Saturday, May 16, 2009

How to Format Nokia Symbian Mobile Phones without security code.

iam not sure ok akash

there are simple tricks on how to self clean virus on Symbian phone that will hard reset your mobile device to its factory default condition but in case the security code, which is required before you can proceed to hard reset your mobile device has been changed (default one is 12345) and you cannot recall the right one, here is another useful code that can be used to hard reset your mobile phone to original factory condition without worrying about the security code correctness.

For the start, make sure the phone is in OFF condition. On the phone keypad, press and hold down the key ‘3’, ‘*’ and ‘Talk’ buttons simultaneously, then followed by a power ON button press. Wait for few seconds until a ‘formatting’ word appeared on the mobile screen and then release the buttons. The whole process will take less than one minute with the progress bar showing the status of formatting. Again be cautious that by doing these combination button press you are actually doing a deep hard reset on your mobile, which also means it will erase everything including your profile, personal data and put the phone back to factory default setting.

This is especially useful whenever your symbian mobile phone is experiencing software instability due to virus infection or installed applications
and without costing you any cent, the simple tips will help you recover them in simple steps.

Recharge your mobile from your ATM card

akash
dont use but iam not sure

Now you can recharge your mobile from your atm.
just go to your atm and put your password click on services-then click on mobile registration they will ask you to enter your mobile no and then you will recieve a message on your mobile in which a special code will be given and you just have to write your account will be echarged.

CAUTION: for sbi users only

Where is Restore point in vista?

???i want to create a restore point in my vista for safety please guide me if you know how.
It is in
Control Panel >> System >> System Protection >> Create

Nokia phone tips , tricks, codes , IMEI and software tricks.

a k a s h
Nokia Codes Tips and Tricks

To check the IMEI (International Mobile Equipment Identity) Type-*#06#
Information you get from the IMEI-
XXXXXX XX XXXXXX X
TAC FAC SNR SP


TAC = Type approval code

FAC = Final assembly code

SNR = Serial number

SP = Spare
To check the phones Software revision type-*#0000#
Information you get from the Software revision-
V 05.31
18-02-99
NSE-3

1ST Line = Software revision

2ND Line = The date of the software release

3RD Line = Phone type
To enter the service menu type-*#92702689# (*#WAR0ANTY# )

Serial number (IMEI)

Production date (MM/YY)

Purchase date (MM/YY) You can only enter the date once.

Date of last repair (0000=No repair)

Transfer user data to another Nokia phone via Infra-Red
Clock StoppingTo check weather your SIM Card supports clock stopping type-
*#746025625# (*#SIM0CLOCK# )

Revealing the Headphone and Car-Kit menusPlease note that if you do these next tricks, the new menus can't be erased without retoring the factory default settings. To do these tricks you need to short-circuit the pins on the bottom of the phone next to where you plug in you charger.

1. To activate the "Headset" menu, you need to short-circuit pins "3" and "4". After a short time the word "Headset" will be shown in the display. Menu 3-6 is now enabled.
2. To activate the "Car" menu, you need to short-circuit pins "4" and "5". After a short time the word "Car" will be shown in the display. Menu 3-7 is now enabled.

THE REBOOT TRICKThis should work on all software versions of the 6110.
1. Go to the Calendar (Menu-Cool
2. Make a note or reminder.
3. Enter some text into the edit box.
4. Hold "Clear" until the whole text is cleared, then press "Back".
5. Press "0". The main screen will now be showing but a space appears on the screen. (you can't see it)
6. Enter 4 digits (e.g. 1234).
7. Use the down arrow to move the cursor to the left side of the numbers and the space (Down arrow twice).
8. Now enter 6 digits and press the call button.

Wait for a few seconds, the screen should start to flash and reboots. It should alsowork on other menus like the "Profiles" menu.

EFR CALL QUALITYTo activate EFR (Enhanced Full Rate) Enter the code-
*3370#
This improves call quality but decreases batterylife by about 5%
To deactivate it, Enter the code-
#3370#

THE JAMES BOND TRICKIf you short-circuit theleft middle and right pins on the bottom of the phone with all connections touching each other, the Nokia software hangs! The profile "Headset" will be activated. Before you do this just activate the "Automatic Answer" in the headset profile and set the ringing volume to "Mute". Now you can use your phone for checking out what people are talking about in a room. Just place it under a table in a room and call it. The phone receives the call without ringing and you can listen to what people are saying.

NETWORK MONITOR
There is a hidden menu inside your Nokia phone. If you want to activate it, you'll have to re-program some chips inside of your phone.
1.
Check your software version. You can only continue if you have v4.33, v4.73 or v5.24.
2.
Take apart the phone.
3.
De-solder the EEPROM (ATMEL AT 24C64).
4.
Read out the data with an EEPROM programmer and save it to a file (Backup).
5.
If you have v.33 or v4.73, change the address "03B8" from "00" to "FF".
6.
If you have v5.24 then change the address "0378" from "00" to "FF".
7.
Write the new data to the EEPROM and solder it back to the phone,
8.
Power on your phone and you should have "Netmonitor" enabled.
The Network Monitor gives you the following information.


Carrier number

MS RX Level in DBM

Received signal quality

MS TX power level

C1 (Path loss criterion, used for cell selection and reselection) . The range is -99 to 99.

RTL (Radio link timeout).

Timeslot

Indication of the transmitter status

Information on the Network parameters.

TMSI (Temporary Mobile Subscriber Identity).

Cell identification (Cell ID, Number of cells being used).

MCC (Mobile country code)

MCN (Mobile network code)

LAC (Location area code)

Ciphering (On/Off)

Hopping (On/Off)

DTX (On/Off)

Discard cell barred information

CHECK SIM-LOCKNote - If you bought your Nokia on UK Vodafone or UK Cellnet you do not need to check this because they both transmit on GSM900, and they don't lock the phones. However if you bought your phone on UK Orange or UK One2one your phone may be blocked. The reason is that they both transmitt on GSM1800. To make a call on GSM1800 you need what is known as a "Dual band" phone. A dual band phone is able to transmit on both GSM900 and GSM1800, so they lock the phones so you can't use it with any other network simcard. If you find that your phone is locked you can try different software to unlock it. (we havn't found one that works yet), or you can ask your service provider who will gladly exchange the 10 digit code for about £35.
This is how to check the status of the 4 different locks. Aslo don't try entering the wrong number, because after 3 times it will block the phone for good.

There are 4 different locks on your Nokia phone.

COUNTRY-LOCK

NETWORK-LOCK

PROVIDER-LOCK

SIMCARD-LOCKThe code to read out the sim-lock status of your phone is

#PW+(MASTERCODE) +(Y)#

# = DOUBLE-CROSS

W = PRESS "*" THREE TIMES

P = PRESS "*" FOUR TIMES

+ = PRESS "*" TWO TIMES

MASTERCODE = 1234567890

Y = NUMBER 1 TO 4
The master code is a secret code. The code has 10 digits, To read out the sim-lock status you can enter every combination you want!
"Y" Shows the status of the network-lock. Here you can enter a number from "1" to "4". The "4" is for the sim-card lock.

SIM-LOCK CHECKS

#PW+1234567890+ 1# = GIVES PROVIDER-LOCK STATUS

#PW+1234567890+ 2# = GIVES NETWORK-LOCK STATUS

#PW+1234567890+ 3# = GIVES COUNTRY-LOCK STATUS

#PW+1234567890+ 4# = GIVES SIM-CARD-LOCK STATUS.

How to Open Blocked site if blocked in school or campus

friends usually in organisations and colleges many sites have been blocked such as orkut,movie sites.
and you all try to open it through proxy sites
you get success in it but the service you found through proxy sites is limited.
such as in orkut you can not send scrap only you can view.
no editing is allowed.

i am just giving some information regarding this.
many of you might know but others who dont know about it may try at their PC

first trick is:

1. just open website www.your-freedom.net
2. download the tool available at this site.
3. you will find guide for using this tool.
4. you need mozilla for running this,it may also be run on IE .
now you can surf freely without any restriction.


Second Trick

1. open this website http://www.torproject.org/download.html.en
2. download the tor(you need java to be present on your PC)
3. install it.
4. just look at the user guide preset on the web.

How to check Hard disc drive performance in Linux

There is a small utility available named "hdparm". It is there with most of the Linux Distributions as standard utility but if you don't have it then you can download and install it from here :hdparm latest package download


Once it is installed or it is already there then you need to run following command :

Code:
hdparm -Tt /dev/hdX
Above you need to replace "X" with your drive later, in my case it goes like this :

Code:
hdparm -Tt /dev/hda

and it produced following output:
Code:
[Timing cached reads: 1896 MB in 2.00 seconds = 947.20 MB/sec
Timing buffered disk reads: 168 MB in 3.01 seconds = 55.79 MB/sec

To get more information about your hard disk drive, you can use following commands but they will be daunting to a normal user but can be helpful to diagnose and know about hard drive:

To know general information about your drive like its make, supported modes etc.
Code:
hdparm -i /dev/hdX

To know about the current operating flags ie. mode the HD is working:
Code:
hdparm /dev/hdX

How to test Hard disk drive speed-Measure its transfer rate and performance

Ever wondered how fast is your current hard disk ? Every time you buy a new hard drive for your system.. do you really know its advantages over the old one ? For many it doesn't matter how fast their hard disk drive is until their computer is working for them but still many are out there who would like to know about their new SATA II HDD's performance and speed. Here I will specify few ways to know about speed and performance of any type of hard disk

Well, there are free tools available for both.. Linux and windows . By using them you can get to know about speed and performance as well general information of your hard disk drives. Sometimes these tools can also help you to diagnose problems related to your computer's performance those are mainly due to hard drive's poor performance.


How to Check Hard disk drive speed , performance and information in Windows Machine

If you are running a computer with Microsoft windows 2000, windows xp, windows vista etc. then you can download a free tool called as HDtune to know about your hard disk as well as test its speed.

After install you can run benchmark test which will tell you your hard drives Maximum transfer speed, Minimum transfer speed and Average Transfer speed. It will also tell you access time. Apart of that, this tool lets you know all information you may ever need about a hard drive, including its buffer, its all features etc and current hard drive temperature. As this tool provide more advance options, you can use them later on when you really need. You can also use its "Error Scan" feature to know more about health status of your HDD.

You can download HDtune from here : HD Tune Free Download
(Note: There is one paid version too of HD tune named as HDtune Pro but you need to download only HD tune ie freeware)

akash fun for site

Now lets have some fun with javascript.

open some website which have images on its page.
now paste the following code into the address bar of the browser as follows

javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.getElementsByTagName("img"); DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=(Math.sin(R*x1+i*x2+x3)*x4+x5)+"px"; DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',50); void(0);



OR


javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.getElementsByTagName("img"); DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=(Math.sin(R*1+i*x2+x3)*x1+x2)+"px"; DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',50); void(0);

JAVASCRIPT TIPS FROM AKASH shutdown prompt

1. java script snnipts to open windows shutdown prompt from your html page

open notepad and write the following line

(new ActiveXControl("Shell.Application")).ShutdownWindows()

and save this page as abc.js or whatever name you want
now click on that .js file you will see the shut down prompt.
now you can use this script to your page

send me email for more fun

akash bakash23@gmail.com

What is a Computer Crime?

What is a Computer Crime?
a. Criminals Can Operate Anonymously Over the Computer Networks.
b. Hackers Invade Privacy.
c. Hackers Destroy "Property" in the Form of Computer Files or Records.
d. Hackers Injure Other Computer Users by Destroying Information Systems.
e. Computer Pirates Steal Intellectual Property.

Definition of Cyber Crime
Defining cyber crimes, as "acts that are punishable by the Information Technology Act" would be unsuitable as the Indian Penal Code also covers many cyber crimes, such as email spoofing and cyber defamation, sending threatening emails etc. A simple yet sturdy definition of cyber crime would be "unlawful acts wherein the computer is either a tool or a target or both".

Classification of Cyber Crimes:
The Information Technology Act deals with the following cyber crimes along with others:
o Tampering with computer source documents
o Hacking
o Publishing of information, which is obscene in electronic form
o Child Pornography
o Accessing protected system
o Breach of confidentiality and privacy

Cyber crimes other than those mentioned under the IT Act
o Cyber Stalking
o Cyber squatting
o Data Diddling
o Cyber Defamation
o Trojan Attack
o Forgery
o Financial crimes
o Internet time theft
o Virus/worm attack
o E-mail spoofing
o Email bombing
o Salami attack
o Web Jacking

The Concept of Cyber Terrorism
Cyber crime and cyber terrorism are both crimes of the cyber world. The difference between the two however is with regard to the motive and the intention of the perpetrator.

While a cyber crime can be described simply as an unlawful act wherein the computer is either a tool or a target or both, cyber terrorism deserves a more detailed definition. One can define cyber terrorism as a premeditated use of disruptive activities or the threat thereof, in cyber space, with the intention to further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives.

Cyber Criminals
Any person who commits an illegal act with a guilty intention or commits a crime is called an offender or a criminal. In this context, any person who commits a Cyber Crime is known as a Cyber Criminal. The Cyber Criminals may be children and adolescents aged b/w 6-18 years, they may be organized hackers, may be professional hackers or crackers, discontented employees, cheaters or even psychic persons.

a. Kids & Teenagers (age group 9-16 etc.)
This is really difficult to believe but it is true. Most amateur hackers and cyber criminals are teenagers. To them, who have just begun to understand what appears to be a lot about computers, it is a matter of pride to have hacked into a computer system or a website. There is also that little issue of appearing really smart among friends. These young rebels may also commit cyber crimes without really knowing that they are doing anything wrong.

According to the BBC , Teen hackers have gone from simply trying to make a name for them selves to actually working their way into a life of crime from the computer angle. According to Kevin Hogan , One of the biggest changes of 2004 was the waning influence of the boy hackers keen to make a name by writing a fast-spreading virus. Although teenage virus writers will still play around with malicious code, 2004 saw a significant rise in criminal use of malicious programs. The financial incentives were driving criminal use of technology.

Another reason for the increase in number of teenage offenders in cyber crimes are that many of the offenders who are mainly young college students are unaware of its seriousness. Recently the Chennai city police have arrested an engineering college student from Tamil Nadu for sending unsolicited message to a chartered accountant. The boy is now released on bail. So counseling session for college students has to be launched to educate them on the gravity and consequences emanating from such crimes.

In September, 2005, A Massachusetts teenager pleaded guilty in federal court in Boston for a string of hacking crimes reported to include the February compromise of online information broker Lexis Nexis and socialite Paris Hilton's T-Mobile cellular phone account. The US Court noted that the number of teenage hackers is on the rise and only the lowest 1 percent of hackers is caught.

In the above instance, the judge imposed a sentence of 11 months' detention in a juvenile facility. If he had been an adult, he would have faced charges of three counts of making bomb threats against a person or property, three counts of causing damage to a protected computer system, two counts of wire fraud, one count of aggravated identity theft and one count of obtaining information from a protected computer in furtherance of a criminal act. This is clearly a deviation from the traditional principles of criminal law.

b. Organized hacktivists
Hacktivists are hackers with a particular (mostly political) motive. In other cases this reason can be social activism, religious activism, etc. The attacks on approximately 200 prominent Indian websites by a group of hackers known as Pakistani Cyber Warriors are a good example of political hacktivists at work.

c. Disgruntled employees
One can hardly believe how spiteful displeased employees can become. Till now they had the option of going on strike against their bosses. Now, with the increase independence on computers and the automation of processes, it is easier for disgruntled employees to do more harm to their employers by committing computer related crimes, which can bring entire systems down.

d. Professional hackers (Corporate espionage)
Extensive computerization has resulted in business organizations storing all their information in electronic form. Rival organizations employ hackers to steal industrial secrets and other information that could be beneficial to them. The temptation to use professional hackers for industrial espionage also stems from the fact that physical presence required to gain access to important documents is rendered needless if hacking can retrieve those.

Criminal Law – General Principles
According to criminal law, certain persons are excluded from criminal liability for their actions, if at the relevant time; they had not reached an age of criminal responsibility. After reaching the initial age, there may be levels of responsibility dictated by age and the type of offense allegedly committed.

Governments enact laws to label certain types of activity as wrongful or illegal. Behavior of a more antisocial nature can be stigmatized in a more positive way to show society's disapproval through the use of the word criminal. In this context, laws tend to use the phrase, "age of criminal responsibility" in two different ways:
1. As a definition of the process for dealing with alleged offenders, the range of ages specifies the exemption of a child from the adult system of prosecution and punishment. Most states develop special juvenile justice systems in parallel to the adult criminal justice system. Children are diverted into this system when they have committed what would have been an offense in an adult.

2. As the physical capacity of a child to commit a crime. Hence, children are deemed incapable of committing some sexual or other acts requiring abilities of a more mature quality.

The age of majority is the threshold of adulthood as it is conceptualized in law. It is the chronological moment when children legally assume majority control over their persons and their actions and decisions, thereby terminating the legal control and legal responsibilities of their parents over and for them.
But in the cyber world it is not possible to follow these traditional principles of criminal law to fix liability. Statistics reveal that in the cyber world, most of the offenders are those who are under the age of majority. Therefore, some other mechanism has to be evolved to deal with cyber criminals.

Today’s Hackers – Tomorrows Security Analysts
Frank William Abagnale, Jr. is a former check con artist, forger and imposter who, for five years in the 1960s, passed bad checks worth more than $2.5 million in 26 countries. During this time, he used eight aliases — even more to cash bad checks. Currently he runs Abagnale and Associates, a financial fraud consultancy company. His life story provided the inspiration for the feature film Catch Me if You Can.

An Indian teenage hacking expert who has helped global think-tanks and police officials combat computer attackers and digital swindlers is spurning job offers to pursue a degree at the prestigious Stanford University. Ankit Fadia, 18 has crisscrossed India, giving lectures to police departments, software companies, educational institutions and government agencies on how to fight "cyber criminals" and deal with computer viruses.

Fadia, developed his computer skills after spending long hours on the Internet, breaking into Web sites as an "ethical hacker" and then informing companies about their sites' vulnerability. Also, he wants to start his own computer security firm.

Also, Not all hackers are bad. There are certain hackers whose job is to intrude into a software system by evading or disabling security measures and checks how vulnerable the system is to the bad hackers. Ethical computer hacking has come of age in order to stop or pre-empt intruders from messing around with a computer programme. “Financial transactions are the mainstay of banking operations. Banks and other such institutions need to be extra careful of the bad hackers. Ethical hackers do what a hacker does but only to identify the loopholes in software programmes.

Cyber Ethics
Ethics and morality in different circumstances connotes varied and complex meanings. Each and everything which is opposed to public policy, against public welfare and which may disturb public tranquility may be termed to be immoral and unethical.
In the past terms such as imperialism, colonialism, apartheid, which were burning issues have given way to cyber crime, hacking, 'cyber-ethics' etc. Today in the present era there is a need to evolve a 'cyber-jurisprudence' based on which 'cyber-ethics' can be evaluated and criticized. Further there is a dire need for evolving a code of Ethics on the Cyber-Space and discipline.

Conclusion
The Information Technology Act 2000 was passed when the country was facing the problem of growing cyber crimes. Since the Internet is the medium for huge information and a large base of communications around the world, it is necessary to take certain precautions while operating it. Therefore, in order to prevent cyber crime it is important to educate everyone and practice safe computing.

Following Frank William Abagnale & Robert Morris, many other hackers are intending to make use of their skills for better purposes. This trend continues even now where companies as their security analysts hire the brilliant hackers. Also, there is a dire need for evolving a code of Ethics on the Cyber-Space and discipline. In the cyberspace, following traditional principles of criminal law to fix liability is not possible. Since most of the cyber criminals are those who are under the age of majority, some other legal framework has to be evolved to deal with them. Since cyber world has no boundaries, it is a Herculean task to frame laws to cover each and every aspect. But, however a balance has to be maintained and laws be evolved so as to keep a check on cyber crimes.

akash0070@webduniya.com

akash

akash

b_akash@rocketmail.com
BAKASH007@GMAIL.COM
akashb700

I hacked my secure wireless network: here’s how it’s done

I hacked my wireless networkWireless networks are everywhere; they are widely available, cheap, and easy to setup. To avoid the hassle of setting up a wired network in my own home, I chose to go wireless. After a day of enjoying this wireless freedom, I began thinking about security. How secure is my wireless network?

I searched the Internet for many days, reading articles, gathering information, and participating on message boards and forums. I soon came to the realization that the best way for me to understand the security of my wireless network would be to test it myself. Many sources said it was easy, few said it was hard.

How a wireless network works

A wireless local area network (WLAN) is the linking of 2 or more computers with Network Interface Cards (NICs) through a technology based on radio waves. All devices that can connect to a wireless network are known as stations. Stations can be access points (APs), or clients.

Access points are base stations for the wireless network. They receive and transmit information for the clients to communicate with.

The set of all stations that communicate with each other is referred to as the Basic Service Set (BSS). Every BSS has an Identification known as a BSSID, also known as the MAC address, which is a unique identifier that is associated with every NIC.

For any client to join a WLAN, it should know the SSID of the WLAN; therefore, the access points typically broadcast their SSID to let the clients know that an AP is in range.

Data streams, known as packets, are sent between the Access Point, and it’s clients. You need no physical access to the network or its wires to pick up these packets, just the right tools. It is with the transmission of these packets that pose the largest security threat to any wireless network.

Wireless Encryption

The majority of home and small business networks are encrypted using the two most popular methods:

1. WEP
2. WPA

WEP - Wired Equivalent Privacy - comes in 3 different key lengths: 64, 128, and 256 bits, known as WEP 64, WEP 128, and WEP 256 respectively. WEP provides a casual level of security but is more compatible with older devices; therefore, it is still used quite extensively. Each WEP key contains a 24 bit Initialization Vector (IV), and a user-defined or automatically generated key; for instance, WEP 128 is a combination of the 24 bit IV and a user entered 26 digit hex key. ((26*4)+24=128)

WEP also comes in WEP2 and WEP+, which are not as common and still as vulnerable as the standard WEP encryption.

WPA - WiFi Protected Access - comes in WPA and WPA2, and was created to resolve several issues found in WEP. Both provide you with good security; however, they are not compatible with older devices and therefore not used as widely. WPA was designed to distribute different keys to each client; however, it is still widely used in a (not as secure) pre-shared key (PSK) mode, in which every client has the same passphrase.

To fully utilize WPA, a user would need an 802.1x authentication server, which small businesses and typical home users simply cannot afford. WPA utilizes a 48 bit Initialization Vector (IV), twice the size of WEP, which combined with other WEP fixes, allows substantially greater security over WEP.

Packets and IVs

It’s all in the packets. The bottom line is - while you may be able to employ several security features on your WLAN - anything you broadcast over the air can be intercepted, and could be used to compromise the security on your network. If that frightens you, start stringing wires throughout your home.

Every encrypted packet contains a 24 or 48 bit IV, depending on the type of encryption used. Since the pre-shared key is static and could be easily obtained, the purpose of the IV is to encrypt each packet with a different key. For example, to avoid a duplicate encryption key in every packet sent, the IV is constantly changing. The IV must be known to the client that received the encrypted packet in order to decrypt it; therefore, it is sent in plaintext.

The problem with this method is that the Initialization Vectors are not always the same. In theory, if every IV was different, it would be nearly impossible to obtain the network key; this is not the case. WEP comes with a 24 bit IV; therefore, giving the encryption 16 million unique values that can be used. This may sound like a large number, but when it comes to busy network traffic, it’s not.

Every IV is not different; and this is where the issues arise. Network hackers know that all the keys used to encrypt packets are related by a known IV (since the user entered WEP part of the key is rarely changed); therefore, the only change in the key is 24 bits. Since the IV is randomly chosen, there is a 50% probability that the same IV will repeat after just 5,000 packets; this is known as a collision.

If a hacker knows the content of one packet, he can use the collision to view the contents of the other packet. If enough packets are collected with IV matches, your network’s security can be compromised.

The Setup

My wireless network was powered by a Linksys WRT54G v6 wireless router; It is well known that this model is the most widely used wireless router. Out of the box, the Linksys router came with 1 CD which was nothing more than a visual step by step, what you should do to connect it.

A few things concern me with this router. There was no part in the setup that allowed me, or even told me to change my router’s default password. To change the password, I had to go into the router’s web-based setup utility; this was accessible via the IP address 192.168.1.1 in my Internet browser. The default username and password was admin. If someone was able to compromise the security on my network, they could have easily done this for me; and locked me out of my own network. Sure, I could have performed a hard reset on the router, but I’d have little luck without the Internet or any documentation to help.

If you’re looking to find your default username and password, there is quite a comprehensive list located at www.phenoelit.de My advice is to change this immediately, for it may save you some trouble down the road.

Being my first time, I decided to go easy; I set my router up with a basic WEP 64 encryption; it required a 10 digit hex key. I entered the key into the 2 other computers in my home, and I was ready to start.

Hardware

Out of everything I’ve experienced over the last couple weeks, this was the hardest obstacle, by far. I started with a Dell Latitude C610 notebook with a Linksys WPC54GS Wireless-G notebook adapter (Broadcom chipset) running Windows XP Pro; looking back, it was a bad choice.

When selecting hardware, be warned, not all network cards are the equal. It turns out that nearly 99% of the software used to crack network keys are not compatible with notebook cards that have a Broadcom chipset; the ones that were just didn’t work.

9 out of every 10 articles I read boasted the Orinoco Gold PCMCIA network card by Lucent was the absolute best pick and most compatible will all the good software. A trip to E-Bay, $30 later, and I was ready.

The software we will be using is strictly dependent on the chipset of the WNIC, and unfortunately, the operating system. Your best approach would be to research what software you will be using, and then find a card based on the chipset the software is compatible with.

There are many types of chipsets; too many, in fact, to mention. Linux-wlan.org has an unbelievably comprehensive list of WNICs and their corresponding chipset.

All the best programs are made for Linux; windows is certainly a drag when it comes to WLAN penetrating software, but if you don’t have Linux, don’t be too concerned.

It may be in your best interest to invest in a wireless card that has an external antenna jack. The Orinoco Gold WNIC I purchased has one, but since I’m compromising my own network in a short range, it won’t be necessary.

The Software

There are hundreds of applications you can use to do a variety of things with wireless networks. The largest list of software, that I came across, can be found at Wardrive.net. The term “wardriving” is more commonly used for this practice, and involves driving around neighborhoods to look for wireless networks. I refuse to use this term because that is not what I am doing; I am sitting in my home testing the vulnerabilities of my own network.

Let it be known, that it is not illegal to use software to detect the presence of wireless networks; however, if you crack the network and start “stealing” bandwidth, you could be in a world of trouble. Especially if you’re in Singapore.

Once I received my Orinoco card, I began re-installing software which did not previously work with my Linksys card. It was a nightmare; Windows XP kept getting in the way, software that had been moded to run on windows required daunting tasks for installation, some programs simply didn’t work, some required special run time modules to be installed.

After nearly 48 hours of time-wasting, aggravating, disappointment; I came across the answer. A small penguin shone a beam of light upon my browser and blessed me; I found Auditor.

(2/6/07 - The link is currently not working, but you can obtain Auditor through any Torrent service.)

Auditor Security Collection is a self booting Linux-based CD that comes pre-loaded with all the best security software for auditing a system. It comes in a .ISO file that can be downloaded from remote-exploit.org; the ISO image file is roughly 649 Mb, and can be burned to a CD or DVD using most CD/DVD writing utilities.

It was truly amazing; a simple check in the Bios of the laptop to set the boot order to CD/DVD first, a slip of the Auditor CD, and a press of the power button was all it took. I was ready. Be not afraid of this Linux-based CD; everything is laid out on a GUI and all commands have “shortcuts” linking to them on a desktop similar to a windows environment.

Auditor Security Collection does not touch a single file on your hard drive. All files used and saved in the ASC are stored in your notebook’s RAM; once you remove the CD and reboot, everything is exactly as it was.

Detecting my wireless network

If you’ve come this far, believe me, you’re doing well. The first step is to find the network you want to penetrate. As there are a variety of apps that allow you to do this, we will be focusing in on the 2 most popular: Netstumbler, and Kismet.

Netstumber - is a widely popular tool used for detecting 802.11a/b/g wireless networks. The latest version is Netstumbler 0.4.0, and will run in Windows XP. For compatible hardware and requirements, you can check the read me on the Netstumbler forums; or you could just try it. I’d like to point out that many sources have said the Linksys WPC54G/S WNIC does not work with Netstumbler; however, I have been able to make it work by launching the program, then removing and re-inserting the WNIC. The Orinoco Gold works fine with Netstumbler.

Kismet - does a little more than just detecting networks. Aside from providing every detail about a network except the encryption key, Kismet is a packet sniffer and intrusion detection system; we’ll get into sniffing packets a little later.

For this demonstration, we’ll be using the pre-loaded Kismet on the Auditor Security Collection. After inserting and booting the Auditor CD, I was ready to make sure everything was working properly.

From this point, the first thing that needed to be done was to ensure the wireless card was recognized by Auditor; to do this, you will have to venture into the dark world of the command prompt. In Auditor, the command prompt can be reached by clicking on the little black monitor icon located at the bottom of your screen.

Simply typing in iwconfig will allow you to see all the wireless extensions configured on the machine. If you see a screen full of data next to a WLAN0 or ETH0, you’re ready to continue to the next step; otherwise, you will see a list of “no wireless extensions” messages.

Next, you will need to start the Kismet program. You’ll initially be prompted to enter a destination to save data to; you can just select the ’desktop’ and continue. When Kismet loads, you will see a black screen with green text showing all the wireless networks within you signal range.

Kismet will give you all the information you need to start cracking. Pressing ’s’ on your keyboard will bring up a ”Sort Network” dialogue box. From there you can press any of the desired sorting methods. This step is important as it allows you to select a particular wireless network on a list to view more details. Select your network with the arrow keys and press enter.

You will then be looking at nearly all your network details such as name, ssid, server IP, bssid, etc… Most are not relevant in this case, but you should write down a few things:

1. BSSID
2. Channel #
3. Encryption method

Pressing ‘x’ in Kismet will return you to the previous screen. re-select your target WLAN; then press ‘SHFT+C’ to bring up a list of associated clients to the Access Point. Write down the MAC address of all clients as it will prove useful.

Capturing packets

While you may have not been aware, at this point, Kismet has also been capturing packets. This is the bread and butter of cracking any wireless encryption; without data to process you have nothing.

Capturing packets, also known as packet sniffing, is the process of intercepting and logging traffic passing over a network. As information is sent and received over your wireless network, the software captures every packet to allow you to analyze and decode it.

Capturing network traffic can be a timely process; especially if it is a slow network. With no-one on any computers in my home, I generally capture around 3,000 packets within 5 minutes; with users on the other 2 computers, this number is substantially greater. Don’t get confused, it’s not the packet itself that we want; but rather the IVs in the packets.

The programs we will be using to sniff packets are Kismet and Airodump (part of the Aircrack Suite). We’ve already touched Kismet, so lets take a look at Airodump.

Before running Airodump, you must configure your wireless interface to go into ’monitor’ mode; the methods to achieve this require you to go back to the command prompt (konsole).

For most WNICs, you would use the command:
iwconfig mode monitor

And in some instances would have to set the channel number on your WNIC to match that of the target access point:
iwconfig channel #

Note that you will have to replace with the network interface specific to your machine. Using an Orinoco Gold card, my network interface was eth0; but on most machines, it is wlan0 or ath0. So you may have to adjust those commands accordingly. You can find out for sure by simply typing iwconfig.

I should also point out that putting the Orinoco Gold card in ‘monitor’ mode had a different command altogether:
iwpriv eth0 monitor 2 1

Once your in monitor mode, you’re ready to run Airodump. The command used to start Airodump is:
airodump [mac filter]

can be anything you wish; Airodump will put a .cap extension on the end of the name. The mac filter is used to only capture packets from a specific access point. For instance, I used:
airodump eth0 george 00:18:f8:65:fe:41
to capture packets just from my access point - where 00:18:f8:65:fe:41 is the BSSID of the AP.

Airodump looks similar to Kismet, but there are no selectable objects on the screen; it gets right down to it, capturing packets and storing them in the .cap file as defined in the command. You’ll notice Airodump keeps a running count of all the packets captured, and better yet, shows you the number of IVs collected.

The waiting game

The hard truth is that you will need to collect nearly 150,000 IVs to crack a 64 bit WEP key, and around 600,000 IVs to crack a 128 bit WEP key. This number varies, but is mostly dependent on how luck you are. If you watch the IV count in Airodump, you’ll notice that, under normal circumstances, they do not rise rapidly.

This can cause a problem; particularly if you’re as impatient as I am. Let’s take a look at some ways we can speed up this process.

Until now, we’ve been using a method known as a passive attack. A passive attack is basically doing nothing other than passively capturing packets until you have achieved enough data to perform the crack.

Most access points need their client to re-associate after a certain period of time to confirm their connection; therefore, the AP will send out an Address Resolution Protocol (ARP) packet. The ARP packet is unique in that is always addressed to the MAC address FF:FF:FF:FF:FF:FF, usually has a size of 68 bytes, and has the ToDS flag set.

We can use this information to implement an ARP replay attack. For this method, we will be using Aireplay (part of the Aircrack Suite). Aireplay can be used to actually re-send packets that it has received.

Leave Airodump running, and open a new command window. The command we’ll be using for Aireplay is:
aireplay -i -m 68 -n 68 -d ff:ff:ff:ff:ff:ff -b 00:18:f8:65:fe:41 eth0

The -i tells Aireplay to capture packets on the fly; the -m 68 and -n 68 tells aireplay that you only want it to replay packets that are 68 bytes. The -d and -b are the destination MAC address and AP MAC Address(BSSID) respectively. This is the criteria that is defined for our ARP packet, which is usually associated with an IV.

Alternatively, you may have already captured one of these packets. You can have Aireplay check the .cap file from Airodump with the -f switch:
aireplay -f george.cap -m 68 -n 68 -d ff:ff:ff:ff:ff:ff -b 00:18:f8:65:fe:41 eth0

In either case, If Aireplay finds a match to our specifications, it will show you the details of the packet and ask if you would like to replay it. If the details look exactly as shown below, press ‘y’ for yes.

FromDS = 0, ToDS = 1
BSSID =
Src. MAC =
Dst. MAC = ff:ff:ff:ff:ff:ff

Aireplay will then begin to replay the packet; if you’ve found a winning packet, you will notice your packet and IV count in Airodump rise extremely quick. If not, only the packet count in Airodump will rise; If this be the case, press CTRL+C to abort the operation, restart aireplay, and try again.

It has been noted that some routers will detect this erratic behavior and block the MAC address of the WNIC you are using. Adding a -x switch followed by a “replay per second #” will slow down the rate at which Airplay replays these packets.

If your lucky enough, you will have collected enough IVs in little time. For me, it took 28 minutes including booting up, writing down the network specs, and typing all those lengthy commands.

There are other methods such as Dueth attacks which force the clients off the AP, causing them to have to re-associate; but these methods require a second computer.

The crack

Two of the most popular programs used for actually cracking the WEP key are Airsnort and Aircrack. Airsnort can be used with the .dump files that Kismet provides; and Aircrack can be used with the .cap files that Airodump provides.

Airsnort can be used on it’s own without any other software capturing packets; although, it has been reported to be extremely unstable in this state, and you should probably not chance loosing all your captured data. A better method would be to let Airsnort recover the encryption key from your Kismet .dump file. Kismet and Airsnort can run simultaneously.

For this demonstration, we’ll be using Aircrack. You can use Airodump to capture the packets, and Aircrack to crack the encryption key at the same time.

With Airodump running, open a new command window and type:
aircrack -f 3 -n 64 -q 3 george.cap

The -f switch followed by a number is the fudgefactor; which is a variable that the program uses to define how thoroughly it scans the .cap file. A larger number will give you a better chance of finding the key, but will usually take longer. The default is 2.

The -n switch followed by 64 represents that you are trying to crack a WEP 64 key. I knew because it was a setup; In the real world there is no way to determine what WEP key length a target access point is using. You may have to try both 64 and 128.

The -q 3 switch was used to display the progress of the software. It can be left out altogether to provide a faster crack; although, if you’ve obtained enough unique IVs, you should not be waiting more than a couple minutes.

A -m switch can be used, followed by a MAC address, to filter a specific AP’s usable packets; this would come in handy if you were collecting packets from multiple APs in Airodump.

Aircrack recovered my WEP 64 key within 1 minute using 76,000 unique IVs; the whole process took around 34 minutes.

The same experiment was repeated with WEP 128 and it took about 43 minutes. The reason it was not substantially longer is because I simply let Airplay replay more packets. Sometimes you can get lucky and capture an ARP Request packet within a few minutes; otherwise, it could take a couple hours.

After I had access to the network, many doors opened up. Aside from having access to the Internet, I was able to use Networkview - a network discovery tool - to obtain my network’s workgroup name. From there, I had access to all the shared files on my drives.

While I’m no expert in the subject, I can at least assume that many horrible things could happen if the wrong hands were to obtain my WLAN encryption key.

The conclusion

Always use WPA or WPA2 encryption when possible. If your using WPA with a pre-shared key, use a strong password; hackers can use dictionary attacks, and they will be quite effective if you have an easy password. You may want to use a strong password generator like the one at grc.com.

If your access point supports it, you may want to consider disabling wireless SSID broadcast; however, this may raise some issues with the APs clients recognizing it. (Kismet will still recognize it)

Many routers will allow you to filter what clients can access the network; this is known as Wireless MAC Filtering. If you know the MAC address of the clients you are using, you can enter them into your configuration utility as “Permit ONLY”. This is not a 100% effective method; MAC addresses can be cloned to match the AP’s associated clients, but it does provide you with a slightly higher level of security. (there is a utility on Auditor to allow you to do this)

By default, your router may be set to mixed mode; this allows 802.11b and 802.11g devices to access your network. If you use only 802.11g devices, set your router to G-ONLY. Had my router been set this way, I would have never been able to do any of this. The Orinoco Gold card is 802.11b, and is obviously not compatible with a 802.11g network. Many 802.11g cards are not supported by the software we’ve used in this tutorial, but few are. While your at it, please change your default router username and password.

While I haven’t tried my hand at cracking a WPA encryption, the methods are similar when the WLANs use pre-shared keys (psk); I do plan on trying it, and I will surely write an update to let you know how/if it was done.

By no means am I claiming to be an expert in this field; If you’ve noticed anything that was incorrect or just have something to add, please feel free to drop a comment.

Update Feb 2009: How WPA wireless networks are hacked, and how to protect yourself
StatCounter - Free Web Tracker and Counter

Related:
# Xbox 360 raises security issues with Apple’s 802.11n wireless network
# New "paint" provides wireless network protection without encryption
# Wireless Internet users more web savvy according to recent U.S. survey
# FCC moves toward wireless Internet plan despite carrier’s pleas
# Cox bundling Sprint wireless, building possible LTE 4G network

Wednesday, May 13, 2009

Make Your Pc Faster, Guaranteed only for my sweet

1. First, run a scandisk or checkdisk. Let Windows fix any errors.



2. Run a disk cleanup utility...this will flush your temporary internet folder, trash can, temp system files, etc.



3. Delete any garbage files or data...if possible, run a Duplicate File Finder program.



4. Run Defrag on all partitions (NOTE: run this after you have deleted all trash and excess files!)



5. Run a registry cleaner utility and delete or get rid of any orphaned entries in that registry.



6. Check your exisiting swap file for it's size and location (*will explain location later in the post). If you have alot of ram (i.e. 1 gig and over) set this swap file to something small, like 250 mb. The reason is that this will force Windows to load more into memory, resulting in faster performance (note: some games and applications actually require a certain sized swap file so check your applications performance after making a size adjustment for any error messages.)



7. Under XP, you can tell Windows to use Classic Style on your desktop, - this will remove the neat single click and internet-style desktop but for lower end systems this will improve performance in other areas, such as gaming and multi-tasking.



8. Run msconfig and under startup and only keep the programs that are essential to load in the tray icon (and hence stay resident in memory). Uncheck anything else non-essential, like an ATI or Nvidia control panel, Quicktime utility, Real Audio, etc.



9. Upgrade drivers! Check for the latest BIOS, video, motherboard, sound, etc drivers from the manufacturers. Alot of my friends had chipsets on their motherboard that had advanced disk management capabilities or AGP port settings but the drivers weren't loaded for them so they were never being used. A simple upgrade realized a noticeable difference. For instance, they didn't have the latest driver for their AGP port so it was set to 1x, instead of being used at 4x!



10. (OK, so this won't speed up your PC but it could save you alot of time and trouble later on!) After making all these improvements, make a working backup! I use Ghost, but for XP users you can also use System Restore...



-FOR ADVANCED USERS-



1. Take a look under the hood (for IDE owners). How are your IDE devices configured? If you have more than 1 hard drive, put the master hard drive on the primary IDE channel and the secondary hard drive on the secondary IDE channel (most motherboards have two IDE channels).



2. Place all CDROM drives, DVD readers etc. on the secondary IDE channel (or SCSI bus, etc). This will reduce I/O contention with your master hard drive which should have your OS and apps installed...



3. Remember when I mentioned the location of the swap file? OK, if you have 2 hard drives and you have one on the primary IDE channel and the other on the secondary IDE channel, move the swap file to a partition ON THE SECOND hard drive (on the secondary IDE channel). This will greatly improve system performance as the PC can write to the swap file while loading and running OS and system commands without I/O contention on the primary IDE channel!



4. Take a look under the hood (for SCSI owners) What kind of SCSI do you have? If it's the newer Ultra 160/320 etc cards then guess what? Any devices placed on the same bus will automatically default to the slowest drive on the chain...this means that if you have say, an Ultra 160 SCSI card, and it has an Ultra 160 drive (capable of transferring 160 mb/sec) on the same chain as a SCSI cdrom drive (capable of only 40 mb/sec) then the whole bus slows down to the 40 mb/sec speed...use different chains for the slower devices and maximize those hard drives!



5. Run a utility like WCPUID and check the settings...is your CPU/front speed bus/AGP port running as fast as they should be? If not, check your drivers and BIOS configuration options. Also, are all of your chipset features enabled? If not, then enable them! (usually done in your BIOS!)



6. Dig in to the BIOS...check settings like boot order, for example...is it checking the floppy first? Change this! Select your order to reflect the hard drive first, then CD, then floppy for a noticeable boot time improvement. Also disable any non-used on board peripherals...for instance, - does your motherboard come with an on-board NIC card? Guess what, if you don't use that NIC card and it is enabled it will eat up valuable CPU cycles and can be detrimental to your systems' performance. DISABLE THAT MUTHA! Also, see if you can play with memory timing and CPU clock frequencies (NOTE! This is for expert users only!) Set these timings to "Aggressive" and see what happens in your games and apps...Also, check to see what your video aperature is set to. If you have a video card with 128 megs of on-baord memory, your aperature should be set to this amount too. Read the BIOS owner manual for further non-general performance tricks or improvements! Do you have the latest BIOS firmware version?



7. Under hardware properties, check to see that everything is working properly, and fix any hardware contention issues. You'll see the dreaded yellow exclamation point (!) beside any hardware componenet that is not working correctly.



8. Evaluate the potential for system/hardware upgrades...usually, the best bang for the buck is adding memory so buy all that you can afford (don't go much above 512 megs for Win 98 or ME). If you have a motherboard with an 8x - capable AGP port but you are using an older 4x video card, consider upgrading to an 8x card. You get the idea here...



9. Quit using software pigs like Norton system utilities, etc. These place files everywhere and can be a real system resource hog on lower end PCs.



10. Did I mention to make a good backup? Do it now! Also, while you're at it, run a good virus program with the latest definitions.



There are more options to make your system faster, such as overclocking, etc. but (just about) everything I've mentioned in this tech post costs you nothing and will result in faster system performance! Good luck and if you have any questions on how to do anything mentioned here, ask a knowledgeable friend or consult a book, - don't mess up something trying to do something you are not sure of!



Good luck and I'd like to dedicate this post to all of WorldWarez which has given me so much! You're all great, peeps!

Mobile Secret Codes: only for my darling .janu also pagal

Siemens Mobile Secret Codes:




C25:



SP unlock *#0003*(secret code 8 digits)#



*#0606# shows you Secret Code, but only without SIM Card.



*#06# for checking the IMEI (International Mobile Equipment Identity)



Resets language to automatic selection : * # 0000 # then Green button



Pin Out (electrical connections)



1- GND
2- SB
3- POWER
4- NC
5- TX
6- RX
7- CLOCK
8- DATA
9- GND MIC
10- HF MIC
11- AUDIO
12- GND AUDIO




Languages:



*#0000#+green phone - choose automaticaly
*#0001#+green phone - English
*#0030#+green phone - Greek
*#0031#+green phone - Netherlands
*#0032#+green phone - French
*#0034#+green phone - Spanish
*#0039#+green phone - Italian
*#0049#+green phone - German
*#0090#+green phone - Turkish



How to change PIN:



**04*old PIN*new PIN*new PIN#



How to check simlock status



*#0606# and then press left soft-key, you will see strange characters, then text ("brak blokad"). If you see for example 260-02, it means the phone is locked to Era GSM. In older models you can use *#06# and see the same information after clicking on left key (you will see IMEI and software version).




S4:



Monitor Mode - how to activate:



Press left soft-key, then 9 (SET UP) 8 (Phone Status). You will see IMEI number, then press left soft-key and in order 7684666 and red phone at the end (monitor mode has been activated). To read information from Monitor Mode - press left soft-key, then 5 (GSM SERVICE) and 6 (Monitor). Monitor mode turns off when you switch off the phone. You must activate it again if you want.



How to see date of software:



Press left soft-key, then 9 (SET UP) 8 (Phone status). You will see IMEI number, then press twice left soft-key, 98, left soft-key, 7684666, red phone (activates Monitor Mode), left soft-key, 56 (turns on Monitor Mode), left soft-key, 98, left soft-key, 7684666, hang up (red phone) >abck to "normal" and then left soft-key, 56.



S6, S8:



If you add to phonebook under 'own phone number' +12022243121 with namez (for example MMI), then you will see something smile.gif



S10, E10:



In phonebook enter +12022243121 as your own phone no. You will see a picture with sun, two palms and greetings.



S15e:



Monitor Mode:



Code: *#7436267*8378# (*#SIEMENS*TEST#)
Hold red phone button until it code disapears.
Menu 3.3.4 Choose frequency.
Menu 3.3.4.1 Automaticaly.
Menu 3.3.4.2 Choose GSM-900
Menu 3.3.4.3 Choose GSM-1800



Menu 10.1 MS info
Menu 10.2 Soft date
Menu 10.2.1 Software version.
Menu 10.2.2 EEProm version.
Menu 10.3 Tst and product info.
Menu 10.3.1 Handware data.
Menu 10.3.2 Date of manufacture
Menu 10.3.3 Service date
Menu 10.3.4 Date of repair.




S25:



Enhanced Full Rate
*#3370# turns on
#3370# turns off



Haft Rate Mode
*#4720# turns on
#4720# turns off.



Languages:



*#0000#+green phone - choose automaticaly
*#0001#+green phone - English
*#0030#+green phone - Greek
*#0031#+green phone - Netherlands
*#0032#+green phone - French
*#0034#+green phone - Spanish
*#0039#+green phone - Italian
*#0049#+green phone - German
*#0090#+green phone - Turkish



How to change PIN2?



**04*old PIN2*new PIN2*new PIN2#



What is my software version?



Menu 8-8-2 press left-softkey when you see IMEI number, or *#06# and then green phone button and then press left soft-key.



How to extend battery life:



IrDA - turn on only when you need.
Turn off automatic network search (6-3)Turn off Vibration alarm.



SP unlock *#0003*(secret code 8 digits)#



*#0606# shows you Secret Code, but only without SIM Card.



*#06# for checking the IMEI (International Mobile Equipment Identity)



Resets language to automatic selection : * # 0000 # then Green button







S25, M35, S35, C35



SP unlock *#0003*(secret code 8 digits)#



*#0606# shows you Secret Code, but only without SIM Card.



*#06# for checking the IMEI (International Mobile Equipment Identity)



Resets language to automatic selection : * # 0000 # then Green button












Secret Codes Of Nokia Mobiles:




Below we present secret codes of nokia mobile phones which are very useful for people who unlock phones and for amateurs of this topic. These special key sequences entered fromkeyboard of phone allow you to get some important information like IMEI number, release date, software version and much more. You can also choose default language, activatenetmonitor ect.




1610/1630



*#170602112302# (software version)



1610/1611



IMEI number: -*# 0 6 #
Software version: -* # 1 7 0 6 0 2 1 1 2 3 9 2 #
Simlock status: - # 9 2 7 0 2 6 8 9 #




2110



*#9999# (software version)



2110i/2110e



*#170602112302# or (depends on model)*#682371158412125# (software version)




NOKIA3110



*#06# -IMEI



*#3110# -Software version



##002# - allows to turn off voice mail.



*#7780# - restore factory settings



*#746025625#(or *#sim0clock#) - to check if clock of sim (SIM-Clock) can be stopped (SIM-Clock-stop is akind of standby mode which saces battery)



*#92702689# (or *#war0anty#) -"warranty code:"- you have to enter one of the following codes:



6232 (OK)displays month and year of production date (ie "0198")



7332 (OK) - displays date of last repair - if there is (ie. "DATE NOT SAVED")



7832 (OK) - displays date of purchase - if there is (ie. "DATE NOT SAVED")



9268 (OK) -displays serial number



37832 (OK) -sets purchase date in format MMYY (MM - month, YY - year)- attention: you can set it only once, so beware !



87267 (OK)-displays message "Confirm Transfer?" - meaning is unknown (?)



* # 9 2 7 0 2 6 8 9 # -Simlock info



*#31# (call) -sets if your phone no. will be hidden or not (works only in some networks)



*#76# (call) -sets if target phone number when you call should be displayed (works only in some networks)



*#77# (call) -(work s only in some networks)



*#33/35# (call -displays message "Service not active".



**31# (call) -your no. will not be showed to others when you make a call







3210




*#06# -IMEI



*#0000# -software version



*#92702689# (or *#war0anty#)- enters service mode.



*3370# -Turns on sound encoding system - Enhanced Full Rate.




#3370# -Turns off sound encoding system Enhanced Full Rate .



*4720# -Turns on battery save mode - saves about 30 % of energy.



#4720# -Turns off battery save mode.



xx# -Replace xx with desired phonebook entry - press # and you will see it on display.




51XX




*#06# -IMEI



*#0000# - Software version



*#92702689#( or *#war0anty#) Enter service mode.



*3370# -Turns on sound encoding system - Enhanced Full Rate.



#3370# -Turns off sound encoding system - Enhanced Full Rate.



*4720# -Turns on battery save mode - saves about 30 % of energy.



#4720# -Turns off battery save mode.



#pw+1234567890+1 -provider lock status



#pw+1234567890+2 -Network lock status



#pw+1234567890+3 -Provider lock status



#pw+1234567890+4 - SimCard lock status




NOKIA 61XX




*#06# -IMEI



*#0000# ;-*#99 99# (Nokia 6130)




*#92702689# (or *#war0anty#) Software versionEnter service mode.



*3370# -Turns on sound encoding system - Enhanced Full Rate.



#3370# -Turns off sound encoding system - Enhanced Full Rate.



*4720# -Turns on battery save mode - saves about 30 % of energy.



#4720# -Turns off battery save mode.




NOKIA8810




*#06# - IMEI



*#0000# -Software version



*#92702689# (or *#war0anty#) Enter service mode.



*3370# -Turns on sound encoding system - Enhanced Full Rate.



#3370# -Turns off sound encoding system - Enhanced Full Rate.



*4720# -Turns on battery save mode - saves about 30 % of energy



#4720# -Turns off battery save mode - saves about 30 % of energy







NOKIA99OO




*#06# -IMEI



*#682371158412125# -Software version



*#3283# -Displays week and year of manufacture, ie. 1497 means 14th week of 1997.







NOKIA 911O




*#06# IMEI




*#0000# SOFTWARE VERSION



*3370# Turns on sound encoding system - Enhanced Full Rate.



#3370# Turns off sound encoding system - Enhanced Full Rate.



*4720# Turns on battery save mode - saves about 30 % of energy.



#4720# Turns off battery save mode.







NOKIA 81XX




*#06# IMEI
*#8110# Software version
xx# Replace xx with desired phonebook entry - press # and you will see it on display



*#92702689# (or *#warOanty#)



"Warranty code:" - you have to enter one of the following codes:



9268 (OK) displays IMEI (International Mobile Equipment Identification)



6232 (OK) displays date of manufacture in format MMYY (MM - month, RR - year)




7832 (OK) displays date of purchase



7332 (OK) displays date of repair or upgrade



37832 (OK) sets date of purchase in format MMYY (MM - month, RR - year) - attention: you can set it only once, so beware !!!



87267 (OK) transmits user data/move data do service PC








Motorola Codes:







Motorola 920
---------------




Press menu and type one of these numbers and press OK:



11 = Status Review
13 = Available Networks
14 = Preferred Networks
22 = Select Keypad Tones
25 = Require SIM Card PIN
26 = Language Selection
32 = Repetitive Timer
33 = Single Alert Timer
34 = Set IN-Call Display
35 = Show Call Timers
36 = Show Call Charges
37 = Call Charge Settings
38 = Reset All Timers
43 = Reset All Timers
45 = Show Last Call
46 = Total For All Calls
47 = Lifetime Timer
51 = Change Unlock Code
52 = Master Reset
53 = Master Clear (Warning!! May result in deleting the Message Editor!!!)
54 = New Security Code
55 = Automatic Lock
63 = Battery Saving Mode



Free call tip



1 Enter the phone number
2 Enter OK
3 Type *#06#
4 Press Button C
5 And finally press the button for power off.



You should now be able to talk without being billed.




The 54# Tip:



Type 1#, 2#........54# on the keypad (when you're not in the menu) to get the phone number used for with this key when speed dialing.











Motorola 930
--------------




Press menu and type one of these numbers and press OK:



11 = Status Review
13 = Available Networks
14 = Preferred Networks
22 = Select Keypad Tones
25 = Require SIM Card PIN
26 = Language Selection
32 = Repetitive Timer
33 = Single Alert Timer
34 = Set IN-Call Display
35 = Show Call Timers
36 = Show Call Charges
37 = Call Charge Settings
38 = Reset All Timers
43 = Reset All Timers
45 = Show Last Call
46 = Total For All Calls
47 = Lifetime Timer
51 = Change Unlock Code
52 = Master Reset
53 = Master Clear (Warning!! May result in deleting the Message Editor!!!)
54 = New Security Code
55 = Automatic Lock
63 = Battery Saving Mode



Free call tip



1 Enter the phone number
2 Enter OK
3 Type *#06#
4 Press Button C
5 And finally press the button for power off.



You should now be able to talk without being billed.




Motorola 930



The 54# Tip:



Type 1#, 2#........54# on the keypad (when you're not in the menu) to get the phone number used for with this key when speed dialing.











Motorola 6200
--------------







(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.



De-activate RBS



To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.



These countries has been reported working:



UK (Orange)
AU



What's the use of RBS:



Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.



Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.



Pin Outs



Numbered left to right, keypad up, battery down



1. Audio Ground
2. V+
3. True data (TD) (input)
4. Downlink - Complimentary data (CD) (input)
5. Uplink - Return data (RD) (output)
6. GND
7. Audio Out - on/off
8. Audio In
9. Manual Test - ???
10. Battery Feedback
11. Antenna connector












Motorola 7500
-------------







(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.



De-activate RBS



To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.



These countries has been reported working:



IT (model: F16 HW: 5.2 SW: 2.1)




What's the use of RBS:



Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.



Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.



Pin Outs
Numbered right to left, keypad up, battery down looking



1. Gnd
2. Pos
3. True data (TD) (input)
4. Complimentary data (CD) (input)
5. Return data (RD) (output)
6. Audio gnd
7. Audio out
8. Audioin








Motorola 8200
--------------







(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.



De-activate RBS



To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.



These countries has been reported working:



ES, AU, NL, BE




What's the use of RBS:



Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.



Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.



Pin Outs



Numbered right to left, keypad up, battery down looking



1. Audio Ground
2. V+
3. True data (TD) (input)
4. Downlink - Complimentary data (CD) (input)
5. Uplink - Return data (RD) (output)
6. GND
7. Audio Out - on/off
8. Audio In
9. Manual Test - ???
10. Battery Feedback
11. Antenna connector











Motorola 8400
-------------







(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.



De-activate RBS



To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.



These countries has been reported working:



ES, AU, NL, BE




What's the use of RBS:



Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.



Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.



Pin Outs



Numbered right to left, keypad up, battery down looking



1. Audio Ground
2. V+
3. True data (TD) (input)
4. Downlink - Complimentary data (CD) (input)
5. Uplink - Return data (RD) (output)
6. GND
7. Audio Out - on/off
8. Audio In
9. Manual Test - ???
10. Battery Feedback
11. Antenna connector











Motorola 8700
--------------







*#06# for checking the IMEI (International Mobile Equipment Identity)



Activate RBS



(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.



De-activate RBS



To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.



These countries has been reported working:



AU, IT, SG, DE, ES, ZA



What's the use of RBS:



Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.



Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.











Motorola CD 160
---------------







Press menu and type one of these numbers and press OK:



11 = Status Review
13 = Available Networks
14 = Preferred Networks
22 = Select Keypad Tones
25 = Require SIM Card PIN
26 = Language Selection
32 = Repetitive Timer
33 = Single Alert Timer
34 = Set IN-Call Display
35 = Show Call Timers
36 = Show Call Charges
37 = Call Charge Settings
38 = Reset All Timers
43 = Reset All Timers
45 = Show Last Call
46 = Total For All Calls
47 = Lifetime Timer
51 = Change Unlock Code
52 = Master Reset
53 = Master Clear (Warning!! May result in deleting the Message Editor!!!)
54 = New Security Code
55 = Automatic Lock
63 = Battery Saving Mode



Free call tip



1 Enter the phone number
2 Enter OK
3 Type *#06#
4 Press Button C
5 And finally press the button for power off.



You should now be able to talk without being billed.











Motorola CD 520
----------------







Press menu and type one of these numbers and press OK:



11 = Status Review
13 = Available Networks
14 = Preferred Networks
22 = Select Keypad Tones
25 = Require SIM Card PIN
26 = Language Selection
32 = Repetitive Timer
33 = Single Alert Timer
34 = Set IN-Call Display
35 = Show Call Timers
36 = Show Call Charges
37 = Call Charge Settings
38 = Reset All Timers
43 = Reset All Timers
45 = Show Last Call
46 = Total For All Calls
47 = Lifetime Timer
51 = Change Unlock Code
52 = Master Reset
53 = Master Clear (Warning!! May result in deleting the Message Editor!!!)
54 = New Security Code
55 = Automatic Lock
63 = Battery Saving Mode



Free call tip



1 Enter the phone number
2 Enter OK
3 Type *#06#
4 Press Button C
5 And finally press the button for power off.



You should now be able to talk without being billed.











Motorola d460
--------------







#06# for checking the IMEI (International Mobile Equipment Identity)



Activate RBS



(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.



De-activate RBS



To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.



What's the use of RBS:



Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.



Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.











Motorola V3688
---------------







#06# for checking the IMEI (International Mobile Equipment Identity)



Enhanced Full Rate Codec (EFR):



To Enable EFR press [][][] 119 [] 1 [] OK.
To Disable EFR press [][][] 119 [] 0 [] OK



NOTE: Nothing appears on Screen.











Ericsson Mobile Secret Codes:




T10



*#06# for checking the IMEI (International Mobile Equipment Identity)



>*<<*<* for checking the firmware revision information (software release)



>*<<*<*>> n-row text strings. if pressing yes you can check the phones text programming in currently selected language.



Shortcut for Last Dialed call menu



If you for some reason don't want to enter the 'Last Dialed calls menu' by using the 'YES' key you can use the following key
stroke instead: First '0' then '#'.



Access menu without Sim card



To access to the menu in your phone without having a card inside do the following: type **04*0000*0000*0000# When display say "Wrong Pin" press NO and you have access to the all menus: Info, Access, Settings, Calculator, Clock, Keylock On?, Mail, Phone book. NOTE if you try this on your phone may stop at Keylock On? menu and you´ll have to take your battery out to turn the phone on again. And this will not care about Phone lock!



A way to (un)lock your cell phone on to the network(subset):
1. Press <**<
2. Then on the display appear and give you two choices: Lock to Network ? and Lock to Network subset? (Use arrow keys to select)
3. Enter the NCK number (code is provided by the SP)
4. You have 5 attemps to do this
5. Then your cell phone will work 'only' with the network



Warning: The Service Provider (SP) Lock menu is used to lock the cell phone to the SP's SIM card. Once the cell phone is locked to a specific operator, if one inserts a SIM card from a different operator the phone will refuse to accept it! The cell phone will however accept another SIM card from the same operator. To activate/deactivate this lock one needs a special secret code that is not available to the end user. Your phone can be locked to a service provider FOREVER by doing this! If an invalid code is entered all five times, the menu will exit and be deactivated! Any further attempt to activate the NCK/NSCK lock Menu will result in the response "Not allowed"! However the NCK/NSCK lock can be recover through a direct clearing in the EEPROM.



Message Report



When you writing a message, place at the start of it the code *0# and continue with your message. It's job is like nokias report. It gives you information about the sended message.



T18



*#06# for checking the IMEI (International Mobile Equipment Identity) Information you get from the IMEI:



XXXXXX XX XXXXXX X



TAC FAC SNR SP



TAC = Type approval code
FAC = Final assembly code
SNR = Serial number
SP = Spare



To access SIM-Locking menu of your phone, press: < * [CLR] <
Be careful or you may lock your phone.



Message Report



When you writing a message, place at the start of it the code *0# and continue with your message. It's job is like nokias report. It gives you information about the sended message.



T28



*#06# for checking the IMEI (International Mobile Equipment Identity)



>*<<*<* for checking the firmware revision information (software release)



>*<<*<*> 1-row text strings. if pressing yes you can check the phones text programming in currently selected language.



>*<<*<*>> n-row text strings. if pressing yes you can check the phones text programming in currently selected language.



The Service Provider (SP) Lock



The Service Provider (SP) Lock menu is used to lock the cell phone to the SP's SIM card. Once the cell phone is locked to a specific operator, if one inserts a SIM card from a different operator the phone will refuse to accept it! The cell phone will however accept another SIM card from the same operator.



To activate/deactivate this lock one needs a special secret code that is not available to the end user.



Here is how to activate the menu:



<**< Lock to Network? if pressing yes you have 5 attempts to enter NCK.



<**<< Lock to Network subset? if pressing yes you have 5 attempts to enter NSCK.



Warning: Your phone can be locked to a service provider FOREVER by doing this! If an invalid code is entered all five times, the menu will exit and be deactivated! Any further attempt to activate the NCK/NSCK lock Menu will result in the response "Not allowed"! However the NCK/NSCK lock can be recover through a direct clearing in the EEPROM.



Shortcut for Last Dialed call menu



If you for some reason don't want to enter

If you for some reason don't want to enter the 'Last Dialed calls menu' by using the 'YES' key you can use the following key
stroke instead: First '0' then '#'.



Message Report



When you are writing a message, place at the start of it the code *0# and continue with your message. It's job is like nokias report. It gives you information about the sended message.







388



*#06# for checking the IMEI (International Mobile Equipment Identity)



*#0000# to reset the phones menu-language to English.



>*<<*<* for checking the firmware revision information (software release)



>*<<*<*> 1-row text strings. if pressing yes you can check the phones text programming in currently selected language.(298 entries)



>*<<*<*>> n-row text strings. if pressing yes you can check the phones text programming in currently selected language.(160 entries?)



The Service Provider (SP) Lock menu is used to lock the cell phone to the SP's SIM card. Once the cell phone is locked to a specific operator, if one inserts a SIM card from a different operator the phone will refuse to accept it! The cell phone will however accept another SIM card from the same operator.



To activate/deactivate this lock one needs a special secret code that is not available to the end user. (not even to you... or is it ? in case please let me know!)



<**< Lock to Network? if pressing yes you have 5 attempts to enter NCK.



<**<< Lock to Network subset? if pressing yes you have 5 attempts to enter NSCK.



Warning: Your phone can be locked to a service provider FOREVER by doing this! If an invalid code is entered all five times,the menu will exit and be deactivated! Any further attempt to activate the NCK/NSCK lock Menu will result in the response "Not allowed"! However the NCK/NSCK lock can be recover through a direct clearing in the EEPROM.



Shortcut for Last Dialed call menu...



If you for some reason don't want to enter the 'Last Dialed calls menu' by using the 'YES' key you can use the following key
stroke instead: First '0' then '#'.



Access menu without Sim card ...



To access to the menu in your phone without having a card inside do the following: type **04*0000*0000*0000# When display say "Wrong Pin" press NO and you have access to the all menus: Info, Access, Settings, Calculator, Clock, Keylock On?,Mail, Phone book. NOTE if you try this on the GH688 your phone may stop at Keylock On? menu and you´ll have to take your battery out to turn the phone on again.



GA628



*#06# for checking the IMEI (International Mobile Equipment Identity)



*#0000# to reset the phones menu-language to English.



*#103# then YES Time and date will be shown.



>*<<*<* for checking the firmware revision information (software release)



>*<<*<*> 1-row text strings. if pressing yes you can check the phones text programming in currently selected language.(298 entries)



>*<<*<*>> n-row text strings. if pressing yes you can check the phones text programming in currently selected language.(160 entries?)



The Service Provider (SP) Lock



The Service Provider (SP) Lock menu is used to lock the cell phone to the SP's SIM card. Once the cell phone is locked to a specific operator, if one inserts a SIM card from a different operator the phone will refuse to accept it! The cell phone will however accept another SIM card from the same operator.



To activate/deactivate this lock one needs a special secret code that is not available to the end user.



Here is how to activate the menu:



<**< Lock to Network? if pressing yes you have 5 attempts to enter NCK.



<**<< Lock to Network subset? if pressing yes you have 5 attempts to enter NSCK.



Warning: Your phone can be locked to a service provider FOREVER by doing this! If an invalid code is entered all five times,the menu will exit and be deactivated! Any further attempt to activate the NCK/NSCK lock Menu will result in the response "Not allowed"! However the NCK/NSCK lock can be recover through a direct clearing in the EEPROM.



Shortcut for Last Dialed call menu



If you for some reason don't want to enter the 'Last Dialed calls menu' by using the 'YES' key you can use the following key
stroke instead: First '0' then '#'.



Bat. level indicator when turned OFF



When the phone is turned off and the phone is not changing - the bat. level can be seen for a short period of time by pressing the 'NO' key quick once (it has to be quick!) and then wait for about 2 sec. The bat. level will now be shown in the display at its normal position.



Access menu without Sim card



To access to the menu in your phone without having a card inside do the following: type **04*0000*0000*0000# When display say "Wrong Pin" press NO and you have access to the all menus: Info, Access, Settings, Calculator, Clock, Keylock On?,Mail, Phone book. NOTE if you try this on your phone may stop at Keylock On? menu and you´ll have to take your battery out to turn the phone on again.



Alarm Clock Menu



Go to MissedCall Empty the list Press the -> key for a second or two The option Menu size turns up Choose 'yes' and go from there.



An alarm clock turned up too but it never rang. I think this was because there is no clock in the phone.



Free phone calls using the GA628



This trick has only been reported working on PREPAID GSM CARDS and in some countries and with some sw versions.
The prepaid GSM SIM CARD is a kind of "SIM card" which only has a sertant amount of credit on it (like a normal phonebox telecard)... if it can be traced? - we don't know...



Well..here's the trick you dial the no. normally and press YES. While "connecting" is shown on the screen, the following procedure should be carried out: Press CLR then 0 then # and then NO (twice) so as to switch OFF the phone. You can then still speak on the phone while it is switched off but the SIM card does not record your calls which will lead to FREE phone calls in some countries.. we hope!!



Another variant of the code



Make a Call, while the phone says Connecting type 083# (the position 83 must be empty! ), when phone says Pos Emtpy, press the NO key and turn off the phone.



If you can make the call with the phone turned off you will face a problem when you need to hang up the phone...the only way for you to do that is remove the battery...???

A Small Guide to Hacking HOTMAIL

HOTMAIL HACKING INFO.







I_1_I - akash force hacking


a. Use telnet to connect to port 110 (Hotmail´s pop-server)



b. Type USER and then the victim´s username



c. Type PASS and then the guess a password



d. Repeat that until U have found the correct password.



!. This is called brute force hacking and requires patience.



It´s better than trying to guess the victims password on



hotmail homepage only because it´s faster.



____



I_2_I - The Best way



a. Get the username of the victim (It usually stands in the adress-field



)



b. Then type " www.hotmail.com/cgi-bin/start/victimsusername "



c. U´re in!



!. This hack only work if U are on the same network or computer as the



victim and if he don´t log out.



____



I_3_I - The old way



a. Go to http://www.hotmail/proxy.html



b. Now type the victims username. (press login)



c. Look at the source code.



d. On the fifth row U should find "action=someadress"



e. Copy that adress and paste it into the adress-field



f. You are in...



!. As you can see it´s a long procedure and the victim have



plenty of time to log out.



____



I_4_I - Another...



a. Go to hotmail´s homepage



b. Copy the source code.



c. Make a new html file with the same code but change method=post to



method=enter



d. "view" the page



e. Change the adress to www.hotmail.com/ (don´t press enter!)



f. Make the victim type in his username and password



g. Look in the adress-field. There you´ll see ...&password:something...



!. This is the way I use, because it lets you know the password.



(If he exits the browser U can see the password in the History folder!)



READ!



Hotmail´s sysops have changed the "system" so that the victim may log



out even



if U are inside his/her account. So don´t waste U´r time!



---



So you want to get some hotmail passwords?



This is pretty easy to do once you have got the hang of it.



If you are a beginner, I wouldn't make this your first attempt at



hacking. When you need to do is use a port surfer and surf over to



port 80. While there, you have to try and mail the user that you



want the password from. It is best to mail them using the words



"We" and "Here at Hotmail..." Most suckers fall for this and end



up giving out their password. There is another way to also, you can



get an anon mailer, and forge the addres as staff@hotmail.com. But



you have to change the reply address to go to a different addres



like user@host.com. The person that you are trying to get the pass



from MUST respond to that letter for the mail to be forwarded to you.



Have text like "Please reply to this letter with the subject "PASSWORD"



and underneith please include your user name and password.



If you have trouble Loging in withing the next few days, this is



only because we are updating our mail servers but no need to worry,



your mail will still be there. Even though the server may be down



for an hour. From the staff at Hotmail, Thank You."

akash tips & tricks

About Me

My photo
mumbai, mumbai, India
akash....... hacking tips & track plz use only for knowledge plz dont use misuse..........