Uncategorized

Realme 6 review

Realme 6 review
Score:- 3.8
Body: 162.1 x 74.8 x 8.9 mm, 191g; Front glass, plastic body, splash-proof
Screen: 6.5\” IPS LCD, FHD+ (1080 x 2400px) resolution, 90Hz refresh rate, 405 ppi
Camera: Primary: 64MP Quad-Bayer, f/1.8 aperture, 0.8µm pixel size, 1/1.72\” sensor size; Ultra-wide: 8MP, f/2.3 aperture, 1.12µm pixel size, 1/4\” sensor size; Macro: 2MP f/2.4, 1.75µm pixel size, 1/5\” sensor size; Depth sensor: 2MP mono camera
Front camera: 16MP f/2.0 aperture
Chipset: Mediatek Helio G90T (12nm): octa-core (2×2.05 GHz Cortex-A76 & 6×2.0 GHz Cortex-A55), Mali-G76 MC4 GPU
Memory: 4GB/64GB, 6GB/128GB, 8GB/128GB, expandable via microSD card
OS: Android 10, Realme UI
Battery: 4,300 mAh, 30W VOOC Flash Charge 4.0
Connectivity: 4G LTE; Dual SIM; Dual-band Wi-Fi, Bluetooth 5.1, GPS, USB Type-C 2.0
Misc: Side-mounted fingerprint reader, 3.5mm audio jack
Uncategorized

What is cryptology?

What is cryptology?
Cryptology combines the techniques of cryptography and cryptanalysis.
Encryption Algorithms:
MD5– this is the acronym for Message-Digest 5. It is used to create 128-bit hash values. Theoretically, hashes cannot be reversed into the original plain text. MD5 is used to encrypt passwords as well as check data integrity. MD5 is not collision resistant. Collision resistance is the difficulties in finding two values that produce the same hash values.
SHA– this is the acronym for Secure Hash Algorithm. SHA algorithms are used to generate condensed representations of a message (message digest). It has various versions such as;
SHA-0: produces 120-bit hash values. It was withdrawn from use due to significant flaws and replaced by SHA-1.
SHA-1: produces 160-bit hash values. It is similar to earlier versions of MD5. It has cryptographic weakness and is not recommended for use since the year 2010.
SHA-2: it has two hash functions namely SHA-256 and SHA-512. SHA-256 uses 32-bit words while SHA-512 uses 64-bit words.
SHA-3: this algorithm was formally known as Keccak.
RS4– this algorithm is used to create stream ciphers. It is mostly used in protocols such as Secure Socket Layer (SSL) to encrypt internet communication and Wired Equivalent Privacy (WEP) to secure wireless networks.
BLOWFISH– this algorithm is used to create keyed, symmetrically blocked ciphers. It can be used to encrypt passwords and other data.
Uncategorized

HOW TO CRACK ACCOUNTS – BARE BASICS | FOR NOOBS

 HOW TO CRACK ACCOUNTS – BARE BASICS | FOR NOOBS 
This is how to crack accounts for people who are literally noobs, meaning that you have no idea what cracking is and how it works. This would\’ve been something I wished I had when I started out cracking.
Basically what cracking is, it\’s taking combolists, and running them through a program to check if that info is valid. You usually want to use proxies so your IP doesn\’t get banned Combolists: It\’s a txt file full of emails and passwords, in the format email:pass Proxies: The \”gateway\” between you and the internet. Basically use this so your IP doesn\’t get banned. Checkers: These are the checkers you use to check the combolist. Steps of cracking: 1. Get a combolist 2. Get a checker for whatever account you want to crack 3. Get proxies 4. Load combolists and proxies into the checker 5. Press start Your checker should now start checking each email from different proxies to see if it\’s a valide combo for that service You use proxies since the company, let\’s say Disney again, will ban your IP for logging in too many times. The proxy makes it so it seems like your logging in from different locations each time. Beware cracking is ILLEGAL. But the risk is very low. Cracking is unethical. Anyway, have fun!
Uncategorized

Upcoming OnePlus Bullets Wireless Z color versions revealed in new images


Upcoming OnePlus Bullets Wireless Z color versions revealed in new images
Yesterday we learned about the arrival of OnePlus\’ Bullets Wireless Z – more affordable version of the current Bullets Wireless 2. The fourth version is Gold – we haven\’t seen the OnePlus 8 Pro in such color yet, but maybe we haven\’t seen all existing versions yet. Otherwise the Bullets Wireless Z look identical to the ongoing Bullets Wireless 2, but they might be bringing changes on the inside.
Uncategorized

Top Android Hacking Applications

Top Android Hacking  Applications
1. SpoofApp:- SpoofApp is a Caller ID Spoofing, Voice Changing and Call Recording mobile app for your iPhone, BlackBerry and Android phone. It’s a decent mobile app to help protect your privacy on the phone. However, it has been banned from the Play Store for allegedly being in conflict with The Truth in Caller ID Act of 2009.
2. Andosid:- The DOS tool for Android Phones allows security professionals to simulate a DOS attack (an http post flood attack to be exact) and of course a dDOS on a web server, from mobile phones.
3. Faceniff:- Allows you to sniff and intercept web session profiles over the WiFi that your mobile is connected to. It is possible to hijack sessions only when WiFi is not using EAP, but it should work over any private networks.
4. Nmapper:- (Network Mapper) is a security scanner originally written by Gordon Lyon used to discover hosts and services on a computer network, thus creating a “map” of the network. To accomplish its goal, Nmapper sends specially crafted packets to the target host and then analyses the responses.
5. Anti-Android Network Toolkit:-zANTI is a comprehensive network diagnostics toolkit that enables complex audits and penetration tests at the push of a button. It provides cloud-based reporting that walks you through simple guidelines to ensure network safety.
6. SSHDroid:- SSHDroid is a SSH server implementation for Android. This application will let you connect to your device from a PC and execute commands (like “terminal” and “adb shell”) or edit files (through SFTP, WinSCP, Cyberduck, etc).
7. WiFi Analyser:- Turns your android phone into a Wi-Fi analyser. Shows the Wi-Fi channels around you. Helps you to find a less crowded channel for your wireless router.
8. Network Discovery:- Discover hosts and scan their ports in your Wifi network. A great tool for testing your network security.
9. ConnectBot:- ConnectBot is a powerful open-source Secure Shell (SSH) client. It can manage simultaneous SSH sessions, create secure tunnels, and copy/paste between other applications. This client allows you to connect to Secure Shell servers that typically run on UNIX-based servers.
10. dSploit:-Android network analysis and penetration suite offering the most complete and advanced professional toolkit to perform network security assesments on a mobile device.
11. Hackode:- The hacker’s Toolbox is an application for penetration tester, Ethical hackers, IT administrator and Cyber security professional to perform different tasks like reconnaissance, scanning performing exploits etc.
12.**Androrat**:- Remote Administration Tool for Android. Androrat is a client/server application developed in Java Android for the client side and in Java/Swing for the Server.
13.**APKInspector**:- APKinspector is a powerful GUI tool for analysts to analyse the Android applications. The goal of this project is to aide analysts and reverse engineers to visualize compiled Android packages and their corresponding DEX code.
14.**DroidBox**:- DroidBox is developed to offer dynamic analysis of Android applications.
15.**Burp Suite**:- Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application’s attack surface, through to finding and exploiting security vulnerabilities.
16. Droid Sheep:- DroidSheep can be easily used by anybody who has an Android device and only the provider of the webm service can protect the users. So Anybody can test the security of his account by himself and can decide whether to keep on using the web service.
Uncategorized

Latest update let you unlock your laptop with Mi Band 3 and 4

Latest update let you unlock your laptop with Mi Band 3 and 4
Xiaomi has released new software updates for the Mi Band 3 and Mi Smart Band 4 that now lets you unlock your laptops with the smart bands without having to install a third-party app on your smartphones. Initially this feature is only available for the Indian users and you can only unlock laptops running Windows 10 OS. Mi Smart Band 4 The new updates also improve the step counter to prevent the fitness bands from recording ghost steps. You first need to update the Mi Fit app on your smartphone to install the new firmware on your Mi Band 3 and Mi Smart Band 4.
Uncategorized

The Certified Ethical Hacker (CEH)

The Certified Ethical Hacker (CEH) program is the most comprehensive ethical hacking course on the globe to help information security professionals grasp the fundamentals of ethical hacking. The course outcome helps you become a professional who systematically attempts to inspect network infrastructures with the consent of its owner to find security vulnerabilities which a malicious hacker could potentially exploit. The course helps you assess the security posture of an organization by identifying vulnerabilities in the network and system infrastructure to determine if unauthorized access is possible. 
COURSE MATERIAL 
1.PDFS
2. TOOLS
3.LAB MANUALS
Uncategorized

How to use RDP on android phone

How to use RDP on android phone
➖➖➖➖➖➖➖➖➖➖➖
➖➖
Download and install the Microsoft Remote Desktop app.
Open the app and accept the *terms and conditions*.
Tap the *Plus (+)* icon in the top right corner and choose *desktop*.
 Enter the IP address of the Remote Desktop server and then tap the username input and select add a user.
Now enter the username and password and tap save.
 Now tap the PC icon to connect to the RD.
 Tick accept certificate or do not prompt me again on this PC in case you\’re prompted with a certificate window.
   Credits :- stark
Uncategorized

Q4 of 2019 saw HMD turn first profit, but sales are dwindling

Q4 of 2019 saw HMD turn first profit, but sales are dwindling 
HMD turned to a multi-ODM strategy to assemble Nokia phones due to a supply chain disruption in the first half of 2019. Reportedly the first devices to be manufactured by two new ODMs were the Nokia 2.2, 3.2 and 4.2. Using multiple ODMs has allowed HMD to make and sell phones at better margins, meaning that it was able to turn a profit despite moving fewer units.
Uncategorized

Google no longer sells the Pixel 3 or 3 XL

Google no longer sells the Pixel 3 or 3 XL
Google\’s online Store no longer carries the Google Pixel 3 or Pixel 3 XL. A Google spokesperson has confirmed to Android Police that Google has ceased sales of the third-generation Pixel smartphone. The Google Store still sells the Pixel 3a, Pixel 3a XL, Pixel 4, and Pixel 4 XL. Even if you managed to find the landing page for the Pixel 3, which isn\’t accessible from the Google Store navigator, all storage sizes and carrier configurations are out of stock. In any case, we might recommend you consider the power-efficient and economical Pixel 3a or 3a XL, but perhaps not before its successor is released: the 4a. We\’re expecting to see the launch of the budget-friendly Pixel 4a coming soon.
Uncategorized

42+ Text-Editing Keyboard Shortcuts That Work Almost Everywhere

42+ Text-Editing Keyboard Shortcuts That Work Almost Everywhere
Whether you’re typing an email in your browser or writing in a word processor, there are convenient keyboard shortcuts usable in almost every application. You can copy, select, or delete entire words or paragraphs with just a few key presses.
Some applications may not support a few of these shortcuts, but most applications support the majority of them. Many are built into the standard text-editing fields on Windows and other operating systems.
Working With Words
We’re used to the arrow, Backspace, and Delete keys working with a single character at a time. However, we can add the Ctrl key to have them effect entire words or paragraph at the same time.
Ctrl+Left Arrow – Move cursor to beginning of previous word.
Ctrl+Right Arrow – Move cursor to beginning of next word
Ctrl+Backspace – Delete previous word.
Ctrl+Delete – Delete next word.
Ctrl+Up Arrow – Move cursor to beginning of paragraph.
Ctrl+Down Arrow – Move cursor to end of paragraph.
Mac Users: Use the Option key instead of the Ctrl key.
Moving the Cursor
The Ctrl key can also be combined with the Home and End keys.
Home – Move cursor to beginning of current line.
End – Move cursor to end of current line.
Ctrl+Home – Move cursor to top of the text entry field.
Ctrl+End – Move cursor to bottom of the text entry field.
Page Up – Move cursor up a frame.
Page Down – Move cursor down a frame.
Selecting Text
All of the above shortcuts can be combined with the Shift key to select text.
Shift+Left or Right Arrow Keys – Select characters one at a time.
Shift+Up or Down Arrow Keys – Select lines one at a time.
Shift+Ctrl+Left or Right Arrow Keys – Select words – keep pressing the arrow keys to select additional words.
Shift+Ctrl+Up or Down Arrow Keys – Select paragraphs.
Shift+Home – Select the text between the cursor and the beginning of the current line.
Shift+End – Select the text between the cursor and the end of the current line.
Shift+Ctrl+Home – Select the text between the cursor and the beginning of the text entry field.
Shift+Ctrl+End – Select the text between the cursor and the end of the text entry field.
Shift+Page Down – Select a frame of text below the cursor.
Shift+Page Up – Select a frame of text above the cursor.
Ctrl+A – Select all text.
You can use several of these shortcuts to fine-tine your selected text. For example, you could press Shift+End to select the text to the end of the current line, and then press Shift+Down to also select the line below it.

After selecting text, you can start typing immediately to replace the text – you don’t have to press Delete first.

Editing
You can really speed up text-editing by using the Ctrl keyboard shortcuts to copy and paste text.
Ctrl+C, Ctrl+Insert – Copy selected text.
Ctrl+X, Shift+Delete – Cut selected text.
Ctrl+V, Shift+Insert – Paste text at cursor.
Ctrl+Z – Undo.
Ctrl+Y – Redo.
Formatting
Formatting shortcuts only work if the application or website you’re using supports text formatting. If you have text selected, the shortcut will apply the formatting to your selected text. If you don’t have text selected, the shortcut will toggle the associated formatting option.
Ctrl+B – Bold.
Ctrl+I – Italic.
Ctrl+U – Underline.
Functions
These function keys are common to most text-editing applications. If you use them in your web browser, you’ll open your browser’s associated dialogs.
Ctrl+F – Find. This opens the find dialog in most applications to search for text — I’ve even seen it work in some applications that didn’t have a Find option in their menus.
F3 – Find next.
Shift+F3 – Find previous.
Ctrl+O – Open.
Ctrl+S – Save.
Ctrl+N – New document.
Ctrl+P – Print.
These keys work in most applications, but are particularly useful in text editors:
Alt – Activate application’s menu bar. You can use the arrow keys to select a menu option and the Enter key to activate it.
Alt+F – Open File menu.
Alt+E – Open Edit menu.
Alt+V – Open View menu.
Uncategorized

HOW TO MAKE UNLIMITED GMAILS!

 HOW TO MAKE UNLIMITED GMAILS! 
this method is very simple
1. You will need an valid gmail account already for this trick i\’m going to say that my gmail account is this as an example: Chucky7321@gmail.com
2. After you already have a valid gmail account you will need to go to this site: https://generator.email/blog/gmail-generator
3. When you in that site you going to want to put the username of your valid gmail account for example mine will be masonhayes7321 without @gmail.com put that in the generator
(Just put your valid gmail on that site and click generate)
4. the site will generate tons of mails you want to use those gmails for anything you need and you will receive the messages on your valid email
all the messages people send to those generated emails i will receive it on my valid email that it is Chucky7321@gmail.com so copy any of those generated email from the site and you will receive the email message on your valid gmail
Uncategorized

Weekly poll: the Huawei P40 phones are so good, but can you love them with no GMS on board?

Weekly poll: the Huawei P40 phones are so good, but can you love them with no GMS on board?
The company even unveiled its own voice assistant, video chat and Cast protocol, but the question remains – would you buy these phones and leave the Google ecosystem behind? Huawei P40 Huawei P40 Pro Huawei P40 Pro First, let\’s consider why it\’s so tempting to do so. The Huawei P40 Pro brings the brand\’s first high refresh rate display and reworks the complicated hardware above the screen – the IR face scanner, ToF and gesture sensor are still on board, but they now live in a pill-shaped punch hole that\’s way smaller than the Mate 20 Pro notch. The Huawei P40 costs €800, saving you €200 compared to the Pro.
Uncategorized

Tips for spamming emails

Tips for spamming emails 
All emails leads have a robot that detects a link which they\’re gonna check the source of the link to know the content of it.
This is why you send letter without link and it comes inbox and when you send with your spamming link it goes to junk.
When a robot detects your link then your scama will be down because they will report to your host to turn off your service because you\’re phishing.
Two type of detection in scama… 
1) detected from host 
2) detected from email 
When a scama is detected by host it means that the scam dosen\’t have a good antibots which means the providers will know that a malicious zip file or folder have been uploaded on there server…..it also affect link and you will see something like suspended when you try to load your shell or cpanel.
Detected from email is when robot detects your link and send report to your host that you are phishing…….They will also blacklist your link and block any link From your panel or shell from coming inbox. 
How to avoid 
Use clean scama with anti bots
First prevention from host
Use encrypted letter and link to redirect and make scama green always…… 
Protect your link……
Uncategorized

Samsung Galaxy M01 with Android 10 certified by the Wi-Fi Alliance

Samsung Galaxy M01 with Android 10 certified by the Wi-Fi Alliance
A couple of weeks back, SamMobile reported about a Galaxy M01 device. More recently, this unannounced Galaxy M01 device has been certified by the Wi-Fi Alliance with support for Wi-Fi b/g/n. No other details about the Galaxy M01 are known, but the recent Wi-Fi Alliance certification suggests its launch should be imminent.
Uncategorized

HOW TO USE AN EMAIL ADDRESS MULTIPLE TIMES ON A WEBSITE.

HOW TO USE AN EMAIL ADDRESS MULTIPLE TIMES ON A WEBSITE. 
Hello, I believe You are Reading This Email Article either Because
You need help either in Using Your Email Address Multiple Times On a Website or
Creating a Gmail without OTP.
To Use an Email or Gmail Address Multiple Times all You need to do is to add a dot in between the mail address name. For example add a dot in between any where in the email address.
Let’s Me Explain, for Better understanding…
 I will be using this email address
LEARNHACKINN@gmail.com 
as example.
For example you registered
LEARNHACKINN@gmail.com 
on Netflix and You want to create another account on NETFLIX again using the same address u Just add a dot Like this,
L.EARNHACKINN@gmail.com 
and You will see it will be accepted.
What will happen to messages sent to the custom email address?
Don’t panic About your messages because all Your Messages sent  will be received on your main inbox.
That is all Messages sent to
 L.EARNHACKINN@gmail.com 
will be Automatically forwarded to
 LEARNHACKINN@gmail.com 
but it may take a little while like 1 – 3 minutes.
That\’s all.
I hope you guys like this tutorial.
Thanks for reading have a nice day. 😉
Uncategorized

Huawei P40 Lineup Uses BOE Screens

Huawei P40 lineup uses BOE screens
The Huawei P40 family debuted yesterday with two different displays – vanilla P40 with a flat 6.1\” OLED of FullHD resolution, and quad-curved 90Hz 6.6\” OLED for the P40 Pro and P40 Pro wioth 1200x2640px resolution. Huawei P40 Pro Huawei P40 BOE was really proud of its accomplishment with the curved panels of the P40 Pro and P40 Pro that also have a depth/biometric sensor tucked in the punch hole. The basic P40 has two cameras and this was more of a two-punch-hole solution.
Uncategorized

Huawei P40 Pro Review

Huawei P40 Pro review
Score:- 4.4
Body: Glass front and back, aluminum frame; IP68-rated for dust and water resistance.
Screen: 6.58\” quad-curved OLED, 1,200×2,640px resolution (440ppi); HDR10.
Chipset: Kirin 990 5G, octa-core processor (2xA76 @2.86GHz + 2xA76 @2.36GHz +4xA55 @1.95GHz), Mali-G76 MP16 GPU, dual-core NPU.
Memory: 8GB RAM, 256GB UFS3.0 storage (expandable via Nano Memory – hybrid slot).
OS/Software: Android 10, EMUI 10.1.
Rear camera: Primary: 50MP (RYYB filter), 1/1.28\” sensor size, 23mm f/1.8 lens, OIS, PDAF; Telephoto: 8MP (RYYB filter) 1/4.0\” with periscope 125mm f/3.4 OIS lens, 5x optical and 10x hybrid zoom, PDAF; Ultra wide angle: 40MP (RGGB filter), 1/1.54\”, 18mm, f/1.8, PDAF; ToF camera; 4K@60fps video capture, 720@7680fps slow-mo; Leica co-developed.
Front camera: 32MP, f/2.2, 26mm; ToF camera.
Battery: 4,200mAh; Super Charge 40W; 27W wireless charging; 27W reverse wireless charging.
Security: Fingerprint reader (under display, optical), 3D face recognition.
Connectivity: 5G/4G/3G/GSM; Dual SIM, Wi-Fi 6+, Dual-band GPS, Bluetooth 5.1 + LE, NFC, USB Type-C.
Misc: IR blaster, acoustic display acts as earpiece, bottom-firing loudspeaker.
 
Uncategorized

HOW TO BYPASS SOFTWARE REGISTRATIONS

 HOW TO BYPASS SOFTWARE REGISTRATIONS 
( I mean bypass softwares which ask keys to register or premium upgrade)
➖➖➖➖➖➖➖➖➖➖➖
REQUIREMENTS
Windows (for examples only, debuggers exist across platforms)
 A debugger installed: IDA, ollydbg, etc.
STEPS
Step 1 Test the Program
First, run the program that you are attempting to reverse engineer and try to activate it with a random key to verify that you need a valid software key to proceed. This is to verify that we can come up with the keys.
 Step 2 Run the Program in a Debugger
Run ollydbg.
Open up the program you wish to bypass with ollydbg.
Click the play button to run the program with the debugger attached.
Right click the CPU window, and click Search For > All intermodular calls.
Search for high interest DLLs. GETDLGITEMTEXT, will be for dialog boxes, which get called when you try to enter a software key.
By stepping into the function with the debugger, we can examine the registration specifically. 
SENDDLGITEM could be used as well.
Test to see which one works to break out of the activation loop by right clicking the DLL call and setting a breakpoint for all instances of that call.
Resume the program and enter any software key you feel like. 
 If the debugger breaks (pauses the program\’s execution) after entering your key, then you know you found DLL in step 5.
Press F8 back in the CPU window to force the next step until you get to the TEST EAX. EAX is the return of a value, which means that a check is being performed here. 
Upon examination, we can see that the EAX is checking for a number that is not equal to a null value. This means that if it is replaced with anything other than null, it will run.
Right-click the EAX and change it in hex value to 1, instead of 0.
 Resume the program again, and you will have successfully activated the program.
This works because you are making the process jump from one register and skip the one that verifies the key entered. 
I hope you all understand this.. I will try to make a video for this and upload to our YouTube channel Raylessbloggers
I\’m sorry for not posting continuously bcoz I\’m busy with my clg.. I will try my best to post ..please stay tuned
Uncategorized

How to enter your passcode on a cracked iPhone screen

 How to enter your passcode on a cracked iPhone screen

Hold down the Home button to activate Siri. Say Turn on VoiceOver
Press the Home button twice to bring up the passcode screen.
Use the portion of your screen that responds to touch to swipe left and right, which will move your VoiceOver cursor to different passcode number buttons. VoiceOver will also say the button being selected, which is helpful if you can\’t see the screen.
When the cursor is on the next passcode number you need, double tap to “tap” the selected passcode number.
After the iPhone unlocks, you may need VoiceOver one last time to tap “Trust” in the dialog that comes up when you plug in your iPhone to your computer.
Copy your photos and/or make your backup in iTunes!
To turn off VoiceOver, you can say “Turn off VoiceOver” to Siri, or go into Settings > General > Accessibility to turn it off manually.