Questions? Feedback? powered by Olark live chat software
| Get: Our Articals In Your Email | Get: 120 Important Softwares all on DVD | Buy a VPN Or Proxy to get free internet | Contact Us


Ads 468x60px

Showing posts with label Hardware. Show all posts
Showing posts with label Hardware. Show all posts

Monday, 10 August 2015

How To Hack YAKA (UMEME) Meter [Get Free Electricity]

AD -----------
Let's create professional Social Media Posts for your Business at as low as UGX 75K ($23).
Social Media Marketing has never been this simple, fast, and affordable: www.socialclark.com
------------------------

If you live around Kampala, chances are you have already been moved from the digital electric meter to what UMEME calls "YAKA" If UMEME hasn't brought YAKA to you"YET", you can be sure they are soon at your door step any time from now.

This article is only for educational purposes and so i won't be held responsible for your actions.

In this article, there comes lots of theories and just one proven method to hack the YAKA prepaid meter.
So, What is Yaka Really?
Yaka is an electric meter particularly made for UMEME by a company based in South Africa called Conlog to reduce on electricity hacking and get ride of their meter readers pay role. However, after all this time in deployment, YAKA is after all not a full-proof solution for UMEME. how? UMEME as a company doesn't really make these meters. All the work is done in South Africa by a company called Conlog. You want to hack YAKA? Conlog is the real deal. Here is an article that was written by Conlog in 2011 when it all started: New business methods in Uganda


As these guys' website say's "Conlog has been leading the prepayment industry for more than 20 years. Our solutions bring the best in metering, vending, revenue management and associated support services, to ensure the sustainability of your project, now and tomorrow... "
Really you got to give credit to these guys.
Now. getting into the Hacking, In a video, I found online, I gathered that one has to actually open up/ break into the casing of the system if they wanted to hack it

In the above video, A technician at Conlog South Africa takes us through how conlog meters are made and somewhere along the lines he mentions something about how to get through it. Even though most of these meters are tamper-proof in that it might not go back together as it was after you break it.

Apart from this hack, there are a lot of theories including something i mentioned in my previous How To Hack A Weel meter which is Adding strong magnets side by side which personally I don't think will ever work since nothing metallic actually determines the electricity usage. I will outline and maybe talk a little of what i know about a specific theory and then I will give you something that actually works. and actually worked for a few people I know however later ware caught and hard to pay a few fines.

This article is only for educational puposes and so i won't be held responsible for your actions.

Theory 1: Attacking a smart meter’s memory-through hardware.

Theory 2: Using a digital radio to Hack a Smart Meter

Theory 3: Accessing the meter with a wireless Device

Theory 4: Spreading malware to the Smart Meter’s network

Theory 5: Measuring the Smart Meter’s electrical consumption

The 5 out lines are all from here: 5 Hacks That Render Smart Meters Dumb

Personally i didn't find any of these really help full but maybe some one out there could check it out and may be find a more effective hack. I call them theories because i didn't relate any to our country and, quite honestly i don't think of YAKA as a Smart Meter. Its just a prepaid electricity device that was introduced to Uganda a few years ago.

The Yaka meter in your house is just for outputting and inputting data, like typing in your token, and displaying how much you have left. Actually, the real magic happens up on the electric pal on that box/s hanging and that's where your meter in the house gets and puts all its information. so you could say if your credit is due, your meter only sends a signal to the big box on the pole through the wiring and then, its the circulate breakers job in that box to turn your power off. even when you load a token, the meter only sends it to the box, then the box again, Does the magic to calculate how much the code you brought has to give you. Don't be fooled, those meters don't have a network system otherwise they wouldn't have wires from the pole's box. i have hard people talking about how the meter is connected to umeme offices but think about it, Those guys can only tell when you last bought or loaded a token and all about the previous purchases, but they cant tell how much electricity was used in a day or a satain week. Now did you know that if you call your phone number's service provider and ask them how you have used your credit they will give you full details of when and what you used it, But UMEME can't. and that's one of the reasons i don't like to call it a smart Meter otherwise i think every smart device has got to have network/internet. Ok what does all this lead us to,

We know that all the math and magic is done on the big box on the poles. But how do we get to it, If you are human enough, also not a professional electrician, am sure i don't have to tell you it's just crazy climbing an electric pole. So please don't. as i said, this is only for educational purposes even though you may get some professionals to climb and confirm for you. I may self haven't been up there but i am telling you this after a long time of research and I have seen this working in a few places.

Now for the steps.

Again: This article is only for educational purposes and so i won't be held responsible for your actions.

After climbing that pole, What you need is anything that can cut through an electrocuted wire and a non-conductor of electricity.

Step 1: Trace for the big-black wire that brings power to your house.

Step 2: Find the pole on which it's attached. [One of the wires in the big wire should go directly to the box which then moves on out to a live wire on the pole]

Step 2:  Cut the live wire to the box from the black wire of your house [Red]. After citing it from the box, the meter at your house should power off

Step 4: Connect the wire you cut to the same red wire the box is connected to [the wire that passes power through the box]

At this time, power comes to your house. But this time, all Free. Any electricity used after this will be free. Enjoy!

Note: The wiring will not be the same for all cases. In some places, several houses can be connected to the same box on the pole. In this case, refer to "How it works" below.

How this works:

In this trick, all we did was to bypass the system in the box at the electric pole. So the meter will think the power is just off and so causes it not to calculate any more power.
For the case of a number of houses connected to the same box, just identify your own wire and find a way to bypass that box.

Like i said: This is only for educational purposes and so i won't be held responsible for your actions. and be care full.



AD -----------
Let's create professional Social Media Posts for your Business at as low as UGX 75K ($23).
Social Media Marketing has never been this simple, fast, and affordable: www.socialclark.com

Continue Reading...

Friday, 5 June 2015

A New Keyboard that Will make Your typing Speed 100% faster in 20minute


want to type faster then here is your answer 



When Ray McEnaney types, he's confident it's the most efficient way possible. But it's not typing school that's given him this feeling. It's his keyboard. Frustrated with the limitations of the traditional QWERTY layout, McEnaney spent the last decade designing a new one. Considering that the universal key arrangement was designed in the typewriter age — patented in 1878 — an alternative seems due. This one's inspired by a bee.

McEnaney wasn't satisfied with other typing options people turn to — the most prominent being Dvorak, which aims to minimize how far the fingers travel and reduce fatigue. He thought the learning curve was too great: Users need to seriously commit to becoming proficient. That's how we get to the BeeRaider, his oddly shaped keyboard that resembles a bee in flight, with two "wings" of keys arranged on either side of a radial center. It's a buzzy concept: The layout is larger, with the keys you need most at the center (which gives you less fatigue, McEnaney says). Keys that he considers "more useless" — including Q, K and X — are placed farther away.

He promises that anyone can become a capable BeeRaider typist in 20 minutes. The secret? The key position and the related mnemonic learning tools, through which you practice typing phrases like "I hate waste excess" and "Just before dawn starts." It's a little weird to type in such a fashion, but I was surprised at how natural it felt after five minutes, my fingers somehow finding the letters they needed. Having the alpha characters — the keys used most often — grouped together really helped memory retention as well.
But Kristy Snyder, a cognition and cognitive neuroscience researcher at Vanderbilt University isn't sure that keyboard layout can affect typing speeds. She's been experimenting with typists' memories of their keyboard, and she found that most can only identify half the keys they use daily. "We think that it's an implicit knowledge of where the fingers go; the motor system learns where the keys are, and that's how you learn to type," she says. She found that using Dvorak and QWERTY layouts were unconnected to retention, "suggesting that typists know little about key locations on the keyboard, whether they are exposed to the keyboard for two hours or 12 years," she says.

This makes the likelihood of the BeeRaider taking off more plausible; if people have no intrinsic recollection of keys, they should be open to a new way of working. "Using a new system could be better than QWERTY," Snyder says, but having to change key mapping could be difficult.

If you're up for the challenge, the BeeRaider is available for preorders at $112.49, and you can choose between the optimized layout or the radial QWERTY design. Mobile users can try BeeRaider's Android app ($1.92), though it's somewhat tricky to use on small screens. All in the name of being able to tap out "The quick brown fox jumps over the lazy dog" at superspeeds.
Continue Reading...

Wednesday, 27 May 2015

Android M is about to add native support for fingerprint scanners


One of the reasons for lack of widespread presence of fingerprint scanners on Android devices is the lack of native support in Android, relegating it to just unlocking the phones on which it is present. But that might change soon.

 


One of the reasons for lack of widespread presence of fingerprint scanners on Android devices is the lack of native support in Android, relegating it to just unlocking the phones on which it is present. But that might change soon.

According to BuzzFeed and Ars Technica, Google might announced support for fingerprint scanner in Android M at I/O 2015. although the company declined to comment on that. Ars Technica found commits in AOSP for Nexus 6 for a fingerprint sensor, which Google has been working on on the software side. The Nexus 6 was also supposed to have a fingerprint sensor but according to Motorola ex-CEO Dennis Woodside, Apple bought the one good company that made those.

With native fingerprint scanner support in the OS, all the apps can tap into it and use it for authentication. You would be able to use it for your Play Store purchases, or Google Wallet authentication, or for apps like 1Password, Authy, Dropbox, OneDrive, Simplenote, or any other app that allows you to use a passcode lock, and that currently use Touch ID on iOS, can be used with the fingerprint scanner if they add support for it on Android.

Currently very few Android phones have a fingerprint scanner, with only the recent Galaxy S6 and S6 edge having implemented it the right way, but we could see more devices in future if Google does decide to include it in Android M.

Continue Reading...

The World’s Fastest 128GB DDR4 RAM Kit

The new HyperX DDR4 128GB memory kit that runs at 3,000MHz, which makes it the fastest such kit in the world. This kit was unveiled last week by HyperX parent company Kingston, which explained that “the kit consists of eight 16GB HyperX Predator modules (16GB x 8) motherboard in an eight module, quad-channel configuration along with an MSI X99 MPOWER motherboard in an eight module, quad-channel configuration along with an Intel Core i7 5820K processor.”

Similarly, Corsair earlier this month released 128GB DDR4 RAM kits of its own that are designed to work with Intel X99 series motherboards and that run from 2,400MHz to 2,666MHz.

As you’d expect, these RAM kits are also insanely expensive — the cheapest one costs $1,755 and the more costly ones go well north of $2,000. All the same, if you want to make absolutely certain that your PC has enough RAM to run any game for the next several years, investing in these kinds of RAM kits will definitely do the trick.

Continue Reading...

Tuesday, 26 May 2015

Apple Makes A MacBook Pro With, iMac Features and Pricing

Last week Apple announced performance enhancements for the MacBook Pro and a new configuration and price changes for the iMac.

The new 15-inch MacBook Pro with its Force Touch trackpad and improved flash storage, battery and graphics performance is available immediately online, starting at US$1,999 which is about 6,036,980 UG.

The Force Touch trackpad first appeared in the latest 13-inch MacBook. It includes the taptic engine found in the Apple Watch, which provides tactile feedback for tasks. It also includes Force Touch features that let users customize the pressure sensitivity of the trackpad.

The 256 gigabytes of flash storage make the new MacBook Pro 2.5 times faster than the previous generation. It also has longer battery life up to nine hours and its AMD Radeon R9 M370x graphics card is 80 percent faster than the one in the previous MacBook Pro.
It comes with 16 GB of RAM and a quad-core Intel Core i7 processor running at 2.2 GHz.

For the Apple lovers in Uganda, start growing your pockets hard.... Really hard
Continue Reading...

Wednesday, 3 December 2014

How I Became a Computer Guy. [The Beginner's Guide to Geek]

In this post, i wish to tell you my story. a story i didn't expect to talk about this early but couldn't avoid for all that's happening. I'm also starting a series of posts to guide the new entrants to the geek community.

(UPDATE: I have now devoted to developing and designing fantastic Websites at ElitNex Website Developers Uganda )

Hints to hacking is a Face book Group I created out of the love I hard for computers that later turned me into more of a hacker than an average geek. I spent lots of sleepless nights even more than the ones I have spent trying to learn Coding. In this time I learnt something I was supposed to have learnt years ago “If you got to do it, do it for the Good in it. A lot of beginners go into it after hearing stories or watching that movie that portrays hacking. Well tell you what, That was me at 16 years of age and as an admin at Hint's to hacking, Trust me when I say 60 % of those that ask me about hacking want to hack their girlfriends / boyfriends face book or computer passwords, school networks or friends and relatives. Really most beginners are motivated by Hacking the wrong way [black hat]. I have seen this first hand since I myself was 50% motivated by the stories about hackers giving banks hard time. I'll begin another series come January 2015 about Hacking where I will be talking about Hacking so please keep around if you must.

My arrival to here wasn't an easy one. I am choosing to ignore my life before Hints to hacking so I don't bore you with my long life story. I have always been inspired by computers. From the movies, the stories, even in real life. However, starting my journey as a group admin was not exactly what I expected but it worked out just fine. So how did I come to be one, I hard knowledge I needed to share, but the luck of a way to share it made me do a little research. Then I found a way. It was a face book based group administered by a one called Titus Mukisa. And that was how it all began, after participating in the group for some time, I realized Titus's group didn't have the right people I wanted to share my knowledge with, I wanted a specific kind of people that would all share and learn from each other as hackers. But Titus’s group hard more of IT guys than hackers. Don't get me wrong I loved the group, hey I still like it. But I loved Titus's dedication to the group more. That's the kind of guy I wanted to be. But for the Hacker community and so I started off by thinking of a name for a new group. It’s that moment that it hit me I had already made a face book page Hints to Hacking and someone hard suggested I made a group to. It took me a few mints to create and get the group started. I added one close friend then went ahead to share the group to all my friends and in groups including Titus’s Group and within a week, Hints to hacking went from 2 to 300 members. The next week I added all my friends making us about 500 and came to 1,500 Members after a moth. During this time was the time I became more respondent, supportive and got to know a lot of people some of whom I still have as my friends up to date. This was the time I felt like yes I did it and it was the time when all the group was so active interactive and all good but wait,Scamming, Spammers, Script kiddies and all other kinds of bad guys were also in the group though all of it was controllable at that capacity and I had time. In the year 2012 the group had grown from 1000 s to 10,000 s. We were over 17,000 Members. Now we are a group of over 40,000 members and still growing with daily Join requests in the group.
There have been a lot of ups and downs as the world translates it. A lot of times I abandoned the group and more of times I came back and shared what I could. All this time wasn’t because I wanted to stay away but because of all I hard on my plate to handle. A time came when I had to spend two days without sleep, when I had to miss lunch or breakfast because I hard to buy an Internet bundle. I did all sorts of things to stay on top of my game until 2013 when I felt I should try something. Something new. I knew some programming since it was kind of a requirement for hackers though a lot of it was really more of networking and computer side trickery than programming. I didn't have that much interest in programming and it was only at that time I found a friend in my networking class “CCNP” at MUK who made me a small calculator on windows with programming language called python. Well, I came to be interested and given i had read somewhere about C++ being the language for hackers i went for it so i could mix it with my hacking skills. Well yes I did try it, for a moth or so and  I was all C++. I went ahead to research about everything a C++ programmer can do in Uganda and, Well, the results were alarming and really disappointing. The results not only gave me a bad felling but it also left me half backed on C++. The next week I found a book called “C++ for Hackers”  downloaded and read it. It was a very brief book about C++ and so gave me an over view of what the language was really about. I will later be giving you download links of the books and applications you may need in the series. Please don't be demotivated to learn C++ because I found it to be very useful and handy especially if you are into making windows Games, applications and drivers, C++ can do almost anything from operating to another.
As I completed with Networking at The College of computing and information science Makerere University, It hit me to start a blog and so I did start it like seriously. At ethertek.blogspot.com. As the year ended I really go into Web Development and got good at HTML and CSS3 that is how I modified my blog’s looks to be my own. In 2014, an offer from a friend I made in my group to host my blog at a good price surfaced and so I went for it. Until now I have been learning more about Web Development.

So why did I chose Web Technologies to Application development for windows in C++? Well it’s all about what interested me more. Why Web Technologies interested me and why it might be the next big thing. I’ll talk about this and the other things that could interest particularly you in The Beginners Guide to Geek #2.

Computer Repair, Software installation, Computer support and advisory, Web designing ETC. That's a list of a few of what I hard to do for the money to run my projects. It always wasn't that much but it did just fine for me. I also made a disk of soft ware’s I called “The 120 Softwares All on One Disk” which was a combination of 120 Softwares compiled to fit the average users software needs. I put all the soft ware’s on one 4.7 GB DVD and sold a copy at 9,500 UGX this was one of the best ideas I hard in 2013 and although the money seemed OK, Really it wasn’t enough for my projects and the time I invested in it. Also I also hard to deliver the disks myself or pay a delivery man 4000 UGX to deliver it around town. So for that I later raised the price to 18,000 UGX. I’ll briefly talk more about this in the part where I talk about making money from the Computer world.

Early December 2015 Am releasing another version/ Update for the disk and this time it's called: THE MULTI-SOFTWARE DISK. I have worked on this for over 3 month now and hopefully will take care of all the resources and time I‘ll put into this series. ”The Guide to become a geek
THE GUIDE TO BECOME A GEEK will be a series of posts I will be posting to this website and could go for at least 2 month. This string of posts should be able to get pretty much any one to understanding of computers to even the programmer level it all depends on your tests and preferences.
This should mark the end of the first part otherwise you would have to read until tomorrow if I am to right it all down in this post. Next time we will get into what being geek means and what are the basics. Hope to see you in the next post, Stay loving.

SUBSCRIBE To Get The Latest Updates In Your Email.

Want to Talk? Call me: 0704359301 | Also Like us on Facebook

Also, Dont forget to like Elitnex's Facebook Page
Continue Reading...

Tuesday, 16 September 2014

How to Change Your Processor's Name Permanently

Changing your processor name is a tricky thing all together. In my past experience

It was possible to change the processors name but it would only change temporarily and The name reverted back to the original one  After a restart,

 How to go around the above, It needs you to It is easy to change your processor name permanently by creating a registry key and placing a shortcut to it in the Windows start up folder.

To do so, just follow the steps below:



Steps1:

 Open Notepad to Copy and paste the exact code given below:

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0]
"ProcessorNameString"="Your Processor name 50000MHz"

 2:

Edit the part of the code given in Red. Also understand that \0 in the above code should only be present if Windows store your processor name at that location. Open the Registry Editor and navigate to the above mentioned keys to check whether or not to include the \0.

3:

Save the file as ProcessorName.reg or *.reg. (Your Choice)

4:

Find the file you created and right click on it and go to "send to" then select "Desktop"(This will create a shortcut on the desktop)

5:

Now copy the short cut from desktop.

 6:

Navigate to[ C:\Documents and Settings\All Users\Start Menu\Programs\Startup (in Windows XP) or to C:\Users\ User-Name\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup (in Windows 8, Windows 7 ]. Remember that AppData is a hidden folder.) So use folder options to unhide all folders.

 And lastly:

Paste the copied file.

<Logic>

This registry file would now execute each time when Windows starts and the Processor Name String would be modified each time. This means that even upon restarting your computer, you will see that the changed processor name you made it to be.

Any questions, Please Post it in the comment section. I promise to solve it.

Also Read: << A Simple Computer Trick to make Your Computer screen Matrix >>

<<=========== RUUT.ug ===========>>

Ethertekug.com has been shifted to  www.ruut.ug and will make NO MORE Posts.

PLEASE VISIT: WWW.RUUT.UG

<<=========== RUUT.ug ===========>>

 

Continue Reading...

Saturday, 6 September 2014

How To Know If Your Phone Is Made In China

<<=========== RUUT.ug ===========>>

Ethertekug.com has been shifted to  www.ruut.ug and will make NO MORE Posts.

PLEASE VISIT: WWW.RUUT.UG

<<=========== RUUT.ug ===========>>

 

Below are characteristics of phones made in China or should i say Fake Phones


Really, Don't take this for serious some china phones are fine, I am sure most of us are familiar with the term "China Phone" actually means "Fake Phone". One time a friend told me he made a google search of "Fake Phones" and The results Said: "Did yo mean Chines Phones?" As phones have evolved, Chines phones have stayed fake especially in Uganda.

And here we go:

1. It gets full after 3 minutes of charging..

2. The phone has TV, Touchscreen, Nail cutter, fire lighter etc.

3. Text message can be written with a toothpick.

4. There are some spelling mistakes e.g NokLa, blackderry, i-porn, samswag etc.

5. When an aeroplane passes by it records"one missed call"

6. When a big truck hoots; it records "charger connected"

7. When a Chinese man passes by you it says "one Blue tooth device found."


More from here: www.facebook.com/ruutmag

Also see: SMART PHONES: Why you Need One, Which One & Where To Buy One

 

<<=========== RUUT.ug ===========>>

Ethertekug.com has been shifted to  www.ruut.ug and will make NO MORE Posts.

PLEASE VISIT: WWW.RUUT.UG

<<=========== RUUT.ug ===========>>

 

Continue Reading...

How To Disable USB ports On Pc To Avoid USB Viruses And...

Make your PC invulnerable from data theft and malware which spread through USB ports. This works on Windows XP, Windows Vista, Windows 7 and Windows 8.

With this trick, you can disable access to your USB (Universal Serial Bus) ports on your Windows based computer to prevent people from taking out data without permission or spreading viruses through the use of USB (pen and flash) drives.

Follow the steps given below:-

Steps:

1. Click on Start >> Click on Run. If you cannot find RUN just type it in the search box.

2. Type "regedit" without quotes. This will launch the Registry Editor./>

3. Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\usbstor.


4. In the work area, double click on Start and In the Value Data box, enter 4 click OK

You are Done. Now just Close Registry Editor and refresh your desktop. That's it.
And  now if any one trays to enter their UBS disk, It just doesn't work.

Help?

To Re-Enable access to USB ports, Follow the same proccess as above but enter 3 instead of 4 in the Value Data box.


WARNING: This trick will also disables access to your USB connected peripheral devices. So, do not use it if you have USB connected keyboard and mouse.
Continue Reading...

Google Is Building The Fastest Computer On Planet Earth

Google wants to take computing to warp speed and so what better way to do this than do exactly what they just did. Google has partnered with UC Santa Barbara researchers to develop quantum computing

The internet search company announced a new partnership with researchers at the University of California Santa Barbara to develop "quantum computing" technology.
What is the science behind quantum computing? : This is a highly technical though still very theoretical. In simple terms, quantum computers make use of quantum bits, or qubits, to process information, as opposed to the binary system of ones and zeros used by traditional computer processors.

Scientists say qubits can behave like ones or zeros, or both. In theory, this should make quantum computers exponentially faster than digital computers that use a binary system to process information.

China is currently, China is home to the world's fastest computer, "The Tianhe-2" supercomputer, which is capable of nearly 55 quadrillion of calculations per second. After the development of quantum computer, 55 Quadrillion could look really snail.
The Partners have said they will form a "quantum artificial intelligence team," to lay the groundwork for quantum computing.
Before this, Google heard already been working with scientists at D-Wave Systems on a quantum computer system developing what some call the first commercially viable quantum computer, "The Vesuvius" Google is also working with NASA on a 1,000 qubit "Washington" processor.

Wishing these guys a success. Surely at the end of it all, We all need a faster Computer.

Also Read:  SMART PHONES: Why you Need One, Which One & Where To Buy One

Continue Reading...

Thursday, 7 August 2014

Stop Sharing USB Flash Disks."Right Now"

It's time to start thinking of  USB Flash drives like toothbrushes or under wares -- for personal use only.

A German security research team has discovered that USB-connected devices have a fatal flaw. Anything that connects via USB can be reprogrammed to pose as another device.
That means a stranger's USB stick could dupe your computer into thinking it's a keyboard, then type in certain commands and quietly take control of your computer. Perhaps your network too.
By posing as a network card, It can then reroute your Internet traffic so everything you do can be spied on. Usb disks can be alot to handel when it comes to Identity theft, bank fraud, extortion, you name it.

A few Cyber security experts, like Rapid7's Trey Ford, say the danger of sharing USB devices have been spotted before."The implications are now clear. Downloading the wrong app can infect your phone, then compromise your computer. And borrowing a stranger's USB stick could infect your computer permanently." Said Karsten Nohl SR Labs chief scientist , also a member of the team that discovered the flaw,
 Nohl also said: "Someone asking, 'Can I charge my Android on your computer?' will have a much different connotation in the future,"
As said by Nohl"The implications are now clear" But hey, problem remains since modern day antivirus and protection software won't catch it because USB duping isn't technically a computer virus, just a device posing/Impersonating as another one. So, there's no solution for it right now

These kind of hacks haven't been reported any where here in Uganda. but hey, you never know when it gets here or even if it's already here. in this error of .com, knowlege is only a click away.

At this point you can only hold our Flash drives and smart phones tight + our computer's USB ports secure as you wait for a more secure way to interact with UBS Drives
Continue Reading...

Tuesday, 22 July 2014

Simplest Way To Increase Your WIFI Signal Strength

One real weakness you must have noticed if you are a WI-FI fan is the poor SIGNAL STRENGTH. The more you move away from the antenna/s. This means your Internet will have issues the farther you are from your WI-FI antenna. Especially if you are behind Walls in a house or where ever you use your Internet from.


Today. I will take you through an easy, inexpensive and time saving way to get the best signal strength off your WIfi Router. This trick involves a beer or soda can. You can also use any other cans used to package any other drinks.I know in Uganda it's very hard to find soda cans because of the bottle domination but i am sure if you put your mind to it, you should be able to find it.

All we need:

scissors or knife - To cut the can
tape - To hold the cut can on your router.
Wireless Router - Has low signal WIfi
Laptop/Mobile device - To test signal strength

All this is as simple as the image you saw above. You Just need to cut an empty can with a scissor or knife just like you see in the Image below:


Now you just need to place this cut can just behind your Wireless router just like in the first picture. I recommend you use a tape to hold the can tight to the antenna. But if you may, find something to hold it.

Now Place the Can Behind the antenna of your Modem so that it captures the signals and wont let the signals go pass.

[NOTE] This trick works best if you face the can to the direction you want the signal strong. Just like a sate light dish.

So Whats It. Be sure to enjoy a better WI-FI signal with this trick  I guess i'll be seeing you in my next post.

<<=========== RUUT.ug ===========>>

Ethertekug.com has been shifted to  www.ruut.ug and will make NO MORE Posts.

PLEASE VISIT: WWW.RUUT.UG

<<=========== RUUT.ug ===========>>

Continue Reading...

Sunday, 20 July 2014

Charging Your Cell Phone Battery Full In 30 Seconds

Owning a Smart phone is not the hard part any more, but keeping it's battery power on is the great deal (Frustrating and time consuming). Just charging a smart phones battery could take up to a full hour or even two,which in most cases will last for less than a day.

This might all change in a time not far from today. Bassed on a video posted on you tube by an Israeli Company called StoreDot.This video has in it a prototype of this amaizing technology that can actually charge a phone battery in only 30 seconds. Don't belive this? Watch this

Related Post:-How To Maximize Your Phone's Battery Life

VIDEO:

This battery does not only  charge quickly but it as well stays charging even when unplugged from the charger.
StoreDot, says the technology started as a research project at Tel Aviv University.The technology in this video is said to work under specific amino acids isolated and then used with peptis to create nonocrystals.
The company is hoping to release their product to the public in two years or less since the only challenge they face is packaging this product in portable form.

Related Post:-How To Maximize Your Phone's Battery Life

<<=========== RUUT.ug ===========>>

Ethertekug.com has been shifted to  www.ruut.ug and will make NO MORE Posts.

PLEASE VISIT: WWW.RUUT.UG

<<=========== RUUT.ug ===========>>

Continue Reading...

How To Maximize Your Phone's Battery Life

<<=========== RUUT.ug ===========>>

Ethertekug.com has been shifted to  www.ruut.ug and will make NO MORE Posts.

PLEASE VISIT: WWW.RUUT.UG

<<=========== RUUT.ug ===========>>

 

We have all encountered that time when battery is ruining down and we go like "Oh no. I got to make that important call, Some of us have phones that last half as long as it used to a year ago.


But how much of this is our fault. And how much is it on the phones makers? Can we do anything about it? YES. There are a million ideas for maximizing the life of a cell phone battery. Here's what you need to know.
There are a million ideas for maximizing the life of a cell phone battery. Here's what you need to know. Maximizing your phones battery life is all based on several theories though proven to work for most phones. Some times it really depends on your devices battery type, and phone usage.

Getting started, I'll start with Charge Frequency:

So i was born in the 1990z, By the year 2000, I heard brains to think and remember. In those days, rechargeable batteries worked best when fully charged (100%)- then fully used to (0%) the it was considered safe to Fully charge again But over the years, materials have changed, and so have the rules. Today Experts recommend that Chargeable batteries stay between a minimum of 20% to a maximum of 80%.this will help maximize the capacity of the battery over time.In my opinion, This best applies on Li-ion butteries of 3.7 V.This is what comes in all smart phones i have seen and most other phones.
[NOTE] This doesn't mean you shouldn't fully charge your battery. but says how fine it is If your phone's battery doesn't always fully charge or completely go Down.

Related: Charger fills your battery in 30 seconds

Silent but consuming:

 Many battery life issues can be caused by over seeping processors and power full hardware, It's not always about Just about the hard ware.But the softwares insted. Verry many android phones consume alot of battry becouse of applications runing in the background that you probaply dont even use. So if you can figure out what apps you use and those you dont, Please try to uninstall them or atleast turn them off.

Messaging apps:

Facebook Massnger, Wats App, Viber and all those instant massaging applications consume just alot of power cince they have to constantly check in with the cental server for new massages.hence puting the batrry on a constant release of charge. Some times, It's the couse of phones that are ever worm.

Temperature rising:

When it comes to long-term battery life, heat is the great killer. If your device constantly runs hot, you can expect your device to degrade quicker. In the case of cellphones and tablets, there's not a whole lot you can do about this if you discover issues with heat after buying, but you'll at least have some idea as to what's causing those rapid power drains.

wireless & Bluetooth features:

Please remember to switch your wirless and blue tooth features when you are not using them. this misght save you a few minutes, but the few could be all you need to make that call.

Screen brightness:

Your screen brightness cotributes alot to your battery life.Keep your brightness as low as works for you, as screen display could save you a few minutes but it could be those few that you need to make that important call.

Related: Charger fills your battery in 30 seconds

In conclutions. We all know this: It doesn’t matter how you deal with your phone, The battry will still go out. Question: How murch can you save?

<<=========== RUUT.ug ===========>>

Ethertekug.com has been shifted to  www.ruut.ug and will make NO MORE Posts.

PLEASE VISIT: WWW.RUUT.UG

<<=========== RUUT.ug ===========>>

 

Continue Reading...

Saturday, 8 February 2014

HOW TO HACK A VOLTAGE COIL ELECTRICITY METER

This is a very simple 1 considering my previous post about hacking a digital meter.























In this hack. all you need is a very powerful magnet. the more powerfully the magnet, the slower your Voltage coil rotates.

Here are the simple 3 steps:


Step 1:
Find a magnet as strong as possible
Step 2
Use a rope to tie the magnet just on top of the magnet.
Step3
Enjoy the %[percentage] of the electricity you are saving.







Note: This trick will work on only a voltage coil trick and it depends on the strength of the magnet you are using. Use an industrial magnet if you have one

[WARNING]: 

Please use this at your own risk. For i wont be responsible for your actions

YOU MIGHT WANT TO READ MY ARTICLE ABOUT: HOW TO HACK A DIGITAL METER

ENJOY !!!

AD -----------
Let's create professional Social Media Posts for your Business at as low as UGX 75K ($23).
Social Media Marketing has never been this simple, fast, and affordable: www.socialclark.com


Continue Reading...

HOW TO HACK A DIGITAL ELECTRICITY METER

AD -----------
Let's create professional Social Media Posts for your Business at as low as UGX 75K ($23).
Social Media Marketing has never been this simple, fast, and affordable: www.socialclark.com
------------------------

[WARNING]: This tutorial might be illegal in some Countries if not all]

“This article is only for educational purposes and I won’t be responsible for your illegal electricity connection ”

Let’s get started. In this article I will be reviewing and showing you the possible ways to hack electricity then I will also review UMEME’s new method to prevent electricity hacking.



For security purposes, I won’t be giving detailed information and please don’t call me so I can hack electricity for you.

Hacking the digital meter surely proved an easy task as UMEME realized it was loosing a lot with them and that’s why they are deploying the YAKA meter (which am going to be reviewing in the coming week by the way). I will talk about Yaka at the end so for now let’s stick to hacking a digital meter.

Hacking a digital meter is just common electricity knowledge.

[What we need]

First what you need to have basic knowledge of what electricity is. All you need is a strong copper wire about 12 Inches depending on the distance between your digital meter and the Fuse inside your meter box.

[How it works]

See that wire most probably black from the electric Pole to your house? All it does is brings in electricity, The electricity is put into the meter box and fixed into that plastic object where a fuse is placed. Your digital meter then connects to the other end of that plastic object with 2 wires most probably Red and Black. These wires are called “Red=Live, black= Neutral] and another wire Green= Earth is directed in the ground” however your colors might defer. Ok now all a fuse does is combine the black wire to the meter when placed between the black wire and the digital meter on that Plastic object in the meter box. All we need to do is bypass this circuit by removing the fuse and replacing it with our own circuit using a strong wire.

Steps:

1. Remove at list 2 inches of rubber off each side of your copper wire.

2. Bend the coper wire so it can move from the fuse to the digital meter.

3. Remove the fuse from the meter box [This will disconnect your electricity]

4. Now you should see the red wire connected to the Plastic object. What you need is to carefully insert one end of the strong wire into the downer section/hole of the plastic object and the other end to a wire mostly red that enters your meter from your house.

In this trick, you are connecting the red live wire which has electricity direct to the live wire taking electricity in your house without passing through the digital meter that filters and counts your electricity Usage.
Now you can enjoy free unlimited electricity.
You might want to check out how to hack a voltage coil electricity meter too

NOTE: Remember this tutorial is only for educational purposes. And, [I won’t be responsible for your actions].

ENJOY !!

DISCLAIMER: This article is only for educational purposes and so I won't be held responsible for your actions.




AD -----------
Let's create professional Social Media Posts for your Business at as low as UGX 75K ($23).
Social Media Marketing has never been this simple, fast, and affordable: www.socialclark.com


Continue Reading...

Friday, 7 February 2014

HOW TO UPGRADE YOUR COMPUTER’S [ BIOS ] SETTINGS

AD -----------
Let's create professional Social Media Posts for your Business at as low as UGX 75K ($23).
Social Media Marketing has never been this simple, fast, and affordable: www.socialclark.com
------------------------

 First things first. What is BIOS?

(BIOS) also known as Basic Input-Output System is an embedded operating system on computer motherboards. It is the first operating system that loads on your computer before other reparation systems like windows, Linux among others load. This is so it can load start up settings like drivers for devices like a CD drive, Keyboard, mouse among other.



In This guide, I will show you how to Upgrade your BIOS for any computer/Motherboard. However I should say- not all computers have the same mother board nor the same manufacturer.

Not to wast any time, First: you want is know who your mother board manufacture is. To do this just right click on your computer and select “properties”. With this you should see your computer’s basic Information.

Or you can just go into Command prompt and enter a command: systeminfo



If you can open your computer up. Just open the casing and you should see the manufacture and the version.
Second you want to go to your manufacture’s website, find a tab like Drivers or Downloads and click it.



With this you should be able to play around the website to find where you can download their new motherboard upgrade.

Now there are two ways you can use this download. One way is buy using a floppy disk if you have pne. The other is using a disk.

In this tutorial I will show you both ways…

Using a Floppy disk [ This is the easy old method ]:

This is the same method that was used in the early computers and can still be used even now. it is efactive and very easy to use. how ever will require you to have aFloppy disk and a flopy driver on your computer. Here we go

Step 1

Just insert and format your floppy disk,

step 2

Copy the update you downloaded to the floppy disk and shutdown your computer.

Switch your computer back on and boot it with the floppy disk.

Step 3:

Lastly: Run the bat file or command to update the Bios.
It might not display just like this but will surely be slimier to this:



After it completes computer will restart and you should see a different interface in bios.
And you are done

Using a Disk Drive or USB:

This method involves using the system inbuilt bios updater. However I should say, some computers especially if you have a Pentium 3 or earlier,this option might not be available.

Step 1

Copy what you downloaded to an easy to remember location on your hard drive.

Step 2

Shut down your computer and switch it on again.and press “delete” in some computers you may need to press F2 to go to BIOS settings.

Step 3

Look for the BIOS Update/upgrade Utility and enter into it.

Step 4

Now browse to the location where you put the files you downloaded and press “enter”.

Here your system will detect the update version and will then update your Bios with new settings and information

There you are done.

Note: Updating should take a few seconds perhaps a minute

Warning:

  •  Avoid updating the BIOS unless you know what you are doing [Please find a technician who can do it If you didn't understand any of the steps.
  • power fluctuation during a flash may irrevocably corrupt the firmware [Make sure the electrical power source is reliable]
  • Make sure to obtain the BIOS upgrade software from a reliable source [I highly advise you to download updates only from the manufacturer's website ]
Alright, that’s it for today enjoy !!!





AD -----------
Let's create professional Social Media Posts for your Business at as low as UGX 75K ($23).
Social Media Marketing has never been this simple, fast, and affordable: www.socialclark.com


Continue Reading...

Thursday, 6 February 2014

HOW TO KEEP YOUR COMPUTER WORKING WHILE YOU SLEEP

Ok. Lets forget about energy savings a powerful PC is meant to be utilized! And this is the reason as to why I will pass you through ways on how you can utilize your PC whether you are sleeping or at work.


The great part about your computer is that [unlike you] it doesn't require any sleep. Take advantage of your PC by automating time and processor-intensive tasks while you're sleeping. Below I will talk about the tasks you can give to your Computer so you can fully Utilize it. Start these processes before you clock out for the evening or as you start off to work. To make sure they run as quickly as possible, set your computer's power management for high performance and turn off other tasks that might interfere, such as Windows and application updates and other processes.

Backup & Update


A lot of us have emphasized the importance of backup time and again even though it is the stuff that boring work is made of. Rather than incorporate it into your regular computing hours and staring at your computer while your maintenance tasks completes. Make computer maintenance an overnight task that your computer performs without you

Downloads

Talking about Downloading, A lot of you will think of Internet download manager well, downloading using tools like Utorrent is ranked highly by all down loaders –Even me-, and for obvious reasons, Downloads can take a long time and those hours you're sleeping are the sweet-able ones to completing downloads especially 10 + GBs. But rather than keep your PC on all night long, Most file download applications like bit and utorrent & IDM- have built-in options for shutting down, when your downloads completes.

Video encoding


Many of us will never know the time it takes to do some seriously heavy video encoding, but if you've ever tried ripping a DVD, you know how much time and CPU cycles video encoding can take. Outsource you’re ripping and other encoding jobs overnight so you can save your time than sitting and staring at your computer while it encodes.

Render Graphics

Rendering graphics is among the most time-consuming tasks you can perform, so you shouldn't waste precious playtime by watching your computer rendering video bits.

Compiling code


Compiling code from source can be an intensive process, and it is better off users use their overnight cycles to update and compile software on both Mac and windows–even Linux-.

Hard drive repair


You can't do much to save a hard drive from dying and you can do your part to keep your disks healthy specifically by regularly fragmenting and checking for and repairing any disk errors. Try to schedule this maintenance once or twice per week, while you're sleeping, so you can rest easy that you've done all you can to keep your disks running in tip-top shape

Virus and malware scanning


Although most current anti-virus and anti-malware programs can run while you use your computer for other tasks, you're still better off to check your machine for problems when you're not using it. Depending upon your favorite antivirus software, you might be able to schedule scans from within the software, or in some cases, you might need to run Windows Task Schedule.






With all that in mind, I hop you will now use your time more effectively. However I got to say: turning off your computer for half of the day [3–6 hours] is really healthy for your computer and I advise it for those that want to use this guide for 24/7 and yes you may find your power bills go through the roof.




AD -----------
Let's create professional Social Media Posts for your Business at as low as UGX 75K ($23).
Social Media Marketing has never been this simple, fast, and affordable: www.socialclark.com


Continue Reading...
Get Our Latest Articles Delivered to Your email

You will shortly receive a confirmation email. Please approve to complete Subscribtion.

 

Alittle About Me

I am an open minded person with a great interest in computer networks, programming and cyber security. My love for computers started way back since elementary school where I din't have access to the internet nor did I have a computer at my disposal. In the long run at the right time, the love I had for so long was taken to the next level when I was granted internet access and mostly, A computer at my disposal. This allowed me to develop and enhance my skills more effectively. Currently on a cyber... Continue Reading

To all those that visit. We highly appreciate.
Thank You!

Do you like what you see?

Get our Daily email updates (It's Free):