Skip to main content

Posts

Showing posts from May, 2017

How to Delete Icloud from iPhone Phones 2017 . 5 Ways to unlock an iCloud locked iPhone

How to Delete Icloud from iPhone Phones 2017 Are you looking to solve the problem of Icloud on your phone if I hope you are in the right place, because here I will share a genius way to remove the Icloud from your phone, the way that I have shared one of my close friends and who after an effort to be convinced to share with you in this post, In order to publish the subject, although he is sure that the Arabs will be smashed the way later (lol). On the whole, this smart friend knows very well that technically it is very difficult for the ICD to be removed via hardware or software, so he has followed a different method in a way called in the field of information security. The way is to contact Apple's support and convince them that the phone was purchased by a user from a well-known store or website such as Ebay and you were surprised that the phone had icecode and so you could not use it. Therefore, the company will ask you for some information that you will find in the original

The strangest thing that Russia has done in order to face the ransom virus that terrified the world!

The strangest thing in Russia has done in order to face the ransom virus that terrified the world! There is no doubt that the ransom virus, which has spread recently, has created great horror in companies and countries, especially after the damage caused to a group of sectors and companies, and stop work in some days. But each country has a way of dealing with these threats, which will not end. But what has Russia done to deal with the latest ransom virus? The strangest thing in Russia has done in order to face the ransom virus that terrified the world! Russia is undoubtedly one of the advanced countries in the field of protection and electronic security, one of the countries that has high capabilities in the field of hackers and breakthroughs, but did you imagine that Russia would use a priest to address the dangerous virus! The strangest thing in Russia has done in order to face the ransom virus that terrified the world! This is what happened. The Russian Orthodox Pat

Dangerous: If this program is on your computer, delete it immediately!

If you are a fan of downloading Torrent, you have probably heard or are using the "utorrent" program on your computer to download torrent files. Unfortunately, this program has become unregistered, especially after it was discovered that it is installing the currency mining tool "Petequin" on the users' machines to exploit for mining this currency, and this is back to the year 2015 . Dangerous: If this program is on your computer, delete it immediately! This program comes back to the interface after it was discovered that it uses flash ads that are used to install malware on the computers of users. According to a group of users who have discovered this in their computers. So far, there is no official announcement from the developers of the program. This software allows hackers to access your computer remotely, and can steal your sensitive data (images, accounts, and passwords). This software is more dangerous than ransom software, which only encry

Storage Bag 2017

Dimensions (cm): H43 x L50 Weight: 0.30 Kg Manufacture of an eco-friendly bag This large striped canvas bag adopts the style "MG" , This storage bag can be used ideally as a laundry basket. Indispensable, this laundry bag has two handles to be transported more easily. An ultra practical storage accessory that will put order in the room. Buy Storage Bag  = 4.99 $ Link for Buy : Ebay

What is virus ransom and How do you reduce your risk of him?

What is virus ransom? What is virus ransom? Is a malicious program that affects smartphones and computers, encrypts and locks their data so that it can not be accessed until after payment is made. How can a ransom virus penetrate you? 1. A message or link from an anonymous person arrives, and the content of the link is a file containing malicious software. 2. The sender is tempted by the victim to download the file through his or her deceit as an important or personal file. 3. The user uploads the file to his or her smartphone. 4. The virus encrypts important data in the device or encrypts the entire device, so that the user can not access his data. 5. The offender asks the victim for a "ransom" money in exchange for the decoding of the data and returning it to its nature. How do you reduce your risk of the virus? - Make sure to backup your device data constantly, to recover it if you are infected with the virus. - Avoid opening links from unknown s

What are the top 10 things Americans don't know about the rest of the world?

What are the top 10 things Americans don't know about the rest of the world? the American who spends several months each year outside of the USA , on him to learn a thing or two: Refills are not automatic. You pay for them. Everywhere. Ketchup is not always free, even at McDonalds. There is nothing special about a U.S. Dollar -- and nobody feels flattered to get it as a tip. Nobody else likes the idea of tipping 20% or having sales tax added as an extra. Nobody. Nobody else ever asks where you go to church or whether you go to church. Football is the world's most popular sport and it is not played by steroid-bloated giants wearing huge helmets. Nobody in the world wishes they too had a Second Amendment to allow everyone to conceal and carry a weapon. Not everybody in the world lives with the fear that a medical problem will send them into poverty. That people from other countries actually take long family vacations without the fear that they will lose their jo

An interaction with the electronic attack that hit the world

An interaction with the electronic attack that hit the world yesterday ... And that was the ransom WannaCry .. An interaction with the electronic attack that hit the world yesterday ... And that was the ransom WannaCry .. This virus hit the 74 Countries so far WannaCry exploits one of the leaks in NSA leaks by exploiting Server Message Block or SMB, which is responsible for Disk and File Sharing control and is used in Windows. The vulnerability enables the exploitation of this protocol and the penetration of users and the sending of ransom viruses within their devices after collecting money from the process of penetration. - How to protect myself? Symantec has launched the Toggle Too much SMB2 tool that you can download from https://www.symantec.com/connect/downloads/smb2-toggle-too-mikes-tool-set  - Run the tool with Administrator privileges after it is finished, your device will be restarted.

Reader technology to monitor the emotions of the criminal before committing prohibited

Reader technology to monitor the emotions of the criminal before committing prohibited A Russian company has invented an emotion-reader technology that could soon be used by police. NtechLab said the new tool - a software application for surveillance cameras - can identify people in the crowd, and know if they are angry, nervous or nervous. They monitor any suspicious behavior by tracing the person's identity, age, gender and current emotional state. She noted that the application had helped reunite friends and family members who had been missing for a long time, and had helped the police resolve two outstanding old cases and identify criminals. The company added that the addition of the property of emotions - accuracy of more than 94% - can give the program real-time crime control capabilities. Commenting on privacy concerns, the company said surveillance cameras are almost everywhere, and not being there is likely to raise some people's concerns, so when a person is

Why You Should No Stop Using Telegram Right Now

Why You Should no Stop Using Telegram Right Now 5 Best Messenger Apps with the Least Data Usage The application of chat and instant messaging to competing applications, particularly Whatsapp and Facebook Messenger, surpassed the lack of data consumption, according to a study which compares prices of telecommunications and Internet services. Telegram , Whatsapp, Hangouts, Facebook, Facebook Messenger and Skype have been tested, according to three scenarios of light, medium and intensive use of data via the 4G network. Telegram came first in terms of consumption in the lowest scenarios, followed by Whatsapp in second place and Hangouts, while the application Messenger and Skype in the last two. According to the study, Skype consumes more than three times more than the low usage of data and about eight times the intensive use, while the difference between Telegram and Whatsapp in low usage is small, but it has doubled in intensive use. Why You Should no Stop Using Telegr

Tablet Sales Decline for 10th Consecutive Quarter

Tablet Sales Decline for 10th Consecutive Quarter  Tablet PC sales continued to decline for the 10th consecutive quarter, without any indication that the decline could be halted in line with recent market research firm IDC. The first quarter of 2017 saw a decline of 8.5% year-on-year with 36.2 million shipments worldwide compared to 39.6 million in the same quarter last year. Tablet market shipments drop for 10th-straight quarter Company numbers include traditional tablet PCs and tablets that come with a detachable keyboard. According to the report, Apple and Samsung maintained their position in the first and second places respectively, despite a drop in Apple's shipments figures by 1.3%, followed by companies Huawei, Amazon and Lenovo, the five companies managed to acquire 60.2% of the market. iPad Sales Continued To Decline For 13th Consecutive Quarter                                            

Facebook and Google face a multi-million dollar scam . The fraudster gets $ 100 million from Google and Facebook . Facebook and Google Were Victims of $100M Payment Scam . Google and Facebook duped in huge 'scam' . Facebook, Google got hit with a $100M email scam . Google and Facebook lose ‘£77 million after falling for phishing scam sending cash to Lithuanian conman’ . Technology and Internet giants Google and Facebook have confirmed they have fallen victim to fraudulent e-mail messages

Facebook and Google face a multi-million dollar scam . The fraudster gets $ 100 million from Google and Facebook Facebook and Google face a multi-million dollar scam . The fraudster gets $ 100 million from Google and Facebook When the Justice Department announced the arrest last month of a man who allegedly swindled more than $100 million from two U.S. tech giants, the news came wrapped in a mystery. The agency didn’t say who was robbed, and nor did it identify the Asian supplier the crook impersonated to pull off the scheme. Google and Facebook lose ‘£77 million after falling for phishing scam sending cash to Lithuanian conman’ Last month, the US Justice Department accused a Lithuanian citizen of fraud and money laundering after documents revealed he had sued Google and Facebook for $ 100 million. According to a report by the economic site "Fortune", the two companies were the victim of a person of Lithuanian nationality, after the identity of the Taiwanese el

"The Death Trap" Bermuda Triangle .. just a myth !! "death trap" of the Bermuda Triangle never existed

"The Death Trap" Bermuda Triangle .. just a myth !! Scientists have confirmed that methane balls do not sink the ship in the Predoda triangle. And that the  "death trap" of the Bermuda Triangle never existed . Anyone interested in the mystery of the Bermuda Triangle's "death trap" may have heard, with this explanation, huge explosions of methane pellets The reason for the sinking of ships and aircraft in the area known as the Bermuda Triangle The researchers said that "Qatar is the holes that result from the explosions discovered up to 500 meters and a depth of 45 meters, They estimate that "gaseous emissions from these pits when mixed with a large amount of methane cause the Atlantic waters to rise." "The Death Trap" Bermuda Triangle .. just a myth !! However, physicist and oceanographer Helen Czarski pointed out that the ships being built today are built so as not to overturn the surface of the sea .So w