HAVE IPHONE SPOKE TO YOU !!

An Internet-enabled smartphone developed by Apple specially used for our personal purposes. The iPhone combines mobile phone capabilities with a wireless Internet device and an iPod into one product. The iPhone also includes a 3.5-inch multi-touch screen (4-inch Retina Display on the iPhone 5), rather than a keyboard, that Read the rest

HOW TO USE ICLOUD DRIVE ?

iCloud Drive lets you securely access all of your documents from your iOS Device, Mac, and Windows PC. So no matter which device you are using, you will always have the most up to date documents when you need them.

Here’s what you can do with iCloud Drive:

  • Store
Read the rest

HOW TO PROTECT YOUR PC FROM MALWARE AND HACKERS?

Hope PCs of everyone may or will be caught either by malware or hackers so in order to protect our PC from them, sharein.org had proposed numerous ways and here comes some few simple, but critical steps to protect your computer.

  • Install Firewall
  • Install Antivirus Software
  • Install Anti-Spyware Software
  • Use
Read the rest

HOW TO IMPLEMENT DUAL SECURITY ON WCF ?

This post will helps you to apply DUAL security using transport plus message on WCF services. Follow below steps and make use of it.

Step 1: Customize ‘WsHttp’ Bindings with Security Mode and Credential Type

The first step is to customize your ‘Wshttp’ binding with proper security mode … Read the rest

HOW TO SHOW HIDDEN FILES IN WINDOWS 7 ?

In computing, a hidden folder (sometimes hidden directory) or hidden file is a folder or file which filesystem utilities do not display by default when showing a directory listing. They are commonly used for storing user preferences or preserving the state of a utility, and are frequently created implicitly … Read the rest

HOW TO PARTITION A HARD DRIVE IN WINDOWS 8?

Therefore, system, applications and private data are all on one partition. It is difficult to manage all kinds of matters in one partition. Besides, there is something much more serious. Since all the things are on one partition, if the partition is attacked by hijack or virus, all the data … Read the rest

HOW TO USE G-MAIL ACCOUNTS WITH ONE-TIME PASSWORD?

We all know that Email is technically an unencrypted medium, the average hacker might not go to too much trouble to grab a single message — but most of them like to peek at their history full of reset passwords. When compared to weak password the strong passwords are more … Read the rest

HOW TO CREATE AND USE A GOOGLE GROUP?

People likes to chat in groups rather personally. In school, colleges, offices people are moving in group, having fun etc.., In chatting too they are expecting the group chat which makes them more pleasure. Here are some steps which helps you to create an group in google.

What is google

Read the rest

HOW TO ENABLE FACIAL RECOGNITION IN YOUR GOOGLE PHOTOS

Now a days people need their own space in the society. Especially at home and outside the home. Most of the people will secure their phone by using the pin number, pattern. But In this post we are going to describe how facial recognition is used for the purpose of … Read the rest

HOW TO USE INTERNET EFFECTIVELY-SOME BASIC TIPS

Internet is the world wide organization of computer network, which the best place to pass the time. All the fields of daily human life have been touched bu the internet. Just spending time in internet by chatting is wastage of time, and it is best place to gain our knowledge … Read the rest

HOW TO AVOID IP ADDRESS ISSUES ON WI-FI ROUTER?

When you purchase a wireless router for your home or small office network setup, it is required that you configure its settings as per your personal preferences. The main configuration modifications that you make in such wireless router can be of modifying the IP addressing scheme that the router has. … Read the rest

HOW TO CREATE NAMELESS FOLDER IN WINDOWS | WIN TRICKS

You may have created hundreds and thousands of folders in your computer, Whether you tried to create a folder without name? Its very easy – We can do it with in few seconds. By doing this we can make fool of our friends. It will be surprise for many but, … Read the rest

HOW RFID WORKS ?

This post aims to bring in the basics of how the card works .Let’s look at some of them. The RFID cards have some electronically stored information. Some of the RFID tags are powered only when they are introduced near the radars (Through the principle of electromagnetic induction).

How it

Read the rest

HOW TO GER RID OF TROJAN VIRUS?

A Trojan virus is malware program and it attaches itself to waste files and embeds itself in computer system. These files comes from spam and scan emails or by clicking on unknown links online. Trojan virus makes us irritate but it is also easy to remove . follow few steps … Read the rest

HOW TO CREATE BATCH PROGAM FOR BEGINERS ? – LESSON 1

HOW TO CREATE BATCH PROGRAM IN YOUR PERSONAL COMPUTER – FOR BEGINNERS:

Here the post is to teach you on how to create batch program. Batch program is use to control your personal computer as like command prompt. In your PERSONAL COMPUTER this batch program is used make your computer … Read the rest

HOW TO ACTIVATE AUTOCAD?

AutoCAD is a computer-design and drafting software program developed by Autodesk. Before you can begin using AutoCAD, you must activate and register your software with Autodesk. AutoCAD can either be activated on your computer using the Internet, or can be manually activated using a registration code.

autocad commands to perform easily

Method 1 of 2: 

Read the rest

HOW TO MAKE YOUR TV AS A COMPUTER MONITOR?

Many people want to make their TV as their system monitor. But could not do that because of no knowledge about it. Here is the way you can find it in an easy manner. So that you can connect some cables from computer to TV ports and convert it to … Read the rest

HOW TO FIX BLUE SCREEN PROBLEM IN COMPUTERS?

How To Fix The Blue Screen Problems?

The Blue screen blunder, generally alluded to as the ‘blue screen of death mistake’, is a standout among the most well-known blunders that influence Windows Computers. The blunder just implies that your PC has an intense issue and that unless it is altered, … Read the rest