Wednesday, 10 July 2013

have a unknown number ..want to find ? the best app to find unknown number


Have you ever tried to find a person in your town or anywhere in the world by a name or phone number without browsing through millions of search engines, directories and phonebooks?

In 2009, two students studying at the Royal Institute of Technology in Sweden, wished it was easier to look up phone numbers for the missed calls they received from family members living abroad. They could not find a fast and easy solution to discover who called. With this problem in mind, Nami Zarringhalam and Alan Mamedi created the fledgling startup Truecaller, which first lived on an online forum. Amazingly, they saw 10,000 downloads of their app within a week! The downloads came at a time before App Stores existed and downloading apps to your phone was a big hassle.

By 2010, the Truecaller app had gained a strong user base. Alan and Nami had flexed their friendship muscle into a couple of other startups which eventually gave them the opportunity to quit their day jobs and focus on Truecaller full time.

Truecaller’s vision was to make it easy for people all over the world to get in contact with each other. They originally thought of connecting all white and yellow pages around the world. As Nami and Alan continued to research the market, they soon discovered that many directories provided poor results. For example, White Pages in America could not find numbers to mobile phones since operators do not share that information. Unlike in the Nordics, where there’s a busy and competitive market place with many phone directories to choose from, large markets such as India had no existing public directories. In India, there are approximately 960 million mobile subscribers of which 97% have pre-paid phones. With poor, if any, public directories to build from, along with the vast amount of pre-paid phones, the depth of the problem became obvious.

How could Nami and Alan build a global phone directory to cover markets where no public directories are available? How could they include numbers to pre-paid phones? It seemed like an impossible task. They realized soon that great things are built in collaboration with others. So, they simply asked their users for help. In order to improve number lookup results and expand the database worldwide at a rapid pace, would people be interested in sharing their phone books with Truecaller? In return, users would benefit from sharing by being given free access to this new and extended database, and be able to look up phone numbers. Fast-forward in time, and it appears that this collaborative take on building an accurate and complete database has been a success. Together with people from all over the world, we reinvent the way people get in touch by creating a collaborative global phone directory that fits in your pocket.

Friday, 17 May 2013

How to Bypass or Remove a BIOS Password

How to Bypass or Remove a BIOS Password

A BIOS password is a protection measure that can be used to stop someone powering up a computer system or making changes in some of the computers most sensitive areas. Many big name computer manufacturers such as Dell and HP lock the customers out of this area because they don’t want the customer changing anything and potentially damaging the machine (which the manufacturer may have to warranty). However, when someone like a computer technician or hardware enthusiast needs to make some hardware changes to the computer, they will need to access the BIOS. Here are some methods to be a bios password cracker, removing a BIOS password.

NOTE: Do not try to guess the password on a passworded Hard Drive. 3 wrong guesses will often result in the information on the hard drive being lost forever.
How to Bypass or Remove a BIOS Password by Removing the CMOS Battery:
The simplest way to remove a BIOS password is to simply remove the CMOS battery. A computer will remember its settings and keep the time even when it is turned off and unplugged because these parts are powered by small battery inside the computer called a CMOS battery. If we pull out this battery, the computer will forget alot of its hardware settings, including its BIOS password. This should not be performed on Laptops if you are not experienced working with laptop hardware.
Finding the CMOS BatteryAnyway, open up the computer case using a screw driver and locate the flat, circular and metallic CMOS battery. It should look something like the picture to the right. Some computers have this part standing upright.
Once you have located it, observe how the latches are holding it. There are many different ways to remove a CMOS battery but the most common way on newer computers can be seen in the picture below.
Removing the CMOS Battery
Make sure to power down the computer, unplug the power cables and unplug any USB devices if they are powered. The computer must not be able to get power from anywhere for this to work. Take out the CMOS battery and wait 10 – 25 minutes before putting it back in. The reason for this wait is because the computer can still store power in its capacitors even though everything is unplugged. The waiting period allows enough time for them to discharge.
Plug everything back in, power up the computer and enter the BIOS again. If everything went well there should be no more password. In some cases, if you get weird error messages during bootup now, you will need to goto “Load BIOS Defaults” in BIOS and save the changes to fix them.
If this method didn’t work, try one of the methods below.
How to Bypass or Remove a BIOS Password using Software:
!BIOS is a freeware utility which is designed to be a whole BIOS and security suite. It has the ability to decrypt the passwords used in some of the most common BIOS makes such as Award, Phoenix, American Megatrends, IMB etc..
It also has the ability to brute force the password (known as “blasters”). However, this method is dangerous and can result in some unexpected and unwanted results.
Note: Because of this applications password cracking abilities, some antivirus software may report it as a virus/trojan. This is a false positive.
To start using !BIOS, reboot your computer and take note of the BIOS type and version you are running. For example, If your motherboard uses Award BIOS you should look for the text “Award Medallion BIOS 6.0″ or something similar.
Download !BIOS from here and save it to your desktop. Then, open a DOS command windows by going to Start > Run and type: cmd
Once you see a black screen in front of you, type: cd desktop
You should now see something like: C:\Documents and Settings\YourUserName\Desktop>
Now type the name of the file you just downloaded, if you haven’t changed the name just type in: bios320.exe
!BIOS - Decrypting a BIOS Password
Use the down arrow and choose “Crackers” and then press the right arrow. Using the up and down arrows, select the BIOS that the motherboard is using and press Enter.
You should now see a menu asking what you want to crack, in most cases its the Supervisor or System Passwords you want to crack, so press the 1 key on your keyboard. It will then show you another menu asking how you want it to be cracked. Option 1 is pretty good so try that first by pressing the 1 key on your keyboard. You should now have your BIOS password.
Reboot the computer, enter the BIOS and try it out.
How to Bypass or Remove a BIOS Password using the manufacturer backdoor password:
On many computers (especially old ones), computer manufacturers build in backdoor passwords for their own technicians to use so they can access the BIOS when the hardware is being serviced. Here are some of the ones that have been reported. You may need to try quite a few passwords before you find one that works
These passwords are CaSe SeNsItIve.
AMI BIOS Backdoor Passwords:
  • A.M.I.
  • AMI
  • AMI?SW
  • AMI_SW
  • BIOS
  • MI
  • Oder
Award BIOS Backdoor Passwords:
    • (eight spaces)
    • 01322222
    • 589589
    • 589721
    • 595595
    • 598598
    • ALLY
    • ALLy
    • aLLY
    • aLLy
    • aPAf
    • award
    • AWARD PW
    • AWARD SW
    • AWARD?SW
    • AWARD_PW
    • AWARD_SW
    • awkward
    • IOSTAR
    • CONCAT
    • CONDO
    • Condo
    • condo
    • d8on
    • djonet
    • HLT
    • J256
    • J262
    • j262
    • j322
    • j332
    • J64
    • KDD
    • Lkwpeter
    • PINT
    • pint
    • SER
    • SKY_FOX
    • syxz
    • SYXZ
    • TTPTHA
    • ZAAADA
Russian Award BIOS Passwords:
  • %øåñòü ïpîáåëîâ%
  • %äåâÿòü ïpîáåëîâ%
Phoenix Backdoor BIOS Passwords:
  • BIOS
  • CMOS
  • phoenix
Other Manufcaturers Backdoor Passwords: (manufacturer name – password)
  • VOBIS and IBM – merlin
  • Dell – Dell
  • Biostar – Biostar
  • Compaq – Compaq
  • Enox – xo11nE
  • Epox – central
  • Freetech – Posterie
  • IWill – iwill
  • Jetway – spooml
  • Packard Bell – bell9
  • QDI – QDI
  • Siemens – SKY_FOX
  • SOYO – SY_MB
  • TMC – BIGO
  • Toshiba – Toshiba

Wednesday, 15 May 2013

Take advantage of Windows 8 apps

Take advantage of Windows 8 apps

Windows 8 comes included with several apps to help you get the most from your computer. Below are just a few of the included apps.


Microsoft touts the People feature in Windows 8 because they understand how many people are using social networks today. In the People feature you'll be able to connect your Windows computer to all the major social networks including Facebook, LinkedIn, and Twitter. Once connected, you can pin the people app and monitor your social network (as shown below), use People in Search to find people, and get an overview of what is happening in all your social networks.
Windows 8 People


The Reader app will give you PDF support right out of the box.


The SkyDrive app will give you access to the Microsoft cloud service SkyDrive, which allows you to store your photos, documents, and other files in the cloud and access or share those files with any computer with Internet access.


Take advantage of the Windows Store and install one or more of the thousands of available apps designed for Windows 8. The Store is found in the Start screen, or use Search to search the Store app for any apps that you are trying to find.

Use a picture password to log into your computer

Use a picture password to log into your computer
Windows 8 includes a new feature called Picture password, which allows you to authenticate with the computer using a series of gestures that include circles, straight lines, and taps. Enable this feature if you want a new way to access your computer or have a hard time with passwords.
  1. Open the Windows Charms.
  2. Click Settings and then More PC settings
  3. In the PC settings window click Users and then select Create a picture password
Bonus tip: A four digit pin password can also be created and used to access your computer.

Windows 8 Task Manager

Windows 8 Task Manager
The Windows 8 Task Manager has been significantly improved over previous versions of Windows. Some of the new changes include showing a total percent usage at the top of your Processes, which makes it easier to determine total memory and CPU usage, improved Performance graphs, a Startup tab to see startup processes and their impact to system performance, and the App history tab (as shown below) that gives you the total resources an app has used over a period of time. Press Ctrl + Shift + Esc to start exploring the new Task Manager.
Windows 8 Task Manager

windows 8:Taking advantage of search

Taking advantage of search
The Search in Windows 8 has been significantly improved when compared to all previous versions of Windows. To search for a file or run a program in Windows 8 from the Start screen just start typing what you're trying to find or want to run.
As you begin typing, the results will start appearing on the left-hand side. In addition to being able to search for files and run programs, the Search also supports limiting the search to apps such as Finance, People, Maps, Photos, Mail, Music, Videos, Weather, and much more. If what you are searching for is not a file or program, click on the app you wish to use as the search. For example, if you were searching for "New York" and selected the Weather App you would be shown the weather in New York, NY.
By default, Search organizes the available Apps by how frequently they are used and then in alphabetical order. If you want to keep your favorite app at the top of the Search list, right-click the app and choose Pin. Pinning the app will lock it in place regardless of how often it is used. If there is an app you don't want (e.g. Finance) you can turn on and off any of the search apps through the PC settings, which is found under the Settings in the Charms.
Bonus tip: The Search is also found through Charms and can also be opened by pressing Windows key + F.

win 8 :Know your hot corners

Know your hot corners
The corners on your screen are hot corners and give you access to different Windows features. Below, is a brief explanation of each of these corners.
Bottom Left-hand corner
The bottom left-hand hot corner of the screen will allow you to access the Start screen, if you're in the Start screen and have the Desktop open, this corner will open the Desktop from the Start screen.
Tip: Right-clicking in the left hand corner will open the power user menu.
Top-left corner of the screen
Moving the mouse to the top-left corner and then down will display all the apps running on the computer. Clicking and dragging any of these apps to the left or right-hand side of the screen will snap that app to that side of the screen. Each of these open app icons can also be right-clicked to close or snap.
Right-hand side of the screen
On the full right-hand side of the screen will be given access to the Windows Charms.

Sunday, 5 May 2013

How To Merg Facebook Profile & Timeline Photo?

How To Merg Facebook Profile & Timeline Photo? 

wanna see my timeline:

This is very cool and simple trick to make your Facebook profile
attractive. There is lot of websites
that providing timeline covers but
this a cool site to create attractive
designs like merging, zooming,
jigsaw, editing the bottom of the

How To Merge Profile Picture and
Timeline cover on Facebook
Go to THIS WEBSITE and click
on Merge profile &
Cover photo.

trickedouttimeline will
ask you to upload a
picture [Upload the
picture that you want
to merge]

after uploading the
picture, select the part
of the picture to ur
cover picture and click
onDONE .

Saturday, 4 May 2013

Six of the craziest moments in tech (2012)

Six of the craziest moments in tech (2012)

1.John McAfee: Where do we even begin? First, a man is found dead in Belize, then he spends a night hidden in a cardboard box, then he’s in Guatamela, a photo from there finds its way to the internet.
He apologizes saying the EXIF data was faked and he tampered with it; turns out he was in Guatamela and he apologizes again for apologizing about tampering with the photo.
2.Apple Maps: The maps fiasco of iOS 6 was one of the most unexpected from Apple. What it did was send the entire iWorld back to the Stone Age.
People had to actually talk to strangers (“shudder”) and ask for directions. A dire situation indeed! No matter, Google’s maps soon came along and returned the iFaithfuls to the 21st century.
3.A fresh start. Or not: The disappearance of the Start Menu in Windows 8 was met with much agitation from the Windows community at large.
People were lost without it and the new Metro, or Modern, or New Style or whatever the UI is called now just seems so incomplete without it. It was a sad day indeed when Microsoft finally decided to kill it. R.I.P. Start button.
4.The one, true religion: Isak Gerson is your God and the Missionary Church of Kopimism your place of worship, Kopimism being your new religion. Begone to Sweden ye perfidious pirates. The only country that recognises file-sharing as a true religion.
A religion that holds Ctrl+C and Ctrl+V as holy symbols demands our attention. The message, “Have internet, will copy.”
5.A second too soon: Time Keepers add an extra second to the world’s atomic clocks and parts of the world grind to a halt.
minor glitch in the Linux kernel caused many servers (not updated in time) to just crash. The crashed servers include those of Reddit and Mozilla. In a world where every second counts, Time is truly our mistress.
6.Space Age parts: When you are accidentally shipped weird spares with a suitably cryptic id. “Google Planet8541 Pluto switch”, you know that Google’s plans at world domination are grander than you think.
Nobody has yet been able to solve the mystery of the spares and Google has graciously presented T-Shirts to the engineers who received those parts.

Friday, 29 March 2013

What Happens When We Click Refresh??

Everyone uses REFRESH in Windows many times…. have you ever wondered what would this option actually do in the backend…. Lets learn about it today….

False Assumptions

Some people assumes that it refreshes the RAM, while some others believe that doing it will somehow keep their PCs running smooth and easy. I have seen users obsessed with refreshing the desktop, doing it every 30 seconds or so. They have even learnt the keyboard shortcut – F5 (just to mention, these are the people who never use keyboard shortcuts). They would press the key and hold it down for a long time, sending the desktop into a frenzy of refreshes.
People are under the false impression that doing so will increase the speed and performance of the system. This belief is passed to them from their computer gurus and they religiously follow what they have been told and it become part of their daily life just like chanting a mantra .

The Truth

Technically , if you press refresh , the system is taking few micro seconds out of its life to serve your idiotic request and if you right click and refresh continuously , the system will slow down a bit because of the extra hard disk read write cycles it has to perform.
Refreshing the desktop simply redraws the icons on the desktop. That’s it! It doesn’t refreshes the RAM. It doesn’t clean your PC. It doesn’t refreshes your computer the way it refreshes you when you wake up from a nap. Refreshing the desktop has absolutely no effect on the performance of the computer.
So be aware of what refresh option does for you and use it more productively….. instead of using it continuosly which would kill your CPU Cycles….

Monday, 18 March 2013

How To Change Facebook Login Screen Background

How To Change Facebook Login Screen Background

Most of the people are using Facebook these days. It is the #1 social networking website in the world. I want to ask you a question, Are you tired of using the same old blue login screen on Facebook and want to customize it? 

If your answer is yes then you are at the right place. Today i am going to tell you about a simple   Google chrome extension with which you can customize the login screen.

FB Refresh is a nice chrome extension which enables you to change the background images on Facebook login screen.

Click here to Install FB Refresh

How To Change Facebook Login Screen Background

After installing this extension go to settings-> extensions-> FB Refresh and click on options. You have to enter the url of the background image which you want to use as background image or you can upload an image from your computer. You can edit whether the image should be displayed in horizontal or vertical and many other options. 

If you find this post useful please share it with your friends using social media buttons below. 



There are a lot of people all over the world whose mobile phone was stolen or lost. Because mobile phone is a device which has its own serial number called IMEI we can do something to increase possibility to find it or to prevent usage of it.


First of all the case should be reported to your mobile operator and to local police station. After this you can submit your phones IMEI number to global stolen phones database. A lot of people checks thedatabase and can recognize your mobile before buying it from second hand (if it is submited in database). If you are not sure what phone model and manufacturer you have check here.


Is it possible to trace your phone? Well, actualy it is possible, but it depends where your mobile is, how much will your operator care about your phone, what kind of software is instaled on your lost or stolen phone, what did new owner do to prevent finding it and few more things…


The best way is to do something by yourself. There is a lot of software on the internet which allows you to get information about the current user of your phone, location (if your phone supports GPS), to delete your phonebook remotely, to lock your phone etc…
Check the program list for  anti-theft, tracking, locating software for mobile phones which works on different platforms, some of them are FREE and some are commercial


Your phones IMEI number can be changed but not so easy as it was with old mobile phones. Now chips and electronic is not done the same way because it is not rewritable as you want. It is one time writable and not rewritable. Changing chips on mobile phones motherboard is harder and not everybody have a knowledge to change it… if they know how then they will do it but it could be very expensive because it is harder. The question is if the price is still acceptable.

Monday, 4 March 2013

How to Automatically Poke Back Friends on Facebook

How to Automatically Poke Back Friends on Facebook

Poke is a feature led by facebook to get attention of any user, well you can compare it wit the Buzz option we had in Yahoo Chat, so we used to click on Buzz and then the other person's chat used to vibrate and make sounds to get their attention, its somewhat same but yes off course it does not make your screen vibrate but if leave a notification without any message or anything but just saying that person poked you and you can poke him back to say yes I remember you :)
So now manually poking back to many person's might be a big problem so we have simple solution to this thing by making this process automatic. Now we have two options by which you can make this thing automatic. The one is by using the chrome extension that will work only in chrome and the other one is Userscript that will work in both Chrome and Firefox.

Auto Poke Back using Chrome Extension

poke-all-for-chromeWell Poke All for Chrome extension gives you the possibility to poke all your friends back all together with one click. Well yes it even has that automatic feature which you can select and every poke will be reverted back automatically. So now you can install this extension only in chrome.
So now after installation just visit Facebook and click on this hand icon in your status bar now you c will see all your pokes you can select Auto Poke or just click on the Poke All option.

Auto Poke Back using UserScript

Well there is even a simple userscript that can be installed in Chrome, Firefox and Opera browser, so Facebook Autopoke userscript does the same job but its totally automatic. So you will need Greasemonkey installed in your Firefox browser to get this script working.
For the chrome browser you can install this script directly but you will need to follow this easy tutorial on installing 3rd party extension and scripts in chrome.
So that's it now you can every Poke you receive will be reverted back automatically, if you find any problem do comment.

Wednesday, 20 February 2013

10 Ways How Hackers Can Hack Facebook Accounts

10 Ways How Hackers Can Hack Facebook Accounts

So here are the top 10 methods which have been the most popular in 2012:

1. Facebook Phishing 

Phishing still is the most popular attack vector used for hacking facebook accounts, There are variety of methods to carry out phishing attack, In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real facebook page and then asks the victim to login into that page, Once the victim logins through the fake page the victims "Email Address" and "Password" is stored in to a text file, The hacker then downloads the text file and get's his hands on the victims credentials.
2. Keylogging 

Keylogging, according to me is the easiest way to hack a facebook password, Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A keylogger is basically a small program which once is installed on victims computer will record every thing which victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.

3. Stealers 

Almost 80% percent people use stored passwords in their browser to access the facebook, This is is quite convenient but can sometimes be extremely dangerous, Stealers are software's specially designed to capture the saved passwords stored in the victims browser, Stealers once FUD can be extremely powerful.
4. Session Hijacking

Session Hijacking can be often very dangerous if you are accessing Facebook on a http:// connection, In a Session Hijacking attack a hacker steals the victims browser cookie which is used to authenticate a user on a website and uses to it to access victims account, Session hijacking is widely used on Lan's.

5. Sidejacking With Firesheep

Sidejacking attack went common in late 2010, however it's still popular now a days, Firesheep is widely used to carry out sidejacking attacks, Firesheep only works when the attacker and victim is on the same wifi network. A sidejacking attack is basically another name for http session hijacking, but it's more targeted towards wifi users.
6. Mobile Phone Hacking

Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are lots of Mobile Spying softwares used to monitor a Cellphone.
7. DNS Spoofing 

If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original page to his own fake page and hence can get access to victims facebook account.

8. USB Hacking 

Usb password stealer
If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the browser,
9. Man In the Middle Attacks

If the victim and attacker are on the same lan and on a switch based network, A hacker can place himself b/w the client and the server or he could also act as a default gateway and hence capturing all the traffic in between, ARP Poisoning which is the other name for man in the middle attacks is a very broad topic and is beyond the scope of this article,
10. Botnets 

Botnets are not commonly used for hacking facebook accounts, because of it's high setup costs, They are used to carry more advanced attacks, A botnet is basically a collection of compromised computer, The infection process is same as the keylogging, however a botnet gives you, additional options in for carrying out attacks with the compromised computer. Some of the most popular botnets include Spyeye and Zeus.

Tuesday, 12 February 2013

How to find who unfriended you in facebook?

How to find who unfriended  you in Facebook?

  • All you need is to download simple software i.e unfriend finder
  • click here to download it 
  • As soon as you downloaded it and on your computer you will get an extension with full instalation steps.when you open your facebook account you can see it...... see below picture
  • the two arrow marks in the above picture show who unfirend you.
  • you will  also get a notification when some one friends you.
  • It helps you when some one friend you on facebook, you can also see  pending requests and persons who ignored your friend request
so thats end of  the post.soon we will be starting with a new post about facebook tricks
i think you like the post and  feel don't forget to like us in facebook and also subscribe for us
if you have any doubts please do leave your valuable feedback/comments.
full page script

Monday, 4 February 2013

10 best free online photo editing websites

10 best free online photo editing websites

full page script
No doubt Photoshop is best photo editing software.i use photoshop for editing photos and to add some cool effects.but what if you don't have Photoshop?
For this there are many online web applications which can Edit your pictures and images online without the extensive knowledge of any graphics application. Photo Editing is always fun and its pretty essential if you want your pictures to look good. You can apply many cool effects, that can make your photo look better and more enhanced.

Best Online Photo Editing websites:

1.Photoshop Express:

Photoshop Express is a companion to, your online photo sharing, editing, and hosting resource. Create a free account to upload and store 2GB of photos and videos online.
With Photoshop Express, it's easy to improve your photos. Choose from a variety of one-touch effects, or simply drag your finger across the screen to crop, rotate, or adjust color. Add artistic filters like Soft Focus or Sketch. And never fear: You can undo and redo changes until you get just the look you want—a copy of your original file is always saved.


PicMonkey is a free online photo editor. Basic editing all the way like It has various features such as crop,rotate, luscious effects, overlays, fonts, textures, frames and touch up tools and to advanced stuff like cloning, touch-up and eye-gasmic effects. Groovy overlays, textures, and frames. All the photo editing magic of Picnik, with 78% more monkey.



Pixlr is a basic image editor that allows you to quickly and easily edit images all from your browser window. Photo editing is divided into three steps. Firstly, choose a filter from the options in the red section, then a secondary effect from the blue area, and finally a frame in the yellow area. You can move back and forth through these stages as often as you want, using a photo stored on your computer, or one taken directly from your webcam.


BeFunky one of best online photo editing already gives you effects that aren’t offered anywhere else along with all your favorites. With this new version we’ve added new effects that will blow your mind, some more of the most popular ones, and powerful new editing tools.

No registration is required to use BeFunky Photo Editor, and there are NO ADS, no watermarks, no limitations, and no forcing to share. BeFunky Photo Editor was made with you in mind, so it's exactly the way you want it to be.


Splashup is an online photo editing tool, which is very similar to Adobe's Photoshop. The tools are robust including a font leading tool,layers, filters, brushes and integration with your web cam. If you’re familiar with using *cough* Photoshop, you’ll like Splashup. The ad placement is unobtrusive and the site has a more grown up feel. It also plays nice with the leading photosharing sites like Flickr, Picasa, and Facebook. No registration required to get started, Splashup lets you jump right in.


Aviary Photo Editor is a powerful photo editor. Aviary offers everything from image editing to vector and audio editing. It’s a suite of web apps with some really great capabilities that let its users produce the quality of work you might expect from a desktop app. The app uses a simplified interface in comparison to Photoshop and similar web apps. It’s capable of layers, grouping, filters and quite a few more advanced features should you need them.


FlauntR is a fun online photo editing service. With its unique interface, which is separated into six tabs, FlauntR gives you an easy way to edit your photos. With many basic effects such as sepia and grayscale and more advanced effects like cross-process and vignette, FlaunR will get your photos looking great. There are so many options to use from FlauntR, including many decorating features that will allow you to create images perfect for a gift or scrapbook.

8.Foto Flexer:


  • FotoFlexer is one of the most advanced online digital photo editor. with many tools including the ability to retouch photos, add text, shapes, and work in layers.including glitter text, animated shapes, and funky filters. 
  • FotoFlexer takes the stress out of online photo editing with its simple, step-by-step process and its easy-to-apply effects


Photovisi offers a free and easy way for people to make their photo collage online. Several creative templates and options are available to choose from,making it easy to get something of quality from the start while still being able to customize it to your liking. The results are very similar to those of the collage-making feature built into Picasa (Create > Picture Collage).

10 Sumo Paint:

Sumo Paint is another Photoshop-like editing app, although with an impressive collection of tools (including the magic wand). It supports layers, grouping and many more advanced features. It’s interface appears to be well refined but I haven’t had an opportunity to use it as much as Splashup or Pixlr. They also offer a downloadable version, which adds to the capabilities you can get from their software — desktop or web app.
i hope you like the above article and useful for you.please like us on Facebook and subscribe for us to get updates.if i have missed any best way to edit photo's online let me know in the comments below.

Sunday, 27 January 2013

Best Cell Phone Tracking Software

Best Cell Phone Tracking Software

With the today’s technology, finding your loved one or simply someone who is important to you is possible through a cell phone monitoring software. Call it spying or stalking but truth is this phone trackers could really come very handy particularly in cases of emergencies. Regardless of whether you have valid reasons or not for monitoring somebody’s mobile phone, truth remains that tracking software is available and ideally will be put to good use.
There are several alternatives open to track a mobile phone, study and decide which one is the most efficient to do the job. First option would be to install GPS tracking to some mobile phone. A GPS chip has to be placed at the back of the cellular unit; it is fairly small and is hardly noticeable. As soon as the chip lies on the phone, power is going to be provided by the cell phone itself. Read the directions on how to install the GPS trackers to the telephone carefully.
The program Gps navigation tracking you down loaded on your computer will be the 1 monitoring the indicators. Most cell phone tracking software has to be triggered after installation, just follow instruction prompted by the software. The truth of this software differs on the distance from the phone, it could be anywhere from a hundred feet to a couple of miles.
tracking software for cell phone
Other cell phone tracking software is available in the internet. Some offer 30 day trial period, giving you enough time for you to determine if it is useful or not. There is software that immediately starts tracking when downloaded.
You probably possess tons of queries about the cell phone tracking software and its capabilities. Mobile phones have to have a GPS feature for the software to operate. Aside from tracking the actual mobile of a man or woman, it can also be useful for pics and vids sharing with family and friends. Different cell phone tracking software can be downloaded free of charge, some requires license key activation which means you will have to pay for it there are some that doesn’t price anything. Before you proceed, make sure that your mobile phone matches the software. The software you will need depends on the operating-system your unit requires; it could be Symbian or Google android platform. Be aware of individuals important details.
The GPS cell phone tracking software is considered the best primarily because of the use of the satellites. This particular application is known for its appropriate and exact information with regards to the position and whereabouts of the cell phone device being supervised.
There are software programs who’s said to be impossible in order to detect while monitoring information about the other person. Besides the location trackers by Gps navigation, this program’s added functions are full accessibility phone’s events, SMS text messages, both sent and received, browsers and call firelogs. Read the comments and appearance the positive and negative feedbacks from people who have experienced using the particular mobile phone tracking software could be helpful in making a choice. Be certain about the plan you choose to download, there are many bogus programs going around the internet. Choose sensibly.

Thursday, 24 January 2013

DO YOU KNOW GOOGLE PANDA???5 essential tips to help you to prevent the judgment by iT


source :wikipedia
Google Panda is a change to Google's search results ranking algorithm that was first released in February 2011. The change aimed to lower the rank of "low-quality sites" or "thin sites", and return higher-quality sites near the top of the search results. CNET reported a surge in the rankings of news websites and social networking sites, and a drop in rankings for sites containing large amounts of advertising. This change reportedly affected the rankings of almost 12 percent of all search results. Soon after the Panda rollout, many websites, including Google's webmaster forum, became filled with complaints of scrapers/copyright infringers getting better rankings than sites with original content. At one point, Google publicly asked for data points to help detect scrapers better. Google's Panda has received several updates since the original rollout in February 2011, and the effect went global in April 2011. To help affected publishers, Google published an advisory on its blog, thus giving some direction for self-evaluation of a website's quality. Google has provided a list of 23 bullet points on its blog answering the question of "What counts as a high-quality site?" that is supposed to help webmasters "step into Google's mindset".

Significant differences between Panda and previous algorithms

Google Panda affects the ranking of an entire site or a specific section rather than just the individual pages on a site.
In March 2012, Google updated Panda and stated that they are deploying an "over-optimization penalty," in order to level the playing field

It’s here. It’s inevitable. It’s called Google Panda, the latest Google’s search algorithm which aims to promote the high quality content site by dooming the rank of low quality content sites. Since its release and updates, many sites have been shown to be terribly affected by the algorithm, but the worst rumor here is, they can do almost nothing to recover the ranking and traffic. Although the web haven’t sought out an absolute remedy to the Panda’s update, we all know that Panda is pretty much a content quality filter.

 We also know a proverb saying, “Prevention is better than cure”, so in this post we are going to provide 5 essential tips to help you to prevent the judgment by Google Panda. Full detail at the jump!

1.Delete Out Low Quality Content

The first and foremost thing you can probably do is to separate out all auto-generated content. Block the indexing and crawling of all low quality content to prevent it from lowering the ranking of your entire site. Low value content can cause the algorithm to slap down your entire site even if a great deal of your content is unique and valuable.
To know whether your site content is low quality or not, here are some helpful questions asked by Google Webmaster Central Blog to aid you in determining the low quality content:
  • Does the site have duplicate, overlapping, or redundant articles on the same or similar topics with slightly different keyword variations?
  • Is the content mass-produced by or outsourced to a large number of creators, or spread across a large network of sites, so that individual pages or sites don’t get as much attention or care?
  • Are the articles short, unsubstantial, or otherwise lacking in helpful specifics?
  • Are the pages produced with great care and attention to detail vs. less attention to detail?
  • Does this article have spelling, stylistic, or factual errors?
Interestingly, identical low quality content is particularly endemic across e-commerce websites. For example, why should a pair of audio cables be described differently in each website and in each page on your website? Theoretically to meet the "unique" content guideline every product should be given an unique description and listing to avoid being marked as “low-quality” content by Panda.

2. Focus On Unique Content

As we know the Panda update is aimed to bring the judgment to the content farm and those sites which steal and duplicate, that means in order to prevent Panda from blacklisting you, you have to stop stealing other’s articles, and really focus on creating unique content.

Try to look at your place in your industry and say to yourself:
  • “What is the topic that my readers will be interested about?”
  • “What do I offer to my readers that are unique? What about my content is just here and nowhere else?”
Don’t copy or retype out the article from other site, but craft your article out with your own topic and opinion. Details? Check out our post on how to run blogs that inspire.
That sounds pretty much like old school SEO practice, you might ask? The answer is yes, but now it’s the most important SEO practice!

3. Concentrate on Clout & Authority

In Richard Baxter’s article entitled High Quality Web Sites – The New Google Ranking Factor, elements like trust and authority matter in the new Panda update. It may extend to your links, your tweets and your resources related with the site.

According to the writer, trust could be measured by the links awarded to the article, and the more authoritative the link, the more trustworthy the article. If significant volumes of links aren’t enough just yet, possibly a shorter term solution could be to analyze the social buzz associated with the article, such as Twitter and Facebook.
We often talk about the links, but the site content itself is the critical factor which will attract the authoritative links and judged by Google Panda in the term of authority. On this part, Google Webmaster Central Blog has listed out some questions for you as a guideline to produce what they thought is the “authoritative content”:
  • Would you trust the information presented in this article?
  • Is this article written by expert/enthusiast who knows the topic well, or is it more shallow in nature?
  • Is the site a recognized authority on its topic?
  • Would you recognize this site as an authoritative source when mentioned by name?
  • Is this the sort of page you’d want to bookmark, share with a friend, or recommend?
So you know, these questions aren’t hard to answer, but challenging when it comes to implementation. Build your content with these questions in mind, and your site will be too good for both Google Panda and your fellow readers.

4. Keep Advertising Ratio Healthy

Sure we all like to be paid for ads, but apply ads with attitude. 3 sponsors at $10K are better than 20 ads at $500. Keeping your ads down to a healthy ratio is not only good with Panda but it also improves your reader’s user experience.

So you know, ads is totally okay, but no advertisement scheme that will kill your reader’s user experience really fast, in term of visual experience and page loading speed. Healthy advertising ratio is even the reason that your readers will love and recommend your site than those sites with nastily cluttered ads, and by doing so will indirectly raise the trustworthiness and authority of your site.

5. Recognize & Track Panda Updates

Sites hit by Panda will show massive changes especially the page views. When using Google Analytics you will see an epic fall in traffic, that’s the possible sign of Panda. Limiting the search parameters in Google Analytics to the United States market will show the clear result of Panda attack. If you’re unfortunately the victim of the Panda, you can:
  1. Implement the changes suggested above.
  2. Ask Google to restore your rankings.
Don’t expect immediate improvement because Panda only updates periodically. If you still haven’t reached a Zen-like state of acceptance go and check out Barry Schwartz’s list and Panda archives at or Mark Nunney’s Google Panda Survival Guide, or ultimately the Guidance of Building High Quality Sites by Google Webmaster Central Blog
And always remember that, all of these Panda updates are to remind you that, don’t be evil.