Tuesday, October 23, 2012

Jailbreak iOS 6.0 on iPhone 4S, 4, 3GS, iPod Touch 5, 4, & iPad 3, 2





Untethered vs. Tethered

An untethered jailbreak means you can turn off your device and reboot without the use of a computer. A tethered jailbreak means you can not reboot your device if you turn it off without the u
iOS 6 was just released a while ago, and now we’re going to show you how to jailbreak it.
First of all, please note that this is a tethered jailbreak, and it only works with A4 devices like the iPhone 4.
Secondly, since there currently isn’t any jailbreak tool that will install Cydia just yet, we’re going to have to go about installing Cydia using a manual process.
Still game after all of those asterisks? Then come inside, as we show you how to Jailbreak iOS 6 final…
Jailbreak iOS 6 On iPhone, iPad, iPod Using Redsn0w
Step 1: Install iOS 6 on your device. You’ll also need to know the location of the iOS 6 IPSW firmware file. If you’re on a Mac, you can find that in /Library/iTunes/iPhone Software Updates/ if you didn’t download iOS 6 manually, and updated using iTunes. You can also download iOS 6 from our downloads page. After iOS 6 is installed, hook your device up to your computer, and place it into DFU mode.

Step 2: Download RedSn0w 0.9.13dev4 from the downloads page.
Step 3: Run RedSn0w, and click Extras > Select IPSW, then select your iOS 6 firmware file. It should successfully identify your firmware.

Step 4: Click Back, and then click Jailbreak. You should see a dialogue box saying “preparing jailbreak data” followed by a page with several options. Ensure that Install SSHis selected, and click Next.

Step 5: Your iPhone will now proceed through the jailbreak process. You will receive a message acknowledging that this is a tethered jailbreak.

Step 6: Once the jailbreak is completed, and you are back on your Lock screen, place the device back info DFU mode.
Step 7: Click Back, and then click Just boot. A pineapple logo should appear on your device, indicating a tethered boot. Once this complete’s and you are back on your Lock screen, you may close RedSn0w.

Installing Cydia

Step 1: On your iOS device, go to Settings > Wi-Fi > and click the arrow next to your connected Wi-Fi router. Find your IP address for your Wi-Fi connection. In my example, my IP is 10.0.1.27.

Step 2: On a computer connected to the same Wi-Fi network, open the Terminal app.
Step 3: In terminal type: ssh root@10.0.1.27 (be sure to change the IP address to match your iOS device’s IP)

Step 4: After a few seconds, it should connect, and prompt you for your iOS device’s password. The password is alpine
Step 5: Once connected, paste the following into the terminal:
wget -q -O /tmp/cyinstall.sh http://downloads.kr1sis.net/cyinstall.sh && chmod 755 /tmp/cyinstall.sh && /tmp/cyinstall.sh

Step 6: After a minute or so of scrolling prompts, your iOS device should reboot, and Cydia will be installed. If you get any permission errors on the terminal, just ignore them.

That’s it. You now have a jailbroken iOS 6 device running Cydia. That wasn’t so hard, was it?

How To Install Incompatible Android Apps From Google Play




Some Android apps on Google Play claim to be incompatible with various devices. There’s a good chance that these apps will run fine on many of these devices – you can bypass this check with root access.
Some apps won’t actually work after you install them, but many will. This also solves problems with games that will install but refuse to play – for example, Gameloft games with the “this device is incompatible” message.

Setup

To perform this hack, you’ll need to root your Android smartphone or tablet. After you do, you should install ES File Explorer from Google Play.

Editing Build.prop

The build.prop file contains a few strings (bits of text) that identify your device model. If you edit this file, Google Play and other apps will think you’re using a different device than you actually are. Be very careful when editing this file – we’ll just be editing a few tiny parts of it. If you edit other parts, you could cause serious problems with your device.
First, launch the ES File Explorer app. Open its Settings screen and enable the Root Explorer and Mount File System options. You may also want to enable the Up to Root option on this screen, so you can easily tap the Up button and navigate to your root directory.

Navigate to the /system/ directory on your device and locate the build.prop file.

You should create a copy of the original build.prop file elsewhere – long-press on it, select Copy, and then Paste it into another folder – say, your /sdcard/ folder.

Now you’re ready to edit the file. Long-press it, select Open As, select Text, and select the ES Note Editor app.

Look for the ro.product.model and ro.product.manufacturer lines. These are the important ones.

Change these lines to pretend your device is another model. For example, to imitate a Nexus S, use these lines:
  • ro.product.model = Nexus S
  • ro.product.manufacturer = samsung
After making this change, tap the menu button and select Save.

Final Steps

Go into the Settings screen, select Applications, select Manage Applications, tap the All category, and select the Google Play app. Clear its cache and data, and then restart your device

Open Google Play and you should be able to download apps that claim they’re not compatible with your device. Games that detect your device should also work, too – Gameloft games seem to be particularly guilty of this. Some apps may still not install or work with your device for other reasons — for example, Google Chrome won’t work on pre-Android 4.0 devices, and some apps may be restricted to certain countries.

Track Stolen Phone/Laptop/Tablet Using PREY


Download URL: http://preyproject.com/download
1. Laptop protection

step 1
Prey works on a centralised service basis. It’s installed on multiple devices and managed via its web control panel. There’s an alternative mode but we’ll choose this option. Download the laptop client from preyproject.com, install it, choose Prey + Control Panel and create a new user name with password.
2. Control Panel

step 2
Log into the preyproject.com website and you’ll have access to the Control Panel. The opening page shows you all the devices you have registered. The free service has a limit of three, with 10 reports, but that’s enough to provide security. Click the icon to confi gure this further.
3. You are the Quarry

step 3
The main page is where you can set all the juicy bits. Geo and Networking enables you to pin down a rough locality for the device; the Session section will take screenshots of activity and monitor files; while the webcam will grab images of the perp.
4. It’s gone

step 4
If a device is lost, setting the Missing switch to On will send an email to you the instant the Prey system detects the device is online and is in a state it has been able to run the client-side Prey app. The default setting sends updates every 20 minutes.
5. We’ve got one!

step 5
So how did it do? We initially had problems getting the webcam to work but it finally activated, was taking screengrabs and logging IP traces. It’d be better if it took targeted grabs and browser log-ins but it’s certainly a very good step in the right direction.
6. Mobile protection
step 6
Prey works on more than just PCs, Macs or Linux: it also supports Android devices, including phones and tablets. A version for iOS devices, such as the iPhone, is apparently in the works. Phone devices are activated and controlled via SMS and it can play a loud sound if you’ve misplaced them.
————————————————————————————————

Key features

  • Geo location aware

    100% geolocation aware

    Prey uses either the device’s GPS or the nearest WiFi hotspots to triangulate and grab a fix on its location. It’s shockingly accurate.
  • Wifi autoconnect

    Wifi autoconnect

    If enabled, Prey will attempt to hook onto to the nearest open WiFi hotspot when no Internet connection is found.
  • Light as a feather

    Light as a feather

    Prey has very few dependencies and doesn’t even leave a memory footprint until activated. We care as much as you do.
  • Prey webcam module

    Know your enemy

    Take a picture of the thief with your laptop’s webcam so you know what he looks like and where he’s hiding. Powerful evidence.
  • Prey screenshot feature

    Watch their movements

    Grab a screenshot of the active session — if you’re lucky you may catch the guy logged into his email or Facebook account!
  • Prey Secure module

    Keep your data safe

    Hide your Outlook or Thunderbird data and optionally remove your stored passwords, so no one will be able to look into your stuff.
  • Prey Lock module

    No unauthorized access

    Fully lock down your PC, making it unusable unless a specific password is entered. The guy won’t be able to do a thing!
  • Prey hardware scan

    Scan your hardware

    Get a complete list of your PC’s CPU, motherboard, RAM, and BIOS information. Works great when used with Active Mode.
  • Prey Auto update

    Full auto updater

    Prey can check its current version and automagically fetch and update itself, so you don’t need to manually reinstall each time.

Sunday, October 21, 2012

Facebook phissing

Making Facebook Phishing Site Tutorial.


   Now in this article i am going to teach you how to set up the Phishing site, which is the Difficult task than making a Phishing site.

Step 1: The First Step in Making the site is to regester an account at http://www.000webhost.com/order.php (if you have account than you can skip first 2 steps)



Step 2: Now Goto your email account that you gave and confirm your account with confirmation link


Step 3: Now Download this FILE (http://www.mediafire.com/?klq1vak76bouzrw ) .

Step 4: Now Goto http://members.000webhost.com/ and Log into your account.



Step 5: Now when you are logged into your account click on the Go to Cpanel  in front of your domain that you had registered, and then Go to File Manager under Files and log into it.


Step 6: Now Click on the Public_html.



Step 7: Now click on the Upload button, choose the file under the Archives that you have downloaded, to be uploaded.

Step 7: Now any one who visits your site would be taken to the Fake Facebook Login Page. After they enter their Username and Password, they will be taken to another page that will show them error. So there is less chance that it will be detected.




NOTE::: To access the input data ( Usernames and Password ) Goto the Following Address:


http://www.yoursitesadress.p4o.net/lol.html


If I am not clear in any point Please ask me in comments below.
THE DOWNLOAD LINK TO facebook.zip is http://adf.ly/73Q4s
PS:> If www.p4o.net didn't worked for you, you can use :
www.drivehq.com
www.yourfreehosting.net
www.esmartstart.com

=============================================================
The Input Data (Email and Password) will look like following:

==============================================================
UPDATE:
Now if you have successfully made the Phishing page(site) then you must know that on Facebook you cannot post it, mail it, or sent it in chat. e.g: www.yoursite.p4o.net. This is because Facebook dont allow the T35.com sites. So Solution to this problem is to use http://www.dot.tk for the URL hiding.
All you have to do is to Goto http://www.dot.tk , on the main page enter your Phishers address and get a domain for that. Like for www.myphisher.p4o.net you gets www.myphisher.tk. And facebook will allow you to post it

HOW TO FIND YOUR USERNAME?
Ok guys this is the most asked question of all so here is a simple answer, just look in the following picture of Admin Paned the red shaded area tells you the username of the website
.


Saturday, October 20, 2012

20 Great Google Secretsoo

20 Great Google Secrets


 

Google is clearly the best general-purpose search engine on the Web

But most people don't use it to its best advantage. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 3 billion pages in Google's index, it's still a struggle to pare results to a manageable number.

But Google is an remarkably powerful tool that can ease and enhance your Internet exploration. Google's search options go beyond simple keywords, the Web, and even its own programmers. Let's look at some of Google's lesser-known options.
------------------------------------------------------------------------------------------------------------
Syntax Search Tricks

Using a special syntax is a way to tell Google that you want to restrict your searches to certain elements or characteristics of Web pages. Google has a fairly complete list of its syntax elements at

www.google.com/help/operators.html

. Here are some advanced operators that can help narrow down your search results.

Intitle: at the beginning of a query word or phrase (intitle:"Three Blind Mice") restricts your search results to just the titles of Web pages.

Intext: does the opposite of intitle:, searching only the body text, ignoring titles, links, and so forth. Intext: is perfect when what you're searching for might commonly appear in URLs. If you're looking for the term HTML, for example, and you don't want to get results such as

www.mysite.com/index.html

, you can enter intext:html.
Link: lets you see which pages are linking to your Web page or to another page you're interested in. For example, try typing in

link:http://www.pcmag.com


Try using site: (which restricts results to top-level domains) with intitle: to find certain types of pages. For example, get scholarly pages about Mark Twain by searching for intitle:"Mark Twain"site:edu. Experiment with mixing various elements; you'll develop several strategies for finding the stuff you want more effectively. The site: command is very helpful as an alternative to the mediocre search engines built into many sites.

Swiss Army Google

Google has a number of services that can help you accomplish tasks you may never have thought to use Google for. For example, the new calculator feature

(www.google.com/help/features.html#calculator)

lets you do both math and a variety of conversions from the search box. For extra fun, try the query "Answer to life the universe and everything."

Let Google help you figure out whether you've got the right spelling—and the right word—for your search. Enter a misspelled word or phrase into the query box (try "thre blund mise") and Google may suggest a proper spelling. This doesn't always succeed; it works best when the word you're searching for can be found in a dictionary. Once you search for a properly spelled word, look at the results page, which repeats your query. (If you're searching for "three blind mice," underneath the search window will appear a statement such as Searched the web for "three blind mice.") You'll discover that you can click on each word in your search phrase and get a definition from a dictionary.

Suppose you want to contact someone and don't have his phone number handy. Google can help you with that, too. Just enter a name, city, and state. (The city is optional, but you must enter a state.) If a phone number matches the listing, you'll see it at the top of the search results along with a map link to the address. If you'd rather restrict your results, use rphonebook: for residential listings or bphonebook: for business listings. If you'd rather use a search form for business phone listings, try Yellow Search

(www.buzztoolbox.com/google/yellowsearch.shtml).


Extended Googling

Google offers several services that give you a head start in focusing your search. Google Groups

(http://groups.google.com)

indexes literally millions of messages from decades of discussion on Usenet. Google even helps you with your shopping via two tools: Froogle
CODE
(http://froogle.google.com),

which indexes products from online stores, and Google Catalogs
CODE
(http://catalogs.google.com),

which features products from more 6,000 paper catalogs in a searchable index. And this only scratches the surface. You can get a complete list of Google's tools and services at

www.google.com/options/index.html

You're probably used to using Google in your browser. But have you ever thought of using Google outside your browser?

Google Alert

(www.googlealert.com)

monitors your search terms and e-mails you information about new additions to Google's Web index. (Google Alert is not affiliated with Google; it uses Google's Web services API to perform its searches.) If you're more interested in news stories than general Web content, check out the beta version of Google News Alerts

(www.google.com/newsalerts).

This service (which is affiliated with Google) will monitor up to 50 news queries per e-mail address and send you information about news stories that match your query. (Hint: Use the intitle: and source: syntax elements with Google News to limit the number of alerts you get.)

Google on the telephone? Yup. This service is brought to you by the folks at Google Labs

(http://labs.google.com),

a place for experimental Google ideas and features (which may come and go, so what's there at this writing might not be there when you decide to check it out). With Google Voice Search

(http://labs1.google.com/gvs.html),

you dial the Voice Search phone number, speak your keywords, and then click on the indicated link. Every time you say a new search term, the results page will refresh with your new query (you must have JavaScript enabled for this to work). Remember, this service is still in an experimental phase, so don't expect 100 percent success.

In 2002, Google released the Google API (application programming interface), a way for programmers to access Google's search engine results without violating the Google Terms of Service. A lot of people have created useful (and occasionally not-so-useful but interesting) applications not available from Google itself, such as Google Alert. For many applications, you'll need an API key, which is available free from
CODE
www.google.com/apis

. See the figures for two more examples, and visit

www.pcmag.com/solutions

for more.

Thanks to its many different search properties, Google goes far beyond a regular search engine. Give the tricks in this article a try. You'll be amazed at how many different ways Google can improve your Internet searching.


Online Extra: More Google Tips


Here are a few more clever ways to tweak your Google searches.

Search Within a Timeframe

Daterange: (start date–end date). You can restrict your searches to pages that were indexed within a certain time period. Daterange: searches by when Google indexed a page, not when the page itself was created. This operator can help you ensure that results will have fresh content (by using recent dates), or you can use it to avoid a topic's current-news blizzard and concentrate only on older results. Daterange: is actually more useful if you go elsewhere to take advantage of it, because daterange: requires Julian dates, not standard Gregorian dates. You can find converters on the Web (such as

CODE
http://aa.usno.navy.mil/data/docs/JulianDate.html

excl.gif No Active Links, Read the Rules - Edit by Ninja excl.gif



), but an easier way is to do a Google daterange: search by filling in a form at

www.researchbuzz.com/toolbox/goofresh.shtml or www.faganfinder.com/engines/google.shtml

. If one special syntax element is good, two must be better, right? Sometimes. Though some operators can't be mixed (you can't use the link: operator with anything else) many can be, quickly narrowing your results to a less overwhelming number.

More Google API Applications

Staggernation.com offers three tools based on the Google API. The Google API Web Search by Host (GAWSH) lists the Web hosts of the results for a given query


(www.staggernation.com/gawsh/).

When you click on the triangle next to each host, you get a list of results for that host. The Google API Relation Browsing Outliner (GARBO) is a little more complicated: You enter a URL and choose whether you want pages that related to the URL or linked to the URL

(www.staggernation.com/garbo/).


Click on the triangle next to an URL to get a list of pages linked or related to that particular URL. CapeMail is an e-mail search application that allows you to send an e-mail to google@capeclear.com with the text of your query in the subject line and get the first ten results for that query back. Maybe it's not something you'd do every day, but if your cell phone does e-mail and doesn't do Web browsing, this is a very handy address to know.

Thursday, October 18, 2012

INDIA-CHINA WAR 50 YEARS LATER

INDIA-CHINA WAR 50 YEARS LATER

It is 50 years since the Chinese invasion of October 1962, but the scars remain. The Tribune revisits the traumatic war, with experts examining the causes, what went wrong and the lessons, in a series.

 
PART-I
Why India and China went to war in 1962
The scars of the 1962 war against China that resulted in a humiliating defeat for India still remain 50 years later. Starting today, The Tribune brings you a series of articles by experts on the genesis of the war, India’s political and military blunders and the lessons the country has learnt and should learn
Zorawar Daulet Sing
h
Indian historian John Lall once observed, "Perhaps nowhere else in the world has such a long frontier been unmistakably delineated by nature itself". How then, did India and China defy topographical odds to lock into an impasse that was ultimately tested on the battlefield?
PART-II
1962 WAR: Leaders failed india
There was no institutional mechanism for decision-making on national security. Indian soldiers fought bravely but were let down by unspeakably incompetent generals and the political leaders that had assigned them the commands for which they were unfit
Inder Malhotra
S
INCE the traumatic story of the brief but brutal border war with China is too well known, having been written in minutest details, and indeed is being retold extensively in the run up to its 50th anniversary there is no point repeating it here. Suffice it to say that whoever lived through it, as I did, hasn't forgotten it half a century later.
The Iron Man’s advice that went largely unheeded
O
N November 7, 1950 – twelve years before the Chinese attack -- the then Home Minister of India, Sardar Vallabhbhai Patel, wrote a 2,323-word letter to Jawaharlal Nehru, giving his assessment of the developments across the Himalayan frontier and cautioning Nehru about the imminent threat from China.
 
PART-III
No foresight, no planning saw defeat
Due to ideological, short-sighted and emotional reasons Chinese threats were either not accepted or under-played till Parliament and public opinion forced the government to adopt a military posture against China
General V P Malik (retd)
The India-China war in 1962 was independent India’s most traumatic and worst-ever security failure. The war has left an indelible impression on our history and psyche which impacts India-China bilateral relations. The resultant geographic surgery continues to fester in the form of the Line of Actual Control (LAC) till date. This October marks its 50th anniversary. It is an appropriate occasion to reflect on the strategic lessons from the war and our current politico-military status vis-a-vis China.
THE WAY AHEAD
India must match Chinese capability in the Himalayas
Gen VP Malik (retd) examines the future course of action.
A Chinese military garrison as seen across the Line of Actual Control in Ladakh
After three centuries, China is enjoying the shengshi — a golden era, an age of prosperity. In the next decade, it would become the world’s largest economy — a progress that also reflects the rise of China’s comprehensive national power. On the defence industrial front, China has displayed exceptional pragmatism, self-reliance and pride.
A Chinese military garrison as seen across the Line of Actual Control in Ladakh. While China has developed extensive infrastructure enabling rapid mass mobilisation, the Indian side is bogged down by huge difficulties in logistics. Tribune Photo: Mukesh Aggarwal
PART-IV
Sidelining army was a grave error
An air of unreality surrounded India’s policy processes at that time relating to the higher defence management. It is unclear whether the Indian Army was consulted on the military and strategic implications of Nehru’s Forward Policy
P.R.Chari
F
ifty years should be long enough to forget India’s humiliation in the Sino-Indian border conflict of 1962; but its traumatic memory still haunts the armed forces and informs the timidity of South Block in dealing with China. Hence, it is important to review the process of higher decision-making in the area of national security that evolved after Independence, but signally failed at that critical juncture. 

                               FOR MORE INFORMATION CLICK HERE

WELCOME

hello world im varun yadav a new blogger from mmu mullana , contact me at hostel 10 block A , room no. 120 ................................ get BACK TO YOU ALL SOON..........