Saturday, 31 March 2018

How to remove bloatware apps i.e.(Built in App) from android Smartphone


How to remove bloatware apps i.e.(Built in App) from android Smartphone

Image result for bloatware apps
kingoapp.com
Manufacturers often load Android phones with their own apps. If you don’t use them, they just slow down your system, or–even .drain your battery in the background.

How to Disable Bloatware App’s With Android’s Built-In Setting

Disabling bloatware on newer phones is easy, and should not require root access. I’ll be using an fresh Samsung Galaxy S4 i9500 for this tutorial, but the process will be exactly the same.

First, open the Settings menu


Open Application manager 


Choose any App (built in App) to disable 



 I am making use of galaxy Apps & click on disable



Message will pop up don't worry about it


And make force stop 

That's it All Done.







PC shortcuts keys to make your work easy


PC shortcuts keys to make your work easy

Image result for PC shortcuts keys to make your work easy
makeuseof.com

Ctrl+A
Highlight everything in the current folder, document, or page.

Ctrl+C or Ctrl+Insert
Copy the selected text, item, or image to the clipboard.

Ctrl+X
Cut remove the selected text & image, or item and moves it to the clipboard.

Ctrl+V
Paste contents of the clipboard into current  window.

Ctrl+F
In most programs, this command opens up a search window (includes all browsers and most of the Office applications).

Ctrl+S
Save an open document, file, or webpage.

Image result for easy work
plainidea.com
Ctrl+Z
Undo the last action performed (supported by most programs and browsers).

Ctrl+Left arrow or Right arrow
Move your cursor to the start of the previous word (left) or to the beginning of the next word (right).

Ctrl+Shift+Left arrow or Right arrow
Highlight the previous word (left) or highlight the next word (right).

Ctrl+Backspace
Delete the word to the left of your cursor.

Ctrl+Home
Move your cursor to the beginning of a document or page.

Ctrl+End
Move your cursor to the end of a document or page.

Esc
Cancel current or opened task.

Shift+Delete
Delete a highlighted item (permanently) without first moving it to the Recycle Bin.

Ctrl+Tab
Move through opened tabs.

Alt+Underlined letter
Perform corresponding command/shortcut or select corresponding option.

Ctrl+Click / Shift+Click
Select more than one item or file

Shift+Arrow
Highlight text to the left or the right.

Ctrl+P
Print current document or page.

Ctrl+Shift+V
Paste current clipboard as plain text.

Alt+F4
Close any opened or active windows app.

Shift+F7
Open the saurus lookup in Microsoft Word.

Ctrl+Shift+T
Reopen last closed browser tab.

Windows key+M
Minimize all opened windows.

Windows key+L
Lock your PC.

Ctrl+D
Bookmark current webpage.

Ctrl+Shift+B or O
Open your book marks menu (depends on browser).

Ctrl+R (browser)
Refresh current page.

Ctrl+R (Microsoft Outlook)
Start a reply to currently selected/opened email.

F2
Rename highlighted file(s).

Friday, 30 March 2018


What is mean by Hard-drive Encryption

Image result for hard drive encryption
howtogeek.com
Encryption is basically the process of making any type of data unreadable by anyone without proper authorization. It will continue to be un-readable even after sharing it with other people it means only you with the right encryption key can make the data readable again.
How encryption works?

Image result for hard drive encryption
spideroak.com
Unencrypted data, often referred to as plaintext, is encrypted using an encryption algorithm and an encryption key. This process generates text that can only be viewed in its original form if decrypted with the correct key. Decryption is simply the inverse of encryption. Today's most widely used encryption algorithms fall into two categories: symmetric & asymmetric.

It is not just to stop the NSA from accessing your files, but it's more about preventing your private data from falling into the wrong hands if you lose your device, or gets stolen.
Image result for . TPM (chip)
zdnet.com
What is TPM (chip)?

Trusted Platform  Module (TPM) chip. This is a special microchip that enables your device to support advanced security features.

The process to encrypt an entire hard drive or disk  is not difficult, but it's time-consuming. Depending the amount of data and size of the drive, it can take a very long time. Ensure that it is connected uninterupted power supply.
Image result for Symmetric-key ciphers
docs.aws.amazon.com
Symmetric-key ciphers

It also referred to as "secret key," use a single key, sometimes referred to as a shared secret because the system doing the encryption must share it with any entity it intends to be able to decrypt the encrypted data. The most widely used symmetric-key cipher is the Advanced Encryption Standard (AES), which was designed to protect government classified information.
Image result for Asymmetric cryptography
resources.infosecinstitute.com
Asymmetric cryptography

It is also known as public key cryptography, uses two different but mathematically linked keys, one public and one private. The public key can be shared with everyone, whereas the private key must be kept secret. The RSA encryption algorithm is the most widely used public key algorithm, because both the public and the private keys can encrypt a message,the opposite key from the one used to encrypt a message is used to decrypt it.








How to watch videos on Youtube in offline or without internet connection

How to watch videos on You-Tube offline or without internet connection? youtube.com How to watch Youtube videos on Android   or iO...