Uncategorized

How to use RDP on android phone

How to use RDP on android phone
➖➖➖➖➖➖➖➖➖➖➖
➖➖
Download and install the Microsoft Remote Desktop app.
Open the app and accept the *terms and conditions*.
Tap the *Plus (+)* icon in the top right corner and choose *desktop*.
 Enter the IP address of the Remote Desktop server and then tap the username input and select add a user.
Now enter the username and password and tap save.
 Now tap the PC icon to connect to the RD.
 Tick accept certificate or do not prompt me again on this PC in case you\’re prompted with a certificate window.
   Credits :- stark
Uncategorized

42+ Text-Editing Keyboard Shortcuts That Work Almost Everywhere

42+ Text-Editing Keyboard Shortcuts That Work Almost Everywhere
Whether you’re typing an email in your browser or writing in a word processor, there are convenient keyboard shortcuts usable in almost every application. You can copy, select, or delete entire words or paragraphs with just a few key presses.
Some applications may not support a few of these shortcuts, but most applications support the majority of them. Many are built into the standard text-editing fields on Windows and other operating systems.
Working With Words
We’re used to the arrow, Backspace, and Delete keys working with a single character at a time. However, we can add the Ctrl key to have them effect entire words or paragraph at the same time.
Ctrl+Left Arrow – Move cursor to beginning of previous word.
Ctrl+Right Arrow – Move cursor to beginning of next word
Ctrl+Backspace – Delete previous word.
Ctrl+Delete – Delete next word.
Ctrl+Up Arrow – Move cursor to beginning of paragraph.
Ctrl+Down Arrow – Move cursor to end of paragraph.
Mac Users: Use the Option key instead of the Ctrl key.
Moving the Cursor
The Ctrl key can also be combined with the Home and End keys.
Home – Move cursor to beginning of current line.
End – Move cursor to end of current line.
Ctrl+Home – Move cursor to top of the text entry field.
Ctrl+End – Move cursor to bottom of the text entry field.
Page Up – Move cursor up a frame.
Page Down – Move cursor down a frame.
Selecting Text
All of the above shortcuts can be combined with the Shift key to select text.
Shift+Left or Right Arrow Keys – Select characters one at a time.
Shift+Up or Down Arrow Keys – Select lines one at a time.
Shift+Ctrl+Left or Right Arrow Keys – Select words – keep pressing the arrow keys to select additional words.
Shift+Ctrl+Up or Down Arrow Keys – Select paragraphs.
Shift+Home – Select the text between the cursor and the beginning of the current line.
Shift+End – Select the text between the cursor and the end of the current line.
Shift+Ctrl+Home – Select the text between the cursor and the beginning of the text entry field.
Shift+Ctrl+End – Select the text between the cursor and the end of the text entry field.
Shift+Page Down – Select a frame of text below the cursor.
Shift+Page Up – Select a frame of text above the cursor.
Ctrl+A – Select all text.
You can use several of these shortcuts to fine-tine your selected text. For example, you could press Shift+End to select the text to the end of the current line, and then press Shift+Down to also select the line below it.

After selecting text, you can start typing immediately to replace the text – you don’t have to press Delete first.

Editing
You can really speed up text-editing by using the Ctrl keyboard shortcuts to copy and paste text.
Ctrl+C, Ctrl+Insert – Copy selected text.
Ctrl+X, Shift+Delete – Cut selected text.
Ctrl+V, Shift+Insert – Paste text at cursor.
Ctrl+Z – Undo.
Ctrl+Y – Redo.
Formatting
Formatting shortcuts only work if the application or website you’re using supports text formatting. If you have text selected, the shortcut will apply the formatting to your selected text. If you don’t have text selected, the shortcut will toggle the associated formatting option.
Ctrl+B – Bold.
Ctrl+I – Italic.
Ctrl+U – Underline.
Functions
These function keys are common to most text-editing applications. If you use them in your web browser, you’ll open your browser’s associated dialogs.
Ctrl+F – Find. This opens the find dialog in most applications to search for text — I’ve even seen it work in some applications that didn’t have a Find option in their menus.
F3 – Find next.
Shift+F3 – Find previous.
Ctrl+O – Open.
Ctrl+S – Save.
Ctrl+N – New document.
Ctrl+P – Print.
These keys work in most applications, but are particularly useful in text editors:
Alt – Activate application’s menu bar. You can use the arrow keys to select a menu option and the Enter key to activate it.
Alt+F – Open File menu.
Alt+E – Open Edit menu.
Alt+V – Open View menu.
Uncategorized

HOW TO MAKE UNLIMITED GMAILS!

 HOW TO MAKE UNLIMITED GMAILS! 
this method is very simple
1. You will need an valid gmail account already for this trick i\’m going to say that my gmail account is this as an example: Chucky7321@gmail.com
2. After you already have a valid gmail account you will need to go to this site: https://generator.email/blog/gmail-generator
3. When you in that site you going to want to put the username of your valid gmail account for example mine will be masonhayes7321 without @gmail.com put that in the generator
(Just put your valid gmail on that site and click generate)
4. the site will generate tons of mails you want to use those gmails for anything you need and you will receive the messages on your valid email
all the messages people send to those generated emails i will receive it on my valid email that it is Chucky7321@gmail.com so copy any of those generated email from the site and you will receive the email message on your valid gmail
Uncategorized

Tips for spamming emails

Tips for spamming emails 
All emails leads have a robot that detects a link which they\’re gonna check the source of the link to know the content of it.
This is why you send letter without link and it comes inbox and when you send with your spamming link it goes to junk.
When a robot detects your link then your scama will be down because they will report to your host to turn off your service because you\’re phishing.
Two type of detection in scama… 
1) detected from host 
2) detected from email 
When a scama is detected by host it means that the scam dosen\’t have a good antibots which means the providers will know that a malicious zip file or folder have been uploaded on there server…..it also affect link and you will see something like suspended when you try to load your shell or cpanel.
Detected from email is when robot detects your link and send report to your host that you are phishing…….They will also blacklist your link and block any link From your panel or shell from coming inbox. 
How to avoid 
Use clean scama with anti bots
First prevention from host
Use encrypted letter and link to redirect and make scama green always…… 
Protect your link……
Uncategorized

HOW TO USE AN EMAIL ADDRESS MULTIPLE TIMES ON A WEBSITE.

HOW TO USE AN EMAIL ADDRESS MULTIPLE TIMES ON A WEBSITE. 
Hello, I believe You are Reading This Email Article either Because
You need help either in Using Your Email Address Multiple Times On a Website or
Creating a Gmail without OTP.
To Use an Email or Gmail Address Multiple Times all You need to do is to add a dot in between the mail address name. For example add a dot in between any where in the email address.
Let’s Me Explain, for Better understanding…
 I will be using this email address
LEARNHACKINN@gmail.com 
as example.
For example you registered
LEARNHACKINN@gmail.com 
on Netflix and You want to create another account on NETFLIX again using the same address u Just add a dot Like this,
L.EARNHACKINN@gmail.com 
and You will see it will be accepted.
What will happen to messages sent to the custom email address?
Don’t panic About your messages because all Your Messages sent  will be received on your main inbox.
That is all Messages sent to
 L.EARNHACKINN@gmail.com 
will be Automatically forwarded to
 LEARNHACKINN@gmail.com 
but it may take a little while like 1 – 3 minutes.
That\’s all.
I hope you guys like this tutorial.
Thanks for reading have a nice day. 😉
Uncategorized

HOW TO BYPASS SOFTWARE REGISTRATIONS

 HOW TO BYPASS SOFTWARE REGISTRATIONS 
( I mean bypass softwares which ask keys to register or premium upgrade)
➖➖➖➖➖➖➖➖➖➖➖
REQUIREMENTS
Windows (for examples only, debuggers exist across platforms)
 A debugger installed: IDA, ollydbg, etc.
STEPS
Step 1 Test the Program
First, run the program that you are attempting to reverse engineer and try to activate it with a random key to verify that you need a valid software key to proceed. This is to verify that we can come up with the keys.
 Step 2 Run the Program in a Debugger
Run ollydbg.
Open up the program you wish to bypass with ollydbg.
Click the play button to run the program with the debugger attached.
Right click the CPU window, and click Search For > All intermodular calls.
Search for high interest DLLs. GETDLGITEMTEXT, will be for dialog boxes, which get called when you try to enter a software key.
By stepping into the function with the debugger, we can examine the registration specifically. 
SENDDLGITEM could be used as well.
Test to see which one works to break out of the activation loop by right clicking the DLL call and setting a breakpoint for all instances of that call.
Resume the program and enter any software key you feel like. 
 If the debugger breaks (pauses the program\’s execution) after entering your key, then you know you found DLL in step 5.
Press F8 back in the CPU window to force the next step until you get to the TEST EAX. EAX is the return of a value, which means that a check is being performed here. 
Upon examination, we can see that the EAX is checking for a number that is not equal to a null value. This means that if it is replaced with anything other than null, it will run.
Right-click the EAX and change it in hex value to 1, instead of 0.
 Resume the program again, and you will have successfully activated the program.
This works because you are making the process jump from one register and skip the one that verifies the key entered. 
I hope you all understand this.. I will try to make a video for this and upload to our YouTube channel Raylessbloggers
I\’m sorry for not posting continuously bcoz I\’m busy with my clg.. I will try my best to post ..please stay tuned
Uncategorized

How to enter your passcode on a cracked iPhone screen

 How to enter your passcode on a cracked iPhone screen

Hold down the Home button to activate Siri. Say Turn on VoiceOver
Press the Home button twice to bring up the passcode screen.
Use the portion of your screen that responds to touch to swipe left and right, which will move your VoiceOver cursor to different passcode number buttons. VoiceOver will also say the button being selected, which is helpful if you can\’t see the screen.
When the cursor is on the next passcode number you need, double tap to “tap” the selected passcode number.
After the iPhone unlocks, you may need VoiceOver one last time to tap “Trust” in the dialog that comes up when you plug in your iPhone to your computer.
Copy your photos and/or make your backup in iTunes!
To turn off VoiceOver, you can say “Turn off VoiceOver” to Siri, or go into Settings > General > Accessibility to turn it off manually.
Uncategorized

( MUST READ) Common Sense Security Strategies in the Digital World

You’ve been Hacked! Pwned! Account Compromised. Bank account emptied. Credit cards were stolen and sold on the dark web. Facebook account hacked, now inappropriate messages or videos sent to your friends and family members. New accounts and credit cards opened in your name. Or worse, you’re on a vacation and suddenly your credit card is declined or you’re in the airport and your flight is canceled. Maybe you’re traveling through an airport and someone skims your credit card and starts making transactions while you’re in the air. What would you do? How long would it take you to respond? How many times have you received a phone call that says you have to pay some portion of a bitcoin (BTC), or a webcam video of you doing something inappropriate is going to be sent to all your contacts. 
These are just a few of the scenarios that can and do happen in our increasingly connected world. With the Samsung Pay and Apple Pay, mobile payments that can be performed with your cell phone, Apple Watch, or Android Wear watch and the increasing number of Mobile devices and Internet of Things (IoT) devices security is paramount for everyone no matter what your career field or socioeconomic status. The purpose of this article is to give you some common sense tips to protect yourself and also give you the ability to help your friends and family stay safe online as well.
Part 1: Facebook:
As of the time of writing this article, Facebook has approximately 2.23 Billion users worldwide and that means that even if you are not on Facebook, many of your friends might be. So you don’t have a Facebook account you say so you’re not at risk? Well, that’s not exactly true because of a trend called cybersquatting…That means that someone can claim your Facebook name and effectively pose as you simply by creating an account in your name even if you don’t have a Facebook account. Or maybe you don’t check Facebook that often. It’s also plausible that someone might make a Facebook account that is similar to yours and people in your network or friends of your friends might send you a friend request thinking that it’s you. Additionally, you absolutely should go into your Facebook account and view your profile as someone else sees it to make sure you’re not sharing information with people you don’t want to. If you’ve seen the news recently, hackers were able to exploit a vulnerability in the supposedly secure tokens that allow you to view your profile as one of your friends.
Part 2: Passwords and Password vaults
There are three kinds of users in this world: 1. Those that use the same password for everything 2. Those that write their passwords down so they won’t forget, and 3. Those that use password vaults/generators. Passwords are the last line of defense when it comes to security and often the first thing that bad guys go after. Commonly referred to as creds, the usernames and passwords are what hackers seek to exfiltrate from the networks and systems they go after. Passwords should be changed at a minimum every 90 days and should be a complex pattern of letters, numbers, and special characters that are not easily guessed or cracked. No dictionary words allowed or any of the potential answers to your secret questions.
It doesn’t matter really the password service you use, just use one. Whether it’s LastPass, Dashlane, KeePass, or Apple’s built-in password manager. Every password in the wild is another chance for a bad guy to exploit.
Part 3: App downloads
Third party app stores are the primary way that ransomware and crypto miners are spread in the wild. Even Amazon’s own app store requires you to allow apps from unknown sources if you don’t have an Amazon-branded device. Bottom line, don’t use app stores you don’t know and us security software if possible (though that doesn’t provide much protection). Mobile apps are special in that each app runs code on a mobile device and can be reverse engineered/exploited by anyone with enough time and effort. Mobile apps are usually digitally signed by Apple and Google, but that is easily faked. Mobile apps live in an operating environment that is full of security vulnerabilities and exploits and many of them cannot be fixed because they are controlled by the carriers or equipment manufacturers. Carriers like T-Mobile, Verizon, AT&T and Sprint, many of which don’t have an interest in fixing the vulnerabilities because they are more interested in getting you to buy a new phone every year or every other year. Because data plans are at a premium, carriers can charge ridiculous amounts of money for data and wireless hotspot plans. With the introduction of 5G service, this will only amplify the speed at which attackers can serve up exploits to mobile users. Apple is notorious for convincing users to upgrade to new devices because of some new feature or operating system version and eventually, devices will no longer run the latest and greatest Operating System (anyone still remember the iPod touch?)
Uncategorized

How To Hack Android Games without rooting using Game Killer.

How To Hack Android Games without rooting using Game Killer.
Download Game KIller
#1. Download & Install Game Killer Apk 2019
#2. Tap the Game Killer icon and start up the app, give it a few seconds to fully load and the main menu should appear with a list of options, tap the first option which says “Hack Android Games Without Root” and another screen should pop up with a long list of supported games.
#3. Once you’ve found the Android game you want to hack, tap on it’s name and you’ll be taken to another screen with a list of hacks you can activate.
#4. This process depending on which game you’re hacking, there may be options such as unlimited gold, Hack unlimited gems, god mode, unlocking all characters and levels, etc.
#5. Select which hacks you’d like to use and press the back button on the bottom of the screen.
#6. Game Killer will launch a hacked instance of the game with your desired hacks, for most games you can log into the game normally and still have the items which you hacked, but some games require to be launched with Game Killer in order to keep the hacked items.
Wrap Up: So above is all two different methods to hack android games without root 2020. 
These methods are working and tested in 2020. All about how to hack android games no root. Game hackers, Game killer and without a rooting Android phone are in above.
Uncategorized

How to remove a Trojan, Virus, Worm, or other Malware from Windows, follow these steps

How to remove a Trojan, Virus, Worm, or other Malware from Windows, follow these steps 
STEP 1: Use Rkill to terminate suspicious programs
STEP 2: Use Malwarebytes to remove Trojans, Rootkits, or other Malware
STEP 3: Use HitmanPro to scan for Browser Hijackers and Adware
STEP 4: Use Zemana AntiMalware Free to remove Potentially Unwanted Programs
(OPTIONAL) STEP 5: Double-check for malicious programs with Emsisoft Emergency Kit
(OPTIONAL) STEP 6: Reset your browser to default settings
Uncategorized

HOW TO TRACE A MISSING OR STOLEN PHONE

HOW TO TRACE A MISSING OR
STOLEN PHONE

If you lose your mobile phone,
you can trace it without going to
the police.
Most of us always fear that our
phones may be stolen at any time.
Each phone carries a unique
IMEI no. i.e. International Mobile
Equipment Identity No which can
be used to track it anywhere in
the world.
This is how it works:
1. Dial *#06# from your mobile.
2. Your mobile phone shows a
unique 15 digit.
3. Note down this number at a
secure place except in your mobile
phone itself as this is the number
which will help trace your phone
in case of theft.
4. Once stolen, just E-mail this 15
digit IMEI No. to cop@vsnl.net
with details as stated below:
Your name:____________________
Address:______________________
Phone model:_________________
Make:_________________________
Last used No.:_________________
E-mail for communication:_____
Missed date:___________________
IMEI No :_______________________
5.Your Mobile will be traced within
next 24 hours via a complex
system of GPRS and internet, You
will find where your hand set is
being operated and the new user\’s
No. will be sent to your email.
6. After this, you can inform the
Police with the details you now
have.
Uncategorized

​​HOW TO UNLOCK LOCK PATTERN USING COMMAND PROMPT

​​HOW TO UNLOCK LOCK PATTERN USING COMMAND PROMPT 
 Steps :-
1 Connect your android phone to your computer.
2 Open Command prompt administrator.
3 Now in command prompt window type following code carefully  adb shell cd/data/data/com.android.providers.settings/databases sqlites settings.db  update system set value=0 where name=’lockpatternautolock’; update system set value=0 where name=’lockscreen.lockedoutpermanently’; .quit
4 Now you will see some screen as shown below and then you can reboot your phone and now when your android starts again, then try unlocking it using any random pattern and it will unlock and work pretty fine.
5 If you face any problem repeat same steps but instead of the above code tru using  adb shell rm/data/system/gesture.key and the press enter and now reboot your device to see if it works.
Uncategorized

HOW TO RUN .EXE ON ANDROID

HOW TO RUN .EXE ON ANDROID 
Files with the EXE extension are executable files intended for use within Windows or MS-DOS. You can\’t make all EXE files work on an Android. However, many older DOS-based EXE files can be opened with the DOS emulator DOSBox.
Step 1
Install a DOSBox app on your Android device. AnDOSBox, aDosBox and DosBox Turbo are three different DOSBox apps available from the Google Play store.
Step 2
Open the DOSBox app.
Step 3
Type \”cd \\foldername\” into the command line, where \”foldername\” denotes the folder in which your EXE is contained. For example, if your EXE is in the Download folder, type \”cd \\download.\”
Step 4
Click Enter on your Android keyboard.
Step 5
Enter the name of the EXE file. You do not need to enter the .exe extension.
Step 6
Tap \”Enter\” on your Android keyboard.