Author: Swadesh Parasher

  • New Turing phone Cadenza will have dual CPU, 12GB Ram, 60MP Camera, 1TB storage and other unbelievable specs

    New Turing phone Cadenza will have dual CPU, 12GB Ram, 60MP Camera, 1TB storage and other unbelievable specs

    The Internet is full of lies, even so, to believe when we get deceived by pretentious fanboys who don’t hesitate to confidently pull out some unbelievable facts or information for us to digest. If it wasn’t the official statement from the Turing Robotic Industries (TRI), we could never have believed that someone is actually working on the specifications this insane.

    A couple of news websites shared the same bafflement when they heard that Turing is working on a new smartphone with specifications so unrealistic to believe. The TRI CEO & Chief Architect, Steve YL Chao, sent a newsletter email highlighting the ‘blueprint program’ for their next Turing phone “Cadenza” after finishing up the development and delivery of world’s first liquid metal mobile phone.

    TRI is embarking on another challenge to build the unimaginable. – CEO

    If the company actually succeed to pull this off, it will undoubtedly become the best smartphone in the world. Needless to say, it has the potential to disrupt the mobile industry. So, what is it that everyone lost their mind to? Well, it has to do something with their claim to carve unimaginable into reality; and in their own words, “bringing the Turing Phone Cadenza from the future to the present.”

    Turing phone cadenza specifications 2x Snapdragon 830, 60MP Camera, 12 GB RAM and 1 TB Storage

    For instance, how do 60MP camera and 2x256GB internal storage with 2x256GB microSD (Total 1TB Storage) slot sound to you? and, What about 12GB (2x6GB) LPDDR4 RAM? If that’s not all, the smartphone is promised to ship with two Snapdragon 830 that has 16 beautiful Kyro cores, which is not actually on the market yet.

    If you are starting to ache from all these specs, then what’s next will push you towards borderline insanity. The camera setup comprises a total of 60 MP using a quad sensor array for the rear, and the front camera will have a dual 10MP sensor setup to deliver a 20 MP front camera experience.

    The company wants to power this with a 2400 Graphene power cell battery mated with a 1600 mAh li-on battery and a Hydrogen Fuel Cell (umm … Yeah!). The battery setup will deliver a total of 100wh of juice. The phone will also offer a dual-dual SIM card slot setup, which means you can use four SIM cards at the same time. TRI has not confirmed that you can make four calls simultaneously, but you probably can.

    It would be interesting to see how they manage to lower down the total weight of the actual final device with all these extra dual setup modules; I bet it’ll weigh more than 250g. The company is aiming to release this mind-boggling smartphone in 2017. So, we will find out pretty soon if it is actually possible to pull out something like this.

    We’ll admit, it’s honestly like someone at TRI just put together a spreadsheet of buzz words and the Ridiculous collection of specs just to see what they can play with. If this was faked, then it was very well-executed.

  • Logitech k230 Compact Wireless Keyboard can be your budget travel companion [Review]

    Logitech k230 Compact Wireless Keyboard can be your budget travel companion [Review]

    Logitech K230 is a clever little wireless keyboard that boasts some very interesting features. As we all know these products don’t always afford to deliver what they advertise as a prime feature. It will be great to see how this keyboard stands for its remarks, especially when it claims to offer some crucial proficiency, such as whisper-quiet keys, long battery life and being compact without compromise.

     The Good  The Bad
     Plug and play  No Caps/Num lock indicator
     Long battery life  Up/down key is small
     Compact design  Some Function (Fn) shortcut keys are missing
     128-bit AES Encryption  Not as quiet as advertised

    Design & Impression:

    Having a curious mind is a bless and curse at the same time as I can’t afford to be patient for anything. My mind always looks out for answers to my question crafted by my unstable brain. So, while the shipment was still on the way, I couldn’t resist going through all the websites where users have shared their views and experience with the keyboard. I had so many questions, viz., Is it compact enough? Can I use it while lying on my bed without interference? Will it work with my Logitech M235 Wireless mouse via Unifying connector? The top row of the keyboard seems so small in pictures, how will it affect my usage? Battery Will really last 18 months? and so on.

    I couldn’t wait to unwrap and test the keyboard when it finally arrived. I took it out from the box relentlessly and downloaded Logitech Unifying software, paired my keyboard and Mouse with single USB receiver and it worked; even so flawlessly. In fact, every single keystroke made to express my thoughts about this gadget is an input from it.

    Logitech k230 Wireless keyboard on table unifying connector logitech mouse m235 wireless

    I am delighted to have this keyboard as my daily driver, as it does what I intend to do without it placing itself as an obstruction. The compact design allows me to carry it in my backpack (yes, I have actually tested it) along with my mouse, power cords, the laptop and few clothes if I have to leave for more than a day.

    Logitech has added a little personalization option as three swappable battery slot covers. These plastic covers are shipped in three colors; blue, pink and light gray, which can be switched according to the interior of the house or most preferably, your mood.

    IMG 20160719 190328

    It actually ingeniously hides the battery slot situated at the front left of the keyboard, which otherwise could be very plain-looking. There are two pre-bundled AAA sized batteries to power the device, which according to Logitech will be sufficient for 24 months of usage or 4 million keystrokes. My previous keyboard from Microsoft couldn’t even manage to run for 6 months, while they actively advertised it to be capable of providing 15 months of battery life. Whether or not Logitech holds true for its claim is yet to be seen, but I will still categorize it as an added bonus if it manages to give half of the juice it claims.

    IMG 20160719 190345

    The body of the keyboard is made up of plastic, however, it doesn’t feel cheap. I do admit that it isn’t one of the sleekest devices out there but the infusion of chicklet and the standard layout is wonderful. This keyboard is designed differently, yet it manages to intrigue me every day. There are thin bezels on the top and right side and battery cover on the left, while the bottom of the keyboard has it all bare, unprotected; living a very dangerous life (if you know what I mean). I took few days to get used it, maybe because my previous keyboard had a really thick bezel around it.

    IMG 20160719 190132

    However, when I finally realized how amazing it is to type with this gadget and ditching the bezel at the bottom might be the best thing they did with the design because it makes unbelievably easy to clean the keyboard; Just shake and tap the keyboard while holding it vertically and you’re good to go.

    IMG 20160719 190151

    The keys on this compact device are not as silent as the company would tell you on their list of product’s features. The built-in AES 128-bit encryption makes sure that your data is safe and nobody can intercept the keystrokes that you send to your computer wirelessly, which is a welcome quirk. The top row (function keys) is very narrow and sometimes can be a little nuisance. It also lacks many anticipated keys that you’d expect on a wireless keyboard (including display brightness adjustment and wifi switcher etc.), more so if you’re using it for your laptop.

    IMG 20160719 190142

    Additionally, there is no LED indicator for Caps/Num lock buttons, which is preferred by many people to be included for convenience. It wasn’t a deal breaker for me, but I can understand if you’d want to look somewhere else for that matter.

    What do we think?

    IMG 20160719 190429

    Logitech K230 Wireless Keyboard (PN 920-003357) may not be the best keyboard you can have in the same price range, but I am sure it can make its way to the top 5 in the list. Comparing it with the premium keyboards that cost 2-3 times more would be unethical. There is some downside to it, however, the overall feature and quality you’ll receive for the money invested will be 100% justified.

    Buy it From:

    Amazon India

    Amazon US

  • Hexlock: A free All-in-One App locker for Android by liquidum

    Hexlock: A free All-in-One App locker for Android by liquidum

    It seems that the prevalence of technology has held on to the entire world of mankind. Undoubtedly it is creditable for the globalisation where the majority of people count on modern technology. For instance, the mobile phone has become the necessity of not an only amateur to renowned businessman but also the habitual need of all the people who use mobile gadgets to store valuable assets like bank info, private messages, videos, photos etc. Indeed, the  misuse of our private information can  afflict our career and personal life  following this, we ought to adopt safety majors to inflict unwanted  trouble and certainly  there are lots of app lockers available on the play store  as well as lock option  given by the android. While sometimes we may have to hand over our device to someone by unlocking it thereby we must pick and choose the  an : appropriate app to secure our sensitive catalogue. Here I’m referring to HEXLOCK a free app locker which has unique features that dramatically protects your privacy by setting a pin. Pattern or fingerprint.

    googleplay-tablet-screenshot 09

    Of course, Hexlock is a 100% free app locker that secures app with a password to prevent unauthorised access. Users can create up to six unique profiles to cover every situation each with a different colour and logo. These at Work, Home, Cafe, Party, Parental, and School and activate them automatically when connected to a known Wi-Fi. Additionally, you can customise your profile name as suitable to you as well as their colour combination and icon and you may set different apps to be locked under that profile. It also comprises a new feature called Media Vault that lets users protect their photos and videos in a locked private file.

    googleplay tablet screenshot 01

    Obviously, it may be annoying to keep a password on your phone every time when you unlock it. However, Hexlock manages to ease this problem by setting up fascinating features of locking individual app. In fact, we all have different scenarios in our life where we want certain apps to be accessible or not accessible for instance when you have to give your phone to kids or young relatives you won’t have to worry about important folders being deleted or buying games without your knowledge and cherry on top the app cannot be uninstalled by other if someone steals your phone. Fairly, it falls in with the protection of social network, for example, you can lend your device to anyone without being worried that they will check your facebook, WhatsApp etc.

    googleplay tablet screenshot 04

    Admittedly, another remarkable speciality of this app locker includes Self-active hallmark which automatically activates when connected to the selected network. Besides, the profile automatically deactivates when using a different browser or while switching off to wifi network from mobile data and vice versa. On the other hand, the persistent notification to unlock not only every app but also while reading something for a longer time may really be irritating to some people.

    googleplay tablet screenshot 08

    Overall, Hexlock stands out impressive due to its peculiar features of individual app locking system which are certainly applicable for all android users to keep up their privacy. Indeed, it is a surplus of beautiful design, customizable profiles with the possibility of locking app by pin, pattern or fingerprint.

  • RocketVPN: A free Android & iOS exclusive VPN app by liquidum

    RocketVPN: A free Android & iOS exclusive VPN app by liquidum

    VPN and other internet anonymity tools have become a norm after witnessing the activists and social benefactors, highlighting the government/private organisations responsible for breaching the user privacy. Edward Snowden and Wikileaks Top Secret documents made it clear that privacy is just a hoax as it was brought to the spotlight that our own government is monitoring online user activity and phone calls. Using VPN or similar tools to encrypt our important data while accessing the internet on the public network has become a necessity. Well, this article is not about how we ended up like this, but to discuss one such anonymity tool called RocketVPN.

    See Also: Access any blocked website with Free Google Chrome extensions

    Rocket VPN is a free app (in-app purchase required for unlimited data) for Android that encrypts your data, unblocks geographically restricted content and keeps you anonymous for a safer, better browsing experience. RocketVPN is particularly designed to encrypt Android and iOS smartphone’s network, which is a good thing and a tradeoff for some. It is nice to have an app specially designed for major smartphone platform as it will integrate with it flawlessly, however, for power users who prefer “One plan for all” would be disappointed.

    Rocket VPN iOS SC 4

    RocketVPN is an application developed by renowned developer liquidum, dedicated to designing, developing and marketing innovative utility apps for the mobile market, including The Cleaner, Rocket VPN, Hemlock and Battery Time for Android and Presto! and Fast for iOS. Liquidum’s apps are distributed through the Google Play Store and Apple App Store and have been downloaded over 30 million times.

    See Also: Hidester Proxy Site offers best Fast, Free & Premium Proxy list Service

    RocketVPN like any other VPN is capable of securing the network from intruders and data snooping while lifting the restriction imposed by the ISP (Internet Service Provider) or websites. The popularity of the app can be determined by the fact that it has already been downloaded up to 5 Million times on Google Play Store.

    The two main features of a VPN that make it a powerful tool of privacy: Firstly, Your data is encrypted, meaning that you can browse the Internet over unsecured Wi-Fi networks (like at Starbucks) without worrying, or you can rest assured that your ISP isn’t spying on your Web activities.

    rocketVPN

    Secondly, you can bypass geo-restrictions. Americans can access the UK-only BBC iPlayer, Indians can access US-only services like Netflix, and so on. Not only can your location not be tracked, but the contents of your data can’t be either. This will really help you browse the Web anonymously.

    During our test, we noticed some drop in overall speed but it is evitable for any VPN network depending on the location of the server you choose.

    speedtest rocket vpn

    The minimalistic material UI and interactive environment do the trick while still holding some pleasant animations. However, it does not offer unlimited free data usage. You’ll have to buy the subscription starting at $2.99/month or $29.99/year if you are expecting to exceed 500MB monthly data limit.

  • Hidester Proxy Site offers best Fast, Free & Premium Proxy list Service

    Hidester Proxy Site offers best Fast, Free & Premium Proxy list Service

    I have reviewed many VPN and web proxy services in the past, but you’d find a very few of them offering a free service that can be used conventionally anywhere, on demand. Recently, while I was in Jaipur, India, I encountered an internet service provider which was very restrictive about the websites I visit using their connection; blocking many P2P and media streaming websites. Typically, I would use one of the many VPN services that I am subscribed to, but unfortunately, I didn’t have access to my computer, which means none of the VPN credentials were available at my disposal. I tried using some web proxy services such as Kproxy, Hidemyass and proxy site among many others but sadly, none of them could properly render all the website I visited. Most of the web proxy servers do no process the complex queries required for some section of websites to work in a manner that it would have with our regular internet connection.

    This is where I felt the need to use public/premium Proxy IP addresses, which once was my favourite anonymity tool to hide personal data while accessing some websites back in high school. Public/premium Proxy IPs works very differently than VPNs as it is limited to your web browser, while traditional VPNs encrypt all your incoming/outgoing traffic to or from your computer.

    What happens when you visit a website without Proxy or VPN services:

    In order to access the website, you are connecting directly to the server where the resources of the website are stored. The website and your ISP can log following information that can be used to uniquely identify every user who uses these resources.

    illustration of connection between ISP and web server without proxy

    • It knows your external IP – that’s a piece of information about you, probably not enough to identify you with certainty, but enough to find out your approximate geographical location.
    • It knows the cookies you have on your computer – you may delete them later, but you definitely don’t delete them each time you load a website.
    • It knows what browser you’re using and what plugins you have installed. Every time you visit a website, your browser sends the User-Agent string which can be used to identify a browser, its version, OS version, and sometimes installed browser extensions.
    • It knows where you’re coming from. An HTTP referrer (sic!) is sent each time you click a link. Basically, when you navigate from one site to another, the target site will know the URL or previous site.

    Additionally, there are more advanced tracking algorithms that just won’t be easy to shrug off when you require a total anonymity or bypass your ISPs restrictions. Yes, there are tools that can help you block cookies, UAs, and referrers in your browser, but there are more programs that use HTTP. Most of these programs won’t let you hamper the inbuilt settings and mechanism of their service protocol.

    Using VPN and Web Proxy services to lift ISP restrictions and hide personal identity

    Online VPN services, VPN providers, Web proxy, Socks Proxy and Proxy sites are some of the most effective tools that can help you get rid of the restrictions imposed by your ISP and help keep your identity safe on the internet.

    We have reviewed plenty of VPN services on our website, which can be trusted to handle our precious personal details. At the end, we really have to be careful that the company we choose must be capable of handling the individual information anonymously without any data leak.

    If anonymity is not your concern then you can use some of the best free Online VPN extensions for available for your browser, which is ranked according to their reputation and efficiency on digitfreak. These browser extensions work very similarly to the proxy IPs that we are going to use, as they only encrypt the traffic of your browser it is installed on.

    How proxy IP helps hide your true identity?

    A proxy (technically an open proxy) server is a computer that acts as an intermediary between your computer and the internet. Any traffic routed through a proxy server will appear to come from its IP address, not your computer’s.

    illustration of user computer connecting to a web server bypassed by a proxy IP

    Unlike VPN, proxy servers don’t usually encrypt your internet traffic which allows them to handle large user pool with insignificant resource requirements.

    If you use Proxy server on your browser, it can alter your internet connection to hide your true identity or remove any ban imposed by the ISP:

    • It can replace the User-Agent string with some meaningless string or strip out the referrers.
    • It can accept all cookies, but not pass them to you, or it can block them altogether.
    • It’s the proxy that’s connecting to the server, not you, so your IP isn’t disclosed.
    • A proxy can be set up to work system-wide, so programs won’t be able to bypass it.

    There are also some extra features that a proxy can provide:

    • It can compress your traffic to save some bandwidth.
    • It can cache files to give a little boost to page load times.
    • It can strip ads from websites before they reach your computer.
    • It can block malicious websites.

    And finally, it can be used not only against filters but also as a filter!

    HTTP and SOCKS proxy

    Web Proxy services utilise one of the two different protocols to connect with the internet. The HTTP and SOCKS work very differently as they are capable of handling a different level of internet protocols.

    The HTTP protocol is designed to interpret traffic at the HTTP level, which means that it can only handle traffic that starts with http:// or https://, i.e. web pages*. Whereas the SOCKS servers do not interpret network traffic at all, which makes them much more flexible, but because they are usually handling more traffic, usually slower. The big advantage of the SOCKS protocol is that it supports any kind of internet traffic, such as POP3 and SMTP for emails, IRC chat, FTP for uploading files to websites, and torrent files.

    Best Free & Premium Proxy IP list

    On my quest to find the best free proxy IP list, I stumbled upon the website called Hidester – “Free Public Premium Proxy List (https SSL, socks 4/5)” among many others which offer useful free tools. Hidester has a section on their website that lists all the active proxy IPs documented according to various categories and efficiency.

    2016-06-09 17-34-50

    The powerful search option and elegant website design make it easier to find the suitable IP address according to our preference. It feels much better and refreshing when compared to other popular proxy lists available on the internet. However, I don’t want you to get confused or mislead by the fact that this website has a fluid user interface and likeable interactive environment with the ability to choose any IP from the list blindly and think that it will work. It is true that Hidester does check all the IP addresses for their availability and performance (especially the premium ones), but not all of them will work. In my test, I had to test out few of them before I found the working Proxy IP that was in the list of filtered IPs matching my search criteria.

    2016-06-09 17-35-26

    One you find that perfect public IP address, you’re good to go. After that, you basically have to put it in your browser and forget about it. Unless you want to browse the internet with your real IP address for some reason.

    Surprisingly, I didn’t notice any significant drop in my speed. Maybe, I was lucky to pick the Public Proxy IP that had perfect infrastructure to back it up, or the Hidester does actually make a list that includes only fast Proxy Servers.

    You can test it out and let us know in comments whether you had a similar experience. I would love to hear if others get as lucky as I was; If you do, I would love to recommend it on a larger scale and approach them for partnership.

  • How to batch rename multiple files or folders to add suffix/prefix

    How to batch rename multiple files or folders to add suffix/prefix

    Ever tried to batch rename multiple files or folders on your computer? Well, editing just a few of them won’t necessarily flip your anger switch, but when there are hundreds or thousands of files to be renamed, it got to be a little inconvenient.

    Recently, while working with my new Free image hosting website, I ran into some problems. Apparently, I decided to use Amazon S3 as my underlying storage solution to scale the platform in order to serve the anticipated surge in service demand. To achieve this, I had to rename more than 9,000 files, which includes the full-size image, thumbnail and resized pictures. This particular migration required me to add a ‘suffix’ to each and every image before uploading them to Amazon S3. I was certain that I could edit all of these files manually, one-by-one. However, after going through the first few hundred images in 30 minutes it became clear to me that it is not going to be an easy task. So, I started calculating and concluded that to rename all those 9,000 images, it would require 40 hours of continuous editing. Can you believe that?

    TL;DR: I needed something to edit and add suffix to more than 9,000 files.

    Hunt for the solution

    I have a separate droplet (VPS instance) for my image hosting website, which gives me the flexibility to provide better service to the users as it often gets too crowded at times. First, I thought I would do it on my server itself using the command line, as my main VPS server provided by digitalocean runs latest Ubuntu distro. Linux is a very powerful Operating system, and one can achieve anything, given it falls right into its programming capabilities. However, doing so would totally kill the motive of writing this article. If publishing this article means helping many others who are struggling to find the solution to the same problem, then why give up?

    First, I tried to find out if Windows Operating system natively supports this feature. I am well aware that you can rename multiple files at once with desired suffix and incremental numbering by simply selecting all the files to be renamed and pressing F2 key on the keyboard, but it is nowhere near what we actually want to achieve here. That leaves us with the tedious command prompt or the new WindowsShell to execute some command based instructions. However, I won’t touch this segment in this article as it will be a little overkill for this simple task.

    renaming multiple files in windows operating system windows 10 adding number at the end suffix

    That brings me to the next phase of ‘solution hunt’ –  The search for a dedicated third party software/application. A simple google query leads me to multiple websites which claimed to provide the solution. However, when tested individually, I concluded there are two simple yet powerful tools which are capable of achieving just what we want. The best thing is that they’re all free.

    The Solution: Batch Rename Multiple Files or Folders

    The solution I found is still an overkill for what we wanted to achieve, but they’re a complete solution to anything that requires batch renaming of files on windows. In fact, they’re so powerful that even an old school command line junky would say goodbye to all those nifty codes.

    Bulk Rename Utility

    Bulk Rename Utility immediately became one of my favorite tools as it helped me rename all my 9,000 files with the click of a button.batch rename multiple files or folders bulk rename utility windows batch file rename tool software rename multiple files suffix prefix add replace

    All I had to do it select the folder where my files were located, put the keyword I wanted to add to all the files in the “Suffix” box.

    There is a huge list of options that make it one of the most powerful file renaming tool atm. You can rename multiple files quickly in any manner you want, rename photos (even the exif meta data), rename mp3 files, change file creation and modification time stamps and so on.

    Advanced Renamer

    Advanced Renamer is a free program for renaming multiple files and folders at once. By configuring renaming methods the names can be manipulated in various ways. You can setup advanced batch job using this powerful tool in minutes. There are 14 different methods that enable you to change the names, attributes, and timestamps of files in one go.

    Bactch rename multiple files or folders Advanced renamer windows batch file rename tool software rename multiple files suffix prefix add replace

    Advanced Renamer is pretty much same as the tool mentioned above, but I personally felt it was little less newbie friendly. However, there is nothing it can’t achieve that you can do on BulkRenameUtility.