Showing posts with label Android. Show all posts
Showing posts with label Android. Show all posts

Thursday, 18 February 2016

RingingBell Freedom 251 features, price and specifications

RingingBell Freedom 251 features, price and specifications

Hardware
Touchscreen Capacitive touchscreen
Display Size, Type 4″, IPS, 275 PPI (pixel density)
Resolution, Colors 960 x 540 pixels, 65 K
SIM Type Dual SIM
Processor & Chipset Quad core 1.3 GHz & MediaTek
GPU Mali 400 GPU
RAM 1 GB RAM
Internal Memory 8 GB
External Memory Expandable upto 32 GB (MicroSD)
Battery, Talk Time, Stand By Li-Ion 1450 mAh, Up to 6 h, Up to 220 h
Colors Black, White
Software
OS Android, Lollipop 5.1
Camera
Primary Camera 3.2 MP
Secondary Camera 0.3 MP
Flash LED
Additional Information Geotagging, Autofocus, FHD Recording (1080p)
Network
2G 900 / 1800 MHz GSM
3G 900 / 1800 / 2100 MHz HSDPA
4G N/A
EDGE Yes
GPRS Yes
Bluetooth Yes, v4.0
Wi-Fi (W-LAN) Wi-Fi 802.11 b/g/n
GPS A-GPS
Additional Information Micro USB 2.0
Misc.
Sound Vibration; MP3, Wav Ring tones
FM Yes
Sensors Accelerometer,Proximity
Multimedia Music, Video MP3, eAAC+, WAV, Flac, Xvid, MP4, H.264
Additional Information HTML, HTML5, Active noise cancellation with dedicated mic

How to order freedom 251 when website server is down

How to order freedom 251 when website server is down
Heavy response for booking  Freedom 251 will create the freedom251.com server to prevent working due to very huge traffic(6 lakhs request per second as per the website post.
Android phone lovers are thirstily waiting to shop for Freedom 251 mobile(looks like Apple iPhone) from phone web site beginning on 18/02/2016 from 6 AM.
Freedom 251 flash sale will create the web site servers close up creating it as a scam.
Freedom 251 isn’t available on Flipkart, Amazon, Snapdeal and different e-commerce Sites.
It is available only on Ringing Bells pvt.ltd server freedom251.com.
It will be delivered till 30 June 2016 as per the website

Wednesday, 17 June 2015

New exploit turns Samsung Galaxy phones into remote bugging devices

As many as 600 million Samsung phones may be vulnerable to attacks that allow hackers to surreptitiously monitor the camera and microphone, read incoming and outgoing text messages, and install malicious apps, a security researcher said.
The vulnerability is in the update mechanism for a Samsung-customized version of  SwiftKey, available on the Samsung Galaxy S6, S5, and several other Galaxy models. When downloading updates, the Samsung devices don't encrypt the executable file, making it possible for attackers in a position to modify upstream traffic—such as those on the same Wi-Fi network—to replace the legitimate file with a malicious payload. The exploit was demonstrated Tuesday at the Blackhat security conference in London by Ryan Welton, a researcher with security firm NowSecure. A video of his exploit is here.
hones that come pre-installed with the Samsung IME keyboard, as the Samsung markets its customized version of SwiftKey, periodically query an authorized server to see if updates are available for the keyboard app or any language packs that accompany it. Attackers in a man-in-the-middle position can impersonate the server and send a response that includes a malicious payload that's injected into a language pack update. Because Samsung phones grant extraordinarily elevated privileges to the updates, the malicious payload is able to bypass protections built into Google's Android operating system that normally limit the access third-party apps have over the device.
Surprisingly, the Zip archive file sent during the keyboard update isn't protected by transport layer security encryption and is therefore susceptible to man-in-the-middle tampering. The people designing the system do require the contents of that file to match a manifest file that gets sent to the phone earlier, but that requirement provided no meaningful security. To work around that measure Welton sent the vulnerable phone a spoofed manifest file that included the SHA1 hash of the malicious payload.
Welton said the vulnerability exists regardless of what keyboard a susceptible phone is configured to use. Even when the Samsung IME keyboard isn't in use, the exploit is still possible. The attack is also possible whether or not a legitimate keyboard update is available. While SwiftKey is available as a third-party app for all Android phones, there's no immediate indication they are vulnerable, since those updates are handled through the normal Google Play update mechanism.
For the time being, there's little people with vulnerable phones can do to prevent attacks other than to avoid unsecured Wi-Fi networks. Even then, those users would be susceptible to attacks that use DNS hijacking, packet injection, or similar techniques to impersonate the update server. There is also no way to uninstall the underlying app, even when Galaxy owners use a different keyboard. In practical terms, the exploit requires patience on the part of attackers, since they must wait for the update mechanism to trigger, either when the phone starts, or during periodic intervals.
Welton said he has confirmed the vulnerability is active on the Samsung Galaxy S6 on Verizon and Sprint networks, the Galaxy S5 on T-Mobile, and the Galaxy S4 Mini on AT&T. Welton has reported to bug to Samsung, Google, and the US CERT, which designated the vulnerability CVE-2015-2865. The bug has its origins in the software developer kit provided by SwiftKey, but it also involves the way Samsung implemented it in its Galaxy series of phones.


Update: In an e-mailed statement, SwiftKey officials wrote: "We’ve seen reports of a security issue related to the Samsung stock keyboard that uses the SwiftKey SDK. We can confirm that the SwiftKey Keyboard app available via Google Play or the Apple App Store is not affected by this vulnerability. We take reports of this manner very seriously and are currently investigating further."
The researcher said Samsung has provided a patch to mobile network operators, but he has been unable to learn if any of the major carriers have applied them. As Ars has reported in the past, carriers have consistently failed to offer security updates in a timely manner.



Saturday, 2 May 2015

Top 4 Ways to Secure Android Tablet from Hacking


People nowadays make use of their smartphones and tablets as a daily lifestyle, not to show off or something, but these gadgets have become necessities of life. Tablets and smartphones, for instance, are used for texts, emails, and contact details; call logs, social media apps, browsing history, personal photos, save pin numbers, credit card numbers, passwords, and more. Now, don’t be confident that this information in your tablet is secured always as someone might just pick it up, snoop, go over it, or worse, steal your device and everything in it.

Threat of Data-stealing

Aside from people stealing the main device, expert hackers might cook up some automated threats and data-stealing apps. Hackers are not the only threats around as cellular providers, advertisers, and even the government might track your movements physically and online. Certainly, there are several risks to your gadget and the sensitive information it contains, needing you to take quick steps to lock down your tablet, while keeping away from snoopers and hackers.
  • Maximize Free Security Apps
Malicious apps are all over, and there is something you can do to reduce or eliminate such risks. If hackers are unable to slip a data-stealing app onto your tablet, then they might do another trick of stealing information through a phishing email. Security apps will keep a close eye on such things such as Webroot, a free Android app that is able to scan other applications for malicious codes, warning you of any danger. Security apps would also protect you from phishing scams that are very tricky until you download something you should never have.
  • Rely and Install Trusted Apps
Obviously, bad apps are full of malware that tends to infect gadgets with viruses or steal information. Hence, you must only rely and install applications from major stores like Amazon Appstore, Google Play, Windows Store, and so on. Mostly, third-part stores host malicious apps, disguising as popular and real ones. This is not an issue between Microsoft and Apple users as they are locked into their exclusive app stores. Android gadgets, however, allow users to visit other stores, besides Google Play.
  • Set Your Password or PIN Code
Many smartphone and Android users only use the “Swipe to unlock” default in their screens, provoking more thieves and snoopers. Setting your own password of pin code is very easy and will reduce the risks of your gadget being hacked or stolen. Come up with a combination or passcode that you’ll never forget, and changing this once in a while is also a good idea!
  • Keep Safe from Public Connectivity
Public hotspots are very ideal in reducing your data plan consumption, surfing the web very conveniently. However, there is also a downfall to this as free public connectivity could pose dangers as well. Remember, hackers will always be hackers, and they will try to infiltrate these networks so as to steal valuable information. As much as possible, do your online shopping and banking transactions at home, never through public Wi-Fi networks.

How to Use PC’s Internet Connection on Android Device

You would probably aware with connect your computers with your smartphone, to use phone’s internet connection on your PC. Here we talk about the “reverse connecting” and let you know how to connect your android phone or tablet to your PC to use computer’s internet connection.

Note: To do this you need a rooted Android phone and a Windows PC, but keep in mind the steps are easy if your computer has WiFi to create WiFi hotspot using a utility connection.

Basics

Before we start using this utility, you must have USB debugging enabled on your android device. For this go to Settings >> Applications >> Development >> Check USB Debugging. Might be you would also disable SuperUser access notifications, for this go to SuperUser App >> Menu >> Performances >> uncheck Notifications.
Tip: In case you don’t see the SuperUser app on your phone, it means your phone is not rooted.
You also require installing device’s USB driver on your computer after getting from device manufacturer or finding it on Google.

Tools


This is a Windows utility that uses ADB (Android Debug Bridge) that shares PCD’s Internet connection with your Android device using USB. It uses a duplicate of ADB, so you might not need the Android SDK installed on your computer. Download it from here.
Download and extract the downloaded ReverseTethering.zip file and run the AndroidTool.exe application inside its folder.

Connecting

Plug your android device to your PC with USB cable, than go to Select a device >> drop-down box >> click Connect on “Android Reverse Tethering Tool”. Once it connected to your android device it installs Busybox and Redsocks on on your phone. Go to SuperUser and allow the USB Tunnel tool on your device.
At this stage if you face a crash close, you might have to repeat the above shared process again. Or keep clicking on “Kill ADB” on the Tools tab that may re-launch ADB process. As the tool manage to create a connection you wills see connection notification.

Usage


Once it got set up after following above shared steps, open the apps and use internet. This way you can use your Android device forward network circulation with USB cable to your PC, which help you to use your computer’s Internet connection. The Windows application will keep showing all information about the connections.
The above shared method is to use internet on your android device if you don’t have a WiFi connection or 3G facility on your android device. Otherwise to use internet through network 3G connection or WiFi would be the best solution for you. This way you would have to stay stick with your PC as your phone will be connected to your computer with USB cable as this method is to transfer data through cable not over the air

How to Unlock Android Phone Lock Pattern Without Factory Reset


Pattern lock is a useful tool to secure your Android phone. This lock is important to secure your sensitive files and data from the guest users. But the trouble starts when you forget your settled pattern; it would be irritating when you will not be able to use your phone because of this issue. We know you must be looking for the answer to this important question, “How to unlock Android phone pattern lock without factory reset”. This tutorial will help you to unlock your phone using your Google account.
The new devices usually have built-in unlock patterns, which is easy to use but after several wrong attempts it locks permanently. When it happens, you have to use your ID that you use in your Google Play store to unlock that forgotten pattern. But there is a problem with this method if you are not connected to the internet then you will not be able to unlock your phone without this method.
However, you don’t need to worry about, in this tutorial you will learn how to unlock and reset your Android device in case you have forgotten your phone’s pattern. Follow the given steps and get your work done without paying any cost to the experts.

1. Unlock Pattern with Google Account

When we try to unlock our phone using wrong patterns, a message appears with two options “next” and “try again”.
Step 1. Go with the “next” where you can see two options to unlock your phone, one is to answer the security question, and the other is to provide Google account details.
Step 2. If you have settled your security question, answer it and get your phone unlocked quickly. On the other hand, if you didn’t set security question you would have to provide your Google account details.
Step 3. After this process, you will be able to choose a new pattern to use for the next time.
By following above methods, you will be able to unlock Android phone pattern lock without a factory reset. Happy using your Android device! We hardly prefer this way to unlock your phone, it helps you to avoid important data loss and saves your time.

2. Unlock Pattern Without Google Account

 Step 1. Switch off your smartphone and wait for a while when switched off
Step 2. Press Volume up + Home Key + Power Button; hold these buttons until the phone boots. (If your device doesn’t contain ‘home’ button simply hold other two buttons)
Step 3. When your phone will boot, the screen will appear with different options
Step 4. Now scroll down the screen using volume key and choose “Restore Factory Defaults” or “Delete all User Data” depending on the options shown by your device.
Step 5. After the above settings, choose the “Reboot System Now” and wait for your phone to reboot
Caution
  • This way you may lose all your data and apps through operating it without Google account.
  • This is general factory reset option to unlock your phone, but for specific phone’s factory reset you have to search for your Android phone or tablet.