Saturday, 3 December 2016

How to Compress Images On Android Without Losing Quality

In Android, there are many applications which are not available for Computers. In which if you want to compress any images then there is hardly any software available which can help you to compress image there are online websites available which will do changes for you. Today I am going to tell you about the application which will help you to Compress Images On Android without losing the quality.
Many of times we encounter the situation where we need to send any image to our friend and it is not getting send just because of high quality and size of the images or just because you have too slow internet.

This is absolutely fine. Just because we are coming up with one of the great application which will help you to edit the images and compress the size of the application in just some clicks.
There are many applications available but some of the applications are not working or else they are fake. This is the reason I am going to tell you one of the best application which will help you to edit the picture for you.

Compress Images On Android

Why do You need to Compress Image?

We have seen peoples using Websites to compress the images. Now, many of times we need to send those images to someone else? Then here this application comes to help you in the following situation.
I think no one is having time to compress the image and then again send it to your mobile using USB cable and then send it to your colleagues or friends. We don’t have to regularly open the website and compress the images for you.

Everything needs to be handy and fast everyone likes that you get the results in just some clicks. This is the best application which will help you to get the better results in just some clicks.

How to Compress Images On Android Without Losing Quality

This is the application which is ad free and this application pretty good in its features.  This application is having 2 ways which will be helping you out to loose the quality of the images.
The first method your image will be automatically compressed and you don’t need to do anything this application will be best and it can automatically set the quality and size of the image.
The second method is that you can choose your best settings this is the custom settings which will help you out to compress the images. You can choose your quality and your own way of editing the images.
  • Download and install the Photo Compress 2.0 Ad-free version from here:Play Store
Compress Images On Android

  • Open the application and you will see 2 options in which camera and gallery. You can choose any way to edit the picture.
Compress Images On Android
  • Now, simply load the image and you will see an option of Quick Compress. Just click on it and your image will be compressed.
Compress Images On Android
  • Then click on Replace and Exit and then your image will be replaced with the old image. This makes it clean and doesn’t create too many images and folders.
  • If you want to compress the image manually according to your choice then you can do so with the help of the Compress Button. After loading the image this can be easily done without any issues.
  • Set the quality of the image and then done. This way you can easily compress the images on your Android device.
Compress Images On Android
_____________________________________________________________






Top Posts

What Are Denial of Service and DDoS Attacks ?

How to Delete a Gmail Account

Baidu Root What is it How Can it Help You

How to Recover Deleted Files Android using Dr.Fone Recovery Software

8 Best YouTube Downloader Apps for Android






Friday, 2 December 2016

What Are Denial of Service and DDoS Attacks ?










DoS (Denial of Service) and DDoS (Distributed Denial of Service) attacks are becoming increasingly common and potent. Denial of Service attacks come in many forms, but share a common purpose: stopping users from accessing a resource, whether it’s a web page, email, the phone network, or something else entirely. Let’s look at the most common types of attacks against web targets, and how DoS can become DDoS.

The Most Common Types of Denial of Service (DoS) Attacks

At its core, a Denial of Service attack is typically performed by flooding a server—say, the server of a web site—so much that it’s unable to provide its services to legitimate users. There are a few ways this can be performed, the most common being TCP flooding attacks and DNS amplification attacks.

TCP Flooding Attacks

Almost all web (HTTP/HTTPS) traffic is performed using the Transmission Control Protocol (TCP). TCP has more overhead than the alternative, User Datagram Protocol (UDP), but is designed to be reliable. Two computers connected to each other via TCP will confirm receipt of each packet. If no confirmation is provided, the the packet must be sent again.
What happens if one computer gets disconnected? Maybe a user loses power, their ISP has a failure, or whatever application they’re using quits without informing the other computer. The other client needs to stop re-sending the same packet, or else it’s wasting resources. To prevent never-ending transmission, a timeout duration is specified and/or a limit is placed on how many times a packet can be re-sent before dropping the connection completely.
TCP was designed to facilitate reliable communication between military bases in the event of a disaster, but this very design leaves it vulnerable to denial of service attacks. When TCP was created, nobody imaged that it would be used by over a billion client devices. Protection against modern denial of service attacks was just not a part of the design process.
The most common denial of service attack against web servers is performed by spamming SYN (synchronize) packets. Sending a SYN packet is the first step of initiating a TCP connection. After receiving the SYN packet, the server responds with a SYN-ACK packet (synchronize acknowledgement). Finally, the client sends an ACK (acknowledgement) packet, completing the connection.
However, if the client does not respond to the SYN-ACK packet within a set time, the server sends the packet again, and waits for a response. It’ll repeat this procedure over and over, which can waste memory and processor time on the server. In fact, if done enough, it can waste so much memory and processor time that legitimate users get their sessions cut short, or new sessions are unable to start. Additionally, the increased bandwidth usage from all the packets can saturate networks, making them unable to carry the traffic they actually want.

DNS Amplification Attacks

Denial of service attacks can also take aim at DNS servers: the servers that translate domain names (like howtogeek.com) into IP addresses (12.345.678.900) that computers use to communicate. When you type howtogeek.com in your browser, it gets sent to a DNS server. The DNS server then directs you to the actual web site. Speed and low latency are major concerns for DNS, so the protocol operates over UDP instead of TCP. DNS is a critical part of the internet’s infrastructure, and bandwidth consumed by DNS requests are generally minimal.
However, DNS slowly grew, with new features being gradually added over time. This introduced a problem: DNS had a packet size limit of 512 bytes, which wasn’t enough for all those new features. So, in 1999, the IEEE published the specification for extension mechanisms for DNS (EDNS), which increased the cap to 4096 bytes, allowing for more information to be included in each request.
This change, however, made DNS vulnerable to “amplification attacks”. An attacker can send specially crafted requests to DNS servers, asking for large amounts of information, and asking for them to be sent to their target’s IP address. An “amplification” is created because the server’s response is much larger than the request generating it, and the DNS server will send its response to the forged IP.
Many DNS servers are not configured to detect or drop bad requests, so when attackers repeatedly send forged requests, the victim gets flooded with huge EDNS packets, congesting the network. Unable to handle so much data, their legitimate traffic will be lost.

So What Is a Distributed Denial of Service (DDoS) Attack?

A distributed denial of service attack is one that has multiple (sometimes unwitting) attackers. Web sites and applications are designed to handle many concurrent connections—after all, web sites wouldn’t be very useful if only one person could visit at a time. Giant services like Google, Facebook, or Amazon are designed to handle millions or tens of millions of concurrent users. Because of that, it’s not feasible for a single attacker to bring them down with a denial of service attack. But many attackers could.
The most common method of recruiting attackers is through a botnet. In a botnet, hackers infect all sorts of internet connected devices with malware. Those devices can be computers, phones, or even other devices in your home, like DVRs and security cameras. Once infected, they can use those devices (called zombies) to periodically contact a command and control server to ask for instructions. These commands can range from mining cryptocurrencies to, yes, participating in DDoS attacks.  That way, they don’t need a ton of hackers to band together—they can use the insecure devices of normal at-home users to do their dirty work.
Other DDoS attacks may be performed voluntarily, usually for politically motivated reasons. Clients like Low Orbit Ion Cannon make DoS attacks simple and are easy to distribute. Keep in mind that it is illegal in most countries to (intentionally) participate in a DDoS attack.
Finally, some DDoS attacks can be unintentional. Originally referred to as the Slashdot effect and generalized as the “hug of death,” huge volumes of legitimate traffic can cripple a website. You’ve probably seen this happen before—a popular site links to a small blog and a huge influx of users accidentally bring the site down. Technically, this is still classified as DDoS, even if it isn’t intentional or malicious.

How Can I Protect Myself Against Denial of Service Attacks?

Typical users do not have to worry about being the target of denial of service attacks. With the exception of streamers and pro gamers, it’s very rare for a DoS to be pointed at an individual. That said, you should still do the best you can to protect your all devices from malware that could make you part of a botnet.
If you’re an administrator of a web server, however, there is a wealth of information on how to secure your services against DoS attacks. Server configuration and appliances can mitigate some attacks. Others can be prevented by ensuring unauthenticated users cannot perform operations that require significant server resources. Unfortunately, a DoS attack’s success is most often determined by who has the bigger pipe. Services like Cloudflare and Incapsula offer protection by standing in front of websites, but can be expensive.
_____________________________________________________________





Top Posts :-


HOW TO INSTALL PARROT SECURITY OS

what is batch file how to create a batch file

How to Stop Your WhatsApp Friends from Knowing You’ve Read Their Messages

How to Theme Any of Your Stock Android Device

Top 5 best Xposed Modules For Lollipop Marshmallow






Wednesday, 30 November 2016

How to Delete a Gmail Account


How to Delete a Google or Gmail Account


To delete your Google account, sign into the Google My Account website and click the "Delete your account or services" option. You can also use this tool to delete just your Gmail address but keep your Google account. Deleting a Google account or your Gmail address will delete all associated data as well.

Deleting a Google Account

Visit myaccount.google.com in your browser. You can only delete your Google account from a web browser.

Click Sign in if you aren't already. This button is in the upper-right corner. If you are signed in, double-check that you're signed in with the account you want to delete.

Sign in with the account you want to delete.

Click Delete your account or services. This can be found at the bottom of the "Account preferences" section on the right side of the page.

Click Delete Google Account and data.

Review the content that will be deleted. You'll also be shown services you'll lose access to.

Click the download your data link to keep your data. This will take you to the Google Takeout page and walk you through the process of downloading an archive of your data.

Scroll down and check the two Yes boxes. This is the only confirmation you'll be giving for deleting your account.

Click Delete Account. Your account will be marked for deletion, which will occur shortly after you click Delete Account. Once your account is deleted, you'll lose access to all Google products and data associated with it.

Attempt to recover a deleted account. If you changed your mind or accidentally deleted the account, you have a short window of time to try to restore it:
  • Visit accounts.google.com/signin/recovery
  • Try to log in with the account you just deleted.
  • Click the "Try to restore account" link.
  • Enter the last password you used for the account. If you attempt to restore before your data is permanently deleted, you'll get your account back.













Top 10 Blogs





Saturday, 26 November 2016

How to Stop Your WhatsApp Friends from Knowing You’ve Read Their Messages

what is batch file how to create a batch file


Batch files are the computer handyman’s way of getting things done. They can automate everyday tasks, shorten the required time to do something, and translate a complex process into something anyone could operate.
In this article, I’ll show you how to write a simple batch file. You’ll learn the basics of what batch files can do and how to write them yourself. I’ll also provide you with further resources for learning to write batch (BAT) files.

Step 1: Create a BAT File

Let’s say that you frequently have network issues; you constantly find yourself on the command prompt, typing in ipconfig and pinging Google to troubleshoot network problems. After a while you realize that it would be a bit more efficient if you just wrote a simple BAT file, stuck it on your USB stick, and used it on the machines you troubleshoot.

Create a New Text Document

A batch file simplifies repeatable computer tasks using the Windows command prompt. Below is an example of a batch file responsible for displaying some text in your command prompt. Create a new BAT file by right-clicking an empty space within a directory and selecting New, then Text Document.
new_text_file

Add Code

Double-click this New Text Document to open your default text editor. Copy and paste the following code into your text entry.
@echo off
title This is your first batch script!
echo Welcome to batch scripting!
pause

Save As BAT File

The above script echoes back the text “Welcome to batch scripting!”. Save your file by heading to FileSave As, and then name your file what you’d like. End your file name with the added .batextension — welcome.bat for example — and click OK. This will finalize the batch process. Now,  double-click on your newly created batch file to activate it.
welcome_to_batch
Don’t assume that’s all batch scripting can do. Batch scripts parameters are tweaked versions of command prompt codes, so you are only limited to what your command prompt can do. For those unfamiliar the program, command prompt is capable of quite a lot.

Step 2: Learn Some Quick Code

If you know how to run commands in the command prompt, you’ll be a wiz at creating BAT files because it’s the same language. All you’re doing is telling the command prompt what you want to input through a file, rather than typing it out in the command prompt. This saves you time and effort; but it also allows you to put in some logic (like simple loops, conditional statements, etc. that procedural programming is capable of conceptually).
@echo — This parameter will allow you to view your working script in the command prompt. This parameter is useful for viewing your working code. If any issues arise from the batch file, you will be able to view the issues associated with your script using the echo function. Adding a following off to this parameter will allow you to quickly close your script after it has finished.
title — Providing much of the same function as a <title> tag in HTML, this will provide a title for your batch script in your Command Prompt window.
cls — Clears your command prompt, best used when extraneous code can make what you’re accessing had to find.
rem — Shorthand for remark, provides the same functionality as <!– tag in HTML. Rem statements are not entered into your code. Instead, they are used to explain and give information regarding the code.
%%a — Each file in the folder.
(“.\”) — The root folder. When using the command prompt, one must direct the prompt to a particular directory before changing a files name, deleting a file, and so on. With batch files, you only need to paste your .bat file into the directory of your choosing.
pause — Allows a break in the logical chain of your .bat file. This allows for users to read over command lines before proceeding with the code. The phrase “Press any key to continue…” will denote a pause.
start “” [website] — Will head to a website of your choice using your default web browser.
ipconfig — This is a classic command prompt parameter that releases information concerning network information. This information includes MAC addresses, IP addresses, and sub-net masks.
ping — Pings an IP address, sending data packets through server routes to gauge their location and latency (response time).
The library for batch variables is huge, to say the least. Luckily there is a Wikibook entry which holds the extensive library of batch script parameters and variables at your disposal.

Step 3: Write & Run Your BAT File

We’ll create two examples of batch scripts which can simplify your daily online and offline activities.

News Script

Let’s create an immediately useful batch script. What if you wanted to open all your favorite news websites the moment you wake up? Since batch scripts use command prompt parameters, we can create a script that opens every news media outlet in a single browser window.

To re-iterate the batch-making process: first, create an empty text file. Right-click an empty space in a folder of your choosing, and select New, then Text Document. With the text file open, enter the following script. Our example will provide the main American news media outlets available online.
@echo off
start "" http://www.cnn.com
start "" http://www.abc.com
start "" http://www.msnbc.com
start "" http://www.bbc.com
start "" http://www.huffingtonpost.com
start "" http://www.aljazeera.com
start "" https://news.google.com/
The above script stacks one start “” parameter on top of the other to open multiple tabs. You can replace the links provided with ones of your choosing. After you’ve entered the script, head to File, then Save As. In the Save As window, save your file with the .bat extension and change the Save as type parameter to All Files (*.*).
save_as_bat
Once you’d saved your file, all you need to do is double-click your BAT file. Instantly, your web pages will open. If you’d like, you can place this file on your desktop. This will allow you to access all of your favorite websites at once.

File Organizer

Have you been downloading multiple files a day, only to have hundreds of files clogging up your Download folder? Create a batch file with the following script, which orders your files by file type.  Place the .bat file into your disorganized folder, and double-click to run.
@echo off
rem For each file in your folder
for %%a in (".\*") do (
rem check if the file has an extension and if it is not our script
if "%%~xa" NEQ ""  if "%%~dpxa" NEQ "%~dpx0" (
rem check if extension folder exists, if not it is created
if not exist "%%~xa" mkdir "%%~xa"
rem Move the file to directory
move "%%a" "%%~dpa%%~xa\"
))
Here is an example of the my desktop before, a loose assortment of image files.
assorted_files
Here are those same files afterward.
ordered_files
It’s that simple. This batch script will also work with any type of file, whether it’s a document, video, or audio file. Even if your PC does not support the file format, the script will create a folder with the appropriate label for you. If you already have a JPG or PNG folder in your directory, the script will simply move your file types to their appropriate location.

Automate the Simple Stuff

This is just a taste of what batch scripts have to offer. If you need something simple done over and over — whether it be ordering files, opening multiple web pages, renaming files en masse, or creating copies of important documents — you can make tedious tasks simple with batch scripts

___________________________________________________________________________





Top Posts


Top 5 best Xposed Modules For Lollipop Marshmallow

How to Theme Any of Your Stock Android Device

How to Compress Images On Android Without Losing Quality

What Are Denial of Service and DDoS Attacks ?

How to Delete a Gmail Account

Baidu Root What is it How Can it Help You

How to Recover Deleted Files Android using Dr.Fone Recovery Software



Sunday, 16 October 2016

HOW TO INSTALL PARROT SECURITY OS 3.1.1


Parrot Security OS is used to perform penetration tests, Vulnerability Assessment, Computer Forensics and Anonymous Surfing. It is used mainly in the forensic department. This article explains the installation of Parrot security OS.

To install Parrot OS

Download Parrot OS latest version from its official site,
https://www.parrotsec.org/download.fx 
Boot it over the DVD or USB. The Parrot installation page appears as follows, hit install to proceed further.

1

Then choose the type of installation to be performed. For example, we are choosing the Standard installer.

2

Choose your preferred language.

3

Set the location and press enter.

4

Configure your keyboard settings by choosing the type of keyboard you want to use.

5

6

Create a root password and click continue.

7

8

To create a new user

Set new user and password for the Parrot OS. Enter a user name.
9


10

Set password for the user.
11

12

Select “manual” partition to create a partition of your own.

13

Choose your hard disk and press enter.

14

Click yes to proceed further.

15

Create a partition table by picking the hard disks free space.
Now click “Create new partition” and press enter

17

Specify the size of the main mount point and press “continue”.

18

Choose the type of partition.

19

Then set the location for the partition.

20

Verify the partition settings  and select “done setting up the partition”.

21

To create a swap partition, click “create new partition”.

22

Specify a size for the swap partition and make sure that it is twice your RAM size.

23

Choose your partition type.

24

Set the location for the new partition.

25

Verify your system partition details.

26

Then select the “swap area” for the partition table.

27

Now choose “done setting up the partition”

28

click  “Finish partitioning and write changes to disk” 

29

Click yes to confirm and proceed further.

30


Now installation starts.

select “yes” to install grub boot loader.

32

Choose your hard disk for grub installation.

33

Once the installation is successfully completed, click continue and then reboot the system.

34

After rebooting, enter into the Parrot OS using the login credentials.

36


________________________________________________________________





Top Posts :-

what is batch file how to create a batch file

How to Stop Your WhatsApp Friends from Knowing You’ve Read Their Messages

How to Theme Any of Your Stock Android Device

Top 5 best Xposed Modules For Lollipop Marshmallow

8 Best YouTube Downloader Apps for Android