Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,163,679 members, 7,854,856 topics. Date: Sunday, 09 June 2024 at 08:54 AM

Hotkrich's Posts

Nairaland Forum / Hotkrich's Profile / Hotkrich's Posts

(1) (2) (of 2 pages)

Technology Market / Re: Quiz - What Do You Know About The Lg Xboom Xl7s Speaker by Hotkrich: 2:34am On Jun 07, 2023
GenMo4:
According to https://www.lg.com/africa/audio/lg-xl7s, mention five (5) places where the LG XBOOM XL7S Speaker can be used and stand a chance to win LG LK72B Audio system.



This audio system is simply the best for playing music at home, get together, parties, clubs and beaches
Crime / FG Destroys 5,870 Illegal Arms Recovered In Zamfara (photo) by Hotkrich: 12:27pm On May 15, 2018
The illegal arms displayed before destruction in Gusau, Zamfara State capital, on Monday, May 14, 2018

The Presidential Committee on Small Arms and Light Weapons in Gusau on Monday destroyed 5,870 illegal arms and ammunition recovered by the Zamfara Government.

The exercise marked the launch of the pilot stage of the destruction of arms and weapons recovered from persons who illegally held them.

The recovery in Zamfara was made from repentant bandits who surrendered their weapons to the state government Committee for Peace, Reconciliation and Disarmament, headed by the deputy governor, Ibrahim Wakkala.

The exercise which took place at Zamfara Trade Fair Complex in Gusau, was chaired by the chairman of the Presidential Committee, Emmanuel Imohe.

The event was attended by Zamfara governor, Abdul’aziz Yari and his deputy, Wakkala, representatives of international agencies such as the EU, ECOWAS and UNDP as well as security agencies and traditional rulers.

In his remark, Mr Imohe said the exercise was aimed at destroying a total of 5,870 arms and ammunition received under Zamfara state disarmament initiative.

“Apart from the destruction of illegal and recovered arms, one of the mandates of this presidential committee is also to improve livelihood of the people and communities that surrendered their weapons.

“Zamfara is one of the seven states in the country selected by the Federal Government for a pilot programme.

“This programme is also a flat form for raising awareness of dangers associated with the circulation of illegal weapons that have killed, injured and terrorised people all over the world,” he said.

Mr Imohe commended Zamfara for initiating the disarmament programme which resulted to the recovery of over 5,000 small arms, ammunition, grenades, automatic and semi-automatic weapons.

“I am happy to be associated with this laudable efforts made by Zamfara State Government. “I consider this as one of great achievements recorded by this committee, I thank the state disarmament committee led by the state Deputy Governor, Malam Ibrahim Wakkala, and all stakeholders who contributed to the success recorded.

“You know, this committee was inaugurated in April 2013 by the Federal Government with the mandate to be the focal point in the efforts of the country to address the movement of illicit illegal arms and light weapons.

“We are working with international organisations to conduct practical disarmament at border communities in the country and provide a support for repentant bandits,’’ he said.
In his remark, Mr Yari thanked the Federal Government for setting up the presidential committee and international organisations for their efforts for peace and stability in the state and country.

Mr Yari said the state had recorded many deaths, casualties and huge losses in economic activities as result of cattle rustling and banditry.

He said such losses necessitated the setting up the Peace, Reconciliation and Disarmament Committee by the state government.

“The Committee since inception has recorded great successes of recovering over 5,000 illegal arms and large number of repentant bandits across the state.

“We are witnessing the destruction of these illegal weapons today, we are going to continue to give all the necessary support to Federal Government and all stakeholders as regard to improvement of security in the state and country at large.

“We are going to provide authentic lists of repentant bandits and those who surrendered their arms and submit it to the Federal Government for assistance with the aim of changing their livelihood,” he said.

The Zamfara Government in an effort to address security challenges in the state in 2016 set up the Peace, Reconciliation and Disarmaments Committee.

Similarly, the Inspector-General of Police, Ibrahim Idris, in March ordered the recovery of all illegal arms across the country to check the deteriorating security situation.
Politics / ”only Someone From The Moon Can Defeat PMB In 2019” Governor Masari Says by Hotkrich: 12:23pm On May 11, 2018
As the 2019 general election draws near, Katsina state governor, Aminu Masari says only someone from the moon can beat president Buhari in the election. He said this in an interview with Leadership.

He says all the possible presidential aspirants in the opposition party, PDP, are known characters that would need a miracle to win the 2019 election.

”Well, unless someone is going to come out from the ground, of all the people we are seeing lining up in the PDP, they are characters known to Mr President and all of us.

We know their weight, capability and the resourcefulness of all of them. Unless from the moon or from the ground, there is no one to match the integrity of Mr President.

We are waiting for that miracle to happen but if these characters that are jumping from pillars to post, fortune hunters or power hunters, if you are talking about that kind of people, I am not the spokesman of the president but I assure you that the president is ready, and willing to confront them anytime, any day and anywhere.
Politics / Ladoja Sold Oyo’s N6.6BN Shares, Didn’t Remit N1.9BN – EFCC by Hotkrich: 12:17pm On May 11, 2018
The Economic and Financial Crimes Commission claimed on Thursday that a former governor of Oyo State, Chief Rashidi Ladoja, unilaterally gave instructions in 2007 for the sale of the state’s shares at a discounted rate of N6.6bn without an executive resolution.

According to the anti-graft agency, about N1.9bn out of the proceeds of the shares was not remitted to the state coffers.

Rather, the anti-graft agency claimed that the money ended up partly in the pockets of Ladoja, his family members, allies and some stockbrokers.

An investigator with the EFCC, Abubakar Madaki, stated this at the resumed trial of Ladoja for an alleged fraud of N4.7bn.

The former governor is answering eight charges alongside Waheed Akanbi, who served as the Oyo State Commissioner for Finance under him, before the Federal High Court in Lagos.

Led in evidence by the prosecutor, Olufemi Olabisi, Madaki tendered before the court the letter allegedly written by Ladoja to unilaterally approve the sale of the shares at a discounted rate.

According to the investigator, one Fountain Securities was the portfolio manager engaged by Ladoja to sell the shares at a discounted rate.

One McLace Securities, he said, was one of the stock brokerage firms which acquired shares from Fountain Securities.

Madaki added, “In the course of our investigation, about N500m was recovered from McLace Security, Fountain Securities and other stockbrokers, while the balance could not be recovered because some of those who purchased the shares were not even stockbrokers as highlighted by the report of the Nigerian Stock Exchange.

Further proceedings were adjourned till May 30 and 31, 2018.

In the charges, Ladoja and Akanbi were accused of converting a sum of N1,932,940,032.48 belonging to Oyo State to their personal own, using a Guaranty Trust Bank account of a company, Heritage Apartments Limited.

The EFCC claimed that they retained the money sometime in 2007, despite their knowledge that it was proceeds of a criminal conduct.

In another instance, Ladoja was accused of removing a sum of £600,000 from the state coffers in 2007 and sent it to Bimpe Ladoja, who was at the time in London.

The ex-governor was also accused of converting a sum of N42m belonging to the state to his own and subsequently used it to purchase an armoured Land Cruiser jeep.

He was also accused of converting a sum of N728,600,000 and another N77,850,000 at separate times in 2007 to his own.

The EFCC claimed that Ladoja transferred the N77, 850,000 to one Bistrum Investments, which he nominated to help him purchase a property named Quarter 361, Ibadan, Oyo State.

The EFCC told the court that Ladoja and Akanbi acted contrary to sections 17(a) and18 (1) of the Money Laundering (Prohibition) Act, 2004 and were liable to be punished under sections 14(1), 16(a) (b) and 18(2) of the same Act.
But the defendants have pleaded not guilty.
Education / Students Attack Teachers For Not Allowing Them Cheat In WASSCE by Hotkrich: 12:10pm On May 11, 2018
​The final year students of Zabzugu Senior High School in the Zabzugu District, Ghana, have attacked their teachers with stones and other dangerous weapons for not allowing them to cheat in their final year examination.

According to Adomonline, the angry students vandalised school properties, smatched doors, television sets, and windows. They said it was their right to copy or send texts books into the examination hall.

A student who did not want his name mentioned said, “Even though they did not have any pact with their teachers to allow them to cheat, they were reliably informed that teachers from other schools aid their students by allowing them to copy.”

A terrified teacher of the school while confirming the attack said the only crime they (teachers) committed was not allowing the students to copy during the West Africa Senior Secondary School Certificate Examination. He added that he was only alive because he didn’t take refuge in his house because the students went to his house with stones.

He said, “The students felt they had a right to send their notebooks and textbooks to the examination hall, a right they the teachers are yet to come across in any of the examination regulations.

“As a result, the students mobilized themselves and stormed the school, vandalizing properties and threatening to kill any teacher they came across.”

The teachers have therefore vowed not to supervise or invigilate the rest of the exams unless heavy security was provided.

But the District Chief Executive of Zabzugu Hon. Iddi Ahmed is has called on authorities to ensure that the problem between the students and the teachers is resolved.
Politics / Lawmakers’ Aides Give Buhari, Osinbajo 7 Days To Disclose Running Cost by Hotkrich: 7:05am On Apr 08, 2018
Aides of senators, Reps under the aegis of the Conference of National Assembly Legislative Aides (CONASSLA), have asked President Muhmmadu Buhari and the Vice President, Professor Yemi Osinbajo, to make their running cost public.
The request followed controversy trailing the statement by Senator Shehu Sani that senators receive N13.5 million as monthly running cost.
CONASSLA, a forum of current and former aides to members of the House of Representatives and the Senate, appealed to the Presidency, the Minister of Finance, the Minister of Budget and National Planning, and all other Ministers to disclose to the Nigerian people how much the President, Vice-President, ministers and heads of agencies and parastatals of the federal government receive as running costs.
The statement was signed by Abdullahi Almustapha and Funmi Oyekan, CONASSLA’s chairman and secretary, respectively.
“In the interest of full disclosure, and in-line with the transparency agenda of the President Muhammadu Buhari government, we call on the executive branch to publish the running costs of all the offices and… Continue Reading
Computers / Re: Windows 10 Problems And Solutions (official Microsoft Windows 10 links added) by Hotkrich: 6:44pm On Apr 06, 2018
Do you have any problem with you phone or pc? Click here now

1 Like 1 Share

Programming / Re: We Need Your Help And We Want To Help You! by Hotkrich: 6:38pm On Apr 06, 2018
For problem solving tips and tricks kindly on science and technology click here
Programming / Polymorphism In Java Oops With Example by Hotkrich: 6:35pm On Apr 06, 2018
What is Polymorphism?

Polymorphism is a OOPs concept where one name can have many forms.
For example, you have a smartphone for communication. The communication mode you choose could be anything. It can be a call, a text message, a picture message, mail, etc. So, the goal is common that is communication, but their approach is different. This is called Polymorphism.

In this tutorial, you will learn-

What is Polymorphism?
Java Polymorphism in OOP’s with Example
Method Overriding
Difference between Overloading and Overriding
What is Dynamic Polymorphism?
Super Keyword
Difference between Static & Dynamic Polymorphism

Java Polymorphism in OOP’s with Example

We have one parent class, ‘Account’ with function of deposit and withdraw. Account has 2 child classes
The operation of saving and withdraw is same for Saving and Checking accounts. So the inherited methods from Account class will… Continue Reading
Computers / How To Hack Wifi (wireless) Network by Hotkrich: 4:54pm On Apr 05, 2018
Wireless networks are accessible to anyone within the router’s transmission radius. This makes them vulnerable to attacks. Hotspots are available in public places such as airports, restaurants, parks, etc.
In this tutorial, we will introduce you to common techniques used to exploit weaknesses in wireless network security implementations . We will also look at some of the countermeasures you can put in place to protect against such attacks.

A wireless network is a network that uses radio waves to link computers and other devices together. The implementation is done at the Layer 1 (physical layer) of the OSI model.

How to access a wireless network?

You will need a wireless network enabled device such as a laptop, tablet, smartphones, etc. You will also need to be within the transmission radius of a wireless network access point. Most devices (if the wireless network option is turned on) will provide you with a list of available networks. If the network is not password protected, then you just have to click on connect. If it is password protected, then you will need… Continue Reading
Programming / Top 20 Tools For Ethical Hacking In 2018 by Hotkrich: 4:40pm On Apr 05, 2018
Hacking Tools are computer programs and scripts that help you find and exploit weaknesses in computer systems, web applications, servers and networks.
There is a variety of such tools available on the market. Some of them are open source while others are commercial solution.

In this list we highlight the top 20 tools for Ethical Hacking of web applications, servers and networks

1. Netsparker

Netsparker is an easy to use web application security scanner that can automatically find SQL Injection, XSS and other vulnerabilities in your web applications and web services. It is available as on-premises and SAAS solution.

Features

Dead accurate vulnerability detection with the unique Proof-Based Scanning Technology.

Minimal configuration required. Scanner automatically detects URL rewrite rules, custom 404 error pages.

REST API for seamless integration with the SDLC, bug tracking systems etc.

Fully scalable solution. Scan 1,000 web applications in just 24 hours.

2. Burp Suite

Burp Suite is a useful platform for performing Security Testing of web applications. Its various tools work seamlessly together to support the entire pen testing process. It spans from initial mapping to analysis of an application's attack surface.

Features:

It can detect over 3000 web application vulnerabilities.

Scan open-source software and custom-built applications

An easy to use Login Sequence Recorder allows the automatic scanning

Review vulnerability data with built-in vulnerability management.

Easily provide wide variety of technical and compliance reports

Detects Critical Vulnerabilities with 100% Accuracy

Automated crawl and scan… Continue Reading
Programming / Skills Required To Become An Ethical Hacker by Hotkrich: 2:26pm On Apr 03, 2018
Skills allow you to achieve your desired goals within the available time and resources. As a hacker, you will need to develop skills that will help you get the job done. These skills include learning how to program, use the internet, good at solving problems, and taking advantage of existing security tools.
In this article, we will introduce you to the common programming languages and skills that you must know as a hacker.
Topics covered in this tutorial
*What is a programming language?
*Why should you learn how to program?
*What languages should you learn?
*Other skills
*Summary

What is a programming language?

A programming language is a language that is used to develop computer programs. The programs developed can range from operating systems; data based applications through to networking solutions.

Why should you learn how to program?

*Hackers are the problem solver and tool builders, learning how to program will help you implement solutions to problems. It also differentiates you from script kiddies.
*Writing programs as a hacker will help you to automate many tasks which would usually take lots of time to complete.
Writing programs can also help you identify and exploit programming errors in applications that you will be targeting.
*You don’t have to reinvent the wheel all the time, and there are a number of open source programs that are readily usable. You can customize the already existing applications and add your methods to suit your needs.

What languages should I learn?

The answer to this question depends on your target computer systems and platforms . Some programming languages are used to develop for only specific platforms. As an example, Visual Basic Classic (3, 4, 5, and 6.0) is used to write applications that... Continue Reading
Computers / Potential Security Threats To Your Computer Systems by Hotkrich: 6:45pm On Mar 31, 2018
Lesson Two.
A computer system threat is anything that leads to loss or corruption of data or physical damage to the hardware and/or infrastructure . Knowing how to identify computer security threats is the first step in protecting computer systems. The threats could be intentional, accidental or caused by natural disasters.
In this article, we will introduce you to the common computer system threats and how you can protect systems against them.
Topics covered in this tutorial
*What is a Security Threat?
*What are Physical Threats?
*What are Non-physical Threats?
What is a Security Threat?
Security Threat is defined as a risk that which can potentially harm computer systems and organization.
The cause could be physical such as someone stealing a computer that contains vital data. The cause could also be non-physical such as a virus attack. In these tutorial series, we will define a threat as a potential attack from a hacker that can allow them to gain… Continue Reading
Programming / Free Online Ethical Hacking School by Hotkrich: 2:19pm On Mar 31, 2018
If you have always dreamt of becoming a hacker, this is your chance. Join our ongoing online school now. Guess what, it's absolutely free. [url=https://krichtech..co.ke/search/label/HACKING%20SCHOOL?&max-results=7]Get Started[/url]
Phones / How To Fix Unfortunately App Has Stopped On Android Phones by Hotkrich: 7:34pm On Mar 29, 2018
There is one problem that plagues beginner and advanced Android owners alike: the cursed Unfortunately, (fill in app name here) has stopped error message. It appears when you're in the middle of using an app, and then forces that app to close. Annoying, right? Fortunately, there is a way to stop it. Here's how to fix Unfortunately, app has stopped errors.

Try These Solutions

• Clear out the app's storage
• Uninstall and reinstall the app
• Turn it off and on again
• Last resort: do a factory reset

Clear out the app's storage

This problem often arises with the contacts, gallery and launcher apps. The procedure to fix this is generally always the same.
• First, navigate to Settings on your device.
• Go to Applications > Application manager.
• Swipe left until you find the… Continue Reading
Phones / How To Track A Call, Text Message Etc On Android Phones by Hotkrich: 5:21pm On Mar 28, 2018
You want to find a call tracker program that is good to guard your children and family members, but there’s simply so much distinct and contradictory information out there.
Instead, GuestSpy can make that specific wish come true. This is an extensive call tracking and spy software for other mobiles, iPhone and Android.

Our assignment will be to give the very best information possible to you. We’d really appreciate if you posted in the comments about striking this kind misleading reviews, your stories, so we could warn the public. We also require your feedback about your usage of cell phone Call tracker programs, to ensure we can improve our ratings.

GuestSpy is a program that works on many phones with the majority of providers.

To download the app, you can visit http://guestspy.com.

Once you’ve installed GuestSpy, open the program and... Continue Reading
Phones / Re: Phone Engineers On Nairaland Willing To Assist You - Part II by Hotkrich: 1:09pm On Mar 28, 2018
Did you know you can change your phone screen yourself? Here's How
Phones / Re: Phone Engineers On Nairaland Willing To Assist You - Part II by Hotkrich: 12:43pm On Mar 28, 2018
Did you know you can repair your phone mouthpiece yourself? Learn More
Phones / Re: Android, Anyone? Part II by Hotkrich: 12:26pm On Mar 28, 2018
Click [Here] For Secret Android Codes.
Phones / Secret Codes For Android Mobile Phones by Hotkrich: 1:10am On Mar 28, 2018
Many people are searching for secret codes for Android Mobile Phones. Many website provide correct information while others provide false and useless information.

It is recommended that you use only genuine and useful secret codes from reliable sources. I try my best to provide correct and useful information on this website.

When I first bought my New Samsung Galaxy SII Android Mobile Phone, I was excited and curious to learn about Android. It took time for me to learn but now I must admit that Android is the best Operating System for any Mobile Phone, Tablet or Phablet. The simple and easy to use User Interface makes it the leader.

The Android secret codes mentioned here are... Continue Reading
Computers / 10 Common Windows 7 Problems And Their Solutions by Hotkrich: 12:58am On Mar 28, 2018
We like Windows 7: it's faster than Vista, makes better use of your system resources, is packed with interesting features, and looks great, too.

But that doesn't mean it's perfect, of course. If you've moved to Windows 7recently then you might have noticed various upgrade problems, interface issues and features that seem to have disappeared entirely, among many other complications with the new system.
Don't despair, though - while these problems can be really frustrating, answers are beginning to appear. We've uncovered some of the best and most effective solutions around, so follow our guide and your Windows 7 installation will soon be back on track.
1. Vista upgrade hangs at 62%
Windows 7 can start causing problems before it's even installed, as many people report their upgrade hangs forever at 62%. Which is annoying.

Reboot, and your PC should roll back to Windows Vista. You can then open the setup log file \$WINDOWS. BT\Sources\Panther\setupact.log to view what happened. Microsoft say this is usually caused because the Iphlpsvc service has stopped responding, and just adding an environment variable to ignore it will fix the problem. Point your browser at http://support.microsoft.com/default.aspx/kb/975253 for the fix.
If this doesn't help... Continue Reading

1 Share

Computers / Common PC Keyboard Problems & Solutions by Hotkrich: 7:00pm On Mar 26, 2018
The keyboard is a vital link between a computer user and the screen. If the keyboard stops working, that does not necessarily mean you need to replace it. Users can solve some common keyboard problems.

Hardware

If keys stick or certain keys become unresponsive, dust and dirt are likely causes. Turn the keyboard upside down to try to release the dirt trapped inside. If that doesn't fix the problem, use compressed air to spray a jet of air between the keys, releasing any debris.

Software

Keyboard layouts, set by the operating system, use different alphabets and accented letters... Continue Reading
Phones / Apple May Be Making A Foldable Iphone Within The Next Two Years by Hotkrich: 5:51pm On Mar 26, 2018
Apple is reportedly working on a foldable iPhone to be released within two years, a Wall Street firm said today. Bank of America Merrill Lynch says Apple is working with Asian partners to make a whole new iPhone design, as reported by CNBC .

Senior analyst Wamsi Mohan wrote a note to clients today after meeting several Apple suppliers in Asia. “We expect the iPhones this fall to be largely unchanged for the OLED versions although size changes have proved to be a catalyst in the past,” Mohan wrote, “Our checks also suggest that Apple is working with suppliers on a foldable phone (that potentially could double up as a tablet) for launch in 2020.”

A Korean media outlet reported last October that Apple was teaming up with LG, but that report only... Continue Reading
Computers / Solutions To 10 Pc's Most Common Problems by Hotkrich: 8:30pm On Mar 21, 2018
Before you start troubleshooting your technical problems, restart your computer – you’d be amazed at how many problems a reboot solves.

After you’ve restarted the computer, make sure that your operating system is up to date. Sometimes the problem is a result of an old version of some file or another, which an update can correct in minutes.
Making sure that your Windows Update feature is active help in fixing bugs and improving system performance.

If you have a peripheral that is misbehaving, try turning it off and on again. Problematic USB devices can be switched to another USB port.
Now that we’ve exhausted the basics, let’s deal with the 10 most common PC problems.

1. Slow Computer

First, you need to know that videos or websites that take a while to load are not necessarily slow because of your computer; they can also affected by network interferences. If your computer is slow in opening programs, things stall or hang while in use, or the boot up process takes more than a couple of minutes, then you might have a slowness problem on your hands.

Now, once you’ve established that the computer is the culprit, check the main suspects - A Full Hard-Drive (HDD) and too many processes running in the background .

When the hard drive that holds your operating system (usually designated as C: ) is full, the operating system can’t write files quickly, as it needs to search and allocate space for it. The searching process takes time, which will result in a slowdown of your system’s performance. Delete any unneeded files such as movies, photos, music, or move them to another hard drive.

Use a program like Visipics to remove any duplicate images. Uninstall any programs you don’t use anymore.

Alternatively, having too many processes running in the background will also slow down your computer, as they require both computing power, as well as the faster, short-term memory – RAM. To clear it, click on the start button, in the search field, type: msconfig and then go to the “Startup” tab. Now, you don’t want to unmark anything that is a Microsoft process. What you should look for are names like Google Update, AdobeAAMUpdater, Steam Client Bootstrapper, Pando Media Booster, andSpotify . These can be unchecked, and you should be able to feel the difference after a startup.

2. The Internet is Slow

Feeling like your downloads, browsing, and streaming music and videos takes too long? Check that your slowness is Indeed, network related. Go to Speedtest.net and run a test to see if you are getting your package’s worth of speed or not.
Minimum speeds should be at least 50% of the ISP’s advertised speeds, and your ping should be under 100.

If your results do not correspond with these, then something is hogging your bandwidth, or there’s a network problem. First, check to see that there aren’t any torrent clients running in the background. They will often minimize to the tray and continue downloading and uploading files, which uses a lot of bandwidth.

Next, check that your network card’s drivers are up to date (if you haven’t updated your operating system, this might be the time). Next, try turning your modem off and on again. If it has no On/Off button, just unplug and plug it back in.
If none of this helped, call your ISP and tell them there’s a problem on their end, and let them fix it.

3. The Computer Keeps Restarting

This could just be the result of a series of Windows Updates, which require several reboots sometimes.

Take a look and see if the restart process mentions “Updating Windows”, if so – just have some patience, it’s worth it.

Now, another cause might be mechanical – Is your computer making odd noises? Is it unusually hot? If your computer is not brand new, you might need to clean the dust that accumulated inside the box. To do that – follow our computer cleanup guide. If the problem persists after cleaning the computer, run a
virus scan and a malware scan.
Once you’ve exhausted all of these tests, consider taking your computer to a specialist.

4. I’m Getting Pops All the Time

If you’re not browsing the internet, yet are still getting popup ads, it’s most likely a form of malware called “Adware”. These are sneaky programs that can be tricky to get rid of. As in #3, run a virus scan and a malware scan, and search online for “(advertiser name) adware removal” – you should be able q find a solution.

5. My Search Page Looks Weird

There’s a type of malware called “Browser Hijackers”, which take over your browser and direct you to sites they want you to see, for which they usually get paid. These nasty pieces of software also steal your private information, such as searches, personal details, and even credit-card number. Follow the instructions in #4, but if all else fails, go to a specialist.

6. I Keep Disconnecting From the Wi-Fi

Wireless problems can occur because of several reasons (router, computer, ISP). If your Wi-Fi signal is weak, it can cause disconnections and slowness, so make sure you’re in range and are getting decent reception. Next check that your computer’s wireless adapter has up-to-date drivers. If none of this works, call your ISP and see if they can help.

7. Constant “Security” Warnings While Browsing

While this may be one of the most annoying problems, it’s also incredibly easy to fix. Check that your computer’s clock shows the correct time and date. If it doesn’t, right-click on the clock and select “Change date and time settings” to correct it manually.

8. The Printer Won’t Print

If your printer has ink, paper, and updated drivers, try unplugging it, then plugging it back in. If the problem continues, double-click on the printer icon on your taskbar and check to see what the printing queue says. Click on the “Printer” menu item in the printer window and make sure that “Use Printer Offline” is not checked – this will stall the printing queue.

9. Email Attachments Won’t Open

If you can’t open the attachment, it’s probably because you don’t have the right software. You can always google the type of file it is (such as .PDF, or .RAR) to find out how to open it, or use this site to find out what the file is and how to open it.

10. Why Doesn’t This Program Work on My New PC?

If you recently upgraded your computer, it’s possible that the old program is not compatible with the new operating system on your computer.
If you’re using an old installation file, try searching for a new version online. Additionally, if you’ve changed from a PC to a Mac or visa verse, then you should know that the two systems are incompatible, so programs from one won’t work on the other.

If it’s an online game that is driving you crazy, maybe you need to update your Flash or Java plug-ins.

Source :- Krich Tech
Phones / Fix Your Phone Mouthpiece Yourself by Hotkrich: 2:30pm On Mar 21, 2018
This question is often asked by both phone users and technicians alike. Is there a simple way of repairing a mobile phone MIC? In this article, we will consider the following.

How to Fix Mouthpiece On Android.

. What is MIC (Mouthpiece)?
. When a MIC is Really bad
. How to fix a bad MIC

Note: MIC in this article refers to Mouthpiece.

When a MIC is Really bad

It is not difficult to tell if a phone’s mouthpiece is faulty, whether for MOS or android phones. It simply won’t record sounds or allow the receiving end of a call to hear what you say. After making sure that the receiving end of a call’s earpiece (REC) is working and the volume is adjusted to normal, it is then safe to conclude that the MIC is bad and needs replacement.

In some android phones, there are two mouthpiece. The upper mouthpiece in the panel of the phone for sound recording and the bottom mouthpiece for forwarding sounds during calls to the other end. If the bottom MIC is damaged, sounds can be successfully recorded and heard when played, but the receiver of a call wont be able to hear what you say.

How To Fix a Bad MIC

There are generally two types of mouthpiece used for mobile phones.

The two-legged mouthpiece and the four-legged mouthpiece also known as the golden mouthpiece. The latter is more difficult to fix when compared to the first one.
We are going to talk about the two legged mouthpiece in this article

The Two Legged Mouthpiece

It is really easy to replace this mouthpiece. The only major tool needed is the soldering iron.

Soldering iron is needed for this mouthpiece if it uses wire terminals, if not, the hot air of a rework station is needed to remove the faulty sited two legged MIC and then replaced with the two legged wire terminal MIC using a soldering iron.

Source:- Krich Tech

Phones / Repairing A Broken Screen Glass by Hotkrich: 1:22pm On Mar 21, 2018
Repairing a broken screen glass can be very expensive project to do.

Finding a dealer that will change the glass is not a problem, but the price they charge is just really too much for the work and the spare parts is how to do that on your own and making it cost a fraction of the price AND mostly it can be done in under 15 minutes.

The phone used to demonstrate this is my wife's Nokia Lumia 625. The screen in this one cracks very easily. My 3 year old brother dropped it on the floor from about 30 cm height and it just cracked. The main reason to this is that the glass goes over the phones plastic edge so nothing is protecting the glass.
First thing first.

Where do i get a replacement glass for the phone?
Well, i think it's time to check out what eBay has to offer..

Okay. Now we have the spare glass.

There is not really much tools that you will need. You will need a screwdriver (the ordered glass had one for free inside!!) and a 100% plastic playing card or something that is as thin.

Step 1. Disassemble The Phone

The screwdriver was not the only free item in the box. It also had that blue plastic flap. I don't remember the name for it but it is used in disassembling for plastic parts since it wont leave any marks.

Taking apart the phone is in this case is very easy. Just remove the back plate and then take the screws off.

After that use the plastic flap to pry the phone open. Search for a small "holes" in the sides and push the flap in there. It will crack open. Then remove the battery and the touch screen cable. Remember the position of the cable for easy remove of the glass. Mostly it's on top of the phone.

Step 2. Remove The Broken Glass

This is the hardest part. Do this wrong and you wont get a picture ever in your phone.

If you have and TFT or LCD screen in your phone the risk is not big. BUT if your phone has got an LED display like AMOLED or any other type of LED screen be very careful. If an LED display is touched with any force it will break.

The glass is attached to the phone with two side tape from the side of the screen. Remove this and the screen will fall out.

To remove the tape and separating the glass from the phone can be done with plastic playing card. Yes, you heard me right. The playing card is thin enough to fit between the phone and the glass and its hard enough to cut the tape in there. Start by inserting the card in the lower corner of the phone and start pushing it inside.

Most safe method in this is when you have the one corner free put the playing card sideways and start swinging it in. Work your way up as you feel the tape is giving up.
I used only one playing card to remove this glass it's good to have few spare in the reach.

Step 3. Insert New Glass

Well done! The screen is now off and the phone is waiting a new one. Remove as much old tape as you can from the sides of the phone so the new glass will fit on the phone neatly remove the inner protection film from the glass. Remember that removing this will also remove the film from the tape in the new glass.

Push the glass touch screen cable trough the phone before pushing the glass on the phone.
Put the cable in the correct place and insert the battery on the phone( in this Nokia the battery is inside the phone).
Test the phone that it still works.

Step 4. Assemble The Phone

Assembling the phone is just the reverse as before. Put the screws back in and hope for the best.

The phone works fine and the glass is smooth AND most importantly the touch screen works like a charm

(1) (2) (of 2 pages)

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 104
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.