Switch your computer into Iron Man’s J.A.R.V.I.S

JARVIS is Iron Man’s personal assistant. With the help of a few windows utilities, we can create our own JARVIS system.




Here are the essential things you will need:
  • A Computer/Laptop having Windows 7 8 or 8.1. (XP or Vista won’t work)
  • Microphone (If you don’t have one, buy it! It doesn’t cost much!)
  • Speech Recognition Setup.
    You need to understand some basic commands your computer takes to execute certain actions. If you dont know then just say “what can I say?”
  • Rainmeter Software.
    This will constitute the base of the Iron Man theme.
  • Iron Man theme pack.This is the theme and will work to make your computer look like JARVIS
  • Windows Speech Recognition Macros.
    This is a software provided by Microsoft by which you will be able to add your own commands into the system.
  • Windows 7 Boot Screen Updater. This is to update the old look of your Windows Boot Screen.
Click here to download it all!



JARVIS Software Mission – Step 1: Set up Windows Speech Recognition

This is the very basic step of what we’re going to do. You have to configure Windows Speech Recognition so that you can execute the basic commands by speaking.
Windows Speech Recognition will guide you through the commands and in the meantime, also train your computer to understand your voice better. So, after you take the tutorial, you will notice that your system understands your commands better than anyone else’s. Awesome, isn’t it?
I gave the link to the tutorial before itself. Make sure that you read it, and take time learning the basics. The more you accustom yourself to the commands, the better you can command your system.
It took me almost half an hour to complete this step on my desktop, but it was well worth it, because all the basic commands can be executed by me just by speaking!

Step 2: Installing Windows Speech Recognition Macros

You now know all the basic commands and now can control your computer with your voice. Use it and get more and more familiar with it.Remember that, whenever you are stuck, you can say “What can I say?” and your system will show up the list of the commands and their consequences.
Now we have to install the Windows Speech Recognition Macros.
The installation file is found in the files you recently downloaded. Install Windows Speech Recognition Macros using that setup file.

You just have to click on the “Install” button and your software will be ready!
Now, open Windows Speech Recognition Macros and you will soon find the icon in the Notification Area of the taskbar.

Right click on that icon and you will receive some options. Click on “New speech macro”.
Now here you have a variety of options. Basically, Windows Speech Recognition is meant to create your own commands with specific actions. We can’t be satisfied with the basic functions only right?
 
Here are the alternatives you have, explained in brief:
Insert Text: Suppose if you use Microsoft Word through Speech Recognition and don’t want to type your address again, you can set a specific phrase for your address and whenever you say that phrase, your address would by typed automatically.
Run a Program: There are default commands such as “Start WordPad” and “Start Notepad” for WordPad and Notepad respectively. There are commands for some other programs too! But what about the rest? This option can allow you to execute any program, maybe your favourite game by just speaking!
Send Keystrokes: Take a situation where you want to select all the text and copy it into the clipboard. Can you do it by just speaking? Oh yes, why not? This option allows you to add phrases for different keystrokes such as Ctrl+A and Ctrl+C!
Emulate Recognition: This is for the commands already supported by Windows Vista Speech Recognition.

Advanced: There are certain complex commands that we would like our JARVIS to do. However, this requires brief knowledge of XML. I have explained some of the commands you can use below:

(Note that the commands are listed in the order in which they are supposed to be used)
<speechMacros> – This is just a starting tag. This indicates that the code is actually for Windows Speech Recognition Macros.<command> – This, in short words, is the command to be executed. Sometimes your demands are fulfilled with just a single command. However, in some cases you would need more than one command too!
<listenFor></listenFor> – Whatever you are going to speak is supposed to be written between these two tags. Don’t forget the close tag else your code will not work.
<speak></speak> These tags should include the text your system is supposed to speak after listening to your command.
</command> – This is the closing tage of <command> tag. XML is like HTML. It has both opening and closing tags for every element, with a few exceptions.
</speechMacros> – This is the closing tag of <speechMacros>!
Now, I will show you some examples to explain it better.
But before that, I want to tell you that it is extremely important to digitally sign your macros! So before creating every single macro, you have to create a signing certificate! Every macro will need one certificate.
For creating a signing certificate, right click the Windows Speech Recognition icon in the notification pane, then go to Security, then press “Create Signing Certificate”.
Suppose if you want your computer to greet you when you command it to wake up, you can use the below Macros:
<speechMacros>
<command>
<listenFor>Wake Up Jarvis</listenFor>
<speak>Systems Online, Database Check, Good Morning Sir !</speak>
</command>
</speechMacros>
I love this one the most!
Here is a Macro for getting the weather. You can see that it’s a bit complicated to understand. But no worries! You just have to copy this macro and replace the text in bold with the desired details.
<?xml version=”1.0″ encoding=”UTF-16″?>
<speechMacros>
<command>
<listenFor>Pull up the weather in [CityName]</listenFor>
<run command=”http://www.weather.com/weather/local/{[CityName.zipCode]}”/>
</command>
<command>
<listenFor>Is it cold in [CityName]?</listenFor>
<speak>Let me check… just a moment.</speak>


</command>
<listenForList name=”CityName” propname=”zipCode”>
<item propval=”65201″>Columbia</item>
<item propval=”37201″>Nashville</item>
</listenForList>
</speechMacros>
Woah! What a lengthy piece of code. If you aren’t much into this coding stuff, I would suggest you to leave the above macro.
This is a Macro for restarting your computer. Simply say “Restart JARVIS” and your system will restart!
<speechMacros>
<command>
<listenFor>Restart JARVIS</listenFor>
<speak>Rebooting The System. See you shortly, Sir!</speak>
<run command=”C:WindowsSystem32shutdown.exe” params=”-r -t 00″/>
</command>
</speechMacros>
Here is a Macro for shutting down your system. Say “Goodbye JARVIS” and your system will shut down!
<speechMacros>
<command>
<listenFor>Goodbye JARVIS!</listenFor>
<speak>Getting offline, good bye Sir</speak>
<run command=”C:WindowsSystem32shutdown.exe” params=”-s -t 00″/>
</command>
</speechMacros>
If you want your system to tell you the time, use this macro:
<?xml version=”1.0″ encoding=”UTF-16″?>
<speechMacros>
<command>
<listenFor>What’s the time, Jarvis?</listenFor>
dim currentTime
currentTime = FormatDateTime(Time(), 1)
Application.Speak Time
Application.SetTextFeedback Time
]]>
</command>
</speechMacros>
Likewise, if you want your system to tell you the date, use the below macro:
?xml version=”1.0″ encoding=”UTF-16″?>
<speechMacros>
<command>
<listenFor>What’s the date, Jarvis?</listenFor>
dim todaysDate
todaysDate = Date
Application.Speak Date
Application.SetTextFeedback Date
]]>
</command>
</speechMacros>
Suppose you have just opened a file or a folder and you want to delete it, simply use the below macro:
<?xml version=”1.0″ encoding=”UTF-16″?>
<speechMacros>
<command>
<listenFor>Delete it!</listenFor>
<sendKeys>{DELETE}</sendKeys>
<speak> File has been Deleted, Sir </speak>
</command>
</speechMacros>
The last one! Want to empty your recycle bin? The below macro is to the rescue:
 <?xml version=”1.0″ encoding=”UTF-16″?>
<speechMacros>
<command>
<listenFor>Empty the Recycle Bin</listenFor>
<run command=”C:nirnircmd.exe” params=”emptybin” />
<speak> Done, Sir </speak>
</command>
</speechMacros>
Did I horrify you with too many codes! Note that NONE OF THE CODES GIVEN HERE ARE MANDATORY and you can always skip or modify any piece of code! After all, your system, your rules!

Step 3: Installing Jarvis Theme

You’re very near! You just have to install these – Rainmeter and Iron Man Theme, both of which are provided in the files.Rainmeter will do the job of supporting your theme and providing it with a base.
Now, change your desktop background (Wallpaper) to the image provided in the files or download your own.
You now have to load the theme skins. You have four colors to choose from – Blue, Green, Red and Yellow. While I like blue, it’s completely up to you for which to choose!
Simply load the skins of the color you have chosen. Click on the skin and press “Load” button. This is shown in the image given below:
You will notice that all the elements will be found at just one place. Rearrange them the way you like and Voila! Your system really looks like JARVIS now!
But hold on! Your desktop icons are still visible and that ruin the look. There’s a solution for that too!
Simple, right click on your desktop, hover to view, then uncheck “Show desktop icons” option.
Look at the below image for reference:

This is how my screen looks like now:
You can add more widgets to improve the look and creating your own unique JARVIS style.

[Tutorial] How To Create the Boom Beach Private Server.

[Tutorial] How To Create the Boom Beach Private Server.

      Hi Guys Today Am Gonna  Show You How To Create The Boom Beach Private  Server


   First Step : Download the Flamystic boom beach enumulator...

   Second Step:  open the downloaded file and ectract  to the destination and open the .exe file
                        it will create the config file edit the value if needed

   Third Step: close the exe file and again

   Last Step: connect  To the enumulator  Using Host Editor Fill The Ipv4 address and hostname game.boombeachgame.com and play  have fun






For Download Link  For the enumlator is available on My Youtube

For Complete Tutorial see this Video



Our FacebookPage--

https://web.facebook.com/Learnwithmeforfree

Our Official WebSite--

http://learnwithnaveen.weebly.com/

How to create Own Clash Of Clan Private server

How to create Own Private server



To Create Your Own Clash Of Clan  Server.

       
         These days, we can see a lot of new Clash of Clans private servers with unlimited Gold, Elixir and Gems. If you want to create you own modded server, this tutorial will show you how. This tutorial is for both iOS and Android. It’s very simple and does not take a lot of time. Just follow these simple steps!

Note: Only rooted Android devices and jailbroken iOS device can join!
Remember:
                    Back Up Your Current Village

Here is the screenshot of a private server:




Creating Clash of Clans Modded Server Tutorial

  1. Download the latest Clash of Clans server files Download Link Is HERE......
  2. Extract the downloaded (RAR) file, then open the extracted folder.
  3. Open the .exe file to start the Clash of Clans server.
  4. Open your RUN Window (Windows button + R) then type cmd for going to Command Prompt.
  5. Typing ipconfig then press Enter.
  6. At Ethernet adapter Local Area Connection line, copy and remember your IPv4 address.
  7. Follow these steps to join the CoC Private Server:
For Android Users:
  1. Download Host Editor. This application requires rooted devices.
  2. Tap + Add Host button (top right) to add new host option:
  3. Type your IPv4 Adress in the IP Adress field. Type gamea.clashofclans.com in the Hostname field: 

  4. Tap to + Add Hostname.
  5. Uninstall your Clash of Clans.
  6. Download it again from Google Play Store.
  7. You’ve done.
For iOS Users:
  1. Download iFile from Cydia.
  2. Open it then find / >> etc folder.
  3. Find the hosts file, open it with Text Editor.
  4. Add new line: {Your IPv4 Address} game.clashofclans.comExample: 1.1.1.1 game.clashofclans.com
  5. Tap to the return button once (Very important).
  6. Save your hosts file and close iFile.
  7. You’ve done!
I play CoC Private Server sometimrtheres to troll my friends by showing them my modded base lol.

 

This methode is Tested And Working Correctly 100%........:)




if any doubts don't hesitate to pm me.


Our FacebookPage--

https://web.facebook.com/Learnwithmeforfree

Our Official WebSite--

http://learnwithnaveen.weebly.com/

Our Official YOUTUBE Channel--


https://www.youtube.com/c/Learnwithmeforfree

Compress 1 GB File into 10 MB Using KGB Archiver

Compress 1 GB File into 10 MB Using KGB Archiver


mypclover.blogspot.in
mypclover.blogspot.in


Imagine that situation when your PC’s hard disk is full and want to store more files but don’t want to delete a single file from your hard disk , then what to do? In this situation all, you have to do just compress all big files. Not only this reason there are several reasons when we need to compress the big files. Actually, compressing a file means to decrease the size of a file without losing a single system file from it. So if you faced the problem with your big sized files and want to compress it in small size but don;’t know how then read this article because today in this article we are going to show you how to compress 1 GB files into 10 MB using KGB archiver.

There are hundreds of software’s are on the internet, through which you can compress the files and decrease their size but majorities are fake or had a virus on it. One of them is WinRAR, this tool can compress our file by 10% and it will decrease the size of our files by 10% (Maximum). So, in this case, KGB archiver is the best option to compress any big file because this tool can compress any file up to 90%.

Advantages of KGB Archiver Software:

*    This software is totally free of cost.
*    Small in size and Easy to Use.
*    Activation does not require.
*    It can create a password protected compress file.
*    90% compression rate
*    compatible with many extension


Download KGB Archiver Software

                     Download KGB Archiver Software from SourceForge

Steps to Compress 1 GB File into 10 MB using KGB Archiver Software
*  First of all, Download the software from the above links.
*  Install it on your PC, Then Open the KGB Archiver Software.
*  Select “Compress Files” option and click next.
Mypclover.blogspot.in


*  On the next tab, select the folder or path where you want to save the compressed file and give a name of the file.
mypclover.blogspot.in
mypclover.blogspot.in



*  Then select the Compression level from Normal to Maximum and leave archive format as KGB.

mypclover.blogspot.in
mypclover.blogspot.in


*  Select that file which you want to Compress by Click on Add File option.

mypclover.blogspot.in
mypclover.blogspot.in



*  After doing all these steps, Click on Next, file compression process will start.This will take several minutes, depend on your file size.

mypclover.blogspot.in
mypclover.blogspot.in




  • That’s all. You can use this tool to extract the compressed file at any time.
Note: 10mb per 1GB. (like 20mb for 2GB of file.)


Conclusion

Many times we face difficult to share data due to a large size of the file but by compressing a 1 GB of the file into 10mb. You can easily send those files on internet, email or by USB or any portable device to your friends. Hope you like this. If you face any difficulty while a compressing file with KGB archiver then feels free to ask us, we will get back to you with a solution ASAP.
If you know any other software or tool is better than KGB archiver and can compress file better than KGB then don’t forget to mention it in your comment.


Our FacebookPage--

https://web.facebook.com/Learnwithmeforfree

Our Official WebSite--

http://learnwithnaveen.weebly.com/

Our Official YOUTUBE Channel--



https://www.youtube.com/c/Learnwithmeforfree

WiFi Phisher – A New Method for Hacking WPA/WPA2 Security

WiFi Phisher – A New Method for Hacking WPA/WPA2 Security



mypclover.blogspot.in



George Chatzisofroniou has published a new Method for Hacking WPA/WPA2 Security using a WiFi so...

George Chatzisofroniou has published a new Method for Hacking WPA/WPA2 Security using a WiFi social engineering tool designed to steal credentials from users of secure wireless networks.

The administrator at the University of Greece developed the WiFiPhisher tool which is used to discover and replicate WPA-protected networks, sans password.

The tool can be downloaded from GitHub here and works by producing a number of due authorization packets at a legitimate access point jamming it and prompting users to inspect available networks.

Users will see the malicious network posing as their trusted access point.



“WiFiPhisher is a security tool that mounts fast automated phishing attacks against WPA networks in order to obtain the secret passphrase [and] does not include any brute forcing,” Chatzisofroniou @_sophron said.

“WifiPhisher sniffs the area and copies the target access point’s settings [and] creates a rogue wireless access point that is modeled on the target.”

“As soon as the victim requests a page from the internet, WifiPhisher will respond with a realistic fake page that asks for WPA password confirmation due to a router firmware upgrade.”


Wifiphisher is a security tool that mounts fast automated phishing attacks against WPA networks in order to obtain the secret passphrase. It is a social engineering attack that unlike other methods it does not include any brute forcing. It is an easy way for obtaining WPA credentials.




From the victim’s perspective, the attack makes use in three phases:

1.) The victim is being authenticated from their access point. Wifiphisher continuously jams all of the target access point’s wifi devices within range by sending death packets to the client from the access point to the access point from the client, and to the broadcast address as well.

2.) Victim joins a rogue access point. Wifiphisher sniffs the area and copies the target access point’s settings. It then creates a rogue wireless access point that is modeled on the target. It also sets up a NAT/DHCP server and forwards the right ports. Consequently, because of the jamming, clients will start connecting to the rogue access point. After this phase, the victim is MiTMed.

3.) The victim is being served a realistic router config-looking page. wifi phisher employs a minimal web server that responds to HTTP & HTTPS requests. As soon as the victim requests a page from the Internet, wi-fi phisher will respond with a realistic fake page that asks for WPA password confirmation due to a router firmware upgrade.

Here is a diagram of the above:




Our FacebookPage--

https://web.facebook.com/Learnwithmeforfree

Our Official WebSite--

http://learnwithnaveen.weebly.com/

Our Official YOUTUBE Channel--



https://www.youtube.com/c/Learnwithmeforfree