The Best Of The Web....

Megaleecher.Net - One stop portal for latest and most interesting tips, tricks and tools related to technology.

Do subscribe to RSS feed or Twitter feed to get updated regularly.

Register Free Here >>

Fixing Lastpass Android App Login Prompts On MiUI 6

Disappointed with not only the design but overall package of the new Apple iPhone 6, I finally gave it a ditch and went for Xiaomi Mi4. The phone is not available in India but importing the device from HongKong costed me roughly $450 (Rs. 28000/-) and I am very satisfied to get such a brilliant phone for almost half the cost of an iPhone6.

Xiaomi phones are also known for their popular MiUI Android interface, and I installed the latest MiUI 6 Beta having Google Android 4.4.4 under the hood. MiUI 6 comes pre-installed with an excellent Security app which features an Anti-malware Scanner, System Cleaner, Data Monitor, Call/SMS Spam Blocker, Battery Manager and an excellent permission manager which lets you take control of which apps have root access and other permissions. Having Android allows you to do a lot more like LastPass Auto Login feature for applications, this however failed to work on MiUI6 and always timed-out as shown below, thankfully the fix was easy as instructed next.

MiUI Floating App Issue

Apple iOS 8.1 Finally Jailbroken

Apple iOS 8.1 JailbreakJailbreak fans who were holding upgrades to Apple iOS 8 can now take the plunge as Chinese iOS hacker group Team Pangu has finally achieved a iOS 8 – 8.1 jailbreak that works successfully on Apple devices including the latest iPhone 6, iPhone 6 Plus and iPad Air 2 along with all previous devices. For now the jailbreak utility is Windows only and allows users to get SSH access - using which one can install Cydia (Saurik has already uploaded Cydia for iOS 8 on his website). The user must disable passcode lock and turn off "find my iphone" feature before using Pangu for iOS8.

The list of devices and iOS firmware version supported by the new jailbreak : iOS 8.0, 8.0.1, 8.0.2, 8.1 on Phone 6, iPhone 6 Plus, iPhone 5s, iPhone 5c, iPhone 5, iPhone 4s, iPad 2/3/4/Air/Air 2/mini 1/mini 2/mini 3 and iPod touch 5.

Pangu iOS Jailbreak Tool
Pangu iOS Jailbreak Tool

WonderFox 2014 Halloween Giveaway Party

While Indians are celebrating Deepawali our readers in other part of the globe are waiting for Halloween. What’s your plan for this Halloween? This October, to welcome the big festival of Halloween, WonderFox started to seed the special Halloween gift for Megaleecher users, valid through November 6. Three products are provided for giveaway in the event period.

WonderFox 2014 Halloween Giveaway Party
  • WonderFox HD Video Converter Factory Pro (October 20th to 27th)
    This HD conversion software helps users convert video from Standard-Definition (SD) to High-Definition (HD) like HD MP4, HD MKV, HD AVI, HD MTS, HD TRP even Ultra HD 4K standard, and it also supports the newest encoders H265 (HEVC) and VP9.
  • WonderFox DVD Ripper Pro (October 25th to October 31st)
    With WonderFox DVD Ripper Pro, you can rip any copy protected DVD to digital video, and transmit it into your portable device like iPhone6, iPhone 6 Plus, Samsung Galaxy Note 4. It lets you backup a DVD to MPG video within 5 minutes.
  • WonderFox DVD Video Converter (October 28th to November 5th)
    WonderFox DVD Video Converter provides one-stop total solution to rip DVD (released by Disney, Paramount, Sony, etc), convert video to nearly all the formats and devices, download online video, edit and play video with excellent performance.

Happy Deepwali And New Year...

Best wishes to all on Indian festival of Deepawali and Hindu Calender New Year.

[Video] Apple iOS 8.1 Review

Apple Introduces New 27'' iMac With 5K Retina Display And iPad Air 2

New Google Nexus Family With Android 5.0 Lollipop Announced

Google has officially unveiled the Android 5.0 Lollipop with a new range of Nexus family devices. The newly announced devices are a 6-inch smartphone named Nexus 6, a media streamer called the Nexus Player, and a 8.9-inch tablet built by HTC Nexus 9 - all powered by the next Google Android OS, the Android 5.0 Lollipop.

Google New Nexus Family With Android 5.0

From Idea to App: The Duration of Software Development

We’ve all done it — in the shower, in the car, even while on break at work. We’ve all had a great idea for an app that would revolutionize how the world works. However, it turns out that software development isn’t as easy as coming up with an idea and doodling pictures of the logo. Software development takes energy, and more significant than that, development of a worthwhile and usable app will take time.

You may be overeager to get your product on devices around the world, but if you want to protect yourself and your potential profits, you need to take software development step by step. Luckily, here’s the guide to help you do that.

Why Your Company Needs a Pentester — And How to Hire One

As news of major data breaches becomes a regular occurrence, more companies are renewing efforts to secure their sensitive data and prevent it from falling into the wrong hands.

Keeping networks and IP addresses safe from prying eyes is no simple task, and cannot be left exclusively to antivirus and intrusion prevention software and firewalls. With attempted attacks on valuable targets taking place dozens, if not hundreds, times per day, the likelihood of at least one of those attacks succeeding increases all the time.

To better protect your valuable data, you have to think like a hacker. Hackers are constantly devising new tricks, new malware, and new ways to worm into your network and wreak havoc. So who better to test your security and identify loopholes than a hacker?

Penetration testing, or pentesting, is not a new concept. It basically gives a hacker full permission to attack your networks and identify loopholes, vulnerabilities, and weaknesses using a number of tools, from commercially available programs to open source software. Unlike other hackers, though, pentesting is done by a so-called “white hat” hacker, who uses his or skills for the benefit of others, not to steal information. Armed with the details of where vulnerabilities exist, IT security can shore up the defenses and reduce the chances of an actual attack occurring.

Pages

Subscribe to Megaleecher.Net RSS
This is just one of the many helpful tips we have posted, You can find more stories here,
Do subscribe to updates using your favorite RSS feed reader or using the secure FeedBurner email update form on top of this post.