Thursday 1 June 2017

[TIP] Data Recovery Tools

Ever deleted any files by mistake? Lets know what you can do to get your data back!


If your important file is deleted by mistake by you or your family member/friend, then instead of starting a Civil-war between you and your friends, thinking of getting back your files sounds a better option. We discuss some of the famous and important recovery software, so that the peace of your life remains intact.

1.   Recuva




With both free and pay editions, Recuva is an incredibly powerful tool for recovering data from Linux and Window partitions. With support for all Windows versions from XP through Windows 10, this is a great tool to bring dead data back to life.


Pros


1. It allows you to recover deleted files from the computer and other removable media
2. It restores all types of files- office documents, images, videos, etc.
3. It recovers files from memory cards
4. It has a very intuitive interface and supports more than 40 languages


Cons


It doesn't have inbuilt Help files.


2.   Pandora Recovery





With a free version for recovering data from secondary drives, and a pay version you can put on a USB key to recover an operating system drive, Pandora Recovery has a versatile offering that can bring back most data without issue.


Pros


  1. Quickly locates and recovers (when possible) deleted files.
  2. Built-in viewer displays image and text file types.
  3. Recovers NTFS attributes and Alternate Data Streams

Cons


  1. Recovers files only from NTFS-formatted disks.
  2. No support for USB drives or camera memory cards.
  3. In testing, program hung repeatedly trying to recover a specific file.


3.   PC INSPECTOR





Completely free, PC INSPECTOR File Recovery is a great recovery tool for Windows systems. It can recognize data types even when the header is missing, so you can recover from deletions, formatting, or even total volume loss.

Also free, Smart Recovery is a tool focused on recovery files from external media, like flash drives and SD cards. It’s a bit older than File Recovery, but still works great and can handle proprietary file formats.


Pros


  1. Much efficiently this superlative application recovers the lost data very fast.
  2. One more useful or helpful thing, it is available for the users with no cost.

Cons

  1. Included interface is somewhat confusing.
  2. Sometimes the tool stops to restore the files, documents, folders.


4. FreeUndelete





The name of this tool from OfficeRecovery says it all. It’s free for personal use, and it undeletes files that you have deleted, even if you SHIFT-DEL or empty the Recycle Bin. What it lacks in fancy features it more than makes up for in efficiency and simplicity.

Pros


  1. Easy to launch scans
  2. Free for individuals

Cons


  1. Did not find test files
  2. Results difficult to read


5.  Unformat




For all your external drive needs, Unformat can recover entire disks including external USB, thumb drives, and SD cards that you’ve accidentally deleted.


Pros


  1. Very easy to use
  2. Highly reliable
  3. Scan and recover entire hard drive data irrespective of circumstances

Cons


  1. Demo version can only be used to see the preview of recovered files.
  2. Licensed version is required for saving the recovered data on desired location.


Author : Prashant Pandey

Tuesday 16 May 2017

[INFO] WannaCry?

If not, then read this post to find out how to save your precious data - and tears.





The WannaCry (also called WannaCrypt or WannaCrypt0r). Malware Attack has surfaced as the worst “cyber-attack” in the recent time. It hit the news headlines when nearly 75,000 computers in over 100 countries were hit by this ransomware – a malicious computer program that spreads thorough E-mail attachments and executes a script program on the computer that encrypts all the files on that computer – including images, text files, Word documents etc. – and then a ransom amount, in Bitcoins, is asked to be paid in a time limit, in order to decrypt the data. If the user fails to pay the amount, then his/her data is encrypted forever and is not allowed to access it again.

How it all started?



The story of this ransomware starts from America’s NSA (National Security Agency), which detected a security flaw in Microsoft Windows Operating System, but never reported it to Microsoft about it. It is being said that NSA used that flaw itself to develop a malicious program, which the agency, intended to use for hosting cyber-attacks against its enemy nations. But, according to reports, the program was lost or stolen from the agency by a hacker group by the name of The Shadow Brokers, who later tried to sell this program online. They later made this program available freely on the Internet, as a "protest about the US President Donald Trump".

Although Microsoft already released a security patch for the flaw in its Windows Operating Systems earlier in March, the ransomware succeeded in affecting computers all over the world at such a large scale due to the sheer ignorance of the users for not updating their systems with latest software updates.


So, how not to “Cry”?



Computer Researchers are currently working on the methods of decrypting the encryption done by the ransomware, and also on preventing the ransomware from spreading and affecting the computers on any network, but not much success has been achieved yet by them. So, in order to prevent the attack of WannaCry, one can follow any one of the below mentioned methods:-



#1: Keep your Windows up-to-date.


The severity of this Ransomware's attack can be understood from the fact that Microsoft was forced to release updates for even Windows XP, Windows 8 and Server 2003, which it has discontinued earlier. Microsoft has already released the patch for its exploit in the Windows OS in March this year. So you can simply head to the System's update program or can also use the Microsoft's Update website to download the required updates for your system.

For more info, click here.


#2: Keep your Anti-virus up-to-date.


Another way of preventing your system and data from the attacks is by using a good Anti-virus, because most of the Anti-virus today can identify the ransomware easily.

#3: Turn-off network discovery of your computer.


If you want to make your computer more safe on a LAN or on a Public WiFi Network, then you can turn off Network Discovery of your computer, so that your computer is not visible to other computers on the same network :-

Go to Start > Control Panel > Network and Sharing Center > Change advanced sharing settings > Select the Turn off Network Discovery radio button and click Save Changes.





#4: Keep your computer’s User-Account-Control settings at max level.


The User-Account-Control is a program available in Windows OS that monitors and controls the activities of the computer programs and warns if any program tries to access any other program with different privilege level. Thus, in this way, it prevents the execution of any virus or malware on your computer.

Go to Start > Control Panel > User Accounts > User Account Control Settings.







#5: Store your important data on a separate offline storage device.





It is a good practice to keep your important files on an external storage device, so that such types of attacks have no effect on your personal data.


References :


Microsoft Blog

Microsoft Update


McAfee Blog


Kaspersky Blog


The Times of India


Cyber Swachchta Kendra - India





Author : Prashant Pandey

Saturday 9 July 2016

[TIP] Things One Need To Know About Windows 10



Introduction

Windows 10 is a historic release for Microsoft. There is so much about it that is disruptive, some in good ways and some in bad, whereas so much about it that's entirely new and unprecedented.

1. There's loads of stuff for touch, but it's different stuff

Designed to appeal to experts and novices alike, Microsoft was at pains to point out that it hasn't given up on touch with the new OS. The Charms bar remains for the moment although we expect it to die if you're using a non-touch PC. Microsoft says it wants to support touch users who have persevered with Windows 8 and "evolve" the touch UI. The task switching will no longer work on the left. So with that and the charms going, that's goodbye to most of the problem with Windows 8 - and a whole philosophy down the pan.

2. Start Menu : "I'll be Back"



As we've covered before, the e most noticeable change is the new Start Menu, which looks somewhat like the old start menu. It brings some features from the Windows 8.1 Start Screen, such as live tiles, and can be resized.

3. Task View Redefined 



Now the Windows 8 task switcher has been unceremoniously dumped, there's a new Task View in Windows 10, too, so users can switch between virtual desktops.That's because Microsoft now recognises that novice users use the taskbar rather than switching in other, cleverer, ways such as Alt+Tab which also now switches between muli-desktops.


4. Snap At A Glance

A new Snap Assist feature also helps users work out which way is best to snap apps to. You can snap windows into new screens and tile Windows - just as you've been able to since Windows 2.0 or maybe 3.0.


5. The Command Prompt enters the 21st Century



Another quite amazing feature for those of us that use it is that the command prompt is now getting keyboard shortcuts! So you will be able to paste in your commands! Hardly groundbreaking, but actually pretty exciting.


6.  Windows Explorer with Improvements



A new Home location is the new default view in Windows Explorer. There's also a Share button on the Windows Explorer taskbar (we really hope this is in the context menu, too).

7. Continuum - the special one

This is the best new thing we found out today. Continum is an on-the-fly mode for 2 in 1 devices that can automatically change mode if it detects there is suddenly no keyboard attached. So, for example, a back button appears to help you navigate the Desktop with touch if the keyboard is removed. We reckon the charms will also disappear in non-touch mode, although we've heard conflicting news about that.


8. Windows 10 Universal apps

Windows 10 will also usher in a new app model - Universal Windows apps. Windows Universal apps are the new name for Metro apps/Modern apps/Windows Store apps.  Windows 10 is able to run on all devices from phones to servers and there will be a single app store across the lot.


9. Apps float on the Desktop

The new Universal apps also work on the desktop and 'float' in their own Windows. Microsoft wants to banish the separation between the Modern UI and the Desktop. These 'modern' apps on the desktop have an icon for more options - replacing the commands that used to be in the charms on the right-hand side of the screen.


10. Windows 10 for Business and Enterprise

Microsoft says it hopes to appeal to business with this release of Windows, more so than Windows 8 ever did. Belfiore said they were "starting the dialogue with businesses today". New features are packed for the business and enterprise.


Author : Saatvik Awasthi

Sunday 1 May 2016

Apple Watch running The Ancient Windows 95


If you're willing to wait an hour for it to boot up, you can enjoy the ludicrous pleasures of running Windows 95 on an Apple Watch. Developer Nick Lee posted a video to YouTube this evening showing what it looks like once the operating system is up and running. It's slow, to say the least. But it definitely appears to be more functional than you'd expect.

As Lee points out in a blog post, the Apple Watch's specs are well above those of a typical Windows 95 computer, so it makes sense that it should be capable of running the Microsoft's old OS. Of course, there are quite a few hurdles to get past first, including the fact that Apple doesn't exactly provide a way to install new operating systems on the Watch, let alone apps that it hasn't vetted.

To get 95 running, Lee had to modify Apple's development software in "rather unorthodox ways," . That allowed him to essentially turn Windows 95 into a Watch app, which also emulates an environment for the OS to run on.




Lee also had to deal with the fact that the Apple Watch's screen really wants to turn off when it isn't in use. To deal with that, he set up a motorized tube that constantly turns the Watch's crown, preventing it from falling asleep.

The result is very slow, but impressively functional. Though it looks a bit like he's swiping around, Lee says that he altered the Watch's software to let Windows 95 track a single fingertip, allowing the mouse to be moved by tapping where he wants it to go. You can read more on how it was done in Lee's post.


Author : Anushk Keshri Rastogi

Source : click here


Monday 11 April 2016

[INFO] Seven People around the Globe have Keys to reboot The Internet in the event of a Catastrophe



In a nondescript industrial estate in El Segundo, a boxy suburb in south-west Los Angeles just a mile or two from LAX international airport, 20 people wait in a windowless canteen for a ceremony to begin. Outside, the sun is shining on an unseasonably warm February day; inside, the only light comes from the glare of halogen bulbs.

There is a strange mix of accents – predominantly American, but smatterings of Swedish, Russian, Spanish and Portuguese can be heard around the room, as men and women (but mostly men) chat over pepperoni pizza and 75-cent vending machine soda. In the corner, an Asteroids arcade machine blares out tinny music and flashing lights.

It might be a fairly typical office scene, were it not for the extraordinary security procedures that everyone in this room has had to complete just to get here, the sort of measures normally reserved for nuclear launch codes or presidential visits. The reason we are all here sounds like the stuff of science fiction, or the plot of a new Tom Cruise franchise: the ceremony we are about to witness sees the coming together of a group of people, from all over the world, who each hold a key to the internet. Together, their keys create a master key, which in turn controls one of the central security measures at the core of the web. Rumours about the power of these keyholders abound: could their key switch off the internet? Or, if someone somehow managed to bring the whole system down, could they turn it on again?

The keyholders have been meeting four times a year, twice on the east coast of the US and twice here on the west, since 2010. Gaining access to their inner sanctum isn't easy, a select group of security experts from around the world. All have long backgrounds in internet security and work for various international institutions. They were chosen for their geographical spread as well as their experience – no one country is allowed to have too many keyholders. They travel to the ceremony at their own, or their employer's, expense.


What these men and women control is the system at the heart of the web: the domain name system, or DNS. This is the internet's version of a telephone directory – a series of registers linking web addresses to a series of numbers, called IP addresses. Without these addresses, you would need to know a long sequence of numbers for every site you wanted to visit.



The master key is part of a new global effort to make the whole domain name system secure and the internet safer: every time the keyholders meet, they are verifying that each entry in these online "phone books" is authentic. This prevents a proliferation of fake web addresses which could lead people to malicious sites, used to hack computers or steal credit card details.

The east and west coast ceremonies each have seven keyholders, with a further seven people around the world who could access a last-resort measure to reconstruct the system if something calamitous were to happen. Each of the 14 primary keyholders owns a traditional metal key to a safety deposit box, which in turn contains a smartcard, which in turn activates a machine that creates a new master key. The backup keyholders have something a bit different: smartcards that contain a fragment of code needed to build a replacement key-generating machine. Once a year, these shadow holders send the organisation that runs the system – the Internet Corporation for Assigned Names and Numbers (Icann) – a photograph of themselves with that day's newspaper and their key, to verify that all is well.

The fact that the US-based, not-for-profit organisation Icann – rather than a government or an international body – has one of the biggest jobs in maintaining global internet security has inevitably come in for criticism. Today's occasionally over-the-top ceremony (streamed live on Icann's website) is intended to prove how seriously they are taking this responsibility. It's one part The Matrix (the tech and security stuff) to two parts The Office (pretty much everything else).

For starters: to get to the canteen, you have to walk through a door that requires a pin code, a smartcard and a biometric hand scan. This takes you into a "mantrap", a small room in which only one door at a time can ever be open. Another sequence of smartcards, handprints and codes opens the exit. Now you're in the break room.


Already, not everything has gone entirely to plan. Leaning next to the Atari arcade machine, ex-state department official Rick Lamb, smartly suited and wearing black-rimmed glasses (he admits he's dressed up for the occasion), is telling someone that one of the on-site guards had asked him out loud, "And your security pin is 9925, yes?" "Well, it was…" he says, with an eye-roll. Looking in our direction, he says it's already been changed.



Lamb is now a senior programme manager for Icann, helping to roll out the new, secure system for verifying the web. This is happening fast, but it is not yet fully in play. If the master key were lost or stolen today, the consequences might not be calamitous: some users would receive security warnings, some networks would have problems, but not much more. But once everyone has moved to the new, more secure system (this is expected in the next three to five years), the effects of losing or damaging the key would be far graver. While every server would still be there, nothing would connect: it would all register as untrustworthy. The whole system, the backbone of the internet, would need to be rebuilt over weeks or months. What would happen if an intelligence agency or hacker – the NSA or Syrian Electronic Army, say – got hold of a copy of the master key? It's possible they could redirect specific targets to fake websites designed to exploit their computers – although Icann and the keyholders say this is unlikely.

Standing in the break room next to Lamb is Dmitry Burkov, one of the keyholders, a brusque and heavy-set Russian security expert on the boards of several internet NGOs, who has flown in from Moscow for the ceremony. "The key issue with internet governance is always trust," he says. "No matter what the forum, it always comes down to trust." Given the tensions between Russia and the US, and Russia's calls for new organisations to be put in charge of the internet, does he have faith in this current system? He gestures to the room at large: "They're the best part of Icann." I take it he means he likes these people, and not the wider organisation, but he won't be drawn further.

It's time to move to the ceremony room itself, which has been cleared for the most sensitive classified information. No electrical signals can come in or out. Building security guards are barred, as are cleaners. To make sure the room looks decent for visitors, an east coast keyholder, Anne-Marie Eklund Löwinder of Sweden, has been in the day before to vacuum with a $20 dustbuster.


We're about to begin a detailed, tightly scripted series of more than 100 actions, all recorded to the minute using the GMT time zone for consistency. These steps are a strange mix of high-security measures lifted straight from a thriller (keycards, safe combinations, secure cages), coupled with more mundane technical details – a bit of trouble setting up a printer – and occasional bouts of farce. In short, much like the internet itself.



As we step into the ceremony room, 16 men and four women, it is just after lunchtime in LA and 21.14 GMT. As well as the keyholders, there are several witnesses here to make sure no one can find some sneaky back door into the internet. Some are security experts, others are laypeople, two are auditors from PricewaterhouseCoopers (with global online trade currently well in excess of $1tn, the key has a serious role to play in business security). Lamb uses an advanced iris scanner to let us all in.

"Please centre your eyes," the tinny automated voice tells him. "Please come a little closer to the camera… Sorry, we cannot confirm your identity."
Lamb sighs and tries again.
"Thank you, your identity has been verified."

We file into a space that resembles a doctor's waiting room: two rows of bolted-down metal seats facing a desk. Less like a doctor's waiting room are the networks of cameras live-streaming to Icann's website. At one side of the room is a cage containing two high-security safes.

Francisco Arias, Icann's director of technical services, acts as today's administrator. It is his first time, and his eyes regularly flick to the script. To start with, things go according to plan. Arias and the four keyholders (the ceremony requires a minimum of three, not all seven) enter the secure cage to retrieve their smartcards, held in tamper-evident bags. Middle-aged men wearing checked shirts and jeans, they are Portuguese keyholder João Damas, based in Spain; American Edward Lewis, who works for an internet and security analytics firm; and Uruguayan Carlos Martinez, who works for Lacnic, the internet registry for Latin America and the Caribbean.

All but one of the 21 keyholders has been with the organisation since the very first ceremony. The initial selection process was surprisingly low-key: there was an advertisement on Icann's site, which generated just 40 applications for 21 positions. Since then, only one keyholder has resigned: Vint Cerf, one of the fathers of the internet, now in his 70s and employed as "chief internet evangelist" by Google. At the very first key ceremony, in Culpeper, Virginia, Cerf told the room that the principle of one master key lying at the core of networks was a major milestone. "More has happened here today than meets the eye," he said then. "I would predict that… in the long run this hierarchical structure of trust will be applied to a number of other functions that require strong authentication." But Cerf struggled with the travel commitment and dropped his keyholder duties.


At 21.29, things go awry. A security controller slams the door of the safe shut, triggering a seismic sensor, which in turn triggers automatic door locks. The ceremony administrator and the keyholders are all locked in an 8ft square cage. Six minutes of quiet panic go by before they hit on a solution: trigger an alarm and an evacuation. Sirens blare and everyone piles out to mill around in the corridor until we can get back to the 100-point script. Every deviation has to be noted on an official record, which everyone present must read and sign off at a later point. Meanwhile, we use the downtime to snack: people rip open a few bags of Oreo biscuits and Cheez-Its.



Both the US commerce department and the Department of Homeland Security take a close interest, to differing degrees, in Icann's operations. In the wake of the ongoing revelations of NSA spying, and of undermined internet security, this does not sit well with many of Icann's overseas partners. Some, including Russia and Brazil – whose president has made such demands very public – are calling for a complete overhaul of how the internet is run, suggesting it should be put under UN auspices.

The question of who put Icann in charge is hotly contested. Lamb argues that "it's the online community; it's the people who've put Icann in charge". Eklund Löwinder, the Swedish keyholder who vacuumed the day before, puts it more bluntly. "Well, mainly, it was the US Department of Commerce," she says. The European Commission wants changes to this system, though it still expresses its faith in Icann; the EU recently called for a "clear timeline for the globalisation of Icann".

Eklund Löwinder explains that while the security might occasionally seem ridiculous, every step is very important when it comes to maintaining trust. "It's a system based on backups of backups, layers and layers of security," she says, her dangly cat earrings swinging. "Of course it is a bit romantic and thrilling to be a part of this, because I am a romantic by heart. I have to admit I love the internet. It's a piece of engineering art you have to admire. And to be able to contribute to make this a safer place makes me feel good."

Where does she keep her key? She admits she has two copies, in case she loses one; one of them never leaves a bank deposit box. The other, which she uses twice a year in the ceremonies on the east coast, is attached to a long metal chain. Most of the time it sits in a wooden puzzle box, with a hidden lock, created by her furniture designer son.

By 22.09 (we are all sticking to GMT) the ceremony is back on and everyone's returning to the script. The high-security machine that will generate the master key is set up. Once activated by the smartcards, this will produce a lengthy cryptographic code. If dropped, or even knocked too hard, the machine will self-destruct.

Now that everything has been removed from the safes, we move to act two of the ceremony: the key signing. The first step would be familiar to anyone – getting the laptop plugged in and booting it up – but some witnesses watch like hawks, logging and initialising each step. Others are beginning to flag, checking their watches or having whispered conversations with their neighbours.

At 22.40, a series of USB drives is set up, one of which will be used to load the signed key on to the live internet at the end of the ceremony: this is when the code is uploaded to the servers that dictate who controls .com, .net, .co.uk and more.


The output of the previous ceremony is checked, to make sure people are working off the same key – a process that requires Arias to read aloud a 64-character code. Everyone nods as they verify it against their sheets.



At 22.48 the high-security machine – a small, plain grey box with a keypad and card slot in front – is wired up. Each keyholder hands over his individual smartcard. Then, at 22.59, nearly two hours after the ceremony began, it's show time. Alejandro Bolivar, an American expert from Verisign, the security company that administers the "root zone" of the domain name system, steps forward to read out a nonsense sequence of words generated by the previous key. He begins: "Flatfoot warranty brickyard Camelot…" and continues for nearly a minute before concluding, "blackjack vagabond." The sequence corresponds with the witnesses' notes, so they nod and sign their script. A short line of code is typed into the laptop at 23.02, and seconds later the new key is signed, to a smattering of applause.

After a 20-minute sequence of disconnecting secure machines and powering down the laptop, a USB stick is handed to Tomofumi Okubo, another Icann staffer. Deliberately or otherwise, Okubo makes a slight bow as he is passed the stick holding the "signed" digital key. Later Okubo will transmit the key on a secure channel to Verisign and this signed key will be made live across the internet. It will take effect for three months, from 1 April (yes, really). After that, the key will expire and error messages will start to appear across the internet.

Given how high the stakes are, and the number of possible targets, does Okubo think the system is trustworthy? "I think so," he says. "You'd have to compromise a lot of people…" He trails off.

Does this often slightly bizarre ceremony work? Are the security precautions integral, or just for show? Bruce Schneier, an American cryptologist and security expert who worked with Glenn Greenwald and the Guardian to analyse some of the files leaked by Edward Snowden, suggests it's a little of both. "A lot of it is necessary, and some of it is necessary theatre," he concedes. "This process is both technical and political, which makes it extra complicated… I think the system is well designed." As to whether the system will survive in the aftermath of the NSA revelations, Schneier thinks the jury is still out: "That, we don't know."

Back in the ceremony room, the four keyholders are once again locked in a cage with the safes holding their smartcards, this time returning them for future use. It is 23.32 on the clock and each is solemnly holding up their keycard, in a new tamper-evident bag, for the cameras to witness before returning it to the safe. Not everyone present is entirely gripped. "It's like a combination of church and a baseball game and I don't know what else," says Icann PR Lynn Lipinski. "I'm getting sleepy."

At 00.06, five hours after we all arrived, it's time to shut off the live-streaming cameras. Lamb checks in to see how many people have been following the ceremony.

The system admin calls back: "We peaked at 12."

We file out, job done.

"Wait," Okubo says. "One question before we go… Can I ask who's coming for dinner?"


There's a show of hands and, with the web secure for another three months, the keyholders to the internet file out into the LA sunshine.

Author : Anushk Keshri Rastogi

Source: Click Here


Thursday 7 April 2016

[TIP] World Health Day : Best Fitness Gadgets in the Market to help you stay fit !


Technology gadgets can be a good motivator to help you get back in shape or help you stay as healthy as ever. Take a look at some of our suggestions.





We aren’t mentioning the usual suspects that everyone, and even your granny knows about – stuff like the Fitbit, Mi Band and a zillion other smartwatches. If you’re looking to hop back on the wagon and try and regain control of your health and fitness, look no further than these devices mentioned below. It’s time to huff and puff your way to a more improved you, thanks to these gadgets and their bundled services.

1) Garmin VivoFit 3: This smart wristband is unanimously regarded as the best in the business of tracking your fitness, combined with its ease of use, abundant features and above-average performance. It can count your steps, calories expended, sets goals and tracks heart rate; it’s waterproof and lasts for a year on a single battery charge. It syncs data to the cloud wirelessly without interfacing through a PC. If you only want to buy one device – and one device only – to set your misshaped health life in order, just close your eyes and purchase the VivoFit.



2) Qardio: This San Francisco-based company’s concentrating on two things, tracking your blood pressure and heart, and it has specialty wearable devices for both these functions. Qardio Arm is about the size of spectacles box, which can be tucked away in a suit. More importantly it’s Apple-esque design makes the device accessible and easy to use -- just strap it on and monitor your BP on an iOS device. Similarly, the Qardio Core is a strap-on that goes around your chest and promises to give medical-grade cardiovascular monitoring technology, with remote monitoring features.



3) Adidas MiCoach Smart Run: As Nike’s reportedly killing its Fuelband, apparel enthusiasts can still bank on Adidas’ MiCoach Smart Run for your routine jogging or sprinting routine. It’s a personal coach on your wrist, and the device packs in a ton of features including and not limited to real-time cardio coaching with training plans created by elite coaches; workout review; coaching delivered via visual messages; fully integrated strap-free heart-rate sensor; GPS-based speed, distance, cadence and route; and then some. This will go well with that pair of Adidas running shoes you have.



4) Withings Smart Body Analyzer: In the digital age, a traditional weighing scale just wouldn’t cut it. Weight watchers, behold what’s popularly being dubbed as the best smart digital scale ever. This not only tracks your weight, but also heart rate, body fat and general well being, helping you stay on track of your fitness goals (indirectly). Combine all that with an improved app that’s easy to consume and handy, and the Smart Body Analyzer becomes the unbeatable choice of more advanced data metrics to help you lose weight.



5) Basis B1: Recently acquired by Intel, Basis’ B1 is a wristband that is a little bit different from all the rest, as it puts a large focus on inculcating good, healthy habits rather than just do mundane tracking (which it also does, by the way). If you love data, and lots of it, you’re gonna love this device. Not only does it track and measure your Heart Beat, Steps, and Calories but also Skin Temperature, Perspiration level, Sleep Quality and Sleep Time. Faced with all this data, you are left with no choice but to make positive life-improving decisions that lead to better fitness.




6) Valencell Performtek iriverON: This company essentially has a truckload of patents in sensor technology geared towards monitoring fitness and accurately tracking real-time health parameters, and it claims to be the best in the business. It’s iriverON headset is one of a kind tapping into the unique physiology of the ear, retrieving more accurate health and fitness metrics with earbuds than with other devices, especially when moving around and/or engaging in physical activity. Sensor data can be viewed live through applications on their iPhone, Android phones, or other smartphone devices.




7) Interaxon Muse Headband: This product here is hard to believe isn’t sci-fi. This brain sensing headband from Interaxon, Muse promises to truly unlock the power of your thought and mind and use it for the better. It detects your brain’s activity at every moment and you can track it through a smartphone or tablet device. Where a lot of wearable devices are focusing heavily towards keeping the body in shape, here’s a breath of fresh air that actually tries to keep the mind healthy as well.




8) Sensoria Fitness Sock - A combination of e-textile, a snap-on anklet and mobile apps to track your workout, the Sensoria Fitness Sock makes for a true wearable tech product in the truest sense of the word. It’s made for fitness-conscious folks, and analyzes your foot to keep you fit as a fiddle. Filled with sensors, sock can tell you if you’ve been sitting idle for too long and prompt you to go for a walk -- useful in a sedentary, office environment -- and also offers some advanced features like stride gauge, foot landing analyzer, cadence meter, track pressure and impact points on your foot, etc., and retrieve all that data through an app.



These are a few gadgets we feel are crucial to your health ! Stay Healthy, Stay Fit and learn more about technology with The Tech Wizards !

Author : Anushk Keshri Rastogi

Source : click here







Wednesday 16 March 2016

[Tip] BEST BUDGET PC GAMING ACCESSORIES



 Your PC is a project, and building and maintaining it takes special tools. Aside from the obvious holy quadripartite of PC gear (mouse, keyboard, headset, monitor), this is the stuff you should keep handy for building, cleaning, and keeping your PC performing at its best.

My checklist for PC gaming accessories is rather simple
  • Comfortable keyboard and mouse with proper, stable with drivers installed at best.
  • Mouse pad rated/advertised for at least optical mice - no need to pay extra for "gaming mats",
  • A good set of game-pads for older/emulation stuff. Other than that, to have a PS2-to-USB adapter which allows me to use a wired PS2 controller as a game-pad, is not a bad choice.
  • A comfortable chair. When you're in it for the long haul, your back will thank you to have a comfortable place to sit.
  • A set of nice headphones will let you enjoy to the fullest.

 Keyboard 

How's a gamer to choose? Don't worry, we know what's the best route. In the slides that follow, you'll find our recommendations for best-in-class keyboards, ranging from gaming on the cheap to no expense spared.
There are a lot of features commonly associated with gaming keyboards that are actually quite useful for everyday tasks or even work. Macros can be extremely handy for performing multiple actions in games with one keystroke, or even for everyday tasks that require multiple repetitive keystrokes. Also having multiple user profiles allows you to keep your work macros separate from your gaming ones. 
N-Key Roll Over is also a popular feature, which essentially means that a certain amount of keys can be simultaneously pressed and registered. This is extremely useful around the WASD cluster. The last thing you want is for important skills not to register because too many keys were pressed simultaneously. 

Finally, mechanical keyboards are all the rage now, and for good reason. Simply put, they're much more reliable than most standard keyboards, as each key resides atop a mechanical switch as opposed to a rubber dome (which have a tendency to break down pretty quickly over time). Best of all, mechanical boards come in multiple flavors that cater towards specific preferences. Here's a breakdown on the most common mechanical switch types if you're considering a mechanical keyboard: 

Blue: Tactile, Non-linear, Clicky, 50g Actuation
Great for typing. Loud (not ideal if sound is an issue). Double tapping can be cumbersome.

Brown: Tactile, Non-linear, 45g Actuation
The middle-ground of mechanical switches. Generally recommended for most games.

Black: Linear, Non-tactile, 60g Actuation
Noticeably stiffer than the rest in order to prevent accidental keystrokes. Generally preferred for FPS games. 

Red: Linear, Non-tactile, 45g Actuation
Similar to Browns, but without tactile feedback.

Pricing for most mechanical keyboards can be intimidating. Most start at over $100, which in itself makes the Razer BlackWidow Tournament Edition an easy choice, especially for someone looking to purchase their first mechanical keyboard. This particular model doesn’t have a keypad, the lack of which is often denoted by the term "tenkeyless." Gamers who use extra large mouse mats may find tenkeyless options to be a saving grace for desk space. The Tournament Edition may be small, but it certainly doesn't slack in features. All of the keys can be programmed, and macros can be recorded on the fly with up to 20 software profiles giving you enough room to create profiles for each of your favorite games and then some. It is also available in two flavors: Cherry MX Blue or Cherry MX Brown in Stealth Edition, depending on your mechanical switch preference. There is also a full 104 key layout version available for Mac users at the same price.
  

Mouse 

  Most gaming mice come with anywhere from five to ten programmable buttons (which you can assign to specific functions such as sprinting, crouching or reloading), while an MMO-style mouse might cram 20 or more onto its chassis. These can give you a leg up on the competition, when used correctly.
Many also offer various backlighting options to make them more attractive to look at. Occasionally a mouse comes with removable weights, allowing you to make the mouse heavier or lighter until you’ve found your “perfect” weight.
Wired mice vs wireless is another consideration you might have, but our view is that wired is best. The breadth of choice is much bigger if you opt for a wire, and you don't have to faff around with replacing batteries. Some gamers also say they can notice a lag with some wireless mice.
Whatever you're after, whether you're a twitch-gaming fanatic looking for the perfect precision headshots or a MOBA gamer trying to maximise your DPS, there's a mouse that'll suit your needs, and after using one, you'll never go back.

 SteelSeries Rival ( £53)

 For a price of around £53, the  SteelSeries Rival is a contender for the best gaming mouse on a budget. Why? Even though when compared to other gaming mice, the Rival looks a bit ‘basic’, it’s far from it under the hood. It features an advanced PMW3310 optical sensor that is said to offer zero hardware acceleration and true 1:1 tracking, enabling precise movement – and you can tell the difference instantly. Even at higher sensitivities, the SteelSeries Rival is extremely accurate and has enabled us to react quicker than we’ve been able to in the past. Its adjustable CPI is amazing, and offers adjustments from 50 to 6500, enabling gamers to find the perfect cursor sensitivity for their style of gaming. The best part is that you don’t have to settle on one setting – there’s a button directly beneath the scroll wheel that allows you to switch between various CPI profiles for different situations. SteelSeries Engine 3 enables gamers to access various Rival customisation settings, including programmable buttons, polling rate, angle snapping and acceleration and deceleration speed.


DXRacer FE11/NI Black Indigo Formula Series

 
The DXRacer FE11/NI Black Indigo Formula Series is a racing-style bucket gaming chair that features ergonomic and lumbar support. This stylish chair is priced at $299. Features:
  • Ergonomic design - bonus headrest & lumbar support cushion
  • Extra high backrest supporting neck & spine
  • Flexible, adjustable seat back
  • Breathable material: Smooth PU vinyl cover & strong mesh
  • Soft armrests with adjustable pieces for shoulders & wrists
  • Heavy duty aluminum base with footrests & tilt

Headphones

These days, if you want to get the full gaming experience, you’re going to need a headset. While it’s possible to use a separated combo of headphones and microphone – which may actually be preferable in some cases, which we’ll explore later – the convenience of a two-in-one headset is hard to pass up.
But top-notch gaming headset will put a dent in your wallet. If you need utmost quality and have a few hundred dollars to spend, consider browsing through what Sennheiser, SteelSeries, and Razer can offer. On the other hand, if you’re willing to forego some quality in order to save money, you’ll want to look elsewhere. Let’s say your budget is capped at $25. What’s available in that range? The pickings won’t be amazing, but you may be surprised by how much that can buy.

Logitech H390 Clear-chat Headset ($25)

budget-gaming-headsets-logitech-clearchatLogitech is one of the most reliable brands when it comes to affordable computer peripherals. It’s not uncommon to hear about Logitech’s mice, keyboards, and headsets lasting for five to ten years without any issues. I can personally attest to it as well.
So it’s mind-blowing that their products are sold at such low price points. This Clear Chat headset is only $25, yet it comes with a noise-cancelling microphone with inline controls for volume and muting. The design is sleek, the headphone pads are comfortable, and the reviews are stellar.


Author : Saatvik Awasthi