how to install Android 4.2.2 Jelly Bean on your PC



Learn2Crack is providing us with an easy tutorial on how to install Android on a PC! You don't have to be a four-eyed geek to do so, or have a masters degree in Computers Science, all you need is a little bit of free time and the ability to follow steps 1 through 10, simple as that. Oh, and don't worry about doing something illegal, because Android is based on Linux, which means that is has an open source. Tweak all you want, dig deep, play with the interface, install apps, change settings –everything that you can do on a phone or a tablet you can now do on your computer. So, let's get to the nitty-gritty, or the guide on how to install Android Jelly Bean 4.2.2 on your PC:

Download:
  • 1.Oracle VM VirtualBox - Download the latest version of here
  • 2.Android x86 4.2 Image - Download the Android 4.2 image from here
Instructions: 
  • 1.Install VirtualBox on your PC
  • 2.Open VirtualBox and select New. In the dialog box enter the name as your wish and select
    i)Type : Linux
    ii)Version : Other Linux
    and select Next
  • 3.In the next dialog box enter the memory size as your wish
Note : Minimum 512Mb required for JellyBean
and select Next
  • 4.In the next dialog box select create a virtual hard drive now. Then select VDI and select fixed or dynamically allocated as your wish and create the virtual drive
Note : Mininimum 1 GB required for installation
  • 5.Select Virtual device and select settings, a dialog box appears. In the dialog box select
    i)Storage->Storage Tree->Empty
    ii)In the attributes section select the Android 4.2 iso file you downloaded and check Live Cd/Dvd, then click Ok
Here's how to install Android 4.2.2 Jelly Bean on your PC

  • 6.Then start the virtual device. In the screen select Install Android-x86 to hard disk.
Here's how to install Android 4.2.2 Jelly Bean on your PC

  • 7.In the next screen select Create/Modify Partition.
Here's how to install Android 4.2.2 Jelly Bean on your PC

  • 8.Then create a new primary bootable partition and select write. After finishing writing select quit.
Here's how to install Android 4.2.2 Jelly Bean on your PC

  • 9.Then install android in sda1 and select type as ext3 , choose yes for installing grub.
  • 10.After installing remove live iso from VirtualBox and reboot. Now you can boot into Android 4.2.2.
You are done.
Cheers, enjoy.....
Some of Screenshots

0 comments:

HOW TO KNOW THE IP ADDRESS OF THE SENDER IN GMAIL

    Find IP Address of the Sender in Gmail...!

.
.
.Photo: Find IP Address of the Sender in Gmail...!
.
.
.
1. Log into your Gmail account with your username and password.

2. Open the mail.

3. To display the headers,

* Click on More options corresponding to that thread. You should get a bunch of links.

* Click on Show original

4. You should get headers like this:
Gmail headers : name
Look for Received: from followed by a few hostnames and an IP address between square brackets. In this case, it is 10.182.181.35
That is be the IP address of the sender!

5. Track the IP address of the sender
.
.
.
Note:
.
.
.
When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.

Follow The Admin :- https://www.facebook.com/hackernamit



STEPS:

1. Log into your Gmail account with your username and password.

2. Open the mail.

3. To display the headers,

* Click on More options corresponding to that thread. You should get a bunch of links.

* Click on Show original

4. You should get headers like this:
Gmail headers : name
Look for Received: from followed by a few hostnames and an IP address between square brackets. In this case, it is 10.182.181.35
That is be the IP address of the sender!

5. Track the IP address of the sender.
.
.
.
Note:
When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.

0 comments:

Get Google Adsense Approved Fast - Maximum 2 Hours | 100% Working Tricks

Google adsense is ever best advertising site that really paying good money for publishers. Each and every blogger needs adsense to earn big money. Because Google adsense is one of the genuine paying site, we can earn effectively by publishing ads. But so many of you may not get adsense yet cause of having blocked contents of adsense.

Once Google adsense disapproved your application for your blog, very difficult to get adsense approval for that disapproved blog. Think of hacking google adsense is not possible. But we have the easy way of getting adsense approval using youtube. This trick is working 100 percentage. Getting adsense is easy by uploading videos on youtube and by monetizing them. Google adsense will give more money than other advertising sites.

Let me introduce how to get adsense approval within 2 hours. Follow these 7 simple steps to get google adsense approval fast.

Step 1: Create a new Gmail account and sign in to Youtube 

Step 2: Upload two or three Quality videos of your own creation

Step 3: Video Manager ---> Channel settings ---> Monetization

Step 4: Click on How will I be Paid? --- >  accosiate an adsense account 
Select your adsense account and send application

Step 5: Adsense team will send confirmation email to your gmail inbox. 
It will take upto 2 hours. 
After that sign in to your adsense account --- >  Account settiings

Step 6: Access and Authorization --- >  Sites authorized to show ads --->  edit
Enter your blog url (eg: www.blog.com) then submit.

Step 7: After successfully creating adsense account that link your blog, You will receive email to place ads on your site.
My ads (tab) --- >  Create ads then place ads on your blogs.

Enjoy! This trick is 100% working..

0 comments:

How to Update Windows Without the Internet or Offline

Keeping your operating system up to date doesn’t only save you from security threat that could corrupt your data; it also keeps prying eyes away from your sensitive documents. The Windows Operating system provides the option to automatically update your OS, but you have to be online in order to use this automatic update option. What if you are not online or want to update a friend’s computer but he doesn’t have internet connection?
Microsoft used to provide one very good tool ‘Autopacher‘ as an alternative to Microsoft update. Autopacher was designed to update Windows XP SP3, Windows 2000, and Windows Server but Microsoft has discontinued it in 2007.  Don’t worry; there are still some utilities available to update Windows without an internet connection. Below, I will show you two utilities that you can use to update Windows offline.
WSUS Offline Update: Using this tool you can update any computer / Notebook / Netbook running Microsoft’s Window OS safely, quickly and without any internet connection. You can also update your MS office suite offline with help of this tool. As you can see from screen shot this tool supports Windows XP, Windows Server 2003, Window Vista, Windows Server 2008 and Windows 7.
WSUS-1
Key Features:
  • Support Global / Multilingual update.
  • Option to exclude Service Pack
  • Option to include .NET framework installation while update
  • Can copy selected product / updates to USB drive
  • Option to update Office-suite
WSUS-2
Visit WSUS site to download or alternatively you can directly download from this link.
Windows Update Downloader (WUD): Another alternative to install Microsoft update offline is WUD. WUD allows you to download all current windows update, patches, and fixes using a simple interface. It will give the list of all required updates which you can include / exclude from downloading. Visit Windows update Downloaderpage to download this tool.
wud-1
Microsoft still provides one solution â€˜offline scan file’ to update your Windows Operating System offline. But this is for only advance users. For more details please visit Microsoft support page.
These utility is useful for those people who want to install windows update in more than one PC, Network administrators etc.

0 comments:

HOW TO HACK GMAIL PASSWORD OR ACCOUNT

                            


NOTE: This is for Educational Purpose Only. HACKERBAG is not responsible for any damage done by You.

Learn how to Hack Email accounts read below:

How to Hack Email Account---
Things That you Need for Hacking Gmail Account Password:
1. Gmail Phisher
2. Free Web hosting  Site
3. Little bit of manual Work :P

Introduction to Phishing
If you know little bit of Hacking then Its must for you know About Phishing i.e What is Phishing and how it works and most important How you can protect yourself from getting into the Trap. I will try to explain all of these in my article. 
First of all What are Phish pages and what is phishing?? Phish pages are basically the fake pages or virtual pages that looks similar to the original website Page. The only difference is the batch program running in the background i.e Original Webpage sends requests to Gmail server while Phish Page sends request to hacker's php server. Now Phishing is a password hacking technique commonly used by hackers using phish pages that looks similar to original web page. The only difference is the URL in the address bar so Guys One Important Tip for you all always check the Address bar while going to any website .
Now What is Smart Phishing, Normal phishing page sends the password to hacker but it doesn't redirects the page to original website but smart phishing does. Means victim can never know what really happened and his account is got hacked. He will only think that he has entered the wrong password as in second attempt the web page is original and he will be able to login and the most fantastic thing is that the original redirected page has username already entered in it that makes it even smarter. 
Now lets come to how it works?? When a user types a Username Password in the the text box,The info is sent to "login.php" which acts as a password logger and redirects the page to"LoginFrame2.htm" which shows "There has been a temporary error Please Try Again" in it . So when the person clicks on try again it redirects to the actual URL so that the victim does not know that your site is a fake site and gets his gmail.com password hacked.

 HACKING GMAIL ACCOUNT STEPWISE:

1. First of all download the Gmail Phisher.

2. Extract the rar file now you will get three files as given below:
  •       gmail.html
  •       log.txt
  •       mail.php
3. Upload all the Three files to any of the free Web hosting server. Remember while creating the  account on these servers try the username as nearer as possible to the original URL like mail.gmaile or maile.gmall etc.. As its the most crucial step. Some Free Web hosting servers are given below you can also find few more for yourself.
  • www.yourfreehosting.net
  • www.esmartstart.com
  • www.110mb.com
  • www.drivehq.com
  • www.t35.com
Having trouble in uploading files, learn below step by step how to upload them:


4. Once you have uploaded all the three files to web hosting server now you have to send these to your victim. This is the most important step regarding smart phishing technique.
Most People use same password for orkut and gmail and here is the main hack lies. What you have to do you have to send the HTML email to the victim which looks similar to the Orkut scrap to his email you can easily do this using simple editing to the existing mail. Just you have to change the link with your phish link and content according to the person likings so that he will surely come inside the trap. 
Another technique is that you can send him a request to join a particular community in the format orkut does.
And Last but the most important one Send him mail from Gmail Admin such that "We have seen illegal activity from your account and you need to verify your account and your account is temporarily disabled after this login. To unlock your account Verify your Email and in that link put your Phish link. Now Guys you all will came to know How it works. If you want to Protect yourself its must that you should know what techniques a Hacker can use to hack your Gmail Account.

5. Now After sending phisher to victim, once the user logs in to his Gmail account using your Phisher, his user ID and password are ours..And these are stored in log.txt What you have to do is just refresh your Web hosting account files. 


6. The Log.txt file will contain the passwords and look like this:


Thats all Now you have hacked the password of victim. I hope you all have Liked It. 

0 comments:

How to Lock your Windows PC or Laptop with USB


  • In order to use lock your computer you need to get a software tool "Predator"Professional Edition here[official link] and Free Edition from Here[official link]
    Choose the best suitable one depending on your operating system bit.
  • After Downloading after Predator. Connect the USB Drive that you want to use as key to your computer.
  • And then run the predator installation.
  • Before continuing installation. A popup will ask you to create the new password, Enter your desired password and then hit on Ok to continue.
predaytor
  • Now predator will present you a box with preference settings.
predaytor+2
  • You can change settings as per your need and you can add the USB drive by selecting the drive under Flash Drive settings and hit on create key to generate a key on the usb which will be used by the predator to monitor.
  • When Predator is running on your computer you can see the predator icon in the taskbar as shown in below image.
predatro+3
And Predator offers one month free trail of the Professional edition which include sending of twitter messages to you and many more features.

0 comments:

HOW TO UNROOT ANY ANDROID PHONE EASILY

Method 1


1) First of all download and install ES File Explorer App from the Play store.
2)After installing it, Open ES File Explorer App.
3)Now go to Options > settings > Enable "Root Explorer" > Enable "Mount File System"
4.)Now go back to app Home screen and tap on Favorite (place at the top of the screen) and then tap on "/"
5)Now go to System > Bin > Delete "su" (don't worry if you didn't find su file here in your device).
6)Get back to System > Xbin > Delete "su" ( If you didn't find su file Bin you will get it here or in some device it may be placed at both places just delete it)
7)Now again go back to System > App > Delete "SuperUser" apk.
8)Now just reboot your device and you have Unrooted successfully !!


Method 2




Universal Unroot method is the same as its name it unroots any android device with in a Click.Universal Unroot is root access removal apps which helps you to unroot any device.You have to DOWNLOAD it and click on Un-root button and you are done.Currently Universal Unroot supports x86, ARM and MIPS based device only.Universal Unroot .

0 comments:

HOW TO RECOVER DELETED FILES FROM USB,PENDRIVE,MEMORY CARD

If you accidentally deleted any files from your memory storage device or if you if it get formatted without your notice. To get back those files you can simple follow the below Tutorial. Don’t overwrite any files into the memory storage device so that you can have more possibility of getting file back.

DOWNLOAD SOFTWARE-- http://sh.st/coyJ  (after clicking this link u will see a page... press skip ad button on top right corner after 5 sec on that page .. to go to main page...)

STEPS---

1.  Download Recuva from the above given link and install it. It’s a free application and you can run on all latest versions of Windows operating system including Windows 8.

2. Open RECUVA and it will ask for permission click YES and you will something like the below screen shot click NEXT.

3. Select the type of file you want to extract from the given list. I suggest you to select ALL FILES so that you can check all the restored files at once. So Select ALL FILES and click on NEXT.

4. Now you have to select the storage device or drive from which you want to restore the files click on the last option and select you memory card / USB drive / Pen Drive and any of your hard disk drive to scan it by browsing. After selecting it click again on NEXT.

5. Enable Deep Scan and Select NEXT. It will take some time to scan the whole memory

6. After scanning it will display the whole list of recovered files from the memory. Select the files that you want to restore and click on RESTORE. Select the location to where you want your files to get restore and your files will get successfully restored.


NOTE:  You can only restore the files with green indications as they are not over written. The chances of restoring the other files is not always possible.

0 comments:

HOW TO HACK FACEBOOK PASSWORD



For this technique you need to create 3 fake Facebook account and you need to surely add these as friends into your victims account whose account you are going to hack.girls fake account add by boys easily.
Now follow the below steps :

1. Go to Facebook and click Forgot your Password ?


2. Than you will get something like below just enter the details you know about him enter his Username, email address and full name.
2. Than you will get something like below just enter the details you know about him enter his Username, email address and full name.




3. After entering everything check it again and click on search.


4. After succeful search for the user Facebook will show some information about how many emails are linked to the account and there is simple option saying 
No Longer Access to These click that one.

5. Now it will promote you to enter a new email address on which you will get the password resetting option so enter your email address I suggest you creating a Fake or Temporary email address for safety purpose.

6. Than it will promote you to enter the Security well if you have some security guess about that one than that’s ok but if you don’t know it than simply enter 3 wrong answers and it will take you to the 3 trusted friends recovery page like below.

7. Now just click continue and facebook will ask you to choose 3 trusted friends choose the 3 fake profiles of your which you created and added into the victims account. 
8. After selecting 3 accounts facebook will send security codes to these accounts just enter these codes and you will get Password Resetting email from Facebook on the account you created in Step 5
That’s it now you are successful in Hacking Facebook Password with the 3 Trusted Friends Method.

Note: This trick only works if 3 trusted friends agree to give you the security code so its really important that you add your 3 fake accounts into your victims facebook account as a friend.

That’s it now you are successful in Hacking Facebook Password with the 3 Trusted Friends Method.








0 comments:

HOW TO SEE WHO UNFRIEND YOU ON FACEBOOK

FACEBOOK IS THE LARGEST SOCIAL NETWORKING GIANT...AND MILLIONS OF PEOPLE ARE CONNECTED TO IT.....DAILY MILLIONS OF USER JOIN FACEBOOK...AND SO FOR SECURITY REASONS IT ALSO HAVE SOME RESTRICTIONS...AND ONE OF THEM IS THAT PEOPLE CANT SEE THE PERSON WHO UNFRIENDED HIM OR HER....

BUT NOW IT IS POSSIBLE TO SEE WHO UNFRIENDED YOU ON FACEBOOK....

SO HOW TO CHECK IT WHO UNFRIEND YOU ... BELOW IS THE WORKING SOLUTION OF HOW TO DO IT...

STEPS----(FOR GOOGLE CHROME)

1.FIRST  DOWNLOAD THIS SOFTWARE FROM BELOW.
    DOWNLOAD LINK---  http://sh.st/1mFM  (after clicking this link u will see a page... press skip ad button on top right corner after 5 sec on that page .. to go to main page...)

2.NOW DOWNLOAD AND INSTALL IT...IF U LOGGED IN THEN PLEASE LOGOUT OF FACEBOOK...AND LOGIN AGAIN AFTER INSTALLING THE SOFTWARE...SEE IN PICTURE BELOW HOW IT WILL LOOK...


3.TWO ARROWS IN THE ABOVE PICTURE SHOWS YOU WHO UNFRIENDED YOU...YOU WILL ALSO GET A NOTIFICATION WHEN SOMEONE WILL UNFRIEND YOU.


4.YOU CAN ALSO SEE IGNORED FRIEND REQUESTS BY OTHER PERSON AND YOUR PENDING REQUESTS.SEE ABOVE PICTURE.

DONE,ENJOY FACEBOOKING....

DONT FORGET TO SHARE AND BOOKMARK THIS SITE FOR  AMAZING UPCOMING TRICKS.

FOR ANY PROBLEM COMMENT IN THE COMMENT SECTION.

0 comments:

Cheap Desktop Computers Are Great For Families


 The average home computer user needs three characteristics in a machine: Reliability, simplicity and affordability. The vast majority of consumers do not require the sort of processor strength which can strip the color off the walls, nor graphics capabilities which make real life look faded and dull in contrast. As a result, a cheap desktop computer is ideal.

Trustworthiness is a requirement for a family pc because a surprisingly amount of users do not back up data. Issues seems excessive to go to your time and effort of purchasing a couple of terabytes of hard disk space, usually spending at least a couple of hundred pounds, and then virtually never use it except for the occasional time when your computer’s internal hard drive fails and cannot be recovered. However, the benefit of backing-up vastly outweighs the cost. Losing years worth of vital documents, cherished photographs, stored songs and endless other details are a very galling experience. You suddenly realise that you never effectively appreciated certain things on your computer right up until they vanish.

A cheap pc, which uses cheap components, will never be since reliable, in this regard, as a more costly model. Even cheap desktop computers are better than laptops for reliability, though, for your simple fact that they are put under less strain. The components may be bigger and better spaced and also the fans are generally more efficient and also effective, reducing the risk of getting too hot. More importantly, from a family computer perspective, it is virtually impossible to be able to accidentally drop a desktop computer or knock it off the table.

Also from a family viewpoint, the sheer size of the desktop computer makes them excellent for using along with small children. Proper supervision is far simpler to achieve if the personal computer cannot be carried off to one more room.

The simplicity of a computer does depend on the operating system with regards to actual usage and a desktop computer does add a little bit of complication simply because each of the external components – the monitor, mouse, keyboard, inkjet printer, etc. – needs to be ” cable ” into the central processing device. This, however, is generally quite simple to achieve and is just a case of matching the connects to the holes.

Desktop computers are not the least expensive machines available. Netbooks have been expressly designed, as the title suggests, to be a cheap method of getting web they are generally extremely portable. However, they are also extremely limited within their capability, making the purchase of such a pc effectively a waste of money. Aside from the internet, there is no other process they can handle. A desktop, on the other hand, is a good middle soil – a jack of all trades.For a family, cheap desktop computers fulfil all computer needs, including simplicity, affordability and reliability.
 

0 comments:

Three PPC Tips to Improve Ad Campaigns


 
 The world of pay per click marketing is a lot different than other offline and online advertising methods. By using pay per click marketing you are actually “paying per click”. Now think about it… how easy is it for you to click on a search engine listing or even a banner ad? Your simple click may be nothing to you, but it is costing someone else money. That is the mentality you need to have when creating your ad campaigns, so you can understand how important it is to create a winning campaign that targets the right audience. Let’s cover a few of the basics that you must understand and implement to create a winning pay per click campaign. Targeting the Right Audience Just like having a store on a busy street, only interested customers will come inside. The difference between having an offline business and an online business, is that you can actually target your audience directly. How many wasted eye balls are looking at billboards and television commercials that are being shown to a general audience? Make sure you online ad campaign isn’t built the same way. As search engines and social networks continue to improve their technology and ad serving, more options are becoming available for targeting your ads. Search engine advertising through Google, Yahoo and Bing will allow you to create ad campaigns that target to specific countries, web sites and even allow you to do day parting, which allows you to start and stop your ad campaign during different times of the day. Social networking sites like Facebook, have an even more advanced ad tracking system that allows you to target your audience based on full demographics, location and even interests. When creating a new pay per click campaign, make sure you take the time to build your campaigns around difference audiences and not just have your advertising showing to a broad audience. Landing Page that Converts You landing page is the life line of your ad campaign. You can target the best traffic in the world, but if you are sending them to a landing page that is a disaster, your results will be the same. It’s extremely important for you to split test your landing page and continually make changes to see what improves your over all conversions. It’s also important to make sure that your landing page generates a high Quality Score, or you will end up paying more per click than other higher quality advertisers with better landing pages. The best way to build your landing pages is to build around your audience. As I mentioned earlier in the targeting section, you want to build ad campaigns that target to small groups, such as women versus men. Make sure you do the same thing with your landing pages. Will a male click on the same advertisement a woman clicks on? This is the type of testing you will need to track. Study Your Competition As the search engines and ad tracking systems continue to evolve, so will the tools we use for building and tracking ad campaigns. With that said, you can now “spy” on your competition and see how their campaigns are being built and what ad copy they are using. You won’t be able to see the specifics of their ad campaigns, but you will be able to get enough information to get an idea of what is working. It is not recommended that you copy these campaigns, as there is a lot of back end data you will not see. Instead of using services that provide this information, use them as a resource and as inspiration for new ad campaigns. Going Live With Your New PPC Campaign Now that you have a few tips for improving your next pay per click campaign, make sure you take the time to implement them. It’s way too easy to throw up an ad campaign and just hope for the best. The difference between finding success in online marketing and not, is the ability to stay driven and continually focus on improving your existing ad campaigns.

0 comments:

loading...