How to Create and Host the personal php website on github

Hosting and maintaining the website and server is very difficult, as daily lots of zero day vulnerability discovered which may harm the server.Hosting company also provide the server resources but charges are too high.Some hosting company provide static website hosting for free like Google App Engine,Github etc...Now-a-days google started the support for dynamic website(PHP).



Steps To Host The Dynamic Website On Github 

  1. Create the Account on Free hosting website like 000webhost.com
  2. Verify the Created Account.
  3. Now Log-in and Go to Control Panel.
  4. Go to File Manager and Deploy the Content of website on Public html directory.
  5. Now visit your website by entering the Domain name on browser URL to check the status of site.
  6. Now download and install the HTTrack website copier.
  7. Open the HTTrack and click on next
  8. Provide any name to project In Name field
  9. Provide the directory to project
  10. Submit the URL of website in web address field
  11. Now Create the account on Github and create a new repository.Repository name must end with .github.io
  12. Make the repository Public
  13. Click the green "Set up in Desktop" button.It will start download Github.exe
  14. Now open the GitHub Desktop app ,Click on "Clone" to Save the project files in Computer.
  15. Now Paste the website data in file to your Clone Project folder
  16. Now again launch the "Github for Windows" application
  17. Hit the Sync button and after synchronize Click on "Commit to master" button 
  18. Done
Follow the above steps will allow the user to host php website on github.
Post a comment for qwery or issue in above tutorial

How To Disable Data Logging In Windows 10








There's been plenty of commotion over W10's privacy terms. i am certain these strategies will change/improve at any time, however here's a guide that ought to hopefully provide you with a comparatively a lot of personal, safe experience, but at the prospect of not having the ability to relish a number of W10's options.


Before/During Installation


  1. Do not use Express Settings. Hit customise, and check that everything is turned off.
  2. Just use a local account with Windows 10(Very Important).


After Installation


1. Head to Settings >> Privacy, and disable everything, unless there are some stuff you actually need.


2. While among the Privacy page, head to Feedback, choose never within the initial box, and Basic within the second box.


3. Head to Settings >> Update and Security >> Advanced options & select how updates are delivered, and turn off the first switch Off.


4. Disable Cortana by clicking the Search bar/icon.


5. Disable internet search in Search by heading to Settings, and turning off Search online & include web results.


6. Change the name of your computer by going to start (or hit the Windows key), typing about pc, and clicking Rename pc.






Other Settings

1. Open up the Command prompt by launching cmd as an administrator, and enter the following:

sc delete DiagTrack

sc delete dmwappushservice

echo "" > C:\ProgramData\Microsoft\Diagnosis\ETLLogs\AutoLogger\AutoLogger-Diagtrack-Listener.etl

2. Open up the group Policy Editor by launching gpedit.msc as an administrator. go through computer Configuration >> administrative Templates >> Windows components >> data collection and Preview Builds. Double click telemetry, hit Disabled, then apply.


NOTE: This solely actually works within the Enterprise edition, however the last step provides a good enough workaround for pro users.


3. While still within the group Policy Editor, go through computer Configuration >> administrative Templates >> Windows components >> OneDrive, double click prevent the usage of OneDrive for file storage, hit Enabled, then apply.


4. While still within the group Policy Editor, go through computer Configuration >> administrative Templates >> Windows components >> Windows Defender, double click turn off Windows Defender, hit Enabled, then apply.


5. Open up the registry Editor by launching regedit as an administrator. go through HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\DataCollection, select AllowTelemetry, change its value to zero, then apply.


6. First, download the Take ownership tweak and enable it. Then, head to the Hosts File by going through C:\\Windows\\System32\\Drivers\\Etc, take ownership of the hosts file(By right click & select take ownership), and add all of the IPs from this page into the file.

New vulnerability discovered in android smartphone can crash|silent the phone in single click

Security researchers at Trend Micro found a new vulnerability in android smartphone which can silent the android smartphone,make the smartphone useless to perform the basic function like touch,mute the smartphone, endless reboot,no ringtone, message tone,including to make or receive calls.They developed an android application and website,as and when user visit the website, smartphone fails to perform the basic function.As per the researchers,more then 55% of device is vulnerable to this attack.This vulnerability affect the device running from android 4.3 jelly bean to android lollipop 5.1 lollipop.

Root Cause of the Vulnerability


The vulnerability actually resides in the mediaserver service used by Android to index media files located on the Android phone.


"[mediaserver] service cannot correctly process a malformed video file using the Matroska container (usually with the .mkv extension)," Trend Micro researcher Wish Wu wrote. "When the process opens a malformed MKV file, the service may crash (and with it, the rest of the operating system)."

How to crash the smartphone using media server service vulnerability


  1. Download and install the Google chrome in android smartphone.
  2. Visit the website Click Here
  3. Boom smartphone is crashed,user cannot make or receive calls etc...

Note : This vulnerability only works in android 4.3 or later device having chrome browser.

How to Fix Vulnerability

Don't install the android application from unknown sources,if your device affected with the vulnerability then put the smartphone in recovery mode and clear the cache,data,dalvik of smartphone and reset all the setting of android smartphone.

Researchers also published the code to perform the vulnerability which is given below:

<html>
<body onload="setInterval('Crash()', 5000);">
<video id="crash" src="crash.mkv" controls="controls">Browser Video tag
</video>
<script language="javascript">
function Crash(){
var crash=document.getElementById("crash");
crash.load();
crash.play();
}
</script>
</body>
</html>

Researchers also published the video as Proof of concept,which is attached below:



A new "Google Drive phishing" web page campaign Discovered

Elastica Cloud Threat Labs recently discovered a brand new Google Drive phishing campaign during which An attacker deployed phishing sites on Google Drive. This is often not the first time Google Drive has been used for phishing. Last year, the security firm encountered an analogous style of Google Drive phishing attack.”

Once again phishers exploited Google’s name running a phishing campaign aimed to steal user Google credentials and access to the multiple services offered by the google.

The new phishing campaign was discovered by the safety research worker Aditya K. Sood from Elastica Cloud Threat Labs. Conjointly during this case, phishers used phishing pages hosted on Google Drive that seem similar a Google log-in page and that was served over HTTPs. The utilization of HTTPs makes the web pages a lot of more realistic and genuine and less suspicious to victims.




This campaign has several similarities with a campaign discovered by specialists at Symantec in March 2014, the malicious email's sent by the scammers presents an equivalent subject “Document,”and thereafter the taken credentials uploded on a third-party server.

The new campaign appeared to the experts as the evolution of the previous one, because the improved obfuscation techniques used by attackers to hide the phishing pages. The phishers used a JavaScript cryptography mechanism to encrypt the code within the phishing pages. The attack theme is kind of easy, victims receive the imitative email from a Gmail addresses that’s likely been compromised,They’re requested to click on the embedded link,redirect to a page hosted in an Google Drive folder. The phishing page sounds like a Google log-in type, then if the user enters his credentials they're transferred in clear to third party web server whereas the user is redirected to a PDF file hosted on another server so as to avoid raising suspicion .


In this phishing campaign,attackers used the stealthy techniques to protect and guard the phishing website code. Using of Google Drive for hosting phishing web page content provides the flexibility to use the established trust users have with Google. For instance, during this campaign, the attacker used Gmail to distribute emails containing links to unauthorized web content hosted on Google Drive.” states the post.

The phishers were primarily curious about siphon Google credentials of their victims as explained within the post.

“In an endeavor to maximise advantages, attackers targeted Google users specifically thus on gain access to the multitude of services related to those google account, since Google uses Single sign up(SSO) procedures,” continues the post.

The specialists detected that phishing emails were able to bypass the Google’s detection system, b'coz this mail are sent from the gmail account and the embedded link points to a legitimate googledrive.com domain.

Play GTA V & Any Other Games In Your Browser.





If your PC doesn’t have the muscle to run a game like GTA V at any approaching acceptable levels of quality, you would possibly not want any robust hardware within the 1st place. The developer of AN app referred to as Instant webcam has custom-made the underlying tools & is able to stream a game to any browser, and it works “much satisfactorily than it ought to.”

The program is named jsmpeg-vnc, and it’s accessible at no cost and it’s open source. this is often a puny Windows utility written in C that captures the screen at 60fps & encodes it into an MPEG1 video stream. Then you simply got to use the browser on another device on your network, sort of a PC or phone, to connect to the stream over WebSockets. The machine receiving the stream solely has to be powerful enough to decipher the stream in JavaScript (using jsmpeg).

This program additionally takes your mouse and keyboard inputs from the receiving device and sends them back over the network to the remote machine. Thus, you'll be able to use your desktop computer and play desktop games in your browser with marginal lag. 

The game streaming implementation here looks terribly similar in terms to Nvidia Game Streaming    technology, that permits you to stream games from a computer with a GeForce GPU to shield devices.

Jsmpeg-vnc will, however, work on any device. The binaries and source code are on GitHub immediately if you would like to do it out.

Checkout the Demo for jsmpeg-vnc



How to hack android smartphone remotely by sending simple text messsage.

As per the  Zimperium, a cybersecurity company that specializes in mobile devices,discovered a vulnerability in the android smartphone.This is the biggest vulnerability in android smartphone as it affect almost all the version of android device.



How to hack the android smartphone using vulnerability?


Zimperium security researchers found the vulnerability in the incoming text messages analyse process.when android smartphone receive the picture via text message in certain manner and boom... Your smartphone is hacked !!!! Further security researcher has also developed the exploit which allow to remote control the vulnerable device.Exploit allow researchers to Install the application,wipe the device,record location,access the microphone,camera and many more...

Where the vulnerability actually reside in android smartphone?

The above vulnerability reside in the "Stagefright" a main android components.This is used in multimedia playback library of android.This library is used to process,record and play the multimedia files.

How many device get affected due to stagefright?

The vulnerability not only works in the older version of android Os like android 2.2,2.3 and 4.0 but it also works in android lollipop 5.0,5.1.1 so almost all the android device is vulnerable to the stagefright.

When the stagefright vulnerability get fixed?

Zimperium submit the vulnerability along with the patches dated 9th April,2015 and within 48 hours google fix the binary and release the patches.However still more then 95% of device is vulnerable to the above attack.As per CNN report,Google has patched the code and sent it to device manufacturers, but devices require over-the-air updates from companies such as Samsung or Motorola to update their customers' phones.Zimperium security researchers also explain vulnerability in Black Hat security conference in Las Vegas on on August 5 and DEF CON 23 on August 7

How to find your Apple Watch UDID




It’s comparatively simple to search out your iPhone or iPad’s UDID, as a result of you'll be able to do therefore directly from the outline page in iTunes. however what concerning the Apple Watch?

Since the Apple Watch has no outline page in iTunes, you’ll got to use Xcode so as to search out the Apple Watch UDID. during this post, we’ll show you ways to try and do simply that.

Apple Watch UDID

Note: Your Apple Watch should be paired to your iPhone, and your iPhone should be connected to your mackintosh via USB.

Step 1: Download Xcode from the mackintosh App Store

Step 2: Launch Xcode

Step 3: Click Window → Devices within the menu bar

Step 4: Click on your iPhone within the Devices aspect bar, and you must see your Apple Watch info below the Paired Watch data heading. Your UDID are going to be listed next to the identifier field. you\'ll be able to merely right-click on the UDID to copy it to your clipboard.

Why does one want your Apple Watch UDID? There is also many reasons. I in person required it to achieve access to a prerelease app, because it are often used for access provisioning.

How to put the android smartphone into recovery mode

Following ways to put the smartphone into recovery mode:


  • Using Hardware buttons
  • Using ADB (Android Debug Bridge)
  • Using QuickBoot App

 Hardware buttons

  • Switch off your Smartphone first
  • Switch it back on start pressing either the Volume UP or Volume Down button a couple of times to make your phone boot into recovery mode
  • Once you’re in recovery mode. Use Volume buttons to navigate Up and Down between options and Power button to select an option in recovery.


ADB (Android Debug Bridge)

First off, DOWNLOAD ADB FILES →
  • Extract the file (ADB files.zip) you downloaded from the link above to a separate folder on your computer
  • Prepare your phone
  • Enable developer options: Go to your phone’s Settings » select About phone » Scroll to the bottom and tap on “Build number” seven times to enable developer options
  • Enable USB Debugging: Open phone’s Settings » select Developer options » Tick the “USB debugging” checkbox (under Debugging section)
  • Connect your phone to PC with a USB cable and if/when a pop-up screen shows up on Phone asking you to ‘Allow USB debugging?‘ for the computer, make sure you tick the checkbox and tap OK
  • Open the folder where you extracted the files and double-click/run the ‘Boot into Recovery Mode.bat‘ file to reboot your device into recovery mode
  • └ If the script shows any error than that means either your device is not connected or you don’t have proper driver for your device installed on your PC.

Quick Boot (Reboot) APP

  • Install the Quick Boot (Reboot) app from Play Store on your Xperia U  |  Play store link →
  • Open the app and grant Root Access
  • Select ‘Recovery‘ from the list of options and it’ll boot your device into recovery mode

And make sure you’ve proper drivers installed for your device.
    FYI, the ‘Boot into Recovery Mode.bat‘ script file that we used above to boot your device into recovery mode.


    ROOT ACCESS REQUIRED

Hacking-Team Used Security Researchers Source Code in Their Surveillance Product.








A security developer has taken offence at Italian malware developer Hacking Team once discovering that his open source exploit tools were enclosed in android surveillance software package sold  to governments round the world.

Collin Mulliner, well-known in security circles for exposing vulnerabilities in mobile devices, revealed in a journal post that tries to line the record straight. To wit: his tools—which among different things surreptitiously capture conversations and different sounds of infected android phones—were used without permission or notice by Hacking Team. He learned regarding the utilization solely once the breach of Hacking Team computers, that resulted during a 400-gigabyte leak of confidential company documents, as well as these e-mails showing company engineers discussing Mulliner's tools.

In Tuesday's post, Mulliner wrote:

I\'m pretty angry and unhappy to visualize my open source tools being employed by Hacking Team to create product to spy on activists. Even worse is that the indisputable fact that because of the lazy method they managed their source repository less informed  folks may get the concept that I developed components of their tools for them. simply to clear: I didn't write any of these tools for Hacking Team.

For the longer term i'll use a license for all my software package that excludes use for this type of purpose. I actually have no clue however however this license would appear as if thus if anybody incorporates a hint regarding pre existing open source licenses that exclude this type of usage please drop me an email.

Obviously Hacking Team additionally used different open source software package like Cuckoo Sandbox. I hope everyone goes to trust future license to stop this type of usage. i am not a professional person however i'd have an interest in what action at law one might take if their package license excluded the utilization case of Hacking Team.


Mulliner aforementioned he received an e-mail following the info dump from somebody WHO formed the mistaken impression Mulliner designed the android tools with Hacking Team in mind. He aforementioned the mix up is apprehensible once reading through Hacking Team source code, that in conjunction with Mulliner's android Dynamic Binary Instrumentation tool, includes his name, website, and e-mail address. It would not be shocking if Mulliner's contributions type solely a part of the open source package collapsible in to Hacking Team merchandise, that leaked sales invoices show were sold  to restrictive governments in Sudan, Ethiopia, Egypt & somewhere else.

NVIDIA Pascal GPU To Feature 17 Billion Transistors and 32 GB HBM2 VRAM - arrives in early 2016.




NVIDIA are introducing their next generation Pascal GPU in 2016 which can introduce many new and key technologies to the green team. The Pascal GPU are the successor to the present generation Maxwell GPU and from the appearance of it, it's about to be a beast of a chip. that includes the most recent HBM2 and 16nm FinFET based mostly styles, Pascal GPUs can leverage NVIDIA’s dominance in each the end user & corp. world.


NVIDIA Pascal GPU may Feature seventeen Billion Transistors, nearly double The Transistors of Fiji
In an exclusive report printed by Fudzilla, the website reveals that NVIDIA’s next generation Pascal GPU can feature seventeen billion transistors crammed within its core. Currently, the flagship GM200 core found on the GeForce GTX Titan X comes with 8.0 Billion transistors whereas the contender, the Radeon R9 Fury X incorporates a total of 8.9 Billion transistors within its Fiji GPU. The seventeen Billion transistors on the Pascal GPU ar double the transistors found on the GM200 Maxwell and therefore the Fiji XT GPU core that is virtually insane. Pascal is supposed to be NVIDIA’s next high performance, cipher centered graphics design which is able to be found on all market segments that may embrace GeForce, Quadro and even Tesla. In accordance to TSMC’s 16nm process node, NVIDIA’s Pascal GPU won't solely feature the most effective performance in graphics however additionally the foremost power economical design ever created by a GPU manufacturer.

It was discovered a number of days past that NVIDIA’s Pascal GP100 chip has already been taped out on TSMC’s 16nm FinFET method, last month. this suggests that we will see a launch of those chips as early as Q2 2016. providing the electronic transistor count is correct, we will expect a progressive performance increase from Pascal across the vary of graphics cards that may be introduced.
TSMC’s 16FF+ (FinFET Plus) technology will offer on top of sixty five percent higher speed, around two times the density, or 70 % less power than its 28HPM technology. comparison with 20SoC technology, 16FF+ provides additional 40% higher speed and 60% power saving. By investing the expertise of 20SoC technology, TSMC 16FF+ shares identical metal backend method so as to quickly improve yield and demonstrate process maturity for time-to-market price.


The seventeen Billion transistors are an insane quantity however what’s a lot of insane is that the amount of VRAM that's about to be featured on the new cards. With HBM2, NVIDIA gets the leverage to feature much more memory than what’s presently allotted on HBM1 cards (4 GB HBM on Fury X, Fury, Nano, Fury X2). With HBM2, NVIDIA gets access to a lot of denser chips that may lead to cards with 16 GB and up to 32 GB of HBM memory across a vast 4096bit memory interface which is able to dominate succeeding high-resolution 4K and 8K game panels.Although they will ought to wait a bit bit longer due to AMD’s priority access to HBM2 with SK Hynix, the manufacturers of HBM. With 8Gb per DRAM die and 2 Gbps speed per pin, we have a tendency to get more or less 256 GB/s transmission per HBM2 stack. With four stacks in total, we are going to get 1 TB/s transmission on NVIDIA’s GP100 flagship Pascal that is double compared to the 512 GB/s on AMD’s Fiji cards and thrice that of the 980 Ti’s 334GB/s.

The Pascal GPU would additionally introduce NVLINK that is that the next generation Unified computer memory link with gen 2.0 Cache coherency options and 5 – 12 times the transmission rate of an everyday PCIe connection. this can solve several of the transmission flow problems that top performance GPUs presently face. one among the most recent things we have a tendency to learned regarding NVLINK is that it'll permit many GPUs to be connected in parallel, whether or not in SLI for gaming or for work usage. Jen-Hsun specifically mentioned that rather than four cards, users are ready to use eight GPUs in their PCs for gmae and work use.




With Pascal GPU, NVIDIA can come back to the HPC market with new Tesla product. Maxwell, though nice altogether regards was lacks necessary FP64 hardware and targeted solely on FP32 performance. This meant that the chip was about to be from HPC markets whereas NVIDIA offered their year previous kepler cards because of their solely Tesla based choices. Pascal won't solely improve FP64 performance however additionally feature mixed preciseness that permits NVIDIA cards to cipher at 16-bit at double the accuracy of FP32. this suggests that the cards can change 3 tiers of cipher at FP16, FP32 and FP64. NVIDIA’s way future volta GPU can additional leverage the cipher design because it is already planned to be a part of the SUMMIT and Sierra super computers that feature over 150 PetaFlops of compute performance and launch in 2017 that indicates the launch of Volta simply a year later Pascal for the HPC market.

How To Hack Android Smartphone Using Leaked Advance Android Hacking Tool "RCS Android"

Since the leak of Hacking Team hack, a day in security space are inundated with news regarding some vulnerability, exploit, etc. etc., and still additional news area unit however to come back out.
Today it's time for android and for a replacement Remote Access Trojan (RAT) that emerged from the Hacking Team leak.

Trend small researchers discovered this new RAT referred to as RCSAndroid and same that's “one of the foremost professionally developed and sophisticated” piece of malware that they have seen for Android, until the moment.
This RAT it's thus evolved and tough to require out, that compromised phones can’t be cleaned without having root privileges in the android smartphone, and Trend small advises that it'd be higher for smartphone manufacturer to assist and re-flash the phones.


Key Features Of RCS Android Malware are


  • Capture screenshots using the “screencap” command and framebuffer direct reading
  • Monitor clipboard content
  • Collect passwords for Wi-Fi networks and online accounts, including Skype, Facebook, Twitter, Google etc
  • Record using the microphone
  • Collect SMS, MMS, and Gmail messages
  • Record location
  • Gather device information
  • Capture photos using the front and back cameras
  • Collect contacts and decode messages from IM accounts, including Facebook Messenger, WhatsApp, Skype, Viber, Line, WeChat, Hangouts, Telegram, and BlackBerry Messenger.
  • Capture real-time voice calls in any network or app by hooking into the “mediaserver” system service

Once RCSAndroid put in android smartphone, it starts operating like a bomb in smartphone, deploying multiple and dangerous exploits, using several techniques to infect the devices. once the code was analyzed Tread small found:

1.Penetration solutions, ways that to induce within the device, either via SMS/email or a legitimate app
2.low-level native code, advanced exploits and spy tools on the far side the Android’s security framework
3.High-level Java agent – the app’s malicious APK
4.Command-and-control (C&C) servers, accustomed remotely send/receive malicious commands

How RCSAndroid hacking tool infects a Target?


RCSAndroid uses two different methods to infect targeted Android devices.

1.Hacking Team sending malicious RCS Android apk in android smartphone via text and email message using vulnerability in the default browser of android 4.0 Ice Cream to 4.3 Jelly Bean,allowing the attacker to gain root privileges

2. The company used backdoor apps available on the official Google Play Store to take advantage of a local privilege escalation bug to root the device and install the RCSAndroid agent.

How to get protect the android smartphone from RCS Android Malware

  1. Don't install app from 3rd party source.
  2. Disable the installation of application from android smartphone.
  3. Install antivirus and antimalware application for security of android smartphone.
  4. Always up-to-date your device with latest version of android os and application.

Microsoft’s Windows 10 phones will have surface pen support and will scan your face.



Microsoft is getting ready for 2 new Lumia devices for this year . whereas some specifications have leaked already, Windows Central is describing that each devices consist of an iris scanner to allow you to log into the phones through your face. This can be comprise of the Windows hello feature in Windows 10. apart from the iris scanning, Microsoft is additionally reportedly launching its Surface Pen technology to each of its future Lumia handsets.


Windows Central reports that the larger Lumia 950 XL phone can embrace support for the Surface Pen and a brand new good cover that features a circular cut out for simple access to notifications. The Microsoft enthusiast web site conjointly offers up a render of the "Cityman" device that is expected to be known as the Lumia 950 XL once it goes on sale later this year. 


It's not clear precisely When would Microsoft plans to launch these 2 new handsets, however Windows Central claims Verizon won't supply the Lumia 950 or Lumia 950 XL, leaving AT&T to sell simply the 5.2-inch Lumia 950. each handsets ship with a 20-megapixel PureView camera, with the XL taking advantage of a triple LED flash. Windows Central has denoted  the complete specifications of each devices, and they're going to be on the market with Windows 10 Mobile preinstalled later this year.



Features of Talkman (Lumia 950)


  • Matte White or black polycarbonate body
  • 5.2 inch WQHD (1440x2560) OLED display
  • Snapdragon 808, 64-bit Hexa core
  • Iris scanner (infrared) for Windows Hello
  • 3GB of RAM
  • 32GB of internal storage with a microSD card slot
  • 20MP PureView rear camera
  • 5MP Wide-angle front facing camera
  • 3000 mAh removable battery
  • Qi wireless charging with flip cover
  • USB Type-C

Features of Cityman (Lumia 950 XL)


  • Matte White or black polycarbonate body
  • 5.7 inch WQHD (1440x2560) OLED display
  • Snapdragon 810, 64-bit Octa core
  • Iris scanner (infrared) for Windows Hello
  • 3GB of RAM
  • 32GB of internal storage with a microSD card slot
  • 20MP PureView rear camera with triple LED flash
  • 1mm silver ring inside the circumference of the black camera pod
  • Aluminum side buttons
  • 5MP Wide-angle front facing camera
  • 3300 mAh removable battery
  • Qi wireless charging integrated
  • USB Type-C

A New SnapChat Tweak That Lets Jailbreak-Users bypass the Snapchat ban hammer.

A new jailbreak tweak for Snapchat simply launched, and it works on the newest version of Snapchat—version 9.12.0.0—without inflicting a account block.

As you’ll recall, Snapchat started cracking down on Snapchat-oriented jailbreak tweaks once an update to at least one of the well-liked  tweaks (Phantom) allowed users to spoof locations and snag in demand filters from places across the globe.

Though an update to Phantom is claimed to get on the manner, a brand new update to a different Snapchat-centric tweak—Snapchat+— is that the 1st  that truly lets users bypass the Snapchat ban hammer.






To find Snapchat+, add the subsequent repo to your list of Cydia sources:

http://beta.unlimapps.com/

Once the repo is there, look for Snapchat+ version 1.2r-9. this is often the version that permits users to avoid being lock out with the newest version of Snapchat, and still have the benefit of the tweaks it provides.

Snapchat+ Settings

Snapchat+ can enable you to try and do several things that Snapchat ordinarily doesn’t enable you to try and do. these items include:

Auto saving snaps
Disable snap countdown
Disable read receipt
Spoof Snapchat settings
Save chat messages
Disable screenshot log
Disable shutter sound
There are, of course, different options to be found in Snapchat+, investigate the page on Cydia for additional info.

Obviously, with Phantom being the foremost well-liked Snapchat-centric tweak, several are going to be waiting till it receives its update. however within the in the meantime, this not solely proves that bypassing the lockout is possible, however Snapchat+ might o.k. offer all of the options that you simply want.

With all of that aforesaid, as we’ve expressed before, you\'re taking a risk by continued to use tweaks that Snapchat is seemingly powerfully against. Don’t blame us if you account lands up forever banned; you’ve been warned!

 It seems that Snapchat has outright disabled its auto-ban for users of Snapchat-centric tweaks. this suggests that this tweak, and alternative tweaks (such as Phantom) ought to currently work.


Whether or not this is often an extended term or short term factor remains to be seen. till Snapchat comments on this, remember that you’re still taking a risk.

Local Privilege Escalation Vulnerability"DYLD_PRINT_TO_FILE" found in latest Mac OS version X 10.10



Researchers have identified a local privilege escalation (LPE) vulnerability within the mack OS X Os. Apple appears to be aware of the loophole, however the corporate hasn’t fixed in current releases.

German researcher Stefan Esser from security audit firm SektionEins disclosed the vulnerability on Tuesday. The protection flaw affects OS X 10.10.x and relates to new options added by the iPad and iPhone maker within the newest evolutions of the OS,Yosemite and El Capitan.
The vulnerability is said to DYLD_PRINT_TO_FILE, associate atmosphere variable that allows error work to impulsive files. The feature was introduced by Apple to the dynamic linker “dyld” with the discharge of OS X 10.10.

“When this variable was added the standard safeguards that square measure needed once adding support for brand new atmosphere variables to the dynamic linker haven't been used. Thus it's attainable to use this new feature even with SUID root binaries,” Esser explained.

“This is dangerous, as a result of it permits to open or produce impulsive files owned by the root user anywhere in the file system. Furthermore the opened log file is rarely closed and so its file descriptor is leaked into processes spawned by SUID binaries. this implies processes of SUID root processes will write to impulsive files owned by the foundation user anyplace within the filesystem.”

Esser disclosed that the native privilege escalation vulnerability additionally affects jailbroken iPhones running iOS 8.x.
This, in turn, permits for privilege escalation and computer hijacking to require place.
However, Apple fixed the flaw within the beta versions of OS X El Capitan 10.11, and not within the current OS X 10.10.4 or the beta version of OS X 10.10.5. OS X 10.11 is anticipated to be fixed in late September or early October.

UTORRENT FLAGGED AS ‘MALICIOUS’ BY ANTI-VIRUS COMPANIES AND GOOGLE







Several anti-virus vendors have begun block uTorrent once examining the package as malicious or probably dangerous.
Additionally, Google Chrome is presently obstructing many pages on uTorrent's official webpage. consistent with the reports the favored file-sharing application is coupled to riskware and trojans.

With a lot of new downloads per month uTorrent is doubtless the foremost used Bit-Torrent applicant around.The package is that the main determinant of revenue for the Bit-Torrent inc,as it  generates revenue through advertisements and bundled package.

The latter currently seems to be inflicting hassle as many anti-virus vendors have begun listing uTorrent as a security risk.

The scanning result below from VirusTotal shows that a minimum of six anti-virus applications, together with ESET and Symantec, have flagged the package as problematic.
The anti-virus scans associate the uTorrent.exe file with Trojan.Win32.Generic!BT and a disputed OpenCandy bundling package. whereas this isn’t 1st time that uTorrent has been flagged like this, and haven’t seen it being described by this varied separate tests before.


In addition to action by the anti-virus firms, uTorrent is additionally being blocked by Google in many ways in which. once making an attempt to transfer the most recent stable version of the torrent applicant, Chrome flags the package as malicious and blocks the transfer, though this solely seems to happen periodically.

Google is additionally actively obstructing many pages that link to uTorrent and different BitTorrent inc. software. As per Google, elements of the uTorrent page contain “harmful programs.”

The same “harmful software” warning from Google additionally prevented a lot of folks from accessing well-liked torrent sites earlier this month.

A Google representative said that this was the results of the company’s exaggerated efforts restrict ing programs that create “unexpected changes” to people’s computers.

“Google Safe Browsing’s ability to discover deceptive package has a lot of improvement,” the co. explained in an exceedingly recent journal post.“In the approaching weeks, these detection enhancements can become a lot of noticeable in Chrome: users can see a lot of warnings regarding unwanted package than ever before.

These and therefore the different uTorrent threat reports all appear to be triggered by bundled third-party package bundled. there's no indication or proof that the BitTorrent client itself is harmful.

Snapchat is now forcing jailbreak users to upgrade to the latest version.






It looks like Snapchat isn’t resting on its laurels once it involves securing its product. when it surfaced that Snapchat was setting out to exclude anybody who used Snapchat-centric jailbreak tweaks, users wised up and began downgrading to an earlier version of Snapchat.

Today, it seems that the venice, CA company has caught on to the downgrading trend, and is currently forcing users to upgrade to the most recent version of Snapchat so as to use its product.



Users who try and downgrade so as to figure round the jailbreak tweak stifling are currently being met with the earlier message once launching older versions of Snapchat.

The message is basically telling users to either update or don’t use Snapchat.

As you will recall, Snapchat has long had language forbidding “plugins” in its terms of use, however only in the near past started imposing those terms via account lock downs.

Interestingly enough, this stifling comes round the same time collectively of the favored Snapchat tweaks—Phantom—was updated to support geolocation spoofing. one in all Snapchat’s options is to gift special geolocation filters, primarily stickers, that permit users showcase wherever they're within the world. This ability to spoof has apparently hit a nerve with Snapchat, and it’s doing what it will to safeguard its product.

Will this game between Snapchat & Jail-break Developers continue? it's to be simply heating up, as word on the road says that the developer of Phantom is coming up with an update to avoid Snapchat’s restrictions.

Snapchat is blocking users who use Snapchat jailbreak tweaks.

If you’re an addict of Snapchat and you prefer to use Snapchat-oriented jail-break tweaks like Phantom, then note.It seems that Snapchat is setting out to confine on users who use jail-break tweaks with its app.

Phantom—one of the foremost well-liked jail-break tweaks for Snapchat—allows you to try and do things like spoof locations, save media, set custom notifications sounds, and some additional stuff.However apparently, Snapchat isn’t too keen on jail-break users having such perks, and have begun to block out users of those tweaks.






Fortunately, the block-out isn’t permanent—at least not,however once you disable the Snapchat tweaks, your account will be unbarred and you'll regain access to Snapchat sans any jailbreak tweaks on your device.

We only recently did a walkthrough of 1 of Phantom’s new features—a 1st for us.

@BreeDorado_ Snapchat won't work on jailbroken devices.

— Snapchat Support (@snapchatsupport) july 20, 2015



How to un-block your Snapchat account

Step 1: Un-install any Snapchat tweaks you have got

Step 2: head to https://snapchat.com/unlock and login to unlock

Step 3: Log back to the app once un-blocked

Snapchat unlock success

It’s not clear what strategies Snapchat is conducting to examine that “plugins” (aka tweaks) you have got put in on your device, however they're ready to devour Phantom.
Once I uninstalled Phantom, and un-blocked my account, i used to be ready to log back to the app with success.

Can Proxy|VPN help to make free internet call from Whatsapp|Viber|Skype?

As per the report of Department of Telecommunications (DoT),Telecom Regulatory Authority of India (TRAI) to control the voice calls conducted by the net users of of over-the-top (OTT) services.The report recommends TRAI to contemplate the strain of telecommunication service suppliers to manage domestic VoIP vocation services, whereas taking a liberal approach to international VoIP services.



This indicates that if Indivisual make a call to someone living abroad using Skype, Viber, WhatsApp or any other VoIP service, then you are not charged if you have got a running net pack.

However, if you would like to place VoIP call using WhatsApp, Viber or Skype in india, the telecommunication provider would charge you even if the net pack is active.


DoT has rejected the demand for regulation of over-the-top (OTT) Free messaging services, as well as WhatsApp, Viber and Hike. So, you'll chatting along with your friends and relatives over WhatsApp, Viber and Hike without charge.


Though the committee's report isn't the ultimate read of the govt towards web Neutrality, the report has solely been conferred to TRAI, which is able to contemplate its ideas and kind its own recommendations for the government’s final call on new legislation.


Zero-rating is that the follow of service suppliers not charging finish users for knowledge utilized by specific apps or websites through the network, in restricted or given knowledge plans.

How to make paid internet calls for free.


As per the DOT report,Over the top service outside india is free but within india is chargeable.


Now-a-days lots of VPN and proxy server is available.Some of the server provide the free service to the user.User can activate the proxy or vpn in smartphone,chane the IP address and make the paid internet calls for free within india too.


Can the above trick to make paid internet calls for free is possible? reply in the comment section given below...

How to optimize and improve the performance of Laptop|Computer.

As laptop or computer get older,performance of laptop get slower. Higher configuration, High processor,Lots of space and RAM, several area of these doesn't count once the system isn't used properly. improper usage can create the  laptop|computer slow like cache,junk,temporary files, and problem in the registry etc.. file in pc.



Follow the below steps to overcome from the problem.

1.Clean the Cache and Junk file using CCleaner software.

2.Scan the issue in registry files using ccleaner and solve the found issue to optimize the speed of pc.

3.Delete the temporary file using the Run as given below:
  • Launch the Run via Start > search >Run Or Windows+R
  • Type "%temp%" in run windows without quotes
  • Delete all the temporary files


4.Disable the startup programme via 
  • Start > Search > msconfig
  • Now goto StartUp Tab
  • Disable the Unwanted files and software loading in startup like uTorrent,IDM etc...


5.Improve the performance of Computer using command prompt:
  • Start > Search > cmd
  • Type "tree" in command prompt without quotes
  • This may take some time


6. Increase the Virtual Ram to speed up the computer 

  • Clicking the Start button Picture of the Start button, right-clicking Computer, and then clicking Properties.
  • In the left pane, click Advanced system settings.
  • On the Advanced tab, under Performance, click Settings.
  • Click the Advanced tab, and then, under Virtual memory, click Change.
  • Clear the Automatically manage paging file size for all drives check box.
  • Under Drive [Volume Label], click the drive that contains the paging file you want to change.
  • Click Custom size, type a new size in megabytes in the Initial size (MB) or Maximum size (MB) box, click Set, and then click OK.
7.Avoid using the multiple Antivirus and Anti-spyware software programme, always keep some space left in Operating system drive

8.Delete the files permanently from computer using cmd

  • Start Command Prompt(Start-Run-CMD)
  •  Type cipher /w:Drive name Or folder name  and then press enter
  •  cipher /w:c:\  (clean entire c drive)