Welcome to tzFree blog we believe in Freedom and Sharing

A Blog about Technological Improvements, Sports, Hacking, Security, Games, Movies, Musics, Videos, Books, Softwares Systems and many more.....

Akilimali George I. Bsc ICTM II(Mzumbe University)

A highly astute, responsible, goal oriented, enthusiastic, people-oriented professional, with ability to work independently or within a team, have a highly Computer Information Technology and Management knowledge and creative enough to successfully solve problems and maintain peak efficiency.

tzFree Blog Description

This website is a free website designed and created by Akilimali george I aiming at providing informations and resources free of commercial charges to the majority of Society who are living under a below normal standard income and therefore can not afford to commercially acquire some essential resources through payments.NOTE: This is Non-Commercial website. By:Akilimali George I

tzFree Blog Description

This website is a free website designed and created by Akilimali george I aiming at providing informations and resources free of commercial charges to the majority of Society who are living under a below normal standard income and therefore can not afford to commercially acquire some essential resources through payments.NOTE: This is Non-Commercial website. By:Akilimali George I

tzFree Description By George Akilimali I

A highly astute, responsible, goal oriented, enthusiastic, people-oriented professional, with ability to work independently or within a team, have a highly Computer Information Technology and Management knowledge and creative enough to successfully solve problems and maintain peak efficiency. .

Thursday, December 12, 2013

How to Unlock Alcatel Modems: Free and Simple

Alcatel modem company creating many portable USB modems with different models like X020, X030x, X060s, X070s, X080s, X100x, X200x, X200s, X210x, X210s, X215s, X220l,X225l, X225s, X228l, X230l etc.. STC, CTC etc are using their modems for customizing.
But if you buy any of these modems (net setter), you cannot use that modem with another SIM card. But if you unlock that modem, then you can use that modem with any network providers’ SIM card like Vodafone, Idea, Reliance, Etisalat, Tata DoCoMo, Aircel, Airtel, China Mobile, América Móvil, Telefónica, Orange, VimpelCom Ltd., MTN Group, Axiata Group Berhad, China Unicom, TeliaSonera, Telenor, Saudi Telecom Company, Tele2, T-Mobile, Idea Cellular, Verizon Wireless, MTS, AT&T Mobility, China Telecom, Telkomsel, Telecom Italia Mobile (TIM), BSNL, PLDT, Maxis Communications, Turkcell, MegaFon, Qtel etc…

It is very simple to unlock Alcatel modems. Just put another SIM card to modem, then modem will ask you an unlock code like RCK, NCK, NSCK or SPCK codes. By entering that unlock code, your modem is free from all locks. Then you can surf internet without any blocks.
Some modem will ask two unlock codes like RCK and NCK codes to unlock.

Example: Unlock Alcatel STC X230l modem:

Ø Connect modem and install built-in software and drivers. See image before unlock (‘Surf’ button disabled).


Unlock alcatel net setter modem using rck nck code

Ø Plug out and put another SIM to modem and plug-in. 
Ø Now this modem asks RCK code to enter. RCK code entered.

Unlock alcatel net setter modem using rck nck code

Ø Now again asks NCK code to enter, NCK code entered.

Unlock alcatel net setter modem using rck nck code

Ø Modem unlocked..!!! ('Surf' button enabled);

Unlock alcatel net setter modem using rck nck code

Ø After unlock, open ‘Settings’, then, in operators settings, add a new settings. Fill APN (find here), number (common: *99#), name field according to your new SIM card. Activate new setting and connect to internet.
Ø Now connected to internet.
Unlock alcatel net setter modem using rck nck code

Here you need only unlock code to unlock. Using IMEI number (check on back side of your modem), you can generate unlock code.
Ø Go to this site:  www.jictechnology.co.uk/calculator (copy - paste to your browser's address bar)
Ø Enter IMEI
Ø  Select service as Alcatel Modem.
Ø Select you modem model (Select X228L instead of x230L).
Ø Click on 'Order'.

Unlock alcater stc x230l modem net setter

Ø In above text box, you can see unlock codes you need. Here code 'other' is your RCK code.

Unlock alcater stc x230l modem net setter

Friday, November 22, 2013

Google finishes 2,048-bit security upgrade for Web privacy Prodded by "concerns about overbroad government surveillance," Google beat an end-of-year deadline to retire Web certificates with less secure 1,024-bit encryption

Never again are you going to get a Google Web site whose security certificate is protected with comparatively weak 1,024-bit encryption.
The Net giant has secured all its certificates with 2,048-bit RSA encryption keys or better, Google security engineer Dan Dulay said in a blog post Monday. Certificates are used to set up encrypted communications between a Web server and Web browser.
That means two things. First, traffic will be harder to decrypt since 1,024-bit keys aren't in use at Google anymore. Second, retiring the 1,024-bit keys means the computing industry can retire the technology altogether by declaring such keys untrustworthy.

Google has been aggressively moving to stronger encryption because of U.S. government surveillance by the National Security Agency. According to documents leaked by former NSA contractor Edward Snowden, the agency gathered bulk data off Internet taps, including unencrypted data sent between company data centers on its own network, and actively worked to undermine encryption.
Google said it beat its internal end-of-year deadline for the 2,048-bit move. It's also moved to encrypt its internal data transfer between data centers, a move that Yahoo also is making.
In other words, the Net's technology giants are working actively to make surveillance, authorized or not, significantly harder.
"Worry in Silicon Valley/Puget Sound: furor over NSA will cost billions cuz foreign customers fear US companies can't guarantee security," tweeted Strobe Talbott, president of analyst firm Brookings Institution, referring to the geographic regions where tech powers such as Google, Facebook, Yahoo, Microsoft, Twitter, Apple, LinkedIn, and Amazon are located.
There's a lot of work to be done yet, though. Google also supports a standard called "forward secrecy," which uses different keys for different sessions so that decrypting a single message doesn't mean previous messages can likewise be decrypted using the same key. But many other Net giants don't support forward secrecy
SOURCE: cnet

The Wolverine HIGH QUALITY MOVIE [Extended Cut] (2013) BRRip 720p x264 [Dual Audio] FREE DOWNLOAD

Based on the celebrated comic book arc, this epic action-adventure takes Wolverine, the most iconic character of the X-Men universe, to modern day Japan. Out of his depth in an unknown world he faces his ultimate nemesis in a life-or-death battle that will leave him forever changed. Vulnerable for the first time and pushed to his physical and emotional limits, he confronts not only lethal samurai steel but also his inner struggle against his own immortality, emerging more powerful than we have ever seen him before.

Friday, November 15, 2013

FREE DOWNLOAD FAST AND HIGH QUALITY The Smurfs 2 is a 2013 American 3D family comedy

The Smurfs 2 is a 2013 American 3D family comedy film and a sequel to the 2011 film The Smurfs. It is loosely based on The Smurfs comic-book series created by the Belgian comics artist Peyo. Wikipedia
The Smurfs team up with their human friends to rescue Smurfette, who has been kidnapped by Gargamel since she knows a secret spell that can turn the evil sorcerer's newest creation - creatures called the Naughties - into real Smurfs. 
Initial release: July 31, 2013
Director: Raja Gosnell
Running time: 105 minutes
Music composed by: Heitor Pereira
Characters: Smurfette, Gargamel, Papa Smurf, Vexy, Hackus, More
 

Sunday, November 3, 2013

FREE DOWNLOAD MOVIE Pacific Rim (2013) 1080p BrRip

Pacific Rim is a 2013 American science fiction monster film directed by Guillermo del Toro, written by del Toro and Travis Beacham, and starring Charlie Hunnam, Idris Elba, Rinko Kikuchi, Charlie Day, Robert Kazinsky, Max Martini, and Ron Perlman. Wikipedia
Initial release: July 11, 2013
Director: Guillermo del Toro
Running time: 132 minutes
Initial DVD release: October 15, 2013 (USA)
Budget: 180 million USD (2013)

Tuesday, October 8, 2013

FREE DOWNLOAD LATEST VERSION OF OPERA 15 FOR WINDOWS


Opera for Windows is strong, fast and stable browser for internet users. It comes along with useful and innovative features to make you feel comfortable when surfing the web, for example, tabbed browsing, e-mail support, RSS reader, chats, etc.

 

Key features

  • Interface: It has a clean interface that is not cluttered with buttons and menus but chooses to stress web pages.
  • Innovations: The most important in this latest version of Opera for Windows is the use of extensions. Among its extensions, you have news updates, weather reports, password management, etc. When installing or uninstalling add-ons, no need to reboot your browsers.
  • Customization: This latest version allows you to bring your own touch. You can make it look as you like it by using a catalog of colorful themes or just create your own design. It is also possible to customize the browser by adding, removing or changing the place of buttons and toolbars. If you like, you can bookmark your favorite websites and create your own shortcuts.
  • Speed: With all the improvements included in this tool, page loading and startup can be done in record time. Since the rendering engine has been tweaked, you can enjoy a very fast navigation.

System requirements

Hardware
  • RAM: 256 MB
  • Free disk space: 100 MB
Software:
  • At least Windows XP. 

[Windows 8 Start Menu Replacement] Start Menu 8 Bringing Back the Windows® 8 Start Menu FREE DOWNLOAD HERE

Start Menu 8 is specially designed for Windows 8. It offers a perfect solution for users who work with Windows Start Menu all the time and are not accustomed to the new Metro start screen in Windows 8. This smart tool brings back both the Windows 8 start button and Windows 8 Start Menu, and offers the option to skip Metro start page, allowing users who only work on desktop to boot to Windows 8 desktop directly. It's the best Windows 8 start menu replacement.




Download Latest Version of Skype Free and Enjoy the World of Free Calls and Live Conference Video


There’s so much you can do with Skype – share a bedtime story, host a meeting or take a language class.
Here’s just a few of the great things you can do:
  • Free Skype to Skype calls.
  • Low cost calls and text messages to mobiles and landlines.
  • Video call on Skype and Facebook.
  • Free instant messages to your friends, family and colleagues.
  • Send a message you can see, hear and feel with video messaging.*
All you need to get started is Windows XP, Vista or 7, a webcam for video calls and a microphone.

The Skype install file is about 1MB in size. When you run the install file, the installer will download the Skype application (about 20MB) in the background. If your internet connection drops while this is happening, the installer will resume the download as soon as connectivity is restored.

Monday, September 30, 2013

Sunday, September 29, 2013

Yahoo recycled ID users warn of security risk Users of Yahoo's recycled ID names say they are receiving the former owner's sensitive information through their new accounts.

(Credit: James Martin/CNET)
Yahoo users who got recycled account IDs said they've found a security risk -- they are receiving emails containing the personal information of former account owners, InformationWeek.com reported Tuesday.
The users told the news site that initially, they were receiving junk mail for the Yahoo ID's previous owner, but then other mail with sensitive information started showing up. This included account information, confirmation for appointments and flights, and event announcements. It appears the old owners must still be giving out the email address without knowing they no longer have access to the account.
One user, an IT security professional named Tom Jenkins, described the potential for identity theft as, "kind of crazy":
I can gain access to their Pandora account, but I won't. I can gain access to their Facebook account, but I won't. I know their name, address, and phone number. I know where their child goes to school, I know the last four digits of their social security number. I know they had an eye doctor's appointment last week and I was just invited to their friend's wedding.
We've contacted Yahoo for a comment and will update if we hear back.
Yahoo told InformationWeek that it takes the "security and privacy of our users very seriously," and has received complaints from "a very small number of users who have received emails through other third parties which were intended for the previous account holder." It continues to ask other companies, the ones sending the emails, to verify accounts by adding a date-specific marker.
Yahoo began releasing recycled IDs in late August, after giving users a month to log in to their accounts and stake their claim. Yahoo shut down any accounts that hadn't been logged in for more than a year, and then put the usernames up for grabs.
SOURCE: CNET

Hacker video shows how to thwart Apple's Touch ID The video details how the hacker scans and manipulates someone's fingerprint to fool the Touch ID on the iPhone 5S.

(Credit: Screenshot by Lance Whitney/CNET/Vimeo)
One of the hackers who recently tricked Apple's fingerprint sensor now has a video out showing just how he does it.
Earlier this week, a group of hackers in Germany, known as the Chaos Computer Club, took credit for bypassing the biometric security on the Touch ID fingerprint scanner. That hack was accomplished by scanning someone's fingerprint and ultimately using that to gain access to that person's iPhone 5S.
Posted on Vimeo by one of the hackers known as Starbug, the video takes us through the entire process from the initial scan to the actual fingerprint trickery. The hacker scans an iPhone 5S that already has someone's fingerprint. He then tweaks the scan to perfect the image of the fingerprint.
The scan is printed to paper and then to a circuit board, which undergoes a chemical bath. A dummy print eventually emerges, which is used to fool the security of the Touch ID, thus giving the hacker entry into the iPhone.
Starbug told Ars Technica that the hack posed no challenge. He said he expected the process to take a week or two. Instead, it chewed up around 30 hours from start to finish. With better preparation, he claims it would've taken only half an hour.
Despite Starbug's boasts, the procedure shown in the video seems exact and intricate, requiring manipulated scans, chemical baths, and printed circuit boards. And through it all, the hacker would need to hang onto your iPhone 5S. A process that can mimic your fingerprint certainly raises alarm bells, but this particular hack isn't something your average iPhone thief would be able to pull off.
SOURCE:CNET

Sunday, September 15, 2013

Top Android Apps&Games Release IV Free Download from Tz-Free




2013-09-04 05:59:32 Flipster Pro for Facebook v1.504 - android-zone.org.apkDownloads: 0, Size: 4 MB 2013-09-04 05:57:18 Galaxy S4 All-in-1 Thermometer v1.0.6 - android-zone.org.apkDownloads: 0, Size: 360 KB 2013-09-04 06:02:08 Galaxy S4 IR Remote by ZappIR v1.0.8 - android-zone.org.apkDownloads: 0, Size: 5 MB 2013-09-04 06:07:04 GO...


Thursday, September 12, 2013

Hacker sentenced to three years for breaching police sites

After pleading guilty to computer fraud for hacking into several police Web sites, John Anthony Borell III was sentenced to three years in federal prison on Thursday, according to the Associated Press.
Borell, 22, is from Ohio but was accused of breaching the Web sites of police agencies in Utah, New York, and California, and a municipal Web site in Missouri, in early 2012. According to court documents, the intrusions caused thousands of dollars in damage and forced the Utah police site to be down for nearly three months.
Apparently, after the attack, Borell made several comments on Twitter and other Web sites, which helped law enforcement officials in their investigation.
Borell is said to be a member of the loose-knit hacking collective Anonymous, which has taken credit for numerous online attacks including on the US Department of Justice, Lockheed Martin, Bank of America, and more. Reportedly, the attacks on Utah's police Web sites were done in protest of proposed US anti-piracy legislation.
In addition to his prison sentence, Borell has also agreed to pay $227,000 in damages, according to the Associated Press.
 Source:CNET

Wednesday, September 11, 2013

Indian government said to secretly track Web activity

The Indian government reportedly deploys Lawful Intercept and Monitoring systems to track Internet activities of citizens, separate from similar systems used by telcos in the government's Central Monitoring System project.
The Indian government is reportedly carrying out Internet surveillance on its citizens, in contrast with the government's rules and notifications for ensuring communications privacy.
According to an investigation by Chennai-based publication The Hindu, Lawful Intercept and Monitoring (LIM) systems have been deployed by the country's Center for Development of Telematics (D-DOT) to monitor Internet traffic, e-mails, Web browsing, Skype, and other Internet activities by Indian citizens.
The systems are fully owned and operated by the Indian government, unlike similar systems deployed by local Internet Service Providers (ISPs) which have to comply with Indian Telegraph Act and Rule 419(A) of the country's IT rules, the publication reported on Monday.

Monday, September 9, 2013

Movie You MUST watch..!!World War Z is a 2006 apocalyptic horror novel. Download HIGH QUALITY FREE NOW..!

Initial release: June 2, 2013Through a series of oral interviews compiled by the narrator (an agent of the United Nations Postwar Commission), the story of the global war against zombies, "World War Z," is told. The story begins with the interview of a Chinese medical doctor who relates the story of a young infected boy who is the pandemic's "patient zero", although the origin of the zombie pandemic is unknown. It is implied that the boy was not the first victim chronologically, but his infection (as well as those he infected) is the first to be recorded, and marked the point the Chinese government attempts to contain the infection and concocts a crisis involving Taiwan to mask their activities. Regardless, the infection spreads to other countries by the black market organ trade and by refugees, with a larger outbreak in South Africa, bringing the plague to public attention.
As the infection spreads, Israel abandons the Palestinian territories and initiates a nationwide quarantine, closing its borders to everyone except uninfected Jews and Palestinians. It then puts down an ultra-Orthodox uprising, which is later referred to as a civil war. Pakistan and Iran destroy each other in a nuclear war after the Iranian government attempts to stem the flow of refugees fleeing through Pakistan into Iran. The United States of America does little to prepare because it is over-confident in its ability to suppress any threat. Although special forces teams contain initial outbreaks, a widespread effort never starts as the nation is deprived of political will by several "brushfire wars", and because a rabies vaccine, marketed as effective, creates a false sense of security. When the world recognizes the true extent of the problem, a period known as the "Great Panic" begins. Following the loss of New York City, the U.S. military sets up a high-profile defense at Yonkers, New York, but underestimate the enemy; their modern weapons and tactics prove ineffective against zombies, which "can't be shocked and awed" as they have no self-preservation instincts, and can only be stopped if shot through the head. The unprepared and demoralized soldiers are routed on live television, while other countries suffer similarly disastrous defeats, and human civilization teeters on the brink of destruction...WIKIPEDIA

Tuesday, September 3, 2013

DID YOU KNOW THIS??Google's robo-cars mean the end of driving....!!

How Google's robo-cars mean the end of driving as we know it

Why waste your drive time doing the actual driving, when technology can be your chauffeur? The century-old auto culture is on the verge of radical change, and you can thank Google for where it's headed.
Google's self-driving Lexus RX450h
Google's self-driving Lexus RX450h
(Credit: Google)

Google's self-driving car initiative is moving into a new phase: reality.
Three years after first showing the world what it was up to -- rolling out a Toyota Prius with laser-scanning hardware awkwardly perched on the roof -- Google is moving its big idea out of the lab and into the real world.
Consider recent developments: A spokesman confirmed to CNET that the company was in what were described as productive talks with automakers involving Google's self-driving technology. Separately, Google is reported to be crafting a partnership with auto supplier Continental. And there's even the possibility of Google-powered robo-taxis sometime in the future.


The computerization of cars
Motivation aside, a big change is unde way, and it requires us to start thinking of cars very differently. Vehicles that drive themselves are the clearest example of what happens when cars transform into full-scale, general-purpose computing systems. But it's not the only example. Self-driving and connected cars will bristle with sensors, negotiate with traffic lights, talk to each other about safety conditions, join into train-like platoons, and become members of intelligent urban transit networks.
Historically, the car industry has focused on passive safety -- items like seatbelts and airbags. With the arrival of active safety technology that lets vehicles take pre-emptive action, cars will use data to help them decide what to do when drivers aren't paying attention or don't know what to do.
This illustration shows one advantage Ford sees for vehicle-to-vehicle communication: your car could detect abrupt braking of a car ahead that's blocked by a large van.
A lot of this boils down to communication. Sure, cars are getting more computing smarts, but so much of what's promised requires more data, and that requires ways to transmit it. How will that happen? As with personal computing, it will be a bit of a mess, with multiple networking technologies for multiple needs.
Computing today uses a handful of networks for different circumstances -- Wi-Fi, 3G, 4G, and Bluetooth among them. When automotive computing becomes a facet of personal computing, you can expect those standards to carry over. But then you can add some new network technologies designed to serve vehicles. The biggest are the 802.11p and the accompanying higher-level dedicated short-range communications (DSRC) standards, which govern how vehicles communicate with each other (V2V) and with infrastructure (V2I).
That technology, which rides the 5.9GHz frequency range for radio communications, can be used for things like collision avoidance, managing traffic at intersections, and linking cars into coordinated, fuel-efficient groups called platoons. Carmakers, however, are worried about interference on the 5.9GHz band if the US Federal Communications Commission permits other uses of the spectrum.

SOURCE:CNET

Sunday, September 1, 2013

Easy and Best way to delete your Web accounts...!

Some Web sites make it difficult to figure out how to delete your accounts. JustDelete.me can save you time by providing direct links to the cancellation pages of numerous Internet sites.

Web companies don't want you to close out your accounts with them, which is understandable. If you leave, their revenue-earning potential decreases. Some companies make the process of deleting your account relatively easy, while others make it practically impossible or confusing.
If you've ever gotten lost following support links in search of the right page to delete your Web account, you might want to check out JustDelete.me. The new Web site is a directory of Web services with direct links to their cancellation pages.
JustDelete.me Web site (Credit: Screenshot by Ed Rhee/CNET)

For some sites, JustDelete.me provides additional information on the cancellation process. For example, to delete your Steam account, you're told, "If you contact Steam support, they will most likely tell you just to not use the account. If your account has no games on it, it will be disabled after a while." JustDelete.me also ranks the difficulty of closing out your account, which might be helpful to you if you don't already have an account, but are considering one.

SOURCE:CNET

How to check if a shortened link is safe using URL Uncover:: The Web is a scary place where shortened links can take you to the darkest corner of the Internet.

(Credit: Jason Cipriani/CNET)

There is no shortage of Web services to help you verify that a shortened link is legit and not something that's going to load you up with malware or steal personal information. But when it comes to online privacy, it's always good to have options. Instead of adding a "+" to the end of a bit.ly link, or using Unshorten.it, give URL Uncover a look the next time you get suspicious.

(Credit: Screenshot by Jason Cipriani/CNET)

Addictive Tips recently wrote about URL Uncover, which will let you enter a shortened URL from over 100 different shortening services. After submitting the URL, you'll be given a screenshot of the Web site, the lengthened link, any keywords associated with the page, and most importantly a virtual thumbs-up or -down indicating whether the site is safe (see below). The green thumbs-up is provided by McAfee Site Advisor.

(Credit: Screenshot by Jason Cipriani/CNET)


Perhaps the best part about this particular service is that it's mobile-friendly. I've been able to access the site and use the service on a wide range of devices without issue. Sure, it's a pain to take the time to copy and paste a link from a rogue DM or mention on Twitter into a Web site in another app, but the time it can potentially save you is well worth it.

SOURCE:CNET

Saturday, August 31, 2013

Top Android Apps and Games...!! Tz-Free release II....!!MORE THAN 20 APPS & GAMES FREE

This Release contains more than what you can ever Imagine..!!I bilive in one way or another you will enjoy one of these great paid Apps.....!!


A+ VCE Exams Player v1.2.5 Ad-Free - android-zone.org.apkDownloads: 0, Size: 1 MB
2013-09-01 08:30:58
ActiveNotifications Premium v1.4 - android-zone.org.apkDownloads: 0, Size: 623 KB
2013-09-01 08:30:54
Air Call-Accept v1.10 - android-zone.org.apkDownloads: 0, Size: 383 KB
2013-09-01 08:30:56
Alarm Clock Xtreme v3.5.9 - android-zone.org.apkDownloads: 0, Size: 411 KB
2013-09-01 08:33:44
AndroVid Pro Video Editor v2.3.1 - android-zone.org.apkDownloads: 0, Size: 9 MB
2013-09-01 08:33:42
ASTRO Cloud & File Manager Pro v4.4.528 - android-zone.org.apkDownloads: 0, Size: 6 MB
2013-09-01 08:32:28
BatteryBot Pro v8.1.7 - android-zone.org.apkDownloads: 0, Size: 2 MB
2013-09-01 08:33:38
BlockLauncher Pro v1.29 - android-zone.org.apkDownloads: 0, Size: 3 MB
2013-09-01 08:33:39
Call & Message blocker v4.5.6 - android-zone.org.apkDownloads: 0, Size: 3 MB
2013-09-01 08:38:44
CamCard - Business Card Reader v4.1.1_20130802 - android-zone.org.apkDownloads: 0, Size: 23 MB
2013-09-01 08:32:29
Camera FV-5 v1.51 - android-zone.org.apkDownloads: 0, Size: 3 MB
2013-09-01 08:31:00
Cloud SMS v2.1.16 - android-zone.org.apkDownloads: 0, Size: 624 KB
2013-09-01 08:31:26
Convertor Pro v4.4 - android-zone.org.apkDownloads: 0, Size: 830 KB
2013-09-01 08:30:53
Dock4Droid FULL v3.4.4 0 - android-zone.org.apkDownloads: 0, Size: 288 KB
2013-09-01 08:31:26
DroidPapers Donate v3.8.4 - android-zone.org.apkDownloads: 0, Size: 820 KB
2013-09-01 08:32:27
Dropsync PRO v2.5.3 - android-zone.org.apkDownloads: 0, Size: 2 MB
2013-09-01 08:32:27
Due Today v2.1.5.543 - android-zone.org.apkDownloads: 0, Size: 1 MB
2013-09-01 08:38:42
F1™ 2013 Timing App - Premium v5.123 - android-zone.org.apkDownloads: 0, Size: 17 MB
2013-09-01 08:38:40
File Expert Pro HD v2.0.1 - android-zone.org.apkDownloads: 0, Size: 10 MB
2013-09-01 08:38:44
File Expert Pro v6.0.1 - android-zone.org.apkDownloads: 0, Size: 10 MB
2013-09-01 08:33:40
File Explorer PlusRoot v2.0.2.3 - android-zone.org.apkDownloads: 0, Size: 4 MB

DO YOU KNOW THIS??'Doomsday Plane' Would Save President and Joint Chiefs in Apocalypse Scenario

Breaking News | Celebrity News | More ABC News Videos



In the event of nuclear war, a powerful meteor strike or even a zombie apocalypse, the thoroughly protected doomsday plane is ready to keep the president, secretary of defense, Joint Chiefs of Staff and other key personnel in the air and out of danger. It may not deflect a Twitter photo scandal, but it can outrun a nuclear explosion and stay in the air for days without refueling.
The flight team for the E-4B, its military codename, sleeps nearby and is ready to scramble in five minutes. It was mobilized in the tumultuous hours after planes crashed into the World Trade Center, the Pentagon and southern Pennsylvania on 9/11.
"If the command centers that are on the ground in the United States have a failure of some sort, or attack, we immediately get airborne. We're on alert 24/7, 365," Captain W. Scott "Easy" Ryder, Commander, NAOC, told ABC News' Diane Sawyer as she traveled to Afghanistan with Secretary of Defense Robert Gates on the apocalypse-proof plane. "Constantly there's at least one alert airplane waiting to get airborne."
Watch "World News" tonight on ABC to learn more about the Air Force's last line of defense.
All E-4B aircraft are assigned to the 55th Wing, Offutt Air Force Base, Neb. The modified 747s can travel at speeds up to 620 miles per hour, 40 miles per hour faster than their commercial counterparts.
The $223 million aircraft is outfitted with an electromagnetic pulse shield to protect its 165,000 pounds of advanced electronics. Thermo-radiation shields also protect the plane in the event of a nuclear strike.
A highly-trained security team travels with the plane.
"The first people off of the airplane are these guys, they'll position themselves appropriately around the airplane," Ryder said to ABC News. "The secretary also has his own small security staff that does similar things. So these guys are predominately designed to protect our airplane, and the secretary's staff protects him, as an individual."
Even though it carries VIPs, their staff and security personnel, the plane is highly fuel efficient. The plane can stay in-flight for days without refueling, a necessity if circumstances demanded the plane's use by the nation's top officials.
A precision tech team mans the sensitive electronic technology found on the plan. There is so much powerful electrical equipment onboard a specially upgraded air-conditioning system is necessary to keep it cool and functional.
"Give us the phone number of anybody, anytime, anyplace, anywhere on earth, we can get a hold of them," Master Sgt. Joe Stuart, US Air Force, told Diane Sawyer.
It can even communicate with submerged submarines by dropping a five-mile-long cable out the back of the plane. "[We] drop is down and [it] transmits coded message traffic to US submarines," Ryder told ABC News.
Although the extreme amount of survival technology on the plane more than makes up for it, the plane lacks the amenities found in bases on the ground.
"It's like being Fedexed," Gates told Sawyer. "It's fairly Spartan, with no windows or anything."
Even the Secretary of Defense only gets a tiny bathroom with a sink, but no shower. A small trade-off for being able to board this plane as the rest of us dive for cover in a worst-case scenario.
Some more details on the general characteristics of the plane, according to the official U.S. Air Force website:
 Primary Function: Airborne operations center
 Contractor: Boeing Aerospace Co.
 Power Plant: Four General Electric CF6-50E2 turbofan engines
 Thrust: 52,500 pounds each engine
 Wingspan: 195 feet, 8 inches (59.7 meters)
 Length: 231 feet, 4 inches (70.5 meters)
 Height: 63 feet, 5 inches (19.3 meters)
 Weight: 410,000 pounds (185,973 kilograms)
 Maximum Takeoff Weight: 800,000 pounds (360,000 kilograms)
 Fuel Capacity: 410,000 (185,973 kilograms)
 Payload: communications gear permanently installed on aircraft
 Speed: 602 miles per hour (523 knots)
 Range: 6,200 nautical miles
 Ceiling: Above 30,000 feet (9,091 meters)
 Crew: Up to 112 (flight crew and mission crew)
 Unit Cost: $223.2 million (fiscal 98 constant dollars)
 Initial operating capability: January 1980
 Inventory: Active force, 4
ABC News' James Wang contributed to this article.

Friday, August 30, 2013

Best Solution To use Any network line on the same ZTE modem without Flashing or Unlocking


Join Air is the generic connection manager software for ZTE USB modems.

Join Air has no restrictions and can be configured to work with any wireless internet provider.

To use your modem with Join Air simply install the original network operators connection manager software, so the correct drivers for your modem are installed. Then install and launch Join Air. Make sure the network providers connection manager software is fully closed before opening Join Air!

This software will not work with ZTE wireless hotspot devices or other modem brands also
Join Air is a program developed by ZTE. The most used version is 1.0.0.1, with over 98% of all installations currently using this version. Upon installation and setup, it defines an auto-start registry entry which makes this program run on each Windows boot for all user logins. The software adds a background controller service that is set to automatically run. Delaying the start of this service is possible through the service manager. The main program executable is UIMain.exe. The software installer includes 43 files and is usually about 64.92 MB (68,071,990 bytes). CMUpdater.exe is the automatic update component of the software designed to download and apply new updates should new versions be released. In comparison to the total number of users, most PCs are running the OS Windows 7 (SP1) as well as Windows 7. While about 51% of users of Join Air come from Indonesia, it is also popular in Germany and Thailand.

Related Posts Plugin for WordPress, Blogger...

Reliable & Affordable Hosting+Web Services