31 Oct 2013

Now Amazon Is Just Giving Money Away

Now Amazon Is Just Giving Money Away

Amazon is really rubbing it in. Notorious for its willingness to lose money to drive ever-increasing sales, the company said Wednesday that it is now giving customers the option to donate 0.5 percent of the price of many purchases to charity through a new project called Amazon Smile.
The process is pretty easy: Customers go to smile.amazon.com and choose a charity.Amazon (AMZN) suggests a few, such as the American Red Cross and the Nature Conservancy. From that point on, the donations are sent automatically. There isn't a cap on how much money Amazon will send to charities, but the program does exclude digital items such as Kindle books and recurring Subscribe-and-Save purchases or subscription renewals. “Nearly all physical products are eligible,” says a company spokesperson via e-mail.
This cuts into Amazon’s profit margins, of course, or it would if it had them. The company lost 9¢ per share in its most recent quarter, while increasing 24 percent in sales over the previous year. Once Amazon explained this to investors, its stock price shot up. Call it the Amazon Paradox (as my colleague Brad Stone did at the time).
Amazon does get some direct benefit from Smile, because the company—not its customers—gets the tax advantages of the charitable donations. But the basic strategy is the same as the company has always employed. Do things to draw more customers, even if it means the margins from each transaction get slimmer.
This has led to questions whether Amazon can ever become consistently profitable. Is its sales growth completely reliant on its money-losing ways? Or is it playing a very long game by pumping its profit into long-term investments? Eugene Wei, a former Amazon employee who wrote an interesting analysis of the company’s business model on his personal blog last week, thinks it’s the latter. In many cases, Amazon sales categories are very profitable, but it has chosen to sink everything back into investment, largely into new fulfillment centers. Those investments lead to new sales. Lather, rinse, repeat.
In the same way that customers buy more when they’re offered free shipping, people may spend more when they know a chunk of it is going to charity. That means smaller profits immediately, but Amazon thinks it will translate into bigger ones in the future. Eventually we’ll see if it’s right.

28 Oct 2013

The iPad Era Hasn't Turned Your Kids Into Screen-Time Zombies

Here’s fresh data to fan the flames of a perennial parenting freak out: children and screen time. A new study released Monday by Common Sense Media details the way young children consume electronic media, based on a large national survey of children under eights years old. Yes, everyone’s kids are obsessed with smartphones. The three most striking findings:

Mobile Devices Are Popular—Just Not as Popular as TV: Thirty-eight percent of children under two have used a tablet, smartphone, or other mobile devices. In general, the use of mobile devices is exploding. Three-quarters of households with young children now have some kind of mobile device, and 72 percent of children have gotten their hands on one. That seems to indicate that there is only a four percent chance that you can own a smartphone or tablet and keep your toddler away from it.
Then there’s television. Two-thirds of kids under two have watched TV, and it remains the most popular form of media for children by a mile. In total, 58 percent of children watch TV at least once a day, while only 17 percent of children use a mobile device daily. One-third of children have a TV in their room, with the most common reason being so that the adults can watch what they feel like watching elsewhere in the house.
Rich Kids Use Tablets, Poor Kids Watch TV: The digital divide, that phenomenon whereby wealthier families have better access to the Internet than their poorer counterparts, is shrinking somewhat because of mobile devices. The spread of access to high-speed Internet among lower-income families has stalled, but over half of families earning less than $30,000 now have smartphones and 20 percent have tablets.
A huge difference between how rich kids and poor kids consume media is how much TV they watch. Television time decreases drastically as income and educational levels go up. Richer parents are also much more likely to have downloaded educational apps for their kids than less affluent parents, although that’s largely because they are more likely to own devices that run them.
But Wait—Total Screen Time Is Decreasing: The inexorable march towards zombie children who are glued to screens from an early age isn’t quite a reality, according to this survey. Kids are watching much less television overall and not simply making up for the difference by spending more time on mobile devices.
The total amount of time that children spend looking at screens has dropped 21 minutes over the last two years. Meanwhile, the amount of time that parents spend reading to their kids hasn’t changed. So maybe for now we can postpone the usual parenting panic.

Access any PC without knowing the password.




As you know,getting inside someones pc to which we even have physical access isnt an easy task.
Most of them will be password protected.So here's a simple tool that will help you to get access.
It is KON BOOT.

Rather than cracking a Windows password, KON-BOOT bypasses it and lets you into the computer without typing one in. Then, when you restart, everything is back to normal, that is, everything you didn’t change when you were inside Biggrin

No need of any pro knowledge required.Just download this tool.Burn to a disk or setup live usb.
Plug it into to victim pc.Start the computer.[Image: kon_boot.png]You'll see the screen of Kon boot and it'll restart.Then there'll be no password for logging in.After doing your works,restart again and there'll be password as before and no one know..that you were inside.It is that simple to use.

Download - Link -- http://www.piotrbania.com/all/kon-boot/

Twitter Thinks It's Worth Around $11 Billion. Here's What Happens Next

Now we have a number.

On Thursday afternoon, Twitter said it is planning to put 70 million shares on the market at from $17 to $20 per unit. Based on these prices, the company would be valued at around $11 billion and would raise as much as $1.4 billion. The valuation could rise to almost $14 billion, depending on how employees and investors exercise their stock options.
This is a further reminder that although Twitter’s initial public offering is often held up as the most anticipated since Facebook’s (FB) IPO, the microblogging company is much smaller. Its valuation is closer to Pinterest’s, which investors recently valued at $3.8 billion, than it is to Facebook’s, which went public last year with a valuation of $104 billion.
As for what happens next—well, we’ve been here before. When Facebook went public, we laid out the whole process. The portion below picks it where Twitter is today, with minor differences. We know Twitter will list on the New York Stock Exchange, for instance. But the basic process is the same.
Basically, Twitter’s executives will now hold a bunch of meetings with investors, trying to convince them to buy and hold chunks of stock. Investors will grill them about Twitter’s slowing growth and large annual losses, or they will enthuse about how people like to tweet while watching television. Based on what the company detects, Twitter could change the offering price during this process, which is known as the road show. The official pricing will happen the night before Twitter starts selling shares, reportedly around Nov. 6.
Pricing an IPO is an inexact science, as Facebook discovered. It’s only when shares begin trading that we’ll learn precisely how the market values the company. At which point, we’ll probably need a new graphic.

Protect your computer from keylogers.


What is Keylogger?

Keylogger is basically a software tool
which clones your key strokes
pressed and writes them into log
files. Some smart or simply say
advanced keyloggers are retrieves
the saved passwords in web
browsers and other windows
applications. Hackers use keyloggers
to hack users email account
passwords and other passwords and
monitor their day to day activity.

How the Keylogger Works?

Lets explain this in very simple way,
Whenever you press any key on your
keyboard or laptop your machine
generates a simple key code which
depends on the keyboard format you
are using. That key code tell your
operating system that you have
pressed a particular key. Now what
keylogger does it save your key
stroke into a file. Now further
processing depends upon type of
Keyloggers.
Basically there are two types of keyloggers:
1. Physical keylogger
2. Remote Keylogger

The above processing is same for
both physical and remote keyloggers.
The difference lies in how they are
gonna use a log file.

Physical keyloggers:-

It requires physical access to a
victim's system, so that hacker can
install it manually. He may be your
friend, brother, sister or some close
one who actually has physical access
to your PC or laptop. Now for getting
logs also he has to manually access
your PC to check logs. But nowadays
few good physical keyloggers are
there which sends logs on email
address. So nowadays we only need
one time Physical access and that's
just to install Keylogger and
configure an email address to send
logs.

Remote keyloggers:-

These keylogger are a bit different as
there name suggest they can be
installed from remote, means you
don't need any physical access.
Remote keyloggers during
configuration generates a server that
we can send to victim and which
does not need any installation.
Remote keylogger maintains the
records into log files and when
victim connects to internet it send
the logs to hacker's email address or
FTP account that he has putted
during configuration time to receive
logs.

SOLUTION FOR KEYLOGGERS:

As we all know new keyloggers are
always FUD (fully undetectable) so
our antivirus doesn't show any
warning messages while infection. So
the best method to protect yourself
from keyloggers is that encrypt your
key strokes by using key scramblers.
What a keylogger does is that it
monitors key strokes, so when we
encrypt our key strokes, Hacker will
still receive logs but that garbage as
our keys are encrypted and hence he
doesn't get anything and victim will
remain safe from his keylogger.
Let's understand it with example.
Suppose you have typed:
----------------------------
Anonhub
----------------------------
What key scrambler will do? It will
Encrypt your each key pressed into
some garbage code and keylogger
will get this as something like:
---------------------------
sT@ad9;8in=P*(
--------------------------
So friends what scrambler has done
is that it has encrypted your
keystrokes and saved you from
getting prey to hackers. Secure and
protect yourself from keyloggers as
you cannot avoid them what you can
just do is fool them by encrypting
your keystrokes.
DOWNLOAD KEY SCRAMBLER PRO BY
GOOGLING IT
Source: INTERNET

How to download torrent file with IDM


Hay friends today i'm gonna show you that how to download torrent file in the Internet Download manager.
i know that most of you are want to now how to download the torrent file in IDM with high speed so just follow the below steps to now how to download torrent in IDM.

Steps to Follow:

1) First of all , you have to download the torrent file with the extension .torrent which you wish to download...!

2). Then open up the browser page and go to http://torcache.net/ and post the torrent computer file that you have just downloaded and click on the cache button..,,!

3). This provides you with a new torrent computer file . You just have to copy the address (url) of the new torrent computer file from the newly opened up browser window..,,..!

4). Then visit to the web page http://www.torrific.com/(Down these days) or http://zbigz.com/ (preferable) orhttp://torrent2exe.com/beta/ and make an user account (in case you do not have one) and sign in to your Account. Then paste the address(url) of the new torrent acquired in step © and push the Get Button.,.,,...!

5) Now you will get the list of available Downloadable Files present in that torrent computer file. Then press on the begin bittorrent transmission button. This will provide full choice to download the desired file. Just press on any weblink and you can see the Internet download manager-IDM coming out for downloading the computer file.,.,.!!

that's all guyz now you can easily download the torrent in IDM so happy Downloading and visit us Daily.....

How to fix startup programs on windows 8 doesn’t start on boot


Startup Programs Doesn’t Start on Boot In Windows 8 – On booting your
Windows 8 system you noticed that certain startup programs have abruptly or automatically stopped running at startup or don’t start at all. This can cause severe issues if the system fails to startup programs that are necessary. Failing to
start necessary programs at startup can prevent Windows from booting. In this tutorial we have come up with some
troubleshooting tips to fix this issue on your Windows 8 system.
However, utility programs that are necessary at the startup must be included
in the startup list but crowding the start up can slow down the system and Windows might take much time in loading the
system startup Apps. But at times start up programs fails to run at system boot or say does not startup.

The Solution:

Step #1:

Make sure that the start up programs are not disabled under system configuration.
Other user might have disabled the startup programs without you knowing the fact. So, open msconfig and enable all startup
programs under startup tab and reboot your system.

Step #2:

Try doing Windows refresh.
Refresh your Windows 8 and see if this helps in fixing this. issue. Refresh uninstalls all the non-Microsoft programs but doesn’t cause any harm to documents or files on the system.
Reboot your system after reinstalling the uninstalled software and see if this helps in
booting system properly i.e. allowing all start up programs to start as soon a s the system boots.

Step #3:

Windows 8 comes with fast startup option or say Hybrid Shutdown. This feature allows Windows 8 to startup faster as
compared to its predecessor.
But many folks believe that the Hybrid shutdown can give rise to this kind of issue. Disable Hybrid Shutdown and see if
this helps. To do so, open power options window from control panel and click the link Change what the power buttons
do in the left pane. In the next window that opens, scroll down and uncheck the option Turn on fast startup (recommended) under Shutdown settings.
That’s all. On the next boot you can see that all your startup programs start as usual.

That is it. I hope the problem goes away from now on.

Enjoy!....

Play HD games without graphics card.


These days games that are coming
in the market are having great graphics, smooth game-play and much more but to play these game
you need to have Graphic Cards but graphic cards costs huge amount.
So i have a simple solution to this thing. This might not work as graphic cards work but it will simply enable the game-play so
that you enjoy the new game.
SwiftShader’s modular architecture
is capable of supporting multiple
application programming interfaces,
such as DirectX® 9.0, and OpenGL®
ES 2.0, the same APIs that
developers are already using for
existing games and applications.
SwiftShader can therefore be directly
integrated into applications without
any changes to source code.
So the steps involved are:
1. Download Swiftshader Software
from the link provided.
2. Since it is a rar file so extract it
after downloading.
3. Copy d3d9.dll file from the
downloaded folder x86/x64.
4. Paste it in your games installation
directory.
5. For example: I wanted to run the
Game called Call of Duty Black Ops
then Go to C:\Program Files
\Activision\Call of Duty Black Ops.
5. Just Paste it in your game
installation directory and run the
game.
Download Swiftshader 3.0 for x86bits

Download Swiftshader 3.0 for x64bits

Here is a important notice that keep
your game graphic setting i.e
resolution, texture effects ,dynamic
lights, anti aliasing etc effects in low
profile and you be able to play the
games more smoothly. To increase
your Frame rate Per Second you
need a software called Game Gain.
This software is in trial version but
don't worry guys i have uploaded
the software and the patch to make
it full version.
Download Game Gain Full Version

How to read BAR CODE manually





SHARE THIS INFORMATION FIRST AND READ AFTERWARDS
 Tips to all u friends ...Always Keep Safe!!
 ALWAYS READ THE LABELS ON THE FOODS YOU BUY--NO MATTER WHAT THE FRONT OF THE BOX OR PACKAGE SAYS, 
TURN IT OVER AND READ THE BACK---CAREFULLY!
 With all the food and pet products now coming from China,
 it is best to make sure you read label at the supermarket and especially when buying food products.
 Many products no longer show where they were made, only give where the distributor is located.
 The whole world is concerned about China-made black- hearted goods ,
Can you differentiate which one is made in Taiwan or China ?
 The world is also concerned about GMO (Genetically Modified Organism) foods;
 steroid fed animals (ex: 45 days oldbroiler chicken).
 It is important to read the bar code to track its origin. How to read Bar Codes ....interesting !
 If the first 3 digits of the bar code are 690, 691 or 692, the product is MADE IN CHINA. 471 is Made in Taiwan.
If the first 3 digits of the barcode are00-09 then it's made or sourced in USA.
This is our right to know, but the government and related departments never educate the public, therefore we have to RESCUE ourselves.
 Nowadays, Chinese businessmen know that consumers do not prefer products "MADE IN CHINA" so they don't show from which country it is made.
 However, you may now refer to the barcode - remember if the first 3 digits are: 
890......MADE IN INDIA
 690, 691, 692 ... then it is MADE IN CHINA
 00 - 09 ... USA and CANADA
 30 - 37 ... FRANCE
 40 - 44 ... GERMANY
 471 ........ Taiwan
 49 .......... JAPAN
 50 .......... UK

Anti-virus business



For several years, the anti-virus industry has anticipated that somebody might turn the distribution of computer viruses into a money-making enterprise. The first glimmer of such a trend began as early as 1987, with the lunch of Ralph Burger’s book computer viruses: A High tech Disease, which featured live virus code. Soon after, others began to cash in, and there are now several different books in a similar vein.
     The next step in the process was the lunch of mark Ludwig’s magazine Computer Virus Developments Quarterly. Claiming to a publication aimed at virus-aware MIS manager, the magazine included material which would help a reasonably inexperienced programmer develop his own virus code.
    The most recent step in this chain of events is the publication of Ludwig’s $100 (RS 3200) CD-ROM, blandly titled The Collection, Outlaws from America’s Wild West. This disc represents the largest collection of virus information ever made available to a wide audience.
     The Ludwig collection poses many problems for the industry; the greatest of these is that, with large amounts of virus code available, it is likely that an upturn in the number of variants of particular viruses may occur. How the industry and the computing community chooses to deal with this CD-ROM is a subject open to discussion, but if action needs to be taken, it needs to be taken soon.                                                                                      

TAKE SCREEN SHOT WITHOUT ANY SOFTWARE

How to take screen shot without any software by following simple steps Today many people take screen shot of their active window u...