Sunday, 9 July 2017

About This Blog


This Blog Was Linked With GSworldinfo.in
And You most trust this website to download the software and torrent from here.You can learn tips and trick’s of android and Computer.

About The Admin:

 Hollow i am sairam i from india i am studying graduation level in india.
I create this blog for who arte interested to know hacking and learn about computer and some other tricks and tips. Not only these i can link some Download link of pdf and word files. These i can collect from various sites and giving download link on my blog and My Website.
*. If you have any question’s and suggestions mail me.

My mail id was Gsworldinfo.in@gmail.com





To Recover Deleted Data On Android


Requirements to recover deleted data on android.

1. First Of all Root Your Android .
(If You want root your android .show how to root android click here


2.And the Download the Disk digger From Here

3.IF your mobile not rooted by above step(STEP:1)
Mail me Gsworldinfo.in@gmail.com.com
(OR)
3.IF you successes to root your mobile  open disk digger pro and allow the root permissions 
wait for 5-10 min to complete to search process to recover your deleted data on your device.
4. Congracts finally you have successfully recovered your data on android.

IF you want to see the process of data recovery form you tube click HERE  

Thanks Viewing my blog on blogger.com
If you like this blog follow me on Facebook HERE
On you tube Here

Saturday, 8 July 2017


What are the advantages and disadvantages of rooting android

____________________________________________________________________________
To root or not to root, this is the question. Most of you know that rooting means you have gained all the control over the entire system. You can download and use all of the tools and blocked features on your device. However, rooting your Android is not risk-free. To speak exactly, it's like a two edged sword as with root access nothing is there to prevent some malicious apps from destroying your system. So what are the advantages and disadvantages of rooting your Android device? This is a must-have-to-know question before you choose to root your Android phone.
It's not to give you the conclusion whether you should root your device. Just make sure you have all side understanding of rooting.

Advantages of Rooting

For the benefits of rooting your device, I have introduced that before. You can have a look at the previous article. Even that, I still share the big advantages of rooting here:
1. Installing Custom ROMs
After rooting your device, you can flash a custom ROM or Kernel, which means you can have a new device.

2. Remove Preinstalled Crapware
Manufacturer won’t allow you to uninstall those preinstalled apps on your device. Rooting a device can make them removed easily, which ensures a high running quality.

3. Blocking Ads in Any Apps
Sick of the pop-up ads when playing games? A rooted device can remove this annoying ads immediately.

4. Install Incompatible Apps
Some wonderful apps need the root access if you install them on your device. Root your phone, enjoy more apps.

5. Keep Latest Android OS
A rooted Android can get the new OS months before the carrier releases the update, often along with a few bonus features.

6. Change Skin for your Android
As you can see, there are only 3 to 4 default skin on your device to change. But if you root your phone and install the new ROMs, you can enjoy the customized and tweaked skins on your device.

7. Boost your Android Device’s Speed and Battery Life
Some powerful apps like Greenify can close the useless applications automatically, which can effectively improve your device’s performance. Of course, Greenify needs root access.

8. Make Complete Backups of Your Android Phone or Tablet
A unrooted Android phone can only backup some settings and apps of your device. Titanium can be used on rooted device to give you a complete backup.

In one word, rooting can make you be the master of your Android phone. You can automate everything on your Android device.

 

Disadvantages of Rooting

Most of you may know more about the benefits of rooting, however, the disadvantages of rooting have not be noticed very. Viewing all of the pros and cons of rooting Android can be good for you to make decisions.

1. Root can Brick Your Device
Compared with unrooted Android device, the rooted one faces a common threat from mis-operation and sometimes you may turn your Android device into a brick.
Avoid this risk: Just download apps from reliable place like Google play, and, do not delete the files if the files are suggested not to delete by rooting apps.

2. Say Good-Bye to the Warranty
The Android device manufacturers will not cover the damage after you rooting your device. For some brand, we can unroot the device after rooting, so, the manufactures don’t know if you have rooted your Android device or not. But to make matters worse, Android device manufactures also go to great lengths to know if your device has been rooted!

3. Problems with Updates
Sometimes you root Android phone to get latest OS but after rooting, you may find that the automatic updates to the firmware stopped. Updates fail to install due to software modifications that occurred while the distribution has been rooted.

Comparing with these pros and cons of rooting your Android device, then choose if you need to root your Android device or not.

When you root your android phone, you may need to connect your android phone to PC with USB cable, and enable the USB debugging mode, install driver for the phone and so on. If you want to root your phone, choose a easy-to-use app for one click root may help a lot! Here recommends iRoot software for you, which can make you Root Your Device With Kingoroot or iroot or flashable zip file of super su . And These  total free.


If You like this post  Please Follow Me :
Follow Me on facebook  Here
To View My Youtube Channel Here
How to Become Hacker
_________________________________________________________________________________



These Skills can  made be a hacker 

First You may know the fundamentals of computer and networking.

These are the basics that every hacker should know before even trying to hack. Once you have a good grasp on everything in this section, you can move into the intermediary level

1.Basic Computer Skills 

It probably goes without saying that to become a hacker you need some basic computer skills. These skills go beyond the ability to create a Word document or cruise the Internet. You need to be able to use the command line in Windows, edit the registry, and set up your networking parameters.

2.Networking skills

It is possible good to know 
You need to understand the basics of networking, such as the following.
  • DHCP
  • NAT
  • Subnetting
  • IPv4
  • IPv6
  • Public v Private IP
  • DNS
  • Routers and switches
  • VLANs
  • OSI model
  • MAC addressing
  • ARP

3.Linux skills

        The linux is advanced best pen testing operating system.

  Every hacker must needed these operating system.If you need to improve your Linux skills, or you're just getting started with Linux, check out my Linux series for beginners below.

3.Wireshark Or Tcpdump

Wireshark is the most widely used sniffer/protocol analyzer, while tcpdump is a command line sniffer/protocol analyzer. Both can be extraordinarily useful in analyzing TCP/IP traffic and attacks.

54.Virtualization

You need to become proficient in using one of the virtualization software packages such as VirtualBox or VMWare Workstation. Ideally, you need a safe environment to practice your hacks before you take them out in real world. A virtual environment provides you a safe environment to test and refine your hacks before going live with them.

6Security Concepts & Technologies

A good hacker understands security concepts and technologies. The only way to overcome the roadblocks established by the security admins is to be familiar with them. The hacker must understand such things as PKI (public key infrastructure), SSL (secure sockets layer), IDS (intrusion detection system), firewalls, etc.

7Wireless Technologies

In order to be able to hack wireless, you must first understand how it works. Things like the encryption algorithms (WEP, WPA, WPA2), the four-way handshake, and WPS. In addition, understanding such as things as the protocol for connection and authentication and the legal constraints on wireless technologies.

8Scripting

Without scripting skills, the hacker will be relegated to using other hackers' tools. This limits your effectiveness. Every day a new tool is in existence loses effectiveness as security admins come up with defenses.
To develop your own unique tools, you will need to become proficient at least in one of the scripting languages including the BASH shell. These should include one of Perl, Python, or Ruby.

9Database Skills

If you want to be able to proficiently hack databases, you will need to understand databases and how they work. This includes the SQL language. I would also recommend the mastery of one of the major DBMS's such SQL Server, Oracle, or MySQL.

10Web Applications

Web applications are probably the most fertile ground for hackers in recent years. The more you understand about how web applications work and the databases behind them, the more successful you will be. In addition, you will likely need to build your own website for phishing and other nefarious purposes.

12Advanced TCP/IP

The beginner hacker must understand TCP/IP basics, but to rise to the intermediate level, you must understand in intimate details the TCP/IP protocol stack and fields. These include how each of the fields (flags, window, df, tos, seq, ack, etc.) in both the TCP and IP packet can be manipulated and used against the victim system to enable MitM attacks, among other things.

11Forensics

To become good hacker, you must not be caught! You can't become a pro hacker sitting in a prison cell for 5 years. The more you know about digital forensics, the better you can become at avoiding and evading detection.

13Cryptography

Although one doesn't need to be a cryptographer to be a good hacker, the more you understand the strengths and weaknesses of each cryptographic algorithm, the better the chances of defeating it. In addition, cryptography can used by the hacker to hide their activities and evade detection.

Think Creatively & Problem-Solving Skills

These Mentioned Skills You May need To help to become a good and master hacker.

Friday, 7 July 2017

Gsworldinfo.net








How to Install Kali Linux On Oracle box


Follow My YouTube Account :-Here
Follow My Profiles On Facebook:-Here
______________________________________________________________________________


1.Once You Downloaded the oracle box and install it.
2.When You Opened it and press on new.
Like This:-


2.Enter The name Kali Linux



When You enter the name it was automatically take type and version of kali linux
and then click on next..
3.Memory size
The minimum 1gb ram required to install kali linux on oracle box.
if you are using 2gb ram computer it was stuck when installing it.
so try to install on 4gb above ram computers
it was show like this
And The press next.

4.Hard Disk

Select on "create a virtual hard disk now"

and then press next

5.Hard Disk Type

Select On VDI (Virtual Hard Disk Image)

And then Press Next

6.Storage On Physical Hard Disk


And Select On Dynamically Allocation and then press next

7.File Location and Size

Minimum Size you must given to installation was 10gb i recombinant of  20 gb and press Create



8.And then it was configured to start the application.


9.And then You Need To modify The setting to better performance and open settings 

* And Select The System And Enable The I/O APIC
and ma you have shown any invalid setting and download and install extensions pack Here.
And again showing invalid settings and adjust the base memory on green location only like below shown image.

You seen above the arrow was not cross the reline and it was only on green line.
That's it.

the seconds thing open the processors and select minimum 2 processors  And Enable Extended Features .

And the select storage And press the cursor on Cd Image and select Choose virtual Disk Optical file (it mean you downloaded Iso File).

And once Select the iso file and next select the usb and choose usb 2.0(EHCI) Controller
And if you are facing any  invalid settings install the oracle box extensions pack.
And then press ok.

and push on start button .
it was start like this



And the select Install Button
and wait 30s It was booted and then
1.Select language as english (or) You Comfortable.
2. And the Select Your Country 
i am selecting as India
3.And then select the key board language as American English
4.wait few moments it was automatically connect to network 
5.And now it was ask the host name i am named as root (or) Named you can named as you wish but be remember it.
6.and then it was ask domian name press continue 
7.and then it was ask for password i am changing as 1234
if you can change password as you wish for
8.and the it was automatically set up the clock and some component
9.and setup the partition 
i am suggest press the guided partition
10.and the select the disk to partition
11.and then select the partition scheme as all files in one partition(recombenent for new users)
12.And then select the finishing the partition and write changes to disk.
13.and then it was ask for write changes to disk you can select as "Yes"
14.and then it was create ext4 file system and it was copy the data to disk and install the system

"NOTE= in this time mouse pointer does not work use move to target selection to use TAB and select button use as ENTER."

Performance And installation Speed Depending on Your Computer ram And processor
And once Completed Installation it was ask For Configuring Packet manager.
15.You May Have Connected A net work press Yes
16.It was Ask For Proxy Information Just put in blank and press Continue wait for few moments it was automatically scanned for a near network mirror and configured it
it was taken few moments and depending up on your net work speed.
17.And these process complete it was automatically install the GRUB Boot loader
by these steps can take some moments...
18.And then it was finally ask for install GRUB boot loader on hard disk and select yes
and select the option as      /dev/sda (----------------------------------).
and press yes.
19.wait for entire process complete.
and finally open a pop up as installation was complete successfully completed. and continue
wait for 2-5 min it was complete entire process.
20.and once all
 process complete it was automatically rebooted and ask for user name and password.
enter it and it was opened.
That's it....

Thanks For Watching....::)

About This Blog This Blog Was Linked With GSworldinfo.in And You most trust this website to download the software and torrent fr...