Friday, May 16, 2014

How To Clear Your DNS Cache

What is DNS Cache?

The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates information from domain names with each of the assigned entities. Most prominently, it translates easily memorized domain names to the numerical IP addresses needed for locating computer services and devices worldwide. The Domain Name System is an essential component of the functionality of the Internet. This article presents a functional description of the Domain Name System. Broader usage and industry aspects are captured on the Domain name page.
- Wikipedia

Why should I clear DNS Cache?

Clearing your DNS Cache will force your PC to requery the DNS server for new IP addresses this will help in resolving large amount of "404- Page not found" errors and it will clear and update your existing polluted DNS.

How to clear your DNS cache?

The following methods allow you to remove old and inaccurate DNS information.

Windows® 8

  • Press Win+X to open the WinX Menu.
  • Right-click on Command Prompt and select Run as Administrator.
  • Type the following command and press Enter: ipconfig /flushdns
  • If the command was successful, you will see the following message:
Windows IP configuration successfully flushed the DNS Resolver Cache.

Windows® 7

  • Click the Start button.
  • Enter cmd in the Start menu search field.
  • Right-click on Command Prompt and select Run as Administrator.
  • Type the following command and press Enter: ipconfig /flushdns
  • If the command was successful, you will see the following message:
Windows IP configuration successfully flushed the DNS Resolver Cache.

 Windows XP, 2000, or Vista®


  • Click the Start button.
  • On the Start menu, click Run....
  • If you do not see the Run command in Vista, enter run in the Search bar.
  • Type the following command in the Run text box: ipconfig /flushdns

  • If the command was successful, you will see the following message:
Windows IP configuration successfully flushed the DNS Resolver Cache.

MacOS® 10.7 and 10.8


  • Click Applications.
  • Click Utilities.
  • Double-click the Terminal application.
  • Type the following command: sudo killall -HUP mDNSResponder


ALERT! Warning: To run this command, you will need to know the computer's Admin account password.

MacOS 10.5 and 10.6


  • Click Applications.
  • Click Utilities.
  • Double-click the Terminal application.
  • Type the following command: sudo dscacheutil -flushcache

Friday, April 11, 2014

Top 5 Best Blogger Templates of 2014

Blogger is a free, simple, and highly customizable blog host that's why majority of people choose blogger, But everything good or bad has cons, the number default blogger templates are very less than other hosts, also they are not so simple or attractive and often they does not meets any pro blogger's requirements. And finding a good built blogger template is quite a headache, So today I'm going to share our hand picked Top 10 Best Blogger Templates of 2014 to lessen your misery and you can use to make your blog look professional, attractive and stylish too.
_________________________________________________________________________________

1. Momento

Momento is 100% responsive, well built Fashion and multimedia style Magazine UI Template. With a big image slider, it comes up with another quality widgets like featured posts on the home page and etc. It has a dark color scheme with flexible enough features to be incorporated in any kind of website. Momento is a must have theme for those whose blogs fall in fashion and multimedia category, and on the top of that it is light and ultra-fast so less waiting for visitors.

Demo | Download


 _________________________________________________________________________________

2. FlatMag

Flat Mag Responsive Blogger Template is a multi-purpose Blogger template specially designed for multimedia, news bulletin, Entertainment and Technology blogs. With elegant green color and Based on FLAT UI styled scheme, Flat Mag gives you visitors the wow effect as they go though the responsive and flexible design. It has a lot of useful and key widgets, which comes in handy and are ready to use from the time this template is installed on your blog. It has flexible homepage, related posts, featured posts, multiple color scheme and other quality features. Moreover, it has a good SEO score.

Demo | Download
 _________________________________________________________________________________

3. Bpress

Another Premium theme from Themeforest, with almost identical features. BPress has amazing organized homepage layouts with multiple feature posts areas that provides enough flexibility to users to customize the home page according to their needs.
Demo | Download
 _________________________________________________________________________________

4. Apollo Blogger Template:

 Apollo Blogger Magazine blogger template is a full featured beautiful blogger template adapted from WordPress Blogging platform.It comes with elegant looks and with some wonderful features. It is SEO firendly, has auto readmore, threaded comment system and a good layout with Ads slots. This Blogger Template is Ideal for Niche sites i.e. Technology, Media, News Bulletin blogs etc.See a live preview of one of the best blogger template.
Demo | Download
 _________________________________________________________________________________

5. Squid

Demo | Download


Squid ia an another clean, simple and responsive template for your blog. Its a fully  Responsive and Highly User Friendly Blogger Template. It is Ads and banner ready, has Auto Image Crop With Thumbnail, CSS And HTML Base Menu With Drop down, modern widget ready, and a . It is best suited on  Magazine blogs and sites.Get this Premium Blogger template for free.Also checkout its key features below.

 _________________________________________________________________________________
 Let us know if you have any problems or questions. Share your thoughts below! 

Thursday, April 10, 2014

The Heartbleed Bug

It's been a serious fuss about this bug, and unfortunately, it seems like we may all have been facing one for two years and not even realized it! On 7th of April 2014 Security researchers announced this flaw in OpenSSL, a popular data encryption standard. Worried? well there is not much you can do but to upgrade the website's encryption standard to FixedSSL. We've put together the FAQ guide to the "Heartbleed bug" for those who want to understand what all the fuss is about and how they can protect themselves.

What is Heartbleed bug?

The Heartbleed Bug is a serious high risk vulnerability in the popular OpenSSL cryptographic software library, the open source encryption standard which is used by the majority of web servers to provide security to communication between client and server. This vunerability allows an attacker on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. It was announced that OpenSSL 1.0.2-beta, as well as all versions of OpenSSL in the 1.0.1 series except 1.0.1g had a severe memory handling bug in their implementation of the TLS Heartbeat Extension. This defect could be used to reveal up to 64 kilobytes of the application's memory with every heartbeat. Its CVE number is CVE-2014-0160.

What damage does the bug do?

The bug can be used to leak secret encryption key, critical information which may harm your privacy or securitysuch as Username, passwords, instant messages, emails and business critical documents and communication. In order to coordinate recovery from this bug the security researchers have classified the compromised secrets to four categories: 1) primary key material, 2) secondary key material and 3) protected content and 4) collateral.

Primary key material: These are the private master keys i.e. encryption keys itself. The leaked secret keys allows the attacker to decrypt any past and future traffic to the protected services and to impersonate the service at will. Any protection given by the encryption and the signatures in the X.509 certificates can be bypassed. To recover from this leak requires patching the vulnerability, revocation of the old compromised keys and reissuing and redistributing new keys. Even doing all this will still leave any traffic intercepted by the attacker in the past still vulnerable to decryption. All this has to be done by the owners of the services.

Secondary key material: These are the user credentials (user names and passwords) used in the vulnerable services.To recover from this leaks requires owners of the service first to restore trust to the service. After this users can start changing their passwords and possible encryption keys according to the instructions from the owners of the services that have been compromised. All session keys and session cookies should be invalided and considered compromised.

Protected content: This is the actual content stored and handled by the vulnerable services. It may be personal or financial details, private communication such as emails or instant messages, documents or anything important and worth protecting by encryption. Only owners of the services will be able to estimate the likelihood what has been leaked and they should notify their users accordingly. Most important thing is to restore trust to the primary and secondary key material as described above. Only this enables safe use of the compromised services in the future.

Collateral: Leaked collateral are other details that have been exposed to the attacker in the leaked memory content. These may contain technical details such as memory addresses and security measures such as canaries used to protect against overflow attacks. These have only contemporary value and will lose their value to the attacker when OpenSSL has been upgraded to a fixed version.

How does the Heartbleed bug works?

The bug is exercised by sending a malformed heartbeat request to the server in order to elicit the server's memory response. Due to a lack of bounds checking, OpenSSL never verified that the heartbeat request was valid, allowing attackers to bring about inappropriate server responses.

Am I affected by the bug?

You are likely to be affected either directly or indirectly. OpenSSL is the most popular open source cryptographic library and TLS (transport layer security) implementation used to encrypt traffic on the Internet. Your popular social site, your company's site, commerce site, hobby site, site you install software from or even sites run by your government might be using vulnerable OpenSSL. Many of online services use TLS to both to identify themselves to you and to protect your privacy and transactions. You might have networked appliances with logins secured by this buggy implementation of the TLS. Furthermore you might have client side software on your computer that could expose the data from your computer if you connect to compromised services.

How widespread is this?

Most notable software using OpenSSL are the open source web servers like Apache and nginx. The combined market share of just those two out of the active sites on the Internet was over 66% according to Netcraft's April 2014 Web Server Survey. Furthermore OpenSSL is used to protect for example email servers (SMTP, POP and IMAP protocols), chat servers (XMPP protocol), virtual private networks (SSL VPNs), network appliances and wide variety of client side software. Fortunately many large consumer sites are saved by their conservative choice of SSL/TLS termination equipment and software. Ironically smaller and more progressive services or those who have upgraded to latest and best encryption will be affected most. Furthermore OpenSSL is very popular in client software and somewhat popular in networked appliances which have most inertia in getting updates.

What versions of the OpenSSL are affected?

  • OpenSSL 1.0.1 through 1.0.1f (inclusive) are vulnerable
  • OpenSSL 1.0.1g is NOT vulnerable
  • OpenSSL 1.0.0 branch is NOT vulnerable
  • OpenSSL 0.9.8 branch is NOT vulnerable

Bug was introduced to OpenSSL in December 2011 and has been out in the wild since OpenSSL release 1.0.1 on 14th of March 2012. OpenSSL 1.0.1g released on 7th of April 2014 fixes the bug.

I am a server administrator how can I fix this bug?

To resolve the bug, server administrators are advised to either use 1.0.1g or to recompile OpenSSL with
 -DOPENSSL_NO_HEARTBEATS , thus disabling the vulnerable feature until the server software can be updated.

I am a casual Internet Surfer how can I stay safe?

The first thing to do is to change your passwords of the  compromised services you use if they ask you to do that, and secondly you can use the websites below to check any site for Heartbleed Vunerability.

How can I check any website for the vulnerability?

Several websites were launched to test whether the Heartbleed bug was present on a given website, including:

The fix


The bug is classed as a buffer over-read. A buffer over-read bug is a situation where software allows more data to be read than should be allowed.

Version 1.0.1g of openSSL adds some bounds checks to prevent the buffer over-read. For example, the test

 if (1 + 2 + 16 > s->s3->rrec.length) return 0; /* silently discard */


has been added in front of the line

hbtype = *p++;

For a complete list of the changes, see git.openssl.org 
_________________________________________________________________________________

For more information about this bug go to: http://heartbleed.com/
All source of information is taken from heartbleed.com and if you find any wrong or we missed anything in the post please let us know.



Thursday, April 03, 2014

eScan Antivirus for Android


eScan for Android protects your device from virus, Trojan and Malware threats, and also includes password protection and parental controls. It features real-time scanning, parental controls, web protection, app control, scheduled scanning, call and SMS filters and backup and restore for SMS and contacts. It can block phishing and malicious websites via real-time scanning on the default browser. It also features password protection for each application. It can filter SMS and calls and even lets you choose to blacklist or block calls and SMS from unknown numbers. The tablet version is a little limited on the features
front as it doesn't have options for contacts backup and restore and call blocking and blacklisting. eScan is
not available on the Google Play Store. You will have to download the APK file from the developer's website.- www.escanav.com/mwscnew/index.asp

Wednesday, April 02, 2014

UltraISO Premium Edition 9.6.1.3016 + Portable

UltraISO Premium is a highly portable and especially proficient with boot discs, UltraISO Premium creates, edits, and burns disc images in several popular formats: ISO, BIN, Nero, Alcohol, CloneCD, and Xbox. It can directly extract files and folder from ISO image file, add / delete /create new directory /rename ISO file image content, can make ISO file from hard disk document, May directly set the file/folder to hidden attribute, supports ISO 9660 Level1/2/3 and Joliet extension, automatically optimizes the ISO image file structure, thus saves the CD space, supports the shell document type integration, Open Image files through double clicking them or the Right Click menu of the mouse with the open dialog, converts images among formats. UltraISO supports data and audio/video discs and includes a simple MP3 encoder, but it really excels at creating bootable discs. It even can create a disc with a menu for booting several OSs.There are
rich add-on tools, you can create ALL in 1 bootable compact discs, CD/DVD image file management, even the virtual CD/DVD drive , those functions are really powerful. The double window user interface is extremely convenient to use, the user has the choice to only use the quick buttons and/or the mouse Drag & Drops, the user can handle any CD/DVD image file easily.UltraISO is in sole possession of the intellectualized ISO document format analyzer, it can process at the present time almost all types of image files, including  ISO and BIN, it may even support new image files which are yet to be created. UltraISO can open these image files, directly extract files and folders, edit it and convert other image files to the standard ISO format.

The Overall User interface is well organized but plain, the icons are used in the interface isn't so good we wish ts icons were more readable. Also on the negative side, the program can't mount CD images, which will diminish its value for some. However, if you need support for multiple image formats and want to design bootable discs, UltraISO makes a very good pick.

System Requirements

  • Windows 8/7/2008/Vista/2003/XP (32bit and 64bit), Windows 2000, ME, 98SE, 98, or Windows NT4.0 SP6a+ operating system .
  • Intel Pentium 166MHz or above.
  • 64MB RAM memory.
  • At least 10MB free hard disk space for installation.
  • CD-ROM, CD-R/RW, DVD-ROM, the DVD-R/RW driver (According to the needs of the user but CD/DVD RAM drive is the best option as to enjoy the full functionality of the software).
Home Page - http://www.ezbsystems.com/ultraiso/

Downloads(UltraISO Premium Edition 9.6.1.3016 + Portable)

1.Trial version
2.Original Genuine version
3. Cracked Version (If you like this software please download the software developers need your support)

 Techblog24x7's rating: 4/5

Please feel free to comment and give your opinions about the software :)

Tuesday, November 26, 2013

Mac OSX Transformation Pack for Windows

Want your pc to look like MAC OSX? We got the solution! Just download the file and see the magic.Its for those who likes to try out new GUI's and also for those who likes to have an apple interface for their PC's.You can trick your girlfriend by just installing this and you could tell her you bought an apple machine and you can even run windows apps. Go Enjoy.....

1. Simply Download the Mac OS X 10.8 Mountain Lion Skin pack and run the .exe file. Then you need to make sure to check Custom Installation and if you don't want setting Babylon as your default search provider and homepage then uncheck that option.

2. Next You need to select 3rd party Apps to support the installation of  the Mac skin pack.

3. After your skin is installed, just Restart your system to changes take effect. Once you do, the UI of your Windows7 will look like the below screenshot. The skin pack includes XWidgets, XLaunchpad, Rocket Dock etc.

Mac OS X 10.8 Mountain Lion Apple theme Windows 7 transformation Pack also contains Aero Glass Themes as well, you can access those themes in Personalization menu in Windows7 desktop.

Mac OS X 10.8 Mountain Lion Theme for Windows 7 Download:

Download For 64 Bit

Download For 32 Bit

below is the preview.....Hope you like it...

http://2.bp.blogspot.com/-n69VvOp2_8E/UQaTBDumDII/AAAAAAAAAQw/kbMSlL-TdH4/s1600/Apple+Mac+OS+X+10.8+Mountain+Lion+Transformation+Pack+For+Windows+8,+7,+Vista+or+Xp..jpg
WARNING!

please if you don't like it just uninstall using the uninstaller provided with it.Don't try anything stupid or try to modify anything! the author or our team will not be responsible!

Sunday, November 17, 2013

How to Bypass Pattern Lock for Android

Many of us are worried about data security in our Android smartphone, so nowadays we use the pattern lock to lock our phone without any headache for password, but some of us also forget the pattern and you know the rest! So here I am guiding you to bypass the Pattern lock! So here it goes :-

Caution: Following these steps will recover your android phone but it will delete your datas and contact and reset it so it's up on you to follow these steps or not...
  • Switch off the phone, if it not works just remove the battery and then insert it again.
  • Now you have to press and hold 3 buttons simultaneously.
Volume (+), Volume (-), and Power Button simultaneously, and keep pressing these key until you see any menu on the screen.

  • Now navigate with Volume(+) and Volume(-) and search for "Recovery mode" and select it.
  • After that you see the logo on the screen then press the Home Button.. Or If screen blank then don't worry Just Press the Home Button... (This varies from phone to phone)
  • Then you will get another menu search for Wipe Data/Factory Reset, and select it.
  • Then you will be asked to confirm (I assume you know how to confirm your Action...)
  • Holla! You have played your part well and now wait for the phone to play it's part.
  • Reboot your Phone and Pattern lock is gone!
  • Now this step is optional, restore your phone from a backup if you have one! (I suggest you to backup your phone once a week!)
Note: This Steps are not expected to work on all phones! This post is just to give you a basic idea only the
rest is totally up to you... If this guide has missed something feel free to comment...

Friday, November 15, 2013

LongHorn Explorer theme for Windows


LongHorn is a cool windows theme works in win 8/7/Vista/xp. It has a really cool UI That you will like over the conventional windows themes. So why wait Just click on the download link to download it!
All credits goes to SuXces for creating this theme.
How To Use
  • Unpack all files to a folder with the name "LongHornExplorer"(Tip:Create the folder in your Windows directory)
  • Make a shortcut of LonghornExplorer.exe to any destination you may like

Download this Theme


Saturday, November 02, 2013

Smart Watches incoming, thick and FAST!!!

Qualcomm Toq-Qualcomm is a chipset maker and the fact that it is dipping its fingers into a niche hardware market is something interesting and an indicator of how lucrative the business might be. The Toq offers a set of interesting features as a smartwatch. To start with, it shows off wireless charging capabilities, so when you remove it at the end of the day, all you need to do is place it in its holster and the device is ready to charge. It also comes with optional wireless Bluetooth headsets so you can listen to music on the go and control the song selection and volume from the comfort of your wrist. Qualcomm also claims that the display on the Toq is the so ccalled "Qualcomm Mirasol reflective dispay". That name isn't just marketing mumbo-jumbo thoughts; it's an interferometric modulator display that leverages the light around it so users can see the screen anywhere, even in bright sunlight.


Pebble-What good is a smartwatch if its app eco-system doesn't help users exploit it, right? Well, the pebble smartwatch does have a set of interesting apps at its disposal. You can see important notifications from your smartphone on your wrist, control your mussic set the alarm and most importantly (to some) track your fitness. The device is compatible with the Runkeeper app that helps you track and stay on top of your fitness regime. To match your attire, the device is available in a bunch of colours from the traditional black and white to the more funky orange, cherry red, and grey. The Pebble smartwatch works not only with iOS and Android but also shows off some weather-proof capabilities such as 5ATM water resistance, the ability to withstand a reletive humidity of 5% to 95% noncondensing and can be taken to an altitude of 10,000 feet. The watch runs on the Pebble OS and has an 800MHz CPU. Pebble also claims that the smartwatch has the ability to last for 5 to 7 days depending on use.


Sony Smartwatch 2-Readily compatible with any device runningon Android 4.0 ICS, the Sony smartwatch has the ability to give you acess to a lot of apps from the comfort of your wrist. Apart from the standard calling(answer,reject,mute,volume hamdling) and SMS, users also have access to apps such as email, Facebook, Twitter, music remote extension/music handling, calendar and slideshow. There are a large number of compatible apps available in the Google Play Store for the Sony Smartwatch 2. The smartwatch also has NFC connectivity straight out of the box. If you have an NFC capable smartphone, all you need to do is tap the rear of the two devices and you are ready to use the watch. Just like the latest Xperia lineup of smartphones, the Sony smartwatch is IP57 water and dust resistant which means htat whether you're a sportsman or enjoy wearing your watch in the shower, you don't have to worry damaging it.


I'm Watch-Probably one of the most expensive smartwatches out there, the I'm Watch is made from high quality materials and has matching style, comfort and design for the fashionable tech user. The smartwatch also boasts of an apps library that has hundreds of apps, which the users can download. The smartwatch can take care of regular activities such as calls, messages, email, appointments and more. You can use swipes and gestires to control activities on the smartwatch. For example, you can shake your wrist to reject a call. The smartwatch also uses smart tethering, activating it only when needed. The device can use hotspots as well as Wi-Fi to connect to the internet. The device also has a proximity sensor, altering you when you step away from your smartphone. It also has socila network integration bring Facebook, twitter and Instagram to your wrist. Another cool feature of the smartwatch is cloud integration. With the "I'm Cloud" system; users can control the device remotely. Users can manage their smartwatch apps and data vis the Internet. With the "I'm Cloud" Mobile app, you don't even need to go through your PC or Mac. You just need your smartphone to manage the apps on the watch.


FiLIP-If you thought that a smartwatch was only for grownups we'd say say think again. Fi LIP is a smartwatch for kids and no, its not an expensive toy, but a gadget with utility for worrying parents. Using the FiLIP app, users can pre-program 5 phone numbers that the child can call. The child can scroll through the 5 numbers and call the one they want with the touch of a button. Using the app, parents can track the exact location of their children. If you have more than one child, you can create one profile per child to track and see where they are. The smartwatch also works with a safe zone. You can set up a safe zone, say, the school, and the minute the child reaches the school, you receive a notification on the phone. You can set up a radius and if your child leaves that space, you will receive a notification. There is also an intelligent emergency button on the smartwatch which is red in colour. Press this botton for three seconds and the watch sends a message to the primary account holder with the location of the child. It also automatically starts recording the ambient sound and calls the designated number that you set up previously. Pretty cool, eh?


Kreyos-Another interesting smartwatch to watch out for is the Kreyos smartwatch. It is available in a bunch of colour such as white, black, green, blue and purple. The unique thing about this waych is that it works with voice commands as well as gesture controls. The device recognizes four wrist motions to perform actions such as changing music tracks, answering calls, checking an alert and more. You can program a particular wrist motion. To use voice control, users need to pair the watch with with the smartphone via bluetooth. The device is compatible with iOS, Android and Windows Phone. The Kreyos smartwatch has the ability to count steps, stairs climbed and distance covered by the user along with the ability to constantly record critical data regsrding the user's body. The smartwatch also syncs with apps to track, analyse and enhance sports performance. You can also use the smartwatch in sports mode to record data while you are running and biking. The smartwatch also boasts of being waterproff.
                                                                                                                                  -ARiTROD
                                                                  

Sunday, October 27, 2013

Google improves maps with game!

Ingress
Google has announced an unusual new product—a mobile game called Ingress. Players must select a team
(there's no good or bad teams, just two different teams) and compete to gain and retain control of real-world sites by using your Android phone's GPS, camera and various sensors to record your physical presence there. The game emphasises walking as a way to generate "energy" needed to secure your strongholds. An augmented reality display shows you how well your team is doing. The upshot is that Google gets access to massive amounts of data about walking routes, including GPS coordinates, timestamps, and photos. The information will no doubt be used to improve Google Maps and provide better walking directions, including shortcuts and paths closed to vehicular traffic. Players concerned about privacy should understand that they are allowing Google to track their every move.

 
biz.