background preloader

Resources

Facebook Twitter

How To Succeed With Your Mobile App. Fix Android Problems with This Troubleshooting Flowchart. Wow you only have Nexus devices and you haven't rooted any of them? I thought that was the whole point of getting a Nexus was to unlock the bootloader and root the sucker... the most i've ever done is flash one stock android with another stock android, and flashed the radio to a U.S. version instead of an European one.

But considering that you could ALMOST do everything on stock android already without root, is pretty much the reason why I have no need to root. tinkering with phones also causes unforeseen quirks especially if done by people who don't know what they're doing, which then run along to others who are more experienced only to be told to stop tinkering with their phones because they obviously don't know what they're doing.... or follow the chart up above LOL. to in order to keep it simple, i just keep it simple... being able to create a WiFi hotspot tether without root is AWESOME. sure still seems like too much work to me.

Coding Starts Here. Argument Is a value provided to a function when the function is called. This value is assigned to the corresponding parameter in the function. Syntax function_name(argument1, argument2, ...): #Function definition Example def sum(a,b): #a & b are two arguments in sum function s=a+b return s Assignment Assignment operator assigns the value to an object, it assigns from right to left. x = 10 # Integer value. x = "John" # String with double quote. x = 'Jack' # String with single quote.# String can be denoted by either a single quote or double quote.x = 45.50 #Float value. The type of a variable depends upon the value assigned. Bytecode Is an intermediate language for the Python Virtual Machine within the interpreter. Class A class is a construct that is used to create instances of itself – referred to as class instances, class objects, instance objects or simply objects. Class Class_name: "class documents " #class definition includes data variables, methods, and class Output Code Comments Dictionary break.

Coding Starts Here. TechTutorials - Free Computer Tutorials :: About TechTutorials. Manage your Android phone from your browser. May 09, 2012, 5:31 PM — Here's how you can manage your Android phone wirelessly from your browser with a free app called AirDroid. 1. Go to the AirDroid page on the Google Play store. 2. Here's a list of features and a video guide: *Files Transfer files between Android devices and computers. The 50 Best Registry Hacks that Make Windows Better. We’re big fans of hacking the Windows Registry around here, and we’ve got one of the biggest collections of registry hacks you’ll find. Don’t believe us? Here’s a list of the top 50 registry hacks that we’ve covered. It’s important to note that you should never hack the registry if you don’t know what you’re doing, because your computer will light on fire and some squirrels may be injured.

Also, you should create a System Restore point before doing so. Otherwise, keep reading. Prevent Windows Update from Forcibly Rebooting Your Computer We’ve all been at our computer when the Windows Update dialog pops up and tells us to reboot our computer. There’s a couple of ways that we can disable this behavior, however. Prevent Windows Update from Forcibly Rebooting Your Computer How to Clean Up Your Messy Windows Context Menu One of the most irritating things about Windows is the context menu clutter that you have to deal with once you install a bunch of applications. Disable Aero Shake in Windows 7. How to Open God Mode on Windows 8, 7 & Vista. cDc #351: The Tao of Windows Buffer Overflow.

5 Computer Hacks from Movies You Won't Believe Are Possible. As we have mentioned previously, Hollywood just doesn't seem to have a very firm grasp on how technology works. So when it comes to depicting computer hacking onscreen, it's no surprise that the implausible scenarios Hollywood's tech-challenged screenwriters manage to pull out of their asses don't even come close to resembling the real thing. Except it turns out that, every once in a while, they inadvertently get it right on the money. Because real-world hackers have done stuff like ... #5. Jackpot an ATM Photos.com As Seen In: Terminator 2 The Hollywood Hack: Let's look at the classic scene for a moment: Young John Connor -- the kid whose voice sometimes makes you wish they had sent a few extra T-1000s back from the future -- jacks his Atari (yes, Atari) laptop thingy into an ATM.

Photos.com"If you see any cops, I want you to mullet as fast as you can. " The Real-World Hack: #4. The Italian Job "I like two things: action figures and gridlock. What hacking looks like to old people. #3. Getty. Run Chrome OS on Any Windows PC using 4GB USB Stick. Google Chrome OS comes bundled with Chromebooks and Chromebox. Either you will have to purchase these devices from nearest retailers or you may run Linux Distributions of the Chrome OS on any other device including your existing Windows PC or Mac. Linux Distributions of Chrome OS are based on the original Google Chrome OS with limited compatibility. There is an open source installation available on Chromium project site (Google Chrome OS is a modified version of Chromium OS) to install Google Chrome OS on non-chromebook devices but it involves few tech savvy steps.

Don’t worry, if you want to try the Chrome OS ( Always a new computer ) without much effort, checkout a simple way to run Chrome OS on non-chromebook devices (like Windows notebooks, netbooks, laptop, desktop etc.) by just booting the device using 4GB+ USB pen drive. Follow the steps below to get Chrome OS running in less than 5 minutes. Chrome OS will welcome you with Google Chrome help document. Cloud Print. Mozilla Webmaker Aims to Teach You to Code and Change You from Web Consumer to Creator. It is really a lot less about which language to learn as it is about how to think about the act of programming.

Knowing what the statements of some language do means nothing if you do not have any idea about how to string them together in a coherent way to accomplish something meaningful. Learn to think programming (algorithms and data structures). Translate those thoughts into the language of choice. Many years ago I actually wrote FORTRAN for money. Today I am teaching myself how to program Objective-C and do iOS apps. Don't limit your brain to a specific language. Browse like Bond: Use any computer without leaving a trace with Tails. If James Bond logs on to a computer, he doesn't want to leave a bunch of files, cookies, or his IP address out there for someone to find.

It might seem extreme, but sometimes it's a good idea to take the same precautions yourself. In this post, we'll walk through how to use a USB stick or DVD to anonymize, encrypt and hide everything you do on a computer no matter where you are. When we say "browse without leaving a trace", we truly mean it. Using the Linux-based, live-boot operating system Tails (The Amnesiac Incognito Live System), you can use any computer anywhere without anyone knowing you were ever on it. Tails is a portable operating system with all the security bells and whistles you'll ever need already installed on it.

You can install Tails on one of your many dust-gathering USB drives or a DVD. We'll show you how to set up your own portable boot disc in the second section, but let's start by taking a look at what you get with Tails. Step 1: Download the Necessary Files. 15 Killer Windows 7 Keyboard Shortcuts That Might Surprise You. Free Computers Video Lecture courses. Microsoft Can Detect Your Gestures Using Just Your Computer's Audio. Become a Command Line Ninja With These Time-Saving Shortcuts. Turn Off Unnecessary Windows Services - MarkSanborn.net. Downloadable Computer Repair CDs. One of our Technibble forum members, PcTek9, and a handful of other Technibble members have compiled a large list of CDs for various computer repair tasks. In this list, the following types of CD are available for download: Antivirus Boot CDs, Recovery Disks, Hardware Diagnostic Boot CDs, Network Testing/Monitoring, Data Recovery Boot CDs and Special Purpose CDs.

Some of these are free to download, some are not. Be sure to read the EULA for the CD’s you download and the applications you use to make sure you are allowed to use them in the manner you plan to use them in. Many of the CDs contain a variety of different programs and some of the applications are free to use as you please, but some of them disallow commercial use. So be sure to read and abide by the EULA for whatever you use. Also, some of these CD’s may set off an antivirus false positive due to their virus removal, password cracking, system file changing nature.

Creating Multiboot CDs.