Pages

123

Showing posts with label Software. Show all posts
Showing posts with label Software. Show all posts

November 13, 2013

:How To Change System Properties Logo in Windows 7:

How To Change System Properties Logo in Windows 7


Windows 7 System Properties Logo Changer is a free portable tool that allows you to change your system properties logo in Windows 7.

How to use:

  1. Run the tool as administrator.

  1. Click on Select image and browse for the image that you want to set as the System Properties Logo.

  1. If you want to resize the image, click on Resize image and specify the height & width of the image. After that, click Resize.




  1. Click on Apply.

  1. Click Check. Now the logo of System Properties will be changed:

Download Link (1.22 MB)
Disclaimer: This app is not made by me. The developer of this app was orbit30 who has disappeared long since.
EnjOy..:)
Bugs Of Techn0l0gy

November 07, 2013

:Windows 8.1 (Service Pack 1) Direct Download :




Windows 8.1 (Service Pack 1) Direct Download


Windows 8.1 Free Enterprise Preview Edition is now officially available from Microsoft for users who wants to test and try out new features, functionality and improvements Microsoft brought in new Windows 8.1 Enterprise Preview Edition. Direct Download Links of Windows 8.1 Enterprise Preview Edition Free DVD ISO Image File (32-bit / 64-bit) is available from Microsoft at no cost with Genuine Activation Product Key of Windows 8.1 Enterprise Preview.

Windows 8.1 Enterprise is similar to Windows 8.1 Pro but it comes with a few extra features such as Windows To Go creator, Start Screen control, Direct Access, App locker, etc.


English Versions :

Microsoft Windows 8.1 Enterprise Preview Free Edition is available in 13+ languages i.e. English UK, English US, French, German, Japanese, Korean, Portuguese (Brazil), Russian, Spanish, Swedish, Turkish, Arabic (Saudi Arabia), Chinese (Simplified), Chinese (Taiwan). 

EnjOy..:)
Bugs Of Techn0l0gy

November 06, 2013

:How to Monitor Hard Drive Or SSD Health & Performance With HDD Expert:

Monitor Hard Drive Or SSD Health & Performance With HDD Expert

The program doesn’t confuse you with excessive technical jargon, unlike most similar tools. It’s simple interface makes it an easy tool to use even for novice users. It doesn’t confuse you with .
Once launched, HDDExpert scans through all drives and partitions in your system. It then displays manufacturer name, model, firmware, serial number, temperature reading and cache size of the disk(s). The app also displays warning messages for temperature and health, and lets you know whether a backup or spare HDD is needed or not.

HDDExpert v1.3.0.5


The lower part of its interface carries information related to damage or errors at different sectors on the disk. In addition, the app displays total power cycle count and total operation time.
Right beside these readings, you’ll find three buttons labeled ‘Fans’, ‘Spare’ and ‘Backup’. The first two take you to an Amazon search page, which contains recommended products such as cooling fans and HDD replacement parts. The Backup button links to ‘Backup & Recovery 12 Home’, a paid program that you can install and use to create backups of the data on your disks. In the ‘Message’ section beside these buttons, the tool displays its verdict on the state of your drives and recommendations to prevent (Spare) or prepare (Backup) for failures.
All in all, a simple disk health monitoring software that could save your precious data before it’s too late. The tool can come in handy to test old drives as soon as they start posing problems, so you may get a replacement before complete failure of the disk and the loss of all the data on it.
HDDExpert works on Windows XP, Windows Vista, Windows 7 and Windows 8.

EnjOy..:)
Bugs Of Techn0l0gy

:How To Reset Google Chrome To Default Settings:

How To Reset Google Chrome To Default Settings

The factory reset concept doesn’t need any introduction, and is commonly found in many devices and operating systems. Even Microsoft has now included the reset and refresh functionality in Windows 8. Mozilla also recently implemented the reset option in its Firefox web browser, enabling users to revert everything to factory defaults whenever they wish. So, it’s about time that Google brought this feature to Chrome. Using the reset option, you can reset the browser to its default state whenever you want. When you reset the browser, you basically turn its state to how it was when first installed: no extensions or other browsing data on it, and all settings reverted to original. In other words, in one step, you’re are allowed to completely erase any info and start over from scratch without having to manually uninstall and reinstall the browser. Although Google already had this feature on-board in Canary and Dev builds, it’s now natively available in the latest stable release. Here is a thorough and complete step-by-step guide on how to reset Chrome back to its default settings.
The reset function in Chrome can come in handy if you want to troubleshoot a damaged or corrupt installation. Likewise, if your Chrome is simply crashing at times due to some extension or malicious script, a reset can be a viable option.
The first thing you will need to do is open your web browser and head over the Settings screen. You can quickly access it by entering ‘chrome://settings/’ (without quotations) in the address bar. There, you will find a plethora of options, but the one we’re particularly looking for lies at the very bottom of the page.

Settings - Google Chrome

Simply scroll all the way down in until you see the ‘Show advanced settings’ link (a blue hyperlink rather than a button). Click it, and further options will be made available to you.

Reset Chrome Step 2

The Settings screen will be expanded further and you will need to scroll all the way down again until you see ‘Reset browser settings’. Clicking this button will restore everything to default.

Reset Chrome Step 3

When you click this button, Chrome displays a confirmation popup informing what would be reset, which basically includes all browser settings, homepage, new tab page, search engine. The reset will also disable all extensions and unpin all your tabs. Furthermore, it will remove temporary data like cookies, cache and site data.
You can click Learn more to see further details. Click ‘Reset’ to confirm, and Chrome will go back to its default state.

Reset Chrome

Did you find the above guide useful? Share your thoughts in the comments section below. Happy web surfing!
EnjOy..:)
Bugs Of Techn0l0gy

:How to Manage Dropbox, Google Drive, SkyDrive & More From One Place With MultCloud:



How to Manage Dropbox, Google Drive, SkyDrive & More From One Place With MultCloud


Using a large number of cloud storage services can lead to the nuisance of not being able to manage each of them efficiently. That’s where services like MultCloud aim to offer a handy solution by letting your control and manage your cloud accounts from one unified interface. Based entirely online, it lets you create a MultCloud profile, to which you can connect your other cloud storag services for easy access and management. The service currently supports most major cloud storage providers including Dropbox, SugarSync, Google Drive, SkyDrive, Box and Amazon S3.
MultCloud is quite easy to configure, and takes only a couple of minutes  for setting things up. It doesn’t require you to enter a lot of details – just your email address, name and password would do. Once you visit the website (via the link provided at the end of this post), you can click the ‘Create An Account’ button to get started. Once an account has been created, just make sure to verify your email address with the service from the link provided in the confirmation email that’s sent to your inbox.

MultCloud - one app for simultaneous management of your multiple cloud drives

Next, you just need to enter your email address and password at the login screen after the verification to finally log in to your account – it’s simple as that.

2013MultCloud Login

While design isn’t the main focus of the app, but it’s still pretty well crafted. The fine-looking interface of the dashboard makes the service fairly intuitive to use. From the dashboard, you can add the cloud drives of your choice to the service. To do that, simply choose one of the services from the available options, specify a display name for it, and click Add. After that, you will need to sign in to the service with your account (if you aren’t signed in already) and authorize MultCloud with the appropriate permissions when prompted.

MultCloud - Put multiple cloud drives into one.

Once a cloud service account has been added, you can do pretty much everything from it that could possibly be done from a dedicated client or web interface of that service. For example, you can easily view contents of your cloud storage, upload files to it, download existing cloud files to your local storage, and create new folders. MultCloud also offers a preview feature for some files such as images. Other than that, you can rename your files and copy and move them between different cloud folders.

GDrive

Overall, MultCloud is a great service that keeps things simple while taking the hassle of controlling all your cloud accounts from different browser tabs or desktop clients out of the way. The service is currently available for free.

EnjOy..:)
Bugs Of Techn0l0gy

November 04, 2013

:How To Install Android 4.4 KitKat Launcher On Any Jelly Bean Device:

How To Install Android 4.4 KitKat Launcher On Any Jelly Bean Device

Last year’s Nexus 4 was an awesome device that proved LG can definitely make goodlooking phones. This year’s Nexus 5 is no different, offering the best specs and the most svelte design a $350 phone has ever offered. But it’s not just the hardware where Nexus 5 really shines; the new Android 4.4 Kitkat that it ships with is every bit as impressive. We’ve already covered a summary of new features in Kitkat, so you might want to check that out as well. Those who’ve been eyeing on the latest version of Android would be aware about its new Google Experience Launcher. The search engine giant has kicked up another notch by presenting the best looking stock Android launcher yet. If you can’t wait to get your hands on it, we’ve got some good news for you. The launcher files have already been uploaded to the internet, and you grab them to try it on your own device running any version of Jelly Bean. Just follow our full guide to get it up and running.
It’s worth noting that Google Experience Launcher may not work on all phones, and you may face force close issues. In our own testing, the launcher didn’t face any problem whatsoever on the international variant of Galaxy S4, but your mileage may vary depending on your device. We advise that you create a backup before proceeding.

Requirements

  • A phone running Android 4.1, 4.2 or 4.3 Jelly Bean
  • Google Experience Launcher files. The archive contains:
    1. PreBuiltGmsCore.apk (Google Play Services 4.0)
    2. Velvet.apk (Google Search)
    3. GoogleHome.apk (Launcher)
Files Installation Launcher

Procedure

  1. Again, to be on the safe side we recommend that you create a backup first to avoid any issues
  2. Next up, download the ZIP fie provided in the link above and extract its contents to an easily accessible location. You can download the file to your PC and transfer them to your device, or you can download it straight to your Android device and extract the archive using any file extraction app.
  3. Now, install all three files available in that folder one by one by simply tapping on them, or sideloading them via ADB form your computer.
  4. Once done, simply press Home and select the new Launcher as default.
Google Experience Start IntroHome Screen App Drawer Settings
Note: If you face Google Search Force Close issue, just long-press the home screen in the new launcher, select Settings and then tap Voice. Select Language to change the default. You can change to any another language and then again back to your own language by following the same procedure

EnjOy..:)
Bugs Of Techn0l0gy

October 31, 2013

: VMware Workstation V10 Full + Serial & Keygen:

VMware Workstation V10 Full + Serial & Keygen


DESCRIPTION :
VMware Workstation 10 - known program for virtualization. VMware Workstation 10 is a powerful solution for software developers and system administrators who are creating and testing a full-class integrated network applications servers, operating in different environments. The unique technology of VMware MultipleWorlds isolates operating systems and applications within virtual machines, and the disposal of each virtual machine is a standard PC x86, with its own processor and memory.
With this solution you can on a single computer to conduct processes of development, testing, debugging and running multi-tier browser-based applications that exploit the new operating systems and legacy applications on one computer, install new or upgrade existing operating systems without performing partitioning operations drive and restart your computer.
The new platform offers enhanced capabilities for application developers, engineers, quality control, sales of technology solutions and IT-administrators. One of the most notable innovations package VMware Workstation 8 has enhanced support for 32-bit and 64-bit versions of Windows. To display the status of virtual machines are now fully use functions Flip 3D and Aero Peek, implemented in the interface of Windows 7. VMware Workstation Package 8 became the first product with full Aero GUI in Windows 7. Enabling a single application-based technologies DirectX 9.0c Shader Model 3 and OpenGL 2.1, which can be run in virtual machines running Windows.
 
FEATURES :
- The simultaneous launch of multiple guest operating systems on one computer
- Running a virtual machine in windows desktop core operating system and full screen
- Installing virtual machines without re-partitioning
- Running is already installed on your computer operating system without reinstalling or re-configure
- Launch of Windows applications on a computer running Linux, and conversely
- Development and testing of applications at the same time for different systems
- Running untested applications without the risk of endangering the stability of the system or lose critical data
- Sharing files and applications to different virtual machines by using a virtual network
- Running a client-server and Web-based applications on a single PC
- Running on the same PC multiple virtual machines, and modeling of network

Click to download VMware Workstation v10 SETUP [489 MB]

Click to download VMware Workstation v10 SERIAL & KEYGEN ONLY [53 KB]

EnjOy..:)
Bugs Of Techn0l0gy

: Internet Download Manager 6.15 + Crack:

Internet Download Manager 6.15 + Crack

DESCRIPTION :
Internet Download Manager (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use. - Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. FEATURES : Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done. Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others. Version 6.16 adds Windows 8 compatibility, adds IDM download panel for web-players that can be used to download flash videos from sites like YouTube, MySpaceTV, and Google Videos. It also features complete Windows 7 and Vista support, YouTube grabber, redeveloped scheduler, and MMS protocol support. The new version also adds improved integration for IE 10 and IE based browsers, redesigned and enhanced download engine, the unique advanced integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features. Install Notes: -1. Install software -2.Stop IDman.exe from taskmanager -3. Go to crack folder and copy "idman.exe" file to the installation directory...usually to (...Program Files\Internet Download Manager) -4. Run reg.reg file -5 Run from desktop shortcut 

Click to download IDM 6.15 CRACK ONLY [1 MB]

EnjOy..:)
Bugs Of Techn0l0gy

October 10, 2013

:Create a Bootable Pendrive of any OS:

Create a Bootable Pendrive of any OS

Windows 7 USB/DVD Download Tool is a free tool from Microsoft to make an Bootable pendrive form ISO files. But how to make a bootable pendrive from the .img files or copy some other OS to the pendrive? We need some other tools. Here I have discussed about an free tool that allows you to create an bootable pendrive from any OS.
bootable-pendrive

Win32 Disk Imager

As I already mentioned, it is an free tool for windows and it reads the disk image of any format and writes it in an Pendrive. It could also write it in the Memory Card and make it bootable.

Win32 Disk Imager

The software is about 12.8MB and can be downloaded from here

Steps to create an Bootable Pendrive

Just download the package and open the Win32DiskImager.exe
Select the Image file which you want to copy.

OS selection in Win32DiskImager

Select the Removable disk which you want to make it as bootable.

device selection in Win32DiskImager

Click the Write Button.

Write in Win32Disk Imager

Wait for the process to be completed. Your bootable pendrive is READY..!!!
EnjOy..:)
Bugs Of Techn0l0gy

October 09, 2013

: Nokia to End Support for Symbian and Meego from Jan 1st, 2014 :

Nokia to End Support for Symbian and Meego from Jan 1st, 2014


Symian Nokia to End Support for Symbian and Meego from Jan 1st, 2014

Nokia has just discovered a new way to tarnish your new year celebrations. The Finns have announced that from the very start of 2014, it will be ending the support for its Symbian – once the king of mobile OSes – and Meego Operating Systems.
What that means is that while you will be able to download apps from those operating systems’ app stores, those apps won’t be getting updates any longer. No apps will be posted to the store after that either.
“If you have Symbian and MeeGo content in the Nokia Store, it will continue to be available for download to customers, and you will continue to receive download and revenue reports as well as payouts for downloaded content”, the company said in an email to developers. “However, starting January 1, 2014, you will no longer be able to publish any new content or update existing content for Symbian and MeeGo.”
While this news isn’t a surprise, recent events in the Nokia’s history including the move to Windows Phone and the eventual selling of the phone division to Microsoft meant that this move was probably hastened.
Nokia had already announced earlier this year that it would never make a Symbian phone again.

EnjOy..:)
Bugs Of Techn0l0gy

September 29, 2013

: How to hack with IP address:

  Did you know how much stuff you can do with an ip address?

There is a plenty of tutorials  that go into how to get an IP Address from the preferred mark of your choice. Now I will not go into that subject. Alright so say we got the targets IP Address finally. What do we do with this IP Address. Well first you should ping the IP Address to make sure that its alive or how we say online. Now at the bottom I will include some links where you can get some key tools that may help on your journey through the electronic jungle. So we need to find places to get inside of the computer so we can start trying to find a way to "hack" that. Port Scanners are used to identify the open ports on a machine thats running on a network, whether its a router, or a desktop computer, they all have ports. Protocols use these ports to communicate with other services and resources on the network.  Well Blues Port Scanner will scan the IP address that you chose and identify open ports that are on the target box. 

Blues Port Scaner you can download from here:

For example:
Idlescan using Zombie <Domain Name> (192.150.13.111:80); Class: Incremental
Interesting ports on 208.225.90.120:
(The 65522 ports scanned but not shown below are in state: closed)
Port State Service
21/tcp open ftp
25/tcp open smtp
80/tcp open http
111/tcp open sunrpc
135/tcp open loc-srv
443/tcp open https 1027/tcp open IIS
1030/tcp open iad1
2306/tcp open unknown
5631/tcp open pcanywheredata
7937/tcp open unknown
7938/tcp open unknown
36890/tcp open unknown

In example we see that there are a variety of ports open on this box. Take note of all the ports that you see listed before you. Most of them will be paired up with the type of protocol that uses that port (IE. 80-HTTP 25-SMTP Etc.). Take all that information and paste it into notepad or the editor of your choice. This is the beginning of your targets record. So now we know what ports are open. These are all theoretical points of entry where we could wiggle into the computer system. But we all know its not that easy. Alright so we dont even know what type of software or what operating system that this system is running.

NMAP the Port Scanner has unique OS fingerprinting methods so when the program sees a certain series of ports open it uses its best judgement to guess what operating system its running.

NMAP you can download here:


So we have to figure out what type of software this box is running if we are gonna start hacking the thing right? Many of you have used TELNET for your MUDS and MOOS and weird multiplayer text dungeons and many of you havent even heard of it before period. TELNET is used to open a remote connection to an IP Address through a Port. So this means is we are accessing their computer from across the internet, all we need is their IP address and a port number. With that record you are starting to compile, open a TELNET connection to the IP Address and enter one of the open ports that you found on the target.
So say we typed 'TELNET -o xxx.xxx.xxx.xxx 25' This command will open up a connection through port 25 to the IP xxx.xxx.xxx.xxx. Now you may see some text at the very top of the screen. You may think how is text going to help me. Well It will. Get that list you are starting to write, and copy the banners into your compilation of the information youve gathered on your target. Banners/Headers are what you get when you TELNET to the open ports. Heres an example of a banner from port 25.

220 jesus.gha.chartermi.net ESMTP Sendmail 8.12.8/8.12.8; Fri, 7 Oct 2005 01:22:29 -0400

Now this is a very important part in the enumeration process. You notice it says 'Sendmail 8.12.8/8.12.8' Well what do you know, we now have discovered a version number. This is where we can start identifying the programs running on the machine. There are some instances in which companies will try and falsify their headers/banners so hackers are unable to find out what programs are truly installed. Now just copy all the banners from all the open ports *Some Ports May Have No Bannners* and organize them in the little record we have of the target. Now we have all the open ports, and a list of the programs running and their version numbers. This is some of the most sensitive information you can come across in the networking world. Other points of interest may be the DNS server, that contains lots of information and if you are able to manipulate it than you can pretend to hotmail, and steal a bunch of peoples email. Well now back to the task. Apart from actual company secrets and secret configurations of the network hardware, you got some good juicy info. http://www.securityfocus.com is a very good resource for looking up software vulnerabilities. If you cant find any vulnerabilities there, search on google. There are many, many, many other sites that post vulnerabilities that their groups find and their affiliates.

At SecurityFocus you can search through vendor and whatnot to try and find your peice of software, or you can use the search box. When i searched SecurityFocus i found a paper on how Sendmail 8.12.8 had a buffer overflow. There was proof of concept code where they wrote the shellcode and everything, so if you ran the code with the right syntax, a command prompt would just spawn. You should notice a (#) on the line where your code is being typed. That pound symbol means that the command prompt window thats currently open was opened as root. The highest privilage on a UNIX/Linux Box. You have just successfully hacked a box. Now that you have a command shell in front of you, you can start doing whatever you want, delete everything if you want to be a  jerk, however that is not recommended. Maybe leave a text file saying how you did it and that they should patch their system. Whoever they are. And many times the best thing you can do is just lay in the shadows, dont let anyone know what you did. More often than not this is the path you are going to want to take to avoid unwanted visits by the authorities.

There are many types of exploits out there, some are Denial of Service exploits, where you shut down a box, or render an application/process unusable. Called denial of service simply because you are denying a service on someones box to everyone trying to access it. Buffer Overflow exploits are involved when a variable inside some code doesnt have any input validation. Each letter you enter in for the string variable will be 1 byte long. Now where the variables are located at when they are in use by a program is called the buffer. Now what do you think overflowing the buffer means. We overflow the buffer so we can get to a totally different memory address. Then people write whats called shellcode in hex. This shellcode is what returns that command prompt when you run the exploit. That wasnt the best description of a buffer overflow, however all you need to remember is that garbage data fills up the data registers so then the buffer overflows and allows for remote execution of almost every command available. There are many, many other types of attacks that cannot all be described here, like man-in-the-middle attacks where you spoof who you are. Performed correctly, the slave will enter http://www.bank.com and his connection will be redirected to your site where you can make a username and password box, make the site look legit. And your poor mark will enter their credentials into your site, when they think its really http://www.bank.com. You need to have a small script set up so it will automatiically display like an error or something once they try and log in with their credentials. This makes it seem like the site is down and the slave doenst give it a second thought and will simply try again later.

So as a summary of how to own a box when you only have an IP Address
Method Works On both *Nix and Windoze

You can do the same with domain names (IE google.com) than what you can with IP Addresses. Run a whois Lookup or something along those lines. Or check up on InterNIC you should be able to resolve the domain name to an IP address.

- Port Scan The Address And Record Open Ports
- Telnet To Open Ports To Identify Software Running On Ports

netcat - Network swiss army knife. Like TELNET only better and with a lot more functionality. Both can be used when you are trying to fingerprint software on open ports

- Record Banners And Take Note Of The Application Running and The Version Number
- Take A Gander Online At SecurityFocus.com or Eeye.com. If you cant find any vulnerabilities then search google.
- Make a copy of some Proof-Of-Concept code for the vulnerability.

I will not teach you how to cover your track. This is prohibited and i put that here only for informational reasons.

EnjOy..:)
Bugs Of Techn0l0gy

September 19, 2013

:BBM for iOS and Android Release Date:

BBM for iOS Release Date

BlackBerry Messenger is close to becoming a cross-platform messaging service for the first time, but when will you be able to download the app on your Android and iOS devices? BlackBerry has been pretty quiet about launch dates up until now, but a new rumor claims BBM will hit Google Play this Friday, September 20, before landing on the App Store a day later.
Indonesian website TeknoUp has published an invite to a BBM launch event in Jakarta at 12 p.m. local time on Thursday, September 19. BlackBerry is expected to confirm at the event that BBM for Android and iOS will be available before the end of the week.
 We cannot confirm the invitation is genuine, and we’re yet to hear about similar events in the U.S. or Canada — but CrackBerry has also received some dates for BBM’s cross-platform launch, and they line up perfectly. Here’s what you can expect, then, according to CrackBerry:
  • Friday, Sept 20th, 7am EST: Android version published on Google Play
  • Friday, Sept 20th, 7am EST: BBM.com goes live
  • Friday, Sept 20th, 7am EST: CRM messages sent out to pre-registrants
  • Saturday, Sept 21th: BBM on iOS becomes available 12:01 am EST, Saturday Sept 21st in local time zones.
  • Saturday, Sept 20th, 7am EST: Follow-up CRM message sent out after full App Store deployment
We had suspected that BlackBerry might wait until after Apple has launched its new iPhones before launching BBM for Android and iOS, but clearly it’s not too concerned about the news being buried under iPhone reviews and related stories.
So, if you’re lucky enough to be picking up a new iPhone on Friday, it looks like you’ll be able to use BBM on it the following day

EnjOy..:)
Bugs Of Techn0l0gy

September 01, 2013

:How to move All Android Apps to SD Card (Without Rooting Device):

How to move All Android Apps to SD Card (Without Rooting Device)

Android apps install to the internal storage by default. If you’ve ever seen your device complain that it is out of memory, especially when trying to install a new app, don’t feel too bad. You can also set the SD card as your default install location. This trick allows you to move almost any app to the SD card – no root access required. Enabling the moving app feature on your phone is much easier than how it may sound like. We shall take you through it step by step.
This tweak requires Android 2.2 or later. To change the default install location, you’ll need to use the ADB, or Android Debug Bridge, utility included with Google’s Android SDK. Following are the Step-by-step Instructions for moving All Android Apps to SD Card (Without Rooting Device).

01 Move All Android Apps to SD Card Without Rooting Device How to move All Android Apps to SD Card (Without Rooting Device)
First of All Hit Like Buttons Shown Below.
1) Enable USB Debugging & Developer Options
The 1st step is to enable USB Debugging.In gingerbread it is placed in Settings> Applications > Development > USB Debugging. And ICS it is placed in Settings > Developer Options > USB Debugging. But, after upgrading it to 4.2 it is missing. If your are on Android 4.2 or higher The USB Debugging and Developer Options are hidden in latest Android 4.2 Jelly Bean. If we want to use those options, manually activate it.  Here is the guide to enable USB debugging on Android 4.2 Jelly Bean running mobiles and tablets.
Developer Options have many features for app developer to test an app on their device from PC via ADB.
  • Go to – Settings > About phone.
  •  Then move on to Build number option
  • Tap on Build number repeatedly about 7 times.
  •  This is enough.
  • After touching 7th time you will see a message that, “you are now a developer”.
02 Enable usb debugging Developer Options on Android 4.2 Jelly Bean How to move All Android Apps to SD Card (Without Rooting Device)
Now the option will be placed in Settings menu. Normally it placed under System in Settings menu. Then you can enable it in Developer Options and Android Debugging.
03 Enable usb debugging Developer Options on Android 4.2 Jelly Bean How to move All Android Apps to SD Card (Without Rooting Device)
2) Install the Android SDK
After Enabling USB Debugging You’ll need to download and install Google’s Android SDK on your computer. If you don’t already have Oracle’s Java JDK installed on your computer, you’ll have to download and install it before installing the Android SDK.
Note: You need only Android SDK for this so No need of Downloading Android SKD bundle just download SDK Tools Only.
04 nstall the Android SDK How to move All Android Apps to SD Card (Without Rooting Device)
After you’ve installed both the JDK and Android SDK, launch the SDK Manager from your Start menu.
05 nstall the Android SDK How to move All Android Apps to SD Card (Without Rooting Device)
The ADB utility isn’t installed by default. It’s included in the Android SDK Platform-tools package – select this package and click the Install button to download and install it.
06 nstall the Android SDK How to move All Android Apps to SD Card (Without Rooting Device)
After the process completes, connect your Android device to your computer with its included USB cable. Windows should locate the device and install the appropriate drivers automatically. If it doesn’t, you may have to download and install the appropriate drivers from your Android device’s manufacturer. Do not mount the device after connecting it – just plug it in.
3) Using ADB
Open a Windows Explorer window and navigate to the android-sdkplatform-tools folder. On Windows, you’ll find this folder at C:Program Files (x86)Androidandroid-sdkplatform-tools by default. Check C:Program FilesAndroidandroid-sdkplatform-tools if you’re using a 32-bit version of Windows.
07 Using ADB How to move All Android Apps to SD Card (Without Rooting Device)
Launch a Command Prompt window in this folder by pressing and holding the Shift button, right-clicking in the folder, and selecting Open command window here.
08 Using ADB How to move All Android Apps to SD Card (Without Rooting Device)
  • Run the adb shell command to enter ADB tools.
08 Using ADB1 650x331 How to move All Android Apps to SD Card (Without Rooting Device)
Command Code:
adb shell
  • Run pm get-install-location command to check the default install location which will be 0.
09 Using ADB 650x330 How to move All Android Apps to SD Card (Without Rooting Device)
Command Code:
pm get-install-location
  • Run pm set-install-location 2 command for setting default install location to SD card.
10 Using ADB 650x335 How to move All Android Apps to SD Card (Without Rooting Device)
Command Code:
pm set-install-location 2
0 [auto]: Let system decide the best location
1 [internal]: Install on internal device storage
2 [external]: Install on external media
  • Run pm get-install-location command again for conformation of location change.
11 Using ADB 650x331 How to move All Android Apps to SD Card (Without Rooting Device)
Command Code:
pm get-install-location

4) Moving Apps to SD Card
Apps that refused to leave your system storage can now be moved to the external storage. For instance, below you’ll see screenshots of the Google Maps app. Before the change was made, the Move to USB Storage button was grayed out. After the change was made, the button is enabled and the app can be moved.
12 Moving How to move All Android Apps to SD Card (Without Rooting Device)
Warning.!!
Some apps shouldn’t be installed to your SD card and should remain installed on the internal storage. The external storage is unavailable when your Android device is mounted on your computer, so apps that remain running all the time should be left on your internal storage. Widgets, launchers, animated wallpapers, and anything you want to use while your Android’s SD card is mounted on your computer should be left on the internal storage.

EnjOy..:)
Bugs Of Techn0l0gy