Rabu, 20 Februari 2013

Open BTS


From SpeedyWiki

OpenBTS (Open Base Transceiver Station) is a software-based GSM base stations, allowing the phone to call without using a GSM network service provider. OpenBTS is known as the first open source implementation of the GSM industry standard protocols.

The estimated price is about Rp. 15-25 million/piece, well below the usual Cellular base stations are usually spend hundreds of millions or Billion dollars.

The main fear is usually not in the technology but rather in regulation (sad indeed).
So, for further information about OpenBTS please read article here.
ekospinach ITpreneur

How to Install Flash Player for Samsung Galaxy Mini and Young


#1 Without Root

step 1
download apk file here

step 2
extract file then copy apk file to sd card

step 3
don't forget to check unknown resources at setting > application

step 4
use your file manager to find apk file

step 5
choose apk file then confirm it to begin installation process

step 6
when installation is completed do not open flash player but restart the phone

step 7
done!.. now.. flash player is already installed

#2 With Root

step 1
root your phone
*http://haansspot.blogspot.com/2011/07/how-to-root-android-phone.html

step 2
download Rootex from Market/Google Play then install as usual

step 3
download flash player from here

step 4
extract file (apk and lib)

step 5
copy file to sd card

step 6
install apk file as usual

step 7
open Rootex then enter to data/data/com.adobe.flashplayer

step 8
delete lib directory then extract lib.rar to same directory or you can use overwrite method

step 9
open lib directory then touch and hold the file until "set permission" dialog appears
do set permission as bellow
             | Read | Write | Execute |
---------------------------------------
Owner  | [ v ]  |  [ v ]  |    [ v ]    |
---------------------------------------
Group  | [ v ]  |  [    ]  |    [ v ]    |
---------------------------------------
Others  | [ v ]  |  [    ]  |    [ v ]    |

step 10
close Rootex then restart your phone

step 11
open your browser then type http://m.youtube.com to test flash player
ekospinach ITpreneur

Fool with VBScript


#1 Convey your friend a little message and shut down his / her computer:
Open your notepad and copy then paste this script:

@echo off
msg * I don't like you
shutdown -c "Error! You are too stupid!" -s


Save As "whatever.bat"
Save as type select "All Files" then click save button.

#2 Continually pop out your friend's CD Drive. If he / she has more than one, it pops out all of them!
Open your notepad and copy then paste this script:

Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop


Save As " whatever .vbs"
Save as type select "All Files" then click save button.


#3 Frustrate your friend by making this VBScript hit Enter simultaneously
Open your notepad and copy then paste this script:

Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "~(enter)"
loop


Save As " whatever .vbs"
Save as type select "All Files" then click save button.

#4 Open Notepad, slowly type "Hello, how are you? I am good thanks" and freak your friend out:
Open your notepad and copy then paste this script:

WScript.Sleep 180000
WScript.Sleep 10000
Set WshShell = WScript.CreateObject("WScript.Shell")
WshShell.Run "notepad"
WScript.Sleep 100
WshShell.AppActivate "Notepad"
WScript.Sleep 500
WshShell.SendKeys "Hel"
WScript.Sleep 500
WshShell.SendKeys "lo "
WScript.Sleep 500
WshShell.SendKeys ", ho"
WScript.Sleep 500
WshShell.SendKeys "w a"
WScript.Sleep 500
WshShell.SendKeys "re "
WScript.Sleep 500
WshShell.SendKeys "you"
WScript.Sleep 500
WshShell.SendKeys "? "
WScript.Sleep 500
WshShell.SendKeys "I a"
WScript.Sleep 500
WshShell.SendKeys "m g"
WScript.Sleep 500
WshShell.SendKeys "ood"
WScript.Sleep 500
WshShell.SendKeys " th"
WScript.Sleep 500
WshShell.SendKeys "ank"
WScript.Sleep 500
WshShell.SendKeys "s! "


Save As " whatever .vbs"
Save as type select "All Files" then click save button.

#5 Frustrate your friend by making this VBScript hit Backspace simultaneously:
Open your notepad and copy then paste this script:

MsgBox "Let's go back a few steps"
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{bs}"
loop


Save As " whatever .vbs"
Save as type select "All Files" then click save button.

#6 Hack your friend's keyboard and make him type "You are a fool" simultaneously:
Open your notepad and copy then paste this script:

Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "You are a fool."
loop


Save As " whatever.vbs"
Save as type select "All Files" then click save button.

#7 Open Notepad continually in your friend's computer:
Open your notepad and copy then paste this script:

@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top

Save As " whatever.bat"
Save as type select "All Files" then click save button.

#8 Hard prank: Pick your poison batch file. It asks your friend to choose a number between 1-5 and then does a certain action:
Open your notepad and copy then paste this script:

1: Shutdown
2: Restart
3: Wipes out your hard drive (BEWARE)
4: Net send
5: Messages then shutdown

@echo off
title The end of the world
cd C:\
:menu
cls
echo I take no responsibility for your actions. Beyond this point it is you that has the power to kill yourself. If you press 'x' then your PC will be formatted. Do not come crying to me when you fried your computer or if you lost your project etc...
pause
echo Pick your poison:
echo 1. Die this way (Wimp)
echo 2. Die this way (WIMP!)
echo 3. DO NOT DIE THIS WAY
echo 4. Die this way (you're boring)
echo 5. Easy way out
set input=nothing
set /p input=Choice:
if %input%==1 goto one
if %input%==2 goto two

Save As "whatever.bat"
Save as type select "All Files" then click save button.
ekospinach ITpreneur

Google Dork for Carding


Use this dorks for SQL Injection, but hacking responsibly :)

inurl:".php?cat="+intext:"Paypal"+site:UK

inurl:".php?cat="+intext:"/Buy Now/"+site:.net
nurl:".php?cid="+intext:"online+betting"
inurl:".php?id=" intext:"View cart"
inurl:".php?id=" intext:"Buy Now"
inurl:".php?id=" intext:"add to cart"
inurl:".php?id=" intext:"shopping"
inurl:".php?id=" intext:"boutique"
inurl:".php?id=" intext:"/store/"
inurl:".php?id=" intext:"/shop/"
inurl:".php?id=" intext:"toys"

inurl:".php?cid="
inurl:".php?cid=" intext:"shopping"
inurl:".php?cid=" intext:"add to cart"
inurl:".php?cid=" intext:"Buy Now"
inurl:".php?cid=" intext:"View cart"
inurl:".php?cid=" intext:"boutique"
inurl:".php?cid=" intext:"/store/"
inurl:".php?cid=" intext:"/shop/"
inurl:".php?cid=" intext:"Toys"
inurl:".php?cat="
inurl:".php?cat=" intext:"shopping"
inurl:".php?cat=" intext:"add to cart"
inurl:".php?cat=" intext:"Buy Now"
inurl:".php?cat=" intext:"View cart"
inurl:".php?cat=" intext:"boutique"
inurl:".php?cat=" intext:"/store/"
inurl:".php?cat=" intext:"/shop/"
inurl:".php?cat=" intext:"Toys"
inurl:".php?catid="
inurl:".php?catid=" intext:"View cart"
inurl:".php?catid=" intext:"Buy Now"
inurl:".php?catid=" intext:"add to cart"
inurl:".php?catid=" intext:"shopping"
inurl:".php?catid=" intext:"boutique"
inurl:".php?catid=" intext:"/store/"
inurl:".php?catid=" intext:"/shop/"
inurl:".php?catid=" intext:"Toys"
inurl:".php?categoryid="
inurl:".php?categoryid=" intext:"View cart"
inurl:".php?categoryid=" intext:"Buy Now"
inurl:".php?categoryid=" intext:"add to cart"
inurl:".php?categoryid=" intext:"shopping"
inurl:".php?categoryid=" intext:"boutique"
inurl:".php?categoryid=" intext:"/store/"
inurl:".php?categoryid=" intext:"/shop/"
inurl:".php?categoryid=" intext:"Toys"
inurl:".php?pid="
inurl:".php?pid=" intext:"shopping"
inurl:".php?pid=" intext:"add to cart"
inurl:".php?pid=" intext:"Buy Now"
inurl:".php?pid=" intext:"View cart"
inurl:".php?pid=" intext:"boutique"
inurl:".php?pid=" intext:"/store/"
inurl:".php?pid=" intext:"/shop/"
inurl:".php?pid=" intext:"toys"
inurl:".php?prodid=
inurl:".php?prodid=" intext:"shopping"
inurl:".php?prodid=" intext:"add to cart"
inurl:".php?prodid=" intext:"Buy Now"
inurl:".php?prodid=" intext:"View cart"
inurl:".php?prodid=" intext:"boutique"
inurl:".php?prodid=" intext:"/store/"
inurl:".php?prodid=" intext:"/shop/"
inurl:".php?prodid=" intext:"toys"
inurl:".php?productid='
inurl:".php?productid=" intext:"shopping"
inurl:".php?productid=" intext:"add to cart"
inurl:".php?productid=" intext:"Buy Now"
inurl:".php?productid=" intext:"View cart"
inurl:".php?productid=" intext:"boutique"
inurl:".php?productid=" intext:"/store/"
inurl:".php?productid=" intext:"/shop/"
inurl:".php?productid=" intext:"Toys"
inurl:".php?product="
inurl:".php?product=" intext:"shopping"
inurl:".php?product=" intext:"add to cart"
inurl:".php?product=" intext:"Buy Now"
inurl:".php?product=" intext:"View cart"
inurl:".php?product=" intext:"boutique"
inurl:".php?product=" intext:"/store/"
inurl:".php?product=" intext:"/shop/"
inurl:".php?product=" intext:"toys"
inurl:".php?product=" intext:"DVD"
inurl:".php?products="
inurl:".php?products=" intext:"shopping"
inurl:".php?products=" intext:"add to cart"
inurl:".php?products=" intext:"Buy Now"
inurl:".php?products=" intext:"View cart"
inurl:".php?products=" intext:"boutique"
inurl:".php?products=" intext:"/store/"
inurl:".php?products=" intext:"/shop/"
inurl:".php?products=" intext:"toys"
inurl:".php?products=" intext:"DVD"
inurl:".php?proid="
inurl:".php?proid=" intext:"shopping"
inurl:".php?proid=" intext:"add to cart"
inurl:".php?proid=" intext:"Buy Now"
inurl:".php?proid=" intext:"View cart"
inurl:".php?proid=" intext:"boutique"
inurl:".php?proid=" intext:"/store/"
inurl:".php?proid=" intext:"/shop/"
inurl:".php?proid=" intext:"toys"
inurl:".php?shopid="
inurl:".php?shopid=" intext:"shopping"
inurl:".php?shopid=" intext:"add to cart"
inurl:".php?shopid=" intext:"Buy Now"
inurl:".php?shopid=" intext:"View cart"
inurl:".php?shopid=" intext:"boutique"
inurl:".php?shopid=" intext:"/store/"
inurl:".php?shopid=" intext:"/shop/"
inurl:".php?shopid=" intext:"Toys"
inurl:".php?itemid="
inurl:".php?itemid=" intext:"shopping"
inurl:".php?itemid=" intext:"add to cart"
inurl:".php?itemid=" intext:"Buy Now"
inurl:".php?itemid=" intext:"View cart"
inurl:".php?itemid=" intext:"boutique"
inurl:".php?itemid=" intext:"/shop/"
inurl:".php?itemid=" intext:"/store/"
inurl:".php?itemid=" intext:"Toys"
inurl:".php?orderid="
inurl:".php?orderid=" intext:"shopping"
inurl:".php?orderid=" intext:"add to cart"
inurl:".php?orderid=" intext:"Buy Now"
inurl:".php?orderid=" intext:"View cart"
inurl:".php?orderid=" intext:"boutique"
inurl:".php?orderid=" intext:"/shop/"
inurl:".php?orderid=" intext:"/store/"
inurl:".php?orderid=" intext:"Toys"
inurl:".php?catalogId="
inurl:".php?catalogId=" intext:"shopping"
inurl:".php?catalogId=" intext:"add to cart"
inurl:".php?catalogId=" intext:"Buy Now"
inurl:".php?catalogId=" intext:"View cart"
inurl:".php?catalogId=" intext:"boutique"
inurl:".php?catalogId=" intext:"/shop/"
inurl:".php?catalogId=" intext:"/store/"
inurl:".php?catalogId=" intext:"Toys"
inurl:".php?aid="
inurl:".php?aid=" intext:"shopping"
inurl:".php?aid=" intext:"add to cart"
inurl:".php?aid=" intext:"Buy Now"
inurl:".php?aid=" intext:"View cart"
inurl:".php?aid=" intext:"boutique"
inurl:".php?aid=" intext:"/shop/"
inurl:".php?aid=" intext:"/store/"
inurl:".php?aid=" intext:"toys"
inurl:".php?artid="
inurl:".php?artid=" intext:"shopping"
inurl:".php?artid=" intext:"add to cart"
inurl:".php?artid=" intext:"Buy Now"
inurl:".php?artid=" intext:"View cart"
inurl:".php?artid=" intext:"boutique"
inurl:".php?artid=" intext:"/shop/"
inurl:".php?artid=" intext:"/store/"
inurl:".php?artid=" intext:"toys"
inurl:".php?articleid="
inurl:".php?articleid=" intext:"shopping"
inurl:".php?articleid=" intext:"add to cart"
inurl:".php?articleid=" intext:"Buy Now"
inurl:".php?articleid=" intext:"View cart"
inurl:".php?articleid=" intext:"boutique"
inurl:".php?articleid=" intext:"/shop/"
inurl:".php?articleid=" intext:"/store/"
inurl:".php?articleid=" intext:"toys"
 
Once again from me, Hacking Responsibly :)



ekospinach ITpreneur

Selasa, 19 Februari 2013

Mandiant revealed Chinese APT1 Cyber Espionage campaign


Few weeks after the discovery of the sophisticated cyber espionage campaign against principal US media The Mandiant® Intelligence Center™ released an shocking report that reveals an enterprise-scale computer espionage campaign dubbed APT1. The term APT1 is referred to one of the numerous cyber espionage campaign that stolen the major quantity of information all over the world.
 The evidences collected by the security experts link APT1 to China’s 2nd Bureau of the People’s Liberation Army (PLA) General Staff Department’s (GSD) 3rd Department (Military Cover Designator 61398) but what is really impressive is that the operation have been started in the distant 2006 targeting 141 victims across multiple industries.

During the attacks the attackers have took over APT1 malware families and has revealed by the report APT1′s modus operandi (tools, tactics, procedures) including a compilation of videos showing actual APT1 activity.

The Mandiant has also identified more than 3,000 indicators to improve defenses against APT1 operations and is releasing a specific document that will address them including APT1 indicators such as domain names, IP addresses, and MD5 hashes of malware.

APt1 has systematically stolen hundreds of terabytes of data from victim organizations and has demonstrated the capability and intent to steal from dozens of organizations simultaneously. APT1 is a persistent collector, once APT1 has established access, they periodically access to victim’s network stealing sensible information and intellectual property for a long time, typically maintaining access to victim networks for an average of 356 days.

The longest time period APT1 maintained access to a victim’s network was 1,764 days, or four years and ten months.

Mandiant managers have decided to make an exception to its traditional non-disclosure policy due the risks related to the imposing cyber espionage campaign and its impact on global economy, many states and related industries are victims of the offensive.

Following a meaningful declaration of the security firm:
“It is time to acknowledge the threat is originating from China, and we wanted to do our part to arm and prepare security professionals to combat the threat effectively. The issue of attribution has always been a missing link in the public’s understanding of the landscape of APT cyber espionage. Without establishing a solid connection to China, there will always be room for observers to dismiss APT actions as uncoordinated, solely criminal in nature, or peripheral to larger national security and global economic concerns. We hope that this report will lead to increased understanding and coordinated action in countering APT network breaches.”

The cyber war has started a long time ago!
ekospinach ITpreneur

Next Revolution in Mobile App Market: Mobile Payment Apps


Today the majority of people prefer online payment mode to buy any type product.  No doubt debit and credit cards are definitely foremost in the payment space these days. People have lots of expectations from mobile payment apps. Even some people think that there will be no change in payment mode but they are wrong. Payment through mobile will offer several benefits. Mobile payment apps are simple and easy to use. These apps design in a unique way and with complete relevancy. These are targeted rewards and offers.

Retailers and consumers are eager to contribute. Mobile apps are enabled by NFC (near field technology), permits consumers to pay by tapping their Android and iOS phones to a payment terminal.  These apps are designed in a way that allows you to connect your credit and debit card to the mobile wallet and you can easily funds. These apps also permit you to classify their loyalty cards in the mobile app in order that rewards and points are automatically applied when making a buy with the app.

There has been a huge number of buzz about mobile applications for the payment. It may be well justified. Mobile payment apps will allow you to enjoy lucrative opportunity just sitting at home. According to the current survey, 42% of mobile users those can use mobile payments have selected not due to the fear of fraud.  Customers fear that their security and privacy can be jeopardized by utilizing the mobile payment alternatives. Mobile apps are considered as the future of businesses. Mobile payment apps are really big thing and offer several benefits to consumers as well business.

Mobile payment apps are available for different platforms. These apps are beneficial for both personal and commercial use. It is true people have many expectations from these apps.  Payment through mobile apps is safe and secure. The FTC workshop report about mobile payment technologies is to re-examine the security, privacy & legal concerns. The good news is that these apps are safe and secure to use as per your convenience.

Mobile apps are considered as 2 way communication between a bank and their consumers. Innovation and variety of apps—be it iPhone, Android or Blackberry mobile app development covers all the most important Smartphone producers.  Mobile payment apps are effective, easy to customize and user friendly.  These apps include several features that attract people to use them.
ekospinach ITpreneur

Go Native or Cross Platform?


In an age where a platform war is very much on the horizon, Mobile app entrepreneurs have to make a difficult choice – the choice of whether to commit to a platform or not. With respect to mobile app development, developers usually have a plethora of options like Microsoft’s Windows Phone, Google’s Android and iOS by Apple to choose from. With so much variety in app ecosystems and a cut throat competition, an app entrepreneur has to make choices carefully.

Native applications are apps built for a specific platform based on the SDKs provided by the mobile OS company itself. These are built according to the existing user interface and make full use of integration with the hardware.

Cross platform apps are applications built on one code which can be easily converted for multiple operating systems. These are built with the help of tools like Appcelerator’s Titanium SDK and  Xamarin’s Mono tool. The developers are thus faced with a choice. They can either go native and support one ecosystem or play it safe and be open to all.

User Interface
Native applications are streamlined to produce a look that merges itself seamlessly with the look of the operating system itself. All the major operating systems have distinctive looks that serve different purposes. Apple goes for a clean user interface that facilitates higher usability. Android opts for something that is more functional and productive. Microsoft’s Windows Phone’s Metro interface is fast and meant to convey as much information as possible. Native apps can assimilate themselves with the look of the mobile OS itself, so that the app itself feels like a part of the mobile OS. Spotify for Windows Phone is one such example of an app merging with the native interface of the operating system.

Cross platform apps are not built with keeping a single user interface in mind as they are developed for multiple platforms. So, they are not able to capitalise on the strengths of one interface and hence lose out in the long run. Winner: Native Apps

Performance and Reliability

Since native apps are developed keeping in mind the hardware on which the software runs, they are able to make the maximum use of the hardware available and integrate themselves better. This leads to faster speeds due to better integration and lesser chances of app crashing and other problems. Also, native apps can take advantage of specific hardware and other SDK features.

Cross platform apps are not built with the hardware in target. So, they are not able to use maximum processing power and tend to be slower than the native apps. Also, they are prone to crashes due to compatibility issues with the Mobile OS and hardware.

Winner: Native Apps

Resources and Profits

Once they are functional, native apps are sold through a specific app store of the operating system for which they have been developed. So, their coverage area is limited to the users who have adopted that particular operating system and in turn the scope for profits gets limited too.

Cross platform apps are developed for multiple operating systems. They cost more compared to single platform native apps and cost less compared to multiple platform native apps but their coverage area is much wider as they are not restricted to the users tied to a specific platform. In effect, the scope for profits is much more. Winner:  Cross Platform Apps

Conclusion

Undoubtedly, Native apps are the winners. Built specifically for one system, they are better integrated with the design of the interface, the performance of the hardware and the software. More native SDK features are available compared to cross platform apps. Cross platform apps are economically more viable as they are available to users of multiple operating systems.
ekospinach ITpreneur

Prepare Your Windows Store App For Global Markets


Developers put their souls to their apps. So, for it to not sell after hundreds of hours being invested for its development would be a damn shame. As developers run around finalizing their apps before they go live in the Windows app store there are very simple, yet crucial commandments that they should never ever forget to check, again and again. At the end of the day, one has to remember that they created their app for the world, not just one city or a few friends.
Commandment #1 – Competition
Your app is going to be one of thousands if not millions by the end of the year on the Windows app store. Fact. Deal with it and make sure that,
  • There’s a market for your app, otherwise all those sleepless nights were worth nothing. The stiff competition will kill you before you’ve even started.
  • Make sure that your app stands out, from the interface, visuals, and all the elements that will make a user fall in love with it.
Commandment #2 – Windows Store Requirements
Windows has provided you with the platform to start making money and stop eating baked beans for dinner every night. Check.
Is your app inline with each and every one of their requirements? Do the homework and make sure the markets and language certifications have been met among many other requirements and avoid the last minute hassle.

Commandment #3 – Packaging
You at this point in time believe that your app is perfect. What next? Pricing. You have to be careful not to overprice your app, so that it at least achieves target sales but you also don’t want to sell it for next to nothing. What commission goes to Windows AppStore? How much does that leave you with? Have you checked for the simplicity of the app? Will the user have to crack their head for an hour to understand it, even after all your hundred revision and testing’s? Is it secure? Piracy is on the rise, so cover some security basics.

Commandment #4 – Cultural Differences
The use of a spear in a funny or mocking way, for example, would offend almost a third of South Africa as that’s a symbol that means a lot to the Zulus. But it’s not the only one, there are so many symbols and colour combinations that carry a lot of significance when it comes to the religions and cultures of the world. Do your homework and don’t get your app frowned upon by a religious group or country as a whole.

Commandment #5 – Flexible Layouts
Assuming that your app will display the same on every gadget is a big NO! Move away from static formats and ensure that your layout is flexible enough to be viewed under different orientations or layouts.

Commandment #6 – Translation
When translated into say French or Mandarin, do your text images and content carry the same meaning as what you intended them to? This is a no brainer. There are so many marketing case studies of companies that had to change their logos or names when they went global upon realizing that they meant completely opposite things to the consumers they were trying to reach.

There are a lot of other things to keep re-checking again and again but if you can master the above, you will have ease of mind when you hit the store.
ekospinach ITpreneur

Senin, 18 Februari 2013

What is Windows RunTime or WinRT



Windows Runtime, or WinRT, is Microsoft‘s new programming model that makes the backbone of the new Metro-style apps (also known as Immersive) in their new Windows 8 operating system. WinRT supports development in C++ (usually with Component Extensions, C++/CX), the managed languages C# and VB.NET, as well as JavaScript.

WinRT is essentially a COM-based API, although relying on an enhanced COM. Because of its COM-like basis, WinRT allows relatively easy interfacing from multiple languages, just as COM does, but it’s essentially an unmanaged, native API. The API definitions however, stored in “.winmd” files, are encoded in ECMA 335 metadata format, which is the same format that .NET uses with a few modifications.

Metadata format allows for significantly less overhead when invoking WinRT from .NET applications compared to a P/Invoke, and much simpler syntax.
The new C++/CX (Component Extensions) language, which borrows some C++/CLI syntax, allows the authoring and consumption of WinRT components with less glue visible to the programmer compared to classic COM programming in C++, and at the same time imposes fewer restrictions compared to C++/CLI on the mixing of types. Regular C++ (with COM-specific discipline) can also be used to program with WinRT components, with the help of new template library called Windows Runtime C++ Template Library (WRL), which is similar in purpose to what Active Template Library provides for COM. The MSDN documentation however recommends using C++/CX instead of WRL.
ekospinach ITpreneur