Latest: Add Latest Article Here | Recommended: Add Recommended Article Here
Subscribe For Free Latest Updates!

We'll not spam mate! We promise.

Thursday, November 26, 2015




If you have a website or blog then you need to protect it from spammers, bots, and random unwanted users. One sure way to protect your website from these unwanted activities is to add Captcha to all important forms on your website like the comments section, registration forms, etc.

Protect Your WordPress Blog With These 8 Free Captcha Plugins


CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a simple test that can differentiate bots from humans. The good thing about using Captcha is that it not only protects your WordPress site from spams but can also protect your login form from brute force attacks. So, here are some of the best Captcha plugins for WordPress that you should definitely look into.

1. Google Captcha (reCAPTCHA)

Google Captcha uses the all new Google reCAPTCHA technology to protect your site from spam and unwanted users. To use this plugin, you first need to register your website with Google and get the Site key and Secret key. This free plugin protects all the default forms like the registration form, comments form, login form, etc.

2. SI-CAPTCHA Anti-Spam

SI-CAPTCHA Anti-Spam is one of the famous Captcha plugins for WordPress that uses the traditional approach of asking users to type the letters in the displayed image. This plugin supports all the default WordPress forms, and the good thing about it is that it is fully compatible with Akismet, BuddyPress, and WPMU.

3. Captcha Bank

Captcha Bank is a simple yet powerful plugin that provides easy-to-solve captcha tests while still being hard on the bots. Unlike the other Captcha plugins, Captcha Bank gives you a lot of options to customize the complexity of displayed Captcha, such as layout settings, display settings, security settings, etc.


4. Captcha by BestWebSoft

Captcha by BestWebSoft is yet another popular Captcha plugin that uses simple math problems instead of the messy images with random letters to identify humans from bots. The plugin provides much more control over how the captcha is displayed and how complex it should be. Moreover, you can also whitelist IP address if the need arises.

5. Blue Captcha

Blue Captcha is one of the highly customizable WordPress Captcha plugins that protects your site from bad bots and unwanted human visitors. The plugin has seven different Captcha difficulty levels and also supports both the single and double layer Captcha. The other notable features of the plugin include but are not limited to activity logging, Hall of Shame, blocking options, and Captcha image customization.

6. Conditional Captcha

Unlike all the other plugins on the list,
Conditional Captcha works differently and only shows the Captcha if certain conditions are met. On the basic level, the Captcha is only displayed if the user is not logged in or has no previously approved comment. On the other hand, you can also configure the plugin to only display the Captcha if Akismet flags the comment as spam.
As you can tell, the plugin is neat and uses a different approach. If you are looking for a plugin that doesn’t annoy users every time they interact with your forms, then do give it a try.

7. Math Captcha

As you can tell from the name, Math Captcha is a simple plugin that uses simple math problems like addition, subtraction, multiplication, and division to tell the difference between humans and bots. The plugin seamlessly integrates with all the WordPress forms, BBPress, and Contact Form 7. The plugin is optimally configured out of the box. All you have to do is install the plugin, select where the Captcha appears and hit the “Save Changes” button.

8. HumanCaptcha by Outerbridge

HumanCaptcha uses a rather unusual approach to differentiate humans from bots. Unlike other plugins which use images or math problems, the plugin asks questions that require human logic to answer. If the answer is correct, they pass the Captcha test. The plugin comes with a few pre-defined questions for quick start. But if you want to, you can add your own questions and answers.

Feel free to add yours and don't forget to share with others!


Like us on Facebook and subscribe with your email to receive all our latest updates via your inbox!
Read More >>




Windows Phone users often envied when their friends show them a rooted Android smartphone or a jailbroken iPhone because Windows Phones lacked the capacity to root the device and customise how their smartphone looks like. Happily for them, they can now root their Windows Phone devices with the first Windows Phone root called Windows Phone Internals.

Windows Phone Internals allows Lumia owners to unlock their bootloaders, gain root access and even flash custom ROMs. Considering that Microsoft’s Windows Phone and Windows 10 mobile are the most closed of all mobile operating systems, this is quite an achievement. However, Windows Phone users may have to wait until the WP developer community develops good quality ROMs like the Android community does.

The creator of the rooting tool, Windows Phone Internals, Healthcliff74 has opened full fledged website to help the Windows Phone users get familiar with his rooting tool. He says, “I am proud to announce the immediate availability of Windows Phone Internals 1.0. This tool allows you to unlock the bootloader of selected Lumia Windows Phone models. After unlocking the bootloader, you can enable Root Access on the phone or create and flash Custom ROM’s. I created a short introduction video to show the features of the tool.”

Heathcliff74 further explains, “root Access allows you to load your own homebrew software onto the phone with high privileges. Apps can escape from their sandboxes. The tool can also create backup-images of the phone and access the file-system in Mass Storage mode. The tool supports most versions of Windows Phone 8.1 and Windows 10 Mobile. For a complete list of supported phones and Operating Systems have a look at the Getting Started section of the tool”.

You can download it here and try it on your Windows Phone. However, do remember that the concept of rooting a Windows Phone is new and the process may brick your smartphone a point of no return. Needless to say it will also void the company warranty. Further, lack of custom ROMs for Windows Phones will definitely hurt the popularity of this tool however you can perform basic customisation of your Windows Phone with it.

Maybe in a few months time Apps like SuperSU will be user for Windows Phone as well.
Read More >>

Wednesday, November 25, 2015




Today we bring to you how to hack WiFi network and password from your Android device with the below 3 apps. Note that I have all these 3 applications on my phone and I have tested them and they works! So I don't want to hear not working. Check the requirements below to make sure they will work for you.

Disclaimer: This content is provided for Education and Security Research purpose only and should not be used illegally, SupremeWap will not be held responsible for any misuse of this content!

REQUIREMENTS:
1. Rooted Android phone
2. Android version 4.1.2 +

How to Hack Wifi on Android with these 3 Apps


A stated in the requirements above, make sure that your phone is rooted as rooting is very important for running Wifi hacking apps (even apart from the ones listed below) on Android phone.

#1 ZAnti (Penetration Testing Android App)

ZAnti Penetration Testing Android App (SupremeWap.Com)

This is one of the best apps that you can use to hack WiFi network. The app has many amazing features you can ever think of, checkout things you can do with apps below:

• You can change images shown in websites other devices connected to the same network visit.

• You can change the Google search result of other devices on whole wifi network.

• You can also check other devices Mac address or IP address and other details.

• You can also do session hijacking on your wifi Network.
And many more...


It is a must try app.

#2 WPS Connect



Second on the list is WPS Connect, this app can hack WiFi networks that have WPS protocol enabled. This feature is only available in android devices with version 4.1.2.

WPS Connect is focused on verifying if your router is vulnerable to a default PIN. Many routers that companies install own vulnerabilities in this aspect. With this application you can check if your router is vulnerable or not.

#2 #3 WIFI WPS WPA TESTER



And finally on our list, this app is alternative to WPS Connect, it is also used to test vulnerabilities in wireless networks whether secure or not. If a network isn't secure it will hack into it.


Do you know other working WiFi hacking apps apart from those listed above? kindly share with us in the comment below.

Don't forget to share this post!


Like us on Facebook and subscribe with your email to receive all our latest updates via your inbox!
Read More >>

Tuesday, November 24, 2015




Today we bring to you two methods on how you can change your device running on windows 10 OS Bluetooth and device name. Some people do find this difficult as Windows phones are not that common compare to android or iOS devices. So without much talk let's get down to business.

How To Change Device And Bluetooth Name On Windows 10 Mobile


We are going to discuss two methods here, with the first method you can change the name right in your device settings and the other is using a Windows PC. Just follow the below procedures:

Change Device And Bluetooth Name In Phone Settings


The easiest way to change the device name is through the settings of your Windows 10 mobile device. The device name is used to identify your mobile phone when connecting to other devices, including Bluetooth and USB connections. Below are steps to change it in your device settings:

1. Open Settings (via Action center or all apps> settings).

2. Tap on System and then scroll down and choose About.

3. Tap on Edit name under the Device name and type the new name which you want to be using for your mobile.



4. Tap on Save when you are done and that's all, you have successfully changed your device and Bluetooth name.

Your device should start showing the new name when connected to other devices.

Change Device And Bluetooth Name Using Windows PC


You can also change the Device and Bluetooth Name of your Windows 10 mobile device when connected to a Windows desktop or laptop.
Below are the procedures:

1. Connect your device to any Windows PC using a USB cable and wait for few seconds for the to detect the connected phone.

2. Open This PC/My Computer(as it is on your PC) and locate your phone under Devices and drives .



3. Right click on the device and choose Rename.

4. Enter the new name for your mobile phone and that's all.

Your device will now be known with the new name to other connected Bluetooth devices.


If you find this post helpful kindly share it!
Like us on Facebook and subscribe with your email to receive all our latest updates via your inbox!
Read More >>




Australian man Phuc Dat Bich, who became an international Internet sensation because of his unbelievable strange name, says he is honoured to have brought laughter to people’s lives.

Mr Bich, a 23-year-old, who is of Vietnamese heritage, took to Facebook to vent his frustrations about his name in January. He posted it was “highly irritating that nobody seems to believe me when I say that my full legal name is how you see it”.

The National Australian Bank worker further said “I’ve been accused of using a false and misleading name… which I find very offensive. Is it because I’m Asian? Is it? Having my fb shut down multiple times”.
To prove his point, he posted a picture of his passport that had his name on it. His case recently attracted media attention with hundreds of people leaving supportive comments and more than 40,000 now following his public posts.

On Monday, he took to his page to thank the scores of supporters from around the world by saying ‘I’d like to mention that I am very grateful to those who have been supportive of certain names that populate in different cultures’.

‘We live in a diverse and multicultural society and the fact that there are people out there who are supportive and encouraging really makes me happy.’
‘I’ve never ranted nor wept that my post would get this sort of exposure,’ he continued.

‘But I am glad and honoured to be able to make people happy by simply making them laugh at something that appears outrageous and ridiculous.

‘Much tragic events have happened all over the world, out of it all only happiness can mend. As an individual I hope I have played a part in brightening your days!
‘PDB.’

The name, which is pronounced ‘Phoop Dook Bic,’ is common in Vietnam, despite the spectacular response it has received in Australia.

Facebook has not commented directly on Mr Bich’s case, but its policy on usernames state that people “provide the name they use in real life” for safety reasons, and that it “should be your authentic identity; as your friends call you in real life and as our acceptable identification forms would show”, such as passports.

Among other things it asks users to refrain from using “offensive or suggestive words of any kind” in their Facebook names.


Like us on Facebook and subscribe with your email to receive all our latest updates via your inbox!
Read More >>

Monday, November 23, 2015




Google can easily hack into any Android devices remotely from Google Plex headquarter if they received any legal order from US Federal.

Hacking into a system without prior knowledge of victim is usually called illegal but in the offence for doing legal purposes it is called investigating, likewise New York District Attorney have recovered an old document that said: “It is legal for Google to hack into any devices based on Android if asked for Crime Investigation Purposes with a legal document”.

According to a document that deals with the encryption of data and its impact on public safety, older versions of the Android operating system can be easily accessed by Google. According to the text, if the company is required by justice, you can bypass the password of users running versions prior to Android 5.0 (Lollipop) and have full access to the device remotely.

Click here to download the document in PDF

Forensic Examiners can bypass passwords in some of these devices using a variety of techniques,” reads the document. However, for a large portion of Android devices, Google can reset the password if there are a mandate and a requirement of justice to investigate particular device. And all this can be done remotely.

 Google Can Remotely Bypass Your Android Security Passcode (SupremeWap.Com)

Also according to the document, devices equipped with Android version 5.0 or higher can not be accessed remotely due to the full disc encryption – which still can not be enabled by default. Because of this, according to the distribution table of the operating system, it is estimated that at least 74.1% of users are subject to such “serious failure” of security.

Apple have also said that they even can crack the iPhone security panel after several negotiation from FBI – Apple agrees to crack the passcode of iPhone which will lead for the suspect proof for investigation, for Google is not so hard to crack into the passcode or pattern lock security panel but in terms of iPhone devices its quite hard to crack and need some professionals to do it.



Like us on Facebook and subscribe with your email to receive all our latest updates via your inbox!
Read More >>




Are you among the Facebook users who added the France Flag to their DP after the Paris Attacks, and has been unable to remove it? Here’s how to remove it.


After the dreadful Paris terrorist attacks, Facebook introduced a tool to add a French flag filter to profile photos in order to display solidarity with the Parisians and France. However the problem is that many Facebook users are finding it more difficult to change their pictures back.

When customising their profile picture, Facebook users are given the option to let the French flag expire after a day, a week, a month – or last forever. However users who set a longer time limit are now struggling to disable the French flag overlay. Unfortunately, the only other way to remove the overlay is to simply pick your previous profile picture.

Navigate to your profile page on Facebook, hover over your profile picture and click the “Update Profile Picture” option which appears.

This lets users pick a previous photograph, without the overlaid French flag filter.

How To Remove The French Flag From Your Facebook Profile Picture (SupremeWap.Com)

The problem is that the automatic filter removal feature by Facebook does not seem to work. Some users have complained on various fora that the filter does not remove itself automatically, even after the time limit has expired.

“This is something that Facebook should be fixing,” one user blasted on the social network’s support page. “We had a choice of how long to leave the flag ‘on’ and its not working. Pretty annoyed. I shouldn’t have to do anything, should have been automatic!”



Like us on Facebook and subscribe with your email to receive all our latest updates via your inbox!
Read More >>




It is not an easy task to get a job at Apple Inc., which is known for being one of the most challenging, fast paced, and exciting places to work. This dynamic becomes more intense if you happen to be an engineer or designer at Apple.

Like Microsoft, Google and other big tech companies, Apple asks both technical questions depending on your past work experience and some mind-boggling puzzles. The questions that are basically directed to determine the interviewee’s communication skills, problem solving ability and creativity.
Given below excerpts are interesting, puzzling and wacky and have been taken from the interview data from Glassdoor. These questions were asked to prospective Apple employees during their job interviews. While some required solving tricky math problems, others were simple but vague enough to keep you on your toes.

Software QA Engineer

The first example is something of a brain teaser.

There are three boxes, one contains only apples, one contains only oranges, and one contains both apples and oranges. The boxes have been incorrectly labeled such that no label identifies the actual contents of the box it labels. Opening just one box, and without looking in the box, you take out one piece of fruit. By looking at the fruit, how can you immediately label all of the boxes correctly?


The next example is a bit more interesting and needs a dash of creativity.

How do you test a prototype of a vending machine… if it doesn’t give back any change? How do you analyze what has gone wrong? You don’t have any access to internals of the vending machine.


Product Manager

Below are three interesting examples that were found during Product Manager interviews.

The first reads:
How would you write the business requirements for a toaster?

The second:
Sequence the following four items in order of importance: Cost, Design, Quality, Time.

And the third:
How would you solve an issue if you didn’t know exactly what the problem was?


Product Manager

The questions asked to prospective Product design engineers at Apple are more pointed, as they are expected to be well versed in a number of disciplines, including engineering, design, materials science and more.

√ Some of the more interesting interview questions for this position include:

* The interviewer set their iPhone on the table and asked me how I would design the Sound On/Silent toggle switch on the side of the phone. Why?
* Please name 20 different ways to remove balloons from an apartment.
* The interviewer set the rear cover of an old iPod Touch on the table and asked me to identify the materials. If you had designed this rear cover, what are 5 tests that you would conduct on the completed iPod Touch assembly to ensure that your rear cover design met all applicable requirements? Why?
* If you are in a boat in the middle of the pond and drop an anchor, how does the water level vary with respect to shore?
* What material property is related to the bendability of a given metal?
* Describe the how you would test what material is made from the remote control of the Apply TV?
* Do you do personal design work as a hobby?
* The interviewer drew a picture of an adjustable Crescent wrench on the white board. Is there an optimal orientation or direction when using the wrench to torque a hex head bolt? Why?
* Tosses an old Apple iPhone shell on the table. What materials do you see?
* What are the different ways you can you tell if this part is steel or aluminium?
* A cube (1-1-1m) of ice in a room (50C) sitting on a wooden table. the ice is 1m away from the walls around it’s 4 sides, except for 1 side is 30cm away. You’re given 2 insulating blankets (1m by 1m) that can be used to cover the ice block. The goal is to keep the ice in solid form as long as possible. Where would you put the blankets?

Software Engineer

To ensure that Apple products are best in class, software engineers are entrusted with this task for which they get a lot of money. Most questions asked to potential software engineers are mainly hardcore engineering problems. However, there were still few notable that managed to grab attention.

The first one reads:
If you have 2 eggs, and you want to figure out what’s the highest floor from which you can drop the egg without breaking it, how would you do it? What’s the optimal solution?

The second is a head scratcher but does have an answer:
You have a 100 coins laying flat on a table, each with a head side and a tail side. 10 of them are heads up, 90 are tails up. You can’t feel, see or in any other way find out which side is up. Split the coins into two piles such that there are the same number of heads in each pile.


This next one is as straight forward as they come:
Can you work long hours on a short deadline?

√ A few more goodies worth highlighting include:

* If I put you in a sealed room with a phone that had no dial tone, how would you fix it?
* Model an elevator.
* Given a deck of cards, write a method to determine if it is “flush”.
* There is a mission-critical (i.e. cannot be rebooted) server that is lagging, hard. You only have a terminal/shell prompt. How do you debug it?
* Given an iTunes type of app that pulls down lots of images that get stale over time, what strategy would you use to flush disused images over time?”
* The iPhone has a feature for when a user begins to enter a contacts name or email address a list of possible matches is built. How would you implement this in order for the search to perform quickly and change each time a user inputs a character?

Mechanical Engineer

One user on Glassdoor pointed out that he was asked the same questions during his interviews at both Apple and Lab126 (Amazon).

You put a glass of water on a record turntable and begin slowly increasing the speed. What happens first — does the glass slide off, tip over, or does the water splash out?


Global Supply Manager

A question in the Microsoft mold:
How many children are born every day?

And one more for good measure:
How would you breakdown the cost of this pen?




Like us on Facebook and subscribe with your email to receive all our latest updates via your inbox! - TechWorm
Read More >>

Saturday, November 21, 2015




Content Management Systems (CMS) are software packages which allow you to organize, publish, modify and maintain content on a website, without requiring much of technical expertise. All you need to do is install a CMS, choose a domain name, give your inputs in the template design and hop onto the web server with your new online identity.

Today, we are surrounded with hundreds of CMSs to choose from. And the cherry on the top is that most of them are open source platforms, implying that they can be used for free. Although owing to the pros and cons of all, no CMS can be termed as the best but some are more popular than the rest. A list of 10 Most Popularly Used Content Management Systems has been compiled for you.

10 Most Popular Open Source CMS Used Online



1. WordPress

Ask any CMS Website Development Company for an open source platform, and the first suggestion would be WordPress. Built on PHP and MySQL, this CMS powers around 15% of the world’s top one million websites and 24% of the total websites. Be it hosting, installation or administration, WordPress makes everything hassle-free. Sites developed on this open source platform are W3C complaint, search engine optimized and have excellent Web 2.0 functionality. Its huge universe of themes and plugins allows you to create virtually any type of website.

2. Joomla

This open source CMS enjoys high levels of popularity, particularly amongst the startups and SMEs owing to its flexibility and easy-to-use admin controls. However, many bigshot names like MTV and Harvard University are also running their websites on Joomla. This polyglot platform has created millions of websites in 64 different languages. Also, if your website is on Joomla, its promotional capabilities can enhance your viewership to a great extent.

3. Drupal

Another free, PHP-based Content Management System , Drupal is being used by prominent names like New York Observer, Popular Science and MIT amongst several others. Similar to WordPress and Joomla, it also possesses a treasure of thousands of extensions to increase your site’s functional range. If your website has a lot of complex content to be organized, Drupal is best suited for you with its unique features for taxonomy and ability to tag.

4. ModX

Although the name of ModX is not much heard of in common parlance but there are over 100,000 websites running on this CMS. Its core strength lies in its usability allowing even non-technical handlers to conveniently work with it. A logically laid out interface makes it easy to customize the designs. To top it all, no additional plugins are required for SEO in ModX sites.

5. ExpressionEngine

Developed by EllisLab, this CMS is based on PHP and offers both open source and premium software for creating websites. Although, its number of plugins is nowhere even close to what popular CMSs are offering, this platform does provide complete liberty to design the sites and search engine friendly URLs. Official support is available on purchase of license.

6. TextPattern

Underdog of the CMS world, TextPattern is a highly flexible, free PHP based system. It has a minimalistic interface which makes it easy to work with. Native anti-spam system, import tools and flexible design engine are some of its key features. While this CMS does not have many jewels to its crown but it offers themes, designs and plugins in reasonably good numbers.

7. Contao

Formerly known as TYPOlight, this CMS is also built on PHP language. Contao combines Ajax and other Web 2.0 features to enhance the usability. SEO-friendly sites with high level of security can be made on this platform. Live update services, easy integration of modules and support for multiple blogs are some of the highlighted features.

8. DotNetNuke

While most CMSs are written in PHP language, this one is an exception using ASP.Net to cater specifically to Windows. As Windows servers play host to an array of intranets, opting for DotNetNuke would be a wise decision. While the CMS comes with a cost, interested users can take a free demo and trail before purchasing.

9. Umbraco
Unlike most ASP.Net solutions, Umbraco is an open source software that gives complete freedom to designers over the aesthetics. An open API gives full access to developers for customizing the back-end applications. While the CMS offers flexibility to create both websites and intranets, it does not provide any prebuilt themes at the front-end.

10. Concrete 5

One more PHP-based free system on our list; Concrete 5 can be used for creating websites as well as web applications. The CMS is growing in popularity on account of flexibility offered for coding and use of themes. With its easily comprehensible features, turning a basic HTML site into Concrete 5 takes only a few minutes. Business-class hosting including support makes it the CMS of choice for the corporate world.

Note that the above CMSs are not listed in order of popular.



Like us on Facebook and subscribe with your email to receive all our latest updates via your inbox!
Read More >>




Today, we bring to you unlimited free browsing/surfing with your 0.0k MTN SIM using an application called VPN over DNS on android devices.
So proceed below with the requirements and the full procedure:

How To Browse Unlimitedly On MTN Using VPN over DNS Android App



REQUIREMENTS



– Android phone (Rooted)

VPN over DNS android app

Autoproxy Lite android app

– MTN sim with 0.0k.

Those are the requirements listed above, so let's proceed to the steps below:

PROCEDURES



Phone Settings:

APN name: SupremeWap.Com

APN: web.gprs.mtnnigeria.net

IP: 127.0.0.1

Port: 8080 or 8181

Save the settings and use as Default.

AUTOPROXY SETTINGS

Connect with any of these IP below:
127.0.0.1 :8080 or
127.0.0.1 :8181

VPN Over DNS SETTINGS
Open your SLOW DNS and
set as follow:

1. Disregard first and second box, move to third box and select any free server of your choice.

2. On the fourth box you will see something like this <> delete it and input this IP 10.109.5.97

3. Tick on “Keep changing source
port”


4. Again tick on “Binary Query” and connect.

5. After that wait for proper authentication and client configuration, Once it connects
you are good to go. (Make sure your Autoproxy is already connected).

NOTE: Remember not to use this package for downloading while using the free server.
But if you want to download
unlimitedly then you will have to
upgrade to a premium account.




Like us on Facebook and subscribe with your email to receive all our latest updates via your inbox!
Thanks to Jazzyfans
Read More >>

Friday, November 20, 2015




After the gruesome Paris attacks, there have been various reports of varied use of Internet by ISIS for propagating its ideology as well as coordinating its deadly terrorist attacks. While some reports state that ISIS used encrypted channels of communication like the PlayStation 4 and Telegram, other reports state that they used plain vanilla unencrypted SMS to communicate with each other and coordinate the attacks.

While the jury be still be divided on this pending the closure of investigations into the Paris attacks, it seems that ISIS does have a OPSEC manual for its members. It turns out ISIS has a 34-page guide to operational security (.pdf), which instructs its cadre to follow a particular set of cyber life.

The manual is in Arabic and offers nitty gritty of using the Internet for terrorist and propaganda operations. While some of it is pretty basic like using HTTPS websites instead of non secure HTTP websites to communicate, there is also a advanced section in the manual.

For example, the first page of the manual tells the ISIS followers “When you enter the network Twitter through the browser always make .1 sure you enter the correct site Twitter.com (https://twitter.com/) and that an encrypted site at the beginning of the link Pal HTTPS, or green tag, and note any marks (error) called or the appearance of a page to the testimony of false requests “acceptance” or conversion for another site requires no .powers or entry on your account.”

The guide is a handy compilation of advice on how to keep communications and location data private, as well as links to dozens of privacy and security applications and services, including the Tor browser, the Tails operating system; Cryptocat, Wickr, and Telegram encrypted chat tools; Hushmail and ProtonMail for email; and RedPhone and Signal for encrypted phone communications.

ISIS does not like Google’s Gmail. The manual notes that Gmail is safe only if used with fake credentials and only on Tor anonymity network. Similarly, the ISIS have a dislike for Android smartphones and iPhone. The manual states that Android and iOS platforms are only secure when communications are routed through Tor.

The manual instructs operatives to disable the GPS tagging feature on their mobile phones to avoid leaking location data when taking photos. The ISIS cadre is advised to use the Mappr app to falsify location data and throw intelligence agencies off their trail.

ISIS’ OPSEC manual also advises against using Instagram because its parent company, Facebook, has a poor track record on privacy, and it warns that mobile communications can be intercepted, even though GSM networks are encrypted. It advises followers to use encrypted phones like Cryptophone or BlackPhone instead.

The ISIS advises its followers against using Dropbox. For documents, it follows the same recommendations that human rights workers, political activists, whistleblowers and reporters follow. It advises its followers to secure their communications and obscure their identity or hide their location. Use of VPN for hiding origin IP is encouraged.
The Manual notes:
“Use the VPN services and prefer to stay away from the American Arab or .1 .services in this area Use the service Freedome (http://www.f- .2 secure.com/en/web/home_global/freedome) of VPN phones for the iPhone from here (https://itunes.apple.com/us/app/f-secure-freedomevpn/id771791010?mt=8) and for Android from (https://play.google.com/store/apps/details? id=com.fsecure.freedome.vpn.security.privacy.android&hl=en)here, a service of the Finnish security company F-Secure which is not free, but a quick control and protect you from spyware and fraudulent websites and so .on Or use application Avast SecureLine! From security company Avast .3 (http://www.avast.com/index) can download application for the iPhone from (https://itunes.apple.com/us/app/secureline-vpn-wifi-security/id793096595? mt=8)here, and for Android from (https://play.google.com/store/apps/details? id=com.avast.android.vpn&hl=en)here, as it can be used for windows systems”


The documents indicate that the terrorist have not only studied these other guides closely, but also keep pace with the news to understand the latest privacy and security vulnerabilities uncovered in apps and software that could change their status on the jihadi greatest-hits list.



Like us on Facebook and subscribe with your email to receive all our latest updates via your inbox!
- TechWorm
Read More >>




Google wants you to make better Android apps and is taking more steps to tell you about the intricacies involved.

Last year, Google published a free online guide with tips and tricks to tell app developers about making a successful Android app. This popular guide was downloaded more than 200,000 times. To teach you more, Google has released the second version of its helpful guide.

The English edition of the Android app development guide is available on Android Developer’s Website as well as on Google Play. Soon it is expected to be available in more languages.

Along with this app development guide, Google has also developed some video episodes that you can be find on its Android Developer YouTube channel.

This updated guide looks very impressive as it also deals with the new Android features in the past one year. Download it from the link given below:

Download Android App Development Guide Version 2


Like us on Facebook and subscribe with your email to receive all our latest updates via your inbox! Fossbytes
Read More >>

Thursday, November 19, 2015




Pepsi, one of world's largest beverage maker has marked its entry in the smartphone race with an affordable Android smartphone called Pepsi P1s. The phone comes with decent specs and includes a fingerprint scanner, all for around $110-$175.


Smartphone industry has been bustling with new entrants every day and this time around it’s the beverage giant Pepsi who has come up with its own phone, called the Pepsi P1s. The mid-range phone will be sold at an affordable price tag of $110 to $175 and as an option will come clad in blue color and a Pepsi logo.

At the outset this seems to be a marketing gimmick by Pepsi to enter the smartphone race and at the same time also leverage their brand presence to move up the ladder rather quickly.

Specifications of the Pepsi P1s:





The Pepsi P1s has been launched in China and it comes fitted with a 5.5-inch 2.5D curved glass display and under the hood lies an Octa-core MediaTek MT6592 processor coupled with a 2GB RAM and runs dido OS wrapped within which is the Android Lollipop 5.1. The exterior of the phone shapes up as a unibody aluminium housing along with a rear fingerprint sensor . On the imaging front, the Pepsi P1s sports a 13-Megapixel primary sensor and a 5-Megapixel secondary sensor.

Pepsi P1s features connectivity features like 4G LTE, dual-SIM support along with an hybrid microSD card slot . As suspected, Pepsi just takes care of the branding while the phone is actually manufactured by Shenzhen Scooby Communication Equipment Co . The phone will retail in two variants – the basic one being the P1 (without LTE support) and the P1s, which supports FDD-LTE.



Co-branded phones have rarely taken off. The problem with such phones usually is the fact that manufacturers try to push in a lot more branding than necessary ending up making the phone like a billboard that walks and talks with you and this is how they compensate for the low initial selling price. If Pepsi has refrained from any sort of in-the-phone branding, then we would be delighted, else it wouldn’t be a stretch to call it an AD-phone.


Like us on Facebook and subscribe with your email to receive all our latest updates via your inbox!-TechPP
Read More >>




Telegram blocks 78 IS-propaganda channels from using its secure and encrypted messaging platform


It has been well known that the ISIS and its supporters use the Telegram App to propagate their ideology. Now the Telegram creators have blocked as many as 78 ISIS affiliated accounts from using its encrypted and secure service.

The Berlin-based Telegram, a popular mobile messaging service app has blocked 78 known ISIS sympathizer accounts from using its technology to communicate and spread propaganda to a wide audience. Telegram, which has been founded by two Russian brothers, Pavel Durov and Nicolay Durov uses strong encryption that makes it all but impossible for security services to intercept private messages between individuals or members of a group.

In a statement released on Wednesday, Telegram said that it has blocked 78 ISIS-related channels that the terrorist group used to spread propaganda and communicate with other members. The group had been using the app for distributing its propaganda material since October, when Telegram introduced a feature letting users broadcast messages to an unlimited number of subscribers.

“We were disturbed to learn that Telegram’s public channels were being used by ISIS to spread their propaganda. We are carefully reviewing all reports sent to us at
abuse@telegram.org and are taking appropriate action to block such channels. As a result, this week alone we blocked 78 ISIS-related channels across 12 languages.
We are also introducing an easier way for our users to report objectionable public content in the upcoming update of Telegram this week.”

Telegram, Russia’s most popular social network site is very famous internationally, where it is used as an alternative to WhatsApp on similar services. It is an ultra-secure way to quickly upload texts and voice messages, and share videos. It says it has 60 million active users. In 2014, the app racked up millions of downloads, following Facebook’s acquisition of WhatsApp. According to its founder, Pavel Durov, who disclosed the stats during TechCrunch Disrupt in September, said that the app sees more than 12 billion messages a day.
According to security researchers, Telegram became the preferred method for Islamic State to broadcast news and share videos of military victories or sermons. The group used Telegram to claim responsibility for the Paris attacks, which left 129 people dead, and the bombing of a Russian airliner over Egypt last month, which killed 224.

According to Alex Kassirer, a counter-terrorism analyst with the New York-based private intelligence firm Flashpoint, said that IS had started using Telegram broadcast channels to send press releases targeted at inspiring and recruiting followers.

Further, Rita Katz, director of Bethesda, Maryland.-based extremist monitoring service SITE Intelligence Group said that some of the dozens of channels set up had 10,000 followers or more. Some of those channels could not be accessed on Wednesday afternoon and a message was displayed saying they were no longer available. She further added that Telegram had appeared to let the jihadists operate without fear of being turned off or traced until Wednesday.

However, Telegram explicitly says on its site that it makes efforts to block Islamic State, which is also known as ISIS.
The company statement stressed that shutting down ISIS channels on the site was not taken to restrict free speech, which it encourages.

“While we do block terrorist (e.g. ISIS-related) bots and channels, we will not block anybody who peacefully expresses alternative opinions,” Telegram said of its actions.

Telegram said the move would only affect public channels and automated response systems called ‘bots.’ Messages between individuals and group chats that can include up to 200 users would not be affected. While the app says it blocked the ISIS-related channels, unfortunately private communications between ISIS members were unaffected by those blocks.


Like us on Facebook and subscribe with your email to receive all our latest updates via your inbox!
Source: Techworm
Read More >>

Wednesday, November 18, 2015




Facebook again make the ‘Safety Check' tool available on Tuesday 17th for Nigerians. The reason for this was the bombings that occurred in Yola – Adamawa State, that left 32 dead and at least 70 wounded.

The purpose of the tool is to know through the social network, whether people who live in the city are safe – something that should help ease the agony of relatives and reduce the confusion resulting from a tragedy like that. Although no group has assumed authorship of the attacks, local authorities believe they were made by the terrorist group Boko Haram.



The decision of Facebook seems to be a response to criticism that the company received when they activated the tool after the attacks in France without having done the same after several terrorist attacks in the Middle East, Africa and Asia. According to Alex Schultz, vice president of the company’s growth, the tool made its debut in 2011 with the aim of helping victims of natural disasters.



Facebook CEO, Mark Zuckerberg said:
We’ve activated Safety Check again after the bombing in Nigeria this evening.

After the Paris attacks last week, we made the decision to use Safety Check for more tragic events like this going forward. We’re now working quickly to develop criteria for the new policy and determine when and how this service can be most useful.

Unfortunately, these kinds of events are all too common, so I won’t post about all of them. A loss of human life anywhere is a tragedy, and we’re committed to doing our part to help people in more of these situations.

In times like this, it’s important to remind ourselves that despite the alarming frequency of these terrible events, violence is actually at an all-time low in history and continues to decline.

Deaths from war are lower than ever, murder rates are generally dropping around the world, and — although it’s hard to believe — even terrorist attacks are declining.

Please don’t let a small minority of extremists make you pessimistic about our future.

Every member of our community spreads empathy and understanding on a daily basis. We are all connecting the world together. And if we all do our part, then one day there may no longer be attacks like this.


Already Mark said in a text of his own that the company has decided to use the resource in a wider number of tragic events. “We are working quickly to determine when and how the service might be useful,” he said, making it clear that not all occasions that will awaken the use of the tool.

“Please do not let a minority of extremists let you pessimistic about our future,” said the executive, noting that, in a general context, humanity is registering the lowest number in its history in relation to deaths from wars, murders and terrorist attacks. It remains to wait for the status system does not need to be triggered again due to a new genocide or attack with tragic consequences.
#PrayForNigeria #PrayForPeace

Like us on Facebook and subscribe with your email to receive all our latest updates via your inbox!
Read More >>




The world was shaken by the recent attacks of the Islamic State to France. Obviously, the story was not cheap, and the country being ruled by Francois Hollande hit back so almost immediate last weekend, Tit for Tat. Russian, France, Germany, England and the USA is in a full strike over ISIS areas, the leaking of the exact location of ISIS such as Iraq and Syria – the hackers came front to help.

Click here if you want to know the current cyber wars!

The independent hackers across the world such as Anonymous and Ghost Security Group have shared the location of the ISIS depot. We can now say that World War III might be happening at any time, the serious and tension situation going in the countries like Russia, France, England and the USA. It turns out that the war is not just happening in the real world, and a battle is being waged through virtual means. As shown in the site NORSE, fighting between nations has intensified in recent days.

Live Telecast Of Cyber Wars From Everywhere In The World (SupremeWap.Com)

Every day there are atleast hundreds of cyber attacks, the phishing attacks is from ISIS to acknowledge idea from where they should attack now and to where they should hideout from Russian missiles. During a monitoring almost four hours on Tuesday, we check the overall picture, which has been dominated by China and Saudi Arabia. These countries are the hits of champions, and they add up to nearly 40,000 attacks just in this short period of time.

The United States is the main target, having received more than 42,000 attacks at the time we left the page receiving updates. Obviously, the United States has been taking steps, being the third most active country among the attackers. Saudi Arabia and France are also getting attacks constantly.

The main technologies used for the attacks are Telnet, Netbios-ns and SMTP, but there are other methods that are constantly in this war. You can follow the virtual war clicking here. Unfortunately, no information on the damage caused, but the news comes slowly, showing that this fight still goes away.



Like us on Facebook and subscribe with your email to receive all our latest updates via your inbox!
Source: Techviral
Read More >>




The new 'Find My Device' feature in Windows 10 will help users recover their stolen or lost laptop by tracing its last location. This feature works in lieu with the 'Find My Phone' in Windows Phone but doesn't come with the option to remotely wipe the data.


The Windows 10 Threshold 2 update has fixed many niggling issues and has also optimized the operating system to work faster on machines with lower spec hardware. The boot time has also improved considerably, and along with all these, the Fall Update 1511 also ushers a new feature called “Find my Device”.



The new feature might sound familiar as it was incorporated in Windows Phone 8.1, but this time around Microsoft has brought it for the Windows 10 PC build. Phone tracking has gotten popular in recent times, but not laptop tracking. Since we usually carry our PC with us while travelling, it is but obvious that the chances of the laptop being stolen or lost will exist. The Find My Device feature is introduced to solve the problem by telling you the last location where the laptop was used.

We will walk you through a set of instructions to switch on the device finder feature and also set it up appropriately. The Find my Device will not be enabled by default and in order to enable it all you need to do is navigate to Settings>Update & Security>Find My Device.

This feature has been implemented only in the latest Windows 10 1511 update and will not be available if you’re still with the previous versions. This feature makes use of signal flares and redirect you to the last known location of the laptop, provided that the person in procession of the same connects to the Internet.

Toggle on the Find My device and switch it on, to find your lost device all you need to do is go to this link and login with your Microsoft account which is linked in with the device. Unlike the “Find My Phone” feature on the Windows 10, users won’t be able to wipe their data remotely. That being said, we also need to understand that by using this feature we are inadvertently giving Microsoft the permission to save our location history at regular intervals of time. But that’s a decent compromise we believe.



Like us on Facebook and subscribe with your email to receive all our latest updates via your inbox! -TechPP
Read More >>


US Government Websites Especially FBI's Are Easiest To Hack Says Reformed Hacker (SupremeWap.Com)

FBI’s website is the easiest to hack says hacker who hacked FBI and Home Office from his bedroom


Reformed hacker says that US government websites especially FBI and Home Office are easiest to hack.

You would be surprised to know that one of the easiest sites to hack is of one of the giant law enforcement authority in the world and even more surprising is the fact that it belongs to United States.

This organization is named Federal Bureau of Investigation. FBI is the domestic intelligence and security service of the United States and is America’s primary law enforcement organisation. A 19 year old hacker, Charlton Floate, brought down FBI and Home Office websites from his bedroom.

Speaking to BBC 5 Live Daily, Floate said that hacking FBI and US Home Office websites wasn’t much of a challenge. “It was surprisingly easy to be honest. It took me about 40 or 45 minutes,” he said. “The fact that the Home Office’s website was connected to its internal network was alarming in itself.” He added that even now Home Office is particularly vulnerable. “If you have passport files or something on the computers at the Home Office, they’re completely exploitable to someone who has an internet connection because they’re connected.”

The 19 year old hacker from Solihull was convicted of hacking related crimes by Birmingham Crime Court. The self-styled internet and online marketing guru had previously admitted three charges under the Computer Misuse Act and two of possessing prohibited images to the authorities. Sentencing Floate, Recorder John Steel QC said his actions were “wrong, serious and criminal”. He added that Floate was “highly intelligent” with a deep and clear knowledge of information technology who had taken a lead role in the conspiracy and had recruited others.

He was given an eight-month jail sentence, suspended for 18 months, and and ordered to do 250 hours of community service.
Speaking to BBC 5 Live Daily, the reformed hacker expressed has deep regret at his actions.

“I honestly regret doing that type of thing now. I got caught up in a world that is rather dark, but it gives you a home when you’re not quite happy with real life,” he told the radio station.



Like us on Facebook and subscribe with your email to receive all our latest updates via your inbox! -TechWorm
Read More >>


Get N1200 Worth of Airtime & Data For Recharging N200 Data On The New Glo Twin Bash (SupremeWap.Com)


Glo launched a service called TwinBash recently. They had listed the rewards/bonuses for any subscriber that recharge 200 Naira and above data, the benefits are explained below:

Read Also: Glo Introduces Free Tomorrow - Get Back The Value of Your Usage

Benefits of the Glo Twin Bash



1. If you recharge N200 data, you will get 200 MB of data worth N800, another N200 airtime for call or SMS to any network and N200 airtime to call 10 friends and family.

Therefore, you will get N1,200 value for a data recharge of N200 and which is valid for 4 days.

2. If you recharge with N500 data plan, you’ll get 500 MB of data, N500 airtime to call or send SMS to any network and N500 airtime to call 10 friends and family, adding that this is valid for 10 days.

3. Any subscriber who recharges with N1,000 for data will get 1GB of data. The subscriber will also receive N1,000 free airtime to call or send SMS to any network and N1000 free airtime to call 10 friends and family, this one is valid for 15 days.

4. For N2,000 data plan, you as the subscriber will enjoy 2GB of data with N2,000 airtime bonus to call or send SMS to any network and another N2,000 free airtime to call 10 friends and family. This one is valid for 30 days.

5. N5000 data recharge, you will get 5GB of data, N5000 to call all networks and another N5000 to call family and friends.



How Can I Get All These Benefits? or How to subscribe to the Glo Twin Bash



To enjoy all the bonuses listed above, all you need to do is to load data directly by using *223*PIN# from your recharge card and that's all!

Keep enjoying as more are coming...



Like us on Facebook and subscribe with your email to receive all our latest updates via your inbox!
Read More >>

Tuesday, November 17, 2015


Hacker Group Revealed That ISIS Secret Bitcoin Address Is Having $3 Million (SupremeWap.Com)

After the Paris attack from ISIS, several NGOs and supporters have vowed that they will not leave the attackers alive, and one from the cyber supporter Ghost Security Group an Anti-Terrorist Hacking Group had started the CYBERWAR against ISIS.

On November 13th millions of people have faced sorrow movements after Paris attack, November, Friday 13th now being called as black Friday for Paris people, confirmed killed 129 people in which 89 of them at the Bataclan theater, 433 people hospitalized in which 80 of them marked as critical injured. This has been called as the deadliest attack in the History since World War II.

One of the hacking group namely as Ghost Security Group is in support for France nightmare – not only Ghost Security Group in support but also Anonymous Hacking team is also claiming that they will not let those ISIS go freely, this attack will cost them. Now in our previous post we have posted news about Anonymous direct warning to the ISIS that they will teach them a lesson in behalf of this Paris attack which will be called CYBERWAR.

However in the other hand Ghost Security Group have direct interview with Nesbitt Interviewer, in the report one of the members from Ghost Security Group said that they have already started their search steps to track down the attackers, they are already received vast of the valuable data which they will soon hand over to the US government administration.

In an interview with that member of Ghost Security Group has said that this Interview will be fully confidential and not to leak out any valuable and secret information regarding the Group, also they have said not to reveal the names, all this is to eliminate the chances of any possible retaliatory reaction by ISIS.

The Anti-terrorism group as Ghost Security Group (GSG) reportedly saying about the bitcoins ISIS regularly using and with the method of cryptocurrencies.

Cryptocurrencies is a digital method of fund transfer with having fully loaded encryption techniques which are used to regulate the generation of currency units and verify the fund transfer and all these operation are being under the central bank.

And another method of technology ISIS is using for funding is Bitcoin, one of the member from GSG have revealed the secrets of funding transaction of ISIS is from Bitcoins and they have many addresses of Bitcoins and with analysing several address one of the Bitcoin address has $3 million of Bitcoins units which are enough to eliminate overall parts and that’s funding is coming from secret source the Hacking group as GSG or Anonymous is still uncover.

The investors or the supporters of ISIS are providing funds in a regular basis in which it includes 40 countries of a businessman who funding ISIS also some of them from G20 member.

The GSG member said to NewsBTC Interviewer:
“It is sure evidence that Islamic State uses cryptocurrencies which help them to get funding from different investors to maintain the ongoing operation by the attackers and the ISIS leaders, and as we have discovered some of the Bitcoin address they currently using them, and among those address one of the Bitcoin address we have found that it contain $ 3 Million worth of Bitcoins units.”
“Bitcoins are regularly utilizing by Islamic State, most of the Bitcoins funding sites are being under ISIS with under deep web security encryption and we have only had one Bitcoin Address which has $3 Million, also we have managed to uncover several Bitcoin address and successfully shut them down, this will prevent them from getting funded.”
“Another reason that we somehow unencrypt some of their Bitcoin address in which they are transferring amount via cryptocurrency, and also all this is utilizing by ISIS.”
All this have been discussed between the Interviewer from NewsBTC and the guy from GSG, they said that if anyone can come forward to share any valuable information regarding ISIS secret information then they can get into the site http://reportonlineterrorism.com also you can direct contact with the group member via the site itself.

Like us on Facebook and subscribe with your email to receive all our latest updates via your inbox! -Techviral
Read More >>


31 Basic Application Software You Ought To Have On Your PC  (SupremeWap.Com)


Although, different people working in different fields, will need different set of software for their daily operations, there are however, some few basic applications that everyone should have installed on their computers. But, before we begin, let me talk a little on, the types of computer software we have today.

Types of Computer Software:

There are basically, two types of software on computer systems;

System software: This is the most important software on your computer (laptop or desktop) because, they manage/run your computer’s memory, processes, and all other software and hardware. Hence, they come pre-installed on your machine, by the manufacturer of your device. An example of System software is, Operating system (OS). Examples of operating systems are; Windows OS (by Microsoft), Macintosh OS (by Apple inc.), and Linux OS.

Application Software: These are programs or software designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user. They are mostly 3rd party apps, and virtually anyone with a coding ability, can create one (at least, my younger brother does). Some examples of application software are; Spreadsheets, web browsers, photo editors, etc.
New computers normally come with crapware. Crapware are application softwares pre-installed on your machine by the manufacturers, and may or may not be of any use to you. However, to fully enjoy your device, there are some important applications you simply can’t do without. I will be talking on 31 of such.

Note: Some software companies are converting their software into online tools. This is because, unlike offline apps, software hosted online are always (automatically) updated in real-time.
For this reason, some of the applications listed in this post, may not necessarily be downloadable.

1. Web Browser(s):
These are applications that allow users to surf the web (internet). Though Windows laptops come pre-installed with ‘Internet Explorer (IE)’, I would recommend you installing ‘Google Chrome’ and/or ‘Mozilla Firefox’.
This is because, Internet Explorer is quite porous. Spyware, junkware and malicious programs normally infiltrate IE. Chrome and Mozilla Firefox however, were built with the security of the user in mind. They will block any suspicious website or app from installing unsolicited and injurious programs. This is not to say that, Chrome or Firefox are 100% free from attack though.
Another advantage of Chrome and Firefox over Internet Explorer is, the sea of add-ons and plugins available for them. These tools will make your browsing experience sweet and less stressful.

2. Word Processors:
Examples of word processors are; Microsoft Office Word and OpenOffice.
In the past, Windows laptops always came pre-installed with MS word and the other Microsoft Packages. However, I noticed that these days, newer laptop models only come with trial versions of the new Microsoft Office 365. To use it fully, one is expected to pay.
In that case, if you are unable to purchase the new Microsoft Office Word 365 (via internet purchase), you could always collect the raw file of Microsoft word 2007, 2010 or 2013 from a friend, or buy the physical program disc to install.
Once you install it, every other Microsoft Office Product (Microsoft Power Point, Microsoft Excel, Microsoft Outlook, OneNote) should also be installed (if you select/tick them during installation.)

3. Anti-Virus:
Anti-virus programs are designed to, detect and destroy computer viruses.
Examples of anti-virus programs are; McAfee anti-virus (usually pre-installed). However, I would recommend, Avast, AVG, Avira or Norton AV. You usually get a trial version for 30 days. After that period, you could either, buy the Premium version or, get a cracked version.
Feel free to suggest some other anti-virus programs that you use (in the comment section).

4. Registry CleanUp Tune-Up Utilities | System Diagnostics Tool:
The computer registry is the central database that contains all of the necessary information about your software, hardware, preferences, OS, and more.
Cleaning your System’s registry, is an important part of overall PC maintenance. TuneUp utilities, help to manage, maintain, optimize, configure and troubleshoot a computer system.
‘CCleaner’ and ‘Comodo System Utilities’, are examples of Registry Clean-up programs.

5. Video Player:
One of the main activities for which most people use their computers to do is, watch videos. You need a Video player that will give you optimal picture and audio quality.
VLC is the most popular video player. Other good video players are, KMPlayer, GOM Media Player, DivX Player and RealPlayer.

6. Music Player:
If you are like me, you cannot go a single day without playing some music from your device. Even though video players can also play audio files, it is advisable to install a dedicated music player, to fully understand the meaning of, “music is the food of the soul”!
My recommendations are; MusicBee, Winamp, MediaMonkey and Foobar2000.

7. Flash Player:
Flash players are web browser plugins that can also be supported on some mobile devices (especially smartphones). Without flash players, you cannot view multimedia, execute rich internet applications or stream video/audio. Adobe flash player is the major flash player available today. Go ahead and suggest other ones you may know of.

8. Photo Editor:
A time will come, when you will need a Photo editor. Whether to do simple things like, add text to an image, crop an image, or complex things like, adding yourself to a 1960s photo (as if you were really there), photo editors are very important tools to have around.
Examples of photo editors are; GNU, GIMP, PhotoCut, Super Refocus, and Adobe Photoshop. Of all these photo editors, Adobe Photoshop is the best! But unfortunately, it is also the hardest to master.

9. Computer-Aided Graphics Design Software:
You don’t have to be a seasoned Graphics designer to have these design tools on your device. Within 2 days of using a graphics design software, I designed a logo/header image for my blog: NOSR Blog, with no prior training.
Some example of graphics design tools are; Microsoft paint, So Think Logo Maker Pro, Corel Draw, Autodesk inventor, Auto-CAD, Adobe Illustrator. Microsoft paint is a bitmap based software, but it is easy to use. Though an underrated piece of software, MS paint can be used to create some unbelievable work.

10. DJ Music Mixing Software:
This is a really fun application to have. Once in a while, you may just be in the mood of adding cool DJ-type effects to the music you are playing. You could also surprise everyone with your scratching skills, at that birthday party.
Examples of such software are; Virtual DJ, Mixxx, Serato DJ, Ableton Live and, Traktor Pro.

11. Ebook Reader:
Electronic book readers (ebooks readers) are software that make it possible to read digital books. A good ebook reader should be able to open multiple formats like; pdf, ePub, Mobi, XPS, DjVu, CHM, Comic Book (CBZ and CBR), etc.
Examples of e-book readers are; Foxit Reader, Adobe Reader, Sumatra PDF reader, and Calibre.

12. Video Chatting Software (Skype):
Web-cam enabled laptop users can get more value from their machine. Skype is the major video chat software I know of.

13. Note-Taking Software (Keynote):
Whenever the light-bulb goes off in your head, you may want to quickly take down your thoughts else, your short-term memory brain-cells will betray you.
Examples of note-taking tools are; Evernote, Resophnotes, Elements, Simplenote (iOS) and KeyNote.

14. Downloaders:
If you are a surfer of the net, you simply cannot do without fast downloaders. They help us download/save our favorite apps, large images, music and videos onto our computer. Here are the best downloading software; IDM, Torrent, Orbit downloader, SaveFrom.Net, NetVideoHunter (Firefox add-on), Total Video Downloader (for Mac), XDM (Xtreme Download Manager).

15. File Converter:
Some applications may only require/recognize certain File formats. Therefore, you will need a file converter to convert any of these file formats whichever way you want.
Known file formats are; png, jpg, jpeg, tiff, gif, bmp, emf, doc, docx, xls, rtf and ppt.
Some file converters can batch-convert a file format into multiple other formats (simultaneously). Online file converters are more popular. Try, http://convertonlinefree.com

16. File Compressor/Decompressor:
Some large files will need to be compressed, in order to send or upload them. In the same vein, the receiver or downloader of the compressed file will have to decompress the archive file.
These are very good file compressers/decompressers; 7-Zip, WinZip, Peazip, and, Zipeg.

17. Gaming Software:
I don’t have much to say about this as I am not a game freak. However, here are some games I plan on having in the not so distant future; Call of Duty, God of War, GTA 5.0, and Minecraft.
Note: Not every computer has the power to execute most modern games. Your system specs and graphics card must be up to par.

18. Spreadsheet:
Spreadsheets are very important to teachers, bankers, sales people and businesses in general. Examples of spreadsheet programs are; Microsoft Excel, Google Spreadsheets (hosted online), Open Office, and Apple Numbers.

19. Audio Editor (Audacity):
Audacity is the world’s most popular free open source digital audio editor. It is the easiest audio editor to use. Audio editors are used for; recording audio on computers (via a headset or professional microphone), editing audio clips, and adding effects to audio clips etc.

20. YouTube to MP3 Converter:
These software convert video or other audio formats, to mp3. Its a great way to create podcasts or have your favorite music in mp3 format. Good converters are; ChangeToMp3, Total Video Converter Lite (for Mac users), VLC (bet you didn’t know that).

21. Google Drive:
This Software will help you send large files via email (gmail). Gmail only permits 25MB as the limit of the total file size(s) that can be attached, per mail. Say you want to send a movie to a friend, and the size is 50MB or even 800MB, the only way to send such heavy files, is with the help of Google Drive. Download your own Google drive today.

22. Cloud Storage:
Cloud storage is a type of storage of data wherein, data is stored in and accessible from multiple distributed and connected resources that comprise a cloud.
Cloud storage is important for data back-up, archiving and disaster recovery. You can save the entire content of your computer in the “clouds”, then access them from any location in the world (without carrying around your storage devices)! The best cloud storage providers are; Microsoft Cloud, JustCloud, BackBlaze, CrashPlan, Carbonite, iDrive, DropBox, OneDrive, etc.

23. VPN Software:
When using a public Wi-Fi Network, your accounts are at risk! You are advised to get a dedicated IP address (cloaker). It is legal, and a security measure observed by the world’s top companies.

24. Last.fm:
Social networking hits music with Lastfm. It enables you to listen to music, get recommendations, and stream radio tailored to your taste.

25. Video Editor:
Good video editors are; Windows Movie Maker, Adobe Premier Pro, LightWorks, Blender, Final Cut Pro, OpenShot, Sony Vegas, etc.

26. Spyware / Adware Removal Software:
If you are seeing random pop-up ads and redirects within your browser, your security is down! Some malicious add-ons or plugins accompany downloads from questionable sites. Again, Internet Explorer is more susceptible to such attacks. Here are the steps to follow, to rid your browsers, of Junkware/Malware.

27. eBook Creator:
Good ebook creators are; MS word (2010 and 2013), Scrivener, Canva, Creatavist, eBook Maestro Pro, Evernote, PagePlus, Vook, Calibre, Ommwriter, and Blurb.

28. ScreenCast Software:
Screencast-O-matic, Camtasia, Ezvid, CamStudio, Snaps Pro, ScreenFlow, Final Cut Pro, QuickTimeX, Jing, Screenr, etc.

29. Google Earth:
Google earth is a virtual globe, map and geographical information program. It is one fun and must-have piece of miracle. Imagine a program that displays satellite images of varying resolution of the earth’s surface, allowing users to see things like cities and houses (at a”bird’s eye view ” angle)!
You can use this program to get directions; using variables such as, street names, cities and establishment. You can also use google earth to view areas subjected to widespread disasters and, even explore and place location bookmarks on the Moon and Mars.

30. Scientific Calculator:
I use calculator application on my Laptop to calculate my age (I’m that dull). I also use them to calculate complex logarithmic functions and integrations. Examples of such programs are;
Microsoft calculator plus, Microsoft Mathematics, and HEXelon MAX. There’s probably hundreds more! Explore your device’s App stores.

31. Desktop Widgets:
Your desktop should hold the most functional widgets like; Clock and Calender. Also, it would be beautiful to have your Screensaver rotate multiple images in slideshow fashion.

Be sure to use the comment section to suggest other basic computer software I may have missed out. Also, play with the share buttons below.

This post was written by Erena.I am a student by day and webmaster by night.Technology fascinates me.
Read More >>


Copyright © 2016 - SupremeWap - Tech Updates & Tutorials - All Rights Reserved
(Articles Cannot Be Reproduced Without Author Permission.)
Design By : | Powered By: SupremeTech Inc.