Your Library for the latest IT Security News, Alerts, Threats and Tips and Android Games
Recent Articles

Thursday, 1 January 2015

50 Dos and Don’ts of Internet Security for the Year of 2015

Thursday, 1 January 2015 - 0 Comments



This post is to say thank you to all the fans of Daily Blogg Tips with a recap of some of the most important dos and don’ts of Internet Security. Read on.


The first official post on our blog was live on October 19th, 2006. And since then, we have been diligently striving to keep you updated with the latest happenings in the computer security world. As we are just a couple of days away from welcoming yet another new year, we would like to thank all our fans, readers, and followers for their readership and contribution to this blog. And as a thank you note, we are recapping one of our most commented and read posts – The Dos and Don’ts of Internet Security. We hope that the following tips help enhance your digital experience for the coming year.

Dos and Don’ts of Internet Security


#1. While giving away personal or financial information on any website, check if its URL begins with ‘https’. Also look for the lock icon, which indicates that the connection is secure.

#2. Never shop online, make financial transactions or login into accounts over free, unsecured WiFi networks.

#3. Create long, unique, and hard to guess passwords. Never keep the same password for different online accounts.

#4. Enable Secure Browsing for your Facebook account.

#5. Keep your computer’s Firewall ON

#6. Avoid making your personal information public on social media sites and Internet in general.

#7. Avoid checking ‘Keep me logged in’ or ‘Remember me’ options on websites, especially on public computers.

#8. Use your primary email address to stay in touch with people you know or are acquainted with.

#9. Never use your official email address for social media sites.

#10. For social media sites, use an email address that you do not use for important communications.

#11. Tighten your privacy settings on Facebook so that only your friends are notified about your activity.

#12. Never use any of your personal information such as name, date of birth, address, etc., as your password.

#13. While you are online in a public setting such as a coffee shop, mall, airport, etc., watch your back to make sure no one’s snooping on you.

#14. Never trust emails asking for your personal or banking information. Be extra cautions against links or attachments in unknown or unwanted emails. Verify any such communication with the sender first.

#15. Do away with old accounts that you do not use anymore.

#16. Do not make your photos or videos public on social media sites. Keep them visible to friends you know, and your family.

#17. Never respond to pop up ads that may come up on your screen. Close such pop ups from the the task manager; press Alt+Ctrl+Delete.

#18. Before downloading any free software, research on the software and the website hosting it.

#19. Avoid visiting inappropriate websites or websites that you are not fully aware of.

#20. Beware of files with multiple extensions.

#21. Always log out of online accounts when you are done. This is especially important when you are using a public computer.

#22. Do not click or share posts on Facebook that claim to show any unusual content such as shocking videos or magical illusions. Verify such news from other sources.

#23. Access your bank’s website by manually typing its URL in the address bar.

#24. Do not click any links in emails to access your bank’s website.

#25. Keep your software and operating system up-to-date.

#26. Do not install software that comes as an attachment in emails.

#27. Always shop from reputed and know online stores.

#28. Update the Internet browsers and software on your computer.

#29. Use up-to-date security software that offers multilayered protection.

#30. Increase your awareness of cyber security and share the same with friends and family.

#31. Avoid online shopping on public computers or networks.

#32. If you are buying from an online website for the first time, do a little research about the site and go through its privacy policies.

#33. Change your Internet banking passwords at periodical intervals and never share them with anyone.

#34. Avoid saving your credit/debit card information on websites and web browsers.

#35. Never share your financial details on phone or email, even if the caller/sender seems genuine. Remember, people in cyberspace are not always what they seem to be.

#36. Avoid downloading software from unverified publishers.

#37. Always lock your computer when not in use. Do not leave it unattended, especially in public places.

#38. Keep passwords that have a mix of uppercase and lowercase letters, numbers, special characters, and are at least 8 characters long.

#39. Avoid public networks for accessing websites that require you to sign in to access any information.

#40. If you store any critical information such as social security number, credit card number, bank account details, passwords, etc., in external storage devices, ensure that the data is encrypted.

#41. Accept friend requests only from people you know and have met with in person.

#42. Treat an online stranger in the same way as you would treat a stranger in the real world.

#43. If you suspect that a message from a friend is fraudulent or strange, call or meet the friend to discuss it.

#44. Protect your device with a screen lock. Turn the automatic screen lock function ON.

#45. Don’t root or jailbreak your device. It will make your device vulnerable to attackers.

#46. Install apps only from trusted and official sources.

#47. Turn OFF Wi-Fi, Location Services and Bluetooth when not in use.

#48. Avoid sending or saving personal & overly sensitive information on your mobile device.

#49. Avoid mobile apps that ask for unnecessary permissions.

#50. Install a mobile security app with features such as Anti-malware, Anti-theft, Call & SMS filter, Privacy Protection and Remote Device Management.

And that would be all for the top 50 dos and don’ts of Internet security that will protect you from online threats and hackers this year and the years to come. Have A Happy and Splendid New Year 2015!

Hacker fakes German minister’s fingerprints from HD photos




Security analysts have always believed that fingerprints are a foolproof replacement for passwords and authentication protocols. However, a new development in this matter has literally toppled this theory and altered the game. When fingerprints are used as an authentication protocol, the single biggest concern is what to do if the fingerprint in question gets copied. This is exactly what has been demonstrated by a German hacker at a recent technology convention.
Jan Krissler, a hacker also known as Starbug, recently showcased some rather interesting news at the Chaos Communication Congress (CCC) in Germany. Interestingly, the CCC happens to be Europe’s largest association of hackers so it’s no surprise that this was the location for such a noteworthy revelation. Revealingly, Starbug demonstrated his technique for stealing fingerprints by simply analyzing a few High-Definition pictures of his target, in this case – German Minister of Defence, Ursula von der Leyen.

According to Krissler, faking these fingerprints was far easier than he thought possible. All he needed were a few close-range photos of his target in order to reverse engineer the fingerprints. He gained these photos from several press releases issued by the minister’s office and another that he took himself from a few meters away. With the help of commercially available software called VeriFinger he was then able to replicate the fingerprints of the Defence Minister of Germany, the country with the world’s 4th largest GDP and a leader in several technological and military fields.

After the demonstration, Krissler jokingly added – “After this talk, politicians will probably wear gloves when talking in public.” While that seems like a logical expectation, we doubt that will be the case. But we sincerely hope that politicians heed this warning and demonstration and take care to avert such cases in this modern age of cyberespionage, international cyberwarfare and other technology related crimes.

Krissler aka Starbug, is certainly not new to the hacking of biometric security and authentication techniques. When the Apple iPhone 5S was released in 2013, he successfully spoofed the highly publicized Apple TouchID sensors within 24 hours. He achieved this feat with the help of a finger smudge on the screen, wood glue and sprayable graphene. However, for his latest hack demonstration, it is scary that he does not need physical access to either a device or a finger. Makes you wonder how secure high-level authentication protocols really are.

A notable workaround for this is for users to not think of biometric security as a replacement for passwords or other authentication. While your fingerprints may be unique to you, the fact is they are not a secret. Anyone who is adequately motivated can easily get hands on your fingerprints through several innovative techniques. Instead, biometric security and fingerprint authentication should be used as a supplement for passwords. Starbug also agreed in 2013 by stating – “I consider my password safer than my fingerprint. My password is in my head, and if I’m careful when typing, I remain the only one who knows it.”

Interestingly, another novel hack technique was also showcased at the conference and this is known as “Corneal Keylogging”. This trick allows a hacker to gain someone’s passwords by simply gaining control of the camera of his smartphone. With this control, a hacker can simply read what someone is typing on the screen by analyzing HD photographs of the reflection of the screen in the user’s eyes. This technique may sound implausible to some, but the secondary cameras or front-facing cameras of smartphones today are strong to make this possible.

So while we all hope for and look towards a safe and secure 2015, advanced hack attacks such as this are constantly being built and showcased in all corners of the globe. It just goes to show that when it comes to security, there is no rest for the wicked.

Sunday, 28 December 2014

Worlds Lowest Priced Quad core Smartphone Launched

Sunday, 28 December 2014 - 0 Comments




Smartphone Mobile Manufacturer "JIVI" the budget smartphone has launched its new phone Jivi JSP Q56. The company claims that it is India's most expensive smartphone Quad core processor. It calls for Rs 4300 only Amazon can be purchased from India.

It has 4.5 inch IPS FWVGA touchscreen display Jivi JSP Q56, 512 MB RAM, 4 GB internal memory, 32 GB Micro Card slot, 1.2 GHz Quad core  processor, also it have 8-megapixel rear and 2 megapixel front camera has features like. The phone SIM slot Micro and Mini are two different size. In addition, the phone battery 2000 mAh, 240 hours of stand-by time and talk time is 10 hours. 4.4 operating system that runs on the phone Android KitKat. It has also 3G, Wifi, Bluetooth, EDGE, GPRS, GPS is the Support. Also Hindi, Urdu, Bengali and Arabic languages are also Support.

As a reminder, the first call in a few months JSP20 Jivi launched the Rs 1,999. With this phone, the smartphone market Jivi was debuted.

Wednesday, 24 December 2014

LG Launched the first Transparent Phone Fxo

Wednesday, 24 December 2014 - 0 Comments




LG has Launched the Transparent Phone Fxo. The company teamed up with Mozilla Firefox in Japan its first smartphone operating system is launched. The phone will start selling in Japan yesterday. The good thing about this phone is that its front, side and back of the panel are completely Transparent. Its price is around Rs 26,300.


Firefox 2.0 running on the operating system of the phone 4.7 inch display, quad-core 1.2 GHz Qualcomm Snapdragon 400 processor, 1.5 GB of RAM, 16 GB inbuilt storage, 64 GB Micro SDXC card slot, 8-megapixel rear camera with LED flash, 2.1 megapixel front camera, 2370 mAh battery that features such as. The phone 4G LTE and NFC is the Support.


The striking feature of LG Fx0 is its neatly packaged transparent back-cover, which might appear dainty but is capable of protecting the phone during accidental fall. Other notable aspect is the gold hued home button with earth embellishment.

Though the new LG FxO's design language is praise worthy, its internal hardware seem little sub-par for its price-tag of ¥50,000 Japanese Yen (around ₹26,350/$415/€341).

The new LF Fx0 is expected to go on sale initially in Japan later this month. However, there is no word on whether the phone will made available in other regions. As of now, Firefox OS based devices are sold in 29 countries including India.


Tuesday, 23 December 2014

Finally! Windows 10 Preview and Download 32 bit and 64 bit eng

Tuesday, 23 December 2014 - 0 Comments



Windows 10 Preview: The Start Menu Returns

The most obvious thing about Windows 10 is that, yes, the Start Menu is back, and it’s just as welcome as you might expect. The Start Screen was a UI design fail of epic proportions and being able to go back to the familiar pop-up menu is so much more efficient.

Of course, it isn't just that the Start Menu is back. It has also changed. Now the Live Tiles of the Start Screen are embedded within the Start Menu, providing yet another area for shortcuts (along with the taskbar, normal menu items and desktop) to opening your apps. Those Tiles that are actually Live will also show previews of app information, such as a message notification or the day’s weather.

It’s quite a nice addition both visually and because there is the potential there to provide a useful snapshot of your other apps. We’re not quite at the stage of finding it useful yet, but we can see the possibilities.

Things we’re not so keen on are that by default there is both a search button and a search function in the Start Menu right next to each other; that the Control Panel is removed from the list of apps by default; and that the power options are at the top of the menu, tucked away between the Live Tiles and user profile button.

But the search is at least quite powerful now, with results from Bing included along with Windows Store matches and local file matches, and this is a preview so there's plenty of time for Microsoft to tweak and complete the design.

If the Start Menu didn't already, it’s the inclusion of virtual desktops that really marks out how directly Microsoft is trying to please the desktop power users with this release of Windows. It isn't as slick as the virtual desktop integration in Mac OS, but it's a really useful addition.

New desktops can be added by either pressing Windows Tab or clicking the new Task View button. These bring up a new live app-switching interface below which is the option to add new desktops.

Once you've added a new desktop you can, from the same interface, move apps between them and rearrange them. Apps that are open in other desktops are underlined in the taskbar where if you click them it’ll switch to that desktop, which can actually be a little annoying if you just want to open another instance of that app and don’t know the keyboard shortcut.

Another really, really obvious nod towards ingratiating power users is that Microsoft has finally updated the Command Shell, at least a little bit.

Now users can use the familiar keyboard shortcuts of the rest of the Windows interface, with Copy and Paste and Ctrl/Shift cursor based character selection now available.

The most obvious benefit of this is that you can copy and paste complicated command instructions from the web straight into the prompt, which you couldn't do before. Sadly, you still can’t delete a highlighted selection but at least it’s a step in the right direction.

License Key For Windows 10: NKJFK-GPHP7-G8C3J-P6JXR-HQRJR

32 Bit Version

64 Bit Version

Monday, 22 December 2014

Simple Tips For Your Website Or Blogs Traffic

Monday, 22 December 2014 - 0 Comments




Most online businesses dream of having a highly popular blog. It’s good for your brand and ultimately serves to drive wave after wave of potential customers your way.

There are an almost unlimited number of ways to increase traffic to your blog, but if you’re stuck for ideas, here are 101 simple tips to get you started. Enjoy!

Content Makes King


  1. Write eye-catching headlines.
  2. Write excellent content — make a name for blog as a source of informative, useful, funny, entertaining, or inspiring articles.
  3. Write longer posts — expand on your content, fill out your blog posts and create truly epic content.
  4. Write shorter posts — follow Seth Godin’s example with short but sweet posts.
  5. Write more often — the more content you can produce, the better.
  6. Blog on a consistent schedule so your readers know when to expect new content.
  7. Write list blog posts — they get more traffic than any other kind of post.
  8. Write about current news stories.
  9. Write about topics trending on Twitter and in Google trends.
  10. Search forums in your niche to see what people are talking about and write an article about it.
  11. Ask your readers what they’d like you to write about.
  12. Write about something controversial and start a debate.
  13. Use link bait techniques to write content that promotes massive sharing.
  14. Explore your analytics, find out which is your most popular content and create more of the same.
  15. Interview influential people in your niche/industry.
  16. Create a “best blogs” list post and let the bloggers know you’ve included them — a bit of flattery can go a long way.

Enhance with Multimedia like Youtube etc.


  1. Use eye-catching photos and graphics to draw attention to your posts.
  2. Create Pinterest-friendly graphics with text on top of images to encourage people to pin your posts.
  3. Create an interesting infographic and share it with everyone you can think of.
  4. Upload videos to YouTube and Vimeo — make sure a link to your site is in the description and the video.
  5. Produce a podcast and distribute it through iTunes.
  6. Convert some of your content into a presentation and upload it to SlideShare.
  7. Host or take part in a webinar.
  8. Transcribe your videos and webinars for extra content.

Be Social on facebook, Twitter, Pinterest etc.


  1. Create a Facebook page for your blog. Use it to communicate with your readers and post a notification every time you publish a new blog article.
  2. Tweet all your posts when you publish them.
  3. Link to your posts on your Google+ page when you publish them.
  4. Use social media scheduling software like Buffer to post automatically on social media at the best times of the day.
  5. Link to your old posts periodically from your social media accounts.
  6. Join a collaborative Pinterest board and tap into the audiences of all the other bloggers pinning to that board.
  7. Regularly pin images from other sites. The more you pin, the more followers you’ll attract on Pinterest. Make sure your blog address is in your profile!
  8. Create a Tumblr blog and add content related to your niche as well as re-blogging content from your own site.
  9. Set up an Instagram account and tell your followers when you publish a new post.
  10. Comment on other blogs with insightful, useful comments.
  11. Link out to other bloggers generously.
  12. Share others’ posts on Facebook and retweet useful information to your readers.
  13. Reach out to other bloggers through their blog, by email or on social media — build relationships.
  14. Follow all the followers of other influential bloggers in your niche on Twitter.
  15. Include social sharing buttons on all your posts.
  16. Swap sidebar links and buttons with other sites.
  17. Include quotable phrases in your content and use Clicktotweet to encourage sharing on Twitter.
  18. Encourage engagement on your blog by ending your posts with a question.
  19. Link to all your posts with StumbleUpon.
  20. Add some of the users Twitter recommends you to follow every day — a percentage will follow you back.
  21. Reply to your comments and emails — show your readership that you’re interested in what they have to say
  22. Join blogger Facebook groups and communities to share knowledge and help to promote each other’s content.
  23. Create a LinkedIn profile with a link to your blog and contribute to groups and discussions in your field.
  24. Submit your best posts to Digg and Reddit.
  25. Add your favorite blogs to your blogroll – they’ll notice and may return the favor.
  26. Ask your blogger friends to include you in their blogroll.
  27. Collaborate with other bloggers to produce and share content.

Guest Posting And Link Building


  1. Guest post on other blogs — try pitching to one new blog every week.
  2. Include a link to your blog in every single online profile you have.
  3. Set up a free blog related to your niche with supplementary content on Blogger, Livejournal, Typepad etc. and reference back to your main blog.
  4. Invite others to guest post on your blog — they’ll send traffic your way when they link to the post.
  5. List your blog in as many free blog directories as you can find.
  6. Do interviews for other blogs.
  7. Take part in link parties and blog carnivals.
  8. Include your blog’s URL in your email signature.
  9. Post helpful information in forums related to your niche and include your blog’s URL in your signature.
  10. Post helpful articles on sites like Hubpages and Squidoo with links back to your blog.
  11. Submit articles to syndicated article directories like Ezine Articles. If your article is re-published on another blog you’ll benefit from extra links.
  12. Write and syndicate a press release linking back to your blog.
  13. Use a link inspection tool like Open Site Explorer to find where your competitors are getting links from and copy them.
  14. Add your blog to Technorati.
  15. Syndicate your blog on Amazon Kindle.

Search Engine Optimization


  1. Interlink your blog posts — link to old posts from new ones and edit old posts to link to more recent ones.
  2. Install a related content plugin to link each post to several other related posts.
  3. Use keyword research tools to write about the things that many people are searching for.
  4. Install an SEO plugin like All in One SEO Pack or the Yoast SEO plugin and optimize your site for search engines.
  5. Use relevant keywords in your image file names and alt tags.
  6. Use keywords in your post title and subheadings.
  7. Link out to authority sites in your niche.
  8. Set up Google authorship on your blog.

Use E-books And Freebies for More Traffic


  1. Run a blog giveaway or competition.
  2. Put an opt-in form on your website and send out a free newsletter.
  3. Publish an e-book and sell it or offer it for free on Amazon Kindle. Make sure your web address is in the first 10% of the book so it shows up in the sample.
  4. Write an e-book and offer a generous affiliate commission to encourage others to distribute it and link to your site.
  5. Create a free report and get site visitors to tweet or post about your site on Facebook to access it
  6. Offer a free e-course or digital product and encourage your readers to tell people about it.

Always Use as Many Offline Ideas


  1. Include your blog’s URL on your printed business cards and give them out to everyone you meet.
  2. Attend blogging conferences and networking events — distribute your business cards!
  3. Speak at conferences and special events.
  4. Tell your friends and family about your blog.

Other Miscellaneous Ideas

  1. Enter blogging competitions — your blog will usually be promoted on the website hosting the competition and social media for free.
  2. Answer questions on Yahoo! Answers and leave a link to your website.
  3. Ping your blog posts with a tool like Pingomatic.
  4. Create a WordPress theme and include a link to your site in the footer.
  5. Choose a beautiful theme for your blog.
  6. Review products and share your content with brands. They may link to your site from their social media accounts
  7. Ask a bigger blogger to be your mentor and start a case study about improving your blog.
  8. Submit photographs to free stock photography sites and Flickr and ask for a credit link back to your site.
  9. Include a link to your RSS feed.
  10. Include links to read your blog via Bloglovin‘.
  11. Link to your best and most popular posts from your sidebar.
  12. Go back to old posts and edit them to update and improve them from time to time
  13. Optimize your website for viewing on mobile devices.
  14. Include different ways to access your content such as category and date archives
  15. Include a search function on your blog.
  16. Create an app for iPhone or Android.
  17. Be helpful and be nice — be likeable and help to solve people’s problems and they will send traffic your way with no encouragement required.

Sunday, 21 December 2014

10 Simple and Common Tips to make a slow computer run faster

Sunday, 21 December 2014 - 0 Comments





A tired, old PC really can make your blood boil. But sometimes even new PCs can clog up and run slowly. The Independent came up with 10 great quick fixes anyone can perform.

1. Uninstall Unused Programs



When you buy a new PC the chances are there are a load of programs pre-installed onto it. Old PCs can simply accumulate these over time. Most of these you'll never use and some of them can often run in the background without you knowing, slowing your computer down in the process.
To remove these click "Start" then go to "Control Panel" then click "Programs and Features" and scroll through the list, uninstalling the ones you never use.
If you're unsure what should stay or go, use PC Decrapifier - a free piece of software that recommends what is worthwhile or not.


2. Delete Temporary Files

Whenever you use internet Explorer all your browsing history remains in the depths of your PC. The same thing happens when you install something. It's like never throwing away the packaging when you buy a new TV and by doing so it'll free-up space on your system. To get rid of all this clutter open "My Computer", select your main drive, click the "Windows" folder then open the folder inside that called "Temp". 


Or Also 

Goto: Run and Type Temp and Enter you will see a window. Delete all the things you seeing inside this folder. Otherwise use your mouse to right-click on the folder, and in the "View" options, choose "Details". Once this is done, select all the files that are older than the current date and press the delete key. Then go to the Recycle Bin on your desktop and empty it.


3. Install a solid state drive




If your PC takes an age or long time to turn on and be ready for action your hard drive might be the fault. Typically they have loads of moving components and can take a long time to fire up. A solid state drive uses flash memory (like a massive USB stick) and can read data a lot quicker therefore speeding up your start-up.

4. Get More Hard Drive Storage




No matter if you keep your computer tidy, if your hard drive becomes too full, it will affect the speed of your PC. If you use your system for processor-heavy tasks, such as recording video and media the likelihood will be that your drive will get chokka before you know it. Nowadays you can get mega storage drives over 1TB which is good for thousands of HD movies.

5. Stop Unnecessary Start ups




Whenever you switch on your PC some programs will automatically start to run in the background. Things like Skype and Spotify are guilty of this. All the applications running will use your computer's memory so ditch the ones you don't need running.
To do this click Start and type "Run". In the box that appears type "msconfig" and a box will appear, at the top click the "Startup" tab listing all the applications that run when your computer starts up. Either manually untick the ones that are unnecessary or click "disable all", but be sure to keep vital things like antivirus going.

6. Get more RAM (Random Access Memory) For PC



Have you noticed when you try to work on several applications at once, such as email, internet, and word your computer has a minor stroke when flicking between them? This is because you don't have enough RAM. This is memory used by your PC to run the programs and can be easily upgraded (and quite cheaply) if you know where to look.

7. Run a disk defragment



Don't be scared by the description, it's essentially a way to optimise your hard drive's efficiency.
To do this go to "My Computer", right-click on the hard drive and select "Properties". Under the "Tools" tab there should be an option to "Defragment Now".

8. Run a disk clean-up



Spring clean your whole system using this built-in tool which looks for unnecessary large files.
To perform this click "Start" then go to All Programs > Accessories > System Tools > Disk Cleanup



9. Vacuum out the dust From Motherboard


If you open up your PC and you won't believe how much dust gets sucked into it through the cooling fan. Dust can clog airflow, which is vital to keeping your system temperature down and if it overheats, its performance will slow.

Use a vacuum on a low setting to clean out the insides, but ensure the PC has been off for at least 30-minutes and it's disconnected from the mains. Also, go easy when you're poking around in there as you could dislodge some important cables.

10. Buy a new PC



Simple advice, but most effective if you've got a PC that should be cashing-in its pension. With the rise of tablet PCs and the low cost of components, prices of new laptops and desktop computers are so much more affordable than years ago. Save yourself a heap of trouble and think about it.

Micromax Low priced New Canvas Tab P470 Launched




Micromax has launched a new 7-inch Android Tablet. Canvas tab called P470 Tablet price has been fixed at Rs 6,999. December 20 has begun its sales.

Classy silver gray color will get P470 and Mystique Canvas tab. The 7-inch 1024 x 600 pixel IPS display in the tab Resolution, 1.3 GHz MediaTek MT 8312 chip, 1 GB RAM, 8 GB internal memory, MicroSD card slot up to 32 GB are such features. Android 4.4 operating system it runs on KitKat.

5 megapixel rear camera with all the tabs and 0.3 megapixel front camera. The tab with the 3200 mAh battery talk time and 158 hours standby time of 11 hours would be. As far as connectivity is concerned, P470 Canvas Tab Wi-Fi, Bluetooth, 3G is the Sport.

The Canvas Tab P470 also features support for 21 Indian languages, including Hindi, Gujarati, Punjabi, Malayalam, Tamil, and Kannada.


Micromax last month launched a new 8-inch Android tablet called the Canvas Tab P666, priced at Rs. 10,999. Notably, the Micromax Canvas Tab P666 is the first tablet from the popular handset maker packing an Intel chipset. It is powered by a 1.2GHz dual-core Intel Atom Processor Z2520 (4 threads, 1MB Cache) coupled with 1GB of RAM.

Some of the other key specifications of the Canvas Tab P666 are an 8-inch WXGA IPS display; 8GB of inbuilt storage which is expandable via microSD card (up to 32GB); a 5-megapixel rear autofocus camera; a 2-megapixel front-facing camera, and a 4400mAh battery.

Saturday, 20 December 2014

How To Crack or Activate an EXE File

Saturday, 20 December 2014 - 0 Comments




AFTER A VERY LONG Time blogged up…with this very new post on reverse engineering!!!


Today…we are going to learn how to crack a simple application…i.e an EXE file!!!!

Note: All Experiments are for only Educational Purposes. Dont Try hard.

Most of you might have encountered a scenario where the software you installed asks for the SERIAL key or LICENSE key!!! THIS IS ANNOYING ! :)

So…how to go about this….??????

Well, today most of the softwares are well secured and well-proofed from reverse engineering! But still…some aren’t!

This is a very simple tutorial which will let you a know a basic approach towards cracking a simple exe file…

SO LET US START!

1. This is a simple application which asks us for the license key..


2. We need to install a disassembler software to crack this application.

3. You may use any disassembler you want..
4. I am using IDA PRO Link Below
5. Install it and launch the application….you will see the following window after launching it.



6.  Drag and drop your exe file into the panel…

7.  Choose “load file as” MS-DOS Executable…click OK and Continue.

8.  By default its IDA View-A…Please choose “HEX VIEW-A”

9. Scroll down to find the line saying ” ENTER YOUR LICENSE KEY” (different for different applications,in my case it is this).


10.  Some where near that we found Google word next to the line saying “ENTER THE LICENSE KEY”..

11. AWESOME THIS IS  our LICENSE KEY!!! :P

12. Let us try “Google” as our key!


13. YEAH!!! IT WORKED!!!!

Ain’t that aweosme!!!  try building your own application and reverse engineer it to crack it!


THANKS! :)

Warning:

Reverse engineering any software without proper authorization and permissions is illegal. This tutorial is for education purposes only.

Offensive Hacking will not be responsible for any cyber crimes as it doesn’t encourage the same.



Friday, 19 December 2014

Sony's Amazing Tablet Xperia Z4 Must Read

Friday, 19 December 2014 - 0 Comments





If the information was correct at the beginning of January 2015 a new 13-inch Sony, 4K Tablet can launch.

Chinese website called Ultra Tablet "Pad News" the Sony Xperia Z4 is being prepared to bring a slate. It is said that in the Tablet 12.97-inch display with 3840x2400 pixels can Resolution. Also Tablet has 6 GB of RAM, and Power full 2.86 GHz Qualcomm Snapdragon 810 processor, 64 GB of internal storage and a 12,100 mAh Massive battery can also be features.

It is quite possible that Sony will soon launch its own to Tablet. So that this information can be Tablet he Xperia Z4 Tablet Ultra. Anyway CES (Consume Electronic Show) Sony's press conference on January 5, the Sony has a good chance to launch their new Tablet.

Microsoft's cheap Lumia 638 4G phone launch





Microsoft Lumia 638 smartphone launched its most affordable 4G is ready. It has been brought through Amazon. Its price is set at Rs 8299.

This Smartphone has Clear 4.5 inch 480 x 854 pixels Resolution, Gorilla Glass 3,
 LCD display back to the phone,  1.2 GHz Qualcomm Snapdragon 400 quad-core processor,
 1 GB RAM, 8 GB internal memory, expandable memory up to 128 GB with micro SD card,
1830 mAh features such as batteries. In addition, the phone has a 5 megapixel auto focus
 camera, front camera, but it is not. It runs on Windows 8.1.


The Physical keyboard BlackBerry 'CLASSIC' Launched





Your new BlackBerry smartphone classic has launched. Physical QWERTY keyboard BlackBerry with this phone is expected to get its old market share.

The company says that the new 'classic' smartphone BlackBerry Bold and Curve handsets largely resembles. There are also large screen, long battery life. However, 3 times faster than the phone is the first device browser.

BlackBerry chief Executive John Chen said, "Given the demand for its BlackBerry fans Option command once again brought the phone to be easy to use."

Blackberry 'classic' 3.5-inch square shape screen, 8 megapixel rear camera and a 2 megapixel camera Frnc, 1.5 GHz dual-core Snapdragon processor, 2 GB RAM, 16 GB internal memory, 128 GB Micro SD Card Sport, 2515 mAh battery , are features such as 17.2 hours of talk time GSL. LTE is classic. Sport is also the NFC and Wi-Fi. It runs on BlackBerry operating system 10.3.1. In addition to the classic non-removable battery, which makes it different from other Blackberry phones.

BlackBerry in the US "classic" ie about US $ 450 price is Rs 28-29. BlackBerry says that by the end of this month, the phone will be available in UM. In India, about how long it would have been a Official information but is expected that soon it will meet in India.

Thursday, 18 December 2014

Cyanogen Operated Micromax YUREKA launches, Price Rs 8,999 (150$)

Thursday, 18 December 2014 - 1 Comment




YU series, the first of its smartphone Micromax YUREKA (Eureka) has been launched. The phone will run on the operating system Cyanogen. The company has fixed the price of Rs 8,999. This phone can be purchased from Amazon India. The registration will begin at 2 pm on December 19.


This dual SIM phone 615 SoC processor Qualcomm Snapdragon 1.5 GHz, 64-bit Octa-core chipset will. The 4G will also Sport. The 5.5-inch HD screen, 720 pixels display, Gorilla Glass 3, 267 ppi, 16 GB expandable memory, 2 GB RAM, 2500 mAh battery, has features such as a 5 megapixel camera, front and rear 13 megapixels. The phone chip Cortex A-7, A-53 of the cortex is updated. Moonstone in Eureka will finish back panel. The company claimed that the phone service you will be at home.

Everyone Soon be able to sell things on Facebook, Said!





If you are active on Facebook to be a local group that you have seen a post on which people are selling their stuff. Looks like Facebook, on groups 'cell' is preparing to give the feature. If that happens, you will be able to sell things on Facebook via groups.


The Next Web reports on the group, some FB users 'Sell Something' is said to see the button. These people say that this button Right Post "button is the next one. After clicking on this button opens a form on which the name of the item, the price of the item of information is required to be paid. In addition to attach photos of the item, the option to pick up and delivery information is the beginning. After all, your post is seen as a classified listing contains all the information about the item, but also about how to pay Transaction or some do not.

According to the Next Web 'Sell Something' right to the point of appearing as a Facebook button that says this is a new feature on Facebook Groups Facebook testing so that people who want to sell your stuff on your items methodically in that post. It was on Facebook a small test groups were those who are active on the sailing community. However, Facebook has a link to a help page which explained that Facebook is not responsible for any purchase.

Wednesday, 17 December 2014

Credit Card Security Tips While Online Shopping or Else

Wednesday, 17 December 2014 - 1 Comment



With holidays around the corner and most ecommerce sites throwing away huge offers and discounts, we have to be extra careful against online scams and frauds. In this post today, we have listed down some helpful tips that you can use for safe credit card usage on the Internet.

So, if you usually shop online with your credit card, here are some safety tips you must consider.


Choose Credit Cards Over Debit Cards

If you use your credit card most of the time for online shopping, then you are already following an important security tip. If any fraudulent charges occur on your credit card, you will still have time to report it to your bank and avoid paying for the transaction made on the card. On the other hand, for a debit card, ‘real money’ gets debited instantly, and it may take days before you can reclaim the money. Also, most banks offer zero liability on lost credit cards. If we take HDFC bank into consideration, it states, “If you lose your card, report it immediately to our 24-hour call centre. After reporting the loss, you have a zero liability on any fraudulent transactions made on your card.”

Go a step further – Use a Virtual Credit Card

Another credit card security tip that works effectively, is using a virtual credit card. As the name suggests, this is not a ‘physical card’ and not issued physically. The following are the benefits of using a virtual credit card:


  1. A virtual credit card is mostly valid for 21 – 48 hours only, depending on the bank that has issued it.
  2. The card can be used for making one payment only.
  3. Any unused amount left in the card gets credited back to the customer’s account.
  4. A virtual credit card cannot be stolen or cloned, as it is an intangible property.


Know your Online Shoppe

Always go for trusted, well-known, reputable, online shopping sites. This is more important when you are purchasing expensive items. It is also wise to go through the privacy and security policy of the site that you are shopping from. You might come across a site that offers unbelievable deals; but odds are, the deals are fake or not what they appear to be.

Understand What Information Your Online Shoppe Needs

A standard checkout/payment page of most online shopping sites require you to give the following details:


  1. Full name as printed on the card
  2. Credit card number
  3. Expiration date
  4. CVV number
  5. Shipping/Billing address


But, if the payment page asks for your ATM pin, net banking login ID and password, mother’s maiden name, etc., then you have enough reasons to treat this as a phishing attack. Immediately close the browser, and report the website to the right authority such as Google.

Avoid Public and Free Wi-Fi Networks

This credit card security tip also applies to all kinds of financial transactions that you do online. Avoid using your credit card over public computer network such as cyber cafes and free Wi-Fi. These networks are less secured or have no security against hackers who can spy on your information and misuses it for illegal purpose.

Look for “HTTPS” and pad lock symbol

Before giving away your credit/debit information on the checkout page of any site, always ensure that the URL in browser’s address bar begins with “https://” and is accompanied by a “locked padlock” symbol. If it is otherwise, then do not proceed with the purchase. Go for a safer option such as cash-on-delivery.

The Better way to Protection Against Phishing and Threats be Sure you have a Better Antivirus System on your Computer or Laptop.

Don’t Follow Links in Emails

If you receive an email from your online shopping site about a great offer, and asks you to follow a link to view it, then here’s what you should do. Go to the website by typing its URL in the browser or Google, and verify if it is really hosting any such offers. Never click such links in emails even if they seem to have come from your favorite or a popular retailer.

Have Anti-phishing Protection on Your Computer

Nowadays, it is impossible for normal users to differentiate a fake, phishing website from a real one. Even a professional, neatly done website that seems innocuous, can be a compromised site waiting for you to fall into its trap. Hence, having an anti-phishing protection on your computer can be extremely beneficial. This feature, as the name suggests, automatically restricts user from landing on a fraudulent or phishing website.

If you think you have some more credit card security tips to add to this post, please feel free to leave them in the comment box below. Stay safe!

Basic Security Tips for Bloggers and Begginers



Recently, Mat Honan’s frightening account of how hackers destroyed his digital life has been making rounds online, scaring nearly everyone who reads it.

Basically, Honan’s digital presence was all but destroyed after hackers managed to delete his Google Account, wipe his iPhone, iPad and Macbook and deface his Twitter account. The reason for the attack, according to one of the people behind it, was “lulz” and to play around with a three-character Twitter name.

Honan’s position as senior reporter at Gizmodo did nothing to provoke nor protect him from the attack. Though he acknowledges his mistakes the affair, most sharply his failure to backup critical data (which everyone should have), his sharpest barbs were for Amazon and Apple, who’s security policies made the hack possible.

Though he acknowledges his mistakes the affair, most sharply his failure to backup critical data (which everyone should have), his sharpest barbs were for Amazon and Apple, who’s security policies made the hack possible.

Though Amazon and Apple have responded by updating their security policies, hopefully to prevent future attacks along the same vector, many have been wondering what they can do to strengthen their security online.
The truth is, no security is perfect and anyone who is a valuable enough target can be bit. But you can make yourself a more difficult target and someone who can not be trivially exploited and you can minimize the damage an attacker can do.
With that in mind, here are a few mostly common sense steps that can get you started to being more secure online.

  • Make or Write Smart Password Using Letter, Numerical, Upper & Lower Case: 

A good password should be long, at least eight characters, easy to remember and contain a combination of lower case letters, upper case letters, numbers and symbols. Most importantly, it should not be a word found in the dictionary nor any variation of one.

Also, you should never reuse a password for more than one site and you should never write your passwords down.

If this sounds like a lot, it is. It’s too much for pretty much anyone to do without help.
One solution is to use a device known as a cipher to generate passwords on the fly. For example, you can look at the domain name of the site and generate a password based on it. Basically, to do this, you look at the site you’re at and create a hard-to-guess password from the domain.

For example, facebook might have a password of g1s@v3r$ if you use the cipher of looking at your keyboard and writing the first four letters of the domain “face” using the keys one to the right of the real ones and then breaking up the letters with the numbers 1-4 alternating with the shift function every other time. Look at your keyboard (US) if you are unclear.

Alternatively, you can also use services like LastPass to help you generate, store and automatically fill in passwords. However, these services are a trade off between random, difficult passwords and a new central point of failure. As long as the service itself is secure, you’re most likely fine.

  • Two Factor Authentication Attempt:

Matt Cutts at Google recommended this strongly on his blog and I agree.
Two factor authentication simply means that you need two forms of authentication to log into a site. However, they have to be two different forms (not simply two passwords).

One form, obviously, is your password (something you know) but the other is usually something you have. These days, your cell phone is the most likely thing as many services, such as PayPal and Google, will send you a text that you have to repeat to log in. Google also, has its own app for most phones and that’s how LastPass handles its two-factor authentication.

This is an incredibly powerful tool because, even if your password is compromised, which Honan’s attack shows it can be easily in some cases, your account is not. It’s very unlikely, barring drastic steps, someone is going to have both your cell phone and your password. One or the other is possible, even likely, but not both.

If your account offers two factor authentication, turn it on as soon as possible. It’s a very powerful step.


  • Personal Information:

A lot of sites will ask you to create backup security questions in case you forget your password. Common ones involve things such as your favorite pets name or the street you grew up on.
The problem is that many of these things can be trivially researched. However, you can beat this by simply lying on the questions.

After all, there’s no rule that you be honest, just that you remember your answer. If you’re asked for your favorite pet, give the name of your childhood imaginary pet. Ideally, your answers should be related enough to the questions to remind you of what you said, but far enough off base that it’s not trivially guessed.


  • Credit Card Common Sense Tips:

Credit cards are like passwords, ideally they should not be used more than once and should never be stored. As Honan’s attack showed, even if they aren’t used for financial gain, they can still be used to open up exploits into other accounts.

If you have a bank or a credit card company that will issue single-use credit card numbers, use them. They are immensely powerful. If you don’t, try to avoid storing your credit card numbers and especially about storing one number across multiple accounts.

It might be annoying to re-enter your credit card data every time you want to buy a book on Amazon, but it could be what saves you from a minor hack becoming a major one.


  • Bottom Line:

In the end, security is about the trade off between protection and convenience. Most of the things that make you more secure will also take up more of your time.

It’s really annoying to have to find your phone every time you want to log in to your gmail or you have to enter a complex password that’s difficult to guess. Life would be much easier if we didn't have to deal with those things.

But, of course, that isn't practical. The problem is that others don’t value your life, your privacy, your information or your work. They would happily destroy it all, whether it’s for profit, a vendetta or just “lulz”, there are individuals who will not think twice about destroying your world.

If you realize that and that no one is too unimportant to be a target, then it only makes sense to take precautions now. Today’s hassle may save you from tomorrow’s attack.

Tuesday, 16 December 2014

Finally! Vivo X5 Launched , priced in India at Rs 32 980

Tuesday, 16 December 2014 - 0 Comments




Chinese smartphone company X5 vivo Max India launched the world's most slim phone has vivo. Vivo with this phone which launched its second smartphone vivo Y22, vivo X 3S, including vivo Y15 and Y22 vivo.

X5 Max price of their new phones in India vivo is kept at 32 980. This phone is 4.75 millimeters thick, that it is by far the most slim mobile handset. 5-inch full HD Super Amoled display the phone, 64-bit processor Octa core Qualcomm Snapdragon 615 , 2 GB of RAM, expandable to 16 GB inbuilt features like memory. It runs on Android KitKat.

Vivo X5 in China this month, was announced on December 10. Vivo in India have joined hands with the Viacom 18 Solutions integrated network. vivo Import your phone is currently in India  but hopefully they will also make calls to India in 3 years.

Whatsapp Now on Computer!!!!




Soon you will be able to speak on your computer even Whatsapp. It looks like the Whatsapp your messaging service is preparing to get on the web.

The only news coming from the Messaging app Mr. Dyorov Telegram-Founder Powell told Tech Crunch that the feeling that they have been working on since Whatsapp Whatsapp its web version of their web developer Higher Tried to. However Whatsapp information from any web version but a recent search of Android World dot NL Powell has fanned fears. Whatsapp the latest updates in the code Whatsapp Web is written. In addition, the code in the web service to track logging and online Stetson has written about.
However, it can not be taken as definitive evidence that Whatsapp but it seemed to work on the team is engaged in a web functions.

One Plus Now Hit Banned in India




According to reports, the Delhi High Court is now a Chinese company put a temporary ban. The company is one plus. The Delhi High Court has imposed ban on the appeal of Micromax. Micromax with Cyanogen at one plus the exclusive rights violations alleged. After the High Court hearing on the case of one plus the smartphone market in India, has ordered a ban on the sale and shipping.

The one plus one plus one smartphone in India on December 2, was launched. Based u soon Cyanogen Micromax phone is its series to India. The Micromax say, 'He has a contract with one plus Cyanogen violation of the agreement to sell your phone is illegal in India. Plus, if one is not stayed so Micromax smartphone sales can cause considerable damage. "

One plus point is that at the beginning of this year and the trademark license agreement Cyanogen a Collaboration agreement was signed, according to which he Cyanogen anywhere in the world except China can use the trademark and software. However, in India also launched one plus days before the agreement was over 15.

Earlier Cyanogen has announced that the agreement with Micromax in India that one plus one will not support the phone. The first Ericson Cyanogen and pulls the case of one plus the court imposed a ban on Chinese company Xiaomi. However, the Court of Xiaomi January 8 is allowed to sell its Qualcomm-based handsets.

Get Our App

Subscribe

Please Enter Your Email Id

© 2013 Blogger World. All rights reserved.
Designed by Think Exchanger