Thursday, January 22, 2015

Tsu 1.0.3 APK Free - Social Networking Apps for Android

0 komentar
A new social network called 
Tsu , will reward the user, the content that is created in the network. Networks created by technology entrepreneur from New York yangb standing in 2013, but the new website was launched on 14 October.
The founders were Sebastian Sobczak, Drew Ginsburg, Thibault Boullenger, and Jonathan Lewin. What distinguishes Tsu with Facebook or other newcomers, Ello , is a tribute to the users in the form of money. This site displays ads, and promises to pay users for their contributions in the network.
Reported by ZDNet ,  the working principle of this site is simple. The more attractive and user-generated content is widespread, more and more acceptable wage / the more money that is generated. Tsu will only retain 10% of their income from advertising, and the remaining 90% distributed to users. At first glance, the concept is similar to MLM ( Multi Level Marketing ).
"If you compare it with existing social networks today, they are similar to radio stations playing songs everyone without giving them a royalty," said Sobczak , one of the founders quoted re / code . "It is not unusual when the user has made ​​a valuable free content for them, and can be 100% make money," he continued.
To join this network, only through invitation. But do not worry, the user who successfully invite other users, will also miss wages. Or, you can join through a user account address, for example through my address is: tsu.co/ngurahsila
use this for registration. 

tsu - Social & Payment Network - screenshot thumbnail   tsu - Social & Payment Network - screenshot thumbnail  tsu - Social & Payment Network - screenshot thumbnail


TSU is a free social network that gives back to your income. Instead, we focus on the payment. It is the right thing to do. Share url of your members and start building your family tree. The application is available for iOS and Android.

Download APK Files tsu (Version History)

tsu APK
Download tsu 1.0.3:
Continue reading →
Monday, January 19, 2015

Tips on Securing Online Account from Hackers

0 komentar
 Securing online account
Tips on Securing Online Account from Hackers - breaker or easier a system we call the hacker is the greatest threat to anyone whose activities cyberspace.Both activities work or just playing around in the world of social networking. Most of us, still underestimate account burglary cases committed by people who are not responsible. They generally act as the curiosity to test its ability to actually have a purpose why breaking into another person's account.
As an example of just that recently occurred, there are hackers to hack someone's Facebook account. The account owner is initially normal, maybe there dibenaknya assume that the hacker that was just for fun without having any purpose. But it turned out to be the act of the hackers increasingly lead to fraud. He randomly chose a close friend of the owner of the account to send a private message one by one. The contents of private messages are urged everyone to send hack victim had a pulse. No half-hearted, fraud or money usually asks pulse of at least 100 thousand. With all deceit delivered via private message, many close friends of the victims of mindless hack and money re-transmit pulses in accordance with the request. Understandably, the breaker is often claimed that the victims were hacked earlier accident.
Based on the above case, it will make you more wary managing online accounts owned. Such as Facebook, Twitter, Email, Website login and so forth. Especially the most important is the account that the security of your email should be layered. For that you should prevent burglary is the method that is often underestimated by many internet users. Because indeed Tips Securing Online Account from Hackers that will be discussed in the post is fairly simple but very important to note. Please refer to the tips below:
  • Use Strong Passwords
Is a must for us to use a strong password each accounts we have. But is this really you have done? It did not seem too, because most of us will only use a simple password. Suppose birth date, because it is only by means of the date of birth of the owner will remember it easily. From now on, the better you fix this trivial. Immediately change your password with a stronger again.Enter some combination of numbers, letters and symbols. Make sure your password is not easily guessed by others or people nearby.
  • Use Different Passwords
The number of online accounts owned, making sebagain people prefer to use the same password on every account its online. Both social networks, email and the password for the website / blog. Obviously this is very dangerous, especially if the accounts that you have is very important. Just imagine, when there is one successful your account burglarized such as Facebook. What will happen next? To be sure all the accounts that you have to be brushed off by rogue breaker. And the most frightening is when the breaker has mastered your email account.Therefore, use different passwords on any online accounts you hold.
  • Use Applications business Password
After running to the two previous tips, you are possessed many online accounts will be faced again with a fairly complicated problem, namely the management of passwords. Passwords that are difficult to memorize and vary from one account to another account definitely make you confused. But do not worry, now a lot of free applications that have utility for managing your passwords. The author recommends that you use software like Roboform or LastPass. To these two applications are very pupuler among netizens.
  • Use Double Email
A breaker, usually go after primary email account suaru. Because of this primary email are open, it will easily disassemble the breaker you log in to an account. For this reason, do not ever hesitate to make email more than one. Which make the primary email, while others hide them without anyone knows. By practicing this, you will be able to recover the password for an account that is successfully broken through the main email. Quite utilize Forgot password option must be on the faithful forn logged in, you can control your account via email others unknown by others, including the hacker said.
Simple tips above often we underestimate. Though a very large influence on the accounts that we have. There is no harm in practicing step by step over the line in order to keep your account safe, minimally difficult to break into. Because for the author himself, as powerful and as strong as the security of a system, there is still a gap to be exploited by hackers.
Continue reading →

Asus ZenFone Zoom, Android Smartphone Lollipop With 4Gb RAM 2015

0 komentar
As early habits have always held the Consumer Electronics Show in which the electronics manufacturer can memaperkan their latest products unique and competitive qualified, in January is now back again at CES 2015 in Las Vegas, USA. Many manufacturers of both famous and new smartphone displaying their latest gadgets in the hope will entice consumers before descending global kepasaran. One thing that is interesting is the latest whiz who came from ASUS headquarters, they showcased the duo innards with the specification can be said to be "highly qualified" plus as previous habits, price tag for both fairly friendly and able to make a shaky senior brand. Asus ZenFone 2 and Asus ZenFone ZOOM is a smartphone based on Android OS duo v5 (Lollipop) with a capacity of up to 4GB of RAM. This occasion gadgetfrontal.com opportunity to provide a summary of the specifications and price Asus ZenFone Zoom, the following explanation.

Specifications Asus ZenFone Zoom

First, the screen aspect of technology use IPS LCD capacitive touch screen measuring 5.5 inches with a resolution of 1080p span x 1920 pixels, plus a 401-deep image density becomes quite elegant introduction to the prospective buyer. Toughness Corning Gorilla Glass 3 help provide support for aspects of screen protection segment of the impact of the collision and friction rough sharp objects.
Price Asus ZenFone Zoom
Indeed Asus ZenFone Zoom is the first camera phone made ​​by Asus that is ready to compete with the Samsung Galaxy Kzoom or Nokia Lumia 1020. The front display take Zenfone design and the rear there is a camera feature. Asus claims that the latest Android smartphone Lollipop 2015 was also a camera phone with 3X Optical Zoom feature thinnest at this time.
See Asus ZenFone Zoom closer we can get the new smartphone dibesutkan chipset Intel Atom processor Z3580 with a 64-bit architecture bertenagakan Quad Core that has been tested is able to throw the best performance up to 2.3 GHz. Zenfone Zoom is available in two versions which use the serial lowest and the highest 2Gb 4Gb RAM.
Zoom Asus ZenFone price is fairly low, but in fact the specifications offered are not cheap, the interface aspects still rely friendly display ZenUi but already wearing the latest OS Android Lollipop, maybe Zoom can you call a Android smartphone with 4Gb RAM Lollipop first sold in the world. Besides that, ASUS Indonesia said that the phone is plugged better graphics chip that is known is that the GPU PowerVR G6430, sized HD gaming weight remains smooth with no lag.
Asus ZenFone Zoom Camera
Features 3X Optical Zoom Zoom Asus ZenFone
Furthermore, photography features Asus ZenFone Zoom adjust its name, the main part using 13 megapixel sensor caliber lens laser autofocus feature that gives the object of concentration faster, dual LED flash, manual controls, a 3x optical zoom that allows users to take photos in more detail. Increase of the highest version of Asus ZenFone 6 earlier that brought forward 2 mp camera, the latest version of Asus ZenFone is now wearing a 5 MP sensor, used for video calls selfie or more steady.
Data storage is also very spacious, with a 128GB internal memory after the user can add microSD memory up to a maximum capacity of 64Gb. Includes data connectivity Cat4 4G LTE network.The user is also given an online data storage space of 5Gb on ASUS WebStorage. Finally, a mobile phone with a fairly complete feature is supported by the non-removable battery Li-Po 3000 mAh. Of the many advantages offered by us have flaws Asus ZenFone Zoom using the battery can not be removed if deteriorated, the battery can not be removed to be replaced.

Price Asus ZenFone Zoom

Asus ZenFone Zoom is already available in the market with the price tag of $ 400.
Continue reading →
Tuesday, January 13, 2015

10 Tips and How to Distinguish Genuine and Counterfeit Smartphone

0 komentar
The rapid advancement of Technology Latest Gadgets prove that increasing the level of human intelligence. Various innovation and technological gadgets is increasing from year to year. Naturally, if the community is to make the latest gadgets as one of the lifestyle that must be met. Every new series with more advanced technology gadgets, then not a few who are trying to have it even have to wait in line for days to become buyers gadget in question. This has become a phenomenon that can not be avoided. In terms of the development of the telecommunications industry, it is certainly a good impact. But it turns out the impact of the development of lifestyle to have the latest gadget is not only limited to these. It is also often used as an opportunity for a few people to make profits by not not kosher, ie by forging products of the latest smartphone to benefit in a way not true. If this happens to you, you desire smartphone was counterfeit, certainly very painful. Therefore, as consumers we need to also know Smartphone Tips and How to Distinguish Genuine and Counterfeit before we buy it. As quoted from Merdeka.com, here are 10 tips and How to Distinguish Genuine and Fake Smartphone for you from being exposed to fraud by buying a smartphone false. READ detailed specifications

In general, for mobile devices coming out now is able to run on GSM 850/900/1800/1900 networks and a minimum of 3G HSDPA 850/900/1900/2100, but for prosthetic devices can not do it. In addition to the network, from the specification of the processor is also used as the standard assessment. Then, from the capacity of the RAM and ROM it will see the difference. In the original device, in general, the capacity of the RAM and ROM will be greater, while in counterfeit products is very limited even with only 512MB of course. Not only that, camera, screen, Wi-Fi, Bluetooth until the battery can also be used as an assessment of whether the goods are counterfeit or not.
IMEI CODE CHECKS
Indeed, not all devices can use this code, but the majority can do. To check the IMEI number, you can press * # 06 # and the IMEI number has appeared when the screen, try to fit with the IMEI in his box. After that, you can find out where the assembly of the product with a view of the IMEI number series to seven and eight. There are special codes that you can make a referral to see a device of making it on Google.
CEK EXIF ​​DATA USING PHOTO
This method is relatively easy, because by using the data exif photos taken with the camera in the device, it can be seen clearly the authenticity of the smartphone. When you capture an object using a camera on a mobile device, when the results are in check in the Gallery or also when transferred to a PC, the properties will be seen full exif data.
CHECKS WITH APPLICATION BENCHMARK
In this way, it will be more reliable information about the mobile device you want to know the status. Using the Benchmark test application, it can be seen up to speed performance of the device.
CHECK OF DESIGN AND COLOR
In general, each vendor will always have the characteristic of the product release. Although it looks the same, but the shape, design and color of the original and different false. Weight, screen size and detail of the device can also be used as a reference to determine whether the goods are counterfeit or genuine.
CEK WARRANTY CARD
In some ways, this one can not be used as the main reference, because today many 'actors' that have started to make a warranty card which of course is also false. However, not all the fake device makers are able to also make the warranty card. Therefore, although it can not be used as a primary weapon, but the way of identification through the warranty card is also quite effective.
FEEL perfomanya
Of course, if an item is genuine juxtaposed with counterfeit goods, then the end result would indicate that the original device was the one who will come out as winners. In general, access and operation of the prosthetic device is slower and requires patience. That is because the capacity of the RAM contained in it are too small to use with fast multi-tasking.
CHECK DETAILS TEXT
As reviewed in Business Insider (09/15/2013), it is advisable to check the print paper on the device or other objects that come in one package. In general, there will be a typo writing or writings also the output of a particular country. In addition, the print paper in prosthetic devices can easily be lost or faded.
CEK NFC BATTERY CONNECTOR
When you remove the battery from the device, it will show the line of NFC the connector such as tin yellow lines. But in prosthetic devices, NFC Connector will be seen more clearly, while in the original device will look a little more impressed and protected.
COMPARE QUALITY AND MUCH
Of course, the last step that can be done to detect counterfeit goods or not is to look at the quality and price. Comparison of Specs and Price Latest gadgets that you want to purchase should be appropriate. When juxtaposed with the original product, the specifications and the quality of counterfeit goods can not be outmaneuvered. And again, expensive stuff of course has its own qualities. Similarly, the original product that the average marketed at a great price.

Thus the article 10 Tips and How to Distinguish Genuine and Counterfeit Smartphone on this occasion.
Continue reading →