Your iPhone can be hacked just by sending a message

Android Stagefright like attack for iPhone, All it takes is a specially crafted message to hack your iPhone

If you remember the Stagefright vulnerability in Android discovered in July last year, you will know that a potential hacker can gain full access to your smartphone just by sending a specially crafted multi-media message. The Apple’s iOS  operating system also has a similar vulnerability which can be used by potential hackers to remotely take over your iPhone

This highly critical bug in iOS was discovered by Cisco Talos senior researcher Tyler Bohan, who described the flaw as “an extremely critical bug, comparable to the Android Stagefright as far as exposure goes.”

The critical bug has already assigned a CVE-2016-4631 and resides in ImageIO – API used to handle image data – and works across all widely-used Apple operating systems, including Mac OS X, tvOS, and watchOS. According to Bohan, the that the potential hacker needs to do is create an exploit for the bug and send it via a multimedia message (MMS) or iMessage inside a TIFF (Tagged Image File Format) format file. Once the hacker sends the message to an iPhone owner, the exploit is executed. The user would have no chance of detecting the attack, which would begin to write code beyond the normal permitted boundaries of an iPhone’s texting tool.

.The attack could also be delivered through Safari web browser. For this, the attacker needs to trick the victim into visiting a website that contains the malicious payload.

The attack which is similar to Android’s Stagefright vulnerability can also be exploited by making the iPhone owner visit a malicious website containing the malicious payload through iOS default Safari browser. As in Stagefright, the iOS bug also requires no explicit user interaction would be required to launch the attack since many applications (like iMessage) automatically attempt to render images when they are received in their default configurations.

As said above, the bug can be exploited unknown to the hapless iPhone owner and can give the hacker access to the victim’s authentication credentials stored in memory such as Wi-Fi passwords, website credentials, and email logins. However, for taking full access to the victim’s iPhone, the hacker would need a further iOS jailbreak or root exploit. That’s because iOS enjoys sandbox protection, which prevents hackers exploiting one part of the operating system to own the whole thing.

The bugs uncovered by Bohan work across all widely-used Apple operating systems, however, including Mac OS X, tvOS and watchOS. Bohan noted that as Mac OS X doesn’t have sandboxing like iOS, it offers the potential hacker a full opportunity for exploiting the above bug and remotely taking over the Mac with the victim’s password. This makes Apple’s MacBooks highly vulnerable to a remote takeover through simple specially crafted email. “Exploitation wise, Talos estimates there is about a two-week effort to get

“Exploitation wise, Talos estimates there is about a two-week effort to get from the information we disclosed publicly to a fully working exploit with a decent amount of reliability,” Bohan added. also found memory corruption issues in iOS’ CoreGraphics, which helps render 2D graphics across those OSes.

Bohan also found memory corruption issues in iOS’ CoreGraphics, which helps render 2D graphics across those OSes. Another serious flaws patched by Apple this week resided in FaceTime, permitting anyone on the same network as a user to spy on their conversations. As per Apple’s description, “an attacker in a privileged network position may be able to cause a relayed call to continue transmitting audio while appearing as if the call terminated.” Martin Vigo, a security engineer at Salesforce, uncovered the bug.

Details on all 43 flaws addressed in 9.3.3 can be found in Apple’s advisory. Apple has taken congnizance of the severity of the bug and put out separate advisories for iTunes on Windows,Safari, tvOS, watchOSand OS X El Capitan.

Source By techworm…

How to install Linux on an Android device

Unleash the full potential of your Android device by installing Linux OS on it

Installing Linux on Your device involve four steps which are -installing BusyBox, installing Terminal Emulator, placing required files in SD card and finally running the Linux OS.

Step 1: Installing the BusyBox libraries

Linux
Before you start you’ll need:

-Android Device
-4 GB SD card(or more)
Root Access
Full Backup of your data(for recovery if something goes wrong)

You can get BusyBox from Play Store by clicking here. All you have to do is to download and install it.

Step 2: Installing a Terminal

Linux
You’ll need a terminal emulator for using your Linux OS. Installing this is recommended.

Step 3:Putting required files in place

Linux

Connect your device to your PC (remember to enable the USB mount), and then download this file andthis file.

Create a new folder in your SD card and name it Ubuntu(or whatever you like) and then extract these files in the folder.

Step 4: You’re almost ready

Linux
Go back to the Terminal app and write “su’ again. Then write “cd /mnt/sdcard”. To confirm everything is working try to write “ls” and see if you can recognize your folders (you might find the ubuntu folder as well).

To start our ubuntu write “cd /ubuntu” and then “sh ubuntu.sh”. This will execute many procedures which are trying to set your system. It will request to enter a resolution. Use number x number format to express it. For example: 600×400 is the proper format. For the best appearance and performance I suggest 800×480. Now everything is done.

The ubuntu system is running , however we can’t see it. To see it , we must use a VNC app. We can download it from Play Store.

Thats it! However if you feel any difficulty in any of the steps or require further information, you may drop your query in the comments.

Source By techworm…

Fedora Needs Your Help to Port Python Packages

Here’s how you can help the company port Python packages to Python 3

Miro Hrončok from Fedora Project has informed Softpedia today that they need the community’s help to port certain applications written in the Python dynamic programming language to Python 3.

Python 3 is currently being adopted by more and more GNU/Linux operating systems, as the world always tries to move forward and implement the newest of technologies. Additionally, support for Python 2 slowly starts to fade on some of the most popular OSes.

Miro Hrončok is a Fedora ambassador and packager working at Red Hat, focusing on the Python stack and 3D printing for the Fedora Linux operating system. Today, July 15, 2016, he has informedSoftpedia that his team needs volunteers to help with the Python 3 porting of various packages from theFedora Python 3 Porting Database.

“Fedora is always moving forward and that means switching to Python 3. There are plenty of upstream projects that already support Python 3. Unfortunately, they are often not packaged in Fedora,” says Miro Hrončok. “Join the porting party, help us move to the future and get your reward. We can port it, but not without your help!”

Here’s how you can help

Helping the Fedora developers to get most of these packages ported to the latest Python 3 technologies is easy. All you have to do is have some knowledge about the Python 3 programming language, pick one or more packages you want to port, fire up the Bugzilla link on that package(s) and check its status, and claim it yours for the porting revolution.

To actually port the package, you need to prepare a Git commit for the spec file that makes the respective package compatible with Python 3, create the patch and attach it to the Bugzilla bug report. Of course, you’ll also need to make sure that the patch has been applied. Best of all, you can earn a Fedora badge for each patch.

Source By techworm…

Man Uses Drone To Cheat And Play Pokemon GO

Man cheats at Pokemon GO with help from drone

The popular mobile game, Pokemon GO has become a phenomenon from the time it has made its debut on July 6, 2016. Pokemon GO game lovers have gone to extreme lengths to play this game, such as walking into traffic and wiping out while playing the game, eyes glued to their cell phone screen.

The free game allows people to catch, train and battle their Pokemon ‘in the real world’ by walking outdoors and interacting with other users. Players can also pick up supplies at real-world landmarks that serve as ‘pokestops’ in the game. However, in a recent update, it is found that a player was cheating while playing the game using a drone.

A young man in Massachusetts duct-taped his Android smartphone to a DJI Phantom 3 drone and and mirrored his smartphone screen on his laptop using a program called AirDroid, in order to play Pokemon GO without having to leave his backyard. Moreover, this man asks on Reddit if this MacGuyvered “Pokémon GO” setup was cheating.

The internet responded with a resounding “yes.”

The setup allowed the youth to explore areas where Pokémon are located without have to make the trek by foot. However, the bad news is that it didn’t work very well. “If I was on data, it would work much better,” the youth told Gizmodo. “The drone can go around 1,500 feet away from me and that is the estimated range of using Pokemon GO on a phone duct-taped to a drone.”

Restricted to the broadcast area of his Wi-Fi, he was only able to fly in a 50-foot radius around the router: with the nearest pokestop a mile away from him the drone wasn’t much help. In addition, the smartphone interfered with the drone’s compass, taking it off GPS mode.

“If you do attempt this, make sure to be in an open area where a falling phone can’t hurt or break anything as well as maintain line of sight with your drone because of the compass issues,” he advised.

Pokémon GO developer Niantic has declared drone use to be legal in its games, reasoning that the smartphone is still visiting the locations even if the person is not. However, location spoofing is against the rules.

Even though Niantic has declared the drone fair, other players were not as kind.

“It’s the fattest fat guy solution I’ve ever seen,” one user wrote.

Others said the drone violated the “spirit of the game.”

Even though distracted users have been a problem, many have praised the game for helping to get off their couches and get some exercise while being social with other players.

Some have even credited the game with improving their mental health, according to BuzzFeed News.

Source By techworm…

How Hackers Can Hack Into Your Smartwatch To Steal Your ATM PIN

Your smartwatch and fitness trackers may reveal your ATM/credit card PINs

According to researchers, cyber criminals can easily exploit wearable devices such as smartwatch and fitness trackers to steal sensitive information like your ATM/Credit Card PIN or passwords for electronic door locks. This was revealed in a study by researchers from Binghamton University in the US.

The researchers combined data from embedded sensors in wearable technologies such as smartwatches and fitness trackers. The algorithm called “Backward PIN-sequence Inference Algorithm” developed by the research team could crack private PINs and passwords with 80 percent accuracy on the first try and more than 90 percent accuracy after three efforts.

The team conducted 5,000 key-entry tests on three key-based security systems, including an ATM, with 20 adults wearing a variety of technologies over 11 months.  They were able to record millimetre-level information of fine-grained hand movements from accelerometers, gyroscopes and magnetometers inside the wearable technologies regardless of a hand’s pose.

“Wearable devices can be exploited. Attackers can reproduce the trajectories of the user’s hand and recover secret key entries to ATM cash machines, electronic door locks, and keypad-controlled enterprise servers,” said Yan Wang, a member of the research team.

The team used “Backward PIN-sequence Inference Algorithm” to break codes with alarming accuracy without context clues about the keypad. “The threat is real, although the approach is sophisticated,” Wang said in the paper presented at the “11th ACM on Asia Conference on Computer and Communications Security” conference in China recently.

The researchers did not give a solution for the problem but suggest that developers “inject a certain type of noise to data so it cannot be used to derive fine-grained hand movements, while still being effective for fitness tracking purposes such as activity recognition or step counts”.

Wang co-authored the study along with Chen Wang from the Stevens Institute of Technology in New Jersey.

Source By techworm…

This optical illusion has left the Internet puzzled

Internet users are baffled by this optical illusion – can you work it out?

An illusion created using “ambiguous cylinders” has had hundreds of thousands of people baffled since it appeared on YouTube in recent days. The image above is a detail from an entry in this year’s Illusion of the Year contest.

This remarkable illusion was developed by one Kokichi Sugihar, a professor at Meiji University in Japan. He came second in the contest, which is organised by the Neural Correlate Society, an organization that “promotes scientific research into the neural correlates of perception and cognition.”

Still from video

So how does it work? The professor discovered that the objects aren’t circles and they’re not squares either. He explains: “The direct views of the objects and their mirror images generate quite different interpretations of the 3D shapes.

“They look like vertical cylinders, but their sections appear to be different; in one view they appear to be rectangles, while in the other view they appear to be circles.

Still from video

“We cannot correct our interpretations although we logically know that they come from the same objects.

“Even if the object is rotated in front of a viewer, it is difficult to understand the true shape of the object, and thus the illusion does not disappear.”

The optical illusion is the latest image to get internet users’ brains working tirelessly in recent weeks.

This misleading image went viral after it was shared by Manchester-based Facebook user Arron Bevin, who wrote: “This is one of the best optical illusions I’ve seen. If you see it, don’t spoil it!!!!! Just like n [sic]share!!! Took me a good 5 minutes.”

Source By techworm…

The digital age reshapes our notion of photography. Not everyone is happy …

Instagram, selfies, citizen reportage – technology has produced a new kind of work that is finding its way into galleries

“Photography is demonstrably the most contemporary of art forms; it is the most vital, effective and universal means of communication of facts and ideas between peoples and nations.” So said Cornell Capa, the founder of the International Centre of Photography, which opened in New York in 1974 with a remit to preserve the archives and exhibit the work of what he called “concerned photographers” everywhere.
Forty-odd years later, the ICP has just opened in a new downtown location on the Bowery with a bold exhibition, Public, Private, Secret, that attempts to take the measure of contemporary photography at a time when it is still undeniably the most contemporary of art forms, though in ways Capa would never have imagined. In the age of social media and insta-overload, photography not only reflects the fast-forward momentum of the hyper-digital age but drives and shapes it. Put simply, no other medium is so intertwined with digital culture as photography. The medium, as Marshall McLuhan predicted, is very much the message.

Today, the question that exercised Capa at a time when the moving image seemed the biggest threat to photojournalism – “whither concerned photography?” – seems oddly quaint in the contexts of the selfie, Instagram and Photoshop. A more apt question might be: “what is photography?” That question resounds throughout Public, Private, Secret, and, indeed, throughout contemporary photography from the proliferation of artists using found imagery – often downloaded from the internet or culled from obscure archives – to the widespread embrace of digital manipulation and photography that, to borrow a term beloved of curators, “interrogates the medium”.

If one wanted to measure the lunar distance photography has travelled from the work of a 1950s master such as Henri Cartier-Bresson, whose idea of the so-called “decisive moment” held sway for so long as a shorthand for the kind of authenticity that photography once seemed so desperate to attain, one need only compare his work to, say, the images produced – or reproduced – by Doug Rickard. For Rickard’s series in Public, Private, Secret, the source material is caught on smartphones and uploaded on to YouTube: often blurry citizen reportage of assaults and robberies collaged into a kind of meta-narrative that speaks of very contemporary anxieties – both about everyday American violence and the ways in which evidence of that violence is disseminated on social media sites without context or condemnation.

Cartier-Bresson’s work is perhaps the most emblematic example of what used to be called straight photography: an example of the art of going out into the world with a camera to take a great photograph. Now, though, photography tends to be made – and remade, remixed or recontextualised – rather than taken.

Adam Broomberg and Oliver Chanarin, The Revolutionary, from Spirit Is a Bone, 2013 Adam Broomberg and Oliver Chanarin, The Revolutionary, from Spirit Is a Bone, 2013, at Public, Private, Secret at the International Center of Photography in New York. Photograph: © Adam Broomberg and Oliver Chanarin

In Tate Modern’s recent exhibition, Conflict, Time, Photography, for instance, the first room contained Don McCullin’s memorable image from the Vietnam war of a shellshocked American marine. On an adjoining wall hung an image by Broomberg & Chanarin that was made by exposing a sheet of photographic paper to sunlight just after a soldier was killed in Afghanistan in 2008. It, too, is war photography, but not as we know it: an absurdist response to the strictures of being embedded with the British army and also to the idea of reportage itself in an era when the mobile phone camera allows everyone to bear witness.

Bearing witness, of course, is what Cornell Capa dedicated his life to as a photographer as well as the founding director of ICP. It is what his more famous brother Robert died doing in Indochina in 1954. What they would have made of Rickard’s borrowed images or Broomberg & Chanarin’s conceptual provocation is not hard to second guess.

Andrew Hammerand, The New Town, 2013. Andrew Hammerand, The New Town, 2013, from Public, Private, Secret at the International Center of Photography, New York. Photograph: © Andrew Hammerand

Public, Private, Secret, which moves uneasily between explorations of social media mores, surveillance and the dissolving of the space between public and private that occurs in both, is not a show for photography purists. It has, perhaps unsurprisingly, met with a mixed critical response. The clutter of often conflicting social media-based imagery and, more problematically, the dilemma of how best to show work of this kind – on screens, projections, prints; randomly; or with a curatorially imposed order that possibly negates their fractured nature – is one that is now exercising the minds of institutions across the globe. Photography is no longer simply prints on the wall.

Merry Alpern, Dirty Windows Series #19, 1994 Merry Alpern, Dirty Windows Series #19, 1994. From Public, Private, Secret at the International Center of Photography, New York. Photograph: © Merry Alpern

Whatever else it is, though, Public, Private, Secret, is a very public, perhaps even foolhardy, statement of intent. One cannot imagine a British institution attempting the same. We remain as a nation, I think, inordinately suspicious of photography even though, on the ground, there is a vibrant contemporary photography culture of independent small galleries and exciting practitioners.

Outside that bubble it remains for most British people a mid-20th century form: black and white, deftly composed, documentary. And, even after Walker Evans and Andy Warhol, Diane Arbus and Cindy Sherman, William Eggleston and Andreas Gursky, not really art – witness the Guardian’s art critic Jonathan Jones’s recent provocation: “Flat, soulless and stupid: why photographs don’t work in art galleries.” The British, it seems, don’t get photography in much the same way as they don’t get Europe – it simply isn’t British enough.

Ironically, when I interviewed Charlotte Cotton in 2011, she was the newly appointed creative director of the still-to-open Media Space in London, an adjunct to the Science Museum, which she described as more “a kunsthalle than a museum”.

She continued: “We are at a point where everything is up for review, including the idea of what a cultural space should be doing at this moment of what you might call exhilarating crisis.”

Within months, though, she had departed the job, stymied, one sensed, by the Science Museum’s lack of faith in her vision for the new gallery. Now, as the newly revamped and relocated ICP opens under her aegis, rumours abound about Media Space’s future and London still does not have a big, radically visionary exhibition space devoted to photography.

Perhaps we need a Cornell Capa for our times: someone who understands that photography is, perhaps more than ever, “demonstrably the most contemporary of art forms”. Don’t hold your breath, though.

Source By theguardian…

Become An iPhone Pro With These Interesting Hacks

Check out these interesting tips and tricks to use your iPhone like a pro

Smartphones these days have features more or less features like PC, which coupled with fast internet connectivity makes it easier to work while on the go. As a result, we end up spending most of our time on smartphones. In spite of that, many of us do not know the hidden tricks to use our smartphones in the best possible manner.

You may be owning an iPhone since 2007, the day it was launched but chances are that you dont know many hidden features that Apple has incorporated into it. In this article, we bring you some handy tips that will allow you to use your iPhone like a pro.

1. Keyboard: Double tap the space bar for a period at the end of the sentence in order to start a fresh sentence with a capital letter.

2. Ear plug: Do you know that you can click a selfie without touching your iPhone? All you need to do is press the + button of your ear plugs to click a picture without losing the focus.

3. Home-screen: Want the home screen of your iPhone 6 or 6 plus to lower down further? Just double tap the home button (do not click it) and the menu will drop down by a few centimetres.

4. Volume: Many a times, we end up adjusting the volume while listening to music to avoid the disturbing background noises. Not, anymore. Just, go to Settings > Music > EQ > Late Night and enjoy your music in peace.

5. Browsing: You can save yourself from the hassle of saving your email in drafts in order to copy the content from another email in your inbox. All you need to do is, tap in between Cancel and Send to minimize the New Message window. Now, you can easily scroll through your email and return to the New Message window at the bottom of the screen.

6. Keyboard: You notice a mistake in the sentence formation after typing the entire text. What to do? Just shake your phone to undo typing and write a fresh text without wasting a minute.

7. Reading: Many times we are bombarded with low storage notifications from our smartphone. You have to cut your app list reluctantly. Here is how you can save some storage space in your iPhone.

Avoid installing Dictionary app, as your iPhone already has an inbuilt dictionary. While reading, long press the word whose meaning you want to know. Click on the ‘define’ option from the list of options and improve your vocabulary.

8. Maps: The international mobile data pack makes a huge hole in the pocket while traveling abroad. So, if you wish to browse maps on the go, cache maps for offline use. Zoom in the location you are about to visit, type OK Maps in the search bar and your map will be saved for further reference.

9. Browsing: At times, while checking a webpage on our smartphones, we end up scrolling the page too far. Now, you can scroll to the top in a click only. Tap the status bar (the bar which mentions time and signal strength) and you will be redirected to the top of the webpage.

10. Keyboard: Do you find switching back and forth numeric keypad and alphabetic keypad hectic? Press and hold ‘123’ button on your keyboard and slide to the character you wish to input. The alphabetic keyboard will be resumed, as soon as you release the button.

The above tricks will not only help you use your iPhone better it will also provide you a chance to flaunt your newly acquired skills in front of your friends and colleagues.

Source By techworm…

Why Surfing Porn in Browser’s Incognito Mode Is Not Safe

Browsing for porn in your browser’s Incognito mode might not be as private as you think

Last week we had reported why logging out of Facebook while surfing porn websites is good because Facebook tracks users through the ‘Like’ and ‘Share’ buttons on such porn webpages. Carrying the research a bit further, we present you with another fact you didnt know. Surfing porn in any browser’s Incognito Mode doesnt make your porn habits private.

It is a fact that Incognito mode doesnt save history but that’s about the only protection it grants you. 99 out of 100 Google Chrome user think surfing porn in Incognito users is safe! Admit it, you use your browser’s Incognito window to surf porn yourself!!!

Why surfing in Incognito is not private?

Opening a private or incognito browser in either Google Chrome, Mozilla Firefox, Apple Safari or Microsoft Edge and Internet Explorer only ensures your computer does not remember your online activity. As said above, any web browser will make sure your web searches and online history are not visible the next time you log in. And that is all that it does.

However that doesnt mean that Incognito surfing is private or anonymous. You Incognito browsing is stored by your ISP, your company and eventually the browser company. Your internet service provider – or ISP – is able to monitor every webpage and web search you made from your house.

Try opening your bank account or email webpage in Incognito mode. You will find that the data like your user name and password are filled up despite the Incognito mode not saving your data. It is fact that most browsers pull data from local memory to fill such details in both normal as well as Incognito mode.

Google has been very up-front about its privacy policy for surfing in Chrome browser Incognito mode. “Going incognito doesn’t hide your browsing from your employer, your internet service provider or the websites that you visit.” Google has warned.

Actually signing into your Gmail account in Incognito mode makes Google’s job of tracking your porn surfing habits that much more easier. 

If you haven’t disabled or paused your account’s Google Web History – you are able to log-in and track your porn surfing activity there, too.

What about other browsers? Most browsers do the same thing what Google does. Like Google, Mozilla Firefox uses an almost-identical disclaimer on its private browsing mode. But again, “while this computer won’t have a record of your browsing history, your employer or internet service provider can still track the pages you visit.”

Then there is something called Super Cookies. Many porn websites use something called Super Cookies which are able to track your movements across the web even when you are browsing in private mode. Super Cookies are like the regular, a lightweight software and sit on a website and fingerprint users who visit the page. When you return to that particular page again at a later date, the website is able to track the entirety of the user’s activity between the two visits.

Considering the above facts, it is unwise to think that your Incognito mode porn surfing habits are either private or anonymous. If you really want to be anonymous, use VPN but dont be under the impression that your Incognito browsing records are private.

Source By techworm…

How To Find And Fix An Overheating Laptop?

How To Fix An Overheating Laptop?

Is your laptop overheating? Try these methods to keep it cool

The past couple of years have seen an unbelievable amount of development in laptops. A steep increase in performance was enabled by chips that are ever more densely packed with transistors. Similarly, the amount of processors was multiplied, the hardware was put into slimmer cases, and better graphics cards enabled bigger screens with higher resolutions. However, these developments came at a price: heating issues.

Many laptops overheat because the fan on the bottom is blocked, and the hard drive then quickly fails. In laptops, the cooling is normally performed by a fan and some kind of metal conductor like copper or aluminium called a heat sink. The CPU, and lately the GPU (Graphics Processing Unit), are connected to the metal heat sink via a thermal grease or compound. This grease generates heat but not electricity.

In this article, we will find out the reasons for overheating, signs of overheating and methods that can prevent or fix an overheating laptop thereby enhancing the performance and extend the lifespan of your laptop.

Why Your Laptop Is Overheating?

There are three major reasons why laptops have more of an overheating problem than desktops. Firstly, since laptops are smaller than desktops, those electronic components are crammed in there more tightly. Since they are closer together, and since the casing of a laptop is so narrow, there is not much room for the heat to dissipate.

The other issue is power. As laptops get more powerful processors, and as operating systems require more of that processing power to run, more heat is being generated inside the case.

While laptop manufacturers know about this, the task for them is to do away with as much heat as possible using as small fan and heat sink as the CPU will allow. Fans, heat sinks and air vents all work to cool down a laptop while it’s running. Though sometimes, it’s just not enough. Overheating can happen when a fan isn’t working properly or there’s some other malfunction. However, sometimes it is more the user’s fault than the machines’.

Lastly, the most common cause of overheating is the accumulation of dust inside the laptop.

What Are The Signs Of Overheating?

A sure signal that your laptop gets too hot is when your fan always runs at maximum speed. You may also experience reduced performance because the CPU cuts back its clock speed to escape heat pressure. Moreover, the fail safe software may trigger a sudden shutdown to prevent hardware damage.

Methods To Keep Your Laptop Cool

1. Elevation

Raise the level of the laptop. When sitting at your desk, put a small book or item (like the docking station for your iPod) under your computer’s battery. This slight tilt allows a lot more air to flow under the laptop, keeping it considerably cooler. Make sure that the book is not obstructing the bottom fan hole.

You can also try something more uneven if a book is not being much help to you. Try sticking four sockets from an egg tray on four corners of your laptop. Either you can stick them with a sticky tape/masking tape or use hook and loop tape for flexible design.

2. Keep it cool

(a) Buy a laptop cooling mat. There are many brands to choose from (Thermaltake, Xion, Targus) and are available at computer stores or online. You can also buy risers, or computer stands, that have ventilation.

If you are unable to afford or find cooling mat, you can always prefer to keep something hard under the laptop instead of something soft. For instance, use a lap desk, a plastic casing, a tray table or even a wooden cutting board to provide a solid, flat surface to allow proper airflow.

Don’t use your laptop on soft surfaces such as a sofa, carpeting, folded quilt or pillow. It can cause overheating, as any vents situated at the bottom of your laptop will be blocked and airflow will be reduced. It may even overheat enough to catch on fire.

(b) Keep a cool environment. Try keeping your laptop in an air-conditioned or cool area to allow your system to cool down and stop it from overheating.

(c) Think of using a heat sink. Use a steel flat bar as an external heat sink. It works because your computer has to heat up more mass before it overheats. This also means, that the larger the bar, the longer it will take for it to overheat. It will only work if your laptop has a metal case, and it feels hot.

3. PC’s Setting

(a) Get a program to keep track of your temperature.

(b) Stop overclocking. If you overclock your computer, it will be hotter than usual. If you have not done it, you don’t need to underclock since that will make your computer lag.

(c) Lesser the Maximum Processor states. However, this is for Windows only. You might be able to do this on Mac but Windows is easier. Click the battery, select more power option. Change plan settings for the one you use. Then, click on advanced power settings. Click processor power management, then maximum, processor states. Set both to around 70-90%. (80% is recommended).

(d) Lower the brightness.

If all the three above methods fail, you can always try out a recent cooling hack by a Japanese student. He found out that neatly stacking copper coins on your laptop cools it down considerably using thermodynamics.

In the meantime you can learn about how to prevent your smartphone from overheating here.

Source By techworm…