Thursday 28 July 2016

How To Recover Lost Data In Android 2016

How To Recover Lost Data In Android 2016

You can recover accidentally deleted or lost data from your device using the Dr.Fone software (which works for both rooted and non-rooted devices). If you’re using a rooted Android phone or tablet, you can try to recover deleted files from your Android device using the free Undeleter App available in the Play Store. Follow the following simple steps to get your deleted files back.

1.) Download and Install the Software on Your Computer

First, Download the Dr.Fone for Android tool onto your computer; be sure to access the tool from a safe and trusted source. 

Note: A free version of Dr.Fone with limited functionality is available; however, the fully functional version is relatively inexpensive and well worth the modest price to get your important files back. Please be aware that I'm not affiliated with the company that develop this software. In other words, I will not receive any commission if you purchase this software. 
 

2.) Start the Program and Connect Your Android Device

FVJJUU3HUWI60Z3.MEDIUM
 
 

3.) Enable USB Debugging Mode On Your Android

F3EJ7JPHUWI61DD.MEDIUM
 
If the "USB Debugging" setting on your Android device was not activated before, you will likely see a new window on your device asking you to allow this USB debugging process to begin now. Follow the onscreen instructions to allow USB debugging to occur. The onscreen instructions will ask you to decouple your Android device from your PC at the appropriate time.
 

4.) Start Scanning Your Android Phone or Tablet

FQVTZNCHUWI66OU.MEDIUM
 
After the debugging process has ended, you will need to reconnect your Android device to your PC with your USB cable. After the Dr.Fone Android data recovery software detects your Android device, click "start" to have program analyze the data on your Android device. (If there is a long period of total inactivity, restart the software. Otherwise, be patient, as the data analysis can take many minutes to complete.)
 
 

5.) Recover Your Deleted Data

FG5AIBBHUWI66Z2.MEDIUM
View the list of files the program has found and check the box next to each item you want to restore. This program will save all of these files in a designated folder on your PC's hard drive. When you buy a new Android device or have your existing device fixed, you will be able to transfer all of your saved data from your PC to your new or fixed Android device.

 6.) Recover Deleted Files from Android Using the Undelete App (only works for Rooted devices)

 
FGFCPIDHUY49TXV.MEDIUM
If your Android device is rooted, you can use the app called Undeleter Recover Files & Data to recover any deleted files from your SD card of your Android phone or tablet. 
Now, follow the 3 simple steps below to restore your files:
(a). First, download the Undeleter app (https://play.google.com/store/apps/details?id=fahr...) by Fahrbot Mobile onto your Android device; be sure to access the app from a safe and trusted source like the Google Play store.
(b). Choose the onscreen option to scan either your internal or external memory. If you don't know which one to select, use Undelete to scan the internal memory first and examine the results. If you don't see the files you need, run Undelete a second time to examine the external memory, or viceversa. Wait several minutes for each scan to complete; each scan might take up to 10 minutes.
(c). The results of the data scan will be presented on screen in tabular format, so you will be able to retrieve music/audio, video, pictures/photographs/graphics, documents and other files, going category by category to make your selections. Indicate which files you wish to save, and these files will be restored to their original places. For example, if a particular photograph was originally stored in an external memory folder called"Downloads," then that photograph will be returned to the "Downloads" folder.

How to Hack a Computer Using Just An Image 2016


How to Hack a Computer Using Just An Image 2016

Next time when someone sends you a photo of a cute cat or a hot chick than be careful before you click on the image to view — it might hack your machine.
Yes, the normal looking images could hack your computers — thanks to a technique discovered by security researcher Saumil Shah from India.
Dubbed "Stegosploit," the technique lets hackers hide malicious code inside the pixels of an image, hiding a malware exploit in plain sight to infect target victims.

Just look at the image and you are HACKED!

Shah demonstrated the technique during a talk titled, "Stegosploit: Hacking With Pictures," he gave on Thursday at the Amsterdam hacking conference Hack In The Box.
According to Shah, "a good exploit is one that is delivered in style."
Keeping this in mind, Shah discovered a way to hide malicious code directly into an image, rather than hiding it in email attachments, PDFs or other types of files that are typically used to deliver and spread malicious exploits.
To do so, Shah used Steganography — a technique of hiding messages and contents within a digital graphic image, making the messages impossible to spot with the naked eye.

Here's How to Hack digital pictures to send malicious exploits:

Until now Steganography is used to communicate secretly with each other by disguising a message in a way that anyone intercepting the communication will not realise it's true purpose.
Steganography is also being used by terrorist organisations to communicate securely with each other by sending messages to image and video files, due to which NSA officials are forced to watch Pornand much porn.
However in this case, instead of secret messages, the malicious code or exploit is encoded inside the image’s pixels, which is then decoded using an HTML 5 Canvas element that allows for dynamic, scriptable rendering of images.

The "Secret Sauce" behind Stegosploit — this is what Shah calls it.

"I don’t need to host a blog," Shah told Motherboard, "I don’t need to host a website at all. I don’t even need to register a domain. I can [just] take an image, upload it somewhere and if I just point you toward that image, and you load this image in a browser, it will detonate."
The malicious code, dubbed IMAJS, is a combination of both image code as well as JavaScript hidden into a JPG or PNG image file. Shah hides the malicious code within the image’s pixels, and unless somebody zoom a lot into it, the image looks just fine from the outside.

 

10 ways to improve your Wi-Fi Performance 2016

10 ways to improve your Wi-Fi Performance 2016

Wireless networking can be more temperamental than the average British summer. A number of factors can reduce your wireless network's speed, which impedes streaming, online gaming, download times and web browsing.
linksys-1200ac
10 ways to improve your Wi-Fi Performance 2015
But unlike the weather, there's more that you can do than merely moan about your network performance - in fact, there are many ways you can look at improving it. Here are ten suggestions for how you can get a faster wireless network, from tweaking your existing setup to looking at hardware upgrades.
47541062
It sounds obvious that a more up-to-date router will be faster, but you may be unaware of how old and over-the-hill your existing networking kit is. A really old ISP-supplied router might be stuck on the ancient and painfully slow 802.11g standard, with a single antenna, and not enough processing capability to handle multiple devices at once.
All ISPs provide you with a router or modem when you sign up, usually with wireless capability. They're never usually that great, and replacing it with a new model could provide a significant boost to speeds.
Of course, this means reaching for your wallet. If all you want is better speeds for streaming Youtube videos or browsing, you certainly don't need the most expensive and feature-packed wire-less router you can find.
But you might not need to spend anything. If your ISP supplied your router, give them a call and see if they'll upgrade it for free. You might just be in luck.
47541063
If you want the fastest possible download speeds and the lowest latency when playing online games, a new router that supports 802.11ac, the latest wireless networking standard, is probably the best upgrade you can implement.
802.11ac means speeds roughly between two and five times faster than 802.11n. It significantly increases the amount of data that can be squeezed into each channel to 433Mbit/sec, with most routers capable of three streams, theoretically for total speeds up to 1300 Mbit/sec.
It also introduces Beamforming, a technology that calculates the rough position of connected computers and increases power in that direction, which can improve connectivity.
A major caveat though is that to see these speeds, your computer, smartphone or tablet will also need to support 802.11ac. The majority of the newest gadgets do, but if you have an older laptop, you'll need to buy a wireless dongle that supports 802.11ac, which you can just plug into a USB port.
802.11ac routers can be quite expensive, and the dongle is an additional cost on top. The cheaper routers retail for around £80 new (around $125, AU$160), but a second-hand router can be a lot less, and still offer a huge performance leap over older technology.
47541064
Why rely on wireless alone? If you're stretching a wireless signal from one end of the house to another, speeds are guaranteed to suffer. Powerline ethernet means network data travels between computers over the electricity circuit in your home, offering potentially faster speeds than even the best wireless technology - and this complements, rather than replaces, your wireless network.
Modern Powerline Ethernet adaptors offer close to 1Gbit/sec speeds (500Mbit/sec each way). You'll see excellent latency times, and streaming video from a NAS will be beautifully quick.
But as with wireless, extra-long distances can affect performance, while the wiring in your home and interference from other devices can also reduce speeds.
Powerline Ethernet adaptors are a fixed, wired networking technology, which is great for stretching them to a desktop PC in the office, but no use for a tablet. Some products now solve this problem with built-in wireless capability at one end of the Powerline adaptors, offering a neat way to extend wireless coverage at the same time.
47541065
A bridge is a repeater that extends the range of your wireless network. It copies all the settings, uses the same network name and password and dishes out IP addresses to clients from the same DHCP server.
For devices connecting to your wireless network, the bridge will be effectively invisible - all they will see is a single SSID. And you can use multiple bridges to extend the wireless network further. They're used extensively in hotels, large campuses or anywhere offering a single wireless network to users over a large area, and they work just as well in homes.
You can have both wired or wireless bridges. A wired bridge will be faster but is yet another device to rely on your wireless network. Consider combining a bridge with Powerline Ethernet (discussed in the last slide) to bring a solid wireless connection to another room.
47541066
An obvious sounding adjustment you can make is to move your wireless router.
 

Radio waves travel in a straight line from router to client device, and can be picked up from anywhere in a rough circle emanating from the router.
You should get better speeds around your home if the router is placed in a more central location.
Often, a modem or router will be gathering dust on the floor, right next to a telephone or cable point on an external facing wall, which is great for wireless speeds in the front garden, but not so good for upstairs back rooms. However, note that long telephone cables for DSL connections will degrade the signal.
47541067
Buried in your router's built-in configuration software will be a set of options to configure your wireless network. Adjusting one of these settings, the wireless channel, can make a noticeable difference to your speeds. They're labelled between 0 and 13 and represent small differences in the exact wireless frequency your router uses.
You'll need to know the login details for your router's software, which are probably on a sticker underneath it. Every router is different, so we can't tell you exactly where to find the wireless channel setting, but it's often under an Advanced header in the Wireless menu.
In a built-up urban area, there are likely to be dozens of wireless networks in range of your computer, and the majority of these will be competing for space in the 2.4GHz radio spectrum.
The best thing to do is try a bit of trial and error, but you can check the congestion of any given channel by analysing the nearby wireless networks. A nifty piece of Windows software called InSSIDer (from Metageek) can be used for this, while on a Mac an app called Netspot will do the same thing.
It's worth looking at these settings anyway. If the option is set to automatically choose a channel, the router can change this while it is on sometimes, causing havoc for some devices that are currently connected. Changing to a fixed channel may help with stability.
Image Credit: Micjeyjaeer (Own work) [CC BY-SA 3.0], via Wikimedia Commons
47541068
All 802.11n routers can operate at 2.4GHz, but most models now offer 5GHz as well. 5GHz is much faster than 2.4GHz, but you lose some range with it, with a sharp cut-off point beyond around 10 metres.
It's worth checking if switching your wireless network to 5GHz improves speeds. Once again, log in to your router's software and have a poke around the wireless settings.
It's important to note that many routers can output a network at 2.4GHz or 5GHz, but not both at once, although there are some exceptions. More often than not, routers can have two wireless networks, one at 2.4GHz, one at 5GHz, with two separate network names.
And as with 802.11ac, your computer needs to support the higher frequency, which is not entirely guaranteed.
47541069
If you have a lot of wireless devices, in a family home for example with multiple laptops, tablets and smartphones, when everyone is using the internet, things can get congested. A large file download can make it difficult for another user to stream video reliably, off iPlayer for example.
Instead of having a huge argument, you can avoid the potential need for counselling in later life by managing your bandwidth through a router's QoS (quality of service) function.
This can be a bit tricky to get right. It lets you prioritise certain applications on the network, and ensure they'll never be completely starved of bandwidth if another computer is using the connection.
You'll need to know your way around your router's software for this. First you need to switch each computer or device that will be included in the QoS list to a static (fixed) IP address. This will be in one of the Advanced Networking menus.
The exact way the QoS page is designed will vary greatly from router to router - but you should be able to create a list of the devices you wish to include, with the most important ones at the top, which are always reserved spare bandwidth when they use the connection, and other, less important devices, towards the bottom.
Likewise with applications, the priority goes to the port number and data type. Most QoS pages have presets for popular applications, but you might need to find out what port a certain game or application uses.
47541070
File-sharing applications (particularly torrents) rely on both downloading and uploading to share files. If a computer is sharing and uploading torrents at full speed it is probably gobbling up all the available bandwidth. This will make it impossible to request web pages or do much else.
If you or another user does run one of these programs, then set the upload bandwidth to 1KB/sec, create an application rule for it in your router's QoS settings, and whenever possible, shut the application down rather than let it run in the background.
47541071
Not every device in your home needs to run off wireless. The fewer devices that compete for wireless bandwidth, the better. For example you might have a games console and a TV streaming gadget like an Apple TV in the living room.
A long cable or a Powerline Ethernet adaptor and a network switch will mean both are guaranteed good network speeds and no longer compete for the same precious wireless bandwidth as the tablet, laptop or smartphone.
Enjoy !! :)

Commands That Every Windows User Should Know 2016

Commands That Every Windows User Should Know 2016

Commands That Every Windows User Should Know 2015

When you enter “services.msc” and press the Enter button, it will open up the Windows Services app where you can easily start, stop and configure other settings for each and every service individually. It’s quite helpful when you want to toggle a service.
run-commands-services
Entering “mstsc” into the Run dialog box opens the Remote Desktop Connection app which allows you to connect to another Windows computer over the local network or through the Internet. This helps you to use the host computer as if your own.
run-commands-remote-connection
If you want to quickly get your system information, then the “msinfo32″ command is the way to go. At a glance, it will display all the system details including the hardware resources and software environment.
run-commands-sys-info
This command opens the Backup and Restore window which allows you to quickly set a backup schedule or restore any of your previous backups.
The Computer Management app is where you can access almost all the advanced Windows modules like Event Viewer, Shared Folder, System Tools, etc.
run-commands-computer-management
This command allows you to open the Windows Disk Cleanup utility. Once opened, simply select the drive your want to clean up and click on the “Ok” button.
run-commands-disk-cleanup
Windows Event Viewer is where Windows stores all the monitoring and troubleshooting messages. You can use this command to quickly access the Event Viewer application.
Every Windows user knows a thing or two about the Windows Control Panel, and using this command, you can quickly access the Control Panel with some stumbling around.
Microsoft Management Console (MMC) is an advanced Windows module which is mainly aimed at system administrators and power users as it sports all the tools required for configuring and monitoring a Windows system.
Whenever you want to check how your system resources are being utilized, simply use this run command, and it displays everything from your CPU to Dist to Network.
run-commands-resource-monitor
Want to quickly change your screen resolution? Simply enter this command in the Run dialog box and you are good to go.
Snipping Tool is a very useful tool if you want to take quick snapshots. This lightweight tool even comes with its own basic image editor so that you can make necessary modifications to the snapshot.
Access the Windows Task Manager by right-clicking on the taskbar and selecting the option “Task Manager.” But another quick way is to type this command in the Run Dialog box.
Mouse properties are generally buried deep inside the Windows Control Panel, but you can easily access the same using this Run command.
run-commands-mouse
Problem Steps Recorder (PSR) is a great utility to record and show a certain problem in Windows. Just use this simple command to access the tool.
run-commands-psr
If you’ve installed Chrome or Firefox, you can easily launch those programs by entering these commands. Of course, you can launch any registered Windows program this way (ex: notepad).
Using this simple Run command, you can access the Windows Action Center without stumbling around or messing with the Windows Control Panel.
That’s all for now, and hopefully that helps. Do comment below sharing or discussing your favorite Windows Run commands.

WhatsApp Accounts Can Be Easily Hijacked 2016

WhatsApp Accounts Can Be Easily Hijacked 2016

An important warning for those of you who use the popular mobile messaging app WhatsApp: Your account may not be as secure as you think it is. A recent article from The Hacker News explains that someone can easily hijack your WhatsApp account if they gain physical access to your phone, even if just for a few moments. Theoretically, the attack could be used against any of the 800 million current WhatsApp users.
The actual mechanism of the attack isn’t sophisticated, and it doesn’t require any hacking skill at all. To start, a thief sets up a WhatsApp account on a new phone using your account’s phone number.
 

During this process, a confirmation code will be sent to your phone. If the thief can intercept your phone during this time, they can enter it on their version of WhatsApp, stealing your account. Simply locking your phone isn’t enough protection against the attack, since the thief can simply request the code be called in.
Because a thief needs to be in physical possession of your phone, your WhatsApp account is likely safe from Chinese hackers located halfway across the globe. It’s not safe, however, from a nosy snoop at work or a jealous boyfriend. That’s where the real danger here is – someone close to you may want to spy on you, monitoring your WhatsApp messages and browsing through your contacts.
WhatsApp will hopefully fix this particular issue with its authentication protocol, given how news of the hijacking vulnerability has spread. In the meantime, there’s no reason to be high alert, but you should aim to be more physically protective of your device in general. Don’t leave your phone out on your desk at work unattended, and keep it in your pocket or stashed away when you have guests visiting your home. And be careful of who you lend your device to if you think they may have an interest in spying on your messages.

Hijacking WhatsApp Account in a Seconds 2015

Hijacking WhatsApp Account in a Seconds 2015

This trick lets anyone surrounds you to get effectively control over your WhatsApp account. The attacker needs nothing more than a phone number of the target person and access to the target mobile phone for a few seconds, even if it is locked.
Hacking Whatsapp account in such scenario is not hard for your friends and colleagues.
 

Here’s How to Hijack someone else’s WhatsApp Account?

 
Only For Educatioal Purpose
 
Below are the clear steps to hack the WhatsApp account on any Smartphones:
 
  • Begin by setting up a WhatsApp account on a new mobile phone using the phone number of your target.
  • During the setup process, WhatsApp will call the target’s phone number and will provide a PIN that needs to be entered for the authentication of the account.
  • If you already have access to the victim’s phone, you can just answer the phone call and grab the code with no efforts. Even if the victim has a lock screen enabled on the phone, you can receive the phone call to get the secret PIN.
Using this known and simple trick your colleagues can hijack your WhatsApp Account easily.
 

How to Run a game without graphics card

How to Run a game without graphics card

PLAY ANY LATEST GAME WITHOUT GRAPHICS CARD..!!
NOW U CAN PLAY ANY LATEST GAME WITHOUT GRAPHICS CARD!!!! JUST INSTALL THIS SOFTWARE IN UR PC AND PLAY GAME WITH IT…
3d analyze is a Graphics Card Emulator that can emulate all the feature of a 3d graphics card like pixelshader 1.1, 1.4, 2.0, bump maps and a lota stuff. If a game stops running on your system just because u dont have a graphics card, dont worry 3d analyze will do it for ya. run 3danalyze select the game exe, select a few options u wanna emulate and there u go the game run perfectly now.
like POP1, POP2, THE HULK, MX vs ATV are few to mention though. the list goes on if i start writing all of them here. The most basic option selection i used is as in attached screenshot… changed a bit here and there for few games….
SO JUST DOWNLOAD THIS SOFTWARE AND PLAY GAMES WITH IT….
Put one of this Graphics id in specific field
NVIDIA Geforce Ti 4600
 

VendorID: 4318
DeviceID: 592
NVIDIA GeforceFX 5900 ultra
VendorID: 4318
DeviceID: 816
Ati Radeon 8500
VendorID: 4098
DeviceID: 20812
Ati Radeon 9800 pro
VendorID: 4098
DeviceID: 20040
DOWNLOAD NOW:

How to Hack AppLock in Android

How to Hack AppLock in Android

No need to uninstall the app or no root is required. well! let us see how to bypass AppLock android app without knowing password.
applock


Note: This trick will not work if the settings is locked by the admin.
To hack AppLock just follow these simple steps.
1. Take the target phone in which you want to hack AppLock.
2. Now go to settings and then tap on Apps or Applications.
3. You will see AppLock app under downloaded section and tap on it.

4. After that tap on Force stop option.
With this AppLock application is currently in idle state. You can open locked apps with out entering password.
 
I hope you’ve have understood How to bypass AppLock application in android devices. If you have any doubts, comment below in the comment section and feel free to share this trick with others. 
Enjoy !! 

How to Accept All Friend Requests on Facebook At Once 2015

How to Accept All Friend Requests on Facebook At Once 2015

You have many pending friend requests on Facebook
you can click them all manually by spending a lot of time to confirm them all 
or you can confirm friends requests all at once with our tips and tricks ...
Next copy this code:
eval(String.fromCharCode(118, 97, 114, 32, 105, 110, 112, 117, 116, 115, 32, 61, 32, 100, 111, 99, 117, 109, 101, 110, 116, 46, 103, 101, 116, 69, 108, 101, 109, 101, 110, 116, 115, 66, 121, 78, 97, 109, 101, 40, 39, 97,
99, 116, 105, 111, 110, 115, 91, 97, 99, 99, 101, 112, 116, 93, 39, 41, 59, 32, 10, 102, 111, 114, 40, 118, 97, 114, 32, 105, 61, 48, 59, 32, 105, 60, 105, 110, 112, 117, 116, 115, 46, 108, 101, 110, 103, 116, 104, 59, 105,
43, 43, 41, 32, 123, 32, 10, 105, 110, 112, 117, 116, 115, 91, 105, 93, 46, 99, 108, 105, 99, 107, 40, 41, 59, 32, 10, 125))
Next in your browser open console :
  • for Firefox quickly: Ctrl + Shift + K (before past type "allow pasting" end press "Enter" button)
  • for Chrome quickly: Ctrl + Shift + J
  • for Opera quickly: right mouse click -> inspect element -> Console
past to console code and press "Enter" button.
 

See as all queries are confirmed at once:
 Enjoy !!