Monday 22 October 2012

Free Unlimited Calling Trick For Android and Iphone

1 Comment

Make free calls all over India via Android/Iphone.

Just Download application for free from Android market, install it and make free calls all over country.
It works in many countries including India.

The name of the application is CrowdCall.

Download the application from the below link

http://market.android.com/search?q=pname:com.socialdial.crowdcall.app
Step 1.Download and install the application (Crowdcall)

Step 2. After installing open the app and enter ur own phone number.

Step 3. After that open it and enter ur frend's number or any other u r goign to call

Step 4. After entering someones mobile number u will receive an unknown call. Pick up the call and listen to and press "1" when instructed.

Stwp 5. After that dont disconnect call..during that process the person u r calling will receive call and after receiving call that person also have to press 1

Step 6. Enjoy free calling

Sunday 21 October 2012

Whonix: Operating system

Be The First To Comment

Whonix is an anonymous general purpose operating system based on Virtual Box, Ubuntu GNU/Linux and Tor. By Whonix design, IP and DNS leaks are impossible. Not even malware with root rights can find out the user's real IP/location.

Whonix consists of two machines, which are connected through an isolated network. One machine acts as the client or Whonix-Workstation, the other as a proxy or Whonix-Gateway, which will route all of the Whonix-Workstation's traffic through Tor. This setup can be implemented either through virtualization and/or Physical Isolation.


Whonix advantages:
  • All applications, including those, which do not support proxy settings, will automatically be routed through Tor.
  • Installation of any software package possible.
  • Safe hosting of Hidden services possible.
  • Protection against side channel attacks, no IP or DNS leaks possible^3^ To test for leaks, see LeakTests.
  • Advantage over Live CD's: Tor's data directory is still available after reboot, due to persistent storage. Tor requires persistent storage to save it's Entry Guards.
  • Java / JavaScript / flash / Browser Plugins / misconfigured applications cannot leak your real external IP.
  • Whonix does even protect against root exploits (Malware with root rights) on the Workstation.
  • Uses only Free Software.
  • Building Whonix from source is easy.
  • Tor+Vidalia and Tor Browser are not running inside the same machine. That means that for example an exploit in the browser can't affect the integrity of the Tor process.
  • It is possible to use Whonix setup in conjunction with VPNs, ssh and other proxies. But see Tor plus VPN/proxies Warning. Everything possible, as first chain or last chain, or both.
  • Loads of Optional Configurations (additional features / Add-Ons) available.
  • Best possible Protocol-Leak-Protection and Fingerprinting-Protection.

Thursday 18 October 2012

Creative MP3 Player

Be The First To Comment

The MP3 Player like portable great that. But if, you haven't a bag will add it, in case that you wear it that your wrist
Brazilian designer Dinard da Mata has developed another wearable gadget that becomes a fashion accessory to complement the style of next-gen users. Hailed as "MP3 Player Creative," the portable music player features a flexible OLED screen that other than displaying the playlist also lets the user select the song or control volume with just a touch of a finger. Worn around the wrist like a bracelet, the MP3 concept gives easy access of the functions to the user. In addition, the sleek music player includes wireless headphones to offer clutter-free music on the go.

Tuesday 9 October 2012

Kaspersky Mobile Security helps Android users recover stolen smartphones

Be The First To Comment


Kaspersky Lab announced the addition of new features to Kaspersky Mobile Security designed to aid in the protection of data residing on lost or stolen smartphones and the recovery of missing devices.
Through its new web-based control center, users can now access all security features for their Android smartphone. The user-friendly interface can be managed from any computer and provides the ability to swiftly protect any banking information, contacts, photos or other personal information saved on the device.

Through the new web-based control center, users can access all of Kaspersky Lab’s mobile security features, allowing them to:
  • Remotely lock their missing smartphone to secure personal information
  • Remotely wipe sensitive information from their missing smartphone
  • Remotely locate their lost or stolen smartphone using GPS, GSM or Wi-Fi, and Google Maps
  • Review logs of recent activities, such as their status and the results of any commands sent to the phone, or the installation of a new SIM card.
Kaspersky Mobile Security’s ‘Mugshot’ enables owners of lost or stolen Android smartphones to visually identify the unauthorized use of their devices. With the click of a mouse in the web-based control center, users can remotely activate the front-facing camera on their missing smartphone, and the device will secretly begin taking photos.

These photos are then automatically emailed to a pre-determined address or can be viewed directly through the web-based control center. If the smartphone has been stolen, the Mugshot tool gives users the opportunity to identify the thief, or if the smartphone is simply missing, users can recognize the phone’s surroundings to track it down.

iPhone-controlled keyless lock

Be The First To Comment
Lockitron replaces keys with your phone. With Lockitron, you can instantly grant family, friends and guests access to your home or business from anywhere in the world using your internet enabled smartphone.


Any internet enabled smartphone can use Lockitron. For a small monthly fee, Lockitron owners can enable text-message access which turns any mobile phone into a virtual key.

The Lockitron Android app features NFC capabilities that allows users to unlock or lock their door just by swiping it in front of a Lockitron NFC tag.
 

© 2011 Web Chiller - Designed by Surender and Ramesh | ToS | Privacy Policy | Sitemap

About Us | Contact Us | Write For Us