Tuesday, 14 April 2015

Vodafone Customer Care Number for all Indian States

Vodafone Customer Care Number for all Indian States

vodafoneVodafone is a very popular network among Indians and it tops many network providers, recently it getting much more hotter then Airtel and Docomo as its internet services are blossoming among Indian people. Well earlier we posted on how you can check internet balance among different network providers and evengetting 3g settings on various networks well today I will be showing you how you can connect to Vodafone customer care center using different numbers for different states.
Earlier I even posted this for Tata Docomo so you were able to chat live with those guys and sort out your issues. So now there is common number for everyone but if you wanna go specific state by state then the list is below.

Universal Vodafone Customer Care Number

Dial 111 (wait) and u get some offers to be heard, don't keep hearing those offers ... press 9 then 2 and after that Again 9 u will certainly be directed to the CUSTOMER CARE EXECUTIVE. (Valid for all Indian States)

Vodafone Customer Care Number for Specific States


But in any case you wanna go specific for any State in India, then you can dial below direct hotline numbers.
  • Andhra Pradesh: Dial 9885098850from any phone or e-mail atvodafonecare.ap@vodafone.com
  • Chennai: Dial 9884098840 from any phone or e-mail atvodafonecare.chn@vodafone.com
  • Delhi & NCR: Dial 9811098110 from any phone or e-mail atvodafonecare.del@vodafone.com
  • Gujarat: Dial 9825098250 from any phone or e-mail atvodafonecare.guj@vodafone.com
  • Haryana: Dial 9813098130 from any phone or e-mail atvodafonecare.har@vodafone.com
  • Karnataka: Dial 9886098860 from any phone or e-mail atvodafonecare.kar@vodafone.com
  • Kerala: Dial 9846098460 from any phone or e-mail atvodafonecare.ker@vodafone.com
  • Kolkata: Dial 9830098300 from any phone or e-mail atvodafonecare.kol@vodafone.com
  • Maharashtra & Goa: Dial 9823098230(Postpaid)/ 9923399233 (Prepaid) from any phone or e-mail atvodafonecare.mah@vodafone.com
  • Mumbai: Dial 9820098200 from any phone or e-mail atvodafonecare.mum@vodafone.com
  • Punjab: Dial 9888098880 from any phone or e-mail atvodafonecare.pun@vodafone.com
  • Rajasthan: Dial 9828098280 from any phone or email us atvodafonecare.raj@vodafone.com
  • Tamil Nadu: Dial 9843098430 from any phone or e-mail atvodafonecare.tn@vodafone.com
  • UP(East): Dial 9839098390 from any phone or email us atvodafonecare.upe@vodafone.com
  • UP(West): Dial 9719097190 from any phone or e-mail atvodafonecare.upw@vodafone.com
  • West Bengal: Dial 9732097320 from any phone or e-mail atvodafonecare.wb@vodafone.com

Hacking Website with Sqlmap in Kali Linux

Hacking Website with Sqlmap in Kali Linux

In the previous tutorial, we hacked a website using nothing but a simple browser on a Windows machine. It was a pretty clumsy method to say the least. However, knowing the basics is necessary before we move on to the advanced tools. In this tutorial, we'll be using Kali Linux (see the top navigation bar to find how to install it if you haven't already) and SqlMap (which comes preinstalled in Kali) to automate what we manually did in theManual SQL Injection tutorial to hack websites.




Now it is recommended that you go through the above tutorial once so that you can get an idea about how to find vulnerable sites. In this tutorial we'll skip the first few steps in which we find out whether a website is vulnerable or not, as we already know from the previous tutorial thatthis website is vulnerable.

Kali Linux

First off, you need to have Kali linux (or backtrack) up and running on your machine. Any other Linux distro might work, but you'll need to install Sqlmap on your own. Now if you don't have Kali Linux installed, you might want to go to this page, which will get you started on Beginner Hacking Using Kali Linux

Sqlmap


Basically its just a tool to make Sql Injection easier. Their official website  introduces the tool as -"sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections."
A lot of features can be found on the SqlMap website, the most important being - "Full support for MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, Sybase and SAP MaxDB database management systems." That's basically all the database management systems. Most of the time you'll never come across anything other than MySql. 

Hacking Websites Using Sqlmap in Kali linux

Sql Version

Boot into your Kali linux machine. Start a terminal, and type -
sqlmap -h
It lists the basic commands that are supported by SqlMap. To start with, we'll execute a simple command
sqlmap -u <URL to inject>. In our case, it will be-
sqlmap -u http://testphp.vulnweb.com/listproducts.php?cat=1
Sometimes, using the --time-sec helps to speed up the process, especially when the server responses are slow.
sqlmap -u http://testphp.vulnweb.com/listproducts.php?cat=1 --time-sec 15
Either ways, when sqlmap is done, it will tell you the Mysql version and some other useful information about the database.
The final result of the above command should be something like this.
Note: Depending on a lot of factors, sqlmap my sometimes ask you questions which have to be answered in yes/no. Typing y means yes and n means no. Here are a few typical questions you might come across-
  • Some message saying that the database is probably Mysql, so should sqlmap skip all other tests and conduct mysql tests only. Your answer should be yes (y).
  • Some message asking you whether or not to use the payloads for specific versions of Mysql. The answer depends on the situation. If you are unsure, then its usually better to say yes.

Enumeration

Database

In this step, we will obtain database name, column names and other useful data from the database.
List of  a few common enumeration commands
So first we will get the names of available databases. For this we will add --dbs to our previous command. The final result will look like -
sqlmap -u http://testphp.vulnweb.com/listproducts.php?cat=1 --dbs
 So the two databases are acuart and information schema.

Table

Now we are obviously interested in acuart database. Information schema can be thought of as a default table which is present on all your targets, and contains information about structure of databases, tables, etc., but not the kind of information we are looking for. It can, however, be useful on a number of occasions. So, now we will specify the database of interest using -D and tell sqlmap to enlist the tables using --tables command. The final sqlmap command will be-
sqlmap -u http://testphp.vulnweb.com/listproducts.php?cat=1 -D acuart --tables
The result should be something like this -
Database: acuart
[8 tables]
+-----------+
| artists   |
| carts     |
| categ     |
| featured  |
| guestbook |
| pictures  |
| products  |
| users     |
+-----------+
Now we have a list of tables. Following the same pattern, we will now get a list of columns.

Columns

Now we will specify the database using -D, the table using -T, and then request the columns using --columns. I hope you guys are starting to get the pattern by now. The most appealing table here is users. It might contain the username and passwords of registered users on the website (hackers always look for sensitive data).
The final command must be something like-
sqlmap -u http://testphp.vulnweb.com/listproducts.php?cat=1 -D acuart -T users --columns
The result would resemble this-

Data

Now, if you were following along attentively, now we will be getting data from one of the columns. While that hypothesis is not completely wrong, its time we go one step ahead. Now we will be getting data from multiple columns. As usual, we will specify the database with -D, table with -T, and column with -C. We will get all data from specified columns using --dump. We will enter multiple columns and separate them with commas. The final command will look like this.
sqlmap -u http://testphp.vulnweb.com/listproducts.php?cat=1 -D acuart -T users -C email,name,pass --dump
 Here's the result
John Smith, of course. And the password is test. Email is email@email.com?? Okay, nothing great, but in the real world web pentesting, you can come across more sensitive data. Under such circumstances, the right thing to do is mail the admin of the website and tell him to fix the vulnerability ASAP. Don't get tempted to join the dark side. You don't look pretty behind the bars. That's it for this tutorial. Try to look at other columns and tables and see what you can dig up. Take a look at the previous tutorial on Manual SQl Injection which will help you find more interesting vulnerable sites.

Hack Facebook Account : Stuff You Should Know

Hack Facebook?

Okay, so you got lured into the idea of hacking a Facebook account? I won't ask why. Everyone has their reasons. If you came here to learn how to hack a Facebook account, feel free to leave, because the title read - Hack Facebook Account : Stuff You Should Know -and not - How to hack a facebook account (well actually don't leave, I have something for you later in this tutorial, something on actually hacking Facebook) .That being said, there are a lot of real hacking tutorials around the website you might want to read. However, if you are here on a pure curiosity basis, then read on, and you will be a smarter person by the end of this post than you were when you began reading it.

Why not to think about hacking facebook

Search google images for facebook hack and you already
 see so many misleading programs. I mean
just enter user ID and they'll provide
 you with username and password.
It's surprising how many people actually expect it to work.

First, because you can't. Well, actually you can, but the high improbability of success makes it stand next toyou can't hack facebook. If you think typing 'hack facebook account' on google, clicking on the first result, and entering the target's email address will give you the password of his/her Facebook account, then you are not on the general level of stupidity, you have achieved an appreciatively high one. Come on, if it were so easy to hack a FB account no one would be using FB to start with. There is so much on our Facebook account that we can't even imagine the consequences if it were to get into the hands of a seasoned hacker, leave alone a novice (not even a novice for that matter) who just searched google for hacking facebook.
impossible, so much so, that I won't be exaggerating in saying that it can't be hacked. As far as the picture on the left is concerned, its one of the many tools offered on the internet, all of which have the following in common-
  1. All have very easy user interface. You just have to enter the user id, and click hack.
  2. All have download links which will take you to a survey, or some annoying ads.
  3. All are 100% not working.


What does 'hacking Facebook' actually mean?

What is the actual meaning of hacking Facebook. Most of us are misguided by the term hacking in general. Hacking incorporates the attainment of someone's password, but hacking is so much more. Account passwords to hacking are just like coins are to the subway surfer game. You get coins along the way, your progress is partially judged on the basis of coins acquired, but the idea is to find your way through the obstacles and keep moving ahead. In general sense, when you use the term hacking Facebook, you mean to understand the functioning of the website, find out about its database management systems, scripts employed, use of cookies, language on which it is built on, etc. Then you find vulnerabilities in the working of the websites, and code exploits to break through the obstacles and gain privileges into their systems, using suitable payloads. The next step would be privilege escalation. For example, you found out a vulnerability that allows you to look into the database and see the email address and cellphone number of any user. You would want to escalate your privileges and also gain access to their passwords. The last step may be setting up a backdoor, for quicker access next time. Another step might be to clear your traces so that you don't get caught. And trust me, you can't do this. I mean you wouldn't be reading a blog on beginner level hacking on Kali Linux if you had so far with web pentesting. So, the conclusion is that hacking Facebook is a real big deal, not everyone's piece of cake (I admit even I'm nowhere close to the level of expertise where I would be playing with databases on Facebook servers). And the Facebook passwords are just a reward that you get after hacking Facebook. But are we missing something? There can't be only one way to get someone's facebook password. I mean we don't want administrator access to all the Facebook databases, just a password of one of the millions of users. There must be a hole somewhere. That kid next door claims he can get Facebook password of anyone, and he's good, but not 'code a exploit for Facebook' good, no, not that good. This is where social engineering steps in.

Social Engineering

With time, the level of security in all fields of life keeps getting stronger. The element of encryption has reached almost unbeatable stage. With 256 bit encryption, cracking will take practically forever. The element of laziness is in our favor (not everyone upgrades to latest security measures), and so is the element of cost-effectiveness and carelessness (you don't picture a nerd kid with glasses next door when you are deciding between WEP and WPA for your password). But nevertheless, things are changing, but one thing remains constant. Humans. Humans in general are stupid. Not really, a better word would be ignorant, not aware of how stuff works. Most Facebook users have no idea about what all Facebook is doing for their accounts security, and how easily their carelessness can ruin each and every one of Facebook's effort to protect their private information.

Humans are the weakest link in any security system

From leaving one's account logged in to not paying attention to someone who's peeping from behind, watching them type their passwords, humans can be really ignorant. But we need not rely on this level of ignorance for passwords (I stopped using the word stupid because it'll definitely annoy and offend people. I mean not good at computers doesn't really mean stupid. They have other stuff to do than protect their accounts). We can very well get the password of an average internet user who is not very paranoid and cynical about stuff. We can't hack Facebook and gain access to their servers, but your friends machine isn't that well guarded. A virus binded with a game he asked you to fetch in a USB drive? An average person won't think that you might have planted a trojan or a keylogger in the USB drive when he takes a file from you. Or maybe send him a link which will silently install some malware in his computer. Many people don't think twice before clicking on a link (some people do, though). Or maybe make a fake login page and send him a professional looking email, directing him to a website where he ends up receiving a login page somehow (you have to make it look real and genuine, backed up by a nice story, that you can expect the target to buy). There are many more methods. As far as the promise for something later in this tutorial about actual Facebook hacking, I have provided you with a small trailer about what you can do, in the next few tutorials we will discuss stuff in detail. The first tutorial is here.


Credential Harvester To Hack Facebook (Phishing)


I don't usually put this disclaimer, but as it was a tutorial that could potentially lead a lot of people on the wrong track (away from the quest on knowledge and towards the quest for illegal hacking and account passwords), here is a warning. Everything on this site is for educational purposes and I won't be responsible for anything you do with this information. If you do something illegal, the jail time would be yours to serve, not mine. So be careful where you are headed.

SaveTheInternet: What is Net Neutrality & Its Importance

SaveTheInternet: What is Net Neutrality & Its Importance

net-neutrality-opIf you like the existing state of the web, you need to learn about net neutrality. If you are not familiar with it, do not stress. Web is developed around the concept of openness. It enables individuals to link and exchange info with ease, if the info or service is not unlawful. Much of this is since of the concept of net neutrality. If you like the present state of the web, you need to find out about net neutrality. Numerous internet users understand it. However if you are not, do not stress. We describe it right here:

Exactly what is net neutrality?

Net neutrality is a concept stemmed from how telephone lines have actually worked because the start of the 20th century. In case of a telephone line, you can call any number and link to it. It does not matter if you are calling from operator A to operator B. It does not matter if you are calling a dining establishment or a pusher. The operators neither obstruct the access to a number nor purposely hold-up connection to a certain number, unless compelled by the law. The majority of the nations have guidelines that ask telecom operators to supply an unfiltered and unlimited phone service.
When the web began to remove in 1980s and 1990s, there were no particular guidelines that asked that access provider (ISPs) need to follow the exact same concept. However, primarily due to the fact that telecom operators were likewise ISPs, they abided by the exact same concept. This concept is referred to as net neutrality. An ISP does not manage the traffic that passes its servers. When an internet user links to a site or internet service, she or he gets the exact same speed. Information rate for Youtube videos and Facebook images is in theory very same. Users can access any legal internet site or internet service with no disturbance from an ISP.
Some nations have policies that impose net neutrality however the majority of do not. Instead, the concept is followed since that is how it has actually constantly been. It is more of a standard than a law.

How did net neutrality shape the web?

Net neutrality has actually formed the web in 2 basic methods.
One, internet users are totally free to link to whatever site or service they desire. ISPs do not trouble with exactly what sort of material is streaming from their servers. This has actually permitted the web to turn into a really worldwide network and has actually enabled individuals to with ease reveal themselves. For instance, you can slam your ISP on an article and the ISP will certainly not limit access to that post for its other customers although the post might damage its company.
However more notably, net neutrality has actually made it possible for an equal opportunity on the web. To begin an internet site, you do not require great deal of cash or connections. Simply host your site and you are excellent to go. If your service is great, it will certainly discover favor with internet users. Unlike the cable television where you need to create alliances with cable television connection companies to see to it that your channel reaches audiences, on web you do not need to talk with ISPs to put your internet site online.
This has actually caused development Google, Facebook, Twitter and many other services. All these services had really simple starts. They began as a standard internet sites with modest resources. However they were successful since net neutrality permitted internet users to gain access to these sites in a simple and unrestricted method.

Exactly what will take place if there is no net neutrality?

If there is no net neutrality, ISPs will certainly have the power (and disposition) to form web traffic so that they can obtain additional gain from it. For instance, numerous ISPs think that they ought to be enabled to charge business for services like YouTube and Netflix since these services eat more bandwidth as compared to a typical internet site. Essentially, these ISPs desire a share in the cash that YouTube or Netflix make.
Without net neutrality, the web as we understand it will certainly not exist. Instead of open door, there might be "bundle strategies" for customers. For instance, if you pay Rs 500, you will just have the ability to gain access to web sites based in India. To gain access to global internet sites, you might need to pay a more. Or perhaps there can be various connection speed for various kind of material, depending upon just how much you are spending for the service and exactly what "add-on plan" you have actually purchased.
Absence of net neutrality, will certainly likewise spell doom for development on the internet. It is possible that ISPs will certainly charge internet business to allow faster access to their web sites. Those who do not pay might see that their internet sites will certainly open gradually. This indicates larger business like Google will certainly have the ability to pay more to make access to Youtube or Google+ quicker for internet users however a start-up that wishes to develop a various and much better video hosting website might not have the ability to do that.
Instead of an open and complimentary web, without net neutrality we are most likely to obtain an internet that has silos in it and to get in each silo, you will certainly need to pay some "tax" to ISPs.

Exactly what is the state of net neutrality in India?

Lawfully, the principle of net neutrality does not exist in India. Sunil Abraham, director of Centre for web and Society in Bangalore, states that TRAI, which controls the telecom market, has actually attempted to come up with some guidelines relating to net neutrality numerous times. For instance it welcomed discuss the principle of net neutrality from market bodies and stakeholders in 2006. However no official policies have actually been formed to support and impose net neutrality.
Nevertheless, regardless of absence of official policies, ISPs in India mainly follow the principal of net neutrality. There have actually been some events where Indian ISPs have actually overlooked net neutrality however these are rare.

Will the idea of net neutrality endure?

Net neutrality is sort of gentlemen's arrangement. It has actually endured up until now since couple of individuals recognized the capacity of web when it removed around 30 years earlier. Now when the web is an essential part of the society and extremely essential, ISPs throughout the world are attempting to obtain the power to form and manage the traffic. However there are methods to keep net neutrality alive.
Customers ought to require that ISPs continue their hands-off method from the web traffic. If customers see an offense of net neutrality, they should take a proactive technique and register their annoyance with the ISP. They must likewise reward ISPs that maintain the net neutrality.
At the very same time, as Abraham states, Trai has to bring out a set of clear and accurate guidelines that safeguard the net neutrality. "We have actually begun seeing ISPs attempting to take control of the traffic that streams from their servers however Trai can manage them. It can keep the web open and consumer-friendly by forming guidelines that secure net neutrality. These are early days so it is simple to do. If ISPs handle to alter the system, it might end up being too late," he states.

What you can do to Save the Internet?

Well you can respond to TRAI with your petition letter in order to save the internet. Simply visit http://www.savetheinternet.in and press the Respond to TRAI button, this open up the petition letter with automatic answers written in order to save the internet. Simply compose a new email and send that email in order to show your response to this bad act.
You can even check this awesome AIB video to understand this even in a better way, please its your time submissions could be done till 24th April 2015.

Top 5 Things To Do Before Installing a Custom ROM on your Android Device

Top 5 Things To Do Before Installing a Custom ROM on your Android Device


Rooting and installing custom ROM offer many advantages indeed but, at the same time it can be a risky as it can cause serious problems to your phone and possibly even brick it.
People brick their phone because they don’t take precautions when installing a custom ROM on their device. If you understand things and go through it carefully, you’ll never be caught into the uncomfortable situation. Here are some important things to be taken into consideration before rooting or installing any custom ROM.
  1. Backup your Apps, Contacts, etc.
    The first thing that you should do before installing a custom ROM is to backup your applications, data, contacts, messages, etc. By backing up your phone, you won’t lose your important data when something happen during the procedure. (Read How to backup everything on rooted and non-rooted Android phones).
  2. Ensure decent battery level
    It is very important to check the battery level before installing a custom ROM or rooting an android device. Because, if your device turned off in the middle of the procedure due to lack of battery, it can cause your phone to brick. So, it is very important to have battery sufficiently charged before you start rooting or installing any custom ROM.
  3. Turn on the USB Debugging mode
    USB debugging mode is a mode to facilitate a connection between an Android device and a computer with Android SDK. Before an app like One-click-root can dig into your system and grant the access to your device, USB debugging is necessary to allow that function in the first place.
    That’s is why, whenever you want to perform such task, it is highly recommended that you turn on the USB Debugging mode from ‘Developer Options’ under Settings of your device.
    enable usb debugging mode
    On Android phones with Jelly Bean 4.2 and higher, the Developer Options are hidden by default and it can only be accessed by tapping 7 times on ‘Build Version’ from Settings ->About.
  4. Backup your current ROM
    If you’ve rooted your phone, it is recommended that before installing a custom ROM on your phone, you must back up your current ROM, whether it is stock or custom ROM. So that if you experience some lag or any other situation you don’t like after flashing a custom ROM, you can restore the phone to its original state with this tool. For the tutorial, you can check out at here.
  5. Backup Your Phone’s IMEI
    Sometimes, when you install a custom ROM, your IMEI number will be lost and as a result you will not be able to receive proper network signal. To avoid such situations, do not forget to backup a folder called ‘efs’ that stores your IMEI number.
    To access the folder, you have to install a root file explorer app like Root Explorer, X-plore File Manager, etc. Once installed, open the app and find the folder. You will easily find it as it is located on the root directory of your device. When you located the folder, just copy the entire folder and paste it on your external SD card. It will be even better if you copy it to your computer too. After installing the custom ROM, just copy and paste the folder in the same location where it was.

8 Tips to Get The Most Out of Samsung S Voice

8 Tips to Get The Most Out of Samsung S Voice



S Voice is Samsung’s voice control app, similar to Google’s own voice command, which allows you to perform various tasks such as dialing a phone number, sending a text message, playing music, etc, on your device by using your voice. This feature is particularly useful for driving and other times when you need hands-free functionality.
S Voice is currently available as a built-in app for Samsung Galaxy S3, S3 Mini, S4, S4 Mini, S5, S5 Mini, Note 2, Note 3, Note 8, Note 10.1, Mega, Grand, Galaxy Tab series and all new series of Samsung Galaxy flagship devices.
If you are using one of those Samsung Galaxy devices, then you can take advantage of the S voice services. Here are some tips to help you get the most out of the Samsung S Voice.

1. Set Wake-Up Command

Setting a wake up command is the first thing you should do if you plan to use the S Voice feature. Not only it can tell you what command you can use to activate it, but it also allows you to create a custom wake-up command.
The default wake-up command is “Hi, Galaxy”, but you can change it to any 3-5 syllable phrase you’d like. To do this, open up S Voice app then tap the Menu button -> Settings. Make sure ‘wake up command’ option is checked and then select ‘Set wake-up command’.
set wake up command
This should bring you to a screen where you can custom various wake-up functions. Tap a command number and then choose the function. Tap the mic button then say the word or phrase you want to use as the wake-up command 4 times when prompted.

2. Answer and Reject Calls

S Voice allows you to easily accept or ignore incoming calls using the commands “Answer” and “Reject” when your phone starts to ring. When you answer your phone in this way, the audio will automatically be switched to the external speaker on the device, allowing you to answer and conduct a conversation completely hands-free.
To do this, on the S voice settings menu, find the option ‘Voice cmd for apps’ and flip the switch to turn it ON. For galaxy S4 users, from the Home screen, tap on the Menu button -> Settings-> My Device tab. Tap Voice control, and touch the slider to turn the feature ON.
Note: If you set the alarm type for calls, then this voice command is not available.

3. Control Your Music Player

Users can also tell S-Voice to play music by saying “Play…” followed by the name of the track or album or simply saying “Play to open music player app. You can skip through tracks by saying “Next” or “Previous”, and you can control the volume by saying “Volume up” and “Volume down”. If you have playlists set up, you can play them by saying “Play playlist my favorites” or whatever the title of the playlist is.

4. Take photos

If your only camera button is onscreen and you find it difficult to tap the button, then you can tell the camera to take a photo for you. To do this, make sure the ‘voice commands for apps’ or ‘voice control’ option is enabled, then open the camera app, and when you’re ready to take a photo, simply say “Smile”, “Shoot”, “Cheese or “Capture”.

5. Update your Facebook/Twitter

You can also do hands-free social networking through S Voice. To be able to use S Voice to update your Facebook or Twitter statuses, you first need to authenticate these networks within the S Voice settings. On the settings menu, scroll down to the Social Settings section and tap on the app you want to integrate. Enter your login details for that app. Once this is done, just say “Facebook/Twitter update The Samsung S Voice is brilliant” it will post it to your account.

6. Add a Home Address

To make navigation using S Voice even easier, you can tell your device your home address in advance, allowing you to quickly navigate home by saying a command such as “Drive home”. To set your home address, go to S Voice > Settings > Navigation > Home Address. By using the voice commands “Navigate to… ” or “Direction to…”, you can use S Voice to help you navigate to almost any location you want using Google Maps.

7. Voice Search

As you would expect, you can use S Voice to search your contacts for a specific person or to search for information on the Internet. . To find a contact, you would use the command “Look up…”, to find something on your tablet you can use “Find…” and to search the Internet, use “Google…” or “Search…”. You can also ask your device questions like “What is today’s date” or “What is the weather?”. S Voice will search for the answer in the appropriate way and deliver the answer without leaving the app interface.

8. News Reader

If you are driving, or your eyes are otherwise engaged, you can ask S Voice to read out thelatest news for you. Simply say “Read the news” or “I want to hear the news”. Depending on what news apps you have installed, S Voice will read out the latest story from Flipboard, Newsy, etc. To hear the next news item, simply say “Next news” or say “Previous news” to hear the previous news item.


These are just some of the Samsung S voice functions. There’s a lot more things that S Voice can do, so have fun exploring!

HTC One Tips, Tricks and Hidden Features

HTC One Tips, Tricks and Hidden Features



The HTC One is one of the best smartphones in the world, not only because of its excellent performance and great camera but also because of its awesome features.
Although, HTC One isn’t as tough as the features are in the Samsung Galaxy S4, but this list will help you unlock some of the top HTC One hidden features. If you are own One, the following tips and tricks will help you get the most out of your new device.
All of these hidden HTC One features should work on all the smartphone variants of HTC One, including AT&T and Verizon HTC One.

Touch to Capture Photos

The HTC One comes with an amazing camera which can be used to focus perfectly before you capture the objects. When you tap on the screen you can select the object to focus and everything else in the background would get blurred. That’s a feature which you would generally find on the DSLR’s camera and surprisingly this is available on this phone.
But if you prefer taking photos with a tap on the screen, then you can enable that option through the Settings in the Camera App. Go to Settings -> Shutter Option -> Touch to Capture and turn it on.

Quickly Switch Apps

You can quickly switch between apps without exiting to the home screen. To do that double tap on the Home button and it would show you a new window with some applications which were accessed recently. This is a pretty useful feature when you have to multitask in HTC One.

Quickly Switch Cameras

If you would like to Switch from the Front Camera to the Back Camera, you don’t have to go through the settings but simply swipe your fingers on the screen. This is yet very simple but useful feature to quickly switch the camera.

Remove BlinkFeed from Home Screen

BlinkFeed is a feature on HTC Sense5 that grabs all news from various sources and aggregates it onto one handy home screen panel for easy reading. If you don’t like staying current on news, you probably want to get rid of it. While you can not completely remove blinkfeed from your phone but you can hide it from showing up in the first screen. To do so, simply long-press on any homescreen and then long-press the thumbnail at the top of the screen. You’ll see the option ‘set as home’ appear. Select any screen other than Blinkfeed and you are done.
how to remove blinkfeed on htc

Use the HTC One as a Remote Control

The HTC One includes an IR blaster, which allows the user to control their TVs and cable box from across the room. Plus, with HTC’s Sense TV app, you can easily see what’s on using a slick interface and tap one of your favorite shows to start watching. You can also use the app to control your TV’s volume, record shows and more.
To use it, tap on Apps -> TV and follow the instructions to pair devices to your HTC One.
htc one as remote control

Modifying LED notifications

It’s pretty easy to modify the notifications flash on your phone. This is possible by going to the settings and changing the default settings. Tap on Settings -> Display, gestures & buttonsand tap on ‘Notification flash’. Now choose which types of notification you want the LED to flash for.

Use Magnifier Glass to Select Text

If you are found it difficult to select text and tapping it correctly, you can enable an option to show a magnifier glass when selecting text. To do this, go to Settings->Accessibility and check the show magnifier option.

Enable Car mode

HTC has a car mode that show you the options which you generally use while driving in a better display. It is not only easy to reach and select but also shown in large font. This means that you get the Navigation Dealer, Music and Speak features in a different UI which are easy to use while driving.
htc one car mode

Hide SMS Messages

There are times when you want to hide some of your SMS Messages in your phone. Usually you will need to download third-party app from Play Store to hide selected SMS messages but HTC One has made it easier for you. HTC One comes with an option of securing your important or private SMS from everyone.
You will be required to setup a password before using this feature. Tap on Messages ->General -> Settings -> Password and enter Password. Once the password is set, go back to the main messages application screen and long press on the message that you want to hide. You would get the option to Move to Secure Box.

Save Power with Sleep mode

Sleep mode will automatically switch off 3G connectivity when it’s not needed. While it may not seem like much, this can actually save you a ton of power. To turn it on, go to Settings->Power->Sleep Mode.

Snap Animated Photos with Zoe mode

Zoe mode is a key feature of HTC one. It takes a short video clip that can be sliced up into twenty images. To enable zoe mode, tap the small camera icon on the left side of the screen. This will turn on HTC Zoe and show it at the bottom of the screen. Now just tap the shutter to take animated photos.