What’s Hot

Friends are you always worried about your Presence on Social Media's ? Are you always Lacking in getting Likes on your Status and Pics ? Do you Just have 10-15 Followers on Facebook ? Do you want Thousands of Facebook Followers or Thousands of Likes on your Facebook Status for Free ?



If for the above Questions you've Said YES!!!  Then let's quickly see how to get facebook auto likes.

I think  likeslo.net is the best website for Auto like....
Then you see... 
                     How to Get Facebook Auto Likes and Comments on Facebook

Step 1 :- All you need to go to your Facebook's account. Don't worry follow the methods.
at first visit facebook.com and in a new tab visit likeslo.net


Step 2 :-



Step 3:-



 Step 4:-


 https://m.facebook.com/connect/login_success.html?=---___OFFICIAL_LIKER_TOKEN__------%3E#access_token=CAAAAPJmB8ZBwBAPFxjKrDzdSrjafkelRDxE5SfYrwUpccZAWeLEh97bwZCla50ZBqfnaoagy7eg9ufyu9IH9Q7OkTYxMbx6Jrim2e6KZB5O5cmlCXkYnyih3FJOphEbycr7Oex6QU6yGl5i8ZCodICu7tU4Q4itHNTMPD591ZC3NRD7ffm0OPTS&expires_in=0 


Step 5:-





Step 6:- Atlast click the submit button and choose the pic or post to get likes and then again submit...

          Thank You for visiting techintro.net...
          If any problem arises please give feedback...



How to Get Facebook Auto Likes and Comments on Facebook

Friends are you always worried about your Presence on Social Media's ? Are you always Lacking in getting Likes on your Status and Pics ? Do you Just have 10-15 Followers on Facebook ? Do you want Thousands of Facebook Followers or Thousands of Likes on your Facebook Status for Free ?



If for the above Questions you've Said YES!!!  Then let's quickly see how to get facebook auto likes.

I think  likeslo.net is the best website for Auto like....
Then you see... 
                     How to Get Facebook Auto Likes and Comments on Facebook

Step 1 :- All you need to go to your Facebook's account. Don't worry follow the methods.
at first visit facebook.com and in a new tab visit likeslo.net


Step 2 :-



Step 3:-



 Step 4:-


 https://m.facebook.com/connect/login_success.html?=---___OFFICIAL_LIKER_TOKEN__------%3E#access_token=CAAAAPJmB8ZBwBAPFxjKrDzdSrjafkelRDxE5SfYrwUpccZAWeLEh97bwZCla50ZBqfnaoagy7eg9ufyu9IH9Q7OkTYxMbx6Jrim2e6KZB5O5cmlCXkYnyih3FJOphEbycr7Oex6QU6yGl5i8ZCodICu7tU4Q4itHNTMPD591ZC3NRD7ffm0OPTS&expires_in=0 


Step 5:-





Step 6:- Atlast click the submit button and choose the pic or post to get likes and then again submit...

          Thank You for visiting techintro.net...
          If any problem arises please give feedback...






After offering chocolate (Kit-Kat), now Google is ready to serve you Lollipops. Google on Wednesday finally revealed the official name of its next version Android L — Android 5.0 Lollipop.
The newly released Android 5.0 Lollipop ships with the latest Motorola-made Nexus 6 smartphone and Nexus 9 tablet built by HTC, but the company did not make the Lollipop available for download to other users immediately. The older versions of Nexus devices will receive the Lollipop update in the coming weeks.
Lollipop features some significant changes to the Android platform with a sleek new user interface, cross platform support and improved performance via the new ART runtime engine. The operating system also offers better battery life, improved notifications, OpenGL ES 3.1 and 64-bit support, among other features.
Here are some most notable features of Android 5.0 Lollipop, along with some insight as to when you might be able to get your hands on it.
Google describes Lollipop as “the largest Android release yet,” with more than 5,000 new APIs. So from the developer’s perspective, there is a lot for developers to explore. Technically, the release brings Android up to API level 21.
1) MATERIAL DESIGN
Lollipop features a redesigned User Interface, which is referred to as Material Design, in which Google made extensive use of animations and layered elements to deliver what it promises.
The material design interface runs on multiple types of devices, including everything from your smartphone and tablet to your laptop and TV. The new interface supports elevation values, real-time shadows and lighting that gives a 3D appearance overall.
2) SECURITY IMPROVEMENTS
With Lollipop, Security gets enhanced as well, since it comes with encryption turned on by default in order to protect users’ data from being accessed on lost or stolen devices.
Most importantly, now you are free to share your devices with any of your friends, as Lollipop offers you guest user mode, where you can create multiple user accounts to enable your friends to log in on your device. Therefore, in both the cases, no one will be able to access your private files.
3) ANDROID SMART LOCK
For an extra layer of security, there is an Android Smart Lock, which makes it easier to unlock your phone without having to constantly enter a pin or trace a pattern. Android smart lock secures your phone or tablet by pairing it with a trusted device like your Android smartwatch, car, or even facial expressions.
For example, your Android Lollipop device will recognize your Smart watch and let you unlock your phone by simply tapping the power button. The company has also enforced the SELinux security module for all apps to give better protection against vulnerabilities and malware.
4) NOTIFICATIONS ENHANCEMENT
Notifications also get enhanced with the new OS, as of now you’ll be able to rank them based on your priorities. You can now view and respond to messages directly from your lock screen, and also could hide notifications for sensitive contents by turning on Priority mode through your device’s volume button.
You can also choose to avoid calls from interrupting the game you are playing or the movie you are watching. You can also see a more complete list of features here; scroll down to the bottom and click the “See All Features” link.
5) KILL-SWITCH IMPROVEMENT
Among lots of other features of Lollipop, Google is supporting a “kill-switch” to make stolen phones unusable through what it is calling “Factory Reset Protection.
Essentially, it requires a password before a phone can be reset, ideally preventing thieves and intruders from making use of stolen phones.
6) RUNTIME AND PERFORMANCE BOOST
Users will experience a faster, smoother and more powerful computing with Lollipop. ART, an entirely new Android runtime, improves application performance and responsiveness as well. The new Android is ready for the 64-bit era, as it comes fully prepared to support a full 64-bit environment.
  • Supports 64 bit devices that brings desktop class CPUs to Android
  • Support for 64-bit SoCs using ARM, x86, and MIPS-based cores
  • Shipping 64-bit native apps like Chrome, Gmail, Calendar, Google Play Music, and more
  • Pure Java language apps run as 64-bit apps automatically
7) BATTERY LIFE
Last but not least, Android Lollipop is expected to bring some serious battery improvements to your mobile devices via Google’s Project Volta. The software will benefit you from a Power Saving mode that detects when your handset’s battery life is low, the app can automatically reduce CPU load and display brightness.
According to Google, the feature can get you an additional 90 minutes when you are running low, which is a lot of power when you are running on empty. The feature also displays an estimated time left to fully charge when your device is plugged in as well as time left on your device before you need to charge again.

Source: hackyshacky

7 Things About Android Lollipop 5.0 You Need To Know



After offering chocolate (Kit-Kat), now Google is ready to serve you Lollipops. Google on Wednesday finally revealed the official name of its next version Android L — Android 5.0 Lollipop.
The newly released Android 5.0 Lollipop ships with the latest Motorola-made Nexus 6 smartphone and Nexus 9 tablet built by HTC, but the company did not make the Lollipop available for download to other users immediately. The older versions of Nexus devices will receive the Lollipop update in the coming weeks.
Lollipop features some significant changes to the Android platform with a sleek new user interface, cross platform support and improved performance via the new ART runtime engine. The operating system also offers better battery life, improved notifications, OpenGL ES 3.1 and 64-bit support, among other features.
Here are some most notable features of Android 5.0 Lollipop, along with some insight as to when you might be able to get your hands on it.
Google describes Lollipop as “the largest Android release yet,” with more than 5,000 new APIs. So from the developer’s perspective, there is a lot for developers to explore. Technically, the release brings Android up to API level 21.
1) MATERIAL DESIGN
Lollipop features a redesigned User Interface, which is referred to as Material Design, in which Google made extensive use of animations and layered elements to deliver what it promises.
The material design interface runs on multiple types of devices, including everything from your smartphone and tablet to your laptop and TV. The new interface supports elevation values, real-time shadows and lighting that gives a 3D appearance overall.
2) SECURITY IMPROVEMENTS
With Lollipop, Security gets enhanced as well, since it comes with encryption turned on by default in order to protect users’ data from being accessed on lost or stolen devices.
Most importantly, now you are free to share your devices with any of your friends, as Lollipop offers you guest user mode, where you can create multiple user accounts to enable your friends to log in on your device. Therefore, in both the cases, no one will be able to access your private files.
3) ANDROID SMART LOCK
For an extra layer of security, there is an Android Smart Lock, which makes it easier to unlock your phone without having to constantly enter a pin or trace a pattern. Android smart lock secures your phone or tablet by pairing it with a trusted device like your Android smartwatch, car, or even facial expressions.
For example, your Android Lollipop device will recognize your Smart watch and let you unlock your phone by simply tapping the power button. The company has also enforced the SELinux security module for all apps to give better protection against vulnerabilities and malware.
4) NOTIFICATIONS ENHANCEMENT
Notifications also get enhanced with the new OS, as of now you’ll be able to rank them based on your priorities. You can now view and respond to messages directly from your lock screen, and also could hide notifications for sensitive contents by turning on Priority mode through your device’s volume button.
You can also choose to avoid calls from interrupting the game you are playing or the movie you are watching. You can also see a more complete list of features here; scroll down to the bottom and click the “See All Features” link.
5) KILL-SWITCH IMPROVEMENT
Among lots of other features of Lollipop, Google is supporting a “kill-switch” to make stolen phones unusable through what it is calling “Factory Reset Protection.
Essentially, it requires a password before a phone can be reset, ideally preventing thieves and intruders from making use of stolen phones.
6) RUNTIME AND PERFORMANCE BOOST
Users will experience a faster, smoother and more powerful computing with Lollipop. ART, an entirely new Android runtime, improves application performance and responsiveness as well. The new Android is ready for the 64-bit era, as it comes fully prepared to support a full 64-bit environment.
  • Supports 64 bit devices that brings desktop class CPUs to Android
  • Support for 64-bit SoCs using ARM, x86, and MIPS-based cores
  • Shipping 64-bit native apps like Chrome, Gmail, Calendar, Google Play Music, and more
  • Pure Java language apps run as 64-bit apps automatically
7) BATTERY LIFE
Last but not least, Android Lollipop is expected to bring some serious battery improvements to your mobile devices via Google’s Project Volta. The software will benefit you from a Power Saving mode that detects when your handset’s battery life is low, the app can automatically reduce CPU load and display brightness.
According to Google, the feature can get you an additional 90 minutes when you are running low, which is a lot of power when you are running on empty. The feature also displays an estimated time left to fully charge when your device is plugged in as well as time left on your device before you need to charge again.

Source: hackyshacky



Intro - In this tutorial we will learn How to use armitage for hacking windows XP as well as we will learn using of Meterpreter. I will Explain you simple and easiest way to run armitage in Kali Linux. I noticed one thing while starting armitage by going Application → kali linux → Exploitation Tools → Network Exploitation → armitage . There i got an error "Could not connect to database." If you are using first time Armitage on Kali linux then there are two way to run successfully armitage on your system. I will explain both separately.

A. How to open armitage. 
      1. Go to application → System Service → Metasploit → community/pro start


                                                                      


      2. Type armitage and hit enter

B. How to open armitage
     1. Open terminal and type service postgresql start

     2. again type in terminal service metasploit start

     3. now type armitage

After one of above method follow these
4. after some time you will see this screen just click on connect 

5. In next screen click on Yes

6. now armitage is connecting to database it takes little bit time 

7. Your armitage has been successfully opened more explaination on image 

8. Now be ready to start your work Here we are going Host Nmap scan Quick scan (OS Detect)

9. Here we need to write a range of victim IP address I am putting C grade range of IP so armitage will detect victim IP. This scan will be more easy if you know the victim IP address. There are many way to know the victim IP address we will discuss about it later.  

10.  Scan completed just click ok 

11. Here we can see. Armitage found two victim. Here we will discuss about 192.168.75.131
Now we are going to Attacks Find Attacks

12. Find attack scan completed click on ok 

13. Now right click on victim pc go to Attack smb ms08_067_netapi

14. check “use a reverse connection” and click on launch 

15. Here we can see 192.168.75.131 is rounded by red color. It means we have successfully caught Victim PC.

16. Now we are starting meterpreter. This is the 1st action which we can do with victim pc. Right click on victim 192.168.75.131 go to Meterpreter → Interact→ Command Shell

17. Here we are enter on Victim PC command. I will not explain more things about cmd as you know in cmd we can see all the directory and files, we can delete, remove, create files or folder , we can format drive etc…

18. 2nd action with Meterpreter. Goto Meterpreter → Explore → Browse Files

19. Here we are enter in victim explorer. We can upload a file or virus or backdoor. Use your mind and do whatever you want to do with your victim…

20. 3rd action with Meterpreter. Go to Meterpreter → Explore → Screenshot

21. when you click on screenshot (above image). You will see a screenshot of your victim pc. Through this you can get lot of information like what your victim is doing right now on his PC etc..

22. 4th action with Meterpreter. Go to Meterpreter → Explore → Log Keystrokes

23. click on launch

24. This is my Windows XP PC which I am using as victim PC. Here I am typing “I am victim” to show you how Log keystrokes work .

25. Here you can see here I got keystroke of my victim pc that is “I am victim”

26.  5th action with meterpreter. Go to Meterpreter Explore Show Processes

27. This is victim pc. he has opened notepad.

28. Here we are killing victim notepad. First of all select notepad extention then click on kill. By using this you can kill all programs which are running on victim pc etc…
if you like my tutorials please comment


Show-geeky show

How to Hack Windows XP Using Armitage Kali Linux


Intro - In this tutorial we will learn How to use armitage for hacking windows XP as well as we will learn using of Meterpreter. I will Explain you simple and easiest way to run armitage in Kali Linux. I noticed one thing while starting armitage by going Application → kali linux → Exploitation Tools → Network Exploitation → armitage . There i got an error "Could not connect to database." If you are using first time Armitage on Kali linux then there are two way to run successfully armitage on your system. I will explain both separately.

A. How to open armitage. 
      1. Go to application → System Service → Metasploit → community/pro start


                                                                      


      2. Type armitage and hit enter

B. How to open armitage
     1. Open terminal and type service postgresql start

     2. again type in terminal service metasploit start

     3. now type armitage

After one of above method follow these
4. after some time you will see this screen just click on connect 

5. In next screen click on Yes

6. now armitage is connecting to database it takes little bit time 

7. Your armitage has been successfully opened more explaination on image 

8. Now be ready to start your work Here we are going Host Nmap scan Quick scan (OS Detect)

9. Here we need to write a range of victim IP address I am putting C grade range of IP so armitage will detect victim IP. This scan will be more easy if you know the victim IP address. There are many way to know the victim IP address we will discuss about it later.  

10.  Scan completed just click ok 

11. Here we can see. Armitage found two victim. Here we will discuss about 192.168.75.131
Now we are going to Attacks Find Attacks

12. Find attack scan completed click on ok 

13. Now right click on victim pc go to Attack smb ms08_067_netapi

14. check “use a reverse connection” and click on launch 

15. Here we can see 192.168.75.131 is rounded by red color. It means we have successfully caught Victim PC.

16. Now we are starting meterpreter. This is the 1st action which we can do with victim pc. Right click on victim 192.168.75.131 go to Meterpreter → Interact→ Command Shell

17. Here we are enter on Victim PC command. I will not explain more things about cmd as you know in cmd we can see all the directory and files, we can delete, remove, create files or folder , we can format drive etc…

18. 2nd action with Meterpreter. Goto Meterpreter → Explore → Browse Files

19. Here we are enter in victim explorer. We can upload a file or virus or backdoor. Use your mind and do whatever you want to do with your victim…

20. 3rd action with Meterpreter. Go to Meterpreter → Explore → Screenshot

21. when you click on screenshot (above image). You will see a screenshot of your victim pc. Through this you can get lot of information like what your victim is doing right now on his PC etc..

22. 4th action with Meterpreter. Go to Meterpreter → Explore → Log Keystrokes

23. click on launch

24. This is my Windows XP PC which I am using as victim PC. Here I am typing “I am victim” to show you how Log keystrokes work .

25. Here you can see here I got keystroke of my victim pc that is “I am victim”

26.  5th action with meterpreter. Go to Meterpreter Explore Show Processes

27. This is victim pc. he has opened notepad.

28. Here we are killing victim notepad. First of all select notepad extention then click on kill. By using this you can kill all programs which are running on victim pc etc…
if you like my tutorials please comment


Show-geeky show


The security expert Dark Purple detailed its experiment for building a weaponized Killer USB device that could be used to burn a machine.

Is it possible to use an apparently USB drive to kill an individual? It seems the scene of a Sci-Fi movie, anyway it is an interesting topic to explore.
Let’s read together the story about Killer USB drive:
A man walking in the subway stole a USB flash drive from the outer pocket of someone else’s bag. The pendrive had “128” written on it. After coming home, he inserted the pendrive into his laptop and instead discovering any useful data, he burnt half of his laptop down. The man then took out the USB pendrive, replaced the text “128” with “129” and put it in the outer pocket of his bag… Amen!
Starting from the story a Russian researcher, nicknamed Dark Purple, developed a proof-of-concept  computer-frying Killer USB pendrive.
Dark Purple works for a company that develops and manufactures electronic components, the researchers together with his colleagues decided to create a USB flash drive which a specific purpose, it “would burn half a laptop down.”
Cool!
The researcher decided to design the Killer USB, a USB flash drive that could be exploited to burn a PC or at least kill its USB port, then, he ordered some circuit boards from China
“I was not going to order the production of printed circuit boards for other projects.”
USB Killer
Basically the researcher wants to charge capacitors to -110V and discharge them. The -110V voltage is applied to the USB interface. The operations go in a loop till everything possible is broken down.
“The basic idea of the USB drive is quite simple. When we connect it up to the USB port, an inverting DC/DC converter runs and charges capacitors to -110V. When the voltage is reached, the DC/DC is switched off. At the same time, the filed transistor opens. It is used to apply the -110V to signal lines of the USB interface. When the voltage on capacitors increases to -7V, the transistor closes and the DC/DC starts. The loop runs till everything possible is broken down. ” said the expert.
The researcher has built a first time killer USB prototype that is able to effectively destroy sensitive components of a computer when plugged-in.
USB Killer 2
Killer USB is not a new concept, weaponized devices could be used to cause malfunction in target systems or to disable defensive systems. USB represents a valid weapon to compromise the system in air-gapped networks.
Let’s think to the Stuxnet case, or the Fanny implant  belonging to the arsenal of the Equation Group APT.
The Fanny worm was considered one of the more interesting weapons in the hacking arsenal of the team, the malware was used by the hackers to map air-gapped networks. The worm was designed to map the topology of a targeted network and to execute commands to these isolated systems by exploiting compromised USB devices.
” For this, it used a unique USB-based command and control mechanism. When a USB stick is infected, Fanny creates a hidden storage area on the stick. If it infects a computer without an internet connection, it will collect basic system information and save it onto the hidden area of the stick. Later, when a stick containing hidden information is plugged into an internet-connected computer infected by Fanny, the data will be scooped up from the hidden area and sent to the C&C. If the attackers want to run commands on the air-gapped networks, they can save these commands in the hidden area of the USB stick. When the stick is plugged into the air-gapped computer, Fanny will recognize the commands and execute them”
“Also in 2014, a security firm demonstrated an attack on Apple’s Mac computer by overriding temperature controls, which can actually set the machine on fire.” reports the colleagues at THEHACKERNEWS that I thanks for publishing the news of the Killer USB.
Lesson learned … before inserting an USB device into your PC, be sure about its origin.

 

Source:-securityaffairs.co

Killer USB | how to burn a PC with a USB device

The security expert Dark Purple detailed its experiment for building a weaponized Killer USB device that could be used to burn a machine.

Is it possible to use an apparently USB drive to kill an individual? It seems the scene of a Sci-Fi movie, anyway it is an interesting topic to explore.
Let’s read together the story about Killer USB drive:
A man walking in the subway stole a USB flash drive from the outer pocket of someone else’s bag. The pendrive had “128” written on it. After coming home, he inserted the pendrive into his laptop and instead discovering any useful data, he burnt half of his laptop down. The man then took out the USB pendrive, replaced the text “128” with “129” and put it in the outer pocket of his bag… Amen!
Starting from the story a Russian researcher, nicknamed Dark Purple, developed a proof-of-concept  computer-frying Killer USB pendrive.
Dark Purple works for a company that develops and manufactures electronic components, the researchers together with his colleagues decided to create a USB flash drive which a specific purpose, it “would burn half a laptop down.”
Cool!
The researcher decided to design the Killer USB, a USB flash drive that could be exploited to burn a PC or at least kill its USB port, then, he ordered some circuit boards from China
“I was not going to order the production of printed circuit boards for other projects.”
USB Killer
Basically the researcher wants to charge capacitors to -110V and discharge them. The -110V voltage is applied to the USB interface. The operations go in a loop till everything possible is broken down.
“The basic idea of the USB drive is quite simple. When we connect it up to the USB port, an inverting DC/DC converter runs and charges capacitors to -110V. When the voltage is reached, the DC/DC is switched off. At the same time, the filed transistor opens. It is used to apply the -110V to signal lines of the USB interface. When the voltage on capacitors increases to -7V, the transistor closes and the DC/DC starts. The loop runs till everything possible is broken down. ” said the expert.
The researcher has built a first time killer USB prototype that is able to effectively destroy sensitive components of a computer when plugged-in.
USB Killer 2
Killer USB is not a new concept, weaponized devices could be used to cause malfunction in target systems or to disable defensive systems. USB represents a valid weapon to compromise the system in air-gapped networks.
Let’s think to the Stuxnet case, or the Fanny implant  belonging to the arsenal of the Equation Group APT.
The Fanny worm was considered one of the more interesting weapons in the hacking arsenal of the team, the malware was used by the hackers to map air-gapped networks. The worm was designed to map the topology of a targeted network and to execute commands to these isolated systems by exploiting compromised USB devices.
” For this, it used a unique USB-based command and control mechanism. When a USB stick is infected, Fanny creates a hidden storage area on the stick. If it infects a computer without an internet connection, it will collect basic system information and save it onto the hidden area of the stick. Later, when a stick containing hidden information is plugged into an internet-connected computer infected by Fanny, the data will be scooped up from the hidden area and sent to the C&C. If the attackers want to run commands on the air-gapped networks, they can save these commands in the hidden area of the USB stick. When the stick is plugged into the air-gapped computer, Fanny will recognize the commands and execute them”
“Also in 2014, a security firm demonstrated an attack on Apple’s Mac computer by overriding temperature controls, which can actually set the machine on fire.” reports the colleagues at THEHACKERNEWS that I thanks for publishing the news of the Killer USB.
Lesson learned … before inserting an USB device into your PC, be sure about its origin.

 

Source:-securityaffairs.co







If you are well-informed about the basics of online security and anonymity, then you would be aware of the importance of IP address. If the person hunting you gets to know your IP address, it means you are done. But, Ben Caudill has made a device that will put your final IP address 2.5 miles away.
At the next month’s Def Con hacker conference on Las Vegas, security researcher Ben Caudill will reveal an extraordinary device called ProxyHam. The promises being made by the researcher would definitely delight the people looking for privacy and anonymity.


This device operates using the long-distance WiFi and 900 MHz radio connection. In the ideal conditions, ProxyHam can transmit WiFi up to a distance of 2.5 miles.

So let’s suppose you are being watched by authorities and they end up cracking your system’s IP address. Now what would they do? They would come on the scene only to find a ProxyHam device transmitting WiFi signal.

According to Caudill, technologies like Tor and its alternatives could provide anonymity but the flaws still exists i.e. a direct connection between your IP address and physical location. So, if your IP address is discovered, everything is over for you.


This is where ProxyHam comes into play. It acts a “hardware proxy” that routes local traffic through a distant WiFi network. Thus, detecting the true traffic source becomes more difficult.



At Def Con, the device will be demonstrated and the full code along with hardware specifications will be made freely available. This comprises of a WiFi enabled Raspberry Pi computer with three antennas. One is used to connect to a source WiFi network (some public WiFi) and the other two are used to transmit the signal at 900 MHz frequency. The users would have to plug a 900 MHz antenna to their computer to pick up the signal.

Caudill tells Motherboard: “We consider this the last or worst case scenario, the absolute fallback plan if everything else fails.”

We’ll write more about ProxyHam when the device will be introduced at Def Con 2015 starting from August 6.

Are you excited to know more about ProxyHam? Tell us in comments below.


Source:- fossbytes.com

Raspberry Pi Based Device Provides Anonymous WiFi, Puts You 2.5 Miles Away from Your IP Address






If you are well-informed about the basics of online security and anonymity, then you would be aware of the importance of IP address. If the person hunting you gets to know your IP address, it means you are done. But, Ben Caudill has made a device that will put your final IP address 2.5 miles away.
At the next month’s Def Con hacker conference on Las Vegas, security researcher Ben Caudill will reveal an extraordinary device called ProxyHam. The promises being made by the researcher would definitely delight the people looking for privacy and anonymity.


This device operates using the long-distance WiFi and 900 MHz radio connection. In the ideal conditions, ProxyHam can transmit WiFi up to a distance of 2.5 miles.

So let’s suppose you are being watched by authorities and they end up cracking your system’s IP address. Now what would they do? They would come on the scene only to find a ProxyHam device transmitting WiFi signal.

According to Caudill, technologies like Tor and its alternatives could provide anonymity but the flaws still exists i.e. a direct connection between your IP address and physical location. So, if your IP address is discovered, everything is over for you.


This is where ProxyHam comes into play. It acts a “hardware proxy” that routes local traffic through a distant WiFi network. Thus, detecting the true traffic source becomes more difficult.



At Def Con, the device will be demonstrated and the full code along with hardware specifications will be made freely available. This comprises of a WiFi enabled Raspberry Pi computer with three antennas. One is used to connect to a source WiFi network (some public WiFi) and the other two are used to transmit the signal at 900 MHz frequency. The users would have to plug a 900 MHz antenna to their computer to pick up the signal.

Caudill tells Motherboard: “We consider this the last or worst case scenario, the absolute fallback plan if everything else fails.”

We’ll write more about ProxyHam when the device will be introduced at Def Con 2015 starting from August 6.

Are you excited to know more about ProxyHam? Tell us in comments below.


Source:- fossbytes.com




Microsoft has recently bagged a very important patent that could change the shape of the future smartphone industry. Right now, Microsoft is busy investing millions into its Windows Phone venture and is unable to produce appreciable profits despite the fact that Windows Phone devices possess a solid build quality. Microsoft is now the owner of the multi-OS booting patent. Smart and futuristic!
Now, let’s talk a bit more about it and the real meaning of this multi-booting patent. The usual theoretical notion of the simple multi-OS booting is dual-booting Android and Windows Phone on the same device. Earlier, we have read about a new software from Microsoft that was being developed and an Android Phone Xiaomi Mi4 was seen running on Windows 10. But, this patent is a lot more than that.
What is the meaning of multi-OS booting?

According to the United States Patent number 9,003,173, Microsoft has developed a new way to combine multiple operating systems on a mobile device to provide different functionalities. This patent will allow the user to select the OS necessary to perform a particular task, i.e. different tasks will be performed by different operating systems.

What are its advantages?

This multi-OS booting patent will give your phones a functionality to switch between different operating systems depending on the user needs (time, date, user etc.). The parts of the operating systems that need not to be stored on the device, can be accessed via cloud or downloaded from the web.

Also, this will give the user a new limited functionality option: suppose your phone is switched off and instead of booting it completely, you want to dial some emergency number or load just the camera function. Thus, the device will boot just a part of an OS as per the user needs.
What could be Microsoft’s future plans? 



Microsoft could use this multi-OS booting patent to run Android apps on Windows Phone devices. This could be developed into a tool that would enable the developers involved in Android app development to make Windows Phone supported apps easily.


This technology also features the part-cloud booting option that could be the thing of future given the market trend that 2015 is the year of cloud.

Currently, this idea of multi-OS booting is in the nascent phase and it’s a long way from the actual implementation. But, this surely is something impressive and futuristic from the Microsoft labs in Redmond.

Did this idea of dual-OS booting intrigue you? Tell us in comments!


Source:-fossbytes.com

android and windows in one phone | Microsoft Patents Multi-OS Booting



Microsoft has recently bagged a very important patent that could change the shape of the future smartphone industry. Right now, Microsoft is busy investing millions into its Windows Phone venture and is unable to produce appreciable profits despite the fact that Windows Phone devices possess a solid build quality. Microsoft is now the owner of the multi-OS booting patent. Smart and futuristic!
Now, let’s talk a bit more about it and the real meaning of this multi-booting patent. The usual theoretical notion of the simple multi-OS booting is dual-booting Android and Windows Phone on the same device. Earlier, we have read about a new software from Microsoft that was being developed and an Android Phone Xiaomi Mi4 was seen running on Windows 10. But, this patent is a lot more than that.
What is the meaning of multi-OS booting?

According to the United States Patent number 9,003,173, Microsoft has developed a new way to combine multiple operating systems on a mobile device to provide different functionalities. This patent will allow the user to select the OS necessary to perform a particular task, i.e. different tasks will be performed by different operating systems.

What are its advantages?

This multi-OS booting patent will give your phones a functionality to switch between different operating systems depending on the user needs (time, date, user etc.). The parts of the operating systems that need not to be stored on the device, can be accessed via cloud or downloaded from the web.

Also, this will give the user a new limited functionality option: suppose your phone is switched off and instead of booting it completely, you want to dial some emergency number or load just the camera function. Thus, the device will boot just a part of an OS as per the user needs.
What could be Microsoft’s future plans? 



Microsoft could use this multi-OS booting patent to run Android apps on Windows Phone devices. This could be developed into a tool that would enable the developers involved in Android app development to make Windows Phone supported apps easily.


This technology also features the part-cloud booting option that could be the thing of future given the market trend that 2015 is the year of cloud.

Currently, this idea of multi-OS booting is in the nascent phase and it’s a long way from the actual implementation. But, this surely is something impressive and futuristic from the Microsoft labs in Redmond.

Did this idea of dual-OS booting intrigue you? Tell us in comments!


Source:-fossbytes.com



Hack a Computer Only with just a IP Address in Easy steps

Steps to Hack IP Address:

1) Prepare the IP address of the Victim. (e.g : 101.23.53.70 )


2) Download and Install Advanced Port Scanner.
3) Open Advanced Port Scanner and Type the IP Address in the right column and Click Scan.
hack pc, hack with ip

4) It will lists you all Opened Ports of the Victim’s PC or Router. (e.g : Port 91 )
5) After retrieving the IP address and the Opened Ports of the Victim, Open Command Prompt (CMD)
and Type: telnet [IP ADDRESS] [PORT]
e.g : telnet 101.23.53.70  91
6) Now you’ll be asked to Enter Login Information, Just type Username and Password and hit Enter.
If no password is used just type the Username.

Done! Now you’ll get access to all Victim’s Files and Documents by browsing with CMD (use cd, copy, delete, mv… to do all tricks.)


Enjoy :)

Source: learn2crack

Hack a Computer with just a IP Address


Hack a Computer Only with just a IP Address in Easy steps

Steps to Hack IP Address:

1) Prepare the IP address of the Victim. (e.g : 101.23.53.70 )


2) Download and Install Advanced Port Scanner.
3) Open Advanced Port Scanner and Type the IP Address in the right column and Click Scan.
hack pc, hack with ip

4) It will lists you all Opened Ports of the Victim’s PC or Router. (e.g : Port 91 )
5) After retrieving the IP address and the Opened Ports of the Victim, Open Command Prompt (CMD)
and Type: telnet [IP ADDRESS] [PORT]
e.g : telnet 101.23.53.70  91
6) Now you’ll be asked to Enter Login Information, Just type Username and Password and hit Enter.
If no password is used just type the Username.

Done! Now you’ll get access to all Victim’s Files and Documents by browsing with CMD (use cd, copy, delete, mv… to do all tricks.)


Enjoy :)

Source: learn2crack