Welcome to tzFree blog we believe in Freedom and Sharing

A Blog about Technological Improvements, Sports, Hacking, Security, Games, Movies, Musics, Videos, Books, Softwares Systems and many more.....

Akilimali George I. Bsc ICTM II(Mzumbe University)

A highly astute, responsible, goal oriented, enthusiastic, people-oriented professional, with ability to work independently or within a team, have a highly Computer Information Technology and Management knowledge and creative enough to successfully solve problems and maintain peak efficiency.

tzFree Blog Description

This website is a free website designed and created by Akilimali george I aiming at providing informations and resources free of commercial charges to the majority of Society who are living under a below normal standard income and therefore can not afford to commercially acquire some essential resources through payments.NOTE: This is Non-Commercial website. By:Akilimali George I

tzFree Blog Description

This website is a free website designed and created by Akilimali george I aiming at providing informations and resources free of commercial charges to the majority of Society who are living under a below normal standard income and therefore can not afford to commercially acquire some essential resources through payments.NOTE: This is Non-Commercial website. By:Akilimali George I

tzFree Description By George Akilimali I

A highly astute, responsible, goal oriented, enthusiastic, people-oriented professional, with ability to work independently or within a team, have a highly Computer Information Technology and Management knowledge and creative enough to successfully solve problems and maintain peak efficiency. .

Monday, November 3, 2014

Simplified Education with ICT, One of the Sucessfull Project Developed to Improve Qulity of Education in Tanzania



Tanzania cannot afford to overlook the importance of information and communication technology (ICT) for improved access, equity, quality and relevance of education. In our inter-connected world, knowledge and information are becoming corner stones for the development of a society, as is the ability to communicate. It is our duty to prepare our children so that they can benefit from and contribute to our country´s development in the information age. We must therefore take advantage of the full range of ICTs, from radio and mobile telephony to computers and the Internet, to build the foundation for a well educated and learning knowledge society. 
Simplified Education with ICT Company Limited - SEDICT (T) - A Tanzania registered Organization aiming To develop a quality improvement system for management education materials in Tanzania that will help to enhance the quality of schools and simplify the learning and teaching process through simplified visualization of different core subjects in both levels of education in Tanzania and to administer the information & Communication Technology (ICT) Education, Course contents and MIS System for providing compulsory Information & Communication Technology (ICT) / computer education to the Students of Government, Non-Government Schools and Related Academic Institutions across the Country.
  

    The Objectives and functions for which the company is established are:

(a).  To build capacities through training, consultancy, support, research, elimination of information gap, management, conservation & planning and other related community based issues.
(b).To administer the information & Communication Technology (ICT) Education, Course contents and MIS System for providing compulsory Information & Communication Technology (ICT) / computer education to the Students of Government, Non-Government Schools and Related Academic Institutions across the Country in a phased manner
(c).   To expand markets for ICT products for Educations provision and delivery also aims to train & develop local expertise in the field of quality assessment in management education including facilitating the establishment of required Infrastructures as well as courseware for the School.
(d).To promote and disseminate Information Technology culture among existing teachers in the State so that the benefit of information technology can be percolated at every school level.
(e).To develop a quality improvement system for management education materials in Tanzania that will help to enhance the quality of schools and simplify the learning and teaching process through simplified visualization of different core subjects in both levels of education in Tanzania
(f).    To assist the Ministry of Educations and Vocational Training (MoEVT) in formulating and implementing strategy, procedures and guidelines and for the adoption of Information & Communication Technology (ICT)'education in Academic Institutions in Tanzania.
(g).   To provide and/ or arrange to provide all technical assistance & help to create, organize, and maintain centralized data-warehouse, information-repository, and software-library to be shared by all schools. To facilitate inter-school coordination in all IT related matters and to devise modalities for information sharing.
For more information about the Project Email Us through info@sedict.co.tz  or Visit our Site www.sedict.co.tz
Follow us on Facebook www.facebook.com/sedictTanzania

Friday, November 22, 2013

Google finishes 2,048-bit security upgrade for Web privacy Prodded by "concerns about overbroad government surveillance," Google beat an end-of-year deadline to retire Web certificates with less secure 1,024-bit encryption

Never again are you going to get a Google Web site whose security certificate is protected with comparatively weak 1,024-bit encryption.
The Net giant has secured all its certificates with 2,048-bit RSA encryption keys or better, Google security engineer Dan Dulay said in a blog post Monday. Certificates are used to set up encrypted communications between a Web server and Web browser.
That means two things. First, traffic will be harder to decrypt since 1,024-bit keys aren't in use at Google anymore. Second, retiring the 1,024-bit keys means the computing industry can retire the technology altogether by declaring such keys untrustworthy.

Google has been aggressively moving to stronger encryption because of U.S. government surveillance by the National Security Agency. According to documents leaked by former NSA contractor Edward Snowden, the agency gathered bulk data off Internet taps, including unencrypted data sent between company data centers on its own network, and actively worked to undermine encryption.
Google said it beat its internal end-of-year deadline for the 2,048-bit move. It's also moved to encrypt its internal data transfer between data centers, a move that Yahoo also is making.
In other words, the Net's technology giants are working actively to make surveillance, authorized or not, significantly harder.
"Worry in Silicon Valley/Puget Sound: furor over NSA will cost billions cuz foreign customers fear US companies can't guarantee security," tweeted Strobe Talbott, president of analyst firm Brookings Institution, referring to the geographic regions where tech powers such as Google, Facebook, Yahoo, Microsoft, Twitter, Apple, LinkedIn, and Amazon are located.
There's a lot of work to be done yet, though. Google also supports a standard called "forward secrecy," which uses different keys for different sessions so that decrypting a single message doesn't mean previous messages can likewise be decrypted using the same key. But many other Net giants don't support forward secrecy
SOURCE: cnet

Tuesday, October 8, 2013

FREE DOWNLOAD LATEST VERSION OF OPERA 15 FOR WINDOWS


Opera for Windows is strong, fast and stable browser for internet users. It comes along with useful and innovative features to make you feel comfortable when surfing the web, for example, tabbed browsing, e-mail support, RSS reader, chats, etc.

 

Key features

  • Interface: It has a clean interface that is not cluttered with buttons and menus but chooses to stress web pages.
  • Innovations: The most important in this latest version of Opera for Windows is the use of extensions. Among its extensions, you have news updates, weather reports, password management, etc. When installing or uninstalling add-ons, no need to reboot your browsers.
  • Customization: This latest version allows you to bring your own touch. You can make it look as you like it by using a catalog of colorful themes or just create your own design. It is also possible to customize the browser by adding, removing or changing the place of buttons and toolbars. If you like, you can bookmark your favorite websites and create your own shortcuts.
  • Speed: With all the improvements included in this tool, page loading and startup can be done in record time. Since the rendering engine has been tweaked, you can enjoy a very fast navigation.

System requirements

Hardware
  • RAM: 256 MB
  • Free disk space: 100 MB
Software:
  • At least Windows XP. 

[Windows 8 Start Menu Replacement] Start Menu 8 Bringing Back the Windows® 8 Start Menu FREE DOWNLOAD HERE

Start Menu 8 is specially designed for Windows 8. It offers a perfect solution for users who work with Windows Start Menu all the time and are not accustomed to the new Metro start screen in Windows 8. This smart tool brings back both the Windows 8 start button and Windows 8 Start Menu, and offers the option to skip Metro start page, allowing users who only work on desktop to boot to Windows 8 desktop directly. It's the best Windows 8 start menu replacement.




Download Latest Version of Skype Free and Enjoy the World of Free Calls and Live Conference Video


There’s so much you can do with Skype – share a bedtime story, host a meeting or take a language class.
Here’s just a few of the great things you can do:
  • Free Skype to Skype calls.
  • Low cost calls and text messages to mobiles and landlines.
  • Video call on Skype and Facebook.
  • Free instant messages to your friends, family and colleagues.
  • Send a message you can see, hear and feel with video messaging.*
All you need to get started is Windows XP, Vista or 7, a webcam for video calls and a microphone.

The Skype install file is about 1MB in size. When you run the install file, the installer will download the Skype application (about 20MB) in the background. If your internet connection drops while this is happening, the installer will resume the download as soon as connectivity is restored.

Sunday, September 29, 2013

Yahoo recycled ID users warn of security risk Users of Yahoo's recycled ID names say they are receiving the former owner's sensitive information through their new accounts.

(Credit: James Martin/CNET)
Yahoo users who got recycled account IDs said they've found a security risk -- they are receiving emails containing the personal information of former account owners, InformationWeek.com reported Tuesday.
The users told the news site that initially, they were receiving junk mail for the Yahoo ID's previous owner, but then other mail with sensitive information started showing up. This included account information, confirmation for appointments and flights, and event announcements. It appears the old owners must still be giving out the email address without knowing they no longer have access to the account.
One user, an IT security professional named Tom Jenkins, described the potential for identity theft as, "kind of crazy":
I can gain access to their Pandora account, but I won't. I can gain access to their Facebook account, but I won't. I know their name, address, and phone number. I know where their child goes to school, I know the last four digits of their social security number. I know they had an eye doctor's appointment last week and I was just invited to their friend's wedding.
We've contacted Yahoo for a comment and will update if we hear back.
Yahoo told InformationWeek that it takes the "security and privacy of our users very seriously," and has received complaints from "a very small number of users who have received emails through other third parties which were intended for the previous account holder." It continues to ask other companies, the ones sending the emails, to verify accounts by adding a date-specific marker.
Yahoo began releasing recycled IDs in late August, after giving users a month to log in to their accounts and stake their claim. Yahoo shut down any accounts that hadn't been logged in for more than a year, and then put the usernames up for grabs.
SOURCE: CNET

Hacker video shows how to thwart Apple's Touch ID The video details how the hacker scans and manipulates someone's fingerprint to fool the Touch ID on the iPhone 5S.

(Credit: Screenshot by Lance Whitney/CNET/Vimeo)
One of the hackers who recently tricked Apple's fingerprint sensor now has a video out showing just how he does it.
Earlier this week, a group of hackers in Germany, known as the Chaos Computer Club, took credit for bypassing the biometric security on the Touch ID fingerprint scanner. That hack was accomplished by scanning someone's fingerprint and ultimately using that to gain access to that person's iPhone 5S.
Posted on Vimeo by one of the hackers known as Starbug, the video takes us through the entire process from the initial scan to the actual fingerprint trickery. The hacker scans an iPhone 5S that already has someone's fingerprint. He then tweaks the scan to perfect the image of the fingerprint.
The scan is printed to paper and then to a circuit board, which undergoes a chemical bath. A dummy print eventually emerges, which is used to fool the security of the Touch ID, thus giving the hacker entry into the iPhone.
Starbug told Ars Technica that the hack posed no challenge. He said he expected the process to take a week or two. Instead, it chewed up around 30 hours from start to finish. With better preparation, he claims it would've taken only half an hour.
Despite Starbug's boasts, the procedure shown in the video seems exact and intricate, requiring manipulated scans, chemical baths, and printed circuit boards. And through it all, the hacker would need to hang onto your iPhone 5S. A process that can mimic your fingerprint certainly raises alarm bells, but this particular hack isn't something your average iPhone thief would be able to pull off.
SOURCE:CNET

Sunday, September 15, 2013

Top Android Apps&Games Release IV Free Download from Tz-Free




2013-09-04 05:59:32 Flipster Pro for Facebook v1.504 - android-zone.org.apkDownloads: 0, Size: 4 MB 2013-09-04 05:57:18 Galaxy S4 All-in-1 Thermometer v1.0.6 - android-zone.org.apkDownloads: 0, Size: 360 KB 2013-09-04 06:02:08 Galaxy S4 IR Remote by ZappIR v1.0.8 - android-zone.org.apkDownloads: 0, Size: 5 MB 2013-09-04 06:07:04 GO...


Thursday, September 12, 2013

Hacker sentenced to three years for breaching police sites

After pleading guilty to computer fraud for hacking into several police Web sites, John Anthony Borell III was sentenced to three years in federal prison on Thursday, according to the Associated Press.
Borell, 22, is from Ohio but was accused of breaching the Web sites of police agencies in Utah, New York, and California, and a municipal Web site in Missouri, in early 2012. According to court documents, the intrusions caused thousands of dollars in damage and forced the Utah police site to be down for nearly three months.
Apparently, after the attack, Borell made several comments on Twitter and other Web sites, which helped law enforcement officials in their investigation.
Borell is said to be a member of the loose-knit hacking collective Anonymous, which has taken credit for numerous online attacks including on the US Department of Justice, Lockheed Martin, Bank of America, and more. Reportedly, the attacks on Utah's police Web sites were done in protest of proposed US anti-piracy legislation.
In addition to his prison sentence, Borell has also agreed to pay $227,000 in damages, according to the Associated Press.
 Source:CNET

Wednesday, September 11, 2013

Indian government said to secretly track Web activity

The Indian government reportedly deploys Lawful Intercept and Monitoring systems to track Internet activities of citizens, separate from similar systems used by telcos in the government's Central Monitoring System project.
The Indian government is reportedly carrying out Internet surveillance on its citizens, in contrast with the government's rules and notifications for ensuring communications privacy.
According to an investigation by Chennai-based publication The Hindu, Lawful Intercept and Monitoring (LIM) systems have been deployed by the country's Center for Development of Telematics (D-DOT) to monitor Internet traffic, e-mails, Web browsing, Skype, and other Internet activities by Indian citizens.
The systems are fully owned and operated by the Indian government, unlike similar systems deployed by local Internet Service Providers (ISPs) which have to comply with Indian Telegraph Act and Rule 419(A) of the country's IT rules, the publication reported on Monday.

Tuesday, September 3, 2013

DID YOU KNOW THIS??Google's robo-cars mean the end of driving....!!

How Google's robo-cars mean the end of driving as we know it

Why waste your drive time doing the actual driving, when technology can be your chauffeur? The century-old auto culture is on the verge of radical change, and you can thank Google for where it's headed.
Google's self-driving Lexus RX450h
Google's self-driving Lexus RX450h
(Credit: Google)

Google's self-driving car initiative is moving into a new phase: reality.
Three years after first showing the world what it was up to -- rolling out a Toyota Prius with laser-scanning hardware awkwardly perched on the roof -- Google is moving its big idea out of the lab and into the real world.
Consider recent developments: A spokesman confirmed to CNET that the company was in what were described as productive talks with automakers involving Google's self-driving technology. Separately, Google is reported to be crafting a partnership with auto supplier Continental. And there's even the possibility of Google-powered robo-taxis sometime in the future.


The computerization of cars
Motivation aside, a big change is unde way, and it requires us to start thinking of cars very differently. Vehicles that drive themselves are the clearest example of what happens when cars transform into full-scale, general-purpose computing systems. But it's not the only example. Self-driving and connected cars will bristle with sensors, negotiate with traffic lights, talk to each other about safety conditions, join into train-like platoons, and become members of intelligent urban transit networks.
Historically, the car industry has focused on passive safety -- items like seatbelts and airbags. With the arrival of active safety technology that lets vehicles take pre-emptive action, cars will use data to help them decide what to do when drivers aren't paying attention or don't know what to do.
This illustration shows one advantage Ford sees for vehicle-to-vehicle communication: your car could detect abrupt braking of a car ahead that's blocked by a large van.
A lot of this boils down to communication. Sure, cars are getting more computing smarts, but so much of what's promised requires more data, and that requires ways to transmit it. How will that happen? As with personal computing, it will be a bit of a mess, with multiple networking technologies for multiple needs.
Computing today uses a handful of networks for different circumstances -- Wi-Fi, 3G, 4G, and Bluetooth among them. When automotive computing becomes a facet of personal computing, you can expect those standards to carry over. But then you can add some new network technologies designed to serve vehicles. The biggest are the 802.11p and the accompanying higher-level dedicated short-range communications (DSRC) standards, which govern how vehicles communicate with each other (V2V) and with infrastructure (V2I).
That technology, which rides the 5.9GHz frequency range for radio communications, can be used for things like collision avoidance, managing traffic at intersections, and linking cars into coordinated, fuel-efficient groups called platoons. Carmakers, however, are worried about interference on the 5.9GHz band if the US Federal Communications Commission permits other uses of the spectrum.

SOURCE:CNET

Sunday, September 1, 2013

Easy and Best way to delete your Web accounts...!

Some Web sites make it difficult to figure out how to delete your accounts. JustDelete.me can save you time by providing direct links to the cancellation pages of numerous Internet sites.

Web companies don't want you to close out your accounts with them, which is understandable. If you leave, their revenue-earning potential decreases. Some companies make the process of deleting your account relatively easy, while others make it practically impossible or confusing.
If you've ever gotten lost following support links in search of the right page to delete your Web account, you might want to check out JustDelete.me. The new Web site is a directory of Web services with direct links to their cancellation pages.
JustDelete.me Web site (Credit: Screenshot by Ed Rhee/CNET)

For some sites, JustDelete.me provides additional information on the cancellation process. For example, to delete your Steam account, you're told, "If you contact Steam support, they will most likely tell you just to not use the account. If your account has no games on it, it will be disabled after a while." JustDelete.me also ranks the difficulty of closing out your account, which might be helpful to you if you don't already have an account, but are considering one.

SOURCE:CNET

How to check if a shortened link is safe using URL Uncover:: The Web is a scary place where shortened links can take you to the darkest corner of the Internet.

(Credit: Jason Cipriani/CNET)

There is no shortage of Web services to help you verify that a shortened link is legit and not something that's going to load you up with malware or steal personal information. But when it comes to online privacy, it's always good to have options. Instead of adding a "+" to the end of a bit.ly link, or using Unshorten.it, give URL Uncover a look the next time you get suspicious.

(Credit: Screenshot by Jason Cipriani/CNET)

Addictive Tips recently wrote about URL Uncover, which will let you enter a shortened URL from over 100 different shortening services. After submitting the URL, you'll be given a screenshot of the Web site, the lengthened link, any keywords associated with the page, and most importantly a virtual thumbs-up or -down indicating whether the site is safe (see below). The green thumbs-up is provided by McAfee Site Advisor.

(Credit: Screenshot by Jason Cipriani/CNET)


Perhaps the best part about this particular service is that it's mobile-friendly. I've been able to access the site and use the service on a wide range of devices without issue. Sure, it's a pain to take the time to copy and paste a link from a rogue DM or mention on Twitter into a Web site in another app, but the time it can potentially save you is well worth it.

SOURCE:CNET

Saturday, August 31, 2013

Top Android Apps and Games...!! Tz-Free release II....!!MORE THAN 20 APPS & GAMES FREE

This Release contains more than what you can ever Imagine..!!I bilive in one way or another you will enjoy one of these great paid Apps.....!!


A+ VCE Exams Player v1.2.5 Ad-Free - android-zone.org.apkDownloads: 0, Size: 1 MB
2013-09-01 08:30:58
ActiveNotifications Premium v1.4 - android-zone.org.apkDownloads: 0, Size: 623 KB
2013-09-01 08:30:54
Air Call-Accept v1.10 - android-zone.org.apkDownloads: 0, Size: 383 KB
2013-09-01 08:30:56
Alarm Clock Xtreme v3.5.9 - android-zone.org.apkDownloads: 0, Size: 411 KB
2013-09-01 08:33:44
AndroVid Pro Video Editor v2.3.1 - android-zone.org.apkDownloads: 0, Size: 9 MB
2013-09-01 08:33:42
ASTRO Cloud & File Manager Pro v4.4.528 - android-zone.org.apkDownloads: 0, Size: 6 MB
2013-09-01 08:32:28
BatteryBot Pro v8.1.7 - android-zone.org.apkDownloads: 0, Size: 2 MB
2013-09-01 08:33:38
BlockLauncher Pro v1.29 - android-zone.org.apkDownloads: 0, Size: 3 MB
2013-09-01 08:33:39
Call & Message blocker v4.5.6 - android-zone.org.apkDownloads: 0, Size: 3 MB
2013-09-01 08:38:44
CamCard - Business Card Reader v4.1.1_20130802 - android-zone.org.apkDownloads: 0, Size: 23 MB
2013-09-01 08:32:29
Camera FV-5 v1.51 - android-zone.org.apkDownloads: 0, Size: 3 MB
2013-09-01 08:31:00
Cloud SMS v2.1.16 - android-zone.org.apkDownloads: 0, Size: 624 KB
2013-09-01 08:31:26
Convertor Pro v4.4 - android-zone.org.apkDownloads: 0, Size: 830 KB
2013-09-01 08:30:53
Dock4Droid FULL v3.4.4 0 - android-zone.org.apkDownloads: 0, Size: 288 KB
2013-09-01 08:31:26
DroidPapers Donate v3.8.4 - android-zone.org.apkDownloads: 0, Size: 820 KB
2013-09-01 08:32:27
Dropsync PRO v2.5.3 - android-zone.org.apkDownloads: 0, Size: 2 MB
2013-09-01 08:32:27
Due Today v2.1.5.543 - android-zone.org.apkDownloads: 0, Size: 1 MB
2013-09-01 08:38:42
F1™ 2013 Timing App - Premium v5.123 - android-zone.org.apkDownloads: 0, Size: 17 MB
2013-09-01 08:38:40
File Expert Pro HD v2.0.1 - android-zone.org.apkDownloads: 0, Size: 10 MB
2013-09-01 08:38:44
File Expert Pro v6.0.1 - android-zone.org.apkDownloads: 0, Size: 10 MB
2013-09-01 08:33:40
File Explorer PlusRoot v2.0.2.3 - android-zone.org.apkDownloads: 0, Size: 4 MB

DO YOU KNOW THIS??'Doomsday Plane' Would Save President and Joint Chiefs in Apocalypse Scenario

Breaking News | Celebrity News | More ABC News Videos



In the event of nuclear war, a powerful meteor strike or even a zombie apocalypse, the thoroughly protected doomsday plane is ready to keep the president, secretary of defense, Joint Chiefs of Staff and other key personnel in the air and out of danger. It may not deflect a Twitter photo scandal, but it can outrun a nuclear explosion and stay in the air for days without refueling.
The flight team for the E-4B, its military codename, sleeps nearby and is ready to scramble in five minutes. It was mobilized in the tumultuous hours after planes crashed into the World Trade Center, the Pentagon and southern Pennsylvania on 9/11.
"If the command centers that are on the ground in the United States have a failure of some sort, or attack, we immediately get airborne. We're on alert 24/7, 365," Captain W. Scott "Easy" Ryder, Commander, NAOC, told ABC News' Diane Sawyer as she traveled to Afghanistan with Secretary of Defense Robert Gates on the apocalypse-proof plane. "Constantly there's at least one alert airplane waiting to get airborne."
Watch "World News" tonight on ABC to learn more about the Air Force's last line of defense.
All E-4B aircraft are assigned to the 55th Wing, Offutt Air Force Base, Neb. The modified 747s can travel at speeds up to 620 miles per hour, 40 miles per hour faster than their commercial counterparts.
The $223 million aircraft is outfitted with an electromagnetic pulse shield to protect its 165,000 pounds of advanced electronics. Thermo-radiation shields also protect the plane in the event of a nuclear strike.
A highly-trained security team travels with the plane.
"The first people off of the airplane are these guys, they'll position themselves appropriately around the airplane," Ryder said to ABC News. "The secretary also has his own small security staff that does similar things. So these guys are predominately designed to protect our airplane, and the secretary's staff protects him, as an individual."
Even though it carries VIPs, their staff and security personnel, the plane is highly fuel efficient. The plane can stay in-flight for days without refueling, a necessity if circumstances demanded the plane's use by the nation's top officials.
A precision tech team mans the sensitive electronic technology found on the plan. There is so much powerful electrical equipment onboard a specially upgraded air-conditioning system is necessary to keep it cool and functional.
"Give us the phone number of anybody, anytime, anyplace, anywhere on earth, we can get a hold of them," Master Sgt. Joe Stuart, US Air Force, told Diane Sawyer.
It can even communicate with submerged submarines by dropping a five-mile-long cable out the back of the plane. "[We] drop is down and [it] transmits coded message traffic to US submarines," Ryder told ABC News.
Although the extreme amount of survival technology on the plane more than makes up for it, the plane lacks the amenities found in bases on the ground.
"It's like being Fedexed," Gates told Sawyer. "It's fairly Spartan, with no windows or anything."
Even the Secretary of Defense only gets a tiny bathroom with a sink, but no shower. A small trade-off for being able to board this plane as the rest of us dive for cover in a worst-case scenario.
Some more details on the general characteristics of the plane, according to the official U.S. Air Force website:
 Primary Function: Airborne operations center
 Contractor: Boeing Aerospace Co.
 Power Plant: Four General Electric CF6-50E2 turbofan engines
 Thrust: 52,500 pounds each engine
 Wingspan: 195 feet, 8 inches (59.7 meters)
 Length: 231 feet, 4 inches (70.5 meters)
 Height: 63 feet, 5 inches (19.3 meters)
 Weight: 410,000 pounds (185,973 kilograms)
 Maximum Takeoff Weight: 800,000 pounds (360,000 kilograms)
 Fuel Capacity: 410,000 (185,973 kilograms)
 Payload: communications gear permanently installed on aircraft
 Speed: 602 miles per hour (523 knots)
 Range: 6,200 nautical miles
 Ceiling: Above 30,000 feet (9,091 meters)
 Crew: Up to 112 (flight crew and mission crew)
 Unit Cost: $223.2 million (fiscal 98 constant dollars)
 Initial operating capability: January 1980
 Inventory: Active force, 4
ABC News' James Wang contributed to this article.

Friday, August 30, 2013

Best Solution To use Any network line on the same ZTE modem without Flashing or Unlocking


Join Air is the generic connection manager software for ZTE USB modems.

Join Air has no restrictions and can be configured to work with any wireless internet provider.

To use your modem with Join Air simply install the original network operators connection manager software, so the correct drivers for your modem are installed. Then install and launch Join Air. Make sure the network providers connection manager software is fully closed before opening Join Air!

This software will not work with ZTE wireless hotspot devices or other modem brands also
Join Air is a program developed by ZTE. The most used version is 1.0.0.1, with over 98% of all installations currently using this version. Upon installation and setup, it defines an auto-start registry entry which makes this program run on each Windows boot for all user logins. The software adds a background controller service that is set to automatically run. Delaying the start of this service is possible through the service manager. The main program executable is UIMain.exe. The software installer includes 43 files and is usually about 64.92 MB (68,071,990 bytes). CMUpdater.exe is the automatic update component of the software designed to download and apply new updates should new versions be released. In comparison to the total number of users, most PCs are running the OS Windows 7 (SP1) as well as Windows 7. While about 51% of users of Join Air come from Indonesia, it is also popular in Germany and Thailand.

Saturday, August 24, 2013

Android Paid Apps & Games First Realese Collection from Tz- Free for free Download...!!


In this First Collection you will find  the Following Apps
  1.  ppInstaller AdFree v1.0.7
     
  2. BatteryBot Pro v8.1.7 
     
  3. Call & Message blocker v4.5.6 
     
  4. Camera FV-5 v1.51  
     
  5. Cloud SMS v2.1.16 
     
  6. ezPDF Reader Multimedia PDF v2.3.0.0
     
    Click the  Link Below to Download
     

Best Software to Create a PDF documents from almost Every Window Application..!Free Download

PDFCreator is a tool to create PDF files from nearly any Windows application. With PDFCreator, you can create PDFs from any program that is able to print, encrypt PDFs and protect them from being opened or printed, send generated files via e-mail, create more than just PDFs: PNG, JPG, TIFF, BMP, PCX, PS, and EPS, and autosave files to folders and filenames based on tags like username, computer name, date, and time, merge multiple files into one PDF. PDFCreator also runs on terminal servers without problems.
PDFCreator's optional server installation mode can act as a network printer, but we chose the standard installation, which includes some optional downloads such as Images2PDF and PDFArchitect, plus some sample files and our choice of language and Help files. We chose all the extras and opted to add the tool to context menus as well as the Print menu. If you can print a document, you can use this tool. The steps are the same, with a screen full of fields to let us easily add Title, Author, Keywords, and more. You can also edit a document's Creation and Modify dates or instantly add the current date and time. Once you're finished, you can save, print, or e-mail your newly created PDF. PDFCreator creates more than PDFs, though, with the option to convert and save files in 13 formats, including bitmap, PostScript, and others.

Free Download from Here
 

SOURCE:CNET

1000 PhotoShop Tricks With Snapshots and Step by Step Guide...!!Download .Pdf

1000 PhotoShop Tricks (2nd edition)
Publisher: Visual | ISBN: 076458841X | edition 2008 | File type: PDF | 326 pages | 33 mb

UYou already know Photoshop basics. Now you'd like to go beyond with shortcuts, tricks, and tips that let you work smarter and faster. And because you learn more easily when someone shows you how, this is the book for you. Inside, you'll find clear, illustrated instructions for tasks that reveal cool secrets, teach timesaving tricks, and explain great tips guaranteed to make you more productive with Photoshop.

Related Posts Plugin for WordPress, Blogger...

Reliable & Affordable Hosting+Web Services