Saturday, 26 September 2015

Turn Anything Into A Phone Using RePhone – World’s 1st Open Source Modular Phone

Turn Anything Into A Phone Using RePhone – World’s 1st Open Source Modular Phone

rephone-modular-phone-

 Do you want to create a phone for yourself and discover a new way to communicate with things? We are here to help you by telling you about RePhone kit – World’s First Open Source and Modular Phone. 
Recently, we saw the advent of RePhone kit that reminds me instantly of Google’s much-awaited Project Ara modular phone. RePhone is developed by Seeed Studio and it has launched a KickStarted campaign to get the funding for this project.
RePhone helps you to create your phone in few minutes with its slim modules, customizable phone enclosures and accessible software. With the help of open source components like RePhone Core GSM + BLE module or RePhone Core 3G model, you can add cell connection to your phone.

Apart from these core modules, there are 8 more modules – a 5×7 LED board, a NFC board, a GPS board, a 1.54-inch touch screen, an audio board, an Arduino-compatible microcontroller, a GSM breakout board and a basic sensor board. rephone-modular-phone-1
You can hook up these modules together with a varied choice of connectors ranging from soldered wires and FPC ribbon cable to conductive thread. You can even just breadboard them.
RePhone comes with a rich library for hooking into Arduino IDE, Lua and JavaScrip, along with detailed examples to teach everyone develop things easily. They also provide a complete SDK based on Eclipse IDE for C/C++ developers to work with complex applications. 


If you are not into programming, no problem. There is an easy drag and drop feature for files. Just download them online and put them in your RePhone.
With the RePhone modular smartphone kit, you get its cool Kraft paper foldable case that has DIYing written all over it in bold letters. You can make your RePhone, call your friends, listen to music and by connecting it to IFTT, you can setup logic to convert it as an IoT device.
The KickStarter campaign of RePhone was launched this week and we hope to see RePhone as a great DIYing tool in near future.
Did you like the RePhone modular phone? Tell us in the comments below.

The most popular and most downloaded Chrome Extensions of 2015

The most popular and most downloaded Chrome Extensions of 2015

These are the most popular Chrome Extensions that would enhance your browsing experience

Welcome to the world of amazing Chrome extensions, which has widgets to improve your entertainment quotient, niche plugins with dedicated functionalities and plugins that make web browsing more secure than ever.
Chrome productivity extensions provide functionalities such as reminders, to do lists, event managers, and lists management making the productivity with the web more enjoyable. With cool new Chrome apps at your disposal, everything right from gaming links, content from social profiles, and content relevant to your favorite topics is served through your browser. Use specialized plugins to add niche compatibility widgets, enable all sorts of multimedia content, add one click connections to your favorite networks, all this and more with Chrome entertainment extensions.
Given below are the best Chrome Extensions:

1Password

Password is a password manager that goes further than storing of simple password by directly combining your web browser to let you login into websites automatically, easily create passwords, fill registration forms and enter credit card information.

Momentum

It allows to replace new tab page with a personal dashboard featuring weather, to do, and inspires you to be more productive.

Pushbullet

It brings together your devices, friends, and the things you care about in one place and make it easily accessible. In other words, your messages, photos, songs, and links that live on your phone, tablet, computer, and all the other devices are all brought together, which may have been sent from your friends, and sometimes from people you follow.

Earth View from Google Earth

Every time you open a new tab, Earth View displays a beautiful Satellite image from Google Earth that you can experience.

Google Input Tools

The Google Input Tools extension allows to easily switch to typing in a different language with the click of the mouse, and switch back. It provides virtual keyboards for over 90 languages, handwriting input for over 40 languages, and full IMEs or direct transliteration for over 30 different scripts.

Coupons at Checkout

If you are a obsessive online shopper, this extension is a manna from heaven for you. At the time of checkout, it will remind, display, and automatically enter coupon codes for you with a single click.

UpTo for Google Calendar

You can follow TV shows, sports schedules, concerts, and more, without having to leave your Google Calendar. Next to your Google Calendar, you can Browse UpTo’s enormous directory of calendars and follow the ones you care about.

Evernote Web Clipper

You can clip web pages as you browse and keep them all in Evernote. Anything from research article, travel confirmation, etc. can be collected in Evernote forever. You can organize the data and find it on any device.

Taco

If you like having all your services under one roof, Taco is a must have extension. Taco (tacoapp.com) brings all of your existing tasks from 40+ services like Asana, Basecamp, Gmail, Basecamp, Trello, Zendesk and more on to Chrome’s new tab page.

Office Editing for Docs, Sheets & Slides

You can view and edit Microsoft Word, Excel, and PowerPoint files without having to install Office on your computer. Once the extension is installed, Office files that you drag into Chrome, and open in Gmail, Google Drive, and more, will be opened in Docs, Sheets, and Slides for viewing and editing.

Strict Workflow

Strict Workflow is a productivity extension which induces you to keep time limits as per plan. You can plan a 25min/5min workflow: 25 minutes of distraction-free work, followed by 5 minutes of break. Repeat as necessary.
1. Start a 25-minute work timer with a click, and work without distraction.
2. Start a 5-minute break timer with a click, and sit back and relax.
3. Repeat until all your work is done.

Search by Image (by Google)

Sometimes you need to search for a term but the only thing you have got is a image. Search by Image is a search engine devised to do just that. By using any image on the web uploaded by the Google Images team, you can start a Google search using this extension.

The Great Suspender

Most of us open lot of tabs which are rather useless and memory hoggers. The Great Suspender automatically suspends unused tabs to free up system resources. To reduce memory footprint of chrome, the extension unloads, parks, or suspend tabs. Tabs can suspended manually or auto-suspend after a configurable period of time. To avoid automatic suspension, tabs can be whitelisted. Suspended tabs are not discarded after closing and reopening browser, which avoids many tabs from all reloading after a restart. Very simple, easy to use and understand interface.

Google Dictionary (by Google)

This is one extension you need to have on your Chrome. Searching for the right word or to find the correct meaning of a word, you need this extension.
With this extension, you can:
1) View the definition of any work in a small pop-up bubble by double-clicking on it.
2) Using the toolbar dictionary, view the complete definition of any word or phrase.
3) Store a history of words you have searched, so that you can practice them later. Foreign words are automatically translated to your language of choice.

Cite This For Me: Web Citer

With the click of a button, you can automatically create website citations in the APA, Chicago, MLA, or Harvard referencing styles. Browse simply to the page you wish to cite and click the button to produce a correctly formatted citation. Then add it to your online bibliography for safe keeping until later or copy-and-paste the citation into your assignment.

Send to Kindle for Google Chrome™

Sometimes you find an article which is a must read but you would like to read it distraction free. You can make it easier to read web articles with Send to Kindle for Google Chrome. Just send the content you want and not the distractions.
Important features include:
1) Send blog posts, news articles, and other web content to Kindle.
2) Send web content to Kindle in one step or preview before you send.
3) Select text from the web page and send it to your Kindle.
4) Before sending, edit the title and author of your document.
5) Read anytime, everywhere on reading apps and your Kindle devices.
6) Choose to archive content in your Kindle library, where you can re-download it conveniently at any time.

Hola Better Internet

You can access websites blocked in your school, company, or country with Hola! This is NOT a peer to peer application. This extension does not encourage the download of any other products nor links to and is fully functional without it needing any additional download/component.
All the extension are hyperlinked to the Google App store. You can mention your favourite extension in the comments below and we will include it in the article.

Major Highlights From Zuckerberg’s Live Q&A Session

Major Highlights From Zuckerberg’s Live Q&A Session

 On Tuesday Zuckerberg did his first live streaming Q&A session from Facebook’s Menlo Park, California headquarters. We have listed some of his interesting ideas and opinions. Check out the article for more.
While watching Zuckerberg’s live Q&A session, we realized that he had an answer ready for almost all the questions. Although, he was taken aback and he was speechless for a moment when someone asked about his daughter’s future who right now is merely a month’s old.
Zuckerberg has a clear understanding of his future projects as he mentioned some interesting points in his almost one-hour Q&A session. Amongst all, Artificial Intelligence and the Virtual Reality came out as his pet favorites. Here are some of his noteworthy ideas from yesterday’s session.

1. A Dislike Button Would Be Interesting

The first question and by far the most frequently asked question is about having several options in Facebook, especially Dislike. Good news fellas, Facebook is working on it.
Finally, you have a way to show “empathy” to your ex and all those irritating selfie freaks. Although, it would be hurting to downvote someone’s important moments. So, when you get the power, use it wisely.

2. Facebook As An Educational Platform

Zuckerberg said Facebook as an education platform would be phenomenal as it would give an equal opportunity to all the people to learn. Internet.org is one such community project according to him. Facebook as a global company has a responsibility towards people welfare as well.

3. Artificial Intelligence: Future And Its key

Zuckerberg calls himself an optimist when it comes to machines and the AI future. The technology could provide its usefulness in fields of healthcare, automobile, and other sciences. The Artificial Intelligence at an advanced level can also be used for viewer discretion of photos and videos on Facebook which would be much faster and efficient than people flagging the posts. Zuckerberg had even predicted of the world supported with AI.
And he stresses that with the current level of our technology the uprise of machines is nowhere near. So just chill.

4. Video Chat and Virtual Reality

Facebook is rolling out Facebook video chat for a better communication experience for the users and as for Virtual Reality, it is an obvious next step. Videos are just static, but with virtual reality you can immerse yourself and your friends in the experience.
You wouldn’t want a video after 10 years, you would want to be there. Yes, Mark, we would love that. Again, AI would be a key feature to provide the amazing experience.

5. Facebook Won’t Live Forever

Facebook will continue to grow and in the next 5 years it could become a cult of a community, but it won’t live forever. Remember what happened to Orkut and MySpace.
Zuckerberg acknowledges that Facebook will come to an end someday and his goal is not to exist forever but to do the right thing and bring a change in the world.
Facebook’s next Q&A session on September 27 is expected to be even more interesting as Zuckerberg will host Indian Prime Minister Narendra Modi as his guest.


Linux used to build US Navy’s most powerful destroyer yet


Linux used to build US Navy’s most powerful destroyer yet

 3

Linux kernel (OS) powered DDG-1000 Zumwalt Class Destroyer built by US Navy

Now what is linux, it is just an Operating Systemwhich is used worldwide. Linux for a common man would mean something used in different devices basically for research purposes in NASA, in particle accelerators, also used by Scientists for their studies eg Antartic. Linux is also a vital tool in automobile industry as in car manufacture and also being used by Engineers to build humanoid robots, by security researcher or hackers. Linux is preferred due to its basic properties of being flexible, reliable system and safe. US Navy is now using the Linux Kernel to built their most powerful DDG-1000 Zumawat Class Destroyer.
Certain features of Zumwalt : It has an unique structure which matches with the Space ship and due to this shape it would appear as a small fishing vessel on the enemy radar which gives it the stealth capability; however the actual size of this destroyer is equivalent to 3 USS Constitutions. It also has an Integrated Power system which means it can provide electricity to the weapons basically, which might be used for railguns and the free electron lasers. It would hold the capacity of 58 MW of reserve power as per average battle condition. It has total ship computing environment. Easy access to data, this will give an upper hand to sailors as data will be accessible to sailors at any time and anywhereIt also has an  adaptable launcher which would take care of any threat and any missile. Zumwalt carries 16 pre assembled IBM blade servers.
As of now 3 types of these  destroyers has been ordered by US Navy and this seems to be the most expensive project for US Navy this year.
US Navy has actually shown the most innovative way of combining technology with naval security by using an operating system like Linux to create its most expensive and out of the world Naval destroyer DDG-1000 Zumwalt.

Thursday, 24 September 2015

locked android device

Locked out your Android smartphone, here are 3 ways to hack the passcode of your device

#Tutorial Can’t unlock your device, here are some simple steps to reset the passcode using the Google Account.

It is always advisable to have a passcode enabled on the Android device. Of the various reasons one is that it will help family, peers and unwanted acquaintances from snooping in your phone when left unattended and the other reason is to save your sensitive and personal data from being accessed by unknown people in case it gets into the hands of thieves in the scenario it gets stolen.
There are umpteen advantages of setting a passcode to the Android device however there is one major drawback in case if someone forgets their password because one cannot get through the phone until the passcode has been entered and here this article will come handy.
We will check the methods which will help you to get access to your locked Android device:
  • Erase the memory of the device: The most important requirement for this technique to give 100% result is that the Android Device Manager (ADM) must be enabled in the device.  If this device is not installed in your Android device please get this installed and enabled through this link.  Now you can follow these steps:
    • Visit the https://www.google.com/android/devicemanager site by using your computer or any other smartphone / tablet.
    • Sign in the Google login details, remember to use the same login ID that was used in the locked device.
    • You need to select the device that needs to be unlocked (most of the times it will be selected in the ADM interface, however if not then it needs to be selected).
    • Select “Lock”.
    • A window will appear, users will need to enter a temporary password in this window. Now press “Lock” again, here users will come across a recovery message which they can bypass and there is no need to enter this message.
    • Suppose, user has successfully managed to reset the password for their locked device, they will get a confirmation message below the box that has buttons (ring,lock,erase). Please be informed this method erases data like your apps, photos, and music.
    • Now, the locked Android device will show a password field, users will have to enter the temporary password that they created. This password will unlock the device.
    • Users will have to go to the Lock screen settings of their Android device and disable the temporary password.
  • Resetting the passcode with the Google Account: Now let us also check for an alternate method which normally is useful for the Android device with OS 4.4 and lower:
    • Here user will have to enter the wrong lock screen passcode or pattern 5 times, as it is since users have forgotten their passcode this will be easier.
    • Next, there will be “Forgot pattern” message on the screen of the locked device, user needs to touch this screen.
    • User would need to enter their Google account Username and password that they had previously added to their device and login.
    • Now users would need to reset the screen lock of their device. Check this link for more details.
  • Resetting the device to factory settings: If users cannot get through unlocking the device through the above two methods then they can use this third method. This method involves resetting the factory settings of the device, hence users need to be very careful when they do this as they need to take a backup of all their data as they might loose it. This can be done by using two methods:
    • Use settings menu to erase the data:
      1. User needs to Open the Settings menu of the device.
      2. Under “Personal,” touch Backup & reset. User may need to enter their pattern, PIN, or password.
      3. Under “Personal data,” touch Factory data reset > Reset phone or Reset tablet.
      4. If user’s have a screen lock, they will need to enter their pattern, PIN or password.
      5. When prompted, touch Erase everything to erase all data from the device’s internal storage.
      6. When user’s device has finished erasing, select the option to reboot the device.
      Once done, user needs to follow these steps check it on https://support.google.com/nexus/answer/2819582
    • The other method is Recovery mode wherein Google has laid out different steps for different brands and hence Nexus users need to check this link for details: https://support.google.com/nexus/answer/4596836.
    • Users other than Nexus can check the below link to carry out the factory settings: https://support.google.com/android/answer/3094742

How We “See” a Black Hole, Even Though It’s Invisible

How We “See” a Black Hole, Even Though It’s Invisible

how-do-we-see-a-black-hole: How do we “see” a black hole when it doesn’t give off any light? Today, we’ll tell you the answers.
Black holes are one of the most mystifying space creatures. As the name suggests, black holes are “black” with massive gravitational pull and they don’t give off any light.
So, how do we ever “see” a black hole, even when they are basically invisible?
In this 1-minute long video, Brian Greene explains how we are able to locate a black hole.
He explains by giving the example of a black hole at the center of a galaxy, where the stars are seen whipping around it. The black hole itself remains invisible, but it’s the reason why these stars get this much velocity.
The existence of a black hole is confirmed at the center of galaxies as it’s the only object that has such massive gravitational pull. Therefore, we believe that a black hole exists at the center of our galaxy with stars rotating around it.
Watch the video below:
Did you find this video interesting? Tell us in the comments below.

Learn it Faster: The Entire Python Language in a Single Image

Learn it Faster: The Entire Python Language in a Single Image

 What if you had to study one single page to get the complete idea of a programming language? In this article, I’m sharing an infographic to help you learn Python faster than ever.
This is the follow up of my article The Entire JavaScript Language in a Single Image. Today, we are sharing The Entire Python Language in a Single Image infographic with our fossBytes readers.
A China-based developer Yusheng has created this brilliant infographic that encapsulates the entire Python 3 programming language in a single image. Python is one of the most popular programming languages and it’s a skill every programmer must possess.
Yusheng’s mind map is here for you in easily understandable format that will help you to brush up your memory.
You can find the image online on GitHub, or save it directly from below.
You can also grab your Python Hacker Bundle here.
python 3 in one pic

How Do Cyber Criminals Steal Your Money?

How Do Cyber Criminals Steal Your Money?

Hacker-steal-money
Image: shutterstock
Today is the world where people worry less about getting mugged on street and more on the internet. With the cyber security scams popping out daily, it clearly indicates the route modern thieves have taken. Not at a gun point or knife, your money is now being stolen with utter subtlety, where you don’t even recognize the theft until it is done.
The security of even big commercial banks like J.P. Morgan and numerous financial institutions has been breached and millions of business and individual accounts have been compromised. It seems no armor can provide protection from these Cyber Attacks.

What are Cyber Attacks? Am I vulnerable to Cyber Attacks?

cyber-attack-victimCyber Attacks are the offensive gimmicks whose goal is to extract the personal or classified information from the targeted computer systems or networks. This information is later used to either steal or alter the specified data. On a larger scale, the attacks have the potential to become a threat to national security. These attacks could be made either by the individuals or a full-fledged organization.
“Everyone” is vulnerable to Cyber Attacks. Professional hackers target the users based on their level of affluence and the ease to enter into their systems. The targets include from individuals to large companies like finance and banking and even government owned organizations.

How are YOU attacked by these Cyber Criminals?

Stage I: Identity Theftsms-phishing-scam-email-hackAs suggestive as it is, Identity Theft means that your identity is stolen and anyone could now impersonate you. The thievery starts with an access to your e-mail id. Then you will receive a fraudulent or a ‘phishing’ email that would link you to a ‘phishing’ website. The site looks pretty convincing and genuine. Here you are asked about your personal information and even bank account and credit card details. Sometimes, a humble looking mail also contains malware that would spread into your computer and give more of your personal information such as login account, passwords and other important files to the hacker.
The more information the Cyber Thief has about you, the more you are closer to lose all your money. Not just money, the thief practically becomes YOU in the digital world and can do anything he wants.
Stage II: Draining of Your Money
After becoming YOU, the thief can do online shopping to his hearts fill. Your bank account is compromised.
The money in your account is transferred to ‘certain’ other accounts. Now these accounts could either be created for this purpose, or they could be hijacked by the criminals with the permission of the account holder. From there, your money is simply cashed out and goes into the hands of the Cyber Criminals.
The money from your account can also be flushed out through less obstructed online sites, to the fraud accounts.

Can’t I protect myself from these Cyber Thieves?

Cyber-SecurityYes, You Can. Knowing how you are attacked by these Cyber Criminals is the only way to stay safe. You can’t fight, but you can protect yourself by taking precautions.
  1. Do not click on random emails and advertisements.
  2. Do not reveal your personal information online unless you completely trust the website.
  3. Do not share your personal information online.
  4. Protect your PC with good anti-virus softwares.
  5. Create strong passwords/ passphrases
If at any point you feel your personal information has been compromised at any level, take immediate actions. For eg: If your email account has been hacked, then change the passwords of all the accounts that your email is connected to. Report it to concerned email service provider.
If Your bank account is compromised, then immediately change the information on your online account gateways, like Paypal. If you are suspicious of the activities through your credit card, Immediately contact your Bank.
Did You find the article informative? Let us know in comments below.