This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Saturday, August 04, 2012

CD -R King CC Series CW-8196 WiFi Router Setup for Wimax BM622

CD  -R King CC Series  CW-8196 WiFi Router Setup for  Wimax BM622

 This is a tutorials for networking .Static Setting for old Wimax BM622 for CD - R king CW-8196


Price of the router is only P780.00

it's getting less price than other router brand before its P880.00

1.Type the IP 192.168.10.1 on your browser and log-in   admin:admin



2. Go to WAN set all this  circle setting 1234.




 3. For LAN setting  you can change the default 192.168.10.1 if you having log in problem on Wimax CPE.
Here I change them to 192.168.2.1 so you log-in to your router  is not 192.168.10.1




4. WiFi Setup 
SSID stands for your AP name or WiFi Network name change CW-8196
PassPhrase is your password

Choose security option BOTH WPA TKIP * WPA2 AES so that all Gadgets can be supported. 
There is a issue that TKIP cannot be detected by some mobile device like Samsung android .



I have other tutorials on other Wimax BM622i

Check:http://blogmytuts.blogspot.com/2012/06/cd-r-king-cw-8196-wifi-setup-for-globe.html

Monday, July 30, 2012

Sipa Games Apps Real Pinoy Made

Sipa Games Apps For Android and Iphone


Description

Sipa, literally meaning "kick," is the Philippine version of the street hack sack. The object of the Sipa game is to hit a shuttlecock with your feet and elbows for as long as you can. In the Philippines, players use washer with ribbons or scrap cloth. The game puts you in control of Butchukoy, a little boy out to play Sipa throughout the streets of Manila. Earn points every time Butchukoy successfully hits the shuttlecock. Look out for litter on the streets because you'll get extra points for picking them up. You'll be able to use these points to unlock other places in the Philippines so keep them coming!
Furthermore, what makes Sipa different from other games available today is the fact that there is more to it than just excitement and thrill. Sipa spells nationalism, culture, heritage, life lessons, and adrenalin-pumping gaming acts all rolled into one.


The goal of the creators of this game is to share and promote Filipino culture around the world. Part of the proceeds from this Sipa game will be given to non-profit
organizations, Mighty Minds and Filipino Matters. (http://www.MightyMinds.org, http://www.FilipinoMatters.org)



Sipa Games Apps For Android and Iphone
Sipa, literally meaning "kick," is the Philippine version of the street hack sack. The object of the Sipa game is to hit a shuttlecock with your feet and elbows for as long as you can. In the Philippines, players use washer with ribbons or scrap cloth.
Posted by Blogmytuts.blogspot.com on Monday, 11 May 2015







Download Apps for Iphone

https://itunes.apple.com/us/app/sipa/id480115781?ls=1&mt=8


Skip Ads on Download


Opera Mini Mobile Malware

Opera Mini Mobile Malware

There is a new variant of the OpFake mobile malware making the rounds, and this version comes bundled with a version of the legitimate Opera Mini mobile browser. The malware targets Android phones and steals money from victims by sending SMS messages without the user's knowledge to premium-rate numbers and also collects data about the device it infects.
Researchers at GFI Labs discovered the new variant of OpFake in recent days, and found that, unlike older versions of the malware that disguised itself as Opera Mini, this version actually downloads a copy of the mobile browser. The attackers have set up a fake Opera Mini Web site that encourages users to download the browser. Clicking on the link on the site begins the installation routine for the malware, downloading a package called "opera_mini_65.apk".

"During installation, two sets of “Permission to Install” pages are displayed to smartphone users: (1) The first set comes from the malware itself. As you can see, it asks for read and modify rights to all SMS and MMS messages, read rights to all contacts stored on the smartphone, and modify or delete rights to the SD card, among other things," Jovi Umawing of GFI Labs wrote in an analysis of the malware.
Once on the infected Android device, the malware will redirect the user to a legitimate download page for Opera Mini, making the installation of the malware seem more authentic. If users choose to install the browser, the actual Opera Mini browser will show up on their phone. But the malware already is working in the background.
Its first action is to send an SMS message to a premium-rate number controlled by the attackers. The infected Android also connects to a command-and-control server to retrieve instructions for the malware. Here is some of the data that the OpFake malware collects from each infected device, according to Umawing:
    • Country location
    • Operator name
    • OS version
    • Phone type
    • Device ID (IMEI)
As Umawing points out, the best idea for mobile users is to download apps only from the official app stores of the platform provider. That's easy on iPhones, because there's no real choice, but for Android users, there are a slew of alternative markets and sites that offer Android apps. It can be difficult to determine which ones are legitimate and which are malicious, so staying with the official Google Play market is the safest option

Source: threatpost

Blackhat USA 2012 Conference - Pushing Past Intrusion Tolerance, Cutting Edge Research

 The Blackhat 2012

The Blackhat 2012 keynote started the event with Shawn Henry, former Executive Assistant Director of the Fbi, painting a grim, seemingly unspeakable picture of cyberespionage in the US. It was interesting that he continually spoke about the gravity of the situation and the need to apply what he learned at the Fbi to protecting digital assets, but he couldn't describe a single concrete example. At the same time, other than a weapon of mass destruction, he claimed that cyber threats are the single biggest problem facing this nation. This inability to convey concrete details during the Blackhat keynote only highlights some of the problem in understanding the cyber problem. And it's the problem of overclassification of computer network exploitation (CNE) incidents and a tangled set of dynamics that silence breach data sharing and exchange. There is a long way to go here to fixing it.


While parts of the talk were very interesting, especially discussion of creating a hostile network for your adversaries and taking intrusion tolerance a step further, it was criticized for being a bit self-promoting. All across the twittersphere, tweets like this one protested signs of this year's corporate influence.
The two days of talks explored some new territory. Day 1 included "Advanced ARM Exploitation", where Stephen Ridley and Stephen Lawler provided some more indepth Android exploitation details and the quirks in exploring the software and developing exploits on the platform. For example, ROP techniques are required even to perform the ancient ret2libc technique on Android. They poured over data manipulation on ARM and particular assembly level tricks, specifics of discovering ROP pivots and pushing data into the stack on ARM for control. The talk provided content from their hands-on, 650+ slides across 12 decks, 80 page lab manual, multi-day course "Practical ARM Exploitation".


Other notable talks included Chris Valesek and Tarjei Mandt's discussion of Windows 8 Heap Internals. From the offensive security perspective, they blew through new Windows 8 usermode and kernel heap protections that they reversed and analyzed, based on Microsoft's heavy investment in understanding and addressing past exploitation techniques. 

The two presented a list of eight or ten past publicly known heap exploitation techniques effective on Windows 7 and prior that Microsoft for the most part has stamped out on Windows 8 with new protection technologies. An impressive feat on the part of Microsoft, and something the other vendors, like Oracle and Apple, have a difficult time keeping up with.
This presentation was followed by Microsoft's Matt Miller and Ken Johnson, whose previous work can be found in the Uninformed journal and early ASLR technology implementations. These two "defenders" provided details on the long list of protections from the Microsoft Security Science team previously discussed by the two "attackers" onstage.

Day two brought two talks that were particularly good. For another year, Mark Vincent Yason and Paul Sabanal from IBM X-Force presented their analysis of Adobe's sandboxing technology, this time focusing on Flash. The talk was very well structured and progressed, probably the best technical talk I attended. They pulled apart details of three different implementations of the Flash sandbox for Firefox and Chrome web browsers, finding that "Pepper Flash" is implemented with the lowest level of privileges and tightest set of policies. Pepper is the plugin API that the Adobe and Google teams are using to develop this more secure plugin that is yet to be complete for chrome.

The end of the day approached with a talk from Jonathan Brossard on "Hardware Backdooring is Practical", where he presented his tool, "Rakshasa", focused on permanently backdooring computer hardware. The tool is frankensteined together from various open source projects like Coreboot, SeaBIOS and iPXE, so as to minimize any visibility into this software as malicious, attempting to gain a greater chance of evading anti-malware solutions. Interesting PoC material indeed. But the backdoor does not really backdoor any hardware, it is all software-based. Other interesting functionality included its ability to disable DEP and ASLR, remove CPU updates, and force write permissions on every kernel level memory mapping.

 Source Kaspersky Lab : Securelist

It's you on photo? or It's about you?Twitter Malware


Twitter malware warning: It's you on photo? or It's about you?

Summary: A new piece of malware is spreading on Twitter by getting users to click on a link that allegedly features a photo of them. There is no such photo on the other end.

Twitter malware warning: It's you on photo? or It's about you?
Security researchers have discovered a new Twitter scam campaign that is spreading quickly across the social network by claiming to be a photo of the victim. Please be warned: there is no photo. There are, however, individuals very interested in putting the Blackhole exploit kit onto your computer (note: this is not the first time Twitter users are specifically being targeted, and it certainly won't be the last).
The malware uses at least two different messages to spread. Twitter searches for "It's you on photo?" and "It's about you?" show that the scam is still circulating widely.
As you can see in the screenshot above, the malicious tweets follow this pattern (please note that the cybercriminals can change the scam's wording as they please):
@[username] It's about you? http://[domain]/#[username].html
@[username] It's you on photo? http://[domain]/#[username].html

Soure on Kaspersky Lab by: ZDNET

Sunday, July 29, 2012

Facebook Pop Out Page Like Button For Your Blog!!

 Facebook Pop Out Page Like Button For Your Blog!!

Pop Out Like Box attract your visitor to click it and get more fans.
there is a a X button if they want it to close.
This is very easy to install just fallow the instruction..




How To Add In Blogspot?
1.) Go To Your www.blogger.com
2.) Open Your Desire Blog.
3.) Go To Layout.

4.) Click "Add A Gadget" Where You Want To Add It.

5.) Now Scroll To "HTML-JAVASCRIPT"


6.) Click "+" Icon To Add It.

7.) Now Copy The Below Code And Paste It To There.

Find EDIT the fallowing RED  Word..

Receive all updates via Facebook. Just Click the Like Button Below 
and replace the page name

Blogmytuts
8.) Leave The Title Empty.

9.) Click Save, Now You Are Done.





<script src='http://ajax.googleapis.com/ajax/libs/jquery/1.5/jquery.min.js'></script>
<script src="https://gj37765.googlecode.com/svn/trunk/html/[www.gj37765.blogspot.com]jquery.colorbox-min.js"></script>
<link rel="stylesheet" href="https://gj37765.googlecode.com/svn/trunk/html/%5Bwww.gj37765.blogspot.com%5Dfbpopup.css" type="text/css" />
<script type="text/javascript">
jQuery(document).ready(function(){
if (document.cookie.indexOf('visited=flase') == -1) {
var fifteenDays = 1000*60*60*24*30;
var expires = new Date((new Date()).valueOf() + fifteenDays);
document.cookie = "visited=true;expires=" + expires.toUTCString();
$.colorbox({width:"400px", inline:true, href:"#mdfb"});
}
});
</script>
<div style='display:none'>
<div id='mdfb' style='padding:10px; background:#fff;'>
<h3 class="mdbox-title">Receive all updates via Facebook. Just Click the Like Button Below<center><p style="line-height:3px;" >▼</p></center></h3>
<center>
<iframe src="//www.facebook.com/plugins/likebox.php?href=http%3A%2F%2Fwww.facebook.com%2FBlogmytuts&amp;width=300&amp;colorscheme=light&amp;show_faces=true&amp;border_color=%23ffffff&amp;stream=false&amp;header=false&amp;height=258" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:300px; height:258px;" allowtransparency="true"></iframe>
</center><p style=" float:right; margin-right:35px; font-size:9px;" >Powered By <a style=" font-size:9px; color:#3B78CD; text-decoration:none;" href="http://blogmytuts.blogspot.com/">Blogmytuts</a></p>
</div></div>

TIPS! BUY Canon Product with RED Sticker

TIPS! BUY Cannon Product with RED Sticker



Look for the RED sticker on the box flap to make sure you have a legitimate Canon Product. 

Gray Products- Those not brought in to the country by Canon Marketing Philippines, Inc.


3 Year Warranty


  FREE 4GB SD Card, Camera Case and 3-Year Warranty


Samsung WB850F WiFi Camera

Samsung WB850F WiFi Camera
  • 21x Optical Zoom
  • GPS Built-in Map
  •  16 MP CMOS Sensor
  • WiFi Connectivity                                            (SNS Upload,Email,PC,Aitobackup,Remote Viewfinder,Mobile Link,TV Link)
  • 3"AMOLED
  • Full HD Movie (1080p)







Other Feature:
  • Live Panorama-Sweep across and take a vertical or horizontal panorama shots.
  • Magic Frame- Turn picture into an old photo still or put a friend's face on a billboard background.
  • Picture in a Picture-Insert a picture within another picture or embedded a video clip on a still photo.
  • Split Shot- Merge up to 3 different images and create an artistic statement.


 The Retail Price is P19,900  as the Specs Say 3" amoled, GPS, and 16 MP CMOS sensor

Samsung DV300F a WiFi Camera

Samsung DV300F a WiFi Camera

  • Dual LCD (1.5" Front LCD)
  • 5x Zoom
  • 16 Megapixels
  • WiFi Connectivity
  • (SNS Upload, Email, PC Autobackup, Remote Viewfinder, Mobile Link,TV Link)
  • F2.5 Bright Lens
  • HD Movie Recording (720/30p)
  • Motion Photo

Other Feature:

  • Live Panorama-Sweep across and take a vertical or horizontal panorama shots.
  • Magic Frame- Turn picture into an old photo still or put a friend's face on a billboard background.
  • Picture in a Picture-Insert a picture within another picture or embedded a video clip on a still photo.
  • Split Shot- Merge up to 3 different images and create an artistic statement.
  • Motion Picture- You can freeze time around a moving subject to create enchanting images. Capture a friend dancing while everyone else around him is still as statue.

The Samsung SMART Camera WB150F is available nationwide and retails at   P9,990

I did check the Price on SM City of San Fernando. cheaper than Samsung WB150F