Popular Posts
-
9Mobile cheat code has been blazing since but the problem is that is capped with 60mb. This limits people browsing and download daily becaus...
-
Airtel Cheat, Airtel Latest Unlimited Freebrowsing Cheat With Amaze Vpn This latest Airtel cheat is unlimited and works with several VPN ap...
-
9MOBILE Latest anonytun cheat capped @ 500mb -700mb This alternative is available for 9mobile at the moment via with 9mobile chat pack....
-
How to Hide Secret Files in Google Drive Now you can Hide Secret Files in Google Drive using the inbuilt cool feature of the drive that will...
-
As we keep waiting for positive results of glo or new Free browsing cheat, i am here to introduce to New all on how to get free N200 airti...
Saturday, 22 July 2017
Unlimited Free Browsing On 9Mobile And Glo By Using Anonytun VPN.
How to unlock Modems
How to unlock modem?
Unlocking a modem is necessary process if you want to solve the problem of it working only with one mobile service. If you use a mobile Internet with a 3G/4G modem purchased from an operator, sooner or later you will have to face a situation where, for personal reasons, you want to change it. For example, you might have found a more favourable tariff. Or maybe you want to travel to a town where only one specific network is stronger. Let us show you how to unlock modem.
Normally, if you buy a modem from one provider and input a sim from another, the modem will not work. To fix the situation, you must unlock the modem: obviously unlocking it from being bound to a particular cellular operator. There are a number approaches to help you open your modem: some are free and some are not (you need to purchase credits to open it). Branded modems and routers like MTN, Verizon, Airtel modems and Swift, Spectranet and others are commonly used in Nigeria
How to unlock MiFi modem
MiFi (Mai Fai) is a mobile access point that provides the user with Internet access via a WiFi network, in other words, a portable or a mobile router. The device receives the signal from the operator’s network according to the principle of the 3G modem operation and then transmits it via the WiFi connection. To connect to the router you need to find the name of the network and connect to it. The information that has the name and password to the network is usually on the back panel of the router. When MiFi router is connected to a PC, working through the WiFi network is not possible, and the device operates in the usual USB modem mode. Read below the step-by-step instruction for unlocking MiFi modem.
Download and run Huawei unlock client;
Install default settings and agree to continue;
You can find your IMEI number underneath the battery on your device;
Enter your IMEI number carefully and tap unlock;
The process of fetching unlock data will begin. Unlock process can take from 2 to 5 minutes;
After a successful operation, you will have an unlock code that you have to copy;
Insert a different SIM provider and enter this code into your device.
How to unlock Spectranet modem
Spectranet is a company that provides modem use in Nigeria. It actually does not give you any option to unlock the router. The software itself has been customized to a specific modelDespite this fact, people have discovered a way to redesign the software and what to do to open the gadget. Before starting the upgrade, download the necessary files from the list. These are the general software, hilink drivers and firmware code (you can get this from the Universal Master Code tool).
Next steps to unlock the modem in 9 easy steps:
Input the SIM with another system supplier and interface your Spectranet MiFi WiFi router to your computer or laptop through its default USB cable. By the way, ensure that you have at least 50 percent of battery available for use;
Download Huawei_E5573s-606_Firmware_21.110.99.03.00_general.zip and run P711S-E5 update_21.110.99.03.00.exe. Then, use the firmware code as password. Hold on till the process is completed (the gadget will again start installing drivers);
In case that it is not identified by the PC due to the drivers’ issue, you can refresh them through COM port;
DC unlocker must be downloaded as well. Afterward, identify the gadget under the DC unlocker;
Then type “AT^NVRDEX=50503,0,128” and press “Enter”;
The NV codes will appear in hash format. Copy them into a notepad file. The given code will be converted into the unlock password. While doing this, extract Huawei_E5573s-320_Firmware_21.180.17.00.00_general.7z file in a folder;
Wait till firmware installs onto the device (just click on the firmware setup file again and start installing process). The drivers will be installed automatically.
Put the following order of numbers: 192.168.8.1 (default IP of the router is changed) in web-browser line;
Login to the router account (admin as login and password). Your device will have 10 attempts left. To unlock the router, there is only one easy step left – enter the right password carefully, checking the symbols (otherwise, it will not work).
How to unlock Glo modem
Glo NetPro Modem can be unlocked and made into a universal modem in order to have the capacity to browse with other networks. The main issue with this modem is that it works with Glo SIM only. If you attempt to use another SIM, the modem will give you an option to provide an open code. To open this modem, you have to know the open code. This instructional exercise will direct you on how to get the open code to effectively unlock Glo modem.
Ways to unlock GLO NETPRO modem
Use Universal Master Code at first or make sure you can download it if you don’t have it already;
On the first screen that you will see, you should choose “Huawei” option;
Get the Modem IMEI Number and input it. The IMEI Number can be found on the back of your modem. Afterwards, click on “Calculate”;
After you have gotten the open code for the modem, duplicate it. Input another SIM and connect it to your PC or laptop. You will be invited to put in the open code again. Input the open code, and now your modem is unlocked;
You should design it to work impeccably with the inputed SIM card while unlocking your modem;
For Glo Modem, Tap on “Tools” first. Then in a tab “Options”, you should choose “Profile Management” and go to “New”.
The motivation behind the instructional exercise is to teach you how to get new IT abilities. If all you want to do is simply to unlock your modem and fixing all the technical problems that appear every day, then we’ve got you. With our instructions, you can try to unlock the modems without needing to make any payment.
Good luck with the unlocking process!
Xiaomi Launches Automatic Foldable Umbrella
Mecofinder, app to find mechanics, technicians unveiled in Lagos
Mecofinder, app to find mechanics, technicians unveiled in Lagos
A new mobile application, Mecofinder, designed to create ease of locating competent auto mechanics within Lagos metropolis has been launched.
The app which was recently unveiled in Lagos, according to its developer, is meant to provide maximum convenience and comfort for every user.
Speaking at the unveiling ceremony, the app designer, Adekeye Damilare, said the Mecofinder’s main essence is to connect servicemen and technicians to motorists who may need their services anywhere in the country.
Adekeye, introduced the Mecofinder as the latest technological medium, which uses GPS and recovers signals from the satellite.
He described the satellite process as such that coordinates in a latitudinal and longitudinal way, to connect vehicle owners to either mechanics, vulcanizes, spray painters, panel beaters, electricians, battery charger and others.
“We advise users to go to Mecofinder, download and launch the app. A user can decide to select from the 14 categories that we have. When you pick any option, it automatically locates the location of that user.
“It fetches all available technicians within that vicinity. The location-based device also identifies the profile of each technician, category and the distance of the technicians one may need from the location where the vehicle owner may be,” Adeyeye said.
The app manufacturers said the technicians who have been verified on the platform would be insured which will make them stand the chance of enjoying insurance covers for their professional indemnity, that is professional negligence and compensations in cases of workplace accidents.
Also speaking, a director of the business concept and Mecofinder manufacturer, OluOmoyemi, said they came up with the app as a way of easing the inconveniences motorists face on the roads.
Besides, OluOmoyemi said the app also “enables vehicle owners to have access to competent and confirmed servicemen within their immediate location.
“We are starting with Lagos and we are going to other states. We are hoping Nigerians will stop those who are going to give the association a bad name,” Omoyemi said.
Also contributing, Adekeye Kehinde in charge of Mecofinder subscriptions corroborating his colleagues’ positions in the app giving comfort to its users, said they have already made system of payment for Mecofinder easy and convenient.
“We have made payment system convenient. Payment for it by operators is strictly on verification and registration We are not money conscious but are more interested about professionalism and the satisfaction of our clients first.
“We are giving it at a token of N1, 000 for six months. The payment can be made directly from their bank accounts,” Adekeye said.
Yomi Osuntokun, technical partner to the app manufacturers, also confirmed the viability of the application, adding that users will find Mecofinder very useful.
The project is also supported by the state chairman of the Nigerian Automobile Technicians Association (NATA), Julius Lawal, who commended the Mecofinder initiative, with the assurance that the association is ready to cooperate with the initiators.
Also, Tunji Ogunkoye, Federal Road Safety Corps (FRSC) Unit Commander of Surulere, Lagos State, lauded the Mecofinder initiative.
He said it would help the FRSC in their campaign of clearing road obstacles across the country, emphasising that “since the issue of vehicle breakdown would be tackled, that would help the corps in ensuring that there are no obstacles on the road and ultimately make the road safe for all.
He said “what will make the app work effectively, is only when the issue of competence is not compromised,” while also advising that “the app owners should ensure that all servicemen involved are well and properly verified and scrutinised.
Ogunkoye also called on the Mecofinder initiators to involve organisations such as FRSC, Standard Organisation of Nigeria (SON) and Ministry of Transportation, as it will help make their verified servicemen credible and widely accepted.
Friday, 21 July 2017
Samsung, Google, Intel and more formally support Apple in legal dispute with Qualcomm
Apple today has received support from a handful of tech companies in its ongoing legal dispute with Qualcomm. As reported by Reuters, the Computer & Communications Industry Association, which consists of tech companies such as Samsung, Intel, Google, Amazon, and more, today filed comments with the U.S. International Trade Commission arguing that an import ban on iPhones would hurt consumers…
The group argued against the ITC blocking Apple from importing iPhones with Intel modem chips, as Qualcomm has requested. Such a move would cause “significant shocks” to the supply for smartphones, thus hurting consumers and raising prices.
They argued that barring Apple from importing foreign-assembled iPhones that use Intel Corp chips – as Qualcomm has requested – would cause “significant shocks to supply” for phones and would hurt consumers.
“If the ITC were to grant this exclusion order, it would help Qualcomm use its monopoly power for further leverage against Apple and allow them to drive up prices on consumer devices,” Ed Black, the CEO of the group, said in a statement.
“What’s at stake here is certainly the availability of iPhones and other smartphones at better prices.”
Members of the CCIA include Google, Samsung, Intel, Facebook, Uber, Microsoft, Amazon, Netflix, and more. Apple is not a member of the group.
Earlier this month, Qualcomm officially filed a patent infringement suit against Apple. The company is asking United States regulators to investigate which iPhone models use Intel modems and halt sales of those devices, alleging they use technology that violates Qualcomm patents.
The battle between the two companies began earlier this year year when the Federal Trade Commission accused Qualcomm of forcing Apple to use its baseband chips at higher patent royalties. Apple then filed a $1 billion lawsuit against Qualcomm, and Qualcomm counter sued .
Tim Cook first said he was open to settling battle outside of court and Qualcomm’s CEO has
recently expressed similar sentiments , though the case continues to escalate and expand to Apple suppliers .
With the weight of other tech giants now on its side, Apple seemingly has the upper-hand against Qualcomm. It remains to be seen, however, how this case will play out. And it could be a while.
Hacking terminologies
Hacking Terminologies
The following is a list of important terms used in the field of hacking.
Adware − Adware is software designed to force pre-chosen ads to display on your system.
Attack − An attack is an action that is done on a system to get its access and extract sensitive data.
Back door − A back door, or trap door, is a hidden entry to a computing device or software that bypasses security measures, such as logins and password protections.
Bot − A bot is a program that automates an action so that it can be done repeatedly at a much higher rate for a more sustained period than a human operator could do it. For example, sending HTTP, FTP or Telnet at a higher rate or calling script to create objects at a higher rate.
Botnet − A bontnet, also known as zombie army, is a group of computers controlled without their owners’ knowledge. Botnets are used to send spam or make denial of service attacks.
Brute force attack − A brute force attack is an automated and the simplest kind of method to gain access to a system or website. It tries different combination of usernames and passwords, over and over again, until it gets in.
Buffer Overflow − Buffer Overflow is a flaw that occurs when more data is written to a block of memory, or buffer, than the buffer is allocated to hold.
Clone phishing − Clone phishing is the modification of an existing, legitimate email with a false link to trick the recipient into providing personal information.
Cracker − A cracker is one who modifies the software to access the features which are considered undesirable by the person cracking the software, especially copy protection features.
Denial of service attack (DoS) − A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet.
DDoS − Distributed denial of service attack.
Exploit Kit − An exploit kit is software system designed to run on web servers, with the purpose of identifying software vulnerabilities in client machines communicating with it and exploiting discovered vulnerabilities to upload and execute malicious code on the client.
Exploit − Exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to compromise the security of a computer or network system.
Firewall − A firewall is a filter designed to keep unwanted intruders outside a computer system or network while allowing safe communication between systems and users on the inside of the firewall.
Keystroke logging − Keystroke logging is the process of tracking the keys which are pressed on a computer (and which touchscreen points are used). It is simply the map of a computer/human interface. It is used by gray and black hat hackers to record login IDs and passwords. Keyloggers are usually secreted onto a device using a Trojan delivered by a phishing email.
Logic bomb − A virus secreted into a system that triggers a malicious action when certain conditions are met. The most common version is the time bomb.
Malware − Malware is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs.
Master Program − A master program is the program a black hat hacker uses to remotely transmit commands to infected zombie drones, normally to carry out Denial of Service attacks or spam attacks.
Phishing − Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking emails, in an attempt to gather personal and financial information from recipients.
Phreaker − Phreakers are considered the original computer hackers and they are those who break into the telephone network illegally, typically to make free longdistance phone calls or to tap phone lines.
Rootkit − Rootkit is a stealthy type of software, typically malicious, designed to hide the existence of certain process
This is for educational purpose only, we won't be held for any misuse of this information
Top 10 Android hacking tools
Top 10 Android Apps That Turn Your Phone into a Hacking Device.
1.SpoofApp
SpoofApp is a Caller ID Spoofing, Voice Changing and Call Recording mobile app for your iPhone, BlackBerry and Android phone. It’s a decent mobile app to help protect your privacy on the phone. However, it has been banned from the Play Store for allegedly being in conflict with The Truth in Caller ID Act of 2009.
2.Andosid
The DOS tool for Android Phones allows security professionals to simulate a DOS attack (an http post flood attack to be exact) and of course a dDOS on a web server, from mobile phones.
3.Faceniff
Allows you to sniff and intercept web session profiles over the WiFi that your mobile is connected to. It is possible to hijack sessions only when WiFi is not using EAP, but it should work over any private networks.
4.Nmap
Nmap (Network Mapper) is a security scanner originally written by Gordon Lyon used to discover hosts and services on a computer network, thus creating a “map” of the network. To accomplish its goal, Nmap sends specially crafted packets to the target host and then analyses the responses.
5.Anti-Android Network Toolkit
zANTI is a comprehensive network diagnostics toolkit that enables complex audits and penetration tests at the push of a button. It provides cloud-based reporting that walks you through simple guidelines to ensure network safety.
6.SSHDroid
SSHDroid is a SSH server implementation for Android. This application will let you connect to your device from a PC and execute commands (like “terminal” and “adb shell”) or edit files (through SFTP, WinSCP, Cyberduck, etc).
7.WiFi Analyser
Turns your android phone into a Wi-Fi analyser. Shows the Wi-Fi channels around you. Helps you to find a less crowded channel for your wireless router.
8. Network Discovery
Discover hosts and scan their ports in your Wifi network. A great tool for testing your network security.
9.ConnectBot
ConnectBot is a powerful open-source Secure Shell (SSH) client. It can manage simultaneous SSH sessions, create secure tunnels, and copy/paste between other applications. This client allows you to connect to Secure Shell servers that typically run on UNIX-based servers.
10.dSploit
Android network analysis and penetration suite offering the most complete and advanced professional toolkit to perform network security assesments on a mobile device.
You can add yours in the comment section below ⬇
This is for educational use only, we won't be held responsible for any misuse of this information