Saturday, October 31, 2015

Facebook reveals why it's forcing workers to swap iPhones for Android

Facebook is enforcing a no-iPhone policy for key engineers in its product team so they experience what using the social network is like for "most" users.

The move, according to Wired, is an entirely pragmatic decision that stems from the company's ambitions to grow its user base of 1.5 billion people.

While smartphone penetration in the US and Europe has reached saturation point, handset adoption is accelerating in places like India, where users prefer low-cost Android devices.

The catch for Facebook is its well-paid engineers live in a different world to most of its users and the company hopes to change this as it doubles down on emerging markets.

"I am mandating a switch of a whole bunch of my team over to Android, just because people, when left up to their own devices, will often prefer an iPhone," Wired quoted Chris Cox, Facebook's chief product office as saying.

It's not clear how many Facebook staff are being forced to make the switch to Android but Cox reportedly wants a good portion of his team on the Google OS. According to Google's most recent update last month, Android now has 1.4 billion active users.

Cox wants his sizeable product team to be "reporting bugs and living the same experience that most Facebook users experience today".

The policy was announced amid a broader presentation about Facebook's focus on emerging markets and coincided with Facebook CEO Mark Zuckerberg's visit to India this week, where he argued the case for greater access to the internet.

The visit followed a public backlash in India against Facebook's Internet.org scheme, which was recently renamed Free Basics alongside changes to address criticisms that its free online access favours content from Facebook.

The requirement that certain product staff use Android has been introduced alongside another initiative to help employees understand how the other side experience its products.

Facebook this week kicked off its '2G Tuesdays' program, where employees will be asked whether they want to temporarily use a slower connection, offering them speeds closer to those available in parts of Asia and Africa that have limited connectivity.

Google also put connectivity in emerging markets in the spotlight this week, announcing a deal with three Indonesian carriers to launch a Project Loon trial in 2016. The initiative will seek to more than double network access in Indonesia, where connectivity is only available to about one third of the 255 million population.

Why code for iOS over Android? It's 30 percent less expensive says one app shop

The choice to develop apps for either iOS or Android isn't just about which platform will make you more money. It's also about which will take less effort, helping developers to get their software available quicker and cheaper.

According to one app shop, it's iOS and they have details on why.

Infinum shared statistics on its last six development projects comprised of software for both iOS and Android and the bottom line is that it costs that company 30 percent more in terms of time and effort to build for Android than for iOS.

The same projects, for example, were comprised of 38 percent fewer lines of code on average for the iOS version than for the Android edition that has the same exact functionality. And writing those extra lines of code adds up to more time: It took Infinum 28 percent more hours on average to complete the Android versions.
Android Studio

Based on the data and its experiences, Infinum suggests that Swift and Objective-C for iOS are less verbose than Java, which is used for Android applications. But that's not the sole reason it's taking Infinum more time to build Android counterparts to its iOS software.

The company notes that in its experience, Android emulators are slower than those for iOS and that Android's use of XML for app layouts isn't as efficient as the WYSIWYG approach that iOS uses.

And then there's the big challenge faced by all Android developers: Testing code against the myriad of Android device configurations based on screen size, pixel density, varying hardware components and Android API levels determined by the version of Android a device runs.

It's far more complicated and time-consuming compared to iOS where the hardware is standardized to just a few handset models with quick uptake to the latest iOS version.

Does one app developer's experience mirror the entire industry?

Not likely because there are so many variables including a developers knowledge and background of both programming languages.

But the reasons Infinum provide to justify its claim that iOS development costs less are surely something any developer should be considering when choosing to bring apps to either mobile platform.

Are you a developer of iOS and Android apps? Share your experiences and observations in the comments; let me know if Infinum is a one-off situation or if you see the same.

Android phones more vulnerable to hacking than iPhones

Most of us in this modern day and age have cell phones. Some prefer Android, while others prefer Apple iPhone.
But, did you ever wonder which one is more vulnerable to viruses and hacking?
According to research, it might be the Android. A spokesperson from Radio Shack in Coldwater said that new forms of viruses are being sent through MMS messages and picture links. Motorola and Nexus are more protected than some of the lesser-known Android models, but research has shown that Android is still more vulnerable than iPhone.
According to a study by the University of Cambridge, 87 percent of Android devices are vulnerable to malware. The study — which was partly funded by Google — looked into the phones of 20,000 Android users who had installed the Device Analyzer app, which can be purchased from the Google PlayStore. Researchers at Check Point Software Technologies identified a flaw in Android phones that could enable hackers to take control over devices remotely, which would essentially turn a phone into a spying device.
To protect yourself, it is recommended that Android consumers only install apps directly from Google PlayStore, since it performs additional safety checks on apps.
"Unfortunately, Google can only do so much, and recent Android security problems have shown that this is not enough to protect users," one of the study's authors, Alastair R. Beresford, said.
"Devices require updates from manufacturers, and the majority of devices aren't getting them," Beresford added.
International Business Times reported that a malicious new piece of malware, targeted at Android smart phones, appeared in China. The malware, dubbed “Geinimi” based on its first-known incarnation, is a Trojan that can compromise a significant amount of personal data on a user’s phone and send it to remote servers.
The most sophisticated Android malware seen to date, Geinimi is also the first Android malware in the wild that displays botnet-like capabilities. Once the malware is installed on a user’s phone, it has the potential to receive commands from a remote server that allows the owner of that server to control the phone.
According to the chief of an unmentioned security firm, Android phones and other mobile devices are more vulnerable to hackers than iPhones because of Google's open-source policy in apps development.
"The basic difference between Google's Android software for mobile devices and Apple's iOS software, is that Apple follows a stricter process of apps while Android, which is free, allows developers a free hand in making apps," Steve Chang, chairman of Trend Micro Inc., said.
Chang said that while it is almost impossible for certain viruses to intrude into iPhone, this was not the case with Android devices.
"Apple has a sandbox concept that isolates the platform, which prevents certain viruses that want to replicate themselves or decompose and recompose to avoid virus scanners," Chang explained.

Samsung, LG Unveil Flexible Batteries That Could Revolutionise Wearables

At the InterBattery 2015 exhibition in Seoul, South Korea, Samsung and LG unveiled prototypes of new batteries that could shape the future of wearable devicess and set a new benchmark for other companies to follow.

Samsung showcased "band-shaped" batteries that are flexible. Dubbed "Stripe" and "Band", the company claims that these batteries will have a range of applications for wearable devices such as usage in T-shirts, and barrettes. The Band, as the name suggests, has been developed to be attached to smartwatch straps, while the Stripe is a bendy strip with an ultra-slim waistline of 0.3mm.

The design in the aforementioned cells improves the battery life by up to 50 percent, Samsung claims. But its capacity isn't sufficient to make it fit for use in smartphones and smartwatches yet, the company noted.

As for its durability, the company has managed to mould the batteries to the curvature of the human wrist and noted that the batteries were able to withstand 50,000 bends in test conditions.

At the event, LG also showcased a flexible battery. Dubbed the "wire battery," the cells can be made to bend into a circle of 15-mm radius, which the company claims, is twice as efficient than a typical battery in its range. Its wire-shaped body also makes it fit for use in wearables.

The batteries are not conceptual, and will be available in the market eventually. An LG representative said that the company has been working on the wire battery since 2013. Samsung hopes that it will be able to deploy the new batteries for commercial applications by as early as 2017.

Better late than never? Samsung IT arms push into automobile

Samsung Electronics and group companies are trying a belated push into the business of supplying technology to car makers, while rivals are already sewing up lucrative deals with an industry that is notoriously difficult to break into.

Data compiled by Thomson Reuters IP & Science shows the world's top smartphone maker and other Samsung Group tech affiliates are ramping up research and development for auto technology, with two-thirds of their combined 1,804 US patent filings related to electric vehicles and electric components for cars coming since 2010.

The analysis did not include filings made after 2013 due to a lag between filing and publication.

They haven't yet landed significant business, and Samsung Group declined to comment on strategy, but the lure is obvious.

Automakers already incorporate or are developing technologies to enhance safety and provide better smartphone connectivity and entertainment systems, creating an opening for tech companies to break into a market for software, services and components that is worth around $500 billion, ABI Research analyst Dominique Bonte said.

"There are two trends: the car becomes a connected software device, and the entire mobile and ICT ecosystem is getting very interested in playing a part in that evolution," Bonte said.

That is particularly welcome as demand for smartphones, TVs and computers slows, but Samsung is arriving late at a party where some of the best partners are already taken.

Cross-town rival LG Electronics Inc announced a major supply agreement with General Motors in October, sending LG's shares surging, while US chipmaker Nvidia Corp, known for graphics processors that power games consoles and laptops, says its chips will be in more than 30 million cars in the next three to four years.

Unlike Apple and Google, there is no clear sign yet that Samsung is developing its own autonomous driving technology.

IHS analyst Danny Kim said Samsung Group does not yet have a unified, group-wide approach to building its supplier presence in the industry.

"Samsung needs a serious commitment to drive the synergies between all competent organisations within Samsung Group," he said.

A decade after selling its debt-laden carmaking unit to Renault, Samsung Group in 2010 announced its second foray into the auto industry, identifying car batteries as one of its five growth businesses.

Its Samsung SDI Co Ltd is now the world's No. 6 electric car battery maker, counting BMW, Chrysler and Volkswagen among its clients.

IN THE HUNT

Other parts of the Samsung empire are now in the hunt.

Samsung patent filings show a wide range of technologies including a drowsy-driving detection system, an alert system for break-in attempts and a transparent display for directions and traffic information.

Samsung Electro-Mechanics Co Ltd recently formed a dedicated team to sell components such as camera modules to new auto clients and says it would consider acquisitions to boost car-related businesses.

Samsung Display has also cited the auto industry as a potential growth area and has been testing its organic light-emitting diode (OLED) displays with BMW and auto parts maker Continental.

The growth prospects are mouthwatering.

Nvidia says its autos revenue was $148 million for the first half of this fiscal year, nearly doubling in a year.

Consulting firm McKinsey said in a 2014 report that revenue from hardware, software and services for connectivity-enabled cars could grow to 180 billion euros ($200 billion) by 2020 from an estimated 30 billion euros in 2014.

Carmakers may spend an additional $6,500 per car when they launch fully autonomous vehicles, the Boston Consulting Group said in a report this year.

Analysts say the supply relationships built by SDI could be expanded by bundling parts and services from other Samsung arms.

Samsung insiders acknowledge, however, that it may take several years before tech arms other than Samsung SDI generate significant auto-related sales.

Product development cycles in the auto industry are far longer than in consumer electronics, and carmakers are cautious about adding suppliers without a track record. It took the better part of a decade for Nvidia to gain acceptance as a global supplier, while LG worked with GM for nearly a decade before it got its supply contract for the Chrevrolet Bolt.

Samsung Electronics could still catch up by taking the one-stop-shop approach, similar to that of LG Electronics, by working with sister companies to combine offerings such as batteries, chips, sensors and software such as the Tizen operating system into a single package, analysts say.

ABI's Bonte said Samsung could also speed things up by acquiring established players such as Japan's Renesas Electronics Corp, which researcher Gartner says was the world's top auto semiconductor maker last year, with $3.1 billion in revenue.

"It's important for a supplier to be able to sell not just one single component but provide that entire platform," he said.

Oppo begins trial run for manufacturing handsets in India

Chinese handset maker Oppo has undertaken trial runs for manufacturing mobile phones at Foxconn's facility in Sri City Special Economic Zone in Andhra Pradesh, a top official said today.

Since its entry, the company has been importing phones from China to sell in the Indian market.

"We have started production in Foxconn manufacturing unit at Sri City SEZ. Right now, trial runs are going on. We are manufacturing Joy Plus mobile phone," Oppo Mobiles India Vice-General Manager Kai Feng told reporters.

Foxconn has set up an assembly line to manufacture smartphones in its facility, he said.

To a query, Feng said the company was mulling setting up its own factory for manufacturing mobile handsets.

"We have plans to set up our own factory. We are still discussing it. We have not yet decided," he said.

The company has sold four lakh units in India this year till date and plans to treble it before March 2016.

"We have sold four lakh mobile phones till date. We expect to sell 1.5 million before March 2016," he said.

The Gurgaon-based company, as part of strengthening its network, also plans to open four exclusive showrooms in Tamil Nadu.

"Right now, one exclusive showroom is in Tiruchirapalli. We plan to open one more outlet there. We are planning to open two exclusive showrooms in Chennai soon," he said.

Feng and senior company officials were here to launch the dual SIM, 4G-enabled Oppo smartphone Neo7, priced at Rs 9,990. The phone is equipped with 1GB RAM, 16 GB internal memory and Qualcomm Snapdragon 410 processor. It has 2,420 mAh non-removable battery.

The company sells 4G mobile phones Find 7a, Find 7, R5, R7 Lite and R7 Plus in India.

After telegram services, BSNL to shut down MMS from tomorrow

Bharat Sanchar Nigam Limited (BSNL)'s multimedia messaging services (MMS) will be stopped from November 1.Increasing popularity of WhatsApp and other similar services had taken a toll on BSNL's MMS facility.

Bharat Sanchar Nigam Limited (BSNL)'s multimedia messaging services (MMS) will be stopped from November 1. Increasing popularity of WhatsApp and other similar services had taken a toll on BSNL's MMS facility.

MMS communication technology is higher priced than traditional SMS and is not being supported by all devices. "Due to increasing use of networking services, consumers have stopped using the traditional MMS facility," said Ganesh Chandra Pandey, chief general manager, Madhya Pradesh. BSNL is now trying to find ways to match with latest technology.

Digital India: Facebook, BSNL team up to create 100 WiFi zones in rural India



US social networking major Facebook has partnered state-owned Bharat Sanchar Nigam Ltd. (BSNL) to create 100 WiFi hotspots in rural India to drive digital penetration in the country.

Facebook is investing Rs 5 crore per annum for buying bandwidth from BSNL in this joint initiative that also includes IT infrastructure services providers such as Quad Zen and Trimax for equipment and fibre deployment, BSNL chairman and managing director Anupam Shrivastava said.

"Facebook has chosen 100 villages to provide Wi-Fi hotspots on a revenuesharing model," Shrivastava said, adding it will spend Rs 5 lakh per site a year for buying bandwidth from BSNL for a period of three years. Facebook didn't respond to ET's emailed questionnaire till the time of going to press.

Nearly 25 villages have been covered under the pilot programme in southern and western India so far and the project is likely to be scaled up and extended from a current three-year partnership, by another two years.

"We are aiming to complete the WiFi rollout by December 31 this year," Shrivastava said, adding that consumers can get free Internet connectivity for the first half an hour. The WiFi network has a capacity to allow an average of 2,000 individuals to latch on at the same time.

Qaud Zen will be responsible for equipment sourcing and sales and marketing initiatives for the south-west region while Trimax has been roped in for the northern region in an open process, the BSNL top executive said.

Shrivastava's comments came at a time when Facebook founder and chief executive Mark Zuckerberg has been visiting India, where he has highlighted the country's importance in the company's mission to connect the next billion to the Internet.

BSNL, on its part, is optimistic about its WiFi initiatives and has rolled out 450 hotspots with a focus on pan-India tourist spots, and aims to set up a total of 2,500 WiFi hotspots by the end of current fiscal year through March 2016. "We are focusing on WiFi hotspots in line with the government strategy of Digital India," Shrivastava said.

Isro's GSAT-15 to Be Launched on November 10



Isro's latest communication satellite GSAT-15 is all set to be launched on November 10 from French Guiana on board Ariane 5.

The Indian space agency, as part of augmenting telecommunication services, had earlier launched communication satellites GSAT 14 and GSAT 6, respectively.

GSAT 14 was launched in January 2014 while GSAT 6 on GSLV in August 2015.

"In its 10th mission, scientists at Arianespace recently integrated GSAT-15 satellite with the launcher (Ariane 5)", Arianespace said in a statement.

Preparations for Arianespace's sixth heavy-lift mission have advanced into payload integration phase with GSAT-15 satellite making its first contact with the launch vehicle, it said.

GSAT-15, developed by Isro, would provide C- and Ku-band telecommunications and navigation services to India.

It will have a lift off mass of 3,164.5 kg.

"Flight VA227 (Ariane 5) is set for a November 10 lift off. It will mark Arianespace's 10th launch this year", it said.

GSAT-15 would be launched along with Arabsat-6B, set up by the Arab League Inter-governmental Organisation. Arabsat will be launched to provide telecommunications and television broadcast services for Middle East and African region.

The mission life of GSAT-15 will be 12 years.

How You Use Twitter Can Reveal Your Income Level, Says Study

Linguists and psychologists have been using the content of messages on Twitter to learn more about our society - in areas such as gender, age trends and politics. Now, a new study by computer scientists at the University of Pennsylvania has found that the behaviors of Twitter users also correlate with their income levels.

The team of researchers, led by Daniel Preotiuc-Pietro of Penn's Positive Psychology Center, analyzed more than 10 million posts of 5,191 publicly available Twitter user profiles. The data was collected in August 2014, and the most recent 3,000 posts from each person were used.

To calculate income levels, the researchers used England's job code system to sort the self-described occupations provided in the profiles and assign a representative, mean income for each code. That data was then used to identify links to a user's wealth and the person's tweeting behavior.

The researchers evaluated how high- and low-income users employ Twitter for different purposes. Those with high incomes used it more for disseminating information and had more followers. Those with lower incomes used it more for social reasons, including sharing links in their tweets.



As you can see in the first chart, people earning an average of GBP 45,000 ($69,000 or roughly Rs. 45,00,000) had far more Twitter followers than people making much less.

Although the reason behind the trend is unclear, it is also interesting that Twitter users making more money retweeted more content than Twitter users earning less. And lesser-paid tweeters included links more often in their postings.

The researchers also analyzed the content of the messages. Feelings of fear and anger inferred in tweets of high-income users stood out in particular.

Other researchers in the project included Svitlana Volkova of Johns Hopkins University, Yoram Bachrach of Microsoft Research and Vasileios Lampos and Nikolaos Aletras of University College London.

Need for Speed, Call of Duty: Black Ops 3, Fallout 4, and Other Games Releasing This November



November is one of the busiest months of the year for gaming. With high profile releases such as Call of Duty: Black Ops 3 and Rise of the Tomb Raider, it's easy to see that it's a busy month for gamers. While September and October were massive months in their own right, we feel that November is the one that will have the maximum impact on your wallet. Here's are the games that you need to play this month.

Anno 2205 

The Anno games might not have the same appeal as Sim City or Cities Skylines XL, but the franchise has managed to hold its own over the years. With Anno 2205 letting you control more than just one city at a time complete with the goal of controlling a vast sci-fi cityscape on the Moon, this latest addition to the series appears to have finally come out of Sim City's shadow. If our preview was anything to go by, city simulator fans will soon have have something to tide them over. Available on November 3 for PC (Windows).


Need for Speed 

This edition of one of gaming's oldest racing series appears to mimic some of the success of its previous entries. It sports a vibe not too different from the classic Need For Speed Underground and is coupled with an open-world that we hope is more in line with Most Wanted than 2008's abysmal Need for Speed Undercover. But being always online (yes, even in single-player) and sporting cringe-worthy dialogue, is this the Need for Speed game you're looking for? We'll know soon enough. Available on November 3 for PS4 and Xbox One. The PC version has been delayed to Spring 2016.


Call of Duty: Black Ops 3 

Arguably the biggest game of the year, this first-person military shooter series has gone from strength to strength. Black Ops 3 sports a futuristic premise, improved traversal mechanics, and slick multiplayer if user impressions of its beta were anything to go by. With a single-player campaign that promises to be a lot longer than the five to six hour adventure we're usually subject to, there seems to be a lot here to keep this long running franchise from going stale. Available on November 6 on PS3, PS4, Xbox 360, Xbox One, and PC.



Fallout 4 

The last Fallout released half a decade ago, so we're all primed and ready to explore the 1950s inspired, post-apocalyptic wasteland of Fallout 4. Previews indicate that this is a cleaner, crisper looking game compared to its predecessors, but there seems to be a whole lot more under the hood thanks to its perks and specials systems. There's a ton of in-game content to peruse through from making your own base to crafting weapons and a meaty single-player adventure too. Considering how popular Fallout 3 and Fallout: New Vegas were won't be surprised if this is the game you play for months on end. Available on November 10 on PC, PS4, and Xbox One.



Rise of the Tomb Raider 

While the first game in the latest rebirth of Lara Croft met with stupendous critical response, her second outing appears to be a more muted affair. This is partly due to it being a timed exclusive to the Xbox 360 and Xbox One. Nonetheless, with every preview showcasing a host of icy landscapes, intriguing puzzles, and varied gameplay, we're hopeful that Lara Croft's latest adventure would be worth checking out, despite going up against Fallout 4 that's out on the same day. Available on November 10 on the Xbox 360 and Xbox One.



Star Wars Battlefront 

Although our impressions of the Star Wars Battlefront beta weren't the greatest, we can't help but feel that Battlefield developer Dice was holding back in terms of content for the full release. Our suspicions were confirmed following a superlative reveal of more hero characters and locations earlier in the month. But will it be enough to keep us playing the week after launch? We hope so. Available on November 17 on PS4, PC (digital only), and Xbox One.



And if these don't pique your interest there's Assassin's Creed Syndicate on PC and StarCraft II: Legacy of the Void as well, to name but a few. What are you buying in November? Let us know via the comments.

OnePlus X First Impressions: Mid range android Phone


Soon after the launch of the OnePlus 2 back in July, OnePlus started creating buzz about another handset due this year which would cater to a different audience. The OnePlus X, the Chinese company's third smartphone, was finally unveiled on Thursday at simultaneous events in New Delhi and Beijing, among other cities.

OnePlus had also announced plans earlier this month to start manufacturing phones in India, further further affirming that the company considers India one of its most important overseas markets.

At the launch event, we asked OnePlus India General Manager Vikas Agarwal how the OnePlus X fits into the company's smartphone lineup, as the older OnePlus One still has better innards. Agarwal, without specifying an exact time frame, confirmed that the One will eventually be discontinued - though not this year. This made it clear that the OnePlus X is here for a reason, and the company wants to make sure that it caters to consumers looking for a powerful device but who can't afford the OnePlus 2.

The OnePlus X has been launched in two versions - an Onyx variant and a limited-edition Ceramic variant. Much like the OnePlus One and OnePlus 2 smartphones, the OnePlus X will also go on sale in India through Amazon and will be only available via the infamous invite system.



In terms of specifications, the OnePlus X is quite similar to the One. It features a 5-inch full-HD (1080x1920 pixels) Amoled screen and is powered by a quad-core 2.3GHz Qualcomm Snapdragon 801 processor. It has 3GB of LPDDR3 RAM and 16GB of built-in storage, and also supports storage expansion using a microSD card (up to 128GB). The phone also has a 13-megapixel rear camera with flash and a f/2.2 aperture; an 8-megapixel front-facing camera with a f/2.4 aperture; and a non-removable 2525mAh battery.

We got to spend a little time with the new OnePlus X at the launch event. When we first held it in our hands, it definitely felt sturdy. We felt as though we could be comfortable using it with just one hand for hours; something that can't be said about the OnePlus One or OnePlus 2. The company had earlier stated that the OnePlus X was built for people with smaller hands in mind. The design of the OnePlus X also reminded us of the iPhone 5 and iPhone 5s.



At the launch, OnePlus also stressed on the differences between the Onyx and Ceramic versions of the OnePlus X. Both versions are very similar in design and specifications - the biggest difference is the materials they are built from. OnePlus claims that the Ceramic version of the OnePlus X takes up to 25 days to be manufactured. This might be the biggest reason why the Ceramic version will be a limited edition. In fact, the company confirmed that there will only be 10,000 units of the Ceramic version available worldwide. On being asked whether there were any quotas of units for specific markets, Agarwal stated that availability would totally depend on demand.

The Onyx version features rounded edges while the Ceramic version has sharper angles. The OnePlus X Onyx features mirror-like finish on the rear which attracts smudges. The Ceramic finish was however even more of a fingerprint magnet. The back panels of both versions of the OnePlus X are shiny and reflective, making it hard for us to photograph them without reflections. At just 138 grams, the Onyx version is lighter than the Ceramic, which weighs 160 grams.



Similar to the OnePlus 2, this new model features a physical Alert Slider, which allows users to switch between a totally silent mode, priority notifications, and all notifications. Below the screen, there are three capacitive buttons for Back, Home, and Recents. Unfortunately, they are not backlit.

The smartphone features a metal frame with dual speaker grilles on the bottom panel alongside a regular Micro-USB 2.0 port. The 3.5mm audio jack is on top. The company touted that the frame incorporates 17 micro-cuts for improving the look as well as grip of the device. The volume rocker buttons as well as the power key are on the right, while the Alert Slider is on the left. The company claimed at the launch that it has tested the physical buttons on the OnePlus X 10,000 times.

OnePlus has used an Amoled display for the first time, and it looked vibrant on the OnePlus X. It reproduced bright colours, and viewing angles were decent. Visibility under direct indoor lights was good.

The unit we were able to use for a limited time was running OxygenOS 2.1.2 based on Android 5.1.1 Lollipop. OnePlus parted ways with Cyanogen earlier this year which has led the company to introduce its own OxygenOS Android skin. The good news is that it looks like stock Android with some minor customisations.

The OnePlus X brings one of the most awaited features to the company's line-up -microSD card support. The smartphone features a hybrid dual-SIM design, with the second slot usable for either a second SIM or a microSD card. During the time we spent with the OnePlus X, we found that the smartphone responded well to touch input and was quick during multitasking. The 13-megapixel rear camera on the OnePlus X took crisp indoor shots under artificial lighting, though we could not test the camera in natural light. Shots taken with the front camera on the OnePlus X in low light were average and lacked detail. We will however reserve our verdict on the OnePlus X smartphone's performance and camera till we get a chance to put it through our detailed review process.



The OnePlus X Onyx variant and the limited edition Ceramic variant have been priced at Rs. 16,999 and Rs. 22,999 respectively. Onyx will be available starting November 5 while Ceramic will go on sale starting November 24.,

At this price point, the Onyx OnePlus X can be expected to tempt potential OnePlus One buyers, considering the fact that the One will be discontinued within a few months. However, the Ceramic OnePlus X will have to deal with stiff competition from its own bigger sibling, the OnePlus 2. One of the biggest worries of OnePlus X buyers could be the dated hardware though this is unlikely to be a problem in day-to-day use.

One of the biggest barriers for those wanting to buy OnePlus phones has been the invite system. The company however has plans to expand the availability of the OnePlus X with open sales in the coming months.

Google Project Loon to take off in Indonesia in 2016

Google has announced that it will begin testing its Project Loon balloons over Indonesia next year to provide internet access across the country’s 17,000 plus islands. Google has tied up with three Indonesian mobile service providers to provide LTE connectivity.

According to estimates, only about a third of Indonesia’s population has access to the Internet. Being an archipelago, mobile networks are the only viable option of delivering internet connectivity to remote places. Google intends to augment the existing telecom infrastructure by employing its internet beaming giant helium balloons. “Loon can help telecommunications companies extend their networks; high in the sky, we can help overcome the difficulties of spreading equipment across an archipelago of 17,000 islands of jungles and mountains, providing connectivity to even the most remote islands,” said Project Lead, Mike Cassidy in a blog post. Google has tied up with three mobile operators, Indosat, Telkomsel, and XL Axiata to beam high-speed internet to the most far-flung corners of the country.

Google is expected to test the technology in Indonesia for a full year before commencing commercial operations. The helium balloons will be flying in the stratosphere, 20km above the surface of the earth. They will act as floating mobile towers, with each balloon covering a ground area of roughly 40km diameter. When one balloon drifts away from its position, another floats in to take its place. Google hopes to create one continuous ring of balloons around the world, in the southern hemisphere by next year. It will be able to provide uninterrupted internet access to some regions, where the company intends to start commercial operations.

Project Loon started life at the secretive Google X lab at Mountain View. It was tested for the first time in 2013 in New Zealand with just 30 balloons. It has since expanded over a wider geographical area. There has also been an improvement in the longevity of each balloon, as well as improved data transmission speeds. Besides, Project Loon, Google is also experimenting with solar-powered drones to deliver internet connectivity. Codenamed Titan, the drones are expected to complement Project Loon. Interestingly, Facebook is also trying something similar with the Aquila drones

Chrome OS lives, no merger with Android

Google has quashed reports about it merging Chrome OS into Android. While multiple reports said that the company is done with its Chrome OS, Android and Chrome OS SVP Hiroshi Lockheimer said on Twitter that Chromebooks have been gaining momentum, and the company remains very committed to Chrome OS. The Wall Street Journal had first reported that Google is going to merge Android and Chrome OS, since “the different computing approaches embodied by Android and Chrome are no longer relevant to Google”. The Wall Street Journal’s report was followed by two others from The Verge and Recode.

The Verge quoted a Google spokesperson, who said that Chrome OS wasn’t being killed by the company, and Lockheimer’s Twitter statement came after that. So, it seems Chromebooks will continue in the near future.

That said, the possibility of Chrome OS being merged with Android OS seemed even more possible since Google launched the Pixel C all-in-one tablet this year. The device aims at functioning both as a tablet and laptop, but didn’t run on Google’s desktop OS, instead opting for Android. The Pixel C was announced alongside the new Nexus phones and Chromecast devices.

In addition, rumours of a merger between the two operating systems have been persistent for quite a few years now, though Google has always maintained that it takes Chrome OS very seriously. The company had earlier added support for Android apps to run on Chrome OS, but the desktop operating system still doesn’t have enough apps.

Merging the two would allow Google to run just one OS, Android, which could then get added functionalities for the desktop platform. In addition, it would also allow Google to bring features similar to what Microsoft showcased recently. Currently, Google’s mobile OS and desktop OS are separate, which means that you can’t simply plug in your phone to a monitor and expect to use it like a desktop.

NASA's Hubble discovers 250 tiny galaxies!

A team of astronomers has discovered 250 tiny galaxies that existed 600 to 900 million years after the Big Bang. Observations by the NASA/ESA Hubble Space Telescope have taken advantage of gravitational lensing to reveal the largest sample of the faintest and earliest known galaxies in the Universe.

Some of these galaxies formed just 600 million years after the Big Bang and are fainter than any other galaxy yet uncovered by Hubble. The team has determined, for the first time, with some confidence that these small galaxies were vital to creating the Universe that we see today.

The international team, led by Hakim Atek of the Ecole Polytechnique Federale de Lausanne, Switzerland, has discovered one of the largest samples of dwarf galaxies yet to be discovered at these epochs. The light from these galaxies took over 12 billion years to reach the telescope, allowing the astronomers to look back in time when the universe was still very young.

Although impressive, the number of galaxies found at this early epoch is not the team's only remarkable breakthrough, as Johan Richard points out, "The faintest galaxies detected in these Hubble observations are fainter than any other yet uncovered in the deepest Hubble observations."

By looking at the light coming from the galaxies, the team discovered that the accumulated light emitted by these galaxies could have played a major role in one of the most mysterious periods of the Universe's early history -- the epoch of reionisation. Reionisation started when the thick fog of hydrogen gas that cloaked the early Universe began to clear. Ultraviolet light was now able to travel over larger distances without being blocked and the Universe became transparent to ultraviolet light.

Lead author Atek explained, "If we took into account only the contributions from bright and massive galaxies, we found that these were insufficient to reionise the Universe. We also needed to add in the contribution of a more abundant population of faint dwarf galaxies."

These results highlight the impressive possibilities of the Frontier Fields programme with more galaxies, at the even earlier time, likely to be revealed when Hubble peers at three more of these galaxy clusters in the near future.

Windows 10 upgrade to become "Recommended Update" in 2016

Microsoft launched Windows 10 earlier this year and with it offered Windows 7 and Windows 8 users the chance to upgrade for free. That was a very successful outreach to its existing fan base, netting more that 110 million devices switching to Windows 10 so far, but it looks like Microsoft is now shifting to a more aggressive stance.

Beginning early 2016, Microsoft says it's planning to roll out Windows 10 upgrades to devices as a "recommended update". While the current system just pops up a notification giving you the option to reserve an upgrade, which you then have to download and patch, the new system will have your Windows 10 update show up as notification in Windows System Update. Now, that may not sound like a big deal, but it is if you have Automatic Updates turned on. If you do, the Windows 10 update would download automatically and then pop a dialog box asking if you want to upgrade, which you can then opt out of.

Of course, you could just turn Automatic Updates off to avoid getting constantly tagged by notifications. And if you do upgrade (whether intentionally or by accident, as the case may be) you can always roll back to whatever version of Windows you were running before that within 31 days. Windows stores a full copy of your previous OS, complete with apps and settings, so you can revert changes if you're not a fan of Windows 10.

Microsoft will also be initiating a pilot in the US, where users running pirated versions of Windows 7 or Windows 8 will be offered a "one click" opportunity to upgrade to genuine Windows 10 from the official Windows store or by entering an activation code you've already bought. That's right, no free upgrade for pirates. The company says they'll expand the initiative to other countries if it gets positive results.

Facebook's Slideshow feature emulates video ads on your smartphone without taxing your bandwith

Facebook has been working overtime to reach more users in developing countries. Part of that has been to connect previously untapped markets to the internet for the first time using Free Basics, while the remainder of its efforts are geared towards adapting Facebook to be viable on slower internet connections in developing countries. But all those newly connected users should also be generating the company revenue.

Video ads are the best ads for online, but how do you get people to sit through video ads on data plans with slow load times? The answer to that is Slideshow. It's a new feature Facebook has introduced that creates a pseudo-ad for the social network on mobile platforms. It uses between three to seven still images that the advertiser has uploaded (with appropriate captions), and plays them in a slideshow format with transitions. This helps to seriously reduce the investment on the advertiser's part, seeing as they don't need to spend on a video shoot, and is also much cheaper and faster to load on mobile. The slideshows can be up  to 15 seconds long and, according to Facebook's tests, are about five times smaller in size than a video of the same length.

Brands are already adopting the feature; Coca-Cola ran a slideshow ad on Facebook for mobile in Kenya and Nigeria and reached a 2 million-strong audience. You can expect to start seeing slideshow ads in your Facebook app in the next couple of weeks.

Google, WhatsApp, Facebook accused of breaching user's privacy

Cyber security firm Avast has alleged that Google, WhatsApp and Facebook spy on their users to find out their interest for serving targeted advertisements but their users are well aware about this.

"Google is an advertising company. Google revenue is basically from AdWords. Spying on users, getting what they are interested in and serving them advertisement is what their business model is. There is nothing inherent wrong with it. Users know what's going on, I think," Avast CEO Vincent Steckler told reporters today.

He was talking on the sidelines of release of Avast findings on cyber security issues and unveiling of anti-theft mobile security software. Steckler also said that WhatsApp too breaches data privacy of users.

"Did you ask all of your friends and colleague to share their personal and private information with Facebook. That's another biggest user of privacy. WhatsApp is a data collector to serve you advertising inside Facebook. ... you get advertisement on Facebook based on conversation you had on WhatsApp," Steckler said.

When asked for comments, a Google spokesperson said, "As a policy, we cannot comment on this without looking at specific report."

The privacy policy page of Google says, "When you use our services, you trust us with your information. Data enables us to provide our services like Search, Gmail, and Maps. Data also helps us show relevant ads, so we can make our services free for everyone."

No comments were received from Facebook on the issue. Steckler said that users also breach privacy of their acquaintances by sharing contact details to use applications on mobile phones.

"In order to use WhatsApp, you have to share your entire contact database. Which means you provided all your friends and colleagues contact details to Facebook. Do you have right to do that?" Steckler said.

Avast CEO shared analysis done by company of top 100 applications on Android in the month of September.

As per the analysis, 99 per cent of these applications have entire control of mobile phone which means they remotely operate phone as a user does and 92 per cent can view network connections.

One out of 10 of top 100 applications can record audio and take pictures and videos and 9 out of 10 are able to read storage content which can modify or delete, as per the report.

Adware and porn clicker malware on Google Play has infected millions of users this year.

"One group of hackers managed to return more than 50 times into the store with the same strategy in just three months their apps posed as games, but did nothing but click on porn," Steckler said. 

Friday, October 30, 2015

Xbox One to Get Windows 10 Upgrade on November 12th

Microsoft today announced that the Xbox One will get the Windows 10 upgrade on November 12th. There are currently users who are testing out the new features via the Preview program, and it’s all coming together next month.


The announcement was made by Microsoft on Twitter this evening:

Windows 10 Coming to Xbox One

If you’re currently using Xbox One, you’re probably not too happy with the lag time when switching between apps or settings using the dashboard. This new upgrade promises to provide faster performance, an improved gaming experience, vertical scrolling instead of horizontal (which takes longer to get to items), and expanded social features.

Also, in what is arguably the biggest update: you’ll be able to play Xbox 360 games! This will be accomplished using the Hyper-V virtualization technology that’s built into Windows 10.

At first, the number of 360 games will be limited at first, though. Microsoft says: “Now you can play a growing number of your Xbox 360 games on Xbox One at no additional cost. With over 100 titles slated for this fall, and hundreds more in the months to come…”

Something else that’s interesting is that all 360 games you get for free with the Games with Gold subscription will be compatible, too.

Other improvements will be a new guide for notifications, friends, and messages, and optimized store, and much more.

Microsoft is taking another step in the right direction and getting Windows 10 on virtually every device including PCs, tablets, Xbox One, Windows Phone, tablets, and Internet of Things (IoT) devices.

For a quick look at what the new Xbox One experience will be like, check out the video below.



For a full look at all of the new features coming to Xbox One with Windows 10, check out this Xbox.com site.

Get Started with a Free Month of YouTube Red

Google launched its new YouTube Red service (U.S. only) this week, and it offers a free 30-day trial. Here’s a look at how to get started with it and how to cancel the subscription to make sure you don’t get charged after the trial is over.

What is YouTube Red?

YouTube Red is a subscription service ($9.99/month) that offers access to all videos ad-free. It comes with other perks as well.

It lets you download videos for offline viewing or listening. A lot of people listen to their music via YouTube. The offline viewing and listening supports background play so you can keep the music going while using other apps or while on the go.

To download, tap the down arrow icon on the screen and then choose the quality you want to download it at.


Starting in 2016, YouTube Red subscribers will also have access to original content including TV series and movies. For more on what’s on tap for next year and the companies producing the shows, read Introducing YouTube Red Original Series and Movies from your favorite stars on the official YouTube blog.

Another benefit is a free monthly subscription to Google Play Music, which also costs $9.99/month. It’s also worth noting that if you’re already a subscriber to Play Music, you have access to YouTube Red for no additional charge.

In addition to iOS and Android, YouTube Red also works with Chromecast, Android TV, Apple TV, Xbox, PlayStation, Roku, and select Smart TVs. One glaring omission, at the time of this writing, it’s not available on Amazon Fire TV.

Free Month of YouTube Red

First, sign up for YouTube Red here. Then I recommend you cancel your membership at the same time you sign up…wait, what? You can cancel at any time before the trial period is over and still access all the benefits of YouTube Red for the month.

Cancelling right away lets you use the service for the full month, and not have to worry about your credit card being charged after the trial period if you don’t want it anymore.

According to YouTube Red terms:

“Cancellations: You can cancel your YouTube Red membership at any time. If you cancel, you’ll still have access to YouTube Red benefits until the end of your billing period.”

After signing up, head to the YouTube Red Cancellation page and select Cancel membership. Then click Yes, cancel to the verification message that comes up.

Next you’ll get verification that your membership is cancelled. But do note that it says you’ll have the YouTube Red benefits available until the end of the billing period.

If you listen to your music via YouTube or spend a lot of hours on it watching videos, this is something you should check out. Even if you don’t spend a whole lot of time on YouTube, it’s still worth checking out if nothing else, for an ad-free viewing experience for 30 days.





After signing up for YouTube Red, nothing on your customized YouTube page will change. You’ll still have all of your favorites, playlists, and subscriptions.

I’ve been testing it out a bit since it launched yesterday, but to me there’s not much to see here other than the benefit of no ads. One thing that seems strange is that it lets you play music via the app on you phone. The music will continue to play while your screen is locked, which current music subscriptions like Spotify already do. And, why would you use YouTube Red to listen to music from videos, when you get Google Play Music that is a more powerful music service?

There’s also problems with content creators who make a ton of money from their videos from ads, have to move to YouTube Red. Otherwise, their content will be removed. And they no longer will get that profit? If content creators don’t agree to the YouTube Red agreement, their content will be withdrawn from regular YouTube. In fact, ESPN has already had content pulled due to rights issues surrounding its content and the deal.

Coming to a satisfactory agreement with content creators will inevitably be a deciding factor in whether this new service is a success or not.

Thursday, October 29, 2015

Make your computer untraceable – Hacker’s Guide to Anti-Forensics

Removing or Hiding traces is most important thing that every hacker should know otherwise you will be busted in less than 5 minutes. In our previous article we have learned about how to remove traces over Network. Today we will learn how to make your computer almost untraceable, so that you cannot be tracked or monitored by anyone. This will not only help you in hiding your identity during hacking attempts but also make you anonymous over the network. Hiding or removing traces sometimes also referred as Anti-forensics.

Let’s get started… How to make your computer untraceable i.e. Leaving no traces behind any hack attempt. Hackingloops presents you complete Anti-Forensics hacker’s step by step guide to hide traces or logs.

Anti-Forensics Guide for Hacker’s :

1. Encrypt Your Keystrokes

You need to protect yourself from keyloggers/Rats. As strange as it may sound even the government/ security agencies/ windows/Hackers all has keyloggers, which records the users IP address, Mac address, open ports, operating system, installed applications, default web browser, visited URLs, logged in user, etc…

In order to protect yourself from keyloggers, you should encrypt your keystrokes. You can do this using a software called ‘Keyscrambler’.

2. Making Encryption Secure

Encryption is pointless if it can be easily bypassed or overcome. You need to make sure that the encryption is secure too.

Step 1 – Make Sure Your Password Is Strong

Even with your computer encrypted, it is still vulnerable. Make sure your password is good (for optimal security, your password should be twenty or more characters, with symbols, numbers, and random capitals, and a special symbol (like ALT+1456) really increase security). Norton password generator is great for this.

Step 2 – Create A Locked Screen Saver

Encryption is pointless if the Forensic Team get to your computer while its running. They can use live forensic tools that don’t require the movement or shutdown of a computer.
A very simple technique to overcome this is to create a locked screen saver. To create a locked screen saver in Windows Vista or Windows 7; Right click your desktop and click on ‘Personalize’. In the bottom left or right hand corner you should see ‘Screen Saver’, click that. Now, check ‘On Resume, Display Logon Screen’, and set ‘Wait’ to 5. Now, underneath that you may set what you want your screen saver to be.

Now you must go to your Control Panel. Click on System and Security now click on ‘Power Options’ find your selected plan and click ‘Change plan settings.’ Now, set ‘Turn Off Display’ to 5 minutes. That’s it! You have now created a locked screen saver.

Step 3 – Get Some Good Antivirus

This may seem obvious, but all this is pointless if you get infected with a keylogger that takes screen shots. Having a good anti-virus is one of the most important things you can do. Now, listen up. AVG, Avast, McCafe, Norton? They all SUCK. The only Anti-Virus you should even consider are BitDefender, ESET, Nod32 and Kaspersky is also pretty good. Advance System Care Ultimate is Good To it uses BitDefender Anti virus engine but is also a utility tool i.e Registry fix/defrag disk defrag privacy sweep security fix etc.

You rarely even need anti-virus software when using Linux, as most viruses are built to infect Windows systems, given these make up the majority of computers, but it’s best to be safe.

3. Disabling Windows Hibernation

You may as well hand your computer over to the feds if they raid your house and your computer is in hibernation. Also, putting your computer into hibernation is pretty much just taking a screen shot of your RAM that gets saved to your hard drive.

To disable hibernation in Windows Vista/7/10:
a. Open your Control Panel.

b. Click System and Security, then click ‘Power Options’.

c. Click ‘Change plan settings’ for you current power plan.

d. Now click ‘Change advanced power settings’. Expand ‘Sleep’, then expand ‘Hibernate After’. Enter “0″ for ‘Setting:’ to set hibernate to ‘Never’. Hibernation is now disabled.

4. Disable and Remove USB Logs

Next on the list of Anti-Forensics in to disable logs of USB activity, flash drives, etc…
This can be valuable if you have a flash drive with sensitive data and you don’t want any logs of it ever being plugged it to your computer.

Step 1 – Delete the USBSTOR Registry Setting

The USBSTOR setting contains history of plugged in USB devices.
To delete it, hit the WINDOWS Home Button + R at the same time. This will open up ‘Run’; type: “Regedit” (without quotes). Browse to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USBSTOR
Now, right click ‘USBSTOR’ and hit ‘Delete’, then confirm that you want to delete the key. Now, the key has been deleted.

Step 2 – Delete The Setupapi.log File

The Setuppapi.log is a plain-text file that stores the list of installed USB devices and their drivers. We will delete it with a program called CCleaner.
CCleaner is actually one of the best anti-forensic tools out there, and its free.

5. Disabling Time Stamps

Using Time Stamps, forensic experts can build a ‘digital time-line’, this can be very compelling evidence when cross-referenced with other known evidence. In order to strengthen security, we must disable these logs.

Step 1- User Assist File

There is a registry setting that keeps logs and dates of all launch programs, forensic experts can use this to build a digital timeline, we must disable this for computer security. Navigate to HKEY_Current_User\Software\Microsoft\Windows\Currentversion\Explorer\User assist. Do this by hitting the Windows button on your keyboard and R at the same time and typing regedit in). You should see two subkeys called Count, delete both these keys. Now right-click the UserAssist key and create a new key named ‘Settings’. In this key (right clicking on it) create DWORD value named NoLog, set the value to 1.

Windows will no longer store hidden logs of the exact times you have been accesing files, therefore forensics experts can no longer use these hidden logs to create a digital timeline.

Step 2 – Last Access Logs


Next we will disable the last access in Windows. What last access is is a setting on Windows that allows you to see when you opened, modified, and/or created files on your computer and is similar to the UserAssist registry key. By disabling this forensic
experts won’t as easily be able to tell when you’ve been accessing programs or files on your computer.

To disable last access open command prompt on your computer, if on Vista or Windows 7 make sure to run as administrator. In command prompt type the following:
fsutil behavior set disablelastaccess 1

Last access has now been disabled, in order for it to take effect you must restart your computer. (You have to have admin rights to do this).

6. Windows Security Miscellaneous

This is for the shit that has to do with windows anti-forensic security, but wasn’t big enough to have its own section. That does NOT mean this section isn’t important, the stuff in here may actually be the most important in the whole guide.

Step 1 – Disable System Restore Points

System Restore points can be used to bring your computer back to a date when it wasn’t secure and can also be used to restore overwritten files.
To disable System Restore points, right click ‘Computer’ and click ‘Properties’. Now click ‘Advanced System Settings’. Under ‘System Protection’ click ‘Configure’.
Now, select ‘Turn Of System Protection’ and apply it.

Step 2 – Disable ‘Send Error Report to Microsoft

This is self-explanatory, we obviously don’t want Microsoft having logs of all our crashed programs. To do this, go to your start menu and search ‘problem reporting settings’ and then click on ‘Choose How To Report Problems’. Click ‘Change Report Settings For All
Users’ and then set it to ‘Never check for solutions’.

Step 3 – Wipe With CCleaner

This is the heart of Anti-Forensics right here. CCleaner is actually one of the most powerful Anti-Forensic tools, -IF- used correctly.
As it turns out, when deleting files, you DO NOT need to do multiple overwrites. With modern hard-drives, one overwrite really is enough to delete a file beyond repair, even though it is popular belief that you need several overwrites to be secure.
With CCleaner, I would recommend three overwrites, just in-case it misses something the first time around (remember, it is a free software).

Once you have CCleaner installed, run it (AS ADMIN), go to ‘Settings’ and make sure you have it set to overwrite deleted data with three passes. Go back to ‘Cleaner’ and check EVERYTHING. I mean EVERYTHING, and hit ‘Run Cleaner’. You might want to leave this on overnight.

Do this every time you are done with a major hacking job. When using normally (what should be every time you are done with your computer), uncheck ‘Wipe Free Space’, this will cut down the time from hours to a few minutes.

Step 4 – Disable Debugging Upon Failure

This keeps logs of your computers failures and blue screen info.
To disable it, right click ‘Computer’ and go to ‘Advanced System Settings’, now go to ‘Start Up and Recovery’. Now, set ‘Debugging Information’ to ‘None’.

Step 5 – Disable Windows Event Logging

Windows keeps logs of all events on the computer. First, before we disable, we must clear all the logs.
To disable it, go to Control Panel then System and Security. Now, click Administrative Tools, and then Event Viewer. In either pane of the Event Viewer window, right-click System and then select Clear All Events, you will get a window that says: “Do you want to save ‘System’ before clearing it?”, click ‘No’.

Now we must disable Windows Event Logging. Go to ‘Run’ and type in ‘msconfig’, then go to ‘Services’ and make sure ‘Hide all Microsoft Services’ is UNCHECKED. Now scroll down until you find ‘Windows Event Logging’, and UNCHECK it.

Now restart your computer right away.

7. Online Anonymity Guide

Hiding online identity and anonymity is essential; because it prevents you from getting traced or tracked down.

Proxies : Proxies are used mainly for security purposes and IP Address, it may be also used to speed up the loading of resources by caching, bypass parental controls and open blocked sites.

Web Proxies : Web Proxies are services that provides proxy access using a website, the function is, when you request a webpage, the server will contact the website indirectly and will server the resource to your web browser.

VPNs : VPNs are similar to proxies, it hides your IP address but the advantage is, it encrypts your traffic so that it would not be intercepted by data sniffing tools, it is useful for public wifi hotspots and for home/office use.

User-Agent Switcher : Spoofs and mimics a user-agent to hide the browsers’ identification.

IPFuck/IPFlood : Used for hiding IP address by using multiple proxies simultaneously, which obfuscates the user’s IP address.

8. Anonymity Tips

a. Do not post private information in the web, including your address, birth date and contact info, including on your registration details, if the authorities found one, they will use it to track you.
b. Do not engage private activities while on public places, other people might see you.
c. Always use anonymity tools so your IP address is masked, if in case they found it out, the IP is fake.
d. Do not brag or talk about hacking, obviously, if you brag/talk about it with your friends, they might report you to the police.
e. Hide your files in an encrypted container, encrypting data on the USB is better.
f. Always use SSL when its available; it encrypts your details so that it would be safe.
g. Use SSH (Secure Shell) when connecting to a remote system, one good example is PuTTy.
h. Never trust anyone; and rely on your instincts.
i. Try “proxy chaining”, or using of multiple proxies.
j. Use a VPN together with a high-anonymity proxy so that there would be an increased privacy advantage.



That’s all friends!! This is must for all Hackers. Keep Learning !! Keep Connected!!

How Hackers Target You

Hackers are all around us !  We are paranoid when it comes to our cyber security , Online account Passwords etc !!! In any hack , Human element is the weakest link . Social engineering is a technique where the hacker might trick the victim of the attack to make the attack successful either by downloading/running a malware file or clicking on a link or what so ever the hack requires .

In this post we see how hackers obtain valuable information about you . Obtaining this information is not very difficult for the hackers. They can do this by a simple google search or by visiting your social network profile . Here is how you are helping the hackers :

How Hackers Obtain Information About You

Facebook Profiles

As the largest social network, Facebook profile is the first thing you need to secure. Go, check it out from the outside. Log out of your Facebook then look your account up, from an outsider’s point of view.

If your Facebook profile shows too much information, you will likely victimize yourself.

Account Recovery Hack on Facebook

Let’s do an experiment. Pretend you forgot your password, then go into Facebook. Facebook may ask you for your email address, your user name or your mobile number. You can provide that How Hackers Target Youinformation, and it will send you an email with instructions to reset your password.

Previously, there was a method employed by Facebook to reset the password, and that method had your trusted friends involved for the purpose. It sounds foolproof unless you accept a lot of friend requests on Facebook. Picture this: You get a friend request from a few people that you don’t know. If you are the friendly type, you’d probably accept those four requests.

One thing you don’t know is that those accounts may be operated by one or more hackers. What they will do is simply raise a password reset request on your account, and select three of those four accounts as your “trusted friends”. Facebook emails security codes to those trusted accounts, and boom, the hacker takes over your Facebook account. If you have problems with that, then you should take a look at this post of mine to figure out what to do.

Fortunately, Facebook no longer uses this particular method. It also doesn’t rely on security questions any more. Right now, in order to gather access to a Facebook account, the only way is by securing access to the original email address.

Hence, a hacker needs access to your email account to get into your Facebook account.

Email Security

Which email service are you using? Depending on that, the security differs. If it is Gmail, I would extremely recommend that you start using the two-factor authentication.

Here are the steps:

1. Go to your Google Account settings (not Gmail settings) and go to theSecurity option.

2. You will see 2-Step verification option. Turn the status ON

3. Add your phone number. Select to receive the codes by text messages or voice call.

4. Enter the code received to verify your account. Make sure you update the records if you change your phone number.

Another important thing on Gmail is notifications about suspicious login attempts. You can opt for email as well as phone notifications if any suspicious login is detected on your Gmail account.

The Truth About Security Questions

Google has a security question that you need to set. Make sure it is set properly. While I was working with email security for AT&T, I have encountered elderly customers answering security questions very truthfully. Even though I took time in explaining to them what a security question is and why they needn’t submit the true answer all the time, most of them did not quite understand it.

Most people don’t realize the fact that a security question answer works exactly like a password, only less secure depending on how you through your information about. Talking about your pet Rover on Facebook a lot then setting it it as your Security question maybe risking it a little. Anybody can access your account, whether or not they know the password, just by making educated guess about your preferences, which would work if you are truthful with your security questions.

Customer Service

If you are using the customer service option to reset your password for your email, the customer service executive may ask you your security question. Within AT&T, we used to use security questions to verify customers, questions like “Who is your favorite hero?”, and answers like “Batman”.

Not only that, we were authorized to provide the first letter of the answer if the customer gets it wrong the first time. A hacker can easily fake it since the random operator cannot identify the voice of the caller, and is supposed to divulge a password if the caller gives the correct answer.

Best Top 5 network scanner hack tools for Hackers

Hello friends, today i will share with you world best  top 5 Network scanning hack tools for windows platform. This article is not only for hackers, it also important for Network administrators. So friends lets explore the world top 5 Network scanning Hack tools selected by Hackingloops. We have rated these on the basis of their features and their performance.


1. NMAP

NMAP is best network scanner till that date, when we take features as our concern, then NMap has left other scanners miles behind. NMap stands for Network mapper and its a free open source hack tool for network scanning and network security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are avalable for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping).
Download NMAP Hack Tool

2. MiTeC Network Scanner

MiTeC is rated as second best network scanner for windows platform and it can be used as its alternative. This network scanner if for both system administrators and ethical hackers who are interested in computer security. It performs ping sweep, scans for opened TCP and UDP ports, resource shares and services.
In addition you have to edit results, save/load results to/from CSV and print network device list. It can also resolve host names and auto-detect your local IP range.

Download MiTeC Network Scanner Hack Tool 



3. SoftPerfect Network Scanner

Hacking loops has rated Softperfect network scanner as third best network scanner by taking its performance and features into account. The interface is very clean and user friendly, but it hides so many great things that it will take minutes until you find them all. The scanning process is pretty intuitive, so the only thing you need to do is to input the range of IPs you wish to scan. Afterwards, you’re able not only to open computers, but also to send messages, initiate a remote showdown operation, send wake-on-LAN signal or start a DHCP or UPnP Device Discovery. SoftPerfect Network Scanner does a great thing when it comes to handling computer resources, so the machine won’t be slowed down even when doing long scans.
Download SoftPerfect Network Scanner Hack Tool

4.  Network DeepScan

 Network DeepScan is a useful and powerful utility that will search for shared NetBios (including system and hidden) and FTP resources over local area networks. This network tool can scan over multiple IP subnets, filter found resources by various criteria, sort it by Host Name, IP Address or Workgroup. You can search for any kinds of files in found resources. Also there is a special feature in this network tool – LAN Explorer. It allows you to browse found shared resources directly in program and not open many instances of Windows Explorer. All important aspects of program configuration are combined under a modern graphical user interface. Find out how easy and effective network browsing can be with the Network DeepScan.

Download Network DeepScan


5. Network scanner

Network scanner is an IP scanner for network analysis that will allow you to see all network computers in several seconds. It can scan an unlimited number of IP address ranges or computers from a list. It scans computers not only for NetBIOS resources, but also for running FTP and web services. It is possible to check access right to resources during the scan process. Network scanner works really fast due to multi-thread scanning when every computer is scanned independently. You can change the number of computers scanned simultaneously. Network scanner will help you  export the scan results to html, txt or xml files.
Download Network Scanner

How to Use an Android device as Second Monitor for your PC or MAC

How to Use an Android device as Second Monitor for your PC or MAC!! 💠 The method is quite simple and easy and you just need to follow...