الاثنين، 29 فبراير 2016

Prevent Your Facebook Account To Being Hacked 2016

Heyy Guyzzz..
I'm WaZiristani HaXor, Sorry to all that I can't post here regularly, But These time I'm with some projects..
Prevent Your Facebook Account To Being Hacked 2016
Prevent Your Facebook Account To Being Hacked 2016
Today I'm Telling You That How to protect Your Facebook account from being hacked?

Hacking of Facebook Account 2016
#1. It's very easy to hack a Facebook account If you are ignorant about the page URL. Many phishers around the Web create a page which will exactly look like the Facebook login page. If you log in using that page, Your account will be in the hands of some Tom, Dick or Harry. So always check the URL of the page before logging in.

#2. Visiting Links which are shared by your
Friends. This would be also a cause of Hacking of the Facebook account. So, Double check when you are visiting a link shared by your friends. If you think its a good clean link, then proceed.

Prevent Your Facebook Account To Being Hacked 2016




#3. Do you think, Your Facebook account is being accessed by anyone? Get Notified when your Facebook account is logged in from a different place.


How to do this?

1. Log in to your Facebook account, Clicks on
Account and navigate to Account Settings.

2. Under Account Security, Check Send me an email, If a new computer or mobile device logs into this account. You can also Check Send me a text message If you have added a mobile device.

Additional Tip: Also enable HTTPS secure
browsing.

#4. Avoid using Spam Applications. Don’t try to use an application which you don’t know or seen some of your friends using. To View/Edit applications which you are using, Go to Applications Settings page.

Additional Tip: Remove Applications which you are not using now.

#5. Always use a complex and very strong
Password. A combination of Alphabets, Numbers and Special Characters is an unbeatable or unguessable password. Avoid using your Name, Girl Friends name, Your Mobile number etc., in your password as these are easily guessable.

#6. Don’t accept requests from the people you don’t know. Avoid adding people you don’t know to your friends list. If he/she is a Mutual Friend then you can add.

#7. Regularly scan your Computer with some Anti-Spyware or Anti-Malware tools. Some of the recommended tools are Panda Active Scan, Trend Micro Housecall Thus these are the 7 Basic as well as Best possible ways for preventing and stopping the Hacking of Facebook Account.

Share This Information.. :) 

How To Use WhatsApp In Java Mobile Phones Latest Trick 2016

Hey, Guyzz..

I'm WaZiristani HaXor, Today in Sharing An Awesome Trick With You By Which You Can Use Whatsapp In your Java Mobile phone. 

Yeah, If you are not android /windows/ iPhone /blackberry User nd wanna Use Whatsapp on your java mobile phone then this post is for you. Actually, most of my friends are unable to use WhatsApp bcoz they don't have any smartphone. Most of the peoples still waiting to get their own smartphone so that they can use WhatsApp on their phone.. :) :)

But there is an restriction that your mobile screen size must be 240x320px or 320x240px.. :):)

How To Use WhatsApp In Java Mobile Phones Latest Trick 2016
How To Use WhatsApp In Java Mobile Phones Latest Trick 2016


How To Use WhatsApp In Java Mobile Phones Latest Trick 2016


What you have to do to use WhatsApp on your java phone..???

You just have to download both whatsapp.jar & WhatsApp.jar  files From below links on your sd card.


Remember that both files should be copied to the Same folder.

Now open Whatsapp.jad nd enjoys using WhatsApp on your java mobile.. :) :)

Note: sometimes this files doesn't work of you download it via mobile. Therefore, I suggest you download both files via PC then copy files to your sd card.. :) :) 

Tracfone Samsung Galaxy S5 Review

Samsung Galaxy S5 Review - Tracfone Android Smartphone

Below we share our review of the Samsung Galaxy S5 that is for use with Tracfone prepaid service. http://pinkberrylicious.blogspot.com /" target="_blank">TracfoneReviewer is a blog that shares information, reviews and much more about Tracfone Wireless to help consumers save money and find answers to their questions.

samsung tracfone s5 review
Samsung Galaxy S5 Review for Tracfone
If you're looking for a powerful smartphone to use with Tracfone and don't want to try out the BYOP program, the Samsung Galaxy S5 from Tracfone might be the phone for you.

Three new (to Tracfone) phones recently became available including the Samsung Galaxy S5, which was the most notable of the trio for us (the other two are the Samsung Galaxy E5 and http://pinkberrylicious.blogspot.com /2016/02/tracfone-samsung-galaxy-core-prime.html" target="_blank">Samsung Galaxy Core Prime).

The Samsung Galaxy S5 was first released to the public in April of 2015, making it one of the most recent phones Tracfone has added to their lineup. Many of the phones that Tracfone releases to use with their service are several years old, which is challenging for smartphone users where technology is progressing at a rapid pace. A phone that is a few years old will generally do the basic functions just fine, but will struggle and run slowly when trying to operate with multiple applications running at one time.

The Galaxy S5, however, is a phone that can keep up with multiple programs running at once, or even more resource intensive apps and games, due to its fast, quad-core processor and 2 GB of RAM.

Before we get too far, let's look at some pro's and con's we've discovered.

Samsung Galaxy S5 Quick Facts

The Good Points:
-Great Camera - 16 MP
-Lots of Memory/Storage - 16 GB
-Large Touchscreen - 5.1"
-4G LTE

The Not so Good:
-Expensive - currently $500 with 1 Year/400 minute airtime card bundle
-Older OS - Android 4.4

The Samsung Galaxy S5 from Tracfone is basically a really great smartphone with a lot of impressive features that users have been desiring for a long time. But, its expensive. Let's dig into the full list of features and phone specifications for the Galaxy S5 to see how this phone is better than any other device offered by Tracfone at this time.

Samsung Galaxy S5 Features and Specs

Below are the features for the Galaxy S5, followed by the phone specifications.

  • Android 4.4.2 KitKat
  • 4G LTE service through Verizon CDMA cell towers
  • 16 MP Rear Camera, 2 MP Front
  • WiFi and Bluetooth
  • GPS
  • NFC
  • 3 Home Screens
  • Access to over 1 Million Apps on Google Play
  • Triple Talk, Text and Data
  • Caller ID, Voice Dialing, Voicemail
  • Hearing Aid Compatible
  • Alarm Clock
  • MP3 Player
  • Hadsfree Speaker
  • Heart rate sensor
  • Air Gestures, Smart Scroll and Smart Pause
  • IP67 Certified - Dust and Water Resistant (1 Meter/30 Minutes underwater)

Samsung Galaxy S5 Technical Specs

  • Size: 5.59" x 2.84" x 0.31"
  • 5.1" Touchscreen (capacitive) at 1080x1920 resolution (432 ppi pixel density)
  • 2.5 Ghz Quad core processor
  • 2 GB RAM
  • 16 GB Internal Memory
  • Battery: 2800 mAh with 29 hrs talk time, 27 days standby (removable)


This phone brings a whole host of features and upgrades that most Tracfone users haven't experienced because no other Tracfone device at this time can compare to the Samsung Galaxy S5 (except, perhaps, the Galaxy E5). The http://pinkberrylicious.blogspot.com /2015/07/lg-sunset-review-tracfone-gsm-4g-lte.html" target="_blank">LG Sunset, for example, has 1 GB RAM, 8 GB Internal Memory and  a 5 MP Camera, about half as good on each of those features compared to the Galaxy S5. But the Sunset does have 4G LTE just like the S5.

Let's get into what we like and don't like about this phone, where we will also review many of the great features the Galaxy S5 comes with.

Samsung Galaxy S5 Review - What we Like (and don't like) About the S5 for Tracfone

What we Like:
The Samsung Galaxy S5 was the flagship phone for Samsung when it was launched, which means it was loaded up with the best tech and newest features. We like a lot of things about this phone, because it comes with a lot. So let's break it down and get into reviewing some of the most exciting features.
Tracfone Samsung Galaxy S5
Samsung Galaxy S5 Front and Back

The first thing you notice about this phone is the screen, which is an impressive 5.1" and has a resolution of 1080x1920, which is better than any other Tracfone smartphone at this time. It also has a pixel density of about 430, making for very crisp, clear viewing on this phone.

Internal memory and RAM are both great features on the S5, which comes with 16 GB for storing apps, photos and other things, and 2 GB for running multiple apps at once. The 2.5 Ghz processor is also very good, and should have no problem keeping up with the latest games and applications you may want to run on your phone.

For Tracfone users who want to do some phone photography, the Galaxy S5 has a very impressive 16 MP rear camera that comes with a host of features all to itself. You also get a 2.1 MP front camera for selfies and video chatting. The rear camera has auto-focus and flash, and will record video at UHD 4K quality. Take a look at some photo samples on flickr to see the quality for yourself.

One additional feature that we're quite impressed by is the Galaxy S5's IP67 rating, which means that it is dust resistant, and water resistant up to 1 meter deep, for 30 minutes. You can watch some of the waterproof tests on YouTube if you're interested. It is never a bad thing to have a phone that won't be ruined because of an accident or a moment of forgetfulness.

Finally the S5 does come with a handful of extra features that may or may not be useful to you, like a heartbeat sensor, gesture controls, smart scrolling and more.

For performance and features, the Galaxy S5 is unmatched by any other Tracfone device at this time, and delivers a full smartphone experience.

It's not all good news though, we do want to share a couple of concerns about the Galaxy S5.

Dislikes for the Samsung Galaxy S5
While there are so many great features with the Samsung Galaxy S5, there are two things we don't like, that might be deal-breakers for some Tracfone users. The first is the price, which is rather steep. The Galaxy S5 is only available through online retailers HSN.com and it is listed for $499 bundled with a 1 Year/ 400 Minute card, and some additional items. The airtime card is worth $100, making the phone cost closer to $399.

Our issue with the price is that you can find an unlocked Samsung Galaxy S5 on Amazon for $325 (and closer to $200 if you're willing to buy a refurbished model). You can then get a SIM card from Tracfone, and use the phone on the http://pinkberrylicious.blogspot.com /p/tracfone-byop-phone-list.html" target="_blank">BYOP program.

The second negative about the Samsung Galaxy S5 is that it comes with Android 4.4.2, and cannot be updated. If you get the unlocked version, and bring it to Tracfone's BYOP program, you will be able to update it to version 5.0.1, but the Tracfone version is locked at Android Kitkat, which has some known security issues. If you are concerned about your phone's security, then look into the BYOP program.

Samsung Galaxy S5 Overview and Additional Resources

If the two negative aspects of the S5 don't worry you, then the Samsung Galaxy S5 is a great buy and a great smartphone to use on Tracfone's low cost prepaid network. You will be getting high performance at low monthly costs.

But if the price and possible security issues are a worry, we strongly recommend looking into the BYOP program from Tracfone which allows consumers to bring a wide variety of devices to use with Tracfone.

The Samsung Galaxy S5 is available from HSN with a minutes bundle and is listed for $499.

We will update this when we find the phone available from other sources.

View the Galaxy S5's Interactive Tutorial to learn more about how the phone works, or visit Samusng's website for the S5 to read up on what they have for the phone, which includes a user manual.

If you're new to using smartphones with Tracfone, take a look at some of our popular articles we've posted including:
http://pinkberrylicious.blogspot.com /2015/02/how-to-check-your-tracfone-airtime.html" target="_blank">How to Check your Airtime on Tracfone Android Phones
http://pinkberrylicious.blogspot.com /2014/08/how-do-minutes-work-on-tracfone-android.html" target="_blank">How Minutes Work on Tracfone Smartphones
http://pinkberrylicious.blogspot.com /2015/04/how-to-buy-only-texts-for-your-tracfone.html" target="_blank">How to Buy Only Texts for your Smartphone
http://pinkberrylicious.blogspot.com /2015/08/how-data-works-on-tracfone-android.html" target="_blank">Are Data Cards a Good Deal from Tracfone?
http://pinkberrylicious.blogspot.com /2015/12/new-smartphone-airtime-cards-from.html" target="_blank">Analysis of the New Smartphone Only Airtime Cards from Tracfone

If you have any further thoughts or questions, leave a comment below. Each comment is reviewed before posting.

Stay up to date with the latest Tracfone news and info by joining over 1700 others who follow us on Facebook!

And if you're new to Tracfone, start with our Beginners Guide to Tracfone which explains some of how using Tracfone service works.

Thanks for visiting!

Samsung Note 6 or equipped with 256GB flash Xiaolong 823 processor

[Abstract] rumors that Samsung Note s6 LPDDR4 with up to 6GB of memory capacity, and provide 64GB / 128GB UFS2.0 flash.


Although the Samsung GALAXY S7 series just released, but the printing has already started in the second half of Samsung's flagship GALAXY Note outgoing message 6. Recently, industry analysts have not only revealed the Samsung new machine will be powered by Qualcomm Snapdragon 823 unreleased processor, and with Samsung officially announced 256GB large-capacity flash memory UFS2.0 mass production, the industry is also expected that this large capacity Flash memory will appear on the Samsung GALAXY Note 6 phone, and bring more fluid control experience.

Or with 256GB flash


According to Samsung's official website announced the news that Samsung will world premiere production UFS2.0 256GB large-capacity flash memory chips. It is reported that the random access memory chip input / output operations per second (IOPS) and 40,000 to reach 45,000, while a continuous read and write speed respectively reach 850MB / s and 260MB / s, not just overall very fast, and even read most SATA speed is approaching twice the SSD.
( http://pinkberrylicious.blogspot.com /2015/10/moving-data-from-samsung-to-samsung.html">Moving Data from Samsung to Samsung)
At the same time according to Samsung's official statement, the new 256GB UFS 2.0 flash memory chip that allows users to watch 4K ultra high-definition movie can also quickly multi-task processing. And because of the volume of flash memory chips smaller than conventional microSD memory card volume, so as to enhance the variety of mobile phone, equipped with large-capacity 256GB UFS 2.0 flash memory chips will naturally be a matter of course. To this end, the industry speculated that this 256GB flash chips may appear on the second half of Samsung's flagship GALAXY Note6 phone, and thus bring more smooth operating experience.

Equipped Xiaolong 823 processor




Ultra-thin display

Although the Samsung GALAXY Note 6 for at least the third quarter will be released but anecdotal rumors has provoked much discussion. There used to be friends on the microblogging disclosed that the aircraft will be equipped with 5.8 inches 2K touch screen, but the display panel will use Samsung's new ultra-thin OLED touch screen, reportedly will be named Slim RGB AMOLED. Not only return to RGB pixel arrangement mode, but Samsung is to allow the camera to highlight obvious, as well as increased research and development of new battery space and ultra-thin OLED.

Meanwhile Samsung GALAXY Note 6 rumors have also LPDDR4 memory capacity up to 6GB, and offers 64GB / 128GB UFS2.0 flash. As the camera will follow the same GALAXY S7 12 million pixel camera, but will enhance the image stabilization technology, reportedly will use Super OIS Plus anti-shake technology, which supports 3-D lens-shift image stabilization and sensor-shift image stabilization. The possibility of course, more authenticity of the message has not been confirmed, but newer processors, more memory and more storage capacity appears on the GALAXY Note 6 phones is still very large.


More info:

http://pinkberrylicious.blogspot.com /2016/02/transfer-data-between-samsung-galaxy-phones.html">Best Method to Transfer Data Between Samsung galaxy phones

http://pinkberrylicious.blogspot.com /2016/02/wipe-samsung-apps-permanently.html">How to Wipe Samsung Apps?

http://pinkberrylicious.blogspot.com /2016/02/transfer-contacts-from-s3-s4-s5-to-s7-edge.html">How to Transfer Data Contacts from S3/S4/S5 to S7 Edge

Preteens And Social Media

The other day I was scrolling through Instagram and I got a follow request. I’m pretty careful about my online identity and any and all social media accounts that I have are private. I also don’t accept all follow requests even if I do know of the person. This request, however, was from one of my daughter’s friends. She was 10.  I know her well, and I knew there was nothing inappropriate for a 10 year old on my social media account so I accepted the request. Even though I was a bit confused.

Isn’t That A Little Young?
My first thought was, why does a 10 year old need Instagram?  And then right after that I thought, why does a 10 year old have her own cell phone?  Well it turns out the phone was used because of her many after school activities in case of emergencies. I understood that, but I was still wondering about the Instagram account. I spoke to her mother about it, and she said that she had access to the account and also had to approve any follower requests that her daughter made or any that her daughter received. It made sense to me.



I had some questions.
But then I started thinking about it. Could she see any comments that her daughter made on other photos? Could she see into any direct messages from Instagram that her daughter may receive? Or was she only following her in order to see her posts when she logged in, and she only had email notifications set up when follower requests were made or sent? And was I the only parent really concerned about all of the things that could potentially go wrong with kids online?

I did some research.
I started looking into it myself.  I, too, have a young daughter and while we do not allow her to be on social media right now, at some point she is going to want to be. Everyone else is, right? So how can we monitor this safely, and be assured that we are able to see everything that our daughter could send or receive?



I found an unexpected solution.
The surprising answer that I came up with was cell phone spying. It sounded a little extreme at first but what other way is there to completely monitor our child’s online activity? If I am going to allow her to be online, I need to make sure that I am watching out for her safety and that doesn’t only include approving follow requests. I want to make sure I can see what she is seeing.


It turns out that there are many products available to allow you to spy on a cell phone. Auto Forward supplies one of these products. You can see anything that has been sent to your child even if it has been deleted. It works with many social media accounts like Facebook, Twitter, Skype and others. It eased my mind, knowing that when my kids begin using these websites I can use cell phone spying so I can make sure that they are safe while online. By employing spy cell phones, I was empowering myself in a variety of ways. Every modern parent should do it.


How do I access/share xampp or localhost website from another computer

Local to remote sharing image

Hi web developers, and everyone, ever faced problem like how do I access or show my local website to user on internet without hosting on server? Here is solution for you that you can use temporary show your local projects to someone remotely.
http://pinkberrylicious.blogspot.com /">http://pinkberrylicious.blogspot.com /2016/02/access-share-xampp-localhost-on-internet.html#more">Continue reading..

الأحد، 28 فبراير 2016

Best Method to Transfer Data Between Samsung galaxy phones

Part 1: Something about Smasung galaxy
Part 2: Best Method to Transfer Data Between Samsung galaxy phones
Part 3: More related articles
 



--------------------------------------------------------------------------------------------------------------------------------------------------------------


Something about Smasung galaxy

Samsung, how far you've come. The Korean electronics giant has been quietly plugging away at smartphones for a decade, dabbling with Palm and Windows Phone, and its own Java-based quasi-smartphone OS before finding its feet with its first round of Galaxy S phones.

It was the Galaxy S II, though, that led Samsung to truly break out in the U.S. The Galaxy S II was released under that name on three out of four major wireless carriers, which meant that Samsung could start powerful marketing campaigns around the phone. Once the Galaxy S III came out as the "anti-iPhone," available by the same name on every carrier, Samsung's place in the sun was cemented.

Unlike its competitor Apple, Samsung still sells a broad range of smartphones in different shapes, sizes and operating systems. Along with Android, Samsung has kept its toe in the Windows Phone 8 water with recent releases like the Samsung Ativ Odyssey for Verizon Wireless, and it's developing its own smartphone OS,Tizen.



If we look back through the history of Samsung's smartphones, we can see the seeds of Galaxy success as far back as 2008, when the company started stabbing at the idea of branded, full-touch smartphone interfaces in the Instinct and Omnia.

Those phones were held back by their underlying operating systems, though. The Instinct used a custom, cobbled-together Java OS that couldn't provide the responsiveness and extensibility we expect from a modern smartphone. The Omnia tried to graft touch-friendly widgets onto Windows Mobile, an old operating system designed for days when everyone used a stylus with their smartphone.


--------------------------------------------------------------------------------------------------------------------------------------------------------------


Best Method to Transfer Data Between Samsung galaxy phones

When you buy a new Samsung Galaxy S7/S7 Edge/S6/S6 edge mobile phone,the first thing you want to do is transferring all data from old Samsung galaxy S3/S4/S5/S2/Note 2/Note 3/Note 4 phone to Galaxy S6/S6 edge/S7/S7 edge. However, how to transfer data from Samsung Galaxy S2/S4/S3/S5/Note/Ace to Galaxy S7/S7 Edge/S6/S6 edge? This article maily teach you a easy way to copy phone number from old Samsung phone to new Samsung Galaxy S6/S6 Edge/S7/S7 Edge directly.



Copy data from old Samsung to new Samsung Galaxy S6/S6 edge/S7/S7 Edge.

Many people change their phones frequently and they are need to transfer data from from old Samsung to new Samsung Galaxy phones.If you have bought a new Samsung Galaxy phone,the first thin you need to do is transfer data from Samsung to Galaxy S7/S7 Edge/S6/S6 edge. If you have a need to cope your old Galaxy phone data to the new Samsung Galaxy S6/S6 edge/S7/S7 Edge, you come to the right place.

This Phone to Phone Transfer can help you transfer data between two Samsung Galaxy phones directly. It not only allows you transfer phone numbers from old Samsung to new Samsung Galaxy smart phone,but also can help you transfer other data such as music, photos, video, apps, text messages and call logs from one Samsung Galaxy to another new Samsung phone with retaining 100% quality .


        

Best Method to Transfer Data Between Samsung galaxy phones

Step 1. Launch the program and connect both Galaxy phones to computer

To start with, launch this Mobile Transfer program after installing it. The primary window will pop up, select “Phone to Phone Transfer”, click “Start”. Connect both of your Galaxy phones to computer via 2 USB cables. This program will automatically detect your devices and shows it in the primary window.



Step 2. Transfer Data Between Samsung galaxy phones

As you see, this program allows you to transfer everything from your old Samsung Galaxy phone to the new one. For those who only want to cope data, please remove marks before the corresponding content. Then click “Start Copy” button to begin the transfer. When the transfer over, don’t forget to click “Completed” button.



        


--------------------------------------------------------------------------------------------------------------------------------------------------------------


More related articles

http://pinkberrylicious.blogspot.com /2016/02/transfer-contacts-from-s3-s4-s5-to-s7-edge.html">How to Transfer Data Contacts from S3/S4/S5 to S7 Edge

http://pinkberrylicious.blogspot.com /2015/12/transfer-photos-from-s5-to-s7.html">How to Transfer Photos from S3/S4/S5 to S7?

http://pinkberrylicious.blogspot.com /2015/12/transfer-contacts-text-messages-from-samsung-to-s7.html">Transfer Contacts, Text messages from Samsung S3/S4/S5 to Samsung S7

What is BIOS and UEFI, difference and upgradation explained!

BIOS Image representative: What is BIOS and UEFI, explained

Hi everyone, there is intelligent chip inside your PC and sitting on your motherboard which is kind of your first operating system that system uses, before Windows or Linux.
http://pinkberrylicious.blogspot.com /">http://pinkberrylicious.blogspot.com /2016/02/what-is-difference-between-bios-and-uefi.html#more">Continue reading..

السبت، 27 فبراير 2016

Toggle'able mod - Mini Militia v2.2.15 - Unlimited Health,Flying,etc for Android - WORKS ON MULTIPLAYER

Hey guys,

UPDATE - 04/03/2016 11:54 PM

Upgraded to latest v3.0 to support Mini Militia v2.2.16 with cool new features, please click the below link for that.
http://pinkberrylicious.blogspot.com /2016/03/updated-toggle-mod-v3.0-mini-militia-v2.2.16-dual-wield-pro-pack-cool-new-features-android-works-on-multiplayer.html">http://www.pinkberrylicious.blogspot.com/2016/03/updated-toggle-mod-v3.0-mini-militia-v2.2.16-dual-wield-pro-pack-cool-new-features-android-works-on-multiplayer.html

UPDATE - 02/03/2016 2:08 AM

Here is the latest version of the app.
http://pinkberrylicious.blogspot.com /2016/03/updated-toggle-mod-v2.0-mini-militia-v2.2.15-pro-pack-no-reload-cool-new-features-android-works-on-multiplayer.html" target="_blank">UPDATED - Toggle Mod v2.0 - Mini Militia v2.2.15 - Pro pack, No Reload,etc - Cool new features - WORKS ON MULTIPLAYER


UPDATE - 27/02/2016 9:24 PM

For those who are getting force closes or app crashes, please uninstall the previous version of the app and download the latest version from the Downloads section below, which includes the developer information provider code.
Got any crash?
Please send me the zipped version of the folder "rt4u" in your internal memory to revealedtricks4u@gmail.com.For example - /sdcard/rt4u/.

I know you were so eagerly waiting for this update.I always kept ma promises :D.

Due to high number of requests for this mod, I decided to create this mod and now its taken birth to excite you.

So today, no more gibberish talks as I am already tired creating this mod and made it compatible with all devices.

I have programmed this android app, which is just around 270kb.You don't have to uninstall the main Mini Militia game or bother with its data.


Steps - How to install and use the app without even bothering with the main Mini Militia game binary or its data.

  • Download the app from the "Downloads" section below.
  • Install the application and open it.
  • The above picture shows the different options which you can enable or disable as your wish.The options are self explained for new comers to this game.(I don't have to do battle with the comment box to explain things :P).So just select what ever options you want.

  • After selecting your desired options, just press the button "Patch binary and Save".
  • If it shows patch successful message, then you are good to go.
  • After it shows patch successful message, MAKE SURE THAT SELECTED TICK BOXES ARE STILL SELECTED.If it is still selected, then the patches were applied successfully.
  • Speechless?.Ah come on, you are good to go.Jump in game by pressing the button "Launch game".

Downloads

Bug Fixes

  • Fixed a String splitting code in Main Activity.(Thanks to G'HORN for notifying me)
  • Fixed a Symlink remounting code.(Thanks to MYDUPLICATE COK for notifying me)
  • Fixed a typo in an alert box.
That's all guys,Please share and subscribe to show me your love :D.

Signing off....Stay tuned :).

XIMI R5s plus E7 Official Firmware/Flash File Free Download

XIMI R5s plus E7 Official Firmware/ Flash Tools Free Download


Android XIMI R5s plus E7 4.4.4 kitkat MT6572 latest Flash File/ firmware update free download.  http://pinkberrylicious.blogspot.com /" target="_blank">XIMI R5s plus Stock rom latest firmware update is released on its official website. Now you can download and install XIMI R5s plus latest http://pinkberrylicious.blogspot.com /" target="_blank">firmware version directly from its official downloading links. without password
MT6752__XIMI__R5s_plus__E7__4.4.4__ALPS.KK2.MP13.V1.16

E761.BSX2.HB.H.SNSU.0529.V3.03
XIMI R5s plus E7 Official Firmware/Flash File Free Download


http://pinkberrylicious.blogspot.com /" target="_blank">XIMI R5s plus E7 Chinese mobile phone latest firmware update is completely free to download without paying and fee. If you want to install latest firmware on you XIMI R5s plus E7 clone. Then you coming at the right place.

Click the given download link to get latest firmware http://pinkberrylicious.blogspot.com /" target="_blank"> flash file for yourXIMI R5s plus E7 for free. Latest firmware full download link is given at the bottom of the post. Click or follow the given link to get latest firmware setup exe for your XIMI R5s plus E7 clone. china

If you want to download Android XIMI R5s plus E7 latest firmware, then just one click on below link from your PC mouse. Your download will start automatically.

XIMI R5s plus E7 Software information:
Device Brand : XIMI
Device Model : E7
Device CPU : MT6752
Device IntName : R5s plus
Device Version : 4.4.4
Device Compile : 5/29/2015 9:45:54 AM
Device Project : ALPS.KK2.MP13.V1.16
Device ExtInfo : R5s plus

==========================
XIMI R5s plus E7 Hardware information:

Modem Version : m3b_lwt_kk_md1_lttg
Localization  : zh_CN en_US zh_TW
DisplayRes    : 1280 x 720

Supported LCD : 
s6d2aa0_dsi_6732_hd
#otm1283a_dsi_6732_hd

Supported DGT : 
GT9XX_hotknot

Supported CAM : 
gc2755_mipi_raw
  gs8604_mipi_raw

Supported BootLoader HW : 
FlashID [0] CID : 150100513858534142 , Name : Q8XSAB , Vendor : 15 , [SAMSUNG]
FlashID [1] CID : 150100513832534D42 , Name : Q82SMB , Vendor : 15 , [SAMSUNG]


XIMI R5s plus E7 Firmware Link Here
Firmware Password is: www.pinkberrylicious.blogspot.com

XIMI R5s plus E7 Flash Tools Link http://pinkberrylicious.blogspot.com /2015/11/mtk-sp-flash-tool-latest-version.html" target="_blank">Here

XIMI R5s plus E7 Miracle box v2.27a crack Flash Tools  Link Here

الجمعة، 26 فبراير 2016

A look at the latest French laws on intelligence collection


For the second time we have an article written in cooperation with the French weblog about intelligence and defence Zone d'Intérêt:


Introduction

Over the last year, The French parliament passed new laws granting additional powers to intelligence services regarding interception of communications and data requests. This is part of a broader reform aimed at creating a legal framework for intelligence practices which were not formally authorized by law before 2015. In the press, it was said that these laws allowed sweeping new surveillance powers, legalizing highly intrusive methods without guarantees for individual freedom and privacy.

This article will focus on the provisions related to communications intelligence (COMINT), including targeted telephone tapping (lawful interception or LI), metadata collection and data requests to internet service providers (ISPs). Targeted interception of the content of internet communications is not regulated by these new laws, but only by older decrees which are still a bit unclear. The new laws are only about collection the metadata of internet communications.

In France, communications interception is authorized under two distinct frameworks:
- Judicial interceptions ordered by a judge of inquiry (juge d'instruction) during a criminal investigation. These interceptions can be done by the police, the gendarmerie (a military force charged with police duties) and by the security service DGSI.

- Administrative interceptions, also known as security interceptions, which are requested by both the domestic security and the foreign intelligence services.

Administrative interceptions are approved by the Prime Minister for various motives, such as defending and supporting major national interests including national defense, foreign policy interests, economical and industrial interests, or preventing terrorism and organized crime. Whereas the Unites States strongly denies conducting commercial espionage in the sense of stealing trade secrets for the benefit of individual companies, France is known for being less strict on this.



Diagram of the various interception capabilities of French intelligence
(Diagram: ZonedInteret.net - Click to enlarge)


The main French security and intelligence services are:
Direction Générale de la Sécurité Intérieure (DGSI), which reports to the Interior Ministry and is responsible for domestic security. It has some 3500 employees and an annual budget of 300 million euros. DGSI was formed in 2008 through the merger of the Direction Centrale des Renseignements Généraux (RG) and the Direction de la Surveillance du Territoire (DST) of the French National Police.

Direction Générale de la Sécurité Extérieure (DGSE), which reports to the Minister of Defence and is responsible for collecting foreign intelligence on civilian issues and also performs paramilitary and counterintelligence operations abroad. DGSE is responsible for both HUMINT and SIGINT.

Direction du Renseignement Militaire (DRM), which reports directly to the Chief of Staff and to the President of France as supreme commander of the French military. DRM is responsible for collecting military intelligence in support of the French armed forces.

Direction de la Protection et de la Sécurité de la Défense (DPSD), which is also part of the Ministry of Defence. DPSD is responsible for the security of information, personnel, material and facilities of the armed forces as well as the defence industry.



Headquarters of the French foreign intelligence agency DGSE in Paris
(Click to enlarge)



A special advisory commission on intelligence activities

The French laws, such as Loi n° 2015-912 and Loi n° 2015-1556, from July and November 2015, grant the Prime Minister full authority to order and approve intelligence activities both domestic and foreign. Each collection request is sent by the intelligence service director to its parent ministry and to the Prime Minister, who gives final approval. An advisory commission known as the CNCTR (Commission Nationale de Contrôle des Techniques de Renseignement, or National Commission for the Control of Intelligence Techniques) is kept informed of all requests for oversight purposes.

In most cases, before the Prime Minister can approve a request, this control commission must receive information related to its approval, including the request justification, the identity and location of the targeted individual, or any other identifying information (occupation, username, etc.) when his identity is unknown.

The CNCTR consists of nine members: four from the Parliament, two from the Council of State, two from the Court of Cassation, and one appointed telecommunications expert. This commission is considered an "Independent administrative authority": it is neither part of the Parliament even though members of Parliament are among its members, nor part of the judicial branch, even though some its members are magistrates.

The CNCTR only holds advisory power as it can not stop any decision from the Prime Minister regarding data requests or intelligence collection. The commission can express disapproval of a collection request, but the Prime Minister can overrule this advice and still authorize intelligence collection.

The CNCTR can access all transcripts and logs from intelligence collected under the Prime Minister's authority, but it can not compel any intelligence service for documents or information, and it can not investigate any irregularity on its own. However, it can express recommendations regarding intelligence procedures and bring any irregularity to the Council of State. All debates inside the commission, as well as all its communications with the Prime Minister and intelligence services are classified.

A special status has been granted to journalists, lawyers and members of parliament, as when intelligence requests apply to them, the CNCTR must be informed just before collection starts so it can state whether the collection is necessary and proportionate. The CNCTR must also receive transcripts of the intercepted communications afterwards. The difference with regard to eavesdropping operations against regular citizens is that for them, CNCTR can access the transcripts if it asks for them, while for the privileged professions, CNCTR must receive and review them.

In theory, any individual living in France or abroad can ask the CNCTR to check if he has been placed under surveillance following proper procedure. The control commission must check for any irregularity, but can neither confirm nor deny to the individual that he has been placed under such surveillance. The commission only states that proper verification has been made, and if any irregularity is detected it can report it to the Council of State.



Headquarters of the French domestic security service DGSI in Paris
(Photo: Bertrand Guay/AFP - Click to enlarge)


New provisions for domestic intelligence collection

This section applies to all main intelligence services such as DGSI, DGSE and DRM. DGSE is a foreign intelligence service, which is not supposed to operate on French territory, but it is authorized to request data and intercept domestic communications. DGSE holds most technical capabilities for decryption and high-end communications collection and provides other agencies, such as DGSI or DRM, with technical means and expertise in this regard.

A recent decree provided authority to more than twenty police and gendarmerie services, some of which are not officially intelligence services, to intercept communications and request data, mostly for counterterrorism purposes. Allowing police services to collect communication intelligence is a shift from older French habits, which the French government justified by the ongoing terrorist threat.

As in most countries, French law provides higher privacy protection to its own citizens and to people communicating from France than to people communicating from abroad, who receive little legal protection against intelligence collection. Intelligence collection under the Prime Minister approval may apply to all electronic means of communication traced to a targeted individual, from mobile phones to landlines, to all metadata from his internet service provider, and even metadata from online services.

In France, telephone companies, ISPs and online services providers can be compelled to provide a wide range of metadata regarding a targeted user, including: technical data related to the identification of connection or subscription numbers (phone numbers, IP adresses, etc.), a list of all connection or subscription numbers linked to a targeted individual, location data of all devices traced to a targeted individual, and call detail records (CDR).

Under the Prime Minister’s authority, telephone companies can be compelled to cooperate with intelligence services conducting targeted phone calls interceptions. French intelligence services are not supposed to proceed to interceptions on their own, but have to go through a dedicated government technical agency called GIC (Groupement Interministériel de Contrôle or Interministerial Control Group).

The GIC operates under the Prime Minister direct authority, receiving approved requests and ordering telephone companies and ISPs to provide information or access to their networks for interception. Providers compelled to cooperate are forbidden to reveal any information related to interceptions or data requests, or to inform their users they have been targeted. Providers personnel refusing to cooperate could be sentenced to a 150,000 € fine and up to two years of imprisonment.

The parliament recently authorized intelligence services to use devices such as IMSI-catchers to identify and locate mobile phones or computers linked to targeted individuals. Intelligence services can only use IMSI-catchers to collect metadata, and all collected data unrelated to specified targets must be destroyed.

Regarding domestic communications, voice communication recordings must be destroyed 30 days after collection, but transcripts can be kept "as long as necessary" by intelligence services. Metadata requested from ISPs and Telcos can be stored up to 4 years. Intercepted communications that are encrypted can be stored up to 6 years.



The French satellite intercept station at the Tontouta naval air base
near Noumea on the main island of New Caledonia
(Photo: Google Earth - Click to enlarge)


A loose framework for the surveillance of foreign communications

Fewer restrictions apply to the surveillance of foreign communications, whether collected by the domestic security service DGSI, the foreign intelligence service DGSE or one of the military agencies.

The Prime Minister issues broad authorizations to intelligence services to monitor and collect communications, either for whole geographical regions, countries, organizations or individuals. The Prime Minister specifies which types of communication networks can be targeted for collection. These authorizations last for 4 months, but they can be renewed without restriction.

Foreign intercepted communications can be kept for 1 year after processing, or up to 4 years after collection. Collected metadata can be stored for 6 years. Encrypted data can be stored for up to 6 years after decryption, or up to 8 years after it has been collected. With these retention periods, the French law is more strict than for example American law, which allows NSA to store encrypted data for an unlimited period of time.


From French territory

The law on surveillance of foreign communications only applies to communications between users who are outside of France, but which are collected from French territory. Here it should be noted that many former French colonies spread around the globe are also considered part of French territory, and French law applies there, especially as this is stated in the latest intelligence laws.

This means that these laws not only apply to data collected from major fiber-optic cables and satellite intercept stations inside France, but also to those from the overseas satellite stations like those in French Guyana, on the island of New Caledonia in the South Pacific and on Mayotte in the USAn Ocean - providing French intelligence with a global SATCOM coverage probably second only to that of the http://pinkberrylicious.blogspot.com /2014/09/nsas-foreign-partnerships.html#2ndparty">Five Eyes partnership. After ECHELON, this French network was dubbed FRENCHELON.

If data is collected under the foreign communications status, but is then traced back to domestic communications (call number or subscription located in France), it can be processed only if approved under the domestic communications framework, or it must be destroyed under 6 months.



The DGSE satellite intercept station near Kourou in French Guyana,
which was built in cooperation with German BND
(Image: Google Maps)


Outside French territory

Intelligence collection conducted by French intelligence services outside of France is not restricted by law. Because the overseas satellite stations are considered to be on French territory, this situation only applies to for example covert eavesdropping operations in foreign countries, as well as to tactical SIGINT collected through land, sea and airborne platforms during military operations abroad. French armed force are based in countries such as Mali, Gabon, Djibouti and UAE. This will mainly result in communications for military purposes.

While this kind of collection is not regulated by law, it will be limited by the available resources and the specific goals set by the government in the annual PNOR (Plan National d’Orientation du Renseignement or National intelligence orientation plan), a classified document sent to the chiefs of intelligence services and to the parliamentary delegation for intelligence (DPR - Délégation Parlementaire au Renseignement), which only receives a redacted version of this document.



A French army vehicle for collecting tactical SIGINT and ELINT in Afghanistan
(Photo: ageat.asso.fr - Click to enlarge)


Automated bulk metadata collection

In July 2015, a law introduced a new automated bulk metadata collection system against terrorism. The Prime Minister can order French internet service providers to add specified metadata collection and filtering systems to their networks. He can issue such orders for 2 months, and they can be renewed without restriction. Data collected on ISPs networks can be stored up to 60 days, and would be filtered and processed by government issued algorithms to detect terrorism related threats. If such a threat is detected, the Prime Minister can compel ISPs to identify related users.

The development of threat-detection algorithms, and their so-called "black boxes", should be done under supervision from the CNCTR. However, providing oversight at the hardware and software level could be very tricky and difficult, especially as algorithms would be updated and modified very regularly and it would also require specialized knowledge of such internet filter systems.

The scope and purpose of this metadata provision is largely a mystery. At first sight it may look similar to what NSA did by collecting http://pinkberrylicious.blogspot.com /2016/01/section-215-bulk-telephone-records-and.html">domestic telephone records in order to find unknown terrorist associates by http://pinkberrylicious.blogspot.com /2016/02/how-nsa-contact-chaining-combines.html">contact chaining. But if that was the purpose of this French law too, then it would have been much easier to order the ISPs to hand over their metadata in bulk, just like it happened in the US.

Actually, French telecommunications and internet service providers already have to store their customer's metadata for at least one year under the EU data retention directive. Moreover, a French legal decree even requires web hosting companies, like Facebook, Google and Amazon, to store their user data for at least one year and provide it to government authorities at their request. However, these metadata may only be used for targeted investigations, as intelligence services must provide specific requests to ISPs & web hosting companies with either the full name of a target, its user name, IP address or other identifying information.

It seems that installing "black boxes" at ISP networks serves the bulk collection of smaller sets of data: they filter traffic using specific threat-detection algorithms, so they will likely only pull in those metadata that match certain communication patterns and routines, based on digital forensics from counterterrorism investigations. The metadata would then be used to identify the users showing such patterns.

Given the very high data rates of traffic passing internet service providers, such filter systems are very expensive and ISP generally don’t like external systems to be plugged into their networks. That makes it surprising that the orders for installing them are valid for just 2 months, and although they are renewable without any limitations, it’s not clear whether these "black boxes" would be removed from ISPs networks at the end of each order, or if they would only be turned off until further notice.



Cyber defense

Interestingly, filtering internet traffic using threat-detection algorithms sounds very much like detecting and preventing malware and cyber attacks. But maybe except for a case when a terrorists group would conduct cyber attacks, the law precisely states that this "black box" metadata filtering and collection system can only be used to detect terrorist threats. It can not be used for any other purpose, including cybersecurity, counterintelligence or criminal investigations.

Nonetheless, the cyber domain did receive special attention from French lawmakers in the latest regulations on intelligence. All collected intelligence which is related to cyber attacks can be stored indefinitely for technical analysis. In addition, all penalties for computer hacking and cyber-related crimes have been doubled as part of the new Law on Intelligence passed in July 2015. This fits a general shift of intelligence agencies towards "cyber", as for example in the US, cyber threats replaced terrorism as top priority for the intelligence community since 2013.



Links and Sources
- New York Times: French Inquiry Urges Changes to Intelligence Services in Light of Failures
- The Guardian: France passes new surveillance law in wake of Charlie Hebdo attack
- Matthew Aid: French SIGINT: Part II
- Overview of French intercept sites: Comment on peut, en trois clics, découvrir la carte des stations d'écoute des espions de la DGSE

الخميس، 25 فبراير 2016

DOWNLOAD WIFI Password HACKER FOR FREE .APK FILE FOR ANDROID 2016

You are downloading WiFi Hacker for free .apk file in your Android device and in order to download you have provided two direct download links i.e., Google Play & Dropbox and a Google Play store link below on which you can simply click and download the .apk file of WiFi Hacker for free Android app. WiFi hacker for free is an Android WiFi hacker as well as WiFi password breaker app that helps Android users to easily get WiFi access wherever they go.
DOWNLOAD WIFI Password HACKER FOR FREE .APK FILE FOR ANDROID 2016
DOWNLOAD WIFI Password HACKER FOR FREE.APK FILE FOR ANDROID 2016

Note: Please beware that WaZiristani HaXor only shares the original and free apk installer for WiFi Hacker for the free .apk file without any modifications or any alterations within the .apk file package for illegal activities.
All applications are free and for home or personal user only. Kindly, contact us for any download infringement or your copyright.

Download WiFi Hacker for free .apk File (File Size: 2.9 MB)