Although Android is an operating system designed for mobile devices, the system and it’s app ecosystem make for a very comfortable working environment even on desktop. Here, I explain how to install Android on a PC.
Note:- You need to install this Android OS either into a USB or a blank CD, and then you have to boot from it.
How to Install Android OS in PC?
Download any Android OS first as per your need from above Links.
Connect the USB stick to your computer
Open the program Rufus. It will detect the connected USB drive.
In the dialog box, choose “ISO Image” and press the next button to find the picture in the folder just decompress.
Now click on ‘Start’ to flash Android OS into the USB Stick.
Once you’ve finished, restart your computer, enter into the BIOS or UEFI and choose to boot from USB memory.
After installing in USB drive to boot from it restart your pc and enter into BIOS (press F8) in usuall case and boot from your USB Drive.
There is a wide range of Android emulators for PC, but OS Remix Player is the best, as the others tend to use older versions of Android like Lollipop and KitKat. Popular emulators include BlueStacks, Andy, Droid4x and Koplayer. For Linux, you can use shashlik, which is still under development.
As this is a trial version, so you can not export it as a word document unless a license key. But I will show you a trick with which you can export it as a word document.
2. Open and run “Quick PDF Converter Suit “ application after installing.
3. Enter any name and any email-id you want and hit Finish
4. Click on “Evaluate button” and open your PDF file you want to convert.
5. Select “Convert PDF” to open your PDF file.
6. After opening PDF file click on “Edit in Word” button at “Top left corner”
7. Now keep this open in background and press (Windows + D) button to return to desktop
8. Navigate to (C:\Program Data\QuickPDFSuite\Temp) folder and you can find your PDF file converted to a word file.
9. Quickly Copy it to a different location as it is visible until the software runs in background as it is a temporary file.
NOTE:– In case Program Data Folder is not visible in your PC, it might be hidden. To unhide it navigate to My Computer, press “Alt” key and go to Tools>Folder Options>View> and under Advanced Settings>Files and Folders> Hidden files and folders click on Show hidden files, folders, and drives. Click OK to save it.
Also WPS PDF to Word Converter is a brand new tool (Pricing $30) from the developer behind our favorite free office software, WPS Office. It’s awesome tool for converting PDF to Word.
Ever wanted to build your own Video Game? Or had an prebuilt awesome game story brewing in your mind since years? then you can make that idea come to life, no game development experience needed. Now a days, anyone can build their own video games, either for PC, Xbox, Ps4, Android OR for any platform.
Now everyone can make professional video games even with no coding skills. With professional game development tools already in the market, Game making has become a lot easier.
Below i have listed some of the Game Development Tools (Game Engines) which can help you to make Professional 2D & 3D Video Games.
1. Unreal Engine 4
Platforms: Android, HTMl5, iOS, Linux, Mac, Oculus, PC, PS4, SteamOS, Xbox One and more
Supports: 2D & 3D
Website: Unrealengine 4
From all of the Game engines Unreal Engine 4 is the most professional. Fully loaded with next-generation features. It’s system let’s you create game logic without typing any code (No Code Necessary) even complex one.
As a free user, you get access to entire engine. Once you earn more than $3,000 in a quarter, you pay 5% royalty to UE4 on gross revenue beyond threshold. You only have to pay when your game succeeds, and that too only 5%.
Platforms: Android, iOS, PC, PS3, PS4, Xbox 360, Windows and more
Supports:2D & 3D
I personally use CryEngine, it is one of the most powerful game engines available to developers. Also you can make First person shooter games, right from as a beginner.
CryEngine provides Advance features like shading,geometry cache and image-based lighting and helps you to create a complex game with most simplicity. With lots of tutorials available on youtube anyone can learn using engine within a day.
Developers can sign up to use the CryEngine for $10 per month, royalty-free.
Platforms: Android, BlackBerry, iOS, Linux, Mac, PS3, PS4, Xbox 360, Windows and more
Supports: 2D & 3D
Basically Unity is an 3D engine, but eventually added official 2D support. Although it is capable of creating 2D games, but is actually tacked onto its core 3D system so it adds unnecessary bloat to 2D games.
To make most out of Unity you require c# programming. So basic coding is required to make complex games using Unity. It’s free version has no engine restrictions and can be used royalty-free as long as your revenue stay under $100,000 per year.
4. Construct 2
Platforms: Android, iOS, Windows, Mac, Linux, HTML5, Facebook and more
Construct 2 is the good option if you have never written a code in your life. This Game Development tool is completely GUI driven, means everything is drag-and-drop. Unfortunately coding is not available even if you want to write.
Plus the only 2 down sides of construct 2 i found are, Cannot create 3D games and you can not write a code even if you want to. It’s Free version has all core features but limited to 100 events, and Personal license is $130 and lifts all restrictions.
5. Game Maker: Studio
Platforms: Android, Mac, Ubuntu, iOS, HTML5 and more
Website: Game Maker
Like Construct 2, Game Maker Studio allows you to create your games with simple Drag-and-drop features. Also you can code in C like language if you want in Gm:S.
The free version can be used indefinitely, while it’s professional versions range between $150 to $800, unlocking more modules and features with increase in price.
Insert a Blank CD/DVD or USb drive in your PC/Laptop.
Launch the ISO2Disc program. Click on Browse button and locate the PCUnlocker ISO image (pcunlocker.iso), then click on Start Burn to make a PCUnlocker Live CD.
Once your Live CD is ready, remove it and insert it into your Locked PC/Laptop.
After inserting when you see “Press any key to boot from CD or DVD…” Press any key.
Once CD/DVD is loaded, it would show PC unlocker utility.
If you want to remove password, then select password protected account and click on “Reset Password” button, remove the CD and restart the PC. Your password would be removed.
Now, If you just want to Bypass the password, click on the Options button and then select Bypass Windows Password from the drop-down list.
When you come to the Windows login screen, simply type anything in the password box and you’re in! The next time you start the computer, the original password will be back, the temporary changes will be discarded and the system will behave as if nothing has happened.
Now if you want then you can also burn PCUnlocker.iso into a USB Drive/Pendrive using Rufus Tool.
With PCUnlocker you can quickly bypass local/Microsoft account passwords on Windows 10, 8.1, 8, 7, Vista, XP and Windows Server 2012/2008/2003 (both 32-bit and 64-bit). No need to recover or reset the password at all when your Windows password is lost or forgotten.
Staying anonymous online is not an easy task. Being anonymous has its benefits. Certain freedoms come with being unrecognizable and untraceable. Also one feels safe making Online payments and using social media websites.
Here’s my best guess at what it would take to remain anonymous online.
1. TOR browser (The Onion Router)
Anonymity is incomplete without Tor browser. Tor browser encrypts your internet traffic and routes that traffic through random array of Tor nodes before heading to final destination. Tor can be used from many devices. Tor browser can be directly installed in Mac or Pc and for Android devices Orbot app is available.
2. Live OS (Plug and Play)
To remain Anonymous, Windows is really a bad option. In windows using TOR Browser you can easily remain anonymous, but windows has multiple applications running in background such as Word processor,Video Players, Update Managers,etc. that can trace you back. So using windows is not a good option. Instead use Live OS such as Tails or Whonix.
Tails is the official Live OS from Tor Project. All internet traffic (including every apps) goes through Tor network. The OS is plug and play, that means you can install it into a USB drive or a blank CD and directly boot from it. This OS leaves no trace on your Computer as every thing is encrypted.
Whonix isn’t a plug and play OS. That means you can not run it from USB Drive or a CD. Instead you can use it from virtual machine on your existing operating system. It has all advantages of tails plus it has IP address leaks protection so it is impossible to track users. The only downside of using Whonix is that it takes a reasonably powerful computer to run a virtual machine.
There are many alternatives to Tails and whonix which are worth considering, like, Kali Linux,Qubes and ZeusGuard.
3. VPN (Virtual Private Network)
VPN’s are built for privacy and not for anonymity. Privacy and anonymity often go hand in hand. Anonymity means no one can identify you, but privacy implies no one can see what you’re doing.
VPN encrypts all of your device’s internet traffic and routes it through an Complicated server from a different location. Using VPN you have the power to change your country (Location). That means if you are in India and in VPN you select China, then all your internet traffic would route through China’s server. So no one can trace you.
There are lots of VPN provider tools over internet. But many store logs, that means whatever you search, woud be stored on their servers. That’s the reason i highly recommend for using logless VPN providers. Also DNS protection VPN should be used. So each and every internet data would route through VPN.
4. Search Engines (Avoid Google)
Google keeps track of your location and othe information everytime you search query. As you use Tor it doesn’t matter so much, but it is still a good idea to use an alternative.
DuckDuckGo is best and safe search engine that doesn’t track user’s profile. But the results won’t be as good as google. If so, then you can use StartPage, which removes all identity information and then submit search query to google.
5. DNS Leak Test (Final Anonymity Check)
Last but not the Least. DNS Leak test help you to check your anonymity. Go to your search engine and type “DNS Leak Test”. Open any link and you would be provided with your Location Info, IP address and other infos. If the location and IP address shown is different from your current, that means you are anonymous and untracable.
This is for Educational Purpose only. I’m not responsible if you get into any Legal Trouble using this Trick.
By using Phishing and key loggers tricks thousands of Facebook accounts are hacked every hour. I’m not going to talk about those tricks. If you want there are plenty on Google for hacking Facebook with phishing and key logger, infect today I will show the use of Dictionary and brute force attack for hacking Facebook using a tool “Qraken”.
NOTE: – This Password List (44Mb) is the list of passwords Stolen from different websites by hackers. This list does not guarantee that it would match with your victim’s password. So better make your own password list by guessing or collecting more info about your victim.
How it works?
Daanrack has made an outstanding work by making a tool “Qraken”. This tool makes Dictionary attack on Facebook. All you need is a long list of passwords, proxy list and email ID of victim.
After you try 100 password (guessing) one by one on your victim’s account, Facebook will block you immediately. That’s the reason of using proxy list, so you won’t get blocked and could also be untraceable. There are many websites who are selling Passwords list of users from different accounts. There are millions and trillions of passwords. You can’t try all…huh. So you first need to make a password list for your victim. You can guess as many passwords of your victim and make your own passwords list. If any password matches with victim’s account you get access.
Tip:-This trick needs a good stable Internet connection and a high performance Video card.
Right Now this tool supports only Facebook module but Instagram and Twitter modules will be added soon.
Run the Qraken Tool (as an administrator).
Select a Module (Facebook) and click Start.
Import Proxies and passwords one by one.
If you have Better Video card (Graphics) then increase thread to 2 or 3.
Enter your Victim’s email ID and click on start.
If you’re Passwords List matches with Victim’s password you get access to his/her account.
If your password list does not match with victim’s password, then don’t worry there are millions of passwords list on internet. Go and buy some yourself. Or else you can make your own passwords list by guessing.
Tracking and tracing are the process of monitoring the local status of our victims in transit. So, today I’m going to show the exact steps necessary to trace anyone. It can be your best friend, your girl friend or even one among your family members, you want to trace down.
Okay no more lollygag, let’s get to work.
How to trace anyone? (Through Whatsapp, Facebook, Instagram, etc…)
To get their location info (Latitude & Longitude) (See above Image)
Step 7: Now as you have Latitude & Longitude of the person paste it to Google Maps and you will get the exact Location of that person, his exact Latitude & Longitude, his exact address……
This trick will work like a charm, specially if he/she is a PC user. For android user it is little difficult to track as their IP Address keeps on changing when their SIM provider changes on same DNS server.
So, you want to hack Facebook, Gmail, Yahoo, etc. with Phishing method. Then Superphisher will help you in making those fake pages. It�s GUI Interference makes the work lot more easier in making fake pages. So, today I will show you an easy GUI way to make Fake page of Facebook or any website.
3. Enter Facebook URL or any Site as per your requirement.
4. Click on Build Phisher to make fake page of that site.
5. Fake pages can be found in output folder.
6. That’s it fake page of Facebook is ready.
7. Now use any Webhost to upload those fake pages to trap your victim.
Once Fake pages are ready we can use lots of tricks to trap victim.
Android users can use Faceniff, Pc users can use Desktop Phishing, Advanced users can use Holmography phising and hackers can use URL Tapping Phising method to hack user’s credentials.
Now days, it is not easy to upload fake pages to webhost for Phishing because of Strong Security. So you can use Desktop Phishing, in that u can use your pc as a webhost and upload fake pages to your own PC and then share link to your victim.
5. Now when ever victim Opens this trojan his/her IP Address would be mailed to your Email-ID you mentioned.
6. Copy the IP Address, Open any Webbrowser and type the IP Address. It will open your victim’s PC. Now u have full access to victim’s computer.
In Real time attackers use this tool in the target machine, create a server in that machine and execute it. By doing so they obtain all the data and information (Hardware or Software) they want from the target machine.
There are lots of tools like Http rat. Some of the most popular are, Mosucker, Njrat, Prorat, Theef and Atelier Web Remote Commander. Keep Following for more cool stuff.