Android security tips, apps and antivirus software

Malware, Viruses, Ransomware, and fake apps, are all used by hackers to take control of people’s devices.

A hacker could steal your logins, credentials, passwords, credit card details, contact addresses, SMS messages, emails, calendar information, and other sensitive details.

Some cybercriminals may even use a Trojan to take control of the camera and microphone to spy on you in real time.

It's not just hackers, governments and ISPs also snoop on people's data and many service providers perform low-level surveillance.

Secure Android OS with a VPN

A VPN can provide security for your Android device, by doing three things:

  • A VPN encrypts all your data, giving you watertight digital privacy that stops ISPs from being able to perform mandatory data retention on behalf of the government.
  • A VPN conceals your real IP address so that the websites you visit cannot track it. Concealing your IP also protects your location from hackers and other malicious forces online.
  • A VPN protects you from hacking when connected to public WiFi hotspots. The encryption provided by a VPN means hackers can't steal your data via public WiFi.

Other ways to keep Android phones secure

A VPN is a vital security tool, but it will not protect you against everything. There are a number of other things you can do to secure your Android:

Update to the latest version of Android

Android developers are constantly searching for new vulnerabilities, when they are discovered they are patched in a new version of Android. Always update the operating system when an update is made available.

Update all of your apps

Apps are constantly finding and fixing vulnerabilities. Keep up-to-date with any updates that are made available.

Install a good AntiVirus/AntiMalware for Android

There are hundreds of security apps for Android, but most of them aren't great, we recommend Malwarebytes for Android because it is available for free and has all the features you need. You can also upgrade to get real-time protection. 

Turn off permissions for apps from unknown sources

If you do turn this on at any point, be sure to turn it back off again for maximum security.

Only use official App stores

Ensure you only download and install apps from official app stores or well-known services like Android Drawer or APKForge. Check an app's reviews before installing.

Check permissions before installing apps

If apps have extremely invasive permissions - that aren't relevant to its functionality - then you probably shouldn’t install them. Apps that ask access to IMEI/IMSI and MAC numbers, device details, contact lists, SMS messages, etc, are performing covert surveillance on your device. Stay away.

Password protect and encrypt your device

If your Android device is lost or stolen and you haven’t properly protected it you could end up having a lot of sensitive data stolen. You should always use a strong password and, if available full disk encryption.

Watch out for phishing emails and phishing text messages

These techniques trick Android users into clicking on a link that then delivers malware onto their device.

Surf cleverly

Be careful about the websites you visit and what links you click on. You can also use TrendMicro to avoid recognized malicious websites.


Slightly more technical, it is worth knowing that it is possible to root an Android device in order to uninstall OEM bloatware and Google’s Service Framework apps (both known to perform low-level surveillance).


There are many things you can do to protect your Android phone but a VPN is essential.

This article is syndicated from here in collaboration with bestvpn.
How to find server IP address of any website

Looking to get the IP address of a website? Read up!

Just in case you're wondering what the hell I'm talking about; a web server is a computer program that allocates site web pages as they are being requested. When we enter a web address into an internet browser, the browser transmits a request off into the internet requesting to view the web page.

The web server responds to that request, and delivers the contents of the web page back to the user.

This is made possible because every device that connects to the internet has a unique number assigned to it, named the Internet Protocol address(IP). Now our objective here is to find the unique IP address assigned to any Website.

There are several ways to achieve this, none of these involves any hacking skills. I'll be showing you 3 different methods, namely;

  1. Reverse IP Lookup
  2. Via Windows XP/Vista/7
  3. Via Linux

Reverse IP Lookup

Using the network utility in MAC

How to find server IP address of any website using MAC
  • Open up the Network Utility on your MAC.
  • Locate the ping tab and click on it.
  • Now input the web address of the website in the text field box.
  • Click on the ping button.
Doing all this gives you the server IP address of the website, just like this:

Current Registrar: REGISTER.COM, INC.
IP Address:

You'd wanna check out how to hack a website 

Via Windows XP/Vista/7

How to find server IP address of any website using Windows

  • Make sure you're logged into a user account in Windows, then go to the start menu.
  • Type "CMD" in the search bar and press "Enter" to open the command prompt window in Windows.
  • Type nslookup theURL e.g nslookup
The result will be displayed.

Via Linux

  • Click the GNOME menu "Applications" and "Accessories." --> choose "Terminal" to open a command prompt window (terminal) in Linux.
  • Type host theURL and press "Enter." e.g "host"
Then read up the IP.

That's it!

Do you know that 96% of the internet is not indexed by search engines such as Bing, Yahoo and  Google? that basically means that only a very tiny proportion of the World Wide Web(www) is available to you through normal means. Most things happen at the deep / dark web.

The average internet user only utilizies a small portion of the internet's potential.
Accessing the deep web and the dark web

The deep / dark web 

deep web

The famous deep web is exactly like it sounds — just below the surface but not completely dark.

In other words, the deep web is any web address that cannot be found by regular search machines. Regular search engines are only able to search and index websites because of links. Links are used in ranking all search results according to things like keywords, relevancy and inbound links. Search engines search the “surface web”, but that’s where the search ends.

Accessing the deep web and the dark web

For instance, say you searched a public library's catalogue to find a specific book, you couldn’t just type the title into your search engine's search bar and expect it to return a meaningful result. That boss level of information would only be gotten in the deep web.

Instead, you would locate this data by going to the public library’s official website and use their own search bar.

The sole reason regular search engines can’t provide you with this data is simply because there are no links. 

how indexing works

Google’s indexing system starts with a process known as “crawling.”

Visualize a virtual robot insect that begins at the home page, then crawls to and back from all the pages on the same site that are accessed by clicking on the links.

Google then examines the entire data and renders the content of the site to send to Google’s index servers. Google then builds the data by context and enters each one into a base of algorithms.

the surface web

Just like the movie "Aquaman", the surface world is known and beautiful.This is your normal, etc. But the wonders that lie below it are breath-taking.

Food for thought

Far past the boundaries of Google-able information is every sort of information you can think of. It accommodates a wide array of data and information, from unlisted videos and articles that are blocked in certain countries to the inner-dashboard of your very own bank account just after you log in to password-protected, private websites.

Below the “surface web”, there are thousands of possibilities. You just have to find them.

the dark web

The dark web is probably what you might have thought the deep web was if you saw it on TV or read about it in a newspaper... But always recall, the deep web and the dark web are two distinct things.

Though these two have always been used interchangeably, the deep web — comprises of mostly harmless data and digitized records, while the dark web — has raised concern around the world about criminal activity.

Accessing the deep web and the dark web

Common web browsers can’t access the dark web. The dark web makes use of what’s called; The Onion Router service protocol. Tor 'in short'  — can't be detected by search engines and help give users complete anonymity while surfing the web.

When you visit the dark web, you’re not in any way in the interconnected servers you normally interact with. Instead, all things stay internal on the Tor network, providing privacy and security to all users equally.

Because of these reasons, the dark web is home to things that don’t wish to be found.

Note: Dark web website addresses end with .onion instead of .com for example.

Consider this image:
Accessing the deep web and the dark web

The deep web vs the dark web

what's on the deep web?

The deep web carries the searches that are invisible to search engines. Here are a few examples:

  • The content of your online banking accounts
  • The content of your personal email accounts
  • The content of your social media accounts
  • Data that companies store on their private databases
  • Legal documents
  • User-to-user communications on any social media, messaging platforms, chat services etc.
Lots of contents that exist on the deep web carries information that you probably wouldn’t wish to come up in a web search — like your account information and details — because it’s private and might be misused.

If you have to log in to any account, the information you access in that account is on the deep web.

That’s a good thing since the deep web helps protect your personal information.

What's on the dark web?

The dark web runs with a very high level of anonymity. It entertains harmless activities and content, as well as criminal ones.

For example, the dark web could very well include a site that provides complex riddles. Another could be a kind of book club that gets eBooks to look more professional. Another could also offer a forum for individuals who believe free speech is threatened.

The dark web is however known for dark content like illegal and disturbing content. Here’s are examples of illegal contents you can find on the dark web.

  • Stolen information and data: In cases of a data breach, there’s a high probability the accessed information — from bank card numbers to Social Security numbers. — will show up on the dark web's market.
  • Disturbing and dangerous contents: Things like hitmen-for-hire, gores, human trafficking, child pornography, counterfeit goods, body parts, illegal drugs and illegal guns for sale can all be found on the dark web's market.
How come users can do business on the dark web without being traced? Financial transactions are mostly done with Bitcoin, the cryptocurrency that assures buyers and sellers complete anonymity.

How to access the dark web

Getting into the dark web is a lot simpler than you might think. What you gotta do is download a dark web browser, just like the Tor browser.

Once you finish installing this browser on your system, it operates just like any other regular browser: type in any URL, and access it.

However, you can't easily find the material you’re looking for on the dark web. It doesn't work the way using search engines like Google works. The dark web has no ranking system or index to help you find what you need.

Instead, you can use darknet search engines. One known as the Uncensored Hidden Wiki largely suggests some guidance to content on the dark web, including illegal websites.

Surfing the dark web can be harmful

  • Webcam hijacking: A site on the many corners of the dark web may try to get a remote administration tool — also called “RAT” — onto your system. That can allow someone to hack into your webcam — essentially, giving them access to your camera lens.
  • Viruses: Some websites tend to infect your system with viruses, and there are many types of viruses to be on the lookout for. Remember to never download stuff from sites you don’t trust.


Both the deep web and the dark web offer an extent of anonymity and privacy.

The deep web protects your private information. But in a case that you access your online bank account, it’s not completely private. The bank knows.

The dark web on the other hand function on the policy of total anonymity. Whatever you do in there is your business. With some precautions, what you do there can’t ever be tracked or traced to you by anyone or organisation.
Web technologies are growing very fast both in number and in developments. In fact, individuals and businesses are finding it hard to keep up with the speed.

6 New Software Development Tools Coming in 2019

When new software development tools emerge, usually the old ones become gradually obsolete because new ones come with new and useful features. Therefore businesses should focus on new developments despite the cost involved in them because they tend to improve the efficiency of the site, user interaction and bring nicer looking interfaces.

In this case, here is a list of new and top software development tools that you should look forward to use in 2019;

1. Netbeans

NetBeans is a popular software development tool that is not only an open source but is also a free tool that is written in Java. NetBeans is useful when developing superlative desktop, mobile and web applications using Java, PHP, and C++ technologies.

This tool is very easy to use and therefore can develop an application within a short time. The good thing about NetBeans is that it is compatible with any operating system such as Solaris, Linux, Windows and Mac OS among others.

Its key features include writing bug-free code, smart code editing, quick user interface development, and easy management process. Being a Java application, you can be assured that you will easily update to its 2019 edition when it comes.

2. Ionic 2

Most people think that Ionic 2 is a tool for developing mobile apps, but they do not know that it is among the top software development tools you cannot miss in 2019. It is very useful when developing native and web optimized apps.

The good thing about this tool is that it is an open source tool and is free to use. Ionic 2 uses one code base regardless of the number of platforms, comes with high-end plugins and built-in push notifications, coded in angular, and has reliable community support such as StackOverflow and Slack.

3. Vue.Js

Vue.js is a part of Java Library that together with other tools combined forms a framework that is very useful in building web interfaces.

The tool came into the surface for the first time in the year 2013 and currently has acquired more than 84,000 Github stars leaving numerous tools behind. Since its establishment, the tool has progressed significantly whereby developers keep on adding new useful features for the better user interface.

One great thing about Vue.js is that it does not have the pedigree and therefore has very little baggage. It is like an update of development tools such as Angular and Reacts as it corrects all the errors that came with these two tools before they brought their newest versions.

4. Bootstrap

Bootstrap is another free and open source software development tool that is very useful when developing mobile-first projects and responsive websites.

The tool applies HTML, CSS and JS technologies to develop software. Bootstrap is highly recommended when you are designing a simple website because it will help you to do it faster based on the fact that it is very easy to use. Some of the good features of Bootstrap is the fact that you can customize everything based on your need, comes with many built-in components for easy development and there is an aspect of guaranteed consistency for all developers and users.

5. NPN

NPN can be defined as the package manager for Nodes in JavaScript, making it easier for web designers to discover different re-usable codes that can be assembled in a better way and be more expedient.

The tool has been used by many web developers as a command-line utility to assist in interaction with package repositories. NPM has more than 15,000 stars on Github. The key features for this tool include code discovery and re-usage, availability of more than 470,000 free code packages and the ability to manage private and public code on the same registry.

6. Typescript

TypeScript is an open source and free software development tool that is very useful in scripting language during web development. Unlike the strict syntactical superset of JavaScript, this tool allows the developer to add customized static typing.

This tool is very convenient for people who are developing large applications. TypeScript has more than 31,000 tools making it a front-end solution for language scripting in web development. The good thing about this tool is that you can use it in any system that JavaScript is running on because it is also compatible with other JavaScript libraries.

Software development tools will always be produced, and if new ones are not developed, the older ones will keep being updated to better versions, making them as good as new. The list above will help you when shopping for web development tools in the year 2019.

Author: Adrian Rubin

Adrian Rubin is an American photographer and story writer who gained his interest in graphics through playing video games when he was young. Apart from writing stories and taking photos, Adrian Rubin loves travelling and animals which makes him a humanitarian.

Wanna carry your Linux everywhere you go? It'll be a good idea to learn how to install Kali for Android phones.

How to Install Kali Linux on Android

Kali can be called a penetration testing Linux distro used by cryptographers and digital forensics. If you have no prior knowledge on this OS, you might wanna refer to HOW TO INSTALL KALI LINUX ON A SYSTEM since I've already broken it all down as well as installation tutorial on computers.

Penetration testing entails making use of a variety of tools and techniques in testing the limits of security procedures and policies. These days more apps are made available on the Android OS for smartphones and tablets every day, so it becomes somewhat worthwhile to have Kali Linux on your smartphone.

Unlike the Computer installation, follow the below steps closely and you'll find the android installation pretty easy


  • Android version 2.0 or higher
  • Full battery life
  • Nothing less than 5Gb of memory space (both internal and external)
  • A strong internet connection
I believe you have the above specs so let's continue; Rooted Android phones are required for this to work, so lemme start there:

1. Rooting Your Android Phone

Left to me I'd say have your phone rooted by an expert because a little mistake on your part might screw up your phone. However, if you can do it, what you first need to do is back up your phone data.

When that is done, go activate EOM unlocking and USB debugging in the smartphone's developer settings.

When the above steps are completed, head over to the Google developers site and download Android SDK tools and install it in a default directory. Or you can install it anywhere you can remember.

Uncheck everything in the displayed tab, then click to install two packages.

Note that this step is only for those with unrooted Android.

Install By Accepting Licenses

Find your way to your Android phone's manufacturer site and install the device drivers. Make sure the bootloader is unlocked.

Note that certain devices will ask you for an unlock key. Restart your Android to fastboot mode (done by pressing volume up+power on most devices).

Open a command prompt on your personal computer.

If your device requires a code, copy and paste it on your manufacturer's website. After the website form is submitted, you'll receive an email from your device manufacturer that contains a file, key and other necessary instructions for rooting your smartphone.

Get Kingo Root

How to Install Kali Linux on Android
Go and download the KingoRoot app from google play store. If you don't find it, a little google search will fix you. Install the application and make certain your phone is connected to your personal computer. 

Enable the debugging stuff in your Android and root your device.

2. Set up Linux deploy for Kali

How to Install Kali Linux on Android

NOTE for this procedure: Your Android phone should be rooted or have near you a rooting guide for your phone brand.

Download and install Linux deploy application from Google play store. Click on the download icon and select Kali distributions in the distributions tab.

Choose your installation type and location as well. You may decide to stick with the default settings but I recommend configuring up the deployment app yourself.

3. Installation

After configuring all the necessary stuff: You can go ahead to build the Kali image by pressing the install button at the top of the screen. This should take less than 5 minutes depending on your internet speed.

Installation boots a Kali Linux bootstrap directly from the Kali repository. By now Kali Linux is successfully installed.

4. VNC viewer app(optional)

Go download the VNC viewer app from google play store.

Now the steps to configure your VNC:

  • set Address to localhost 

  • set name to kali

When you must have finished the above steps, press the connect button and you'll find your Kali running on your Android.

How to Install Kali Linux on Android | installationThe Kali installation is prebuilt with a VNC or SSH server thus dropping the need to download one. So this step is optional.

5. The CHROOT mode

How to Install Kali Linux on Android | Chroot mode
Now you're done with the installation, let the Linux deploy mount and load your Kali Linux chroot image automatically. 

This step also means the start-up of SSH and VNC  servers to enhance easier remote access. Press the START symbol and this process will begin.

Note the IP address of your device. You'll be using it to log in to your kali session.

log in to chroot mode

Either use the SSH or VNC client to get yourself into your kali. The default VNC setup will be as follows;

  • username: android

  • Password/key: change

Important stuff you need know on using Kali Linux on Android

Linux deploy normally allocates 4GB of image size for a naked installation of kali. It is recommended you reconfigure the settings of the image size at the Linux deploy in case you need to install more utilities that might require huge space.

You might wanna check out how to use your Android as a security camera