Thursday, October 31, 2013

USB Reverse tethering: Use internet from Computer to Android Mobile

USB Reverse Tethering - New method - All PC operating systems

Rooted Android device with "USB tethering" capability. Check in Android Settings - Wireless & networks - Tethering & portable hotspot. Many stock ROMs disable this capability. You must enable it somehow (root your Android and use an application to enable or replace the stock ROM). CyanogenMod ROMs always have this capability. The important thing to remember is when you connect your Android and enable "USB tethering", it appears as a USB network adapter, not a mass storage or media device.
- PC with a working Internet connection.
- USB cable to connect your Android to your PC.
- Terminal Emulator on your Android. If you don't want to type commands on your touchscreen with Terminal Emulator, you can use your PC keyboard to enter commands with "adb shell". adb is a part of Android SDK which is available for download from Google. To use adb, you need to enable "USB debugging" on your Android.
- Optional, BusyBox on your Android.

Step 1: Connect your Android to PC by USB cable and enable "USB tethering". You are still allowed to enable this option even when your 3g/wifi on your Android is off.
- If you are using Linux (Ubuntu), you don't need to install anything. NetworkManager applet will try to establish a connection on the new detected wired network device.
- If you are using Windows, Windows will automatically search Windows Update and install driver for you. You can skip Windows Update search and install manually an already included driver from Microsoft. In Install Driver window, click Browse My Computer, then Let me pick..., select Network Adapters, uncheck Show Compatible Hardware, look at "Microsoft Corporation" at the left column, and choose Remote NDIS Compatible Device from the right column. You can install or update a driver from Device Manager in Windows.
- If you are using Mac, install driver HoRNDIS. You will be notified about a new network interface. Click "Network Preferences" in the dialog to add it to known interfaces list. Then "Apply".
- If you are using Linux without GUI or NetworkManager, run these commands as root (or use sudo):
Code:
ifconfig usb0 10.42.0.1 netmask 255.255.255.0
(suppose that you don't have any other USB network adapter, otherwise, your Android may be usb1, usb2...)
Code:
echo 1 > /proc/sys/net/ipv4/ip_forward
Command for sudo will be:
Code:
sudo 'echo 1 > /proc/sys/net/ipv4/ip_forward'
Code:
iptables -t nat -F
iptables -t nat -A POSTROUTING -j MASQUERADE
Step 2:
- If you are using Linux, click on NetworkManager applet at the top right of your screen, select "Edit Connections...". In tab "Wired", choose the new established connection (be careful, not Ethernet LAN connection) and click "Edit..." In tab "IPv4 Settings", choose "Shared to other computers" as Method. Click "Save". NetworkManager will reestablish the connection and assign to your PC an IP address on this USB network connection, default: 10.42.0.1. Leave Internet connections (wired or wireless) untouched.
- If you are using Windows, open "Network Connections" in Control Panel. It is somewhat different from setup in Linux. Right click on an Internet connection that you have. I assume that you are using a desktop which doesn't have any wifi adapter, so right click on LAN Ethernet connection with Internet, and select "Properties". In tab "Sharing" (or "Advanced" for Windows XP), click "Allow other network users to connect through...", then select the USB connection in dropdown list below. Click OK. Windows will automatically setup your USB network connection and assign to it an IP address, default for Windows 7: 192.168.137.1, default for Windows XP: 192.168.0.1. You can see your Internet connection is now "Shared" and your USB connection is now "Unidentified network".
- If you are using Mac, open System Preferences - Network. If you installed HoRNDIS, you will see a new network interface corresponding to your USB connection. With "Using DHCP" as Configure Ipv4, it may be already connected. Go back to System Preferences, click "Sharing". Select "Internet Sharing". Choose the Internet connection (Ethernet or Airport...) in "Share your connection from", and choose USB connection interface in "To computers using". Mac will assign to your USB connection interface an IP address, default: 192.168.2.1.
- If you are using Linux without GUI or NetworkManager, you have done all PC setup in step 1.

Your PC setup is now done!

Step 3:
Open Terminal Emulator on your Android. Type:
Code:
su
The command prompt must change from $ to #. If it does not, check to ensure that your device is rooted properly.
[UPDATED]Type the following command in Terminal Emulator, the same for all PC operating systems:
Code:
netcfg rndis0 dhcp
The name for usb interface inside Android may vary. It is usually rndis0 or usb0. Type
Code:
busybox ifconfig
to identify the name.
Use OLD instructions below when automatical dhcp method does not work.

[OLD]Type these following commands in Terminal Emulator:
For Linux PC:

Code:
ifconfig rndis0 10.42.0.2 netmask 255.255.255.0
route add default gw 10.42.0.1 dev rndis0
If route fails, try:
Code:
busybox route add default gw 10.42.0.1 dev rndis0
For Windows PC, use the same above commands, replace 10.42.0.2 by 192.168.137.2 (192.168.0.2 for Windows XP), replace 10.42.0.1 by 192.168.137.1 (192.168.0.1 for Windows XP)
For Mac PC, replace 10.42.0.2 by 192.168.2.2, replace 10.42.0.1 by 192.168.2.1

Now you can close Terminal Emulator and start the browser for Internet.

Some applications (download in Google Play, GMail, Facebook...) don't recognize Internet connection. You can try this way (WARNING: NOT TESTED):
- Enable temporarily 3G connection on your Android
- Type:
Code:
ifconfig rmnet0 0.0.0.0
The name for 3G interface inside Android may vary: ppp0, rmnet0... Type
Code:
busybox ifconfig
to identify the name.
before ifconfig rmnet0 ... above.
This will make applications see your Internet connection via USB as 3G!

USB tethering settings on Android will be reverted automatically when you unplug USB cable. To revert back settings on PC, uncheck "Allow other network users to connect through..." on Windows, "Internet sharing" on Mac, change from "Shared to other computers" back to "Automatically (DHCP)", or simply delete USB connection from NetworkManager on Linux.

For more detail and disscussion visit XDA forum Link: http://forum.xda-developers.com/showthread.php?t=2287494

Friday, April 5, 2013

What is Facebook's "Home" Android App

-->
Facebook unveiled Facebook Home app, which is a suite of apps that delivers an entire Facebook experience to your smartphone. Facebook Home isn't a new phone or operating system. It's just a set of apps that act as a "skin" that operates on top of the existing Android OS on your smartphone. 




The apps become the "home" for your smartphone. In short, your device's home screen is turned into a "Cover Feed" that shows a slideshow-like stream of full-screen images from your Facebook friends with status updates that are layered on top of the pictures and scroll continuously. This allows you to see information from your Facebook friends, even when the phone is locked. Because the Home apps are integrated into the Android operating system other notifications will also show up on the "Cover Feed" including e-mails, missed calls, and text messages.

It allows people to engage in multiple conversations at once, and conversations via Facebook chat or SMS without opening a separate app.

Facebook Home will be available for download from the Google Play store starting April 12. Right now, Facebook Home is restricted to a select set of HTC and Samsung Google Android devices. The HTC phones that will initially get access to the app are the upcoming HTC One, as well as the One X, and One X+. You can also get it on several Samsung devices, including the Galaxy S3, Galaxy Note 2, and upcoming Galaxy S4.

See Also:

Android 4.2.2 is now publish with new flavor of Jelly Bean

 

How to unlist your number from TrueCaller

 

All know about Samsung GALAXY S4 Officially !!

 

 


 

Wednesday, April 3, 2013

Turn your old wireless Router into Advanced Firewall-Router using Tomato Firmware


If you are looking cheap advance firewall for your Home or Small office just install Tomato firmware in your old   Linksys' WRT54G/GL/GS, Buffalo WHR-G54S/WHR-HP-G54  and many supported wireless router. And get advance feature like, Bandwidh usage , Advance QOS, Wireless WDS, Limits P2P usage and many more advance feature using GUI base control.

Wireless Mode feature:

  • Access point (AP)
  • Wireless client station (STA)
  • Wireless Ethernet (WET) bridge
  • Wireless distribution system (WDS also known as wireless bridging)
  • Simultaneous AP and WDS (also known as wireless repeating).
Basic Setup:



Download  it from source forge website or from polarcloud.com


 See Also:

OpenWRT for Wifi Hotspot with Captive portal

OpenWrt is described as a Linux distribution for embedded devices.

Tuesday, March 26, 2013

Android 4.2.2 is now publish with new flavor of Jelly Bean

Find the amazing new future in new Android 4.2.2  Jelly Bean

 

One tablet, many users.

It’s your fully customized tablet. And theirs, too. With support for multiple users, you can give each person their own space. Everyone can have their own homescreen, background, widgets, apps and games – even individual high scores and levels! And since Android is built with multitasking at its core, it’s a snap to switch between users – no need to log in and out. Available only on tablets.

Share what’s on your phone on the big screen.

Android 4.2 allows devices to enable wireless display. You can share movies, YouTube videos, and anything that’s on your screen on an HDTV. Just connect a wireless display adapter to any HDMI-enabled TV to mirror what’s on your screen quickly and easily.

Expandable, actionable notifications.

Android has always put you in control when it comes to staying notified and connected. Just swipe down from the top of the screen to see all your notifications in one place. Late for a meeting or missed a call? Take action in an instant directly from the notifications shade.



Fast and smooth.

We put Android under a microscope, making everything feel fast, fluid, and smooth. With buttery graphics and silky transitions, moving between home screens and switching between apps is effortless, like turning pages in a book.
More reactive and uniform touch responses mean you can almost feel the pixels beneath as your finger moves across the screen. Jelly Bean makes your Android device even more responsive by boosting your device's CPU instantly when you touch the screen, and turns it down when you don't need it to improve battery life.

A new look for Google Search.

It's easier than ever to quickly get answers, explore, and browse search results. Android also lets you search the web with your voice, and it's convenient for getting quick answers on the fly. It speaks back to you and is powered by the Knowledge Graph, bringing you a precise answer if it knows it, and precisely ranked search results, so you can always find out more.

Amazing Photo Sphere camera

Up, down and all around you, it’s like no camera you’ve ever seen. With Android 4.2, snap pictures in every direction that come together into incredible, immersive photo spheres that put you right inside the scene. View your photo spheres right on your phone, share them on Google+ with your friends and family, or even add them to Google Maps for the world to see.

Daydream.

Daydream lets your Android device display useful and delightful information when idle or docked. Show off your photo albums, get the latest news from Google Currents, and more.

 See Also:

How to unlist your number from TrueCaller

All know about Samsung GALAXY S4 Officially !!

How to install CyanogenMod on Samsung Galaxy S III

YotaPhone: a phone with dual display


Wednesday, March 20, 2013

How to unlist your number from TrueCaller

If you don´t want your number to be searchable in the Truecaller app,

Its just in two step 

1. Go to TrueCaller Unlist   site


2. Enter your country and number

But your number will be immediately and permanently deleted from our database. You cannot submit your number again.

Sunday, March 17, 2013

All know about Samsung GALAXY S4 Officially !!

Be first to know about Samsung GALAXY S4 Officially !!!

Thursday, March 14, 2013

Google Reader Alternative

Are you heard that Google Reader is dying ? Are you  looking an alternative for Google Reader ??



Here are some best alternative for Google Reader

Feedly.com


Organize your favorite blogs, news sites, podcasts and YouTube channels and access them all in one place (or sync with Google Reader).

 Netvibes.com


    Real-time monitoring

    Monitor all your apps, feeds, sentiments, Tweets and even enterprise systems—all in real-time
    Limitless Personalization

    Pick from 200k+ apps, create custom layouts and publish gorgeous microsites — all in a few easy clicks
    Perfectly Synced

    Access from your iPad, iPhone or mobile, manage multiple dashboards and even read articles offline—anywhere, anytime
 

Newsblur.com


Real-time RSS
Stories are pushed directly to you, so you can read news as it comes in.
Original site
Read the content in context, the way it was meant to be seen.
Shared stories
Reading news is better with friends. Share stories on your public blurblog.
Training
Hide the stories you don't like and highlight the stories you do.
 

Feeddemon.com


 
Google Reader Synchronization
Use FeedDemon at home, your office, or anywhere you go and keep your feeds, tags and shared items synched between locations.

Tagging
Assign your own keywords to items, making it easy to classify and locate articles you've previously read.

Watches
Tell FeedDemon to let you know when your keywords appear in any feed you're subscribed to.

Search Feeds
Get alerted when your keywords appear in any feed, regardless of whether you're subscribed to it.

Podcasts
Let FeedDemon automatically download audio files and copy them to your iPod or other media device.

Tuesday, March 12, 2013

OpenWRT for Wifi Hotspot with Captive portal

OpenWrt is described as a Linux distribution for embedded devices.

Instead of trying to create a single, static firmware, OpenWrt provides a fully writable filesystem with package management. This frees you from the application selection and configuration provided by the vendor and allows you to customize the device through the use of packages to suit any application. For developer, OpenWrt is the framework to build an application without having to build a complete firmware around it; for users this means the ability for full customization, to use the device in ways never envisioned.

OpenWRT can be install in many Old wifi router, It will make your home wifi router/ access point to full functional  high end router or Wifi hotspot with Captive portal with addons like wifiDog.addons.

Now a days many router come with OpneWRT or DD-WRT firmware.

See Also:
-->

Turn your old wireless Router into Advanced Firewall-Router using Tomato Firmware

USB Reverse tethering: Use internet from Computer to Android Mobile


If you are looking cheap advance firewall for your Home or Small office.

Tuesday, March 5, 2013

Tips for Admin

Active Directory

1. To quickly list all the groups in your domain, with members, run this command:
dsquery group -limit 0 | dsget group -members –expand
2. To find all users whose accounts are set to have a non-expiring password, run this command:
dsquery * domainroot -filter “(&(objectcategory=person)(objectclass=user)(lockoutTime=*))” -limit 0
3. To list all the FSMO role holders in your forest, run this command:
netdom query fsmo
4. To refresh group policy settings, run this command:
gpupdate
5. To check Active Directory replication on a domain controller, run this command:
repadmin /replsummary
6. To force replication from a domain controller without having to go through to Active
Directory Sites and Services, run this command:
repadmin /syncall
7. To see what server authenticated you (or if you logged on with cached credentials) you can run either of these commands:
set l
echo %logonserver%
8. To see what account you are logged on as, run this command:
whoami
9. To see what security groups you belong to, run this command:
whoami /groups
10. To see the domain account policy (password requirements, lockout thresholds, etc) run this command:
net accounts

Windows Networking

11. To quickly reset your NIC back to DHCP with no manual settings, run this command:
netsh int ip reset all
12. To quickly generate a text summary of your system, run this command:
systeminfo | more
13. To see all network connections your client has open, run this command:
net use
14. To see your routing table, run either of these commands:
route print
netstat -r
15. Need to run a trace, but don’t have Netmon or Wireshark, and aren’t allowed to install either one? Run this command:
netsh trace start capture=yes tracefile=c:\capture.etl
netsh trace stop
16. To quickly open a port on the firewall, run this command, changing the name, protocol, and port to suit. This example opens syslog:
netsh firewall set portopening udp 161 syslog enable all
17. To add an entry to your routing table that will be permanent, run the route add command with the –p option. Omitting that, the entry will be lost at next reboot:
route add 0.0.0.0 mask 0.0.0.0 172.16.250.5 –p
18. Here’s a simple way to see all open network connections, refreshing every second:
netstat –ano 1
19. You can add a | findstr value to watch for only a specific connection, like a client ip.addr or port:
netstat –ano | findstr 216.134.217.20
20. You can use the shutdown to shutdown or reboot a machine, including your own, in a simple scheduled task like this:
shutdown –r –t 0 –m \\localhost
21. To make planned DNS changes go faster, reduce the TTL on the DNS records you plan on changing to 30 seconds the day before changes are to be made. You can set the TTL back to normal after you confirm the changes have been successful.
22. Set a short lease on DHCP scopes that service laptops, and set Microsoft Option 002 to release a DHCP leas on shutdown. This helps to ensure your scope is not exhausted and that machines can easily get on another network when the move to a new site.

Windows 7

23. Want to enable the local administrator account on Windows 7? Run this command from an administrative command prompt. It will prompt you to set a password:
net user administrator * /active:yes
24. You can do the same thing during install by pressing SHIFT-F10 at the screen where you set your initial user password.
Windows 7 supports several useful new keyboard shortcuts:
25. Windows Key+G
Display gadgets in front of other windows.
26. Windows Key++ (plus key)
Zoom in, where appropriate.
27. Windows Key+- (minus key)
Zoom out, where appropriate.
28. Windows Key+Up Arrow
Maximize the current window.
29. Windows Key+Down Arrow
Minimize the current window.
30. Windows Key+Left Arrow
Snap to the left hand side of the screen
31. Windows Key+Right Arrow
Snap to the right hand side of the screen.
32. To quickly launch an application as an administrator (without the right-click, run as administrator), type the name in the Search programs and files field, and then press Ctrl-Shift-Enter.
Here are some tips that can save you from buying commercial software:
33. Need to make a quick screencast to show someone how to do something? The Problem Steps Recorder can create an MHTML file that shows what you have done by creating a screen capture each time you take an action. Click the Start button and type ‘psr’ to open the Problem Steps Recorder.
34. Need to burn a disc? The isoburn.exe can burn ISO and IMG files. You can right click a file and select burn, or launch it from the command line.
35. Windows 7 includes a screen scraping tool called the Snipping Tool. I have tons of users request a license for SnagIt, only to find this free tool (it’s under Accessories) does what they need.
36. You can download this bootable security scanner from Microsoft that will run off a USB key, which is very useful if you suspect a machine has a virus.
37. A great way to save all your command line tools and make them available across all your computers is to install Dropbox, create a folder to save all your scripts and tools, and add that folder to your path. That way, they can be called from the command line or any other scripts, and if you update a script, it will carry across to any other machine you have.

Windows 2008

38. You can free up disk space on your servers by disabling hibernate. Windows 2008 will create a hiberfil.sys equal to the amount of RAM. This is very useful with VMs that have lots of RAM but smaller C: drives. To disable hibernation, and reclaim that space, run this command:
powercfg -h off
39. You can get to the complete collection of Sysinternals tools online. You can even invoke them from the run command. Use the url: http://live.sysinternals.com or the UNC path: \\live.sysinternals.com\tools.
40. Speaking of the Sysinternals tools, almost any command line in this article can be run remotely on another machine (as long as you have administrative rights) using the psexec command included in the Sysinternals tools.
41. You can kill RDP sessions at the command line when you find that all the RDP sessions to a server are tied up.
regsvr32 query.dll [enter] You only have to do this the first time.
query session /server:servername [enter]
reset session # /server:servername [enter]
42. You can create a list of files and display the last time they were accessed, which is very useful when a network drive is low on space and users swear they have to have that copy of Office 2003 on the network. My advice? If they haven’t touched it in two years, burn it to DVD or write it to tape and then delete it from disk:
dir /t:a /s /od >> list.txt [enter]
43. The Microsoft Exchange Err command is one of the best all around troubleshooting tools you will find, as it can decode any hex error code you find as long as the products are installed on the machine. Download it from here.
44. You can see all the open files on a system by running this command:
openfiles /query
45. You can pull all the readable data out of a corrupt file using this command:
recover filename.ext
46. Need to pause a batch file for a period of time but don’t have the sleep command from the old resource kit handy? Here’s how to build a ten second delay into a script:
ping -n 10 127.0.0.1 > NUL 2>&1
47. If your Windows website has stopped responding, or is throwing a 500 error, and you are not sure what to do, you can reset IIS without having to reboot the whole server. Run this command:
iisreset
48. You can use && to string multiple commands together; they will run sequentially.
49. If you find yourself restarting services frequently, you can use that && trick to create a batch file called restart.cmd and use it to restart services:
net stop %1 && net start %1
50. You can download a Windows port of the wget tool from here, and use it to mirror websites using this command:
wget -mk http://www.example.com/

Linux

51. You can list files sorted by size using this command:
ls –lSr
52. You can view the amount of free disk space in usable format using this command:
df –h
53. To see how much space /some/dir is consuming:
du -sh /some/dir
54. List all running processes containing the string stuff:
ps aux | grep stuff
55. If you have ever run a command but forgot to sudo, you can use this to rerun the command:
sudo !!
56. If you put a space before a command or response, it will be omitted from the shell history.
57. If you really liked a long command that you just ran, and want to save it as a script, use this trick:
echo “!!” > script.sh
With 57 tips in this bag of tricks, you’re bound to find something useful. Have your own tips to share? Leave us a comment!

Sunday, February 24, 2013

Protect your privacy and stay anonymous witn TOR

Inception

Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the U.S. Naval Research Laboratory. It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications. Today, it is used every day for a wide variety of purposes by normal people, the military, journalists, law enforcement officers, activists, and many others.

Overview

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.
Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.
Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization.
Groups such as Indymedia recommend Tor for safeguarding their members' online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company's patent lawyers?
A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.
The variety of people who use Tor is actually part of what makes it so secure. Tor hides you among the other users on the network, so the more populous and diverse the user base for Tor is, the more your anonymity will be protected.

Why we need Tor

Using Tor protects you against a common form of Internet surveillance known as "traffic analysis." Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. This can impact your checkbook if, for example, an e-commerce site uses price discrimination based on your country or institution of origin. It can even threaten your job and physical safety by revealing who and where you are. For example, if you're travelling abroad and you connect to your employer's computers to check or send mail, you can inadvertently reveal your national origin and professional affiliation to anyone observing the network, even if the connection is encrypted.
How does traffic analysis work? Internet data packets have two parts: a data payload and a header used for routing. The data payload is whatever is being sent, whether that's an email message, a web page, or an audio file. Even if you encrypt the data payload of your communications, traffic analysis still reveals a great deal about what you're doing and, possibly, what you're saying. That's because it focuses on the header, which discloses source, destination, size, timing, and so on.
A basic problem for the privacy minded is that the recipient of your communications can see that you sent it by looking at headers. So can authorized intermediaries like Internet service providers, and sometimes unauthorized intermediaries as well. A very simple form of traffic analysis might involve sitting somewhere between sender and recipient on the network, looking at headers.
But there are also more powerful kinds of traffic analysis. Some attackers spy on multiple parts of the Internet and use sophisticated statistical techniques to track the communications patterns of many different organizations and individuals. Encryption does not help against these attackers, since it only hides the content of Internet traffic, not the headers.

The solution: a distributed, anonymous network

How Tor works Tor helps to reduce the risks of both simple and sophisticated traffic analysis by distributing your transactions over several places on the Internet, so no single point can link you to your destination. The idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is tailing you — and then periodically erasing your footprints. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several relays that cover your tracks so no observer at any single point can tell where the data came from or where it's going.
To create a private network pathway with Tor, the user's software or client incrementally builds a circuit of encrypted connections through relays on the network. The circuit is extended one hop at a time, and each relay along the way knows only which relay gave it data and which relay it is giving data to. No individual relay ever knows the complete path that a data packet has taken. The client negotiates a separate set of encryption keys for each hop along the circuit to ensure that each hop can't trace these connections as they pass through.
Tor circuit step two
Once a circuit has been established, many kinds of data can be exchanged and several different sorts of software applications can be deployed over the Tor network. Because each relay sees no more than one hop in the circuit, neither an eavesdropper nor a compromised relay can use traffic analysis to link the connection's source and destination. Tor only works for TCP streams and can be used by any application with SOCKS support.
For efficiency, the Tor software uses the same circuit for connections that happen within the same ten minutes or so. Later requests are given a new circuit, to keep people from linking your earlier actions to the new ones.
Tor circuit step three

Hidden services

Tor also makes it possible for users to hide their locations while offering various kinds of services, such as web publishing or an instant messaging server. Using Tor "rendezvous points," other Tor users can connect to these hidden services, each without knowing the other's network identity. This hidden service functionality could allow Tor users to set up a website where people publish material without worrying about censorship. Nobody would be able to determine who was offering the site, and nobody who offered the site would know who was posting to it. Learn more about configuring hidden services and how the hidden service protocol works.

Staying anonymous

Tor can't solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific support software if you don't want the sites you visit to see your identifying information. For example, you can use Torbutton while browsing the web to withhold some information about your computer's configuration.
Also, to protect your anonymity, be smart. Don't provide your name or other revealing information in web forms. Be aware that, like all anonymizing networks that are fast enough for web browsing, Tor does not provide protection against end-to-end timing attacks: If your attacker can watch the traffic coming out of your computer, and also the traffic arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit.

Sunday, February 17, 2013

Download Torrent Files With regular download manager using Zbigz service



Zbigz.com is a Torrent Caching Site that helps Us To Download Torrent Files with Download manger or internet browser .ou can Download Your Torrent Files Through Zbigz.com Via Simple Methods.You can Use Zbigz For free And Without Registration. You can Download Torrent Files of your Choice with Internet Download Manager(IDM)  By Zbigz.com


Sunday, February 10, 2013

Sapido Mobile Office All in one



Feature 1 : Share USB Devices and Data

  • Secure Data Sharing – File, Picture, Video, Audio…etc.
  • USB Devices Sharing – Printer, Webcam, HDD, Flash and Cardreader

With administrator management and password protection, the authorized user can safely share data with each other. The printer is not attached to a dedicated computer. By connecting USB printer to Sapido NES Storage Server Router, everyone can use the printer through Sapido NES Storage Server Router instead of a dedicated computer. Apply USB webcam for instant surveillance of your home, garage, office, baby, pets, grandparents…etc. The easy way to setup an efficient data center by installing HDD or connecting USB storage devices, HDD, Flash and Cardreader to Sapido NES Storage Server Router




 Feature 2: One Touch Copy and Files Backup

  • Internal SATA HDD Support
  • Press One Button to Backup, No Computer and Software Required
  • Data is Automatically Dispatched while Backup

By Installing an internal SATA HDD in Sapido NES Storage Server Router or attaching USB HDD to it, you can share the files in local network or Internet. It allows multiple users to read, write or edit all files. No more hassles for sharing and managing files. Backup all the files from the Flash Disk or USB HDD to the HDD without computer applying. The files will be dispatched into the different folders such as Document, Video, Audio and Picture folders




 Feature 3: Automatic Download Center

  • Built-in FTP Server
  • No Computer and Software Required
  • Big Size Email – No Worries!
  • Scheduling Download - Automatically Download While You are Away or Busy

No need FTP software. No need to turn on computer. No need to wait for download. Sapido NES Storage Server Router makes the file download and upload convenient and simple. You can schedule to automatically download the files to the internal HDD or the attached USB storage devices. Sometimes the email size is too big to send. Authorized users can easily upload and download files anytime anywhere.




 Feature 4: HDD Capacity Management

  • Disk Management - Freely Set Disk Usage Among Features and File Types.
  • Capacity Alert E-mail

HDD capacity management is to deliver a cost-effective and sustained level of availability. The disk space for FAX, Webcam, FTP, users…etc can be assigned by percentage in one hard drive. With capacity alert e-mail, the administrator can be notified before the potential capacity problem occurs.




 Feature 5: A “FAX Machine” for Anyone and Anywhere Use

  • Review Incoming Faxes Before Printing Out
  • Receive and Send Faxes Anytime Anywhere
  • Notification E-mail (You Got a “FAX”!)

With the 2 RJ-11 phone jacks, you don't even need a fax machine, just edit the document and send it out directly through the FAX modem built in Sapido NES Storage Server Router. For all incoming faxes, you can choose to save them to internal HDD or send to the appointed e-mail address. Just print out what you need, don't waste papers for junk messages.




 Feature 6: User Website and Internet Album

  • Users can Create Their Own Website and Internet Album
  • Easy Tools - Built-in Utility or Upload Existing Homepage

Personal website and Internet album is one of the easiest ways to share information and photos with your friends and families. Following step-by-step setting of built-in utility, users can easily create their own website and Internet album. Uploading the homepage created by other tools is another option. Sapido NES Storage Server Router and one ISP account can make it happen.




 Feature 7: Internet Video Surveillance

  • Access Live Images or Video Recording Anytime Anywhere
  • Real Time Motion Detection and Automatically E-mail Alert
  • Instant Surveillance of Your Home, Garage, Office, Baby, Pets, Grandparents,…etc.

Apply USB webcam for instant surveillance of your home, garage, office, baby, pets, grandparents…etc. View live images or video files through Internet with computer or mobile phone browser when you are in office, park, gym, coffee shop, shopping mall, overseas,…etc. Moreover, Sapido NES Storage Server Router will automatically send out alert e-mail while detecting motion.




 Feature 8: Efficient Bandwidth Usage – QoS (Quality of Service)

  • Optimize the Use of your Internet Bandwidth
  • 3 Priorities to Manage

Quality of Service (QoS) refers to the capability of a network to provide better service to selected network traffic over various technologies. The primary goal of QoS is to provide priority including dedicated bandwidth, controlled jitter and latency (required by some real-time and interactive traffic), and improved loss characteristics. Also important is making sure that providing priority for one or more flows does not make other flows fail. For example, you can arrange bandwidth percentage for internet browse and internet download. So there will be no traffic jam for internet browse and internet download users. Sapido NES Storage Server Router also provides 3 priorities for easy and quick setup, i.e. high, medium and low level.




 Feature 9: Security and Parental Control

  • Firewall Defends your Network from Intruders Attack
  • 128 bit Encryption Protects Your Data from Peeper
  • Scheduling Filter Easily Manages Internet Access and Blocks Inappropriate Internet Content.

The firewall function keeps your local network away from attack of Intruders. Wi-Fi encryption, WEP and WPA protects your network resource such as internet access, from unauthorized user. Sapido NES Storage Server Router parental control, available with IP, MAC and URL filter, provides parents a centralized, secure, flexible and easy-to-use management tool that can help protect their families from the perils of the Internet. The filter scheduling feature simplifies the management of internet access policy.




 Feature 10: User Account Management

  • Web-base User Interface
  • Define User Authorization
  • Event Log and E-Mail Alert
As an administrator, you can monitor, maintain and manage the network anywhere anytime with internet browser. Authorized and unauthorized access can be viewed via the web-based interface or be sent by email automatically. Besides, you can authorize assign. Different users can have different rights for FTP, webcam, Internet access,…etc.




 Feature 11: Name your own Sapido NES Storage Server Router on the Internet

  • URL Name for Easy Access
  • Update Your Dynamic WAN IP Automatically

You may receive a dynamic WAN IP from your ISP (Internet Service Provider) for Sapido NES Storage Server Router, which is not convenient for the access of users. DDNS (Dynamic Domain Name Services) is free. After registration, you can have your own URL name for Sapido NES Storage Server Router access. With DDNS (Dynamic Domain Name Services) utility, Sapido NES Storage Server Router can update the dynamic WAN IP automatically to keep the registered URL name available.




 Feature 12: More Powerful Features for Advanced Users

  • Virtual Server Keeps all Internet Service Co-reside in One Computer
  • Virtual DMZ Allows Intranet Servers to Communicate with Internet Users.


Virtual server simply means the entire computer is not dedicated to running one kind of internet service. By specifying the port number for services, you can keep all internet services co-reside in one computer. For example, port 80 is used for HTTP traffic and port 21 is used for FTP traffic. Sapido NES Storage Server Router can assist you in building the virtual server. Virtual DMZ (Demilitarized Zone) allows a set of computers to be exposed to the Internet. Some applications require multiple TCP/IP ports to be open. DMZ allows computers to be exposed for that purpose.

Wednesday, February 6, 2013

How to install CyanogenMod on Samsung Galaxy S III

How to install CyanogenMod on Samsung Galaxy S III
Cyanonenmod is open source  firmware form  android based phones its give many exiting future which cant be fond in vendor supplied firmware's. CyanogenMod is developed as free and open source software based on the official releases of Android by Google, with added original and third-party code.

 Make sure to flash ClockworkMod Recovery if you haven't done it already.
Please note that after rooting the device, you'll void your warranty. IBTimes will not be held responsible if any user loses data or the device gets damaged while following the steps explained below. Users must proceed at their own risk.
Step 1: Download CyanogenMod 10 for your Galaxy S3
Place the .zip file directly under /sdcard directory on your S3 for easy flashing in Step 5.

Step 2: Shut down your Galaxy S3. Press and hold Volume Up, Home and Power buttons until you boot into ClockworkMod Recovery.
Step 3: Take a Nandroid backup.
Step 4: Navigate to install zip from sdcard > choose zip from sdcard >.
Must note that all your personal data will be deleted in this step. This is a safety requirement for whenever you flash a new ROM.
From the main menu, select wipe data / factory reset.
Step 5: From the main menu, choose reboot system now.

Tuesday, February 5, 2013

YotaPhone: a phone with dual display


YotaPhone: a phone with dual display
You can have a whole new relationship with your smartphone. Thanks to the new YotaPhone, with two displays to help you enjoy life’s virtual side without missing the real one.







One side is a high resolution LCD Android phone. The other side is an electronic paper display (EPD), which is your personal space for information, images and interaction you always use and always need.

Windows 8 tips and tricks

Windows 8 tips and tricks

Make the most of your Windows Start screen tiles by adjusting the sizes, where they are located, and what is listed.

 

  • Move any tile by clicking and dragging the tile. While moving a tile, if you need a larger view of the Start screen move the tile towards the top or bottom of the screen to zoom out.
  • Use your mouse wheel to scroll left-to-right through your tiles.
  • Any Desktop shortcut or program can be pinned to the Start screen by right-clicking the icon and choosing Pin to Start.
  • In the bottom right-hand corner of the start screen is a magnifying glass with tiles, click this icon to get a zoomed out view of your Start screen. In this view, if you right-click on a group of tiles you'll be given the option to name group, which can be useful if you have a group of related tiles (e.g. games). In this view, you can also click and drag a group to organize your tile groups.
  • Create a new speed bump between tile groups by moving a tile to a speed bump.
  • Resize any User tile or Live tile by right-clicking the tile and choosing resize.
  • If there is a tile you want on your Taskbar, right-click the tile and choose Pin to taskbar.
  • Show admin applications on the Start screen by clicking Settings in Charms, click Settings, and change the Show administrative tools from No to Yes.
  • In Internet Explorer 10, you can also pin any of your favorite web pages to your Start Screen.


Windows 8 keyboard shortcuts:

Knowing at least some of the Windows 8 keyboard shortcuts will make your Windows 8 experience much more enjoyable. Try to memorize these top Windows 8 shortcut keys.
  • Press the Windows key to open the Start screen or switch to the Desktop (if open).
  • Press the Windows key + D will open the Windows Desktop.
  • Press the Windows key + . to pin and unpin Windows apps on the side of the screen.
  • Press the Windows key + X to open the power user menu, which gives you access to many of the features most power users would want (e.g. Device Manager and Command Prompt).
  • Press the Windows key + C to open the Charms.
  • Press the Windows key + I to open the Settings, which is the same Settings found in Charms.
  • Press and hold the Windows key + Tab to show open apps.
  • Press the Windows key + Print screen to create a screen shot, which is automatically saved into your My Pictures folder.

Windows 8 Task Manager:

The Windows 8 Task Manager has been significantly improved over previous versions of Windows. Some of the new changes include showing a total percent usage at the top of your Processes, which makes it easier to determine total memory and CPU usage, improved Performance graphs, a Startup tab to see startup processes and their impact to system performance, and the App history tab (as shown below) that gives you the total resources an app has used over a period of time. Press Ctrl + Shift + Esc to start exploring the new Task Manager.

Use a picture password to log into your computer
Windows 8 includes a new feature called Picture password, which allows you to authenticate with the computer using a series of gestures that include circles, straight lines, and taps. Enable this feature if you want a new way to access your computer or have a hard time with passwords.
  1. Open the Windows Charms.
  2. Click Settings and then More PC settings
  3. In the PC settings window click Users and then select Create a picture password
Bonus tip: A four digit pin password can also be created and used to access your computer.

Thursday, January 3, 2013

What's New in Exchange 2013

What's New in Exchange 2013


Microsoft Exchange Server 2013 brings a new rich set of technologies, features, and services to the Exchange Server product line. Its goal is to support people and organizations as their work habits evolve from a communication focus to a collaboration focus. At the same time, Exchange Server 2013 helps lower the total cost of ownership whether you deploy Exchange 2013 on-premises or provision your mailboxes in the cloud. New features and functionality in Exchange 2013 are designed to do the following:
  • Support a multigenerational workforce   Social integration and making it easier to find people is important to users. Smart Search learns from users' communication and collaboration behavior to enhance and prioritize search results in Exchange. Also, with Exchange 2013, users can merge contacts from multiple sources to provide a single view of a person, by linking contact information pulled from multiple locations.
  • Provide an engaging experience   Microsoft Outlook 2013 and Microsoft Outlook Web App have a fresh new look. Outlook Web App emphasizes a streamlined user interface that also supports the use of touch, enhancing the mobile device experience with Exchange.
  • Integrate with SharePoint and Lync   Exchange 2013 offers greater integration with Microsoft SharePoint 2013 and Microsoft Lync 2013 through site mailboxes and In-Place eDiscovery. Together, these products offer a suite of features that make scenarios such as enterprise eDiscovery and collaboration using site mailboxes possible.
  • Help meet evolving compliance needs    Compliance and eDiscovery are challenging for many organizations. Exchange 2013 helps you to find and search data not only in Exchange, but across your organization. With improved search and indexing, you can search across Exchange 2013, Lync 2013, SharePoint 2013, and Windows file servers. In addition, data loss prevention (DLP) can help keep your organization safe from users mistakenly sending sensitive information to unauthorized people. DLP helps you identify, monitor, and protect sensitive data through deep content analysis.
  • Provide a resilient solution   Exchange 2013 builds upon the Exchange Server 2010 architecture and has been redesigned for simplicity of scale, hardware utilization, and failure isolation.