We participate in marketing programs, our editorial content is not influenced by any commissions. To find out more, please visit our Term and Conditions page.
We participate in marketing programs, our editorial content is not influenced by any commissions. To find out more, please visit our Term and Conditions page.
The new iTunes update, released Monday, adds support for iOS 6 beta and fixes several bugs.
Alongside new MacBooks, an iOS 6 preview, and a Mountain Lion ship date, Apple also issued a minor update to iTunes on Monday. iTunes 10.6.3 (for some reason Apple skipped over 10.6.2 in its updating) offers a number of bug fixes:
Addresses a problem where iTunes may become unresponsive when syncing a first-generation iPad that contains an iBooks textbook
Fixes a problem where photos synced to a device may appear in an unexpected order
Resolves an issue where iTunes may unexpectedly delete playlists created on a device
Fixes issues where iTunes may unexpectedly delete apps on a device
Analysis: “Strong” isn’t a detailed password rating; go for a quintillion possible combos and add a symbol.
Security breaches of mind-numbing size like those at LinkedIn and eHarmony.com set crypto– and security geeks to chattering about weak passwords and lazy users and the importance of non-alphanumeric characters to security. And insisting on a particular number of characters in a password is pointless security-fetish control freakishness. Nope. The number and type of characters make a big difference. How big? Adding a symbol eliminates the possibility of a straight dictionary attack (using, literally, words from a dictionary). Adding a symbol, especially an unusual one, makes it much harder to crack, even using rainbow tables (collections of alphanumeric combinations, only some of which include symbols).
How big is the difference in length and character?
Finding the right products to sell on Ebay is one of the most important factors that determine whether you will make a lot of money on Ebay or not. Deciding on the right products to sell is one of the main challenges which people starting an Ebay business face.
Finding the right products to sell on eBay: these can be items that you own that you no longer need, or you can buy products and sell them on eBay at higher prices to make a profit. Buying and selling merchandise for a profit on eBay is one of the best ways to make money online.
Before you decide on what to sell on eBay, you must do some research on the popular products for which there is good demand. By selling only high-quality products, you make it easy to make sales and earn profits with your eBay business.
You can look at Ebay and identify categories that have well-sought after products. You should sell products for which you can get a high number of bids, which indicate high demand. In order to succeed in selling products on Ebay, it is also a good idea that you select a handful of categories and that you focus on selling products in those categories. While looking at the popular categories, you must also assess the prices which the products in these categories sell for. This will give you an idea on what you should pay for the products you buy if you want to make some profits when you sell these products on Ebay.
You can increase the number of products you sell on Ebay by buying items at garage sales. Many elderly people have valuable items that they no longer need and that they offer foe sale. Buy only high quality products that you can buy at a cheap price and which you can sell for a high price on Ebay.
You can also create your own and sell them on Ebay. Depending on your interests and skills, you can write e-books on a wide range of topics and sell them on Ebay. You can earn a lot of profits by creating your own digital products because you do not have to pay anyone for these products. Using drop shipping can also give you a wide range of products to sell.
There are wholesalers that will sell you products and send them to the address that you tell them. This means that you do not have to carry any inventories. All you have to do when you complete an auction on Ebay is to direct your customers to the wholesaler’s website who will do all the shipping.
Use these tips to identify some products that you can sell on Ebay. All you have to do is to identify popular products, buy them at good process so that you make a profit when you sell these products on Ebay.
Widgets, also known as gadgets, are small tools or applications that can be added to a website or blog to enhance its content or functions, or to pull content and services from third-party websites. Widgets come in multiple forms, such as countdown tickers, photos, games, or interactive social media applications that allow you to chat. Some widgets in Blogger serve the purpose of enhancing your blog, such as listing your blog followers or allowing readers to subscribe to your blog content.
Here are steps on how to add a widget to Blogger.
Log in to your Blogger account with your username and password. Once you are logged in, make sure you are at your blogger’s dashboard; otherwise, click on the “Dashboard” link, which will take you to a list of your blogs.
2Access the Layout page of your blog. After selecting your blog, click on the “Design” link, which will take you to the Layout page. Click on the “Page Elements” link, then click on “Add a Gadget.”
3Choose a widget or gadget. A Blogger pop-up window will appear that lists all the gadgets available to you through Google Blogger. You may search for the name of a specific gadget, or you can browse through several categories, including Basic gadgets, Featured gadgets, Most Popular gadgets or More Gadgets, which are contributed by third-party developers for Blogger.
4Add the widget to Blogger. Once you find the widget you want to add, click on the blue plus sign symbol to add it to your blog’s layout. On the Layout screen, you will be able to click and drag the widget to where you want it to appear on your blog. Save your changes. Once you have added the widgets you want to your layout, click on the “Save” button at the bottom of the Layout screen to save your changes to Blogger.
5Add a custom widget to Blogger using the HTML and JavaScript widget. The HTML and JavaScript widget within Blogger is a blank widget that allows you to add or paste third-party functionality or other code to your blog. The HTML and JavaScript widget can be found by clicking on “Add a Gadget” from the Blogger Layout screen.
Watch Video
Tips
When adding Blogger widgets or customized widgets to your blog’s sidebar, take note of the pixel width size to make sure it fits and is visible within your sidebar. If you are using a Blogger template, you can adjust the sidebar width using the Template Designer on the Design tab to accommodate your widget.
Each time you use the “Add a Gadget” feature in Blogger, your new widget will always appear at the top of your layout above all your other widgets. You will be required to drag and drop your new widget to its desired location.
When adding a widget using the “Add a Gadget” tool within Blogger, you have the option to enter the URL for a gadget you want to add from outside of Blogger. Click on the link that says “Add Your Own” and type in the name of the website you want to add.
Warning
Adding a large number of widgets to your blog may potentially cause your blog pages to load slower, however this may vary depending on the browser being used and personal browser configurations.Credit to Wikihow.com
I just got my new netbook 2 weeks ago, but I was greatly disappointed with the fact that it came with Microsoft Windows 7 Starter edition only not Windows 7 Home Premium, Professional or Ultimate. As we all know, Windows 7 starter is the cheapest version of Windows 7 series and you can’t even change to your favorite background wallpaper or I would suggest a handicapped version of Windows 7. Eventually my search for the upgrade begin!
Initially I was thinking of formatting my whole hard disk and get a fresh new copy of Windows 7 Ultimate (cracked ver). But after reading some forums and comment by some of the users, I found out that we can actually upgrade our current version of Windows without going to the formatting path. Instead it could be easily upgraded to any version you prefer as easy as 1 2 3. Here go the step: Step 1. Enter “Anytime Upgrade” in the Start menu search,and select Windows Anytime Upgrade.
Step 2. Select “Enter an upgrade key” from the screen.
Step 3. Download Windows 7 Anytime Upgrade keygen at Hotfile and key in the key generated into the space and click “Next”.
Step 4. The key will be verified as a valid key, and Windows Anytime Upgrade will automatically choose the correct edition of Windows 7 based on your product key. Click Next when this is finished.
Step 5. Click “I accept” to accept the license agreement.
Step 6. Click “Upgrade” to initiate the upgrade process.
Step 7. Wait for the Windows 7 to be installed. As stated the upgrade will take about 10 minutes but it may vary according to your connection speed.
Step 8. Windows 7 will start installing all the feature into your computer. Well, you are done. You have successfully upgraded your Windows 7 Starter edition.
I have already discussed about a small but useful utility Asterisk Key to find hidden passwords in Internet Explorer. But scope of this application is not limited to web browsers only. It can also be used to reveal passwords hidden under asterisks from any windows applications like Google Talk, Yahoo Messenger etc. How many times have you forgotten your saved passwords? It happens with everyone. But don’t worry. Things can be a lot easier after you learn how to use this software. All you have to do is to launch the application for which the password has to be found along with Asterisk Key. Then click on “Recover” button in Asterisk Key. That’s it. You can see in the image below the password gets revealed along with the application name. It’s very simple. Now a forgotten password hidden under asterisks is just a click away. Also, you can easily hack others stored passwords as well. Enjoy!!! Download:- Asterisk Key Any comments are whole heartedly appreciated. P.S. Asterisk Key size is just 453 Kb and it does not work with Firefox. It’s up to you if you use if for hacking.
Yesterday, I was all set to pay my home Reliance phone bill online over the internet, when suddenly an awful thought crossed my mind. IS THIS RELIANCE WEBSITE REALLY SECURE? I WILL CERTAINLY NOT GO BY THE COMPANY BRAND NAME. HOW DO I VERIFY IT? Then after an hour research, I gain knowledge of how to recognize and avoid fraudulent websites. I am going to summarize that right here right now.
1.) What is Fraudulent website? Fake websites are an Internet problem that attempt to take advantage of unsuspecting users. They are websites that fraudulently impersonate or imitate the website of a legitimate company or financial institution. Whether you are searching for bank information or researching a paper, remember that the Internet is not regulated and that the website you are looking at may be fraudulent. The most common type of fraudulent website is the ‘Spoof’ website. The spoof website is often designed to look the like a legitimate website of a real institution (such as a bank). It will use the same graphics, composition and layout, and sometimes even the same URL in the text. Spoof websites are designed to fool the user into disclosing their personal information willingly. Before disclosing any personal information, you should attempt to verify that it is not a spoofed website. 2.) How to recognise fraudulent “spoof” websites? When trying to spot a fraudulent website, look for the following:
A real-world presence like an address, phone number and email contact.
By right-clicking a hyperlink and selecting ‘properties’ you can verify the link’s true destination.
Check for spelling and grammatical errors, and statements that are against common sense.
Be wary of sites that ask for personal details in full where they usually request fewer details ought to be sufficient.
3.) To check the security certificate Always verify the security certificate issued to a site before submitting any personal information. Before you submit any personal information, ensure that you are indeed on the website you intend to be on. In Internet Explorer, you can do this by checking the yellow lock icon (PADLOCK) on the status bar.
In Firefox, you can do this by checking the yellow lock icon (PADLOCK) on the address bar.
(This PADLOCK icon signifies that the website uses encryption to help protect any sensitive personal information- credit card number, Social Security number, payment details, passwords- that you enter) If the lock is closed, then the site uses encryption. Also, make sure that the Address bar shows “https://” at the beginning of the address URL and includes the website “domain name” in the address.
Double-click on the lock icon that should appear on the bottom right corner of your browser window.
Check the certificate to see that the name after Issued to: matches the website you are visiting.
If there is no lock icon, it means the webpage is not secure.
If the name does not match the issued to on the security certificate, then you may be on a spoofed site. You should proceed with caution.
4.) Use an online link checker You can check whether a website is fraudulent or not is by using an online URL checker. One checker is called LinkScanner.
LinkScanner will then report whether the site contains malware or not. 5.) Use a phishing filter Another tool that can help with recognizing fraudulent websites is with a phishing filter, which is designed to warn or block you from potentially harmful websites. It’s available in Windows Internet Explorer 7 for Windows XP Service Pack 2 (SP2), and Windows Vista. Firefox 2 or later also contains a built-in Phishing Protection feature that warns you of suspected Web forgeries, and offers to take you directly to a search page so you can find the real Web site you were looking for. You can test the Phishing Protection feature by browsing to this test site. Hope, these informations are helpful enough to prevent any one from getting trapped by these Fraudulent Websites. Next time you enter any secured zone, make sure it protects your privacy by following the above mentioned methods and steps. What security measures you take when you fall upon a suspicious webpage?
With so many cracking tools coming up to break windows password, it’s very difficult to protect your personal computer from unauthorized access. Even BIOS passwords is easy to crack. Nothing is secure and safe these days. Now no more worries, I just found a simple trick by which you can easily protect your windows from unwanted usage. This really cool and hidden feature of Windows lets you maintain your privacy of data on your computer even if you are not around.
What it does is that it adds an extra secret key along with your windows password. So when your computer is started, it first asks for the secret key and then the windows password. Windows password can easily be hacked but you cannot get around this secret key which we will be going to store in a removable devices such as USB drive etc. Here goes the step-by-step procedure for achieving an extra level of protection. 1.) Open run dialog box. 2.) Type SYSKEY and click OK. 3.) Check the Encryption Enabled radio button. 4.) Click on Update.
5.) Under System Generated Password choose Store Startup Key on Floppy Disk. (Now many of you must be thinking that this tutorial is waste. Where in the hell should be get Floppy no? Don’t worry; you don’t require any Floppies for this. Just insert your USB device and change its Drive Letter to A:. I am using my IPOD shuffle for this purpose. You can use your Pen Drive. Read further to learn how to change Drive Letters.) 6.) After you have inserted your USB device, right click My Computer -> Manage -> Storage -> Disk Management. 7.) Now you will see all storage volumes there. Choose your USB volume, right click on it and select option Change Drive Letters and Paths…
8.) From the long list of available drive letters choose A:. 9.) Now return back to SYSKEY, choose Startup Key on Floppy Disk and click OK.
10.) No 10th Step. You are done. The next time you start your computer, you’ll have to insert this USB device when asked and then only you can login to your account. You can also see a registry file named StartKey stored in your USB device. I am still looking for the possible ways to login to my personal computer just in case if my IPOD (USB device) is broken or unavailable. If you have idea to break this protection, please share that with us. It will be useful as well.
Many times we need to unblock certain websites to gain access to some important stuffs. We all know many ways to do that. But how about actually learning to block one? Have you even been in a situation when you have to block certain websites from your computer for any reason? Well, I am not sure about any body else but certainly I have been many times in such situation. Parents may also want to prevent access to certain websites on their computer so that children can’t get to them from internet. So what’s the solution? Aaaah… It’s very simple.
1.) Open “Run” from the start menu (or press WinKey + r). Just copy paste the following path and hit ENTER. notepad %windir%system32driversetchosts
Alternately, go to C:WindowsSystem32DriversEtc and find the file “hosts”. Open that file in Notepad. 2.) When this hosts file is opened in Notepad, at the end of the file you will see something like “127.0.0.1 localhost”. 3.) Under “127.0.0.1 localhost” just add another website URL that you want to block. For Example:- 127.0.0.1 localhost 127.0.0.2 www.rakshitk.com 127.0.0.3 www.whoismadhur.com 4.) Make sure every time you add another website, the last digit of the address 127.0.0.x should not be the same.
5.) Save the file and exit. So, here you go. Restart your browser if it is opened and changes will take place immediately. The good thing is that no message, no pop ups nothing will be displayed when someone tries to open a blocked website. Your browser will just fail to open those websites without any error messages.
Each one of us must have tried many softwares for locking their private files and folders. Few must have bought a licensed copy of one while others are better of using a free version. However, you can achieve the same level of privacy without any software. This tutorial will make things crystal clear of what I am trying to say. Few months back, Madhur had written a similar article on locking folders without any software but this article is a step forward to what he has described at that time. The trick which I am going to tell here will make a virtual folder by the name “Locker” where you can put as many files and folders you want and after locking, this “Locker” folder will disappear.
Here is step-by-step guide to achieve that. 1. Download or Copy the following text file which contains the program code:- Text File -> LockCode.txt 2. Paste the above code in notepad or create a new text document by right clicking on your desktop and selecting New->Text Document. 3. Replace “type your password here” with your password in the code you just pasted on the notepad. DON’T FORGET THIS.
4. Save the above file as BATCH file (by extension .bat). Choose any filename but make sure that it ends with .bat (Open My Computer. Goto Tools -> Folder Options -> View. Scroll down and UNCHECK Hide extensions for known file types. Now rename your file with .bat extension) 5. Now you can see a MS-DOS BATCH file you just created. See the picture below:-
6. Double click on it to create a new folder named “Locker“. 7. Now put all files and folders you want to protect in to this new folder “Locker“. 8. Double click that BATCH file again to lock the folder “Locker”. It will disappear as soon as it gets locked. 9. If you want to unlock that folder, double click the BATCH file again. You will be prompted for the password, enter the correct password and that folder “Locker” will then be appear which is easily accessible by you. That’s it. You are done. You have just learnt how to protect your important files and folders without any software. Isn’t it amazing? What’s your take on this? Do you know any other technique? Update:- As pointed out my Mayank in the comment section, the safety of that BATCH file is also very important. So it’s better that you store it in some other directory or completely remove it. Then later on when you want to unblock your files and folder, just copy that batch file to same directory as your “Locker” folder and follow the above mentioned process.
Your Firefox address bar can not only be used for opening websites but also for searching as well. Yes, you can configure the Firefox address bar with various search engines like Google, Yahoo, Microsoft’s Live, and Wikipedia etc. By default, whenever you type anything in address bar and hit enter or press the GO button, Firefox checks whether the entered string is valid address or not. If it’s a valid address Firefox tries to load corresponding site for you. Now, if the entered string is an invalid URL, it will be submitted to Google Search and search results are returned.
What if you want to change the Default search engine? Of course, Google is everybody’s first choice search but having said that it depends on person to person. Or, if you have Google Toolbar (that provides inbuilt google search box) installed then you may want to configure the address bar with some other Search Engine. The following steps will guide you how to configure your Firefox address bar with Search Engines of your choice. 1- Open Mozilla Firefox and type in the address bar about:config. 2- Next type keyword.URL in the Filter box which is appeared after the first step is completed successfully. As you type the above text, the long list will be trimmed down to one line. (You will see only 1 entry (keyword.URL) under the Preference Name section) 3- Now right click that single entry and select modify. A box will appear. Refer the image given below. 4- Choose your Search Engine type and accordingly enter the string value of various Search Engines given below. 5- There is no 5th step. Enjoy!!!
List of Various Search Engines is as follows:- (Copy any of the below strings and paste it into the box that appear in STEP 3 above) Default Google Search
There is a great little instant messaging utility, Pidgin that helps to find who has blocked you in Google Talk. If you not sure how to configure Pidgin with Google Talk, I advice you to first visit this page. Ok, now when you are aware of how to configure Pidgin to work with Google Talk, I’ll guide how to make smart use of Pidgin to identify who has blocked you on Google Talk. It’s very simple. Just follow the steps:-
1- Log in to your Gmail account on Pidgin. 2- Go to “Buddies” -> “Show Offline Buddies“. (A person who has blocked you must be showing offline to you. So you need to make all offline friends visible) 3- Now all your contacts are visible to you. Pick any one of those.
4- Right Click on your chosen contact name and select “Get Info“.
It will show you the brief information of your contact. Now, if any of your contact has blocked you on Google Talk, you will not be able to see his/her profile. 6- Select a contact who you think may have blocked you. Again, Right Click on his/her name and select “Get Info“. You will not see anything. Not even the contact’s name.
This goes to show that this particular contact has blocked you on Google Talk and don’t want to talk to you and so it appears to be offline always. Hope, you like this article. This is the only way I could able to find out to determine who has blocked you on Google Talk. What’s your comment on this?
Few days back, a friend of mine has accidently deleted quite a few recent pics from my Nokia N97 Memory Card and she was feeling pretty much disgraced about that. We recently went for an excellent trip, captured all those fun moments in the camera and yes if those memories get deleted, everyone will feel disgusted about that. It is at that time, I googled and finally found a recovery software that not only recovered ALL THE PICTURES from my memory card but also it was absolutely FREE to use as well. Amazing right?
PC Inspector Smart Recovery is just the right software that can do wonders for you. Believe me, it works perfectly fine although takes a bit of time (when I say “bit of time” that means hours and hours…) to recover all those accidently deleted pictures and files. The software is very easy to use and even if you are not a computer savvy person, you can use it without much discomfort. PC INSPECTOR Smart Recovery works with Flash Card™, Smart Media™, SONY Memory Stick™, IBM™ Micro Drive, Multimedia Card, Secure Digital Card or any other data carrier for Digital Cameras. I have tried this software on my Phone Memory Card as well and it recovered all the pictures that got accidently deleted. If you have unintentionally deleted or formatted pictures, videos or sound files on your data carrier or have pulled it out during a write operation, no matter – PC INSPECTOR smart recovery can easily, quickly and absolutely reliably reconstruct the lost data. It supports the following picture formats: .jpg, .amr, .tif, .bmp, .gif, Canon .crw , Fuji .raf , RICOH .raw, Olympus .orf (E-XX), Olympus .orf (C5050), Nokia 3gp, Kodak .dcr, Minolta .mrw, Nikon .nef (D1H/D1X), Nikon .nef (D2H/D2X), Nikon .nef (E5000/E5700), Sigma – Foveon .x3f, mp4, QuickTime .mov (Konica Minolta). Video files in .avi, QuickTime .mov format and audio files in .wav, .dss format can also be recovered. A Word of Caution – If you have deleted the files by mistake and want to recover most of those, PLEASE STOP TAKING ANY MORE PICTURES from your digital camera or mobile phone. That’s because the more you write new data on your memory card, the chances of recovering old and deleted data becomes less. Please let us know if you face any problem in using this software or if you are aware of any other better software for recovering lost data from memory cards, please share that with us in Comments Section below. Also, if you are the one among many who got benefited by this great little utility, please share your thoughts as well. Awaiting reply… Download it for FREE(File Size – 5.8 MB)
After a great success of my previous article about setting background images to the USB drives, here comes another USB related tutorial which I am sure many would love to try. So many times we encounter a situation when data once deleted from a USB drives cannot be recovered back simply because the deleted data does not move into the Recycle Bin instead it is deleted permanently.
But don’t worry I got a solution to this problem. If we can mount our USBs to a windows folder then not only all deleted data can be recovered easily but also it will be lot easy to organize multiple USB drives. Just follow the simple steps described below:-
Create a folder named “USB DRIVES” in any of windows partition (Desktop is the best option).
1.) Next create any number of subfolders inside the main folder “USB DRIVES” and give them proper names. Suppose you want to mount two of your USB drives, so it advisable to create two subfolders with the exact name of your USB drives. 3.) Press Win+R to open the Run window or alternatively go to Start->Run. 4.) Type in the location field diskmgmt.msc and hit enter to open Disk Management.
5.) Select your USB drive, right click on it and select Change Drive Letter and Paths… from the menu. 6.) Click on the Add button, select Mount into the following empty NTFS folder and click on browse. Now navigate to the subfolder that you want to assign the USB drive to and confirm the process. That’s it you are done.
From now on, the USB drive will be accessible from the folder “USB DRIVES” as well when it is connected to the computer. Hope you liked the tutorial. Any feedback is whole heartedly appreciated. P.S. – When moving data around the mounted USB in folders setup will completely move the data, not copy it to your USB device. Make sure to copy and paste if you want source data to remain on your PC.
USB (Universal Serial Bus) is an industry standard that allows data exchange and power delivery between many types of electronics. Wikipedia
I suppose we all have tried to give background images to our desktop folders. How about setting the same background to our USB devices (Pen drive, Portable Hard Disks etc.) as well? That background image will be seen on every computer you plug in that USB device. It’s really a 3 step process. Let’s begin:-
Steps in changing the background of your USB device:
The inrtoduction of internet to the modern age has really made this age a real “information and technology age”. An age where someone can simply find answers to most problem without lifting a foot.
Since answers do not show up without being asked search engines plays major role in every person who is searching for answers on the internet hence putting webmasters and bloggers alike in good position to provide those answers.
Fortunately for this generation, hundreds of websites are been added to the web everyday, making it difficult for search engines to locate and index all this pages in a short period of time. However, you can help the three major search engines locate and index your website quicker by following the links below.
You just created a new website, business or brand? It is time to create awareness. The web over the years have been somewhat populated with various contents from different website and business owners, therefore keeping young bloggers and business starters off the spotlight, many of the well-to-do starters go as far as even paying internet marketers web scammers for advert and social media followers/share and end up profiting scam.
My Experience?
You can actually get upto 500 hits per day, 1000 twitter followers, more than 1000 facebook shares to any website/post of your choice, over 50 facebook likes for all your blog/website post (you will need to verify your site to activate this feature), maybe 50 shares on tumblr and stumbleupon (for some reason people seems not to be using this feature often) and Page Rank 4 backlink. This is just too good to believe, but however, it is far from being exaggerated, the above stats is a friends testimony but I do have a testimony of my own: Started using linkcollider yesterday (10th May, 2013) and I already had a total of 19 Tweets 8 Facebook Shares 3 Tumblr Posts 257 Web Traffic. I had to disable the web traffic and I haven’t yet enabled the Facebook Like, Pinterest Followers, Twitter Followers and Youtube Subscribe. Below contains the screen shot of my overall stats in one day.
Getting Started Getting started is a breeze! All you need to do is to create a free account on LinkCollider and add your website details. Free Offers Buy a cheap domain name even cheaper click here. Grab bing ads coupon code click here.
Was this post helpful to you? Do give your feedback in the comments section below. And remember: please keep your comments relevant, and avoid spamming and/or promoting your own blog/business. Thank you 🙂
The West African Certificate Examination Council (WAEC) is responsible for conducting the annual West African Senior School Certificate Examination (WASSCE) for students in senior secondary school (SSS) or senior high school (SHS). The examination is written in five English-speaking West African countries, Nigeria, Ghana, Sierra Leone, The Gambia, and Liberia.
Excruciating suspense follows the end of each WAEC examination. Even after the results are out, it’s not always a welcome idea to rush to the next cyber cafe to check your WAEC result. This guide is provided to help you check your WAEC result from the comfort of your bed using your mobile phone.
Before we proceed, you should consider the types of WAEC examinations below to avoid mismatching dates.
Types of WASSCE IN WAEC
The examination is written in two different batch.
The WASSCE (November/December): Also known as the G.C.E. by its old name (General Certificate Examinations), students from government and private schools can take this exam. Uniforms are not needed, but the students must obey other rules. This exam is only taken in the fall season (November/December), and the grades are available by December.
The WASSCE (May/June): Also known as the S.S.C.E. by its old name (Senior School Certificate Examinations), this exam is ideally made for students who go to government schools. Students from private schools, that are well known in the country, can only sit for this exam in any government schools. They must also wear a type of uniforms as the teachers want them to wear. This exam is only taken in the spring season, and the grades are usually available on or before August of the same year.
Depending on the type of WASSCE examination you wrote, your grades should be available by January or July for November/December and May/June batch respectively.
How to check WAEC result on phone
Time needed: 1 minute
To check your WAEC result through SMS simply, send an SMS in the format below:
Open your SMS/Messaging App
Open the SMS application on your mobile phone.
Create a new message
Create a new message, like you would send a message to a friend.
Enter your WAEC info
In the new SMS window, type WAEC*ExamNo*PIN*ExamYear
Send SMS
Send the SMS to the short-code 32327 (MTN, Airtel & Glo subscribers). For example: WAEC*4250101001*123456789012*2007
Ensure you adhere strictly to the format above . There should be no space in the message. Wait for your result to be delivered to your phone via SMS. (SMS cost N30 only)
Frequently Asked Questions (FAQ)
What is an e-PIN and where do I find it?
The e-PIN stands for Electronic Personal Identification Number. In WAECDIRECT, it is a unique 10-digit or 12-digit number that is required to access the service. The service enables direct access to a candidate’s results via multiple channels. The e-PIN is found in a valid WAEC Voucher.
Where can I buy a valid WAEC Voucher?
An Electronic PIN may be purchased at the National office of WAEC and at any of its Zonal and Branch Offices across Nigeria. From time to time it may become available at any other outlets so designated by WAEC. The reviewed price for the e-PIN is now N700.
Is there a limit to a number of times I can check my WAEC result?
No, you can check your WAEC result as many times as you like, however, you may only check your result up to a maximum of 5 (five) times with the use of 1 (one) e-PIN. In order to check further after exhausting the allowed 5 (five) times, you will need to purchase another e-PIN which will entitle you to another 5 (five) result checks.
I have a problem in checking my WAEC result Please help?
Kindly send the following details to [email protected] for verification and assistance – Error message displayed – Your examination number – Type of Exam – Year of Exam. – Visit http://www.waecdirect.org/ or the nearest WAEC office for Further enquirers
WASSCE Grades and Meaning
The grades below are given on the WASSCE certificates for the students who finished their exams. They also depend on how well the students did in their exams.
Grade
Meaning
A1
Excellent
B2
Very good
B3
Good
C4
Credit
C5
Credit
C6
Credit
D7
Pass
E8
Pass
F9
Fail
You may only use one e-PIN voucher to check one result. To check another result of interest, you will require a new e-PIN voucher. If you misuse a e-PIN voucher by attempting to check another result different from the first one checked, you will be penalised as having used the e-PIN, and will be presented with the appropriate error message.