Wednesday, 28 December 2016

How to Turn Off Your PC Using Your Smartphone

Do you want to turn off your PC at your home and save some electricity. Or may be try to shutdown your PC from outside just because it looks cool. We got you covered.

If you ever walked away from your computer and remembered that you forgot to turn it off, you can actually do it from your smart phone!

To begin with, you need to download Unified Remote app on your smartphone (iOSAndroid), and you then need to download it’s server to your computer from this website right here.

You can go through the installation process on your PC  and it is easy, straightforward and there is no spyware or any nonsense which comes with it. Once you are finished, make sure the server app is running on your computer, and then open the app on your mobile. It will scan for a server on your local network. Once it finds the server it will let you control your computer.

Now, the way the app works is with a bunch of different remotes. There are remotes that’ll let you control your PC as if it was a mouse and keyboard, but turning off the PC with that would be difficult if you aren’t in the room. The remote we want is called Power. Click that, and then click Shutdown or Restart to turn your PC off.

How to Remove a Virus from Android Without a Factory Reset

Desktops aren’t the only gadgets that can be affected by a virus. Android devices have a malware problem and it’s growing every day.

If you do get a virus, you could perform a factory reset to get rid of it, but that means you’d lose all your data — those photos you shot, the saved games, the text messages, and everything else. Obviously, you want a factory reset to be your last option.

So what can you do to remove a virus from Android without a factory reset?

Is It Really a Virus?

If your phone isn’t functioning the way it should be, there’s a chance you have some malware on it. One wrong tap somewhere and a malicious file might have been downloaded on your phone, which is leeching battery life, Internet resources, or your personal data.

But it could be something else.

Suppose your Android refuses to boot or crashes every time it starts up. Or maybe you can’t seem to download apps from the Play Store. These are not necessarily caused by a virus. So don’t panic! First, check our list of 20 common Android problems and how to fix them.

In fact, there are some tell-tale signs that your Android has a virus. Ask yourself a few questions:

Did the problem start happening after you downloaded some app or file?Have you recently installed an app from a third-party sourceand not the Play Store?Did you click on some ad that downloaded a file or app you didn’t want?Does the problem occur only when you run a particular app?

If the answer to any of the above is yes, then there’s a chance you have malware on your system. And importantly, you might be able to fix it without a factory reset!

Install and Run an Antivirus Scan

The first step is to run an antivirus and see if that catches the malware. Android actually has a wide array of antivirus apps now, both free and paid. We’ve tried to answer what is the best Android antivirus app, but honestly, there’s no one app that is head and shoulders above the rest.

In terms of detection and ease of use, if you want a free app, then Avira is a good bet. It will scan all your files and apps, and recommend removing malicious ones. For a more thorough scan, you’ll need a paid app like Kaspersky Internet Security, which has a 30-day trial period and otherwise costs $14.95 per year.

Download: Avira Antivirus Security for Android (Free)

Download: Kaspersky Internet Security for Android (30-day Trial | $14.95 per year)

For other options, check out antivirus tester AVTest’s recommendations for the best Android security apps, ranked based on their detection levels as well as ease of use.

Hopefully, the antivirus scan should find and remove the malware on your phone or tablet. But if that doesn’t get the job done, then it’s on to a manual step.

Manually Delete in Safe Mode

Much like Windows has a “Safe Mode”, so does Android. And if your system has been affected by a virus, you’ll need to rely on it.

Related  7 Crazy Things You Will Find On the Dark Web

Why? Well, Safe Mode turns off access to all third-party downloaded apps and prevents them from running.

To boot into Safe Mode on most Androids:

Press and hold the Power button till you get the “Power Off / Reboot” screen.Tap and hold “Power Off” till you get a prompt to “Reboot to Safe Mode”.Tap “OK”.Wait for the phone or tablet to reboot. In one of the corners, you will see a watermark of “Safe Mode”.

This method might not always work since Android manufacturers customize their ROMs. If it doesn’t work, head to the XDA Developers Forum or your phone manufacturer’s official forum, where a search or a question will likely show you how to boot into safe mode on your device.

Once you have entered Safe Mode, go to Settings > Apps > Downloaded. Go through the list of downloaded apps to try and locate the malicious app on your Android device. It won’t always be easy to find, but think back to when the problem on your phone started and check if an app you didn’t download is in this list.

Tap the app, and on the next screen tap “Uninstall” to remove it. If that gets rid of it, reboot your phone normally (without entering Safe Mode), and the virus should be taken care of.

If the app can’t be removed, it likely has Device Administrator Access. To remove that access…

Go to Settings > Security > Device Administrators.Locate the app and tap the checkmark next to it.Tap “Deactivate” when prompted.

Related  DCMA Exemptions Lift Restrictions on White hat Hackers

Now you can go back to Settings > Apps > Downloaded and uninstall the app as instructed above.

How To Be Sure

Apart from uninstalling the app, just to be on the safe side, you might also want to clean up your Android device while you’re at it. Clearing the cache and history, cleaning up the startup processes, and other basic steps can assist in making sure your device is good to go.

Joel has previously checked out a few Android apps that really clean and aren’t placebos, for doing everything from clearing up unused and unwanted files to removing duplicates.

Once your system is cleaned up, make sure you backup your Android so that in the future, you can perform a factory reset without worrying about data loss.

If Nothing Else Works, Reset

Unfortunately, if none of the above solutions help in clearing up the malware on your device, you don’t have any other option but to reset your Android to factory settings. Yes, that means you will lose precious data, but that’s better than using a compromised phone or tablet.

Have you had success in getting rid of malware from your Android device without needing to perform a factory reset? What virus or malware have you faced?

Linux Commands Cheat Sheet

Kali Linux commands cheat sheet. All basic commands from A to Z in Kali Linux has been listed below.

Any command is wrong kindly comment below. 

Download Cheat Sheet: Kali Linux Commands

Download Cheat Sheet: Kali Linux Commands

7 algorithms and data structures every programmer must know

In programmers life algorithms and data structures is most important subject if they want to go out in the programming world and make some bucks. Today, We will see what they do and where they are used with simplest examples. This list is prepared keeping in mind their use in competitive programming and current development practices.

1. Sort Algorithms

Sorting is the most heavily studied concept in Computer Science. Idea is to arrange the items of a list in a specific order. Though every major programming language has built-in sorting libraries, it comes in handy if you know how they work. Depending upon requirement you may want to use any of these.

Merge Sort

Quick Sort

Bucket Sort

Heap Sort

Counting Sort

More importantly one should know when and where to use them. Some examples where you can find direct application of sorting techniques include:

Sorting by price, popularity etc in e-commerce websites

2. Search Algorithms

Binary Search (in linear data structures)

Binary search is used to perform a very efficient search on sorted dataset. The time complexity is O(log2N). Idea is to repeatedly divide in half the portion of the list that could contain the item, until we narrow it down to one possible item. Some applications are:

When you search for a name of song in a sorted list of songs, it performs binary search and string-matching to quickly return the results.Used to debug in git through git bisect

Depth/Breadth First Search (in Graph data structures)

DFS and BFS are tree/graph traversing and searching data structures. We wouldn’t go deep into how DFS/BFS work but will see how they are different through following animation.

Applications:

Used by search engines for web-crawling

Used in artificial intelligence to build bots, for instance a chess bot

Finding shortest path between two cities in a map and many other such applications

3. Hashing

Hash lookup is currently the most widely used technique to find appropriate data by key or ID. We access data by its index. Previously we relied on Sorting+Binary Search to look for index whereas now we use hashing.

The data structure is referred as Hash-Map or Hash-Table or Dictionary that maps keys to values, efficiently. We can perform value lookups using keys. Idea is to use an appropriate hash function which does the key -> value mapping. Choosing a good hash function depends upon the scenario.

Applications:

In routers, to store IP address -> Path pair for routing mechanisms

To perform the check if a value already exists in a list. Linear search would be expensive. We can also use Set data structure for this operation.


4. Dynamic Programming

Dynamic programming (DP) is a method for solving a complex problem by breaking it down into simpler subproblems. We solve the subproblems, remember their results and using them we make our way to solve the complex problem, quickly.

*writes down “1+1+1+1+1+1+1+1 =” on a sheet of paper* What’s that equal to?

*counting* Eight!
*writes down another “1+” on the left* What about that?
*quickly* Nine!
How’d you know it was nine so fast?
You just added one more
So you didn’t need to recount because you remembered there were eight! Dynamic Programming is just a fancy way to say ‘remembering stuff to save time later’

Applications:

  • There are many DP algorithms and applicationsbut I’d name one and blow you away, Duckworth-Lewis method in cricket.

5. Exponentiation by squaring

Say you want to calculate 232. Normally we’d iterate 32 times and find the result. What if I told you it can be done in 5 iterations?

Exponentiation by squaring or Binary exponentiation is a general method for fast computation of large positive integer powers of a number in O(log2N). Not only this, the method is also used for computation of powers of polynomials and square matrices.

Application:

  • Calculation of large powers of a number is mostly required in RSA encryption. RSA also uses modular arithmetic along with binary exponentiation.

6. String Matching and Parsing

Pattern matching/searching is one of the most important problem in Computer Science. There have been a lot of research on the topic but we’ll enlist only two basic necessities for any programmer.

KMP Algorithm (String Matching)

Knuth-Morris-Pratt algorithm is used in cases where we have to match a short pattern in a long string. For instance, when we Ctrl+F a keyword in a document, we perform pattern matching in the whole document.

Regular Expression (String Parsing)

Many a times we have to validate a string by parsing over a predefined restriction. It is heavily used in web development for URL parsing and matching.

7. Primality Testing Algorithms

There are deterministic and probabilistic ways of determining whether a given number is prime or not. We’ll see both deterministic and probabilistic (nondeterministic) ways.

Sieve of Eratosthenes (deterministic)

If we have certain limit on the range of numbers, say determine all primes within range 100 to 1000 then Sieve is a way to go. The length of range is a crucial factor, because we have to allocate certain amount of memory according to range.

For any number n, incrementally testing upto sqrt(n) (deterministic)

In case you want to check for few numbers which are sparsely spread over a long range (say 1 to 1012), Sieve won’t be able to allocate enough memory. You can check for each number n by traversing only upto sqrt(n) and perform a divisibility check on n.

Fermat primality test and Miller–Rabin primality test (both are nondeterministic)

Both of these are compositeness tests. If a number is proved to be composite, then it sure isn’t a prime number. Miller-Rabin is a more sophisticated one than Fermat’s. Infact, Miller-Rabin also has a deterministic variant, but then its a game of trade between time complexity and accuracy of the algorithm.

Application:

  • The single most important use of prime numbers is in Cryptography. More precisely, they are used in encryption and decryption in RSA algorithm which was the very first implementation of Public Key Cryptosystems
  • Another use is in Hash functions used in Hash Tables

We’ll discuss some advanced algorithms every competitive programmer should know in the next post. Meanwhile master the above algorithms or share in the comments about what you think every beginner-intermediate programmer should know.

Top 5 Bootable USB Tools For Windows Operating System

In this article, I have created a list of the top 5 bootable USB tools for Windows operating system. You can create ISO files for different Windows operating systems, Linux distros, and also make Linux Live USB drives. All these bootable USB tools have their advantages and disadvantages.

One of the most common methods of installing an operating system on a computer is to create a bootable media. We can also install an OS using the inbuilt features, for instance, the Reset option present in Microsoft Windows 8 and later. For that, an already running operating system on your machine is a pre-requisite. On the other hand, that’s not the case with the bootable media, you can use it even if your computer doesn’t have any operating system installed at all.

Primarily, we create a bootable media using a CD/DVD or a USB drive. However, the former one has become obsolete because it is technologically backward than the USB drive-based bootable media. Now, there are many tools available to create these bootable USB drives using the ISO image file of the desired operating system.

Top 5 bootable USB tools for Windows operating system:

Rufus

Rufus is a tiny bootable media creator. Yet, it is multilingual and packs many features which can make your bootable USB flash drive creation process more effective. You can create your bootable USB media for both MBR and GPT partition schemes. Rufus facilitates options to install your desired operating system on a UEFI firmware enabled machine. You can install Windows XP in UEFI mode due to OS limitations.

It doesn’t matter what ISO you’re using. It can be Windows 7, 8, 10, any Linux distro, or ISO file of any other operating system. You can choose whether to use the FAT32, NTFS, exFAT, or UDF file systems for the bootable USB media. One thing that helps Rufus stand out in the crowd is that it takes less time to create the bootable USB drive.

WinSetupFromUSB

You might have thought, we forgot to add spaces in the title of WinSetupFromUSB but it is written like this because its makers chose to do so. The biggest advantage of using WinSetupFromUSB is that you can put multiple ISO files on one flash driveand create a multiboot USB. This will allow you to have a choice of more than one operating system at the time of installation. Just like Rufus, it has many features and allows you to create a bootable USB media for different types of operating system.

UNetbootin

This simple to use tool, not equipped with many options, can create a bootable USB drive easily. The main reason for its existence is that it can be used to create Live USB drives for Linux distros. It offers inbuilt support for many of the popular Linux distros and other open source operating systems like FreeBSD. After connecting your USB drive, you need to select your desired (supported) distribution or antivirus rescue disk and UNetbootin will automatically download the ISO file from the internet and make the Live USB for you. In the case of bootable USB or an unsupported Linux distro, you’ll have to supply the ISO file.

Universal USB Installer

It is a good tool for creating bootable USB drive. Just like UNetBootin, it is used to make Live USB for Linux distros. It supports a few extra ISOs but it doesn’t offer an automatic download option. Instead, it gives you the link to the download page of the distro. But we don’t think that would cause much trouble.

Windows 7 USB/DVD Download Tool

This bootable USB drive creation tool is made by Microsoft. Although it is known as Windows 7 USB/DVD Download Tool, it works for other versions of Windows also. As far as its usability is concerned, it should be at the top position. If you have the USB drive and the ISO file, you only need to make a few clicks and you’re done.

Also, it is a Microsoft product so it only supports ISO files of Microsoft products like Windows, Visual Studio, etc. Microsoft has stopped its development because with the launch of Windows 8 their new Media Creation Tool was also released.

Pros, Cons, and Conclusion

All these bootable USB tools have their own pros and cons. One may have less or almost nil features, like Windows 7 USB/DVD Download Tool. Another may have a plethora of options. More features are advantageous but they would make the bootable USB tool more complex for novice users. The type of USB flash drives you’re using to create the bootable USB also has some contribution. For instance, the bootable USB tool would take less time to create bootable media on a USB 3.0 pen drive in comparison to USB 2.0 pen drive. So, we would recommend you to try these bootable USB tools and decide which one is the best for you.

If you have something to add, tell us in the comments below.

Sunday, 25 December 2016

Rooting

Rooting is the process of getting the superuser (root) permissions on an Android device (which is also a type of Linux system). This allows you to install unauthorized applications and ROMs, delete bloatware and other kinds of stuff. However, in many countries, rooting might result in voiding your warranty.

If you are a long time Android user, you might have come across various applications asking for root access to function. The internet is full of articles on rooting and the whole process is different for different smartphones. There are tons of guides on online forums and there is no single guide that works for all smartphones. Well, in this article, I’ll try to tell you the meaning of rooting and some related aspects.

What is rooting?

Here, we love Linux and open source software. So, I expect that you might be using a Linux distribution for everyday computing. In that case, you might be aware of running a command with sudo. It allows you to run programs with root permissions. If you’re using a Windows PC, it’s similar to running programs as administrator privileges. It’s often compared to jailbreaking an iOS device, a process that’s entirely different.

The Android operating system is based on Linux and it uses the same permissions and file-system ownership. When you buy a new Android device, you have the option to install new applications, uninstall them, and do various kinds of stuff. However, there could be lots of preloaded stuff, also called bloatware, that you might wish to uninstall.

On a rooted Android smartphone, a user (superuser) has root permissions to do anything with the applications and move any system file. In short, with root permissions, you have the power to control how things work on your phone. With rooting, you can run a firewall, install custom ROMs, or enable tethering if your carrier is blocking it.

The rooting process simply adds a standard Linux function that was removed by your OEM. This tiny file, su, is put in the system with permissions so that you can run it. There are different tools that automate the process of flashing a .zip file containing the su binary from the recovery mode screen.

Warning: Please note that an incomplete or some wrong rooting step can brick your phone. So, take up this task at your own risk.

Is rooting an Android phone illegal?

Rooting a device involves removing the restrictions placed by the cellular carrier or device OEMs. Many Android phone makers legally allow you to root your phone, e.g., Google Nexus. Other manufacturers, like Apple, don’t allow jailbreaking. Other manufacturers, including LG, HTC, and Motorola, officially allow unlocking the bootloader which allows one to root the phone without exploiting a vulnerability.

In some countries, the practice of jailbreaking and rooting is illegal. Manufacturers don’t like when a user roots the device as they lose control over the ecosystem and delete the bloatware installed by them. These companies often void the warranty of such devices.

The legality of this issue entirely depends on your location. In the USA, under the DCMA, it’s legal to root your smartphone. However, rooting a tablet is illegal. This exemption grant came around 2012. In 2016, the overall picture is still unclear. So, there are chances that you’ll lose your warranty after rooting your device.

On the other hand, in European countries, the situation is much better. FSFE, the Free Software Foundation Europe, has concluded that rooting a device doesn’t hamper your device’s warranty. The user can make warranty claims for up to 2 years after buying the device. However, if the OEM can prove that rooting or installing an unofficial software has damaged the hardware of the device, you might be out of luck.

In near future, I’ll be writing more articles on rooting, its importance, myths, and more. So, don’t forget to drop your feedback in the comments section below.

Monday, 19 December 2016

Android Phone me kisi bhi App Lock ko Bypass/Hack kaise kare?

Hello , Dear Readers. MyteachWorld blog me aapka ek bar fir se swagat hai. Dosto aaj ka mera topic hai "Android Phone par kisi bhi App Lock ko kaise Bypass/Hack Kare? Dosto aaj kal lagbhag sbhi user Android Smart Phone use  karte hai. Aur apne Android Phone par Kisi secret data ya apps ko secure karne ke liye App Lock use karte hai. Kyoki aapko lgta hai aapne jis app ko Locked kar diya hai, use koi access nhi kar sakta hai Begair Password ke. To dosto ye aapki galat fehmi hai. Aaj mai aapko aisi trick ke bare me btaunga . Jisse aap kisi ke bhi Locked Application ko begair Password ke Unlock kar sakte hai. To aap bhi agar sikhna chahte hai, to aap meri post akhiri tak padhte raheye. 

        Friends yaha mai jo trick btane ja raha hu . Iss trick ko aap easily use kar sakte hai. Iske liye aapko root karne ki jarurat bhi nhi hai.  

To dosto chaleye suru karte hai.

STEP1: Sabse pehle aapko apne Android Phone ki Setting me jana hai .


STEP2: Ab aapko apps par jana hai . Agar aapke phone me Apps nhi show ho raha hai . To aapke Phone me Application Manager ho sakta hai. 




STEP3: Iske bad jb aap application manager par Click karenge to aapko kuch apps dikhenge. Jo aapke phone me pehle se Install honge. Wahi par  aapko Applock dikhega (Jo bhi app lock use kr rhe hai) Us par aap click kijeye. 




STEP4: App Lock par click karne ke bad aapko 2 Options dekhenge "Force Stop" aur  "Uninstall" ka. Ab aapko "Force Stop " par click karna hai. Jaise he aap us par click karenge aapka App Locked Work karna band kar dega . Aur aap aasani se protect apps ko easily open kar sakte hai.