15 Microsoft Windows 10 Tricks, best Tips & Tweaks

15 Microsoft Windows 10 Tricks, best Tips  & Tweaks

Microsoft’s new product, Windows 10 promises to be one of the best OS in the market right now. Honestly speaking, you can use Windows 10 without knowing these Tips & Tricks. But it will be more fun and much easier if you know these easy to use Trick & Tweaks. So, here we have listed 15 Windows 10 Tricks that you can use on a daily basis and I am sure it will save you a lot of time working on your PC.


Microsoft announces new and enhanced features for Microsoft Azure

Microsoft announces new and enhanced features for Microsoft Azure

What is Microsoft Azure?
As per the Wikipedia website, Microsoft Azure is a cloud computing platform and infrastructure, created by Microsoft, for building, deploying and managing applications and services through a global network of Microsoft-managed and Microsoft partner hosted datacenters.


How to Use Downloaded Mac Updates on Multiple Computers

How to Use Downloaded Mac Updates on Multiple Computers

If you are using Macs, then you probably know how hard it is to download updates for your Macs. Now, if you are using multiple Macs, then it surely is a headache. Mac updates and installers are generally huge in size. Let alone Mac OS, even Mac Application update files are big too.

If you have multiple Mac machines and you want to update it all. You have to download 4-5gb of data for each of your Macs and get it installed. There’s an easy way to download the update on a single Mac machine and get it install on multiple Macs.

You will surely like to use this method as downloading this huge data and getting it installed is time consuming and it also consumes your monthly bandwidth.

When you download any updates from Mac’s App Store, your machine restarts and the updates are installed. Now, to save disk space, Mac actually delete these update files from your machine automatically. These updates cannot be re-used.

As per the Apple’s Website, Apps (downloaded) from the Mac App Store may be used on any Macs that you own or control for your personal use. But still, once updated, these update files are no longer kept. So, the simple and obvious workaround for this scenario will be to copy these update files to another location before it is applied. To get this done, obviously, we will need the downloaded file location, right?

So, what are these files and where are these files?

Minor update releases that can be downloaded from Apple Support Website are standalone files with the .dmg file extension. These files can be found in the Applications [or /Users/username/Applications] folder on your Mac. You just have to copy these files from there to any other location of your choice.

Updates downloaded from the Apple Mac Store have the file extension .app. These files are also found in your Applications Folder only.

Now what about updates which are automatic? These update files are not downloaded in you Applications Folder. These files have file extension .pkg. These files can be found in a separate hidden folder. To find this folder follow the steps mentioned below –

  • Open Terminal on your Mac.
  • Run the command – defaults write com.apple.appstore ShowDebugMenu -bool true
  • Open the Mac App Store.
  • There you will find a new Debug Menu.
  • Click the Show Download Folder menu.

This will open the downloaded location of the update files with the .pkg file extension. These files are temporarily downloaded here and are deleted once the updates are applied. You can easily copy these .pkg or package files to another mac system and get it updated. You can use Airdrop or your Wi-Fi or any other mean that’s available to you to copy these files.

We learned today how to download updates for Macintosh OS and Applications on a single Mac and get it installed on multiple machines. Just remember, copy the update files or installer packages to another location [maybe to your download folder or wherever you may find suitable] before re-starting your mac.


I tried to be as elaborate as possible but if I, however skipped anything, you people are most welcome to comment below.

Microsoft says, no free Windows 10 for pirates, beta tester

Microsoft says, no free Windows 10 for pirates, beta tester

Microsoft announced that there will be no free Windows 10 for pirates, beta tester

Microsoft again backtracked on who’ll get Windows 10 for free and who won’t.

On Friday, it announced that any user who is registered with Microsoft’s Insiders Beta Version of Windows 10 will get a free version of it. Later, the blog post was updated informing users that only people upgrading from Windows 7 and 8 will get a free upgrade.

Some of the points we get from the blog post:
  • If you are running genuine Windows 7 or Windows 8.1: You’ll get a free upgrade to Windows 10’s final release when it comes out on July 29th.
  • If you are running Windows 10 Insider Preview: You’ll be able to use the Insider version even after Windows 10 releases and keep getting newer versions of Windows before they are officially released. The catch, however, is that you’ll be a perpetual beta-tester.
  • If you are running Windows XP or Vista: No full version of Windows 10 for you, you’ll have to buy the upgrade.
  • If you are running a pirated copy of Windows 7 or Windows 8.1: You’re out of luck, you’ll have to dish out cash to get the full version of Windows 10.

Facebook working with Kaspersky to improve the online security of its users

Facebook working with Kaspersky to improve the online security of its users

Facebook working with Kaspersky, F-Secure, ESET and Trend Micro to detect and clean the malware from its user’s machine.

Facebook announced today that its working with Kaspersky and other security firms like ESET, F-Secure and Trend Micro to detect and remove malware from Facebook users’ computers.

Trevor Pottinger, a Facebook security engineer said:
Thanks to the collaboration with these companies, in the past three months we have helped clean up more than two million people’s computers that we detected were infected with malware when they connected to Facebook.

In these cases, we present a cleanup tool that runs in the background while you continue using Facebook, and you get a notification when the scan is done to show you what it found.

The program uses a combination of signals to help find infections and get the malware off of your computer for good, even if the malware isn’t actively spreading spam or harmful links.

Kaspersky Lab’s Kate Kochetkova said in a separate blog post:
Facebook is a major aim for phishers: one in five phishing scams targets Facebook notifications. So be vigilant when you receive emails appearing to be from Facebook: as they can be fake. There are lots of Trojans targeting Facebook users as well.

Fraudster may also use Facebook to like weird things and promote questionable goods and services on your behalf.

Google Admin Console has a Security Flaw

Google Admin Console has a Security Flaw

Summary: Google Admin Console has a Security Flaw which can be used by attackers to claim domains and send out spoof emails.

As reported by Security Week, Patrik Fehrenbach and Behrouz Sadeghipour found a security flaw in Google Admin Console to gain temporary ownership of any domain. Google Admin Console is actually a web platform from where administrators manage their organization’s Google Apps account.

Researchers conducted some tests by claiming ytimg.com, which is used to host Youtube images and scripts, and gstatic.com, which is used by Google for loading content from its content delivery network (CDN). These two domain are owned by Google itself.

The researchers then used these domains to create users – admin@ytimg.com & admin@gstatic.com to send out mails.

The researchers explained in the blog post:

Last month, we were able to report a vulnerability to Google where we were able to email from any domain that has not been claimed by its owner previously. For example, using google itself as a victim, we were able to claim domains such as ytimg.com and gstatic.com.

So not only we are claiming other domains, we were successfully able to trick the Google Mail Server into accepting a wrong FROM parameter. Google patched this vulnerability by simply with applying a FROM no-reply@google.com

Google has addressed this vulnerability and the researchers have been awarded $500 for their efforts. Earlier too, other researchers identified even more serious vulnerabilities in the Google Apps Admin console. A researcher was reportedly awarded $5000 from Google after discovering Critical Cross-Site Scripting (XSS) vulnerability in the Admin Console in January.

Both Google & Apple are expected to release fixes for the FREAK Security Vulnerability, a legacy Secure Sockets Layer (SSL) and Transport Layer Security (TLS) security flaw which allows hackers to launch SSL Man-in-the-Middle (MITM) attacks.

Free tools to recover Windows Password

Free tools to recover Windows Password

Ever happened that you forgot your Windows Login Password? Or, for some reason, Windows not allowing you to login to your system? There may be many more reasons to login to a system but you you don’t know the passsword?

How to crack Windows Login Passwords? Below, I have mentioned some free tools to recover Windows Password? These tools work with Microsoft Windows 8, Microsoft Windows 7, Microsoft Windows Vista & Microsoft Windows XP.

  1. Ophcrack
    The Ophcrack is a free tool to crack or recover Windows Password. It comes with GUI support and is very easy to use. You just have to download the Ophcrack ISO Image, burn it to CD/DVD or Flash Drive and boot your computer from it.

    The Ophcrack program starts, detects the Windows Installation, locates the Windows User Accounts and recover the Windows Password.

    It works fine with Windows 8, Windows 7, Windows Vista and Windows XP.

  2. Offline NT Password & Registry Editor
    Offline NT Password & Registry Editor is a utility to reset the password of any user that has a valid local account on your Windows system. Supports all Windows from NT3.5 to Win8.1, also 64 bit and also the Server versions (like 2003, 2008, 2012).

    How to use?

    1. First download the ISO Image and burn it to CD/DVD or a flash drive.
    2. Get the machine to boot from the CD or USB drive.
    3. Load drivers (usually automatic, but possible to run manual select)
    4. Disk select, tell which disk contains the Windows system. Optionally you will have to load drivers.
    5. PATH select, where on the disk is the system? (now usually automatic)
    6. File select, which parts of registry to load, based on what you want to do.
    7. Password reset or other registry edit.
    8. Write back to disk (you will be asked)
  3. Trinity Rescue Kit
    Trinity Rescue Kit, as the name suggests is a collection of many small & useful utilities which a System Administrator can use for diagnosis and troubleshooting purposes. Password Recovery is one of the many features it offers.
    Using Trinity Rescue Kit, you can clear the password entirely making it blank or you can set a new custom password. Although it does not provide a Graphical User Interface but its very easy to use if you follow the instructions properly.
    Just download the Trinity Rescue Kit ISO file and burn it to a CD/DVD or a flash drive and boot your computer from it. Trinity Rescue works with Windows XP, Windows Vista, Windows 7 and Windows 8.

Lenovo installing Adware – Superfish – on new Computers and Laptops

Lenovo installing Adware – Superfish – on new Computers and Laptops

Lenovo installing adware

Lenovo has been installing an adware named Superfish onto new computers. The adware gets installed automatically when the computer is started for the first time. The adware injects third-party ads on Google searches and websites without the user’s permission.

Facebook Legacy Contact – Facebook is including an alternate option for its users which they can choose before they die

Facebook Legacy Contact – Facebook is including an alternate option for its users which they can choose before they die

Facebook is accommodating its customers control over what happens to their Facebook accounts when they pass away.

Until now, Facebook allowed people to change the profiles of their loved one into “memorialized” accounts after Facebook affirms that individual has passed on, meaning that the record could be seen however not be administered or modified. But Facebook is right now including an alternate option for its users which they can choose before they die: ‘Legacy Contact’.

Facebook Team wrote in a blog post –
Today we’re introducing a new feature that lets people choose a legacy contact—a family member or friend who can manage their account when they pass away. Once someone lets us know that a person has passed away, we will memorialize the account and the legacy contact will be able to:

  • Write a post to display at the top of the memorialized Timeline (for example, to announce a memorial service or share a special message)
  • Respond to new friend requests from family members and friends who were not yet connected on Facebook
  • Update the profile picture and cover photo

The blog post can be found here.

Facebook reported this new feature on Thursday that allows Facebook users to allocate a specific friend as User’s Facebook Legacy Contact who will be allowed to access the account and pin a post on their Timeline after they die.

How to chose a Legacy Contact?

  1. Open the Settings.
  2. Choose Security and then Legacy Contact at the bottom of the page.
  3. After choosing your Legacy Contact, you will have the option to send a message to that person.
  4. You may give your legacy contact permission to download an archive of the posts, photos and profile info you’ve shared on Facebook.

Of course, users can similarly let Facebook know in the matter of whether they’d like to have their account deleted after they pass away.

Facebook is showing Legacy Contacts alternative in the US first but plans to expand this change to more countries. Setting up a legacy contact is completely optional.

Microsoft patches 15-year old Vulnerability – JASBUG

Microsoft patches 15-year old Vulnerability – JASBUG

Microsoft recently issued a basic patch to settle a 15-year-old defenselessness that could be abused by programmers to remotely seize clients’ PCs running all backed forms of Windows working framework.

The basic defenselessness — named “JASBUG” by the specialist who reported the imperfection — is because of a defect in the key configuration of Windows that took Microsoft more than 12 months to discharge a fix. In any case, the defect is still unpatched in Windows Server 2003, leaving the adaptation totally open to the programmers for the staying five months.