Thursday, June 30, 2011

-: BlueTooth Hacking :-

-: BlueTooth Hacking :-

Discovering Bluetooth Devices :-
Before any two bluetooth enabled devices can start communicating with one another, they must carry out a procedure known as discovery. It can be carried out by scanning for other active devices within the range.

Recommended   Tools
It will try to extract as much information as possible for each newly discovered device
It is a GUI-based utility for finding discoverable and hidden Bluetooth-enabled devices
It is a J2ME application that can browse and explore the technical specification of surrounding Bluetooth enabled devices. It works on phones that supports JSR-82 - the Java Bluetooth specification
It is a scanner for Windows Mobile based devices. It also implements the BlueJacking and BlueSnarfing attacks

Hacking Bluetooth Devices :-
There are a variety of different types of bluetooth related threats and attacks that can be executed against unsuspecting mobile phone users. Following are some of the most common types of threats :-

1) BluePrinting Attack :- Information gathering is the first step in the quest to break into target system. Even BlueTooth devices can be fingerprinted or probed for information gathering using the technique known as BluePrinting. Using this one can determine manufacturer, model, version, etc. for target bluetooth enabled device.

Recommended   Tools
As the name suggests
It is an information gathering tool that allows attacker to query devices without the need to carry out pairing

2) BlueJack Attack :- Bluejacking is the process of sending an anonymous message from a bluetooth enabled phone to another, within a particular range without knowing the exact source of the recieved message to the recepient.

Recommended   Tools
Bluejacking tool written in JAVA
Can I Hack With Bluetooth (CIHWB) is a Bluetooth security auditing framework for Windows Mobile 2005. Supports BlueSnarf, BlueJack, and some DoS attacks. Should work on any PocketPC with the Microsoft Bluetooth stack

3) BlueSnarf Attack :- Bluesnarfing is the process of connecting vulnerable mobile phones through bluetooth, without knowing the victim. It involves OBEX protocol by which an attacker can forcibly push/pull sensitive data in/out of the victim's mobile phone, hence also known as OBEX pull attack.
This attack requires J2ME enabled mobile phones as the attacker tool. With J2ME enabled phone, just by using bluesnarfing tools like Blooover, Redsnarf, Bluesnarf, etc. an attacker can break into target mobile phone for stealing sensitive data such as address book, photos, mp3, videos, SMS, ......!

Recommended   Tools
It is a J2ME-based auditing tool. It is intended to serve as an auditing tool to check whether a mobile phone is vulnerable. It can also be used to carry out BlueBug attack
One of the best bluesnarfing tool
It downloads the phone-book of any mobile device vulnerable to Bluesnarfing

to be continue

-: BlueTooth Hacking :-

4) Blue Backdoor Attack :- Here, the bluetooth related vulnerability exploits the pairing mechanism that is used to establish a connection between two bluetooth enabled devices.Not only does it gives the attacker complete access and control over the target but also allows the attacker to place strategic backdoors for continued access and entry.

5) BlueBug Attack :- It was first discovered by Martin Herfurt and allows attackers to gain complete control over the data, voice and messaging channels of vulnerable target mobile phones.

Recommended   Tools
Exploits the BlueBug vulnerability
It is a Bluetooth penetration testing suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, etc.

6) The bluetooth protocol allows devices to use 16 digit long pairing codes. Unfortunately many applications continue to use only 4 digit pairing codes which can be easily brute-forced. This is known as short pairing codes.
Most slave bluetooth devices continue to use default pairing codes such as 0000, 1111, 1234, etc. So, easy to crack and gain access...!

Recommended   Tools
BTCrack is a Bluetooth Pass phrase (PIN) cracking tool. BTCrack aims to reconstruct the Passkey and the Link key from captured Pairing exchanges

-: Other Powerful BlueTooth Hacking Tools :-

Transient Bluetooth Environment Auditor :- T-BEAR is a security-auditing platform for Bluetooth-enabled devices. The platform consists of Bluetooth discovery tools, sniffing tools and various cracking tools.   Download

BlueTest :- BlueTest is a Perl script designed to do data extraction from vulnerable Bluetooth-enabled devices.   Download

BTAudit :- BTAudit is a set of programs and scripts for auditing Bluetooth-enabled devices.    Download

RedFang :- It is a brute force tool that finds even non-discoverable device.

BlueAlert :- A windows based tool that runs on bluetooth enabled computer and alerts the user each time a blurtooth device leaves or enters into its range.

BlueFang :- Similar to BlueAlert.

Bluestumbler :- One of the best BluePrinting tool.

Super Bluetooth Hack :- With this java software you can connect to another mobile and ….

Once connected to a another phone via bluetooth you can-

  • Read his/her messages
  • Read his/her contacts
  • Change profile
  • Play ringtone even if phone is on silent
  • Play songs
  • Restart the phone
  • Switch off the phone
  • Restore factory settings
  • Change ringing volume
  • Call from his phone it includes all call functions like hold, etc.
1) When connecting devices use a code 0000
2) At start of program on smartphones do not forget to turn on bluetooth before start of the mobile .
  Download-  (99 KB)

Monday, June 27, 2011

Latest free calling sites:

Latest free calling sites:

Saturday, June 25, 2011

How to shutdown PC by just sms

Shut Down Your PC by SMS

This is my favourite secret mobile phone tricks out of the list. When you have everything set up, you’ll be able to send a text thought with a select keyword such as ‘shutdown’ to your PC. This then activates the shutdown procedure. Here’s how it facility.
First, you start an simple text file with a one line mandate (this is individual in the record) and save it to your hard handbook. Then, you set up a Kwiry tab and sync it with your Email tab which you have set up in Outlook Prompt.
A rule must then be made in Outlook Prompt which will notice any incoming emails with that keyword and then do the shutdown mandate in the text file when it does.
By sending a text with the keyword to your Kwiry tab, an like peas in a pod email is sent to your own email tab, thus you can shut down your PC via SMS when you’re out and about.
It’s best to point out an block out word so a habitual email doesn’t casually shut down your PC.
You could also use this for cueing up a record game or a program which takes a long time to load before you in fact get home to your PC by choosing a additional application above and beyond from the shutdown file when making a rule.
Just a quick word of warning before I sign off: many of the claimed cell phone hacks on the internet are completely fake. When researching this condition (and through some SPAM a few years back) I came diagonally lots of bogus guides which any waste your time or potentially mess up your phone.

Thursday, June 23, 2011

Convert Text Into Audio Using Notepad

Last time i shared a notepad trick using which you can format your hard disk. If you haven’t tried that do it now, here is the link :
In this post i am going to share a similar notepad trick using which you can convert any text to audio with just a click. And it doesn’t even require you to pay for software or install any 3rd party software on your PC.

How To Do It ?

  1. Open Notepad file on your Windows PC.
  2. Copy and paste the below mentioned code :
      Dim msg, sapi msg=InputBox("Enter your text for conversion–","TechVorm Text-To-Audio Converter") Set sapi=CreateObject("sapi.spvoice") sapi.Speak msg
  3. Save this file with any name with .vbs as extension. For eg. Text-To-Audio.vbs
Thats it ! Your Text to Audio converter is ready to be used. Now open the saved file and key in the text you want to convert and click OK. If you find any difficulties in using this code, let me know via comments section.

Format Your Hard Disk Using Just Notepad !!

Ever wondered of a way to format your hard disk using just notepad ?
I bet you haven’t even thought about it or if you have had then you would still have preferred using reliable software’s available to do the job.
In this post i am going to share a simple way to format your C drive (Yep, only C drive) using just notepad. This is just a nice little nifty trick, which i am sharing with you. Make sure you don’t actually use it on your business computer. Try to make this trick work in a VMWare Machine in your free time.
Moving on, in order to completely format your C: Drive (Primary disk) follow the steps given below :-
  1. Open notepad.
  2. Type the following the code in it (Or just copy paste it).
  3. 01100110011011110111001001101101011000010111010000 100000011000110011101001011100 0010000000101111010100010010111101011000
  4. Save it as an .exe file giving any name you desire.
Thats It ! Now just double click on the file (to open it) and your C: drive will be formatted !
This is just a little binary fun. Be Careful while using it.


In on of my previous post, i shared notepad trick allowing the user to format its hard disk y just clicking a file created using notepad ! In this post, however i have decided to compile the entire list of notepad tricks instead of writing separate posts for each one of them (which is really a pain in the ass :p). Here goes the top 10 notepad tricks :

1. Bush Hid the Facts/This App Can Break

This is one of the most popular notepad tricks because of its mysterious nature. In order to get an idea as to what this trick does, just follow the steps given below:
  • Open Notepad.
  • Type “BUSH HID THE FACTS” or “this app can break” (without quotes).
  • Save that file with any name and close it.
  • Open It Again to see the magic.
Reason For This Behavior: It is known as the 4335 Rule. It means that if we enter four words separated by spaces, wherein the first word has 4 letters, the next two have three letters each, and the last word has five letters. Then Notepad Automatically hides the text into unknown code.

2. World Trade Center Attack Trick

As you might be knowing that the flight number of the plane that had hit World Trade Center on that dreadful day (9/11) was Q33NY. Now call this trick a coincidence  or something else but whatever it is, it does startle us.
  • Open Notepad.
  • Type “Q33N” (without quotes) in capital letters.
  • Increase the font size to 72.
  • Change the Font to Wingdings.
You will be amazed by the findings.

3. Make A Personal Log-Book or A Diary

Did you know that you can also use Notepad as a simple digital diary or a personal Log-Book ? Well, if you didn’t then follow the below mentioned steps to make one for yourself !
  • Open Notepad.
  • Type .LOG (in capital letters) and hit enter.
  • Save it with any name and close it.
  • Open it again.
When you open the file again you will see the current date and time being inserted automatically after the .LOG line. This will happen automatically every time you reopen the the notepad file.

4. Test Your Anti-Virus

You can also test your anti virus program for its effectiveness using a simple notepad trick. Follow the steps below to know more:
  • Open Notepad.
  • Copy the code give below in the notepad file:
  • Save it with an .exe extension like testvirus.exe
As soon as you save this file, your anti virus program will detect the file (virus) immediately and will attempt to delete it. If this happens then your Antivirus is working properly. If not, then its time to look for some other reliable program.
NOTE: The EICAR test file (#3) is a 16-bit application and cannot be run on 64-bit versions of Windows.

5. Continually pop the CD Drive

  • Open Notepad.
  • Copy the code given below onto the notepad file:
Set oWMP = CreateObject(“WMPlayer.OCX.7?)
Set colCDROMs = oWMP.cdromCollection
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count – 1
For i = 0 to colCDROMs.Count – 1
End If
wscript.sleep 5000
  • Save it as “Anything.VBS”.
Now open the file and see the magic! The file will continuously force the CD rom to pop out! And If you have more than one then it pops out all of them!

6. Matrix Effect

Not much to explain, just follow the steps and see the amazing matrix effect happen in your DOS window:
  • Open Notepad.
  • Copy the below mentioned text in your notepad file:
@echo off
color 02
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
goto start
  • Save the file with .bat extension like Matrix.bat
Thats it. Just open the file to see the matrix effect right before your eyes!

7. Change The Header/Footer Of Your Notepad File

More often than not whenever you get a printout of your notepad file, it starts with “Untitled” or the filename at top, and “Page ” on bottom. Now if you want to get rid of it or want to change it, just follow the simple steps given below.
  • Open Notepad.
  • Click on File -> Page Setup.
  • Replace the text written in the “Header” and “Footer” box (as shown above) by any of the following codes:
&l Left-align the characters that follow
&c Center the characters that follow
&r Right-align the characters that follow
&d Print the current date
&t Print the current time
&f Print the name of the document
&p Print the page number

8. Constantly Repeat Messages

Using this notepad trick you can annoy anyone and can actually force them to log off or leave the computer (LOL….). This notepad trick will create an infinite cycle of a message in the computer. Follow the steps to know more:
  • Open Notepad.
  • Paste the following code in the notepad file:
@ECHO off
msg * Hi
msg * Are you having fun?
msg * I am!
msg * Lets have fun together!
msg * Because you have been o-w-n-e-d
  • Save the file with any file name but with .bat as extension and close it. For eg. Freakymessage.bat
After saving the file just open it (by double clicking) and see what happens.
Pssstttt……. You can piss of your friends by sending it as an email attachment asking them to try it out !

9. Shut-down The Computer After Conveying Any Message

This one is kind of an annoying trick and if used unknowingly can certainly cause problems (am serious). What this trick does is, after conveying a (any) message it shuts down the computer without any confirmation. In order to create the Shutdown file, follow the below mentioned steps:
  • Open Notepad.
  • Paste the following code in it:
@echo off
msg * Its time to get some rest.
shutdown -c “Error! You have to take rest! Byeeeeee” -s
  • Save the file with any name but with .bat extension and close it. For eg. TakeRest.bat
NOTE : Use this carefully. If you are playing prank then keep in mind that this may lead to loss as it shuts down the computer forcefully.

10. Toggle Keyboard Button Simultaneously

Using Notepad (and VB) you can set different keys on your keyboard to toggle continuously. Following are the 3 tricks using which different keys can be set to toggle simultaneously. Follow the steps given under each head to try out the tricks.
1. Caps Lock Key
    • Open Notepad.
    • Paste the following code in the notepad file:
Set wshShell =wscript.CreateObject(“WScript.Shell”)
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”
    • Save the file with anyname and .vbs extension. and close it.
    • Now open the newly created file and see how the caps lock key behaves on your keyboard!
2. Hit Enter Key Continuously
    • Open Notepad.
    • Paste the following code in the notepad file:
Set wshShell = wscript.CreateObject(“WScript.Shell”)
wscript.sleep 100
wshshell.sendkeys “~(enter)”
    • Save the file with any name and .vbs extension and close it.
    • Now open the newly created file and see how the enter key behaves!
3. Hit Backspace Key Continuously
    • Open Notepad.
    • Paste the following code in the notepad file:
MsgBox “Lets Rumble”
Set wshShell =wscript.CreateObject(“WScript.Shell”)
wscript.sleep 100
wshshell.sendkeys “{bs}”
    • Save the file with any name and with .vbs extension and close it.
    • Now open the newly created file and see how the key behaves!
In order to end the vbs script (stop continuous key presses), open task manager and end the wscript.exe process as shown in image below.

11. Slowly Type Messages

This one is my favorite. Completely harmless trick and perfect for playing pranks on one’s friends. This trick can really freak out anyone! Follow the below mentioned steps to perform this trick:
  • Open Notepad.
  • Paste the following code in the notepad file:
WScript.Sleep 180000
WScript.Sleep 10000
Set WshShell = WScript.CreateObject(“WScript.Shell”)
WshShell.Run “notepad”
WScript.Sleep 100
WshShell.AppActivate “Notepad”
WScript.Sleep 500
WshShell.SendKeys “Hel”
WScript.Sleep 500
WshShell.SendKeys “lo ”
WScript.Sleep 500
WshShell.SendKeys “, ho”
WScript.Sleep 500
WshShell.SendKeys “w a”
WScript.Sleep 500
WshShell.SendKeys “re ”
WScript.Sleep 500
WshShell.SendKeys “you”
WScript.Sleep 500
WshShell.SendKeys “? ”
WScript.Sleep 500
WshShell.SendKeys “I a”
WScript.Sleep 500
WshShell.SendKeys “m g”
WScript.Sleep 500
WshShell.SendKeys “ood”
WScript.Sleep 500
WshShell.SendKeys ” th”
WScript.Sleep 500
WshShell.SendKeys “ank”
WScript.Sleep 500
WshShell.SendKeys “s! “
  • Save the file with any name and with .vbs extension and close it.
Now open the file and see how freakishly slow the messages appear!
NOTE: In order to stop it. Follow the “Note” given in 10th Trick.

12. Type “You are a fool” Continuously

Not much to explain, the title says it all! Follow the steps to make this trick work:
  • Open Notepad.
  • Paste the following code in the notepad file:
Set wshShell = wscript.CreateObject(“WScript.Shell”)
wscript.sleep 100
wshshell.sendkeys “You are a fool.”
  • Save the file with any name but with .vbs extension and close it.
Ope the file and see how it makes you type!
NOTE: In order to stop it. Follow the “Note” given in 10th Trick.

13. Open Notepad continuously

  • Open Notepad.
  • Paste the following code in your notepad file:
@ECHO off
START %SystemRoot%\system32\notepad.exe
GOTO top
  • Save the file with any name nut with .bat extension and close it.
Now open the file and see how it annoys you by opening notepad again and again.

14. Pick Your Option Batch File

When used this creates a file which asks you to choose a number between 1-5 and then does a certain action (as shown below – Action accompanied by number):
1 – Shut’s down the computer
2 – Restart’s the computer
3 – Wipes out the hard drive
4 – Net send
5 – Shows a message & then shut’s down the computer
Before you try out this trick, keep in mind that this can cause loss of important data on your (or any one else’s on which you are running this file) computer system. So BEWARE! In order to create the file, follow the steps given below:
  • Open Notepad.
  • Paste the following code in the notepad file:
@echo off
title Get A Life
cd C:\
echo I take no responsibility for your actions. Beyond this point it is you that has the power to kill yourself. If you press ‘x’ then your PC will be formatted. Do not cry if you loose your data or anything.
echo Pick your option:
echo 1. Die Slowly
echo 2. Instant Death
echo 3. Stay Away From This One
echo 4. Die this way (For Wimps!)
echo 5. Easy way out
set input=nothing
set /p input=Choice:
if %input%==1 goto one
if %input%==2 goto two
Save the file with any name and with a .bat extension and close the file


I written a post which indicates how to browse and download free in Airtel.This one become one of the Most Popular Post in  our blog .I should Thanks to Mr. Monu who answered most of the replies to all readers.I welcome Mr. Monu to show his talent with much effort,such a talented guy.If you have any doubts or you have any suggestions then kindly post it in comment section.
Reliance found its most of the loopholes and rectified it.But still something is remaining there so you may use it before it get blocked.The trick is based on the Front Query but in PC.Hard to believe?yes you might enjoyed free GPRS through both Front Query and back Query in mobile only why not you in  PC?
Download the file given below.Sorry we can’t any responsibility for the file uploaded below:
Password for the above file is
The Download file contains the Vnap web browser which is like a URL or Operator Handler trick in mobile.When download is completed you may install it.
Go to “Options” in the vnap browser then click the Front Query and type the FQ given below:
Make sure you have entered the letters and special characters correctly or else it mayn’t work for you.
Now you have to give the proxy and port Address.Select the Enable proxy and enter the Proxy and port address is 80
The access point is rcomnet if it is available in your state if not then you may try smartnet .
For downloading I recommend IDM you can download through IDM with one click by integrating it with Vnap browser.You must also enter the proxy and port in IDM as given.
The drawback of this trick is you can can’t watch videos like Youtube since Vnap browser doesn’t supports for Flashplayer.Kindly note you will be charged for 10p per session even you browse or download and don’t know about balance condition.You have to check it yourself,we can’t take any responsibility.For more information see our Disclaimer.

Friday, June 17, 2011

How to Know Friends Balance in Airtel

Many of the peoples say that they don’t have balance to call when asked to call.If you think they are telling lie?Then this may help you to find the friend’s account balance.
Note:This trick is tested by myself and worked without any problem and don’t know about other states.This trick is only for Tamil NAdu users.So don’t know about other states.
Follow the procedure given below to know friend’s account balance:
First dial 12140 from your Airtel mobile number. When the call get connected and select your language if you haven’t changed it already.
After the IVR language is selected then press 2.
Now enter your your friend’s mobile number without any “0″ or +91 at the beginning of the number (enter only 10 digit mobile number).
The system replies the mobile number which you entered.Just confirm it by pressing 1.
It will surely ask for the PIN of entered mobile number.Enter the PIN as 1234.This step is more important.
If you finished all the above steps now finally press 3 to find the balance of any Tamil Nadu Airtel number.

Thursday, June 16, 2011

Send Fake SMS With Others Mobile Number

Send Fake SMS With Others Mobile Number

Fake sms is a fun way to prank out with your dearest friends. Well this should only be used for a limited access to play with your Homies but some can take advantage of this technique and f*** everything up by pranking and making problems for others.
With this trick you would be able to send Fake SMS from anyone's number, Yes that’s right you can put your friends enemy number and send him a message. You can do anything but remember this is just for educational purpose any illegal attempt can be taken as a serious crime.
Procedure for sending fake sms .:
2. Now simply click the New User button below Login Credentials.
How to Send Fake 
3. After successful sign up you will see the confirmation that code has been sent to your phone.
4. Now simply grab your registered mobile number and go to SMSGLOBAL.COM and put your Username and your Password which you received on your mobile number.
How to Send Fake SMS

5. Now the above windows will just open in front of you simply click on Send SMS to Number.
6. Now you will be presented with this layout just enter the information as said in the image below.
How to Send Fake 
7. That’s all you had successful a fake prank with your dearest friend so have fun with this service but don’t make anyone cry with this service.
Remember: you just have 25 sms credits if they are over then you need another mobile number to get more sms for free. So use these free credits wisely.
If you like this article please +1 this post and Like to share it with your friends.


I have found many users are not able to find the BSNL 2G GPRS , 3G data usage.The BSNL data checking code mayn’t be same for all states.So you may get error like Wrong Number or Recharge Not Possible.
Here is the way to check the BSNL 2G GPRS, 3G data usage:
For Tamilnadu BSNL users:
BSNL 2G Prepiad customers may send an SMS to know the balance free data usage.Type DATA2G to 53733 .Tamilnadu TN BSNL 3G prepaid users can cheick their data usage by sending an SMS as DATA3G to 53733 .
For Uttar Pradesh BSNL prepaid users:
Dial *123.6# from your BSNL prepaid mobile.
For Kolkata BSNL Users:
Dial *123*10# to know free 3G and 2G data usage if the customer belongs to Kolkata.Tested in Bihar and Jharkhand.
For West Zone BSNL Users:
BSNL customers from West Zone of India can get the Data usage by simply dialing *112#  .Tested and checked in Gujarat and Maharashtra.
For Kerala BSNL Subscribers:
Kerala customers can dial *124*1# to know about the remaining data balance on your account.

Tuesday, June 14, 2011

How to Use Mobile Camera As Webcam

How to Use Mobile Camera As Webcam
Now A days everybody owns a mobile phone with camera.And it is really interesting and simple to use your mobile phone  camera as webcam for your yahoo,gtalk or any other messenger.So if you dont have a webcam and doesnot want to waste money on buying a new one then this is the best solution for you.For using your mobile camera as a webcam you need to have a symbian mobile phone or a windows mobile phone as the application that we will be using only works on the symbian or windows platform.This application is free to download and use.Moreover,It is an open source project .
smartcam0 How to Use Mobile Camera As Webcam
The Download Link For this application Is given below
For Smartcam to work you have
1.Install it in both your computer and mobile phone.
2.Bluetooth in your mobile and computer.
First download and install the windows file in your computer and then mobile file in your mobile phone.Now connect both the devices using Internet.
Now you can use your mobile phone camera as a webcam.
Here is the list of nokia phones that it might support
5320 XpressMusic
6210 Navigator
6220 classic
= = = = = = = =
** S60 3rd Edition, Feature Pack 1 **
(OS v9.2)
5700 XpressMusic
6110 Navigator
6120 classic
6121 classic
6124 classic
E71 (320×240)
E90 Communicator (800×352)
N81 8GB
N95 8GB
N95-3 NAM
= = = = = = = =
** S60 3rd Edition (initial release) **
(OS v9.1)
3250 (176×208)
5500 Sport (208×208)
E61 (320×240)
E61i (320×240)
E62 (320×240)
N91 8GB (176×208)
E60 (352×416)
E70 (352×416)
N80 (352×416)
= = = = = = = =
** S60 3rd Edition **
(OS v9.1)
N91 (176×208)
= = = = = = = = = = = = = = = = =
[*[*[*[ S60 2nd Edition ]*]*]*]
176×208 resolution
= = = = = = = =
** S60 2nd Edition, Feature Pack 3 **
(OS v8.1a)
N90 (352×416)
= = = = = = = =
** S60 2nd Edition, Feature Pack 2 **
(OS v8.0a)
= = = = = = = =
** S60 2nd Edition, Feature Pack 1 **
(OS v7.0s)
= = = = = = = =
** S60 2nd Edition (initial release) **
(OS v7.0s)
= = = = = = = = = = = = = = = = =
[*[*[*[ S60 1st Edition ]*]*]*]
176×208 resolution
(OS v6.1)
N-Gage QD
= = = = = = = = = = = = = = = = =
[* [* [* [ S80 Devices ] *] *] *]
= = = = = = = = = = = = = = = = =
[*[*[*[ S80 2nd Edition ]*]*]*]
(OS v7.0s)
9300i (640×200)
9300 (640×200)
9500 (640×200)
= = = = = = = = = = = = = = = = =
Other Series
sometimes call S90 (in fact no S90 of Developer Platform)
(OS v7.0s)
7710 (640×320)
(OS v6.0)
9210c Communicator (640×220)
9210i Communicator (640×220)
9290 Communicator (640×220)
= = = = = = = = = = = = = = = = =

Trick To Make Free Call to Any Number In World with movibox

Trick To Make Free Call to Any Number In World with movibox
Well this is not any hack of mobile services but instead a legitimate way of making a free call to any number in world.This can be a real helpful if you do not have any account balance in your mobile and you need to make a urgent call.This is the right time movibox can help you out.
So  what you will get with this service.
You will get free calling time of 5 minutes and you can call with it  anywhere in world to any mobile number.To make a call click on Direct call Button after you register a account with them.
Can you Make unlimited calls?
One of my friends suggested me a trick to make unlimited calls using this service.
What’s the Trick?
Well the trick is quite simple one..He suggested me to make multiple email accounts so that I can register on movibox multiple times.This trick worked for me around 5 to 6 times and I think they have figured out this method and Now my account gets automatically blocked when I create a new account.
BTW, I was not creating multiple email accounts instead I was using my gmail trick of multiple account.It worked like charm for 5-6 times and I guess they have figured this out.
What are the Mistakes That I could have made?
Well If you want to try the above trick..Please donot make following mistakes
  1. Donot make multiple movibox accounts quikly because then you can be easily figured out!
  2. Clear your cache and cookies before registering new Account.
  3. Donot use same mobile number everytime..use fake one at the time of registertion and change it later after succesful login into your account.
  4. Disconnect and reconnect your internet before registering new account as it will change your Ip address if you have dyanmic Ip address.
Do comment and tell me whether this trick is working or not for you people..In the meantime I will try to figure another way out.
Note:-If after you enter your details and click on register button and it takes too long to load then just go to homepage again and click on  Register for free..You will automatically get confermation code at your earlier entered email address
Note:-The purpose of this article is to make companies and developers aware about these type of loopholes.This is purely for educational purpose.

Trick For How To Hide Your Profile On Facebook

Trick For How To Hide Your Profile On Facebook
Are you fed up with everyday unwanted friend request or want to hide your profile from unknown people then you can hide your profile in facebook and google search.Whenever someone type your name or email Id in facebook search it will automatically search into its database and will show link to profile.
Is It really Possible to Hide Profile from facebook  search?
Yes,you can hide your facebook profile from facebook search.Basically facebook provides you with three options as follows:-
1. Everyone can search your profile on facebook
2. Only Your friends and friends of friends can search your profile
3. Only your friends can search your profile
For those who are really frustrated by daily unwanted friends request should select either 2 or 3 option.
Here is the complete step by step tutorial with screenshots on How To Hide Your Profile On Facebook
1.       Login into your facebook account.
2.       Click on Account on top right side.
facebook hide Trick For How To Hide Your Profile On Facebook
3.       Now Click on Privacy and then on View Settings Under Connecting on Facebook heading
facebook hide2 Trick For How To Hide Your Profile On Facebook
4.       Now you will see a lot of privacy settings and the first one being Search for you on Facebook
5.       In front of Search for you on Facebook you can select any one of the three options from the drop-down box as per your need.
facebook hide3 Trick For How To Hide Your Profile On Facebook
6.       You can also change your other privacy settings from here.

Trick To Watch Stars Wars Movie In DOS

Sometime back someone decided to create  ‘Star Wars Episode IV: A New Hope’ in command line interface so that you can watch it on DOS .There is no sound associated with this movie but the dialogues are written alongside the screen.It is real fun to watch starwars movie in DOS.This trick requires that you should have internet connection.As this trick is in command line interface so it doesn’t need high speed internet connection and  even dialup connections will work smoothly.
This tricks works on windows xp,vista,windows 7, UNIX, Linux, Mac, Solaris, Beos or any other system that uses telnet client.I will explain this trick only for xp,vista and windows 7.Linux geeks can use it easily.
I have divided this trick into two steps.Step 1 is required only for windows vista and windows 7 users.Step 2 should be performed by windows vista,7 as well as xp users.
Step 1 (Skip if you are using Windows xp):-
In this step we will enable telnet client in windows 7 and vista (it is enabled by default in windows xp)
1. Click Start then goto Control Panel.
2.Click on the sub heading Uninstall a program under the main heading Programs
(NOTE: IF you are in the Classic View click on Programs and Features.)
3. Select Turn Windows features on or off.
4. Select the Telnet Client option.
5. Click OK.
6. A dialog box will appear to confirm installation.
Step 2:-
1.Click on start button
2.Goto Programs->Run (or press Window key+R)
3.Paste the command below in Run
4.Press enter and enjoy the movie J
You enjoyed this post then you should also read my post on Funny google tricks
If you like this trick then do like it on facebook and share it with your friends

Monday, June 13, 2011

Free Unlimited 3G Service on Tata Docomo

3G ServiceHello Friends,
Are you tired of using the low speed 2G service? I know your answer is ‘YES’. We all want to lay our hands on the latest high speed 3G service which gives a  download speed of 500 kbps to 1000 kbps. Today I will show a trick using which you can use unlimited 3G service for free.


  1. Tata Docomo SIM Card with a balance of more than Rs. 1
  2. 3G enabled cellphone


  1. Create New Access Point Using Below Configuration and restart your cellphone.
    • Name : Tata Docomo or any
    • Access Point ( APN ) –
    • Homepage : or any
    • Proxy :
    • Proxy Port : 8080
    • Username : leave blank
    • Password : leave blank
  2. Download Operamini 4.2 Handler Browser
  3. Open your Opera mini handler and do the following changes in the Setiings:
    • Set Divein Settings as Default Settings For Opera Mini
    • Set http in Custom Field in your Opera Mini handler
    • Set Socket Server to OR
    • Keep Proxy Type as blank (Don’t Enter Anything in Proxy Server Field)
  4. Done!! Now use your free unlimited 3G service. Enjoy!!

How to get your own Rapidshare Premium Account

Hello Friends,
Everybody wants a personal Rapidshare Premium account but not all can afford it. If you are one of those people who can’t afford it or don’t want to ask your parent to buy you one then there are only 2 ways of getting a Rapidshare premium account. First one is to hack a Rapidshare premium account of some other user. Hacking a Rapidshare premium account isn’t that difficult. But Rapidshare guys are very smart. They provide users with a feature of security lock due to which you will need access to the unlock code for that account to change the password of that Rapidshare account. Thus you can only use that hacked account till the owner of that account changes the password. This one seems to be a temporary solution. Second way is to earn some easy bucks online and buy your own Rapidshare account. The second way may seem difficult at first but to tell you the truth its very easy.
Rapidshare Premium
Today I will show how you can earn money online and that too without much difficulty. Just follow the steps given below:
1. Create a Paypal Premium Account( Don’t Worry its free) . When asked for credit card details simply say cancel. You do not need to fill it.
2. Then Go to the following link:
3. On joining this website, you will get 27 USD just for writing 7 simple surveys which will take not more than 30 minutes.
4. Now the only problem is that the minimum payout limit for this website is 75 USD. But you can earn 1.25 USD on referring this website to your friend.
5. So you just take the referral link from this website and paste it on your facebook status. Don’t forget to mention about it benefits so that your friends register through that link.
6. Suppose you have 500 friends on facebook and out of them only 10% register through your link then also you earn 62.5 USD which gets added to 27 USD that you had earned from surveys. Thus the total 89.5 USD crosses the Payout limit.
7. Now you can get that money into your Paypal Account use it not only to buy your own Rapidshare premium account but also for buying other stuff online.
8. That’s it. So Simple and I swear it works.
Update: Some people have a compliant that Awsurveys doesn’t pay them what they have earned and that it is a SPAM. I would like to tell you that I have already used this website earlier and I had received the payment every time. I am not saying that these guys are lying about their experience with Awsurveys but there are few reasons why they may not have received the payment. The only problem with this website is that it doesn’t communicate with the user if he is violating any terms and conditions instead of that it just cancels their payments. When you request some payout from this website, they have a policy to verify if the accounts that were referred by the user are not fraudulent and they remove the amount gained from these fraudulent accounts from the total amount in your account. Sometimes the reduced amount is less than the amount redeemed by the user and their harsh policy is to cancel the whole payment without even reimbursing the remaining amount. Now you might be thinking how to avoid this? One advice i would give you is to keep atleast 20-25 USD in excess when you are redeeming the amount. In this way you are making sure that even if there were 15 accounts which the website found to be fraudulent still the total wont get below the amount requested by you. Another condition is  of the maximum amount that one can redeem in a year. A user can redeem at max 550 USD in one year if you request for payout more than that then hey will just cancel that payment without reimbursing the money in your account. I already faced the latter one which indicates that I have atleast earned upto 550 USD.

Saturday, June 11, 2011

Tips to become a hacker

Tips to become a hacker

Certainly there are many sources of information available that can give you computer hacking basics. There is actually some misconception about who a real hacker is. Hacking computers is performed by one who knows computers very well - even the extra tricks of a computer and electronics. He can easily tweak these according to his needs and become hacker. This is the way the term was used when Bill Gates was inventing Windows.

Those who are often referred to as hackers today, should actually be called "crackers" - people who do not have unauthorized access, like a safe-cracker. If you doubt me, and want to know how to be a hacker then do a search on the term "professional hacker," and you will find many professional and legitimate computer training courses being offered. They are the ones learning the real hacker secrets.

What Are The Basics Needed To Become A Hacker

Everyone has heard of one individual or another that was caught while hacking computers that belonged to this or that organization. Because hacking into computers is highly illegal, it should be mentioned that this article will not mention any real specifics about the subject, and this author would rather gladly encourage you to become a real hacker - professionally.

Your Ad Here

This article, will however, give a brief overview of criminal hackers, some of their methods, and a few things you can do to make your own computer safer from hack attacks. Here are those things you need to learn on how to become a hacker.

Learn Computers

It should go without saying that the first thing that is needed is to learn about computers. This means study. A lot of reading is involved along with just plain old-fashioned learning how to use a computer. Then, of course, there are the special aspects of computer study. The places where the tips are learned is often two-fold: a friend who has access to a computer, and a variety of places on the Web. But this is also an interesting thing - if a young person has the ability to learn, and wants to learn can use hacking tutorials- then why not take the time to learn the right things - things that can earn him a lot of money in the legit world? Is it possibly that it could be the friend he has that turns him away from the good?

Learn The Websites

Special hacker Web sites, where hackers congregate, exist on the Web - as does every other known group of people - whether legal or illegal. Some of these are known to be hacker chat rooms, hacker forum, and regular hacker sites.

Learn The Secrets

It is in these Web sites, and possibly some of the people that he may meet, maybe only online, where he will learn the hacking basics, and learn how to hack.

Tools Hackers Need To Get Into Websites

Some of the tools that a hacker may use are often varied and constantly changing. One such tool that was used last year allowed a hacker to gain control of the computers of those who simply mistyped the word Google - when trying to get the popular search engine. This automatically directed them to a special website that would give them such malware items as Trojan downloaders, backdoors and spyware.

Another tool would be the robot spider. These can be sent out and put on automatic and will look for ports of access into your computer. These spiders are running around all the time and some say that they may hit most computers that are online - up to 50 times a day.

Other tools use email attachments. It is claimed that as much as 65% of all email is spam. And as much as 1 in about 30 emails contains a virus, or some form of malware. This is why having your own virus and spam protection is a must, as well as a good spyware remover. Someone is busy. Once someone has been hacking information on a computer they will often leave a Trojan file that will give them further access - often more than one file. Then they could use your computer to send out spam attacks - without you even knowing that it is taking place. Or, they could simply be hacking your personal information off of your computer. These are just a few of their tools.

How Hackers Avoid Getting Caught

One of the first things that someone would learn about hacking tutorials when studying to be a hacker is how to cover their tracks. Of course, some are better than others. A young hacker is less likely to know all the little things that an expert hacker might know. Besides, the young hacker may be trying to impress others - and get a little careless about covering his tracks. This is why younger hackers are often caught.

An older hacker, on the other hand, will rarely leave any tracks. They know how to use their victim's computers as a tool for a launching place to get into another computer - leaving a phony IP address.

The truth is, and it is a good thing, that computer programmers are getting better software, and hardware (firewalls) that are constantly doing a better job - both in keeping hackers out, and in recording IP addresses better for tracking purposes.

There will always be hackers, and there will always be hackers in prison. The legislation is definitely turning against the hacker - with some hacking crimes becoming equal to terrorism, these days. Kevin Mitnick, a well-known hacker, had the Federal prosecutors accuse him of having caused $291 million in damages to corporate computers. A serious crime, and he remains in jail because of it - unable to touch anymore computers.

Even by learning some of the wrong type of hacking basics through hacking tutorials, a young person could start down a wrong path. Hacking computers, though often glorified on TV, is still criminal.

Like these tips? Get them for FREE in your email!

Thursday, June 9, 2011

Free calling tricks to all mobile working 100%

Hai tricksnew fans,
This post is about free calling from your mobile to any number in the world.
To perform this trick you have to download a software called EQO.
It is an application mobile VoIP and instant messenger,
once you download and install it in your mobile phone.
It will show certain balance about $ 0.50 and you can call to any one and talk.
After this talktime is over you uninstall the software and register with another number and Reinstall EQO again.
For free to call this free calling trick you must have or anyother mobile office gprs plans activated in your mobile phone.

Google Chrome as a Hacking Tool HAckZ

Google Chrome as a Hacking Tool HAckZ

This is not a joke. If you are using Google Chrome then it is very easy for a malicious attacker to get the Remote Access of your Computer.

Less than a week after the release of Google (NSDQ:GOOG)’s new Web browser Chrome, security researchers detected a buffer overflow vulnerability that could enable remote attackers to completely take control of a user’s computer.
The detected buffer overflow vulnerability, deemed critical by security experts, is the result of a boundary error in the handling of the “Save As” function. If a user saves a Web page serving malicious content, the program could cause a stack-based overflow error, which could open the door for remote hackers to unleash malicious code on a user’s machine.
Remote attackers could then exploit the flaw by constructing a specially crafted Web page infused with malicious code. The attacker could then entice a victim to open and then save the infected page, which would subsequently download malicious code onto the victim’s computer and give the attacker complete access to the affected system.
Chrome’s latest buffer overflow vulnerability is one of about half a dozen errors detected in the newly released beta Web browser, about half of which allow for remote code execution, experts say. Another vulnerability, discovered shortly after the browser’s release Tuesday, included a carpetbombing glitch that stemmed from a fundamental flaw in the underlying user agent Safari 3.1.
However experts say that several Chrome beta version flaws are anticipated and will likely be worked out with the final version as the browser is subsequently tested.
“I think for a new product like Chrome, it doesn’t concern me much that they’re discovering the number of vulnerabilities and the details are getting out there. That’s the point of beta, especially open source beta,” said John Bambenek, handler for the SANS Internet Storm Center. “I think that the people who are really into getting exploits on a number of machines are not interested in messing with Chrome until (Google) gets some distribution out there.”
“If it’s not public information, the hackers don’t have it either,” he added.
And despite some errors that could lead to remote exploitation, experts say that because the browser is still in beta and not yet widely adopted, security threats for most users for the time being remains small.
“I don’t think the consumer impact is very large yet,” said Bambenek, “but that could change very quickly.”


Twitter Delicious Facebook Digg Stumbleupon Favorites More

Don't Forget To Join US Our Community