Custom Search

important update in WhatsApp "Edit after sending"

 
WhatsApp has launched a new update or corrected two updates

The new updates provide services called post-transmissions
important update in WhatsApp "Edit after sending"

The basic update is the possibility of modifying the messages after they have been sent
But provided that this is before reading it from the future

The Washington Chronicle spoke of this new update and says that from now on there will be no embarrassing positions for the user of the application because of sending an embarrassing message or if he wants to delete the message after sending it

The update also added the possibility of deleting the message after sending it not later than 5 minutes

Thus, Facebook's WhatsApp application has devised a completely new technology, deleting messages after sent

This unique technology is expected to be popularly admired

It is expected that the application will be launched after the latest updates to the users of the IOS system to be released later for Android users

Another update expected to be launched is for another advantage: to make important talks always at the forefront

This is done by pinning the conversation to always be at the top of the conversation

The user can specify a specific number of conversations which is three conversations with the pin code that will be at the top of the conversation when you press the length of the chat icon is shown at the top next to the deletion or trash and when it is clicked chat is highlighted

This update is aimed at facilitating the user to reach the most important conversations

Protection from WannaCry ransom virus

The recent virus attack has hurt so many users. And damaged the interests of people in Have suffered significant losses in their work!!
The virulent virus named WannaCry
Protection from WannaCry ransom virus
Exploits a loophole in Windows versions that have not been updated since March
It encrypts the full hard data and asks for a $ 300 ransom to recover your files
I mean if you have a company that has 10 devices, it costs $ 3000
And payment by famous digital currency
Bitcoin

Not affiliated with any party and can not be tracked
Victims of the virus during the first day only tens or hundreds of thousands .. Millions can
In more than 100 countries
Of them are big companies of FedEx uniforms
And the British Health Authority
And the German Train Authority
And the Russian Interior Ministry
And universities in Italy and America
And the number is growing terribly fast!
Spreads randomly
Not targeted at specific countries or companies

Without distinction .. He takes advantage of everything he Encounters
If you are one of the people who have been infected,There is no solution except to leave Harddisk away and use another new one   ..
Until a solution to the virus appears
 
If you are a healthy device and have not been targeted yet .. Quickly do an update for Windows or at least

Download Microsoft Update to address this topic
Https://technet.microsoft.com/.../libr.../security/ms17-010.aspx
Scroll down to the name of your copy in the table
Dos it and load the first file .. and the temp
If your copy is old (Vista or earlier):
Http://www.catalog.update.microsoft.com/Search.aspx...

Or, it is possible to do the steps when the property with the vulnerability is temporarily closed
Open Control Panel >>
Click Programs >>>
Click Turn Windows features on or off.
In the Windows Features window >> Clear the SMB1.0 / CIFS File Sharing Support checkbox >>>> and then click OK to close the window >>> then restart your computer

If the property is still in use, keep using the tulle from Symantec to lock it.
Https://www.symantec.com/.../d.../smb2-toggle-too-mikes-tool-set

And of course Do not forget to make a backup to  The important Files
And put it on a flash memory or
external hard disk .
And open or download any links or files from  known or known

How to protect your computer from Ransomware

How to protect your computer from Ransomware

How to protect your computer from Ransomware

Ransomware is a malicious program that restricts access to Computer system that has been infected and demands payment of ransom to the software maker for access to files. Some types of files encrypt files on the system hard disk and display messages asking the user to pay. Was the beginning of its spread in Russia, but the use of this type of malicious programs developed in the rest of the world.
The virus spreads through e-mail sent to users with a malicious facility containing the virus. After infecting the user's device, it exploits the vulnerability known as "MS17-010" to infect other devices on the same network in order to achieve rapid spread of the virus. To infect electronic devices running Windows XP to R2008, and if the user's device is infected with this electronic attack, all files on the computer are encrypted and ask the user to pay a ransom as a condition to recover its files.
In June 2013, the McAfee antivirus software company released data showing that it had collected more than 250,000 unique samples from Ransomware in the first quarter of 2013, more than double the number achieved in the first quarter of 2012
A wave of simultaneous cyber attacks has hit dozens of countries around the world, with more than 75,000 attacks being detected in 99 countries, according to an expert.

The program closes the files of users and forces them to pay money in the form of the currency "BITCOIN" to restore the use of their computers or mobile, which is called "ransomware" or ransom virus.

The message on the screen shows that the ransom must be paid within three days, otherwise the amount will double. If the payment is not made within seven days, the files will be cleared.

To protect your computer against ransom, here are some of the ways to do it:

1. Make a backup copy of your files
The greatest damage suffered by those subjected to ransom attacks is the loss of files, including photographs and documents.

The best way to protect against the virus is to back up the information and files on your devices in a completely separate system, preferably on an external hard disk that is not connected to the Internet.

2 - Be careful when dealing with emails, sites and applications
In order for the ransom virus to work, hackers need to download a malicious program on the computer from which to launch attacks and encrypt files.

The most common way to install software on your device is phishing e-mail and malicious advertisements on suspicious sites, applications, and programs.

3.  Use Antivirus
Antivirus programs can stop the ransom virus from being downloaded to computers and found.

Most of these programs can scan files to see if they contain the ransom virus before loading them. It can also block confidential uploads of malicious ads when browsing the Internet and see if there are any malicious software on the device.

4. Install updates permanently
Companies often release software updates to fix vulnerabilities that can be exploited to install the ransom virus. Therefore, it is recommended to download the latest versions of the software as soon as available.
you can download updates from here
Protection from WannaCry ransom virus

5. Never pay a ransom
Victims of a ransom attack are advised not to pay the amount ever because they are encouraged by the attackers and the files may not be recovered at the end.

Some programs can help to Decode files. Or if you have a backup, you can restore your device from it.
Transported

Download USB Device Tree Viewer

USB Device Tree Viewer 3.1.1

You can manage and control all devices connected to USB ports and view the full details of the device connected to the port
Download USB Device Tree Viewer
Like
Keyboard, mouse, flash memory, reader or any other device

You can find out all the required information about the tool connected to the port on the left and the data is displayed on the right.

Also you can see which of the ports is used in the playlist

Simply if you press the USB port and show the connected device data you will know that this port is being used
Download USB Device Tree Viewer

So you know how much port you have, whether you are using or not connected to any devices
Download USB Device Tree Viewer

Through the program you can do many works on the tool related to it
How so

When you press the right mouse button on the connected tool you can reboot it or remove it safely.

This lets you determine if the connected device is working normally or has a problem

In this new release, the data of connected devices will be automatically updated as soon as they are connected

Specification and download the USB Device Tree Viewer 3.1.1

Compatible with Windows XP / Vista / 7/8/10 (32-Bit / 64-Bit)

Program size is 280 KB

Official site USB Device Tree Viewer

Download the USB ports management program from here
Or from here

What is Guaranteed RAM And Burstable RAM?

VPS Servers with OpenVZ technology provides two types of server memory

What is Guaranteed RAM And Burstable RAM?



 Guaranteed RAM

What is Guaranteed RAM?


Guaranteed RAM memory is dedicated memory that your VPS server can use fully at any time

Burstable RAM or vSwap
Burstable RAM
Burstable RAM is shared memory that your VPS server may share and use, while the other VPS servers are not using it and if it is avalable. But, if other VPS servers needs this RAM, it must be freed promptly, so if your VPS server applications uses this burstable RAM it will be forced to free it, sometimes this forced RAM release can cause services malfunction and make other stability issues.
 vSwap Virtual Swap
In the newer 2.6.32 kernels burstable RAM is called vSwap (virtual swap). This feature emulates swap functionality to a VPS server (it slows down VPS speed when programs "swaps-out" or "swaps-in"), but still uses node RAM for this purpose, because real swap is available to a node server only. There is a lot of stability problems with vSwap enabled servers.
.

then, in planning all the services and programs you will run on the VPS server, you should evaluate your memory needs  the right plan when you chooseVPS. And you may have to configure your services and programs accordingly

   the Difference Between “Guaranteed” and “Burstable” RAM on OpenVZ
The Guaranteed RAM is the amount the can be used  
.
Burst RAM   
the Burstable RAM is the amount that can be allocated. Generally assume that the program will allocate double the RAM it uses.

Download Easy Code 2.0

New version of Easy Code
Download Easy Code 2.0



It is a development of the previous release 1.0


Easy Code is one of the best application building programs for Windows in all its versions
 
And also for 32 and 64 bit

The program was developed to create applications that support 32-bit and 64-bit variants under the visual assembly programming environment

It is very similar to the visual language of Basque

The new version in this release supports the assemblies Fasm / GoAsm / Jwasm / Masm and PoAsm

Free Easy Code

Light size 5.5 MB

Supports Windows XP / 2003 / Vista / 7/8 / 8.1 / 10 (32-Bit / 64-Bit)

Official site EasyCode

Download Link

from here