Selasa, 31 Maret 2015

Introducing A New Level of Customization – Moto Selfie Stick

Maret 2015 - It’s also good-looking, and while not ultra-portable is not that heavy given the components inside. It makes the new MacBook Pro with Touch Bar seem a bit frivolous in comparison, not to mention extremely expensive Instead it's a company, well we have collected a lot of data from the field directly and from many other blogs so very complete his discussion here about Maret 2015, on this blog we also have to provide the latest automotive information from all the brands associated with the automobile. ok please continue reading:


Taking the perfect selfie is an art. We understand how important it is to get the perfect shot which is why we created the perfect accessory - custom selfie sticks made with the same craftsmanship and genuine materials we use for our phones, like wood and leather. Because your selfie stick should be as unique as you are.

The self portrait just got more personal. Introducing the Moto Selfie Stick

Root any Android device manually like a Pro !

Maret 2015 - It’s also good-looking, and while not ultra-portable is not that heavy given the components inside. It makes the new MacBook Pro with Touch Bar seem a bit frivolous in comparison, not to mention extremely expensive Instead it's a company, well we have collected a lot of data from the field directly and from many other blogs so very complete his discussion here about Maret 2015, on this blog we also have to provide the latest automotive information from all the brands associated with the automobile. ok please continue reading:

 Wanting to ROOT your Android phone but can't do because of no rooting guides or want to learn to root any device ? N'ayam Amarsh'e XDA Senior Member has made a great work-around for this last year and that deserves to be reposted !


Root any Android device manually

 You'll need:
 - ADB Drivers installed on your PC. If you don't have download from here : adbdriver.com
 - Root Kit Made By N'ayam Amarsh'e - Download From here.
 - Strength And Courage because Rooting Voids Your Warranty... If you have a Samsung device then don't worry, your warranty is gone forever... But if you own any other, maybe you can void it.

 Let's start:

 - Open The root kit by extracting The Rootkit using WinRAR
 - Enable ''USB DEBUGGING'' on your device
 - Connect your device to your PC
 - In the root kit open cmd.exe file ... (If you can't open cmd, go to C:/WINDOWS/SYSTEM32/ copy cmd.exe to your RootKit Folder)
 - In cmd window type the following command:

->adb devices       *Your device will get listed in the window if it doesn't check your adb drivers or if you have followed the steps properly
->adb push busybox /data/local/tmp

->adb push su /data/local/tmp

->adb push Superuser.apk /data/local/tmp

 If you succeed move on...

 - Now you need Root Shell Type :

adb shell

 Note that you see a "$" sign in the command prompt. That means you are not in ''su'' shell.

 - Next run the following commands in the shell to change permissions and get some limited privileges for the Superuser files:

->chmod 6755 /data/local/tmp/su 

->chmod 755 /data/local/tmp/busybox

->chmod 644 /data/local/tmp/Superuser.apk

 Note: The names of the files are case sensitive!

 - Done? Now you need to open a copy of linux which has nautilus... So enter your linux (I recommend using ubuntu 11.4) and type in the terminal (ctrl+alt+T)

->sudo nautilus

 This will open nautilus with root privileges.
 You can just boot it from USB so no hassle of installing it... http://www.cyberciti.biz/tips/downlo...y-narwhal.html
 Having your device connected with USB to PC switch it off and put it in download/recovery mode.

Having error:  Device Offline? See solution here.

 - In The exploring window navigate to:

/data/local/tmp

 - And move/cut ''su'' and ''busybox'' to:

/system/bin

 - From the tmp Folder you went earlier, move/cut ''Superuser.apk'' to:

/system/app

 - Now reboot you Android device... Congratulations ! You're now ROOTED !

 You want an easiest way to root your Android phone?
 See: http://iffaheyy.blogspot.com /2015/03/root-your-android-phone-easily.html" target="_blank">Root your android phone easily

Three (3) always habits to prevent your facebook account from being hacked

Maret 2015 - It’s also good-looking, and while not ultra-portable is not that heavy given the components inside. It makes the new MacBook Pro with Touch Bar seem a bit frivolous in comparison, not to mention extremely expensive Instead it's a company, well we have collected a lot of data from the field directly and from many other blogs so very complete his discussion here about Maret 2015, on this blog we also have to provide the latest automotive information from all the brands associated with the automobile. ok please continue reading:


1. Always unchecked the keep me logged in box before signing in. Highly recommended, when you are using computers in cyber cafe’s, friends and classmates. To be safer unchecked it even in your own PC.
2. Always log out your facebook account?



3. Always erase your browser’s history and cookies. 


 Facebook account hacking is rampant now a days, if you follow these habits it will not make your facebook account invincible from hacking but at least it is now harder for them to do so.

Super Mario World

Maret 2015 - It’s also good-looking, and while not ultra-portable is not that heavy given the components inside. It makes the new MacBook Pro with Touch Bar seem a bit frivolous in comparison, not to mention extremely expensive Instead it's a company, well we have collected a lot of data from the field directly and from many other blogs so very complete his discussion here about Maret 2015, on this blog we also have to provide the latest automotive information from all the brands associated with the automobile. ok please continue reading:

I'M BACK

I am coming back to Blogger and I'm talking about Super Mario World!

---

Super Mario World came out on November 21, 1990, and it was a launch title for Nintendo's new console: the Super Nintendo (Entertainment System). This game introduced Yoshi, The Cape Thingy, and even gave Luigi his own sprite!


The entire first world of this game was centered around Yoshi. You start out in YOSHI'S HOUSE, you can find Yoshi everywhere, and it's called YOSHI ISLAND. Talk about self-centered. Yoshi made this game a ton easier, though. He can carry keys, P-Switches, Koopas, ANYTHING. He will carry ANYTHING. What can Mario carry? Keys and P-Switches. Yoshi can also walk on Piranha Plants and Spinys, so it makes those sections easy.

World 2 is based around the Super Cape... The Magic Cape..? Whatever I'm calling it a Mario Cape. You can use it to find a secret area with unlimited lives! It's actually really cool, if I could use it. That thing is harder to control than Mario in an Ice Level.

Everything else is just what you'd expect.

GO THROUGH THE CASTLE. KILL SOME ENEMIES. KILL BOWSER. SAVE THE PRINCESS. HAVE A PARTY. THE END.

There is a secret world, though. The Special World (and Star World) is a secret place where there is eight levels. When you beat it, EVERYTHING BECOMES TERRIFYING.

Here is a Post-Special Koopa:



THAT'S ALL I HAVE TIME FOR TODAY, THANKS FOR READING, BYEEE!

Samsung Galxay S6 Secret Codes, New Samsung S6 Hidden(service) Menu

Maret 2015 - It’s also good-looking, and while not ultra-portable is not that heavy given the components inside. It makes the new MacBook Pro with Touch Bar seem a bit frivolous in comparison, not to mention extremely expensive Instead it's a company, well we have collected a lot of data from the field directly and from many other blogs so very complete his discussion here about Maret 2015, on this blog we also have to provide the latest automotive information from all the brands associated with the automobile. ok please continue reading:

Secret Codes in a mobile are just a combination of Numbers and special characters which allow you to access some hidden test and information which are intended for developers and for troubleshooting purposes.

Coming to secret codes of http://iffaheyy.blogspot.com /2015/03/samsung-galaxy-s6-launched-price-key-specs.html" target="_blank">Samsung Galaxy S6 there are many secret codes but here I will show you the best one and you can use them to check various Hardware (via Hidden menu) of your device or for some troubleshooting.

Samsung Galaxy S6 Smartphone
Samsung Galaxy S6
The Samsung Galaxy S6 is the best smartphone in the market packed with a Quad Core processor, 3GB RAM and running on Latest Android 5

Secret Codes of Samsung Galaxy S6

So, here I am going to show you how to access the internal function of Galaxy S6 for testing the various hardware parts of your phone if it is working properly or not. With the help of these secret code you can test lcd, vibration, camera, sensor (accelerometer sensor, proximity sensor, magnetic sensor), touch screen, speaker, sub key, etc...
if you have any hardware problem with your galaxy S6 you can identify with this code if it is working or not to do this follow the steps below.

First of all open your keypad (where you dial Numbers)

Hidden Menu in samsung galaxy S6

Then dial the secret code *#0*#


Now you get a screen with title LCD TEST and below that you have lots of option to test various hardware parts of your phone such as speaker, sensor, lcd, etc
Just click on them and the respective test will run.

>To go back use right physical button 
>While testing the touch you have to touch and mark all the squares back button does not work 

Other use full secret codes for android phone tested on Galaxy S6

  •      *#06#               Check IMEI no Of device (unique for every device)
  •      *#7353#           Quick Test Menu - To show 12 different types of test 
  •      *#1234#           Check software version of phone.
  •      *#12580*369# Check software and hardware information.
  •      *#7412365*     Check Camera Firmware Version
  •      *#0228#           Battery status (ADC, RSSI reading)
  •      *#32489#         Service mode
  •      *#7780#           Factory data reset galaxy S6
  •      *2767*3855#   Full factory reset (Don't dial it does not ask you to confirm unless you have problem)
http://iffaheyy.blogspot.com /2014/08/factory-reset-samsung-galaxy-mobile-code-steps.html" style="background-color: white; line-height: 22.8199996948242px;" target="_blank">If factory reset codes are not working then Click Here 

So now you have learned how to use secret codes on you Samsung Galaxy, Do share us and if you have any queries then feel free to comment below.

Space Invaders

Maret 2015 - It’s also good-looking, and while not ultra-portable is not that heavy given the components inside. It makes the new MacBook Pro with Touch Bar seem a bit frivolous in comparison, not to mention extremely expensive Instead it's a company, well we have collected a lot of data from the field directly and from many other blogs so very complete his discussion here about Maret 2015, on this blog we also have to provide the latest automotive information from all the brands associated with the automobile. ok please continue reading:

Release Date iPhone 7 September 8, 2015?

Maret 2015 - It’s also good-looking, and while not ultra-portable is not that heavy given the components inside. It makes the new MacBook Pro with Touch Bar seem a bit frivolous in comparison, not to mention extremely expensive Instead it's a company, well we have collected a lot of data from the field directly and from many other blogs so very complete his discussion here about Maret 2015, on this blog we also have to provide the latest automotive information from all the brands associated with the automobile. ok please continue reading:

Release Date Iphone 7
Release Date Iphone 7
While we are talking primarily the nearest exit of the iWatch, namely shows connected Apple, much speculation already starting to circulate around the iPhone 7 and of its release. Indeed, rumors provide for release in September 2015!

And if 2015 was marked by the arrival of the iPhone 7 and Apple Watch? Apple takes big risks with this famous watch and it may not be up to expectations. Thus, to prevent possible failure, iPhone 7 could be proposed this year!

The iPhone 7 available from September 8?

No you're not dreaming, iPhone 7 will be out on September 8th. While we thought see an iPhone 6S this year, here is learned from several sources that this will be an iPhone 7! While information or disinformation, we will not know at now, but this rumor should be taken as seriously as any other for that matter.


If we look more closely Apple's strategy, we see a new iPhone really only comes out every 2 years, but every year the Cupertino company markets a new iPhone. In general, it is simply an evolution of the previous model and this strategy works pretty well. So why Apple would choose to change this strategy and offer an iPhone 7 in 2015 rather than 2016, this rumor is likely and it really possible? The future will tell, but we doubt that this is possible.

Meanwhile, it already evokes the features of this smartphone, and regardless of the release date of the iPhone 7 . We then find the screen that should be sapphire for more resistance, improved recognition system and even facial recognition in addition to fingerprints. The camera should also be heavily order made photographs of very high quality.

Senin, 30 Maret 2015

How i find a CSRF vulnerability in the heart of Gmail(Google Mail) STILL UNPATCHED AS ON 31/03/2015

Maret 2015 - It’s also good-looking, and while not ultra-portable is not that heavy given the components inside. It makes the new MacBook Pro with Touch Bar seem a bit frivolous in comparison, not to mention extremely expensive Instead it's a company, well we have collected a lot of data from the field directly and from many other blogs so very complete his discussion here about Maret 2015, on this blog we also have to provide the latest automotive information from all the brands associated with the automobile. ok please continue reading:

Here I have find a vulnerability in the most secure Gmail from Google.

IT IS STILL UNPATCHED.SO USE IT FOR ONLY EDUCATIONAL PURPOSES.DON'T MAKE IT TO THE BLACK SIDE OF YOUR THOUGHTS.




First of all,I have reported this bug on 6/11/2014.

Here below is the raw report that i have submitted to google.

6/11/2014
--------------------------------------------------------------------------------------------------------------------------
Hey Google Security,

I have named this bug as "Gmail's alert box as attacker's playground".
The affected views of Gmail are mobile and desktop view,(Both Non Javascript)

Desktop - https://mail.google.com/u/0/h
Mobile - https://mail.google.com/u/0/x

An attacker have the full control over what message can be inside the Gmail's standard notification box.And he can also able to interrupt the whole Gmail Service in the victim's browser,which will return 500 Internal Server Error from the google server.And he can also uninterrupt or unblock the gmail service that have been blocked previously.


And the main point here is,The whole process can be done in realtime and the attacker can be in any location(Remote) to control the victim's browser.
Here below goes my reproductive section.

The affected URL is,
https://mail.google.com/mail/u/0/h/1r492fk6i9hhd/?v=prfap&bu=pfwd&scd=1&idmc=wf<Here goes the crafted message>%3E.

This above URL will set a cookie GMAIL_NOTI and redirect to Gmail with the message in the Gmail's standard notification box.

Just replace the crafted message section with a payload like this "<<<".
This will set a GMAIL_NOTI cookie.After the redirection.The server will return with a 500 internal server error.

Until the GMAIL_NOTI cookie is cleared out.

How it useful,make an attacker control the whole process remotely?It goes below in
"How an attacker can use this against a victim" section.

How an attacker can use this against a victim??
---------------------------------------------------------
First of all i already mentioned that this is a lack of CSRF protection.So iam pointing to the main points only as described below

3 main operation an attacker can able to do against a victim in remote,
A)Interrupt whole gmail service in victim's browser,
B)And also can uninterrupt or unlock the previously interrupted gmail service,
C)The main annoying point is that he can put dynamic text based ads or phishing messages in the Gmail's standard alert box,

And once more mentioning that all operation controlled by the attacker goes in realtime and from a remote location.

STEPS :- HOW AN ATTACKER CAN USE THIS BUG
---------------------------------------------------------------------
A)As we already know this is kind of CSRF vulnerability,So first of all the victim need to be served with attacker's page.
B)After victim opens the attacker's page and in a new tab he can open the Gmail and make the process as it is...
C)Now the attacker have full control over the alert box of gmail and can interrupt and uninterrupt whole gmail service in the victim's browser.

So here below goes the brief,

REAL LIFE SCENARIO
-------------------------------
A)Victim is shared with an attacker's page containing the script which is executed in a timely manner of 5 seconds repeatedly.

Note :- Sharing process is vast and the content of page can be anything that attracts victim and make the page open until his browsing session ends.And the URLs and techniques used here is only for explaining the bug and more for an attack against a real user may vary,its upto the thoughts.

Explaination of the execution of code in the attacker's page.
------------------------------------------------------------------------
The URL gonna be shared with the victim is.

https://googledrive.com/host/0BybXBiqiGLDhNXpqTVg5ZlpCaGs/googleRemoteControl.html

When he/she made open the above URL it will just give a blank page.But the hidden script will get executed.And i know you techie guyz can just catch up my javascript code in my above mentioned page.So iam not getting deeper.Here below goes the steps script will do.

1)First of all it will send a request to

https://mail.google.com/mail/u/0/h/17qgf1e1195tm/?v=prfap&bu=pfwd&scd=1&idmc=wfHey+there+whatsup+iam+shihab+over+here%3E

embedded in a script element.

2)It starts getting into a timer with an interval of 5000ms ie,each 5 second the script will execute repeatedly in the background.
It just grabs the content of the text file "ssoft.txt" in the current directory of the attacker's page.That is,it contains a JSON string which instructs the page what to do with.The example of the JSON string goes below.
[
{
"message": "This is the example of Advertisement 1.Can be also some phishing.Yours",
"payload": "interruptGmail"
},
{
"message": "This is the example of Advertisement 2.Can be also some phishing.Yours"
},
{
"message": "This is the example of Advertisement 3.Can be also some phishing.Yours"
}
]

NOTE :- The text file "ssoft.txt" is modified in the realtime from anywhere by the attacker.So that he can post text based ads as like above.And also he can make whole Gmail service interrupted.Will be explained below.And i here use googledrive sync application in windows.So that i can modify the text file "ssoft.txt" realtime.So that the googledrive will automatically makes the file synchronised to the servers.

3)The script then,checks 0th index of JSON parsed javascript array(ie,as per the JSON string above it will return an array of 3 elements).And check for the "payload" attribute of the array(0th index).
Then there are two cases
a)If the content of payload matches to the string "interruptGmail" then it will create a dynamic script element and assign the src attribute of the script to the URL below

https://mail.google.com/mail/u/0/h/17qgf1e1195tm/?v=prfap&bu=pfwd&scd=1&idmc=wf%3c%3e

It will block the whole Gmail Service with 500 error(already described above).
b)If the content does'nt match with the string "interruptGmail" then it will create a dynamic script element and assign the src attribute of the script to the URL below

https://mail.google.com/mail/u/0/h/17qgf1e1195tm/?v=prfap&bu=pfwd&scd=1&idmc=wf<Message>%3E

The message section will contains one of the string from the JSON parsed array.And the index of the array is chosen randomly.So the attacker can make it show random ads from the list.

If any previously blocked or interrupted Gmail(500 error) is cleared out.And the randomly chosen ad or phishing message that is up to the attacker,is just rendered in the Gmail's alert box.

So thats all.With this process an attacker have different kind of ways to exploit this using as phising or posting ads,etc because it is rendered in the standard Gmail's notification box.
Its upto your thoughts.

And if missed anything or anything that you can't understand just reply me.

And if you guys wanna test it in realtime.I have shared the "ssoft.txt" file and i made it to be editable.

https://drive.google.com/file/d/0BybXBiqiGLDhSDdwR3Z0UGhnNTA/view?usp=sharing

--SHIHAB
----------------------------------------------------------

I got a response on 7/11/2014

----------------------------------------------------------
Hey - Just letting you know that your report was triaged and we're currently looking into it. You should receive a response in a couple of days, but it might take up to a week if we're particularly busy.

Thanks,
Google Security Team
----------------------------------------------------------

After two days,I got a response back on 10/11/2014

----------------------------------------------------------
Hey,

Thanks for your bug report. We've taken a look at your submission and can confirm this is not a security vulnerability. To be able to start an attack, the attacker would have to know the secret value in the URL (the one after /u/0/h/ ). Have you been able to obtain this value without already having access to the victim account?


Regards,
Krzysztof, Google Security Team

Krzysztof,the member of Google Security Team,Told me that it is not a security vulnerability :-).And with a big question
Have you been able to obtain this value without already having access to the victim account?
Sorry Krzysztof,I don't want to obtain this value because it does'nt matter.:),Here below,Why?
-------------------------------------------------------

Its on the same day 10/11/2014,i have replied him why?

---------------------------------------------------------------------

Hey Krzystof,

First of all thanks for reviewing my report.

You have asked that,an attacker would need to know secret or kinda
XSRF string in the URL like below.

https://mail.google.com/mail/u/0/h/17qgf1e1195tm/?v=prfap&bu=pfwd&scd=1&idmc=wf<SOME_MESSAGE>%3E

From the above URL secret id is :- 17qgf1e1195tm.

But as per my research it is just a random value inserted between the
URL.And i can confirm that it is not a XSRF or any kinda
secret.Because,

We can enter any value,by replacing the mentioned value like below.

https://mail.google.com/mail/u/0/h/shihabsoft/?v=prfap&bu=pfwd&scd=1&idmc=wf<SOME_MESSAGE>%3E

Here i have changed the value to :- "shihabsoft".

So it does'nt matter the process does'nt get interrupted.But goes as normal.

For confirming just copy and paste the below URL into your address bar.

https://mail.google.com/mail/u/0/h/shihabsoft_any_message_you_want/?v=prfap&bu=pfwd&scd=1&idmc=wfSOME_MESSAGE>%3E

So here you can confirm that it is a vulnerability,based on my
report.The way an attacker can use this bug is vast.

And if you are inneed of more details.Feel free to ask...

Thanks,
SHIHAB :)
-------------------------------------------------------------------------

After that i have never got a response for 5 days,on the 6th day i got a response on 16/11/2014.

-----------------------------------------------------------
Hi,

Thanks for your report. This report looks like a duplicate of another case 5-3148000005303 that is also reported by you, so I'll close this one as duplicate and process the case 5-3148000005303.
Regards,
Quan, Google Security Team.

It is just a case of duplication,that i have accidentally submitted the same report twice with different emails.
--------------------------------------------------------------------------

So i tried to reopen the case 5-3148000005303 as said by Quan,Its on the same day 16/11/2014.He replied me by asking a question.

Hi,

Thanks for your report. Whenever I click the following link:  https://mail.google.com/mail/u/0/h/anything/?v=prfap&bu=pfwd&scd=1&idmc=wfanotheranything%3E, nothing happens. It's only redirected to "Forwarding and POP/IMAP" when I copy/paste the link in the browser, so I'm not sure what is the attack's scenario. You mention that you have a kind of Proof of Concept:googleRemoteControl.html. Could you please make it work such that whenever I access it then I see the repeated alerts in my Gmail testing account?

Regards,
Quan, Google Security Team.

--------------------------------------------------------------------------

Are you getting bored ITS A BIG NO iam thinking so,because its an interesting topic about security and more interesting about our conversation

Its on the next day,i have clarified him my stand on 17/11/2014

--------------------------------------------------------------------------

Hey Quan,

Sorry for the long delay,replying you.

As you have said whenever you follow the link by clicking or copy
pasting,nothing happens over in your browser.

Ok i will get you into deeper.I am mentioning the alert box as GMAIL's
standard notification box(in which all alerts are shown that means a
yellow box with the text in it and not the javascript alert box).The
picture is provided below to better understanding.

So after you followed the link:
https://mail.google.com/mail/u/0/h/anything/?v=prfap&bu=pfwd&scd=1&idmc=wfanotheranything%3E,

The message will be shown like in the below picture.
https://googledrive.com/host/0BybXBiqiGLDhNXpqTVg5ZlpCaGs/googCSRF.png

And you have asked me to provide the POC googleRemoteControl.html.

It seems you have'nt yet read my report carefully,because i have
already mentioned the link for that.Better putting once more,

Jz follow this URL by clicking it below.

https://googledrive.com/host/0BybXBiqiGLDhNXpqTVg5ZlpCaGs/googleRemoteControl.html

And follow the simple instruction over there.

And at last you will encounter that gmail's notification box is filled
with ads that posted by the attacker through his page.And may be also
some phishing because the message is in the heart of the GMAIL's page.

And i already mentioned in my report that.That the attacker's page
reads instructions and ads or phishing messages from a file called
"ssoft.txt" in the same attacker's server.

So that the attacker can have full access to the alert box of the
victim and also he also have the option to interrupt the whole gmail
service in the victim's browser and also uninterrupt.
NOTE :- The victim can't ever access non javascript of both mobile and
desktop GMAIL at the interrupted state.But he have access to modern or
latest UI.(/u/0/ or /mu/mp).But most users facing slowing internet
connection will move onto that.(Oh its not the topic here right
now).So
the two main advantage of the attacker,he could be REMOTE and REALTIME.

And if you wanna know more,Jz read my report carefully once more.I
have provided all in that.also the link for ssoft.txt and how to edit
instructions.

NOTE :- If you can't access or edit ssoft.txt directly.Its not a
problem.Because it is provided jz for demonstration.And you can
reproduce it with whatever way like you want.Its upto your thoughts.

Keep in touch,
---SHIHAB :)

--------------------------------------------------------------------

ATLAST ON THE SAME DAY 17/11/2014 I GOT A GOOD RESPONSE FROM QUAN.

--------------------------------------------------------------------
Hi spk674,

Nice catch! Thanks for your clarification. I’ve filed a bug and will update you once we’ve got more information.

Regards,
Quan, Google Security Team
--------------------------------------------------------------------

Some conversations have gone between the 17/11/2014 to 20/11/2014.I don't wanna bore you my precious visitors reading those also.At last i got awarded on the day 20/11/2014 by Kevin(Google Security).I had my listed on just in the Honorable Mention page.

May i ask is it fare.Is it way the Google handling vulnerabilities.And just got my name in the Honorable Mentions page,not even with 100$ penny :).You visitors wanna make a decision.I have told my full story from 6/11/2014 to 20/11/2014.

And do you think iam faking you guys.

NO NEVER EVER

Just move on to the URL below and Search for ShihabSoft or with revealedtricks4u.blogspot.com

http://www.google.co.in/about/appsecurity/hall-of-fame/distinction/

You can find my name on there,Hope you understand me.Thank you very much for reading this whole post.Any doubts or queries just express it on comments.I am here to assist you.

:)SHIHAB

Book Review - The Accidental Wife

Maret 2015 - It’s also good-looking, and while not ultra-portable is not that heavy given the components inside. It makes the new MacBook Pro with Touch Bar seem a bit frivolous in comparison, not to mention extremely expensive Instead it's a company, well we have collected a lot of data from the field directly and from many other blogs so very complete his discussion here about Maret 2015, on this blog we also have to provide the latest automotive information from all the brands associated with the automobile. ok please continue reading:

I just finished reading the second novel by an NRI writer, Simi K. Rao. The book kept me glued to my desk all day, and it is with a happy heart that I write today's review - for "The Accidental Wife".


Fast Facts:-

Title: The Accidental Wife 
Author: Simi K. Rao
Genre: Mainstream Fiction/Romance
Publisher: Kando Books
Pages: 202
File Size: 6.11MB (PDF version)
Price: $1.59 (Kindle Edition ebook)

Key Characters:-
  1. Rihaan Mehta: A ridiculously handsome neurosurgeon and Harvard graduate who is nagged my his mother to get married.
  2. Naina Rathod: A beautiful teacher and photojournalist who becomes Rihaan's "accidental wife". 
  3. Shobha Mehta: Rihaan's controlling and commanding mother whose only goal is to find her son a suitable wife and herself a complying daughter-in-law.

The Review:-

The Accidental Wife is the story of two strangers - Naina and Rihaan, who agree to get married for reasons of their own. Rihaan, a successful neurosurgeon and an incredibly attractive Harvard graduate, is sick of his dominating mother constantly badgering him to get married. All Rihaan wants is to get his mother off his back and live his own life freely as a bachelor in New York. Meanwhile, Naina, a stunning Delhiite, who teaches school kids and ardently pursues her passion of freelance photojournalism, wants to remain independent and single.

By both design and deceit, Naina and Rihaan find themselves in wedlock and are forced by social-appearance-pressures to keep up their little "drama" even as they both outwardly detest being with each other. Life, however, plays cupid, and with time, the two protagonists of this story fall in love with each other.

In a few months, their love story is met with a tragic incident that shatters their tranquil lives. This is when the true test of love is administered by fate. Will Rihaan and Naina persevere and pass this test or will their story end in tragedy? Only this novel holds the answer.

The story at first seems like a regular chick lit or romance novel with the usual elements of two attractive characters besotted with each other, some tiffs and some scenes of unbridled passion. But Simi shows her real skill when she brings in the surprise element in the latter part of the book. That is when the book gets really intense, and enters the realm of a serious novel.


My Verdict:-

The two lead characters are undeniably well fleshed out and have interesting personalities. The plot is very tight and the editing rather good! (I could only spot a couple of typos in the entire book.) Simi is quite adroit with dialogues, and she creates very natural scenes, especially with the words exchanged between Naina and Rihaan. Despite the predictability of the romance scenes, the adept writing makes you enjoy every moment. The first half of the book seems like a run-of-the-mill Bollywood romance movie, but the author ups her game in the second half with the story taking a very grave turn. The animal-passion in the former half of the book transforms into a deeper love that has little to do with bodies.

This book gets an overall rating of 9 on 10 for putting an unusual and interesting spin on an otherwise regular love story. The good quality of writing, easy pace and charming story makes 'The Accidental Wife' an unputdownable book!

How to Remove Shortcut Virus in PC and Flash Drive

Maret 2015 - It’s also good-looking, and while not ultra-portable is not that heavy given the components inside. It makes the new MacBook Pro with Touch Bar seem a bit frivolous in comparison, not to mention extremely expensive Instead it's a company, well we have collected a lot of data from the field directly and from many other blogs so very complete his discussion here about Maret 2015, on this blog we also have to provide the latest automotive information from all the brands associated with the automobile. ok please continue reading:

How to Remove Shortcut Virus Ultimate Guide

How to remove shortcut virus? I receive so many complaints about this shortcut virus. How it affects every precious file that we value the most. If your file is infected by it, it will be hidden and inaccessible until at some point that it becomes corrupted and unusable. Not good, right?
In response to that, I created this ultimate guide on how to remove shortcut virus and other important things that you need to know about this virus. To make you aware about it and be able to protect your devices against it. So let’s start with its types…
Types
Shortcut virus has two variations; the most common is Flash drive Shortcut virus, then the File and Folder Shortcut virus.

File and Folder Shortcut Virus

How to remove shortcut-virus
This shortcut virus replicates your files and folders, hide and replace it with shortcuts.exe. This is a combination of Trojan and Worm. The bad thing about this shortcut virus, it will leave you no options but to click it in order to open your files and folders. Then after executing it, the virus starts to duplicate itself and install malicious software that monitors your computing habit and worst, steal your important data and credit card information.

Flash Drive Shortcut Virus

How to remove SHORTCUT VIRUS
This is purely Trojan; it consolidates every file in your portable devices and put it into one hidden folder. Then, it creates a Flash Disk shortcut.exe. Like the file and a folder shortcut virus, it will give you no choices but to click it to see your files. Once executed, it installs malicious applications that spy your computing routine and most probably steal your financial records if not detected.
First Aide
Unfortunately, not all antivirus can detect shortcut virus. So, the best thing you can do, is to make-it-a-habit not to open your portable devices or hard drive via autorun or from “my computer”. Here’s the complete Shortcut virus First Aide to do lists;
  • Do not open your Flash Drive via autorun and from My Computer.
  • Open your Flash Drive and Hard Disk by right-clicking it, then click explore or type  its drive letter in the windows address bar to prevent any script from running.
  • Follow the instruction here how to unhide Files hidden by the virus, to see the real files which are hidden by shortcut virus and to avoid executing it.
The above steps are designed to prevent shortcut virus from infecting your computer. It will also help you distinguish the real file from the virus-made files. As what I have said earlier, even prominent antivirus failed to catch shortcut virus. Nonetheless, I will be sharing you 3 methods to remove it, follow the guide below;

How to remove shortcut virus using shortcut virus remover tools – Method 1?

Download these two tools, namely: Trojorm Removal Tool and Shortcut virus fixfolder, click here.
Now, after downloading the shortcut virus remover tools above, extract it using winrar or any other file decompressor. Then run the “Trojorm Removal tool” first, make sure that you run it inside your flash drive, wait until the scan is complete and press enter. Next, copy the Shortcut Virus fix folder, paste it inside your flash drive or external drive. Then, open it via right-click, choose “open with” and select “notepad”. Look for the H:, change it according to your Flash Drive’s letter (ex. E:, F:, G: and so on).
When you are done editing, save it. Now double click the vbs file or open it via right-click, choose “Windows Based Script Host”. . .after running the script, shortcut virus must be gone and your files are now visible.
How to remove  Shortcut Virus on Flash Drive

How to remove Shortcut virus using command prompt/CMD? – Method 2

You should  proceed this method if the first one doesn’t work. This involves a “command prompt”. Now click “start”, “run”, “type cmd” “type the drive letter of your flash drive or external hardisk and a colon after it “eg F:” Once done type this attribute “attrib f:*.* /d /s -h -r -s”. You should see your files now and Shortcut Virus must be removed.
How to remove Shortcut Virus using cmd
Please take note the f: after the attrib, change it with your flash disk drive letter; if your flash drive, drive letter is e: then change it with e:.