الموقع

ألــــوان جميلةَ موقع تعليمي و ثقافيَ متنوعً، يقدم محتوى مميزا و مختارا بعناية.
Close

الشعار

اخر الأخبار
recent
5/randompost

مقالات

استخدام لوحة المفاتيح دون فأرة


     
    استخدام لوحة المفاتيح دون استعمال الفأرة مهارة يجب تعلمها و هي ممكنة جدا و سهلة بفضل بعض الممارسة و التدريب، فقد نجد أنفسنا مضطرين إلى هذه العملية بسبب عطـــل في الفــــأرة ( الماوس ) أو بسبب إو في ظرف آخر، و قد صممت لوحة المفاتيح ( الكيبورد) على أن تؤدي أزرارها جميع الوظائف و الأوامر الأساسية في التعامل جهاز الكمبيوتر و أنظمة التشغيل.

و هنا مجموعة مه التوفيقات بين الأزرار و أوامرها تبين الوظائف التي تؤديها و النتائج التي يمكن الحصول عليها في نظام الويندوز.

الأزرار و الوظائف :

1 - تحديد النص بالكامل Ctrl+A
2 - نسخ ما تم تحديده Ctrl + C
3 - لصق المنسوخ Ctrl + V
4 - قص ما تحديده Ctrl + X
5 - التراجع عن أي أمر قمت به Ctrl + Z
6 - أمر الطباعة Ctrl + P
7 - فتح ملف من أي برنامج Ctrl + O
8 - إغلاق أي نافذة مفتوحة Ctrl + W
9 - حفظ الصفحة المعروضة في المفضلة Ctrl + D
10-  البحث في الصفحة المفتوحة عن أي كلمة Ctrl + F
11 - ترتيب ملف المفضلة Ctrl + B
12 - حفظ ما تقوم به Ctrl + S
13 - ذهاب مؤشر الكتابة إلي اليسار Ctrl + Shift
14 -  ذهاب مؤشر الكتابة إلي اليمين Ctrl + Shift يمين
15- أمر مفيد يقوم بإغلاق النوافذ المفتوحة Alt + F4
16 التنقل من نافذة إلي أخري Alt + Esc
17- اختيار النافذة المطلوبة عند فتح عدد كبير من النوافذ Alt + Tab
18- تحويل الكتابة من عربي إلي انجليزي Alt + Shift
19- تحويل الكتابة من إنجليزي إلي عربي Alt + Shift
20- تغير اسم ملف محدد F2
21- البحث عن ملف معين F3
22- تحديد الموقع الذي تريده F4
23 -تحديث موقع معين F5
24 تظليل عنوان الموقع في الإكسبلورر F6
25 فتح صفحة الإكسبلورر إلي أقصاها وإخفاء بعض القوائمF11
26 تصوير سطح المكتب Print Screen SysRq
27 تصفح الموقع بكل سهولة Space
28 الرجوع للصفحة السابقة Backspace
29 تحديد النص من أوله إلي آخره Shift + E (End)
30 تحديد النص من آخره إلي أوله Shift + H (Home)
31 حذف ما تريده Del (Delete)
32 حذف نهائي من الجهاز Shift + Del
33 الانتقال إلي أعلي الصفحة Up (Page Up)
34 الانتقال إلي أسفل الصفحة Do (Page Down)
35 نسخ المحدد Ctrl + In (inset)
36 لصق المنسوخ Shift + In (inset)
37 كتابة wwwو Com. لأي اسم تكتبه في انترنت اكسبلوررCtrl + Enger
38 لفتح مربع التشغيل Run "Windows + R"
39 فتح مربع ابحث Find "Windows + F"
40 فتح برنامج Explorer "Windows + E"
41 تصغير جميع النوافذ المفتوحة للحد الأقصي Windows + M

.42 تكبير جميع النوافذ Windows + m + Shift



How to create a new Apple ID on your iPhone or iPad



New to the Apple ecosystem? Your first step is to sign up for an Apple ID.

An Apple ID is basically an account that lets you download and install apps and games from the App Store, purchase music, movies, and books from iTunes, sync Calendars, Reminders, and Contacts through iCloud, and use FaceTime and iMessages in the Messages apps. Though it's possible to have an Apple device without having an Apple ID, it's essential to getting the most out of the Apple ecosystem. It's easy to sign up and doesn't cost anything (unless you start buying content, of course). Here's how to sign up for a new Apple ID.

How to create a new Apple ID on your iPhone or iPad

  1. Launch the Settings app.
  2. Tap Sign in to your iPhone at the top of the screen.

    Apple ID showing the steps to Launch Settings, then tap Sign in
     

     

  3. Tap Don't have an Apple ID or forgot it?
  4. Tap Create Apple ID when the window pops up.

    Apple ID on iPhone showing the steps to Tap Don't have Apple ID, then tap create Apple IDSource: iMore

  5. Enter a birth date.
  6. Tap Next.
  7. Enter your first and last name.
  8. Tap Next.
  9. Select your current email address or get a new iCloud email address.

    Apple ID on iPhone showing the steps to Entering birthday for new Apple ID on iPhoneSource: iMore

  10. Enter your email address.
  11. Create a password.
  12. Verify the password.
  13. Select a security question.
  14. Type in answer.
  15. Repeat two more times.

    Entering security questions for new Apple ID on iPhone

  16. Agree to the Terms and Conditions.
  17. Tap Merge or Don't Merge to sync iCloud data from Safari, reminders, contacts and calendars.
  18. Tap OK to confirm Find My iPhone is turned on.

     

     

How to sign in to iCloud with an existing Apple ID on your iPhone or iPad

  1. Launch the Settings app.
  2. Tap Sign in to your iPhone at the top of the screen.
  3. Enter the email address and password associated with your Apple ID.
  4. Tap Sign In.

    Apple ID on iPhone showing the steps for Launch settings, then tap Sign in, then enter Apple ID and password

     

  5. Enter your iPhone passcode if you have one set up.
  6. Make sure your iCloud Photos are set the way you want them.
  7. Toggle Apps using iCloud on or off, depending on your preferences.

     Source: iMore

Note:In iOS 11 and later, you can use the Keychain password feature in the keyboard suggestion bar to add your Apple ID and password.

Keychain on iPhone showing the steps to Tap the key icon in the keyboard suggestion section, then select your Apple ID

 ign out of iCloud on your iPhone or iPad

  1. Launch the Settings app.
  2. Tap your Apple ID at the top of the screen.
  3. Scroll to the bottom and tap Sign Out.

    Apple ID on iPhone showing the steps to Launch Settings, then tap your Apple ID, then tap sign out


  4. Enter the password associated with your Apple ID.
  5. Tap Turn Off.
  6. Select which data you want to keep a copy of on your iPhone and toggle the switch on.
  7. Tap Sign Out in the upper right corner.
  8. Tap Sign Out when prompted to confirm you want to sign out of iCloud on your iPhone or iPad.


    Apple ID on iPhone showing the steps to enter your password, then tap Turn Off, then Sign Out, then Sign Out again


  9. source:   https://www.imore.com/

How to keep spies off your phone — in real life, not the movies

How paranoid employers and jealous partners can spy on you, and why chip bags are best left to movie heroes.


In the new Terminator movie, Sarah Connor puts her phone inside an empty bag of chips to hide her movements from the bad guys. Our recent experiment showed that this method is actually workable (with some provisos): A couple of foil bags do indeed jam radio signals from cell towers, satellites (such as GPS), and wireless networks (such as Wi-Fi or Bluetooth). But do people actually spy on other people through these networks? Let’s investigate.

Spying over radio: GPS, cellular, and Wi-Fi :

Sarah Connor was concerned primarily about GPS signals. At first glance, that’s logical; we use satellites to determine the exact location of a device. In reality, however, things aren’t that straightforward.

Can you be tracked by GPS?

Phones do not transmit any information to satellites. The system is entirely unidirectional: The phone doesn’t transmit anything through GPS, but rather picks up a signal from several satellites, analyzes how much time the signal took to arrive, and calculates its coordinates.
So, tracking someone using only GPS is simply not possible. One would need to send those coordinates out from the phone, and the GPS standard does not provide for that.

Tracking through cellular networks

With cell towers, unlike GPS satellites, communication is bidirectional. And although determining your location is not the main task of a cellular network, it can lend a hand. Broadly speaking, someone who knows which tower is currently serving the phone can determine its location. However, accessing that data is extremely difficult.
Recently, researchers found a rather interesting way of discovering information about this nearest tower — through an intricate SIM card vulnerability that can be exploited using an ordinary computer and USB modem. However, this method requires specialized technical know-how, and so it is deployed only in high-cost, targeted attacks.
Another consideration is that cell-tower-based geolocation is not all that accurate; it yields the general area, not exact coordinates. And whereas in a city that general area might be relatively small (your location can be found to an accuracy of several hundred yards), in rural areas, where the distance between cell towers is measured in miles, the margin of error can be enormous.

Tracking with Wi-Fi

In theory, your movements can also be tracked using Wi-Fi — when you log in to a public network, it receives certain information about you and the device you’re using. Moreover, smartphones broadcast information about themselves to find available networks, and they can be tracked even if you are not connected to anything.
The sole inconvenience is that Wi-Fi tracking is possible only when you are in the vicinity of an access point. So, although this method is practiced, it is not used for tracking specific people, rather for general monitoring of people’s behavior in a certain area. For example, some shopping malls use this kind of tracking to create individual ads based on data about visits to particular stores.
How people are tracked in reality: Operating systems and apps
Spying is outright impossible by GPS, too inconvenient using Wi-Fi, and expensive and difficult through cellular networks. However, even if you are not an investigative journalist or the head of an international corporation, that doesn’t mean no one but nosy advertisers is snooping on you or harvesting your data. Your GPS coordinates, personal messages, and other data might well be of interest to a mistrustful boss or jealous partner. Here’s how such individuals can actually track you.
They can hack into your Apple or Google account

By default, iOS and Android collect your data. They store it in, among other places, your Apple or Google account — in the clouds. If your iCloud or Google Account gets hacked, everything that system meticulously harvested will fall into the hands of the attacker. Therefore, we recommend making sure your accounts are properly protected. At the very least, use a strong, unique password and enable two-factor authentication. At the same time, you can configure what information about you is stored in these accounts — for example, consider turning off location history.

They can view metadata, geotags, and check-ins

Unfortunately, sometimes users themselves make it easier to track them, for example, by posting photos with metadata — information about where and when the image was taken, on which camera, etc. — on social networks. Some sites delete this information when photos are uploaded, but not all. If not, anyone will be able to see the history of the picture.
Your check-ins and geotags also play into the hands of cybercriminals. Don’t use them if you want to prevent others from tracking your movements.

They can install spyware on your smartphone

Many malicious apps exist to collect and transmit information from your device to their controllers. They can track not only your movements, but also your messages, calls, and much more as well.
Such malware usually penetrates the smartphone in the guise of a harmless app or by exploiting system vulnerabilities. It operates in the background and works hard to evade detection, so in most cases, the victim is not even aware that something is wrong with their mobile phone.

They can use spying apps — legally!

Alas, not all spying apps are considered malware. The category of legal spyware known as stalkerware, or spouseware, is often positioned as a parental control tool. In some countries, the use of such spying apps is lawful, and in others their legal status is undefined. In any case, these apps are freely sold on the Internet and tend to be relatively inexpensive — in other words, it’s accessible to everyone from watchful employers to jealous partners.
True, stalkerware needs to be installed manually on a victim’s device, but that’s no impediment if your gadget is easy to unlock. In addition, some vendors sell smartphones with spying apps already installed. They can be given as a present or a company device.
In terms of general functionality, legal spying apps differ little from malicious spyware. Both operate surreptitiously and leak all kinds of data, such as geolocation, messages, photos, and much more.
Worse, they often do so without any concern for security, so it’s not only the person who installed the stalkerware on your smartphone who can read your WhatsApp messages or track your movements — hackers can intercept the data as well.

How to guard against mobile tracking

The real danger of mobile tracking comes not from cellular networks and certainly not from GPS. It is far simpler and more effective to spy on a person through an app installed on their smartphone. So, instead of putting your phone inside two empty chip bags, simply protect your devices and accounts properly:
  • Use strong passwords and two-factor authentication for all accounts, especially important ones like your Apple ID or Google account.
  • Protect your devices with a strong, complex PIN and don’t reveal it to anyone. No one can install spyware if the device is properly locked.
  • Download apps only from official stores. Although dubious programs occasionally sneak into Google Play and the App Store, you’ll find far fewer of them there than on other resources.
  • Do not give permissions to mobile apps if they seem excessive. You can always grant permissions later if they’re genuinely required.
  • Use a reliable security solution. For example, Kaspersky Internet Security for Android detects not only malware but legal spyware too, and warns the device owner about it. For information about how to search out stalkerware on your smartphone, and what to do if you find it .
  • Link of Orginal Article 

Hot Wheels has unveiled two Cybertruck radio-control cars modeled after Tesla's Cybertruck


Before you can take a Tesla Cybertruck for a test drive, you'll be able to take two Hot Wheels versions for a spin.
Three months after the highly-anticipated reveal of the all-electric futuristic-looking truck, Mattel's Hot Wheels brand announced at the New York Toy Fair Friday that it is introducing two radio-control toy versions.
Both versions are expected to ship in December 2020 and pre-orders are being taken on the Mattel Creations website, www.mattelcreations.com.
"Hot Wheels packs the power and performance of the futuristic Cybertruck into two small-scale, remote-control vehicles: a track-compatible 1:64 scale and a limited-edition hobby grade 1:10 scale," the website says. "It’s the only way to drive the Cybertruck in 2020!"


Consumer Reports names 2020 Top Picks:See the cars, trucks, SUVs on the list
However, there's already a waitlist to purchase the larger $400 version, which the website says is sold out. That version will have functioning headlights and taillights.
It comes with a reusable cracked window vinyl sticker, a nod to the on-stage snafu from the Cybertruck's debut at the Los Angeles Auto Show when after Tesla CEO Elon Musk said the vehicle's windows were bulletproof, they cracked when a metal ball was thrown at them.
Tesla also is cashing in on the viral blunder with a bulletproof T-shirt announced in January.
According to Mattel's website, the Hot Wheels team collaborated with Tesla with the toy brand's designers studying the life-size model.
“Both scale R/C vehicles faithfully replicate their life-size inspiration with blazing speeds via Sport Mode and rechargeable batteries," Mattel's website notes. “Now, anybody can get ‘behind the wheel’ of the Truck of the Future.”
The smaller 3-inch Hot Wheels Cybertruck is the same size as classic Hot Wheels and fits on Hot Wheels tracks. The $20 version was still available for pre-orders Friday night.

Hot Wheels-size Cybertruck 

Dubbed the “1:64 Cybertruck R/C,” this 3-inch toy is the same size as classic cars and can race on the Hot Wheels track.
  • It’s recommended for ages 5 and up.
  • The suggested retail price is $20 and it’s available for pre-order.
  • Key features: Mattel says it has two-wheel drive with both Chill or Sport speed and Mattel says it can “reach up to 500mph scale speed.” It can be recharged from the controller.
  • Sold-out Cybertruck toy has a waitlist

    The “1:10 Cybertruck R/C” has a suggested retail price of $400 and is recommended for ages 14 and up.
    • It’s one-tenth of the size of the real Cybertruck and “the limited-edition, hobby grade radio-control powered Cybertruck has both Chill and Sport speed modes, traveling over 25mph in all-wheel drive,” Mattel says.
    • Key functioning features include: Headlights and taillights, a Tonneau “Vault” cover, a telescopic tailgate that folds out into loading ramp.
    • It also has a removable plastic body to show full interior and a reusable cracked window vinyl sticker.
    • It has a 9.9V, 3300 mAh, rechargeable battery and Mattel says a “1:1 charge/run time.”
    • The toy is listed as sold out but you can join the waitlist at www.mattelcreations.com.

Tesla Cybertruck: The real version

The Cybertruck's odd design – a triangular-shaped body made of stainless steel – has drawn a wide range of opinions, from "eccentric" to a "piece of junk."
With a battery range of at least 250 miles, a towing capacity of more than 7,500 pounds and a zero-to-60-mph time of fewer than 6.5 seconds, the Cybertruck carries a starting price of $39,900.
Since Tesla began accepting $100 refundable deposits on the vehicle in November, “the demand has been incredible,” Musk said on a conference call Jan. 29. “We’ve never seen anything like it, basically. I think we will make about as many as we can sell for many years.”
In November, Musk reported that more than 200,000 people have placed deposits and said the vehicle would arrive in about two years.
Contributing: Nathan Bomey




فيديو

تكنولوجيا

رياضة

قصص