Wednesday, 28 December 2016

How to Turn Off Your PC Using Your Smartphone

Do you want to turn off your PC at your home and save some electricity. Or may be try to shutdown your PC from outside just because it looks cool. We got you covered.

If you ever walked away from your computer and remembered that you forgot to turn it off, you can actually do it from your smart phone!

To begin with, you need to download Unified Remote app on your smartphone (iOSAndroid), and you then need to download it’s server to your computer from this website right here.

You can go through the installation process on your PC  and it is easy, straightforward and there is no spyware or any nonsense which comes with it. Once you are finished, make sure the server app is running on your computer, and then open the app on your mobile. It will scan for a server on your local network. Once it finds the server it will let you control your computer.

Now, the way the app works is with a bunch of different remotes. There are remotes that’ll let you control your PC as if it was a mouse and keyboard, but turning off the PC with that would be difficult if you aren’t in the room. The remote we want is called Power. Click that, and then click Shutdown or Restart to turn your PC off.

How to Remove a Virus from Android Without a Factory Reset

Desktops aren’t the only gadgets that can be affected by a virus. Android devices have a malware problem and it’s growing every day.

If you do get a virus, you could perform a factory reset to get rid of it, but that means you’d lose all your data — those photos you shot, the saved games, the text messages, and everything else. Obviously, you want a factory reset to be your last option.

So what can you do to remove a virus from Android without a factory reset?

Is It Really a Virus?

If your phone isn’t functioning the way it should be, there’s a chance you have some malware on it. One wrong tap somewhere and a malicious file might have been downloaded on your phone, which is leeching battery life, Internet resources, or your personal data.

But it could be something else.

Suppose your Android refuses to boot or crashes every time it starts up. Or maybe you can’t seem to download apps from the Play Store. These are not necessarily caused by a virus. So don’t panic! First, check our list of 20 common Android problems and how to fix them.

In fact, there are some tell-tale signs that your Android has a virus. Ask yourself a few questions:

Did the problem start happening after you downloaded some app or file?Have you recently installed an app from a third-party sourceand not the Play Store?Did you click on some ad that downloaded a file or app you didn’t want?Does the problem occur only when you run a particular app?

If the answer to any of the above is yes, then there’s a chance you have malware on your system. And importantly, you might be able to fix it without a factory reset!

Install and Run an Antivirus Scan

The first step is to run an antivirus and see if that catches the malware. Android actually has a wide array of antivirus apps now, both free and paid. We’ve tried to answer what is the best Android antivirus app, but honestly, there’s no one app that is head and shoulders above the rest.

In terms of detection and ease of use, if you want a free app, then Avira is a good bet. It will scan all your files and apps, and recommend removing malicious ones. For a more thorough scan, you’ll need a paid app like Kaspersky Internet Security, which has a 30-day trial period and otherwise costs $14.95 per year.

Download: Avira Antivirus Security for Android (Free)

Download: Kaspersky Internet Security for Android (30-day Trial | $14.95 per year)

For other options, check out antivirus tester AVTest’s recommendations for the best Android security apps, ranked based on their detection levels as well as ease of use.

Hopefully, the antivirus scan should find and remove the malware on your phone or tablet. But if that doesn’t get the job done, then it’s on to a manual step.

Manually Delete in Safe Mode

Much like Windows has a “Safe Mode”, so does Android. And if your system has been affected by a virus, you’ll need to rely on it.

Related  7 Crazy Things You Will Find On the Dark Web

Why? Well, Safe Mode turns off access to all third-party downloaded apps and prevents them from running.

To boot into Safe Mode on most Androids:

Press and hold the Power button till you get the “Power Off / Reboot” screen.Tap and hold “Power Off” till you get a prompt to “Reboot to Safe Mode”.Tap “OK”.Wait for the phone or tablet to reboot. In one of the corners, you will see a watermark of “Safe Mode”.

This method might not always work since Android manufacturers customize their ROMs. If it doesn’t work, head to the XDA Developers Forum or your phone manufacturer’s official forum, where a search or a question will likely show you how to boot into safe mode on your device.

Once you have entered Safe Mode, go to Settings > Apps > Downloaded. Go through the list of downloaded apps to try and locate the malicious app on your Android device. It won’t always be easy to find, but think back to when the problem on your phone started and check if an app you didn’t download is in this list.

Tap the app, and on the next screen tap “Uninstall” to remove it. If that gets rid of it, reboot your phone normally (without entering Safe Mode), and the virus should be taken care of.

If the app can’t be removed, it likely has Device Administrator Access. To remove that access…

Go to Settings > Security > Device Administrators.Locate the app and tap the checkmark next to it.Tap “Deactivate” when prompted.

Related  DCMA Exemptions Lift Restrictions on White hat Hackers

Now you can go back to Settings > Apps > Downloaded and uninstall the app as instructed above.

How To Be Sure

Apart from uninstalling the app, just to be on the safe side, you might also want to clean up your Android device while you’re at it. Clearing the cache and history, cleaning up the startup processes, and other basic steps can assist in making sure your device is good to go.

Joel has previously checked out a few Android apps that really clean and aren’t placebos, for doing everything from clearing up unused and unwanted files to removing duplicates.

Once your system is cleaned up, make sure you backup your Android so that in the future, you can perform a factory reset without worrying about data loss.

If Nothing Else Works, Reset

Unfortunately, if none of the above solutions help in clearing up the malware on your device, you don’t have any other option but to reset your Android to factory settings. Yes, that means you will lose precious data, but that’s better than using a compromised phone or tablet.

Have you had success in getting rid of malware from your Android device without needing to perform a factory reset? What virus or malware have you faced?

Linux Commands Cheat Sheet

Kali Linux commands cheat sheet. All basic commands from A to Z in Kali Linux has been listed below.

Any command is wrong kindly comment below. 

Download Cheat Sheet: Kali Linux Commands

Download Cheat Sheet: Kali Linux Commands

7 algorithms and data structures every programmer must know

In programmers life algorithms and data structures is most important subject if they want to go out in the programming world and make some bucks. Today, We will see what they do and where they are used with simplest examples. This list is prepared keeping in mind their use in competitive programming and current development practices.

1. Sort Algorithms

Sorting is the most heavily studied concept in Computer Science. Idea is to arrange the items of a list in a specific order. Though every major programming language has built-in sorting libraries, it comes in handy if you know how they work. Depending upon requirement you may want to use any of these.

Merge Sort

Quick Sort

Bucket Sort

Heap Sort

Counting Sort

More importantly one should know when and where to use them. Some examples where you can find direct application of sorting techniques include:

Sorting by price, popularity etc in e-commerce websites

2. Search Algorithms

Binary Search (in linear data structures)

Binary search is used to perform a very efficient search on sorted dataset. The time complexity is O(log2N). Idea is to repeatedly divide in half the portion of the list that could contain the item, until we narrow it down to one possible item. Some applications are:

When you search for a name of song in a sorted list of songs, it performs binary search and string-matching to quickly return the results.Used to debug in git through git bisect

Depth/Breadth First Search (in Graph data structures)

DFS and BFS are tree/graph traversing and searching data structures. We wouldn’t go deep into how DFS/BFS work but will see how they are different through following animation.

Applications:

Used by search engines for web-crawling

Used in artificial intelligence to build bots, for instance a chess bot

Finding shortest path between two cities in a map and many other such applications

3. Hashing

Hash lookup is currently the most widely used technique to find appropriate data by key or ID. We access data by its index. Previously we relied on Sorting+Binary Search to look for index whereas now we use hashing.

The data structure is referred as Hash-Map or Hash-Table or Dictionary that maps keys to values, efficiently. We can perform value lookups using keys. Idea is to use an appropriate hash function which does the key -> value mapping. Choosing a good hash function depends upon the scenario.

Applications:

In routers, to store IP address -> Path pair for routing mechanisms

To perform the check if a value already exists in a list. Linear search would be expensive. We can also use Set data structure for this operation.


4. Dynamic Programming

Dynamic programming (DP) is a method for solving a complex problem by breaking it down into simpler subproblems. We solve the subproblems, remember their results and using them we make our way to solve the complex problem, quickly.

*writes down “1+1+1+1+1+1+1+1 =” on a sheet of paper* What’s that equal to?

*counting* Eight!
*writes down another “1+” on the left* What about that?
*quickly* Nine!
How’d you know it was nine so fast?
You just added one more
So you didn’t need to recount because you remembered there were eight! Dynamic Programming is just a fancy way to say ‘remembering stuff to save time later’

Applications:

  • There are many DP algorithms and applicationsbut I’d name one and blow you away, Duckworth-Lewis method in cricket.

5. Exponentiation by squaring

Say you want to calculate 232. Normally we’d iterate 32 times and find the result. What if I told you it can be done in 5 iterations?

Exponentiation by squaring or Binary exponentiation is a general method for fast computation of large positive integer powers of a number in O(log2N). Not only this, the method is also used for computation of powers of polynomials and square matrices.

Application:

  • Calculation of large powers of a number is mostly required in RSA encryption. RSA also uses modular arithmetic along with binary exponentiation.

6. String Matching and Parsing

Pattern matching/searching is one of the most important problem in Computer Science. There have been a lot of research on the topic but we’ll enlist only two basic necessities for any programmer.

KMP Algorithm (String Matching)

Knuth-Morris-Pratt algorithm is used in cases where we have to match a short pattern in a long string. For instance, when we Ctrl+F a keyword in a document, we perform pattern matching in the whole document.

Regular Expression (String Parsing)

Many a times we have to validate a string by parsing over a predefined restriction. It is heavily used in web development for URL parsing and matching.

7. Primality Testing Algorithms

There are deterministic and probabilistic ways of determining whether a given number is prime or not. We’ll see both deterministic and probabilistic (nondeterministic) ways.

Sieve of Eratosthenes (deterministic)

If we have certain limit on the range of numbers, say determine all primes within range 100 to 1000 then Sieve is a way to go. The length of range is a crucial factor, because we have to allocate certain amount of memory according to range.

For any number n, incrementally testing upto sqrt(n) (deterministic)

In case you want to check for few numbers which are sparsely spread over a long range (say 1 to 1012), Sieve won’t be able to allocate enough memory. You can check for each number n by traversing only upto sqrt(n) and perform a divisibility check on n.

Fermat primality test and Miller–Rabin primality test (both are nondeterministic)

Both of these are compositeness tests. If a number is proved to be composite, then it sure isn’t a prime number. Miller-Rabin is a more sophisticated one than Fermat’s. Infact, Miller-Rabin also has a deterministic variant, but then its a game of trade between time complexity and accuracy of the algorithm.

Application:

  • The single most important use of prime numbers is in Cryptography. More precisely, they are used in encryption and decryption in RSA algorithm which was the very first implementation of Public Key Cryptosystems
  • Another use is in Hash functions used in Hash Tables

We’ll discuss some advanced algorithms every competitive programmer should know in the next post. Meanwhile master the above algorithms or share in the comments about what you think every beginner-intermediate programmer should know.

Top 5 Bootable USB Tools For Windows Operating System

In this article, I have created a list of the top 5 bootable USB tools for Windows operating system. You can create ISO files for different Windows operating systems, Linux distros, and also make Linux Live USB drives. All these bootable USB tools have their advantages and disadvantages.

One of the most common methods of installing an operating system on a computer is to create a bootable media. We can also install an OS using the inbuilt features, for instance, the Reset option present in Microsoft Windows 8 and later. For that, an already running operating system on your machine is a pre-requisite. On the other hand, that’s not the case with the bootable media, you can use it even if your computer doesn’t have any operating system installed at all.

Primarily, we create a bootable media using a CD/DVD or a USB drive. However, the former one has become obsolete because it is technologically backward than the USB drive-based bootable media. Now, there are many tools available to create these bootable USB drives using the ISO image file of the desired operating system.

Top 5 bootable USB tools for Windows operating system:

Rufus

Rufus is a tiny bootable media creator. Yet, it is multilingual and packs many features which can make your bootable USB flash drive creation process more effective. You can create your bootable USB media for both MBR and GPT partition schemes. Rufus facilitates options to install your desired operating system on a UEFI firmware enabled machine. You can install Windows XP in UEFI mode due to OS limitations.

It doesn’t matter what ISO you’re using. It can be Windows 7, 8, 10, any Linux distro, or ISO file of any other operating system. You can choose whether to use the FAT32, NTFS, exFAT, or UDF file systems for the bootable USB media. One thing that helps Rufus stand out in the crowd is that it takes less time to create the bootable USB drive.

WinSetupFromUSB

You might have thought, we forgot to add spaces in the title of WinSetupFromUSB but it is written like this because its makers chose to do so. The biggest advantage of using WinSetupFromUSB is that you can put multiple ISO files on one flash driveand create a multiboot USB. This will allow you to have a choice of more than one operating system at the time of installation. Just like Rufus, it has many features and allows you to create a bootable USB media for different types of operating system.

UNetbootin

This simple to use tool, not equipped with many options, can create a bootable USB drive easily. The main reason for its existence is that it can be used to create Live USB drives for Linux distros. It offers inbuilt support for many of the popular Linux distros and other open source operating systems like FreeBSD. After connecting your USB drive, you need to select your desired (supported) distribution or antivirus rescue disk and UNetbootin will automatically download the ISO file from the internet and make the Live USB for you. In the case of bootable USB or an unsupported Linux distro, you’ll have to supply the ISO file.

Universal USB Installer

It is a good tool for creating bootable USB drive. Just like UNetBootin, it is used to make Live USB for Linux distros. It supports a few extra ISOs but it doesn’t offer an automatic download option. Instead, it gives you the link to the download page of the distro. But we don’t think that would cause much trouble.

Windows 7 USB/DVD Download Tool

This bootable USB drive creation tool is made by Microsoft. Although it is known as Windows 7 USB/DVD Download Tool, it works for other versions of Windows also. As far as its usability is concerned, it should be at the top position. If you have the USB drive and the ISO file, you only need to make a few clicks and you’re done.

Also, it is a Microsoft product so it only supports ISO files of Microsoft products like Windows, Visual Studio, etc. Microsoft has stopped its development because with the launch of Windows 8 their new Media Creation Tool was also released.

Pros, Cons, and Conclusion

All these bootable USB tools have their own pros and cons. One may have less or almost nil features, like Windows 7 USB/DVD Download Tool. Another may have a plethora of options. More features are advantageous but they would make the bootable USB tool more complex for novice users. The type of USB flash drives you’re using to create the bootable USB also has some contribution. For instance, the bootable USB tool would take less time to create bootable media on a USB 3.0 pen drive in comparison to USB 2.0 pen drive. So, we would recommend you to try these bootable USB tools and decide which one is the best for you.

If you have something to add, tell us in the comments below.

Sunday, 25 December 2016

Rooting

Rooting is the process of getting the superuser (root) permissions on an Android device (which is also a type of Linux system). This allows you to install unauthorized applications and ROMs, delete bloatware and other kinds of stuff. However, in many countries, rooting might result in voiding your warranty.

If you are a long time Android user, you might have come across various applications asking for root access to function. The internet is full of articles on rooting and the whole process is different for different smartphones. There are tons of guides on online forums and there is no single guide that works for all smartphones. Well, in this article, I’ll try to tell you the meaning of rooting and some related aspects.

What is rooting?

Here, we love Linux and open source software. So, I expect that you might be using a Linux distribution for everyday computing. In that case, you might be aware of running a command with sudo. It allows you to run programs with root permissions. If you’re using a Windows PC, it’s similar to running programs as administrator privileges. It’s often compared to jailbreaking an iOS device, a process that’s entirely different.

The Android operating system is based on Linux and it uses the same permissions and file-system ownership. When you buy a new Android device, you have the option to install new applications, uninstall them, and do various kinds of stuff. However, there could be lots of preloaded stuff, also called bloatware, that you might wish to uninstall.

On a rooted Android smartphone, a user (superuser) has root permissions to do anything with the applications and move any system file. In short, with root permissions, you have the power to control how things work on your phone. With rooting, you can run a firewall, install custom ROMs, or enable tethering if your carrier is blocking it.

The rooting process simply adds a standard Linux function that was removed by your OEM. This tiny file, su, is put in the system with permissions so that you can run it. There are different tools that automate the process of flashing a .zip file containing the su binary from the recovery mode screen.

Warning: Please note that an incomplete or some wrong rooting step can brick your phone. So, take up this task at your own risk.

Is rooting an Android phone illegal?

Rooting a device involves removing the restrictions placed by the cellular carrier or device OEMs. Many Android phone makers legally allow you to root your phone, e.g., Google Nexus. Other manufacturers, like Apple, don’t allow jailbreaking. Other manufacturers, including LG, HTC, and Motorola, officially allow unlocking the bootloader which allows one to root the phone without exploiting a vulnerability.

In some countries, the practice of jailbreaking and rooting is illegal. Manufacturers don’t like when a user roots the device as they lose control over the ecosystem and delete the bloatware installed by them. These companies often void the warranty of such devices.

The legality of this issue entirely depends on your location. In the USA, under the DCMA, it’s legal to root your smartphone. However, rooting a tablet is illegal. This exemption grant came around 2012. In 2016, the overall picture is still unclear. So, there are chances that you’ll lose your warranty after rooting your device.

On the other hand, in European countries, the situation is much better. FSFE, the Free Software Foundation Europe, has concluded that rooting a device doesn’t hamper your device’s warranty. The user can make warranty claims for up to 2 years after buying the device. However, if the OEM can prove that rooting or installing an unofficial software has damaged the hardware of the device, you might be out of luck.

In near future, I’ll be writing more articles on rooting, its importance, myths, and more. So, don’t forget to drop your feedback in the comments section below.

Monday, 19 December 2016

Android Phone me kisi bhi App Lock ko Bypass/Hack kaise kare?

Hello , Dear Readers. MyteachWorld blog me aapka ek bar fir se swagat hai. Dosto aaj ka mera topic hai "Android Phone par kisi bhi App Lock ko kaise Bypass/Hack Kare? Dosto aaj kal lagbhag sbhi user Android Smart Phone use  karte hai. Aur apne Android Phone par Kisi secret data ya apps ko secure karne ke liye App Lock use karte hai. Kyoki aapko lgta hai aapne jis app ko Locked kar diya hai, use koi access nhi kar sakta hai Begair Password ke. To dosto ye aapki galat fehmi hai. Aaj mai aapko aisi trick ke bare me btaunga . Jisse aap kisi ke bhi Locked Application ko begair Password ke Unlock kar sakte hai. To aap bhi agar sikhna chahte hai, to aap meri post akhiri tak padhte raheye. 

        Friends yaha mai jo trick btane ja raha hu . Iss trick ko aap easily use kar sakte hai. Iske liye aapko root karne ki jarurat bhi nhi hai.  

To dosto chaleye suru karte hai.

STEP1: Sabse pehle aapko apne Android Phone ki Setting me jana hai .


STEP2: Ab aapko apps par jana hai . Agar aapke phone me Apps nhi show ho raha hai . To aapke Phone me Application Manager ho sakta hai. 




STEP3: Iske bad jb aap application manager par Click karenge to aapko kuch apps dikhenge. Jo aapke phone me pehle se Install honge. Wahi par  aapko Applock dikhega (Jo bhi app lock use kr rhe hai) Us par aap click kijeye. 




STEP4: App Lock par click karne ke bad aapko 2 Options dekhenge "Force Stop" aur  "Uninstall" ka. Ab aapko "Force Stop " par click karna hai. Jaise he aap us par click karenge aapka App Locked Work karna band kar dega . Aur aap aasani se protect apps ko easily open kar sakte hai.




Sunday, 18 December 2016

Hack Android Phone using Kali Linux

Hello,  Dear reader your welcome. My today topic How to Hack any Android Device using Kali Linux ? 
Dear readers you know about the Kali Linux 
What is kali Linux?
                      Kali Linux is one of the best passion operating system of white hat hackers, security researchers and pentester. It gives advanced penetration testing tool and its ease of use implies that it should be a part of every security professional’s toolbox.



Requirements:

1. Kali Linux OS (Metasploit framework Preloded)
2. Android Device

Friday, 16 December 2016

What is Global IP , Local IP , Static IP and Dynamic IP explained in Hindi

  Hello , Dear Friends Your Wellcome , Friends Aaj Hum Bat Karenge  Global IP , Local IP , Static IP aur Dynamic IP Ke Bare me .



To Dosto Chaleye Suru Karte Hai.


  • Local IP:  Local IP kya Hoti Hai? Aur Internet ki IP kya Hoti Hai? Kai Log In dono Chizo me Bahut Confused ho jate Hai , Hmari Asli Ip Hai kya? Hum Kaise Btaye Ki Hamari IP Kya Hai? Kyuki Command Promt Par Jaker Agar Aap ipconfig Likhte hai To aapki ek IP aati Hai , Aur Agar Aap Google Par apni IP check Karte Hai. To kuch Aur Aati Hai.  Akhir Hmari IP hai Kya?  Agar Aapko Nhi Pta Hai IP kya Hota hai? IP ka matlab Hota Hai Internet Protocol . Jaise Agar Aap Mobile Phone Use Karte Hai,to Aap ka Ek Number Hota Hai , Jo Aapke Mobile Ki Pehchan Hoti Hai. Kyuki Ye Number Ek Particular Insan Ka Hai. Ek Country Me Ek Jaise Number  Dusra Number Nhi Ho Sakta . Wo Ek Alag Pehchan Hoti Hai. Aise He Internet Par Jo Surf Karne Wala Insan hai , Internet Use Karne Wala Insan Hai Uski ek Alag Ip hoti Hai. IP kaisi Dikhti hai 112.168.1.99  Ye Char Part Me Hota Hai . Aur ye Ipv4 Hota Hai. Ye 3 -3 Digit Me 4 Part me Hota Hai. Ye Local Bhi hota Hai , Aur Internet Par bhi Hota Hai. Jaise  Man lijeye Network Ki Bat Kar Lete Hai, Network Internet Par Bhi Hai, Network aapke Office Me Bhi Ho sakta Hai. Ab Ye Network Kya Hota Hai? Friends Ek Chiz se Kai Chiz Apas me Connected Hona Network Hai. To Man Lijeye Apke Ke Office Me Ek Modam Hai. Jisse Aap Internet Chalate Hai, Aur Us Modam Me Wifi Bhi Hai. To Jaruri To Nhi Ek Modam Se Ek HE Device Connected Ho. 4 Bhi Ho sakte Hai, 8 Bhi Connected Ho Sakte Hai. Too Aise Case Me Alag Alag Device Ki Koi Identy Honi Chaheye. To Aapka Modam Apke Office Me Ek Chota Sa Network Bna Raha Hai. Aur Us Network Me Jitne Bhi Device Hai. Un Sab Ki IP Alag Hogi , Aur Wo JO Ip hogi Wo Local IP hogi. Kyuki Wo Network Aapka Local Network Hai. To Uski IP Internet Nhi Provide Karega, Uski Ip Aapka Modam Provide Karega . To Dosto Ye Bat Rhi Local Ip ki Aap Ki Smajh Me AAgya Hoga.


  • Global IP:  Friends  Ab Bat Karte Hai Global Ip ki , To Internet Par IP Ka Kya Case Hai? Ye Bhi Kuch Milta Julta Hai. Aapko Ko Pta Hai Internet Par bahut sare User Hai. To Har Ek User ki Alag Alag Identification To Honi He Chaheye, Taki Pta Chal Sake Kon Kon Hai. Issliye Yaha Par Jo Network Provider Hote Hain.Wo Aapko Ek Alag IP Address Asign Karte Hain. Kyuki Wo Aapki Internet Par Pehchan Hoti Hai. Ab Wo IP static Bhi Hoti Hai Aur Dyanamic Bhi Hoti Hai. Yahi Hamari Global IP Hai. I Hope Aapki Samajh Me Aagya Hoga.

  • Dynamic IP:   Dyanamic Matlab kya Hota Hai? Dyanamic Matlab Ye Kuch Interwell Par Change Hoti Hai. Jaise Man Lijeye Agar Aapki IP Aaj 5 Hai. Number Mai IP ka De Raha Hu. Ho Sakta Half Hour Me Aapki IP Change Hoker 6 Ho Jaye . Dyanamic IP Change Hoti Rehti Hai. Dyanamic IP ko Network Provider Change Karta Rehte Hai.  Ab Aap Ye Puchhenge Ki IP hmari Change Hoti Rehti Hai To Hmari Pehcahn Change Hoti Rehti Hai. Bilkul Nhi Kyuki Network Provider Ke Pas Pura DataBase Hai. Jaise Man Lijeye 6 Tarikh ko Aapne Koi Illegal Activity Kar di , Koi Frod Kar Diya . Aur Aapki Ip Trace Hone Lagi , Jab Aap ne Illegal Activity Kiya Tha Tab Aapki Ip 666 Aise Karke thi , Ab Aapki IP 888 Aise Hai. To Aap Bach Jayenge Bilkul Nhi. Kyuki Aapka  Jo Network Provider Hai Wo Ye Dekhega Ki , Ye IP Itni Tarikh ko Itne Baje Kis Ko Asign Ki thi. To Waha Aap Ka Name Aayega , Ab Wo Police Ko Aapka Record De Degi Aur Aaap Pakde Jayenge. Dyanamic IP ka Ye Matlb Nhi Hai ki Aap Bach Jayenge. Ye To Bat Rahi Dynamic Ip ki . 

  • Static IP:  Friends Ab Bat Karte Hai Static IP ki Ye Kyu Use Hoti Hai, Friendds Kai Bar Aisa Hota Hai ki Aap Multiplayer Game Khelte Hai, To Usme Aapko Apni Ip Dalni Hoti Hai. Kyuki Wo IP aapki Pehchan Hai . Tbhi To Wo Network Se Connect Honge Alag Alag . Jaise Ek Game Me 5 User Khel Rahe Hai Alag Alag To Unki Pehchan Unki IP Se Hogi . To Aap Ne Apni IP Dal di Aap Game Khel Rahe Hain. Lekin Problem Ye Hai ki Aapki Ip Sayad Adhe Ghante Me Change Ho Jaye. To Aap Game Khelte Khelte  Bich Me Ruk Jayega . Har 30 Minute Me Badal Rhi Hai To Kya Har 30 minute Me Apni Ip Dalte Rahenge Aap. To Game Kab Khelenge. Iss Case Me Aapko Statics IP Ki Jarurat Padegi.  Static IP jo Hoti hai Wo Asthai Hoti Hai, Iske Liye Aapko jyada Paise Dene Padte Hai.  Yhi Static Ip hoti Hai.

Thursday, 15 December 2016

What is Surface Web , Deep Web and Dark Web explain in Hindi

Hello , Dear Readers . Myteachworld blog me Aapka Swagat hai. Friends Aaj ke Post me hum Surface Web , Deep Web aur Dark Web ke Bare me Janenge.  




To  Friends Chaleye Suru Karte Hain.

Surface Web :  Friends Ye Surface Web kya Hota hai?  Surface Web Ek Aisa Web Hota Hai. Jo Aap Noemally Surf Karte Hain. Internet Ka Wo Part Jo Comman People ke Liye Hota Hai. Jaise Man lijeye Aapko Kuch chiz Search Karni Hai, Aapne Google Par Search kiya , Ab Aapko Bahut Sari Website Ki List Milti Hai. Wo Jitni Bhi Website Ki List Hai Wo Surface Web Par Hai. Kyoki Wo Normal Logo Ke Liye Bani Hai , Koi Bhi Use Surf Kar Sakta Hai. Aur Wo Search Engine ne Index Ki Hai , Matlb Search Engine Ne un Website ko Apne Results Me Samil kiya Huwa Hai. I Hope Aap Surface Web ko Samjh Gaye honge . 

Deep Web:  Friends Ab Hum Bat Karte Hain Deep Web Ke Bare Me ,   Jaise Man lijeye Jo Website Hoti Hain , Unke Kuch Pages Indexd Hote Hain. Matlb Kuch Pages Search Engine Me Samil Hote Hain. Jaise Agar Aapne Koi Website bnayi. Us Website Me Aapne ek Aisa Page Bnaya Jo Secret Hai. Wo Aap Nhi Chahte Ki Sb Log Padhe. Us Page Me Kuch Aisi Information Hai Jo Aap Ek Particular Insan Ya Ek Group ko Dena Chahte Hain . To Ye Jo Page Hai Wo Security Me Dala Huwa Hai. Ye Page Search engine Par Indexd Nhi Hoga.  Mai Aapko Ek Aur Example btata hu . Jaise Apne Facebook.com ( Ye Facebook ki Website Hai.) Open Kiya , Ab Aap se Aapka User NAme Aur PAssword Puchha Jayega. Aur Jab AAp Apna User Name Password Enter Karenge , Tabhi Aap Facebook Use Kar  Sakte Hai. 
Online Storage Ho Ya Bank Ki Website Ye Sab Deep Web me AAta Hai. Deep Web Bahut Layers ke Bich Me Chupa Hota Hai. Jo Aap Internet ki Duniya Dekhte Hai, Wo Bahut Choti Hai. Deep Web Aur Bahut Si Chize Hai , Jo Normal Logo Tak Uski Pahuch Nhi Hai. 

Dark Web:  Dark Web Internet ki Ek Aisi Duniya Hai , Jisme Sare Illegal Work Hote Hain. Ye Internet Ka Sabse Niche Ka Hissa Hai. Dark Web Me Aise Pages Hote Hai, Jo Search Engine Me Indexd Nhi Hote Hai,  Wo Internet Par Kahi Dur Dabe Huwe Hote Hai. Jo Normal Logo Ko Pta Nhi Hota. Wo Un Logo Pta Hota Hai Jo Dark Web Me KAm Karte Hai.  Mai Aapko Bilkul Advice Nhi Karunga Ki Aap Dark Web Me Jaye,  Kyoki Ye Illegal Hai. 

                    I hope Aapki Samajh Me Aagya Hoga . Agar Aapko Hmari Post Achhi lage to Share Jurur kare . Aur Agar Aapko koi Problem Hai To Comment Me Jarur likhe . Kyoki Hum aapki help kar sake. THANK YOU

Thursday, 8 December 2016

How to Hide File and Folder in Android Device without any software?

Hello , Dear readers , Welcome back here . How are you ? I hope you are fine.  Our today post is "How to Hide File and Folder in Android phone without any software. As we all know that if  we want to hide any file in our device , then first off all need an app. This trick for both Rooted and Non rooted Android users.

     You don't need any software. you can hide any file and folder. you just need follow simple setps.

Step1:-   Dear friends first of all Go To your file manager in your Android Device.




Step2:-   Now open the file manager and Select storage where the file you want to hide.




Step3:- Now Go to the folder where the file you want to hide in placed. and I am going to hide this video , Select and hold the video.



Step4:-  Now After selecting the video file , click on option  and Rename tap here.




Step5:-  Now so Rename that file or folder with a name starting with Dot " . " 
 Example (.aditya.mp4)

You are Done.

If you want to see that File or Folder , Then change your Setting.
Go To the file manager in your Android Device and Go To settings  and check Show Hidden Files tab "."

  Now here is the end of the article this is overall information for you . If  you like this post pleaseDon’t forget to share this post. share it on facebook or any social sites . Thank you so much.




Saturday, 3 December 2016

Best Hacking techniques explain in hindi

    Hello Dear Readers. Wellcome back . Friends aaj mai aap ko Hacking ki kuch Best techniques ke bare me btaunga .  Friends maine aapko pichhli post me btaya tha Hacking kya hoti  or Hackers kya hote hai?  Agar aap ne meri pichhli post ko nhi pdha hai , to use jarur padhe . What is Hacking  aap iss link par bhi click karke padh sakte hai. Hacking ek realty ban chuki hai. hme isse bachhna bhi chaheye.

To chaliye suru karte hai. Sbhi techniqus ko explain karte hai.

                                              Best Hacking techniques

  •  Footprinting:-   Friends Footprinting ka relationship Hacking se hai. Kya hota hai isme ?  jaise man lijiye jo Hacker hote hai. Website hack karte hai, System hack karte hai , Network hack karte hai . ye jo chize hack karte hai. ye puri planning hoti hai. matlb in chizo ko hack karne se pehle ek radneeti bnayi jati hai, ki kaise kiya jayega , ki kya kiya jayega? Even ye log group bnakr bhi Hack karte hai. Jaise koi system hai , uska control ek se jyada jgah me hai. matlb ek desh me hai or dusre desh me bhi hai. To ye hackers do desh se milkar bhi karte hai. Isme puri Research ki jati hai. ki jisko hum hack kar rhe hai , Wo kon log hai , kya wo koi Government Organisation kyuki kisi Government Organisation ko hack karna or kisi Private company ko hack karna dono bahut badi cheze hai. To iske liye puri Information Gather ki jati hai. Wo party kon hai? , Kyu Hum hack kar rhe hai. iski kya wjah ho sakti hai. uski system ki kya weakness hai . Iski puri list bnayi jati hai. To ye sb achanak se nhi hota hai. Agar koi bade attack ko anjam dena hota hackers ko to wo sabse pehle planning karte hai. Uss planning ko Information Gathering kehte hai. Iss techniq me jaise  Website ka owner kon hai, Ye Domain kab liya gya tha . ye kis server par hosted hai. ye kiske name par liya gya tha. ye sari chizo ko gather karna he Footprinting kehlata hai.

  • Phishing Attack:-  Dosto ye Phising attack kya hota hai?  Phishing attack me jo bhi person aap ko hack karna chahta hai ya jo bhi Hacker hai, Jani mani Website ki clone bnata hai. jaise man lijiye Facebook ek website hai. Jaha par aap apna username , password dalte hai, login karte hai.to Hacker kya karta hai , Waisa he same page bnata hai. matlb ki Facebook ki tarah he dikhne wala ek nakli page bnata hai. Jaise man lijiye facebook hai to wo apne page ka name rakh dega Fakebook. wo page ab aapko bhejega , aapko kisi tarah fasayega . wo ye bhi bol sakta hai apna facebook account ko update karo . bs aap uske fake page par jaise he login karenge waise he aapka username , password Hacker ke email par pahuch jayega. ye jo techniq hai jo Hacking ki suruwat karte hai wo log use karte hai. or ye illegal hai. Isse bachne ke liye aap kisi bhi aise website par na jaye jo aapki personal information mang rhi ho. aap sabse pehle apne address bar ko check kare kahi aisa to nhi facebook.com ki jgah fakebook likha ho . Dosto yahi hai Phishing attack. I hope aapke smajh me gya hoga.

  • Brute Force Attack:-  Frnds Ab bat karta hu Brute Force attack ke bare me . Brute Force Attack , Password crack karne ki ek Hacking techniq hai. Iss techniq me Bahut sare password cobination lgatar try kiye jate hai. Jaise koi Hacker hota hai wo bahut sare password try karta hai. har ek second par ek password try karta hai aur Aise he written trail method se  ek password aisa bhi hota jo uska password hota hai. wo password match kar jata hai aur website crack ho jati hai. Iss techniq ko use karne ke liye Programs hote hai. Isme jo bahut sare password ki list bnayi jati hai use Word List kehte hai. Brute Force attack lagbhag  Discenery Attack se same hota hai. Discenery attack me wahi word use kiye jate hai Discenery me milte hai. Lekin Brute Force Attack me Number, Symbol, Letter sb mix karke try kiye jate hai.

    • SQL Injection:-  Friends Sql Injection ka relation Website hacking se hai. SQL injection website hack karne ki ek techniq hai. Friends aapko malum hoga Kisi bhi Website ke 2 Part hote hai. ek HTML file hoti hai . jaha par aap coding karke bnate hai wo server me store hoti hai , Dusra part Database ka hota hai jaha par website ka database table ke forms me store hota hai. Jo hacker hote hai wo Database ko target karte hai. kyuki database me puri website ka Administration ka password hota hai. Hacker jis website ko hack karna chahta hai , wo sabse pehle check karta hai . website ke database me kahi koi loop hole hai, mai aapko basic he btane ka pras karunga. Hacker itne expert hote  Agar website me koi bugs milta hai , to hacker aisi query dalte hai. aur  username , Password wali table ko  drop kar lete hai. website ko koi nuksan nhi huwa. kisi bhi website ko hack karne ke liye Username aur Password kafi hota hai. 

    • DDOS Attack:-  DOS attack ka pura name Denial of Service hota hai. Isme kya hota hai? Jaise koi Service Provider hai. jo logo le liye Website bnata hai. wo un logo ke liye hai chahe wo online Shopping ho , Chahe wo bank ki website ho. Chahe wo aur kisi service ki ho, to wo unke users ke liye banti hai. Lekin iss attack me jo hacker hota hai , wo kya karta hai , Uss resources ko jis resource se wo Website bani hai. matlb jiss Server par website bani hai usko plugh kar deta hai Fack IP se . Mtlab ek server par kuch limits hoti hai , ki usme itne second me itne visiter aa sakte hai. Itne user usko surf kar sakte hai .Har Website ki Bandwith hoti hai. ki isme kitne users aa sakte hai . Kyuki wo user data lete hai. To data lene ki ya recive karne ki Server ki kuch limit hoti hai.  Jo Hacker hote hai, wo iska fayda udhate hai, aur jo Fack users bnaye jate hai. wo real user nhi hote hai, wo Machine ke bane botnets hote hai. Unhi Fake users ki alag alag IP set ki jati hai. Fir wo attck karte hai un server ke website pr , Man lijiye ek website par 200 log 1 second me visit kar sakte hai, to Hacker 300 Ip bnakaer Us website par visit karwyega. to usse Hacker ko koi Fayda nhi hoga , Bs server down ho jayega . DOS Attack ki khas bat ye hai ki Isme keval ek he IP se Bahut sari request bheji jati hai. Aaj kal ke computer me DOS attack na ke brabar hota hai , kyuki Aaj kal ke computer me itni Security hoti ki agar kisi IP se kafi requset aarhi hai to Server Us IP ko block kar deta hai.  Friends ab bat karte hai DDOS attack ke bare me . DDOs attack ka full name Distributic Denail Of Service hota hai. Iska bhi Kam Same DOS attack ki tarah hota hai , Bs Fark itna hota hai. DDOS attack ko perfom karne ke liye , Sabse pehle 1000, 10000  computer me Rat install karwaya jata hai. Jisse Un computer ko remote kiya ja sake . Uske bad un sbhi computer se se Jis bhi website par attack karna hai , us par wo 1000 Computer Requset karenge. wo bhi 1 second me . to kya hota itni request ek sath dekh kar Server Held Ho jata hai. Ya kam karna chod deta hai. aur Hacker , Server data ko chori kar leta hai. Iss attack ki khas bat ye  hai. ki ye 1 second me Number of request bhejta hai.  I hope aap ke smajh me agya hoga. agar fir bhi koi question hai to aap comment kar sakte hai.

    • Social Engineering:- Frinds ab hum bat karte Social Engineering ke bare me , to dosto maine issi post par sabse pehle topic Phishing Attack ke bare me btaya hai. Phishing Attack social engineering ka ek Part hai. Social Engineering kai chezo se juda jo normly False hota hai. Koi bhi galat jariye se kisi user ko fasana aisi cheze Social Engineering me aati hai. Yaha par insani dimak par sb khela jata hai. Agar koi user aapke jal me fas gya , or koi cheze enter kar raha hai. to usko ye nhi malum hona chaheye ki wo kuch galat kar raha hai. Usko ye lagna cheheye ki wo normal chiz kar raha hai, wo apni Information kahi na kahi Hacker ko Provide kar raha hai. wo apni Information de raha hoga ya to jis organization me work karta hai. Kyuki yaha bat koi particular account ki nhi ho rhi hai. koi Organization bhi ho sakti hai.

    • Keylogger:- Keylogger ek aise software hota hai, jo ki aapke key stroks ko udhati hai. Mtlab aap agar koi keyword type kar rhe hai. to keylogger kya kar raha hota hai, jo bhi pad rhi hoti keylogger uska sara record bnata hai ek text file ke andar, after some time agar aapne set kiya hai 1 month to wo automatic wo usko kisi Email par sms kr raha hota hai. kuck keylogger aise bhi hote hai ,  Agar aap apne computer par baithe hai to wo aapki image ko bhi le sakta hai. aap apne computer par kya kar rhe in sari chizo ka screen shot leta rehta hai. Agar aap kabhi koi crack software download karte hai to  Keylogger unke sath bhi chala aata hai. Iss liye aap kabhi bhi crack software ko download na kare. 

            

    Friday, 2 December 2016

    How to hide IP address in any Android Device?

    Hello, Dear readers ,You are wellcome in  this blog . My today's topic is How to hide IP Address in any Android Devices. You can hide your IP Address in Android Device for downloading android apps , while using Internet by default Internet Browser Operamini, Firefox, Google Chorme etc. it is very usefull trick for anonymous . It is very easy method to hide IP Address. Friends Why we need to hide IP Address? Dear readers some time some website not open some country, because some Government website are blocked your country. so some people hide IP Address and open any block website in your country. but some people try to illegal activity ,after hide our IP . but some websites trace there real IP Address.

    NOTE:-   You Don't use this trick for illegal works . this trick use for only educational purpose only.

         So lets start now, you need a VPN application to hide your IP Address . so there are many VPN appliction.

    • OpenVPN :-This is best android VPN app. Open VPN is the official android client. this is very easy to use and fast browsing and surfing speed. this worked both rooted and non rooted android device.                          
                                                                          Download Link


    • VPN One Click:- This app is also good VPN app . you can access easily. you can select any country that you want in this VPN application. this app worked both rooted and non rooted Android device. 

                                                                         Download Link

    • Hotspot Shield VPN :-  Hotspot Shield is the best free android VPN app . this app is best option to protect your privacy . it is top running in the world. because it is good speed. you can access easily. so you want fast speed browsing with hide your IP Address in android device. I suggest you , use this app.
                                                                        Download Link

    Thursday, 1 December 2016

    How to Capture Photos Secretly in hindi?



                      Hello friends , aaj ka mere topic hai. Aap apne  Android device se chupke se photo kaise le?  Dosto kai bar aisa hota hai . aap kisi chez ki photo khichna chahte ho , lekin aap khich na paye ho. Kyoki uss jagah photo khichna allowed nhi hota. To aaj is post me hum aapko aise App ke bare me btaunga jiska name hai "Spy Camera" Aur iski madad se aap badi aasani se bina kisi ke pta chale aap photo le sakte hai.



       Requirement

        ⦁ Android Device
        ⦁ Spy Camera  Download


    Step1:-  Sabse Aap ko apne phone ke  PlayStore me jana hai aur waha se Spy Camera name ke aap ko apne phone me download karna hai . Aap iss app ko niche di hui link par click karke download kar sakte hai.

    Step2:- Ab aapko Spy Camera App ko open karna hai.  aap nichhe  di hui image par dekh sakte hai.




    Step3:-  Ab aapko setting par jana hai . or waha se apne jarurat ke anusar setting ko save kar lena hai. 


     Frends jaise aap dekh rhe hai maine apni jarurat ke anusar setting save kar li hai. mai aapko bta du ki ye MyBook ek icon hai . jaha se aapko image capture karna hai. waha aapko ye MyBook ka icon najar aayega . Bs Aapko usi par click kr dena hai .


    aap uper se dekh sakte hai . maine jo MyBook pr click kiya tha . ye wahi icon hai. jb aap iss icon par click karenge to photo capture kar li jayegi or kisi ko pta bhi nhi chalega.
                       
                                              Friends meri aaj ki post kaisi lgi . agar aapko koi problem aarhi ho setting savr karne me . to aap mujhe comment kar sakte hai. aur agar aapko meri post achhi lgi to aap isse jyada se jyada share kare. thank u.