Sunday, July 17, 2016

Pokémon GO map
Pokémon GO was released just a few days ago and is already taking the world by storm. The new game, created by Nintendo in partnership with Niantic, has made headlines all over the world. The experts are even talking about a new mania that is driving both the young and middle-aged crazy! In less than a week since its release in the United States, Pokémon GO is proving more addictive than Tinder and Snapchat, according to the official numbers, while an abundance of stories and crazy facts about the popular app are going viral. We’ve collected 25 Pokemon GO Facts that are making it the hottest thing at the moment. The real question is: Why bother searching for a date when you can say, “I choose you” to Pikachu? He’s probably cuter anyways! These are 25 Pokemon GO Facts You’ve Gotta know Before You Go.



 

Breaking All the Records

The First week of its release, Pokemon GO is already reported bigger than Tinder in the US. Nintendo’s valuation went up by $9 billion with all the press and mania over the release of Pokemon GO worldwide. Pokemon GO was installed more than twice the number of the android phone in the First week. As per the report from SimilarWeb, 62 percent of Android users in the US are playing the game everyday which also break the daily users record of social giant Twitter.

Making You Healthy

The Game uses the Geotagging so the player can catch Pokemons in Real World, this makes the Players get out of the office/home and walk around in the real world. Your character in the game walks and turns the same way you move. In the First week, we saw a lot of players complaining about the Sore Legs and posting funny stories about the game online. You might be lucky if you have a PokeStop and a Gym nearby but for hatching Pokemon eggs, the game requires you to walk a set distance to accomplish this goal.

A Profitable Side Business

After the Hugh Success, the trending Pokemon GO has led many business owners to either post warning signs on their properties or make a business out of the Lucky PokeStop. For example, there is a PokeStop at the Restaurant you might take an advantage of it and attract more Pokemon trainers at your location. There are also few cases where people have complained about trespassing their private property.

May Help Some Criminals to Commit Crimes

Being the Fun part that you have to explore the real world also makes it scary as there are savvy criminals who have already tried to take advantage of the new trend. You have to be careful where you are heading. Police officers in O’Fallon, Missouri, arrested four people suspected of using Pokemon GO to lead their victims to remote areas to 'catch' Pokemon characters and rob them. Be Careful and Stay Alert.

Fake Counterfeit Version

Pokemon Go has to be Launched for Australia, The United States, and New Zealand. If you happen to live outside these three then you'll be trying to download from some sources. We want to warn you about the Counterfeit Version of Pokemon GO are there online which contains malicious content that can damage your phone. Try to wait until July 15, when the game is expected to be released in Europe and Asia.

Reason behind Pokemon GO

According to its developers, Pokemon GO is destined to help people with anxiety, panic attacks, and depression. As the Game requires and forces people to physically get up and head outside to explore the new area, it encourages people with agoraphobia to leave their house, exercise and engage with other people.

Fun But Risky

While playing Pokemon GO, you need to track the nearby PokeStops, Gym, and sometimes places where Pokemon spawn, but getting people out of the house to play a video game can also be terrifying at times. The is a warning for those players who go into strange alleys finding for Pokemon. Reportedly, A girl searching for a Pokemon ended up finding a dead body. Be Alert.

Good for Young Americans

Americans have always think about distance in miles and in Pokemon GO you need to think in kilometers instead of miles. Gizmodo predicts that millions of young Americans will eventually learn the metric system all because of Pokemon GO, as it will force them to think in kilometers instead of miles.

Monday, March 30, 2015

The most awaited feature of Whatsapp has finally came and that is Whatsapp voice calling. There were users who were eager to avail this feature of Whatsapp and it has finally came. The latest voice calling feature has taken Whatsapp to another peak of success.
The Whatsapp voice calling is not different from Viber, Skype, Line or other services, but it has many more users than these. Therefore, there is a scope of using this feature by many users and many can interact with their circle using Whatsapp voice calling. Additionally, there must be many users who are not very much acquaint with the process of enabling this on their Smartphones. Therefore, today we are going to make you learn that, “How to Enable Whatsapp Voice Calling on Smartphone?” You need to apply these simple steps and then you’ll be able to start making voice calls to your Whatsapp friends; however, remember that your friend must have enabled the voice calling too. You can only make calls using Whatsapp ones you have enabled the voice calling both sides.


Learn-How to Enable Whatsapp Voice Calling

So, here are the steps which are supposed to followed in order to enable Whatsapp voice calling on your Smartphones. The steps are quiet simple yet hidden and today these are going to be revealed for you guys here. Now, without taking your time more, I would request you to get towards the below piece of content in order to get this feature for your accounts too.

1. First of all, get the latest version of Whatsapp on your Phone. The latest version is Version 2.12.16.

2. Once it is downloaded then install it on your Phone and then it’ll automatically add the voice calling feature to your account.

3. Now, you need to go to your Contacts and find a friend who has enabled this feature already, then you’ll see a Call button there. Simply tap on it and start making voice calls.

Conclusion

This was our simple guide which could be used to enable Whatsapp voice calling on your Smartphones. We are sure that this would have been proven helpful for many of you out there. If you have any queries or questions to ask then do let me know. We shall get back to your queries and questions as soon as possible.

Furthermore, if you have found this guide helpful and worth reading then do share it with your other friends and circle too. You may never know that your shares may be proven helpful for many of the users out there. So, keep sharing and liking our content over social media in order to keep helping people in your circle.

Friday, March 27, 2015

Hope you enjoying well, Today we going to give you a new trick of AirTel 3G TCP vpn configs of April 2015 for free net/Gprs in your mobile and computer.This TCP trick working fine in many states and also giving 3G speeds so no need to very so read full post to know how you use it Free. 

There is so many days left we does not post any airtel trick so we decided to post new again.Because you know airtel is our favorite network for free net.
                    

So let's start...

Requirement For this AirTel 3G Tcp Vpn Trick 
  1. AirTel 3G/2G Enabled Sim card.
  2. Nmdvpn Client (download from here).
  3. PC or MOBILE.
If you have all basic requirements which above listed,then you are ready to go for next steps.And i hope you have every thing.
Now most important thing ,Now download config file from below link First.


Now i Hope you downloaded above file form datafile host link.Now  you are ready to move next step.Now choose you pc user or mobile user ,means on which medium you are going to use it and choose those medium and follow the steps.

For PC Users:

1.Connect your system with modem/Mobile with APN airtelgprs.com
2.Download The Attachment ofAirtel Tcp 3G Vpn Trick (if downloaded all ready then go to next step).
2.Install Nmdvpn and Put configs(or exact) Here (C:\Program Files\NMDVPN\config) in your system location
3.Windows 7 and Windows 8 Users RUN NMD VPN as the Administrator.
4.Just Connect given server and Enjoy.

And if you have not a PC/Computer  Then you can also enjoy free net in your android mobiles.

For Mobile users 

Android mobile use can also use these airtel tcp 3G Trick configs  with their android devices just you need to follow these simple steps :
  1. Download and extract config in SD card.
  2. Go to Google Play Store Search for open vpn for android. Or Click Here
  3. Install Open Vpn in you android device.
  4. Add airtel tcp 3G Vpn Config to open Vpn folder.
  5. when it ask user name password (see earticleblog txt file in attachment) enter it.
  6. Run and Enjoy  :) 
Hope you follow all process and enjoyed this trick.
Note- Do't try at higher balnce your balnce got deducted.Use it at 0 rs balnce.

Friday, March 6, 2015

facebook-suicidal-post-reporting-tool-

A few ago, in order make its product more helpful, Facebook updated its tool to report suicidal post. Facebook claims that this tool will make it easy to report a person if he is having any kind of suicidal tendency. You can report a friend’s suicidal post and that friend will be provided help using different measures.

Today, I am going to tell you how to report suicidal posts on Facebook.

Step 1: Click on the arrow in top right corner of the post and then click on “I don’t like this post.

facebook-suicidal-post-reporting

 

Step 2: Now click on “I think it shouldn’t be on Facebook” and continue.

facebook-suicidal-post-reporting-step2

Step 3: Select  “It’s hurtful, threatening or suicidal” and continue.

facebook-suicidal-post-reporting-step3

Step 4: Now select “I think they might hurt themselves.”

facebook-suicidal-post-reporting-steps

Step 5: Now Facebook will give you different options to reach to your friend who is having some suicidal tendency. This option may vary in number depending upon the services provided in your region. I am getting only 3 here, but for some of you options like “Chat with the trained helper” or “Call lifeline

facebook-suicidal-post-reporting-steps

Friday, February 13, 2015

At the start of this month, Whatsapp added a new feature of Reading Receipts. One grey tick meant that the message has been sent, two grey ticks meant that the message has been delivered and two blue ticks meant that the message has been read by the recipient. The new Whatsapp feature of reading receipts was a welcome feature for many people, but it was a nightmare for some. I personally found the feature helpful and I was already loving similar feature on Hike and BBM.

Now Whatsapp is rolling out an update to give its users the choice to disable this feature. Read this post to know how to disable blue ticks right now.


Whastapp was on the receiving end on many online forums where people blamed this feature for jeopardising their relationships and some even claimed the instances of divorce due to divorce. Some people may fail to understand the concern, but this surely is an important factor if you are ignoring someone.

Now Whatsapp has addressed this issue and is working on a new update. This update features the option to disable the blue tick (reading receipts) on your phone. Right now this update is unavailable on mobile app store platforms but Whatsapp has released the updated version of app on their website. You need to manually download the application and install the Whatsapp apk file. The available version of Whatsapp on Google Play store is 2.11.432 but the update version available on the website is 2.11.452.

updated-whatsapp-blue-ticks

Updated version 2.11.452 installed on my device

How to get the update right now? 

  • Go to the Whatsapp website and download the apk file.
  • Once downloaded, transfer the file to your phone.
  • Open the apk file from your file browser app and click on the file.
  • After completing the installation, go to settings menu un Whatsapp and then proceed to privacy option.
  • Here you will see the Read Receipts option already checked.
  • Now uncheck this option to disable the blue tick.
whatsapp-update-blue-tick

Read Receipts option in privacy settings

Right now this update is only available for Android users via apk download. It is not known when the full update will be pushed out to all users, or when other platforms including iOS and BlackBerry will see the changes.


Saturday, July 19, 2014

How Can We Protect Our Website By Common Web Attacks ?

 


On this post i am telling about five types of common web attacks, which are used in most types of defacements or dumps of databases.
Following five exploits are listed SQL injection, XSS, RCE, RFI, and LFI. Most of the time, we missed out some website code tags. So that our website gets attack and allows the hacker for hijack the vulnerable website.

1. SQL Injection
       
Types ->

     Login Form Bypassing
     UNION SQL Injection

2. Cross Site Scripting ( XSS )

Types -> Cross Site Request Forgery

3: File Inclusion

Types -> Remote File Inclusion and Remote Code Execution


1. SQL Injection

>> Login Form Bypassing
Here is an example of the vulnerable code that we can bypass very easily:

    index.html file:
    <form action="login.php" method="POST" />
    <p>Password: <input type="text" name="pass" /><br />
    <input type="submit" value="Authenticate" /></p>
    </form>
    login.php file:
    <?php
    // EXAMPLE CODE
    $execute = "SELECT * from database WHERE password = '{$_POST['pass'])";
    $result = mysql_query($execute);
    ?>

We can simply bypass this by using ' or '1=1', which will execute "password = ''or '1=1'';".

Alternatively, the user can also delete the database by executing "' drop table database; --".


>> PREVENTION:

Use mysql_real_escape_string in your php code.

Example:

    <?php
    $badword = "' OR 1 '";
    $badword = mysql_real_escape_string($badword);
    $message = "SELECT * from database WHERE password = "'$badword'";
    echo "Blocked " . $message . ";
    ?>

>> UNION SQL Injection

UNION SQL injection is when the user uses the UNION command. The user checks for the vulnerability by adding a tick to the end of a ".php?id=" file.
If it comes back with a MySQL error, the site is most likely vulnerable to UNION SQL injection. They proceed to use ORDER BY to find the columns, and at the end, they use the UNION ALL SELECT command. An example is shown below.

http://www.site.com/website.php?id=1'

You have an error in your SQL syntax near '' at line 1 SELECT SUM(quantity)
as type FROM orders where (status='completed' OR status='confirmed' OR status='pending') AND user_id=1'


No error--> http://www.site.com/website.php?id=1 ORDER BY 1-- 

Two columns, and it comes back with an error! This means that there is one column.
 http://www.site.com/website.php?id=1 ORDER BY 2--


Selects the all the columns and executes the version() command on the only column.
http://www.site.com/website.php?id=-1 UNION SELECT ALL version()--



SOLUTION:

Add something like below to prevent UNION SQL injection.

    $evil = "(delete)|(update)|(union)|(insert)|(drop)|(http)|(--)|(/*)|(select)";
    $patch = eregi_replace($evil, "", $patch);



2. Cross Site Scripting

Cross site scripting is a type of vulnerability used by hackers to inject code into vulnerable web pages. If the site is vulnerable to cross site scripting, most likely users will try to inject the site with malicious javascript or try to scam users by creating a form where users have to type their information in.

There are two types of XSS (cross site scripting) are persistent XSS and non-persistent XSS.


Example:
http://www.site.com/search.php?q=">


SOLUTION

        function RemoveBad(strTemp) {
            strTemp = strTemp.replace(/\<|\>|\"|\'|\%|\;|\(|\)|\&|\+|\-/g,"");
            return strTemp;
        }



3. File Inclusion
Types: Remote File Inclusion/Local File Inclusion, and Remote Code Execution

Remote File Inclusion allows a hacker to include a remote file through a script (usually PHP). This code is mostly patched on websites, but some websites are still vulnerable to the vulnerability. RFI usually leads to remote code execution or javascript execution.

Example of the vulnerable code:

    <?php
    include($_GET['page']);
    ?>

Exploiting would be something like as follows:
http://www.site.com/page.php?page=../../../../../etc/passwd or
http://www.site.com/page.php?page=http://www.site.com/xyz.txt?

SOLUTION:

    Validate the input.
    $page = $_GET['page'];
    $allowed = array('index.php', 'games.php' 'ip.php');
    $iplogger = ('ip.php');
    if (in_array $page, $pages)) {
    include $page {
    else
    {
    include $iplogger
    die("IP logged.");
    }


For remote code execution, the site would have to have a php executing command. You would patch this by about doing the same thing.

 Note: I hope this post will helpful for your website to get secure from above types of attacks.

Thursday, July 17, 2014

Type of attack on Web Based Application


 
[~]Sql Injection Attack
[~]Hibernate Query Language Injection
[~]Direct OS Code Injection
[~]XML Entity Injection
[~]Broken Authentication and Session Management
[~]Cross-Site Scripting (XSS)
[~]Insecure Direct Object References
[~]Security Misconfiguration
[~]Sensitive Data Exposure
[~]Missing Function Level Access Control
[~]Cross-Site Request Forgery (CSRF)
[~]Using Components with Known Vulnerabilities
[~]Unvalidated Redirects and Forwards
[~]Cross Site Scripting Attacks
[~]Clickjacking Attacks
[~]DNS Cache Poisoning
[~]Symlinking – An Insider Attack
[~]Cross Site Request Forgery Attacks
[~]Remote Code Execution Attacks
[~]Remote File inclusion
[~]Local file inclusion
[~]Evercookie
[~]Denial of Service Attack
[~]Cookie Eviction
[~]phpwn
[~]NAT Pinning
[~]XSHM
[~]MitM DNS Rebinding SSL/TLS Wildcards and XSS
[~]Quick Proxy Detection
[~]Improving HTTPS Side Channel Attacks
[~]Side Channel Attacks in SSL
[~]Turning XSS into Clickjacking
[~]Bypassing CSRF protections with ClickJacking and
[~]HTTP Parameter Pollution
[~]URL Hijacking
[~]Strokejacking
[~]Fooling B64_Encode(Payload) on WAFs and filters
[~]MySQL Stacked Queries with SQL Injection.
[~]Posting raw XML cross-domain
[~]Generic cross-browser cross-domain theft
[~]Attacking HTTPS with Cache Injection
[~]Tapjacking
[~]XSS-Track
[~]Next Generation Clickjacking
[~]XSSing client-side dynamic HTML.
[~]Stroke triggered XSS and StrokeJacking
[~]Lost in Translation
[~]Persistent Cross Interface Attacks
[~]Chronofeit Phishing
[~]SQLi filter evasion cheat sheet (MySQL)
[~]Tabnabbing
[~]UI Redressing
[~]Cookie Poisoning
[~]SSRF
[~]Bruteforce of PHPSESSID
[~]Blended Threats and JavaScript
[~]Cross-Site Port Attacks
[~]CAPTCHA Re-Riding Attack
Add me on Facebook Follow me on Twitter!