Sunday, May 15, 2016

How to Find Out Which Build and Version of Windows

                         How to Find Out Which Build and Version of Windows                             

“Windows 10” is apparently here to stay, and Microsoft won’t be bumping things up to Windows 11 any time soon. Here’s how to find out what “build” of Windows 10 you have — you can think of it like a service pack level — as well as which edition and version of the operating system you have.Microsoft has hidden the build number in an attempt to make Windows 10 look always-up-to-date, and there are still different editions of Windows 10 with different features.

Use the Settings App

The new Settings application also offers this information in a user-friendly form. To launch it, click or tap the Start button and select Settings.
Navigate to System > About and scroll down. You’ll see the “Version” and “Build” numbers here.
  • Edition: The “Edition” line tells you which edition of Windows 10 you’re using — Windows 10 Home, Professional, Enterprise, or Education. If you’d like to upgrade to Windows 10 Professional, you can upgrade to the Professional edition from within Windows 10. Switching to Windows 10 Enterprise or Education editions will require a complete reinstall and a special key that isn’t made available to normal home Windows users.
  • Build Number: Look at the “Version” and “OS Build” lines. If you have the original version of Windows 10, you’ll just see “OS Build 10240”. This was the initial release of Windows 10. If you have the “November Update” version of Windows 10 — Windows 10’s first big update— you’ll see a new version number scheme here. It’ll say “Version 1511 (OS Build 10576.29)”.
    The “1511” is the key. This number identifies that you’re using the build of Windows 10 released in November (the 11th month) of 2015. If Microsoft were to release a build of Windows 10 in April (the 4th month) of 2016, its version number would be “Version 1604”.
  • 64-bit or 32-bit: The “System type” line tells you whether you’re using the 32-bit version of Windows 10 or the 64-bit version. It also tells you whether your PC is compatible with the 64-bit version or not.
    For example, “64-bit operating system, x64-based processor” indicates you’re using a 64-bit version of Windows 10 on a 64-bit processor. “32-bit operating system, x64-based processor” indicates you’re using a 32-bit version of Windows 10, but you could install the 64-bit version on your hardware if you preferred.

Use the Winver Dialog and Control Panel

You can use the old standby “winver” tool to find the build number of your Windows 10 system. To launch it, you can tap the Windows key, type “winver” into the Start menu, and press Enter. You could also press Windows Key + R, type “winver” into the Run dialog, and press Enter.
The winver dialog doesn’t display whether you’re using a 64-bit or 32-bit version of Windows 10, but the Control Panel does. To open this screen, right-click “This PC” in a File Explorer window and select “Properties”. You can also open the Control Panel window, click “System and Security,” and then click “System”.
The “Windows edition” section at the top of the window displays which edition of Windows 10 you’re using, while the “System type” line here displays whether you’re using a 64-bit or 32-bit edition of Windows 10, and whether your computer’s hardware is 64-bit compatible or not.

Saturday, May 14, 2016

Best Hacking Apps for Android Phones

                                Best Hacking Apps for Android Phones                                

The world is full of smartphones these days. Most people rely on their smartphones and other portable devices to carry out their day to day activities. It won’t be an exaggeration to say that smartphones have taken over laptops in terms of productivity. 
Hacking, nowadays, is not something which is the exclusive domain of the “experts”. With the help of a few applications and basic knowledge of the true capabilities of your android phone, you, too, could delve into the world of hacking. So, let’s discuss some of the apps for your android phones which will turn you into a hacker!


AndroRat stands for Android Remote Administration Tool. As the name suggests, it is a remote administration tool which is used to control another device even if you have no physical access to that device! Manipulating other devices can be easily done using the app which is quite useful in case you’re away from your device and need it to perform some task. It is also useful in inducing some giggle and amazement amongst your friends and family members!


The word “hacking” for many is hacking into your friend’s social media account for giggles. Or it may be used for even something useful like extracting some important information from someone’s social media accounts. DroidSheep does the job for you. It hijacks the sessions of social media activities carried out on your network. You need the knowledge of the basics of hijacking and by installing the app on your android device you’re all set to ‘hack’ your friend’s online social life!


This open source ethical hacking app is one of the most popular ones in this field. Similar to the net cut app in Windows, this app is capable of cutting off anyone’s WiFi over your network. Kill Wifi is extremely useful when you have an open WiFi not protected by a strong password. You can cut off the WiFi of the intruder by just a few clicks on your device. This app is easy to use owing to its lucid and interactive interface and easy-to-use tools.


Won’t it be wonderful if you could place a call to your friend phone, but instead of showing your phone number different number flashes on your friend’s phone? SpoofApp is exactly what this app does. Apart from changing your phone number, this app can also change your voice and record your entire conversation! However, you will need SpoofCards to use this app. Overall a nice app for bringing smiles on your and your friend’s face.


One of the most useful ones, Wifi Mac Changer app changes the MAC address of your device you make your activities almost untraceable. With your rooted android phone, you can change the MAC Address of your device temporarily so that your online activities cannot be traced back to you. The app provides you two methods of changing your MAC Address. One is the easier way which reflects no change in your WiFi settings. The other method is a bit tougher which allows you to enter apps which are password protected and this will reflect the changed address in your WiFi settings.

These apps may not seem very productive at a first glance but with prolonged use, you will certainly realize the potential that these apps possess. Who knows someday you may need to spy upon your friend’s/significant other’s social media account? Or you may need to kick off an intruder from your network. Thus, gear up for the path untraveled and watch your world in an entirely different light using these apps!

How to Hack an Android Smartphone

                          How to Hack an Android Smartphone                              

Method on Hacking Android Mobile Phones Via Internet

I’m pretty sure there were many times you wished you could somehow get to know what the other person is hiding from you (happens often in relationships) and how you could hack into their mobile and see the contents of their mobile such as their messages, multimedia files (photos & videos), contacts, delivery reports etc. And to make matters worse, you might not understand the complexity of hacking procedures and wish if only there were a way by which you could hack into their mobile especially Android Phones.
Well, if the victim happens to be using an Android smartphone then your luck has just opened up because now we shall disclose a simple way of hacking into an Android smartphone. Basically you have to download the relevant software from a trusted site (make sure you don’t download from any third party site since it could be malicious and if installed, could steal your browsing history or make your files corrupt). What’s pretty amazing is that such software also are available for free which means you don’t have to spend any $$$ just to acquire the hacking software.
  1. Total Anonymity – Victim will never realized the he/she is being hack at any point of the time.
  2. Complete access to his mobile – Text Messages, File Manager (videos, images and files).
  3. Victim’s mobile could be used for variety of purposes such as a microphone, a camera, to send SMS.
  4. Acquire All Files – All the files in their mobile could be downloaded by you in your computer.
  5. Works VIA Internet! – No need of physically having the victim’s mobile during the entire process. Entire process is done remotely from a secure connection as long as there is Internet!


  1. The victim and the hacker need to remain connected to the internet during the entire process of hack.
  2. Only works if you know the country code of the mobile number and the mobile number itself

Tricks and hacks for all window o.s pc and laptop

                       Tricks and hacks for all window o.s pc and laptop

*. Remove programs from Open with…
You can remove unwanted programs that appear on the Open with… list when you're trying to open an unknown program.

In the Registry, browse to HKEY_CLASSES_ ROOT\Applications and you'll see a list of programs installed on your PC as sub keys in the left-hand pane.

To remove an unwanted program from this list, select it and then right-click in the right-hand pane. Choose New > String Value, and name it "NoOpenWith".

**. Copy to folder

Add a "Copy to folder" option to the context menu so you can right-click a file to quickly copy it.

In Registry Editor, browse to HKEY_CLASSES_ ROOT\AllFilesystemObjects\shellex\ContextMenu Handlers, and create a new key called Copy to.

Change its (Default) value to "" and check it works.

***. Move to folder
You can also add a "Move to folder" option in this way.

From the same ContextMenuHandlers key as in tip 2, create a new key called "Move to" and change its (Default) value to "".
****. Quick folder Properties
To move quickly to a folder's Properties dialog, double-click it and hold down [Alt].

*****. Correct file sorting

By default, a file named 2.jpg is sorted after one called 20.jpg. Many people work around this by starting single digit numbers in file names with a leading zero, but you can change this behaviour by making a Registry edit.

Browse to the Registry key HKEY_CURRENT_USER\Software\ Microsoft\Windows\CurrentVersion\Explore.

Then create a new DWORD value and name it "NoStrCmpLogical". Right-click and modify its value to "1".

V*. Change the mouse pointer in Vista and Windows 7

Right-click the desktop and choose Personalize > Mouse Pointers. Select the scheme you want to use from the drop-down list. You can modify individual pointers by selecting one in the current scheme and clicking Browse – then replace this with any static cursor file with the extension .CUR, or an animated cursor file, which will have the .ANI file extension.You can also download sets of mouse pointers online. These are generally distributed in sets of .CUR or .ANI files, grouped together in a zip archive. Download the file, unzip it and then replace the pointers you want to with the new files as in the above tip. A good place to start looking is here.You can also make your own cursor files by creating suitable bitmap images in a graphics program and saving them with the .CUR extension.

V**. Mouse pointers in XP

To change the mouse pointer scheme in Windows XP, open Control Panel and switch to Classic View. Double-click Mouse and choose the Pointer tab.

V***. Send To expansion

When you right-click a file or folder in Windows 7 and choose Send To, there's a limited number of options. But hold down [Shift] as you right-click and you'll open an expanded menu containing My Documents, Downloads and more useful locations.

V****. Edit your theme

Right-click anywhere on the desktop and choose Personalize > Theme. Select an option from the drop-down list to use an existing theme.

Alternatively, choose "Window Colour and Appearance", open the Classic Appearance dialog to select a classic scheme and modify fonts and colours. Click Advanced. Pick the item you want to modify and enter the new colour or font.

VV. Folder toolbar

This tweak enables you to turn any folder on your hard drive into a toolbar, similar to the Quick Launch toolbar that gives you quick and easy access to the folder's contents.

First, minimise all your open windows, then move the mouse pointer to the Taskbar and right-click it. Choose Toolbars > New Toolbar from the expanding menu, which will launch the New Toolbar dialog.Now select the item you want to use as a toolbar. If necessary, browse through My Documents or My Computer to find the folder you want. Alternatively, you can click "Make new folder" to create a custom one with specific contents.Click OK, and your new toolbar appears as a button on the Windows Taskbar, then click this to see an expanding menu of its contents. Sub-folders also become their own expanding menus, and you can then select a particular file to open it in its associated application.
VV*. Active windows
Press [Alt] + [Esc] to cycle through your active items in the order in which they were opened. Then press [Alt] + [Tab] to pick the window you want to work on.
VV**. Hanging time
By default, Windows waits for five seconds to allow time for any hung applications to be closed when you shut down your computer.

If you want to reduce this period of time slightly, you can change the length with a quick Registry edit, so browse to HKEY_CURRENT_ USER\Control Panel\Desktop. In Vista, create a string entry called "HungAppTimeout" (if you use XP, it's already there).

Right-click this and choose Modify. The number is in milliseconds, so the default of 5000 equates to a wait of five seconds. If you're using Windows 7, you should avoid using this tweak, because it causes glitches.

VV***. Tweak performance
1. Best performance

Choose Start, right-click Computer and go to Properties > Advanced system settings. In Performance, click Settings > Visual Effects. Tick "Adjust for best performance". This removes most animations to improve PC performance.

2. Processor scheduling

In the Advanced tab, both Processor Scheduling and Memory usage are optimised for programs' performance. Change to Background services and System cache if you use your PC as a server, and programs' performance is secondary.

3. Virtual memory

In Virtual Memory, click Change > Custom size, and enter an upper and lower limit for your virtual memory. Try one and a half times the amount of RAM as your lower limit, and two to three times your RAM for the upper limit.
VV****. Disable paging file
If you're running a 64-bit version of Windows, have more than 4GB RAM installed, and don't perform memory-intensive operations, you could improve performance by disabling the paging file. In "Advanced system settings", choose Performance > Advanced, click Change under Virtual memory and choose "No paging file".
VVV. Clear paging file at shutdown
Windows uses the paging file on your hard drive as if it were RAM, and this routinely holds temporary data to free up your RAM. When you shut down your PC, this file is normally preserved, which can lead to inefficiency, because it slowly clutters up your system.

If your data is sensitive, this could also be a security threat, since it remains accessible even after you've deleted or destroyed the files it contains.

This edit flushes out the swap file whenever you shut down. Open the Registry Editor and browse to the key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management.

This contains a number of configurations for RAM and virtual memory. Either create or modify the DWORD value called "ClearPageFileAtShutdown", which defines whether the memory flush happens. To turn it on, set the value to "1".

VVV*. Quick access to Task Manager

You may be used to accessing Task Manager by pressing [Ctrl] + [Alt] + [Del] and then selecting it from the resulting screen. You can also get quick access to it that's less intrusive, however – rightclick the Taskbar and choose Task Manager.

VVV**. Change user picture
Click the Start button and then click your user picture. In the resulting dialog, choose Change your picture > Browse for more pictures. Locate the photo you want to use and click OK. Click Change Picture, followed by OK to confirm your choice.
VVV***. Autohide the Taskbar

You can free up more screen space by hiding the Taskbar. Right-click it, choose Properties and select Auto-hide. To access it when you want it, just drag the mouse to the bottom of your screen and it'll pop up.
VVV****. Get past the welcome screen

You can automatically log on and bypass the welcome screen with this simple tweak. Choose Start > Run and type "control userpasswords2" into the Open bar.

Click OK to see a dialog with each user installed on the PC. Clear the box marked "Users must enter a username and password to use this computer". Click OK. Now restart, and you'll go directly to your desktop.
XX. Custom keyboard shortcuts
Works with: XP, Vista, Windows 7

Create keyboard shortcuts to launch any program shortcut. Right-click the shortcut icon and choose Properties. Select the Shortcut key box and press a letter on the keyboard, (such as [H]) and click OK. Now [Ctrl] + [Alt] + [H] will launch the shortcut.

Diamond Vision DVD Player Region-free Hack and Review

 Diamond Vision DVD Player Region-free Hack and Review

Whether you intend to watch foreign language videos in order to learn a new language, or because some titles are not available where you live, DVDs from another region will probably be unplayable on your current DVD player. However, a DVD machine can often be converted (hacked) to a different region via a remote control sequence or firmware upgrade. Sometimes you can even buy customized chips to modify the hardware.The simplest and least expensive way to hack a DVD player is to find a cheap unit that can be fine-tuned via a remote control sequence. That is what this article is all about.The Diamond Vision DVDV 807-3 player is front-loading. It proved itself to be reliable during my testing. There are a couple of annoyances, however:

1.) The DVD-spinning mechanism tends to be a little loud (minor inconvenience).

2.) If you try to operate STOP, OPEN, and PLAY buttons too quickly, the player sometimes locks up. Powering down and restarting always resets the player successfully.

The region-free hack works as follows:

1.) Turn on the power and wait until the 'NO DISC' message appears, then press OPEN/CLOSE on the unit itself to open the door of the DVD player

2.) On the remote control, press SETUP. A menu will appear onscreen.

3.) Enter the following number sequence via remote: 1 3 8 9

4.) A different menu will appear. Your cursor should now be sitting in a box with the current region displayed. Use the UP and DOWN arrow keys on the remote control to display a specific region's numerical code, or select '0' (regionless).

5.) Press ENTER and then SETUP to exit.

6.) Your DVD player will now play DVDs from other regions. The code only has to be entered once. Powering down will not cause the Diamond Vision to lose its region-free setting. An added plus: it automatically senses PAL/NTSC signals.

According to, this region hack will also work with many other Diamond Vision DVD players.This unit is a pretty standard economy DVD player. You can usually find it for well under $50 in most Wal-Marts. It is approximately 9 inches wide by 10 inches deep, and the remote control is a little nicer and bigger than what comes with a lot of discount DVD units.

This machine provides several types of video and audio output:

1.)Y/Pb, Cb/Pr, Cr

2.) RCA

3.) S-Video

For a budget player, it certainly is a bargain, considering the capabilities.

 You can determine the region code for any DVD by looking at the packaging. You might see something that looks like a button with a globe in the background and a large number. The DVD may specifically state something like 'Region 1'. If no code is shown, it may be regionless right out of the box. Some older titles, budget productions, or remakes of older films often do not have any region protection added.

A DVD Player Hack

                                        A DVD Player Hack                            

This is a description of an open source/open hardware project of a remotely controlled Arduino (Freeduino) based clock/thermometer utilising power supply and VFD panel from a broken DVD player in a custom made acrylic enclosure. The aim of the project was to demonstrate what could be done from electronics that has been literally thrown away rather than design one more digital clock.Having source code and all design files as a starting point it becomes very easy to customise it for your own needs and your own DIY project, even VFD driver might be modified with little efforts to control VFD panel from another DVD player - they all designed in a unified way.

This is a list of features that we've got in the end (and what could be potentially enhanced if you like):

  • Real time clock battery backed up dedicated chip;
  • 1Wire temperature sensor;
  • Controlled wirelessly by any RC;
  • Activated by PIR motion sensor;
  • Speaker;
  • Serial-to-USB convertor for reprogramming and logging purposes;
  • Acrylic enclosure;
  • Full source code is available;
The video demonstrates designing and assembling process and if you find it interesting please welcome to the next page for more technical details!

Step 1: Scrapped DVD player parts

Vacuum fluorescent displays (VFD) make any consumer device looking eye-catching, compelling and unusual. A VFD emits a very bright light with high contrast and can support display elements of various colors, some of them are capable of rendering not only seven-segment numerals but characters and even graphical information. VFDs are equally great for anything from professional devices to basic do-it-yourself things. Yet VFDs are rather expensive for small hobby projects and notorious for their non-trivial control as they require voltages higher than just TTL levels, necessity to drive grids in addition to segments or dots and therefore make presence of dedicated VFD controllers highly desirable just to simplify communication with microprocessors.
But what if all this infrastructure already existed, would it be that difficult to combine together something like Arduino controller and VFD? The answer is no, not at all! Most modern DVD players equipped with VFDs and when less reliable mechanical parts (DVD ROM drives) fail devices are simply thrown away. Instead, some electronics could still be reused to give your project a completely new look reducing costs at the same time and saving the environment. In addition to a VFD with controller onboard and a power supply which provides everything with all vital voltage levels there is a bonus – an IR receiver and buttons. VFD controller takes care of refreshing display, handling events from buttons and IR receiver encapsulating whole control into a serial interface and making integration with even primitive controllers very possible, giving in exchange fully functional remotely controlled system.

But enough theory, let’s have a look at a real example. We found a broken DVD player literally lying in the street. Quick test indicated that VFD board and power supply were functional. VFD was 16-segment and therefore capable of displaying not only digits but characters as well. 

Thursday, May 12, 2016

Us Government invites hackers to hack the pentagon

                 Us Government invites hackers to hack the pentagon                           

The Pentagon is about to pay hackers to break into government security systems.
The U.S. Department of Defense (DoD) announced yesterday (March 2) that it plans to launch the first "cyber bug bounty program" in the history of the federal government.
The so-called Hack the Pentagon program, which is slated to begin in April, will allow vetted hackers to find weaknesses in the department's public websites, applications and security systems, according to defense officials. Participants could win money and recognition for their work, they added. [The 8 Craziest Intelligence Leaks in US History]Bug bounty programs and hackathons are common in private industry. Google, Facebook and Microsoft already use them to expose gaps in their own software. Additionally, these programs can help prevent disruptions in service and reduce the impact of cyberattacks on companies and government agencies, according to cybersecurity experts.
"Bringing in the best talent, technology and processes from the private sector not only helps us deliver comprehensive, more secure solutions to the DoD, but it also helps us better protect our country," Chris Lynch, director of the DoD's Defense Digital Service, said in a statement.
Participants in the government's Hack the Pentagon program will be required to register and submit to a background check.Once vetted, these hackers will participate in a controlled, limited-duration program that will allow them to identify holes in a predetermined network system, according to the Department of Defense. Other networks, including the department’s critical, mission-facing systems, will not be part of the bug bounty pilot program, defense officials said. 
The new initiative follows the administration’s Cybersecurity National Action Plan, announced on Feb. 9, which prioritizes near-term actions to improve cyberdefenses and lists a long-term strategy to enhance cybersecurity across all branches of the U.S. government. 
"I am confident this innovative initiative will strengthen our digital defenses and ultimately enhance our national security," Secretary of Defense Ash Carter said in a statement. 
More information about the Hack the Pentagon program can be found on the Department of Defense's website. Details on the requirements for participation and other ground rules will be available in the coming weeks.
- See more at: