Feeds:
Posts
Comments

Archive for the ‘Geek Stuffs ;)’ Category

YOU DID!!!

facebook cubeFacebook’s done it again. The social networking giant has tried to act like a business and people are appalled, astounded, frightened and confused. Mark Zuckerberg, the company CEO, clearly wants to wring every bit of personal information from every one of his 500 million-plus users. How terrible. He must be stopped. Or perhaps Facebook users and critics should stop being so ridiculous and open their eyes.

How many times do I have to tell people to stop putting stuff online that they do not want to share? Apparently I can say it until I’m blue in the face, but you won’t listen. This latest imbroglio involved Facebook users home addresses and mobile phone numbers. Some people put them inside Facebook. If you haven’t done so already, you can go to Facebook’s Edit Profile page and then select Contact information. There, you can fill up the page with your AOL Instant Messenger ID, at least two phone numbers, complete home address, your web site URL and even additional e-mail addresses if you have them.

I guess, for some people, it seems perfectly natural to put everything into Facebook. Facebook is your friend. You spend every day on it sharing your innermost thoughts and feelings. It’s like a coffee klatch sans the caffeine and intimacy.

So Facebook has all this information thanks to you. Now they want to share it. You see, a while ago Facebook introduced its Graph API, which lets third-party companies access all your profile information. No, they can’t just go and do it, you have to approve everything Facebook shares. If you share nothing, then Facebook delivers an empty basket of information to third-party companies.

As noted above, Facebook decided it wanted to include all the home addresses and phone numbers you entered into its service with third party companies. As before, you have to opt-into this sharing. You install some Facebook game or join into some sort of group or Facebook affiliate and a message pops up saying the company wants to access your address and numbers. You have to decide to share it.

The wording on the Facebook message was not particularly helpful. Instead of saying you were “sharing” this private information it said you were letting the third party company “access” it. “Share” and “Access”: Two subtly different words that make a perceptual difference.

Naturally, there was an outcry from everyone—even developers—and Facebook pulled up short, reversed course and by Monday had decided to hold off on implementing this little feature.

OK. Good for Facebook. The service listened and reacted quickly. Still, mark my words, the feature will be back. Facebook is hell bent on sharing everything you let it share. With that in mind, I have some suggestions for you.

Accept

Accept that Facebook is a social networking business with an aim to make a lot of money. It is not out to harm you, but is also not necessarily operating in your best interests.

Stop Sharing

Make a conscious decision to remove everything from Facebook you do not want to share. Pull your address, phone numbers, tell-all posts and photos that can tell more about you than you ever intended to share.

Learn How to Use Facebook

Since I assume you will be leaving some personal information on Facebook, learn how to use it effectively. Instead of an afternoon updating your status, perusing posts and photos, spend it going through each and every part of Facebook’s privacy settings. There is a lot of control in there. Use it wisely.

Trust but Verify

I even want you to run a little test to see how much of you is already accessible to anyone in the outside world—including those not on Facebook. Start by typing this URL into your browsing address bar: http://graph.facebook.com/%5BUSERNAME%5D. Replace [USERNAME] with your user name (no spaces). Hit return and you will see a window asking if you want to save a file. Do so. Note where it was saved and then drag and drop that file into notepad. With that done, you should see everything that third part companies can learn about you without even logging into Facebook.

I did this for Facebook Mark Zuckerberg and got this file:

{
“id”: “68310606562”,
“name”: “Mark Zuckerberg”,
“picture”: “http://profile.ak.fbcdn.net/hprofile-ak-snc4/hs443.snc4/50270_68310606562_2720435_s.jpg”,
“link”: “http://www.facebook.com/markzuckerberg”,
“category”: “Public figure”,
“website”: “www.facebook.com”,
“username”: “markzuckerberg”,
“personal_interests”: “openness, making things that help people connect and share what’s important to them, revolutions, information flow, minimalism\n\n\n”,
“likes”: 2715542
}

Mr. Zuckerberg obviously understands his service quite well and shares only a little bit of info. It’s a good model for everyone’s Facebook “graph”. If you’ve done your job right with all of Facebook’s privacy settings, your account graph should look the same.

Here’s the thing. I like Facebook and I think that the amount of sharing we’ve done on the social network has actually served to bring us all a little closer together. I also understand that some people are happy to share more than others. If you like sharing and enjoy the environment, then my little tips will only serve to improve it for you. If you hate sharing and are terrified about what Facebook might do to your life, get off the service and please stop complaining.

Advertisements

Read Full Post »

This is on after-mouse.com website.

AFTER-MOUSE.COM - Kinect on Windows 7

Revolution is on its way! A few weeks ago, Microsoft Kinect™ revolutionized gaming and now it’s time to bring this new technology to professionals. AFTER-MOUSE.COM unveils the world’s first retail application for Kinect™ on Windows7, a completely new experience where the user is the controller. No need for a peripheral, no need to touch the screen, distance interactions through movements with the simple use of body and natural gestures allow the user to control the interface. It’s magic!

The advantages are numerous. First, it can be used on any kind of device that has the Windows 7 operating system: no need for an expensive hardware investment, a regular TV is all you need! Also no direct contact is involved, it can be used from behind a window allowing shopping experiences and brand awareness from the street 24 hours a day! Last but not least it is a complete natural way to interact with an interface allowing anyone, and many users simultaneously, to experience it.

 

Here’s another video showing kinect utilizing Windows 7 multi-touch gestures.

Read Full Post »

I’ve just came across this great article from this site http://www.hackerspacecharlotte.org/?p=1637 and thought it was quite interesting.  So I did some very minor edit and linked it here as well to spread the word.  If you’re only interested in the Sony case against Geohotz then scroll down near the end for it.  Enjoy.

Posted on 15 February 2011

In recent days we have seen what seems like an escalation in the battle for the Information Age.  These events are far from new, however they have taken on a more fevered pitch. I suppose it probably started with the whole WikiLeaks-Bradley Manning thing. This started quite a fierce fight both off and on the internet.  A fierce debate with highly polarized sides sprang up around the issue of WikiLeaks.

Into that fray jumped Anonymous. They took their own unique sense of purpose and went after anyone whom they felt had wronged WikiLeaks. This included attacks on Paypal,MasterCard and others. They took time off from their busy schedule of attacking PirateBay opponents around the world. These sorts of things are not all too uncommon, especially when dealing with Anon. They have made the news in the past. What was different this time was that there was already a frenzy around the wikiLeaks issue.

Soon a new subset appeared. This group would have us believe that they are independently operating patriotic hackers, such as th3j35t3r. I have my doubts as to how independent these folks really are. These people went after anonymous, wikileaks and anyone else supporting them. A sort of mini-cyberwar started. What I would like to note is interesting is that the US Department of Justice launched an immediate investigation into Anonymous to try and make arrests over their DoS attacks. However the sophisticated DoS attack that was carried out against wikileaks was just as illegal and yet the government remains silent on the subject.

The fighting and debating raged on around wikileaks. Many things occurred during the next several months that i don’t feel the need to recap. Fast forwarding to the past few weeks. Aaron Barr, CEO of HBGary Federal made an announcement that he had ‘infiltrated’ Anonymous and discerned the true identities of the Anon leadership. (This statement alone seems to show a misunderstanding of the true nature of Anonymous, but look at some of my earlier posts for some of my theories on this subject). Aaron Barr apparently sought to use this information to leverage himself and his company into a bit of the spotlight. Allegedly, Barr was going to sell this information to the FBI.

In response a few members of anonymous launched an assault on HBGary federal during the super bowl. In short order they had compromised systems inside HBGary Federal, took control of rootkit.com, seized Aaron Barr;’s twitter account and the social networking accounts of several other folks at HBGary. They stole a large number of emails from the company, and allegedly wiped out HBGary’s backups.

The initial assault left HBgary reeling and embarrassed like a kid who gets pants-ed at the bus stop. It got worse from there though. Amongst the stolen emails was a document supposedly composed by HBGary Federal and Palantir. The target audience was allegedly Bank of America. The subject matter? How to destroy wikileaks. The document details disinformation campaignings, smear attacks against pro-wikileaks journalists, Denial of Service attacks against wikileaks infrastructure, and attempts to infiltrate the group to discover the identities of document submitters. You can see a copy of the document here. BofA and Palantir began moving quickly to conduct damage control disavowing any knowledge of the document or its creation. Additional documentation has surfaced to cast doubts on some of these claims.

The lesson here so far? Even a security firm like HB Gary can get thoroughly spanked on the internet by not taking threats seriously. The damage to their company by these leaks is yet to be seen, but other companies are already cutting ties to try and protect themselves. In this case the Leak has already proven to be an effective weapon against a powerful company.

Meanwhile, another little drama was unfolding. The Gregory Evans/ Ligatt Security drama. Gregory Evans has been accused of being a charlatan for a while. He made claims of being the ‘world’s no 1 Hacker’. A ridiculous, and pompous proclamation if ever I’ve heard one. He released a book on how to become the world’s no 1 hacker. A book which was quickly accused of large scale plagarism. Evans denied these accusations, and at one point claimed that he paid any third part content writers for their material. I do not know about the vast majority of this claim. However, Chris Gates, aka carna0wnage was one of the authors whose material appeared in the book. Gates denied ever receiving any payment or giving permission to Evans to use his material in the book. The material is so obviously ripped off, Evans even sued the same screenshots which include Chris Gates’ name in the login prompts.

Enough about the gory details though. Suffice it to say, the Evans/Ligatt drama continued on. Evans fought back in the only way he seems to know how. He filed lawsuits. He filed quite a few lawsuits actually. He tried suing anyone and everyone he could that has ever said anything bad about him on the internet. Most of these lawsuits have failed completely, but that didn’t stop Evans. Recently, on Gregory Evans’ birthday, his email and twitter accounts were hacked. All of his email was leaked into a torrent on the internet and distributed. Since the leak of his email, one embarrassing piece of evidence after another surfaces from the spool.  Many of these documents were re-posted to the LigattLeaks blog, which was originally hosted on WordPress.  Evans and Ligatt sent take-down demands to wordpress and the registrar for LiogattLeaks.org. WordPress capitulated in the face of any possible legal ramifications, whether there was solid legal basis or not.

LigattLeaks has since moved on to a site at http://ligattleaks.blogs.ru and continues to post with impunity. Since LigattLeaks themselves claim they do not possess the mail-spool and are only re-posting things found on pastebin, they seems to be under no legal liability. The actual consequences of these leaks for Evans or Ligatt? Aside from a lot of embarassement, and a local news story , there has yet to be any serious consequence seen from this. however, Evan’s litigious assaults on the infosec community seemed to have had no real effect either. So right now I’m calling this one a draw at the moment.

Now let’s move on to the Sony PS3 case. The folks over at Fail0verflow got their hands on the keys used to sign software for the ps3. Well known hardware hacker GeoHotz then built on this and created a modkit to allow home brew software to run on the ps3. Sony claims that this will only serve to enable piracy on their game consoles. they file suit against Geo Hot, subpoena all of his computer equipment and issue orders for his instructional videos to be stripped from the internet. In response the instructions, examples, and encryption keys are spread across the internet. Before the case against Geohotz has even begun, sony is now trying to use the legal system to gain information on every person who viewed or commented on GeoHotz’s video on youtube. They are also seeking legal action against anyone who posts the encryption keys. This drama is still under way but I’m going to go ahead and call it now: Sony will lose, no matter what the trial outcome.  Here I’m linking the video of Geohotz Rap about Sony lawsuit.  It is quite entertaining.

There is already a huge public outcry against Sony over this action. They may have already caused themselves irreparable brand damage. They have increased the actual awareness of these hacks. And there is no way that they can successfully suppress the information once it has begun disseminating through the internet. They are trying to stuff the proverbial Genie back in the bottle. One has to wonder why they are doing this. They will not be able to recoup any significant losses. they won’t be able to suppress the information. They are trying to lay down intimidation tactics. These intimidation tactics are of course having the opposite effect. One has to wonder if anonymous or another group won’t turn it’s attention towards the Sony mega-corporation. It would be very interesting to see a battle between Anonymous and such a  huge company.
There are three examples of folks in the Corporate world trying to control and shape the Internet for their own benefit. All of them are failing miserably, and they are all starting to pay a heavy price for it.

Article source: http://cosine-security.blogspot.com/2011/02/of-hacks-leaks-and-legal-battles-is.html

Read Full Post »

Yerba Buena Center Prepared for Apple’s March 2011 Event
Yerba Buena Center Prepared for Apple’s March 2011 Event | Photo by Kiel
 

So I just finished watching the podcast of the Apple’s long awaited announcement of the Ipad 2.  The London based event is rumoured to be hosted by Stephen Fry but Steve Jobs decided he wanted to graced us w/ his appearance so he could tell us about his new baby 🙂  Instead of telling you about it.  I’ll do better than that and just link you the complete specs posted by: Chris Garcia via apple.com

The event is over and the iPad 2 is official. Steve Job’s came out of medical leave because as he said “We’ve been working on this product for awhile, and I didn’t want to miss it”. It will be interesting to see if Apple has done enough here to make current iPad owners go out and buy the iPad 2. For those who were waiting for the iPad 2 announcement, did it help you make up your mind on which tablet you were going to buy? Below are the full specifications for the new Apple iPad 2.

Technical Specifications

Models

Size and Weight1

  • Height: 9.50 inches (241.2 mm)
  • Width: 7.31 inches (185.7 mm)
  • Depth: 0.34 inch (8.8 mm)
  • Weight: 1.33 pounds (601 g)
  • Height: 9.50 inches (241.2 mm)
  • Width: 7.31 inches (185.7 mm)
  • Depth: 0.34 inch (8.8 mm)
  • Weight: 1.35 pounds (613 g)
  • Weight: 1.34 pounds (607 g) (Verizon)

Storage2

16GB
32GB
64GB
16GB
32GB
64GB

Wireless and Cellular

  • Wi-Fi (802.11a/b/g/n)
  • Bluetooth 2.1 + EDR technology
  • Wi-Fi + 3G model: UMTS/HSDPA/HSUPA (850, 900, 1900, 2100 MHz); GSM/EDGE (850, 900, 1800, 1900 MHz)
  • Wi-Fi + 3G for Verizon model: CDMA EV-DO Rev. A (800, 1900 MHz)
  • Data only3
  • Wi-Fi (802.11a/b/g/n)
  • Bluetooth 2.1 + EDR technology

Learn more about Wi-Fi + 3G

Carriers

at&tverizon

Display

  • 9.7-inch (diagonal) LED-backlit glossy widescreen Multi-Touch display with IPS technology
  • 1024-by-768-pixel resolution at 132 pixels per inch (ppi)
  • Fingerprint-resistant oleophobic coating
  • Support for display of multiple languages and characters simultaneously

Chip

 

  • 1GHz dual-core Apple A5 custom-designed, high-performance, low-power system-on-a-chip

Cameras, Photos, and Video Recording

  • Back camera: Video recording, HD (720p) up to 30 frames per second with audio; still camera with 5x digital zoom
  • Front camera: Video recording, VGA up to 30 frames per second with audio; VGA-quality still camera
  • Tap to control exposure for video or stills
  • Photo and video geotagging over Wi-Fi

Power and Battery4

  • Built-in 25-watt-hour rechargeable lithium-polymer battery
  • Up to 10 hours of surfing the web on Wi-Fi, watching video, or listening to music
  • Charging via power adapter or USB to computer system
  • Built-in 25-watt-hour rechargeable lithium-polymer battery
  • Up to 10 hours of surfing the web on Wi-Fi, watching video, or listening to music
  • Up to 9 hours of surfing the web using 3G data network
  • Charging via power adapter or USB to computer system

Input/Output

  • 30-pin dock connector port
  • 3.5-mm stereo headphone minijack
  • Built-in speaker
  • Microphone
  • 30-pin dock connector port
  • 3.5-mm stereo headphone minijack
  • Built-in speaker
  • Micro-SIM card tray (Wi-Fi + 3G model)
  • Microphone

Sensors

  • Three-axis gyro
  • Accelerometer
  • Ambient light sensor

Location

  • Wi-Fi
  • Digital compass
  • Wi-Fi
  • Digital compass
  • Assisted GPS
  • Cellular

Audio Playback

  • Frequency response: 20Hz to 20,000Hz
  • Audio formats supported: HE-AAC (V1 and V2), AAC (8 to 320 Kbps), Protected AAC (from iTunes Store), MP3 (8 to 320 Kbps), MP3 VBR, Audible (formats 2, 3, and 4, Audible Enhanced Audio, AAX, and AAX+), Apple Lossless, AIFF, and WAV
  • User-configurable maximum volume limit
  • Dolby Digital 5.1 surround sound pass-through with Apple Digital AV Adapter (sold separately)

TV and Video

  • Video mirroring and video out support: Up to 1080p with Apple Digital AV Adapter or Apple VGA Adapter (cables sold separately)
  • Video out support at 576p and 480p with Apple Component AV Cable; 576i and 480i with Apple Composite AV Cable
  • Video formats supported: H.264 video up to 720p, 30 frames per second, Main Profile level 3.1 with AAC-LC audio up to 160 Kbps, 48kHz, stereo audio in .m4v, .mp4, and .mov file formats; MPEG-4 video, up to 2.5 Mbps, 640 by 480 pixels, 30 frames per second, Simple Profile with AAC-LC audio up to 160 Kbps per channel, 48kHz, stereo audio in .m4v, .mp4, and .mov file formats; Motion JPEG (M-JPEG) up to 35 Mbps, 1280 by 720 pixels, 30 frames per second, audio in ulaw, PCM stereo audio in .avi file format

Mail Attachment Support

Viewable document types: .jpg, .tiff, .gif (images); .doc and .docx (Microsoft Word); .htm and .html (web pages); .key (Keynote); .numbers (Numbers); .pages (Pages); .pdf (Preview and Adobe Acrobat); .ppt and .pptx (Microsoft PowerPoint); .txt (text); .rtf (rich text format); .vcf (contact information); .xls and .xlsx (Microsoft Excel)

Languages

  • Language support for English (U.S.), English (UK), French (France), German, Traditional Chinese, Simplified Chinese, Dutch, Italian, Spanish, Portuguese (Brazil), Portuguese (Portugal), Danish, Swedish, Finnish, Norwegian, Korean, Japanese, Russian, Polish, Turkish, Ukrainian, Hungarian, Arabic, Thai, Czech, Greek, Hebrew, Indonesian, Malay, Romanian, Slovak, Croatian, Catalan, and Vietnamese
  • Keyboard support for English (U.S.), English (UK), French (France), French (Canadian), French (Switzerland), German, Traditional Chinese (Handwriting, Pinyin, Zhuyin, Cangjie, Wubihua), Simplified Chinese (Handwriting, Pinyin, Wubihua), Dutch, Italian, Spanish, Portuguese (Brazil), Portuguese (Portugal), Danish, Swedish, Finnish, Norwegian, Korean, Japanese (Romaji, Ten Key), Japanese (Kana), Russian, Polish, Turkish, Ukrainian, Estonian, Hungarian, Icelandic, Lithuanian, Latvian, Flemish, Arabic, Thai, Czech, Greek, Hebrew, Indonesian, Malay, Romanian, Slovak, Croatian, Bulgarian, Serbian (Cyrillic/Latin), Catalan, Vietnamese, Tibetan, Macedonian, and Cherokee
  • Dictionary support (enables predictive text and autocorrect) for English (U.S.), English (UK), French, German, Traditional Chinese, Simplified Chinese, Dutch, Italian, Spanish, Portuguese (Brazil), Portuguese (Portugal), Danish, Swedish, Finnish, Norwegian, Korean, Japanese (Romaji), Japanese (Kana), Russian, Polish, Turkish, Ukrainian, Hungarian, Lithuanian, Flemish, Arabic, Thai, Czech, Greek, Hebrew, Indonesian, Malaysian, Romanian, Slovak, Croatian, Catalan, Vietnamese, and Cherokee

Accessibility

  • Support for playback of closed-captioned content
  • VoiceOver screen reader
  • Full-screen zoom magnification
  • White on black display
  • Mono audio

Environmental Requirements

  • Operating temperature: 32° to 95° F (0° to 35° C)
  • Nonoperating temperature: -4° to 113° F (-20° to 45° C)
  • Relative humidity: 5% to 95% noncondensing
  • Maximum operating altitude: 10,000 feet (3000 m)

Mac System Requirements

  • Mac computer with USB 2.0 port
  • Mac OS X v10.5.8 or later
  • iTunes 10.2 or later recommended
    (free download from www.itunes.com/download)
  • iTunes Store account
  • Internet access

Windows System Requirements

  • PC with USB 2.0 port
  • Windows 7; Windows Vista; or Windows XP Home or Professional with Service Pack 3 or later
  • iTunes 10.2 or later recommended
    (free download from www.itunes.com/download)
  • iTunes Store account
  • Internet access

In the Box

 

  • iPad
  • Dock Connector to USB Cable
  • 10W USB Power Adapter
  • Documentation

Environmental Status Report

iPad embodies Apple’s continuing environmental progress. It is designed with the following features to reduce environmental impact: 

  • Arsenic-free display glass
  • BFR-free
  • Mercury-free LED-backlit display
  • PVC-free
  • Recyclable aluminum and glass enclosure

*UPDATE*  I’m linking the video here now.  All I-crazies will love this keynote presentation 🙂  I told myself that after owning ipod, ipod touch, ipod mini, iphone 2, 3, 3gs and 4 and ipad wifi 64 that I could no longer justify myself spending another 800 US on another ipad.

BUT after watching thepresentation I once again got suckered in LOL.  So I’ll be one of the first in line on March 11 for my very own Ipad 2 when I’m in Vegas 😀  Enough about me.  Here’s the video. Enjoy 😀

Read Full Post »

You might heard the name of Professor Wiseman and his 10 different magis/science tricks in just 4 minutes. By doing these tricks you can easily entertain your friends and family.
So enjoy and also share with your friends if you like!

Here is another video. Enjoy it.

 

Read Full Post »

The number 1 common annoyance that most windows user do not know is that. Every time you do windows update ( which my gf  just did and now she’s not happy because her computer is super slow ) or install a new software.  Most of those programs leaves foot prints in your windows start up which means that they start in the background using up all your RAMs ( memory ) whether you are using that program or not.

Here is how to use MSCONFIG in Windows 7 to disable some of those unnecessary programs that automatically load on start-up. Disabling these programs will help your computer boot faster, crash less and more importantly run more efficiently.  Keep in mind that most of those on the startup tab can be turn off as whenever you need that specific program it’s as simple as clicking on the icon on the desktop.  Example: programs like [ adobe, itunes, quicktime, microsoft office etc…. ] can all be turn off.

1. Click on the Windows 7 start icon in the bottom left corner of your screen.
Windows 7 start logo

2. Type MSCONFIG in the search box and then either press enter on your keyboard or double-click on the MSCONFIG program that appears in the search results.
Search: MSCONFIG

4. Windows 7 will launch Microsoft’s System Configuration Utility. Click on the Startup tab.
MSCONFIG in Windows 7

4. This takes you to a page with a list of “startup items.” Startup items are programs that are automatically loaded every time you turn on your computer. Some startup programs are absolutely necessary, others are simply a waste of RAM.
Windows 7 MSCONFIG startup tab

In Windows 7, allmost all of Windows’ essential programs are loaded through something called “Windows Services.” This means that most of the startup items you see in Windows 7 are completely optional and can be turned off. However, a good rule of thumb is to disable only those programs that you recognize and don’t need to have running all the time. When in doubt, leave it on. Or, better still, check out Paul “PacMan” Collins’ huge “Startup Applications” list athttp://www.sysinfo.org/startuplist.php. This list of over 13,000 startup items you may encounter in MSCONFIG tells you which items are absolutely necessary, which items are optional, and which items you should definitely uncheck.

Here’s a good example. On my computer I have installed Apple’s Quicktime player. For some reason or other, Quicktime decided that it should always be running on my computer even when I am not using the program. That’s silly. To prevent Quicktime from automatically starting every time I boot my computer, I ran MSCONFIG and unchecked “Quicktime.” That’s it.

Remember, disable only those programs that you recognize and don’t need to have running all the time. When in doubt, leave it on.

5. Click on the OK button.

6. A message will pop up telling you that you must restart your computer before these changes will take effect. Click on “Restart” and your computer will automatically reboot.
Restart dialog box in Windows 7

7. That’s it! Your computer should now boot faster and crash less.

And if you ever want to turn on any of the startup items you disabled with MSCONFIG, just run MSCONFIG again.

Read Full Post »

Windows 7 comes with many hidden performance tweaks. But sometimes its just a matter of understanding settings and controls of specific program which is in use. Have you ever been annoyed by the low level volume of Windows 7 at your Laptop? I am talking about the laptop volume tweak for installed Windows 7 in it. Laptops offer even poor quality of volume level. One trick is to use VLC Player if your file is playable at this player and press CTRL+UP/DOWN arrow keys to raise volume up to 400% while the control is at VLC media player. The second tweak involves tweaking volume settings in control panel. This method will increase laptop volume which is powered by windows 7. So here it is.

 

  • Go to Control Panel > Sound
  • Double click at speaker
  • In speaker Properties > Go to Enhancements
  • Check option loudness equalization
  • Go to loudness equalization ‘properties’ and configure loudness equalization settings

Don’t use ‘base boost’ or ‘virtual surround’ in speakers properties because that will actually decrease the sound level.

 

win7 volume booster laptop

 

 

Read Full Post »

Older Posts »