Hack, Tips & Tricks
How to backup your Whatsapp Messages with SMS Backup+
The waiting is no more for Android Whatsapp users, the developers has provided a solution to backup your whatsapp messages directly to your gmail, This application is non other than SMS Backup+. We have already done a tutorial on basic SMS Backup+ functions How to backup SMS & Call log on your Android. For this tutorial i’m [...]
How to Restrict Android App Permissions
Android forces you to agree to every permission an app wants, assuming you want to use the app. After rooting your device, you can manage permissions on a per-app basis. Restricting permissions allows you to protect your contacts and other private data from apps that demand access you’d rather not allow. Many apps will continue working [...]
Rooting an Android device [How-to & Why]
You’d have probably heard from people who’re “rooting” their Android phones. If you’ve ever wondered how to do that by yourself – or wondered why people would bother to do so – you’re in luck. You can root your Android in just a few minutes. After rooting your device, you have full access to the entire system [...]
Control your Android device from a Web browser with Airdroid
Airdroid is an awesome application where you can control your android device within a web browser simply. With airdroid you can take over most functions of the device but not only file sharing; you can also manage applications, read/write SMS and many more… I will give you simple guide on how you can utilize this application [...]
Session Hijacking made easy – Android
Session Hijacking also known as a Sidejacking, is an attack stealing someones web session to gain unauthorized access. What is a web (HTTP) session Each & every time a user log into Facebook, Twitter or your banking account… etc, the web server will give the user a session ID or a token while the web browser stores [...]
What is Spyware – Explained
Spyware is a type of software intended to collect information from computers without permission of the user and then send that stolen information over the Internet to the spyware designer. The type of information collected varies greatly.