Archive for the ‘mobile’ Category

tv-pure google

According to The Independent, Google’s voice search function doesn’t just turn on when you ask it to. Rather, it records almost everything.

Feeling unnerved yet? Well, it gets even wilder. You see, you can listen to the recordings Google has stored and associated with your name simply by visiting this webpage.

There’s also this webpage that will show you how much Google knows about your every move on the internet.

Both webpages will contain information from not only computers but any Android device you’ve logged in to your Google account.

How to Delete the Recordings

Luckily, if you’re not too happy about Google having potentially hours of your voice in its database, you can delete those files.

Beside each file’s title you’ll see a checkbox.

google-speach

Just select the three dots top right and select delete    google-voice-delete

How to Stop Google from Recording You Again

Now, as The Independent points out, stopping Google from recording you does result in some limited functionality if you’re using an Android phone or the company’s search.

However, you may be someone whose concern for privacy is much greater than finding what you’re looking for easily. If so, begin by never using Google’s voice search functions again. Follow up by disabling Google’s voice search.

  1. Navigate to Settings
  2. Tap the General tab
  3. Under “Personal” find “Language & keyboard”
  4. Find “Google voice typing” and tap the Settings button
  5. Tap “Ok Google” Detection
  6. Under the “From the Google app” option, move the slider to the left. If Google voice is already enabled move the slider to the left of “From any screen” or “Trusted Voice” and the “From the Google app” will appear.

 

tv pirate

The scallywags at The Pirate Bay have created a new port for all digital pirates to drop anchor. The popular torrent directory recently released a mobile version of its website after years of cramming the PC version onto mobile screens.

The new look is unmistakably The Pirate Bay with its trademark ship logo, options to search, browse, view recent torrents and the top 100.

Along with the refreshed look, the Pirate Bay’s new mobile site has its own URL. Instead of auto-detecting your screen size and delivering the mobile version under the same web address, the mobile Pirate Bay is located at themobilebay.org.piratebaymobile-100361850-medium

In a discussion with Torrent Freak, the team behind The Pirate Bay says they decided to use a new site address to better resist takedown attempts.

Mobile users who visit The Pirate Bay’s main site are supposed to be redirected to the new site. But in my brief tests on a Nexus 4 and 7 that wasn’t the case. Trying to visit The Mobile Bay from a PC, however, did trigger a redirect to the PC-friendly version of the site.

With only a few torrent apps available for Android and none for iOS, most people are still downloading (non-infringing) torrents from their PCs. Nevertheless, the mobile web site is still handy for browsing and may actually become an important tool in the coming months.

Torrent Freak reports that The Pirate Bay team is also at work on a project called the RSSBay. This site would support personalized RSS feeds that would allow you to add a torrent to your feed on the go. Adding new content to your feed could then be used to start an automatic torrent download on your PC at home.

Considering it took The Pirate Bay team quite a while to get their act together to create a mobile site, your can probably count on seeing the RSSBay later rather than sooner.

tv heart

It is not just websites and routers that are vulnerable to the web-wide bug Heartbleed — certain Android models are at risk too.

As Google noted in its own Heartbleed disclosures on Wednesday, Android devices running Android 4.1.1 Jelly Bean are vulnerable to Heartbleed. Google said patching information is being distributed to its Android partners.

So how many phones are still running Android 4.1.1? That’s difficult to determine. Although 34.4% of Android devices are running Android Jelly Bean, Google does not break out how what percentage of users are on its various versions — 4.1.1 and 4.1.2.

The latest version of Jelly Bean is 4.1.2, which was released in October 2012.

A Google spokesperson confirmed to Bloomberg that there are “millions” of devices running Android 4.1.1.

Because Android updates are controlled by phone manufacturers and wireless carriers, it can be challenging to determine what versions of Android are available for various devices. We do know, however, that the HTC One S is running Android 4.1.1.

Heartbleed underscores what has long been one of Android’s biggest problems: pushing out software updates to its myriad vendors. Android updates are the responsibility of the device maker, and often need to be approved by wireless carriers. The only exceptions are Google-made devices, such as the Nexus series and Google Play Edition phones.

Previous attempts at getting phone manufacturers and carriers to adopt Android updates have not met with success. If there is a positive aspect to Heartbleed, it is that this might scare device makers into pay more attention to versions (and to put in better processes for security updates).

If you know your Android device is running Android 4.1.1, let us know the model and manufacturer in the comments, along with your wireless carrier. That will give us all a better sense of which companies are falling behind in the battle to patch Heartbleed.

tv crime2

Before I start this guide, I would like to make one thing clear SIM CLONING is illegal. This tutorial should be used for educational purposes only.

First off a little introduction about SIM CARD:

Our SIM cards contain two secret codes or keys called (imsi value and ki value) which enables the operator to know the mobile number and authenticate the customer, these codes are related to our mobile numbers which the operators store in their vast database, it is based on these secret keys that enables the billing to be made to that customer.

SIM cloning extracting these two secret codes from the SIM and programme it into a new blank smart card (often known as wafer) since the operator authentication on SIM is based on these values, it enables us to fool the operators in thinking that it’s the original SIM, this authentication is a flaw with the GSM technology

Now which SIM cards can be cloned?

SIM cards are manufactured based on three algorithms COMP128v1, COMP128v2 and COMP128v3. It is important note currently only COMP128v1 version SIM cards can be cloned, since this is the only algorithm, which has been cracked, bear in mind that 70% of all the SIM cards we use are COMP128v1.

Cloning a card:

1. Buy a SIM card Reader

2. Need a Blank SIM card or super SIM card

3. Download and install MagicSIM

4. Download and install USB SIM Card Reader Software3.0.1.5

6. Go in phone tools, select SIM card, then select unlock SIM, it will prompt for a code.

7 Call network provider, they will ask for your phone number, your account info, name and security code, then they will ask why you want to unlock your SIM card, just tell them you need to unlock your SIM to get it to work with your overseas phone or something.

8. Once they give you the SIM unlock code, enter it, and it will say SIM unlocked.

9. Remove the SIM from your phone, place it in the card reader, click read from card in magic SIM the application.

10. When it displays ‘connected’, select crack SIM in the toolbar. Click strong ki and select all of the other find options and then click start.

11. Once your ki is found and the crack is finished, click file, save as and save your cracked SIM info to a file.

12. IMPORTANT!!! You must click disconnect from the file menu or you will ruin your SIM card.

Once it says disconnected, remove the SIM. Put the SIM in your phone and see if it still works, it should. (If not, either you did not unlock your SIM, or you tried to copy it instead of crack and save.)

13. Insert blank 3g card USB SIM Card Reader Software3.0.1.5, not magic SIM at this point.

14. Click connect

15. It should say ‘No Info Found’ if it is truly blank.

16. Select write to SIM, it will prompt you to select a dat file, select the one you saved earlier. Now click start, it will take about 10 minutes to write it, once it is complete, it will ask for a security code, enter the security code the network provider gave you, then click finish.

17. Your card is now cloned.

It should be noted that if you try to make two calls at the same time, one will connect; the other will say call failed, both phones will get the same messages, text and voice, and both will receive the same calls, but only one can talk at a time.

 

tv crime2
So this post has come about by one of my friends posting the below video from LiveLeak on Facebook which is quite terrifying if you are a parent. But have no fear I will tell you how to stop people from tracking you or your child.

video pic

Some cameras, smartphones and tablets add location data to each picture you take. This means that anyone who wants to can see the exact longitude and latitude of the image. Geotagging data is wonderful for finding out where a picture was taken. However, it may not be obvious if you don’t know how to view it. For those who want to find out whether photos have been geotagged before posting them online, it is important to know how to check. The process is simple and helps to have better control over your pictures.

Is Your Camera Geotagging

Before viewing or checking for location data, you should know whether your camera is geotagging your pictures. Any camera you use must have GPS enabled in order for geotagging to occur. This is most common in smartphones, but some digital cameras have this capability as well. Without this feature, no location data is embedded in images. Remember that this data, called EXIF data, is invisible unless you know how to look for it.

What You Need

To view EXIF data, all you need is a web browser. There is no need to download extra software on your computer. Navigate to Jeffrey’s EXIF Viewer. Unlike many other tools available, this one keeps it simple and focuses on location information so you don’t have to sort through a lot of unnecessary data. Another benefit is the wide variety of file types that are supported. You would have to have some extremely rare file types for this tool not to work for you.

Using Jeffrey’s EXIF Viewer

This tool provides two different options for viewing geotagged images. The first allows you to view information from images already online. The second allows you to check images before they are posted online.

For online images, open the picture in your browser. Copy the URL of the image. The quick way is to highlight the URL and press Ctrl + C. Open the browser window with Jeffrey’s EXIF Viewer. Paste (Ctrl + V) the URL into the Image URL box. Press View Image At URL. You will see a few details about the camera, the date the image was taken and finally the location data along with a map.

For images stored on your computer, press Browse beside the Local Image File box. Choose the file in question and press View Image From File. You will see the same data the online option.

Testing it

Here is a picture I took in the summer of an exhibition about the activist group Anonymous

Post Picture

Now right click on the image and select ‘Copy Link Address’

Navigate to http://regex.info/exif.cgi and pastie the link into the URL Image box

Hit ‘View Image at URL’ and there you go.

location

Although the image on the page is a bit small, you can see tones of data including an arrow pointing to the Museum of London in the UK which is correct.

Now just imagine if this was a picture of your child on a social media site and the person viewing wanted to track them or their school down. Have no fear the following steps will tell you how to stop this from happening.

What can you do to protect yourself from stalkers and other bad guys using geotags to track you down?

Consider turning off location services on some location sharing apps

Find the location sharing settings on your smartphone and turn off the ones that you think might pose a personal safety risk. You can always turn them back on later if you want to.

Most smartphones will let you turn off location sharing for individual apps as an alternative to turning them off globally.

There are some apps such as ‘Find My iPhone’ that you won’t want to disable location sharing on. If you do disable location sharing on apps like ‘Find My iPhone’, then your phone won’t be able to relay its position and you won’t be able to find it using the ‘Find My iPhone’ service should it get lost or stolen.

Remove geotags from your digital photos

If you want to remove geotag information from your image files then you can use an app such asdeGeo (iPhone) or Photo Privacy Editor (Android) to remove the geotag info from your photos.

Consider turning off the location sharing setting of your phone’s camera app as well so that the GPS info does not get recorded as part of the picture’s meta data, this will save you the hassle of having to strip out the location data later on.

How do I turn off Geotaging on my Smart phone

Android 4.2 phones

  1. Start camera application
  2. Hit the Settings button
  3. Scroll down and find the GPS Tag option and turn it off

In older versions, the option may be called “Store Location,” but is it essentially the same process.

BlackBerry 6.0 and 7.0

RIM suggests through the online documentation that disabling geotagging be done on BlackBerry Enterprise Server,  which would work from an admin’s point of view if an agency uses BES. If not, to turn the setting off on an individual BlackBerry  phone:

  1. Open Camera
  2. Set the Location icon to “Disabled”

For some earlier versions, hit the Menu and Option buttons before changing the setting.

iPhone 4 and 5

  1. Go to Settings
  2. Select General
  3. Select Location Services
  4. Set Camera to “Off”

For older versions users can’t really turn off geotagging for the camera without disabling it for all applications. But location warnings can be set to go off when an application is using them.

Windows Phone 7 and 8

  1. Go to Settings
  2. Navigate to Applications
  3. Scroll down to Pictures & Camera
  4. Set “include location (GPS) info in Pictures you take” to “Off”

I hope this has put your mind at ease, but if you do have any question please contact me. Also please share this on social media sites and on friends pages.

TV_Android

Have you ever wanted to get a little more information from your Android device?

Just dial the below numbers (included the * and #’s)

Android Secrete codes
————————————
1. Phone Information, Usage and Battery – *#*#4636#*#*
2. IMEI Number – *#06#
3. Enter Service Menu On Newer Phones – *#0*#
4. Detailed Camera Information – *#*#34971539#*#*
5. Backup All Media Files – *#*#273282*255*663282*#*#*
6. Wireless LAN Test – *#*#232339#*#*
7. Enable Test Mode for Service – *#*#197328640#*#*
8. Back-light Test – *#*#0842#*#*
9. Test the Touchscreen – *#*#2664#*#*
10. Vibration Test – *#*#0842#*#*
11. FTA Software Version – *#*#1111#*#*
12. Complete Software and Hardware Info – *#12580*369#
13. Diagnostic Configuration – *#9090#
14. USB Logging Control – *#872564#
15. System Dump Mode – *#9900#
16. HSDPA/HSUPA Control Menu – *#301279#
17. View Phone Lock Status – *#7465625#
18. Reset the Data Partition to Factory State – *#*#7780#*#*
19. Format Your Device To Factory State(will delete everything on your phone) – *2767*3855#
20. Hidden Service Menu For Motorola Droid – ##7764726

TV_Android

1. Complete Information About your Phone

*#*#4636#*#*
This code can be used to get some interesting information about your phone and battery. It shows following 4 menus on screen:
• Phone information
• Battery information
• Battery history
• Usage statistics

2. Factory data reset

*#*#7780#*#*
This code can be used for a factory data reset. It’ll remove following things:
• Google account settings stored in your phone
• System and application data and settings
• Downloaded applications
It’ll NOT remove:
• Current system software and bundled application
• SD card files e.g. photos, music files, etc.
Note: Once you give this code, you get a prompt screen asking you to click on “Reset phone” button. So you get a chance to cancel your operation.

3. Format Android Phone

*2767*3855#
Think before you give this code. This code is used for factory format. It’ll remove all files and settings including the internal memory storage. It’ll also reinstall the phone firmware.
Note: Once you give this code, there is no way to cancel the operation unless you remove the battery from the phone. So think twice before giving this code.

4. Phone Camera Update

*#*#34971539#*#*
This code is used to get information about phone camera. It shows following 4 menus:
• Update camera firmware in image (Don’t try this option)
• Update camera firmware in SD card
• Get camera firmware version
• Get firmware update count
WARNING: Never use the first option otherwise your phone camera will stop working and you’ll need to take your phone to service centre to reinstall camera firmware.

5. End Call/Power

*#*#7594#*#*
This one is my favourite one. This code can be used to change the “End Call / Power” button action in your phone. Be default, if you long press the button, it shows a screen asking you to select any option from Silent mode, Airplane mode and Power off.
You can change this action using this code. You can enable direct power off on this button so you don’t need to waste your time in selecting the option.

6. File Copy for Creating Backup

*#*#273283*255*663282*#*#*

This code opens a File copy screen where you can back up your media files e.g. Images, Sound, Video and Voice memo.

7. Service Mode

*#*#197328640#*#*
This code can be used to enter into Service mode. You can run various tests and change settings in the service mode.

8. WLAN, GPS and Bluetooth Test Codes:

*#*#232339#*#* OR *#*#526#*#* OR *#*#528#*#* – WLAN test (Use “Menu” button to start various tests)

*#*#232338#*#* – Shows Wi-Fi MAC address

*#*#1472365#*#* – GPS test

*#*#1575#*#* – Another GPS test

*#*#232331#*#* – Bluetooth test

*#*#232337#*# – Shows Bluetooth device address

9. Codes to get Firmware version information:

*#*#4986*2650468#*#* – PDA, Phone, H/W, RFCallDate

*#*#1234#*#* – PDA and Phone

*#*#1111#*#* – FTA SW Version

*#*#2222#*#* – FTA HW Version

*#*#44336#*#* – PDA, Phone, CSC, Build Time, Change list number

10. Codes to launch various Factory Tests:

*#*#0283#*#* – Packet Loopback

*#*#0*#*#* – LCD test

*#*#0673#*#* OR *#*#0289#*#* – Melody test

*#*#0842#*#* – Device test (Vibration test and BackLight test)

*#*#2663#*#* – Touch screen version

*#*#2664#*#* – Touch screen test

*#*#0588#*#* – Proximity sensor test

*#*#3264#*#* – RAM version