Wednesday, 30 April 2014

Control your PC/ LAPTOP with you Hand Gestures






While surfing on internet i found and amazing application which use small feature of Kinetic Energy we see in Xbox and Sony play-station by which we control the game by our Hand and other gestures. Camera installed on the devices detects our gestured and reacts on that. No sensors or any device is needed to be attached to our body. Camera attached on the device detects our movements and reacts on them Latest Television LED's are also equipped with this feature where we don't need to press Remote Keys to change the channel or control the volume just hand gestures are enough to control the volume or change the channel and they are not like bio-metric, anybody can use the gesture to control the TV. This will be really amazing to see Brother and Sister fight for one channel because Brother hides the Remote Control so he can watch his favorite Programs. Now Sisters can handle the TV with Gestures which is great news for Girls. Basically this feature is already in market since 3-4 years but now its developing and coming on low prices.  

We don't need to buy such very expansive TV's to feel the gesture control. We can experience it on our own Computer or Laptop by using a very small app i just installed.

Download the app from https://flutterapp.com/ and click on For Windows if you are running Windows platform or you can also use this app on your MAC OS.
Install the app and enjoy your VLC player PLAY/PAUSE with just showing your hand to the web camera and you can also control Youtube and Netflix by installing Flutter extension on your Google Chrome web browser.

Its just for FUN but i enjoyed the my 1 minute by playing with this app.

Tested app not a hack tool and not dangerous. Uninstall after playing with it if you feel insecure. as i explained in previous articles that people can use our webcams without our permission. just play with it and uninstall the app and also keep your webcamera removed if you don't use it.

This will surely make smile on your face.

Have Fun

Flexible Paper thin Tablets, mobiles and TV Screens will be next




WASHINGTON: Scientists have used a focused beam of electrons to create some of the smallest nanowires ever made, an advance that paves the way for flexible, paper-thin tablets and television displays.

Junhao Lin, a Vanderbilt University student and visiting scientist at Oak Ridge National Laboratory (ORNL), used a finely focused beam of electrons to create the flexible metallic wires only three atoms wide: One thousandth the width of the microscopic wires used to connect the transistors in today's integrated circuits.

According to Lin's advisor Sokrates Pantelides, University Distinguished Professor of Physics and Engineering at Vanderbilt University, and his collaborators at ORNL, the technique represents an exciting new way to manipulate matter at the nanoscale and should give a boost to efforts to create electronic circuits out of atomic monolayers, the thinnest possible form factor for solid objects.

Lin made the tiny wires from a special family of semiconducting materials that naturally form monolayers.

These materials, called transition-metal dichalcogenides (TMDCs), are made by combining the metals molybdenum or tungsten with either sulfur or selenium.

The best-known member of the family is molybdenum disulfide, a common mineral that is used as a solid lubricant.

Atomic monolayers are the object of considerable scientific interest because they tend to have a number of remarkable qualities, such as exceptional strength and flexibility, transparency and high electron mobility.

Other research groups have already created functioning transistors and flash memory gates out of TMDC materials.

So the discovery of how to make wires provides the means for interconnecting these basic elements.

Next to the transistors, wiring is one of the most important parts of an integrated circuit. Although today's integrated circuits (chips) are the size of a thumbnail, they contain more than 32 kms of copper wiring.

"This will likely stimulate a huge research interest in monolayer circuit design," Lin said.

"Because this technique uses electron irradiation, it can in principle be applicable to any kind of electron-based instrument, such as electron-beam lithography," Lin added.

One of the intriguing properties of monolayer circuitry is its toughness and flexibility.

It is too early to predict what kinds of applications it will produce, but "If you let your imagination go, you can envision tablets and television displays that are as thin as a sheet of paper that you can roll up and stuff in your pocket or purse," Pantelides said.

The study included a group headed by Kazu Suenaga at the National Institute of Advanced Industrial Science and Technology in Tsukuba, Japan. Other collaborators at ORNL, the University of Tennessee in Knoxville, Vanderbilt University, and Fisk University contributed to the project.

The study was published in the journal Nature Nanotechnology

Hack Internet Modem of Unsecured users

Internet is very dangerous i already explained in my almost every post. here today i am going to give you a specimen to you which is just for your study purpose. Never ever try this at home you will be trapped and can be sent to jail for this action. i have used a software Angry IP Scanner which scans a range of IP's. An attacker scans all the IP range of any ISP(Internet Service Provider) with open ports of the computer. What does ports means? Ports are basically virtual doors to reach a computer and every Software we use such as Internet Explorer, Yahoo messenger, Skype etc works on some port No. Port no. of both client and server must be same to make communication. Server knocks the door of client and then client receives the message and shows us, if the port no is wrong then we don't receive the message because our Antivirus Program or Windows Firewall blocks the message which is not meant for us. So here the simple example showing how we can reach to the Internet Modem of any user who is not secured.



I took a range of IP's and scanned Port No. 80 which is meant to reach the victim through Internet Web Browser. All the users with RED icon are safe and i cant reach their Internet Modem but the users whose icon are GREEN i can open their Internet Modems and can change their settings without their permission.

Here are the steps. 

Step 1. Open the web browser such as internet explorer, google chrome or mozilla firefox.
Step 2. Now enter the IP address whose icon is GREEN.
Step 3. Now it will ask for username and password enter admin in username and admin in password.
Step 4. Now do whatever you want to do with the Modem of the victim.
Step 5. Please do not change the setting of any user because it will take you in trouble because every task we perform is saved in the log files of our ISP servers.

Screenshot of victims Internet Modem










You can save yourself by changing Modem password from admin to anything by typing 192.168.1.1 or 192.168.0.1(whichever works) in your web browser and giving user name and password as admin. or enable your firewall or use good antivirus software. If a layman like me can reach to Modem then a trained hacker can do anything. An attacker can use your computer to hack someone else by using ur IP address which will create trouble.


See how secure we are on internet.
Never use such things to hack anybody. Everybody has their own personal life and everybody has right to life life in their own way.

Be safe!!!!!!!!!!!!!!!!!!!!


What is Keylogger?

In February 2005, Joe Lopez, a businessman from Florida, filed a suit against Bank of America after unknown hackers stole $90,000 from his Bank of America account. The money had been transferred to Latvia.

An investigation showed that Mr. Lopez’s computer was infected with a malicious program, Backdoor.Coreflood, which records every keystroke and sends this information to malicious users via the Internet. This is how the hackers got hold of Joe Lopez’s user name and password, since Mr. Lopez often used the Internet to manage his Bank of America account.

However the court did not rule in favor of the plaintiff, saying that Mr. Lopez had neglected to take basic precautions when managing his bank account on the Internet: a signature for the malicious code that was found on his system had been added to nearly all antivirus product databases back in 2003.

Joe Lopez’s losses were caused by a combination of overall carelessness and an ordinary keylogging program.(Source)

Now let me explain what is keylogger?

Keylogger can be a small piece of software or hardware which records every keystroke and it monitor all the activities of the user. They can be programmed in any programming language such as C, C++,VB, VB.NET, JAVA etc. the simple coding to record all the keystrokes is available in almost every programming language. So this programming skills can be used to send the keystrokes and the website where those keystrokes are used through an an email to the attacker. So all the information of Victims Computer can be sent through just a very small piece of software to the attacker who can use that information anytime he wants.

Types of Keyloggers.

There are two types of keyloggers one is programmed Software keyloggers and other is Hardware keyloggers. 

1. Software Keyloggers: Software keyloggers are programmed keyloggers which are written in some programming language to record all the keystrokes with the website or software name which we are using. For Example: If we are buying products online and we are entering Credit Card, Internet Banking details on our banking website and if keylogger is installed on our PC/Laptop then it will email the information we enter in the webpage of banking website and hacker can use that details to transfer or use your money for his shopping. Most of the Paid Antivirus software's can trace keyloggers but smart hacker can remove the Antivirus Signature from the keylogger so it can not be detected by the Antivirus Software. Because Nothing is Impossible. Govt of some countries also use keyloggers to trap the victims and because of that Antivirus Companies do not detect the keylogger software's Govt's use. Basically keylogger softwares are hidden from the taskmaneger because they are programmed to steal the information and the existence of the keylogger can be hided very easily with just 2-3 lines of code.

How to be safely enter credit card/online banking details online?
Now the question is for a layman person its nor possible to detect if his/her computer is infected by any keylogger or not. Because most of the people use pirated Windows and they cant even take assistance from Microsoft, and the guys who installs windows can also install trojans or keyloggers on your computer to steal your information. So if you ahve any doubt that your PC/Laptop is infected then you can use virtual keyboard which is present on almost every online banking website and we can also use on screen keyboard utility which is present in almost all Windows Operating systems which also use mouse to press keystrokes, because we need to press the buttons from the mouse and we don't need to press keystrokes so our information is not recorded. 






There is a special case if smart keylogger is transmitting every screenshot of our PC to attacker then attacker can easily get details through that screenshots too but its very bad technique because every screenshot will be in the form of image and uploading every image after 1 sec means 60 images per minute is very tedious work which will slow down the internet of the victim. But if attacker knows that the victim has an internet with very good speed then the attacker can use that method too. Nothing is safe. 


2. Keylogger Hardware: There is an another way of recording keystrokes using a special hardware which saves all the keystrokes in separate memory and that information then can be used anytime.


Keyboard Hardware :A special hardware is installed on the back of the CPU cabinet prior to the PS/2 adapter of the keyboard as shown in the figure and that hardware records the keystrokes pressed by the user. Cyber Cafe owners use such kind of unethical things to steal the user information of their clients.

USB Keyloggers: There is an another way of recording the keystrokes usiing a USB stick. USB stick stores each keystroke of the user and then saves all the keystrokes USB memory and later that keystrokes can be seen by the attacker to steal the personal information or banking details of the victim.


Never ever use E-Banking in Cafe, Hotels, or Shopping Malls they can also steal our keystroke information through their internet using sniffers which keeps track of every data packet sent and received.

Be Safe!!!!!!!!!!!!!!!!!!!!!!!


or more details Read This and This

Tuesday, 29 April 2014

What is Cloud Computing?

Term Cloud Computing is used as the server side computing in which applications are installed on server end and clients use that applications online via a network.which saves space of the client computer and client computer do not need to be configured with high level hardware, what it needs is high speed network or internet and that network is refereed as cloud. Applications can also be executed over the internet publicly, the common example of cloud computing is Google Drive which has special features by which we can create and edit Document files, Excel Worksheet and PowerPoint presentations. we don't need to install MS-Office on our computer to run these applications. We only need an internet and cloud service provider. There are many other cloud service providers which provide more applications online so users can do their work without installing the software's on their client machines. Same cloud storage is also the term in which users store the data which is accessible anywhere in the world(previously we use FTP servers to store and access files over the internet which was not very safe and user friendly environment) So cloud computing made it very user friendly and easy. users can automatically store the images of their mobiles in cloud storage client such as Google Drive, Dropbox etc. When we click any Photo from our mobile then that photo automatically uploaded to our Cloud storage user id and then later we can access that files from anywhere by login to our cloud storage account.

There are many applications which provide cloud storage for our mobile such as Google Drive, Dropbox, Azure etc. They are available free with some limited storage and we can buy more storage if we need more storage space on cloud. This feature is very useful in case of companies data which can easily be accessed from anywhere from the world. Email clients has size limitations for attachment files but these cloud storage servers can easily store large files on cloud account.

Friday, 25 April 2014

How ATM's are hacked?

Its very unsafe to use ATM on ATM machines because people can easily hack ATM machines with simple tricks without having Computer Knowledge or anything. Simple tricks includes Social Engineering and ATM tempering can do this task very easily.

If you think like a hacker or thief then u can never be caught in this trap. Only smartness is not enough to be safe. We must be aware and conscious every time we use ATM's on ATM machines. 

Things i noticed while using ATM's which may result in ATM hacking are.


1. A case i just experiences was my ATM was not working on a machine and ATM Machine was not accepting my ATM, one guy came to me and said may i help you being a techie geek i denied but what i noticed he was having one more same ATM in his hand, and his plan was to help me and get my PIN and swap his ATM with mine so he could withdraw my money from some other place.Then i noticed why my ATM was not working, when i checked then someone tempered the place where we swipe the ATM with an IRON PIN. There wasn't much space so my card was not accepted by the ATM. when i removed that thing from the Swipe machine my ATM worked like a charm.

2. Second case i noticed many times but seen today on a newspaper that a thief placed a BLADE below the enter key. We don't need to press ENTER key while entering PIN or choosing Withdraw option, we use ENTER key after entering the Amount we withdraw. And if ENTER key is not working then we people think that ATM machine is hanged and is not working, So we leave the ATM machine. in the mean time the Thief who waits us to leave the ATM comes and removes the blade from the ATM and get the money.

3. Never Allow anybody to enter the ATM place if you are doing any transaction. He/She can see your PIN and then later can do anything to get your ATM.

4. Try not to use ATM on the places which are very desolate.

5. Never leave the ATM until you see the message Transaction is failed or Welcome Screen asking to input an ATM card in the machine.

6. If ATM machine is not withdrawing money then call the help center of the BANK and tell them the problem. Your all conversation will be recorded to the CCTV Camera installed in ATM.

7. Never swipe ATM card while shopping, If u are very much aware of all this social engineering ang tricks only then use ur Credit or Debit Card while shopping on showrooms. Showroom owners can also steal your ATM details through Cameras installed on their cash counter. what they need to use your Debit or Credit card is just ATM no, Name on Card and PIN and everything is saved in the video footage of CCTV installed on Cash Counter.

8. If you have used the ATM and you feel that the place was not safe then immediately go to any ATM and then change the PIN or call the customer care to block your ATM. Always keep Customer Care no of your ATM Bank in your Mobile.

9. While shopping online try not to pay online if you have an option to pay cash on Delivery. Because leaving Debit Card information on some websites can be the reason of your money loss.

10. Always keep your eyes open while doing transactions and if you can then always keep small amount in the Account which you use for Online Banking and Debit Card Shopping.

11. Never use Salary Accounts for Online Banking this can be very dangerous.

Always keep your eyes Open while doing Electronic Transaction such as online payments, Debit and Credit card payments.







Start Button menu on Windows 8 and Windows 8.1

Windows 7 like Start button is missing in Windows 8 and Windows 8.1. So you can still access some features of start button through third party software's such as Start8. and still if you don't want to use any software then there are two ways to open Start Menu on Windows 8/8.1




1. Right click on the Windows 8 or Windows 8.1 Start Button.

2. You can open the Start Button menu by pressing Windows key+x Key combination from the keyboard.

How to create a Like Page on facebook for you Company. and promote on Facebook Ads Manager





Step 1. Login to your facebook account.(If you want to make a page for your company then create a separate facebook account on the name of your company with company email address).



Step 2. Now click on the Down Arroa Button on the Top Left corner of the facebook webpage and then click on Create Pagesb option



Step 3. Now choose the type of organisation or interest for which you want to create a facebook page. If you want to create a page for your Company then Click on Company,Organization and Institution.



Step 4. Now choose the Type of your company from the drop down list.


Step 5. type the name of your Company and click on Get Started.


Step 6. now add Company details and Company Photo and other information. Such as website url etc.


Dont forget to choose the option use facebook as: to make your page as default in your company's facebook account.



Now you can promote your company page on facebook Ad Campaign by paying some amount so people can visit your facebook page or website.

Steps to promote your facebook page are:

Step 1. Click on the Ads Manager button displayed on the Top Right Corner of your created page.


Step 2. Now click on Create an Ad button and choose the option you want to advertise. You can promote your website as well as facebook page if money is not and option. These two options will help you to get traffic. You can use this method as trial basis for atleast 4-5 days.




Remember to create a page after 12:00 Midnight(12:05 a.m will be good) according to your country because you will get full 24 hours for 1st day.

Thursday, 24 April 2014

How to Blur Picture in MS-Paint

Sometime we need to apply blur effect on the Images and we can do it with Adobe Photoshop very easily, but if we don't have Photoshop installed then we can do this in MS-Paint which is installed on every Microsoft Windows Operating System. We can do this with Windows Vista/7/8/8.1 MS Paint only.

Steps to blur and image in MS paint are as : 
Step 1. open the image in MS-Paint by right clicking on the Picture and clicking on Edit option.

Step 2. Now click on the shape such as Rectangle, Circle or any other which you want to use to blur the area of an image, i want to blur the face so i am using Circle shape.





Step 3. Now click on the Color 2 Box on MS-Paint Window and choose some light color such as Grey or White. I am choosing Grey.



Step 3. Now click on the option Fill and choose between Crayon, Market, Oil, Natural pencil and Watercolor to apply effect.


Step 4. Drag the shape on the area you want to blur or hide.


Happy Blurring ;)

How Much Money Big Tech Companies Make In Just One Second



We all know the major tech companies have a ton of money. But just how much money do these companies bring in everyday? How about every second?
WorldPayZinc is a website that visualizes this data, showing how their profits grow over time

The above image shows how much they make in one second. In just ONE second, Apple makes $1,997, whileGoogle makes $658. Facebook brings in $81.
This GIF shows how much they make over 10 seconds.


64 Bit vs 32 BIT Operating System RAM utilisation

If you have more than 2 GB RAM in your PC or Laptop then install Windows Operating System with 64 BIT, i.e Windows Vista/7/8/8.1 64 Bit edition.

Because 32 Bit Windows Operating System such as Windows Vista/7/8/8.1  can not utilize more than 2 GB RAM. So if you have 4 GB RAM then u will be able to use only 2 GB RAM in 32 Bit Operating System and remaining 2 GB will be wasted.

BSNL Broadband All Lights ON but Internet is not working


ALL Lights on modem are ON and Static but still Internet is not working?

The common problem in BSNL Broadband is DNS Overload or DNS Down, means the Domain Name Server of BSNL is not responding properly, 
So to access your internet either you can wait for DNS to work again or we can change the DNS address of our Modem/PC/Mobile/IP Camera

BSNL uses its own DNS Server but we can also use OpenDNS or Google DNS to overcome this issue..

How to check that the problem is with DNS?

Open Google website by typing its IP Address 74.125.200.105 in addressbar (Where we type www.google.com) instead of www.google.com. If you can see Google webpage then the problem is in BSNL DNS.

I personally use Google DNS 

8.8.8.8

and

8.8.4.4

Next step is to Change the DNS Address of PC/Modem/Mobile/IP Camera
We can use OPenDNS or Google DNS to overcome this issue

OpenDNS IP's

208.67.222.222 (Primary)
208.67.220.220 (Secondary)

Google Public DNS IP's

8.8.8.8 (Primary)
8.8.4.4 (Secondary)




If PC is directly Connected to Modem/Hub/Switch


For Windows XP

Step 1: Open Control Panel.
Step 2: Choose Network and Connections.
Step 3: Click on View Network Connections from the taskpane shown on the left side of the Network and Connections Window
Step 4: Now Right Click on Local Area Connection and Choose Properties.
Step 5: Now in the properties window choose Internet Protocol TCP/IP and then click on Properties Button.
Step 6: Now Click on Use the following DNS Server addresses Radio Button
Step 7: Now type DNS IP addresses of OpenDNS or Google Public DNS as shown above.
Step 8: Now Click on OK and the Close.

Now surf internet on your PC.


For Windows Vista/7/8/8.1
Step 1: Open Control Panel.
Step 2: Choose Network and Sharing Centre
Step 3: Choose Change Adapter Setting from the taskpane shown on the left side of the Window.
Step 4: Now Right Click on Local Area Connection and Choose Properties.
Step 5: Now in the properties window choose Internet Protocol IPv4 and then click on Properties Button.
Step 6: Now Click on Use the following DNS Server addresses Radio Button
Step 7: Now type DNS IP addresses of OpenDNS or Google Public DNS as shown above.
Step 8: Now Click on OK and the Close.

Now surf internet on your PC.






 If using Wifi/Wireless Networks



For Windows XP


Step 1: Open Control Panel.
Step 2: Choose Network and Connections.
Step 3: Click on View Network Connections from the taskpane shown on the left side of the Network and Connections Window
Step 4: Now Right Click on Wireless Network Connection and Choose Properties.
Step 5: Now in the properties window choose Internet Protocol TCP/IP and then click on Properties Button.
Step 6: Now Click on Use the following DNS Server addresses Radio Button
Step 7: Now type DNS IP addresses of OpenDNS or Google Public DNS as shown above.
Step 8: Now Click on OK and the Close.

Now surf internet on your PC.




For Windows Vista/7/8/8.1

Step 1: Open Control Panel.
Step 2: Choose Network and Sharing Centre
Step 3: Choose Change Adapter Setting from the taskpane shown on the left side of the Window.
Step 4: Now Right Click on Wireless Network Connection and Choose Properties.
Step 5: Now in the properties window choose Internet Protocol IPv4 and then click on Properties Button.
Step 6: Now Click on Use the following DNS Server addresses Radio Button
Step 7: Now type DNS IP addresses of OpenDNS or Google Public DNS as shown above.
Step 8: Now Click on OK and the Close.


Now surf internet on your PC.

Happy Surfing.........................!!!!!!!!!!!!!!!!


If u want this configuration for Mobile Phone or Modem then leave the model No. of your Mobile or Modem.

Free Samples worth Rs. 350 from P & G

Click here to get thee Samples from Reward Me

https://www.rewardme.in/page/register-1


Open website in Internet Explorer and order the samples.

How to get Free Sample of Different Products from Rewardme.in :

  • Go to Reward Me Offer Page
  • Fills up the registration form.
  • Clicks on "Register"
  • Enters nickname and click on register
  • Clicks on login now
  • Logins with the registered username and password
  • Enter the SMS verification code and click on continue
  • Selects at least 3 Samples qualify to order
  • Click on Samples and Order
  • Enjoy your Free Sample… It may take few weeks for delivery… Keep patienc

Wednesday, 23 April 2014

Check if your Photo shown on Display of FB, Whatsapp, Gmail is being misused on Internet.

Pictures of Girls are being saved by some guys and they circulate that pics on the internet with fake names and also they morph the pics which becomes the reason of harassment. So this is advice to girls not to display their pics on any social websites. To get the compliments you may spoil your life. So beware of such stupidity. And never ever chat on webcam with anyone except your relatives. Anybody can capture the webcam video through screen recording video and that videos can easily be morphed and misused.Keep your webcam disconnected from the USB if you are not using it. Hackers can view your webcam without your permission and  knowledge, they can broadcast the current video on any website.
Be Safe!
These things seems very small but are very important.

We can check if our photo is being misused on internet in the form of video or youtube video.

Step 1. Open http://images.google.com/.
Step 2. Now click on Search by image icon on the webpage












S






Step 3. Now Click on Upload an image tab on the page, and then click on Choose File button. Now choose the picture you want see if it is being misused or not?


Step 4. Upload the picture and wait for sometime to upload the picture, after uploading google will search the picture on the web and will show the results for the webpages having the picture you searched.Google will automatically guess for the picture as it is being tagged with some comment by people on internet as shown in the result below.




Never ever share your picture with anybody.
Be Safe!!!!!!!!!

And share the post so people can know if their picture is being misused and they can remove their pics from social websites.

Garnier Women Anti-Sweat Intense Sport Deo at Rs. 75 + Free shipping from Myntra.com-

Offer Details :
Myntra in partnership with one of the most popular online Mobile recharge site freecharge is giving Rs. 100 OFF Myntra coupon code ( applicable on Complete Site ) when a user recharge its Mobile / DTH at any amount . But to select the coupon code the user needs to pay Extra Rs. 9 for the coupon code above the recharge value.
http://freekaamaal.com/wp-content/uploads/Deo13-155x110.jpg
How to get Rs. 100 OFF at Myntra through Freecharge :
​​You can also Use Coupon CODE35 to get 35% OFF On 1499 
Recommended DEO :




for more details