Saturday 8 April 2017

How to backup images/Photos in device folders to Google Photos

How to backup images/Photos in device folders to Google Photos



Pictures and Photos are one of the most common ways of saving our happiest moments of life, these pictures are taken in every stage of life, even when we are born our parents and family members take our pictures so that they can remember us as a baby for a lifetime. In the old days, people did not have any of the modern forms of technologies or mediums to save the photos digitally, so the rich people used to make portraits of the things which they loved the most and even of themselves. The pictures were made by professional artists who were trained in making such portraits with perfection and precision. To make these picture the artist have to devote a lot of time and it was also very challenging work which needs much of hard work to make the images in the same manner.
Revolution in Photography:
As the time changed and technology developed the methods of photography changed and then came the cameras which took black and white images and then the colored cameras and finally the Digital Photography can into existence which changed the whole meaning of photography. Previous people used to save these pictures in negatives or in big bundles of photo albums with used to get affected by the passing time but with the digital exposure to the world, now the digital photos are stored in digital devices which we can even carry with ourselves without any trouble such as; CD’s, DVD’s, Memory Cards, Pen Drives, Hard Drives, Smart Phones, etc. but still sometimes we forget or by mistake we lose our important photos and then it becomes tough for us to get those pictures back.
Where to save our Photos so that we can recover it at any point of time?
One of the best mediums to save all the important photos so that it can be recovered at any point of time is on the Internet Drivers, these internet drives are present in the online world and one can securely save all the photos in his personal online account. One of the most secured and best places to save your photos in the online world is the Google Photos.
How to backup images in device folders to Google Photos?
  1. Open the internet and the open up the Google Photos individual app on your device.
  2. Once the app is open on your device then look for the Assistance button at the bottom.
  3. When you click on it, then you may get in front of your screen that; Waiting for the Wi-Fi connection or Waiting for the internet connection. You need to change your internet connection and turn it on.
  4. Once done then on the next page you will get the option of i.e. Backup and Sync which is ‘off’ until that time. You need to turn that option ON so that all the photos, images and videos can be easily stored in the Google Photos.
  5. Once done the then the backup process will start and after a few minutes you will get a notification that the backup process is completed which means that all you pictures are safe in the Google Photos.

How to Use Mobile Cam as PC Cam - Simple & Easy Tricks:

How to Use Mobile Cam as PC Cam - Simple & Easy Tricks:



Majority of Smartphones are equipped with rear and front cameras that could not only be used as standalone system but would also double up as a cam for personal computers or laptop. Instead of buying a brand new web cam, the old mobile phone can be utilized to accomplish the task. There are few tips and tricks that could make it possible for the users.

For the Android users:
Google Play consists of various web cam applications that can easily work with the phone however in order to work on the PC, the app should be installed on the system.
If you have an android phone, connect it to the computer and make sure that both are in the same Wi-Fi network.
Suitable cam app should be installed on the smart phone. Before starting the process, close all the other applications because they can interfere with the working of the cam.
Invoke the IP web cam application and click on the Start server button. It will initiate connection and the camera would be launched. It will also display the required URL which may vary according to the smart phone used.
In order to access the smart phone camera on the computer, fire up the browser and type the URL in the address bar.
It will provide a drop down menu close to the video renderer. You can select the browser option and activate the HTML.wav file. Once all the steps are completed, the live video appears on the screen. Instead of using the HTML file, try the VLC media player as it doesn’t allow any lag on the recording of the video clips.
The security camera would work even if the screen of the phone is switched off nevertheless when the gadget is on; the streaming video is of far higher quality and without lag.
For the Apple users:
Although free cam apps are available in the iTunes store, they provide only black and white videos devoid of audio signals. Premium version of the cam apps are studded with numerous capabilities.
iPhone users should make sure that the computer and the smart phones belong to the same home network.
The paid version of the app should be installed on the phone as well as on the system.
Installation of the application is followed by the installation of the audio and video drivers for seamless display of camera.
Once the application is launched on the computer, it automatically detects the cam application running on iPhone in the same Wi-Fi network.
Although recording button is not available, it is possible to record videos with the help of third party app from iTunes store.
Camera phone can be utilized as a web cam to initiate video calls from the personal computer or laptop. Applications such as Skype could be used to remotely converse with people provided that the internet connection has faster speed. Prior to starting with video chatting, install the camera set up on the computer followed by the installation of Skype.


Tuesday 4 April 2017

Worldwide Android surpasses Windows obn the Most Userd OS (Operating System)



Worldwide Android surpasses Windows obn the Most Userd OS (Operating System)

It was just a few weeks ago when web analytics firm StatCounter predicted Android would overtake Windows as the most popular operating system online. Well, it didn’t take long. The latest numbers from StatCounter show Android with a narrow lead over Windows. After less than nine years, Google’s open source operating system is bigger than Windows
 
The numbers from last month placed Windows at 38.6% of web traffic, while Android was just behind it at 37.4%. The two might go up or down a little each month, but the overall trend was up for Android and down for Windows. That’s what happened in the last few weeks, apparently. Android is now on top with a 37.93% share of web traffic, and Windows has fallen to 37.91%. It’s a tiny lead for Android right now, but it’s likely to continue growing.
“This is a milestone in technology history and the end of an era,” according to StatCounter CEO Aodhan Cullen. Windows online usage was still over 80% as recently as 2012. That was back in the era of Windows 7 and Android 4.0 Ice Cream Sandwich. Android was still in the single digits then, even lower than Apple’s iOS, which has remained steady at just shy of 10% for years. Android’s online presence was lacking not only because of lower sales, but due to the more limited nature of the platform.

Android has achieved this growth without any presence in the traditional PC form factor. Consumers simply don’t buy as many laptops, and the machines are used for longer when they do. Smartphones get much more usage, and tend to be upgraded every year or two. Android device makers already ship more units than Windows PC retailers, but now they’re actually accounting for more usage. 


If there’s a bright spot in all this for Microsoft, it’s that online activity in some regions still favors the desktop. In North America, Windows is still in the lead, with 39.5% usage and iOS in second place at 25.7%. Android is in third with 21.1%. Europe is 51.7% Windows with only 23.7% Android. It’s the rest of the world that helps Android make up the difference, including a whopping 52.2% share of web activity in Asia.

Windows usage will probably continue declining, but only to a point. As long as powerfu desktop operating systems are better for getting work done, people will use them. However,the increasing capabilities and affordability of Android should give Microsoft reason to worry about the future. Linux might win after all.

Samsung launches the Galaxy S8 AND S8+

Samsung launches the Galaxy S8 AND S8+


Samsung took the lid off its latest Galaxy S8 devices this morning, showcasing the Galaxy S8 and S8+. It’s the first flagship device Samsung has launched since the disastrous Galaxy Note 7 (refurbs coming soon to a country probably not near you), and its first opportunity to showcase its premium smartphone that’ll go up against the iPhone 8 later this year.

The Samsung GalaxyDDFThe Samsung Galaxy S8 is a 5.8-inch device with a Snapdragon 835 Platform processor and a display that covers virtually the entire phone. The top and bottom bezels are extremely small, while the screen curves over the left and right edges (Samsung is marketing this as an Infinity Display), and the feedback from sites like The Verge is positive. Samsung is also dedicated to moving past the Note 7 debacle. DJ Koh, president of Samsung’s mobile business, told the audience “The Galaxy S8 is our testament to regaining your trust by redefining what’s possible in safety.”


The Samsung Galaxy S8 is a 5.8-inch device with a Snapdragon 835 platform processor and a display that covers virtually the entire phone. The top and bottom bezels are extremely small, while the screen curves over the left and right edges (Samsung is marketing this as an Infinity Display), and the feedback from sites like The Verge is positive. Samsung is also dedicated to moving past the Note 7 debacle. DJ Koh, president of Samsung’s mobile business, told the audience “The Galaxy S8 is our testament to regaining your trust by redefining what’s possible in safety.”

The glass of both phones is Gorilla Glass 5, from Corning. We’ve grabbed a couple slides off their presentations to demonstrate how well it deals with various scratches compared to previous versions of GG, and one that shows relative strength compared to Gorilla Glass 4.

Since there’s no longer any room for a traditional home button, Samsung has switched to using software buttons and some haptic feedback, like Apple’s newer iPhones do. Unlike what earlier rumors suggested, Samsung did retain a 3.5mm headphone jack for the S8 and S8+.

Differences and similarities between the S8, S8+

The US version of both phones uses the Snapdragon 835 on 10nm with a 2.35GHz high-end clock and a 1.7GHz low-power clock (four cores in each cluster, eight cores total). The International version uses a Samsung Exynos 8895, clocked at 2.35GHz / 1.9GHz in a similar quad-core cluster configuration.
The Galaxy S8 has a 5.8-inch OLED with a resolution of 2960×1440, 570ppi. The S8+ has a 6.2-inch OLED at the same resolution, giving it a slightly lower (though still absolutely gorgeous) 529ppi. The rear camera don’t seem to have changed, but the front is now an 8MP camera with support for autofocus.

The rear is a 12MP camera with optical image stabilization. The Verge reports that the camera is much faster than the S7 Edge, despite having identical hardware specs. Picture quality may also be better thanks to software optimization.

Photoshop CS4 Complete Video Course in Hindi



Photoshop CS4 Complete Video Course in Hindi & Urdu

Photoshop’s CS versions are great to use for graphics designing. Photoshop 7.0 was a great software and ran for a long time. It was very simple and easy to use. But later on, Adobe introduced Photoshop CS version and till now CS6 is the newest version of Photoshop series. I already published complete video tutorial on Photoshop 7.0 in Urdu language. While today I am going to share a complete video course of Photoshop CS4 with you guys. This course is also in Urdu language and you can learn it by watching below playlist of video tutorials. This course is created by Javeed who makes video tutorials mostly on graphics designing software and I have also a plan to make complete video course of Photoshop CS5 or CS6 very soon.
Photoshop Tutorials in Urdu
So in this series of tutorials you’ll learn PS CS4 complete with a single playlist, this playlist contains dozens of video tutorials, you need to just watch one video tutorial and the another will be played automatically. As I already mentioned that this course is not created by me, but I’m will be publishing a complete Photoshop CS5 course just within few days, because I’ve already created that and I’ve also uploaded that to YouTube.com. There are more than 40 video tutorials in my upcoming Photoshop CS5 complete course, so I hope you’ll like that as well. But for now you can enjoy learning PS CS4.
Any help that you need can be asked by commenting below this post, and I always try to respond to every comment posted on this website, I really like your feedback and appreciation and also your questions. So I’ll be more happy to answer all of your questions here and to help you out regarding your issues.
Happy Graphics designing and take a lot of care of yourself and your family.



Any help that you need can be asked by commenting below this post, and I always try to respond to every comment posted on this website, I really like your feedback and appreciation and also your questions. So I’ll be more happy to answer all of your questions here and to help you out regarding your issues.
Happy Graphics designing and take a lot of care of yourself and your family.

Sunday 2 April 2017

10 ways for safe digital and cashless transactions

10 Ways For safe Digital And Cashless Transaction




A digitally-empowered society has only one major nemesis – breach of information security. The productivity and convenience of living in a highly interconnected and digitised world do come at a price. The more digitised data drives us in our daily lives, the more exposed we may get to it being stolen or compromised. Naturally if not tended to as desired, such security breaches lead to significant financial and reputational losses and emotional distress.
India, a largely cash-based transactional society, has begun waking up to the new world of digital wallets, micropayments, and cashless transactions in last quarter or so. According to the government estimates, we will experience about 2500 crore digital and cashless transactions in 2017-18 to occur across digital payment modes. Obviously, the risk exposure has just become even more profound for end-consumers like you and me.
Here, we must remember an age-old adage that’s as clichéd as it can get – a chain is only as strong as its weakest link. While financial institutes, regulatory authorities, and technology platform companies would continue to work with security experts and solution providers to safeguard our money against risks, breaches, and thefts, the buck also stops with us.
Drawing from my individual and corporate experience of information security, in addition to having stronger passwords etc, we would recommend ten ways to keep us safe in the digital and cashless transactional society:

1.      I Improve your awareness: Lack of awareness exposes you to a highly risky environment. You need to be clued into the latest developments on the kinds of risks occurring around you, the modus operandi of perpetrators to steal your belongings, and the features your financial institutes and technology providers are adopting to keep you safe in the online world. Vishing (voice phishing), phishing and other social engineering frauds can be only dealt with the spread of awareness.
2.       Avoid complacency: Just as you would be careful about your wallet in a crowded place, you should pay attention to how and from where are you accessing your digital transaction platforms, such as digital wallets, banks’ apps, Unified Payment Interfaces, Aadhaar-enabled Payment Systems (AEPS), Netbanking (RTGS/NEFT/IMPS), and debit/credit cards. Similarly, you need to be careful with your passwords, PINs, and OTPs.
3.      Don’t download from third-party app stores: Established and branded app stores or marketplaces for mobile apps are largely regulated, monitored and sanitized. However, third-party app stores that are frequented for gaming cracks, hacked version of paid apps and more, are usually the breeding ground for vulnerabilities. Such apps may be riddled with concealed backdoors that leverage software vulnerabilities to compromise data on your devices.
4.      Don’t talk to strangers: Accepting apps, images or video files from strangers on a communication platform such as WhatsApp may expose you to similar vulnerabilities. Using steganography techniques, malicious codes can be hidden in such files to infect and breach your devices.
5.       Don’t auto-download media on WhatsApp: Similar to the above point, toggle the option to auto-download media on WhatsApp. It not only saves the unnecessary bandwidth but also ensures that you don't inadvertently download a compromised image or video file onto your smartphone.
6.      Update regularly: If you need to keep an auto option on, then it rather should be the auto-update of the apps on your devices. No software is completely secure straight out of the box. It’s an iterative process and the developers release updates to remove bugs, improve features, bolster security and plug vulnerabilities.
7.      Limit your exposure: While using digital payment apps or wallets, limit your risk exposure by adding smaller amounts to your wallet account. In the case of a breach, your loss would be limited to the amount in the wallet.
8.      Accept security over convenience: Usually, there are two aspects of digital transactions that plague us – remembering PINs and passwords, and multiple-factor authentication processes. However inconvenient, these processes are what keep us safe. Commit card PINs and netbanking passwords to memory and not make these unnecessarily accessible to perpetrators by storing these in your devices or writing it down. Avoid transacting on websites or on platforms that do not subscribe to two-factor authentication i.e. a transaction would be authenticated not just by a password but would need an OTP or biometric input as well.
9.      Secure your wireless connections: From our Wi-Fi routers to our computers, to our smartphones, and to smart home appliances, all are increasingly interconnected wirelessly. As we progress into the new Internet of Things (IoT) realm, we need to ensure that we secure the Wi-Fi connectivity across such myriad of devices. To begin with, you should always opt for WPA (Wi-Fi Protected Access) or WPA2 encryption standards instead of the weaker WEP standard. Secondly, you must maintain a stronger alphanumeric password combined with special characters. And, change it regularly. Avoid open Wi-Fi networks or unsolicited Bluetooth connections.



10.  If attackedIf attacked or compromised, do report: Often victims of online frauds, scams, breaches, or social engineering attacks avoid reporting the crime because of three possible scenarios – fear of hassling with law enforcing agencies, the quantum of financial loss is not quite significant, or lack of time. Without sounding preachy, victims of digital crimes need to understand that their reporting may or may not help them recover their losses, but will surely inform us about such occurrences, their modus operandi, and improve the overall awareness for stakeholders to significantly secure the digital and cashless India.