Search This Blog
Friday, November 15, 2013
How To Get Free Products To Review on YouTube
Matt Saunders Links
Twitter - http://www.twitter.com/mattsaundersmcp
Facebook Page - http://www.facebook.com/mattsaundersmcp
Matt's Website for more - http://www.mattsaundersmcp.co.uk
How To Get Free Stuff (without a gun and a ski mask)
Enjoy anything you want off amazon. Pick the prize and use points to redeem it :) Shipping takes 1-2 weeks. Registration Form: http://www.points2shop.com/register?r...
Song: 3Lau - All Night Long
Facebook: http://www.facebook.com/DJ3LAU
Twitter: http://twitter.com/DJ3LAU
Soundcloud: http://soundcloud.com/3LAU
YouTube: http://youtube.com/DJ3LAU
Lifehacker : How to Get Free Money, Free Phone Calls and the Best Free Apps! - Lifehacker
In this episode we'll learn how to live a day for free. We'll find out why free money isn't always a scam, learn how free stuff affects our brains, and discover tricks to get free dropbox storage. Stop worrying about that empty bank account - This is Lifehacker, episode 10.
~~~~
01:01 Tip Tester: How to get Free Money
http://lifehacker.com/5596916
02:16 Brain Hacks: The Power of Free
http://lifehacker.com/5762813
04:06 Cheapskate: Get Free Dropbox Storage Space
http://lifehacker.com/5796318
05:15 Make Free Calls with Google voice
http://lifehacker.com/5349506/
06:08 How to Make Free Cleaning Supplies with Household Items
http://lifehacker.com/5383447
07:44 How to Get Free Stuff on Your Birthday
http://lifehacker.com/5781049
08:36 Downloads of the Day: 50 Free Apps
http://lifehacker.com/5698593
~~~~~~
Get More Lifehacker Every Monday- Subscribe!
http://www.youtube.com/subscription_c...
See our latest episode:
http://youtube.com/lifehacker
Watch more of the show:
http://www.youtube.com/playlist?p=B47...
Twitter:
http://twitter.com/lifehacker
Facebook:
http://facebook.com/lifehacker
Lifehacker Homepage:
http://www.lifehacker.com/
http://revision3.com/lifehacker
iTunes:
http://itunes.apple.com/WebObjects/MZ...
More From The People Who Brought You Lifehacker:
http://twitter.com/lifehacker/writers
ABOUT LIFEHACKER:
Learn tips and tricks for everything from computers to brewing coffee from the team at Lifehacker. Want to learn how to make a touch-screen stylus from a candy wrapper? Done. Need to open a beer bottle with a piece of paper? Right here. Whether you want to be more productive or just have fun, you can find out how to do it all in this series.
Simple Windows PC Tune Up
Class Notes and More can be found at: http://www.everymanit.com/2012/01/12/...
Info
Level: Beginner
Presenter: Eli the Computer Guy
Date Created: January 11, 2012
Length of Class: 33 Minutes
Tracks
Computer Repair
Prerequisites
None
Purpose of Class
This class teaches students how to easily Tune Up a Windows PC. We clean Temporary Files, Defragment the Registry, Disable Start up Items, and Uninstall Unused Software.
Chapters
Introduction (00:00)
Overview (01:50)
Demonstration (14:26)
Final Thoughts (29:34)
Class Notes
Introduction
Windows PC's slow down over time due to normal use. Windows does not have effective ways to clean up the PC built in.
You use specific software to perform Tune Ups of Windows PC's. Eli prefers CCleaner, but there are a number of options. The main functions you need are the ability to Clean Up or Defragment the Registry, be able to Disable Start Up Items, and to be able to Clean Up Temp Files.
Overview
CCleaner is currently FREE to use
Windows creates temporary files while you are using the computer. These files can the cause problems. Many people have 5-10GB of temp data on their PC's. (I have seen one client with 50+GB). PC's need 10% of their hard drive space to be free in order to do standard routines. If the hard drive space goes below 1 GB of Free Space the PC can start to experience major problems.
Anti Virus and Anti Malware software will scan ALL files on a PC. You can waste significant time if the software is scanning Temp Files.
The Registry is a Database in Windows that contains important configuration settings for the operating system and installed software. Windows does not automatically clean and correct the Registry. PC's can slow down when the Registry tries to access files that no longer exist on the PC. Defragmenting the Registry deletes Registry Keys that point to files that do not exist.
Many pieces of Software configure the PC to start them when the PC boots up. This makes the software seem to run quicker, but uses the systems resources and slows the boot time. Software like Quickbooks, Adobe, and Quicktime do not need to be started when the PC boots to work properly. By disabling these start up items the computer will boot faster, and use fewer resources.
Do not disable Security Software or Printer Software from the Start Up.
Many people install software that they never, and don't uninstall it. This software can casue problems on the PC and make it run slower. By uninstalling unused software you make sure the computer runs properly (I have seen clients with 10 Internet Explorer Toolbars Installed and they wonder why it's a pain to use Internet Explorer)
Demonstration
CCleaner is currently free as of the creation of this video, but that may change.
There are many options for Tune Up Software that perform the same functions as CCleaner
Run the Registry Defragmenter and Temp File Cleanup Tool 3 times each to make sure everything has been cleaned up.
Final Thoughts
Defragmenting the Hard Drive does not do much, and on a 500GB+ Hard Drive will take a very long time.
A simple Tune Up takes 5-10 minutes and can make a huge difference.
Removing Viruses/ Malware is a separate task from a Tune Up.
Resources
CCleaner
How to Clean A Badly Infected PC Step by Step Tutorial
AVP Kaspersky tool:
http://devbuilds.kaspersky-labs.com/d...
Malwarebytes free:
http://download.cnet.com/Malwarebytes...
Superantispyware free edition:
http://www.superantispyware.com/
Norton PowerEraser:
http://security.symantec.com/nbrt/npe...
Dr.web Cureit:
http://www.freedrweb.com/cureit/?lng=en
How to Find and Remove Viruses, Spyware or Trojans from your PC Desktop or Laptop
Join thousands of people using Asmarina real-time security solution.
Try it today and see why you'll love it. Website: http://www.asmarina.com.au
Need a tech support to help?
No problem! Relax. We can fix most Windows and Mac computers over the web. For your convenient we provide a 24 hour secure online booking service and live chat customer support. It is simple and fast. Go to this link to start now:
http://www.asmarina.com.au/free_q.html
TOP 5 - Best Free AntiVirus 2013
In this video I will show you the best free antivirus 2013.
I will show the installer and interface for each top free antivirus
More info: http://MarcMeerbeek.com
software for comparison.
The list goes as follows:
5. Microsoft Security Essentials - 13mb (0:17)
4. Avira Free Antivirus - 103mb (1:13)
3. Ad-Aware Free Antivirus+ - 6mb (2:28)
2. AVG AntiVirus Free 2013 - 4mb (3:53)
1. Avast Free Antivirus - 99mb (5:14)
*File sizes are the downloaded installers*
Music By:
Stellarartwars - Josh Woodward - Let It In
Scomber - Web Surfing on the Lounge
----------------------------------------
Please Like, Subscribe & Comment.In this video I will show you the best free antivirus 2013.
I will show the installer and interface for each top free antivirus
More info: http://MarcMeerbeek.com
software for comparison.
The list goes as follows:
5. Microsoft Security Essentials - 13mb (0:17)
4. Avira Free Antivirus - 103mb (1:13)
3. Ad-Aware Free Antivirus+ - 6mb (2:28)
2. AVG AntiVirus Free 2013 - 4mb (3:53)
1. Avast Free Antivirus - 99mb (5:14)
*File sizes are the downloaded installers*
Music By:
Stellarartwars - Josh Woodward - Let It In
Scomber - Web Surfing on the Lounge
----------------------------------------
Please Like, Subscribe & Comment.
How to turn off Norton Antivirus
1.click on "Setting"
2.click on "real time protection"
3. click on "DEFAULT ON" ( if ur auto protect turn grey color)
4. Now turn off auto protect ( "it will turn ur Norton completely off")
5.put the duration you want...
Sunday, July 28, 2013
Gaming Laptops & LIQUID NITROGEN COOLING! - Gigabyte Ultrablade @ PAXAUS
Blunty in his travels at PAX Aus chats with the folks at GIGABYTE about their nifty new Ultrablade Gaming Laptops and watches the crazy dudes who cool their gaming rigs with Liquid Nitrogen... fans and water cooling? PHHT! Child's play, REAL Ovcerclockers pour hundreds and hundreds of dollars worth of LN2 to supercool their extreme overclock Rigs ;)
"Ultrablade Gaming Laptops P35K/ P34G -- Slim yet Extremely Powerful
P35K -- The 15.6-inch P35K Ultrablade with the latest 4th Gen Intel® Core™ i7 Processor is designed for true mobility. Just 21mm thin and weighing ~2.2kgs, packed with a powerful GTX765M gaming graphics this machine is geared for gamers and 3D designers alike. Having unlimited storage capacity with a quad-storage system that supports up to 3TB of space to store all your files and stuff, the storage provides ample Terabytes! Enjoy DVDs on your Ultrablade with the swappable DVD-ROM/HDD Slot on a 1080p FHD IPS display providing the perfect viewing pleasure for users. The P35K from GIGABYTE is its most stunning gaming laptop ever.
P34G -- Gorgeous on the outside and inside, the 14-inch P34G Ultrablade with a GTX 760M gaming graphics weighs ~1.7 kgs and at 21mm thin is designed for users looking for extreme mobility yet packing a powerful punch. Thin and powerful it supports up to a 256GB mSATA SSD and a large 1TB HDD in its incredibly slim and lightweight chassis. Enjoy 1080p Full HD display that makes for excellent viewing pleasure, coupled with flagship gaming specifications; the P34G is perfect for gamers, university students, designers and businesspeople yearning for entertainment and mobility. The P34G Ultrablade marks GIGABYTE's first foray into the 14-inch gaming laptop."
http://www.gigabyte.com.au/products/p...
http://www.gigabyte.com.au/products/p...
http://www.gigabyte.com.au
Beautiful Model Ash Explains Features of AK Build - JMac Customs
Recent Tactical Build based on the Arsenal SLR 95
JMac Customs
www.jmac-customs.com
www.facebook.com/jmac.customs
304.444.4552
Sunday, June 16, 2013
Saturday, May 25, 2013
Computer Secutity 101 - How To Remove A Keylogger / Spyware
Matthew explains in this video how he manually removes malware from his clients & customers computers and systems that might be infected.
This shows his common steps he uses to check if there infected by malware like a trojan or keylogger.
Matt's Websites:
http://www.ZaraByte.com
http://www.MatthewHKnight.com
Introduction to Practical Hacking and Penetration Testing
Info
Level: Beginner
Presenter: Eli the Computer Guy
Date Created: April 9, 2013
Length of Class: 41:09
Tracks
Hacking
Prerequisites
None
Purpose of Class
Class Notes
The first rule of Hack Club is, "Don't talk About Hack Club."
Legitimate Reasons to Hack Include:
Regaining Access to Systems that Owners have Locked Themselves Out Of (This happens a derpressing amount of the time)
Demonstrating Security Vulnerabilities to Owners so that they can make educated decisions about their systems security requirements.
Playing with your own systems to better learn how they work.
To perform Hacking you need a solid understanding of TCP/IP Networking and Linux.
You should be able to comfortably use the Linux CLI and be able to troubleshoot problems.
You should have a working knowledge of how to administer the types of systems that you will be attacking.
Hacking Can Violate...
Terms of Service- Discretion of Service Provider -- Can have services terminated
Civil Law -- Preponderance of Evidence -- Can be sued for damages
Criminal Law -- Beyond a Reasonable Doubt -- Can serve jail time
Intelligence Services -- ??? -- Nasty Things can Happen to You...
If you hack systems that you do not own it is best to consult a lawyer to have a strong contract written so that owners of systems can grant you permission to test their systems.
"Hacking" systems that you own my violate license agreements
The Second Rule of Hack Club is, "Don't Talk About hack Club!"
Hacking Systems that you are not authorized to access can result numerous felony level criminal charges being leveled against you:
Aaron Schwartz - Committed Suicide when confronted with up to a 30 year jail term for downloading files
Eric J. Rosol -- Up to $20,000 fine and 5 years in Jail for using LOIC as part of a larger "hacktivist" attack against a website
Protect Yourself by:
Do not install "hacking" utilities onto computers that you use for other purposes.
Use an isolated network and computer to perform hacking tests
Don't trust ANYONE... and for the love of all that is geeky DO NOT ASK Random YouTube Personalities how to commit felonies...
Giving assistance to someone you know is planning to violate the law is a criminal act!
The Third Rule of hack Club is, "DON'T TALK ABOUT HACK CLUB!!!!"
Beware of affiliating yourself with any group. Being a "hacker", and being a "member" of Anonymous are two entirely different things.
Corrections
Lab Setup Used in Demonstration
None
Resources
What is a Keylogger & How To Find a Keylogger on My Computer
Discover what a keylogger is and how to find a keylogger on your computer. See what a hardware keylogger looks like. Find out the difference between a hardware keylogger and a software keylogger.Find out who uses keyloggers. Leanr the advantages between using a hardware keylogger and a software keylogger. Learn how you can protect yourself from hardware or software keyloggers. https://www.youtube.com/watch?v=FVoK_...
Saturday, April 27, 2013
Thursday, April 25, 2013
Monday, April 22, 2013
Comparison of BitTorrent Clients - APR 2013
The following is a general comparison of computer programs designed for peer-to-peer file sharing using the BitTorrent protocol. The BitTorrent protocol coordinates segmented file transfer among peers.
Bram Cohen, author of the BitTorrent protocol, made the first BitTorrent software application, which he also called BitTorrent. He published the application in July 2001.
Many BitTorrent programs are free and open-source software; others are adware or shareware. Some download managers (such as Xunlei and GetRight) are BitTorrent-ready. Opera, a web browser, can also transfer files via BitTorrent. A small number of BitTorrent programs—such as BitDownload, BitGrabber, BitRoll, GetTorrent, Torrent101, TorrentQ, and TorrentSoftware—are actually Trojan horses that attempt to infect the host with malware.
It's worth noting that the client term here is somewhat a misnomer since Bittorrent has a peer-to-peer architecture. It however does differentiate peer software from trackers and companion web sites that do play "server" roles.
Applications
Features II
^ Clients that have been seen in the real world to actually work with IPv6, see IPv6 BitTorrent Clients
^ a b Announcements to the tracker are made via IPv6 if possible, but the client doesn't listen on the respective port.
^ Qdbus interface
^ Automatically configure port forwarding (requires Router with UPnP support)
^ Many clients claim to support this, but just UPnP calls for opening a TCP port is not effective and disabled by factory default in most new hardware. "UDP NAT Traversal" is the proper working solution, supported by just a few.
^ DHT permits use of trackerless torrents (with supporting clients) to resume normal torrents when their tracker is down. However, some trackers that register their users for keeping tabs on fair usage (such as a ratio of bytes downloaded to uploaded) may not reliably measure and update usage for users employing DHT.
^ a b c Tracker included with Linux binaries and with source, but not with Windows binary.
^ a b Exchanging with BT 6 and µTorrent clients (and now MooPolice).
^ It's UDP based, an experimental feature and only supported by other Azureus based clients.
^ a b c Has its own DHT, a mainline-DHT compatible implementation is available as plugin.
^ µTorrent's DHT implementation is the same as Mainline and BitComet's, but unfortunately this is incompatible with Azureus's implementation.
^ It's not a DHT network, but Shareaza uses Gnutella2 to find other Shareaza clients downloading the same torrent. Mainline DHT support is available as a separate download.
^ Since Shareaza v2.5.5.1 r9064.
^ Exchanges with µTorrent and Azureus peers.
^ Since version 2.5.0.2. It's UDP based, an experimental feature and only supported by other Azureus clients.
^ Since version 2.5.0.2. It's UDP based, an experimental feature and only supported by other Azureus clients.
^ Reduces disk usage, file fragmentation (in case it is not preallocated) and latencies via larger written blocks and cached data for hash checking finished pieces.
^ Recently implemented (unofficial) web seeding feature, see HTTP-Based Seeding Specification
^ a b Provides a Java-based and a simple HTML/JS based WebUI.
^ Opera has a feed aggregator that displays feeds like emails.
^ Since Shareaza v2.4.0.2 r7924.
^ Shareaza also uses G2 to transmit download metadata, such as BitTorrent trackers to other G2 clients.
^ Maximum active torrent number depends on respective user settings and is limited to 31.
Vulnerabilities
This comparison of unpatched publicly known vulnerabilities in latest stable version clients is based on vulnerabilities reports by SecurityFocus and Secunia. See computer security for more details about the importance of unpatched known flaws.
Original article available at http://en.wikipedia.org/wiki/Comparis...
Understanding Magnet URI Scheme
The Magnet URI scheme is a de facto standard defining a URI scheme for Magnet links, which mainly refer to resources available for download via peer-to-peer networks. Such a link typically identifies a file not by location, but by content—more precisely, by the content's cryptographic hash value.
Since it specifies a file based on content or metadata, rather than by location, a Magnet link can be considered a kind of Uniform Resource Name, rather than the more common Uniform Resource Locators. Although it could be used for other applications, it is particularly useful in a peer-to-peer context, because it allows resources to be referred to without the need for a continuously available host.
History
The standard for Magnet URIs was developed in 2002, partly as a "vendor- and project-neutral generalization" of the ed2k: and freenet: URI schemes used by eDonkey2000 and Freenet, respectively, and attempts to follow official IETF URI standards as closely as possible.
Applications supporting Magnet links include ÎĽTorrent, aMule, BitComet, BitSpirit, BitTorrent, DC++, Deluge, FrostWire, gtk-gnutella, Installous (iOS app), I2P, KTorrent, MLDonkey, Morpheus, Qbittorrent, rTorrent, Shareaza, Tixati, Transmission, Tribler and Vuze.
The Pirate Bay migrated from .torrent files to magnet URI in February 2012. This migration made the storage footprint of The Pirate Bay exceptionally small. A user demonstrated total size of The Pirate Bay magnets would be approximately 90MB of compressed data.
Use of content hashes
The most common use of Magnet URIs is to point to a particular file based on a hash of its contents, producing a unique identifier for the file, similar to an ISBN or catalog number. Unlike traditional identifiers, however, content-based signatures can be generated by anyone who already has the file, without the need for a central authority to issue them. This makes them popular for use as "guaranteed" search terms within the file sharing community where anyone can distribute a Magnet link to ensure that the resource retrieved by that link is the one intended, regardless of how it is retrieved. While it is theoretically possible for two files to have the same hash value (known as a "hash collision"), cryptographic hash functions are designed to reduce that occurrence to a practical impossibility -- even if an expert with vast computational resources is intentionally looking for two files with the same hash value.
Another advantage of Magnet URIs is their open nature and platform independence: the same Magnet link can be used to download a resource from numerous applications on almost any operating system. Because they are concise and plain-text, users can copy-and-paste them into e-mails or instant messages, a property not found in, for example, BitTorrent files.
Technical description
Magnet URIs consist of a series of one or more parameters, the order of which is not significant, formatted in the same way as query strings that ordinarily terminate HTTP URLs. The most common parameter is "xt" ("exact topic"), which is generally a URN formed from the content hash of a particular file, e.g..
magnet:?xt=urn:sha1:YNCKHTQCWBTRNJIV4WNA
This refers to the Base32 encoded SHA-1 hash of the file in question. Note that, although a particular file is indicated, an availability search for it must still be carried out by the client application.
Other parameters defined by the draft standard are:
"dn" ("display name"): a filename to display to the user, for convenience
"kt" ("keyword topic"): a more general search, specifying search terms, rather than a particular file
"mt" ("manifest topic"): a URI pointing to a "manifest", e.g. a list of further items
application-specific experimental parameters, which must begin "x."
The standard also allows for multiple parameters of the same type to be used by appending ".1", ".2", etc. to the parameter name, e.g.: magnet:?xt.1=urn:sha1:YNCKHTQCWBTRNJIV4W
Image source and copyright details: http://wikipedia.org/wiki/File:Magnet...
Original article available at http://en.wikipedia.org/wiki/Magnet_U...
NCIXPC proudly presents the first MSI Military Class PC in Canada, the 500-IM MilSpec!
A short time ago, MSI launched their "Military Class PC" initiative, focusing on a PC built with their Military Class III components as well as laying down reliability and performance guidelines. NCIXPC is proud to be the first custom PC shop in Canada to roll out a compliant system, plus it's based around some fresh components from Aerocool and BeQuiet!
More details + high res photos: bit.ly/XQuuV7
Friday, February 8, 2013
Wednesday, January 30, 2013
Thursday, January 17, 2013
manokelpase - TIXATI v1.86 Optimize
Improve twice your TIXATI download rate!!
visit http://manokelpase.blogspot.com/ for more information.
How to: Install and Use Nokia Ovi Services
A quick 3-minute guide, that tells you how to install the Ovi Suite on your PC, connect your phone via USB, use it to tether mobile internet to your PC, update your software and install Ovi Maps 3.
This was my entry for the May 2010 help video competition by Vodafone UK
The phone used was a Noka 5800 XpressMusic, but the suite is compatible with most Nokia phones. Some features may require an internet contract or a GPS-compatible phone.
Music is by Mr. Scruff (Spandex Man)
How to Enable Adhoc WiFi on your Android Tablet!
Here's how to enable your Android tablet to connect to your Adhoc WiFi devices, such as tethering to your smartphone.
Download files here:
http://downloadandroidrom.com/file/AndroidTabletHacks/AdhocWiFi/adhoctablets.zip
Complete step-by-step instructions here:
http://androidtablethacks.com/android-tablet-hacks/how-to-enable-adhoc-wifi-o...
Works on any ROOTED Android tablet!
SKYBOX F3 F4 M3 X3 FREE TEST LINE Firmware Scooby Snacks Channel Update Openbox Dreambox Vu Duo
FREE Test Lines SKYBOX F3 F4 X3 M3 Scooby Snack via
The NEW Satellite Gifts Toolbar App Install it Free NOW
www.satellitegifts.ourtoolbar.com
The Dogs Bollox SKYBOX F3 F4 X3 M3 Scooby Snack Firmware Load image & CCcam.cfg to a USB flash drive ~ DIY Plug & Play SKYBOX F3:All Channels HD full bouquet favorite More at www.thedogsbollox.me "We Believe In Better" !!!
How To Get 3g Internet on iPod Touch
This is a tutorial how to get 3g internet from your mobile phone on your iPod touch this means you can browse the internet anywhere. I am using a Nokia N95 for this.
The program you need is Joikuspot which you can find here.
http://www.joikushop.com
How to Hack a Cisco Phone
Columbia computer scientist Ang Cui helped uncover a weakness in Cisco IP phones that can let a hacker take complete control of them.
Read more at http://spectrum.ieee.org/computing/embedded-systems/cisco-ip-phones-vulnerable
Subscribe to:
Posts (Atom)