Professional Documents
Culture Documents
Whatsapp messages info is Saved in Phone memory of Android devices. These messag
es are retrieved by us by doing some simple steps. Whatsapp takes backup day-today at 4 AM mechanically. Those messages can be restored by us simply which are
done till that time. Here is the step by step process to recoup your deleted wha
tsapp messages.
1. Visit your Android device s Settings, thenthen tap on Applications Option and
eventually click on Whatsapp
2. There would be warning message, click OK at that time, simply hit once on the
n and Clear data. Now you ve deleted all of your app s messages and data
3. Now return back and begin Whatsapp messenger app. Now as you ve removed all you
r saved data in above you will be welcomed with Configuration Screen of Whatsapp
4. Here you may Configure the Whatsapp by entering Mobile number to you. Simply
pat on the Restore button
Recovery. And after clicking on Restore button old messages have been restored b
y you. Dependant on your Chat history Whatsapp will restore your messages.
5. When its done, you may be able to determine Congratulation message with amoun
t of messages recovered.
That s it!!
This time, your whatsapp messages that were Deleted have been successfully resto
red by you.
So guys this is the tutorials to recover your whatsapp messages. If you have any
queries regarding this procedure do let us know through the comments
================================================================================
================================================================================
===========================================================
So foy your ease we are providing you 50 free proxy sites you can use them. And
enjoy your privacy. Yes this is really very easy to use.
HideMyAss - https://www.hidemyass.com/proxy
Proxify
http://proxify.com/p/
Ninja Clock
http://ninjacloak.com/
AnonyMouse - http://anonymouse.org/
AnonyMizer http://www.anonymizer.com/
kProxy http://www.kproxy.com/
BlewPass - http://www.blewpass.com/
Zfreez http://zendproxy.com/
Vobas
http://www.vobas.com/
Don t Filter
http://www.dontfilter.us/
Vtunnel
http://vtunnel.com/
Proxy.org http://proxy.org/
New Ip Now http://newipnow.com/
WebProxy.net http://webproxy.net/
4everproxy - http://4everproxy.com/
Unblock My Web http://www.unblockmyweb.com/
YouTube Unblock Proxy
http://youtubeunblockproxy.com
Working Proxy http://workingproxy.net
Free Open Proxy http://freeopenproxy.com
Proxy 2014 http://proxy2014.net
Unblock YouTube Free
http://unblockyoutubefree.net
Free YouTube http://freeyoutube.net
HideOnline Proxy
http://freeyoutube.net
Rapid Proxy
http://rapidproxy.us
Unblock YouTube Beat School
http://unblockyoutubeatschool.com
Hiding Your Info http://hidingyour.info
Unblocker
http://unblocker.us
Fast USA Proxy http://fastusaproxy.com
While following
rom the file system
After all these
ive using NTFS file
the steps, the user should make sure to have selected NTFS f
menu
steps finally click on the start button to format the USB dr
system
The above steps are used for successfully formatting the USB drive using the NTF
S file system
Configure root of USB
Follow the below steps to carry out the configuration process on your drive whic
h is required for rooting the device in read only mode
Move on to the MY COMPUTER space there locate your USB flash drice and selec
t properties
To make read only mode go to the security tab appears there and select every
one access only and give read only rights for the root folder
Write folder can also be created to allow reading and writing within it and
data can also be saved in the folder
Device Block
To protect your system from the unauthorized USB devices Device block is used.It
actually works as an anti virus tool which prevents the USB flash drive from sp
reading virus within the system.
================================================================================
================================================================================
==========================================================='
Website is the space in the internet which you can get lot of information relate
d to the different topics. Some topics such as education, social networking,game
s,movies ect while here they are also some niche sites which have adult content
in it and also they are some websites which tracks all your personal information
according to the browsing history. And also the websites which have malware vir
us adds that affects your PC, here is the trick for blocking all these unwanted
sites.
block-websites
PS: This trick can be very useful to the parents they can block all the social n
etworking websites and the malicious sites from viewing his/her children.
Here to follow the steps you need to have some knowledge about Windows Hosts fil
e.Well, the Windows Hosts file converts the host s names into the numbers, which a
re known as IP Addresses, where we can also locate a website using not only with
the host names but also with some numbers. Windows Hosts file is a simple text
file which can be edited in the notepad. Follow the below steps clearly in order
to block a website.
Steps: How to Block a Website on your PC
Firstly go to your MY COMPUTER open C drive (root directory) in which the wi
ndows is installed
After opening the root directory follow the below path given to go to the ne
eded settings
C:/ Drive => Windows =>System32 => drivers => etc.
Now open the ect folder by following the above path in the C drive there you
will find a host file,open the host file using notepad.
After opening the host file in the notepad you will see some information the
re find out 0.0.1 locate it and then press ENTER key to start with a new line.
In the new line you should mention the address of the website which is going
to be blocked with the code 0.0.1
Example: 127.0.0.1www.twitter.com
With the code adding to the websites in the new line you can block as many w
ebsites you want to be blocked
Here we are giving the steps without using any third-party application just by f
ollowing the root directory you can easily block any website.
================================================================================
================================================================================
===========================================================
Home
HTML
JavaScript
How to Encrypt HTML/JavaScript code to keep it safe
How to Encrypt HTML/JavaScript code to keep it safe
HTML JavaScript January 23, 2015 No Comments Mikael Aleksanyan
How to Encrypt HTML/JavaScript
How to Encrypt HTML JavaScript
Security is main thing. So even programmers think about how to secure their code
s. Today i will show you how to secure your HTML/JavaScript code by encrypting i
t. If you don t know what is Encryption then you can read it here on the Wiki.
For example you are creating a template for Blogger/WordPress platforms and sell
ing them online. Of course you need to add free templates too if you want to get
more users. But the main thing is that if you add the templates for free what y
ou will get from that. Well the main thing is that you can add your templates we
bsite or your information to footer of that template. But every newbie can easil
y edit your template and delete your information.
So to secure your code you must encrypt it. For that there are a lot of tools th
at you can easily encrypt your HTML or JavaScript code. Just follow to next step
s.
Obfuscate
Select
button.
Now we can test the HTML file and see that its working fine!
How to Encrypt HTML/JavaScript
How to Encrypt HTML/JavaScript
That s it. Now you can Secure the footer information of your template. Stay tuned
to learn about higher level security in JavaScript coding.
================================================================================
================================================================================
===========================================================
Pen-drive is a device which data can be transferred from one computer to the oth
er computer. They vary from different sizes and the memory spaces and it is smal
l in size which can carry a lot of information in GB s which is very useful to the
regular PC users to carry to any place. Hence people prefer Flash drives and Me
mory cards to carry the needed information,here we can have a option to the pen
drives in which they can be write protected since we cannot edit the write prote
cted files, it is just only for the reading information purpose when it is write
protected. And we also cannot copy the files of the pen drive which is write pr
otected.
Advantages for the USB write protection are we can prevent virus attacks and als
o Malware and virus can change settings into read only and can t be changed. There
is a small button on the Memory card which makes the data for read only purpose
to the user.
USB device
Steps: How to remove write protection of Pen-Drive/Memory Card
Here let us discuss about the removal of write protection in Transcend memory ca
rd or pen drive
Download the application Online recovery tools and run it on your personal c
omputer
After the downloading connect the pen drive/memory card to you personal comp
uter
There you can see two options available on the downloaded application if you
select the first option then the whole data will be removed and also the write
protection will be removed
If you want to remove only write protection then you click on the second opt
ion by securing all your pen drives data in the safe mode
Later this process click on the start button to complete the needed formatti
ng process
Removing write protection using Registry Editor
Click on the start button search for the run dialogue box and open it then t
ype regedit in that box
registry-editor
After pressing the ok button it will take us to the settings part which are
related to the system settings in the windows
Then search for the following register key from the edit menu in the setting
s window
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies
remove-write-protection-using-registry-editor
If you do not find the following registry key from the edit menu then you sh
ould download the batch file from the below link given and run on your computer
then it will automatically adds to registry editor
Download Here
After the running of the application you again search for that key then ther
e go to write protect key and change the value from 1to 0 in which here 0 define
s OFF and 1 defines O
change-value-from-1-to-0
Then from this process we can remove the write protection in the pen drive a
nd memory cards.
================================================================================
================================================================================
===========================================================
1. Red Sea Governorate, Egypt (2722 50.10?N, 3337 54.62?E)
An interesting, mysterious pattern in the desert.
2.) A mysterious pattern in the desert (2722 50.10?N, 3337 54.62?E) Red Sea Governorat
e, Egypt
via Google Earth
2. Coronado, California, USA (3240 34.19?N 117 9 27.58?W)
See the Swastika-shaped building?
3.) A building complex that s shaped like a Swastika (3240 34.19?N 117 9 27.58?W) Corona
do, California, USA
via Google Earth
3. Kigosi Game Reserve, Tanzania (417 21.49? S 3123 46.46? E)
This is a massive herd of water buffalo.
4.) A massive herd of water buffalo (417 21.49? S 3123 46.46? E) Kigosi Game Reserve,
Tanzania
via Google Earth
4. Wittmann, Arizona, USA (33.747252, -112.633853)
That's a completely random triangle located in Arizona.
5.) This random, giant triangle in the middle of Arizona (33.747252, -112.633853
) Wittmann, Arizona, USA
via Google Earth
5. Walsh, Alberta, Canada (50 0 38.20?N 110 6 48.32?W)
The Badlands Guardian in the mountains.
6.) The Badlands Guardian in the mountains (50 0 38.20?N 110 6 48.32?W) Walsh, Alberta,
Canada
via Google Earth
6. Homebush Bay, Sydney, Australia (-33.836379, 151.080506)
SS Ayrfield, aka the floating forest, which is a shipwrecked boat covered in tre
es.
7.) The shipwrecked SS Ayrfield covered in trees (-33.836379, 151.080506) Homebu
sh Bay, Sydney, Australia
via Google Earth
ADVERTISEMENT
7. Dayton, Oregon, USA (45 7 25.87?N 123 6 48.97?W)
Firefox logo in a cornfield.
8.) A giant Firefox logo in a cornfield (45 7 25.87?N 123 6 48.97?W) Dayton, Oregon, U
SA
via Google Earth