RSSComputers / Programming / Mobiles (77)

05-11-2019 Alert - Before you sell or give phone to repair shop or for warranty claim. Your personal data can be recovered.
28-08-2019 Beware of phishing links, messages, Mobile apps and games.
06-10-2018 From wireframe to HTML, Design to Code - AI Power Sample
02-12-2016 MySql unicode - Arabic characters in Table columns
11-08-2016 Write arabic script shortcut, presentation in MsOffice and HTML
21-06-2014 Meet the Pakistani who is reinventing the Internet. Well kind of...
19-02-2014 Collection of e-Books and Articles on Microsoft Technologies
26-03-2013 Restore SharePoint backup from earlier to later version - Your backup is from a different version of Microsoft SharePoint Foundation and cannot be restored to a server running the current version
21-12-2012 Air bags for electronics devices
08-11-2012 Recursive Query Parent Child Concatenation
25-04-2012 Change or remove filter / filter content from Sharepoint list / library view columns
23-02-2012 Pakistani IT experts win international cyber drill
26-12-2011 Installing XP on computer with SATA hard drive
20-04-2011 Sigin as different user in asp.net using Windows authentication
26-01-2011 Powershell CmdLets
30-05-2010 Update Statistics - Query to find tables and index number of statistics being old
15-04-2010 Detail Error Message for ASP.NET at Web Hosting / Production server
15-03-2010 Passing encrypted data between JavaScript and C#
12-02-2010 Sharepoint - SPWeb.Groups Vs SPWeb.SiteGroups
28-01-2010 Accessing JD Edwards Data on iSeries or AS/400 from a ASP.NET / SQL Encoding / Error problem
28-01-2010 Controls not functional after Export to Excel or Export to PDF of Telerik in Sharepoint Application page
05-10-2009 ASP.NET Cannot open log for source {0}. You may not have write access. - Access is denied
03-09-2009 Turn off Reading pane / Auto Preview for all folders in Outlook
28-08-2009 CRM - The SELECT permission was denied on the object 'BuildVersion', database 'MicrosoftCRM_MSCRM', schema 'dbo'
25-08-2009 CRM - No authority could be contacted for authentication (Report Server)
22-08-2009 CRM - Retrieve Cultures information from CRM into your Custom Web Application
21-08-2009 CRM - Globalization / Localization in Custom Web Application
19-08-2009 CRM - Do you want to save this file? Blank.aspx?
18-08-2009 CRM Exception - Microsoft.Crm Application.Platform.Report. InternalCreate(String xml)
18-08-2009 CRM Exception - Microsoft.Crm.Reporting SRSReport.convertDataSource()
03-08-2009 Locale ID (LCID) Chart
24-06-2009 Oracle SQL Developer - Unable to create an instance of the Java Virtual Machine
17-06-2009 Busy at work
17-06-2009 Boss Menu
10-04-2009 Facebook Privacy Setting - Applications
18-03-2009 For a Software House
27-01-2009 Clock ticking on worm attack code
27-01-2009 Detecting Idle time or Inactivity in Windows Forms
27-01-2009 Values of Windows API
23-01-2009 PasswordChar and Set focus on page load for ToolStripTextBox
21-01-2009 Capture Form Close Event
21-01-2009 Richtextbox or multiline textbox and AcceptButton to handle Enter or Tab key press
21-01-2009 Key Combination shortcuts in C# Windows Form
01-01-2009 Application Architecture Guide 2 patterns and practices
01-01-2009 Convert string to hexadecimal and hexadecimal to string
31-12-2008 Implementing Transaction in Stored Procedure
31-12-2008 Implementing Transaction in .NET
25-12-2008 Linux environment in Windows
11-12-2008 Facebook Privacy Setting
27-11-2008 Pakistani group hacks Indian websites - Cyber Attack
26-10-2008 Designations...funny!
16-10-2008 Securing Your ASP.NET Web Applications
15-10-2008 Software blocks car phone users
07-10-2008 Too much in technology!
14-09-2008 Logo Evolution
13-09-2008 Difference between .NET 2.0/3.0/3.5
03-09-2008 Google launches internet browser
27-08-2008 Excel Shortcuts
16-07-2008 Quantum information technology - Enigma variations
04-07-2008 Dead Lock - Boss and Secratory
04-07-2008 Web Service Security using SOAP Extension
24-06-2008 General Web Security Consideration
24-06-2008 ASP.NET Forms Authentication
20-06-2008 Find rowcount, columncount, table size in Sql Server Database
20-06-2008 Developers
19-06-2008 Windows Shortcuts
18-06-2008 Number of Microsoft Certified Professionals Worldwide
16-06-2008 Types of developers
22-05-2008 documentary on Google
12-05-2008 Moonlight (Silverlight for Linux)
24-04-2008 Take Advantage of ASP.NET Built-in Features to Fend Off Web Attacks
01-04-2008 Health, Calculator , Units Conversion All in One. Very useful to all
28-02-2008 General Motors vs. Bill Gates
16-02-2008 Stealth Deployment
14-02-2008 Resignation letter of a Software Employee
12-02-2008 Development
05-05-2007 Knowledge
Tue 5 Nov 2019

Think zillions of times before you sell your phone or give your phone to any repair shop or even to any elite trustable customer service. They can get your data recover even after you have done factory reset and delete your data.

Secrets

Our smartphones are privy to some of our most important secrets. Sensitive business emails, financial details, contact information, and perhaps even very personal photos (first what are such stuff doing on your phone) are not things you want falling into the wrong hands.

Remember

Performing a factory reset nothing more than just a good idea. It certainly not enough that data has been removed.

Remember your data including your personal photos, Google searches, emails, text messages, and contact details can be recovered even after you factory reset, as your data is still not overwritten.

What to do

Follow below four steps to wipe your Android phone, to make sure data is properly gone. (Similar steps can be followed for iPhone)

Step 1: Encrypt your data

The first step is to encrypt your data (If it is not already encrypted or using old Android versions). This option is available built into Android (may not enabled by default). Encryption requires you to enter a PIN or password every time you turn your phone on.

  • Fully charge your phone or keep it plugged into the charger while this process is running, because it can take several hours depending on how much data you have.

    Note: The exact method may be differ slightly from phone to phone, however it will generally be like below

  • Go to Settings > Security > Encrypt phone.

  • Or Go to Settings > Security & location > Advanced > Encryption & credentials and select “Encrypt Phone”

  • Or on Samsung Galaxy, Go to Settings > Lock screen & security > Protect encrypted data

Step 2: Factory Reset

Make sure you have already setup your new phone or that you have anything you want to keep backed up before you do this because it will wipe everything. Once phone has reset, there’s no going easy back. The steps are similar for most Android devices, but some manufacturers like to be different.

  • Go to Settings > Select System > Advanced > Reset options > Select “Reset phone.”

    Note: If you have a PIN or some other security setup, you’ll be asked to enter it. You’ll get another screen asking if you’re sure this is what you want to do. Are you sure? Then hit the “Erase everything” button.

  • Or On a Samsung Galaxy, Go to Settings > General Management > Reset > Factory data reset and then tap Reset device.

  • Or On a Huawei phone, go to Settings > System > Reset > Factory data reset and then tap Reset Phone.

  • Or On a Google Pixel, it’s Settings > System > Advanced > Reset options > Erase all data (factory reset) and then tap Reset phone.

Step 3: Overwriting with junk data

Now final step is to be absolutely certain, by overwriting the encrypted data with junk data and then perform another last factory reset as done in step 2.

  • Simply load a bunch of dummy data onto your phone until the storage is full. A few large movies videos should do the trick.

  • Or Open your camera and keep recording video for hours long (like record open sky or charming birds or beautiful garden) till storage full.

  • Or you can also get an app to do it for you. Install any of these or similar app from Play Store, such as Secure Erase with iShredder 6 or Shreddit.  

Note: Do not use your personal Gmail / Google account, instead create new dummy temporary google account to download these app to overwrite storage, as by using or connecting your actual google account you may accidentally restore data back again on device from Google drive.


Step 4: Final Factory Reset

Once above three steps completed and the data is overwritten by these app or video camera recording or you fill up storage with movies, perform another last factory reset as done in step 2. That’s how you completely wipe your Android phone.


Note: Never sell your SD Cards and Hard Drives, break into pieces and throw it away in garbage, even if they are not working or dead.

Comments here
Likes    Dislikes (1)   
Wed 28 Aug 2019

Scammers, Hackers and Fraudulent are sending emails and messages over social media like WhatsApp, twitter or Facebook to people saying that they are eligible for tax refunds or other similar lucrative. The email asks the user to click a link and get their sums.

Further to that they ask user to login to the system where naive user use their banks or email or social accounts or financials credentials which promptly give hackers and fraudulent access to their information and accounts.

Once the user clicks on the phishing link, it takes them to a website that has similar look and feel that looks like promising and authentic. However, if you look closely, the URL of the website gives it away as it says.

  • Do not click on such links and be vigilant and look for URL and SSL certificate (locked / green).
  • Do not install Mobile apps and games without looking into permissions what they asks as they would ultimately gets access to mobile and data.
  • Be vigilante in giving permission to Mobile apps.
  • Be aware of using proxy servers, free Wi-Fi and VPN servers.
  • Never share personal Information, PIN numbers, OTP, passwords or Credit or Debit cards number or CCV code, banks, other financial accounts numbers, NTN etc.
See below one sample and informative video

گھوٹالے کرنے والے ، ہیکر اور دھوکہ دہی کرنے والے عام  لوگوں کو ای میل یا سوشل میڈیا واٹس ایپ ، ٹویٹر یا فیس بک پر پیغامات بھیج رہے ہیں کہ وہ ٹیکس کی واپسی یا اسی طرح کے دوسرے منافع یا رقم کی وصولی کے اہل ہیں۔ ای میل میں صارف سے کہا جاتا ہے کہ وہ کسی لنک پر کلک کریں اور ان کی رقم وصول کریں۔

اس کے علاوہ وہ صارف سے اس ویب سائٹ یا موبائل ایپلیکیشن میں لاگ ان ہونے کو کہتے ہیں جہاں صارف اپنے بینکوں یا ای میل یا معاشی اکاؤنٹس یا پاس ورڈ کا استعمال کرتے ہیں جو ہیکرز کو ان کی معلومات اور اکاؤنٹس میں فورا رسائی فراہم کر دیتا ہے ۔

ایک بار جب صارف فشینگ لنک پر کلیک کرتا ہے تو ، وہ لنک انہیں ایک ایسی ویب سائٹ پر لے جاتا ہے جو بلکل اصل ویب سائٹ  کی طرح نظر آتی ہے تاہم ، اگر آپ قریب سے دیکھیں تو ، ویب سائٹ کا یو آر ایل دوسرا ہوتا ہے اصل نہیں ۔

  • ایسے لنکس پر کلک نہ کریں اور چوکس رہیں اور یو آر ایل اور ایس ایس ایل سرٹیفکیٹ (لاک سائن / سبز رنگ) دیکھ لیں۔
  • موبائل ایپلیکیشن اور گیمس انسٹال نہ کریں ان کی permissions پر غور کیے بغیر کیوں کہ ایسا کرنے سے آخر کار انہیں آپ کے موبائل اور ڈیٹا تک رسائی حاصل ہوجاتی ہے۔
  • موبائل ایپس کو اجازت دینے میں چوکس رہیں۔
  • پراکسی سرورز ، مفت وائی فائی اور وی پی این سرورز کے استعمال سے محتاط رہیں۔
  • ذاتی معلومات ، پن نمبر ، او ٹی پی ، پاس ورڈز یا کریڈٹ یا ڈیبٹ کارڈ نمبر یا سی سی وی کوڈ ، بینک ، دوسرے مالی اکاؤنٹس نمبر ، این ٹی این وغیرہ کبھی بھی شیئر نہ کریں۔

ایک نمونہ اور معلوماتی ویڈیو نیچے دیکھیں۔

 

Beaware+-+physhing+email+link+example+1.jpg


Beaware+-+physhing+email+link+example+2.jpg

Comments here
Sat 6 Oct 2018

Comments here
Fri 2 Dec 2016

 

Just in case if Arabic characters appearing as ????? in your column and if you are using MySql DB along with .NET Provider, 

Check below properties of schema, table and column and connectionstring that use to connect to DB

  1. DEFAULT_CHARACTER_SET_NAME = utf8
  2. DEFAULT_COLLATION_NAME = utf8_general_ci
  3. TABLE_COLLATION = utf8_general_ci
  4. COLLATION_NAME = utf8_general_ci
  5. CHARACTER_SET_NAME = utf8
  6. .NET Connection string set to have = 'charset=utf8'

 

Connection string example

'datasource=<server>;port=3306;username=<userid>;password=<password>;sslmode=none;database=<dbname>;charset=utf8'

 

Queries that may help to find above information are 

SELECT * FROM information_schema.SCHEMATA S

WHERE schema_name = "<database-name>";

 

SELECT * FROM information_schema.`TABLES` T,

information_schema.`COLLATION_CHARACTER_SET_APPLICABILITY` CCSA

WHERE CCSA.collation_name = T.table_collation

AND T.table_schema = "<database-name>"

AND T.table_name = "<table-name>";

  

SELECT * FROM information_schema.`COLUMNS` C

WHERE table_schema = "<database-name>"

AND table_name = "<table-name>"

AND column_name = "<column-name>";

 

Comments here
Thu 11 Aug 2016

To write arabic unicode script in MsOffice using shortcut, type fdfa then press alt+x, it will convert into its respective unicode

To write in HTML, type &#xfdfa;  it will render it as respective unicode.

It may be require to increase the font to make it more readable

Below are some examples

fdfa Alt+x صلى الله عليه وسلم

Fdf2 Alt+x الله

Fdf3 Alt+x اكبر

Fdf4 Alt+x محمد

Fdf5 Alt+x صلعم

Fdf6 Alt+x رسول

Fdf7 Alt+x عليه

Fdf8 Alt+x وسلم

Fdf9 Alt+x صلى 

 

Below URL to list all unicodes

www.unicode.org/charts/PDF/Unicode-3.1/U31-FB50.pdf

 

Comments here
Sat 21 Jun 2014

On Wednesday, Facebook announced “Wedge”. For layman, think of it as a crucial hardware device that transports Internet information between machines (like a networking switch).

What you don’t know is that Wedge is part of the Open Compute Project (OCP) which is being led by Najam Ahmad, the director of Technical Operations at Facebook. Najam, who was born in Karachi, Pakistan, holds a degree in Electrical Engineering from NED University of Engineering and Technology and later on went to do his Master of Science in Telecommunication Protocols and Computer Science from The George Washington University and prior to Facebook, Najam was the General Manager of Global Networking Services at Microsoft where he looked after the operations, overall architecture, design & implementation of Microsoft’s global online network.

Reinventing+the+wheel.jpg

This basically means that Facebook (and other companies who support the OCP) will be able to use and contribute to the open hardware design of these switches and this is bad news for vendors like HP, Dell and Cisco who basically have the monopoly over the $150 billion data center hardware market.

Najam’s role in this whole project, though limited, gives us hope and motivation as there are still hundreds and thousands of engineers here in Pakistan who dream of going to the Silicon Valley and making an impact that can change the world and now they have someone to look up to.

Source:linkedin.com/today/post/article/20140620191201-40259989-meet-the-pakistani-who-is-reinventing-the-internet-well-kind-of

Comments here
Wed 19 Feb 2014

I have came through below wiki article on Microsoft technet, which have a nice collection of eBooks and articles on Microsoft Technologies.

Download content for SharePoint, Lync, MS Office, SQL Server, System Center, Visual Studio, Web Development (asp.net), Windows Server, Window Azure, Windows Phone and other Microsoft technologies in e-book formats (references, guide, and step-by-step).

 

E-Book Gallery for Microsoft Technologies

 

Source: social.technet.microsoft.com/wiki/contents/articles/11608.e-book-gallery-for-microsoft-technologies.aspx (Monica Rush)
Source: mstechtalk.com/collection-of-e-book-and-articles-on-microsoft-technologies/ (Adnan Amin)

 

Comments here