Posts

Showing posts from December, 2015
TOP MYSTERIOUS SECURITY CODES FOR ANDROID Secret Hack codes are those codes which are usually hidden from users for any misuse and exploit. As we all know android is very new platform and thus very few hack codes of androids are there on internet. Today i am sharing all the hack codes of androids cellphones that i know. And i surely hope you can’t find codes better than that. So friends let’s hack and explore our android Phones. I have tested these codes on my Phone Samsung Galaxy having an Android OS version 2.2. I am sure these will work on all previous versions. 1. Complete Information About your Phone *#*#4636#*#* This code can be used to get some interesting information about your phone and battery. It shows following 4 menus on screen: Phone information Battery information ( How to maximize or boost Battery life in android phones) Battery history Usage statistics 2. Factory data reset *#*#7780#*#* This code can be used for a factory data reset. It’ll rem
Image
SOFTWARE CRACKING PROCESS If you've ever wondered how software pirates can take software and crack it time and time again, even with security in place, this small series is for you. Even with today's most advanced methods of defeating piracy in place, it is still relatively easy to crack almost any program in the world. This is mainly due to computer processes' ability to be completely manipulated by an assembly debugger. Using this, you can completely bypass the registration process by making it skip the application's key code verification process without using a valid key. This works because assembly allows you to speak directly to the processor and force a skip over the registration process. Requirements Windows (for examples only, debuggers exist across platforms) A debugger installed: IDA, ollydbg , etc. (ollydbg will be used in examples) Step 1 Test the Program First, run the program that you are attempting to reverse engineer and try to
Image
SNIFFING OVER SOCIAL ACCOUNTS , WITH FACENIFF In this article, I'll show you how to easily "hack" Facebook, Twitter, YouTube, and any number of similar account types with an Android app called FaceNiff . FaceNiff allows you to sniff and intercept web session profiles over the Wi-Fi that your mobile device is connected to. Basically, it's as simple as connecting to a Wi-Fi network, opening the app, starting the sniffer, and opening the profiles in your browser. The newest release even lets you select which accounts to sniff for and reveals MAC/wireless information. Note: This ONLY works for rooted phones!  What Is Sniffing? "Sniffing" is where a malicious device connected to a network intercepts and logs packets being transferred between an access point and victim's device. The packets can then be used to impersonate or spoof the victim's device, allowing the malicious device to access private information. FaceNiff incorp
Image
CHATTING WITHOUT INTERNET IN YOUR ANDROID PHONES & IPHONE Yes, you read it right.  This Android and iOS-enabled App uses Open Garden’s Nesh networking technology and Apple’s Multipeer Connectivity framework — essentially a peer-to-peer feature that lets you share messages with other App users nearby. “ FireChat allows the device to connect directly to others nearby using Bluetooth, peer-to-peer wi-fi or traditional wi-fi networks so you do not actually need a data connection,” Micha Benoliel, CEO of Open Garden firm that developed the App was quoted as saying. The Apple’s Multipeer Connectivity APIs can be used for everything from collaborative editing and file sharing, to multiplayer gaming and sensor aggregation, said a report in wired.com.  How does it function?  The App browses for other users nearby while simultaneously broadcasting to peers that it is available to connect to.  This allows you to be invited into a “session” with multiple users.Once a sess
Image
TOP NETWORKING TASKS , ONE CAN ACHIEVE BY THEIR ANDROID PHONE The cellular telephone has gone from being simply one more specialized gadget to a pocketable PC of sorts. With more power and components being added to the gadget, there's a ton of usefulness that the gadget brings to the table. The conceivable outcomes are to some degree unfathomable, however a layman is really uninformed of a large number of these. We're taking a gander at some of these things that we can do with our Android cell phones utilizing a couple of applications. Obviously, remember that your telephone needs some of these component or OS redesigns set up. Every one of the applications we've specified are free for download. Use your phone as a touchpad, remote control One of the interesting ways to make use of your Android phone when you’re at home is to use it as a remote control for your PC. Apps such as RemoteDroid and gPad allow users to move their finger on the touchscreen
Image
STEPS TO CREATE AN ANONYMOUS WEBSITE Tor is an anonymous, secure network that allows anyone to access websites with anonymity . People normally use Tor to access normal websites, but they don’t have to. If you want to set up your own anonymous website, you can create a hidden service Tor site. Your hidden service website runs entirely within Tor, so no one will know who created and runs the website. Only people using Tor can access it, though. Hidden service Tor sites are ideal for anyone who wants to set up a website anonymously, such as political activists in repressive countries . Not all hidden services have to be websites. You could create an SSH server , IRC server , or any other type of server and offer it as a hidden service on Tor. This tutorial will focus on setting up a hidden Tor site using the Savant web server – which Tor recommends – on Windows. The steps can also be applied to other operating systems and web servers. Step 1: Install Tor To get
Image
INSTALLING TURBO C & C++ IN ANDROID MOBILES As you are well aware that Turbo C C++ is a programming language which is usually executable in windows operating system. Now with the Android getting more widespread, people want to make C programmes on their Android-run smart devices as well. It is with Turbo C in Android this issue in mind, we have made several experiments and have now come out with procedures that would successfully execute and run Turbo C C++ on your devices with Android OS. Please peruse the steps given in the following lines and also the relevant screenshots for getting an understanding how this seemingly difficult task can be executed by you in your Android device with ease and confidence. Procedure To Install Turbo C In Android 1.First of all download this zip file - Turbo_c_for_android_WWP.zip. 2.Now download and install Easy Unrar Lite from playstore. 3.Later open Easy Unrar app and go to download folder in sdcard. 4.Select the
TOP 10 POPULAR TOORENT SITES -- 2015 Torrent websites are file sharing websites which uses a peer-to-peer file sharing (P2P) communications protocol in which every user hosts the file he/she has downloaded. This, thus with more seeds the file can be downloaded with more ease and higher speed. Here are top 10 most popular torrent sites for free movie , games downloads based on traffic and popularity , the ranking is based on Alexa Global ranking and traffic estimations per month from traffic estimate  . We will keep updating the ranking and URL of these torrent websites on weekly basic, it happens that these websites time to time has to migrate to new domain because of copyrights issues. Some of these sites may not be accessible from your location or country facing a ISP level ban , users are suggested to use VPN in that case Top 10 Most Popular Torrent Websites of 2015 1.  ThePirateBay   |  Top 10 Most Popular Torrent Websites of 2015 Estimated Monthly Traffic:
TOP VPN SERVICE PROVIDER    VPN is economical as it is much cheaper when compared to private networks, it provides flexibility, not only that VPN users can maintain their anonymity as well as protect themselves from being snooped. VPN works on 4 protocols: IP security (IPSec) : IPSec utilizes two methods to encrypt its user’s data :a) transport mode or b) tunneling mode. Transport mode means encryption of  message within the data packet also termed as Payload. Tunneling mode means encryption of the entire data packet. Point-To-Point Tunneling Protocol (PPTP):  This is the most widely used protocol; PPTP uses the tunneling method wherein PPTP stores data within the PPP packets which are further stored inside the IP packets which are transported to their destination. Layer 2 Tunneling Protocol (L2TP):  It works on two  major features: L2TP Access Concentrator (LAC) and  L2TP Network Server (LNS). LAC: this is a device which terminates the call and LNS: this authentic
Image
ACCESSING DEEP WEB, & DIGGING IT DEEPER HOW TO ACCESS THE DEEP WEB First: the hot sheets. Subreddit forums for DeepWeb , onions , and Tor are the way to go in terms of gathering a backgrounder for entry points into DarkNet. Unsurprisingly though, much of the information currently on the surface Internet about the actual underbelly of the web is outdated. Ever since Silk Road’s takedown last year , the Under-web has been changing. To get into the Deep Web these days, you first have to download the Tor add-on for Firefox. By downloading the Tor Browser Bundle from the Tor Project you are securing your anonymity to browse, which is the main draw for using Tor. Once you have downloaded the browser bundle, Tor builds a circuit of encrypted connections through a randomized relay. In layman’s terms that means that your online activity is covered as Tor randomly pings your IP address from one place to the other, making whatever you do less traceable. Multiple Reddi
Image
WORKING OF LIFI (VIDEO REPORT)
THE INTERNET ERA, BEFORE FACEBOOK Once upon a time Internet was ruled by AltaVista, GeoCities, Lycos, Netscape & Other Giants Of Web 1.0, do you even remember them? The Internet phase before Facebook and Google was dominated by the giants of Web 1.0 like AltaVista, Geocities, Lycos, Netscape to name a few; however with the onset of Yahoo, Facebook and Google these giants seem to have been lost……or are they still there, any idea as to what happened to these giants? In this article we will just take a look at the fate of these giants in the last 20 years of the web history wherein some of the then biggest websites have either merged with the biggest websites of today or have been shut down and some may be still continuing quietly. Yahoo Yahoo Inc and styled as Yahoo! was founded in January 1994 and incorporated in March 1995. Globally known for its web portal and its famous Yahoo! Search engine. From 1997 till 1997 Yahoo remained among the top 3 most visited sit
Image
TOP DATA RECOVERY TOOLS Undelete 360 : With looks of a typical Office application the Undelete 360 is built on a fast yet efficient algorithm which enables the user to undelete files from a variety of devices such as Digital cameras, USB’s etc. It includes a data-wiping tool, a Hex Viewer along with the ability to preview files before recovery. It does a great job in recovering recently deleted files as compared to other free data recovery software and is also able to recover files of a wide variety of types such as DOC, HTML, AVI, MP3, JPEG, JPG, PNG, GIF, etc. Scanning speed needs major improvement and it also lags out its competition in terms of recovering data. Pandora Recovery : Pandora recovery is one of the most reliable and effective free data recovery software out there. With the ability to recover deleted files from NTFS and FAT-formatted volumes, preview deleted files of certain types (image and text files) without performing recovery, surface scan