Join Us

Join 2000+ Readers

Popular Posts

How to Earn From Bitcoins

Search the Blog

Delete Foursquare check-ins using the Android, iOS app

Delete Foursquare check-ins using the Android, iOS app

Delete Foursquare check-ins using the Android, iOS app

After a rough night out on the town, looking at your Foursquare history is a good way to figure out where you were (assuming you were coherent enough to use your phone). Sometimes you may not like what you see and want to delete any trace of where you were as fast as possible.
Or you could have innocently checked into the wrong venue and need to delete the error from your history.
Well, you can delete any check-ins directly from your Android or iOS device. I'm not sure when the feature was added to either app, but previously deleting a check-in was only possible via the Web site.


Deleting a check-in in the Android app is very simple and the option is in plain sight. Launch the Foursquare app, visit your last check-in or your check-in history (under the Profile & History section) and view the details page. In the bottom-right corner you'll see the Delete button. Confirm your intention and the check-in will vanish.


Using the iPhone, you'll need to view your check-in from the home screen or check-in history (under the Profile & History section). When viewing the detail screen for a particular check-in, tap on the share button at the bottom next to the text field. You'll be presented with the various options to share through, but you'll also find a red button to delete the check-in at the bottom of the list.
This isn't the most amazing feature in the world, but one that's sure to come in handy from time to time. I know I have had to navigate the Web site using mobile Safari more than once to delete an accidental 
How to troubleshoot software-update problems

How to troubleshoot software-update problems

How to troubleshoot software-update problems

Computer malware authors exploit weaknesses in software. Developers combat computer crooks by patching their programs to block malware attacks. That's why we're encouraged to keep our software up-to-date. Every now and then, a software update fails, leaving our systems a little less secure.
I got a first-hand look at the problem the other day when the Apple Software Update program balked at installing iTunes version 11.0.3 on my Windows 7 PC. The installer reported "insufficient privileges" and suggested I log on as an administrator or contact my system administrator. Of course, I was logged on as an administrator, and like most Windows users, I have no system administrator to contact.
Fortunately, the solution to this update glitch was relatively easy to find: I repaired the Apple Software Update program in Win7's Programs and Features app, restarted my PC, and tried the update again, this time successfully.other software-update failures aren't as simple to diagnose and cure.

An easy solution to an iTunes update failure

It took only a few minutes of searching on the iTunes "insufficient privilege" error message to find a forum post recommending a repair of the Apple Software Update applet to allow the installation of iTunes 11.0.3 to proceed. To do so, press the Windows key, type Programs and Features, and press Enter. Select Apple Software Update and click the Repair button.

Note that in a post on the Apple Support Communities in March 2012, K Gazow described a fix for a failed iTunes update that involves changing Windows User Account Control settings.
It turns out "insufficient privilege" and other access-denied errors are associated with just about every piece of software ever distributed, including Office, Firefox, and Windows 8.

Change the folder's properties to accept the update

A common suggestion when an insufficient-privilege problem is reported in a forum is to make sure you're running as an administrator. The most common response to this suggestion is a form of "Duh!"
Several people recommend changing the attributes of the folder the update is being saved to so that "everyone" has access to the folder. For example, on the Skype Community site, a contributor named Tamim explains how to change the properties of the Skype folder in C:Program Files to enable the program to be reinstalled (the precise location of a program's folder depends on your version of Windows).
Tamim provides a link to a Fix-it wizard on the Microsoft Support site that offers to repair the problem associated with the "Error 1606" message. Two other Microsoft error numbers that involve insufficient privileges are 1303 and 1321.
Rex Zhang, a moderator on the Microsoft TechNet Office Forum, suggests that if Error 1303 occurs when installing Office Professional Plus 2010, ensure the SYSTEM group and the Everyone group of the destination folder have Full Control privileges.
Similarly, Raju S. Das, who moderates Microsoft's Office 2010 Forum, replied to a person who encountered an Error 1321 when attempting to install Office 2010 by recommending they change the permissions of a specific file in the installer's destination folder.
The Microsoft Support site provides tips for troubleshooting installation glitches when using Windows Update, Microsoft Update, or Windows Server Update. Windows Phone 7 users experiencing update woes may find a solution on the Microsoft Support page with article ID 2484484.
The Xbox support site offers troubleshooting tips for various Xbox 360 system update error codes.

Other resources for software update/installation solutions

On several occasions I have had to uninstall the Firefox browser to update the program to its most-recent version. It hasn't happened recently, but if the problem recurs I'll go to the Mozilla Support page that explains how to fix the Update Failed error message when updating Firefox.

Should you encounter difficulties when attempting to update the Thunderbird e-mail program, visit the Mozilla Thunderbird Support page that describes five different potential solutions. The site also explains how Thunderbird's automatic updates work and how to manually update the program.
When a Mac OS X software update fails, check the X Lab's Installing Software Updates FAQ for a possible remedy. The Google Chrome support site provides advice for people unable to update the Chrome browser on a Mac.
The solution to my system's inability to install the new version of iTunes may not cure your iTunes-update hiccup. Apple's support site explains iTunes update and restore error messages and advanced troubleshooting, as well as how to resolve iOS update and restore alert messages.

How to send money via Gmail

How to send money via Gmail

How to send money via Gmail

For years PayPal has cornered the market on sending money to friends, family members, and businesses. Last week during the chaos of Google I/O announcements, Google took a first step toward giving PayPal a run for its money by making it possible to send money via Gmail. The feature is set to roll out to all users over the coming weeks, but if you know someone who currently has it, that person can send you money and after you've claimed the funds the new feature will be enabled on your account as well.The service, which makes use of your Google Wallet account, lets you quickly send money to anyone with a U.S.-based e-mail address.

Secure your account

Since Google Wallet requires you to attach a bank account and other payment methods to your Google account, you're going to want to take the appropriate steps to keep your information secure. The last thing you want is someone accessing your e-mail account, but when that same account also holds your bank account information, you want to be doubly sure it's protected.
In order to protect your account, be sure to enable two-step authentication. After enabling this extra layer of security, you'll be required to enter your password as well as a six-digit code before you can access your account. The code can be sent to your smartphone via a text message, or you can view it using the Google Authenticator app. For complete instructions on setting up Google's two-step authentication, be sure to read CNET contributor Matt Elliot's tutorial.

Set up your Google Wallet

Once you've secured your account, you'll need to add payment information to your Google Wallet account. If you add a credit or debit card you'll be able to send money, and if you add a bank account you'll be able to transfer any received money from your Google Wallet account into your bank account. To add a form of payment visit and log in to your Google account.
The first thing you'll see is the transaction history for your Wallet account. If you've purchased anything with Google Wallet, be it Android apps (both free and paid are listed) or devices from the Play Store or items from a third-party vendor that uses Wallet, you'll see it listed here. Add a bank account or credit card by clicking on the Payment Methods option on the right-hand side, and then click on "Add Credit or Debit Card" at the top of the page. Follow the prompts to verify your account and have the card added to your account.

Send and receive money

Now that you have a payment method added, you're ready to send and receive money, assuming your account has access.To claim funds, you'll need to verify that you are you. You'll be asked a few questions such as your current address and the last four digits of your Social Security number.
Once you've claimed the funds, the money can take 24 hours to be made available in your Wallet account. From there you can either spend it through Wallet, or have it deposited in your connected bank account.

To send money once you have access to the feature, log in to your Gmail account and compose a new e-mail. Along the bottom you'll see a plus symbol that reveals various services one of which is the option to send money, indicated by a dollar sign. Clicking on the symbol will start the process of attaching money to your e-mail. Enter the amount of money you'd like to send, and which account you'd like to fund the transaction from. Enter the recipient's e-mail address, and a subject and body as you see fit, and hit send. The e-mail will then be sent to the recipient, with money attached, and they'll have to go through the same claim process outlined above.

This is a convenient way of sending money, and with no fees for using your Google Wallet balance or when transferring from a linked bank account. Also, right now there's no fee for using a debit or credit card while the service is initially rolled out, though after the introductory period, the fee will go up to 30 cents per transaction.

How to enable Twitter's two-factor authentication

How to enable Twitter's two-factor authentication

How to enable Twitter's two-factor authentication

Going a week without a major brand having its Twitter account compromised was starting to become a rare occurrence. Critics and users alike repeatedly called upon Twitter to release two-factor (or step) authentication. The added layer of security requires you to enter your password, and then a subsequent six-digit access anytime you try to log into Twitter. The short code is sent via text message to your cell phone, which means that any would-be hackers would need to not only crack your password, but to also have physical possession of your cell phone.
Twitter, on Wednesday, finally rolled out its first iteration of two-factor authentication.

Enabling the extra security on your account takes just a few seconds and is something every Twitter user should activate. It may require you to take a few extra seconds to log into the service, but having a secure account is worth it.

Setting up Twitter's two-factor authentication requires you to use a computer and visit your account settings page. Once logged into your account and viewing the settings page, scroll down until you find the "Access Security" option. It should be listed right above your country selection. Check the box next to "Require a verification code when I sign in." Once the box is checked, you'll be given a couple of prompts letting you know that the service is about to be enabled, and that it requires you to connect your mobile phone number to your Twitter account.

You'll receive a test text message, verifying that you have the right number added to your account. After indicating that you received the message, you're done setting up two-factor authentication.

The next time you try to log into the Web site, you'll use the same password you have now, but after entering it you'll be prompted to enter the code sent to your phone.

Now there are going to be times when apps and services aren't set up to deal with the added verification step properly, and when that does happen you'll need to have a random password generated to log in with. To get the temporary password, you'll need to visit your account's application settings page and click on the "Generate" button at the top of the page. Use this temporary password in place of your standard password when logging into the app or service.
I tested out how this would work by deleting and re-adding my Twitter account to my iOS device; I was forced to use a temporary password, and was able to log in without issue. But while using the Carbon app on Android, I wasn't able to use a generated password or the short code. Clearly there's some work yet to be done here, but it's a step in the right direction for both Twitter and its users.
An article published by Forbes brings up a good point about being forced to tie a phone number to your account. What happens should you lose your phone, or be in an area where cell signal is mediocre at best? By using a Google Voice number as your phone number with Twitter, you're able to view text messages through the Voice Web site, or any compatible Google Voice app. Due to limitations with Google Voice, it cannot forward any messages from Facebook, Skype or Twitter as SMS to a phone number, so if you need to receive it on a mobile device make sure you enable forwarding to e-mail. Doing so will ensure you'll always have access to your six-digit code, and in turn have access to your Twitter account. As the article mentioned above points out, this is also an ideal situation for brands and corporations who have more than one person accessing the Twitter account at any given time.

Play Google's Chrome Racer game across multiple screens

Play Google's Chrome Racer game across multiple screens

The multidevice game demo during the Google I/O keynote? If you missed it, running Chrome on several devices, Google was able to show a game taking advantage of every screen on the desk. By drawing a race track across all of the devices, various colored cars were able to race around the track, from screen to screen, device to device.
Thankfully, Google isn't keeping the game, called Racer, to itself. You can use Chrome on your Android or iOS device to play the game with friends and family members right now.
Before you begin playing the game, make sure everyone who's going to be playing has Chrome installed on his iOS or Android devices. Then everyone will need to visit or

Once there, you'll need one user to start a race and the other users to join a race. The user who started the race will have a short code for everyone else to enter and connect to the same race. The best part is, you don't even have to be connected to the same Wi-Fi network or a Wi-Fi network at all; Racer works across multiple devices over a cellular connection.

Once everyone is connected and has picked a color, the race creator can select a difficulty level, and then you'll need to line up the devices using the onscreen instructions. After that, the race is on. Touch the screen to go, release to slow down or stop.

Put Twitter in your Mac's menu bar with BirdDrop

Put Twitter in your Mac's menu bar with BirdDrop

 The little birdie by accessing only the mobile version of Twitter on your Mac with BirdDrop. Then again, perhaps having one-click access to any form of Twitter from your Mac's menu bar will only increase the time you spend on Twitter. How you use it is up to you. I'm here only to inform you of the app's existence and how it works.
BirdDrop is a free app that installs a Twitter button in your Mac's menu bar. After logging into Twitter through the app, you'll have quick access to Twitter's mobile client. With the app, you are able to view your Twitter timeline, compose tweets, retweet, respond to tweets, search, and more.

Clicking on a link in a BirdDrop opens the link in the app itself. Most of the time the page formatted correctly in the app, but not all the time. For example, reading a Bon Appetit article required some sideways scrolling.

If you like the idea of accessing social networks from your Mac's menu bar, MenuTab for Facebook may be of interest.

Adobe Acrobat XI v11.0.3 Professional NoGRP

Adobe Acrobat XI v11.0.3 Professional NoGRP


Adobe® Acrobat® X Pro software lets you deliver professional PDF communications. Create and edit PDF files with rich media included, share information more securely, and gather feedback more efficiently.

1) Disconnect from Internet. Install Acrobat in a trial mode.
2) Start the program. Accept persons. agreement. In the following window press
to license it ON. Start keygen and generate a serial for Adobe Acrobat X v10x
(don’t close it) enter it in the following window. Press to be connected later.
3) Go Help – product registration – isn’t possible to be connected to the Internet – offline >>
activation -create an inquiry code.
Run keygen X-FORCE (xf-mccs6.exe) in the field of serial enter a serial from first keygen, in the field >>
of request enter an inquiry code, press generate received code of activation (field “Activation”), copy >>
and we insert into a field a response code.

The program is activated.

Now close Acrobat and open the C:\Program Files\Common Files\Adobe\ARM\1.0 folder

Find files
– AdobeARM
– Armsvc
– AcrobatUpdater

Also rename them, for example so AdobeARMold, armsvcold, AcrobatUpdateold
If there is a message that the file can’t be renamed, find in the processes, close them, repeat procedure.

Block any attempts of the program to contact the Internet a firewall.

(Must Comment Before Download)

Link 1 Click Here

Link 2 Click Here

Avast Internet Security 8.0.1488.286-P2P

Avast Internet Security 8.0.1488.286-P2P

Avast! Antivirus software provides complete virus protection for your computer. Antivirus engine is complemented by anti-spyware, firewall and antispam modules to protect you against phishing schemes, identity theft and internet-distributed web viruses. Automatic updates for greater user convenience and safety. Top user ratings among free antivirus software. The new avast! Free Antivirus includes a spyware detection engine. To protect you from identity theft as well as viruses. avast! Pro Antivirus – better protection during web surfing. Full-featured antivirus software. Better than our free antivirus, especially for web surfing, but without the firewall and antispam included in avast! Internet Security. Also if you wish to customize your security, this is the recommended software.

 Install the program using the patch or the keys to your liking

- Install
- Restart the computer
- Open the Control Panel
- Select Settings in the top right
- Select Troubleshooting, last entry at the bottom left
- Remove the check mark: Enable the form of self-defense Avast and click OK
- Click Yes on the next screen
- At this point, ONLY for XP users use Patch XP, open the file and double-click AVAST XP ZeNiX.reg OK
- Open the Patch2050, select ENGLISH from the menu and click the left mouse button
- Advance and during installation write as password: ZeNiX
- Reboot, renable self-defense module and have the license until 2050.


(Must Comment Before Download and Like our page)

Link 1 Click Here

Link 2 Click Here

Easily import Astrid tasks to Any ,Do on Android, iOS

Easily import Astrid tasks to Any on Android, iOS

The most important feature your to-do list needs is accessibility. A written grocery list you forgot on your kitchen counter doesn't help you much at the store. For this reason, among others, many people use a to-do list manager on their mobile device. But what happens when the app you're using shuts down their service? That's the thought on many users' minds following Yahoo's recent acquisition of Astrid
Fortunately, some of the other to-do list apps are stepping up to help you migrate your data. Such is the case with Any.Do, which released an update today that makes switching to their app supereasy. This feature is available to new and current users.

To get started, you will need to be using the mobile version of Astrid. Then, install a copy of Any.Do on your mobile device. There are both Android and iOS versions.
Once you open the app, you'll be prompted to create an account or log-in with an existing one. Any.Do also offers the option to log in with Facebook if you want to skip past most of the account creation process.

A pop-up will appear that asks if you'd like to import your tasks from Astrid. After clicking Import, the amount of time needed will depend on the amount of tasks that need to be migrated.

Important note: According to Omer Perchik, Any.Do founder and CEO, Astrid and Any.Do implement their task descriptions and subtasks in different manners. For this reason, descriptions of tasks will not migrate from Astrid to Any.Do, and any subtasks in Astrid will appear as new tasks in Any.Do.
If you decided to skip on importing so you could use Any.Do and see if the app fits your needs, the import feature can be found in the Settings menu.

Delete unwanted Facebook comments using the Android app

Delete unwanted Facebook comments using the Android app

You can now moderate the comments on your own Facebook posts from your Android device. With an update to the Android app last week, Facebook enabled the ability for Android users to delete comments in just a few short steps.

Related stories
Easily import Astrid tasks to Any.Do on Android, iOS
Share files between Android and Windows with ES File Explorer
Use Mokriya Craigslist app on Android for Craigslist alerts
The next time someone leaves an inappropriate comment, or an old flame starts proclaiming his undying love for you, you'll be able to delete the comment without having to rush to a computer.
The first thing you'll need to do is update to the latest version of Facebook for Android. After you've updated, you'll need to wait for an inappropriate comment. Or you could test the process of deleting a comment on any of your posts; ensuring you're ready to spring into action.

Tap on the comment you'd like to banish from Facebook and you'll see a pop-up asking if you want to delete the comment, or cancel. Tap on delete and the comment will disappear, never to be seen again.

Prepare for and respond to a lost or stolen smartphone

Prepare for and respond to a lost or stolen smartphone

San Francisco District Attorney George Gascon accuses phone companies of profiting from stolen phones, as Michael Scherer reported last month on Time's Swampland site. Gascon is one of several leading law-enforcement officials calling for carriers to be required to implement technology that permanently deactivates stolen phones. It is simply too easy for thieves to resell smartphones.
One year ago, the major cellphone services announced via the CTIA Wireless Association plans to create a database "designed to prevent GSM smartphones reported as stolen from being activated or provided service." The database was pledged to be operating by October 31, 2012.
The U.S. carriers also promised to "create a common database for LTE smartphones designed to prevent smartphones that are reported stolen by consumers from being activated or provided service on any LTE network in the U.S. and on appropriate international LTE stolen mobile smartphone databases. This database will be completed by November 30, 2013," according to the CTIA.

By the end of this month the companies promised to instruct their customers when they buy a phone or soon thereafter on how to apply a password to the phones to prevent unauthorized access. The cell providers also pledged to "[e]ducate consumers about applications to remotely lock/locate/erase data from smartphones" by the same date.
All four of the programs are "voluntary commitments." All but the creation of the stolen-phone database rely on phone users to activate screen locks, install remote lock/locate/erase apps, and report lost and stolen phones. On December 28, 2012, the CTIA released its most-recent progress report for each of its members (PDF).
The carriers now share their stolen-phone databases, but the companies' approach to theft prevention still relies on their customers. Until that changes, the only way to stem the tsunami of smartphone thefts is for users to change their behavior, before and after the phone goes AWOL.
Step one-and-a-half: Set a passcode for your phone
If you think some benevolent person who finds your lost phone will access its information only to determine the rightful owner so it can be returned, think again. In March 2012, security firm Symantec joined with Security Perspectives Inc. to purposely lose 50 smartphones and then tracked what happened next. As Kevin Haley reports on the Symantec blog, 96 percent of the time the person who found the phone viewed its data.

The Symantec Smartphone Honey Stick Project (PDF) reports that 60 percent of the finders attempted to access social media information and e-mail on the phones, which had been set up with simulated personal and corporate data. Eighty percent of the finders tried to open the corporate files stored on the phones, which had labels such as "HR Salaries" and "HR Cases."
In a post from last September, I explained how to prevent phone and tablet theft. That tip focused on iPhones and iPads; a follow-up post explained how to lock down and find Android and Windows phones. Both posts include the steps for enabling your phone's passcode feature.
But the single most important preventive measure -- even more important than using a passcode -- is to be aware of your surroundings. People become so wrapped up in whatever is on their phone's screen that they tend not to notice trouble approaching. Since thieves consider your smartphone their personal ATM, maybe you should treat the device like cash. That means keep it out of sight, don't leave it unattended, and don't lend it to strangers who just need to make a quick call to make sure their grandmother is OK.

Are automated cellphone-purchasing kiosks making things worse?
Cellphone theft is an international problem. Washington, D.C., Police Chief Cathy Lanier recently accused businesses of facilitating the sale of stolen phones overseas, as reported by the Washington Post in February.
According to the Washington Post's Cecilia Kang, the Washington, D.C., police recently found six phones stolen from residents of the District in an ecoATM automated cellphone-purchasing kiosk located in the suburbs.
Debbi Baker reported last week on the U-T San Diego site that a woman whose iPhone was stolen while she was shopping used the free Find My iPhone app to locate the device in an ecoATM at a nearby mall.

Baker quotes El Cajon, Calif., police Lt. Jeff Arvan as applauding ecoATM's willingness to work with law-enforcement agencies to deter the resale of stolen phones, but Arvan points out that criminals don't worry much about anticrime procedures.

Let Firefox understand your mistyped URLs

Let Firefox understand your mistyped URLs with Nbar extension

Are typos slowing down you and your Web-surfing ways? If you are typo king or queen, give Nbar a whirl. It uses fuzzy string matching to guess the meaning behind incorrectly entered URLs in Firefox. For example, if you enter "hugg" in Firefox's URL bar, the extension will suggest The Huffington Post, should that be a site in your history.

The extension does not require a restart and provides two settings. The first, Search threshold, controls how many suggestions will appear in the drop-down menu as you type. The second, Word distance, adjusts the sensitivity of the extension to your typos. The higher the number you enter, the more forgiving the extension is to your typos.

Get Automatic Lifelogging with Saga for Android

Get Automatic Lifelogging with Saga for Android

Meet Saga, the "Automatic Lifelogging" app. This is the app you've never known you needed. Remember what you were doing last Thursday? Saga remembers. OK, I guess that sounds a bit creepy. But really, here's what the app does...
Instead of forcing you to write a journal each day to talk about everything you did, in perhaps an overlong narrative, Saga keeps everything in a neat list for you. Checked in at the grocery store on Foursquare last Monday? Saga recorded it. Tweeted about an upcoming movie you want to see? Yep, Saga got that, too. What's great about this app is that it requires little to no action from you once you link some of your social media accounts to it -- yet the details of the app are only visible to you. Here's how to start your automatic lifelog:

Get a copy of Saga  Automatic Lifelogging for your Android device. This app only supports Android 4.0 and up at the present time.

Open the app, and tap the New User button to set up an account. After that, you'll need to start teaching Saga about yourself. Press on the Me tab along the top of the app, and then tap on the pencil icons next to Home and Work to let the app know their locations.

Now you'll want to press the Settings icon that appears in the upper right-hand corner. Link as many of the social media/sharing apps as you can for Saga to keep thorough records of what you're doing.

Press on the Now tab and help Saga locate you. You can also search for another location by tapping the Somewhere Else choice in the menu.
As Saga learns the places you go, it will ask you to verify the locations by filling the check box next to Confirm. You can also add some quick snapshots and notes to locations, if you want to little extra detail on your lifelog.
Here's an example of what Saga recorded about me from Thursday, May 10:

I did notice a couple of bugs in relation to tweets displaying on the wrong day. However, since this app is new to Android, I'm sure there are other bugs to be found.

Get custom-tailored audio with Adapt Sound on the Galaxy S4

Get custom-tailored audio with Adapt Sound on the Galaxy S4

If glasses are adjusted for varying eyesights, why isn't the same logic applied to our ears? Today, most music players (that's probably your phone) are designed with a one-size-fits-all standard -- the manufacturer adjusts the audio tone and left/right balance to what might suit most people.
It turns out, however, there are differences in our hearing, including unique nuances in balance and processing.
Some phones do let you dig into accessibility settings to adjust left/right balance, but the Galaxy S4 might be the first phone that actually adjusts the audio output to your needs automatically.
Buried in the S4's Sound settings is a feature called Adapt Sound, and it's Samsung's prescription antidote to the one-size-fits-all model that robs music lovers of a complete listening experience. With Adapt Sound in play, the output audio will be customized for your ears.

To access the feature, head to Settings > My Device > Sound > Adapt Sound. You'll be introduced to the feature and you'll be asked to settle into a quiet spot. Plug in your headphones and hit Start.

Immediately, you'll be taken through what's basically a hearing test. High- and low-pitched beeps will play, and you'll confirm whether or not you hear them. It's a judgment of your hearing, but also of your headphones.

When you're finished, two graphs will appear, one for your left ear, and one for your right. Take a look at them to get a visual sense of what your hearing capabilities are like with and without Adapt Sound. The x-axis shows pitch (frequency), and the y-axis displays hearing ability.

If you're skeptical, you can preview what the sound output is like with and without the Adapt Sound adjustments. Below the graph, hit "Preview Adapt Sound" and toggle between Original and Personalized to hear the difference.

Back in the settings window, you can tell Adapt Sound when to personalize the sound output. Below that, don't forget to indicate your "frequently used side so that it can "adapt" when you've got your phone to your ear.

Revisiting the setup
As Samsung explains, the results produced from setting up Adapt Sound in a very quiet environment should let you get away with never touching the feature again. But if you want to get the most out of the feature, take the short hearing test again when you get new headphones or settle into an entirely new environment.

How to edit application permissions on BlackBerry 10

How to edit application permissions on BlackBerry 10

The first time you install a BlackBerry 10 app you're required to approve or deny the app access to various types of information on your device. For example, the Foursquare app requires permission to access your location (among other things) in order to find nearby venues. While other apps may request permission to access your photos, music or connect to BBM.

Denying an app permission to one of the requested categories is a good way to protect your personal data, but should you mistakenly deny an app permission, you'll need to know where to go to edit these settings.
On your BlackBerry 10 device, launch the Settings app and then select the "Security and Privacy" option located in the middle of the list.

Next, select the first option, "Application Permissions."

Here you can view permissions for a particular app by tapping on it, or you can filter the list of apps by selecting a permission using the drop-down at the top.

Once you select an app from the list, you can enable or disable any of the requested permissions for the respective app. Simply move the switch to the On or Off position to make any necessary changes.

It's nice to see this level of control given to people by BlackBerry over what an app can or can't do with information and the device.

How to set up your Fitbit Flex

How to set up your Fitbit Flex

Fitbit recently launched the Flex, the company's first wrist-worn activity monitor that syncs with your smartphone. The Flex uses Bluetooth 4.0 to sync with compatible smartphones , keeping your current activity stats updated.When you first get the Flex, you'll need to do some work to get it set up, but don't worry it won't take you any longer than it does to wait in line at Starbucks.

Using your smartphone

As of right now, the Flex only syncs with a few devices. They are:

  1. iPhone 4S
  2. iPhone 5
  3. iPad 3 (Retina Display)
  4. iPad Mini
  5. iPod Touch (fifth generation)
  6. Samsung Galaxy S3
  7. Samsung Galaxy Note 2

According to Fitbit, support for more Android devices is coming soon, but no word on which devices will be added and when.
If you're using one of the devices listed above, you can do the entire setup process using nothing but the Fitbit app. Download the iOS version here and the Android version here. You'll need to create a Fitbit account if you don't already have one. If you're already using one of Fitbit's other trackers, you should already have the app installed; just make sure you've updated to the latest version.
Once you've downloaded the app and have set up an account, you can connect the Flex to your account. By now there should be at least three lights lit up on your Flex, indicating the battery is at 60 percent or above, which means you can then insert it back into the wristband and put it on.

When setting up a new account, you should be prompted to begin the setup process for a tracker; if you're not prompted, tap on the "More" tab at the bottom of the screen and then "Devices." From there, tap on the "Set up a tracker" button and select the Flex from the list. You'll then be given a brief tutorial covering what the different parts of the tracker are and asked to ensure it's charged to at least 60 percent.

After confirming it has a charge, look for the lights on the tracker to blink a few times, and when they do you simply tap on it twice to confirm that the app is adding the right Flex to your account.
Using your computer
Should you not have one of the compatible devices listed above you'll still be able to use the Flex, but you will only be able to sync when you're near a Mac or Windows machine. Inside the box you'll find a small USB dongle. This small piece is your key to syncing your Flex with the Fitbit service. Plug it into any USB port on your computer and then visit to download the required software.
Once installed, the software will walk you through the same process for setting up your Flex as we just went through for smartphone users. Again, you'll need to sign up for an account if you don't have one, or sign in to your existing account if you already do.

Then select the tracker you're setting up -- in this case the Flex -- and go through the prompts. Assuming you read through the guide above, you should already have the tracker charged to at least 60 percent and on your wrist. If that's the case, skip to the end of the tutorial and wait for your tracker to blink, then tap on it twice.

How to set your Trusted Contacts on Facebook

How to set your Trusted Contacts on Facebook

Facebook rolled out a new Trusted Contacts feature to help make your account more secure. Should you lose access to your account, either by forgetting your password or having your account "hacked," you can enlist the help of three to five friends to regain access.
Once you're locked out of your account, you'll need to reach out to those people you have added as Trusted Contacts and ask them to help you out. Here's what you'll need to do on your end to get it set up.

Log in to your Facebook account and navigate to the Security section of your account settings. Or you can jump directly to the Trusted Contacts section by visiting this link. Click on the Choose Trusted Contacts link to begin.

You'll be given the basic rundown of what Trusted Contacts can do to help you keep your account secure. Click on the Choose Trusted Contacts button when you're ready to move on.

You'll need to add a minimum of three people, with a maximum of five, to the list. Start typing your friend's name and select his or her name from the list. Do this for all three to five of your friends. Once you're done adding names, click on Confirm and then enter your account password to save the list.
Keep in mind when adding more than three names to the list that you'll need a private code from each contact before you can gain access to your account. And each person can only get the code by accessing Facebook. Don't add someone who doesn't get on Facebook all that often, or someone who is likely to take a while to get back to you.Should you ever need to have your Trusted Contacts help you get access to your account, you'll need to ask all of them to visit There they will be asked to verify that it's really you asking for the code. Once they have it, they can pass the code along to you, which you'll then need to enter in order to regain access to your account. Again, you'll need all of your Trusted Contacts to go through this procedure before you can access your account. So if you have five people on the list, you'll need all five codes.
Getting started with Path

Getting started with Path

Getting started with Path

Path recently announced it has reached 10 million users, and is now growing at 1 million users per week. The total number of users is low, especially when compared with Facebook's numbers, but don't let that fool you.

Path is a useful social platform, especially for those who aren't about sharing with large groups of friends, but instead keep a smaller list of friends to share personal moments with. With the growing popularity, you're likely to see posts on Twitter, Instagram, Facebook, Tumblr, and even Foursquare.

What is Path?

Path is a private social network. Instead of allowing you to add as many people as you'd like, you're capped at 150 friends. This limit, in theory, will force you to only add people you care about and want to share intimate moments with.
In other words: if you're looking to have a popularity contest, stick to Twitter or Facebook instead.
Path not only wants you to share status updates, but it also has the ability to share what you're currently listening to, your current location, a photo, and (oddly) when you're going to bed and when you wake up. The latter option is a smart move by Path to ensure that it is the first and last thing its users are looking at every day.

Get Path

You can download Path for the iPhone or an Android device in the respective stores. It's a free download, although you'll notice there are some in-app purchases that can be made. Those purchases come in the form of stickers and photo filters.

Similar to the stickers Facebook recently rolled out, Path has been selling stickers since the launch of Path 3.0. Each user gets a free sticker pack, with the rest of the packs setting you back $1.99 each. There's also the option to purchase additional filter packs for photos uploaded through Path. The filter packs are a bit cheaper than the stickers, coming in at 99 cents each.

Using Path

When you first set up Path, you can allow it to scan your Address Book and Facebook friends for fellow Path users. This makes it easy to add friends to Path, or invite non-Path users to join the service immediately upon signing up. But be careful: if you're not paying attention, you might accidentally spam your list of contacts, along with all of your Facebook friends.

When the list of contacts and friends is first pulled up, all of them will have a check mark next to their names. This is the default setting. In order not to send an invite, you'll need to tap on the Deselect All button, and then individually check the name of each person you'd like to invite.

Should you want to share something from Path to another service, such as Facebook or Twitter, you can connect your account and cross-post by selecting the respective icon for the service you'd like to send your Path post to.

Your location

One of the more interesting features of Path is the Neighborhood feature. Enabled by default, it will automatically add your location, down to the name of the neighborhood you're in, to your Path timeline and any updates you post to the service. When you're traveling and open the app to check your timeline, you'll notice your location is automatically added for you.

You can disable the Neighborhood feature in the Settings section of the app.

Importing content

Since you're likely a new Path user, you might want to import content from another social network. Path has made this process very simple. Go to the Settings page of the app, and tap on the Import button next to the service you'd like to import your content from. You're able to import from Facebook, Instagram, and Foursquare.

Keep it personal

As previously stated, the reason Path puts a limit on the number of friends is to help encourage you to add and share with only your most personal of friends, not random strangers who have added you on every social network in existence. Keep this in mind with Path; your experience could just end up being a more meaningful one than what you find on Facebook.


Popular Posts

Ordered List