Wednesday, 2 December 2015

How To Create Apple I'D Without Credit Card 2015

How To Create Apple I'D Without Credit Card 2015
Hi Guys Today i am going to tell you How To Make Apple I'D without credit card 2015-16
The method is very simple and easy and you will create your Apple I'd by this. And this method is implemented on iPhone but you can also do this for all other iOS device like iPod etc. So just follow up the below steps to proceed.
Create Apple I'D Without Credit Card 2015
Steps To Create Apple I'D Without Credit Card
First of all make sure that you have not logged in your account and if you are then log out from your device.
Now open your app store and tap any of the free apps available there, you can choose and of the app from there.
Now hen you click on the free button there, that button will get converted into install and when you click on it your downloading process will initiates and then there will be two option there one is sign in and other “Create New Apple I'd“, just tap on it to create a new iOS I'd.
Now select your country or region and then click on next button there.
Now double click on the agree button to agree then and also you can firstly read all the agreement if you have extra 7 hours.
Now enter the required information there to create your new account and this will includes email address, password, date of birth, and a few security questions.
And after this tap on “Next” when you’re done. And make sure that you use an email address that is not currently registered or was not previously used as an Apple I'D.
Now at last set your payment method to none and then enter your address details there.
That's it you had successfully created your apple I'd without any credit card details.
So above is all about How To Create Apple I'D Without Credit Card. By this method you will be able to make an apple I'd without any need of credit card which is issued for limited people and now you can access all the feature of your iPhone Tricks with this apple I'd.

indows 10 Microsoft's Operating System Can Disable Pirated Software or Games

Windows 10 Microsoft's Operating System Can Disable Pirated Software or Games, Report Says gasp emoticon gasp emoticon gasp emoticon
Microsoft’s updated End User Licence Agreement terms and conditions let it disable any counterfeit software or hardware and, if you’re running a Windows 10 computer, you’ve just agreed to them !!!!
“Updates to the Services or Software, and Changes to These Terms” – of Microsoft’s Services EULA stipulates that it “may automatically check your version of the software and download software update or configuration changes, including those that prevent you from accessing the Services, playing counterfeit games, or using unauthorized hardware peripheral devices.”
‪#‎RIP‬ windows 10 pacman emoticon
Hit like like emoticon and Share

DOS ON TORRENT...How to Exploit BitTorrent for Large-Scale DOS Attacks

DOS ON TORRENT !!!!
How to Exploit BitTorrent for Large-Scale DOS Attacks :-
A flaw discovered in several widely used BitTorrent applications, including uTorrent, Vuze and Mainline, could be used to carry out a devastating distributed denial of service (DDoS) attack that makes it very easy for a single undetectable hacker to bring down large sites.
A new research by Florian Adamsky of the City University London shows that open BitTorrent protocol can be exploited to carry out Distributed Reflective Denial of Service (DRDoS) attacks.
The bitTorrent protocol is a file-sharing protocol used by Millions of active online users at any given point in the day to exchange files over the Internet.
DRDoS attack is a more sophisticated form of conventional DDoS attack where open and misconfigured DNS (Domain Name System) can be used by anyone to launch high-bandwidth DDoS attacks on target websites.
In a paper, titled "P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks," the researchers shows that the weakness in various BitTorrent protocols can be exploited to amplify Denial of Service attacks.
The researchers conducted a test in which they were able to exploit BitTorrent peers to flood a third-party target with data traffic up to a factor of 50 to 120 times bigger than the original request.
According to researchers, the vulnerability affects BitTorrent protocols (Micro Transport Protocol (uTP), Distributed Hash Table (DHT), Message Stream Encryption (MSE)) as well as BitTorrent Sync (BTSync) protocols.
Dos amplification techniques are not at all new. The amplification attacks have significantly increased in the past year, and hackers are widely taking advantage of this to attack major websites.
Last year we saw hackers exploiting a vulnerability in the home as well as small office routers to amplify the bandwidth of the attack.
Two years ago, a massive 300Gbps DDoS attack launched against Spamhaus website almost broke the Internet. Also last year, hackers succeeded in reaching new heights of the massive DDoS attack targeting content-delivery and anti-DDoS protection firm CloudFlare, reaching more than 400Gbps at its peak of traffic.
BitTorrent has been notified about the flaws. The company has already patched some of its applications in a recent beta release. However, uTorrent is still vulnerable to a DHT attack. Vuze has also been notified about the vulnerability and has yet to release a patch.

#‎Whatsapp‬ ‪#‎hack‬……

Add As Many As Members U Want In Whatsapp Group
‪#‎Whatsapp‬ ‪#‎hack‬…….
1.First of all u need to be ‪#‎rooted‬ .
2.Then install ‪#‎es‬ explorer from play store.
3.Then open es explorer and give permission as option– tools — root.. 
Then go to option– tools–root again and click r-w mount ; And give permissions to r-w as write/read.
4.Then goto folder root/data/data/com.whatsapp/shared_prfs/com.whatsapp prefer.xml….
5.Der u will find com.whatsapp prefer.xml open it and edit it in any editor or choose es editor to edit
6.Then that xml wil be open and thn search for participants_size_limit” value=”100″ />” and thn chng it to your choice .
7.Then forse stop whatsapp by going to apps- whatsapp- about – click on force stop ..
8.Then check participation limit …
9. THE MOST IMPORTANT THING …..
ENJOY

MOST COMMON TERMS USED IN CYBER/TECHNOLOGY AND THEIR MEANING:

MOST COMMON TERMS USED IN
CYBER/TECHNOLOGY AND THEIR
MEANING:
.1. HTTP- Hyper Text Transfer
Protocol
2. HTTPS -Hyper Text Transfer
Protocol Secure
3. IP -Internet Protocol
4. URL -Uniform Resource
Locator
5. USB -Universal Serial Bus
6. VIRUS -Vital Information
Resource Under Seized
7. 3G -3rd Generation
8. GSM -Global System for Mobile
Communication
9. CDMA -Code Division Multiple
Access
10. UMTS -Universal Mobile
Telecommunication System
11. SIM -Subscriber Identity
Module
12. AVI -Audio Video Interleave
13. RTS -Real Time Streaming
14. SIS -Symbian OS Installer File
15. AMR -Adaptive Multirate
Codec
16. JAD -Java Application
Descriptor
17. 3GPP -3rd Generation
Partnership Project
18. 3GP -3rd Generation Project
19. MP3 -MPEG Player 3
20. MP4 -MPEG Player 4 (video
file)
21. AAC -Advanced Audio Coding
22. GIF -Graphic Interchangeable
Format
23. JPEG -Joint Photographic
Expert Group
24. BMP -Bitmap
25. MMORPG -Massive Multiplayer
Online Role Playing Game
26. WLAN -Wireless Local Area
Network
27. GPRS -General Packet Radio
Service
28. EDGE- Enhanced Data rate for
GSM Evolution
29. WAP -Wireless App Protocol
30. HTML -Hyper Text Mark up
Language