Techie Inspire - The Technology Blog http://www.techieinspire.com Sat, 05 Jul 2014 19:43:13 +0000 en-US hourly 1 http://wordpress.org/?v=3.9.1 APN Settings 3G/4G/MMS For All Operator Networks in USA http://www.techieinspire.com/apn-settings-3g4gmms-operator-networks-usa/ http://www.techieinspire.com/apn-settings-3g4gmms-operator-networks-usa/#comments Sat, 05 Jul 2014 19:32:22 +0000 http://www.techieinspire.com/?p=6164 To connect mobile or devices to Internet, you need to configure GPRS/Internet /APN settings on your device before you make use of their Internet services. Almost many mobile operators/carriers today in USA automatically send Internet settings directly to your phones/devices and also get installed automatically on new devices. However, in some cases you might not be so lucky that you receive settings automatically. In such situation, you can simply manually configure your settings using the below listed settings for your respected Mobile Operators.

Since, most mobile operator keep changing their proxy or access point, we are trying to keep the below data as updated as possible. In case the below settings are not correct, please do let us know.

APN Settings USA

 

* ALL APN SETTINGS ARE UPDATED AS ON JULY 2014

Verizon Wireless

The below setting will configure your device to access Internet 3G/4G /MMS and other services on your mobiles/devices.

Manual Verizon APN GPRS/3G/4G/MMS Settings

Name: Verizon
APN: internet or vzwinternet
Proxy: <Leave in Blank>
Port: <Leave in Blank>
Username: <Leave in Blank>
Password: <Leave in Blank>
Server: <Leave in Blank>
MMSC: http://mms.vtext.com/servlets/mms
MMS Proxy: <Leave in Blank>
MMS Port: 80
MCC: 310
MNC: 012
Authentication type: <Leave in Blank>
APN type: internet or mms or default

 

AT&T

The below setting will configure your device to access Internet  3G/4G/MMS and other services on your mobiles/devices.

Manual AT&T APN GPRS/3G/MMS Settings

Name: ATT
APN: wap.cingular
Proxy: <Leave in Blank>
Port: <Leave in Blank>
Username: wap@cingulargprs.com
Password: cingular1
Server: <Leave in Blank>
MMSC: http://mmsc.cingular.com
MMS Proxy: wireless.cingular.com
MMS Port: 80
MCC: 310
MNC: 410
Authentication type: <Leave in Blank>
APN type: default,mms

 

If you have a 4G phone/device then configure below settings to enable 4G connection.

Name: ATT HSPA+
APN: phone
Proxy: <Leave in Blank>
Port: <Leave in Blank>
Username: <Leave in Blank>
Password: <Leave in Blank>
Server: <Leave in Blank>
MMSC: http://mmsc.mobile.att.net
MMS Proxy: proxy.mobile.att.net
MMS Port: 80
MCC: 310
MNC: 410
Authentication type: <Leave in Blank>
APN type: default,mms

 

Sprint

The below setting will configure your device to access Internet 3G/4G/MMS and other services on your mobiles/devices.

Manual Sprint APN GPRS/3G/4G/Settings

Name: Sprint Internet
APN: cinet.spcs
Proxy: <Leave in Blank>
Port: <Leave in Blank>
Username: <Leave in Blank>
Password: <Leave in Blank>
Server: <Leave in Blank>
MMSC: <Leave in Blank>
MMS Proxy: 68.28.31.7
MMS Port: 80
MCC: 234
MNC: 15
Authentication type:  
APN type: default

 

Manual Sprint APN MMS Settings

Name: Sprint MMS
APN: cinet.spcs
Proxy: <Leave in Blank>
Port: <Leave in Blank>
Username: <Leave in Blank>
Password: <Leave in Blank>
Server: <Leave in Blank>
MMSC: http://mms.sprintpcs.com/servlets/mms
MMS Proxy: 68.28.31.7
MMS Port: 80
MCC: 310
MNC: 120
Authentication type: <Leave in Blank>
APN type: mms

 

T-Mobile US

The below setting will configure your device to access Internet 3G/4G/MMS and other services on your mobiles/devices.

Manual T-Mobile APN GPRS/3G/4G/Settings

Name: T-MOBILE
APN: epc.tmobile.com (for LTE device – fast.t-mobile.com)
Proxy: <Leave in Blank>
Port: <Leave in Blank>
Username: <Leave in Blank>
Password: <Leave in Blank>
Server: <Leave in Blank>
MMSC: http://mms.msg.eng.t-mobile.com/mms/wapenc
MMS Proxy: 68.28.31.7
MMS Port: <Leave in Blank>
MCC: 310
MNC: 260
Authentication type: <Leave in Blank>
APN type: default,supl,mms

 

US Cellular

The below setting will configure your device to access Internet 3G/4G/MMS and other services on your mobiles/devices.

Manual T-Mobile APN GPRS/3G/4G/MMS Settings

Name: USCC
APN: internet
Proxy: <Leave in Blank>
Port: 80
Username: yourMSID@uscc.net
Password: yourMSID
Server: wap.voicestream.com
MMSC: http://mmsc1.uscc.net/mmsc/MMS
MMS Proxy: <Leave in Blank>
MMS Port: 80
MCC: 310
MNC: 120
Authentication type: <Leave in Blank>
APN type: PAP or CHAP

 

To get latest updates on your mail, please subscribe to Techie inspire or Enter Your E-mail Id to receive our mail updates.

]]>
http://www.techieinspire.com/apn-settings-3g4gmms-operator-networks-usa/feed/ 0
How to Download Movies Subtitles Automatically http://www.techieinspire.com/download-movies-subtitles-automatically/ http://www.techieinspire.com/download-movies-subtitles-automatically/#comments Tue, 13 May 2014 06:19:46 +0000 http://www.techieinspire.com/?p=6154 Many people find trouble in understanding some words or statements in the movies/videos, and so it becomes very difficult to understand the movie or any video completely. Especially, when watching any foreign language based films/movies, then subtitle come very handy in understanding the movie and language. Also many of us are keen to learn new words and improve their vocabulary. So we usually download the subtitles from the Internet. There are many sites to get the subtitles for any movie or video.

Sometimes it becomes very tedious job to search and get the correct subtitle. To simplify this task, there is a Sublight app available which is a free application for all Windows. The app supports any type of video irrespective of what is the extension or codec of the particular file. The app has a simple user interface and is easy to use. You have access to millions of subtitles in 46 languages. The best part of this app is that it present with the list of subtitles, choose the subtitle and the subtitle gets placed into the folder of the movie and renamed automatically accordingly to the name of the movie.

Follow the steps given below to download movies subtitles automatically using Sublight:

1. Go to http://www.sublight.me/download site, download and install the application on your respective OS. Once you install the app, you will see the new shortcut icon on your desktop.

2. Open the app and drag and drop the video into the “drag and drop video file here” search box or you can manually search for the title of the movie or the video in the search box besides it.

Download Movies Subtitles

3. Once you drop the file on the app, it will search automatically for the correct subtitles. You will see many records of that particular subtitle with the ratings provided to that particular subtitle by users. You can download the subtitle by double clicking on it from the list as per your choice and the subtitle file will be saved in the movie or video folder. The app also names it exactly so when you play the video it will get loaded automatically. If the video doesn’t have a correct name, the app will analyze the contents of the video file and the subtitles will still work fine.

image

Once subtitle is downloaded and placed in the movie folder, it will automatically open movie with your default player. You should be able to see subtitle displaying on the player as shown below. However, incase subtitle you selected doesn’t seem to be in Sync with movie audio then try different subtitle.

Subtitle on VLC Player

The Sublight app has also some advanced features. You can use the “batch mode” which can automatically scan your predefined folders on your disk and download subtitles for you.

Download subtitles automatically in batch

]]>
http://www.techieinspire.com/download-movies-subtitles-automatically/feed/ 0
[Infographic] The Tablet Race: The iPad vs. the Rest http://www.techieinspire.com/infographic-tablet-race-ipad-rest/ http://www.techieinspire.com/infographic-tablet-race-ipad-rest/#comments Sat, 01 Mar 2014 08:29:34 +0000 http://www.techieinspire.com/?p=6132 An interesting Infographic by bestchoicereviews.org that has performed an unusual comparison between iPad vs other tablets that exhibits how popular tablets are among people, web traffic generated by tablets and some pros and cons for Apple and Android Tablets. It also shows the usage of tablet in different places at work.

Infographic The Tablet Race

]]>
http://www.techieinspire.com/infographic-tablet-race-ipad-rest/feed/ 0
How Encryption Works in Cloud Computing http://www.techieinspire.com/encryption-works-cloud-computing/ http://www.techieinspire.com/encryption-works-cloud-computing/#comments Sat, 25 Jan 2014 16:31:04 +0000 http://www.techieinspire.com/?p=6117 How Encryption Works in Cloud ComputingWhen moving business data into the cloud, many organizations are concerned about the issue of security. When data is placed onto remote servers, it’s natural to feel anxious about unauthorized access, particularly in a business context.

But once your data is stored on a cloud server; it’s protected from hacking and unauthorized access. And when you entrust your data security to reputed Data Security Firm, you are benefited from years of expertise and best practice in security methods and techniques.

The Basics of Cloud Encryption

In the cloud, all data is encrypted using encryption keys. A 128-bit or 256-bit key is common. Either would take many millions of years to decrypt using today’s most powerful computers, so users rarely need to concern themselves with this kind of security threat.
So if encryption is so secure, why worry? The more common threat comes from unauthorized access via brute force attacks or deception, such as phishing emails. But experienced cloud providers are used to dealing with cyber criminals, malware and other data risks. That’s why so many companies invest in cloud computing; this way, they can open up access to authorized users in the cloud while keeping intruders at bay.

Additional Security Methods In the Cloud

In addition to encryption, cloud computing involves the use of additional security methods. These may include:

  • Proactive system monitoring in the cloud coupled with early threat detection.
  • Two-factor authentication and other dynamic access controls.
  • Practicing good password etiquette from the data center to the end user.
  • Encrypting file names and metadata as well as the contents of the files.
  • Encouraging users to be vigilant, particularly when presented with suspicious emails.

Can the Cloud Improve Security?

There are numerous cases where physical devices have been lost or stolen. This is a security concern for innocent individuals whose details are stored on the device. Moreover, massive financial penalties can be levied when this happens.
Clearly storing unencrypted data on a device is a considerable risk to security and should never be considered.
This is a great example of a scenario where the cloud enhances security – it does not weaken it. By changing the culture of the workplace, your business data can be stored on a network storage device, secured with military-grade encryption and stored behind layers of security without being made inaccessible to the people who need it most. With the cloud, you can ensure data need not to be put at risk.

If you’re looking for data security solutions, make sure to work only with accredited, experienced and trustworthy companies (Dell could be a good option). Your data is one of the most important assets of your business and should not be entrusted without proper research and smart decision-making.

Author Details:

Written By Ian Clatworthy

Email: Ian_Clatworthy@Dell.com

Twitter: BearatDell

]]>
http://www.techieinspire.com/encryption-works-cloud-computing/feed/ 0
What is SSL and Do I Need it For My Website? http://www.techieinspire.com/ssl-website/ http://www.techieinspire.com/ssl-website/#comments Mon, 13 Jan 2014 20:34:51 +0000 http://www.techieinspire.com/?p=6081 SSLFirstly, let’s define what SSL is. SSL stands for Secure Sockets Layer and is an encryption technology developed by Netscape to counter the growing problem of identity theft, which can see criminals eavesdrop, tamper with data or forge messages. It has become a synonym for safe shopping for many consumers. Many websites today say they wouldn’t and couldn’t be without an SSL certificate in today’s world, but not all websites have the same needs as others. Below you will find a few pointers to help you decide if it’s an investment you should make.

To secure or not to secure, that is the question

Not every website requires an SSL certificate; it really depends on the kind of website you have and the degree of sensitivity of the information being transmitted. For a website that doesn’t ask for any personal information or doesn’t ask users to upload personal files, it is perhaps not advisable to make the investment; however, most experts say that whenever any personal information is asked for, SSL gives your online customers the confidence to know they are being protected. Especially when purchases are being made, an SSL certificate is usually a must otherwise you will find yourself severely limiting your audience. If your website has an online sign in facility, asks for personal details or the email address and password of your customers SSL is also advisable.

Shoppers are aware of the risks

The threat of identity theft is well documented and so shoppers are increasingly looking for a secure site to make their payment. Research has shown that around two-thirds of shoppers who decide not to make a purchase at the last moment do so because of a lack of security. Because it is so easy to see which online stores have an SSL certificate and which don’t, many online shoppers are immediately looking for the reassuring padlock or green address bar before entrusting their personal digits to a website they are unfamiliar with.

Who is your Clientele?

Research has shown that older clienteles are far more prudent and careful with their purchases and are therefore, far more likely to look for SSL before making a purchase.

Are there different types of SSL Certificates?

There are many different SSL certificates and not every website will require the same level of security. Thawte, which is a leading provider of SSL certificates, offers certificates according to the sensitivity of the information being asked for from your customers. If you want a more detailed idea of prices and packages, you can compare by searching online for SSL products from Thawte and other market leaders. Make sure that you understand more about how SSL works and then find the right SSL certificate for your company.

Building trust between you and your customers

SSL increasingly gives customers the feeling that there is an element of trust between them and the website from which they are making a purchase. Trust seals, provided by validating authorities, which can be displayed on all pages which require sensitive information encourage shoppers to complete purchases without having to worry. Increasingly, many websites are also keeping ahead of competitors by including mention of their SSL certificates on their basic online descriptions, which are picked up by search engines such as Google and Yahoo.

]]>
http://www.techieinspire.com/ssl-website/feed/ 0
Send Email to any person in your Google + Circle even if you don’t know the address http://www.techieinspire.com/send-email-person-google-circle-dont-address/ http://www.techieinspire.com/send-email-person-google-circle-dont-address/#comments Sat, 11 Jan 2014 13:00:45 +0000 http://www.techieinspire.com/?p=6073 Sending email in Gmail is just as simple as you draft a mail on any email client like Opera mail, Outlook, etc. Gmail automatically shows a drop-down menu as you type the person’s name; however, this only happens when you have already sent a mail to that person in past or the person is added to Gmail contact list. In the past, you might have gone through such a similar situation where in you type the name of the person and Gmail do not show up any suggestion popup, then you realize that you have never exchanged email addresses with that person before. In such situation, you might contact the person to know its email address to whom you want to send email, which is a very time-consuming and tedious task.

Send Email to any person in your Google +

However, as a part of some improvements in Gmail, it will now automatically update contact using Google +. Gmail will now suggest names for the people from Google +, although you never exchanged mails with them. This also add a level of security by not displaying the email address unless the recipient responds to the email.

When anyone from the circle sends you mail then the mail will appear in the Primary tab Inbox. However, If the person is not from your circle then mail will end up in Social Tab Inbox and will also restrict the sender from sending another message unless and until you respond to that mail or add person to the circle.

Google new features do seem to be very helpful in situation when you don’t have the person(s) mail address handy and want to send mail to the person(s). With the new feature, you can now be more connected with people in Google+. However, it does not hide the potential risk of spam, when a person adds you to the circle and can easily start sending you e-mails.

Nevertheless, Google does provide the option to control the new feature in Gmail the way you want. Go to Gmail Settings –> General tab, look for “Email via Google+.”

Email via Google+ setting page

By default, it is set to “Anyone on Google +” . If you set as “Circles” then people from your circles can only be able to send email. If you set as “No One” then no one could send you mail using this feature from Gmail.

Source: Gmail
]]>
http://www.techieinspire.com/send-email-person-google-circle-dont-address/feed/ 0
Malware Attack Hits Thousands of Yahoo Users http://www.techieinspire.com/malware-attack-hits-thousands-yahoo-users/ http://www.techieinspire.com/malware-attack-hits-thousands-yahoo-users/#comments Sun, 05 Jan 2014 15:57:40 +0000 http://www.techieinspire.com/?p=6066 Yahoo Malware AttackAccording to security researchers at Fox-IT, Yahoo users are exposed to Malware attack by its Yahoo ad network servers. As per their investigation conducted by the security firm, Yahoo’s sites are exploited by Malware that has been distributing and spreading Malware across hundreds and thousands of users over the last few days.

In a blog post by Fox IT ,

“On January 3 we detected and investigated the infection of clients after they visited yahoo.com. Clients visiting yahoo.com received advertisements served by ads.yahoo.com. Some of the advertisements are malicious.The investigation showed that the earliest signs of infection were at December 30, 2013. Other reports suggest it might have started even earlier.”

As per the investigation, when a user visits the Yahoo site, the page is served with Yahoo’s ads, as and when user click on the Yahoo’s advertisement, the ad site were redirected to the site exploited with malicious code that exploits vulnerabilities in Java and installs a variety of different Malware on the user system.

Given a typical infection rate of 9% this would result in around 27.000 infections every hour. Based on the investigation by security firm, the countries most affected by the exploit kit are Romania, Great Britain and France. It’s unclear why those countries are the most affected by Yahoo Malware; however, the affected users by the Malware is also observed in other parts of the countries as well.

“It is unclear which specific group is behind this attack, but the attackers are clearly financially motivated,” the firm writes. Yahoo is aware of the issue and has confirmed the presence of the malware and tackling the same.

According to Yahoo, “We recently identified an ad designed to spread malware to some of our users. We immediately removed it and will continue to monitor and block any ads being used for this activity.”

Source: http://blog.fox-it.com/2014/01/03/malicious-advertisements-served-via-yahoo/

]]>
http://www.techieinspire.com/malware-attack-hits-thousands-yahoo-users/feed/ 0
Using Technology to Boost Your Business’ Productivity http://www.techieinspire.com/technology-boost-business-productivity/ http://www.techieinspire.com/technology-boost-business-productivity/#comments Sat, 07 Dec 2013 19:38:41 +0000 http://www.techieinspire.com/?p=6054 Using Technology to Boost Your Business’ Productivity

Advancements in technology have dramatically improved our productivity, according to a new study by the Centre for Economics and Business Research (CEBR) and O2 Business. Away from work, technology can often seem like a distraction from more important matters; from consoles to mobiles there’s always something clamoring for attention. But in the workplace we’re apparently 84% more productive than we were four decades ago, with productivity expected to increase a further 22% in the next seven years.

It’s now almost a given, especially outside less developed countries, that employees can work anywhere they like – from the office to the home, on the move or abroad. Accessing files or applications and editing documents on mobile devices is getting easier as software becomes more advanced and 4G and Wi-Fi networks become more widespread. Productivity is a great indicator of a business’ economic growth so harnessing technology to its full potential in the workplace will guarantee long-term success.

But what technology should businesses, large and small, embrace?

Explore Virtualization

Virtualization and remote desktop access are ways of saving your IT department time and money, and simplifying your computer network. Instead of having multiple desktops all with the same applications and operating system, you have various instances of virtual desktops located on a server. To access these virtual desktops, remote desktop software is used, such as Ericom’s RDP client for Windows, so a freelance employee for example can access from home all their business-critical, company-specific applications without the need to install everything from scratch. Having desktops centralized on a virtual machine makes managing and securing them that much simpler – upgrades, patches, and security measures can be implemented across the board and employees will have a harder time breaching security, accidentally or otherwise.

Collaboration software

If you have a large remote workforce and your employees are no longer working in adjoining cubicles (and even if workers are simply spread out across the building), making collaboration on tasks as simple as possible is essential. Before cloud-based Software as a Service (SaaS) programs like Google Drive came on the scene, collaborating involved a lot of emailing and sending documents back and forth to come to a group decision. Now documents can be edited and changes can be tracked on the fly by multiple users in different locations. With project management software like Basecamp these tasks can be easily assigned to individuals or a group and deadlines can be set to make the whole process run even more smoothly.

Leverage Employee Devices

To be in line with modern business practice, adopting and implementing a Bring Your Own Device (BYOD) initiative is crucial for not only saving on hardware costs but also increasing productivity. Your employees will have their preferred devices, whether that’s the iPhone or the Samsung Galaxy, the Nexus or the Surface. By allowing them to use personal device that they are both comfortable with and experienced at using, you can enable them to be more productive. You can get rid of the time spent on learning how to use new, unfamiliar devices and software, while making your employees more satisfied. Be sure to do your research on BYOD issues before implementing a company-wide strategy.

]]>
http://www.techieinspire.com/technology-boost-business-productivity/feed/ 0
How to Create Google+ Posts via SMS Messages http://www.techieinspire.com/create-google-posts-sms-messages/ http://www.techieinspire.com/create-google-posts-sms-messages/#comments Mon, 25 Nov 2013 12:15:06 +0000 http://www.techieinspire.com/?p=6048 We usually use our mobile phone’s SMS messages to chat or to text any nice message to a friend, girlfriend(s)/boyfriend(s), etc. We do this chatting in our everyday life. But have you ever thought that you could also use your mobile phone’s SMS messages to update your status on social networking sites? This seems to be quite interesting to hear. Yes, it’s indeed true and Google+ has made this possible by rolling out this awesome feature for all of its users. Using this feature you can easily share your posts on your Google+ circles. You just have to enable Allow posting by SMS on your Google+ account. Once you activate this feature, you can update your status on Google+ as per your wish.

Follow the steps given below to create Google+ Posts via SMS Messages:

1. Login to Google+ with your Username and Password. Go to the Settings page where you can see the “Phone” section under Notification delivery.

2. In this section, select your Country, enter your mobile number and click on “Send verification code”.

Google+ Posts via SMS

3. A Google verification code will be sent to your Mobile Number which you are supposed to enter in the Verification Code text box and click on “Confirm”.

Google+ Posts via SMS

4. As shown below, below the Phone section you will see “SMS Posts” section. Over here just check the checkbox “Allow posting by SMS”. Google+ will provide you a 10 digit unique phone number that you can use to post your status updates on Google+ via SMS.

Google+ Posts via SMS Message

5. From now on you can start posting updates on Google+ from your phone number. We have tested this feature on our phones, and the results were as expected.

Note: Standard message and data rates from your network service provider may apply.

]]>
http://www.techieinspire.com/create-google-posts-sms-messages/feed/ 0
How To Keep Your Mobile Casino Account Secure http://www.techieinspire.com/mobile-casino-account-secure/ http://www.techieinspire.com/mobile-casino-account-secure/#comments Wed, 20 Nov 2013 20:24:21 +0000 http://www.techieinspire.com/?p=6036 anti-fraud-detectionIn a day and age where large casinos can fit the tiny screens of our mobile phones, securing our own accounts is no longer that easy. The boom of technology expanded the playing ground to both credible developers and hackers alike. If you enjoy playing slot games on your phone or if you happen to love playing casino games on the go, it may be wise to check if the money you invest is in safe hands. Here are a few tips to keep your online casino accounts safe and secure:

Check the Website’s Data Encryption System
The first telltale sign of a secure online casino site is the website’s list of software providers. Your casino portal should display the list on its home page or perhaps on its security heading. Another thing to look for is a website’s data encryption.

“Most of the more reputable online casinos secure players data using special and highly specialized encryption technology known as 128 bit data encryption. This technology is responsible for scrambling or encrypting all the data a player enters on the online casino’s website,””Online Casino Reporter”, a website that specializes in online security, said. Almost all financial institutions utilize this kind of data encryption.

Identify the Software Technology Used in the Gaming Site
Credible casino websites usually provide a category where players can check the site’s security features or technology used in their games. Mobile casino games frequently use third party add-ons which aren’t exactly the safest today. Fortunately, technology is on our side with HTML5, the newest version of the web language.
“The rollout of HTML5 will at least put us on a path to standardization, replacing insecure third party add-ons like Adobe Flash, which has suffered numerous exploits by cybercriminals,” Sophos  said.

With more developers steering clear from using Java and Flash as the primary architecture of their games, more and more companies—especially mobile casino developers—now turn to HTML5 because of its security features. “Alchemy Bet” one of the world’s leading casino game providers now utilize an HTML5 technology as seen in their new games including their latest 2012 game Pocket Fruity. This latest web language update would give casino players peace of mind with additional measures. Any casino gamer should invest time in understanding the security measures of their chosen websites.

Opt to Play in Gaming Portals with Diverse Banking Options
The general rule of thumb is that the wider range of online transactions and banking vendors, the better the website. Aside from checking their banking options, you should also look at possible anti-fraud technologies that they utilize. It may be wise to dig deeper with their confidentiality clause as well.
As long as you take time to verify these simple security measures, then there’s a great chance you’ll enjoy your game without worrying of security holes and payment fraud.

]]>
http://www.techieinspire.com/mobile-casino-account-secure/feed/ 0