Archive for 2012
Facebook Messenger for Android Devices
Facebook Messenger - a faster way to message. Facebook launched a new
messenger app for Android phones, including those without a Facebook account,
can send and receive messages to and from anyone with a phone number. Just like
WatsApp which is a craze among youngsters nowadays.
"Users can now sign up for a messenger account with just their
name and phone number, so they can send messages to their phone contacts
instantly.
The goal is to make the new messenger experience better by expanding its reach and giving its users the ability to connect with all of their phone contacts." Facebook said in a statement.
The goal is to make the new messenger experience better by expanding its reach and giving its users the ability to connect with all of their phone contacts." Facebook said in a statement.
Facebook Messenger users now can send and receive messages, to and from
anyone with a phone number, and not just those on Facebook user. Users who do
not have the Messenger app on their phone will receive chats and messages on
their Facebook account.
Download Facebook Messenger for Android.
Google working on Android 5.0
Android market is increasing day by day. And Google certainly did not
slow his pace in the development of Android, appeared in late 2011 Android 4.0
Ice Cream Sandwich on the Nexus, and in July 2012 the Android 4.1 Jelly Bean
that comes along with the Nexus 7.
Google is now working on the development of Android 5.0 Key Lime Pie,
focusing on the letter "K" in alphabetical order to name and deserts
name of Android, namely:
A: Apple Pie (v1.0)
B: Banana Bread (v1.1)
C: Cupcake (v1.5)
D: Donut (v1.6)
E: Eclair (v2.0/v2.1)
F: Froyo (v2.2)
G: Gingerbread (v2.3)
H: Honeycomb (v3.0/v3.1/v3.2)
I: Ice Cream Sandwich (v4.0)
J: Jelly Bean (v4.1)
K: Key Lime Pie (v5.0?)
What all Android 5.0 Key Lime Pie can give us? According to recent rumors,
Android 5.0 Key Lime Pie has advantages such as:
Support Multiple Devices
Applications Video Chat
Game Center
Integration of Social Networking Sites
Improvement Project Butter
Improved Multi-tasking
Better customization
Google is so fast and kept doing various innovations on its Android
operating system. Release date yet to be decided.
4 Powerful Online OS
SliveOS
SliveOS is a Silverlight based online virtual operating system, sometimes
called a Web OS or a cloud computer. It is a website that simulates an
operating system inside your web browser. SliveOS replicates the desktop environment
of a modern operating system. You can launch applications, without
installation.
EyeOS
eyeOS Professional Edition is a private-cloud application platform with
a web-based desktop interface. Commonly called a cloud desktop because of its
unique user interface, eyeOS delivers a whole desktop from the cloud with file
management, personal management information tools and with the integration of
the client’s applications.
Lucid DesktopLucid Desktop known as the Psych Desktop is built on a base of PHP5 and is a consumer-oriented web desktop service. This desktop can be installed on to a web server like EyeOS, and is remarkably simple to use and write code for. With its proximity to Linux’s code, Lucid Desktop will be a sure hit with the Linux-loving masses.
CLOUDOImagine a world where your computer wasn’t tied to a physical computer, but rather a computer that lived on the Internet, instantly accessible from any computer or mobile phone connected to the Internet, no matter where you are or what you are up to. Cloudo offers just this Cloud Computing. And with Cloudo Mobile your online computer is accessible from your mobile phone as well. Use Cloudo as your default computer, or use it side by side with your work or home computer.
These are some of the Best Online Operating System. Go give a try.
Windows 8 Loader/Activator
Windows 8 is finally out and has a new Start screen that is beautiful, fast and fluid. Put what matters most straight on your Start screen, and get instant access to your people, apps, sites and more so you can spend less time searching and more time doing.
After a success of Windows 7 Loader and the number of reviews I got from my YouTube channel for the Windows 7 loader. I thought of giving Windows 8 Loader right away. Windows 8 Loader/Activator will help you to activate your copy of Windows 8. This means you can use all the features of Windows 8. This Works With Windows 8 Pro Build 9200* Tested And Approved.
After you install Windows 8, make sure you run the application “Windows 8 Activator” as administrator. To do so, right click on it and select “Run as administrator”. Once you activate, it will restart and viola your copy is activated. Credits to “The Dark”
Download Windows 8 Activator.
Enjoy…
Best 10 Halloween SWF Files
Halloween also known as All Hallows' Eve, is
a yearly celebration observed in a number of countries on October 31st night. Here
are some of the best Halloween SWF files which you can send these files to your
friend or share them with your friends.
Direct Links
Are You Ready?
Come On In!
Direct Links
Are You Ready?
Come On In!
Welcome
to my home
My favorite two
Sending Some Halloween
My favorite two
Sending Some Halloween
Predicting
a spooky...
Have a creepy, fun filled and memorable Halloween. Enjoy…
Have a creepy, fun filled and memorable Halloween. Enjoy…
NetCut – Cut off Wi-Fi Users
Tired of slow Wi-Fi connection in your area? I have a solution, which will help you to increase your net speed. Many people don’t know about this tool so if you tell it to others, It will be of waste after some time , so keep it up to you only.
When most of you go to a free public Wi-Fi connection or even paid but get angered of so many people using the Wi-Fi that you hardly get any speed, then what this software does is that it uses a vulnerability in ARP protocol and gives you the list of all the people who are connected to Wi-Fi right now. Then you can cut anyone of their connection or even all and enjoy the Wi-Fi Alone! The software name is NETCUT, Google it to know more about it.
And here I already uploaded it for you guys and I verified its working, so next time when you are at an airport or any public Wi-Fi connection, just cut everybody's connection and enjoy alone with a huge speed! Enjoy…
Download NetCut Now.
Sunday, October 14, 2012
Cybergeddon: Cyber-crime TV Series
Cybergeddon is a Digital Crime Thriller from CSI creator Anthony E. Zuiker, which, in partnership with Norton and Yahoo!, it brings to life the growing threat of cybercrime through immersive storytelling, social media and a gaming experience.
It’s a TV series based on cyber-crime. If you have liked watching movies like Die Hard 4 and Hackers, you will definitely love this one too. Watch a series already 9 episodes out, there’s a game too for your Android cell or iPhone. There’s also a tab for all access where you will how to protect yourself from cyber threats.
Visit Cybergeddon for more…
The Best Hacking Apps for Android (Hackadroid)
The Best Hacking Apps for Android, previously I had written on how to Wi-Fi spoof any network. Today I am sharing all the best hacking android (Hackadroid) apps that I just had my hands on. Here are they…
Wi-Fi
Analytics
A fancy Wi-Fi application. Displays all available points of access,
SSID, MAC addresses, encryption, and signal power. Signal Strength Widget
provides up to date, easy to access information on your android device’s
current Wi-Fi connection.
Net Swiss Tool Free / Fing
Scans wireless networks, displays the list of connected devices. Can scan each device separately and display a list of open ports. Besides, it performs ping, trace, wake-on-LAN, ARP, UDP-flood.
Shark
The very same as wireshark on windows. It goes perfectly well. Gets started on the device just like that. Creates logs in the *.pcap format and stores the logs on SD card. Has read phone state and identity system. (Nice application. Especially if the phone works as a Wi-Fi access point).
Download here.
DroidSheep
/ Facesniff
A plain and simple well-known application for Web session hijacking.
Connect it to an open access point, start and wait... By the way, sometimes it
can freeze the point itself. Use this software only for analyzing your own
security!
Hosts
Editor
Hosts Editor is a way to add, remove or comment out entries in the
hosts file. The hosts file allows the user to override an IP address of a
specific URL. A useful application, especially when the phone serves as a Wi-Fi
point.
kWS —
Android Web Server:
kWS is a lightweight and fast Web Server especially designed for android
mobile devices. It can be used to host websites and to serve files over HTTP.
kWS implements HTTP-1.0.
Router
Brute Force ADS 2
Real brute-force attack on Android! Each application tries to Brute
Force Basic Access Authentication. Simple and effective brute force for routers
admin/control pages! (Basic Access Authentication -> Base64) And you can
have free Wi-Fi connection.
Router
KeyGen
Guesses WPA/WEP passkeys to your Android smartphone and routers locate
somewhere in the neighborhood. The most of the times you scan the Wi-Fi networks
available around, they're protected with key. Router Keygen is an app that help
you out with that. If the routers of those Wi-Fi networks are encrypted with
WEP/WPA it will bring you the keys to access them.
This is all. Download them and enjoy exploring, some of the apps may be
priced.
Take Ownership of Any Folder in Windows
Most of the times, it happens when u try to open a folder and
it pops the message “Access Denied. Contact your System Administrative”. Taking
ownership of system files or folders in Windows systems is not a simple task. So,
here’s a pre-created Registry hack file created by Anonymous. There are
commands through command prompt too to take ownership.
Take ownership of them, you just need to InstallTakeOwnership.reg and next time pops that message, Just right
click that folder again and select “Take Ownership” . There’s also a registry
file to remove take ownership. Double-click the RemoveTakeOwnership.reg file
and click through the prompts. No reboot necessary.
Download Take
Ownership.
If anyone of you wants the actual commands, comment here with your email-id.
Enjoy…
Create Creative Facebook Timeline Profile
Facebook Timeline is now getting much more popular since, by adding two photos in your profile, the Cover Photo which acts as background and your profile picture. After Facebook Timeline became well known and used, Facebook users became creating some original and creative tricks like the images shown in this post using Photoshop. But very few of us know to use Photoshop. So, for those I have written this post to make their Creative Facebook Timeline profile.
Steps
1) Go to Tricked Out Timeline.
1) Go to Tricked Out Timeline.
2) Select a Template to use, there are 4 available for now.
You can view examples before using it.
3) Upload tour photo then adjust.
3) Upload tour photo then adjust.
4) Download and then upload on Facebook.
For more Facebook Cover Photos, click here. Also check out the Google+ Cover Photos here.
Enjoy and amaze your friends with a creative profile.
For more Facebook Cover Photos, click here. Also check out the Google+ Cover Photos here.
Enjoy and amaze your friends with a creative profile.
Google Plus Covers for your Profile
After Facebook introduced its Facebook Timeline which allowed users to add Facebook Cover Photo for profiles and fan pages, Google also introduced Google Covers for the Google+ profiles and pages. The Google Covers are similar to that of the Facebook Timeline covers, but the profile picture is placed on the right side with a larger size. Here are some of the Most Popular Google+ Covers.
Check this site if you want to create your own Google+ Cover, fully customizable as good as using Photoshop.
Also some
sites to get more Google+ covers.
G-Covers
Profilelift
GoogleCover
G-Covers
Profilelift
GoogleCover
XUS Screen Lock [Free Full Version]
XUS PC Lock
offers a new and fun way for you to lock your computer. You must be using this
screen lock on your smartphones, and you have a feature to lock your computer
is the similar fashion with more advanced features.
It supports
Multiple Monitors and has Anti Key-Logger. XUS Dynamic Password Technology makes
your computer more secure. This is the funniest, most customizable way to lock
your computer. Having 3 built-in patterns: 3x3, 4x4, 5x5 of your choice.
Also, be able to disconnect internet access when system is locked and a back up pattern feature. It has Auto-lock feature when Windows startup or in idle mode. It alerts if the incorrect pattern is entered a maximum times. Its completely customizable. Custom background image, and lots of customization options for the look of the locked screen. It is really awesome!
Download Now and have the power to control your system. I have provided the full version with key. Enjoy…!
Send Free Fax from Internet
Fax is one of the best still-alive technology to send information that a paper contain. However, say you're at home and you need to send a fax. And you don’t have fax machine. So now you have to find a fax machine? Pay outrageous fees at the local copy shop? How about sending it for FREE and from Internet? This is very easy tutorial about How to Send Fax from Internet Free.
How to Send Fax from Internet Free
2) Fill all the fields: -
Sender Information: - Name, Email.
Receiver Information: - Name, Fax# (International format).
3) After filling the info, Choose the files you want to send (you can send
up to 3 Documents one time).
4) Click “Send Free Fax Now”.
Note: Most of these services offer a few free faxes initially, and then offer a paid service for further faxes. So make the best use of them in the need of urgency.
Android Wi-Fi Network Spoofer
Network Spoofer is a powerful networking app for Android devices that lets you spoof people on your network. Network Spoofer lets you mess with websites on other people’s computers – flip pictures, change Google searches, redirect websites, swap YouTube videos and many more features to come.
After downloading simply log onto a Wi-Fi network, choose a spoof to use and press start. Please note that there is no intention for Network Spoofer to include any malicious features.
This application is a fun demonstration of how vulnerable home networks are to simple attacks. Network Spoofer packs lots of prank-potential. Please use it responsibly, do not attempt to use Network Spoofer on any corporate or other non-residential networks. As the use of NS, will be considered malicious hacking by network administrators.
Note:- Your device must be rooted for Network Spoofer to work.
Download from here. Developed by Digitalsquid.
So have fun hacking into people's Wi-Fi. Enjoy…!
WebCam Looker - Video Surveillance Software
WebCam Looker - is motion detection software security through your cameras or other sources of images. As soon as movement is detected inside or around your property, the program immediately sends alarm signals. It can cause any of the following: sound, SMS, email with attached image, network message, external application execution, area blinking, upload to ftp or web server, save to file or archive, etc.
The precise motion detector can be configured to watch multiple zones
and each can be of any shape. You can record your favorite TV-programs, make
snapshots of what your cameras see, or monitor only at certain times, e.g. at
daylight time or evenings/weekend, using the scheduler.
Stealthily monitor all local and remote cameras or what is on your computer's monitor (live screenshots) in real time remotely via Internet or review the archive of stored images, using any web browser or your mobile phone. This access can be password protected.
Web Cam Looker can be set up to turn your PC into a full function Web server and publish images or live video streaming into Internet. You can create a whole web site or small home page with dynamically updating images. Or you can use it for simpler tasks, if you do not need to use the web-server features.
WebCam Looker is the most cost effective solution for your home or office. It uses the new possibilities of our modern computers to give you all of the features of a professional video-security system at a fraction of the cost of traditional systems.
Requirements
You don't need any special equipment. Any webcam or IP camera is enough
to transform your PC into video surveillance or piece of the safety system.
Features
Features
Unlimited number of video sources
The sources can be applied: web cams, TV tuners, video cameras, video
capture cards and devices connected through them;
Multiport video capture cards;
Digital cameras (allowing to publish high resolution images);
Network IP cameras, including JPEG and MJPEG-video.
World Internet cameras and random slideshow;
Image from the screen of a computer.
Download WebCam Looker v6 Full Version.
Enjoy...
Download WebCam Looker v6 Full Version.
Enjoy...
Hack a remote PC using IP address
Hacking your
friend’s PC and installing software’s such as keyloggers and getting private
information. So I’ll show you how to hack a remote PC using an IP address.
Steps:-
1) First you need find the IP address for that, refer here.
2) Once you get the IP address, you need to check if it is online. To know the status just ping the IP address, if it is online it will reply.
Example:- Open cmd(Command Prompt) and type ping 127.0.0.1
3) If the IP address is online, scan for the open ports. Open ports are like closed door without locks, you can go inside and outside easily.
Steps:-
1) First you need find the IP address for that, refer here.
2) Once you get the IP address, you need to check if it is online. To know the status just ping the IP address, if it is online it will reply.
Example:- Open cmd(Command Prompt) and type ping 127.0.0.1
3) If the IP address is online, scan for the open ports. Open ports are like closed door without locks, you can go inside and outside easily.
Use Advanced Port Scanner to
scan all open and venerable ports. Or use Blues Port Scanner - This
program will scan the IP address that you chose and identify open ports that
are on the target box.
4) Now you’ve IP address and open port address of the victim, you can now use telnet to try to access them.
Make sure that you’ve telnet enabled in your computer or install it from Control panel > Add remove programs > Add windows components.
5) Now open command prompt and use telnet command to access to the IP address. Use the following syntax for connection.
4) Now you’ve IP address and open port address of the victim, you can now use telnet to try to access them.
Make sure that you’ve telnet enabled in your computer or install it from Control panel > Add remove programs > Add windows components.
5) Now open command prompt and use telnet command to access to the IP address. Use the following syntax for connection.
telnet [IP
address] [Port]
Example:- telnet 127.0.0.1 23
Example:- telnet 127.0.0.1 23
6) You’ll be asked to input login information.
Example:-
Login: admin
Password:
You will have to guess the password. If you can’t, use brute force attack to get the password. Use this tool.
I would prefer you to use Backtrack OS to hack a remote PC if you are familiar with it, and then watch this video tutorial.
If any queries, comment below. Share this page with your friends. Enjoy.
How to Download Full Google Books for Free
The easiest way to download an Entire Google Book. This simple software is used to download books from Google, though Google only allows you to view a Sample of its e-books. Google Books Downloader Lite is an open-source software utility that will let you download books that is available on Full View from Google Books.
Steps to download the book
1)
Download Google Books
Downloader Lite
2) Go to Google Books and Search for an E-Book that you like.
Note: The
E-book must provide Full-View (Preview)
3) Copy
the Link of the Book.
4) Paste the Link that you copied in the utility, Click Download.
Done! The book will be saved as .PDF file in the folder specified on Output Folder.
Also, visit here to download the eBook from your computer cache. Or you can use GooReader to download the books from Google, but it’s paid.
4) Paste the Link that you copied in the utility, Click Download.
Done! The book will be saved as .PDF file in the folder specified on Output Folder.
Also, visit here to download the eBook from your computer cache. Or you can use GooReader to download the books from Google, but it’s paid.
Surf Anonymously Online [Free]
It's easier than ever for the government, Web sites and private businesses to track exactly what you do online, know where you've visited, and build up comprehensive profiles about your likes, dislikes and private habits. And with the federal government increasingly demanding online records from sites such as Google and others, your online privacy is even more endangered.
But you don't need to be a victim. There are two ways, you can do to
keep your surfing habits anonymous and protect your online privacy.
1) Ultrasurf
Ultrasurf is one of the world's most popular anti-censorship,
pro-privacy software, with millions of people using it to bypass internet
censorship and protect their online privacy.
It encrypts online communications and hides your IP from websites
visited. Default opens Internet Explorer Browser.
Download from the official site.
2) TOR Browser
The Tor software protects you by bouncing your communications around a
distributed network of relays run by volunteers all around the world: it
prevents somebody watching your Internet connection from learning what sites
you visit, it prevents the sites you visit from learning your physical
location, and it lets you access sites which are blocked. Default opens Firefox
Browser.
Download from the official site.
Both of these hide your IP address and your physical location. You can
check by going to IP2Location before
using and after using anyone one of these, you will come to know the difference
of your IP address.
Also there are many IP hiding software’s and VPN services, but the
above two are completely free. Also check out, How
to trace anyone’s IP address.