Skip to main content

Posts

Showing posts from September, 2015

How to find and delete duplicate files on pc

I am always a victim of lots of useless and redundant data in my PC. Out of all these useless files, a good percentage of the content is the duplicate data. It’s always difficult to find duplicate files and delete them manually. So today I am going to show how can you find the duplicate files and delete them from your computer. There are hundreds of good software out there that can find the duplicate files in your system and remove them. But, I found Duplicate Files Finder light and fast to use. Duplicate Files Finder is a software that locates the duplicate files (same content, but not necessarily same name). You can delete them manually or create links. The search used in this software is very fast compared other programs of the similar nature with hashing algorithms. Firstly , all the files are sorted by size as duplicate files will have equal size. Other search software use hashing algorithms that scan the files completely. Also, additional caching of files improves the perfo

Catch the guy who is using your fake Facebook account easily and quickly

Is someone using your fake Facebook account and spoiling your name.Then this is the right place for you. Here in this post I will be telling how to catch that guy Facebook chat runs on XMPP protocol now which is not peer-2-peer, so it is not possible to determine the IP address of the user through Facebook Chat using Netstat command. All i will be doing is use some social engineering skills and default ‘ Banner grabbing ‘ technique of a web server. Banner Grabbing is an enumeration technique used to get information about a particular computer system on a network/internet (Information like: Operating system, browser, IP address, etc.) Steps in finding an IP address of a fake Facebook user: # 1.  Collect as much information about the fake profile as you can and identify all of the people who are connected to the profile. Make a list of connected people to this account who are your real life friends. # 2.  Select any one of your close friend or relative on that list (select

Meet “Steve Jobs of Robotics” – Man Who is Making World’s First Humanoid Smartphone

Tomotaka Takahashi, considered as Steve Jobs of robotics, aims to gift humanity a talking humanoid smartphone very soon. An associate professor at the University of Tokyo, Tomotaka Takahashi has built a lifestyle around his smart gadgets and plans to extend his robot family now. It is no denying the fact that we are going to be surrounded by Artificial Intelligence soon. Robots engaged in our chores; you might be greeted at the reception by one of those in the near future. But the question is how near is that near future, how soon? Tomotaka Takahashi, a roboticist and an associate professor at the University of Tokyo plans to do it, well, really soon. He strategies to build a pocket size robot with features of Siri. And he is ready to unveil his hybrid four-limbed Siri. Did you get the plot? It is similar to Tony Stark giving Jarvis a body!! C’mon people. Takahashi in his own words, he wants to become “Steve Jobs of Robotics”. He aims to build smartphones in the humanoid form, mo

Hacking Someone's Facebook Password Using Some Software Or Website? No Sir You Can't!

Hacking Someone's Facebook Password Using Some Software Or Website? No Sir You Can't! Do you know there are over thousands of websites and software that claim to hack Facebook password of any account? They'd ask you the victim's profile ID, maybe your credentials and some money too and will reportedly tell you the password which, to be honest, never works. Ever wonder why? Let me tell you why, they're FAKE! They're a scam which tricks you somehow in losing your money or your own Facebook account. Just give it a thought, why would Zuckerberg and his team spend Billions of Dollars on Facebook if one could hack it in less than a minute? Today, we'll take a look at this topic in detail with some example websites and software and get answers to some common related questions. Back in 2005, I came across a mechanism that reportedly hacked Yahoo mail password for a user using some simple tricks. It didn't work for me for obvious reasons but I d

Linux 101 Hacks eBook Free Download

“ Linux 101 Hacks ” by Ramesh Natarajan is available in PDF format for free. This book gives you practical examples to build a strong foundation in Linux. Table of Contents:- Chapter  1: Powerful CD Command Hacks Hack 1. Use CDPATH to define the base directory for cd command Hack 2. Use cd alias to navigate up the directory effectively Hack 3. Perform mkdir and cd using a single command Hack 4. Use “cd -” to toggle between the last two directories Hack 5. Use dirs, pushd and popd to manipulate directory stack Hack 6. Use “shopt -s cdspell” to automatically correct mistyped directory names on cd Chapter 2: Date Manipulation Hack 7. Set System Date and Time Hack 8. Set Hardware Date and Time Hack 9. Display Current Date and Time in a Specific Format Hack 10. Display Past Date and Time Hack 11. Display Future Date and Time Chapter 3: SSH Client Commands Hack 12. Identify SSH Client Version Hack 13. Login to Remote Host using SSH Hack 14. Debug SSH Client Session

Faster WiFi Technology Boosts WiFi Speed Up to Ten Times

Tired of your slow WiFi speed and all those tips to increase the Wifi signal strength? Here’s a new that will cheer you up. Researchers at Oregon State University have unveiled a newly invented technology that can enhance the WiFi speed and bandwidth by 10 times. This revolutionary tech uses LED lights to transmit the information. This 10 times faster WiFi technology could be integrated with the pre-existing WiFi systems and it will lead to the reduction in bandwidth issues in crowded places and homes with multiple users. This has been made possible due to the recent advancements in the LED technology that makes LED light modulation easy and thus opening the option of using light for wireless transmission. Thinh Nguyen, an OSU associate professor, who worked with Alan Wang said: “In addition to improving the experience for users, the two big advantages of this system are that it uses inexpensive components, and it integrates with existing WiFi systems.” How this 10 times fast

Free App from Microsoft to Move Your Files from Windows 7 to Windows 10

Free App from Microsoft to Move Your Files from Windows 7 to Windows 10 Microsoft partners with Laplink Software, Inc. to provide free download of Laplink’s file transfer software PCmover. This tool is used to transfer files and folders from one computer to another, this will be free version until August 2016 and is for personal, non-commercial use only. You can download your copy on  Microsoft official page .  Install the software on your new and old PCs to transfer your files, folders and settings, this won’t affect the files or personalized settings when you transfer your data. If you want to use PCmover Express, then your old and new PCs must be connected to the Internet. According to Thomas Kool, Laplink’s CEO “We’re fully committed to this relationship with Microsoft in support of all Windows users, Our latest version of PCmover makes it easier than ever for customers running Windows XP, all the way to the latest release of Windows 10, to migrate their personal

Sentry – Prevents Brute Force Attacks Against SSH, FTP, SMTP and More

How To Sentry – Prevents Brute Force Attacks Against SSH, FTP, SMTP and More Sentry – free and open source tool which detects and prevents brute force attacks against ssh, ftp, smtp and more. Sentry is written in perl. Supporting OS (operating system) FreeBSD Mac OS X Linux (CentOS, Debain, Ubuntu) Download Command: bash || sh export SENTRY_URL=https://raw.githubusercontent.com/msimerson/sentry/master/sentry.pl curl -O $SENTRY_URL || wget $SENTRY_URL || fetch --no-verify-peer $SENTRY_URL Run Command: perl sentry.pl --update Running  sentry.pl --update  will: create the sentry database (if needed) install the perl script (if needed) prompt you to edit /etc/hosts.allow (if needed) Features: blacklist – deny all future connections whitelist – whitelist all future connections, remove the IP from the blacklists, and make it immune to future connection tests. delist – remove an IP from the white and blacklist

Google Declares a New War With Apple, Brings Android Wear to iPhone

Google has announced that Android Wear smartwatches will now work with iPhone. The company has released an iOS app for Android Wear that lets you sync your smartphone with iPhone.  T he rumors of Android Wear coming to iPhone have finally come true. If you are an iPhone users and you don’t like the idea of buying an Apple Watch, Android has come to your rescue and decided to provide you a multiple set of options. Yesterday, Google introduced   an app for Android Wear that will run on iPhone and thus Android Wear watches now work with iPhones. Now, Apple Watch directly competes with devices like Moto 360, Samsung Gear 2 and LG’s G Watch R. Using the new iOS Android Wear app, the users of iPhone will be able to connect and sync their phones with Android Wear-powered watches. In its blog post, Google battles for the wearable supremacy by writing that Android Wear offers numerous design choices to fit your style. Android Wear for iOS is out now and you just need to pair