Saturday, January 31, 2015

Virtual Machine is a software that allows an entire operating system (the "guest") to run on another OS (the "Host"), whether in a container window, or full-screen, or in what's sometimes called a "seamless" mode, where just one application is run from the “guest”. Virtual machines have a number of serious uses. They allow you to experiment with another operating system without leaving your current operating system. 








They’re a good way to play with Linux, or at least a new Linux distribution, without actually installing that Linux distribution on your current hardware or even just booting to a live CD or USB drive. When you’re done with an operating system, you can just delete the virtual machine. A virtual machine is also a great way to test a new version of Windows. You can't run OS X as a guest system on Windows or Linux, but the VirtualBox can run anything else including those pre-rolled virtual images you find laying around the internet

There are number of Virtual Machine programs available on the Internet, out of which VirtualBox is popular because its completely free and it supports Windows, Linux and Mac. It runs pretty smoothly on Windows and Linux with no problems at all. However, integrated Parallel Desktops or VMware Fusion are better options for Mac.

How To Setup Virtual Machine

1. Go to any Virtual Machine program's download page and download the right copy for your system. The only real choice falls on Linux users having to choose between 32- and 64-bit versions for their particular distribution.

2. Click through the install screens; in most cases, you won't have to stop and change anything. You'll probably get a warning that VirtualBox will have to disconnect and re-connect your network connection for a few seconds while it's setting up, so finish up any crucial net transfers.

3. During setup on Windows, you'll be asked to install "device software" or "drivers"—hit "Install" for each, or check the box that indicates you'll "Always trust ..." drivers.

4. Once Virtual Machine program is installed, launch it and you'll arrive at an empty screen. You can run something here. VM programs like, VirtualBox provides tools to dual-boot the hard-drive and lot many other tweaks as well.

5. If you're testing out a Linux system, just download the ISO from Ubuntu, Fedora etc. Linux distros,

6. You can also install Windows using a physical CD or DVD. You can also use the bootable USB media for the same. When it Virtual machine asks to insert installation media, insert the installation disc or USB, Virtual Machine will boot and load the OS automatically. 





S.B., CLICK.me




Like us on Facebook: CLICK.me





 


While setting up a security plan for a particular network, most often the big picture gets covered ignoring small details which might prove crucial in future. If these minute areas are ignored, the cybersecurity belt will never be fool-proof. Here are seven such areas which usually skip IT security officers' notice but they should make sure that all these areas are covered in order to ensure utmost security from cyber attacks:



1. Keep a tab on your own people:

This area is called advanced persistent threat. In the security chain the weakest link is the end user. There are some people who are aware of the fact that no IT security policy will be applicable to them ever. They exploit this vulnerability too. But IT security officers should never allow this gap happen and complying with security policies, they should enforce the policies on everyone, irrespective of the fact who they are.

2. Escalation process should be appropriate:

Whenever a warning arises of an impending issue, there should not be further ignorance. But sometimes these alerts are ignored the most, leading to bigger problems. Sometimes the person who receives the alert doesn't have the authority to escalate it for further investigation. Sometimes they are also not able to locate those people who have the necessary authority. That's why a disastrous consequence cannot be avoided anyhow. If immediate action could be taken at the very initial period, then the devastating consequences could be avoided too. So it's very important that every staff has the knowledge to whom an alert has to be escalated so that proper action is taken as soon as a smallest sign of trouble arises.

3. Additional authentication:

It's pretty necessary but ignored most of the time. If some operation requires more than two people and one person among them is not present to launch the operation, then the other person should have dual authentication access so that the operation is not delayed anyhow. Authentication system should be appropriate everytime.

4. Have control on downloads:

IT security professionals should be very alert about which software is installed by employees. Keep certain limitations on admin rights on laptops, desktops and servers. There are so many commercial products in the market which can be downloaded by employees seamlessly. It's IT security professionals' responsibility to check that a machine is maintaining the ethics of a work environment.

5. Keep track of open source technologies through documentation:

A white list is popular but not sufficient all the time. A proper request for new software products and applications is required before installation. If open source components are in use then proper tracking is also required. There are several software applications which are partially or fully based on open source codes. If components' source is not known, then assessing the risk also gets tough and vulnerability becomes higher.

6. Have control on using company's equipment:

Web browsing capabilities of users must be controlled both inside and outside the premises if company property is used. Employees might not like web filters but compromised sites have their own vulnerabilities, not on the face all time time. If you are supposed to protect your network, you have to be strict Web browsing practices without any exception.

7. Put lock on browser on take-home machines:

Web filters are used in most cases in corporate networks. Some use client side Web filtering and restrict uses of a computer when a laptop of tablet has to be carried to home and worked via a private network. Though this filtering thing is not liked by employees, but this equipment has to be implemented for good of all, including those employees too.





S.B., CLICK.me




Like us on Facebook: CLICK.me




 
In the technology field, buzzwords are very essential parts. It hardly matters if you are an amateur or an expert in the field, if you are supposed to speak about technology in your daily conversations, then it might get difficult for you to go with the flow without knowing these buzzwords. Technologies are pouring in from across the globe as the consumer world is getting connected to IT furthermore in recent times. That's why the buzzword count has scaled up a lot. Let's take a look at eight hottest tech buzzwords of 2014 here:


1. IoT or Internet of Things and IoE or Internet of Everything:

IoT is a network which connect daily used devices and thins like automobiles, fitness bands, home appliances and toothbrushes with technology and Internet connectivity. The term is not new but it's in the year of 2014 that IoT has started affecting our lifestyles effectively. That's why IoT is considered one of the hottest technology trends of 2014. Wireless Internet connected devices are on a boom throughout this year. While IoT is the most popular term, IoE is also very much present in the market.

2. Gamification:

Gamification is used by companies to boost more user input and to create more competition in creativity. Gamification helps improve services and engage more users. It's also capable of gathering more customer inputs. Gamification is a positive business model if applied appropriately and not misused. This term is used by marketing people, software communities and technology support segments.

3. Fiber Optics:

Fiber optic lines are used in pure glass to carry digital data with high speed at long distances. It was once exclusively used for medical industry and big businesses but now fiber optic technology has made it large through telephone systems, cable television and Internet. Fiber optic Internet service transmits data at the speed of light which means you can download music, movies, pictures and videos 25 times faster.

4. Big Data:

Big Data is a popular tech buzzword which you must be aware of. It refers to data which is complex and huge in volume. It's impossible to process these data through conventional measures. Big Data is used to reduce costs, provide better customer support and develop new products. Big Data is all-pervasive now among businesses and it has started affecting our personal lives too. For example, we can mention smartwatches and wearable fitness trackers which gather massive data about our daily activities and health. These devices track blood pressure, sleeping habits and activity practices and store all these data for our well-being.

5. BYOE (Bring Your Own Everything):

You must have heard about BYOD, which is bring your own device. It's common in businesses which ask employees to use their own mobile phones, laptops and tablets for work. But as wearable technologies are on a boom, it's time for BYOE or bring your own everything.

6. Dual Persona:

Another buzzword which keeps surrounding us is dual persona which refers to mobile phones which enable people to maintain separate environments for personal and business use on the same device.

7. Cloud:

Without the term, Cloud, buzzword dictionary would remain incomplete. Cloud is there in the technology air for everyone now. Cloud is a generic term used for storage and workload computing power. Cloud is an over-hyped but yes, a very necessary term. There are private clouds, public clouds and hybrid clouds for both employees and customers. Cloud security is in big question as its size creates vulnerabilities mostly. It isn't a buzzword which will disappear in near future.

8. Ransomware:

Ransomware is a malware which attacks and infects a computer and encrypts sensitive data till a ransom is paid. CryptoLocker is one such malware which encrypts data to lock the most precious files of the victim computer. Attacks by ransomware can be devastating as it can encrypt local drives as well as corporate network data.  





S.B., CLICK.me





Like us on Facebook : CLICK.me





 
 As 2014 is nearing its end and just 27 days are left when we will step forward towards a new beginning, it would be great if we rewind the year of 2014 here, recalling what are those software releases of this year which will be remembered in future as great ones and which are going to impact out technological circles in the days to come too. There were tons of them but here we have selected the best eight out of them which have the potential to transform the tech industry in 2015 and beyond.







1. Facebook Messenger:

If you are using the mobile app of Facebook you must be knowing the fact that Facebook's messaging service doesn't exist for the mobile versions anymore. When you are using Facebook on your smartphone or tablet, you cannot send a message or chat with a friend through the main app. You are bound to install and use Facebook Messenger for messaging and chatting purposes. Initially Facebook users didn't like the innovation and even refused to install the Messenger system, but Facebook made it mandatory. Facebook took this move to streamline activities of the main app and they always wanted to ensure that their service has to be used so that it doesn't die in face of competition from other messaging apps.

2. Cortana:

Cortana is a personal voice assistant by Microsoft which is used on their own platforms. Cortana is a part of Windows 8.1 and it's just like Google Now and Siri. Using Cortana you can search on the web while speaking to your device. Cortana performs other tasks too based on several commands like it can send a message and it can automatically update you about those information which are relevant like flight reports, local weather data and traffic status. Cortana is also expected to be a part of Windows 10. It means Cortana and Google Now will keep challenging each other as Google has been adding features from Google Now into the Windows version of Chrome.

3. Netflix on Linux:

Netflix is a DRM-locked video streaming service which is being made available on Linux. Netflix has been launched on Linux but unofficially. The video streaming service is compatible with selected Linux distributions including Arch, Gentoo and Ubuntu. It can also be availed through the latest beta of Chrome for Linux as the browser has the code to play DRM-protected video.

4. Android apps for Chrome browser:

Usually apps are able to run on either Android or Chrome. Google has released some apps which are compatible with both Android and Chrome OS. Thereafter, hackers figured out how Android apps are created for Chrome browser and also offered tools which would help users to see if their favourite Android apps were actually workable on Chrome or not. Though it's not very clear yet what are the specialities of an Android app for Chrome browser and Chrome OS, but the technicalities behind it sound cool.

5. iOS 8:

Though iOS 8 arrived as a huge disappointment among iPhone and iPad users because of its bug issues, but still iOS 8 created a lot of buzz during its release. In the first and second releases of the operating system there were lots of bugs which caused severe problems for older iPhone and iPad models and the latest iPhone 6 models. iOS 8 has been avoided by Apple users so far, but it's expected to stay there amid all negativities.

6. Photoshop on Chromebook:

There is an online version of Photoshop now. Photoshop is the most popular image editing tool which has been introduced in Chromebooks for students. It can be used only on those Chromebooks and Adobe Creative Cloud which is operated under educational license. Speculations arose that as Photoshop has an online app now, it should work on all modern web browsers too, cross-operating systems, including Linux. In 2015, the app version of Photoshop will be available for general public.

7. Windows 10:

A preview was offered for Windows 10 as Microsoft didn't have a great time post launch of Windows 8 because of user complaints. Now with this preview Microsoft sought users' opinion for the next Windows. Windows 10 will not hit the markets before mid-2015 but public was allowed to download the preview and try the beta version for free. The technical preview of Windows 10 has a feedback tool too which is aimed at users to suggest Microsoft what can they do to improve the next Windows.

8. Apple Pay:

Apple is all set to make its digital wallet popular worldwide. Apple took an excellent approach to reach to everyday user through its Apple Pay feature, which is implemented by NFC technology. A simple UI is used in Apple Pay which makes it easy to be used with iPhone and iPad latest models. The software has access to banking institutions like Bank of America and Citi Bank as well as credit card companies like American Express, MasterCard and VISA. Apple Pay works like a virtual credit card which allows you buy goods instantly at several retail stores.

Sunday, January 25, 2015

10 minute mail ගොඩාක් වැදගත් වෙන්නේ අපිට තාවකාලික ඊ-මේල් එකක් හදාගන්න. ඒ කිව්වේ මිනිත්තු 10ක පාවිච්චියට ගන්න පුලුවන් මේල් එකක්. මිනිත්තු 10න් පස්සේ ඒක ඉබේම නැතිවෙලා යනවා. ඔයාට ඕනනං කාලය තව ටිකක් වැඩි කරගන්න පුලුවන්. කාලය ඉවරඋනාට පස්සේ නැතිවෙලා යන මේල් එක අපිට ආයෙත් ගන්න බෑ. වෙන කෙනෙකුටවත් බෑ. ඒ වගේම ඔයා යවන මේල් වලට රිප්ලයි එවන්නත් බෑ.

මේක ඔබට spam කරන වෙබ් අඩවි වලින් බේරෙන්න පාවිච්චි කරන්න පුලුවන්. ඒවගේ ඔයාලට එතරම් විශ්වාස නැති වෙබ් අඩවියක account එකක් හදාගන්න ඕන උනහමත් මේක පාවිච්චි කරන්න පුලුවන්.

මුලින්ම පහලා තියෙන ලින්ක් එකට යන්න,

දැං පහල පින්තූරයේ පේන විදිහට ඒ අය ඔයාට ඊ-මේල් එකක් දෙනවා, ඒ ඊ-මේල් එක විනාඩි 10ක් දක්වා වලංගුයි. අවශ්‍ය නම් කාලය දිගු කරගැනීමටත් හැකියි.
 
ඔබට ලැබෙන මේල් පිලිබද විස්තර ලැබේවි.
එය කියවීම සදහා Subject එක උඩ ක්ලික් කරන්න.

Subject එක උඩ ක්ලික් කරාම ඔයාට ඒ ඊ-මේල් එක කියවීමට හැකියි වගේම Reply to this මඟින් ඒවාට reply කිරීමටද හැකියි.
 
 
 
 
--S.B, CLICK.me
 
 
 
 
 
Like us on Facebook : CLICK.me
 
 
 
 









Holographic කියන්නේ තාත්වික ලෝකය මතට අතාත්වික (Virtual) වස්තූන් ප්‍රක්ෂේපණය කරන ආකාරයක් කියලා හඳුන්වන්න පුළුවන්. සිනමා පට වලදී නම් ඔබ මේ වගේ දේවල් දැකලා ඇති. ඉතින් මේ වගේ Virtual දේවල් මවා පෙන්වන්නටත්, ඒවා සමඟ ඔබේ අංග හරහා අන්තර් ක්‍රියා කරන්නටත් හැකියාව ඇති අපූරු උපැස් යුවල් හඳුන්වා දෙන්නට මයික්‍රොසොෆ්ට් සමාගමට හැකියාව ලැබුනා. Google සමාගමේ Google Glassට වඩා දියුණු ආකාරයකට අවට පරිසරයේ ඇති දේවල් පිළිබඳව සංවේදක හරහා අවබෝධයක් ලබාගැනීමටත් ඒවා මතට හෝ ඒවා සමඟ අන්තර්ක්‍රියා කළ හැකි ආකරයකට Virtual දේවල් මවා පෙන්වීමට මේ HoloLens උපැස් යුවල සමත්.
ඒ වගේම HoloStudio නමින් හඳුන්වා දෙන මෘදුකාංගයක් හරහා Virtual Objects තැනීමටත්, ඒවා විවිධ වෙනස්කම් වලට ලක්කිරීමටත් ඔබට හැකියාව ලැබෙනවා. ඒ වගේම HoloLens හඳුන්වා දීමේ උළෙලේදී මයික්‍රොසොෆ්ට් සමාගමේ  නියෝජිතවරියක් HoloLens හා HoloStudio යොදාගනිමින් සිදුකළ අපූරු නිරූපනය බොහෝ දෙනාගේ සිත්ගත් අංගයක් වුනා. කෙසේ නමුත් HoloLens හි මිල හෝ වෙළඳපලට නිකුත් වන දිනයක් පිළිබඳව කිසිදු අදහසක් දැනට පළ කර නැහැ. අවසානයේ වින්ඩොස් 10 හඳුන්වා දීමට පැවැත්වූ උත්සවයේ විශිෂ්ඨතම හඳුන්වා දීම බවට පත් වුනේ HoloLens බව කවුරුත් පිළිගන්නා දෙයක්.




















--S.B., CLICK.me




Like us on Facebook : CLICK.me 



Cortana (කෝටානා) ඔබට මතක ඇති නේද? iOS හි Siri වගේ Android හි Google Now වගේ ඔබේ වින්ඩෝස් ජංගම දුරකථනයේ සහායිකාව වුනේ Cortana යි. මේ නව වින්ඩෝස් මෙහෙයුම් පද්ධතියත් සමඟ කෝටානාත් අලුත් වෙලා. ඒ වගේම මෙතෙක් කලක් ජංගම දුරකථනයට (Windows Phone) පමණක් සීමා වූ ඇය දැන් Windows 10 මෙහෙයම් පද්ධතිය සමඟ ඔබේ පරිගණකයටත් ඇවිත්.
ඒ වගේම ඇයගේ හැකියාවත් විශාල වශයෙන් දියුණු කිරීමටත් බුද්ධිමත්ව සිතා පිළිතුරු දීමටත් හැකියාව ඇයට ලැබිලා. ඔබ කටහඬින් කරන පුංචි විධානයන් හරහා ඔබේ OneDrive හි දත්ත පිරික්සා අවශ්‍ය තොරතරු ක්ෂණිකව ලබාදීමටත් ඇයට හැකියාව තිබෙනවා. ඒ වගේම ඇය දැන් පෙරටත් වඩා ඔබේ පුද්ගලික තොරතුරු වලට අනුකූලව තොරතුරු සපයන නිසා වඩාත් සමීප බවක් දෙනෙනු ඇති බවයි මයික්‍රොසොෆ්ට් සමාගම ප්‍රකාශ කරන්නේ.
--S.B., CLICK.me
Like us on Facebook : CLICK.me



Internet Explorer එහෙමත් නැත්නම් වින්ඩෝස් හි වෙබ් බ්‍රවුසරය භාවිත කරන පිරිස සීග්‍රයෙන් අඩුවී ගියේ පසුගිය කාලයේ දී Google Chrome හා Firefox වෙබ් බ්‍රව්සර වල ආගමනයත් සමඟයි. ඉන්ටනෙට් එක්ස්ප්ලෝරර් තවමත් ප්‍රචලිතම වෙබ් බ්‍රව්සරය ලෙස සමහරක් වාර්ථා තවමත් පෙන්වූවත් වැඩි වශයෙන්ම භාවිත කරන බ්‍රවුසරය ලෙස Chrome ප්‍රචලිත වීමත් සමඟ IE කෙමෙන් භාවිතයෙන් ඉවත් වුනා. දැන් නම් IE භාවිත කරන්නේ බොහෝ දෙනෙක් වෙනත් බ්‍රවුසරයක් download කරගන්න පමණක් වන තරමට භාවිතය අවම වෙලා.

ඉතින් මේ පරාජයට පත්වූ බ්‍රවුසරය වෙනුවට අලුත් බ්‍රවුසරයක් ගෙන එන්නට මයික්‍රො සොෆ්ට් සමාගම තීරණය කරලා. එය හැඳින්වෙන්නේ Project Spartan නමින්. වින්ඩෝස් 10 නව මෙහෙයුම් පද්ධතියත් සමඟ නිකුත් වන නව බ්‍රව්සරයේ අලුතින් rendering engine එකක් සහිත නිසා වඩා වේගවත් හා වඩා නිවැරදිව වෙබ් අඩවි පෙන්වීමේ හැකියාව Spartan හට ඇති බව මයික්‍රොසොෆ්ට් පවසනවා. ඒ වගේම Cortana සමඟ ඒකාබද්ධව ක්‍රියාකරමින් ක්‍රියා කළ හැකි මෙන්ම ජංගම දුරකථන සඳහාත් පහසුවෙන් ක්‍රියාකළ හැකියි.

මීට අමතරව තවත් බොහෝමයක් features මෙහි අන්තර්ගත වන අතර පෙනුම සරල නිසා සහ භාවිතයට පහසු නිසා බ්‍රවුසර යුද්ධයට වඩා හොඳ තරඟකාරයෙක් ලෙස ඉදිරිපත් වීමට Spartan ට හැකි වේවි යැයි සිතමු.
--S.B., CLICK.me


Like us on Facebook : CLICK.me 






WhatsApp කියන්නේ ලොව අංක එකේ chat app එකක්. විවිධ ජංගම දුරකථන මෙහෙයුම් පද්ධති රාශියක් සඳහා සහාය දැක්වූ WhatsApp මේ වන තෙක් ඔබේ පරිගණකය හරහා භාවිත කරන්නට හැකියාවක් තිබුනේ නැහැ. නමුත් අදින් පසුව ඔබට පහසුවෙන් වෙබ් බ්‍රවුසරය හරහා WhatsApp වෙත පිවිසිය හැක. ඒ සඳහා මෙම වෙබ් අඩවියටhttps://web.whatsapp.com ඔබේ Google Chrome වෙබ් බ්‍රව්සරයෙන් පිවිසෙන්න. එහිදී දකින්නට ලැබෙන QR code එක ඔබේ ජංගම දුරකථනයේ WhatsApp හරහා scan කර පහසුවෙන් WhatsApp පරිගණකයෙන් භාවිත කළ හැක. කෙසේ නමුත් iOS හි ඇති සමහර සීමා නිසා මේ ක්‍රමය ඇපල් පරිගණක සඳහා වලංගු නොවන බවයි WhatsApp වෙබ් අඩවියේ සඳහන් වන්නේ.



--S.B., CLICK.me




Like us on Facebook : CLICK.me
වන්නි මෙහෙයුම නැතහොත්  Wanni Operation නිර්මාණය වන්නේ අවුරුදු 3ක් ශ්‍රී ලංකාවේ විශේෂ බලකායේ සේවය කල සොල්දාදුවෙකු විසිනුයි. ත්‍රිවිද හමුදාවට උපහාරයක් වශයෙන් නිමැවෙන මෙම නිර්මාණය දැනට ශ්‍රී ලංකාවේ නිර්මාණය කරනලද දැවැන්තම පරිගණක ක්‍රීඩාවයැයි කියතොත් මා නිවැරදියි.



කොඩිතුවක්කු නම් යුදහමුදා අනු කණ්ඩයක් බාර මේජර් වරයෙකු හා ඔහුගේ ප්ලටූනය වටා දිවැදෙයි. යුද්දයේ අසීරුතම අවස්ථාවක ඔහුගේ හමුදා අනුකණ්ඩය දරුණු සැගවී පරහදීමකට ලක්වන අතර ඔහුගේ ලගින්ම සිටි මිතුරා ත්‍රස්තවාදීන් විසින් පැහැරගැනීමකට ලක්වේ. ඔහු බේරාගනිමින් තම මාතෘභූමිය ත්‍රස්තයන්ගෙන් මුදවා ගැනීමේ ක්‍රියාන්විතය මූලික කරගනිමින් මෙය නිර්මාණය වෙයි.

ඔබට මෙහිදී ගුවනේ මිග් යානා, MI 24 යානා පදවමින් පහර දීම, යුද ටැංකි හසුකරමින් පහරදීම, නාවුක මෙහෙයුම් මෙන්ම සත්‍ය යුද්දයකදී මුහුනදෙන සෑම අත්දැකීමක්ම මෙම විශිෂ්ඨ පරිගනක ක්‍රීඩාව ක්‍රීඩාකරන ඔබට මුහුනදීමට සිදුවේ. සම්පූර්ණයෙන්ම නොමිලේ ඔබහට ලබාදෙන්නක් වන මෙම ක්‍රීඩාව ඔබට නුදුරේදීම සිංහල බසින් ක්‍රීඩාකිරීමට හැකිවනු ඇත.




--S.B., CLICK.me




Like us on Facebook : CLICK.me





Saturday, January 24, 2015

Every internet user carries a USB flash drives because it keeps data secure and sharing the information is a very easy task from one space to other.USB flash devices are used in the wide way as it provides lot of facilities to its customers to perform their work in the easy way. Usually flash drives are very small size to carry where we can store GB’s of information in it.





While coming to the virus topic USB devices has the possibility of carrying viruses in it which causes harm to the devices connected to it. Here we summed up some preventive measures and steps to prevent USB from virus attacks. Follow the below steps carefully



Steps: How to protect USB from Virus attack
Here we have mentioned some specific methods which can be adapted to any operating system
To protect USB drive from virus first of all it requires the permission from NTFS.In the we are going to mention about the steps needed in converting the USB drive into a NTFS file system.”The FAT 32 is a security system which can be used on different kind of operating systems like MAC, Windows and Linux.


  • 1.) Connect your USB device to the system and then go to the start menu and search for device manager then open it
  • 2.) After opening the device manager locate your USB device connected to the system and make right click on the USB drive then select properties
  • 3.) To select the better performance option to the USB device you should further go to the policy tab option and then press on removal policy option there
  • 4.) Now move on to the MY COMPUTER option and locate the USB drive then right click on the USB and choose format
  • 5.) While following the steps, the user should make sure to have selected NTFS from the file system menu
  • 6.) After all these steps finally click on the start button to format the USB drive using NTFS file system

The above steps are used for successfully formatting the USB drive using the NTFS file system


Configure root of USB

Follow the below steps to carry out the configuration process on your drive which is required for rooting the device in read only mode
  • 1.) Move on to the MY COMPUTER space there locate your USB flash drice and select properties
  • 2.) To make read only mode go to the security tab appears there and select everyone access only and give read only rights for the root folder
  • 3.) Write folder can also be created to allow reading and writing within it and data can also be saved in the folder
Device Block

To protect your system from the unauthorized USB devices Device block is used.It actually works as an anti virus tool which prevents the USB flash drive from spreading virus within the system.





Whatsapp is among the finest cross platform messaging app of all time. Now Whatsapp messenger continues to be an essential part of our life due to its capability of sending and receiving boundless messages at speed plus a User Interface that is clean, making the Whatsapp among the best messaging client.


Nowadays everyone uses Whatsapp daily whether its pupil uses it for Chatting with its buddies for having fun or a business man uses to send some Immediate message to his customers, as individuals are far more active on WhatsApp fairly on any Social networking sites or E mails. So, this means there’s lots of exchange of messages on WhatsApp daily.

However, what in case you have accidentally deleted its extremely essential for you personally and some messages or Chat on Whatsapp. Don’t stress every messaging program has backup and restore options and Whatsapp has also too. So today I will describe just how to recover Whatsapp or Chat in your Android Smartphone.


How to Recover Deleted Whatsapp Messages
Whatsapp messages info is Saved in Phone memory of Android devices. These messages are retrieved by us by doing some simple steps. Whatsapp takes backup day-to-day at 4 AM mechanically. Those messages can be restored by us simply which are done till that time. Here is the step by step process to recoup your deleted whatsapp messages.


1. Visit your Android device’s Settings, thenthen tap on Applications Option  and eventually click on Whatsapp
2. There would be warning message, click OK at that time, simply hit once on then and Clear data. Now you’ve deleted all of your app’s messages and data
3. Now return back and begin Whatsapp messenger app. Now as you’ve removed all your saved data in above you will be welcomed with Configuration Screen of Whatsapp
4. Here you may Configure the Whatsapp by entering Mobile number to you. Simply pat on the Restore button
Recovery. And after clicking on Restore button old messages have been restored by you. Dependant on your Chat history Whatsapp will restore your messages.
5. When its done, you may be able to determine Congratulation message with amount of messages recovered.
That’s it!!


This time, your whatsapp messages that were Deleted have been successfully restored by you.


So guys this is the tutorials to recover your whatsapp messages. If you have any queries regarding this procedure do let us know through the comments.


--S.B., CLICK.me



Like us on Facebook : CLICK.me



 
IMEI stands for International Mobile Equipment Identity each mobile or a smartphone have its own identity. From wiki “The IMEI number is used by a GSM network to identify valid devices and therefore can be used for stopping a stolen phone from accessing that network.




For every new phone the IMEI is usually attached on the box or given in the receipt and the IMEI number is also used when you take your phone to the repair all the mobile details and the warranty status is identified by the IMEI number. Lot of Smartphone’s are being sold over the world, people are having more interest in buying the latest Smartphone’s and update them very soon. In a very less time span there is a lot of development in the smartphone industry.

 While coming to the topic of finding IMEI number this article is useful for the users who have lost their smartphone and they don’t have their IMEI number to block the smartphone and put it in blacklist. Many of them tried different ways to find IMEI number but here is the unique way for the users who are reading this article. Follow the below steps;

Steps: How to find IMEI number of lost Android smartphone
To get your IMEI number Gmail account is the key point to be needed here

  • 1.) Gmail link
  • 2.) First click on the above link and sign in to your Gmail account which was integrated with the lost Android Smartphone
  • 3.)Then your account will be signed in, next scroll down and click on the dashboard under the Account Tools box
  • 4.)After clicking on the dashboard button there appears lot of options such as account,chrome,calendar,gmail,android ect.Then here click on the android section to expand the details
  • 5.)There you will get all the information about the devices list which are linked with your Gmail address.
  • 6.)After that you need to search for the android smartphone which is lost from the list and there you can get all the information about the Android name ,model name and IMEI number
  • 7.)(image is a snap) 












  • 8.) By following these steps user can found their IMEI number very easily.


--S.B., CLICK.me




Like us on Facebook : CLICK.me


We are spending more and more time online with each passing day, so much so that internet has become an indispensable part of our daily existence. When online, various threats exist that could have some serious implications on the data you send/receive. It is therefore ideal that you make use of good safety tools that can prevent your data from falling into the wrong hands. Encryption tools come in handy here!






1.AxCrypt

Open source file encryption software for Windows that integrates seamlessly with the OS to compress, encrypt, decrypt, store, send and work with individual files.

2.Gnu Privacy Guard

GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories.

3.Mac GNU Privacy Guard

The goal of this project is to create a GnuPG front end for Mac OS X.

4.Gpg4win

Enables users to securely transport emails and files with the help of encryption and digital signatures. Encryption protects the contents against an unwanted party reading it. Digital signatures make sure that it was not modified and comes from a specific sender.

5.PeaZip

Free cross-platform file and archive manager utility that provides an unified portable GUI for many Open Source technologies like 7-Zip, FreeArc, PAQ, UPX.

6.Crypt

An open-source, ultra-fast light-weight encryption utility with no installation procedures.

7.AxCrypt

Free, open-source File Protection Utility for Windows that helps you to protect your sensitive information easily by encrypting it with password(s).  




--S.B., CLICK.me






Like us on Facebook : CLICK.me 



 
 There are some software which are pretty costly. While cloud computing is becoming more popular, some software packages are opting for monthly subscription model and not one-time fee. On a monthly basis, the subscription charges don’t look much, but at the end of the year, it’s quite expensive. Open source applications resolve this issue to a large extent. We have a list of fifteen open source applications, for enterprises, small businesses as well as average users.





1. TurboCash:
As an alternative to QuickBooks Pro and Sage 50 Accounting, TurboCash is a nice accounting package which meets needs of debtors, creditors, stock control, trial balance and it supports several companies and users. It’s compatible with Windows platform.

2. Audacity:
It’s a replacement for Apple LogicPro, Adobe Audition, Sony ACID Pro and more. It’s a very nice option for not-so-expert musicians and average users. It’s very easy to record and edit audio files with this application. It’s also capable of converting tapes, records and CDs to digital files. It’s compatible with Windows, Linux and OS X.

3. WaveShop
It’s a replacement for the likes of Sonar X3 Producer, Adobe Audition and Sony ACID pro. It’s a Windows-only tool which has highlighted features like sample rate conversion, audio generation, spectral analysis and so on.

4. Jedox:
It’s a replacement for the likes of Oracle Business Intelligence Standard, SAS Analytics Pro and more. It’s a business intelligence suite which has an OLAP server, ETL and mobile support. It’s independent of all OSes.

5. SpagoBI:
It claims to be 100 per cent open source which is also a flexible business intelligence suite. It’s dependent on other open source projects too and offers modules for OLAP, charts, ad-hoc reporting, data mining, dashboard, master data management and more.

6. BIRT:
It focuses on creating reports and visualisations which can be embedded within applications. It’s sponsored by Actuate and to use it Eclipse is also required. It’s compatible with Windows, Linux and OS X.

7. Sugar Community Edition:
It’s a replacement for Sage ACT! And Salesforce.com Professional. It’s very popular worldwide and it helps connect sales, marketing and support teams with customers as well as business prospects. It’s OS independent too.

8. Firebird:
This is an alternative to Microsoft SQL Server Standard and Firebird has been under development for more than three decades. It;s a relational database which offers excellent performance level and powerful language support. Its paid support is available through third-party providers and it can be used on Windows, Linux, Unix, OS X and Solaris.

9. MikTeX:
If you are creatinga document with scientific expressions and mathematical formulas, then this application is a good alternative to InDesign CS5, QuarkXPress and Microsoft Publisher. It’s compatible with Windows and Linux only.

10. MonoDevelop:
This is an appropriate replacement for Microsoft Visual Studio Professional with MSDN. It has been designed for C# and Visual Basic .NET. With it developers can create multi-platform applications and its key features inlcude advanced text editing, unit testing and more.

11. Zimbra:
This is a replacement for Microsoft Exchange and it offers a cross-platform client-server mail solution. It’s compatible with Windows, Linux, Unix and OS X.

12. Openbravo:
This is a replacement for Microsoft Dynamics, SAP and NetSuite. It has been used by some huge brands like Oracle, Federal Bank and others. It offers a commerce platform and an ERP platform. It’s independent of all OSes.

13. Inskscape:
It acts like popular Gimp and it;s quite suitable for use by professional graphic designers. It offers a wide range of tools for creating vector graphics and it supports different file types. It can work with Windows, Linux and OS X.

14. Calligra:
It’s an excellent alternative to Microsoft Office and it was previously known as KOffice. It includes a word processor, spreadsheets, presentations, project management, database, vector graphics, diagramming and mind mapping. It also supports Microsoft file formats.

15. PDF SAM:
PDF SAM stands for PDF Split and Merge. It can extract pages, merge multiple documents, rearrange pages and so on. It’s usable with Windows, Linux and OS X.



--S.B., CLICK.me 






Like us on Facebook : CLICK.me
Torrent and cloud downloading websites are often used for various purposes. While they allow you to access your files from anywhere, they also provide higher download speeds than what you ISP may be allowing you. While these are premium websites, some of them do offer free services too.



1. Boxopus.com: This website downloads torrents without any software and stores it in a cloud. The user needs to provide the torrent files, magnet links or torrent page URL and they can download the torrents anonymously using an encrypted channel. You can also listen to or watch your torrents from a private page.

2. Btcloud.io: This is a cloud storage that has been integrated with the global BitTorrent network. It allows you to join big communities of users online. The download speed that you get here will depend on the account that you have chosen.

3. Quick-torrent.com: This is an online software that downloads torrents that a user wants and then provides them with a direct download link for the file. It also ensures that data downloaded from Quick Torrent is encrypted and your ISP doesn’t find out that you’re downloading torrents.

4. PCloud.com: This website gives you 10 GB of free space, which you can extend to 20 GB by inviting your friends to join. It also has apps for both Android and iOS patforms.

5. Filestream.me: A free membership on this website provides you with 1 TB of disk space. You can get a number of other options through the premium accounts. 




--S.B., CLICK.me





Like us on Facebook: CLICK.me 


 


Since the advent of Google's Android operating system, open source software and applications have gained immense popularity, even amongst regular users. More people are joining into the efforts every day, making open source more and more reliable and feature rich.

Here are the reasons why the revolution is happening.




1. Quality

The quality of open source projects has improved over the years. While earlier these projects used to be lacking in many areas as compared to other proprietary projects, this is no longer true. Open Source projects, software, programs and applications have come up in a big way, especially in the past year. Android has led the rise of open source, bringing more and more projects to the mainstream.

2. Feature set

Another area where many open source projects were found wanting was in providing the appropriate features. But with things like Android, Valve's Steam OS and Steam Machines and many other projects have delivered features that are well beyond what their proprietary alternatives can give.

3. Security

The open sourceness of a project is in itself a step towards security. With so many developers, programmers and coders looking at a particular code, vulnerabilities are spotted more easily. Moreover, the more minds that are working on the project, better are the ideas.

4. Faster innovation

Taking from the last point, when more people are looking at a project, it brings more creativity and innovation into a project. Moreover, open source projects are often created in order to replace a proprietary project. In order to do so, they have to go a step forward and add more to their application.

5. Scalability

Unlike many proprietary software, open source projects are mostly focused on being scalable, rather than catering to a particular market segment. For example, Android can work on tablets, smartphones and even PCs, making it a one stop solution for three kinds of devices.

6. Customisation

When the creator of an application brings open source's their project, it increases the scope for customisation. Often, savvy users taking a look at the code, make their own additions to the program and turn it into something completely different.

7. Collaboration

Enterprise users often need the same product, but with little variation in order to suit their business needs. In such cases, the customer has the choice to either buy a proprietary software and adjust to it or choose an open source alternative that is just as good and can be customised to suit your needs.

8. Standards

The standards in open source are set by organisations like the Apache Foundation, Linux Foundation and other organisations. This means that the standards are set by the industry itself, which knows what is good for it and what works.

9. Cutting-edge

Have you seen the features that Android brought? Cutting edge features and technology are the trademarks of open source software.

10. Cost

Open source software costs less and are most often available for free.  




--S.B., CLICK.me






Like us on Facebook : CLICK.me

 
JavaScript is a great language for improving marketing platforms. Well not for any particular avenue, but JavaScript is actually the best language for overall use on the web. And there are several reasons behind that. Since its birth in 1995, JavaScript has gone a long way and since last five years it has grabbed a lot of attention. Developers love to use JavaScript. Here are the best 10 reasons why you need to learn JavaScript for your web development aspirations:



1. Reason 1 - Flexibility:

JavaScript has often annoyed developers because of its browser incompatibility issues but now things have changed. It is one of the best flexible languages which is used across all the common browsers. JavaScript is not at all a compiled language but you simply don't need to bother about loading and unloading content, compiling or setting data types.

Reason 2 – The best language for hangouts:

As Node.js can be used in the back of any hangout application like Skype, the video signal easily gets transported over the air to one or more clients. Two-way communication has become with extended use of JavaScript. Communication channels are mostly using this language as peer-to-peer communication couldn't get any better.

Reason 3 - HTML scripting:

If you want to create a dynamic functional webpage then you have to write the code in JavaScript. Everything ranging from pop-up window to client-side form validation and calculation, the basic requirement in JavaScript. In case you are using IE, JavaScript is the best alternative to VBScript because of its incompatibility with the browser. In Web development JavaScript is ubiquitious now which means that its basic syntax is the most common thing among developers. If the learning process goes on, then the advanced features are not very tough to grasp.

Reason 4 – Easy to Edit:

It's very easy to start with JavaScript. As it's a scripting programming language, so the code doesn't require to get compiled and not any compiler or similar software. It's a plain text which means you just need a notepad or any plain text editor.

Reason 5 - : Easy Browsing

Browsers have been easier to manage with JavaScript, especially after the release of Kinect SDK by Microsoft. The complete working kinect.jslibrary enables use of Microsoft's Kinect in your browser. But there is a drawback too as it's mandatory that a WebSocket server program is running at the back side. Solutions are being worked upon for this problem too by discovering a browser plug-in which enables Kinect sue for browsers like Chrome and Safari. This solution is known as DepthJS, which is at an early development stage.

Reason 6 - Mozilla Rhino:

If you find scripting with Java as difficult, then here comes Mozilla Rhino for you which uses JavaScript. The direct Java model is being abandoned by most developers now and JavaScript or Rhino has emerged as the favourite option for scripting and interfacing with Java libraries.

Reason 7 – Best Language for Prototyping:

As JavaScript is a prototyping language every object is considered as a class. Objects mean which are developed through particular use. JavaScript leads to rapid and flexible development as there are several design patterns which are not so easy to use in other structured languages. As JavaScript allows creating prototypes, it the best option for extension of existing classes.

Reason 8 – Controlling 3D Games:

If you play a non-Flash browser game then JavaScript is a good option for you. JavaScript's graphic capabilities are amazing and in case of action games the language plays a major role. In case of action games, if you're using JavaScript, then you can plug your Xbox controller into your PC and you can also use the Gamepad API. If you have a gamepad then just plug it in and enjoy your games. JavaScript allows programming through input controls.

Reason 9 - Editing XML via DOM:

DOM can be implemented in a robust way through JavaScript and as time has proved, it's quite a worthy candidate for operating all kinds of XML vocabularies.

Reason 10 - Easy to Debug:

JavaScript has several tools like FireBug and Web Developer Toolbar which makes it easy to debug the language. If any mistake is done, it can be tracked easily and at the same place where it occurred in the browser console. Breakpoints can be positioned in the page code so that the code can be debugged through conventional methods.  




--S.B., CLICK.me






Like us on Facebook: CLICK.me 

Which side we should focus on more in this site?

CLICK.me අපි,

Shehan Bharatha
Prabath Dilshan
Mihidun Praneeth
Themiya Dhanushka

CLICK.me

Let's Touch the World with CLICK.me

Total Views

CLICK.me inc.. Powered by Blogger.

Translate

Popular Posts

Our Social Media

Contact Us

075 74 78 289 (Shehan)

Email : Click.mesofty@gmail.com