Sunday, 21 February 2016

How To Change Boot Screen In Android Phones


Hello Guys , Welcome To USER-X ,
We're back with another cool trick for all the android users.

So most of you might be using an Android Phone from a long , and it always boots up with the same screen as when you turn it on from switch off state, Right?

So , it might be a boring way , or you may have fed up with that old thing, so
Do you wanna try one ?

So this trick is for all geeks out there, who want to try something new.

So what is Boot screen ?

Ans :- The boot animation is the first thing that you see when powering on your Android phone or tablet, after the operator or manufacturer logo. Although it does not serve a purpose functionally, an eye-catching boot animation can certainly make your device stand out while booting. In this third installment of our Android customization series, we will take a look at how to change or even create your Android boot animation and will feature some of the prettiest and geekiest boot animations we have come across

Tools You Need to Change Boot Screen?
Ans :- 1. Rooted mobile phone(No idea what Rooted Phone is ? Get it from Here. Just download and click on root now!  ) 
2.ES file Explorer 


Step 1. Download the boot repositories from here , and make sure to download the correct resolution from Here.


Step 2. Now open ES File Explorer and ensure you have enabled root explorer in its settings. Navigate to the folder /system/media and you will find a file named bootanimation.zip. Rename it as bootanimation.zip.bak. This will help you to revert to stock animation in the future. Having done that, paste the bootanimation.zip file that you downloaded from the internet to /system/media.

























Step 3. One last thing before you reboot would be to fix the file permission. Long tap on the new bootanimation.zip file and change the permissions to rw-r—r—and save the settings.






                






















Step 4. Now you're Done. Now when you reboot your phone, you will have your new android boot animation ready for you.


Note: Before rooting and trying these all tricks above , you might be aware of rooting a mobile phone and using tools after rooting your phone.








Friday, 19 February 2016

Clash Of Clans Hacked! Unlimited gems and coins(only at Userx)


PLEASE NOTE! Clash of Clans Hacked By UserX Mod  is free to download and play, however some Games items can also be purchased for real money. If you do not want to use this feature, please set up password protection for purchases in the settings of your Google Play Store App. Also, under our Terms of Service and Privacy Policy, you must be at least 13 years of age to play or download Clash of Clans Hacked !

1. Downlaod App Clash Of Clans 
2.Install It
3.Enjoy COC Hacked Unlimited gems and coins (ONLY AT USERX)



Sunday, 14 February 2016

How To Browse The Web Anonymously.

Hey Guys , Welcome To UserX , We are back with another Amazing trick to browse the web , without letting your information (The sites you visit, fake location,and with different IP address ).

As you all know when you browse the web these information about you are being detectable by your ISP,
1. Your location (With Your IP address ).
2. The sites You visit.
3. If you are in college or school , you cant not browse some sites banned by your institution socities.
4. Monitoring your device with your IP address.


In most of the cases , your ISP's are able to track you down just because of your IP address , which is a unique address to locate you on the earth.
But what if that IP address is changes ??
Simple : Your ISP can not track you.

This is what called Proxy Server.(connecting to the web , from different servers ).

In this case , your IP address will be changed , even your ISP, and you will be anonymous to the Web(as your location is different , your IP is different  )



This all you need to know about being  Anonymous.
But the question is how to do that ?

The Best answer is to use some Application , which provide you on the go feature an get anonymous by one click.


Best know app is  Betternet. As it is cross platform is can be used on mobile device and even on PC.
The links are below

1. For Android Click Here
2. For iPhone Click Here
3. For Windows Click Here



And if you don't want to download the App in your computer or your OS is not supported , You can add addon's  for your Web Browser

1. For Chrome Click Here
2. For Firefox  Click Here.

Thank You.

Killer Trick For iPhones



Hey Guys , There is an trick ( And it's seriously killer one).

If you have any iPhone (version 5s or more ).

Then this is a killer one trick to brick your iPhone (or somebody else's).

There is a bug in iPhone , and is that if you set back the date of your iPhone to
 "1st , Jan 1970 @ 1.00PM." And reboot it , it will stuck .





Like this ===>


And Your Phone will keep rebooting , and won't work.

So here's how to do this (Read everything and note that I'am not responsible for anything whatever damage cause to your device. This trick is just for knowledge and educational purpose!!)

Step 1. Open Setting in your iPhone.
Step 2. Go to time and date.
Step 3. Change Date to 1st Jan 1970, and time to 1.00Pm.

RESTART YOUR iPHONE.


And See The Magic.


However this is not interesting coz no body loves to damage the thing like iPhone , but the advantage is that  You can get a new iPhone (If its under warranty ,period)



Youtube guide to do so :-Here

The Reason Behind this is :- HERE

Read more @  THE GUARDIAN


However this may sound interesting but do this at your own Risk.



trick uploaded by Lakhan Singh (aka LAX)





For More Tips and Trick Follow us Here.( Hack it and Have it)

Saturday, 13 February 2016

ABOUT HACKERS!

Concept of Ethical Hacking

Hacking

  • The Art of exploring various security breaches is termed as Hacking.

  • Computer Hackers have been around for so many years. Since the Internet became widely used in the World, We have started to hear more and more about hacking. Only a few Hackers, such as Kevin Mitnick, are well known.

  • In a world of Black and White, it’s easy to describe the typical Hacker. A general outline of a typical Hacker is an Antisocial, Pimple-faced Teenage boy. But the Digital world has many types of Hackers.

  • Hackers are human like the rest of us and are, therefore, unique individuals, so an exact profile is hard to outline.The best broad description of Hackers is that all Hackers aren’t equal. Each Hacker has Motives, Methods andSkills. But some general characteristics can help you understand them. Not all Hackers are Antisocial, Pimplefaced Teenagers. Regardless, Hackers are curious about Knowing new things, Brave to take steps and they are often very Sharp Minded.

  WHAT ARE HACKERS? IS THEY CRIMINALS

Hacker is a word that has two meanings:
 Traditionally, a Hacker is someone who likes to play with Software or Electronic Systems. Hackers enjoy Exploring
and Learning how Computer systems operate. They love discovering new ways to work electronically.
 Recently, Hacker has taken on a new meaning — someone who maliciously breaks into systems for personal gain.
Technically, these criminals are Crackers as Criminal Hackers. Crackers break into systems with malicious
intentions.
 They do it for Personal gain, Fame, Profit and even Revenge. They Modify, Delete and Steal critical information,
often making other people's life miserable.
 Hacking has a lot of meanings depending upon the person’s knowledge and his work intentions. Hacking is an Art
as well as a Skill. Hacking is the knowledge by which one gets to achieve his Goals, anyhow, using his Skills and
Power.
 Most people associate Hacking with breaking law, therefore calling all those guys who engage in hacking activities
to be criminals. We agree that there are people out there who use hacking techniques to break the law, but
hacking is not really about that. In fact, hacking is more about following the law and performing the steps within
the limits.


What Is the Difference Between a Hacker and a Cracker?
 Many articles have been written about the difference between Hackers and crackers, which attempt to correct public misconceptions about hacking. For many years, media has applied the word Hacker when it really meansCracker. So the public now believe that a Hacker is someone who breaks into computer systems and stealconfidential data. This is very untrue and is an insult to some of our most talented Hackers.
There are various points to determine the difference between Hackers and crackers.

 Definition - A Hacker is a person who is interested in the working of any computer Operating system. Most often,Hackers are programmers. Hackers obtain advanced knowledge of operating systems and programminglanguages. They may know various security holes within systems and the reasons for such holes. Hackers

TYPES OF HACKERS

Coders
 The Real Hackers are the Coders, the ones who revise the methods and create tools that are available in the 

market. Coders can find security holes and weaknesses in software to create their own exploits. These Hackers 

can use those exploits to develop fully patched and secure systems.
 





 Coders are the programmers who have the ability to find the unique vulnerability in existing software and to 
create working exploit codes. These are the individuals with a deep understanding of the OSI Layer Model and 
 
TCP/IP Stacks.
 




Admins
 Admins are the computer guys who use the tools and exploits prepared by the coders. They do not develop their 
own techniques, however they uses the tricks which are already prepared by the coders. They are generally 
 
System Administration, or Computer Network Controller. Most of the Hackers and security person in this digital 
 
world come under this category.
 




 Admins have experience with several operating systems, and know how to exploit several existing vulnerabilities. 
A majority of Security Consultants fall in this group and work as a part of Security Team.
 




Script Kiddies
 Next and the most dangerous class of Hackers is Script kiddies, They are the new generation of users of computer 
who take advantage of the Hacker tools and documentation available for free on the Internet but don’t have any 
 
knowledge of what’s going on behind the scenes. They know just enough to cause you headaches but typically are 
 
very sloppy in their actions, leaving all sorts of digital fingerprints behind. Even though these guys are the teenage 
 
Hackers that you hear about in the news media, they need minimum skills to carry out their attacks.\
 




 Script Kiddies are the bunnies who use script and programs developed by others to attack computer systems and
Networks. They get the least respect but are most annoying and dangerous and can cause big problems without
actually knowing what they are doing.


White Hat Hacker
 A White Hat Hacker is computer guy who perform Ethical Hacking. These are usually security professionals with 
knowledge of hacking and the Hacker toolset and who use this knowledge to locate security weaknesses and 
 
implement counter measures in the resources.
 




 They are also known as an Ethical Hacker or a Penetration Tester. They focus on Securing andProtecting IT 
Systems.
 




Black Hat Hacker
 A Black Hat Hacker is computer guy who performs Unethical Hacking. These are the Criminal Hackers or Crackers 
who use their skills and knowledge for illegal or malicious purposes. They break into or otherwise violate the 
 
system integrity of remote machines, with malicious intent.
 




 These are also known as an Unethical Hacker or a Security Cracker. They focus on Security Cracking and Data 
stealing.
 




Grey Hat Hacker
 A Grey Hat Hacker is a Computer guy who sometimes acts legally, sometimes in good will, and sometimes not.
They usually do not hack for personal gain or have malicious intentions, but may or may not occasionally commit 
 
crimes during the course of their technological exploits.