Tuesday, 14 April 2015

Tutorial on Hacking With Kali Linux

Tutorial on Hacking With Kali Linux

Hacking With Kali Linux


Why Kali Linux?


With Kali Linux, hacking becomes much easier since you have all the tools (more than 300 pre-installed tools) you are probably ever gonna need. Others can be downloaded easily. Now this tutorial will get you started and you'll be hacking with Kali Linux before you know it.




The problem with beginners

Now, I've been dealing with beginners since a long time. What they want is magic. A tool which is easy to use, works on Windows, can be download by searching on Google and clicking on the first link we see, and will do all the hacking itself on the push of a button. Sadly, no such tool exists. Hacking is an art, and it takes years of practice to master it. So how to get started? Having no idea about hacking is okay, but being a newbie with computers in general is not allowed. When I say beginner, I mean someone who has no experience with programming and with hacking methodologies. I didn't mean someone who needs a 1 page guide on how to download a tool. If you want to be a hacker, you have to work hard. So how to get started? If you have installed Kali Linux,  click here to skip past the installation paragraphs and go to hacking section of this post)





Getting Started

Now, I am not boring you with theory (^ As if all this wasn't enough theory). My aim is to get you to the point where you can start hacking with Kali Linux as soon as possible. What I'm gonna do is tell you what to do. The process is rather simple :-


Things get tough now

If you have no previous experience with Linux and virtual machines and all that stuff, getting Kali Linux up and running won't be a piece of cake.You have 2 options :


1. Read the Kali official documentation

That will give you an idea about what is a virtual machine, how OS can be run from USB, and how to create a partition and run 2 OS simultaneously. This is what I recommend. For that, go to Kali Official Documentation . 

2. Read my modified version of Kali documentation

The second option is to look at these posts, which are just sparingly modified versions of the Kali docs, and offer no advantage other than saving your time as their documentations cover much more than what the ones here do, and you don't really need to know all so much... yet. I'm linking them up here:



    Command Line Interface

    Some bash commands
    Now, if you are really sure about becoming a hacker, you have to get used to linux, and specifically the command line interface. It is often compared to (and rightly so) to command prompt of Windows, but Linux' cli is much efficient and better than command prompt. What you have to do is do all the usual tasks you do in Windows in cli of Linux. Use cd to navigate, poweroff to shutdown, etc.
    A pretty awesome site for that is - http://linuxcommand.org/
    Going through the complete site is on its own enough exercise to keep you occupied for a month, but you can proceed gradually. The first few tutorials here will keep in mind that you don't have much info about cli, and will be really beginner friendly.



      Some Useful Commands:

      If you don't plan on learning all of linux cli commands, here are a few that will keep your boat afloat.
      1. The default username and password is 'root' and 'toor'. 
      2. Type 'poweroff' in the terminal to shutdown. 
      3. apt-get command can be used to install tools and updates. 
      4. apt-get update and apt-get upgrade will update all the programs installed on your machine. 
      5. apt-get dist-upgrade will install the latest distribution of Kali(i.e. it upgrades your OS).
      PS : Tapping <tab> while typing makes Kali complete the word for you . Double tapping <tab> makes it display all possible words starting with the incomplete word. Ctrl+c stops the functioning of any tool that is running. Pressing the up arrow key shows the command you last typed.


      Some Real Hacking With Kali Linux

      Assuming you've gone through the above steps and are comfortable with your new hacking environment, its time to do some real hacking with Kali Linux.My recommendation would be to start by hacking a wifi, then do some penetration testing, and maybe read something on Denial of Service when you have free time. Links here-

      Hack wireless networks in Kali Linux using aircrack 

      Penetration Testing In Kali For Beginners

      Denial Of Service Attacks


      HACK EMAIL-ID,USERNAME AND PASSWORD OR ANY USER DETAILS BY USING KALI LINUX.

      HACK EMAIL-ID,USERNAME AND PASSWORD OR ANY USER DETAILS BY USING KALI LINUX


      Facebook hack by nerd programmer

      Today,i am going to show you how you can get email-id,username and password or any user details you want by using KALI LINUX.

      STEPS FOR SETTING UP YOUR SYSTEM.

      1. Download Kali Linux from here.
      2. Extract the contents of Kali Linux iso file which you  downloaded in step and copy it to pendrive or instead of pendrive burn the iso file in cd if you want to make a cd of it.
      3. After copying all contents to pendrive or burning the iso file in cd,reboot you system,press F8 on boot-time and select boot from pendrive if you have copied all the files in pendrive,else boot from cd-rom if you burn the iso file in cd.
      4. After selecting the boot from device,the kali installation window will open,install accordingly as per your requirement.
      5. NOTE:During installation,in mount point of selected installation drive,set mount point to "/".
      6. Remember the username and password while installation as this will be necessity for this hacking method.
      7. Once,installation is completed,system will reboot,login your account.
      8. Your system is ready for use.
      Method which we are using to hack the username and password or any user details isSocial Engineering Toolkit method.


      NOW LETS SET IT UP.

      • Open terminal using ctrl+alt+t or click on the small black window image on the top left of your screen.
      • Once terminal is open,type the code carefully.
      sudo root
       Then enter your root username and password.Don't close the terminal.

      • Next step is to open social engineering toolkit.For this type the below command in terminal.
      se-toolkit

       You will see something in terminal of your system as shown below in the image.
        

      ymail hack by nerd programmer
      • As shown above in image,you too will see the menu in your terminal.Press "1" and hit enter as we are going to do Social-Engineering Attacks.You will see something in terminal as shown below in the image.
      facebook hack by nerd programmer
        gmail hack by nerd programmer
        • Once again,you will get a menu as shown above in the image.We are going to select Website Attack Vectors,so press "2" and hit enter.You will see something as shown in the image below.
        nerd programmer
        • In this method,we are going to get the credential of the victim,so press "3" and hit enter as it will select credential harvester attack method.This will open  new menu as shown below in the image.

        facebook hack by nerd programmer
        • Since,we want the username and password which is credential of victim,so we need to trap the victim in a look a like page to original website page(like phishing page) and for that we need to clone a website.To do this,press "2" and hit enter which will open something like shown below.
          ymail
        In above image,you might have noticed a red colour rectangle box made by me,in that box,you will find "tabnabbing:XXX.XX.XXX.X" where this "XXX.XX.XXX.X" is you computer IP address.To find IP address of your computer,open a new terminal and type the command given below.
        su root
        enter_your_root_password
         ifconfig
        In above command,we first gain the root access,and then afterwards type "ifconfig"  and hit enter to get the IP address.
        Copy paste this IP address at the end of "Tabnabbing:".I have used my IP address but for security reasons i can't reveal it,so i have posted here "XXX.XX.XXX.X".Please note that,if you don't put your computer IP address,they this method won't.After entering your IP address,hit enter.It will ask your to enter the url of website you want to clone as shown below.Here,i had entered "www.ymail.com" as i want to hack someone ymail account.The below image represents all the steps.
        It will give a message that its working on cloning the site and will take a little bit time.
        Once the process is completed,you will see something as shown in the image below.
        • The next step is the most important step,till now we have make your IP address go online and anyone who visit your IP address will see the page which will look like the website of whose url you entered to clone.In this step,you need to shortened your IP address by using services like ADF.LYBinboxGoo.gl,etc.Once you enter your ip address on these sites to shorten,they will provide you a link,all you need to do is just send this shortened link to your victim.
        • When the victim visit the url which you have sent them,the will see a same page of which                   url you had entered to clone the website.The victim will think that it is a original page and when the victim enters any of their information,you will see that information in the terminal.
        • In this example,i have used ymail.com.Therefore,the victim will see homepage of yahoo mail.This is only the login form,i have entered the login username as:"Kali used to hack email-id and password" andpassword as: "Hacking successfull".

        NOTE:VICTIM CAN IDENTIFY THAT THE PAGE IS A TRAP AS THE ADDRESS BAR OF BROWSER WILL BE HAVING YOUR IP ADDRESS.FOR BEST RESULTS,SEND THE SHORTENED URL TO VICTIM MOBILE AND ASK THEM TO VISIT URGENTLY,OR YOU CAN SAY VISIT THIS LINK AND LOGIN TO GET LATEST UPDATES OF THEIR FAVOURITE CONTENTS,ETC.

        RESULT.

        The username and password will be shown in terminal window and will be similar to the image shown below.

        Vodafone Customer Care Number for all Indian States

        Vodafone Customer Care Number for all Indian States

        vodafoneVodafone is a very popular network among Indians and it tops many network providers, recently it getting much more hotter then Airtel and Docomo as its internet services are blossoming among Indian people. Well earlier we posted on how you can check internet balance among different network providers and evengetting 3g settings on various networks well today I will be showing you how you can connect to Vodafone customer care center using different numbers for different states.
        Earlier I even posted this for Tata Docomo so you were able to chat live with those guys and sort out your issues. So now there is common number for everyone but if you wanna go specific state by state then the list is below.

        Universal Vodafone Customer Care Number

        Dial 111 (wait) and u get some offers to be heard, don't keep hearing those offers ... press 9 then 2 and after that Again 9 u will certainly be directed to the CUSTOMER CARE EXECUTIVE. (Valid for all Indian States)

        Vodafone Customer Care Number for Specific States


        But in any case you wanna go specific for any State in India, then you can dial below direct hotline numbers.
        • Andhra Pradesh: Dial 9885098850from any phone or e-mail atvodafonecare.ap@vodafone.com
        • Chennai: Dial 9884098840 from any phone or e-mail atvodafonecare.chn@vodafone.com
        • Delhi & NCR: Dial 9811098110 from any phone or e-mail atvodafonecare.del@vodafone.com
        • Gujarat: Dial 9825098250 from any phone or e-mail atvodafonecare.guj@vodafone.com
        • Haryana: Dial 9813098130 from any phone or e-mail atvodafonecare.har@vodafone.com
        • Karnataka: Dial 9886098860 from any phone or e-mail atvodafonecare.kar@vodafone.com
        • Kerala: Dial 9846098460 from any phone or e-mail atvodafonecare.ker@vodafone.com
        • Kolkata: Dial 9830098300 from any phone or e-mail atvodafonecare.kol@vodafone.com
        • Maharashtra & Goa: Dial 9823098230(Postpaid)/ 9923399233 (Prepaid) from any phone or e-mail atvodafonecare.mah@vodafone.com
        • Mumbai: Dial 9820098200 from any phone or e-mail atvodafonecare.mum@vodafone.com
        • Punjab: Dial 9888098880 from any phone or e-mail atvodafonecare.pun@vodafone.com
        • Rajasthan: Dial 9828098280 from any phone or email us atvodafonecare.raj@vodafone.com
        • Tamil Nadu: Dial 9843098430 from any phone or e-mail atvodafonecare.tn@vodafone.com
        • UP(East): Dial 9839098390 from any phone or email us atvodafonecare.upe@vodafone.com
        • UP(West): Dial 9719097190 from any phone or e-mail atvodafonecare.upw@vodafone.com
        • West Bengal: Dial 9732097320 from any phone or e-mail atvodafonecare.wb@vodafone.com

        Hacking Website with Sqlmap in Kali Linux

        Hacking Website with Sqlmap in Kali Linux

        In the previous tutorial, we hacked a website using nothing but a simple browser on a Windows machine. It was a pretty clumsy method to say the least. However, knowing the basics is necessary before we move on to the advanced tools. In this tutorial, we'll be using Kali Linux (see the top navigation bar to find how to install it if you haven't already) and SqlMap (which comes preinstalled in Kali) to automate what we manually did in theManual SQL Injection tutorial to hack websites.




        Now it is recommended that you go through the above tutorial once so that you can get an idea about how to find vulnerable sites. In this tutorial we'll skip the first few steps in which we find out whether a website is vulnerable or not, as we already know from the previous tutorial thatthis website is vulnerable.

        Kali Linux

        First off, you need to have Kali linux (or backtrack) up and running on your machine. Any other Linux distro might work, but you'll need to install Sqlmap on your own. Now if you don't have Kali Linux installed, you might want to go to this page, which will get you started on Beginner Hacking Using Kali Linux

        Sqlmap


        Basically its just a tool to make Sql Injection easier. Their official website  introduces the tool as -"sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections."
        A lot of features can be found on the SqlMap website, the most important being - "Full support for MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, Sybase and SAP MaxDB database management systems." That's basically all the database management systems. Most of the time you'll never come across anything other than MySql. 

        Hacking Websites Using Sqlmap in Kali linux

        Sql Version

        Boot into your Kali linux machine. Start a terminal, and type -
        sqlmap -h
        It lists the basic commands that are supported by SqlMap. To start with, we'll execute a simple command
        sqlmap -u <URL to inject>. In our case, it will be-
        sqlmap -u http://testphp.vulnweb.com/listproducts.php?cat=1
        Sometimes, using the --time-sec helps to speed up the process, especially when the server responses are slow.
        sqlmap -u http://testphp.vulnweb.com/listproducts.php?cat=1 --time-sec 15
        Either ways, when sqlmap is done, it will tell you the Mysql version and some other useful information about the database.
        The final result of the above command should be something like this.
        Note: Depending on a lot of factors, sqlmap my sometimes ask you questions which have to be answered in yes/no. Typing y means yes and n means no. Here are a few typical questions you might come across-
        • Some message saying that the database is probably Mysql, so should sqlmap skip all other tests and conduct mysql tests only. Your answer should be yes (y).
        • Some message asking you whether or not to use the payloads for specific versions of Mysql. The answer depends on the situation. If you are unsure, then its usually better to say yes.

        Enumeration

        Database

        In this step, we will obtain database name, column names and other useful data from the database.
        List of  a few common enumeration commands
        So first we will get the names of available databases. For this we will add --dbs to our previous command. The final result will look like -
        sqlmap -u http://testphp.vulnweb.com/listproducts.php?cat=1 --dbs
         So the two databases are acuart and information schema.

        Table

        Now we are obviously interested in acuart database. Information schema can be thought of as a default table which is present on all your targets, and contains information about structure of databases, tables, etc., but not the kind of information we are looking for. It can, however, be useful on a number of occasions. So, now we will specify the database of interest using -D and tell sqlmap to enlist the tables using --tables command. The final sqlmap command will be-
        sqlmap -u http://testphp.vulnweb.com/listproducts.php?cat=1 -D acuart --tables
        The result should be something like this -
        Database: acuart
        [8 tables]
        +-----------+
        | artists   |
        | carts     |
        | categ     |
        | featured  |
        | guestbook |
        | pictures  |
        | products  |
        | users     |
        +-----------+
        Now we have a list of tables. Following the same pattern, we will now get a list of columns.

        Columns

        Now we will specify the database using -D, the table using -T, and then request the columns using --columns. I hope you guys are starting to get the pattern by now. The most appealing table here is users. It might contain the username and passwords of registered users on the website (hackers always look for sensitive data).
        The final command must be something like-
        sqlmap -u http://testphp.vulnweb.com/listproducts.php?cat=1 -D acuart -T users --columns
        The result would resemble this-

        Data

        Now, if you were following along attentively, now we will be getting data from one of the columns. While that hypothesis is not completely wrong, its time we go one step ahead. Now we will be getting data from multiple columns. As usual, we will specify the database with -D, table with -T, and column with -C. We will get all data from specified columns using --dump. We will enter multiple columns and separate them with commas. The final command will look like this.
        sqlmap -u http://testphp.vulnweb.com/listproducts.php?cat=1 -D acuart -T users -C email,name,pass --dump
         Here's the result
        John Smith, of course. And the password is test. Email is email@email.com?? Okay, nothing great, but in the real world web pentesting, you can come across more sensitive data. Under such circumstances, the right thing to do is mail the admin of the website and tell him to fix the vulnerability ASAP. Don't get tempted to join the dark side. You don't look pretty behind the bars. That's it for this tutorial. Try to look at other columns and tables and see what you can dig up. Take a look at the previous tutorial on Manual SQl Injection which will help you find more interesting vulnerable sites.

        Hack Facebook Account : Stuff You Should Know

        Hack Facebook?

        Okay, so you got lured into the idea of hacking a Facebook account? I won't ask why. Everyone has their reasons. If you came here to learn how to hack a Facebook account, feel free to leave, because the title read - Hack Facebook Account : Stuff You Should Know -and not - How to hack a facebook account (well actually don't leave, I have something for you later in this tutorial, something on actually hacking Facebook) .That being said, there are a lot of real hacking tutorials around the website you might want to read. However, if you are here on a pure curiosity basis, then read on, and you will be a smarter person by the end of this post than you were when you began reading it.

        Why not to think about hacking facebook

        Search google images for facebook hack and you already
         see so many misleading programs. I mean
        just enter user ID and they'll provide
         you with username and password.
        It's surprising how many people actually expect it to work.

        First, because you can't. Well, actually you can, but the high improbability of success makes it stand next toyou can't hack facebook. If you think typing 'hack facebook account' on google, clicking on the first result, and entering the target's email address will give you the password of his/her Facebook account, then you are not on the general level of stupidity, you have achieved an appreciatively high one. Come on, if it were so easy to hack a FB account no one would be using FB to start with. There is so much on our Facebook account that we can't even imagine the consequences if it were to get into the hands of a seasoned hacker, leave alone a novice (not even a novice for that matter) who just searched google for hacking facebook.
        impossible, so much so, that I won't be exaggerating in saying that it can't be hacked. As far as the picture on the left is concerned, its one of the many tools offered on the internet, all of which have the following in common-
        1. All have very easy user interface. You just have to enter the user id, and click hack.
        2. All have download links which will take you to a survey, or some annoying ads.
        3. All are 100% not working.


        What does 'hacking Facebook' actually mean?

        What is the actual meaning of hacking Facebook. Most of us are misguided by the term hacking in general. Hacking incorporates the attainment of someone's password, but hacking is so much more. Account passwords to hacking are just like coins are to the subway surfer game. You get coins along the way, your progress is partially judged on the basis of coins acquired, but the idea is to find your way through the obstacles and keep moving ahead. In general sense, when you use the term hacking Facebook, you mean to understand the functioning of the website, find out about its database management systems, scripts employed, use of cookies, language on which it is built on, etc. Then you find vulnerabilities in the working of the websites, and code exploits to break through the obstacles and gain privileges into their systems, using suitable payloads. The next step would be privilege escalation. For example, you found out a vulnerability that allows you to look into the database and see the email address and cellphone number of any user. You would want to escalate your privileges and also gain access to their passwords. The last step may be setting up a backdoor, for quicker access next time. Another step might be to clear your traces so that you don't get caught. And trust me, you can't do this. I mean you wouldn't be reading a blog on beginner level hacking on Kali Linux if you had so far with web pentesting. So, the conclusion is that hacking Facebook is a real big deal, not everyone's piece of cake (I admit even I'm nowhere close to the level of expertise where I would be playing with databases on Facebook servers). And the Facebook passwords are just a reward that you get after hacking Facebook. But are we missing something? There can't be only one way to get someone's facebook password. I mean we don't want administrator access to all the Facebook databases, just a password of one of the millions of users. There must be a hole somewhere. That kid next door claims he can get Facebook password of anyone, and he's good, but not 'code a exploit for Facebook' good, no, not that good. This is where social engineering steps in.

        Social Engineering

        With time, the level of security in all fields of life keeps getting stronger. The element of encryption has reached almost unbeatable stage. With 256 bit encryption, cracking will take practically forever. The element of laziness is in our favor (not everyone upgrades to latest security measures), and so is the element of cost-effectiveness and carelessness (you don't picture a nerd kid with glasses next door when you are deciding between WEP and WPA for your password). But nevertheless, things are changing, but one thing remains constant. Humans. Humans in general are stupid. Not really, a better word would be ignorant, not aware of how stuff works. Most Facebook users have no idea about what all Facebook is doing for their accounts security, and how easily their carelessness can ruin each and every one of Facebook's effort to protect their private information.

        Humans are the weakest link in any security system

        From leaving one's account logged in to not paying attention to someone who's peeping from behind, watching them type their passwords, humans can be really ignorant. But we need not rely on this level of ignorance for passwords (I stopped using the word stupid because it'll definitely annoy and offend people. I mean not good at computers doesn't really mean stupid. They have other stuff to do than protect their accounts). We can very well get the password of an average internet user who is not very paranoid and cynical about stuff. We can't hack Facebook and gain access to their servers, but your friends machine isn't that well guarded. A virus binded with a game he asked you to fetch in a USB drive? An average person won't think that you might have planted a trojan or a keylogger in the USB drive when he takes a file from you. Or maybe send him a link which will silently install some malware in his computer. Many people don't think twice before clicking on a link (some people do, though). Or maybe make a fake login page and send him a professional looking email, directing him to a website where he ends up receiving a login page somehow (you have to make it look real and genuine, backed up by a nice story, that you can expect the target to buy). There are many more methods. As far as the promise for something later in this tutorial about actual Facebook hacking, I have provided you with a small trailer about what you can do, in the next few tutorials we will discuss stuff in detail. The first tutorial is here.


        Credential Harvester To Hack Facebook (Phishing)


        I don't usually put this disclaimer, but as it was a tutorial that could potentially lead a lot of people on the wrong track (away from the quest on knowledge and towards the quest for illegal hacking and account passwords), here is a warning. Everything on this site is for educational purposes and I won't be responsible for anything you do with this information. If you do something illegal, the jail time would be yours to serve, not mine. So be careful where you are headed.

        SaveTheInternet: What is Net Neutrality & Its Importance

        SaveTheInternet: What is Net Neutrality & Its Importance

        net-neutrality-opIf you like the existing state of the web, you need to learn about net neutrality. If you are not familiar with it, do not stress. Web is developed around the concept of openness. It enables individuals to link and exchange info with ease, if the info or service is not unlawful. Much of this is since of the concept of net neutrality. If you like the present state of the web, you need to find out about net neutrality. Numerous internet users understand it. However if you are not, do not stress. We describe it right here:

        Exactly what is net neutrality?

        Net neutrality is a concept stemmed from how telephone lines have actually worked because the start of the 20th century. In case of a telephone line, you can call any number and link to it. It does not matter if you are calling from operator A to operator B. It does not matter if you are calling a dining establishment or a pusher. The operators neither obstruct the access to a number nor purposely hold-up connection to a certain number, unless compelled by the law. The majority of the nations have guidelines that ask telecom operators to supply an unfiltered and unlimited phone service.
        When the web began to remove in 1980s and 1990s, there were no particular guidelines that asked that access provider (ISPs) need to follow the exact same concept. However, primarily due to the fact that telecom operators were likewise ISPs, they abided by the exact same concept. This concept is referred to as net neutrality. An ISP does not manage the traffic that passes its servers. When an internet user links to a site or internet service, she or he gets the exact same speed. Information rate for Youtube videos and Facebook images is in theory very same. Users can access any legal internet site or internet service with no disturbance from an ISP.
        Some nations have policies that impose net neutrality however the majority of do not. Instead, the concept is followed since that is how it has actually constantly been. It is more of a standard than a law.

        How did net neutrality shape the web?

        Net neutrality has actually formed the web in 2 basic methods.
        One, internet users are totally free to link to whatever site or service they desire. ISPs do not trouble with exactly what sort of material is streaming from their servers. This has actually permitted the web to turn into a really worldwide network and has actually enabled individuals to with ease reveal themselves. For instance, you can slam your ISP on an article and the ISP will certainly not limit access to that post for its other customers although the post might damage its company.
        However more notably, net neutrality has actually made it possible for an equal opportunity on the web. To begin an internet site, you do not require great deal of cash or connections. Simply host your site and you are excellent to go. If your service is great, it will certainly discover favor with internet users. Unlike the cable television where you need to create alliances with cable television connection companies to see to it that your channel reaches audiences, on web you do not need to talk with ISPs to put your internet site online.
        This has actually caused development Google, Facebook, Twitter and many other services. All these services had really simple starts. They began as a standard internet sites with modest resources. However they were successful since net neutrality permitted internet users to gain access to these sites in a simple and unrestricted method.

        Exactly what will take place if there is no net neutrality?

        If there is no net neutrality, ISPs will certainly have the power (and disposition) to form web traffic so that they can obtain additional gain from it. For instance, numerous ISPs think that they ought to be enabled to charge business for services like YouTube and Netflix since these services eat more bandwidth as compared to a typical internet site. Essentially, these ISPs desire a share in the cash that YouTube or Netflix make.
        Without net neutrality, the web as we understand it will certainly not exist. Instead of open door, there might be "bundle strategies" for customers. For instance, if you pay Rs 500, you will just have the ability to gain access to web sites based in India. To gain access to global internet sites, you might need to pay a more. Or perhaps there can be various connection speed for various kind of material, depending upon just how much you are spending for the service and exactly what "add-on plan" you have actually purchased.
        Absence of net neutrality, will certainly likewise spell doom for development on the internet. It is possible that ISPs will certainly charge internet business to allow faster access to their web sites. Those who do not pay might see that their internet sites will certainly open gradually. This indicates larger business like Google will certainly have the ability to pay more to make access to Youtube or Google+ quicker for internet users however a start-up that wishes to develop a various and much better video hosting website might not have the ability to do that.
        Instead of an open and complimentary web, without net neutrality we are most likely to obtain an internet that has silos in it and to get in each silo, you will certainly need to pay some "tax" to ISPs.

        Exactly what is the state of net neutrality in India?

        Lawfully, the principle of net neutrality does not exist in India. Sunil Abraham, director of Centre for web and Society in Bangalore, states that TRAI, which controls the telecom market, has actually attempted to come up with some guidelines relating to net neutrality numerous times. For instance it welcomed discuss the principle of net neutrality from market bodies and stakeholders in 2006. However no official policies have actually been formed to support and impose net neutrality.
        Nevertheless, regardless of absence of official policies, ISPs in India mainly follow the principal of net neutrality. There have actually been some events where Indian ISPs have actually overlooked net neutrality however these are rare.

        Will the idea of net neutrality endure?

        Net neutrality is sort of gentlemen's arrangement. It has actually endured up until now since couple of individuals recognized the capacity of web when it removed around 30 years earlier. Now when the web is an essential part of the society and extremely essential, ISPs throughout the world are attempting to obtain the power to form and manage the traffic. However there are methods to keep net neutrality alive.
        Customers ought to require that ISPs continue their hands-off method from the web traffic. If customers see an offense of net neutrality, they should take a proactive technique and register their annoyance with the ISP. They must likewise reward ISPs that maintain the net neutrality.
        At the very same time, as Abraham states, Trai has to bring out a set of clear and accurate guidelines that safeguard the net neutrality. "We have actually begun seeing ISPs attempting to take control of the traffic that streams from their servers however Trai can manage them. It can keep the web open and consumer-friendly by forming guidelines that secure net neutrality. These are early days so it is simple to do. If ISPs handle to alter the system, it might end up being too late," he states.

        What you can do to Save the Internet?

        Well you can respond to TRAI with your petition letter in order to save the internet. Simply visit http://www.savetheinternet.in and press the Respond to TRAI button, this open up the petition letter with automatic answers written in order to save the internet. Simply compose a new email and send that email in order to show your response to this bad act.
        You can even check this awesome AIB video to understand this even in a better way, please its your time submissions could be done till 24th April 2015.

        Top 5 Things To Do Before Installing a Custom ROM on your Android Device

        Top 5 Things To Do Before Installing a Custom ROM on your Android Device


        Rooting and installing custom ROM offer many advantages indeed but, at the same time it can be a risky as it can cause serious problems to your phone and possibly even brick it.
        People brick their phone because they don’t take precautions when installing a custom ROM on their device. If you understand things and go through it carefully, you’ll never be caught into the uncomfortable situation. Here are some important things to be taken into consideration before rooting or installing any custom ROM.
        1. Backup your Apps, Contacts, etc.
          The first thing that you should do before installing a custom ROM is to backup your applications, data, contacts, messages, etc. By backing up your phone, you won’t lose your important data when something happen during the procedure. (Read How to backup everything on rooted and non-rooted Android phones).
        2. Ensure decent battery level
          It is very important to check the battery level before installing a custom ROM or rooting an android device. Because, if your device turned off in the middle of the procedure due to lack of battery, it can cause your phone to brick. So, it is very important to have battery sufficiently charged before you start rooting or installing any custom ROM.
        3. Turn on the USB Debugging mode
          USB debugging mode is a mode to facilitate a connection between an Android device and a computer with Android SDK. Before an app like One-click-root can dig into your system and grant the access to your device, USB debugging is necessary to allow that function in the first place.
          That’s is why, whenever you want to perform such task, it is highly recommended that you turn on the USB Debugging mode from ‘Developer Options’ under Settings of your device.
          enable usb debugging mode
          On Android phones with Jelly Bean 4.2 and higher, the Developer Options are hidden by default and it can only be accessed by tapping 7 times on ‘Build Version’ from Settings ->About.
        4. Backup your current ROM
          If you’ve rooted your phone, it is recommended that before installing a custom ROM on your phone, you must back up your current ROM, whether it is stock or custom ROM. So that if you experience some lag or any other situation you don’t like after flashing a custom ROM, you can restore the phone to its original state with this tool. For the tutorial, you can check out at here.
        5. Backup Your Phone’s IMEI
          Sometimes, when you install a custom ROM, your IMEI number will be lost and as a result you will not be able to receive proper network signal. To avoid such situations, do not forget to backup a folder called ‘efs’ that stores your IMEI number.
          To access the folder, you have to install a root file explorer app like Root Explorer, X-plore File Manager, etc. Once installed, open the app and find the folder. You will easily find it as it is located on the root directory of your device. When you located the folder, just copy the entire folder and paste it on your external SD card. It will be even better if you copy it to your computer too. After installing the custom ROM, just copy and paste the folder in the same location where it was.