Monday, December 14, 2015

What is a web application?

A web application (website) is an application based on the client-server model. The server provides the database access and the business logic. It is hosted on a web server. The client application runs on the client web browser. Web applications are usually written in languages such as Java, C# and VB.Net, PHP, ColdFusion Markup Language etc. the database engines used in web applications include MySQL, MS SQL Server, PostgreSQL, SQLite etc.

Most web applications are hosted on public servers accessible via the internet. This makes them vulnerable to attacks due to easy accessibility. The following are common web application threats.

1.SQL Injection – the goal of this threat could be to bypass login algorithms, sabotage the data etc.
2.Denial of Service Attacks– the goal of this threat could be to deny legitimate users access to the resource
3.Cross Site Scripting XSS– the goal of this threat could be to inject code that can be executed on the client side browser.
4.Cookie/Session Poisoning– the goal of this threat is to modify cookies/session data by an attacker to gain unauthorized access.
Form tempering– the goal of this threat is to modify form data such as prices in e-commerce applications so that the attacker can get items at reduced prices.
5.Code Injection – the goal of this threat is to inject code such as PHP, python etc that can be executed on the server. The code can install backdoors, reveal sensitive information etc.
6.Defacement– the goal of this threat is to modify the page been displayed on a website and redirecting all page requests to a single page that contains the attacker’s message.

Sunday, December 13, 2015

Make a website or blog Speaks

Today in this post I'll tell you how can you make your website or blog speak. If you are busy and have no time to read blog then this add on for you to make text highlights to speak in Mp3 format.

FoxVox will speak any text you highlight in a web page. FoxVox can also create audiobooks in mp3, ogg, and wav formats. You can now easily turn your blogs and articles into podcasts. FoxVox now supports speech in many different languages.

Reqirement:
Mozilla Firefox

FoxVox

FoxVox will speak any text you highlight in a web page. FoxVox can create audio-books in mp3, ogg, and wav formats. You can now easily turn your blogs and articles into podcasts. FoxVox is ideal for having blogs, email, news articles, and ebooks read to you while you surf the web or do other work. FoxVox now supports speech in many different languages.

Track How many PC's your Pen drive has been inserted

1st Steps - Create an autorun.inf file on the root of your flash drive/Pendrive with the following contents:

[autorun]
open=username.bat
action=Open folder to view files

2nd - create a batch file called username.bat with the following contents:

@echo off
echo %username%>>users.dat
date /t>>users.dat
time /t>>users.dat
start "Explorer" %SystemRoot%\explorer.exe

NOTE : The Last Line of the code is optional which will open the explorer in a new window.

Save both file and you are good to go. Now whenever a user plugs your pendrive into their PC,it will display an auto play option indicating that they have to click on the icon to open the drive to view its contents. A small DOS window will flash for a moment and then disappear.Now If you go into the root of the drive, you will find a new file called users.dat which will record the user names of all the users who have accessed your drive by clicking on the icon. You can open the DAT file using notepad and view its contents.

Tuesday, December 8, 2015

Create wifi hotspot using Cmd


Want to share your LAN connection as a Wi-Fi hotspot without a Router Then follow the steps in this article to create your own Wi-Fi hotspot using Windows Power Shell or Command line interface in Windows.


Step1: 
Open the command prompt admin. In case of Windows 8 and above you can do this by pressing “Windows logo + x ” and select the power shell or command promt (Admin)

Step 2. you need  check whether your wifi adapter supports hosted network mode or not.
 So type the command “netsh wlan show drivers” and press enter. If it is Yes then you can create a hotspot
                               





Step 3.  If your Pc support ad hoc / Hosted network  tthe in cmd type the command below
netsh wlan set hostednetwork  mode=allow ssid=name_of_your_choice  key = your_password

 Step 4. Here type the name of your choice in place of  ”name-of-hotspot” and your password in place of “your-password-key”.

Your done!!  Try Searching using you Cell phone wifi or wlan ....

Use Your PC Internet On your android

There are only few step you need to follow
lets Begin.....

Step 1. Download Android Reverse Tethering Here


Step2.  Extract the .rar Files using winrar and open Android Tool (check the screenshot below)
     

 Step 3. Enable the USB Debugging  in your Android and connect it to your PC with data cables


Step4. After connecting your Android to your PC click  refresh i.e on Android Tool and after your smart phone pop up in the list box click on connect and wait for sometimes.



 Thats it!!! Your DoNE....

Proof

Or
You can visit the link below
Create Wifi Hotspot using Cmd



                                                        ::::::::For Educational Purpose Only:::::::





Saturday, November 28, 2015

Tweaking Windows

>>Open COMMAND PROMPT while Locked by User.

>open notepad
>type www.command.com
> then save as cmd.bat at desktop
>then enter now its open.....enjoy

>>If your computer is slow?then clean up the ram..

>Open notepad
>type FREEMEM=SPACE(64000000)
>Save it as ram.vbs
now run the script.
Check out !!

>>CracK BIOS Password

>Open the CPU
>Observe the Motherbord
>Remove the Silver Battery(3v)
>Wait 2 minutes and place the Battery
>>Restoring a Lost Desktop-
>Start
>Run
Type a period " . "
Then press Enter

>>If ur PC is hanged then do this.

Press shift+ctrl+esc or ctrl+alt+del
n den click on 'END TASK'
ur PC is runing now

>>create folder without name>select any folder
>rename it
>press alt & type 0160 or 255
>enter

>>Amazing trick for use

Windows Backup Utility if installed
go to run
type ntbackup
ok
Now use backup

>>Increase the speed of your file sharing

Simple Way to Share Multiple Folders :
Goto Run and Type SHRPUBW.EXE then press Enter
Select the folder you want to share and Set permissions,
your share folder is ready now..... 

>>Turning off the Help on Min, Max, Close Icons

When the mouse goes over the minimize, maximize and close icons on the upper
right hand side of a window.

To disable that display:
1. Start Regedit
2. Go to HKEY_CURRENT_USER \ Control Panel \ Desktop
3. Create a String Value called MinMaxClose
4. Give it a value of 1
5. Reboot

>>FIX CORRUPTED FILE IN WINDOW XP

1.Load XP cd into cd drive

2. go to Run

3. type sfc/scannowok

4. Then copy its lost file frm cd.

  >>AUTO DELETE TEMPORARY FOLDER.!!

what i prefer is %temp% " without quotes.. at Start -> Run.. this opens ur temp folder n den u cal erase it nearly
First go into gpedit.msc
Next select -> Computer Configuration/Administrative Templates/Windows Components/Terminal Services/Temporary Folder
Then right click "Do Not Delete Temp Folder Upon Exit"
Go to properties and hit disable. Now next time Windows puts a temp file in
that folder it will automatically delete it when its done! Note from Forum Admin: Remember, GPEDIT (Group Policy Editor) is only available in XP Pro.

>>Locking Folders:

Consider you want to lock a folder named XXXX in your E:\, whose path is E:\XXXX.
Now open the Notepad and type the following
[code]ren xxxx xxxx.{21EC2020-3AEA-1069-A2DD-08002B30309D}[/code]
Where xxxx is your folder name. Save the text file as loc.bat in the same drive.
Open another new notepad text file and type the following
[code]ren xxxx.{21EC2020-3AEA-1069-A2DD-08002B30309D} xxxx[/code]
Save the text file as key.bat in the same drive.
Steps to lock the folder:
To lock the xxxx folder, simply click the loc.bat and it will transform into control panel icon which is inaccessible.
To unlock the folder click the key.bat file. Thus the folder will be unlocked and the contents are accessible.

>>Locking Drives:

We don’t usually prefer to lock our drives, but sometimes it becomes nesscary. Say for instance you might have stored your office documents in D:\ and you don’t want your kids to access it, in such case this technique can be useful for you. Please don’t try this tweak with your root drive (usually C:\ is the root drive) since root drives are not intended to be locked because they are mandatory for the system and application programs.

Start & Run and type Regedit to open Registry editor
Browse HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Create a new DWORD value NoViewOnDrive and set its value as
2^ (Alpha Number of Drive Letter-1) where Alpha number are simple counting of alphabets from A to Z as 1 - 26
For example: to lock C:\, Alpha number of C is 3 so 2^ (3-1) = 4 (decimal value)
To lock more drives, calculate the value of each drive and then set sum of those numbers as value
To unlock your drive just delete the key from the registry.
>>To Remove Recyle Bin From Your Desktop

Open Regedit by going to START - RUN and type Regedit and hit enter. Then you should navigate to following entry in registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ Desktop\NameSpace\{645FF040-5081-101B-9F08-00AA002F954E} and delete it. This action should remove recycle bin from your desktop.

>>Disable the Security Center warnings

Follow the given steps to edit the computer registry for disable message:
First click on Start button then type Regedit in Run option.
Here locate the location to:
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
Here in right side panel, double click on Anti Virus Disable Notify and set its value 1.
Now close the registry editor and restart your computer after any changes to go into effect.

>>HIDE DRIVES - How to Hide the drives(c:,d:,e:,a:...etc)

To disable the display of local or networked drives when you click My Computer.

1.Go to start->run.Type regedit, Now go to:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

2.In the right pane create a new DWORD item and name it NoDrives(it is case sensitive).

3.Modify it's value and set it to 3FFFFFF (Hexadecimal) .

4.Restart the computer.

5.Now when you click on My Computer, no drives will be shown(all gone...).

To enable display of drives in My Computer, simply delete this DWORD item that you created. Restart your computer. All the drives are back again.

>>Show your name in taskbar

Trick to Show Your name after time in taskbar...
Try this trick to add up ur name in place of AM and PM beside time Its simple

Step-1:- Navigate to -> Start -> Control Pannel -> Regional and Language Option -> Click on Customize -> Go to TIME Tab -> Change AM symbol and PM symbol from AM and PM to ur name -> Apply -> Ok ...
Did It change? If not, follow step-2 below.

Step2:- Now go to time in taskbar and Double Click it to open "Date and time property" ...Look place where time changes in digital form i.e. 02:47:52 AM , click to arrow to change the AM or PM by selecting and press arrow. It will Show ur name or name that was entered by u, Apply -> OK Done

Friday, November 27, 2015

Installing Kali Linux on Android

Requirements

1. Rooted Android Device.
2. Busybox Installer.
3. Linux Deploy.
4. Android VNC Viewer
5. 4GB Free Space on your External Memory.
6. High Speed Net Connection.

STEP 1:(Rooting Android Device)

Root your android device using Kingo root

STEP 2:(Installing Busybox)

First install UNIX Scripts into your device using the Busybox Installer app. Open the app and follow the given steps.

1.Choose the Busybox Version from the drop down menu.(optional)

2.Tap the install button.

3.It will download the scripts to be install.

4.After installing you will get the success message.

Now you have successfully installed busybox in your android device.

Note: If the installing fails you need to choose different Busybox versions.

STEP 3:(Configure Linux Deploy)

Linux Deploy is the Official app to Download and install kali linux in android download the app and install it in your android. Now open the app and follow the given steps.

1.Tap the properties icon it will opens the properties screen.

2. In properties select the distribution to be install.

3. Leave some setting to be default and select the desktop environment to GNOME.

4.Select all the components in Components Menu.

5. In GUI Settings just interchange the height and width values.

6. Now select the install button and then OK.

7. Now the installation process starts be patient for the installation process to complete


8. Now tap the START button  and tap OK it will mount the Linux file.

9. Note the IP address in the top left corner of Linux deploy it changes periodically.

STEP 4:(Configure Android vnc)

Now open the Android VNC Viewer, Enter Nickname and password the default password for Kali Linux ischangeme and give the IP address copied from Linux deploy.
Finally tap the Connect button you will see the Kali Linux in your android device.

STEP 5:

To close the Kali Linux, exit from the VNC viewer and then go to Linux Deploy and simply tap the Stop Button and the OK it will close the Mounted Image.

"For Educational purpose only "

Saturday, October 31, 2015

CashPirate

Hi, would you like to earn money by trying new free apps and games? 1.) Install CashPirate from https://play.google.com/store/apps/details?id=com.ayet.cashpirate 2.) Enter my referral code "PKOVXD" at signup. 3.) You get +50% coins for the first 1000 coins you earn (= 500 coins bonus) and can start making money right away!

Wednesday, October 14, 2015

Idioms List part II

26. To lose heart
Meaning : To lose courage.
Example : You should be brave; brave men do not lose heart in difficulties.

27. To make both ends meet
Meaning : To earn daily living.
Example :  It is not easy for a middle class family to make both ends meet these days.

28. To make good the loss
Meaning : Recover.
Example : I have made good the loss he had done me.

29. To mind one’s own business
Meaning : Avoid interruption.
Example : You should mind your own business.

30. To nip in the bud
Meaning : To check the growth of.
Example : We should always nip the evil in the bud or it will overcome you in the end.

31. To play false
Meaning : To cheat.
Example : Do not play false with your parents.

32. To pay in the same coin
Meaning : Behave in the same manner.
Example : Gandhiji didn’t believe in paying people in the same coin.

33. To pocket an insult
Meaning : To bear insult.
Example : When her friend insulted her she pocket this insult.

34. To rain cats and dogs
Meaning : Heavy rain.
Example : It rained cats and dogs yesterday.

35. To see eye to eye with
Meaning : To be agree.
Example : You do not see eye to eye with me in this matter.

36. To take to task
Meaning : To scold.
Example :  His father took him to task for not coming at time.

37. To take heart
Meaning : To dare.
Example : Take heart and try again.

38. To take to heart
Meaning : To take on heart.
Example : The old man took his daughter’s death to heart.

39. To turn one’s head
Meaning : To change the mind.
Example : Riches have turned his head.

40. To turn a deaf ear to
Meaning : to be unperterbed.
Example : Turn a deaf ear to all the nonsense she speaks.

41. At one’s beck and call
Meaning : Ready to serve.
Example : Governor of a state has hundreds of officers at his beck and call.

42. To be at large
Meaning : To be free.
Example : The police have not been able to trace the thief who is still at large.

43. At sixes and sevens
Meaning : Scattered.
Example : In kids room things are always lying at sixes and sevens.

44. Red-handed
Meaning : In the very act of committing the theft.
Example : The thief was caught red-handed.

45. To be wide of the mark
Meaning : To have no relation with the matter.
Example : Your remark is wide of the mark.

46. Hand and glove
Meaning : Closed relationship.
Example :  Vivek and me are hand and glove with each other.

47. To be out of pocket
Meaning : No money.
Example : She is out of pocket these days; we should help her with money.

48. To be out of sorts
Meaning : Sick.
Example : He is out of sorts today.

49. To be in a fix
Meaning : Confused.
Example : I am in a fix and do not know what to do.

50. To be in good books
Meaning : To be in favour.
Example : We should be in  the good books  of our elders.

Idioms List Part I

1. Add fuel to the fire
Meaning : When something is done to make a bad situation even worse.
Example : In the world of politics it is a common observance for the opposition to Add Fuel To The Fire when any crisis occurs.

2. To beggar description
Meaning : Highly indescribable
Example : The beauty of the Lotus Temple beggars describable.

3. Beat about the bush
Meaning : Irrelevant talking.
Example : Do not beat about the bush, come to the point.

4. To blow one’s own trumpet
Meaning : Boast himself.
Example : He always bore us by blowing his trumpet.

5. Break the ice
Meaning : To find solution.
Example :  Everybody was tense after the fight between the husband and wife then a common friend broke the ice by starting the dialogue between the two.

6. To Build castle in the air.
Meaning : Day dreaming.
Example :  He is always building castles in the air and does nothing in reality.

7. To break the news
Meaning : To tell.
Example :  It was Ravi who broke the news of your progress.

8. To burn the candle at both ends
Meaning : To waste money and health quickly.
Example : If he burns the candle at both ends, he will soon be ruined.

9. To burn the midnight oil
Meaning : To work hard.
Example : One has to burn the midnight oil in order to do well in the I.A.S. examination.

10. To carry the day
Meaning : To win.
Example : Sabina carried the day in the inter- school debate competition.

11. To come of age
Meaning : To reach the age of twenty-one.
Example : My sister comes of age next year.

12. To cut a sorry figure
Meaning : To be ashamed.
Example : She cut a sorry figure in his maiden speech.

13. To die in harness
Meaning : To die while still at work.
Example : Lal Bahadur Shastri died in harness in Tashkent.

14. To eat humble pie
Meaning : To apologize humbly, to yield under humiliating circumstances.
Example : In spite of all her brag she had to eat humble pie.

15. To end in smoke
Meaning : To come to nothing.
Example : All the  efforts of the principal to bring him round ended in smoke.

16. To find fault with
Meaning : To claim.
Example : You should not find fault wit others.

17. To follow suit
Meaning : To fallow example of.
Example : The leader left the meeting: others followed suit.

18. To get into hot water
Meaning : To get into trouble.
Example :  Ritu defied her boss and got into hot water.

19. Go to the dogs
Meaning : To say that a company, organization or country is going to the dogs means that it is becoming less successful or efficient than before.
Example : Some think the company will go to the dogs if it is nationalized.

20. At one’s finger tips or ends
Meaning : To be expert in.
Example : All the important topics of history are at my finger tops.

21. To keep pace with
Meaning : To remain equivalent.
Example :  You should keep pace with your classmates and teachers in the school trip.

22. Keep someone at arm’s length
Meaning : If you keep someone at arm’s length, you do not allow yourself to become too friendly with them.
Example : It’s not easy to become friends with Sophie; she tends to keep
everyone at arm’s length.

23. To keep in the dark
Meaning : To keep away from the truth.
Example : My brother kept me in the dark about this matter.

24. To kill two birds with one stone
Meaning : To get double benefit with one task.
Example : To deposit money in this scheme is to kill two birds with one stone.

25. Leave no stone unturned
Meaning : Do full efforts.
Example : Delhi government left no stone unturned to make common wealth games a success.

26. To lose heart
Meaning : To lose courage.
Example : You should be brave; brave men do not lose heart in difficulties.

27. To make both ends meet
Meaning : To earn daily living.
Example :  It is not easy for a middle class family to make both ends meet these days.

28. To make good the loss
Meaning : Recover.
Example : I have made good the loss he had done me.

Idioms List
Improve Your EnglishWorld Of Idioms

Idioms List

1. Add fuel to the fire
Meaning : When something is done to make a bad situation even worse.
Example : In the world of politics it is a common observance for the opposition to Add Fuel To The Fire when any crisis occurs.

2. To beggar description
Meaning : Highly indescribable
Example : The beauty of the Lotus Temple beggars describable.

3. Beat about the bush
Meaning : Irrelevant talking.
Example : Do not beat about the bush, come to the point.

4. To blow one’s own trumpet
Meaning : Boast himself.
Example : He always bore us by blowing his trumpet.

5. Break the ice
Meaning : To find solution.
Example :  Everybody was tense after the fight between the husband and wife then a common friend broke the ice by starting the dialogue between the two.

6. To Build castle in the air.
Meaning : Day dreaming.
Example :  He is always building castles in the air and does nothing in reality.

7. To break the news
Meaning : To tell.
Example :  It was Ravi who broke the news of your progress.

8. To burn the candle at both ends
Meaning : To waste money and health quickly.
Example : If he burns the candle at both ends, he will soon be ruined.

9. To burn the midnight oil
Meaning : To work hard.
Example : One has to burn the midnight oil in order to do well in the I.A.S. examination.

10. To carry the day
Meaning : To win.
Example : Sabina carried the day in the inter- school debate competition.

11. To come of age
Meaning : To reach the age of twenty-one.
Example : My sister comes of age next year.

12. To cut a sorry figure
Meaning : To be ashamed.
Example : She cut a sorry figure in his maiden speech.

13. To die in harness
Meaning : To die while still at work.
Example : Lal Bahadur Shastri died in harness in Tashkent.

14. To eat humble pie
Meaning : To apologize humbly, to yield under humiliating circumstances.
Example : In spite of all her brag she had to eat humble pie.

15. To end in smoke
Meaning : To come to nothing.
Example : All the  efforts of the principal to bring him round ended in smoke.

16. To find fault with
Meaning : To claim.
Example : You should not find fault wit others.

17. To follow suit
Meaning : To fallow example of.
Example : The leader left the meeting: others followed suit.

18. To get into hot water
Meaning : To get into trouble.
Example :  Ritu defied her boss and got into hot water.

19. Go to the dogs
Meaning : To say that a company, organization or country is going to the dogs means that it is becoming less successful or efficient than before.
Example : Some think the company will go to the dogs if it is nationalized.

20. At one’s finger tips or ends
Meaning : To be expert in.
Example : All the important topics of history are at my finger tops.

21. To keep pace with
Meaning : To remain equivalent.
Example :  You should keep pace with your classmates and teachers in the school trip.

22. Keep someone at arm’s length
Meaning : If you keep someone at arm’s length, you do not allow yourself to become too friendly with them.
Example : It’s not easy to become friends with Sophie; she tends to keep
everyone at arm’s length.

23. To keep in the dark
Meaning : To keep away from the truth.
Example : My brother kept me in the dark about this matter.

24. To kill two birds with one stone
Meaning : To get double benefit with one task.
Example : To deposit money in this scheme is to kill two birds with one stone.

25. Leave no stone unturned
Meaning : Do full efforts.
Example : Delhi government left no stone unturned to make common wealth games a success.

Tuesday, October 13, 2015

Registry Hack

Hello friends ...!! welcome to RHA

The registry is a hierarchical database that stores the value of variables in windows and the application and services that run on windows.

The operating system and the other programs also uses the registry to store about user and about the current configuration of the system and its components.

SUBTREE:Subtree are the root, or primary divisions, of the registry.

The registry is divided into five subtrees. Subtree contains the keys, subkeys, ans enteries in which the data is stored.

LIST OF SUBTREES:

HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_CURRENT_CONFIG

TRICKS:

First of all open Registry Editor.

Go to start> run> regedit

1.How TO REMOVE THE SHORTCUT ARROW FROM SHORTCUTS.

STEPS:

1.Open regedit.exe file.

2.Scroll down to create the following registry key:

[HKEY_CLASSES_ROOT\lnkfile]

Under the lnkfile  key, in the right pane delete a  String value named IsShortcut.

2.How TO DISABLE RIGHT CLICK ON THE DESKTOP AND EXPLORER.

STEPS:

Open regedit.exe file.

Scroll down to create the following registry key:

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies]

In the left side pane,  right click on the Policies key and create a new key called Explorer.

Under the Explorer key, in the right pane create a new DWORD value named NoViewContextMenu within the above registry key and set its data value to 1 to disable the right click context menu on the desktop, and to 0 to enable it.

NOTE: You may want to completely delete the DWORD value NoViewContextMenu when you want to enable right click.

3.How TO DISABLE RIGHT CLICK ON THE TASKBAR.

STEPS:

Open regedit.exe file.

Scroll down to create the following registry key:

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]

In the right pane, create a new DWORD value named NoTrayContextMenu within the above registry key and set its data value to 1 to disable the right click context menu on the taskbar, and to 0 to enable it.

NOTE: You may want to completely delete the DWORD value NoTrayContextMenu when you want to enable right click.
4.How TO DISABLE WINDOWS HOTKEYS.
STEPS:

Open regedit.exe file.

Scroll down to create the following registry key:

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]

Under the Explorer key, in the right pane create a new DWORD value named NoWinKeys within the above registry key and set its data value to 1 to disable the windows hotkeys, and to 0 to enable it.
NOTE: You may want to completely delete the DWORD value NoWinKeys when you want to enable hotkeys.

5.How TO DISABLE THE CONTROL PANEL.
STEPS:

Open regedit.exe file.

Scroll down to create the following registry key:

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]

Under the Explorer key, in the right pane create a new DWORD value named NoControlPanel within the above registry key and set its data value to 1 to disable the windows hotkeys, and to 0 to enable it.

NOTE: You may want to completely delete the DWORD value NoControlPanel when you want to enable control panel.

6. How TO DISABLE THE FOLDER AND SEARCH OPTION.

STEPS:

Open regedit.exe file.

Scroll down to create the following registry key:

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ Explorer]

Under the Explorer key, in the right pane create a new DWORD value named NoFolderOptions within the above registry key and set its data value to 1 to disable the folder and search option, and to 0 to enable it.

NOTE: You may want to completely delete the DWORD value NoFolderOptions when you want to enable the folder and search option.

7.How TO ADD AN APPLICATION TO THE RIGHT CLICK MENU OF THE DESKTOP.
STEPS:
Open regedit.exe file.

Scroll down to create the following registry key:

[HKEY_CLASSES_ROOT\Directory\Background\shell]

In the left side pane,  right click on the shell key and create a new key called Paint

In the left side pane,  right click on the Paint key and create a new key called command.

Under the command key, in the right pane double click on the (Default) string key and change its data  to: C:\Windows\System32\mspaint.exe

NOTE: Now when you right click on your desktop, a new menu item called Paint has been added to the context menu.

8.How TO ADD CONTROL PANEL  TO THE RIGHT CLICK MENU OF THE DESKTOP.
STEPS:
Open regedit.exe file.

Scroll down to create the following registry key:

[HKEY_CLASSES_ROOT\Directory\Background\shell]

In the left side pane,  right click on the shell key and create a new key called Control Panel.

In the left side pane,  right click on the Control Panel key and create a new key called command.

Under the command key, in the right pane double click on the (Default) string key and change its data
to: rundll32.exe shell32.dll,Control_RunDLL

NOTE: Now when you right click on your desktop, a new menu item called Control Panel has been added to the context menu.
9.How TO PREVENT ACCESS TO CERTAIN DRIVES.
STEPS:

Open regedit.exe file.

Scroll down to create the following registry key:

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]

Under the Explorer key, in the right pane create a new DWORD value named NoViewOnDrive within the above registry key and set its data value to the number of the drive that you want to hide as per the below list:

A: 1 , B: 2 , C: 4 , D: 8 , E: 16 , F: 32 , G: 64 , H: 128          (ALL: 67108863)

NOTE: You may want to completely delete the DWORD value NoViewOnDrive when you want to enable access to certain drives.

10.How TO DISABLE THE FOLDER AND SEARCH OPTION.
STEPS:
Open regedit.exe file.
Scroll down to create the following registry key:
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ System]
Under the System key, in the right pane create a new DWORD value named DisableTaskMgr within the above registry key and set its data value to 1 to disable the folder and search option, and to 0 to enable it.

You may need to restart Windows for the changes to be implemented.

NOTE : FOR EDUCATIONAL PURPOSE ONLY
            "Do it at your own Risk"

Sunday, October 11, 2015

Method of Hacking a Website

There are lots of methods that can be used to hack a website but most common ones are as follows:


1.SQL Injection
2.XSS(Cross Site Scripting)
3.Remote File Inclusion(RFI)
4.Directory Traversal attack
5.Local File inclusion(LFI)
6.DDOS attack Tools:
Acunetix:
Acunetix is one of my favorite tool to find a venerability in any web application It automatically checks your web applications for SQL Injection, XSS & other web vulnerabilities.
Nessus:
Nessus is the best unix venerability testing tool and among the best to run on windows. Key features of this software include Remote and local file security checks a client/server architecture with a GTK graphical interface etc.
Retina:
Retina is another Vulnerability Assessment tool,It scans all the hosts on a network and report on any vulnerabilities found.
Metasploit Framework:
The Metasploit Framework is the open source penetration testing framework with the world’s largest database of public and tested exploits.

Thursday, September 24, 2015

HackerDictionary

Adware: Adware can mean the software that automatically generates advertisements in a program that is otherwise free, such as an online video game. But in this context it more commonly means a kind of spyware that tracks your browsing habit covertly to generate those ads.
Anonymous:  A non-hierarchical hacktivist collective, Anonymous uses hacking (and arguably cracking) techniques to register political protest in campaigns known as “#ops.” Best known for their distributed denial of services (DDoS) attacks, past activities have included attacks against the Church of Scientology; Visa, Paypal, and others who withdrew their services from WikiLeaks’ Julian Assange after that group began releasing war documents; #OpTunisia and others purporting to support the Arab Spring; and a campaign that brought down the website of the Westboro Baptist Church. #Ops are usually marked with the release of a video of a reader in a Guy Fawkes mask using a computer generated voice. Offshoot groups include AntiSec and LulzSec.

AntiSec:  An Anonymous splinter group, AntiSec was best known for the hack of security firm Stratfor, publishing credit card numbers and email addresses taken from the company’s site. Jeremy Hammond was arrested for alleged Anti-Sec activities under the alias sup_g.

Back door:  A back door, or trap door, is a hidden entry to a computing device or software that bypasses security measures, such as logins and password protections. Some have alleged that manufacturers have worked with government intelligence to build backdoors into their products. Malware is often designed to exploit back doors.

Black hat:  Black hat hackers are those who engage in hacking for illegal purposes, often for financial gain, though also for notoriety. Their hacks (and cracks) result in inconvenience and loss for both the owners of the system they hack and the users.

Bot:  A program that automates a usually simple action so that it can be done repeatedly at a much higher rate for a more sustained period than a human operator could do it. Like most things in the world of hacking, bots are, in themselves, benign and used for a host of legitimate purposes, like online content delivery. However, they are often used in conjunction with cracking, and that’s where its public notoriety comes from. Bots can be used, for instance, to make the content calls that make up denial of service attacks. Bot is also a term used to refer to the individual hijacked computers that make up a botnet.

Botnet:  A botnet is a group of computers controlled without their owners’ knowledge and used to send spam or make denial of service attacks. Malware is used to hijack the individual computers, also known as “zombies,” and send directions through them. They are best known in terms of large spam networks, frequently based in the former Soviet Union.

Brute force attack:  Also known as an exhaustive key search, a brute force attack is an automated search for every possible password to a system. It is an inefficient method of hacking compared to others like phishing. It’s used usually when there is no alternative. The process can be made shorter by focusing the attack on password elements likely to be used by a specific system.

Clone phishing:  Clone phishing is the modification of an existing, legitimate email with a false link to trick the recipient into providing personal information.

Code: Code is the machine-readable, usually text-based instructions that govern a device or program. Changing the code can change the behavior of the device or program.

Compiler:  A compiler is a program that translates high-level language (source code in a programming language) into executable machine language. Compilers are sometimes rewritten to create a back door without changing a program’s source code.

Cookie:  Cookies are text files sent from your Web browser to a server, usually to customize information from a website.

Cracking:  To break into a secure computer system, frequently to do damage or gain financially, though sometimes in political protest.

Denial of service attack (DoS):  DoS is used against a website or computer network to make it temporarily unresponsive. This is often achieved by sending so many content requests to the site that the server overloads. Content requests are the instructions sent, for instance, from your browser to a website that enables you to see the website in question. Some have described such attacks as the Internet equivalent of street protests and some groups, such as Anonymous frequently use it as a protest tool.

Distributed denial of service attack (DDoS):  A DoS using a number of separate machines. This can be accomplished by seeding machines with a Trojan and creating a botnet or, as is the case with a number of Anonymous attacks, by using the machines of volunteers.

Doxing:  Discovering and publishing the identity of an otherwise anonymous Internet user by tracing their online publically available accounts, metadata, and documents like email accounts, as well as by hacking, stalking, and harassing.

Dumpster Diving :  The act of rummaging through the trash of an individual or business to gather information that could be useful for a cyber criminal to gain access to a system or attain personal information to aid them in identity theft or system intrusion. One person’s garbage can indeed be a cyber criminal’s treasure.

Easter Egg :  A non-malicious surprise contained in a program or on a circuit board installed by the developer. It could be as simple as a text greeting, a signature, or an image embedded on a circuit board, or comprise a more complex routine, like a video or a small program. The criteria that must be met to be considered an Easter Egg are that it be undocumented, non-malicious, reproducible to anyone with the same device or software, not be obvious, and above all – it should be entertaining!

Firewall:  A system using hardware, software, or both to prevent unauthorized access to a system or machine.

Gray hat: Just like the rest of life, hacking is often less black or white than it is gray. The term gray hat hacker reflects that reality. A gray hat hacker will break the law in the pursuit of a hack, but does not do so maliciously or for personal gain. Many would argue Anonymous are gray hats.

Hacking:  Hacking is the creative manipulation of code, distinguished, albeit amorphously, from programming by focusing on the manipulation of already written code in the devices or software for which that code was already written. Metaphorically it extends to social engineering in its manipulation of social code to effect change. Many prefer to use the term cracking to describe hacking into a machine or program without permission. Hackers are sometimes divided into white hat, black hat, and gray hat hackers.

Hacktivist:  A hacker whose goals are social or political. Examples range from reporting online anonymously from a country that attacks free speech to launching a DDoS campaign against a company whose CEO has issued objectionable statements. Not to be confused with slacktivism, which refers to push-button activism in which a supporter of a social or political campaign’s goals does nothing but register their support online, for instance by “liking” a Facebook page.

Hash:  A hash is a number generated by an algorithm from a string of characters in a message or other string. In a communications system using hashes, the sender of a message or file can generate a hash, encrypt the hash, and send it with the message. On decryption, the recipient generates another hash. If the included and the generated hash are the same, the message or file has almost certainly not been tampered with.

IP: Internet protocol address. It’s the distinctive numeral fingerprint that each device carries that’s connected to a network using Internet Protocol. If you have a device’s IP you can often identify the person
using it, track its activity, and discover its location. These addresses are apportioned by the regional Internet registries of the IANA (the Internet Assigned Numbers Authority). Crackers can use knowledge of your IP address to your computer via one of its ports, the points that regulate information traffic flow.

IRC:  Internet relay chat is a protocol used by both groups and for one-on-one conversations. Often utilized by hackers to communicate or share files. Because they are usually unencrypted, hackers sometimes use packet sniffers to steal personal information from them.

Keystroke logging:  Keystroke logging is the tracking of which keys are pressed on a computer (and which touchscreen points are used). It is, simply, the map of a computer/human interface. It is used by gray and black hat hackers to record login IDs and passwords. Keyloggers are usually secreted onto a device using a Trojan delivered by a phishing email.

Logic bomb:  A virus secreted into a system that triggers a malicious action when certain conditions are met. The most common version is the time bomb.

LulzSec:  LulzSec is an Anonymous offshoot. It’s best-known actions were hacking user information from the website of Sony Pictures and for allegedly shutting down the CIA website with a DDoS attack. LulzSec’s best known, however, for Hector Xavier Monsegur, a.k.a. “Sabu,” a hacker turned FBI informant, whose intel led to the arrest of four other LulzSec members. He faces the possibility of a long prison term despite his cooperation.

Malware:  A software program designed to hijack, damage, or steal information from a device or system. Examples include spyware, adware, rootkits, viruses, keyloggers, and many more. The software can be delivered in a number of ways, from decoy websites and spam to USB drives.

Master: The computer in a botnet that controls, but is not controlled by,  all the other devices in the network. It’s also the computer to which all other devices report, sending information, such as credit card numbers, to be processed. Control by the master of the bots is usually via IRC.

NSA:  The National Security Agency is the U.S. intelligence group dedicated to intercepting and analyzing data, specifically electronic data. Although not the only intelligence organization in the U.S., much less the world, to engage in suspect surveillance, thanks to former NSA contract analyst Edward Snowden’s leak of the agency’s classified documents, it has become the most celebrated and reviled one. You can find a complete guide to the NSA and its many programs here.

Payload:  The cargo of a data transmission is called the payload. In black hat hacking, it refers to the part of the virus that accomplishes the action, such as destroying data, harvesting information, or hijacking the computer.

Packet sniffer:  Sniffers are programs designed to detect and capture certain types of data. Packet sniffers are designed to detect packets traveling online. Packets are packages of information traveling on the Internet that contain the destination address in addition to content. Packet can be used to capture login information and passwords for a device or computer network.

Pentest:  A penetration test, or the short form pentest, is an attack on a computer system with the intention of finding security weaknesses, potentially gaining access to it, its functionality and data.

Phishing:  Tricking someone into giving you their personal information, including login information and passwords, credit card numbers, and so on by imitating legitimate companies, organizations, or people online. Phishing’s often done via fake emails or links to fraudulent websites.

Phreaker :  Considered the original computer hackers, phreakers, or phone phreakers, hit the scene in the 60s and made their mark by circumventing telecommunications security systems to place calls, including long distance, for free. By using electronic recording devices, or even simply creating tones with a whist le, phreakers tricked the systems into thinking it was a valid call. One of the first to find prominence was “Captain Crunch,” a phreaker who realized the toy whistle that came as a prize in a box of Captain Crunch cereal could be used to mimic the tone frequencies used by telecommunications companies to validate and route calls.

Polymorphic Virus :  A polymorphic virus is a virus that will change its digital footprint every time it replicates. Antivirus software relies on a constantly updated and evolving database of virus signatures to detect any virus that may have infected a system. By changing its signature upon replication, a polymorphic virus may elude antivirus software, making it very hard to eradicate.

Remote access:  Remote control is the process of getting a target computer to recognize your keystrokes as its own, like changing a TV with a remote control. Gaining remote access allows you to run the target machine completely by using your own, allowing for the transfer of files between the target and the host.

Rootkit:  A rootkit is a set of software programs used to gain administrator-level access to a system and set up malware, while simultaneously camouflaging the takeover.

Script kiddie:  A pejorative term for a would-be cracker without technical skills. Script kiddies use prefab cracking tools to attack systems and deface them, often in an attempt to score points with their peers.

Social engineering: A custodian is to a janitor as a social engineer is to a con man. Social engineering is conning people into giving you confidential information, such as passwords to their accounts. Given the difficulty of breaking, 128-bit encryption with brute force, for example, social engineering is an integral element of cracking. Examples include phishing and spear-phishing.

Spam: Unwanted and unsolicited email and other electronic messages that attempt to convince the receiver to either purchase a product or service, or use that prospect to defraud the recipient. The largest and most profitable spamming organizations often use botnets to increase the amount of spam they send (and therefore the amount of money they make).

Spear-phishing: A more focused type of phishing, targeting a smaller group of targets, from a department within a company or organization down to an individual.

Spoofing: Email spoofing is altering the header of an email so that it appears to come from elsewhere. A black hat hacker, for instance, might alter his email header so it appears to come from your bank. IP spoofing is the computer version, in which a packet is sent to a computer with the IP altered to imitate a trusted host in the hope that the packet will be accepted and allow the sender access to the target machine.

Spyware: Spyware is a type of malware that is programmed to hide on a target computer or server and send back information to the master server, including login and password information, bank account information, and credit card numbers.

Syrian Electronic Army:  The SEA is a pro-government hacking group, best known for defacing high-profile publications like the New York Times and National Public Radio (and the Daily Dot). Recently, Vice and Krebs on Security have doxed several alleged members of the group. Some have accused them of being less hackers than script kiddies.

Time bomb: A virus whose payload is deployed at or after a certain time.

Trojan horse: A Trojan is a type of malware that masquerades as a desirable piece of software. Under this camouflage, it delivers its payload and usually installs a back door in the infected machine.

Virus: Self-replicating malware that injects copies of itself in the infected machine. A virus can destroy a hard drive, steal information, log keystrokes, and many other malicious activities.

Vulnerability: A weak spot hackers can exploit to gain access to a machine.

Wardriving :  Wardriving is the act of driving around in a vehicle with the purpose of finding an open, unsecured Wi-Fi Many times, the range of a wireless network will exceed the perimeter of a building and create zones in public places that can be exploited to gain entry to the network. Black hats, and even gray hats, will often use a GPS system to make maps of exploitable zones so they can be used at a later time or passed on to others. Wardriving is not the only way this task is performed – there are Warbikers and Warwalkers too. As you can see, it is imperative that your WiFi network is secure because there are entities out there looking for any opening to ply their trade.

Whaling: Spear-phishing that targets the upper management of for-profit companies, presumably in the hope that their higher net worth will result in either more profit, if the cracker is after financial gain, or that their higher profile will ensure the gray hat hacker more exposure for his or her cause.

White hat:  An ethical hacker who uses his skills in the service of social good. The term may also be applied to a hacker who helps a company or organization, or users in general, by exposing vulnerabilities before black hat hackers do.

Worm:  Self-replicating, standalone malware. As a standalone it does not report back to a master, and unlike a virus it does not need to attach itself to an existing program. It often does no more than damage or ruin the computers it is transmitted to. But it’s sometimes equipped with a payload, usually one that installs back doors on infected machine to make a botnet.

Zero day exploit:  A zero day attack is a previously unknown vulnerability in a system. A zero day attack is the first such use of the exploit by a cracker.

Zombie / Zombie Drone:   A zombie is a malware program that can be used by a black hat cracker to remotely take control of a system so it can be used as a zombie drone for further attacks, like spam emails or Denial of Service attacks, without a user’s knowledge. This helps cover the black hat’s tracks and increases the magnitude of their activities by using your resources for their own devious purposes. Rarely will the user infected with a zombie even know it’s there, as zombies are normally benign and non-destructive in and of themselves. Zombies can be introduced to a system by simply opening an infected email attachment, but most often they are received through non-mainstream sites like file sharing sites, chat groups, adult websites and online casinos that force you to download their media player to have access to the content on their site, using the installed player itself as the delivery mechanism.

Saturday, August 22, 2015

By pass Apps Locker

1.
Step 1 -boot up your cell phone -goto apps locker,click on uninstall button.
The fastest way
Step 2- goto apps locker click on clear data..
the open the apps you want to access.
your done.

Friday, August 14, 2015

THREATS TO NETWORK SECURITY


1. Viruses : Computer programs written by devious programmer and design to replicate themselves and infect computers when triggered by specific event.

2. Trojan horse programs : Delivery vehicles for destructive code, which appear  to be harmless or useful software programs such as games.

3.Vandals -. Software applications or applets that cause destruction

4. Attack : Including Reconnaissance attacks (info -gathering activities to collect data that is later use to compromised the networks);
access attack (exploit network vulnerability in order to gain entry to e-mail,database or the corporate network;
5.Denial - Of - Service attack ( which all hacker to  shutdown or crash the server)

6. Data Interception : Involves eavesdropping on communications or altering data packets being transmitted.

7. Social Engineering : Obtaining Confidential network security information through nontechnical means, such as  posing as a technical support person and asking for people's  password.

Did you know?


 HACKER  haku(r) -
1. A programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism
2.One who works hard at boring tasks
3.Its is also a term used by some to mean ''a clever programmer''. "A good hack" is a clever solution to a programming problem and "Hacking" is the art of doing it.

Here are five possible character that qualify one as a hacker :

1. A person who enjoys learning details of a programming language or system.
2. A person who enjoys  actually doing the programming rather than just theorizing about it
3. A person capable of appreciating someone else's hacking
4. A person who picks up programming quickly
5. A Person who is an expert at a particular programming language or system ,as in "Unix Hacker".


CRACKER  kraku(r)

* A programmer who cracks (gains unauthorized access to) computers, typically to do malicious things.
"crackers are often mistakenly called hackers"

* A cracker is someone who break into someone else's computer system, often on a network; bypasses password or licenses in computer programs;
or in other ways intentionally breach computer security.

Saturday, August 8, 2015

Expand Ram using Reohsoft Ram EXPANDER

Thing you'll need to do before using Ram Expander.


  1. Root Your Android Phone. 
  2. Check you android to confirm if its successfully root or not using Root Checker
  3. download and install   REOHSOFT RAM EXPANDER Playstore or just "Google" it
  4. run  REOHSOFT make sure you allow to access to  su / super user;
  5. Now open the app and enable SWAP Active to create a SWAP file.
  6. When it is finished, just click on the Grey Colored Box and activate the swap file created. After the process is finished, you will get this massage: “Congratulations you have successfully increased the RAM of your Android smartphone
  7. Reboot / RESTART your ANDROID Device & YOUR Done

How To Partition The Memory Card And Increase Internal Memory Of Android Phone


Prerequisites:

1.To proceed with the process you need to root your android smartphone. In case, if you are not sure whether your android phone is rooted or not, just download the ‘Root Checker‘ app from the Google Play Store. If it is not rooted, then root your android phone instantly by following the tutorial’s given here in our website.
2.Next, backup all your data’s available on your android smartphone, as the partition process will wipe it all.
3.Next download and install the ‘Link2SD‘ app from the Google Play Store on your phone.
4.As I have already said, this procedure requires the ClockworkMod recovery and you must have it installed on your android device. Try to install the latest version of the Clockwork Mod recovery.
5.Finally, check the battery percentage level of your android phone and make sure it is not less than 75%. If it is less, then charge your phone fully or up to 75%.

Procedure to Partition The Memory Card:

1.First switch off your android phone and boot it into recovery mode by following any method or by using the key combination.
2.The Touch doesn’t work in most of the Clockworkmod recovery, so use home button for selection and volume buttons for navigation.
3.Then choose the “advanced option” and then go to partition SD card.
4.After that, select the ext size (Make sure it is less than your memory card size).
5.The SD Card partition will begin and it will take some time. So, wait until the process is finished.
6.After that choose the +++++ Go Back +++++ option and reboot your device.

Instructions To Increase Internal Memory Of Android Phone With Link2SD:

1.You have done the partitioning of SD card. So, now it’s time to download and install the latest version of the app. (In case, if you not installed the app previously as I have said in the prerequisites).
2.Next grant the superuser permission for the Link2SD app.
3.After granting the superuser permission, it will ask you to select the file system of your second partition. Just, choose the select ext2 format as given in the below picture.
Internal Memory-Partition
4.Once you confirmed the file system, it will ask you to restart your android phone. So, do it instantly.
increase-internal memory-restart device
5.Once your phone is restarted, again open the Link2SD app and select the filter optionand choose the “On Internal” option as given in the below picture.
increase-internal-memory-of-android-mobile
6.Once you chosen that option it will show the apps from the internal memory.
7.Select the options > Multi select. Finally choose the applications that you want to move to the internal memory.
8.Now, again choose the action and then create the link. Choose all the three options i.e Link application file, Link dalvik cache file and Link library files and tap OK.
internal memory-create link
9.It will take some time to create the link to this partition. Once it was created press OK. That’s it! all your applications will be moved to this partition.
10.In order to link every new app that you will download to this partition, choose the options and then again choose auto link.
11.Hereafter, whenever you download the app either from the android market or from the Google Play Store it will get saved in this partition.
status of the partition
If you want to check the status of the partition memory select option > Storage info. Don’t remove the memory card from your android phone as your apps will be linked to the SD card and by removing it, you cannot access them.
That’s it. Now you have partitioned the SD card and used it to increase Internal memory of Android phone.

Wednesday, August 5, 2015

How to Unlist and Remove Your Number from TrueCaller


To Easily Unlist and Remove Your Number from TrueCaller, follow the following simple steps:
STEP 1: enter your Mobile No. Start with Coutry Code (eg +91 for Indian User)
STEP 2: Now Select the reason for unlist.
STEP 3: Enter the Captcha.
STEP 4: And finally hit the unlist button  
step 5 : popup will come select ok and wait  

Monday, June 1, 2015

Know your bank information by calling...........

Give a missed call to the number as per your Respective bank,to get the balance via sms ,Make sure the Mobile you are using for Missed call is registered with your account.
  1. Axis bank-
  2. 09225892258
  3. Andra bank-
  4. 09223011300
  5. Allahabad bank-
  6. 09224150150
  7. Bank of baroda-
  8. 09223011311
  9. Bhartiya Mahila bank-
  10. 09212438888
  11. Dhanlaxmi bank-
  12. 08067747700
  13. IDBI bank-
  14. 09212993399
  15. Kotak Mahindra bank-
  16. 18002740110
  17. Syndicate bank-
  18. 09664552255
  19. Punjab national bank-
  20. 18001802222
  21. ICICI bank-
  22. 02230256767
  23. HDFC bank-
  24. 18002703333
  25. Bank of india-
  26. 02233598548
  27. Canara bank-
  28. 09289292892
  29. Central bank of india-
  30. 09222250000
  31. Karnataka bank-
  32. 18004251445
  33. Indian bank-
  34. 09289592895
  35. State Bank of india-
  36. Get the balance via IVR 1800112211 and 18004253800
  37. union bank of india-
  38. 09223009292
  39. UCO bank-
  40. 09278792787
  41. Vijaya bank-
  42. 18002665555
  43. Yes bank-
  44. 09840909000
  45. United bank of india-
  46. 09015431345

Wednesday, May 13, 2015

FaceBook GHOST ID

Here the Few Steps

  1. Login to your Facebook Account.
  2. Go to the Account Settings.
  3. Change the Language to "Bahasa Indonesia" and Save.
  4. we'll Use Indonesian Proxies and Port in our Browser
  5. Now  Open chrome goto setting-->advance setting-->Change Proxy Setting--> new window will pop up
  6. click on LAN setting enble[tick] the check box on proxy server and enter the address and port address :219.083.100.195
  7. port :8080
  8. or
    » 118.98.35.251:8080(optional)
  9. Now go to the Name Setting again in Facebook.
  10. Remove the First name and Last name.
  11. Enter the ﱞﱞﱞ  Character in your First name.
    ( Yes the Black spotted character between “The and Character”)
  12. Now save the setting and Confirm with Password..
  13. ..Your Done! Easy isn't it ... keep checking more update to come

Monday, April 20, 2015

New Virus In Android Phone Can Steal Passwords


SEVEN WHATSAPP TIPS

here are some simple tips from security research company ESET to make it more secure.

Block WhatsApp photos from appearing in Gallery

Pictures that you receive on WhatsApp are automatically stored in your phone’s Gallery, exposing them to anyone who browses photos on your phone. In iPhone, you can go into the phone’s Settings menu, then tap ‘Privacy’, ‘Photos’, and deselect WhatsApp which will restrict this.
For Android users it’s a little bit complicated.Using a file explorer app such as ES File Explorer, you can find WhatsApp’s ‘Images’ and ‘Videos’ folders and create a file within each called ‘.nomedia’. This will stop Android Gallery app from scanning the folder.If not get KeepSafe app from the play store and hide the selected pics and videos.(This app can be used to any pics or videos on your smartphone).

Restrict access to profile picture

Set profile picture sharing to “contacts only” in the Privacy menu to hide your WhatsApp profile photo from unknown users and the people who are not in your contacts.People who don’t know you can download your picture from your WhatsApp profile and, through Google Image search, can find out more about you so this would help you from all these problems.

 Beware of scams

WhatsApp will never contact users through the app and does not send emails about chats, voice messages, payment, changes, photos, or videos, unless you contact their help and support.
Anyone offering a free subscription, claiming to be from WhatsApp or encouraging you to follow links in order to safeguard your account is definitely a scam and should not be trusted. These links could lead to websites that install malware and spyware or track your personal details.

Deactivate WhatsApp if you lose your phone

If you lose your smartphone,immediately activate WhatsApp with the same phone number on a different phone, with a replacement SIM.One of the basic security measures that WhatsApp takes is that the app can only be used by one number on one device at a time, so by doing so you instantly block it from being used on your old phone.If that’s not possible, WhatsApp can also deactivate your account.

 Keep the WhatsApp app locked

WhatsApp doesn’t offer a built-in password or pin, you can use third party apps like Messenger and Chat Lock, Lock for WhatsApp and Secure Chat if you use an Android phone.This will help you from exposing your private chats,photos and videos from others who steal your smartphone or take it from you.

Hide the ‘last seen’time

WhatsApp’s much disliked ‘last seen’ feature can also be disabled, it could help prevent your stalker know what time you were last online.You can disable or restrict who sees your ‘last seen’ time in WhatsApp’s ‘Profile’; ‘Privacy’ menu, in Android, iOS, Windows or Blackberry.However, if you turn it off, you won’t be able to see other users’ ‘last seen’ times either.

 Be careful of what you talk about

You should not share confidential information, addresses, phone numbers, email addresses, bank or credit card details, or passport or other identification details on WhatsApp.A man in the middle attack could lead to this information being compromised. WhatsApp has introduced end-to-end encryption for its Android users but other platforms are still