Questions? Feedback? powered by Olark live chat software
| Get: Our Articals In Your Email | Get: 120 Important Softwares all on DVD | Buy a VPN Or Proxy to get free internet | Contact Us


Ads 468x60px

Showing posts with label Geeking. Show all posts
Showing posts with label Geeking. Show all posts

Wednesday, 19 August 2015

Microsoft made a Fully Functional Pc on a stick.

  In partnership with the Indian device maker iBall , Microsoft made a fully functional pc on a stick     more like a flash drive , this flash drive is meant to turn your smart TV in to a fully functional   computer.  after connecting this device on the smart TV,

 In partnership with the Indian device maker iBall , Microsoft made a fully functional pc on a stick more like a flash drive , this flash drive is meant to turn your smart TV in to a fully functional computer.  after connecting this device on the smart TV, which will be connected through HDMI port  you will access a fully PC  running windows 8.1The iBall Splendo  that the name of the device  it came with a wireless wireless desk set  including a keyboard and mouse  so you get a full experience of a PC


At its launch, Microsoft said: “The iBall Splendo is for people who love devices and want to be connected all the time using multiple form factors.



The iBall Splendo runs on the Intel Atom Quad-core processor with 2GB RAM and 32GB storage space  a multi-channel digital audio, a micro SDXC slot, USB port, micro-USB port, Wi-Fi, Bluetooth 4.0 and HD graphics and it come with one year warranty
the price is 140 $ that is 497,980 UGX .
 

About shipping the iBall splendo  will start  on july in india  still unclear yet of it release in other part of the world  but this is really good device   comouter are getting more and more smaller  if you don't know what am talking about just take a look at the first computer,  that thing could fill the whole house 

Anyway hope you like  it, let us know what you feel about this one .




Also read:  How To Use Pattern Security method to Secure your windows PC


AD -----------
Let's create professional Social Media Posts for your Business at as low as UGX 75K ($23).
- Social Media Marketing has never been this simple, fast, and affordable: www.socialclark.com

Continue Reading...

Monday, 10 August 2015

How To Hack YAKA (UMEME) Meter [Get Free Electricity]

AD -----------
Let's create professional Social Media Posts for your Business at as low as UGX 75K ($23).
Social Media Marketing has never been this simple, fast, and affordable: www.socialclark.com
------------------------

If you live around Kampala, chances are you have already been moved from the digital electric meter to what UMEME calls "YAKA" If UMEME hasn't brought YAKA to you"YET", you can be sure they are soon at your door step any time from now.

This article is only for educational purposes and so i won't be held responsible for your actions.

In this article, there comes lots of theories and just one proven method to hack the YAKA prepaid meter.
So, What is Yaka Really?
Yaka is an electric meter particularly made for UMEME by a company based in South Africa called Conlog to reduce on electricity hacking and get ride of their meter readers pay role. However, after all this time in deployment, YAKA is after all not a full-proof solution for UMEME. how? UMEME as a company doesn't really make these meters. All the work is done in South Africa by a company called Conlog. You want to hack YAKA? Conlog is the real deal. Here is an article that was written by Conlog in 2011 when it all started: New business methods in Uganda


As these guys' website say's "Conlog has been leading the prepayment industry for more than 20 years. Our solutions bring the best in metering, vending, revenue management and associated support services, to ensure the sustainability of your project, now and tomorrow... "
Really you got to give credit to these guys.
Now. getting into the Hacking, In a video, I found online, I gathered that one has to actually open up/ break into the casing of the system if they wanted to hack it

In the above video, A technician at Conlog South Africa takes us through how conlog meters are made and somewhere along the lines he mentions something about how to get through it. Even though most of these meters are tamper-proof in that it might not go back together as it was after you break it.

Apart from this hack, there are a lot of theories including something i mentioned in my previous How To Hack A Weel meter which is Adding strong magnets side by side which personally I don't think will ever work since nothing metallic actually determines the electricity usage. I will outline and maybe talk a little of what i know about a specific theory and then I will give you something that actually works. and actually worked for a few people I know however later ware caught and hard to pay a few fines.

This article is only for educational puposes and so i won't be held responsible for your actions.

Theory 1: Attacking a smart meter’s memory-through hardware.

Theory 2: Using a digital radio to Hack a Smart Meter

Theory 3: Accessing the meter with a wireless Device

Theory 4: Spreading malware to the Smart Meter’s network

Theory 5: Measuring the Smart Meter’s electrical consumption

The 5 out lines are all from here: 5 Hacks That Render Smart Meters Dumb

Personally i didn't find any of these really help full but maybe some one out there could check it out and may be find a more effective hack. I call them theories because i didn't relate any to our country and, quite honestly i don't think of YAKA as a Smart Meter. Its just a prepaid electricity device that was introduced to Uganda a few years ago.

The Yaka meter in your house is just for outputting and inputting data, like typing in your token, and displaying how much you have left. Actually, the real magic happens up on the electric pal on that box/s hanging and that's where your meter in the house gets and puts all its information. so you could say if your credit is due, your meter only sends a signal to the big box on the pole through the wiring and then, its the circulate breakers job in that box to turn your power off. even when you load a token, the meter only sends it to the box, then the box again, Does the magic to calculate how much the code you brought has to give you. Don't be fooled, those meters don't have a network system otherwise they wouldn't have wires from the pole's box. i have hard people talking about how the meter is connected to umeme offices but think about it, Those guys can only tell when you last bought or loaded a token and all about the previous purchases, but they cant tell how much electricity was used in a day or a satain week. Now did you know that if you call your phone number's service provider and ask them how you have used your credit they will give you full details of when and what you used it, But UMEME can't. and that's one of the reasons i don't like to call it a smart Meter otherwise i think every smart device has got to have network/internet. Ok what does all this lead us to,

We know that all the math and magic is done on the big box on the poles. But how do we get to it, If you are human enough, also not a professional electrician, am sure i don't have to tell you it's just crazy climbing an electric pole. So please don't. as i said, this is only for educational purposes even though you may get some professionals to climb and confirm for you. I may self haven't been up there but i am telling you this after a long time of research and I have seen this working in a few places.

Now for the steps.

Again: This article is only for educational purposes and so i won't be held responsible for your actions.

After climbing that pole, What you need is anything that can cut through an electrocuted wire and a non-conductor of electricity.

Step 1: Trace for the big-black wire that brings power to your house.

Step 2: Find the pole on which it's attached. [One of the wires in the big wire should go directly to the box which then moves on out to a live wire on the pole]

Step 2:  Cut the live wire to the box from the black wire of your house [Red]. After citing it from the box, the meter at your house should power off

Step 4: Connect the wire you cut to the same red wire the box is connected to [the wire that passes power through the box]

At this time, power comes to your house. But this time, all Free. Any electricity used after this will be free. Enjoy!

Note: The wiring will not be the same for all cases. In some places, several houses can be connected to the same box on the pole. In this case, refer to "How it works" below.

How this works:

In this trick, all we did was to bypass the system in the box at the electric pole. So the meter will think the power is just off and so causes it not to calculate any more power.
For the case of a number of houses connected to the same box, just identify your own wire and find a way to bypass that box.

Like i said: This is only for educational purposes and so i won't be held responsible for your actions. and be care full.



AD -----------
Let's create professional Social Media Posts for your Business at as low as UGX 75K ($23).
Social Media Marketing has never been this simple, fast, and affordable: www.socialclark.com

Continue Reading...

Wednesday, 27 May 2015

Android M is about to add native support for fingerprint scanners


One of the reasons for lack of widespread presence of fingerprint scanners on Android devices is the lack of native support in Android, relegating it to just unlocking the phones on which it is present. But that might change soon.

 


One of the reasons for lack of widespread presence of fingerprint scanners on Android devices is the lack of native support in Android, relegating it to just unlocking the phones on which it is present. But that might change soon.

According to BuzzFeed and Ars Technica, Google might announced support for fingerprint scanner in Android M at I/O 2015. although the company declined to comment on that. Ars Technica found commits in AOSP for Nexus 6 for a fingerprint sensor, which Google has been working on on the software side. The Nexus 6 was also supposed to have a fingerprint sensor but according to Motorola ex-CEO Dennis Woodside, Apple bought the one good company that made those.

With native fingerprint scanner support in the OS, all the apps can tap into it and use it for authentication. You would be able to use it for your Play Store purchases, or Google Wallet authentication, or for apps like 1Password, Authy, Dropbox, OneDrive, Simplenote, or any other app that allows you to use a passcode lock, and that currently use Touch ID on iOS, can be used with the fingerprint scanner if they add support for it on Android.

Currently very few Android phones have a fingerprint scanner, with only the recent Galaxy S6 and S6 edge having implemented it the right way, but we could see more devices in future if Google does decide to include it in Android M.

Continue Reading...

How to Hide Files Inside Pictures

guys am about to show you a trick that will let you hide files inside a picture. i know we all need privacy sometimes when we have something and we don't want other people to see them so that when this trick comes in 
before we begin this interesting trick there a things that you need
-a picture to where you will hide your files
-files that you want to hide
-a file compression software i use Winrar  you can also use Winzip  you can find them on google for free
 once you have all of those then you are good to go ...
let hide our file now
first thing you need to do
-create a folder in the drive C   for example C:\ diclan .  C:\ is the drive letter where you are going to create your folder and diclan  that how i named my folder  you can also name your whatever you like  or if you like that name the fine  , then you will need to past everything you want to hide  you put them on that folder   you can hide everything you want  including txt, exe, mp3, avi, or whatever you want.  



 now after you have created your folder  you going to need to past all the things that you want to hide then  right click on that folder and select add to archive.zip



now when you finish creating that archive  you now need to choose a  picture where you are going to be hiding your files mine it called code.jpg.  then create another folder and put inside the archive that you created and  the picture  that you are going to use and name that folder whatever you want .   



now after choosing the picture  you going to need  to open CMD  the command prompt  to do that  Click on Start, and then click on Run. Type in “CMD” without the quotes you going to need to

 run it as administrator  and press Enter. You should now see the command prompt window open. Type in “CD \” to get to the root directory. Then type CD and the directory name that you created  and press enter you will be now on the folder that you created .
now type in these codes      copy /b code.jpg+diclan.zip code.jpg.  
note: code and diclan are the names that i gave to my folder and picture  so you won't put the same you will put there you names that you created

how to see the files inside the picture

Method 1: Simply right-click code.jpg and select 'open with winrar'. You (or anyone you send the file to) can see diclan.zip  file there. Just unzip it and there you will see all your files 

Method 2: just change the file extantion  of the picture  ie: code.jpg  you change it to code.zip and then double click on it and you will see all your files

Also read: The Multi-Software Disk [Sponsered]
Continue Reading...

Sunday, 24 May 2015

How To Install Windows Software on Ubuntu

In some linux distributions on linux. this application so all you have to do is skip to where i talk about actually installing windows Software.
Wine is a free and open source application that aims to allow applications designed for Microsoft Windows to run on Unix-like operating systems. Wine also provides a software library, known as Winelib, against which developers can compile Windows applications to help port them to Unix-like systems.

Wine is a compatibility layer. It duplicates functions of Windows by providing alternative implementations of the DLLs that Windows programs call and a process to substitute for the Windows NT kernel. This method of duplication differs from other methods that might also be considered emulation, where Windows programs run in a virtual machine. In this article we are installing wine 1.7.25 version on Ubuntu 14.04.

To install it in Ubuntu you will have to add the repository to the system and just use the apt-get install command, this will also make it easy to update wine in the future by just using apt-get upgrade. The bellow command will also automatically install any extra dependencies you may need.

$ sudo add-apt-repository ppa:ubuntu-wine/ppa
$ sudo apt-get update
$ sudo apt-get install wine1.7






now the installation is over  you just need to install windows application which am about to show you 

Actually installing windows Software

Installing a Windows application using Wine is just as simple as installing it on the native operating system. After downloading the installation executable (in this case i chose foobar2013 - a nice media player), you can just click the executable and the installation wizard will open up, exactly like it would do on Windows.



After you're done with the installation you can run the application from the installer or from the Ubuntu button just like you would run any other Linux application.
And there is your windows application working in UBUNTU 




Continue Reading...

Wednesday, 3 December 2014

How I Became a Computer Guy. [The Beginner's Guide to Geek]

In this post, i wish to tell you my story. a story i didn't expect to talk about this early but couldn't avoid for all that's happening. I'm also starting a series of posts to guide the new entrants to the geek community.

(UPDATE: I have now devoted to developing and designing fantastic Websites at ElitNex Website Developers Uganda )

Hints to hacking is a Face book Group I created out of the love I hard for computers that later turned me into more of a hacker than an average geek. I spent lots of sleepless nights even more than the ones I have spent trying to learn Coding. In this time I learnt something I was supposed to have learnt years ago “If you got to do it, do it for the Good in it. A lot of beginners go into it after hearing stories or watching that movie that portrays hacking. Well tell you what, That was me at 16 years of age and as an admin at Hint's to hacking, Trust me when I say 60 % of those that ask me about hacking want to hack their girlfriends / boyfriends face book or computer passwords, school networks or friends and relatives. Really most beginners are motivated by Hacking the wrong way [black hat]. I have seen this first hand since I myself was 50% motivated by the stories about hackers giving banks hard time. I'll begin another series come January 2015 about Hacking where I will be talking about Hacking so please keep around if you must.

My arrival to here wasn't an easy one. I am choosing to ignore my life before Hints to hacking so I don't bore you with my long life story. I have always been inspired by computers. From the movies, the stories, even in real life. However, starting my journey as a group admin was not exactly what I expected but it worked out just fine. So how did I come to be one, I hard knowledge I needed to share, but the luck of a way to share it made me do a little research. Then I found a way. It was a face book based group administered by a one called Titus Mukisa. And that was how it all began, after participating in the group for some time, I realized Titus's group didn't have the right people I wanted to share my knowledge with, I wanted a specific kind of people that would all share and learn from each other as hackers. But Titus’s group hard more of IT guys than hackers. Don't get me wrong I loved the group, hey I still like it. But I loved Titus's dedication to the group more. That's the kind of guy I wanted to be. But for the Hacker community and so I started off by thinking of a name for a new group. It’s that moment that it hit me I had already made a face book page Hints to Hacking and someone hard suggested I made a group to. It took me a few mints to create and get the group started. I added one close friend then went ahead to share the group to all my friends and in groups including Titus’s Group and within a week, Hints to hacking went from 2 to 300 members. The next week I added all my friends making us about 500 and came to 1,500 Members after a moth. During this time was the time I became more respondent, supportive and got to know a lot of people some of whom I still have as my friends up to date. This was the time I felt like yes I did it and it was the time when all the group was so active interactive and all good but wait,Scamming, Spammers, Script kiddies and all other kinds of bad guys were also in the group though all of it was controllable at that capacity and I had time. In the year 2012 the group had grown from 1000 s to 10,000 s. We were over 17,000 Members. Now we are a group of over 40,000 members and still growing with daily Join requests in the group.
There have been a lot of ups and downs as the world translates it. A lot of times I abandoned the group and more of times I came back and shared what I could. All this time wasn’t because I wanted to stay away but because of all I hard on my plate to handle. A time came when I had to spend two days without sleep, when I had to miss lunch or breakfast because I hard to buy an Internet bundle. I did all sorts of things to stay on top of my game until 2013 when I felt I should try something. Something new. I knew some programming since it was kind of a requirement for hackers though a lot of it was really more of networking and computer side trickery than programming. I didn't have that much interest in programming and it was only at that time I found a friend in my networking class “CCNP” at MUK who made me a small calculator on windows with programming language called python. Well, I came to be interested and given i had read somewhere about C++ being the language for hackers i went for it so i could mix it with my hacking skills. Well yes I did try it, for a moth or so and  I was all C++. I went ahead to research about everything a C++ programmer can do in Uganda and, Well, the results were alarming and really disappointing. The results not only gave me a bad felling but it also left me half backed on C++. The next week I found a book called “C++ for Hackers”  downloaded and read it. It was a very brief book about C++ and so gave me an over view of what the language was really about. I will later be giving you download links of the books and applications you may need in the series. Please don't be demotivated to learn C++ because I found it to be very useful and handy especially if you are into making windows Games, applications and drivers, C++ can do almost anything from operating to another.
As I completed with Networking at The College of computing and information science Makerere University, It hit me to start a blog and so I did start it like seriously. At ethertek.blogspot.com. As the year ended I really go into Web Development and got good at HTML and CSS3 that is how I modified my blog’s looks to be my own. In 2014, an offer from a friend I made in my group to host my blog at a good price surfaced and so I went for it. Until now I have been learning more about Web Development.

So why did I chose Web Technologies to Application development for windows in C++? Well it’s all about what interested me more. Why Web Technologies interested me and why it might be the next big thing. I’ll talk about this and the other things that could interest particularly you in The Beginners Guide to Geek #2.

Computer Repair, Software installation, Computer support and advisory, Web designing ETC. That's a list of a few of what I hard to do for the money to run my projects. It always wasn't that much but it did just fine for me. I also made a disk of soft ware’s I called “The 120 Softwares All on One Disk” which was a combination of 120 Softwares compiled to fit the average users software needs. I put all the soft ware’s on one 4.7 GB DVD and sold a copy at 9,500 UGX this was one of the best ideas I hard in 2013 and although the money seemed OK, Really it wasn’t enough for my projects and the time I invested in it. Also I also hard to deliver the disks myself or pay a delivery man 4000 UGX to deliver it around town. So for that I later raised the price to 18,000 UGX. I’ll briefly talk more about this in the part where I talk about making money from the Computer world.

Early December 2015 Am releasing another version/ Update for the disk and this time it's called: THE MULTI-SOFTWARE DISK. I have worked on this for over 3 month now and hopefully will take care of all the resources and time I‘ll put into this series. ”The Guide to become a geek
THE GUIDE TO BECOME A GEEK will be a series of posts I will be posting to this website and could go for at least 2 month. This string of posts should be able to get pretty much any one to understanding of computers to even the programmer level it all depends on your tests and preferences.
This should mark the end of the first part otherwise you would have to read until tomorrow if I am to right it all down in this post. Next time we will get into what being geek means and what are the basics. Hope to see you in the next post, Stay loving.

SUBSCRIBE To Get The Latest Updates In Your Email.

Want to Talk? Call me: 0704359301 | Also Like us on Facebook

Also, Dont forget to like Elitnex's Facebook Page
Continue Reading...
Get Our Latest Articles Delivered to Your email

You will shortly receive a confirmation email. Please approve to complete Subscribtion.

 

Alittle About Me

I am an open minded person with a great interest in computer networks, programming and cyber security. My love for computers started way back since elementary school where I din't have access to the internet nor did I have a computer at my disposal. In the long run at the right time, the love I had for so long was taken to the next level when I was granted internet access and mostly, A computer at my disposal. This allowed me to develop and enhance my skills more effectively. Currently on a cyber... Continue Reading

To all those that visit. We highly appreciate.
Thank You!

Do you like what you see?

Get our Daily email updates (It's Free):