May 2017 | German Technology

Thursday, May 18, 2017

How to Delete Icloud from iPhone Phones 2017 . 5 Ways to unlock an iCloud locked iPhone


How to Delete Icloud from iPhone Phones 2017

Are you looking to solve the problem of Icloud on your phone if I hope you are in the right place, because here I will share a genius way to remove the Icloud from your phone, the way that I have shared one of my close friends and who after an effort to be convinced to share with you in this post, In order to publish the subject, although he is sure that the Arabs will be smashed the way later (lol). On the whole, this smart friend knows very well that technically it is very difficult for the ICD to be removed via hardware or software, so he has followed a different method in a way called in the field of information security. The way is to contact Apple's support and convince them that the phone was purchased by a user from a well-known store or website such as Ebay and you were surprised that the phone had icecode and so you could not use it. Therefore, the company will ask you for some information that you will find in the original purchase invoice of the phone.

How to Delete Icloud from iPhone Phones 2017
How to Delete Icloud from iPhone Phones 2017

Ooh Yes, you do not have the original purchase tab to provide them with the required information! Here are the information you will need such as: date of purchase, country of purchase, seller's name and phone serial number. You can find it in IMEI phone number by using some famous sites that tell you information about the phone such as iphoneimei.info.

Now that we've got a complete idea of ​​the way, let's get into the details:

First: Create a new Emile (choose any company)

Unlock iCloud Lock Permanently via IMEI Code on iPhone
Unlock iCloud Lock Permanently via IMEI Code on iPhone
Second: Install the code # 06 # * without the IMEI number. Go and search for sites that give you information about the IMEI number such as iphoneimei.info. (You do not have to work with this site. You should search for other sites that recognize the IMEI code and Google. Here your friend will find these sites.

Third: You will find a fake invoice is a file Photoshop Download at the bottom of this post, then changed the invoice information to the information obtained through the IMEI number

Fourth, contact Apple by telephone by the following phone numbers depending on the language you trust:

English: +18006947466
French: +330805540003

Fourthly: After answering your phone, tell them that you bought a used phone from Ebay and that the phone is on it and you need help, the employee will ask you to provide it with your full name, so do not hesitate.

The employee will be asked to stay with him on line ... he will then ask you to contact the seller and ask him to remove the icecode from the phone. Here you will tell them that the seller no longer answers you on your email 3 months from the date of purchase of the phone. After that, the employee will ask you if you have the original invoice to buy the phone. Answer immediately that the seller has sent you the original invoice with the phone used. After that, the employee will ask you to wait a little (at this point the staff member will refer you to the general observer)

5 Ways to unlock an iCloud locked iPhone
5 Ways to unlock an iCloud locked iPhone
Fifth: General Controller may ask you to email him or ask you to your special Emilek, here you will give him the EML, which was established in the first step, and you will write them with the original invoice to buy the phone, of course the original invoice is the invoice that I visited. After that, the employee will tell you that what happened to you is very normal. Do not worry.

So you've successfully deleted the icloud from the phone, and we hope that God has helped you solve this problem that a lot of people are suffering from.




The strangest thing that Russia has done in order to face the ransom virus that terrified the world!


The strangest thing in Russia has done in order to face the ransom virus that terrified the world!
There is no doubt that the ransom virus, which has spread recently, has created great horror in companies and countries, especially after the damage caused to a group of sectors and companies, and stop work in some days. But each country has a way of dealing with these threats, which will not end. But what has Russia done to deal with the latest ransom virus?

The strangest thing in Russia has done in order to face the ransom virus that terrified the world!
The strangest thing in Russia has done in order to face the ransom virus that terrified the world!
Russia is undoubtedly one of the advanced countries in the field of protection and electronic security, one of the countries that has high capabilities in the field of hackers and breakthroughs, but did you imagine that Russia would use a priest to address the dangerous virus!

The strangest thing in Russia has done in order to face the ransom virus that terrified the world!
The strangest thing in Russia has done in order to face the ransom virus that terrified the world!

This is what happened. The Russian Orthodox Patriarch was summoned to the Ministry of State for Internal Affairs to sprinkle "holy water" on the servers to protect them from ransom. In Russia, there is no separation between church and state. The Orthodox Church is considered one of the most important institutions in the country. It has an important relationship with the Russian government. As its leader, Patriarch Kirill Moscow has close cooperation with President Vladimir Putin on matters of state!

The strangest thing in Russia has done in order to face the ransom virus that terrified the world!
The strangest thing in Russia has done in order to face the ransom virus that terrified the world!
A collection of photographs of this process has been published, a picture widely known on the Internet. Many people will wonder about the role of "holy water" in protecting servers from potential attacks.

Of course, this is not the first time that one of the pastors or clerics has been helped to do such things.

Dangerous: If this program is on your computer, delete it immediately!


If you are a fan of downloading Torrent, you have probably heard or are using the "utorrent" program on your computer to download torrent files. Unfortunately, this program has become unregistered, especially after it was discovered that it is installing the currency mining tool "Petequin" on the users' machines to exploit for mining this currency, and this is back to the year 2015 .


Dangerous: If this program is on your computer, delete it immediately!
Dangerous: If this program is on your computer, delete it immediately!

This program comes back to the interface after it was discovered that it uses flash ads that are used to install malware on the computers of users. According to a group of users who have discovered this in their computers. So far, there is no official announcement from the developers of the program.



This software allows hackers to access your computer remotely, and can steal your sensitive data (images, accounts, and passwords). This software is more dangerous than ransom software, which only encrypts files and asks you to pay for decryption.

Dangerous: If this program is on your computer, delete it immediately!
Dangerous: If this program is on your computer, delete it immediately!

Warning: This malware is not recognized by various antivirus programs. So you should immediately delete the program from your computer and compensate for one of the open source programs!

Tuesday, May 16, 2017

Storage Bag 2017


  • Dimensions (cm): H43 x L50
  • Weight: 0.30 Kg
  • Manufacture of an eco-friendly bag
  • This large striped canvas bag adopts the style "MG" ,
  • This storage bag can be used ideally as a laundry basket.
  • Indispensable, this laundry bag has two handles to be transported more easily.
  • An ultra practical storage accessory that will put order in the room.



Buy Storage Bag  = 4.99 $
Link for Buy : Ebay

Saturday, May 13, 2017

What is virus ransom and How do you reduce your risk of him?


What is virus ransom?
What is virus ransom?

What is virus ransom?

Is a malicious program that affects smartphones and computers, encrypts and locks their data so that it can not be accessed until after payment is made.

How can a ransom virus penetrate you?

1. A message or link from an anonymous person arrives, and the content of the link is a file containing malicious software.

2. The sender is tempted by the victim to download the file through his or her deceit as an important or personal file.

3. The user uploads the file to his or her smartphone.

4. The virus encrypts important data in the device or encrypts the entire device, so that the user can not access his data.

5. The offender asks the victim for a "ransom" money in exchange for the decoding of the data and returning it to its nature.

How do you reduce your risk of the virus?

- Make sure to backup your device data constantly, to recover it if you are infected with the virus.

- Avoid opening links from unknown sources, and do not upload files sent by anonymous people via e-mail.

- Use anti-virus software and be original and non-mimic, and update it constantly

- Update the operating system of your phone and PC continuously, and be sure to update the software in it.

- Avoid access to suspicious sites

Be sure to download software and applications from their official sources and avoid pirated programs

What to do if your computer gets infected with the virus

- Avoid obeying them. If you pay the required amount, they will continue to extort and ask for more money.

What do you do if your computer gets infected with the virus?

• Avoid obeying them. If you pay the required amount, they will continue to extort and ask for more money.

• If the affected device is affiliated to your organization, inform the IT department directly.

• If the affected device is your personal computer, take it to the authorized dealer for repair

• If the affected device is affiliated to your organization, inform the IT department directly.

• Stop operations in the device or network directly and restore the backup.

What are the top 10 things Americans don't know about the rest of the world?


What are the top 10 things Americans don't know about the rest of the world?
What are the top 10 things Americans don't know about the rest of the world?

the American who spends several months each year outside of the USA , on him
to learn a thing or two:

Refills are not automatic. You pay for them. Everywhere.
Ketchup is not always free, even at McDonalds.
There is nothing special about a U.S. Dollar -- and nobody feels flattered to get it as a tip.
Nobody else likes the idea of tipping 20% or having sales tax added as an extra. Nobody.
Nobody else ever asks where you go to church or whether you go to church.
Football is the world's most popular sport and it is not played by steroid-bloated giants wearing huge helmets.
Nobody in the world wishes they too had a Second Amendment to allow everyone to conceal and carry a weapon.
Not everybody in the world lives with the fear that a medical problem will send them into poverty.
That people from other countries actually take long family vacations without the fear that they will lose their jobs for taking them.
That not everybody in the world speaks English.

An interaction with the electronic attack that hit the world



An interaction with the electronic attack that hit the world yesterday ... And that was the ransom WannaCry ..
An interaction with the electronic attack that hit the world yesterday ... And that was the ransom WannaCry ..

An interaction with the electronic attack that hit the world yesterday ... And that was the ransom WannaCry ..

This virus hit the 74 Countries so far

WannaCry exploits one of the leaks in NSA leaks by exploiting Server Message Block or SMB, which is responsible for Disk and File Sharing control and is used in Windows.

The vulnerability enables the exploitation of this protocol and the penetration of users and the sending of ransom viruses within their devices after collecting money from the process of penetration.

- How to protect myself?

Symantec has launched the Toggle Too much SMB2 tool that you can download from

https://www.symantec.com/connect/downloads/smb2-toggle-too-mikes-tool-set

 - Run the tool with Administrator privileges after it is finished, your device will be restarted.



Reader technology to monitor the emotions of the criminal before committing prohibited


Reader technology to monitor the emotions of the criminal before committing prohibited
Reader technology to monitor the emotions of the criminal before committing prohibited

A Russian company has invented an emotion-reader technology that could soon be used by police.
NtechLab said the new tool - a software application for surveillance cameras - can identify people in the crowd, and know if they are angry, nervous or nervous. They monitor any suspicious behavior by tracing the person's identity, age, gender and current emotional state.
She noted that the application had helped reunite friends and family members who had been missing for a long time, and had helped the police resolve two outstanding old cases and identify criminals.
The company added that the addition of the property of emotions - accuracy of more than 94% - can give the program real-time crime control capabilities.
Commenting on privacy concerns, the company said surveillance cameras are almost everywhere, and not being there is likely to raise some people's concerns, so when a person is in a public place there is no privacy. She added that the privacy forecast has disappeared with the arrival of smart phones that know a lot about us, including our actions and our whereabouts.
The company hopes to develop more real-world applications and cloud applications for facial recognition and emotion recognition software.

Why You Should No Stop Using Telegram Right Now

Why You Should no Stop Using Telegram Right Now


5 Best Messenger Apps with the Least Data Usage

5 Best Messenger Apps with the Least Data Usage


The application of chat and instant messaging to competing applications, particularly Whatsapp and Facebook Messenger, surpassed the lack of data consumption, according to a study which compares prices of telecommunications and Internet services.
Telegram , Whatsapp, Hangouts, Facebook, Facebook Messenger and Skype have been tested, according to three scenarios of light, medium and intensive use of data via the 4G network.
Telegram came first in terms of consumption in the lowest scenarios, followed by Whatsapp in second place and Hangouts, while the application Messenger and Skype in the last two.
According to the study, Skype consumes more than three times more than the low usage of data and about eight times the intensive use, while the difference between Telegram and Whatsapp in low usage is small, but it has doubled in intensive use.

Why You Should no Stop Using Telegram Right Now
Why You Should no Stop Using Telegram Right Now

Tablet Sales Decline for 10th Consecutive Quarter



Tablet Sales Decline for 10th Consecutive Quarter

Tablet Sales Decline for 10th Consecutive Quarter 


Tablet PC sales continued to decline for the 10th consecutive quarter, without any indication that the decline could be halted in line with recent market research firm IDC.
The first quarter of 2017 saw a decline of 8.5% year-on-year with 36.2 million shipments worldwide compared to 39.6 million in the same quarter last year.

Tablet market shipments drop for 10th-straight quarter

Tablet market shipments drop for 10th-straight quarter


Company numbers include traditional tablet PCs and tablets that come with a detachable keyboard.
According to the report, Apple and Samsung maintained their position in the first and second places respectively, despite a drop in Apple's shipments figures by 1.3%, followed by companies Huawei, Amazon and Lenovo, the five companies managed to acquire 60.2% of the market.

iPad Sales Continued To Decline For 13th Consecutive Quarter
iPad Sales Continued To Decline For 13th Consecutive Quarter
                                           





Wednesday, May 3, 2017

Facebook and Google face a multi-million dollar scam . The fraudster gets $ 100 million from Google and Facebook . Facebook and Google Were Victims of $100M Payment Scam . Google and Facebook duped in huge 'scam' . Facebook, Google got hit with a $100M email scam . Google and Facebook lose ‘£77 million after falling for phishing scam sending cash to Lithuanian conman’ . Technology and Internet giants Google and Facebook have confirmed they have fallen victim to fraudulent e-mail messages

Facebook and Google face a multi-million dollar scam . The fraudster gets $ 100 million from Google and Facebook


Facebook and Google face a multi-million dollar scam . The fraudster gets $ 100 million from Google and Facebook
Facebook and Google face a multi-million dollar scam . The fraudster gets $ 100 million from Google and Facebook
When the Justice Department announced the arrest last month of a man who allegedly swindled more than $100 million from two U.S. tech giants, the news came wrapped in a mystery. The agency didn’t say who was robbed, and nor did it identify the Asian supplier the crook impersonated to pull off the scheme.
Google and Facebook lose ‘£77 million after falling for phishing scam sending cash to Lithuanian conman’
Google and Facebook lose ‘£77 million after falling for phishing scam sending cash to Lithuanian conman’

Last month, the US Justice Department accused a Lithuanian citizen of fraud and money laundering after documents revealed he had sued Google and Facebook for $ 100 million.
According to a report by the economic site "Fortune", the two companies were the victim of a person of Lithuanian nationality, after the identity of the Taiwanese electronics factory, Google and Facebook confirmed that their employees were victims of fraud by the accused, called Ivaldas Rimasuskas, and 48 years, Between 2013 and 2015.
The Lithuanian accused of sending millions of dollars in letters and forged forged invoices on a regular basis, via e-mail that appeared to have been issued by the Asian company, which appeared to have been issued and signed by executives and clients of the two victims. Payments in bank accounts in Latvia, Cyprus, Hong Kong, Slovenia, Hungary and Lithuania.
A spokesman for both Facebook and Google said the two companies managed to recover a large portion of the money, after the disclosure of the fraud, but they did not disclose the amount of funds transferred or recovered from Rimasuskas.
If convicted, Rimasuskas faces 20 years in prison for each fraud and money laundering.




Monday, May 1, 2017

"The Death Trap" Bermuda Triangle .. just a myth !! "death trap" of the Bermuda Triangle never existed



"The Death Trap" Bermuda Triangle .. just a myth !!
"The Death Trap" Bermuda Triangle .. just a myth !!

Scientists have confirmed that methane balls do not sink the ship in the Predoda triangle. And that the "death trap" of the Bermuda Triangle never existed.

Anyone interested in the mystery of the Bermuda Triangle's "death trap" may have heard, with this explanation, huge explosions of methane pellets
The reason for the sinking of ships and aircraft in the area known as the Bermuda Triangle

The researchers said that "Qatar is the holes that result from the explosions discovered up to 500 meters and a depth of 45 meters,
They estimate that "gaseous emissions from these pits when mixed with a large amount of methane cause the Atlantic waters to rise."

"death trap" of the Bermuda Triangle never existed
"The Death Trap" Bermuda Triangle .. just a myth !!

However, physicist and oceanographer Helen Czarski pointed out that the ships being built today are built so as not to overturn the surface of the sea .So when methane leaks it just pushes the boat to the other side