Friday, 31 May 2013

Windows 7 Solitaire hack !!!

Windows 7 Solitaire hack !!!


This tech-recipe will be useful for users who need a bit of help with their solitaire game.

You can use this cheat at the beginning, in the middle, or right before the end of a game. Timing is not essential for this to work. It will allow you to draw one card, as opposed to three, whenever you click.

You must be playing Standard scoring or none.

Hold Shift+ Ctrl+ Alt, and click on the deck.

Google Play Store Now Offers Books in India

Google Play Store Now Offers Books in India


It’s been almost one year since Google introduced Play store- an entertainment hub which offers various android games and applications for your mobile tablets in India.
Now, the search engine has introduced e-books on Play store for its Indian customers. According to Google`s official blog, “Today we’re adding books to Google Play for people in India. Books on Google Play now offer thousands of Indian titles, from new releases to classics.”
You can choose from a variety of titles present on the hub including books by Indian authors like Amish Tripathi, Devdutt Pattanaik and APJ Abdul Kalam. Not only this, you can also check out other international bestsellers which the world`s largest e-bookstore now offers.
The blog post states- With Google Play you can read on the device of your choice. And with your books in the cloud you can read on the web, a phone, or a tablet and pick up right where you left off. You will be able to discover, purchase and read books on:
  • Android phones and tablets – you can purchase books in the Google Play Store and begin reading them instantly in the Google Play Books app;
  • your computer – you can purchase and read books on the Google Play store and read in your web browser;
  • iPhones and iPads – you will be able to read books in the Google Play Books app

GTA V REVIEW WITH SCREENSHOT TRAILER AND RELEASE DATE

GTA V Review, Screenshots, Trailer And Release Date



Grand Theft Auto is one of the popular Video game, Also my one of the Favourite game, It is mainly developed by RockStar Games. First version of Grand Theft Auto Released on October 1997. Here is complete information about Grand Theft Auto Video game series name, year and developer name.

YearSeries NameDeveloper's 
1997Grand Theft AutoDMA Design
1999Grand Theft Auto 2DMA Design
2001Grand Theft Auto IIIDMA Design & Rockstar Vienna
2002Vice CityRockstar North & Rockstar Vienna
2004San AndreasRockstar North
2005Liberty City StoriesRockstar Leeds & Rockstar North
2006Vice City StoriesRockstar Leeds & Rockstar North
2008Grand Theft Auto IVRockstar North & Rockstar Toronto
2009Chinatown WarsRockstar Leeds & Rockstar North
2013Grand Theft Auto VRockstar North
Source Wikipedia

GTA V

Grand Theft Auto V is upcoming video game by Rockstar Games. GTA V is available for Playstation 3 and Xbox 360. Team of GTA V has already released 2 trailers and screenshots.

Main Character in GTA V
1. Michael
2. Trevor
3. Franklin

Release Date of GTA V
9.12.2013

Trailer #1


Trailer #2



Screenshot

Michael ,Trevor and Franklin

Kevin Mitnick World Greatest Hacker of All Time

Kevin Mitnick World Greatest Hacker of All Time



Kevin Mitnick, "America's Most Wanted Computer Outlaw," eluded the police, US Marshalls, and FBI for over two years after vanishing while on probation for his 1989 conviction for computer and access device fraud. His downfall was his Christmas 1994 break-in to Tsutomu Shimomura's computers in San Diego, California. Less than two months later, Tsutomu had tracked him down after a cross-country electronic pursuit. Mitnick was arrested by the FBI in Raleigh, North Carolina, on February 15th, 1995.

While he was on the run, he broke into countless computers, intercepted private electronic communications, and copied off personal and confidential materials. Among the materials he copied off and stashed in readily accessible locations around the Net were personal electronic mail, stolen passwords, and proprietary software. Much of the stolen software was the trade secret source code to key products in which companies has invested many millions of dollars of development effort in order to maintain their competitive edge. His activities on the systems he broke in to, often altering information, corrupting system software, and eavesdropping on users, sometimes prevented or impeded legitimate use. He tried to stay a step ahead of the law by using cloned cellular telephones and stolen cellular and internet service for many of his intrusions.

Mitnick was charged in North Carolina with 23 counts of access device fraud for his activities shortly before his arrest. In order to expedite his return to California, he agreed to plead guilty to one count and have his case consolidated in Los Angeles. In California, he was charged with an additional 25 counts of access device, wire, and computer fraud. On March 16, 1999, Mitnick plead guilty to five of these counts and two additional counts from the Northern District of California. He was sentenced to 46 months and three years probation, to be served in addition to eight months for his North Carolina plea and 14 months for his probation violation. He was released from prison on January 21, 2000, being eligible for early release after serving almost 60 months of his 68 month sentence.

YouTube Has One Billion Monthly Users Now



YouTube Has One Billion Monthly Users Now


YouTube has now become the most preferred video sharing platform with more than one billion active users every month.
YouTube’s team said that “If YouTube were a country, we’d be the third largest in the world after China and India. Nearly one out of every two people on the Internet visits YouTube.” The team said this in a blog post.
Further, the team added that “PSY (the South Korean rapper) and Madonna would have to repeat their Madison Square Garden performance in front of a packed house 200,000 more times. That’s a lot of Gangnam Style!”
The YouTube team also thanked its fan by saying that “From the aspiring filmmaker in his basement and the next great pop musician, to the fans all around the world who tune in, subscribe and share their favorite videos with the planet, thank you for making YouTube what it is today. You have truly created something special.

HOW TO CONVERT EXE TO JPEG FORMAT?

Now You Can Convert Exe To JPEG

Converting EXE to some other format say JPEG is easier than you think. This will not physically convert the exe file to jpeg. All that this does is this will trick someone including your OS to some extend in thinking that it’s a jpeg file and thus opening/running the exe file. Ok i will use firefox.exe to show how you do it.

Create a new folder and copy the firefox.exe file into it. Now just create a shortcut of the file in the same folder. This shortcut is going to be the image(jpeg). Rename the shortcut to say, viruswriting.jpeg and original so vir.jpeg

remember these 2 files (original and shortcut) have to be in the same folder

shortcut screenshot

Now right click on the shortcut and delete the “Start in” field. Change th e target field to C:\WINDOWS\system32\cmd.exe /c vir.jpeg.

Now you need to change the icon of the shortcut file and the job is done. This trick is mainly for those who run their own server.This way when ever the person opens the shortcut the exe file will execute .

Note that both files have to be in the same folder and the user has to click on the shortcut and not on the original file. So if you are sending this to someone place both in the same folder and compress it . Now send the .zip or .rar file

FACEBOOK ACCOUNT SECURITY TIPS




Facebook is becoming lot more bigger and have more than 1 Billion users. As we use Facebook as our part of life now, we should also be concerned about the security of our Facebook Profile. Facebook account security is important in this manner that you have lots of personal information containing cell phone number and pictures on your account. In any case if some one hacks your account for less security then he/she may post some rubbish on your behalf and can access your all information. This can put you in trouble. Facebook has much options for staying safe while using Facebook. But most of us don’t know what exactly we have to do for staying safe. I’m going to share 8 points for Facebook Account Security following which you can hack proof your Facebook.

Facebook Account Security Tips

  • Don’t Reveal Your Password:You should keep in mind that you should not reveal your Facebook Account Password to any one. You password will be just needed while logging in to Facebook. Don’t ever tell your password to any of your friends or some one else. Some people act as Facebook representatives and email you from Facebook looking email, and ask you to tell your account information. So, be careful in these cases.
  • Don’t Reuse Password: Facebook is your personal profile where you keep lot of personal information. So keeping Facebook account security in mind you should be careful about using password. Usually it is difficult to remember different passwords when you have accounts with too many websites. One option is to write your passwords in a text file and keep it in safe place on your computer. Second option is to use Password Manager software to generate strong random passwords for all websites and it will store it safely for you. Password which you have used for Facebook, should not be used with any other website. It increases the chances of stealing of your password. And specially small, new and illegal websites. I have seem some cases in which people register with small/illegal websites using same password as Facebook and their profile was hacked right after one day. So, be careful.
  • Use Complex Passwords:If you are not using password managers for creating passwords, then you should choose a password which is a combination of letters (upper and lower case), numbers and symbols. Don’t use words or dates which are easy to guess. There are some software available which crack the password using the dictionary names. So never choose a Name as password.
  • Turn On HTTPS: These are two, HTTP and HTTPS. HTTP stands for Hyper Text Transfer Protocol, while the additional S used in HTTPS is for “SECURE”. When you are using facebook with HTTP (Which is by default)there are many chances that someone else can see what you are sending and receiving from Facebook. There are Apps available for Androids which can gain access to your Facebook profile if they are on same Wireless Network as you. But when you are using Facebook with HTTPS it means that you are talking to Facebook in a secure code which no can eavesdrop on. For turning the HTTPS browsing ON in your facebook profile, Go toAccount Settings >> Security >> Check on “Browse Facebook on a secure connection (https) when possible” >> Save Changes. This is the major factor of Facebook account security problems.
  • Beware of Click-jacking: You may be aware of Click jacking, which was a big problem few days ago. Some websites contains malicious code that make your browser to take action without your knowledge. When you see a strange post or having adult type content, which motivates you to click on it. When you click on that link your account will be in trouble, and that post will be automatically posted from your behalf on your timeline, even you don’t know. So for you Facebook account security don’t ever click on strange links even they are posted from your friends.
  • Turn On Login Notifications: Viewing the Facebook Account Security needs Facebook has an option for sending notifications as Text Message to your Mobile Phone, every time you log in to your Facebook Account. For turning these Notifications On go to Account Settings >> Security >> Login Notifications >> Check “Text Message Notifications” and Save Changes.
  • Facebook Login Approvals: Facebook account security is so much important that Facebook has added Login Approvals option. When you login to you account, a text message will be sent to your Mobile phone containing a verification code. You will need to enter that verification code in order to access your Facebook Account. It is very useful security action. Turn On these login approvals from Account Settings >> Security >> Login Approvals.
  • Active Sessions: Keep checking your active sessions from your Accounts settings. If you see any suspicious login activity from any other device then your account is compromised and you should change your password and follow all above tips to keep your account safe.
  • Website Phishing:I was actually writing 8 points but this point is very important for your Facebook account security that you should be aware of this. Website Phishing is activity of hackers in which they create fake pages like Facebook and send it to your email in any way and ask you to login or whatever. When you open that link and enter you login information, that information will be sent to those hackers and they can access your account. So you should check the URL/Link of the Facebook Login Page. It should be a HTTPS connection and URL must be www.Facebook.com. If it is not then you should not enter your information and report to Facebook.
These 8 Facebook Account Security tips ensure that your account is safe and no one can access your account. But as you know, bad people

How to make a simple powerpoint game

Now You Can Make a Simple PowerPoint Games

1. Open Microsoft PowerPoint.

2. Create a new, blank presentation by pressing Ctrl-N.

3. Make sure the first slide's layout is the title slide .

4. In the title box, name your new game . In the title box, name your new game.

5. In the subtitle box, write "Click Here" .

6. Create a new slide, one with a title and text, by clicking Insert->New Slide.
Create a new slide, one with a title and text, by clicking Insert->New Slide .

7. Highlight "Click Here" and link it to slide 2 by selecting it then right click and go to hyperlink .
8. A box will pop up.
You pick Place in This Document, pick slide titles, then slide 2.
9. Create a scenario for this slide and create options to deal with the scenario.
Create a scenario for this slide and create options to deal with the scenario .

For example, slide 2 would look like: You are lost in a desert,
do you: Look for water.
Build a sand castle.
Shoot a camel.
Do nothing.

10. Highlight each option and link them to another slide that presents a new scenario .
This new scenario will present the player with the consequences of his/her actions.
There will be wrong choices and there will be right choices.
11. Continue the chain of linked slides until a final result is  arrived .
Enough wrongchoices will lead to a slide that reads something like
'You Lose' and enough right choices will lead to a slide that says something like
"Congratulations you win

HOW TO CONVERT AUDIO TO VIDEO IN FREEMAKE


Now Make Your Audio to Video By Using Freemake


With Freemake Video Converter you can easily add a soundtrack to your video And Convert video free to AVI, MP4, WMV, MKV, 3GP, DVD, MP3, iPad, iPhone, PSP, Android phones. Video to MP3 with one click! Rip & burn DVD. Convert YouTube to MP4, AVI, etc. with Freemake! Guaranteed result.

 


Follow these steps:

1. Download and start Freemake Video Converter Click Here To Download
2. Add a video
3. Click "Add audio" button in audio settings under video (see the picture)
4. To save video with a new audio track, convert it to any format.    

HOW TO POST ANIMATED PICTURES ON FACEBOOK

Now You Can Post The Animated Pictures On Facebook
Easily


Facebook doesn't allow users to upload animated GIFs anywhere on the site, so if you wanted to have an animated GIF somewhere, you’re out of luck, unless…
There is a trick that allows anyone, who has the following resources, to bypass this limitation in uploading animated GIFs for custom tabs.

Follow The Steps:-

1) You must have Adobe Photoshop C5 & Quicktime Player.

2) Select the animate GIF you want to upload.

3) Open Adobe Photoshop CS5 and go to File > Import > Video frames to layers. In the File Name box, 

    just enter *.* as your filename and choose your GIF image.

4) Resize your GIF to 111 x 74 pixels to fit the custom tab image .

5) Save your file in a PSD format. Check the save option, ‘LAYERS’ and upload it..

HOW TO PROTECT E-MAIL ACCOUNT FROM BEING HACKED

Now You Can Easily Protect Your E-mail Account From Being Hacked


Now a days almost hackers are increasing in the level . At any time your email account can be hacked, if you didn't aware about the security. So you should know how to protect your mail account.
Most of them lost their email account because of not knowing the basic security things.
Here i will explain you about some of most online scams which fool people and make them lose their passwords and how to protect from therm.

1.Website Spoofing:

Website spoofing is the act of creating a website, with the intention of misleading the readers. The website will be created by a different person or organisation (Other than the original) especially for the purposes of cheating. Normally, the website will adopt the design of the target website and sometimes has a similar URL.

This sites are known as Phishing web page or fake page. The purpose of this web page is to steal your information,username,password. This page will look similar to original page . The url of page also will look similar to original site. But it is not right site. for eg: for gmail.com may be hacker create gmailwelcome.com which look like the gmail.com.

Solution:
-Never try to login/access your email account from the sites other than the original site.
-Always type the URL of the site in the address bar to get into the site.
 Never click on the hyperlink to enter the site.
-Check the url whether it is correct or not.

2. Accesssing Your E-Mail Account From Cyber Cafes:

Do you access your email from cyber cafes? Then definitely you are under the risk of loosing your password.In fact many people lose their email account in cyber cafes. For the owner of the cyber cafe it’s just a cakewalk to steal your password. For this he just need’s to install a keylogger on his computers. So when you login to your email account from this PC, you give away your password to the cafe owner. Also there are many Remote Administration Tools (RATs) which can be used to monitor your browsing activities in real time.

This doesn't mean that you should never use cyber cafes for browsing the internet. I know, not all the cyber cafe owners will be so wicked but it is recommended not to use cafes for accessing confidential information. If it comes to the matter of security never trust anyone, not even your friend. I always use my own PC to login to my accounts to ensure safety.

Introduction Of firewalls

Introduction Of firewalls

When you use internet in your college/school/office , You may not be access some websites, right? Do you know how they block those websites? They use firewalls for block websites. Firewall prevent the system from hackers attack. Lets us what is firewa

What is Firewall?
Firewall is working like a security guard standing outside the office. Usually, What the security guard do? He will allow those who has identity card and block those who has not the identity card. Right? Likewise, The firewall will block unauthorized access to the system.
Firewall may be a software or hardware. It will work based on the set of rules defined by the administrator. Using Firewall administrator can block certain website from being accessed.
All traffic from inside and outside of the network must pass through the firewall.
Only authorized trafic will be allowed to pass (based on the set of rules)

Types of Firewalls

Packet Filtering
Application level gate way
Circuit level gate way.

Packet Filtering (Network Layer)

A packet filtering router applies a set of rules to each incoming IP packet and then forwards or discards the packets. Router is configured such that it can filter incoming and outgoing packets. The packets will filtered based on the source and destination IP address.
IP spoofing attack is possible in this packet filtering. IP spoofing can be achieved by changing the source IP address of packets.
Stateful Inspection Firewalls
A stateful inspection packet filters tightens the rules of TCP traffic by creating a state table of out bound TCP connection. If the packet matches with existing connection based on the state table, it will be allowed. If it does not match, It will be evaluted according to the rule set for new connections.

Application Level Gateway

Application level gateway is also known as proxy server. The user communicate with the gateway using application layer of TCP/IP stack. The gateway asks the user for the name of the remote host to be connected. When the user enters valid user ID, gateway will give access to the remote application. This will block the malicious activity and correct the application behavior. This will ensure the safety of company.
More secure than packet filtering. Easy to log and audit all incoming traffic at the application level. Application-level filtering may include protection against spam and viruses as well, and be able to block undesirable Web sites based on content rather than just their IP address

Circuit Level Gateway

The circuit level gateway works at session layer of OSI model. Monitor TCP handshaking between packets to make sure a session is legitimate. Traffic is filtered based on the session rules. Circuit-level firewalls hide the network itself from the outside, which is useful for denying access to intruders. But they don't filter individual packets. This firewall is used when the administrator trusts internal users.

Why Firewall Is Used?

Firewall block unauthorized users, prohibits vulnerable services from entering or leaving the network.
Protection from IP spoofing and routing attacks.
Protection against Remote login, Trojan backdoors, Session hijacking, cookie stealing,etc.

Limitation of Firewalls
The firewall cannot protect against attacks that by pass the firewall.
The firewall does not protect against internal threats
The firewall cannot protect against the transfer of virus infected programs (or) files. It would be impossible for the firewall to scan all incoming files, emails for viruses.

UnCAP YOUR AiRTEL 3G SPEED UP TO 7.2MBPS GUARANTEED FIRST ON NET

Friends Here is Orignal trick to unlock your Airtel 3g speed UP TO 7.2MBPS.Just unlock and download unlimited.100% Satisfaction guaranteed. Here is step wise step trick.  1.Activate RS 101 3G plan.  Your speed is not blocked by Airtel if you used your 300mb in 10 minutes.You will get 3g speed for 1 month.Use any VPN,Real host Trick[live.airtelworld.com] to download unlimited.  100% SUCCESSFULLY TESTED BY ME.  Please dont share it on any other blog ,forum or website.

New working front query trick for OM handler airtel 3g

Put the following setting in Opera Mini handlerHere is Trick.  1. apn Airtelgprs.com  2. proxy 198.98.122.15  3. port :80        4. f/q :freeip/~agusnet/nph-giling.pesto/20/http/     free ip mence youe free page in gujrat live.airtelworld.com

Thursday, 30 May 2013

How to Hide any Local Drive using Command prompt

How to Hide any Local Drive using Command prompt 

Today Computer World tutorial is about how to hide a local drive without any 3rd party software. There are lots of free and payable software's available to hide local drive, but I'm not gonna talk about hide a local drive using a software. In this tutorial I'll show you an easiest way to hide local drive without using software. This will save your both money and time.There are 3 methods available to hide a local drive without using any software

1. Hide a drive through gpedit
2. Hide a drive through regedit
 

3. Hide a drive using command prompt


Today we are covering command prompt way of doing it. So lets see how to do.
How to Hide a Local Drive using command prompt?
1. Click on Start - Run
 
2. In Run box type cmd and hit Enter. Now Command Prompt window will appear.
 
3. In command prompt, type diskpart and hit Enter.
 
4. Then type list volume and hit Enter.
 
Now it will display the list of all your computer drives details.


5. Then type the Drive Letter which you want to hide. 
If you want to hide volume E, type select volume E and hit Enter.

Now follow mentioned massage will appear to you.
Volume 4 is the selected volume


6. After that, type remove letter E and hit an Enter. 

That's all, you have done. Now restart your computer once. When you start your PC again, you want be able to see the
 particular drive in My Computer.


How to get back Hidden Drive again in My Computer.

Do the procedure which i have mentioned in step 1,2,3,4 and 5 again.

Click Start --> Run --> cmd -->

Then type diskpart - list volume - select volume E

After that type assign letter E and hit Enter.

That's all !! You have got back the hidden local drive. Once again restart your PC, now you will be able to see hidden local drive in My Computer.

Note: Your PC doesn't lost any data by doing this trick .
    

SONY XPERIA Z TABLET RS.44990

Key Features
Full HD Recording
1.5 GHz Quad Core Snapdragon S4 Pro Processor
FM Radio
Expandable Storage Capacity of 32 GB
2.2 MP Secondary Camera
Android v4.1 (Jelly Bean) OS
8.1 MP Primary Camera
Wi-Fi Enabled

Sony has always been at the forefront of product evolution in terms of design and technology. The Sony Xperia Z Tablet is a testament to just that. The seamless design and smooth flowing lines of the tablet will allow it stand out from its competition. Tablets have always been an important bridge between phones and full-fledged computers. These days however, the processing power available on these devices makes them as powerful as computers.

The Sony Xperia Z Tablet comes with a 10.1 inch Reality Display with Mobile BRAVIA® Engine 2 technology. This is a huge step forward for Sony as the upgraded BRAVIA Engine 2 allows for clearer, sharper images while saving on energy requirements. The WUXGA TFT Capacitive Touch Screen comes with an effective resolution of 1920 x 1200 p, allowing you to fully experience HD videos and Images. The device is very light at 495 g and measures in at just 6.9 mm in thickness. The single SIM GSM device supports 2G, 3G and EDGE along with other popular connectivity options via the SIM.

The 8 MP primary camera is capable of Full HD recording and comes with Exmor RS technology. It is capable of Fast Capture. The Secondary 2 MP camera is capable of Full HD video chats with Exmor Rtechnology. The main camera comes with Superior Auto HDR as well. The Snapdragon S4 pro 1.5 GHz Quadcore A15 processor uses the next generation Krait Technology and is capable of delivering phenomenal performance. This is augmented by the 2 GB RAM present in the device. The device comes with a total of 32 GB memory, split up between a 16 GB eMMC and a 16 GB Memory Card. It can be enhanced to another 32 GB via micorSD cards. The 6000 mAh battery gives a solid stamina to the device, even on 3G modes.

The device comes with NFC, Screen Mirroring, MHL, IR Remote, Wi-Fi Direct and Bluetooth v4.0 connectivity. Sony brings back its characteristic xLOUD function with the Xperia along with VPT, Clear Audio and S-Force Front Surround 3D technology. Additional to all this, the Xperia Z Tablet also comes with aFree Leather Case worth 3000 Rupees. With the Bundled Sony Music App, you can download 1.5 million songs for free. The Sony Liv App allows you to watch KBC, Indian Idol and online TV Serials present in Sony and Sab TV channels.

Aircel Free 3G Hacked 2013 Working Trick 1000%

  • Frnds, Aircel 3G is hacked in 2013 by proxy,try this proxy and enjoy highspeed internet, you aircel speed is best than Other networks. Its Speed up to 7.2 mb/s.
    *. Activate 3G in Your Mobile
    *. START 3G and send to 121 for 3G activate
    *. Type Proxy--232.444.009.67
    *. Type Port--4590
    *. Hompage--google.com
    *. U r done i
    *. Use This Trick On Low Balance

remove Seen From Facebook Chat remove Seen From Facebook Chat

This tutorials shows how to remove seen from Facebook chat. Everyone who uses Facebook know’s that they have feature, that tells you when other side have seen your message. And it  works both ways: Other side sees when you have read their messages. I have good news for you, if you don’t want that other side know’s when you have or have not seen their messages. You can remove this “seen” notification with browser extensions. There is couple of things that you have to know before installing.
When Unseen extension is installed, then your Facebook works like this:
1. You send chat message to recipient -> You can’t see when message is read
2. Recipient sends chat message to you -> Recipient can’t see when you have read it
3. You have new message on Facebook inbox and you open it -> Message will stay as unread state!!

Installing Unseen to Chrome

1. Go to FB unseen installation page by clicking this.
2. Click Add to Chrome
3. Confirm installation by clicking Add.

4. Extension is now installed!
If you ever have to, you can disable unseen extension by clicking unseen icon from Chrome.
Installing Unseen add-on to Firefox
1. Go to Unseen installation page by clicking this. From there click Add to Firefox.
Firefox website – Addons – Unseen
2. Click Install Now.
3. Add-on is now installed!
If you ever have to, you can disable this add-on. For some reason Firefox doesn’t have this neat disable/enable button near address bar, so you have to do this hard way.
1. Click Firefox from top left corner and from there click Add-ons.
2. Select Extensions from left panel.
3. Click Disable where you can see Unseen.
As i earlier stated, if you have enabled any of these extensions, then your inbox messages stays as unread state. It’s the annoyance that comes with these. Facebook shows that you have 10 new messages in inbox, but when you open it, it’s just same old messages.
You might also like:

5 killer Advantages of Rooting your Android Device: Be a Super User

Here in this article we are discussing what are the advantages of rooting your android smart phone. I hope that you are reading this article if had already rooted your device or willing to root later. Anyway there are lot of advantages for a rooted android device than a normal device. Before explaining that you should understand what is rooting an android device.
What is rooting an android device?  Simply rooting an android device such as tablets, smartphones is to attain certain control within Android's subsystem. Rooting is for overcoming the limitations which had already made by the device manufacturers for putting some restrictions over the device. Rooting makes you a super user of your device which you had bought for a high cost.  Advantages and benefits of rooting your android Smart Phone  There are many advantages if you root your android device. Some of them are mentioned here.  1. Huge Access to Root only Apps As you know that there are more than 6000000 apps on Google Android Market. Among these you can't install thousands of apps which needs Super User permission. One popular app which need Super User Permission is Link2SD. Link2SD allows users to move apps installed on device to external SD card which saves the internal memory. Here are some other popular apps which need device to be rooted.      Keyboard Manager     Titanium Backup     Samba Filesharing     DroidWall     Dual Mount SD Widget  2. Updates This is the main advantage of rooting your device. All you know that every year android introduces new updates in their OS. When i am posting this article their last OS were Jelly Bean. Your Brand New Smart Phone seems too old if you use an older version of android. Am i right? If you make your device rooted you can manually install pirated version of brand new android OS. I had installed Jelly Bean on my Galaxy Y successfully. 3. Bloatware If You became the Super user of your device ( After rooting you are called super user) , you can manage all of your phones system files means you can uninstall unwanted inbuilt apps also known as Bloatware from your device. This makes your phone clean as well as extra bit of memory space. 4. Overclock Processor By rooting your device you can overclock your processor. Overclocking with Custom ROM's results in explosive device performance. One user of Nexus S had said that he got more speed of 250 % after he rooted and overclocked the processor. But i didn't getting enough speed after overclocking my Galaxy Y. Only one advice to my fellow readers that please do not try to overclock your device without getting significant proof. It will result in damage of your brand new Phone. 5. Better Battery Life The most ever problem facing by all smart phone users are its low battery life. Rooting your device gave a little bit relief from this problem. As i mention earlier you can manage all of your apps after rooting your device. There are lot of unwanted apps installed on your device, which were eating half portion of your battery charge. By managing these sucking apps you can achieve more battery life. I don't think that rooting can perform outstanding magic on your device but surely earns you few more hours. Before rooting your device keep in mind that it will break all manufactures warranty. So think two or three times before breaking up your device. If any problem persists you can unroot your device.