Google Pixel 2: Water and Dust resistant Android Phone

Google Pixel 2: Water and Dust resistant Android Phone

Google_Pixel 2:_Water_and_Dust_resistant_Android_Phone_Technologic World

If I will ask you today what is the importance of Google in your life. Then I hope most of us answer will be “One of the important part of today’s lifestyle”. Yes, however I also think same as you. Through which we can understand what is the importance of “Google”  in your life. As we know that 95% people of world use Google most of time of a day. In which 55% people of world always stand on Google continuously, it clears that importance of Google. Now I am going to talk about the real sense behind to tell u above all data is. Before that I want to ask you what you think about Google Products. Did you listen about Google product before it. Yes, why not most of you are using Google product. But what about Google android phone product. Yes, it is also good as all product of Google. 

           Now, I am going to tell you about the latest Android Phone of Google. No, I will not talk about Google Nexus, Google Pixel. Don’t afraid I will give you information about the most latest Google phone full specifications, features, Price, Safety and so on things details. 
Google pixel 2 smart phone launched in October of this year. As I told you it has some amazing features which will make you proud to buy it. The Google pixel 2 is powered by 1.9GHz Octa-core Qualcomm Snapdragon 835 processor with 4GB LPDDR4x RAM. It has 64GB internal storage and that can be expended. 

Xiaomi Redmi Note 4

              The phone comes with a 5-inch touch screen display with a resolution of 1080 x 1920 pixels. And the best features for which it will heat in market that is “Water resistance metal unibody”. It means you can go anywhere in rainy season without any water security of your phone. It is completely waterproof Android phone. If I will talk about camera quality. Best view of world you will see from this mobile phone camera. Because of 12.2 MP cameras with f/1.8 aperture which makes better view of image quality. 

Amazing specifications and features of Google Pixel 2
  • Operating System
Android 8.0.0, Oreo  
It will give you minimum 3 years of OS and Security updates. Due to you can easily enjoy the updates security and OS of your phone.
  • Processors
Qualcomm Snapdragon 835
2.35GHz + 1.9 GHz, 64 Bits Octa-Core
Adreno 540 with security model
  • Camera
Rear Camera
12.2 MP, 1.4 μm , f/1.8 aperture
Autofocus with laser + Dual pixel phase detection 
Optical + electronics image stabilization 

Rear camera video
1080p @ 30fps, 60fps, 120fps
720p @ 30fps, 60fps, 240fps
4k @ 30fps

Front camera
8MP, 1.4 μm, f/2.4 aperture, Fixed Focus

Front camera video
1080p @ 30fps
720p @ 30fps
480p @30fps

  • Display 
Cinematic 5.0 in (127 mm) display
FHD (1920 x 1080) AMOLED at 441ppi
2.5D Corning Gorilla Glass 5
Always-on display 
95% DCI-P3 coverage
100000:1, super contrast ratio, True black level
Full 24-bits depth or 16.77 million colors

  • Memory & Storage 
Internal storage: 64GB and 128GB
Best thing is “unlimited online storage for photo and videos”

  • Dimensions & weight
Length: 5.7 in (145.7 mm) , width: 2.7 in (69.7 mm)
Height: 0.3 in (7.8 mm), Weight: 5.01 oz (143 g)

  • Battery 
2700 mAh battery
You will get up to 7 hours of backup with only 15 minutes of charge.

  • Network
World-wide network/carrier compatibility with: 
GSM/EDGE: Quad-band (850,900,1800,1900 MHz)
UMTS/HSPA+/HSDPA: Bands 1/2/4/5/8, CDMA EVDO Rev A:BC0/BC1/BC10

FDD-LTE : Bands 1*/2*/3*/4*/5/7*/8/12/13/17/20/25/26/28/29/30/32/66*2
TD-LTE: Bands 38*/40/412
It supports up to CAT 15 (800Mbps DL / 75Mbps UL), 3x DL CA, 4x4 MIMO, 256-QAM DL and 64-QAM UL (depending on carrier support)

  • Sensors
Active Edge
Proximity / Ambient light sensor
Accelerometer / Gyrometer
Pixel Imprint: Back-mounted fingerprint sensor for fast unlocking
Hall Effect sensor
Android Sensor Hub
Advanced x-axis haptics for sharper/defined response

  • Materials 
Aluminum unibody with hybrid coating
IP67 water and dust resistant1
Corning Gorilla Glass 5

  • Media & Audio
Stereo front-firing speakers
Bluetooth 5.0 + LE
Wireless HD audio with LDAC, Qualcomm® AptX™ and AptX HD™ audio codes supported
USB-C™ port to use with your own USB-C digital headphones (see compatible headphones here)
Headphone Adapter to connect a 3.5mm jack to your Pixel
3 mics
Noise suppression

Price: it is affordable for everyone. Means only in 61,000 INR

The best thing of this phone is “water resistant metal unibody” which will give you relief from water problem. And all other features are too good. I think it will boom in market. I hope you will enjoy it. With all regards. 


How to recover data from hard disk

How to recover data from hard disk

How_to_recover_data_from_hard_disk_Technologic World

Most of us working on computer today. Each day we collect lots of files, images or generally we can say "Soft Data". In which, there are several most important  files of your work. Did you think, if we lost that files then it may be possible that we can lost our job. Let's take an example. I am a software developer and i am working on an important project report of top multinational company. Approx 90 percent of my work completed and as usual saved in my computer hard disk. And next day, when i started my laptop and i found that my hard disk has been destroyed and i lost all files with that important project files too. Now its time to put my hands on head and started starring on computer. But after few hours, i asked with myself "Is this solution of my problem?, What is the fault of my computer?  and all other questions like as...." .  

             As we know there are several malware, viruses, and all other thing which can affect your important files without notice us. After these all knowing we can't do anything to that viruses but we can do one thing what i am going to tell you today to get that all lost files. Now, if you think that you read wrong before few seconds then don't think so. Yes, you read correct sentence because i wrote that exactly correct. Yes, You can get your lost data within few minutes. Now, enjoy and keep smile on your lips because i don't want to see sad face from you lovers. 
 How to Update and test your security tools
       Now, its not the end of your problem. At this time, only we know that we can recover lost files but we don't know 'How? means How can you recover?'. So, You need some more time to know that. Let's have a look down to get solution of this major problem. No, No, its not major problem now..
I am going to inform you about two application through which you can recover your hard disk data. First one is  "EaseUS Data Recovery Wizard Professional" and second one is "savemyfiles.net". Operating function of both application is different. Now we will see one by one....

Step by step guide to recover data from formatted hard disk 

For  "EaseUS Data Recovery Wizard Professional"

  • Launch EaseUS Data Recovery Wizard Professional and you will find all portion then select the listed lost partition and click on 'Scan
  • EaseUS Data Recovery Wizard Professional will start scan quickly first; After the scanning , then it will start deep scanning automatically to find more hard drive partition data.
  • Preview all lost data and recover it; Now, you can see found data by file types and file name , select all found data and click "Recover" to save them where you feel safe spot in your storage device.

How_to_recover_data_from_hard_disk_Technologic World

For "Savemyfiles.net"

How_to_recover_data_from_hard_disk_Technologic World

  • Go to your browser and type "Savemyfiles.net" and click enter.
  • Then you will find "Download File" Click to Download. After Download.
  • Launch it in your PC , you will find three option as
           (A) I want to recover items from my hard drive
           (B) i want to recover lost emails 
           (C)i want to recover items on an external device.
  • Now,  Choose from these options according to your requirement 
  •  if you want to recover data from your internal computer hard drive then select first option means (a)
  • if you want to recover email only then you should select option no (b)
  • if you want to recover data from external hard disk then select option (C)

  • Just like if you want to recover data from external hard disk then we will select option (c) and choose device to recover then click to start scan.
  • Then you will find your lost data files.
  • To check that recover data, you need to go to "Advanced"  select first one of list and click "continue" then you will find list of recover lost data.
  • Now, select all files and Save where you feel safe spot your device.

Hurry up, enjoy your work without any tension of losing data. I am here to help you always as every instant of tech problems. Keep visiting my blog and share more and more to reach out all other followers. 


Xiaomi Redmi Note 4 Specifications, features, price and comparison

Xiaomi Redmi Note 4 Specifications, features, price and comparison 

Xiaomi_Redmi_Note 4_Specifications_features_price_and_comparison_Technologic World

The Redmi Note 4 does not pack in performance-grade hardware, neither does it sport a dual lens camera system, yet it gets a lot of things right. Even through it does not match up to the Cool-pad's processing muscle, it is equipped with a workhorse chip that ensures smooth operation while working on documents, browsing the web, watching movies and playing a game. You also get built-in sound optimization that add's subtle punch to audio without affecting clarity.

       This handset runs a customized UI that lets you switch between two profiles, each with its own set of apps and accounts. Plus, you can secure profiles with a password or fingerprint to prevent snooping. For instance, you can have one for work and another for when your child uses it. You also get an IR blaster to control a TV, DVD Player, etc, a call recorder and a basic video editor that lets you trim footage, add text and background music.
         Its rear camera is capable of sharp, detailed captures in well-lit settings; indoor images show some muddying of details, but this is a minor grouse. Photo quality, however, drops noticeably in low light environs. Also, it tends to take a second to focus on objects at time. The front camera produces average results and pales in comparison to the Vivo V5 Plus and Coolpad Cool 1.

         As far as battery is concerned, you can expect to get two full days of work before reaching out for the charger. Only the Lenovo P2 is capable of outdoing the Note 4 in this area.

     In effect, the Note 4 checks all the right boxes when it comes to performance, camera output and battery life. If you need a phone that delivers on all these fronts without breaking the bank, then this one is no brainier.
                  How to secure your PC’s from all types of viruses and Malwares


  • 5.5 inch (1920*1080 px scratch-resistant display
  • 2GHz Snapdragon 625 octa-core processor
  • 4GB RAM 
  • 64GB Storage , hybrid microSD card
  • 13 MP rear (dual-tone LED flash), 5 MP front camera 
  • Dual SIM
  • 4100 mAh Battery

Most affordable Price: - Rs. 12,999

Best Rating -7.5/10 


How to Update and test your security tools

How to Update and test your security tools 

How_to_Update_and_test_your_security_tools_Technologic World

Security tools offer a range of of features, but it's not always clear which ones you really need or what's being protected. The very least protection you need is a firewall, Antivirus and anti-spyware software also provide important protection, but anti-spam and anti-phishing tools are less critical.

1. Get basic, free protection

Windows XP doesn't come with any anti-malware protection, but it does have a basic firewall. Vista and 7 have an advanced firewall plus Windows defender for anti-spyware protection. Windows 8 has an advanced firewall plus a new version of Windows Defender with both antivirus and anti-spyware protection. Microsoft's free Security Essentials is a good choice for XP, vista and 7 (it won't install on Windows 8), as it automatically checks the Windows Firewall during installation. Don't install more than one antivirus program - they will conflict with each other and expend their efforts trying to disable their rival rather than looking out for incoming malware. However, it's fine to use manual scanners that don't run in the background, such as Malware-bytes free (www.malwarebytes.org) in conjunction with most antivirus programs, including Microsoft's free security tools. Malware-bytes is useful for occasional scans to ensure your main security program is doing its job.
                    Windows does not have anti-spam protection, but there's anti-phishing protection (the Smart-screen Filter) in Internet Explorer 7 and later. If you want anti-spam protection, use mail-washer Free (www.mailwasher.net) The excellent tool works with any email software and any Windows version.

2. Test the effectiveness of your firewall 

How_to_Update_and_test_your_security_tools_Technologic World

To check Windows firewall is active , click windows key + R to open the Run Box, type firewall.cpl and press enter. If the firewall is off , in XP click "ON", in Vista Click "Update setting now" and in windows 7 and 8 click "Use recommended settings". For other firewall software check the status and switch it "on" (if it isn't already) in it's settings menu. To check how effective your firewall is, use the free ShieldsUP online port scanner (www.grc.com/shieldsup). All ports should be closed to incoming connections useless a program on the PC asks for data from the web, in which case the firewll will open a port for that particular program. Ports are the numbered virtual "channels" the firewall uses to allow programs to connect to the internet. For example, port 80 is useful for ordinary web traffic.

How to secure your PC’s from all types of viruses and Malwares
                       To start the test, click Proceed on the ShieldsUP home page, Click the "All service ports" link and wait for the scan to finish. You should see a grid of colored boxes. Green or Blue boxes are fine, but a red box means that a port is open and potentially vulnerable. If you have a NAS (network attached storage) device, home server or software that allows remote file access, port 80 and /or 443 might be open. This is normal, but make sure you use strong passwords with these services. If you don't use remote access software.  a NAS or home server, you need to investigate the open port. Note down the number of any open port ShieldsUP identifiers. Hover your mouse over its square to check.

3. Check which drive has open ports

How_to_Update_and_test_your_security_tools_Technologic World

To find out what's responsible for any open ports download and install Nmap from the "Microsoft Windows binaries" section. Click the "Latest release self-installer" link. You will need to know your PC's IP address. Press windows key +R to open a Run box, type cmd in the box, then press Enter. Type ipconfig in the Command Prompt windows and press Enter. Note down the four groups of numbers shown next to 'IPv4 address'. These will be in the format xxx.xxx.xxx.xxx.
                      Now, Run 'Nmap-Zenmap GUT, type the PC's IP address into the target box but replace the last group of numbers with an asterisk(*), for example 192.16.0.*. Click Profile, Quick Scan. A list of PC's and devices will appear in the left pane. Click each device in turn and check the list of open (green coloured) ports to find which one corresponds with the open ports shown in ShieldsUP, Next, download and install the Nmap-Zenmap GUI on another computer that's either on the same network or is online and can see your main computer via its IP address. Use this computer to check the PC on which Nmap already checked for open ports. 
                     Don't be alarmed if you find several open ports on each device - it simply means they're being used by a program. You only need to check those that corresponds to the ports ShieldsUP highlighted because they're open to the outside world. If more than one device shows the sane port open in Nmap (this is quite likely), you'll need to disconnect the other devices from the network and test them one at a time.

Get an email when someone uses your PC

4. Find the program associated with an open port

If the device with an open port is a PC, you'll need to work on which program on it has opened the port. To do this, close all running program, go to Start, Programs, Accessories, right-click Command Prompt then click 'Run as Administrator'. In windows 8, type command prompt from the start screen to find the program icon, then right click and choose 'Run as administrator' in the bottom menu bar.
               In the Command Prompt window, type netstat -bno. This generates a list of each internet connection and its associated program. The program name is shown in square brackets above each connection. The port used is shown in the foreign address column after the colon at the end of the end IP address. For example, a connection to using port 80 is shown as In most cases these will be legitimate programs and connections, but look for any oddly named or unnamed ones using the open ports revealed by ShieldsUP, in particular check for programs shown as "Listening' in the column. Use the Process Library site (www.processlibrary.com/en) to check which program is referenced.
              Once you have found the program that's exposing your PC, uninstall it using the 'Add/Remove Programs' or Uninstall Program options in windows. If the program resists being uninstalled or is malware, you must first stop it running. To do this press 'Ctrl+Alt+Del', Click Task Manager, Processes, Right click the rogue file then click End task. Now use your antivirus tools or use CCleaner (www.ccleaner.com) to delete it.

5. Patch holes in your security

How_to_Update_and_test_your_security_tools_Technologic World

Missing windows updates and old versions of installed software can be a real security risk. Use Secunia PSI to check for out of date programs. This fantastic free tool constantly scans for any updates to your installed programs as well as missing Windows security updates. Click 'Update programs automatically 'when you install Secunia or click settings, 'Update handling', then tick update. Secunia prompts you to run a scan immediately and provides a report of what needs to be updated and alerts you to programs you need to update manually.


Without code Twitter Bot, Let’s see how?

Without_code_twitter_bot_let's_see_how?_Technologic world

Let's see Twitter Bot without code

Most of us aware about robot which comes under robotics technology but do you know that its short form is bot. Yes, Robot shortly called as bot. Now, I think you also know the work of robot but still I want to tell you what is robot or bots? A robot or bots is a programmable operator that operates as an agent for user or another program by simulating human activities. Generally bots can be used in electronics field to fulfill the human possible wish or to reduce human effort by using coding or coding as well as mechanical part. When we talk about bots in network or internet technology then how can I miss to mention artificial intelligence technology (AI technology). Artificial intelligence technology is also called as bots technology in which bots activities similar to human activity.
                                  Here I am going to discuss about Twitter bots. Twitter bots is mainly works on coding function. Who do reply as what you put in the required field.  According to situation, it will choose from set data field and give them instant reply. Either that is grammatical error situation, earthquake notice or happiness moment etc. it will reply instantly according to self-sensed condition.
Twitter bots do automatically favorite or re-tweets tweets according to matched given data criteria. It can like tweets, follow tweeter user who will related to your relevant profession, area, friends etc. if you want to reply automatically then it is also possible only through bots technology. Twitter bots can reply auto when it gets @mention twitter.

                                     Making a twitter bot is easy but depends on you how you want to make. If you want to make twitter bot according to your choice field means what you I want only that should exist then you need programming skills, coding skills, Python, node.js etc… But you can also use twitter bot without knowing coding skills and it is possible only in 5 minutes. This bots are hosted on google servers and it does not require program means “zero” programming knowledge.

Visit digitalinspiration.com/bots to get start. This twitter bots are internally written by using Google Scripts.

How to create your own twitter bot
Basic thought behind twitter bots is simple. You have specified search phase and choose action. Then, bot will search all tweets in your data when that tweets will matched in search criteria after that it perform the associated action on those tweets and perform instant action.

  1. Create a new account on twitter which will work as a bot. then go to apps.twitter.com , sign-in with new account and create twitter application. Now give your app a new dynamic name , description of your app and put your choice of URL in the website field. Click on the agree to developer terms and finally submit the form.
  2. Once the twitter app has been created then click on modify app permissions under application settings and change its access level to read, write and access Direct Messages .
  3. And in the last of this step, switch to the Keys and access Tokens tab and click the Create MY Access Token Button. Twitter will automatically generate the Consumer Keys and access tokens which we need in next step B.

STEP B : Now it’s time to “configure your twitter bots”

  1. Go to digitalinspiration.com/bots to open the twitter bots application to precede further steps.
  2. Enter the Consumer Secret, Twitter Consumer Key, Access token and access secret that were generated in the last step of step A.
  3.  Now, you need to specify the search phase box for the bots. The app will search all the tweets that match from this search phrase data box and process the bots function for all, one at a time.
  4. Click on save to initialized your new twitter bot. it’s over now, your bots are initialized and it will auto-run in the background of your account. Now, enjoy your modified twitter account with bots.

As we know that every sites provide some certain rules same as that twitter have also certain automation rules for that may your bots can give you spamming results , to avoid it mind below points.

  • If you are in offline mode during specific hours,  then setup out of office replies through it people can expect a delayed response of their message.

  • If you will change your twitter username, then you need to set an auto-DM bot for the old account. So that, new followers can gets to know your new screen name.  

About Me

My photo

I am Jeetendra Saxena from Jaipur India. I love to know the latest technology and what’s going on, in world as well as universe. Also, I want to share my knowledge with others. That’s why I started a website www.technologicworld.com to share technical , electrical, and logical knowledge from all over world. You can follow me on Facebook, Twitter, Google, Google+, LinkedIn, Friendlife etc…