The official Site of Geeko-Times.

June 13, 2014

, ,

Watch Dogs 2014 PC Game: Hack the Real World

Watch Dogs (stylized as WATCH_DOGS) is an open world action-adventure stealth video game developed by Ubisoft Montreal and published by Ubisoft. It was released on 27 May 2014 for Microsoft Windows, the PlayStation 3PlayStation 4Xbox 360 and Xbox One, with a Wii U version planned for release in the fourth quarter of 2014. Set within a fictionalized version of Chicago, Illinois, thesingle-player story follows a hacker and his efforts to seek revenge after the accidental death of his niece. The open world design lets players freely roam Chicago, which includes the urban city, open countryside, and slums.

The game is played from a third-person perspective and its world is navigated on-foot or by vehicle. Players control Aiden Pearce, a highly skilled grey hat hacker who can hack into the "ctOS", a centralized operating system which manages the hyper-connected city of Chicago. Players can choose to play as criminals or vigilantes. An online multiplayer mode is also provided in the game, allowing up to eight players to engage in both co-operative and competitive gameplay in a recreation of the single-player setting.

GAMEPLAY

Watch Dogs is an action-adventure game played from a third-person perspective. Players complete missions—linear scenarios with set objectives—to progress through the story. Outside of missions, players can freely roam the open world of Chicago. The world may be fully explored from the beginning of the game without restrictions, although story progress unlocks more gameplay content.In the game, players take control of Aiden Pearce, a vigilante who can hack into various electronic devices tied to the city's central operating system (ctOS), allowing various methods for the player to solve numerous objectives. The hacking mechanic in the game is performed directly from Aiden's in-game smartphone, which is equipped with multiple applications, namely the "profiler" and the "crime prevention system"; the former allows the player to access information on any citizen in the city, while the latter notifies the player when a crime is likely to occur in the vicinity. The phone is also equipped with applications that interact directly with the environment around the player; for example, players can hack into NPC's phones to retrieve bank data and steal funds as well as unlock new cars, weapons, and in-game music, or they can hack into traffic lights to cause collisions. Players can also receive information on civilians via augmented reality feeds, providing them with information on demographics, health and potential behaviour. Equipment is also provided by smartphone apps, which can be used to summon cars and weaponry. Players can stop trains, raise security barriers, and black out the entire city and can slow down time to shoot.
The game's combat utilises a combination of stealth components and parkour, along with the mechanics of a cover-based third-person shooter. The hacking element of the game can also be used in combat situations to eliminate opponents, create diversions, or create cover. It can also be used as a stealth tool to sneak past guards. In combat, auto-aim and a cover system are available as assistance against enemies. Should players take damage, their health meter will gradually regenerate. If players commit crimes while playing, the police may respond, as indicated by a meter in the head-up display. On the meter, the displayed levels indicates the amount of attention the crime demands; if the player reaches the maximum fifth level, efforts by law enforcement to incapacitate players become very aggressive and increasingly difficult. When players have escaped the officers' line of sight, the level enters a cooldown mode, which recedes when players escape the search area (as displayed on the mini-map).
As the game proceeds, the player can improve Aiden's skills either by expending skill points or earning skills and perks by completing side missions and collecting various items from the in game world, such as finding QRS codes on the sides of buildings or finding ctOS servers collecting information on the citizens of Chicago.
Alongside the single-player mode, Watch Dogs features an asynchronous online multiplayer mode. One element to the multiplayer mode is a one-on-one interaction, in which one player secretly joins the single-player experience of another player and attempts to install a "back-door virus" onto their smartphone. In addition, the game features an eight-player free roam mode. Other multiplayer modes include car races, competitive decryption combat, and a ctOS mobile challenge. A mobile application is also available for smartphones and tablets that allows players to challenge another player in-game and use hacks that triggers traps, in an attempt to stop them from succeeding.

May 13, 2014

, ,

Motorola Moto E

Motorola Moto E specifications and pictures gets detailed. The first leak about Motorola Moto E specifications said that the smartphone will be 6.2 mm thick but according to a Brazilian eCommerce website FastShop.br Moto E will be 12.3 mm thick indeed much thicker than Moto G. Fastshop has already listed Motorola Moto E on their website which means Moto E will be selling in Brazil also. Moto E isdue to launch on May 13th globally.


We learned that Moto E will be coming in  three variants which are as under :-
  • Motorola Moto E (XT1021) in a Single-SIM slot variant
  • Motorola Moto E (XT1022) in a Dual-SIM slots variant
  • Motorola Moto E (XT1025) in a Dual-SIM with digital TV support variant

It will have a spill-resistant 4.3-inch display with Corning Gorilla Glass protection while there will be customizable back covers which Motorola calls Motorola Shells. The Motorola Shells comes in White, Turquoise, and Lemon colours. 

Indian eCommerce website Flipkart has already teasing Moto G taking us to a point that it will be available through Flipkart only. 

The new specifications reveal that Moto E will feature a 4.3-inch display, 1.2GHz Qualcomm Snapdragon Dual-Core processor and will run Android v4.4 KitKat out of the box. There will be a 5MP rear camera, 1GB of RAM, 4GB of internal storage which is further expandable via microSD card slot. The earlier rumoured battery capacity was 1900 mAh but the new leak suggest the device to have a 1980 mAh battery.

The drawback of Moto E will be it's camera which has the power to record only a 480p video which is too low and moreover it will not have Radio support.

Motorola Moto E Specifications :-
  • Dimensions : 124.8 x 64.8 x 12.3 mm
  • Weight : 140 Grams
  • 4.3-inch Scratch & Spill resistant display with Corning Gorilla Glass protection
  • 1.2GHz Dual-Core Qualcomm Snapdragon processor
  • Android v4.4 KitKat OS
  • 1GB of RAM
  • 4GB of internal storage, expandable Up To 32GB via microSD card
  • Lithium-Ion 1980 mAh battery, with Mixed Use up to 24 hours
  • Wi-Fi,  3G, Bluetooth Connectivity

May 10, 2014

Outlook.com account help

My account has been hacked

If your account has been compromised (hacked) it means that someone stole your password and might be using your account to access your personal information or send junk email.

How did a hacker get my password?

Hackers use several techniques to get your account password.
  • Malware: If you install a program from the Internet that isn’t from a trusted publisher, it might include malware that logs your keystrokes or searches your PC for saved passwords.
  • Attacking Internet sites: If hackers break into an Internet site and steal account info, they can check it against other sites to see if you've re-used your password.
  • Phishing: Hackers often trick people into sending them their account data.

How can I recover my account?

To recover your account, follow these steps.

1. Clear your PC of viruses or malware before you change your password

Most hackers get your password through malware that's been installed on your PC without your knowledge (for example, when you download a new screen saver, toolbar, or other software from an untrustworthy source.) It’s important to clear your PC of viruses or malware before you change your password. That way, the hackers won’t get your new password.
If you have a good antivirus program installed, make sure it is up-to-date, then do a full scan of your system. If you don’t have an antivirus app installed on your PC, Microsoft offers some free solutions.
  • If you’re running Windows 7, you can download and install Microsoft Security Essentials.
  • If you’re running Windows 8.1, you already have Windows Defender. To turn it on, from the Start screen or Search charm search for "Windows Defender" and tap or click Windows Defender, then follow the instructions on the screen.
Regardless of which antivirus app you install, run a full scan on your PC before you change your password. You should also set up your antivirus app to automatically get updates and to scan your PC on a regular basis.

2. Change or reset your password

After you run the antivirus app, try to sign in to your account and change your password. If you can’t sign in, try to reset your password.

Make sure you create a strong password

Don't
Do
Don't use the same password for different accounts.
Do make the new password significantly different from previous passwords.
Don't recycle passwords.
Do change your password regularly.
Don't use a single word for your password.
Do use a password phrase (no spaces between words) that can’t be easily guessed.
Don't use easy-to-remember personal info like your name, names of family members, your address, or phone number.
Do use an easy-to-remember sentence or phrase converted into a string of initials, numbers, and symbols.
Don't use passwords like "password," "money$$$," or "12345678."
Do use our password checker to test your new password before you use it.

3. Reset your account settings

Since someone else had access to your account, we've cleared your account settings and removed any send-as addresses, email forwarding, and auto-replies. Here’s how to reset these options.
  1. Click the Options icon Options icon, and then click Options.
  2. Select one or more of the following settings.
    Send/receive accounts: Under Managing your account, click Your email accounts.
    Reply-to address: Under Writing email, click Reply-to address.
    Email forwarding: Under Managing your account, click Email forwarding.
    Auto-reply: Under Managing your account, click Sending automated vacation replies.
  3. Enter the required info and then click Save.

4. Restore deleted email and contacts

As soon as we detect that your account might have been hacked, we start saving your deleted messages in a safe place. In Outlook.com, click the Deleted folder. At the bottom of the window, click recover deleted messages.
Outlook.com will recover as many messages as possible and put them in your Deleted folder. Any messages not recovered are permanently lost.
If contacts have been deleted, you might be able to restore them. See Restore deleted contacts.

April 28, 2014

,

The Q-Phone Pro Version- Very powerful detective tool.

GIVE THIS MOBILE PHONE TO ANYONE AND SECRETLY MONITOR THEM ANYWHERE AT ANY TIME

This Q-Phone Pro version is much more powerful than the two units above.
This mobile phone looks and operates like any other mobile phone. It can dial out and receive calls like any other mobile phone. However we have put in special program which once activated, the Q-Phone Pro will let you know all the phone activity of the Q-Phone Pro user. (To others it will act like a normal mobile phone, but to you it will serve as a very powerful detective tool)
How is it more powerful that the two units above.
  • It will send text messages to your mobile phone alarming you what number the Q-Phone Pro is dialing out to or is receiving a call from. You may then dial in to the Q-Phone Pro and listen to both sides of the conversation.
  • It will send copies of text messages that the Q-Phone Pro sent (including the phone number that the Q-Phone Pro sent the text messages to.
  • It will send copies of text messages that the Q-Phone Pro received (including the phone number that the Q-Phone Pro received the text messages from.
  • And like the above two units It will also allow you to call in and listen in on the voice or sound within the vicinity of the phone when the phone is not in use.
  • It will do all the above without alarming the person using the Q-Phone Pro
Give it as a present to your, spouse, your kids, your employees, etc.  Know what your kids are up to, know your spouse's behaviour when you are away. It is very simple to activate the Q-Phone Pro. (It takes less than a minute to activate.) 
Just send two short text messages from your phone to the Q-Phone Pro to activate it and the Q-Phone Pro turns into your personal detective. You are now ready to give this Q-Phone Pro to anyone you want to spy on.  You can even take a trip to New York and monitor your spouse in Los Angeles.  There is no range limit for this Q-Phone Pro! It follows your target anytime, anywhere, home, office, bedroom, washroom, class room, meeting room, motels, hotels, friend's house, the list goes on.  Q-Phone Pro is one of the best detective you can find. Can be used with any SIM card world wide.
This Q-Phone Pro has built in software (no hassle downloading the software your self which may ruin the phone or cause mismatch between the phone and the software.)
Only two short text messages required from your phone to the Q-Phone Pro to activate it.
After activation the Q-Phone Pro turns into your personal powerful detective tool.
You will only need to activate it once.
SIM card can be changed without having to activate it again.

April 26, 2014

, ,

Create bootable USB Drive using CMD

Creating a usb pendrive using command prompt is not hard, it is one of the most common ways to create a bootable usb.

Step 1: Insert Flash Drive.

Step 2: Open CMD (run as administrator)
Step 3: Type DISKPART
Step 4: Type list disk

               Displays all Disks
               Note your Flash Drive Disk Number

Step 5: Type sel disk (number)
Step 6: clean
Step 7: create partition primary
Step 8: sel part 1
Step 9: active
Step 10: format fs=NTFS QUICK



         After the format is done you have to continue writting  in CMD.


Step 11: assign

Step 12: Exit

Dont close CMD


     
    Note the USB Drive Letter(H)

    Now you have to write the path to the executable file in your windows saved folder, 
    make sure that in your windows folder you have the boot folder with the bootsect executable file.

Insert the Windows 7 CD to Drive other wise mount the .iso image of the OS.

Note the Mounted Drive Letter(E)

continue writing in CMD

Step 13: E:

Step 14: cd boot

Step 15: bootsect.exe/nt60 H:

Step 16: EXIT

Close CMD

Now copy all your files in DVD or Mounted Drive to Pendrive.


     ALL DONE. You can now restart your pc and boot from the usb hard drive