Wednesday 18 December 2013

PicLight for Creating Effected Photos on Mac

PicLight for Mac by PearlMountain Technology is a quick and easy photo-enhancing app for photographers of all skill levels. You can make an awesome and unique looking picture by playing around with more than 170 lighting effects and 25+ stylish image filters.
The interface itself is pretty elegant and straightforward. You’ll have a clear understanding about the app with all the buttons telling you what you are going to do with. Once you open the app, you are allowed to add a favorite photo by dragging and dropping. Alternatively, you are free to upload your photo with the Load/Import Photo button. Anyhow, choose the way you like.
Along with 170+ lighting effects separated in four categories - Montage, Light, Glow and Texture - you can layer effects for virtually limitless possibilities. Just re-click the chosen effect to cancel the result.
Blending modes such as Screen, Overlay, Color Dodge and Lighter can be found in PicLight, which give users a wide choice to change the effects of layers. Meanwhile, Alpha can be easily fine-tuned to change the opacity of the lighting effects. If needed, flip the lighting effects to the best angle.
If the lighting effects aren’t enough for a photo, go to more photo effects and filters on the right panel. There you can preview the photo result with the thumbnails. The 20 more photo effects and filters include B&W, Sepia, Dense and Vintage, etc.
There is a Quick Fix inspector on the right side of the app. You are able to crop the image to fit the chosen aspect ratio. Besides some preset common aspect ratios, you have option to customize the ratio yourself. You are free to rotate and flip your photo. Moreover, Saturation, Hue, Exposure, Contrast and some other editing features can be easily accessed in PicLight.
For some other features like the Compare functionality also attracts me. PicLight allows users to compare the original photo with the effected photo in one window with the prompt “Original” and “After”.
Once you have finally done your work, you can share your stunning picture on Facebook, Flickr or through email. PicLight also enables you to send the photo directly to iPhoto. It supports other export option to save the photo as image formats like JPG, TIFF, BMP, PNG and GIF. You can just save it as desktop wallpaper.
PicLight is specially designed to be easy to use for all photography enthusiasts and gives you a fun way to play with your photos. It lets you share your unique effected photos with your family and friends easily.
We have been provided with 3 exclusive promo-codes to giveaway, simply comment below why you would like to get this utility and you could be one of the lucky winners?

Download PicLight :

Friday 12 July 2013

How To UNDO Sent Mail on Gmail..!!

E mail Marketing 200x150 Trick to Undo Sent Email in GmailLot of times you might think to change the contents of the email, after you hit the send button. But there are no undo buttons in case of sent emails elsewhere rather then Gmail. By using this hidden Gmail feature, you get back your sent email from your gmail account. So in case you hit the send button a little too soon, you can click undo (CTRL+Z) button within 30 sec of hitting send button and you’re good to go.
> Open Gmail and click on small settings icon on top right corner.
> Select mail settings and go to Labs tab. Search for undo and check the undo send feature, Click save changes.
Next time you hit the send button you can see a undo option for 30 sec. Have Fun!!

Make your computer fresh and fast

1

In this Article We will explain some simple methods to make your computer cleaner and run faster for long period of time. It’s so frustrating to see our computer slowed down after a period of time. So in this article you will get some methods or you can say ways to make your computer run faster.
Follow the methods listed below:-
Remove Useless software and apps : We often install many unnecessary application and later forget to uninstall them These application becomes burden in our computer and eventually slow down our computers So at first you need to delete all this unnecessary application and software To uninstall the software you should go to Control Panel->Add or remove->find and select the software you would like to uninstall.
Utilize your RAM performance : A lot of you may have these setting already set. But If you don’t have then don’t worry. You just have to follow the process. Right click on My computer->Properties->Advanced system settings->Setting(Under Performance)->Advanced->Change(Under Virtual Memory). Now double the number in Maximum size then the number initial size. It will surely help your PC to utilize the most of RAM.
Check for errors : Our computers face errors very oftenly in daily use and some errors stuck to our computer hard disk which makes our computer slow. So its very important to kill those errors to make our computer work better. Go to My computer and press enter .Our main hard disk is usually C: and we need this drive to be free from error So right click on Hard disk C and then click tools Then from the Error-Checking option click You may need to restart the computer to do so It will make your computer Faster.
Desktop-cleaning : We often keep unnecessary file in our desktop but it actually affects the performance of our computer. Delete the useless files or another choice is to move them to Local disk if necessary. You should only keep shortcuts in your Desktop only if you needed. If we keep Wallpapers on our desktop it also effect slightly to slow down our computer a blank screen is always better remove temporary internet files and cache from your web browser Browsing internet slow down our computer You need to clean these temporary files and cookies to make your computer stay clean and faster. There are a no. of software available today in the market which can do the task for you. You can use Ccleaner for this purpose which is a very trusted software. To proceed to the official website to download Click here
Disk Defragmentation : We should defragment our disk to make our PC faster. For deframentation process, just follow the same steps given below. Locate Hard disk C then click properties then click tools and then click defragment Now from the option Disk defragmentation.
Use a Trusted antivirus : he last but not the least tip is to use a reliable trusted antivirus which will protect your PC from harmful antivirus. Kaspersky and AVG are some of the trusted antivirus but you have to pay to use them. If you don’t wish to pay some money then you can also download free Microsoft security essential to save your computer from harmful Malware and spywares. Check the link here

DNS Hijacking And How It Works :)

DNS hijacking (sometimes referred to as DNS redirection) is a type of malicious attack that overrides a computer’s TCP/IP settings to point it at a rogue DNS server, thereby invalidating the default DNS settings. In other words, when an attacker takes control of a computer to alter its DNS settings so that it now points to a rogue DNS server, the process is referred to as DNS hijacking.
As we all know, the “Domain Name System (DNS)” is mainly responsible for translating a user friendly domain name such as “google.com” to its corresponding IP address “74.125.235.46″. Having a clear idea of DNS and its working can help you better understand what DNS hijacking is all about. If you are fairly new to the concept of DNS, I would recommend reading my previous post on How Domain Name System Works.

How DNS Hijacking Works?

As mentioned before, DNS is the one that is responsible for mapping the user friendly domain names to their corresponding IP addresses. This DNS server is owned and maintained by your Internet service provider (ISP) and many other private business organizations. By default, your computer is configured to use the DNS server from the ISP. In some cases, your computer may even be using the DNS services of other reputed organizations such as Google. In this case, you are said to be safe and everything seems to work normally.
But, imagine a situation where a hacker or a malware program gains unauthorized access to your computer and changes the DNS settings, so that your computer now uses one of the rogue DNS servers that is owned and maintained by the hacker. When this happens, the rogue DNS server may translate domain names of desirable websites (such as banks, search engines, social networking sites etc.) to IP addresses of malicious websites. As a result, when you type the URL of a website in the address bar, you may be taken to a fake website instead of the one you are intending for. Sometimes, this can put you in deep trouble!

What are the Dangers of DNS Hijacking?

The dangers of DNS hijacking can vary and depend on the intention behind the attack. Many ISPs such as “OpenDNS” and “Comcast” use DNS hijacking for introducing advertisements or collecting statistics. Even though this can cause no serious damage to the users, it is considered as a violation of RFC standards for DNS responses.
Other dangers of DNS hijacking include the following attacks:
Pharming: This is a kind of attack where a website’s traffic is redirected to another website that is a fake one. For example, when a user tries to visit a social networking website such as Facebook.com he may be redirected to another website that is filled with pop-ups and advertisements. This is often done by hackers in order to generate advertising revenue.
Phishing: This is a kind of attack where users are redirected to a malicious website whose design (look and feel) matches exactly with that of the original one. For example, when a user tries to log in to his bank account, he may be redirected to a malicious website that steals his login details.

How to Prevent DNS Hijacking?

In most cases, attackers make use of malware programs such as a trojan horse to carry out DNS hijacking. These DNS hacking trojans are often distributed as video and audio codecs, video downloaders, YoTube downloaders or as other free utilities. So, in order to stay protected, it is recommended to stay away from untrusted websites that offer free downloads. The DNSChanger trojan is an example of one such malware that hijacked the DNS settings of over 4 million computers to drive a profit of about 14 million USD through fraudulent advertising revenue.
Also, it is necessary to change the default password of your router so that it would not be possible for the attacker to modify your router settings using the default password that came with the factory setting. For more details on this topic you can read my other post on How to hack an Ethernet ADSL Router.
Installing a good antivirus program and keeping it up-to-date can offer a great deal of protection to your computer against any such attacks.

What if you are already a victim of DNS hijacking?

If you suspect that your computer is infected with a malware program such as DNSChanger, you need not panic. It is fairly simple and easy to recover from the damage caused by such programs. All you have to do is, just verify your current DNS settings to make sure that you are not using any of those DNS IPs that are blacklisted. Otherwise re-configure your DNS settings as per the guidelines of your ISP.

Thursday 11 July 2013

Fun With Yahoo Messenger...!!

Yahoo Messenger is one of the highly popular and most widely used instant messaging service in the world offering a wide variety of features to it’s users, all for free. This has made it the right choice for all those who are waiting to chat and communicate with their far away friends and relatives.
However, while some people use Yahoo Messenger only to chat with their friends and known ones, many others use it to have fun by joining the chat rooms and chatting with the strangers. If you’re a similar person who would like to have fun during the chat, this post if for you!
In this post, I will show you some really interesting Yahoo Messenger hacks using which it is possible to play pranks with your friends and strangers during the chat. Below is a list of some cool hacks that you’re sure to enjoy:

1. Chat with Multiple Names Simultaneously

How about chatting with your friend with two or more different names at a time? Well, do not think that this is impossible! This can easily be done with a simple workaround which enables you to chat with as many different names as you can with the same or different people.
For example, you may chat with Person-A using one name and with Person-B using the other. You can also chat with the same person using different names or any other combination. All of this goes really unnoticed by the user on the other side, while you are sure to have some real fun.
Here is a step-by-step procedure to implement this hack:
  1. Sign in to your Yahoo Messenger. From the top, click on Messenger -> My Account Info. You will be taken to a web page where you need to log in to your account.
  2. Now, you should be on the Profile Settings page. Scroll down to see the option Account Settings as shown below. From there, click on the link which says: “Manage your Yahoo! aliases”.
  3. From the Aliases page, click on: “Add an alias”. You can create as many aliases you want. Choose unique names for your alias and once you’re done, click on “close”.
     


    4.You need to sign out of Yahoo Messenger and sign in again to see the changes. Once you have done this, double-click on any name from your contact list or chat room to open a new chat window. You should now see a list of your aliases appearing in the chat window to choose from.
     


    1. To chat with multiple names with a single person, just follow the steps below:
      • Double-click on the name of the person in the chat room or contact list.
      • Select any name from your “alias” list and ping the user with that name. Immediately close the chat window before you get a reply from that person.
      • Again double-click on the same person’s name and ping him/her with another name from your “alias” list. This time do not close the window.
      • Just wait a few seconds! When the person replies to both your pings, you will have two tabs in the same chat window from where you can chat with the same person using two different names. Enjoy!!!
    Before you try this hack, make sure that you have not set any display image for your profile. If not, there are chances of other person identifying your prank.
    To disable the display image, just click on Messenger -> My Display Image from the top menu of your YM window and set the option to “Don’t share a display image”.
    I hope you like this hack. Now let us move forward to our next hack that is even more exciting!

    2. Play Prank with Your Friends Using a Fake Webcam

    Ever wanted to fool your friends with a fake web camera? If so, here is a cool hack using which it is possible to fool users on Yahoo Messenger with a fake webcam on your computer. Below is a step-by-step procedure to configure the fake webcam on your computer:
    1. Download Fake Webcam software from the following link: 

    1. Install Fake Webcam on your computer and configure it as follows.
    2. From your Yahoo Messenger window, click on “Messenger” at the top and select the option “My Webcam”.
    3. You should now get a blank Webcam Broadcast window. From there, click on File -> Preferences to open the “Yahoo! Messenger Preferences” window as shown below. From the “Category” list, select the option “Webcam Broadcast”.
       
      5. As shown in the above snapshot, click on “Camera Source”, select “Fake Webcam Source” as your source of camera and click on “OK”.
      6. Now, open the Fake Webcam application, load your favorite video and click on play button. You should now see the same video appearing on the Yahoo Messenger video broadcast window as show below:
       

      1. Click on “Broadcast” button on the Yahoo Messenger webcam window to start broadcasting the video.
      If you are using aliases, you can change your webcam profile from File -> Change Profile option on the webcam window to enable the webcam for the current alias.
      That’s it! You now have the fake webcam running on your computer.

      3. Yahoo Messenger Invisible Hack

      Most users on Yahoo Messenger hide their presence by activating the “invisible mode”, so that they appear as offline to everyone. But, how do you find out their true status? Well, here is a Yahoo Messenger invisible hack to catch those users who are hiding their true status by activating the “invisible mode”.
      There are many tools out there to do this job, but most of them are found to have been infected with trojan and other malware. However, I have found some of the free online services that help you identify the true status of Yahoo users:
      Just visit any of the above mentioned websites, enter the target Yahoo ID or screenname that you want to check and press the search button. With in a few seconds you will find out the true status of the user.
      I hope you all enjoy this post. Pass your comments and share your experiences. :)

How To Recover Your Hacked Wordpress Website In Easy Steps.!


WordPress is one of the most popular content management systems at present. However as a general law, the increasing popularity comes with a number of dangerous has gained attention of bad boys as well. There are so many people who are reporting the cases of hacked WordPress account on a regular basis. So I have thought of putting a complete guide to discuss how to recover your hacked WordPress.
 
 

Ways To Recover Hacked Account

Below is the perfect path to follow to get your hacked account back:
Backup – Even if your website is infected to a small extent, it is still very much necessary to secure the backup for your website before waiting for watching the things turning into worst. Don’t forget to take backup of your entire database and all files. You can also try for a faster solution by using BackupBuddy.
Change Login Details and Secret Access Keys – At the time you sense the hacking attempt, just try to login to your account to check whether your login details are still effective or not. If the username and password details are not yet changed then immediately change all the WordPress secret access keys in wp-config.php file and of-course your username and password.
Running Scanners – Running a scanner is also a very helpful step and comes at number 3 in this list. The scanners are basically used for identifying the compromises at the level of database. You can try out Cloud Sites WP Scanner plug-in or Sucuri Malware Scanner. After running the scanner you should make sure to move the next step stated below.
Installing Your WordPress Again – Next important step involves Deleting all the files existing in the directory of WordPress except wp-config.php file and wp-content directory. After that you need to download and install a totally fresh copy of WordPress. Now edit the wp-config-sample.php file by substituting the sample values by picking the actual database values from the wp-config.php file that you haven’t deleted as stated above. Now you can delete the present file and replace it with your own file.
Review Content Folder – Next task involved to check all the folders to find ones with any suspicious activity in your wp-content directory. So carefully analyze the folders content and remove any one that seems not to be belonging to you. If you later find that the folder was actually needed then you can get it back from your backup.
Analyze and Re-install Your Plug-ins – The next steps after completing with reviewing the folders’ content includes reviewing the plug-ins. Collect information about what plug-ins you are not using currently and uninstall them all for the time being. Now coming to all other activated plug-ins that you are using currently, deactivate and delete these plug-ins and then re-install and activate the active plug-ins.
Analyze Your Themes – Now the next thing that should be taken care of is the task of removing the extra themes which are not in use currently. Next task again involves reviewing your activated theme. Look through the PHP or Javascript code to find out any suspicious activity there. Most of the time hackers make such malicious changes in header.php or footer.php files.
 
 
Following this step by step guide can really help you a lot in getting your WordPress back. Also always remember to keep checking for the activities on your WordPress site. Also make it a habit to keep a time by time backup of your database. For more recovery details you can check onhttp://codex.wordpress.org/FAQ_My_site_was_hacked.

How to Secure before Getting hacked !

Every one is looking to make their blog looks secure and try to make their blog safe from hackers so that hackers can not take any kind of information from your blog. You can protect and increase security of your by doing following things :-
Chap Secure plugin
You can increase the security of your log-in by using Chap secure plugin, It helps in encrypting passwords by using CHAP protocol. It will help hacker to get in trouble.
Login Lockdown Plugin
This plugin helps a lot in stopping a hacker because if he is trying to play with your login screen then this plugin will limit hit after few wrong attempts.Just download the plugin and activate it. This plugin helps to secure your blog from newbie hackers. ;)
WP Security Scan
This plugin helps to check all the codes of your website from hacking Malware and scripts. It can find out which code or which file has virus in the blog.
Updating WordPress regularly
Try to upgrade the WordPress regularly as soon as any new version is launched. Most of the bloggers do not update WordPress and chances are huge that old WordPress version can get hacked.
Tac Theme Checker
You can install a plugin “Tac Theme checker” which can check your theme before activating it. It helps you to check the complete theme when you upload it into Dashboard and it helps to check the files completely in few seconds.
Make your security Bullet proof
You should increase your security more and more by adding some official steps from WordPress website and you can read them here http://codex.wordpress.org/Hardening_WordPress.
Theme of your Blog
Your theme plays an important part in hacking, If you are using some cracked version of theme then be ready to get hacked soon. Cracked themes often have codes which helps to get you hacked. I would suggest that get a proper theme from any web design company so that there is no chance to get hacked due to unethical themes.
I hope these steps will help you to protect from all the hack attempts. If you have any other method then do let us know in below comments. Thank you

Tricks To Increase Your Internet Speed..!!

we all know that a slow internet connection really costs time and makes feel annoying . many friends ask me the ways to increase their internet speed.however . it's possible to do to some extent and make your internet
much better then it was in the past.

There are Two tricks that will help you to increase your internet speed..

First Method- Speed Up Your Net Speed By 20%


1. First you go to start button

2. Go To Run

3. Type gpedit.msc And Then Hit Enter.

4.Then Expand Adminsitrative Templates.

5.Then Network

6.Then QoS Packet Scheduler.

Now A New List Appear . Click On Limit Reservable Bandwidth.
Just Disable it.

Now You Click On Apply .

That's It Now You Are Done !! :)

Now Just Restart Your Computer . And I hope You will Get change in Your Speed

Some Basic Tricks From My Side-

1. Use IDM To Boost Your Downloading Speed.

2. Use A Good Anti-virus in Your Computer.

3. Remove Unwanted Add-ons, Software,Unwanted Files Form Your Computer.

4.Update Your Drivers Periodically.

5.Keep A Good Maintennance Of Your Computer.