-->

ABOUT US

Our development agency is committed to providing you the best service.

OUR TEAM

The awesome people behind our brand ... and their life motto.

  • Kumar Atul Jaiswal

    Ethical Hacker

    Hacking is a Speed of Innovation And Technology with Romance.

  • Kumar Atul Jaiswal

    CEO Of Hacking Truth

    Loopholes are every major Security,Just need to Understand it well.

  • Kumar Atul Jaiswal

    Web Developer

    Techonology is the best way to Change Everything, like Mindset Goal.

OUR SKILLS

We pride ourselves with strong, flexible and top notch skills.

Marketing

Development 90%
Design 80%
Marketing 70%

Websites

Development 90%
Design 80%
Marketing 70%

PR

Development 90%
Design 80%
Marketing 70%

ACHIEVEMENTS

We help our clients integrate, analyze, and use their data to improve their business.

150

GREAT PROJECTS

300

HAPPY CLIENTS

650

COFFEES DRUNK

1568

FACEBOOK LIKES

STRATEGY & CREATIVITY

Phasellus iaculis dolor nec urna nullam. Vivamus mattis blandit porttitor nullam.

PORTFOLIO

We pride ourselves on bringing a fresh perspective and effective marketing to each project.

Showing posts with label Allahabad News. Show all posts
Showing posts with label Allahabad News. Show all posts
  • What is a thing which cannot be hacked?

      

    What is a thing which cannot be hacked? by hackingtruth.in or kumaratuljaiswal.in


    which cannot be hacked


     

    "In simple words, All things that are not connected to the internet cannot be hacked. "


    otherwise, Yes, there are many very small systems that cannot be hacked.

    Hacking a system is like robbing a bank. If the bank is a 1 inch by 1 inch solid steel box, and is kept inside my pocket, it really can’t be hacked.

    The larger the system, the more possibilities for it to have a flaw/vulnerability that can be exploited, resulting in a hack.

    However, today computer and digital systems are very complex. Even if you have a perfect cryptographic system (e.g. AES) or even if you have a theoretically proven flawless algorithm (Google NaCl), then you still have to run these pieces of code on an operating system and a sizable hardware, both of which are susceptible to attacks. What is a thing which cannot be hacked?



    For example, did you know that all cryptography can become futile, if you can measure the power usage of the hardware? Because then you can tell how exactly is the algorithm running, and extract the secrets from it. These attacks are called side-channel attacks.




     

    EVM Voting In India

     

    EVM(Electronic Voting Machines) which are used many country to contest their elections. Even in India EVMs are used to contest the election. The EVMs can't be hacked as they aren't connected to any other devices or network. No internet, no Bluetooth, nothing. Many a times many political parties have questioned the authenticity of the EVM but none of them were present when the election commission of India called them to hack the EVM. Any device can only be hacked if it's connected to any network or to some other device. instashell



    Electronic Voting is the standard means of conducting elections using Electronic Voting Machines, sometimes called "EVMs" in India.[1][2] The use of EVMs and electronic voting was developed and tested by the state-owned Electronics Corporation of India and Bharat Electronics in the 1990s. They were introduced in Indian elections between 1998 and 2001, in a phased manner. The electronic voting machines have been used in all general and state assembly elections of India since 2004.



    Disclaimer



    This was written for educational purpose and pentest only.
    The author will not be responsible for any damage ..!
    The author of this tool is not responsible for any misuse of the information.
    You will not misuse the information to gain unauthorized access.
    This information shall only be used to expand knowledge and not for causing  malicious or damaging attacks. Performing any hacks without written permission is illegal ..!


    All video’s and tutorials are for informational and educational purposes only. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. We believe that it is impossible to defend yourself from hackers without knowing how hacking is done. The tutorials and videos provided on www.hackingtruth.in is only for those who are interested to learn about Ethical Hacking, Security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used.


    All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.



    - Hacking Truth by Kumar Atul Jaiswal



    I hope you liked this post, then you should not forget to share this post at all.
    Thank you so much :-)

     


  • Anonymous Hackers Directly Target TikTok: ‘Delete This Chinese Spyware Now’


    Anonymous Hackers Directly Target TikTok: ‘Delete This Chinese Spyware Now’




    This has been a week that TikTok—the Chinese viral video giant that has soared under lockdown—will want to put quickly behind it. The ByteDance-owned platform was under fire anyway, over allegations of data mishandling and censorship, but then a beta version of Apple’s iOS 14 caught the app secretly accessing users’ clipboards and a backlash immediately followed.



    Whether India had always planned to announce its ban on TikTok, along with 58 other Chinese apps, on June 29, or was prompted by the viral response to the iOS security issue is not known. But, as things stand, TikTok has been pulled from the App Store and Play Store in India, its largest market, and has seen similar protests from users in other major markets around the world, including the U.S.Anonymous Hackers Directly Target TikTok: ‘Delete This Chinese Spyware Now’

    One of the more unusual groups campaigning against TikTok is the newly awakened Anonymous hactivist group. As ever with Anonymous, it’s difficult to attribute anything to the non-existent central core of this loosely affiliated hacker collective, but one of the better followed Twitter accounts ostensibly linked to the group has been mounting a fierce campaign against TikTok for several weeks, one that has now gained prominence given the events of the last few days.



    “Delete TikTok now,” the account tweeted today, July 1, “if you know someone that is using it, explain to them that it is essentially malware operated by the Chinese government running a massive spying operation.”









    The account linked to a story that has been doing the rounds in recent days, following a Reddit post from an engineer who claimed to have “reverse engineered” TikTok to find a litany of security and privacy abuses. There has been no confirmation yet as to the veracity of these allegations, and TikTok did not provide any comment on the claims when I approached them.




    The original issue that prompted Anonymous to target TikTok appears to be the “misrepresentation” of Anonymous on TikTok itself, with the setting up of an account. “Anonymous has no TikTok account,” the same Twitter account tweeted on June 6, “that is an App created as spyware by the Chinese government.”



    Those affiliated with Anonymous take exception to copycat accounts, which is complicated by the lack of any central function. In the aftermath of the Minneapolis Police story, someone affiliated with the group took exception to a Twitter account that was monetising the brand, telling me: “We do not appreciate false flag impersonations. There will be consequences.”



    See also




    This has now become an interesting collision of two completely different viral stories in their own right. Anonymous hit the headlines a month ago, when the “group” seemed to mount a comeback in the wake of the killing of George Floyd. A video posted on Facebook threatened to “expose the many crimes” of the Minneapolis Police unless the officers responsible were held to account.



    There have been various stories since then, with reports of DDoS attacks on police service websites, the hacking of data and even the compromise of radio systems. But, as ever, with Anonymous, it is always critical to remember that you are seeing that loose affiliation of like-minded individuals, with Anonymous used as a rallying cry and an umbrella for claims and counter-claims. Attribution, as such, is not possible.



    This also puts TikTok in the somewhat unique position of having united various governments, including the U.S., and Anonymous behind the same cause.


    For TikTok, whether there is any hacking risk following these social media posts we will have to wait and see. Again, you have to remember the way this works. A rallying call has gone out to like-minded hacking communities worldwide. A target has been named and shamed. It would not be a surprise if claims of hacks or DDoS website attacks followed. That’s the patten now.



    So, why does this matter? Well, it’s one thing for the U.S. government or even the Indian government to warn hundreds of millions of users about the dangers of TikTok, but various celebrities and influencers have also been swayed by the latest claims and have publicly expressed their concerns. Anonymous is a viral movement that is targeting some of the same user base that has driven TikTok’s growth. It is campaigning against TikTok, and that campaign will drive its own viral message.



    And while until now that user base has remained steadfastly resilient to any of those warnings, sticking with the video sharing app in droves, you can start to get the feeling now that come of this might stick. It’s subtle, and it’s always risky to judge the world by the twitter-sphere, but there’s a change now in the wind.



    Credit : Forbes


    Disclaimer for Hacking Truth


    If you require any more information or have any questions about our site's disclaimer, please feel free to contact us by email at kumaratuljaiswal222@gmail.com

     

    Disclaimers for Hacking Truth


    All the information on this website - https://www.kumaratuljaiswal.in/ - is published in good faith and for general information purpose only. Hacking Truth does not make any warranties about the completeness, reliability and accuracy of this information. Any action you take upon the information you find on this website (Hacking Truth), is strictly at your own risk. Hacking Truth will not be liable for any losses and/or damages in connection with the use of our website.


    From our website, you can visit other websites by following hyperlinks to such external sites. While we strive to provide only quality links to useful and ethical websites, we have no control over the content and nature of these sites. These links to other websites do not imply a recommendation for all the content found on these sites. Site owners and content may change without notice and may occur before we have the opportunity to remove a link which may have gone 'bad'.
    Please be also aware that when you leave our website, other sites may have different privacy policies and terms which are beyond our control. Please be sure to check the Privacy Policies of these sites as well as their "Terms of Service" before engaging in any business or uploading any information.

     

    Consent


    By using our website, you hereby consent to our disclaimer and agree to its terms.

    Update


    Should we update, amend or make any changes to this document, those changes will be prominently posted here.




    I hope you liked this post, then you should not forget to share this post at all.
    Thank you so much :-)



  • Digital strike on 59 Chinese apps including TikTok, UC Browser, India banned



    Digital strike on 59 Chinese apps including TikTok, UC Browser, India banned




    Complete list of Chinese apps banned by Indian government: TikTok ,, India has banned 59 Chinese apps including UC browser. Let us know that the government has banned these Chinese apps under the IT Act 2000.



    A big decision has been taken amidst the deadlock on the border with China. 59 Chinese apps have been banned in India. Among the apps that have been banned are TicketLock, UC Browser, Share It etc. Apart from these, Hello, Like, Cam Scanner, Sheen Kwai have also been banned. Baidu Map, KY, DU Battery Scanner has also been banned. Let us know that the government has banned these Chinese apps under the IT Act 2000. Digital strike on 59 Chinese apps including TikTok, UC Browser, India banned



    Earlier, Indian security agencies had prepared a list of Chinese apps and appealed to the central government to ban them or people should be asked to immediately remove them from their mobiles. The reasoning behind this was that China could hack Indian data.



    At the same time, 20 soldiers of India were martyred in the recent violent clash with the Chinese army in the Galvan Valley of Ladakh. Since then, there was anger among the people of India about all the apps including China and its products. Prime Minister Narendra Modi also appealed to the people to become a self-reliant India.



    However, the decision to ban these 59 apps from China has been taken at a time when the third round of core commander level meeting between the two countries is going to be held in Ladakh. The special thing is that this meeting is being held on the call of India this time. Earlier, both the meetings were held at the invitation of China.





    FULL LIST OF CHINESE APPS BANNED BY GOVT:
    1. TikTok
    2. Shareit
    3. Kwai
    4. UC Browser
    5. Baidu map
    6. Shein
    7. Clash of Kings
    8. DU battery saver
    9. Helo
    10. Likee
    11. YouCam makeup
    12. Mi Community
    13. CM Browers
    14. Virus Cleaner
    15. APUS Browser
    16. ROMWE
    17. Club Factory
    18. Newsdog
    19. Beutry Plus
    20. WeChat
    21. UC News
    22. QQ Mail
    23. Weibo
    24. Xender
    25. QQ Music
    26. QQ Newsfeed
    27. Bigo Live
    28. SelfieCity
    29. Mail Master
    30. Parallel Space 31. Mi Video Call – Xiaomi
    32. WeSync
    33. ES File Explorer
    34. Viva Video – QU Video Inc
    35. Meitu
    36. Vigo Video
    37. New Video Status
    38. DU Recorder
    39. Vault- Hide
    40. Cache Cleaner DU App studio
    41. DU Cleaner
    42. DU Browser
    43. Hago Play With New Friends
    44. Cam Scanner
    45. Clean Master – Cheetah Mobile
    46. Wonder Camera
    47. Photo Wonder
    48. QQ Player
    49. We Meet
    50. Sweet Selfie
    51. Baidu Translate
    52. Vmate
    53. QQ International
    54. QQ Security Center
    55. QQ Launcher
    56. U Video
    57. V fly Status Video
    58. Mobile Legends
    59. DU Privacy




    I hope you liked this post, then you should not forget to share this post at all.
    Thank you so much :-)



  • What is Port Forwarding ? use of ngrok ? Access localhost website from outside network






    What is Port Forwarding |  use of ngrok |  Access localhost website from outside network



    In computer networking, port forwarding or port mapping is an application of network address translation (NAT) that redirects a communication request from one address and port number combination to another while the packets are traversing a network gateway, such as a router or firewall. This technique is most commonly used to make services on a host residing on a protected or masqueraded (internal) network available to hosts on the opposite side of the gateway (external network), by remapping the destination IP address and port number of the communication to an internal host.



    Port forwarding allows remote computers (for example, computers on the Internet) to connect to a specific computer or service within a private local-area network (LAN).[3]


    In a typical residential network, nodes obtain Internet access through a DSL or cable modem connected to a router or network address translator (NAT/NAPT). Hosts on the private network are connected to an Ethernet switch or communicate via a wireless LAN. The NAT device's external interface is configured with a public IP address. The computers behind the router, on the other hand, are invisible to hosts on the Internet as they each communicate only with a private IP address. What is Port Forwarding ? use of ngrok ? Access localhost website from outside network


    When configuring port forwarding, the network administrator sets aside one port number on the gateway for the exclusive use of communicating with a service in the private network, located on a specific host. External hosts must know this port number and the address of the gateway to communicate with the network-internal service. Often, the port numbers of well-known Internet services, such as port number 80 for web services (HTTP), are used in port forwarding, so that common Internet services may be implemented on hosts within private networks.





    Typical applications include the following:

    •     Running a public HTTP server within a private LAN
    •     Permitting Secure Shell access to a host on the private LAN from the         Internet
    •     Permitting FTP access to a host on a private LAN from the Internet
    •     Running a publicly available game server within a private LAN



    Administrators configure port forwarding in the gateway's operating system. In Linux kernels, this is achieved by packet filter rules in the iptables or netfilter kernel components. BSD and macOS operating systems prior to Yosemite (OS 10.10.X) implement it in the Ipfirewall (ipfw) module while macOS operating systems beginning with Yosemite implement it in the Packet Filter (pf) module.





    When used on gateway devices, a port forward may be implemented with a single rule to translate the destination address and port. (On Linux kernels, this is DNAT rule). The source address and port are, in this case, left unchanged. When used on machines that are not the default gateway of the network, the source address must be changed to be the address of the translating machine, or packets will bypass the translator and the connection will fail.



    When a port forward is implemented by a proxy process (such as on application layer firewalls, SOCKS based firewalls, or via TCP circuit proxies), then no packets are actually translated, only data is proxied. This usually results in the source address (and port number) being changed to that of the proxy machine.



    Usually only one of the private hosts can use a specific forwarded port at one time, but configuration is sometimes possible to differentiate access by the originating host's source address.



    Unix-like operating systems sometimes use port forwarding where port numbers smaller than 1024 can only be created by software running as the root user. Running with superuser privileges (in order to bind the port) may be a security risk to the host, therefore port forwarding is used to redirect a low-numbered port to another high-numbered port, so that application software may execute as a common operating system user with reduced privileges.


    The Universal Plug and Play protocol (UPnP) provides a feature to automatically install instances of port forwarding in residential Internet gateways. UPnP defines the Internet Gateway Device Protocol (IGD) which is a network service by which an Internet gateway advertises its presence on a private network via the Simple Service Discovery Protocol (SSDP). An application that provides an Internet-based service may discover such gateways and use the UPnP IGD protocol to reserve a port number on the gateway and cause the gateway to forward packets to its listening socket.


    Types of port forwarding



    Port forwarding can be divided into the following specific types: local, remote, and dynamic port forwarding.


    Local port forwarding



    Local port forwarding is the most common type of port forwarding. It is used to let a user connect from the local computer to another server, i.e. forward data securely from another client application running on the same computer as a Secure Shell (SSH) client. By using local port forwarding, firewalls that block certain web pages are able to be bypassed.



    Remote port forwarding



    This form of port forwarding enables applications on the server side of a Secure Shell (SSH) connection to access services residing on the SSH's client side.[8] In addition to SSH, there are proprietary tunnelling schemes that utilize remote port forwarding for the same general purpose.[9] In other words, remote port forwarding lets users connect from the server side of a tunnel, SSH or another, to a remote network service located at the tunnel's client side.


    To use remote port forwarding, the address of the destination server (on the tunnel's client side) and two port numbers must be known. The port numbers chosen depend on which application is to be used.


    Remote port forwarding allows other computers to access applications hosted on remote servers. Two examples:


    An employee of a company hosts an FTP server at their own home and wants to give access to the FTP service to employees using computers in the workplace. In order to do this, an employee can set up remote port forwarding through SSH on the company's internal computers by including their FTP server’s address and using the correct port numbers for FTP (standard FTP port is TCP/21).


    Opening remote desktop sessions is a common use of remote port forwarding. Through SSH, this can be accomplished by opening the virtual network computing port (5900) and including the destination computer’s address.
       



    Dynamic port forwarding



    Dynamic port forwarding (DPF) is an on-demand method of traversing a firewall or NAT through the use of firewall pinholes. The goal is to enable clients to connect securely to a trusted server that acts as an intermediary for the purpose of sending/receiving data to one or many destination servers.[11]


    DPF can be implemented by setting up a local application, such as SSH, as a SOCKS proxy server, which can be used to process data transmissions through the network or over the Internet. Programs, such as web browsers, must be configured individually to direct traffic through the proxy, which acts as a secure tunnel to another server. Once the proxy is no longer needed, the programs must be reconfigured to their original settings. Because of the manual requirements of DPF, it is not often used.



    Once the connection is established, DPF can be used to provide additional security for a user connected to an untrusted network. Since data must pass through the secure tunnel to another server before being forwarded to its original destination, the user is protected from packet sniffing that may occur on the LAN.



    DPF is a powerful tool with many uses; for example, a user connected to the Internet through a coffee shop, hotel, or otherwise minimally secure network may wish to use DPF as a way of protecting data. DPF can also be used to bypass firewalls that restrict access to outside websites, such as in corporate networks.




    How to use Ngrok for Access outside Network ?



    1) first we need a localhost server such as hosting provider or need a web address to access the outside network ( For eg Ngrok )


    ngrok.com













    Spend more time programming. One command for an instant, secure URL to your localhost server through any NAT or firewall.




    2) Signup or login to ngrok and go to with download option for downloading a ngrok server ( application )


    https://ngrok.com/download




    3) First, download the ngrok client, a single binary with zero run-time dependencies. you can downloa for MAC OS X, Windows, Mac (32bit), Windows (32-bit), Linux (ARM), Linux (ARM64), Linux (32-bit), FreeBSD (64-Bit), FreeBSD (32-bit)...  


    4)  On Linux or OSX you can unzip ngrok from a terminal with the following command. On Windows, just double click ngrok.zip.


      $ unzip /path/to/ngrok.zip 


    Most people like to keep ngrok in their primary user folder or set an alias for easy command-line access.







    5)  Try it out by running it from the command line:


      ./ngrok help 




    6) To start a HTTP tunnel on port 80, run this next:


      ./ngrok http 80  











    OR


      ngrok http -subdomain=baz 8080 


    OR



      ngrok http foo.dev:80   




    OR


      ngrok http https://localhost 


    OR


      ngrok tcp 22 



    How To Access website from Outside Network ?


    Type the following command and press enter :-


    1)   serivce apache2 start 


    otherwise i have already download and install external apache server ( XAMPP Server )









    For chech a service status , it's a start or not  


      service apache2 start 



    then we have ready to access our localhost website via inside and outside network  ( internet )



    Now, we have to copy a ngrok's link


    https://ab5ac26e3592.ngrok.io








    Then access






    Through Mobile








     ----------------





    Disclaimer

     

    This was written for educational purpose and pentest only.
    The author will not be responsible for any damage ..!
    The author of this tool is not responsible for any misuse of the information.
    You will not misuse the information to gain unauthorized access.
    This information shall only be used to expand knowledge and not for causing  malicious or damaging attacks. Performing any hacks without written permission is illegal ..!


    All video’s and tutorials are for informational and educational purposes only. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. We believe that it is impossible to defend yourself from hackers without knowing how hacking is done. The tutorials and videos provided on www.hackingtruth.in is only for those who are interested to learn about Ethical Hacking, Security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used.


    All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.



    - Hacking Truth by Kumar Atul Jaiswal



    Video Tutorial :- 


                
        


    I hope you liked this post, then you should not forget to share this post at all.
    Thank you so much :-)



  • whats app web How to Enable Dark Mode in a Simple Trick



    whats app web How to Enable Dark Mode in a Simple Trick


    Whats app Web How to Enable Dark Mode in a Simple Trick


    WhatsApp is a very popular messenger app that is used all over the world and this application exists with a very beautiful web interface.  After accessing it all people can send messages to each other, irrespective of the place of the world.

    Recently, WhatsApp had provided a dark mode future to all the users inside its application and all the users are waiting for them to use WhatsApp Dark mode in their browser and according to a report, the dark mod features in the browser of WhatsApp is going to come very soon.  It is currently under development and very soon the users may get to see these features.

    That is why, before coming to this features, we are telling you a very good way, with the help of which you can run WhatsApp web in dark mode in your browser.





    How To enable This Feature ?


    whats app web How to Enable Dark Mode in a Simple Trick




    Dark mode features have already been given to many users in WhatsApp applications.  But if you want.  Running WhatsApp in dark mode inside your browser.  For this, there is a very simple way that you have to activate.



    #First of all, open the official website of your https://web.whatsapp.com/


    #Open WhatsApp Web from the official page web.whatsapp.com.


    #Log-in to the web interface: You need to open WhatsApp on your phone > tap on three-dot icons on the top right corner > tap on ‘WhatsApp Web’. Now scan the QR Code on the computer screen with your phone.


    #Once you are logged in, right-click on the blank area outside the chat and select ‘Inspect’.


    #The browser shows the inspector or console and the code of the page. Now you need to scroll to find the string— body class=“web”


    whats app web How to Enable Dark Mode in a Simple Trick




    #WABetaInfo said that “web” is the class of the original theme, the one we are currently using. To enable dark mode, we need to replace it with “web dark”.


    #Once you replace the string, WhatsApp Web will turn to Dark Mode.



    We tried the method and it worked fine for us. However, since changing the string using Inspect on a web page is only for preview purpose, WhatsApp Web will turn to normal mode once you refresh the page or close it.

    The WhatsApp tracker also confirmed that the Dark Theme is not yet available and the platform is testing the feature in order to ensure a bug-free experience. Since the feature is under development, it is currently not available in the WhatsApp Web or the WhatsApp Desktop app.



    I hope you liked this post, then you should not forget to share this post at all.
    Thank you so much :-)

    Video Tutorial :- SooN


  • Reliance Jio's big offer amidst battle with Corona virus


     Reliance Jio's big offer amidst battle with Corona  kumaratuljaiswal.in



    Jio has announced that the company will provide basic broadband connectivity without any service charge, as part of Reliance Industries Limited's # CoronaHareGindiaJitega initiative. The company has said that keeping in view the geographical location, the service will be given for free with a speed of 10Mbps. That is, the free broadband plan will be offered in the areas where Jio Fiber operates. This offer is for new users.  Reliance Jio's big offer amidst battle with Corona 


    At the same time, existing Jio Fiber subscribers will be given double data in all plans. The purpose of the company through these offers is that in such a difficult situation, mobility services should be better and keep running all the time. Corona virus





    Right now India is fighting a battle with Corona and internet is the biggest need of this society to work from home and stay connected with the whole world. Through its initiative, Reliance Jio is providing basic Jio fiber broadband connectivity to anyone living in its service area at a speed of 10Mbps for free. Corona virus crisis


     Reliance Jio's big offer amidst battle with Corona  kumaratuljaiswal.in



    No one will be charged for accessing the internet, although subscribers will have to pay for the router. The company has informed that home gateway routers will be made available with minimum refundable deposits. At the same time, existing subscribers of Geofiber will be given double data in all the plans by the telecom operators.



    On the other hand, the company is offering double data in its 4G data vouchers to Jio's mobile subscribers. This offer was released last week. The company is offering non-live calling minutes along with double data. These vouchers are Rs 11, Rs 21, Rs 51 and Rs 101. These 4G data vouchers are actually boosters and will require an active Jio plan. latest jio news




    Apart from all this, a work from home plan has also been released by Jio and its price has been kept at Rs 251. In this, only data benefits are being given to customers. In this plan, customers will be given 2GB data daily during validity. In this, customers will not get the benefits of SMS or calling.






  • new Android app will give complete information about how much time

    The new android app will give complete information about how much time you gave to the phone throughout the day








    For such users who spend a lot of time on smartphones, an app has come up that will tell them how much time they gave to the phone during the day. At the same time, some new apps have come up to make your typing more realistic and easy. Here we are telling you about 4 such apps. new Android app will give complete information about how much time 



    Activity Bubbles

     

    People want to stay away from the smartphone but the smartphone does not leave hands. Activity Bubbles believes that unless we know how much time we have spent on the smartphone, this addiction will not be lost. This is a live wallpaper app that shows the time spent on your phone as bubbles. As the day progresses the bubbles and their sizes increase. Your goal is to keep these bubbles short and short.







    Steno Notes

     

    Easy note-taking app. Formatting options like bullet points etc. Its UI is clean and does not tangle. Notes can be organized into folders by placing hashtags on them. Each folder has been given a different color, which makes them easier to identify. The use of search in this is also not difficult. You search a keyword, this app will bring up every text in whose name and content in which the word is written. It is easy to delete here, swipe left and it will be done.





    Audio Manager Lite

     

    If you keep switching to different audio profiles on your phone, then this app is of your use. This app offers a range of tools that automatically adjust the volume level, without any human support. It also has several routines that you can program. Just like if you want that the phone goes on silent mode at 11 o'clock on some dates, then this app will help you. The good is that it can have multiple routines set together. Its UI is very easy to understand because it is highly resolved.





    TypeWise Keyboard

     

    Looking at this new keyboard app, it looks like the traditional keyboard has been shaken because the keys are hexagons. Makers claim that it eliminates up to 80 percent of typing mistakes in that its keys are larger. You will not find any "backspace key" in it. If the keyboard UI slides slightly left side, the text will disappear automatically. Obviously it will take you a little time to get into the habit of so much change, but its benefits are more.










    Obviously it will take you a little time to get into the habit of so much change, but its benefits are more.



    I hope you liked this post, then you should not forget to share this post at all.
    Thank you so much :-)


  • If your phone is stolen, Google will also bring back the lost phone






    If you also have a smartphone and your phone is stolen or lost, then you do not have to worry. Google has brought a feature that even the thief will regret after stealing your phone. Apart from this, if your phone is lost, Google will also help you reach that phone. If your phone is stolen, Google will also bring back the lost phone

    Actually, Google has given a new gift to its users. Through the features that Google has brought, you can access your lost or stolen phone. Many times what happens is that you forget to put your phone somewhere. After this, no matter how much you remember, you do not notice that place and your phone also stays on silence mode.




    Apart from this, if your phone is lost or lost, then Google can help you find your Android phone. However this can only happen when your phone is running internet. Apart from this, it is necessary to have a Google account logged into it. If you have this in your phone then you can search your smartphone.Now if you steal your phone, the thief will regret it, Google will also bring back the lost phone




    According to the report, in the event of internet not being turned on or the phone being switched off, you can know in your phone when was the last time internet was on. To find your phone, first login to your computer on Gmail.com with the ID that is in your lost or stolen smartphone.







    After this, click on the profile picture shown right next to your name and go to Google account. Then click on Security here and go to Your Devices and click on Find a lost or stolen phone. A map will appear on your computer as soon as you click on it. Your phone's location will appear here.




    If the mark you see in the map is green then it means that your phone has an internet connection. At the same time, if this mark is of gray color, then the last time the internet connection was present in your phone at that location. Then you click on this mark. As soon as you click on this mark. Your smartphone's ringtone will ring. For this, you will click on the Play Sound option.

  • WhatsApp to close over 75 lakh Android smartphones from February 1


    WhatsApp to close over 75 lakh Android smartphones from February 1 by www.kumaratuljaiswal.in




    WhatsApp to close over 75 lakh Android smartphones from February 1



    Instant messaging app WhatsApp is liked by millions of users worldwide. Nowadays people remain connected to each other only through this. Also share photos and videos. WhatsApp has tried its best to improve the chatting experience of users. But just think that if you know that you will not be able to access WhatsApp in your phone, then how will you feel? Actually, millions of users around the world will not be able to use WhatsApp from 1 February 2020. So let's know why this will happen.
    WhatsApp to close over 75 lakh Android smartphones from February 1

    Know the reason for this backache? According to Google, more than 7.5 million Android smartphone users will not be able to access WhatsApp from February 1. At the same time, millions of iPhone users will also not be able to run WhatsApp in their phones. One of the main reasons is the old operating system. If your Android or iOS device is still working on the old operating system then from February 1, 2020, you will not be able to use WhatsApp. WhatsApp has been alerting users about this matter since last year.


    WhatsApp will discontinue support: The company will stop this support on devices that are working on older OS. The company had said that to provide better experience and new features in WhatsApp, it has become extremely necessary to stop supporting devices running on the old operating system. In such a situation, WhatsApp support will be discontinued on Android devices running 2.3.7 and Apple devices running iOS 7 and older. WhatsApp to close over 75 lakh Android smartphones from February 1 2020


    In such a situation, if you also have devices running on the above OS then you will have to either upgrade your device based on the OS. At the same time, if you have stopped getting OS updates, then you have to buy a new smartphone that works on the updated version. WhatsApp to close over 75 lakh Android smartphones 


    Future Planning doing WhatsApp: WhatsApp will focus on the features for the same operating system with the highest number of users for its upcoming features. The company has said that older smartphones will not be able to support the upcoming WhatsApp features properly. This will also put users at risk of privacy.




    WhatsApp to close over 75 lakh Android smartphones from February 1


    Know the reason for this backache? According to Google, more than 7.5 million Android smartphone users will not be able to access WhatsApp from February 1. At the same time, millions of iPhone users will also not be able to run WhatsApp in their phones. One of the main reasons is the old operating system. If your Android or iOS device is still working on the old operating system then from February 1, 2020, you will not be able to use WhatsApp. WhatsApp has been alerting users about this matter since last year.


    See also :- 

    1) Google will alert on password 






    WhatsApp will discontinue support: The company will stop this support on devices that are working on older OS. The company had said that to provide better experience and new features in WhatsApp, it has become extremely necessary to stop supporting devices running on the old operating system. In such a situation, WhatsApp support will be discontinued on Android devices running 2.3.7 and Apple devices running iOS 7 and older.
    In such a situation, if you also have devices running on the above OS then you will have to either upgrade your device based on the OS. At the same time, if you have stopped getting OS updates, then you have to buy a new smartphone that works on the updated version.



    Future Planning doing WhatsApp: WhatsApp will focus on the features for the same operating system with the highest number of users for its upcoming features. The company has said that older smartphones will not be able to support the upcoming WhatsApp features properly. This will also put users at risk of privacy.




  • Google's data blamed due to bug in Chrome, Google admitted mistake


    The legendary search engine company Google recently launched the Chrome 79 (Chrome 79) update rollout.




    Google's data blamed due to bug in Chrome, Google admitted mistake by www.kumaratuljaiswal.in




    The legendary search engine company Google recently launched the Chrome 79 (Chrome 79) update rollout. This update included bug fixes and phishing protection features. Now Google has stopped the rollout of this update after complaints of data loss in many apps. Some app developers have complained that the data of users installing this update of Google is getting deleted. Therefore Google has stopped this update rollout.Google's data blamed due to bug in Chrome, Google admitted mistake





    See also




    Why was deleted data of the users in the Chrome 79 update, Google developers switched the location of the Chrome directory. It is believed that this is why the data of users was deleted. After the update was installed, users' phone reset, due to which their data was deleted. Google's data blamed due to bug in Chrome








    Google admitted mistake



    Google's developers have admitted their mistake on this whole matter. Developers said that WebSQL content was not moved by Google in the new directory of Chrome 79, due to which users have encountered this problem.
    Users could not access the app


    After installing this update many apps of users were reset. Due to the bug, users' accounts were logged out and their app data was deleted. Google says that so far this update has reached 50 percent users.
    Google engaged in bug fixes. Google's data blamed due to bug in Chrome, Google admitted mistake


    Google says developers are constantly trying to fix bugs in this update so that users' data loss can be minimized. The company will rollout this update again after the bug is fixed.



  • new latest vulnerability can damage your smartphone

    The Android Security Bulletin was released in December 2019, mentioning 3 flaws in it. One of these three flaws is considered extremely dangerous ...









    There is always doubt in the minds of users about Android smartphones. Hacking them has become extremely easy. Hackers are adopting many ways to gain access to Android users' phones. Also get personal data hack. In this sequence, a new flaw has emerged, due to which the Android smartphone can be completely damaged. It is believed that it can be fixed in December 2019.new latest vulnerability can damage your smartphone




    The Android Security Bulletin


    The Android Security Bulletin that was released in December 2019 contained references to 3 flaws. One of these three flaws is considered extremely dangerous. Google has said that by taking advantage of this flaw, users can make single malware-affected messages from their phones. This flaw is named CVE-2019-2232 in Android Bulletin. By taking advantage of this, users' phones can be damaged.
    new latest vulnerability 


    Millions of Android devices were affected


    Many devices have been affected by the leakage of the name CVE-2019-2232. Android 8.0, Android 8.1, Android 9 and Android 10 smartphones are affected by this flaw. In such a situation, it can be believed that many users may be affected by this flaw. The official statement of the NIST National Vulnerability Database stated that under the handleRun of TextLine.java it can crash the app in the phone. This increases the chances of a smartphone malfunction. bug hunting




    Android can provide updates


    The company says that an update can be issued to fix this flaw. However, a fix for this has been given to the Android open source project. Talking about the security patch, it depends on the phone manufacturer when they provide the latest security patch. It can be said that the first Google Pixel series devices can get the security patch. hackerone



  • California Consumer Privacy Act (CCPA)


    The California Consumer Privacy Act (CCPA) is a new data privacy law that applies to certain businesses which collect personal information from California residents. The new law goes into effect on January 1, 2020.


    California Consumer Privacy Act (CCPA)



    The California Consumer Privacy Act (CCPA) is a new data privacy law that applies to certain businesses which collect personal information from California residents. The new law goes into effect on January 1, 2020. California Consumer Privacy Act (CCPA)


    Google already offers data protection terms pursuant to the General Data Protection Regulation (GDPR) in Europe. We are now also offering service provider terms under the CCPA, which will supplement those existing data protection terms (revised to reflect the CCPA), effective January 1, 2020. For customers on our online contracts and updated platform contracts, the service provider terms will be incorporated into our existing contracts via the data protection terms. For such customers, there is no action required on your part to add the service provider terms into your contract.




    These service provider terms will be made available alongside new tools for partners to enable restricted data processing. Restricted data processing is intended to help partners prepare for CCPA. Some partners may decide to send a restricted data processing signal for users who click a CCPA opt-out link. Other partners may decide to enable restricted data processing for all users in California via a control in our products. Subject to the service provider terms, we will act as your CCPA service provider with respect to data processed while restricted data processing is enabled.



    California Consumer Privacy Act (CCPA)




    You can refer to this article for more information on restricted data processing and to determine whether restricted data processing meets your CCPA compliance needs. Please also refer to our Help Center articles for Ad Manager, AdMob, AdSense for more information on enabling restricted data processing.





            
  • रिलीज के साथ ही अक्षय-रजनीकांत को लगा बड़ा झटका


    रिलीज के साथ ही अक्षय-रजनीकांत को लगा बड़ा झटका, इस ऑनलाइन वेबसाइट पर लीक हुई '2.0'




    सुपरस्टार अक्षय कुमार और रजनीकांत की फिल्म 2.0 रिलीज हुए कुछ ही घंटे हुए है की फिल्म ऑनलाइन लीक भी हो गई है। 
    इसके बाद फिल्म मेकर्स को नुकसान के तौर पर बड़ा झटका लग सकता है। 
    बता दें, फिल्म 2.0 तमिलरॉकर्स ऑनलाइन वेबसाइट पर लीक हुई हैं। 
    ऐसे में अब इसका सीधा असर इस फिल्म के कमाई पर पड़ेगा।

     आपको यह भी बता दें, पाइरेटेड वेबसाइट तमिलरॉकर्स ने ट्विटर के जरिए 2.0 के मेकर्स 
    को चेतावनी देते हुए फिल्म की लीक होने की बात कही थी। और तो और पाइरेटेड फिल्म के खिलाफ जा कर 
    मद्रास हाईकोर्ट ने आदेश देते हुए 12,000 से ज्यादा वेबसाइटों को ब्लॉक करने को  कहा था। इसके बावजूद www.Tamilrockers.com पर फिल्म 2.0 की पूरी फिल्म लीक हो गई हैं।






    फिल्म मेकर्स को नुकसान से बचाने के लिए अक्षय कुमार ने अपने फैन्स को ऑनलाइन वेबसाइट पर फिल्म न  
    देखने की अपील भी की है। और तो और जब यह फिल्म शूट हो रही थी 
    तब मेकर्स ने इस बात का पूरा ध्यान रखा था की यह फिल्म की कोई भी जानकारी, 
    तस्वीर और वीडियो फिल्म रिलीज से पहले लीक न हो। हम आपको बताना चाहेंगे की ऐसा हुआ भी।
     फिल्म के सेट से कभी भी कोई तस्वीर बिना किसी इजाजत के बाहर नहीं आई थी। 
    लेकिन अब इंटरनेट पर पूरी की पूरी फिल्म लीक हो गई हैं।



    #Learn Web Development Click Here 



    वैसे आपको यह भी बता दें, यह पहली बार नहीं हुआ है जब फिल्म रिलीज के साथ ही इंटरनेट पर  
    लीक हुई हो इससे पहले कई बार इस तरह के हादसे हुए हैं।
     जिससे फिल्म के निर्माताओं को भरी नुकसान का सामना करना पड़ा हैं।

     हाल में रिलीज हुईं आमिर खान की फिल्म 'ठग्स ऑफ हिंदोस्तान', सलमान खान की महंगी फिल्म 
    रेस 3, संजय दत्त की बायोपिक 'संजू', रणवीर सिंह और दीपिका पादुकोण की फिल्म बाजीराव 
    मस्तानी ऑनलाइन वेबसाइट पर लीक हो चुकी हैं।




  • WHAT WE DO

    We've been developing corporate tailored services for clients for 30 years.

    CONTACT US

    For enquiries you can contact us in several different ways. Contact details are below.

    Hacking Truth.in

    • Street :Road Street 00
    • Person :Person
    • Phone :+045 123 755 755
    • Country :POLAND
    • Email :contact@heaven.com

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation.