Friday, 24 November 2017

Published November 24, 2017 by with 0 comment

HOW TO DETECT FAKE iPHONE EASILY !! SIMPLE STEPS WITH PICTURES

Apple iPhone 6 & 6s


Yes, they make fake iPhones! They are all over the internet and of course, they are far inferior to the real ones. Make sure the one you are buying, or have already purchased, passes the checks below

.

Apple iPhone 6 & 6s - Step 1, picture 1Apple iPhone 6 & 6s - Step 1, picture 2
1
First of all, make sure it has the Apple logo on the back of the phone and the logo is nearly flush. Many of the fake are clearly recessed as shown above.

The logo should also be less reflective and a little darker than a mirror. If it has a mirror finish, it's probably fake.

Apple iPhone 6 & 6s - Step 2, picture 1Apple iPhone 6 & 6s - Step 2, picture 2
2
Next, if you have a box with your phone, look at the top. The authentic iPhones do not have a phone pic on top. If it does, it's fake.

Also notice the raised, embossed phone outline on top of the real box. That line should be distinct and of good quality like the one above.

Apple iPhone 6 & 6s - Step 3, picture 1Apple iPhone 6 & 6s - Step 3, picture 2
3
Another thing to look for, if you have a box is the specs on the bottom of the box. The layout needs to be like the real one above.

Notice the space between the top and the "64GB" on the fake one above.

Apple iPhone 6 & 6s - Step 4, picture 1Apple iPhone 6 & 6s - Step 4, picture 2
4
Next, look at the back of the phone. Many of the fakes display their lettering much higher than the authentics.

Apple iPhone 6 & 6s - Step 5, picture 1Apple iPhone 6 & 6s - Step 5, picture 2
5
Next, look at the height of the camera on the back of the phone. Most of the fakes have a much smaller profile than the authentic iPhones.

Apple iPhone 6 & 6s - Step 6, picture 1
6
Next, press on the the power button. You should hear and feel a distinct click. Most of the fakes do not click at all or have a faint click.

Apple iPhone 6 & 6s - Step 7, picture 1Apple iPhone 6 & 6s - Step 7, picture 2
7
Next, look at the lock screen. The authentic iPhones have an animated "slide to unlock" feature. It constantly highlights from left to right. Many of the fakes are just solid white, like the one above.

Apple iPhone 6 & 6s - Step 8, picture 1Apple iPhone 6 & 6s - Step 8, picture 2
8
Next, look at the charge percentage display. It should be white as shown on the real one above. Many of the fakes use blue. If it is any other color than white, it's fake.

Apple iPhone 6 & 6s - Step 9, picture 1Apple iPhone 6 & 6s - Step 9, picture 2
9
Next, look at the keyboard. The space bar button should have "Space" written in it like the real one above.

It also should not have a comma button like the fake above.

Apple iPhone 6 & 6s - Step 10, picture 1
10
Next, look at the charge port. Many of the fakes have, what looks like, a plastic border around it. Make sure it looks like the real one above.

Apple iPhone 6 & 6s - Step 11, picture 1
11
Next, Connect to iTunes. If you connect it to iTunes and it doesn't show anything or you're receiving an error, it means iTunes does not recognize your phone. It's a fake.

Apple iPhone 6 & 6s - Step 12, picture 1
12
And last, check your serial number with Apple.

On the phone, go to "Settings," then choose "General," and then click on "About." This will give you the serial number. You can then access the Apple website, where you can enter your iPhone serial number to see if it is a real iPhone.
Read More
    email this       edit
Published November 24, 2017 by with 0 comment

OnePlus 5T Full Phone Specification, Falgship Smartphone?

Also available with 8GB RAM and 128GB storage for Rs. 37,999.
OnePlus 5TOnePlusAvailableYesAvg Current Market Price:Rs. 32999 
Last Updated On: 
Place : Chennai Delhi Kolkata Mumbai
$733.31OnePlus 5T is a Smartphone powered by Oxygen OS based on Android 7.1 Nougat, Fingerprint Sensor and Dual rear camera with 16MP primary + 20MP secondary camera with PDAF and dual LED flash.























OnePlus 5T Specifications

Network

Technology / Frequency BandsGSM : 850/900/1800/1900 MHz HSPA+ : 850/900/1900/2100 MHz

Battery

TypeLi - Po
Capacity3300 mAh
Standby-
Talktime-

Built

Dimensions156.1x75x7.3 mm
Weight162 g
Form Factorbar
ColorsMidnight Black

Display

Size2160 x 1080 pixels
Typecolor : AMOLED
Colors16000000 colors
Secondary Displayno

Camera / Imaging / Video

CameraYes 16MP
Resolution4640x3480 pixels
Zoomyes
Flashyes
Secondary Camerayes

Secondary Camera

Resolution4640x3480 pixels
Flashno

Connectivity

BluetoothYes
IrdaNo
Wlan/Wi-fiYes
USByes
GPSyes

Data

GPRSYes
EDGEYes
3GYes
Internet BrowsingYes , Android Webkit

Media

Audio PlaybackYes
Video PlaybackYes
RingtonesMP3 and Polyphonic
FM RadioNo
3.5mm Headphone Jackyes

Memory

Inbuilt64 GB
Memory SlotNo

Messaging

SMSYes
MMSYes
EmailYes

Software

Operating SystemAndroid 7.1

Highlights

- 2.45GHz Snapdragon 835 64-Bit Quad-Core Processor
  • - 6/8GB RAM With 64/128GB ROM
  • - 6.01 Inch FHD+ OPTIC AMOLED Display With 401 PPI
  • - Dual Nano SIM
  • - 16 + 20MP Rear Camera With PDAF & Dual LED Flash
  • - 16MP Front Camera
  • - 4G VoLTE/Bluetooth 5.0/Wi-Fi
  • - 3300 MAh Battery

Features

SMS yes Yes
MMS yes Yes
Email yes Yes
Bluetooth yes Yes
Infrared no No
Wi-fi yes Yes
3G yes Yes
Camera yes Yes
Video Capture yes Yes
FM Radio no No
Audio Player yes Yes
Video Player yes Yes
Memory Slot no No
Java no No
SmartPhone yes Yes
Touchscreen yes Yes
Read More
    email this       edit
Published November 24, 2017 by with 0 comment

10 Ways To Avoid Phishing Scams

1. Keep Informed About Phishing Techniques – New phishing scams are being developed all the time. Without staying on top of these new phishing techniques, you could inadvertently fall prey to one. Keep your eyes peeled for news about new phishing scams. By finding out about them as early as possible, you will be at much lower risk of getting snared by one. For IT administrators, ongoing security awareness training and simulated phishing for all users is highly recommended in keeping security top of mind throughout the organization. 

2. Think Before You Click! – It’s fine to click on links when you’re on trusted sites. Clicking on links that appear in random emails and instant messages, however, isn’t such a smart move. Hover over links that you are unsure of before clicking on them. Do they lead where they are supposed to lead? A phishing email may claim to be from a legitimate company and when you click the link to the website, it may look exactly like the real website. The email may ask you to fill in the information but the email may not contain your name. Most phishing emails will start with “Dear Customer” so you should be alert when you come across these emails. When in doubt, go directly to the source rather than clicking a potentially dangerous link. 

3. Install an Anti-Phishing Toolbar – Most popular Internet browsers can be customized with anti-phishing toolbars. Such toolbars run quick checks on the sites that you are visiting and compare them to lists of known phishing sites. If you stumble upon a malicious site, the toolbar will alert you about it. This is just one more layer of protection against phishing scams, and it is completely free. 

4. Verify a Site’s Security – It’s natural to be a little wary about supplying sensitive financial information online. As long as you are on a secure website, however, you shouldn’t run into any trouble. Before submitting any information, make sure the site’s URL begins with “https” and there should be a closed lock icon near the address bar. Check for the site’s security certificate as well. If you get a message stating a certain website may contain malicious files, do not open the website. Never download files from suspicious emails or websites. Even search engines may show certain links which may lead users to a phishing webpage which offers low cost products. If the user makes purchases at such a website, the credit card details will be accessed by cybercriminals. 

5. Check Your Online Accounts Regularly – If you don’t visit an online account for a while, someone could be having a field day with it. Even if you don’t technically need to, check in with each of your online accounts on a regular basis. Get into the habit of changing your passwords regularly too. To prevent bank phishing and credit card phishing scams, you should personally check your statements regularly. Get monthly statements for your financial accounts and check each and every entry carefully to ensure no fraudulent transactions have been made without your knowledge. 

6. Keep Your Browser Up to Date – Security patches are released for popular browsers all the time. They are released in response to the security loopholes that phishers and other hackers inevitably discover and exploit. If you typically ignore messages about updating your browsers, stop. The minute an update is available, download and install it. 

7. Use Firewalls – High-quality firewalls act as buffers between you, your computer and outside intruders. You should use two different kinds: a desktop firewall and a network firewall. The first option is a type of software, and the second option is a type of hardware. When used together, they drastically reduce the odds of hackers and phishers infiltrating your computer or your network. 

8. Be Wary of Pop-Ups – Pop-up windows often masquerade as legitimate components of a website. All too often, though, they are phishing attempts. Many popular browsers allow you to block pop-ups; you can allow them on a case-by-case basis. If one manages to slip through the cracks, don’t click on the “cancel” button; such buttons often lead to phishing sites. Instead, click the small “x” in the upper corner of the window. 

9. Never Give Out Personal Information – As a general rule, you should never share personal or financially sensitive information over the Internet. This rule spans all the way back to the days of America Online, when users had to be warned constantly due to the success of early phishing scams. When in doubt, go visit the main website of the company in question, get their number and give them a call. Most of the phishing emails will direct you to pages where entries for financial or personal information are required. An Internet user should never make confidential entries through the links provided in the emails. Never send an email with sensitive information to anyone. Make it a habit to check the address of the website. A secure website always starts with “https”. 

10. Use Antivirus Software – There are plenty of reasons to use antivirus software. Special signatures that are included with antivirus software guard against known technology workarounds and loopholes. Just be sure to keep your software up to date. New definitions are added all the time because new scams are also being dreamed up all the time. Anti-spyware and firewall settings should be used to prevent phishing attacks and users should update the programs regularly. Firewall protection prevents access to malicious files by blocking the attacks. Antivirus software scans every file which comes through the Internet to your computer. It helps to prevent damage to your system.
You don’t have to live in fear of phishing scams. By keeping the preceding tips in mind, you should be able to enjoy a worry-free online experience.
Remember there is no single fool-proof way to avoid phishing attacks,  
Read More
    email this       edit