What is Tor? How Tor Works ?

Posted by Adeem Jan | | Posted in , , , ,

or or The Onion Router, allows anonymous use of internet veiling the actual identity of the user. It protects the user from any traffic analysis and network spying. Tor is perhaps the most popular and secure option available for anonymous internet connectivity.

Where it came from?

Tor is based on the principle of ‘onion routing’ which was developed by Paul Syverson, Michael G. Reed and David Goldschlag at the United States Naval Research Laboratory in the 1990’s. The alpha version of Tor named ‘The Onion Routing Project’ or simply TOR Project was developed by Roger Dingledine and Nick Mathewson, launched on September 20, 2002. Further development was carried under the financial roof of Electronic Frontier Foundation (EFF).

Tor or VPN? What’s Best to surf Anonymously?

Posted by Adeem Jan | | Posted in , , , ,

TOR vs VPN, a futile discussion that has been into existence since the last five to ten years. You should enlighten yourself with the fact, the two of them were created to serve the same purpose of accomplishing anonymity on the internet.

The two anonymity tools, Tor and VPN, are often confused to be rivals, as assumed by a layman internet user. But the question about the rivalry between the two is as vague as it is to compare a burger and french fries, as both them are meant to satisfy our belly, and the burger + fries combination does a commendable job enhancing our taste.
Talking about our anonymity saviours, they can be understood as two modes of transportation, like an aeroplane and a bus, VPN is like an aeroplane which is faster but costlier. And TOR, like the bus, is slower but cheap, can pick you up right outside your house, but that’s not the case with the aeroplane. TOR and VPN are meant to provide anonymity to you and help you hide your data and location from any “middle-man” existing in the network you’re connected to.

When to use Tor?

The sole aim of TOR or The Onion Router, is to provide anonymity to you. It conceals your location from any probable third party by your data with some encryption layers and bouncing your data through different relays that exist in the TOR network, that are unknown to everyone using the TOR network.

Google’s $85 Chromebit Lets You Turn Any Monitor or TV into a Computer

Posted by Adeem Jan | | Posted in , , , , , , ,

Google and Asus are finally ready to release their new micro Chrome OS computer called the Chromebit — that retails at a great price, just $85.

That is quite cheap for what is essentially a portable computer that you can take anywhere in your pocket.

Announced back in March, the Chromebit is a fully featured Computer-on-a-Stick that plugs into TV or any screen and turns it into what Google calls a "full-fledged Chrome OS-based computer."

All you need to do is:
  • Plug the Chromebit into any HDMI port
  • Hook up the power cable, a Bluetooth keyboard and a mouse
  • Your instant computer is ready
  • It has a smarter clinch on the business end so that you can easily plug the Chromebit into practically any HDMI port without the need for any extension cable.

Despite its low price of just $85, the Chromebit offers you a complete Chrome OS experience, meaning you will be able to do everything you can do on your Chromebook or your Chromebox.
Asus and Google Chromebit Lets You Turn Any Monitor or TV into a Computer
Chromebit is currently available in United States, Australia, Canada, Denmark, Finland, Japan, New Zealand, Norway, Spain, Sweden, Taiwan and the UK. Users in the US can get the Chrombit from Amazon, Fry’s and Newegg.

Drive Traffic to Your Website/Blog

Posted by Adeem Jan | | Posted in , , , , , , , , ,

Many businesses today face numerous challenges owing to the fact that they lack traffic website. This has significantly affected the rate at which they attract website readership. However, with the strong readership for thee blog/website, creating a great content is the only way to go. Nevertheless, in your bid to establish a successful blog, it is prudent to know that this is not possible without driving traffic to it. Consequently, this article outlines some of the glaring methods on how you can drive traffic to your website/blog.
Incorporation of social influencers in the blog posts
One of the approved ways in which you can drive traffic into your blog is incorporating social influencers. For instance, in your piece of art, you can cite some prominent examples to give your post some credibility. This is so because your client may feel inclined and start thinking of promoting your website among the communities owing to the fact that it mentions them favorably.
Addition of links to the article
This is another way of driving traffic to your blog. You can add a link and in turn request for retweets. Furthermore, you may consider using your twitter through linkage with your latest piece of writing in the twitter bio. Studies by experts indicate that blog owners who often asked their esteemed followers for retweets received high average of them per tweet and you are therefore no exception once you can employ the theory of adding links to your piece of article in the twitter bio.
Send blog posts to specific clients
You may consider sending your blog posts to relevant clients, organizations and or blogs with the sole intention of driving traffic to your website. For instance, you may send your question on the relevant subject and equally ask them to share with their friends and followers. With this scheme, you stand chances of achieving by driving traffic in your blog.
Tweet your post many times
Tweeting your post many times will help you drive traffic to your website. This you should do with various teaser quotes. For instance, primarily, you may tweet about your new product by posting it as the title or subject of your piece of article. In the second posting, you may consider summarizing the key points or merely quoting from your article – and see to it that any person mentioned in the post is sent a link. Finally in the third post, you may pose a question on the subject title to eradicate the notion of being perceived as a spammer as this may further capture a lot of readers.
Make your website SEO friendly
Ultimately, making your website SEO friendly will without iota of doubt help drive traffic into your blog. For instance, for glaring success, you may include headlines that your clients may find useful and start searching for in Google. Keywords in your piece of art play an immense role in the both the website and Search Engine Optimizer and it is therefore paramount to ensure that they are adequately repeated in the article. Nonetheless, credible sources must also be linked for the purposes of referencing and authentication. All in all, quality information and/or content is very important as they add lots of value to your piece of work and to the readers too.

iPhone 7 Will Be Waterproof, Plus Model To Feature 3GB RAM

Posted by Adeem Jan | | Posted in , , , , ,

It’s highly likely that we won’t see any official introduction of Apple’s next-generation iPhone for at least another ten months or so. However, as history has shown us time and time again, that doesn’t prevent the rumor mill from going into overdrive way before the actual event. A new set of reports, which focus on the iPhone 7 and its potential physical design and feature-sets, are already starting to speculate about the potential inclusions that Apple could see fit to build into the new iPhone when it lands in 2016.
A recently released analysis of future smartphone devices by TrendForce is suggesting that Apple could continue to shorten the gap between the number of iPhones in circulation and the number of Samsung-manufactured devices. The same report also suggests that Samsung could have a number of problems innovating and building new flagship smartphones that go above and beyond what is already offered to users. TrendForce believes that could play into Apple’s hands, with 2016 being the year when the Cupertino-based company will edge really close to Samsung’s smartphone market-share.

How To Speed Up Your Old Android Phone

Posted by Adeem Jan | | Posted in , , , , ,

As companies release more and more technology it becomes increasingly difficult for consumers to keep up and actually continue to support and purchase that tech. There’s a common trend amongst gadget fans that sees them take every opportunity possible to upgrade to the latest smartphone or tablet when the likes of Apple or Samsung push to market with an alarming twelve month regularity. All well and good if you can afford that type of purchase every year, but not great if you can’t, which is why more and more individuals are sticking with their smartphone for longer periods.
Choosing to stick with a specific device for maybe two, or even three years, certainly has it positives. It saves money. It breeds familiarity, and it can often induce brand loyalty. However, there’s the very real downside of the fact that he hardware becomes old, stale, and can provide a detrimental user-experience when new versions of the underlying OS are released. Step forward Super Touch, a free-to-download and use Android application that can fine-tune the user experience on older Android-powered devices and make them feel like new again, by tweaking the GPU chip.
One of the most appealing aspects of Super Touch is that it comes with no user onboarding or educational requirements whatsoever. Those interacting with the app aren’t required to have an intricate knowledge of the technical aspect of the device. Nor are they required to have an understanding of hardware performance or how to root the device. None of that is required. In fact, Super Touch is so user friendly that it really only requires the user to manually slide a toggle within the app to change the performance levels of the device. Of course, even though the UI and experience is extremely simple, there’s a lot of complexity going on behind the scenes that is abstracted away from the end-user.

Specs For 2016 4-Inch iPhone 5s Mark II Leaked

Posted by Adeem Jan | | Posted in , , , , ,

They may not grab the headlines as much as Apple’s big selling flagship iPhones, but the cheaper options in Apple’s smartphone lineup are important for all manner of reasons, especially in the face of ever-increasing competition from so many Android phone makers. Apple didn’t launch a new 4-inch iPhone alongside its iPhone 6s and iPhone 6s Plus this past September, but new rumors have one on the horizon.
Dubbed the iPhone 5s Mark II by prolific Japanese blog Mac Otakara, the new 4-inch device is said to be based on the existing iPhone 5s model but with some notable upgrades in order to make the device more capable, with iOS 9 now available and the next version of Apple’s mobile OS set to arrive next year.
Those upgrades, according to the generally reliable Mac Otakara, include Apple’s A8 chip rather than something a little newer, 802.11ac Wi-Fi, Bluetooth 4.1 and a FaceTime HD camera with improved ƒ/2.2 aperture. 3D Touch is most likely to be excluded from its list of upgrades in order to keep the feature exclusive to the company’s front-line smartphone duo.

Amazon Black Friday 2015 Deals Revealed, Starts This Friday

Posted by Adeem Jan | | Posted in , , , , ,

Amazon has announced that it will begin offering Black Friday deals a whole week earlier, starting this Friday, on the 20th of November. The e-retail giant has also released details of some of the deals that customers will be able to take advantage of starting this Friday, running up till Thanksgiving day and Black Friday itself. That’s a whole week of super-saving deals!
Once the holiday deals kick off this Friday, Amazon will be adding a new deal every five minutes, a move that will last eight straight days. Prime members will be given a 30-minutes head-start on the Lightning deals. Amazon really seems to be amping up its holiday sales effort, but it’s no surprise given that the company launched a pre-holiday deals week initiative as a countdown to Black Friday at the beginning of this month.
Amazon has also announced that some deals will be exclusively available via the Amazon App for Android, iOS, and Fire OS only. “These deals can be found on the ‘App Only Deals’ tab and will be released daily from 3 PM PT to 11 PM PT starting Thanksgiving through Wednesday, December 9″ says the retail giant. The inclusion of ‘Watch A Deal’ will also ensure that you are alerted immediately when a deal of your choice goes up for the grabs.
As for the deals, here is a list of some of the top tech deals that Amazon has highlighted for now.

Tips to Increase AdSense CPC & Revenue

Posted by Adeem Jan | | Posted in , , , , , ,

If AdSense is your main source of revenue then it is very important for you to understand the positive effects of AdSense Optimization. Our main aim is to get high eCPM and a high CPC (cost per click) by doing AdSense Optimization. If you are one of those AdSense publishers who have a huge incoming traffic but their AdSense revenue is low, then you have come at the right place. I will tell you the best methods to increase your AdSense CPC along with overall revenue.
Let us first try to understand what AdSense CPC is. CPC is Cost per Click i.e. the money that you earn per click. Coming to AdSense revenue your major focus must always be on CPC and not on CTR (Click through Rate). You might have come across certain bloggers who despite of having less traffic make decent money from AdSense. This is because the eCPM of such blogs are high and they get paid very well for CPC. There are a whole lot of factors that affect AdSense CPC, we will go through them one by one.

Samsung SM-W2016 Android Flip Phone Leaked

Posted by Adeem Jan | | Posted in , , , ,

It seems that South Korea-based Samsung Electronics is missing the good old days of mobile phone design. The days when you didn’t have to try and build the most capable device possible with the most cutting edge design on the market. Such is the company’s yearning for yesteryear that it has actually decided to revisit what used to be popular by introducing a new range of flip phones, as outlined by a recent filing with China’s TENAA. It’s sleek, it’s actually rather beautiful, but it’s 2015, and it’s still essentially a Samsung flip phone.
Samsung has really made a conscious effort over the last twelve months to improve its design game. Its Galaxy S series of devices that are powered by the Android platform have proven to be extremely popular over the years. With that said, it’s only really been with the launch of the Galaxy S6, S6 Edge and Galaxy Note 5 that Samsung has really started to class design and physical appearance of the hardware as being extremely important. That new found design importance seems to have been migrated across to this new flip phone series.
Samsung SM-W2016 Android Flip Phone Leaked
So, what exactly is Samsung proposing with the leaked SM-W2016 flip phone that’s managed to find its way into the public domain? Samsung is proposing a clamshell design that features two 3.9-inch Super AMOLED displays that live on either side of the clamshell cover. Each of those displays carries a 1280 x 768 pixel resolution that is capable of displaying photographs captured on the integrated 16-megapixel rear-facing camera. And guess what? Yup, that’s right, there’s also a “physical” keypad, just like they used to be.

Root any Android smartphone/tablet with these simple steps

Posted by Adeem Jan | | Posted in , , , , , ,

This is how to root any Android smartphone/tablet with this free Windows utility

Rooting is jailbreaking for Androids and allows users to dive deeper into a phone’s sub-system. Essentially, it’ll allow you to access the entire operating system and be able to customize just about anything on your Android. With root access, you can get around any restrictions that your manufacturer or carrier may have applied. You can run more apps, you can overclock or underclock your processor, and you can replace the firmware.
However, the act of rooting can be inherently dangerous. While Android rooting opens up a world of possibility, but it can also void your warranty, or even leave you with a bricked device. There are several ways of rooting an Android smartphone or tablet with several tools available but most of this ways are a little technical.
Now easily root any Android smartphone/tablet with these simple steps
Kingo Android Root, a new free Windows utility now makes rooting a one-click affair. Before you proceed, you need to check if your device is compatible with the utility here. Keep in mind that even if your smartphone/tablet in not in the list, the utility may work with it.

This $10 Smartphone by LG Has Better Features Than Original iPhone

Posted by Adeem Jan | | Posted in , , , , ,

Walmart has brought the TracFone-branded LG smartphone just for $9.82. You can grab this impressive Android-powered device with tons of features, making it a very capable smartphone.
f you are looking for a new smartphone and running low on cash, Walmart has brought a jaw-dropping deal for you.

PlayStation 4 was used by Paris attackers from IS for communications

Posted by Adeem Jan | | Posted in , , , ,

Forget VOIP, Facebook Messenger, Google Chat, WhatsApp, the new communication device for terrorists is PlayStation 4

Friday’s gruesome attacks on ordinary Parisians has left not only 128 dead and scores injured, it has also left the world dazed at the ease with which the IS affiliated attackers could strike in the heart of Paris some 4100 kms far from Syria where IS is based.
Not only the attacks show that the terrorists had advanced arms and munitions, but also high level logistical support they received. To coordinate such a mass terrorist effort needs a powerful communicating device which is hidden from the authorities monitoring the IS communications 24×7. From the primary reports it seems that the IS terrorists have used one of the most popular gaming console in the world, Sony ’s PlayStation 4.

FBI denies paying $1 MILLION to Unmask Tor Users

Posted by Adeem Jan | | Posted in , , , , , , ,

Just day before yesterday, the Tor Project Director Roger Dingledine accused the FBI of paying the Carnegie Mellon University (CMU) at least $1 Million to disclose the technique they had discovered to unmask Tor users and reveal their IP addresses.

However, the Federal Bureau of Investigation has denied the claims.

In a statement, the FBI spokeswoman said"The allegation that we paid [CMU] $1 Million to hack into Tor is inaccurate."

The Tor Project team discovered more than hundred new Tor relays that modified Tor protocol headers to track online people who were looking for Hidden Services, and the team believes that it belongs to the FBI in order to reveal the identity of Tor-masked IP addresses.

One such IP address belongs to Brian Richard Farrell, an alleged Silk Road 2 lieutenant who was arrested in January 2014.

The attack on Tor reportedly began in February 2014 and ran until July 2014, when the Tor Project discovered the flaw. Within few days, the team patched the vulnerability and updated its software, thereby rolling out new versions of code to block similar attacks in the future.


This week, Motherboard reviewed a new court filing in Farrell's case that proved the FBI had indeed recruited a "university-based research institute" to uncover the identity of Farrell by running systems on the Tor network.

Bug in Gmail app for Android Allows anyone to Send Spoofed Emails

Posted by Adeem Jan | | Posted in , , , , , , , , , ,

A security researcher has discovered an interesting loophole in Gmail Android app that lets anyone send an email that looks like it was sent by someone else, potentially opening doors for Phishers.

This is something that we call E-mail Spoofing – the forgery of an e-mail header so that the email appears to have originated from someone other than the actual source.

Generally, to spoof email addresses, an attacker needs:
  • A working SMTP (Simple Mail Transfer Protocol) server to send email
  • Mailing Software

However, an independent security researcher, Yan Zhu, discovered a similar bug in official Gmail Android app that allowed her to hide her real email address and change her display name in the account settings so that the receiver will not be able to know the actual sender.

How to Send Spoofed Emails via Gmail Android App?

To demonstrate her finding, Zhu sent an email to someone by changing her display name to yan ""security@google.com" (with an additional quote). You can see the below screenshot posted by Zhu on her Twitter timeline.
"[This] extra quotes [in the display name] triggers a parsing bug in the Gmail app, which causes the real email to be invisible," Zhu told Motherboard.
Gmail Android App Bug Allows anyone to Send Spoofed Emails
Once received, the email address could trick the receiver into believing that the mail has arrived from a legitimate Gmail security team, which is not.

Hackers Can Remotely Record and Listen Calls from Your Samsung Galaxy Phones

Posted by Adeem Jan | | Posted in , , , , , , , , ,

If you own a Samsung Galaxy Phone – S6, S6 Edge or Note 4, in particular – there are chances that a skilled hacker could remotely intercept your voice calls to listen in and even record all your voice conversations.

Two security researchers, Daniel Komaromy of San Francisco and Nico Golde of Berlin, have demonstrated exactly the same during a security conference in Tokyo.

The duo demonstrated a man-in-the-middle (MITM) attack on an out-of-the-box and most updated Samsung handset that allowed them to intercept voice calls by connecting the device to fake cellular base stations.

The issue actually resides in the Samsung's baseband chip, which comes in Samsung handsets, that handles voice calls but is not directly accessible to the end user.

Hackers Can Remotely Record and Listen Calls from Your Samsung Galaxy Phones

How to Intercept Voice Calls?

The researchers set up a bogus OpenBTS base station that nearby Samsung devices, including the latest Samsung S6 and S6 Edge, think is a legitimate cellular tower.

Facebook will Let You Send Self-Destructing Messages with Messenger App

Posted by Adeem Jan | | Posted in , , , , , ,

Facebook is planning to offer you the popular Snapchat feature in its Messenger app – 'Self-Destructing' Messages.

Yes, Facebook is testing a new feature within its Messenger app that will allow its users to send self-destructing messages.

Some Facebook users in France have spotted this new feature in the Messenger app that lets them send messages that only last for an hour.

How to Turn ON the Feature?

Users can turn on the self-destructing message feature within Messenger through an hourglass icon on the top-right corner of the conversation. The icon, when tapped, sets the messages to self-destruct after an hour of sending it.

Tapping the hourglass icon again will turn off the feature, with everything going back to normal.


Here's what Facebook says about the feature:
"We're excited to announce the latest in an engaging line of optional product features geared towards making Messenger the best way to communicate with the people that matter most."

#ParisAttacks — Anonymous declares War on ISIS: 'We will Hunt you Down!'

Posted by Adeem Jan | | Posted in , , , , , , , , ,

Following the bloody terror attacks in Paris where over 130 people were killed, the hacktivist collective Anonymous has declared total war against the Islamic State (IS, formerly ISIS/ISIL).

Anonymous released a video message, posted in French, on YouTube Sunday announcing the beginning of#OpParis, a coordinated campaign to hunt down ISIS's social media channels and every single supporter of the jihadist group online.

The combat mission #OpParis was announced as revenge for the recent ISIS terror attacks that took place in Paris on Friday, November 13, 2015.

Behind its signature Guy Fawkes mask, the group’s spokesperson speaking in French said, "Anonymous from all over the world will hunt you down. Expect massive cyber attacks. War is declared. Get prepared."

"You should know that we will find you, and we will not let you go. We will launch the biggest operation ever against you," the Anonymous spokesperson added. "The French people are stronger than you and will come out of this atrocity even stronger."
Under the #OpISIS online campaign, Anonymous members have been defending French cyber-borders following the Charlie Hebdo massacre in January. In #OpISIS, the group hacked, defaced, unmasked, and reported thousands of ISIS Twitter accounts.

Get NDS4iOS Nintendo Emulator On iOS 9

Posted by Adeem Jan | | Posted in , , , , ,

The App Store has more games than the general mobile gamer could play in a lifetime, and like the devices that run them, these games are getting better with each passing year. For those who have a thing for nostalgia and trips down memory lane, there is even the option to install emulators for the likes of PlayStation, N64 and Nintendo DS, and although these are normally associated with the jailbreak store, there are ways to emulate old console games without having to jailbreak your iOS device.
If your iPhone, iPad or iPod touch is running iOS 9.0 – 9.1 and even 9.2, and the thought of getting to play your old NDS games on it makes you feel all warm and fuzzy, read on for a step-by-step guide to installing a Nintendo DS emulator to your device. The emulator works with both jailbroken and non-jailbroken devices, so you don’t have to worry about having to step into those murky waters if you haven’t already.
So let’s get right to it.
Step 1: On your iPhone, iPad or iPod touch, launch Safari and open iosem.us/app/install/nds.html.

Best Proxy Sites To Surf Anonymous

Posted by Adeem Jan | | Posted in , , , ,

Sometimes it might happen that because of nation security and due to cyber rules, some websites gets blocked by your ISP in your country or specific region. There are many reasons behind a blocking of a website. But it really seems to be painful if your favorite social networking, software downloading or gaming websites gets blocked in your region and you are unable to access them. Such as in colleges, universities and schools, students are not allowed to use social networking websites as they are blocked and also in some colleges and universities torrent and file sharing websites also gets blocked.
So the best solution for the users is to access these kind of your favorite websites is through taking advantage of proxy server. Proxy servers sites are really helpful that lets the internet users to have access to their favorite website easily which is blocked in their region or seems to be geo restricted without changing your place. There are thousands of different proxy websites available on the internet that offers anonymous features to the users which mean users can surf the web without revealing their original identity.
But as you know that this is modern era, hackers these days are trying to use advance methods for hacking or stealing information/data of the users and proxy service sites are one of their best method. There are many proxy websites that are having suspicious scripts or malicious codes that steals your personal information when browsing the internet using them. On the other hand best and secure proxy services charges the users a specific amount for providing them secured services for having better privacy and security protection.
So if you are one of those user who are looking for the list of top and best free proxy websites collection to help them to get access to blocked content easily, then you are at right place. Because today in this article we are going to share the list of top best proxy services that you can use in 2015. So without wasting any time, let’s get started and have a look at this list shared below:

Email Subscription box byAshok Lothia

    Blog Archive

    Popular Posts