Twitter Facebook Delicious Digg Stumbleupon Favorites More
Showing posts with label Internet Tips. Show all posts
Showing posts with label Internet Tips. Show all posts

Monday, September 19, 2016

Professional Web Design Tips for a Faster Website

In today's time-crunched world, most people literally don't have a minute to spare. This hurried pace extends to the realm of website design -- your professional Web design must satisfy the demands of users with a wide range of options for viewing the Web.
Even if you create a website design that's worth a wait, visitors faced with slow download speed aren't likely to stick around. So how can you make sure that time is on your side? Pay close attention to seven professional Web design tips to create a website that won't slow your business down.
Limit use of flash
Flash is a classic example of style over substance and, while it definitely has its place in professional Web design, it must be used sparingly when you create a website. Even if your visitors have the right flash player (and many won't), it will increase your site's download time. Flash is also one of the Web site design elements that is not yet accessible to search engines, which means it can only hinder your search engine optimization efforts.
Compress your images
Images are a great example of how looks can be deceiving in professional Web design. You might not realize just how much space they occupy when you create a website design. By compressing your images before adding them to your professional Web design, you can reduce/shrink a GIF or .JPEG image by up to half its original size. You may also want to specify the height and weight of your images in your HTML, which can decrease loading time.
Clean up your code
While HTML text is much faster than graphic text, there are ways you can make it even faster. Watch out for extraneous HTML coding – like spaces, unnecessary tags and even white space -- that can increase the size of your files. Remember that less is more, and use defaults for tags or remove them wherever possible.
Share:

Monday, September 12, 2016

What is Spyware and Methods of Prevention.?

What is Spyware?

Strictly speaking, the term “spyware” could be used to describe all of the tools and technology with which espionage is conducted – including the poison-tipped umbrella. But in the context of digital/information technology, spyware is any software that obtains information about a person or organization – usually without their knowledge or consent.
At the more legitimate end of the spectrum, this definition would include cookies deposited in your web browser cache when you visit a website, or software used to gather data on you and your habits for marketing and targeting advertising purposes – so long as these operate without your knowing about them.
Spybots or tracking software are terms often used to describe the class of spyware which is installed without a user’s consent – typically through deception (an infected website, pop-up window, or other malware trap) or camouflage (with a spyware program bundled as part of an otherwise legitimate download). Once installed, these programs gather information on the infected target and transmit it to third parties, who may use it for any number of purposes.

A Brief History of Spyware

Back in October 1995, the term “spyware” first appeared in a public forum called Usenet – which was a distributed internet discussion where users could post messages in an email-like format. It featured in an article analyzing the business model then adopted by Microsoft, in a largely conceptual context.
Spyware made its first significant public impact in 1999, when the popular freeware game Elf Bowling was discovered to be laced with tracking software. Also in that year, Steve Gibson of Gibson Research uncovered a form of spyware which, under the pretext of advertising, was actually pilfering confidential information – the first significant intrusion of adware. In response, Gibson went on to develop OptOut, the first anti-spyware program.
A press release for a personal firewall package which appeared in the year 2000 contained specific reference to spyware, and marked its official entry in the modern language of computing.

The Current State of Spyware

As with other forms of malicious application, spyware has enjoyed a rapid evolution since its humble beginnings. In no small part, this may be attributed to the proliferation of websites, portals, file-sharing resources and torrents that enable users to exchange files and bypass officially sanctioned software distributors and app stores to download free software, or cracked and pirated versions of commercial packages.
Authors of spyware have been known to pay the developers of shareware (limited or zero functionality after a certain period, unless you choose to buy) to bundle their tracking software with legitimate packages. They may also re-engineer freeware applications to include their own spyware code.
Beyond the booby-trapped email attachment or infected pop-up window, internet spies may lure unfortunate victims to tainted websites, where spyware is undetectably and automatically downloaded onto a visitor’s machine – the so-called “drive-by download”. This points to the principal weapon that cyber-criminals use in getting their targets to install spyware: stealth.
Spyware works best when the target is unaware of its presence or activities. So today’s spyware practitioners take great pains to ensure that victims have no idea that the software package they’re installing comes bundled with spybots, or that the website they’ve just visited left them with more than what they’ve just seen.
Once established on a host system, spyware may then go on to observe a user’s activities and provide a steady stream of information to its controllers. This could include personal data, contact lists, financial information, account and user credentials, intellectual property, or operational data crucial to businesses. In some cases, the tracking software may also make changes to a system or network to make its own work easier, or as a form of sabotage.

Types of Spyware

There are several forms of tracking software in current circulation, including:
  • Adware: The paid advertising which appears on program windows and makes such software notionally free may also mask underlying code which observes a user’s system or activities and relays information to third parties for semi-legitimate marketing or more nefarious purposes. Pornware and riskware may also be used as avenues for tracking software installations.
  • Cell Phone or Mobile Spyware: A range of applications, including device-resident software installed by manufacturers to track a user’s position, internet use and activity for targeted advertising and other purposes, and spyware installed manually (by a user, or a malicious outsider gaining access to their phone) or from an infected file download or website.
  • Cookies: For the most part, tracer cookies are placed for legitimate purposes – and websites specifically display their cookie and consent policies to the user in their browser window. But they may also be placed surreptitiously, and employed to track users without their knowledge.
  • System Monitors: Installed secretly, or slipped in as hidden features of otherwise legitimate-looking security software, spyware system monitors may capture keyboard activity (keyloggers), track and record emails, observe browsing and websites visited, etc.
  • Trojans: Seemingly innocent or legitimate software installations and document files that contain spyware in various forms.

Effects of Spyware

The pilfering of confidential personal or corporate data and intellectual property can lead to identity theft, fraud, financial losses, and damage to individual or organizational reputations once the breaches come to light. That’s why spyware is a lucrative option for cyber-criminals, who can sell information on to third parties, or hold people and organizations to ransom over the return of their data or the threat of exposure.
Spyware can also cause real damage to infected systems. There’s often a performance dip associated with a spyware installation, which may manifest as a device or system running slowly, crashes and freezing, increased stress on the processor, higher operating temperatures, battery drains, and so on.
The tracking software may also make changes to system configurations, change port and browser settings, spoof or redirect homepage settings, alter a user’s search engine results, or cause a user’s web browsers to automatically visit infected or fraudulent sites.

Methods of Prevention

New software should be downloaded from approved app stores and manufacturer websites, whenever possible. File-sharing (unless within a secure network environment) and torrent downloads are generally not a good idea. Neither is haphazard clicking on unsolicited email attachments or pop-up windows and advertising.
Security and anti-virus software is always a recommended option – as long as it originates from a reputable manufacturer, and has dedicated anti-spyware facilities. Look for anti-spam filters, cloud-based detection, and virtual encrypted keyboard tools for entering financial information and transactions. Some internet security solutions also offer spyware removal capabilities, in the event of an existing infection.
Device security should also be maintained. So keep a close eye and hand on cell phones and tablets, use password protection and lock screens, and secure all hardware against physical theft or tampering.
Origian from: https://blog.finjan.com/the-past-and-present-state-of-spyware/
Share:

Friday, August 26, 2016

Learn about Web Crawlers Search engines and User-Agents

Web Crawlers
Web crawlers, also known as web spiders or internet bots, are programs that browse the web in an automated manner for the purpose of indexing content. Crawlers can look at all sorts of data such as content, links on a page, broken links, sitemaps, and HTML code validation.
  


  
Search engines like Google, Bing, and Yahoo use crawlers to properly index downloaded pages so that users can find them them faster and more efficiently when they are searching. Without crawlers there would be nothing to tell them that your website has new and fresh content. Sitemaps also can play a part in that process. So web crawlers, for the most part, are a good thing. However there are also issues sometimes when it comes to scheduling and load as a crawler might be constantly polling your site. And this is where a robots.txt file comes into play. This file can help control the crawl traffic and ensure that it doesn’t overwhelm your server.

Web crawlers identify themselves to a web server by using the User-agent field in an HTTP request, and each crawler has their own unique identifier. Most of the time you will need to examine your web server referrer logs to view web crawler traffic.

Robots.txt

By placing a robots.txt file at the root of your web server you can define rules for web crawlers such as allow or disallow that they must follow. You can apply generic rules which apply to all bots or get more granular and specify their specific User-agent string.

Learn more about the Top Search engine Bots
There are hundreds of web crawlers and bots scouring the internet but below is a list of popular web crawlers and bots that we have  been collected based on ones that we see on a regular basis within our web server logs.

Googlebot: Googlebot is Google’s web crawling bot (sometimes also called a “spider”). Googlebot uses an algorithmic process: computer programs determine which sites to crawl, how often, and how many pages to fetch from each site. Googlebot’s crawl process  begins with a list of webpage URLs, generated from previous crawl processes and augmented with Sitemap data provided by webmasters. As Googlebot visits each of these websites it detects links (SRC and HREF) on each page and adds them to its list of pages to crawl. New sites, changes to existing sites, and dead links are noted and used to update the Google index.

"Google+"Another one you might see popup is Google+. When a user shares a URL on Google+ or an app writes an app activity, Google+ attempts to fetch the content and create a snippet to provide a summary of the linked content. This service is different than the Googlebot that crawls and indexes your site. These requests do not honor robots.txt or other crawl mechanisms because this is a user-initiated request.



"Baiduspider " Baiduspider is a robot of Baidu Chinese search engine. Baidu (Chinese: 百度; pinyin: Bǎidù) is the leading Chinese search engine for websites, audio files, and images.

"MSN Bot/Bingbot" This is a web-crawling robot (type of Internet bot), deployed by Microsoft to supply Bing (search engine). It collects documents from the web to build a searchable index for the Bing (search engine).

"Slurp Bot"Yahoo Search results come from the Yahoo web crawler Slurp and Bing’s web crawler, as a lot of Yahoo is now powered by Bing. Sites should allow Yahoo Slurp access in order to appear in Yahoo Mobile Search results.dditionally, Slurp does the following:

Collects content from partner sites for inclusion within sites like Yahoo News, Yahoo Finance and Yahoo Sports.
Accesses pages from sites across the Web to confirm accuracy and improve Yahoo’s personalized content for our users.

"Yandex Bot" Yandex bot is Yandex’s search engine’s crawler. Yandex is a Russian Internet company which operates the largest search engine in Russia with about 60% market share in that country. Yandex ranked as the fifth largest search engine worldwide with more than 150 million searches per day as of April 2012 and more than 25.5 million visitors.

"Soso Spider " Soso.com is a Chinese search engine owned by Tencent Holdings Limited, which is well known for its other creation QQ. Soso.com is ranked as the 36th most visited website in the world and the 13th most visited website in China, according to Alexa Internet. On an average, Soso.com gets 21,064,490 page views everyday.


"DuckDuckBot"DuckDuckBot is the Web crawler for DuckDuckGo, a search engine that has become quite popular lately as it is known for privacy and not tracking you. It now handles over 12 million queries per day. DuckDuckGo gets its results from over four hundred sources. These include hundreds of vertical sources delivering niche Instant Answers, DuckDuckBot (their crawler) and crowd-sourced sites (Wikipedia). They also have more traditional links in the search results, which they source from Yahoo!, Yandex and Bing.

"Baiduspider"Baiduspider is the official name of the Chinese Baidu search engine’s web crawling spider. It crawls web pages and returns updates to the Baidu index. Baidu is the leading Chinese search engine that takes an 80% share of the overall search engine market of China Mainland.

"Sogou Spider"Sogou Spider is the web crawler for Sogou.com, a leading Chinese search engine that was launched in 2004. it has a rank of 103 in Alexa’s internet rankings. Note: The Sogou web spider does not respect the robots.txt internet standard, and is therefore banned from many web sites because of excessive crawling.

"Exabot"Exabot is a web crawler for Exalead, which is a search engine based out of France. It was founded in 2000 and now has more than 16 billion pages currently indexed.

"Facebook External Hit"Facebook allows its users to send links to interesting web content to other Facebook users. Part of how this works on the Facebook system involves the temporary display of certain images or details related to the web content, such as the title of the webpage or the embed tag of a video.

"Alexa Crawler"Ia_archiver is the web crawler for Amazon’s Alexa internet rankings. As you probably know they collect information to show rankings for both local and international sites.

"Google Feedfetcher" Used by Google to grab RSS or Atom feeds when users choose to add them to their Google homepage or Google Reader. Feedfetcher collects and periodically refreshes these user-initiated feeds, but does not index them in Blog Search or Google’s other search services (feeds appear in the search results only if they’ve been crawled by Googlebot).

 


 
Share:

What is Ransomware and Easy Steps To Keep Your data and System Protected


Ransomware is malware for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. 

Ransomware spreads through e-mail attachments, infected programs and compromised websites. A ransomware malware program may also be called a cryptovirus, cryptotrojan or cryptoworm.Attackers may use one of several different approaches to extort money from their victims:

After a victim discovers he cannot open a file, he receives an email ransom note demanding a relatively small amount of money in exchange for a private key. The attacker warns that if the ransom is not paid by a certain date, the private key will be destroyed and the data will be lost forever.

The victim is duped into believing he is the subject of an police inquiry. After being informed that unlicensed software or illegal web content has been found on his computer, the victim is given instructions for how to pay an electronic fine.



Read about: Bitcoin use in Ransomware

The malware surreptitiously encrypts the victim's data but does nothing else. In this approach, the data kidnapper anticipates that the victim will look on the Internet for how to fix the problem and makes money by selling anti-ransomware software on legitimate websites.To protect against data kidnapping, experts urge that users backup data on a regular basis. If an attack occurs, do not pay a ransom. Instead, wipe the disk drive clean and restore data from the backup.

Ransomware is a sophisticated piece of malware that blocks the victim’s access to his/her files.

"There are two types of ransomware in circulation:"

"Encrypting ransomware:" which incorporates advanced encryption algorithms. It’s designed to block system files and demand payment to provide the victim with the key that can decrypt the blocked content. Examples include CryptoLocker, Locky, CrytpoWall and more.
"Locker ransomware:" which locks the victim out of the operating system, making it impossible to access the desktop and any apps or files. The files are not encrypted in this case, but the attackers still ask for a ransom to unlock the infected computer. Examples include the police-themed ransomware or Winlocker.

"Ransomware has some key characteristics that set it apart from other malware:"

It features unbreakable encryption, which means that you can’t decrypt the files on your own (there are various decryption tools released by cyber security researchers – more on that later);
It has the ability to encrypt all kinds of files, from documents to pictures, videos, audio files and other things you may have on your PC;

It can scramble your file names, so you can’t know which data was affected. This is one of the social engineering tricks used to confuse and coerce victims into paying the ransom;

It will add a different extension to your files, to sometimes signal a specific type of ransomware strain;

It will display an image or a message that lets you know your data has been encrypted and that you have to pay a specific sum of money to get it back;

It requests payment in Bitcoins, because this crypto-currency cannot be tracked by cyber security researchers or law enforcements agencies;

Usually, the ransom payments has a time-limit, to add another level of psychological constraint to this extortion scheme. Going over the deadline typically means that the ransom will increase, but it can also mean that the data will be destroyed and lost forever.

It uses a complex set of evasion techniques to go undetected by traditional antivirus (more on this in the “Why ransomware often goes undetected by antivirus” section);

It often recruits the infected PCs into botnets, so cyber criminals can expand their infrastructure and fuel future attacks;
It can spread to other PCs connected in a local network, creating further damage;

It frequently features data exfiltration capabilities, which means that ransomware can extract data from the affected computer (usernames, passwords, email addresses, etc.) and send it to a server controlled by cyber criminals;

It sometimes includes geographical targeting, meaning the ransom note is translated into the victim’s language, to increase the chances for the ransom to be paid.

"Where does the current wave of ransomware infection come from?"

Even though most companies have extensive security mechanisms in place, such as virus scanners, firewalls, IPS systems, anti-SPAM/anti-virus-email-gateways and web filters, we are currently witnessing large numbers of infections worldwide with ransomware infections, such as Cryptowall, TeslaCrypt and Locky. Files on computers and network drives are encrypted as part of these infections in order to blackmail the users of these computers to pay a sum of money, usually in the region of USD 200-500, for the decryption tool.

"A common infection scenario may look like this:"

A user receives an email that comes from a seemingly plausible sender with an attached document, a parcel service with attached delivery information or anexternal company with an attached invoice.

The email attachment contains an MS Word or Excel document with an embeddedmacro. If the recipient opens the document a macro will attempt to startautomatically, executing the following actions:

It tries to download the actual ransomware payload from a series of webaddresses that only exist momentarily. If a web address cannot be reached, thenext one is accessed until the payload has been downloaded successfully.

"The macro executes the ransomware"
The ransomware contacts the command & control server of the attacker,sends information about the infected computer and downloads an individual public key for this computer.

Files of certain types (Office documents, database files, PDFs, CAD documents,HTML, XML etc.) are then encrypted on the local computer and on all accessible network drives with this public key.

Automatic backups of the Windows operating system (shadow copies) are often deleted to prevent this type of data recovery.

"Best practices to apply immediately"

Backup regularly and keep a recent backup copy off-site. There are dozens of ways other than ransomware that files can suddenly vanish, such as fire, flood, theft, a dropped laptop or even an accidental delete. Encrypt your backup and you won’t have to worry about the backup device falling into the wrong hands.

Don’t enable macros in document attachments received via email. Microsoft deliberately turned off auto-execution of macros by default many years ago as a security measure. A lot of malware infections rely on persuading you to turn macros back on, so don’t do it!

Be cautious about unsolicited attachments. The crooks are relying on the dilemma that you shouldn’t open a document until you are sure it’s one you want, but you can’t tell if it’s one you want until you open it. If in doubt, leave it out.

Don’t give yourself more login power than you need. Most importantly, don’t stay logged in as an administrator any longer than is strictly necessary, and avoid browsing, opening documents or other “regular work” activities while you haveadministrator rights.

Consider installing the Microsoft Office viewers. 
These viewer applications let you see what documents look like without opening them in Word or Excel itself. Inparticular, the viewer software doesn’t support macros at all, so you can’t enablemacros by mistake!

Patch early, patch often. 
Malware that doesn’t come in via document macros often relies on security bugs in popular applications, including Office, your browser, Flash and more. 
The sooner you patch, the fewer open holes remain forthe crooks to exploit. Keep informed about new security features added to your business applications. Forexample, Office 2016 now includes a control called "Block macros from running inOffice files from the internet" which helps protect you from external malicious content without stopping you using macros internally.

Open .JS files with Notepad by default.
This helps protect against JavaScript borne malware by enabling you to identify the file type and spot suspicious files.

Show files with their extensions. 
Malware authors increasingly try to disguise the actual file extension to trick you into opening them. Avoid this by displaying files with their extensions at all times.
Share:

Monday, August 22, 2016

Sites To Watch Movies Online.


There are plenty of websites that offer free movies, but they also cause you a lot of problems. In particular, if you are watching a video on a "peer to peer" web site, your Internet provider could cut off your service. In order to avoid these kinds of the hurdles, you can simply log on to a free movie web site and watch them there without the legal hassle. It can be frustrating trying to find the best website to watch free movies on. That's why there is collection of top  websites where you can watch free movies on-line without downloading which is given below.

Vumoo
Vumoo is by the far the most cleaned and wonderful “Watch Movies Online site” some even call it the poor keeps an eye on Netflix and its anything but difficult to see why from the minute you look at it. With a scope of more than 60,000 films which is always developing daily, it packs a wide mixed bag for such another site. It’s great looks are not all that situated it separated from the swarm, with gimmicks like (incremental pursuit) which permits film separating the minute you begin writing in the inquiry field & (vast parchment) which permits you to unendingly span, with more motion pictures continually stacking. 

JustMoviez
JustMoviez is a gateway where you can stream most recent and popular TV shows and Watch Movies Online free of charge without downloading and with no enrollment. Even The website gives itemized portrayal about every latest release and provides you the high qualified area where you can watch the films/ movies online free of charge.
Watch Movies Online With JustMoviez Now

Wolow Tube
Wolow Tube is one of fresher website on the web to watch movies online. It is a search engine for movies, have gathering of all the more then 15000+ titles and every one of them are in great quality. Design is straightforward and fundamental however in the meantime pleasant and utilitarian. It is new sort of site and we profoundly prescribe to attempt it. Advertisements for the present are not issue in light of the fact that there are none.
Watch Movies Online With Wolow Tube Free


Streaming-Movies
Streaming-Movies is the most agreeable spot to watch movies online with streaming. It’s expanding its film database quick, including 50 motion pictures daily. You can search films by classifications or by year of creation. The site is good with any gadget that backings Flash Player. You needn’t bother with any enlistment, all films begin with a single click.
Watch Movies Online With Streaming-Movies Here


IMDB
Internet Movie DataBase (IMDB) is another world’s most famous platform to watch movies online without even downloading on your gadget. It has more than 2 millions of videos which includes – songs, trailers, wiki, plot, star cast and much more. With the paid account you can also watch latest movies online.
Watch Movies Online With IMDB


OnlineMovieWatchs
Online Movie Watchs is another great website to watch movies online. It includes categories like – Hollywood, Bollywood, Dubbed, Pollywood, etc. There are few pop up ads on the site but those are not so much irritating. Also the player buffering speed in fast and you don’t have to wait for a long time. Give it a try 
Watch Movies Online With OnlineMovieWatchs


IGLO Movies
This site is awesome to Watch Movies Online and doesn’t have any ads put on any of its pages giving the client a fantastic scanning background. The library is not as expansive as a portion of the other film sites however certainly merits a visit and has tremendous potential for the years to come.


MerDB
If you like he sites like Primewire and Solarmovie, then this is one of the destinations you ought to attempt. They don’t embed movies specifically on the site, rather than that there are several gushing connections every movie to 3rd-party facilitating site where you can watch movies online. These sorts of gushing destinations are useful for more reasons: They have streams with diverse feature quality, satisfactory streams for all web speeds and for all stages and there are constantly a few streams actually for a few movies that are not famous. They have additionally pop up advertisements yet in the event that you like you can make account and incapacitate them. They likewise have gathering where you can examine about spilling, movies, or on the off chance that you have any sort of issue with the site.


WatchOnline-Movies
It is so far the best site to watch movies online for nothing. The site is so natural to utilize, that a 7 years of age could see how to watch a movie. On WatchOnline-movies.com you can undoubtedly select the sort of movies you wanna watch by selecting one of 15 movies classification. WatchOnline-Movies is always becoming daily to give the best scope of movies and television programs on the web. They have more than 6600 movies and broadcast events and it continues developing. Likewise to watch a movie or a television program and their site you don’t have to be enlist or to include your credit data. S o we very prescribe you to try it out on the off chance that you don’t wanna seek where to watch your movies without fail.
Watch Movies Online With WatchOnline-Movies Now


Yify.tv
Yifi is fascinating streaming site – it is not one of the greatest “watch movies online” destinations, however is constantly great to have in your short rundown. Movie quality is their strongest side, they are not the best in this class yet one of better site, measure of titles is likewise on sufficient level, regularly is overhauled yet it isn’t best place in the event that you are scanning for some little or less business film. Configuration of the site is darker, fascinating and remarkable, site is likewise extremely easy to utilize and practical. Exactly when you seek movies click on spreads, there are likewise some fake play catches (stream in hd, play in hd, moment play, download) attempt to overlook them and you will have more laborer time on this site.
Watch Movies Online With YIFY.tv Free


VKFLIX
VKFLIX is additionally best site to watch Movies online in High Quality – for nothing!
From first ventures on this movie site you have for your mien a tremendous database with just about 80% of movies in HD quality and,of course, an interface (extremely basic for working) that helps you to search movies effectively.
Watch Movies Online With VKFLIX Now

Share:

Sunday, August 21, 2016

iPhone Tricks To Make Your Life Easier

There are dozens of cool iPhone features hidden beneath the surface that you probably weren't even aware of. These are some of the best iPhone hacks you didn't know about, and exactly how you can find them.



Charge your phone faster with a single button press.
Tired of waiting for your phone to recharge? Well, there is a way to speed up the re-juicing process, and it's surprisingly simple — just engage Airplane mode. By knocking out all your phone's Wi-Fi-searching, data-draining communication skills, it takes the strain off your battery while it's being powered up. Not hugely, true — but if you're pressed for time and looking to eke out every bit of juice, that extra 4% you'll add in 30 minutes connected to the mains could make all the difference.

Shave seconds off of your searches. 
When it comes to finding out the latest league standings or proving a point, getting where you need to go on the internet is all about speed and precision — something missing when you're forced to knock out type-heavy web addresses. So save time by holding down the period icon while typing out an address to bring up a short-cut series of URL suffixes. From the classic (.com) to the less used (.edu, .ie), there are quick hit shortcuts for all.

Discover exactly what your phone knows about you. 
Slightly sinisterly, your iPhone is always gathering data on you in the background — be it the apps you're using the most, how much data you're churning through... or even, most creepily, where you are. To see what we mean, head to Settings > Privacy > Location Services > System Services > Frequent Locations. Here you can see not just where you've been, but how long you've spent in each place.

Replace a toolbox essential. 
You've probably filed away the Compass app alongside the Stocks and Find Friends apps in a folder entitled 'Crap I can't delete'. You should pull it back out, though — it's got a secret second function that will help with your DIY duties. No: not using your iPhone to hammer in nails (although it can — briefly — do that too). Instead, swiping left in the Compass app brings up a very useful level — a digital bubble gauge than can check if that shelf really is level. 

Lock your camera's focal point. 
We all know that tapping the screen while taking a photo will set the camera's point of focus, right? Good. Annoyingly though, every time you move the camera after picking a focal point, it disappears. Well, no more. Instead of just tapping the screen, press for a second or two until an 'AF Locked' box pops up. Now you can twist, turn and swing the thing around without losing focus.

Create custom vibrations. 
Ever wished you could tell who's calling just by how your phone feels buzzing against your leg? Now you can: In Contacts, select your person of choice and hit Edit. Here you'll see a Vibration option. Selecting this will give you plenty of options, including the Create New Vibration tool. Making your bespoke buzz is as simple as tapping the screen to the beat of your choice.

Correct Siri's pronunciation. 
Siri's a bit of a smug know-it-all — so  there's nothing better than calling it on its mistakes. Like when it mispronounces peoples' names like an ignorant American abroad. So if Siri says something wrong, just tell it. Following up a mistake by saying "That's not how you pronounce…" will see Siri ask for the correct pronunciation then let you check it's got things right. Because we all know it's Levi-O-sa, not Levi-o-SAR.

Close three apps at once. 
It's not just pictures and web pages that support multi-finger gestures. You can throw additional digits into clearing up your iPhone clutter too. If you need to shut multiple applications in a hurry — for totally innocent, not hiding anything, honest reasons — you can drag three fingers up on the multitasking menu to cull the clutter quicker. Which means your phone should be faster in even less time.

Set your music on a timer. 
Enjoy listening to a little soothing background music as you drift off to the Land of Nod? Then you're probably all too familiar with waking up at 3am to some unwanted tunes. Unless, of course, you set your music to turn off on a timer. In the Clock app, slide along to the Timer options. Here under the 'When Time Ends' tag, you can switch out the alarm option for a 'Stop Playing' tag. This will turn off the tunes, be it through Apple Music or Spotify, when the timer hits zero.

Take a photo without touching your phone. 
An oldie but a goodie iPhone hack is using your volume control buttons to capture a picture — thus saving  your meaty paw blocking the screen as you attempt to hit the touchscreen controls. But if you prefer to be even further removed from your photo-capturing shutter controls? Hitting the volume button on a pair of compatible, connected headphones will have the same effect.

Save your data allowance by limiting app access. 
You're just a third of the way through the month, and your 2GB data allowance is already starting to look a little stretched. You don't have to cut back on your on-the-go Netflix viewing though. Instead, select which apps get demoted to the Wi-Fi-only B-list. Go to Settings > Mobile Data where you can make the big decisions one app at a time.

Improve your battery life. 
Spotlight, Apple's connected quick-access for key data and services, is great for offering instant access to the latest breaking news, sports scores and social updates. But that much stuff going on in the background can eat your battery life whole. Unless you turn off Spotlight features for certain apps to eke out more life per charge, that is. "How?" we hear you cry? Just go Settings > General > Spotlight Search and limit what's pulling in data behind your back.

Improve your signal by knowing where to look for it. 
No need to hang out of a first floor window trying to discover where your iPhone's connection is best. Type *3001#12345#* into your iPhone's dialler and hit call to launch the hidden Field Mode tool. This sub-surface menu turns your bar chart-based signal indicator into a far more straightforward numerical-based signal signifier. Got a score of -50? Then you'll be enjoying HD video streams on the move. Down around -120, though, and you'll struggle to send a text. Just follow the numbers to better signals.


Find out exactly how long you've been waiting for a reply. 
We've all been there: endlessly rechecking our phones for a text reply, wondering how long it's been since we sent our message of love/ ransom demand. There's an easy way to find out, though - simply swipe in from the right-hand side of the screen when in a messaging thread, to show precise delivery times for every message sent and received. True: it's not as morale-beating as WhatsApp's blue ticks, but it will still give you a complex over why it's taking over 42 minutes for your other half to reply. Do affairs really take that long?

Share your family tree with Siri. 
Does referring to your parents by their given name make you feel awkward? Then teach Siri to know who you're chatting about. Ask Siri to call your dad and the digital PA should ask who your father is. Once a contact has been assigned to the parental moniker, every time you ask for pops moving forward, you'll be backed up by simple, fuss-free calling.

Swipe right to retreat. 
For iPhone-owning Android converts, living without a dedicated back button can be a difficult adjustment to make. While the iPhone might not have an ever-present command to put things in reverse, there is a simple way to head in the wrong direction. Within a number of apps — from Safari to Mail, via Messages — swiping from left to right on the screen will send you back to the previous page or menu. Who needs a dedicated button when you've got a more elegant solution?
Share:

Wednesday, August 17, 2016

The Best Tech Tools, Apps & Gear

Physical Gear
Although this is a list of my digital toolbox, we start with some physical items. We do live in the real world after all! Here is a list of computers, smartphones, gadgets, coffee and other stuff.


Desktop Apps

Although as a Windows user, most of the following are available for Mac users too.

Productivity Apps

  • Brain.fm (usually into listening to music while we work as we find it too distracting, but brain.fm really works for me. You can choose different soundtracks for relaxed and focussed work)
  • SimplyNoise – If we working in a noisy coffee shop, then white or brown noise is great at blocking out all the noise and not as distracting as music.
  • RescueTime – tracks your productivity on your computer, browser and smartphone. Gives you a weekly report.


Mobile Apps

As Android user, but most of these apps are available for iOS or at least there are alternatives. Do let me know if you have found an alternative for iOS in the comments.


Social Media Management Tools

Social Media Management Tools try and help you with all aspects of managing social media accounts – not just publishing/scheduling, but help with engagement, reporting and analytics. we included TweetDeck in this list mainly because it allows to manage multiple Twitter accounts. use TweetChat occasionally to help with Twitter Chats.
Alternatives: SproutSocial & Jollor


Publishing & Scheduling

Although social media management tools should have a very robust publishing platform, we prefer to use separate apps in system for publishing and scheduling.


Follower Management & Community

Growing your audience and followers takes time and effort. we don’t believe in buying followers! we use the following tools to help me segment my followers or find new targeted people who are likely to engage with me.


Reporting & Analytics

How do you optimise your content or give some feedback or reports on how successfully you’ve been with your social media and content marketing? use these tools to help with that!


Alerts & Monitoring

Sometimes you want to be alerted when someone links to you or mentions you or there is a potential issue you need to deal with. Perhaps it is a new opportunity. use the following tools to help with this.


Marketing Software

Attracting new leads, helping with managing list and sending newsletters out, creating surveys, free videos and lead generation tools are all important in my marketing process.  use the following tools as part of this:


Automation

These are magic tools that automate a lot of potentially repetitive tasks. we don’t believe in automating engagement, but these tools can do some amazing things to turbo boost your productivity


Project Management

To help manage projects for our clients or with the booking process or with a mastermind group use the following tools.


Research, Content Marketing & Amplification

The world of social media, marketing and technology is very fast moving and it’s very difficult to keep up. Using tools to help to find and contain the latest articles is so useful. Also use tools to help with my blogging process, taking notes, doing research and to help with amplification of my blog posts.


SEO & Web Analytics

Google Analytics is an amazingly powerful tool. However there are other tools that can help you get the most out of understanding your analytics as well as with SEO. These are the tools.


Images & Design

Images and design have always been important, but with visual networks such as Pinterest and Instagram becoming ever more popular, good design is vital.


Security

Using strong passwords as well as managing them effectively and storing them securely is vital. we also use a Virtual Private Network service if we ever find having to use a public WiFi hotspot- so that my connection and data is secure.


Browser Extensions

Where would we be without browser extensions. The following are for Google Chrome, but most are also available for Firefox.
  • Awesome Screenshot – The best screenshot extension found. You can take a screenshot of the visible browser screen or the entire page. You can also take a shot of a selectable area and take a delayed screenshot. Once taken, you can add text, arrows and other callouts.
  • Grammarly – state of the art spelling and grammar checker.
  • Video Speed Controller (although you can speed up YouTube videos, you can’t normally speed up videos on Wistia, Vimeo and other videos. This extension allows you to speed up any HTML5 video so that you can get through more content)
  • Measureit – measure the dimension of certain elements on webpages.
  • ColorPick Eyedropper – get the hexcode of colours on the screen.
  • What Font – like a font on a web page? This extension shows you which font was used on elements on a web page.
  • uBlock Origin – great believer in supporting content providers. Unfortunately ads can get out of hand, and  seen some malicious ads try and infect my machine. uBlock Origin is an Ad Block on steroids and can speed up your browsing significantly.
  • The Great Suspender – I love the Chrome browser, but it can get very slow, especially if you have a lot of tabs open. This extension suspens tabs after a period of time. You can reload tabs easily and even add certain websites to a whitelist so they never get suspended.
  • Klout – Adds Klout scores to Twitter usernames.
  • gorgias – smart email templates for GMail. GMail does have canned responses, but gorgias allows you to organise into a library. It can paste in first names and other smart data and you can use keyboard shortcuts.
  • Web App Extensions: Buzzsumo, MightyTextBufferEdgar & LastPass


Podcasting & Video

love video and love podcasts. Whenever  creating video, in a group chat or being a guest on a podcast,  use some of the following websites.


Web Hosting

Small web agency, Select Performers, where we manage and host customers websites.

Security & Speed


WordPress Development & Management



WordPress plugins

Here are some of the main plugins use on  site as well as many of customer’s websites.


WordPress Themes

used and would recommend the following themes:


Backup & Cloud Storage

How often do you back up your data?


Hacks & Scripts


Currently Investigating

always on the look out for new tools and gear. Here are ones currently testing. don’t recommend them, but they look cool!

Original Post :http://iag.me/socialmedia/my-digital-toolbox/
Share:

Search This Blog

auto

Translate

Total Pageviews

Categories

Blogging (200) Computer (11) Design (89) Education (86) health (9) HEALTHY LIFE (10) Home (54) Ideas (265) Internet (63) Internet Tips (201) life (38) Make Money online (1) Mobiles (108) New (134) other (34) Photos and Wallpapers (29) Project:LOVE NATURE (2) SEO (29) Software (108) Technology (23) Tips and Tricks (23) Tips and Tutorials (45) updates (127) What is new (32) What's New (49) What’s New Online (105)

Popular Posts

Recent Posts

Unordered List

Text Widget

Pages

Blogger Tutorials

Blogger Templates

Sample Text

Copyright © MOREBASICIT | Powered by Blogger
Design by SimpleWpThemes | Blogger Theme by NewBloggerThemes.com