Tuesday, May 29, 2012
The Best Freeware Softwares in One Single Smart Installer Pack for Windows
Using Smart Installer Pack you can save a lot of time when downloading and installing your favorite software after an OS re-installation.
It becomes very annoying to re-install all the previously installed applications after a Windows format. Generally there are must have softwares or rather freewares that need to be reinstalled after the format. The most annoying thing after you format your pc is to search the web, download programs one by one and install them on the computer system. The Smart Installer Pack tries to reduce the time it takes to install popular software by providing an interface to download and install dozens of popular software programs.
Smart Installer Pack is one executable file, which can automatically install more than 70 freeware applications in one click. It eliminates the task of searching around the Internet, waiting, downloading and installing the apps one by one. It has a easy and intuitive user interface design.
Features:
Easy, intuitive user interface design
Contains usual start-up software
Greatly reduces the time needed to install that software, eliminating some of the unnecessary searching, waiting, etc.
All free
The installer comes packed in a convenient executable file
You can choose which software you want to download and install from within the program using suggestive icons
The application is made as small as possible
Install fast, fast, faster!
It is also a good idea to check the version of the programs downloaded with the latest version on the developer’s website (or through an existing update function in the software) to make sure the latest version has indeed been installed.
Download Smart Installer Pack version 1.5
Now, all you have to do is download this Smart Installer Pack and put it to work to get the job done fast.
Enjoy it :)
Sunday, May 27, 2012
Top 6 windows 8 Tips
Windows 8 isn’t even out in beta yet, but it has built up quite a bit of buzz. Tech bloggers and analysts have been talking about it for months and months, but beyond the folks at Microsoft and some developers and reviewers, there have been very few who have had the opportunity to go hands on with this operating system.
Even though a lot of folks haven’t been able to try this new operating system, and it isn’t due out for quite some time, there are a lot of hints, tricks and tips already out for Windows 8. If you can get your hands on a copy of Windows 8 when it comes out on Beta, the following top 6 Windows 8 tips should help you get started using this brand new OS like a pro.
1. You don’t have to use the Ribbon Interface in the explorer windows. There are many users who may find this feature useful, making it easier to find and open files. Other users may not be so keen on this feature, finding it distracting and bulky. You can change this in the Computer Configuration. From here, select “Administrative Templates,” “Windows Components,” and finally “Windows Explorer.” You will need to select enabled for the “Start Windows Explorer with the Ribbon Minimized” option to hid the ribbons on your next startup.
2. There are plenty of new Keyboard shortcuts. While some of the old keyboard shortcuts will still work, there are some new ones that you get to use with Windows 8. The Windows Key and “W” brings up the settings search. Windows and “C” call up the simple “Start menu” along with the date and time. If you select Windows and “Q” the application search comes up. These are only a small sampling of the new shortcuts that are already known for this new operating system.
3. You can uninstall programs from the Start Menu. This is a handy new feature that will make it much easier to get unwanted programs off of your system. To uninstall a program from your Start Menu in Windows 8, right click on the icon for the program to get rid of select uninstall and click on it a second time. Windows 8 is made for touch screen systems, as they seem to be the next big thing; with touch screen you uninstall programs from the start menu by holding the program icon to get options, selecting uninstall from there.
4. Bring back the old control panel interface. If you think the new control panel that Windows 8 offers is a bit too new-fangled, you can get the old one back. Simply open the control panel and select “More Settings” at the bottom of the screen. You will see an option for selecting the old control panel interface.
5. Login Automatically. To set this feature, open the Run dialogue box and enter “netplwiz” to launch the User Accounts dialog box in Windows 8. Uncheck the option that requires users to enter a user name and password. Then you will need to enter the username and password of the account you want to be logged in automatically and select OK. Restart your system and automatic login is all set.
6. You can use a picture for a password. In the Control Panel, if you select “Users” you can create a picture password. Instead of the traditional alphanumeric keyword, Windows 8 lets you use a picture. You select the image and then do a serious of clicks and gestures over the image. To login with the picture passwords, you have to produce the same combinations of gestures on the images when you login, so don’t make your picture password too complicated.
Tuesday, May 22, 2012
How to Activate GodMode In Windows 7 And Vista
If you are using windows vista or windows 7 then you should be aware of Godmode. If you are not aware about the Godmode then in this post I will explain to you what is godmode and how it can be activated in windows 7 and windows vista.
Godmode provides you with a shortcut icon where you can customize all your settings from mouse settings to display settings. This is very convenient as it provides all the options at one single place and activating godmode is also very simple and require only two simple steps.
Here is the Step by Step tutorial with screenshots to Activate godmode in windows 7 and windows Vista
1. Create a New Folder on your desktop.
2. Now Rename you new folder to GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}
3. You can also now change the name GodMode to any other name.
4. You will see the icon of the folder to change automatically.Double click on it and you will get godmode customization settings options.
Note: This trick works perfectly on windows 32-bit version but it does not work properly sometimes on 64-bit versions
Hacking Tools
Here I am sharing with you my collection of "Password Hacking Tools 2010". Using this password hacking kit you will be able to crack a lot of passwords like Windows Admin password, pdf passwords, zip files passwords, document passwords, rar passwords and much more.. I am sure you will find this collection useful.
This Password Hacking Kit Consists of following Password Hacking Breaking Tools:
PDF Password Remover
Windows XP Admin Password Remover
Zip File Password Cracker.
SQL Password Remover
Microsoft Office Password Remover.
Microsoft Windows Vista Password Remover.
Rar File Password Cracker
Windows Password Recovery Kit
Password Changer.
Distributed File Password Recovery..
and much more..
As the name of the tools suggests its a complete password hacking Kit. So guys Enjoy Latest Hacking tools...
How to Use it?
1. Download the Password Hacking
2. Extract the file and install it.
3. Then Register them and use it. ( all tools contain full serial keys and patches)
Monday, May 21, 2012
IT SECURITY
Most people understand their department and know how to use their tools to get their tasks done, but are isolated and unaware of security issues all around them. The weakest link in most security programs is people. To be part of the process and not part of the problem, you need to be knowledgeable and aware.
- Security awareness is recognizing what types of security issues and incidents may arise
Security is about People, Processes and Technology - Explaining existing policies and best practices
Security is more than just Technology - There is no Sec – ? – rity without U
Network eavesdropping
Data flows across networks every day, including passwords, private personal information, personnel records, email messages, financial documents, and more.
By default, data that flows across the network is not protected.
Hackers, malicious insiders, and others may want to steal that data and use it for their own advantage.
By default, data that flows across the network is not protected.
Hackers, malicious insiders, and others may want to steal that data and use it for their own advantage.
A hacker can tap into a network using a wireless device. This is known as War Driving.
A hacker can literally construct a device, that will allow them to park in front of a building or your home and gain access to a network while sitting in their car.
A hacker can literally construct a device, that will allow them to park in front of a building or your home and gain access to a network while sitting in their car.
Secure Your Wireless Network
- Your operating system will tell you if a wireless network is secured or not.
- You should not connect to an insecure network because the data that you send out would be available to everyone around you!
Wireless networks are extremely convenient, but that convenience comes at a price: security. With a traditional wired network, data is channelled through cables and cannot be easily intercepted. With a wireless network, data is beamed through the sky and can be more easily intercepted – unless, that is, you have appropriate security measures in place.
Passwords
There several things you should be aware of concerning password security.
Passwords (can be and) are often written down by users who have trouble remembering them. Passwords are also more and more stored electronically, on PDAs or mobile phones. Do not leave passwords recorded anywhere for others to find.
Passwords (can be and) are often written down by users who have trouble remembering them. Passwords are also more and more stored electronically, on PDAs or mobile phones. Do not leave passwords recorded anywhere for others to find.
Social engineering and Phishing scams
These scams can trick a user to disclose the password, just by asking the password in some way (e.g. a so called helpdesk-person calling).
Key-logging:
Passwords can be intercepted by key-loggers (hardware or software) and then transmitted to other people.
Passwords can be intercepted by key-loggers (hardware or software) and then transmitted to other people.
Shoulder surfing:
refers to using direct observation techniques, such as looking over someone’s shoulder, to get information. Shoulder surfing is particularly effective in crowded places because it is relatively easy to observe someone as they:
refers to using direct observation techniques, such as looking over someone’s shoulder, to get information. Shoulder surfing is particularly effective in crowded places because it is relatively easy to observe someone as they:
- Fill out a form
- Enter their PIN at a cash machine or a POS terminal
- Use a calling card at a public pay phone
- Enter passwords at a cybercafe, public and university libraries, or airport kiosks.
- Enter a code for a rented locker in a public place such as a swimming pool or airport
Shoulder surfing can also be done at a distance using binoculars or other vision-enhancing devices. Inexpensive, miniature closed-circuit television cameras can be concealed in ceilings, walls or fixtures to observe data entry. To prevent shoulder surfing, it is advised to shield paperwork or the keypad from view by using one’s body or cupping one’s hand.
Cracking:
Passwords can be cracked, especially if they are short (although short is a relative concept, taken into account the increased computing power available today).
Guessing:
Passwords can be guessed, e.g. if no strong password policy is enforced.
Passwords can be cracked, especially if they are short (although short is a relative concept, taken into account the increased computing power available today).
Guessing:
Passwords can be guessed, e.g. if no strong password policy is enforced.
To counter guessing, quite simply, the passwords need to be made as long and as complex as is practicable. Be significantly different from your previous passwords. Not contain your own name or user name. (Nor the name of spouse, children, pets etc.)
Have at least one symbol character in the second through sixth positions.
Have at least one symbol character in the second through sixth positions.
Packet Sniffing:
Passwords can be sniffed, intercepted when in transit between a PC and a server (e.g. on the Internet)
Packet sniffing is the monitoring of data traffic on a computer network. Computers communicate over the Internet by breaking up messages (emails, images, videos, web pages, files, etc.) into small chunks called “packets”, which are routed through a network of computers, until they reach their destination, where they are assembled back into a complete “message” again. Packet sniffers are programs that intercept these packets as they are travelling through the network, in order to examine their contents using other programs. A packet sniffer is an information gathering tool, but not an analysis tool. That is it gathers “messages” but it does not analyze them and figure out what they mean.
Passwords can be sniffed, intercepted when in transit between a PC and a server (e.g. on the Internet)
Packet sniffing is the monitoring of data traffic on a computer network. Computers communicate over the Internet by breaking up messages (emails, images, videos, web pages, files, etc.) into small chunks called “packets”, which are routed through a network of computers, until they reach their destination, where they are assembled back into a complete “message” again. Packet sniffers are programs that intercept these packets as they are travelling through the network, in order to examine their contents using other programs. A packet sniffer is an information gathering tool, but not an analysis tool. That is it gathers “messages” but it does not analyze them and figure out what they mean.
Resetting:
Passwords can be reset (which is often easier than cracking a password). If you have created a password restore disk for your computer always ensure that it is stored safely. Anyone can use this disk to reset your password. No matter how many times you have changed your password since the disk was created.
Passwords can be reset (which is often easier than cracking a password). If you have created a password restore disk for your computer always ensure that it is stored safely. Anyone can use this disk to reset your password. No matter how many times you have changed your password since the disk was created.
Password Best Practice
You should not include personal information in your password, such as your birthday, the name of your dog, favourite sports team, etc.
- Use as many characters as possible; the longer the password, the harder it is to crack.
- Phrases are better then passwords, e.g. ‘Your company is #No1′
- Do not use dictionary words in any language
- Do not use easily guessed patterns (1234,1bcd, qwerty, etc
- Use a mix of upper and lower case letters, numbers and special characters
- Change your password as often as possible.
Threats and Frauds
Threats
The trends in the use of World Wide Web technology are changing with the aim to enhance creativity, information sharing and collaboration among users
But it also comes with new Risks, Threats and Fraud!
But it also comes with new Risks, Threats and Fraud!
Malware
Malware stands for ‘Malicious Software’. It includes any program or file that is designed to do harm. To distribute them hackers will often hide them inside other programs on websites or send them to you by e-mail. These include:
- Viruses and Worms
- Trojan Horses
- Adware and Spyware
- Phishing / Pharming
- Spam and Hoax letters
Types of Malware
Malware can gain remote access to your system thus allowing data to be sent to the hacker and further infect others through disabling anti-virus and firewall software.
Pharming
Pharming is an attack in which a user can be fooled into entering sensitive data such as a password or credit card number into a malicious web site that impersonates a legitimate web site. The attacker does not have to rely on having the user click on a link in an email. Even if the user correctly enters a URL (web address) into a browser`s address bar, the attacker can still redirect the user to a malicious web site.
Adware
Adware stands for ‘Advertising Supported Software’. It refers to any software that automatically plays, displays or downloads advertisements. These adverts are seen after software is installed on a computer or while the application is being used.
Viruses
A virus is a malicious computer program that can copy itself and infect a computer by corrupting or modifying files. It does this without permission or knowledge of the user. A virus replicates itself by attaching to another object e.g. via e-mail attachments, internet downloads, diskettes, CD’s, etc.
Spyware
Spyware is software that is used to gather information about a person or organization without their knowledge. Spyware displays advertisements related to what it finds from spying on you. This is called ‘Targeted advertising’.
Phishing
An e-mail that masquerades as a legitimate contact from a business or organization in an attempt to steal personal or financial information is called Phishing. Phishing often states that there is a problem or threatens to terminate an account if you do not respond.
Spam
Spam is unsolicited e-mail on the Internet. In almost all cases, the sender’s address is ‘spoofed’ – i.e. it pretends to be from a legitimate sender. Spam is a common carrier of malicious code. Difficult to stop completely without stopping a valid mail from time to time.
Trojan Horses
These are delivery vehicles for malicious or destructive computer programs, similar to viruses or worms. Hackers, virus writers, and even advertisers can embed malicious code into any program or file that appears to be harmless or useful, such as an animation or video game.
Worms
A malicious computer program, like a virus, but a worm can spread itself without any user interaction Usually more dangerous than a virus as they can cause harm to the network. Worms are also invisible to the user.
Antivirus Software
Regardless of the type of anti virus software software running on your PC it should have the following characteristics.
- It will have an antivirus detector, that continuously monitors your system.
- An email scanner than detects viruses in incoming emails.
- An update manager which ensures your virus database is up to date. You can also update the database now rather than waiting for periodic updates.
Do not permit activities which can distribute viruses such as peer-to-peer file sharing from your computer. Also scan all new files, such as those on CDs, DVDs, USB drives, flash memory sticks, and diskettes.
Malware Examples
Adware / Spyware
Adware / Spyware comes in many different forms, a common approach is to try to get you to click on a button which will install the malware onto your computer.
Do not install ‘Free Anti-Spyware’ software or software claiming to speed up your PC. It is usually spyware itself. Pop-up Windows should be closed down immediately.
Never click on links that you receive through Instant Messaging software either. Again this is probably a hidden installation of Spyware or Adware.
Do not install ‘Free Anti-Spyware’ software or software claiming to speed up your PC. It is usually spyware itself. Pop-up Windows should be closed down immediately.
Never click on links that you receive through Instant Messaging software either. Again this is probably a hidden installation of Spyware or Adware.
Phishing Attacks
A classic phishing attack will often state that there is a problem and threatens to terminate an account if you do not respond by installing software or entering account details on another site. Now if you look at the properties of the sender, it appears genuine BUT if we hover over the link you can see that it is clearly from another domain. www.tsb.co.uk
Never install unauthorized software on your PC or reply to an email with personal or financial information. If you fear you may be a victim of phishing, contact the appropriate financial institution etc.
Never install unauthorized software on your PC or reply to an email with personal or financial information. If you fear you may be a victim of phishing, contact the appropriate financial institution etc.
Pharming Attacks
A pharming website is one which allows a hacker to redirect that website’s traffic to another web site. At this site they can steal your financial or personal details typically on a registration form.
Pharming conscious websites typically use the HTTPS web protocol on their login page to allow the user to verify the web site’s identity.
If an attacker attempts to impersonate a site using HTTPS, the user will receive a message from the browser indicating that the web site’s “certificate” does not match the address being visited.
Under these circumstances you should never proceed and press “No”. You will return to the previous page.
Under these circumstances you should never proceed and press “No”. You will return to the previous page.
Spam Email
Spam email is often (although NOT ALWAYS) redirected to your “Junk” email folder or else quaranteened on the company mail server.
- Do not open unsolicited messages, just delete them.
- Be very wary of emails with links on them, especially when they link to other domains.
- Do not reply to emails trying to sell you something if the supplier is unknown to you.
- Do not respond to emails from financial institutions. Reputable organisations will never ask you for account details etc by email.
- Never open mail that has “Re:” in the subject line if you did not originally send a message to that address.
- Do not post your email on any websites and do not use a second disposable email account from providers such as hotmail or yahoo as this will greatly increase the amount of junk mail you get.
- Do not forward chain letters
- Never open mail that has “Re:” in the subject line if you did not originally send a message to that address.
- Do not post your email on any websites and do not use a second disposable email account from providers such as hotmail or yahoo as this will greatly increase the amount of junk mail you get.
- Do not forward chain letters.
Email Golden Rules
Remember these golden rules surrounding email:
- Never open unfamiliar “RE:” emails.
- Do not put your email on the web (e.g. Facebook, Twitter etc.)
- Do not use free mailboxes for work emails such as Hotmail or Yahoo.
- Ignore chain letters.
- Be wary of replying to spam messages or clicking ‘unsubscribe’.
- Do not send personal or financial data via email.
Install latest patches
It is very important to keep your Operating System up to date with the very latest updates, services packs and patches. Ensure that updates are automatically downloaded.
INSTALLING NEW DEVICE
When a physical device such as a PCI card is inserted into a machine it may still require installing within the operating system. A logical device can be “removed” while the physical device remains connected! Plug and Play (PnP) devices are fairly easy to work with. A computer can usually deal with these without much help. Older devices like ISA cards or externally connected devices may need configuring. This may also apply to newer PnP devices if they have been disabled or removed.
Using the Add Hardware wizard from the Control Panel is the recommended way to install hardware. Alternatively, a device can be installed using the Add Hardware Wizard from the System Applet. (The system applet can be accessed by right-clicking on My Computer and selecting Properties)
In either case the Add Hardware Wizard will appear. Click Next to Continue.
The wizard will attempt to search for any new hardware connected to the computer.
If the device is not found the wizard will ask you if you have connected the hardware.
Select the desired option and click Next.
Select Add a new device, and click Next. This routine is common to most hardware installation…
The wizard will ask you if you want to automatically detect the device or manually select from a list.
Selecting Manual will bring up this screen. Select the desired device category and click Next.
If the device isn’t listed then you may need to contact the manufacturer to obtain a driver.
Select the device and Click Next.
The Hardware is then installed. Click on Finish to complete the
Thursday, May 17, 2012
Learn How To Create A Realistic Underwater Effect In Photoshop
In this tutorial you will learn how to create a realistic underwater effect in Photoshop using various filters, lighting effects and blending techniques.
Here the recourse that you need to use to create this photo
Here the recourse that you need to use to create this photo
Step 1
Create a new document with width 950px and height 1000px.
Now pick the ‘gradient tool’ to give gradient to your
background.
Now pick the ‘gradient tool’ to give gradient to your
background.
Step 2
Create a new layer by going to Layer> New> Layer and label it
as ‘surface’. Select some area on this layer using ‘rectangular
marquee tool’. Use default colors, which are # 000000 as
foreground and #ffffff as background and go to Filter> Render>
Clouds.
as ‘surface’. Select some area on this layer using ‘rectangular
marquee tool’. Use default colors, which are # 000000 as
foreground and #ffffff as background and go to Filter> Render>
Clouds.
Step 3
Keep this ‘surface’ layer selected and go to Filter> Artistic>
Plastic wrap. Use the following values for plastic wrap.
Now press ‘Ctrl+T’ to resize this selected area and expand it to
fit your canvas. Duplicate this ‘surface’ layer.
fit your canvas. Duplicate this ‘surface’ layer.
Step 4
Press ‘Ctrl+T’ to resize and drag this textured layer to the top
portion of your canvas as shown below.
portion of your canvas as shown below.
After that, we’ll add some lighting to the ‘surface’ layer. For
this, go to Filter> Render> Lighting effects and use ‘omni’ to
get nice effect.
this, go to Filter> Render> Lighting effects and use ‘omni’ to
get nice effect.
Step 5
In order to finish our surface portion, change the
blending mode’ to ‘Luminosity’ and reduce the
opacity of this layer to 80%. Select the soft round
eraser tool to erase the lower edges, so it can
blend with the background.
Step 6
Now select the duplicated surface layer and decrease its size a
bit by pressing ‘Ctrl+T’. Drag it just below the original surface
portion. Use ‘Overlay’ blending mode and 50% opacity and
erase its edges to get the effect like this.
bit by pressing ‘Ctrl+T’. Drag it just below the original surface
portion. Use ‘Overlay’ blending mode and 50% opacity and
erase its edges to get the effect like this.
Step 7
Next, we’ll create some residue in water. Create a new layer
just above the gradient layer. Fill it with # 000000 color. Go to
Filter> Noise> Add noise and use the following values.
just above the gradient layer. Fill it with # 000000 color. Go to
Filter> Noise> Add noise and use the following values.
After that, change the blending mode of this noise layer to
‘screen’ and opacity to 15%.
‘screen’ and opacity to 15%.
Step 8
Next, we’ll create the bottom of our image. Open the ‘stones’
image and select its bottom part using ‘pen tool’ and click
‘Ctrl+U’ to open the ‘Hue and Saturation’ window and use the
following values to extract colors.
image and select its bottom part using ‘pen tool’ and click
‘Ctrl+U’ to open the ‘Hue and Saturation’ window and use the
following values to extract colors.
Step 9
Open the ‘rocks’ image now and select some portion of rocks
using ‘pen tool’ and desaturate the image exactly as done in
step 8. After this, adjust the position of both stones and rocks
images to give realistic look.
using ‘pen tool’ and desaturate the image exactly as done in
step 8. After this, adjust the position of both stones and rocks
images to give realistic look.
Step 10
Duplicate the blue gradient layer and place its copy just above
‘rocks’ image layer. Change its blending mode to ‘Linear light’
and opacity to 80%.
‘rocks’ image layer. Change its blending mode to ‘Linear light’
and opacity to 80%.
Step 11
Now we’ll create sunrays penetrating through the surface.
Create a new layer, select a square about 80% of your canvas
size, using ‘rectangular marquee tool’ and go to Filter>
Render> Clouds. Then click on Image> Adjustments>Threshold
and use the following values.
Create a new layer, select a square about 80% of your canvas
size, using ‘rectangular marquee tool’ and go to Filter>
Render> Clouds. Then click on Image> Adjustments>Threshold
and use the following values.
After this, go to Filter> Blur> Radial blur and use the given
settings.
settings.
Change the blending mode to ‘Linear dodge’ and opacity to
50%.
50%.
Step 12
At the end, we’ll add some fishes using fish brushes. Select the
‘brush tool’ and draw them of different sizes. I added color to
few through ‘color overlay’ blending option. Collect all fishes in
a new group and reduce its opacity to 75%.That’s it, we are all
done.
‘brush tool’ and draw them of different sizes. I added color to
few through ‘color overlay’ blending option. Collect all fishes in
a new group and reduce its opacity to 75%.That’s it, we are all
done.
The Final Picture Like That. :)
Saturday, May 12, 2012
How to change Your Processor Speed
If you want to test your CPU speed to check if it comes close to the one advertised by your chip manufacturer, then I think CPU Speed Professional is very useful software. You can also submit your score to an online database and compare it to other scores around the world if you are so inclined. CPU Speed Professional is a standalone application that measures the REAL speed of your Intel or AMD central processor unit (CPU). It features a stunning interface with elegant animations and screen transitions. Click the 'Test My Speed' button and watch as CPU Speed ramps up your computer's processor to full throttle.
The MHz needle swings around a handsome 'speedo' style dial to display your cpu speed. Click the 'Show CPU Details' button to see more detailed information about your system, including cpu manufacturer, published speed, memory configuration and more. After you have tested your CPU speed, you can choose to submit the result to the CPU speed online ranking site so that you can compare your speed with other ones.
Features:
Advanced speed test
Advanced CPU Information Efficiency
All processors work for Resolution
Real Application
Advanced Information
TNC Reklamlı
Support for multiple languages
Free
After installing the software i test my CPU speed. Showed 4-Core AMD 2200 MHz speed. Not bad.
Click Here To Download CPU Speed Professional
Enjoy it :D
Friday, May 11, 2012
How to send SMS from your Gmail account to your Friends number phone?
Ok let me show you how to do that? First you need to create G:mail account, by do that go to www.gamil.com
and than follow the set to sign up. Ok now you have one gmail account let log in your account and at the chat panel they your friend name and the pop up appear and click on send SMS (See Picture 1) and windows pop up again just type your friend number and hit save (see Picture 2), you will chat box at the button of you gmail account (See Picture 3). See Screen shot bellow
Picture 1.
Picture 2.
Picture 3.
Note: It can use with Smart Mobile only, because this program just support for Smart User. Enjoy it, Thank you it. :D
Windows TipsHow to Play Mobile Phone (Java) Game On Your PC
Play your favorite mobile games on your PC
Did you know that you can play Java games on your pc? To play mobile games on your computer you need to download the emulator KEmulator Lite.
KEmulator Lite is a mobile java games emulator that allows you to play your 3D java game collections on your PC with size 240x320 (and less), so.. with this application you can try the games on PC first before you install on your mobile phone.
The Features of KEmulator Lite:
- Possibility to play games for the screens of touches a mouse.
- Record of video
- It is possible to do skrinshoty
- It is possible to change the mode (for every telephone there is the mode)
How to use KEmulator:
- Download KEmulator from here
- Run KEmulator.exe
- Navigate to Menu: Midlet->Load Jar/Load with console and choose the game that you want to open.
Useful Tips of KEmulator:
Menu -> Tool
- Zoom in/out, default 200%
- Ticks, design for GD(Game Designer) as a timer.
- Capture/Record, save to "/capture" folder.
- Speed up/Down, speed up the game rate.
- Record keys/Enable Autoplay, refer to the Autoplay.
Menu->View->Options...
Auto-play Records
- Select Tool -> Record Keys.
- Now select View -> Options -> Key Map -> Enable Key Cache. It makes the key play-back accurately.
- Launch a game, and play it. All your key presses are recorded, saved to "/records" folder.
- Then, you can launch the record from Midlet -> Load auto-play record. The emulator will play back all you have done.
Subscribe to:
Posts (Atom)