Saturday, August 1, 2015

Why you should (or shouldn’t) root your Android device



Android is based on the Linux kernel, so right from the start, tinkerers and power users were interested in gaining root access to make changes and graft on new features. In the early days, this was a fairly simple procedure on most devices. There were several apps and tools that could root almost any Android phone or tablet, and you’d be ready to truly master your device in mere minutes. As Android became more capable, the allure of rooting has diminished somewhat — and it’s also much harder than it used to be.
So what are the advantages and risks of rooting these days, and why are some devices resistant to rooting? Let’s see if we can’t figure it out.

The advantages of rooting

Gaining root access on Android is akin to running Windows as an administrator. You have full access to the system directory and can make changes to the way the OS operates. As part of rooting, you install usage manager (SuperSU is the main one right now). These tools are basically the gatekeeper of root access on your phone. When an app requests root, you have to approve it using the root manager.
So what can you do with root specifically? Let’s say there’s a system app that you really don’t like seeing, but it can’t be disabled through the standard method. With root you can run an app like Titanium Backup to delete or permanently hide the app. Titanium can also be used to manually back up all the data for an app or game so you can restore it to another phone. Want to remotely access and control your phone? That’s another thing you need root to do. Ad-blocking software on Android also needs root access, as it modifies the Android hosts file to block known ad servers.
supersu
Then there’s the multi-headed beast known as the Xposed Framework. Root access is needed to deploy Xposed in the system, but from that point forward Xposed doesn’t need to ask for root to do things like modify the UI and add new system-level features. It took a little time to get Xposed working on Lollipop, but the developer has finally produced some mostly stable builds.

The risks of rooting

Rooting your phone or tablet gives you complete control over the system, and that power can be misused if you’re not careful. Android is designed in such a way that it’s hard to break things with a limited user profile. A superuser, however, can really trash things by installing the wrong app or making changes to system files. The security model of Android is also compromised to a certain degree, as root apps have much more access to your system. Again, you need to be careful what you install.
AndroidRedTriangleRoot methods are sometimes messy and dangerous in their own right. You might brick your device simply trying to root it, and you’ve probably (technically) voided your warranty doing so. Depending on the company, you might still be able to get a device repaired if you damage it attempting a root, but that’s not a guarantee.
As of Android 5.0 Lollipop, Nexus device system updates will only work on completely stock unrooted devices. This is because of a change to the way Android processes the OTA file. Updates now patch the entire system directory as a single blob, so any changes or extra files (i.e. root) will throw off the verification and the update will abort.
On other phones and tablets, virtually every OTA update you get will wipe out root and block the method from working again. If having root access is really important to you, you might be left waiting on older buggy software while you beg for a new root method or a modded OS update.

Why is rooting so much harder than it used to be?

If you’ve been using Android for a while, you’ve probably noticed gaining root access on most devices is much harder than it once was. There were exploits years back that could root almost any Android device in a few minutes, but that’s much less common now. The last essentially universal exploit was Towelroot in mid-2014, but Google patched that rather quickly.
The reason these exploits are patched so quickly now is that having active exploits on your system is actually a bad thing for most users. These are security holes that can be utilized by malware to take over a device remotely and steal data. Google and the device makers are being responsible when they shut down root methods after they are disclosed.
uaslrskq4tnmlg5sfxuj
Android is more secure, and it takes more work to break that security in a way that can grant root access. As a result of this cat-and-mouse game, root exploits are often pretty involved. You might have to push files to your device over USB, enter terminal commands, and flash modified files.
The effort needed to find, test, and develop exploits of this nature is a big part of the reason some popular devices (like the Galaxy S6, for example) don’t even have root right now. That’s not to say there aren’t exploits in these devices, but they’re far too valuable to be given away freely to the community. If you peruse XDA, you might come across one of the many root bounty threads where users pledge thousands of dollars to anyone who can offer a working root method for a phone. This works sometimes, but it’s notoriously hard to collect on these bounties and a few thousand dollars isn’t actually terribly much for a solid exploit.
Anyone who does security testing and research on Android will tell you there’s real demand for non-public exploits among security and forensics firms. A modder could make several times the theoretical value of a root bounty on XDA by selling an exploit to one of these companies. A universal exploit like we had back in the day could be worth tens of thousands easily. Most people just won’t give that away for a pittance.

So should you do it?

If you’re primarily interested in Android because you want to tinker, you should figure that in when you choose a phone. Don’t get something hoping that root method will be released, because you might be waiting a long time for a messy exploit that gets patched right away. There are some devices that are relatively friendly to rooting like Nexus phones and tablets. They have unlockable bootloaders and can be rooted with almost no legwork. They also have system images that can be used to restore the device in case something goes wrong. The usual warning about using care installing apps still applies, though.
If you’re not familiar with Android’s tools and how to fix issues with a command line, you might want to give this some thought. Root can be a lot of fun to play around with, but it can also lead to plenty of frustration as you try to fix errors caused by overzealous modding.
collected from : http://www.extremetech.com/

military mindset’ to cyber-war, DARPA’s Plan X to bring



Ask most “real” computer security experts, the guys and gals who have been cracking and/or protecting networks since before Windows were NT, and they’ll tell you the best way to protect a network is simply to know everything about it. They take pride in being able to quickly navigate arcade database structures and monitor access using only a text-based interface — but with virtually every organization of any real size now turning to computer security experts to protect their business, these sorts of security hardcores are getting washed out by snot-nosed millennials who think Unix is how you used to play Ubisoft games online.
That’s especially true in the military, which misses a good portion of the libertarian-minded hacking set right off the bat. What is the biggest military in the world to do, when one of the most important upcoming industries simply can’t provide the volume of talent they require to keep their operations safe? DARPA’s Plan X is an attempt to answer that question.
Plan X takes a very simple approach to solving the talent crisis: Rather than increasing the amount of talent being produced (this has been tried for several years), instead try simply lowering the amount of talent needed to do the job. The goal is to make basic monitoring of network security a whole lot more approachable, using an intuitive user interface and easily digested symbology to make it easy — and, more importantly, quick — to keep tabs on the source and type of any access to a particular network.
This includes, but is not limited to, interactive touchscreen interfaces, and Oculus-powered VR info-spaces. With easily digested information presented in a creative way, even someone with minimal training should be able to tell the difference between anomalous, non-threatening activity (like an automatic software update) and anomalous, threatening activity (like a cyberattack by Chinese government hackers). Plan X would make flags for malicious activity as obvious as possible, by changing the color of an icon or even animating it to pulsate menacingly.
planx 2
Wired’s shaky-cam coverage of one Plan X interface prototype certainly calls out to modern science fiction classics.
Of course, in order to animate an icon differently, Plan X has to have already identified it as under attack, or at least questionable activity — meaning that Plan X is fundamentally an automated security effort with a heavy emphasis on human supervision. Once the threat is identified, all the operator would need to do is drag the appropriate response tool over the offending node in the network, and let Plan X do the rest.
Overall, DARPA wants to make cyber-warfare a lot more like “kinetic” warfare, the fast, aggressive style of conventional combat which the US has been slowly perfecting for several decades. DARPA describes it as “bringing the military operational mindset” to computer security, which seems to mean that basic network monitoring might soon be able to be farmed out to disinterested Privates, a cyber version of sentry duty. For a fighting force that prides itself on agility and adaptability, the sluggish helplessness they often display in the face of cyber-warfare threats is, evidently, quite galling.
plan x 4
DARPA’s Cyber Grand Challenge also invites outside hackers to help crowd-source their security problems.
DARPA recently held a “hackathon” to get security experts to help improve its security measures. These are the “real” security gurus mentioned above, and their contributions will go to improving the basic algorithms at the heart of Plan X. They mostly contributed ideas and software designed to identify malicious activity in a complex network. They’ve also collaborated with design firms to create novel (and media-friendly) data visualizations, like the conceptual demonstration shown off using the Oculus Rift.
The official project page for Plan X states somewhat defensively: “Plan X will not develop cyber offensive technologies or effects. National policymakers, not DARPA, will determine how the cyber capabilities developed under Plan X will be employed to serve the national security interests of the United States.” That’s certainly true, though by designing the platform they dictate how it can be deployed.
The bigger issue is: how long will the logic behind Project X continue to put value on having an under-trained recruit at the end of the decision-making process? If Plan X is suggesting the best response to a particular issue, and time is of the essence in stopping an infiltration, why not just let Plan X deploy the appropriate countermeasure automatically? Aside from providing someone to blame should something go wrong, why should they choose to continue to put up with human fallibility?
High level security will probably always have to involve a highly skilled, creative specialist working in real time to stop real-time threats. But basic network monitoring and simple, reflexive reactions don’t necessarily require that sort of expertise. If DARPA is successful in creating a set of algorithms that can make basic network security at least mostly automatic, the next big question will become when the general public will get its hands on the code.

driver assistance tech 2016 VWs get Apple CarPlay, Android Auto



Volkswagen will offer Apple CarPlay and Google’s Android Auto on virtually all of its models for 2016, starting this week. VW also is “democratizing technology” — a popular term now — by offered driver assist features such as adaptive cruise control, lane departure warning, and park assist. Das Auto now has die neuste Technologie.
VW is one more example of how tech only seen on $50,000 cars five years ago is coming to the mainstream, and at prices in line with what VW buyers are willing to pay. Beetle, Golf, Jetta, and Passat all list for less than $22,000. The only VW cost well above the $30,000 average for new cars is the Touareg SUV ($45K).

CarPlay, Android Auto, and MirrorLink

Volkswagen says most model year 2016 VWs at trim level SE and above (VWs are typical S, SE, SEL) will get Apple CarPlay and Android Auto, both of them, along with Microsoft MirrorLink (for Microsoft phones). All do the same thing: You plug them in or connect by Bluetooth. The car controls phone, music, navigation and a handful of other apps from the car. A replica of the phone display is mirrored onto the car’s LCD, rejiggered to take advantage of a 7- or 8-inch display.
VW is also introducing four new MIB II modular infotainment platform head units ranging from 5-inch resistive touchscreens with a modest 400 x 240 resolution (not navigation-compatible) through an 8-inch capacitive touchscreen (less finger pressure needed) — with 3D navigation using an SSD card, and 10GB of jukebox music storage in the head unit even with no media player attached. VW is offering a new version of the Car-Net telematics service for $200 a year or $18 a month. Later in the year,, you can remotely access the car (for door unlock, remote start, state of EV charge) through an Apple Watch as well as smartphones and PCs.
As with other automakers’ adaptations, there is a limit on what apps work beyond Apple Maps on iPhone or Google Maps on Android. Other CarPlay apps on VW include Spotify, Audible, and MLB At Bat.
Der neue Volkswagen Touareg

More tech on more sub-$30K cars

VW had considerable safety tech on its midsize SUV, the Touareg. Now it ripples. They include forward collision warning with autonomous emergency braking, adaptive cruse control, parking steering assist (park assist), and active lane departure warning (lane keep assist). There is also a post-collision braking system to help prevent secondary collisions that happen in one of every seven accidents.
Adaptive cruise control works down to 19 mph, then returns control to the driver. ACC is standard on VW CC V6 4Motion Executive and Touareg Executive; available on Golf, Golf GTI, Golf R, Golf SportWagen, Jetta TSI/TDI, Touareg Lux/Sport with Tech,
Forward Collision Warning and Autonomous Emergency Braking (Front Assist) warns if you and the car ahead get too close too suddenly, then brakes if you don’t (and if ACC isn’t on, or more severe braking is required). It’s standard on CC V6 4Motion Executive and Touareg Executive, available on e-Golf (late availability), Golf, Golf GTI, Golf R, Golf SportWagen, Jetta TSI/TDI and Touareg Lux/Sport with Tech.
Blind Spot Monitor (blind spot detection) with Rear Traffic Alert (rear cross-traffic alert) alerts the driver to cars coming up fast from behind in the adjacent lanes. Additionally, when backing out of a parking spot, the same sensors warn if you’re about to be clipped by a car crossing from behind you, 65-80 feet away. It is standard on CC V6 4Motion Executive, Beetle and Beetle Convertible (SEL), Jetta GLI and Hybrid (SEL), and Touareg (except Sport), and available on Golf, Golf GTI, Golf R, Golf SportWagen, and Jetta TSI/TDI.
Volkswagen GolfLane departure warning / lane assist warns if the driver is crossing over a lane marking (Touareg) and also steers you back into lane (other models). The return-to-lane feature (photo right) works at 40 mph and above. It is standard on CC V6 4Motion Executive, Touareg (except on Sport), available on  Golf, Golf GTI, Golf R, and Golf SportWagen.
Park steering assist (park assist) auto steers you into a parallel or perpendicular parking spot. You control the throttle and brakes. It is available on e-Golf (late availability), Golf, Golf GTI, and Golf SportWagen.
Park distance control (parking sonar) pings as you back, warning of obstructions. That’s in addition to a rear camera that is standard on 85% of 2016 VWs, the company says. It is standard on CC V6 4Motion Executive, e-Golf (SEL Premium), Jetta Hybrid, Jetta GLI, Touareg (Lux, Executive), available on Golf, Golf GTI, Golf R, Golf SportWagen, and Touareg (Sport with Tech).
Automatic post-collision braking system applies the brakes after the airbag sensors detect a crash. It is standard on Beetle, Beetle Convertible, all Golfs, Jetta, and Touareg.
VW’s range of safety features raises the stakes in the small / affordable end of the car market. The one thing still missing from most cars in this segment is full-range (stop and go) adaptive cruise control, which takes the car to 0 mph and back up again. All cars will have this in 3-5 years if they have ACC now. It’s on small high-end cars such as BMW 3 Series and X3, but that hasn’t filtered down. One exception is Subaru. Its optical EyeSight system does provide full-range ACC.
collected from: http://www.extremetech.com

Saturday, January 24, 2015

সন্দেহজনক ফাইল ভাইরাস কিনা চেক করে নিন

সন্দেহজনক ফাইল ভাইরাস কিনা চেক করে নিন

pc_virus.jpg
এন্টিভাইরাস থাকার পর ও অনেক পিসি ভাইরাস আক্রান্ত হয়। কারন আপনার এন্টিভাইরাসটি সব ভাইরাস ডিটেক্ট করবে এমন কোন নিশ্চয়তা নেই। তাই আপনার পিসিতে সন্দেহজনক কোন ফাইল চোখে পড়লে তা সাথে সাথে Virustotal সাইটে গিয়ে চেক করে নিতে পারেন। এই সাইটে প্রায় ৩২টা এন্টিভাইরাস দিয়ে আপনার দেওয়া ফাইলটি চেক করে একটা লিস্ট দেখাবে কোন কোন এন্টিভাইরাস আপনার দেওয়া ফাইলটিকে কিভাবে দেখছে। লিস্ট দেখে আপনি বুঝতে পারবেন ফাইলটি ভাইরাস কিনা এবং ভাইরাস হলে কোন এন্টিভাইরাস ব্যবহার করবেন।
Virustotal

দরকারি সফটওয়্যার বিনা মূল্যে

কম্পিউটার ব্যবহারকারীরা তাঁদের প্রয়োজনে অ্যাডোবি রিডার, অফিস, ফায়ারফক্স, ক্রোমের মতো সফটওয়্যারগুলো ইনস্টল করে রাখেন। কিন্তু বেশ কিছু অপরিচিত সফটওয়্যার আছে, যা কম্পিউটার ব্যবহারকারীদের কাজে লাগতে পারে। প্রয়োজনীয় এই সফটওয়্যারগুলো আবার বিনা মূল্যেই পাওয়া যায়। ব্যবহারকারীদের কাজে লাগবে এমন কয়েকটি সফটওয়্যার নিয়ে এই প্রতিবেদন।
ডেক্সপট
ডেক্সপট হচ্ছে বিনা মূল্যের ভারচুয়াল ডেস্কটপ সফটওয়্যার। আপনার পিসিতে একাধিক ডেস্কটপ তৈরি করার প্রয়োজন পড়লে এই সফটওয়্যার কাজে লাগাতে পারবেন। এই সফটওয়্যার ব্যবহার করে একাধিক ভারচুয়াল ডেস্কটপ তৈরি করে নেওয়া যায় এবং স্ক্রিনের কাজের পরিসর বাড়ানো যায়। প্রতিটি ভারচুয়াল ডেস্কটপ আলাদাভাবে কাজ করতে পারে এবং প্রতিটির আলাদা ওয়ালপেপার, রেজুলেশন ও আইকন সেট করা যায়। এক ডেস্কটপ থেকে আরেক ডেস্কটপে যাওয়ার সহজ সুবিধাও আছে। এতে কাস্টমাইজ করার সুবিধাও আছে। মাউস ও কিবোর্ড শর্টকার্ট দিয়ে প্রতিটি ডেস্কটপে যাওয়ার সুবিধাও রয়েছে।
ডাউনলোড করার লিংক http://download.cnet.com/Dexpot/3000-2346_4-10580780.html
রেইনমিটাররেইনমিটার
উইন্ডোজে অপারেটিং সিস্টেমে ডেস্কটপ কাস্টমাইজেশন করার সুবিধা সীমিত। যাঁরা ডেস্কটপ কাস্টমাইজ করার সুবিধা চান, তাঁদের জন্য রেইনমিটার প্রয়োজনীয় একটি সফটওয়্যার হতে পারে। পুরো ডেস্কটপকে এ সফটওয়্যারটি ‘স্কিন’ হিসেবে রূপান্তর করে যাতে ব্যবহারকারী তাঁর সুবিধামতো উইজেট, নোট, অ্যাপ্লিকেশন যুক্ত করতে পারে। ডেস্কটপকে নিজের মতো করে সাজাতে রেইনমিটার কাজে লাগানো যেতে পারে। রেইনমিটার কমিউনিটি থেকে অসংখ্য স্কিন ডাউনলোড করে নেওয়ার সুযোগ রয়েছে। সফটওয়্যারটি ডাউনলোড করা যাবে রেইনমিটারের ওয়েবসাইট ( http://rainmeter.net/ ) থেকে।
কিপাস
যাঁরা পাসওয়ার্ড মনে রাখতে পারেন না, তাঁদের জন্য প্রয়োজন এই সফটওয়্যারটি। নিরাপদে পাসওয়ার্ড সংরক্ষণের একটি গুরুত্বপূর্ণ সফটওয়্যার হচ্ছে কিপাস। আপনার গুরুত্বপূর্ণ সব পাসওয়ার্ড এই সফটওয়্যারটিতে সংরক্ষণ করতে পারবেন এবং একটি মাস্টারপাসওয়ার্ড দিয়ে তা সুরক্ষিত রাখা যাবে। একবার লক করে দিলে এই পাসওয়ার্ড ডাটাবেজ নিরাপদ এলগরিদমের মাধ্যমে এনক্রিপটেড হয়ে যায় বলে সহজে ক্র্যাক করা সম্ভব নয়। এ সফটওয়্যারটি কম্পিউটারে পাসওয়ার্ড সংরক্ষণ করে ইন্টারনেটের সঙ্গে এর সম্পর্ক নেই। কিপাস সফটওয়্যারটি ডাউনলোড করা যাবে এর ওয়েবসাইট ( http://keepass.com  ) থেকে।
রেকুভা
রেকুভা

মনের ভুলে গুরুত্বপূর্ণ ফাইল মুছে ফেললে আফসোসের শেষ থাকে না। ক্যামেরার মেমোরি কার্ড, ইউএসবি ড্রাইভ, কম্পিউটার রিসাইকেল বিন কিংবা এমপিথ্রি প্লেয়ার থেকে মুছে যাওয়া গুরুত্বপূর্ণ তথ্য উদ্ধারে রেকুভা সফটওয়্যারটিকে কাজে লাগানো যেতে পারে। এ সফটওয়্যারটি যদিও সব ফাইল ফেরত আনতে পারে না, তার পরও প্রয়োজনীয় অনেক ফাইল পুনরুদ্ধারে এ সফটওয়্যারটি কাজে দিতে পারে। রেকুভা ডাউনলোড করা যাবে এর নির্মাতা পিরিফর্মের ( www.piriform.com/recuva  ) ওয়েবসাইট থেকে।
রিভো আনইস্টলার
আপনার কম্পিউটারে কোনো ফাইল আনইনস্টল করার পরও কিছু ফাইল থেকে যেতে পারে। এর কারণে কম্পিউটারের গতিও কম হয়ে যেতে পারে। এ ক্ষেত্রে রিভো আনইনস্টলার সফটওয়্যারটি কাজে দেবে। এই সফটওয়্যার ইনস্টল করা হলে আনইনস্টল করা ফাইল স্ক্যান করে রিভো এবং কোনো ফাইল যদি আনস্টল করার পরও থেকে যায়, তা দূর করে এবং অন্য কোনো সমস্যা থাকলে তা দেখাতে পারে। এ সফটওয়্যারটি এক মাস বিনা মূল্যে ব্যবহার করা যাবে। ডাউনলোড করার লিংক ( www.revouninstaller.com  )
৭-জিপ
যাঁরা জিপ ফাইল নিয়মিত ব্যবহার করেন, তাঁদের উইনজিপের চেয়ে আরও শক্তিশালী সফটওয়্যার দরকার হতে পারে। ফাইল আর্কাইভের সফটওয়্যার হিসেবে ৭-জিপ কাজে লাগাতে পারবেন। বিনা মূল্যের ওপেনসোর্স ৭-জিপ সফটওয়্যারটি সব ফরম্যাটের জিপ ফাইল তৈরি ও খোলার জন্য কাজে লাগানো যায়। ডাউনলোড করার জন্য যেতে পারেন ( www.7-zip.org  ) ৭-জিপ ওয়েবসাইটটিতে।

Thursday, January 22, 2015

কম্পিউটার কি বোর্ড এর F1 থেকে F12 এর কাজ

কম্পিউটার কি বোর্ড এর উপরের দিকের F1 থেকে F12 পর্যন্ত এই বাটন গুলোর প্রত্যেকের রয়েছে আলাদা আলাদা এবং গুরুত্তপূর্ণ ব্যবহার। বিশেষ করে মাউস এর বিকল্প হিসেবে এদের ব্যবহার করা যায় । চলুন দেখে নিই কি গুলোর প্রয়োগঃ ▬

F1 ▬:সাহায্যকারী কি হিসেবেই ব্যবহিত হয়। যখন F1 কি চাপা হয় তখন প্রত্যেক প্রোগ্রামেরই হেল্প পেইজ চলে আসে।

F2 ▬:সাধারণত কোনো ফাইল বা ফোল্ডার Rename করার জন্য ব্যবহার হয়। Alt+Ctrl+F2 চেপে মাইক্রোসফট ওয়ার্ডের নতুন ডকুমেন্ট খোলা যায় । Ctrl+F2 চেপে মাইক্রোসফট ওয়ার্ডের প্রিন্ট প্রিভিউ দেখা হয়।
F3▬: কি চাপলে মাইক্রোসফট উইন্ডোজসহ অনেক প্রোগ্রামের সার্চ অপশন চালু হয়।Shift+F3 চেপে মাইক্রোসফট ওয়ার্ডের লেখা বড় হাতের থেকে ছোট হাতের বা প্রত্যেক শব্দের প্রথম অক্ষর বড় হাতের বর্ণ দিয়ে শুরু ইত্যাদি কাজ করা হয়।
F4▬ :চেপে মাইক্রোসফট ওয়ার্ডের last action performed Repeat করা যায়। Alt+F4 চেপে সক্রিয় সব প্রোগ্রাম বন্ধ করা হয়। Ctrl+F4 চেপে সক্রিয় সব উইন্ডো বন্ধ করা হয়।
F5 :চেপে মাইক্রোসফট উইন্ডোজ, ইন্টারনেট ব্রাউজার ইত্যাদি Refresh করা হয়।পাওয়ার পয়েন্টের স্লাইড শো আরম্ভ করা হয়। এবং মাইক্রোসফট ওয়ার্ডের find, replace, go to উইন্ডো খোলা হয়।
F6▬ :চেপে মাউসের কার্সরকে ইন্টারনেট ব্রাউজারের অ্যাড্রেসবারে নিয়ে যাওয়া হয়। Ctrl+Shift+F6 চেপে মাইক্রোসফট ওয়ার্ড ডকুমেন্টে খোলা অন্য ডকুমেন্টটি সক্রিয় করা হয়।
F7 :চেপে মাইক্রোসফট ওয়ার্ডে লেখা বানান ও গ্রামার ঠিক করা হয় এবং মজিলা ফায়ারফক্সের Creat browsing চালু করা হয়। Shift+F7 চেপে মাইক্রোসফট ওয়ার্ডে কোনো নির্বাচিত শব্দের প্রতিশব্দ, বিপরীত শব্দ, শব্দের ধরন ইত্যাদি জানার ডিকশনারি চালু করা হয়।
F8▬ :কি টি অপারেটিং সিস্টেম চালু হওয়ার সময় কাজে লাগে। সাধারণত উইন্ডোজ Safe Mode-এ চালু করার জন্য এই কি টি চাপতে হয়।
F9▬ :কি চেপে Quark 5.0 এর মেজারমেন্ট টুলবার ওপেন করা হয়।
F10▬ :কি চেপে ইন্টারনেট ব্রাউজার বা কোনো খোলা উইন্ডোর মেনুবার নির্বাচন করা হয়।Shift+F10 চেপে কোনো নির্বাচিত লেখা বা লিংক বা ছবির ওপর মাউস রেখে ডান বাটনে ক্লিক করার কাজ করা হয়।
F11▬ :চেপে ইন্টারনেট ব্রাউজারের ফুল-স্ক্রিন মোড অন-অফ করা হয়।
F12▬ :চেপে মাইক্রোসফট ওয়ার্ডের Save as উইন্ডো ওপেন করা হয়। Shift+F12 চেপে মাইক্রোসফট ওয়ার্ড ডকুমেন্ট সেভ করা হয়। এবং Ctrl+Shift+F12 চেপে মাইক্রোসফট ওয়ার্ড ডকুমেন্ট প্রিন্ট করা হয়

Wednesday, October 24, 2012

10 Ways for Teachers & Students to Build Websites

The lines between blogging platforms, website platforms, and wiki platforms are not always clear. I have a somewhat simplistic explanation that I give to teachers who don't have a web presence yet, but want to create one for their professional work. Here's the explanation: websites are good for providing a static resource of information, blogs are good for frequent updates and communication, and a wiki is great for collaborating on the creation of a reference site. For the teacher who wants to create a website, here are ten good platforms to try.

If you already have a Google Account, Google Sites is already available to you. Just select it from the menu of services that you're not using. Google offers a wide variety of templates that you can use and customize on your site. Should you decide at a later date that you want to add other contributors to your site, you can do so with just a couple of clicks in the sharing menu. Learn more about Google Sites in this video.

Weebly was one of the first website building tools that I played around with when I got started on my technology integration journey. It's a very intuitive and feature rich platform for creating a free website. For those reasons, it's always on my list of recommendations to teachers who want to build a classroom website.

If you're looking for a tool for students to use to create websites of their own, Weebly for Education is a good resource. Weebly for Education includes all of the intuitive website-building and blogging tools found on Weebly plus features built specifically for education. Weebly for Education offers bulk creation of student accounts which teachers can manage and moderate. Students can create their own websites and blogs using the accounts that you create for them.
School Rack offers a free service for teachers to build and host their own classroom websites. Unlike other free website solutions that are targeted toward a general audience, School Rack has features designed specifically for teachers. For example, on your School Rack website you can post assignments with full descriptions, expectations, and deadlines. This is an integrated feature, not an add-on page that you have to create yourself. School Rack offers students and parents free accounts to communicate with teachers. Once your students and parents have activated their accounts, you can directly message individuals or send messages to groups that you have created.
Kafafa offers a wide array of ad-free templates that you can use to build your free website. Once you've selected a template, editing the content of your website is easy to do. To edit the text appearing on your site's pages simply select the text box and start typing. To add or edit other elements of your site's pages just click edit and add images, videos, and hyperlinked text using the simple editor. If you can send an email, you can create a website with Kafafa.

Yola is the tool that I formerly used to build websites for my department at school. An outstanding aspect of Yola is that not only is your website free, it remains free regardless of how much content you add to it. This is a good thing if you plan to post a lot of audio or video content as some website builders and hosts begin to charge once you reach a certain volume content. Yola provides good tutorials and forums for first time users. I also learned first-hand that their responses to help requests are very quick.
Lifeyo is a free service for creating great-looking websites and blogs. It takes less than a minute to create your new website with Lifeyo. To get started just enter a title for your site, pick a design template, and create an account by entering your email address. All of Lifeyo's clean, simple, and good-looking templates allow you to include a blog element within your website. Integrating a blog within the site is a great option for those people who are just getting started online and aren't yet sure how they're going to use their blogs or websites. Lifeyo supports adding multiple authors to your site.

Webs is another service that I have first-hand experience with in a school setting because a couple of my colleagues have used it for their classes. Webs has all of the characteristics that you would expect to find in a free website platform. Websites built using Webs can include videos, calendars, polls, and a wide variety of third party widgets. Webs offers a wide variety templates and layouts to select from. For people with a higher level of comfort with technology, Webs might be a little too basic for your needs. In that case you may want to consider Snap Pages.

Snap Pages provides a free service as well as a premium service for creating your custom website. The free service has more than enough features for a teacher to set up and maintain a class website. The editing and customizing options of Snap Pages allow users to create pages that are little more clean and professional looking than some of the other companies in this market. The image resizing tool reminds me of the one found in Apple's Keynote presentation software. In fact, TechCrunch said that it's “a basic webpage designer that Apple should envy...”

Web Node is a simple way to build a website. The easy to use, drag and drop, interface makes it easy to change the look and feel of your website. For two reasons Web Node is a good tool for students to use to present and share their work with a wider audience. First, Web Node does not put any advertising on your website. And second, the user interface is intuitive enough for first-time users to navigate on their own. 
What makes Jimdo such a good option is the wide array of templates, layouts, background options, and editing options. On many free website builders once you pick a template or design you're locked into all of the pre-defined parameters of that template unless you know HTML and CSS. Jimdo is different because it allows you to tweak the predefined templates and designs. Aside from the design options, Jimdo has some other integrated elements worth mentioning. Jimdo offers you the option to create a blog as an element of your website. You can also take advantage of email management options within Jimdo. Learn more about Jimdo in this video.