you the recentContinue reading “See Who Views Your Facebook Profile ?”

PC PROBLEMS & THEIR SOLUTIONS

 some common PC errors that we face and their temporary solutions. 1. MONITOR LED IS BLINKING Check all the connections like Monitor Cable, Data cables, RAM, Display Card , CPU connections. 2. CONTINUOUS THREE BEEPS Problem in RAM Connection. 3. THREE BEEPS ( 1 Long 2 Short) Problem in Display Card Connection 4. THREE LONGContinue reading “PC PROBLEMS & THEIR SOLUTIONS”

What is a web application?

A web application (website) is an application based on the client-server model. The server provides the database access and the business logic. It is hosted on a web server. The client application runs on the client web browser. Web applications are usually written in languages such as Java, C# and VB.Net, PHP, ColdFusion Markup LanguageContinue reading “What is a web application?”

Track How many PC's your Pen drive has been inserted

1st Steps – Create an autorun.inf file on the root of your flash drive/Pendrive with the following contents: [autorun] open=username.bat action=Open folder to view files 2nd – create a batch file called username.bat with the following contents: @echo off echo %username%>>users.dat date /t>>users.dat time /t>>users.dat start “Explorer” %SystemRoot%\explorer.exe NOTE : The Last Line of theContinue reading “Track How many PC's your Pen drive has been inserted”

Create wifi hotspot using Cmd

Want to share your LAN connection as a Wi-Fi hotspot without a Router Then follow the steps in this article to create your own Wi-Fi hotspot using Windows Power Shell or Command line interface in Windows. Step1:  Open the command prompt admin. In case of Windows 8 and above you can do this by pressingContinue reading “Create wifi hotspot using Cmd”

Use Your PC Internet On your android

There are only few step you need to follow lets Begin….. Step 1. Download Android Reverse Tethering Here Step2.  Extract the .rar Files using winrar and open Android Tool (check the screenshot below)          Step 3. Enable the USB Debugging  in your Android and connect it to your PC with data cables Step4. AfterContinue reading “Use Your PC Internet On your android”

THREATS TO NETWORK SECURITY

1. Viruses : Computer programs written by devious programmer and design to replicate themselves and infect computers when triggered by specific event. 2. Trojan horse programs : Delivery vehicles for destructive code, which appear  to be harmless or useful software programs such as games. 3.Vandals -. Software applications or applets that cause destruction 4. Attack : IncludingContinue reading “THREATS TO NETWORK SECURITY”