Sunday 25 October 2015

Best CMD Commands Hacks and Tricks

Cmd Tricks for your windows pc that make your pc more smart. Here we make a list of best cmd tricks for command prompt. With these cmd tricks you create wifi hotspot, know more about your internet and system and lots of other info. Try all of these command prompt tricks in your windows pc and make your pc more smarter.

Best CMD(Command Prompt) Tricks for Your PC

#1 Create WIFI Hotspot

You can create wifi hotspot from your laptop without any software from cmd. You need to do only type some commands. With this cmd trick you can share your pc internet with mobile device or another laptop.
 netsh wlan set hostednetwork mode=allow ssid=prophethacker key=prophethacker netsh wlan start hostednetwork 
For about how can share your PC Data with Internet Read our Previous Articles Turn your Laptop into WIFI Hotspot without any Software

#2 Find Your Computer IP Address, DNS Server Address and MAC Address

This is most important CMD  command tricks for all internet users. If you want to know more about your internet connection type ipconfig/all command in Command Prompt. You get lots of info about your computer internet.

#3 Matrix Falling Code Effect

If you see the Matrix Science Fiction Movie you know the random code appears in screen. Here we make a same matrix effect by some codes. You need to copy below codes and paste in your notepad. Save Notepad text as  matrix.bat . Open matrix.bat file and you see the matrix falling code in your command prompt.
 @echo off color 02 :tricks echo %random%%random%%random%%random%%random%%random%%random%%random% goto tricks 

#4 Know you Detailed System Information

Want to know more about your computer software and hardware. Type systeminfo in command prompt and you see tons of info your command system. You see your computer os, architecture, manufacturer name, product id, processor and lots of other info.

#5 Find any Website Ip Address

If you don’t know what is the ip address of google.com and you wanna want to know. Command prompt tell you all website ip address when you ping any website from command prompt.
ping google.com
you get below result with ip addresss
Pinging google.com [216.58.220.14] with 32 bytes of da
replace your website with google.com and you see any website ip address.

Labels: ,

USE WHATSAPP FREE FOR LIFETIME


Get Free Whats App Valdity For Lifetime :-

[​IMG] 
PART 1:- 
1. Open Whatsapp -- Settings -- Account. 
2. Click on “Change number” -- Next. 
3. Enter your old number that is currently you are using. 
4. In new phone number(Text field) enter any new mobile number that never be use before in Whatsapp. 
5. Click Done A verification code is send by whatsapp on your new number. Your service would activate for 1 year. 
PART 2:- 
1. Open Whatsapp -- Settings -- Account. 
2. Click on “Change number” -- Next. 
3. Enter your old number that is currently you are using . NOW IN ENTER NEW NUMBER ADD YOUR PREVIOUS NUMBER ON WHICH WHATSAPP SERVICE WAS EXPIRED. (NUMBER ON WHICH YOU WANT TO USE WHATS APP SERVICE FOR LIFETIME). 
4. Click Done. Do same procedure after one year Finally goto Settings -- Payment info and check expiry date of your Whatsapp account.

Labels:

Saturday 24 October 2015

Airtel 3G Unlimited Direct Trick October 2015


CONDITION REQUIRED :-
Unblocked Sim
Zero Balance
PC Or Android

Follow This Steps Very Carefully :-
1.Open--- http://one.airtel.in/iportal/index.html ---
Using Any Browser In PC or Android
In Android
Opera Mini (Not Recommended)
Android Dafault Browser (Recommended)
2.Once The Page Is Opened Scroll Down
3.And look For The Line--
Get This songs on Wynk Music. Listen Now >
4.Click / Press on Listen Now
5.A pop up window Appers on Bottom of the PAGE
6.Click / Press on ACTIVATE
7.Once the Process is Completed /Activated
------MOST IMPORTENT PART------
8.VERY FAST Try typing GOOGLE.COM in Adress bar
Or Any site you prefer.The page might Open
or may not...Don't WORRY
9.NOW here's the HACKED STARTS
within 30sec--1min if google page or any
site doesn't open....
10.DISCONNECT internet and IMMEDIATELY Connect it
11.Try Google.com
12.BOOOM BOOM BOOM You Officially HACKED
13. ENJOY

Proof:-



NOTE : I highly recemmend you to use this trick after 6:00 pm IST....Becoz When i have used it in day time i got around 600mb AND when i used It after 6:00 pm I fortunately GOT UNLIMITED. I was Able to LOOT 2.6 Gb absoloutely FREE

Labels:

NSA Got Hacked By Its Very Own Vulnerability

You need one hundred and four dollars, more or less, eight hours and Amazon’s cloud computing to hack the National Security Agency’s website. Oh, and you need to make use of the NSA’s very own FREAK vulnerability to hack them in their own game.
A group of researchers did just that, using a few tools to implement man-in-the-middle-attacks. This is an ability that swiftly creates an outcome of 512 bit RSA (RSA is one of the first practicable public key crypto systems and is widely used for secure data transmission) keys.
The bug was reported on Monday. It allows the attacker to take control of secure connections between people using iOS devices or Android devices. This gives hackers a chance to mimic the target and steal private information like login details and passwords.
To factor the 512 bit export keys, the project enlisted the help of Nadia Heninger at University of Pennsylvania, who has been working on “Factoring as a Service” for exactly this purpose. Her platform uses CADO NFS on a cluster of EC2 virtual servers, and (with Nadia doing quite a bit of handholding to deal with crashes) was able to factor a bunch of 512 bit keys; each in about 7.5 hours, for $104 in EC2 time according to Vice.
cia
Let us explain the FREAK vulnerability to you in a more detailed manner:
Earlier this year, many cyber security companies revealed information about a vulnerability in OpenSSL. OpenSSL started accepting temporary RSA keys when using non-export cipher suites. A malicious server could make a TLS/SSL client using OpenSSL, using a weaker key exchange method.
As stated earlier, OpenSSL clients accepted EXPORT-grade insecure keys even when the client had not initially asked for them. This could be exploited using a man-in-the-middle attack, which would intercept the client’s initial request for a standard key and ask the server for an EXPORT-grade key. The client would then accept the weak key, allowing the attacker to factor it and decrypt communication between the client and the server.
The vulnerability affects all Linux systems too, including the Server, Workstation, Desktop, and HPC Node variants that have not installed the fixed version of OpenSSL packages.
While the use of EXPORT-grade ciphers is disabled by default in OpenSSL), it can be enabled by applications that utilize the OpenSSL library. For this reason, the vulnerability is able to affect all Linux 6 and 7 systems, including the Server, Workstation, Desktop, and HPC Node variants, which have not installed the fixed version of OpenSSL packages.
However, using Internet-wide scanning, we can perform daily tests of all HTTPS servers at public IP addresses to determine whether they allow this weakened encryption. More than a third of all servers with browser-trusted certificates are at risk. i.e all the HTTPS servers at Alexa’s top 1 million domain names have their current vulnerability levels at 8.5 percent. HTTPS servers with browser trusted certificates are at 6.8 percent vulnerability, and the rest of the HTTPS servers are at 11.8 percent.
Browsers are vulnerable to the FREAK attack because of bugs that allow an attacker to force them to use weak, export-grade encryption. One example is the OpenSSL bug described in CVE-2015-0204, but some other TLS libraries have similar problems.
You can check whether your browser is vulnerable using our FREAK Client Test Tool.
Chrome for Windows and all modern versions of Firefox are known to be safe. However, even if your browser is safe, certain third party software, including some antivirus products and adware programs, can expose you to an attack by intercepting TLS connections from the browser. If you are using a safe browser but our client test says you’re vulnerable, this is a likely cause.
phishing-mitm
In addition to browsers, many mobile apps, embedded systems, and other software products also use TLS. These are also potentially vulnerable if they rely on unpatched libraries or offer RSA_EXPORT cipher suites.
If you are running a server, then you should immediately disable support for TLS export cipher suites. While you’re at it, you should also disable other cipher suites that are known to be insecure and enable forward secrecy. For instructions on how to secure popular HTTPS server software, we recommend Mozilla’s security configuration guide and their SSL configuration generator. We also recommend testing your configuration with the Qualys SSL Labs SSL Server Test tool. If you are a systems admin or are a developer, then please make sure any TLS libraries you use are up to date. Unpatched OpenSSL, Microsoft Security Channel, and Apple Secure Transport all suffer from the vulnerability. Note that these libraries are used internally by many other programs, such as wget and curl. You also need to ensure that your software does not offer to export cipher suites, even as a last resort, since they can be exploited even if the TLS library is patched. We have provided tools for software developers that may be helpful for testing this.
Furthermore, if you are using Microsoft Vista or newer versions of Windows, you can take the following steps as the system administrator to protect yourself. However, not all versions of Vista, Windows 7, and Windows 8.x include the critical gpedit.msc program. Vista Home Premium; Windows 7 Home Premium, Home Basic and Starter, and Windows 8.x Home Premium do not include it. There are ways to add gpedit to these systems.
Go to computer configuration> Administrative Templates> Network>SSL Configuration Settings. Under SSL Configuration Settings, click the SSL Cipher Suite Order setting. In the SSL Cipher Suite Order pane, scroll to the bottom of the pane. And simply enter the following cipher list.
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256,
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384,
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256,
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384,
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P256,
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P384,
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256,
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P384,
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384,
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P384,
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P256,
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P384,
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P384,
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P256,
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P384,
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P256,
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P384,
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P256,
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P384,
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256,
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,
TLS_DHE_DSS_WITH_AES_256_CBC_SHA,
TLS_DHE_DSS_WITH_AES_128_CBC_SHA,
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
These will keep you protected and safe. We at Anonymous want our friends and readers to be up to date. As for normal users, we once again recommend that you use up-to-date Firefox and Chrome.

Labels: ,

Switcheroo Lets You Control Stuff With Your Smartphone!

Switcheroo Lets You Control Stuff With Your Smartphone!

switchroo
IoT buzz is all around and people are building great stuff. Few weeks back, we talked about upcoming IoT development kits – CHIPModulo and Cubit, which will help you in building IoT projects easily and effectively. Today, we found another great product called Switcheroo, which lets you control stuff with your smartphone. Switcheroo started trending on Kickstarter last week and it e to you soon.

What is  Switcheroo?

In layman’s language “Switcheroo is nothing but a wireless switch which you can control with your smartphone”.  With this you can control almost anything with your smartphone. The Switcheroo makes it a snap to upgrade everyday devices for smartphone control. The Switcheroo can do things like;
  • control toys
  • unlock doors
  • start your car
  • turn on lights
  • open/close your garage door
  • control your heat
  • remote shutter release for cameras
  • upgrade anything with a pushbutton

How does it work?

All your devices which has a push button or a switch can be easily integrated with Switcheroo. These buttons typically actuate small internal switches which pass low voltage DC current to a microprocessor when the button is pressed. The Switcheroo can be easily wired into this simple switch circuit to take the place of that switch or act in concert with it, upgrading these devices to allow direct smartphone control. The Switcheroo has 4 opto-isolated outputs that can switch DC voltages from 2 to 24 volts, up to 150mA of current per output. For AC voltages or higher current applications you can connect relays or solid state switching ICs to Switcheroo and do even more.
Switcheroo directly communicates with your phone. There is no 3rd party server involved, no monthly fees, and no internet access is required for your phone or the Switcheroo. Switcheroo uses Bluetooth Low Energy which offers AES-CCM encryption to secure the low energy link between Switcheroo and your smartphone.
Also See: CHIP is the World’s Cheapest Computer and Costs Just $9
Guys behind Switcheroo are great and they have made everything Open Source. All Switcheroo app code is available now and will be maintained athttp://github.com/switcheroo. Switcheroo kickstarter campaign is live and you can make your contribution to get a kit for yourself at $29

Labels: ,

BLOGGER.COM OR WORDPRESS, WHICH ONE IS BEST FOR BLOGGING?

New bloggers and freshers are often confused in selecting the best platform as their blog hosting providers. They don't sure of selecting the right blog hosting service and end up with what to be select? If they select any of Blogger or Wordpress, still they don't feel satisfy and think that something is done wrong with their selection. I am personally asked this question many times by bloggers. So, in this post am going to highlight the major benefits and limitations of both Blogger.com as well as Wordpress. After reading this, anyone can set their mind easily to select the best blog hosting provider.

Blogger
Blogger was started by a tiny company in San Francisco called Pyra Labs in August of 1999. It was bought by Google in 2003. Blogger is a blog-publishing service that allows multi-user blogs with time-stamped entries. the blogs are hosted by Google at a subdomain of blogspot.com. Blogs can also be hosted in the registered custom domain of the blogger and blogspot.com domain publishings will be redirected to the custom domain.

Features of Blogger.com
1. A user can have up to 100 blogs per account.
2. Blogger allowed users to publish blogs on other hosts, via FTP.
3. Blogger allows its users to use their own domain free of charge.
4. It allows storage space up to 15GB to upload videos and Images in Blog.5. Blogger provides multiple country-specific URLs automatically for blogs hosted by different countries. For example if it is used by Indian then, it will be redirected as example.blogspot.co.in and if it owned by United Kingdom (UK) then it will be redirected as example.blogspot.co.uk.
6. Languages supported by Blogger is - Arabic, Bengali, Bulgarian, Catalan, Chinese (Simplified), Chinese (Traditional), Croatian, Czech, Danish, Dutch, English, Filipino, Finnish, French, German, Greek, Gujarati, Hebrew, Hindi, Hungarian, Indonesian, Italian, Japanese, Kannada, Korean, Latvian, Lithuanian, Malay, Malayalam, Marathi, Norwegian, Oriya, Persian, Polish, Portuguese (Brazil), Portuguese (Portugal), Romanian, Russian, Serbian, Slovak, Slovenian, Spanish, Swedish, Tamil, Telugu, Thai, Turkish, Ukrainian, Urdu Vietnamese. Nepali, Farashi.Bemba,Tonga, Tumbuka and cewa.
7. Blogger allows its users to choose from various templates and then customize.
8. Speed of blog hosted on Blogger.com is usually 40% more faster than others.
9. HTML template editor, so bloggers can use their own designed templates.
10. Blogs are Mobile friendly that are hosted by Blogger.com.
11. SEO friendly.
12. High security for blogs.
Limitations of Using Blogger.com
1. Storage for uploading media files (Images, Videos) is of 15 GB only. If you need more then you will have to buy space by paying money.
2. Number of blogs per account is 100.
3. Moving your site from Blogger to a different platform is a complicated task. There is a significant risk that you will loose your SEO (search engine rankings(, subscribers, and followers during the move.
4. Blogger allows you to export your content but your data will stay on Google’s servers for a very long time.
5. Support service is limited, mostly through forums only.

WordPress
WordPress started in 2003 by its founders, Matt Mullenweg and Mike Little with a single bit of code to enhance the typography of everyday writing and with fewer users than you can count on your fingers and toes. Since then it has grown to be the largest self-hosted blogging tool in the world, used on millions of sites and seen by tens of millions of people every day.
Wordpress is based on PHP and MySQL. 

Features of Wordpress
1. WordPress was used by more than 23.3% of the top 10 million websites.
2. WordPress users may install and switch between themes.
3. WordPress's plugin architecture allows users to extend the features and functionality of a website or blog.
4. WordPress has over 40,501 plugins available which offer custom functions and features.
5. Mobile friendly.
6. Storage for free Wordpress blogs is only up to 3GB, which is less than Blogger.com
7. Free templates available to edit for blogs.
8. Support system is Good.
9. Using WordPress, you can move your site anywhere you want. You can move your WordPress site to a new host, change domain name, or even move your site to other content management systems.
10. Advance plugins for SEO.

Limitations of using Wordpress
1. Storage is only up to 3GB
2. Complex for newbie bloggers, even I also don't know how to use WordPress perfectly.
3. Less security for Blogs

Conclusion:
Saying any of both as best will not fair, both have their significant importance. Selection depends on the need of blogger who is going to start blogging. After reading above given point and comparison, anybody can easily make their decision about which one is to use or which should avoid.

Labels: ,

A World Without Linux – A World Without Internet (Episode 1)

world-without-linux-episode-1-name-songShort Bytes: Linux is the largest collaborative project in the computing history. It’s literally everywhere. And to showcase this, The Linux Foundation has brought a video series named A World Without Linux. Watch the first episode here.
You are using the internet right now on your smartphone or computer.Is this possible without Linux? There is a plain and simple answer to this question. NO. This is the message that The Linux Foundation wants to convey with its first episode of A World Without Linux video series.
This series was launched a week ago on the occasion of the 24th anniversary of the first Linux kernel release. This six-part video series will feature two characters and their feline called String.
In the video series, with the help of multiple events, they will show how ridiculous a world without Linux would be.
In the very first episode, Sam and Anne are trying to find an answer to a question that you can search right away on your phone. But, in a world without Linux, a different story unfolds.
To know the answer, watch A World Without Linux: Episode 1 below:
For those who don’t know, Linux powers more than 96% of the top 1 million web servers. To showcase the same, Animator Amelia Lorenz has worked very hard to bring this unimaginable world without Linux in the form of this video series.
Go ahead and share this article with your friends to show your Linux love. In the comments below, tell your interpretation of a world without Linux.

Labels: ,

BSNL Blast Latest Working Unlimited 3G UDP Trick [October-2015]

Recently BSNL has opened a port for upgrading purpose and this port is open for a very small time and it will not work all over India it will work where upgrading has to be done this upgrading will start after 15 Aug and this port will open in some areas so<br /> lets start and try it by your Own .
Features Of The Trick :-
1. Full 3g Speed Up To 7.2 Mbps
2. No Data Limit Download Unlimited Amount Of Data
3. No Sim Blocking Issues Do Try It Without Worries
Steps To Use:-
1. First Maintain 0 Rs. Balance(Which Is Quite Easy )
2. Now Connect With APN -bsnlwap cellonemob (cellonewap Will Only Work In Some States With H1 Sims
3. Now Open Any VPN And Connect With UDP Port 9201.  
4. Done Enjoy Using Unlimited

Labels:

Friday 23 October 2015

Vodafone UDP south user



Vodafone udp trick 2015

requirement for the trick ...

1) data recharge required for speed capping 2) connect with pd-proxy 49200 , 49201 , 49202 , 49203
3) enjoy unlimited downloading

feature of this trick
it is udp so its unlimited no speed cap problem
Try in south states

Labels: