How To Create Bootable USB Without Any Software In Windows 10 (Using Command Prompt)

  • Insert your USB flash drive to your computer.
  • Search for ‘cmd’ in Windows 10 from the taskbar, Command Prompt will appear. Alternatively, you can also open the  Command Prompt by pressing windows+R at the same time and typing in ‘cmd’ in the ‘Run’ window and hitting enter.
  • Right click on Command Prompt and select ‘Run as Administrator’ in case you have searched for cmd in the Windows 10 Taskbar.
  • Once the Command Prompt window appears, type diskpart and hit enter. Wait until the diskpart utility runs in another window.
  • In the new diskpart window, type list disk and hit enter. It will show you all active disks on your computer.
Most probably, you will see two Disk types.
  • Disk 0 for hard drive and,
  • Disk 1 for your USB Flash Drive with its total capacity.
work on to create bootable USB drive, we will work with Disk 1.
  • Type select disk 1 in the same windows and hit Enter. You will get a message ‘Disk 1 is now the selected disk’. That means, any further operation that you do will affect your disk 1 directly.
  • Type clean and hit Enter to remove all of the data in the USB drive. Clean command will format your bootable drive. You will get a message like ‘Diskpart succeeded in cleaning the disk’.
  • Type create partition primary and hit Enter. You will get a message like Diskpart succeeded in creating the specified partition.
  • Type select partition 1 and hit Enter. It will choose partition 1 for setting up it as an active partition.
  • Type active and hit Enter. It will activate the current partition.
  • Type format fs=ntfs quick and hit Enter. This command will format your current partition as NTFS file system quickly.
  • Type exit and hit Enter. Exit command will close the Diskpart program. But do not close the command prompt Windows.

Copying files from an ISO image on your PC/DVD to USB manually:

Now all you need to do open the files inside the DVD or ISO file, copy it and paste inside USB manually. This will make your USB drive bootable.
To install Windows from a bootable USB drive, we just need to copy the whole installation files contained on the DVD installer to the USB flash drive.
  • To do this, open the Command Prompt as in previous steps.
  • Once the command prompt is open, type copy e:\*.* /s/e/f g: and then press Enter. Wait until all the files in the DVD installer are copied onto the flash drive. Please double check the drive letter of your USB and DVD. Here, here de is the drive letter of the DVD drive that holds the Windows DVD, is the drive letter that you assigned to the external USB Stick.
Now bootable USB drive is ready to be used for installing Windows from the Flash drive and you’re done.

There are three best methods in which you can block your USB port:
1. Block By Changing The Registry
2. Block By Disabling USB Device Manager
3. Block By Uninstalling Your USB Mass Storage Drivers
Follow the below instruction in 3 Methods!
1. Block USB Port By Changing The Registry
In this process you can change your registry value so that you can block your USB port in windows, the process is very simple if you continue to do the same process repeatedly, then you can save your time by doing the setting speedly.
This is one of the first methods that we recommended.
Step1. From your desktop press Windows button + R that is Win+R
Step2. You will be prompt with Run Window and in that Type Regedit
Step3. Soon you will see the window in which you have to follow till the end, go to HIKEY_LOCAL_MACHINE -> SYSTEM -> CURRENT CONTROL SET -> SERVICE -> USBSTOR
Step4. Within USBSTOR, you will see START at the right side of the window Registry Editor.
Step5. Double Click on START and change the Value Data with 4 to disable your USB port and if you want to enable your USB port then change the value back to 3.
Step6. After changing the value just click on OK and close the Registry Editor.
2. Block USB Port By Disabling USB Device Manager
We have alternative choices for you, if you tried out the above method and didn’t work then you can use this method, this is the method that will definitely work because you are directly accessing to the USB port managers, from there you can disable all your USB port.
USBC
Step1. From desktop, Right Click on My Computer, Select on MANAGE
Step2. You will see a new window and at the top of that window written Computer Management.
Step3. You can see System Tools, from there click on Device Manager.
Step4. On Device Manager find Universal Serial Bus Controllers.
Step5. Right click on every USBC to disable all the drivers.
Note: If you see no changes in your settings then you have to restart your computer.
3. Block USB Port By Uninstalling Your USB Mass Storage Drivers
This method is really a time taking, because, in this process you need to uninstall all your USB drivers from your windows computer. If you have already used the above methods and didn’t worked – then you are bound to do this method.
In this method the step is same as the above mentioned but there is only change, and that is you don’t have to disable your USB drivers instead of that you have to click on Uninstall on each and every drivers and sooner you will see that all of your drivers from the Device Manager removed and you need to restart your computer to get this thing working properly.
If you have any query in the above mention methods then you can ask by commenting below.
Organize Homescreen Shortcuts With Folders
Once you have a lot of apps installed, your homescreen might be filled with app shortcuts. Unlike the app drawer, the apps on your home screen are not arranged alphabetically. So, you might want to create some folders for your homescreen shortcuts.
1.   Assuming you have more than a handful of shortcuts already on your homescreen, long press on any of the shortcuts and drag it onto another shortcut.
2.   A circle should now appear around the apps, indicating that a folder has been created.
3.   By tapping on the newly created folder, a mini window will pop up with your apps in it.
4.   You can drag and drop additional apps into the folder if you like. You can also rename the folder by tapping on the text area at the bottom of the mini window.

How to Turn Off Auto-Correction
Hate the fact that your phone is going English teacher mode on you? Turn off auto-correction for peace of mind when texting.
1.   Go to Settings > Language & input.
2.   Tap on the settings icon next to the keyboard that you are using, e.g. Google Keyboard.
3.   Look for Auto-correction and tap on it.
4.   Select Off to turn auto-correction off.

Disable App Notifications
Bugged by annoying app notifications that just keep coming? If you don’t know already, these app notifications also drain your phone’s battery. If you want to turn them off, and you are on Jelly Bean 4.1 and above, here’s how:
1.   On any of your unwanted notifications in your notification bar, long presson the notification for a message box to appear.
2.   Tap on App Info > Untick Show Notifications > OK.

Disable Mobile Data
Whenever you don’t need to stay connected, disabling the Mobile Data can help keep your smartphone battery from draining too quickly. Turning off mobile data is as easy as:
1.   Going to Settings > Data Usage.
2.   Disable Mobile data by toggling the setting from ON to OFF.


Set Mobile Data Limit
Want to keep track of how far your usage is from your monthly mobile data limit? If you have ICS and above, there is a feature which lets you keep track of how much of the quota you have left.
1.   Head over to Settings > Data Usage.
2.   Set your data limit by dragging the orange line to reflect your monthly quota.
3.   Set your data usage cycle based on when your "month" starts and ends, and you’re done.

You will be alerted once you hit the limit you have set. Note that the tracked data usage of your phone may vary slightly than your carrier’s tracking.
Disable automatic App Updates
Prefer to read through app permissions and manually pick which app updates to adopt? You can, but first you need to disable your automatic app updates. Here are the steps:
1.   Open Play Store and head over to Settings.
2.   Tap on Auto-update apps.
3.   Choose Do not auto-update apps.

If you want to enable the auto updates, follow the same path and choose Auto-update apps at any time or via Wi-Fi (available for certain Android devices only).
To update your apps manually, just open Play Store, and on the main page swipe in from the left and tap on My apps. You can tap on apps with pending updates and update them manually, or if you like to update them all at once, just tap onUpdate All.
 Add Multiple Google Accounts
You need a Google account to use an Android phone but did you know you canchoose to run more than one Google account on your Android device. This is convenient if you use more than one account for several of your Google services. To add multiple Google accounts:
1.   Go to Settings > Add account.
2.   Select Google and setup your New or Existing Google account.
3.   Once added, choose what you want to sync with the account.

Repeat all the steps above if you want to add more accounts.
How To Check For android System updates
For Android users that are using stock ROM, you may want to look for new updates to your system. To check for updates:
1.   Go to Settings > About phone/tablet.
2.   Tap on System updates.
3.   Tap Check now to look for system updates.

Disable Animations

Here’s a tip on how to make your Android device run a bit smoother: disable its animations. You will need to have access to Developer Options which can be found under Settings or About device.

Note: For some phones, you may need to go to Build number and tap on it repeatedly until you see "You are now a developer!". Developer options are now enabled.
Under enabled Developer options, look for Window animation scale,Transition animation scale, and Animator duration scale. Then, turn them off (disable) them one at a time.
Changing Default Apps
If you have already set some default apps for particular tasks (e.g. using Chrome for opening web links) but wish to change this:
1.   Go to Settings > Apps.
2.   Swipe right and look for the All tab.
3.   Select the app you want to remove as default.
4.   Tap on Clear defaults.



Apple iOS

1.       Go to Settings > iTunes & App Stores and sign out of your Apple account. 

2.       Click on this link or if you're not viewing this on mobile, open Safari on your iPhone and search for "Pokemon Go app store" and click the link that will take you to the Pokémon GO app in the App Store. You should see a pop up saying that this app is not available in Singapore, but is available in New Zealand. Click Change Store to go the New Zealand App Store.

3.      You may have to search for Pokémon GO again. Do so and you should see it. Click Get and it will prompt you to Sign In with an existing Apple ID or to Create a new Apple ID.

4.      Create a new Apple ID and choose New Zealand as your region. Do note that you'll need to be able to verify your Apple ID to download the game, so make sure you have access to the email address you're using to set up this temporary account. Leave the billing information blank. When you get to the address details, use this website to generate a fake New Zealand address.


5.      Verify your account details and log in to download the game. You can now sign out of your New Zealand account and go back to your regular Apple ID. 

Pokimon How to Play the Game to be downloaded on Android and IOS without rooting in our country?

            In recent days, broadly speaking, all those smart phone game is a matter pokimon. The phone will be in our GPS work on pokimon game yet by India, Sri Lanka and other Asian countries, including those not published officially.

Play Pokimon GO ahead of its Asia release date but don't want to root your phone or risk downloading the malware APK that's been floating around? Avoid it by downloading the official app from the Google Play Store or Apple App Store from any country.

Here's how to do it on Android (this page) and on Apple's iOS (next page).

Note: right now there's not much to do in Pokimon GO as Niantic hasn't launched the local servers that will populate the map with Pokimon. You can however fake your GPS location (there are a number of good apps out there for this).


Android
Google recently made a change to the way you connect to the Play Store that makes it a little trickier to fake your location. Essentially, if you've ever signed into the Play Store previously, your account is locked to that location, even if you're using a VPN. 
To get around it, you'll have to create a new temporary account.
1.       First, you’ll need to fake your location. Do this by downloading the following two apps: OpenVPN Connect and EasyOvpn. The OpenVPN Connect app will be used to establish the connection while the plugin makes it easy to search for and import VPN servers.

2.      Once the apps are installed, launch the EasyOvpn app, and search for a US server. If you don’t see a US server on the list, you can try another country like Australia, or you can just refresh the list until you see the server you want.

3.      The selected VPN profile uses Autologin, so just tap on the Accept button to import the profile. After the profile is imported, press Connect to establish the connection.

4.      Next, clear both the cache and data of the Google Play Services app and Google Play Store app. Do this by going to Settings > Apps > Google Play Store > Clear Data. Don’t worry, clearing this data won’t affect any of your existing downloaded apps.

5.      Now you need to make a completely new Google account. You’ll only be using this account to download Pokémon GO (or any other apps you want that are not available locally). Using your phone, go to Gmail and sign up for one, then open the Play Store app and login using your new account.


6.      You’ll now be browsing the US Play Store click here. Search for Pokimon Go and download it. When it's installed, disconnect the VPN connection and sign back into your old account. Don't worry, the app will update without requiring a VPN or switching accounts. 

How to Unlist and Remove Your Number from TrueCaller:

To Easily Unlist and Remove Your Number from TrueCaller, follow the following simple steps:
STEP 2: Enter your country code and Mobile Number ( e.g: +919876543210) and Enter the Capcha.
STEP 3: And finally hit the blue Unlist button.


That’s it, you have Successfully Unlisted! Your mobile number from TrueCaller Database.
Now you don’t have to panic over your Mobile Number being shared online, TrueCaller will unlist your number with in 24 hours once the unlist request has been sent. Once the Number is removed from the Database, anyone who tries to find your number will end-up with no result!
Hop this post will help you getting the thing done.

How To Use Proxychains To Evade Detection in Kali Linux


               The most important thing about doing penetration testing is anonymity, undetectable, or at least hard to be detected. The worst thing that can happen to any pentesters is being detected by a security admin, the security technologies such as IDS, firewall, etc., or a forensic investigator. 
             
             We need more additional tools in order to hide our identity being exposed, VPN (Virtual Private Network) and Proxyservers are the most famous tools nowdays, but several considering RDP (Remote Desktop Protocol) as their main guard of their identity. In this article, i will discussing about a built-in anonimity service in Kali Linux and or others penetration testing based machine, that is Proxychains.

Whenever we send a packet to any hostnames or targets, that packet contains our IP address in the IP header. If we make a TCP connection, the target or hostname system will log our IP address as it logs all connections. These events increase the possibility of detection. In order to penetrate anonymously with the least chance of detection, we need to use an intermediary machine whose IP address will be left on the target system. This can be done by using proxies.
These systems are designed to accept our traffic and then forward it on to the hostname or target. Of course, the proxy will likely log our traffic, but an investigator would have to get a subpoena or search warrant to obtain the logs.
If we string multiple proxies in a chain, we make it harder and harder to detect our original IP address. If one of those proxies is outside the jurisdiction of the victim, it makes it very unlikely that any traffic can be attributed to our IP address. It is not as hard as you imagr to setup proxies chaining. Kali Linux, backbox and others penetration testing OS’s certaintly have an excellent built in tool for proxifying our traffic called proxychains.

Proxychains Features:

  1. The latest version of Proxychains support SOCKS5, SOCKS4, and HTTP CONNECT proxy servers.
  2. Proxychains can be mixed up with a different proxy types in a list
  3. Proxychains also supports Any kinds of chaining option methods, like: random, which is it takes random proxy in the list stored in configuration file. or chaining proxies in the exact order list, different proxies are separated by new line in a file. or dynamic option, that let Proxychains to go through the live only proxies, it will exclude the dead or unreachable proxies, the dynamic option often called smart option.
  4. Proxychains could run or handle any TCP client application, ie., nmap.
Instead of scanning or do  multiple requests to any target directly using our IP, we can let Proxychains to cover up our identities. By adding command “proxychains” for every jobs, thats mean we enable Proxychains service. For example; we want to scan any webservers in a range of our local network by using Proxychains,or scan specific target by its URL hostname  or IP. so type in:
<span style="color: #00ff00">proxychains nmap -sT -P0 -p 80 -iR 192.168.1.0/24</span> 

Step 1: Look at Proxychains files

Let’s start by finding proxychains. Type:
root@kali:~# locate proxychains
As we can see in the screenshot above, above the highlighted output, proxychains is in the /usr/bin directory. Since/usr/bin is in our PATH variable, we can use it from any directory. This is just as we would want since we use proxychains with other commands, which may NOT likely be in the PATH variable.

Step 2: Proxychains Syntax

The syntax for the proxycahins command is simple and straightforward.
root@kali:~# proxychains [the command you want proxied] [any arguments]
So, if I wanted to use proxychains to scan a site with nmap anonymously, I could type:
root@kali:~# proxychains nmap -sS [IP address or URL]

Step 3: Setup the Configuration File

Like nearly every application in Linux/Unix, configuration is managed by a simple text file called the config file. In the case of proxychains, this file is /etc/proxychains.conf. We can open it in leafpad or any other text editor (vi, emacs, gedit, kwrite, etc.), by typing:
root@kali:~# leafpad /etc/proxychains.conf When we do so, we will see a file like that displayed below. If we scroll down this file a bit, we will see a section that I have highlighted labeled “add proxy list here…”.
You can get IP proxy lists for free in HideMyAss. Visit the link, and scroll down the webpage until you see the proxy list detail.
To get proxychains to use intermediary proxies, we simply need to add the IP addresses of the proxies we want to use here. It’s important to note that proxychains defaults to use Tor. Notice the last line in the screenshot above. It directs proxychains to send the traffic first through our host at 127.0.0.1 on port 9050 (the default Tor configuration). If you are using Tor, leaves this as it is. If you are not using Tor, you will need to comment out this line.
As much as I like Tor, it is very slow and we now know that the NSA has broken Tor, so I am much less likely to depend upon it for anonymity.

 Step 4: Let’s Test Proxychains

Now that we have put a proxy between us and any traffic we send, let’s test it out. In this case, I am simply going to do an nmap scan to site.com anonymously by sending the scan through a proxy. The command would be as follows:
root@kali:~# proxychains nmap -sS -T4 -v www.site.com
As you can see in the screenshot above, I have successfully scanned site.com through my chosen proxy and returned the results back to me. In this way, it appears that my proxy scanned site.com and not my IP address.
Now that we have proxychains working, let’s look at some options that we can configure through the proxychains.conf. As we now have it set up, we are simply using a single proxy. We can put in numerous proxies and use all of them, we can use a limited number from the list, or we can have proxychains change the order randomly. Let’s try all of those options.

Step 5: Add More Proxies

First, let’s add some more proxies to our list. Open /etc/proxychains.conf and add more proxy IPs like I’ve done below

Dynamic Chaining (Smart Chaining)

Now that we have multiple IPs in our proxychain.conf we can set up dynamic chaining. Dynamic chaining will enable us to run our traffic through every proxy on our list, and if one of the proxies is down or not responding, it will automatically go to the next proxy in the list without throwing an error.
To do so, let’s first open the proxychains configuration file again.
With this file open, uncomment out the “dynamic_chains” line. This will enable dynamic chaining of our proxies allowing for greater anonymity and trouble-free hacking.

Random Chaining

Finally, we can also use “random chaining”. With this option, proxychains will randomly choose IP addresses from our list and use them for creating our proxychain. This means that each time we use proxychains, the chain of proxy will look different to the target, making it harder to track our traffic from its source.
To do so, open the /etc/proxychains.conf file and comment out “dynamic chains” and uncomment “random chain”. Since we can only use one of these options at a time, make certain that you comment out the other options in this section before using proxychains.
In addition; you may want to uncomment the line with “chain_len”. This will determine how many of the IP addresses in your chain will be used in creating your “random proxy chain”. And also if you got error cause of proxy DNS requests, you might to comment out “proxy_dns” option.
Now that you know how to use proxychains, you can do your penetration testing with relative anonymity. I say relative, because there is no surefire way to remain anonymous with the NSA spying on all our activity. All we can do is make detection much harder, and proxychains can help do this for us.