Sunday, December 1, 2013

Android KitKat 4.4 with some cool features

Meet the New Android KitKat 4.4 with some cool features

Android 4.4 KitKat is the latest update to the Google’s Android operating system which was released recently along with Google’s flagship phone Nexus 5. Let us see some of the cool new features in the latest Android Operating system.

1. “Ok Google”

Just say, “Ok Google” to activate the phone without touching it. Users can launch a voice search, send a text, get driving directions or play a song with the voice command. This feature was introduced in Moto X. Now it is available to all who are using KitKat.

2. New Caller ID

This is one of the new interesting feature of KitKat. For calls from numbers not listed in the user’s contacts, Android 4.4 will look for matches from businesses with a local listing on Google Maps.

3. Integrated Hangouts
The new Hangouts app on Android 4.4 also displays SMS and MMS messages.

4. Printing

Android 4.4 allows users to print photos, documents, and web pages from their phone or tablet. Users can print to any printer connected to Google Cloud Print, to HP ePrint printers, and to other printers that have apps in the Google Play Store.

5. Integrated Emonji

Android KitKat brings in the popular japanese Emoji characters to the default Android keyboard.

6. Advanced Multitasking

Android 4.4 takes system performance to an all-time high by optimizing memory and improving your touch-screen so that it responds faster and more accurately than ever before.

7. Immersive mode
This is also a new feature introduced in KitKat. The new immersive mode gives a full screen experience hiding all controls while reading a book, watching a movie or playing a game. Swiping on the edges brings back the status bar and navigation button.

8. Full Screen Album Art on Lock screen

KitKat will display a full screen album art on the lock screen while listening to music or streaming via Chromecast.


9. Improved UI

The app drawer now has a transparent background, so it shows the same wallpaper as your home screen. The wallpaper also extends through the system buttons and notification tray.

10. Support for low-end Smartphones
KitKat is said to support phones with as little as 512MB of memory.Android KitKat will be able to run on inexpensive, low-end smartphones as well as the most advanced devices and this also could make the Android software more attractive to third-party app developers, who have been frustrated by what they call the “fragmented” nature of Android devices.
Some other features
  • Save files to Google Drive or another online storage system instead of your local storage.
  • Android 4.4 adds support for new types of sensors including step detectors, step counters, and geomagnetic rotation.
  • Google wants to make it easier for developers to create third-party TV controller apps that work across devices by building support for them into the operating system itself.
  • There is a inbuilt screen recording utility aimed at developers who want to record high-quality MP4 videos.
  • There is system-level support for NFC. It works with any mobile carrier and lets apps manage your data either using your device or cloud storage.
  • The new phone app automatically prioritizes your contacts based on the people you talk to the most.
  • Android 4.4 now supports the Message Access Profile (MAP) so Bluetooth-enabled cars can exchange messages with your devices.
  • These are some of the cool features :)
Share your experiences here

Ways To Increase Your Pc’s Gaming Performance


Game Booster is an easy-to-use program that shuts down unnecessary system processes in order to improve the performance of resource-thirsty games. With an intuitive interface that makes it easy to switch between gaming mode and normal mode, Game Booster is a simple but powerful program.


TUTORIAL ON HOW TO BOOST ANY PC GAME’s PERFORMANCE:

1. Prepare the game you want to play with high FPS…
2. Download “Game Booster v 3.0″ from this http://www.iobit.com/gamebooster.html
3. Install Game Booster v 3.0 and Launch it.
4. You’ll notice 2 new icons: 1st=”Game Booster” and 2nd=Switch to gaming mode …
5. First method is simple : Launch the shortcut name “Switch to gaming mode” and start your game…
Second method is perfect : Launch game booster and click “Configure” button
Now select all unnecessary programs and services…
Now click Apply and click “Add” button and add your game exe.
Click “Boost & Launch” to start your game…
Enjoy playing last games with super boosted FPS…

Friday, November 29, 2013

Hide Entire Drives Partition Without Registry


Here is a cool technique which hides entire hard disk drives by a simple procedure.
This is the best security tip to be employ against unauthorised users.

1) Go to Start > Run > type "diskpart".
A DOS window will appear with following description.

DISKPART>

2) Then type "list volume"
The result will look something like one as shown below-


3) Suppose you want to hide drive E then type "select volume 3"
Then a message will appear in same window { Volume 3 is the selected volume}

4) Now type "remove letter E"
Now a message will come { Diskpart Removed the Drive letter }

sometime it requires to reboot the computer.
Diskpart will remove the letter.

Windows XP is not having capabilty to identify the unknown volume.
Your Data is now safe from unauthorised users.

To access the content of hidden Drive repeat the process mentioned above. But in 4th step replace " remove" by "assign".
It means type "assign letter E".

Ethical Hacking E-Books


-: Ethical Hacking eBooks :-



-: Hacking Exposed-5 :-
One of the international best-selling. The book walks through how to use the more powerful and popular hacker software, including L0phtCrack. This new edition has been updated extensively, largely with the results of "honeypot" exercises (in which attacks on sacrificial machines are monitored) and Windows 2000 public security trials. There's a lot of new stuff on e-mail worms, distributed denial-of-service (DDoS) attacks, and attacks that involve routing protocols. Hacking Exposed wastes no time in explaining how to implement the countermeasures--where they exist--that will render known attacks ineffective.
 (Size :- 18.5 MB) http://www.insecure.in/images/rar.gif

-: Internet Denial Of Service :-
Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack. Inside, you'll find comprehensive information on the each and every topic relating denial-of-service attacks.
 (Size :- 2.04 MB) http://www.insecure.in/images/rar.gif

-: Computer Viruses For Dummies :-
It offers real, practical solutions to help ordinary users keep viruses out of their e-mail in-boxes-and explains how to respond when one slips through-
* In 2003, there was a major virus attack almost every month, which cost businesses worldwide an estimated $55 billion and did untold damage to home computers.
* Explains what viruses are and how they work, profiles major anti-virus software packages, shows how to keep anti-virus software updated, and helps people adopt safer computer work habits.
* The book’s value price and compact size will make it irresistible to people who need to protect their home PC or network.
 (Size :- 2.33 MB) http://www.insecure.in/images/rar.gif




-: Hackin9 :-

This book will help you learn :-
* How to use Google to find sources of personal information and other confidential data.
* How to find information about vulnerable systems and Web services.
* How to locate publicly available network devices using Google.
 (Size :- 1.78 MB) http://www.insecure.in/images/rar.gif

Wednesday, November 27, 2013

Trojan Horse Complete Information

The TROJAN HORSE

What is a Trojan ?
"A Trojan Horse, or Trojan, is a term used to describe malware that appears, to the user, to perform a desirable function but, in fact, facilitates unauthorized access to the user's computer system". - Wikipedia

"A Trojan horse is an apparently useful program containing hidden functions that can exploit the privileges of the user [running the program], with a resulting security threat.". - CERT Advisory

Types of Trojan :- 


The different types of Trojan Horses are as follows-

1) Remote Access Trojans :- Abbreviated as RATs, a Remote Access Trojans are potentially the most damaging, designed to provide the attacker with complete control of the victim's system.

2) Data Sending Trojans :- A type of a Trojan horse that is designed to provide the attacker with sensitive data such as passwords, credit card information, log files, e-mail address or IM contact lists. They could install a keylogger and send all recorded keystrokes back to the attacker.

3) Destructive Trojans :- Once this Trojan is installed on your computer, it will begin to systematically or completely randomly delete information from your computer. This can include files, folders, registry entries, and important system files, which likely to cause the failure of your operating system.

4) Proxy Trojans :- A type of Trojan horse designed to use the victim's computer as a proxy server. This gives the attacker the opportunity to conduct illegal activities, or even to use your system to launch malicious attacks against other networks.

5) FTP Trojans :- A type of Trojan horse designed to open port 21 (FTP) and acts like an FTP server. Once installed, the attacker not only could download/upload files/programs to victim's computer but also install futher malware on your computer.

6) Security Software Disabler Trojan :- A type of Trojan horse designed stop or kill security programs such as an antivirus program or firewall without the user knowing. This Trojan type is normally combined with another type of Trojan as a payload.

7) DoS Attack Trojans :- These trojans are used by the attacker to launch a DoS/DDoS attack against some website or network or any individual. In this case they are well known as "Zombies".

How Trojan Works ? 
Trojans typically consist of two parts, a client part and a server part. When a victim (unknowingly) runs a Trojan server on his machine, the attacker then uses the client part of that Trojan to connect to the server module and start using the Trojan. The protocol usually used for communications is TCP, but some Trojans' functions use other protocols, such as UDP, as well. When a Trojan server runs on a victim’s computer, it (usually) tries to hide somewhere on the computer; it then starts listening for incoming connections from the attacker on one or more ports, and attempts to modify the registry and/or use some other auto-starting method.

       It is necessary for the attacker to know the victim’s IP address to connect to his/her machine. Many Trojans include the ability to mail the victim’s IP and/or message the attacker via ICQ or IRC. This system is used when the victim has a dynamic IP, that is, every time he connects to the Internet, he is assigned a different IP (most dial-up users have this). ADSL users have static IPs, meaning that in this case, the infected IP is always known to the attacker; this makes it considerably easier for an attacker to connect to your machine.

       Most Trojans use an auto-starting method that allows them to restart and grant an attacker access to your machine even when you shut down your computer.


How Trojan Horses Are Installed ?  Infection from Trojans is alarmingly simple. Following are very common ways to become infected that most computer users perform on a very regular basis.
·        Software Downloads
·        Websites containing executable content (ActiveX control)
·        Email Attachments
·        Application Exploits (Flaws in a web applications)
·        Social Engineering Attacks

The Removal :- 
Antivirus software is designed to detect and delete Trojan horses ideally preventing them from ever being install


1) NetBus :-




·        Latest Version: NetBus 2.10 Pro
·        Developer: Carl-Fredrik Neikter
·        Default Port: 20034 (variable)
·        Language: Delphi
·        Operating System: Windows 95/98, NT4 or later
·        Type: Remote Access
·        Download:  NB2ProBeta.zip






2) Back Orifice XP :-




·        Latest Version: BOXP Beta 7
·        Developer: Javier Aroche
·        Default Port: 15380
·        Language: Microsoft Visual C++ 6.0
·        Operating System: Windows 95/98/ME/NT/2000/XP
·        Type: Remote Access
·        Download:  boxp_beta7_bin.zip


3) SubSeven / Sub7 :-




·        Latest Version: SubSeven 2.2
·        Developer: Mobman
·        Default Port: 1080, 1369, 5873, 27374 (variable)
·        Language: Delphi
·        Operating System: Windows 95/98/ME/NT/2000
·        Type: Remote Access, Keylogger, Eavesdropper, Sniffer, Proxy server, FTP server
·        Download:  Subseven.2.2.zip


4) Beast :-






·        Latest Version: Beast 2.07
·        Developer: Tataye
·        Default Port: 6666
·        Language: Delphi
·        Operating System: Windows 95/98/ME/NT/2000/XP
·        Type: Remote Access, Keylogger
·        Download:  Beast_2.07.rar



Glogle Hacking

Google Hacking 

Basic Operators:-
1) And (+) :- This operator is used to include multiple terms in a query which is to be searched in google.
example:- if we type "hacker+yahoo+science" in Google search box and click search, it will reveal the results something which are related to all the three words simultaneously i.e. hacker, yahoo and science.

2 ) OR (|) :- The OR operator, represented by symbol( | ) or simply the word OR in uppercase letters, instructs Google to locate either one term or another term in a query.

3) NOT :- It is opposite of AND operator, a NOT operator excludes a word from search.
example:- If we want to search websites containing the terms google and hacking but not security then we enter the query like "google+hacking" NOT "security".


Advanced Operators:-
1) Intitle :- This operator searches within the title tags.
examples:- intitle:hacking returns all pages that have the string "hacking" in their title.
intitle:"index of" returns all pages that have string "index of" in their title.
Companion operator:- "allintitle".

2) Inurl :- Returns all matches, where url of the pages contains given word.
example:- inurl:admin returns all matches, where url of searched pages must contains the word "admin".
Companion operator:- "allinurl".

3) Site :- This operator narrows search to specific website. It will search results only from given domain. Can be used to carry out information gathering on specific domain.
example:- site:www.microsoft.com will find results only from the domain www.microsoft.com

4) Link :- This operator allows you to search for pages that links to given website.
example:- link: www.microsoft.com
Here, each of the searched result contains asp links to www.microsoft.com

5) Info :- This operator shows summary information for a site and provides links to other google searches that might pertain to that site.
example:- info:www.yahoo.com

6) Define :- This operator shows definition for any term.
example:- define:security
It gives various definitions for the word "security" in different manner from all over the world.

2013 Free DoCoMo 3G Trick


New tata docomo highspeed 3g trick witht 9 proxy server.This trick you are visit in only mobile tips and tricks.This tata docomo trick is fine work in south and north.This proxy trick speed in tata docomo 3g coverage area in 850kbps.
=> Steps


*send sms-----DIVEIN to 52270
*install original settings
*restart your mobile
*edit settings

ip/proxy settings-10.124.94.9(all)

for dive in-121.170.121.191

for internet-10.124.26.94

port-8080

home page-http://internet.tatadocomo.com.t9space.com.php

Thursday, October 10, 2013

Youtube Missile trick

Youtube Missile trick
I had previously share cool youtube tricks like watching 18+ youtube videos without signing in or Downloading youtube videos without any software. Today i will share an amazing trick that i came across we will call it youtube missile trick. Since google is celebrating geek week it introduced this trick.

How To Do ?


   1. Open youtube and click on any video you would like to play
   2. Pause the videol
   3. Now type 1980 and see the magic


Once you start this game missile will start coming from the top. The job of missile is to destroy the video. You can protect the video by firing back using your mouse.