Senin, 31 Agustus 2015

How to recover deleted Contacts from Samsung galaxy note 5/4/3/2

Agustus 2015 - The Acer Swift 3 is a near-perfect laptop for those who want an ultraportable, but don’t want to fork out £1000+. Build quality is great, battery life very good, and performance a match for much more expensive laptops. There are just two areas where the low price shows. First, it's a little thicker and heavier than some ultrabooks. It looks good enough, but limited maximum brightness and fairly poor colour reproduction limits its usefulness in certain situations. done a pretty good, well we have collected a lot of data from the field directly and from many other blogs so very complete his discussion here about Agustus 2015, on this blog we also have to provide the latest automotive information from all the brands associated with the automobile. ok please continue reading:

Samsung Galaxy Note 5 Overview

According to the Samsung official announcement, “Bigger has always been better. Galaxy Note proved that time and again. It also changed the entire game with S Pen. A versatile tool for ideas, goals and dreams. This time it's Galaxy Note5. The most powerful and beautiful version to date. ”

Indeed, Samsung galaxy Note 5 is one of the most anticipated phones. The galaxy note 5 measures 153mm x 76mm x 7.6mm with 5.7-inch display. Besides, its specs include an Exynos 7420 SoC, 4GB of RAM, 32GB of storage, 16MP rear camera and a 5MP front-facing camera, up to 4K video resolution, runs android 5.1.1 and no micro SD card. You might get ready to switch a new Samsung galaxy phone, right? The note series is good option. Before doing this, take good care of your phone and backup old Samsung data.


Contacts Lost on Samsung galaxy Note 5/4/3/2


Well, let's get down to the main topic: How to recover deleted contacts from galaxy note 3/4/5 etc. Commonly, contacts automatically stored on the phone internal memory, it is not easy to restore Samsung contacts. If by any chance that you lost Samsung contacts, don’t worry either. The purpose of writing this post is going to tell you two simple solutions to do Samsung note contacts recovery.


Option 1. Recover lost contacts from galaxy note 3/4/5 from Backup


This is a way to recover your contacts only if you’ve previously backed them up.
- From display options: On your galaxy note, tap “Contacts”-> click “Menu” icon-> “Settings”->”Contacts”->”Contacts to display”-> tap “All contacts”. That’s it. Just go back to check the “Contacts”. (note: make sure your contacts are visible.)
- From Google. If you have saved your contacts to your Google, then you can restore in this way: On your phone, go to “Apps”->scroll to and tap “Settings” -> Tap “Accounts” ->”Add account” -> “Google”-> click “Existing”-> enter your google account ad tap “Next” icon-> tap “OK”-> “Next”.
- From Memory Card. From home screen, go to “Contacts” -> “Menu” -> “Settings” ->”Contacts” -> “Import/Export contacts” ->”Import from SD card” -> choose the account to which to want to save your contacts -click “Import vCard file” -> “OK”




Option 2. Retrieve deleted contacts from galaxy note with Android Recovery


Failed to restore contacts from Samsung ? Or you don't have backups available? Its OK, read the following solution, you can easily recover deleted/lost contacts from Samsung galaxy note 3/4/5 without needing of backup.

- Download and install a reliable Samsung galaxy note contacts recovery tool, like Jihosoft Android recovery is a option to do this. You can get it by clicking here.
- Make your Samsung note and computer connected.
- Start Jihosoft Android recovery, and select the “Database” option to continue.
- Enable USB debugging to let this program access your phone.
- After your device is identified, click “Start” to scan. It takes a few seconds for the scanning. Just wait patiently.
- Preview both deleted and existing contacts on your Samsung galaxy note.
- Tap “Recover” button to save the found contacts to your PC/Mac.




More about Jihosoft Android Recovery
Jihosfot Android Recovery is dedicated to recover data from android. Files like contacts, as well as text messages, photos, call logs, videos, and more can be restored directly with ease. What’s more, this software can only work on recovering the contacts that haven’t been overwritten by new data. Any new content added later can make the lost contacts overwritten and unrecoverable. Thus, you are suggested to stop using your galaxy note once the contacts lost.


You may be interested in :
Recover Deleted/Lost Data on Samsung Galaxy Note 2/3/5
How to Recover SMS, Contacts, Photos, Videos from Samsung Galaxy Note 5

FAIRVIEW: Collecting foreign intelligence inside the US

Agustus 2015 - The Acer Swift 3 is a near-perfect laptop for those who want an ultraportable, but don’t want to fork out £1000+. Build quality is great, battery life very good, and performance a match for much more expensive laptops. There are just two areas where the low price shows. First, it's a little thicker and heavier than some ultrabooks. It looks good enough, but limited maximum brightness and fairly poor colour reproduction limits its usefulness in certain situations. done a pretty good, well we have collected a lot of data from the field directly and from many other blogs so very complete his discussion here about Agustus 2015, on this blog we also have to provide the latest automotive information from all the brands associated with the automobile. ok please continue reading:

(Updated: September 7, 2015)

On August 15, The New York Times and Pro Publica published a story in which the big US telecommunications company AT&T was identified as a key partner of the NSA.

Interesting details about this cooperation and the cable tapping were already in the 2008 book The Shadow Factory by James Bamford, but with the new story, also a number of clarifying documents from the Snowden-trove were disclosed.

Among them are some powerpoint presentations that contain the slides which had been shown on Brazilian televion two years ago. They were first http://eyqabasyirah.blogspot.com /2014/01/slides-about-nsas-upstream-collection.html">discussed on this weblog in January 2014.

Here we will combine these new and old documents to provide a detailed picture of this important collection program, that was previously misunderstood on various occasions.





The AT&T switching center at 611 Folsom Street, San Francisco,
where there's a cable access under the FAIRVIEW program
(Photo via Wikimapia - Click to enlarge)

 

Context

At NSA, the division Special Source Operations (SSO) is responsible for collecting data from backbone telephone and internet cables. For that, SSO also cooperates with private telecommunication providers under the following four programs, which are collectively referred to as Upstream Collection:
- BLARNEY (collection under FISA authority, since 1978)
- FAIRVIEW (cooperation with AT&T, since 1985)
- STORMBREW (cooperation with Verizon, since 2001)
- OAKSTAR (cooperation with 7 other telecoms, since 2004)*

Before the new revelations, it was often assumed that BLARNEY was the program for NSA's cooperation with AT&T. The Wall Street Journal reported this in August 2013, based upon former officials, saying that BLARNEY was established for capturing foreign communications at or near over a dozen key international fiber-optic cable landing points. This assumption was also followed by Glenn Greenwald in his book No Place to Hide from May 2014.

In a letter to Cryptome, James Atkinson suggests that BLARNEY was the covername for cooperation with AT&T since 1978, and that after the Bell break-up, BLARNEY stayed active for FISA collection, and the new covername FAIRVIEW was created for the "new" AT&T. One new slide however, shows that BLARNEY actually encompasses all (over 30) companies that are cooperating for FISA collection, including of course AT&T and Verizon.


Speculations

The assumption that BLARNEY was the program for AT&T left room for speculation about the purpose and scope of the FAIRVIEW program.

For example, former NSA official and whistleblower Thomas Drake told DailyDot.com in July 2013 that FAIRVIEW was for tapping into the world's intercontinental fiber-optic cables and "to own the Internet". According to Drake it was an umbrella program with other programs, like BLARNEY, underneath it.

Similarly speculative was Bill Binney, also a former NSA official who left and became a whistleblower in 2001. On multiple occasions he said that a map showing the FAIRVIEW tapping points proofs that NSA collects "content and metadata on US citizens" because those collection points are spread across the country:



Slide from an NSA presentation as shown on the Brazilian
television show Fantástico on September 8, 2013


The new revelations by The New York Times and Pro Publica have now shown that the explanations by both Drake and Binney were misleading: FAIRVIEW is neither an overarching internet tapping program, nor is it collecting communications of US citizens.


Cover names

Closest to the truth came NSA historian Matthew Aid, who in an article by The Washington Post from October 2013, said that STORMBREW is the NSA alias used for Verizon, while FAIRVIEW stands for AT&T.

That's the right connection, although STORMBREW and FAIRVIEW aren't the cover names for these companies themselves, but the code words for the programs under which NSA cooperates with these telecoms.

The cover name for AT&T itself (at least under the BLARNEY program) is probably LITHIUM and for Verizon ARTIFICE. Cover names for other, but yet unidentified US telecoms are ROCKSALT, SERENADE, STEELKNIGHT and WOLFPOINT - their actual names are in the Exceptionally Controlled Information (ECI) compartment WHIPGENIE (WPG).

Although Snowden seems to have had no access to that ECI compartment, reporters for Pro Publica were able to identify both companies based upon various details found in the NSA documents about the STORMBREW and FAIRVIEW programs.

  Legal authorities

The actual purpose of FAIRVIEW can be learned from an NSA presentation, which clearly says the program is for collecting communications of foreign targets at collection points that are inside the United States. Two other excerpts say that FAIRVIEW is also used for current and future "cyber plans", which probably include searching for malware signatures.

All this happens under three different legal authorities, and for each there's a different http://eyqabasyirah.blogspot.com /p/sigint.html">SIGINT Activity Designator (SIGAD):
Traditional FISA:
- Communications of persons being agents of foreign powers or connected to international terrorist groups
- Individualized warrant needed from the FISA Court
- Internet traffic only (SIGAD: US-984T)

Section 702 FAA:
- Communications of foreigners/with one end foreign
- Must be justified under an annual FAA Certification
- All kinds of internet traffic (SIGAD: US-984XR)
- Telephone traffic (SIGAD: US-984X2)

Transit Authority:
- Communications with both ends foreign
- No external approval required
- Internet traffic: only e-mail (SIGAD: US-990)
- Telephony: according to "Directory ONMR" (SIGAD: US-990)

For collection under Transit Authority, the presentation says that communications "must be confirmed foreign-to-foreign", which is ensured by filters at the actual tapping points (see stage 1 of the dataflow, down below).

These filters only forward authorized traffic to the selection engines, which then pick out the communications that match with strong selectors, like e-mail addresses, phone numbers, etc. These selectors are entered into the system by analysts using the tasking tools UTT, CADENCE (for internet) and OCTAVE (for telephony).

Examples of such selected, authorized traffic can be seen in a number of slides that were shown in a Fantástico report from July 9, 2013. They are from a presentation that has not yet been released. These slides contain maps, which show the amount of internet traffic to countries like North Korea, Russia, USA and Iran, as seen on March 4-5, 2012.
Scroll here > 

In the first slide we see for example internet traffic (DNI) to USA, which has been determined to be foreign-to-foreign and may therefore be collected under Transit Authority. As such, front-end filters forwarded this traffic to the selection engines for further filtering.



The slide below has a map showing the internet traffic to USA, which is eligible for collection under FAA authority:



The next slide shows a list of "Top 20 USAi domains (.pk)" which where tracked between February 15, 2012 and March 11, 2012:



A map representing "1 Day view of authorized (FAA ONLY) DNI traffic volumes to North Korea within FAIRVIEW environment", which means internet traffic which is authorized for collection under FAA authority:



Next is a list op "Top 20 North Korean domains (.kp)" which where tracked between February 15, 2012 and March 11, 2012. Note that only two websites generate notable traffic, all other have less than 1 Kbps:



A map showing internet traffic to Iran, which is eligible for collection under FAA authority:



A map showing internet traffic to Russia, which is authorized for collection under Transit authority:




Determining what traffic is foreign is done by filtering based upon telephone country codes and internet IP addresses. For telephony this is quite reliable, but particularly for internet traffic, the speaker's notes for another NSA presentation admit that it is difficult to proof the foreigness. Therefore, it is occasionally discovered that one end of an intercept is actually in the US, which then has to be reported as a "domestic incident".

  Tapping points

One of the most interesting new documents is an NSA presentation from 2010 about the Corporate Partner Accesses, which has the map for the FAIRVIEW program with all the domestic dots, but this time with the explaining legend:




From the legend in combination with the dots on the map, we learn that under the FAIRVIEW program, NSA at that time had access points at the following parts of the AT&T network:
- Peering Link Router Complexes (8)
- VoIP Router Complexes (26, planned: 0)
- Hub VoIP Router Complex (1, planned: 30)
- Program Cable Stations (9, planned: 7)
- Non-Program Cable Stations (0)
- RIMROCK 4ESS Circuit Switches (16)
- Program Processing Site (1)

One important thing is that most of the markers inside the US do not represent traditional cable tapping points like those along the borders, but are current and planned accesses to Voice over IP communications. Here's some explanation about the other types of access points too:

Peering Link Router Complex
NSA has 8 access points at AT&T Peering Link Router Complexes. According to Pro Publica they correspond to AT&T's Service Node Routing Complexes (SNRCs), where other communication providers connect to the AT&T backbone through OC-192 and 10GE fiber-optic cables. For NSA, this means they can catch traffic from those other providers too. This backbone access is codenamed SAGURA or SAGUARO. The 8 facilities are in:
- Seattle
- San Francisco
 - Los Angeles
- Dallas
 - Chicago
- Atlanta
 - New York City
- Washington DC
It was this kind of access point that was/is in Room 641A in San Francisco, as was exposed by Mark Klein during a lawsuit in 2006. Klein told that the equipment in room 641a was installed early 2003, which could fit the turning on of "a new DNI (Digital Network Intelligence) collection capability" in September of that year.

VoIP Router Complex
The largest number of active access points, 26, are at VoIP Router complexes, which are apparently used for routing voice communications over IP networks, like the internet. No new accesses of this kind were plannend, but expansion seems to be in the next category:

Hub VoIP Router Complex
In the map from 2010 we see only one active access at a Hub VoIP Router Complex, which is somewhere near New York City (maybe in Florham Park, NJ, where AT&T has a data warehouse and its laboratory?). Access to VoIP communications was clearly seen as something that needed expansion, as 30 locations are marked as a planned access point. Unfortunately, no documents have yet been released about this effort.



Map of the US internet backbone network of AT&T in 2009
(Source: AT&T brochure - Click to enlarge)



Program Cable Station
At the time of the presentation, there were 9 AT&T cable stations with a tapping facility, and another 7 for which that was planned. For an article on Pro Publica, it was found out that 9 of these active and planned stations in the continental US correspond to cable landing stations owned by AT&T.
There are also two active and five planned accesses at cable landing points which are probably located in Hawaii and Puerto Rico. Some of the active facilities are in:
- Nedonna Beach, Oregon
- Point Arena, California
- San Luis Obispo, California
- Tuckerton, New Yersey
- West Palm Beach, Florida

RIMROCK 4ESS Circuit Switch
These facilities refer to a 4ESS switch, which is used for long-distance telephone switching. Approximately 100 of these switches are operated by AT&T, but according to the map, only 16 of them have a tapping facility codenamed TOPROCK. Except for two, they are situated along the US border, so seem to be for collecting (the metadata of) in- and outgoing phone calls. These sites appear to be in or near:
- Seattle
- Spokane
- Sacramento
- Los Angeles
 - San Diego
- Albuquerque
- San Antonio
- Lansing
 - Atlanta
- Pittsburgh
- Buffalo

 - Kingston
- Hartford (2)
- New York City (2)


Program Processing Site
Finally, there's one centralized Program Processing Site, which is codenamed PINECONE. The map indicates that it's situated somewhere near the AT&T cable landing station of Tuckerton in New Jersey.



The AT&T intercontinental cable landing station in Tuckerton, New Jersey,
which got a fake facade when residences were build around it.
(Photo: Bing maps - Click to enlarge)


  Dataflow

Seen for the first time is an NSA presentation from 2012 with five diagrams showing the dataflow for the various collection methods under the FAIRVIEW program. There are diagrams for:
- Transit internet content (US-990)
- Transit internet metadata (US-990)
- Transit telephony metadata and SMS (US-990)
- FISA e-mail content (US-984T)
- FISA internet content (US-984T)

There are no diagrams for FAIRVIEW collection under the authority of section 702 FAA.



Dataflow for internet content collected under the
FAIRVIEW program under Transit Authority
(Click to enlarge)



These diagrams show that processing the data from tha various collection points takes places in 3 different stages at 3 different locations:
1. Access and processing at the partner company
2. Site processing in a central secure facility
3. Processing and storage at NSA headquarters

Here's a description of what roughly happens during these 3 stages:


1. Access and processing at the partner company

In the first stage, AT&T provides access to internet and telephone cables and does some filtering and processing right at the various tapping points:
- For the internet collection, we see that the traffic is split at the switches where AT&T's own accesses, as well as peering partner's cables connect to the AT&T Common Back Bone (CBB).

This duplicated traffic goes to one or more routers, where "Foreign IP Filtering" takes place to select foreign and discard domestic traffic. The remaining data stream is then sent over to the central processing facility of the second stage, probably over OC-48 links of 2,4 Gbit/s. The same happens with traffic from other cable access points codenamed MESA.

It was this kind of installation that Mark Klein discovered in Room 641A in the SBC building in San Francisco in 2006. Many people assumed that in this way, NSA was able to store everything that runs over those cables, including American's communications, but now we know that filters ensure that only foreign traffic is sorted out for further processing.
Update:
Klein also testified that in room 641A there was equipment from Narus, which can be used to sessionize and filter data streams, but this is not seen in the diagrams. Maybe, after the exposure of room 641A, NSA moved that kind of equipment from the actual AT&T tapping points to the centralized processing facility codenamed PINECONE.

According to an NSA glossary, there are tens of thousands access links to the AT&T Common BackBone, which "would make 100% coverage prohibitively expensive". Therefore, NSA's Operations and Discovery Division (ODD) worked with AT&T to rank the access routers, and (only?) 8 router uplinks were deemed of high SIGINT interest and subsequently nominated for monitoring.

- Telephone metadata under Transit Authority are collected from Foreign Gateway Switches and "ATPs", by a "CNI [Calling Number Identification] & Call Processor" in facilities codenamed TOPROCK. These metadata are also sent over to the central processing facility of the second stage.


One of the doors to room 641A in the building of AT&T in San Francisco,
where there's an access point to the AT&T Common BackBone


2. Site processing in a central secure facility

The second stage comprises processing which takes place at a central location, in a highly secured building, a Sensitive Compartmented Information Facility (SCIF), which for the FAIRVIEW program is codenamed PINECONE. The equipment there is partly controlled by the partner company and partly by NSA.

Processing data from the many tapping points under the FAIRVIEW program at one central facility is only possible when already large amounts have discarded during the first stage. The remaining data stream is probably sent (unencrypted) to PINECONE over dedicated links within the AT&T network.
- Internet data arrive at IP Routers (IPRs) and via IP Processors (IPPs) go to an "Information Media Manager Distribution Box". Internet metadata then go directly to MAILORDER. This device sends them to NSA headquarters (NSA-W), where they are received by another MAILORDER box.

Until now, MAILORDER was known as a tool for transferring data, but now it becomes clear that MAILORDER is also the device that encrypts the data so they can be transmitted safely from the PINECONE facility to NSA headquarters.

Before going to MAILORDER, internet content has to pass another box codenamed COURIERSKILL/CLEARSIGHT. This device also gets an input from the CADENCE tasking tool at NSA headquarters: the selectors for filtering.

Therefore, COURIERSKILL/CLEARSIGHT is the device that sorts out the communications that match the e-mail addresses and other identifiers as requested by NSA analysts. For e-mail collection under FISA authority, this filtering is done (directly) by XKEYSCORE.

After passing GATEKEEP, which could be some kind of access control system, the filtered internet content of interest goes to MAILORDER to be sent over to Fort Meade.

- Telephone metadata and SMS messages also pass an "Information Media Manager Distribution Box", which is connected to an unknown device marked NGTPD. Via MAILORDER, these data too are sent over to NSA headquarters.

3. Processing and storage at NSA headquarters

In the third and final stage, which is at NSA headquarters, the data from the central processing facility PINECONE arrive at a MAILORDER box, which is on the FAIRVIEW Local Area Network (LAN) codenamed HIGHDECIBEL.

From this LAN, the data are sent to NSA's core corporate network, again via secure MAILORDER transmission, to be stored in the various and meanwhile well-known databases, like PINWALE, MAINWAY, MARINA, FASCIA and DISHFIRE.
- Internet content first passes FISHWAY, which is a "Data Batching & Distribution System", and then SCISSORS. The latter was first seen in the earliest PRISM slides, and is a "Data Scanning, Formatting & Distribution System", as we learn from this diagram.

Raw internet content and e-mails collected under FISA authority are stored in the RAGTIME partition of the PINWALE database and are classified as TOP SECRET//SI-ECI RGT//REL [...].

- Internet metadata first pass FALLOUT, which is an internet metadata ingest processor/database, while telephone metadata and SMS go to FASCIA, which has the same function for this type of data.



Overview of the numbers of data collected under the FAIRVIEW program
(Click to enlarge)

  Results

According to one of the newly disclosed NSA documents, the internet access under the FAIRVIEW program was initially used only for collecting e-mail messages. In 2003, this resulted in more than one million e-mails a day being forwarded to the keyword selection system at NSA headquarters.

This number had risen to 5 million a day in 2012, which remained after applying some kind of "3 Swing Algorithm" to 60 million foreign-to-foreign e-mail messages that were captured by FAIRVIEW every day under Transit Authority - according to the speaker's notes for an NSA presentation from 2012.

Again we see a huge amount of data passing (which in de documents is called "captured" by) the FAIRVIEW tapping points, but that filters only select a small part which is then forwarded to the NSA for further selection. The 5 million e-mail messages a day in 2012 made 150 million a month and 1,8 billion a year.


BOUNDLESSINFORMANT

The most recent numbers of the data collected under FAIRVIEW can be derived from a chart from the NSA's BOUNDLESSINFORMANT tool, which was published in May 2014 as part of Glenn Greenwald's book No Place to Hide:




During the one month period between December 10, 2012 and January 8, 2013, exactly 6.142.932.557 metadata records were counted for collection under Transit Authority, which for the FAIRVIEW program is denoted by the SIGAD US-990.

This means the numbers for FAIRVIEW collection under FISA and section 702 FAA authority are not included in this chart. But in those cases, only communications related to specific e-mail addresses or similar identifiers are collected, which results in far smaller numbers: according to a 2011 FISA Court ruling (pdf), Upstream collection under section 702 FAA resulted in just 22 million "internet communications" each year.

The over 6 billion records for FAIRVIEW account for only 3,75% of the http://eyqabasyirah.blogspot.com /2014/06/some-numbers-about-nsas-data-collection.html#ssocollection">total number of data the NSA collects through its cable tapping programs, which is remarkably small given the large number of access points at major internet cables and switches.


Tech details

In the lower part, the pie chart shows that under Transit Authority, roughly the following number of records were counted for FAIRVIEW:

- 87% or 5,3 billion: Personal Communications Services (PCS, cell phone, etc)
- 2% or 122 million: Mobile communications-over-IP (MOIP)
- 8% or 488 million: Public Switched Telephone Network (PSTN)
- 3% or 183 million: Internet communications (DNI)

As reflected by the bar chart, the overwhelming majority of data come from foreign-to-foreign telephone communications, mostly from cell phones. Because there's no dataflow diagram for the content of phone calls, it's possible that this is only telephone metadata and SMS messages.

Only about 3% comes from foreign-to-foreign e-mail messages, for which some 183 million metadata records were counted. This number comes close to the roughly 150 million e-mails a month that were processed in 2012, which could indicate that one metadata record equals one e-mail message.

The technology used to process 97% of these data is called FAIRVIEWCOTS, which could be a combination of the program's codename and the abbreviation COTS, which stands for Commercial-Of-The-Shelf equipment. Only nearly 3%, so probably the e-mail traffic, is processed by a hitherto unknown system codenamed KEELSON. Finally, a tiny number also went through SCISSORS.


Product reports

After the data have been collected and stored, analysts go through it, looking for useful intelligence information and put that in so-called product reports. A slide from a 2012 presentation about SSO's Corporate Portfolio, shows the Top Ten programs based upon the product reports that were prepaired during the fiscal year 2010-2011:




We see that with 7357 product reports, US-990, which is FAIRVIEW collection under Transit Authority, ranks as the second most productive source. However, 4 times more reports came from collection under section 702 FAA, which is not only derived from PRISM, but also from the STORMBREW and FAIRVIEW programs.

Although below the program ranking first, there are not very big differences in the numbers of reports, the chart still shows how focused FAIRVIEW collection must be: the 3,75% of the data it pulls in, is apparently so useful that it results in a big number of product reports.

From a different presentation, we have a similar diagram with the numbers for the fiscal year 2009-2010:



Cooperation

The FAIRVIEW map also mentions a close partnership with the FBI. Under the PRISM program it's the FBI that actually picks up the data at the various internet companies, but for Upstream collection, like under FAIRVIEW, that's not the case: here the NSA has a http://eyqabasyirah.blogspot.com /2014/04/what-is-known-about-nsas-prism-program.html#slide13">direct relationship with the telecoms.

This leaves the option that the FBI (just like the DEA and the CIA) is also a so-called customer of the program, meaning that the Bureau can request the collection of certain target's communications and access some of the data that NSA collected under FAIRVIEW.

  Domestic metadata

The newly disclosed documents about FAIRVIEW also provide some new details about the bulk collection of domestic metadata, which is considered to be one of the most controversial activities of the NSA. Somewhat unexpected is that for AT&T this happens under FAIRVIEW, instead of a separate program.


Internet metadata

An NSA document from 2003 seems to be about bulk internet data. It says that FAIRVIEW also collected "metadata, or data about the network and the communications it carries" and that for September 2003 alone, "FAIRVIEW captured several trillion metadata records - of which more than 400 billion were selected for processing or storage".

This doesn't really sound like AT&T handed over bulk metadata indiscriminately, but it would fit how it's described in the 2009 STELLARWIND-report (in which, according to Pro Publica, AT&T is mentioned as "Company A") about the collection efforts under the President's Surveillance Program (PSP):
"In order to be a candidate for PSP IP metadata collection, data links were first vetted to ensure that the preponderance of communications was from foreign sources, and that there was a high probability of collecting al Qaeda (and affiliate) communications. NSA took great care to ensure that metadata was produced against foreign, not domestic, communications"

It seems that at that time, AT&T did hand over massive amounts of internet metadata from its domestic infrastructure, but also made sure these were not about American communications.
Update:
The "internet dragnet", that is, the bulk collection of internet metadata of domestic communications under the authority of section 402 FISA (at NSA called PR/TT) was first approved by the FISA Court on July 14, 2004. That means, the 400 billion metadata collected under FAIRVIEW in 2003 were not yet part of the PR/TT bulk collection, and accordingly not domestic.

It is still remarkable that AT&T was able to forward 400 billion metadata records a month just from its foreign communications: in 2012, the http://eyqabasyirah.blogspot.com /2014/06/some-numbers-about-nsas-data-collection.html#volumes">total number of internet metadata that NSA collected worldwide was "just" 312 billion a month.

The 2003 document says these metadata were flowing to http://eyqabasyirah.blogspot.com /2016/01/section-215-bulk-telephone-records-and.html">MAINWAY, which appears to be not only for telephone records, but "NSA's primary tool for conducting metadata analysis" in general.* One of the dataflow diagrams also shows that internet metadata first flow into MAINWAY, and from there to MARINA, which is the repository for internet metadata:



Dataflow for internet metadata collected under the
FAIRVIEW program under Transit Authority
(Click to enlarge)


> See also: http://eyqabasyirah.blogspot.com /2016/01/section-215-bulk-telephone-records-and.html">Section 215 bulk telephone records and the MAINWAY database


Telephone metadata

About bulk telephone metadata there's an NSA document from 2011. It says that as of September 2011, FAIRVIEW began handing over "1.1 billion cellular records a day in addition to the 700M records delivered currently" under the Business Record (BR) FISA authorization, which refers to section 215 of the USA PATRIOT Act.

It was already known that the major US telecoms handed over their metadata records of landline telephone calls, but here we see that AT&T also started doing so for cell phone calls.

And for the very first time we also have some numbers now: the total of 1,8 billion a day provided by AT&T make 54 billion a month and about 650 billion phone records a year. For comparison, in 2012, NSA's regular foreign collection resulted in a http://eyqabasyirah.blogspot.com /2014/06/some-numbers-about-nsas-data-collection.html#volumes">total number of 135 billion telephone records a month and 1,6 trillion a year.

The mobile phone metadata provided by AT&T were fed into the MAINWAY database to be used for contact chaining in order to "detect previously unknown terrorist threats in the United States". Before these records were handed over to NSA, AT&T stripped off the location data, to comply with the FISA Court orders, that don't allow those data to be collected.

Apparently Verizon Wireless and T-Mobile US don't strip off these location data, so their cell phone records cannot be handed over to NSA, which therefore only gets less than 30% of the domestic telephone metadata.
 
Conclusion

The reports by Pro Publica and The New York Times stress AT&T's "extreme willingness to help" the NSA, which some people consider bad and scary. But maybe this very close cooperation helps to make data collection as targeted and focused as possible. Apart from the domestic metadata collection under BR-FISA, the relatively small numbers of data collected under the FAIRVIEW program, appear to contain a lot of valuable foreign intelligence information.

The fear was that under FAIRVIEW, large numbers of American's communications were sucked up by the NSA. However, the documents and diagrams show that there are filter systems that for collection under Transit Authority only let foreign-to-foreign communications through. Collection under section 702 FAA is already about foreign targets outside the US, while under FISA authority there's an individualized FISA Court order.

Interesting questions that remain are about the function of the rapidly growing number of VoIP collection points, as well as about the scope of the cyber security effort, and how in these fields, NSA tries to protect the rights of American citizens.




Links and sources
- Statement before the House Committee on the Judiciary on the FISA Amendments Act (pdf) (2016)
- Bruce Schneier: NSA's Partnership with AT&T
- Matthew Green: The network is hostile
- EmptyWheel.net: What’s a Little (or a Lot) Cooperation Among Spies?
- EmptyWheel.net: AT&T Pulled Cell Location for Its “Mobility Cell Data”
- Wired.com: AT&T Whistle-Blower's Evidence
- Atlantic-cable.com: History of the Atlantic Cable & Undersea Communications

Kabaddi Kabaddi first look and teaser out.

Agustus 2015 - The Acer Swift 3 is a near-perfect laptop for those who want an ultraportable, but don’t want to fork out £1000+. Build quality is great, battery life very good, and performance a match for much more expensive laptops. There are just two areas where the low price shows. First, it's a little thicker and heavier than some ultrabooks. It looks good enough, but limited maximum brightness and fairly poor colour reproduction limits its usefulness in certain situations. done a pretty good, well we have collected a lot of data from the field directly and from many other blogs so very complete his discussion here about Agustus 2015, on this blog we also have to provide the latest automotive information from all the brands associated with the automobile. ok please continue reading:

August 31, 2015: It was in news that the sequel to the well appraised movie of the year 2071, Kabaddi was under production six months before. Now it seems that they are near to the completion as the first teaser (both video and first look) are out today. The movie sequel, named Kabaddi Kabaddi, includes almost all of the actors/characters (including Dayahang Rai, Rishma Gurung, Buddhi Tamang, Bijay Baral) while Nischal Basnet seems to be there behind the scene only and Saugat Malla is the new hindrance for Kaji to get Soltini.
Apart from the funny dialogues and lively sequences, the movie is expected to have some politics play in it with not so dumb Kaji, unlike in the first part. Maya- the Soltini is still not convinced for the love that Kaji has offered but he has not given up to follow his dreams and so here is the first powerful dialogue from the movie. "Money attracts money, Love attracts love, tyo man le yo mon ko kura ekdin kaso nabujhla". 

The movie directed by Ram Babu Gurung is known to release this winter with the trailer meetup on Ashoj 4. Music of the movie is done by Kali Prasad Baskota (the maker of Jaalma from Resham filili). More details and preview when the trailer gets released. 

Here is the first teaser of the movie Kabaddi Kabaddi in Youtube.


How to fix and prevent iPhone 6 Overheating

Agustus 2015 - The Acer Swift 3 is a near-perfect laptop for those who want an ultraportable, but don’t want to fork out £1000+. Build quality is great, battery life very good, and performance a match for much more expensive laptops. There are just two areas where the low price shows. First, it's a little thicker and heavier than some ultrabooks. It looks good enough, but limited maximum brightness and fairly poor colour reproduction limits its usefulness in certain situations. done a pretty good, well we have collected a lot of data from the field directly and from many other blogs so very complete his discussion here about Agustus 2015, on this blog we also have to provide the latest automotive information from all the brands associated with the automobile. ok please continue reading:

In this post, you will find helpful tips, preventive measures and fixes for overheating problems with the new iPhone 6 and iPhone 6 Plus.

It's normal for iPhones to feel warm with prolonged use, when streaming videos, playing games, or downloading multiple apps simultaneously.

By design, iPhones including the latest iPhone 6 and 6 Plus can normally operate up to 35 degree Celsius and should never get hot to the point that it would be uncomfortable to handle. However, some users of the new iPhones especially those who are living in a place that gets warmer than 35 degree Celsius have reported an issue in which their phone is overheating. Apparently, the environment's temperature is to blame in this case. But there are also other cases of overheating issues that are not associated with extremely hot environment.

If you are one of those who are experiencing this same problem, we've listed some helpful workarounds to help you deal with it.

You will know if your iPhone 6 is overheating when you are getting a message prompt saying, "iPhone needs to cool down before you can use it." If you are seeing this message, simply turn off your iPhone, place it in a cooler place and allow it to cool down for a few minutes or hours. By then it should function normally again.

Overheating can also be due to your iPhone case. Some third-party accessories like the case may prevent your iPhone from cooling properly as your iPhone's exterior functions a cooling surface. To ensure this is not causing the problem, try to remove the case, otherwise, try to use a different case and see if that fixes that problem.

If your iPhone gets extremely hot when charging or if it is plugged into anything, try to unplug it.

There are also some iPhone 6 features that may trigger the device to get extremely hot or overheat. Among these include Bluetooth, Location Services, and iCloud. Try to turn off or disable these features temporarily and see if the problem persists.

  • To disable Bluetooth, just go to Settings, and tap Bluetooth to toggle it OFF
  • To disable Location Services, go to Settings-> Privacy -> Location Services
  • To disable iCloud, go to Settings -> iCloud.

Others who have experienced overheating problem fixed it by restarting their iPhone. Here's how to restart your iPhone 6:

  • Press and hold the Sleep/Wake button until the red slider displays.
  • Drag the slider to turn the iPhone off completely.
  • Once the phone turns off, press and hold the Sleep/Wake button again until the Apple logo displays.

If your iPhone 6 still gets too hot, contact Apple Support and escalate the issue. It's possible that the problem is due to a faulty hardware or the device may be defective.

Hope this helps.

Check out our http://eyqabasyirah.blogspot.com /2015/08/Apple-iPhone-6-Troubleshooting.html" target="_blank">iPhone 6 Troubleshooting Page for more issues, fixes and troubleshooting guides on the new iPhone 6 device.

Minggu, 30 Agustus 2015

My Food Gaffes

Agustus 2015 - The Acer Swift 3 is a near-perfect laptop for those who want an ultraportable, but don’t want to fork out £1000+. Build quality is great, battery life very good, and performance a match for much more expensive laptops. There are just two areas where the low price shows. First, it's a little thicker and heavier than some ultrabooks. It looks good enough, but limited maximum brightness and fairly poor colour reproduction limits its usefulness in certain situations. done a pretty good, well we have collected a lot of data from the field directly and from many other blogs so very complete his discussion here about Agustus 2015, on this blog we also have to provide the latest automotive information from all the brands associated with the automobile. ok please continue reading:

I have written time and again about food, whether I am on a trip or just in my city. Most of you who are my regular readers will know that food is central to most of my travel writeups. THAT is how much I love to eat! Even though I am a BIG foodie, I suck at cooking. I mean, I cannot even cook to save my life!

The first time I decided to experiment in the kitchen was when I was still in primary school. One lazy Sunday afternoon when my parents slept peacefully, I could not control the rumble in my tummy. I was craving some fried potato chips. Not wanting to wake my parents or satiate my hunger with biscuits or chocolates, I nudged my sister to follow me in the kitchen. Once inside, I was the head chef and my little sister, the sous chef! Now, my mum had warned me against getting anywhere close to the gas stove. I too wasn't very confident with operating complex cooking tools. (I still can't use a cooktop properly! :-P ) So, I decided to use a candle! (smart science student me! :-P ) I took out one of those old birthday candles from the bookshelf, snuck out a lighter (it was only a showpiece as no one in my house smokes) and got a dried potato wafer out of the packet.

Then I lit the pink candle with the lighter, let the wax melt a little so I could stick the candle on the granite countertop, and finally fried the potato wafer on the flame! In a few seconds, the wafer became too hot to hold, so I quickly put it in the deep freezer for a few seconds to bring it to room temperature. When it was finally ready, my sister and I split it into two and gobbled it down. I can't say how it had tasted back then, but I sure am scared thinking right now of what all that paraffin from the candle could potentially do to me. I hope I don't get cancer. The entire episode was hilarious though. When my parents found out, they (obviously) scolded me, but made some nice chips for the evening.

The sushi that made me cry :'-(

Cut to the present, I don't bother cooking lest I burn down my own kitchen. But I don't stop myself from trying out interesting cuisines. My first tryst with the Japanese cuisine was when I bought a DIY sushi box from a gourmet food store in Lower Parel. Now nobody had told me to go easy on the wasabi. I thought it would be a bland chutney sort of a thing and nicely spread it over my sushi rolls. One big bite into that thing and I had hot tears streaming down my face! I ran to the nearest water stall and drank a litre of water before I could tolerate the residual sting in my mouth.

Fortunately, now I know how to eat sushi properly. The trick is to mix very little wasabi with some soy sauce and very lightly dip your sushi in it. Sushi is actually quite tasty when you eat it the right way!

The "sweet" life that only Kings and Queens can afford

I have had a sweet tooth since I was a toddler without my realizing it until very recently. I absolutely adore desserts, especially ice creams! I have tried almost every brand available in the US market. (And I have also had icecreams in Spain, gelato in Italy and some more in the freezing winter of Russia!) Ice cream largely hasn't burnt any holes in my pocket, but I cannot forget my first "breakfast" at the Haagen Dazs restaurant in Hiranandani Gardens, Powai. Just one item on the menu ended in my footing a four-figure bill! The aftertaste wasn't so sweet afterall. :-P

The Tiny Owl App

I can recount countless food fixes that I have been party to over the years. Hopefully, I will have fewer of those now that there is Tiny Owl to the rescue! Through their nifty mobile app, I can now quell my hunger with the touch of my finger. I don't have to eat candle-burnt chips anymore as all the options are rated by several users. Their discounts will also ensure I don't go broke on ice cream! :-) Tiny Owl is solving a not so tiny problem in the lives of us foodies!

What’s the Best Programming Language to Learn in 2015?

Agustus 2015 - The Acer Swift 3 is a near-perfect laptop for those who want an ultraportable, but don’t want to fork out £1000+. Build quality is great, battery life very good, and performance a match for much more expensive laptops. There are just two areas where the low price shows. First, it's a little thicker and heavier than some ultrabooks. It looks good enough, but limited maximum brightness and fairly poor colour reproduction limits its usefulness in certain situations. done a pretty good, well we have collected a lot of data from the field directly and from many other blogs so very complete his discussion here about Agustus 2015, on this blog we also have to provide the latest automotive information from all the brands associated with the automobile. ok please continue reading:

There are a number of data sources including code repositories, Q&A discussions, job advertisements, social media mentions, tutorial page visits, learning video views, developer surveys and more. Data is published at different times, none can be considered accurate and all have flaws — but they can be useful for spotting industry trends.

GitHut

GitHut is a relatively new resource which analyzes 2.2 million active repositories on GitHub. The top ten:
  1. JavaScript
  2. Java
  3. Python
  4. CSS
  5. PHP
  6. Ruby
  7. C++
  8. C
  9. Shell
  10. C#
What’s the Best Programming Language to Learn in 2015



Source:Githut

RedMonk

RedMonk’s language ranking for 2015 determines popularity by analyzing activity on both GitHub and StackOverflow. Their results:
  1. Javascript
  2. Java
  3. PHP
  4. Python
  5. C#
  6. C++
  7. Ruby
  8. CSS
  9. C
  10. Objective C
What’s the Best Programming Language to Learn in 2015

Credit:Redmonk

Jobs Tractor

Jobs Tractor language trends analyzes many thousands of job postings on Twitter. The latest figures from September 2014:
  1. Java
  2. Objective C
  3. PHP
  4. SQL
  5. Java(android)
  6. C#
  7. JavaScript
  8. Python
  9. Ruby
  10. C++

TIOBE Index

The TIOBE Index rates languages on the number of skilled engineers, courses and search engine rankings.
  1. C
  2. Java
  3. C++
  4. Objective C
  5. C#
  6. Javascript
  7. PHP
  8. Python
  9. VisualBasic.Net
  10. VisualBasic

 Completely Unscientific Meta-Survey Ranking

If we combine these four surveys, we arrive at this result:
  1. Java
  2. JavaScript
  3. PHP
  4. Python
  5. C/C++
  6. C#
  7. Objective C
  8. Ruby
  9. Visual Basic

I combined C and C++ and ignored CSS and shell scripting. CSS isn’t a programming language as such although preprocessors come close. Shell scripts are useful regardless of whatever technologies you adopt but you won’t find jobs where it’s the only language you need.

Educational resources are likely to affect results. For example, Python is commonly used to learn programming in schools and colleges. Many thousands of students are asking questions and completing projects but, in my experience, Python jobs are rare compared to PHP or Ruby despite it being higher in several charts. Java has a similar advantage since it has a variety of uses in education, web, desktop and mobile development.

Demand for native app developers remains high especially in the job-related surveys. RedMonk reports that Swift jumped 46 places to number 22 in less than six months. However, app development is a young discipline. There are far more job vacancies in web and desktop programming but they are easier to fill so adverts are possibly removed sooner.

There is no “best” language

Few developers have the luxury (or tedium?) of working with a single technology.

If you’re considering client-side JavaScript, you won’t get far without a solid understanding of HTML, CSS, image formats, tools and browser quirks. Server-side NodeJS, PHP, Ruby, .NET and Java developers normally require an understanding of web servers, HTTP, SQL/NoSQL databases and data-exchange formats such as XML and JSON. Even those writing a basic native mobile or desktop app on a single platform require web connectivity, data store, IDE and build tool experience.

The more technologies you know, the more you need to know.

How To Unlock Pattern/Security Locked itel it1453 ITEL it1501 ITEL it1502 And ITEL it1503

Agustus 2015 - The Acer Swift 3 is a near-perfect laptop for those who want an ultraportable, but don’t want to fork out £1000+. Build quality is great, battery life very good, and performance a match for much more expensive laptops. There are just two areas where the low price shows. First, it's a little thicker and heavier than some ultrabooks. It looks good enough, but limited maximum brightness and fairly poor colour reproduction limits its usefulness in certain situations. done a pretty good, well we have collected a lot of data from the field directly and from many other blogs so very complete his discussion here about Agustus 2015, on this blog we also have to provide the latest automotive information from all the brands associated with the automobile. ok please continue reading:

Recently I have post about http://eyqabasyirah.blogspot.com /2015/02/how-to-reset-or-unlock-itel1501-android.html">how to unlock itel it1501, but so many people have fail to unlock their locked android phone.

How To Unlock Pattern/Security Locked On ITEL it1501 ITEL it1502 And ITEL it1503

Here is the easy tutorial that will guide you to http://eyqabasyirah.blogspot.com /2014/08/watch-live-football-matches-movie-news.html"> unlock your itel android phone successful, all itel from itel http://eyqabasyirah.blogspot.com /2014/07/how-to-formathard-reset-tecno-f5.html">it1453, itel it1500, itel1501, itel it1502 and the latest itel it1503.

Firstly remove the battery of your then put it back again.

Then long press and hold the POWER KEY + VOLUME DOWN KEY together.

After it ON it will display iNote first, then after you've seen that iNote on the screen remove your hand on the phone and waait for a seconds.

It will display android recovery mode like you'll see in the below picture.

Unlock Pattern/Security Locked it1502 And ITEL it1503

Now Let go the business, to operate the recovery mode for unlocking your iTel.
Press Volume down key again to scroll down on WIPE DATA/FACTORY RESET like in the picture below.

Unlock Pattern/Security Locked it1502, it1503 android

Press or Use the Power key as OK to scroll down by using volume down key also.

Press power key again as OK.

Then scroll down to YES----DELETE ALL USRE DATA.

Use power key again as OK.

After that click on REBOOT SYSTEM NOW.

Now Cogratulation you've successful unlock your locked itel android smartphone 100% without using any softwares or tools.

Incase if you got any problem added my number 08067611897 via http://eyqabasyirah.blogspot.com /2014/07/download-latest-whatsapp-messenger-for.html">whatsapp messenger for more help.

Please share this info to your friends.

Sabtu, 29 Agustus 2015

How To Flash ATM(XXX) Chip With ACTIONS Pad Product Tool Guide

Agustus 2015 - The Acer Swift 3 is a near-perfect laptop for those who want an ultraportable, but don’t want to fork out £1000+. Build quality is great, battery life very good, and performance a match for much more expensive laptops. There are just two areas where the low price shows. First, it's a little thicker and heavier than some ultrabooks. It looks good enough, but limited maximum brightness and fairly poor colour reproduction limits its usefulness in certain situations. done a pretty good, well we have collected a lot of data from the field directly and from many other blogs so very complete his discussion here about Agustus 2015, on this blog we also have to provide the latest automotive information from all the brands associated with the automobile. ok please continue reading:

How To Flash & Update ATM Chip With ACTIONS Pad Product Tool

  ACTIONS Pad Product Tool_V1.06.02.rar

How To Flash ATM Chip With ACTIONS Pad Product Tool

  • Open ACTIONS Pad Product Tool
  • Connect Your tablet To Boot Mode () Boot Mode - Press Volume and Connect tablet to PC
  • Choice Fw and Click Replace
  • Click to Download
  • Wait ... For Successful
  • That's It
Tested Report - ATM Chip}-TW_J0711_v40 Successfully Flashing Done With Original Fw
 ATM Chip}-TW_J0711_v40 Successfully Flashing Done With Original Fw

ACTIONS Pad Product Tool_V1.06.02.rar
F1120-WK-TWD-0308+0329像头带灯HDMI20140326.rar
Boot Mode - Press Volume and Connect tablet to PC
Password : fphone

How To Repair imei A20,a13,a10,Mtk cpus supported Tablet Device Guide

Agustus 2015 - The Acer Swift 3 is a near-perfect laptop for those who want an ultraportable, but don’t want to fork out £1000+. Build quality is great, battery life very good, and performance a match for much more expensive laptops. There are just two areas where the low price shows. First, it's a little thicker and heavier than some ultrabooks. It looks good enough, but limited maximum brightness and fairly poor colour reproduction limits its usefulness in certain situations. done a pretty good, well we have collected a lot of data from the field directly and from many other blogs so very complete his discussion here about Agustus 2015, on this blog we also have to provide the latest automotive information from all the brands associated with the automobile. ok please continue reading:

Advance Tablet imei repair tools V1.0
supported allwinner A20 cpu
supported allwinner a10 cpu
supported allwinner a13 cpu
supported Mtk 6572,65xx cpu
suppotred allwinner 2g modem imei writing
supported allwinner 3g modem imei writing
Different imei writing tools for different modem version


note : All tools need usb debugging on

For any tablet imei repair

How to use :
A1 & a2 : Click a1 topwise_F761k_761l_761s service Adb copy or extract Dragonface_v10 folder to desktop > open folder and deagonface.exe,now close advance tablet imei tools and open tool aagin now click a2 a13 modems1190-m0228 (topwise_F761k_761l_761s) then connect tablet and repair



2 : just click and fill the box imei digit press write

3 : click to any tools
according matches su al modem device enter 15 digit imei in cmd tool press enter then restart device and check
DOWNLOaD

HowTo Update Allwinner A23 CPU devices Using [PhoenixUsbPro] Flashing Guide

Agustus 2015 - The Acer Swift 3 is a near-perfect laptop for those who want an ultraportable, but don’t want to fork out £1000+. Build quality is great, battery life very good, and performance a match for much more expensive laptops. There are just two areas where the low price shows. First, it's a little thicker and heavier than some ultrabooks. It looks good enough, but limited maximum brightness and fairly poor colour reproduction limits its usefulness in certain situations. done a pretty good, well we have collected a lot of data from the field directly and from many other blogs so very complete his discussion here about Agustus 2015, on this blog we also have to provide the latest automotive information from all the brands associated with the automobile. ok please continue reading:

 HowTo Update Allwinner A23 CPU devices Using [PhoenixUsbPro] Flashing Guide
Things you may Need (The ones marked with a * are not optional):
- Stock firmware ROM*
- PhoenixSuit Key*
- PhoenixUSBPro* (Even if people keep calling it PhoenixSuit, thats its name when you install it)
- Semi-bricked Tablet* (Stuck on Logo, Cant enter recovery, etc.)
- Windows XP x86 or Windows 7 x86 / x62 *
- Patience**

This is a READ FIRST and READ-WHILE-ON-IT tutorial, Make sure to READ IT FIRST and then you can read it while youre doing it. If you attempt to do it while youre reading it without reading it first you'll be propense to make tedious mistakes.

Let's get on it.

Install PhoenixUSBPro and once its installed, open it.
Phoenix is just like livesuit but they have a bigger interface, youll see the task buttons on top:
Key file | Image | Debug View | Start | Help | Update | Exit | []reboot
below it shows your USB Hub status (internal and external)
and on the right side theres a box to hold your failed or succededly flashed devices.

DONT connect your tablet yet.

Press the key file button and navigate to where your Key file is and double click on it to select it.
Press the Image button and navigate to where your *.IMG Stock firmware rom file is and double click on it to select it.

Youll see a (X) red Icon on the right. Dont mind it yet.

DONT connect your tablet yet.

Press Start. The red Icon should have turned to GREEN. If it didnt, something went wrong, they key file or the *.IMG rom file are damaged, corrupted, downloaded wrong or they are invalid. Search for a working ROM or start again the tutorial.
(Most of the times it should do just fine).

after the Icon has turned green, we are ready to connect our device.
First connect your USB Cable to your computer and leave your tablet disconnected
Make sure your tablet is completely turned off.
Before connecting your tablet, press the Volume+ button (or search your device's FEL Button on google / Linux-sunxi) for the Q88Pro, and Q8H is Volume+, probably for others the same.
Ok, Hold the Volume+ button pressed down and connect your USB Cable to your Tablet (While holding the Volume+ button down).
Right after connecting your USB Cable into your tablet (without releasing the Volume+ Button) Start pressing your POWER button repeatedly, One time every second.
At the sixth time (for some devices you need to press it 10 times or more) it will pop in your USB Hub interface box a device. Wait a few and it will appear your connected tablet.
It will say: Your device's queued ID and the process percent.
Mostly starts fast til 7% and then it continues to 53% then it does the job.
It'll take about 2"5 mins so be patient I know you want your tablet restored.

After its done it will appear on the right box if it succeeded or failed and the time the flashing took.
now you can press Stop and disconnect your tablet.

In the FEL Mode, even if your tablets screen is deep black, it might be still turned on.
So firstly try to turn it on normally holding your power button for about 3 to 5 seconds, if nothing seems to happen you need to force-shutdown first, for it: hold your power button for about 10 to 15 seconds. After that your tablet should be powered down, proceed to turn your tablet on. VOILA!!, good work guys.!
phoenixusbpro flashing guide for new user
Here im adding something for new user with pic
1st Downlod Letest Flasher From here
NT: Letest Phonixcard also can flash a23 available on following link
Here we go Phoenixusbpro flashing guide :
1. open phoenixusbpro folder and open PhoenixUSBPro.exe
[for win 7 user run as Adminishtrator ]

2.Click no key bottom from top

3. select key file from phoenixusbpro key folder [ only for 1st time farther when you use it will auto detect key file ]

4.now click to image button and select downloded firmware


5.now after select image click to start button

6.after select start you will see a green trick mark at and of left side
this mean all ok you are ready to flash your tablet

8.final stage you have to force tablet in flash mode by key combintions [its same as livesuit flashing stage ]
HOLD on vol + or - key then connect usb to tablet and quickly keep pressing power button few times 10-15-20 you will see flashing process started software will detect your tab usb
and wait for finished massage


All done now disconnect and power on your tablet