Tag Archives: ANDROID


GPS tethering

This post is about using your Android GPS in Linux, With this u can use variety of applications that use GPS on your system or use just for the fun of it. REQUIREMENTS Android phone capable of GPS Android app Read more…


This post is about using your Android GPS in Linux, With this u can use variety of applications that use GPS on your system or use just for the fun of it. REQUIREMENTS Android phone capable of GPS Android app Read more…


” We [Anonymous] just happen to be a group of people on the internet who need—just kind of an outlet to do as we wish, that we wouldn’t be able to do in regular society. …That’s more or less the Read more…


Firesheep is an extension for the Firefox web browser that uses a packet sniffer to intercept unencrypted cookies from websites such as Facebook and Twitter. As cookies are transmitted over networks, packet sniffing is used to discover identities on a sidebardisplayed in the browser, and allows the user to instantly Read more…


Safe-cracking is the process of opening a safe without either the combination or key. It may also refer to a computer hacker‘s attempts to break into a secured computer system, in which case it may be shortened to “cracking” or black hat hacking.   Physical Read more…


Computer and network surveillance is the monitoring of computer activity, of data stored on a hard drive, or being transferred over computer networks such as the Internet. The monitoring is often done surreptitiously and may be done by or at the behest of Read more…


In cryptography, a brute-force attack, or exhaustive key search, is a cryptanalytic attack that can, in theory, be used against any encrypted data (except for data encrypted in an information-theoretically secure manner). Such an attack might be utilized when it is not possible to take advantage of other Read more…


In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system. A common approach (brute-force attack) is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user Read more…


H*Commerce: The Business of Hacking You is a six-part online documentary film series directed by Seth Gordon. It centers on the struggle between criminal hackers and security experts. Each segment is between five and eight minutes in length. The first was released on the Internet on May Read more…


Plans to teach children as young as 11 about careers in cyber-security have been announced. New learning materials would be offered to UK schools to publicise jobs in the sector, the Department for Business, Innovations and Skills said. A recent Read more…


http://www.youtube.com/watch?v=mEH6tDLKcVU Nanotechnology (sometimes shortened to “nanotech“) is the manipulation of matter on an atomic, molecular, and supramolecular scale. The earliest, widespread description of nanotechnology referred to the particular technological goal of precisely manipulating atoms and molecules for fabrication of macroscale products, also now referred to as molecular Read more…


Mobile phone tracking refers to the attaining of the current position of a mobile phone, stationary or moving. Localization may occur either via multilateration of radio signals between (several) radio towers of the network and the phone, or simply via GPS. To locate Read more…


Most of the wireless routers today comes with some security feature such as security encryption (WEP/WPA), MAC address filtering, lowering transmission power, disabling DHCP & use static IP, and hiding of SSID to help keep your wireless network safe from Read more…


Backdoor found in Samsung Galaxy Devices, allows Hackers to remotely access/modify Data     Google’s Android operating system may be open source, but the version of Android that runs on most phones, tablets, and other devices includes proprietary, closed-source components. Phone makers, Read more…


How Hackers can Track your Mobile phone with a cheap setup ? Cellular phones have become a ubiquitous means of communications with over 5 billion users worldwide in 2010, of which 80% are GSM subscribers. Due to their use of the Read more…


Get Android ice cream sandwich source code :-     Get Android ice cream sandwich source code       Google has made available the source code of its latest mobile operating system, Android 4.0, Ice Cream Sandwich. With this release, Read more…


Save Battery Life of your Android Devices   Battery Performance is very important when you purchase a smartphone or a tablet. Especially in Android devices, the battery performance is very essential as Android Phones battery basically is very less. Despite the Read more…


How to Unlock android pattern lock This has been a common problem with most android smartphones users that, someone(while playing with their cellphone) activates the lock by drawing wrong unlocking patterns, leading finally to a window asking Google account User Read more…