Sunday, 29 September 2013

Understanding the Different Types of Wireless Routers

Things to consider when buying a wireless routers for your small business.
We live and work in an untethered world, and your small business is no different. When you initially built your network, you may not have seen the need for wireless. Now that your company has grown and your workforce has become more mobile, you may be considering adding wireless to your network. Wireless offers a lot of benefits, such as  allowing your employees to work from anywhere and providing Internet access to visiting guests.
If you’ve been looking at adding wireless connectivity to your company’s network, you know it can be confusing. There’s the alphabet soup of standards—“b,” “g,” “n”— and terms like “dual-band,” “selectable,” and “two radio.” What does it all mean? Below, I explain the basics so you can better understand which wireless router best fits your needs.

Know your Standards
When looking for a wireless router, you first want to check whether it’s “b,” “g,” or “n.” The letters refer to the wireless communication standard on which the router is based: 802.11b, 802.11g, and 802.11n. The first generation of wireless routers was “b,” followed by “g,” and now “n”—the newest generation. The primary difference among the router standards is speed (more on that in a bit) and range.
You won’t find many “b” routers available anymore (except on eBay, perhaps) because it’s old technology. If you’re currently using “b” routers on your network, you should consider upgrading.
Single band vs. Dual band
Wireless communications operate in two bands—2.4GHz and 5GHz. Routers based on 802.11b and 802.11g standards—and some “n” routers—use the 2.4GHz band; however, the 802.11n standard allows wireless devices to use the 5GHz or 2.4GHz band. Routers that operate only in the 2.4GHz band are referred to as “single band”.. Wireless “n” dual-band routers are also available as “selectable” or “simultaneous” models, sometimes referred to as “single radio” or “two radio,” respectively. A selectable wireless “n” router, such as the Cisco RV220W can operate in either 2.4GHz or 5GHz mode; a simultaneous “n” device can operate in both frequencies at the same time.
In Wi-Fi wireless networking, dual band is the capability to transmit on the 5 GHz band of 802.11a and also the 2.4 GHz band used by 802.11b, 802.11g, and 802.11n. Unlike ordinary Wi-Fi equipment that only supports one signal band, dual-band routers contain two different types of wireless radios that can support connections on both 2.4 GHz and 5 GHz.
The 2.4GHz band is the same frequency used by a lot of other wireless devices, such as cordless phones and microwave ovens. Because there are more devices competing for space in this band resulting in interference and congestion, and it may affect how well the router performs both in speed and consistency. The 5GHz band provides better performance and coverage due to less interference.
Speed
Wireless router performance varies by standard with 802.11b providing the slowest speeds at up to 11Mbps. Wireless “g” routers deliver a maximum speed of 54Mbps while devices based on the 802.11n standard are fastest, topping out at 300Mbps.
If you’re thinking faster is better, there’s one thing to keep in mind: a wireless router can’t go any faster than your Internet connection allows. So, under most conditions, a wireless “n” device may only perform at speeds up to 100Mbps. Still, a faster wireless router will increase the speed of your network, allowing employees to access the data they need and making them more productive.
Security
Most routers currently support standard WEP securities as well as the more secure WPA and WPA2. If you want to control what users can access when they are connected to the router, you want to have one that offers decent Access Controls. Cisco’s RV Series Routers have very effective Access Control settings and controls that allow limiting internet use based on time of day. Guest Access and an ability to create multiple SSIDs are also important security measures if you are using the router for a small business. Together, these two features allow you to segment your network into separate areas for guests and trusted users.

Wired Connectivity
Most wireless routers have Ethernet ports for hard-wiring devices to can take advantage of the greater transmission speeds that wired Ethernet has over a wireless connection. For faster transmission rates, invest in a router that has Gigabit Ethernet ports like the Cisco RV220W. Use the Gigibit Ethernet ports to wire devices that access high bandwidth applications such as video and voice, NAS drives, or any other type of multimedia server that have Gigabit Ethernet adapters to take advantage of the faster performance.
Single WAN or Dual-WAN

There’s one other option to consider when deciding which wireless router will best fit your company’s needs—dual WAN. All wireless routers provide a single WAN port that connects your company to the Internet. However, if that port should fail,your business loses access to other offices and any employees working remotely. A wireless router with dual WAN ports, such as the Cisco RV042 Dual WAN VPN Router, ensures reliable connectivity by providing a second link to the Internet and is suitable for businesses that run mission critical applications and cannot afford network downtime.

Learn to Hack WIFI password with Ubuntu (WPA/WPA2)

In this hacking tutorial we are going to use a new vulnerability in WPA and WPA 2 (PSK/TKIP)Wireless passwords, this weak point is to attack WPS; Which is Wireless Protected Setup : this type of setup is built in 90% of routers to allow easy establishment of secure home wireless by the user, though it has been shown to fall to BruteForce Attacks. This BruteForce attack will try all combinations of Router’s PIN number (Provided by WPS) and access the router to reveal the password. This type of hack have many benefits such as: You can always have the Wireless Password even if It’s changed by knowing the PIN number.

How To Hack WPA/WPA2 Passwords using Ubuntu (Reaver)

Step 1 (Setting up Reaver 1.4 )

0) Open terminal and type: sudo -s    and type your password.
1) Download
(Better Download the Latest Version ) Placed in a specified folder.
2) Open a Terminal and type : tar xvfz reaver-1.4.tar.gz
3) Install dependencies: sudo apt-get install libpcap-dev
    then : sudo apt-get install libsqlite3-dev
 
Note: libpcap and libsqlite3 maybe included in your Ubuntu version but they are very important.
 
4) Enter the folder by typing : cd reaver-1.4/src
5) Type: ./configure
6) Type : make
7) Type : make install


To test if Reaver have been successfully installed, Open a Terminal and Type ‘reaver’ and hit enter, it should list all Reaver’s sub commands.


Step 2 ( Hacking WPA/WPA2 Wireless)

After installing reaver 1.4, it’s time to proceed to the main part which is hacking wireless passwords that uses WPA/WPA2 Encryption.
 
Requirements:
Install aircrack-ng by typing sudo apt-get install aircrack-ng
Airodump-ng / Airmon-ng commands 
Reaver 1.4 (Install in Step 1)
 
1) We need to have the wireless BSSID (Mac address) so we use airodump-ng :
 Open a terminal and Type : airmon-ng start wlan0
 Type : airodump-ng mon0
It will lists the available wireless passwords, now copy the BSSID of the Access Point ( e.g : 00:11:22:33:44:55 )
2) Starting the attack:
 
Type:  reaver -i mon0 -b 00:11:22:33:44:55
 
       Now it will start testing bruteforcing the PIN number of the vulnerability WPS (which we have spoke about it), and it will show you the WPA/WPA2 Password in the end of the Crack.
 
Note: You can use walsh -i mon0 to scan for vulnerable Access Points
                  
Screenshot:
 
learn2crack.com

Alternative Wi-Fi Cracking

Wi-Fi : “WiFi” is the short form for Wireless Fidelity. It is a high speed internet and network connection without the use of wires or cables. It means a type of wireless networking protocol that allows devices to communicate and transfer data wirelessly without cords or cables. Wi-Fi is the registered trademark of Wi-Fi Alliance organization who own it. It defines any wireless local area network which is based on Institute of Electrical and Electronics Engineers (IEEE) 802.11 standards.

Devices like video game consoles, camera, mobile etc. which have Wi-Fi functionality can connect to internet by using any wireless access point. Such an access point has a range of about 20 meters (65 feet) indoors and a greater range outdoors. Below is an example of an outdoor wireless access point.

Wi-Fi KEYS : Now the question arises why we are using keys and what is the use of the keys? The simple answer is for security, encryption or for locking. So wireless keys are used for encryption which enhances the wireless security of the network. There are two types of standard wireless key support WEP and WPA encryption. For setting up a wireless key on any network first the administrator will have to select an encryption key WEP or WPA on the router. Then, the administrator sets the same value on each wireless device connecting to the router. Wireless keys are hexadecimal numbers that vary in length (but are typically between 128 and 256 bits long) depending on the encryption method used.

  • WEP : The term WEP refers for Wired Equivalent privacy, It is used as a security code for securing wireless networks.
    It is a simple sequence of hexadecimal digits which includes the numbers 0-9 and the letters A-F.
    The length of a WEP key depends on the type of WEP security utilized:

    i) 40-/64bit WEP: 10 digit key

    ii) 104-/128bit WEP: 26 digit key

    iii) 256bit WEP: 26 digit key
  • WPA :
    WPA is a short term for Wi-Fi Protected Access was developed by the networking industry in response to the weaknesses of WEP.
    WPA is called the secure encryption method the reason behind this is that WPA has a function of message integrity check which prevents an attacker from capturing, altering or resending data packets.
    WPA provides stronger encryption than WEP through use of either of two standard technologies: Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).
    A variation of WPA designed for use on home networks is called WPA Pre Shared Key or WPA-PSK for short. WPA-PSK is a simplified but still powerful form of WPA. Now WPA has been replaced by WPA2 which is more secure and reliable.

TUTORIAL : Mainly we noticed that whenever we are going to crack the Wireless WEP key we always use backtrack and it’s tools. In this tutorial here I am going to show you how to crack WEP keys without using Backtrack and its tools in Windows platform.

Tools required: 1] CommView for Wi-Fi

2] Aircrack-ng (Windows based)

Now open your “CommView” for Wifi and go to “file option” and click on “file capture” like shown in the figure below:


After that a new window appears and then click on “start scanning”.


After scanning its shows the list of all channels and the wireless networks which are running on specified channels as shown in the figure below:




In the above figure I selected a network which is running on channel 6.For details see the right side of the window, it shows the network encryption type, SSID and MAC address. Then click on “capture” and wait for the packet data. You have to create a minimum of 5000 packets for cracking a WEP key. When the numbers of packets are high, it’s easier for you to crack the key as shown in the figure below:

When sufficient packets create the “go to file option”, click on “stop capture”.


After the capturing process is complete, it creates a log file in the “log folder”. You can check your log folder directory by clicking on “log tab”. In the figure below it shows the directory of “my log folder” which is in “my documents/CommView for Wifi/Logs”.


Now go to the log folder there you can see a capture file like shown in the figure below:

Want to learn more?? The InfoSec Institute Ethical Hacking course goes in-depth into the techniques used by malicious, black hat hackers with attention getting lectures and hands-on lab exercises. While these hacking skills can be used for malicious purposes, this class teaches you how to use the same hacking techniques to perform a white-hat, ethical hack, on your organization. You leave with the ability to quantitatively assess and measure threats to information assets; and discover where your organization is most vulnerable to black hat hackers. Some features of this course include:
  • Dual Certification - CEH and CPT
  • 5 days of Intensive Hands-On Labs
  • Expert Instruction
  • CTF exercises in the evening
  • Most up-to-date proprietary courseware available

Now just double click on the file and a new window appears, then go to “file option” select “export logs” then select “Wireshark/Tcpdump format” and save your file. Here I save my file name as “hack.cap” in my desktop shown in the figure below:


Now open your “Aircrack GUI” and browse for your saved capture file as shown in the figure below:


After that click on the “launch button” then a cmd window appears, asking for index no. of target network here my target network index no. is 1 like shown in the figure below:


After putting in your index number, press “enter” and the cracking process starts, if the key is decrypted successfully like shown in the figure below:


CONCLUSIONS: Hence we conclude that the WEP key is not secured. If we create a 256 bit key that can also be cracked, but that is time consuming and we have to capture a higher number of packets and data.
REFERENCES:

http://www.squidoo.com/what-is-wifi
http://mobileoffice.about.com/od/glossary/g/wi-fi.htm
http://en.wikipedia.org/wiki/Wi-Fi
http://compnetworking.about.com/od/wirelesssecurity/f/what-is-a-wireless-key.htm
http://compnetworking.about.com/od/wirelessfaqs/f/wep_keys.htm

http://compnetworking.about.com/cs/wirelesssecurity/g/bldef_wpa.htm

RUN TRIAL SOFTWARES FOR LIFETIME

FIND SERIAL KEY FROM GOOGLE and here is another article of same type how to run trial software for lifetime.

So for this you have to download a simple software called RUNASDATE

WHAT IS RUNASDATE

RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn't change the current system date and time of your computer, but it only injects the date/time that you specify into the desired application.
You can run multiple applications simultaneously, each application works with different date and time, while the real date/time of your system continues to run normally.



HOW DOES IT WORK

RunAsDate intercepts the kernel API calls that returns the current date and time (GetSystemTime, GetLocalTime, GetSystemTimeAsFileTime), and replaces the current date/time with the date/time that you specify


PC REQUIREMENTS FOR RUNASDATE

There are no special requirements for this software. RunAsDate works under Windows 2000, Windows XP, Windows Server 2003, Windows Server 2008, Windows Vista, Windows 7, and Windows 8. Older versions of Windows are not supported. The is also x64 version available in a separated download, for using with x64 applications..

NOTE

This software will work only if the security of software is not good so don't tell them or me if this don't work as many shareware creators are smart enough to detect that the date/time was modified and when they detect the time change, they end the trial period immediately. see my another article on HOW TO FIND SERIAL KEY USING GOOGLE


DOWNLOAD LINKS

                                                                 DOWNLOAD LINK 1

                                                         DOWNLOAD LINK 2 (FOR X64)

How to Hack an Email Account




How to Hack an Email Account

The most frequent question asked by many people especially in a chat room is How to Hack an Email Account? So you as the reader are most likely reading this because you want to hack into some one’s email account. Most of the sites on the internet teach you some nonsense and outdated tricks to hack an email. But here are some of the real and working ways that can be used to hack an email account.

THINGS YOU SHOULD KNOW BEFORE PROCEEDING

Before you learn the real ways to hack an email, the following are the things you should be aware of.

1. There is no ready made software that can hack emails just with a click of a button. Please don’t waste your money on such scam softwares.

2. Never trust any hacking services that claims to hack email passwords just for $100 or $200. Often people get fooled by these services and eventually loose their money with no gain.

3. With my experience of over 6 years in the field of Hacking and Security, I can tell you that there exists only 2 foolproof methods to hack an email. All the other methods are simply scam or don’t work. The following are the only 2 foolproof methods that work.

EASIEST WAY TO HACK AN EMAIL ACCOUNT

Today, with the advent of a program called Keylogger it’s just a cakewalk to hack an email account. It doesn’t matter whether or not you have physical access to the victim’s computer. Using a keylogger is the easiest way to hack an email account. Any one with a basic knowledge of computer can use the keylogger and within few hours you can hack any email account.

1. What is a keylogger?

A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a small program that monitors each keystroke a user types on a specific computer’s keyboard. Using a keylogger is the easiest way to hack an email account. A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password.

2. Where is the keylogger program available? 

A keylogger program is widely available on the internet. Some of the best ones are listed below

SniperSpy

Win-Spy 


you can also make it by your own
see this post HOW TO CREATE YOUR OWN KEYLOGEER USING VISUAL C ++

3. How to install it?

You can install these keyloggers just as any other program but these things you must keep in mind. While installing, it asks you to set a secret password and a hot key combination. This is because, after installation the keylogger program is completely hidden and the victim can no way identify it. So, you need the Hot Key combination and secret password to later unhide the keylogger.

4. Once installed how to get password from it?

The hacker can open the keylogger program by just pressing the hot keys (which is set during installation) and enter the password. Now it shows the logs containing every keystroke of the user,where it was pressed, at what time, including screenshots of the activities. These logs contain the password of the victim’s email account.

5. I don’t have physical access to the victim’s target computer, what can I do?

It doesn’t matter whether or not you have physical access to the victim’s computer. Because keyloggers like SniperSpy and Win-Spy offers Remote Installation Feature. With this feature it is possible to remotely install the keylogger on the victim’s PC.

You can attach the keylogger with any file such as image, MS excel file or other programs and send it to the victim via email. When the victim runs the file, it will automatically get installed without his knowledge and start recording every activity on his computer. These activities are sent to you by the keylogger software via email or FTP.

6. What if the target user (victim) refuses to run the attached file?

Sometimes the victim may refuse to run the attachment that you send via email because of suspicion. To solve this problem plz refer the following link

A fool proof method to remote install the spy software

7. How can a keylogger hack the Email password?

Hacking an email password using keylogger is as simple as this: You install the keylogger on a Remote PC (or on your local PC). The victim is unaware of the presence of the keylogger on his computer. As usual, he logs into his Email account by typing the username and password. This username and password is recorded and sent to you via Email. Now you have the password of your target email account.

In case if you install the keylogger on your local PC, you can obtain the recorded email password just by unhiding the keylogger program (use your hot key and password to unhide).

8. Which Keylogger is the best?

Both the keyloggers mentioned above are the best for email hacking. However I recommend SniperSpy as the best for the following reasons.

1. Sniper Spy is more reliable than Win-Spy since the logs sent will be received and hosted by SniperSpy servers. You need not rely on your email account to receive the logs.

2. Unlike Winspy, Sniperspy doesn’t require anything to be installed on your computer. To monitor the remote PC all you have to do is just login to your SniperSpy account from your browser.

3. SniperSpy is more easy to use and faster than Winspy.

4. SniperSpy offers better support than WinSpy.

5. SniperSpy has got recognition from media such as CNN, BBC, CBS, Digit etc. Hence it is more reputed and trustworthy.

Saturday, 28 September 2013

How to Change Login Screen Background Image In Windows 7

Hello friends, today I shall show you how to change the logon screen background image in Windows 7. Are you tired and bored of the normal login screen, which you feel is dull? Then worry not, you can put your favourite image as the background picture in the logon screen. Here is how to do it, in just 7 SIMPLE and EASY steps.
  •  Go to Start, type “regedit” in the search box. Regedit stands for Registry Editor.
registry+editor+address
  • The registry editor opens up. There, you will find 5 folders, starting with the name HKEY.  HKEY stands for Handle to Registry Key.
  • Now, navigate to the following address, starting from HKEY_LOCAL_MACHINE. 
 HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\  
Authentication\LogonUI\Background
  • There, on the right, you will find a parameter called “OEMBackground”. Double click on it and in the box below “Value data:”, change the value from 0 to 1. This enables us to put images of our choice at the Login Screen. Close the Registry Editor.
  • Now, from My Computer, navigate to the following address -> C:\Windows\System32\oobe. There, create a folder called “info”. Inside that folder “info”, create another folder called “backgrounds”. So inside this folder (C:\Windows\System32\oobe\info\backgrounds), paste your favourite JPEG image, the one you want as your Login screen background.
backgrounds

  • Name that image as “background Default” . Note that it strictly has to be named so, else the changes won’t occur. Take care that the size of the image is not more than 256 KB.

  • Restart your computer, and when it comes to the Login screen, you will see that your new image is the background of the Login screen.

How to Bypass iPhone 5 TouchID -

Chaos Computer Club Bypasses iPhone 5 TouchID

Germany’s Chaos Computer Club has bypassed the Biometrics security of Apple’s TouchID using easy everyday means. Just two days after the device went on sale worldwide.
As the group says that their biometric hacking team took a fingerprint of the user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.
In the post of their site, the group explains that:
In reality, Apple’s sensor has just a higher resolution compared to the sensors so far. So we only needed to ramp up the resolution of our fake”, said the hacker with the nickname Starbug, who performed the critical experiments that led to the successful circumvention of the fingerprint locking. “As we have said now for more than years, fingerprints should not be used to secure anything. You leave them everywhere, and it is far too easy to make fake fingers out of lifted prints.
The Chaos Club details its methods for the fingerprint hack, “First, the fingerprint of the enroled user is photographed with 2400 dpi resolution. The resulting image is then cleaned up, inverted and laser printed with 1200 dpi onto transparent sheet with a thick toner setting. Finally, pink latex milk or white woodglue is smeared into the pattern created by the toner onto the transparent sheet. After it cures, the thin latex sheet is lifted from the sheet, breathed on to make it a tiny bit moist and then placed onto the sensor to unlock the phone,”  the post states, adding that this technique can be used against “the vast majority” of fingerprint scanners.

Friday, 27 September 2013

ZTE Unlock Code Calculator

ZTE CALCULATOR
Today am gonna show u how to unlock ZTE mobile devices online using ZTE Calc,

  1. you will have to get you IMEI (International Mobile Equipment Identity) is 15 digit or 17 digit (IMEISV) unique number for GSM and WCDMA mobile phones, used to identify the device.

  • Usually IMEI is printed in a label under the battery compartment with many other technical details, and this is hard-printed IMEI.
  • To read IMEI on screen type *#06#. Onscreen keypad phones first bring the keypad onscreen and type code *#06# phone will display IMEI on screen, this is soft-coded IMEI
   2.  go to ZTE UNLOCK CODE CALCULATOR >> http://goo.gl/c4nJw7 , Enter IMEI to Calculate NCK and SPCK Unlock codes


   3.  Insert an unacceptable SIM card to locked phone, now phone should ask unlock code (NP code?). Easy just enter code.


Not working?, alright now remove the SIM card and try this code ###825*09# . got the prompt for code? enter the code.

Failed above, try *983*8284# . It should work.
Try *983*865625# also it’s working on few models of ZTE phones like F102 (Thank you ‘Lomarko’ for your comment)


All above methods failed? Try Google search and share any new methods via comment with your phone model, let’s help each other.

Thursday, 26 September 2013

How to update your iPhone, iPad or iPod to iOS 7 Over the air and through iTunes: we show you how

How to update your iPhone, iPad or iPod to iOS 7

   How to get iOS 7
iOS 7 represents a major update to Apple’s mobile operating system for the iPhone and iPad, and as long as your device isn’t more than around two years old you’ll be able to upgrade it to get some or all of the new features.
iOS 7 will be available for the iPhone 4 and newer, the iPad 2 and newer, and the 5th generation iPod touch.
The following devices can’t be upgraded to iOS 7: Original iPhone, iPhone 3G, iPhone 3GS, original iPod touch, iPod touch 2nd-gen, iPod touch 3rd-gen, iPod touch 3th-gen, original iPad.
Here’s a full list of which iOS 7 features will be available in each country, since your location as well as your device will affect which features you get.

How to update to iOS 7

There are two ways to update your iPhone, iPad or iPod to iOS 7: over the air (via Wi-Fi) or through iTunes.
Before you upgrade to iOS 7, though, there are a couple of housekeeping jobs to do. First, update your apps as certain out-of-date apps won’t work in iOS 7.
Second, check if you have enough free storage space as the update requires at least 1.4GB of memory for temporarily storing the download during the update. You can check how much space is available by tapping Settings > General > Usage. The list of apps will tell you which ones are using up your phone or tablet’s storage. Typically, it will be the Photos app, which is full of your images and videos.
iphone available storage
You should copy these to your PC and then delete those you don’t need on your device to free up space. Videos use up the most space, but beware that these aren’t backed up to your iCloud Photo Stream. Only photos are included.
Finally, make sure your iPhone, iPad or iPod touch is backed up to iCloud or your computer via iTunes before performing the update. It’s unlikely anything will go wrong, but if it does, you could lose any data that’s changed since your last backup such as new contacts, documents, photos, videos and more.
You should also connect your wall charger as the update will take some time.

Over the air iOS 7 update

iOS 7 over the air updateiPhone 4 update iOS 7
If your device is running iOS 5 or later, you’ll be able to update to iOS 7 without needing a computer since iOS 5 added support for over-the-air updates. If your firmware is iOS 4.x you’ll have to connect to iTunes and perform the upgrade.
Now that the update has been released, you should see a pop-up notification on your screen at some point after this date telling you that a software update is available.
If you want to force your iPhone or iPad to check if the update is available, tap Settings, General, Software Update. Your smartphone or tablet will check if iOS 7 is available and you can then follow the instructions on screen.
When prompted, tap Download to download the iOS 7 update. Once this is finished, tap Install to upgrade iOS.

Updating to iOS 7 via iTunesiPhone 5S iOS 7

If for some reason you don’t want to update to iOS 7 over the air, you’ll need to connect your device to a computer running iTunes. You should update iTunes to the latest version (currently 11.1) before connecting your iPhone, iPad or iPod touch. To do this, launch iTunes and from the Help menu, click Check for Updates.
Once you have the latest iTunes, connect your device and it should display a message saying a software update is available. If you don’t see this, simply click on your iPhone, iPad or iPod touch in the Devices list and then click the Check for Update button.
You’ll be prompted to download and install the update – make sure you don’t disconnect your device before the upgrade process is finished.
Whether updating over the air or via iTunes, your iOS device will restart after installing iOS 7.

Enjoy!!!

Saturday, 14 September 2013

Top 13 Alternatives of WhatsApp Messenger

 
Top 13 Alternatives of WhatsApp Messenger



Top 13 Alternatives of WhatsApp Messenger

viber
Viber Allows users to connect the world using Text messages, make free calls and share photos,videos for free across the world. More than 200 million Viber users text, call, and send photo and video messages worldwide over Wifi or 3G – for free. On Viber, your phone number is your ID. The app syncs with your mobile contact list, automatically detecting which of your contacts have Viber.
Download for Android   Download for iOS

2. WeChat

wechat
With WeChat, users can send voice messages and instant messages and also make crystal clear video calls. The message alerts are displayed with push notifications and users can import contacts instantly. Its allow Instant messaging with group chats and animated smileys. you can Chat with your friends or with people nearby with stunning features like Sending photos and videos has never been simpler. its main feature is Real time walkie talkie mode with up to 40 friends.
Download for Android   Download for iOS

3. Nimbuzz

nimbuzz
Nimbuzz Messenger combines the power of internet and smart phone messenger into one, and lets you make free video calls, voice calls, send chat messages, share files, on any mobile device across popular messengers. Nimbuzz Messenger is available on iOS, Android, Blackberry, Symbian, Java, Windows and Mac.
Download for Android   Download for iOS

4. Line

line
LINE is a new communication app which allows you to make FREE voice calls and send FREE Emoji messages whenever and wherever you are, 24 hours a day! LINE has more than 210 million users worldwide and is used in over 231 countries! All Line users can enjoy free high quality voice calls and send messages with colorful icons, photos and location details as well.
Download for Android  Download for iOS

5. KakaoTalk Messenger

kakao
KakaoTalk Messenger Allows users to make FREE calls and text. Make group calls in high-quality sound and schedule appointments in your chat room. Download now and enjoy animated emoticons, stickers, and themes – completely free!
Download for Android   Download for iOS

6. Kik Messenger

kik
Kik Messenger is one of the simplest free, cross-platform messaging apps around. 50 million users love Kik! It’s the fast, simple, and personal smartphone messenger that connects you to everyone you love to talk to.
Download for Android   Download for iOS

7. Tango

tango
Tango gives you the highest quality video & phone calls, texts, photo & video sharing, games and more for FREE! It’s the all-in-one messaging app that finally combines every way you want to interact with friends & family.  130M people around the world using  Tango today.
Download for Android   Download for iOS

8. Imsy

imsy
Imsy allows you to message your friends for free. Have lightning fast, real-time chat and group messaging with friends; add emoticons and relevant images to your messages based on suggestions from Imsy.
Download for Android   Download for iOS

9. LiveProfile

liveprofile
LiveProfile helps you stay connected with friends in real-time. It’s the crazy fast, completely free, cross-platform messenger for all smartphones. Send messages, photos, videos, post status updates, customize your profile, set your profile picture, and much more. It has no calling features but it does have standard messaging features with the abilty to start a group chat and send pictures or videos.
Download for Android   Download for iOS

10. GroupMe

groupme
GroupMe is the best way to chat with every friends. It’s free, whether you’re talking to a group of friends, or texting with one person. Best of all, it works on nearly every phone, with a smartphone app or via SMS. With GroupMe, it’s easy to reach anyone, anytime, anywhere.

Download for Android   Download for iOS

11. Facebook Messenger

facebook
Facebook Messenger allows users to Text your friends for free. Get Facebook Messenger to instantly reach friends on their smart phones, feature phones or desktop computers.
Download for Android   Download for iOS

12. ChatON

chat on
Create a global social community with over 1 billion friends who have ChatON through a Samsung account. Users can choose to sign in to the app with the Samsung account or just by entering their name. Share your life with friends using Samsung’s global communication service, ChatON!
Download for Android   Download for iOS

13. Skype

skype
Skype is one of the best ways to make calls for free. Say “hello” to friends and family with an instant message, voice or video call on Skype for free. There’s so much you can do, right from the palm of your hand.
Download for Android   Download for iOS

Top 13 Alternatives of WhatsApp Messenger
Top 13 Alternatives of WhatsApp Messenger

Friday, 6 September 2013

How to Install Two Operating Systems on One Computer

Want to have Windows XP, but have Vista right there if you need it? Here's how.



Edit Steps

  1. 1
    Make a backup of any important data files. It's often possible to do this non-destructively, but if you encounter a problem while partitioning a drive, your data may not be recoverable. You should be making backups anyway, but before major updates such as this is a good time to make sure.

  2. 2
    Ensure that you have the installation disks for whatever operating systems you want to install. If necessary, also have the serial numbers ready. Also have ready the installers for any software applications you want installed on either operating system.

  3. 3
    Check the disk allocation. If you currently have one operating system on a single partition spanning the entire disk, you'll need to resize that partition to make room for a separate partition for the other operating system. This may require defragmenting the drive first. In some cases, it's better to have each operating system on a separate physical disk, but usually partitioning works. Check the system requirements for each operating system and make sure each can get a partition at least that large. You may also want to reserve some space for a data partition available to both operating systems. Note that different operating systems require partitions with different file systems. Check the table below for compatibility.

  4. 4
    Install the operating system to the first partition. During the installation, you should be asked what partition you want to install to. You should also have access to a partition program to modify the partitions of your drive. If you already have the correct operating system on the first partition, skip this step.

  5. 5
    Install the other operating system on the second partition. The second operating system installer may detect the first on the other partition and configure a boot loader allowing both to boot.

  6. 6
    If necessary, configure the boot loader. You will probably be using ntloader (Windows) or GRUB (Linux), but check the comparison table for other options. Check the documentation for how to do this. You should be able to set which operating system you want to boot into by default and set a time delay to choose another operating system before the default is chosen.

  7. 7
    Test the dual-boot configuration. Try booting into each. Note which partitions are readable, and that everything is working properly. Note and troubleshoot any problems.

  8. 8
    Install any software applications on the operating systems. If you kept the existing operating system on the first partition, any installed applications should still work, but may need to be reinstalled on the new OS.