Thursday, May 18, 2017

How to Delete Icloud from iPhone Phones 2017 . 5 Ways to unlock an iCloud locked iPhone


How to Delete Icloud from iPhone Phones 2017

Are you looking to solve the problem of Icloud on your phone if I hope you are in the right place, because here I will share a genius way to remove the Icloud from your phone, the way that I have shared one of my close friends and who after an effort to be convinced to share with you in this post, In order to publish the subject, although he is sure that the Arabs will be smashed the way later (lol). On the whole, this smart friend knows very well that technically it is very difficult for the ICD to be removed via hardware or software, so he has followed a different method in a way called in the field of information security. The way is to contact Apple's support and convince them that the phone was purchased by a user from a well-known store or website such as Ebay and you were surprised that the phone had icecode and so you could not use it. Therefore, the company will ask you for some information that you will find in the original purchase invoice of the phone.

How to Delete Icloud from iPhone Phones 2017
How to Delete Icloud from iPhone Phones 2017

Ooh Yes, you do not have the original purchase tab to provide them with the required information! Here are the information you will need such as: date of purchase, country of purchase, seller's name and phone serial number. You can find it in IMEI phone number by using some famous sites that tell you information about the phone such as iphoneimei.info.

Now that we've got a complete idea of ​​the way, let's get into the details:

First: Create a new Emile (choose any company)

Unlock iCloud Lock Permanently via IMEI Code on iPhone
Unlock iCloud Lock Permanently via IMEI Code on iPhone
Second: Install the code # 06 # * without the IMEI number. Go and search for sites that give you information about the IMEI number such as iphoneimei.info. (You do not have to work with this site. You should search for other sites that recognize the IMEI code and Google. Here your friend will find these sites.

Third: You will find a fake invoice is a file Photoshop Download at the bottom of this post, then changed the invoice information to the information obtained through the IMEI number

Fourth, contact Apple by telephone by the following phone numbers depending on the language you trust:

English: +18006947466
French: +330805540003

Fourthly: After answering your phone, tell them that you bought a used phone from Ebay and that the phone is on it and you need help, the employee will ask you to provide it with your full name, so do not hesitate.

The employee will be asked to stay with him on line ... he will then ask you to contact the seller and ask him to remove the icecode from the phone. Here you will tell them that the seller no longer answers you on your email 3 months from the date of purchase of the phone. After that, the employee will ask you if you have the original invoice to buy the phone. Answer immediately that the seller has sent you the original invoice with the phone used. After that, the employee will ask you to wait a little (at this point the staff member will refer you to the general observer)

5 Ways to unlock an iCloud locked iPhone
5 Ways to unlock an iCloud locked iPhone
Fifth: General Controller may ask you to email him or ask you to your special Emilek, here you will give him the EML, which was established in the first step, and you will write them with the original invoice to buy the phone, of course the original invoice is the invoice that I visited. After that, the employee will tell you that what happened to you is very normal. Do not worry.

So you've successfully deleted the icloud from the phone, and we hope that God has helped you solve this problem that a lot of people are suffering from.




The strangest thing that Russia has done in order to face the ransom virus that terrified the world!


The strangest thing in Russia has done in order to face the ransom virus that terrified the world!
There is no doubt that the ransom virus, which has spread recently, has created great horror in companies and countries, especially after the damage caused to a group of sectors and companies, and stop work in some days. But each country has a way of dealing with these threats, which will not end. But what has Russia done to deal with the latest ransom virus?

The strangest thing in Russia has done in order to face the ransom virus that terrified the world!
The strangest thing in Russia has done in order to face the ransom virus that terrified the world!
Russia is undoubtedly one of the advanced countries in the field of protection and electronic security, one of the countries that has high capabilities in the field of hackers and breakthroughs, but did you imagine that Russia would use a priest to address the dangerous virus!

The strangest thing in Russia has done in order to face the ransom virus that terrified the world!
The strangest thing in Russia has done in order to face the ransom virus that terrified the world!

This is what happened. The Russian Orthodox Patriarch was summoned to the Ministry of State for Internal Affairs to sprinkle "holy water" on the servers to protect them from ransom. In Russia, there is no separation between church and state. The Orthodox Church is considered one of the most important institutions in the country. It has an important relationship with the Russian government. As its leader, Patriarch Kirill Moscow has close cooperation with President Vladimir Putin on matters of state!

The strangest thing in Russia has done in order to face the ransom virus that terrified the world!
The strangest thing in Russia has done in order to face the ransom virus that terrified the world!
A collection of photographs of this process has been published, a picture widely known on the Internet. Many people will wonder about the role of "holy water" in protecting servers from potential attacks.

Of course, this is not the first time that one of the pastors or clerics has been helped to do such things.

Dangerous: If this program is on your computer, delete it immediately!


If you are a fan of downloading Torrent, you have probably heard or are using the "utorrent" program on your computer to download torrent files. Unfortunately, this program has become unregistered, especially after it was discovered that it is installing the currency mining tool "Petequin" on the users' machines to exploit for mining this currency, and this is back to the year 2015 .


Dangerous: If this program is on your computer, delete it immediately!
Dangerous: If this program is on your computer, delete it immediately!

This program comes back to the interface after it was discovered that it uses flash ads that are used to install malware on the computers of users. According to a group of users who have discovered this in their computers. So far, there is no official announcement from the developers of the program.



This software allows hackers to access your computer remotely, and can steal your sensitive data (images, accounts, and passwords). This software is more dangerous than ransom software, which only encrypts files and asks you to pay for decryption.

Dangerous: If this program is on your computer, delete it immediately!
Dangerous: If this program is on your computer, delete it immediately!

Warning: This malware is not recognized by various antivirus programs. So you should immediately delete the program from your computer and compensate for one of the open source programs!

Tuesday, May 16, 2017

Storage Bag 2017


  • Dimensions (cm): H43 x L50
  • Weight: 0.30 Kg
  • Manufacture of an eco-friendly bag
  • This large striped canvas bag adopts the style "MG" ,
  • This storage bag can be used ideally as a laundry basket.
  • Indispensable, this laundry bag has two handles to be transported more easily.
  • An ultra practical storage accessory that will put order in the room.



Buy Storage Bag  = 4.99 $
Link for Buy : Ebay

Saturday, May 13, 2017

What is virus ransom and How do you reduce your risk of him?


What is virus ransom?
What is virus ransom?

What is virus ransom?

Is a malicious program that affects smartphones and computers, encrypts and locks their data so that it can not be accessed until after payment is made.

How can a ransom virus penetrate you?

1. A message or link from an anonymous person arrives, and the content of the link is a file containing malicious software.

2. The sender is tempted by the victim to download the file through his or her deceit as an important or personal file.

3. The user uploads the file to his or her smartphone.

4. The virus encrypts important data in the device or encrypts the entire device, so that the user can not access his data.

5. The offender asks the victim for a "ransom" money in exchange for the decoding of the data and returning it to its nature.

How do you reduce your risk of the virus?

- Make sure to backup your device data constantly, to recover it if you are infected with the virus.

- Avoid opening links from unknown sources, and do not upload files sent by anonymous people via e-mail.

- Use anti-virus software and be original and non-mimic, and update it constantly

- Update the operating system of your phone and PC continuously, and be sure to update the software in it.

- Avoid access to suspicious sites

Be sure to download software and applications from their official sources and avoid pirated programs

What to do if your computer gets infected with the virus

- Avoid obeying them. If you pay the required amount, they will continue to extort and ask for more money.

What do you do if your computer gets infected with the virus?

• Avoid obeying them. If you pay the required amount, they will continue to extort and ask for more money.

• If the affected device is affiliated to your organization, inform the IT department directly.

• If the affected device is your personal computer, take it to the authorized dealer for repair

• If the affected device is affiliated to your organization, inform the IT department directly.

• Stop operations in the device or network directly and restore the backup.

What are the top 10 things Americans don't know about the rest of the world?


What are the top 10 things Americans don't know about the rest of the world?
What are the top 10 things Americans don't know about the rest of the world?

the American who spends several months each year outside of the USA , on him
to learn a thing or two:

Refills are not automatic. You pay for them. Everywhere.
Ketchup is not always free, even at McDonalds.
There is nothing special about a U.S. Dollar -- and nobody feels flattered to get it as a tip.
Nobody else likes the idea of tipping 20% or having sales tax added as an extra. Nobody.
Nobody else ever asks where you go to church or whether you go to church.
Football is the world's most popular sport and it is not played by steroid-bloated giants wearing huge helmets.
Nobody in the world wishes they too had a Second Amendment to allow everyone to conceal and carry a weapon.
Not everybody in the world lives with the fear that a medical problem will send them into poverty.
That people from other countries actually take long family vacations without the fear that they will lose their jobs for taking them.
That not everybody in the world speaks English.

An interaction with the electronic attack that hit the world



An interaction with the electronic attack that hit the world yesterday ... And that was the ransom WannaCry ..
An interaction with the electronic attack that hit the world yesterday ... And that was the ransom WannaCry ..

An interaction with the electronic attack that hit the world yesterday ... And that was the ransom WannaCry ..

This virus hit the 74 Countries so far

WannaCry exploits one of the leaks in NSA leaks by exploiting Server Message Block or SMB, which is responsible for Disk and File Sharing control and is used in Windows.

The vulnerability enables the exploitation of this protocol and the penetration of users and the sending of ransom viruses within their devices after collecting money from the process of penetration.

- How to protect myself?

Symantec has launched the Toggle Too much SMB2 tool that you can download from

https://www.symantec.com/connect/downloads/smb2-toggle-too-mikes-tool-set

 - Run the tool with Administrator privileges after it is finished, your device will be restarted.



Reader technology to monitor the emotions of the criminal before committing prohibited


Reader technology to monitor the emotions of the criminal before committing prohibited
Reader technology to monitor the emotions of the criminal before committing prohibited

A Russian company has invented an emotion-reader technology that could soon be used by police.
NtechLab said the new tool - a software application for surveillance cameras - can identify people in the crowd, and know if they are angry, nervous or nervous. They monitor any suspicious behavior by tracing the person's identity, age, gender and current emotional state.
She noted that the application had helped reunite friends and family members who had been missing for a long time, and had helped the police resolve two outstanding old cases and identify criminals.
The company added that the addition of the property of emotions - accuracy of more than 94% - can give the program real-time crime control capabilities.
Commenting on privacy concerns, the company said surveillance cameras are almost everywhere, and not being there is likely to raise some people's concerns, so when a person is in a public place there is no privacy. She added that the privacy forecast has disappeared with the arrival of smart phones that know a lot about us, including our actions and our whereabouts.
The company hopes to develop more real-world applications and cloud applications for facial recognition and emotion recognition software.

Why You Should No Stop Using Telegram Right Now

Why You Should no Stop Using Telegram Right Now


5 Best Messenger Apps with the Least Data Usage

5 Best Messenger Apps with the Least Data Usage


The application of chat and instant messaging to competing applications, particularly Whatsapp and Facebook Messenger, surpassed the lack of data consumption, according to a study which compares prices of telecommunications and Internet services.
Telegram , Whatsapp, Hangouts, Facebook, Facebook Messenger and Skype have been tested, according to three scenarios of light, medium and intensive use of data via the 4G network.
Telegram came first in terms of consumption in the lowest scenarios, followed by Whatsapp in second place and Hangouts, while the application Messenger and Skype in the last two.
According to the study, Skype consumes more than three times more than the low usage of data and about eight times the intensive use, while the difference between Telegram and Whatsapp in low usage is small, but it has doubled in intensive use.

Why You Should no Stop Using Telegram Right Now
Why You Should no Stop Using Telegram Right Now

Tablet Sales Decline for 10th Consecutive Quarter



Tablet Sales Decline for 10th Consecutive Quarter

Tablet Sales Decline for 10th Consecutive Quarter 


Tablet PC sales continued to decline for the 10th consecutive quarter, without any indication that the decline could be halted in line with recent market research firm IDC.
The first quarter of 2017 saw a decline of 8.5% year-on-year with 36.2 million shipments worldwide compared to 39.6 million in the same quarter last year.

Tablet market shipments drop for 10th-straight quarter

Tablet market shipments drop for 10th-straight quarter


Company numbers include traditional tablet PCs and tablets that come with a detachable keyboard.
According to the report, Apple and Samsung maintained their position in the first and second places respectively, despite a drop in Apple's shipments figures by 1.3%, followed by companies Huawei, Amazon and Lenovo, the five companies managed to acquire 60.2% of the market.

iPad Sales Continued To Decline For 13th Consecutive Quarter
iPad Sales Continued To Decline For 13th Consecutive Quarter
                                           





Wednesday, May 3, 2017

Facebook and Google face a multi-million dollar scam . The fraudster gets $ 100 million from Google and Facebook . Facebook and Google Were Victims of $100M Payment Scam . Google and Facebook duped in huge 'scam' . Facebook, Google got hit with a $100M email scam . Google and Facebook lose ‘£77 million after falling for phishing scam sending cash to Lithuanian conman’ . Technology and Internet giants Google and Facebook have confirmed they have fallen victim to fraudulent e-mail messages

Facebook and Google face a multi-million dollar scam . The fraudster gets $ 100 million from Google and Facebook


Facebook and Google face a multi-million dollar scam . The fraudster gets $ 100 million from Google and Facebook
Facebook and Google face a multi-million dollar scam . The fraudster gets $ 100 million from Google and Facebook
When the Justice Department announced the arrest last month of a man who allegedly swindled more than $100 million from two U.S. tech giants, the news came wrapped in a mystery. The agency didn’t say who was robbed, and nor did it identify the Asian supplier the crook impersonated to pull off the scheme.
Google and Facebook lose ‘£77 million after falling for phishing scam sending cash to Lithuanian conman’
Google and Facebook lose ‘£77 million after falling for phishing scam sending cash to Lithuanian conman’

Last month, the US Justice Department accused a Lithuanian citizen of fraud and money laundering after documents revealed he had sued Google and Facebook for $ 100 million.
According to a report by the economic site "Fortune", the two companies were the victim of a person of Lithuanian nationality, after the identity of the Taiwanese electronics factory, Google and Facebook confirmed that their employees were victims of fraud by the accused, called Ivaldas Rimasuskas, and 48 years, Between 2013 and 2015.
The Lithuanian accused of sending millions of dollars in letters and forged forged invoices on a regular basis, via e-mail that appeared to have been issued by the Asian company, which appeared to have been issued and signed by executives and clients of the two victims. Payments in bank accounts in Latvia, Cyprus, Hong Kong, Slovenia, Hungary and Lithuania.
A spokesman for both Facebook and Google said the two companies managed to recover a large portion of the money, after the disclosure of the fraud, but they did not disclose the amount of funds transferred or recovered from Rimasuskas.
If convicted, Rimasuskas faces 20 years in prison for each fraud and money laundering.




Monday, May 1, 2017

"The Death Trap" Bermuda Triangle .. just a myth !! "death trap" of the Bermuda Triangle never existed



"The Death Trap" Bermuda Triangle .. just a myth !!
"The Death Trap" Bermuda Triangle .. just a myth !!

Scientists have confirmed that methane balls do not sink the ship in the Predoda triangle. And that the "death trap" of the Bermuda Triangle never existed.

Anyone interested in the mystery of the Bermuda Triangle's "death trap" may have heard, with this explanation, huge explosions of methane pellets
The reason for the sinking of ships and aircraft in the area known as the Bermuda Triangle

The researchers said that "Qatar is the holes that result from the explosions discovered up to 500 meters and a depth of 45 meters,
They estimate that "gaseous emissions from these pits when mixed with a large amount of methane cause the Atlantic waters to rise."

"death trap" of the Bermuda Triangle never existed
"The Death Trap" Bermuda Triangle .. just a myth !!

However, physicist and oceanographer Helen Czarski pointed out that the ships being built today are built so as not to overturn the surface of the sea .So when methane leaks it just pushes the boat to the other side

Wednesday, April 26, 2017

Nokia 9, which may defeat the Galaxy S8 and iPhone 8


                             Nokia 9 be the black horse among the leading phones this year
                           Nokia 9 be the black horse among the leading phones this year















                      The Nokia owner of the rights to manufacture Nokia phones launched a number of phones in specific countries, namely Nokia 3, Nokia 5 and Nokia 6, and will later be introduced phones Nokia 7 and Nokia 8 And Nokia 9.
The Nokia 9 is the flagship phone among those phones, which has to compete with the Samsung Galaxy S8 phone recently unveiled by the South Korean company, and the phone for iPhone 8, which will be unveiled by Apple months later.
The company is expected to launch the Nokia 9 in the second half of this year, and it is reported that it may be launched either in late July or early August, and is expected to be priced at $ 699 in the United States and 749 euros in Europe .
The new Nokia phone is almost certain to come with a number of top-class phones to be launched in 2017, such as the Galaxy S8, iPhone 8 and the May 6.
According to most reports, the phone will come with a new rimless design around the screen, with two rear cameras, features such as IP68 water and dust resistance, a fingerprint scanner, another eye iris scanner and a new stereo sound system called OZO.
In terms of internal hardware, the Nokia 9 is expected to come with a 5.5-inch screen with 1440 x 2560 pixel resolution, with Qualcomm Snapdragon 835 and Android 7.1.2.
It is also reported that the phone will come with six gigabytes of RAM and two internal storage options of 64 and 128 gigabytes, with the possibility to increase capacity using a microSD memory card. The main back camera will be 22 megapixels and have Carl lenses While the front camera will come with 12 megapixels, and the phone will run a 3800mAh battery to support the fourth generation of fast charging technology.
As noted by the reader, the above specifications are all in the top category, which can easily put the Nokia 9 phone in close competition with the top-class phones of the handset manufacturers in the market, most notably Samsung and Apple, but the above remain only unverified reports until the phone is officially announced or announced , Will Nokia 9 be the black horse among the leading phones this year? This will be seen later.

Nokia Smartphones for Apple iPhone

Tuesday, April 25, 2017

Charging the phone in cargo centers at airports and public places presents the phones at risk of "stealing the juice"


Charging the phone in cargo centers at airports and public places presents the phones at risk of "stealing the juice"
Charging the phone in cargo centers at airports and public places presents the phones at risk of "stealing the juice"



It was widely believed that smartphones could be hacked when they were shipped using a USB data cable, but a new study revealed that it was also possible to penetrate smart phones through conventional power cables once connected to an energy source.
In a study published in the scientific journal Informatics and Security, researchers warned that public transport units could be used to penetrate smart phones and snoop on Web sites viewed by a user on his mobile phone.
The user often charges a smartphone at a shipping hub in airports and public places. If the center is hacked, the user risks exposing his phone to the risk of data theft through the USB data cable, the so-called " Steal the juice, "according to researchers.
The study by the New York Institute of Technology is the first to show that even without a data cable, hackers can analyze the power consumption of the device to see user-specific, accurate, and speed-based information on a number of factors.
"Web pages have special fingerprints that reflect the way energy is loaded and consumed, and these effects are like fingerprints that help hackers know the Web sites on the smartphone," says researcher Paolo Gaste.
In a previous study, researchers cautioned that the cable you used to charge your phone was also used to send data from your phone to other devices. For example, when your iPhone connects your Mac to a charger, you can still download images from your phone to your computer.
Therefore, if a USB port is hacked, there is no limit to what a victim can get from your phone, including e-mail, text messages, images, and contacts.
To avoid the risk of hacking your phone and violating your privacy in public, use a mobile external battery to charge your phone whenever necessary.

Three applications to control your computer remotely . Remote Desktop Remote Control Applications Technical Support File Transfer Browser Chrome



Three applications to control your computer remotely
Three applications to control your computer remotely

With the continued reliance on technology in this age, the need for applications that allow the user to control his computer remotely is increasing.
With these applications, you can access your computer's desktop from anywhere in the world, and it is also an important tool to provide technical support to others.
Here are the top three remote desktop control applications:
Application of TeamViewer
Available on: Windows, Mac, Android, IOS, Linux, Windows Phone, Chrome, BlackBerry.
With a simple experience of this application you will notice that it offers a range of features that make it superior to its competitors. It not only allows flexible remote desktop control, it also supports file transfer, video calls and remote viewing.
The program setup is very easy, and you can choose between a basic installation or a one-time operation. You do not need to create an account, just write your computer ID and password.
The application is fast and smooth, with a very simple interface, despite the wide variety of functionality it offers.
AnyDesk application
Available on: Windows, Mac, Android, IOS, Linux.
This application is a powerful remote desktop control option on various platforms, and the application developed by previous TeamViewer staff has been able to offer a simpler and more flexible experience.
The application offers a range of useful options, such as giving the user full control over the device and not just sharing the screen with him, as well as supporting file sharing.
But if you're looking for features like screen recording or video calling, the app will not fit your needs at least until now.
Overall, AnyDesk is one of the best remote desktop control options, especially for simplicity and ease of use. Although it lacks some of the features offered by TeamViewer, it remains one of the best alternatives available in this area.
Chrome Remote Desktop app
Available on: Windows, Mac (through browser), Android, IOS.
If you're looking for an application to just control your remote desktop without the additional benefits of file transfer, you can rely on the Chrome Remote Desktop application that allows users to access the remote desktop through a Chrome browser.
The app is very suitable for users of this browser who do not want to install additional desktop control software, especially since it is very easy to setup and use.