Xtreme Digital is an Information and Communications Technology resource platform that is dedicated to providing reliable solutions to day to day mobile and computing challenges.
GPS stands for "Global Positioning System." It is a navigation system that uses satellites to determine the approximate location of someone anywhere on the planet where a cell phone signal is available. If you need to keep track of someone, an easy and inexpensive way to do it is by using GPS software installed on a cell phone. This way you can monitor someone's location from your computer 24 hours a day.
Let’s walk you through the steps to get started.
Get an unlimited data plan on your internet-enabled cell phone. This will prevent you from racking up expensive fees if you use the GPS often. You can purchase a data plan from your current mobile service provider. Monthly billing for unlimited plans varies from provider to provider.
Select a GPS software. Three applications that you can choose from are Instamapper, Mologogo, and Buddyway. All of these programs run on Google Maps so their appearance and functionality are quite similar.
Create an account with one of the GPS services. You will be asked to provide a username, a password and a valid email address. In some cases, you also might need to supply a cell phone number and your service provider. An email will be sent to you with download instructions.
Download and install your GPS software. The download link is provided in the confirmation email. Open the web browser on your mobile phone and follow the link. Follow the download instructions and restart your phone.
Start the application by going to your phone's "Main Menu" and then "Applications." Enter the device ID from your GPS account and tap on "Save." A notification asking access to your phone's GPS chip will appear. Click "Yes." The status message of the application will change from "Locating" to "Tracking."
Track your phone by logging-in to the account that you created. There you will be able to see the location of your phone in an interactive Google map. You also will be able to see the past 30 days' worth of movement data by clicking on "History," located on the top of the navigation bar. To zoom in or out, use the "+" or "-" button.
Xtreme Digital® Solutions
Tel or Whatsapp: 0785847193
WHAT TO DO (AND NOT DO) IF YOU FIND A LOST SMARTPHONE
At some point or another, you might lose your phone. It’s always good to know what to do when that happens, but there’s another side to that story: what if you’re the person who finds a lost phone. You’d be surprised at how many people don’t know what to do when they find someone else’s phone—and really, there isn’t a single “right” answer. But there are a few things to keep in mind to make it easier for that person to get their phone back.
One time I was at Old Navy and suddenly the pants behind me started ringing. At first I didn’t realize where the ringing was coming from, but it didn’t take long to figure out what was going on here: someone had tried pants on, put the phone in the pocket (who does that?), and forgot to take it out. So he called his lost phone repeatedly until someone answered. That someone was me. He had no idea where the phone even was, which is probably pretty common when someone loses their phone. But he came back to Old Navy, I gave him his phone, and we went on about our day. This is most likely the most common scenario when dealing with a lost phone, but it’s always good to know what to do when it doesn’t play out exactly like this.
There’s a good chance the person who lost the phone will want to either track or call it when they realize it’s missing, so one of the biggest things you can do to help them is keep it charged and connected to the internet. If the phone is active on a cellular network, the last part shouldn’t be something to worry about, but if for some reason it’s an inactive phone, try putting it on Wi-Fi. This may not be possible if it has a secured lock screen, but hey—at least you tried. Every little bit helps.
Basically, if the phone dies, it’s almost useless. No calls will come through and there’s no way to track it once it’s dead. So do them a favor and make sure it’s juiced at the very least.
1. Turn It In to the Place Where You Found It
This one isn’t always a no-brainer, because it’s not always that simple. You have to use your best judgement here, because many business will just toss the phone in a bin and wait for someone to come in looking for it—they don’t monitor it for calls, make sure it stays charged, or anything else you should do with a lost phone. What’s more, if the phone’s owner doesn’t know where it was lost, they may never walk back into that business again. That said, it’s still the right thing to do if you don’t want to take on the responsibility of waiting for the owner to come looking for it.
But you should also keep in mind that there are situations where it doesn’t make sense to give the phone to a business—like if you find it outside, for example. Just because the phone is in front of a place, doesn’t necessarily mean that the owner was in that place. In that situation, they’d probably never find it.
2. Don’t Look at Their Stuff (Except Their Contacts)
Think of all the stuff you have on your phone: personal pictures, social network connections, banking information, etc. Would you want someone looking at that? I sure as hell wouldn’t. And it should really go without saying, but I’m going to say it anyway: if you find a phone that doesn’t have a secured lock screen, don’t go through it. It’s just not right.
However, you should probably check the contacts list. Oftentimes people will have “favorites” or “starred” contacts set, and that’s a good bet on who to call if you’re trying to track the owner down. Generally, I’d look for the most telling names—wife, hubby, loverface, bae, boo—you know, the stuff that everyone lists their significant other as. In the case that there isn’t a significant other, you could just try calling the first person on the list. Or even the last person in the recent calls list, but at that point you’re on the cusp of getting a little too friendly with someone else’s phone. Tread carefully, honest one.
Published by Cameron Summerson
Xtreme Digital® Solutions
THIS SITE MAY BE HACKED!!!
You'll see the message "This site may be hacked" when Google believes a hacker might have changed some of the existing pages on the site or added new spam pages. If you visit the site, you could be redirected to spam or malware.
Google recommends that you don't visit the website until this message disappears from the search result.
How to remove this message from your site.
The "This site may be hacked" notification won't be removed until the webmaster of the site takes action.
Try these steps to fix your website:
1. Register and verify your site in Google’s Search Console. (https://www.google.com/webmasters/tools/home)
2. Sign in to Search Console and check the "Security Issues" section to see details of sample URLs that might be hacked. Fix the security issue that allowed your website to be infected. Otherwise, your site is likely to be reinfected.
3. Read Google’s resources for hacked sites (https://www.google.com/webmasters/hacked/) for detailed information on how to fix your website.
4. Request a review in the Security Issues section in Search Console when your entire website is clean and secure. After Google checks that your site is fixed, they'll remove the "This site may be hacked" message.
Xtreme Digital® Solutions
ANONYMOUS SECURITY ADVICE (HOW TO HIDE YOUR ONLINE TRAFFIC FROM BOTH YOUR ISP AND GOVERNMENT AGENTS)
What is a VPN: A Virtual Private Network (VPN) is a network technology that creates a secure network connection over a public network such as the Internet or a private network owned by a service provider.
So what does this mean? To put it most simply if someone tries to log your IP, this person will see the IP of your VPN service provider protecting your personal computer. It will cost you money to have a good VPN service but you do get what you pay for in this industry. However, even on the lower end of price range most VPN services do an adequate job. Below is a list of trusted VPN servers, there are of course many others if you do the research. Free VPN’s do exist, but use at own risk I would advise.
A VPN alone should be good enough to protect you from the average person on the internet. But once you have one you are ready for Step 2: setting up some sort of proxy protection.
What is a Proxy? A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server, then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. In some cases, the proxy may alter the client’s request or the server’s response for various purposes.
There are different ways you can go about creating a proxy. The most most simple way is to use a browser with a built in proxy. Many people have traditionally used Tor for this but recent news keeps popping up that Tor browser is full of holes. A proxy browser is helpful because again if someone is trying to hack you they will spot this proxy IP first. If they are able to crack through this proxy they will still end up at your VPN IP. If you sign into your VPN first, then proxy second the proxy in a way protects the VPN creating a duel level protection.
Find Free Browser’s With Built In Proxy Here: http://www.omgtop5.com/proxy-browsers-for-windows/
So now you have your VPN and Proxy Browser, step 3, you can add on proxy chain. The longer the chain the longer/harder it will take for anyone who wants to hack into you. Every proxy a bypass’ leads them straigh to another proxy address which goes to another, so on and so forth. If they somehow get through them all they get to your browser proxy, then VPN. A third layer of protection. It is rare to encounter a proxy chain, but for this same reason in many ways is much more effective than a VPN. I must note that much like VPN services you get what you pay for with proxy chain services. If you are interested a quick google search will lead you to multiple proxychain providers.
Now that you have all the outside protections in place you are going to want some internal protection. Believe it or not even with a VPN and Proxy your computer may still leak your IP to web sites. Something known as the WebRTC makes a real time connection to each web site you visit. Even with protections turned on this connection will be made and depending on the site, leak your IP. Step 4, You are going to need to install something to Disable WebRTC. This will be free and easy.
Disable WebRTC for Firefox: https://addons.mozilla.org/en-us/firefox/addon/happy-bonobo-disable-webrtc/
Disable WebRTC for Chrome: https://chrome.google.com/webstore/detail/webrtc-block/nphkkbaidamjmhfanlpblblcadhfbkdm?hl=en
To Test If Your Browser Is Leaking Your IP through WebRTC Test Here: https://www.browserleaks.com/webrtc
Step 5, This next bit may not be completely necessary and will be annoying to use while browsing the internet but it is a last line of defense in a way. If you want lock tight security you are going to want a Java Script blocker. No Script is a free source java blocker which allows your to peal back layer by layer the scripts you wish to allow and what you dont with a click of a button. You can turn on and off as you please and custom set the level you want set at each individual web site.
Install No Script: https://noscript.net/
If you ever sense that someone is on your computer you can use the following sequence to booth them off your computer, at least temporarily. You can use the command in bold on a regular basis, it will not disrupt your internet connection.
Open cmd window
Title Hacker (press enter)
color 2 (enter)
echo off (enter)
If you want to try and find the IP address of that person on your computer open cmd and use: netstat -n or netstat -an or netstat -anp
To Keep an Anonymous Identity On The Internet: Invent an alias, a surname if you will, with a name of your choice. Go and register this name with one of the big email service providers. Use this new email to register any new Twitter, Facebook, Instagram, et cetera accounts. Be sure to clear all browser cookies before using this alias or better yet use a different web browser for your anonymous identity than you would use for your more typical internet activity. If you have a further need for security beyond these steps you may want look into encryption, stenography or TAILS system.
This Article “Anonymous Security Advice” is free and open source. You have permission to republish this article using a creative commons license with attribution to the author and AnonHQ
Xtreme Digital® Solutions
HOW TO INCREASE RAM/ INTERNAL STORAGE IN ANDROID USING AN SD CARD
Increasing the RAM aids in speeding up and even boosting your phone’s speeds. Just by altering some adjustments on your SD Card and 2 programs, you can get faster speeds and better performance from your Android Device(s).
As everyone already knows, Android is the largest brand in alteration and advanced modification. Provided that you already have rooted your Android device, then reading this tutorial will provide you with more knowledge on how you can easily increase your Android’s RAM without making any changes onto your hardware.
The simplest way to provide more RAM to your android device, is right here in this article. Simply follow the process below. However, you must be informed of the requirements before you begin in order to perform the operation.
*Rooted Android Device (Tablet | Phone)
*SD Card (Must by at least 4GB & Class 4)
*SD Card Reader
Now the process of alteration can be followed once you have all of the information. Please be sure that your SD card is properly formatted and blank. If you have any images on your SD Card, I encourage you to save them onto your computer and/or an online source like DropBox.
This process requires you to download and install a specific software on your computer. The software is called Mini Tool Partition. This software will allow you to perform a partition of your SD Card. You must insert your SD Card into the SD Card Reader on your desktop or laptop.
You will need to open the Mini Tool Partition, and on the Disk Selection window, select your SD Card. Right Click on the desired SD Card and click on Delete. Basically this version of Delete will format your SD Card to work properly.
Now that you have formated your SD Card, you can right-click on the respective SD Card selection and then select Create. This will then create special partitions. However, if your SD Card is below 4GB, you may want to select the “FAT” partition; if you have a bigger SD Card, you can opt-in for the FAT 32.
**Note, it is crucial to follow this next step exactly, other
wise, you may end up corrupting your SD Card.**
Now that you have selected the proper File System, you can simply drag the size as well as the location. Please leave the 1000MB on the Unallocated Space. The rest is for the partitioning size. Now you can select OK.
Since you have left the 1000MB unallocated space, this will allow it to get it located properly. Right-Click on the SD Card selection and select Create. Select the Primary just as the same on the previous and then you need to select Ext2, not FAT32. During this, you should not to leave any unallocated space. Now you can click OK, Done.
Now the editing of the partitioning of your SD Card is completed. You can simply click on the Apply button located at the top left corner of the Mini Tool Partition Wizard. Eject your SD Card, and proceed onto placing it into your desired Android Device.
Now you need to download and install “Link2SD”. This can be found on the Google Play Store from your mobile device.
Simply open up the new downloaded application, where it will then ask you for the Rooted Device. You will have to stop the process and ensure your Android device is, before you can continue.
After that, the application will ask for the file system, such as .Ext partition. Just select the Ext2 selection that you had created during the Mini Tool Partition process. Then select OK.
Now you need to prepare the application in order to take the partitioned space in which we have taken the 1000MB. Then you can link them all together.
As mentioned at the beginning of the article, we are not adding any type of hardware. Instead, we are just increasing the RAM inside your Android by means of utilizing your own SD Card. The whole process should only take approximately 10-50 minutes to perform.
Xtreme Digital® Solutions
ict for Businesses
Business Process Outsourcing. And More.
Laptop World (U) Ltd is a leading e-retailer and retailer committed to becoming the most loved and trusted store for all electronic devices.
We Design and Develop all kinds of web-based Management Information Systems and Corporate Websites! Contact: +256750761289 | Whatsapp us on:+256750761289
MOXYS TECH Co. is a business consulting and technology solutions firm that provides balanced solutions that are high-end and cost effective.
Geospatial konsults is dedicated to developing systems that Support companies in managing&maping data present in all types of spatial or geographical data
Power Tech Services is an IT solution Company. It was started in 2010. We deals with Point of sale sytems, CCTV Cameras, Networking, and Computer Hardware Maintance. We are based in Kampala Uganda feel free to work with us.... Expect good service..
Help desk services, Call center services, Biometrics, facial scans, Eye scans and Fingerprinting, IT consultancy, Customer service trainings, E-government
Summit Consulting Ltd is a leading consulting firm especially in areas of Forensic, Advisory and Fraud. We are committed to providing the most efficient and expeditious services, while always maintaining the highest ethical standards.
A visuals, software and electronics( in the near future ) company.
J&J elite computers provides the best quality computers/laptops in town and innovative information technology solutions.