WHAT'S NEW?
Loading...
Best Custom ROMs For Rooted Android – After rooting android custom roms can be installed in android mobile.This cool rooting hack is very useful for rooted android. Custom rom are custom interface for android device that is very much different from the original interface of android. Like in Samsung Device you can use custom rom of LG, Sony Etc. Now popular custom roms are below in this post.

Best Custom ROMs For Rooted Android

These are the 5 best custom roms for Rooted android.If you want to download then go through this:-

Custom ROMs For Rooted Android

  1. AOKP ROM- Best Custom ROM For Rooted Android 
AOKP-Android Open Kang Project, is an open source replacement distribution for smartphones and tablet computers based on the Android mobile operating system. The name is a play on the word kang and AOSP (Android Open Source Project). The name was a joke, but it stuck. It was started as free and open source software by Roman Birg based on the official releases of Android Open Source Project by Google, with added original and third-party code, features, and control.
AOKP allows users to change many aspects of the OS including its appearance and its functions. It allows customizations normally not permitted by the factory firmware.
  • Custom Toggles: Users can customize the buttons present in the Quick Settings pulldown which allow the user to toggle various functions of the device such as the Wi-Fi or the Bluetooth. Users also have the ability to create their own toggles should it not be available.
  • LED control: The color and pulsing of the notification LED can be custom set for various applications.
  • Navigation ring: Actions can be assigned to the navigation ring, to allow for quicker access applications.
  • Ribbon: Allows users to use swipe gestures anywhere and enables a system-wide custom application shortcuts and actions.
  • Vibration patterns: Users can build custom vibration patterns to be assigned to notifications from certain applications or calls from certain people.
  • Native theme support: Themes, downloaded from the Google Play Store or from other sources, can be applied to give a modified appearance to the device interface.
  • Permission control: Support is included for revoking permissions from applications such as denying their ability to use the camera or wake the device.
  • CPU overclocking: Increase operating speed of the mobile phone to improve its performance.
AOKP is designed to increase performance and reliability over official stock firmware releases.
2. CyanogenMod- – Best Custom ROM For Rooted Android 
cyanogenmod
It is an open-source operating system for smartphones and tablet computers, based on the Android mobile platform. It is developed as free and open source software based on the official releases of Android by Google, with added original and third-party code. It is based on a rolling release development model.
CyanogenMod offers features and options not found in the official firmware distributed by mobile device vendors. Features supported by CyanogenMod include native theming support,FLAC audio codec support, a large Access Point Name list, an OpenVPN client, Privacy Guard (per-application permission management application), support for tethering over common interfaces, CPU overclocking and other performance enhancements, unlockable bootloader and root access, soft buttons and other “tablet tweaks”, toggles in the notification pull-down (such as Wi-Fi, Bluetooth and GPS), and other interface enhancements. CyanogenMod does not contain spyware or bloatware, according to its developers.CyanogenMod is also stated to increase performance and reliability compared with official firmware releases.
3. MIUI- Best Custom ROM For Rooted Android 
miui
MIUI (which stands for Mi User Interface and pronounced “Me You I”, a play on the common abbreviation of the words user interface as UI),developed by Xiaomi Tech, is a stock and aftermarket firmware for smartphones and tablet computer based on the free software Android operating system.MIUI includes various features such as theming support.Critics considered it as a duplicate of apple’s Mobile Operating system iOS for android. Many says it is ‘Blatantly copied iOS for android’.Xiaomi has released various smartphones, all of which come pre-installed with a complete version of MIUI. This includes various apps and features not available in the aftermarket version of MIUI.
4. Slim Bean- Best Custom ROM For Rooted Android 
slimbean
Slim Bean is considered as the simplest custom ROMs for Android because it focuses more on providing a simple user interface without bugs to its users. Not only the interface, but when you use the ROM, you will find it a lot easier to work with it.The best part about Slim Bean ROM is that it lets you update to the latest Android version with just one click and you won’t have to worry about downloading new ROMs. This custom ROM uses  a custom Kernel as the processor so that you get better performance from your device and a better battery backup.
5. OMNI ROM
omnirom
OmniROM is a free software operating system for smartphones and tablet computers, based on the Android mobile platform. It involves a number of prominent developers from other projects.The project is a reaction to the commercialisation of ROM project CyanogenMod.The project provides Android 4.4 (KitKat) based ROMs for experimentation, including support for the Galaxy Note II. Other devices supported include the Galaxy Note, Galaxy S3,Galaxy S4, Nexus 4, Nexus 5, Nexus 7, LG Optimus G, Galaxy S2, HTC One , Oppo Find 5, Sony Xperia T, HTC Explorer.Involved main developers: P. Binder, J-H. Ude, Y. Taeuber, S. Rein.Since June 2015, there are Android 5.1.1 nightly releases based on Android Lollipop for the Asus Transformer Pad, Asus Transformer Pad Infinity, Nexus 4, Nexus 5, Nexus 6, Nexus 7, Nexus 10, Oppo Find 7/7a, OnePlus One, Sony Xperia Z and Sony Xperia ZL.
Best Custom ROMs For Rooted Android – Use these custom rom and you will install custom rom in clockworkmod of android device.

Now a days PC is an essential part of everyone. this is because of the multitasking capability and multifunctional design of PC. There are various types of PC’s according to persons need. The PC’s varies from low end (simple and basic) to high end (advance and high tech). But after some time PC start to lag and become slow regardless of what type of PC we use. It can happen due to many reasons.
Whenever such issue is faced most of people try to reinstall or restore windows. sometimes the issue is resolved if the problem is due to (virus,worms etc). But mostly this extreme step didn’t help. So before going with this extreme step in which you have to copy and backup your data etc, you should give a try to these ideas first.

Simple steps:-

Keep you desktop clean:-
I don’t mean physically clean. Just keep only necessary icons on the desktop screen and delete or move extra files from there to some drive. This will make you desktop look good, wallpaper will be more visible and it will increase speed a little.
Reduce Startup load:-
It is easier than it sound. By startup load i mean the number of programs that run when the windows is started. The lower is the startup load the higher is the performance the better is the speed and PC will start faster.
Remove unnecessary Programs:-
You should figure out which programs you no longer need and remove them as it will same memory and will make your PC work faster.
Keep memory free:-The free memory is very essential for better performance of computer. you should always have some free memory in all drives and if possible you should keep drive C: (or drive i which window is installed) more than or nearly half empty.
Antivirus and other Tune up softwares:-
Virus , bugs, worms, trojan horse etc are also a major cause for the slowing down of the PC. This can be easily handled by use of a decent antivirus software. Besides Antivirus there are other tune up software which helps you optimize performance of the PC like Tune-Up utilities.

Advance steps:-

Defragmentation:-
Our PC’s memory is made up of cells or fragments. each fragment is used to store data and when ever the data is deleted the fragment become empty but is not used until all Fragments are not filled or Defragmentation is not done. the more the memory is fragmented the slower PC will be.
To perform defragmentation:-
Click on Start > All Programs > Accessories >Systems Tools > DiskDefragmenter
Then select the Disk Drive which you would like to defragment, and then click on Defragment Disk.
Increase RAM:-
If the above steps wont help then changing windows might not work either this means either your RAM is low or Hard drive is slow. If RAM is slow then you can simply install new RAM and increase performance.
Using pendrive for readyboost
You can simply use empty space of a pendrive to increase speed of the PC by using readyboost function. to perform readyboost you need to open properties of the pendrive and select readyboost option. if the drive is capable for readyboost you can do it by one click.
We already shared various posts on Hacking WiFi, Passwords, computers etc by various methods. But one thing we haven’t shared with you yet is how to convert our android mobile phone into a total hacking machine which can perform various hacking tricks including hacking password and searching for vulnerabilities.
All this can be done by simply installing an amazing hacking app known as zANTI. you can use this app to make your android device a hacking machine. it can be used without rooting but to access all the functions its better if we root our device.


How Hackers Hack – Passwords, WiFi and Computer from Android

ZAnti is a penetration testing toolkit for android mobile phone. This is like a Metasploit of an android mobile phone and performs all type of attacks in your android phone.

Some of the many features of zAnti are:

-Network Mapping

network mapping helps to identify all the devices which are connected to your network. it provides network address of the network, IP address of each device and type of each device is also mentioned. It also tells about the number of ports.

-Password cracking with various protocol support

-Search for known vulnerabilities

-Check for SSL Poodle and ShellShock vulnerabilities
-Perform various man in the middle attacks

Man in the middle attacks are those in which hacker resides in between the communication path of two parties and receive messages from both ends and forward messages to both ends while acting as a genuine party. Hacker can read and manipulate message according to its need and forward the altered messages to communication parties.

How Hackers hack Use zAnti:-


  • zAnti is not available on Google Play Store. Therefore you need to download it from it official site zimperium.com . Click here to download
  • While on zimperium.com enter your email address in box ,click download and you will receive a download link for the application in your inbox.
  • Download .apk file from link and copy it into your mobile.
  • Install the application and run the application.
  • Register by entering your email address.
  • On the top of the app you will see a refresh button. it will list all the devices connected with your network (network mapping).
  • Click on any device you want to hack.
  • The new opened screen will give you options for various types of man in the middle attacks.
  • It also give you other options like checking for shellshock vulnerability,SSL poodle and advance scan options etc.
There are so many features in this which can easily figured out by anyone on their own once they start using this app. Its a great app for hacking using android mobile phone.


The type of dangerous adware that Lenovo pre-loaded on PCs earlier this year will soon be banned entirely from Windows devices.
In a post on its TechNet blog (viaEngadget), Microsoft said it will no longer allow ad injection software that uses “man-in-the-middle” techniques, such as injection by proxy, changing DNS settings, and network layer manipulation. Microsoft will begin enforcing the rules on March 31, 2016.
Once the policy goes into effect, adware will only be allowed through browsers’ official extensibility methods. In other words, if you want to see adware in Chrome for some reason, you’ll have to go to the Chrome Web Store and install it yourself. You’d then be able to uninstall the adware just as easily through Chrome’s extensions menu.
As we saw with Lenovo’s Superfish scandal, “man-in-the-middle” adware isn’t just intrusive, it can also pose a security risk by replacing the certificates websites use to keep your data safe. In the case of Superfish, the software generated its own root certificate so it could intercept traffic from secure sites and overlay its own ads on the page. If hackers were to gain access to this certificate, they’d be able to spoof secure websites and steal sensitive data.
Although Microsoft and other anti-malware vendors shut down Superfish months ago (and Lenovo vowed to stop shipping PCs with third-party bloatware entirely), the new policy tackles the underlying issue by reclassifying the criteria for adware. “The choice and control belong to the users, and we are determined to protect that,” Microsoft said.
The story behind the story: It’s hard to imagine many people being bothered by the new policy, which raises the question of why Microsoft took so long to implement it. Just to speculate, perhaps Microsoft was reluctant to outlaw behavior that could have some legitimate use cases, but has changed its mind as clear instances of abuse have arisen. And with all major browsers moving away from unrestricted plugins and toward signed extensions, it’s getting easier for users to control what’s being installed directly in their browsers.
Li-Fi stands for Light Fidelity, and it's being presented at this time as an eventual replacement for Wi-Fi-transmitted internet. While the term Li-Fi actually does stem from the term Light Fidelity, the word Wi-Fi stems from Hi-Fi, or High Fidelity, from the audio term for home audio, high-quality sound production. The people presenting Li-Fi have taken the concept of the Signal Lamp (aka the Aldis Lamp), sending morse code between ships at sea, instead sending data to your phone. Li-Fi is also known as visible light communications (VLC) technology.
A company by the name of Velmenni has produced a lightbulb that works with Li-Fi technology on a small scale. They are not the first to prove the technology works, but they are the first to carry out a "real-world test." Their demonstrations have shown data transfer speeds of around 1 Gbps, or just around 100-times faster than the average Wi-Fi data speed in the USA today.
Below you'll see Velmenni using this technology with a smartphone.
Harald Haas is a physicist and professor of mobile communications at the University of Edinburgh. He was the first to coin the term Li-Fi, doing so at a TED Talk during TEDGlobal 2011. Haas also coined the term visible light communications (VLC).
Below you'll see Harald Haas' Li-Fi TED Talk - where Li-Fi was essentially made public - recorded back in 2011 in the month of July.



This man also created the group pureLiFi, and announced near the end of November, 2015 that this company would partner with the company Lucibel to "co-develop and market Europe’s first, fully industrialized LiFi luminaire."
That means they're making a lightbulb with Li-Fi technology inside.
Li-Fi can deliver data quite a bit faster than Wi-Fi, but like Wi-Fi, its speed depends on the initial potential speed of the data being delivered by, for example, your home internet service. If your home internet speed is capped at 1Gbps speeds, your Li-Fi system wont go any faster than that.
Li-Fi depends on your device being within range of the light being transmitted by your Li-Fi bulb. You literally need to be able to see the light to get the data.

In the image of the house you'll see above, you'll see how cellular towers and "mobile internet" connects you outdoors (and indoors, of course), while Wi-Fi remains largely indoors. Wi-Fi connects you just so long as you're within range of a Wi-Fi router, around corners and through walls.
Again, Li-Fi requires that you be in the stream of light being emitted by the light source. This limitation does not seem to be deterring creators like Haas, who suggests that "these opportunities are on a similar scale as the photography industry’s move from analogue to digital technology."
The roll-out of Li-Fi technology is not an absolute lock. This is still a relatively new technology, and not one that's going to take over or negate all past technologies - mostly because of its present limitations.
Instead, you can imagine Li-Fi to be an addition to the internet transmissions technologies that are already in use today.
You can think of Li-Fi vs Wi-Fi or Mobile Data sort of like a gaming console (like a PS4 or Xbox One) compared to a gaming PC. While gaming PCs might be moving faster and providing a more hi-fi experience for gamers, there are still going to be masses of users sticking with a console for years to come - if only because it's more convenient to play games on one's own TV.
Will you be an early adopter, or will you wait for a large roll-out worldwide?
(Source: http://www.slashgear.com/what-is-li-fi-and-how-practical-is-it-in-the-real-world-30416365/)



In the Culture novels by Iain M. Banks, futuristic post-humans install devices on their brains called a “neural lace.” A mesh that grows with your brain, it’s essentially a wireless brain-computer interface. But it’s also a way to program your neurons to release certain chemicals with a thought. And now, there’s a neural lace prototype in real life.

A group of chemists and engineers who work with nanotechnology published a paper this month in Nature Nanotechnology about an ultra-fine mesh that can merge into the brain to create what appears to be a seamless interface between machine and biological circuitry. Called “mesh electronics,” the device is so thin and supple that it can be injected with a needle — they’ve already tested it on mice, who survived the implantation and are thriving. The researchers describe their device as “syringe-injectable electronics,” and say it has a number of uses, including monitoring brain activity, delivering treatment for degenerative disorders like Parkinson’s, and even enhancing brain capabilities.


Writing about the paper in Smithsonian magazine, Devin Powell says a number of groups are investing in this research, including the military:

[Study researcher Charles Lieber’s] backers include Fidelity Biosciences, a venture capital firm interested in new ways to treat neurodegenerative disorders such as Parkinson’s disease. The military has also taken an interest, providing support through the U.S. Air Force’s Cyborgcell program, which focuses on small-scale electronics for the “performance enhancement” of cells.
For now, the mice with this electronic mesh are connected by a wire to computer — but in the future, this connection could become wireless. The most amazing part about the mesh is that the mouse brain cells grew around it, forming connections with the wires, essentially welcoming a mechanical component into a biochemical system.
Lieber and his colleagues do hope to begin testing it on humans as soon as possible, though realistically that’s many years off. Still, this could be the beginning of the first true human internet, where brain-to-brain interfaces are possible via injectable electronics that pass your mental traffic through the cloud. What could go wrong?
 There's been a lot of commotion over W10's privacy terms. I'm sure these methods can change/improve at any time, but here's a guide which should hopefully give you a relatively more private, safe experience, however at the risk of not being able to enjoy some of W10's features.
Before/During Installation
Do not use Express Settings. Hit Customize, and make sure everything is turned off.It's strongly preferred that you use a local account with Windows 10.
After Installation
Head to Settings > Privacy, and disable everything, unless there are some things you really need.While within the Privacy page, go to Feedback, select Never in the first box, and Basic in the second box.Head to Settings > Update and Security > Advanced Options > Choose how updates are delivered, and turn the first switch off.Disable Cortana by clicking the Search bar/icon.(Optional) Disable web search in Search by going to Settings, and turning off Search online and include web results.Change the name of your PC by going to Start (or hitting the Windows key), typing About PC, and clicking Rename PC.
Slightly Complex
Open up the Command Prompt by launching cmd as an administrator, and enter the following:
sc delete DiagTrack
sc delete dmwappushservice
echo "" > C:\ProgramData\Microsoft\Diagnosis\ETLLogs\AutoLogger\AutoLogger-Diagtrack-Listener.etl
Open up the Group Policy Editor by launching gpedit.msc as an administrator. Go through Computer Configuration > Administrative Templates > Windows Components > Data Collection and Preview Builds. Double click Telemetry, hit Disabled, then apply. NOTE: This only truly works in the Enterprise edition, but the final step provides a decent enough workaround for Pro users. While still in the Group Policy Editor, go through Computer Configuration > Administrative Templates > Windows Components > OneDrive, double click Prevent the usage of OneDrive for file storage, hit Enabled, then apply. While still in the Group Policy Editor, go through Computer Configuration > Administrative Templates > Windows Components > Windows Defender, double click Turn Off Windows Defender, hit Enabled, then apply. Open up the Registry Editor by launching regedit as an administrator. Go through HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection, select AllowTelemetry, change its value to 0, then apply. First, download the Take Ownership tweak and enable it. Then, head to the Hosts File by going through C:\Windows\System32\Drivers\Etc, take ownership of the hosts file, and add all of the IPs from this page into the file.
Up To You
Replace Microsoft Edge/Internet Explorer with Firefox, Chromium, or any forks/variations of them.Replace Windows Media Player with VLC or MPC-HCReplace Groove Music with Foobar2000, Winamp, or MusicBee.Replace Photos/Windows Photo Viewer with ImageGlass or IrfanView.