27 Nov 2013

                         
marveltechnovations.blogspot.in


Now-a-days , most of the people who surf net have their blogs or websites .
Some people blogs in order to share their views, technical knowledge, provide internet tricks or tips and earn money while some do it just as their hobby or passion.

So, for these hardworking bloggers uniqueness of content is most important to get huge traffic on their site.
But some people just copy & paste content on their blog from other blogs which results in decrease in the number of visitors of your blog

So here I am providing you a trick to check who is stealing content from your blog

Step 1 ) Visit this site (click here)

Step 2) Enter your blog address and hit enter.

Step 3) Now you will get a search result of sites which have similar content

Step 4) Check sites and if you found in Copy & pasted content ,warn the admin to remove the content or to give you the credit

That's It
Hope it helped you !

Posted on Wednesday, November 27, 2013 by Ajay Verma

No comments

13 Nov 2013



First of all lets see the basic difference between the previous version of windows "windows 7" and the latest "windows 8" which will help you to choose a better OS for your computer according to your need.

Main Differences between Win7 and Win8

1)Boot time:
win7 : 48sec
win8 : 10sec

2)Desktop :
 Microsoft has replaced the normal shortcut
 icons with dynamic tiles.

3)Mounting iso images:
 Win7 could only burn an ISO image to a DVD but Win8 actually betters this by offering you the option to mount the image too. In Win7, you didn’t have the option to make virtual drives to use the ISO image’s
 content but Win8 allows to create a virtual drive to mount the ISO image so that you can easily use it
 just like a normal DVD.

4)Built-in Antivirus:
 Win8 has an antivirus present inside the kernel of the operating system. This means that your system won’t boot if a corrupt USB device is plugged in. It sounds impressive though we don’t know whether it would pass the test of time and viruses!

5)Multiple monitors
 support in Windows :
 Microsoft announced that customers can use more than one monitor to connect with Win8 operating system.

Therefore we can conclude that windows 8 is advanced and better than 7 and Microsoft has tweak the operating system..

Download fom below :-

http://goo.gl/jxobl


 ==>Windows 8 PRO Direct Download Link [ISO File] For 64 Bit


http://goo.gl/aFaCl


 ==>Windows 8 PRO Direct Download Link [ISO File] For 86 Bit



Posted on Wednesday, November 13, 2013 by Ajay Verma

No comments


Which search engine you are using currently ?? - google,yahoo or msn. whatever you are using,
ever imagined your own search engine or wanna impress your friends with a search engine of your name

Sounds cool naa !
 So follow these simple steps and make your own search engine within a few seconds with the help of Google logo creator .

Steps :-


Step 1 :- Go to www.goglogo.com

Step 2 :- Enter the desired name in the search field

Step 3 :- Click on "Create your search page now"

Thats It!!
Tip :- You can also set that page as your homepage  :)
Have fun

Posted on Wednesday, November 13, 2013 by Ajay Verma

No comments

10 Nov 2013

In this tutorial I will teach you how to see what is behind aestersik (*)


Whenever someone clicks on remember password in facebook,gmail or any login form, the password automatically filled. But the problem is that we can't see the real characters hidden behind aestersik(*).

This trick can be useful if you somehow by luck get someone's Id and password on login page saved at cyber cafe or in your home..But you can login from that place only cause you don't get password.

To see what's behind aestersik follow the steps :-

Step 1 :- Go to the password field and right click on it
Step 2 :- Choose "Inspect Element"

Now search for - <input type=”password”id=”pass”name=”pass” tabindex=”2? value=”Password” aria-label=”Password”>

Modify <input type=”password”> into <intput type=”text”>
(select edit attribute as or edit html to modify code)

(Click on the image to magnify)


then again click on the password field and you will be able to see the text behind aestersik

That's It!!!

Posted on Sunday, November 10, 2013 by Ajay Verma

No comments

28 Oct 2013



Hello guyz! Wanna play a prank with your facebook friends
Yes, I have a very interesting trick which you can use to freak out your friends with the person of a dead profile


Instructions :

Step 1 :- Send the link below to your friends
http://goo.gl/hc3IQz

Step 2 :- Told them to click on photos after following the link

Step 3 :- and Wait for a few seconds.

Note :- Told them to increase the sound of their lappy or pc whatever they have for better experience.

Must comment below your reaction after performing the trick!!

Enjoy

Posted on Monday, October 28, 2013 by Ajay Verma

No comments

Activate your "windows 8" without paying :-

If you still have trial version of windows,  whatever the version
A single activator can activate all windows

Steps to follow :-

  • first of all download the Activator file (Click here)
  • Unzip It
  • Run the .exe file
       After that your windows will restart and you will receive a message
That's It

Now you can enjoy full version of windows:)

Posted on Monday, October 28, 2013 by Ajay Verma

No comments

26 Oct 2013

Protection from RATs / Keyloggers :

Keyloggers are the commonly used tool for hacking or stealing your personal data like passwords , IDs and even your ATM pin during online transcations...
So I am providing you a tutorial to detect these keyloggers and and how to protect from them..


Step 1 :- Open task manager (Ctrl+shift+esc) -> Processess -> View -> select columns -> Tick PID

Note :- You can click on "processess" tab to arrange the list in ascending or descending order, just for your convenience in searching the items for the next steps.

Step 2 :- Open command prompt and type "netstat -ano"
Now you have to look for only Established PID

Step 3 :- Again go back to processess and match the PID of established connection with the PID in processess

Step 4 :- Look at its image name. If you found name of trusted applications like "explorer.exe" or "firefox.exe" there's nothing to worry..You are safe
But If you found any suspicious name like "svchost.exe" or anyother which you haven't saw earlier you have chances of keyloggers installed in your system.

Step 5 :- Right click the suspicious file -> Open file locations and upload that file to any online scanners
If you have any keylogger installed it will detect it easily, For your satisfaction check that file in atleast 2-3 online scanners

That's all for today
Hope you find it useful :)

Posted on Saturday, October 26, 2013 by Ajay Verma

No comments