Amazon Today's Deals


Breaking News

MAS Infotech

Tamil Blog - InfoMAS

Ads

Tuesday 25 November 2014

How To Recover Permanently Deleted Files From Android Device

Hello Everyone, Almost 80 % of mobile user use android smartphone. But sometimes we accidentaly deletes some important files or data of any important stuff. As many people uses android and keeps their important daily use data in it. But what if you deletes data on your android ? In PC you can recover data when you deletes it you can easily restores it from Recycle Bin but sometimes when you permanently deletes files on you PC then you can easily recovers them by hard drive recovery services/tool. You can read my previous post to How To Recover Deleted Files From Hard Drive. Coming back to my post that is “How To Recover Permanently Deleted Files From Android Mobile”. You can also recover android’s data by recovery tools as always there are a lots of softwares available on the internet on a particular thing but how to choose best one among them ? So, today I’m sharing the top best android data recovery tools I’m also using these tools to recover my deleted data.




















How To Recover Permanently Deleted Files From Android Device :

1. Dumpster 

Dumpster is Just like the Recycle Bin on your desktop computer. It is the one of best tool for recovering accidentaly deleted file from your smart Android. It can recovers all deleted file on your android. It also very easy to use because of it’s user friendly interface. It has following features :-

    *  Restore deleted pictures, music files, videos.
    *  Undelete files (pdf, mp3, doc, avi, jpg, txt, etc.).
    *  Restore deleted files with a single tap.
    *  Preview your deleted pictures before recovering.
    *  Auto-clean backup files at a given period.
    *  Internet connection absolutely not required.
    *  No need to root your device.



You can easily restore files with dumpster you have to just follow the below procedure :

Step 1 : First of all go to the application.
Step 2: Where you can see all of your deleted file.
Step 3: Tap on a file which you want to restore.
Step 4: Now just select Restore Button.
Step 5: Done your Deleted file is Restored.

NOTE : It can recover only when it is already installed on your android before the delete of your files/data.

2. ES File Explorer

The another method to restore deleted file is the one of the best android file manager. This file manager is full of features and the one of them is Recycle Bin.  I will also recommend you to use this application as file manager.


You can easily find the Recycle Bin option just by opening its tool menu. You have to ON it to use the Recycle Bin option.

How to Recover Files from Android SD Card [ Using PC ]

Using Android Data Recovery 

Sometimes you accidentaly format your SD card on you androidor sometime your SD card got  corrupted. It can recover photos and videos from SD cards on Android devices, as well as contacts and messages on SIM cards. It has folowing Features :

 > Accidentally deleted files from SD card.
 > Formatted SD card.
 > SD card got corrupted or inaccessible.
 > Virus inflection.
 > Power failure.





It is easy to use you have to just connect you android device by enabling USB Debugging. When your device get connected then you have to simply scan you device and recover the desired files which displays on the screen. 


keep visiting
Read more ...

How to Use WeChat on PC

Step 1) Open Wechat in your phone.


Step 2) Now click on magic wand like icon in top right corner.


Step 3) Now you will have few options like New Chat,Web WeChat, Handset Mode and Scan QR Code.Click on Scan QR Code.


Step 4) Now visit https://web.wechat.com and scan QR Code.


Step 5) Now after scanning,You will see in next window “you are about to log in to Web Wechat from your browser.Press OK to confirm.”


Now you are done!! 

Check your computer screen,it showing Wechat now.Now start chatting using wechat in PC and enjoy.

Thank you keep visiting  
Read more ...

Whatsapp for Java Phones - How to Download and Install


Whatsapp for java phones is like a dream for java mobile users. I found a solution for this and in this article I am going to tell you how to download and install whatsapp for java phones.

WhatsApp is an app used to send free sms to your friend who is also using the app via internet. WhatsApp is available for various platforms like android, windows, symbian and some s40 phones. One who have a smartphone can esily use Whatsapp.

In this article I am going to tell you how to download and install whatsapp for java phones. Below, I am sharing a link to download WhatsApp for Java Phones which will run in almost all java mobile phones with big screen (having at least 240x320 screen size, can’t say anything about other screens). It is 100% working and tested by me on some nokia phones like Asha 200, C2-03, etc. So without wasting time just click on below link to download WhatsApp for java phone and comment below to let me know if it is working in your phone or not. 


Steps to Download and Install Whatsapp for Java Phones 


1. Download both the files (WhatsApp_Messenger.jar and WhatsApp_Messenger.jad) from the link given below in your PC (not in mobile)

WhatsApp_Messenger.jar download
WhatsApp_Messenger.jad download
2. Copy both files in same folder in your phone, otherwise WhatsApp will not work.

3. You have done! Now try to run whatsapp from your mobile and enjoy using it.

Note: Downloading must be done in computer. If you download files from mobile then the file format does not support.

Read more ...

Hack Your Facebook Friends? More Like Hack Yourself.

What if you could hack your friend’s Facebook account simply by copying and pasting a piece of code into your web-browser’s console?



A recent Facebook scam promises just that.

Hack Any Friend’s Facebook Scam


False promises on Facebook: it’s a recurring theme adopted by spammers. This time, it’s a Facebook post that begins as follows:


    UPDATE LINK FOR FACEBOOK HACKING
    F.A.C.B.O.O.K —-H.A.C.K.I.N.G(ONLY FOR EDUCATION PURPOSES) 

The content of the post includes a link to a Google document and written instructions on how to hack your friend’s Facebook account, as well as an instructional video. The instructions tell you to go to the Google document, copy its contents, paste those contents into your web browser’s console (found by hitting F12), hit enter, and wait 2 hours for the hack to kick in.

Users who follow these instructions will in reality hack their OWN account.

Self Cross-Site Scripting Hack


Rather than a magical code to hack your friend’s Facebook account, the contents of the Google Doc are actually a malicious JavaScript code that hijacks your account for spamming. While you sit and wait the prescribed 2 hours for the hack to kick in, your Facebook account is used to generate Likes on pages owned by the attackers. Furthermore, the code tells your account to tag all of your friends in its original post so that they can be lured to it too.

The copy-paste technique used in this scam is called Self Cross-Site Scripting, or Self XSS. Self XSS is about as simple as it gets: Attackers generate malicious code and then try to convince their victims to paste that code into their web console and execute it. This type of attack hinges on social engineering – like dangling the promise of being able to hack any friend’s account – and it has actually been around for quite some time. Reports indicate that this latest campaign has been active since early 2014 and that it has already generated as many as 100,000 fraudulent Likes.

Such success has indeed been noticed by Facebook and prompted the social media giant to issue a warning regarding this type of attack, which includes the option to enable or disable the web console while on Facebook: https://www.facebook.com/.

The warning jests at enabling the web console by stating “Allow my account to be hijacked if I paste malicious JavaScript” next to the setting’s check box. More importantly, the warning also points out that a Self XSS can be used to do much worse than generate Like spam. Beyond Facebook accounts, Self XSS hacks are used to execute a wide variety of malware, to commit all types of cybercrime.

 

Protect Yourself (from Yourself) with Surf Protection Technology


If you think you have fallen victim to the Hack Your Friend’s Facebook scam, you should review your Facebook activity log to see if your account has been used to generate fraudulent Likes: https://www.facebook.com/help/www/289066827791446. If it has, you can always Unlike them.
It’s also good practice to exercise caution when encountering any Internet offer dangling a virtual carrot just out of reach. Scams like these happen almost every single day, and are most often initiated through large social media networks where they can achieve the most exposure.

If you’d rather not have to worry about things every time you log on to your favorite social site to view pictures of your family and friends, we’d also suggest utilizing Emsisoft Anti-Malware’s Surf Protection Technology. It’s designed to prevent you from visiting malicious websites that contain copy-paste code used in Self XSS attacks. That way, you can protect yourself from yourself (and from malware too).

Keep Visiting 
Read more ...

GET INDIAN MOBILE RECHARGE PLANS OFFERS WITH IREFF ANDROID APP

Mobile usage is increased in these days and there are many network operators providing different services and offers to customers. Also the providers giving daily based special offers and recharge plans but you can get the details only by contacting dealers or sending SMS. Before you recharge your prepaid mobile, you have to find the most appropriate recharge plan for your exact need.


iReff app is the quickest and easiest way to get the latest recharge plan and offer information. iReff is an Android app that helps you to easily know your Topup Vouchers, Special Tariff Vouchers (STV), Combo Vouchers and Full Talk Time offers. The app has very simple interface, initially you have to select your mobile operator and your telecom circle.

Get Indian Mobile Recharge Plans Offers with iReff Android App

The app will shows list of all topup plans and tariffs of other services. If you click a particular recharge amount, you will get the recharge plan details with additional information such as talktime, price, updated time, source and USSD string to activate it.

Get Indian Mobile Recharge Plans Offers with iReff Android App


iReff app for Android Features:

  • It provides recharge details with different sections such as Topup, SMS, 2G Data, 3G Data, Local, STD and more.
  • iReff updates the recharge plans daily from the particular operator’s website.
  • It supports 14 prepaid mobile operators and 22 telecom circles.
  • A dedicated search box to search recharge plans based on particular price range.
  • You can also get the recharge plans and offers by sending SMS. Check the official site to know SMS commads.

iReff app for Android is available free to download on Google Play. The app is currently in beta stage and it comes with ads, there is no pro version for this app.

Read more ...

Monday 24 November 2014

How to lock pendrive without any software

USB Flash drives are one of the easiest way to transfer data. But what happens when you lost your USB drive which has some important files which you don’t want to share. Or forget your USB on your office desk and worried about the data that you save on your USB pen drive. Data in a USB Flash Drive is protected by a password.


In this method you don’t need any software or any deep knowledge about the computer.what you need to do is follow the bellow steps:

1)First plugin your pen-drive to your computer
2)Right click on the drive there is an option called “Turn on BitLocker”
selecting bitlocker
3)Click “Turn on BitLocker” that will guid you to another window.In that window there are two options with check boxes.check the first one.

check box
4)Enter the password and conform again and click next.
5)In that window there are three options for save your backup key.select second one and click next.
recovery key
 6)After that you will be redirected to another window.there are two options to select your encryption method.select first one and click next.
7)In final step select start encryption.that will take some time.wait until the process will finish.That’s all you finished your encryption.when you open your pendrive next time that will ask password to open.
Read more ...

Android an Introduction

Android Version List 

 
  • Android 1.0 (API level 1)
  • Android 1.1 (API level 2)
  • Android 1.5 Cupcake (API level 3)
  • Android 1.6 Donut (API level 4)
  • Android 2.0 Eclair (API level 5)
  • Android 2.0.1 Eclair (API level 6)
  • Android 2.1 Eclair (API level 7)
  • Android 2.2–2.2.3 Froyo (API level 8)
  • Android 2.3–2.3.2 Gingerbread (API level 9)
  • Android 2.3.3–2.3.7 Gingerbread (API level 10)
  • Android 3.0 Honeycomb (API level 11)
  • Android 3.1 Honeycomb (API level 12)
  • Android 3.2 Honeycomb (API level 13)
  • Android 4.0–4.0.2 Ice Cream Sandwich (API level 14)
  • Android 4.0.3–4.0.4 Ice Cream Sandwich (API level 15)
  • Android 4.1 Jelly Bean (API level 16)
  • Android 4.2 Jelly Bean (API level 17)
  • Android 4.3 Jelly Bean (API level 18)
  • Android 4.4 KitKat(API level 19)
the evolution of android OS
Read more ...

Saturday 22 November 2014

Make your Hidden Folder

1.Make a folder in C drive  rename it as “abc” without quotes.

2.Now open Command prompt from start menu.

3.Type “attrib +s +h C:\abc”without quotes and press enter.

4.This command will make your folder invisible and it cannot be seen even in hidden files and folders.

5.To make it visible again type “attrib –s –h  C:\abc “ without quotes.

6.You can lock any other folder by changing the location C:\abc to the address of the folder.

Read more ...

Thursday 20 November 2014

Recharge & Bill Payments Rs. 50 Cashback on Rs. 50 – FreeCharge

freecharge100


• Offer valid only on FreeCharge mobile app.
• Offer valid only once per user/mobile number.
• Valid only on debit/credit card & net banking transactions.
• Cashback will be added to your FreeCharge credits within 24 hours.
Rs. 50 Cashback on Rs. 50 from: Give a missed call on 18001085020 & receive your Promo Code.

FreeCharge: Terms & Conditions
Read more ...

DTH Recharge Rs. 100 Cashback on Rs. 400 – PayTm

dth100


• Offer valid on only on DTH Recharges.
• Valid only on PayTm Apps.
• Valid for all old and new users.
• Cash back will be credited into the user’s PayTm account within an hour of the order.
Rs. 100 Cashback on Rs. 400+ Promo Code: DTH100

Download: PayTm Apps
Read more ...

Wednesday 19 November 2014

COMPUTER KNOWLEDGE (101-150)

101. FIND THE ODD ONE OUT? 

· A. INFORMIX
· B. SYBASE
· C. C
· D. ORACLE

 102. The Input device that is closely related to a touch screen is the
· A. Joystick
· B. Scanned
· C. Keyboard
· D. Light pen

 103. Which of the following hardware components is the most volatile?
· A. ROM
· B. PROM
· C. EPROM
· D. RAM

104. State the valid schema objects.
· A. tables
· B. views
· C. indexes
· D. all the above

105. Software is
· A. peripheral
· B. equipment
· C. computer program
· D. none of these

106. A spiral shape track formatting is present in
· A. floppy disk
· B. optical disk
· C. hard disk
· D. half inch tape cartridge

107. ----- provides a common address space and routes the packets of data across the entire
Internet.
· A. TCP
· B. UDP
· C. IP
· D. None of these

108. Which one of the items given below is not an item of the Menu Bar?
· A. tools
· B. exit
· C. catalog
· D. root

109. The first computer mouse is built by
· A. Robert Zawecki
· B. William English
· C. Doughlas Engelbart
· D. Daniel Cougher

110. The ----- performs simple mathematics for the CPU.
· A. DIMM
· B. BUS
· C. Register
· D. ALU

111. What is the name of the network topology in which there are bi-directional links
between each possible node?
· A. Star
· B. Mesh
· C. Tree
· D. Ring

112. Which of the following statement can be used to construct loop?
· A. FOR END FOR
· B. DO WHILE END DO
· C. IF ENDIF
· D. All the above

113. Who is considered to be The Father of Artificial Intelligence?
· A. Alan Turing
· B. Allen Newell
· C. George Boole
· D. John McCarthy

114. Which of tho following command can be used to add records in a database file?
· A. EDIT
· B. BROWSE
· C. APPEND
· D. All the above

115. The various Record sets are
· A. Snapset
· B. Dynaset
· C. Forward only
· D. All the above

116. GCA stands for
· A. Graphic Conversion Assembler
· B. Graphic Command Assembler
· C. Graphic Coded Assembler
· D. None of the above

117. The first movie released in 1982 with terrific computer animation and graphics was
· A. Dark star
· B. Forbidden planet
· C. Tron
· D. Star wars

118. Which function removes the trailing blank space from a specific string expression?
· A. TRIM()
· B. RTRIM()
· C. Either (a) or (b)
· D. None of the above

119. Which of the following is an example of non–volatile memory?
· A. RAM
· B. ROM
· C. VLSI
· D. LSI

120. Identify correct DML statements, are
· A. INSERT
· B. DELETE
· C. Both (a) and (b)
· D. None of the above

121. The word length of a computer is measured in
· A. bytes
· B. bits
· C. millimetres
· D. metres

122. In a Pascal procedure, the parameters are separated by
· A. colon
· B. comma
· C. blank space
· D. semicolon

123. Whose trademark is the operating system UNIX?
· A. Motorola
· B. Microsoft
· C. BELL Laboratories
· D. AshtonTate

124. The character ‘\n’ is known as
· A. string
· B. new line
· C. letter n
· D. none of the above

125. The types of users in UNIX are
· A. file Owner
· B. group Owner
· C. system Administrator
· D. all the above

126. Which of the following colour graphics display adapter has the highest resolution?
· A. HGA
· B. EGA
· C. VGA
· D. CGA

127. State the valid Console command,
· A. DOS
· B. BROADCAST
· C. DOS
· D. All the above

128. One byte is equivalent to
· A. 4 bits
· B. 8 bits
· C. 16 bits
· D. 32 bits

129. The DIR command is used to display
· A. Size of the files
· B. new line
· C. File name extension
· D. All the above

130. Programs stored in ROM are called
· A. software
· B. hardware
· C. firmware
· D. none of the above

131. A device that converts digital signals to analog signals is
· A. A block
· B. A packet
· C. A modem
· D. Both (B) and (C)

132. ROM is composed of
· A. floppy disks
· B. photoelectric cells
· C. microprocessors
· D. magnetic cores

133. Find the odd man out.
· A. optical fibre
· B. twisted pair wire
· C. microwaves
· D. coaxial cable

134. Find the odd man out
· A. TCP
· B. SAP
· C. POP
· D. FTP

135. VSNL stands for
· A. Videsh Sanchar Nigam Ltd
· B. Vigam System Nigar Ltd
· C. Very Soft Network Link
· D. Very Small Network Link
·
136. The computer that is not considered as a portable computer is
· A. Notebook computer
· B. Laptop computer
· C. Mini computer
· D. None of these

137. The Java’s access specifier are
· A. private
· B. public
· C. protected
· D. all the above

138. The number system on which the modern computers operate
· A. Binary number system
· B. Octal number system
· C. Decimal number system
· D. Hexadecimal number system

139. Which of the following is not a web scripting language?
· A. PHP
· B. HTML
· C. ASP
· D. DSP

140. The unit of speed used for super computer is
· A. MELOPS
· B. KELOPS
· C. GELOPS
· D. None of these

141. The secondary storage device that follows the sequential mode of access is
· A. Optical Disk
· B. Magnetic Tape
· C. Magnetic Disk
· D. None of these

142. Backspace key is a
· A. function key
· B. character key
· C. control key
· D. none of the above

143. Which device can understand the difference between data and programs?
· A. memory
· B. microprocessor
· C. output device
· D. input device

144. Memory is made up of
· A. a large number of cells
· B. a set of circuits
· C. a set of wires
· D. none of these

145. Mar stands for
· A. Memory Arithmetic register
· B. Memory address register
· C. Memory access register
· D. Memory Assessing register

146. The following device allows the user to add external components to a computer
system
· A. Keyboards
· B. Storage devices
· C. Ports/system boards
· D. Diskettese

147. Process of finding/correcting program errors is
· A. Hacking
· B. Cracking
· C. Bugs
· D. Debugging

148. The third generation of computers covers the period
· A. 1959–1964
· B. 1965–1971
· C. 1971–1981
· D. 1991–1996

149. First computers that stored instructions in memory
· A. first generation computers
· B. second generation computers
· C. third generation computers
· D. fourth generation computer

150. A number system with a base of 8 is referred as
· A. binary
· B. decimal
· C. octal
· D. none of these
Read more ...
Designed By Blogger Templates