Google+ Followers

Friday, 31 October 2014

How to Use WhatsApp on PC

Now a days everyone is using WhatsApp on its mobile phone. The popularity of WhatsApp is increasing day by day. So if you are not carrying your phone, you can stuck without WhatsApp.


There are several factors why you'd want to use WhatsApp on a PC oprating system XP, Windows Vista, Windows 7 and Windows 8. Verifying your phone is a diversion that you might want to prevent while working. It's undesirable to change to another system just to deliver a number of fast information. And if you've missing your phone, then you might want a fast way to message people and let them know. Regardless of what your factors are, you can run WhatsApp on a PC. Check out now here :

Also see : How to Use Android Apps on PC




Follow the following steps to install the WhatsApp on your PC :

  1. First of all, you have system’s minimum requrements for installing the app player called "BlueStacks" and you must have the internet connection to install this player.
    How-to-change-Bluestack-Apps-Resolution-in-Windows-GeekWake
  2. You must have a mobile no. so that you can verify it with account on WhatsApp.
  3. Download this BlueStacks app player from here.
  4. After that install this app player on your PC. It takes about 10 to 15 minutes depending speed of your internet. Because it download several related files directly from internet.
    android-apps-for-pc-blue-stacks
  5. After Installing just search the whatsapp in search bar of BlueStcks and install it or download the apk file of whatsapp from here.
  6. Double-click the WhatsApp.apk file which is saved on your PC. The app will automatically install itself in Bluestacks App Player.
  7. Enter your phone number and click Verify.
  8. Now wait for 5 minutes as WhatsApp tries to automatically verify using SMS.
  9. After 5 minutes, WhatsApp will offer you an option for verification through Voice call. Just Click Call me.
  10. And finally here you successfully installed WhatsApp on your PC
Please Note : You can only have one device at a time connected to your Whatsapp account (i.e. either your Phone or PC)



Read more ...

How to Use Android Apps on PC- Full Guide

Android OS is almost everywhere. You can now find Android in Mobile Phones, multiple gadgets, wearable gadgets such as watches, and soon the OS will be a part of vehicles too. So now if you want to use android apps on PC then the solution is only - BlueStack. We feel that Bluestacks is fast, efficient and easy to use, making it the only choice for most customers. Here's how to get it on your PC.

Step to Install BlueStcks on PC :


First you have to go to BlueStacks website to download this or just click here to get this software.
Now start the installation computer file and follow on-screen guidelines to set up Bluestacks. The guidelines are very simple, similar to setting up any other program on your PC. 

Run the Bluestacks when the setup is finished. Just simply choose the "Close" key when you see the any pop-up to start Bluestacks.
Now you'll see a screen in which Android is up and running. Click the big search icon at the top > type the name of the app > select "Search Play for..." to get the apps from Google Play.

You'll have to log in using your Gmail account once to perform for applications. Once that is done, you can set up most activities and applications - some, which depend on a working SIM card for verification, such as WhatsApp, Candy Crush etc.

Installing applications is simple. Just use the look for key on the home screen and just click Search Play for, as described in Step 4. This will open Google Play, where you can click "Install" to get the app.

Bluestacks is an Android app player so you can synchronize set up applications between your PC and Android if needed.

Here finally you have an app player to use all the Android apps on your PC.

Read more ...

Wednesday, 29 October 2014

What is PHP ? Basic Guide

Okay Hai  Guys
Let me give you an Intro about PHP.
But first of all I am Siv, yep that is my name weird and cool right?
So lets start, PHP or Hypertext Preprocessor is a widely-used open source general-purpose scripting language that is especially suited for web development and can be embedded into HTML.
yeah yeah Sounds good what the heck it mean??
Okay look at this Introductory example

Instead of lots of commands to output HTML (as seen in C or Perl), PHP pages contain HTML with embedded code that does “something” (in this case, output “Hi, I’m a PHP script!”). The PHP code is enclosed in special start and end processing instructions <?php and ?> that allow you to jump into and out of “PHP mode.”
What distinguishes PHP from something like client-side JavaScript is that the code is executed on the server, generating HTML which is then sent to the client. The client would receive the results of running that script, but would not know what the underlying code was. You can even configure your web server to process all your HTML files with PHP, and then there’s really no way that users can tell what you have up your sleeve.
The best things in using PHP are that it is extremely simple for a newcomer, but offers many advanced features for a professional programmer. Don’t be afraid reading the long list of PHP’s features. You can jump in, in a short time, and start writing simple scripts in a few hours.
 That’s all for now folksRegards Siv

visit php official document for more rich information! Tutorial Defined by TrueTricks.net and Have fun :P
Read more ...

DNS Hijacking: What is it and How it Works

DNS hijacking (sometimes referred to as DNS redirection) is a type of malicious attack that overrides a computer’s TCP/IP settings to point it at a rogue DNS server, thereby invalidating the default DNS settings. In other words, when an attacker takes control of a computer to alter its DNS settings, so that it now points to a rogue DNS server, the process is referred to as DNS hijacking.
As we all know, the “Domain Name System (DNS)” is mainly responsible for translating a user friendly domain name such as “google.com” to its corresponding IP address “74.125.235.46”. Having a clear idea of DNS and its working can help you better understand what DNS hijacking is all about. If you are fairly new to the concept of DNS, I would recommend reading my previous post on How Domain Name System Works.

How DNS Hijacking Works?

As mentioned before, DNS is the one that is responsible for mapping the user friendly domain names to their corresponding IP addresses. This DNS server is owned and maintained by your Internet service provider (ISP) and many other private business organizations. By default, your computer is configured to use the DNS server from the ISP. In some cases, your computer may even be using the DNS services of other reputed organizations such as Google. In this case, you are said to be safe and everything seems to work normally.
DNS Hijacking
But, imagine a situation where a hacker or a malware program gains unauthorized access to your computer and changes the DNS settings, so that your computer now uses one of the rogue DNS servers that is owned and maintained by the hacker. When this happens, the rogue DNS server may translate domain names of desirable websites (such as banks, search engines, social networking sites etc.) to IP addresses of malicious websites. As a result, when you type the URL of a website in the address bar, you may be taken to a fake website instead of the one you are intending for. Sometimes, this can put you in deep trouble!

What are the Dangers of DNS Hijacking?

The dangers of DNS hijacking can vary and depend on the intention behind the attack. Many ISPs such as “OpenDNS” and “Comcast” use DNS hijacking for introducing advertisements or collecting statistics. Even though this can cause no serious damage to the users, it is considered as a violation of RFC standards for DNS responses.
Other dangers of DNS hijacking include the following attacks:
Pharming: This is a kind of attack where a website’s traffic is redirected to another website that is a fake one. For example, when a user tries to visit a social networking website such as Facebook.com he may be redirected to another website that is filled with pop-ups and advertisements. This is often done by hackers in order to generate advertising revenue.
Phishing: This is a kind of attack where users are redirected to a malicious website whose design (look and feel) matches exactly with that of the original one. For example, when a user tries to log in to his bank account, he may be redirected to a malicious website that steals his login details.

How to Prevent DNS Hijacking?

In most cases, attackers make use of malware programs such as a trojan horse to carry out DNS hijacking. These DNS hijacking trojans are often distributed as video and audio codecs, video downloaders, YoTube downloaders or as other free utilities. So, in order to stay protected, it is recommended to stay away from untrusted websites that offer free downloads. The DNSChanger trojan is an example of one such malware that hijacked the DNS settings of over 4 million computers to drive a profit of about 14 million USD through fraudulent advertising revenue.
Also, it is necessary to change the default password of your router, so that it would not be possible for the attacker to modify your router settings using the default password that came with the factory setting. For more details on this topic you can read my other post on How to Hack an Ethernet ADSL Router.
Installing a good antivirus program and keeping it up-to-date can offer a great deal of protection to your computer against any such attacks.

What if you are already a victim of DNS hijacking?

If you suspect that your computer is infected with a malware program such as DNSChanger, you need not panic. It is fairly simple and easy to recover from the damage caused by such programs. All you have to do is, just verify your current DNS settings to make sure that you are not using any of those DNS IPs that are blacklisted. Otherwise re-configure your DNS settings as per the guidelines of your ISP.
Read more ...

How a Domain Name is Hijacked and How to Protect it

How Domain Names are Hijacked

In this post I will tell you about how the domain names are hacked and how they can be protected. The act of hacking domain names is commonly known as Domain Hijacking. For most of you, the term “domain hijacking” may seem to be like an alien. So, let me first tell you what domain hijacking is all about.

Domain hijacking is a process by which Internet Domain Names are stolen from its legitimate owners. It is also known as domain theft. Before we can proceed to know how to hijack domain names, it is necessary to understand how the domain names operate and how they get associated with a particular web server (website).

The Operation of a Domain Name is as Follows:

Any website say for example gohacking.com consists of two parts. The domain name (gohacking.com) and the web hosting server where the files of the website are actually hosted. In reality, the domain name and the web hosting server (web server) are two different parts and hence they must be integrated before a website can operate successfully. The integration of domain name with the web hosting server is done as follows:
  1. After registering a new domain name, we get a control panel where in we can have a full control of the domain.
  2. From this domain control panel, we point our domain name to the web server where the website’s data (web pages, scripts etc.) are actually hosted.
For a clear understanding let me take up a small example:
John registers a new domain called “abc.com” from an X domain registration company. He also purchases a hosting plan from Y hosting company. He uploads all of his files (.html, .php, javascripts etc.) to his web server (at Y). From the domain control panel (of X) he configures his domain name “abc.com” to point to his web server (of Y).
Now, whenever an Internet user types “abc.com”, the domain name “abc.com” is resolved to the target web server and the web page is displayed. This is how a website actually works.

What Happens When a Domain Name is Hijacked?

Now, let us see what happens when a domain name is hijacked. To hijack a domain name, you just need to gain access to the domain control panel and point the domain name to some other web server other than the original one. So, to hijack a domain you need not gain access to the target web server.
For example, a hacker gets access to the domain control panel of  “abc.com”. From here the hacker re-configures the domain name to point it to some other web server (Z). Now whenever an Internet user tries to access “abc.com” he is taken to the hacker’s website (Z) and not to John’s original site (Y).
In this case the John’s domain name (abc.com) is said to be hijacked.

How the Domain Names are Hijacked?

To hijack a domain name, it is necessary to gain access to the domain control panel of the target domain. For this you need the following ingredients:
  1. The domain registrar name for the target domain.
  2. The administrative email address associated with the target domain.
These information can be obtained by accessing the WHOIS data of the target domain. To get access to the WHOIS data, go to whois.domaintools.com, enter the target domain name and click on Lookup. Once the whois data is loaded, scroll down and you’ll see Whois Record. Under this, you’ll get the “Administrative contact email address”.
To get the domain registrar name, look for the words something like: “Registered through:: XYZ Company”. Here XYZ Company is the domain registrar. In case if you do not find this, scroll up and you’ll see ICANN Registrar under the “Registry Data”. In this case, the ICANN registrar is the actual domain registrar.
The administrative email address associated with the domain is the backdoor to hijack the domain name. It is the key to unlock the domain control panel. So, to take full control of the domain, the hacker will have to hack the administrative email associated with it. Email hacking has been discussed in my earlier post: How to hack an email account.
Once the hacker takes full control of this email account, he will visit the domain registrar’s website and click onforgot password in the login page. There, he will be asked to enter either the domain name or theadministrative email address to initiate the password reset process. Once this is done, all the details to reset the password will be sent to the administrative email address.
Since the hacker has the access to this email account, he can easily reset the password of domain control panel. After resetting the password, he logs into the control panel with the new password and from there he can hijack the domain within minutes.

How to Protect the Domain Name from Getting Hijacked?

The best way to protect the domain name is to protect the administrative email account associated with the domain. If you loose this email account, you loose your domain. You can read my earlier post on how to protect your email account from being hacked. Another best way to protect your domain is to go for a private domain registration.
When you register a domain name using the private registration option, all your personal details such as your name, address, phone and administrative email address are hidden from the public.
whenever a hacker performs a WHOIS lookup for your domain name, he will not be able to find your name, phone or the administrative email address. Thus, the private registration provides an extra security and protects your privacy. Even though it costs a few extra bucks, is really is worth for its advantages.
I hope that this article has helped you. You can express your feedback through comments.
Read more ...