Questions? Feedback? powered by Olark live chat software
| Get: Our Articals In Your Email | Get: 120 Important Softwares all on DVD | Buy a VPN Or Proxy to get free internet | Contact Us


Ads 468x60px

Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

Monday, 10 August 2015

How To Hack YAKA (UMEME) Meter [Get Free Electricity]

AD -----------
Let's create professional Social Media Posts for your Business at as low as UGX 75K ($23).
Social Media Marketing has never been this simple, fast, and affordable: www.socialclark.com
------------------------

If you live around Kampala, chances are you have already been moved from the digital electric meter to what UMEME calls "YAKA" If UMEME hasn't brought YAKA to you"YET", you can be sure they are soon at your door step any time from now.

This article is only for educational purposes and so i won't be held responsible for your actions.

In this article, there comes lots of theories and just one proven method to hack the YAKA prepaid meter.
So, What is Yaka Really?
Yaka is an electric meter particularly made for UMEME by a company based in South Africa called Conlog to reduce on electricity hacking and get ride of their meter readers pay role. However, after all this time in deployment, YAKA is after all not a full-proof solution for UMEME. how? UMEME as a company doesn't really make these meters. All the work is done in South Africa by a company called Conlog. You want to hack YAKA? Conlog is the real deal. Here is an article that was written by Conlog in 2011 when it all started: New business methods in Uganda


As these guys' website say's "Conlog has been leading the prepayment industry for more than 20 years. Our solutions bring the best in metering, vending, revenue management and associated support services, to ensure the sustainability of your project, now and tomorrow... "
Really you got to give credit to these guys.
Now. getting into the Hacking, In a video, I found online, I gathered that one has to actually open up/ break into the casing of the system if they wanted to hack it

In the above video, A technician at Conlog South Africa takes us through how conlog meters are made and somewhere along the lines he mentions something about how to get through it. Even though most of these meters are tamper-proof in that it might not go back together as it was after you break it.

Apart from this hack, there are a lot of theories including something i mentioned in my previous How To Hack A Weel meter which is Adding strong magnets side by side which personally I don't think will ever work since nothing metallic actually determines the electricity usage. I will outline and maybe talk a little of what i know about a specific theory and then I will give you something that actually works. and actually worked for a few people I know however later ware caught and hard to pay a few fines.

This article is only for educational puposes and so i won't be held responsible for your actions.

Theory 1: Attacking a smart meter’s memory-through hardware.

Theory 2: Using a digital radio to Hack a Smart Meter

Theory 3: Accessing the meter with a wireless Device

Theory 4: Spreading malware to the Smart Meter’s network

Theory 5: Measuring the Smart Meter’s electrical consumption

The 5 out lines are all from here: 5 Hacks That Render Smart Meters Dumb

Personally i didn't find any of these really help full but maybe some one out there could check it out and may be find a more effective hack. I call them theories because i didn't relate any to our country and, quite honestly i don't think of YAKA as a Smart Meter. Its just a prepaid electricity device that was introduced to Uganda a few years ago.

The Yaka meter in your house is just for outputting and inputting data, like typing in your token, and displaying how much you have left. Actually, the real magic happens up on the electric pal on that box/s hanging and that's where your meter in the house gets and puts all its information. so you could say if your credit is due, your meter only sends a signal to the big box on the pole through the wiring and then, its the circulate breakers job in that box to turn your power off. even when you load a token, the meter only sends it to the box, then the box again, Does the magic to calculate how much the code you brought has to give you. Don't be fooled, those meters don't have a network system otherwise they wouldn't have wires from the pole's box. i have hard people talking about how the meter is connected to umeme offices but think about it, Those guys can only tell when you last bought or loaded a token and all about the previous purchases, but they cant tell how much electricity was used in a day or a satain week. Now did you know that if you call your phone number's service provider and ask them how you have used your credit they will give you full details of when and what you used it, But UMEME can't. and that's one of the reasons i don't like to call it a smart Meter otherwise i think every smart device has got to have network/internet. Ok what does all this lead us to,

We know that all the math and magic is done on the big box on the poles. But how do we get to it, If you are human enough, also not a professional electrician, am sure i don't have to tell you it's just crazy climbing an electric pole. So please don't. as i said, this is only for educational purposes even though you may get some professionals to climb and confirm for you. I may self haven't been up there but i am telling you this after a long time of research and I have seen this working in a few places.

Now for the steps.

Again: This article is only for educational purposes and so i won't be held responsible for your actions.

After climbing that pole, What you need is anything that can cut through an electrocuted wire and a non-conductor of electricity.

Step 1: Trace for the big-black wire that brings power to your house.

Step 2: Find the pole on which it's attached. [One of the wires in the big wire should go directly to the box which then moves on out to a live wire on the pole]

Step 2:  Cut the live wire to the box from the black wire of your house [Red]. After citing it from the box, the meter at your house should power off

Step 4: Connect the wire you cut to the same red wire the box is connected to [the wire that passes power through the box]

At this time, power comes to your house. But this time, all Free. Any electricity used after this will be free. Enjoy!

Note: The wiring will not be the same for all cases. In some places, several houses can be connected to the same box on the pole. In this case, refer to "How it works" below.

How this works:

In this trick, all we did was to bypass the system in the box at the electric pole. So the meter will think the power is just off and so causes it not to calculate any more power.
For the case of a number of houses connected to the same box, just identify your own wire and find a way to bypass that box.

Like i said: This is only for educational purposes and so i won't be held responsible for your actions. and be care full.



AD -----------
Let's create professional Social Media Posts for your Business at as low as UGX 75K ($23).
Social Media Marketing has never been this simple, fast, and affordable: www.socialclark.com

Continue Reading...

Tuesday, 26 May 2015

VENOM: A New Virus That can Attack Even Virtual Machines

With Venom, a malicious user program with sufficient root privileges "could break through the isolation normally afforded by the hypervisor and reach into the memory space of its hosted peers, potentially corrupting the software stack running in the other VMs and gaining access to sensitive data and applications," said Bill Weinberg, senior director of open source strategy at Black Duck Software.


Crowdstrike on Wednesday made public its discovery of yet another long-buried Linux vulnerability.
"Venom," as it has been dubbed, was unearthed by the firm's senior security researcher, Jason Geffner. It is listed as vulnerability CVE-2015-3456.

Venom exists in the virtual floppy drive code (FDC) used by virtualization platforms based on QEMU (quick emulator). It has been around since 2004.

The code probably went undetected for 11 years because "it's not obvious at all that this is a vulnerability," Geffner told LinuxInsider.

What is venom and how it kills


Venom is a threat to virtual machines.
A server runs a hypervisor, which in turn runs one or more virtual machines, called "guest machines." The hypervisor provides each guest operating system with a virtual OS and manages the execution of the guest OSes.
Several VMs, running multiple instances of one OS or different OSes, can be guested on one hardware platform.
When guest OSes send commands such as seek, read, write or format to the FDC's input/output port, the FDC stores them and their associated parameters in a fixed-size buffer, according to Crowdstrike.
It keeps track of how much data to expect for each command. After all expected data for a given command is received from the guest OS, the FDC executes the command and clears the buffer for the next command.


However, two commands, which Crowdstrike did not disclose, are not reset. An attacker can send those commands and specially crafted parameter data from the guest system to the FDC to create a buffer overflow and execute arbitrary code during the host's hypervisor process.

Attackers will need administrator privileges or root access privileges, so it's not as if a hacker can waltz in and take over the FDC.

Continue Reading...

Wednesday, 3 December 2014

How I Became a Computer Guy. [The Beginner's Guide to Geek]

In this post, i wish to tell you my story. a story i didn't expect to talk about this early but couldn't avoid for all that's happening. I'm also starting a series of posts to guide the new entrants to the geek community.

(UPDATE: I have now devoted to developing and designing fantastic Websites at ElitNex Website Developers Uganda )

Hints to hacking is a Face book Group I created out of the love I hard for computers that later turned me into more of a hacker than an average geek. I spent lots of sleepless nights even more than the ones I have spent trying to learn Coding. In this time I learnt something I was supposed to have learnt years ago “If you got to do it, do it for the Good in it. A lot of beginners go into it after hearing stories or watching that movie that portrays hacking. Well tell you what, That was me at 16 years of age and as an admin at Hint's to hacking, Trust me when I say 60 % of those that ask me about hacking want to hack their girlfriends / boyfriends face book or computer passwords, school networks or friends and relatives. Really most beginners are motivated by Hacking the wrong way [black hat]. I have seen this first hand since I myself was 50% motivated by the stories about hackers giving banks hard time. I'll begin another series come January 2015 about Hacking where I will be talking about Hacking so please keep around if you must.

My arrival to here wasn't an easy one. I am choosing to ignore my life before Hints to hacking so I don't bore you with my long life story. I have always been inspired by computers. From the movies, the stories, even in real life. However, starting my journey as a group admin was not exactly what I expected but it worked out just fine. So how did I come to be one, I hard knowledge I needed to share, but the luck of a way to share it made me do a little research. Then I found a way. It was a face book based group administered by a one called Titus Mukisa. And that was how it all began, after participating in the group for some time, I realized Titus's group didn't have the right people I wanted to share my knowledge with, I wanted a specific kind of people that would all share and learn from each other as hackers. But Titus’s group hard more of IT guys than hackers. Don't get me wrong I loved the group, hey I still like it. But I loved Titus's dedication to the group more. That's the kind of guy I wanted to be. But for the Hacker community and so I started off by thinking of a name for a new group. It’s that moment that it hit me I had already made a face book page Hints to Hacking and someone hard suggested I made a group to. It took me a few mints to create and get the group started. I added one close friend then went ahead to share the group to all my friends and in groups including Titus’s Group and within a week, Hints to hacking went from 2 to 300 members. The next week I added all my friends making us about 500 and came to 1,500 Members after a moth. During this time was the time I became more respondent, supportive and got to know a lot of people some of whom I still have as my friends up to date. This was the time I felt like yes I did it and it was the time when all the group was so active interactive and all good but wait,Scamming, Spammers, Script kiddies and all other kinds of bad guys were also in the group though all of it was controllable at that capacity and I had time. In the year 2012 the group had grown from 1000 s to 10,000 s. We were over 17,000 Members. Now we are a group of over 40,000 members and still growing with daily Join requests in the group.
There have been a lot of ups and downs as the world translates it. A lot of times I abandoned the group and more of times I came back and shared what I could. All this time wasn’t because I wanted to stay away but because of all I hard on my plate to handle. A time came when I had to spend two days without sleep, when I had to miss lunch or breakfast because I hard to buy an Internet bundle. I did all sorts of things to stay on top of my game until 2013 when I felt I should try something. Something new. I knew some programming since it was kind of a requirement for hackers though a lot of it was really more of networking and computer side trickery than programming. I didn't have that much interest in programming and it was only at that time I found a friend in my networking class “CCNP” at MUK who made me a small calculator on windows with programming language called python. Well, I came to be interested and given i had read somewhere about C++ being the language for hackers i went for it so i could mix it with my hacking skills. Well yes I did try it, for a moth or so and  I was all C++. I went ahead to research about everything a C++ programmer can do in Uganda and, Well, the results were alarming and really disappointing. The results not only gave me a bad felling but it also left me half backed on C++. The next week I found a book called “C++ for Hackers”  downloaded and read it. It was a very brief book about C++ and so gave me an over view of what the language was really about. I will later be giving you download links of the books and applications you may need in the series. Please don't be demotivated to learn C++ because I found it to be very useful and handy especially if you are into making windows Games, applications and drivers, C++ can do almost anything from operating to another.
As I completed with Networking at The College of computing and information science Makerere University, It hit me to start a blog and so I did start it like seriously. At ethertek.blogspot.com. As the year ended I really go into Web Development and got good at HTML and CSS3 that is how I modified my blog’s looks to be my own. In 2014, an offer from a friend I made in my group to host my blog at a good price surfaced and so I went for it. Until now I have been learning more about Web Development.

So why did I chose Web Technologies to Application development for windows in C++? Well it’s all about what interested me more. Why Web Technologies interested me and why it might be the next big thing. I’ll talk about this and the other things that could interest particularly you in The Beginners Guide to Geek #2.

Computer Repair, Software installation, Computer support and advisory, Web designing ETC. That's a list of a few of what I hard to do for the money to run my projects. It always wasn't that much but it did just fine for me. I also made a disk of soft ware’s I called “The 120 Softwares All on One Disk” which was a combination of 120 Softwares compiled to fit the average users software needs. I put all the soft ware’s on one 4.7 GB DVD and sold a copy at 9,500 UGX this was one of the best ideas I hard in 2013 and although the money seemed OK, Really it wasn’t enough for my projects and the time I invested in it. Also I also hard to deliver the disks myself or pay a delivery man 4000 UGX to deliver it around town. So for that I later raised the price to 18,000 UGX. I’ll briefly talk more about this in the part where I talk about making money from the Computer world.

Early December 2015 Am releasing another version/ Update for the disk and this time it's called: THE MULTI-SOFTWARE DISK. I have worked on this for over 3 month now and hopefully will take care of all the resources and time I‘ll put into this series. ”The Guide to become a geek
THE GUIDE TO BECOME A GEEK will be a series of posts I will be posting to this website and could go for at least 2 month. This string of posts should be able to get pretty much any one to understanding of computers to even the programmer level it all depends on your tests and preferences.
This should mark the end of the first part otherwise you would have to read until tomorrow if I am to right it all down in this post. Next time we will get into what being geek means and what are the basics. Hope to see you in the next post, Stay loving.

SUBSCRIBE To Get The Latest Updates In Your Email.

Want to Talk? Call me: 0704359301 | Also Like us on Facebook

Also, Dont forget to like Elitnex's Facebook Page
Continue Reading...

Wednesday, 12 November 2014

3 Impressive Computer Tricks You Got To See Your Self

Do you Think Notepad can be just used as Text Editor ? Do you Use notepad just to Save text and some other data?

 If Yes, Then you are missing out Some Cool and Interesting Notepad Tricks that you can Perform on your Computer.
Notepad Comes as an inbuilt app in all Versions of Windows. But Today i am Going to Share 3 Cool Notepad Tricks that you can Perform on your Computer with notepad. The tricks that i am about to share will not harm your Computer in any way

Let's get started with the 3 tricks you can try. Even now

1. Make your Computer Speak:

In the Above trick we made notepad Type automatically but now we will our own text to Speech tool with the help of small script in Notepad. You will make your Computer Speak whatever you type. Excited ? Then follow the Below Simple Steps.

Step 1: Open Notepad

Step 2: Copy and Paste the Below Code in Notepad.

Dim message, sapi

message=InputBox("What do you want me to say?","Speak to Me")

Set sapi=CreateObject("sapi.spvoice")

sapi.Speak message

Step 3: After Pasting the Above Code in Notepad, its time to Save the File. Save the File with name Speak.vps and again choose All files in save as type

Step 4: Double Click on the File to See a pop up Window that looks something like this Picture

Now All you have to do is Type in Anything that you want it to Convert in Speech.

Then Click on Ok. Wait a second or Two and hear it do its work.

2. Matrix Effect:


We Have Seen alot of times in movies some kind of numbers in Green Color Flashing really fast. Ever Wondered How they do it ?

Well, Today you will learn it. Basically its a Small Batch file that helps to do it. Just follow the Below simple steps to do it yourself.

Step 1: Open Notepad.

Step 2: Now Copy the Below Code.

@echo off

color 02

:start

echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%

goto start

Step 3: Paste the Code in Notepad and Save it by Clicking on File and then Save.

Step 4: You will be now asked the file name and Save as Type, So name the file as Matrix.bat and Choose All files in save as type.

Step 5: Remember the Destination where you save the file. Now Navigate to the Location where you saved this file. Double Click on it to See the Magic

3. Keyboard LED lights Dancing Trick

This is another Fun Trick which will Make your Keyboard Lights ie: Numlock,Capslock and Scroll lock lights go dancing..

Step 1: Open notepad.

Step 2: Copy the Below Code and paste in it.

Set wshShell =wscript.CreateObject(“WScript.Shell”)

do

wscript.sleep 100

wshshell.sendkeys “{CAPSLOCK}”

wshshell.sendkeys “{NUMLOCK}”

wshshell.sendkeys “{SCROLLLOCK}”

loop

Step 3: Save the File with the name Led.vbs and again choose all files.

Step 4: Double click the File to open, Look down at your keyboard to See the live performance.

How to Stop:

To Stop it just follow the Below Simple Steps.

Open Task manager by Pressing CTRL+ALT+DELETE

Now Goto Process Tab

Scroll down and search for wscript.exe and End the Process.

And that Concludes our list of the 5 Best Notepad Tricksyou can do in note pad.


Problem? Call me: 0704359301 I can Help. | Please Consider A Donation To Us

Subscribe to our news feed to get updates in your email. Also Like us on Facebook

Continue Reading...

Saturday, 4 October 2014

How To make Free Calls To All Networks | Even Landline

 Free calling to all networks? After this tutorial you will have the knowledge to make free calls across all networks.

How this Works:

This is all made possible with Yet another service by a well known telecom company, Airtel.
The service as called "Magic Voice" which turned out not only as a voice changing service but also as a loophole in the Telecom's system to make calls to any network. All you need to do for this is add a 3 digit code to any number you want to call regardless of the network company of the number. You can add any number like "077,078,071,073,072,079,040" etc.

<<=========== RUUT.ug ===========>>

Ethertekug.com has been shifted to  www.ruut.ug and will make NO MORE Posts.

PLEASE VISIT: WWW.RUUT.UG

<<=========== RUUT.ug ===========>>


Warning:

You may hear some music in the background as you chat BUT it's very: Un Usual

Step 1: 

Load any Free calls bandle on your simcard if you don't have one. EG- Kawa, Pakalast or Kyabise.
I recommend "Paka Last". For 20 minutes 1000 UGX.

Step 2:


Now, Let's look at how to make the 20 minutes call all networks insted of just Airtel -
Put any number of another network you want to call into your phone. [ Don't call it yet ]

Step 3:

Add this code at the beginning of that number 190
EG: if you want to call 0784345455, add 190 and have this: 1900784345455
Now You may Call. [Make sure you don't have any usable credit on your simcard,]

Step 4:

You should be recieved by a voice teling you to chose a languadge or plan.
If it asks for The languadge, Chose any, If it asks for a plan, Chose option 1 to use 24 hours at 250 UGX [No waries, You don't have to have credit, just keep going]

Step 4:

After those That, you will here another voice asking you to chose a Voice, Just chose option 5.
I like option 5 because it won't actually change your Voice but enhance it.

Lastly:

Wait untill the pearson you are calling picks up then you can talk with no credit being cut, only your free minutes will be cut. You may press 0 to use your original voice or just speak.

Congratulations, You can now call all networks with free minutes.

Note: This trick is not limited to Airtel or Warid. You may use any one of the two.

 

Problem? Call me: 0704359301 I can Help. | Please Consider A Donation To Us

Subscribe to our news feed to get updates in your email. Also Like us on Facebook 

<<=========== RUUT.ug ===========>>

Ethertekug.com has been shifted to  www.ruut.ug and will make NO MORE Posts.

PLEASE VISIT: WWW.RUUT.UG

<<=========== RUUT.ug ===========>>

 

Continue Reading...

Sunday, 28 September 2014

How To Extend Your Free Minutes Expiry Date To When Ever You Want

In my Previous Post, I showed How to make real unlimited free Calls. In this tutorial, I will show you a way to extend your Kawa minutes expiry date to any time of your convenience.

After reading my previous post "How to make real unlimited free Calls" You should now be able to use 500 shillings for 24 hours to make calls at any time you feel like and still finish the day with out completing the 5 minutes. But hey, What if i tolled you that you don't even have to load that 500 Shillings every single day to run for 24 hours. What if i tolled you, that you can load the 500 Shillings to use it the whole week. Or even a moth. Well, I am telling you now: If you successfully followed the steps in the previous post and you are now conversant with" How to make real unlimited free Calls ", Yes You can.

<<=========== RUUT.ug ===========>>

Ethertekug.com has been shifted to  www.ruut.ug and will make NO MORE Posts.

PLEASE VISIT: WWW.RUUT.UG

<<=========== RUUT.ug ===========>>

How this works?

-The process involves small loophole in the SMS functionality of the Kawa Service for warid.

Steps:

Step 1: Load 500 Shillings of airtime.
Step 2: Go to your sms so you can create a new SMS
Step 3: Create a message: PAKA and send to a Number 149

After sending this message, The 500 Shillings will be exchanged for 5 minutes. but Valid for only 24 hours.

Now to extend the validation of these minutes:

You just need to keep sending the same message in Step 3 to 149 to extend validation time by 24 hours.
Each time you send PAKA to 149, You will get more validation for 24 hours. and you can do this as many times as you can to get more time.

You may Dial/all *170# to see your Minutes balance and date of expiry

Note: -This process may only work with warid sim cards: (070
           -Please make sure you have no balance in airtime before you send the second message for it may be deducted

AD -----------
Let's create professional Social Media Posts for your Business at as low as UGX 75K ($23).
Social Media Marketing has never been this simple, fast, and affordable: www.socialclark.com


Continue Reading...

Friday, 26 September 2014

How To Make Real Unlimited Free Calls [All Day, All Night]

 We all know how costly phone calls can be especially after the sell out of Mobile network Warid to Airtel. Call and Data costs got even worse. In this tutorial you will learn a way to make calls all day, all night at 500 UGX only.

 

Surely you have all heard of this word "Free Calls" But is it really free if you actually have to pay for it? No it's not. No network gives out real free calls to any one YET. because you can't pay for something free. In this article, You should learn a way to use 500 Uganda shillings for 24 hour calling all Airtel and Warid Networks.Now that's closer to "Free calls"

How this trick works:

This is made possible by an SSD code used to opt out of a friends and firmly number list celled "One and Only" So you basically got to simply add a number u want to call but instead of being charged for changing the current number in your list, You rather opt out so you are not charged.then Add another number.
You can do this recurrently and no charge will be placed.
When a number is added at any time, You will call that particular number free provided you have minutes regardless how many. (I suggest you use 500 to buy 5 minutes)

Getting started

Warning:
-After Buying the 5 minutes at 500 UGX, Please make sure you have no usable balance/Airtime.
-Every call you make may be cut after 5 minutes, But don't worry, You can just call them back

Step

Dial this code: *149*4#.
What this code does: Subscribe for a promotion called Kawa and will give you 5 minutes of calls.
To check for your minutes balance dail: *170#

Step 2:

Add This code to your contacts: *100*9*2*3# [We'll Need it later]
What this code does: Removes an added number from the "one and Only" List

Step 3:

Dail this code: *100*9*1#
What this code does: Lets add a number to your "One and Only" list.

Lastly:

After dialing the previous code, You will be asked to enter a a number, just add the number you want to call and then press the "Send/OK" button.
A message should come on your screen saying: You success full added the number.

Congratulations: You can now call any number you add [No Charges from account.]

-Now if you want to call another number, First remove the current number by dialing/calling the code i tolled you to add to your contacts [*100*9*2*3#]
You may also just note it some where and just dial it with our saving it in contacts, Though i think it saves a lot of time when you add it to contacts.

 I will post another article this week:

Update: How to Extend your Free minutes expiry date to when ever you want
 - As of: 09th/oct/2014, This trick works No more


Get the New tricks and articles in your inbox by subscribing to our news free.

Also read: How To Know If Your Phone Is Made In China


AD -----------
Let's create professional Social Media Posts for your Business at as low as UGX 75K ($23).
Social Media Marketing has never been this simple, fast, and affordable: www.socialclark.com


Continue Reading...

Thursday, 11 September 2014

How To Colorize Your Folders with Different Colors In Windows

We all Know windows Folder color is always light yellow by default, Today am here to show you a way to customize and organize any folders with different colors.


With this amazingly small software, you can colorize folders in windows with any Color of your choice very easily. some people find it difficult to navigate to the folder which they want because folders are all of the same Color and if you forget the name of the folder in which you stored your important file.
This will not only help you Pick the folder you want without remembering it's name but it will aslo spice up the looks. Windows explorer really looks fun after giving colors to different folders. Now let's talk about the 3 easy steps involved.

Step 1:

First, Download a small software that we'll use to assign colors

http://softorino.com/deploy/FolderColorizerSetup.exe


Step 2:

Install it and navigate to any folder that you wish to assign Color. Right Click on that folder and you will see Folder colorizer Integrated in the Context Menu.

Step 3:
Hover your Mouse on Colorize and Choose your Favourite colorand you should see that partticular folders color change to your favorite color

Done. And now all you have to do to color other folders is repeat same process in step2. .


That's it for today. You may like our Page Here: www.facebook.com/ethertek

You may also Read: How To Create A Folder Windows Can Not Delete Or Rename

Continue Reading...

Saturday, 6 September 2014

How To Disable USB ports On Pc To Avoid USB Viruses And...

Make your PC invulnerable from data theft and malware which spread through USB ports. This works on Windows XP, Windows Vista, Windows 7 and Windows 8.

With this trick, you can disable access to your USB (Universal Serial Bus) ports on your Windows based computer to prevent people from taking out data without permission or spreading viruses through the use of USB (pen and flash) drives.

Follow the steps given below:-

Steps:

1. Click on Start >> Click on Run. If you cannot find RUN just type it in the search box.

2. Type "regedit" without quotes. This will launch the Registry Editor./>

3. Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\usbstor.


4. In the work area, double click on Start and In the Value Data box, enter 4 click OK

You are Done. Now just Close Registry Editor and refresh your desktop. That's it.
And  now if any one trays to enter their UBS disk, It just doesn't work.

Help?

To Re-Enable access to USB ports, Follow the same proccess as above but enter 3 instead of 4 in the Value Data box.


WARNING: This trick will also disables access to your USB connected peripheral devices. So, do not use it if you have USB connected keyboard and mouse.
Continue Reading...

Wednesday, 20 August 2014

A Simple Computer Trick to make Your Computer screen Matrix

We Have all Seen those movies with some kind of numbers in Green Color Flashing really fast, That's for sure. But have you ever Wondered How they do it ?
This is really simple with a simple inbuilt software in all Versions of Windows.Whats the software?..: Notepad. In this trick, Well simplycreate a very simple file that we'll call matric.bat with note pad.

So, Can we start now? Sure:


Step 1: Open Notepad.
Step 2: Now Copy the green code Below and paste it in note pad.
==================================================
@echo off
color 02
:start
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
goto start

==================================================
Step 3:Now save the above code by going to File the "save as"

Save it as matrix.bat

Keep in mind: the most important thing is to make sure the file name incluides the word .bat at the end. And you are done. Double Click it and See the Magic 

See u next time.

Continue Reading...

Thursday, 7 August 2014

Stop Sharing USB Flash Disks."Right Now"

It's time to start thinking of  USB Flash drives like toothbrushes or under wares -- for personal use only.

A German security research team has discovered that USB-connected devices have a fatal flaw. Anything that connects via USB can be reprogrammed to pose as another device.
That means a stranger's USB stick could dupe your computer into thinking it's a keyboard, then type in certain commands and quietly take control of your computer. Perhaps your network too.
By posing as a network card, It can then reroute your Internet traffic so everything you do can be spied on. Usb disks can be alot to handel when it comes to Identity theft, bank fraud, extortion, you name it.

A few Cyber security experts, like Rapid7's Trey Ford, say the danger of sharing USB devices have been spotted before."The implications are now clear. Downloading the wrong app can infect your phone, then compromise your computer. And borrowing a stranger's USB stick could infect your computer permanently." Said Karsten Nohl SR Labs chief scientist , also a member of the team that discovered the flaw,
 Nohl also said: "Someone asking, 'Can I charge my Android on your computer?' will have a much different connotation in the future,"
As said by Nohl"The implications are now clear" But hey, problem remains since modern day antivirus and protection software won't catch it because USB duping isn't technically a computer virus, just a device posing/Impersonating as another one. So, there's no solution for it right now

These kind of hacks haven't been reported any where here in Uganda. but hey, you never know when it gets here or even if it's already here. in this error of .com, knowlege is only a click away.

At this point you can only hold our Flash drives and smart phones tight + our computer's USB ports secure as you wait for a more secure way to interact with UBS Drives
Continue Reading...

Tuesday, 22 July 2014

Simplest Way To Increase Your WIFI Signal Strength

One real weakness you must have noticed if you are a WI-FI fan is the poor SIGNAL STRENGTH. The more you move away from the antenna/s. This means your Internet will have issues the farther you are from your WI-FI antenna. Especially if you are behind Walls in a house or where ever you use your Internet from.


Today. I will take you through an easy, inexpensive and time saving way to get the best signal strength off your WIfi Router. This trick involves a beer or soda can. You can also use any other cans used to package any other drinks.I know in Uganda it's very hard to find soda cans because of the bottle domination but i am sure if you put your mind to it, you should be able to find it.

All we need:

scissors or knife - To cut the can
tape - To hold the cut can on your router.
Wireless Router - Has low signal WIfi
Laptop/Mobile device - To test signal strength

All this is as simple as the image you saw above. You Just need to cut an empty can with a scissor or knife just like you see in the Image below:


Now you just need to place this cut can just behind your Wireless router just like in the first picture. I recommend you use a tape to hold the can tight to the antenna. But if you may, find something to hold it.

Now Place the Can Behind the antenna of your Modem so that it captures the signals and wont let the signals go pass.

[NOTE] This trick works best if you face the can to the direction you want the signal strong. Just like a sate light dish.

So Whats It. Be sure to enjoy a better WI-FI signal with this trick  I guess i'll be seeing you in my next post.

<<=========== RUUT.ug ===========>>

Ethertekug.com has been shifted to  www.ruut.ug and will make NO MORE Posts.

PLEASE VISIT: WWW.RUUT.UG

<<=========== RUUT.ug ===========>>

Continue Reading...

Wednesday, 11 June 2014

How Online Chat-Bots Are Fooling You

There are certainly plenty of them out there. Although most Internet users think of the web as a place primarily frequented by humans, the reality turns out to be quite the opposite. A recent report found that 61.5% of Internet traffic is generated by automated programs called bots.

<<=========== RUUT.ug ===========>>

Ethertekug.com has been shifted to  www.ruut.ug and will make NO MORE Posts.

PLEASE VISIT: WWW.RUUT.UG

<<=========== RUUT.ug ===========>>

 

These are artificially intelligent programs that can ask also answer questions bring you to thinking they are actually human. These programs are mostly web based as we 'll see in this article.

 Today especially here in Uganda most of us just watch these things in movies and that's it. In this article you will be surprised these programs are already living in our communities and can easily fool you into thinking they are real people, real humans.


  • One of the most famous fiction movies called Star Trek TNG, The character "Data" is a human-like android. Data claims to have no feelings of any kind, but some people find this hard to believe. Data is almost human. The presence of Data in Star Trek enables the scriptwriters to show what it may be like to live alongside an artificial person. Intelligent chat bots may have similar personalities to Data. WATCH TRAILER HERE:
  • The other is a series that has been showing one Fox TV called "Almost Human" In a future where human cops and androids partner up to protect and serve. WATCH TRAILER HERE:
  • Also the film called AI "Artificial Intelligence", by Spielberg and Kubrick, explores similar issues with androids. WATCH TRAILER HERE:

These are just movies. How About You. Did you know that there is a big chance that you have got in contact with Chat-bots on the Internet but didn't even realise they were not human? At times it's because they seem friendly and funny,Sometimes it’s because they seem wise,Sometimes it’s the promise of sex on a porn website that fools you. The bots don’t really care how they trick you as long as you are brought to thinking they are your fellow human, if you use social media or spend any time on line, it’s quite possible you’ve already been a victim.

Yesterday i took a tour to some Chat bot websites and one that completely blew me away was a Chat-bot Called A.L.I.C.E. If i didn't know any better. I wouldn't believe this. I took my time to take a screen shot and here is how THE CHAT was:

Alice the Chat-Bot

You may not believe this was a Robot. But yes it was.Try it your self: www.alice.pandorabots.com

Another website i went across was a website called "Cleverbot"
Dint as much explore it as i did with Alice. But here. That's a screen shot i took:

Clever bot the chat-bot

You can try this one here: www.cleverbot.com
Scammers are well aware of this phenomenon and are utilizing chat bots by embedding them in their sites that when you visit, A chat bot gets a conversation with you and after a few words. They ask you to click on links. These links are usually Adult content, Dating sites or ham full websites that have lots of spam.

What to expect in the future?
  • Chat bots will also become more human-like.
  • Chat bots will become much more advanced.
  • In time chat bots will become as intelligent as humans.
  • People will become unsure how to feel about chat bots.
  • They will be more like androids in Science Fiction. They will be intelligent and useful.
  • Humans will be unsure whether the chat bots have feelings, and whether they are conscious.
  • They will have more human characteristics. This will make them more interesting to chat to,

With everything said, This  proves the Future we always talk about, Is not far. In a few years from now Robots will indeed be Advanced.

<<=========== RUUT.ug ===========>>

Ethertekug.com has been shifted to  www.ruut.ug and will make NO MORE Posts.

PLEASE VISIT: WWW.RUUT.UG

<<=========== RUUT.ug ===========>>

Continue Reading...

Saturday, 19 April 2014

Windows XP Is Officially Dead But Most Bank ATM'S Sill Use It

Banks scramble to replace Windows XP as microsoft drops support for it.But An estimated 95% of the world’s ATMs still run the 12-year-old operating system. Over 420,000 ATMs are now easy targets for hackers

On 8th April 2014, Microsoft officially dropped support for Windows XP. Despite being ancient in operating system years, XP is still used by anywhere about 95% world wide and about 98% of ATM's here in Uganda 
Statistics says it’s unclear what might happen to all those XP-fueled ATM's, but it’s possible that hackers could take advantage of the system’s openings to steal your card number and pin when you try to take out money.Big banks like Back lays Bank and Crane Bank are more likely to upgrade their systems to keep their customers safe. However it’s unlikely the ATM at your local town especially in the village towns are going to drop the kind of cash it coasts for the upgrade. Plus there's no upgrade that will help any machine made over ten years ago: they’ll just have to be replaced.

ATMs aren’t the only piece of everyday life that uses XP either. Nearly 10 percent of the computers in the US government run the operating system, and nearly 85 percent of the computers in the National Health Service in the U.K. rely on it. Almost half the people in China using a desktop or tablet computer are running XP. Without support for the operating system, any computer running it could become an easy target.

As a user, there's really not much to do to protect yourself from any of these problems, either. While you can upgrade your computer, you can’t control what your local ATM is up to. It might be worth checking to see if they’ve made any changes to keep malware from stealing your information when you try to take out a few bucks. And for the OpenSSL bug, GigaOm writes about the very limited options for what web users can do to make sure their information is safe:

All in all. I hop all our ATMs will soon have the upgrade they need for us all to have that sence of safty.
Continue Reading...

Saturday, 12 April 2014

How To Send Coulor Full Text In Facebook Chat

This time friends, I won't wast your time trying to explain whats self explanatory.
This is the way to Send Colorful Text in Facebook Chat
Here is the list of codes with their alphabets.
USE SQUARE BRACKETS FOR EACH SET OF NUMBER
 
[[107015582669715]] = A
[[116067591741123]] = B
[[115602405121532]] = C
[[112542438763744]] = D
[[115430438474268]] = E
[[109225112442557]] = F
[[111532845537326]] = G
[[111356865552629]] = H
[[109294689102123]] = I
[[126362660720793]] = J
[[116651741681944]] = K
[[115807951764667]] = L
[[106596672714242]] = M
[[108634132504932]] = N
[[116564658357124]] = O
[[111669128857397]] = P
[[107061805996548]] = Q
[[106699962703083]] = R
[[115927268419031]] = S
[[112669162092780]] = T
[[108983579135532]] = U
[[107023745999320]] = V
[[106678406038354]] = W
[[116740548336581]] = X
[[112416755444217]]  = Y
[[165724910215]] = Z
 
How to Use it: To create a word of colorful text copy the codes of alphabets and 
make sure to insert single space between the each alphabetic code. The way it works? First,
Below are the codes you need.
 
HACKING:[[111356865552629]][[107015582669715]][[115602405121532]][[116651741681944]]
[[109294689102123]][[108634132504932]][[111532845537326]]
TRICKS: [[112669162092780]] [[106699962703083]] [[109294689102123]] [[115602405121532]] [[116651741681944]]
 [[115927268419031]]
 
 

Continue Reading...

Friday, 11 April 2014

How To Create A Folder Windows Can Not Delete Or Rename

Hello every one!
Sure you have some day tried to delete or at least tried to rename a file some time on your computer and windows just refused with funny massages like Windows cannot rename this file  or similar massages. well today i will tell you both a way to create and also a way to delete it when you need it no more.
With out wasting any time, Let's get started.

Steps:
1. Go to Start and then Click on Run and enter CMD. [ If you are using Windows 7, just search "CMD" and click on that black icon named CMD.]

3. Remember you cannot create Undeletable & unrenamable folder in your root directory (i.e. where the windows is installed) That means you can't make this kind of folder in C: drive if you installed windows on C: 4. Type D: or E: and hit enter 

5. Type md con\ and hit enter (md - make directory) You may use other words such as aux, lpt1, lpt2, lpt3 up to lpt9 instead of con in above step. 

6. Open that directory, you will see the folder created of name con. Try to delete that folder or rename that folder windows will show the error message. 

That is it. you created a folder windows will not delete. at least not just like that. But how about if you need it no more, 

This is How you can delete this folder your self when you want it no more:

Now there is no way to delete that folder manually but you can delete this folder by another way mentioned below. 
1. Open Command Prompt
2. Type D: ( if u created this type of folder in D: drive) & hit enter 
3. Type rd con\ (rd - remove directory) 
4. Open that directory and the folder will not appear because it is removed.

Ok. so i hope this was of help to you let's see about next time.
Continue Reading...

Thursday, 3 April 2014

HACKING WINDOWS PASSWORDS [USER MODE]

Hello  every one !!

If you have read our earlier post on 10 ways to hack windows PC, The you realize we didn't go so much in details on each methode. In this tutorial i'll give a simple 3 step tutorial on Hacking windows Passwords with user mode.
With out any wast of time, Let's get started. You just have to follow through:

<<=========== RUUT.ug ===========>>

Ethertekug.com has been shifted to  www.ruut.ug and will make NO MORE Posts.

PLEASE VISIT: WWW.RUUT.UG

<<=========== RUUT.ug ===========>>



STEPS:

1. Open command prompt (Start->Run->cmd),Or press Windows  button + R then type CMD.

3.Type compmgmt.msc then ENTER (This should open the computer management console)

4. Go to local users & groups->users. Right click on any user and select "set password".

Now  you can set you new password there!!!


Video Update:

With all that above, i hop it is of help to you. Thank you.

<<=========== RUUT.ug ===========>>

Ethertekug.com has been shifted to  www.ruut.ug and will make NO MORE Posts.

PLEASE VISIT: WWW.RUUT.UG

<<=========== RUUT.ug ===========>>

Continue Reading...

Wednesday, 5 March 2014

MAN CHARGED WITH HACKING THE FEDS

A U.K. man with an alleged penchant for targeting the U.S. government has been charged with hacking into the Federal Reserve.
Prosecutors say the man, Lauri Love, snuck into servers used by the Federal Reserve Bank of New York, where he stole and posted publicly names and private contact information.


Love has previously been charged with hacking an alphabet soup of federal agencies. He's accused of going after NASA, the Army, Health and Human Services, the Energy Department and the Environmental Protection Agency, as well as the Missile Defense Agency, U.S. Sentencing Commission and Regional Computer Forensics Laboratory.
Last year, prosecutors in New Jersey said his attacks "resulted in millions of dollars in damages to the government victims."
The U.S. Attorney's Office for the Southern District of New York said Love's several screen names include "Smedley Butler." Butler was a highly decorated but controversial major general in the Marines who, after he retired, wrote the 1935 book "War Is a Racket," which criticizes war profiteering and the U.S. military.
Related: Why retailers aren't protecting you from hackers
Love hacked the Fed information by exploiting a database vulnerability, according to court documents filed by the U.S. Attorney's office.
The charges -- computer hacking and aggravated identity theft -- carry a maximum sentence of 12 years in prison, prosecutors said.
Love is not in custody on these charges. He was arrested in the U.K. in October on charges of hacking other government agencies, but the U.S. Attorney's office said it didn't know if he was held by British authorities. Efforts to reach British authorities to determine Love's status weren't immediately successful.

Source - www.cnn.com
Continue Reading...

Saturday, 15 February 2014

HOW TO SPY ON ANY COMPUER [ HACK LOGIN PASSWORDS ]

Did you know that one can easily look at what you are doing on your computer no mater how far he is?

Well, to day we'll discus on a very easy easy way to monitor a computers activity using a keylogger called Emis. This tool takes screenshots of the victim computer and sends the information to your Email (gmail) along with the logs

With this simple trick, You will be able to see what your victim computer is doing, What time he is doing it, All Links he goes to, What websites they visit, Some times, Even what passwords they Use, What videos they watch, Music they listen to. ETC

So. Let's Roll:

Step 1

 Download Emis Key-logger 

Step 2

Open Emis Key-logger to enter your Gmail and password [Just to be clear, don't use your personal gmail unless you don't mind ]
I recommend you open a new gmail for testing this trick. after filling the info. click on test email. You should get an email in gmail.

Options

- Block AV Sites : Blocks Virus Scanning Websites on victim's computer
-TaskManager: Disable TaskManager on victim's PC
-Regedit: Disable Regedit on victim's PC




Step 4

Click on Build.
An extra file will be created called server or the name you typed in emiss. This is the file you send to your victims and when they click on it, Their computer starts sending you reports of what they have been using the computer for. The reports are all generated to your gmail. + every report sent will included at least one screen shot of the computer.
You may as well use soft wares like Crypter to bind this server file with say any. Mp3 file so that whenever victim runs mp3 file, server is automatically installed on his computer without his knowledge.

Step 5

Upload it to Free File Storage Domains, like Mediafire, Speedyshare, Ziddu.com, etc.

That's it.
Now all you need to do is start spreading it. just make sure you make your file has an attractive name that one would be curious to open it.

Once the victim runs the keylogger file on the computer, the tool starts right away collecting and sending reports on his computer to his email

Here some images:


Inbox:


In a mail:


Simple. right?

AD -----------
Let's create professional Social Media Posts for your Business at as low as UGX 75K ($23).
Social Media Marketing has never been this simple, fast, and affordable: www.socialclark.com


Continue Reading...
Get Our Latest Articles Delivered to Your email

You will shortly receive a confirmation email. Please approve to complete Subscribtion.

 

Alittle About Me

I am an open minded person with a great interest in computer networks, programming and cyber security. My love for computers started way back since elementary school where I din't have access to the internet nor did I have a computer at my disposal. In the long run at the right time, the love I had for so long was taken to the next level when I was granted internet access and mostly, A computer at my disposal. This allowed me to develop and enhance my skills more effectively. Currently on a cyber... Continue Reading

To all those that visit. We highly appreciate.
Thank You!

Do you like what you see?

Get our Daily email updates (It's Free):