Tuesday 19 July 2016

How To Make Your Computer Just Like J.A.R.V.I.S. From The IRON MAN Movies..!!! (Guide)

J.A.R.V.I.S.

You've probably seen the IronMan movies and thought to yourself  "How can i get a computer like the one Tony Stark uses from the IronMan movies" ...


Well,NOW YOU CAN !!!!

The kind folks over at MegaVoiceCommand have made a program thats just like J.A.R.V.I.S. that can make your computer understand and respond to voice commands!!


The MVC YouTube Channel : https://www.youtube.com/user/MichaelCanWin

Here is a DEMO video of the Software in Action!!! :



The software is still in BETA but its actually very functional and has been around for awhile now.


Some YouTubers have even began to make Add-ons and Tools for the software.


Here are a few good examples of some Jarvis videos that can enhance your J.A.R.V.I.S. experience. :

How to install it? :


A look at the UI (More up to date than the DEMO video above) :


Change your computer's voice to sound like JARVIS :


System Sounds For JARVIS :


Free JARVIS Wallpapers :


AWESOME Iron Man Special Effects ScreenSaver :


Download Rainmeter For Windows : Click Here 

Official Website : Rainmeter

JARVIS Rainmeter Theme :


Blue Jarvis Theme :


Download Link For Blue Jarvis Theme Click Here

Red Jarvis Theme :



Download Link For Red Jarvis Theme : Click Here

For More Themes, Click Here.

Enjoy!!! :) 

Labels: , , , , , ,

Monday 18 July 2016

How To Install & Run Kali Linux On Any Android Smartphone?

How To Install & Run Kali Linux On Any Android Smartphone?

Kali Linux is one the best love operating system of white hat hackers, security researchers and pentesters. It offers advanced penetration testing tool and its ease of use means that it should be a part of every security professional’s toolbox.

Penetration testing involves using a variety of tools and techniques to test the limits of security policies and procedures. Now a days more and more apps are available on Android operating system for smartphones and tablets so it becomes worthwhile to have Kali Linux on your smartphone as well.

Kali Linux on Android smartphones and tablets allows researchers and pentesters to perform ” security checks” on things like cracking wep Wi-Fi passwords, finding vulnerabilities/bugs or cracking security on websites.  This opens the door to doing this from a mobile device such as a phone or a tablet.

You can also install Kali Linux Distribution in your Android smartphone by following the instructions below  : (Rooted Android smartphone/tablet required for this installation)

Keep the following thing ready for the installation :
  1. Fully charged Android Phone
  2. Good Internet Connection(For Download Kali Linux images)
  3. Root Permission (Rooting Guide for Every Phone)
  4. Atleast 5GB  Free Space
Step 1. Download Linux Deploy App in Your Android Mobile from Google Play Store.

Cover art 
Linux Deploy 
Download Now (Play Store)

Step 2. Install and open Linux Deploy App in your mobile and click on download Icon.

Tutorial for installing and running Kali Linux on Android smartphones and tablets

Step 3. Change the Distribution of Your Linux to Kali Linux.

How to Install and run Kali Linux on any Android Smartphone

Step 4.  Go to Top of the screen and hit the Install button. This will take about 5 minutes provided you have a good Internet connection.

How to Install and run Kali Linux on any Android Smartphone

Step 5. Download Android VNC Viewer App from Google Play Store.

Cover art
VNC Viewer
Download Now (Play Store)

Step 6. After installing, enter below  settings in your VNC Android App.

How to Install and run Kali Linux on any Android Smartphone

Step 7. Click the Connect Button in VNC Viewer App.

Now you are done and you will be able to run Kali Linux in your Android smartphone or tablet.

Enjoy!!! :)

Labels: , , , , , , ,

Tuesday 12 July 2016

Memory Drive Increaser v1.0 (Convert Your 1 or 2 GB Pendrive or MemoryCard into 4GB & Prank Your Friend)


Memory Drive Increaser v1.0 by THE HACKiNG SAGE

Using This Software You Can Convert Your 1 or 2 GB Pendrive or MemoryCard into 4GB..

it only works in 1 or 2 GB USB Stick so don't try this in any other memory drive...

WARNiNG : If Your Memory Drive Stop Working or Got Any Other Problem., I Am Not Responsible For Anything..

Here We Go...

1st make sure you have connect you memory card/pen drive to your PC.

then follow the simple steps:-

Step 1 : Open "Memory Drive Increaser v1.0"



Step 2 : Type Name That You Want To Call The Memory Card/Pen Drive and Hit ENTER.



Step 3 : Type Your Memory Card/Pen Drive "Drive Letter" (for example : if your usb drive is H:/ Drive then type H) and Hit ENTER.



Step 4 : Type Your Memory Card/Pen Drive "Drive Letter" Again and Hit ENTER.



Done!!! 




Now Your 1/2GB Memory Card/Pen Drive Successfully Converted into 4GB Memory Card/Pen Drive.. 



and if you like this posts please like & share with your friends... 

& Don't Forget To....

Like Our Facebook Page : www.facebook.com/thehackingsage 

Join Our Facebook Group : www.facebook.com/groups/thehackingsage

Follow Us at Twitter : www.twitter.com/thehackingsage

Follow Us at Instagram : www.instagram.com/thehackingsage

Subscribe Our You Tube Channel : www.youtube.com/channel/UCtwxOwWOgn54e7iseUfFF4g

Keep Visiting... Enjoy !!! :)

Labels: , , , , ,

Sunday 10 July 2016

How to Track a Cell Phone ? (Guide & Tools)


How to Track a Cell Phone ?


If you need to track down a cell phone, you’ve come to the right place. Whether you’re simply trying to track the location of your lost phone or you’re a secret agent who needs to gain intel on the whereabouts of a crooked diplomat, we’re here to give you the information you need to get the job done.

It’ll be easier if you’re trying to track a smartphone, but there are ways to locate older phones as well, so don’t give up hope if you’re still rocking a first-gen Motorola RAZR – we’ve still got your back.

Tracking Your Phone Before You Lose It :


If you’re here just to prepare for the day that you lose your phone (which for many is inevitable), then you’re ahead of the game. If you’ve got a smartphone, consider installing the apps listed below

For Smartphones :

There are several app choices available for you phone, but also remember to set up any included phone-locating software that comes with your device. That includes Find My iPhone, Android Device Manager, and Samsung’s Find My Mobile. Head to the next section for more details. If you’re looking for more choice, try these out:

1. Prey

Prey

Prey is free to use for up to three devices, there are paid plans for more, and the service can be used for both computers and phones. After you sign up for the service, you simply sync your devices with it, sit back, and relax. The day that your phone goes missing, all you’ll have to do is find a computer, log into your account, and start tracking.

Prey runs discreetly in the background and won’t track your phone’s location until you tell it to, so there’s no need to worry about your privacy while the phone is in your possession. We recommend this for any Android or iOS device, as well as any Mac, Windows, or Linux PC.

Download now for : iOS | Download now for : Android

2. Lookout

Lookout

Lookout combines security, tracking, and anti-virus/malware protection. There are several interesting features, such as the system recording a phone’s last location right before the battery dies, a chance to backup contact data before a remote erase, and it’ll even snap a photo of any would-be thief and email it to you along with location data. There’s a free two-week trial, after which it’ll cost $3 per month.

Download now for : iOS | Download now for : Android

3. Avast Anti-Theft

Avast Anti-Theft

This app is designed to deal with theft and has a ton of free features. You can remotely lock or wipe your smartphone, or listen remotely to find the thieves who took your device. You can also use it to activate stealth mode on your device, so that the thief doesn’t know Avast is protecting your phone. Avast provides SIM card change notifications, too, and the company offers similar services for Android, Mac, and PC.

Download now for : Android

For Non-Smartphones :

We recommend using a GPS tracking service. There are many different options out there, but AccuTracking is our current favorite.

Accutracking

It costs as little as $6 per month (less if you subscribe for a year), and uses GPS to track the location of your phone — and lucky for you, it works with a wide variety of feature phones. As long as your phone is GPS-enabled, this service should do the trick. Most modern cellphones are, so as long as your phone isn’t headed to the museum due to age, you should be fine.

When the day comes that you can’t locate your phone, just log in to AccuTracking’s Web interface from any internet-connected computer and — so long as your phone isn’t dead — it’ll immediately show you its location.

Tracking Your Phone After You Lose It :


If you didn’t have the foresight to install a device recovery app on your phone before you lost it, don’t worry. There are still some easy ways to get it back.

1. Android Device Manager

Android Device Manager

Android users can use Android Device Manager. Because it’s a Google service, it links with your Google account and can locate any device associated with it. There’s also the option to reset the PIN remotely, or erase stored data. If you want an alternative, there’s Cerberus, which works in the same way and comes with Android Wear support, so alerts will be pushed to your smartwatch should the paired device go out of range.

Download now for : Android

2. Find My iPhone

Find My iPhone

iPhone users can download the Find My iPhone application. If you’re rocking a phone with iOS 5 or later, then this app will come pre-installed. It works with iCloud — so it can be accessed through a browser, or another iOS device — and the location of your missing device will show on a map, along with the option to show where it has been too. You can remotely lock the phone, display an emergency message, or erase stored data if the phone has been lost forever.

Download now for : iOS

Non-smartphone users are a bit out of luck in this case. If you didn’t register your phone with AccuTracking or a similar service beforehand, you don’t have many options other than calling your service provider and hoping they can help. Most providers do offer GPS location services for a reasonable fee though, so if your phone is GPS-enabled, finding it is sometimes just a matter of activating the GPS chip.

Tracking Someone Else’s Phone With Their Permission :


Before going down this route, don’t forget that there’s always the option of calling and asking where someone is, but then again, if you do it this way there’s always a chance that the person in question could lie to you. So, if you can’t always trust the word of the person you’re trying to locate, here’s what we recommend:

Smartphone-equipped friends can use a number of different location-sharing apps to let you know where they are. Facebook and Twitter both have location-aware check-in features these days, and Swarm has some pretty robust location-sharing features as well. However, we have a few more favorites for you to check out:

1. Find My Friends

Find My Friends

Our favorite app for keeping track of people’s whereabouts is definitely Find My Friends. It’s available for iOS and Android. Although the two apps aren’t from the same developer, they offer the same service. The apps allow you to track multiple people at the same time, which can be useful when you’re trying to meet up with a big group.

Download now for : iOS | Download now for : Android

2. Google Hangouts

Google Hangouts

If you’re an iOS user and are just trying to meet up with a friend, provided you both use iMessage then you can choose to share your location through it. Google’s Hangouts app has a similar feature, and is available on both Android and iOS. The app even watches for phrases like “Where are you?” and will then automatically suggest sharing your location.

Download now for : iOS | Download now for : Android

3. Carrier Apps

Carrier Apps

Several major networks also provide phone tracking services, under the guise of friend and family locators. AT&T has its Family Map, Sprint has Guardian, Verizon provides Family Locator, and T-Mobile has the awkwardly named FamilyWhere app. All come with a free trial, but you’ll have to pay a subscription to continue using them.

Non-smartphone users don’t have as many options when it comes to sharing their whereabouts, but it’s definitely still possible. There used to be more free services out there, but as me mentioned before, InstaMapper and Google Latitude are now defunct, so your best bet for keeping tabs on a feature phone is AccuTracking. The app’s website looks like it’s from 1996, but don’t let that scare you away — it works really well.

 Tracking Someone Else’s Phone Without Their Permission :


It’s best to be upfront about tracking somebody and respect their right to privacy, but if you absolutely must track a phone without the owner’s consent or knowledge (i.e. if you’re a parent), here are a few tips on how to do it.

Tracking a smartphone user is relatively simple. The easiest method is to install a tracking app on the person’s phone whenever you get a chance to do so discreetly. There are dozens of apps out there that’ll get the job done. Just install whatever app you choose when the person is sleeping or they leave to go somewhere — and don’t forget to hide the icon of whatever app you install. You can place it in an obscure folder and hope they don’t notice it too soon, or you can also install an app hider program (like Poof for example) to make the icon disappear entirely.

Tracking a non-smartphone user is a bit more difficult since there aren’t as many options, but it’s essentially the same drill as above. If the phone is GPS-enabled, just wait until the person leaves their phone unattended for an extended period of time and install AccuTracking on it. Go through all the necessary steps to set up the account, make sure that it works, and then hide the evidence as best you can. Try to stash the app icon in an obscure folder so that the phone’s owner won’t discover it accidentally.

Unfortunately, if the phone you’re trying to track isn’t GPS-enabled, you’ll have to pull a James Bond maneuver and install a GPS chip on the phone before you can pinpoint its location. This might be a bit of an arduous task, as you’ll have to figure out which particular archaic model of phone they have, find and purchase a GPS chip that’s compatible with the device, and then successfully install the chip without the person’s knowledge. Try going to a specialty electronics shop or spy gear retailer to find the right hardware. The other option is locating the phone in question via triangulation, but doing it this way means gaining access to cell phone tower data — and the feds probably wouldn’t approve of that.


Enjoy!!! :)

Labels: , , , , , , , , ,

Can Police & Hackers Really Track You With Your Phone? (Guide)

police hackers phone tracking can cops and track your

In the movies, people on the run are often hunted down because of their cell phones. There are countless scenes where expensive smartphones are smashed to bits, or dropped in rivers, to evade capture by nefarious government operatives or well-equipped mobsters.

Hopefully you’re not in that situation. But if you were, do you really need to go that far? We asked the experts what information your cell phone is really broadcasting about you, how to protect yourself, and what it would take to truly go off the grid.

The Simple Options Don’t Work :

If you suspected your phone were being tracked and wanted to start covering your tracks without snapping it in half, your first bet might be to simply turn on airplane mode. That won’t cut it.

“Every phone has two operating systems,” explains Gary S. Miliefsky, CEO of SnoopWall, “One that connects to cellular networks, and one that interfaces with the consumer. Airplane mode may only disable features in the consumer facing operating system, such as Android or iOS, but not in the OS used between the phone and the carrier network. A phone may be giving out a ‘ping’ and you’d never know it.”

Communicating At All With A Cell Tower Could Expose You :

It doesn’t even need to be sending out GPS coordinates — communicating at all with a cell tower could expose you. By comparing the signal strength of your cell phone on multiple cell towers, someone looking for you can approximate your location with triangulation. This requires access to data from your mobile network, which should keep it out of reach for criminals, but carriers can be compelled to provide that data to law-enforcement agencies.

So How About Removing The SIM Card ?

“Removing the SIM may work to stop most cyber criminals, but every phone has a built-in feature set of identifiers that may be detected via tools like Stingray devices now used by the police and military, as well as fake 2G cell towers put up by the NSA,” Gary explains, “Forcing a phone to 2G means no encryption and it’s easily detected and tracked.”

Stingrays are also known as cell-site simulators, or IMSI catchers. They mimic cell phone towers and send out signals that can trick your cell phone into replying with your location and data that can be used to identify you. And they’re surprisingly widely used.

The American Civil Liberties Union has a map and list of federal agencies known to use cell-site simulators, which includes the FBI, the DEA, the Secret Service, the NSA, the U.S. Army, Navy, Marshals Service, Marine Corps, National Guard, and many more. For obvious reasons, it’s not an exhaustive list.

What About Wi-Fi ?

At short range, you can be tracked by Wi-Fi. Every time you turn Wi-Fi on, your phone is sending out a signal that includes your unique MAC address, which is kind of like a fingerprint for digital devices. This kind of technology is already being used by stores to track your movements. It’s not ideal for surveillance, because of the limited range, but if someone has obtained your MAC address it could be used to deduce something like when you enter or leave a specific building.

Phone Wifi

The simple solution here is to avoid unencrypted public Wi-Fi. It’s also possible, on some phones, to change or spoof your MAC address. Some Android apps can help you do it, but you might have to root your phone. With iOS 8, Apple introduced more security by randomizing your MAC address, though, according to iMore, this feature may not work as well in practice as you’d hope.
Miliefsky also notes other reasons to avoid public Wi-Fi networks: so-called man-in-the-middle attacks and fake “trusted” routers. Fake Wi-Fi access points are also sometimes called “evil twins,” and they’re designed to look like a legitimate Wi-Fi network, but they’re actually operated by an attacker. If you connect, then they can eavesdrop, or direct you to a fake website where they can obtain sensitive passwords and other information.

Man-in-the-middle attacks are more common, because an attacker just has to be in range of an unencrypted Wi-Fi access point, and they can potentially intercept messages between two parties, or even interject new messages.

“If you are using HTTPS, TLS, or SSL it’s harder to eavesdrop on public Wi-Fi, but there have been some exploits like the SSL Heartbleed attack,” Miliefsky explains.

The TLS and SSL standards are supposed to ensure that your communications are encrypted. That’s why the Heartbleed vulnerability was such a big deal. It was an OpenSSL bug that potentially enabled cyber criminals to collect sensitive information, like encryption keys, so they could set up undetectable man-in-the-middle attacks.

The Threat Within :

You may have concerns about privacy infringement from threats like Stingray, but there are easier ways to track us. Most criminals go for the low-hanging fruit, and the biggest threat for tracking and spying is probably malware.

“Public Wi-Fi is a smaller risk than trusted apps being creepware and spying on you,” suggests Miliefsky.

There are a lot of commercial, mobile spyware products on the market that can enable someone to intercept your emails, text messages, and calls.

In Some Cases It May Even Be Possible For Hackers To Remotely Access Your Smartphone Microphone Or Camera :

“You may have already installed an app you trust that can do this,” Miliefsky says, “Just go to the Google Play store or Apple iTunes and look at the permissions of some of the most popular apps like Flashlights, Bibles, Battery Maximizers, QR Readers, Password Managers, other utilities and games.”

Gary’s company SnoopWall hit the headlines last year with a Flashlight Spyware Report. It revealed that many popular flashlight apps in the Play Store were asking for a suspiciously long list of permissions, enabling them to theoretically do all sorts of things, like track you via GPS, access text message history, and access call logs.

In some cases it may even be possible for hackers to remotely access your smartphone microphone or camera, as Gary demonstrated on Good Morning America.

Steering Clear of Malware :

The good thing about malware is that you have to install a malicious app. You can avoid opening SMS attachments, avoid apps from unknown sources, and cast a suspicious eye over your installed app list.

“It’s absolutely time for a spring cleaning,” suggests Gary, “Delete all the apps you don’t use.”

For the apps you decide to keep, Gary recommends checking four things:

Permissions (Are there too many for what the app needs to do?)
Privacy policy (Read it closely.)
Company website (Are they based in malware hotbeds like China, Russia, Brazil, or India?)
App developer email (Send one to see how they respond.)
“If you don’t like what you see with these four items, dump it and find a better, less privacy-invasive alternative,” says Gary, “You may have to buy an app to get one that doesn’t use ad networks and have creepware behaviors, but it’s worth 99 cents to reclaim your identity, isn’t it?”

How Do You Avoid Being Tracked ?

There’s a difference between something being possible and something being probable. With a little bit of common sense, most of us can avoid any problems. Make sure you have lock-screen security, so no one can physically install an app on your phone when you’re not looking, follow the advice above about installing new apps, and avoid public Wi-Fi. If you absolutely must access public Wi-Fi, then use a VPN service or app. That will safeguard you against the most likely criminal threats.

Being tracked by a rogue FBI agent, hostile foreign government, or extremely well-equipped criminal gang is a different matter. If your concerns run this crazy deep, there are only a couple of foolproof options to safeguard your privacy.

“To avoid being tracked it’s best to put your phone in a PrivacyCase, or remove the battery,” says Miliefsky. A PrivacyCase wraps your phone in shielding that blocks signals from going in or out, kind of like going into a basement.

If you’re wondering why turning the phone off might not be enough, it’s because of malware, like PowerOff Hijack. You won’t find it in the Play Store, and it requires your device to be rooted in order to work, but AVG reported more than 10,000 installations, mostly in China. It plays your usual shutdown animation and turns the screen blank, but actually keeps the device on, so that it can monitor you.

So if you truly want to go off-grid in a hurry, remove the battery. Of course, many modern smartphones, like the iPhone 6 and the Galaxy S6, don’t let you do that. So maybe the movies weren’t exaggerating after all : You may have to smash or ditch that smartphone if you really want to evade surveillance entirely.

You May Also Like : How to Track a Cell Phone ?

Enjoy!!! :)

Labels: , , , , , , ,