tag:blogger.com,1999:blog-73009379131176393312024-03-06T09:13:54.647+05:30Way To Hackintosh tricks and Software, Computer Networking, PC Security etc..Admin Jixxi http://www.blogger.com/profile/10530012016404980477noreply@blogger.comBlogger135125tag:blogger.com,1999:blog-7300937913117639331.post-20421485790497533382016-07-12T11:17:00.001+05:302016-07-12T11:17:18.856+05:30MIUI 8 Global Beta ROM 6.7.5 Released
So MIUI 6.7.5 is finally released yesterday as per blog announced it is fully loaded with great features
Hey MIUI fans,
"The wait is over! MIUI 8 Global Developer ROM is finally here for everyone to download! First of all, let's give credits to our developers, alpha testers and beta testers for all the pioneering work that they have done. Without their dedicated work, amazing thingsAdmin Jixxi http://www.blogger.com/profile/10530012016404980477noreply@blogger.com0tag:blogger.com,1999:blog-7300937913117639331.post-15340874098175301012016-02-19T18:26:00.003+05:302016-02-19T18:26:58.381+05:30Is It Possible To Hack Whats App?
Whatsap icon
Borrow your friends’s android phone which you want to spy for just one minute.
Go to settings —> About phone —> Status—> Wi-Fi MAC address
Note down the mac address. Keep the phone for few more minutes. we need it man.
Now go to your phone and uninstall whatsapp.
Change your Mac id to your friend’s one by spoofing mac.
Now Download and install whatsapp on your Admin Jixxi http://www.blogger.com/profile/10530012016404980477noreply@blogger.com0tag:blogger.com,1999:blog-7300937913117639331.post-68471196621665209012016-02-19T17:03:00.001+05:302016-02-19T17:20:04.048+05:30“Locky” crypto-ransomware Can Hack your Pc by single Click
Again Ransomware Hit the internet through Email Somehow, this malware has already infected hundreds of computers in Europe, Russia, the US, Pakistan, and Mali.
The malicious script downloads Locky's malware executable file from a Web server and stores it in the "Temp" folder associated with the active user account. Once installed, it starts scanning for attached drives (including Admin Jixxi http://www.blogger.com/profile/10530012016404980477noreply@blogger.com0tag:blogger.com,1999:blog-7300937913117639331.post-15467571080484824042015-05-23T11:10:00.001+05:302015-05-23T11:30:11.217+05:30what is RIF ? - Remote File Inclusion
File inclusion vulnerability is a type of vulnerability most often found on websites.
It allows an attacker to include a file, usually through a script on the web server.
The vulnerability occurs due to the use of user-supplied input without
proper validation.
This can lead to something as minimal as outputting
the contents of the file or more serious events such as:
Admin Jixxi http://www.blogger.com/profile/10530012016404980477noreply@blogger.com0tag:blogger.com,1999:blog-7300937913117639331.post-70431583008131362722015-02-13T01:03:00.001+05:302015-02-13T01:03:39.160+05:30Facebook Vulnerability Allows Hacker to Delete Any Photo Album
A Serious vulnerability in Facebook has recently been reported that could allow anyone to delete your complete Facebook photo album without having authentication.
Security Researcher Laxman Muthiyah told
The Hacker News that the vulnerability actually resides in Facebook Graph API mechanism, which allows "a hacker to delete any photo album on Facebook. Any photo album owned by an user orAdmin Jixxi http://www.blogger.com/profile/10530012016404980477noreply@blogger.com0tag:blogger.com,1999:blog-7300937913117639331.post-15247065547466488142015-01-11T22:14:00.000+05:302015-01-11T22:14:13.989+05:30INCREASE SPEED OF HARD DISK
I am surfing internet and finding cool stuff then i found that a post which says increase speed of hard disk well it is obvious that hard disk is a physical things with fix RPM but windows are able to control the buffer size
so i would like to share this tut with all of you
Note:- if u are using laptop then dont try this due to over heating your HDD u may loss yourAdmin Jixxi http://www.blogger.com/profile/10530012016404980477noreply@blogger.com0tag:blogger.com,1999:blog-7300937913117639331.post-53585226232436891502015-01-08T17:58:00.002+05:302015-01-08T18:18:54.317+05:30Who provides the Internet service to Internet Service Providers (ISPs)?
yes this is what i am searching too over internet for a long and finally found what happen over internet ;)
so just wana share with u all
Best answer i found is here
How do I figure out the Internet's infrastructure?
Let's suppose we don't know about the history of the Internet, nor do we have access to any online resources that explain Admin Jixxi http://www.blogger.com/profile/10530012016404980477noreply@blogger.com0tag:blogger.com,1999:blog-7300937913117639331.post-52525710441392092562015-01-08T17:33:00.002+05:302015-01-08T17:33:32.991+05:30If 32-bit machines can only handle numbers up to 2^32, why can I write 1000000000000 (trillion) without my machine crashing?
When i am looking for a weird answer over the internet i found this awesome question which says
'If 32-bit machines can only handle numbers up to 2^32, why can I write 1000000000000 (trillion) without my machine crashing?'
which is really nice question for a it person as well as non it but its just a simple question
lest see how it solved
(funny+logical) Best Answer Admin Jixxi http://www.blogger.com/profile/10530012016404980477noreply@blogger.com0tag:blogger.com,1999:blog-7300937913117639331.post-17437669710906031232015-01-08T13:28:00.000+05:302015-01-08T13:33:41.410+05:30Keep Your Passwords Safe with Password Safe
Password Safe allows you to manage your old passwords
and to easily and quickly generate, store, organize, retrieve, and use
complex new passwords, using password policies that you control. Once
stored, your user names and passwords are just a few clicks away. Using
Password Safe you can organize your passwords using your own
customizable references – for example, by user ID, category,minixhttp://www.blogger.com/profile/00943754424585985994noreply@blogger.com0tag:blogger.com,1999:blog-7300937913117639331.post-68536162981223214012015-01-05T19:59:00.002+05:302015-01-05T19:59:59.106+05:30WhatsApp Will Have Desktop Version Called WhatsApp Web (Roumer)
Get ready to use WhatsApp from your desktop
Get Ready to Use WhatsApp From Desktop
Get Ready to Use WhatsApp From Desktop
Get Ready to Use WhatsApp From Desktop
Get Ready to Use WhatsApp From Desktop
Get Ready to Use WhatsApp From Desktop
Get Ready to Use WhatsApp From Desktop
Get Ready to Use WhatsApp From Desktop
WhatsApp
may have 600 million users, but when it comes to the web, minixhttp://www.blogger.com/profile/00943754424585985994noreply@blogger.com0tag:blogger.com,1999:blog-7300937913117639331.post-86966075720034031332015-01-02T20:02:00.003+05:302015-01-02T20:02:39.433+05:30Microsoft about to launch a new browser 'spartan' for winodows 10
According to the new leaked photos of the windows 10 recently it appear that new default browser in windows 10 will be called 'spartan'
according to zdnet and ibnlive report new browser spartan is a mixture of mozila firefox and chrome but it is not an internet explorer . the next IE release — which may be known as IE 12 if Microsoft continues to follow its current naming minixhttp://www.blogger.com/profile/00943754424585985994noreply@blogger.com0tag:blogger.com,1999:blog-7300937913117639331.post-41310282445686890102014-11-25T12:45:00.002+05:302014-11-25T12:45:43.269+05:307 Things About Android Lollipop 5.0 You Need To Know
After offering chocolate (Kit-Kat), now Google is ready to serve
you Lollipops. Google on Wednesday finally revealed the official name of
its next version Android L — Android 5.0 Lollipop.
The newly released Android 5.0 Lollipop ships with the latest
Motorola-made Nexus 6 smartphone and Nexus 9 tablet built by HTC, but
the company did not make the Lollipop minixhttp://www.blogger.com/profile/00943754424585985994noreply@blogger.com0tag:blogger.com,1999:blog-7300937913117639331.post-61325492105850702812014-10-02T23:07:00.000+05:302014-10-02T23:07:03.515+05:30Download Windows 10
Start menu: The familiar Start menu is back, but it brings with it a new customizable space for your favorite apps and Live Tiles.
Everything runs in a window: Apps from the Windows
Store now open in the same format that desktop apps do and can be
resized and moved around, and have title bars at the top allowing for
maximize, minimize, and close with a click
Snap minixhttp://www.blogger.com/profile/00943754424585985994noreply@blogger.com0tag:blogger.com,1999:blog-7300937913117639331.post-53293863938282854132014-08-24T17:16:00.000+05:302014-08-31T14:25:55.149+05:30Hackers created a drone that can steal What’s inside your phone
At this point of time, most of
smartphones are loaded with an
important function that requires
WiFi service to be activated. Taking
advantage of this, Hackers of London
have created a drone that is
proficient in taking data consists of
locations and passwords directly
from your smartphone.
The drone uses a codename “Snoopy”
that targets busy city streets and
specific phones Admin Jixxi http://www.blogger.com/profile/10530012016404980477noreply@blogger.com0tag:blogger.com,1999:blog-7300937913117639331.post-60653465639580853292014-04-11T17:06:00.002+05:302014-10-01T14:45:52.989+05:30Cryptography-How to hide any files in an image
BlindSide is a cryptographic tool. It is possible to encrypt and hide
almost any file in an image and then retrieve it later with blindSide.
The larger the bitmap file, the more you can encrypt and hide in it. The
original image as well as the encoded image looks similar when viewed
by the human eye but when run through BlindSide, the hidden data may be
revealed
Tools required:
Admin Jixxi http://www.blogger.com/profile/10530012016404980477noreply@blogger.com0tag:blogger.com,1999:blog-7300937913117639331.post-32201687146344263412014-04-11T16:28:00.001+05:302014-04-11T16:28:29.220+05:30Cryptography 102: History
Substitution Cipher
One of the most readily known Ciphers is called the substitution cipher,
in fact you probably played with one as a kid. However what you didn't
know is they are all very badly broken.
A Substitution Cipher is essentially where you create a table where you
would say A = C, B = W, C = N all the way to Z = A. This table becomes
your key for the cipher, we discussed keys Admin Jixxi http://www.blogger.com/profile/10530012016404980477noreply@blogger.com0tag:blogger.com,1999:blog-7300937913117639331.post-22790966138264519232014-04-11T16:27:00.003+05:302014-04-11T16:27:30.475+05:30Cryptography 101: Overview
In this course you will learn how cryptographic primitives work, as well as how implement them correctly and securely.
Cryptography is Everywhere
Cryptography is used for secure communication
Web traffic is secured using HTTPS Cryptography
Wireless traffic uses an array of protocols such as 802.11 WPA2, GSM, Bluetooth
It is used for encrypting files on a disk for secure storage using Admin Jixxi http://www.blogger.com/profile/10530012016404980477noreply@blogger.com0tag:blogger.com,1999:blog-7300937913117639331.post-80543050602876766482014-04-11T15:52:00.001+05:302014-04-11T15:52:45.629+05:30The Flood *Spreading Methods* Amazing Methods!
Method 1: YouTube Spreading
1. The things you will need in this method are a YouTube Account and a File Sharing Account.
2. Basically what you are going to be doing is record yourself using a
program, attracting the user to download and execute the program.(The
program will be binded with your stub)
3. So you will obviously need DarkComet or some other programs involving
stubs. Bind your Admin Jixxi http://www.blogger.com/profile/10530012016404980477noreply@blogger.com0tag:blogger.com,1999:blog-7300937913117639331.post-71636782070998672162014-02-23T18:57:00.002+05:302014-02-23T18:57:49.524+05:30Google Acquires Spider.io To Help Spot And Stop Online Ad Fraud
London-based Spider.io has been acquired by Google, the company’s DoubleClick advertising blog announced today (via Re/Code).
Spider.io is a startup that specialized in weeding out fraudulent
clicks around online ads. The three-year old company has tech that will
help Google identify bad behavior around their content in video and
display ads on the web, to help them get a more accurate minixhttp://www.blogger.com/profile/00943754424585985994noreply@blogger.com0tag:blogger.com,1999:blog-7300937913117639331.post-84422762226192105472013-12-23T19:11:00.001+05:302013-12-23T19:11:12.915+05:30Installing BackTrack 5 R1
What is BackTrack5
BackTrack is an operating system based on the
Ubuntu GNU/Linux distribution aimed at digital forensics and penetration
testing use. It is named after backtracking, a search algorithm. The current
version is BackTrack 5, code name "Revolution."
BackTrack provides users with easy access to a
comprehensive and large collection of security-related tools ranging minixhttp://www.blogger.com/profile/00943754424585985994noreply@blogger.com0tag:blogger.com,1999:blog-7300937913117639331.post-17555865788784247992013-12-17T13:05:00.002+05:302013-12-17T13:05:24.431+05:30All about VPN- little explanation
We must know there are three VPN protocols: PPTP, L2TP y SSL.
It must be clear an idea: the three VPN protocols are used to same
target which is to encapsulate the PPP protocol. PPP protocol is network
protocol stack uses to do a direct connection between two networking
hosts. Therefore PPTP, L2TP y SSL have the common features of PPP, for
example authentication schemes, Ipv4, Ipv6 and minixhttp://www.blogger.com/profile/00943754424585985994noreply@blogger.com0tag:blogger.com,1999:blog-7300937913117639331.post-47743707981275922702013-12-03T18:20:00.001+05:302013-12-03T18:20:29.369+05:30where to begin with hacking ? [how-to]
"where to begin with hacking". So here is my opinion about how they should get around starting. There are three types of hackers: White Hats:
The White Hat hacker has dedicated himself to fight malware and help
others with their computer problems. He is a person you can trust, and
he will most likely end up in a good paying job as a computer programmer
or a security consultant. He minixhttp://www.blogger.com/profile/00943754424585985994noreply@blogger.com2tag:blogger.com,1999:blog-7300937913117639331.post-53850578660499133182013-12-03T18:10:00.002+05:302013-12-03T18:10:41.890+05:30Nmap (Network Mapper) - introduction
Nmap
("Network Mapper") is a free and open source (license) utility for
network exploration or security auditing. Many systems and network
administrators also find it useful for tasks such as network inventory,
managing service upgrade schedules, and monitoring host or service
uptime.
Nmap uses raw IP packets in novel ways to determine what hosts
are available on the network, what minixhttp://www.blogger.com/profile/00943754424585985994noreply@blogger.com0tag:blogger.com,1999:blog-7300937913117639331.post-41573558804873004682013-11-29T03:37:00.000+05:302013-11-29T03:37:29.043+05:30Best Android Apps Free Download
Many People are using the Android mobiles only due to its unique and
attractive features than other mobile devices at a Reasonable price.The
main thing that attracted the Mobile customers are the Apps which was
really in thousands for the users of Android.
So we are interested to give some Top rated Android Apps for free to you, i given about 6 apps here, Please download and enjoy
1) Admin Jixxi http://www.blogger.com/profile/10530012016404980477noreply@blogger.com1tag:blogger.com,1999:blog-7300937913117639331.post-65715843866278574132013-11-29T03:27:00.001+05:302013-11-29T03:29:08.881+05:30How to: Play Android Games on Computer/PC/laptop [software]
It is not very tough to Run Android games on your Computer, but not that
much easy too, The Android is releasing several applications day by
day, it is very difficult to test each and everyone in your mobile. It
costs lot of battery and time.
There is a Solution for this, you can test your applications in your
Computer by following my tips, the windows environment was user Admin Jixxi http://www.blogger.com/profile/10530012016404980477noreply@blogger.com1