Showing posts with label PC. Show all posts
Showing posts with label PC. Show all posts

Tuesday, 19 April 2016

How To Play All PS4 Games On PC — PS4 Remote Play For Windows And Mac


How To Play All PS4 Games On PC — PS4 Remote Play For Windows And Mac


Requirement for Remote Play:

Remote Play on PS4 is compatible with following operating systems:
  • Windows 8.1
  • Windows 10 or later
  • OS X Yosemite
  • OS X El Capitan
Before going ahead, make sure that your PS4 gaming platform is running the latest firmware. To check this, go to Settings > System Software Update and check if you are having the 3.5 firmware. If not, update your PS4 system to the latest version.

Make sure that your PS4 is set up properly for Remote Play:

  1. Open Settings on your PS4 and head to Remote Play Connection Settings. Now, check the box that says Enable Remote Play.
  2. Now head to PlayStation Network/Account Management in yourSettings option and follow this path: Activate as Your Primary PS4 >Activate. This will make sure that PS4 is listed as your primary device.
  3. To finish this process, go to Power Saving Settings in Settings and look for Set Features Available in Rest Mode. Check the options Stay Connected to the Internet and Enable Turning on of PS4 from Network.

Now install PS4 Remote Play application on Windows PC and Mac:

  • To install the PS4 Remote Play application on your Windows PC and Mac, download the application for your operating system from this page:Remote Play download
  • Now, connect your PS4 controller to your computer. Note that Remote Play works only with a PS4 controller, so, make sure that you are carrying one with you while traveling.
  • Using your Sony login, sign in. Now, Remote Play will search for PS4 and register it in few minutes.
Now, everything is good to go. With a Wi-Fi connection, you can access PS4 from anywhere.

What to do if Remote Play is not available — Troubleshooting and fixes

If you are unable to find Remote Play or if you face stability issues, take look at these instructions:
  • Make sure that you are using a high-speed internet connection with at least 5Mbps speeds. You can check your speed by access Network > Test Internet Connection option in Settings.
  • If your PC is on the home network, try using a wired connection between your PS4 system and computer.
  • Make sure that your PS4 system and PC is closer to the router.
  • You can try reducing the video quality on PS4 Remote Play from the Remote Play’s preferences setting.

How To Enable Official Dark Mode In Windows 10


How To Enable Official Dark Mode In Windows 10?

  • Now, I’ll assume that you are running the latest Windows 10 version and ask you to open Settings on your Windows 10 PC.
  • Now, you need to head to Personalization option and look for Colors.
  • Here you’ll notice a Choose your mode option.
  • Under this option, select Dark to enable the Dark Mode.
To turn off Dark Mode in Windows 10, you need to follow the same steps and choose Light option under the Choose your mode option.
That’s it, you are good to go. This feature will be enabled in most Universal Windows Platform apps and change their color scheme to darker options. Note that some apps might not respond to this setting as they might have their own custom themes.
This feature to enable Dark Mode in Windows 10 was one of the most requested features in users feedbacks. Let’s hope Microsoft continues to listen to its community and brings more features to Windows 10.Before looking for the suitable settings to enable the official Dark Mode in Windows 10, make sure that you are running Windows 10 Insider Preview Build 14316.
If this build is missing from your PC, you need to update your Windows 10 installation. This could be done by joining the Fast Ring and checking for updates.

How To Use Facebook’s Messenger Bots Right Now?


How To Use Facebook’s Messenger Bots Right Now?

If you are scratching your brains wondering how bots on Facebook look like and how do they operate, calm down. These are simple bots dedicated to a particular service and you can use them right now.
But, at the moment, they are pretty confusing and unintuitive. Many times the bots don’t know what to do and you end up struggling getting any work done.
To make things easier for you, I tried Facebook Messenger Bots myself. I started with Facebook’s very own F8 bot. You can access it via m.me/f8bot. As you visit this URL on your phone, you’ll be asked to choose Messenger or Facebook app to proceed.
I chose Messenger and here are the screenshots of my chat with F8 Messenger Bot.
                              

Next, I decided to try out another Facebook Messenger Bot that was showed off during the F8 keynote. Yes, I’m talking about Poncho, the weather-bot that pretends to be a cat. Chatting to Poncho was better than my F8 bot experience. You can access Poncho via http://m.me/hiponcho.
You can find Poncho and other bots like CNN, WSJ etc. at botlist.co and use them right away.
Here’s how my chat with Poncho turned out:


Wednesday, 30 March 2016

How to change our name in FACEBOOK before 60 days if you have changed it recently?

According to Fb rules we can’t change our name before 60 days if we have changed it recently. But it is possible

Step -1) First of go to ‘Account settings’ and click on ‘Edit name’ and confirm that Limit is currently present or not.
Step 2) If the limit will be present Name will not
 be clickable and there should be a note about name change limit.
Step3) After checking out limit if you want to continue to change name then Click Here: https://www.facebook.com/hacked
Step4) Click on the Continue button. This link is actually for securing and recovering account from hack. So we will use it to recover our account and it will let us to change name in further steps.
Step5) Change your Account password and but don’t need to change any other information like email, mobile no etc.
Step6) After continuing they will show that you have recently changed your account name.
Step7)Then all the previously used names will displayed and select any of the listed name available there.

Note:- By Using this method you can change name infinite time whenever you want but the limitation is that we cannot able to use new name. So if you want to use new name then you can try request form or only part which left is waiting for 60 days.
I hope you enjoyed this trick.

How to Watch Security Cameras on the Internet

Want To see CCTV cameras On Your Internet? 
Here Is The Exploit!
1-Open your browser.
2-Go to http://www.google.com
3-Copy paste a code and put it in google click enter and bam you will get some cameras by clicking on the search links .
Here I have accumulated a list of Google Dorks that can be used to explore some of the IP cams that can be accessed Online without any Authentication .
inurl:/view.shtml
intitle:”Live View / – AXIS” | inurl:view/view.shtml^
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:view/index.shtml
inurl:view/view.shtml
liveapplet
intitle:liveapplet
allintitle:”Network Camera NetworkCamera”
intitle:axis intitle:”video server”
intitle:liveapplet inurl:LvAppl
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View / – AXIS 206M”
intitle:”Live View / – AXIS 206W”
intitle:”Live View / – AXIS 210″
inurl:indexFrame.shtml Axis
intitle:start inurl:cgistart
intitle:”WJ-NT104 Main Page”
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:”sony network camera snc-p1″
viewnetcam.com
intitle:”Toshiba Network Camera” user login
intitle:”i-Catcher Console – Web Monitor”
Here is a Screenshot  :
How to Watch Security Cameras on the Internet

Tuesday, 29 March 2016

GOOGLE inbuilt offline game and its HACK.

HELLO GUYS ,Welcome to the USERX.

We’ve already seen how Google plans to make intermittent connectivity issues less of a hindrance through cache page loading malarkey.
Helpful as this may be the latest Canary builds of Google Chrome comes with a little extra sweetener. Hidden within the browser’s new-look ‘Network Error’ page is a cute, endless running game. It even features the ‘lonely t-rex’ character used to illustrate the browser’s error pages.
This button-mashing game certainly helps me channel my frustration pass the time while I wait for the network to solve itself. If you use Chrome Canary on Windows or Mac (or run Chromium from trunk on Linux) here’s how you can try it.
How to Play The Endless T-Rex Runner Game in Chrome.


Turn off your Wi-Fi connection (or use the developer tools in Chrome to simulate this). Then, open a new tab and load up a website. You’ll see the standard (though redesigned) Network Error page, topped by the lonely T-Rex glyph created by Google designer Sebastien Gabriel.

Typically at this point you’d close the tab and tut loudly, gesturing for the nearest barista to go and reboot the router. Instead, tap the space bar on your keyboard.

The lonely T-Rex at the top of the page will suddenly bounce. A stretch of land will appear before him. And then…he’ll start running.

Like other endless runner games the goal is simple: run as far as you can, for as long as you can, until you crash. You’ll need to keep mashing the space bar on your keyboard to help the T-Rex clear the conveyor belt of variously spaced, differently sized cacti.

Every 100 points marker is punctuated by a screeching high score blip.

HOW TO HACK IT????

Google Chrome Runner game is written in JavaScript . So it is easily hack-able by changing some function using chrome console you can easily hack it .


Lets do it :

  • Disconnect internet & try to open any webpage.
  • Now you got screen says "Unable to connect internet" Now by pressing space button google chrome Runner game started.
  • Right click on chrome page & select "Inspect element ".
  • A new window open within that page then click on console
  • Now If You wanna See functions define for Runner Game .Type  below instruction in console.
    1. Runner.prototype
    2. Now Modify GameOver Function to hack this game
    3. Runner.prototype.gameOver=function (){console.log("codecops.in")}
    4. You are done ,Now you are not gonna Die {Try game} :P . But speed of Dinosaur is very slow so lets make it faster.
    5. Runner.instance_.setSpeed(1000)
    6. NOW YOU ARE IMMORTAL ENJOY!!!!! BY USERX


Monday, 28 March 2016

CALCULATIONS ON COMMAND PROMPT (CMD)

THE COMMAND PROCESSOR CMD.EXE COMES WITH A MINI CALCULATOR THAT CAN PERFORM SIMPLE ARITHEMATIC ON 32BIT SIGNED INTEGERS.

THESE COMMANDS ARE:

C:\>set/a2+2
C:\>set/a2*9
C:\>set/a(2*9)/2

NOTE: We had had to quote the shift operator since it would otherwise be misinterpreted as a "redirect stdout and append operator".

FOR MORE INFORMATION ,type "set/?" at the CMD.

HERE "+" stands for ADDITION.
"*" stands for MULTIPLICATION.
"/" stands for  DIVISION.


Saturday, 26 March 2016

How To Create Bootable USB Without Any Software In Windows 10 (Using Command Prompt)

Create Bootable USB without any software on Windows :


  • Insert your USB flash drive to your computer.
  • Search for ‘cmd’ in Windows 10 from the taskbar, Command Prompt will appear. Alternatively, you can also open the  Command Prompt by pressingwindows+R at the same time and typing in ‘cmd’ in the ‘Run’ window and hitting enter.
  • Right click on Command Prompt and select ‘Run as Administrator’ in case you have searched for cmd in the Windows 10 Taskbar.
  • Once the Command Prompt window appears, type diskpart and hit enter. Wait until the diskpart utility runs in another window.
  • In the new diskpart window, type list disk and hit enter. It will show you all active disks on your computer.
Most probably, you will see two Disk types.
  • Disk 0 for hard drive and,
  • Disk 1 for your USB Flash Drive with its total capacity.
Since we are going to work on to create bootable USB drive, we will work with Disk 1.
  • Type select disk 1 in the same windows and hit Enter. You will get a message ‘Disk 1 is now the selected disk’. That means, any further operation that you do will affect your disk 1 directly.
  • Type clean and hit Enter to remove all of the data in the USB drive. Clean command will format your bootable drive. You will get a message like ‘Diskpart succeeded in cleaning the disk’.
  • Type create partition primary and hit Enter. You will get a message likeDiskpart succeeded in creating the specified partition.
  • Type select partition 1 and hit Enter. It will choose partition 1 for setting up it as an active partition.
  • Type active and hit Enter. It will activate the current partition.
  • Type format fs=ntfs quick and hit Enter. This command will format your current partition as NTFS file system quickly.
  • Type exit and hit Enter. Exit command will close the Diskpart program. But do not close the command prompt Windows.
Now before we proceed, let us assume that the USB drive is the G: drive and the DVD installer is located on drive E:. And, you also have inserted a DVD inside the DVD drive from where you want to copy the data to create a bootable USB drive.
By default, Command Prompt’s active directory for Administrator permission is on C:\Windows\System32>. We will navigate Command Prompt to set on DVD (E:) as its active directory. Remember there should be a DVD inside DVD installer.
  • Just type E: then hit Enter, and then the active directory is changed to E.
  • Type cd boot and hit Enter. Now the active directory is changed to E:\boot>
  • Type bootsect /nt60 g: and hit Enter. It will create the boot sector on G: drive (USB Flash drive).
  • Type exit and hit Enter to close the Command Prompt.
Until this step, we have been successfully able to create a bootable USB drive and the flash drive is ready to be used as a boot media.
To install Windows from a bootable USB drive, we just need to copy the whole installation files contained on the DVD installer to the USB flash drive.
  • To do this, open the Command Prompt as in previous steps.
  • Once the command prompt is open, type xcopy e: \ *. * G: \ / E / H / F and then press Enter. Wait until all the files in the DVD installer are copied onto the flash drive.
Now bootable USB drive is ready to be used for installing Windows from the Flash drive and you’re done.

Friday, 25 March 2016

Hacking ISP for free internet or Bypass ISP Login Page!

Hello Guys,
Team UserX Here! In this  post, I m gonna share with you an awesome trick to bypass your ISP login page and gain internet access for free. This trick is work on allWAN networks except Dial-up networks. Networks which uses a username and password to connect are known as PPPoE will not work with this trick because every client uses a different username and password. But it will work on Static IP and DHCP networks!

Required Software:

Netcut: This is a software which finds IPs and MAC or Physical addresses of the connected clients in your network. There are hundreds of users and sometimes thousands in a particular ISP. This software has a user-friendly interface which is quite easy for beginners.

Steps for Getting Free Internet!

  1. Download Netcut
  2. Install Netcut and run it.
  3. Now, you have to allow perhaps 10 seconds for the software to scan the connected clients and show their information.
  4. Now, as mention earlier that it will only work on DHCP and Static IP networks. You have to choose any one client and copy down it’s MAC Address and IP address in Notepad.
  5. Now we will have to change our computer’s Physical address and IP address. First of all, you have to go to Network and Sharing Center. Then click on Change Adapter Settings and right click on your adapter name and then click on Properties.
  6. Now click on Configure and move to Advanced tab. Then look forNetwork Address in the list, and then you will find that it is set to Not Present. Now tick or check Value and type the MAC address you copied from Netcut. This will restart your adapter, so wait 10 seconds until it reconnects properly.
  7. Now, it’s time to apply the IP we copied from Netcut. Now right click on your adapter name and click on Internet Protocol Version 4 (TCP/IPv4) and click on Properties. Now click on Use the following IP address.
    Fill the blanks like this:
    IP Address: Put the IP you got from Netcut.
    Subnet Mask: Use the same subnet mask you got from your ISP.
    Default Gateway: Use the same gateway IP you got from your ISP.
    To find the Subnet mask and Default gateway, you have to open upCommand Prompt and type this command: IPCONFIG and you will find the subnet mask and gateway.
Congrats: You now have a free internet connection!
Note: 
If one client is not working, use another!
Keep Hacking! Stay tuned 

Friday, 18 March 2016

GOD MODE (HIDDEN FEATURE OF WINDOWS)

It may be a stupid name, but Windows 7's God Mode is indeed omnipresent. It conveniently puts hundreds of settings from all around the operating system all in one place.

To turn on God Mode, create a new folder on your desktop--or anywhere you'd like--and name it: GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}. Don't include the final period. The resulting folder will contain 270 items, representing virtually every configurable option in Windows 7.

                                          HERE IS A VIDEO TUTORIAL TO DO THAT



HOW TO USE CALCULATOR AS A BROWSER.(ONLY ON WINDOWS XP)

HELLO FRIENDS.WE ARE BACK WITH A NEW SMALL TRICK.IF YOU HAVE NO BROWSER INSTALLED IN YOUR PC (NOT EVEN INTERNET EXPLORER) .SO YOU CAN BROWSE ANY URL WITH THE HELP OF CALCULATOR OR PAINT. SO LETS GET STARTED.Step1. Click Start --> Run --> and type mspaint or calculator
Step2. Once you open one of these program press F1
Step3. Place your mouse curser on the yellow question mark and right click it and click "Jump to URL"
Step4. Once you press that you will have the option to put an address bar. NOTE: You need to input all the address including "http://"BEST OF LUCK.NOTE ;THIS TRICK WILL ONLY WORK ON WINDOWS XP.



ENJOY. BY USERX
COMMUNITY

HOW to make a folder named 'CON' and nothing named folder in WINDOWS.

HELLO GUYS .Have you ever tried to create a CON FOLDER or any folder with names such as “con”, “prn”, “nul” “com1” “com2” “lpt1” etc. but failed? Is it impossible to create folders with such names in windows? If you have tried it then you have seen a pop up message showing some error.


So,how to make a CON folder using alt key and numeric keypad.
1. Create a New folder (Right-click -> New -> Folder)
2. Once the new folder is created, right-click on it and select the option “Rename”.
3. Hold down the ALT key and type 0160 from the numeric keypad (ALT+0160) and release the ALT key.
4. Now, the folder name should go blank so that you can type any name of your choice such as “con”, “prn” “nul” etc. and press Enter. That’s it, you’re done!
REASON BEHIND THIS ERROR: These names represent the internal devices of the operating system and hence we cannot create folders with the above names.

NOTE: YOU can also make folder named like 'prn' , 'nul' ,etc. by this method.FOR MAKING A BLANK NAMED FOLDER ,DO NOT WRITE ANYTHING.


ENJOY>BY USERX

How to Add Pattern Lock on Windows 10/8.1/8/7 PC/Laptop

# Using Eusing Maze Lock: (Awesome Pattern Lock Software)


Hello, Everyone Here is Esusing Maze Lock is a new security software for Windows OS Computer. It is the powerfull tool by using which you can safely lock and unlock your computer with a Single click on the tray icon.

Steps to Follow:

  • At first Download Eusing Maze Lock from given link.
  • Once the downloading is complete, Install it normally just like any other software.
  • Go to system try icons, Right click on Eusing Maze Lock icon and click on Configure as shown in picture below
  • After installation, it will ask for default pattern. The default pattern is like Z letter form. Now click on Reset Pattern to change the pattern to your choice.
  • DOWNLOAD Eusing_Maze_lock_by_Userx.exe

Features of Esusing Maze Lock :


  • It’s new pattern based technique to lock and unlock your computer.
  • It offers quick and safe computer lock by mouse click, or hot key.
  • You can make your computer auto lock when computer is idle.
  • Your computer will be safely locked when windows startup.
  • You can turnoff the monitor based on your choice.
  • You will be able to change the alert text.
  • Esusing Maze Lock have 3 different built-in patterns: 3×3, 4×4, 5×5.
  • You can use custom lock screens background image.
  • It offers transparent screen lock feature.
  • Esusing Maze Lock support multiple monitors.
  • you can use the dynamic password technology to prevent key loggers.
  • It can disconnect internet access when your Computer is locked.
  • You can backup your own pattern feature.
  • It will display the date and time on locked screen.
  • No security issues, it’s 100% Spyware FREE, NOT contain any Adware, Spyware or Viruses.

Saturday, 13 February 2016

how to secure your e-mail account

It’s tough to get people to pay attention and be serious about their online identity. An Email account is the first and primary component of your online identity and yet it’s the one that is left unguarded the most. Email accounts may be virtual but once hacked, the consequences and damages are very real.
The problem with a hacked email account is the domino effect. All registrations, purchases, renewals, transactions, password reminders etc. are sent to your email inbox. So once the first domino falls, the entire setup falls apart in one fell swoop. After the jump, we’ve rounded up a few tips that can help you secure your email accounts of popular webmail services.

Use a Strong Password


Strong Password
Yes, I know this is what every other tech blogger says every single time. But that has never made people any wiser. Even hackers feel insulted when they come across passwords like “sweetlove123”, “pass@123” and the like. Google is the best when it comes to putting real effort into securing your email account proactively. You can use special characters, numbers, upper and lower case alphabets of almost any length. My Gmail password is between 60 to 80 characters long and my general rule of thumb is to have a password that only the NSA can hack.

Use a reliable Secondary Email Address

Absolutely no Hotmail accounts for secondary fallback email account people. They still have their stone age era email account expiry plan after certain number days of non usage. So if the secondary email address is Hotmail and is expired, anyone create it back again to receive password reset information. And since webmail providers have this peculiar habit of giving all kinds of hints to remind you of the email address where the password recovery link has been sent, use an uncommon, custom domain or corporate email address that is hard to guess and hack into.

Setup SMS Alerts


SMS Alerts
Go to your account settings and add your mobile number to receive SMS alerts. Once that’s set up, Google will send you the password reset code whenever somebody tries to reset your password. Alternatively, if you are a smartphone user, you can rely on these SMS alerts and disable password recovery via email altogether. Email accounts are always vulnerable to a hacker from a remote place but your mobile phone is not. Yahoo provides the same feature free too. Hotmail has a similar feature but is not supported in a lot of countries.

Be sensible with your security question

Ok. There’s absolutely no point in having the security question, “My favorite doggy”, and posting pics of you and your poodle with images titled “Rolling with Rosy” on Facebook and Twitter. A lot of personal information is available online, thanks to social networks. On being the weakest links in the email security chain, security questions rank ahead of weak passwords. It’s nice to be an open book but select a question from those stapled pages and blacked out lines.

Check Filters and Forwarding Addresses

In the event of a hack and after reclaiming the account, go through the existing filters to check if there are some sneaky filters set up that forward all your credit card, login info, bank account and other sensitive correspondence to an email address that is not yours. Go to the forwarding page and see that all your incoming mails are not forwarded to the hacker either. This helps you avoid getting hacked in the future too.

Avoid Public WiFi

Happy to have discovered an unsecured WiFi hotspot? Or mooching your neighbour’s spilt WiFi? Enjoying the free WiFi of the coffee shop round the corner? Good for you and so is for the hacker sitting nearby to sniff the packets right out of thin air. Avoid using public WiFi for accessing email or transacting online with a credit card. Casual browsing and YouTube watching (without logging in) are Ok. Accessing emails is a big no, no.

Do not share your login information

Another obvious fact. But at times, it’s necessary for small businesses and online entrepreneurs to share login information with colleagues. For example, accessing Google AdSense, Analytics or Microsoft Live services etc. The ideal solution is to create a dedicated account for accessing these services instead of linking everything to your personal email id and sharing it.

Login regularly

Even if a hacker gets hold of the answer to your security question, they cannot use it immediately to reset the password and break into your Gmail account. Password reset with security question is possible only after 24 hours of your account being inactive after receiving the password reset instructions. So for once, checking your mail regularly is a good thing. Also, it will help reset the Hotmail account’s expiry date. Unfortunately Hotmail and Yahoo do not have this useful restriction in place.

Special Features

Gmail

Enable HTTPS by default from your account settings. This helps from the password getting sniffed when transmitted over public WiFi hot spots. If you are a Google Apps user, enable pre release features to avail the upcoming two factor authentication system before it launches.

Hotmail

Use the Windows Live Essentials package and verify the computer you are using as reliable. “Trusted PC” is a unique new proof that lets you link your Hotmail account with one or more of your personal computers. Then, if you ever need to regain control of your account by resetting your password, you simply have to use the trusted computer and Hotmail will know you are the legitimate owner. It’s a great feature for those who are really paranoid about email security.

Yahoo


Sign In Seal
Make use of the sign in seal option to verify the computer. Sign in seal is basically an image or color that Yahoo displays for each of your computers adding another layer of security to the login process.

Avoid Webmail

Still not sure about the safety and security of your email account online? It is totally understandable and I suggest you to take it off the Internet. I mean, partially. Get hold of an ISP and get a POP or IMAP account set up for your email address forgoing the webmail set up. Then use desktop email clients like Outlook or Thunderbird to pull your mails. It will make you feel dated, but is reliable and works effectively too.
Did we miss an important tip or got a better suggestion? Share it with the rest of community in the comments section.