If you have a rooted device it will prevent attacks, on unrooted devices it will monitor your connection to detect attacks and warn you. Low battery consumption and completely automatic. More info: http://sizeonedev.wordpress.com/
• The only VPN that gives you simple direct access to your favorite censored or blocked websites
• Unblocks applications and websites from around the world
• Hide your IP address to browse the web privately & anonymously
• 100% Free
• Switch countries with ease
• Speeds up web browsing
• Reduces data plan costs
Welcome to a Better Internet!
** Hola works by sharing the idle resources of its users for the benefit of all **
• Access sites blocked by your country through an innovative peer to peer network
• Accelerates browsing by choosing the closest and fastest sources
• Reduces data costs
• Lower devise radiation
More info at https://hola.org/faq
If you have any questions and suggestions, feel free and send them to firstname.lastname@example.org
We love to hear from you :-)
Hola Free VPN contains Lightning Browser and is used under Lightning Browser Mozilla Public Licence, Version 2.0. A copy of this license is available at: https://github.com/anthonycr/Lightning-Browser
Have a product question? Ask almost anything using Fixya's mobile app for Android.
Helpful Fixya community members will try their best to provide a solution. As part of the Fixya community, you can help other members with their questions too. It’s fun and helpful!
It’s free and easy to join the Fixya community right from the app!
Recently a new vulnerability was discovered called “Shellshock,” that targets BASH, a popular software widely used to control the command prompt on many *nix computers. Shellshock has the potential to wreak havoc on websites, web servers, PCs, routers and more because it enables hackers to gain complete control of an infected machine, which is bad news for consumers and enterprises everywhere. With this power impacted organizations can suffer from web site attacks, network shutdowns, lost data – not to mention lost customers and the cost of operational down-time spent patching such a vulnerability.
Is my Android mobile device vulnerable to ShellShock?
If you want to find out if your Android device is vulnerable, check out the Zimperium Shellshock Vulnerability Scanner. This app will determine if your mobile device is running vulnerable version of BASH or apps that includes BASH process, which exposes your mobile device to the ShellShock vulnerability.
There are two features of this app:
1) Shellshock Device Vulnerability Scanner: Determines if the device is running BASH.
2) Shellshock App Vulnerability Scanner: Determines if you have any mobile apps on your device that include BASH process.
Zimperium is the leader in advanced mobile threat defense. The Zimperium Mobile Threat Defense Suite delivers enterprise-class protection for Android and iOS devices against the next generation of advanced mobile threats. Developed for mobile devices, Zimperium uses patented, behavior-based analytics that sit on the device to protect mobile devices against network- and host-based threats wherever business takes them. For more information on Zimperium please go to www.zimperium.com.
Checkout our premium app "HiddenEye Plus", which has a host of new features
* Enable screen security lock on your phone.
* Install and launch the app "HiddenEye"
* Set the Security Status to ON.
* Activate the device admin for Hidden Eye and that's it. You are now ready for the action.
HOW TO UNINSTALL ?
* Set the Security Status to "OFF"
* Uninstall the app now.
Sync with Dropbox
All the images that are captured is stored in "HiddenEye" folder within the DCIM folder on your phone. If you have configured Dropbox to sync your Photos folder, then Hiddeneye pictures will also be synced with your dropbox account.
Android detects failed attempts ONLY if passcode has atleast 4 letters or points, so as HiddenEye
This app may not work on all devices, you will need to just try it out and see if it works for your device. Email me if it doesn't work on your device. Does not take pictures on Nexus devices
PLEASE DO NOT LEAVE YOUR ISSUES ON THE COMMENT SECTION AS I CANNOT REACH YOU FOR ANY CLARIFICATIONS. EMAIL YOUR ISSUES TO "email@example.com" BEFORE LEAVING IT ON THE COMMENT SECTION.
Like our Facebook page to stay connected to updates on HiddenEye and other exciting products that we are working on.
Worried that your phone does not have front camera. With HiddenEye, now you can know the someone has tried to snoop into your phone. You can also trigger sound if someone is trying to unlock your phone with wrong password thrice. You will see a place holder image instead of a real picture. If you have a front camera, then you will see the real picture of the intruder.
Once you unlock your phone, you will be shown the photographs of the people who tried unlocking your phone in your absence. Sounds interesting ! Try it and let us know if you have any suggestion to improve it further.
CAMERA = Uses the front camera to picture the intruder.
VIBRATE = Notification Alert generated when wrong password is entered.
INTERNET, ACCESS_NETWORK_STATE = Needs to display Ads on the app.
WRITE_EXTERNAL_STORAGE:Store captured images on the phone, so that its available for you to sync to Dropbox.
1. Quick Login via QR Code Scan, available on specific DVR/NVR Models
2. Enabled full frame rate decoding on specific DVR models
3. Support DVR, NVR, IP CAM and VSS
4. Bookmark for devices management
5. Live / playback / event / audio / snapshot
6. 1 / 4 split viewing mode
7. Up to 4 sites viewing
8. Support dual stream
Perform all calculations without changing the mode
Get Help for each button
- Add Subtract Multiply Divide
- Complex Number arithmetic with arg, Abs, Conjg
- Square root, Cube root, n-th root, square, cube, exponent
- Reciprocal, Factorial, Permutation, Combination
- Log, Natural Log, E, e
- Bin Hex Oct Dec
- Trigonometric functions (sin, cos, tan)
- Hyperbolic functions (sinh, cosh, tanh)
- Inverse Trigonometric functions (asin, acos, atan)
- Inverse hyperbolic functions (asinh, acosh, atanh)
- Mixed fraction / Fraction / Decimal formats
- Sexagesimal (Degree-Minute-Second) and Engineering format
- Store and Recall 9 variables, with M+ and
- Enter number as Tera, Giga, Mega, kilo, milli, micro, nano, pico, femto
- Random number
- Constants (More constants coming soon)
- Degree / Radian / Gradient
- Normal / Fix / Scientific format with adjustable precission
Basis des ganzen ist ein Artikel der im Print Magazin Android-User.de unter meiner Mitwirkung entstanden ist und Apps ins Visir nimmt, die mit nahezu krimineler Energie den Play-Store und andere App Stores überschwemmen. Klares und einziges Ziel dabei, BernutzerInnen mit Werbeeinblendungen und PushWerbung zu überschütten.
Die meisten der direkt in diesem Artikel angeführten Apps sind bereits aus dem Google Store entfernt worden, jedoch leben diese Apps in sekundären Appstores weiter und verbreiten sich ungewollt schnell auf unseren Smartphones.
Um Euch eine gewisse Sicherheit zumindest gegen die zur Zeit entdeckten, schädlichen Apps zu bieten, wurde die Idee zu dieser App geboren. Im Grunde eine einfache Sache, von einer vertrauenswürdigen Seite wird eine Liste mit App-Packagenamen geladen und das Smartphone wird danach dahingehend überprüft ob eine der in dieser Liste angeführten Apps installiert ist. Nicht mehr und nicht weniger.
Ihr könnt selber entscheiden, ob ihr die App dann deinstallieren wollt oder nicht.
Internet: Benötigt um die Liste der bekannten Packages herunter zu laden.
Access_Network_State: Notwendig um eine funktionierende Internetverbindung abzufragen.
Link zum Artikel bei Android-User.de:
Link zur Entstehung dieser App:
Mein Dank richtet sich an Marcel Hilzinger vom Magazin Android-User sowie an den Forensic Experten Marko Rogge. Erst diese fruchtbare Zusammenarbeit ermöglichte diese App!
Generally a secure password is hard to remember so users tend to opt for easy to remember passwords. These passwords are also easy to crack. This app aims to address that by allowing the user to use hashes in place of their passwords on various sites.
Example: a user may have a password such as "computer" (a bad one) that would be easily cracked in a dictionary attack.
Where as the md5 hash generated from computer is
df53ca268240ca76670c8566ee54568a which is not easy to guess or dictionary attack.
There are currently four algorithms available in the app. MD5 , SHA1 , SHA256 & SHA512.
This allows the user to use the same password for four different sites and a different hash for each.
For your banking or email you could use the SHA512 hash of your chosen password . In the computer example the hash is
The hashes are automatically copied to the clipboard for convenience. This allows you to easily paste it into an app.
If a database is compromised which is insecurely storing the passwords and your passwords (your generated hash) was obtained . The other three sites (with different hashing algorithms) would be safe.
Using hashes as passwords also makes an attack more computationally expensive as each string (sequence of characters) has to be hashed first before submitting it as the password. Also that factor is multiplied by 4 as the attacker does not know which algorithm you may have chosen.
You could also paste the output of the initial hash as the input with different functions for more options. Just remember the algorithms and the order you chose if you do.
This app respects users privacy and no data is recorded about the user. The permissions are required to serve the ads.
This application requires that a MOBILedit Forensic must be installed on the PC. It is available for download or online purchase at www.mobiledit.com
In order to start data extraction from an Android phone follow these steps:
1. Install this app which allows a PC to communicate with your phone.
2. Check Enable Wi-Fi Connection
3. Download and run the PC software on your PC from www.mobiledit.com
4. Follow connection instructions in the PC software.
We spent years developing a universal product with the ability to manage thousands of models from all manufacturers including Nokia, Samsung, Motorola, Sony Ericsson, LG, HTC, Blackberry, Apple iPhone and many more.
This extensive project and unique know-how is used by millions of mobile phone users as well as large corporations. It is the gold standard in the world of digital forensics investigation with customers including the FBI, MI5, and U.S. Military.
Enable GPS and download Wefi to get hotspots out of range too!
*Directions may not lead exactly to a hotspot - but it will lead to better signal
PackTrack is a leader in convenient record keeping and reporting systems for canine training and deployment. It's designed around the needs of dog handlers and agencies to be fast and easy to use, saving you time by eliminating paper records and redundant data entry. Real time reporting capabilities allow instant updates to your training and deployment logs, including photographs and location data, right from your phone.
NEW! PackTrack now supports Patrol training and deployments. Record your dog's training exercises for obedience, agility, criminal apprehension, search and tracking. Start a patrol deployment and capture GPS location data in real time while you track. Location information for exercises and deployments, including tracking position, path, number of turns, total distance, time, duration and GPS-tagged pictures are recorded automatically. Supervisors can view all handler locations simultaneously in a live tactical map overview available through PackTrack's online service.
The mobile app is designed to complement the PackTrack service and supports logging deployments, completing training exercises and tracking location. Creating training events and exercises and all set up should be done through PackTrack's online service at www.mypacktrack.com.
'Doing the Paper' just got easier. PackTrack provides storage, reporting, and real-time data entry on any mobile device for K9 trainers and deployments.
Ein Portscanner zur Prüfung ob gesuchte Ports offen und vom Web aus erreichbar sind.
Gedacht zum Test selbst eingerichteter Webserver, um zu überprüfen ob Router o.ä. die Ports richtig weiter routen.
Achtung pro Port ca. 0,5 Sekunden, d.h. 120 Ports/Minute.
!!! Nur auf eigene Server oder auf Dienste anwenden die zur öffentlichen Nutzung stehen. !!!
Top lists contain:
• Top Free apps
• Top Paid apps
• Top Grossing apps
• New apps
• Top apps for all categories
• Price drops
• Editors's Choice
For now, if you want to report bugs or suggest features, send your comments to: firstname.lastname@example.org
You can use the TrustPort Mobile Security application for free.
TrustPort Mobile Security Premium version is available for USD 9.90.
• Antivirus protection based on TrustPort’s engine
• Resident shield – on-access scanning
• Application manager
• Contacts backup on memory card
• Geolocation – a useful tool for the loss of a mobile phone
• Geofencing – perfect overview of your children location
• Parental Lock – limiting your children’s web browsing content
• Blocking of outgoing and incoming calls and SMS’s (blacklist/ whitelist)
• Safe web surfing – blocking of infected webpages
• Blocking of defined dialling codes (premium rate SMS’s or expensive phone lines)
• Simple user interface
TrustPort products for desktops are highly rated in multiple third party tests, pushing the brand amongst the leading vendors of security solutions in the field of information technologies. Tests conducted by Virus Bulletin and other independent laboratories have confirmed TrustPort’s prominent position in the antivirus industry.
That is why TrustPort has developed a security application for smartphones, which is based on its own scanning engine and which offers its users the best possible antivirus mobile protection.
TrustPort Mobile Security offers you not only the function of scanning your phone on demand, but it also offers a resident shield – on access scanning, as main protection against malware. The application enables you to surf the web safely, because it scans the URL addresses that you visit, and it blocks websites which contain malicious codes. If you happen to lose your mobile, TrustPort application will find it for you, because you will receive an SMS with the specific coordinates of the location of where your mobile phone is currently located. Your contacts are always secure, because a backup function is offered. You can also easily create your own blacklist and whitelist for the blocking of outgoing and incoming calls and SMS’s. The application enables you to define so-called forbidden dialling codes. This function is especially connected with premium rate SMS’s or with expensive phone lines.
Lite version (for free) - a user is allowed to create up to two folders
Premium version ($1.99) – a user can create an unlimited amount of folders
Reliable guardian for your private pictures and documents
- encryption of sensitive photographs
- encryption of documents
- protection of private data while your smartphone is lost
Secure photograph and document storage
The application allows users to safely store not only sensitive photographs in JPG and PNG formats, but also other documents which you may need to protect.
Users can secure each file with a password against unauthorized access. After typing the correct password, Pictura will offer users a display of encrypted photographs in previews or in the list of files according to the chosen type.
Printing and sharing
Users can export chosen pictures or documents to Twitter, Facebook or they can easily print them thanks to the Pictura application, in case they have other applications installed on their smartphone, which also support sharing.
* Blocking undesirable incoming and outgoing calls.
* Secure browser with protection against malware.
* Encrypted backup of contacts protected by password and their restoration.
* Possibility of remote detection of current phone's position - protection against stealing.
* Protected access into the application by password.