Skip to main content

Posts

How does Bluetooth work?

We go straight to the source and get Bluetooth executive director Michael Foley to wirelessly transmit an answer to this query. Bluetooth technology is a short-range wireless communications technology to replace the cables connecting electronic devices, allowing a person to have a phone conversation via a headset, use a wireless mouse and synchronize information from a mobile phone to a PC, all using the same core system. The Bluetooth RF transceiver (or physical layer) operates in the unlicensed ISM band centered at 2.4 gigahertz (the same range of frequencies used by microwaves and Wi-Fi). The core system employs a frequency-hopping transceiver to combat interference and fading. Bluetooth devices are managed using an RF topology known as a "star topology." A group of devices synchronized in this fashion forms a piconet, which may contain one master and up to seven active slaves, with additional slaves that are not actively participating in the network. (A given device
Recent posts

Advance Operating System

Advance Operating System is an interface between the software applications and hardware with level of packaging. New Advance Operating System Designed For Security..!! Qubes  is an open source operating system designed to provide strong security for desktop computing. Qubes is based on Xen, X Window System, and Linux, and can run most Linux applications and utilize most of the Linux drivers. >> Key architecture features: Based on a secure bare-metal hypervisor (Xen) Networking code sandboxed in an unprivileged VM (using IOMMU/VT-d) No networking code in the privileged domain (dom0) All user applications run in “AppVMs”, lightweight VMs based on Linux Centralised updates of all AppVMs based on the same template Qubes GUI virtualization presents applications like if they were running locally Qubes GUI provides isolation between apps sharing the same desktop Storage drivers and backends sandboxed in an unprivileged virtual machine(*) Secure system boot based on Intel TXT

Bypass Android Pattern Lock

To Bypass Android Pattern Lock, here are following methods METHOD I Solution For Everyone With Recovery (Cwm, Twrp, Xrec,Etc…) Installed: INSTRUCTIONS: 1. Download this zip Pattern Password Disable (Download from attachments) on to your sdcard (using your PC, as you cant get into your phone, right ) 2. Insert the sdcard into your phone 3. Reboot into recovery mode 4. Flash the zip 5. Reboot 6. Done! Note:  If You See The Gesture Pattern Grid Or Password After Restarting, Don’t Worry. Just Try Any Random Pattern Or Password And it Should Unlock. METHOD 2 Solution For Everyone Without Recovery Installed – ADB: What You Need: =>A computer running a Linux distro or Windows+Cygwin =>USB cable to connect your phone to the PC =>Adb installed How to install adb: 1. Open Terminal 2. Type: “sudo apt-get install android-tools-adb” -> Hit [Enter] 3. Follow the instructions until everything is installed. INSTRUCTIONS: 1. Connect you (turned on) P

Mobile Hack Tricks

Call Forging: To call someone from their own number or any number. 1. Go to www.mobivox.com and register there for free account. 2. During registration, remember to insert Victim mobile number in “Phone number” field as shown below. 3. Complete registration and confirm your email id and then login to your account. click on “Direct WebCall”. 4. You will arrive at page shown below. In “Enter a number” box, select your country and also any mobile number(you can enter yours). Now, simply hit on “Call Now” button to call your friend with his own number. 5. That’s it. Your friend will be shocked to see his own number calling him. I have spent last two days simply playing this cool mobile hack prank. Note: This trick will only knowledge purpose… Just try this trick only known person. Get USER info of any reliance No. http://myservices.relianceada.com/captureInstantRecharge.do 1. Enter the number of whom u want details.. 2. Enter any fake email id. 3. And then cl

How To Steal A Phone Number (And Everything Linked To It)

Someone impersonating you to an AT&T or Verizon employee isn’t the only thing you need to worry about. Meet Signaling System 7, a hacker’s best friend. [Source Images: janscherders/iStock (phone), tacktack/iStock (lock)] BY STEVEN MELENDEZ 7 MINUTE READ Last spring, Dena Haritos Tsamitis left a work meeting to discover she was unable to get a signal on her cellphone. Even after rebooting the device, she couldn’t get service, leaving her unable to contact her college student daughter, who usually communicated with her throughout the day. “She was frantic, worrying about me, because she had tried to reach me several times,” Tsamitis says she learned when she got home. “She said she called her friend to pick her up to look for me, because she was worried about me.” Tsamitis called her phone company for help with the issue, only to discover she had been the victim of fraud. “The customer service representative said, you purchased new phones