Five ways to boost your mobile broadband speeds

Image result for boost network


Don’t plug your dongle straight into your laptop, use the USB cable that’s supplied. Not only does this reduce the impact of electrical interference from your PC (from your Wi-Fi radio, for example), it also gives you the flexibility to position the dongle for maximum reception. Merely changing the orientation of a USB modem can boost signal strength, potentially adding crucial extra bandwidth.


Modems may be cheaper when you buy them from a specific mobile network, but that of course means you’re tied to that specific provider. Instead, consider buying an unlocked modem and carrying around a selection of pay-as-you-go SIM cards.

Standalone modems aren’t ludicrously expensive: you can buy a 7.2Mbits/sec Huawei E1750 modem for £90 from, for example. The networks literally give away the SIM cards for free, or charge a nominal fee for them, so there’s nothing to stop you getting a SIM card for every UK network.A selection of SIM cards is particularly useful for those who spend much of their lives on the road, as the gaps in one company’s 3G network may be filled by another provider. Remember that T-Mobile and 3 share some of their same 3G network, and Virgin Media’s service runs off T-Mobile’s network, so there’s little point in doubling up with these providers.


The DNS servers used by the mobile broadband networks “tend to be pretty patchy,” according to PC Pro’s wireless and mobile expert, Paul Ockenden. That could mean DNS look-ups take longer than need be, or web addresses fail to resolve at all. Try a free alternative such as OpenDNS if you notice a delay in websites loading despite a strong signal.


Those who struggle to get a decent 3G connection indoors may be better off avoiding USB dongles and tethering their PC to their smartphone. This allows you to place the mobile handset on a window sill, where it has more chance of picking up a decent signal, without having to awkwardly shuffle your furniture around so your desk is near the window.

Alternatively, consider buying a mobile Wi-Fi router. Both 3 and T-Mobile sell excellent 3G Wi-Fi routers that allow you to plug in your dongle and broadcast the 3G signal to other rooms in the house, as well as share the connection among multiple PCs/devices. The portable MiFi router (web ID: 351289) sold by 3 and others could perform a similar function.


Mobile networks assign different APNs (Access Point Names) to customers on regular monthly contracts and pay-as-you-go deals. We have it on good authority that some mobile networks give priority to the more lucrative, contract customers, rewarding their loyal custom with marginally improved bandwidth. If you’re determined to get every last kilobit per second out of your connection, it may be worth considering signing up for a long-term deal with one of the fast networks, such as Vodafone, T-Mobile or 3.

Call Barring, Call Forwarding, Call Waiting Short Code And USSD Codes

9jaboizgist call barring code
Short Code And USSD Codes For Call
Barring Call Forwarding Call Waiting
Because many phones come with options that are confusing to enable call waiting, call barring, call forwarding and conference call options, It is much more comfortable to activate or deactivate call waiting, call barring and call forwarding via USSD codes.
The default password code for activating call barring or call forwarding is ==> 0000
How To Deactivate And Activate Call
Using USSD code short code to Deactivate or Activate Call Barring
To Change Call barring password ==> * * 03 *330 * Old or Default Password * New Password * New Password Again # <== and Send For instance, to change my personal call barring Password the default code 0000 to 4578 Dial ==> * * 03 * 330 * 0000 * 5678 * 5678 #
Code to enable Call Barring option On All
Outgoing Calls ==> * 33 * Password # <== Code to Deactivate Call barring feature on all outgoing calls ==> # 33 * Password # <==
Code to Bar all incoming calls ==> * 35 *
Password # <==
Code to Deactivate Call barring on all
incoming calls ==> # 35 * Password # <==
Code to Bar all outgoing international call only ==> * 331 * Password # <==
Code to Deactivate Call barring feature on all outgoing international calls ==> # 331 *
Pasword # <==
How To Deactivate And Activate Call
Forwarding Using USSD code shortcode to Deactivate or Activate Call Forwarding
To Forward Call On When Number is Not Reachable Simply ==> * * 62 * Receiving number # # # 62 # <==
Code to activate call Forward when phone is Busy ==> * * 67 * phone number # # # 67 # <==
Code to forward calls when there is no reply ==> * * 61 * phone number # # # 61 # <==
Code to Activate Call Forwarding options On
All Calls ==> * * 21 * phone number # # # 21
# <==
Code to cancel all Active call forwarding already set on phone ==> # # 002 # <==
Code To Check Call Forwarding Status When
number is not available online ==> * # 62 #
Code To Check Call Forwarding Status when there is no reply ==> * # 61 # <==
Code To Check Call Forwarding Status when phone is busy ==> * # 67 # <==
Code To Check status of Call Forwarding after having all calls forwarded ==> * # 21 # <==
How To Deactivate And Activate Call
Used Code / Short Code For Activating,
Deactivating and Knowing Call Waiting
To disconnect waiting call during an active
call, ==> * <==
when a call is waiting and you want to pick another call without disrupting the existing
call, dial 1 While On Call Waiting If you need to put Current Call On Hold And Pick Incoming Call, dial 2 Check Call Waiting Status code ==> *#43# <==
Code for call waiting activation ==> *43# <==
Call waiting deactivation code ==> #43# <==

Instagram launches a Lite app for low-end Android devices

Instagram has released a lightweight version of its Android app that should be easier to install and browse on devices short on storage space and on spotty connections.

TechCrunch notes that the new app, which weighs in at just 573KB, is 1/55th the size of the original app at 33MB. Naturally, you’ll find it a little lighter on functionality too: there’s no messaging or the ability to upload videos right now.

The launch is part of Facebook’s approach to reaching the next billion people who will come online for the first time in developing countries, mostly using low-cost mobile devices with limited access to connectivity and data.

Making its apps more easier to download and perform well on low-end devices is key to growing its user base around the world. To that end, Facebook made Lite versions of its apps for its social network and Messenger available years ago. Twitter has one too, and Google recently launched an optimized version of Android– complete with a suite of its essential apps – to address these needs in emerging markets.

Instagram’s been on a roll lately. It added 300 million users in a little over a year to reach 1 billion last week, and has tacked on loads more features to its service recently, including group video calls, support for longer videos in what it’s calling IGTV, tools for curating saved posts, and improving discovery with tweaks to its Explore tab. With its new Lite app, it’s better poised to draw in more users who haven’t ever shared a photo on the web yet.

Instagram Lite is now listed on Google Play, but it looks like its availability is limited to select countries; I couldn’t download it on my Android devices here in India. We’ve contacted the company to learn more about that, and will update this post if there’s a response.

You can now put music on Instagram Stories

You can now put music on Instagram Stories

Instagram Stories – everyone’s favorite Snapchat rip-off – has launched a feature that lets you put music over your visual creations. We reported on this potentially happening around two months ago, but it’s set to roll-out to some users shortly.

Over 400m people use Stories every day, so there’s little doubt this is going to be a popular update. It’s gonna change people’s lives.

Want to put “Funky Town” over a video of you drinking a beer? You now can. Fancy placing “Funky Town” over your dog rubbing its arse on the kitchen floor? You go, girl! Recording your granddad’s funeral on your iPhone? “Funky Town” that sucker up, we’re in the future now.

Adding music to a story will work in the same way as adding location or weather data, which you do with the face-sticker icon on the top right of the screen. You can see how it’ll look in action here:

There’s a lot of straight trash all over these images, but shout out Dua Lipa for being real.

You can add music once you’ve captured your image or video and you can also select the exact part of the track you want to include. The song will also start automatically when someone views your story, which has given me horrendous flashbacks to the days of MySpace. But it won’t be like that, right folks? Right?

Considering that Facebook has licensing deals with UMG, Sony, and Warner, there will be a huge library of music from users to choose from. The company has also said that it will be adding to the available music in the coming weeks, but, unfortunately, you’ll not be able to upload your own tracks.

Music on Instagram Stories will be available in only a select few countries, before rolling out globally in the future. So keep your eyes peeled.

Anyway, why are you still reading this? Go, please, there are things going on that need recording and “Funky Town” playing over them.

This company wants to stop hackers from stealing your Crypto currency

This company wants to stop hackers from stealing your cryptocurrency

How much stolen Crypto currency is in circulation? A lot. Just last month, hackers breached Bithumb and Coinrail, two South Korea–based crypto currency exchanges, and stole over $70 million worth of various crypto tokens.

Bithumb and Coinrail are not alone in their ordeal. Since the founding of the first crypto currency exchange in 2010, hackers have walked away with billions of dollars’ worth of crypto currencies and digital tokens stolen from exchanges, and they continue to eye the crypto currency landscape as an attractive arena to make money. In 2014, a huge $460 million breach at Mt Gox caused the collapse of the then-largest bitcoin exchange and a sudden drop of the price of crypto currencies.

Aside from directly stealing from exchanges, cyber criminals are also using other methods to illegally earn crypto currencies. This includes cryptojacking scripts, software that secretly uses computer resources to mine crypto currencies, and ransomware, malware that locks out users from their files and only restores their access after they pay attackers a certain amount of crypto currency.

The appeal of cryptocurrency to cybercriminals is largely due to the lack of legal and technical safeguards to protect individuals, exchanges and organizations against money laundering and fraud. The lack of security damages the entire industry, and every new heist results in a steep drop in trust and value of cryptocurrencies.

But as crypto currencies slowly develop from a geek niche to a financial landscape sprawling over hundreds of billions of dollars and thousands of currencies, solutions are emerging to make the market more reliable and resilient against malicious activities.

What happens to the dirty money?

To be able to spend their stolen stash, hackers have to convert their cryptocurrencies to fiat at cryptocurrency exchanges. In the past two years, with the explosion of ICOs and crypto-tokens, hackers have turned their attention to smaller tokens. Many of the last year’s hacks were staged against these smaller tokens.

In July 2017, hackers stole $7.53 million from CoinDash’s ICO and directed the CDT tokens to their own wallet address. In January, another attack robbed Coincheck, a Japan-based exchange, of $400 million worth of NEM tokens.

Cryptocurrencies are based on blockchain, a transparent distributed ledger where every transaction is stored in a transparent and immutable way. Most cryptocurrencies are traceable, which means anyone can trace where money goes by following the addresses it is transferred to after it is stolen.

Hackers usually take their stolen tokens to the decentralized exchanges (DEX). Decentralized exchanges are less regulated than their centralized peers such as Coinbase and Binance. Because DEXs generally don’t have proper know-your-customer (KYC) safeguards, hackers have an easier time laundering their stolen tokens, and they provide hackers with the anonymity they require to launder their tokens.

Since token-to-token trading is possible on DEX, hackers convert their loot to other tokens or to mainstream cryptocurrencies such as Bitcoin and Ethereum. In doing so, hackers can make it difficult to trace stolen cryptocurrencies and cash them out using centralized exchanges. Hackers use DEXs to convert their loot to other tokens or to mainstream cryptocurrencies such as bitcoin and Ethereum. This enables them to obscure their traces and then take the stolen cryptocurrencies to centralized exchanges where they can cash them out.

A decentralized approach to fighting fraud and money laundering

Aside from supporting digital money, blockchain also has applications in cybersecurity. Several organizations are using the technology to fight censorship and cyber attacks such as distributed denial of service and data tampering.

However, blockchain can also help fight the exact same kind of fraudulent activity that decentralized exchanges are suffering from. This is the focus of the Sentinel Protocol, a blockchain-based threat intelligence platform created by Uppsala Foundation, a Singapore-based cybersecurity firm. Patrick Kim, the founder of Uppsala Foundation, himself was a victim of cryptocurrency theft and lost 7,218 Ether in 2016 due to a vulnerability in an Ethereum wallet. Kim created Sentinel Protocol so that others didn’t have to go through the same painful experience.

At the heart of Sentinel Protocol is a decentralized threat reputation database (TRDB), which contains blockchain addresses associated with theft, fraud and ransomware, IP addresses, malware signatures, file hashes and other relevant information. Sentinel Protocol relies on a crowdsourced community of cybersecurity experts, which it calls Sentinels, to maintain its TRDB.

Any white hat hacker or security expert can become a Sentinel by analyzing and validating incident reports and other data points. For their contributions, they receive Sentinel Points (SP), which are reputation points that determine their standing in the security community. Sentinel Points can be converted to UPP tokens—the Sentinel Protocol’s circulation currency.

By integrating Sentinel Protocol into their platforms, cryptocurrency exchanges will be able to detect and block of fraudulent and malicious transactions by comparing source and destination addresses against Sentinel’s TRDB. This is especially useful to DEXs, where hackers are flocking to launder and cash their ill-gained fortunes.

The automated vetting of cryptocurrency addresses will help build trust, ensuring customers that they will not become involved in transactions with malicious parties. It will also make it much harder for criminals to use cryptocurrency exchanges to hide their traces and spend their stolen cryptocurrencies without giving themselves away.

Organizations can freely integrate Sentinel’s TRDB API into their software and query the database. In the near future, more advanced features will be available, such as Machine Learning-based anomaly detection or Distributed-sandboxing, both of which can be purchased with UPP tokens. Customers can purchase UPP from exchanges. Sentinels can convert their Sentinel Points to UPP. Using this method, white hat hackers can earn money by using their security expertise.

Sentinel Protocol has already partnered with Bibox, one of the top ten cryptocurrency exchanges in terms of trade volume, to protect users against scams and fraud. Sentinel Protocol is also working with decentralized exchanges such as IDEX, DDEX and to explore ways they can leverage the TRDB. These DEXs share Sentinel Protocol’s initiative of stopping the use of stolen cryptos, improving compliance with Anti-Coin Laundering (ACL) and potential counter-terrorism finance regulations later in the future. Hopefully, these partnerships will help identify and trace cybercriminals that are financing their malicious activities through cryptocurrencies.

The decentralized approach to fighting fraud and scams is a crucial step toward making sure that cryptocurrencies are a reliable component of the future of payments and finance.

How to download YouTube videos and save them on your computer?

Related imageWith ClipGrab, it is very easy to save any video from YouTube and other video sites like Vimeo on your computer.
This tutorial shows you how to download YouTube videos on your PC or Mac.

Step 1: Install ClipGrab

First of all, you need to install ClipGrab . ClipGrab is a 100 % free and easy to use YouTube downloader and available for Windows, Mac and Linux. Click on the button to initiate the download.

Step 2: Copy the video link

After you have successfully set up ClipGrab, you can launch the program.
Now you need to copy the web address of the video that you want to download. In order to do that, mark the link to the video in the address bar of your browser and hit Ctrl+C (or Cmd+C if you are on a Mac).

Step 3: Insert the video link in ClipGrab

After copying the link, switch to the ClipGrab window. In the “Downloads” tab, insert the copied link into the input field. You can do this by hitting Ctl+V (or Cmd+V if you are on a Mac).
ClipGrab will now gather all necessary information about the video and you can proceed to the next step.

Step 4: Select download format and quality

Before you start the download, you can now decide in which quality and which output format you want to save the video.
Just select the desired format from the “Format” select box and do the same for the video quality with the “Quality” select box.
You can learn more about the output formats provided by ClipGrab in the FAQ article about the supported formats.

Step 5: Grab that clip!

All you have to do now is to click on the “Grab this clip!” button. You will be asked to select a file name and the download will start just after that.

9Mobile, Airtel oppose transfer of Visafone 800MHz spectrum licence to MTN

Two major telecoms operators in the country, 9Mobile and Barti Airtel, yesterday, publicly opposed the proposed transfer of operating licence and resources, including 800MHz spectrum, from Visafone Communication Limited to MTN Nigeria.

The duo raised the objection at a public hearing organised by Nigerian Communications Commission, NCC, at its headquarters in Abuja.

Responding to the proposal, Head of Regulatory Affairs, 9Mobile, Mr. Chidozie Arinze, said spectrum remained a scarce national resource available in limited quantity and, as such could not be leased to only MTN as an operator to the detriment of other operators that do not have similar spectrum in their possession.

He argued that the 800MHz spectrum from Visafone must be managed more efficiently and not be given to one operator because it had money.

According to him,  this will create room for wider dominance of the market by MTN, and that if MTN is allowed to monopolize 4G, it can be priced anyhow.

He said:  “It is like giving all Nigerian oil wells to one individual. The 800MHz spectrum is good for 4G operation and every operator wants to deploy 4G.    If MTN is allowed to monopolize 4G, it can be priced anyhow.

“MTN has 4G spectrum already and it wants to get this, in essence, it will be controlling 50% of the available spectrum in Nigeria.

“This is not done in line with the extant guidelines. It prohibits s control of facility that cannot be replicated by competitors. If they get this spectrum, the competitors don’t have similar spectrum and cannot have access to it.”

On his part, Airtel representative, Lucky Ubani, urged the NCC not to allow MTN acquire the spectrum, noting that such a move would extend its market dominance beyond voice segment, which he said could spell doom for the industry.

He warned that care should be taken not to create another monopoly in the market and urged the regulator to come up with measures that would enable other top operators operate  alongside MTN.

He said:  “In India there is a specific cap to which a single operator should acquire spectrum order wise there will be a huge disadvantage.”

Executive Vice Chairman of the Commission, Prof. Umar Danbatta, had earlier in his opening speech, told the audience that the public enquiry was meant to gather informed contributions from stakeholders to enable the commission take informed decision consistent with its mandate to create an enabling environment for effective competition in the industry as well ensure provision of qualitative and efficient telecommunications services throughout the country.

He said: “The commission seeks your active participation in the deliberations that would lead to an informed decision consistent with our mandate.

“As you may be aware, the demand for spectrum has increased due to emergence of disruptive innovations such as mobile broadband, web applications, Cloud Computing (CC), Internet of Thinks (IoT) and the proliferation of smart devices among others.

“Consequently, in order to reap the benefits of effective utilisation of spectrum as well as improve operational efficiency and regulatory excellence, the commission in accordance with its mandate as enshrined in the Nigerian Communications Act, NCA, 2003 embarked on re-planning of some of the its frequency bands.”

“In line with the spirit of participatory regulation and the strategic objective of the commission to hold regular consultation with the industry stakeholders, the commission has decided to hold a public enquiry to elicit inputs and comments from stakeholders to enable us draw important and beneficial contributions from your wealth of experience and research,’’ the NCC boss said.

LED Eyelashes May Be the Next New Thing In Fashion- Can You Beat It?

In case you are wondering what will define the nearest future of fashion, well that could just be the LED eyelashes that will light up your eyes like a party hall as you move whether there is light or in the dark.

Known as the F.lashes, the lashes are newly invented by designer Tien Pham on Kickstarter tarteki, where the product has already generated over $400,000 which was the target.

The way the LED eyelashes are designed is as strips of LEDs that one can stick to the eyelids with lash adhesive and it is controlled by a controller which you can have in your hair at the back of your head.

Powered by coin battery to supply the lights you need, the eyelashes come in different colors including bright white, light pink, bright red, bright yellow, and light green. Also, you get to have bright blue and light blue if you want.

To have them fixed, all you have to do is insert the coin battery, then connect the LED to the lashes, have it fixed at the back of your head, and finally, you can apply the lashes.

What we do not find nice with this is that the coin battery can only last 4 hours. The compensation is that the batteries are neither hard to get nor are they expensive.

The LED eyelashes have various effects:

The LED eyelashes are designed to respond to every movement you make, as they keep blinking lights on your lashes. There are some that come up when you jump, while others come up when you move faster. Some come up as you tilt your head or as you nod, while some are designed to get brighter as you move.

Even though at the moment you may not be able to have the lights changed using your phone, the creators have stated that they are working on having it remote controlled soon.

To agree with The Verge, nevertheless, we cannot say it is fully ready for the mainstream considering the fact that the controller which you will have tucked in your hair can be bulky and somewhat annoying, and the fact that it comes connected with a wire that passes from the controller to the lashes themselves.

So while it’s all fashion and fun, I can’t say what effect this may have on the eyes as the LED light keeps moving around your eyes. This is even though the makers have assured that because the light is not strong, there will be no problem.

Instagram Launches IGTV App Where Users Can Upload 1-Hour Long Videos: All You Need To Know


Instagram is apparently one of the world’s most popular social media platforms. The app along with Twitter and Facebook, now controls popular opinion around the world and serve as a means of circulating breaking stories even before major news brands have gotten a hint.

In addition to being one of the most famous photo-sharing platforms, Instagram is also one of the most visited video-sharing apps in the world, rivaled only by YouTube.

YouTube Rivaling Instagram

For a long time YouTube has been the world’s major video viewing website where people can go to upload their footages and share them with other users. However, it seems like that is about to change as Instagram has just introduced a service called IGTV which is set to closely rival YouTube’s services.


IGTV is Instgaram’s app which allows users to upload 1-hour long videos. The service which has just been recently launched, is sparking some excitement online.

The company reportedly launched this service on Wednesday, July 20th, 2018.

Instagram revealed that IGTV which will showcase popular videos from Instagram celebrities will be accessible from a button right inside the Instagram home-screen, however it will be also available as a standalone app which can be downloaded from app stores.

How IGTV Works

Instagram revealed that the newly-launched IGTV will let any of its users to be a creator and not just big-name celebrities. However, those who will be able to upload must have sizeable amounts of followers. This means that people with very small accounts or those with new accounts may not be immediately able to use the service. Eventually, however, the option of uploading hour-long videos will expand to everyone on Instagram, it has been revealed.

Instagram users who can access the IGTV service, will be able to upload vertical videos through Instagram’s app or even through the web. The company revealed that the IGTV app will be available globally on iOS and Android. This can be access through a TV shaped button just above the Insta stories.

 “We made it a dedicated app so you can tap on it and enjoy video without all the distraction,” the company explained. It also explained that IGTV viewers, while enjoying the service, will be able to swipe through a scroll of longer-form videos, or if they like, swipe up to visit a browse tab of personally recommended videos.

Instagram is growing every day and it is pertinent for the company to meet certain needs of the users who keep increasing in number all the time. This may have informed the increase in video length.

Instagram Evolving

Instagram is really evolving and this new development confirms it. It will be recalled that at inception, Instagram only allowed its users to upload 15-second videos and share with their followers. Even with its apparently too short length, many comedians still made names for themselves by creating 15-second videos, mostly funny ones, and uploading them on the site.

There were however, calls to make the video length a little longer than just 15 seconds. The length was finally increased to 1 minute to the delight of many people.

However, with this new improvement, Instagram is set to cause serious stir in the world of video streaming and sharing.

1 Billion Users

Instagram may cause serious stir in the video-sharing community worldwide with its new IGTV innovation because its enormous number of users. It has been revealed that the social media platform has just increased to 1 billion. With this number, the platform has become a major controller of video-sharing destinations on the internet.

Rats invade ATM, tear money to shreds

Police in India have blamed rats for nibbling on currency notes worth more than $18,173 stored in an ATM of the State Bank of India in Tinsukia district.

Tinsukia Police said it received a complaint from officials of the local branch of the state-run lender on June 14, saying they found notes worth Rs 12,38,000 in shreds in one of its ATMs on the outskirts of Tinsukia town, reports Hindustan Times

Prakash Sonowal, Tinsukia’s additional superintendent of police, said the bank in its complaint revealed that the ATM was not functional for about 12 days. “It was not dispensing cash,” he said.

An official from Sijuguri police station, who visited the ATM, said the problem was found out after a vault cutting unit arrived from Kolkata to check the malfunctioning machine. The official said the rats could have entered the machine through a small hole meant for wires.

“The carcass of a rat was found among the shredded notes,” the official said; adding that the bank officials managed to salvage another Rs 17,10,000 stored in the ATM.

The damaged banknotes were of Rs 2000 and Rs 500 denomination, the police said.

The police have ruled out any foul play even though the bank officials did not get a wind of it for more than 12 days after the ATM was shut down following technical failure.

“We have not found the involvement of any bank official or any outsider,” the police official said,

The official said that the report has been forwarded to the concerned SBI officials.

The photographs of the shredded notes inside the ATM have gone viral on Facebook and Twitter. Many have called it a demonetisation Part 2 and a “surgical strike by mice”.