Monday, September 30, 2013

Omegle Bot (1)

hey its a2bs today im going to let u download for free an omegle bot ...

do u know those annoying bots on Omegle bot and u want to have  one ?

do u want to advertise your website and get traffic ?

Do u like to annoy people ? :P

Instructions:

anyways you go to the settings of the bot

then go to user settings and type what you like your bot to say

Type like a human button : make it seem as if you are typing

Alert me when a captcha appears : omegle is sometimes so secured that it blalists the ip of a                    spammer so you need to  enter a captcha code for the bot to continue

wait for them to talk : the bot talks  when the othert person texts you

NOTE : it is recommended to use a vpn beacuse sometime they ban you instead of black ip-ing u

Download Link : CLICK HERE

Password : a2bs.blogspot.com

Sunday, September 29, 2013

Exclusive : New Touch ID hack allows hacker to unlock an iPhone by multiple fingerprints

The Iranian group defeated the very basic phenomenon of an iPhone Fingerprinting scanner, which allows them to unlock an iPhone device with multiple Fingerprints.

Apple‘s iPhone 5s, was launched just available in stores two weeks before with a new feature of biometrics-based security system called "Touch ID", that involves analyzing a user’s fingerprint and using that to unlock the phone.

Apple launched the technology that it promises will better protect devices from criminals and snoopers seeking access. With this you can purchase things from the iTunes App Store. Basically, you can now use it in place of your password.

"Fingerprint is one of the best passcodes in the world. It's always with you, and no two are exactly alike," according to the Apple's website.

Last week Germany Hackers showed that how they were able to deceive Apple’s latest security feature into believing they’re someone they’re not, using a well-honed technique for creating a latex copy of someone's fingerprint.
Another interesting fact is that, Touch ID is not only designed to scan the fingerprints of your fingers, it works with various human body parts and appendages which are also not fingers.

An Iranian group of iPhone Geeks from Tehran running a blog i.e. "i-Phone.ir" contacted 'The Hacker News' with another awesome Touch ID hack, shown that how they defeated the very basic phenomenon of Fingerprinting scanner i.e. "No two Fingerprints are exactly alike". (Greets to Bashir Khoshnevis , Mohsen Lotfi , Shayan Khabazian and other members of i-Phone.ir support team)

In a video demonstration, provided to The Hacker News, the Group set up a mixed Fingerprint scan of 5-6 people for an iPhone 5S handset (as shown in the video), which allowed all of them to unlock the locked device with their individual fingerprint.

According to Apple, the chance that Touch ID will misread a finger is 1 in 50,000 , this is because Touch ID is not designed to capture the fingerprint in strict mode. It scans the fingerprint on a very high-resolution (2400 dpi), to get and match the partial parts of an impression for faster unlocking.

If the iPhone is not able to scan the thumb impression in the strict mode to be unique, there is a possibility that out of 1000 thumb impressions iPhone's Touch ID system can count 2-3 impressions as of the same person.

It could be a feature only if 5 different keys (fingers) are of the same person, but here we have 5 different people with the same key (finger), absolutely Touch ID is not a family key system that should work for Dad-Mom-sister and elder brother.

I asked my co-researchers "Wang Wie" and "Jiten Jain" to reproduce the hack, and it worked successfully for both and many times on latest IOS firmware 7.0.2 and iPhone users will not receive any patch soon for this.
Touch ID is intended to reduce the number of times a person must enter a passcode, but you should use Passcode to make sure no one else has access to your iPhone.

Earlier this morning, a new report came from a Chinese weblog, DoNews stating that Apple will introduce the new Touch ID in iPad mini 2.

Sunday, September 22, 2013

BBM for Android and iOS 7

BBM for Android and iOS 7 Finally Here + Download Link


UPDATE: BlackBerry wasn’t happy that Android users had the leaked version and 1.1 million users activated it in 8 hours. They have since disabled the service for Android users… It was fun while it lasted! And let’s hope they roll out their final one in the coming hours, not days! Read more here.

image
image
image
Here’s the download link 
And it’s on iOS7 too. Here’s the link for you Apple fanboys and girls (not available in the Lebanese store yet, sorry!)
UPDATE: BlackBerry wasn’t happy that Android users had the leaked version and 1.1 million users activated it in 8 hours. They have since disabled the service for Android users… It was fun while it lasted! And let’s hope they roll out their final one in the coming hours, not days! Read more here.

Thursday, September 19, 2013

iPhone's iOS 7 Lockscreen hack allows to bypass Security

Like most iOS lock screen vulnerabilities, the passcode lock screen on iOS 7 also suffers from a bug that allows anyone with direct access to the iPhone or iPad.

Although Apple claims to have fixed 80 security vulnerabilities with iOS 7, including the ability to bypass the lock sceen in iOS 6.1.3, the same person who found the previous vulnerability has found yet in another iOS 7 .

Discovered by 'Jose Rodriquez', an iPhone user reported a security flaw in iOS that lets anyone bypass the lockscreen passcode and accesss sensitive information stored in photos, Twitter, email and more.

The flaw resides on users who lock their devices with a traditional PIN code or password. The security flaw is demonstrated in the instructions below and soon on my youtube channel :
Swipe up from the bottom of the lockscreen to open Control Center and Launch the Clock App.

Open the Alarm Clock section of the Clock app and Hold down the power button.

Quickly tap Cancel the immediately double-click the Home button and Hold down for a bit longer on the second click.
From Here you can access the camera and stored photod. You can share these photos on Facebook, Twitter,Flickr or via email.
The exploit has been tested successfully on ios 7 when running on the iPone 4S,5,5C,and 5S, and the most recent iPad model.
Until an official fix is available from Apple, iOS 7 users can Avoid this security hole by disabling the control center of the lock screen in their device settings :P

Saturday, August 3, 2013

Android apps on pc or how to run mobile apps on pc

Hello everybody ,this tuorial is provided by a2bs , im sure you always wanted or wondered how to get android apps on your pcor mac ... It is very simple all you have to do is to  download the softwares from the links below and if any help needed search PurelyLeabnese on youtube


Windows : http://adf.ly/TMNbN

Mac :http://adf.ly/TMRbt



thanks for visitng my blog for any questions or suggestions or for any help you can contact me on


Skype : a2bs.blogspot.com
Twitter: follow me and tweet me : a2bs_blogspot
Kik : a2bs.blogspot.com
Ask.fm : a2bs_blogspot

Android secret codes

Android Secret Codes.....



1. Complete Information About your Phone

*#*#4636#*#*

This code can be used to get some interesting information about your phone and battery. It shows following 4 menus on screen:

Phone information
Battery information
Battery history
Usage statistics

2. Factory data reset

*#*#7780#*#*

This code can be used for a factory data reset. It’ll remove following things:

Google account settings stored in your phone
System and application data and settings
Downloaded applications

It’ll NOT remove:

Current system software and bundled application
SD card files e.g. photos, music files, etc.

Note: Once you give this code, you get a prompt screen asking you to click on “Reset phone” button. So you get a chance to cancel your operation.
3. Format Android Phone

*2767*3855#

Think before you give this code. This code is used for factory format. It’ll remove all files and settingsincluding the internal memory storage. It’ll also reinstall the phone firmware.
Note: Once you give this code, there is no way to cancel the operation unless you remove the battery from the phone. So think twice before giving this code.
4. Phone Camera Update

*#*#34971539#*#*

This code is used to get information about phone camera. It shows following 4 menus:

Update camera firmware in image (Don’t try this option)
Update camera firmware in SD card
Get camera firmware version
Get firmware update count

WARNING: Never use the first option otherwise your phone camera will stop working and you’ll need to take your phone to service center to reinstall camera firmware.
5. End Call/Power

*#*#7594#*#*

This one is my favorite one. This code can be used to change the “End Call / Power” button action in your phone. Be default, if you long press the button, it shows a screen asking you to select any option from Silent mode, AirPlane mode and Power off.
You can change this action using this code. You can enable direct power off on this button so you don’t need to waste your time in selecting the option.
6. File Copy for Creating Backup

*#*#273283*255*663282*#*#*

This code opens a File copy screen where you can backup your media files e.g. Images, Sound, Video and Voice memo.
7. Service Mode

*#*#197328640#*#*

This code can be used to enter into Service mode. You can run various tests and change settings in the service mode.

8. WLAN, GPS and Bluetooth Test Codes:
*#*#232339#*#* OR *#*#526#*#* OR *#*#528#*#* – WLAN test (Use “Menu” button to start various tests)

*#*#232338#*#* – Shows WiFi MAC Address
*#*#1472365#*#* – GPS test
*#*#1575#*#* - Another GPS test
*#*#232331#*#* – Bluetooth test
*#*#232337#*# – Shows Bluetooth device address

9. Codes to get Firmware version information:
*#*#4986*2650468#*#* - PDA, Phone, H/W, RFCallDate
*#*#1234#*#* - PDA and Phone
*#*#1111#*#* - FTA SW Version
*#*#2222#*#* - FTA HW Version
*#*#44336#*#* - PDA, Phone, CSC, Build Time, Changelist number

10. Codes to launch various Factory Tests:
*#*#0283#*#* - Packet Loopback
*#*#0*#*#* - LCD test
*#*#0673#*#* OR *#*#0289#*#* - Melody test
*#*#0842#*#* - Device test (Vibration test and BackLight test)
*#*#2663#*#* - Touch screen version
*#*#2664#*#* - Touch screen test
*#*#0588#*#* - Proximity sensor test
*#*#3264#*#* - RAM version

what is computer virus ? protect yourself

What is Computer VIRUS?? Protect youself...


WHAT IS A COMPUTER VIRUS ?

A potentially damaging computer
program’s, capable of reproducing
itself causing great harm to files
or other programs without
permission or knowledge of the
user.

TYPES OF VIRUSES :-

1) BOOT SECTOR VIRUS :- BOOT
SECTOR VIRUSES INFECT EITHER
THE MASTER BOOT RECORD OF
THE HARD DISK OR THE FLOPPY
DRIVE. THE BOOT RECORD
PROGRAM RESPONSIBLE FOR THE
BOOTING OF OPERATING SYSTEM
IS REPLACED BY THE VIRUS. THE
VIRUS EITHER COPIES THE
MASTER BOOT PROGRAM TO
ANOTHER PART OF THE HARD
DISK OR OVERWRITES IT. THEY
INFECT A COMPUTER WHEN IT
BOOTS UP OR WHEN IT ACCESSES
THE INFECTED FLOPPY DISK IN
THE FLOPPY DRIVE. I.E. ONCE A
SYSTEM IS INFECTED WITH A
BOOT-SECTOR VIRUS, ANY NON-
WRITE-PROTECTED DISK
ACCESSED BY THIS SYSTEM WILL
BECOME INFECTED.
EXAMPLES OF BOOT- SECTOR
VIRUSES ARE MICHELANGELO
AND STONED.

2) FILE OR PROGRAM VIRUSES :-
SOME FILES/PROGRAMS, WHEN
EXECUTED, LOAD THE VIRUS IN
THE MEMORY AND PERFORM
PREDEFINED FUNCTIONS TO
INFECT THE SYSTEM. THEY
INFECT PROGRAM FILES WITH
EXTENSIONS
LIKE .EXE, .COM, .BIN, .DRV
AND .SYS .
SOME COMMON FILE VIRUSES
ARE SUNDAY, CASCADE.




3) MULTIPARTITE VIRUSES :- A
MULTIPARTITE VIRUS IS A
COMPUTER VIRUS THAT INFECTS
MULTIPLE DIFFERENT TARGET
PLATFORMS, AND REMAINS
RECURSIVELY INFECTIVE IN
EACH TARGET. IT ATTEMPTS TO
ATTACK BOTH THE BOOT SECTOR
AND THE EXECUTABLE, OR
PROGRAMS, FILES AT THE SAME
TIME. WHEN THE VIRUS
ATTACHES TO THE BOOT SECTOR,
IT WILL IN TURN AFFECT THE
SYSTEM’S FILES, AND WHEN THE
VIRUS ATTACHES TO THE FILES,
IT WILL IN TURN INFECT THE
BOOT SECTOR.
This type of virus can re-infect a
system over and over again if all
parts of the virus are not
eradicated.
Ghostball was the first
multipartite virus, discovered by
Fridrik Skulason in October 1989.
Other examples are Invader, Flip,
etc.

4) STEALTH VIRUSES :- THESE
VIRUSES ARE STEALTHY IN
NATURE MEANS IT USES VARIOUS
METHODS FOR HIDING
THEMSELVES TO AVOID
DETECTION. THEY SOMETIMES
REMOVE THEMSELVES FROM THE
MEMORY TEMPORARILY TO
AVOID DETECTION BY
ANTIVIRUS. THEY ARE
SOMEWHAT DIFFICULT TO
DETECT. WHEN AN ANTIVIRUS
PROGRAM TRIES TO DETECT THE
VIRUS, THE STEALTH VIRUS
FEEDS THE ANTIVIRUS PROGRAM
A CLEAN IMAGE OF THE FILE OR
BOOT SECTOR.

5) POLYMORPHIC VIRUSES :-
POLYMORPHIC VIRUSES HAVE
THE ABILITY TO MUTATE
IMPLYING THAT THEY CHANGE
THE VIRAL CODE KNOWN AS THE
SIGNATURE EACH TIME THEY
SPREAD OR INFECT. THUS AN
ANTIVIRUS PROGRAM WHICH IS
SCANNING FOR SPECIFIC VIRUS
CODES UNABLE TO DETECT IT’S
PRESENSE.

6) MACRO VIRUSES :- A MACRO
VIRUS IS A COMPUTER VIRUS
THAT “INFECTS” A MICROSOFT
WORD OR SIMILAR APPLICATION
AND CAUSES A SEQUENCE OF
ACTIONS TO BE PERFORMED
AUTOMATICALLY WHEN THE
APPLICATION IS STARTED OR
SOMETHING ELSE TRIGGERS IT.
MACRO VIRUSES TEND TO BE
SURPRISING BUT RELATIVELY
HARMLESS.A MACRO VIRUS IS
OFTEN SPREAD AS AN E-MAIL
VIRUS. WELL-KNOWN EXAMPLES
ARE CONCEPT VIRUS AND
MELISSA WORM

WAYS HACKERS SEND YOU
SERVER,VIRUSES AND .EXE FILES VIA INTERNET:

1. Binder - Binder is a software
which is used to bind or
collaborate the server or virus you
have created with some other file
like a MP3,JPEG or any other
file.You can fool the victim by
sending him a song or picture and
as soon as he opens the picture or
song the Binder also gets open
and starts working. 

2. Crypter - A crypter is a tool
which changes the binary code of
the .exe (virus,RAT etc.)file and
applies many encryptions on it
which makes the .exe file
undetectable.You can use Chrome Crypter. 

3. Zipping - Another smart way to
send files is by putting your
server in a Zipped folder and then
sending it to the victim.Zipping
the file changes the extension of
the srver from .exe to .zip,which
bypasses the file transfer facility
of gmail,facebook,yahoo etc..
USE WINRAR & Give password of
that file, so AV's not enter in file.

4. Extension - You can change the
extension of the Server you want
to send as it is not possible to
send .exe files,so you can change
the extension of .exe
to .jpeg,.mp3 etc. when you save
the file and then send it to the
victim.But in this method you will
have to tell the victim to change
the extension back to .exe after
he receives the server.This
method can only be used in cases
where the victim is very dumb
and has no knowledge of this
field.
A person who is not much
interested in cyber security should
have knowledge of above
mentioned methods as they can
be used against anyone.

Free Paid market apps

Aptoide: http://adf.ly/TMJAR
Blackmart Alpha : http://adf.ly/TMJTK

Websites to Download Ebooks for FREE....

Websites to Download Ebooks for FREE....



In  Day to Day Life, EBooks Plays an Important Role In Students Life and other Internet Users who Wants to learn.There are many Sites that provides Ebooks, But Finding Your Desired EBook For Free is Still an Issue. So Today I will Share Best 5 Websites From Where you Can Download eBooks For Free and Easily.

 Recently i Was Searching for Websites That Can Provide me an Ebook of my Choice. As Obvious i Got Hundreds of Results but To be Frank i Found it Difficult To Download That book, Because Of Unnecessory Ads. So Finally i got The Following 5 Websites Which has User Friendly Interface and You will be able to Download Books of your Choice Easily.


 
Bookboon.com is a Site Which I Personally Prefer. You will Find Usefull EBooks Specially For Students. As a Student i just loved this site not just because it has got EBooks which i needed but also Because of user friendly interface, Easy and Fast way to download without any Clutters.

There are business books, travel guides and educational text books; all available with no Registration Required



Again A Great Site For Tech Freaks To download Great Usefull Ebooks. You will Find Books By Catogory on the left side of homepage. Consist of books related to Computer Science ,Maths, Operating System, Programming. So in short best place to Expand your Tech Knowledge for free.





 


 As the name suggest, this site is for downloading Ebooks for Free. For Eg : Programming books, Application designing books etc.
Though the books in this are links to other websites where you can download it for free, Downloading books from this site is not that Hard. Just Click on book you want to download , Scroll down, it ask for captcha verification, As soon as you enter the captcha and click on submit , you will be shown a link of the site where  your book is available to download for free, copy that link, paste in new tab of browser and press enter. your downloading will Start.




Interested in Programming ? Or Want To increase your knowledge in Programming Languages ? Then This site is for you.
Really Easy Process to download books for free and  No Registration Required.





This Site is for Computer Students, This site has 30 top level category of books category and 200 sub category of what it contains.

Saturday, June 22, 2013

Anonymizing and proxies

PROXY FINDER


Proxy Finder searches the web and find thousands of valid and working proxies in seconds. It can find low, medium and also high anonymity proxies so we can remain anonymous online.


Download here:

ANONYMOUS SURFING : TOR

Tor is a very good and free anonymizer program which hides our IP address and protects our privacy. Tor prevents websites from tracking us. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. It is also available as an firefox addon. 

Download from TOR Official Website:

ANONYMOUS SURFING : HOTSPOT SHIELD


Hotspot Shield protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless). Hotspot Shield protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS. Hotspot Shield also makes you private online making your identity invisible to third party websites and ISP’s. Unless you choose to sign into a certain site, you will be anonymous for your entire web session with Hotspot Shield. Hotspot Shield creates a virtual private network (VPN) between your laptop or iPhone and our Internet gateway. This impenetrable tunnel prevents snoopers, hackers, ISP’s, from viewing your web browsing activities, instant messages, downloads, credit card information or anything else you send over the network. Hotspot Shield security application employs the latest VPN technology, and is easy to install and use. 

Download here:  

http://www.mediafire.com/download.php?zzmfcdy1z2

ANONYMOUS SURFING : PC MESH ANONYMOUS WEB SURFING


PC Mesh Anonymous Web Surfing is an internet utility to hide your IP address while you are browsing the web. IP address is your internet identification number which is detectable by any web site that you visit. It is fully automatic. You don't need to have any knowledge of setting up proxy connections. Just click "Autopilot" and watch. PC Mesh Anonymous Web Surfing will check your real IP address, verify a large number of proxy servers with a lightning fast speed, delete the non-functional proxies, sort them by ping, select the fastest proxy, check your IP address again and compare it with your real IP address. 

Download here:  

http://www.ziddu.com/download/7051521/paws.rar.html 

Password: hackingguide 

ANONYMOUS SURFING : IP ANONYMIZER


 IP Anonymizer is a software which hides your IP address by making use of website proxies and enables you to surf. It is simple and easy to use and requires no configuration. Just click on "Enable anonymity online" and it will start its work . It also includes anonymous surfing wizard which guides you to the different parts of the software like online privacy etc. 

Download here:

http://www.mediafire.com/download.php?hyljntmmzw

ANONYMOUS SURFING : GHOSTSURF PLATINUM



The ultimate IP address hider and anonymizer which include the following features:

  • Encrypts your Internet connection
  • Erases all traces of your Web surfing
  • Removes aggressive spyware
  • Prevents identity theft and credit card fraud
  • Secures confidential files
  • Eliminates online ads
Also includes Spycatcher which is an excellent anti-spyware.


Download here:  

http://www.tenebril.com/consumer/ghostsurf/ghostsurf_platinum.php

ANONYMIZER'S ANONYMOUS SURFING



Anonymizer's Anonymous Surfing enables anonymous Web browsing which hides your IP address. Anonymous Surfing protects your privacy and your identity by preventing cyber criminals from detecting your personal information and tracking your online activities. Be anonymous on this dangerous web. 

Download here: 

http://www.anonymizer.com/consumer/products/anonymous_surfing