Tweaky Tricks

Latest Ethical hacking Tips and Tricks.

Latest Post



Hello MIUIers, hope you are doing well. Today we talk about uninstall/disable pre-installed system apps which come in Xiaomi phones. When you buy any Xiaomi phone then you see its have some pre-installed apps Some apps from Google, some form Xioami. This is really irritating when you see these apps in your menu even you don’t use these apps. So if you are thinking to remove these pre-installed Google apps from your Xiaomi phone then you are at the right palace. Here we share the safest way to remove bloatware apps from your Xiaomi mobile.
This method works for all Xiaomi mobile no matter which is Redmi 1s, Redmi 2, Redmi 2 Prime, Redmi 3s, Redmi 3s Prime, Redmi Note 3, Redmi 4A,  Redmi Note 4, Redmi Note 4G, Redmi note 3, Mi 3, Mi 4, Mi 4i, Mi5, Mi 5plus, Mi Max, Mi Mix etc. You can disable Google Apps on any Xiaomi Mobile without root no matter which is based on MIUI 7 or MIUI 8. This method work on both MIUI versions.
Before the MIUI 8, users directly disable system apps from setting-> Apps ->All and choose particular system app and tap on disable option.  But now in MIUI 8, Xiaomi remove this option for disabling apps. You can disable pre-installed apps in an easy way via using third party app.

Steps to disable system apps in MIUI 8 Xiaomi phones (Redmi & Mi Series):

It’s not too hard to disable system apps. Just follow some easy steps to disable any system app in your favorite Xiaomi phone.

Easy Steps for disabling pre-installed system apps on Xiaomi mobiles:
Download Activity Launcher by Adam Szalkowski from here Playstore link.
and Install the app. 



Choose “All Activities” from the top drop down menu.
 

Scroll down till you see “2” “Settings” icons, tap on the first one.

Scroll down till you see “4” “Installed Apps” icons, tap on the Second one.

Select any Google or any Stock Apps that you want to disable, go back & reboot your phone.

  1. All set, Done.
After following above steps you can easily disable any system app which you want to disable. You can also disable pre-installed MIUI apps which you don’t like via following same steps. Here you are thinking Why we Disable system Apps rather than uninstalling them?  Yes, we can uninstall them but we don’t do because maybe you uninstall a required app which plays an important role in system performance. Suppose you uninstall a required app which is useful during phone boot then what your phone always in bootloop.Or maybe you want to temporary  Disable to free some ram and to save battery ,Because of these issues we always disable apps rather than uninstalling them.
Through the above given steps, you can disable many pre-installed apps which are Chrome, Google Drive, Duo, Gmail, Google App/Search, Google Keyboard, Google Play Movies & TV, Google Playstore, Hangouts, Google Maps, Google Photos, YouTube etc. In the same manner, you can also disable some MIUI bloatware apps which are Calculator, Calendar, Contacts & Dialer, Downloads, Messaging & Weather.
This method work on all Xiaomi phones which is based on Redmi series & Mi series. So now you can easily disable any system app on MIUI 8. There is no root required for disabling system apps in your Xiaomi phone.
Enjoy Xiaomi service because
Always Believe that something wonderful is about to happen.

Oppo is planning on unveiling its latest flagship phone on June 10th, but whatever they announce won’t be much of a surprise, thanks to an ongoing stream of substantial leaks. In the latest news that Android Pure has obtained are the official renders for the Oppo R11


The R11 will be available in at least four colors that we’ve seen: gold, rose gold, silver, and black. Earlier leaks point toward the R11 being no slouch in the specs department either:
  • 5.5-inch 1080p display
  • Snapdragon 660 processor
  • 4GB of RAM, 64GB of storage
  • 20MP dual camera system
  • 3,000mAh battery, fingerprint sensor

  • Unofficial preliminary specifications
    Network Technology GSM / CDMA / HSPA / EVDO / LTE
    Launch Announced Not announced yet
    Status Rumored
    Body Dimensions -
    Weight -
    SIM Dual SIM (Nano-SIM, dual stand-by)
    Display Type Capacitive touchscreen, 16M colors
    Size 5.5 inches
    Resolution 1080 x 1920 pixels (~401 ppi pixel density)
    Multitouch Yes
    Platform OS Android 7.1.1 (Nougat)
    CPU Octa-core 2.2 GHz Cortex-A53
    GPU Adreno 510
    Memory Card slot microSD, up to 256 GB (uses SIM 2 slot)
    Internal 64 GB, 4 GB RAM
    Camera Primary Dual 16 MP, phase detection autofocus, LED flash
    Features Geo-tagging, touch focus, face detection, HDR, panorama
    Video 1080p@30fps
    Secondary 20 MP, 1080p
    Sound Alert types Vibration; MP3, WAV ringtones
    Loudspeaker Yes
    3.5mm jack Yes
     - Active noise cancellation with dedicated mic
    Comms WLAN Wi-Fi 802.11 a/b/g/n/ac, dual-band, WiFi Direct, hotspot
    Bluetooth 4.2, A2DP, LE, EDR
    GPS Yes, with A-GPS
    Radio To be confirmed
    USB Yes
    Features Sensors Fingerprint (front-mounted), accelerometer, gyro, proximity, compass
    Messaging SMS (threaded view), MMS, Email, Push Email
    Browser HTML5
    Java No
     - MP4/H.264 player
    - MP3/WAV/eAAC+/FLAC player
    - Document viewer
    - Photo/video editor
    Battery  
    Misc Colors Gold
    Disclaimer. We can not guarantee that the information on this page is 100% correct.
Supposedly there will also be a bigger version, the R11 Plus, which will naturally come with a larger display and bigger battery. And with 10 days left before the official announcement, it’s likely that the Plus may leak out as well.

Qualcomm loves its charging standards, which have become just as much a selling point for its Snapdragon chipsets as the processor power. Now, just a mere six months after announcing Quick Charge 4, which boosted charging times and safety considerably over its predecessors, Qualcomm is introducing the new Quick Charge 4+ standard.
Unlike previous standards, which required a new chipset, 4+ is something device and accessory manufacturers can implement by adding three enhancements to Quick Charge 4-compliant devices:
  • "Dual Charge," which is already an option in earlier version of Quick Charge, but is "now more powerful"
  • "Intelligent Thermal Balancing," which steers current through whichever of the dual charging pathways is coolest to keep temperatures down
  • "Advanced Safety Features" to monitor both the phone temperature and the connector temperature to protect against overheating and short-circuit damage
Qualcomm claims devices that implement this standard can get charging times up to 15 percent faster than Quick Charge 4, and will charge up to 30 percent more efficiently — an especially nice perk if you're charging from a battery pack. Charging will also be up to 3 degrees Celsius (about 5 degrees Fahrenheit) cooler.
Unfortunately, you most likely won't get these features with a software patch to existing devices, since these are mostly hardware enhancements. So far there's one device confirmed to include 4+: the just-announced Nubia Z17, a Snapdragon 835 phone with a 3200mAh battery.



An internet connection has become a basic and important necessity in our modern lives. With the increasing use of Internet and handy devices like smartphone and tablet and other smart gadgets that make use of internet almost all the things are now available online in digital form. Today, we are going to share the best software tool to crack Wi-Fi password .


1. Aircrack Wi-Fi cracker software

Aircrack is one of the most popular wireless passwords cracking tools that helps you to crack 802.11a/b/g WEP and WPA cracking. The software uses the best algorithms to recover the password of any wireless network by capturing packets, once the enough packets from any wireless network gathered; the software tries to recover the password.

Aircrack works well with Windows, Linux, OS X, Open BSD, NetBSD, Solaris and more.

https://www.aircrack-ng.org/

2.CommonView for Wi-Fi

CommonView for Wi-Fi is also a popular wireless network monitor and packer analyzer tool. It comes with easy to understand and use GUI to work with. This tool is basically for Wi-Fi network admins and security professionals who want to monitor and troubleshoot network related problems. It works fine with Wi-Fi 802.11 a/b/g/n/ac networks. It captures every single packet and lets you see useful information of the network. You can also get useful information like protocol distribution, access points, signal strength and more. This tool offers key information about a network and has a good value for network admins.
it is used for capturing packets to crack it with aircrack.
https://my.pcloud.com/publink/show?code=XZsvjaZ4ym5msytyP5UiHOdASPARmVEEkx7

2. Wi-Fi Password Hacker Pro Wi-Fi cracker software

Wi-Fi Password Hacker Pro is the latest program that provides you access to secure networks. It is the tool that lets you search out all the wireless networks available. The software uses the latest algorithms to decrypt the password and decrypts the password in just 10 minutes. Wi-Fi Password Hacker Pro looks up 802. 11a, 802.11b, 802.11g network and hacks secure circle standards WEP/WPA/WPA2. No matter what type of network encryption is there, Wi-Fi Password Hacker Pro can hack any type of network with a click of a button.
http://wifi-hack-pro.soft112.com/

3. Kismet Wi-Fi password cracker software

Kismet is network detector, packet sniffer and intrusion detection software for 802.11 wireless LANs that supports raw monitoring mode and sniff 802.11a, 802.11b, 802.11g and 802.11n traffic.
http://tech-files.com/download-kismet-wifi-hacking-software/
Kismet sniffs and captures packets of the wireless network in order to determine username and password. You can also use Kismet to identify hidden network and sniff into other connected systems as Kismet features the ability to detect default or non-configured networks and determine what level of wireless encryption need to be used on a given access point.
Kismet comes with three separate parts, drone to collect the packets of any wireless network, a server in connection with the drone to interpret packet data and extrapolating wireless information and the client that communicates with server and displays all the information collected by the server.

4. AirSnort Wi-Fi passwords cracker software

AirSnort is wireless LAN tool which cracks encryption keys on 802.11b WEP networks. This software works well with Linux and Microsoft Windows for decrypting WEP encryption on the 802.11b network. AirSnort saves data in two formats. First, all the packets captured by AirSnort is saved in pcap dump file. It also saves data to capture session in the form of crack files.

Running AirSnort is quite easy, once launched AirSnort must be configured to work with wireless NIC so that it could make attempts to crack the password. AirSnort operated by passively monitoring the entire transmissions and computing the encryption key as soon as enough packers are gathered.

5. NetStumbler

NetStumbler basically known as Network Stumbler is Windows tool that detects 802.11b, 802.11a, 802.11g wireless LANs. NetStumbler is used to verify wireless network configuration, detecting cause of wireless interface, detecting unauthorized access points, wardriving, finding location with poor network security and more.
 
http://www.netstumbler.com/downloads/hhh

6. Cain and Abel

 is undoubtedly one of the most popular tool available.
 It is been used by many hackers across the planet. There are many functions in
 Cain and Abel. If someone can master them all, then he can crack any system 
easily. Cain and Abel include Password cracking through dictionary and brute-force 
attack, Packet capturing, phishing, Wifi hacking, Hash generators etc. 
 

6,Net Cut

 Netcut is one of the easiest of all tools of hacking wireless networks. 
Netcut is used to disconnect the network of a remote PC. It is very easy to use 
and configure Netcut....
It is used to Disconnect  internet connection of any device on same network.
 

7.WireShark

Wireshark is a network analyzer tool. It helps to capture data packets over a
 WiFi network and then analyze that packets. Wireshark is used as a phishing tool.
 With the proper knowledge of Wireshark, one can easily capture internet
 usernames and passwords of a user connected to a Wireless network.

 *To get tutorial and help with any of software please comment below or send us a message on our facebook page....for case of any broken download link please let us inform.

incoming keywords
how to hack wifi with windows
best wifi hacking tool for windows 
wifi hacking software for windows
how to hack wifi password with software,
hack wifi password software free download,
how to hack wpa2 password , 

Android OS is one of the popular platform used in nowadays. Android phones have a great competition with the Apple’s IOS operating system. After Apple iPhone, only Android OS have that much flexibility to give the user a great experience. Are Looking for Best iPhone launchers for Android devices? Sometimes you are getting bored of your old Android look, so, that’s why here I have listed the cool Android launchers which look like iPhone home screen. There are lots of iOS launcher in the play store which are best at of my knowledge.
By using Android launchers, you can customize your phone according to you. Your Android icons will look like iPhone images when you download one of the below given best iPhone launchers for Android. Without wasting time let’s get into the main article.


Best iPhone Launchers for Android or IOS Launcher for Android

Below is the list of best and coolest IOS launchers for Android phones that you must download in 2017.

1. iLauncher IOS 9

There is no separate menu for apps; all the apps are included in homepage. Uninstalling and hiding apps is too easy in iLauncher OS 9. Here are all the great features of iLauncher OS 9:
  • No App Drawer & easy access to apps.
  • Lot’s of gesture’s features.
  • Personalizations.

2. One Launcher

One launcher is easy to use and fast launcher for Android phones. The developer of One launcher just made the launcher so beautiful and impressive for theme lovers. One launcher does not use lots of RAM memory of your Android phone.
The Launcher highly optimized for faster loading and clean design. Below are the some of the feature of ONE Launcher:
  • Simple & light weighted
  • Clean or Beautiful home screen replacement.
  • Lot’s of theme styles.
  • Many effects & flexibility

3. xOS Launcher

Are you bored with default Android launcher? Then you are at right choice. xOS is excellent light weighted & smooth Android launcher. Icons are imported from the IOS 9. xOS launcher officially claims that they have better services than other launchers like Next, Nova and Go launcher.


You can also find lots of themes based on the Android phones models like Samsung, Sony and other phones. The launcher also has a feature to look like an iPhone. Feature are below:
  • Light weighted
  • Customizable home screen.
  • Smart widgets and Effects.

4. OS 10 Launcher HD

OS 10 Launcher is stylish and smart launcher for Android phones. Graphical user interface in OS 10 is good rather than other launchers that I mention above. You can also Hide the apps from the menu bar and many more things.

The iPhone launcher for Android phone automatically sort apps according to your choice here are the features below:
  • Hide Apps.
  • Sliding Effects.
  • Memory booster.

5. Launcher for IOS 10

Everyone like IOS 8 or IOS 9, are you one of them? The another best phone launcher for Android, feel the experience of IOS 10 on your Android phone.  The launcher will make your Android phone look like iPhone 7.
Feel the HD experience of IOS 10; Icon will look like IOS 10. Here are the other features:
  • Smooth icons.
  • Custom icon packs.
  • Save your battery.
  • IOS 10 style lockscreen

If you know any other best iphone launcher for Android then let us know in the comment box below. Do share & subscribe to us.




Android device phoning home to china



of the phones seems to be Blu R1 HD, which is ‘Currently unavailable’ on Amazon.com and customers that bought it have received security update e-mails.
Security researchers have uncovered a secret backdoor in Android phones that sends almost all personally identifiable information to servers based in China.
The firmware is managed by Shanghai Adups Technology, and according to the company, is contained on over 700 million phones worldwide, including phones available in the United States.
Adups says that the firmware provides companies with data for customer support, but an analysis by Kryptowire revealed that the software sends the full bodies of text messages, contact lists, call history with full telephone numbers, and unique device identifiers including the International Mobile Subscriber Identity and the International Mobile Station Equipment Identity.
Or, in other words, everything that you would need to keep someone under surveillance.
Although Shanghai Adups is not affiliated with the Chinese government, the discovery of the firmware is being taken very seriously by US government officials: not least because the firmware does not disclose what it is doing and the firmware – spyware – comes pre-installed on new phones.
It looks like the CIA/FBI/Homeland will be looking into this as it could potentially be framed as a Nation state attack (even though it’s most likely not) – it’s just some unethical businessman. Also the fact that Kryptowire was established by DARPA (Defense Advanced Research Projects Agency) and Homeland – so yeah.

On its website, Adups says its firmware is used by 400 mobile operators, semiconductor vendors, and device manufacturers, covering everything from smartphones to wearables to cars and televisions.
The company has admitted that the specific software under examination was written following a request by a Chinese manufacturer, but has refused to name the company.
Phones with the firmware are available for purchase online in the US, including through major retailers like Amazon and BestBuy. Kryptowire said it only discovered its existence by accident when one of its researchers bought a phone to travel with and noticed some irregular network traffic when he turned it on.
Adups has not published a list of the phones its software is included in, although it is known to provide its software to the two large Chinese phone manufacturers Huawei and ZTE. Google has apparently told the company to also remove its software from any Android phones that run its app store, Google Play.
As mentioned in the first sentence, this is not surprising, it’s happened before and it will happen again. China is not best known for it’s ethical business practises or its respect for user privacy and sensitive data handling.
So be careful what you buy, and perhaps spend a few bucks more for something you can trust.

 Spammers using Facebook Messenger to Spread Locky Ransomware

 

 
If you came across any Facebook Message with an image file (exactly .SVG file format) send by any of your Facebook friends, just avoid clicking it.

An ongoing Facebook spam campaign is spreading malware downloader among Facebook users by taking advantage of innocent-looking SVG image file to infect computers.

If clicked, the file would eventually infect your PC with the nasty Locky Ransomware, a family of malware that has quickly become one of the favorite tools among criminals due to its infecting capabilities.

Hoper – A Tool To Trace URL’s Jumps Across The Shorten Links

Hoper, is a tool that shows all the hops that makes a URL you specify to reach its endpoints. Example: If you want to see the entire trip by email URL or like a URL shorten. Hoper returns you all URLs redirection’s.


How to Install:

gem install hoper

How to Use:

hoper [url]
 
 
 

Development:

After checking out the repo, run bin/setup to install dependencies. You can also run bin/console for an interactive prompt that will allow you to experiment.
To install this gem onto your system, run bundle exec rake install.
To release a new version, update the version number in version.rb, and then run bundle exec rake release, which will create a git tag for the version, push git commits and tags, and push the .gem file to rubygems.org.

 DOWNLOAD NOW

Rs 2000 Currency Note With Nano GPS Chip – Hoax or Not?

This was supposed to be one of the biggest news for banking sector, financial institutions and the common man – because it involved India’s largest currency denomination, Rs 2000.
Way back in 1938, and then again in 1954, then Governments introduced currency denomination of Rs 10,000 which was later put out of circulation in 1946 and 1978 respectively. If we leave aside Rs 10,000 currency, then Rs 2000 would be the largest denomination in the history of India.
Soon after reports emerged that Rs 2000 currency notes would be introduced by RBI, another set of rumors emerged that these notes would be embedded with nano-GPS chips which can be traced all over the world.

The Hindu published the first available report of Rs 2000 currency being printed, and about to be launched by RBI.
As per their report, currency printing press in Mysuru has already printed the first lot, and it has been dispatched to RBI headquarters for country-wide distribution.
Soon, this report by picked by social media, and images of the new Rs 2000 currency notes started to circulate. Soon, Twitter was abuzz with images of these notes – a unique shade of pink and white with a new design.
It also spread like wild fire among WhatsApp users – everyone was circulating the Rs. 2000 currency note images. Interestingly, it is not just one image, but a number of different ones have been circulating on Social Media as well as Instant messengers.

ome analysts described this move as a mistake, considering that such huge denomination of currency will encourage more cash transactions and black money market can thrive under such scenario. This goes completely opposite to what Govt. has been trying since last few months – encouraging cashless economy.
In fact, at a time when RBI has capped ATM withdrawals because they want to encourage cashless economy, this move seems like a mistake.
However, another set of views describe this step as a masterstroke, as it takes only Rs 3 to print a Rs 1000 notes, and it would take even lesser to print a Rs 2000 note. Lower the denomination, higher are the costs involved in printing them.
Hence, in proportion to the cost involved in printing money, Rs 2000 notes would be the best one.
As of March, 2016, total of Rs 16,41,500 lakh crore worth of currency notes are in circulation in India, with Rs 500 and Rs 100 0 accounting for 86% of the total value of the notes.

Nano-GPS Chips in Rs 2000 Notes: Facts and Fiction

FULLY FAKE NEWS  https://youtu.be/r_jzEFWHJRg

After a day of the stories regarding Rs 2000 currency notes, a new theory started being shared across social media: The new notes are loaded with nano-GPS chips (NGC) which will enable the Govt. to easily track these notes, hence controlling black money transactions.
As per the rumors, NGC chips are actually ‘signal-reflectors’ which would help satellites to track the location of the notes – even if they are ‘120 meters’ below ground level. The logic is that, the satellites will track heavy accumulation of such NGC enabled notes, and will take immediate action to track and seize such money (assuming they are black money)
Fact Check: This theory cannot be put aside all-together. World’s smallest fully integrated GPS receiver has been developed by OriginGPS Nano Spider, which measures 4x4x2.1mm. Comparably, this device is smaller than a pencil lead, and can open a new avenue of wearable devices – now this chip can track clothes, watches, electronic appliances and more.
But stating that a NGC can track a currency note, is a bit too far fetched. At a bare minimum, such a device would cost atleast Rs 50 to manufacture, and if Govt. embed every currency note of Rs 2000, then the total costs involved would be too high to even consider the plan.
Hence, we would term this theory as another rumor, which has been attributed to an ongoing rumor of Rs 2000 currency note. As we shared earlier, until and unless Govt. and RBI comes out with an official announcement, we would consider both of these theories as rumor.
In case you have any evidence or proof regarding these two stories, do let us know by commenting right here!
"Rs 2000 Currency Note With Nano GPS Chip - Hoax or Not?", 4 out of 5 based on 132 ratings.

 




This USB Stick Will Instantly Destroy Your Computer


For just a few bucks, you can pick up a USB stick that destroys almost anything that it’s plugged into. Laptops, PCs, televisions, photo booths — you name it.

Once a proof-of-concept, the pocket-sized USB stick now fits in any security tester’s repertoire of tools and hacks, says the Hong Kong-based company that developed it. It works like this: when the USB Kill stick is plugged in, it rapidly charges its capacitors from the USB power supply, and then discharges — all in the matter of seconds.

On unprotected equipment, the device’s makers say it will “instantly and permanently disable unprotected hardware”.
You might be forgiven for thinking, “Well, why exactly?”
The lesson here is simple enough. If a device has an exposed USB port — such as a copy machine or even an airline entertainment system — it can be used and abused, not just by a hacker or malicious actor, but also electrical attacks.
“Any public facing USB port should be considered an attack vector,” says the company. “In data security, these ports are often locked down to prevent exfiltration of data, or infiltration of malware, but are very often unprotected against electrical attack.”
Not every device is vulnerable to a USB Kill attack. The device maker said that Apple “voluntarily” protected its hardware.

USB Killer says that 95% of hardware is vulnerable to this attack, but that does not include Apple.
USB Kill costs €49.95 (about $56), and a Test Shield, which allows users to test for an attack without blowing up their hardware, costs an additional €13.95 (about $16).



written by -Ayush Saini





 7 Crazy Things You Will Find On the Dark Web 

 


 If you’re a fan of the Internet, and obviously you are, then you will be most intrigued by the World Wide Web’s mysterious cousin, the aptly named Dark Web. As its name implies, the Dark Web is a bit mysterious and perhaps even what you might describe as sketchy. Naturally, the websites on the Dark Web are not easy to locate, but once you’re able to gain access to the Dark Web, the things you’ll find will blow your mind. These are some crazy things on dark web.


Here are some crazy things on dark web   Click here

 

Hitmen
This certainly wouldn’t fly on the regular Internet, but apparently on the Dark Web it’s not that difficult to find a hitman, not that you’d need one. Many of the hitmen found on the Dark Web are surprisingly affordable. Of course, I honestly don’t know how much one would have to pay for a hitman in real life, so it’s all relative.

Mystery Phone Calls
Speaking of answering phones, some report that after logging onto the Dark Web and browsing around for a few minutes, they received a mysterious phone call. The person on the other line never said anything, they just hung up after a few seconds. Freaky, right?

Wish Pills
Naturally, there is a market place on the Dark Web, and one of the items for sale is apparently something called a “wish pill.” Essentially, you take the pill, make a wish, and then wait for it to come true. Of course, no one can verify that the pill actually works, so it is best to assume that it doesn’t. Then again…

Fake Documents
With little rules or regulations on the dark web, it seems only natural that it’s easy to get counterfeit documents. There is reportedly a site that will sell fake passports from nearly every country, not to mention counterfeit money and stolen passwords. So, if you ever have authorities from multiple nations chasing after you, at least you’ll know where to go to get fake documents that can help you elude the authorities.

Scavenger Hunts
There are stories from the Dark Web that are straight out of the movies, at least if you watch weird movies. These are not ordinary scavenger hunts, as some of them ask you to do rather odd things, like answering a pay phone in the middle of the night. Apparently, the Dark Web hasn’t got the message that there are no more pay phones in the world.

Other People’s Netflix Accounts
This is a little more perplexing than interesting, because why would you want someone else’s Netflix account?Nevertheless, on the Dark Web it is possible to buy another person’s Netflix account for a fraction of the cost of having your own.

Uranium

If you ever want to go nuclear, just visit the Dark Web and you’ll be able to find and purchase uranium, which can then be made into a nuclear weapon, at least in theory. You’d need a lot of it to make a weapon, not to mention a great deal of expertise, so actually making a weapon out of it is a long shot. But uranium is also one of those things that’s just cool to have, and on the Dark Web, you can find some.
Did you find anything crazy on the Dark web ? Comment below and let us know..




Hello, in this tutorial you will learn how to Hacking GMail Using Phishing Method and Prevention utilizing Wapka that send the passwords,Gmail id,browser and IP address of the victim to your email id. - See more at: http://www.hacking-tutorial.com/hacking-tutorial/hacking-gmail-using-phishing-method-and-prevention/#sthash.Sbfz8WxO.dpuf
Hello, in this tutorial you will learn how to Hacking GMail Using Phishing Method and Prevention utilizing Wapka that send the passwords,Gmail id,browser and IP address of the victim to your email id. - See more at: http://www.hacking-tutorial.com/hacking-tutorial/hacking-gmail-using-phishing-method-and-prevention/#sthash.Sbfz8WxO.dpuf
Hello, in this tutorial you will learn how to Hacking GMail Using Phishing Method and Prevention utilizing Wapka that send the passwords,Gmail id,browser and IP address of the victim to your email id. - See more at: http://www.hacking-tutorial.com/hacking-tutorial/hacking-gmail-using-phishing-method-and-prevention/#sthash.Sbfz8WxO.dpuf
Hello, in this tutorial you will learn how to Hacking GMail Using Phishing Method and Prevention utilizing Wapka that send the passwords,Gmail id,browser and IP address of the victim to your email id. - See more at: http://www.hacking-tutorial.com/hacking-tutorial/hacking-gmail-using-phishing-method-and-prevention/#sthash.Sbfz8WxO.dpuf
Hello, in this tutorial you will learn how to Hacking GMail Using Phishing Method and Prevention utilizing Wapka that send the passwords,Gmail id,browser and IP address of the victim to your email id. - See more at: http://www.hacking-tutorial.com/hacking-tutorial/hacking-gmail-using-phishing-method-and-prevention/#sthash.Sbfz8WxO.dpuf
Hello, in this tutorial you will learn how to Hacking GMail Using Phishing Method and Prevention utilizing Wapka that send the passwords,Gmail id,browser and IP address of the victim to your email id. - See more at: http://www.hacking-tutorial.com/hacking-tutorial/hacking-gmail-using-phishing-method-and-prevention/#sthash.Sbfz8WxO.dpuf






Meet ‘Pixel’ & ‘Pixel XL’ By Google! , iPhone Competitor


Prev Article Next Article
Google Pixel
Google Pixel

Meet ‘Pixel’ & ‘Pixel XL’ By Google! , iPhone Competitor

Meet ‘Pixel’ & ‘Pixel XL’ By Google! , iPhone Competitor
Click To Tweet
A range of new products was unveiled by Google at San Francisco’s event, but what caught the attention of all was its all new Pixel and Pixel XL smartphones. Yes, after a series of leaks and rumors, Google has officially announced it.
Pixel is the 1st flagship of Google, which isn’t under the ‘Nexus Brand’. Both the phones have many similar characteristics, although not all are the same. Since Pixel doesn’t have a custom UI, it is a very pure version of Android and soon, updates might be rolled out.
Google has revealed two new phones that will offer an alternative to Apple’s popular iPhone 7 and iPhone 7 Plus.
The Pixel phones are the latest to run Android Nougat (version 7.1), the latest version of Google’s mobile operating system.
READ  15 Cool Features Of Android Nougat 7.0
The Pixel has a 5-inch full HD (1,920 x 1,080) display and a larger phone, the Pixel XL, has a 5.5-inch Quad HD (2,560 x 1,440) screen.
Screen and battery capacity differences aside (Pixel has a 2,770 mAh battery and the Pixel XL has a 3,450 mAh battery), the two phones are identical.
They’re both powered by a Qualcomm Snapdragon 821 processor with 4GB of RAM and come with 32GB or 128GB of internal storage (there’s no microSD card slot for expansion).
Google Pixel Features
Google Pixel Features
Both phones have a 12.3-megapixel f/2.0 aperture camera on the back with optical image stabilization and an 8-megapixel front-facing camera on the front. The camera also stabilizes video by default thanks to optical image stabilization.
Google Pixel Phone Camera
Google Pixel Phone Camera
Google says the cameras have zero shutter lag and scored an 89, the highest DxO camera rating for any smartphone camera.
A new feature called Smartburst captures multiple photos and selects the best one with the phones’ powerful AI software:
Fingerprint scanners are located on the backside and a USB Type-C port on the bottom.
Software, of course, is the heart of the the Pixel phones. The Pixels are the first phones to come with Google Assistant. Users can simply speak to their phones to perform various activities like:
Google Pixel Features
Google Pixel Features
The phones also support quick charging; 15 minutes of charging adds up to 7 hours of battery life.
Additionally, the phones come pre-installed with Allo, the company’s smart messaging app, and Google Duo, its video calling app.
Like Nexus phones, the Pixels will be the first Google phones to get software updates. Google’s making updating even easier with automatic updates that download and install in the background; when the phones are rebooted, the update is automatically applied.
To make switching from another phone easier, Google’s also including a transferring device.
Google Pixel Features
Google Pixel Features

Unlimited storage!

If you regularly use Google Photos, then there is good news for you; a backup of the images can be taken without paying a single rupee. Yes, these phones are going to offer unlimited backups of videos and photos of high resolution. By this we mean that even those 4K videos, which consume too much space. Moreover, it even offers ‘Smart Storage’, which means that if the phone realizes that there is shortage of space, it would pick up the files and shift it to Cloud.
Google Pixel Features
Google Pixel
Google Pixel


Wi-Fi can be turned into IMSI Catcher to Track Cell Phone Users Everywhere

Yes, Wi-Fi network can capture IMSI numbers from nearby smartphones, allowing almost anyone to track and monitor people wirelessly.

IMSI or international mobile subscriber identity is a unique 15-digit number used for authentication of a person when moving network to network. The number is stored in the read-only section of a SIM card and with the mobile operator.

Note: Don't confuse the IMSI number with the IMEI number. IMSI is tied to a user, while IMEI is tied to a device.

Stealing your Fingerprints to Track you Everywhere


In a presentation at BlackHat Europe, researchers Piers O'Hanlon and Ravishankar Borgaonkar from Oxford University have demonstrated a new type of IMSI catcher attack that operates over WiFi, allowing anyone to capture a smartphone's IMSI number within a second as the users' pass by.

The attack would then use that IMSI number to spy on the user's every movement.

The actual issue resides in the way most modern smartphones, including Android and iOS devices, in the world connect to Wi-Fi networks.

There are two widely implemented protocols in most modern mobile operating systems:

  • Extensible Authentication Protocol (EAP)
  • Authentication and Key Agreement (AKA) protocols

These protocols allow smartphones to auto-connect to public WiFi hotspots.

Modern smartphones are programmed to automatically connect to known Wi-Fi networks by handing over their IMSI numbers to log into the network, without owner's interaction.

So, attackers exploiting the WiFi authentication protocols could allow them to set up a "rogue access point" masquerading as a well-known WiFi network and trick smartphones in that range to connect.

Once connected the rogue access point extracts their IMSI numbers immediately. This captured unique identifier of your smartphone would then allow attackers to track your movements wherever you go.





Intercepting WiFi Calling to Steal Your Unique Identity Number


The researcher also demonstrated another attack vector whereby attackers can hijack the WiFi calling feature offered by mobile operators.

This technology is different from voice calling on WhatsApp or Skype app which uses voice over Internet Protocol.

Whereas, WiFi calling, which is supported on iOS and Android devices, allows users to make voice calls over WiFi by connecting to the operator's Edge Packet Data Gateway (EPDG) using the encrypted IP security (IPSec) protocol.

Like the WiFi auto connect feature, the Internet Key Exchange (IKEv2) protocol used for authenticating WiFi calling is also based on identities such as the IMSI number, which are exchanged over EAP-AKA.

EAP-AKA exchanges are encrypted, but the problem is that they are not protected by a certificate.

This issue exposes the feature to man-in-the-middle (MITM) attacks, allowing attackers to intercept the traffic from a smartphone trying to make the call over WiFi and quickly extract the IMSI number in seconds, the researchers said.

The good news is that you can disable the Wi-Fi calling feature on your device, but Wi-Fi auto connect can only be disabled when such a network is in range.

The researchers reported the issues to both the mobile OS companies, including Apple, Google, Microsoft and Blackberry, and the operators such as GSMA, and have been working with them to ensure the future protection of the IMSI number.

Apple, as a result of conversations with the duo researchers, has implemented a new technology in iOS10 that allows handsets to exchange pseudonyms and not identifiers, helping mitigate the threat.

The duo concluded their research [slides PDF] by showing a proof-of-concept system that demonstrates their IMSI catcher employing passive as well as active techniques.

MKRdezign

Contact Form

Name

Email *

Message *

Powered by Blogger.
Javascript DisablePlease Enable Javascript To See All Widget