Trace, Track And Recover your lost,stolen or misplaced IPhone


Now more and more technologies are coming to make human life smooth and tension free. So today I’m going to give you are tension free breath. You are surely thinking, how? Then I must tell you that today my post is about tracking, tracing and recovering your lost or stolen IPhone. In normal life there are chances of IPhone being stolen or lost or misplaced.
When your IPhone is stolen or lost. You start thinking about the information that you have stored in it, including the passwords, login details to your financial accounts, your Facebook account and much more. You start thinking about those pictures that you treasure and wish you had transferred them to your laptop before you misplaced your phone. Imagine what will happen if your iPhone is ‘actually’ lost or stolen instead of just being misplaced.
Don’t worry! The world is not about to end. So now no need to search it in the room and calling your friends for if they had seen it or lodging a FIR. So to come up with this problem go through the article given below.
First make sure that your iPhone is actually lost or stolen. To do this, simply make a call to your iPhone from any other mobile phone and make sure that you can’t find it. Once you are sure that your iPhone is stolen or lost, proceed further.
First contact your mobile service provider (just go to the office of which company’s sim you are having) to block the SIM of your iPhone. Then check the bill of your iPhone to find out its IMEI number, and contact your nearest police station to lodge the FIR for lost iPhone with its IMEI number.
Use this FIR (First Information Report in India) to contact your mobile service provider. They will first block this iPhone so that it becomes unusable for the person who found or stole it. Now the person who had stolen it will not be able to run if he changes the SIM also. Then they will help you trace your iPhone using its IMEI number.
You don’t have to go through all these mini operations if you have any one of the following iPhone tracing and tracking apps installed on your iPhone. So, if you find your iPhone using the above procedure or if you buy a new iPhone, the first thing to do is to install any one or more of these apps.
• Find My iPhone: Assuming that you have IOS 5 on your iPhone and you have an Apple ID and you have already installed the Find My iPhone on your iPhone, and Allowed it from ‘Settings > iCloud > Find My iPhone’. Go to https://www.icloud.com/#findand login with your Apple ID. Click on Find My iPhone button and the app will instantly trace your iPhone to its exact location on a Map if its currently connected to the internet.
If the iPhone is not connected to the internet, you can enable the option in Find My iPhone app to email you its location on map as soon as it gets online.

If you click on the location point of iPhone on the map, the Find My iPhone app will offer you three choices. You can play a sound on your iPhone or send a text message, you can wipe all your personal data on iPhone and you can lock the iPhone.
First you should send the message on your iPhone asking the new owner to send the iPhone back. You may also consider offering an award if they do send it back to you. You should then lock the iPhone after some time.
If you get no response even after a long time, you may consider removing all your data on it and then try to track it down via GPS locations on the map.
Note that once you wipe the data on your iPhone, it will be reset to factory defaults, and it will be impossible to recover the data on this iPhone even if you find it later.
• iHound: If you have an account at iHound, and have installed their iPhone tracking app, it will send you an alert by email stating that your iPhone is being located, whenever someone else connects your iPhone to their computer.
You will also receive a report that shows where your iPhone is being used when you log into the website for iHound.

This is an important app to install as anyone who has stolen or found your lost iPhone will connect it to his computer to install and modify the iPhone for his own use.
• Navizon: This app uses GPS navigation, WiFi and Cellular triangulations to zone in on where the lost iPhone is located. Within this app is a newly added option that allows iPhone owners to send a text message to their iPhone to help track it.
• MyFoundCast: This new technology embeds an “If you found this iPhone” message on the custom wallpaper that lets people know how to return your iPhone to you if they find it. If you are a member of this service, you will have your own tracking ID and if your phone is lost, all you have to do is call and let the service know to add your phone to their database of lost and found phones. However, this service counts on the fact that people will be nice enough to return your phone to you. Can you count on it? :)

• Mobile Spying Apps: There are some mobile spying apps like Mobile Spy and Phone Sheriff that lets you spy on any iPhone. These type of apps are generally used by parents to track the actions, including messages and phone calls, of their children.
If you are young, you can ask your parents if they have any iPhone spying apps installed on your iPhone because these apps can help you track the exact location of your iPhone on a map. I know you will hate your parents after this, but hey, you at least got your lost iPhone back.
GadgetTrak: This app increases your chances of recovering your lost or stolen iPhone by generating location reports, sending a discreet message to your device, and snapping a photo of the thief with the built-in camera. With its restriction on "Deleting Apps", the thief will not be able to delete GadgetTrak from your iPhone. [$3.99]
Install GadgetTrak Before the iPhone is Lost or Stolen
1.     Purchase and install GadgetTrak .
2.     Tap the GadgetTrak application icon on your iPhone to launch the app.
3.     Create an account and sign in.
4.     Set a passcode for GadgetTrak to prevent others from changing your settings or seeing the tracking status.
Recovering Lost/Stolen iPhone with GadgetTrak
1.     Visit http://trak.me  to enable tracking.
2.     Select your device to log in.
3.     Once logged in, you’ll see your iPhone plotted on the map.
4.     Click the "View" button then select "Tracking Reports" on the top.
5.     The Camera allows you to snap a photo with a one-time fee of $0.99.

Device Locator: This allows you to track the location of your misplaced iPhone, sound an alarm on your lost or stolen iPhone, take a photo of the user remotely and send a message with sound. There’s no monthly or yearly fees involved. [$3.99]

Use Device Locator Before the iPhone is Lost or Stolen
1.     Purchase and install Device Locator .
2.     Launch the app by tapping the icon.
3.     Create an account in https://device-locator.com .
4.     Customize the settings in your iPhone.


Recover Your Stolen or Lost iPhone with Device Locator
1.     Visit https://device-locator.com  and login to your account.
2.     Set it to emergency mode and lock the application from the web application.
3.     Track your iPhone’s recent location history, including the most recent position on a map.

If Found+ :This replaces your iPhone background wallpaper with a message if you have lost your iPhone. Even if your iPhone is locked with a passcode, a good Samaritan can reach you if he/she finds your phone. [$0.99]


Phone Trace 4:This tracks your lost or stolen iPhone’s real-time location reports and provides you with the new number of the person who is holding on to your iPhone. It also can send emails, SMS and some commands remotely. [$7.99]


Motion Alarm: This plays a customized alarm to alert you or the unauthorized iPhone holder when a pre-set level of movement is reached. It also provides GPS tracking so you’ll be able to receive a position report in your email Inbox. [$1.99]



Find My Friends :Besides Find My iPhone, the Find My Friends app can be used as an iPhone device tracker as well. By using your family members’ or friends’ iPhone (which has been accepted and added previously), you’ll be able to see your iPhone’s location on a list or on a map. [Free]

 

 

Prey  is the only mobile-recovery application that works across phones, tablets and computers. An open source product, its features include geolocation, snapshots, screenshots and remote hide/wipe. Prey Recoveries documents device-recovery success stories from around the globe.
In order for Prey’s device tracking to work, the device must be connected to the Internet:
1.     Install the software, then when you receive the activation link via email, log in to the website control panel – this will display any device you have running the software.
2.     If your device is lost, log in to the control panel and select any or all of the following:
1.     Info to gather (this will be sent to you via email): geolocation, network info, webcam images.
2.     Actions to perform: sound an alarm, send an alert to the device screen, remote lock or secure data.

 

Lookout  locates a missing device somewhere in the world every 5 seconds. But in terms of device tracking, the free version isn’t as feature rich as some competitors – it lacks remote wipe and lock, for example, but does include other features like security and data backup.
To begin tracking:
1.     Install the app and enter an email address
2.     Log in to the Lookout website
3.     Press the Locate button to display the device location on Google Maps
4.     From the control panel, you can also sound an alarm
5.     Remote wipe and remote lock are available only in the premium versions ($2.99/mo or $29.99/yr)


So subscribe our Blog to kick off your day with our free stuff.

Some New Gadgets for Proper Energy Harvesting

 Technical Scavenging.. Something new?

Nah..!
We can take it as a combo pack of
"ENERGY HARVESTING + TECHNOLOGY"
Simple techniques in our daily life that can help in utilising the mass energy that we waste in our daily tasks.
Here we are introducing some of the common things that technology has modified to provide us with simple ways to keep ourselves update with the new era of sustainable energy consumption and development. Let us take a step ahead and at least get aware of some of the basic gadgets around us!....

 

BLINDED BY THE LIGHT ..

We all are well acquainted about the new emerging technologies and efforts going on to harvest the solar energy. One of them here we see is "Blinded By The Light"!.. We generally use blinds to cover up our windows and prevent our room from the scorching sun. What if we utilise the same scorching sun to produce some electricity for us? I hope our viewers might have got an idea of this article by now! The blinds used to cover our room can collectively be used to absorb solar energy of the sun in the day time and that energy can be easily converted into electricity by a simple solar cell to energise our electrical appliances like table lamps, small bulbs etc. Don't you think it's a nice way of sustainable energy consumption?!!

 

 DISCO-TECH

Well..Well..Well.. we are sure that this technology would surely grab your interest for a while.. It's quite funny and interesting to know that the more you enjoy the Disco Dancing, the more the Disco would enjoy your Dance! It's not that difficult to understand by the way. A new technology has emerged where springs are fitted under the Disco Dance floor and through your dance, the springs would join you in their to and fro motion which would then can be converted into electricity so much so that even the complete lighting system of the region can be powered by that vibrational energy!.. Isn't it interesting?

 

 ON-AND-OFF ROCKER

Who would not like to rock on a chair while reading or even while sleeping? Remember the old traditional chair that you might have been watching for so many years in your home? But have you ever imagined that the energy you use unknowingly while rocking on that chair can be used to lighten a lamp? Yeah! We are absolutely correct. This is a modern era classic invention of rocking chair where your rocking to and fro motion can generate energy that can be stored and then can further be utilised to power the overhead light that is already attached to this chair. So now rock-n-roll and save your electricity bills too!

SHAVE AND A KILOWATT

How now guys? Tired of shaving and want some electric shaving kit? We know that there are many available now in the market. But what if you get free from charging and discharging overheads of such shaving kits? To be more clear what if your shaving tool gets charged and discgarged at the same time while you are busy with your shave that too without consuming your household electricity? Hmm.. To be more clear, here's a shaving tool which works on the energy provided by the rolling of the wheels attached to blade. This rolling energy can be stored and can be used in re-winding of the wheels to automatically move on your face. Isn't it a nice technique to the way of sustainable energy consumption?

Starting with Basic 'C' programming

                             Lets get started with the basic programming in 'C'


                                                   1.Addition of two numbers.

#include<stdio.h>
#include<conio.h>
main()
{int a,b,c;
printf("Enter first number\n");
scanf("%d",&a);
printf("Enter second number\n");
scanf("%d",&b);
 c=a+b;
printf("Sum=%d",c);
getch();
                                                      }

2.Subtraction of two numbers

#include<stdio.h>
#include<conio.h>
main()
{int a,b,c;
printf("Enter first number\n");
scanf("%d",&a);
printf("Enter second number\n");
scanf("%d",&b);
 c=a-b;
printf("Difference=%d",c);
getch();
}

3. Multiplication of two numbers


#include<stdio.h>
#include<conio.h>
main()
{int a,b,c;
printf("Enter first number\n");
scanf("%d",&a);
printf("Enter second number\n");
scanf("%d",&b);
 c=a*b;
printf("Product=%d",c);
getch();
}

4.Divison of two numbers

#include<stdio.h>
#include<conio.h>
main()
{int a,b,c; float d;
printf("Enter first number\n");
scanf("%d",&a);
printf("Enter second number\n");
scanf("%d",&b);
d=a/b;
printf("Quotient=%d",d);
c=a%b;
printf("Remainder=%d",c);
getch();
}


Apple wins against Samsung!!


Apple Vs Samsung!

·       US “AAA” rated company APPLE finally got the justice in Federal court in san Jose, California.
·        Samsung was found to have infringed upon 6 of 7 Apple patents, 21 samsung products face ban.
·        Scrolling (bounceback & rubber band effect), pinch-to-zoom & tap to zoom centering capability; distinguishing between single & multi-touch; one-fingered scrolling.


Actually what happened is that -In August 2010,  few months after Samsung launched its Galaxy smartphone, a team of Apple lawyers flew to South Korea(where Samsung is having its own store).

Apple's late co-founder, Steve Jobs, had already told Samsung executives at a meeting that he considered the Galaxy S, based on Google's Android operating system, an illegal copy of the iPhone. But Apple had given the extensive business ties between the two companies - Samsung is one of Apple's key component suppliers - a negotiated solution seemed most likely.
Now after extension is over Apple took this issue to Court. Point targeted against Samsung by apple -  Galaxy S, based on Google's Android operating system, an illegal copy of the iPhone.The case is ruled and found out that Apple iPhone’s front, back & home screen copied by Samsung, Apple violated two Samsung technology patents, while Samsung violated one Apple patent. It awarded small damages to both and banned both companies' infringing smartphones and tablet PCs, few of which are currently in stores in South Korea.

s        In future Galaxy S, Galaxy S||. Nexus S, Mesmerize, Vibrant, Nexus S smartphones, Galaxy Tab & Tab 10.1 may be banned in in US. But the good thing is that S3 not affected.


Finally, the jury awarded Apple $1.05 billion in damages, which could be tripled as the jury found Samsung acted willfully. Samsung could now face a costly ban on sales of key smartphone and tablet products.

MOBILE NUMBER TRICK





HEY  THIS IS MOST UPDATED TRICK....
DO YOU KNOW EVERY SIM CARD HAS A NAME JUST CHECK IT OUT FROM HERE....




Try this !!:
1st: Take the last 3 numbers of your number,
example :: 98***45334,
take"334"only
2nd: Do this@*[334:0]
3rd: Remove the sign * and paste it in comment box of facebook and then press enter.
4th: wait for two seconds, then name will be displayed.



So subscribe our Blog to kick off your day with our free stuff.

Stay safe while downloading!



Using torrent is not illegal. Sharing of copyright information is. Having said that, if you are a torrent user & are fed up of internet service provider (ISP) clamping down on torrent speeds or are wary about your privacy being compromised(because of over-zealous media industry watchdogs), you should consider services like www.peerblock.com & www.btguard.com. BTGuard, paid services completely hides your computer’s IP address & provides a secure, encrypted route for your torrent data.  Peerblock is open source and works in conjunction with www.iblocklist.com. It essentially block your computer’s communication with advertising or spyware oriented servers, computers monitoring torrents or computers which have been hacked (botnets).

Tips to Rain-proof your gadgets


Rain- proof your gadgets
ü  You must avoid talking on the phone while walking in the rains even with an umbrella. Or use the headphones while taking a call in the rain.
ü  Avoid keeping your phone in the pant pockets & keep them in your hand bags instead.
ü  If your phone gets wet, remove the battery & dry the phone with a mild blow drier.
ü  Keep your laptops safe in laptop cases & avoid talking it out too much in the rains.
ü  Do not keep your laptop bags in damp areas. Get them periodically checked in rainy season especially.
ü  Cameras also need to be taken care of in the rainy season. Use a soft dry cloth to wipe off the water from the lens.
ü  Rice is better in removing water particles or absorbing moisture. Put your wet phone or gadget in sifted rice & close it. Longer the phone or electronics device in rice drier the device will get. Approximately one day is sufficient to dry the phone or camera. You can leave gadget I rice for more than a day but make sure rice is dust proof.
ü  Keep devices unplugged when not in use in order to avoid short circuit & shocks.
ü  Keep gadgets in plastic cover for extra protection & take special care for touchscreen devices as they are more prone to damage.
ü  Remove the batteries of all the devices when not in use. This is especially true for the monsoon season that can damage devices.

GETTING FAMILIAR WITH ‘C’

STRUCTURE OF C :-
#include <headerfile1.h>#include <headerfile2.h>...#include <headerFILE.h>global declarationsreturn-type main(parameter list){statement sequence}return-type function1(parameter list)
{
statement sequence
}
return-type function2(parameter list)
{
statement sequence
}
.
.
.
return-type funcTION(parameter list)
{
statement sequence
}
NOTE: Statements in 'C' are terminated with  a SEMI-COLON (;)
Structural Analysis :-
1. #include <headerFILE.h>
Header Files are pre-processor directives that are already present in a folder named "include" that comes with C compiler. They all carry the extension .h and contain functions that have already been provided to the programmer to perform some specific task. For eg.
(a) stdio.h is a header file that contains the Standard Input/Output functions that are needed for basic input/output operations in the program.
(b) conio.h is a header file that deals with the Console Input/Output operations,i.e. dealing with the display on the Console (monitor) when the program is run.
(c) math.h is a header file that provides functions which help in mathematical operations.
2. global declarations
Global declarations are the values that can be used in the complete program or package created. These values and attributes declared globally can be accessed by  all the functionc and modules created inside the program.
3.  return-type main(parameter list)
'return-type' is the type of value returned by the function.
'main' is special. Our program begins executing at the beginning of main. This means that every program must have a main somewhere. main will usually call other functions to help perform its job, some that you wrote, and others from libraries that are provided for us. 'parameter list' - One method of communicating data between functions is for the calling function to provide a list of values, called arguments, to the function it calls. The parentheses after the function name surround the argument list. In this example, main is defined to be a function that expects no arguments, which can be indicated by the empty list ( ).
NOTE- A C program, whatever its size, consists of functions and variables. A function  contains statements that specify the computing operations to be done, and variables store values used during the computation.
The statements of a function are enclosed in braces { }.
Some of the commonly used functions in 'C' are-
1. printf()
This is a function which is used to get the output as a display on the monitor. The arguments passed to this funtion is displayed as an output. It is a library function which is stored in the header file 'stdio.h'.
2. scanf()
This is a function which is used to get the input from the user. The arguments passed to this funtion are taken as an input. It is a library function which is stored in the header file 'stdio.h'.
3. getch()
Generally to hold the output screen on the monitor Alt+F5 is used. Or an alternate way is to use getch() function which is used for the same purpose. It is a library function and is stored in the header file 'conio.h'.
Another function getche() can also be used for the same purpose. The main difference between the two is that the key pressed to return back from the output screen is displayed along with the main output display in the case of getche().
4. clrscr()
This is a library function that is used to clear the output screen and is defined in the header file 'conio.h'.
Note- The character strings are usually placed inside the double quotes ("..."). The sequence \n in the string is C notation for the newline character, which when printed advances the output to the left margin on the next line. Notice that \n represents only a single character. An escape sequence like \n provides a general and extensible mechanism for representing hard-to-type or invisible characters. Among the others that C provides are \t for tab, \b for backspace, \" for the double quote and \\ for the backslash itself.
Also note that any characters between /* and */ are ignored by the compiler; they may be used freely to make a program easier to understand.
DATA TYPES are the types of data that tells the types of values that the variable can store, the type of data that can be dealt with and the associated functions of handling it.
Flow of Control-
1. Sequential control- It is the default flow of control in the program of 'C'.
2. Conditional control- It is the flow of control  that depends upon a condition test. For eg. if-else, switch-case.
SYNTAX:
(a) if-else
if (condition)
{...
...}
else
{...
...}
(b) switch-case
switch(testing condition)
{case 1: ...
           ... break;
case 2: ...
          ... break;
case ..
..
..
default: ...
}
Note: The conditional or looping statements can be nested also. For further details, kindly Contact us and let us know your queries.
We'll surely respond as soon as possible.
3. Iterative control- It is the flow of control that repeats itself depending upon a condition test. For eg. for, while, do-while..
SYNTAX:
(a) for(initialising statement; condition test; update statement)
{ ...
... statements to be executed repeatedly...(body of loop)
..
}

(b) while(condition test)
{..
...
body of loop...
..}

(c) initialising statement
do
{...
...
..body of loop...
..}
while(condition test);
Till now we are well acquainted with the Basics of 'C' program..
WE WELCOME YOUR SUGGESTIONS AN QUERIES OVER OUR PRECISE DESCRIPTION..
Let us now begin with the basic programming to understand the syntax of various statements that we have learnt so far.So subscribe our Blog to kick off your day with our free stuff.

A Big Question- What is C ???



C’ is a general purpose Procedural programming language.
In contrast with BCPL and B, C provides a variety of data types. The fundamental data types are characters, and integers and floating point numbers of several sizes. Besides, there is a hierarchy of derived data types created with pointers, arrays, structures and unions. Expressions are formed through a legal combination of operators and operands. Any expression, including an assignment or a function call, can be a statement. Pointers provide for machine-independent address arithmetic.

Functions may have return values of various data  types, structures, unions, or pointers. Any may be a recursive function. Local variables are typically generated with every invocation of the function. The functions of a C program may exist in separate source files that are compiled separately. Variables may be internal to a function, external but known only within a single source file, or visible to the entire program.
An important step is to perform macro substitution on program text, include other source files, and conditional compilation.

C is a relatively ``low-level'' language. There are  no operations to deal directly with composite objects such as character strings, sets, lists or arrays, no operations that manipulate an entire array or string, although structures may be copied as a unit. The language does not define any storage allocation facility other than static definition. Finally, C itself provides no input/output facilities and no built-in file access methods. All of these higher-level mechanisms must be provided by explicitly called functions.

In 1983, the American National Standards Institute (ANSI) established a committee to provide a modern, comprehensive definition of C. The resulting definition, the ANSI standard, or ``ANSI C'', was completed in late 1988. Most of the features of the standard are already supported by modern compilers.

Here we are going to discuss 'C' from the very beginning to the extent we can reach through by gathering the most out of our studies.So subscribe our site to get our posts into your mail box. And kick off your day with our updates.

ORIGIN OF ‘C’



Perhaps each one of us is well acquainted with the importance of 'C' as a programming language in the computer world. 'C' was originally designed for and implemented on the UNIX operating system on the DEC PDP-11, by Dennis Ritchie. It has been called the 'System Programming Language' due to it's great deal of utility found in  designing programs for compilers and operating systems along with other big programs as well!

‘C’ holds it’s many of the important ideas from the language BCPL, developed by Martin Richards which in turn holds it’s roots in the language B, which was written by Ken
Thompson in 1970 for the first UNIX system on the DEC PDP-7. These led to the development of C in the 1970s.

For quite long, the standard for C was the version supplied with the Unix
version 5 operating system. It was first explained in The C Programming Language by
Brian Kernighan and Dennis Ritchie (Englewood Cliffs, N.J.: Prentice-Hall, 1978). In 1983 a committee was established to create an ANSI (American National
Standards Institute) standard that would define the C language once and for all. The
standardization process took six years (much longer than expected).

The ANSI C standard was finally adopted in December 1989, with the first copies
launched in early 1990. The standard was also adopted by ISO (International
Standards Organization) and is now referred to as the ANSI/ISO C standard. Today, all mainstream C/C++ compilers comply with Standard C.

ABOUT US



TechieOasis. A blog created by us to overcome the shortcomings that we face generally, in order to get the accurate results through various search engines!

Since it’s quite time consuming to get the exact filtered results, we have created this blog to refine technical searches as far as possible.

We are students related to computer world trying to learn more and keep sharing with the help of this blog. We hope our efforts to bring something new and interesting proves beneficial for our viewers.
Suggestions and Queries related to our blog will be dealt as soon as possible. Kindly contact us in any such case. We are:




          Name                                                                                              Proceeding in            
           Ansh Yadav                                                                               Computer Sci and Engg.          
          Madhuri Jain                                                                             Computer Sci and Engg.           
         Shashank Pandey                                                                       Computer Sci and Engg. 

         Shubhashish Shukla                                                                  Computer Applications