Wednesday, May 11, 2016


How to Make Your Windows PC Faster and More Responsive

With time your Windows system loose its fast responsiveness, and start to slowdown or even crawl.
There is my few tips to keep it responsive.
Startup entries
Some developers like to add startup processes to their softwares with good reasons but sometimes it is not worth the shot.
Do you need your Video/Audio player, Phone apps, graphic soft to start with windows? surely not !
So you must disable them from the startup, you have many tools to do it, but i will choose the simplest ones
1- Msconfig.exe
Go to start menu -> click on “run…” -> type msconfig -> startup tab -> uncheck the entries of applications you don’t need to start with windows.
2- Ccleaner
This very effective software is not only good at cleaning your system fro junk files and old registry’s entries but also it help to delete useless startup entries
open it, go to “Tools” -> Startup -> uncheck the unwanted entries
3- Wise Care 365
This free soft can be installed or be used as portable.
open it, go to “System Tuneup” tab -> Startup Manager -> let it populated the list -> turn off the non-essentials entries that slow down the boot (depending your taste and suggestions given by the soft)
Services
Windows is made to be easy to use and focus on a large types of users, unfortunately if you are not a “mediavore” or “remote controller” kind of user, many services will be useless to you. so you can set them on “manual ” or simply disable them.
Be sure to understand what you will disable, some services have redundancies that may affect your normal use of Windows
Again you have many ways and tools to do it.
1- Services.msc
the built-in services monitor, you can tweak it using Black Viper services configuration guide

2- SMART
: A portable apps that have some pre-configured setting

3- Advanced Win Service Manager
: It show the services and indicate if some of them are suspicious or even dangerous
4- Wise Care 365:
open it, go to “System Tuneup” tab -> Startup Manager -> Services -> let it populated the list -> turn off the non-essentials entries that slow down the boot (depending your taste and suggestions given by the soft)
Contextual Menu
Again softwares like to put some entries to your contextual menu that slowdown its appearance and make it messy
you have many ways to reduce it, there is a good guide with 2 very useful tools
Malwares
Malwares are quite known responsible for make your system crawling, be sure to visit safe websites and use a security solutions (AVs, sandboxing, etc..)
Antivirus
As malwares will cripple your system you must use an Antivirus or other security application to be safe from them, unfortunately some are heavy on your resources, be sure to take a light one.
Remember that using 2 or more AVs in same time will make reduce your security, create issues & conflicts and of course slowdown your system (unless they are complementary)
Here you will find a good thread about light AVs/Suites :
Responsiveness tools
i have those tool in mind, some others surely exist.
Process Lasso allows you to monitor the responsiveness of your system, CPU,RAM, etc… usage. Use it with cautions
Soluto will check which apps slow you down, just follow the steps. Tips: since Soluto slow the boot time for its scanning, use it only one time, write down the faulty apps, then uninstall Soluto.
Wise Care 365
open it, go to “System Tuneup” tab -> System Optimizer-> Tick the entries you want .
Registry Defrag tools
This is a controversial topic, some says that defragmenting the registry aford nothing to the speed when others says it does, anyway if you want to try there some tools:
Wise Care 365:
open it, go to “System Tuneup” tab -> Registry Defrag -> Run it
That is all i can think about, i will update the thread if i find new tweaks.

Tuesday, May 10, 2016

Not sure how many of you out there are gettign this annoying nag icon for upgrading to windows 10 but attached is a PDF from Microsoft in re guards to their annoying nag screen icon.

Here is a list from Microsoft about "How to manage Windows 10 notification and upgrade options":

https://support.microsoft.com/en-us/kb/3080351

I Know I get a lot of clients asking me "how do I get rid of this nag screen?" or "Should I upgrade to Windows 10?"

I Posted this earlier but did not wright anything about it:



If you want to stick to Windows 7, 8 or 8.1 and want to remain untracked then we will recommend you to stay away from the following updates:
KB2876229 SKYPE, If you want Skype then install it.
KB2923545 RDP
KB2970228
KB3035583
KB2990214
KB3021917
KB3068708 Telemetry
KB2592687
KB2660075
KB2506928
KB2952664 x2
KB3050265
KB2726535
KB2994023
KB3022345 Replaced by KB3068708 Telemetry
KB3022345 Caused false sfc result
KB2545698 (IE9)
KB3065987

Remove the above updates from Windows updates and it will get rid of that annoying nag screen and help keep your privacy from Microsoft's snooping eyes...

Best Hacking Apps For Android Phones | fossBytes 2016



Short Bytes: As Android has emerged as the top mobile operating system, we have seen a great rise in the Android hacking apps. For our readers, we have prepared a list of the best hacking apps for Android that can be used by a technology enthusiast, an IT security administrator, or an ethical hacker.
Based upon the industry reviews and our own experience, here is a compilation of the top Android hacking applications. Along with the description of apps, we have provided the relevant website and download links to help you get started instantly.
Disclaimer: Please note that fossBytes is publishing this list just for educational purposes. We don’t support use of any tool to indulge in some unethical purposes.

9 Best Hacking Apps For Android Phones – 2016

·         AndroRAT

AndroRAT stands for Android and RAT (Remote Administrative Tools). This top hacking tool was released a long time ago as a client/server application. The app aims to give you the control of the Android system remotely and fetch the information from it. This Android app runs as a service right after the boot. So, a user doesn’t need to interact with the service. The app provides you the ability to trigger the server connection by a call or SMS.
The features in this useful Android hacking app include collecting information like contacts, call logs, messages, and location. The app also allows you to remotely monitor received message and state of phone, making a phone call and sending texts, taking picture from camera, opening URL in the default browser etc.
AndroRAT

·         Hackode

Hackode is an Android app which is basically a collection of multiple tools for ethical hackers, IT specialists, and penetration testers. In the app, there are three modules –Reconnaissance, Scanning, Security Feed — available in the application.
With this app, you get the functionalities like Google hacking, SQL Injection, MySQL Server, Whois, Scanning, DNS lookup, IP, MX Records, DNS Dif, Security RSS Feed, Exploits etc. It’s a great Android hacking app to start with and it doesn’t ask for your private information to operate.
Hackode

·         zANTI

zANTI is a reputed Android hacking suite from Zimperium. This software suite comes with multiple tools that are widely used for penetration testing purposes. This mobile penetration testing toolkit allows the security researchers to scan a network easily. This toolkit allows the IT administrators to simulate an advanced hacking environment to detect multiple malicious techniques.
zANTI could be called an app that brings the power of Backtrack on your Android device. As soon as you login into zANTI, it maps the entire network and sniffs the websites being visited along with their cookies — thanks to ARP cache poisoning on devices.
The various modules in the app are network mapping, port discovery, sniffing, packet manipulation, DoS, MITM, and more.
zANTI

·         FaceNiff

FaceNiff is a top Android hacking app that allows you to intercept and sniff your WiFi network traffic. This tool is widely used to snoop into people’s Facebook, Twitter and other social media websites using your Android device. This hacker-favorite tool steals cookies from WiFi network and gives an attacker an unauthorised access to victim’s account.
FaceNiff is developed by Bartosz Ponurkiewicz — the same developer who wrote Firesheep for Firefox hacking on desktop.
FaceNiff

·         Droidsheep

Droidsheep is an effective hacking app developed for security analysts interested in playing with Wi-Fi networks. The app has the ability to hijack the web session profiles over a network and it works with almost all services and websites.
As you fire up the Droidsheep app, it acts a router that monitors and intercepts all the Wi-Fi network traffic and fetches the profiles of active sessions. With this app, one can sniff Facebook, LinkedIn, Twitter and other social media accounts.
DroidSheep Guard, another version of app, helps you to detect ARP-Snoofing on the networks i.e. the attacks by FaceNiff, Droidsheep, and other software.
Droidsheep

·         DroidBox

DroidBox is an app that offers dynamic analysis of Android applications. Using the app, one can get a wide range of results about the hashes for the APK package, network traffic, SMS and phone calls, information leaks via different channels etc.
This top Android hacking application also gives you the ability to visualize the behaviour of an Android app package.
DroidBox

·         APKInspector

APKInspector is an app that allows you to perform reverse engineering tricks. With this app, you can get the graphic features and analysis functions for the users to get a deep insight. This powerful Android hacking tool helps you get the source code of any Android app and visualize the DEX code to erase the credits and license.
APKInspector

·         Nmap

One of the most popular network scanning apps for desktop can also be used on Android operating system. Nmap works on both non-rooted and rooted phones. If you are a beginner Android hacker, this hacking app app is a must have.
Nmap

·         SSHDroid

SSHDroid is a SSH server implementation developed for Android that allows you to connect your Android device to a PC and run commands like ‘terminal’ and ‘adb shell’ and edit files. It provides an extra security later when you are connecting to a remote machine.
The app provides features like shared-key authentication, WiFi autostart whitelist, extended notification control etc,
SSHDroid
Did you find these best hacking tools of 2016 helpful? Use them and share your reviews in the comments below.
For more technology updates and interesting stories, follow fossBytes.


First Step to Effective Security – How to Know if You’ve Been Hacked



 Short Bytes: Was your data compromised in the latest data breaches? How to know if you’ve been hacked? Here are the answers.
The online world is becoming scarier each day and the possibility of getting hacked gets increased each time you sign into your online accounts. It’s possible that you haven’t been hacked yet, but you must ensure to follow secure practices to remain safe in the future.
News of new data breaches and password thefts are as common as any other development around you. These attacks occur via various means- either through a malicious email, or a flaw in your computer’s operating system. Even the White House and Pentagon aren’t immune to hackers.
There have been about 5,593 data breaches since the year 2005 and this number is rising exponentially. These breaches have exposed about 800.3 million individual records alone in the United States.
Also read: 888 Data Breaches So Far In 2015 and 246 Million Records Lost
These data breaches are a big risk that ask you to be prepared and follow secure practices.
The Identity Theft Resource Center defines data breach as an “incident in which an individual name plus a Social Security number, driver’s license number, medical record or financial record (credit/debit cards included) is potentially put at risk because of exposure.”
Follow fossBytes on Twitter for latest updates: @fossBytes14
So, what do I lose in a data breach?
Usually, it’s just your basic information like name and email addresses. By collecting this basic information and connecting the dots, an expert hacker can gain tons of other sensitive information to hurt you in various ways.
As written in the Forrester report, Planning for Failure, “even enterprises with the most mature security organizations and advanced security controls can’t prevent every single breach — especially if your opponent has the time and financial backing to target you.”
The situation is getting worse with time and keeping your data safe from the reach of the prying eyes must be your top priority.
But, how to know if you’ve been hacked?
With the increase in hacking attacks, a number of sites have opened up that give you alerts when data breaches take place. One of the best places to get these announcements is the mailing hosted at the Identity Theft Resource Center. It sends regular emails with the weekly data breach information in your inbox.
Haveibeenpwned.com is another website that allows you to check if hackers have compromised your personal information. The website also tells you the reason and incident when your email address was breached.

Another website called Was Company Hacked? performs a Twitter-based search to tell you if there’s any activity on Twitterverse about attacks on the company.
PwnedList and Shouldichangemypassword.com offer a similar service that notify users with email if an email address in compromised.
You are also advised to keep your antivirus updated and scan your system using a good antimalware scan. Your irregular financial statement could be another hint that your data is compromised.
Stay informed, stay safe.
In the follow-up article, I’ll be describing what should be done if your data is hacked. Stay tuned.
Also read: Top 10 Best Free Antivirus Software Of 2015
Download our Google chrome, Mozilla firefox and Opera extension to get instant updates -



How To Create A Super Secure Password To Defeat Hackers

Short Bytes: Deciding a security-focused password is tougher that one might think. Even the most security conscious users commit the mistake of forming their passwords using personal information or other predictable combinations. Today, we bring to you an interesting infographic that tell you the tips to make the perfect password.
With the ever-increasing hacking attacks, the importance of a super strong password can’t be denied. In the year 2015, we saw an insane amount of hacking attacks that leaked people’s personal data and costed the multinationals millions. Throughout the year, we told you about various attacks and how to protect your digital life with simple precautionary steps.
Just knowing about DDoS and SQL injection attacks isn’t enough. At many occasions, even security experts commit the sin of using an easy password that makes the job of hackers easier. In this article, we are going to tell you about the basics of a strong password and how it can help you to secure your data.
When we are talking about a strong password, we mean passwords that about are 8 to 15 characters long. The passwords must seem gibberish to you (and others), consisting of upper and lower case characters, digits, and symbols.
You can try using made-up phrases and incomplete works in passwords. Avoid using dictionary words and keyword patterns. Changing the passwords regularly is also advised.
Today, we are bringing to you an eye-opening infographic from WhoIsHostingThis that tells you the best practices to make passwords.
Take a look:

How To Create A Super Secure Password To Defeat Hackers

 

Do you have some other useful tips to share with fossBytes community? Tell us in the comments below.
Download our Google chrome, Mozilla firefox and Opera extension to get instant updates -



If you want to stick to Windows 7, 8 or 8.1 and want to remain untracked then we will recommend you to stay away from the following updates:
KB2876229 SKYPE, If you want Skype then install it.
KB2923545 RDP
KB2970228
KB3035583
KB2990214
KB3021917
KB3068708 Telemetry
KB2592687
KB2660075
KB2506928
KB2952664 x2
KB3050265
KB2726535
KB2994023
KB3022345 Replaced by KB3068708 Telemetry
KB3022345 Caused false sfc result
KB2545698 (IE9)
KB3065987



Samsung Galaxy S7 vs. Apple iPhone 7: Which one would be better?

Comparison of Specifications : Samsung Galaxy S7 vs. Apple iPhone 7

With the two tech giants, Samsung and Apple all set to release their 2016 flagships, Galaxy S7 and iPhone 7 in February and September respectively, their faithful users are busy comparing these smartphones to find out which one is better.
Rumours are rampant about the details of these forthcoming phones, while Apple and Samsung have yet to officially confirm the existence of their upcoming flagships reportedly named Samsung Galaxy S7 and Apple iPhone 7.
The spec-comparison is based on the ongoing rumours from various sources.

Headphone Jack

The design and concept of the rumored iPhone 7 indicate strongly that there just may be no 3.5mm headphone jack in it. This may prove to be a turning point for Samsung as it plans to offer the headphone jack in its Galaxy S7.
Apple’s decision to remove the headphone jack and include Bluetooth earphones comes as a way to make the iPhone 7 thinner. It is uncertain if Apple will implement such a massive change, but an online group have launched a petition against the removal of the headphone jack. The petition has received more than 210,000 digital signatures.

Memory

The rumors suggest that Samsung may bring MicroSD slots back, as the company aims to expand its storage capability and compatibility to up to 200GB. According to some sources, it will also let users to merge external and internal storage for Android 6.0 Marshmallow. On the other hand, The source that talked of a bigger battery in the iPhone 7 Plus also revealed there would be a 256GB variant of the iPhone 7 Plus. It would make more sense if Apple could increase the storage on its 16GB variant. We’ll just have to wait to find out.
Especially since there might be no jack, rumors indicate that Apple might bring a water resistant or waterproof build to the upcoming iPhone 7. On the other hand, Samsung has a good opportunity to take on Apple, as it appears to have a dust and water-free phone that will attract buyers. Galaxy S7 is expected to get IP67 water and dust resistance certifications.

Camera

Several reports have talked about improvement in camera of both Samsung Galaxy S7 and Apple iPhone 7. Samsung Galaxy S7 is said to have a camera with a flush finish.
According to reports from Venture Beat, Samsung is expected to reduce the megapixel count in its Galaxy S7 from 16MP to 12MP and improve the lens setup for better results. The Galaxy S7 will reportedly have an f/1.7 aperture, which will let more light to enter the lens and capture fast-moving objects and shoot in low-light conditions with much better results.
Another noteworthy mention is the Galaxy S7 will not feature a protruding camera like the Galaxy S6. However, Apple might continue to use the same design for its camera lens. Apple may also opt for a dual-camera zoom lens for the iPhone 7, which will allow the user to zoom in a particular object in the scene without losing the quality.

Battery

Galaxy S7 is rumoured to have a longer battery span of 3,000mAh, and 3600mAh for the S7 Edge. If this turns into reality, Samsung might have a winner in their hands, as iPhone users have been constantly complaining of the battery draining too fast like the Galaxy S5.
Have you picked your side yet, Apple’s iPhone 7 or Samsung’s Galaxy S7?