Showing posts with label PC Hacking. Show all posts
Showing posts with label PC Hacking. Show all posts

Tuesday, October 1

How To Control Android Phone With Computer (PC) ?

How To Control Android Phone With Computer (PC) ?

Can you control your smartphone using only your computer? The answer is a resounding YES. 
The real question is: how much of your smartphone can you control? As I sat down to write this 
article, I had no clue what the answer to that question was, and to my surprise, the answer is 
quite a lot.
From texts and call logs to full blown mouse-and-keyboard input, we can actually do much more
than you might expect.

MightyText

The first Android remote control app I used is MightyText and I must say… wow. This app can be
summarized rather succinctly: send and read SMS messages through your Android phone by
using a computer or tablet.seems simple enough, right? Yet for something so easy, I’m blown away
by how practical it is AND how polished the final product looks.
MightyText is a web app that stays in sync with your phone through a wireless connection. In order
for it to work,
you need to install the MightyText app on your phone and sign in using a Google account.
As the app runs silently
in your phone’s background, the web app (which you access using a simple URL) updates
 on the fly when you
receive new texts.
control phone from computer
control phone from computer

With MightyText, you can browse your texts in two modes: Classic (selecting one conversation at a time)
or Power (viewing all of your conversations at once in a grid). As you receive new texts, you’ll see popup
notifications. Sending a message is easy as well; all you need to do is type away and press Send.
You can even add attachments for those messages that transcend text.
The web app is beautiful and very responsive, so much so that I just feel cozy using it. The remote control
portion of MightyText (the web app, basically) is available as a Chrome extension, Firefox addon, and an 
Android Tablet app. The regular web app works on IE, Safari, iPads, and Kindle Fires. Opera support is 
on its way.

LazyDroid

LazyDroid is named for those of you who are apparently so lazy that you can’t be bothered to go and 
physically grab your phone. I’m okay with that though; it describes me rather well. But on a more serious 
note, LazyDroid is really cool. All you have to do is install the app onto your Android phone and run it in
the background while your phone has Internet access.
The app will tell you the “server IP” of LazyDroid on your phone, but don’t worry. It’s not as scary as it sounds.
Just type that IP and port (it should be in a form similar toxxx.xxx.xxx.xxx:xxxxx) into your browser and you will be
 presented with something that looks like a full-blown desktop. This is where all of the magic happens.
control phone from pc

control phone from pc

From this desktop, you can control many different aspects of your phone: SMS, contacts, call logs, camera,
sensors,file manager, or even direct remote control of the device. Just be sure to note that remote control
requires your Android to be rooted. By default, the web app connects to your phone through a wireless connect,
but LazyDroid has a USB client that you can use if you want a direct connection (less lag).
The LazyDroid app isn’t exactly free. You can use it without limit for 24 hours, but once the trial is over you’re stuck
between using the limited version OR upgrading to premium which costs $4.00 USD.

Android Screencast

Android Screencast is a small hobby project that lets you remote control your Android phone through the
Android SDK. We have an article that will help you set up the Android SDK; just scroll down to the section
called Setting Up Your PC… and you’ll be good to go. The Android SDK is what grants your PC control of
your Android device when the USB is plugged in.
control phone from computer
control phone from computer

With Android Screencast, you can: control your device completely using mouse and keyboard (rooted devices only)
record the screen to video while you use your phone; browse your phone’s file system effortlessly.
What are the downsides? Well, since it’s a small hobby side project, it isn’t very optimized or polished
and you’ll experience some hiccups.
All in all, it shows some promise but needs a bit of work done before I’d consider switching to it. Just know that
it’s out there and it may turn into a real project sooner or later. Requires Java Runtime Environment 5 or higher
to operate correctly.

Conclusion

So can you control your phone from your computer? Yes, you can. The technology may still be primitive
with a number of flaws and missing features, but give it a year or two. Current developers will break new
ground and other developers will start their own competing apps, all resulting in better remote control for
our phones. Whether remote phone control is necessaryis a topic for another time.
Know of any other remote control apps for Android? Please share them in the comments. This is an area
that I wasn’t aware existed until a few days ago, so researching all of these possibilities has been a blast.
I’d love to hear about other alternatives.

Monday, September 30

What Is Phishing And How To Prevent Getting Hacked?


Phishing
The problem with phishing is that most of the people are unaware of the whole issue of phishing. Web users, who are already in threat from various elements like virus, spyware etc, are facing a larger threat than any of them, but what is phishing? And how can it harm you? These are the questions, which will be answered in the next few lines.

Phishing


Phishing is an online scam, where people associated with it pose as legitimate website or links and ask for the details of the user, like the personal, contact and financial details. Then they fraudulently access your accounts with the information provided by you, and leave you bankrupt. The problem is so overwhelmingly huge that it costs US government about one billion dollars every year.

How Does the Phishing Scam Work?


Most of the time, a phishing scam starts off with the victim receiving an email to his or her email account. Apparently, these mails look legitimate and from a trusted source. The most common types include emails from bank, financial companies like brokerage or even from credit card companies. These emails claim that your account is going to face some serious impending problem, like delay in payments or account closure, and demands attention from your side. They also provide the solution to the same like changing the account details, like username, password etc to get rid of the problem.

Phishing
The same applies for the spoof websites or rather to say the mirrored website. It may seem to you that you are entering your details into a legitimate website. However, in reality, the website you are browsing is simply a fake one.

Once you provide them with your account details, the financial account of yours is now vulnerable to them, as they are the ones who can hack and operate it easily. Most of the time, it is observed that they usually utilize the account information to get loan grants and credits from the bank, leaving a huge financial problem for you.

How to Prevent Phishing?


Once you have fallen in to the trap of some phishing scam, it may take years to get rid of it. It is always said that prevention is better than cure and this applies to phishing scams too. One of the easiest ways to avoid phishing attacks is to have your anti-virus updates regularly. Also, make sure that you are installing an anti-virus, which has got email scanner and link scanners, which detects the safety of a link before you click over them.

A good spam control program can also provide protection from phishing. The most difficult part is to detect fake websites and mails from the real ones, as the scammers do not keep any single stones unturned to make them look like real ones.

Getting all the security settings of your browser turned “On” will also help you to prevent yourself from falling in some phishing scam. Browse safe and be away from the dangers of phishing.

The Nitty-Gritty Of Being An Ethical Hacker


Ethical Hacker
Ethical hacking is a fairly old profession. As a matter of fact, the U.S government employed hackers to penetrate its computer security systems in the 1970s. Since then, ethical hackers have played an integral role in maintaining the computer security systems of many organizations.

Benefits of Ethical Hacking:

  1. Protection from anti-terrorism: With advancements in technology, terrorism has assumed a more sophisticated angle. Ethical hackers sniff out terrorism threats by identifying any loopholes in the country’s security systems.
  2. Adequate security preparations: Hackers also enable the country to ready itself for any security breaches. They help the security authorities to seal potential security pitfalls by forewarning them.
  3. Improve computer systems: Companies that employ the services of ethical hackers can insulate themselves from unscrupulous hackers. This is possible when these professionals unearth any tricks that malicious hackers can use to infiltrate the systems.

How to Become an Ethical Hacker?


Those who want to become ethical hackers must fulfill certain conditions. These requirements include:
  1. Gain formal training: As is the case with most careers, ethical hacking requires formal training. The would-be ethical hackers must have an experience in Information Technology (IT).
  2. Gain A+ certification: As part of their formal training, hackers must gain their A+ certifications. This will enable them to acquire a technical support position while preparing to scale the ladders of their experience.
  3. Acquire additional certification: The next step after gaining the A+ certification is the acquisition of a CCNA or Network+ certification. It is a mandatory requirement for would-be hackers to gain an administrative role.
  4. Earn security certifications: Earning a CISSP, TISCA or Security+ certification is important for elevation to the post of an information security officer. At this stage, prospective ethical hackers will gain access to the necessary materials for penetration testing.
  5. Acquire a CEH (Certified Ethical Hacker) certificate: The CEH certificate opens the way for prospective hackers to market themselves. They can acquire this certification from the EC-Council (International Council of Electronic Commerce Consultants).
  6. Possess adequate knowledge of related fields: Potential ethical hackers must also familiarize themselves with other fields. For example, they can engage in activities like programming, database management and analysis of Linux/Unix commands.
  7. Equip oneself with soft skills: Ethical hacking requires possession of soft skills besides its technical aspect. They include good communication skills, dedication, astute work ethics and problem-solving skills.
It is important to remember that ethical hacking is a challenging task. This is due to the temptations of crossing over to the dark side. As such, ethical hackers can turn on their employers by breaching the security system or infecting it with harmful elements. All ethical hackers must live by the name of the profession. This involves staying legal always.

How to Create a Blog Website

How to Create a Blog Website from the Ground Up

Starting from the ground up
You have something to say and you think that blogging will help you say it...but just how do you do it. Should you check out the various blogging platforms, have your own...what? This article will help you with creating your own blog website.

Decide on a name. You want something that 'flows'. Something that is descriptive, flows, and if you want to become known at all, is brand worthy.

  1. 2
    Decide if you want your own blog on your own site, or if you want to use one of the many blogging platforms. Those are ones like Blogspot, Wordpress, and many others. Don't limit yourself to those two, they are just a place to begin looking. You might find a better fit with one of the lesser known ones. Use your favorite search engine to find one.
  2. 3
    Create an account on your chosen blog site (if you choose that method).
    • This is probably a better method for those who just plan on blogging for your friends and family.
  3. 4
    Be aware that creating your own blog site on your own domain is not free. The advantage is that you have much more administrative control with it and much more flexibility.
  4. 5
    Find a site that allows you to register your domain name. This is only necessary if you are creating your own blog on your own website.
  5. 6
    Find a server. Basically, a server will be the place that your blog/domain calls home. Depending on who you know and what you find, this can cost a minimal amount per month, or be a yearly cost, or be free.
  6. 7
    Get an account on the server. You will need to have an account there for you to get the information that you will put on your domain once you have acquired it.
  7. 8
    Find out what the nameserver information is on the server. That is the information that you will need to plug into wherever you bought your domain from.
    • It will look something like ns20.nameserver.com and ns21.nameserver.com.
  8. 9
    Wait for the information from the server you have. It will have information as to how to do many of the things that you will need to do to start a blog.
    • cPanel login
       cPanel login
      The information that you get will depend on the software that they use. One very popular server software is cPanel.
  9. 10
    Find some blogging software. Things that you will want to take into consideration are ease of use and cost.
    • Screen shot of a few Wordpress themes
       Screen shot of a few Wordpress themes
      Using more popular software has the huge advantage of being able to find themes for it. Themes are what make up the look of your blog and can truly make it or break it.
  10. 11
    Initial screen after logging in on cPanel
     Initial screen after logging in on cPanel
    Log into your account. Your initial screen should tell you the options that you have with your website. One thing that you will want to do is set up an email account or accounts.
  11. 12
    Install Wordpress (or your chosen software) onto your domain. You might be able to have your domain server support load it onto the domain.
    • If that isn't an option, check your dashboard (you may call it something different) for your domain.
    • You should have a variety of options for you. In cPanel, it is under Fantastico De Luxe.
  12. 13
    Find out the various options that you have for submitting articles to your blog. Some ways are:
    • Using a particular email address and email articles to your blog.
    • Entering your articles straight into a data interface on your domain.
  13. 14
    Create categories on your blog. It may seem unnecessary now, but you will want to have some kind of order in your blog and categories help you do that.
  14. 15
    Look for plugins. Some plugins that you might want are for:
    • Site Security
    • Site Administration
    • SEO (Search Engine Optimization)
    • Site Statistics
    • Formatting tools
  15. 16
    Make an entry into your blog. This can help you decide if anything is missing.

How To Change Logon Screen In Windows 7 & XP?

How To Change Logon Screen In Windows 7 & XP?

Windows 7 XP Logo
In this this tutorial, I will describe the way to changing log on screen of logon window  follow these simple steps for changing logon screen in windows 7 & XP:
  • For Windows 7:
    • Go to start> run> Type regedit.
    • In Registry Editor, go to the path HKLM\ Software\ Microsoft\ Windows\ CurrentVersion\ Authentication\ LogonUI\ Background.
    • In right panel, double click on OEMBackground & change its value to 1.
    • Go to the path C:\Windows\System32\oobe\Info\Backgrounds.
    • Copy any JPG file image (high resolution with size atleast 1024x786) in this this folder and rename it as BACKGROUNDDEFAULT

      Note: File must be in JPG format and with size less than 256KB.
    • Log off your system and you've done.
  • For Windows XP:
    • Go to start> run> Type regedit.
    • In Registry Editor, go to the path HU\ .DEFAULT\ Control Panel\ Desktop.
    • In right panel, double click on wallpaper & enter the full path of image.

      Note: File must be in BMP format.
    • That's all.

Saturday, September 28

Watch 18+ Videos On Youtube Without Signing In

Watch 18+ Videos On Youtube Without Signing In

Watch 18+ Videos On Youtube Without Signing In
Sometime its annoying when youtube ask you to sign in for your age verification to watch 18+ videos. So i will make it easy for you by showing you a simple youtube trick to watch adult or 18+ youtube videos without signing In. This trick is 100% working as of 2013. So lets get started.

How To Watch 18+ Youtube Videos Without Logging In ?

1. First get the Url of video you want to watch. As shown below.
http://www.youtube.com/watch?v=4Xkh6j7RMqk 
2. Then copy the Video Id. For above link video Id is 4Xkh6j7RMqk
3. Now paste the Video Id in the link given below.
http://www.youtube.com/v/VideoId?fs=1
  • Replace VideoId with the Id you copied in Step 2
4. Now the url will become as shown below.
http://www.youtube.com/v/4Xkh6j7RMqk?fs=1
5. Done.