The use of computers has increased immensely these days and people use it to store every bit of data within it. This includes important business related data, emails, important scanned documents or photos. Talking about photos they are quite precious for every individual and use of digital camera have made people to store it on their computer systems, disks or drives instead of making a copy of it. However it is important to understand that these photos may get deleted or may be lost due to some error in the system and it is important that some precautionary steps are taken to save one from such loss. Some measures can be taken to protect the photos from getting deleted and procedures can be learnt to recover deleted pictures from the system.
Showing posts with label how to. Show all posts
Showing posts with label how to. Show all posts
Tuesday, 1 January 2019
Sunday, 22 December 2013
How To Get $100 Free Skype Credit Voucher For Group Video Calls
Skype has just start giving away a $108 free credit voucher codes for group video calls and many other same features for one year (2014) that are available for Skype premium subscribers. The Skype Collaboration Project Special Offer includes the following features,
After receiving email from Skype, open it >> grab the voucher code (something like SKYPE-JkLf-M***-****) >> Go to http://skype.com/go/voucher and after enter email and password paste the copied voucher code and also accept their TOS. After that click on redeem voucher or prepaid card button for instant approval. Enjoy!
Note: You can redeem your free skype voucher code anytime before 30th April 2014. And Don't forget to share this wealth with friends.
january 5 2016
- how many days until march 27 2016
- Free group Video Calls
- Free group screen sharing
- No advertising
- Live Chat customer support
How To Get Free Skype Credit Code
First of all go to https://collaboration.skype.com/promotion/. Mark check to get their future updates (optional but it may increase chances in getting voucher code), enter your email address and click on Send button in order to get the subscription confirmation email with a link to redeem $108 free voucher code. The time described by Skype to receive voucher code is two days but, sometimes they send confirmation email instantly and in many cases people complained that they didn't get any email even after two days. So, you can try your luck by submitting multiple emails based on different domains. For example syed@yahoo.com, syed@techij.com, syed@gmail.com, syedshah@gmail.com, etc.After receiving email from Skype, open it >> grab the voucher code (something like SKYPE-JkLf-M***-****) >> Go to http://skype.com/go/voucher and after enter email and password paste the copied voucher code and also accept their TOS. After that click on redeem voucher or prepaid card button for instant approval. Enjoy!
Note: You can redeem your free skype voucher code anytime before 30th April 2014. And Don't forget to share this wealth with friends.
Thursday, 19 December 2013
How To Create Awesome Twitter Header Cover In 2 Minutes
Profile header covers in Twitter can be a great opportunity to showcase your brand or identity if its customized in well manner. However brands usually don't hesitate to hire top class graphic designers to design their complete twitter profile that includes; profile background image/color, profile picture, customize link colors, and header covers. If you are interested to get know that how brands customize their twitter header covers then I already have shared header covers of top global brands in previous post.
Twitter is the most popular micro blogging platform to interact effectively with peers, fans and customers, and has approximately 600 million registered accounts around the world. An outclass designed profile header can help you to stand out from other social crowd. So, In this post I will showcase the sources from where you can easily grab the free of cost ready-made beautiful images for your profile header, online tools to create a custom twitter header and small hack to stun your profile visitors with transparent looking header images.
3 Best Places For Beautiful Twitter Cover Images
1. Twitrcovers.com is one of the most popular hub of beautiful header pictures for twitter profile with high quality of mostly 1200*600 pixels. They have a huge collection of header pictures (approximately 2000+) from various categories mainly includes; Abstract, Animals, Art, Nature, quotes, etc.. By hovering mouse on any image you may see a instant preview with profile picture and description that exactly how it will look after application. Twitrcovers allow users to set desired image on profiles directly via their app.
2. Twitterheaders.co.uk is another great source with a massive and versatile collection of some best twitter header images. Unlikely twircovers.com their pictures are not of high quality (694 X 345 pixels) and also are watermarked but interestingly with direct upload via app they also allow users to download any of picture for manual uploading. You can also hire their services for custom designs.
3. Twitterheaders.co also have a great selection of watermarked free twitter header photos, images and pictures. At the same time they also allow you to create or customize any of the photo by their free twitter cover maker. After that upload it directly on your twitter profile.
3 Best Twitter Cover Makers
All of the free online Twitter cover makers shared below offers almost similar features with slight differences. For your assistance I have added screenshots along their names so that you can easily identify which one will be more user friendly and offers any more feature according to your need. Another common thing in all of them is that they all allow; to add images from computer or from their own online collection, to enter text, scaling, and to apply color effects. The core purpose of all Twitter cover maker online services is to provide you a facility to make fully customize, beautiful and unique twitter headers photos of your own choice.
1. TopHeaderPhotos Visit
2. HeaderCover Visit
3. TwitterHeaders.co Visit
How To Make Twitter Cover Photo With Transparent Look
First of all check following picture to see exactly how a profile will look after the application of transparent header.
If you are planning to make it possible by uploading a transparent image then for your knowledge, by uploading a transparent image as cover Twitter will automatically turn it into off-white color. So, in order to achieve a transparent look as shown above you need to do little photo editing, profile settings and cleverly make a perfect combination in between profile header and profile background image.
1. First of all you need to download a desired image from internet, the bigger will be more better. The recommended new twitter background image size is 2048 X 1707 pixels. But, its not necessary to use such high resolution image, you can use of whatever size but I will recommend you to use picture of at least 1200 X 750 pixles for better results.
2. Upload your desired image as twitter profile background.
Steps: Make sign-in to twitter and click on Gear icon and from drop down select Settings. After that from left sidebar click on Design and then from Customize your own section click on Change Header button after removing existing background from same drop down button. In last Click Save Changes. Also don't forget to mark check on Center option under background position.
3. Now visit your twitter profile and take a full screenshot, you can use Print Screen button or command+shift+4 combination to take screenshot in Windows or Mac operating system, respectively.
4. After that open a new Paint application and press ctrl+v to paste it and then save screenshot either as .jpg or .png, etc.
5. Now open Photoshop or any other software that support layers. If you don't have Photoshop then I will recommend you to download Phoxo. Phoxo is free photo editing software. The best thing about Phoxo is that it is best alternative especially for beginners for light photo editing, it is user friendly and it doesn't require any special skills. Moreover its size is not more than 10 MB before and after installation. I have used Phoxo in below video because its fast and easy to use.
6. Do right click on both images (background image and profile screenshot) one by one and from options open them with Phoxo. Now copy the screenshot from phoxo by using ctrl+c and paste it in opened Background image phoxo window. The pasted screenshot will appear as 2nd layer. Now you may close the opened profile screenshot phoxo window.
7. Now from left sidebar via right click reduce opacity of the 2nd layer and set it in between 70-80.
8. Now you have to make a perfect alignment by seeing through and moving 2nd layer over layer 1. You can select Move option from left tools section.
9. After that select Select icon (first one) from tools and manually sketch a box around the header and crop it from drop down option in navigation bar.
10. Then make hidden or delete 2nd layer and save it by ctrl+s.
Checkout following video that include steps from 6-10.
Recommended: 11 Best Header Images of Most Popular Games
Now visit your twitter profile and click on Edit Profile button appears just next to tweets/followers/following counter and then click on pencil icon to upload a new header photo recently cropped and saved by you. Finally hit on Apply changes and then Press f5 to refresh page (optional) to get a look to yours own designed twitter header photo with a new transparent look. Enjoy!
Tuesday, 12 November 2013
How To Chat On Twitter With Friends Easily | Tweetalk.co
~ Tweetalk.co is a free useful application allow it users to chat with twitter friends easily and securely without leaving the twitter interface.
Twitter,
one of the most popular social networking site alternatively known as micro
blogging platform because of its limited length of tweets. Twitter is
equipped with bunch of useful features especially the limit of 140 characters
in a tweet that make message to the point and easy to understand, and these
features make twitter the effective way and most favorable platform among
brands, celebrities and professionals to interact with customers, fans and
friends, respectively. On the other hand normal users who use twitter for
general purpose and for fun find no way to make smooth chat with friends, this
is where Tweetalk.co comes in.
Tweetalk.co provides the better, fastest and more secure way to interact with your friends and followers without spoiling your profile timeline with your personal conversation.
To start chatting with twitter followers, first you must need to install Tweetalk extension from website according to your browser. Currently Tweetalk extension is available only for Google
Chrome and Mozila Firefox web browsers but they have plans to launch apps for iOS and android devices along separate option for public and private chatting.
After that open twitter in a new tab and make singin to your
account. A thin black bar will appear at browsers bottom. Click Signin button that
appears at extreme right side to start chatting with friends after app
authorization (only first time).
Recommended: How To Make Twitter Headers With A Transparent Look in 2 MinutesCriticize British Airways
Recommended: How To Make Twitter Headers With A Transparent Look in 2 MinutesCriticize British Airways
Once everything done perfectly you can see your total number of online followers in users. Click on that button to see which of your friends are available to start instant secure chatting with any of them.
Interestingly you can change your online status to Away, Busy, and Offline from applet. Moreover you can block annoying followers from
Tweetalk dashboard from whom you don’t want to chat.
In a conversation Roberto Santalla (@roobre) creator of tweetalk.co explained that only mutual followers with the application installed are shown on the contacts list and will be able to chat online.
Monday, 4 November 2013
How To Get A Custom URL For Google Plus Profile And Page
Few days back I got couple of emails in gmail from Google pointing to get a custom URL for Google plus profile and page. In an email they said
You're now eligible for a unique Google+ custom URL that lets you easily point people to your profile (no more long URLs!). Here's what we've reserved for you: google.com/+syedshah Promote this on: your website, emails or other media. Click on the Get URL button below to get started.
Yours sincerely,
The Google+ Team
Wow! for the moment this felt so great that Google selected my profiles for custom URL's. Because first custom URL's were only available for Google's employees, quite popular brands and personalities. But my less number of connections (1.9K personal profile, and around 250 circles on Techij Google plus page) made me curious because these stats are quite less in comparison to famous people and brands, respectively. But soon when I Googled this, I realized that Google has released this feature for many active users to get a custom URL for their Google plus profiles and company pages.
Monday, 28 October 2013
How To Post On All Social Media Sites At Once | Friends+Me
FriendsPlus.Me is a Paid / free web app which allow its users to repost status on multiple social networks at once. Friends+Me will be quite useful if you are interested to share your same status/news on all your social profiles and groups easily without making sign-in to all networks individually.
Sunday, 27 October 2013
44 Best Windows 8 Themes Free Download
Learn how to apply new windows 8 themes on your desktop and laptops. And pickup your favorite skins from our versatile collection of best windows 8 themes and skins for free download.
Are you get tired from seeing the same visuals in computer. If so, then there is nothing unusual in it especially for power users. And, it is a good practice to change background frequently because it helps users to feel fresh which probably also enhance your work efficiency and productivity. But only changing background of desktop doesn't work always and user wants some more customization in windows aesthetics like to make changes from mouse cursors, icons, backgrounds, folders, buttons, colors to each and every single UI elements in order to make it more comfortable for work.
Thursday, 24 October 2013
How to Secure your WiFi wireless network signals from Stealing
01:15:00
articles, best wireless router, free Wi-Fi, how to, how to steal Wi-Fi signals, secure a home WiFi network, What is WiFi router?, wi-fi, Wi-Fi hotspots free, WiFi router range, WiFi wirless password Protect
22
How you feel when suddenly receive unprotected Wi-Fi signals
or unsecured WiFi or you get reach to any other WiFi network. We just suck it his
entire internet... Yes we did our best to do such things, now a day’s internet
is so cheap and almost everybody have access to World Wide Web, but we did all
for adventurism.
In wireless network a broadband connection which can be in form of DSL, cable or satellite modem, connects with Router, which sends WiFi signals, which we call it Local Area Network (LAN). We can connect computers, laptops, printers, etc. with LAN. In Routers there is Dynamic Host Client Protocol (DHCP), which table shows that what computing devices are connected with network. Every computer device has its own Media Access Control (MAC) address. MAC address is set by manufacturers, but you can also change it. By using these addresses Routers assign Internet Protocol (IP) to every device which is connected with Routers. So for to get info about access of anybody in network MAC and IP addresses helps a lot. So if your internet connection is working slow or giving slow speed, or it finishes before limited internet volume, so it have chances that your neighbors enjoying a free internet. In this case first check that is your wireless network is secure or not.
how many days until january 12 2016
- march 20 2016
Today’s worlds which can’t be imagine living without
internet, which s some time ago is just a dream, anyway it is another story. Lets
fast forward it and comes in 2012 and talk about digital world. In past we pay
for minutes for internet access, but now it’s not. The speedup technology makes
our lives easier and technology becomes cheaper and easy to use with time. Internet
also passes through this transformation. We took start WiFi network, which is
recent advancement in digital communication. Restaurants, libraries, airports,
etc. almost everywhere you are comes out and entering into another’s WiFi
network. There is no doubt that WiFi make use of internet as simple and easy as
cell phone. But as you hear that good and bad both moving together. And unfortunately
misuse of internet settings, means entering in your network without your
permission is now a normal thing for anybody. And you know this, that’s why you
are reading this post, because you have a threat that somebody is using your
WiFi internet and you want to know about it and make sure that is your WiFi
network is secured or not.
When internet thieves who know how to steal WiFi network
signals and always are in search of free WiFi hotspots enters into your Wi-Fi connection and use your
internet without permission then your internet speed slow down. And the more
dangerous problem is that the person who is stealing your Wi-Fi signals can
also get your data from computer, and can also enter virus in it. But this is
not such a problem which hasn’t any solution. You can make safe your Wi-Fi
internet connection by following and understanding our point techniques, tricks
and information from Wi-Fi thieves.
In wireless network a broadband connection which can be in form of DSL, cable or satellite modem, connects with Router, which sends WiFi signals, which we call it Local Area Network (LAN). We can connect computers, laptops, printers, etc. with LAN. In Routers there is Dynamic Host Client Protocol (DHCP), which table shows that what computing devices are connected with network. Every computer device has its own Media Access Control (MAC) address. MAC address is set by manufacturers, but you can also change it. By using these addresses Routers assign Internet Protocol (IP) to every device which is connected with Routers. So for to get info about access of anybody in network MAC and IP addresses helps a lot. So if your internet connection is working slow or giving slow speed, or it finishes before limited internet volume, so it have chances that your neighbors enjoying a free internet. In this case first check that is your wireless network is secure or not.
After buy, during installation of wireless WiFi Router an
option of “Wireless Encryption Protocol Key (WEP Key)” comes up, basically it
is a way of securing network using password. If your network is working without
WEP Key, it means that anybody in yours Wi-Fi range can use and connect with
your network without any hurdle and can use internet. And keep in mind that
this is not comes in hacking category and me also don’t call it stealing,
because this is your default that why you not make secure your network by using
password protection for WiFi.
If your network is protected by WEP Key, then in that
condition we didn’t give a guarantee that it is 100% or fully secured and
nobody can use it without your permission. In such condition check Internet
Log, where all devices are visible which are in connect with your network,
which shows that which one is yours device and which one is not. In a similar
way you can also check data of all connected devices by visiting DHCP table of
Router. In both situations unknown and unrelated devices or internet thieves
can easily be detectable.
Nobody wants that his internet will use in any unlawful
activity, that’s why to make internet secure is very necessary. Although WEP
Key not give 100% security to network but its use is necessary. By WEP Key or
by Password protection internet or WiFi thieves which use your internet sometimes
are stoppable, but those persons who live in your WiFi range like your neighbors
not refrain from putting a pall. Then you have to take help from security
protocol like WiFi Protected Access (WPA), it is more secure, but professional
and masters IT Guru’s can also find a way to entering in network.
Assignment of DHCP manually is also a better way. For this
purpose change your Router’s DHCP setting to manual and enters address
physically into each computer or related device (like cell phone). By taking
this step only those get access to your network those have IP address of
certain serial.
And if you still not satisfied from manual DHCP setting and
want to know how to secure your Wi-Fi network then make MAC access list with
the help of Browser Interface of Router. By the way hackers can also by pass
it, but MAC and other ways of securing network make your home network safe
almost 95%. We can also trace people who have access to your network by
Internet Monitoring Software’s (IMS). Especially for those who haven’t sufficient
information of wireless security, given method are more users friendly. And more,
internet monitoring software can easily tell you that where and at what volume
your internet connection is using. In almost all routers monitoring options are
present, and in this case Router’s users guide is helpful.
The best way to safe from WiFi thieves are by OFF your SSID
of your Router. By doing this your network becomes invisible, and it is almost
impossible to reach to such Wi-Fi Network which not shows any Radar like in
WiFi search. So next time when you found any stranger near to your house or any
unknown car parked near to your house, and you have suspicion that this person
enjoying a free Wi-Fi internet connection, then this time it will not difficult
for you to detect it.
Must Read it:
Terms Use Above:
What is WiFi Router? : A device which send and emits Wi-Fi signals.
LAN: Local Area Network
DHCP: Dynamic Host Client Protocol
MAC: Media Access Control
IP: Internet Protocol
WEP Key: Wireless Encryption Protocol Key
What is Internet Log? : Where all connected devices are visible
WPA: WiFi Protected Access are Visible
IMS: Internet Monitoring Software
Must Read it:
Is Stealing of Wi-Fi Signals is Crime?
Terms Use Above:
What is WiFi Router? : A device which send and emits Wi-Fi signals.
LAN: Local Area Network
DHCP: Dynamic Host Client Protocol
MAC: Media Access Control
IP: Internet Protocol
WEP Key: Wireless Encryption Protocol Key
What is Internet Log? : Where all connected devices are visible
WPA: WiFi Protected Access are Visible
IMS: Internet Monitoring Software
Monday, 21 October 2013
Best Android Secret Codes List
Android is an open source Linux based operating system and potentially the android phones are the most common and popular phones because, worldwide they have approximately 75 percent of share in smartphones market. But the thing which is uncommon to most android phone users is the secret codes.
In an Android phone secret codes can be used for various purposes like to get instant access to settings, to test and in order to get technical specs and other useful details about your device hardware's and software's.
Well there is one thing which I would like to make clear before sharing some common and uncommon, visible and hidden secret codes for Android phones that, The following list includes many of the secret codes that can make unrecoverable changes to your device settings and data. So, please be fully aware before applying any of your android phone tricks.
Friday, 18 October 2013
How To Send Voice Messages On Facebook
In January 2013's first week Facebook released new option for mobile users to send voice messages to Facebook friends via chat. By this feature Android and iOS users can instantly record their voice messages of length of up-to 1 minute and can send it to friends when you have more to say or to show your expressions.
Sunday, 6 October 2013
How To Add Mobile Frames To Screenshots and Photos
Frequently I share tips, tricks, games, useful applications and other useful stuff related to mobiles under How-To category in this blog. So, in such reviews and tutorials I often include screenshots (sometimes after modifications) for better understanding where I feel them necessary. But yesterday I got a message on Techij Facebook page in which someone asked a question about my recent post 13 Best Minimalist Wallpapers for iPhone 5’s. In a message he asked that is the first image in mentioned post is real or did I make it via Photoshop or any other software. Then I replied No, neither it is real nor it is Photoshop, I used online tools to add iPhone frames on pictures.
Tuesday, 1 October 2013
Facebook Allows To Search Post and Status Updates Via Graph Search
Via newsroom in a week Facebook announced another feature related to posts is that now you can search status updates or posts from graph search. In order to make a refine search you must need to enter a additional words along your desired keywords in Facebook graph search to find status updates, posts, check-ins, comments and all things which are available publicly.
Wednesday, 25 September 2013
Friday, 20 September 2013
Pay With A Tweet | An Interesting Social Media Tool
Use of Gmail to send money makes some sense but Pay with a Tweet is incomprehensible that, how it is possible to pay via tweet? Actually Pay With A Tweet is not a medium to send or receive payments, rather it is something like social download locker.
Sunday, 15 September 2013
How To Get Someones Twitter Header and Background Images
From long time Twitter users can customize their profiles as they desire by use of beautiful headers, by link color customization and by use of cool background images. You can get your desired twitter headers and background wallpapers from various online resources absolutely free. But, sometimes someones gorgeous twitter header or wallpapers make you stunned. You just want to grab it without wasting time to search it online. But unfortunately you can't get option to save image as in your machine, even you can't search image by use of Chromes 30 search by image feature. But, there is a trick by which you can get twitter header or background image of any twitter user in seconds. Follow the following simple tutorial to get know how is it possible.
Saturday, 14 September 2013
A Free Twitter Fake Followers Checker
One of the interesting facts about twitter is that there are almost more than 20,000,000 fake twitter accounts, which becomes roughly 4% of total twitter accounts. So, fake twitter accounts are not created just to slow down the Twitter's server. Obviously these fake twitter accounts are created by bots, owned and used by some so called SMM (Social Media Marketers) to increase number of followers of their clients. Well there are also couple of online services to increase fake followers on principle of give and take.
3 Best Tools To Convert Text To ASCII Art
ASCII Art is a digital art, in which numbers, alphabets, and symbols are use exquisitely to form a beautiful graphics. In early days people create ASCII art manually and use it for different purposes including to show their talent or to impress someone especial. And perhaps you have seen ASCII art as Text or Images on various profiles on social networks. I have also created a one for +Techij and you can see it live right now in web source (Ctrl + u). Now the good thing is that you can create cool ASCII art in seconds online from your desired text and image.
Thursday, 12 September 2013
Wednesday, 11 September 2013
How To Automatically share blog post on google plus page
Google just released a new feature for blogger users to share blog posts automatically to Google+ profile. This auto sharing feature will definitely save your time by skipping extra manual steps of populating the sharebox after publishing blog post.
Recommended: How To Embed Google+ Post in Blog Wesbsite
The good thing about this auto sharing feature is that you don't need to follow dozen of steps or install scripts in your blogger blog to enable it. Instead of it you just have to mark a check on Automatically share after posting under Google+ tab from sidebar. Simply remove marked check to disable this feature in order to revert back to old manual prompt sharing box after publishing post.
Tuesday, 10 September 2013
How To Embed Google Plus Post In Blog Website
After facebook Now Google also released a new feature to embed Google plus posts in to blog post. So, from now you can integrate any publicly available Google plus post directly into your blog / website in order to share it with your friends.
Subscribe to:
Posts (Atom)
Shopping Cart
Shopping Cart Order Form
(*) are required fields.