How to Get Rid of a Trojan horse Virus?

How to Get Rid of a Trojan horse Virus?

If you’re regularly using a computer or own a computer, then there is a good chance that you have encountered a Trojan horse virus. A Trojan horse virus is essentially a malicious file that is attached to a legitimate program that end users download and install on their computers. The main characteristic of this particular virus type is the fact that it’s well known for destroying computer data. It attaches itself to your computer as legitimate software and does its damage once inside.

Trojan horse Virus Features:

According to recent reports, Trojan horse viruses make up over 70% of viruses that are detected by antivirus scanners today. Because of such a high infection rate, there is a good chance that you or someone else you know, that owns a computer, will at some point encounter one of these viruses. The effects of these virus types include the following:

• Sluggish system performance.
• Unsolicited pop-ups.
• Hijacking of your system.

Repairing your system from these types of viruses does not require an inordinate amount of computer expertise, nor will it require you to seek help from a computer professional.

The primary difference between your typical computer virus and a Trojan horse virus is that the Trojan horse virus is/was not designed to propagate itself inside your computer. The two most common ways that people get these virus types onto their computer is by mistakenly downloading and running the virus file or installing a program that has a Trojan horse attached to it (as previously explained). These virus types are capable of stealing confidential data from your computer, while downloading other malicious files to it. As a viable preventative measure against these viruses, you’ll want to ensure that you have a firewall program installed and running on your computer. That said having an antivirus program running on your computer may not always be the most effective solution against these viruses.

 

When it comes to removing Trojan horse viruses from your computer, there are a number of steps that you should take. These are the following:

Run a Full Antivirus Scan:

This is definitely the first thing that you should do, when infected with a malicious file. Of course, the general assumption is that if you have one of these virus programs running on your computer, then you’re system should be free of viruses to begin with. Well the reality is that there is a lot more to it than that.

Consider the following options:
  •  Update the virus definitions of your antivirus scanner.
  •  Change the Scan options to include heuristics and potentially dangerous applications.
  •   Set the antivirus program to scan archives, excluding only those files you know are not infected.
  • Now carry out the full scan.
  • Run Virus Scan in Safe Mode

After running a virus scan in your normal Windows environment, you’ll want to do the same in Safe Mode. This is because some or all of the infected files may be locked by the operating system. This typically happens when the infected file is in use by Windows. Thus, you’ll want to restart your computer in Safe Mode, where you’ll have a limited number of processes running in the background, then carry out the same steps.

To enter Safe Mode, simply press the F8 key after the POST, and then choose Safe Mode with Networking.

Use Specialised Removal Tools:

There are a number of special tools out there, developed by antivirus companies, made for the sole purpose of removing those hard to reach infected files. Kaspersky’s Virus Removal Tool is a favourite of mine, however there’s also Microsoft’s Malicious Software removal tool and McAfee’s Stinger. All these tools do an excellent job at removing threats from your computer.

The best way to approach this may be to try and find out which virus has infected your computer, that way you could try finding software that has been specifically designed to remove it.

Manually Remove Trojan horse Viruses:

freedom on internet

The last option you have available to you, involves manually removing the virus file yourself. Removing it yourself is a process that will entail doing the following:

• Setting hidden folders to display, in Windows.
• Restarting your computer in Safe Mode.
• Stopping all processes that are either infected or associated with the Trojan virus.
• Lastly, editing the Windows registry.

Things to Consider:

When it comes to removing the infected files from the registry, you will need to locate the RUN folder. Once you find this folder within the entries, you will be required to delete all the associated .exe and .dll files. You should also look at the programs configured to start during boot up. This method may prove most ideal for those who have a strong knowledge in editing the Windows registry. Otherwise, you’re better off using specialised software or a really good antivirus tool to do all the leg work for you.

–AUTHOR INFO—

Uchenna Ani-Okoye is a former IT Manager who now runs his own computer support website compuchenna.co.uk.

How to unblock sites around the world with a VPN

How to Unblock Sites around the World with a VPN?

The internet is home to a world of wonderful content. From movies and TV shows to music and sports, there’s something for everyone. Unfortunately, more and more web services are placed behind geo-restrictions, for no other reason than for the profit of local license holders or the whims of government agencies. That’s why the question pop up How to Unblock Sites around the World?

It doesn’t have to be this way. With the advent of technology, there’s an all-in-one tool that will help you unblock sites and content, secure the information you transmit over the web and hide your online identity. It’s called a VPN. VPN is easy and feasible answer for “How to unblock sites around the world?”

A virtual private network is a nifty piece of technology that allows you to connect to different internet servers around the globe and surf the web as if you were located in a particular country. Whether you want to watch Hulu (connect to a U.S. server) or stream from BBC iPlayer (use a UK server), a VPN helps you unlock your favorite websites and social networks no matter where you are. Here’s how to unblock content around the world with a VPN

Step 1: Get a VPN app

There are plenty of VPN providers out there offering similar products. Try to avoid free VPNs — they usually don’t have an expansive collection of servers, offer poor connection rates, or provide limited encryption and security. You don’t want to be stuck with an inferior product (and limited tech support) when trying to access the web abroad.

A premium service subscription will cost anywhere between $5 to $10 a month. That’s a reasonable amount of money to pay, given the content unblocking and data security a professional VPN offers. How to unblock sites? answer is simple use VPN.

unlocked website

Step 2: Set up your VPN

Not a techie? Scared of staring at lines of incomprehensible code? Not to worry. Modern VPN apps are easy to setup. Just download the software as you would any other application on your computer or smartphone and follow the setup instructions. You’ll be up and running within minutes.

Step 3: Connect and go!

The best thing about using a VPN app? It makes accessing the best of the internet super easy. With just a click/tap of a button, you can change your IP address to appear from anywhere in the world.

If you’re looking to access social networks like Facebook or Twitter, connect to any server location where the service isn’t blocked. If you’re looking to stream sports or watch Netflix and Hulu, an American server is your best bet. And if you just want a secure connection from where you are, connect to a server location in/nearest to your vacation location.

So whether you’re taking photos next to Big Ben in the UK or relaxing at a luxury resort in Thailand, a VPN places you within one click/tap of your favorite social media networks and online shows. It’s that easy!

wifi password hack -Fern Wifi Cracker

Fern wifi cracker tool is attacking and security auditing tool, which is written python programming language. Fern wi-fi cracking tool mostly used for wifi password hack, without having detailed knowledge of coding and packet inspection or auditing. Fern wifi password hack tool able to crack WEP/WPA/WPS keys run other network based attacks on wireless or ethernet based networks.
Wifi password hacking tool work on Linux machines, It is tested on BackTrack,Ubuntu and Backbox linux.

Wifi password hack tool- Fern Password Cracker:

wifi password hack -fern-wifi hacking tool

Features:
Fern Wifi Cracker currently supports the following features:

1. WEP Cracking with Fragmentation,Chop-Chop, Caffe-Latte, Hirte, ARP Request Replay or WPS attack

2. WPA/WPA2 Cracking with Dictionary or WPS based attacks

3. Automatic saving of key in database on successful crack

4. Automatic Access Point Attack System

5. Session Hijacking (Passive and Ethernet Modes)

6. Access Point MAC Address Geo Location Tracking

7. Internal MITM Engine

8. Bruteforce Attacks (HTTP,HTTPS,TELNET,FTP)

9. Update Support

wifi password hack
wifi password hack -fern password hack

Wi-Fi Hacking tool

Prerequisites

The Program requires the following to run properly:
The following dependencies can be installed using the Debian package installer command on Debian based systems using “apt-get install program” or otherwise downloaded and installed manually

1. Aircrack-NG

2. Python-Scapy

3. Python Qt4

4. Python

5. Subversion

6. Xterm

7. Reaver (for WPS Attacks)

8. Macchanger

DISCLAIMER: Fern-Wifi-Cracker is designed to be used in testing and discovering flaws in ones own network with the aim of fixing the flaws detected, DO NOT use the program on networks for which you don’t have permission, i am not responsible for whatever damage you cause by using this software.

For latest updated versions Click below

http://www.fern-pro.com

Download Password Cracker : Brutus

Many of us want to learn ethical hacking, password cracking of Facebook, Twitter and Gmail. One tool that can help you to do so is Brutus. Password cracker Brutus is fastest and one of the most flexible remote password cracker on which you should get hands on. Exciting news about Brutus password cracker tool is free of cost and it .

Brutus Password hacking tool:

Brutus works on Windows 7,Windows XP. It is not available for Linux or Unix. Password cracker  Brutus was made publicly available in October 1998 and since that time there have been at least 70,000 downloads and over 175,000 visitors to this page.

Brutus was written originally check routers password etc. for default and common passwords.

Best Features of password cracker Brutus:

  • Http
  • Pop3
  • FTP
  • SMB
  • Telnet

More info about password cracker Brutus tool is given inside the download file. Brutus does very weak target verification before starting, in fact all it does is connect to the target on the specified port, that’s all. It is a good idea to manually check your target before you spend three days trying to brute force and anonymous FTP server. Brutus is less likely to detect an error in the response from the server

It almost goes without saying that Brutus is ONLY for use in situations where the target system administrator/custodian has AUTHORIZED the action. Many target systems will log authentication failures and consequently will log any attempted engagement with Brutus.

Some awesome features:

  1. It allows you to 60 simultaneous target.
  2. User name from list or single username.
  3. Password dictionary, combo (user/password) list start and end letter and configurable brute force modes
  4. Load and resume cracker
  5. Attempt of trying and delay
  6. HTML Form interpretation for HTML Form/CGI authentication types

Download it from here Password for this is technosnoop@follow

Brutus Download

Note: This tool is given for educational purpose. For any illegal use of this tool Technosnoop  and team will not be responsible. Do not contact us for “how to use tool”.

How Safe Is LastPass?

One of the most popular online tools to grow in recent years has been LastPass, a password management tool that hopes to get rid of clutter and minimize difficulty remembering your various passwords by using a master password and randomly generating the rest. In a world where everyone has dozens of online accounts worth protecting, such applications are welcome, but at what cost to security does the convenience come?

Lasr pass

Here are some things you should know about LastPass:

The Concept

You need only to think about the concept of LastPass to be concerned for your security. It is a cloud-based freemium service that allows user to collect all of their passwords into one location, and it promotes that it guards this information very well. Yet if this one location is compromised, the user’s online life is all but ruined, and they will have to spend at minimum a few days cleaning up the mess, that is if they are lucky enough not to be the victim of identity theft. Out of all the different types of eggs to put into one basket, passwords don’t come to mind first.

It also does not help that everything is stored in the cloud, which has a poor reputation for security by any standards. Every other month, you hear about a massive breach of data that nearly destroys a company that is the source and puts all of their clients and customers on edge for at least half a year. No matter the level of security LastPass has, it cannot entirely eradicate human error, nor can it foresee every tool and method a hacker might use in the future.

Previous Problems and Successes

While LastPass has been generally reliable to its customers, there have been a few major incidents that are worth mentioning:

  • In the middle of June 2015, LastPass reported that there was a breach in their security that resulted in the loss of customer usernames and password reminders in addition to other data. While their main vaults weren’t compromised, it shows that the company is not invulnerable.
  • In May of 2011, there were signs of a security breach in which an unknown amount of data could have been taken. LastPass was responsible in responding, and rebuilt much of the compromised hardware from the beginning. To this date we still do not know much more about the incident, but it was bad enough that LastPass asked its users to change their master passwords.

Fortunately for users, there have been few other reports of a breach that isn’t attributed to user error. Considering the value of the target and the frequency of cyberattacks, that should be considered a success.

 

Using a Virtual Private Network

One thing that would make LastPass a much more viable security option would be to install a Virtual Private Network (VPN) on your device. What a VPN does is create a connection between your device and an offsite server which is well protected. This connection is encrypted using the highest reasonable security standards, which means that no one will be able to look in on your passwords or any other data. They will only be able to tell that you are using a VPN and nothing more. The offsite server will additionally mask your IP address, allowing you to appear as if you are accessing the internet from a different country or location.

LastPass does help you when you are using a public network, especially if you are using a virtual keyboard, but the added protection of a VPN will allow to not only be safe in your password usage but all of your data usage. This includes your user names, your communications, your emails, and your browsing history. Do not let LastPass lure you into a false sense of security where these items are concerned, and be sure to cover all of your bases instead by looking at some VPN reviews and deciding what works best for you.

What if Someone Gets Ahold of Your Device?

Even if you had complete and assured protection and had an absolute guarantee that nothing would happen to your passwords in the cloud, there is still an issue that you might want to think about. What is someone were to get ahold of your phone or laptop without you knowing? It would be extremely difficult for you to know in time so that you could contact their customer support or take any action before the hacker got in (a 4-digit PIN won’t keep someone out for long) and then used the autofill and app to get into all of your accounts and wreak havoc.

Choosing a strong master password is great for these circumstances, but if that is cracked, you have a major issue on your hands, and hackers are developing tools to get through master passwords constantly. It is just another way of putting all of your eggs in one basket, albeit a safer one than most. You can add additional layers of security and verification, but those can always be broken as well.

LastPass is certainly a fine solution to your password management needs, if they were compromised they wouldn’t be in business. Yet is the service really necessary? Do you really want that information in digital form just for the sake of convenience? Wouldn’t a good safe and a notebook provide better protection and peace of mind? Only you can answer these questions and make the right decision.

About the Author: Cassie Phillip is a technology blogger who writes about internet security and data privacy. She enjoys share tips and tricks with her readers to protect them against cyberattacks.

Tips and apps to take better selfies

Tips and apps to take better selfies:

Everyone wants to take good photos, and even more, want to look good in a photo. At times taking a selfie can be tricky so here are tips and apps to take better selfies. As you need to hold the phone away from you and then snap the picture. You can improve on taking selfies by simply keeping the following few things in mind.

selfie tips and apps

Use a good angle:

You know how you look so use an angle that accentuates your good features. Try to avoid angles that make you look weird, you don’t want to scare your friends when they randomly scroll through your gallery. If you are taking a selfie in a group, then move the camera up to accommodate everyone and try not to cut people in the photograph.

Lighting:

Avoiding using the built-in fash, until and unless there is very little light. Use the natural light which wont make nasty overexposed areas in your photos. Use a well lit room or best would be to shoot under the daylight.

Filters:

You can always enhance your photos by using various filters. There are a number of apps available that can really add a punch to your photos and make them look impressive. You can also enhance your skin in case those nasty zits are spoiling your face. Body language: Have a nice expression and try to shoot more than just your face with a natural pose. You
can also use the environment, or just show off something new, like the latest title you got for your Xbox.

In the end, it is your picture. You can shoot yourself however and whenever you want, but having a memorable moment in the end, is what counts.


 

Apps To improve your Selfies:

Facetune:

facetune take selfie

This photo editing app lets you improve every aspect of your picture. You can erase blemishes and emphasize your favorite features plus the app lets you make tons of changes with a swipe of your finger. Available Facetune Android platform.

YouCam Perfect – Selfie Cam:

youcam perfect
youcam

This app comes with an interesting automatic trim feature and other tools to manually remove wrinkles, eliminate dark areas of skin, or delete imperfections. You can even
change forms, making your face look thinner, your eyes bigger and brighter, and even completely erase objects that are in the background.

Available for YouCam iOS and YouCam for Android platform.

Frontback:

frontback logo

This app lets you take a picture with the front camera and another with the rear camera, and combine both into a single image. You can then share them directly on your social media networks.

Available Frontback Android platform.

How to use selfie stick?

tips to take selfie
selfie stick

No matter how stupid you may look holding it, but it definitely helps you getting cool looking
selfies. The selfie-stick is quite an invention where you can just fit your camera/smartphone
on one end and then click from the other end.

Specifications Selfie Stick Selfie Stick Premium
Fully extended length 114.5 cm 75.5 cm
Fully collapsed length 26cm 33 cm
Photo clicking device Shutter Ball Time Shutter
Weight 190g 170g
Material Aluminium Polycarbonate
Tripod included Yes No
Manufactured China Korea

The idea is to basically have a better composition and add a wider area into your picture or
as if the picture was actually clicked by a third person.Yes, there are brands for it. The ‘Selfie-stick’ from Merlin Digital comes in with a length of 114.4cm and is made with durable Aluminum casing. It also comes with a tripod and a shutter ball device to click pictures.

The Selfie stick premium on the other hand comes with ultra-lightweight poly carbonate
body and weighs only 170g, making it easier to hold and carry. It also features a time shutter
device for clicking pictures. The time shutter can connect up to 6 separate devices at one time. It can go up to 75.5 cm in length.

 

 

how to open blocked sites

How to open blocked sites ?

How to open blocked site? Common question asked by novice computer user. Most website monitors  behavior and data usage of user and create profile for them which is then sold to third parties. On internet your freedom of speech manifests in the repression through federal or private organizations. More and more government banning website with excuse of child safety, against terrorism and copyright infringement thereby limiting freedom of speech. To unlock blocked website and too keep your freedom of speech on internet these are the few easy ways.

Open blocked site is easy task. There are various ways to unblock site.

Here I am going to enlist few of them which are easy to use and configure and free of cost to unblock website. You can use this open blocked sites  in school, office or anywhere without having admin access or installation access to software.(browse addons)

Use VPN you can open blocked sites.

  • Spotflux VPN: The location and identity of your devices are concealed. Your connection to the internet is safer, more private, and unrestricted.Your internet traffic is encrypted and sent through the Spotflux cloud.
  • Hot Spot shield: Protect your data by encrypting data allow privacy protection and gives access to geo-restricted sites.
  • VPN book
  • VPN direct

Browser extensions or add on

1. Betternet for google chrome:

vpn free
betternet vpn

By using “Betternet” you can unblock any site easily. No signup no restriction on data transfer. Protect privacy from hackers and surf the internet anonymously with free proxy.

It’s by far the easiest way to connect to the web without censor or restrictions.
No ads, no registration, no bullshit; we just protect your privacy and identity.

Features of Betternet:

  • Totally Free VPN service forever
  • No credit card No
  • Registration or Logging in is needed
  • No log is saved from no user
  • No ad is presented in the app
  • Simple interface just to connect
  • Simply one tap and connect to VPN

free VPN service for your chrome browser that can be used to unblock all restricted websites and services such as Facebook, Twitter, Youtube, etc.Therefore it’s a free VPN service, it’s super fast! Unlimited Free VPN detects your location automatically and connects you to the nearest server; as a result, your connection will be much faster than other providers.

2. AnonymoX:

change ip adress
anonymous x

AnonymoX is an initiative for anonymization on the internet. The aim is to restore the users right of anonymity in the web. It is available in free as well as premium version. Stealth mode, change IP, set IP for particular website and much more. For free user it allow  daily 500MB of data transfer.

What it gives you:

  • Browse the web anonymously
  • Change your IP address (to one provided by us)
  • Visit blocked/censored websites
  • Appear to originate from another country
  • Delete cookies, show your public ip, change browser id

How unblocking sites work:

Firstly when you entered website it will be opened by Anonymity server called proxy. This proxy hide your true identity and makes it as your from different region or country, but you will be able to access blocked site.

Tor Browser:

unblock site via tor

Tor browser is another open source application allow you to unblock sites. Usability of tor browser is easy and you can change the identity any time you want. It is freely available for Windows,Linux and Mac OS X also.

Tor browser creates anonymous communication connection. Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than six thousand relays so it makes difficult to trace back.

Know about it and how to use it. Tor browser and download “it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you open sites which are blocked”.

Tor browser works with firefox browser when you launch tor it will call automatically firefox browser which is already present in setup file.

tor works
tor with firefox

As you can see one option at right corner present by using that you can change your identity and make yourself anonymous on internet or fake identity and access restricted sites easily.

 

 

 

Fastest Browser Firefox

Speed up fastest browser Mozilla Firefox

fastest browser
Firefox

Mozilla Firefox is considered fastest browser or speed king today’s date. Here are some tweaks and hacks of fastest browser firefox.

Firefox is an extremely popular web  browser that’s developed and distributed as  part of  a free Open  Source project by the Mozilla Foundation. Firefox has gained ground over the past few years due  to its  custom-ability and  light-weight nature.

Here we list a few  general tips followed by tweaks in the browser configuration to enhance performance and usability.

1.Use a keyword to search within a site

This trick bypasses the process of opening a website to search within it; the hack  simply condenses it into  a single search from Firefox’s  address bar, also called the ‘Awesome Bar’. Open.any  website with a search bar (E.g. www.amazon.in) –> Right- click on search bar –> Add a key- word for this search. In the tab that opens, enter ‘amazon’ as the keyword. Now  if you  want to search for an external hard disk on amazon.in, instead of opening the website and  using its search bar,  you  can  simply type your query along with the keyword –  ’amazon  external’ hard disk 1 TB, in this case– in the browser’s address bar and it from the website. In this way, you  can  search for a query in any  non-Google search engine or  website with a  dedicated search bar, similar to the Omnibox’s ‘add a new search engine’ feature in Chrome.

2.Discover Easter Eggs

Firefox has  an awesome group of developers, which is  most evident by the sheer ingenuity of the Easter eggs hidden in the browser. Check out the ‘about: robots’ page (Type ‘about: robots’ in the Awesome Bar.). It actually has  references to pop culture usage of robot-themed media and makes a reference to ‘The Hitchhiker’s Guide to The  Galaxy’ and ‘Futurama’. The ‘about:mozilla’ page  leads from what’s called ‘The Book of Mozilla’. This entire book can be seen here: https://www. mozilla.org/en-US/book/. The book supposedly tells the story of Netscape Navigator’s battle against Internet Explorer.

3.Boost  UI performance

We  briefly spoke about how Chrome’s performance could be boosted by using hardware acceleration. On Mozilla, there’s a basic  provision for doing the same. Go to Settings -> Advanced -> General. Check the  boxes next to ‘Smooth scrolling’ and ‘hardware acceleration’.  Enabling these options might provide a fractional speedup while browsing graphics-intensive pages.

4.Change the default email client setting

When you  click  on ‘send mail’ links on  Firefox  or   any other browser you’re immedi- ately directed to your default mail client  such as Outlook (on to change this setting. Simply go  to Preference ->  Applications -> Search for the  content type  ‘mailto:’ On the right, you can  change the  action type by selecting from  a dropdown list. Using this option, apart from email you can set default applica- tions that the browser can use to open files such as JPEG, MP3, etc.

5.Use the about: config page

firefox config
config your firefox for you

The ‘about:config’ page is where all the  subtle tweaks are  done, which if  experimented with responsibly could enhance your internet browsing experience. This is the chrome://flags equiva- lent of Firefox, in which Mozilla has bundled some really brilliant features. We’ll first introduce you to a few usability-enhancing tweaks and follow them up with some tips to boost performance. As we mentioned in the context of Chrome, these features are guaranteed to work 100 percent of the  time,  but at times could prove to be detrimental. How- ever, the features listed below are relatively safe and you can revert to your old settings anytime by using software called ‘FireTune’.

Download os x yosemite and hacks

Download os x yosemite and hacks

Make an OS X Yosemite installation disk:

Since the Mac App Store was introduced, all the OS releases and updates have been directed
through it.

Yosemite upgrade and hack
Yosemite upgrade
os x later install
os x later install

This is why -unlike Windows – you don’t get a permanent physical copy of the OS release. However, you can create a bootable installation of Yosemite or any other OS X release on a USB drive. This will be helpful in a crisis or while installing the OS on a different Mac without downloading the huge 5GB package again.

You need a USB flash drive (a pen drive) with 8GB minimum storage. Download OS
X Yosemite from Mac App Store and make sure you complete this process before proceeding
with the installation as the system deletes the downloaded installation files after you’ve installed the new update.
Firstly, format the drive with‘Mac OS Extended (Journaled) file system and name it ‘Untitled. Open the terminal and type the following:

sudo /Applications/Install\ OS\ X\ Yosemite.
app/Contents/Resources/
createinstallmedia --volume /Volumes/Untitled --applicationpath /
Applications/Install\ OS\X\ Yosemite.app  --noint-eraction

Then press [Return]. The process will continue after you type in the administrator password.
It will take around 20-30 minutes for completion.

Selectively mute message threads:

Like with iOS, you can selectively mute message threads on your Mac. This feature comes in
handy if you’re getting annoying messages from someone you don’t want to hear from. To
selectively mute message threads,

open Messages app

Select the thread you want to mute -> Details -> Check
‘Do not Disturb’.

Rename multiple files at once:

Mavericks offered a batch- renaming  feature, however Yosemite takes it  to  a whole new level.

Select the batch of files you want to rename -> Right-click-> Select ‘Rename (x) items’. You can rename it in three ways:  Replace Text, Add Text and Format.

Replace Text works just like traditional Find and Replace, where you can find the text pre- sent in the file name and replace it with another name. Add Text appends the current file name(s) with the one you specify. Format lets you completely change the name by  choosing a  specific format of file name(s).

Try the new Dark Mode:

With Yosemite, you can change the  color  of the  menu bar  and dock  to a darker shade with a black tint. To do it, go to

System Preferences -> General-> Check ‘Use dark menu bar and dock

located under Appearance.

Share screen in Messages app:

You can share your screen with a friend or a client while chat- ting using iMessage. Some pre- requisites for this to work:

– Both users must be running Yosemite,

– Both users must be signed into iMessages

– A text conversation must have been started,  otherwise the needed button doesn’t appear. To  share your screen, initiate a text conversion

-> Click on ‘Details’ -> Tap the double-screen icon -> Choose whether you want to share your screen or see theirs.

Record your iOS device screen using QuickTime

Yosemite allows you  to record your iOS device screen using QuickTime. This  feature  is aimed at developers who  want to make video demos of their app. To use  this feature, your iOS device needs to be updated to iOS 8. Also,  this recording feature doesn’t work with old devices that have a 30-pin dock connector. This is where it pays off to own an iOS device  with a Lightning Connector.

To record the screen, connect your device  to your Mac using the Lightning cable and unlock your device.

Launch  the QuickTime Player on your Mac -> Go to File Menu ->  Select ‘New Movie Recording’ -> Click on the small arrow next to the red recording button -> Select your iPhone -> Hit the recording button to start recording

Create signatures using Trackpad

With Trackpad you can now input your signatures as well, and it works flawlessly. To do it,load any document in Pre- view or using the Markup on Mail app -> Click on signature button -> Select Trackpad -> Create your signature

create sign iMac
Select Trackpad, hit the begin button and sign

Use Spotlight search as currency converter:

The  scope  of Spotlight search is not local anymore. It can be used to perform search over the Internet as well. With this happening, you  can  perform many actions right from  your desktop. One such task  is currency conversion. Just go to the Spotlight search and  type “1 USD to INR” and  it will  come  up with the  result. Handy, isn’t it?

Close  Safari tabs on other iOS devices:

The ‘Continuity’ feature intro- duced in Yosemite is very useful if you don’t stray outside Apple’s ecosystem. With this feature, you can do the same  task  from multiple Apple devices without interruption. To make the most of this feature, you  can  use  it to close  Safari tabs – that you maybe don’t want family members to see – currently running on another iOS device.

To use Continuity, you need to  be  logged in  to  the  same iCloud account on  both the devices. If this is your cup  of tea, then head over to Safari and go to the tabs view. There you’ll see all the tabs that are currently running on Mac as well as your iOS device. Just close whichever you don’t want.

Use hot keys  to move the dock:

The  dock  (usually residing at the bottom of the desktop) can be moved to the left or right by using hot  keys.  To do it, press [Shift] while clicking the divider bar  on  the  dock  to move it to either side of your screen.

Selectively delete Safari history:

Safari lets  you  delete history selectively in Yosemite. Earlier, it was a Boolean affair i.e. all-or- nothing. Now  you  can  choose whether to delete  history from the  past hour, the  day  before etc.

Be untraceable with private windows:

Safari in Yosemite has  added ‘DuckDuckGo’ as another search  option  along  with Google, Bing and Yahoo. DuckDuckGo is a search engine that doesn’t track you, thus, helping maintain your privacy.

duckduck go on mac
private on imac

To  use it as  your default search engine (in place of Google), click on the magnifying glass to the  left of the  address bar  and select ‘DuckDuckGo’ from the list.

Place and answer iPhone calls from Mac:

Another newly introduced feature in Yosemite, ‘Handsoff ’ lets you place and answer iPhone calls  from your Mac. With this feature, you’ll  never miss any calls  if you’re working on your Mac and your phone is away from you.

To place calls,  you need your iPhone and Mac to be logged in to the same iCloud account In addition to this, both should be connected to the same Wi-Fi network.

Now  that being done

open FaceTime app -> Log in to your account -> navigate to FaceTime Preferences -> Check ‘iPhone Cellular Calls’

Send and receive SMS from Mac:

The  Handsoff feature extends to send and receive SMS as well. Make sure you  satisfy the prerequisites, and then from your iPhone go to Settings > Messages > Text Message Forwarding > Enable it for your Mac. Doing  this will show a verification code on your Mac. Enter the displayed code and tap  ‘Allow’. That’s it! Now, you can send and  receive text messages from your Mac.

Use iCloud Drive as a Dropbox  alternative:

iCloud Drive is Apple’s answer to Dropbox, Box.in,  OneDrive and other cloud storage services. iCloud was initially aimed at syncing iOS and  Mac application data, however, Apple extended its usability to store other user files as well. Yosemite comes integrated with  iCloud Drive. You  can locate it in the Finder menu. Just sign in to your iCloud account, and drag and drop files into your iCloud Drive. They’ll automatically be uploaded.

Use Quick Type:

Apple has  introduced the  iOS 8-like QuickType feature  in Yosemite as well. This  feature shows suggestion for the  next word to be written. For  this  to work, you  must be writing in an  Apple app. While writing, just  press the [ESC] key and  it will bring up suggestions for the next word.