Tuesday, 9 December 2014

Switch your runtime in Kitkat device

Switch your runtime in Kitkat device

Gain a performance boost in KitKat by switching your runtime


                                                        If you have an Android phone running KitKat (4.4), you can get a performance and battery life boost by switching from the outdated Dalvik runtime. The runtime on your device is the sub-system that determines how applications and tasks run. The ART runtime is set to replace Dalvik. Although the Dalvik runtime did a decent job, it was still a major cause of bottlenecks on the system. Why? Because Dalvik is a Just-In-Time compiler. This type of compiler ran code at the moment it needed it. The newer ART runtime is an Ahead-of-Time compiler that processes application instructions before they are needed.

                                                       This is much more efficient both for performance and battery life.
You have to understand one thing -- ART has not been optimized for all devices and all apps. In fact, some apps won't even run under ART (in those cases, you have to switch back to Dalvik). Fortunately, the process of switching from one to the other is fairly painless. Also, the performance and battery life won't blow you away... yet.
                                                          But with every update, ART gets better and better.With that said, you should see an improvement by making the switch. I'll demonstrate how to switch from Dalvik to ART on a Verizon-branded HTC M8. You don't have to worry about bricking your phone with this -- it's fairly innocuous.

Developer options

Before you can enable the ART compiler, you first have to enable the Developer options. The HTC M8 tucks the Developer options away from sight. Here's how you enable them:
  1. Open Settings
  2. Scroll down to the bottom and tap About
  3. Tap Software Information
  4. Tap More
  5. Tap Build Number repeatedly until you are informed that you are now a developer

From Dalvik to ART (and back again)

Now that you're a developer, it's time to switch from Dalvik to ART. To do this, follow these steps (and make sure that your device is either fully charged or plugged in):
  1. Open Settings
  2. Scroll down and tap Developer options
  3. Locate and tap Select runtime (Figure A)
  4. Tap ART
  5. Tap OK to reboot the device. 




During the reboot process, Android will have to optimize all apps, so this will take some time. At first, you might think something has gone wrong -- it hasn't. Sit back and wait for the optimization to complete. Expect 20 to 60 minutes (depending upon how many apps you have installed) for this to complete. Once it's done, however, ART is ready to serve. Performance varies from device to device..
keep sharing .. have fun!!

Hacker's Dictionary



Hacker's Dictionary

 


Abbreviations


DDoS = Distributed Denial of Service



DrDoS = Distributed Reflected Denial of Service Attack, uses a list of reflection servers or other methods such as DNS to spoof an attack to look like it's coming from multiple ips. Amplification of power in the attack COULD occur.



FTP =File Transfer Protocol. Used for transferring files over an FTP server.



FUD = Fully Undetectable



Hex =In computer science, hexadecimal refers to base-16 numbers. These are numbers that use digits in the range: 0123456789ABCDEF. In the C programming language (as well as Java, JavaScript, C++, and other places), hexadecimal numbers are prefixed by a 0x. In this manner, one can tell that the number 0x80 is equivalent to 128 decimal, not 80 decimal.



HTTP =Hyper Text Transfer Protocol. The foundation of data communication for the World Wide Web.



IRC = Internet Relay Chat. Transmiting text messages in real time between online users.



JDB =Java drive-by, a very commonly used web-based exploit which allows an attacker to download and execute malicious code locally on a slave's machine through a widely known java vulnerability.



Malware =Malicious Software



Nix = Unix based operating system, usually refered to here when refering to DoS'ing.



POP3 =This is the most popular protocol for picking up e-mail from a server.



R.A.T = Remote Administration Tool



SDB = Silent drive-by, using a zero day web-based exploit to hiddenly and un-detectably download and execute malicious code on a slave's system. (similar to a JDB however no notification or warning is given to the user)



SE = Social Engineering



Skid =Script Kid/Script Kiddie



SMTP =A TCP/IP protocol used in sending and receiving e-mail.



SQL =Structured Query Language. It's a programming language, that used to communicate with databases and DBMS. Can go along with a word after it, such as "SQL Injection."



SSH =Secure Shell, used to connect to Virtual Private Servers.



TCP = Transmission Control Protocol, creates connections and exchanges packets of data.



UDP =User Datagram Protocol, An alternative data transport to TCP used for DNS, Voice over IP, and file sharing.



VPN =Virtual Private Network



VPS =Virtual Private Server



XSS (CSS) = Cross Site Scripting


Words


Algorithm = A series of steps specifying which actions to take in which order.



ANSI Bomb = ANSI.SYS key-remapping commands consist of cryptic-looking text that specifies, using ansi numeric codes to redefine keys.



Back Door = Something a hacker leaves behind on a system in order to be able to get back in at a later time.



Binary = A numbering system in which there are only two possible values for each digit: 0 and 1.



Black Hat = A hacker who performs illegal actions to do with hacking online. (Bad guy, per se)



Blue Hat =A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.



Bot = A piece of malware that connects computer to an attacker commonly using the HTTP or IRC protocal to await malicous instructions.



Botnet = Computers infected by worms or Trojans and taken over by hackers and brought into networks to send spam, more viruses, or launch denial of service attacks.



Buffer Overflow = A classic exploit that sends more data than a programmer expects to receive. Buffer overflows are one of the most common programming errors, and the ones most likely to slip through quality assurance testing.



Cracker = A specific type of hacker who decrypts passwords or breaks software copy protection schemes.



DDoS = Distributed denial of service. Flooding someones connection with packets. Servers or web-hosted shells can send packets to a connection on a website usually from a booter.



Deface =A website deface is an attack on a site that changes the appearance of the site or a certain webpage on the site.



Dictionary Attack = A dictionary attack is an attack in which a cyber criminal can attempt to gain your account password. The attack uses a dictionary file, a simple list of possible passwords, and a program which fills them in. The program just fills in every single possible password on the list, untill it has found the correct one. Dictionary files usually contain the most common used passwords.



DOX = Personal information about someone on the Internet usualy contains real name, address, phone number, SSN, credit card number, etc.



E-Whore = A person who manipulates other people to believe that he/she is a beautiful girl doing cam shows or selling sexual pictures to make money.



Encryption = In cryptography, encryption applies mathematical operations to data in order to render it incomprehensible. The only way to read the data is apply the reverse mathematical operations. In technical speak, encryption is applies mathematical algorithms with a key that converts plaintext to ciphertext. Only someone in possession of the key can decrypt the message.



Exploit = A way of breaking into a system. An exploit takes advantage of a weakness in a system in order to hack it.



FUD = Fully undetectable, can be used in many terms. Generally in combination with crypters, or when trying to infect someone.



Grey Hat = A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked, for example. Then they may offer to repair their system for a small fee.Hacker (definition is widely disputed among people...) = A hacker is someone who is able to manipulate the inner workings of computers, information, and technology to work in his/her favor.



Hacktivist = A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denial-of-service attacks.



IP Address = On the Internet, your IP address is the unique number that others use to send you traffic.



IP Grabber = A link that grabs someone's IP when they visit it.



Keylogger = A software program that records all keystrokes on a computer's keyboard, used as a surveillance tool or covertly as spyware.Leach = A cultural term in the warez community referring to people who download lots of stuff but never give back to the community.



LOIC/HOIC = Tool(s) used by many anonymous members to conduct DDoS attacks. It is not recommended to use these under any circumstances.



Malware =Software designed to do all kinds of evil stuff like stealing identity information, running DDoS attacks, or soliciting money from the slave.



Neophyte = A neophyte, "n00b", or "newbie" is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology, and hacking.



smith = Somebody new to a forum/game.



OldFag = Somebody who's been around a forum/game for a long time.



Packet = Data that is sent across the Internet is broken up into packets, sent individually across the network, and reassembled back into the original data at the other end.



Phreak =Phone Freaks. Hackers who hack cell phones for free calling. Free Long distance calling. Etc.



Phreaking = The art and science of cracking the phone network.



Proxy = A proxy is something that acts as a server, but when given requests from clients, acts itself as a client to the real servers.



Rainbow Table = A rainbow table is a table of possible passwords and their hashes. It is way faster to crack a password using rainbow tables then using a dictionary attack (Bruteforce).



Remote Administration Tool =A tool which is used to remotely control (an)other machine(s). These can be used for monitoring user actions, but often misused by cyber criminals as malware, to get their hands on valuable information, such as log in credentials.



Resolver =Software created to get an IP address through IM (instant messenger, like Skype/MSN) programs.



Reverse Engineering = A technique whereby the hacker attempts to discover secrets about a program. Often used by crackers, and in direct modifications to a process/application.



Root = Highest permission level on a computer, able to modify anything on the system without restriction.



Rootkit (ring3 ring0) =A powerful exploit used by malware to conceal all traces that it exists. Ring3 - Can be removed easily without booting in safemode. Ring0 - Very hard to remove and very rare in the wild, these can require you to format, it's very hard to remove certain ring0 rootkits without safemode.



Script Kiddie = A script kid, or skid is a term used to describe those who use scripts created by others to hack computer systems and websites. Used as an insult, meaning that they know nothing about hacking.



Shell = The common meaning here is a hacked web server with a DoS script uploaded to conduct DDoS attacks via a booter. OR A shell is an script-executing unit - Something you'd stick somewhere in order to execute commands of your choice.



Social Engineer = Social engineering is a form of hacking that targets people's minds rather than their computers. A typical example is sending out snail mail marketing materials with the words "You may already have won" emblazoned across the outside of the letter. As you can see, social engineering is not unique to hackers; it's main practitioners are the marketing departments of corporations.



Spoof = The word spoof generally means the act of forging your identity. More specifically, it refers to forging the sender's IP address (IP spoofing). (Spoofing an extension for a RAT to change it from .exe to .jpg, etc.)



SQL Injection =An SQL injection is a method often used to hack SQL databases via a website, and gain admin control (sometimes) of the site. You can attack programs with SQLi too.



Trojan = A Trojan is a type of malware that masquerades as a legitimate file or helpful program with the ultimate purpose of granting a hacker unauthorized access to a computer.



VPS = The term is used for emphasizing that the virtual machine, although running in software on the same physical computer as other customers' virtual machines, is in many respects functionallyequivalent to a separate physical computer, is dedicated to the individual customer's needs, has the privacy of a separate physical computer, and can be configured to run server software.



Warez = Software piracy



White Hat = A "white hat" refers to an ethical hacker, or a computer security expert, who specializes in penetration testing and in other testing methods to ensure the security of a businesses information systems. (Good guy, per se)



Worm = Software designed to spread malware with little to no human interaction.



Zero Day Exploit = An attack that exploits a previously unknown vulnerability in a computer application, meaning that the attack occurs on "day zero" of awareness of the vulnerability. This means that the developers have had zero days to address and patch the vulnerability.

Make Your Computer Speak Whatever You Type

Make Your Computer Speak Whatever You Type


1.Open Notepad and copy and paste the following code into it

Dim message, sapi
message=InputBox("What do you want me to say?","Speak to Me")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak message

2.Now save the notepad file with the name speak.vbs at your desktop.

3.Now double click on speak.vbs type in the box whatever you want your computer to speak for you.

try it n share.Have fun guys!!

Sunday, 16 November 2014

Everything that Google Knows About You!

Everything that Google Knows About You!

When you use Google, you are making a deal. You get to use Gmail and search and YouTube and Google Maps for free and in exchange, you agree to share information about yourself. Google gets to sell that information to advertisers.

The more Google knows about you, the more it can match you to an advertiser who thinks you are an ideal customer. Advertisers are willing to pay more for ads served to ideal potential customers. For instance, airlines want to target people who love to travel. Children's clothing makers want to target parents.

Google uses a lot of methods to learn about you. There's the stuff you tell Google outright when you sign up for its services, like Gmail and Google Maps, or via an Android phone, like your name, phone number, location, and so on. Google also deduces information about you from watching your internet searches (what do you search for? click on?) and from the stuff you do with Google's products.

By visiting a site called "Ads Settings" you can see what Google knows about you.

It's not that easy to find Ads Settings. First, click on the link below or type it into your browser: https://www.google.com/settings/

Then click on "Account history".



Scroll down to Ads and click on "Edit settings".

 

This page shows you what Google thinks it knows about you including your age bracket, the languages you speak and ...

 


... including your interests.

 

From that page, you can edit that information or "opt out" of allowing Google to share your information with advertisers.












 

Saturday, 15 November 2014

Hide blue ticks on WhatsApp!

Hide blue ticks on WhatsApp!
Mobile Instant Messaging Service, WhatsApp introduced ‘Last Seen’ feature to hide your 'last seen' but the messenger wasn’t probably satisfied with this launching as it didn’t cause much trouble!




SO, it introduced the ‘Read Receipts’ feature (yes, the blue ticks one) where you can know that person you have messaged has read your message. This has certainly created a panic amongst many users!

But here’s a good news. Don’t panic as now you can easily disable blue ticks feature. You can go to the ‘Privacy settings’ and disable the 'Read Receipts' option. Simply turn it ‘off’. This will banish the blue ticks when you read other people’s messages.


Settings > Privacy > Disable the ‘Read Receipts’ option

With disabling this, WhatsApp will no longer display blue ticks when you have read their messages, but just as you hide your last seen,you are not able to see other people’s last seen, here too you will stop seeing blue checkmarks on other people’s chat box too! Fair deal?

P.S: You have to download the latest version of WhatsApp for enabling the privacy. The updated version is 2.11.44 (only available on WhatsApp’s site for now).


Now you can heave a sigh of relief and not worry about being ANSWERABLE to someone(If you know what we mean)!

Spy Planes Collecting Smartphone Data


 


The U.S. government is reportedly using spy airplanes equipped with special military-grade snooping equipment to eavesdrop on cell phone information from millions of smartphone users in U.S, according to a new report.
This little device, nicknamed "Dirtbox", is being used to mimic mobile phone tower transmissions from the sky and gather data from millions of mobile phones, helping the US Marshals Service track criminals while recording innocent citizens’ information.
The purpose of the device is supposedly to track a specific target, but if active, all mobile devices in the particular area will respond to the signal. The Dirtbox causes smartphones to transmit back the users’ location, registration information and identity data – uniquely identifying IMEI numbers stored in every mobile device, The Wall Street Journal reported.

The name Dirtbox is given after the initials of Digital Receiver Technology, Inc. (DRT), a Boeing Company subsidiary that allegedly manufactures these devices. These two-foot-square snooping devices imitate cellphone towers and thus make contact with all handsets in the range.
"DRT has developed a device that emulates a cellular base station to attract cell phones for a registration process even when they are not in use," Boeing said in a 2010 filing [PDF].
The operation began in 2007 and according to the WSJ, a "source familiar with the program" said that these devices are fitted onto Cessna aircraft and fly from at least five metropolitan airports in the US. The planes cover the majority of the US population.
The dirtboxes operate in the same way as the so-called mobile phone surveillance tool IMSI (International mobile subscriber identity) catchers or Stingrays, that is in use by over 46 agencies including the law enforcement, the military, and intelligence agencies across 18 states and Washington, D.C. for more than a decade.
StingRays are common surveillance devices that allow law enforcement to mimic a cell phone tower, and track users position who connect to it, and sometimes even intercept calls and Internet traffic, send fake texts, install spyware on a phone, and determine precise locations.
Both Stingrays and Dirtboxes make use of "off-the-shelf" components to gather mobile phones’ International Mobile Subscriber Identity (IMSI) which is a unique code to each device. They can be used to track individuals’ movements via their mobile phone devices but work indiscriminately, hovering up information from a general area.
The US Department of Justice – which oversees the marshal service – has neither confirmed nor denied the existence of the Dirtbox program, but anonymous sources familiar with their use said the flying spies-in-the-sky were technically above board.
The WSJ quotes one source as stating, "What is done on US soil is completely legal….., Whether it should be done is a separate question."

 

Friday, 14 November 2014

Microsoft fixes a 19 year old Windows bug


Microsoft fixes a 19 year old Windows bug


Microsoft has finally fixed a bug that plagued its Windows operating system undetected for the last 19 years. The flaw allowed a remote user to take over and control a computer and has been present in every version of the OS from Windows 95 onwards.

The IBM cyber-security team, discovered the malware in May and said it was a “significant vulnerability” in the operating system. The bug dubbed WinShock has been graded as 9.3 out of 10 on the Common Vulnerability Scoring System (CVSS), a measure of severity in computer security.

The flaw allowed any hacker to run code remotely whenever a user visited a malicious website. Microsoft has finally produced patches to fix the bug. The latest patch applies only to Windows Vista and higher devices as support for Windows XP ended in April.

IBM researcher Robert Freeman described it as a “rare, ‘unicorn-like’ bug found in code that IE [Microsoft Internet Explorer] relies on, but doesn’t necessarily belong to.”

"The bug can be used by an attacker for drive-by attacks to reliably run code remotely and take over the user's machine," Freeman wrote in a blog post.

IBM warns that the bug evaded detection for many years and states that more such undetected bugs could be out there. Security experts compared this latest flaw to other significant problems that had come to light this year such as the Heartbleed bug. However, they added that while its impact could be just as significant, it might be more difficult for attackers to exploit.

Gavin Millard, from Tenable Network Security, stated that although there has been no known attacks users should be careful.

"Whilst no proof-of-concept code has surfaced yet, due to Microsoft thankfully being tight-lipped on the exact details of the vulnerability, it won't be long until one does, which could be disastrous for any admin that hasn't updated.

"Is WinShock as bad as Heartbleed? At the moment, due to the lack of details and proof-of-concept code, it's hard to say, but a remote code execution vulnerability affecting all versions of Windows server on a common component like Schannel is up there with the worst of them."

Thursday, 13 November 2014

Need a Single Facebook Name??



How to have a Single Facebook Name.


1) Navigate to here: https://www.facebook.com/settings?tab=ac...guage&view
2) Change your language to 'Bahasa Indonesia' and save.
3) Press the Windows Key on your Keyboard, and type 'Run'. Open it.
4) Type 'inetcpl.cpl', and select 'OK'.
5) Keeping up? Great! Select the 'Connections' tab.
6) Select the 'LAN Settings', and tick the box that says 'Use a proxy server for your LAN'
7) Use these options... IP: 202.43.65.132 Port: 8080
Select 'OK', and then 'OK' on the main settings box to save the settings.
9) Open Internet Explorer (Eww! I know!) and navigate to Facebook then login. Once done, navigate here: https://www.facebook.com/settings?tab=ac...%3Dname&view
10) Enter your desired 'First Name', and remove the text in the 'Last Name' box, enter password and select 'Save Changes'.
11) Log out, and remove the proxy server settings.
12) Navigate back to Facebook and revert your default language, and done! You will now have your desired 'First Name' only.
Enjoy!!share with ur friends!!