Blender is a free open source professional 3D graphics software. This software is used to create professional animation films.Blender available on most platforms that use today.Blender available on Windows,Mac OS,Linux etc. It is useful for someone who never used animation software.
Friday, 3 June 2016
6 Tips to Reduce Mobile Data Usage on Android Phone
People are addicted to smartphone and smartphone is of no use without internet. However unlimited data plans are expensive that most of us have to live in the fear of exceeding our data limit. But using some tips while using internet can reduce your data usage.
1.Restrict Background Data.
The simplest way to reduce data usage while surfing on internet is to restrict background data. There are many apps that run in background and consume your data. By activating background data restricting mode you can reduce your data consumption.
You can restrict background data by Settings > Data usage >Restrict Background Data
2.Use add blocking app.
Adds not only eating your data they also annoying while surfing on internet or watching You Tube videos. The best solution to prevent adds is to use add blocking apps.Adblock plus is an famous app which blocks adds.
3.Use Opera Mini.
Opera Mini allowing huge data compression and it is also useful in slow connections like 2G network.
http://www.opera.com
4.Facebook app consumes huge data.
Facebook app is one of the main data consuming app in android phone. Hence replacing Facebook app with something use less data. Facebook Lite claims to reduce 50% data.Best option is to use Facebook on Opera Mini.
5.Disable auto updating apps.
Auto updating of apps may consume a huge data hence disable auto updating of apps may reduce data usage.
6.Use open Wi-Fi hotspots.
Using open Wi-Fi hotspots can reduce your data usage and providing faster connections.
Wednesday, 1 June 2016
How to Use Two Whatsapp Account on One Android Phone
1. Multiple Whatsapp account on Android Lollipop by Multiple users accounts
If you want two whatsapp account on a single phone, multiple account user feature on android lollipop is ideal.
- This feature allowing to create two user accounts in a single android lollipop.
- This feature allows to install whatsapp and other apps in both accounts.
- This is ideal for family members sharing single phone.
Procedure
- Settings -> User -> Add User
- After creating account tap on the new user account icon on notification bar.
- After entering new user account you can install and use whatsapp.
2. OGWhatsapp
OGWhatsapp is an android app allowing you to use two separate whatsapp account on a single phone.
Follow these steps
- Backup your whatsapp data (click to know how to backup whatsapp data)
- Delete all whatsapp data Settings -> Apps -> Whatsapp -> Clear data
- After this rename the name of the folder whatsapp to OGWhatsapp.
- Now uninstall whatapp.
- Now install OGWhatsapp.
- After installing register with old whatsapp number ie,original whatsapp number,
- Now reinstall official whatsapp.
How Can We Set Full Size Whatsapp Profile Pictures Without Cropping
1. #SquareDroid
#SquareDroid is a simple app which works for both, Whatsapp or Facebook or Instagram or any app you don’t need to forcefully crop your images.
- One of the best features of this app is, it let’s you share uncropped photos in high resolution without decreasing original quality.
- You can pick photo from Gallery, Google Drive and any other app.
2. No Crop for Whatsapp
No Crop for Whatsapp is a simple app allowing you to set whatsapp profile picture without cropping.
- This app allows edit,resize,rotate and add text to image.
- It is useful for Whatsapp or Facebook or Instagram,
Monday, 21 March 2016
Vodafone All USSD codes to check balance, offer, plan, alert
List of Vodafone All USSD codes to check balance, offer, plan, alert:
USSD Code
|
Description
|
*111*2#
or *141# |
Check main balance of Vodafone
|
*111*6*2#
|
Check
GPRS or internet balance |
*157#
|
Check
free SMS balance of Vodafone |
*156#
|
Check
free Minutes in Vodafone |
*146#
|
Check
validity of Vodafone number |
*111*2#
|
Check
Mobile number with main balance |
*123#
|
Vodafone
Alert |
*121#
|
Vodafone
Best fit offers |
*111*5*2#
|
Know
3G data card balance |
131*<Amount><Receiver
mobile no># |
balance
transfer from one phone to other |
Recharge your Internet Balance, charges applicable:
USSD codes
|
Description
|
*444*5#
|
Activate
One day Vodafone internet |
*444*8#
|
Rs 8, 20 Mb 3G
plan |
*121*05#
|
1
day GPRS 2G pack |
*121*14#
|
3
Days GPRS pack 2G |
*121*25#
|
7
Days GPRS pack |
*121*49#
|
15
days GPRS pack |
*121*98#
|
1
Month GPRS pack |
*121*851#
|
5
GB 1 month 3G GPRS pack |
*121*1251#
|
8
GB 1 month 3G GPRS pack Vodafone |
SMS Text
|
To
|
Description
|
ACT3G
|
111
|
To Activate 3G services for Post-paid mobile
|
ACT
3G |
144
|
Tp Activate 3G
services for prepaid mobile |
GPRS
|
144
|
To
Check GPRS data balance 2G or 3G |
Sunday, 10 January 2016
What is ACSII
Short for American Standard Code for Information Interexchange, ASCII is an standard that assigns letters, numbers, and other characters within the 256 slots available in the 8-bit code.
| Char | Dec | Binary | Char | Dec | Binary | Char | Dec | Binary |
|---|---|---|---|---|---|---|---|---|
| ! | 033 | 00100001 | A | 065 | 01000001 | a | 097 | 01100001 |
| " | 034 | 00100010 | B | 066 | 01000010 | b | 098 | 01100010 |
| # | 035 | 00100011 | C | 067 | 01000011 | c | 099 | 01100011 |
| $ | 036 | 00100100 | D | 068 | 01000100 | d | 100 | 01100100 |
| % | 037 | 00100101 | E | 069 | 01000101 | e | 101 | 01100101 |
| & | 038 | 00100110 | F | 070 | 01000110 | f | 102 | 01100110 |
| ' | 039 | 00100111 | G | 071 | 01000111 | g | 103 | 01100111 |
| ( | 040 | 00101000 | H | 072 | 01001000 | h | 104 | 01101000 |
| ) | 041 | 00101001 | I | 073 | 01001001 | i | 105 | 01101001 |
| * | 042 | 00101010 | J | 074 | 01001010 | j | 106 | 01101010 |
| + | 043 | 00101011 | K | 075 | 01001011 | k | 107 | 01101011 |
| , | 044 | 00101100 | L | 076 | 01001100 | l | 108 | 01101100 |
| - | 045 | 00101101 | M | 077 | 01001101 | m | 109 | 01101101 |
| . | 046 | 00101110 | N | 078 | 01001110 | n | 110 | 01101110 |
| / | 047 | 00101111 | O | 079 | 01001111 | o | 111 | 01101111 |
| 0 | 048 | 00110000 | P | 080 | 01010000 | p | 112 | 01110000 |
| 1 | 049 | 00110001 | Q | 081 | 01010001 | q | 113 | 01110001 |
| 2 | 050 | 00110010 | R | 082 | 01010010 | r | 114 | 01110010 |
| 3 | 051 | 00110011 | S | 083 | 01010011 | s | 115 | 01110011 |
| 4 | 052 | 00110100 | T | 084 | 01010100 | t | 116 | 01110100 |
| 5 | 053 | 00110101 | U | 085 | 01010101 | u | 117 | 01110101 |
| 6 | 054 | 00110110 | V | 086 | 01010110 | v | 118 | 01110110 |
| 7 | 055 | 00110111 | W | 087 | 01010111 | w | 119 | 01110111 |
| 8 | 056 | 00111000 | X | 088 | 01011000 | x | 120 | 01111000 |
| 9 | 057 | 00111001 | Y | 089 | 01011001 | y | 121 | 01111001 |
| : | 058 | 00111010 | Z | 090 | 01011010 | z | 122 | 01111010 |
| ; | 059 | 00111011 | [ | 091 | 01011011 | { | 123 | 01111011 |
| < | 060 | 00111100 | \ | 092 | 01011100 | | | 124 | 01111100 |
| = | 061 | 00111101 | ] | 093 | 01011101 | } | 125 | 01111101 |
| > | 062 | 00111110 | ^ | 094 | 01011110 | ~ | 126 | 01111110 |
| ? | 063 | 00111111 | _ | 095 | 01011111 | _ | 127 | 01111111 |
| @ | 064 | 01000000 | ` | 096 | 01100000 |
Extended ASCII uses eight instead of seven bits,
which adds 128 additional characters. This gives extended ASCII the
ability for extra characters, such as special symbols, foreign language
letters, and drawing characters as shown below.
Extended or Higher ASCII characters and codes

Thursday, 7 January 2016
How to find out if someone has been snooping in your Gmail
Your Gmail account probably contains some sensitive information—emails from your friends and family members, information about accounts for other services, candid pictures, you name it. What if someone else has been poking around in there? Fortunately, Google gives you the tools necessary to find out.
First, log into your Gmail account from your computer's Web browser. Once you get to your inbox screen, scroll to the bottom, and look for the link labelled "Details" in the lower-right corner.
While you're at it, you may want to turn on two-factor authentication for your Google account and give yourself an extra layer of protection.
What is a Hex Editor?
Figure 1 - Shows a text file loaded in notepad on the left (human readable) versus a binary file on the right. |
|
|
||||||||||||||||||||||
Hexadecimal Area
The middle hexadecimal area is the most commonly used area of a hex editor. It lists each byte of the file in a table, usually sixteen bytes per line. If Figure 2, the first 8 bytes of the file would be '4D 5A 90 00 03 00 00 00'. Each byte is listed in a special notation called hexadecimal notation, sometimes called hex code. Most numbers in our world are represented in decimal or base-10 notation, meaning we use 10 different digits (0 up to 9). Hexadecimal or base-16 notation uses 16 different digits: 0 up to 9 and then the letters A, B, C, D, E, F to represent 10, 11, 12, 13, 14, and 15. Numbers in hexadecimal notation commonly have an 'h' written after them, or an '0x' written before them to indicate that they are in base-16 notation (for example: 1Fh or 0xA7). To convert a 2-digit hexadecimal number to a regular number, multiply the first digit by 16 and add it to the second digit. For example, 3A = 3*16 + 10 = 58.Character Area
Although each byte in a file can store a value from 0 to 255, what matters is what this data means. One way bytes are used is to assign a different letter or symbol to each possible value. For example, the byte value 65 could represent the character 'A' and the value 33 could represent the symbol '!'. The byte values 0 to 127 are usually assigned letters and symbols according to a standard called ASCII (although other standards exist). The character area on the right of the hex editor displays the ASCII representation of each of the bytes in the hexadecimal area. For example in Figure 2, the second byte of the file (5A) is displayed as 'Z' in the character area. Some byte values represent special codes that cannot be displayed in the character area. If there is no character that can be displayed, usually a '.' is displayed in the hex editor.Address Area
The address area on the left side of the hex editor displays the address of the first byte of each line. The addresses are usually displayed in hexadecimal format, but many hex editors can display addresses in decimal format as well. In Figure 2, the address of the first byte of the first line would be 0, and the address of the first byte of the second line would be 0010h (or 16 in decimal format). Remember that addresses start from 0 so if you have a file of 512 bytes, the byte addresses would range from 0 up to 511. Some hex editors also have a ruler along the top of the hex editor to help you know the addresses of other bytes in the file (the orange bar in Figure 2).Editing Data
Data can be edited in a hex editor just like a normal text editor. A hex editor has a cursor that can be moved by clicking with the mouse or using the cursor keys. Position the cursor over the byte you want to edit, and type the value you want to change to using the keyboard. The cursor can be switched between the hexadecimal area and the character area by pressing the 'Tab' key. When the cursor is in the hexadecimal area, you have to enter byte values in hexadecimal notation, but when the cursor is in the character area, you can enter regular characters just like a text editor. Good hex editors always have an Overwrite mode and an Insert mode. In Overwrite mode, typing values on the keyboard just changes the existing byte values, but in Insert mode, typing on the keyboard inserts new bytes into the file. You can switch between Insert and Overwrite mode by pressing the 'Ins' key. Data can also be edited by selecting a set of bytes. Selections are made just like a text editor: click and drag the mouse or hold the 'Shift' key while moving the cursor. Once a selection has been made, the file can be edited using the standard Cut, Copy, and Paste commands on the Edit menu.Advanced Features
The best hex editors in the world contain a whole host of other tools to help you work with binary files. For example, you could use a Find tool to locate certain bytes in a file, or a Binary Comparison tool to compare binary bytes between two files. Some hex editors can even edit the bytes of hard drives and processes just like you would a binary file. The most advanced feature of hex editors is now the ability to place a template over a file that allow you to understand what the bytes of a binary file actually mean.Monday, 4 January 2016
Back up the registry
Windows 8.1 and Windows 8
- Swipe in from the right edge of the screen, and then tap Search. Or, point to the upper-right corner of the screen, and then click Search.
- In the search box, type regedit.exe, and then press Enter. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
- In Registry Editor, locate and click the registry key or subkey that you want to back up.
- Click File > Export.
- In the Export Registry File dialog box, select the location where you want to save the backup copy to, and then type a name for the backup file in the File name field.
- Click Save.
Windows 7 and Windows Vista
- Click Start, type regedit.exe in the search box, and then press Enter. If you're prompted for an administrator password or confirmation, type the password or provide confirmation.
- In Registry Editor, locate and click the registry key or subkey that you want to back up.
- Click File > Export.
- In the Export Registry File dialog box, select the location where you want to save the backup copy to, and then type a name for the backup file in the File name field.
- Click Save.
Windows XP
- Click Start, click Run, type %SystemRoot%\system32\restore\rstrui.exe, and then click OK.
- On the Welcome to System Restore page, click Create a restore point, and then click Next.
- On the Create a Restore Point page, type a name for the restore point and then click Create.
- After the restore point is created, click Close.
Restore the registry
Windows 8.1 and Windows 8
- Swipe in from the right edge of the screen, and then tap Search. Or, point to the upper-right corner of the screen, and then click Search.
- In the search box, type regedit.exe, and then press Enter. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
- In Registry Editor, click File > Import.
- In the Import Registry File dialog box, select the location where you saved the backup copy to, click to select the backup file, and then click Open.
Windows 7 and Windows Vista
- Click Start, type regedit.exe in the search box, and then press Enter. If you're prompted for an administrator password or confirmation, type the password or provide confirmation.
- In Registry Editor, click File > Import.
- In the Import Registry File box, select the location where you saved the backup copy to, click to select the backup file, and then click Open.
Windows XP
- Click Start, click Run, type %SystemRoot%\System32\Restore\Rstrui.exe, and then click OK.
- On the Welcome to System Restore page, click Restore my computer to an earlier time (if it is not already selected), and then click Next.
- On the Select a Restore Point page, click the system checkpoint. In the On this list select the restore point area, click an entry that is named "Guided Help (Registry Backup)," and then click Next. If a System Restore message appears that lists configuration changes that System Restore will make, click OK.
- On the Confirm Restore Point Selection page, click Next. System Restore restores the previous Windows XP configuration and then restarts the computer.
- Log on to the computer. When the System Restore confirmation page appears, click OK.
What is a MAC Address?
In a local area network (LAN) or other network, the MAC (Media Access
Control) address is your computer's unique hardware number. (On an Ethernet LAN, it's the same as your Ethernet address.) When you're connected to the Internet from your computer (or host as the Internet protocol thinks of it), a correspondence table relates your IP address to your computer's physical (MAC) address on the LAN.
All devices on the same network subnet have different MAC addresses. MAC addresses are very useful in diagnosing network issues, such as problems with IP addresses.
MAC addresses are useful for network diagnosis because they never change, as opposed to a dynamic IP address, which can change from time to time. For a network administrator, that makes a MAC address a more reliable way to identify senders and receivers of data on the network.
On wireless networks, a process called MAC filtering is a security measure to prevent unwanted network access by hackers and intruders. In MAC address filtering, the router is configured to accept traffic only from specific MAC addresses. This way, computers whose MAC addresses are approved will be able to communicate through the network—even if they were given a new IP address by DHCP.
Meanwhile, a hacker who's hijacked a network IP address will be blocked because their MAC address will not be on the approved list and will be filtered out.
All devices on the same network subnet have different MAC addresses. MAC addresses are very useful in diagnosing network issues, such as problems with IP addresses.
MAC addresses are useful for network diagnosis because they never change, as opposed to a dynamic IP address, which can change from time to time. For a network administrator, that makes a MAC address a more reliable way to identify senders and receivers of data on the network.
On wireless networks, a process called MAC filtering is a security measure to prevent unwanted network access by hackers and intruders. In MAC address filtering, the router is configured to accept traffic only from specific MAC addresses. This way, computers whose MAC addresses are approved will be able to communicate through the network—even if they were given a new IP address by DHCP.
Meanwhile, a hacker who's hijacked a network IP address will be blocked because their MAC address will not be on the approved list and will be filtered out.
Subscribe to:
Comments (Atom)








