ads

Saturday, June 20, 2015

Hitman 4: Blood Money - Highly Compressed 270 MB - Full PC Game Free Download

Hitman: Blood Money is a stealth video game developed by IO Interactive and published by Eidos Interactive. It is the fourth installment in the Hitman game series. It was released on May 26, 2006 in Europe, May 30, 2006 in North America, and August 30, 2007 in Japan.

Developer: IO Interactive.
Publisher: Eidos Interactive, Square Enix (HD Edition).

Features Of This Compressed Game:
Highly Compressed To 270 MB.
Easy To Install and Play With Guide.
No Game Crash Issue.
Extract and Play Available.
Full Version With Pre Activated.
100% Checked and Secure (Tested By Dudise&Hirwa Drake)

Minimum System Requirements:
CPU: Pentium 4 or Athlon XP 1.5GHz Processor
RAM: 512 MB or More
VGA: nVivia GeForce FX or ATi Radeon 9500 class Video Card
DX: DirectX 9.0
OS: Windows 2000/XP
HDD: 5 GB or More Free Space

Download Hitman 4 Full Game Direct Link Or Torrent From Bellow:
Download Instructions:
1.Chose the type of download you want to use among "direct download"or "torrent download"
2.Then wait for 5 sec then click skip ad
3.save your file


Download Direct   Download Torrent
How To Install This Game:
 1. First Open - "Hitman 4 Blood Money.exe" Setup File.
 2. Now Select Which Location You Want To Save This Game ...... Default Is Your Program Files
 3. Wait Few Minutes (5-10 Min)
 4. All Process Will Complete Automatically.
 5. After All Done a Window will Popup - Unsupported. Close It and You Can See a Shortcut On Desktop. (Hitman Blood Money)
 6. Now Click and Open The Game From Shortcut.
 7. Play And Enjoy ......... :)

Note: If this game shows "MSVCR71.dll not found" error then download MSVCR71.dll and paste it to Hitman 4 installation directory.

 

  download 

Monday, June 15, 2015

What is SIM CARD and how is it made?

The SIM (subscriber identity module) is a fundamental component of cellular phones. It’s also known as an integrated circuit card (ICC), which is a microcontroller-based access module. It is a physical entity and can be either a subscriber identity module (SIM) or a universal integrated circuit card (UICC). A SIM can be removed from a cellular handset and inserted into another; it allows users to port identity, personal information, and service between devices. All cell phones are expected to incorporate some type of identity module eventually, in part because of this useful property. Basically, the ICC deployed for 2G networks was called a SIM and the UICC smart card running the universal subscriber identity module (USIM) application. The UICC card accepts only 3G universal mobile telecommunications service (UMTS) commands. USIMs are enhanced versions of present-day SIMs, containing backward-compatible information. A USIM has a unique feature in that it allows one phone to have multiple numbers. If the SIM and USIM application are running on the same UICC, then they cannot be working simultaneously.
The first SIM card was about the size of a credit card. As technology developed, the cell phone began to shrank in size and so did the SIM card. The mini-SIM card, which is about one-third the size of a credit card. But today we are using smartphones that use micro-SIM, which is smaller than mini-SIM. These SIM cards vary in size but all have the functionality for both the identification and authentication of the subscriber’s phone to its network and all contain storage for phone numbers, SMS, and other information, and allow for the creation of applications on the card itself.
Untitled

SIM Structure and File Systems
A SIM card contains a processor and operating system with between 16 and 256 KB of persistent, electronically erasable, programmable read-only memory (EEPROM). It also contains RAM (random access memory) and ROM (read-only memory). RAM controls the program execution flow and the ROM controls the operating system work flow, user authentication, data encryption algorithm, and other applications. The hierarchically organized file system of a SIM resides in persistent memory and stores data as names and phone number entries, text messages, and network service settings. Depending on the phone used, some information on the SIM may coexist in the memory of the phone. Alternatively, information may reside entirely in the memory of the phone instead of available memory on the SIM.
The hierarchical file system resides in EEPROM. The file system consists of three types of files: master file (MF), dedicated files, and elementary files. The master file is the root of the file system. Dedicated files are the subordinate directories of master files. Elementary files contain various types of data, structured as either a sequence of data bytes, a sequence of fixed-size records, or a fixed set of fixed-size records used cyclically.
1
As can be seen in the above figure, dedicated files are subordinate directories under the MF, their contents and functions being defined by the GSM11.11 standards. Three are usually present: DF (DCS1800), DF (GSM), and DF (Telecom). Also present under the MF are EFs (ICCID). Subordinate to each of the DFs are supporting EFs, which contain the actual data. The EFs under DF (DCS1800) and DF (GSM) contain network-related information and the EFs under DF (Telecom) contain the service-related information.
All the files have headers, but only EFs contain data. The first byte of every header identifies the file type and the header contains the information related to the structure of the files. The body of an EF contains information related to the application. Files can be either administrative- or application-specific and access to stored data is controlled by the operating system.
Security in SIM
SIM cards have built-in security features. The three file types, MF, DF, and EF, contain the security attributes. These security features filter every execution and allow only those with proper authorization to access the requested functionality. There are different levels of access conditions in DF and EF files. They are:
  • Always—This condition allows to access files without any restrictions.
  • Card holder verification 1 (CHV1)—This condition allows access to files after successful verification of the user’s PIN or if PIN verification is disabled.
  • Card holder verification 2 (CHV2)—This condition allows access to files after successful verification of the user’s PIN2 or if the PIN2 verification is disabled.
  • Administrative (ADM)—The card issuer who provides SIM to the subscriber can access only after prescribed requirements for administrative access are fulfilled.
  • Never (NEV)—Access of the file over the SIM/ME interface is forbidden.
The SIM operating system controls access to an element of the file system based on its access condition and the type of action being attempted. The operating system allows only limited number of attempts, usually three, to enter the correct CHV before further attempts are blocked. For unblocking, it requires a PUK code, called the PIN unblocking key, which resets the CHV and attempt counter. If the subscriber is known, then the unblock CHV1/CHV2 can be easily provided by the service provider.
Sensitive Data in SIM
1
The SIM card contains sensitive information about the subscriber. Data such as contact lists and messages can be stored in SIM. SIM cards themselves contain a repository of data and information, some of which is listed below:
  • Integrated circuit card identifier (ICCID)
  • International mobile subscriber identity (IMSI)
  • Service provider name (SPN)
  • Mobile country code (MCC)
  • Mobile network code (MNC)
  • Mobile subscriber identification number (MSIN)
  • Mobile station international subscriber directory number (MSISDN)
  • Abbreviated dialing numbers (ADN)
  • Last dialed numbers (LDN)
  • Short message service (SMS)
  • Language preference (LP)
  • Card holder verification (CHV1 and CHV2)
  • Ciphering key (Kc)
  • Ciphering key sequence number
  • Emergency call code
  • Fixed dialing numbers (FDN)
  • Local area identity (LAI)
  • Own dialing number
  • Temporary mobile subscriber identity (TMSI)
  • Routing area identifier (RIA) network code
  • Service dialing numbers (SDNs)
These data have forensics value and can be scattered from EF files. Now we will discuss some of these data.
A. Service Related Information
ICCID: The integrated circuit card identification is a unique numeric identifier for the SIM that can be up to 20 digits long. It consists of an industry identifier prefix (89 for telecommunications), followed by a country code, an issuer identifier number, and an individual account identification number.
Twenty-digit ICCIDs have an additional “checksum” digit. One example of the interpretation of a hypothetical nineteen digit ICCID (89 310 410 10 654378930 1) is shown below.
  • Issuer identification number (IIN) is variable in length up to a maximum of seven digits:
The first two digits are fixed and make up the Industry Identifier. “89″ refers to the telecommunications industry.
-The next two or three digits refer to the mobile country code (MCC) as defined by ITU-T recommendation E.164. “310″ refers to the United States.
-The next one to four digits refer to the mobile network code (MNC). This is a fixed number for a country or world zone. “410″ refers to the operator, AT&T Mobility.
-The next two digits, “10,” pertain to the home location register.
  • Individual account information is variable in length:
The next nine digits, “654378930,” represent the individual account identification number. Every number under one IIN has the same number of digits.
  • Check digit—the last digit, “1,” is computed from the other 18 digits using the Luhn algorithm.
IMSI: The international mobile subscriber identity
is a unique 15-digit number provided to the subscriber. It has a similar structure to ICCID and consists of the MCC, MNC, and MSIN. An example of interpreting a hypothetical 15-digit IMSI (302 720 123456789) is shown below:
  • MCC—The first three digits identify the country. “302″ refers to Canada.
  • MNC—The next two (European Standard) or three digits (North American Standard) identify the operator. “720″ refers to Rogers Communications.
  • MSIN—The next nine digits, “123456789,” identify the mobile unit within a carrier’s GSM network
MSISDN—The Mobile Station International Subscriber Directory Number is intended to convey the telephone number assigned to the subscriber for receiving calls on the phone. An example of the MSISDN format is shown below:
  • CC can be up to 3 digits.
  • NDC usually 2 or 3 digits.
  • SN can be up to a maximum 10 digits.
B. Phonebook and Call Information
1. Abbreviated dialing numbers (ADN)—Any number and name dialed by the subscriber is saved by the ADN EF. The type of number and numbering plan identification is also maintained under this. This function works on the subscriber’s commonly dialed numbers. The ADN cannot be changed by the service provider and they can be attributed to the user of the phone. Most SIMs provide 100 slots for ADN entries.
2. Fixed dialing numbers (FDN)—The FDN EF works similar to the ADN because it involves contact numbers and names. With this function, the user doesn’t have to dial numbers; by pressing any number pad of the phone, he can access to the contact number.
3. Last number dialed (LND)—The LND EF contains the number most recently dialed by the subscriber. The number and name associated with that number is stored in this entry. Depending upon the phone, it is also conceivable that the information may be stored in the handset and not on the SIM. Any numbers that may be present can provide valuable information to an investigator.
Untitled
XML Phonebook Entry
C. Messaging Information—Messaging is a communication medium by which text is entered on one cell phone and delivered via the mobile phone network. The short message service contains texts and associated parameters for the message. SMS entries contain other information besides the text itself, such as the time an incoming message was sent, as recorded by the mobile phone network, the sender’s phone number, the SMS center address, and the status of the entry. An SMS is limited to either 160 characters (Latin alphabet) or 70 characters (for other alphabets). Longer messages are broken down by the sending phone and reassembled by the receiving phone.
Tools for SIM Forensics
To perform forensic investigation on a SIM card, it has to be removed from the cell phone and connect to a SIM card reader. The original data of SIM card is preserved by the elimination of write requests to the SIM during its analysis. Then we calculate the HASH value of the data; hashing is used for checking the integrity of the data, that is, whether it has changed or not. There are lots of forensic tools are available but all tools are not able to extract data from every type of cell phone and SIM card. Now we will discuss about some famous tools:
Encase Smartphone Examiner: This tool is specifically designed for gathering data from smartphones and tablets such as iPhone, iPad, etc. It can capture evidence from devices that use the Apple iOS, HP Palm OS, Windows Mobile OS, Google Android OS, or RIM Blackberry OS. It can acquire data from Blackberry and iTunes backup files as well as a multitude of SD cards. The evidence can be seamlessly integrated into EnCase Forensic.
1
MOBILedit! Forensic: This tool can analyze phones via Bluetooth, IrDA, or cable connection; it analyzes SIMs through SIM readers and can read deleted messages from the SIM card.
a
pySIM: A SIM card management tool capable of creating, editing, deleting, and performing backup and restore operations on the SIM phonebook and SMS records.
Untitled

AccessData Mobile Phone Examiner (MPE) Plus: This tool supports for than 7000 phones including iOS , Android , Blackberry, Windows Mobile, and Chinese devices and can be purchased as hardware with a SIM card reader and data cables. File systems are immediately viewable and can be parsed in MPE+ to locate lock code, EXIF, and any data contained in the mobile phone’s file system.
1
SIMpull: SIMpull is a powerful tool, a SIM card acquisition application that allows you to acquire the entire contents of a SIM card. This capability includes the retrieval of deleted SMS messages, a feature not available on many other commercial SIM card acquisition programs. SIMpull first determines if the card is either a GSM SIM or 3G USIM, then performs a logical acquisition of all files defined in either ETSI TS 151.011 (GSM) or ETSI TS 131.102 (USIM) standards.
1
As can be seen in above figure, by using the SIMpull application we can see the information of SMS such as a SMS text and its length, the SMS sender’s number information, service center information, etc.

Wednesday, June 10, 2015

How to Use Your Cell Phone as a Wi-Fi Hotspot

Did you know you could use your cell phone as a wireless router for internet access on your laptop, tablet, and other Wi-Fi devices? iPhone and Android smartphones have this Wi-Fi hotspot (or mobile hotspot) feature built into their devices. You can use your phone's data plan to get connected on your laptop, tablet, and other devices all at the same time.

Wi-Fi Hotspot or Mobile Hotspot Features

Android has a Wi-Fi hotspot feature also known as "Portable Wi-Fi Hotspot" and the iPhone has a "Personal Hotspot" feature. Both are a version of tethering, but unlike other tethering options (via USB or Bluetooth), you can connect multiple devices simultaneously. Connect to your phone over Wi-Fi is as easy as connecting to a wireless network on your phone.


continue reading below our video
Quick Tip: What is a Wi-Fi Hotspot?
Cost:To use the service, your cell phone would need to have a data plan on its own. Most wireless carriers also charge a separate tethering or hotspot plan, which can cost about $15 a month. (However, sometimes you can get around this extra charge by rooting or jailbreaking your smartphone and using a tethering app to turn your smartphone into a wireless mobile hotspot.
Security: By default, typically the wireless network you set up with your smartphone is encrypted with strong WPA2 security, so unauthorized users can't connect to your devices. For added security, if you're not prompted to set up a password, go into the settings to add or change the password.
Downside: Using your phone as a wireless modem drains the battery life, so make sure you turn the Wi-Fi hotspot feature off after you're done using it.

Wi-Fi Hotspot Settings

You'll find the Portable Wi-Fi Hotspot or wireless hotspot settings on Android under the "Wireless & networks" settings. For iPhone, the Personal Hotspot feature is under the Network settings.
Similarly, on Windows Phone and Blackberry, the "internet sharing" and mobile hotspot settings are in the network settings. In most cases, you'll be able to change the wireless network name and, as mentioned above, the network password (and on BlackBerry, you can control your new shared network to a great degree). 
Once you turn on the Wi-Fi hotspot on your phone, connect to it on your laptop, desktop, tablet, or other device the same way you would connect to a wireless network.

Saturday, June 6, 2015

Scientific calculator in VB

This calculator has been designed in VB to help people to perform mathematical calculations.


Sit comfortably on your computer.

Ergonomics (or human factors) is the scientific discipline concerned with the understanding of interactions among humans and other elements of a system, and the profession that applies theory, principles, data and methods to design in order to optimize human well-being and overall system performance.
The image below shows how a man can interact with computer.
Keep visiting

Become a Good android developer


Imagine what your android smart phone would be without those apps that you love so much. Starting from the apps that you use to access your social media pages and games, apps are essentially make your phone what it is.
Our lives today are so dependent on apps and there are new ones being developed daily for different purposes. The apps have touched our lives in a way that if today they were to disappear from our phones life would never be the same again. Imagine if you did not have that app that you use for your diet program or work out? What if you were unable to access your favorite social media site because you did not have an app to do so?



The importance of apps for the smooth running of our daily lives cannot be overemphasize. This is especially so with the increased migration from desktop computers to smartphones and tablets. Development of apps is slowly becoming a simpler task that anyone can do after a few lessons. However, developing a functional app that can be used by many people is still a challenge to many developers. Developing an app is easy; developing a good one is the more difficult part.

Important tips on developing a good app

Be willing to learn. Just like anything else in life, your willingness to learn will determine if you are able to make a great app or not. App development may not be rocket science but it is also not as simple as taking a cup of tea. Willingness to learn and a little dedication will ensure that you learn all the coding necessary to develop an app fast.

Basic knowledge in some specific areas like XML and Java is an added advantage. This acts as a good foundation of any android developers to build on. Knowledge of these areas makes your learning much easier and faster as you are able to grasp the concept behind app development quicker. However, if you know nothing about any of this it does not mean you cannot become a good app developer. Everything you need to know can still be taught to you.

Trial and error is a good learning experience. In the beginning you may create terrible apps but this shouldn’t discourage you. In a learning process you get better after trying a couple of times. It is through trying that you will be able to identify the areas you are not good at. After a couple of trials you will start noticing some improvements which should encourage you to push on.

Make it as simple as possible. What kind of apps do you like on your phone? Chances are you like the ones that are simple to use. This is the same for most people and so when developing an app the simpler it is the better. Most people learning how to develop apps fail because they are always focusing their effort on developing something very complex. Remember that simple does not mean that your app is substandard.

Focus on the real world. The most successful apps are the ones that try to emulate the real world as much as possible. Unless you are creating a game then the real world should be your main focus when learning and developing your app. When doing this also keep in mind that the purpose of an app is to make things better for its users.

Where to learn

When you think about that magnificent app that you enjoy using so much you assume it was created by a tech graduate from one of the best colleges in the world but that is not necessarily true. Learning how to make an app is quite simple and you can do it online from the comfort of your home.

Some of the good websites you can learn app development would include.

1. Developer Android


Developer Android is Google’s official android app development page. Here you will find all the materials you will need to learn app development.

2. Treehouse
This is a subscription based program but very rich in resources. Here you will get to learn all the basics ofapp development and also all the complex stuff you will need at a later date.

3.Udemy

Udemy also has a very good course on app development. It is a good place to learn especially for those without prior knowledge.

This article may not be professional for you but these are very important points and can be helpful for those who want to start android development. After all, How can one expect to learn android development from a single article? Go ahead and start learning. best of luck
Keep using Dudise Messenger

How to remove administrative password on Windows PC

Firstly,I would like to greet you!

1. Switch on your computer


How to log in to administrator account on any Windows PC Image Tutorial


WARNING: I am NOT responsible for any expulsions or such if you do this at school/work! First, restart your computer.
PeregrineX shows on Imgur how to log in to admin account of any Windows PC
Once you get to this screen, hold the power button on the computer until it turns off (no damage will be done, trust me).
Once you get to this screen, hold the power button on the computer until it turns off (no damage will be done, trust me).
If you did it correctly, you should get this screen. If you get something like “Windows did not shut down correctly,” try again. Otherwise, select “Launch Startup Repair.”
If you did it correctly, you should get this screen. If you get something like "Windows did not shut down correctly," try again. Otherwise, select "Launch Startup Repair."
Let the repair go through. If you get this window, select “Cancel.”
Let the repair go through. If you get this window, select "Cancel."
When you get this window, click on “Show problem details.” Scroll down, and click the link on the very bottom. Notepad should pop up.
When you get this window, click on "Show problem details." Scroll down, and click the link on the very bottom. Notepad should pop up.
Go to File/Open, and double-click your “Local Disk” (Mine is D:/ because I have a virtual machine. Yours will probably be C:/).
Go to File/Open, and double-click your "Local Disk" (Mine is D:/ because I have a virtual machine. Yours will probably be C:/).
Go to Windows/System32. Now do EXACTLY as I say, or you MIGHT break the computer. Under “Files of type,” select “All files.” Scroll down and find “cmd,” then make a copy of it in the same folder (Ctrl-C, Ctrl-V). You should get a file named “cmd – Copy” or something like that.
Go to Windows/System32. Now do EXACTLY as I say, or you MIGHT break the computer. Under "Files of type," select "All files." Scroll down and find "cmd," then make a copy of it in the same folder (Ctrl-C, Ctrl-V). You should get a file named "cmd - Copy" or something like that.
Find “sethc” in the same folder. This file executes sticky keys. Rename it to “sethc 1.”
Find "sethc" in the same folder. This file executes sticky keys. Rename it to "sethc 1."
Rename your “cmd – Copy” to “sethc.” Close notepad, and hit “Finish” to shut down your PC, or just restart it manually.
Rename your "cmd - Copy" to "sethc." Close notepad, and hit "Finish" to shut down your PC, or just restart it manually.
Once you get back to the login screen (where it says “Press Control – Alt – Delete.” Ignore my background, I don’t have that enabled), press “Shift” 5 times to open up the command prompt.
Once you get back to the login screen (where it says "Press Control - Alt - Delete." Ignore my background, I don't have that enabled), press "Shift" 5 times to open up the command prompt.
Next, we need to find out what user is the local administrator for this PC. To do this, type “net localgroup Administrators” and look for any administrator that does NOT have your school/work domain in front of it, followed by a “/.” As you can see, one of the admins is named “qwaszx.” You will probably see a name like this, since schools/workspaces tend to make it a random string of letters and/or numbers to ward off people from entering it.
Next, we need to find out what user is the local administrator for this PC. To do this, type "net localgroup Administrators" and look for any administrator that does NOT have your school/work domain in front of it, followed by a "/." As you can see, one of the admins is named "qwaszx." You will probably see a name like this, since schools/workspaces tend to make it a random string of letters and/or numbers to ward off people from entering it.
Now, we need to change that account’s password. Type “net user <ACCOUNT NAME HERE> *” and type the new password twice. It will not show what you’re typing, but your keystrokes are being registered. You can now log in to your admin account! However, schools/workspaces also like to disable the admin account you just changed the password for, so you might not be able to log in. There is a simple fix. If you get that message, go to the extra step below.
Now, we need to change that account's password. Type "net user <ACCOUNT NAME HERE> *" and type the new password twice. It will not show what you're typing, but your keystrokes are being registered. You can now log in to your admin account! However, schools/workspaces also like to disable the admin account you just changed the password for, so you might not be able to log in. There is a simple fix. If you get that message, go to the extra step below.
If the admin account is disabled, type “net user <ACCOUNT NAME HERE> /active:yes” You will now be able to log in.
If the admin account is disabled, type "net user <ACCOUNT NAME HERE> /active:yes" You will now be able to log in.
You now have full admin rights to the PC. Enjoy! AGAIN, I AM NOT RESPONSIBLE FOR ANY MISTAKES OR DAMAGES TO THE COMPUTER OR NETWORK. DO AT YOUR OWN RISK!

advertisements