Jump to content
  • Welcome to PhCyber
  • Explore and Enjoy Browsing!
  • Lots of useful topics
  • Stay active and receive prizes


  • Content Count

  • Donations

    0.00 PHP 
  • Joined

  • Days Won

  • C-Coins

    15 [ Donate ]

sk3llum last won the day on August 14 2019

sk3llum had the most liked content!

Community Reputation

975 The Great

About sk3llum

  • Birthday 08/02/1975

Recent Profile Visitors

1,945 profile views
  1. When it's discovered that the evil Emperor Palpatine did not die at the hands of Darth Vader, the rebels must race against the clock to find out his whereabouts. Finn and Poe lead the Resistance to put a stop to the First Order's plans to form a new Empire, while Rey anticipates her inevitable confrontation with Kylo Ren. Warning: Some flashing-lights scenes in this film may affect photosensitive viewers. DOWNLOAD
  2. After he and his wife are murdered, marine Ray Garrison is resurrected by a team of scientists. Enhanced with nanotechnology, he becomes a superhuman, biotech killing machine - Bloodshot. As Ray first trains with fellow super-soldiers, he cannot recall anything from his former life. But when his memories flood back and he remembers the man that killed both him and his wife, he breaks out of the facility to get revenge, only to discover that there's more to the conspiracy than he thought. DOWNLOAD
  3. expires on: April 10, 2020 tested on TU50 promo low ping Singapore | VULTR online gaming browsing downloading torrent is NOT allowed CLICK HERE
  4. With Windows 10, Microsoft introduced a memory compression technique to manage the memory in an efficient manner. So, to put that in action, a process named system and compressed memory came into existence (some even call it as Windows 10 system and compressed memory process just because it’s only associated with Windows 10). However, you may only observe the system and compressed memory disk usage in the earlier builds of Windows 10. If you have the latest build of Windows 10 installed, then the system and compressed memory is simply “System” as observed in the task manager. Even though the process has been renamed, it still does the same job. And, it isn’t a bug – it’s an essential process. However, in some cases, the process tends to take up a lot of memory which in turn slows down the system. So, in this article, we will discuss what is system and compressed memory and how to fix the 100% disk usage problem caused by it. What is System and Compressed Memory? System and compressed memory – now simply renamed to “System” is a process which introduces a memory compression technique which helps the OS to retain more applications and data in the physical memory (RAM) without the need of reading/writing to the disk frequently. The official Windows blog explains that as follows: In Windows 10, we have added a new concept in the Memory Manager called a compression store, which is an in-memory collection of compressed pages. This means that when Memory Manager feels memory pressure, it will compress unused pages instead of writing them to disk. This reduces the amount of memory used per process, allowing Windows 10 to maintain more applications in physical memory at a time. So, except the 100% disk usage error, if you observe the “System” or System and compressed memory process to take up more memory than expected, it’s completely normal. If it does not affect the performance of your system, it’s actually working efficiently because if you have more RAM free – what good is it for? So, the more the memory utilized, the faster the performance. 100% System and Compressed Memory Disk Usage: Explained Well, the process should technically reduce the frequency of disk read/write operations by compressing the unused pages. However, it might conflict with an application to abnormally increase the disk usage to 100% and thereby making the system unresponsive – this is exactly the case of system and compressed memory high usage that you might have seen in some forums or social networks which people go on asking around. Also, high Memory usage by ntoskrnl.exe process could be another issue which can be resolved using the methods mentioned below. In some cases, if you have tweaked the page file size for all the drives in Windows 10, then the system and compressed memory process might result in a high disk usage. So, considering the facts discussed above, let us now take a look at the possible solutions. Solution 1: Disable Superfetch Superfetch is a built-in feature to preload the program and data for a faster access time. It is one of the best solutions to fix high disk usage on Windows 10. To disable the superfetch service, follow the steps below: 1. Press Windows key + R to launch the Run dialogue box. 2. Upon launch, type in “ services.msc “. 3. Now, you can observe all the services listed. You will have to scroll down to find a service named “ Superfetch “. 4. Right-click on the service, and then click on “ Properties “. 5. In the startup type as shown in the image below, set it to “ Disabled ” i.e when the computer boots up next time, the superfetch service won’t launch unless you manually start it. 6. Now, click on “ Apply ” and, then click “ OK “. After you are done with these steps, restart your computer and check if the high disk usage issue on Windows 10 still persists. If the problem still exists, try the next solution. Solution 2: Set Page File Size to Automatic (If You’ve Changed It) If your system was ever low on virtual memory, you might have tried to change the page file size to cope up with the issue. However, that might be a potential cause for the system and compressed memory high usage as well, why not try reverting back to its default state? Follow the steps below to set the page file size to automatic: 1. Press Windows key + S to open up the search bar. 2. Now, type in “ Performance “. You will now observe an option “ Adjust the appearance and performance of Windows “. 3. Head to the “ Advanced ” tab in the next window. Finally, under the – Virtual Memory section, click on “ Change “. 4. If you notice the first option as unchecked, just enable it and click “ OK “. Solution 3: Disable System and Compressed Memory Process This solution is not recommended because it might affect the performance of your system. But you can still try it if nothing else works. So let us look at the steps that you should follow: 1. Press the Windows key + S to open up the search bar and then type in “ Task Scheduler “. 2. From the left portion of the window, navigate your way through – Task Scheduler (Library) > Microsoft > Windows > MemoryDiagnostic . 3. Now, if you click on MemoryDiagnostic, you will have two tasks listed to the right. Among the tasks mentioned, right-click on RunFullMemoryDiagnosticEntry and then disable it. 4. Finally, restart your computer to check if the issue still persists. Solution 4: Turn Off Visual Effects Well, this may not be the solution you were looking for, but it did solve the high disk usage issue on Windows 10 for some users. So, here’s what you need to do: 1. Press Windows key + S and type in “ Performance “. 2. From the options, click on “ Adjust appearance and performance of Windows “. 3. Now, on the first tab of the Window, you just need to click on “ Adjust for best performance ” and Windows will automatically scrap down the unnecessary visual effects. Solution 5: Hardware Failures If none of the above solutions work for you, then “ system and compressed memory ” process may not be the culprit for the high disk usage problem on Windows 10. You might have a hardware issue. Two possible issues are: HDD/SDD Issue RAM failure Hard Disk Issue To check for errors on your HDD/SSD, you just need to head to the desired partition (Windows partition) and then follow the steps below: 1. Right-click on the Windows drive (usually C:) 2. Click on “ Properties .” 3. Now, head to the “ Tools ” tab and then under “ Error Checking ” click on “ Check “. 4. Do note that you will need Administrator rights in order to check for errors if you’re using a shared computer. Once the scan is complete, fix the errors (if any) – else move on to the next solution. You also follow our guide to reclaim storage space on your HDD/SDD while deleting the residual files – this might help as well. RAM Failure A faulty RAM stick can also be the root of this issue. So, you can try using the “ Windows Memory Diagnostic ” tool to check for memory problems. Just press Windows key + S and type in “ Memory ” in the search bar and you should find the tool listed. When you click on that, it will simply ask you to restart the system to check for errors. Click on it to restart the system to check for RAM issues. If it’s time to upgrade/replace your RAM stick (and you know it), then it’s better to replace the old RAM sticks. If you have a desktop, you can try replacing the RAM stick with a new one (one by one – if you have multiple sticks). After replacing the RAM stick, check if the issue still persists. In either case, if you have a laptop/notebook, you need to take the help of a professional (service center) to check if there’s an issue with the RAM. Wrapping Up Hope that helps you with the issue of high disk usage on Windows 10. If none of the above solutions work, you might need to re-install the OS just keep it clean install.
  5. Two white South Africans, imprisoned for working on behalf of the African National Congress (ANC), determine to escape from the notorious white man's `Robben Island', Pretoria Prison. DOWNLOAD
  6. bro @AkoSiDrakath, di nagmamatch yung exp.date sa title at sa content. anyways thanks & keep sharing
  7. It tells two stories of two different families who lived in a house where they were being haunted by different supernatural beings and evil spirits. CAST Dennis Trillo ...Peter Villareal Beauty Gonzalez ...Cynthia Domingo Raymond Bagatsing ...Nandy Domingo Alyssa Muhlach ...Marcy Villareal Gillian Vicencio ...Mia Domingo Teejay Marquez ...Fred Domingo Lui Manansala Teroy Guzman Miel Espinoza ...Pia Domingo Nhikzy Calma Francis Magundayao Kokoy de Santos Elle Ramirez >>>>>> DOWNLOAD <<<<<<
  8. Android is one of the most popular SmartPhone Operating System. As of now, there are over a billion android users. Every android user must be familiar with Pattern/PIN lock/Face Recognition, a security feature which ensures authorized access to their devices. But sometimes the users forget the pattern or they try the wrong pattern more than the permitted number of tries allowed, getting locked out. In this guide, I have collected almost all possible methods to break/bypass a pattern/PIN/Face protected android device. Disclaimer: Do at your risk. I am not responsible for any damages caused and hacking someone’s phone is a crime. Follow the below given methods one by one. Method 1 (Only If Custom Recovery like Cwm, TWRP, Xrec, Etc… is Installed:) Procedure: Download this zip Pattern Password Disable on to your sd card (using your PC, as you can’t get into your phone) Insert the sd card into your phone Reboot into recovery mode Flash the zip Reboot Done! Note: After Restarting if it still asks any pattern/PIN, just try some random pattern/PIN Method 2 (For All Devices With Custom Recovery Installed) Procedure (Using Aroma File Manager) Download and Copy Aroma File manager.zip to your memory card. Open your recovery (press volume Down + Power button or it can be different according to the phones. Generally, the phones who have pressable button on the middle they have to press all three buttons. Google for your pattern) There will be an option in recovery called “mount” . Go in that option and then mount all the cache and everything that is there. Then select “ update ” and select “ apply update from SD/external ” and select aroma file manger.zip file that you downloaded. After Flashing or updating, the aroma file manager will open. Use volume keys for up/down and power button 2 select like you use to get into recovery. In aroma File manager, Go to menu, which is located on the bottom strip and then select Settings. Go to bottom n select “mount all partition in startup ” then exit from aroma file manager. Now after exit, re-update that aroma file again and it will open again. Go to data >> and then System. Then find ‘ gesture.key ’ (for pattern lock) and ’ password.key ’ (for password lock) then long touch on gesture.key or password.key and sum option will be prompted, choose to delete and delete that file and restart. Note: After Restarting if it still asks any pattern/PIN, Read :just try some random pattern/PIN Method 3 (No Custom Recoveries Installed) Requirements. PC(Linux or Windows+Cygwin Installed) USB Cable and adb(Android Debug Bridge) installed. How to install ADB(Linux) Open Terminal Type the below command and hit enter. sudo apt-get install android-tools-adb Follow the instructions until everything is installed. How to install ADB(Windows) Download the .exe and run it. For download & Instrutions refer the guide here Procedure Connect the phone to the computer via USB(phone should be turned on). Open a terminal window(Linux) or cmd(windows). Type the below commands one by one, pressing enter. adb devices adb shell cd data/system su rm *.key That’s all. Reboot the device. Note: After Restarting if it still asks any pattern/PIN, just try some random pattern/PIN Method 4 (All Devices Via ADB - SQL Command) Open terminal(Linux)/cmd(Windows) and type the following commands, each at a time, followed by enter. adb shell cd /data/data/com.android.providers.settings/databases sqlite3 settings.db update system set value=0 where name=‘lock_pattern_autolock’; update system set value=0 where name=‘lockscreen.lockedoutpermanently’; .quit Done. Reboot the device. Note: After Restarting if it still asks any pattern/PIN, just try some random pattern/PIN Method 5 (All Devices Via ADB - File Removal) Procedure: Open terminal(Linux)/cmd(Windows) and type the following command. adb shell rm /data/system/gesture.key That’s it. You should be able to use the device without password/Pattern lock now. If it asks for password?pattern at startup just give any random pattern/PIN Method 6 (All Devices With USB Debugging Enabled) Procedure: (Primary Steps) Download & Extract Bypass Security Hack program. Open SQLite Database Browser 2.0.exe in SQLite Database Browser. Navigate to By-pass security Hacks folder and open Terminal/Cmd there. Run the file pull settings.db.cmd this will pull out the setting file out of your phone. Drag settings.db and drop to SQLite Database Browser 2.0.exe program. Navigate to Browse data tab, At table there, click to list down the selection & delete secure Instruction To Remove Pattern Lock: Continuing the above procedures, find the record named lock_pattern_autolock , and delete it. Close & save database Run push settings.db.cmd and reboot your phone Instruction To Remove PIN Lock: From the list, find lockscreen.password_type , double-click it & change it’s value to 65536 , and apply changes. (Note: If that file is not there create it) Next find lock_pattern_autolock, and delete record, If doesn’t exist, Ignore Close & save database Run push settings.db.cmd and reboot your phone Instruction To Remove Password Lock: Find lockscreen.password_salt , Delete Record Next find lockscreen.password_type , Delete Record Close & save database Run push settings.db.cmd and reboot your phone As always give any random password/PIN/Pattern if it asks in the first boot. Method 7 (Taking Precaution Before Lock Accident) As the title says, this method will act as a precaution, before you get locked up, while you still have access to the device. SMS Bypass [Root Required]- Download & Install It On Your Device. This app allows you to remotely bypass your phone’s screen lock by sending a SMS. It removes your gesture pattern or password after receiving a preset keyword along with a secret code via SMS. SMS Bypass app requires Root. Procedure: 1.First, make sure you give permanent root access to the app. 2.Change the secret code to your preferred choice. The default password is : 1234 3.To reset your screen lock, send the following message from another phone: secret_code reset Example: 1234 reset Note 1 : There is a space between your secret code and reset. Also the secret code is case sensitive. Note 2 : There is an option available to change the preset keyword. Default is : reset - Your phone will restart and your lock screen will be reset. Finally If None Of The Above Methods Work, Do Factory Reset/Full Wipe The Device
  9. sige bro check ko muna kung working pa kasi 1 year ng naka stock. ginagamit dati yun ng anak ko
  10. Researchers discovered multiple unsigned firmware in various system components such as WiFi adapters, USB hubs, trackpads, and cameras used in Lenovo, Dell, HP and other major manufacturers. The flaws existing in these components allowed the attackers to compromise millions of Windows and Linux systems, and exfiltrate the data, disrupt the operation also implant the malware. Once firmware components are infected, it allowed attackers to implant malware that stays undetected by any software security controls. The primary issue in the flaw is that many of the peripheral devices do not verify that firmware is properly signed with a high-quality public/private key before running the code. It means these above list components have no way to validate that the firmware loaded by the device is properly authenticated and trusted. It can be taking advantage of the attacker and simply insert a malicious or vulnerable firmware image that eventually trusted by the component blindly and let it run on the device. In results, Unsigned firmware in wifi adapters, USB hubs, trackpads, laptop cameras and network interface cards provides multiple pathways for malicious attackers to compromise laptops and servers. Researchers explain the following very simple and powerful scenario for an attack: An attacker gains access to a device via any method, such as malware delivered via email or a malicious website, or an evil maid attack. With basic user privileges, the attacker/malware could write malicious firmware to a vulnerable component. If the component doesn’t require the firmware to be properly signed, the attacker’s code is loaded and run by the component. The attacker can then use the unique functionality and privileges of that component to further an attack. For example, If the malicious firmware implant in the network adaptor, it allows attackers to sniff, copy, redirect, or alter traffic leading to a loss of data, man-in-the-middle and other attacks. Insecure Firmware In Peripherals Researchers from Eclypsium explains some of the vulnerable firmware in various computer brands such as Lenovo, Dell and USB adapter. Touchpad and TrackPoint Firmware in Lenovo Laptops: Researchers analyzed a Lenovo ThinkPad X1 Carbon 6th Gen laptop that used the following firmware. Touchpad Firmware: pr2812761-tm3288-011-0808.img TrackPoint Firmware: PSG5E5_RANKA_fv06.bin Both firmware contains an insecure update mechanism, and it doesn’t require any cryptographic signature verification before applied the firmware update. It potentially allowed attackers to modify the firmware images through software to run arbitrary malicious code within these components. HP Wide Vision FHD Camera Firmware in HP Laptops:- A firmware update distributed by HP components was unencrypted and lacked authenticity checks. Also, these firmware doesn’t contains any form of cryptographic signature or other authenticity information. “Researchers confirmed this vulnerability by modifying USB descriptors on a device that was updated with the tool. Of particular note, the SunplusIT firmware updater can successfully update a device even as a normal user. Firmware updates should require Administrator access.” WiFi Adapter on Dell XPS Laptop: During this research, experts demonstrate the flaw that allows modifying the firmware of the WiFi adapter on a Dell XPS 15 9560 laptops running Windows 10. In this above image, the firmware image for the WiFi adapter is correctly signed by the drivers and also it displayed the small certificate icon. Once researchers modified the firmware image for the Wifi adapter, the certificate icon is gone way. Demonstration : Researchers tested the unsigned firmware in a network interface card (NIC) chipset, in which specifically the Broadcom BCM5719 chipset in the NIC was used in this demonstration, and is commonly used in current-generation servers from multiple manufacturers. [Hidden Content] In this demonstration, researchers intercept the contents of BMC network packets, provide those contents to malware running on the host and also they were able to modify BMC traffic online. A malicious attack on a NIC can have a profound impact on the server, compromising the operating system remotely, providing a remote backdoor, snooping and exfiltrating raw network traffic and bypassing operating system firewalls to extract data or deliver ransomware. These critical flaws clearly indicate that unsigned firmware can lead to the loss of data, integrity, and privacy, and can allow attackers to gain privileges and hide from traditional security controls.

General Chat

General Chat

Please enter your display name

  • Create New...