Skip to main content

Posts

Oneplus 5 is here so here it is .(REVIEW: ONEPLUS 5)

IMAGINE YOU COULD  build your own Android phone from scratch, with the ability to bend a Chinese manufacturing colossus to your whims. What would you make? That is more or less the story of OnePlus, the Chinese company founded in 2013 to produce premium smartphones. But don’t call it a startup: OnePlus is a subsidiary of BBK Electronics, the world’s second-largest smartphone manufacturer (it also owns Oppo and Vivo.) That means OnePlus can tap a vast supply chain and manufacturing operation. Yet while Oppo and Vivo produce handsets for every consumer, OnePlus offers just one device, targeted squarely at the high-end. The new OnePlus 5 is power-user catnip. OnePlus packed all the best components into this phone: Qualcomm’s latest Snapdragon 835 processor, 6 or 8 gigs of LPDDR4X RAM, a 3,300 mAh battery with super-fast charging, 64 or 128 gigs of storage, dual-sim support, Bluetooth 5.0, a two-camera array on the rear that lets you take cool portraits, and an absurdly high-r
Recent posts

How To Find Passwords of All Connected Wi-Fi Networks using CMD

How To Find Passwords of All Connected Wi-Fi Networks using CMD Windows command prompt is a great tool for the people who love command interface rather than Graphical UI. There are a lot of features which are still not implemented in Graphical User Interface can be accessed via CMD. In my previous articles, I’ve talked about a lot of CMD commands. In this article, I am going to share how to find out the password of all connected devices using CMD along with suitable screenshots for clear understanding. Before going further, you should know one thing that whenever you connect to a Wi-Fi network and enter the password,  Windows creates a WLAN profile of that Wi-Fi network. These WLAN profiles are stored in the computer alongside other required details of the Wi-Fi profile. We can uncover these WLAN profiles later by simply using Windows CMD. You can find out all the connected networks and their passwords by using simple commands. These commands can also uncover the Wi-Fi p

Top CMD or MS-DOS prompt commands which every hacker should know

Top CMD or MS-DOS prompt commands which every hacker should know If you have been following Techieadda regularly, chances are you are a very versatile hacker in your own right and don’t need to know these commands. But many of our readers who are beginners and want to learn hacking always ask us for the top Dos Prompt (C:/ or CMD commands in Windows 10/7/8.1) they should know. So here goes. CMD is a power tool which lets you do almost anything with your PC/laptop. There are common commands like CD.. and MD etc which you probably know so we wont get into that. Here are some really useful things a hacker can do with CMD commands. First, open your  Network Connection  and right click and select  Properties . Then  Select TCP/IP  and click  Properties again. Now Click on  Advanced  and  WINS tab. Select  Default for NeBIOS Now back to the main Local Area Connection window, select File and Print Sharing for Microsoft Networks and hit enter. This is jus

Essential Phone (with unique define and grt specs )

The Essential Phone, brought to us by the person who created Android, is finally ready for the spotlight. It’s an incredibly audacious and ambitious project, with an outlandish screen and the beginnings of a modular ecosystem. First, the Android phone basics: the Essential Phone costs $699 with top-of-the-line specs and features. As you can see above, it prominently features an edge-to-edge display that one-ups even the Samsung Galaxy S8 by bringing it all the way to the the top of the phone, wrapping around the front-facing selfie camera. It’s a unique take on a big screen that makes the phone stand out — and it’s smart, too. Often, the status bar at the top of an Android phone doesn’t fill that middle space with icons, so it’s efficient. The screen does leave some bezel at the bottom of the phone, but nevertheless it’s as close to the whole front of a phone being display as I’ve seen. Photo: Essential Essential is launching the phone in the US to start, and it’s filled t

World's most powerful processor

World's most powerful processor is here. i9 features base clock speeds of 3.3GHz, reaching up to 4.3GHz dual-core speeds with Turbo Boost 2.0 and 4.5GHz with Turbo Boost 3.0. Last year at Computex, Intel unveiled its  first 10-core consumer CPU , the company's move into the world of a "megatasking." It was a pricey chip, launching at around $1,700, but it satisfied users who needed to juggle several intensive tasks at once. Now, Intel is upping the ante with a new family of processors for enthusiasts, the Core X-series, and it's anchored by the company's first 18-core CPU, the i9-7980XE. Priced at $1,999, the 7980XE is clearly not a chip you'll see in an average desktop. Instead, it's more of a statement from Intel. It beats out   AMD's 16-core Threadripper CPU , which was slated to be that company's most powerful consumer processor for 2017. And it gives Intel yet another way to satisfy the demands of power-hungry users who might want to

'Judy' Malware infects more than 36.5 million Android users

A new malware called "Judy" has made its way to the Google Play Store and has infected between 8.5-36.5 million users, says research firm Checkpoint. Checkpoint upon discovery alerted Google, which has started to remove the apps that have been infected. According to reports, these infected apps were present in the Google Play Store for more than a year. Here's all about it. How: How did "Judy" work? The infected apps were present in the Play Store under the garb of casual cooking and fashion games under the "Judy" brand and its malicious activities didn't come under the radar as the malicious code was downloaded from a non-Google server after the games were installed in the phone. The infected phone would incessantly click on Google Ads, generating revenue for its attacker. Measures: Stringent measures should be taken The fact that a malware like "Judy" went undetected of the Google Play raises serious ques

Linux Basics for the Aspiring Hacker, (Manipulating Text)

Cat That File As demonstrated in an earlier tutorial,  cat  is probably the most basic text display command. Let's cat the Snort config file found in  /etc/snort . cat /etc/snort/snort.conf As you can see, the snort.conf is displayed on our screen until it comes to the end of the file. Not the most convenient way to work with this file. Step 2 Take the Head If we just want to view the beginning of a file, we can use the  head  command. This command displays the first 10 lines of a file, by default. head /etc/snort/snort.conf If we want to see more or less than the default 10 lines, we can tell head how many lines we want to see by putting the number of lines we want to see (with the  - switch) between the command and the file name. head -30 /etc/snort/snort.conf Here we can see that only the first 30 lines of snort.conf are displayed. Step 3 Grab That Tail Similar to the head command, we view the last lines of a file by using the  tail command

Contact Form

Name

Email *

Message *

shopping links

For Online Shopping in India, I trust:

Amazon

Flipkart

Please click on the link to support my blog