Saturday, October 27, 2012

HowTo Cut, Make Nano SIM for iPhone 5

The smaller SIM standard goes even more smaller as Apple trims the iPhone’s thickness by 18%.
Your existing normal SIM or Micro SIM can be converted to Nano SIM by following simple steps. To do this, you have two options: DIY or visit your wireless network’s local customer service center and get them to replace your current SIM with a Nano SIM. But we know if you came to this DIY guide, your intent is to Do It Yourself, lets get started
What you need:
  • A printer (Colored or monochrome)
  • A4-sized sheet
  • Tape
  • Ruler and marker
  • Good Scissors
  • Sandpaper or file
  • Patience & accuracy
Warning: This needs high ability of accuracy in one’s hands. Not everyone is blessed with that. We will not be held responsible if you damage your SIM card.

How to Make Nano SIM card for iPhone 5

Step 1: Download & print PDF at 100% scale on an A4 page.
Step 2: Accurately place your current SIM card on the designated area. If you have a Mini SIM, place it on the second highlighted area. If you have Micro SIM, place it on the third and last. When you’re sure it matches the outlines, stick the SIM to paper using  a tape.
Step 3: Using a ruler and a marke, carefully mark the five lines along which you would cut in the following step.
Step 4: Use the scissor to carefully cut across the marked lines. You really need to be slow and 
    accurate. Single mistake can damage your SIM card. Ask your mom if you’ve to, she might be able to do it better.
Step 5: Using a file or sand paper, Smooth out the edges of your Nano SIM.
Bingo, you have successfully made Nano SIM for your iPhone 5.
Apple has really left no plastic area on the SIM card. Its hard to say what they would have in the iPhone 6. Perhaps a pico-SIM or femto-SIM card.

Tuesday, October 16, 2012

Not Just Email: Your Voice Mail Can Be Hacked, Too - Here's How To Secure It



secure voice mail
Much has been made throughout 2011 and 2012 of the dangers of phone hacking. While many of the victims of the practice - in this case sponsored by major news organizations - were celebrities, politicians and sportsmen, many more were real, regular people who may or may not have been involved with slightly more famous people, one way or another.
In the UK, USA and Australia, investigations are ongoing into these practices, but let's step back a moment. You might have read with interest (perhaps even glee) about these cases, but what if it happened to you? Would you like to be a phone hacking victim?
The vast majority of those hacked had no idea how reporters knew so much about them. There is a simple reason for this - they didn't know that their cell phone voicemail was not secured. Upon spending several hundred dollars on phones, they had like many other people assumed that the device was secure.
Voicemail security is not something that appears to be a priority for mobile phone networks, which is why it is something that users should be proactive about. Anyone's phone can be hacked - if it was easy for journalists, it would be easy for anyone to do...

Keep Your Phone Locked & Voicemail Secure

Forget about the "I've got nothing to hide" mantra - you do. Social security numbers, bank account numbers, credit cards, insurance, mortgages... and that's just a small aspect of the financial side of your life. We all have something to hide, and with good reason. As we've seen in the newspapers and TV news reports, there is no doubt that this information can be filtered out of mobile phone voicemail messages, which is why you should keep your voicemail secure.
secure voice mail
Phone hackers were able to get into voicemail records by dialing a generic number from a mobile and then keying in a PIN. But even this practice can be simplified if you leave your mobile lying around. Hackers (hired by reporters in the famous cases that saw British newspaper News of the World closed down following public outrage or even journalists themselves) have no scruples when it comes to doing their job.
In order to prevent interference and hacking, remember to set an unlock password on your phone. Once you've done this, set a voicemail password. In most cases you should be able to do this manually, but if not contact your mobile network.
  • On an iPhone, open Settings > Phone > Change Voicemail Password and make the change.
  • In Android, use Apps > Settings > Call > Voicemail settings to change your voicemail password.
  • Windows Phone users can open Settings > swipe left to Phone and tap Voicemail number to edit.
  • On BlackBerry, use Options > Voicemail settings to configure a new password.
When you set a new password for voicemail, make sure that it is secure. You shouldn't need to memorize it as your phone will store the information, but you will need to ensure that your phone's lock code is secure.

The Usual Principles of Security

secure voice mail
The following passwords are extremely popular on mobile phones:
  • 1234
  • 0000
  • 2580 (the middle column of numbers on a telephone keypad)
  • 1111
  • 5555
  • 5683 (Spells "LOVE")
  • 0852 (the middle column of numbers on a telephone keypad in reverse)
  • 2222
  • 1212
  • 1998
As such, these should be avoided! Also you should think beyond birth years for yourself or those close to you. It's a good tactic to set a password and ask a close friend if they can guess it. If they do, think again!
The usual principles of setting a PIN should apply. Not only should it be hard to guess and apparently random, it should be unique to your phone. The tactics used by reports and private investigators in the phone hacking scandal were occasionally those used by phishing scammers - calling up people to gain personal information from which a password or PIN might be guessed.
In light of this, maintaining completely different passwords for all of your various telephone and online accounts is vital, if slightly tricky to achieve. Additionally, you should change passwords regularly.
Remember too that voicemail hacking can be done from your own phone if the device is left unsecured and there is no unlock PIN setup. Should someone walk off with your phone there are various tools that you can use to remotely locate, reset and wipe the device. Of course, by then, it might be too late...

Have No Doubts!

It is simple to change your voicemail PIN, but it is easily overlooked. The famous names whose personal lives have been exposed (over the past 20 years or so) prove that people trust devices in their possession far more than they should.
secure voice mail
Whether you're an average Joe with a few dollars in the bank or the sister of a football player, you need to make sure that your phone voicemail is secure. Messages from banks, lovers, car dealers, retailers and hospitals can be used to the benefit of all manner of criminals, from unscrupulous journalists to the online mafia.
Change your voicemail PIN, make it tough to break, and regularly alter it. If there is any doubt about the strength and quality of your voicemail PIN and mobile phone lock code, you can be sure that someone else will be able to break it.

What Is Wireless Charging & How Exactly Does It Work?



wireless charging
We live in a wireless world. Except we don't. Sure, we can send huge amounts of information across the airwaves, but the devices capable of sending and receiving it are tied down to power cords. Batteries allow some freedom but, eventually, we all have to come back around to the familiar face of the power outlet.
What if we didn't? What if we could charge anywhere, at any time? This is the promise of wireless charging, a concept that seems ripped from sci-fi. But it's not - it's real, and it's available today. Let's look at the reality and see what this technology can and can't accomplish.

How Wireless Charging Works

wireless charging
The term "wireless charging" usually refers to inductive charging. This technology uses a charging station that creates an alternating magnetic field. A device with the proper induction coil will receive energy from that field when it is placed nearby, making it receive power without a physical connection.
Cordless toothbrushes and other bathroom devices have used inductive charging for a long time. The technology has traditionally had problems with low efficiency and slow charging, but these were not considered a disadvantage for bathroom appliances that might be used for only a few minutes every day. Using inductive charging is safer, as well, because the conducting material is not exposed. Touch it with a wet hand? No problem.
Inductive charging is not magic. It needs specific hardware to function, and that hardware must be built into a device. Most devices do not have inductive charging coils built in to them, so a sleeve or adapter must be attached to enable inductive charging.

The Disadvantages Of Inductive Charging

wireless charging pads
Inductive charging relies on magnetic fields. These can be strong but often have a short range of effect unless an incredible source of magnetism is available (the Earth has a magnetic field only because it also has a huge molten metal core). Small inductive charging stations are no different.
Let's use a wireless toothbrush as an example. You place it on the stand and it charges. The contact between your toothbrush and the stand is not responsible for charging, however. It just seems that way because the field used to charge the toothbrush is so weak that its range is best measured in millimeters.
Charge speed and efficiency remain problems, as well. Attempting to charge a device using induction charging just isn't as efficient as a direct, physical connection.
And then there's the inductive coil. Though small and becoming smaller, it's still a sizable piece of kit relative to the space available in a modern smartphone, tablet or ultrabook. This is a problem that will diminish with time but is relevant to today's devices.

Wireless Charging Comes To The Mass Market

wireless charging pads
The lack of a common standard is another reason why wireless charging never gained much traction in consumer electronics. It wasn't so long ago that most devices still relied on Ethernet cords for data and mobile broadband was restricted to ridiculously slow speeds. Wireless charging did not seem important before wireless communications.
That has changed thanks to the Wireless Power Consortium and its Qi (pronounced "chee") standard. The WPC is an industry organization sponsored by various companies all seeking a standard for wireless charging. Its members include every big name in the mobile market besides Apple.
I talked about Qi Wireless after attending CES 2012. I was able to see a number of working prototypes as well as existing products that used wireless charging. These prototypes and niche solutions are now becoming a reality is mass market products. Nokia, for example, recently announced is new Lumia 920 will have wireless charging built in. The less expensive Lumia 820 will have an optional shell that enables the technology.
It's clear that there is a future for wireless charging. There's a lot of industry support behind WPC and a desire to bring the feature to market. We'll likely see a number of additional devices with wireless charging announced this year and next.

The Future Of Wireless Charging

wireless charging
Current inductive charging can be convenient, but the lack of range is a problem. It diminishes the technology to a convenience rather than a revolution.
Will this change? Maybe. There's been plenty of research into the potential of long range wireless power and many different technologies have been used to achieve it. Lasers, microwaves and more powerful variants of inductive charging have been able to achieve longer transmission distances. Disadvantages have hampered wide-spread adoption. Tripping over a laser used for wireless power transfer, for example, could result in a vaporized foot.
It's hard to say where a breakthrough in this field will come from. Apple is one candidate because the company has patented a device that can allegedly power devices at ranges up to one meter. The Wireless Power Consortium is also continually looking into better options. And then there's Intel, who recently announced that it is working with Integrated Device Technology on a magnetic device that would be placed in a laptop and deliver power to nearby smartphones and peripherals.
Or a breakthrough could come from a small engineering company that's barely known. This is a tough technical problem that will require both creative thinking and significant engineering know-how to solve. A major corporation may not be the first to find a solution.

Conclusion

Wireless charging has huge potential. This is why people have been working on it for well over a century. If we could move power without wires we'd be able to re-think not just consumer electronics but the infrastructure used by the entire human race.
Alas, we're not there yet, but the renewed interest in this field brought by consumer electronics is appreciated. Perhaps the eternal quest of endless convenience can finally crack this technology wide open.

How To Remove Spam Apps & Ensure App Privacy



remove spam apps facebook
Apps on Facebook can be great, but they can also be a right pain in the neck. On one hand, there's useful apps like Spotify or Last.fm which make it easy to share your music taste with your friends. Mostly these are welcomed and vaguely interesting for the friends to view. On the other hand, there's annoying games and spammy viral apps that post things on your timeline.
There are several ways to clean up the apps you're using and ensure your privacy settings for apps are set just right. There are also some easy ways to remove and report applications when required - like when you've accidentally clicked on a viral scam app. Here's what you need to know.

Setting Privacy For Applications

When your absent-minded friend installs yet another dodgy application, how much information do you want the developers to find out about you? And what about this way around - if you're using a new game, how much information do you want the developers to know about your family? Your grandmother? Your kids?
This is the reason people need to check privacy settings for applications. Until you lock down your privacy, you never really know what information is being collected about you and your friends via apps you or your friends may have installed. Scary, isn't it?
remove spam apps facebook
Go to the drop-down menu in the top right of Facebook and choose "Privacy Settings", then choose to edit the settings for "Ads, Apps and Websites". From here you can choose exactly what information can be seen by applications your friends install. Since you don't know anything about the developers of most apps or what your friends might install, un-checking most of these boxes is a great idea. Then, if you care about your family and friends, teach them how to do this too.
remove spam applications facebook

Clean Up Your Apps

There are two main ways to get a list of all your apps. Firstly, you could go to the arrow at the top-right of Facebook and choose "Account settings" and then choose "Applications". Secondly, you could navigate from the Facebook Home page to the "App Center" using the links on the left hand side, then choosing "My Apps" from the menu on the left.
remove spam applications facebook
remove spam applications facebook
Either of these options will give you a list of all the applications you have authorised for your account. Although, the second method has the option of sorting by "Last used", which is handy when searching for something you recently added or got annoyed by. To remove the applications, just click on the cross to the right of each application. Remove anything that looks suspicious, unfamiliar or unused and you could clean up your apps in no time. And don't worry, if you remove something useful it can always be added again later. It's no big deal.

How To Get A Spam App Off Your Timeline Wall

It happens all the time. People see an update in their feed from a friend claiming to let them view a certain video or see who looks at your Facebook profile. They click on it impulsively because they're curious and instantly they have posted that same update on to all their friends. The viral app continues to annoy and intrigue their friends and the cycle continues. So, how do you get rid of it?
remove spam facebook
Every update on your timeline can be removed and the application may be reported as spam. Simply head to your timeline and click on the edit pencil in the top-right of the update. The menu for an update will show a "Remove" option and a "Report Spam" option, while a clustered bundle of information from an application will show options to "Remove Application" or "Mark As Spam". If you accidentally remove the post first, you can use the methods above for cleaning up your apps to remove the app, which should show as recently used.

Never Get An App Request From THAT Person/App Again

If you hate getting reminders and requests from apps, there's an easy way to block them. Head to the Facebook Home page and choose "App Center" from the menu on the left, then "Requests ". You'll see a list of all your recent requests from apps. From here it's simple - just click on the cross to the right of a request and it will give you the option to block the application completely.
Or if you're always getting requests from the same person, you can block that person's requests completely instead.
remove spam facebook
remove spam facebook


How To Hide Your Personal Information On Facebook

In the age of the Internet, privacy is a luxury and you have to constantly be on your heels to maintain it. Facebook makes it particularly hard for users to guard their personal data. Despite many changes, Facebook privacy settings remain complicated. Moreover, past updates have unexpectedly made previously private information available to the public.
Well, no stranger needs to know your email address, phone number, or see your family pictures. In this article I show how you can check what the public can see of you on Facebook. I also explain how you can control which of your information is visible.

What Information Can The Public See?

Do you think your profile is all locked up and the public cannot see anything they shouldn't? Well, how about we check it out, just to be sure!
Go to your Facebook Timeline, i.e. the page that is shown when you click your own name on Facebook. While you are logged in, you will of course see everything. In the top right of your profile summary that heads the Timeline, you should see a Settings icon next to the Activity Log button. Click Settings and select View As...
hide facebook info
This reveals what your Facebook Timeline looks like to a complete stranger. You can also test the view for specific people, by entering their names in the respective field in the top left.
hide facebook information public
The Timeline is one thing, but what you should really check is your About page. So while viewing your Timeline from the public's perspective, click About in the bottom left of the header. This is where Facebook potentially reveals your contact information, your employer, your education, where you live etc.
Something else you should check is what other parts of your Facebook profile are available to strangers by clicking the About button in the top left. This could include your friends list, your photos, your likes, subscriptions, events you are attending, your notes, and music.
So did you spot anything you didn't want the public to see?

How Can I Remove Items From Public View?

For most content, Facebook makes privacy control fairly easy.
Let's start with your About page. Return to this page in your normal logged in view. Notice there is an Edit button in the top right of every box. An exception is your history because it only aggregates available information. Click Edit for an item you want to change, then click the little symbols next to each entry to control who can see this information. You can choose from a few default options, including Friends or Only Me . You can also make the information available to custom lists of friends. Don't forget to hit Save every time you change a setting.
hide facebook information public
Curious about how to create custom lists of friends? Find out how you can use Facebook Friends Lists For Interests Or Circles.
Next, we will look at Photos. You can control the privacy for each photo individually. This is good to know because you cannot control the privacy level for the Profile Pictures album. To change its visibility, open a photo and click the Edit button on the right. Now you can change the description, location, date, and select who can see the photo. Click the Done Editing button to save your changes.
hide facebook information public
Fortunately, you can easily change the visibility of your custom photo albums. You will find the menu icon to change who can see an album, next to the number of photos in the respective album.
If you do not want others to see photos you were tagged in, review the 3 Things You Need To Know About Photo Tagging In Facebook to find out how to control tags.
Finally, to control what else people can see of you, including photos you were tagged in, let's look at your overall Privacy Settings. In the top right of your profile, click the little arrow and select Privacy Settings. This page allows you to customize privacy settings ranging from who can find and contact you on Facebook (How You Connect) and who can see posts you have been tagged in to social ads.
hide facebook info