Sunday, 28 December 2014

GunsnGlory AIO Pack free (AndroiD)

Guns'n'Glory AIO Pack (AndroiD) - [VipiN]

Guns'n'Glory
+
Guns'n'Glory WW2 Premium
+
Guns'n'Glory Heroes Premium











Take up a smart, strategic position and lie in wait at the canyon to ambush settlers, stagecoaches and the gold train.

FULL FEATURED and AD-FREE (no in-game ads)!

Features:
- Defense Strategy-Action game with mobile units
- Wild West scenario
- Upgrade bandits to 3 levels
- Guns, flaming arrows, dynamite and cannons
- More than 15 types of enemies and units
- Auto balancing for saddle-weary or brave gunslingers
- High Noon highscore function
- 60 leaded levels
- Bonus chests for gold nuggets and power-ups
- Supports App 2 SD

What would the Wild West have been without its charismatic villains? Boring! So take a walk in the cowboy boots of Billy the Kid, Jesse James or Butch Cassidy to become a real, low-down bad guy! Form your own gang by recruiting cool cowboys, crazy Mexicans and brave Indians. Take up a smart, strategic position and lie in wait at the canyon to ambush settlers, stagecoaches and the gold train. Rain bullets, lead and flaming arrows down on the pious pioneers! If your victims look like they might escape, set off in pursuit to stop them from alerting the Sheriff! When you have bagged more than a fistful of dollars, you'll be able to afford cannons or a steam train with a Gatling gun to send around the level!
Explosive defense action in World War II!

* Play without ads and start with 100 Glory Coins! *

Grab your bazookas and ready your grenades in the thrilling successor to the award-winning action-strategy game Guns’n’Glory! Order your tanks into combat and march your troops to the frontlines of World War II. Axis or Allies - the battle will be decided by YOU!

Features:
- Thrilling defense-action strategy during WW2
- Successor to the popular Guns’n’Glory Wild West game
- 2 factions to choose from: US Forces, Axis Germany
- 4 different units to recruit on each side
- 12 challenging maps with 3 different difficulty modes
- RPG-like skill system to upgrade your units
- Powerful items to use for tactical advantages
- Earn Glory Coins and spend them on troop and battlefield improvements
- Earth-shattering explosions and awesome effects
- Pounding battle tunes
- Full tablet support

* Supports Immersion haptic technology *

* Xperia PLAY optimized *

It’s the winter of 1944, Western Front. You and your boys are on guard duty when the enemy decides to throw wave after wave of troops at your position. Time to man the defenses! Recruit and upgrade troops, order tanks into battle and beat the enemy with superior tactics and firepower! Call in air strikes to gain the upper hand and collect supply crates to boost troop morale! Put the heat on the enemy with your flamethrowers and have your medics tend to your soldiers! Take up the guns and earn your glory!
Sharpen the axe, polish your armor and ready your guns! It's time to fight for glory, honor and gold once more! Guns'n'Glory is back!

* Play without ads and start with 750 Gold Coins! *

Features:
✔Newest entry in the popular Guns’n’Glory series
✔Epic fantasy defense action with Elves and Dwarves
✔Control 3 mighty heroes in their battle against the Orcs
✔Use and improve your 12 powerful combat abilities
✔Journey into forests, swamps and snowy mountains in 50 challenging levels
✔Experience an enchanting storyline spanning 5 exciting chapters
✔Prove your tactical skills and master the Heroic Difficulty mode

The realm is under attack as Orcs, apostate Elves and dark knights roam the lands! Help our heroes Smirl, Arlon and Eloa in their epic struggle against this evil menace! Harness the power of light and face your enemies! Annihilate whole armies with magical fire and ice! Unleash the Dwarven Fury upon your foes and split Orcs skulls! Join your party of stalwart heroes and become the Champion of the Hill Lands!
1. Unrar
2. Install
3. Play

How To make money with adfouc.us

Description :Here's a method im using right now on Adfocus. Remember guys, don't abuse this method as they are likely to ban you if you make crazy amounts like 1200$ in 2 hours. Just do it like me 30$ max per day (or more if you wish to, but i still didn't get banned :) ) !What you need : - a brain :troll:- a PC (dugh...)- an internet connection- Mozilla Firefox !Method :Step 1: Register at http://www.adfoc.usStep 2: Get on Firefox, and download this add-on: https://addons.mozilla.org/en-us/firefox/addon/ipflood/Step 3: Also download this add-on: https://addons.mozilla.org/en-us/firefox/addon/reloadevery/ Step 4: Make a link with adfoc.us, and open it in about 20 tabs or so.Step 5: Right click on all the tabs and hover of ReloadEvery, than click every 10 seconds (best results with 10) than click enableStep 6 (optional): Use a window hider to hide Firefox, you can just keep it going all day, and get about $30 a day

Saturday, 27 December 2014

How to Secure Wireless (Wi-Fi) Home Network

This article describes how you can secure your Wireless Network from hackers and you’ll also learn about free tools that people generally use to intercept your Wi-Fi signals.
Wireless networks (wi-fi)Wireless Networking (Wi-Fi) has made it so easy for you to use the computer, portable media player, mobile phones, video game consoles, and other wireless devices anywhere in the house without the clutter of cables.
With traditional wired networks, it is extremely difficult for someone to steal your bandwidth but the big problem with wireless signals is that others can access the Internet using your broadband connection even while they are in a neighboring building or sitting in a car that’s parked outside your apartment.
This practice, also known as piggybacking, is bad for three reasons:

  • It will increase your monthly Internet bill especially when you have to pay per byte of data transfer.
  • It will decrease your Internet access speed since you are now sharing the same internet connection with other users.
  • It can create a security hazard* as others may hack your computers and access your personal files through your own wireless network.
[*] What do the bad guys use - There have been quite a few instances where innocent Internet users have been arrested for sending hate emails when in reality, their email accounts where hacked though the unsecured Wi-Fi networks that they had at home. Wireshark is a free packet sniffing tool for Linux, Mac and Windows that can scan traffic flowing though a wireless network including cookies, forms and other HTTP requests.

How to Secure Your Wireless Network

The good news is that it is not very hard to make your wireless network secure, which will both prevent others from stealing your internet and will also prevent hackers from taking control of your computers through your own wireless network.
Here a few simple things that you should to secure your wireless network

Step 1. Open your router settings page

First, you need to know how to access your wireless router’s settings. Usually you can do this by typing in “192.168.1.1” into your web browser, and then enter the correct user name and password for the router. This is different for each router, so first check your router’s user manual.
You can also use Google to find the manuals for most routers online in case you lost the printed manual that came with your router purchase. For your reference, here are direct links to the manufacturer’s site of some popular router brands – Linksys, Cisco, Netgear, Apple AirPort, SMC, D-Link, Buffalo, TP-LINK, 3Com, Belkin.

Step 2. Create a unique password on your router

Once you have logged into your router, the first thing you should do to secure your network is to change the default password* of the router to something more secure.
This will prevent others from accessing the router and you can easily maintain the security settings that you want. You can change the password from the Administration settings on your router’s settings page. The default values are generally admin / password.
[*] What do the bad guys use - This is a public database of default usernames and passwords of wireless routers, modems, switches and other networking equipment. For instance, anyone can easily make out from the database that the factory-default settings for Linksys equipment can be accessed by using admin for both username and password fields.

Step 3. Change your Network’s SSID name

The SSID (or Wireless Network Name) of your Wireless Router is usually pre-defined as “default” or is set as the brand name of the router (e.g., linksys). Although this will not make your network inherently* more secure, changing the SSID name of your network is a good idea as it will make it more obvious for others to know which network they are connecting to.
This setting is usually under the basic wireless settings in your router’s settings page. Once this is set, you will always be sure that you are connecting to the correct Wireless network even if there are multiple wireless networks in your area. Don’t use your name, home address or other personal information in the SSID name.
Also see: Change Network Name to Prevent Wi-Fi Theft
[*] What do the bad guys use - Wi-Fi scanning tools like inSSIDer (Windows) and Kismet (Mac, Linux) are free and they will allow anyone to find all the available Wireless Networks in an area even if the routers are not broadcasting their SSID name.

Step 4. Enable Network Encryption

In order to prevent other computers in the area from using your internet connection, you need to encrypt your wireless signals.
There are several encryption methods for wireless settings, including WEP, WPA (WPA-Personal), and WPA2 (Wi-Fi Protected Access version 2). WEP is basic encryption and therefore least secure (i.e., it can be easily cracked*, but is compatible with a wide range of devices including older hardware, whereas WPA2 is the most secure but is only compatible with hardware manufactured since 2006.
To enable encryption on your Wireless network, open the wireless security settings on your router’s configuration page. This will usually let you select which security method you wish to choose; if you have older devices, choose WEP, otherwise go with WPA2. Enter a passphrase to access the network; make sure to set this to something that would be difficult for others to guess, and consider using a combination of letters, numbers, and special characters in the passphrase.
[*] What do the bad guys use - AirCrack and coWPAtty are some free tools that allow even non-hackers to crack the WEP / WPA (PSK) keys using dictionary or brute force techniques. A video on YouTube suggests that AirCrack may be easily used to break WiFi encryption using a jail-broken iPhone or an iPod Touch.

Step 5. Filter MAC addresses

Whether you have a laptop or a Wi-Fi enabled mobile phone, all your wireless devices have a unique MAC address (this has nothing to do with an Apple Mac) just like every computer connected to the Internet has a unique IP address. For an added layer of protection, you can add the MAC addresses of all your devices to your wireless router’s settings so that only the specified devices can connect to your Wi-Fi network.
MAC addresses are hard-coded into your networking equipment, so one address will only let that one device on the network. It is, unfortunately, possible to spoof a MAC address*, but an attacker must first know one of the MAC addresses of the computers that are connected to your Wireless network before he can attempt spoofing.
To enable MAC address filtering, first make a list of all your hardware devices that you want to connect to your wireless network**. Find their MAC addresses, and then add them to the MAC address filtering in your router’s administrative settings. You can find the MAC address for your computers by opening Command Prompt and typing in “ipconfig /all”, which will show your MAC address beside the name “Physical Address”. You can find the MAC addresses of Wireless mobile phones and other portable devices under their network settings, though this will vary for each device.
[*] What do the bad guys use - Someone can change the MAC address of his or her own computer and can easily connect to your network since your network allows connection from devices that have that particular MAC address. Anyone can determine the MAC address of your device wireless using a sniffing tool like Nmap and he can then change the MAC address of his own computer using another free tool like MAC Shift.

Step 6. Reduce the Range of the Wireless Signal

If your wireless router has a high range but you are staying in a small studio apartment, you can consider decreasing the signal range by either changing the mode of your router to 802.11g (instead of 802.11n or 802.11b) or use a different wireless channel.
You can also try placing the router under the bed, inside a shoe box or wrap a foil around the router antennas so that you can somewhat restrict the direction of signals.
Apply the Anti-Wi-Fi Paint – Researchers have developed a special Wi-Fi blocking paint that can help you stop neighbors from accessing your home network without you having to set up encryption at the router level. The paint contains chemicals that blocks radio signals by absorbing them. “By coating an entire room, Wi-Fi signals can’t get in and, crucially, can’t get out.”

Step 7. Upgrade your Router’s firmware

You should check the manufacturer’s site occasionally to make sure that your router is running the latest firmware. You can find the existing firmware version of your router using from the router’s dashboard at 192.168.*.

Connect to your Secure Wireless Network

To conclude, MAC Address filtering with WPA2 (AES) encryption (and a really complex passphrase) is probably the best way to secure your wireless network.
Once you have enabled the various security settings in your wireless router, you need to add the new settings to your computers and other wireless devices so that they all can connect to the Wi-Fi network. You can select to have your computer automatically connect to this network, so you won’t have to enter the SSID, passphrase and other information every time you connect to the Internet.
Your wireless network will now be a lot more secure and intruders may have a tough time intercepting your Wi-Fi signals.

Who is Connected to your Wireless Network

If you are worried that an outsider may be connecting to the Internet using your Wireless network, try AirSnare – it’s a free utility that will look for unexpected MAC addresses on your Wireless network as well as to DHCP requests. Another option is that you open your router’s administration page (using the 192.168.* address) and look for the DHCP Clients Table (it’s under Status > Local Network on Linksys routers). Here you will see a list of all computers and wireless devices that are connected to your home network.
*It is also a good idea to turn off the router completely when you are not planning to use the computer for a longer period (like when you are out shopping). You save on electricity and the door remains 100% shut for wireless piggybackers.
**If you ever want to let a new device connect to your network, you will have to find its MAC address and add it to your router. If you simple want to let a friend connect to your wireless network one time, you can remove his MAC address from the router settings when he or she leaves your place.

How to Transfer Contacts another Mobile Phone

The process may vary depending upon the phone support cloud but broadly, there are three options. I will discuss the most popular mobile platforms like BlackBerry, iPhone, HTC, Nokia, Windows Phone, Samsung and Android.

1. SIM based transfer

If the address book of your old phone is relatively small and you only want to copy the phone numbers to your new cell phone, simply use the SIM card.
Just copy the phone numbers from the old phone’s memory to your SIM card, insert this SIM card into your new phone and then copy the phone numbers in your new phone’s memory. Here’s a detailed guide on how to transfer contacts from the Nokia to an iPhone using the SIM.

2. Transfer Contacts via your Computer

The SIM card based approach is good only for transferring basic phone numbers but if your phone’s address book includes long names, email addresses, and other details of your contacts, you need some sort of software to help you with the transfer process.
For instance, if you have a Nokia phone but are shifting to a BlackBerry or an iPhone, you may use Nokia’s Ovi Suite application to copy your phone’s address book to Microsoft Outlook on your desktop computer. You can then use BlackBerry’s Desktop Manager software, or iTunes in the case of iPhone, or Kies for Samsung Galaxy, to transfer contacts from the PC (Outlook) to your new phone’s address book.

Windows Mobile users, like Samsung Omnia or HTC HD2, may again use Microsoft’s Device Center (or ActiveSync for XP) to copy their phone address book to the desktop via Outlook. If you are simply switching from one Windows Phone to another, you can transfer contacts via the cloud itself using Microsoft’s My Phone service.
If you have an old CDMA based mobile phone from, say Samsung or LG, you can use the free BitPim utility to copy the phone book to your computer. BitPim is available for Windows, Mac and Linux machines and it can export address books in standard vCard format (.vcf) that you can easily import into Outlook and other contact managers.

3. Transfer Phone book “Over the Air”

If you have an Internet enabled phone, you can easily copy contacts from your old phone to the new phone over-the-air without even requiring a computer.
An online service called Mobical is free and it works with most mobile phones from Nokia, Motorola, Sony Ericsson and so on. You first need to setup Mobical on the old phone and it will create a backup of your phone contacts in the cloud. Now setup Mobical on the new phone using the same credentials and it will automatically download all the contacts from the cloud to your new phone.
Then there’s Google Sync, a cloud based service that works with BlackBerry, iPhone, Nokia and most other mobile phones that are SyncML capable. Google Sync keeps your phone’s address book in sync with your Google Contacts. Therefore, if you now install Google Sync on both your old and new phone, they’ll have the same phone book entries automatically.
Android based phones can sync with Google Contacts out of the box – you can then export Google Contacts out as a CSV file and copy it to any other phone manually via the desktop tools. HTC even offers a desktop utility called HTC Sync that you may use to synchronize Outlook contacts with your Android phone. This will be handy when you want to copy your HTC’s phone book to another phone that is not web-enabled

How to Transfer Contacts another Mobile Phone

The process may vary depending upon the phone support cloud but broadly, there are three options. I will discuss the most popular mobile platforms like BlackBerry, iPhone, HTC, Nokia, Windows Phone, Samsung and Android.

1. SIM based transfer

If the address book of your old phone is relatively small and you only want to copy the phone numbers to your new cell phone, simply use the SIM card.
Just copy the phone numbers from the old phone’s memory to your SIM card, insert this SIM card into your new phone and then copy the phone numbers in your new phone’s memory. Here’s a detailed guide on how to transfer contacts from the Nokia to an iPhone using the SIM.

2. Transfer Contacts via your Computer

The SIM card based approach is good only for transferring basic phone numbers but if your phone’s address book includes long names, email addresses, and other details of your contacts, you need some sort of software to help you with the transfer process.
For instance, if you have a Nokia phone but are shifting to a BlackBerry or an iPhone, you may use Nokia’s Ovi Suite application to copy your phone’s address book to Microsoft Outlook on your desktop computer. You can then use BlackBerry’s Desktop Manager software, or iTunes in the case of iPhone, or Kies for Samsung Galaxy, to transfer contacts from the PC (Outlook) to your new phone’s address book.

Windows Mobile users, like Samsung Omnia or HTC HD2, may again use Microsoft’s Device Center (or ActiveSync for XP) to copy their phone address book to the desktop via Outlook. If you are simply switching from one Windows Phone to another, you can transfer contacts via the cloud itself using Microsoft’s My Phone service.
If you have an old CDMA based mobile phone from, say Samsung or LG, you can use the free BitPim utility to copy the phone book to your computer. BitPim is available for Windows, Mac and Linux machines and it can export address books in standard vCard format (.vcf) that you can easily import into Outlook and other contact managers.

3. Transfer Phone book “Over the Air”

If you have an Internet enabled phone, you can easily copy contacts from your old phone to the new phone over-the-air without even requiring a computer.
An online service called Mobical is free and it works with most mobile phones from Nokia, Motorola, Sony Ericsson and so on. You first need to setup Mobical on the old phone and it will create a backup of your phone contacts in the cloud. Now setup Mobical on the new phone using the same credentials and it will automatically download all the contacts from the cloud to your new phone.
Then there’s Google Sync, a cloud based service that works with BlackBerry, iPhone, Nokia and most other mobile phones that are SyncML capable. Google Sync keeps your phone’s address book in sync with your Google Contacts. Therefore, if you now install Google Sync on both your old and new phone, they’ll have the same phone book entries automatically.
Android based phones can sync with Google Contacts out of the box – you can then export Google Contacts out as a CSV file and copy it to any other phone manually via the desktop tools. HTC even offers a desktop utility called HTC Sync that you may use to synchronize Outlook contacts with your Android phone. This will be handy when you want to copy your HTC’s phone book to another phone that is not web-enabled 

GunsnGlory AIO Pack free (AndroiD)

Guns'n'Glory AIO Pack (AndroiD) - [VipiN]

Guns'n'Glory
+
Guns'n'Glory WW2 Premium
+
Guns'n'Glory Heroes Premium







Take up a smart, strategic position and lie in wait at the canyon to ambush settlers, stagecoaches and the gold train.

FULL FEATURED and AD-FREE (no in-game ads)!

Features:
- Defense Strategy-Action game with mobile units
- Wild West scenario
- Upgrade bandits to 3 levels
- Guns, flaming arrows, dynamite and cannons
- More than 15 types of enemies and units
- Auto balancing for saddle-weary or brave gunslingers
- High Noon highscore function
- 60 leaded levels
- Bonus chests for gold nuggets and power-ups
- Supports App 2 SD

What would the Wild West have been without its charismatic villains? Boring! So take a walk in the cowboy boots of Billy the Kid, Jesse James or Butch Cassidy to become a real, low-down bad guy! Form your own gang by recruiting cool cowboys, crazy Mexicans and brave Indians. Take up a smart, strategic position and lie in wait at the canyon to ambush settlers, stagecoaches and the gold train. Rain bullets, lead and flaming arrows down on the pious pioneers! If your victims look like they might escape, set off in pursuit to stop them from alerting the Sheriff! When you have bagged more than a fistful of dollars, you'll be able to afford cannons or a steam train with a Gatling gun to send around the level!
Explosive defense action in World War II!

* Play without ads and start with 100 Glory Coins! *

Grab your bazookas and ready your grenades in the thrilling successor to the award-winning action-strategy game Guns’n’Glory! Order your tanks into combat and march your troops to the frontlines of World War II. Axis or Allies - the battle will be decided by YOU!

Features:
- Thrilling defense-action strategy during WW2
- Successor to the popular Guns’n’Glory Wild West game
- 2 factions to choose from: US Forces, Axis Germany
- 4 different units to recruit on each side
- 12 challenging maps with 3 different difficulty modes
- RPG-like skill system to upgrade your units
- Powerful items to use for tactical advantages
- Earn Glory Coins and spend them on troop and battlefield improvements
- Earth-shattering explosions and awesome effects
- Pounding battle tunes
- Full tablet support

* Supports Immersion haptic technology *

* Xperia PLAY optimized *

It’s the winter of 1944, Western Front. You and your boys are on guard duty when the enemy decides to throw wave after wave of troops at your position. Time to man the defenses! Recruit and upgrade troops, order tanks into battle and beat the enemy with superior tactics and firepower! Call in air strikes to gain the upper hand and collect supply crates to boost troop morale! Put the heat on the enemy with your flamethrowers and have your medics tend to your soldiers! Take up the guns and earn your glory!
Sharpen the axe, polish your armor and ready your guns! It's time to fight for glory, honor and gold once more! Guns'n'Glory is back!

* Play without ads and start with 750 Gold Coins! *

Features:
✔Newest entry in the popular Guns’n’Glory series
✔Epic fantasy defense action with Elves and Dwarves
✔Control 3 mighty heroes in their battle against the Orcs
✔Use and improve your 12 powerful combat abilities
✔Journey into forests, swamps and snowy mountains in 50 challenging levels
✔Experience an enchanting storyline spanning 5 exciting chapters
✔Prove your tactical skills and master the Heroic Difficulty mode

The realm is under attack as Orcs, apostate Elves and dark knights roam the lands! Help our heroes Smirl, Arlon and Eloa in their epic struggle against this evil menace! Harness the power of light and face your enemies! Annihilate whole armies with magical fire and ice! Unleash the Dwarven Fury upon your foes and split Orcs skulls! Join your party of stalwart heroes and become the Champion of the Hill Lands!
1. Unrar
2. Install
3. Play

Voice PRO v2.9.4



The most complete, the best “Audio Editing for Android”

NOW TOP 20 PAID APP IN GOOGLE PLAY / MUSIC CATEGORY!

By adopting this application you will soon realise its potentiality and multiple functions which will allow you to make practically all you need and want to do with your records. Like edit, cut, adjust, eliminate disturbances and noises and insert background.

It will add audio effects, change tempo and volume, unit or mix record of any format or quality.

★ Record can be converted in texts in more than 50 languages
★ Share on Facebook, Twitter and Voice PRO Cloud
★ Receive Bluetooth files directly into Record list
★ Convert YouTube video to audio file

FEATURES:
1)The Voice Recorder makes it possible to:

☆ Record in more than 100 formats
☆ Insert in real-time a background using any file already present in your device. You can also download –free of charge– new ones from a library online.
☆ Insert tag to help you select, during the playback, the most interesting parts of your records.
☆ Use the Earphone to control the effect of the background during recording.
☆ Record in background and at the same time utilise the device for other services.

☆ Visualize records info such as length, sample rate, dimensions, channels.
☆ Operate the playback both with internal and external player.
☆ Restore the records and complete them.
☆ Mix or merge any record in all formats.
☆ Handle the preferred ones , share them, add notes and tag and research the files.
☆ Convert in many formats (mp3, wav, flac, ogg)
☆ Remove vocals, Handle the GAIN, the TIME, the RUMORS, and the REVERB – an example of the remarkable possibilities of applicable effects.
☆ Convert records in texts. “VOICE-PRO” is the only existing application in all the world’s markets allowing you to convert your records of any length in “Texts”, giving you therefore the possibility to listen to them with an internal “Vocal synthesiser” and save them in Audio Format . In other words you actually synthesize your own voice.
☆ Encrypt and decrypt your records and protect them with Password at 128 bytes*

☆ Mix with other records or background.
☆ Cut off parts of records and save them in new files or new formats either musical, sonic or Identifying-sounds.
☆ Restore a record from backup.

“VOICE-PRO” in its great versatility can even extend – against payment – to some functions such as :
- Perform other format of export/import audio (8svx,aif,aifc,amb,snd, dvms,prc)
- Mixing more than two files.
- Call recording.
- Voice to texts.
- Encrypting of files in AES with key at 128 bytes.

★ Additional features
- Home screen widget
- Mp3 bitrate change up to 320kbps
- Samplerate up to 48000 HZ
- Encoding at 8 and 16 bytes
- Registering in format MONO & STEREO
- Autogain to reduce noises during recording
- Pause in registering at incoming calls.
- Internal help for each function
- Control of icons, notifying and privacy
- Files backup
- Installation on SD CARD
- Request new effects or lyrics

“Voice Pro” is totally compatible with the majority of systems presently existing on the market. In addition we are glad to confirm that we are ready to supply to our clients a 24 HRS assistance with an average “Success-time” of 40 minutes
Run with Google Play Modded or Use Lucky Patcher to remove license verification. ALL Required files included!