Sunday 10 January 2016

OLA WORKING CODES 11 JANUARY 2016

Get 20% OFF on all Your Rides
Verified on 11 Jan 2016. Ola is Offering Flat 20% OFF on all your Rides. They know your love for Happy Hours- so They have got Happy Hours running ALL day long. This week, get 20% OFF Up to Rs 75 on all your rides when you pay with OLA Money. Open the OLA app, Select your ride, Hit ‘RIDE NOW’, Apply code and get the Discount on Cab Ride. This is valid only on mini and Sedan rides. Your Ola Money Should have balance, at least, Rs 100. Book Now. Booking Cabs is very easy now with Ola Cabs.



coupon code: FLAT20


Get Rs 150 Cashback on Ola Money Recharges
Verified on 11 Jan 2016. Ola Money Recharge is back again. Get Rs 150 Cashback with your SBI Credit Cards (Exclusive Corporate Cards). Recharge your Ola Money, Apply the above Code, Get Instant Cashback Upto Rs 150. This is Valid on First Ola Money Recharges. You can Use Your Ola Money to Send money to your Loved Ones, Mobile Recharges, Deals on Exclusive Merchants and many more. So Recharge your Ola Money Now.


coupon code: SBIOM150



Get Flat 25% OFF on Cab Booking(All Users)
Verified on 11 Jan 2016. Ola is Offering Flat 25% OFF on all Rides. Use the above Code and get Discount for the next 2 Rides, enjoy 25% OFF on your next cab rides. This is Valid on app only. This is Applicable only for bookings made on Ola Mini and Ola Sedan. Get the Cab within minutes at Your Door Step with one Click through Ola App. This Code must be applied before the Ride. This is Valid for TO and FROM the Airport.




coupon code: AIR25





Get a Free Ride on Ola Prime Rides in Bangalore, Mumbai & Delhi
Verified on 11 Jan 2016. Ola Prime Perks is Here. Ola is Offering a Free Prime Ride on Every three Rides You Take on Prime in January. So, 6 Prime rides would mean 2 free rides and 9 Prime rides would mean 3 free rides and so on. To enroll for the Free Ride, all you need to do is use the above code on your next Prime ride. Your rides under this Code will get calculated from this ride. Free ride vouchers worth Rs 250 will be credited on the 3rd February. This is Applicable only in Bangalore, Mumbai and Delhi. Book Now and get a Free Ride. This is Valid for all Users. 



coupon code: PRIME3







Tuesday 14 April 2015

What Is Smartwatch

A wearable computing device worn on a user's wrist that offers functionality and capabilities similar to those of a smartphone. Smartwatches are designed to, either on their own or when paired with a smartphone, provide features like connecting to the internet, running mobile apps, making calls, messaging via text or video, checking caller ID, accessing stock and weather updates, providing fitness monitoring capabilities, offering GPS coordinates and location directions, and more. 

A number of companies either currently have smart watches on the market or are rumored to be developing smartwatches, including Google, Samsung, Apple (the "iWatch"), LG, Sony, Pebble and various others.

While the smartwatch industry is still in its infancy, new and emerging technologies like Corning’s flexible Willow Glass, Bluetooth 4.0 and more power-efficient processors and displays are providing the potential for the development of more advanced, longer-lasting smartwatches than those currently available.

What is a SmartPhone

A smartphone (or smart phone) is a mobile phone with an advanced mobile operating system. They typically combine the features of a cell phone with those of other popular mobile devices, such as personal digital assistant (PDA), media player and GPS navigation unit. Most smartphones have a touchscreen user interface and can run third-party apps, and are camera phones. Smartphones from 2012 onwards also have high-speed mobile broadband 4G LTE internet web browsing, motion sensors, and mobile payment mechanisms.

What Means of Root


What rooting is -

Rooting a device is simply the process of gaining full, privileged, or admin control of a device thus allowing ‘root access’ or ‘superuser’ permissions. The process itself basically exploits a security weakness on a device, and in simple terms, grants the user executable permissions that are not otherwise there with a non-rooted device. Once a device is rooted, the user has complete control of the device from files on the device to being able to perform additional tasks that will truly make your device your own. These days, most devices are very easy to root. Also, keep in mind that the method(s) you run across to root your device has been done numerous times by countless others.

No technical knowledge is required for the most part – just basic computer knowledge if anything. I’m far from a ‘techie type’ but recently I sold a rooted device I had been using for the past year and began using my old device that wasn’t rooted (I hadn’t gotten the rooting bug when I used my previous device). In a matter of 15 minutes I was rooted without any prior knowledge of how to root that device. It’s literally that easy, for the most part. Rooting has come a long way since the first Android smartphone, and rooting a device usually only takes a few minutes once a little bit of homework on the user’s part is done.


Why you should root your Android phone?

As mentioned above, rooting gives the user ultimate control over a device. Imagine for a second that you couldn’t access, alter, or delete a file or program on the PC/laptop that you own. That really doesn’t make much sense does it? Granted you could mess some things up if you’re not careful, but you do have the right and are given that ability as the superuser or admin of your PC that you paid money for. You are the ‘root’ user of your PC or laptop. Now think, do you have complete control of the device that you’ve no doubt paid a lot of money for? If the manufacturer doesn’t limit what you can do on your laptop, why do phone manufacturers do it?

Beyond just the basic idea of knowing you have complete control of your device, rooting allows you to modify the phone to your liking. Do you hate all of that carrier ‘bloat’ that is preloaded on your device? Don’t just disable it, root it and get rid of it so you have more storage. Are you annoyed by ads like I am? Simply download an app from the Play Store (root required) and block those ads.

Additionally, if you don’t have a Google device, chances are that you get updates later than when Google officially releases them – way later or in some cases never, since they then have to go through the carrier to be ‘massaged.’ When you’re rooted, you can get those updates within a few days from developers that own your same device via a custom ROM. Speaking of custom ROMs, most ROMs include an option to tether. This is in fact a major reason why most go ahead and make the leap to root.

Other benefits include the ability to completely back up your system onto your SD card. This way if all else fails, you could boot into your recovery and load the backup that you have saved that is sitting on an external storage. Additionally, you can modify boot animations, fonts, and themes. No techie or coding experience is necessary. The beauty these days is that there are numerous apps that allow you to make these changes with a few selections of available options via the app(s).
  

Friday 3 February 2012

How to make key generators

I take no responsibility of the usage of this information.
This tutorial, is for educational knowledge ONLY.
Hi there, in this tutorial, I intend to teach you how to make a pretty
simple keygen, of a program called W3Filer 32 V1.1.3.
W3Filer is a pretty good web downloader...
I guess some of you might know the program.
I`ll assume you know:
A.How to use debugger (in this case, SoftIce).
B.How to crack, generally (finding protection routines,patching them,etc...).
C.How to use Disassembler (This knowledge can help).
D.Assembly.
E.How to code in Turbo Pascal ™.
Tools you`ll need:
A.SoftIce 3.00/01 or newer.
B.WD32Asm. (Not a must).
C.The program W3Filer V1.13 (if not provided in this package), can be found in
www.windows95.com I believe.
D.Turbo Pascal (ANY version).
Well, enough blah blah, let's go cracking...
Run W3Filer 32.
A nag screen pops, and , demands registration (Hmm, this sux ;-)) Now,
We notice this program has some kind of serial number (Mine is 873977046),
Let's keep the serial in mind, I bet we`ll meet it again while we're on
the debugger.
Well, now, let's put your name and a dummy reg code...
set a BP on GetDlgItemTextA, and, press OK.
We pop inside GetDlgItemTextA, Lets find the registration routine...
I`ll save you the work, the registration routine is this:
:00404DB2 8D95A8FAFFFF lea edx, dword ptr [ebp+FFFFFAA8]
:00404DB8 52 push edx ---> Your user name here.
:00404DB9 E80B550000 call 0040A2C9 ---> Registration routine.
:00404DBE 83C408 add esp, 00000008 ---> Dunno exactly what is it.
:00404DC1 85C0 test eax, eax ---> Boolean identifier, 0 if
:00404DC3 7D17 jge 00404DDC ---> registration failed, 1 if
OK.
Well, Let's enter the CALL 40A2C9, and see what's inside it:
(Please read my comments in the code).
* Referenced by a CALL at Addresses:
|:00404DB9 , :00407F76
|
:0040A2C9 55 push ebp
:0040A2CA 8BEC mov ebp, esp
:0040A2CC 81C4B0FEFFFF add esp, FFFFFEB0
:0040A2D2 53 push ebx
:0040A2D3 56 push esi
:0040A2D4 57 push edi
:0040A2D5 8B5508 mov edx, dword ptr [ebp+08]
:0040A2D8 8DB500FFFFFF lea esi, dword ptr [ebp+FFFFFF00]
:0040A2DE 33C0 xor eax, eax
:0040A2E0 EB16 jmp 0040A2F8
* Referenced by a (U)nconditional or ©onditional Jump at Address:
|:0040A2FB©
|
:0040A2E2 0FBE0A movsx ecx, byte ptr [edx] ----> Here Starts the
interesting part.
:0040A2E5 83F920 cmp ecx, 00000020 ----> ECX is the the current
char in the user name, Hmm, 20h=' '...
:0040A2E8 740D je 0040A2F7 ----> Let's see,
:0040A2EA 8A0A mov cl, byte ptr [edx] ----> Generally, all this loop
does, is copying
the user name from
[EDX], to [ESI], WITHOUT the spaces!
(Keep this in mind! ).
:0040A2EC 880C06 mov byte ptr [esi+eax], cl
:0040A2EF 42 inc edx
:0040A2F0 40 inc eax
:0040A2F1 C6040600 mov byte ptr [esi+eax], 00
:0040A2F5 EB01 jmp 0040A2F8
* Referenced by a (U)nconditional or ©onditional Jump at Address:
|:0040A2E8©
|
:0040A2F7 42 inc edx
* Referenced by a (U)nconditional or ©onditional Jump at Addresses:
|:0040A2E0(U), :0040A2F5(U)
|
:0040A2F8 803A00 cmp byte ptr [edx], 00
:0040A2FB 75E5 jne 0040A2E2 ----------------> This is the loop , we got
what it does,
Let's continue tracing
the code...
:0040A2FD 56 push esi --------> The user name is pushed, in order
to
Upcase it's chars.
* Reference To: USER32.CharUpperA, Ord:0000h
|
:0040A2FE E80F330000 Call User!CharUpper ---> After this, our name is in
upper case.
:0040A303 56 push esi -----> Our name in upper case here.
* Reference To: cw3220mt._strlen, Ord:0000h
|
:0040A304 E86F300000 Call 0040D378 ---> This is the length of our name.
:0040A309 59 pop ecx
:0040A30A 8BC8 mov ecx, eax ---> ECX=Length.
:0040A30C 83F904 cmp ecx, 00000004 ---> Length>=4 (MUST).
:0040A30F 7D05 jge 0040A316 ---> Let's go to this address...
:0040A311 83C8FF or eax, FFFFFFFF
:0040A314 EB67 jmp 0040A37D
* Referenced by a (U)nconditional or ©onditional Jump at Address:
|:0040A30F©
|
:0040A316 33D2 xor edx, edx
:0040A318 33C0 xor eax, eax
:0040A31A 3BC8 cmp ecx, eax
:0040A31C 7E17 jle 0040A335 ---> (Not important, just another useless
checking).
===================================================================================
============ FROM HERE AND ON, THE IMPORTANT CODE, PAY ATTENTION ==================
===================================================================================
One thing before we continue, EDX = 00000000h as we enter to the next instructions.
* Referenced by a (U)nconditional or ©onditional Jump at Address:
|:0040A333©
|
:0040A31E 0FBE1C06 movsx ebx, byte ptr [esi+eax] ---> EBX <--- char in user
name, offset EAX.
:0040A322 C1E303 shl ebx, 03 -----> Hmm, it shl's the char by 03h...
(Remember that).
:0040A325 0FBE3C06 movsx edi, byte ptr [esi+eax] ---> Now EDI <--- Char in
user name , offset EAX.
:0040A329 0FAFF8 imul edi, eax -----> It multiplies the char by the
offset in user name! (Remember that).
:0040A32C 03DF add ebx, edi -----> Adds the result to EBX (That was
Shelled (Ding Dong =)).
:0040A32E 03D3 add edx, ebx -----> EDX=EDX+EBX!!! - This is the CORE
of this registration routine!!!
:0040A330 40 inc eax -----> Increase EAX by one (next char).
:0040A331 3BC8 cmp ecx, eax
:0040A333 7FE9 jg 0040A31E ----> If ECX<EAX then, we leave the
loop.
* Referenced by a (U)nconditional or ©onditional Jump at Address:
|:0040A31C©
|
:0040A335 A120674100 mov eax, dword ptr [00416720] ---> HMMMMMM, What's in
here?????
:0040A33A C1F803 sar eax, 03 ---------> WAIT! Please type in SIce '?
EAX'
Does this number in EAX look
familiar to us? ;-)
If you still don`t understand,
than, It's
our SERIAL NUMBER! (PLEASE, take
your time, and check by
yourself - don`t trust me!). OK,
so now we know,
That it SHR's EAX by 03 (SAR is
almost identical to SHR).
:0040A33D 03D0 add edx, eax ---------> Hmm, it adds the result from the
loop, the serial number shr'd by 03h
:0040A33F 52 push edx -------> Let's continue. (At this point, I
can tell you , the reg number, is
in EDX - only that the reg number
is in HEX --> That's how you enter it).
* Possible StringData Ref from Data Obj ->"%lx"
|
:0040A340 685EF54000 push 0040F55E
:0040A345 8D95B0FEFFFF lea edx, dword ptr [ebp+FFFFFEB0]
:0040A34B 52 push edx
* Reference To: USER32.wsprintfA, Ord:0000h
|
:0040A34C E8E5320000 Call 0040D636 -------> This one, does HEX2STR (Takes
the value from EDX, and turns it to an hex string).
:0040A351 83C40C add esp, 0000000C
:0040A354 8D8DB0FEFFFF lea ecx, dword ptr [ebp+FFFFFEB0] -----> type 'd ecx' -
THIS is the reg number! That's enough for us, the rest of
the code, is
just for comparing the correct reg code with ours.
:0040A35A 51 push ecx
* Reference To: USER32.CharLowerA, Ord:0000h
|
:0040A35B E8B8320000 Call 0040D618
:0040A360 8D85B0FEFFFF lea eax, dword ptr [ebp+FFFFFEB0]
:0040A366 50 push eax
:0040A367 FF750C push [ebp+0C]
* Reference To: cw3220mt._strcmp, Ord:0000h
|
:0040A36A E875300000 Call 0040D3E4
:0040A36F 83C408 add esp, 00000008
:0040A372 85C0 test eax, eax
:0040A374 7405 je 0040A37B
:0040A376 83C8FF or eax, FFFFFFFF
:0040A379 EB02 jmp 0040A37D
* Referenced by a (U)nconditional or ©onditional Jump at Address:
|:0040A374©
|
:0040A37B 33C0 xor eax, eax
* Referenced by a (U)nconditional or ©onditional Jump at Addresses:
|:0040A314(U), :0040A379(U)
|
:0040A37D 5F pop edi
:0040A37E 5E pop esi
:0040A37F 5B pop ebx
:0040A380 8BE5 mov esp, ebp
:0040A382 5D pop ebp
:0040A383 C3 ret
Making the actual Keygen
~~~~~~~~~~~~~~~~~~~~~~~~
Now, after I've explained how does the program calculate the registration
code, you can either write your own keymaker, without looking at my code, or
look at my code (in Turbo Pascal - sorry for all you C lovers ;-) Next time).
That's it, here's the source of my keygen:
------------------- Cut here ---------------------------------------------
Program W3FilerKeygen;
var
Key,SerialNum,EB,ED,digit:Longint;
I,x:Byte;
Name,KeyHex:String;
begin
Writeln(' W3Filer32 V1.1.3 Keymaker');
writeln('Cracked by ^pain^ ''97 / Rebels!');
Write('Your Name:'); { Read the name }
readln(Name);
Write('Serial Number:');
readln(SerialNum); {Yes, we need the serial number for the calculation!}
Key:=0;
x:=0;
For I:=1 to length(Name) do
begin
Name[I]:=upcase(Name[i]);
If Name[I]<>' ' then begin
eb:=ord(Name[I]) shl 3; {EB = Name[I] Shl 03h}
Ed:=ord(Name[I]); {ED = Name[I]}
ed:=ed*(x); {ED=ED*Offset}
inc(x);
eb:=eb+ed; {Add ED to EB}
Key:=Key+EB; {Add EB to KEY}
end;
end;
Key:=Key+(SerialNum shr 3); { Add SerialNum shr 03h to Key}
{ From here, this is just HEX2STRING --> I`m quite sure it's
Self explaintory, else - go and learn number bases again! ;-)}
KeyHex:='';
repeat
digit:=Key mod 16;
key:=key div 16;
If digit<10 then KeyHex:=Chr(Digit+ord('0'))+KeyHex;
If digit>10 then KeyHex:=Chr(Digit-10+ord('a'))+KeyHex;
until key=0;
writeln('Your Key:',KeyHex);
writeln(' Enjoy!');
end.