Password Protection to USB Drive without using Software

Today I'm gonna talk about USB Drives.

I'll show you a simple trick to lock your USB drive without using any 3rd party software.
Most of the people doesn't like other people checking their personal files and folder on USB, including me. This insecure situation creates a huge space to theft our personal data by someone. If you use password protection to your USB, you can reduce the data theft.

Lots of USB password protect software available in present market, but you want to pay money to use it for lifetime. If you're using Windows you don't need any software.


Password Protection to USB Drive without using Software
So let's see how to set a password protect on your USB without using any software.

Insert your USB drive to computer
Click on Start
In "Search programs and files" box, type Bitlocker Drive Encryption
Now launch that application.


Password Protection to USB Drive without using Software

Then look for your USB drive and click on Turn on Bitlocker


Password Protection to USB Drive without using Software

Windows will ask you to set a password. 
Now set a strong password.
Click on Next

Password Protection to USB Drive without using Software

If you want save the password in a safe place.
And click on Next


Password Protection to USB Drive without using Software

Now click on Star Encrypting


Password Protection to USB Drive without using Software

That's all !!! :)
From right now if someone tries to access your USB, Windows will ask him/her to enter the current password.

Warning : This trick will works only in Windows
Read More

Mobile Number Cloning : How To Clone A Number Easily !


The Ultimate Tool to spy on somebody is in every everybody's pocket ! The Modern Engineering marvel aka Mobile Phone's are everybody's need. People often (mostly) do their confidential talks over cell phone's, But only some know how easy it is to eavesdrop them. There are some tricks and hacks to do that, but the most powerful way is to clone their SIM Card. The Subscriber Identity Card aka SIM Card is the transmitter of signal to the mobile and tower, And you can do It easily.




So What Can You Do When You Clone SIM card ?


Well There are many things to do when you clone a SIM Card, You can secretly spy on the victims calls and data transfers, make him mobile bill go crazy, send messages and make calls from his number, All without touching the victims Cell Phone.




First A Little Knowledge Of SIM Hacking :

Not every SIM Card is clone-able, There are two types of SIM Card :

COMP128v1: The most popular and clone-able version of SIM Cards, Distributed widely till 2004 in USA (2007 In ASIA Countries), Of the number of victim is older than 2004 in USA or 2007 in Asia, Chances are you can clone it pretty easily.


COMP128v2: The newer SIM's, Capable of better 3G Reception, Video Call Support, New and Secure firmware, Complex Design, Very ( I mean very fu*king very) Hard. If the SIM is bought after 2004, it is probably this version.



Things Required :



Or Make your own SIM Writer : CLick Here

The Victim's SIM For 15 minutes to 30 Minutes !

So The inventory is full, Lets Begin The Work :

The main mission in cloning a SIM Card is to get KI and IMSI codes, these codes are the identifier of the SIM Card, and help you register your mobile to the network. 


The Step 1 :

Plug in the SIM Reader, Install the software, get the vic's SIM.

Step 2 :

Configure the Software as shown in the below pictures :

Step 3 :

First Run The IMSI Search :


Real Hackers Point, Spoof A Number
Note Down The IMSI Number !

When the results come, write them down. Then start the ICC Search :


Note This Value Down Too.
Write down the ICC Number too, Now run the KI Search, This may take some time :
Real Hackers Point
After 45 Minutes, IF you don't Get the First Value, The Sim IS Un-cloneable !


Now remove the Vic's SIM And give it back to him.



Step 4 :

Download SIM-EMU, A software to write settings on Blank SIM Card.
Now insert the blank SIM and wait for it to detect.

Step 5 :

Run SIM-EMU and click the configure tab, 

Enter the ALL the Info Gathered from the Woron Scan Process: IMSI, KI, ICC.

Real Hackers Point : Clone A SIM Card !
The Setup Menu


For the rest Info :
For ADN/SMS/FDN# (ADN= Abbreviated Dialing No. / SMS = No. of SMSes stored on SIM / FDN = Fixed Dialing No.) Enter: 140 / 10 / 4 OR if the Program has suggested values, let it remain as it is.

The Phone Number should be in International Format, EG: For India +91(the international code) 9999999999 (the number)

Step 6 :

Let The Writing Begin, Select the Write To Disk button and Name the File: SuperSIM.HEX.

Real Hackers Point
Wait For The Conformation, Then Select OK.

A write EEPROM file window will appear. Name the EEPROM file SuperSIM_EP.HEX and click the Save button.

Real Hackers Point
Now You Have 2 Files, Ready to be Flashed.

Step 7 :

Now We Flash the files on Blank SIM Card  :
Install the card that came with the card writer, cause using any other software will fu*k up your card and your reader.

Our Card Readers Software was Infinity USB Unlimited, The interface can be changed in your software, but the functioning is the same. 

Now Put the required files in the appropriate fields :

Hacking Mobile
Flashing The Blank SIM.


Step 8 :

Now run the writing task, Click on done when it has completed.

Congrats, You Have Cloned A SIM Card ! 


So here you have it, A Cloned SIM Card, Now when somebody calls the victim, Both of the mobiles will ring, same will happen in the case of SMS, But only one can pick up the call. Also don't do something big that will raise a red flag in Mobile Company. You are responsible for your own Shit.

Read More

how do the computer memory is calculated ?do they measured in kg's?

no not all they was measured in bits...  



 Binary Digit                                       =                            1 Bit
8 Bits                                                 =                             1 Byte
1024 Bytes                                        =                             1 Kilobyte
1024 Kilobytes                                  =                             1 Megabyte
1024 Megabytes                                =                             1 Gigabyte
1024 Gigabytes                                  =                             1 Terabyte
1024 Terabytes                                  =                             1 Petabyte
1024 Petabytes                                  =                              1 Exabyte
1024 Exabytes                                   =                              1 Zettabyte
1024 Zettabytes                                 =                              1 Yottabyte
1024Yottabytes                                 =                              1 Brontobyte
1024 Brontobytes                              =                              1 Geopbyte
1024 Geopbyte                                  =                             1 Saganbyte
1024 Saganbyte                                 =                              ]1 Pijabyte
1024 Pijabyte                                     =                             1 Alphabyte  
1024 Alphabyte                                  =                             1 Kryatbyte 
1024 Kryatbyte                                  =                             1  Amosbyte   
1024 Amosbyte                                  =                             1 Pectrolbyte
1024 Pectrolbyte                                =                             1 Bolgerbyte
1024 Bolgerbyte                                 =                             1 Sambobyte
1024 Sambobyte                                =                             1 Quesabyte 
1024 Quesabyte                                 =                             1 Kinsabyte  
1024 Kinsabyte                                  =                             1 Rutherbyte  
1024 Rutherbyte                                 =                             1  Dubnibyte  
1024 Dubnibyte                                  =                             1 Seaborgbyte  
1024 Seaborgbyte                              =                              1 Bohrbyte  
1024 Bohrbyte                                   =                              1 Hassiubyte 
1024 Hassiubyte                                 =                              1  Meitnerbyte 
1024 Meitnerbyte                               =                              1 Darmstadbyte 
1024 Darmstadbyte                            =                              1 Roentbyte 
1024 Roentbyte                                  =                              1 Coperbyte  

  
Read More

How Famous Websites Looked when they Launched and how they got their names

When you connect PC to internet, definitely you'll go any of below mentioned websites.

Google
Facebook
YouTube
Yahoo
Wikipedia
Twitter
...

True or not?
So today's article is about your favorite websites. Let's have a small look on famous websites, how looked when they were first launched.

Google.com - Launched in 1996


Larry Page and Sergey Brin are the founders of Google.When they were studying in Stanford University, they worked on a project report to create an online Search engine. Their aim was simple. When someone searched for a keyword, the result should fetch huge number of relevant sites. In fact they wished for Googol number of results.Yes Googol represents a number which is 1 followed by 100 zeroes. Therefore they wanted to name it as googol. But when they submitted their project report for funding to an investor, the investor gave a cheque which was payable to ‘Google’ instead of Googol. So that was a spelling mistake. But Larry and Sergey decided to keep it as Google and that’s how the name came about

Facebook.com - Launched in 2004




YouTube.com - Launched in 2005


Yahoo.com - Launched in 1994

The first name of Yahoo was “Jerry and David’s Guide to the World Wide Web”. In 1994 it changed its name to Yahoo. The name was taken from a phrase from Jonathan Swift’s novel, Gulliver’s Travels. YAHOO is the short form of the phrase “Yet Another Hierarchical Officious Oracle”. This word refers to a barbaric and uncivilized youth.
The founders Jerry Yang and David Filo wanted to choose this name as they wanted themselves to be wittingly categorized thus
Twitter.com - Launched in 2006



Wikipedia.org - Launched in 2001

Amazon.com - Launched in 1995

Apple.com - Launched in 1987 (The screenshot from 1996)

he founder of Apple Inc, Steve Jobs used to work in an Apple Farm. When he decided to start his business, he joked with his friends that if they did not suggest a name for his company he will then name it as Apple Computers. Obviously his friends could not come out with a name and hence Steve named it as Apple Computers.

News.bbc.co.uk - Launched in 1997

Msn.com - Launched in 1995

Bill Gates named Microsoft from two words. Microcomputer and Software. In year 1975, Bill Gates wrote a letter to his colleague Paul Allen, he wrote as Micro-Soft. But in 1976 they registered the name Microsoft as a single name.

Nytimes.com - Launched in 1995

Flickr.com - Launched in 2004

Telegraph.co.uk - Launched in 1994

Blogger.com - Launched in 1999 

the last 1 is my favorite b'coz my blog runs on it...





Read More

Mobile spy Apps : Download


Today we are in a world(KALIYUG) that we are cheated by everyone.

why to spy?

 for example :

A cheater wife who cheats her husband.

A female lovers who maintains a string of lovers and cheats them.
A son who cheats his father. 

what is the use of spying?
Oh there is alot of use 

if you want to catch them red handedly, with prof. Oh yes you can, now you can spy on their phone calls,msgs,internet data,gps,photos and more.

what kind of mobile can be spied ?

Now a days every mobile can be spied majorly the apps are fluently supported with these operating systems they are...

Android
Windows mobiles 
ios
Symbian os 
blackberry os

this apps which we can use to spy on others...

it's ....

pdaspy app

its a 
The program has gained major media attention from dozens of radio stations, magazines and web sites all over the world.powerful yet completely stealth cell-phone monitoring software that tracks and records ALL information almost in real-time, which can then be viewed at from ANY computer in the world. Android Spy amazing SMS tracking technology will actually give you word-for-word SMS logs of every message being sent and received... EVEN if the holder has erased them! To get calls specification from any cell phone, it is enough to setup Cell Phone Spy Tracking Software on desired phone. Upon completion of the setup process, it will be possible to read another’s sms, know duration of the calls, and to track locality of the phone movement.
After the setup process is complete, cell phone tracking logs will be available on the web in convenient format with possibility to choose from sms logs, call logs, and gps logs.
It will present not only the phone number of the subscriber, but the caller’s name and duration of the phone call. Cell Phone Spy Tracking Software is able to present even deleted sms, phone numbers, and time of the call.






NOTE :- We are not responsible for unlawful usage of the program it can make u r relation ship complicated or easier.





Read More
Designed By Seo Blogger Templates