Saturday, October 22, 2016

The 10 Important URLs That Every Google User Should Know

What does Google know about the places you’ve visited recently? What are your interests as determined by Google? Where does Google keep a list of every word that you’ve ever typed in the search box? Where can you get a list of Google ads that were of interest to you?

The 10 Important Google Links

Google stores everything privately and here are the 10 important links (URLs) that will unlock everything Google knows about you. They are hidden somewhere deep inside your Google Account dashboard and they may reveal interesting details about you that are otherwise only known to Google. Let’s dive in.

1. Google stores a list of usernames and passwords that you have typed in Google Chrome or Android for logging into various websites. They even have a website too where you can view all these passwords in plain text.

2. Google creates a profile of yourself based on the sites you visit, guessing your age, gender and interests and then use this data to serve you more relevant ads. Use this URL to know how Google sees you on the web.

3. You can easily export all your data out of the Google ecosystem. You can download your Google Photos, contacts, Gmail messages and even your YouTube videos. Head over the the Takeout page to grab the download links.

4. If you ever find your content appearing on another website, you can raise a DMCA complaint with Google against that site to get the content removed. Google has a simple wizard to help you claim content and the tool can also be used to remove websites from Google search results that are scraping your content.

5. Your Android phone or the Google Maps app on your iPhone is silently reporting your location and velocity (are you moving and if yes, how fast are you moving) back to Google servers. You can find the entire location history on the Google Maps website and you also have the option to export this data as KML files that can be viewed inside Google Earth or even Google Drive.

6. Create a new Google Account using your existing email address. The regular sign-up process uses your address as your Google account username but with this special URL, you can use any other email address as your username.

7. Google and YouTube record every search term that you’ve ever typed or spoken into their search boxes. They keep a log of every Google ad that you have clicked on various websites, every YouTube video you’ve watched and, if you are a Google Now user, you can also see a log of all your audio search queries. OK Google. (Google searches) (Voice searches) (YouTube searches and watched videos)

8. You need to login to your Gmail account at least once every 9 months else Google may terminate your account according to their program policies. This can be an issue if you have multiple Gmail accounts so as a workaround, you can setup your main Gmail account as the trusted contact for your secondary accounts. Thus Google will keep sending you reminders every few months to login to your other accounts.

9. Worried that someone else is using your Google account or it could be hacked? Open the activity report to see a log of every device that has recently connected into your Google account. You’ll also get to know the I.P. Addresses and the approximate geographic location. Unfortunately, you can’t remotely log out of a Google session.

10. Can’t locate your mobile phone? You can use the Google Device Manager to find your phone provided it is switched on and connected to the Internet. You can ring the device, see the location or even erase the phone content remotely. You can even find the IMEI Number of the lost phone from your Google Account.

Sunday, August 14, 2016

World’s First Underwater Floating Tunnel : Norway

The world’s first floating submerged tunnel system is set to be built in Norway, in a $25 billion infrastructure project that aims to significantly reduce the amount of time it takes to travel across the country.

The route from the southern city of Kristiansand to Trondheim in the north, takes an average driver 21 hours to complete. A total of seven fjords cut into the route. As a result, travelers are forced to take ferries across the wide waterways.

However, if Norway’s Public Roads Administration (NPRA) successfully completes the project, the journey is expected to shorten to just over 10 hours. “This idea of Norway’s is sort of an intermediate technology of things that have been done before,” says Henry Petroski, a Duke University civil engineer who specializes in bridges. The world’s first floating submerged tunnel system about 30 meters (100ft) underwater. The underwater tunnels are said to be the most practical solution to the issue, as many of the waterways are too wide – with the largest being nearly a mile deep – for a typical bridge.

The tunnel system itself will be made up of two 1,200 meter (4,000ft) curved concrete tubes, floating up to 30 meters (100ft) below the surface. The tubes will be held up by pontoons on the surface, while connecting trusses keep them stable. In an effort to provide the tube with extra stability, the structure might also be bolted to the bedrock below.
Meanwhile, on the surface, wide gaps between the pontoons will allow ferries to pass through unhindered.
If you are wondering what It might feel like to drive underwater, the experience is said to feel the same as any other tunnel, according to Arianna Minoretti, a senior engineer with the country’s public roads administration.
The first underwater tunnel will connect Oppedal and Lavik. The tunnel will pass through the 1,300 meter (4,300ft) deep, 1,000 meter (3,300ft) wide Sognefjord.
Although the county regularly experiences rough weather, the NPRA is confident the submerged construction will be able to cope.
Having this connection means that people there do not have to wait for a helicopter to go to the hospital,” Minoretti says.
As the system is positioned underwater, the surrounding landscape will remain intact, the agency says. The project is expected to be completed by 2035.
Source: Anonhq

Saturday, June 25, 2016

Increasing the RAM in Your Android Devices with Your SD Card

Increasing the RAM aids in speeding up and even boosting your phones speeds. Just by altering some adjustments on your SD Card and 2 programs, you can get faster speeds and better performance from your Android Device(s).

As everyone already knows, Android is the largest brand in alteration and advanced modification. Provided that you already have rooted your Android device, then reading this tutorial will provide you with more knowledge on how you can easily increase your Android’s RAM without making any changes onto your hardware.

The simplest way to provide more RAM to your android device, is right here in this article. Simply follow the process below. However, you must be informed of the requirements before you begin in order to perform the operation.


*Rooted Android Device (Tablet | Phone)
*SD Card (Must by at least 4GB & Class 4)
*SD Card Reader
*Windows-Based Computer

Now the process of alteration can be followed once you have all of the information. Please be sure that your SD card is properly formatted and blank. If you have any images on your SD Card, I encourage you to save them onto your computer and/or an online source like DropBox.

Step 1)
This process requires you to download and install a specific software on your computer. The software is called Mini Tool Partition. This software will allow you to perform a partition of your SD Card. You must insert your SD Card into the SD Card Reader on your desktop or laptop.

Step 2)
You will need to open the Mini Tool Partition, and on the Disk Selection window, select your SD Card. Right Click on the desired SD Card and click on Delete. Basically this version of Delete will format your SD Card to work properly.

Step 3)
Now that you have formated your SD Card, you can right-click on the respective SD Card selection and then select Create. This will then create special partitions. However, if your SD Card is below 4GB, you may want to select the “FAT” partition; if you have a bigger SD Card, you can opt-in for the FAT 32.

Step 4) **Note, it is crucial to follow this next step exactly, other wise, you may end up corrupting your SD Card.**

Now that you have selected the proper File System, you can simply drag the size as well as the location. Please leave the 1000MB on the Unallocated Space. The rest is for the partitioning size. Now you can select OK.

Step 5)
Since you have left the 1000MB unallocated space, this will allow it to get it located properly. Right-Click on the SD Card selection and select Create. Select the Primary just as the same on the previous and then you need to select Ext2, not FAT32. During this, you should not to leave any unallocated space. Now you can click OK, Done.

Step 6)
Now the editing of the partitioning of your SD Card is completed.  You can simply click on the Apply button located at the top left corner of the Mini Tool Partition Wizard. Eject your SD Card, and proceed onto placing it into your desired Android Device.

Step 7)
Now you need to download and install “Link2SD”. This can be found on the Google Play Store from your mobile device.

Step 8)
Simply open up the new downloaded application, where it will then ask you for the Rooted Device. You will have to stop the process and ensure your Android device is, before you can continue.

After that, the application will ask for the file system, such as .Ext partition. Just select the Ext2 selection that you had created during the Mini Tool Partition process. Then select OK.

Step 9)
Now you need to prepare the application in order to take the partitioned space in which we have taken the 1000MB. Then you can link them all together.

As mentioned at the beginning of the article, we are not adding any type of hardware. Instead, we are just increasing the RAM inside your Android by means of utilizing your own SD Card. The whole process should only take approximately 10-50 minutes to perform.

Sources: CodingSec, DropBox, CNet, Google Play Store,

Friday, May 6, 2016

Future Challenges in Computer Science PPT

Computer science is faced with many challenges as the digital universe expands. From mobile and cloud computing to data security, addressing these issues can require large, structural changes, but an examination of these problems can lead to organizational solutions and improvements in the world.

Challenges in Computer Science

  • More employees and customers are using mobile technology. A switch to cloud services and an emphasis on mobile platforms are essential.
  • The Internet’s infrastructure will need to be updated to match the “New Internet.”
  • In 2020, 100-billion uniquely identifiable objects will be connected to the Internet.
  • 80% of security professionals rated data leaks and exposure of sensitive information as the highest concern.

Steps Toward Solution

Changing the architecture of organizational networks can seem daunting. Below are suggested steps.

  • Identify and remove bottlenecks, improve routing patterns, and utilize better servers.
  • Use software-defined networking to allocate resources and increase data efficiency.
  • Change 10GB fiber optic cables to 100GB.

As organizations improve networking and infrastructure, an explosion of data will lead to more problems with rewarding solutions.

Big Data and the Digital Universe

  • By 2020, the digital universe will grow from 130 to 40,000 Exabytes.
  • The data that requires protection will grow by 40%.
  • Data will become more complicated and harder to secure, store, and analyze.

While the problems facing computer science and Big Data are paramount, these issues can lead to opportunities within bioinformatics and health care to improve the world.

Changing the World

  • Improved experiments and advances in data visualization and health technology are leading to insight into cancer and rare diseases.
  • Genomics is helping researchers understand genetic diseases and could result in profound improvements in treatment.
Click Here to Download Future Challenges in Computer Science PPT

Medical Applications for 3D Printing PPT


Medical applications for 3D printing are expanding rapidly and are expected to revolutionize health care.Medical uses for 3D printing, both actual and potential, can be organized into several broad categories, including: tissue and organ fabrication; creation of customized prosthetics, implants, and anatomical models; and pharmaceutical research regarding drug dosage forms, delivery, and discovery.The application of 3D printing in medicine can provide many benefits, including: the customization and personalization of medical products, drugs, and equipment; cost-effectiveness; increased productivity; the democratization of design and manufacturing; and enhanced collaboration.However, it should be cautioned that despite recent significant and exciting medical advances involving 3D printing, notable scientific and regulatory challenges remain and the most transformative applications for this technology will need time to evolve.


Medical applications for 3D printing are expanding rapidly and are expected to revolutionize health care. Medical uses for 3D printing, both actual and potential, can be organized into several broad categories:
  • Tissue and organ fabrication
  • Creation of customized prosthetics
  • Implants, and anatomical models
  • Pharmaceutical research regarding drug dosage forms, delivery, and discovery.


  • 3D bioprinting offers additional important advantages beyond the traditional regenerative method (which essentially provides scaffold support alone), such as: highly precise cell placement and high digital control of speed, resolution, cell concentration, drop volume, and diameter of printed cells.
  • Organ printing takes advantage of 3D printing technology to produce cells, biomaterials, and cell-laden biomaterials individually or in tandem, layer by layer, directly creating 3D tissue-like structures.
  • Various materials are available to build the scaffolds, depending on the desired strength, porosity, and type of tissue, with hydrogels usually considered to be most suitable for producing soft tissues


  • Implants and prostheses can be made in nearly any imaginable geometry through the translation of x-ray, MRI, or CT scans into digital .stl 3D print files.
  • In this way, 3D printing has been used successfully in the health care sector to make both standard and complex customized prosthetic limbs and surgical implants, sometimes within 24 hours.
  • This approach has been used to fabricate dental, spinal, and hip implants.
  • Previously, before implants could be used clinically, they had to be validated, which is very time-consuming


  • A research team at the BIOMED Research Institute in Belgium successfully implanted the first 3D-printed titanium mandibular prosthesis.
  • In 2013, Oxford Performance Materials received FDA approval for a 3D-printed polyetherketoneketone (PEKK) skull implant, which was first successfully implanted that year.
  • LayerWise, manufactures 3D-printed titanium orthopedic, maxillofacial, spinal, and dental implants.
  • An anatomically correct 3D-printed prosthetic ear capable of detecting electromagnetic frequencies has been fabricated using silicon, chondrocytes, and silver nanoparticles.
  • 3D printing has already had a transformative effect on hearing aid manufacturing.Today, 99% of hearing aids that fit into the ear are custom-made using 3D printing.


  • The individual variances and complexities of the human body make the use of 3D-printed models ideal for surgical preparation.
  • MRI or CT scans aren’t as instructive since they are viewed in 2D on a flat screen.
  • The use of 3D-printed models for surgical training is also preferable to training on cadavers, which present problems with respect to availability and cost.
  • 3D-printed neuroanatomical models can be particularly helpful to neurosurgeons by providing a representation of some of the most complicated structures in the human body.
  • 3D-printed models have been used in numerous cases to gain insight into a patient’s specific anatomy prior to a medical procedure


  • Complex drug manufacturing processes could also be standardized through use of 3D printing to make them simpler and more viable.
  • Personalized 3D-printed drugs may particularly benefit patients who are known to have a pharmacogenetic polymorphism or who use medications with narrow therapeutic indices. A pharmacist could then print and dispense the personalized medication via an automated 3D printing system.
  • If necessary, the dose could be adjusted further based on clinical response.
  • 3D printing offer the ability to create limitless dosage forms that are likely to challenge conventional drug fabrication.
  • 3D printers have already been used to produce many novel dosage forms, such as: microcapsules, hyaluronan-based synthetic extracellular matrices, antibiotic printed micropatterns, mesoporous bioactive glass scaffolds, nanosuspensions, and multilayered drug delivery devices.


  • Customization and Personalization
  • Increased Cost Efficiency
  • Enhanced Productivity
  • Democratization and Collaboration


  • Unrealistic Expectations and Hype: Despite the many potential advantages that 3D printing may provide, expectations of the technology are often exaggerated by the media, governments, and even researchers.
  • Safety and Security: 3D printing has given rise to safety and security issues that merit serious concern.3D printers have already been employed for criminal purposes, such as printing illegal items like guns and gun magazines, master keys, and ATM skimmers.
  • Patent and Copyright Concerns: Manufacturing applications of 3D printing have been subject to patent, industrial design, copyright, and trademark law for decades.


3D printing has become a useful and potentially transformative tool in a number of different fields, including medicine.As printer performance, resolution, and available materials have increased, so have the applications.Researchers continue to improve existing medical applications that use 3D printing technology and to explore new ones.The medical advances that have been made using 3D printing are already significant and exciting, but some of the more revolutionary applications, such as organ printing, will need time to evolve.

Wednesday, May 4, 2016

Safeguard Your Facebook Account From Hackers: A Basic Guide

Since its launch in 2004, Facebook has drawn more than seven hundred and fifty million active users (and their fair share of bumps and bruises over its privacy policies). Facebook provides unsuspecting users many opportunities to reveal their private details unintentionally, making this particular networking site a perfect target for hackers. Adopting intense hacking prevention techniques can help to keep your information protected and your Facebook profile completely under their radar.

For a hacker who is familiar with Facebook and all of its aspects, accessing personal information takes just a few mouse clicks. Based on the information visible on peoples’ profiles — for instance your friends, family and colleagues, and their friends and coworkers — someone with enough knowledge can easily find your physical address, email address, family names, cv and even personal contact number(s). If hackers obtain this details, these folks may eventually acquire your identity. The following are a few of the steps you can take to secure the data on your Facebook account:
Image Source: Google Image – A sample software that says it can hack Facebook. But these software are usually malware.

First, only add contacts you know.Generally, there is a trend on Facebook to gather as many friends as possible, but men and women who do this poses a very minimal idea (or no idea) about who the person is on their friends list. Some of those might not really be real people, but rather phishing pages that are trying to gather information about you. Acknowledging the invite could permit a hacker to reach one’s account. Check out your contacts/friends list periodically to make sure you have not added anyone you don’t know accidentally, and that the users who have visibility to your account are the individuals YOU desire to give access too.

Avoiding a ‘hack’ requires vigilance… always verify hyperlinks before you clicking on them! If the link appears to be a strange URL or it’s ‘out of character’ for the person whom sent it to you, DON’T CLICK ON IT! When a hacker obtains access to a profile, often times they may upload harmful code (links) that replicates themselves by posting on your Facebook wall. Once your friends push that hyperlink, it duplicates the procedure.

A good example of this is sometimes hackers use outside links to connect you to ‘Facebook.’ These pages are ‘dummy’ or ‘duplicate’ pages that report any information entered into it back to the hacker… in other words, once you enter your password and username and press Enter on your keyboard, the hacker has your legitimate login info… and generally at that point, the fake page does not take you anywhere, rather it appears as if the page is unresponsive to your input. So, whenever you are in doubt, visit the website directly and not through other means (links via email or other websites).
Image Source: Google Image – The malicious link isn’t spreading through high profile names only, but also “long tail” relatively popular Facebook pages.

Furthermore, it is paramount to upgrade your web browser when new versions are available. This way the system can keep antivirus, spam protection and other security features up-to-date. This will work to improve one’s protection and keep not only your Facebook profile secure, but additionally the other applications you may use. Update and run anti-virus software on your computer on a regular basis. Whenever you use the internet, your PC becomes vulnerable and open to dangerous users. Executing a malware scan on one’s computer system frequently can minimize one’s exposure and enhance your hack-protection capability.

Password strength is the ideal measure of your hack prevention plan. Choose or think of a security password containing at least eight characters (but more is always better) and that uses a combination of letters, numbers and symbols. Refrain from using common, everyday words or phrases — like a birth date or your first or favorite pet’s name or other effortlessly distinguished information — and avoid words that can be found in the Oxford or any other dictionary.
Always make use of your common sense. Facebook has security measures that aid you in account protection. Lookup Facebook’s Help Center to find all of them. Secure browsing via HTTPS is a feature that encrypts one’s traffic prior to posting it on the web. We can tell if this feature is enabled by the server by checking the URL (or web address) in your browser’s address bar. If the address begins with ‘https‘ instead of ‘http,’ then the traffic between you and the site is encrypted. Many third party plugins and apps do not assist this element.
HTTPS (also called HTTP over TLS, HTTP over SSL, and HTTP Secure) is a protocol for secure communication over a computer network which is widely used on the Internet. HTTPS consists of communication over Hypertext Transfer Protocol (HTTP) within a connection encrypted by Transport Layer Security or its predecessor, Secure Sockets Layer. The main motivation for HTTPS is authentication of the visited website and to protect the privacy and integrity of the exchanged data.
Login alerts can help you determine if anyone else has utilized or used your profile. This feature notifies you whenever your account is used from a new device or computer. A variation of this element is called login approvals (aka 2-factor authentication). This sends a code to your cellular device whenever the profile is being accessed from a new, unrecognized device or computer that you must enter to proceed with logging in.

In case you need to reach your profile from a public computer in a public library or on a college or university campus or another public place, you can ask a one time security password from Facebook by sending text messages to Facebook. The security password is uniquely generated and is valid for only a few minutes. Utilizing this safety measure is one VERY GOOD step in keeping your account secure.

In summation, using a few simple steps to secure your account can make one’s Facebook experience more pleasant and virtually stress free. Take the opportunity to understand the privacy and protection features the website offers and protect yourself and others from stalkers and hackers.

SOURCE: CyberWarZone,Annonymous

Tuesday, May 3, 2016

Geomechanics Seminar Report

Geomechanics (from the Greek prefix geo- meaning "earth"; and "mechanics") involves the geologic study of the behavior of soil and rock. By definition, rock mechanics is the theoretical and applied science of the mechanical behavior of rocks in the force fields of their physical environment. In practice, so-called “rock engineering” is concerned with the application of principles of engineering mechanics to the design and construction of structures of any type either on or in the rock, such as tunnels, mine shafts, underground excavations, open pit mines, road cuts,dams, skyscrapers, waste repositories,and oil or gas wells.
Though initially developed for mining and civil engineering purposes, geomechanics found its way into the oil and gas industry in the ’80s in order to improve hydraulic fracturing and drilling operations. In the contemporary petroleum industry, geomechanics is defined as the discipline that integrates rock mechanics, geophysics, petrophysics, and geology to quantify the response of the Earth to any changes in state of stress, pore pressure, and formation temperature.

Geomechanics: The Oil and Gas Industry’s Missing Link 

Although systematic application of rock mechanics in the oil and gas industry is relatively new, it was recognized and appreciated by many oil companies in a short period of time and has become a fast-growing field due to its applicability and effectiveness in reducing nonproductive time (NPT). 
As the virgin state of stress is disturbed by different oil and gas activities, the rock’s mechanical state changes, too, and consequently influences drilling, completions, and production performance. These changes can result in serious and unexpected cost and time overruns if not properly predicted and managed. Dodson et al. (Offshore, Vol. 64, No. 1, 2004) conducted a survey of Gulf of Mexico wells and reported wellbore stability issues were the cause of almost 40% of drilling-related NPT, resulting in an annual cost of around USD 8 billion.
As a result of experiencing significant improvements in drilling and production operations by utilizing geomechanics, it has hence become an important and integral part of each and every field development plan, from the early stages of exploration to even after field abandonment. With the recent boom in the development of unconventional oil and gas resources, the use of geomechanics principles has become even more imperative due to the sensitivity and complexity of these reservoirs. Geomechanics is playing a critical role in successfully maximizing shale gas production by helping optimize the use of hydraulic fracturing technology. 
Geomechanical applications in the oil and gas industry include porepressure prediction; helping ensure cap-rock integrity; field problem diagnosis; formation properties evaluation; in-situ stresses estimation; drilling performance evaluation; wellbore stability; borehole trajectory optimization; sand production prediction and control; underbalanced drilling feasibility; fractured reservoir characterization; and production maximization affected by natural fractures, hydraulic fracturing, fluid and steam injection, reservoir compaction, surface subsidence, and casing shear and collapse. It’s a long list! Clear knowledge of how to apply geomechanics appropriately will increase exploration and development efficiency in both conventional and unconventional resources.

Geomechanical Modeling: Turning Impossibilities Into Possibilities 

To conduct any of the aforementioned studies using rock mechanics, the first step is to construct a geomechanical Earth model (GEM). A GEM consists of six core components that need to be either calculated or estimated using field data:
Vertical stress, δv (often referred to as the overburden stress)
Maximum horizontal stress, δHmax
Minimum horizontal stress, δHmin
Stress orientation, Azi δHmax
Pore pressure, Pp
Rock mechanical properties
Modeling techniques in geomechanics encompass analytical, experimental, and numerical methods, each having their pros and cons. Generally, numerical models have higher accuracy over analytical ones but require additional input data and more time. Analytical techniques are in return quicker with less complexity. Experimental models are based on physical and mechanical laboratory tests on rock core samples. It is usually costly and time consuming to perform such tests, though they do provide valuable information about rock properties.
As a generic workflow, constructing a 1D geomechanical model starts with rock mechanical property estimation using petrophysical logs in conjunction with core test results. There are different empirical models to make a strength profile; however, laboratory data are required to calibrate these models.
The second step is building a continuous overburden profile using density logs.
Pore-pressure prediction using logs and available well test data (or seismic data if available) is the next step. Minimum horizontal stress can be calculated using either empirical equations or fracturing data (LOT [leak-off tests]/X [extended] LOT or minifracturing tests) or ideally, a combination of both. Drilling incidents such as ballooning and mud losses can help to constrain the minimum horizontal stress and fracture gradient.
The last steps are determining azimuth and magnitude of the maximum horizontal stress. This is the most complicated part of geomechanical modeling, as no direct way of measuring δHmax is available. Analyzing wellbore failures such as breakouts and drilling-induced tensile fractures from image logs is one of the existing techniques to determine a reasonable range for δHmax and find its orientation. Using caliper logs, sonic logs, and laboratory measurement of elastic strain recovery are alternative techniques.
Many field examples have proved that geomechanical analyses can open opportunities for drilling into harsh and challenging environments which previously looked impossible. In an example in southeast Asia, where drilling a vertical well was identified as impossible due to lack of a safe operating mud weight window, the well was made possible by geomechanical analysis that led to changing the well trajectory to the safest orientation in a specific formation and thereby widening the window. Geomechanics can also improve casing design and provide a wider mud weight window for drillers. There are examples in Northwest Shelf Australia where geomechanical modeling reduced the number of casings, resulting in significant cost savings for the operators.
In the context of production from naturally fractured reservoirs, a GEM can make a real difference in maximizing production by identifying critically stressed fractures which are, in fact, the productive fractures. Identifying the orientation of these fractures enables optimization of drilling orientation to intersect the maximum number of them. Field examples in the Middle East and southeast Asia have shown notable increases in production using these types of studies.