Wednesday, 26 April 2017

If You Want To Be A Programmer So Don't Forget To Download AIDE App

1 comment
unduhan
AIDE
AIDE is an integrated development environment (IDE) for developing real Android apps directly on your Android device.

 Follow interactive coding lessons and step-by-step become an expert app developer. Visually design apps, write code with the feature rich editor with code completion, real-time error checking, refactoring and smart code navigation, run your app with a single click and use the Java debugger to find bugs.

AIDE supports building apps with Java/Xml and the Android SDK, apps with C/C++ and the Android NDK as well as pure Java console applications.

AIDE is fully compatible with Eclipse projects. You can just copy the sourcecode to your device and open the Eclipse project in AIDEto start coding. Alternatively you can keep your sourcecode on your Dropbox – AIDE integrates with Dropbox and allows to easily download from your Dropbox and sync back your changes. 

AIDE can also open Android Studio projects, which follow the default folder structure. AIDE also supports Git for professional development.

A brief summary of features…

Learn-to-code (in-app purchase):
– Interactive lessons with step-by-step instructions
– Java programming course
– Android development course
– Game development course
– Android Wear course
Edit-compile-run cycle:
– Create a sample App with a single click
– Build Java/Xml apps
– Build C/C++ NDK apps
– Build pure Java console applications
– Run your App with a single click
– No root access required
– Incremental compilation for fast build times
– Uses Eclipse .classpath project format for compatibility
– Open default Android Studio projects
– Integrated LogCat viewer
Debugger (in-app purchase):
– Debug Android Java apps and Java Console apps
– Breakpoints
– Step-in, step-over, step-out
– Inspect thread trace
– Inspect local variables
– Inspect object fields
Download
Real-time error checking:
– Real time error analyis throughout the whole project as you type
– Automatic Quick-Fixes for many errors
UI design:
– Preview XML layouts
– Jump from view in the designer to the XML element
Refactoring:
– Rename
– Inline variable
– Introduce variable
– Extract method
Code:
– Code formatter
– Organize imports
– Out-comment code
– Create setters/getters/constructors from fields
Code navigation:
– Goto defintion
– Find usages
– Goto symbol
– Goto class
Editor:
– Very fast editor even with large files
– Code completion for Java and Android XML
– Android online help directly from the code
– Syntax highlighting for Java and XML
– Unlimited Undo/Redo
– Pinch zoom
– Smart expand selection
– Keyboard support with configurable keybindings
– UI optimized for small screens to show as much code/content as possible
Download
Filebrowser:
– Built-in file manager with the most common features: Rename, delete, create file or folder
– Dropbox integration
– Git integration with Commit/Dicard/Push/Pull/Branch/Merge and SSH support.

Note : In This Post , The AIDE App Is Cracked Version . 
Read More

New Android Malware Infected 2 Million Google Play Store Users So Must Read And Check Your Phone

1 comment
hack-android-phone
Thanks To THN
Initially thought to be 600,000 users, the number of Android users who have mistakenly downloaded and installed malware on their devices straight from Google Play Store has reached 2 Million.


Yes, about 2 Million Android users have fallen victim to malware hidden in over 40 fake companion guide apps for popular mobile games, such as Pokémon Go and FIFA Mobile, on the official Google Play Store, according to security researchers from Check Point.

Dubbed FalseGuide by the Check Point researchers, the malware creates a "silent botnet out of the infected devices" to deliver fraudulent mobile adware and generate ad revenue for cybercriminals.

Nearly 2 Million Android Users Infected!


While initially it was believed that the oldest instance of FalseGuide was uploaded to the Google Play in February and made its way onto over 600,000 devices within two months, further in-depth analysis by researchers revealed more infected apps which date back to November 2016.
"Since April 24, when the article below was first published, Check Point researchers learned that the FalseGuide attack is far more extensive than originally understood," Check Point researchers wrote in a blog post.
"The apps were uploaded to the app store [Google Play Store] as early as November 2016, meaning they hid successfully for five months, accumulating an astounding number of downloads."


Russian connection with FalseGuide


Check Point researchers discovered five additional apps containing the FalseGuide malware on Google Play Store, developed by "Anatoly Khmelenko" (translated from Russian Анатолий Хмеленко).

Also, the first batch of malicious apps was submitted under the Russian names of two fake developers, Sergei Vernik and Nikolai Zalupkin, which suggests the malware is of Russian origin.


FalseGuide attempts to turn infected devices into a botnet that could allow its operator to control the devices without the knowledge of the device owners.


Here's How FalseGuide Works:


android-malware

While downloading to the victim's phone, FalseGuide requests administrative permissions to the device in an attempt to avoid being deleted by the user.

The malware then registers itself with Firebase Cloud Messaging – a cross-platform messaging service that allows app developers to send messages and notifications.

Once subscribed to this service, FalseGuide can allow the attackers to send messages containing links to additional malware and install them to the infected device, enabling attackers to display illegitimate pop-up ads out of context and generate revenue.

Depending on their objectives, the attackers could also inject highly malicious code into an infected device to root it, conduct a Distributed Denial of Service (DDoS) attack, or even penetrate private networks.

Google Removed the Malware hidden Apps, but are you Clean?


Check Point has provided a full list of malicious apps hiding FalseGuide, which posed as guides for FIFA Mobile, Criminal Case, Super Mario, Subway Surfers, Pokemon Go, Lego Nexo Knights, Lego City My City, Ninjago Tournament, Rolling Sky, Amaz3ing Spider-Man, Drift Zone 2, Dream League Soccer, and many more.

Check Point researchers notified Google about FalseGuide in February, after which the company silently removed the malware apps from the Play Store.


But despite being removed, the malicious apps are likely still active on a number of devices, leaving Android users open to cyber attacks.
"Mobile botnets are a growing trend since early last year, growing in both sophistication and reach," CheckPoint said. "This type of malware manages to infiltrate Google Play due to the non-malicious nature of the first component, which only downloads the actual harmful code."


How to Protect yourself against such Malware


There are standard protection measures you need to follow to remain unaffected:

  • Always download apps which are from trusted and verified developers and stick to trusted sources, like Google play Store and the Apple App Store.
  • Always verify app permissions before installing apps. If any app is asking more than what it is meant for, just do not install it.
  • Keep a good antivirus app on your device that can detect and block such malware before it can infect your device. Always keep the app up-to-date.
  • Do not download apps from third party source. Although in this case, the app is being distributed through the official Play Store, most often such malware are distributed via untrusted third-party app stores.
  • Avoid unknown and unsecured Wi-Fi hotspots and Keep your Wi-Fi turned OFF when not in use.
  • Be careful which apps you give administrative rights to. Admin rights are powerful and can give an app full control of your device.
  • Never click on links in SMS or MMS sent to your mobile phone. Even if the email looks legit, go directly to the website of origin and verify any possible updates.
Read More

Social Engineering ? KYA ISSE FACEBOOK HACK HO SKTA HAI ? Must Read

2 comments
Hello Guys , Welcome To Hax4Us
TechGyan 
Dosto Aaj Hum Baat Karne Ja Rahe Hai Social Engineering Ke Baare Me Ki Ye Hoti Kya HAI And Isse Hum Kya Kya Kar Sakte HAI....

What Is Social Engineering ?

Dosto bahut se bande social engineering ko koi hacking tool ya koi application maante hai jisse kuch bhi hack ho sakta HAI..

But esa kuch nahi hai....Dosto real me social engineering ek psychological element hai jisse hum apne victim ko pagal bana kar usse credentials nikalwa lete HAI...

Means , jab bhi hum kisi ka private data lene ke liye usse kuch ESA kara dete hai jis par victim ko to pura trust hota HAI but actually me vo ek scam hota HAI....to tab hum social engineering ka hi use kar rahe hote HAI.....

Iska sabse badia example phishing attack HAI....

Phishing attack bina social engineering ke pura ho hi nahi sakta ....

Ab maan lijiye aapne ek Fb phishing page banaya hai jisse aap apne friend ka account hack karna chahte hai to sabse pehle aapko apne friend me mind ke saath kuch iss tarah khelna padega jisse use aapke phishing page par trust ho jaye and go saari details dede Jo bhi aapne phishing page par maangi HAI.....

Matlab apne victim ko pagal banana or usse kuch is tarah se uski credentials nikalwana ki use pata bhi na chale.....

So that is called social engineering.

Social engineering is the use of deception and manipulation to obtain confidential information. It is a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. Social engineers rely on the fact that people are not aware of the value of the information they possess and are careless about protecting it.

How To Hack Fb Using Phishing Attack

Dosto agar aapko ye post achi lagi to please ek comment to aap kar hi sakte hai jyada ni 1 minute lagega😂 to jaldi kardo ab.....

Read More

Tuesday, 25 April 2017

Flash Stock Rom For Micromax Unite 2 A106 Without PC

4 comments
Hax4Us
This is pure Micromax A106 Stock ROM. No modification, no root, no deodex, no zipalign.
This ROM can be flashed using any custom recovery on both models of A106.Porters/developers can use this stock ROM to port different custom ROMs forMicromax A106 Unite 2


Requirements:

Steps to flash stock ROM without pc:

Step 1: Keep downloaded zip file in external sd card.
Step 2: Flash CWM recovery.
Step 3: Reboot to recovery (press vol up + vol down + power button to reboot to recovery).
Step 4: Press vol down to select Wipe data/factory reset then press power button.
Step 5: Go to advanced and Wipe Dalvik Cache.
Step 6: Select install zip from sdcard.
Step 7: Select choose zip from sdcard.
Step 8: Select downloaded Stock_ROM_A106_Recovery_flashable.zip
Step 9: Restart phone. It will take 3-4 min for 1st boot.

Dude you and only you are the responsible for any damage 
Read More