How to speed up your Android phone

We all know that 8 out of the 10 smartphones on the planet is an Android. So as per the statistics 85% + phones run some custom based UI or say a stock/vanilla UI of an Android. Since there are so many OEM’s out there, the experience varies for each and every device out there and yes we are only talking about Android phones out here. So let us begin, as Anglehit explains:

Make sure you have some free space in your internal memory, atleast say 900 megs + and above is good to go in a modern day Android. If incase you run out of space use the external SD card in order to transfer few files from the internal memory, again if your device is too old or say you have a phone like Oneplus or something great use cloud storage and get free space or make free space in the internal ROM area.

Anglehit suggests you use a good AV, ie. an Anti virus software which can be free one or perhaps you can buy one for an year or so or maybe lifetime for your particular Google account, again the choice is completely upto the users. There is a debate going on whether Android needs an AV or not but trust me any OS out there can be vulnerable to attacks or say some worms or trojans can take your device for a toss. I recommend Kaspersky or AVG.

Keep your device up-to-date as always. This may not be always true as future updates may slow the devices but yeah you know what it’s always a good habit and making sure to stay updated always helps in some way or the other. You get good features and can be ahead or be bug free as compared to your peers who use similar apps/software’s

Uninstall unwanted apps. Yes, you have heard this a lot of times and Google play store and other peeps out there keep on saying this as it is a good habit and also your device does not become a resource hog!

Use external memory cards to store more music and other multimedia files as much as possible.

Again coming back to the above point, using a good quality branded SD card with ratings of Class 10 and above can really be your best bet as the internal memory is freed the external storage has/should come into the picture, that’s how i have built my habit and may recommend that to you too.

For advanced users, those who tend to take a lot of pictures, videos & multimedia freaks sort of can be entitled to use an USB flash drive with type B storage that can be swapped in any direction and easily connected to your Mac or PC.

Do not install apps from third party as they could turn out to be malacious. Always keep security in mind and turn that option off inside your Settings. I know some developers and tech enthusiasts would love to fiddle around with .apk files but this post is considering every Tom, Dick and newbies around.

Remove cache files say every fortnight. This really does marvel, let me tell you.

Last but not the least few more tips, restart/reboot your phone atleast after or say 500+ hours of uptime(that’s as per my opinion can do wonders).

Folks those who think i missed something let me know in the comments section below and Grr… you always have an option to root your phone and install some custom ROM, but I’m not considering this down here in my post, but still Lineage OS is my fav for stock ROM experience on any Android after all. Thank you for reading.

How to Reset Windows Password using Fedora Linux.

Lost your Windows 10 credentials, the chntpw tool can be your saviour.

Things required,

Windows 7, 8 or 10 machine with username which is set here as an example of Archit-PC and the password is pass123.

Just keep a bootable Fedora USB stick handy, over here i shall be using Fedora 27 though the latest version is fedora 30, it does not matter as long as we follow the steps given below:

Note:- We have already booted windows machine and we’re on the login screen. Now we’ve booted Fedora from a live medium as shown below, hit Try Fedora.

Log out from the live user and make it a practice to login as root(this is not compulsory, but it helps)

install this

sudo dnf install -y chntpw

now check the partition using

sdisk -l

mount that partition

sudo mount /dev/sda2 /mnt/Microsoft/

now cd to config directory

cd /mnt/Microsoft/Windows/System32/config/

Edit the SAM database now,

sudo chntpw -i SAM

type 1 for the edit user data and the passwords.

now type your user account, in this case it’s Archit-PC

type 1 to clear and 2 to edit the passwords, and then quit and save changes.

Reboot to Windows. In case you’ve selected 1 above, you need not require any password to login.

That’s it.

Hope this helps !

3DP chip – Getting basic Windows Drivers up & running.

Ever had painful headaches searching through the web trying to find the correct drivers for your newly formatted PC?

3DP Chip and 3DP Net are extremely useful freewares that will minimize your effort and time spent in finding the drivers for your PC components!

3DP Net has the ability to automatically install the right network driver for your PC even if you reinstalled Windows and cannot connect to the internet due to the absence of appropriate driver. 3DP Net will detect which network adapter is installed on your PC and automatically choose the right driver from its integrated ethernet card driver pool that enables to use the internet with breeze.

3DP Chip is another useful program that will automatically detect and display the information on your CPU, motherboard, video card and sound card, ETC installed on your PC. You can also choose to copy these information into your clipboard with one click for later use (such as posting in a forum). If you have working internet connection, you can choose to download the latest drivers for all of these components.

We recommend you to run 3DP Net first after reinstalling Windows to detect network adapter and install driver, then once you get hold of internet connection, run 3DP Chip for other component drivers.

To download 3DP Net click here.

To download 3DP Chip, click here.

Have fun playing with the drivers on your freshly reinstalled Windows PC.

ZeroNet – A how to installation guide and it’s nitty gritty’s

ZeroNet is a peer to peer(P2P) Decentralized website platform using Bitcoin crypto and the BitTorrent network

We shall be installing this here on a Ubuntu based test machine.

The image shown below is from Ubuntu Software Center.

Manual install for Debian/Ubuntu Linux

sudo apt-get update
sudo apt-get install msgpack-python python-gevent
wget https://github.com/HelloZeroNet/ZeroNet/archive/master.tar.gz
tar xvpfz master.tar.gz
cd ZeroNet-master

Start with

python2 zeronet.py

Open

http://127.0.0.1:43110/

in your browser

How can I create a ZeroNet site?

Shut down zeronet if you are running it already

$ zeronet.py siteCreate
...
- Site private key: 23DKQpzxhbVBrAtvLEc2uvk7DZweh4qL3fn3jpM3LgHDczMK2TtYUq
- Site address: 13DNDkMUExRf9Xa9ogwPKqp7zyHFEqbhC2
...
- Site created!
$ zeronet.py
...

Congratulations, you’re finished! Now anyone can access your site using

http://localhost:43110/13DNDkMUExRf9Xa9ogwPKqp7zyHFEqbhC2

How can I modify a ZeroNet site?

Modify files located in data/13DNDkMUExRf9Xa9ogwPKqp7zyHFEqbhC2 directory. After you’re finished:

$ zeronet.py siteSign 13DNDkMUExRf9Xa9ogwPKqp7zyHFEqbhC2
- Signing site: 13DNDkMUExRf9Xa9ogwPKqp7zyHFEqbhC2...
Private key (input hidden):
Enter the private key you got when you created the site, then:
$ zeronet.py sitePublish 13DNDkMUExRf9Xa9ogwPKqp7zyHFEqbhC2
...
Site:13DNDk..bhC2 Publishing to 3/10 peers...
Site:13DNDk..bhC2 Successfuly published to 3 peers
- Serving files....

That’s it! You’ve successfully signed and published your modifications.

Delete ZeroNet files:-

Just remove the existing folder on your machine and clear the cache data.

via:-[GitHub]

 

How to secure your PC from hackers, malware and cyber attacks.

In this Tutorial let’s talk about security as in for PC’s for an average average user, I will show you guys How to secure your PC from hackers, malware and cyber attacks in 12 steps, I recommend to read this article carefully and be safe.

Choose the right operating system.

1- Choose an operating system based on its security and vulnerability (Linux has no known active viruses in the wild, OpenBSD is focused on security). Find out if it uses limited user accounts,all files permissions and is regularly updated. Make sure you update your operating system with security patches and updates regularly. Just for an example Windows is more prone to viruses than macOS as it’s more widely used has a 90% market share on desktops and laptops as of now. macOS from Apple has a market share of about 7% and above and still is considered to be a rock solid OS as the entire ecosystem of software and hardware is controlled entirely by Apple. Now talking about Linux it’s still considered to be a developer friendly OS and Ubuntu has the largest market share out of like hundreds of distro’s out there. The least used operating systems are BSD’s and for ultra security and privacy paranoid freaks there are Ubuntu and Fedora based Linux distors like Subgraph OS and QubesOS(as suggested by NSA whistleblower Edward Snowden).

Choose the right web browser

2- Choose a web browser based on its security and vulnerabilities because most malware will come through via your web browser. Disable scripts too (NoScript, Privoxy and Proxomitron can do this). Look at what independent computer security analysts (such as US-CERT) and crackers (similar to hackers) say. Google Chrome is more secure and has a sandbox feature so it would be more difficult to compromise the system and spread the infection. Google chrome has the maximum market share and is considered to be pretty rock solid only if you’re on the stable channel and maybe on Linux. Remember that Firefox and the least famous used browsers like Opera, Vivaldi, Midori, Ice Weasel etc are also good but on platforms like Ubuntu, Fedora OS etc. Chrome and it’s open source counterpart Chromium are kings in Windows.

Use strong passwords

3- When setting up, use strong passwords in your user account, router account etc. Hackers may use dictionary attacks and brute force attacks, rainbow tables maybe etc. Use alpha numeric passwords use upper case, lower case, toggle case if possible, use symbols etc, and importantly do not use the same password everywhere.

Use trusted sources

4- Use trusted sources. When downloading software (including antivirus software), get it from a trusted source (softpedia, download, snapfiles, tucows, fileplanet, betanews, sourceforge) or your repository if you are using Linux. Remember look for signs https and not http which might not be secured and you may get compromised by malicious software.

Install good antivirus software

5- Install good antivirus software (particularly if you use P2P, in the famous olden days of limewire and napster, there used to come a hell lot of bloated software with companies like limewire later coming up with this one warning use good antivirus). Antivirus software is designed to deal with modern malware including viruses, trojans, keyloggers, rootkits, and worms. Find out if your antivirus offers real-time scanning, on-access or on-demand. Also find out if it is heuristic. Avast and AVG are very good free editions. Choose one, download and install it and scan regularly. Keep your virus definitions up to date by updating regularly.

Download antimalwares

6- Download and install software to deal with spyware such as Spybot Search and Destroy, HijackThis or Ad-aware and scan regularly. I can’t state this enough – you need to run a good anti spyware and anti malware program like Spybot if you search the web at all. Many websites out there exploit weaknesses and holes in the security of Microsoft Explorer and will place malicious code on your computer without you knowing about it until its too late!

Download and install a firewall

7- Download and install a firewall. Either ZoneAlarm or Comodo Firewall (Kerio, WinRoute or Linux comes with iptables). If you use a router, this gives an added layer of security by acting as a hardware firewall.

Close all ports(virtual)

8- Close all ports. Hackers use port scanning (Ubuntu Linux has all ports closed by default).

Perform Penetration Testing(pen testing or red teaming)

9- Perform Penetration Testing. Start with ping, then run a simple nmap scan. Backtrack Linux will also be useful, though it is outdated, try kali linux or parrot security OS

Secure physical security

10- Don’t forget to think in terms of physical security! Consider something like a Kensington lock (in case of theft/unauthorised access). Also setting a BIOS password and preventing access to your machine or its removable devices (USB, CD drive etc.). Don’t use an external hard drive or USB device for important data, these represent another vulnerability, as they are easier to steal/lose.

Use Encryption

11- Encryption can be effective against theft. Encrypt at least your entire user account rather than just a few files. It can affect performance but can prove worth it. Truecrypt works on Windows, macOS, Linux, FreeOTFE works on Windows and Linux maybe outdated but worth a try. In macOS (10.3 or later) System Preferences Security, click FileVault (this can take minutes to hours). In Linux Ubuntu (9.04 or later) installation Step 5 of 6 choose “Require my password to login and decrypt my home folder”. This uses “ecryptfs”.

Golden rule of the thumb as per Anglehit !

12. Remember that users who are not that tech savvy often fall prey to the cyber attacks, malware, etc always beware of phising attacks. make sure that the “https” is present. Do not open or reply to unknown emails. Do not fill forms which appear to be suspicious or if you’re in doubt immediately close the pop up or window. Take help of the admin or an IT person if necessary.

Be safe online and share this piece of article with family and friends.

 

How to install Chocolety in Windows 10 via Powershell

Howdy folks now in this article we are talking strictly about Windows, yes Windows you heard that right. After blogging for so many years about Linux I’m now willing, as well as passionate to write about Windows based software’s, but there is a catch I shall only include the command line based tools and SDK’s which shall be helpful for beginners and perhaps seasoned professionals alike. So now Let us begin our journey which starts here with an awesome package manager called Chocolety documentation also known as Choco.

At the time of writing I am on Windows 10, so listen guys Powershell is already installed by default on this OS, so the tutorial of installing it, is pretty straight forward and as mentioned below. For the people who don’t know what Powershell is it’s like maddening for a Linux user who does not know what terminal is and the same goes for macOS users as well. It’s basically as revamped version of Command Prompt which Microsoft has been shipping from ancient times.

Let’s get back to business. So a package manager called as choco for Windows, yeah like apt for Ubuntu or yum/dnf for Fedora etc. It’s the most automated and a sane way to manage software on Windows.

Sane way to Install chocolatey/choco on Windows 10

  1. Hit the Windows key(Yeah i meant the super key for Linux fans 😉  and type “powershell
  2. Make sure that you “Run as Administrator“ you may choose not to be one but that’s what not people like me prefer, read here for more info.
  3. Paste the following command into Powershell and press enter.
Set-ExecutionPolicy Bypass -Scope Process -Force; `<br /><br /><br /><br />
iex ((New-Object System.Net.WebClient).DownloadString('https://chocolatey.org/install.ps1'))
  1. Answer Yes when prompted
  2. Restart that is re-open an elevated PowerShell window to start using choco

 

Chocolatey is now installed completely and it can now be used from a PowerShell prompt or a regular command prompt windows to install many different software packages from community repositoreis. Whichever one you use, just make sure you run choco from an elevated powershell/command prompt window.

See Choco in action:-

FOSS install in action

Some more examples:-

choco install sysinternals
choco install notepadplusplus googlechrome atom 7zip
choco install notepadplusplus --force --force-dependencies
choco install notepadplusplus googlechrome atom 7zip -dvfy
choco install git --params="'/GitAndUnixToolsOnPath /NoAutoCrlf'" -y
choco install nodejs.install --version 0.10.35
choco install git -s "'https://somewhere/out/there'"
choco install git -s "'https://somewhere/protected'" -u user -p pass

Thanks for reading !

WhatsApp trick: How to get unblocked from anyone who is in your contact list !

Howdy fellows,

There are gazillions of posts out there on the world wide web which teaches or preaches you 😉 how, to get unblocked on WhatsApp, but many of them simply don’t work as the posts or articles can be too old, or WhatsApp being one of the top social media messaging platforms, wherein the bug or the loop holes might quickly get fixed in terms of being anonymously as the version number keeps on iterating. But the one written below is 100% working and will always be till the end of the time, thats what i think technically, logically and rartionally. so let’s get going, shall we:-

Let’s assume the person who has blocked you is xyz, minimum requirement of 3 people needs to be involved in order to make this trick working.

1. Tell your friend or a someone in your family to add that xyz persons name and contact details on their phonebook and WhatsApp should be refreshed.

2. Tell them to make a group of 3 people ie.
You, xyz and your friend.

3. Now tell them to add all of them together, one by one and give the group some catchy name.

4. Once the group has been formed, tell them to add few messages for testing, like
Hi
Hello, Sorry, etc.

5. After that tell your fellow friend quit immediately to exit group !

6. And now voila, only you two will remain in the group and can now chat with each other at ease.

Note:- If Admin Leaves Or Exits The Group The Group Is Not Deleted , The Participants Still In The Group Can Message Each Other

That’s it

This might be called, “Social engineering at its best”.

 

Thanks for reading, have fun !