18 October 2014

Google Releases New Android 5.0 Lolipop

Google Releases New Android 5.0 Lolipop
Google’s new Android 5.0 Lollipop update release is now confirmed for a number of Nexus devices including the Nexus 4 and Nexus 5 but Nexus users won’t be the only ones getting Google’s brand new update. We’ve seen Android 5.0 Lollipop update details emerge for companies like Samsung, HTC, Sony, and Motorola and here, we breakdown what we know about the Android 5.0 Lollipop release date.

Android L was first announced as Android 4.4 KitKat’s successor back in June during the company’s annual Google I/O developer event. At the event, Google did not confirm an Android L release date or a name though it did outline many of its features and push out a pre-release version to Nexus 7 2013 and Nexus 5 users. In the weeks after that release, we’ve seen features teased and release dates rumored and today, Google finally spilled the beans on Android L with a detailed announcement.

Google’s Android L update, as expected, is called Android 5.0 Lollipop. The update will be accompanied by two new Nexus devices including a Nexus 9 from HTC and a Nexus 6 from Motorola. Both devices will help usher in a new era for Google and its Android operating system.

 Must Read :  Youtube adding Offline Videos


Lollipop's most evident new peculiarities come as visual upgrades and client interface changes, which Google has named Material Design. The stage has new, more liquid movements, a cleaner plan with a bolder shade palette, a patched up multittasking menu, and offers better approaches to cooperate with your voice. A large portion of the new Material Design peculiarities can be seen in the late redesigns that Google has discharged for its own particular Android applications, for example, Google+. The Material Design activity is intended to bind together the product's look and feel crosswise over different structure components, whether that is a tablet, smartphone, home media streamer, or something else. 

Notwithstanding a visual redesign, Lollipop brings in excess of 5,000 new Apis for designers to take advantage of and lets numerous distinctive Android gadgets with different structure variables work better together. Google says that things, for example, tunes, photographs, applications, and late inquiries can be flawlessly matched up crosswise over different Android gadgets. Lollipop likewise incorporates new notice controls to breaking point alarms amid gatherings and different times, another battery saver mode that can squeeze out 90 more minutes of life between charges, numerous client accounts, visitor client modes, and better approaches to secure your gadget through trusted Bluetooth associations. Lollipop will likewise incorporate an insurance against resetting the phone to processing plant defaults, which is intended to make it troublesome for phone hoodlums to utilize a stolen gadget. Huge numbers of these gimmicks have been executed by different Android gadget producers all alone smartphones and tablets for quite a while, yet Google is currently verifying they are a piece of the center Android experience. 

 Must Read Facebook Buying WhatsApp

With Android 5.0 Lollipop officially announced and the first release coming on November 3, we were waiting for this. Google has released the Android 5.0 Lollipop SDK and system images for developers to get working. Android 5.0 Lollipop marks an enormous update for Android, with dozens of enhancements and a new design language entitled Material Design. There’s very little in Android that isn’t affected by the update.
Read More

7 October 2014

Youtube Adding Offline Videos


This is great news for anyone who is a YouTube fiend but doesn’t have internet access at home. The major video-sharing network has announced that it’ll be adding the ability to watch videos offline to its mobile apps.Given that Google’s actively gone after Microsoft for giving people the ability to download videos with its YouTube app, it might hardly be surprising that you will only be able to watch videos using the features for a “short time”.In a blog post aimed at video creators, YouTube says that it means “your fans’ ability to enjoy your videos no longer has to be interrupted by something as commonplace as a morning commute”.The video network adds that the feature is designed “to give people more opportunities to enjoy videos and channels on YouTube mobile”.At this stage, YouTube not yet revealed exactly how the feature is going to work, although it obviously wouldn't be starting from scratch.The company last year began implementing pre-downloading of videos for its Android app. That particular feature required you to start watching a video online before allowing you to move offline.It is also worth noting, as The Next Web does, that unveiling the feature on its Creator blog could mean that the people uploading the videos could have ultimate control over whether a video can be viewed offline or not.According to YouTube, you should be able to start watching videos offline by from November of this year.

 Must Read Facebook Buying WhatsApp

Apps Allow  View YouTube Films Offline 

Quite basically, this new operate is based on earlier saved these videos we wish to see right after offline. But keep in head that for this, the person will require to use Net connection to download the gadget cache that video you wish to observe later offline.

On the other hand, from the formal YouTube weblog have produced it very clear that the online video will remain cached for a quick time and restricted, not only to stay away from potential troubles with the copyright of these movies, but also for the very own convenience of consumers .

With this new potential coupled with beautiful facelift cellular app endured this services a couple of weeks back you could say that the apps is in one of his greatest. Also evidently witnessed as Google continues to function difficult to improve their providers and keep introducing new functions that make them even more fascinating.

 Must Read : Add Embed Youtube Video into Blogger

What do you feel this new option to incorporate the YouTube application from November ? Do you believe people will use it?Share your view on comments.
Read More

26 September 2014

Best Way to Earn Online Money with Bitcoin


Way to Earn Online Money with Bitcoin
Earning money online without  investment is always a  dream for everyone.So here today we're going to share one such way which is a global invent of current revolutionary technology,the term is digital currency or crypto currency.This is actually a very simple thought but also a very complex one too,it depends on your way of thinking actually.There are several crypto currency available online but the most popular and famous one is 'Bitcoin'.

 Must Read :  Make Money With Fiverr

What is Bitcoin?

Bitcoin was launched in 2009, the first digital medium of exchange at the time, but now one of many (others have names like Ripple, Litecoin, Peercoin and Namecoin). Being digital, these currencies can be transferred instantly and securely, with no, or very low, transaction fees, between any two people anywhere in the world. Think of it as electronic cash that you can use to pay for goods or services, or give to friends or family, without having to pay the bank to do so.

Is Bitcoin Legit?

Yes it is completely legit over the world.Many online shopping sites like amazon and others do accept payment in bitcoin.So it is a complete legit and most trending digital currency all over the world.

Bitcoin Units

1 Satoshi = 0.00000001 ฿
10 Satoshi = 0.00000010 ฿
100 Satoshi = 0.00000100 ฿ = 1 Bit / ╬╝BTC (you-bit)
1,000 Satoshi = 0.00001000 ฿
10,000 Satoshi = 0.00010000 ฿
100,000 Satoshi = 0.00100000 ฿ = 1 mBTC (em-bit)
1,000,000 Satoshi = 0.01000000 ฿ = 1 cBTC (bitcent)
10,000,000 Satoshi = 0.10000000 ฿

100,000,000 Satoshi = 1.00000000 ฿

Ways to Get Bitcoin

Though there are several ways to get bitcoin but here we'll recommend you the two main way to get bitcoin

  1. Capcha Mining
  2. Cloud Mining

Capcha Mining

There are several websites out there where you just need to log on with your email id and then you just have to clear the capcha and you'll get bitcoin.Here we're going to recommend you one main site to get bitcoin and that is LandofBitcoin.This is one of the most useful site to browse over 70 best bitcoin sites through it.

Get Started with LandofBitcoin

  • First you need to visit the website and sign up here using the sign up icon placed in the top right side of the site

  • Next move onto the account section placed at the top right corner and a similar page like below will open.

  • Here you've to put your email id and bitcoin address but to generate the bitcoin address first you need to visit coinbase and after signing up there you'll have your bitcoin address to your email id.If you're having trouble to sign up with coinbase.com to get your bitcoin address you may also visii blockchain and sign up there.Now you've your bitcoin address.
  • Next you just need to put your bitocin address there along with your email id and click the save button.That's it.your landofbitcoin account just created fully.
  • Now you've to visit the home page of your landofbitcoin sites  and there you'd find various ways to earn bitcoin but we'd recommend you the first one as per the below image as they are most easy and fastest way as well as they don't need any investment.

  • Under 'collect free bitcoin from faucets' section you'll find various sites where you just need to visit and clear the capcha to get free bitcoin.One of the best sites under there is moon bitcoin You must visit that cause they will give you satoshi in free as per time.
NOTE:You've visit those sites atleast one per day and clear the capcha cause they often reduce the free Bitcoin amount to irregular visitors.

Cloud Mining

Physical bitcoins do exist, with a number embedded in them, but ultimately, a bitcoin is just a number associated with a bitcoin address. The “mining” that creates them uses PC processing power to solve complicated cryptographic problems that get progressively harder to crack as time goes by. This is the geeky, maths bit. But even computer novices can do it, using software that is free to download and run and which can be left to run 24/7 in search of the magic code that will unearth more bitcoins. Obviously, the more powerful the computer, the more chance there is of reaping a reward in a given time.

When a computer mining bitcoins hits the jackpot (after 1 789 546 951 attempts, on average), a box appears on the screen confirming that all the code crunching has produced, not one newly minted bitcoin, but a block of 25, because bitcoins do not emerge singly. At the moment, a block is being found by some computer every seven to eight minutes – which gives you an idea how many people are mining them.

But unless you wanna invest and take the risk to loose your money then earning bitcoin through visiting bitcoin faucets websites are much better than bitcoin mining.

How to Collect and Sell Bitcoin

whether you're doing bitcoin mining or visiting faucet the total amount of earned bitcoin will automatically store onto your coinbase or blockchain account on every sunday,using which you made the sign up.You'll also get a mail notification on your email id too.Under there you'll find a 'my wallet' option and there you can see the total amount of your bitcoin you've earned.Under that account you've also a sell option.as soon as your bitcoin reached the threshold amount.So then you can choose whether you're willing to sell it or should keep it on your account and wait for a better price.

 Must Read : Make Money with Ad Dynamo

Bitcoin is currently most trending currency of worldwide.People are earning millions from it all over the world.so better you should give it a try as it needs zero investment.
Read More

16 September 2014

EaseUS Todo Backup


EaseUS Todo BackupEaseUS Todo Backup  is the most comprehensive free backup software currently available in market. The backup software allows users to create backups of your important files or the entire workstation through its simple, intuitive and streamline interface.

Users can start their backup by just selecting few options from the interface and the software will do the rest. The application supports both file and image backup.The application is a freeware with enough functionality compared to the pro version of the software, that it can be used very efficiently without worrying if they are missing something or not.

 Must Read : OLX App for Android

The application integrates well with windows and works seamlessly over other platforms as well. The interface is clean and provides intuitive reasoning about the functionality the backup software offers.
Recovering is very easy, once you have made any backup. You can either double-click any Todo backup file and it opens as if it were a folder. Similarly, you can restore the full backup through fully integrated restore function.
Ease US Todo backup software sports several different options for creating a backup using the application. The backup options are

  1. Disk/Partition Backup
  2. System Backup
  3.  File Backup
  4. Smart Backup

Cloning of the whole hard disk is also supported and switches it out for a new one. You can also choose to recover their files to the original location or a separate drive or folder, and whether or not they want to replace existing files.

File monitoring is also great feature that the application offers. You can set up schedules for the program to monitor specific files using the file monitoring feature. This feature is great for files that are constantly being changed and needs to be monitored in regular intervals. This makes ensure that you never have to worry about losing the latest work.

The only backup that I feel every free app has is its frequent pop-ups asking you to upgrade. The frequency sometimes is very much compared to other free application that uses the same model of advertising.

A few more drawbacks that makes the application lag behind others in backup category is the lack of virus scanning and lack of backup scripting capabilities, a tool that is used to create specialized backup for advanced users.

EaseUS Todo Backup has great documentation available online. This is augmented with a great helpful community. The software do lack support on telephone contact but still it covers it up with great documentation and online community.

EaseUS Todo Backup is reliable data backup software which features robust functionality, smooth performance and flexible backup options. The lack of virus scanner and custom scripting hurts the software in longer run. Otherwise this is a must have backup tool.
Read More

14 September 2014

Simple Ways to Transfer Contacts From iPhone to Android

How to Transfer Contacts From iPhone to AndroidThere was a time when moving from one phone to another meant an incredibly painful exercise. A task as simple as moving your contacts was excruciating, to the point that many people would just pay their carrier for a transfer fee (on top of buying their new phone). This process have grown easier and easier over the years, and now it takes no time at all. If you need to transfer contact from an iPhone to Android, it’s really simple to do now.so here we will show you how you can transfer your contacts from an iPhone to an Android.

 Must Read : Android Phone from Nokia

Manual Sharing

First off is the fashioned manual way but it will take up a lot of your time as through this method you can only share one contact at a time. To share a contact simply open the ‘Contacts’ app and then select the contact to go to the contact info page. On that page, scroll down and then select ‘Share Contact’. You will then have the option to share the contact either through email or message.
This method is only good if you want to share one of two contacts, however if you are looking to share your entire phonebook then we suggest you check out these alternative methods discussed below.

Using ITunes

If you have a Google account and manually backup your iPhone to your computer using iTunes, here’s an easy way to export your iPhone contacts to your Google account.

  1. First, open iTunes and plug in your iPhone to your computer via USB cable. Select your iPhone in iTunes. Under the ‘Info’ tab, choose to Sync Contacts with Google Contacts.
  2. It will prompt you to enter your Gmail username and password. Wait for it to sync. Once it is done, head to Gmail and log in to your account. Then go to Gmail > Contacts.
  3. You’ll find that your contacts will have been imported to your Google Contacts

Via iCloud

If you’ve enabled the iCloud service on your iPhone, your phone contacts have most likely been backed up to your iCloud account.  You can then export those contacts into a file that can be imported into Android directly, or indirectly through Google Contacts.

  1. Using your desktop Internet browser, go to https://www.icloud.com/ and sign in with your iCloud account.
  2. Click Contacts to view a list of contacts.
  3. Select the contact(s) that you want to export.
  4. Click the cog wheel icon at the lower left and select Export vCard.
  5. Your computer will download a VCF file containing the exported contact(s).
  6. Import this VCF file to Google Contacts or copy the VCF to your Android phone’s /sdcard directory and import it to your phone through the People app or Contacts app.

When all of the contacts have been moved over, all you need to do next is log in to your Android device. Once you have logged in to that phone with your Google account, the contacts from your iPhone will sync to your Android phone and the process will be complete.

 Must Read : Optimize Android Battery

As you’ve seen, sharing contacts from your iPhone to an Android phone is not that difficult. The process may not be as straightforward as you’d want it to be, but it’s doable. There may even be other easy methods that we missed or overlooked.Which of the methods described in this post worked for you? If you know of other easy methods for transferring contacts from iPhone to Android, let us know in the comments.
Read More

29 August 2014

Some Best Ways to Secure Your Gmail

Some Best Ways to Secure Your Gmail
Gmail is a web mail service provider run by the internet search engine giant Google inc. As of June 2012, it is the most widely used web-based email provider with over 425 million active users worldwide. Gmail is used by a wide variety of people starting from children to business officials, for both personal and formal purposes. We use mail services for online transactions, purchases and much more. So, mails in and out of our account could carry sensitive and private information such as our address, contact no, Bank account details & etc. If the security of our account is compromised by a third party, we could lose all our important information and would face serious consequences. To avoid this, one must ensure the security of his/her accounts thoroughly for not leaving any chance for hackers.So here we're going to provide some tips to secure your gmail account from hackers.

 Must Read : Google Secrets and Tricks

  • Use A Strong Password

The image speaks for itself. Of course, choosing a strong password is the very first step in protecting your account from hackers. For best results, use a combination of numbers, special characters, uppercase and lowercase letters that would be really hard to guess! Also avoid using the same password for all your online accounts because if one of your account gets hacked, you might lose all your other accounts that uses the same password. So try having an unique password for every online account you maintain.
  • Make A Strange Security Question Answer

You will be surprised to the fact that hackers love to hack into your account from your mail recovery’s security question, than to confront your already strong password directly. It’s really reasonable though, since most websites teach you to create a strong password, but they didn’t tell you to spawn a tricky recovery question and/or answer.
For this one we will like to have our personal trick exposed to you: create a question with an absolutely wrong answer. It’s really simple, let’s say you made a question, “Who is the lover of my mother?” (please don’t use the combination of this question and the answer below since we covered it here), then you can put the answer as “my mother loves to eat burger“. Make it as nonsensical as possible, but keep the answer strongly related with your past, so you can remember it easily and only you will know the answer to it.

Once you got your own tricky question and answer, you can change your password recovery question by accessing your Gmail, clicking on the gear-like icon > Settings > Accounts and Import > Change password recovery options, then click “Edit” on the Security question option and replace it with your new question. One more job is done to fortify your Gmail account.

  • Be Alert from Phishers

Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Read more about it in Wiki. Phishing is said to be the most successful type of online attacks. Major websites, high profile emails and many others have fallen victim to phishing. So, let’s learn some ways by which a phishing attack can be identified and avoided.

Whenever you receive an email from an unknown entity or a friend,  asking you to sign in to your Social Network, email or any other online account you maintain, stay alert because there is a good chance that it might be a phishing attack .
The picture above is a sample phishing page where once you enter your log in credentials, an email will be sent containing your username & password straight away to the attacker. So, check the url of the page before signing in. At first, it may appear to be a legit url. But at the end, you will find some unknown website which is not related to the original website. For eg, in this picture, you can find the url to be http://googleverification.110mb.com/verifymyaccount/try where 110mb.com is the site where this phishing script is hosted. So never give in your credentials before confirming the authenticity of the source.
You may also receive emails claiming to be from reputed organisations such as coca cola, informing you that your email has been selected for some prize money and you need to enter your personal information in order to claim your award. Never fall for that! Its 100% phishing.
The above said points are the most common types of phishing attacks. So, stay alert and stay safe!

  • 2-Step Verification 

To combat the growing account theft issues, Google has introduced a security feature which will greatly strengthen your account: 2-step Verification. In general, it adds an extra layer of security by enquiring a code that will be sent to your phone every time you request for the account access, thus making it impossible for anyone to hack into your account without your phone.

Sounds problematic? Probably not. The awesome thing is that the setup is fairly easy, you just need to visit the setup page and follow a series of simple instructions, and that’s all, you are good to go! In case you need any troubleshooting in the future, you can also visit the Help page to seek for a solution.

With this 2-step verification, you can even create a backup phone number and printable backup codes as alternatives to access your account if you lose your phone. For applications that cannot request for the verification code, you can also create an application-specific password for them. So basically your account will be inpenetrable, unless your closed ones betray you.

It might feel a bit annoying the first few times, but it beats getting your account hacked and then getting blackmailed to regain access to your own email account, doesn’t it?

  • Never Trust Anyone

Even (and especially) when you receive emails from your loved ones, because their account might be hacked and those emails are actually sent not by them and without their permission.We believe that most people already know about this but we feel it important to list this advice down nonetheless.

The fact is that we can’t really count how many scam or phishing mails we’ve received from my friends’ hacked accounts. Fortunately we was calm enough to not open the “I love you” email, but there could be certain mails like “Robbed in China” scams in which "your friend" asks for your emergency help, and these are the ones that could really trick you as the request for help is coming from your dear friend.

Normally your first reaction would be to ignore the mail, but if you’re really curious about the situation, then reach out to the friend or his/her family members to verify the crisis before extending any help . Otherwise, you’re the one who will face the crisis, so please keep the warning in at the back of your mind any time!

  • Avoid checking Emails at Public Places

A Keylogger is a computer program which can be used to record what you are typing in the keyboard. The Keylogger records your keystrokes, saves them in a simple text file and sends it to an email address or to an FTP server. And you are completely unaware of the whole process, running in the background.

You never know which programs are installed in a public computer. Consider a simple scenario: You went to a local internet cafe to check emails from your Gmail account. The cafe staff has installed a Keylogger in every computer and when you type the username and password, the Keylogger script comes into action, records both your username and password and sends it to another email address. You leave the cafe after checking emails and the cafe staff  retrieves your username and password and hacks your account.

Hence, never check emails at a local cafe or at public places or in any computer where you don’t have control.

  • Never Click On Any Suspicious Links

There are some websites which let’s anyone send fake emails to any email address. And the worst part is that the sender can customize the “From” address to anything – noreply@gmail.com or gmailteam@google.com.

Consider a scenario: Mr X uses some website and sends an email to you asking you to change your Gmail password due to security reasons. You see the from address field as something like “support@gmail.com” and think that it’s from Gmail. No, it’s not.

When you receive any emails which asks you to change your account password or enter login credentials, STOP. Do not ever click on any suspicious links from your inbox.

Note: Gmail will never ask you to change your password or enter login credentials without any reason. Hence, if you receive any email which claims to be from Google and wants you to change your password, be rest assured someone is trying to fool you and hack your email account.

  • Always Enable HTTPS Security

When it comes to accessing your Gmail account in public wireless or non-encrypted networks, HTTPS could mean your security. Leaving HTTPS disabled will only make it easier for attackers to crack open a path into your Gmail account. HTTPS is enabled by default, but past experience has taught me that it’s always better to perform a check to ensure that the HTTPS option is on.

To do the check, log into your Gmail account. A big gear-like icon will appear on the top right side of the interface. Click on the gear icon > Settings > General > Browser Connection and see whether the option, “Always use HTTPS” is checked. Remember to save the changes!

By doing this, your account is potected by a secure protocol that provides authenticated and encrypted communication. Oh, if you’re doing this on public computer, do remember to log out of your Gmail account after using it.

  • Check Your Filter, Forwarding And POP/IMAP

In 2007, a famous designer, David Airey’s Gmail account is hijacked. To make the long story short, the hacking started when the user has its account signed on and he went to visit a bad site. The site added a backdoor to extract information from the Gmail account, and the backdoor is the Filter. Filters can potentially transfer emails as long as the victim has the filter in his account.

Therefore, it’s vital for you to actually check your account settings to delete suspicious filters. The check is real easy. As usual, you just need to log into your Gmail account, then after clicking the gear-like icon, choose Settings > Filters to check and delete the Filter you didn’t put there before.

You will also need to check the “Forwarding and POP/IMAP” tab as well to confirm that there is no foreign forwarding address included in this tab apart from those assigned by you. Do perform a check on these stuff when you feel that something unusual is going on in your account. Your prevention methods will save you from experiencing problems in the future.

  • Embrace Security Plugins

In the end, no matter how strong your security is, you might end up getting tricked by phishers and scammers. To combat these tricky situation, you can adopt browser plugins which will greatly strengthen your online security by aiding you in recognizing phishing sites and by removing threats, at the cost of hundreds of kilobytes!

Web of Trust (WOT) is an awesome browser plugin that checks whether you are accessing a bad site. When you entered a potentially bad site, WOT will show you a dark page covering the front page of the site, and inform you that the site has poor reputation, while blocking you from accessing the page. WOT is available for major browsers like Firefox, Google Chrome, Safari, and more!

On that matter, there is a double-edge sword called cookies. It stores certain user information and preferences for convenient site information access in future, but it also leaves a path for attackers to infiltrate your computer. That’s when BetterPrivacy comes to the rescue. Basically it removes special long-term cookies, thus greatly eliminating the chances for attackers to hack into your account.

Better Privacy is only available for Firefox, but you can get similar plugins by searching your browser’s plugin store with the term “privacy“. Other than that, you can browse the Firefox Add-ons Page, Chrome Web Store, Safari Extension Gallery or any other browser’s plugin store to get more security tools for your browser. But always remember to check the plugin before adopting it, as you might know, sometimes the help could be the culprit itself.

 Must Read : Google Being Doodled

There is one more truth that you might find disturbing: if a professional hacker really wants to hack into your account, there’s basically no way for you to prevent the attack. However, if you do your best to prevent the possible methods of attacks, then the chance of your account being hacked will be greatly decreased. Usually the thief won’t invest too much time on a random account.Have a better tip or thought on securing everyone’s Gmail account? Feel free to expose them in the comments!

Read More

22 August 2014

Hide Last Seen on Whatsapp

Hide Last Seen on WhatsappDo you get a lot of messages on WhatsApp and at times you just read them and don’t bother to reply? Do people hate you for reading their messages but not replying to them? Do you have a girlfriend or a boyfriend who stalks your WhatsApp profile 24×7 and then fights with you if he / she finds your WhatsApp last seen at time correspond with someone else? Here’s how you can get rid of it by simply hiding the time you were last seen on WhatsApp!We have two guides, actually three – one for iPhone and two for Android based devices.

 Must Read : Facebook Buying Whatsapp

Hide Last Seen Timestamp on Android 

There are actually two way to do this.
  • Using an apps named Not Last Seen,which is a simple app that restricts WhatsApp from updating your status about using the app.
  • You can also do it manually by following steps below

  1. Disable your cellphone’s Wifi or data connection.
  2. Open WhatsApp. Read and send messages.
  3. Close WhatsApp, now activate Internet and Wifi. As soon as the Wifi network is restored, WA will synchronize with the servers and the messages will be sent without anybody coming to know the last time you used WhatsApp.

Hide Last Seen TimeStamp on iPhones

iPhone users who wish to change the Last Seen settings can follow these simple steps.

Go to Settings>Chat settings>Advanced. There you will see an option Last Seen Timestamp, turn off the option.

Once you modify the Last Seen Timestamp on WhatsApp for iPhones, it will not let you make any further changes for the next 24 hours. On the other hand, there are no such restrictions for Android devices. You can modify the settings as many times as you wish on the same day.

 Must Read : Run Whatsapp on PC

So hope you'd like this article,if you still having any problem regarding this do let us know through your comments.
Read More

15 August 2014

5 Benefits of Oraganising Free Giveway to a Blog


5 Benefits of Oraganising Free Giveway to a  Blog
What is giveway?Do you ever heard the term?If no then let us tell us what is it.Giveaway means organizing an event onto your blog,where the lucky winner get rewarded by some free gifts from the blog owner.Giveaway is a most effective method to gain popularity for any blog.Sometimes you may wish to reward your visitor for their daily visit into your blog and free giveaway is the best one for them.You may saw many well established blogger often organise such types of free giveaway  into their blog for their reader and you may also even participated onto some of them.So let’s discuss about the benefits of these such giveaways.

 Must Read :  5 Common Blogging Mistakes


Main reason to organising a free giveaway is to gain popularity of your blog on the eye of your blog reader and search engines,cause both of them love to visit such blog who organize such free giveaways.Organising a giveaway help your blog to establish more and more.

Loyal Reader

Giveaway a blog to get some loyal reader.Visitor do love to launch often onto your blog to see whether any giveaway is organising there or not.If that visitor is your any giveaway winner then chances are more to visit your blog more often.That way you could get some loyal reader towards your blog.


Giveaway surely help a blog to boost traffic.Whenever a visitor see a giveaway is going on into you blog he/she will definitely visit more often into you blog.Even search engines do love to send traffic those blog organiging free giveaway.

Social Engagement

Often giveaway are getting organised with the help of plugin like punchtab,which insists a reader to participate into the giveaway by doing some social share.This way social engagement of any blog will increase also help to drive referral traffic from social networks.

Make Money

Giveaway doesn’t mean to loose money,even you can makemoney organising giveaway.There are some sites like giveaway.ly which help publisher to get connected with advertiser to promote their product through giveaway.In return publisher get rewarded by money or one sample product.

So there are several benefits to organising a free giveaway for any blog.If we missed any benefits of free giveaway here do let us inform through your comment.

Read More

9 August 2014

WordPress for Android

WordPress for Android

In today's blogging world many blogger do prefer wordpress over blogger as an advanced blogging platform cause of it's much advanced features.So wordpress introduces another new features for wordpress  android users.Now you can easily get your wordpress blog right from your android device easily.

As wordpress has officially launched this app, you can find a lots of tutorials in there forums and websites. You can download the application from here.

 Must Read : Secure Your Wordpress

Get Wordpress On Android

  • First earch for "WordPress" in the Play Store app. It's the blue icon with the "W."
  • Next click "install" in the WordPress installation screen.
  • After that click "install" in the WordPress installation screen. Click "install" in the WordPress installation screen. Click "Open" after the app downloads to get it started.
  • Then click "accept" in the WordPress app when the license agreement appears.
  • Now click "accept" in the WordPress app when the license agreement appears. Click "accept" in the WordPress app when the license agreement appears.
  • Then click "Add blog hosted at WordPress.
  • Next again click "Add blog hosted at WordPress. Click "Add blog hosted at WordPress.com." This will let you connect your already existent Wordpress account to the app on your Android.
  • Then enter your WordPress account and password information in the boxes.
  • At last enter your WordPress account and password information in the boxes. Enter your WordPress account and password information in the boxes. Click "Save" in the bottom right to complete adding the account.

 Must Read : Add Favicon to Wordpress

That's it.Now you're all done.Hope you enjoyed the tutorial.Stay with us for more such  awesome tutorial.Thanks for visiting.
Read More

25 July 2014

6 Basic SMO Tips to Build Traffic

6 Basic SMO Tips to Build TrafficSocial Media Optimization (SMO) is a formal name for something that many brands do at least in part, even if they are not aware they are doing it. In its most basic form, SMO consists of such things as RSS feeds from your blog, a tweet button and Facebook “like” button. You should also be using such things as blog tags and optimized titles and meta descriptions to make your content “discoverable”. 

 Must Read Get Higher Google PageRank

Difference between SEO and SMO 

SEO is aimed at driving traffic to a specific website, while SMO builds a web of interactions around your content. This is done via people sharing the content on multiple social networks. Done right, SMO means people will carry your content and your message beyond your site. No one is saying that SEO is less important or becoming less so compared to SMO, but you do need to have an overall strategy which encompasses both. If your corporate blog is running on WordPress then you have tons of free plugins available to help with Social Media Optimization. With a few clicks of the mouse you can add sharing buttons to your blog and make it easier for your community members to carry your content to others but with blogger it's little hard to do the same.

SMO Tips for Traffic Building

In this article, we're going to provide some of the latest SMO tips that will guide you towards effective link building for your site.

  •  Maintain Brand Identity: You may have to add slightly different details for different profiles across the social sites, but the message should be consistent. Profiles with different brand identities will confuse the visitors and there is chance that they may ignore your site completely.
  •  Provide tools for promoting content: The essential requirement of a good blog site is the option for allowing readers to promote and share content. Latest tools like ‘Share This’ can be handy in this respect. This tool syndicates a large number of links for submission in the social media and is very easy to install. 
  • Social Bookmarking: Social bookmarking is not just about providing backlinks. If you are listed on the bookmarking site, it can also pave the way for additional traffic to your site. Popular social bookmarking sites include Del.icio.us, StumbleUpon and Digg. A great article on your site may attract hundreds of visitors to your site and there is possibility that your site may be tagged or voted by users. 
  • Produce Great Content: Like SEO, content plays a great role in SMO. Your social media content should be unique and attractive as in SEO. Long and monotonous content will drive users away from your site. On the other hand, comprehensive but short and interesting content will keep the readers engaged. Pay attention to synchronization of title with the matter. If your content is good and liked by users, they may vote or share your article, thus making way for others to visit your site.
  •  Join Google Plus: Google Plus is one of the most influential social networking sites and is preferred by users. Adding a good circle of people to your Google Plus profile can increase your links. Also indexing programs like robots and spiders monitor this site. As such, your presence in this network can also influence your Google Rank.
  •  Join diverse social networking sites: In order to diversify your Social Media Optimization efforts, your presence is a must across the popular sites. The more the network- the more is the chance for your content to be shared and voted. 

 Must Read  Trackback,Another Way To Build Traffic

The key to success in social media platform is to remain active. Sites should be updated from time to time with up-gradation of contents. New and engaging features should be added to the sites on a regular basis for greater interaction and involvement of visitors. So the social media marketing can prove to be a great link building tool for your business.

Read More