Tuesday 19 November 2013

How do I write a JavaScript?

How do I write a JavaScript?

Question

How do I write a JavaScript?

Answer

To write a JavaScript, you will need a Web browser and either a text editor or an HTML editor.
  • For the Web Browser, you could use Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, or any modern Web browser you prefer.
  • For the text/HTML editor, you can use any number of options such as NotepadWordpad, Dreamweaver, or one of the numerous other editors available.
Once you have the software in place, you can begin writing JavaScript code. To add JavaScript code to an HTML document, you will need to create or open an HTML file with your text/HTML editor. A basic HTML file will have a docType and some basic HTML tags such as <html> <head> and <body>. For example, a basic HTML 5 document might look something like what is shown below.
<!DOCType HTML>
<html>
<head>
<title>Testing JavaScript</title>
</head>
<body>
Content goes here...
</body>
</html>
When you see JavaScript code on the Web, you will sometimes see some JavaScript code between the <head></head> tags, or you may see it within the <body></body> tags (or even in both places). To separate JavaScript code from HTML code, you will need to enclose it within a set of <script></script> tags. The opening <script> tag has one required attribute and one optional attribute. The required attribute is the type attribute, while the optional attribute is src (which allows you to point to an external script file, covered later in this answer). The value of the type attribute is set totext/javascript, as shown below.
<script type="text/javascript">
Your JavaScript code will go here...
</script>
As you can see, your JavaScript code will be placed between the opening and closing script tags. As an example script, you could write a simple string of text directly on the Web page, as shown in the code below (place this between the <body> and </body> tags):
<script type="text/javascript">
document.write("This text was written using JavaScript code!");
</script>
This uses a standard JavaScript function to write the text between the quotation marks on the page. It would look like the below example.
This text was written using JavaScript code!
Another option for including a JavaScript on a page is to create the script in an external text file and save it with a .js extension (making it a JavaScript file). This file is then included in the page using the src attribute of the opening script tag. So, if you wanted to use the script above by placing it in an external file, you would place the JavaScript code (without the script tags) into a new text file, as shown below:
document.write("This text was written using JavaScript code!");
You would then save the file with a .js extension. For instance, you could save it as write.js. Once the file has been saved, you can call it from the HTML code via the src attribute of the opening script tag, as shown below for write.js.
<script type="text/javascript" src="write.js"></script>
This will have the same effect as writing the code between the script tags, but won't clutter the HTML code with JavaScript code (which can become quite lengthy at times). Another advantage to this method is that the same script can be included in multiple pages, and editing the script file will update the script in every page that uses the external script file. This makes it far easier to edit the script as it can be done in one place (rather than editing the code within the script tags on each page that contains the  script

Monday 18 November 2013

Keylogger

Keylogger is a software program or hardware device that is used to monitor and log each of the keys a user types into a computer keyboard. The user who installed the program or hardware device can then view all keys typed in by that user. Because these programs and hardware devices monitor the keys typed in a user can easily find user passwords and other information a user may not wish others to know about.
Keyloggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only. Unfortunately, keyloggers can also be embedded in spyware allowing your information to be transmitted to an unknown third party.


 About keyloggers

key loggersA keylogger is a program that runs in the background, recording all the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker. The attacker then peruses them carefully in the hopes of either finding passwords, or possibly other useful information that could be used to compromise the system or be used in a social engineering attack. For example, a keylogger will reveal the contents of all e-mail composed by the user. Keylogger is commonly included in rootkits.

A keylogger normally consists of two files: a DLL which does all the work and an EXE which loads the DLL and sets the hook. Therefore when you deploy the hooker on a system, two such files must be present in the same directory.

There are other approaches to capturing info about what you are doing.

    * Some keyloggers capture screens, rather than keystrokes.
    * Other keyloggers will secretly turn on video or audio recorders, and transmit what they capture over your internet connection. 

A keyloggers might be as simple as an exe and a dll that are placed on a machine and invoked at boot via an entry in the registry. Or a keyloggers could be which boasts these features:

    * Stealth: invisible in process list
    * Includes kernel keylogger driver that captures keystrokes even when user is logged off (Windows 2000 / XP)
    * ProBot program files and registry entries are hidden (Windows 2000 / XP)
    * Includes Remote Deployment wizard
    * Active window titles and process names logging
    * Keystroke / password logging
    * Regional keyboard support
    * Keylogging in NT console windows
    * Launched applications list
    * Text snapshots of active applications.
    * Visited Internet URL logger
    * Capture HTTP POST data (including logins/passwords)
    * File and Folder creation/removal logging
    * Mouse activities
    * Workstation user and timestamp recording
    * Log file archiving, separate log files for each user
    * Log file secure encryption
    * Password authentication
    * Invisible operation
    * Native GUI session log presentation
    * Easy log file reports with Instant Viewer 2 Web interface
    * HTML and Text log file export
    * Automatic E-mail log file delivery
    * Easy setup & uninstall wizards
    * Support for Windows (R) 95/98/ME and Windows (R) NT/2000/XP 

Email Hacking

                                      EMAIL HACKING

Do U Think If Your Email Can Not Been Hackable, Then You Are Wrong...
Ur Email-ID Can Be Hack... But Its Can Be Hack Only Fault by User.. Most Of The Peoples Think That Their Has A Software to Hack A Email- ID's But Truth Is Their Is No Software Present For Hacking Ur Mail ID's..

Email Hacking can be possible to many ways like:-
 
1. Social Engineering

2.Phishing Attacks

3. Cookie Hijacking

4. By Keyloggers



Social Engineering:
This Process is defined as Hack the human mind without any tools...
This has become one of the hottest topics today and it seems to work out most of the times. Social Engineering doesn’t deal with the network security issues, vulnerabilities, exploits, etc. It just deals with simple Psychological tricks that help to get the information we want. 
This really works!! But it requires a lot of patience.
We are all talking about network security and fixing the vulnerabilities in networks.
 But what happens if some internal person of a network accidentally gives out the passwords. After all 
we are all humans; we are also vulnerable and can be easily
 exploited and compromised than the computers.

Social Engineering attacks have become most common during the chat sessions.
With the increase in use of Instant Messengers, any anonymous person may have a
chat with another any where in the world. The most crucial part of this attack is to
win the trust of the victim.


Phishing Attack:
The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surroundering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information.

Cookie Hijacking:
In cookie hijacking we can hack email accounts very easily.. This trick is very
 dangereous because whenever user change a password then there is no need to
 attacker for again hack Email- ID of victim.
 And it would take you to inbox of victim's yahoo account without asking for any password of victim account.

Keyloggers:
Keylogger is a software program or hardware device that is used to monitor and log
each of the keys a user types into a computer keyboard. The user who installed the program or hardware device can then view all keys typed in by that user. Because
these programs and hardware devices monitor the keys typed in a user can easily
find user passwords and other information a user may not wish others to know about.

Keyloggers, as a surveillance tool, are often used by employers to ensure employees
 use work computers for business purposes only. Unfortunately, keyloggers can also
 be embedded in spyware allowing your information to be transmitted to an unknown third party.

Phishing Attacks

Phishing Attacks

>>WHAT IS PHISHING:-

The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surroundering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information.

 


>>MOBILE PHISHING:

Phishing scams are not limited to the internet. Some phishers use the telephone to make requests for information. If you get a call from your banking institution asking for personal information, hang up and call your bank directly. Your bank will have your social security number and account information on file and should only ask you to verify a few digits.

like Iphone,Apple ,iTunes n more...By SMS

EXAMPLE:-

>>Congratulations! Your mobile phone has won US$ 10 Million prize money. To claim your money, call this number XXXXXXXX,give your permanent address,pin number,account number or credit card number...

The phisher can ask like it They want your personal Information.

 Some people do the reply to phisher then after he/she can be target of Phisher... so never be reply these type of Messages or Mail.

 


In a phishing attack, the attacker creates a situation wherein people believe that they are dealing with an authorized party, like their bank or another service provider. The attacker will ask the victim for sensitive information such as credit card information.



>>Phishing attacks generally target:

    * Bank information – e.g. VISA and PayPal accounts.
    * Username and password information.
    * Social Security numbers.
    * Information which can be used to retrieve forgotten or lost credentials.



>>Follow the tips below to protect yourself against these threats:

· Your bank will never ask you to divulge account information or passwords via email. Never give out this information, especially via email.

· Don’t open emails that come from untrusted sources.

· Don’t run files that you receive via email without making sure of their origin.

· Don’t click links in emails. If they come from a known source, type them on the browser’s address bar. If they come from an untrusted source, simply ignore them, as they could take you to a web designed to download malware onto your computer.

· Keep your computer protected. Install a security solution and keep it up-to-date.


>>Protect yourself from Phishing scams that could lead to identity theft. I cannot stress this enough. Phishing scams are a hot topic lately that have grown with the popularity of online banking and social networking sites like MySpace, Facebook and Friendster.



The term Phishing comes from the analogy to "fishing". The phisher uses a bait to lure victims into giving out personal information like passwords and credit card numbers. The bait is typically and urgent plea from one of the victims friends or trusted websites, asking for information to resolve some sort of problem with their account.


>>Anti-phishing software is a must for anyone that accesses the internet. Most of the internet service providers have some safety measures included as part of their online security software. Most web browsers also have add-ons that can detect most phishing scams. Unfortunately, these measures are not enough. Some of the more clever phishers have found ways to trick the anti-phishing software so you need to be cautious of suspicious emails and messages.

Social Engineering:- To Hack The Human Mind :)

Social Engineering:-  To Hack The Human Mind :)

This has become one of the hottest topics today and it seems to work out most of the times. Social Engineering doesn’t deal with the network security issues, vulnerabilities, exploits, etc. It just deals with simple psychological tricks that help to get the information we want. This really works!! But it requires a lot of patience.
We are all talking about network security and fixing the vulnerabilities in networks. But what happens if some internal person of a network accidentally gives out the passwords. After all we are all humans; we are also vulnerable and can be easily exploited and compromised than the computers.
Social Engineering attacks have become most common during the chat sessions. With the increase in use of Instant Messengers, any anonymous person may have a chat with another any where in the world. The most crucial part of this attack is to win the trust of the victim.
                                   
It may take a long time (may be in minutes, hours, days or months) for this to happen. But after you are being trusted by the victim he will say you every thing about him. Most of the times his person information will be useful to crack his web accounts like e-mail ids, etc. Even some people are so vulnerable to this attack that they even give their credit card numbers to the strangers (social engineers).
Some social engineers stepped one more forward and they send some keyloggers or Trojans to the victims claimed to be as screensavers or pics. These keyloggers when executed gets installed and send back information to the attacker. So be careful with such attacks.

Prevention:
1) Don’t believe everyone you meet on the net and tell them every  thing about you. Don’t even accidentally say answers to the questions like “What’s you pet’s name?”, “What is your mothermaiden’s name?”, etc. which are particularly used by your web account providers to remind your passwords.

2) Don’t give your credit card details to even your chating through instant messengers. Remember, it’s not a hard deal for an attacker to crack an e-mail id and chat with you like your friend. Also data through IMs can be easily sniffed.

3) Don’t accept executable files (like *.exe, *.bat, *.vbs, *.scr, etc.) from unknown persons you meet on the net. They might be viruses or Trojans.
Please act carefully, use security software and ask professionals for help.

HOW TO HACK EMAIL PASSWORDS?

HOW TO HACK EMAIL PASSWORDS?

everyday I get a lot of emails where the people ask me How to Hack an Email password? You as the reader are most likely reading this because you want to hack into someone�s email. So I have decided to let you know a few methods of hacking... just easy methods, I can not reveal how a proffesional work is running.

Nowadays, passwords are the only form of security on most websites and computer systems. It has become one of the most common and easiest ways for a hacker to gain unauthorized access to your computer or network.

But before to step further, there are a few things you should be aware of 

1. There are only a few websites who provide readymade software that can hack emails just with a click of a button. But due to the nature of this business those sites do not provide hacking software to any visitor of their site. So if you come across a site selling �Email Hacking software� for a few hundreds dollar, please don�t trust it. Such softwares costs more than a thousand dollars to create and cannot be sold for 3-400 USD.

2. Never trust any email hacking service that you see for the very first time. Nowadays there are many fake email hacking services. Do not pay anybody without seeing your target�s inbox screenshots. If you still have any doubt (because maybe you did not recognize anything from the provided snapshot) ask them to send you a snapshot of your own email that you have sent to the targeted person. Not all of the email hacking services are scam, You only have to watch out for the scammers. Usually everyone that send you a email pretending to be from inside of your target`s account , is a scammer because it is easy to forge the headers of an email.

Let me expose a few methods to "hack" an email password...

Before we get into cracking passwords with programs, I will explain a couple old-fashioned ways to obtain someone�s password.

Social engineering is the name given to the art of attacking the person, rather than the computer or system. The basic principle is that many people can be talked into giving someone else their id and password if they think it is someone that they can trust.
The classic social engineering attack is telephoning legitimate users of a system you wish to access and talking them out of their passwords. Here is an example: 
---------------------------------------------------------------------
[user] Hello?
[hacker] Hi, this is Bob from IT Security. We've had a security breach on the system and we need every user to verify their username and password.
[user] What do I need to do?
[hacker] Let's walk through a login, just to make sure everything is fine.
[user] OK
[hacker] OK, go ahead and login. What username are you coming in as?
[user] My username is "smith".
[hacker] Excellent. What password are you using?
[user] I am using the password "drowssap".
[hacker] Do you have a system prompt yet?
[user] Yes, I'm in.
[hacker] OK, there you are. I see you now. Everything is fine. We appreciate your cooperation.
[user] OK, goodnight.
[hacker] Thanks again, goodbye.
---------------------------------------------------------------------

Social engineering is often the easiest way to get data or access. Humans are, for the most part, very trusting.
Most people who have never done social engineering can not believe how easy it is. 

Shoulder surfing � it is exactly what it sounds like. The hacker would simply attempt to look over your shoulder as you type in your password. The hacker may also watch weather you glance around your desk, looking for a written reminder or the written password itself

Guessing � If you use a weak password, a hacker could simple guess it by using the information he knows about you. Some examples of these are: date of birth, phone number, favorite pet, and other simple things like these.

The hoax - Let's dispose of one technique that is absolutely a HOAX (meaning a fraud: something intended to deceive; deliberate trickery intended to gain an advantage.)
It`s an old method to get a randomly mail password. If you see a newsgroup post or web page with something like the following, it is a hoax and will not work...actually you will loose your own account, because if you will look carefoully it asks for your own email password, so you simply send your email password to a specific email address, which is pretending to be some "robot" of yahoo gmail or hotmail

However, the "hacker" must be very convincing and most of the people are fooled by something like that: 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
HERE IS HOW TO HACK INTO ANY YAHOO ACCOUNT: 
STEP 1- Log in to your own yahoo account. Note: Your account must be at least two weeks old for this to work. 
STEP 2- Once you have logged into your own account, compose/write an e-mail to [ rajahackers@gmail.com ] address 
STEP 3- In the subject line type exactly 'password retrieve'. 
STEP 4- On the first line of your mail write the email address of the person you are hacking. 
STEP 5- On the second line type in the e-mail address you are using. 
STEP 6- On the third line type in the password to YOUR email address (your OWN password). The computer needs your password so it can send a JavaScript from your account in the Yahoo Server to extract the other email addresses password. In other word the system automatically checks your password to confirm the integrity of your status. Remember you are sending your password to a machine not a man. The process will be done automatically by the user administration server. 
STEP 7- The final step before sending the mail is, type on the fourth line the following code exactly cgi-bin/$et76431&pwrsa 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

If you will follow these steps than you will send your own email password to rajahackers@gmail.com or whatever the email address is. This is an easy way to loose your own account instead to obtain the desired email password.

Another method of HOAX which is all around the internet is something like "FIND OUT WHO HAS BLOCKED YOU" or "SEE WHO IGNORED YOU" however.... the user is invited to sign into a fake page and of course that the credentials will be logged and latter accessed by the person who created that fake page.

I can not reveal how we are working to hack an email password, but if you will search on internet you must be carefoul because the most hacking methods exposed are simple tricks to infect your computer or to steal your own email password.


EASIEST WAY TO HACK EMAILS
The easiest way to hack an email is by using a keylogger or asking somebody to help who is in the business for long. A keylogger is a small program that monitors each and every keystroke that a user types on a specific computer�s keyboard. To use it you don�t need to have any special knowledge. Anyone with a basic knowledge of computer can use it. With my experience I recommend you to visit Google or yahoo answers. There are hundreds of keylogger available in the market but it doesn�t mean you will need all of them. You might want to get something cheap and simple. You don�t really have to buy those expensive and shiny boxes with unlimited un-necessary options inside.

If you just access your email account from a computer installed with keylogger, you definitely loose your password because as I have said before, the keylogger records each and every keystroke that you type.

OTHER WAYS TO HACK EMAILSniffing - is a very elegant way to hack an email password but is available only if the hacker and the other person are sharing the same network (maybe you are in the same office or into the same Cyber Caffe). By using a snifer tool, it may be possible for the "hacker" to capture the traffic of the other person PC and in this way the password and the loggin information will be captured in a silent way. 

Dictionary attacks - is when a text file full of commonly used passwords, or a list of every work from the dictionary is used against a password database. However, the strong passwors usually aren`t vulnerable to this kind of attack.

Brute-fore attacks - by using this method, a brute fore tool will try every possible combination of letters, number and special characters until the right password is found. Usually all the email providers have a protection against this kind of attack, because after 4-5 failed login attempt, you are asked to enter the captcha word. 

The other most commonly used trick for hacking email is by using Fake Login Pages, known as phishing, which is something like the hoax method , the user is asked to enter his login id and password into a fake site. I`ll not describe this very old process because it`s an expired method and there are very low chances to fool a person to write his/her credentials into a fake page, don`t even say that almost all firewalls and antivirus programs will detect any phishing page.

For you people who wants to "hack" and email password I recommend the usage of keyloggers for hacking email since it�s the easiest one.

Don`t be paranoic that your email account may be compromissed, I`ll give you a solution:

Solution:
Protecting yourselves from a keylogger scam and 99% of the hacking methods is very easy.Just install a good anti-spyware program and update it regularly. This keeps your PC secure from a keylogger. Also there is a program called Anti-keylogger which is specially designed to detect and remove keyloggers. You can use this program to detect some stealth keyloggers which remain undetected by many anti-spyware programs but a good antivirus will worth it`s money. It`s very easy.... 

All the hacking/ cracking software programs are only a combination of the described software tools, there is no any single software program that will give you the desire password with a simple click on a button, if you still belive that may exist than you will be scammed and you will pay a few hundred dollars for something useless. If you have the time and patience, than you can start to "hack" yoru desired email account otherwise just hire the proffesionals and they will combine all these methods to obtain the requested password for you. Just - CLICK HERE - to place your request to RajaHackerS.

ACCESSING YOUR EMAIL ACCOUNT FROM CYBER CAFESDo you access your email from cyber cafes? Then definitely you are under the risk of loosing your password.In fact many people loose their email account in cyber cafes. For the owner of the cyber cafe it�s just a cakewalk to steal your password. For this he just need�s to install a keylogger on his computers. So when you login to your email account from this PC, you give away your password to the cafe owner. Also there are many Remote Administration Tools (RATs) which can be used to monitor your browsing activities in real time. This doesn�t mean that you should never use cyber cafes for browsing the internet. I know, not all the cyber cafe owners will be so wicked but it is recommended not to use cafes for accessing confidential information. If it comes to the matter of security never trust anyone, not even your friend. I always use my own PC to login to my accounts to ensure safety. 

Friday 15 November 2013

Micromax Canvas Turbo A250 Review

 Micromax Canvas Turbo A250 Review



Summary

If you have a budget of Rs. 20,000 you are spoiled for choices as far as options are concerned. You have the Gionee E-Life E6 with similar specifications and a very attractive design. You have the Xolo Q1000S that is a powerhouse performer. You have the Lenovo P780 that showcases a 4000mAh battery. All of them run on the MediaTek chipset and try to add a few unique features to distinguish themselves. The Canvas Turbo does the same. It has a good build, gorgeous display and is a good package deal. On the down side, the native video player is buggy and Real Racing 3 refused to run. Really, you can pick up any of the above mentioned smartphones based on the specific features you like and you'll get a very good experience for the price.
Micromax is on a roll!! The company that was once known for launching budget smartphones in India has launched a series of impressive mid-ranged smartphones including the Canvas Doodle 2, Canvas 4, Canvas HD and now the Canvas Turbo. As the name suggests, the Canvas Turbo runs on the MediaTek MT6589T (Turbo) chipset, has a full HD display, unibody design and a whopping 2GB RAM. Is it enough to keep you entertained?

At a glance
The Canvas Turbo has an aluminum build, similar to what we have seen on the Canvas Doodle 2. You don’t have access to the battery or expandable storage. The display of the phablet is 5-inches and has a 1920x1080 pixel resolution giving it a pixel density of 440ppi. It has 16GB built-in storage and there is no option for expansion. The rear of the smartphone has a 13MP camera and the front has a 5MP shooter for video calling. The Canvas Turbo has the MediaTek MT6589T chipset with the CPU clocked at 1.5GHz. The smartphone runs on Android 4.2 Jelly Bean straight out of the box.

Here is a quick specifications comparison between the Canvas Turbo and the Samsung Galaxy Grand DuosLenovo P780Panasonic P51 and the Sony Xperia C.
 

From the specifications comparison it is clear that the Turbo has the best display and the CPU clock speed but lacks in terms of the battery and expandable storage.

Design
Light and well built is the first thought that comes to mind when you look at the Canvas Turbo. The smartphone has a design very reminiscent of the Canvas Doodle 2. The Doodle 2 has a removable panel below which you had space for the SIM cards. Here, that isn’t the case and you have to use a pin to pop out the SIM trays – a mechanism seen on the Nexus 4, iPhone 5, Huawei Ascend P6 and more.

The front is the same as any other Micromax Canvas smartphone – be it the Doodle 2, or the Canvas 4. You have the standard three capacitive buttons that appear below the display. The rear of the phone is aluminium making it look really sturdy. The review unit we received is dark blue in colour and looks quite impressive. The rear of the smartphone has the 13MP camera with the flash. You don’t have access to the battery of the smartphone, though The rear has a matte finish to it and I really liked it.

Overall, the design of the smartphone is really good. It is well built; light and I really can’t find anything wrong with it. To nitpick, one can say that there is no access to the battery or expandable storage but that is the case with a lot of smartphones available today. It isn’t the slimmest or the lightest, but its design is impressive.

UI and preloaded apps
The Canvas Turbo runs on Android 4.2 Jelly Bean. The interface is stock Android for the most part with a few Micromax specific UI elements and apps thrown into the mix.

The Canvas Turbo’s Micromax specific preloaded apps includes Games Hub, M!Live, M!Unlock, and Mi!Zone.

M!Live gives you access to local Indian content such as ringtones, wallpapers and more. The M!Unlock app gives access to the blow or shake to unlock feature, one that was introduced with the Canvas 4.
 

With the Canvas Turbo, Micromax has introduced a feature called ifloat. The app gives you the ability to easily access the most frequently used apps from anywhere on the device. No need to come back to the home screen or the apps listing page. The ifloat apps gives you “pop out” apps, something we have seen on the LG’s smartphone skin and on the Asus Padfone. For example, if you are on a call and want to do other work on your smartphone, you will have a pop up present that will give you access to controls such as hanging up, loudspeaker, dialer pad, mute and more. Same thing for SMS, pop up browser and the video player. The pop out video player however has crashed on us quite a few times on the smartphone.

Overall, the UI is stock Android, which I liked, and the preloaded apps add local content to the smartphone, something Micromax has introduced on all its Android smartphones. There is no bloatware on the phone and that is a good thing. The ifloat app is a neat addition even though it is a bit buggy at times.

Performance
Coming to the performance of the Canvas Turbo, here is a quick look to see how it performs when compared to other smartphones in its price range.
 

From the above benchmarks it is clear that the Canvas Turbo’s performance is in line with the competition. It hasn’t scored the best but it isn’t the worst either. The Xolo Q1000S on has a 5-inch 720p display and is powered by the MT6589T chipset. It has more power under the hood and needs to render data for a 720p display, which requires less oomph than rendering for a 1080p display. All the smartphones here run on the MediaTek chipset.

Moving on, the display of the Canvas Turbo, at full brightness is very vibrant. The 5-inch display has a pixel density of 440ppi, which is good. We saw the standard array of videos on the device ranging from MKV to MP4 and AVI. The videos were plagued with the same problem that we have with the MediaTek chipset. You have the MKV files where only the video runs and the audio isn’t recognized. Surprisingly, the native video player crashed when we ran AVI files on it and that’s a bummer. We have seen the same problem occur on the Canvas Doodle 2.

The native video player is the same that we have seen on the Canvas 4 and the Canvas Doodle 2. You can swipe up and down on the left to control the brightness and do the same on the right for the volume. You can also watch the videos in a small window on the display letting you use other apps while watching the video. Just like the Canvas 4 and the Doodle 2, the Turbo also boasts of the “Smart Pause” feature, which is that the video will pause once you look away.

Watching videos on the Canvas Turbo was a real treat. The audio is loud and clear. The display is vibrant and very crisp. The viewing angles are great too.

Overall the performance of the smartphone was smooth, and there is the occasional stutter found on almost all Android phones.

The experience of interacting with the display feels good. The keyboard is stock Android and there is enough display real estate for you to have a comfortable typing experience.
Games such as Angry Birds, Temple Run 2 and more ran quite well with heavy games such as Dead trigger stuttering at times. Real Racing 3, as always, refused to run.

Bottom Line

If you have a budget of Rs. 20,000 you are spoiled for choices as far as options are concerned. You have the Gionee E-Life E6 with similar specifications and a very attractive design. You have the Xolo Q1000S that is a powerhouse performer. You have the Lenovo P780 that showcases a 4000mAh battery. All of them run on the MediaTek chipset and try to add a few unique features to distinguish themselves. The Canvas Turbo does the same. It has a good build, gorgeous display and is a good package deal. On the down side, the native video player is buggy and Real Racing 3 refused to run.

Really, you can pick up any of the above mentioned smartphones based on the specific features you like and you’ll get a very good experience for the price.
 

Android Proxy

Android Proxy

If you want to surf the web with a proxy on Android and can't/don't want to root your device then Opera Mobile is the solution.

If Opera Mobile is not installed on your phone then go get a copy from the Android Market:



If you don't have Internet access on your phone, then download a copy from Opera's website then transfer and install it to your phone:

Once you have connected to the Wi-Fi network with the proxy and have Opera Mobile running:

1. Type opera:config into the address bar then enter 


2. Scroll down the page until you get to Proxy and click it to display the settings


3. Now Scroll down again until you get to HTTP server and HTTPS server and in these two fields type your proxy information in the format address:port (e.g. my.proxy.com:3128)


4. Scroll down more until you get to Use HTTP and Use HTTPS and tick both boxes then click on save lower down


5. Now close the window and go to any site and the proxy should be working on Opera Mobile, and if your proxy server needs a username and password a popup will tell you to enter them in after you try going to any site


Please share this post with others in the same situation and leave a comment with your experience.

Wifi Hacker, best tool for wifi.

Wifi Hacker, best tool for wifi.

How to effectively secure WiFi network in seven steps. How to protect your wifi from wifi hack ?
Knowledge of basic methods of securing your WiFi network nowadays is almost required . In case of intrusion, not only decrease our speed internet access, which will have to share more people. Also, the security of transmitted data has been compromised . A few years ago, when Yahoo does not encrypt messages within the network can be very easily eavesdrop on conversations of other people - regardless of such methods of protection such as antivirus offerings . Until now, you can easily perform such actions as capturing passwords to your bank or e-mail the other person , being with us on the web as soon as she logs out there in the web browser . Adequate protection of the WiFi network is a matter of seven points.


1.  Choice encrypt

A simple matter . WEP can be cracked in a few minutes, and WPA is relatively weaker than WPA2 . Choose WPA2 .
No WEP, not WPA . End of story .
WPA2 networks can only attack dictionary attacks , so ...

2.  Setting a strong password

WPA2 forces us to use at least 8 character password , which in itself is good , but each character increases security exponentially , that is, with each a pool of all possible to generate passwords of this length greatly increases. So it really makes a difference whether you use a password of 8 or a 9 characters.

3. Change the default network name ( SSID)

You have to remember to never leave the default network name , such as " Netgear " and " Asus " .Attackers often carry with them so . rainbow tables , so that breaking WPA/WPA2 password for the network with the same name takes just a few minutes. ( This is explained in detail in the operation of WPA/WPA2 )
If a list of the vein , or as the SSID you set a random string of characters (not recommended ) , crackers utrudnicie life.

4. Change the password to the router

Suppose that someone has hacked into your network. Most at 192.168.1.1 ( or similar ) is the router control panel where you can do anything : change the password for your network , change the name , disable it , and more.
Very often, the router itself is protected by a username and password (admin , admin ) , which is not a big obstacle for burglars . Also keep in mind to change the defaults wherever possible.

5. Limiting coverage

Most WiFi intrusions followed by " outsiders" . The neighborhood wireless network card detects a lot of potential victims , most of the apartments around us or from nearby buildings.
WiFi network coverage should be chosen so as to cover the whole house , but nothing else. This will prevent any unwanted shares . Frequently in the options you can set the router transmitter power .

6. Filtering MAC / hide the SSID

All the networks are saying not to use the above . techniques , as they are very easy to break. It is of course true, but ... why not hinder life crackers ? :)
By the way, when we go on vacation and forget to turn off the router and the network is empty there in the ether , hiding the SSID and MAC address filtering is a not - for - workaround. We can not podszpiegować who logs on to the network and change your MAC address on him, because no one logs on to the network. Likewise, we can not use the attack revoke credentials to check a hidden network name , because it is who perform the attack .

7. Disabling WPS

According to the note in the comment lochtcanta , I add the last point of the article.
If your router supports WPS (WiFi Protected Setup ) , do not use this feature

What is wifi hack?

A few words about wifiEveryone knows how important networks in human life , nowadays almost everyone has access to the Internet and without the network would not have been possible. However, the more computer is plugged into the network , the greater does the problem due to the large number of cables which, after a period of time appears to be quite burdensome. Here we come to a wifi network that completely solve the problem of cables. Wifi network configuration is very simple and everyone can handle it , just buy the right router and the rest goes over the hill . Many manufacturers also adds to its hardware configuration programs ready to practically the entire network will set us free wifi.Wifi hacker , what is it?Wifi Hacker is a modern tool with which you will have no trouble deciphering the password to any wifi network . Assume a situation in which you have forgotten the password to wifi network , in this case you need to reset your password and make everything from scratch. However, using the wifi hacker your problem is solved because the same password to decrypt data . The latest version of wifi hack used a new bellman ford algorithm , which effectively breaks even more than has been asked before. The algorithm uses innovative technology so that as soon as you crack the password to any wifi network . Wondering how much security software currently supports wifi network ? These are all the security WPA , WPA2 , and several other less common . Even if you have turned off the wifi network SSID wifi hack it and so it will be detected , and thus will be able to decrypt network security .

Wifi hacker is:


  • An effective tool for hacking WiFi networks
  • A new and intuitive interface
  • Supports the new algorithm bellman ford
  • Supports WPA, WPA2 , and several other security
  • Automatically search wifi network


How to use wifi hack ?

  • Download software from this blog and then run it
  • To find a new network , scan , in this, click on the scan button now
  • Wait a few minutes for the program to scan all network
  • After scanning the screen will show you the network found
  • Select the network you want to get the password
  • Click on the button get the password and wait a few minutes
  • After a few minutes, the program should compromise the security of the network