Adobe Reader Trick
Adobe Reader PDF Trick
Hey peeps now you can listen to what's there in a PDF document instead of reading the whole document
Try out the following key combinations for Adobe Reader 8 or later
1] Ctrl + Shift + B => to hear the whole document
2] Ctrl + Shift + V => to hear only the page
3] Ctrl + Shift + C => to resume
4] Ctrl + Shift + E => to stop
Feel free to comment and share...!
Wednesday, February 18
Facebook Providing Free Internet Service in India Too!
Facebook has partnered with Reliance Communications to bring its Internet.org app to India, in a bid to provide affordable internet to people even in remote areas. The move comes just three weeks after facebook announced it’s tie-up with Airtel, for the service, in Ghana. Internet.org is also currently available in Tanzania, Colombia, Zambia and Kenya.
Facebook has partnered with Reliance Communications to bring itsInternet.org app to India, in a bid to provide affordable internet to people even in remote areas. The move comes just three weeks after Facebook announced it’s tie-up with Airtel, for the service, in Ghana. Internet.org is also currently available in Tanzania, Colombia, Zambia and Kenya.
The app allows users to surf a variety of popular websites for things like job listings, healthcare, news, sports, and social networking, without incurring any data charges, and will work even on feature phones. The service will only be available for Reliance sim cards, and has been announced in six states so far: Tamil Nadu, Mahararashtra, Andhra Pradesh, Gujarat, Kerala, and Telangana. Content will be available in English, Hindi, Tamil, Telugu, Malayalam, Gujarati and Marathi.

Users will be able to access 33 partner websites, including India Today, BBC News, ESPN Cricinfo, Wikipedia, Cleartrip, and AccuWeather, and more will be released over time. A particularly interesting one is AP Speaks, which will allow people from Andhra Pradesh to interact with their state government. You can read the full list here.
Users will be able to access 33 partner websites, including India Today, BBC News, ESPN Cricinfo, Wikipedia, Cleartrip, and AccuWeather, and more will be released over time. A particularly interesting one is AP Speaks, which will allow people from Andhra Pradesh to interact with their state government. You can read the full list here.
Facebook Launched Internet.org In india...!
Facebook Launched Internet.org In india...!
Late last year Facebook hosted the first Internet.org Summit in New Delhi, India. The Summit, and keynote from Mark Zuckerberg, addressed barriers to internet connectivity and explored ways to provide internet access to more than a billion people in India who aren’t yet connected.
Today, Facebook and Reliance Communications are making the internet available to millions of people in India through the launch of the Internet.org app and free basic services. This is the first time the Internet.org app will be available in the region.
Reliance customers in six Indian states (Tamil Nadu, Mahararashtra, Andhra Pradesh, Gujarat, Kerala, and Telangana) will now have access to more than three dozen services ranging from news, maternal health, travel, local jobs, sports, communication, and local government information.
The full list of services includes:
- Aaj Tak: Read news in Hindi
- AccuWeather: Get updated weather information
- amarujala.com: Read news in Hindi
- AP Speaks: Engage with local government
- Babajob: Search for jobs
- BabyCenter & MAMA: Learn about pregnancy and childcare
- BBC News: Read news from around the world
- Bing Search: Find information
- Cleartrip: Check train and flight schedules & buy tickets
- Daily Bhaskar: Read local news
- Dictionary.com: Search for meanings of words
- ESPN Cricinfo: Get cricket updates
- Facebook: Communicate with friends and family
- Facts for Life: Find health and hygiene information
- Girl Effect: Read articles and tips for girls
- Hungama Music: Listen to music
- IBNLive: Read news
- iLearn: Learn from Women Entrepreneurs
- India Today: Read local news
- Internet Basics: Learn about the basics of the Internet
- Jagran: Read local news
- Jagran Josh: Get education and career information
- Maalai Malar: Read news in Tamil
- Maharashtra Times: Read news in Marathi
- Malaria No More: Learn about malaria
- manoramanews.com: Read local news
- Messenger: Send messages to friends and family
- NDTV: Read news
- Newshunt: Read news in English
- OLX: Buy and sell products and services
- Reliance Astrology: Read your horoscope
- Reuters Market Lite: Get farming and crop information
- Socialblood: Register to donate blood
- Times of India: Read news
- TimesJobs: Search for jobs
- Translator: Translate words and phrases
- Wikipedia: Find information
- wikiHow: Find information
Reliance customers in India can access these services in the Internet.org Android app, atwww.internet.org, from the start screen of the Opera Mini mobile web browser, and using the Android app UC Browser for Internet.org. Most of the services will be available in English, Hindi, Tamil, Telugu, Malayalam, Gujarati and Marathi.
This is a big step forward in our efforts to connect everyone to the internet, and to help people share their ideas and creativity with the entire world. We’ll continue to improve the experience and roll it out to other parts of the world.
source-DNA
How to hide IP and Browse the Internet Anonymoously
How to Browse the Web Anonymously with Tor
The power of the Tor Browser Bundle allows you to browse the internet anonymously.
Anonymity online is an important issue. Many people use VPNs as a way to stay anonymous. However, many of the VPN services are expensive. Setting up a free one yourself is very difficult.
You can easily browse the internet anonymously without having to configure a VPN or use a paid service. Tor is a client that routes your traffic through a own network and other Tor users. This setup will zigzag and weave your web browsing through many different Tor nodes using encryption.
Picture the service as if someone was following you in real life, and you randomly walked through a maze of stores throughout your city to evade this person. Likewise, in theory, your ISP should not be able to tell what your doing as tor manipulates your network traffic.
Of course, all anonymous services can be used for nefarious means. However, since Tor routes traffic through other Tor users, it is entirely possible that TOR will route some evil activity through your network. As Tor’s network is mainly created through users sharing and rerouting the content for each other, you could be helping other users hide illegal activity. The ethical dilemmas and moral conflicts involved are personal choices for you to decide.
This article is not intended for using Tor to hide illegal manner. Be safe and be smart.
1TOR has a special package called the Browser Bundle. This is a version of Firefox integrated with TOR magic to streamline the performance. Trying to configure TOR for Chrome or a non “tor-fied” version of Firefox can be difficult and yield very slow connections in some cases. You can download the Tor Browser Bundle here:
2Once Tor Browser Bundle downloads, we need to extract it. I simply extracted it to my Desktop in this example.
3Now launch the file called Start Tor Browser.exe in the Tor Browser folder you just extracted.
4A program will pop up called the Vidalia Control Panel. It attempt to connect to the Tor network.
5TorBrowser will then pop up with a message in green showing that the connection is successful. It will also list your virtual IP address. If you close the TorBrowser, Vidalia will automatically disconnect from the Tor network as well
6Want to change your IP again? Switch to Vidalia with TorBrowser still open and click Use a New Identity
After this you can refresh you page and see that your virtual IP address has been changed. At this point you can proceed with anonymous browsing of the web through the TorBrowser. Remember that by installing additional browser extensions and plugins, you may reduce the effectiveness of your anonymous connection.
If you liked this Tutorial...!
Like us on Facebook...!
Follow us on twitter
How To Recover Deleted data from HardDrive...!
Recover Deleted/Lost Data
Hello Friends...!
i found many of My Friends, Having Suddenly Lost their data, due to software or Hardware Damage...!
I know how it feels, When we loose our Precious Preserved Data...!
Though many of my Friends know How to Recover the Lost data from Harddrive , And Even MemoryCards and Pendrives...!
Though this tutorial is for My Newbie Friends, who dont know yet, how to recover deleted data...!
So it would be worth reading this.
Recover My Files
Recover My Files data recovery software will recover deleted files emptied from the Windows Recycle Bin, or lost due to the format or corruption of a hard drive, virus or Trojan infection, unexpected system shutdown or software failure.
Recover My Files - Data Recovery Software | Solution |
Recover files even if emptied from the Recycle Bin | |
File recovery after accidental format, even if you have reinstalled Windows. | |
Disk recovery after a hard disk crash | |
Get back files after a partitioning error | |
Get data back from RAW hard drives | |
Recover documents, photos, video music and email. | |
Recover from hard drive, camera card, USB, Zip, floppy disk or other media | |
To Recover deleted or corrupt photos:
DiskInternals Flash Recovery 4.2 full download using which you can recover deleted or corrupted photos within few seconds. Isn't that nice, its best that you can recover all your deleted data from the flash memory cards used in cameras.
DiskInternals Flash Recovery is a flash memory file recovery tool that restores all corrupted and deleted photographs or the ones that were lost due to hardware malfunction. This utility works even if a memory card was re-formatted.
Features:
• Easy Recovery Wizard.
• Can preview and recover JPEG, JPG, TIFF, BMP, PNG, GIF, TGA and other images.
• Can preview and recover RAW images:
• CRW - Canon Digital Camera Raw Image Format.
• CR2 - Canon Digital Camera Raw Image Format version 2.0.
• NEF - Nikon Digital SLR Camera Raw Image File.
• PEF - Pentax Raw Image Format
• RAF - Fuji CCD-RAW Graphic File.
• X3F - Sigma Camera RAW Picture File.
• BAY - Kodak/Roper Bayer Picture Sequence.
• ORF - Descent 3 Outrage Room Format.
• MRW - Minolta Diamage Raw Image File.
• RAW - Image Alchemy HSI Temporary Raw Bitmap
• SRF - Sony DSC-F828 Raw Image File.
• Other RAW images
• Works under Microsoft® Windows® 95, 98, ME, NT, 2000, XP, 2003 Server.
• Supported file systems: FAT12, FAT16, FAT32, NTFS (NT 4), NTFS5 (2000, XP).
• Recovered files can be saved on any (including network) disks visible to the host operating system.
• Creates recovery snapshot files for logical drives. Such files can be processed like regular disks.
Besides this Software we can also use...
*** RECUVA which is my most favourite recovery software...!
If you liked the Post!
Like us on facebook...!
Friend Request Block on fb???
AVOID FRIEND REQUEST BLOCK
Hey Friends.. I Have seen My friends feeling bit Helpless, when they find their Charm on Facebook , and They are temporarily blocked By Facebook Friend Request service...!
We usually send friend requests and if it's not accepted it is kept in pending.
If there are lots of pending requests it may lead to block.
So this is a simple way to get those requests cancelled and protect your account from being blocked.
Check the steps...
And u will Find Where your Request are pending...!
Follow below steps :-
1. Go to account settings.
2. Select `download a copy` option.
3. Choose `expanded archive` from the next page opened and enter your password and click continue.
4. Select `start my archive`.
5. After a few hours you'll get the download link in your email.
5. Download the file `facebook` and unzip it.
6. Open the folder html and then `friend_requests.html`.
7. You can see the list of your friend requests and pending lists.
Now goto their accounts and click`cancel request.
That's all You are done now. Your account is safe.
If You like the Post...!
Like us On Facebook...!
Follow us on Twitter...!
Follow on Google+...!
Hey Friends.. I Have seen My friends feeling bit Helpless, when they find their Charm on Facebook , and They are temporarily blocked By Facebook Friend Request service...!
We usually send friend requests and if it's not accepted it is kept in pending.
If there are lots of pending requests it may lead to block.
So this is a simple way to get those requests cancelled and protect your account from being blocked.
Check the steps...
And u will Find Where your Request are pending...!
Follow below steps :-
1. Go to account settings.
2. Select `download a copy` option.
3. Choose `expanded archive` from the next page opened and enter your password and click continue.
4. Select `start my archive`.
5. After a few hours you'll get the download link in your email.
5. Download the file `facebook` and unzip it.
6. Open the folder html and then `friend_requests.html`.
7. You can see the list of your friend requests and pending lists.
Now goto their accounts and click`cancel request.
That's all You are done now. Your account is safe.
If You like the Post...!
Like us On Facebook...!
Follow us on Twitter...!
Follow on Google+...!
Hacking With Cellphone, Check Out...!
With new hack, cellphone can get data out of computers
Hackers no longer need the Internet to invade and control a system, Ben Gurion University researchers say
Cutting off the Internet won’t keep you safe from long-distance hackers, Ben Gurion University researchers discovered. Using a technique called air-gap network hacking, all a hacker has to do is implant the right kind of malware into a cellphone that gets within range of a computer. Hackers on the other side of the world could use cellphone-based malware to remotely access any data they want, using the electromagnetic waves emanating from computer or server hardware, with no need for an Internet connection.
The hack isn’t new, according to Prof. Yuval Elovici, head of BGU’s Cyber Security Lab. The technique was used to attack Iranian servers in the Stuxnet hack attack. What’s new is the use of a cellphone to do it.
The Iranian network targeted by Stuxnet was an air-gapped one, connected only to local computers, with no external connection to the Internet. The virus infected the servers controlling the Iranian nuclear program’s centrifuges, “choking” them until they ground to a halt. It was, many experts believe, physically transferred to the closed network via a USB flash drive. The attack described by Elovici is light-years ahead of Stuxnet, because no physical contact is required to compromise a system.
Even if you don’t think your computer is connected to anything, it sends electromagnetic or acoustic emanations from its hardware. The NSA’s (National Security Agency) TEMPEST program uses special devices to pick up data from computers and servers via leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations from hardware such as video monitors, keyboards, network cards and memory chips.
Each stroke on a keyboard, for example, transmits an electrical signal that runs through a computer’s processor and shows up on the monitor, emitting electromagnetic waves. Since each letter is unique, each key gives off a different frequency wave. If a hacker can capture those waves and reconstruct them, he could figure out what usernames and passwords were used to log onto the network.
How could a mobile phone be used to hack into an air-gapped network? In a take-off of an email phishing attack, a hacker could send an unsuspecting employee in a sensitive installation a text message that looks legitimate, but contains a link to malware that surreptitiously gets installed on their cellphone.
Once the malware is on the phone, it scans for electromagnetic waves which can be manipulated to build a network connection using FM frequencies to install a virus onto a computer or server. Elovici’s team has demonstrated how this is done with computer video cards and monitors. With the virus installed on the system, the phone connects to it via the FM frequency, sucks information out of the server and uses the phone’s cellphone network connection to transmit the data back to hackers. All that’s needed is physical proximity to the system. The team said that one to six meters is enough.
Elovici and his team demonstrated this technique to President Shimon Peres during his visit to BGU’s Cyber Lab last month.
Right now, Elovici said, there’s little that can be done to prevent this kind of cyber-attack other than turning off the phone. As that is not a practical solution in this day and age, his team is searching for other solutions. It’s a major security risk, he said. Until a solution is found, that risk will only increase, as news of the hack spreads in the hacker community.
get Asus zenphone C best price and best feature
get Asus zenphone C best price and best feature
Like Us On Facebook ...!
Follow us On Twitter...!
How To Hacking Using Android Device
Hacking Using Android Devices
Hello freinds, Here we are Showing Some of the best Hacking Apps For android Mobile...!
You can get them free of cost...!
Like Us on Facebook ...! if you Liked This Post...!
Hack Code:
The hacker's Toolbox is an application for penetration tester, Ethical hackers, IT administrator and Cyber security professional to perform different tasks like reconnaissance, scanning performing exploits etc. Download AVD Clone: Clone an Android Virtual Device for easy distribution through the Android SDK Manager. You can create an AVD preinstalled with the apps and settings you need, and distribute it to others by having them point their Android SDK Manager to your repository. Tool made by Security Compass. Download APKInspector : The goal of this project is to aide analysts and reverse engineers to visualize compiled Android packages and their corresponding DEX code. APKInspector provides both analysis functions and graphic features for the users to gain deep insight into the malicious apps. Download Burp Suite: It is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing Download Androguard: Create your own static analysis tool,; Analysis a bunch of android apps,; Analysis . Open source database of android malware. Download Android Framework for Exploitation : Smartphone Pentest Framework: Rather this tool allows you to assess the security of the smartphones in your environment in the manner you’ve come to expect with modern penetration testing tools. Download Android Network Toolkit (ANTI) This app is capable of mapping your network, scanning for vulnerable devices or configuration issues. It is for use by the amateur security enthusiast home user to the professional penetration tester, ANTI provides many other useful features such as: easy connection to open ports, visual sniffing (URLs & Cookies) and - establishing MiTM attacks (using predefined and user-defined filters), Server Side / Client Side Exploits, Password cracker to determine password’s safety level, Replace Image as visual in demos and Denial of Service attacks. All this is packed into a very user-friendly and intuitive Android app (and soon to be released iOS app).Download ->ANONdroid v. 00.00.008 : JonDonym proxy client for Android ANONdroid acts as a proxy for your internet applications and will forward the traffic of your internet applications encrypted to the mix cascades. ANONdroid uses the core libraries of JonDo with a smartphone compatible GUI. Download Am I Hacker Proof Am I Hacker Proof scans your network, computer or website from the outside as a hacker would, looking for vulnerabilities. Once it finds the vulnerabilities, it will email or text you letting you know how many vulnerabilities you have. In addition, in the paid version you can check to see if your voicemail on your cell phone is hacker proof. This App does not use any resources on your phone. Once you start a scan you will be notified via email or text your scan started. When your scan is completed you will be notified again that your scan is complete. Am I Hacker Proof includes these services for free: - Choose from three types of scans: A “Quick” scan (up to four hours), a “Complete” scan (can take up to four days to complete), and a Web site scan (searches for vulnerabilities in certain types of Web sites; currently supports WordPress Web sites). - You can perform a scan on any Web or IP address. - You can scan up to 10 times a month. - Built- in tools – Ping, Traceroute, Whois, ISP/E-mail Service Providers database and real time cyber security news feeds. - Your reports are saved in a PDF file that you can read on your device or forward to any email address you like. - Your account on your device works on the website www.AmIHackerProof.com so you can have access to more applications. -> Voicemail Hacking. - Built-in tools – Ping, Traceroute, Whois, ISP/E-mail Service Providers database and real time cyber security news feeds. - Search through the scans you performed by address, time, number of vulnerabilities, or status. - You get an email and text message letting you know the number of vulnerabilities found on that IP address or website. Download |
Andro Rat:
DownloadAndroRat is a remote administration Android tool. you can bind this spyware tool with the other android application and ask the victim to download this app. It can read all messages, contacts, records and acall without knowing of the user. Droid Pentest: Its help you to find all android apps for penetration testing and hacking so you can make complete penetration test platform . This Tool developed by Nikhalesh Singh. Download Android SDK: A software development kit that enables developers to create applications for the Android platform. The Android SDK includes sample projects with source code. Download DroidBox: Its developed to offer dynamic analysis of Android applications. The following information is shown in the results, generated when analysis is ended: • Hashes for the analyzed package • Incoming/outgoing network data • File read and write operations • Started services and loaded classes through DexClassLoader • Information leaks via the network, file and SMS • Circumvented permissions • Cryptography operations performed using Android API • Listing broadcast receivers • Sent SMS and phone calls Additionally, two images are generated visualizing the behavior of the package. One showing the temporal order of the operations and the other one being a treemap that can be used to check similarity between analyzed packages. Download Dex2jar: dex2jar is a lightweight package that provide you with four components in order to work with .dex and java .class files. dex-reader is designed to read the Dalvik Executable (.dex/.odex) format. It has a light weight API similar with ASM. Download Jd-gui: JD-GUI is a standalone graphical utility that displays Java source codes of “.class” files. You can browse the reconstructed source code with the JD-GUI for instant access to methods and fields. Download Wifi Protector - Protect Your Android From Wi-Fi Sniffing Attacks
The only app that is able to countermeasure "Man In The Middle" attacks on Android platform - Wifi Protector. No other app provides this type of high network security. Protects your phone from tools like FaceNiff, Cain & Abel, ANTI, Ettercap, DroidSheep,
DownloadNetCut,and all others that try to hijack your session via "Man In The Middle" through ARP spoofing / ARP poisoning. -> Free Avast Antivirus For Android Security
Full-featured Antivirus and Anti-Theft security for your Android phone.
By using Avast Mobile Security in your Android phone, your cell phone will be protected by virus, threat, hacker, even it’s able to minimize your loss if your Android cell phone is stolen. The antivirus component supports real-time protection and automatic updates. Updates can be configured to only be downloaded over certain
Protect personal data with automatic virus scans and infected-URL alerts. Stop hackers by adding a firewall (rooted phones). Control anti-theft features with remote SMS commands for: history wipe, phone lock, siren activation, GPS tracking, audio monitoring, and many other useful tools.types of connections and the interface can be protected with a password. Call and SMS filtering can help device owners block annoying advertising calls or spam text messages. Users can define groups of phone numbers and configure the blocking intervals for them.The firewall component is only available for rooted devices because it requires special system-level access to enforce its rules. Device owners can use it to block individual applications from accessing the Internet over certain types of connections. Download Wi-Fi Key Recovery ->You need root to use this application. ->You need to have connected to the network in the past. -> This app cannot "hack" into an unknown/new network.
Have you ever forgotten the password of your home WiFi network, or the one you setup for your parents a few months back?
This application will help you recover the password of a wireless network you have connected to with your device in the past. You can then either tap on an entry to copy it, or export the list to SD, or share it using the standard Android sharing facilities. It does not crack the network, or use the MAC/SSID address to deduce the password. It simply reads it from the device itself. Download |
Saturday, January 10
How to Bypass Smartphone Lock Screen
How to Bypass Smartphone Lock Screen...!
Hello Friends, I found Many of my Friends... Finding Ways to Bypass Security LockScreens of Smartphones...!
Yup! its true , U can Bypass Lock Screens of Some of the Smartphones...! U can Try all this ... To shock ur Friends...!
Samsung Galaxy Note2 and S3Samsung Galaxy Note2 Security specialist Terence Eden explained in his blog that unauthorized users can press the “emergency call” and the “in case of an emergency” (ICE) contact list buttons and hold down the home button at the same time to cause the device’s home screen to pop up. From there a user can touch an app and gain access to it. Steps:
How to bypass the Lock screen Samsung Galaxy S3:The bug was discovered by Sean McMillan Steps:1) On the code entry screen press Emergency Call 2) Then press Emergency Contacts 3) Press the Home button once 4) Just after pressing the Home button press the power button quickly 5) If successful, pressing the power button again will bring you to the S3's home screen McMillan said that it can "take quite a few attempts to get this working, sometimes this method works straight away, other times it can take more than 20 attempts." | Find My iPhone iCloud Lock BYPASS Activation Lock BypassApple iOS 6.1.2This vulnerability was founded by Vulnerability Lab researcher. This vulnerability allows users to bypass the lock screen pass code and access the phones photos and contacts. Researchers say the vulnerable device can be plugged into a computer via USB and access data like voice mails, pictures, contacts, etc.Steps:
Bypass Smartphone Lock Screen Through Viber App:
Hope U liked the tricks...!
Like us On Facebook
|