F

Friday 11 December 2015

How A Website Gets DNS Poisoned/DNS Hijacked

So you may be thinking however websites get DNS Poisoned or in alternative words, DNS Hijacked !

Recently, several Google’s had been damaged. like Google country, Google Malaya, Google Asian nation, Google Palestine, Google Serbia and Google African country. whereas many folks still doesn't perceive however hackers managed to deface such massive sites. during this article, i'll teach you guys however it works and the way hackers manage to DNS Poison a target.



Exploitation


1st of all, the hacker try’s to search out the Domain written account. Main written account will be found by victimisation Google or Wikipedia. (Example: If the hacker sets Google.com.au a target, he would move to Google and search”Official Domain written account Of Australia” or would move to Wikipedia and search “.au”. )




Once the hacker finds the most domain written account, he then starts to pentest the net application to search out vulnerability’s wherever users login. once the hacker finds a vulnerability (Example:SQL Injection) , he then try’s to access the server or the information victimisation that vulnerability. Once he gets access to the information, he's then ready to see all users login details (Usernames/Passwords/Email/ secret Reset Key). The hacker then try’s to access to its targets account victimisation the data provided from the information.


Domain Names Servers



When the hacker gains access to its targets domain instrument panel victimisation the user login details, he then has management of all domain names coupled thereto account. The hacker will then amendment its targets name servers and get in touch with details. If the hacker desires its target to be DNS hijacked, he straightforward changes all passwords and login details. If the hacker desires to DNS poison its target, he solely changes the name servers. dynamic the name servers would enable the hacker to vary from its previous server to its new server (New server = Hackers server). Once the name servers square measure modified to the hackers server, the hacker then has full management of that web site. He will then add his own page (deface page) on the name that he took management of. Once a the name servers square measure modified, it then takes most twenty four hours for it to vary globally (Normally it takes around half-dozen hours).




I hope you learned one thing from this text. If you have got any queries, be at liberty to comment. this text has been written by Mr-Xploiter Team PakXploiters I Hope You Will Understand
0 Read More »

Monday 7 December 2015

Serious, Yet Patched Flaw Exposes 6.1 Million IoT, Mobile Devices to Remote Code Execution

Serious, Yet Patched Flaw Exposes 6.1 Million IoT, Mobile Devices to Remote Code Execution


As a lot of as you defend your physical science from being hacked, hackers ar clever enough at finding new ways that to urge into your devices. But, you'd hope that after a flaw discovered it might a minimum of be mounted in few days or weeks, however that is not continually the case.
A three-year-old security vulnerability among a computer code part utilized by quite vi.1 Million sensible devices still remains unpatched by several vendors, thereby inserting sensible TVs, Routers, Smartphones, and different net of Things (IoT) merchandise in danger of exploit.
Security researchers at Trend small have brought the flaw to lightweight that has been famous since 2012 however has not been patched however.

Remote Code Execution Vulnerabilities 

Researchers discovered a group of Remote Code Execution (RCE) vulnerabilities within the moveable SDK for UPnP, or libupnp part – a computer code library utilized by mobile devices, routers, smart TVs, and different IoT devices to stream media files over a network.
The flaws occur because of a buffer overflow in easy Service Discovery Protocol (SSDP), probably permitting hackers to require full management over the targeted device running the vulnerable version of the computer code development kit (SDK).
According to the researchers, the vulnerabilities were truly patched in 2012, however several applications still use the superannuated versions of the library, permitting remote code execution attacks against devices with blemished apps put in.
"We found 547 apps that used older versions of libupnp, 326 of that ar accessible on the Google Play store," Trend small mobile analyst Veo Zhang wrote in a very diary post revealed Thursday.
Vulnerable Apps Downloaded by various folks
The biggest app littered with the flaw is QQMusic, that is employed by over a hundred Million folks in China alone and has been downloaded by various golem users from the Google Play store. However, the safety issue has since been mounted by the developers.
The Netflix application, conjointly downloaded by various folks, was conjointly tho't to be littered with the flaw though the researchers say:
"Upon additional clarification with Netflix, we tend to learned that Netflix uses their own fork of libupnp because of Associate in Nursing API that's now not a locality of newer libupnp versions. However, their fork contains the fixes from newer versions of libupnp additionally, therefore we tend to believe they're not littered with potential remote code execution attacks targeting this vulnerability."
Other well-liked applications exploitation the superannuated version of the library embody nScreen Mirroring for Samsung, CameraAccess and and sensible TV Remote.
List of Vulnerable Apps
Here's the list of some apps, Trend small is aware of, ar vulnerable and has truly tested:

  •  Common Name
  • Package Name
  • AirSmartPlayer
  • com.gk.airsmart.main
  • Big2Small
  • com.alitech.dvbtoip
  • CameraAccess and
  • jp.co.pixela.cameraaccessplus
  • G-MScreen
  • mktvsmart.screen
  • HexLink Remote (TV client)
  • hihex.sbrc.services
  • HexLink-SmartTV remote
  • com.hihex.hexlink
  • Hisense golem TV Remote
  • com.hisense.commonremote
  • nScreen Mirroring for Samsung
  • com.ht.nscreen.mirroring
  • Ooredoo TV Muscat and Oman
  • com.ooredootv.ooredoo
  • PictPrint – WiFi Print App –
  • jp.co.tandem.pictprint
  • qa.MozaicGO.Android
  • Mozaic GO
  • QQMusic
  • com.tencent.qqmusic
  • QQ音乐HD
  • com.tencent.qqmusicpad
  • Smart TV Remote
  • com.hisense.common
  • Wifi amusement
  • com.infogo.entertainment.wifi
  • モバイルTV(StationTV)
  • jp.pixela.px01.stationtv.localtuner.full.app
  • 에브리온TV (무료 실시간 TV)
  • com.everyontv
  • 多屏看看
  • com.letv.smartControl
  • 海信分享
  • com.hisense.hishare.hall

Though the manufacturers of QQMusic and LinPhone have addressed  the problem and discharged fixes for his or her apps, users ar suggested to envision their devices for one in all these apps and if discovered, merely removed it or check for Associate in Nursing update.
The security researchers ar continued to search out out a lot of vulnerable app.
0

10 Top Web Security Vulnerabilities


A little internet security primer before we tend to begin – authentication and authorization


When speaking with different programmers and IT professionals, I typically encounter confusion concerning the excellence between authorization and authentication. And after all, the very fact the abbreviation auth is commonly used for each helps irritate this common confusion. This confusion is therefore common that perhaps this issue ought to be enclosed during this post as “Common internet Vulnerability Zero”.

So before we tend to proceed, let’s clearly the excellence between these 2 terms:

Authentication:  substantiating that someone is (or a minimum of seems to be) a selected user, since he/she has properly provided their security credentials (password, answers to security queries, fingerprint scan, etc.).
Authorization: Confirming that a selected user has access to a selected resource or is granted permission to perform a selected action.
Stated another way, authentication is knowing who an entity is, while authorization is knowing what a given entity can do.


Common Mistake #1: Injection flaws

Injection flaws result from a classic failure to filter untrusted input. It can happen when you pass unfiltered data to the SQL server (SQL injection), to the browser (XSS – we’ll talk about this later), to the LDAP server (LDAP injection), or anywhere else. The problem here is that the attacker can inject commands to these entities, resulting in loss of data and hijacking clients’ browsers.

Anything that your application receives from untrusted sources must be filtered, preferably according to a whitelist. You should almost never use a blacklist, as getting that right is very hard and usually easy to bypass. Antivirus software products typically provide stellar examples of failing blacklists. Pattern matching does not work.

Prevention: The good news is that protecting against injection is “simply” a matter of filtering your input properly and thinking about whether an input can be trusted. But the bad news is that all input needs to be properly filtered, unless it can unquestionably be trusted (but the saying “never say never” does come to mind here).

In a system with 1,000 inputs, for example, successfully filtering 999 of them is not sufficient, as this still leaves one field that can serve as the Achilles heal to bring down your system. And you might think that putting an SQL query result into another query is a good idea, as the database is trusted, but if the perimeter is not, the input comes indirectly from guys with malintent. This is called Second Order SQL Injection in case you’re interested.

Since filtering is pretty hard to do right (like crypto), what I usually advise is to rely on your framework’s filtering functions: they are proven to work and are thoroughly scrutinized. If you do not use frameworks, you really need to think hard about whether not using them really makes sense in your environment. 99% of the time it does not.

Common Mistake #2: Broken Authentication

This is a collection of multiple problems that might occur during broken authentication, but they don’t all stem from the same root cause.

Assuming that anyone still wants to roll their own authentication code in 2014 (what are you thinking??), I advise against it. It is extremely hard to get right, and there are a myriad of possible pitfalls, just to mention a few:

The URL might contain the session id and leak it in the referer header to someone else.
The passwords might not be encrypted either in storage or transit.
The session ids might be predictable, thus gaining access is trivial.
Session fixation might be possible.
Session hijacking might be possible, timeouts not implemented right or using HTTP (no SSL), etc…
Prevention: The most straightforward way to avoid this web security vulnerability is to use a framework. You might be able to implement this correctly, but the former is much easier. In case you do want to roll your own code, be extremely paranoid and educate yourself on what the pitfalls are. There are quite a few.


Common Mistake #3: Cross Site Scripting (XSS)


This is a fairly widespread input sanitization failure (essentially a special case of common mistake #1). An attacker gives your web application JavaScript tags on input. When this input is returned to the user unsanitized, the user’s browser will execute it. It can be as simple as crafting a link and persuading a user to click it, or it can be something much more sinister. On page load the script runs and, for example, can be used to post your cookies to the attacker.

Prevention: There’s a simple web security solution: don’t return HTML tags to the client. This has the added benefit of defending against HTML injection, a similar attack whereby the attacker injects plain HTML content (such as images or loud invisible flash players) – not high-impact but surely annoying (“please make it stop!”). Usually, the workaround is simply converting all HTML entities, so that <script> is returned as <script>. The other often employed method of sanitization is using regular expressions to strip away HTML tags using regular expressions on < and >, but this is dangerous as a lot of browsers will interpret severely broken HTML just fine. Better to convert all characters to their escaped counterparts.

Common Mistake #4: Insecure Direct Object References


This is a classic case of trusting user input and paying the price in a resulting security vulnerability. A direct object reference means that an internal object such as a file or database key is exposed to the user. The problem with this is that the attacker can provide this reference and, if authorization is either not enforced (or is broken), the attacker can access or do things that they should be precluded from.

For example, the code has a download.php module that reads and lets the user download files, using a CGI parameter to specify the file name (e.g., download.php?file=something.txt). Either by mistake or due to laziness, the developer omitted authorization from the code. The attacker can now use this to download any system files that the user running PHP has access to, like the application code itself or other data left lying around on the server, like backups. Uh-oh.

Another common vulnerability example is a password reset function that relies on user input to determine whose password we’re resetting. After clicking the valid URL, an attacker can just modify the username field in the URL to say something like “admin”.

Incidentally, both of these examples are things I myself have seen appearing often “in the wild”.

Prevention: Perform user authorization properly and consistently, and whitelist the choices. More often than not though, the whole problem can be avoided by storing data internally and not relying on it being passed from the client via CGI parameters. Session variables in most frameworks are well suited for this purpose.

Common Mistake #5: Security misconfiguration


In my experience, web servers and applications that have been misconfigured are way more common than those that have been configured properly. Perhaps this because there is no shortage of ways to screw up. Some examples:

Running the application with debug enabled in production.
Having directory listing enabled on the server, which leaks valuable information.
Running outdated software (think WordPress plugins, old PhpMyAdmin).
Having unnecessary services running on the machine.
Not changing default keys and passwords. (Happens way more frequently than you’d believe!)
Revealing error handling information to the attackers, such as stack traces.
Prevention: Have a good (preferably automated) “build and deploy” process, which can run tests on deploy. The poor man’s security misconfiguration solution is post-commit hooks, to prevent the code from going out with default passwords and/or development stuff built in.

Like what you're reading?Get the latest updates first.

Enter your email address...
Get Exclusive Updates
No spam. Just great engineering and design posts.

Common Mistake #6: Sensitive data exposure


This web security vulnerability is about crypto and resource protection. Sensitive data should be encrypted at all times, including in transit and at rest. No exceptions. Credit card information and user passwords should never travel or be stored unencrypted, and passwords should always be hashed. Obviously the crypto/hashing algorithm must not be a weak one – when in doubt, use AES (256 bits and up) and RSA (2048 bits and up).

And while it goes without saying that session IDs and sensitive data should not be traveling in the URLs and sensitive cookies should have the secure flag on, this is very important and cannot be over-emphasized.

Prevention:

In transit: Use HTTPS with a proper certificate and PFS (Perfect Forward Secrecy). Do not accept anything over non-HTTPS connections. Have the secure flag on cookies.
In storage: This is harder. First and foremost, you need to lower your exposure. If you don’t need sensitive data, shred it. Data you don’t have can’t be stolen. Do not store credit card information ever, as you probably don’t want to have to deal with being PCI compliant. Sign up with a payment processor such as Stripe or Braintree. Second, if you have sensitive data that you actually do need, store it encrypted and make sure all passwords are hashed. For hashing, use of bcrypt is recommended. If you don’t use bcrypt, educate yourself on salting and rainbow tables.
And at the risk of stating the obvious, do not store the encryption keys next to the protected data. That’s like storing your bike with a lock that has the key in it. Protect your backups with encryption and keep your keys very private. And of course, don’t lose the keys!

Common Mistake #7: Missing function level access control


This is simply an authorization failure. It means that when a function is called on the server, proper authorization was not performed. A lot of times, developers rely on the fact that the server side generated the UI and they think that the functionality that is not supplied by the server cannot be accessed by the client. It is not as simple as that, as an attacker can always forge requests to the “hidden” functionality and will not be deterred by the fact that the UI doesn’t make this functionality easily accessible. Imagine there’s an /admin panel, and the button is only present in the UI if the user is actually an admin. Nothing keeps an attacker from discovering this functionality and misusing it if authorization is missing.

Prevention: On the server side, authorization must always be done. Yes, always. No exceptions or vulnerabilities will result in serious problems.


Common Mistake #8: Cross Site Request Forgery (CSRF)


This is a nice example of a confused deputy attack whereby the browser is fooled by some other party into misusing its authority. A 3rd party site, for example, can make the user’s browser misuse it’s authority to do something for the attacker.

In the case of CSRF, a 3rd party site issues requests to the target site (e.g., your bank) using your browser with your cookies / session. If you are logged in on one tab on your bank’s homepage, for example, and they are vulnerable to this attack, another tab can make your browser misuse its credentials on the attacker’s behalf, resulting in the confused deputy problem. The deputy is the browser that misuses its authority (session cookies) to do something the attacker instructs it to do.

Consider this example:

Attacker Alice wants to lighten target Todd’s wallet by transfering some of his money to her. Todd’s bank is vulnerable to CSRF. To send money, Todd has to access the following URL:

http://example.com/app/transferFunds?amount=1500&destinationAccount=4673243243

After this URL is opened, a success page is presented to Todd, and the transfer is done. Alice also knows, that Todd frequently visits a site under her control at blog.aliceisawesome.com, where she places the following snippet:

<img src="http://example.com/app/transferFunds?amount=1500&destinationAccount=4673243243" width="0" height="0" />

Upon visiting Alice’s website, Todd’s browser thinks that Alice links to an image, and automatically issues an HTTP GET request to fetch the “picture”, but this actually instructs Todd’s bank to transfer $1500 to Alice.
Incidentally, in addition to demonstrating the CSRF vulnerability, this example also demonstrates altering the server state with an idempotent HTTP GET request which is itself a serious vulnerability. HTTP GET requests must be idempotent (safe), meaning that they cannot alter the resource which is accessed. Never, ever, ever use idempotent methods to change the server state.

Fun fact: CSRF is also the method people used for cookie-stuffing in the past until affiliates got wiser.

Prevention: Store a secret token in a hidden form field which is inaccessible from the 3rd party site. You of course always have to verify this hidden field. Some sites ask for your password as well when modifying sensitive settings (like your password reminder email, for example), although I’d suspect this is there to prevent the misuse of your abandoned sessions (in an internet cafe for example).

Common Mistake #9: Using components with known vulnerabilities


The title says it all. I’d again classify this as more of a maintenance/deployment issue. Before incorporating new code, do some research, possibly some auditing. Using code that you got from a random person on GitHub or some forum might be very convenient, but is not without risk of serious web security vulnerability.

I have seen many instances, for example, where sites got owned (i.e., where an outsider gains administrative access to a system), not because the programmers were stupid, but because a 3rd party software remained unpatched for years in production. This is happening all the time with WordPress plugins for example. If you think they will not find your hidden phpmyadmin installation, let me introduce you to dirbuster.

The lesson here is that software development does not end when the application is deployed. There has to be documentation, tests, and plans on how to maintain and keep it updated, especially if it contains 3rd party or open source components.

Prevention:

Exercise caution. Beyond obviously using caution when using such components, do not be a copy-paste coder. Carefully inspect the piece of code you are about to put into your software, as it might be broken beyond repair (or in some cases, intentionally malicious).
Stay up-to-date. Make sure you are using the latest versions of everything that you trust, and have a plan to update them regularly. At least subscribe to a newsletter of new security vulnerabilities regarding the product.

Common Mistake #10: Unvalidated redirects and forwards


This is once again an input filtering issue. Suppose that the target site has a redirect.php module that takes a URL as a GET parameter. Manipulating the parameter can create a URL on targetsite.com that redirects the browser to malwareinstall.com. When the user sees the link, they will see targetsite.com/blahblahblah which the user thinks is trusted and is safe to click. Little do they know that this will actually transfer them onto a malware drop (or any other malicious) page. Alternatively, the attacker might redirect the browser to targetsite.com/deleteprofile?confirm=1.

It is worth mentioning, that stuffing unsanitized user-defined input into an HTTP header might lead to header injection which is pretty bad.

Prevention: Options include:

Don’t do redirects at all (they are seldom necessary).
Have a static list of valid locations to redirect to.
Whitelist the user-defined parameter, but this can be tricky.
Epilogue

I hope that I have managed to tickle your brain a little bit with this post and to introduce a healthy dose of paranoia and web security vulnerability awareness.

The core takeaway here is that age-old software practices exist for a reason and what applied back in the day for buffer overflows, still apply for pickled strings in Python today. Security helps you write correct(er) programs, which all programmers should aspire to.

Please use this knowledge responsibly, and don’t test pages without permission!

For more information and more specific attacks, have a look at: https://www.owasp.org/index.php/Category:Attack.

Feedback on this post is welcome and appreciated. Future related posts are planned, particularly on the issue of distributed denial-of-service (DDoS) and old-school (not web) IT security vulnerabilities. If you have a specific request on what to write about, please feel free to contact me directly at alibinrasheed5@gmail.com Regard By Mr-Xploiters

0

Friday 6 November 2015

10 Top Seo Tips to Use in 2015

10 Top Seo Tips to Use in 2015
Search engine improvement has considerably modified in recent years a lot of to the amiss of Google’s pointers. As you progress into 2015 and appearance to grow your website’s organic  traffic, what's going to be vital|most vital|most significant} for you to use for on-page SEO? Here’s an inventory of on-page SEO techniques that you just area unit most likely already victimisation however area unit still important in 2015 and conjointly some newer developments in SEO that you just ought to take into account in your strategy.
Include these On-Page SEO Tips in Your 2015 Strategy:

1. Optimize Your website Page Around One Keyword or Topic


The days of keyword “stuffing” area unit over, however you continue to got to keep your website pages optimized around one central plan and keyword. Keywords ought to seem in vital on-page components just like the page title, heading, image elevation text, and naturally throughout the page copy, however you ought to still take care to craft every of those things for humans, not search engines


2. bear in mind that Keywords area unit vital however Not Verbatim


Considering Google proclaimed in 2014 that their paid search services, AdWords, would not think about precise match keywords however conjointly co-varieties of a keyword, it's doubtless that a similar holds true for organic search, though it's not been expressly proclaimed.  Keywords not got to be the precise same variation as displayed in your keyword tool. for instance,  the plural keyword, “inbound promoting tactics”, is comparable to “inbound promoting tactic” in signifier with AdWord’s new targeting strategy. additionally, notwithstanding a searcher misspells, Google can still facilitate them realize your {website|web website} despite the variation of the keyword optimized on your site.

3. computer address Structure ought to Be Short, Descriptive and facilitate to reason Your web site


A computer address is one in every of the primary things a research engine uses to see page rank, that is why it's extremely vital to create your URLs straightforward to crawl. you'll be able to do that by keeping URLs short (this is additionally useful for UX), positioning to the page’s topic and keyword, and guaranteeing that URLs assist you to reason your website pages.

4. Optimize Page Titles


A title tag is employed by search engines to show a page in search results and may even be found at the highest of your browser. Title tags tell search engines and searchers what the page is regarding. Since Google can solely show between 50-60 characters within the title tag, you ought to keep title tags beneath fifty five characters and check out to drive individuals to click with compelling copy. you ought to conjointly place keywords or topics towards the front of the title.


5. Utilize correct Heading Tags


Heading tags ought to clearly tell the reader and search engines regarding the page’s topic. a research engine is in a position to spot the heading once it's labeled  by bracketing text in  inside the page’s hypertext mark-up language (Note: If you've got a CMS or COS like HubSpot or WordPress, this is often typically coded within the background). Heading tags facilitate tell a research engine the extent of importance of the content by conjointly victimisation  and  tags. you'll be able to check your site’s current heading tags by reading in hypertext mark-up language view.

In addition to what you ought to do with heading tags , you ought to conjointly avoid some things including:

Avoid victimisation generic terms like “Home” or “Products”

Don’t place vital data that might doubtless be your  as a picture.

6. Optimize Image elevation Text


While you ought to not hide your heading tag in a picture, you ought to still offer search engines a lot of opportunities to link to your web site by adding keywords within the image elevation text and file name.

7. Grow Natural Links


Google continues to use natural, quality inward links as a main ranking issue. In 2015, you ought to closely monitor inward links to confirm that they're perpetually growing which the inward links come back from quality websites.

8. Increase website Speed


Since 2011, Google has created it apparent that website speed matter in search rankings, and today, with an even bigger stress on the user expertise than ever before, website speed can still be a vital ranking issue. Users don’t wish to wait, and that we are getting a lot of and a lot of acquainted with the quick load times, which implies your website are going to be left within the dirt once a user should wait. There area unit some vital stuff you will do to hurry up website speed:

Test website speed victimisation Google or a inbuilt CMS tool like utilised in HubSpot

Ensure your internet server will handle you size of your company and web site wants. full internet servers will bog down load times.

You may conjointly realize that one in every of the subsequent culprits is deceleration down times:

Embedded videos or media

Using a ton of pictures

Images that don't seem to be compressed to reduce pixels before uploading

Clunky writing

Using a ton of plugins

If you think any of the on top of area unit inflicting slow load times, you'll be able to realize specialists to assist shut down your website or minimize the employment of every.

9. HTTP vs. HTTPS: Why They Matter


With an enormous push to create the net world safer, Google has began accentuation the importance of utilizing HTTPS. whereas several websites have historically ran on a Hyper Text Transfer Protocal (HTTP), a Hyper Transfor Protocal Secure (HTTPS) ensures that an internet site is encrypted and can't be hacked. With Google setting out to take a look at the waters in victimisation HTTPS as a ranking issue, it'll be vital to secure your web site with HTTPS in 2015.


10. Mobile Search Implications


With nearly four-hundredth of organic traffic coming back from mobile devices in 2014, it ought to come back as no surprise that mobile-friendly websites can rank higher with Google. to confirm you're mobile optimized, you ought to be avoiding common mistakes delineate by Google as well as faulty redirects, mobile-only 404s, blocked media, and slow mobile load times.

Although it should desire Google is making an attempt to create our jobs as inward marketers tougher, they ultimately need to produce the most effective user expertise, that ought to be the goal of your web site similarly. If you’d wish to discover however you'll higher optimize your web site in 2015, request a promoting assessment from SmartBug Media these days.
busy marketers guide to increasing traffic
0

Friday 23 October 2015

Ice Snow Bike Rider Android Game

Ice Snow Bike Rider Android Game

Ice Snow Bike Rider

Description

This is very amzaing game you have ride in snow you have the great bike 
It's nice bike moto ice mountains ride game!Drive the moto through ice mountains.Show your talent and keep your bike steady and don't crash.Don't forget to gather the celebrities too to pass the amount.

What's New

v1.2 --- Fix bug.

--- Application stability improvement..



1

Saturday 8 August 2015

Switch Between Users In Windows 10

Switch Between Users In Windows 10 





Windows ten allows a complete family, roommates, or workers during a tiny workplace to share one pc or pill. the pc keeps track of everybody's programs whereas totally different folks use the pc.




Mom are often taking part in chess then let Hun register to examine his e-mail. once momma signs back during a jiffy later, her match is correct wherever she left it, reflective the sacrifice of her rook.




Known as quick User change, change between users works quickly and simply. once someone else needs to register to his account for an instant, maybe to examine e-mail, follow these steps:




Open the beginning menu.




To open the beginning menu, click (or tap) the beginning button or press the keyboard's Windows key.




Click your user account picture within the screen's top-left corner.




A menu drops down, as shown here.




The menu lists the names of all user accounts approved to use the pc.

The menu lists the names of all user accounts approved to use the pc.

Choose the name of the user account holder World Health Organization needs to register.




Windows leaves you signed in however like a shot fetches the opposite person's account, material possession him sort in his positive identification.




When that person finishes with the pc, he will sign out even as you probably did in Step a pair of — by clicking his user account picture within the begin menu's upper-right corner. This time, however, he'll opt for Sign Out. Windows closes down his session, material possession you sign back in together with your own positive identification. And once Windows reappears, therefore can your work, even as you left it.




Keep the following pointers in mind once juggling many people's accounts on one PC:




With all this user change, you'll forget whose account you are truly victimisation. To check, open the beginning menu. this account holder's name and film seem within the menu's top-right corner.




To see different accounts presently signed in, open the beginning menu and click on this account holder's name. A menu lists the opposite user accounts however places the words Signed In to a lower place the name of every account holder who's presently signed in.




Don't restart the laptop whereas another person remains signed in, or that person can lose any work he hasn't saved. (Windows warns you before restarting the laptop, supplying you with an opportunity to raise the opposite person to register and save his work.)




If a customary account owner tries to vary a very important setting or install software package, a window can seem, inquiring for Administrator permission. If you wish to approve the action, simply step over to the laptop and sort your positive identification into the approval window. Windows enables you to approve the modification, even as if you'd done it whereas signed in together with your own account.



0

Friday 7 August 2015

Latest Google Play Music For Android Free Download - MyComputerSir

Latest Google Play Music For Android Free Download 


Google Play Music provides free, ad-supported radio for what you’re doing, however you’re feeling, or what you wish to listen to. Instantly begin radio stations supported songs, artists, or albums, or browse by genre, mood, activity, decade, and more. Bring your own music assortment with you by uploading fifty,000 of your own songs; then hear them across golem, iOS, and therefore the net, for free.
Want more? subscribe take away the ads and obtain on-demand access to ample songs. Plus, transfer something to your mobile device and listen even once you’re not connected.
Free features:
  • * Radio curated by specialists for any price you wish to listen to
  • * Store up to fifty,000 songs from your personal music assortment
  • * sensible recommendations supported your style
  • * Listen on golem, iOS, and therefore the net
  •     Subscription-only features:
  • * Ad-free, uninterrupted listening
  • * On-demand access to over thirty million songs
  • * transfer music to your device and listen once you’re not connected
  • * Skip as several songs as you prefer

Learn wherever Google Play Music is out there at
https://support.google.com/googleplay/?p=availability
Learn a lot of regarding Google Play Music at https://play.google.com/music




0

Speed Up 3G to 4G Sim For Android Free Download - MyComputerSir

Speed Up 3G to 4G  Sim For Android Free Download

 

The 3G to 4G hurrying application unlocks hidden options in your mobile phones that ar gift in ninety four of devices since 2012. Vendors lock this practicality to sell dearer phones however really use identical chipset because the dearer 4G phones. Most of the competitory 4G conversion code need you to try and do hardware modifications employing a hand tool and generally an additional chip. This code completely doesn't need any hardware modifications as a result of everything is simulated.
Why select ControllX 3G to 4G Speedup?
  • - It's free!
  • - No unwanted permissions required (secure!)
  • - you'll see the speed gain in action
  • - straightforward uninstall (no parameters keep within the settings)
  • - No hardware modifications
  • - It's AN impressive simulation.
There ar programs out there that gave net optimizers a foul name. ControllX 3G to 4G is different! we have a tendency to don't stagnate actuality nature of this application... it's not real and is supposed to be used as a joke app to fool folks. It very appearance real and it works on most automaton versions (even if you do not even have 3G)....


0

Monday 3 August 2015

Android HD Video Player App Download

Android HD Video Player App


Description:
Best optimized HD Video Player on Android! 
Fresh UI design(file browser & file manager) and user friendly functions!
Vivid HD Video player is that the best automaton phone player, incorporates a powerful video coding capabilities to simply support you play a video TV shows, movies, music videos, MTV and alternative mobile keep video files on your phone.
Supported all video formats: avi, m4v, mp4, wmv, flv, mpeg, mpg, mov, rm, vob, asf, mkv, f4v, ts, tp, m3u, m3u8, swf etc....

Includes:
  •  Browse SDCard Files.
  •  Copy, Move, Delete, Rename file.
  •  Batch Operator.
  •  Compress/uncompress(.zip)
  •  Email & Message send as attachment.
  •  produce new folder or document.
  •  type File List/multi read Files
  •  marker Manage.
  •  Search and share files
  •  Multiple choice and sorting support
  •  fingernail for pic, footage and apk files
  •  inherent swf player, media player..
  • If Any Problem Contact Me Alibinrasheed5@gmail.com..


0

Video To Mp3 Converter For Android Download

Video To Mp3 Converter For Android Download
http://mycomputersir.blogspot.com/
Description:
Have you ever downloaded a video however the song simply in it? Or does one simply would like a true song or video clip in an exceedingly extremely long however not understand what to try to to. A video rending code is needed results at this point.
Video To Mp3 may be a video rending Mp3 application is totally free. The code will extract audio from a video clip length, or cut a song from a moving-picture show.
Functions of the application:
- Convert video formats to mp3 format.
- opt for a video clip to convert to mp3 (selected by indicator or choose the beginning time and end)
User manual:
- Click the and (+) to pick the video conversion or the menu to pick a video exploitation file manager.
- Use the indicator to pick tracks to convert (or click on the choice to edit the beginning and end)
- Press checkmark to pick MP3 format, then click alright to begin dynamic  the tail. Please wait some minutes to transfer the video to Mp3
- Music files placed in file ripping position
- you'll set tracks were separated from the video as a ringtone for the phone or wont to listen......



0

Thursday 30 July 2015

Smart Tv Remote Control Apk - Download


Smart Tv Remote Control Apk
Description:
TV device could be a free app to regulate your TV victimisation Phone.
Features of TV device app:
- TV device User friendly interface.
- TV device Power on off button.
- Volume management button for tv device.
- Button for range of channels.
Control your TV, DVD player, sound system and a lot of victimisation the TV device on your smartphone.
- fancy personalised show,movie and sports recommendations supported your preferences
- Set reminders to look at a show later
- Watch your favorite shows therefore you ne'er miss Associate in Nursing episode
- customise your channels to match your cable or dish package
TV device is meant to support a lot of then a hundred TV models however got to use origial remote.
TV {remote management|remote|device} is a tremendous automaton application accustomed control your tv together with your automaton phone.
TV device offers you the previlege to integrate the practicality of your tv remote in your automaton phone.
TV {remote management|remote|device} revolutionizes your home diversion expertise by desegregation universal device control and live TV content discovery into one simple-to-use application.
TV device changes everything as your sensible phones becomes sensible tv remote.
Have the most effective TV expertise with the most effective TV device.
Note:-

TV device could be a prank application, only for fun and it doesn't add real.





0

Wednesday 29 July 2015

Quikr Buy-Sell (Android App) Download

Quikr Buy-Sell (Android App) Download:-

http://computersir.blogspot.com/
Download Quikr App
If You Want To Sell Thinks
Like Tv Car Bike Anythink You Want to Sell
you can Buy Thinks Also So Go Quikr


0

Tuesday 28 July 2015

Disable Right Click in Blogger

Disable Right Click in Blogger 



Have you detected, that some websites don't permit their guests exploitation right click whereas pointer is on the diary space. this selection is beneficial for the location and diary house owners, World Health Organization wish to attenuate the chances of the content direct repetition to alternative posts.

Right click on any net browser is incredibly necessary part and that we should use it once it involves copy or writing texts and etc. It’s important once it involves webmasters too. however some folks could use it in a very unhealthy method, and you will wish to form click right disabled on your diary. to shield you text, pictures links and etc.

To setup this tool in your diary Copy the subsequent code and paste it to your diary by adding a brand new page part.



Step one : move to Dashboard > Layout > Add gizmo > markup language / JavaScript
Step three : Save the html/javascript and consider you diary.

When you can attempt to do right click, a message can tell you that “Function disabled” , and if you would like to vary this words” perform Disabled” Then merely notice it in code and replace it.




0

How add a simple Facebook Like Box For Blogger


mycomputersir.blogspot.com

Facebook is one amongst the foremost well-liked social media networks wherever individuals share everything in their free time. therefore it's become important for bloggers and SEO’s. you recognize if you've got an honest quantity of Facebook likes for your web log or web site then you will get further blessings of it. however largely in Blogger we tend to don’t have all things put in from beginning. we tend to do several things by ourselves for our blogger blogs. therefore if you wish to extend your Facebook likes and name on social media then you need to add Facebook like box to your web log. we are going to show you example the way to add an easy Facebook like box to your web log terribly quickly. this is often simply an easy step, in future, i might show you ways to style your Facebook like box and the way to make a shining one. therefore for nowadays, lets begin embedding an easy like box from Facebook..



How to Embed Facebook Like box to Blog?

Before adding a Facebook like box we tend to should have an acquaintance page for our web log or web site on Facebook, therefore if you don’t have one then produce a replacement page for your web log which may simply be created and for embedding like box of that page to your web log, simply follow below steps:

Go to your Facebook Account
Go to the page you’ve created for your web log, it seems at left sidebar
See below image for instance






In on top of image you'll be able to see I even have several pages on Facebook, therefore if i need to embed like box of any page then i have to click on it page. therefore during this tutorial i'll click on Best Bloggers Cafe’s link you'll be able to see in on top of image. after you click the page link, you'll be redirected to your page. Here is that the example picture:


Now you're on the page that you just have for your web log, therefore on the highest of the page you'll be able to see a button [Edit page] and you've got to click on it, from the sink click on Update data and on consecutive page click on the resources link at left aspect. See example image below:


After clicking the resources you'll have another page wherever you'll be able to see lots of resources from Facebook, you simply click on the [Use Social Plugins] when clicking the employment Social Plugins you'll notice a page wherever you'll be able to use all the plugins for your web log. There area unit several plugins i.e Like Box, Like Buttons, Recommendation box, comment box etc. therefore you wish to click on like box. conjointly see the image below:





In on top of image you'll be able to see kind box, therefore you simply click on it and you’ll notice a replacement page wherever you'll be able to Customize your like box slightly bit, see below image for example:



When you reach a page like on top of image, kind box is shown by default as a platform page, therefore you wish to alter it to your own page URL as indicated with scan zone, conjointly the opposite vital settings you'll be able to wreak your like box like the breadth, border color, color, show streaming, header etc. therefore you'll be able to do these customization per your wants and when finalizing your setting click the Get Code button. currently you'll see a appear box like below picture:





In on top of box there area unit four choices to Embed this like box to your web logger blog or any web site, for blogger blogs you'll be able to simply Embed this like box with the IFRAME technique. therefore simply click the IFRAME and replica the code with CTRL+C or right click and replica. currently we are going to insert this code into our web log.

How to insert the embedded code into blog?
Go to Blogger >> Layout >> Add a Gadgets and choose the Gadgets of HTML/JavaScript
Now paste the code you earlier derived from Facebook
Save and you're done, simply read your web log and see kind box.
Note:
Mostly individuals use kind box at sidebar in blogger, however you'll be able to use it anyplace you wish.
By doing all steps properly you'll be succeeding in embedding a Facebook like box to your web logger web log same like as we've got on our blog.

Take lots of Care of your family and blue-eyed ones and best needs for your bright future. Comments area unit answered as before long as time permits.

If Any Problem contac at alibinrasheed5@gmail.com




0

Monday 27 July 2015

Latest Whatsapp Video Fun (Apk) Download

Latest Whatsapp Video Fun (Apk) Download:-

Description:-
Indian Whatsapp Video
Funny Whatsapp Video
Interesting Whatsapp Videos
Whatsapp Video tricks
Free Whatsapp video share
Videos for WhatsApp can cause you to pay the simplest moments with funny videos and additionally to share together with your friends on whatsapp.
You can watch the videos within the app, share all humor videos in WhatsApp, Line, Facebook, Twitter... and send to your whatsapp friends videos directly.
The app contains videos with laughs, cats, dogs, falls, funny babies, scare, fear, jokes, funny fails or others.
Automatically we are going to add additional videos weekly. prime quality videos, whole free.
Funny videos to pay the simplest moments throughout your spare time.
Enjoy the funniest videos on-line.
+ New video is mechanically adscititious not forget to enter a day to ascertain if there ar new vids
+ commemorate alone or with friends.
Attention: funny Video has no rights to the videos to the present application. All contents ar public and ar hosted on Youtube
If you've got any drawback concerning the files
Contact is at alibinrasheed5@gmail.com

0

Keypad Screen Lock Apk Download

Keypad Screen Lock Apk Download:-

 

Description;-
Keypad Lock screen is one in every of the simplest locker for your humanoid device.
Easy defend your phone from others and obtain beautiful wallpapers free.
What you simply ought to do is alter pin lock in settings and build your own parole for unlock phone screen.
Key Features:
* Slide To Unlock
* Enter pin to unlock.
* Customizable lock screen wallpapers
* Unlock sound enable/disable.
* Unlock vibration enable/disable.
* Replace your phones default lock screen with this tradition lock screen
* select wallpaper from Gallery
                       "Download Here"
 
Related Post
Birds Live HD Wallpaper for (Android Mobiles)
3D Speed Boat Racing Download



0

Friday 24 July 2015

Live Aquarium Theme (2015) Download

0

Birds Live HD Wallpaper for (Android Mobiles)





For encouraging the unfold of helpful programming product we provide to transfer new live wallpapers for free of charge
and to relish their beauty and dynamics all told the range of art designs.
Besides product we provide area unit fully adopted and show stable and reliable work for all robot versions
they have comprehensible  interface simple method of setting and lingering visual effects. 
Peculiarities of programming product Birds HD in Live Wallpaper :
- Colorful vivid scenes on totally different themes designed with high creative style.
- Moving 3D screens .
- The live wallpapers offered area unit tiny in size that's they don’t transfer the system and permit to
change screensavers while not further defrayal of system resources and energy.
- Almost don’t discharge the phone battery that is set by tiny power-consuming of
changing the shots 
- Can be simply transferred into Mount Rushmore State card that facilitates the method of transferring of software system Birds
HD in Live Wallpaper into another phone with any robot version.
It ought to be mentioned that the setting of offered product is specially chosen in keeping with the parameters
of simplicity experience , simplicity of settings and quality for even the foremost demanding  user.
Installing Birds HD in Live Wallpaper
In fact it's terribly simple, you must enter the most page , then the most menu there opt for “wallpapers” then
“live wallpapers” then Birds HD in Live Wallpaper and that’s all . Enjoy.
Products Birds HD in Live Wallpaper were tested within the latest devices like Samsung Galaxy S4 , Nexus 7
and many others fashionable devices. Testing confirmed all operating skills of software system and showed accordance
with quality parameters and stability expressed before .
Realizing that it's not possible to avoid all queries and issues we have a tendency to offer consulting and sensible services in
case of look any issues. Thus, if you've got issues of compatibility of our product together with your mobile
phone or your device doesn’t support it, please connect US and that we can solve your drawback qualitatively and
quickly.





0

3D Speed Boat Racing (Android Games) Download

3D Speed Boat Racing Download

http://mycomputersir.blogspot.com/

Description:-
3D Speed Boat Racing Game For Andorids Mobiles

o racing with the most effective Speed racing 3D game live store to try to to daredevil and incautious stunts in turbulent ocean waves. Speed racing 3D game is about on the rough seas with missiles and rocks to tackle and take a look at your reflexes. Steer favorite speed boats at mind-blowing speeds to gather coins and power ups.Speed racing 3D game can take a look at your reflexes, temporal arrangement and accuracy as your excellent skills to achieve most speed. Collect the coins as several as attainable to shop for new speed boats. beautiful high definition 3D graphics and sound effects giving internal 

secretion rush over each game. be careful for obstacles within the method, as three crashes and its game over. transfer it currently and luxuriate in your passion.
Game has several exciting options
- immoderate Realistic 3D graphics in realistic ocean waters
- Tilt your device to steer at high speeds to gather coins
- three totally different boats and a pair of level choice with night and day settings
- Simulating authentic 3D physics and feel smart graphics
- wonderful sound effects and engine sounds!
- simple to be told, a challenge to master
- impressive boats and ocean tracks to explore







0

Thursday 23 July 2015

Download Messenger For Android (2015)

Download Messenger For Android (2015)

http:mycomputersir.blogspot.com
Description:

Instantly reach the individuals in your life—for free. traveler is simply like texting, however you do not got to pay money for each message (it works along with your information plan).
Not only for Facebook friends: Message individuals in your phone book and simply enter a signaling to feature a replacement contact.
Group chats: produce teams for the individuals you message most. Name them, set cluster photos and keep all in one place.
Photos and videos: Shoot videos and snap selfies or different photos right from the app and send them with one faucet.
Chat heads: Keep the speech going whereas you utilize different apps.
Free calls: speak as long as you wish, even with individuals in different countries. (Calls square measure free over Wi-Fi. Otherwise, customary information charges apply.)
Even additional ways that to message:
Bring your conversations to life with stickers.
Preview your gallery photos and videos while not deed the conversation--then opt for the proper ones to send.
Record voice messages after you have additional to mention.
Extra features:
Know once individuals have seen your messages.
Forward messages or photos to people that weren't within the speech.
Search for individuals and teams to quickly revisit to them.
Turn on location to let individuals recognize once you are close.
See who's out there on traveler and who's active on Facebook.
Create shortcuts to induce to any speech right from your home screen.
Turn off notifications once you are operating, sleeping or simply would like an opportunity.
Stay logged in thus you ne'er miss a message.






1

.Net FrameWork (Latest Version) Download







 .NET Framework is Microsoft's comprehensive and consistent programming model for building applications that have visually gorgeous user experiences, seamless and secure communication, and therefore the ability to model a variety of business processes.

The Microsoft .NET Framework four redistributable package installs the .NET Framework runtime and associated files that square measure needed to run and develop applications to focus on the .NET Framework four.

The .NET Framework four works facet by facet with older Framework versions. Applications that square measure supported earlier versions of the Framework can still run on the version targeted by default.

.NET Framework four includes the subsequent new options and improvements:

Improvements in CLR and BCL
Improvements in fuss.NET
Enhancements to ASP.NET
Improvements in Windows Presentation Foundation

Improvements to Windows work flow Foundation and Windows Communication Foundation



0