Xiaomi Mi4c Leaked To Come With Type-C USB port and Even More Internal Storage

It was earlier reported that Xiaomi Mi4c is going to carry a price of less than $250, which is a steal of a deal considering that you will get a smartphone running a Snapdragon 808 chipset in it.

Windows 10 for phones features revealed

Microsoft showed off a number of new features for Windows 10 on phones today, but in afternoon sessions at the company’s press event. Most of the demonstrations focused on improving the built-in apps and features of Windows Phone, and fixing a lot of the oddities. That includes mail, maps, photos, Skype, and messaging.

Windows 8 and Windows 7 would receive a free upgrade to Windows 10

Once the OS launches later this year, Microsoft announced that all users who are using- Windows 8 and Windows 7 would receive a free upgrade to Windows 10 . With the release of the January Technical Preview, Microsoft is testing one of those systems.

Windows 10 build 9926 installation process

If you are installing the Windows 10 build that was released today, you will notice that the installation screens have been slightly changed or updated since Windows 8 and even over 9879, to a small degree. Since we know you don't install Windows builds frequently, we snapped some screens while installing the OS that you can see at the bottom of the post.

Whatsapp launches the Web client

Today WhatsApp announced a web client that will enable users to use the world’s most popular mobile IM client on their PC and Macs. But this web Client works only in the Google Chrome browser.

Wednesday 31 October 2012

A Prank Virus



NOTE : PLEASE DO NOT TRY ON YOUR COMPUTER !! 
First open the notepad and copy and paste the below mentioned codes in notepad and see the fun. You can edit the codes to make more funny or even deadly.

Monday 29 October 2012

Find keylogger or any spyware in PC



Its  great method to find or detect a keylogger or any other spyware in your PC or system. As we all know nowadays keyloggers and spywares are big concern as hackers are trying their best to infect the victims to hack their accounts. Today i will teach you how to find a keylogger or Trojan or spyware in your PC or Laptop. There are several ways to find them but using this method you will know the exact path of the keylogger and where its saving the log file. Also once you have the keylogger server now you can reverse engineer the server and hack the hackers account password which he used in keylogger server. Lets first start with keyloggers introduction.

Sunday 28 October 2012

How to shutdown your friend's Pc


How to shutdown your friend's Pc through chating using cmd Hello friends. You can shutdown your friend's computer through chating. This is very simple and cool trick. Kindly follow these
steps :-

Saturday 27 October 2012

What Is Brute Force and some Softwares for brute force attack


Hi , The topic of this article is "Brute Force".In this article i will explain the meaning of bruteforce and will provide some top Brute force softwares to download.Lets Strat....

Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing intellectual strategies. Just as a criminal might break into, or "crack" a safe by trying many possible combinations, a brute force cracking application proceeds through all possible combinations of legal characters in sequence. Brute force is considered to be an infallible, although time-consuming, approach.

Flame (malware) what you need to know



Flame, also known as Flamer, sKyWIper, and Skywiper, is modular computer malware discovered in 2012 that attacks computers running the Microsoft Windows operating system.The program is being used for targeted cyber espionage in Middle Eastern countries. Its discovery was announced on 28 May 2012 by MAHER Center of Iranian National Computer Emergency Response Team (CERT),Kaspersky Lab and CrySyS Lab of the Budapest University of Technology and Economics. The last of these stated in its report that "sKyWIper is certainly the most sophisticated malware we encountered during our practice; arguably, it is the most complex malware ever found."

Dangerous Email File Attachments You Should Be Aware Of


Among the email attachment extensions that should not be opened at all, or if completely necessary, should be open in the special secure environment, are:

Very Dangerous File Formats:

.reg Possible Windows registry attack

Friday 26 October 2012

Ubuntu: The Complete Introduction for Beginners


Ubuntu is linux based operating system with the origin in south africa. Its name means "humanity towards others". Back in 2004, Linux was already established as a server operating system, but free software was not yet a part of everyday life. Further, Linux was thought of as a complicated operating system which non-technical people could not use. It was at this time in 2004 that Ubuntu began as a Linux distribution aimed at ease of use. Mark Shuttleworth, the creator of the project, gathered a few developers and went on to create the most popular Linux distribution till date.

Thursday 25 October 2012

Advanced Port Scanning techniques


Advanced Port Scanning techniques

-----------------------------------------------------------------------------
Today i will teach you different types of port scanning and their analysis, drawbacks etc. Lets start with a brief overview of yesterday's tutorial.
In simple words, Port Scanning is a series of attempts by a hacker or network administrator to examine which ports on a network are open/closed/filtered by attempting to connect to a range of ports and then gathering information from responding open ports to detect what applications or which service is associated or running on those ports. Port Scanning is accomplished by running port scanner against the host to scan 0 to 65536 potentially available ports on computer.

How to remove youtube copyright.[tutorial]




How to remove youtube copyright.

This guide will tell you how to resolve copyright issues for your youtube videos. With this, you can have your favorite music and images without that WMG deleting your account.
This method only covers 99% of copyrighted material.

Tuesday 16 October 2012

How To: Delete ghost messages from MS Outlook




Most people who use Microsoft Outlook as an email client for Gmail or their personal POP
mail would sometimes notice that it is trying to send out emails but there aren’t any in the
outbox. These are usually ghost messages that have been sent earlier or are too large
and stuck in your outbox. Deleting these stuck emails removes them, but there are some traces
that are not visible and deleting these can be a pain as you cannot see them in the first place.



If you are seeing messages being sent out without anything in your outbox, it could be a read
receipt or a corrupted email. Removing this email or solving this error is a bit dicey, but not
impossible. However, before you attempt the following procedure, you will need to take a backup of
your Outlook emails in a safe place. Let’s take you through the entire procedure of safely backing
up your emails and rectifying the problem

Sunday 14 October 2012

Creating a Telnet Trojan for Windows XP


Following batch script will act as Telnet Trojan to any windows XP system, the best
part of it is it's fully undetectable to all ant-virus programs. Copy following lines in
notepad and save with any name with .bat extension for example Trojan.bat.
Code:

Saturday 13 October 2012

Warning: Fake Skype app. on Android is malware


A new piece of malware is trying to take advantage of Skype's increasing
popularity, especially on mobile devices. Cybercriminals have created a fake
version of the Skype for Android app, designed to earn money from
unsuspecting users. Trend Micro, which first discovered the malware, is calling
this particular threat JAVA_SMSSEND.AB.
The Java in the name should not surprise you, given that Android apps are
primarily developed in a custom version of the programming language.
Thankfully, this is not a very good fake. The app in question only runs on older (pre Software Installation Script)
Symbian phones or Android devices that allow execution of Java MIDlet.

Friday 12 October 2012

COLLECTION OF SERIEL KEYS ! (part 2)



Macromedia Studio MX ::::WSW600-59791-91721-99978
Magic Converter V 7.9.5.1 - MVC182749
Make Money 2.0 :::: PRF0200153
Mechanical Desktop 6.0 ::::400-19791979 / CD-Key:TLSQBS
MS Office 2007 - KGFVY-7733B-8WCK9-KTG64-BC7D8
MS Office 2010 Key - GGG8W-PJFRT-8MRQH-X99J2-PPPVM
MS XP - User Name - Creative, CD Key - FM9FY TMF7Q KCKCT V9T29 TBBBG
Nero Burning Rom 5.5=> 9M03-01A1-PCX7-K31A-8A94-98PT-KT2E-522A3D
Nero v 8.3.2.1 - Password: renegadeddl.com, Serial: 9K20-7839-0295-6KA4-5008-1KM3-8C64or 1K22-2867-0K95-61K4-5000-CKAC-AA8X
Norton Inter Security2005 :::: BBCY-PK26-GKCP-7BCM-VY22-3VMF
Norton System Works2005 :::: BBCQ-9BCY-PKCX-GJPD-GYTK-HKGJ
Office 2000 :::: GC6J3-GTQ62-FP876-94FBR-D3DX8
Office 2003 :::: GWH28-DGCMP-P6RC4-6J4MT-3HFDY
Office XP Full BR ::::HXT2X-8CDBF-HYY8H-TYJ7Q-HMHHG

COLLECTION OF SERIEL KEYS ! (part 1)


Here is the some keys and serial number of some softwares

3D Studio Max 4 :::: Number:226-19791979 / CD
Key:XLSQBQ9zfll2WrZc+Vn0hWaw2dV/sccwKwsWY05TPwHden
Acrobat Distiller - WAW210P7121183-537
Adobe After Effects 5.5 : EWW470R1001999-030-259
Adobe Frame maker 7.0 ::::1030-1208-8265-3458-9287-7077-
Adobe Go live 4 ::::GJW400R2100006-625
Adobe go live 5.0 : GJW500R2898273-460
Adobe illustrator 9.0 : ABW900R71111141-999-830
Adobe InDesign ::::IPE123R12345678-337
Adobe live motion 1.0 : LVW100R7100843-292

What is CAPTCHA?


INTRODUCTION


A captcha is a program that can generate and grade tests that:
Captcha
Captcha
(A) most humans can pass, but (B) current computer programs
can't pass. Such a program can be used to differentiate humans
from computers and has many applications for practical security,
including (but not limited to):

--- Online Polls.

In November 1999, slashdot.com released an online poll asking
which was the best graduate school in computer science (a
dangerous question to ask over the web!). As is the case with
most online polls, IP addresses of voters were recorded in order to

Monday 8 October 2012

List of codes for the fancy alphabets used n the facebook chat box


Here is a list of codes for different alphabets:-

  A = [[399197913893]]
  B = [[115345298505025]]
  C = [[53872404042]]
  D = [[226910642728]]
  E = [[140775945956538]]
  F = [[136046106447549]]
  G = [[119431374760220]]
  H = [[205082339544090]]
  I = [[432883640525]]