Do you know where your phone is? Find it now with Google!

Did you know you can use Google to located your Android phone?

This feature has been around for years now, however it seems that a lot of people either don’t know about it, or just forget to use it. I’m going to quickly go over how the setup your phone so you can locate it next time using Android Device Manager.

First, you have to enable “Remotely locate this device” option and “Allow remote lock and erase”. To do this, simply find the app that says “Google Settings” and go to “Security”. Also, make sure “Location” is turned ON as well.


Google Security settings

Continue reading

Modular phones - Transformer phones

What are Modular smartphones?


Google Ara and Modules

Modular smart phones take the idea of “smartphones” and allows you to physically customize your phone in ways you never could before. The phone itself should still contain a CPU, GPU, Memory, etc. — basically everything required to function. The Modular aspect comes in because it allows you to customize some aspects of the phone via hardware “modules”. We can already customize our Android OS to suit our needs, now we need to be able to customize the hardware as well. Some may prefer dual speakers on their phone, whereas others would only want 1 speaker, but a higher quality camera.

Continue reading

Combine multiple images to 1 multi-page file - IRFANVIEW

IrfanView is a small, efficient, yet powerful utility used to view and manage image files. It supports various image formats, which Windows may not support natively. For example, IrfanView supports gifs and ico file types. For more information about IrfanView, please visit: IrfanView Website

Lets say we have 5 tif image files that we need to convert to a single multi-page file for email or whatever other reason you may have. This process is very simple.


single-page images

Continue reading

Microsoft Access – Fix File import Truncation error

If you attempt to import a table to Access from a file and get the “ImportErrors” table/report created (see image below), you know your table did not import correctly.  

Let me briefly tell you why I got the error:
I tried to import a .dat file and convert it to an Access table. While importing, Access noticed that it was unable to import some of the fields due to an error, and notified us which fields we need to fix in an “ImportErrors” table/report (as shown below). Open the newly created table to see what the errors are with the import:

 


Import error table

Continue reading

Protect yourself from Malware!

What is Malware?

A lot of people throw around the term “malware” and don’t really know what exactly malware is. Malware is short for “malicious software” and encompass viruses, trojans, worms, adware, bloatware, etc (see below). Therefore a Virus is technically a type of malware. An easy way to remember is if you took Spanish in high school, you should remember that “mal” means “bad” in Spanish. The “ware” part comes from the word “software”. Put them together and you have “bad software”. “Malicious” and “bad” are synonyms. Therefore malware is any malicious application that is installed (with or without the users knowledge) that can be used to wreak havoc on the end computer, or compromise sensitive user information.

Continue reading

Stop Drop and block Popup ads! Quick and easy method.

It is impossible to browse the internet these days without running into advertisement. However, developers spend a lot of time putting together their website, and they deserve that money, right? Right…but not when they abuse their “power”. That’s right, some developers misuse advertising and get greedy, and cover your screen with more ads than actual content and popups. Don’t you hate those pop ups? You accidentally click the wrong link and before you know it, your computer is full of popup ads!

Continue reading

Kali Linux Install – Setup Kali persistent USB 2016

Kali Persistent USB Setup

After recently deciding to get back into Linux, I decided to start using Kali and ditch Backtrack 5. As you all know, Kali is basically a new, debian, version of Backtrack Linux. kali persistent logo If you haven’t already tried out Kali, a persistent USB is a perfect way to test it out. A Kali persistent USB drive will allow you to run your Linux OS off the USB drive itself, and keep track of your changes. This is great if you want to save your downloaded tools for later, or if you switch between multiple computers often. It’s actually easier than ever to create a persistent copy of Kali. I recommend a USB 3.0 flash drive with 8GB or more of space. I used a 32GB flash drive — Kali itself should take up around 3.5GB to 4GB of space. I am going to be assuming that you are currently a Windows user.

Requirements

  • USB 3.0 drive with at least 8GB of space
  • Windows computer (some software we will use requires Windows)

Continue reading

WPA_Supplicant config for WPA encryption Backtrack 5

Why use WPA_Supplicant Daemon?

Wpa_supplicant config

So after finding an old Backtrack 5 R3 persistent USB drive I had created years ago, I booted it up to browse the content I had on it. Last time I used it, I was connected to a WEP encrypted network, but as we all know those offer weak protection and are slightly outdated for today. The tools and techniques to break WEP encryption have been around for a while and therefore WEP is rarely used these days. That being said, WPA encryption isn’t flawless, but a better alternative. I’m not going to discuss how to crack those here. Anyway, I figured I would share with you how to connect to a WPA encrypted network in Linux using the terminal and WPA_Supplicant daemon.

If you’re still using Backtrack 5 R3, I recommend upgrading to Kali Linux by creating a persistent USB.

Normally, we use iwconfig to configure wireless networks. However, iwconfig does not support WPA/WPA2 encryption. We have to use the “WPA_Supplicant Daemon” to connect to a WPA encrypted network.

Wpa_supplicant comes pre-installed in most Linux distros (including Backtrack 5 R3, Kali Linux and Ubuntu). Since Backtrack 5 R3 is outdated, it is configured to make connecting to WEP encrypted networks easily,

Continue reading

Repair Laptop Charger Plug tutorial 2016


power plug/adapter

Have you ever been unable to use an electronic device because the power adapter plug has gone bad? Well, worry no more, because I am going to teach you how to repair the plug. It is a common occurrence with most electronic devices, especially the ones we carry with us, such as laptops. Most of the time people wrap the cord up and eventually, over time, will cause it to fail. This is a DIY tutorial on how to fix your own plug.

Continue reading

Ring Video Doorbell – ding dong ditch?

I’m sure you guys have heard of Ring Video Doorbell by now, seeing as they have so many commercials, and the bell has been out for a while. If you haven’t heard of it, it’s okay, just watch the video above to get a description of the product or visit their website. It’s basically a doorbell with a camera on it, that is connected to your wireless network. Every time someone ring’s the bell, your phone will buzz/notify you that there is someone at the door. At which point you can pick up your phone, and answer (or ignore) based on who it is at your door. You can speak with the person directly through your phone as well. The best part is the person at the door can’t see you, so you can tell the you’re out somewhere. Here is the “Ring Story” (from the box):

..If not for my wife, the Ring Video Doorbell would not exist.
Inventors come up with a lot of bad ideas and she has heard them all. One night I shared my idea for reinventing the doorbell.
She loved it! Not just for the obvious convenience, but for the security of now being able to safely answer the door from anywhere. She said, “This is like caller ID for the front door.”
I hope that you enjoy the Ring Video Doorbell as much as we do, and I look forward to hearing your stories about the product
. — Jamie Siminoff, Inventor

Continue reading