This is default featured slide 1 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.
This is default featured slide 2 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.
This is default featured slide 3 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.
This is default featured slide 4 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.
This is default featured slide 5 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.
Sunday, March 16, 2014
Microsoft and Google aren't happy with mutant Android-Windows hybrids
Tuesday, December 31, 2013
Turn Your Laptop Into JARVIS From Iron Man !
You have probably heard about the Iron Man Personal Assistant,AKA J.A.R.V.I.S, you would have wondered if you could convert you laptop/desktop into a full featured robotic assistant,you could do it.And it is pretty easy. Although you might not be able to launch missiles and deploy security armor, you can do easy tasks like asking for weather, shutting PC down, pimp its interface etc etc...
So Lets Get It Started,What Do You Need :
So That You Don't Get Confused :
Step One : Train Your Windows Speech Recognition Program : 5 Minutes :
Step Two : Setting Up The Windows Speech Recognition Macros : 5 Minutes :
Double Click The Macros Icon, and when the window pops up asking "What should the macro do?" click "Advanced." For those of you familiar with creating websites, this should be a welcome site. WSRM uses XML for commands... which makes creating custom commands relatively simple. For those of you who aren't aware of XML, it's still easy.Here Is A Little Sypnosis at what are you looking at :
<speechMacros> - This is the starting Tag, it just tells the computer that this XML file uses the Speech Macros to execute.
<command> - This is the command to be executed. Each command is basically one action... in most cases you will only need one, but for some automations you'll want to include more than one. You'll see an example of this later.
<listenFor></listenFor> - This tells the computer what word or phrase to listen for in order to do an action. Notice that there is a closing tag (</listenFor>), this tells the XML that this spot in the code is where to stop doing whatever function... in this case stop listening for a word or phrase once the computer hears it.
</command> - The closing tag for the "Command" tag... again, in XML every tag will have an opening/closing tag and what happens between the two is how it knows what to execute. In this case it knows that the command is finished once the word/phrase has been detected.
</speechMacros> - By now I think you can figure out why this is here.
Since I'm going to name my computer Jarvis, I'm going to tell my computer to listen for it's name by changing the <listenFor> tags to say the following : <listenFor>Jarvis</listenFor>
Step Three : Pimping The Interface : 5 Minutes :
Welcome To Jarvis !
So Whats Next ? We think using RFID's tags and attaching CCTV's cameras to it. We could also connect arduino and sub computers to control lightning and other electronics component, We could also add a IR Receiver to add remote functionality ! What do you think we could do next ?
So How Was This Post ? Love/Hate/Spot A Mistake ? Whatever it is,Leave your comments below and don't forget to like us on facebook so you never miss an update.peace out !
Friday, December 27, 2013
Backtrack 5 : Ethical Hacking Tutorial
What Do We Need ?
Latest Metasploit framework.Oracle Java 1.7
Preferably Internet on LAN
Step 1 -Open armitage on Backtrack 5:
Step 2 : Connect Armitage:
Step 3 : Connecting Armitage :
Step 4 : Armitage Window :
Step 5 : Finding the alive host on the Network :
Step 6 : Inputting The Scan Range :
Step 7 : Scan Complete:
After the scan has completed,if their are any other PC's on your network on,then they would be visible in the Target Pane (the Big Black box on the upper right).Step 8 : Finding Attacks :
Step 9 : Set the vulnerability :
Step 10 : The Final Result :
So You Did The Hacking Part Right,Now let us mess with the client.
Hack 1 - Opening Command Prompt :
Hack 2 - Start an KEYLOGGER :
Hack 3 - Take An Screen Shot :
Hack 4 -Browse Files :
Hack 5 - Get in His Webcam (my favorite part).
Wednesday, October 23, 2013
Make Fast Money
Hello guys I present to you the new way to earn fast money and without limit and with sign up bonus 4$ please go to http://VisitsToMoney.com/index.php?refId=288385
What Happens To Your Data After You Delete It.
So it was a dull evening, you were getting bored. You decided to go and free up some space on your laptop hard-drive.You started deleting files. James Bond Series - Deleted, Dragon Ball Z - Deleted, Important Office Files - Deleted, And when you realize you have deleted an importantpresentation, you'll start to freak out. But Don't worry, We'll help you to understand where the deleted files go and how to recover it .Also we will list some amazing free software's that will make your work easy !
I Can See That, But What Happens Inside The System ?
NTFS VS FAT. What Is The Difference ?
In The End :
Some Good Tools To Recover The Data :
Some Good Tools To Delete Sensitive Data :
Top 5 Laptops For Gamers/Hackers.
Below is the list of TOP 5 Most Powerful Laptops Till this date.Laptops listed below are branded as "Gaming Laptops" because games requires CPU Power,TOP-OF-THE-LINE graphics cards,Extreme motherboard,etc.But Hackers are Hackers,Now Most of our Password Crackings apps works on graphics card,since it is capable of working on more data at less time,so what are we waiting for,Let the war begin :