whatsapp a:hover { background: linear-gradient(#01A507, #069A00); } .whatsapp i { color: #038F02; background: #FFF; text-shadow: none; font-weight: 900; border-radius: 2px; position: relative; left: -3px; margin-right: -4px; padding: 2px; -webkit-font-smoothing: antialiased; } .whatsapp a { font-family: sans-serif; font-weight: 700; text-decoration: none; font-size: 11px; color: #FFF; padding: 7px; background: linear-gradient(#009805, #058400); padding-top: 4px; border-radius: 2px; padding-bottom: 5px; text-shadow: 1px 1px 2px #797272; }

Search Beejay Tech's Blog

Showing posts with label Cheats Arena. Show all posts
Showing posts with label Cheats Arena. Show all posts

Tuesday, 26 September 2017

Tecno CX Air Full Specs & Price

- Tecno CX Air - ( ₦42,000)

Offer price: ₦42,000 (MRP: ̶̶ ̶₦̶4̶2̶,̶0̶0̶0̶)

Brand: Tecno

Product Description: Product Description 16M High definition Selfie/slim/2.5D Color: gray/golden/blue Storage (ROM): 16GB Display: 5.5-inch Front Camera: 13.0MP Rear Camera: 13.0MP Battery: 3200 mAh OS: HiOS v2.0.0, based on Android™ 7.0 SpecificationsMemory (RAM): 2GB Storage (ROM): 16GB Expandable Storage (Up to): 128GB Dimensions: H*W*D (Visual Depth) 153*75.4*6.6(mm)Display: 5.5-inch HD(720 x 1280) IPS display Processor: MT6737Qua-core 1.25Ghz Front Camera: 13.0MP F/2.2 aperture, with Dual flash Rear Camera: 13.0MP SAMSUNG S5K3L8 F/2.0 Aperture Phase Detection Autofocus (PDAF) - Fingerprint sensor: Yes Battery: 3200 mAh OS: HiOS v2.0.0, based on Android™ 7.0 SIM Card: Dual Micro SIM Connector: Micro USB Product Information Colour Blue Brand Tecno Screen size 5.5 inches Connectivity WiFi + 4G Sim Type Nano SIM OS Android OS RAM 2 GB Phone Memory 16 GB Sim Slots Dual Sim Warranty Period 1 Year Official Warranty T&C;

Saturday, 16 September 2017

How to Borrow Airtime without Paying Back

This is practically best for 100naira debt..

Everyone knows Mtn Awuf4u
so if u borrow 100 and u wanna pay back and u wanna load the card for instance 100naira card..
*Dial * 888 * pin#..
For awoof 300%*.. You will automatically pay for the 100naira u borrowed and still have 200naira to do whatever you want to do ..
But the bad part is that if you borrow 500
You cant say you want to load 200naira on aAwoof and use to pay the debt..
It wont work I tried it...
So you will have to load 100 card 5times using awoof and you will be left with 1000naira card

Give it a Trial

Top 77 Sites for Downloading Movies

Today On Top 77 Sites To Download Hollywood, Nollywood, Korean Movies and TV Series.
sites below:

hdmoviespoint.com
xmovies8.tv
naijaextra.com
moviesgraphy.com (highly recommended)
moviescounter.com
smokeymovie.org
besthdmovies.com
hdmoviespoint.biz (highly recommended)
hdpopcorns.com
movietubenow.com
quikrmovies.com
putlockers-movie
dailymoviez.xyz
fmovies.to
worldfree4u.cc
300mbmovies4u.net
divxcrawler.tv
hdmoviesmp4.org
ganool.de
mp4times.com
mydownloadtube.com
freemovieswatch.com
housemovie.to
gingle.in
moviewatcher.to
movieflixter.to
urgrove.com
tubeplus.is
cartoonhd.website
oceanofmoviez.com
movies-2015.com
watchonlinemoviesfree.info
memoryonfilm.blogspot.com
loadmovie.biz
film21gratis.net
filmxy.com
filocker.com
downloadmaniak.com
freedownloadmovies.info
hdmovies.com.pk
downloadmania.xyz
moviescounter.com
movies-online-pro.com
movizonline.com
hdmovieswatch.net
movizonline.com
wootly.ch
mycinemas.co
fzmovies.net
mp4mania.com
SITE TO DOWNLOAD TV SHOWS / SERIES
    51. o2tvseries.com(recommended)
    52. mobiletvshows.net
    53. waptvseries.net
    54. toptvshows.me
    55. Mobiletvshows.net
    56. Mobtvseries.net

TOP SITES TO DOWNLOAD NOLLYWOOD MOVIES
    57. naijapals.com/video(recommended)
    58. nollywoodfilmz.com
    59. ibakatv.com (recommended – paid services though)
    60. irokotv.com (recommended – paid services though)

TOP SITES TO DOWNLOAD CARTOONS
   61. kissanime.to
   62. animehaven.org
   63. masterani.me
   64. disneyjunior.disney.com/video (recommended)
   65. oonjet.com
   66. cartoonson.com

TOP SITES TO DOWNLOAD ASIAN/KOREAN DRAMA
  67. gooddrama.net
  68. epdrama.com
  69. sugoideas.com
  70. yodrama.com
  71. dramasub.com
  72. koreandrama.org
  73. alodrama.com
  74. viki.com
  75. dramafans.org
  76. dramafever.com
  77. doramax264.com

JavaScript Libraries

This is a list of notable JavaScript libraries.

== Constraint programming ==
Cassowary (software)
CHR.js

== DOM (manipulation) oriented ==
Dojo Toolkit
jQuery
midori
MooTools
Prototype JavaScript Framework
React

== Graphical/visualization (canvas or SVG related) ==

AnyChart
D3.js
Highcharts
EaselJS, part of CreateJS
JavaScript InfoVis Toolkit
p5.js
Pixi.js
Plotly
Processing.js
Raphaël
SWFObject
Three.js
Velocity.js
WhitestormJS

== GUI-related (widget) ==
AngularJS (framework)
Angular (application platform)
Bootstrap
DevExtreme of DevExpress
DHTMLX
Dojo Widgets
Ext JS of Sencha
ZURB Foundation
Google's Polymer paper elements
jQuery UI
jQWidgets
Ignite UI of Infragistics
Kendo UI of Telerik
Wijmo 5 of GrapeCity
OpenUI5 of SAP
qooxdoo
SmartClient
Webix
WinJS
Gijgo

=== No longer actively developed ===
Ample SDK
Glow
Lively Kernel
Script.aculo.us
YUI Library

== Pure JavaScript/Ajax ==
Google Closure Library
Joose
JsPHP
Microsoft's Ajax library
MochiKit
PDF.js
Rico
Socket.IO
Spry framework
Underscore.js

== Template systems ==
Cascade Framework
jQuery Mobile
Mustache
Jinja-JS
Twig.js

== Unit testing ==
Jasmine
Mocha
QUnit
Tape
Unit.js

== Web-application related (MVC, MVVM) ==
AngularJS
Aurelia
Backbone.js
Cappuccino
Chaplin.js
Echo
Ember.js
Enyo
Ext JS
Google Web Toolkit
Inferno
JavaScriptMVC
Knockout
Meteor
Mojito
MooTools
Node.js
Prototype JavaScript Framework
React
Rialto Toolkit
SproutCore
Vue.js
Wakanda Framework

== Other ==
Modernizr
Cannon.js

== See also ==
Ajax framework
Comparison of JavaScript frameworks

== External links ==
JSter, a community-driven catalog of the most useful javascript libraries.

_Source: Wikipedia_

Sunday, 23 October 2016

How to Hack down Java Device to Symbian Platform

Do yhu have a Java Device and yhu wan to enjoy symbian services? It's easy and smple, you dont neeed a PC, all you need is an application called 'Run- Time' the runtime app is used to manage and convert the java aplatform to other platform. Now let's go 1)Install Runtime.jar 2)Open Runtime 3)Select Your Phone 4)Locate your java foldr like this [...] predfinedhidden/app/java/extras/ 5)Locate the largest app on your fone, me i use Nokia X2-01 and my largest app is WhatsAPP(1.5MB) so locate your own. 6)select Product.rar and extact. 7) Download Products.RaR [...] Download MobileRAR.jar 9)Open MobileRAR and extract the co- ordinates in products.rar 10)Select 'conversion' in runtime 11)wait for a while 12)select 'family' this family is to make all your apps work together and at thesame time. 13)locate all your apps and mark them 14)select set platform 15)This is the main place.. Now to choose your platform, for java i advice u choose .sis or .sisx 16) All your apps will become symbian.sis 17)close runtime 1[...] off your fone 19)On it back 20)Press *#0000#- You will see your fone new software platform 'Symbian OS V5.6' no more java.

Thursday, 29 September 2016

How to Make Money via Whatsapp

Below are the awesome ways you can earn, make money With WhatsApp 1. With affiliate marketing using your WhatsApp groups What is affiliate marketing? Affiliate marketing, is all about product promotion as in promoting a product of a company, Organisation, etc for people to buy them. You will be given a special link (url) whenever someone click the link and buy the product you will earn money from there (you have a share from that particular product). Tips on how to increase your earning from affiliates marketing with your WhatsApp group and make cool money: what you need to do is post the link (url) of the product your are promoting in all your WhatsApp groups. Yea that will definitely boost your earnings because each WhatsApp group contain about 256 peopleand i know you are more then 10 whatsapp group,that is an advantage.!! And you have the chance of at list 100 people that will click the link. 2. HOW TO MAKE MONEY FROM WHATSPP GROUP USING URL SHORTENING Url shortening is one is one of the ways you can earn money from your WhatsApp group, first you need to register in those url shortening website (paid once) and look for something you know that people want to see or really need to download it can be the latest music, latest music video, funny video, Latest app etc. Just copy the shortened url and post it in all your WhatsApp group when they click the link you, You make money !!!. ©Beejay Cyber World

Wednesday, 28 September 2016

How to make a HandMade Power Bank

there is no best power bank in the market because it varies of individual need and consumption. but when it comes to your particular need then home made power bank is the best. the only down side is that it's not neat and therefore not potable. it's not something you can boldly carry around. but when it comes to your particular need you can built any mAh of your choice. how to build this power bank? first get a car charger. the charger that is used to charge phone from car. with car charger you can connect it with dry cell motor battery or any other battery. how? open the car charger and after that look for the positive and negative contact. and then connect according to any battery that is up to atleast 9 voltage and 12 voltage maximum. car battery is 12 voltage. this will charge your phone. what battery can I used? the list of battery are endless. as you can possibly used any battery. if the battery is not up to 9 voltage maybe 3.7 voltage then you will need 3 of it that's about 3.7 * 3 = 11.1 voltage. if the battery is 1.5 voltage then you will need 6 of it. 1.5 * 6 = 9 voltage another good battery is laptop battery. if you have any dead or not working laptop battery. or any you don't use anymore then you are good to go. 1, crushed the laptop battery and open. 2, but first you have to check if the battery inside can still hold current very well If boost and then charged. 3, you will see about 6 small dry cell battery inside. every one of it is about 3 voltage. 4, but first you have to learn about voltage and mAh. how? to increase battery voltage... example. if you have 3 battery of 3 voltage each and you need 9 voltage. you will have to connect the 3 battery positive to negative each. leaving the first battery positive and the last battery negative. and if you only need 3 voltage but want to increase the mAh the 3 battery will be connected with the three negative together and the three positive together. this will increase the mAhs * 3. also you can used phone battery as well. you just made a big power bank battery. best power bank you can ever get is home made power bank. We ©Beejay Cyber World

Tuesday, 27 September 2016

How to Protect your Phone From Hackers

1. Make sure that your software is up to date. 2. Use some good antivirus which helps you from spyware. A good antivirus doesn’t allow others to install spyware on your phone. 3. Protect your phone with some lock screen, so that others cannot access your mobile phone without your permission. Disclaimer: This tutorial is only for educational purpose. The author or the blog owner is not responsible for any kind of misuse of this information provided. ©Beejay Cyber World

How to Unlock a Phone without Knowing the Security Code

Take the phone locked with security code press and hold the unlock button for a while without releasing it. the phone will display now press * quickly press the star button and the phone will be unlocked Second method This method deals with the serial or imei number of the phone. while the phone is not yet locked, dial *#06# to get the imei or serial number of the phone. Write down the 15 digit imei number somewhere Go to www.unlockitfree.com When the page loads, select, free remote master code In the area provided for imei/serial number, insert the serial/imei number of the phone. Click on generate. Once done, a number will be generated, that's the master code for the phone, copy and keep the number. When ever that particular phone is locked with security code and you want to unlock it, even though you don't know the phone's security code, just enter that number, i.e. Master code and it'll be unlocked! please note that This is for educational purpose only, do not misuse it on your friends' phone. your comments will be highly appreciated. Bookmark this page for future reference and for more tips and tricks. Share this post with your friends if you like itWidget on ©Beejay cyber world

  • Item 1
  • Item 2

Microsoft Windows XP Home Users Encryption steps

1. Select the file or folder you want to encrypt. 2. Right-click the file or folder and click Properties . 3. Click the Sharing tab . 4. Check the box Make this folder private 5. Click Apply and then OK. Make this folder private is grayed out For this option to work on Microsoft Windows XP Home edition, you must meet the below requirements. 1. The hard drive must be formatted in NTFS and not FAT32 File System. 2. The folder you are attempting to encrypt is your own personal folder. For example, if your name is Bob, you must be encrypting the following folder or a folder that is contained within the following folder: C:\Documents and Settings\Bob\ You cannot encrypt any folders outside of this folder. If you want to encrypt folders outside of this folder, see the other security solutions section below. ©Beejay Cyber world

  • Item 1
  • Item 2

How to use TweakUI app to lock PC Folders

The newest version of TweakUI also enables you to show the Encrypt option in the context menu. To do this, follow the steps below. 1. Open TweakUI . 2. In the TweakUI window, select Explorer . 3. In the right side of the window under Settings, locate Show 'Encrypt' on context menu and check the box. This option should be below Prefix 'shortcut to' on new shortcuts and above Show 'View workgroup computers' in NetPlaces . ©Beejay Cyber World

Microsoft Windows XP Proffessional Users Encryption Steps

The steps below for encrypting the files on Windows XP Professional apply to users who are using a computer that has two or more accounts. If you are using a single account, see the other security solutions section . 1. Select the file or folder you want to encrypt. 2. Right-click the file or folder and click Properties . 3. On the General tab, click the Advanced button. 4. Check "Encrypt contents to secure data" option. 5. Click Apply and then OK. Note: You will not be prompted to enter a password when encrypting a folder in Windows XP Pro. However, other user accounts on your computer will not have access to files contained in the encrypted folder. ©Beejay Cyber World

How to Hack into your Friends Phone and Control It

FEATURED STORY Anonymous Texting 101: How to Block Your Cell Phone Number While Sending Text Messages SMARTPHONES

HOW TO Hack Someone's Cell Phone to Steal Their Pictures

Osas Obaiza Do you ever wonder how all these celebrities continue to have their private photos spread all over the internet? While celebrities' phones and computers are forever vulnerable to attacks, the common folk must also be wary. No matter how careful you think you were went you sent those "candid" photos to your ex, with a little effort and access to public information, your pictures can be snagged, too. Here's how.

Cloud Storage Apple's iCloud service provides a hassle free way to store and transfer photos and other media across multiple devices.

While the commercial exemplifies the G-rated community of iPhone users, there are a bunch of non-soccer moms that use their iPhones in a more..."free spirited" mindset. With Photo Stream enabled (requires OS X Lion or later, iOS 5 or later), pictures taken on your iPhone go to directly to your computer and/or tablet, all while being stored in the cloud.

If you think the cloud is safe, just ask Gizmodo reporter Mat Honan. His iCloud account was hacked by someone who contacted Apple Support and requested a password reset by working around the security questions and using available information of Honan's social media accounts. The hacker remotely wiped all of Honan's devices and hijacked the Gizmodo Twitter account. Luckily for him, his photos were not of any concern to the hacker, but other people might not be so lucky.

Email Email is one of the most used applications on a person's mobile device. While remotely hacking into someone's phone and gaining access to their system files and photos is extremely difficult, hacking into an email account is much easier. While MMS is usually the method of choice for those sending images over their phone, many people still use their email accounts for sharing files.

That's how some "intriguing" photos of Scarlett Johansson ended up all over the internet last year. The hacker simply found her email address by trying random iterations of her name in combination with common email clients like Gmail or Yahoo, and then used the forgotten password helper. After answering the security questions by using public information and scouring the internet, he gained access to her email account, which contained some of her photos.

Once a hacker has an email address, the information he or she now has access to has multiplied. Many people prefer paperless billing for their obligations, cell phone bills included. On those cell phone bills is the number of the account holder as well as a ton of other information like outgoing and incoming calls. And if you are using Gmail, you can send text messages right inside the email client, making it even easier to get in touch with other contacts.

So, while email hacking might not get you to the images directly, it can lead you to various sources of information that will get you closer to your goal, like a cell phone number. With your target's cell phone number in hand, those photos are within reach.

Cellular Provider Sometimes the cellular provider is the weakest point of defense for a cell phone user. Both AT&T and Verizon allow user ID's to be the customers wireless number. If you have the number of the phone, you can use the "forgot my password" feature to request for a temp password, or even change the password altogether by either entering a 4 digit pin code, crackable by brute force, or by answering a few security questions.

Studies have shown that most people are terrible at choosing PINs, so you may not even have to use brute force—just try the list of most common ones that people use. Once inside the account, you have access to all the usage and data the phone has sent or received in the latest billing period.

Spoofing With access to the numbers a cell phone has contacted and access to the text messages that have been sent from it, it's not too hard to spoof someone's number. Instead of trying to steal the photos off the phone, you can trick them into sending them directly to you. There are a bunch of cell phone spoofs and Caller ID apps you can use to make your number appear to be someone else's.

While none of these methods are guaranteed, there's a good chance that one of them (or a combination of a few) will work, unless your target is more security savvy than the average person. Most of us give away more information than we know online, and it only takes one opportunity-minded individual to take advantage of it.

If you do decide to give it a shot, though, just remember: hacking into someone's email or cell phone accounts is not only in the moral grey area, it's also completely illegal, so proceed with caution.

©Beejay Cyber World

How to Hack Systems

How to Hack Primarily, hacking was used in the "good old days" for learning information about systems and IT in general. In recent years, thanks to a few villain actors, hacking has taken on dark connotations. Conversely, many corporations employ hackers to test the strengths and weaknesses of their own systems. These hackers know when to stop, and the positive trust they build earns them a large salary.

If you're ready to dive in and learn the art, this article will share a few tips to help you get started!

Ad

Part One of Two: Before You Hack Hack Step 1 Version 4.jpg 1 Learn a programming language. You shouldn't limit yourself to any particular language, but there are a few guidelines. C is the language that Unix was built with. It (along with assembly language) teaches something that's very important in hacking: how memory works. Python or Ruby are high-level, powerful scripting languages that can be used to automate various tasks. Perl is a reasonable choice in this field as well, while PHP is worth learning because the majority of web applications use PHP. Bash scripting is a must. That is how to easily manipulate Unix/Linux systems—writing scripts, which will do most of the job for you. Assembly language is a must-know. It is the basic language that your processor understands, and there are multiple variations of it. At the end of the day, all programs are eventually interpreted as assembly. You can't truly exploit a program if you don't know assembly. Hack Step 2 Version 4.jpg 2 Know your target. The process of gathering information about your target is known as enumeration. The more you know in advance, the fewer surprises you'll have.

Advertisement Part Two of Two: Hacking Hack Step 3 Version 4.jpg 1 Use a nix terminal for commands. Cygwin will help emulate a nix for Windows users. Nmap in particular uses WinPCap to run on Windows and does not require Cygwin. However, Nmap works poorly on Windows systems due to a lack of raw sockets. You should also consider using Linux or BSD, which are both more flexible. Most Linux distributions come with many useful tools pre-installed. Hack Step 4 Version 4.jpg 2 Secure your machine first. Make sure you've fully understood all common techniques to protect yourself. Start with the basics — but make sure you have authorization to attack your target : either attack your own network, ask for written permission, or set up your own laboratory with virtual machines. Attacking a system, no matter its content, is illegal and WILL get you in trouble. Hack Step 5 Version 4.jpg 3 Test the target. Can you reach the remote system? While you can use the ping utility (which is included in most operating systems) to see if the target is active, you can not always trust the results — it relies on the ICMP protocol, which can be easily shut off by paranoid system administrators. Hack Step 6 Version 4.jpg 4 Determine the operating system (OS). Run a scan of the ports, and try pOf, or nmap to run a port scan. This will show you the ports that are open on the machine, the OS, and can even tell you what type of firewall or router they are using so you can plan a course of action. You can activate OS detection in nmap by using the -O switch. Hack Step 7 Version 4.jpg 5 Find a path or open port in the system. Common ports such as FTP (21) and HTTP (80) are often well protected, and possibly only vulnerable to exploits yet to be discovered. Try other TCP and UDP ports that may have been forgotten, such as Telnet and various UDP ports left open for LAN gaming. An open port 22 is usually evidence of an SSH (secure shell) service running on the target, which can sometimes be brute forced. Hack Step 8 Version 4.jpg 6 Crack the password or authentication process. There are several methods for cracking a password, including brute force. Using brute force on a password is an effort to try every possible password contained within a pre-defined dictionary of brute force software Users are often discouraged from using weak passwords, so brute force may take a lot of time. However, there have been major improvements in brute-force techniques. Most hashing algorithms are weak, and you can significantly improve the cracking speed by exploiting these weaknesses (like you can cut the MD5 algorithm in 1/4, which will give huge speed boost). Newer techniques use the graphics card as another processor — and it's thousands of times faster. You may try using Rainbow Tables for the fastest password cracking. Notice that password cracking is a good technique only if you already have the hash of password. Trying every possible password while logging to remote machine is not a good idea, as it's easily detected by intrusion detection systems, pollutes system logs, and may take years to complete. You can also get a rooted tablet, install a TCP scan, and get a signal upload it to the secure site. Then the IP address will open causing the password to appear on your proxy. It's often much easier to find another way into a system than cracking the password. Hack Step 9 Version 4.jpg 7 Get super-user privileges. Try to get root privileges if targeting a *nix machine, or administrator privileges if taking on Windows systems. Most information that will be of vital interest is protected and you need a certain level of authentication to get it. To see all the files on a computer you need super-user privileges - a user account that is given the same privileges as the "root" user in Linux and BSD operating systems. For routers this is the "admin" account by default (unless it has been changed); for Windows, this is the Administrator account. Gaining access to a connection doesn't mean you can access everything. Only a super user, the administrator account, or the root account can do this. Hack Step 10 Version 4.jpg 8 Use various tricks. Often, to gain super-user status you have to use tactics such as creating a buffer overflow, which causes the memory to dump and that allows you to inject a code or perform a task at a higher level than you're normally authorized. In unix-like systems this will happen if the bugged software has setuid bit set, so the program will be executed as a different user (super-user for example). Only by writing or finding an insecure program that you can execute on their machine will allow you to do this. Hack Step 11 Version 4.jpg 9 Create a backdoor. Once you have gained full control over a machine, it's a good idea to make sure you can come back again. This can be done by backdooring an important system service, such as the SSH server. However, your backdoor may be removed during the next system upgrade. A really experienced hacker would backdoor the compiler itself, so every compiled software would be a potential way to come back. Hack Step 12 Version 4.jpg 10 Cover your tracks. Don't let the administrator know that the system is compromised. Don't change the website (if any), and don't create more files than you really need. Do not create any additional users. Act as quickly as possible. If you patched a server like SSHD, make sure it has your secret password hard-coded. If someone tries to log-in with this password, the server should let them in, but shouldn't contain any crucial information. ©Beejay Cyber World

How to Format a Laptop

way to clean your computer. The procedure to reformat a laptop is rather simple in today's world. The manufacturer either provides the owner with a copy of the operating system (OS) or they create a restoration partition on the hard drive. Before beginning, however, it is important that you back up all of your information on an external hard drive or CDs and DVDs or else you will lose all of it in the process.

Method One of Two: Reformatting your Laptop with Installation CDs Edit Image titled Reformat a Laptop Step 1 1 Back up your hard drive. Reformatting your laptop will cause you to lose all of your information so it is recommended that you back up your hard drive on an external hard drive, CDs, or DVDs if you wish to keep it. Image titled Reformat a Laptop Step 2 2 Determine which method of restoration is provided by the manufacturer. If you received a set of installation CDs with your machine, then use this. If you did not, your computer may have a restore partition set up, which means you will need to employ a different method.[1] Image titled Reformat a Laptop Step 3 3 Insert the operating system disk into your CD/DVD drive. It normally auto-runs and will open to a menu, or options page. Select the option for installing a fresh copy of the operating system. If the CD doesn't run by itself, double click on "My Computer," and then right click on the drive with the OS disk. Click "Auto-Run." Image titled Reformat a Laptop Step 4 4 Wait for the CD to proceed automatically. If you are away from the computer for awhile, it will pause at the next point, awaiting any required input from you. Follow the prompts, be patient and avoid the temptation to intervene. This process may take a few minutes.[2] If you are reformatting your laptop hard drive, you will accept the default offerings/settings that the installation disc is asking for. Image titled Reformat a Laptop Step 5 5 Wait for the installation to complete. When the operating system installation is complete, a completely fresh desktop will appear.

Advertisement No Was this method helpful? Reformatting your Laptop with Installation CDs Yes Method Two of Two: Reformatting a Laptop Using Restoration Partition Edit Image titled Reformat a Laptop Step 6 1 Restart your computer. While the machine is rebooting, repeatedly press the F10 key on your keyboard until the machine boots. This will take you into the partition offering you options for repair or restore (reformatting and reloading). Image titled Reformat a Laptop Step 7 2 Select the option for installing a fresh system. The beauty of this system is that you don't have to do anything else. The restore partition will completely run the program to format, reload the OS, install drivers and install all of the original software that came with your laptop. Image titled Reformat a Laptop Step 8 3 Wait for the reformat to complete. This process will usually take around 30 minutes to complete.

©Beejay Cyber World

Monday, 26 September 2016

PC Freedom Cheat

*New Free Browsing On All Networks Using Pc And Mobile Phone On Freedom Vpn*

Free browsing now unleashed for all networks using old freedom vpn which means you can use it on either PC/desktop and mobile phone with any networks like glo, airtel, mtn, Etisalat and other africa countries networks of your choice. This free browsing has reigned and pass but now available again for those who does not have any data to browse hmmm is very slow and if you still wish to activate it kindly follow me as I will make it up to you.

How to browse free on all networks using freedom Vpn on mobile device

It is very simple and easy because it doesn't need too much tech so you need to have this requirements below;

Any network sim with 0.0kb Your freedom vpn - download freedom for mobile here. Leave your apn default.

How to set the freedom vpn

So after download, kindly launch your vpn and follow-up below;

Click on CONFIGURE at the bottom. Then click on CONNECTION. So after that, in the Freedom server use ems02.your-freedom.de or if you need more stable servers kindly see more below; ems23.your-freedom.de ems21.your-freedom.de ems22.your-freedom.de ems27.your-freedom.de ems29.your-freedom.de Then in Tweaks kindly choose Nigeria MTN . Then in Connection Mode choose DNS. Then in PORT insert 53.

So go back and click on START CONNECTION then immediately, it will start reading you can now go and browse but is slow.

How to use freedom vpn for PC/desktop

It is also easy so you need these prerequisites or requirements below;

REQUIREMENTS

Any network with 0.0kb Your USB Modem Your deskto/PC Your-freedom software Leave your apn default

How to set the freedom on any network on Pc

It's simple and easy, kindly download freedom vpn from here and install on your PC or desktop. Then launch your vpn and configure it like this below;

Register and account with them and. Click on ACCOUNT INFORMATION and input your username and password you used to register and save. Click on CONFIGURE at the bottom. Then click on CONNECTION. So after that, in the Freedom server use ems02.your-freedom.de or if you need more stable servers. ems23.your-freedom.de ems21.your-freedom.de ems22.your-freedom.de ems27.your-freedom.de ems29.your-freedom.de Then in Tweaks kindly choose Nigeria MTN . Then in Connection Mode choose DNS. Then in PORT insert 53. So configure your browser using 127.0.0.1 with 8080 port and start browsing slowly.

So you can now go back and connect then start blazing slowly with it.

Is it helpful? Do you encounter any problems while trying to set up kindly ask more questions and if it works for you kindly share your experience! ©Beejay Cyber World

How to Change your Phones IMEI

Am sure you must have seen various ways and methods to change android imei, But let me assure you that no matter the type of android device, this tutorial is all what you need, because you are going to know how to change your android imei in various ways just following the steps below.

Lets get started.

Firstly, lets talk about the benefits involved in changing your android phone’s imei to that of a blackberry or other imei.

You’ll be able to use Glo Bis On your Android device after Changing Imei. Using the Glo Bis of N1,000 for 3GB for a month. Free data that ranges from 2GB – 3GB from Mtn , Airtel and Etisalat by changing to a specific imei number.. We have different ways of changing android devices imei using various types of applications and tools but one of the most efficient way is using the mobile uncle app.

Download Mobile Uncle Tools from Google play Store Here

Download The English version of Mobile Uncle Tools Here

Lets get started with the steps:

STEP 1:

How To Change imei of Android Phones Using Mobile Uncle

Lets see the compatible android devices that mobile uncle tools works on

Mtk6589 device Mtk6582 device MTK65XX devices Quad Core Mediatek phones Octa Core Mediatek phones Requirement For Changing your Android Imei

Your Android device must be rooted. You can root your android device with kingroot.

After successful downloading mobile uncle tools. Install and launch mobile uncle. If you get pop-up requesting root permissions then,just grant the request and continue below

First create backup of current IMEI by choosing IMEI Backup Restore (MTK) and then select Backup IMEI to desired path.

Tap on Engineer Mode>>Engineer Mode (MTK) and then swipe your fingers to the left to scroll to right and going to Connectivity Tab.

Tap on CDS Information and open Radio Information >> Phone 1 or Phone 2 (This simply means Sim 1 or Sim 2, whichever you want to change IMEI)

Now you can see a AT+ written at the top, tap the end and depending on your sim, add the line: EGMR=1,7,”NEW SIM 1 IMEI” or EGMR=1,10,”NEW SIM 2 IMEI” and tap on send Command. Now you’re done. You just have to restart the phone and then to check your android phone’s new

IMEI,dial *#06#. Congrats,you’ve successfully changed your android phones imei!

STEP2:

How To Change Android Phone Imei to Blackberry Imei

Firstly, we need to generate a blackberry imei to put inplace of the android imei.

Download blackberry imei generator Here

After downloading,extract the file and double Click on GIPv4.1 Click on generate imei. copy down imei. Now launch mobile uncle tool, open the app, and navigate to Engineer Mode

In the next screen, click on Engineer Mode (MTK) slide the window to Connectivity just like we did before and then click on CDS Information After that,Click on Radio Information If you are using a dual Sim android phone, Phone 1 represents your Sim 1 and Phone 2 represents your Sim2. So choose the slot you want to swap imei with that of blackberry. Most guys choose sim1 though.

After choosing the desired slot, click on the (AT+) type in a word and then clear the word you typed. After clearing it, a dialogue box will Open click on AT+EGMR=1,7,”” In between (“”) type in the imei which you generated. Check if the numbers are same and equal Then, click on SEND AT COMMAND if you receive a message saying AT command sent and successful,you’re successful!

All you have to do now is to reboot your phone that all now you can rock your new imei and browse with it like a blackberry phone. but make sure you backup your previous Imei, I suggest writing it down on a Piece of Paper incase anything goes wrong so that you can quickly change it back.

And that’s it for changing your android phone’s imei

STEP3:

This steps involves another way to change your Android device Imei using the Terminal Emulator App.

How To change Android Device Imei using Terminal Emulator

Firstly, you need to download terminal emulator on your android device.

Download Terminal emulator from Google play store Here

Requirement:

A Rooted Android Device Lets get started

How to Change IMEI Number with Terminal Emulator of Android Phone-Tab For Single Sim Device

Open Android Terminal Emulator Type SU then press ENTER button to get Superuser(root) permission After that, type this command then press ENTER button echo ?AT +EGMR=1,7,?IMEI_NUMBER?? >/dev/ pttycmd1 or echo AT+EGMR=1*7*IMEI_1 >/dev/ pttycmd1 That’s it for single sim android phones. Now,for Dual Sim Phones

Open android terminal emulator. Type SU and then press ENTER Type following command then Eneter echo ?AT+EGMR=1,7, ?IMEI_NUMBER? ? >/ dev/ pttycmd1 If your phone is dual-sim, type this command then ENTER echo ?AT +EGMR=1,10, ?IMEI_NUMBER? ? >/dev/pttycmd1

Finally, The above steps are 100% tested and working ways to successfully change your android imei.

NOTE: Once you flash or factory resets your device, the imei you changed would restore back to default. And you have to carry out all the process above to change the imei number.

All the best guys

Monday, 12 September 2016

Etisalat Cheat

Etisalat 0.0k free browsing. Let's get started use your normal etisalat default settings

Lunch your psiphon app and use the settings below >> Proxy type : Real Host >> Proxy Server http://ent.nxtfwd.com/s/d/etisalat_ng#openModal

>> Real Proxy Type : inject

Then click on save. Next step go to options>more options and untick connect through HTTP

And then finally go back and connect it takes sec.

Sunday, 28 August 2016

Psiphon Handler Updates

✍ *Download All Psiphon VPN App Versions For Android And PC* http://www.vibertechs.c om/2016/08/download-all-psiphon-vpn- app-versions.html Vi