05 April 2012

Solve Wi-fi Error in Android Cell phones


Are you facing problem while connecting wifi network in your android mobile phone , follow below steps and hope this will help.

  • Turn off wifi.
  • Open “allshare”, then you will be asked to connect to a wifi network.
  • Then select the wifi network that you need to connect from the list opened.
You can also try this trick to troubleshoot this problem

How to Reload Wifi Driver in Mobile Phone

  • Dial *#*#526#*#* to reload the wifi driver.If it doesn’t work, restart your phone and dial it once gain.

Try Wifi-Fixer to solve Android wifi problem

You can also try Wifi-Fixer from android market to solve this problem , you can download this app from android market.

Recover Deleted Disabled FaceBook Page

 

Recover Deleted Disabled FaceBook Page

Recover or Restore Disabled Facebook Profile

Contact here if your Personal Profile was Disabled. You can also post direct request to enable your disabled facebook profile at disabled@facebook.com.
There are two aspects of shutting down your Facebook account.
  • There is Deactivation and full Deletion. Deactivation is simply putting your account on sleep mode where no-one can interact with it during it’s period of dormancy. However when you sign on to this account it will basically reboot it again.
If you think this may just be the case with your account, just try signing onto it with your regular details. If it’s a bummer then your account has been fully deleted.
  • Deletion is unrecoverable. A deleted account is completely erased, you’ll save yourself time and effort just to make a new account…
But why would you want to? Facebook’s awful, just like all profile sites.
Don’t be a victim to the virtual world, there’s a whole world of reality for you to explore.
The internet was created as a learning resource, so use it as one and do not substitute your social-life with a computer.

08 October 2011

How to Rename Google Plus Circles?

On Facebook and Twitter , you organize your friends and contacts lists. On Google+ lists are called “Circles.” They not only allow you to organize your contacts according to type of relationship you have with them, but you can easily interact with only members of one of your circles.
google-plus-circles
Did you know that you can change the name of your circles? If you want to change the name of your google plus circles then follow the simple steps listed below;
How to Rename Google Plus Circles :
Go to Circles.
Right Click on the Circle you want to rename.
Click on Edit Circle.
Click on “Rename”
Make changes and press the “Save” button.

Example :
I have a circle named “The Google Team” and I have added the most popular Google+ team members to the circles. Edit a link on a circle allows me to change the name of the circle. See the screenshot below for details;

You can give any name you want to your Google Plus Circle. It’s very easy to edit the Google plus circles.

11 June 2011

How to unregister DLL files?

1. What are DLL files?

DLLs are dynamically linked library files. DLL file contains a list of certain functions that can be used by various applications. Spool32.dll is a great example of how the things work: that file is used by various programs for print control within Windows 95 and Windows 98.

2. Why is it important to unregister malicious DLLs?

DLLs may contain information essential for a computer to function properly. Malicious programs may corrupt regular DLL files or they may install new DLLs instead of normal ones.
Deleting DLLs is a risky deal since it can affect computers performance and functionality of many applications. If a malicious DLL is somehow used by a regular application and the DLL file is removed, the application won’t work normally even if the deleted DLL is not needed for a program to function. This is why you have to unregister DLLs before deleting them.

3. How to unregister malicious DLL files?

a) Open Command Prompt window
Click the “Start” button and select “Run” option. Type “cmd” into the “Open” field and click the “OK” button.

b) Unregister malicious DLL file
Type “regsvr32 /u filename.dll” into the Comand Prompt window and click “Enter”. “Filename.dll” should be the name of DLL file you want to unregister.

How to remove Windows 7 Recovery

Windows 7 Recovery description


Windows 7 Recovery is a poor choice for a security tool since it’s a computer infection itself. Windows7 Recovery is a rogue program. It presents itself as antispyware and system optimization kit in order to trick people into giving their money away. Do not trust web sources that promote Windows 7 Recovery as a legitimate and useful tool.
Windows 7 Recovery is able to mimic various reports and system notifications. Each of those leads victims into purchasing a “full version” of the tool. Avoid the trap and don’t spend your money for Windows7Recovery unless you want to support scammers.
Windows 7 Recovery may cause other problems besides loading tons of irritating pop-ups. The malware may block regular applications including security tools. It may also hijack a web browser.


Delete a Registry Entry

1. What is the Registry?

Windows Registry is a collection of records of all system settings, hardware settings and software settings. It is a part of Windows operating systems such as Windows XP, Windows Vista, Windows 9x, Windows CE, Windows NT, Windows 2000 and Windows Millennium.
The Registry is essential for Windows to function normally. Every change made to a machine reflects on the Registry, but every change made on the Registry influences computer’s work as well.

2. Why is it important to delete malicious registry entries?

Computer’s performance can be affected badly with a single deleted or modified registry entry. It is the reason why the most majority of malwares make some changes on the Windows Registry.
Malwares usually employ Registry to run malicious files every time a computer boots and to change homepage of web browsers. The Registry may also be used for other malicious purposes. You have to delete malicious registry entries or to restore the default ones; otherwise the malware won’t leave your computer. Even if you delete all the malicious files, the settings saved on the Registry may restore the malware or interrupt normal use of a PC.
Security tools usually take care of malicious registry entries. However, new computer parasites appear every day and there is no universal software that could detect and delete all the threats.

3. Things to consider BEFORE removing registry entries.

Every modification made on the Windows Registry influences how a computer functions; this is why the Registry should be handled with caution. Removing malicious registry entries and modifying values of regular entries is a risky and complicated task. Modifying the Registry should be avoided unless there is a serious reason.
If a wrong entry is removed or useful setting is changed, the computer might crash and the software installed on board might be corrupted. Set a System Restore point in advance of modifying the registry in order to avoid data loss. Use anti-spyware and anti-virus programs before changing Windows registry manually; this way saves your time and efforts.

4. How to delete registry entries?

a) Open Registry Editor.
Click the “Start” button and choose the “Run” option. Type “regedit” in the “Open” field and click the “OK” button.

b) Navigate to find the needed registry key and value.
Registry Editor is divided into two panels. The left panel is dedicated to navigation and the right one is for displaying values of selected keys.

c) Select the value to modify it.
Select the value you want to edit, click the right mouse button on it and choose the “Modify” option. You can also reach the “Modify” option by clicking “Edit” on the top menu. You can modify the value by double-clicking it.

Enter the new value

d) Find the value using the steps above and delete it.
Select the value you want to edit, click the right mouse button on it and choose the “Delete” option. Warning! Make sure you delete malicious entries!

e) You may need to add a new value or a new key to the Windows registry.
Click “Edit” option on the top menu, choose option “New” and then choose a type for your entry.

f) You may need to export certain key or value from the registry.
Choose an object, click the right mouse button on it and choose the “Export” option from the menu.

Type a name for the exported file and save the file as a *.reg file.

g) You can import missing or new values and keys.
Click on the “File” option on the top menu, choose the “Import” option and then select a file to import it to the Registry.

h) Close the Registry Editor and reboot a computer for changes to take an effect.

10 June 2011

window 7 shortkut key


1.      [Alt] + [Ctrl] + [Tag] + left/right/up/down arrow
Flip window.
2.      [Alt] + [Tab]
Cycle through open windows.
3.      [Windows] + [T] OR [Windows] + [SHIFT] + [T]
Move focus to front or back of taskbar. Press [T] again while holding the [Windows] key to cycle through items in the taskbar from left to right or, with [SHIFT] button held too, from right to left.
4.      [Windows] + [B]
Puts focus on the ’show hidden icons’ button on the system tray.
5.      [Windows] + [1] THROUGH [Windows] + [9]
Launch first through ninth icon on taskbar, including items pinned to taskbar.
6.      [Windows] + [SHIFT] + [1] THROUGH [Windows] + [SHIFT] + [9]
Starts new instance of respective taskbar icon.
7.      [Windows] + [Ctrl] + [1] THROUGH [Windows] + [Ctrl] + [9]
Cycles through multiple instances of the respective icon.
8.      [Windows] + [Alt] + [1] THROUGH [Windows] + [Alt] + [9]
Opens jump list for respective icon.
Multiple Monitors
1.      [Windows] + [SHIFT] + right arrow OR [Windows] + [SHIFT] + left arrow
Move selected window from one monitor to another. They will remain in the same relative location.
2.      [Windows] + [P]
Select presentation display mode.
Magnifier
1.      [Windows] + [+] OR [Windows] + [-]
Activates Windows Magnifier to zoom in or out of screen.
2.      [Ctrl] + [Alt] + [D]
Switch to docked mode.
3.      [Ctrl] + [Alt] + [L]
Switch to lense mode.
4.      [Ctrl] + [Alt] + [F]
Switch from docked or lens mode back to full screen mode.
5.      [Ctrl] + [Alt] + [I]
Invert colors.
6.      [Windows] + [Esc]
Exist magnifier views.
Other
1.      [Windows] + [G]
Cycle through desktop gadgets.
2.      [Windows] + [X]
Launches Windows Mobility Center. Especially useful if you’re working on a laptop.


Adding and Changing Registry Values


To add a registry subkey or add or change a registry value, make the appropriate changes in the registry, and then export the appropriate subkey or subkeys. Exported registry subkeys are automatically saved as .reg files. To make changes to the registry and export your changes to a .reg file, follow these steps:
  1. Click Start, click Run, type regedit in the Open box, and then click OK.
  2. Locate and then click the subkey that holds the registry item or items that you want to change.
  3. Click File, and then click Export.

    This step backs up the subkey before you make any changes. You can import this file back into the registry later if your changes cause a problem.
  4. In the File name box, type a file name to use to save the .reg file with the original registry items, and then click Save.

    Note Use a file name that reminds you of the contents, such as a reference to the name of the subkey.
  5. In the right pane, add or modify the registry items you want.
  6. Repeat steps 3 and 4 to export the subkey again, but use a different file name for the .reg file. You can use this .reg file to make your registry changes on another computer.
  7. Test your changes on the local computer. If they cause a problem, double-click the file that holds the backup of the original registry data to return the registry to its original state. If the changes work as expected, you can distribute the .reg you created in step 6 to other computers by using the methods in the "Distributing Registry Changes" section of this article.

Deleting Registry Keys and Values
To delete a registry key with a .reg file, put a hyphen (-) in front of the RegistryPath in the .reg file. For example, to delete the Test subkey from the following registry key:
HKEY_LOCAL_MACHINE\Software
put a hyphen in front of the following registry key in the .reg file:
HKEY_LOCAL_MACHINE\Software\Test
The following example has a .reg file that can perform this task.
[-HKEY_LOCAL_MACHINE\Software\Test]
To delete a registry value with a .reg file, put a hyphen (-) after the equals sign following the DataItemName in the .reg file. For example, to delete the TestValue registry value from the following registry key:
HKEY_LOCAL_MACHINE\Software\Test
put a hyphen after the "TestValue"= in the .reg file. The following example has a .reg file that can perform this task.
HKEY_LOCAL_MACHINE\Software\Test
"TestValue"=-
To create the .reg file, use Regedit.exe to export the registry key that you want to delete, and then use Notepad to edit the .reg file and insert the hyphen.

Renaming Registry Keys and Values
To rename a key or value, delete the key or value, and then create a new key or value with the new name.

Distributing Registry Changes
You can send a .reg file to users in an e-mail message, put a .reg file on a network share and direct users to the network share to run it, or you can add a command to the users' logon scripts to automatically import the .reg file when they log on. When users run the .reg file, they receive the following messages:
Registry Editor
Are you sure you want to add the information in path of .reg file to the registry?
If the user clicks Yes, the user receives the following message:
Registry Editor
Information in path of .reg file has been successfully entered into the registry.
Regedit.exe supports a /s command-line switch to not display these messages. For example, to silently run the .reg file (with the /s switch) from a login script batch file, use the following syntax:
regedit.exe /s path of .reg file

03 June 2011

The iPhone 6 Features/Specifications



  1. Environmentally-friendly iPhone: iPhone 6 Could be green iPhone with graphene touchscreen while case will made up of naturally-sourced plastic, iPhone 6 would be best eco-friendly mobile phone so far.
  2. 4G Technology: The iPhone 6 which is expected to release in mid 2012, would be Apple’s very first 4G iPhone, will be made for both US carriers.
  3. 1GHz chip: Apple may introduce iOS 6 with the launching of iPhone 6. To meet the requirement of increased complexity and added features, chip will be much faster then iPhone’s previous models.The iPhone 6 may have 1GHz chip and could have dual process to make operation much fast.
  4. Reduced Thickness: To reduce the thickness Apple may use Graphene, atom-thick material, and it would be completely eco friendly.
  5. Improved Storage Capacity: The iPhone 6 might have storage capacity of 64 GB and 128 GB.
  6. Light Weight: To reduce the weight and for better battery life case could be made of the battery itself lithium ion polymer.
  7. Better Camera: It could have 10MP camera that makes photo quality even better.
  8. Near-Field Communication Chip: NFC (Near-Field Communication) chip, which is the latest hardware that allows contactless communication between a iPhone 6 and objects having NFC capabilities.
  9. Virtual Button: Existing button on iPhone could be replaced with a virtual on-screen button.
  10. Better Security: For Security purpose Apple may introduce thumb or face reorganization.
  11. Projector: Latest iPhone could have Pico projector so you can view pictures and movies from short distance.

Turn On Your PC With Your Android Phone Using Wake-On-LAN

Wouldn’t it be easier if your computer was ready for you as soon as you sat down? If you own an Android device, that’s possible thanks to a free app called PC Auto Waker. The setup can be a little complex, but the payoff makes it worthwhile.

The Quick & Easy Setup

android wake on lan app
Once you’ve downloaded PC Auto Waker off the Android marketplace, you’ll need to set it up so that it has the ability to communicate with your computer. It depends on 802.11 WiFi, but it’s not necessary for each computer to have WiFi hardware. The PC you’d like to wake only needs to be connected to a broadcasting WiFi router.
The basic setup consists of three steps. First, you’ll need to enter a name for the computer you’re going to wake. This name DOES NOT have to be the same as the computer’s network name. This is merely a way of identifying the computer in the app’s interface.
android wake on lan
After that, you’ll need to enter the MAC address of the target computer. Do a Windows Search for  ”cmd” to open your command line interface, then type ipconfig/all and press enter. The MAC address will appear as a string of six two-digit numbers labeled Physical Address.
Finally, you need to enter the SSID of the wireless network the target computer is connected to. It’s not necessary to enter any security information, regardless of whether the WiFi network is secured or not.
Once you’ve handled all of that, it’s time to see if you’re set! Place your computer into sleep or hibernate mode, and press the Wake All button in the PC Auto Waker app. If it works, great! If not, you have a few other settings to mess with.

The Nitty-Gritty Setup

If your computer did not wake it’s probably because the computer is not set up to accept a Wake-On-LAN packet. Fortunately, most computers can be configured so that they will accept it.
android wake on lan
First, restart your computer and enter BIOS. This is done by entering the correct key at boot, which should be indicated on the POST screen that appears before Windows beings loading. Once you’ve entered BIOS, look for the Wake-On-LAN setting and enable it. You’re likely to find this along with other settings related to power management or networking, but BIOS vary from computer to computer, so you’ll have to do some digging of your own.
android wake on lan app
Once you’ve enabled Wake-On-LAN in BIOS, you’ll need to make sure Windows is configured properly as well. Do a Windows Search for Device Manager and open it, then navigate down to Network Adapters. Right-click on the one you use to connect with the Internet and then click Properties. On the Power Management tab you will find three checkboxes. If they’re not already checked, do so.

Features of iPhone 5


Many of us are eagerly waiting to know the iPhone 5 release date. The apple iPhone 5 will be the sparkle in the future, although Apple has not revealed what it’ll entail, iPhone 5 launch date is expected to be  in July 2011.
Update(2nd June): Is iPhone 5 release date going to be revealed at WWDC 2011? WWDC will be full of surprises this year. Here is further details.
Update(17th May): Here is again a rumor about iPhone 5 launch date. In an exclusive talk with T3.com,  a sales representative from UK based retailer Phones 4U said that iPhone 5 release date is moved to 21st November 2011. Here is further details.
Update(6th May): According to latest news, an AT&T customer representative confirms that Apple has informed AT&T not to expect the iPhone 5 in June or July 2011. iPhone 5 launch date may be pushed to September. Check out AT&T representative words about iPhone 5 release date.
Update(13th April): Here is again rumor that iPhone 5 release date is scheduled to September 2011 or early 2012. According to press note by Avian Securities, Apple’s next gen iPhone 5 should go in production in July and will be available in September 2011 that leading us to predict that iPhone 5 will not hit stores till late 2011 or early 2012.
If you are equally excited as me for iPhone 5, then following features could be major reason to wait for stunning iPhone 5.
iPhone 5 Features  at a Glance:
  • Storage Capacity: Apple is offering 16 GB and 32GB iPhone since 2009, so apple is aware this it would be hard push iPhone 5 without having 64 GB of storage. iPhone 5’s lowest model will come with 32G of space and 64G of memory.
  • Signal Strength: Unlike iPhone 4, iPhone 5 is not having signal issue, as they are offering the strongest signal strength of any iPhone model ever even the best of any Smartphone to ever come to market.
  • Face Recognition: The new iPhone 5 will have Face Recognition for Security sake so that you don’t have to worry about other people stealing your phone and trying to use it.
  • Thickness: All three iPhone had thinner bodies than the previous model so the iPhone 5 can be the thinnest yet & much nicer overall body design of the phone.
  • Longer Battery Life: iPhone 5 will have Up to 14 Hours of Talk Time On The 3G and 7 Hours on the 4G.
  • Video Chat: Video Chat on a 4G network instead of a slow 3G one
  • A5 Dual core processor: For Outstanding Video Quality Apple May Introduce A5 Dual Core Process with iPhone 5
  • Screen: Shatter Resistant and Scratch Resistant Screen
  • Built In GPS: You’ll never get lost or have to download one of those stupid GPS apps.
  • Surprise: As the tradition of apple iPhone 5 will also unveil some surprise features.

Cool Websites and Tools


Amazon Discounts – Certain items on Amazon are often discounted in price. But users are normally not aware that they can filter search results through the discount. To help them easily do this, Amazon Discounts was created, an application that works on Google Chrome. You can install it from the Chrome Web Store and access it each time you open a new tab. Read more: Amazon Discounts: Easily Find Discounted Products On Amazon [Chrome]

Google Talk Guru – To perform a quick web task like getting currency exchange rates, game scores, and translating text, you often use the Google search engine by going to its webpage. Here to help you save time in doing this is Google’s new tool called Google Talk Guru, a new tool by Google that lets get answers quickly through Google Talk. Read more: Google Talk Guru: Get Answers Quickly Through GTalk
Zapd – The speed and ease of creating websites has evolved from knowing how to code HTML or any other web language, to using simple blog platforms such as Tumblr. Now we have Zapd, a cool service that takes another leap forward by letting people create websites with the flick of a finger. This iPhone app lets you customize beautiful, seamless, and mobile-friendly websites from your phone. Read more: Zapd: Create Instant Websites From Your Phone [iPhone]
Dropdo – If you are looking for a quick solution to host and share files, then you should check Dropdo. This tool lets you upload a file or paste a URL then preview the file in an quick-to-share interface. It is so easy to use that you will definitely have fun with it. Dropdo’s main strength is that it can host and preview various image and documents formats. Read more: Dropdo: Quick & Easy File Sharing With Preview
Supershirter – What can be a better symbol of your friendship then to wear a t-shirt with all of your friends’ pictures printed on it? SuperShirter is a new web app that allows you to create a t-shirt with Facebook profile photos of all your friends printed on it. To create the shirt simply log into your Facebook account and allow the app access. Read more: SuperShirter: Create & Order A Shirt With Facebook Profile Photos Of Your Friends

How To Appear Invisible (Offline) on Facebook Chat

Facebook offers a variety of communication options to its users. You can send someone a message, write on their wall or chat with them. You can access chat via the chat interface in the lower right corner.
Once you are online, you can view which of your friends are online and they will be able to see you online as well. Generally, Facebook only provides the options to go offline or online. Apart from this, the only other status available is ‘Idle’ which appears next to your name after a prolonged period of inactivity.
But how can you be invisible on Facebook to certain users? This is how.

You can also create lists to group your friends in Facebook. The lists appear in the chat interface as well. In addition, you can also create new lists to group your friends from the chat window. This is the functionality that we would be using to appear offline. For completeness, here is how you create a list from the chat interface.
  • Click on the Friend Lists label in the chat window. A dialog will pop up asking you for list name.
    how to be invisible on facebook
  • Key in a name for the list and hit Enter. This will create a list in your chat window.
  • When the list is empty, Facebook displays a message letting you know that you can drag and drop friends’ names to make them a part of the list. Go ahead, choose the ones that you want to put in a list and they will be added.
    facebook chat invisible


  • Lists, as you might expect, are persistent; meaning that they will be there just as you left them the last time you logged out of Facebook. You can create as many lists as you want to group your friends; and as I will show you, to appear offline to them.
For this purpose, we need at least one list in your chat window. Follow the steps detailed above to create a list, you can name your list anything that you want. I have named one of my lists as "invisible". As soon as the list is created, you will notice a "toggle button" next to the list name in your chat window.
facebook chat invisible
This button lets you appear online or offline to a list of friends depending upon its state. Coupled with the fact that you can easily drag and drop contacts in and out of a list, this is a good trick to appear online to a select list of friends and appear offline to others. Just drag the contacts you want to appear offline to into the "invisible" list and then click on the toggle button/switch next to "invisible" so that it switches to gray. You will now appear offline to contacts in the "invisible" list, while everyone else can see you online.
how to appear invisible on facebook

30 May 2011


sqlmap 0.9 Released – SQL Injection Tool

sqlmap 0.9After a year of hardcore development, sqlmap 0.9 is out!
Introduction:
sqlmap is an open source penetrationtesting tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a kick-ass detection engine, many niche features for the ultimatepenetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.
New Features:
  • Rewritten SQL injection detection engine
  • Support to directly connect to the database without passing via a SQL injection, -d switch
  • Added full support for both time-based blind SQL injection and error-based SQL injection techniques
  • Implemented support for SQLite 2 and 3
  • Implemented support for Firebird
  • Implemented support for Microsoft Access, Sybase and SAP MaxDB
  • Added support to tamper injection data with –tamper switch
  • Added automatic recognition of password hashes format and support to crack them with a dictionary-based attack
  • Added support to fetch unicode data
  • Added support to use persistent HTTP(s) connection for speed improvement, –keep-alive switch
  • Implemented several optimization switches to speed up the exploitation of SQL injections
  • Support to parse and test forms on target url, –forms switch
  • Added switches to brute-force tables names and columns names with a dictionary attack, –common-tables and –common-columns.

How to Block Friends Requests on Facebook?


Facebook, with over 300 million active users is the most successful social networking website. Some years ago when it was debuted, it succeeded to attract huge market because of its strict privacy options in contrast with options provided by other social networking websites. Block friends request was such as option that was liked by most of the people. But now users are getting really annoyed as Facebook has terminated that option. Now there are only two options for the users to choose from whom he or she can get friend requests. The options are “Everyone” and “Friends of Friends”.
There is no option in Facebook to change these settings. However there are two tricks which one can follow to avoid unneeded or undesired friends.
  • Make a group in your friend list and give any name to it like social barrier or crazy souls etc. Put all your unwanted friends in it and allow them to see your limited profile. You can even hide your photos and wall from them.
  • If you want to avoid friend request from some particular person, click on the Block Lists given at the bottom of the Privacy page. Click Edit Settings. In the given field of block users, type the name and email of the person you want to block. This will block the particular contact.
facebook block How to Block Friends Requests on Facebook?

Tags

29 May 2011

How to Send SMS through Email?


Text messaging is the most modern mean for quick communication. The good news is that it is possible to send SMS through email. Using your email, you can send message to the cellular phone. This can be really convenient in case you don’t have your cell phone with you. Using your email you can send any message to anyone. This is more reliable and more convenient way to communicate the message. Moreover, the method to send SMS through email is too simple.
Following is the list of email addresses of top six cellular phone services. Using these email addresses you can send any message to any number operated under these networks.
  • Virgin Mobile: phone_number@vmobl.com
  • T-Mobile: phone_number@tmomail.net
  • Sprint: phone_number@messaging.sprintpcs.com
  • Nextel: phone_number@messaging.nextel.com
  • Verizon: phone_number@vtext.com
  • Cingular: phone_number@cingularme.com
You just need to put the 10 digit cell number to which you want to send SMS in place of phone_number.

How to create offline backup of Gmail to Windows Outlook?


Follow the given steps to create offline backup of your Gmail account to Windows Outlook.
Set up the Gmail account to use POP:
  • Sign in to Gmail account and open inbox.
  • Tap the gear icon and select Mail Settings.
  • Select the forwarding and POP/IMAP tab.
  • Check the option of “Enable POP for all mail (even mail thats already been downloaded)“
  • Press the Save Changes button.
Set up Gmail POP account in Windows Outlook:
  • Launch Outlook
  • Click on File > Info > Account Settings.
  • Select the Email tab.
  • Click on New.
  • Check the option of “Manually configure server settings or additional server types”
  • Press Next.
  • Select Internet Email and tap the Next button.
  • Configure the account with the given information
1.    Account Type: POP3
2.    Incoming mail server: pop.gmail.com
3.    Outgoing mail server: smtp.gmail.com
  • In the fields of Email, Username and Password, give the details of your Gmail account.
  • Tap the More Settings button.
  • Select the tab of outgoing server and check the option of “Use the same settings as my incoming mail server.” and “My outgoing server (SMTP) requires authentication”
  • Press the tab of Advanced Settings. Click the options of “The incoming server port is: 995” and.   “This server requires an encrypted connection (SSL)“
  • Specify the TLS as outgoing encryption type.
  • Click OK and Next respectively.
Now the Outlook will save the .pst file of Gmail account in C:\Users\username\Documents\Outlook Files