Bipo

LvL-23
  • Content Count

    70
  • Avg. Content Per Day

    0
  • Joined

  • Last visited

Community Reputation

44 Excellent

About Bipo

  • Rank
    Junior Member
  • Birthday 04/03/1990

Converted

  • Location
    us

Recent Profile Visitors

540 profile views
  1. Bipo

    Veil-Evasion + Shellter

    Question again ..... Dis Veil-Evasion and/or Shellter steel good tools to use in 2019 ???
  2. Bipo

    Help with Bash error

    i will be back with that thank's
  3. Bipo

    Help with Bash error

    I'm looking true the web but can't resolve this error .......Bash: $ command not found Can someone give me help ? 👽
  4. Bipo

    Thefatrat

    Thank you man ..your English is not worst then mine
  5. Bipo

    Thefatrat

    What do you thing about Thefatrat on Linux ....Did this steel a good tools ?
  6. Bipo

    Help for download Torrent pls

    Thank's it's résolve
  7. Bipo

    Help for download Torrent pls

    I don't now ..it is the torrent on kali linux to download OVA
  8. Hi I need some help . I try to download Kali from Torrent and i can't it is just show with the PDF icon and do notthing . If i try with the HTTP it work's good. Where i have to go in my comp to fix that pls .
  9. Thank's a lot for this one . I was searching for that
  10. Bipo

    10x Malwarebytes lifetime keys

    To late , someone use it alll
  11. Google Helps Police Identify Devices Close to Crime Scenes Using Location Data April 15, 2019Swati Khandelwal It's no secret that Google tracks you everywhere, even when you keep Google's Location History feature disabled. As revealed by an Associated Press investigation in 2018, other Google apps like Maps or daily weather update service on Android allows the tech giant to continuously collect your precise latitude and longitude. According to Google, the company uses this location-tracking features with an intent to improve its users' experience, like "personalized maps, recommendations based on places you've visited, help finding your phone, real-time traffic updates about your commute, and more useful ads." Moreover, it's also known that Google could share your location data with federal authorities in criminal investigations when asked with a warrant. Google 'SensorVault' Database Help Police Solve Crimes But what many people weren't aware of is that Google also helps federal authorities identify suspects of crimes by sharing location history of all devices that passed through crime scenes over a certain time period. It should be noted Google doesn't share personal information of all nearby users; instead, it asks the police to first analyze location history of all users and narrows down results to only a few selected users to receive their names, email addresses, and other personal data from Google. A new in-depth report from The New York Times revealed that Google maintains a database, known internally as Sensorvault, over nearly the past decade, containing detailed location records from hundreds of millions of phones around the world, and shares with authorities nationwide with warrants to mine it to help in criminal cases. According to several unnamed Google employees cited in the report, such requests to dive into Google's Sensorvault database have spiked in the last six months, with the company receiving as many as 180 requests in just one week. How Does Law Enforcement Use Google SensorVault Database? To seek location data, law enforcement needs to get a so-called "geofence" warrant. Here below I have tried to step-by-step illustrate how Google shares location data when "legally" required: The authorities reached out to Google with a geofence warrant looking for smartphones Google had recorded around the crime scene. After receiving the warrant, Google gathers location information from its Sensorvault database and sends it to investigators, with each device identified by an anonymous ID code and not the actual identity of the devices. Investigators then review the data, look for patterns of the devices near the crime scene, and request further location data on devices from Google that appear relevant to see the particular device movement beyond the original area defined in the warrant. When investigators narrow results to a few devices, which they think may belong to suspects or witnesses, Google reveals the real name, email address and other data associated with the devices. The NYT report explained the entire process when federal agents requested the location data to investigate a string of bombings around Austin, Texas. Federal agents first used this technique of catching criminals in 2016, which has since been spread to local departments across the country, including in California, Florida, Minnesota, and Washington. While the technique has been proven to work, it's not a foolproof way to catch criminals. Some cases highlighted by the NYT report showed how police used this data to accuse innocents, with one man jailed for a week last year in a murder investigation after being recorded near the killing location and then released after investigators pinpointed and arrested another suspect. It's no surprise that law enforcement seeks help from tech companies during criminal investigations, but the use of location history databases like Sensorvault has raised concerns... concerns about the privacy of users... concerns about data collection... concerns about innocent being accused and implicated.
  12. Bipo

    remote administration tool ARES RAT v1.0.0

    This look very interresting ....Gradulatioin 👍
  13. First Android Clipboard Hijacking Crypto Malware Found On Google Play Store February 11, 2019Swati Khandelwal A security researcher has discovered yet another cryptocurrency-stealing malware on the official Google Play Store that was designed to secretly steal bitcoin and cryptocurrency from unwitting users. The malware, described as a "Clipper," masqueraded as a legitimate cryptocurrency app and worked by replacing cryptocurrency wallet addresses copied into the Android clipboard with one belonging to attackers, ESET researcher Lukas Stefanko explained in a blog post. Since cryptocurrency wallet addresses are made up of long strings of characters for security reasons, users usually prefer copying and pasting the wallet addresses using the clipboard over typing them out. The newly discovered clipper malware, dubbed Android/Clipper.C by ESET, took advantage of this behavior to steal users cryptocurrency. To do this, attackers first tricked users into installing the malicious app that impersonated a legitimate cryptocurrency service called MetaMask, claiming to let users run Ethereum decentralized apps in their web browsers without having to run a full Ethereum node. Officially, the legitimate version of MetaMask is only available as a web browser extension for Chrome, Firefox, Opera, or Brave, and is not yet launched on any mobile app stores. However, Stefanko spotted the malicious MetaMask app on Play Store targeting users who want to use the mobile version of the service by changing their legitimate cryptocurrency wallet address to the hacker's own address via the clipboard. As a result, users who intended to transfer funds into a cryptocurrency wallet of their choice would instead make a deposit into the attacker's wallet address pasted by the malicious app. Stefanko spotted the malicious MetaMask app, which he believes was the first Android Trojan Clipper to be discovered on Play Store, shortly after its introduction to the app store on February 1. Google took down the malicious app almost immediately after being notified by the researcher. While the bitcoin price has been dropped steadily since hitting its all-time high in December 2017, there is no reduction (in fact rise) in the cryptocurrency scandals, thefts, and scams that continue to plague the industry. Just last week, The Hacker News reported how customers of the largest Canadian bitcoin exchange QuadrigaCX lost $145 million in cryptocurrency after the sudden death of its owner who was the only one with access to the company's cold (offline) storage wallets. However, some users and researchers are suggesting the incident could be an exit scam.
  14. Bipo

    Joker-RAT_v3

    Hi It's possible to now if this .Net or C code ......
  15. Tech Viral TECH SCIENCE SECURITY HOW-TO TOP LIST GADGETS How to Computer How To Disable Windows Defender Notifications On Windows 10 How To Disable Windows Defender Notifications On Windows 10 By Tushar Subhra Dutta - January 25, 2019 0 How To Disable Windows Defender Notifications On Windows 10 How To Disable Windows Defender Notifications On Windows 10 We all know that the well-known Windows Defender is a security tool that the tech giant Microsoft includes by default in Windows 10. However, this does not mean that the tech giant Microsoft’s Windows users cannot use any other third-party security tools. As the presence of Windows Defender on Windows 10 is a clear indication that it is compatible with all the third-party security tools and can coexist at the same time in our Windows 10 system. However, since the latest Windows updates, users are simply receiving more and more Windows Defender notifications on their desktop or laptop. Yes, notifications that sometimes are important, but for many others they simply become annoying. While most users agree that the tech giant Microsoft’s well-known security tool, of course, Windows Defender notifications are displayed when it tries to report any type of threat, however, the vast majority of Windows Defender notifications do not provide information relevant to the user, hence, today we will show you a solution for it. So, now without wasting much time let’s explore the tutorial in which we will show you all below how to turn off the Windows Defender notifications in Windows 10. How to disable Windows Defender notifications in Windows 10? In this way, we will make sure that Windows Defender notifications will only be displayed to inform us that a threat could attack our system. First of all, you have to click on the start button. Then on the left side of the start menu simply click on the settings (gear icon). After that now you will get a Window like this. Now simply open the “Update & Security” option. After opening the above option you will get a new Window which is mentioned below. Then simply you have to click on the Windows Security option on the left side of your screen. Now after that simply click on the option “Open Windows Defender Security Centre”. Then simply click on the settings option on the left-lower side of your screen. Now here in this Window, you can simply disable all the Windows Defender notifications. That’s it, now you are done. Moreover, in these settings, we can simply find a general switch that simply deactivates the Windows Defender notifications, and along with the On/Off switch, it also features a set of different options to establish the type of notifications that we want to receive. As the account protection notifications are related to the dynamic blocking of Windows 10, while the Windows Firewall is shown when the firewall blocks an application on the computer. So, what do you think about this tutorial to disable Windows Defender notifications in Windows 10? If you liked this tutorial then do not forget to share this tutorial with your friends and family.