Torrentz.eu Shuts Down Forever! End of Biggest Torrent Search Engine

Over two weeks after the shutdown of Kickass Torrents and arrest of its admin in Poland, the world's biggest BitTorrent meta-search engine Torrentz.eu has apparently shut down its operation.


The surprise shutdown of Torrentz marks the end of an era.

Torrentz.eu was a free, fast and powerful meta-search engine that hosted no torrents of its own, but combined results from dozens of other torrent search engine sites including The Pirate BayKickass Torrents and ExtraTorrent.

The meta-search engine has announced "farewell" to its millions of torrent users without much fanfare, suddenly ceasing its operation and disabling its search functionality.

At the time of writing, the Torrentz.eu Web page is displaying a message that reads in the past tense:

"Torrentz was a free, fast and powerful meta-search engine combining results from dozens of search engines."

When try to run any search or click any link on the site, the search engine refuses to show any search result, instead displays a message that reads:
"Torrentz will always love you. Farewell."
Launched back in 2003, Torrentz has entertained the torrent community for more than 13 years with millions of visitors per day.

However, today, the popular meta-search engine has shut down its operation from all Torrentz domains, including the main .EU domain (both HTTP and  HTTPS version) as well as other backups such as .ME, .CH, and .IN.

Although many copyright holders were not happy with the site with both RIAA and MPAA have reported the site to the U.S. Government in recent years, says TorrentFreak, there is no news of any arrest or legal takedown of the site in this case.

Still, it would be fair enough to wait for an official announcement from the site owners.

ARM becoming a tough rival for Intel

ARM is now becoming a rival for Intel and Intel has also failed many times to crack lock assembled by British company on smartphone chip.




SoftBank Group Corp. of Japan has announced to buy ARM for $32 billion and has also shown plans to double the workforce of ARM within 5 years of takeover. This extra money for ARM's chip sways can also be used to cause a major revolution in the market, causing Intel a major threat.


Thus, ARM has become a major threat for the Silicon Valley giant, Intel. Rumors were also heard that Intel might try buying ARM so that they won't have to face the war coming in near future if SoftBank goes with the idea of buying ARM. Some analysts have also suggested that this idea is highly unlikely because of the design that Intel technologies have developed over the years and the user's reliability image of Intel.


Intel is a strong company, invented microprocessor, a well known chip maker, a major provider of personal computer and server system chips. In 2015, Intel generated a revenue of $55.4 billion.

Create redirect link to your page from Google

Need a redirect link? Worried about getting traffic?
Its not ethical to steal traffic. But, it isn't crime to learn how to (Not until you actually go for it).


Step 1:
 Go to google.com

Step 2:
 In google's search bar, type the following search:
            'sitein:ctechtricks.blogspot.com'

Note: In Step 2 given above, ctechtricks.blogspot.com is the site you want to redirect to.

Step 3:
 Right click on any address which contains the webpage you want link for.

Step 4:
 Click copy link address.

Step 5:
 Now this link can be pasted anywhere to redirect to your page.

How To Recover Files From Corrupted USB Drive

Recover Files From Corrupted USB Drive

There are numerous reasons that lead to data corruption, due to viruses or if the drive is unmounted improperly from the port. Therefore, we are going to share two easiest methods that will help you to recover files from Corrupted USB drive. Go through the post to know about it.
The best way to recover data from corrupted storage device has been stated below. Today we mostly share our files through USB and some storage drives, but due to some viruses or if the drive is unmounted improperly from the port then it can lead to data corruption and they stop working properly. And data in them can  be inaccessible. So for this, we have a method to recover files from this corrupted drive. You just have to follow simple guide to recover all your files from any corrupted drive.

How To Recover Files From Corrupted USB Drive

The method is very simple and easy and depends on a cool recovery CMD trick and on a recovery software that will let you recover all files easily from your corrupted USB drive where you are unable to access files. Just follow some simple steps below to proceed.

Recover All Files From Corrupted Storage Device Using CMD:

Step 1. First of all Insert your drive in computer and press Windows button and type cmd. Now right click on Command Prompt and select Run as admin.
Recover Files From Corrupted USB Drive
Step 2. Now there type Chkdsk H: /f where “H” is the drive letter and which can be different on your computer which you can check in Computer.
Recover Files From Corrupted USB Drive
Step 3. Now files and folders verifying process will start and you can see the process in percents there. If you receive the error that your drive is not windows XP drive then simply enter Y there. When it is done, you should see this in your command window
Recover Files From Corrupted USB Drive
Step 4. In the above-mentioned screenshot, my USB drive is working fine and it has no corruption, in case if you USB  drive was corrupted then you will get the recovered data stored in the directory Lost.dir in your USB drives.
If you see no items on your USB drive then simply type “.” (dot without quotes)in a search box top right corner and hit enter.

#2 Using EaseUS Data Recovery:

EaseUS Data Recovery Wizard Free Edition is the card recovery freeware for memory card used by digital camera. It can effectively recover lost, deleted, corrupted or formatted files from various memory cards.
Step 1. First of all, download and install the tool EaseUS Data Recovery wizard on your windows computer, and launch it. You need to select the file types that you want to recover and click “Next”
Recover Files From Corrupted USB Drive
Step 2. Now you need to select your USB drive and need to hit the “Scan” button, EaseUS data recovery will quickly scan for the lost files.
Recover Files From Corrupted USB Drive
Step 3. Once the scan gets completed, you can preview all the recoverable files. You just need to click on “Recover” button to get your lost files back.
Recover Files From Corrupted USB Drive
So above is all about Recover Files From Corrupted USB Drive. With these two mentioned methods, you can easily recover all your files from a corrupted USB and any storage drives very easily. Also, all other USB errors will get fixed with this trick. Hope you like the article, do share it with others too. Leave a comment below if you have any related queries with this.

Fired From Facebook, Noah Kagan Speaks About His Most Important Lesson

Noah Kagan was only 24 years of age when he was hired at Facebook. According to the news, Noah Kagan was Facebook’s 30th Employee and joined Facebook when it was about one year old. At that time Facebook was only getting few millions new signups per day.
Noah Kagan worked as a product manager. However, due to some fair reasons, he got fired after 9 months. According to Noah Kagan, he made four mistakes and one of the major mistakes was leaking Facebook’s internal developments to TechCrunch.
Noah Kagan is now a founder of the marketing company which is known as AppSumo. AppSumo is a daily deals website for digitally distributed goods and online services. AppSumo was founded in March 2010 by Noah Kagan. Today the company has over 700,000 active subscribers.
During an interview, Noah Kagan recalls the incidence when he used to approach Mark Zuckerberg which his ideas and Mark Zuckerberg used to reply something like “Will it help Facebook Grow?”
During an interview with Ramit Sethi who is an American personal finance advisor and entrepreneur throws a light on what Noah Kagan actually learned during the 8-month period of his Facebook life.
Noah Kagan in an interview said that “I think that’s the biggest takeaway that may be the most successful in the most money is one thing and that one thing is when you are running your business have one goal. That’s it”
Noah Kagan learned an important business lesson to have one goal at a time and also helped Ramit Sethi to build his personal finance book “I will teach you to be Rich” which became a New York Times bestseller.
During an interview with Ramit Sethi, Ramit Sethi told us how Noah Kagan helped him to trim the 37 pages book down to only 5 Page. When Noah Kagan ask Ramit Sethi what his goal was? Ramit answered that he want his book to be in the New york times bestsellers list. Now Ramit Sethi’s book is on New York times bestseller list.
Watch The Interview:
So what we can learn from Noah Kagan! Actually, Multiple goals will always create different thoughts on mind making you unable to focus and will distract you with different thoughts which will hamper your main focus towards achieving what you desire.

Pokemon Go Hack

PGHT 1.5.0.1 Update Released:- New Online Generator Page-
- Works with the latest game version -
- Compatible both on Android 4.0 and above, and iOS 7-


Click here to go to the download section.

Pokemon Go Hack is a unique tool intended for those gamers who loves playing the latest Pokemon game, who wants to be the best at like no one ever was. This simply means that you need not to be spending a lot of money for the sake of those IAP, otherwise known as in-app-purchases, nor would you spend countless hours of grinding finding items and leveling up your Pokemons. Moreover, this will give you a lot of time to enjoy the game rather than having it the played the hard way. This has been made possible with the creation of a new online tool that can be accessed relatively easy and fast or others may want to download the offline tool too, whichever suits best.
I know, there would be a lot of critics out there making fun or probably waiting to dish this claim off as "to good to be true"but I guarantee you what is promised here is true, and you can test it yourself, if you have doubtst. Hay Day HackI have been a Pokemon Go player for over a month now, and I did not believe such website exist, let alone, a tool like this. I was so skeptical at first just like any of you here, but something pushed me to try this tool. And now, I am very thankful of that because, I can fully enjoy and grasp the concept of the game, more than any of you here.. Now, I don't have to spend a lot of days waiting or finding or leveling or farming money in the game, who would want to do that? I know most of you are sick and tired of this "Free-to-Play" scheme, where you play the game for free yet you will face the reality of having hindered to play it the way you want it to be because you are required to spend real cash..
For those who are like me that is concerned about safety and security of using this Pokemon Go hack tool, you are assured that nothing harmful will ever happen. This is a cheats app that was conceptualized with the number one priority in mind, that is safety. Thus, the developer made it a point to integrate ip proxy and masking so to avoid penalty on accounts. I, definitely, can attest to this claim since I am personally using this tool for more than a month and I have never had any problem, whatsoever.Hay Day Hack
Good thing is that the latest version of this software, everything is already simplified for ease of use. They also managed to put the tool itself in an online webpage server, where you can perform the same exploits as the ones found in the offline version.
If you want to try the tool, you can do so simply by browsing the download section. Do not forget to read the instructions posted. The process is pretty straightforward and I am positive that anyone who knows basic English can understand it without any difficulty. Get it now, and start dominating the realm of Pokemon Go, and as what you guys know, "Be the best Pokemon Trainer Like No One Ever was!"


Disclaimer: This website is not affliated to Pokemon Go's developer and publisher Nintendo. Pokemon Go Hack is a tool that is intended not to encourage anyone to lean towards hacking and game imbalance but rather the sole purpose of this is for educational awareness especially to the developers of the game with regards to the flaws and how they can go about it to improve their game against exploits.

Way To run pokemon Go in pakistan

"Now Pokemon Go is in Pakistan"



Pokemon Go is here, the fulfillment of many dreams for catching those magical little creatures in real life (or as real as it could be). However, the thing with Pokemon Go is that catching Pokemons in the game is only half the fun (or well, three-quarters of fun).
Note: Although the application is not officially available in Pakistan but you can download it through our guide.
So without further ado, here’s a simple step by step process: 
Android:
  • Download the APK for the game on your device
  • Go to the Downloads folder using any file explorer
  • Click on the downloaded file
  • Tap on install
  • Pokemon Version


iPhone:
  • Open App Store and tap on Apple ID (your current email)
  • Tap on Sign Out.
  • Go to the Settings app.
  • Tap on General.
  • Tap on Language & Region near the bottom.
  • Tap on Region
  • Check off United States.
  • Go to the Pokรฉmon Go listing on the App Store on your iPhone or iPad. (Tap Change Store if it stays stuck on your old region and says the item isn’t available in the current store.)
  • Tap on Get and then on Install.
  • Tap Create New Apple ID.
  • Check United States if it isn’t already checked.
  • Fill out the required information.
  • Tap None for billing information (Pokรฉmon Go is free).
  • Verify your email address by opening the verification email sent to you.
  • Download Pokรฉmon Go.
  • Login to your new US iTunes Account if you aren’t already logged in.

If you follow these steps correctly, you should be well on your way to becoming a Pokemon trainer.
Getting Started
Now that you have the app installed, it’s time to sync an account with the app to keep track of your Pokรฉmon. You can either sync it with your Google account, or if you’re a super nerd and have a Pokรฉmon Trainer Club account, you can use that to sign in.

Once you sign in, you might get this error message about server issues. Unfortunately, there are too many people trying to play and this is not something that has been worked out at the moment. If you are unlucky enough to experience this saddest of all screens, I’m afraid you have no choice but to wait a little while before checking again. When you’re signed in, you will be asked to customize your avatar before the game play begins.

Now it’s time for the real fun to begin.

Gyms
Like pokestops, Pokรฉmon gyms are also located at different public places.  Once you reach level 5 by gaining XP through finding Pokรฉmon and visiting pokestops, you can go to a gym and join one of three teams: Valor, Mystic, or Instinct, each represented by red, blue and yellow respectively. You can then battle different Pokรฉmon at the gyms.
The entire concept of the game is really cool and something that shows just how far technology has come. We went from trying to catch Pokรฉmon in the games to watching the anime and trading Pokรฉmon cards to now actually being able to catch Pokรฉmon in the (somewhat) real world. Now all that’s left is to wait for real Pokรฉmon to come into our world (let’s do this, science).

6 ways to protect your PC without antivirus

We have been relying on antivirus for so long. It never occurs to us that what if antivirus is not protecting us but instead it is exposing up to threat.


Recent researches have shown that antivirus are now becoming "USELESS" rather than beco
ming handy. Google's Project Zero has also released warnings regarding Symantec's Norton antivirus to be a potentially vulnerable to your security.

"These vulnerabilities are as bad as it gets. They don't require any user interaction, they affect the default configuration, and the software runs at the highest privilege levels possible", said Google researcher Tavis Ormandy.

Here are some tricks that might come handy for your security while using internet services:



1) Always look out what links are you clicking.

2) Use Adblock Plus or any other extension you like to block the ads.
Note: You can install it from extensions option of your browser.

3) Turn the pop-ups off from the browser settings.

4) Keep your Windows Security certificates and your browser up to date.
Note: Try keeping all your softwares up to date.

5) Try using USBs with caution.

6) Install a software which comes from a valid source or else you might end up with a hectic condition of virus infection in your device.

How To Remove Shortcut Virus From Pendrive/PC (Updated)

Todays As per as we use our pen-drives and other Hard drive in our 
Pc/Laptops.We face some shortcuts which harm our files. So The questions arises That from where that shortcuts Comes? And after all The main question that we dont know that How To Remove Shortcut Virus From Pendrives or PC.


What Is Shortcut Virus ?

shortcut virus is a virus (a malware) that hides your original files inside shortcuts.The way it hides the file remains unknown though the effect is quite visible. The original files are there in the drive itself, but in such a position that you can’t recognize it nor take it out. Shortcut Virus Sometimes delete your important data.
Initially, it doesn’t harms your files but later on, it may make them corrupt or even delete all the files; depends on the type of shortcut virus.
F
Remove Shortcut Virus From PC or Pendrive



#Method-1 

#Remove Shortcut Virus From Pendrive/PC Using CMD/Command Prompt.


1.Go to Start Type "Run" > Type "CMD"> Open Command Prompt in Administrative Mode.

5qWa0BB


2.A black Color of window is open infront of you.

3.Type in Command prompt :  attrib -h -r -s /s /d <Your USB drive letter>:\*.*(See <Your USB drive letter> from My computer and then type it For ex, if your drive letter is “D” then the command is like: ” attrib -h -r -s /s /d D:\*.* “)

To know about this command Type ” attrib /? ” In CMD Window.you can know more about it.
Lets Take An Example :- If My removable disk drive (pendrive) has a Latter of "F" then i have to use USB Drive Letter "F".

m1ZFSt8


By this simple method you can Remove shortcuts from your pendrives/pc.

#Problem Facing- Remove Shortcut Virus Using command prompt/CMD 

While you are using this attribute your System files may or maynot be Remove some virus from FAT32 & NTFS.


#Method-2

Shortcut Virus Remover : Remove Shortcut Virus Using Shortcut Virus Removers.

So Here We have many software which helps you to remove shortcut virus from pendrive/PC/SD cards. But here Mukeshtricks4u.com Gives you best Shortcut Virus Remover Software.

Rkill Virus Remover 

Rkill Latest Software To Remove Shortcut Virus From Pendrive/PC.

RKill is a Shortcut virus Remover software designed to terminate malware processes that blocks or prevents your security software (Antivirus, Anti-malware and etc.) from running. In order that, you can start using security software again and be able to clean Your Pendrive from virus.

NOTE- RKill is not an Antivirus or malware Removal Tool, it has no power to remove malware. But it stops malicious or malware processes to help Antivirus and Anti-malware remove stubborn malware.i suggest You all to use Rkill only for removing of Shortcut virus from pendrives/PC

Q. How to fix Security warning that  RKills is infected & Harmful?

Relax Guyz If Dont Worry about it, Beeping Computer  (software Computerauthor) is known to have a very good reputation against malware. It is a false alarm or a bogus alert  caused by malware to shield itself,
If you are using Comodo, Kaspersky and Trend Micro you may receive a false positives. However, be rest assured that RKill is clean and won’t hurt your system. So, just ignore those false positives. The author already submitted the tool to Antivirus vendors mentioned above so that they can whitelist it.


Q. How to do whitelist of some files that RKill Wont Scan?

In my experience, I don’t think this is necessary. It is accurate enough, it doesn’t kill legitimate processes. However, in case this is an issue for you — in command prompt type the following rkill -w c:usersdataprogram filesfile.exe. 


Download RKill Virus Remover Software Latest - 

Download Rkill Free

Top 10 Online Activities That Could Send You In Jail

Any of these 10 online activities could land you in jail in some part of the world

Internet is an unrestricted realm for its users. It brings you latest information, allows you to share movies, images and music without any bounds, allows you to communicate in a split second and share files. It is a medium which is full of advantages, but there are some disadvantages that come with it in some countries. Particularly if you don’t follow certain rules and regulations laid down by these countries while using the Internet.


Cyber crimes and terrorist attacks have dramatically increased over the years and that may be one of the reasons that if one is seen violating rules of Internet, he/she may be put behind the bars.

So, see the below activities that can get you arrested in some parts of the world.

10 Online Activities That Can Get You Arrested

#1 Having An Open Wi-Fi

Have an Open Wi-Fi

Keeping your WiFi Open and not keeping it password protected can sometimes land you in prison. Your open Wi-Fi connection can be used by criminals or terrorists without your knowledge and this can land you in trouble with the law in almost any country.

This happened with a person name Barry Covert whose open WiFi was used by his neighbor to access child pornography websites. Though, police arrested his neighbour after investigations, Barry had to face the police questioning for a month before the correct person was arrested.

It is always better to password protect your Wi-Fi with WEP, WPA (WPA-Personal), and WPA2 (Wi-Fi Protected Access version 2).

#2 Deleting Your Search History

Deleting Your Search History
Sometimes erasing your search history can also land you behind bars. This happened in United States, when a person namely David Kernell was arrested for deleting information on his computer. A University of Tennessee student, Kernell was being investigated by federal authorities for allegedly hacking Yahoo Account of the then vice presidential candidate, Sarah Palin.

India to had brought about laws making it mandatory for users to save their browsing history for 3 months. But the same was scrapped after there was huge public outcry against it.

#3 Offensive Posts, Messages or Tweets



Making offensive posts or tweets or sending offensive messages can land you in trouble in any part of the world. Two persons from Leigh Van Bryan aged 26 and Emily Bunting aged 24 tweeted about their upcoming visit to USA, “Free this week for a quick gossip/prep before I go and destroy America”.
They were interrogated for about five hours by the authorities. Bryan and Bunting tried to convince the police that “Destroying” was a British  slang for “Partying.”

#4 Using VOIP services



This issue is country specific and only limited to Ethiopia. Using VOIP services like Skype is strictly prohibited in Ethiopia and can land you in prison (An user from Ethiopia has contradicted this). The country’s new telecommunications law strictly prohibits VOIP services, which consist of audio and video communication and transfer of information over VOIP clients. We advise you that if you are citizen or tourist of Ethiopia, kindly check up with authorities before using Skype or any other VOIP services.

#5 Dancing in a Video



This is a serious offence in Iran. In fact, six persons were arrested for dancing to a video from Pharrell Williams song “Happy”. The Iranian judiciary found them guilty and they received 91 lashes as well as year’s prison sentence. Though later, the sentences were suspended and they were let off in six months.


In Russia, a youth was jailed in Russia for 15 days and two women were jailed for 10 days after they were found to be allegedly dancing and making a video near a second world war memorial.

#6 Leaving Internet Comments



Syria is now a battlefield between different warring factions for control of territory. Even then, commenting on the Internet is a crime in Syria. Human Rights Watch reported that in 2007, Syrian authorities arrested two person and they were shifted to unknown place, apparently for offering their comments about the censorship laws in Syria on a website.

#7 Translating Articles



Translating banned books can land you in jail in any country. Thailand authorities arrested an American citizen who translated one such article on his blog. The article was termed as “offensive to the autocracy” by the Thai authorities who consider their King as a supreme being. Even posting on Facebook/tweeting against the King can land you in jail in the Lese Majeste laws.

In Indonesia, a person was put behind bars for two years after he posted “God does not Exist” on “Facebook”.

#8 Gambling



Online gambling is banned in many countries across the globe and can land you behind the bars. This includes if you organize gambling or play online games like Poker, Blackjack etc.

#9 File Sharing

File sharing is a contentious issue. In some countries you are free to share movies, images or files without the worry of the law but in many countries it is illegal to share what is considered as pirated content. In some places even downloading torrents is considered as being unlawful.

#10 Posting Lyrics on Facebook

This may have happened only once. Unites States authorities arrested rapper and school student, Cameron D’Ambrosio for posting rap lyrics on Facebook. The police allege that D’Ambrosio made terrorist threats under the garb of rap. Prosecutors sought to charge D’Ambrosio with threats to make a bomb or hijack a vehicle, carrying a maximum sentence of 20 years in prison.
There are many such laws which can put in a spot of bother while surfing online. Making racist comments or hurting religious sentiments is a strict taboo online like it is in the real world. If you know of any other such unknown laws exist in some country, kindly note them down in the comments section.