Sunday, June 14, 2015

Clearing the confusion the reason behind Facebook Hacking

Standard


Some of the people out there often request me to Hack someones Facebook account or any social network's account. This post is for those who often ask me to Hack. **SORRY TO THOSE WHO KNOWS MUCH BETTER ABOUT THIS, I AM JUST HIGHLIGHTING ABOUT THIS POINT ** 

So Talking about Hacking- It is a way, it is a technique or a trick to bypass someone’s login panel or make access without any authorization or something. It means the breaching of an online security system. Please guys stop creating rumours about hacking. SOME of the people don't know what actually Hacking is! Trust me i don't know the H of hacking, all I want to say that i got only the meaning of Hacking and i know a FEW things about Hacking but NOT about all. Yes i'm really passionate about hacking but true to say I don't have that skill properly. I m here to let you guys know what is hacking or what is Facebook hacking. Actually Nowadays a Facebook Account can not be Hacked! By reading this line most of u wondering that facebook is still hacking so this line is not true. Yeah its true that nowadays people's Facebook accounts are being hacked and perhaps many accounts are being hacked at this moment somewhere! So how does it happen?
Basically nowadays everyone can be a hacker. And this type of hackers uses Phishing attack to grab somebody's facebook account's login credentials. so all they need a fake facebook login page and send that link to the victim and as he/she clicks that link and login to that fake facebook page with his/her facebook username and password, that hacker/phisher instantly catch that login credentials from his specific email which came from that victim! see it is that easy! It is an example of phishing attack. there are many other phishing trick out there to grab somebody's password but this example is quite famous. Most of the people have already beware about this and they know enough about this. Another way is Keylogging. Its a simple Software/tool that may installed in a computer or any other device that can be used to grab your keystrokes and when you are typing your password on the keyboard the keylogger tool can grab your password and store that password into its specific location or send it to any specific email remotely! and after that when you are gone the hacker can easily open that file of Keylogger and find your all keystrokes including your passwords,email and pin number! One more trick is guessing. I think that I don't need to say anything about this.You guys know about this very well.

So these are some common reason behind hacking/stealing passwords.
Except these a Facebook account can NOT be hacked because Facebook Inc has improved their security system very strongly and they are still improving their system everyday and as far as i know that's why Facebook is the most famous Social Network in the entire world! Facebook has a lot of brilliant engineers to give much security codings. Now if anybody can break into their security system he must go to Facebook HQ for a job with a huge amount of salary.






Friday, June 12, 2015

WhatsApp can be Hacked by the Loophole!

Standard



Smartphone messaging service WhatsApp was acquired by the corporate giant Facebook for over $20 billion last year, and it seems that news of a potential hack has reportedly been found that could undermine all of their forecasted profits.
Prone to hijacking without unlocking or even knowing your device’s password, this hack is making its hundreds of millions of users vulnerable to, not just hackers, but even small children.



This trick lets any random stranger to get effectively control over your WhatsApp account. The attacker needs nothing more than the phone number of the target person, and is able to access to the target’s mobile phone for a few seconds, even if it is locked.



This is not even a loophole or vulnerability in WhatsApp… rather, it is simply the way WhatsApp and its account setup mechanism works.


NOTE: We aren’t encouraging users to hack others WhatsApp account, but the purpose of publishing this article is to warn and remind our readers that you should be extra careful to whom you lend your mobile phone…. and not to leave it unattended for longer durations than necessary, particularly with strangers around.


This trick allows the non-technical-hacker to get full control over the victim’s WhatsApp account in no time at all, and the most surprising part is that it works on ALL mobile platforms, including Android, Windows and Apple’s iOS.


Below are the clear steps to hack the WhatsApp account on any Smartphones:

Step 1: Begin by setting up a WhatsApp account on a new mobile phone using the phone number of your target.


Step 2: During the setup process, WhatsApp will call the target’s phone number and will provide a PIN that needs to be entered for the authentication of the account.

Step 3: If you already have access to the victim’s phone, you can just answer the phone call and grab the code with no effort at all. Even if the victim has a lock screen enabled on the phone, you can receive the phone call to get the “secret” PIN.



Step 4: Profit?



Think your fancy iPhone is “safer” than other models? Think again.



Things get even worse on the iPhone if the users have configured their iPhones with Siri authentication for the lock screen, because all their contact details are available for access via Siri’s settings, effectively giving EVERYONE access to their phone number, bypassing their PIN.



Thus, if you try to steal the account information of their WhatsApp, without even having the phone number of the target user, you can just call the number from the target’s phone using Siri.



Just check the given video demonstration that explains the simple trick of taking control of anyone’s WhatsApp account.




Thursday, June 11, 2015

Meet Android M

Standard


The Android M developer preview was recently launched at Google I/O 2015 in San Francisco. At the conference, Google senior VP of Products Sundar Pichai said the company had "gone back to basics" with this new version of Android. While Android Lollipop introduced a new visual aesthetic, Android M brings some much-needed stability and usability improvements which might not be as eye-catching, but may prove to be significant additions for a while to come.

1. App permissions



First up, app permissions. As had previously been speculated, app permissions have been overhauled in Android M, with users now being able to choose to accept or deny individual permissions as they see fit. Permissions have also been simplified.

Permissions will now be requested the first time you try to use a feature, not at the point of installation. "You don't have to agree to permissions that don't make sense to you," Burke said, and used WhatsApp to give an example of how this works.

If you want to record a voice message, WhatsApp will prompt you with a one-time request for permission to use your mic: if you still wish to give it access and record the message, you can, but you don't have to. Android M is giving users greater control of the information apps can access, and this is a truly positive step forward for Android.

You can modify the permissions granted to apps at a later date in your Settings, or you can view permissions by type and see which apps have that permission granted. It's all about giving the user complete control over their Android.


2. Web experience



Google has been exploring trends in the way web content is consumed to provide a better user-experience when interacting with websites and apps. "Chrome Custom Tabs is a new feature that gives developers a way to harness all of Chrome's capabilities, while still keeping control of the look and feel of the experience," said Burke.

Chrome Custom Tabs will allow apps to open a customized Chrome window on top of the active app, instead of launching the Chrome app separately. This will provide a faster and more intuitive user-experience when navigating between apps and the web.

Chrome Custom Tabs supports automatic sign-in, saved passwords, autofill, and multi-process security to assist the integration of the app and web experience. So, for example, a Pinterest custom tab will have a Pinterest share button embedded in it, can include custom overflow menu options and doesn't require the Pinterest developers to build their own web browser.Android M will introduce standardized fingerprint support.

3. Fingerprint support



Google will "standardize support" for fingerprint scanners on phones running Android M. The new functionality will allow fingerprint scanners to be used not only to unlock phones, but to make purchases shopping in real-life or within Play Store apps.

Of course, your device will need a hardware fingerprint scanner to begin with, but with Google's full support, expect to see these appear on many more devices in the future.

4. Mobile payments




Android Pay is Google's new mobile payments system designed to make the checkout process easier and faster. Google is aiming to provide "simplicity, security, and choice," with Android Pay, allowing you to use your existing credit cards to pay for products in more than 700,000 stores in the US.

Compatible with any device housing NFC capabilities (and running 4.4 KitKat or above), the Android Pay platform is being supported by American Express, Visa, Mastercard, and Discover, as well as carriers such as AT&T, Verizon and T-Mobile. Google's response to Apple pay is here.


5. App links


"When a user selects a weblink from somewhere, Android doesn't know whether to show it in a web-browser, or some other app that claims support for the link," this was the problem facing the Google developers before Android M.

You may be familiar with the "Open with" dialogue box which appears when you try to open a link within an app on Android. You might be asked if you want to open a link with YouTube, or with Chrome, for example.

App links are being changed in M so that Android has a greater awareness of which apps can open content directly, instead of stopping users every time with the dialog box. If you tap a Twitter link in an email, for example, the Twitter app will open automatically instead of prompting you to ask if you want to use Twitter to view it.

This is almost a blink-and-you'll-miss-it improvement, but it's representative of Google's attention to detail: Android M is probably going to feel more usable without the user ever understanding why.

6. Power and charging



Android M makes use of a new function known as Doze to improve device standby time. By using motion detectors, Android will recognize when devices haven’t been interacted with for a while, such as when a person is asleep or a device has been left on a table, to reduce background processes.

Burke said that Google tested two Nexus 9 devices, one running Lollipop and one running the Android M preview, and learned that M will provide up to two-times longer standby time. Even in Doze mode, your Android can still start alarms or notify you of priority notifications.

Android M also supports USB Type-C which provides faster charging, and lets users charge other devices with their phone.Doze is going to bring up to two-times longer standby time compared to Android.

Android M release date


The Android M Developer Preview is available now for Nexus 5, Nexus 6, Nexus 9 and Nexus Player, and the final version is due to launch in Q3, 2015.

What else is in new in Android M?

Auto Backup and Restore for Apps


Possibly the most interesting aspect of Android M not discussed in Google’s I/O keynote speech was Android Auto Backup and Restore for Apps. This feature will be used in conjunction with Google Drive to automatically backup app data and settings with a file size of 25 MB or less.

These backups occur no more than once per day, and run only when the device is idle and connected to Wi-Fi and power. The uploaded data does not count towards your Google Drive storage quota, and is encrypted.

If you lose your device or delete the app, your previous progress will be restored the next time you install it, and it even works with apps which are side-loaded or accessed through a third-party app store.

New app drawer



One of the most immediately noticeable visual changes to Android M is the new app drawer. This now scrolls vertically instead of horizontally, and is held against a white background, rather than a muted shade of your homepage wallpaper. Across the top of the menu you will see your four most recently used apps, and down the left-hand side are the letters of the alphabet.


Android M RAM manager


Google has introduced a new RAM manager to Android M with the aim of providing users with more accurate and comprehensible information regarding the maximum and average RAM usage of apps.

The menu can be found in Settings > Apps > Options (three dots button) > Advanced > Memory. Though it's a little hard to navigate to, the page offers a far clearer insight into app demands, and the overall effect they will have on your device.

With a reading of an individual app's RAM consumption, as well as how often it is running in the background, users will be able to better determine which apps should be removed in endless bid to increase device performance and battery life.

Android M even includes a simple bar at the top of the page displaying the current performance status of a person's handset; if it says "good performance", you're likely running an efficient set of apps.The Android M logo.

Adoptable Storage Devices


Though Google has in the past tried to step away from external storage use (the reason why none of its Nexus devices house a microSD card slot), it appears that Android M is striking a compromise.

Adoptable Storage Devices is Google's new storage feature which essentially takes an external storage source (such as an SD card or USB drive) and formats it like an internal storage space. This means that app and personal data can be moved freely between a devices internal storage and its "adopted" storage source.

Adopted storage devices are wrapped in a layer of encryption to soothe security concerns and both microSD cards and USB OTG drives are currently supported.

Dark Theme



Buried within the Android M settings is a "Dark theme" option which transforms the menu background to a dark grey color rather than the normal pale shade. Currently this only affects the settings menu, not the app drawer, and its function is purely cosmetic. Still, it looks nice on our Nexus 6 and we hope it gets developed further.


Google Now


Google Now has been improved upon once again in Android M. Focusing on three key ares: being aware of different contexts, providing answers and helping you take action, Google Now is now smarter than ever.

Google Now's context awareness understand over 100 million different places, so when you ask ''How far is it to there?'' Google Now know exactly which ''there'' you're referring to. This awareness is compounded by Google's Knowledge Graph, which understands one billion different entities, from sports teams to gas stations, TV shows to recipes.


Google Now is also rolling out a pilot program called ''Now on Tap'' with 100 popular apps. Now on Tap provides Google Now-like content right where you are, without having to leave the app you're in. So if you're in Spotify and say ''Ok Google, what is his real name?'' Now on Tap will know you're talking about the musician you're listening to and provide search results right there an then.

The same goes for content in emails. If someone asks you a question about a restaurant and to not forget something on your way home, Now on Tap can automatically pop up a restaurant card with Maps info, Yelp, OpenTable and the dialer, as well as offer to set a reminder for whatever it was you were supposed to not forget.

Google Chrome


Chrome is also leaner and faster than ever before. Initially revamped with Android One devices in mind, where stable and speedy internet connections are not always possible, Chrome's new optimizations are set to arrive for everyone.

Chrome is now aware of network strength and can modify what you see as a result. For example, if your connection is bad, you might see colored squares rather than preview images in Search results. Optimized web pages will load four times faster and use 80 percent fewer bytes. You'll also see a memory usage reduction of up to 80 MB. Chrome will also support offline mode.


Google Photos


As expected, Google pulled the wraps off its new Google Photos service. Previously a part of Google+, Google Photos is now standalone photo and video storage and sharing service that provides unlimited free storage for up to 16 MP photos and 1080p video. That is seriously impressive.

The Google Photos service stores high-quality compressed versions of your photos and movies but doesn't store anything on your device, so you can search through thousands of photos at high speed and without bogging your device down with gigabytes of photos.


Popular features like Auto-Awesome and Stories are a key highlight, accessible through a new Assistant feature, which will automatically suggest creative uses of your images and footage. Through simple pinch gestures you can see tiled images for particular days, weeks, months or even years and then zoom right back in at any point you like.

Google Photos is also powerful for search, as you'd expect. You can search by People, Places, Things and Types, which are all automatically created, and you can drill down in each of those categories to see, for example, every picture you have of a particular person, all without ever tagging them.

Sharing is also a breeze. You don't even need you contacts to have the Google Photos app. You can simply share a link that they can view in Chrome. If they are logged in they can easily download an entire album in seconds.

Tuesday, April 21, 2015

Browse free internet using internet.org

Standard


Thanx to Mr Mark Zuckerberg and his team as well as to our Government for giving us the Internet.org service in Bangladesh. From today that means from 21st of April anyone can access into the internet free of cost. This service will be available to another countries very soon and already this service is available in many countries.


Lot of people does not know what is actually Internet.org is… so Internet.org is a Facebook-led initiative bringing together technology leaders, nonprofits and local communities to connect the two thirds of the world that doesn’t have internet access.Internet.org is making the internet available to every person on earth is a goal too large and too important for any one company, group or government to solve alone. Everyone participating in Internet.org has come together to meet this challenge because they believe in the power of a connected world.

>> For using the free internet via Internet.org, a user has to download the internet.org app in his/her phone and those who doesn’t have the app he can easily visit www.internet.org site to use free internet. so it is really easy to use <<

internet.org app download link (apk file)---

Google Play: http://is.gd/pbKTSU

mirror link: http://is.gd/TcLM96

Shared link: https://shared.com/ze2lql6kjy?s=l 

From Today Internet.org is available in Bangladesh and now anyone can access Facebook,Facebook Messenger,Whatsapp,Accu Weather, BBC News,Facts for Life,Newshunt,Social blood,USPN, cricinfo,Translator,Bing search,OLX,Wikipedia,Internet Basics,WikiHow and many other according to our country’s background free of cost!But sad thing is we can’t access to Google.com. So whatever it’s a very new beginning in connecting with the world in a very new way.




Sunday, March 22, 2015

Be Careful from KeyLogger!

Standard



Know how it works:

Knowing how it works will help you make a better decision. A keylogger is a little piece of software that normally stays hidden in your system and collects information on the keys you press on your keyboard. This coupled with its ability to match these keystrokes with the application for which they are being pressed, make a keylogger an extremely dangerous hacking tool. As normally it resides in a system hidden, it can steal your information without you even noticing anything.

Use good quality anti-keylogger software:

Anti-virus anti-malware software are a requirement for every user. But they may not be able to detect and remove keylogger software. For this, you should use specific anti-keylogger software. In fact, according to a report almost all anti-virus software failed to detect a keylogger in a controlled lab test. Only a specifically tailored anti-keylogger can make sure that your information stays safe and secure.


Use secure communication channels:

As important and useful the worldwide web is, it is as much dangerous because of some people who use it for their nefarious designs. Some steal your information while others just like to bog down a system with excessive virus attacks. Make sure that you are using only secure websites for your communication, like emails, instant messaging and video calls etc. It is these unprotected sites that can spread these keylogger software easily. Avoid them at all costs for your communication needs.


Be on alert:

The best possible way to protect your computer and your information is to be on alert. It is almost always when you do not take care and follow security precautions that you fall victim to these tricks and get your system infected with viruses. Putting your information at risk is not a good idea. But thinking that anti-virus software, or anti-keylogger software for that matter, will keep your system 100% secure is a mistake. If you are not on your guard, anyone can access your system physically and compromise your security wall, thus eliminating the need of tackling anti-virus over the internet. You also need to know which sites you are visiting and whether there is any Google or other security software advisory on that site. You should also avoid clicking on suspicious links, particularly those appearing in your email, asking for your private information.

Stay updated:

You should also make sure that your system is updated with the latest system and anti-virus software security patches. This will ensure that your system is protected and can withstand attacks over the internet. In any case, you are the one who needs to be on guard more than your system.