alexa

Player created by Inbound Now - Social Media Tools.

Wednesday, February 22, 2012

How to Block/Redirect a Website from your PC

website redirect


In this tutorial i'll be showing you how to block websites or how you can redirect a website to another one using the simplest trick.



How to Block a Website

Step 1: search for the application called "Notepad.exe" , right click it and click "Run as Administrator".
hosts file techtreck

Step 2: Go to the directory C: > Windows > System32 > drivers > etc
hosts file techtreck

Step 3: Change file type from (text documents) to (all files), locate the file called hosts and click open, it will look somewhat like the image below 
hosts file techtreck

Step 4: Now to Block a website, go to the end of the text and in the new line type the following:
127.0.0.1<space><website address> and Save it.
hosts file techtreck

Step 5:Bingo, you have successfully blocked the website from all browsers of your computer. Now try to open the website you blocked and you will be prompted by the browser saying something like, "the website is not available".

How to Redirect to Another Website

Simply follow Steps 1,2 and 3.
Then in the forth step, replace 127.0.0.1 with the IP address of the website where you want the later to be redirected as shown below and save it.
hosts file techtreck

To obtain the ip address of a website, simply go to command prompt and type ping<space><website URL> to get its IP address as shown below.
hosts file techtreck

Congrats, you have successfully performed a website redirection using Hosts.

Those who prefer a video tutorial, here you go guys:
   

Prank Ideas# you can redirect suppose google.com to adult sites like playboy.com etc. in your collage lab to make your friends or maybe teachers feel embarrassed. 


Liked This Article? Take 5 seconds to share it.

3 comments
Read More

Monday, February 20, 2012

Best 5 Mp3 Players For You - Review 2012

best mp3 player 2012 review
Nowadays Mp3 players are not only just a device where you only play music.It has become more of an all purpose device where you can play games as well as watch movies,surf the internet as well.So here we present the Top 5 most popular feature packed Mp3 players or in short the best mp3 players in the market now.


Apple iPod Touch(32gb):
The new Apple ipod touch is a feature packed music player with infinite number of features and apps included in it, from gaming to messaging to internet.Its not just a Mp3 player but something more than that.And the open source Apps development will only provide more and more improvements to the device.
Price:$300.

Zune HD(32gb-platinum):
The Zune HD is one of the best portable music player in the market with the best music and video experience that can be bought.At a time when everyone is shifting their interest to games and other Apps,providing a powerfull media experience is not enough for Zune buyers.
Price:$220-$290.

Creative Zen X-Fi:
It has some nice features such as good earbuds,lot of memory storage,and good sound with at a very reasonable price.It also got networking and streaming capabilities.But with the good side comes the bad side as well.The plastic body looks a little down market but its durable.It also has a very small screen for videos and photo viewing.Overall its offers you a good package of media at a very reasonable price.
Price:$99.95.

Sony Walkman NWZ-S738F:
The Sony Walkman series was my first undoubtedly the first music player i fell in love with much before the Apple iPod came into the market.But nowadays Sony walkman has lost its potential market to Apple.The new Sony Walkman has lot to offer to all those Sony lovers.It comes with better earbuds,noise cancellation feature.Its sturdy as well as stylish.But the worst part is that you cannot use the headphones with any other devices and the screen is too small for video or photo viewing.Its one of the best audio players in the market though but not a good choice for video or photo viewing.
Price:$109.99

Cowon O2:
Another player in the mp3 market is the Cowon O2.It also comes with a pack of features to look into.The most attractive is the large,interactive touch screen.It also offers good sound and video features.But the down side is that it cannot play DRM-protected formats and also it does’nt have a ID3 tag sorting which is great disappointment.Altogether it supports a lot of formats but the ID3 tag sorting remains a disappointment.
Price:$221


Let us know what Mp3 player do you use in the comment section below.
You may also like reading: Top 5 Antivirus For Your Mobile click here

Technorati Tags:
0 comments
Read More

Friday, February 17, 2012

The Pirate Bay to Stop Serving Torrents from 29th February

The Pirate Bay, which is still now one of the most popular torrent website on the internet, has declared that they will stop serving .torrent files from Feb 29th this year.
It was recently declared in the pirate bay blog recently that they will permanently move to magnetic URLs from now on.
The following is a preview from that post:

In following with our decision to skip .torrent-files in the nearby future one of the biggest steps will come on the 29th of February. We will stop serving .torrent-files for all torrents that has has more than 10 peers from this date.
End of communication.
Posted 02-13 06:32 by MrMagneto @ piratebay
0 comments
Read More

Thursday, February 16, 2012

How To Block/Skip Survey Popups

One of the most irritating things I face now-a-days is Survey Popups which pops in on so many websites .
POPUP SURVEY REMOVER TECHTRECK


Here is a trick to Block or Bypass online surveys.
There is a cool tool called XJZ Survey Remover Bookmarklet which helps you to do just that.


All you have to do is visit the link and add the script to your bookmark bar and click it whenever you encounter a survey, to remove it
survey-remover.com/bookmarklet.


Note: This trick works only in forefox and chrome.
0 comments
Read More

How Will You Look ~ IN 20 YEARS

Ever wondered how you will look, say 20 or 30 years from now? Well we all did at-least once I bet. Due to latest advancements in Face Recognition Technology, now you can do just that through a very cool website called In20Years.com.
All you have to do is visit the website In20Years.com and upload a clear photo of yourself.


You also have to chose your gender and the span of years after which you want to see how you'll look(like 20 years or 30 years).
You also have to choose whether You are a drug addict or not.. Seriously, no kidding.


And the program then analyses your photo and gives pretty attractive outputs, or you may call it future visions either.


Below is a picture of me IN 20 Years:




Technorati Tags:
2 comments
Read More

Top 5 Mobile Anti-Virus

There are hundreds or mobile security suites available on the internet. But which ones are the best? Here is a list of 5 most popular antivirus’s for your mobile phone to choose from.



BullGuard mobile anti virus:(for Android, Symbian, Windows, Blackberry)

The Bullguard mobile security software protects your phone form Trojans,virus and worms.The viruses can spread through text or media messages,internet download and bluetooth.The anti-virus protects you from phone from viruses using real-time detection.
Special Features: Anti Theft
Price $39.95.
Kaspersky Mobile Security:(for Android, Symbian(s60), Windows, Blackberry)

Kaspersky undoubtedly does a fantastic job against malware,viruses or even can be used to find your lost phone..Kaspersky Mobile security is one of the best smart phone security pack available in the market and you can always count on them in terms of data protection.
Special Features:Anti Theft,Privacy Protection
Price $29.95



Trend Micro Mobile Security(for For android):

The Trend  Micro Mobile Security is one of the best mobile security software and has one of the best call barring features,parental control tool and lots more.Though its one the best in market,this application is only available for Android OS.
Special Feature:Centralized single console manegement.
Price $29.99
Look Out Premium Mobile Security(for Android,Windows and Blackberry):

The Look Out Premium Mobile software continuously alerts you about the information accessed in your phone by your downloaded application.Though its has many good features but its customer support service lacks a few features.But the software is ideal if you download several number of application.
Special Feature:Best for Android
Price $30.00

NetQin Mobile Security:(for Android, Symbian(s60), Windows)


The NetQin Mobile Security provides effective protection against malware.Though NetQin is one of the best in the best in the market,but lacks anti-spam features.Overall the unique capabilities make this a good choice but the missing features are a drawback.
Special features:User friendly.
Price $30.35
Another close competition to this list was McAfee Global Threat Intelligence Mobile for IOS(Iphone and Ipad).

Let us know what anti-virus do you use in the comment section below.
1 comments
Read More

Friday, February 10, 2012

Picnik is Closing this April

PICNIK IS CLOSING~~~TECHTRECK.IN

Picnik, the very popular online photo editing website will close permanently on April 19, 2012. Shocked? Well that's what millions of customers are right now.


Picnik is offering a full money back for its existing premium users and has not mentioned the correct reason for its roll out.


As a tribute to millions of customers who has been using their services for quite a long time, Picnik is giving their Premium features free for everyone till their closing day.


The following post appeared today on the website of Picnik.com

Official Announcement: Picnik is closing

posted by lisa Jan 20th, 2012

Since joining Google in 2010, we have been creating editing magic in Google products while continuing to keep Picnik awesome. But now we get to focus on even awesomer things. Picnik will be closing on April 19, 2012.
Your photos liberated
Amazing photos are created in Picnik so we have launched a new feature,Picnik Takeout, that easily downloads your photos to your desktop in convenient zip files. You may also elect to copy your photos to
Google+ where you can store and share your creations. You may request your photos at any time and use this handy tool as many times as you like until our closing date of April 19, 2012. Learn More.
Premium Refunds
To our primo Picnik Premium members, we’ll begin processing a full refund of your current membership fee within a week of this announcement. By “full” we mean the whole darn thing. Yep, this means even if you are on your very last day of an annual membership, we will refund you the entire $24.95. Just because we want to say thanks.
Now the Good News – Free Premium for ALL!
To express our gratitude for your support over the past 5 years, Picnik Premium is free for everyone! Use Picnik in all of its premium glory, for free, from now until our actual closing day. Touch-up, Textures, Advanced, and more are all free for you to use!
We have been incredibly proud of building a product that is used and beloved by so many of you. We continue to be amazed and humbled by the photos you create and we are immensely grateful for all of your support, creativity, and passion.
We are excited by the photo-editing fun we have already brought to Google products, like Google+, where you can find many of your favorite Picnik effects in Creative Kit. We encourage you to visit Google+ and give it a whirl.
Please visit the Help Hub for more information on our wind down. Check the Picnik blog for updated information on our April closure.
It’s been awesome,
Team Picnik
0 comments
Read More

Wednesday, February 8, 2012

How to Secure Your Cell Phone

secure your cell phone
Did your girlfriend just send you a sexy pic of her? How would it feel if it landed on the internet?

Securing your mobile phone from hackers is one of the major concerns among this generation.The increasing threats have turned the eyes of various mobile phone security experts for the prevention of security breeches.

Here are some basic steps for your cellphone's security boost:

Bluetooth

bluetooth logo
In order to protect your cell phone from wireless hack make sure your bluetooth is always off when not in use as many explicit hacking applications can actually copy your files, view your inbox slash phonebook and also change passwords "without even your authentication".


Mobile Security Software/Antivirus

A good mobile antivirus software must be installed on your cell phone. Some anti-viruses like F-secure also has a anti theft feature which sends out text messages to preset mobile numbers whenever someone replaces your sim card with another chip. 

Password

Did you leave your cell phone on your friends couch when you went to the bathroom? Ahh.. so what? No one could ever sneak into your cellphone or memory card which contains hundreds of private things- as it is password protected. Right?
Well i disagree. With most mobile phones having you to set a 4 digit phone lock code, it is not that hard to try a guess and most of the times it might work.

Some of the most common passwords as noted by osxdaily.com are:

  • 1234
  • 0000
  • 2580
  • 1111
  • 5555
  • 5683
  • 0852
  • 2222
  • 1212
  • 1998

  • Encrypt your Files

    Almost majority of the smart phones like blackberry, Android and Iphones have built in encryption technology but still if your phone is missing it download a 3rd party encryption software like the one from whisper systems.
    An encryption software encrypts all the importact datas on your phone like phonebook, messages etc and make it unreadable it someone manages to intercept it.
    0 comments
    Read More

    Tuesday, February 7, 2012

    How to recover accidentally deleted files

    Did you delete an important file by accident? Or lost something important when your computer crashed? Now you can restore all stuffs within seconds.

    I'm sure that anyone who has ever user a computer or any tech gadgets have faced a situation when he/she wished if they could recover their deleted recycle bin or the deleted files of our memory cards or flash-drives which may be documents, photos, text files and even videos.


    With the advancement of technology, now you can easily restore deleted  datas from any storage drives(pen-drives, Externals, memory cards) with the help of a very cool software called Recuva.


    Recuva offers cool features like:


    Undelete files on your computer

    Recovery from damaged or formatted disks

    Recovery of deleted emails

    Recovering deleted iPod music

    Restoring unsaved Word documents 

    And even securely deleting files permanently forever.

    An actualy screen shot of Recuva in action is given below:


























    Technorati Tags:   
    1 comments
    Read More

    Know your friends IP Address using Email

    I know there are millions of people out there who have the same question in their mind... how to know your friends IP Address, As for hackers, the very first thing you need to know is your friend's IP Address.If you are one of those millions, bingo, you are in the right place.


    There is a very cool website called Spypig which allows a user to paste a very small rectangular white image which is virtually impossible to notice(as the default background is always white) into the email.
    Actual screenshot of spypig.com




    Next you send the email to your friend and thats it.


    As soon as your friend opens that email, Spypig sends you another email which contains informations like when the email was opened, the IP address of the victim, the Operating System he/she is using etc.




    Share this page if you found it helpful.
    1 comments
    Read More

    Monday, February 6, 2012

    "Your SIM card has a name" hoax busted

    If you are a regular user of Facebook, you may have already noticed a trick which probably many of your firends are posting, it says Every SIM CARD has a name. What's Your sim card name? and in the comments you can see hundreds or people discovering their mobile names which actually tag to real facebook people.






    Every SIM CARD has a name. Try this:
    1st step : from your mobile number number, take the last 3 numbers. Example- 9830120684, take "684"only
    2nd step: Write this @*[684:0] in the comment box below, replacing the 3 numbers      with your own.
    3rd step: remove the * sign and press enter in the comment box

    As the way phone numbers are generated, it is quite obvious that a lot of people have t he same last digits so the UNIQUE NAME thing is all nonsense.


    But how is this happening? Actually this is an old method(coding style) which facebook used to tag its users in its beta stage. As for example @[4:0] tags Mark Zuckerburg, the founder of Facebook. I have no idea why we cant tag anyone using the numbers 1, 2 and 3. Probably this is because, the first three numbers were used for beta testing.
    Now who are those people whom we tag using the three digits? They are the very first persons to create accounts on Facebook.


    So tag using any combination of three digit numbers as this is really funny(i tried this all evening) without worrying as this ain't anyways related to your cell phone or sim.
    1 comments
    Read More

    Polish your Hacking Skills with The Hacker's Underground Handbook

    Few days ago while surfing on the internet i found an e-book named The Hacker's Underground Handbook written by David Melnichuk. This pdf is worth reading for all you out there reading this post right now.

    This wonderful pdf ebook gives you a thorough knowledge on topics like:


    a) Password Cracking
    b) Network Hacking
    c) Wireless Hacking
    d) Windows Hacking
    e) Web Hacking
    f)  Programming
    g) Malwares

    This great ebook gave me a thorough knowledge on some coolest tips and tricks of hacking and also provided me with a lot of useful information.

    If you want to learn hacking and want to polish your hacking skills, this ebook is a must for your list.

    0 comments
    Read More

    Top 5 OS: Security-wise

    With increasing number of hackers, operating systems(OS) are intruded every now and then stealing away your private data. To be precise, any networked OS can be intruded how secure it may be. We use a variety of OS's today. Here is a list of the top ten most secure OS's in the world which are even today trusted for a lot of personalized security features.
    1.     OpenBSD:  It is the most fundamental operating system used by penetration testers mostly. The proof of its security lies in the fact that this OS has been exploited for 2 times only in the last decade. Recently OpenBSD was seen quoting on their website
                           "Five years without a remote hole in the default install!"


    2.           Linux: It is my most favorite operating system. Linux can be customized by each user altering some codes according to their own needs, well security can also be increased by customizing. Moreover Linux has an impressive vulnerability patching mechanism.

    3.      Windows Server 2008: This version of Windows Server has improved web server roles, backup and recovery options, user account controls, and server security configurations than its previous release, Windows Server 2000. Windows Server 2000 was also very most secure as it provided regular patches to protest machines from worms and hackers even a decade after its release.

    4.       Windows 7: This operating system is the updated transformation of Windows Vista, the latest release of Microsoft Windows. It has added new features like BitLocker Drive Encryption, improved firewall settings and parental control and also customizable security settings.


    5.      Windows Vista: All the blunders windows did in its previous releases like windows 98, windows xp etc. were fixed in this operating system but they eventually lost a good amount of potential buyers due to complicated security policies and compatibility issues with the older versions- but they were designed so to to make Vista a lot more protected from hackers.


    Other Close competitors were Windows Server 2003, Windows XP, HP-UX 11i and Solaris

    Technorati Tags:
    1 comments
    Read More
    Powered by Blogger.