Dumb Ways To Die


In this week's Techjav's Friday Fun, we have Dumb Ways to Die - a funny dumb game with clever mix of catchy note and a bunch of amiable animated characters which dies by doing dumb things.

Objective of this game is save the amiable character from dying as they are on their sucide mission.There are different tasks which has to be done to stop that dumb character from dying like - sometimes you have to swat away bees, balancing that wobbling glue eater, carefully remove forks from toasters, help self-taught pilots or have patience while crossing. Once you complete a few puzzles successfully, it gets faster and then they get even “fasterer.” It’s a very challenging, but incredibly fun game.

Its simple, addictive and fun game with catchy notes.

When you play this for the first time , you won't even know whats happening. You'll have to play it twice or thrice to understand what exactly to do to prevent dumbos from suciding. Simple tasks and simple interface makes this game simpler and adding dumb things to it makes it funnier.

I hate the guy that vomits on the screen and you've to wipe off all of it. Still I love the game.

Enjoy adorable dumbness on your Android and Apple gadgets and watch charmingly dumb characters


Samsung Unpacked Galaxy S5 - Bigger, Better, Faster with more pixels and refined design at MWC 2014

Galaxy S5 will come in four color options
Samsung Galaxy S5 will have two variants - one with the quad-core Snapdragon 801 with a 2.5GHz clock speed and another will be powered by an octa-core Exynos SoC running at 2.1GHz clock speed. 

Samsung Galaxy S5 will feature Dust And Water Resistant, Heart Rate Monitor and Fingerprint Scanner (PayPal certified)

Galaxy S5 comes with massive specs arsenal like the 16MP camera, new Snapdragon 801 processor , 128GB SD support, fingerprint scanner (PayPay certified which can be used for mobile transactions) and added software features like "Download booster", S-Health 3.0 (Heart Rate monitor built next to the camera flash) and Ultra Power Saving mode - a truly great additions to an already very solid handset.


Galaxy S5 Arsenal Specs

Display:  5.1-inch Super AMOLED, Full HD (1920 x 1080) with 432 ppi pixel density
Processor:  2.5GHz  Qualcomm Snapdragon 801 or 2.1Ghz Exynos Octa-core
CPU:  2.5GHz Krait 400
GPU:  Adreno 330
RAM :  2GB
Storage:  16GB/32GB
Battery:  Li-Ion 2800 mAh battery
                Stand-by Up to 390 h
                Talk time Up to 21 h
Networks:  3G, LTE Cat. 3 2X2 MIM
Connectivity:  GPS, microUSB, Wi-Fi, Bluetooth 4.0 LE, GLONASS
Dimensions:  145 grams, 142 x 72.5 x 8.1 mm
Colors:  Black White, Blue, Gold
Cameras:  16 MP Supercharged autofocus with rear LED flash with ISOCELL and 4K recording    (limited to just 5min), 2.1 MP front
Software:  Android 4.4.2(KitKat) with Samsung’s new TouchWiz interface
Noteworthy:  Waterproof and dust resistant Rated IP67 - USB port covered with plastic flap

Galaxy S5 release date: 11,April
Galaxy S5 price: To be announced
Source: SAMSUNG TOMORROW

Here we have specs comparison of Samsung Galaxy S series floating in the market.



First view of Galaxy S5 Launced at MCW14

Start feeling better with these Incredible Wallpapers

Techjav's personal collection of the best wallpapers for your Desktop












Chrome Extension Of The Week | Google Dictionary - View definitions easily as you browse the web


There are thousands of fantastic Chrome Extensions on Chrome Web Store but we help you find a useful, interesting and productive extension every week and so we're recommending you extension Google Dictionary.

Normally while surfing web we come across complicated words. At that time, it seems a hard task to open a new page and find out the meaning of that word. We need everything easy to use. Now find out the definition of a word without opening a new page by Google Dictionary Extension.

I frequently use Google Dictionary . All you need to do is just a double-click on any word on a web page and its meaning pops up on top of it. The best part: It also has a speaker button, which when clicked pronounces the word for you. Definitely the quickest way to find the meaning of a word, and confirm its pronunciation at the same time.

Quickly search and pronounce the word you come across

Identity Theft: Tools and Prevention

Identity theft has been around as long as there has been identity. Long before the age of computers, and before the common and omnipresent connectivity of modern day life, information was much scarcer. Identify thieves had to work a lot harder to uncover their victim’s details; however, once they found what they wanted it was often much easier than it is today to get away with the crime.

Today, all of this has changed. Everything from your checking account to that party you went to last Friday night is located somewhere on the web. If you spend any significant amount of time online, just about anyone who knows how to use Google can probably find out where you live and what you do for a living in a matter of minutes. And for a motivated hacker, this is more than enough of a lead.

All it takes is a person or persons with enough patience and know-how to pierce anyone’s privacy — and, if they choose, to wreak havoc on your finances and destroy your reputation.

Identity Theft: Tools

There are a number of tools available which can be used in various ways by hackers. Though technical knowledge is important to effectively protect yourself, it is useful to get acquainted with them.

Key Loggers

A key logger is a program that records what you’re typing and shows it to the hacker. Key loggers are usually used to discover passwords to financial accounts, but they can also be used to monitor a target’s online communications.

Brute Force Password Hacking

Hacking passwords is a science. Hackers can guess your passwords through a series of educated guesses or through algorithms. Not only this, most people reuse their passwords, and most of these passwords are relatively easy to guess.

Let’s say for example that you were born in 1991 and you have a pet dog named Scooby, so you decide to make your password Scooby1991. Let’s say that you also have a Facebook account that lists your birthday and features tagged photos of you and Scooby. Any intelligent hacker with an inclination is going to figure you out.

Backdoor Access

If a hacker wants to get into your computer to steal passwords or files or to remotely monitor your activity, they can install a “backdoor” entryway. Backdoor programs exploit weaknesses in your network security and allow the hacker to come and go as they please, without your knowledge or permission. Many backdoor entryways are created when unsuspecting computer users download “Trojan Horses,” which are programs designed to look like useful software that actually establish backdoor entries behind the scenes. Trojans are just one of multiple ways a hacker can get into your system, though.

Identity Theft: Methods

Today’s identity thieves are armed with many forms of software and computerized tools, but these tools are absolutely useless unless they are installed on your computer. Accordingly, determined hackers have been known to go to great lengths to get their malware on their victims’ computers.

Physical Implantation

Though not the most creative method, physical implantation is tried and true and extremely effective. If a hacker really wants to establish a backdoor entry or key logger on your computer, they can try and gain physical access to you device and install the file while you are away.

Attacking Your Wireless Network

Hackers can physically come near your house, in range of your wireless network and attempt to identify it. If you have a Wireless Protected Setup (WPS), breaking in is surprisingly easy. Once inside your network, hackers can pretty much do whatever they want. This includes stealing your sensitive information right then and there, establishing a backdoor entryway, or simply implanting any other type of virus they’d like.

Fooling you onto their Network

Hackers often fool their targets into logging onto wireless networks in public places. For example, a hacker could wait for their target at a coffee shop, set up a network called “Coffee House Wi-Fi,” and thereby fool the target into logging on. Once the connection is made, the hacker may be able to monitor what you are doing online, view your computer’s files, or implant a virus.

Malicious Email

Most of the modern day users, spending most of their time online know better than to open phishy sounding email from a mysterious stranger with an offer that’s just too good to be true – but hackers know this, and have creative ways of working around it. A very fine example is illustrated in Adam L. Penenberg’s article.

Malicious Hardware

One of the most creative and seemingly innocuous approaches to identity theft infiltration is through malicious hardware, such as an infected flash drive. This method is mostly used when identity thieves have a specific target in mind.

Stealing Cookies

On the Internet, a cookie is a temporary file automatically created by your browser to speed up your surfing ability. If you have ever logged onto a website multiple times in one sitting and found that you only had to supply your log-in credentials once, you have experienced a cookie. However, like passwords cookies can also be stolen. In fact, hackers have developed numerous programs to steal their victims’ cookies once they have worked their way onto the same network. One of the most well-known cookie stealing tools is called Firesheep, which was developed by an independent software developer to show just how vulnerable Firefox users were to cookie theft. Once a hacker has stolen your cookies, they can use them just as you would, to log onto websites that you frequently use. Depending on what these websites are, cookie theft can be disastrous.

Fake File Names

Deception, deception, deception. Identity Theft is all about deception? Another way hackers pull their deception off is by naming files things that they are not. Let’s say you’re trying your hand at online dating, and you receive a “private email” from a potential match. In this email, you get an attached file entitled sexypic.jpg.exe. Is it a flirtatious .jpg, or is it a potentially dangerous .exe? In this case, the answer is the latter; but, for many users, all that matters is that it says sexy.

Still, even the most novice of computer users know that any file containing .exe is one to be suspicious of. Hackers have therefore developed a very clever workaround that they’ve been using for years. It’s called the Right to Left Override trick, and it works by utilizing the Unicode character U+202E.

Say a hacker writes a virus and names it aReallysgpj.exe. If you received this file as an attachment in an email, you would probably delete it immediately. But what if the file was called aReallysexe.jpg instead? Chances are high that anyone with a sense of curiosity would open it.
How do hackers pull this off? Simply by inserting Unicode character U+202E after aReallysgpj in the original file name: aReallygpj [U+202E].exe

This magically flips gpj.exe into exe.jpg, giving you aReallysexe.jpg, without changing the executable format of the file. What’s interesting is that this only works because exe is a palindrome.

Redirecting your Hosts

When your computer looks up a website, a lot of complicated processes take place. Knowing this full well, people who write operating systems have created a number of methods to simplify things. One of them is called the Hosts file, which is a file that exists in the background of your computer.

Kind of like cookies, the Hosts file works to speed up internet usage by storing commonly visited domain names and their IP addresses on your computer. Also like cookies, the Hosts file is great, up until the point it gets into the hands of a hacker.

Say an identity thief got onto your network or computer and wanted to steal your identity. If they wanted to, they could go into your Hosts file and compromise your domain name to IP address match ups. By doing this, they would make it so that the next time you went online and typed, for example, yourfavoritewebsite.com, you’d be led to a falsified version of the site, designed by the hacker to steal your financial information.

Poisoning the Waterhole

Identity thieves have also been known to use the waterhole technique to attack virtual meeting places, such as social media. The specific tool that is used to do so will vary from case to case, but in all cases the social engineering tactic is the same. People flock to social media sites in huge masses and because of this individual users fall into a false sense of security. From 20,000 profiles all “liking” the same thing, the odds of being the chosen target are slim; but, to hacker looking for an easy target, hitting 20,000 fish in a barrel all at once can mean payday.

Identity Theft: Prevention

A determined identity thief seeking a means of infiltration is limited only by his imagination. Hackers mostly rely on establishing a pretense and fooling their targets into giving away their personal information. More often, hackers target corporations over individuals, because the larger size allows for more modes of entry and a greater degree of anonymity.
No one is completely immune to identity theft, though, familiarity with the tools and means of modern day identity theft outlined above is a great start and in addition to well-designed antivirus software there are many common sense measures that all basic computer users should put into place.
  1. Keep your software up to date. When prompted to install an update for software or operating system you use, do so. Nearly every software update published by companies like Apple and Microsoft contains some degree of security fixes.
  2. Choose a passphrase, not a password. If you choose a simple password for accounts that contains your sensitive information, it isn’t the service provider’s fault that your account was hacked into. Instead of a 6 to 8-character password, choose passphrase that is easy to remember but impossible to guess. Think of a sentence or a phrase and toss in a few numbers and symbols.
  3. Don’t click on stuff. We are tempted every single day to click on links and attachments we receive via email or see in our social networking account. Be very aware that many of these will be malicious and cause your mobile device or computer to be taken over by a hacker. Once they do so, they’ll be sure to replicate the attack towards all of your contacts and friends.
  4. As in day-to-day life, anything you’re unfamiliar with should be put under the strictest review before you open it with your computer. Unfamiliar file extensions and phishy emails from strangers are best ignored.
  5. Remember that Public Wi-Fi usage is Public.
  6. And whatever you do, don’t create an excel sheet of all your passwords ever. That’s just asking for identity theft, from just about anyone who can open a file and read.

Google Keep Reminds You What and Where


In the market there are lots of note-taking applications and services, but if you are searching for a application that's already built into Google Drive and your Google Apps account, take look at Google Keep. With Google Drive it is easier to track changes in documents that are shared among multiple users.

Google Keep reminds you the important tasks at just the right time and place by working with Google Now

Google Keep is  basic tool for note-taking inside of Google Drive which is integrated with mobile devices. It has navigation drawer using which you can quickly switch between your active notes and archived notes, or get a desired view of all of your notes with reminders based on location which may be your favorite feature.

Google Keep also lets you add your existing photos to a note on Android, just tap the camera icon to choose between taking a new photo or adding one you already have in your Gallery.

Keep’s reminder works just like your alarm clock. If you get notice to complete the task but don’t want to deal with it right away, you can snooze it to another time or place. You can try Keep Web app at Drive.Google.com/Keep or Android app from Google Play Store. Let us know what you think about Keep after you try it out!

Track Your Lost Gadgets – Tablets and Mobiles

Getting worried by loss or theft of your tablet or mobile is normal. But if you take precautions beforehand, then you can not only track your tablet or mobiles but also erase the data and contacts saved on them. We have earlier talked about some apps for self defence. Now lets take a look at some of the services, which, after installing and activating on your tablets or mobiles you can easily track them…

Tablets

Prey

Prey project was started for windows but now it has become multipurpose and supports almost all platforms. It supports Mac, Linux, Android, Ubuntu and iOS. With this you can give a command to send SMS through the internet. It has options for stealthily taking screenshots and also to hide data. It can be installed on laptops as well as tablets.

Mobile

iOS

You can activate this feature through iCloud. This feature supports iPhone, iPad and iPod Touch. You can go to the iCloud website and list your device through your Apple ID to know the location of your device. Other than this if you want you can remotely lock your device.

Android

If you are a Samsung smartphone user then don’t forget to sign-in to your Samsung account on your phone. In case of loss or theft your phones you can go to Samsung’s website and not only track your phone but also remotly lock your phone.If you are an Android user you might want to check out our pick of Health Apps for Android.
Avast not only has an anti-virus scanner, SMS and call filtering, remote lock but also has anti-theft and tracking features. Other than scanning local files its anti-virus feature also sends notifications for SIM change, malicious URL, SMS and call filtering.
With AndroidLost user can not only remote lock, GPS location, erase data from phone and SD card, but also remotely control the device’s camera. In case of theft user can click photos from the front and back camera. Other than audio recording, user will get an e-mail for SIM change and can ring an alarm remotely. If the phone has been lost then you can also send a pop-up message on the screen.There is much more that can be done with your Android phone. Take a look at 10 cool things you can do with your Android Phone.

Windows Phone

If you are a windows phone user then you can track your device through ‘Find My Phone’. You can go to your phone’s ‘Settings’ and click on ‘Find My Phone’ to activate this feature. But, a word of caution, this feature drains your phone’s battery faster. In case of loss of your phone, you can go to Windows Phone website and sign in through your Windows Live ID to track your phone’s location on the map.

BlackBerry

Users can install this application from BlackBerry App World. RIM has developed free anti-theft feature, BlackBerry Protect, in its handsets, which can be used to track any BlackBerry phone. If your phone has been stolen or lost then you can go to BlackBerry’s website and login through your BlackBerry ID to know your phone’s location on the map. It also allows you to remotely lock down your phone.

A Full Computer On An SD Card : Intel Edison

Intel Edison, the latest development board from intel is a tiny, ultra-power efficient platform which serves as a development system for wearable devices. At CES 2014, Intel CEO Brian Krzanich quoted  Edison, "a full Pentium-class PC" that's the size and shape of the SD card which can be made to function alonside many of the devices. This game changer from intel functions not only with computers, phones, tablets but with coffemakers, chairs etc. marking the beginning of a new vision.


Similar to the raspberry pi, the tiny device boasts a dual-core 400MHz intel quark processor  with two cores, integrated Wi-Fi and bluetooth connectivity, flash storage, RAM, and a micro-controller for real-time input and output with external devices. The edison chip supports linux. Edison powers the system and connects it to other Edison-powered devices in the home.
Intel even has a specific app store designed for Edison, and a special version of Wolfram that will come to the tiny computer.

To demonstrate the potential for Edison, Intel showed a concept :

In the concept, a baby was wearing a Mimo onesie outfitted with sensors tracking things like temperature, and Edison was used to display that information on, a coffee mug much to everybody's surprize. When the baby was comfortable, blinking lights on the mug show a happy green smiling face, but when something is wrong that face turns red.


This development board from intel has a huge potential, and this is just the beginning with endless expectations piling up every second from this new breakthrough. 

To watch the full keynote presentation at CES 2014, see the video below:

Google Chrome and LEGO teams up to bring Colorful bricks Online


It seems like Google Inc. is trying to get LEGO lovers fired from their jobs as Google has teamed up with LEGO to bring those beloved colorful bricks to the web via a new Build with Chrome application. It's also Google's attempt to  show off their Chrome's capabilities. Build with LEGO is the latest fun experiment from the Chrome team.

The website is fun to use, but creating a model takes as much time as it takes in real life. It gives users a blank LEGO space along with a selection of virtual bricks, pieces and necessary tools that can be used to build pretty much whatever you can come up with.

You’re never too old to play with LEGO

The interesting part is, the LEGO playground  also supports Google+ network and you  can sign in to your Google+ to view your network’s LEGO creations, share them publicly and geo-tag them to a real location in the world. Logging into the tool with Google+ is also required in order to view what the world have put together on Google Maps.

If you’re not ready to actually build anything yet, you can see what others’ creations. There’s also the Build Academy which uses a set of challenges to help you become a master builder.


If you want to use your fingers instead of a mouse, you can use the Chrome for Android browser on your smartphone or tablet which possesses high-end graphics capabilities and support for WebGL.

Check out the promo video below and then head on over to buildwithchrome.com when you are ready to go.