Jump to content

neWone's Content - Page 2 - InviteHawk - Your Only Source for Free Torrent Invites

Buy, Sell, Trade or Find Free Torrent Invites for Private Torrent Trackers Such As redacted, blutopia, losslessclub, femdomcult, filelist, Chdbits, Uhdbits, empornium, iptorrents, hdbits, gazellegames, animebytes, privatehd, myspleen, torrentleech, morethantv, bibliotik, alpharatio, blady, passthepopcorn, brokenstones, pornbay, cgpeers, cinemageddon, broadcasthenet, learnbits, torrentseeds, beyondhd, cinemaz, u2.dmhy, Karagarga, PTerclub, Nyaa.si, Polishtracker etc.

neWone

Advanced Members
  • Posts

    73
  • Joined

  • Last visited

  • Days Won

    3
  • Feedback

    100%
  • Points

    21,200 [ Donate ]

Everything posted by neWone

  1. Tracker Name : Dognzb Signup Link : http://dognzb.cr/register Genre : General Closing Date : Additional Information : The best usenet index site! You must donate $10 within the first month to keep your account for life.
  2. Lately we have had numerous news according to which editions for PlayStation 4 of multiplatform games are superior counterparts on Xbox One. Here as Metal Gear Solid V: Ground Zeroes add to this list, Kojima Productions studio revealing resolutions and framerate that will run all versions of the game The game will run at 1080p on PlayStation 4 and 60 frames per second while the Xbox One will only run at 720p 60 frames per second. Also on PlayStation 3 and Xbox 360 game will run at 720p resolution all but 30 frames per second but it will not be the native resolution, the Konami chose to do upscale for the game can run at HD resolution. Metal Gear Solid V: Ground Zeroes will be released on March 20, 2014, for PlayStation 3, PlayStation 4, Xbox 360 and Xbox One.
  3. Started as a joke , the game Goat Simulator is available to pre -order on Steam . Based on old school skating games , the title puts the user in the skin of a goat , animal decided to do maximum damage . " Simulator goat" was created in just two weeks , so there is nowhere any GTA Goat Simulator developers have created a game known as "little , broke and stupid" , but for the price of $ 10 , gamers have Steam account you can pre -order already . The game does not have a release date . All pre - orders will be honored Goat Simulator game delivery to three days before the official launch , which we only know that it will be scheduled for this year. In addition, customers will have access to the beta through Steam . Coffee Stain Studios created the game will be available first in Windows , with the possibility of porting the Mac and Linux in case of high demand . Goat Simulator offers no multiplayer , and developers say they will keep the game fun bugs
  4. Ken Levine, Irrational Games creative engine , announced the dissolution of the studio. Future game series BioShock is in danger because Levine is no longer involved in creating a new title. The solution to most of the employees Irrational Games is redundant , while Ken Levine will continue to work on video games with a creative team of only 15 developers In the open letter on the website Irrational Games , Ken Levine argues that it is time for a new challenge and that his priority is games that are guided by the story, but can be played many times. BioShock game series of global grossed over half a billion dollars , which is why closing Irrational Games is a big surprise . Levine 's team will further develop games for Take- Two , the parent company , but no longer involved in other titles BioShock . 2K Games and Take- Two could still launch and other securities BioShock . The newest title in the series , BioShock Infinite has just released the third DLC, available online for the game last mission launched in 2013
  5. Codemasters have confirmed availability classic Colin McRae Rally for the Android operating system. The game should work on devices running Android 4.0.3 or later and have at least 1GB RAM. Colin McRae Rally is based on the 30 circuits from the old Colin McRae Rally 2.0, and the vehicles should not miss a game Rally: Subaru Impreza, Mitsubishi Lancer Evolution VI, Lancia Stratos or Ford Focus driven by the late Colin McRae. Control has been adapted for motion sensors and touch interfaces characteristic of these platforms. Colin McRae Rally for Android can be purchased from Android Market at a price of 4.49 € .
  6. Watch Dogs is one of the most anticipated games of the year. It was supposed to be released initially released late last year but the Ubisoft decided to postpone the launch to offer a very good product. Watch Dogs will be released on May 27, 2014 With the announcement of its launch and Ubisoft has unveiled a new trailer, entitled Story Trailer, of which there are few details about the main character Aiden, how can he control the town and details about the plot. Watch Dogs will be released on May 27, 2014 for PS3, Xbox 360, PS4, Xbox One and PC.
  7. Waiting game developers for the next version of DirectX 12 is apparently over. Details about DirectX 12 programming interface looks like will be revealed on March 20 at the Game Developer Conference. Microsoft includes teaser logos AMD, Intel, Nvidia and Qualcomm, suggesting that they will be partners supporting the new API suite used to manage multimedia tasks and gaming, DirectX 12 will be available for all Microsoft operating systems. Anuj Gosala, development manager at Windows Graphics, will hold a presentation at the conference otherwise, according to the program announced on GDC. Previous version of the interface, allowing 3D animation and multimedia effects in most games, was launched in 2009 with Windows 7. With the release of DirectX 12 developers will be able to take full advantage of current hardware.
  8. In a ceremony studded celebrity industry Wednesday evening were awarded BAFTA Games Awards 2014 British Academy Video Games Art reserved segment. As expected, the most award-winning titles were The Last of Us from Naughty Dog and Grand Theft Auto Rockstar Games VDE. Here's the complete list of winners: Game of the Year: The Last of Us • Action and Adventure: The Last of Us • British Game: Grand Theft Auto 5 • Original Music: BioShock Infinite • Story: The Last of Us • Strategy and Simulation: Papers, Please • Artistic Achievement: Tearaway • Audio Achievement: The Last of Us • Sports: FIFA 14 • Family: Tearaway • Innovation Game: Brothers: A Tale of Two Sons • Mobile & Handheld: Tearaway • Ones to Watch: Size DOES Matter • Game Design: Grand Theft Auto 5 • Multiplayer: Grand Theft Auto 5 • Debut Game: Gone Home • Performer: Ashley Johnson - The Last of Us
  9. neWone

    IPT News

    2014-02-20 - Changes Announcement Change to your H&R warnings. Dear IPT users, You may have noticed that your high H&R warning count has been reset, or notice the new changes being brought in. This is an announcement to the changes we are about to make. ANYONE, yes, ANYONE with 5 H&R warnings will now be jailed. We have been very lenient with the current system and have provided you more than enough ways not to even get warnings anymore. you are able to zap, both with BP and GB and we even implemented a Seed time available for you to fully seed any torrents. With this in mind you should no longer be getting any warnings, and as such the system has now been changed to stop ALL the REAL H&R users, as such, if you reach 5 H&R warnings your account will be jailed without warning, currently we allowed users to have a lot more warnings due to their ratio and because of this change being ours we have given you a chance and reset those warnings to 3 if you had more than 5. This now gives you 2 months to sort any problems you may have had and seed any torrents to the seed time required and not get any more warnings. The only users this will affect now are the real abusers of the system and this is where we were heading all along. All we want to catch are the real H&R users and this system will now do this. IF you have 5 warnings after all we have offered to avoid them you will be jailed. Regards IPT Staff
  10. Two weeks ago I learned that a group from russia managed to crack BF3 to be played in multiplayer. This version of the game has all the DLC packs Of course they also offer support for any issue.
  11. What are your opinions about these games. Which is the best? What differences did you find
  12. There are many good cartoon trakers ..cartoonchaos / cartoon-bits / animebytes / tekken ...all are best
  13. 2014 Site Changes and Upgrades These changes have already been made and in affect. This list isn't exhaustive and is subject to change with or without prior notice. Future changes made that aren't listed here will be announced and the official list amended. Thank you all for being part of our community and doing all you can to make this the best site it can be. - on behalf of the Bitsoup Staff - Budget Donations are now available - Donation packaging affordable for all on our Regular Donation Page - Can be found on the menu bar as well as our Promo Forum - Contains a manual donation feature to pick your own amount - Be extremely careful and double check and manual donation amount - Manual donations do not contain any perks or credits, be sure to read the page H&R Policy has change - Check out the new H&R Policy on our Rules page - Second and Third warnings contain a downloading rights disabled feature Power User requirements have changed - Please have a look in our FAQ for any changes to our class requirements Ratio Requirements have changed - Check out our Downloading Policy on our Rules page - Leechblock parameters have also changed (please take note)
  14. Paypal issue, Our paypal account is currently limited so we cannot accept donations at this time, we are working with paypal to resolve this issue and we will post an update when we know more.
  15. Our FAQ has been overhauled We've been hard at work since January re-writing and editing the FAQ. It has been completely re-worked and overhauled. New articles have been added along with a new layout. Feel free to look over it as it might help answer some questions. You can view it: https://sciencehd.me/login.php
  16. Few ways to secure your bittorrent usage : There are few easy ways to hide your identities from anti-piracy and law-firms policing BitTorrents. Many Bittorrent users are proving their security by VPN, a proxy service, encrypted client usage or seedbox. Let’s take a look. Seedbox: A seedbox is a private high-speed server, used exclusively for the uploading and downloading of torrents. With a seedbox users generally get download speeds up to 100 Mbit/s or even 1 Gbit/s while their IP-addresses are not shared with the public. Files are downloaded from the torrent site and its users anonymously, and from there they can be downloaded at high speeds to a user's personal computer via the HTTP protocols. Mostly even a ratio isn’t counting. VPN: VPN extends a private network across a the Internet. Many users have already discovered that a VPN is a good way to hide their IP address from the public. For a few dollars a month VPNs route all your traffic through their servers. Some VPNs also offer a free plan, but these are significantly slower. Proxy service: You can visit any websites with proxy service hiding your IP-address from the public. Surfing the Internet service with public webproxy server makes your browsing more secured. The service works on Windows, Mac, Linux and as the name already suggests, it is set up specifically with BitTorrent users in mind.There is no software to install or complicated instructions to follow. Enter only a URL in the special form. Encrypted BitTorrent Client: They attempt to enhance privacy and confidentiality. In addition, they attempt to make traffic harder to identify by third parties including internet service providers. This is a pseudonymous, encrypted multi-peer-to-peer file distribution protocol.The downside is that is that the download speeds are generally lower than regular BitTorrent transfers. Source : Official Facebook Page of isoHunt
  17. Chances are you reached this article because you’re concerned whether or not your Internet connection is really as fast as your service provider said it would be. There’s a lot of controversy going around about this, usually in the form of people who believe they may have been cheated by the company. While this might be the case, it never hurts to examine the most common causes of slower-than-advertised Internet speeds and determine whether one of these is happening to you so that you can determine how to remedy the situation. FREE Internet Speed Test: http://pcpitstop.com/internet/bw.asp 1: Hardware Is Slowing You Down More than likely you’re probably using a router right now that you’ve possessed for a very long time. As routers age, they no longer correspond to the speeds that your service provider gives you. When the processor inside the router starts overheating, speeds get drastically slower. You’ll know this is happening to you if you get fast speeds after turning the router off for a few hours. But sometimes routers simply start failing without any other symptoms except a consistent slow speed. Call your ISP for a new router if they provided you with the one you have. If you can find a spare router, test your speed on it. Perhaps it’s time you considered getting new network hardware. I, for one, use my computer as the primary router in my household. This is not possible in cases in which you have a DSL connection. It’s only available for people who use fiber-optic high-speed connections. 2: Congestion At Your Local ISP Router Hurts Your Speed Your Internet service provider (ISP) has several routers set up along different neighborhoods. Your local router is shared with all of your neighbors. If too many of you are trying to download at high speeds all at the same time, you may experience slight cuts to your line’s performance. This is natural, and simply demonstrates that your ISP doesn’t have enough local routers to competently route all of your signals. In this case, you either gather up your neighbors and get them to join you in petitioning the company, or you simply switch over to an ISP that fewer people in your neighborhood are using. However, take note that problems probably aren’t just local. Reasons Continued Here 1: Hardware Is Slowing You Down More than likely you’re probably using a router right now that you’ve possessed for a very long time. As routers age, they no longer correspond to the speeds that your service provider gives you. When the processor inside the router starts overheating, speeds get drastically slower. You’ll know this is happening to you if you get fast speeds after turning the router off for a few hours. But sometimes routers simply start failing without any other symptoms except a consistent slow speed. Call your ISP for a new router if they provided you with the one you have. If you can find a spare router, test your speed on it. Perhaps it’s time you considered getting new network hardware. I, for one, use my computer as the primary router in my household. This is not possible in cases in which you have a DSL connection. It’s only available for people who use fiber-optic high-speed connections. 2: Congestion At Your Local ISP Router Hurts Your Speed Your Internet service provider (ISP) has several routers set up along different neighborhoods. Your local router is shared with all of your neighbors. If too many of you are trying to download at high speeds all at the same time, you may experience slight cuts to your line’s performance. This is natural, and simply demonstrates that your ISP doesn’t have enough local routers to competently route all of your signals. In this case, you either gather up your neighbors and get them to join you in petitioning the company, or you simply switch over to an ISP that fewer people in your neighborhood are using. However, take note that problems probably aren’t just local. 3: The ISP Infrastructure Is Taking A Heavy Load, For Now Depending on the time of day, your ISP may or may not be at full capacity. Each ISP has its own infrastructure. Sometimes this infrastructure gets overloaded with massive amounts of traffic. This is why ISPs perform so well in their humble beginnings and start to really drag in speed as they grow. Although signals are sent at the speed of light, they need to be queued, processed, and routed to their proper destinations. Depending on what region of the world you live in, the ISP may have trouble upgrading infrastructure because of government bureaucracy that gets in the way. This isn’t necessarily their fault. It’s just politics and money. 4: Throttling Pulled The Trigger On You ISPs have been known to throttle people who use certain protocols and networks (particularly those on BitTorrent and other peer-to-peer networks). If you think you’re a victim of throttling, run a speed test first. If the speed on your line is ridiculously higher than your download speed, you’re probably being throttled. Keep in mind that there’s a difference between megabits per second and megabytes per second (1 mbyte = 8 mbits). But there’s still one more problem related to this… 5: Your ISP Gives You Higher Speeds For National Downloads There are many ISPs that offer 100 Mbit per second download speeds. Incredible, right? The problem is that this speed is the national speed. In other words, I would download at 100 Mbps only from someone in my own country. For downloads originating outside the country, ISPs may offer anywhere from 5 to 20 Mbps. That’s not nearly as much. To test this, go back to the speed test site I linked you to in the last section. Instead of selecting their recommendation, which is local, hop outside your country and select another one. This will test the efficacy of your line outside your local borders. If you see a drop in speed, this is most certainly your problem.
  18. Scammers and dishonest P2P individuals use false torrents to phish people's identities, bilk them for money, or vandalize their computers through trojan infections. Gratefully, helpful P2P users like 'already_dead' and other longtime supporters of Isohunt.com have built up methods of identifying false torrents and avoiding them. Below are 10 strong suggestions on how to spot fake torrent movie and music files. This list is changing, and will update regularly with changes in torrent swarming technology. 1. Confirm Both the Torrent and the Movie Release Date with a Third Party For brand new movie torrents, take a minute to visit these two sites: www.imdb.com to check release dates www.VCDQ.com to confirm that the new movie exists as a torrent If the torrent does not exist at VCDQ.com, and/or is released before the actual movie date, then do not trust it. 2. You Can Trust .AVI and .MKV Files as a General Rule; Avoid .WMA and .WMV Files For the most part, true movie files are either .avi (audio video interleave) or .mkv (Matroska files) format. Conversely, the great majority of .wma and .wmv files are fake. While there are some authentic examples, most .wma and .wmv files will link to other sites to get paid codecs or malware downloads. 3. Check for 'Verified' Status on the Torrent Sites like Isohunt and Torrentbox will actually employ a committee of core users to confirm and 'verify' torrents. While these verified files are small in number, they are very likely true torrents that can be trusted. Keep your Avira antivirus updated and active, and 'verified' files should be safe to download. 4. Always Read the Comments Some torrent sites like Isohunt.com will capture user comments. Like eBay feedback on other eBay users, these comments can give you a sense of how legit the file is. If you see no comments on a file, be suspicious. If you see any negative comments on the file, then move on and find a better torrent. 5. Beware a Disportionate Number of Thousands of Seeds, but No Comments Abusive uploaders will falsify the number of seeds and peers. By using software tools like BTSeedInflator, abusers will make their torrents look like 10,000+ users are sharing it. If you see these massively large seed/peer numbers, but there are no user comments on the file, then avoid the file! Any true torrent that has more than a few thousand seeds should also have positive user comments. 6. Beware if Password Instructions, Special Instructions, or Exe Files Are Included If you see a file in the movie/music torrent that says 'password', 'special instructions', 'codec instructions', 'unrar instructions, 'important read me first', 'download instructions here', then the torrent could be a scam fake. The instigator is likely looking redirect you to a shady website to download a dubious movie player as a precondition to opening the movie file. Furthermore, if there is an exe executable file included, then definitely avoid that torrent download! Executable files for movies and music are a big red flag, as there is no need for an executable file to be present. Exe files and any passwords or special download instructions are likely a sign that you should move on and find a better torrent download elsewhere. 7. Distrust .RAR, .TAR, .ACE Files Yes, there are legit uploaders who use .rar archives to share files. But for movies and music, the majority of rar and archive files are fake. Abusers use the rar format to conceal trojans and codec scam files. Video is already compressed, so there is no need to compress further. If you see an attractive torrent movie file that is in .rar, .tar, or .ace format, distrust it and examine its listed file contents before you download. If there is no list of the contents, do not trust it. If the file list is disclosed, but the file list includes an .exe executable file, or text files with the words 'password' or 'download instructions', do not trust it. 8. Avoid Using the Following Software These torrent software clients have earned a bad reputation for seeding malware, fraudulent codec downloaders, keyloggers and trojans. Avoid using any of the following: BitLord BitThief Get-Torrent TorrentQ Torrent101 Bitroll 9. Beware Trackers that Can't Be Found on Google Open the published torrent details, and copy-paste the tracker names into Google. If a tracker is legitimate, you will see many Google hits where many torrent sites point to the copy-pasted tracker. If the tracker is false, you will find many unrelated hits at Google, often with the words 'fake' as P2P users post warnings on that fake tracker. 10. Only Use the Following Media Players These are the trusted movie and music players of 2012. Anything other than these products is a candidate for being a trojan or malware tool. Winamp Windows Media Player VLC Media Plyer GMPlayer KMPlayer
  19. 5. Guest Connection. After the invitation to take control has been sent, the controller must start Remote Assistance just as in step 3, but choose "Help someone who has invited you." The first time you connect to a PC this way, you'll be asked to "Choose a way to connect to the other person's computer," with the choices being an invitation file and using Easy Connect. Choose the appropriate one: helper connect Note that after the first connection, the controller will see a different set of options: The login icons for computers he's already connected to and a blank one labeled "Help someone new." On a repeat connection using a contact's icon, the dialog will show a progress bar with the text " Searching for contact…" There are several reasons why you might want to either view a remote PC's screen across the Internet or actually take control of a faraway computer. The most common need for remotely connecting to a PC is when you're trying to fix a less sophisticated user's system. Another is that you may simply want to access a desktop machine at work from home or from the road. There are several tools for accomplishing this, ranging from those that merely let you see the other PC's screen to those that actually let you control and even reboot it. A bunch of third-party software and Web service options do a great job of connecting you remotely to a PC, including the excellent (and free for non-commercial use) TeamViewer and the also excellent LogMeIn, and GoToMyPC. Some of these offer accessories like file transfer, video chat, and mobile apps that offer remote connection. You can read more about these third-party offerings in Remote-Control Software for Your PC. Windows has two built-in tools for handling this, though, called Remote Desktop Connection and Remote Assistance. Since these are included with every Windows installation, that's what we'll be using to make the connection for the purposes of this article. Setting up Remote Assistance is much easier, while Remote Desktop is more of an IT chore, requiring knowledge of port forwarding, firewalls, and router settings. The Remote Assistance feature does let you see the screen of and take control of another PC, so it serves our purposes well. One advantage of Remote Connection over Remote Assistance is that no one has to be sitting at the host PC. Prerequisites for Connecting to a PC using Remote Connection Since most Windows users are still on Windows 7, I'll go through the process in that OS. Pretty much the same process works for Vista (in case you're still using that much-derided OS), and in Windows 8$119.99 at Microsoft Store. Windows 8 actually offers a new-style (formerly known as "Metro") app for remote desktop connections, too, and it works on Windows RT as well as Windows 8 and Windows 8 Pro. 1. Make sure both PCs are powered up and connected to the Internet. They can't be in Sleep or Hibernate state, either. To prepare the "host," or the machine that you'll be taking control of 2. Enable Remote Assistance. Open the Control Panel, and type "Remote" in its search box. You could also right-click on Computer and choose Properties, and then choose Remote settings on the left panel. You'll open a Properties sheet with the top choice of "Allow Remote Assistance connections to this computer." Make sure this box is checked. 3. Ask someone to connect. At the computer to be controlled, type "Remote Assistance" in the Start button's search box, and then click on Windows Remote Assistance. This opens the following dialog: Click "Invite someone you trust to help you." 4. Send the Invitation. Next you'll see three options for sending the invitation: You'll notice that the last (and best) option, Use Easy Connect, is grayed out on my screenshot: This will be the case if both computers aren't using Windows 7 or 8, with some corporate networks, and if your router doesn't support Peer Name Resolution Protocol. When I connected to a public Wi-Fi network, the option became available. In any case, send the invitation to the user of the computer that's going to do the remote controlling. And Easy Connect lives up to its name: If it's available, that's the one you should use. 5. Guest Connection. After the invitation to take control has been sent, the controller must start Remote Assistance just as in step 3, but choose "Help someone who has invited you." The first time you connect to a PC this way, you'll be asked to "Choose a way to connect to the other person's computer," with the choices being an invitation file and using Easy Connect. Choose the appropriate one: helper connect Note that after the first connection, the controller will see a different set of options: The login icons for computers he's already connected to and a blank one labeled "Help someone new." On a repeat connection using a contact's icon, the dialog will show a progress bar with the text " Searching for contact…" 6. Accept Connection. After the controller/guest has sent the request to view the host PC, the latter gets another confirmation. The controller/guest can then see the host's screen in a large window. He can view the other PC's screen to fit or at full size. Note that color settings were dumbed down for this to work, so don't expect to proof those pro photos. On a not-so-great Internet connection, the redrawing of the screen can also be painfully slow. A big help once this connection is made is that there's a chat box for both users. The controlled PC also has Pause and Stop Sharing buttons. Settings let him choose or turn off bandwidth-conserving features like color depth and window background. A fancy desktop wallpaper can slow down screen redrawing, so consider the dumbing-down options. 7. Request Control. The next step is to take control. The controller-guest has a big "Request control" button at top left. As with every step above, the user of the PC to be controlled has to confirm the request. One option here for the host/controlee's response, besides the simple yes and no, is the "allow user x to respond to user account controls." For detailed support, you'll probably want to check that box. And that's it. Remember, the next time you want to connect the same user, you'll have fewer steps, especially if the host/controlee PC checks the option to add Easy Connect requester to his contacts. But keep in mind that this method always requires a request to be viewed and controlled, so you won't be able to connect to an unattended PC. For that, you'll need to use one of the third-party options above or Windows' Remote Desktop Connection, involving a more business IT–level setup.
  20. Have a great TV and a computer hard drive loaded up with movies and you want to know how to watch movies from your hard drive on your TV? There are a number of easy ways to do it, so you're in luck! You can go down a few different roads, depending on the equipment you have available. For example, if you have a PlayStation 3 or and Apple TV box (among a few other options), you can wirelessly send your movies from your hard drive to your TV. Some TVs have the ability to play movies and music from external media (such as a hard or flash drive). If these don't do it for you, there's always a few more direct options! To watch movies from your hard drive on your TV, you will need: Computer hard drive with at least one movie TV You will also need (in order of most to least reliable and compatible): Method 1: A computer with audio/visual outputs that match your television. Preferably HDMI, though DVI or VGA outputs will do as well if your television allows separate computer sound input. A cable of appropriate length for your setup. One HDMI cable will do, though if using DVI or VGA, an 1/8" audio cable is required in the same length. Method 2: Playstation 3, Apple TV, Slingbox, or other device capable of streaming movies from a separate source Internet connection for each of your devices Method 3: Flash drive TV that supports external media through USB Picked your method and ready to start watching movies from your hard drive on your TV? Method 1: With your computer and television off, connect the computer and television using the appropriate cable(s). If you have an HDMI connection, use only the HDMI cable. If you have VGA or DVI, run the cable to the TV, then run an 1/8" audio cable from the headphone port on your computer to the Computer Audio Input port on your television. Power on your television and switch the input to the port you just connected. Power on your computer. The computer will treat the television as a computer monitor, so in the display settings on the computer, configure the system to duplicate your display or to display only on the television. Consult your owner's manual for specifics related to your operating system. Play the movie as you normally would. Play in fullscreen mode and it will be just like watching a DVD! Method 2: Because of the huge variety of equipment and setups available, consult your user's manual for your streaming device. If you use Windows 7, you already have most of the system pre-configured. Other operating systems may require more software, depending on the device you use. Note that you may encounter strange compatibility problems. Apple especially is notorious for what it will and will not play. Method 3: Copy your hard drive movies to your flash drive. Insert the flash drive into your television's media USB port. The television should auto-display a menu. Select your movie and enjoy! Again, consulting the television owner's manual will help smooth any problems, though you can expect to run in to an incredible amount of compatibility issues.
  21. Watching a YouTube video typically requires an Internet connection, but with a little preparation the videos can be saved for later offline viewing. To see a video version of this Tech Tip, go to YouTube. Before downloading any videos on YouTube, be aware that downloading some content may infringe on copyrights. Once you are on a page with a YouTube video, copy the link in the address bar of the browser. Then open KeepVid and paste the YouTube URL into the box at the top of the page. Click the download button to the right side of the link you just pasted. Since the page runs Java script, the browser will prompt you if you want to run the application and click "yes" or "run." Be careful not to click the large "download" and "play now" buttons on the page as those are advertisements. Once the list populates below, you will typically want to download the highest resolution MP4 file. That file format will play on most computers, smartphones and tablets. Right click on the link and select "save file as" and save the file.
  22. There are numerous ways to share files using the various file-sharing capabilities built into your OS; all you need is a few minutes of prep before you can get sharing. (Though after setting it up once, it'll be a snap to get sharing again in the future.) First, we'll detail how to enable filing sharing on Windows and Mac (we're going to stick with each operating system's default public shared folders). If you already know how that works, you can skip down to your preferred use case: Common File-Sharing Use Cases: We're on the same secure local network We're at a coffee shop or other insecure network—i.e., the ad-hoc method We've got two computers, a wire, and big files we want to transfer really fast. Setting Up Sharing Before we go through the file sharing options, you need to make sure sharing is properly set up on your computer. Enabling File Sharing in Windows 7 http://www.youtube.com/watch?feature...&v=8DNFT535H1Q To enable simple file sharing in Windows, head into the Control Panel and go to Network and Internet > Network and Sharing Center. Hit Change Advanced Sharing Settings and make sure network discovery, file and printer sharing, and public folder sharing (the first three options) are all turned on. Then, head down the list and Turn off password protected sharing, and check "Use user accounts and passwords to connect to other computers". This is the easiest way to connect computers, and the most similar to the Mac method below. If you're worried about prying eyes, see connecting with an ad-hoc network below, and just be sure to turn off file sharing when you're done. If you're sharing with a Mac, you'll need to make sure the Guest account is turned on under Control Panel > User Accounts > Add or Remove User Accounts > Guest Account. To share files in Windows, open up Windows Explorer; you should see all available computers (regardless of operating system) under Network in the Explorer sidebar. If you click on one, you can access its Public folders, in which you have both read and write access (so you can copy files to your machine, as well as copy files from your machine to theirs). If for some reason you don't see the desired machine in the sidebar, you may need to manually enter its name in the Windows Explorer address bar, in the form of file://computername. Enabling File Sharing in OS X http://www.youtube.com/watch?feature...&v=5KxBJAkQqe4 To set up file sharing on a Mac, go to System Preferences and navigate to the Sharing preference pane. Check the box marked "File Sharing" and ensure that your public folder is listed under the shared folders. If you expect you'll need to share with any Windows computers, hit the Options button and mark the "Share Files and Folders Using SMB" box, as well as the box below it that corresponds to your username. When another computer is available for sharing, it will show up in the sidebar of the Finder. You can either place a file in your Public folder for them to view and copy, or they can place a file in your Drop Box (located inside your Public folder and not to be confused with Dropbox the app) for you to then retrieve. If it doesn't show up automatically, just open up the Finder, then navigate to Go > Connect to Server in the menu bar. After typing in smb://computername, it should connect you to the computer and you can carry on. You'll need to choose to log in as a Guest at the prompt, after which mount the Users folder so you can access the Public folder from there. Ways to Connect to Other Computers Over a Common Wired or Wi-Fi Network If you're at your friend's house and trying to share files, it's likely you have a common network available. If your friend has a wired or Wi-Fi network (you'll need an extra Ethernet cable if it's a wired connection), you can both connect to the network and start sharing files as described above. Over an Ad-Hoc Wireless Network Say you're in a coffee shop and you don't want everyone in the area peering in on your Public folder (or say you just prefer to stay away from open Wi-Fi networks). You can easily create a wireless "ad-hoc" network, which only connects your two computers. http://www.youtube.com/watch?feature...&v=dtyEaQiOL64 In Windows, just go to Control Panel > Network and Sharing Center > Manage Wireless Networks and hit Add. Click the Create an Ad-Hoc Network button and follow the steps to create your password-protected network. http://www.youtube.com/watch?feature...&v=BErcw8Ado8A On a Mac, the process is very similar—just hit the AirPort icon in the menu bar and click Create Network. Type in a name and check "Require Password" to be safe. Type in a password and give it to your friend, who can then connect to the network just like any other Wi-Fi network. After your friend connects, you should be able to follow the above steps to share files Over a FireWire or Crossover Cable By far the fastest way to transfer data is over a wired connection, if you happen to have a cable available. FireWire is the fastest option, although it's only available to Macs (unless you have an older version of Windows, and we've shown you how to do that before). Ethernet is still a pretty speedy alternative for either platform, although you'll need a special Ethernet cable called a crossover cable. Alternatively, you can get a crossover adapter that you can use with a spare Ethernet cable to create the network. All you need to do is connect the computers with the cable, and follow the above instructions to share the files. Update: A lot of you have noted in the comments that you can, in fact, use regular Ethernet cables to do this. Your mileage may vary, but it's worth a shot before you go buy a separate cable or adapter.
  23. You must be using online services or software programs to take screenshot from your computer and save it as image file. In this article I will teach you How you can take screenshots without using any program, by using inbuilt capture screen feature of your Operating Systems. It doesn’t matter whether you are using any Standard Linux Distro or a Windows Operating System, your Operating System has an inbuilt feature to take screenshot. Still Wondering ? Then why there is a PrtScn button on you keyboard ? Most of the Standard Keyboards have PrtScn(sometimes along with SysRq) button on them. These buttons might not be available on Laptops, Notebooks and Netbooks, which are specially made to save the space. To take Screenshot of the current screen of your computer all you have to do is to press PrtScn button on your keyboard once. Now open any graphic editing or paint program, such Photoshop or Microsoft Paint and press Ctrl+V. Once you will press Ctrl+V, the screenshot of the screen on which you pressed PrtScn button will appear, save the image. That’s it. Hurray! You just learned How you can take screenshots ? Wasn’t that easy ? You can also press Ctrl+V button after pressing PrtScn button in Word processing software program or any other type of document editing program, the screenshot will appear there too. Source : Internet.
  24. In today’s world, you need Internet access for most of your technical and professional work. Every professional has his own email address which he uses for various kind of activities like: Online Shopping, Online Banking, Sending important document etc. Since very online transaction and shopping is very SERIOUS stuff, it is required no one other then you can access your email. In this article I will tell you some tips which you can use to safeguard your account from hackers. 1. Never use password easy to guess – The very first thing a hacker or any one who want to access your account will do is to guess your password. It is recommended to keep a password which couldn’t be guessed easily. Password: Use a strong password for your accounts (forums, trackers and emails). A strong password must be 12 or more digits. And it must contain uppercase letters (A, B, C...), lowercase letters (a, b, c...), numbers (1, 2, 3...) and special characters (#, ^, &...). 2. Don’t open suspicious emails – Like me you must have also received email asking your personal details so that you can claim million dollar prize, these types of emails are fake and you should report them spam and delete them. 3. Don’t open suspicious links – Phishing is a type of hacking in which you are somehow made to open a suspicious link which has a fake login page of suppose, Facebook. You are asked to enter your log-in details there, when you enter your log-in details then they are logged on server and the hacker can access your account. It is recommend to never open any suspicious link and always check the Website address whether it is true or fake. 4. When prompted for ‘Remember this password’ any similar message never select ‘Yes’ – This feature is for your convenience but here you should compromise because many virus programs are programmed in such a manner in which the password saved on computer is sent to hacker silently. 5. Always logout from your account – If you are in Cybercafe or any similar public place where the computer is used by many people, you should logout from your account before leaving. It would be best if you can delete ‘cookies’ too, else loggingout from account is enough. 6. Never share your login details on suspicious sites – If you land to a suspicious website which asks for credentials of your account, you should leave that website immediately. 7. Always access your account from ‘trust worthy’ computer – Several hardware and software key loggers are installed on computers to log your account details, it is recommended to log-in into your account from a computer which you trust. 8. Don’t run after free stuffs – If you need free software programs, you should always use a trusty website such as Softpedia. 9. Use mobile verification – Nowadays most of Email providers and social networking sites have feature of mobile verification, in case your account is compromised or you forgot your password, you can request new password to be sent on your mobile. 10. Use your common sense – I don’t think I have to explain it. If you follow most of above tips, I am damn sure your account will be very hard to get hacked. Source : Internet.
  25. Welcome! Dear users once again we want to show that we do not rest on our laurels and we present our next work "TV Guide". TV icon, next to a message on the right side KLIK Any comments are welcome, can be placed in this topic KLIK We hope that the fruit of our labor you'll like and will help us survive the next few months together in a network. Greetings: Staff PS
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.