Saturday, 27 September 2014
CRACK ANY ANDRIOD GAME(ROOT REQUIRED)
Freedom is an app which enables free in-app purchases provided by the google play store. One important point though, is that you must have your device rooted before using this app. If you don't know, what rooting is, then you must first search it, collect some information and then root your phone. You may contact us through our contact page if you are unsure about rooting your phone.
IPhone Spy Phone .. it is not!
The company recently launched Apple iPhone 6, iPhone 6 plus as Planning to purchase? Wait a minute. Where you are, if you know all things buy the phone. if you dont know then think once again. Apple phones have a function .. because of this function Your every movement will be recorded.Where are you, like, where they work, go often, which at times can be Journeys With them all.'frequent locations of' this feature?IPHONE confidentiality uploaded nearly a year ago. But for many people, knowing nothing about the five-layered under the dig it. Apple set the mapping of services to further the application of thought, and must accept the fact that there are still a lot of benefits. , which is the most terrible, shocking news that the British computer expert Professor Noel said Sharqi. Where we are, where shopping, working, where all the record ayipotayani tagutunnamo, causing a divorce lawyer, he said it would be easy to work with. A record of the details of the iPhone users will be known, in the case of a common man, but not a big problem, in the case of their vip's vvip's .. lives at risk, say it causes too much trouble. This will go wrong if it is misusedWednesday, 24 September 2014
Airplanes Can Be Hacked Via Android
A cyber security expert claims to have found a way to hack passenger jets through their in-flight entertainment systems.
Ruben Santamarta revealed his research at last month’s Black Hat conference, a major hacking convention held in Las Vegas.
He explained how vulnerabilities in airlines’ satellite communications system can be exploited by hackers. Santamarta claimed that it is possible to use the Wi-Fi signal or in-flight entertainment system to hack into avionics equipment, providing access to interfere with navigation or safety systems.
He said his finding “doesn’t mean we can crash an aircraft”, although it may be possible to feed pilots erroneous data, which could be extremely dangerous.
IOActive stated 100% of satellite communications devices can be abused, including those by the world’s leading SATCOM vendors. Santamarta said: “These devices are wide open. The goal of this talk is to help change that situation”.
Multiple backdoors, hardcoded log-in details and weak encryption algorithms were just some of the issues highlighted in the communications firmware. Used on air, sea and land, the systems’ vulnerabilities provide a threat to military personnel, emergency services, industries and media providers.
The research by Santamarta, a consultant with security firm IOActive, has not yet been tested in the real world. He reverse engineered the firmware in laboratory conditions. Manufacturers have dismissed his work, claiming the risks are “small” or that hackers would need direct access to carry out an attack.
A similar issue was noted at last year’s Hack In The Box security conference in Amsterdam. Hugo Teso, a security expert and commercial pilot, raised concerns that it’s possible to take control over an aircraft’s flight path by delivering attack messages through an Android app.
His findings were dismissed by the Federal Aviation Administration. Teso, however, said he was in contact with members of the airline industry and they were working on addressing the issues.
KALI LINUX FREE DOWNLOAD
Kali Linux is an advanced Penetration Testing and Security Auditing Linux distribution.
►Kali Linux Features:
Kali is a complete re-build of BackTrack Linux, adhering completely to Debian development standards. All-new infrastructure has been put in place, all tools were reviewed and packaged, and we use Git for our VCS.
→ More than 300 penetration testing tools:
After reviewing every tool that was included in BackTrack, we eliminated a great number of tools that either did not work or had other tools available that provided similar functionality.
→ Free and always will be:
Kali Linux, like its predecessor, is completely free and always will be. You will never, ever have to pay for Kali Linux.
→ Open source Git tree:
We are huge proponents of open source software and our development tree is available for all to see and all sources are available for those who wish to tweak and rebuild packages.
→ FHS compliant:
Kali has been developed to adhere to the Filesystem Hierarchy Standard, allowing all Linux users to easily locate binaries, support files, libraries, etc.
→ Vast wireless device support:
We have built Kali Linux to support as many wireless devices as we possibly can, allowing it to run properly on a wide variety of hardware and making it compatible with numerous USB and other wireless devices.
→ Custom kernel patched for injection:
As penetration testers, the development team often needs to do wireless assessments so our kernel has the latest injection patches included.
→ Secure development environment:
The Kali Linux team is made up of a small group of trusted individuals who can only commit packages and interact with the repositories while using multiple secure protocols.
→ GPG signed packages and repos:
All Kali packages are signed by each individual developer when they are built and committed and the repositories subsequently sign the packages as well.
→ Multi-language:
Although pentesting tools tend to be written in English, we have ensured that Kali has true multilingual support, allowing more users to operate in their native language and locate the tools they need for the job.
→ Completely customizable:
We completely understand that not everyone will agree with our design decisions so we have made it as easy as possible for our more adventurous users to customize Kali Linux to their liking, all the way down to the kernel.
→ ARMEL and ARMHF support:
Since ARM-based systems are becoming more and more prevalent and inexpensive, we knew that Kali’s ARM support would need to be as robust as we could manage, resulting in working installations for both ARMEL and ARMHF systems. Kali Linux has ARM repositories integrated with the mainline distribution so tools for ARM will be updated in conjunction with the rest of the distribution. Kali is currently available for the following ARM devices:
•rk3306 mk/ss808
•Raspberry Pi
•ODROID U2/X2
•Samsung Chromebook
•EfikaMX
•Beaglebone Black
•CuBox
•Galaxy Note 10.1
Kali is specifically tailored to penetration testing and therefore, all documentation on this site assumes prior knowledge of the Linux operating system.
DOWNLOAD LINK(32-BIT AND 64-BIT):
http://www.kali.org/downloads/
►Kali Linux Features:
Kali is a complete re-build of BackTrack Linux, adhering completely to Debian development standards. All-new infrastructure has been put in place, all tools were reviewed and packaged, and we use Git for our VCS.
→ More than 300 penetration testing tools:
After reviewing every tool that was included in BackTrack, we eliminated a great number of tools that either did not work or had other tools available that provided similar functionality.
→ Free and always will be:
Kali Linux, like its predecessor, is completely free and always will be. You will never, ever have to pay for Kali Linux.
→ Open source Git tree:
We are huge proponents of open source software and our development tree is available for all to see and all sources are available for those who wish to tweak and rebuild packages.
→ FHS compliant:
Kali has been developed to adhere to the Filesystem Hierarchy Standard, allowing all Linux users to easily locate binaries, support files, libraries, etc.
→ Vast wireless device support:
We have built Kali Linux to support as many wireless devices as we possibly can, allowing it to run properly on a wide variety of hardware and making it compatible with numerous USB and other wireless devices.
→ Custom kernel patched for injection:
As penetration testers, the development team often needs to do wireless assessments so our kernel has the latest injection patches included.
→ Secure development environment:
The Kali Linux team is made up of a small group of trusted individuals who can only commit packages and interact with the repositories while using multiple secure protocols.
→ GPG signed packages and repos:
All Kali packages are signed by each individual developer when they are built and committed and the repositories subsequently sign the packages as well.
→ Multi-language:
Although pentesting tools tend to be written in English, we have ensured that Kali has true multilingual support, allowing more users to operate in their native language and locate the tools they need for the job.
→ Completely customizable:
We completely understand that not everyone will agree with our design decisions so we have made it as easy as possible for our more adventurous users to customize Kali Linux to their liking, all the way down to the kernel.
→ ARMEL and ARMHF support:
Since ARM-based systems are becoming more and more prevalent and inexpensive, we knew that Kali’s ARM support would need to be as robust as we could manage, resulting in working installations for both ARMEL and ARMHF systems. Kali Linux has ARM repositories integrated with the mainline distribution so tools for ARM will be updated in conjunction with the rest of the distribution. Kali is currently available for the following ARM devices:
•rk3306 mk/ss808
•Raspberry Pi
•ODROID U2/X2
•Samsung Chromebook
•EfikaMX
•Beaglebone Black
•CuBox
•Galaxy Note 10.1
Kali is specifically tailored to penetration testing and therefore, all documentation on this site assumes prior knowledge of the Linux operating system.
DOWNLOAD LINK(32-BIT AND 64-BIT):
http://www.kali.org/downloads/
8 Spy Apps for Android
1.Mobile Spy
Mobile Spy is the next generation of smartphone spy software. Install this small program directly onto the compatible smartphone you wish to monitor to begin recording. Using the Internet capabilities of the phone, recorded activities, logs and GPS locations are quickly uploaded to your Mobile Spy account. To view the results, simply login to your secure account using any computer or mobile web browser. Logs are displayed by categories and sorted for easy browsing.
2.CPU Spy
This is a simple app to display the time the CPU spends in each frequency state. This can be a useful tool in diagnosing battery problems or tweaking your over-clock settings. It also displays the current kernel information.
3.Ear Spy
Ear Spy is a 'Super Spy' application which gives you super-hearing and the ability to eavesdrop on those around you. With some bluetooth headsets, you can eavesdrop from the next room. Ear Spy amplifies sound coming through your phone microphone straight to your earphones. To fine-tune the incoming signal, use the graphic audio equaliser.
4.Spy Phone Tracker
Keeps records of all incoming and outgoing phone calls which include phone number called or phone number of party calling the smartphone if information is not blocked by caller. It will also keep record of date and time calls were made and length of calls.
5.Spy Camera OS
Everyone at one time will want to capture an image without anyone noticing it, this open source application will give you an easy, fast and smart way doing it.
6.Monitor Call SMS Location
Remotely monitor SMS, Photo, Location, call-logs and much more. View your phone location in TiSPY web portal. Can find location even when GPS is disabled in device from you cellular information.
7.Mobistealth
Parental control app that can monitor text messages, call details and pictures. It can remotely view appointments, videos, web history and contacts.
8.Anti-Spy Mobile
Nowadays, anyone who has access to your cell phone can easily install a spyware software and monitor your calls, SMS messages, and even your location. Anti Spy Mobile is a free antispyware scanner that detects and removes spyware applications on your cell phone.
This is a simple app to display the time the CPU spends in each frequency state. This can be a useful tool in diagnosing battery problems or tweaking your over-clock settings. It also displays the current kernel information.
3.Ear Spy
Ear Spy is a 'Super Spy' application which gives you super-hearing and the ability to eavesdrop on those around you. With some bluetooth headsets, you can eavesdrop from the next room. Ear Spy amplifies sound coming through your phone microphone straight to your earphones. To fine-tune the incoming signal, use the graphic audio equaliser.
4.Spy Phone Tracker
Keeps records of all incoming and outgoing phone calls which include phone number called or phone number of party calling the smartphone if information is not blocked by caller. It will also keep record of date and time calls were made and length of calls.
5.Spy Camera OS
Everyone at one time will want to capture an image without anyone noticing it, this open source application will give you an easy, fast and smart way doing it.
6.Monitor Call SMS Location
Remotely monitor SMS, Photo, Location, call-logs and much more. View your phone location in TiSPY web portal. Can find location even when GPS is disabled in device from you cellular information.
7.Mobistealth
Parental control app that can monitor text messages, call details and pictures. It can remotely view appointments, videos, web history and contacts.
8.Anti-Spy Mobile
Nowadays, anyone who has access to your cell phone can easily install a spyware software and monitor your calls, SMS messages, and even your location. Anti Spy Mobile is a free antispyware scanner that detects and removes spyware applications on your cell phone.
Tuesday, 23 September 2014
How to enable Developer Options on Android 4.2/Android 4.3/Android 4.4:
- Go to Settings menu on your device.
- Go to About submenu. In some devices the About submenu will be under “More”/”General” submenu. On some other devices (mostly HTC devices you will have to goto Settings> About> Software Information> More)
- Now scroll to “Build Number” and tap it 7 times.
- After tapping 7 times you will see an alert saying “You are now a developer”/”Developer mode has been enabled”.
- Now if you go to your Settings menu, you will see the developer options submenu over there.
- Tap on the Developer options and then turn on USB Debugging.
So I hope I have helped you. Let me know if you have any doubts.
How to Know, Who Visited Our Facebook Profile
Everyone want to know who viewed my facebook profile. I have seen many people use third party tools to track but they doesn’t provide appropriate results but just spams on their Facebook Wall’s.
So Here in this post, I’m going to share a amazing facebook trick that will help you to find out your facebook profile visitor.
Read Bellow steps to know Facebook Profile Visitor Stats. Don’t want to read, watch bellow video.
- Login to your facebook account, and go to your timeline. ie. facebook.com/xyz
- Right click on your facebook timeline and hit “View page Source”.
- Now, you’ll be redirected to a new page with lots codes.
- Hold CTRL+F on your keyboard, a text box appears at the right corner, in that box, type- “InitialChatFriendsList” (Don’t include Quotes)
- Next to “InitialChatFriendsList”, you’ll see a list of numbers, these are the profile ID’s of people who visit your timeline.
- Now open new tab and go to “facebook.com” and paste the ID number after facebook.com/ . For example, if the ID is abcd, you have to put it as- facebook.com/abcd.
The first ID shows the one who visits profile more often while the last ID never visits your profile!
Watch Video For Easy Guidance
how to take screenshots frm ur android phone
Taking a screenshot on Android is easy, but the process isn't the same for every device. Before you learn how to take a screenshot you should check which version of Android your smartphone or tablet is running. If you have a relatively modern smartphone (post-2011), such as a Samsung Galaxy S3/S4/S5, HTC One, Sony Xperia Z/Z1/Z2 or Nexus 4/5, then you should be running at least Android HoneyComb, Ice Cream Sandwich, Jelly Bean or KitKat, which makes taking a screenshot a doddle.
The first and easiest way to take a screenshot on Android 4.0 and above is to simply press and hold your android phone's Power and Volume Down Button at the same time for 1 to 2 seconds. You should then hear a shutter noise and the screen will flash; there will also be a screenshot notification in the drop-down notification bar from which you can access your screenshot.
Note: This Method is Working On - Micromax, Some Samsung and Other Phones. Its also allow you to take a screenshot when you playing videos.
Note: This Method is Working On - Micromax, Some Samsung and Other Phones. Its also allow you to take a screenshot when you playing videos.
Method 2:
The second method is simple, too. This method is working on many samsung android mobiles. Press and hold your android phone's Home Button and Power Button at the same time for 1 to 2 seconds.
The second method is simple, too. This method is working on many samsung android mobiles. Press and hold your android phone's Home Button and Power Button at the same time for 1 to 2 seconds.
Method 3:
On some phones the 'Take a screenshot' option is available from the Power off menu. Press and hold the power button for 1- to 2 seconds until the power options screen appears. If the option is available select 'Take a Screenshot'. Don't worry, it will take a screenshot of whatever is behind this menu.
On some phones the 'Take a screenshot' option is available from the Power off menu. Press and hold the power button for 1- to 2 seconds until the power options screen appears. If the option is available select 'Take a Screenshot'. Don't worry, it will take a screenshot of whatever is behind this menu.
Method 4:
Use some third party android apps search and download in google play.
KILL MOSQUITOES WITH YOUR COMPUTER
Download these Anti Mosquito software to repel those annoying insects and be safer & greener
How does it work?Dragonflies are the mortal enemy for mosquitoes and in flight they generate sound frequencies (approximately) between 67 Hz and 45 Hz, depending on their sizes.
56 Hz is a good average number in between those frequencies. Your PC sound card and speakers will work well for this purpose. There are many sound and tone generator programs available on the internet for both the Mac and Windows PC. Setup your computer with the sound/tone generator program running and then play the sound through your computer speakers. The speakers can be aimed directionally for complete room coverage.
The sound level on the speakers should be adjusted so it is barely audible. This arrangement can be setup in a bedroom where you would like to have the window open but are worried about mosquitoes. One speaker should be fairly close to where you are sleeping.
Here are some links to more advanced tone generator software which can actually sweep between the 45 Hz and 67 Hz frequencies:
http://www.nch.com.au/tonegen/index.html
http://www.esseraudiosolutions.com/ttg.htm
u can also find anti mosquito android apps on google play just search it.
How does it work?Dragonflies are the mortal enemy for mosquitoes and in flight they generate sound frequencies (approximately) between 67 Hz and 45 Hz, depending on their sizes.
56 Hz is a good average number in between those frequencies. Your PC sound card and speakers will work well for this purpose. There are many sound and tone generator programs available on the internet for both the Mac and Windows PC. Setup your computer with the sound/tone generator program running and then play the sound through your computer speakers. The speakers can be aimed directionally for complete room coverage.
The sound level on the speakers should be adjusted so it is barely audible. This arrangement can be setup in a bedroom where you would like to have the window open but are worried about mosquitoes. One speaker should be fairly close to where you are sleeping.
Here are some links to more advanced tone generator software which can actually sweep between the 45 Hz and 67 Hz frequencies:
http://www.nch.com.au/tonegen/index.html
http://www.esseraudiosolutions.com/ttg.htm
u can also find anti mosquito android apps on google play just search it.
The ultimate pirate bay
The Pirate Bay is the world's largest torrent tracker site which handles requests from millions of users everyday and is in the top 100 most visited websites on the Internet. Generally, The Pirate Bay is famous for potentially hosting illegal contents on its website.
Despite years of persecution, it continues to disobey copyright laws worldwide. Even both the founders of The Pirate Bay (TPB) file exchange service were arrested by the authorities and are in prison, but their notorious pirated content exchange continues to receive millions of unique visitors daily. That’s really Strange!! But how??
Despite years of persecution, it continues to disobey copyright laws worldwide. Even both the founders of The Pirate Bay (TPB) file exchange service were arrested by the authorities and are in prison, but their notorious pirated content exchange continues to receive millions of unique visitors daily. That’s really Strange!! But how??
As guys from TorrentFreak mentioned: Recently, The Pirate Bay team has revealed how cloud technology made its service’s virtual servers truly secure to avoid police raids and detection.
According to the Pirate Bay team the current setup works pretty well. Although small issues pop up every now and then, the site has had no major downtime recently. If the police come knocking in the future the cloud servers can of course be disconnected. However, with the site’s current setup it would be fairly easy to continue operating from another provider in a relatively short time.
For now, the most vulnerable spot appears to be the site’s domain. Just last year the site burnt through five separate domain names due to takedown threats from registrars. But then again, this doesn’t appear to be much of a concern for TPB as the operators have dozens of alternative domain names standing by.
Subscribe to:
Comments (Atom)






