Posts

Showing posts from June, 2017

RELIANCE JIO OFFERING 30GB 4G DATA TO Xiaomi USERS

Image
               RELIANCE JIO OFFERING 30GB 4G DATA TO Xiaomi USERS RELIANCE JIO OFFERING 30GB 4G DATA TO Xiaomi USERS  Now Xiaomi and Reliance jio partner together  and give a offer to all xiaomi user. They offering up to 30 gb of additional data on selected xiaoni  smartphone only. The selected xiaomi smartphones are Redmi 2, Redmi 2 Prime, Redmi Note 4G, Redmi Note 4G Prime, Mi 4i, Redmi Note 2, Mi 5, Mi Max, Mi Max Prime, Redmi 3s, Redmi 3s plus, Redmi 3s Prime, Redmi Note 4, Redmi 4A and Redmi 4. If you use jio sim or activate for the first time on or after June 16 then this offer for you. Reliance jio is offering 5 GB of additional 4 GB data on recharge of Rs 309 and above. And limit of up to six recharge. Expiry date for this offer is March 31 , 2018. You get additional 5 GB data on each  recharge of 309. offer is only applicable for those who are the part of jio Prime subscription.  you will get additional 5 GB data 48 hours of recharge.                                      

MOST DANGEROUS HACKERS IN WORLD

Image
                 MOST DANGEROUS HACKERS IN WORLD  MOST DANGEROUS HACKERS IN WORLD   ? Kevin mitnick   Kevin mitnick is most dangerous hacker in his time. He used mostly social engineering techniques to hack. He had his cell phone and made free call. He also stolen the code from companies like Sun Microsystem and novell. He also hack into NSA (National security agencie) phone calls. But he was arrested in many frauds charge sent to Jail for 5 years. The court also says that this man created world war by  just calling a call. She is most dangerous hacker in his time. After you come from jail he is now work as a professional security consultant. ? Jonathan James  MOST DANGEROUS HACKERS IN WORLD He is well knows as comrode in cyber world. He was convicted and send to jail in USA for hacking in age of 15 only. He hacked many companies like Bell south, Miani -Dode school system and also NASA. yes he also hack NASA and stolen heavy amount of source code to learn  how NASA worked. NASA shutdow

HOW TO CLONE SIM CARD.

Image
                           HOW TO CLONE SIM CARD how to clone sim card   Cloning a SIM card is cool stuff that everyone want to do, but you don't know how to clone a SIM card. Before cloning sim card must know about SIM card that how it work. SIM (subscriber identity module) is the transmitter of signal to the mobile and Tower. SIM card have two types of keys IMSI value and kI value that enable the operator to know the mobile number and authenticate the customer. These two keys are important to cloning a SIM card because IMSI and KI are the keys help to register the SIM card on the mobile network.               how to clone sim card                  ?How it work The network operator only need IMSI and KI keys authenticate the customer and this is a big flow of GSM network. When we put these two key in blank Sim  then the operator think that this is origal sim and operator authenticated the sim. ?Step to cloning a SIM card First you need. 1. Blank sim card. 2. Card reader( available

APP FOR CYBER SECURITY - TECHNOLOGY NEWS - TIPS AND TRICKS - VIRAL TECH - ABOUT NEW TECHNOLOGY

Image
                                      OFFICAL APP FOR CYBERTROUBLESHOOT NOW YOU CAN READ OUR INTERESTING TOPIC ABOUT cyber security - technology news - tips and trick - viral tech - new technology     ON YOUR ANDROID PHONES JUST IN ONE CLICK.                                                   WE LAUNCH OUR OFFICAL APP                                                                                                               ? DOWNLOAD NOW                                                     ( THANKS FOR YOUR SUPPORT )

SEND SELF DELETING MESSAGE.

Image
                     SEND SELF DELETING MESSAGE SEND SELF DELETING MESSAGE whenever you see in movie where spy receive message and after reading the full message it delete automatically. If you think that it is not possible in real life then you're wrong yes it is possible. When you have to send some important message to other and not feel secure the message then this topic helpful to you. I am going to tell you how you can make self deleted message. PRIVNOTE              SEND SELF DELETING MESSAGE        Privnote site which give the great service to self deleted message. This website allow user to send one time message.  just right the message and create a link for the secret message. You also add password protection in your message and the website generate a link. Share this link with the person you want to send message and when the person read the message you got notification that the person read the message and the link expire after the first use. BURNNOTE Burnnote is similar

HOW TO REPAIR CORRUPTED PENDRIVE & MEMORY CARD.

Image
                       HOW TO REPAIR CORRUPTED PENDRIVE &MEMORY CARD                            HOW TO REPAIR CORRUPTED PENDRIVE &MEMORY CARD                                                          We all face  the problem with our USB drive like in memory card, pendrive and more. The common problem is corrupted. Your USB drive corrupted by many reasons like virus and improper ejection of your USB drives. What you do if your USB drive corrupted. I think many of you replace it by new one. So I am given you some method to which you can easily repair your corrupted memory card or pendrive. So keep reading up to down I am telling you all the solutions by which you can repair your USB storage device. ?Method 1. Many times Windows failed to read your outdated USB drive. But when you update your USB drive it could fix any existing problem in USB drives. How to update. Open run box and type devmgmt.msc You will see device manager. Explain the universal serial bus controller by clickin

REMOVE YOUR INFORMATION FRON TRUECALLER.

Image
                                REMOVE YOUR INFORMATION FROM TRUECALLER REMOVE YOUR INFORMATION FROM TRUECALLER You all know about Truecaller which show you contact detail of unknown number calling you. No doubt True Caller is great app. Truecaller is open source contact details from all its user's address book. It work great with it collect information function. Truecaller collect information of your number from social networking sites and if you not use social networking sites then even it collect information from who save your contact detail and allow the app to access them. Do you know the fact about the Truecaller. As per rule if you disagree to reveal you information then no one can reveal it. So there is also a feature in Truecaller to remove your information from it. We will tell you how you can remove your information from Truecaller. First go to      https://www.truecaller.com/unlist      And here you search your number in the search box. (add +your country code and th

LEARN ANDROID PROGRAMMING COURSE WITH GOOGLE IN FREE

Image
             LEARN ANDROID PROGRAMMING COURSE WITH GOOGLE  IN FREE   LEARN ANDROID PROGRAMMING COURSE WITH GOOGLE  IN FREE                                            ? LEARN ANDROID PROGRAMMING As you know that Android have large number of its uses. As thinking of that the search giant has partnered with Udacity , the online education companies provide a week long android basic nainodegree course. This course is available on the online learning platform Udacity , which is designed to teach those people who have no programming experience to make a Android app soo, google in partner with Udacity making a course which easly understandable to everyone. In this course nanodegree are available online for free but Udacity paid service included project guidance , coaches , counselling and certificate upon competition. This course designed by Google building app that solve real world problem. You can do experience with using Android studio which  help in implement better user interface and mo

Not Use Apps & Sites Which Increase Your Like , Comment And Followers

Image
               Not Use Apps & Sites Which Increase Your  Like , Comment And Followers   Not Use Apps & Sites Which Increase Your Like , Comment And Followers We use app or site how to increase our like,comment, followers on social networking sites. But do you know how harmful  it is.   There is no any official method to increase like, comments follower, on social networking sites. SocialNetworking company do not have any official method to do this things. We use third party app or site to do these things. But do you know the app or site which increase our like comment and flowers they are stolen our information. Not Use Apps & Sites Which Increase YouR Like , Comment And Followers  If you notice  third party app or site take permission look into your social networking account why they do this. Think if you add your bank details in your social networking accounts then what happened the bank detail also look up by third party app or sites. Not Use Apps & Sites Which Inc

How to capture picture who try to unlock the phone.

Image
                    How to capture picture who try to unlock the phone. How to capture picture who try to unlock the phone. Now a days we all use a smartphone and store  important data in it.. But we did not know how to secure our  smart phone and data. So I tell you how to secure your smartphone as like anyone tried to unlock your  phone than phone will  capture a picture of that person. How to capture picture who try to unlock the phone. ?Follow the steps :- Download an app called Hidden Eye install it. How to capture picture who try to unlock the phone. Now open the app then you will see the three checkbox. Turn on this  intruders on unlock and now click ok button. You also check another option according to your wish. How to capture picture who try to unlock the phone. That it , this app now work for you. If someone try to unlock you android smartphone then will capture the picture of that person.  You can also use some other app like Lockwatch , Foxtrap ( foxtrap is also a good

10 AMAZING FACCBOOK FACTS.

Image
                         10 AMAZING FACCBOOK FACTS                  10 AMAZING FACBOOK FACTS                  Facebook is one of largest social networking sites. facebook connects people from all over the world. we can share our daly life happen on facebook. soo now it become a part of ourlife.There are many facts about facebook and now I am tell you 10 AMAZING FACEBOOK FACTS .                            ? You never block Mark Zuckerberg on Facebook.                                 ? 30 million dead people account on Facebook.                     ?  Everyday 600,000 hacking are made to Facebook account.                         ? Facebook has designed february 2016 as friend's day.      ?   Mark Zuckerberg has disease of colour blindness soo primary colour of Facebook is blue.            10 AMAZING FACCBOOK FACTS                          ? Every second 8 people joined Facebook 7246 people every 15 minutes.                                  ?  Facemash is older name of Facebook

HOW TO RECOVER DELETED BROWSING HISTORY.

Image
                     HOW  TO RECOVER DELETED BROWSING HISTORY I am going to tell you the method to recover deleted browsing history . First see how it important. If you are parents or you want to see someone browsing history browsing history. ?1. Method to recover history without any tool. ? First you need to open CMD. You can use window + r then type CMD in box to open it. And cmd open.    Type throwing command ipconfig/displaydns.                                                                                         how to recover history without any tool.                                                                   And hit enter. ? And you will get all recently visited websites. Note:- once you restart or shutdown your PC all this save DNS catch will be lost. ?2. Method  to recover deleted browsing history with the help of tool. ? You need to download Systenance Index.dat on your computer. ? Install it and launch software on your PC you see screen like this below.