29/11/2013

BBM premier access to Tecno customers

Tecno mobile phones will now preinstall BBM™ on TECNO phones running the Android operating system.With BBM preinstalled, customers will be able to easily get started chatting and connecting with friends and family on the popular private social network from BlackBerry®.

BBM, with its privacy, control and immediacy, is very popular in the Nigerian market, where everybody wants a BBM PIN.


According to Vice President, TECNO Group, Mr. Arif Chowdhury, BBM will be preloaded on TECNO phones in 20 countries. For customers already using TECNO phones, BBM will of course be available as a free download on the Google Play store.

28/11/2013

How to Fix & Speed Up Your Family's Windows Computer.



You know it's going to happen, and resistance is futile, so you may as well be prepared. Here's your ultimate guide to speeding up and troubleshooting your mother's, father's, grandma's, or other family member's Windows computer.

1. Clear the Web Cache

The web cache stores all kinds of information from their browsing sessions each time they access the internet. It does help pages they visit frequently load faster, but over time all of that data adds up and can actually cause lag instead of preventing it.

The process is actually different on each web browser, so head over to our ultimate guide for clearing the cache on any web browser for easy shortcuts. More than likely, you'll be heading straight to the Internet Explorer sections for Windows, or maybe even Chrome.

Protect your Computer System.



Emsisoft Anti-Malware uses two full scan engines in the battle against Viruses, Trojans/Backdoors, Spyware/Adware, Worms/Bots, Keyloggers and all other types of Malware.

Frequent signature updates provide detection for about 4 million different types of Malware. 3 layers to protect your PC against new infections: * The signature based scan of the double-engine catches known malware immediately when it tries to run. * With the awarded unique behavior based malware detection running programs are monitored all the time. As soon as a program does something suspicious, it is stopped and alerted.

That provides extra security against new and unknown threats. * Surf protection, that prevents you from surfing to malware spreading and fraudulent websites. Emsisoft Anti-Malware is a comprehensive antivirus tool to detect all types of Malware and Spyware. With the integrated automatic update feature, your PC is always up to date to protect permanently against dangerous software.

Unlock Bootloader On Nexus Android Devices.




Before attempting this guide to unlock your bootloader, please note that this is intended for Android phone with STOCK ANDROID OS ONLY. We will be using a Google Nexus One as our reference because it comes with zero user interface alteration from it’s manufacturer. If you are looking to unlock bootloaders on handsets which already have a custom UI from manufacturers installed like HTC Sense, Samsung TouchWiz etc, then this guide won’t be applicable.

1. The first step is download and install Android SDK.

Android Bootloaders



Every Android phone has a bootloader that instructs the operating system kernel to boot normally. But you need to understand one thing here that as Android OS is an open source OS and is available on a variety of different hardware, every manufacturer has their own version of bootloader specific for the hardware present in it’s environment. 
NB: Motorola packaged an “eFuse” command in their Android phones, which could brick (permanently turn off) your device in case you tried to flash a Custom ROM.

Why Is Bootloader Locked?

A bootloader is usually locked on an Android device because although it’s an open source OS, still the manufacturers want you to stick to their Android OS version specifically designed for the device. In order to apply this concept, manufacturers lock the bootloader. With a locked bootloader on Android devices, it is virtually impossible to flash a Custom ROM and forced attempts void warranty as well as usually end up in bricks. Therefore, the first step is to always unlock the bootloader.

How to Fix a few grub errors | Broken Bootloader and error 17/15

Grub is short for GNU GRand Unified Bootloader. To be simply put, it’s a boot loader package from the GNU Linux project. It’s the common and reference implementation of a multiboot Linux system. It allows you to choose which operating system or specific kernel to boot into.

Bootloader [Definition]


Boot Loader In literal terms, it  is a code that is executed before any Operating System starts to run on you Computer

The concept of bootloaders is universal to virtually all Operating systems that inculcates operating systems on your PC, laptop, smartphones, and other such devices. Bootloaders basically package the instructions to boot ( Turn on) Operating System kernel and most of them also have their own debugging or modification environment. As the bootloader kicks off before any piece of software on your device, it makes it extremely processor specific and every motherboard has it’s own bootloader. This is one reason that all Android phones have different Custom ROMS developed due to high variance of processing hardware present on the device.

 The iDevices running iOS somewhat share the same hardware specs and hence you don’t see much variance in their bootloaders.

Kernel



In computing, the kernel is a computer program that manages input/output requests from software and translates them into data processing instructions for the central processing unitand other electronic components of a computer. The kernel is a fundamental part of a modern computer's operating system.

When a computer program (in this case called a process) makes requests of the kernel, the request is called a system call. Various kernel designs differ in how they manage system calls (time-sharing) and resources. For example, a monolithic kernel executes all the operating system instructions in the same address space to improve the performance of the system. A microkernel runs most of the operating system's background process in user space to make the operating system more modular and, therefore, easier to maintain.

Kernel basic facilities

The kernel's primary function is to manage the computer's hardware and resources and allow other programs to run and use these resources. Typically, the resources consist of:

The Central Processing Unit. This is the most central part of a computer system, responsible for running or executing programs. The kernel takes responsibility for deciding at any time which of the many running programs should be allocated to the processor or processors (each of which can usually run only one program at a time)
The computer's memory. Memory is used to store both program instructions and data. Typically, both need to be present in memory in order for a program to execute. Often multiple programs will want access to memory, frequently demanding more memory than the computer has available. The kernel is responsible for deciding which memory each process can use, and determining what to do when not enough is available.
Any Input/Output (I/O) devices present in the computer, such as keyboard, mouse, disk drives, USB devices, printers, displays, network adapters, etc. The kernel allocates requests from applications to perform I/O to an appropriate device (or subsection of a device, in the case of files on a disk or windows on a display) and provides convenient methods for using the device (typically abstracted to the point where the application does not need to know implementation details of the device).

Key aspects necessary in resource management are the definition of an execution domain (address space) and the protection mechanism used to mediate the accesses to the resources within a domain.

Kernels also usually provide methods for synchronization and communication between processes called inter-process communication(IPC).

A kernel may implement these features itself, or rely on some of the processes it runs to provide the facilities to other processes, although in this case it must provide some means of IPC to allow processes to access the facilities provided by each other.

Finally, a kernel must provide running programs with a method to make requests to access these facilities.

The Birth of Linux OS


The Birth of Linux

On August 25, 1991, a Finn computer science student named Linus Torvalds made the following announcement to the Usenet group comp.os.minux:

I'm doing a (free) operating system (just a hobby,
won't be big and professional like gnu) for 386(486)
AT clones. This has been brewing since april, and is
starting to get ready. I'd like any feedback on things
people like/dislike in minix, as my OS resembles it
somewhat (same physical layout of the file-system
(due to practical reasons) (among other things).
The “Minix” Torvalds referred to is a variant of the UNIX operating system, used as a guideline for his the free operating system he wanted to run on the x86-based consumer PCs of the day. “gnu” refers to the set of GNU (GNU Is Not Unix) tools first put together by Richard Stallman in 1983. UNIX, the operating system that started it all, had its origins in the old Bell Labs back in the early 60s.

An Overview of the Linux Operating System


What is Linux?

Linux is, in simplest terms, an operating system. It is the software on a computer that enables applications and the computer operator to access the devices on the computer to perform desired functions. The operating system (OS) relays instructions from an application to, for instance, the computer's processor. The processor performs the instructed task, then sends the results back to the application via the operating system.

25/11/2013

EASY MP3 DOWNLOADER [Download}

Easy MP3 Downloader - Search And Download 100 Million Songs Easily And Safely!
Easy MP3 Downloader, a revolutionary new program, provides you an easy, efficient and virus-free method to search and download 100 million songs.


million songs with one click. It is 100% clean and safe and and totally free from all kinds of viruses and malware. Besides, Easy MP3 Downloader also updates the list for USA Airplay Hot 100 every week and offers professional recommendation for the fantastic songs across all genres. You just need to pick one or

Emsisoft Anti-Malware Software [Download]

Another Strong Protection for your Computer. 



Emsisoft Anti-Malware is a premium malware scanner to clean and protect your PC from viruses, spyware, trojans, bots, adware and worms. It uses 2 major scan engines (Emsisoft's own one + BitDefender antivirus) to find more than 10 million different types of malicious software. Keep your PC clean with the included File Guard and Behavior Blocker features that effectively stop all new infections. The Surf Protection additionally blocks access to fraudulent and dangerous websites.

What's new in this version: New special handling for potentially unwanted programs (PUPs); Significant speed performance improvements of the realtime protection; New Hybrid Updates with 90% less update traffic thanks to combination of incremental and differential updates.

19/11/2013

Download:: Prince of Persia Warrior Within Cracked.

 
Prince of Persia Warrior Within is a video game and sequel to Prince of Persia: The Sands of Time. Warrior Within was developed and published by Ubisoft, and released on December 2, 2004 for the Xbox, PlayStation 2, GameCube, and Microsoft Windows. It picks up where The Sands of Time left off, adding new features, specifically, options in combat. The Prince now has the ability to wield two weapons at a time as well as the ability to steal his enemies' weapons and throw them. The Prince's repertoire of combat moves has been expanded into varying strings that allow players to attack enemies with more complexity than was possible in the previous game. Warrior Within has a darker tone than its predecessor adding in the ability for the Prince to dispatch his enemies with various finishing moves.

Download:: Internet download Manager Final Version 2013

Internet download Manager (IDM) is a tool to speed up downloads by up to five times, also have a feature to  resume and schedule downloads. Comprehensive error recovery and resume capability can restart broken or interrupted downloads because of lost connections, network issues, laptop shutdowns, or surprising power outages. easy graphic-computer program makes IDM user friendly and straightforward to use.
cracked internet download manager 6.12 FINAL Download free
Internet download Manager 6.12 Final Version encompasses a good transfer logic accelerator that options intelligent dynamic file segmentation and safe multiplier downloading technology to accelerate your downloads
internet download manager supports proxy servers, ftp and HTTP protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content process. IDM integrates seamlessly into Microsoft net individual, Netscape, MSN individual, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and every one alternative well-liked browsers to mechanically handle your downloads.
it comes with a full 30 days free usage which after registration is required.

Download:: The House of the Dead 2 with {Crack}



SYSTEM REQUIREMENTS:

Processor= 733MHz
RAM= 128MB 
Graphics= 16MB

1: First DOWNLOAD the file (uncheck download with sharebeast software)
so the file can be downloaded normally directly with your browser or IDM 
2: Extract with WINRAR
3: Install it and copy crack to the game directory.
4: Play and Enjoy

Speed up your Computer/Laptop with Advance System Care.




"There's nothing worse than a computer that is bogged down so much that it impedes your ability to work or play games. Advanced Systemcare aims to remedy whatever ails your computer by not only cleaning up junk files, malware, and invalid registry entries, but by giving your computer a boost to optimize your PC experience."

Protect your Children online.


Anti-Porn is an automatic content filter software to protect your kids from pornographic web sites. In addition, the program can also filter chat conversations when offensive language is used and limit internet access based on specified usage times. Anti-Porn includes a database with thousands of web sites and you can easily add your own or exclude specified sites from filtering.
The database can be updated online, so you always have the latest version. In addition to the blocking of sites, the program can also log all sites that are accessed and even take screenshots of the desktop at regular intervals.

Install LinkWithin Widget on Blogger

Install LinkWithinWidget on Blogger

1. Click Install Widget to open Blogger in a new window, and follow the steps below in that window. Login to your Blogger account if necessary.
2. Select a blog if you have more than one, then click on Add Widget.

13/11/2013

How to view hidden files in Windows

Click the Start menu & goto Computer, or just press the start menu + E together.
click on Organize and then folder and search options as shown in image below:

How to remove Virus & adware on your Computer

How to remove pop-up ads.


This tut will guide you on how to remove Virus & adware such as :FastClickNow.com pop-ups from your computer, and any other adware program that may have been installed on your system.

Please perform all the steps in the correct order. If you have any questions or doubt feel free ask for our assistance. :)
For me step 1-3 solve my problem, but in case Stubborn infection you should complete all steps.
 
Also check out how to clean Virus infection from your computer system



STEP 1 : 
The FastClickNow.com pop-up ads may be displayed by an adware program that you have recently installed on your computer. In our case FastClickNow.com pop-ups were installed with the SuperLyrics, Babylon Toolbar, Plus-HD 1.3, TidyNetwork.com and WebCake 3.0programs.

In this first step, we will try to identify and remove any malicious program that might be installed on your computer.

Know an infected computer with MALWARE



Malware, means (malicious software), is software created by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.

Malware includes computer viruses, ransomware, worms, trojan horses, rootkits, keyloggers, dialers, spyware, adware, malicious BHOs, rogue security software and other malicious programs; the majority of active malware threats are usually worms or trojans rather than viruses.

12/11/2013

How to Remove FastClickNow.com Adw


FastClickNow.com is typically added when you install another free software (video recording/streaming, download-managers or PDF creators) that had bundled into their installation this adware program. When you install these free programs, they will also install FastClickNow.com as well. Some of the programs that are known to bundle FastClickNow.com include 1ClickDownload, Superfish, Yontoo and FBPhotoZoom.

Things to know about BBM on Android and iPhone.




Do you own an Android or iPhone smartphone? If so, you can download BBM and connect with friends and family around the world for free! To help you get started, here are a few things you’ll want to know.!

08/11/2013

Indians assaulting Nigerians livings in their country.


Locals seem to be targeting Nigerians in India for no good reason. On October 30, a 37 year old man Obado Uzoma Simeon was murdered in Parra village, North Goa, India. Aside from Uzoma, several other Nigerians have been harassed, assaulted and beaten by the locals and Indian police isn't doing anything about the targeted violence. Locals claim the Nigerians being targeted are drug dealers.

5 Things God Never Said.

5 Things God Never Said


Misconceptions of God can be costly because they can be very defeating.

For example, it’s agonizing to me how many people think “cleanliness is next to godliness” comes from the pages of Scripture. If this is indeed a word from God, then homemakers have every right to feel guilty that their houses are not always tidy. In fact, depending on how far you carry it, people soon become more concerned about their furniture than they do their family.

Must have app on Windows.




Looking for the best Antivirus to protect your Computer from attack and malicious softwares. Avast is what you need.

if you have been attacked by Virus before, i bet you never want that to happen again. (yea" i been there before).
Check out the New Avast here!

07/11/2013

Change Blogger Mouse Cursors


06/11/2013

Video: Tiwa Savage ft Don Jazzy - Eminado


Video: Wande Coal - Baby Face


Video: Tecno Sart Family Wave


How cool is your tool? Well, the all new Tecno Smart family can upgrade you. Join the fun train guys, it doesn't hurt to be Smart! You can experience more with little if you're using the Tecno Cool-to-the-tool Smart family range. #Live Smart. For more go here

02/11/2013

Fairfax struggles to raise funds for BlackBerry bid.


NEW YORK (Reuters) - Fairfax Financial Holdings Ltd is struggling to raise financing for its $4.7 billion bid for BlackBerry Ltd, with several large banks declining to participate on concerns that the smartphone maker will not be able to reverse its fortunes, according to people familiar with the matter.

Fairfax, which is run by Canadian financier Prem Watsa, is working with Bank of America Merrill Lynch and BMO Capital Markets to put together a lending syndicate for a deal, but they have been turned down by several large lenders, the sources said.

01/11/2013

14 Year Old Boy Rapes 9-Year-Old Girl to Death.



The police in Lagos State have commenced investigation into how a nine-year-old girl died, after sustaining injuries caused by alleged consistent rape.

According to police authorities, the deceased was raped over five times, by a 14-year-old student, Onyi Adimabua, in the Ikorodu area of the state.

Should You Swing For the Fences Every Sunday?






As preachers, we want to see phenomenal results every week when people encounter God through our worship gatherings. One of the primary means of encountering Him is through the declaration of what God has said about Himself through the Scriptures. But we are not always great at it.

Each week, we hope that our sermon will be a homerun. However, I’ve hit a lot more singles and doubles than triples. I’ve hit even fewer homeruns. In all honesty, there are many Sundays my sermon feels like a poorly executed bunt that I have to hustle out to first base. So what are you to do when you just hit a single?

Remember, to begin with, it was not your sermon. The truth you are proclaiming is not your truth. It is God’s message to God’s people and those He is calling into submission to His sovereignty. It is easy to slip into an ownership mode about the sermon. After all, we tell stories about our family, our life, our struggles and our walk with Christ. But none of “us” should be the centerpiece of the message. It is His truth about Him.

Stop allowing your identity to be wrapped up in your performance. So you hit a single. God is still God. You are still you. Remember the counsel that you give out so quickly to machinists, stay-at-home moms, engineers and students: “Your work does not define you. Christ now defines your identity.” Seek to do all of your work as unto the Lord and remember the respective roles in the proclamation of the gospel. As the old adage goes, we are just beggars telling other beggars where to find bread.

Pray more for the effect of the truth than the delivery of your message. As you prepare for the message, spend more time praying for the people who hear it than for the lips who speak it. We must not fall prey to the temptation that our words will be the deciding factor over someone’s daily decisions or eternal destination. This is not to dissuade you from praying for yourself through the process. It is, however, to make your focus on the God who moves in the life of all people, including the preacher.

Accept your fallibility. I hate to stumble through a phrase or tell a bad joke or fail to connect with a crowd. Last Sunday, I misspoke during my message and said “awoken” when I meant to say “awaken.” I hate doing stuff like that. As much as I hate it, my church family actually loves it. For many preachers, true or not, you are perceived to be the smartest person in the room. Telling the occasional lame duck joke or mispronouncing a biblical name is actually endearing. When we move off the need to be the smartest person in the room, perhaps, just perhaps, God will shine brighter because of our humility.

Expect the proper response. Our focus should be on life-change because people saw Jesus, not heard from a preacher. In my life, I am trying to focus more on the response of people to the overall act of worship that has the Scriptures as its center point rather than to my witty banter. The truth is the truth no matter what. So, if your outline was not memorable and your voice cracked, it does not matter. The question we must ask is: “Did I state the truth of God’s Word and ask people to respond to it?”

Commit yourself to serving Christ and His church well. In no way do I want to excuse myself or you from poor preparation or shoddy workmanship. When last Sunday seemed like it fell short, then do what you know must be done. Pray more diligently. Meditate on the Word with greater eagerness. Ask for the filling of the Spirit with more desperation. Seek godly counsel from pastors who have walked this road longer than you. Whatever you do, do not settle for being a poor workman before God and His Word.

Singles happen. In fact, in baseball they are normative for any team. But they must not be satisfactory. In our work of proclamation, we should expect the supernatural to occur in people’s lives. I want to see people radically transformed by the power of the gospel as often as possible.

So let’s go about our work with earnestness seeking the power of the gospel for the good of all people. Swing for the fences and allow God to do His work. Remember, sometimes you sow seeds, sometimes you water what you cannot see is already planted, and sometimes you get to do the harvesting. Whatever our role each week, savor the work of Christ done in you.

Via

VIDEO: Olamide At Malaysia Concert.


Woman with dead day old baby.



A 40-year old widow named Mujidat was caught yesterday Wednesday October 30th with a dead day old baby she hid inside a sack around her residence at at the Iba area of Lagos, PM News reports.

Check out Nicki Minaj's Halloween costume.


Check out pix from Iyanya's 27th birthday party.



Featured post

10 Awesome Widgets to Try on Your Android Phone.

One way Android remains unique from other popular mobile phone operating systems is its embrace of app widgets. Widgets on your home screen...