Show Mobile Navigation
Tech
Showing posts with label Tech. Show all posts
Showing posts with label Tech. Show all posts

Google Researcher Finds Links Wannacry Ransome's with North Korea

Hemant Verma - 4:45 PM
Well Finally Indian Man and a Google Researcher Neel Mehta finds a link of Wannacry Ransomware with Lazarus Group. This group recently transfer 5 Billions of Money from Bangaladesh's Bank and this group is totally related by North Korea.



Read Also: How to Protect Your Computer from Ransomware Attack

Who is Lazarus Group?

Lazarus Group is a cybercrime group made up of an unknown number of individuals. While not much is known about the Lazarus Group, researchers have attributed many cyber attacks to them over the last decade. The earliest known attack that the group is responsible for is known as "Operation Troy", which took place from 2009–2012. This was a cyber-espionage campaign that utilized unsophisticated DDoS techniques to target the South Korean government in Seoul. They are also responsible for attacks in 2011 and 2013. It is possible that they were also behind a 2007 attack targeting South Korea, but that still isn't certain. A notable attack that the group is known for is the 2014 attack on Sony Pictures.

The Sony attack used more sophisticated techniques and highlighted how advanced the group has become over time. The most recent attack attributed to the group is recent 2016 bank heist which included an attack on the Bangladesh Bank, successfully stealing US$81 million.


Neel Mehta Finds a Clue

Neel Mehta, a security researcher at Google, found evidence that suggests the WannaCry ransomware,, is linked to a state-sponsored hacking group in North Korea, known for cyber attacks against South Korean organizations. Named as Lazarus Group and This group also steals the 5 Billions from Bangladesh's Bank.

This is WannaCrypt Attribution

Some security researchers from Kaspersky, Symantec, immediately followed the tip from Neel and confirmed a strong link between WannaCry and other malware families, including Lazarus, Joanap, and Brambul, which suggests WannaCry was written or modified by the same author and Lazarus mainly worked many times for the North Korea. So, it could be the North Korea behind to these attacks, But not really sure till yet.

(Note: This is not a allegation on North Korea, it's just a co-incidence)

Neel Mehtaprovide some source codes which proves that they related with Lazarus Group.


How to Protect Your Computer from Ransomware Attack

Hemant Verma - 4:13 PM
On the 12th May 2017 a cyber attack happened by some hackers in Europe and this is one of biggest cyber attack  in the history of cyber crime because this kind of attack still not happened in the history of cyber world.


This insanely fast-spreading threat that has already hacked nearly 200,000 Windows PCs over the weekend. 


In the first few hours, 200,000 machines were infected. Big organizations such as Renault or the NHS were struck and crippled by the attack.

The attack is believed to be the result of "RANSOMWARE", a type of malware that been used by computer hackers for many years to capture information, extort money or force people or organisations to behave in certain ways.


Now First get to know that "What is Ransomware"?

Ransomware - This is a kind of malware or in simple words, this is computer virus that has been used by the hackers to steal the important information by the govt. or from any organisation or to hack the bank accounts to capture their money or transfer their money in their account.

Hacker make this malware and do attack on the govt. sites to capture their whole data and then they demands for money to realise captured data.


Who Attacked from Wannacry Ransomware?

This attacked by the Wannacry:- Wannacry is a ransomware computer worm that targets the Microsoft Windows operating system. The virus was used to launch the WannaCry ransomware attack.

Update: Google Researcher Finds Links Wannacry Ransome's with North Korea 


How Ransomware can harm your Computer and to your Life?

In most cases, the malicious program infects computers through links or attachments in messages known as phishing emails.

"The age-old advice is to never click on a link in an email," said by a senior malware intelligence researcher at Malwarebytes, a San Jose-based company that has released anti-ransomware software.
"The idea is to try to trick the victim into running a malicious piece of code."

The malicious program is usually hidden within the links or attachments which come in emails. The clickbait might just compel the user to click on the link. When the user clicks on such links or downloads such documents, it is then when the malware is installed in the background without the knowledge of the user.

As we already mentioned that this kind of malware mostly attacks on the Windows Operation System like Windows XP, Windows 7, Windows 8.1, Windows 10 etc and also on all Windows Operation Systems like on DOS also. So, this malware can hack all ATMs who runs on Windows OS and also can hack all servers who still depends only on the Windows OS. 


What would be it's Effect in India?

India is world's major country and also stands in the world's top 20 country and it's Economy also growing day by day, Many outside countries are coming in India for growing their business, so it's a leading mentor for across the world, that why they also can harm India too, as we also knows that mostly the ATMs in India is operating on the Windows. So, it can be harmful to India as well.


What do they want from us?

If hackers hack your site or any thing and then they want money to realise our site they always wants money in the BitCoin form. IF they are asking money to you, don't give money to them else they can hack another pc and they will ask money also from them.

do you know the rate of bitcoins?

This is Rate of Bitcoins to Dollars






Reaction from the peoples across the world who hacked by Wannacry Ransomware....

It happened Till Yet

My entire music collection from the past 11 years got encrypted by ransomware.
Is there anything I can do about it?
They’re asking for $500 for the decryption key.
My photos and videos of my wedding has been hacked and they contains some very private photos and video as well:
They are asking 50 Bitcoins to decryption key and give my data back?
He looked down and said a bitter „no”.


How to Protect Your Computer from Ransomware Attack?

1. Always Install Security Updates

If you are using any version of Windows, except Windows 10, with SMB protocol enabled, make sure your computer should always receive updates automatically from the Microsoft, and it’s up-to-date always.

2. Patch SMB Vulnerability

Since WannaCry has been exploiting a critical SMB remote code execution vulnerability (CVE-2017-0148) for which Microsoft has already released a patch (MS17-010) in the month of March, you are advised to ensure your system has installed those patches.

Moreover, Microsoft has been very generous to its users in this difficult time that the company has even released the SMB patches (download from here) for its unsupported versions of Windows as well, including Windows XP, Vista, 8, Server 2003 and 2008.

Note: If you are using Windows 10 Creators Update (1703), you are not vulnerable to SMB vulnerability.


3. Disable SMB

Even if you have installed the patches, you are advised to disable Server Message Block version 1 (SMBv1) protocol, which is enabled by default on Windows, to prevent against WannaCry ransomware attacks.


Here's the list of simple steps you can follow to disable SMBv1:


  • Go to Windows' Control Panel and open 'Programs.'
  • Open 'Features' under Programs and click 'Turn Windows Features on and off.'
  • Now, scroll down to find 'SMB 1.0/CIFS File Sharing Support' and uncheck it.
  • Then click OK, close the control Panel and restart the computer.



4. Enable Firewall & Block SMB Ports

Always keep your firewall enabled, and if you need to keep SMBv1 enabled, then just modify your firewall configurations to block access to SMB ports over the Internet. The protocol operates on TCP ports 137, 139, and 445, and over UDP ports 137 and 138.


5. Use an Antivirus Program

An evergreen solution to prevent against most threats is to use a good antivirus software from a reputable vendor and always keep it up-to-date.
Almost all antivirus vendors have already added detection capability to block WannaCry, as well as to prevent the secret installations from malicious applications in the background.


6. Be Suspicious of Emails, Websites, and Apps

Unlike WannaCry, most ransomware spread through phishing emails, malicious adverts on websites, and third-party apps and programs.
So, you should always exercise caution when opening uninvited documents sent over an email and clicking on links inside those documents unless verifying the source to safeguard against such ransomware infection.

Also, never download any app from third-party sources, and read reviews even before installing apps from official stores.


7. Regular Backup your Files: (imp)

To always have a tight grip on all your important documents and files, keep a good backup routine in place that makes their copies to an external storage device which is not always connected to your computer.
That way, if any ransomware infects you, it can not encrypt your backups.


8. Keep Your Knowledge Up-to-Date (imp)

There's not a single day that goes without any report on cyber attacks and vulnerabilities in popular software and services, such as Android, iOS, Windows, Linux and Mac Computers as well.

So, it’s high time for users of any domain to follow day-to-day happening of the cyber world, which would not only help them to keep their knowledge up-to-date, but also prevent against even sophisticated cyber attacks.

Individuals and small businesses should: (in short)
  • Run Windows Update to get the latest software updates.
  • Update your windows to latest patches.
  • Make sure any anti-virus product is up to date and scan your computer for any malicious programs. It's also worth setting up regular auto-scans.
  • Back up important data on your computer in case it gets held for ransom.

What to do if WannaCry infects you?

If WannaCry ransomware has infected you, you can’t decrypt your files until you pay a ransom money to the hackers and get a secret key to unlock your file.

Never Pay the Ransom:

It’s up to the affected organizations and individuals to decide whether or not to pay the ransom, depending upon the importance of their files locked by the ransomware.
But before making any final decision, just keep in mind: there's no guarantee that even after paying the ransom, you would regain control of your files.

Moreover, paying ransom also encourages cyber criminals to come up with similar threats and extort money from the larger audience.

So, sure shot advice to all users is — Don't Pay the Ransom.


Top 10 Indian CEO's of Biggest Network and their Salary

Hemant Verma - 2:20 PM
Indians have been good in India and not only in India, even also from outside India like in US and UK and also in other countries also. Indian are ruling these days and we also feel proud to see that someone is being CEO of any company from India. India is showcasing their talent in the world. So here we have a list of Indian who are CEO of big Multi National Companies and also their salary.

Top 10 Indian CEO's of World

1. Sundar Pichai - Google


Sundar Pichai is a computer engineer and the current CEO of Google Inc. The technology giant Google, which specializes in Internet-related services and products, underwent a major corporate restructuring in 2015 following which Alphabet Inc was launched as its parent company with co-founders Larry Page as its CEO and Sergey Brin as President.

Salary - Rs. 335 Crore P.A.


2. Satya Nadella – Microsoft


Satya Nadella is an Indian engineer who has joined the league of technological wizards like Steve Jobs and Bill Gates by the virtue of his great work and dedication. Nadella’s educational background undoubtedly played a great role in shaping his technical and leadership abilities. After pursuing a degree in ‘Electrical Engineering’ from the reputed ‘Manipal Institute of Technology’ located in India, this tech wizard relocated to the United States. Here, he studied at esteemed institutions like the ‘University of Wisconsin’ and the ‘Booth School of Business’.

Salary - Rs. 525 Crore P.A.


3. Sanjay Kumar Jha - Global Foundries


Sanjay K. Jha is the former chairman and chief executive officer of Motorola Mobility and previously served as the co-chief executive officer of M Sanjay K. Jha is the former chairman and chief executive officer of Motorola Mobility and previously served as the co-chief executive officer of Motorola. He stepped down as CEO after Google completed acquisition of Motorola Mobility on 22 May 2012.
Jha was born in 1963. He received a Ph.D. in electronic and electrical engineering from the University of Strathclyde and a B.S. in engineering from the University of Liverpool.

Salary - Rs. 230.6 $ Million Net Worth


4. Shantanu Narayen - Adobe Systems


Shantanu Narayen is president and chief executive officer of Adobe, one of the world's largest and most diversified software companies. Narayen's leadership, technology insight and operational expertise have strengthened Adobe's culture of innovation, expanded the company into new markets, and extended its product portfolio and global reach. In 2009, Narayen led the $1.8 billion acquisition of Omniture, Inc., expanding Adobe’s ability to help customers measure and optimize the value of online experiences, content and applications.

Salary - Rs. 17.89 Million Dollar P.A.


5. Indra Nooyi - PepsiCo


Indra Nooyi’s name figures consistently among the world’s most powerful people, and is ranked 19th in the Equilar 100 CEO Pay Study. Nooyi, who is hails from Chennai, is now the third highest paid woman CEO in the United States.
Nooyi was named President and CEO of PepsiCo on October 1, 2006, and became chairperson of the company on 2 May 2007. Architect of PepsiCo’s global strategy for more than a decade, she led its restructuring, including the divestiture of its restaurants into the successful YUM! Brands, Inc.
Nooyi also served as president and chief financial officer in 2001, when she was also named to PepsiCo's Board of Directors.

Salary - 19.08 Million Dollar


6. Ajay Banga


Ajay Banga is president and chief executive officer of MasterCard and a member of its board of directors.
Prior to joining MasterCard in 2009, Mr. Banga was chief executive officer of Citigroup Asia Pacific responsible for all businesses in the region, including institutional banking, alternative investments, wealth management, consumer banking and credit cards. He joined Citigroup in 1996 and held a variety of senior management roles in the United States, Asia Pacific, and the Europe, Middle East and Africa regions. He was also responsible for Citi’s brand marketing and from 2005-2009 oversaw its efforts in microfinance.

Salary - 12.04 Million Dollar 


7. Nikesh Arora – SoftBank


 Born in Ghaziabad, Nikesh Arora completed his schooling from The Air Force School (Subroto Park), in Delhi. His father worked in the Air Force and Nikesh had been to different Kendriya Vidyalayas around the country. He graduated as an Electronic Engineer from IIT BHU in 1989. After completing his engineering he had a brief stint with Wipro selling computers. He however, decided to pursue a management degree from the US and enrolled at Northeastern University, Boston. After completion his MBA, Arora joined Fidelity Investments as an analyst but simultaneously enrolled himself for a master’s programme in finance from Boston College. Attending school at night and topping his class, Arora finished his CFA (Chartered Financial Analyst) course in 1995.

Salary - 135 Million Dollar Net Worth


8. Francisco D'Souza - Cognizant


Francisco D'Souza has more than 20 years of experience in the information technology industry, in both operational and advisory roles. Effective 1 January 2007, D'Souza was appointed President and Chief Executive Officer and a member of the Board of Directors of Cognizant. He oversees much of the operations and business development of the company, working closely with Cognizant clients who are using offshore resources to execute large software development and maintenance projects. At Cognizant, which he joined in its early days, D'Souza was elected Chief Operating Officer (COO) in December 2003. Prior to that, from November 1999 to December 2003, he served as Senior Vice President (SVP), North American Operations and Business Development.

Salary - 11.34 Million Dollar 


9. Sanjay Mehrotra - SanDisk


Sanjay Mehrotra is co-founder of SanDisk and the company’s President and Chief Executive Officer.He was appointed to this role in January 2011.
Under Mehrotra's leadership, SanDisk made a strategic transformation from primarily a removable storage and retail-focused company in 2010 to one that today includes a broad product portfolio encompassing flash memory storage products for consumers, embedded storage for OEM customers, and SSDs, software and related services for enterprise and OEM customers.

Salary - 10.63 Million Dollar


10. Dinesh Paliwal


Dinesh C. Paliwal is Chairman, President and Chief Executive Officer of Harman International Industries – a provider of audio and infotainment systems for the automotive, consumer and professional markets.
Dinesh, a US citizen, has lived and worked in Australia, China, India, Singapore, Switzerland, and the United States[citation needed. Before joining Harman he worked at the ABB Group as President Global Markets and Technology. During his 22 years with ABB, he held management positions in five countries and was instrumental in the company’s dramatic turnaround during the period 2002–2007.

Salary - 10.60 Million Dollar

Google Announces OCR to Scan Attachments in GMAIL

Hemant Verma - 5:29 PM
Google add a new high end feature in the gmail today that is known as OCR (Optical Character Recognition). This new feature will be very useful for the business sector because they need to send the files and also need to send very confidential files from one to another place with sensitive information and documents, associated with them.

Speaking on the topic, Gerhard Eschelbeck, VP of Security & Privacy Engineering said,

When we think about innovation at Google, most of us think about balloons delivering wireless access or driverless cars. But for many years, we’ve been innovating at scale with security as well.
In its December announcement, Google had announced,
If you’re a Google Apps Unlimited customer, Data Loss Prevention (DLP) for Gmail will add another layer of protection to prevent sensitive information from being revealed to those who shouldn’t have it.
Google had announced the content monitoring feature back in December itself and hinted at the possibility of a more inclusive monitoring system. And the company is making good on its promise by continuously improving the security features on offer.

The latest feature for example, will let admins monitor sensitive information in scanned copies and images as well by scanning the attachments transferring over the Gmail network. The feature, which deploys Optical Character Recognition, will definitely be of help to the security personnel of organizations dealing in sensitive information.

Here is how Google explains the working of the newly integrated technology.
Optical character recognition (OCR) is a technology that extracts text from images; for example, converting an image of an invoice into text. If you turn on the Optical character recognition (OCR) setting, any relevant image attachments are converted to text, and the text is then subject to any Content compliance or Objectionable content rules you set up.
We expect to hear more on the topic tomorrow, when Gerhard Eschelbeck will speak about the ongoing and upcoming changes with regards to security at Google Inc. at the RSA Conference, happening this week in San Francisco.


Top 5 Best Places to Legally Download eBooks for Free

Hemant Verma - 5:28 PM
If you're a voracious reader who's just gone digital, you must be loving the convenience of having all your books on you at any time, along with the extra features such as search, definitions, and highlights..



Whether you're using an e-reader like the Kindle or you're reading books on your phone or tablet, there are a lot of things to love, most of all the fact that it has also become incredibly simple to buy the books you want to read. Devices and apps all come with their own marketplaces, and it's pretty easy to rack up a big bill quickly.

But there are plenty of places where you can get great books without spending a single rupee - and we're not suggesting that you pirate books either. There are several legal free resources for books around the Internet. Most of these only offer old books that are no longer copyrighted - this means that you won't find books like A World of Ice and Fire - but that still leaves thousands of classics that you'll have to pay to buy in print.

Here are our favourite sites where you can legally download free ebooks to read on a Kindle, tablet, phone or even your PC:

1. Baen Free Library

Link =>> Baen Free Library
Baen is an American publisher that focuses on science fiction and fantasy writing, and its ebook store is well known for its reasonable pricing and for other consumer-friendly features like the lack of DRM, which means you can copy the books across devices without restriction. The publisher has a roster of well-known writers including Lois McMaster Bujold, John Scalzi, and Michael A Stackpole, though it's the work of its lesser-known writers that you'll find on the free section on Baen's website.

2. Feedbooks

Link =>> Feedbooks
Feedbooks is a good looking site that opens equally well on mobile devices, which makes it very convenient to use if you're primarily reading on your mobile phone or tablet. This way, you can save your self the trouble of needing to downloading books on a PC and moving files between devices.

3. Project Gutenberg

Link =>> Project Gutenberg
Most people have probably heard of Project Gutenberg. Run entirely on the effort of volunteers, Gutenberg is probably the oldest digital library, and houses over 48,000 ebooks. It has them in various formats, from plain-text to Kindle friendly formats to epubs.

Gutenberg even has a collection of audiobooks if you want. These range from ones read out by the computer, to ones that volunteers read out.

The website itself can be a little intimidating to use with books being nested behind several layers of navigation, but it's still possibly the most exhaustive resource for free books online.

4. Bartleby

Link =>> Bartleby
Quite unlike Herman Melville's Bartleby the Scrivener, who was most uncooperative, Bartleby the website is a great resource, particularly for students. The site contains a huge number of readings, classics from literature, and also has a large collection of non-fiction that includes works of political and social history.


5. Open Library

Link =>> Open Library
Another free resource for public domain books, Open Library is great because it has lists people can create, which you can also see - so for example, there's a list of historical romance novels, and a list of books on the fur trade. Or you could search for all books about Istanbul, for example, in the subjects view. These tools make it easy to find the next book to read, which is handy if you're not too familiar with the older books you find in these free libraries.


How to Use Your Laptop as a Wi-Fi Hotspot

Hemant Verma - 10:49 AM
Have you ever been in a situation where you have no W-Fi router, just one network cable and five people who need to use the Internet? Or maybe you have a 3G dongle that works with your laptop, but leaves your Wi-Fi-only tablet offline. Sounds familiar? It would certainly be handy to share the Internet connection amongst all users and devices without a router, right?

Or maybe this scenario will ring a bell. Many hotels offer wired Internet access for free, but charge you for Wi-Fi and/ or for using the Internet on more than one device. So should you just pay the crazy amount they ask for? Not necessarily.
You can share your laptop or desktop Internet connection via Wi-Fi to other devices, and for the most part, it's quite simple. Mac users face no trouble at all, as setting up Internet sharing in OS X is just a couple of click away, but for Windows users the process can be a little bit more laboured. The built-in options don't always cut it due to the complicated setup and reliability problems.
Internet sharing on Windows 7, Windows 8, or Windows 8.1
Thankfully, there are quite a few apps that let you use your machine as a Wi-Fi hotspot. Before you use any of these apps, you may want to check the steps onMicrosoft's site to see Windows' built-in Internet sharing and see if you have better luck than we did. We do recommend that you skip that and use a third-party app instead, since the experience is usually much better.
We tested some popular apps that let you do this - Connectify and Virtual Router Plus. The latter didn't work very well for us. Our anti-virus flagged it as a threat and during installation it tried to make us install unwanted software.
We didn't have the same issues with Connectify. It is a reliable app for turning your computer into a Wi-Fi hotspot. Before you proceed, know that you will need a Windows PC with a Wi-Fi adapter (or built-in Wi-Fi) to make this work. If your computer does not have Wi-Fi, then you can buy one that connects via USB, such as this one.

Here are the steps to setup your Windows machine was a Wi-Fi hotspot:

1. Download Connectify and install it. The installation is pretty straightforward and when installation is complete, restart your computer.
2. After restarting the computer, check whether it is connected to the Internet. If it is, run the Connectify Hotspot app.
3. You'll see two tabs in the app - Settings and Clients. In the Settings tab, under "Create a..." click Wi-Fi Hotspot.
4. Under Internet to Share, you'll see a drop-down menu. Expand it and select the connection you want to share. We tested this app with a wired and a wireless connection and found that it worked perfectly with both.
5. Under that, you'll see some more options. Add a Wi-Fi password. Click Start Hotspot.
That's all you need to do. Now other devices will detect a Wi-Fi network labelled Connectify-me. Key in the password and you're good to go.

Connectify is a paid app, but it has a stripped down free version. You can create a hotspot with the free version, but the main limitation is that it automatically disconnects every 30 minutes and shows pop-ups asking you to buy the pro version. You'll have to re-enable the hotspot manually to start using it again.
The Pro version has more features and costs $25 (Rs. 1,550) for a year and $40 (Rs. 2,450) for a full licence. Apart from unlimited hotspot uptime, you get features such as custom hotspot naming, the ability to share Internet from 3G and 4G networks (for sharing USB Internet dongles), and advanced firewall controls (choose which devices can access Internet and personal files on your LAN).

Internet Sharing on OS X

Mac users have it a lot easier. Here's how to share your Mac's Internet connection.
1. Open System Preferences > Sharing > check Internet Sharing on the left.
2. On the right, expand the drop-down menu next to Share your connection from: and select the connection you want to share. You can share Internet connections from Ethernet, Wi-Fi, Bluetooth, or even iPhone USB.
Typically, you'd want to select Ethernet, if you are using a wired Internet connection iMac, Mac Pro, or MacBook Pro. If you are using an external Ethernet adapter with a MacBook Air, you'll want to select USB Ethernet or Thunderbolt Ethernet, depending upon the kind of dongle you are using (usually it's USB).
3. Just below that, there's a box next to To computers using: where you should check the box next to Wi-Fi.
4. Click the Wi-Fi Options button below the box. Pick a Network NameSecurity Typeand enter the password twice in fields named Password and Verify. We strongly recommend you choose a password, instead of leaving the Security option has None. You can leave Channel as the default value unless you know what you are doing. Click OK.
5. If the connection is active, you'll see a green icon and text Internet Sharing: On under System Preferences.

That's all. You'll be able to use the Internet on other devices now by connecting to the network you specified under Network Name.
That is how you turn your PC or Mac into a Wi-Fi hotspot. Are there any other ways that you used to get this done? 

Full Heart Satisfaction: Windows 10's Top 10 Features are here

Hemant Verma - 1:15 AM
Finally, the next iteration of Windows operating system is here! And, it’s called Windows 10, instead of the rumoured ‘Windows 9′. Though Windows 10 is slated to release mid-2015, Microsoft has started distributing the Technical Preview of the OS today via its Windows Insider Program. Windows 10 appears to be a relief for most of us (read me) mouse-keyboard users, who were highly disappointed with the largely unpopular Windows 8 UI.
Touted to be the next Windows XP-killer and marking the return of some of the features that Windows 8 had killed, let’s quickly take a look at the 10 most interesting features that you should know about in the new Microsoft OS.
1. Start Menu returns
After failing to convince us that its Metro UI was equally good for keyboard and mouse, Microsoft has taken a complete U turn. Yes, the highly anticipated and most consistent rumour about the Windows 8 successor – return of the Start menu – is true. Windows 10 shows a start menu on the desktop on the left lower side, just like what we saw in Windows 7. It does add some touch from the Windows 8.1 OS, like the right side of the menu can be seen with Metro-like live tiles. However, you get the option to customise it completely for a Windows 7 like look.



Windows 10 is seen in this screenshot. AP
2. Task View
You will find a new Task View button (Alt-Tab) that would show the task view interface meant for improving multi-tasking. Basically, you will view something like the stacked cards that you see on hitting Windows-Tab. Going by the images; it now looks more refined, though.
3. Virtual Desktop
For enterprise and power users, Microsoft has added the virtual desktops feature in Windows 10. Virtual desktops let you switch between many desktops as per your convenience. It is already present via third-party Windows tools, but will come built-in in the new Windows 10 OS. It should be noted that Apple’s OS X, and many Linux distros already come with support for virtual desktops.
4. Universal apps
The much universal app model will finally fall in place with Windows 10. Basically, Windows Universal apps are said to combine all your apps so that they can presumably run on all Windows devices including desktops, phones and gaming console. All apps will be under one app store and Windows 10 will also support older app stores.
The refined Task View
The refined Task View
5. Continum
This can be easily called one of the most interesting Windows 10 features. It is for Microsoft’s 2 in 1 devices that help to automatically change the mode if the device detects no keyboard is attached. Basically, news has it that a back touch button appears to help you navigate in case the keyboard is removed.
6. Metro apps
Though Microsoft ensures that you are no more forced to use the Metro apps, users can run Metro apps on the Desktop in a window. These apps come with an icon for more options, just like what we saw in the charms. With this feature, it looks like Microsoft is trying hard to bridge the gap between the desktop and Metro UI.
7. Snap
One will also find an improved Snap function. It allows windows to be tiled horizontally as well as vertically. The new Snap Assist feature works as per your preference, whether you want to snap windows into new screens or tile Windows.
8. No charms bar
Though the Charms menu was still present when Microsoft showcased the new UI, it is believed that the company will put it off eventually. Those not in the know how,  Charms bar is the right-side overlay used to access search, share, settings and so on. TheVerge had already confirmed that ‘Windows 9′ will come sans the Charms bar. However, as aforementioned, Metro-style Windows 8 apps get title bars that include an icon with the Charms components. It is also believed that developers will have to add features to enable the share Charm. We don’t yet have a lot of clarity on the Charms feature, let’s wait and watch.
Snap Assist

9. Hide Metro Interface
Now, it isn’t clear if the Metro interface can be completely removed  from Windows 10 for the Desktop. It still seems a neat option for hybrids, but in  case of desktop, Microsoft is believed to add a check box that lets you opt for “never show me the Metro interface.”
10. Easy shut down
A small, but extremely essential feature Windows 8 users have been waiting is easy shut down. In Windows 8, users had to navigate through Charms, log off, and then shut down the computer. Now, Microsoft takes us back to the pre-Windows 8 era by introducing an easy shut down. Now, you can simply press Alt+F4 while viewing the desktop and choose from options including shut down from the drop menu.


Windows 10 is Coming at Our PC Home: What Experts are Saying about it?

Hemant Verma - 1:11 AM
The next iteration of Microsoft’s Windows OS is here! While it’s the latest version of the OS, Microsoft has clearly taken a step backwards with obvious cues from Windows 7. While it had tried to move in a completely new direction with Windows 8, the all new Windows 10 seems to bring back the Windows 7 feel and what possibly it feels to have worked from the Windows 8 variant. This doesn’t come as a surprise, as Windows 8.1 itself was a small step backwards, if you remember.



The technical preview is out, which is still an unfinished version, which means Microsoft has some time to add further tweaks until the final version is launched in mid of next year. Meanwhile, here’s what some tech critics are saying about the new Microsoft OS.
Evidently, everyone is happy that the Start menu is back! It has been one of the most awaited changes.
“Microsoft has given in to critics and brought back the traditional start menu that people will recognize from Windows 7. That means consumers can click on the window icon and have a menu pop up showing their documents folder, PC settings, command prompt, and the like. Microsoft has also tried to placate people that were accustomed to the tile-based interface of Windows 8 by, in essence, gluing a few tiles onto the right side of the start menu,” saysBusinessweek.
The refined Task View
The refined Task View
“The Start menu itself can also be resized endlessly and you can add as many live tiles as you want. In Windows 10, the size of the Start menu is really only limited to the size of your monitor. The demo we saw was surprisingly fast and the menu was responsive, even when dozens of live tiles were added at once,” points out Mashable.
With Windows 8, Microsoft tried to bring in familiarity with its desktop and mobile OSes. However, desktop users were clearly not pleased. In its Windows 8.1 update and the upcoming Windows 10, it is trying hard to woo desktop users. With the rising popularity of Chromebooks, Macs and others, we are sure Microsoft doesn’t want to leave a stone unturned.
“One of the biggest criticisms of Windows 8 was that it was difficult for users of mice and keyboards to navigate the interfaces designed for touch, and touchscreen users had trouble navigating the traditional desktop that works so well with a mouse and keyboard. With Continuum, Microsoft appears to be taking that criticism to heart, and it says the new interface design smoothes those transitions,” points out TheVerge.
In its bid to offer better multitasking, the company has also introduced Task view. While testing the Task View feature, Mashable felt it “worked seamlessly” and the user could quickly and easily switch between multiple applications. “The features we have seen are quite promising, particularly for those who were unsatisfied with Windows 8’s emphasis on touchscreen devices. Microsoft has undoubtedly shown they are willing to listen to what their users want,” adds the Mashable report.
While some people feel Microsoft is finally listening to users, other think the company is losing conviction of its own ideas and giving in to user demand without putting in efforts to prove its point. A report by TheVerge states, “What we saw today in San Francisco worries me, and it should worry anyone who wants Microsoft to succeed long term. This looks like a Microsoft that is unwilling to try things, one either without good ideas or without the confidence to commit to the good ideas it’s already had. Windows 8 was an attempt to reinvent the way we use our most important and most personal devices, but now Microsoft doesn’t even seem to be trying.”
“Windows 10 is all about balancing the demands of different users. It’s not just business users with desktop PCs and keyboards, versus tablet users. Windows is for sensors and data centres and Windows Phone and Xbox One as well as tablets and laptops and desktop PCs and giant wall screens and all the devices in between (at least in Microsoft’s ambitions). But what we’re seeing in this first technical preview release is very much about balancing the heritage of two decades on Windows with the new world of touch,” states Techradar.
“It’s telling that throughout its entire event, Microsoft seemed to be speaking not to Windows 8 users, but to the customers who took one look at live tiles and decided to stick with Windows 7 or Windows XP. The problem wasn’t that the features didn’t work or that everything was too damn colorful. It was that there was too much training involved — Windows 8 is just way too hard to learn, and most people just didn’t want to go through the trouble. So Microsoft kept as much Windows 8 as it could, while reverting the core pieces of the operating system back to something people know and understand,” adds the report.
Finally, the charms menu dilemma still continues. While the company is believed to kill the Charms menu, it did appear at the event. However, news has it that the final version will come sans the Charms menu. “Though Microsoft’s Joe Belfiore demonstrated that Charms still exist on stage, it wasn’t present in the build we tried after the event. A Microsoft rep told us that Windows 10 won’t actually have a Charms Menu unless you’re using it on a touchscreen, and even then Microsoft hopes to encourage app developers to build the touchscreen buttons right into their apps rather than use a global menu,” says Gizmodo.
In a nutshell, Windows 10 could be reprise for Windows 8 users. It is clearly a mix of what we saw in Windows 7 with a dash of Windows 8. It isn’t completely new, yet comes with some cool features and welcomes back some highly anticipated features that were ditched by Windows 8. Read Top 10 interesting features of the Windows 10 OS. The technical preview doesn’t offer all features that are expected in the final cut. This leaves Microsoft with good over six months to make further changes to its OS.

How to Spy on Others Websites?

Hemant Verma - 12:45 AM
There are times when most of us would not mind doing the most condemnable acts to beat our competitors and to promote our business.
I myself have devoted a lot of time to study the strategies followed by some best bloggers whom I have deep respect for.

Though we do have some tools, techniques and apps which can help us take our online competitors hands-on, let us talk about the strategies we need to adopt for the same.

  • Know Thy Rivals’ Psyche
First of all, try to bear in mind that your rivals, like you, are vying for the top position in search engine rankings. It holds as much value and importance for them to get to the enviable positions on Page 1 as it would to you.
They also probably think the same way as you do. So, how can you study their techniques, get to the bottom of their strategy and eventually beat them to get on the top of the rankings chart?
  • Keywords in Bold And/ Or Italics
Secondly, look for all the words your rivals are putting in bold and/or italics. Though most experts would want to suggest that doing so does not help you get any extra mileage to help get your keywords noticed, your competitors might be using this old trick which you gave up long ago to get noticed by search engine crawlers. So, if you can spot your rivals’ keywords with just a cursory glance, could it get any better for you?
  • Is He Into Affiliate Marketing?
Are your rivals promoting certain products and planning to earn as affiliates?
If yes, what are the products and/ or services they are promoting?
What are the anchor texts?
What are the underlined, bold or italicized words?
  • Keywords Appearing all Over the Page
If you have been unable to spot out the competitors’ keywords using both the techniques listed above, take a close look at the url first.
Now see if he is trying to use the same keywords as anchor texts.

After that, you might be able to spot them in the content as well. And might discover a few of them appearing more than once on the page.
Doing this, you will be able to know for sure your rivals are looking to get ranked for.
  • The Source Code
Now, getting to the source code is the best way out of getting to know your rivals’ keywords, no matter how hard he has tried to keep them hidden or not to reveal them.
Press Ctrl+U on any webpage to know its source code.
Once you see that, you can press Ctrl+F to see a search bar at the bottom of the page.
Look for the following things in the source code:
  • Keyword: it will not be easy to know the exact keywords your rival is trying to optimize for if you haven’t been able to do it so far, because he obviously knows how to keep them hidden. If you can see a Keywords MetaTag, you will know them.
  • Description: This description can appear anywhere along the source code. Try to read this meta description and try to spot out the mirrored keywords from here. If the rivals’ meta description is really smartly written to get the maximum mileage out of 160 characters, try getting a few cues from it and improve your own meta description using that.
  • H1 tag:  Taking a close look at the H1 tag and the text that has been inserted therein to get to know the keywords better.
  • ALT text: Most smart website builders insert one or few keywords in the Alt text whether or not their websites are image based. Look at the Alt text of the images on the page to know the keywords better.
Conclusion
Once you have done a thorough investigation of your competitors’ website(s) using the simple techniques listed here, you will find it easier to beat them because you will be able to create a keyword profile which is wide and varied.
And you might come across a few keywords which get more monthly searches, have a really high CPC and lower competition than the ones you were previously targeting till now with much lesser effort.

About Author:
This article is written by Amit Pal from Pune and he is a newbie in blogging of web and tech writing, He doesn't belongs to any blog but he is still doing his best with his first blog and that will be www.palswebtech.in

Previous
Editor's Choice

 



Make Your Blog Like a Pro
About | Contact | Affiliates | Privacy Policy | TOS