Pages

Wednesday, August 13, 2014

HOW TO OVERCLOCK PENTIUM 4 AND CELERON CPUs

HOW DO I OVERCLOCK MY OLD INTEL CPU AND MAKE THE BEST OUT OF IT YOU ASK?


 

Why overclock an Intel PC? The hard-core tech addict answers with the classic “because it's there.” While poetic, this doesn’t do much for the IT professional who needs more justification to risk voiding a manufacturer warranty. However, the best business reason for overclocking is that it can make “obsolete” equipment useful again. This equipment is typically already out of warranty, so the risk is often minimal. For instance, overclocking the low-cost Celeron PCs you bought for backup duty will significantly boost their performance, making them faster and more productive. You can also use overclocking to test the performance of software for future hardware upgrades. To help you take advantage of your older equipment, this Drill Down will focus on why you might want to overclock Intel’s Celeron and P4 processors, and how to do it.


Overclock at your own risk

Manufacturers may or may not honor the warranty on an overclocked CPU. It may also void the warranty on your motherboard and add-in cards. As all systems and components are different, neither TechProGuild nor the author can be held responsible for any damage caused by overclocking your computer. This information is presented for educational purposes only. Perform any modifications to your system at your own risk.


Processor speed factors

Today’s CPUs differ from those of the past in that they include on-board cache memory. Older CPUs, like the original 486 and Pentium, had the majority of their cache memory embedded on the motherboard. Changing the way the CPU operated rarely affected the operation of the cache on the motherboard. Now, however, all processor caches are attached to the CPU. Even if the processor is able to handle a particular speed, unstable cache memory will feed it corrupt data, rendering the CPU useless.

Processor speed is based on two factors. The first is the interface between the motherboard and the Front Side Bus (FSB). The speed of the FSB reflects the amount of data that can be sent between the CPU and the other devices in the computer. On most motherboards, the FSB also determines the speed of the AGP port, the PCI bus, and the ISA bus. In general, the performance of a computer improves as the FSB speed increases.



Intel FSB speed

The FSB on Intel processors currently ranges from 400 MHz for Celerons to 533 MHz for the Pentium 4. These are not straight clock speeds; instead they are quad-clocked speeds. These processors actually transmit data four times per clock cycle, meaning the Celerons are based on a 100-MHz clock (100 MHz x 4 = 400 MHz), while the current Pentium 4 uses a 133-MHz clock (133 x 4 = 533 MHz). There are older Pentium 4s that use the 400-MHz bus, but they are being phased out to help increase performance differences between the new Celerons and the Pentium 4.


The other factor controlling a CPU’s speed is the clock multiplier. The clock multiplier defines the ratio of processor speed to the FSB. Prior to the Pentium II, switches on the motherboard set the clock multiplier of virtually all processors. Currently, the clock multiplier is locked at the factory.



Intel to unlock the clock multiplier?

Intel felt it was necessary to lock the clock multiplier at the factory after having problems with ethically challenged vendors remarking the processors with higher speeds and increasing the price. Home users cried foul, but the corporate world that buys the lion’s share of computers doesn’t overclock and didn’t care. Amazingly, at the recent Intel Developers Forum, Intel discussed bringing to market an “enthusiast” grade motherboard that would allow overclocking, its first since it started locking clock multipliers.


Check your motherboard

Before you begin the overclocking process, determine if your motherboard can overclock processors. Look in the CPU installation section in your PC’s manual. If you're lucky, you'll find either a BIOS setup menu or a set of switches or jumpers on the motherboard that control the FSB, voltage, clock, PCI/AGP, and memory bus multipliers. The only real necessity is the FSB adjustment, but without the others, your options decline significantly.

Overclocking will require your motherboard to give orders to the CPU. This is not its normal mode of operation. If you have a computer that came from a major manufacturer like IBM, it's likely that your motherboard won't provide any overclocking abilities. Even among aftermarket and consumer-level boards, overclocking opportunities aren't guaranteed.

Component capabilities

Bear in mind that if you have a processor capable of a 50 percent or more speed increase, it's unlikely that your video card or memory will enjoy running that much faster. A motherboard that can be overclocked will either provide multiple PCI/AGP and memory bus ratios or allow you to lock them at their preferred operating parameters.

Memory speed

Memory speed is often tied to the FSB, but there are boards that will lock the memory bus speed. Don’t do it if you don’t have to. Half the performance increase you may see from overclocking a CPU comes from increasing the speed at which the processor can talk to the memory. High-speed memory abounds in the market for DDR systems, which constitute the majority of computers out there. This is especially true in the case of the Celeron, since a sizeable portion of what makes it a “value” processor is the reduced memory speeds.

Power needs

You'll need to know how much power your processor uses. Just like a motor running at a higher speed, you’ll need to give your CPU more power. This is one of the “risky” aspects of overclocking. Use too much power and you could burn out your processor. A mere shift in the manufacturing process can change the operating voltage of a CPU by a significant amount, so I don't recommend running a processor at a voltage more than 10 percent above what is listed for your type of processor at the new speed. Even then you're relying on the engineering design overhead, which is not something for the faint of heart. Individuals bent on squeezing out every last iota of performance can boost the voltage, but those who prefer long-term stability should only do so for testing.

This is also the best time to check the power supply in the system you intend to overclock. Speed requires power, and unstable power inevitably leads to unstable processors. Intel processors are hungry beasts, consuming 40-75 watts of power. Your graphics card may take another 50 watts of power. You're consuming 100+ watts of power right there—between half and a third of a typical OEM unit. Multiple or fast drives will take still more power, as will USB and Firewire devices, especially hungry bus-powered ones like scanners or hard drives. I recommend a 350-watt power supply at a minimum in any computer you intend to overclock, and more if you have several SCSI drives or a RAID array.

Cooling and airflow

One of the most important things you'll need is something too often neglected: a potent cooling solution. Overclocking causes circuits to cycle faster, generating more heat. Insufficient cooling can cause permanent heat damage to your processor. Surprisingly, the heat sink and fan unit that Intel ships with its processors is a fairly durable component. However, if you have trouble with stability, consider upgrading to an “enthusiast” unit. Combined with a good silver heat transfer medium, it will keep your system much cooler.

In addition, don’t neglect the airflow in your case. Your processor is still at risk if heat can't escape the case. For overclocking, don't rely on the power supply’s exhaust fan to handle your cooling needs. At the very least, you should have an exhaust fan at the top of the case in addition to the one in your power supply. Adding a second fan at the bottom of the case to draw air in greatly improves the airflow and only costs a few dollars.

Be sure that the cooling solution you choose is specifically designed for your processor. Improperly mounting a heat sink, or using the wrong model, can physically damage your processor. The sites below are excellent resources for determining the optimum heat sink/fan combinations for Intel’s Celeron and P4 chips:




Overclocking process

Essentially, overclocking Intel processors consists of increasing the FSB in the BIOS, booting the computer, and then testing for stability. You repeat the process until you identify the maximum stable speed. Changing the FSB is a relatively simple matter of entering the computer’s BIOS setup screen, switching from automatic to manual configuration, and selecting the FSB speed you want. The crudest form of overclocking is available to Celerons; it consists of telling the motherboard the processor is really a Pentium 4 so that it will use the 533-MHz bus, boosting the processor’s speed by 33 percent. Most overclocking motherboards support altering the FSB in 5-MHz increments, while the best ones allow 1-MHz increments.

You'll need to check the PCI/AGP clock multiplier or clock speed (Table A). Many motherboards have the PCI speed locked to match the intended processor’s FSB. Others have multiple PCI/AGP clock multipliers to select from. The best will feed the correct speed to the PCI and AGP devices automatically. You're trying to keep the PCI bus at 33 MHz and the AGP port at 66 MHz—the farther you are from these speeds, the more rigorously you’ll have to test your peripherals.

Table A


Component Bus Multipliers
Core FSB
Bus Speeds
100 Mhz
133 Mhz
Memory*
x1
x1
PCI (33 Mhz)
x1/3
x1/4
AGP (66 Mhz)
x2/3
x1/2
*The memory bus has its own multipliers to the core FSB. DDR doubles the core FSB, while RDRAM quadruples it. Most motherboards will show the core FSB, but others will show the multiplied speed. DDR operates at speeds of 200-333 Mhz depending on grade, while RDRAM operates at 400 Mhz or 533 Mhz with a dual-channel 1066 Mhz speed.

Intel Celeron

The Celeron is Intel’s processor for low-cost PCs. The majority of Celerons are based on Pentium II/Pentium III cores and run at speeds of 1.4 GHz or less. Overclocking these older processors is the same as a Pentium II/III (see my previous overclocking article). However, the Celeron now comes in a Pentium 4 flavor in speeds of 1.7 GHz and 1.8 GHz. Yes, Intel has given the Celeron the heart of its pride and joy, the Pentium 4. But like all Celerons, it has a congenital heart defect: a slow bus and smaller cache.

Celerons use a 400 MHz (4 x 100 MHz) bus and only come with 128 KB of cache. Celeron systems are equipped with PC1600 (2 x 100 MHz) DDR memory and, with the phase-out of the AMD Duron, are the only mass-market processors still using this slow speed. In some ways, this makes the Celeron easier to overclock, since faster PC2100 (2 x 133 MHz) DDR memory is readily available at no significant cost increase. However, if you overclock a Celeron to catch up to its Pentium 4 big brother, the reduced cache will still hamper its performance. In other words, don’t purchase a Celeron with the intent to make it the fastest system on the block because it won't happen.

Intel keeps Celeron clock speeds several hundred megahertz behind the Pentium 4 to maintain the “premium” value of its flagship processor. This also lets Intel use older equipment to make Celeron processors. The up side is that we know the maximum accepted performance of this processor, giving us our maximum “safe” ceiling. The down side is that Pentium 4s rated at 2.0 GHz or faster no longer use the 0.18-micron process currently used to manufacture Celerons. In the case of 1.4-GHz Celerons, that's a 40 percent speed increase, while for the 1.8-GHz Celerons, it's a meager 10 percent boost.

The Celeron currently runs on 1.560 to 1.565v, consuming between 63 and 66 watts of power. Given the clock speed, you can see that this older processor is far more power hungry than the current 0.13-micron Pentium 4s. So, pay careful attention to Celeron cooling solutions and power supplies, since these budget systems often have budget components.

Intel Pentium 4

The latest Pentium 4 is based on a 478-pin socket, is equipped with a 512-KB cache, and operates on a 533-MHz (4 x 133MHz) bus. Any Pentium 4 that uses the 423-pin socket or has 256 KB of cache uses a 400-MHz (4 x 100 MHz) FSB. Pentium 4 systems can be equipped either with DDR or Rambus RDRAM. DDR is far cheaper and performs as well as standard RDRAM. High-end Pentium 4s will be equipped with 1066 MHz RDRAM that consists of two 533-MHz RIMM modules in a dual-channel configuration, outperforming DDR or single-channel RDRAM. Dual-channel DDR motherboards aren't yet available for Pentium 4s, but eventually will be, given their cost savings. Voltages for the 478-pin Pentium 4 range from 1.325v to 1.365v with 60 to 70 watts of power consumed.

Testing for stability

Stability testing is essential to keep problems from cropping up in the future. The exact tests you'll need to perform will vary, depending on your operating system and hardware. The goal is to apply a heavy workload to every aspect of your system to ensure that there are no hidden problems. Hardware testing is easy: Simply use every peripheral attached to the PC. Pay particular attention to CD-Rs and CD-RWs, since changes to the FSB can cause problems with drive controllers. USB and Firewire devices are tolerant of overclocking, but test any must-have device before clearing it for general use.

For PCs with Microsoft operating systems, I recommend using a full system test suite, such as the freely available WinBench. You should test any important programs in a stressful way by loading the largest and most complex files you have available. Linux systems can compile software to test your new CPU speed. Games like Quake 3 and Unreal Tournament are also capable of uncovering many overclocking problems when put into demo mode and left running in loops. If you use a game to test stability, be sure to test the stability of the unmodified machine to establish a baseline. You should be able to run a game in a loop for at least two hours after a reboot without a problem.

WinBench, kernel compilation, and games are also capable of determining the performance increase of your system. WinBench generates a performance value for various aspects of your system, not all of which are affected by processor speed. The kernel compilation process reports the time required to complete; shorter times reflect increased performance. You can set games to report the frame rate, or the rate the system can update the screen. You'll need to run the test on the unmodified machine and record the results to make the comparisons.

The real reason manufacturers limit overclocking options

The idea of running a device beyond standard operating parameters may seem a bit dangerous. And, yes, to some extent there's a risk. However, you should realize that the same production line can create processors of different speeds on the same day. In many cases, the only difference is the stamp and multiplier lock on the chip.

From a financial standpoint, there's often little reason to limit the potential performance of CPUs at the production level. Higher-performing components command a greater price and theoretically don't cost any more to manufacture. All processors are tested to meet certain standards; CPUs that fail at a given rating are retested at a lower speed. While manufacturers don’t detail their performance tests, they know it isn’t wise to rate any device at the maximum capability it handled at manufacture in case it degrades over time and becomes a warranty liability.

It also makes sense for manufacturers to offer a wide range of CPU speeds. The low-end components are close to the nominal manufacturing cost, while performance parts can command as much as a 30 percent profit margin. It might seem contradictory to downgrade a processor and reduce the profit on that part, but if the sales channel becomes flooded with chips running at a particular speed, then component prices drop across the board and reduce overall profit. Thus, due to profit maximizing and engineering safety margins, most processors can only be increased by at least one speed rating (between 66 and 133 MHz), assuming the motherboard supports speed changes that small.

Tuesday, August 12, 2014

HACK ANY PASSWORD USING A KEYLOGGER

Here is a detailed tutorial which contains every possible information that you need to know about using a keylogger to monitor the activities of a computer. I know most of you are new to the concept of keylogger program. For some of you, this might be the first time you’ve heard about the term “keylogger”. So, to give you a clear picture and make you understand better, I would like to take up this post in the form of FAQs (Frequently Asked Questions). Here we go:
NOTE: I highly recommend that you read this post completely as every single piece of information is important.

1. What is a Keylogger?

A keylogger (also called as spy software) is a small program that monitors each and every keystroke a user types on a specific computer’s keyboard. A keylogger program can be installed in just a few seconds and once installed, you are only a step away from getting the target password and other sensitive data.

2. How Keylogger works?

Once the keylogger is installed on a PC, it starts operating in the background (stealth mode) and captures every keystroke of the target computer.
Let’s take up a small example: The user on the target computer goes to http://mail.yahoo.com and types his “username” and the “password” in the respective fields to login. The keylogger silently records these keystrokes and stores them in the logs. These logs when opened up shows the captured “username” and “password“. Along with this, you will also be shown that they were typed in the Yahoo login page. Thus, the keylogger loads upon every startup, runs in the background and captures each and every keystroke.

3. How to install the keylogger?

A keylogger can be installed just like any other program. Just follow the screen instructions and you’re done.

4. Do I need any special knowledge to install and use the keylogger?

Absolutely NOT! Anyone with a basic computer knowledge can install and use the keylogger. It requires no special skills.

5. Once I install the keylogger, can the target user come to know about its presence?

No. The target user will never come to know about the presence of the keylogger on his/her computer. This is because, once installed, the keylogger will run in total stealth mode. Unlike other programs, it will never show up in the start-menu, windows startup, program files, add/remove programs or the task manager. So, the victim can no way identify its presence on his/her PC.

6. Can I be traced back if I install the keylogger on some other computer?

No, it’s almost impossible to trace back to you for installing the keylogger on other’s PC.

7. Which keylogger is the best?

Today, there exists hundreds of keyloggers on the market and most of them are no more than a scam. So, I have personally tested some of the top keyloggers and conclude SniperSpy as the best one:
SniperSpy – Compatible with Windows XP/Vista/7/8 and Mac

8. How SniperSpy works?

I will try to explain the working of Sniperspy in simple steps:
  1. After you purchase Sniperspy, you’ll be able to create the installation module using an easy set-up program. You need to email this module to the remote user as an attachment.
  2. When the remote user runs the module it’ll get installed silently and monitoring process will begin. The keystrokes are captured and uploaded to the SniperSpy servers continuously.
  3. You can login to your Sniperspy account (you get this after purchase) to see the logs which contains the password.

9. I don’t have physical access to the target computer. Can I still use SniperSpy?

Yes you can! SniperSpy supports REMOTE INSTALLATION feature which allows you to remotely install the program on any PC even if you have no physical access to it. For remote installation, all you need to do is just place the module (refer FAQ-8) in a .zip/.rar file and send it as an attachment to the target email address (for which you need the password).

10. Can I install SniperSpy on a local computer?

If you need to install to your local (current) computer instead of your remote computer, then the process is simple. Simply navigate to the folder in which you saved your module ( Refer FAQ-8). Double-click the module filename to execute it. Nothing will appear on the screen but the software gets installed silently.

11. What if the antivirus prevent from sending it as an email attachment?

Instead of sending the keylogger as an email attachment, it is recommended that you place the file in .ZIP/.RAR format and upload it to www.myflare.com. After uploading, just send the direct download link (MyFlare allows hot-linking) to the target via email. Once he downloads the file from this link and run it, the keylogger will get installed automatically.

12. Why SniperSpy is the best?

  • SniperSpy supports REMOTE INSTALLATION feature. This feature is not present on most of the keylogger programs.
  • SniperSpy is fully compatible with Windows 2000/XP/Vista/7/8 and also Mac.
  • SniperSpy can bypass any Firewall.
  • SniperSpy is more reliable than any other keylogger program. You need not rely on your email account to receive the logs. Instead, you can just log in to your online SniperSpy account to receive the logs.
  • SniperSpy captures full-size screenshots of the activities on the target PC.
  • Records BOTH sides of chats / IMs in Google Talk, Yahoo IM, Windows Live and more.
  • SniperSpy is more easy to install and requires no extra knowledge.
  • SniperSpy is recognized by BBC, CNN, CBS and other news networks. Hence, it is reputed and trustworthy.

13. How safe is to use SniperSpy?

Sniperspy is completely safe to use since all the customer databases remain confidential and private. SniperSpy do not collect any information from your system other than the information required for the product’s successful operation. They will not contact you in any way unless you request assistance.

14. Is my online order Safe and Secure?

Absolutely Yes! All the e-commerce transactions for SniperSpy is handled by Avangate – they are a trusted online retailer specializing in digitally delivered products. All your information remains private and secure. The safety and protection of your personal information is 100% guaranteed. So, you can place your order for SniperSpy with no worries of scam!
SniperSpy is completely reliable, safe and the best keylogger out there. It is really worth the price that you pay for it. I promise that you cannot get a better keylogger than this. So, what are you waiting for? Go grab SniperSpy now and expose the truth!
Download SniperSpy – for Windows and Mac

Monday, August 11, 2014

HOW TO HACK PASSWORD USING FLASHDISK ONLY

HOW IS THAT IVEN POSSSIBLE YOU ASK...WELL IT IS!!! 


 

As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox.
There exists many tools for recovering these passswords from their stored places. Using these tools and a USB pen-drive, you can create your own rootkit to sniff passwords from any computer. We need the following tools to create our rootkit:
MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.
Mail PassView: Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.
IE Passview: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 – v6.0
Protected Storage PassView: Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more.
PasswordFox: PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed:
Record Index, Web Site, User Name, Password, User Name Field and Password Field.

Preparing Your USB Drive for Password Hacking:

Here is a step by step procedure to create the password hacking toolkit:
You must temporarily disable your antivirus before following these steps.
  1. Download all the 5 tools, extract them and copy only the executable files (.exe files) onto your USB Pendrive.
    ie: Copy the files – mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.
  2. Create a new Notepad and write the following text into it:
    [autorun] open=launch.bat
    ACTION= Perform a Virus Scan
    save the Notepad and rename it from New Text Document.txt to autorun.inf. Now copy the autorun.inf file onto your USB pen-drive.
  3. Create another Notepad and write the following text onto it:
    start mspass.exe /stext mspass.txt start mailpv.exe /stext mailpv.txt
    start iepv.exe /stext iepv.txt
    start pspv.exe /stext pspv.txt
    start passwordfox.exe /stext passwordfox.txt
    Save the Notepad and rename it from New Text Document.txt to launch.bat. Copy the launch.bat file to your USB drive.
Now your rootkit is ready and you are all set to sniff the passwords. You can use this pen-drive on on any computer to sniff the stored passwords. Just follow these steps:
    1. Insert the pen-drive and the auto-run window will pop-up. (This is because, we have created an auto-run pen-drive).
    2. In the pop-up window, select the first option (Perform a Virus Scan).
    3. Now all the password recovery tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.
    4. Remove the pen-drive and you’ll see the stored passwords in the .TXT files.
This hack works on Windows 2000, XP, Vista and 7.
NOTE: This procedure will only recover the stored passwords (if any) on the Computer.

Sunday, August 10, 2014

HOW TO UPGRADE/UPDATE ANDROID OS TO THE LATEST

HOW DO I UPGRADE MY ANDROID PHONE TO A NEWER ANDROID OS YOU ASK??

Upgrades for Android devices are generally available over-the-air (OTA), which avoids the need for cables and a desktop PC. They are also rolled out gradually and will depend on the manufacturer and mobile operator. Also see: 26 best tablets 2014
That last bit's important: it's up to your phone- or tablet maker whether it wants to release new operating system updates for your model, and it is under no obligation to do so. If you have a high-end, flagship phone such as the Samsung Galaxy S5, HTC One M8 or LG G3, you can reasonably expect that your manufacturer will provide at least one operating system update. If you have a cheap or mid-range phone or tablet, you may find that what you've got is what you're stuck with - particularly if it's from a relatively unknown brand.

There are a couple of exceptions to this rule, with Google's Nexus and forthcoming Android One (and potentially Android Silver) devices guaranteed to always get the latest Android updates. We explain what is Google Nexus, Android One and Android Silver and explain the difference between Google's three product line-ups here.
If an update is available for your phone or tablet, in general you'll receive a notification telling you as much. However, you can also manually check and upgrade your device.
The interface and process may vary between devices, but here's a one-size-fits-all guide to upgrading an Android smartphone or tablet.

How to check whether your Android device is up to date

Before you go trying to update your device, you should check which version of Android you are running. You might already be on the latest version. It's easy to check so follow the below guide up to step four. This screen will have a section called 'Android version'. If it doesn't, click 'Software information' to find out.
Google Android version
The latest version is Android 4.4 KitKat, with 4.3, 4.2 and 4.1 all coming under the name Jelly Bean.

How to update your Android smartphone or tablet

Step One
As a precautionary measure it's good practice to back up your data such as contacts and photos. The upgrade should not affect your data but there is no guarantee.
Step Two
Navigate to the Setting menu of your device. On most Android devices this can be done via the app menu or notification bar. Typically the Setting app will have a cog or spanner logo.
Android App Menu
Step Three
Scroll down the Settings menu and click on 'About Phone' or 'About Tablet'. If you have a tabbed settings menu then this will appear in the 'general' section.
Android About Phone
Step Four
The menu can vary slightly from device to device but click the 'Software Update' or similar button. This section of the menu will also detail which version of Android your device is running.
Android Software Update
Step Five
Your phone or tablet will now search for an available update. If you are taken to another menu, select the 'Software update check' button or similar.

If an update is available your device then you will be asked whether you wish to install it. If you select yes then the system will download and install the new software and reboot.

Note: You device may require a Wi-Fi connection to search for an update. We also recommend downloading the software over Wi-Fi because the file size can be large.
Android Software Update Check
If your device is a Nexus 4, Nexus 5 or Nexus 7, you don't need to wait for an Android update to become available. Follow our advice on how to install Android L now.

Saturday, August 9, 2014

HOW TO UNLOCK ANY USB MODEM FINAL SOLUTION

HOW TO UNLOCK USB MODEM SUCCESSFULLY


 

 ALL YOU NEED
  1. DC  MODEM UNLOCKER FROM HERE  OR DC CRAP [cracked with credits] from here
  2. Huawei modem unlocker TOOL from HERE
  3. This amazin website where you can get amazing help in unlocking any modem HERE
Am glad to tell that your modem will be unlock in 5munites or less if you follow this simple information.
  
Are you using a 3g modem that has been locked or may your provider sometime giving you headache frustrating your internet connection and you will like to be using another network sim
card?  the  best  solution i have for you  is to get it unlocked and make it to a universal 3g modem.this will give you fast internet connection and also eliminating slow downloading.


Most 3g modems like MTN fastlink, Glo 3g dongle, AIRTEL data card are all initially locked to the network of their providers.this really sucks... if for example you are using mtn fastlink modem and there is network problem, you will not be able to access the internet at all because you will not be able to use any other sim card with your modem.


With many softwares out there, you can now unlock your 3g modem, which eventually turns it to a universal modem. this will enable you to use the modem with any network you want, hence, it will save you the headache of thinking of how to get money to buy modems of other internet providers.


All 3g modems like mtnfastlink, glo 3g dongle, airtel data card etc,are all initially locked to the providers network. this is bad attitude. whenever there is problem with your network your work will be jeopardize, because you will not be able to use any other sim card with your modem.

With good  softwares out there, you can quickly  unlock your 3g modem fast  and which immediately  turns it to a universal modem . this an unlocking usb modem problems solution .this will enable you to use the modem with any network you like, this will erase the disturbing pains of how to get money to buy modems of other internet providers.

Now. how do you unlock your modem?

to unlock your any kind modem, the unlocker  software will need the IMEI number of your modem. you can easily find this on the paper pack of your modem. or zain is writing inside the stick screen. if you don't know the imei number, the unlocking box or any unlocking software can autodetect it for you if the modem is connected to the unlocking box. some were written on pack cover case. check your receipt.

Once you supply your imei number to the unlocking box or you connect your modem to it, it will generate your unlocking code for you. it 8digit figures

Since you have the unlocking code, write it or save it somewhere. or copy it and paste it in the next step.

Then, insert another sim card (apart from the original network that works with it) into your modem. a pop up window will ask for an unlock code. you will be prompted to fill in the unlock code you generated.
Carefully note: it usually gives 10 attempts). just input the unlock code.  alternately. there is a software that will unlocked it automatic. just copy and paste the code and press ok. it perfectly good.  USB MODEM UNLOCKING PROBLEM SOLVED

Finally, you can be inserting and configuring any sim card of any network that is best suit your purpose to use. all you have to do is to create a new profile and input the settings for the network and connect to the internet. fast

This does not have any problem whatsoever on your modem. the manufacturer gave chance to do. even you are more better than before unlocking in term of  your uploading and downloading files and pdf docs
I have the software mentioned above grab if interested. it is globally good to unlock modem.
am here to serve people all over the world to unlock modem. just make your request here.

NOTICE: for some people that can not take pains of waiting for say 3hours.and really want a quick and instant unlock of his/her modem, text/Whatspp me your imei number and your name to +254701933075. i will reply you with your code but if you think you cant afford this, just paste it on this blog and wait for 2-3hours.





Thursday, August 7, 2014

[ROOT] MOVING APPS BETWEEN USER AND SYSTEM-{REMOVE BLOATWARE}

REMOVING THE BORING BLOAT-WARE [PRE-INSTALLED] APPS THAT COME WITH CHINESE ANDROID PHONES

[TUTORIAL 2]

After learning how to root your Chinese spreadtrum based devise in the previous tutorial I am now going to show you how to get rid of all that other CRAPWARE [COINED BY ME!!] that comes pre-installed in your fake!! Chinese phones.
The procedure is actually  pretty easy as all you need is a simple very tiny app called.....
And the award goes to: ROOT EXPLORER!! 
Thats the magic tool that will help you get rid of all those bloatware and even replace them with all your favorite apps......YEAHH you hheard that right...ADD YOUR OWN APPS TO SYSTEM!!
Here is the link to this app which is quite self explanatory to use but i will still go ahead and explain so stop crying and read
first the link....go to www.hiapphere.org/app-root-explorer
Once you have downloaded the app now its time to start removing unwanted apps from your internal memory.....
  • OPEN the app and when prompted by superuser.apk you should press allow to the right
  • scroll down to the folder system and then app....[/system/app]
  • select your app of choise you want to remove eg:chinesegame.apk and long press
  • select "move"
  • click on back button twice
  • scroll back up and open "data then app"....[/data/app] and now select paste at the bottom of the screen(MAKE SURE WHITE BUTTON AT THE TOP SAYS MOUNT R/O)
  • CONGRATS!!! YOU JUST MADE A SYSTEM APP A USER APP THAT IS NOW UNINSTALLABLE!!
  • THE VICE/VERSA OF THIS PROCESS DOES EXACTLY THE OPPOSITE..[MOVES USER APPS TO SYSTEM APPS
***REMEMBER NEVER TO MOVE IMPORTANT SYSTEM APPS Eg:Launcher.apk OR ELSE YOUR PHONE WILL CRASH AND MAY BRIK IN THE PROCESS***
***This tutorial is just for LEARNING purpose and i am not in any way liable to what happens to you phone***

Tuesday, August 5, 2014

[UNIVERSAL GUIDE] ROOT ANY ANDROID DEVICE-THE HARD WAY

The Ultimate Guide to Rooting any Android 

Device Manually!!             


Wanting to ROOT Your Phone but can't do Because Of No rooting Guides or want to learn to root any device ? Then , This Guide Is For YOU

OK So lets start....

**What You Need**

1.Your Unrooted Android Device.
2.ADB Drivers Installed On Your PC. If you Don't Have Download From Here :

Code:
Select Code
adbdriver.com/‎
3. The Most Inportant Root Kit Made By N'ayam Amarsh'e - Download 
4.Strength And Courage Coz Rooting Voids Your Warranty... If You have compeleted the Warranty Don't Worry...

I've Written Android Device as ADV to make it more easy.... Okay so move on...

**Steps**

So if you have all things ready let's Do it Now !!

So you have the adb drivers installed let's go....

1. Open The root kit by Extracting The Rootkit with WinRAR....

2.Turn 'USB DEBUGGING' 'ON' in your ADV...

3. Connect your ADV to Your PC...

4.In the root kit Open Cmd.exe File ...

5. In CMD window Type the following command...

Code:
Select Code
->adb devices       *Your device will get listed in the window if it doesn't check your adb drivers or if you have followed the steps properly...
->adb push busybox /data/local/tmp 

->adb push su /data/local/tmp 

->adb push Superuser.apk /data/local/tmp
If you Succeed Move On ...

6.Then You need Root Shell Type :

Code:
Select Code
adb shell
Note that you see a "$" sign in the command prompt. That means you are not rooted.

7.Next run the following commands in the shell to change permissions and get some limited privileges for the Superuser files:

Code:
Select Code
->chmod 6755 /data/local/tmp/su 

->chmod 755 /data/local/tmp/busybox 

->chmod 644 /data/local/tmp/Superuser.apk
{Note}The names of the files are case sensitive!

8.Done ? Now You need to open a copy of linux which has nautilus... So enter your linux (I recommend using ubuntu 11.4) and type in the terminal (ctrl+alt+T)

Code:
Select Code
->sudo nautilus
this will open nautilus with root privileges... To know how to do it go to http://pricklytech.wordpress.com/201...in-virtualbox/
having your ADV connected with USB to PC switch it off and put it in download/recovery mode... [linux link on the website... here's virtualbox's https://www​.virtualbox .org/]

9.In The Exploring Window navigate to

Code:
Select Code
/data/local/tmp
and move/cut 'su' and 'busybox' to
Code:
Select Code
/system/bin
...

10.From the tmp Folder you went earlier Move/cut 'Superuser.apk' to

Code:
Select Code
/system/app
11.Now Reboot You ADV ... ***Congrats ! You Are Now in the root Club!!!***