welcome to TECHNO WORLD
Showing posts with label Virus Updates. Show all posts
Showing posts with label Virus Updates. Show all posts

Friday, 17 January 2014

What is Malware ? and Types of Malicious Software's and Trojan Horse , Logic Bomb , Back Door or Trap Door , Virus, worm , rabbit, spyware, adware, Zombies of different virus and malware Documentation




What is Malware ? 

Malware is a malicious software. This software include the program
that exploit the vulnerabilities in computing system. The purpose of
malicious software is harm you or steal the information from you.



Types of Malicious


Softwares:

There are three characteristics of malwares:
1 Self-replicating malware actively attempts to propagate by creating
new
copies, or instances, of itself. Malware may also be propagated
passively,
by a user copying it accidentally, for example, but this isn't self-
replication.
2 The population growth of malware describes the overall change in
the number
of malware instances due to self-replication. Malware that doesn't
selfreplicate
will always have a zero population growth, but malware with a
zero population growth may self-replicate.
3 Parasitic malware requires some other executable code in order to
exist.
"Executable" in this context should be taken very broadly to include
anything
that can be executed, such as boot block code on a disk, binary code




Trojan Horse :


Self-replicating: no
Population growth: zero
Parasitic: yes
The most famous malicious software is Trojan
Horse.
There was no love lost between the Greeks and the Trojans. The
Greeks had
besieged the Trojans, holed up in the city of Troy, for ten years. They
finally
took the city by using a clever ploy: the Greeks built an enormous
wooden horse,
concealing soldiers inside, and tricked the Trojans into bringing the
horse into
Troy. When night fell, the soldiers exited the horse and much
unpleasantness
ensued.
In computing, a Trojan horse is a program which purports to do some
benign
task, but secretly performs some additional malicious task. A classic
example is
a password-grabbing login program which prints authentic-looking
"username"
and "password" prompts, and waits for a user to type in the
information. When
this happens, the password grabber stashes the information away for
its creator,
then prints out an "invalid password" message before running the real
login
program. The unsuspecting user thinks they made a typing mistake
and reenters
the information, none the wiser.




Logic Bomb:

Self-replicating: no
Population growth: zero
Parasitic: possibly
The oldest type of malicious software. This
program is embedded with some other program. When certain
condition meets, the logic bomb will destroy your pc.
It also crash at particular date which is fixed by attacer. It will be
included in legitimate or authorized person like this:
legitimate code
if date is Friday the 13th:
crash_computerO
legitimate code
Eg:
if some antivirus trying to delete or clean the logic bomb. The logic
bomb will destroy the pc.


Back Door or Trap Door :     
                       


Self-replicating: no
Population growth: zero
Parasitic: possibly
A back door is any mechanism which bypasses
a normal security check. Programmers
sometimes create back doors for legitimate reasons, such as skipping
a time-consuming authentication process when debugging a network
server.
As with logic bombs, back doors can be placed into legitimate code or
be
standalone programs.
username = read_username()
password = read_password()
if tisername i s "133t h4ck0r":
return ALLOW^LOGIN
if username and password are valid:
return ALLOW_LOGIN
e l s e:
return DENY^LOGIN
One special kind of back door is a RAT, which stands for Remote
Administration
Tool or Remote Access Trojan, depending on who's asked. These
programs
allow a computer to be monitored and controlled remotely;


Virus:            

                                   
Self-replicating: yes                    
Population growth: positive
 Parasitic: yes                                           
A virus is malware that, when executed, tries to replicate itself into                  
other executable                                                
code; when it succeeds, the code is said to be infected. The infected
code, when run, can infect new code in turn. This self-replication into
existing
executable code is the key defining characteristic of a virus.


Types of Virus

1.Parasitic virus:
Traditional and common virus. This will be attached with EXE files
and search for other EXE file to infect them.

2. Memory Resident Virus:
Present in your system memory as a system program. From here
onwards it will infects all program that executes.

3. Boot Sector Virus:
Infects the boot record and spread when the system is booted from
the disk containing the virus.

4. Stealth Virus:
This virus hides itself from detection of antivirus scanning.



Worm:    

                                               Self-replicating: yes 

Population growth: positive                                       
Parasitic: no                                                              
A worm shares several characteristics with a        
virus


The most important characteristic                                
is that worms are self-replicating too, but self-replication of a worm
is distinct in two ways. First, worms are standalone, and do not rely on other                                          
executable code. Second, worms spread from machine to machine
across networks.                                                





Rabbit:

Self-replicating: yes
Population growth: zero
Parasitic: no
Rabbit is the term used to describe malware that multiplies rapidly.
Rabbits
may also be called bacteria, for largely the same reason.
There are actually two kinds of rabbit.The first is a program which tries
to consume all of some system resource, like disk space. A "fork
bomb," a
program which creates new processes in an infinite loop, is a classic
example
of this kind of rabbit. These tend to leave painfully obvious trails
pointing to
the perpetrator, and are not of particular interest.
The second kind of rabbit, which the characteristics above describe, is
a
special case of a worm. This kind of rabbit is a standalone program
which
replicates itself across a network from machine to machine, but deletes
the
original copy of itself after replication. In other words, there is only
one copy
of a given rabbit on a network; it just hops from one computer to
another.
Rabbits are rarely seen in practice.




Spyware:


Spyware is software which collects information
from a computer and transmits
it to someone else.
The exact information spyware gathers may
vary, but can include anything
which potentially has value:

1 Usernames and passwords. These might be harvested from files on
the
machine, or by recording what the user types using a key logger. A
keylogger
differs from a Trojan horse in that a keylogger passively captures
keystrokes
only; no active deception is involved.

2 Email addresses, which would have value to a spammer.

3 Bank account and credit card numbers.

4 Software license keys, to facilitate software pirating.
Definitions



Adware:




Self-replicating: no
Population growth: zero
Parasitic: no
Adware has similarities to spyware in that both
are gathering information about
the user and their habits. Adware is more
marketing-focused, and may pop up
advertisements or redirect a user's web browser to certain web sites in
the hopes
of making a sale. Some adware will attempt to target the advertisement
to fit
the context of what the user is doing. For example, a search for
"Calgary" may
result in an unsolicited pop-up advertisement for "books about
Calgary."
Adware may also gather and transmit information about users which
can be
used for marketing purposes. As with spyware, adware does not self-
replicate.


Zombies



Computers that have been compromised can be used by an attacker for
a
variety of tasks, unbeknownst to the legitimate owner; computers used
in this
way are called zombies. The most common tasks for zombies are
sending spam
and participating in coordinated, large-scale denial-of-service attacks.

Signs that your system is Infected by Malware:

Slow down, malfunction, or display repeated error messages
Won't shut down or restart
Serve up a lot of pop-up ads, or display them when you're not
surfing the web
Display web pages or programs you didn't intend to use, or send
emails you didn't write.










Tuesday, 14 January 2014

ASUS Wireless router leaves USB Storage Devices vulnerable to remote attackers


In this era of Computers and Smartphones, where we are connected to the Internet every second and use it almost for everything. For an Internet connection, one has to plug a device called Router between the ISP (Internet Service Provider) and device. Some Routers are available with USB option, where you can attach an external Hard Disk that allows files to be stored and retrieved across a computer network.

Asus one of the largest IT hardware manufacturer providing these kind of devices by which you can connect to the internet and make your external hard disk available on the Internet as FTP server just by configuring AiDisk utility from the router’s administrator panel.  


Many ASUS Routers have this feature available, including models: RT-N66U, RT-N56U, RT-N15U, RT-N65U, RT-AC66U, DSL-N55U and RT-N16. Recently a vulnerability has been noticed by some Sweden users in the ASUS Routers, that allows an attacker to access your Hard Disk remotely from any part of the world, could result in complete system compromise, exposing your private pictures and files.

 In my opinion, it is not a vulnerability, but a lethargic behavior of administrator to keep the device in the default configuration and providing their storage device on  public IP by which any malware can be intruded to your system hence inviting trouble for himself and its end users. 

Enabling the AiDisk utility from Router makes the device available for using it through the public Internet, this feature comes with a problem if kept in default configuration which is giving Limitless access to your storage device.



  If you have some movies or cracked softwares downloaded from Torrents, by this you might become a criminal by delivering Pirated Content over the Internet and even you don’t have any such information.

Using SHODAN search, I have found more than thousands of Storage Disk using Asus Routers are available on the Internet, either with no password or having default settings. You can access these IP addresses using FTP protocol i.e. ftp://ipaddress/. ASUS Company is now aware of the issue and they intend to release an update, to warn their users with recommendation to choose a strong password for device storage and Router Administrative panel. source by hackernews






Saturday, 4 January 2014

Prison Locker Ransomware, an upcoming malware threat in 2014



Ransomware is one of the most blatant and obvious criminal's money making schemes out there. Ransomware malware was mostly known by the people when Cryptolocker comes into play. At the time when readers were getting aware of ransomware, Cryptolocker threat had touched the peak and other money motivated cyber criminals have started developing their own Cryptolocker versions. Two hackers with virtual name 'gyx' and 'Porphyry' (admin of maldev.net hacking forum) are advertizing a new ramsomware malware tool-kit called "Prison Locker" on various underground forums with tutorials. They have developed the Prison Locker a.k.a Power Locker ramsomware toolkit in C/C++ programming language, proving a GUI version with customizable features for customers.


The Ransomware is using BlowFish encryption to encrypt all available files on the victim's hard disk and shared drives except .exe, .dll, .sys, other system files. During encryption it will generate unique BlowFish key for each file and then encrypts the keys further with RSA-2048 encryption and will send victim's system information back to the command-and-control center of the attacker.



As the developer mention in a Pastebin post , the Command-and-control center allows an attacker to set the ramsomware warning time duration, ransom amount, payment mode and also allow decrypting the files on the victim system after payment received. The addition features added to Prison Locker: The malware is able to detect Virtual Machine, Sandbox mode, and debugging environments. It will also disable Windows key & Escape key to prevent unwanted user actions. Also can kill taskmgr.exe, regedit.exe, cmd.exe, explorer.exe, and msconfig.exe processes to prevent unwanted user actions. Malw arecan startup in both regular boot mode and safe boot under HKCU. A Malware Research Group is following the development of this new Malware threat and has published his investigation report on his blog i.e. MalwareMustDie. He has investigated the identity of the Ransomware developers at his own level, could be a free tip for Law Enforcement agencies too.

 Information obtained from screenshots provided by MalwareMustDie blog post: 
ICQ: 668841378 
Jabber ID: gyx@jodo.im, wenhsl@exploit.im
 Personal Bloghttp://wenhsl.blogspot.in 
Gmail: wenhsl12@gmail.com 
TorChat: yratfipjnd5bcxai 
Twitter: @wenhsl



Interestingly, His Twitter Bio is, 'Security enthusiast. Novice infosec/malware researcher and cybercrime analyst. C/C++ and currently polishing up my MASM' and Country mentioned as U.S.  He has also mentioned in an advertising post, that tool-kit will be available soon for the sale on various hacking forums and markets at just $100. If you don’t take proper precautions, you may lose the information stored on your computer. The people who are calling themselves Cyber Security Researchers whose work is to protect others from such threats are now self participating in the Cyber Crimes just for the monetary purpose. As mentioned earlier that NSA is spying over Non-American people i.e. Foreigners. But now it’s the high time to think that what about the cyber criminals who are operating from the USA, could be the mastermind behind major Bitcoins thefts, banking Trojans, exploit kits, Cryptolocker .. Serious threats?


















Thursday, 2 January 2014

Firmware vulnerability allows man-in-the-middle attack using SD Memory cards

How is it possible to exploit SD Card, USB stick and other mobile devices for hacking? Another interesting hack was presented at the Chaos Computer Congress (30C3), in Hamburg, Germany. The researchers demonstrated how it is possible to hack the microcontroller inside every SD and MicroSD flash cards that allow arbitrary code execution and can be used to perform a man in the middle attack. The Hardware Hackers Andrew “bunnie” Huang and Sean “xobs” described the exploitation method on their blog post,"it also enables the possibility for hardware enthusiasts to gain access to a very cheap and ubiquitous source of microcontrollers."



It seems that to reduce SD cards price and increase their storage capability, engineers have to consider a form of internal entropy that could affect data integrity on every Flash drive. Almost every NAND flash memory is affected by defects and presents problems like electron leakage between adjacent cells. "Flash memory is really cheap. So cheap, in fact, that it’s too good to be true. In reality, all flash memory is riddled with defects — without exception. The illusion of a contiguous, reliable storage media is crafted through sophisticated error correction and bad block management functions. This is the result of a constant arms race between the engineers and mother nature; with every fabrication process shrinks, memory becomes cheaper but more unreliable. Likewise, with every generation, the engineers come up with more sophisticated and complicated algorithms to compensate for mother nature’s propensity for entropy and randomness at the atomic scale." wrote Huang. Manufacturers have a sophisticated software that can detect hardware issues, such as bad sectors, and correct them through firmware. Hackers could hack into these flash-based storage devices using firmware vulnerability, allowing them to install malware. The firmware on the SD cards can be updated, but according the Huang revelations most manufacturers leave this update functionality unsecured. During the presentation, they reverse-engineered the instruction set of a particular microcontroller to inspect firmware loading mechanism. The attackers suitably modifying the firmware could hack any device that uses the compromised SD card (e.g. A mobile device, Wi-Fi equipped camera), the flash memory will appear to be operating normally while hacking the hoisting equipment.



The SD card could make a copy of the contents in a hidden memory area or it could run malicious code while idle avoiding detection mechanisms. When we speak about USB hacking or SD Card is hacking we must consider that we are approaching the hacking on a large-scale due the wide diffusion of these components. Microcontrollers cost as little as 15¢ each in quantity, they are everywhere and every device that use them could be hacked. Another consideration that must be done is that Governments and high profile hackers could be very interested in this type of attack for both cyber espionage and sabotage, arrange a countermeasure against those types of threat it is very hard. A curiosity for the " hackers inside"...




 These cards could be reprogrammed to become Arduino open source microcontroller and memory systems. “An Arduino, with its 8-bit 16 MHz microcontroller, will set you back around $20. A MicroSD card with several gigabytes of memory and a microcontroller with several times the performance could be purchased for a fraction of the price,” he writes. So, in short, destroy your SD cards if you have any dirty info on them and keep your eyes peeled for ultra-small, ultra-fast Arduino hacks. Look closely at the presentation... and distrustful of SD cards from now on.







Hackers stole money from European ATMs using Malware-loaded USB Device


Hacking ATM Machines is nothing new, but it seems that instead of relying on ATM skimmers now some smart hackers in Europe are reportedly targeting ATM Machines using Malware-loaded USB drives to steal money.



Most of the world’s ATMs are running on Windows XP operating system, which is highly vulnerable to Malware attacks. Just like your Desktop Laptops, some ATMs also have USB sockets, which is hidden behind the ATM’s fascia. The German security researchers who discovered the hack detailed their findings at the Chaos Computing Congress in Hamburg, Germany recently. They said that the thieves cut holes in the fascia to access a USB port and then uploaded malware to the machines.




 The malware creates a backdoor that can be accessed on the front panel. "These researchers explained that the malware allowed the thieves to create a unique interface on the ATMs by typing in a 12-digit code. This interface allowed for withdrawal and also showed the criminals the amount of money and each bill denomination inside the machines. This meant the thieves could save time by only taking the highest value bills." Dara Kerr from CNET news reported.



Once the thieves finished their theft at a cash machine, they would patch up the hole to allow the same exploit to be used on other machines. This indicates that the criminal crew is highly familiar with the ATMs mechanism. The malware does not appear to harvest customer PINs or other sensitive data and now some banks have upgraded their ATMs to prevent them from booting from external USB drives source by HACKER news ..




Sunday, 27 October 2013

Terminator Rat becomes more sophisticated inn recent APT attacks

 Sometimes the simplest techniques can foil the complex systems created by security firms and large enterprises to detect malicious programs and files.
 
Advanced Persistent Threat (APT) is a term referring to targeted attacks on enterprises and other organizations and recently referred to what appeared to be nation-state intelligence agencies using cyber assaults for both conventional espionage and industrial espionage.
 

Advanced threats have targeted control systems in the past and these attacks use commercially available and custom-made advanced malware to steal information or perpetrate fraud.
 



Wednesday, 2 October 2013

How to use the Windows 8, Windows Defender anti-virus program and it's small info details



Tips, tricks and configuration to have safe equipment using the Windows 8, the version of Microsoft Security Essentials anti-malware program. How to create shortcuts and buttons for easy access to the program, update and revise files or folders.

In Windows 8, it is not necessary to install a virus on the computer.
It is the first version of Windows that includes an application antivirus and anti-malware, called Windows Defender, but truly it is Microsoft Security Essentials, an application that you can download free to install it on versions such as Windows 7 or XP.
Essentials or defend as opposed to many other antivirus is fast, lightweight, and efficient without detrimental performance or the performance of the system.
It is not perfect, but it is a good choice and prevents us from having to install additional software on your computer, however is our decision to use any other antivirus in addition.

As does Windows Defender?

Windows Defender runs in the background (background) without having need for any manual action.
Includes real-time protection or that the program constantly monitors all activity on the system.
To open a folder in the Explorer program reviews its content previously.
In the case of folders with many files, if we notice any delay is due to the antivirus that will not display it until not complete its review.
The program is also aware of the activity of programs and applications and displays notifications on any unusual activity by effectively blocking it.
It is possible to do a manual at any time review whether a test fast, full, or just a folder or directory.
It is also possible to schedule regular check-ups.
The program checks the compressed files.

Recommended configuration of Windows Defender

There are just a few the settings that we need to review to ensure we have our team with optimum protection.
You start the program and open the "Settings" tab.

1. Ensure that the box is checked: "Enable real-time protection".
2. In advanced is recommended to check the following:
✓ Examine archive (compressed) files
✓ Consider removable drives (memory and USB devices)
✓ Create a restore point

Notifications of Windows Defender

Windows Defender does not have any icon in the notifications area, notices or messages are displayed in the center of actions (flag icon) icon.
If you had a cross in his circle indicates that something is wrong, just click to read the messages.
Update Windows Defender

Windows Defender is updated automatically when it detects that there is a connection to the network and that this outdated database.
It is also possible to update it manually using the Refresh button of the application.
It is possible to download a package with the entire database of Microsoft, where we use the antivirus on a computer that does not have internet access.
It is also possible to copy files from a computer to another.

How to check files, folders and USB devices with Windows Defender?

Although Windows Defender runs automatically and always displays notifications to detect any problem, any file, folder or device connected to the computer by hand, can be reviewed manually to be convinced that there is no danger.
For that in the main window of the program mark the checkbox "Custom" in exam options and press the button "Review now".
Navigate to the location of the object to check.




How to open the window of Windows Defender?

There are several ways to open the antivirus window, the main is to use the Windows Defender icon in the control Panel, which can be opened using the Windows key + I + Enter.
Also if gonna it do often can create a shortcut in the home, on the desktop screen or have it in the right mouse menu.

Create a shortcut on the screen to Windows Defender

Use the keys Windows + Q, writes to defend.
A right click on the application icon and in the bottom bar select: "Anchor to home".
Create a shortcut on the desktop to Windows Defender

A click on the desktop and choose new shortcut->
The route enters: "%programfiles%\Windows Defender\MSASCui. exe"

Windows Defender in the right mouse menu

Windows Defender in Windows 8 unlike other antivirus programs, does not add any extensions to the Shell, i.e. it is not possible to give a right click with the mouse on a file and have the option to review it with the antivirus.
Any operation that we need to do with the antivirus either review a file, do a test on the computer, the application update or revise history, must inevitably open control Panel previously.
Although you can create a shortcut on the desktop or in the start screen the ideal is to add the main program options to the context menu.
It is accomplished by running a script which adds the required values.
After running it by giving a right click on the desktop, the following options will be available:

• Open - Opens the window of the anti-virus.
• Configuration - Directly opens the settings window
• Update - Starts the manual update of database from Microsoft
• Update quick review - It starts the update process and at the end made a quick test
• ExamenRapido - Starts a quick review of the equipment
• ExamenCompleto - Starts a full examination of the equipment

Download the script to your computer, unzip the file that you download (right click-> Extract here).
Inside you will find two files:

WindowsDefenderEntradas.reg – It gives two clicks to create entries in the right-click menu.
WindowsDefenderEntradasEliminar.reg – It gives two clicks to delete the created entries.



http://uploaded.net/file/8dtrbogo  [ if this download Link break's notify me i will help you to update it ]

How to avoid that Windows Defender to remove files?

Windows Defender to scan regularly team can delete dangerous files, but also others that is considered illegal in the Microsoft database.
Among them are the keys, key and crack used to activate Windows and other programs or applications.
If you have some of them stored it is necessary to compress them with WinRar or 7z and assign a password to the file created.
Know the files deleted and reviewed by Windows Defender

Notifications showing sometimes program antivirus, may go unnoticed if we are performing some task.
If you need to check the files reviewed by the program and deleted, we can use the history window to know exactly that he has done in a period of time.
That way we can know the threats blocked and deleted files from our team. 



Friday, 30 August 2013

All iPhones images combination of iPhone, iPhone 3G, iPhone 4, iPhone 4S, iPhone 5, iPhone 5c and iPhone5S. + All apple updated post's till now

LIKE ◄ Techno world ► for more technology updates in Facebook + Blogger + Google+ + Twitter + Youtube + Pinterest + Linkedin
All iPhones images combination  of  iPhone, iPhone 3G, iPhone 4,  iPhone 4S,  iPhone 5,  iPhone 5c  and  iPhone5S.

How To Connect Your PS3 Controller To Your iPad or iPhone | Cydia


If you’ve ever wanted to connect your PS3 controller to your iPad or iPhone, you’d know that it wasn’t possible. However now after a new update to a common Cydia tweak, you can connect your PS3 controller and use it to play games. I was able to play some awesome games such as Street Fighter and some emulators with the controller, it’s literally...



Full specifications of the iPhone 5c, will support Siri



In the previous article i just gave you a note about iPhone 5c,5s with some details [ here ] but in this post i am giving you some what extent about the cheap apple gadget of most luxious iPhone 5c Full specifications of the iPhone 5c, will support Siri The numerous leaks of iPhone 5c have focused almost always more in its design and external...



The iPhone 6 Infinity reviews and small concept view



This is the all new iPhone 6 Infinity. OK it’s not really, this thing is just completely made up.Claudio Guglieri published this Dribbble shot showing off his new RSS reader – it does look very pretty. However Fabio Basile (his shot below) actually came up with the name iPhone 6 Infinity. Inspired heavily by Claudio, he created...



Apple could ship Haswell-powered MacBook Pros with HiTech in September by : Report



Apple could unveil new Haswell-powred MacBook Pro notebooks as soon as September 10, if a new rumour is to be believed. According to Hong Kong-based supply chain monitor EMSOne (via Apple Insider), Taiwan-based manufacturers have already started shipping components for new MacBook Pros powered by Intel's fourth-generation Haswell processors...



iPhone 5S and iPhone 5C pictured alongside iPhone 5 in leaked images



iPhone 5S and iPhone 5C, the next-generation iPhone and the much-rumoured low-cost iPhone respectively, have made yet another appearance in a series of images shared on Chinese micro-blogging site. The images, picked up by GSMArena.com via SimOnlyRadar.nl, give an idea of how the two new iPhone models will look compared to the existing iPhone...



Apple seeds iOS 7 beta 5 to developers Tweaks to icons, Control Center, settings , Air drop ,weather, more and this IOS 7 beta 5 is now available for download



as like this iOS 7 beta edition we discussed more Article data and details about this Apple's iOS 7 product view in many view at regarding to my level so this below url is the previous posts link , for you http://technoworld007.blogspot.in/search?q=iOS+7 The beta 5 IOS 7, the new version of the mobile operating system of...



Apple announces trade-in program for third-party chargers



Apple announces trade-in program for third-party chargers Fears of dangerous shocks caused by unsanctioned chargers for Apple gadgets prompted the company on Monday to announce a trade-in program. Beginning on August 16, people with counterfeit or third-party power adaptors will be able to swap them for certified Apple models for the local equivalent...



Google Nexus 7 vs iPad mini, Kindle Fire and others 7 mostly high Technological Gadgets



Google Inc. has announced new versions of its Nexus 7 tablet computers. It has better features and a higher price tag. The new models are available in the U.S. starting Tuesday through Google's online Play store and the following retailers: Best Buy, Gamestop, Walmart, Staples, Office Max, Office Depot, Amazon, Home Shopping Network, Radio...



iPhone 5S reveal recently leaked motherboard, new LED flash of Purported pictures.



in the previous i gave you some leaked Mother board details of Iphone5 :» New I phone's next Motherboard leaked with some pictures update Alleged pictures of the next generation iPhone, the iPhone 5S have appeared online, depicting the interior and rear of the new iPhone.Apple focused site MacRumors claims to have received images of...



new Apple iOS 7 detail and specifications along with Images of a small review



iOS 7 started with a desire to take an experience people love and make it better. To make it even simpler, more useful, and more enjoyable — but still feel instantly familiar. The design of iOS 7 is beautiful because it’s all of those things. And it’s the start of a new chapter for iOS. Control Center, AirDrop for iOS,...



The Croods for iOS app , Google playstore app review and Download details



Rovio has just launched a new game for iOS and Android called The Croods, inspired from the upcoming DreamWorks movie by the same name. The game is based on the story of the world's first modern caveman family who support each other to survive in the wild and are trying to evolve to move beyond the Stone Age era with their revolutionary new...


Intel Haswell-powered, slimmer 13-inch MacBook Pro with full-HD camera coming at WWDC: Analyst



It's that time of the year again. Apple's annual developers' conference, WWDC starts in a week and we have Apple analysts already reading tea leaves. Ming-Chi Kuo of KGI securities has predicted that he expects to see a refreshed Retina MacBook Pro and MacBook Air line-up at the WWDC Keynote on June 10th. While it's already being speculated that...



Apple 5th Generation ipod touch realised with 16 GB and later on 32 GB and 64 GB on september



Apple has listed a new 16GB variant of its iPod touch music player on its website pricing it at $229. The iPod touch variant features a 4-inch Retina display with 1136x640 pixels resolution and is powered by a dual-core A5 processor. It also features a front-facing FaceTime HD camera in the same form factor as that of the 5th Generation iPod...



Microsoft's windows 8 highlite description with comparring to apple officially itseems



Microsoft teases iPad in his latest campaign ad Microsoft has just officially launched a new advertising campaign where clearly mocked the few advantages it can bring to the consumer an iPad with a tablet with Windows 8. The Redmond-based company we are getting used in recent months to campaign criticism against competition but at the same time...



Malware roundup: Tiffany's, Tibetans, iOs are targeted. Some of the attacked details



                            Malware writers turned their attention this week on Tiffany's and Tibetan activists, as well as targeting Mac computers and Android phones.Spam messages claiming to be from upscale retailer Tiffany & Co. began appearing in inboxes this week. Spotted...



Details about Windows vs Linux vs Mac



If you go from Windows to Mac might be interested...Current operating systems for computers market is cornered primarily by three solutions, Windows, Mac OS and GNU/Linux. Microsoft is trying to promote the adoption of Windows 8, Apple proposes OS X Lion and GNU/Linux has various distributions star and Ubuntu is one of the most prominent.Now, if...



New I phone's next Motherboard leaked with some pictures update



An image of what is claimed to be a small component of the next generation iPhone's motherboard has leaked online, giving rise to a new set of rumours surrounding Apple's flagship smartphone. The image was originally leaked by Japanese retailer Moumantai and published by French website NoWhereelse.fr, which said that the component is related...



Apple's iOS 7 Concept Video: Customizable iOS Created by Agente Apple as WWDC Tickets Go On Sale Today along Video



As Techno world has monitored, non-Apple developers have taken upon themselves to create potential concepts for the iOS 7, such as one by Agente Apple. According to the Rafael Justino, the Brazilian who created the concept, his idea for the iOS 7 is based on a report stating Apple's Senior Vice President of Industrial...



Apple's WWDC 2013 Dates Confirmed: Worldwide Developers Conference Set for June 10 to 14, Prices Included for new era



Apple's Worldwide Developers Conference (WWDC) is back and has penned its dates for mid-June. The five-day conference, nested in San Francisco's Moscone West, will gather developers from around the world from June 10 to 14. The WWDC will give information to developers on Apple's plans on their iOS and OS X platforms, thus, enabling the creation...



New Apple iOS 7 Features Concept on Enhanced Lock Screen Designed for iPhone, iPad Devices Integration and widgets with Video




While Apple may be working on their next mobile operating system, tech designers elsewhere are being creative and developing their own concepts. With iOS 7 likely to be out with the next Apple smartphone, designer F. Bianco provided several concept images of what the next mobile platform could look like if Apple experimented...



LinkedIn updated Mobile version of Android and Iphone to make ads on publish mode



Professional networking site LinkedIn has upgraded its mobile app for the Android and the iOS platforms. Although we don't write about every app update, this one is one of the biggest revamps since the apps first came out. According to the company, the new mobile phone experience (one can access it via mobile apps and mobile...



A rumor that Apple want to enter in Video Gaming console world



With all of the upcoming consoles from Microsoft, Sony and Nintendo, the XBox 720,the PlayStation 4 and the Wii U are going to have some more major competition. The $70 billion videogame market is a large pie that Apple intends to get a big piece of. And it is now being rumored that the company will announce its plans for the Apple Joypad at its...



iPhone 6 Specialisations ,release date, news and and some rumours



When Apple unveiled the iPhone 5, the reaction was a bit muted: where previous phones were massive leaps forward, the iPhone 5 was a bit longer and a lot easier to scratch. Apple made the screen bigger last time. Is an even bigger iPhone on the way? So what can we expect from the next iPhone, the iPhone 6 or 5S? Let's see what the crystal...



Most Beautiful Themes of your Favorite 02



< back    1  2   Tangoft CustoPack for Windows Tangoft :- Download from here Gaia 10 - Celebrate the beauty of nature ! for Windows Gaia 10 :- Download from here iMod Inspirat CustoPack takes a leaf out of the universe of...


Most Beautiful Themes of your Favorite 01




1  2  Next >     How to get OS X theme on Windows Interface? First of all go to this website and download custopack . directly. After installation of custopack, download  os x theme as your choice at below one. Installation after your selected  theme, restart your Windows 7 System, then...



The History of ' !OS ' Jail Breaking and world wide Participants of famous Jail Breakers .



Back in 2007, Steve Jobs used a famous quote from ice hockey player Wayne Gretzky to summarize Apple’s commitment to innovation: “I skate to where the puck is going to be, not where it has been.” That’s long been true for Apple and products like the iPhone and iPad. But for more than four years, jailbreak has pushed the boundaries of iOS even...



Rhino Shield Protects Your Smartphone’s Screen Against Heavy Impacts



 Rhino Shield can develop to be the next big thing in protective foils, as it sets to cover and repel any threatening factors that can endanger the integrity of smartphones and tablets alike. Although most of these devices come with a thin glass shield right out-of-the box, usually Gorilla-made, Rhino Shield acts as an extra boost, one...