iam not sure ok akash
there are simple tricks on how to self clean virus on Symbian phone that will hard reset your mobile device to its factory default condition but in case the security code, which is required before you can proceed to hard reset your mobile device has been changed (default one is 12345) and you cannot recall the right one, here is another useful code that can be used to hard reset your mobile phone to original factory condition without worrying about the security code correctness.
For the start, make sure the phone is in OFF condition. On the phone keypad, press and hold down the key ‘3’, ‘*’ and ‘Talk’ buttons simultaneously, then followed by a power ON button press. Wait for few seconds until a ‘formatting’ word appeared on the mobile screen and then release the buttons. The whole process will take less than one minute with the progress bar showing the status of formatting. Again be cautious that by doing these combination button press you are actually doing a deep hard reset on your mobile, which also means it will erase everything including your profile, personal data and put the phone back to factory default setting.
This is especially useful whenever your symbian mobile phone is experiencing software instability due to virus infection or installed applications
and without costing you any cent, the simple tips will help you recover them in simple steps.
Saturday, May 16, 2009
Recharge your mobile from your ATM card
akash
dont use but iam not sure
Now you can recharge your mobile from your atm.
just go to your atm and put your password click on services-then click on mobile registration they will ask you to enter your mobile no and then you will recieve a message on your mobile in which a special code will be given and you just have to write your account will be echarged.
CAUTION: for sbi users only
dont use but iam not sure
Now you can recharge your mobile from your atm.
just go to your atm and put your password click on services-then click on mobile registration they will ask you to enter your mobile no and then you will recieve a message on your mobile in which a special code will be given and you just have to write
CAUTION: for sbi users only
Where is Restore point in vista?
???i want to create a restore point in my vista for safety please guide me if you know how.
It is in
Control Panel >> System >> System Protection >> Create
It is in
Control Panel >> System >> System Protection >> Create
Nokia phone tips , tricks, codes , IMEI and software tricks.
a k a s h
Nokia Codes Tips and Tricks
To check the IMEI (International Mobile Equipment Identity) Type-*#06#
Information you get from the IMEI-
XXXXXX XX XXXXXX X
TAC FAC SNR SP
•
TAC = Type approval code
•
FAC = Final assembly code
•
SNR = Serial number
•
SP = Spare
To check the phones Software revision type-*#0000#
Information you get from the Software revision-
V 05.31
18-02-99
NSE-3
•
1ST Line = Software revision
•
2ND Line = The date of the software release
•
3RD Line = Phone type
To enter the service menu type-*#92702689# (*#WAR0ANTY# )
•
Serial number (IMEI)
•
Production date (MM/YY)
•
Purchase date (MM/YY) You can only enter the date once.
•
Date of last repair (0000=No repair)
•
Transfer user data to another Nokia phone via Infra-Red
Clock StoppingTo check weather your SIM Card supports clock stopping type-
*#746025625# (*#SIM0CLOCK# )
Revealing the Headphone and Car-Kit menusPlease note that if you do these next tricks, the new menus can't be erased without retoring the factory default settings. To do these tricks you need to short-circuit the pins on the bottom of the phone next to where you plug in you charger.
1. To activate the "Headset" menu, you need to short-circuit pins "3" and "4". After a short time the word "Headset" will be shown in the display. Menu 3-6 is now enabled.
2. To activate the "Car" menu, you need to short-circuit pins "4" and "5". After a short time the word "Car" will be shown in the display. Menu 3-7 is now enabled.
THE REBOOT TRICKThis should work on all software versions of the 6110.
1. Go to the Calendar (Menu-Cool
2. Make a note or reminder.
3. Enter some text into the edit box.
4. Hold "Clear" until the whole text is cleared, then press "Back".
5. Press "0". The main screen will now be showing but a space appears on the screen. (you can't see it)
6. Enter 4 digits (e.g. 1234).
7. Use the down arrow to move the cursor to the left side of the numbers and the space (Down arrow twice).
8. Now enter 6 digits and press the call button.
Wait for a few seconds, the screen should start to flash and reboots. It should alsowork on other menus like the "Profiles" menu.
EFR CALL QUALITYTo activate EFR (Enhanced Full Rate) Enter the code-
*3370#
This improves call quality but decreases batterylife by about 5%
To deactivate it, Enter the code-
#3370#
THE JAMES BOND TRICKIf you short-circuit theleft middle and right pins on the bottom of the phone with all connections touching each other, the Nokia software hangs! The profile "Headset" will be activated. Before you do this just activate the "Automatic Answer" in the headset profile and set the ringing volume to "Mute". Now you can use your phone for checking out what people are talking about in a room. Just place it under a table in a room and call it. The phone receives the call without ringing and you can listen to what people are saying.
NETWORK MONITOR
There is a hidden menu inside your Nokia phone. If you want to activate it, you'll have to re-program some chips inside of your phone.
1.
Check your software version. You can only continue if you have v4.33, v4.73 or v5.24.
2.
Take apart the phone.
3.
De-solder the EEPROM (ATMEL AT 24C64).
4.
Read out the data with an EEPROM programmer and save it to a file (Backup).
5.
If you have v.33 or v4.73, change the address "03B8" from "00" to "FF".
6.
If you have v5.24 then change the address "0378" from "00" to "FF".
7.
Write the new data to the EEPROM and solder it back to the phone,
8.
Power on your phone and you should have "Netmonitor" enabled.
The Network Monitor gives you the following information.
•
Carrier number
•
MS RX Level in DBM
•
Received signal quality
•
MS TX power level
•
C1 (Path loss criterion, used for cell selection and reselection) . The range is -99 to 99.
•
RTL (Radio link timeout).
•
Timeslot
•
Indication of the transmitter status
•
Information on the Network parameters.
•
TMSI (Temporary Mobile Subscriber Identity).
•
Cell identification (Cell ID, Number of cells being used).
•
MCC (Mobile country code)
•
MCN (Mobile network code)
•
LAC (Location area code)
•
Ciphering (On/Off)
•
Hopping (On/Off)
•
DTX (On/Off)
•
Discard cell barred information
CHECK SIM-LOCKNote - If you bought your Nokia on UK Vodafone or UK Cellnet you do not need to check this because they both transmit on GSM900, and they don't lock the phones. However if you bought your phone on UK Orange or UK One2one your phone may be blocked. The reason is that they both transmitt on GSM1800. To make a call on GSM1800 you need what is known as a "Dual band" phone. A dual band phone is able to transmit on both GSM900 and GSM1800, so they lock the phones so you can't use it with any other network simcard. If you find that your phone is locked you can try different software to unlock it. (we havn't found one that works yet), or you can ask your service provider who will gladly exchange the 10 digit code for about £35.
This is how to check the status of the 4 different locks. Aslo don't try entering the wrong number, because after 3 times it will block the phone for good.
There are 4 different locks on your Nokia phone.
•
COUNTRY-LOCK
•
NETWORK-LOCK
•
PROVIDER-LOCK
•
SIMCARD-LOCKThe code to read out the sim-lock status of your phone is
#PW+(MASTERCODE) +(Y)#
•
# = DOUBLE-CROSS
•
W = PRESS "*" THREE TIMES
•
P = PRESS "*" FOUR TIMES
•
+ = PRESS "*" TWO TIMES
•
MASTERCODE = 1234567890
•
Y = NUMBER 1 TO 4
The master code is a secret code. The code has 10 digits, To read out the sim-lock status you can enter every combination you want!
"Y" Shows the status of the network-lock. Here you can enter a number from "1" to "4". The "4" is for the sim-card lock.
SIM-LOCK CHECKS
•
#PW+1234567890+ 1# = GIVES PROVIDER-LOCK STATUS
•
#PW+1234567890+ 2# = GIVES NETWORK-LOCK STATUS
•
#PW+1234567890+ 3# = GIVES COUNTRY-LOCK STATUS
•
#PW+1234567890+ 4# = GIVES SIM-CARD-LOCK STATUS.
Nokia Codes Tips and Tricks
To check the IMEI (International Mobile Equipment Identity) Type-*#06#
Information you get from the IMEI-
XXXXXX XX XXXXXX X
TAC FAC SNR SP
•
TAC = Type approval code
•
FAC = Final assembly code
•
SNR = Serial number
•
SP = Spare
To check the phones Software revision type-*#0000#
Information you get from the Software revision-
V 05.31
18-02-99
NSE-3
•
1ST Line = Software revision
•
2ND Line = The date of the software release
•
3RD Line = Phone type
To enter the service menu type-*#92702689# (*#WAR0ANTY# )
•
Serial number (IMEI)
•
Production date (MM/YY)
•
Purchase date (MM/YY) You can only enter the date once.
•
Date of last repair (0000=No repair)
•
Transfer user data to another Nokia phone via Infra-Red
Clock StoppingTo check weather your SIM Card supports clock stopping type-
*#746025625# (*#SIM0CLOCK# )
Revealing the Headphone and Car-Kit menusPlease note that if you do these next tricks, the new menus can't be erased without retoring the factory default settings. To do these tricks you need to short-circuit the pins on the bottom of the phone next to where you plug in you charger.
1. To activate the "Headset" menu, you need to short-circuit pins "3" and "4". After a short time the word "Headset" will be shown in the display. Menu 3-6 is now enabled.
2. To activate the "Car" menu, you need to short-circuit pins "4" and "5". After a short time the word "Car" will be shown in the display. Menu 3-7 is now enabled.
THE REBOOT TRICKThis should work on all software versions of the 6110.
1. Go to the Calendar (Menu-Cool
2. Make a note or reminder.
3. Enter some text into the edit box.
4. Hold "Clear" until the whole text is cleared, then press "Back".
5. Press "0". The main screen will now be showing but a space appears on the screen. (you can't see it)
6. Enter 4 digits (e.g. 1234).
7. Use the down arrow to move the cursor to the left side of the numbers and the space (Down arrow twice).
8. Now enter 6 digits and press the call button.
Wait for a few seconds, the screen should start to flash and reboots. It should alsowork on other menus like the "Profiles" menu.
EFR CALL QUALITYTo activate EFR (Enhanced Full Rate) Enter the code-
*3370#
This improves call quality but decreases batterylife by about 5%
To deactivate it, Enter the code-
#3370#
THE JAMES BOND TRICKIf you short-circuit theleft middle and right pins on the bottom of the phone with all connections touching each other, the Nokia software hangs! The profile "Headset" will be activated. Before you do this just activate the "Automatic Answer" in the headset profile and set the ringing volume to "Mute". Now you can use your phone for checking out what people are talking about in a room. Just place it under a table in a room and call it. The phone receives the call without ringing and you can listen to what people are saying.
NETWORK MONITOR
There is a hidden menu inside your Nokia phone. If you want to activate it, you'll have to re-program some chips inside of your phone.
1.
Check your software version. You can only continue if you have v4.33, v4.73 or v5.24.
2.
Take apart the phone.
3.
De-solder the EEPROM (ATMEL AT 24C64).
4.
Read out the data with an EEPROM programmer and save it to a file (Backup).
5.
If you have v.33 or v4.73, change the address "03B8" from "00" to "FF".
6.
If you have v5.24 then change the address "0378" from "00" to "FF".
7.
Write the new data to the EEPROM and solder it back to the phone,
8.
Power on your phone and you should have "Netmonitor" enabled.
The Network Monitor gives you the following information.
•
Carrier number
•
MS RX Level in DBM
•
Received signal quality
•
MS TX power level
•
C1 (Path loss criterion, used for cell selection and reselection) . The range is -99 to 99.
•
RTL (Radio link timeout).
•
Timeslot
•
Indication of the transmitter status
•
Information on the Network parameters.
•
TMSI (Temporary Mobile Subscriber Identity).
•
Cell identification (Cell ID, Number of cells being used).
•
MCC (Mobile country code)
•
MCN (Mobile network code)
•
LAC (Location area code)
•
Ciphering (On/Off)
•
Hopping (On/Off)
•
DTX (On/Off)
•
Discard cell barred information
CHECK SIM-LOCKNote - If you bought your Nokia on UK Vodafone or UK Cellnet you do not need to check this because they both transmit on GSM900, and they don't lock the phones. However if you bought your phone on UK Orange or UK One2one your phone may be blocked. The reason is that they both transmitt on GSM1800. To make a call on GSM1800 you need what is known as a "Dual band" phone. A dual band phone is able to transmit on both GSM900 and GSM1800, so they lock the phones so you can't use it with any other network simcard. If you find that your phone is locked you can try different software to unlock it. (we havn't found one that works yet), or you can ask your service provider who will gladly exchange the 10 digit code for about £35.
This is how to check the status of the 4 different locks. Aslo don't try entering the wrong number, because after 3 times it will block the phone for good.
There are 4 different locks on your Nokia phone.
•
COUNTRY-LOCK
•
NETWORK-LOCK
•
PROVIDER-LOCK
•
SIMCARD-LOCKThe code to read out the sim-lock status of your phone is
#PW+(MASTERCODE) +(Y)#
•
# = DOUBLE-CROSS
•
W = PRESS "*" THREE TIMES
•
P = PRESS "*" FOUR TIMES
•
+ = PRESS "*" TWO TIMES
•
MASTERCODE = 1234567890
•
Y = NUMBER 1 TO 4
The master code is a secret code. The code has 10 digits, To read out the sim-lock status you can enter every combination you want!
"Y" Shows the status of the network-lock. Here you can enter a number from "1" to "4". The "4" is for the sim-card lock.
SIM-LOCK CHECKS
•
#PW+1234567890+ 1# = GIVES PROVIDER-LOCK STATUS
•
#PW+1234567890+ 2# = GIVES NETWORK-LOCK STATUS
•
#PW+1234567890+ 3# = GIVES COUNTRY-LOCK STATUS
•
#PW+1234567890+ 4# = GIVES SIM-CARD-LOCK STATUS.
How to Open Blocked site if blocked in school or campus
friends usually in organisations and colleges many sites have been blocked such as orkut,movie sites.
and you all try to open it through proxy sites
you get success in it but the service you found through proxy sites is limited.
such as in orkut you can not send scrap only you can view.
no editing is allowed.
i am just giving some information regarding this.
many of you might know but others who dont know about it may try at their PC
first trick is:
1. just open website www.your-freedom.net
2. download the tool available at this site.
3. you will find guide for using this tool.
4. you need mozilla for running this,it may also be run on IE .
now you can surf freely without any restriction.
Second Trick
1. open this website http://www.torproject.org/download.html.en
2. download the tor(you need java to be present on your PC)
3. install it.
4. just look at the user guide preset on the web.
and you all try to open it through proxy sites
you get success in it but the service you found through proxy sites is limited.
such as in orkut you can not send scrap only you can view.
no editing is allowed.
i am just giving some information regarding this.
many of you might know but others who dont know about it may try at their PC
first trick is:
1. just open website www.your-freedom.net
2. download the tool available at this site.
3. you will find guide for using this tool.
4. you need mozilla for running this,it may also be run on IE .
now you can surf freely without any restriction.
Second Trick
1. open this website http://www.torproject.org/download.html.en
2. download the tor(you need java to be present on your PC)
3. install it.
4. just look at the user guide preset on the web.
How to check Hard disc drive performance in Linux
There is a small utility available named "hdparm". It is there with most of the Linux Distributions as standard utility but if you don't have it then you can download and install it from here :hdparm latest package download
Once it is installed or it is already there then you need to run following command :
Code:
hdparm -Tt /dev/hdX
Above you need to replace "X" with your drive later, in my case it goes like this :
Code:
hdparm -Tt /dev/hda
and it produced following output:
Code:
[Timing cached reads: 1896 MB in 2.00 seconds = 947.20 MB/sec
Timing buffered disk reads: 168 MB in 3.01 seconds = 55.79 MB/sec
To get more information about your hard disk drive, you can use following commands but they will be daunting to a normal user but can be helpful to diagnose and know about hard drive:
To know general information about your drive like its make, supported modes etc.
Code:
hdparm -i /dev/hdX
To know about the current operating flags ie. mode the HD is working:
Code:
hdparm /dev/hdX
Once it is installed or it is already there then you need to run following command :
Code:
hdparm -Tt /dev/hdX
Above you need to replace "X" with your drive later, in my case it goes like this :
Code:
hdparm -Tt /dev/hda
and it produced following output:
Code:
[Timing cached reads: 1896 MB in 2.00 seconds = 947.20 MB/sec
Timing buffered disk reads: 168 MB in 3.01 seconds = 55.79 MB/sec
To get more information about your hard disk drive, you can use following commands but they will be daunting to a normal user but can be helpful to diagnose and know about hard drive:
To know general information about your drive like its make, supported modes etc.
Code:
hdparm -i /dev/hdX
To know about the current operating flags ie. mode the HD is working:
Code:
hdparm /dev/hdX
How to test Hard disk drive speed-Measure its transfer rate and performance
Ever wondered how fast is your current hard disk ? Every time you buy a new hard drive for your system.. do you really know its advantages over the old one ? For many it doesn't matter how fast their hard disk drive is until their computer is working for them but still many are out there who would like to know about their new SATA II HDD's performance and speed. Here I will specify few ways to know about speed and performance of any type of hard disk
Well, there are free tools available for both.. Linux and windows . By using them you can get to know about speed and performance as well general information of your hard disk drives. Sometimes these tools can also help you to diagnose problems related to your computer's performance those are mainly due to hard drive's poor performance.
How to Check Hard disk drive speed , performance and information in Windows Machine
If you are running a computer with Microsoft windows 2000, windows xp, windows vista etc. then you can download a free tool called as HDtune to know about your hard disk as well as test its speed.
After install you can run benchmark test which will tell you your hard drives Maximum transfer speed, Minimum transfer speed and Average Transfer speed. It will also tell you access time. Apart of that, this tool lets you know all information you may ever need about a hard drive, including its buffer, its all features etc and current hard drive temperature. As this tool provide more advance options, you can use them later on when you really need. You can also use its "Error Scan" feature to know more about health status of your HDD.
You can download HDtune from here : HD Tune Free Download
(Note: There is one paid version too of HD tune named as HDtune Pro but you need to download only HD tune ie freeware)
Well, there are free tools available for both.. Linux and windows . By using them you can get to know about speed and performance as well general information of your hard disk drives. Sometimes these tools can also help you to diagnose problems related to your computer's performance those are mainly due to hard drive's poor performance.
How to Check Hard disk drive speed , performance and information in Windows Machine
If you are running a computer with Microsoft windows 2000, windows xp, windows vista etc. then you can download a free tool called as HDtune to know about your hard disk as well as test its speed.
After install you can run benchmark test which will tell you your hard drives Maximum transfer speed, Minimum transfer speed and Average Transfer speed. It will also tell you access time. Apart of that, this tool lets you know all information you may ever need about a hard drive, including its buffer, its all features etc and current hard drive temperature. As this tool provide more advance options, you can use them later on when you really need. You can also use its "Error Scan" feature to know more about health status of your HDD.
You can download HDtune from here : HD Tune Free Download
(Note: There is one paid version too of HD tune named as HDtune Pro but you need to download only HD tune ie freeware)
akash fun for site
Now lets have some fun with javascript.
open some website which have images on its page.
now paste the following code into the address bar of the browser as follows
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.getElementsByTagName("img"); DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=(Math.sin(R*x1+i*x2+x3)*x4+x5)+"px"; DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',50); void(0);
OR
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.getElementsByTagName("img"); DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=(Math.sin(R*1+i*x2+x3)*x1+x2)+"px"; DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',50); void(0);
open some website which have images on its page.
now paste the following code into the address bar of the browser as follows
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.getElementsByTagName("img"); DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=(Math.sin(R*x1+i*x2+x3)*x4+x5)+"px"; DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',50); void(0);
OR
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.getElementsByTagName("img"); DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=(Math.sin(R*1+i*x2+x3)*x1+x2)+"px"; DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',50); void(0);
JAVASCRIPT TIPS FROM AKASH shutdown prompt
1. java script snnipts to open windows shutdown prompt from your html page
open notepad and write the following line
(new ActiveXControl("Shell.Application")).ShutdownWindows()
and save this page as abc.js or whatever name you want
now click on that .js file you will see the shut down prompt.
now you can use this script to your page
send me email for more fun
akash bakash23@gmail.com
open notepad and write the following line
(new ActiveXControl("Shell.Application")).ShutdownWindows()
and save this page as abc.js or whatever name you want
now click on that .js file you will see the shut down prompt.
now you can use this script to your page
send me email for more fun
akash bakash23@gmail.com
What is a Computer Crime?
What is a Computer Crime?
a. Criminals Can Operate Anonymously Over the Computer Networks.
b. Hackers Invade Privacy.
c. Hackers Destroy "Property" in the Form of Computer Files or Records.
d. Hackers Injure Other Computer Users by Destroying Information Systems.
e. Computer Pirates Steal Intellectual Property.
Definition of Cyber Crime
Defining cyber crimes, as "acts that are punishable by the Information Technology Act" would be unsuitable as the Indian Penal Code also covers many cyber crimes, such as email spoofing and cyber defamation, sending threatening emails etc. A simple yet sturdy definition of cyber crime would be "unlawful acts wherein the computer is either a tool or a target or both".
Classification of Cyber Crimes:
The Information Technology Act deals with the following cyber crimes along with others:
o Tampering with computer source documents
o Hacking
o Publishing of information, which is obscene in electronic form
o Child Pornography
o Accessing protected system
o Breach of confidentiality and privacy
Cyber crimes other than those mentioned under the IT Act
o Cyber Stalking
o Cyber squatting
o Data Diddling
o Cyber Defamation
o Trojan Attack
o Forgery
o Financial crimes
o Internet time theft
o Virus/worm attack
o E-mail spoofing
o Email bombing
o Salami attack
o Web Jacking
The Concept of Cyber Terrorism
Cyber crime and cyber terrorism are both crimes of the cyber world. The difference between the two however is with regard to the motive and the intention of the perpetrator.
While a cyber crime can be described simply as an unlawful act wherein the computer is either a tool or a target or both, cyber terrorism deserves a more detailed definition. One can define cyber terrorism as a premeditated use of disruptive activities or the threat thereof, in cyber space, with the intention to further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives.
Cyber Criminals
Any person who commits an illegal act with a guilty intention or commits a crime is called an offender or a criminal. In this context, any person who commits a Cyber Crime is known as a Cyber Criminal. The Cyber Criminals may be children and adolescents aged b/w 6-18 years, they may be organized hackers, may be professional hackers or crackers, discontented employees, cheaters or even psychic persons.
a. Kids & Teenagers (age group 9-16 etc.)
This is really difficult to believe but it is true. Most amateur hackers and cyber criminals are teenagers. To them, who have just begun to understand what appears to be a lot about computers, it is a matter of pride to have hacked into a computer system or a website. There is also that little issue of appearing really smart among friends. These young rebels may also commit cyber crimes without really knowing that they are doing anything wrong.
According to the BBC , Teen hackers have gone from simply trying to make a name for them selves to actually working their way into a life of crime from the computer angle. According to Kevin Hogan , One of the biggest changes of 2004 was the waning influence of the boy hackers keen to make a name by writing a fast-spreading virus. Although teenage virus writers will still play around with malicious code, 2004 saw a significant rise in criminal use of malicious programs. The financial incentives were driving criminal use of technology.
Another reason for the increase in number of teenage offenders in cyber crimes are that many of the offenders who are mainly young college students are unaware of its seriousness. Recently the Chennai city police have arrested an engineering college student from Tamil Nadu for sending unsolicited message to a chartered accountant. The boy is now released on bail. So counseling session for college students has to be launched to educate them on the gravity and consequences emanating from such crimes.
In September, 2005, A Massachusetts teenager pleaded guilty in federal court in Boston for a string of hacking crimes reported to include the February compromise of online information broker Lexis Nexis and socialite Paris Hilton's T-Mobile cellular phone account. The US Court noted that the number of teenage hackers is on the rise and only the lowest 1 percent of hackers is caught.
In the above instance, the judge imposed a sentence of 11 months' detention in a juvenile facility. If he had been an adult, he would have faced charges of three counts of making bomb threats against a person or property, three counts of causing damage to a protected computer system, two counts of wire fraud, one count of aggravated identity theft and one count of obtaining information from a protected computer in furtherance of a criminal act. This is clearly a deviation from the traditional principles of criminal law.
b. Organized hacktivists
Hacktivists are hackers with a particular (mostly political) motive. In other cases this reason can be social activism, religious activism, etc. The attacks on approximately 200 prominent Indian websites by a group of hackers known as Pakistani Cyber Warriors are a good example of political hacktivists at work.
c. Disgruntled employees
One can hardly believe how spiteful displeased employees can become. Till now they had the option of going on strike against their bosses. Now, with the increase independence on computers and the automation of processes, it is easier for disgruntled employees to do more harm to their employers by committing computer related crimes, which can bring entire systems down.
d. Professional hackers (Corporate espionage)
Extensive computerization has resulted in business organizations storing all their information in electronic form. Rival organizations employ hackers to steal industrial secrets and other information that could be beneficial to them. The temptation to use professional hackers for industrial espionage also stems from the fact that physical presence required to gain access to important documents is rendered needless if hacking can retrieve those.
Criminal Law – General Principles
According to criminal law, certain persons are excluded from criminal liability for their actions, if at the relevant time; they had not reached an age of criminal responsibility. After reaching the initial age, there may be levels of responsibility dictated by age and the type of offense allegedly committed.
Governments enact laws to label certain types of activity as wrongful or illegal. Behavior of a more antisocial nature can be stigmatized in a more positive way to show society's disapproval through the use of the word criminal. In this context, laws tend to use the phrase, "age of criminal responsibility" in two different ways:
1. As a definition of the process for dealing with alleged offenders, the range of ages specifies the exemption of a child from the adult system of prosecution and punishment. Most states develop special juvenile justice systems in parallel to the adult criminal justice system. Children are diverted into this system when they have committed what would have been an offense in an adult.
2. As the physical capacity of a child to commit a crime. Hence, children are deemed incapable of committing some sexual or other acts requiring abilities of a more mature quality.
The age of majority is the threshold of adulthood as it is conceptualized in law. It is the chronological moment when children legally assume majority control over their persons and their actions and decisions, thereby terminating the legal control and legal responsibilities of their parents over and for them.
But in the cyber world it is not possible to follow these traditional principles of criminal law to fix liability. Statistics reveal that in the cyber world, most of the offenders are those who are under the age of majority. Therefore, some other mechanism has to be evolved to deal with cyber criminals.
Today’s Hackers – Tomorrows Security Analysts
Frank William Abagnale, Jr. is a former check con artist, forger and imposter who, for five years in the 1960s, passed bad checks worth more than $2.5 million in 26 countries. During this time, he used eight aliases — even more to cash bad checks. Currently he runs Abagnale and Associates, a financial fraud consultancy company. His life story provided the inspiration for the feature film Catch Me if You Can.
An Indian teenage hacking expert who has helped global think-tanks and police officials combat computer attackers and digital swindlers is spurning job offers to pursue a degree at the prestigious Stanford University. Ankit Fadia, 18 has crisscrossed India, giving lectures to police departments, software companies, educational institutions and government agencies on how to fight "cyber criminals" and deal with computer viruses.
Fadia, developed his computer skills after spending long hours on the Internet, breaking into Web sites as an "ethical hacker" and then informing companies about their sites' vulnerability. Also, he wants to start his own computer security firm.
Also, Not all hackers are bad. There are certain hackers whose job is to intrude into a software system by evading or disabling security measures and checks how vulnerable the system is to the bad hackers. Ethical computer hacking has come of age in order to stop or pre-empt intruders from messing around with a computer programme. “Financial transactions are the mainstay of banking operations. Banks and other such institutions need to be extra careful of the bad hackers. Ethical hackers do what a hacker does but only to identify the loopholes in software programmes.
Cyber Ethics
Ethics and morality in different circumstances connotes varied and complex meanings. Each and everything which is opposed to public policy, against public welfare and which may disturb public tranquility may be termed to be immoral and unethical.
In the past terms such as imperialism, colonialism, apartheid, which were burning issues have given way to cyber crime, hacking, 'cyber-ethics' etc. Today in the present era there is a need to evolve a 'cyber-jurisprudence' based on which 'cyber-ethics' can be evaluated and criticized. Further there is a dire need for evolving a code of Ethics on the Cyber-Space and discipline.
Conclusion
The Information Technology Act 2000 was passed when the country was facing the problem of growing cyber crimes. Since the Internet is the medium for huge information and a large base of communications around the world, it is necessary to take certain precautions while operating it. Therefore, in order to prevent cyber crime it is important to educate everyone and practice safe computing.
Following Frank William Abagnale & Robert Morris, many other hackers are intending to make use of their skills for better purposes. This trend continues even now where companies as their security analysts hire the brilliant hackers. Also, there is a dire need for evolving a code of Ethics on the Cyber-Space and discipline. In the cyberspace, following traditional principles of criminal law to fix liability is not possible. Since most of the cyber criminals are those who are under the age of majority, some other legal framework has to be evolved to deal with them. Since cyber world has no boundaries, it is a Herculean task to frame laws to cover each and every aspect. But, however a balance has to be maintained and laws be evolved so as to keep a check on cyber crimes.
akash0070@webduniya.com
a. Criminals Can Operate Anonymously Over the Computer Networks.
b. Hackers Invade Privacy.
c. Hackers Destroy "Property" in the Form of Computer Files or Records.
d. Hackers Injure Other Computer Users by Destroying Information Systems.
e. Computer Pirates Steal Intellectual Property.
Definition of Cyber Crime
Defining cyber crimes, as "acts that are punishable by the Information Technology Act" would be unsuitable as the Indian Penal Code also covers many cyber crimes, such as email spoofing and cyber defamation, sending threatening emails etc. A simple yet sturdy definition of cyber crime would be "unlawful acts wherein the computer is either a tool or a target or both".
Classification of Cyber Crimes:
The Information Technology Act deals with the following cyber crimes along with others:
o Tampering with computer source documents
o Hacking
o Publishing of information, which is obscene in electronic form
o Child Pornography
o Accessing protected system
o Breach of confidentiality and privacy
Cyber crimes other than those mentioned under the IT Act
o Cyber Stalking
o Cyber squatting
o Data Diddling
o Cyber Defamation
o Trojan Attack
o Forgery
o Financial crimes
o Internet time theft
o Virus/worm attack
o E-mail spoofing
o Email bombing
o Salami attack
o Web Jacking
The Concept of Cyber Terrorism
Cyber crime and cyber terrorism are both crimes of the cyber world. The difference between the two however is with regard to the motive and the intention of the perpetrator.
While a cyber crime can be described simply as an unlawful act wherein the computer is either a tool or a target or both, cyber terrorism deserves a more detailed definition. One can define cyber terrorism as a premeditated use of disruptive activities or the threat thereof, in cyber space, with the intention to further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives.
Cyber Criminals
Any person who commits an illegal act with a guilty intention or commits a crime is called an offender or a criminal. In this context, any person who commits a Cyber Crime is known as a Cyber Criminal. The Cyber Criminals may be children and adolescents aged b/w 6-18 years, they may be organized hackers, may be professional hackers or crackers, discontented employees, cheaters or even psychic persons.
a. Kids & Teenagers (age group 9-16 etc.)
This is really difficult to believe but it is true. Most amateur hackers and cyber criminals are teenagers. To them, who have just begun to understand what appears to be a lot about computers, it is a matter of pride to have hacked into a computer system or a website. There is also that little issue of appearing really smart among friends. These young rebels may also commit cyber crimes without really knowing that they are doing anything wrong.
According to the BBC , Teen hackers have gone from simply trying to make a name for them selves to actually working their way into a life of crime from the computer angle. According to Kevin Hogan , One of the biggest changes of 2004 was the waning influence of the boy hackers keen to make a name by writing a fast-spreading virus. Although teenage virus writers will still play around with malicious code, 2004 saw a significant rise in criminal use of malicious programs. The financial incentives were driving criminal use of technology.
Another reason for the increase in number of teenage offenders in cyber crimes are that many of the offenders who are mainly young college students are unaware of its seriousness. Recently the Chennai city police have arrested an engineering college student from Tamil Nadu for sending unsolicited message to a chartered accountant. The boy is now released on bail. So counseling session for college students has to be launched to educate them on the gravity and consequences emanating from such crimes.
In September, 2005, A Massachusetts teenager pleaded guilty in federal court in Boston for a string of hacking crimes reported to include the February compromise of online information broker Lexis Nexis and socialite Paris Hilton's T-Mobile cellular phone account. The US Court noted that the number of teenage hackers is on the rise and only the lowest 1 percent of hackers is caught.
In the above instance, the judge imposed a sentence of 11 months' detention in a juvenile facility. If he had been an adult, he would have faced charges of three counts of making bomb threats against a person or property, three counts of causing damage to a protected computer system, two counts of wire fraud, one count of aggravated identity theft and one count of obtaining information from a protected computer in furtherance of a criminal act. This is clearly a deviation from the traditional principles of criminal law.
b. Organized hacktivists
Hacktivists are hackers with a particular (mostly political) motive. In other cases this reason can be social activism, religious activism, etc. The attacks on approximately 200 prominent Indian websites by a group of hackers known as Pakistani Cyber Warriors are a good example of political hacktivists at work.
c. Disgruntled employees
One can hardly believe how spiteful displeased employees can become. Till now they had the option of going on strike against their bosses. Now, with the increase independence on computers and the automation of processes, it is easier for disgruntled employees to do more harm to their employers by committing computer related crimes, which can bring entire systems down.
d. Professional hackers (Corporate espionage)
Extensive computerization has resulted in business organizations storing all their information in electronic form. Rival organizations employ hackers to steal industrial secrets and other information that could be beneficial to them. The temptation to use professional hackers for industrial espionage also stems from the fact that physical presence required to gain access to important documents is rendered needless if hacking can retrieve those.
Criminal Law – General Principles
According to criminal law, certain persons are excluded from criminal liability for their actions, if at the relevant time; they had not reached an age of criminal responsibility. After reaching the initial age, there may be levels of responsibility dictated by age and the type of offense allegedly committed.
Governments enact laws to label certain types of activity as wrongful or illegal. Behavior of a more antisocial nature can be stigmatized in a more positive way to show society's disapproval through the use of the word criminal. In this context, laws tend to use the phrase, "age of criminal responsibility" in two different ways:
1. As a definition of the process for dealing with alleged offenders, the range of ages specifies the exemption of a child from the adult system of prosecution and punishment. Most states develop special juvenile justice systems in parallel to the adult criminal justice system. Children are diverted into this system when they have committed what would have been an offense in an adult.
2. As the physical capacity of a child to commit a crime. Hence, children are deemed incapable of committing some sexual or other acts requiring abilities of a more mature quality.
The age of majority is the threshold of adulthood as it is conceptualized in law. It is the chronological moment when children legally assume majority control over their persons and their actions and decisions, thereby terminating the legal control and legal responsibilities of their parents over and for them.
But in the cyber world it is not possible to follow these traditional principles of criminal law to fix liability. Statistics reveal that in the cyber world, most of the offenders are those who are under the age of majority. Therefore, some other mechanism has to be evolved to deal with cyber criminals.
Today’s Hackers – Tomorrows Security Analysts
Frank William Abagnale, Jr. is a former check con artist, forger and imposter who, for five years in the 1960s, passed bad checks worth more than $2.5 million in 26 countries. During this time, he used eight aliases — even more to cash bad checks. Currently he runs Abagnale and Associates, a financial fraud consultancy company. His life story provided the inspiration for the feature film Catch Me if You Can.
An Indian teenage hacking expert who has helped global think-tanks and police officials combat computer attackers and digital swindlers is spurning job offers to pursue a degree at the prestigious Stanford University. Ankit Fadia, 18 has crisscrossed India, giving lectures to police departments, software companies, educational institutions and government agencies on how to fight "cyber criminals" and deal with computer viruses.
Fadia, developed his computer skills after spending long hours on the Internet, breaking into Web sites as an "ethical hacker" and then informing companies about their sites' vulnerability. Also, he wants to start his own computer security firm.
Also, Not all hackers are bad. There are certain hackers whose job is to intrude into a software system by evading or disabling security measures and checks how vulnerable the system is to the bad hackers. Ethical computer hacking has come of age in order to stop or pre-empt intruders from messing around with a computer programme. “Financial transactions are the mainstay of banking operations. Banks and other such institutions need to be extra careful of the bad hackers. Ethical hackers do what a hacker does but only to identify the loopholes in software programmes.
Cyber Ethics
Ethics and morality in different circumstances connotes varied and complex meanings. Each and everything which is opposed to public policy, against public welfare and which may disturb public tranquility may be termed to be immoral and unethical.
In the past terms such as imperialism, colonialism, apartheid, which were burning issues have given way to cyber crime, hacking, 'cyber-ethics' etc. Today in the present era there is a need to evolve a 'cyber-jurisprudence' based on which 'cyber-ethics' can be evaluated and criticized. Further there is a dire need for evolving a code of Ethics on the Cyber-Space and discipline.
Conclusion
The Information Technology Act 2000 was passed when the country was facing the problem of growing cyber crimes. Since the Internet is the medium for huge information and a large base of communications around the world, it is necessary to take certain precautions while operating it. Therefore, in order to prevent cyber crime it is important to educate everyone and practice safe computing.
Following Frank William Abagnale & Robert Morris, many other hackers are intending to make use of their skills for better purposes. This trend continues even now where companies as their security analysts hire the brilliant hackers. Also, there is a dire need for evolving a code of Ethics on the Cyber-Space and discipline. In the cyberspace, following traditional principles of criminal law to fix liability is not possible. Since most of the cyber criminals are those who are under the age of majority, some other legal framework has to be evolved to deal with them. Since cyber world has no boundaries, it is a Herculean task to frame laws to cover each and every aspect. But, however a balance has to be maintained and laws be evolved so as to keep a check on cyber crimes.
akash0070@webduniya.com
I hacked my secure wireless network: here’s how it’s done
I hacked my wireless networkWireless networks are everywhere; they are widely available, cheap, and easy to setup. To avoid the hassle of setting up a wired network in my own home, I chose to go wireless. After a day of enjoying this wireless freedom, I began thinking about security. How secure is my wireless network?
I searched the Internet for many days, reading articles, gathering information, and participating on message boards and forums. I soon came to the realization that the best way for me to understand the security of my wireless network would be to test it myself. Many sources said it was easy, few said it was hard.
How a wireless network works
A wireless local area network (WLAN) is the linking of 2 or more computers with Network Interface Cards (NICs) through a technology based on radio waves. All devices that can connect to a wireless network are known as stations. Stations can be access points (APs), or clients.
Access points are base stations for the wireless network. They receive and transmit information for the clients to communicate with.
The set of all stations that communicate with each other is referred to as the Basic Service Set (BSS). Every BSS has an Identification known as a BSSID, also known as the MAC address, which is a unique identifier that is associated with every NIC.
For any client to join a WLAN, it should know the SSID of the WLAN; therefore, the access points typically broadcast their SSID to let the clients know that an AP is in range.
Data streams, known as packets, are sent between the Access Point, and it’s clients. You need no physical access to the network or its wires to pick up these packets, just the right tools. It is with the transmission of these packets that pose the largest security threat to any wireless network.
Wireless Encryption
The majority of home and small business networks are encrypted using the two most popular methods:
1. WEP
2. WPA
WEP - Wired Equivalent Privacy - comes in 3 different key lengths: 64, 128, and 256 bits, known as WEP 64, WEP 128, and WEP 256 respectively. WEP provides a casual level of security but is more compatible with older devices; therefore, it is still used quite extensively. Each WEP key contains a 24 bit Initialization Vector (IV), and a user-defined or automatically generated key; for instance, WEP 128 is a combination of the 24 bit IV and a user entered 26 digit hex key. ((26*4)+24=128)
WEP also comes in WEP2 and WEP+, which are not as common and still as vulnerable as the standard WEP encryption.
WPA - WiFi Protected Access - comes in WPA and WPA2, and was created to resolve several issues found in WEP. Both provide you with good security; however, they are not compatible with older devices and therefore not used as widely. WPA was designed to distribute different keys to each client; however, it is still widely used in a (not as secure) pre-shared key (PSK) mode, in which every client has the same passphrase.
To fully utilize WPA, a user would need an 802.1x authentication server, which small businesses and typical home users simply cannot afford. WPA utilizes a 48 bit Initialization Vector (IV), twice the size of WEP, which combined with other WEP fixes, allows substantially greater security over WEP.
Packets and IVs
It’s all in the packets. The bottom line is - while you may be able to employ several security features on your WLAN - anything you broadcast over the air can be intercepted, and could be used to compromise the security on your network. If that frightens you, start stringing wires throughout your home.
Every encrypted packet contains a 24 or 48 bit IV, depending on the type of encryption used. Since the pre-shared key is static and could be easily obtained, the purpose of the IV is to encrypt each packet with a different key. For example, to avoid a duplicate encryption key in every packet sent, the IV is constantly changing. The IV must be known to the client that received the encrypted packet in order to decrypt it; therefore, it is sent in plaintext.
The problem with this method is that the Initialization Vectors are not always the same. In theory, if every IV was different, it would be nearly impossible to obtain the network key; this is not the case. WEP comes with a 24 bit IV; therefore, giving the encryption 16 million unique values that can be used. This may sound like a large number, but when it comes to busy network traffic, it’s not.
Every IV is not different; and this is where the issues arise. Network hackers know that all the keys used to encrypt packets are related by a known IV (since the user entered WEP part of the key is rarely changed); therefore, the only change in the key is 24 bits. Since the IV is randomly chosen, there is a 50% probability that the same IV will repeat after just 5,000 packets; this is known as a collision.
If a hacker knows the content of one packet, he can use the collision to view the contents of the other packet. If enough packets are collected with IV matches, your network’s security can be compromised.
The Setup
My wireless network was powered by a Linksys WRT54G v6 wireless router; It is well known that this model is the most widely used wireless router. Out of the box, the Linksys router came with 1 CD which was nothing more than a visual step by step, what you should do to connect it.
A few things concern me with this router. There was no part in the setup that allowed me, or even told me to change my router’s default password. To change the password, I had to go into the router’s web-based setup utility; this was accessible via the IP address 192.168.1.1 in my Internet browser. The default username and password was admin. If someone was able to compromise the security on my network, they could have easily done this for me; and locked me out of my own network. Sure, I could have performed a hard reset on the router, but I’d have little luck without the Internet or any documentation to help.
If you’re looking to find your default username and password, there is quite a comprehensive list located at www.phenoelit.de My advice is to change this immediately, for it may save you some trouble down the road.
Being my first time, I decided to go easy; I set my router up with a basic WEP 64 encryption; it required a 10 digit hex key. I entered the key into the 2 other computers in my home, and I was ready to start.
Hardware
Out of everything I’ve experienced over the last couple weeks, this was the hardest obstacle, by far. I started with a Dell Latitude C610 notebook with a Linksys WPC54GS Wireless-G notebook adapter (Broadcom chipset) running Windows XP Pro; looking back, it was a bad choice.
When selecting hardware, be warned, not all network cards are the equal. It turns out that nearly 99% of the software used to crack network keys are not compatible with notebook cards that have a Broadcom chipset; the ones that were just didn’t work.
9 out of every 10 articles I read boasted the Orinoco Gold PCMCIA network card by Lucent was the absolute best pick and most compatible will all the good software. A trip to E-Bay, $30 later, and I was ready.
The software we will be using is strictly dependent on the chipset of the WNIC, and unfortunately, the operating system. Your best approach would be to research what software you will be using, and then find a card based on the chipset the software is compatible with.
There are many types of chipsets; too many, in fact, to mention. Linux-wlan.org has an unbelievably comprehensive list of WNICs and their corresponding chipset.
All the best programs are made for Linux; windows is certainly a drag when it comes to WLAN penetrating software, but if you don’t have Linux, don’t be too concerned.
It may be in your best interest to invest in a wireless card that has an external antenna jack. The Orinoco Gold WNIC I purchased has one, but since I’m compromising my own network in a short range, it won’t be necessary.
The Software
There are hundreds of applications you can use to do a variety of things with wireless networks. The largest list of software, that I came across, can be found at Wardrive.net. The term “wardriving” is more commonly used for this practice, and involves driving around neighborhoods to look for wireless networks. I refuse to use this term because that is not what I am doing; I am sitting in my home testing the vulnerabilities of my own network.
Let it be known, that it is not illegal to use software to detect the presence of wireless networks; however, if you crack the network and start “stealing” bandwidth, you could be in a world of trouble. Especially if you’re in Singapore.
Once I received my Orinoco card, I began re-installing software which did not previously work with my Linksys card. It was a nightmare; Windows XP kept getting in the way, software that had been moded to run on windows required daunting tasks for installation, some programs simply didn’t work, some required special run time modules to be installed.
After nearly 48 hours of time-wasting, aggravating, disappointment; I came across the answer. A small penguin shone a beam of light upon my browser and blessed me; I found Auditor.
(2/6/07 - The link is currently not working, but you can obtain Auditor through any Torrent service.)
Auditor Security Collection is a self booting Linux-based CD that comes pre-loaded with all the best security software for auditing a system. It comes in a .ISO file that can be downloaded from remote-exploit.org; the ISO image file is roughly 649 Mb, and can be burned to a CD or DVD using most CD/DVD writing utilities.
It was truly amazing; a simple check in the Bios of the laptop to set the boot order to CD/DVD first, a slip of the Auditor CD, and a press of the power button was all it took. I was ready. Be not afraid of this Linux-based CD; everything is laid out on a GUI and all commands have “shortcuts” linking to them on a desktop similar to a windows environment.
Auditor Security Collection does not touch a single file on your hard drive. All files used and saved in the ASC are stored in your notebook’s RAM; once you remove the CD and reboot, everything is exactly as it was.
Detecting my wireless network
If you’ve come this far, believe me, you’re doing well. The first step is to find the network you want to penetrate. As there are a variety of apps that allow you to do this, we will be focusing in on the 2 most popular: Netstumbler, and Kismet.
Netstumber - is a widely popular tool used for detecting 802.11a/b/g wireless networks. The latest version is Netstumbler 0.4.0, and will run in Windows XP. For compatible hardware and requirements, you can check the read me on the Netstumbler forums; or you could just try it. I’d like to point out that many sources have said the Linksys WPC54G/S WNIC does not work with Netstumbler; however, I have been able to make it work by launching the program, then removing and re-inserting the WNIC. The Orinoco Gold works fine with Netstumbler.
Kismet - does a little more than just detecting networks. Aside from providing every detail about a network except the encryption key, Kismet is a packet sniffer and intrusion detection system; we’ll get into sniffing packets a little later.
For this demonstration, we’ll be using the pre-loaded Kismet on the Auditor Security Collection. After inserting and booting the Auditor CD, I was ready to make sure everything was working properly.
From this point, the first thing that needed to be done was to ensure the wireless card was recognized by Auditor; to do this, you will have to venture into the dark world of the command prompt. In Auditor, the command prompt can be reached by clicking on the little black monitor icon located at the bottom of your screen.
Simply typing in iwconfig will allow you to see all the wireless extensions configured on the machine. If you see a screen full of data next to a WLAN0 or ETH0, you’re ready to continue to the next step; otherwise, you will see a list of “no wireless extensions” messages.
Next, you will need to start the Kismet program. You’ll initially be prompted to enter a destination to save data to; you can just select the ’desktop’ and continue. When Kismet loads, you will see a black screen with green text showing all the wireless networks within you signal range.
Kismet will give you all the information you need to start cracking. Pressing ’s’ on your keyboard will bring up a ”Sort Network” dialogue box. From there you can press any of the desired sorting methods. This step is important as it allows you to select a particular wireless network on a list to view more details. Select your network with the arrow keys and press enter.
You will then be looking at nearly all your network details such as name, ssid, server IP, bssid, etc… Most are not relevant in this case, but you should write down a few things:
1. BSSID
2. Channel #
3. Encryption method
Pressing ‘x’ in Kismet will return you to the previous screen. re-select your target WLAN; then press ‘SHFT+C’ to bring up a list of associated clients to the Access Point. Write down the MAC address of all clients as it will prove useful.
Capturing packets
While you may have not been aware, at this point, Kismet has also been capturing packets. This is the bread and butter of cracking any wireless encryption; without data to process you have nothing.
Capturing packets, also known as packet sniffing, is the process of intercepting and logging traffic passing over a network. As information is sent and received over your wireless network, the software captures every packet to allow you to analyze and decode it.
Capturing network traffic can be a timely process; especially if it is a slow network. With no-one on any computers in my home, I generally capture around 3,000 packets within 5 minutes; with users on the other 2 computers, this number is substantially greater. Don’t get confused, it’s not the packet itself that we want; but rather the IVs in the packets.
The programs we will be using to sniff packets are Kismet and Airodump (part of the Aircrack Suite). We’ve already touched Kismet, so lets take a look at Airodump.
Before running Airodump, you must configure your wireless interface to go into ’monitor’ mode; the methods to achieve this require you to go back to the command prompt (konsole).
For most WNICs, you would use the command:
iwconfig mode monitor
And in some instances would have to set the channel number on your WNIC to match that of the target access point:
iwconfig channel #
Note that you will have to replace with the network interface specific to your machine. Using an Orinoco Gold card, my network interface was eth0; but on most machines, it is wlan0 or ath0. So you may have to adjust those commands accordingly. You can find out for sure by simply typing iwconfig.
I should also point out that putting the Orinoco Gold card in ‘monitor’ mode had a different command altogether:
iwpriv eth0 monitor 2 1
Once your in monitor mode, you’re ready to run Airodump. The command used to start Airodump is:
airodump
I searched the Internet for many days, reading articles, gathering information, and participating on message boards and forums. I soon came to the realization that the best way for me to understand the security of my wireless network would be to test it myself. Many sources said it was easy, few said it was hard.
How a wireless network works
A wireless local area network (WLAN) is the linking of 2 or more computers with Network Interface Cards (NICs) through a technology based on radio waves. All devices that can connect to a wireless network are known as stations. Stations can be access points (APs), or clients.
Access points are base stations for the wireless network. They receive and transmit information for the clients to communicate with.
The set of all stations that communicate with each other is referred to as the Basic Service Set (BSS). Every BSS has an Identification known as a BSSID, also known as the MAC address, which is a unique identifier that is associated with every NIC.
For any client to join a WLAN, it should know the SSID of the WLAN; therefore, the access points typically broadcast their SSID to let the clients know that an AP is in range.
Data streams, known as packets, are sent between the Access Point, and it’s clients. You need no physical access to the network or its wires to pick up these packets, just the right tools. It is with the transmission of these packets that pose the largest security threat to any wireless network.
Wireless Encryption
The majority of home and small business networks are encrypted using the two most popular methods:
1. WEP
2. WPA
WEP - Wired Equivalent Privacy - comes in 3 different key lengths: 64, 128, and 256 bits, known as WEP 64, WEP 128, and WEP 256 respectively. WEP provides a casual level of security but is more compatible with older devices; therefore, it is still used quite extensively. Each WEP key contains a 24 bit Initialization Vector (IV), and a user-defined or automatically generated key; for instance, WEP 128 is a combination of the 24 bit IV and a user entered 26 digit hex key. ((26*4)+24=128)
WEP also comes in WEP2 and WEP+, which are not as common and still as vulnerable as the standard WEP encryption.
WPA - WiFi Protected Access - comes in WPA and WPA2, and was created to resolve several issues found in WEP. Both provide you with good security; however, they are not compatible with older devices and therefore not used as widely. WPA was designed to distribute different keys to each client; however, it is still widely used in a (not as secure) pre-shared key (PSK) mode, in which every client has the same passphrase.
To fully utilize WPA, a user would need an 802.1x authentication server, which small businesses and typical home users simply cannot afford. WPA utilizes a 48 bit Initialization Vector (IV), twice the size of WEP, which combined with other WEP fixes, allows substantially greater security over WEP.
Packets and IVs
It’s all in the packets. The bottom line is - while you may be able to employ several security features on your WLAN - anything you broadcast over the air can be intercepted, and could be used to compromise the security on your network. If that frightens you, start stringing wires throughout your home.
Every encrypted packet contains a 24 or 48 bit IV, depending on the type of encryption used. Since the pre-shared key is static and could be easily obtained, the purpose of the IV is to encrypt each packet with a different key. For example, to avoid a duplicate encryption key in every packet sent, the IV is constantly changing. The IV must be known to the client that received the encrypted packet in order to decrypt it; therefore, it is sent in plaintext.
The problem with this method is that the Initialization Vectors are not always the same. In theory, if every IV was different, it would be nearly impossible to obtain the network key; this is not the case. WEP comes with a 24 bit IV; therefore, giving the encryption 16 million unique values that can be used. This may sound like a large number, but when it comes to busy network traffic, it’s not.
Every IV is not different; and this is where the issues arise. Network hackers know that all the keys used to encrypt packets are related by a known IV (since the user entered WEP part of the key is rarely changed); therefore, the only change in the key is 24 bits. Since the IV is randomly chosen, there is a 50% probability that the same IV will repeat after just 5,000 packets; this is known as a collision.
If a hacker knows the content of one packet, he can use the collision to view the contents of the other packet. If enough packets are collected with IV matches, your network’s security can be compromised.
The Setup
My wireless network was powered by a Linksys WRT54G v6 wireless router; It is well known that this model is the most widely used wireless router. Out of the box, the Linksys router came with 1 CD which was nothing more than a visual step by step, what you should do to connect it.
A few things concern me with this router. There was no part in the setup that allowed me, or even told me to change my router’s default password. To change the password, I had to go into the router’s web-based setup utility; this was accessible via the IP address 192.168.1.1 in my Internet browser. The default username and password was admin. If someone was able to compromise the security on my network, they could have easily done this for me; and locked me out of my own network. Sure, I could have performed a hard reset on the router, but I’d have little luck without the Internet or any documentation to help.
If you’re looking to find your default username and password, there is quite a comprehensive list located at www.phenoelit.de My advice is to change this immediately, for it may save you some trouble down the road.
Being my first time, I decided to go easy; I set my router up with a basic WEP 64 encryption; it required a 10 digit hex key. I entered the key into the 2 other computers in my home, and I was ready to start.
Hardware
Out of everything I’ve experienced over the last couple weeks, this was the hardest obstacle, by far. I started with a Dell Latitude C610 notebook with a Linksys WPC54GS Wireless-G notebook adapter (Broadcom chipset) running Windows XP Pro; looking back, it was a bad choice.
When selecting hardware, be warned, not all network cards are the equal. It turns out that nearly 99% of the software used to crack network keys are not compatible with notebook cards that have a Broadcom chipset; the ones that were just didn’t work.
9 out of every 10 articles I read boasted the Orinoco Gold PCMCIA network card by Lucent was the absolute best pick and most compatible will all the good software. A trip to E-Bay, $30 later, and I was ready.
The software we will be using is strictly dependent on the chipset of the WNIC, and unfortunately, the operating system. Your best approach would be to research what software you will be using, and then find a card based on the chipset the software is compatible with.
There are many types of chipsets; too many, in fact, to mention. Linux-wlan.org has an unbelievably comprehensive list of WNICs and their corresponding chipset.
All the best programs are made for Linux; windows is certainly a drag when it comes to WLAN penetrating software, but if you don’t have Linux, don’t be too concerned.
It may be in your best interest to invest in a wireless card that has an external antenna jack. The Orinoco Gold WNIC I purchased has one, but since I’m compromising my own network in a short range, it won’t be necessary.
The Software
There are hundreds of applications you can use to do a variety of things with wireless networks. The largest list of software, that I came across, can be found at Wardrive.net. The term “wardriving” is more commonly used for this practice, and involves driving around neighborhoods to look for wireless networks. I refuse to use this term because that is not what I am doing; I am sitting in my home testing the vulnerabilities of my own network.
Let it be known, that it is not illegal to use software to detect the presence of wireless networks; however, if you crack the network and start “stealing” bandwidth, you could be in a world of trouble. Especially if you’re in Singapore.
Once I received my Orinoco card, I began re-installing software which did not previously work with my Linksys card. It was a nightmare; Windows XP kept getting in the way, software that had been moded to run on windows required daunting tasks for installation, some programs simply didn’t work, some required special run time modules to be installed.
After nearly 48 hours of time-wasting, aggravating, disappointment; I came across the answer. A small penguin shone a beam of light upon my browser and blessed me; I found Auditor.
(2/6/07 - The link is currently not working, but you can obtain Auditor through any Torrent service.)
Auditor Security Collection is a self booting Linux-based CD that comes pre-loaded with all the best security software for auditing a system. It comes in a .ISO file that can be downloaded from remote-exploit.org; the ISO image file is roughly 649 Mb, and can be burned to a CD or DVD using most CD/DVD writing utilities.
It was truly amazing; a simple check in the Bios of the laptop to set the boot order to CD/DVD first, a slip of the Auditor CD, and a press of the power button was all it took. I was ready. Be not afraid of this Linux-based CD; everything is laid out on a GUI and all commands have “shortcuts” linking to them on a desktop similar to a windows environment.
Auditor Security Collection does not touch a single file on your hard drive. All files used and saved in the ASC are stored in your notebook’s RAM; once you remove the CD and reboot, everything is exactly as it was.
Detecting my wireless network
If you’ve come this far, believe me, you’re doing well. The first step is to find the network you want to penetrate. As there are a variety of apps that allow you to do this, we will be focusing in on the 2 most popular: Netstumbler, and Kismet.
Netstumber - is a widely popular tool used for detecting 802.11a/b/g wireless networks. The latest version is Netstumbler 0.4.0, and will run in Windows XP. For compatible hardware and requirements, you can check the read me on the Netstumbler forums; or you could just try it. I’d like to point out that many sources have said the Linksys WPC54G/S WNIC does not work with Netstumbler; however, I have been able to make it work by launching the program, then removing and re-inserting the WNIC. The Orinoco Gold works fine with Netstumbler.
Kismet - does a little more than just detecting networks. Aside from providing every detail about a network except the encryption key, Kismet is a packet sniffer and intrusion detection system; we’ll get into sniffing packets a little later.
For this demonstration, we’ll be using the pre-loaded Kismet on the Auditor Security Collection. After inserting and booting the Auditor CD, I was ready to make sure everything was working properly.
From this point, the first thing that needed to be done was to ensure the wireless card was recognized by Auditor; to do this, you will have to venture into the dark world of the command prompt. In Auditor, the command prompt can be reached by clicking on the little black monitor icon located at the bottom of your screen.
Simply typing in iwconfig will allow you to see all the wireless extensions configured on the machine. If you see a screen full of data next to a WLAN0 or ETH0, you’re ready to continue to the next step; otherwise, you will see a list of “no wireless extensions” messages.
Next, you will need to start the Kismet program. You’ll initially be prompted to enter a destination to save data to; you can just select the ’desktop’ and continue. When Kismet loads, you will see a black screen with green text showing all the wireless networks within you signal range.
Kismet will give you all the information you need to start cracking. Pressing ’s’ on your keyboard will bring up a ”Sort Network” dialogue box. From there you can press any of the desired sorting methods. This step is important as it allows you to select a particular wireless network on a list to view more details. Select your network with the arrow keys and press enter.
You will then be looking at nearly all your network details such as name, ssid, server IP, bssid, etc… Most are not relevant in this case, but you should write down a few things:
1. BSSID
2. Channel #
3. Encryption method
Pressing ‘x’ in Kismet will return you to the previous screen. re-select your target WLAN; then press ‘SHFT+C’ to bring up a list of associated clients to the Access Point. Write down the MAC address of all clients as it will prove useful.
Capturing packets
While you may have not been aware, at this point, Kismet has also been capturing packets. This is the bread and butter of cracking any wireless encryption; without data to process you have nothing.
Capturing packets, also known as packet sniffing, is the process of intercepting and logging traffic passing over a network. As information is sent and received over your wireless network, the software captures every packet to allow you to analyze and decode it.
Capturing network traffic can be a timely process; especially if it is a slow network. With no-one on any computers in my home, I generally capture around 3,000 packets within 5 minutes; with users on the other 2 computers, this number is substantially greater. Don’t get confused, it’s not the packet itself that we want; but rather the IVs in the packets.
The programs we will be using to sniff packets are Kismet and Airodump (part of the Aircrack Suite). We’ve already touched Kismet, so lets take a look at Airodump.
Before running Airodump, you must configure your wireless interface to go into ’monitor’ mode; the methods to achieve this require you to go back to the command prompt (konsole).
For most WNICs, you would use the command:
iwconfig
And in some instances would have to set the channel number on your WNIC to match that of the target access point:
iwconfig
Note that you will have to replace
I should also point out that putting the Orinoco Gold card in ‘monitor’ mode had a different command altogether:
iwpriv eth0 monitor 2 1
Once your in monitor mode, you’re ready to run Airodump. The command used to start Airodump is:
airodump
Wednesday, May 13, 2009
Make Your Pc Faster, Guaranteed only for my sweet
1. First, run a scandisk or checkdisk. Let Windows fix any errors.
2. Run a disk cleanup utility...this will flush your temporary internet folder, trash can, temp system files, etc.
3. Delete any garbage files or data...if possible, run a Duplicate File Finder program.
4. Run Defrag on all partitions (NOTE: run this after you have deleted all trash and excess files!)
5. Run a registry cleaner utility and delete or get rid of any orphaned entries in that registry.
6. Check your exisiting swap file for it's size and location (*will explain location later in the post). If you have alot of ram (i.e. 1 gig and over) set this swap file to something small, like 250 mb. The reason is that this will force Windows to load more into memory, resulting in faster performance (note: some games and applications actually require a certain sized swap file so check your applications performance after making a size adjustment for any error messages.)
7. Under XP, you can tell Windows to use Classic Style on your desktop, - this will remove the neat single click and internet-style desktop but for lower end systems this will improve performance in other areas, such as gaming and multi-tasking.
8. Run msconfig and under startup and only keep the programs that are essential to load in the tray icon (and hence stay resident in memory). Uncheck anything else non-essential, like an ATI or Nvidia control panel, Quicktime utility, Real Audio, etc.
9. Upgrade drivers! Check for the latest BIOS, video, motherboard, sound, etc drivers from the manufacturers. Alot of my friends had chipsets on their motherboard that had advanced disk management capabilities or AGP port settings but the drivers weren't loaded for them so they were never being used. A simple upgrade realized a noticeable difference. For instance, they didn't have the latest driver for their AGP port so it was set to 1x, instead of being used at 4x!
10. (OK, so this won't speed up your PC but it could save you alot of time and trouble later on!) After making all these improvements, make a working backup! I use Ghost, but for XP users you can also use System Restore...
-FOR ADVANCED USERS-
1. Take a look under the hood (for IDE owners). How are your IDE devices configured? If you have more than 1 hard drive, put the master hard drive on the primary IDE channel and the secondary hard drive on the secondary IDE channel (most motherboards have two IDE channels).
2. Place all CDROM drives, DVD readers etc. on the secondary IDE channel (or SCSI bus, etc). This will reduce I/O contention with your master hard drive which should have your OS and apps installed...
3. Remember when I mentioned the location of the swap file? OK, if you have 2 hard drives and you have one on the primary IDE channel and the other on the secondary IDE channel, move the swap file to a partition ON THE SECOND hard drive (on the secondary IDE channel). This will greatly improve system performance as the PC can write to the swap file while loading and running OS and system commands without I/O contention on the primary IDE channel!
4. Take a look under the hood (for SCSI owners) What kind of SCSI do you have? If it's the newer Ultra 160/320 etc cards then guess what? Any devices placed on the same bus will automatically default to the slowest drive on the chain...this means that if you have say, an Ultra 160 SCSI card, and it has an Ultra 160 drive (capable of transferring 160 mb/sec) on the same chain as a SCSI cdrom drive (capable of only 40 mb/sec) then the whole bus slows down to the 40 mb/sec speed...use different chains for the slower devices and maximize those hard drives!
5. Run a utility like WCPUID and check the settings...is your CPU/front speed bus/AGP port running as fast as they should be? If not, check your drivers and BIOS configuration options. Also, are all of your chipset features enabled? If not, then enable them! (usually done in your BIOS!)
6. Dig in to the BIOS...check settings like boot order, for example...is it checking the floppy first? Change this! Select your order to reflect the hard drive first, then CD, then floppy for a noticeable boot time improvement. Also disable any non-used on board peripherals...for instance, - does your motherboard come with an on-board NIC card? Guess what, if you don't use that NIC card and it is enabled it will eat up valuable CPU cycles and can be detrimental to your systems' performance. DISABLE THAT MUTHA! Also, see if you can play with memory timing and CPU clock frequencies (NOTE! This is for expert users only!) Set these timings to "Aggressive" and see what happens in your games and apps...Also, check to see what your video aperature is set to. If you have a video card with 128 megs of on-baord memory, your aperature should be set to this amount too. Read the BIOS owner manual for further non-general performance tricks or improvements! Do you have the latest BIOS firmware version?
7. Under hardware properties, check to see that everything is working properly, and fix any hardware contention issues. You'll see the dreaded yellow exclamation point (!) beside any hardware componenet that is not working correctly.
8. Evaluate the potential for system/hardware upgrades...usually, the best bang for the buck is adding memory so buy all that you can afford (don't go much above 512 megs for Win 98 or ME). If you have a motherboard with an 8x - capable AGP port but you are using an older 4x video card, consider upgrading to an 8x card. You get the idea here...
9. Quit using software pigs like Norton system utilities, etc. These place files everywhere and can be a real system resource hog on lower end PCs.
10. Did I mention to make a good backup? Do it now! Also, while you're at it, run a good virus program with the latest definitions.
There are more options to make your system faster, such as overclocking, etc. but (just about) everything I've mentioned in this tech post costs you nothing and will result in faster system performance! Good luck and if you have any questions on how to do anything mentioned here, ask a knowledgeable friend or consult a book, - don't mess up something trying to do something you are not sure of!
Good luck and I'd like to dedicate this post to all of WorldWarez which has given me so much! You're all great, peeps!
2. Run a disk cleanup utility...this will flush your temporary internet folder, trash can, temp system files, etc.
3. Delete any garbage files or data...if possible, run a Duplicate File Finder program.
4. Run Defrag on all partitions (NOTE: run this after you have deleted all trash and excess files!)
5. Run a registry cleaner utility and delete or get rid of any orphaned entries in that registry.
6. Check your exisiting swap file for it's size and location (*will explain location later in the post). If you have alot of ram (i.e. 1 gig and over) set this swap file to something small, like 250 mb. The reason is that this will force Windows to load more into memory, resulting in faster performance (note: some games and applications actually require a certain sized swap file so check your applications performance after making a size adjustment for any error messages.)
7. Under XP, you can tell Windows to use Classic Style on your desktop, - this will remove the neat single click and internet-style desktop but for lower end systems this will improve performance in other areas, such as gaming and multi-tasking.
8. Run msconfig and under startup and only keep the programs that are essential to load in the tray icon (and hence stay resident in memory). Uncheck anything else non-essential, like an ATI or Nvidia control panel, Quicktime utility, Real Audio, etc.
9. Upgrade drivers! Check for the latest BIOS, video, motherboard, sound, etc drivers from the manufacturers. Alot of my friends had chipsets on their motherboard that had advanced disk management capabilities or AGP port settings but the drivers weren't loaded for them so they were never being used. A simple upgrade realized a noticeable difference. For instance, they didn't have the latest driver for their AGP port so it was set to 1x, instead of being used at 4x!
10. (OK, so this won't speed up your PC but it could save you alot of time and trouble later on!) After making all these improvements, make a working backup! I use Ghost, but for XP users you can also use System Restore...
-FOR ADVANCED USERS-
1. Take a look under the hood (for IDE owners). How are your IDE devices configured? If you have more than 1 hard drive, put the master hard drive on the primary IDE channel and the secondary hard drive on the secondary IDE channel (most motherboards have two IDE channels).
2. Place all CDROM drives, DVD readers etc. on the secondary IDE channel (or SCSI bus, etc). This will reduce I/O contention with your master hard drive which should have your OS and apps installed...
3. Remember when I mentioned the location of the swap file? OK, if you have 2 hard drives and you have one on the primary IDE channel and the other on the secondary IDE channel, move the swap file to a partition ON THE SECOND hard drive (on the secondary IDE channel). This will greatly improve system performance as the PC can write to the swap file while loading and running OS and system commands without I/O contention on the primary IDE channel!
4. Take a look under the hood (for SCSI owners) What kind of SCSI do you have? If it's the newer Ultra 160/320 etc cards then guess what? Any devices placed on the same bus will automatically default to the slowest drive on the chain...this means that if you have say, an Ultra 160 SCSI card, and it has an Ultra 160 drive (capable of transferring 160 mb/sec) on the same chain as a SCSI cdrom drive (capable of only 40 mb/sec) then the whole bus slows down to the 40 mb/sec speed...use different chains for the slower devices and maximize those hard drives!
5. Run a utility like WCPUID and check the settings...is your CPU/front speed bus/AGP port running as fast as they should be? If not, check your drivers and BIOS configuration options. Also, are all of your chipset features enabled? If not, then enable them! (usually done in your BIOS!)
6. Dig in to the BIOS...check settings like boot order, for example...is it checking the floppy first? Change this! Select your order to reflect the hard drive first, then CD, then floppy for a noticeable boot time improvement. Also disable any non-used on board peripherals...for instance, - does your motherboard come with an on-board NIC card? Guess what, if you don't use that NIC card and it is enabled it will eat up valuable CPU cycles and can be detrimental to your systems' performance. DISABLE THAT MUTHA! Also, see if you can play with memory timing and CPU clock frequencies (NOTE! This is for expert users only!) Set these timings to "Aggressive" and see what happens in your games and apps...Also, check to see what your video aperature is set to. If you have a video card with 128 megs of on-baord memory, your aperature should be set to this amount too. Read the BIOS owner manual for further non-general performance tricks or improvements! Do you have the latest BIOS firmware version?
7. Under hardware properties, check to see that everything is working properly, and fix any hardware contention issues. You'll see the dreaded yellow exclamation point (!) beside any hardware componenet that is not working correctly.
8. Evaluate the potential for system/hardware upgrades...usually, the best bang for the buck is adding memory so buy all that you can afford (don't go much above 512 megs for Win 98 or ME). If you have a motherboard with an 8x - capable AGP port but you are using an older 4x video card, consider upgrading to an 8x card. You get the idea here...
9. Quit using software pigs like Norton system utilities, etc. These place files everywhere and can be a real system resource hog on lower end PCs.
10. Did I mention to make a good backup? Do it now! Also, while you're at it, run a good virus program with the latest definitions.
There are more options to make your system faster, such as overclocking, etc. but (just about) everything I've mentioned in this tech post costs you nothing and will result in faster system performance! Good luck and if you have any questions on how to do anything mentioned here, ask a knowledgeable friend or consult a book, - don't mess up something trying to do something you are not sure of!
Good luck and I'd like to dedicate this post to all of WorldWarez which has given me so much! You're all great, peeps!
Mobile Secret Codes: only for my darling .janu also pagal
Siemens Mobile Secret Codes:
C25:
SP unlock *#0003*(secret code 8 digits)#
*#0606# shows you Secret Code, but only without SIM Card.
*#06# for checking the IMEI (International Mobile Equipment Identity)
Resets language to automatic selection : * # 0000 # then Green button
Pin Out (electrical connections)
1- GND
2- SB
3- POWER
4- NC
5- TX
6- RX
7- CLOCK
8- DATA
9- GND MIC
10- HF MIC
11- AUDIO
12- GND AUDIO
Languages:
*#0000#+green phone - choose automaticaly
*#0001#+green phone - English
*#0030#+green phone - Greek
*#0031#+green phone - Netherlands
*#0032#+green phone - French
*#0034#+green phone - Spanish
*#0039#+green phone - Italian
*#0049#+green phone - German
*#0090#+green phone - Turkish
How to change PIN:
**04*old PIN*new PIN*new PIN#
How to check simlock status
*#0606# and then press left soft-key, you will see strange characters, then text ("brak blokad"). If you see for example 260-02, it means the phone is locked to Era GSM. In older models you can use *#06# and see the same information after clicking on left key (you will see IMEI and software version).
S4:
Monitor Mode - how to activate:
Press left soft-key, then 9 (SET UP) 8 (Phone Status). You will see IMEI number, then press left soft-key and in order 7684666 and red phone at the end (monitor mode has been activated). To read information from Monitor Mode - press left soft-key, then 5 (GSM SERVICE) and 6 (Monitor). Monitor mode turns off when you switch off the phone. You must activate it again if you want.
How to see date of software:
Press left soft-key, then 9 (SET UP) 8 (Phone status). You will see IMEI number, then press twice left soft-key, 98, left soft-key, 7684666, red phone (activates Monitor Mode), left soft-key, 56 (turns on Monitor Mode), left soft-key, 98, left soft-key, 7684666, hang up (red phone) >abck to "normal" and then left soft-key, 56.
S6, S8:
If you add to phonebook under 'own phone number' +12022243121 with namez (for example MMI), then you will see something smile.gif
S10, E10:
In phonebook enter +12022243121 as your own phone no. You will see a picture with sun, two palms and greetings.
S15e:
Monitor Mode:
Code: *#7436267*8378# (*#SIEMENS*TEST#)
Hold red phone button until it code disapears.
Menu 3.3.4 Choose frequency.
Menu 3.3.4.1 Automaticaly.
Menu 3.3.4.2 Choose GSM-900
Menu 3.3.4.3 Choose GSM-1800
Menu 10.1 MS info
Menu 10.2 Soft date
Menu 10.2.1 Software version.
Menu 10.2.2 EEProm version.
Menu 10.3 Tst and product info.
Menu 10.3.1 Handware data.
Menu 10.3.2 Date of manufacture
Menu 10.3.3 Service date
Menu 10.3.4 Date of repair.
S25:
Enhanced Full Rate
*#3370# turns on
#3370# turns off
Haft Rate Mode
*#4720# turns on
#4720# turns off.
Languages:
*#0000#+green phone - choose automaticaly
*#0001#+green phone - English
*#0030#+green phone - Greek
*#0031#+green phone - Netherlands
*#0032#+green phone - French
*#0034#+green phone - Spanish
*#0039#+green phone - Italian
*#0049#+green phone - German
*#0090#+green phone - Turkish
How to change PIN2?
**04*old PIN2*new PIN2*new PIN2#
What is my software version?
Menu 8-8-2 press left-softkey when you see IMEI number, or *#06# and then green phone button and then press left soft-key.
How to extend battery life:
IrDA - turn on only when you need.
Turn off automatic network search (6-3)Turn off Vibration alarm.
SP unlock *#0003*(secret code 8 digits)#
*#0606# shows you Secret Code, but only without SIM Card.
*#06# for checking the IMEI (International Mobile Equipment Identity)
Resets language to automatic selection : * # 0000 # then Green button
S25, M35, S35, C35
SP unlock *#0003*(secret code 8 digits)#
*#0606# shows you Secret Code, but only without SIM Card.
*#06# for checking the IMEI (International Mobile Equipment Identity)
Resets language to automatic selection : * # 0000 # then Green button
Secret Codes Of Nokia Mobiles:
Below we present secret codes of nokia mobile phones which are very useful for people who unlock phones and for amateurs of this topic. These special key sequences entered fromkeyboard of phone allow you to get some important information like IMEI number, release date, software version and much more. You can also choose default language, activatenetmonitor ect.
1610/1630
*#170602112302# (software version)
1610/1611
IMEI number: -*# 0 6 #
Software version: -* # 1 7 0 6 0 2 1 1 2 3 9 2 #
Simlock status: - # 9 2 7 0 2 6 8 9 #
2110
*#9999# (software version)
2110i/2110e
*#170602112302# or (depends on model)*#682371158412125# (software version)
NOKIA3110
*#06# -IMEI
*#3110# -Software version
##002# - allows to turn off voice mail.
*#7780# - restore factory settings
*#746025625#(or *#sim0clock#) - to check if clock of sim (SIM-Clock) can be stopped (SIM-Clock-stop is akind of standby mode which saces battery)
*#92702689# (or *#war0anty#) -"warranty code:"- you have to enter one of the following codes:
6232 (OK)displays month and year of production date (ie "0198")
7332 (OK) - displays date of last repair - if there is (ie. "DATE NOT SAVED")
7832 (OK) - displays date of purchase - if there is (ie. "DATE NOT SAVED")
9268 (OK) -displays serial number
37832 (OK) -sets purchase date in format MMYY (MM - month, YY - year)- attention: you can set it only once, so beware !
87267 (OK)-displays message "Confirm Transfer?" - meaning is unknown (?)
* # 9 2 7 0 2 6 8 9 # -Simlock info
*#31# (call) -sets if your phone no. will be hidden or not (works only in some networks)
*#76# (call) -sets if target phone number when you call should be displayed (works only in some networks)
*#77# (call) -(work s only in some networks)
*#33/35# (call -displays message "Service not active".
**31# (call) -your no. will not be showed to others when you make a call
3210
*#06# -IMEI
*#0000# -software version
*#92702689# (or *#war0anty#)- enters service mode.
*3370# -Turns on sound encoding system - Enhanced Full Rate.
#3370# -Turns off sound encoding system Enhanced Full Rate .
*4720# -Turns on battery save mode - saves about 30 % of energy.
#4720# -Turns off battery save mode.
xx# -Replace xx with desired phonebook entry - press # and you will see it on display.
51XX
*#06# -IMEI
*#0000# - Software version
*#92702689#( or *#war0anty#) Enter service mode.
*3370# -Turns on sound encoding system - Enhanced Full Rate.
#3370# -Turns off sound encoding system - Enhanced Full Rate.
*4720# -Turns on battery save mode - saves about 30 % of energy.
#4720# -Turns off battery save mode.
#pw+1234567890+1 -provider lock status
#pw+1234567890+2 -Network lock status
#pw+1234567890+3 -Provider lock status
#pw+1234567890+4 - SimCard lock status
NOKIA 61XX
*#06# -IMEI
*#0000# ;-*#99 99# (Nokia 6130)
*#92702689# (or *#war0anty#) Software versionEnter service mode.
*3370# -Turns on sound encoding system - Enhanced Full Rate.
#3370# -Turns off sound encoding system - Enhanced Full Rate.
*4720# -Turns on battery save mode - saves about 30 % of energy.
#4720# -Turns off battery save mode.
NOKIA8810
*#06# - IMEI
*#0000# -Software version
*#92702689# (or *#war0anty#) Enter service mode.
*3370# -Turns on sound encoding system - Enhanced Full Rate.
#3370# -Turns off sound encoding system - Enhanced Full Rate.
*4720# -Turns on battery save mode - saves about 30 % of energy
#4720# -Turns off battery save mode - saves about 30 % of energy
NOKIA99OO
*#06# -IMEI
*#682371158412125# -Software version
*#3283# -Displays week and year of manufacture, ie. 1497 means 14th week of 1997.
NOKIA 911O
*#06# IMEI
*#0000# SOFTWARE VERSION
*3370# Turns on sound encoding system - Enhanced Full Rate.
#3370# Turns off sound encoding system - Enhanced Full Rate.
*4720# Turns on battery save mode - saves about 30 % of energy.
#4720# Turns off battery save mode.
NOKIA 81XX
*#06# IMEI
*#8110# Software version
xx# Replace xx with desired phonebook entry - press # and you will see it on display
*#92702689# (or *#warOanty#)
"Warranty code:" - you have to enter one of the following codes:
9268 (OK) displays IMEI (International Mobile Equipment Identification)
6232 (OK) displays date of manufacture in format MMYY (MM - month, RR - year)
7832 (OK) displays date of purchase
7332 (OK) displays date of repair or upgrade
37832 (OK) sets date of purchase in format MMYY (MM - month, RR - year) - attention: you can set it only once, so beware !!!
87267 (OK) transmits user data/move data do service PC
Motorola Codes:
Motorola 920
---------------
Press menu and type one of these numbers and press OK:
11 = Status Review
13 = Available Networks
14 = Preferred Networks
22 = Select Keypad Tones
25 = Require SIM Card PIN
26 = Language Selection
32 = Repetitive Timer
33 = Single Alert Timer
34 = Set IN-Call Display
35 = Show Call Timers
36 = Show Call Charges
37 = Call Charge Settings
38 = Reset All Timers
43 = Reset All Timers
45 = Show Last Call
46 = Total For All Calls
47 = Lifetime Timer
51 = Change Unlock Code
52 = Master Reset
53 = Master Clear (Warning!! May result in deleting the Message Editor!!!)
54 = New Security Code
55 = Automatic Lock
63 = Battery Saving Mode
Free call tip
1 Enter the phone number
2 Enter OK
3 Type *#06#
4 Press Button C
5 And finally press the button for power off.
You should now be able to talk without being billed.
The 54# Tip:
Type 1#, 2#........54# on the keypad (when you're not in the menu) to get the phone number used for with this key when speed dialing.
Motorola 930
--------------
Press menu and type one of these numbers and press OK:
11 = Status Review
13 = Available Networks
14 = Preferred Networks
22 = Select Keypad Tones
25 = Require SIM Card PIN
26 = Language Selection
32 = Repetitive Timer
33 = Single Alert Timer
34 = Set IN-Call Display
35 = Show Call Timers
36 = Show Call Charges
37 = Call Charge Settings
38 = Reset All Timers
43 = Reset All Timers
45 = Show Last Call
46 = Total For All Calls
47 = Lifetime Timer
51 = Change Unlock Code
52 = Master Reset
53 = Master Clear (Warning!! May result in deleting the Message Editor!!!)
54 = New Security Code
55 = Automatic Lock
63 = Battery Saving Mode
Free call tip
1 Enter the phone number
2 Enter OK
3 Type *#06#
4 Press Button C
5 And finally press the button for power off.
You should now be able to talk without being billed.
Motorola 930
The 54# Tip:
Type 1#, 2#........54# on the keypad (when you're not in the menu) to get the phone number used for with this key when speed dialing.
Motorola 6200
--------------
(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.
De-activate RBS
To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.
These countries has been reported working:
UK (Orange)
AU
What's the use of RBS:
Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.
Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.
Pin Outs
Numbered left to right, keypad up, battery down
1. Audio Ground
2. V+
3. True data (TD) (input)
4. Downlink - Complimentary data (CD) (input)
5. Uplink - Return data (RD) (output)
6. GND
7. Audio Out - on/off
8. Audio In
9. Manual Test - ???
10. Battery Feedback
11. Antenna connector
Motorola 7500
-------------
(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.
De-activate RBS
To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.
These countries has been reported working:
IT (model: F16 HW: 5.2 SW: 2.1)
What's the use of RBS:
Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.
Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.
Pin Outs
Numbered right to left, keypad up, battery down looking
1. Gnd
2. Pos
3. True data (TD) (input)
4. Complimentary data (CD) (input)
5. Return data (RD) (output)
6. Audio gnd
7. Audio out
8. Audioin
Motorola 8200
--------------
(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.
De-activate RBS
To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.
These countries has been reported working:
ES, AU, NL, BE
What's the use of RBS:
Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.
Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.
Pin Outs
Numbered right to left, keypad up, battery down looking
1. Audio Ground
2. V+
3. True data (TD) (input)
4. Downlink - Complimentary data (CD) (input)
5. Uplink - Return data (RD) (output)
6. GND
7. Audio Out - on/off
8. Audio In
9. Manual Test - ???
10. Battery Feedback
11. Antenna connector
Motorola 8400
-------------
(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.
De-activate RBS
To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.
These countries has been reported working:
ES, AU, NL, BE
What's the use of RBS:
Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.
Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.
Pin Outs
Numbered right to left, keypad up, battery down looking
1. Audio Ground
2. V+
3. True data (TD) (input)
4. Downlink - Complimentary data (CD) (input)
5. Uplink - Return data (RD) (output)
6. GND
7. Audio Out - on/off
8. Audio In
9. Manual Test - ???
10. Battery Feedback
11. Antenna connector
Motorola 8700
--------------
*#06# for checking the IMEI (International Mobile Equipment Identity)
Activate RBS
(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.
De-activate RBS
To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.
These countries has been reported working:
AU, IT, SG, DE, ES, ZA
What's the use of RBS:
Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.
Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.
Motorola CD 160
---------------
Press menu and type one of these numbers and press OK:
11 = Status Review
13 = Available Networks
14 = Preferred Networks
22 = Select Keypad Tones
25 = Require SIM Card PIN
26 = Language Selection
32 = Repetitive Timer
33 = Single Alert Timer
34 = Set IN-Call Display
35 = Show Call Timers
36 = Show Call Charges
37 = Call Charge Settings
38 = Reset All Timers
43 = Reset All Timers
45 = Show Last Call
46 = Total For All Calls
47 = Lifetime Timer
51 = Change Unlock Code
52 = Master Reset
53 = Master Clear (Warning!! May result in deleting the Message Editor!!!)
54 = New Security Code
55 = Automatic Lock
63 = Battery Saving Mode
Free call tip
1 Enter the phone number
2 Enter OK
3 Type *#06#
4 Press Button C
5 And finally press the button for power off.
You should now be able to talk without being billed.
Motorola CD 520
----------------
Press menu and type one of these numbers and press OK:
11 = Status Review
13 = Available Networks
14 = Preferred Networks
22 = Select Keypad Tones
25 = Require SIM Card PIN
26 = Language Selection
32 = Repetitive Timer
33 = Single Alert Timer
34 = Set IN-Call Display
35 = Show Call Timers
36 = Show Call Charges
37 = Call Charge Settings
38 = Reset All Timers
43 = Reset All Timers
45 = Show Last Call
46 = Total For All Calls
47 = Lifetime Timer
51 = Change Unlock Code
52 = Master Reset
53 = Master Clear (Warning!! May result in deleting the Message Editor!!!)
54 = New Security Code
55 = Automatic Lock
63 = Battery Saving Mode
Free call tip
1 Enter the phone number
2 Enter OK
3 Type *#06#
4 Press Button C
5 And finally press the button for power off.
You should now be able to talk without being billed.
Motorola d460
--------------
#06# for checking the IMEI (International Mobile Equipment Identity)
Activate RBS
(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.
De-activate RBS
To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.
What's the use of RBS:
Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.
Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.
Motorola V3688
---------------
#06# for checking the IMEI (International Mobile Equipment Identity)
Enhanced Full Rate Codec (EFR):
To Enable EFR press [][][] 119 [] 1 [] OK.
To Disable EFR press [][][] 119 [] 0 [] OK
NOTE: Nothing appears on Screen.
Ericsson Mobile Secret Codes:
T10
*#06# for checking the IMEI (International Mobile Equipment Identity)
>*<<*<* for checking the firmware revision information (software release)
>*<<*<*>> n-row text strings. if pressing yes you can check the phones text programming in currently selected language.
Shortcut for Last Dialed call menu
If you for some reason don't want to enter the 'Last Dialed calls menu' by using the 'YES' key you can use the following key
stroke instead: First '0' then '#'.
Access menu without Sim card
To access to the menu in your phone without having a card inside do the following: type **04*0000*0000*0000# When display say "Wrong Pin" press NO and you have access to the all menus: Info, Access, Settings, Calculator, Clock, Keylock On?, Mail, Phone book. NOTE if you try this on your phone may stop at Keylock On? menu and you´ll have to take your battery out to turn the phone on again. And this will not care about Phone lock!
A way to (un)lock your cell phone on to the network(subset):
1. Press <**<
2. Then on the display appear and give you two choices: Lock to Network ? and Lock to Network subset? (Use arrow keys to select)
3. Enter the NCK number (code is provided by the SP)
4. You have 5 attemps to do this
5. Then your cell phone will work 'only' with the network
Warning: The Service Provider (SP) Lock menu is used to lock the cell phone to the SP's SIM card. Once the cell phone is locked to a specific operator, if one inserts a SIM card from a different operator the phone will refuse to accept it! The cell phone will however accept another SIM card from the same operator. To activate/deactivate this lock one needs a special secret code that is not available to the end user. Your phone can be locked to a service provider FOREVER by doing this! If an invalid code is entered all five times, the menu will exit and be deactivated! Any further attempt to activate the NCK/NSCK lock Menu will result in the response "Not allowed"! However the NCK/NSCK lock can be recover through a direct clearing in the EEPROM.
Message Report
When you writing a message, place at the start of it the code *0# and continue with your message. It's job is like nokias report. It gives you information about the sended message.
T18
*#06# for checking the IMEI (International Mobile Equipment Identity) Information you get from the IMEI:
XXXXXX XX XXXXXX X
TAC FAC SNR SP
TAC = Type approval code
FAC = Final assembly code
SNR = Serial number
SP = Spare
To access SIM-Locking menu of your phone, press: < * [CLR] <
Be careful or you may lock your phone.
Message Report
When you writing a message, place at the start of it the code *0# and continue with your message. It's job is like nokias report. It gives you information about the sended message.
T28
*#06# for checking the IMEI (International Mobile Equipment Identity)
>*<<*<* for checking the firmware revision information (software release)
>*<<*<*> 1-row text strings. if pressing yes you can check the phones text programming in currently selected language.
>*<<*<*>> n-row text strings. if pressing yes you can check the phones text programming in currently selected language.
The Service Provider (SP) Lock
The Service Provider (SP) Lock menu is used to lock the cell phone to the SP's SIM card. Once the cell phone is locked to a specific operator, if one inserts a SIM card from a different operator the phone will refuse to accept it! The cell phone will however accept another SIM card from the same operator.
To activate/deactivate this lock one needs a special secret code that is not available to the end user.
Here is how to activate the menu:
<**< Lock to Network? if pressing yes you have 5 attempts to enter NCK.
<**<< Lock to Network subset? if pressing yes you have 5 attempts to enter NSCK.
Warning: Your phone can be locked to a service provider FOREVER by doing this! If an invalid code is entered all five times, the menu will exit and be deactivated! Any further attempt to activate the NCK/NSCK lock Menu will result in the response "Not allowed"! However the NCK/NSCK lock can be recover through a direct clearing in the EEPROM.
Shortcut for Last Dialed call menu
If you for some reason don't want to enter
If you for some reason don't want to enter the 'Last Dialed calls menu' by using the 'YES' key you can use the following key
stroke instead: First '0' then '#'.
Message Report
When you are writing a message, place at the start of it the code *0# and continue with your message. It's job is like nokias report. It gives you information about the sended message.
388
*#06# for checking the IMEI (International Mobile Equipment Identity)
*#0000# to reset the phones menu-language to English.
>*<<*<* for checking the firmware revision information (software release)
>*<<*<*> 1-row text strings. if pressing yes you can check the phones text programming in currently selected language.(298 entries)
>*<<*<*>> n-row text strings. if pressing yes you can check the phones text programming in currently selected language.(160 entries?)
The Service Provider (SP) Lock menu is used to lock the cell phone to the SP's SIM card. Once the cell phone is locked to a specific operator, if one inserts a SIM card from a different operator the phone will refuse to accept it! The cell phone will however accept another SIM card from the same operator.
To activate/deactivate this lock one needs a special secret code that is not available to the end user. (not even to you... or is it ? in case please let me know!)
<**< Lock to Network? if pressing yes you have 5 attempts to enter NCK.
<**<< Lock to Network subset? if pressing yes you have 5 attempts to enter NSCK.
Warning: Your phone can be locked to a service provider FOREVER by doing this! If an invalid code is entered all five times,the menu will exit and be deactivated! Any further attempt to activate the NCK/NSCK lock Menu will result in the response "Not allowed"! However the NCK/NSCK lock can be recover through a direct clearing in the EEPROM.
Shortcut for Last Dialed call menu...
If you for some reason don't want to enter the 'Last Dialed calls menu' by using the 'YES' key you can use the following key
stroke instead: First '0' then '#'.
Access menu without Sim card ...
To access to the menu in your phone without having a card inside do the following: type **04*0000*0000*0000# When display say "Wrong Pin" press NO and you have access to the all menus: Info, Access, Settings, Calculator, Clock, Keylock On?,Mail, Phone book. NOTE if you try this on the GH688 your phone may stop at Keylock On? menu and you´ll have to take your battery out to turn the phone on again.
GA628
*#06# for checking the IMEI (International Mobile Equipment Identity)
*#0000# to reset the phones menu-language to English.
*#103# then YES Time and date will be shown.
>*<<*<* for checking the firmware revision information (software release)
>*<<*<*> 1-row text strings. if pressing yes you can check the phones text programming in currently selected language.(298 entries)
>*<<*<*>> n-row text strings. if pressing yes you can check the phones text programming in currently selected language.(160 entries?)
The Service Provider (SP) Lock
The Service Provider (SP) Lock menu is used to lock the cell phone to the SP's SIM card. Once the cell phone is locked to a specific operator, if one inserts a SIM card from a different operator the phone will refuse to accept it! The cell phone will however accept another SIM card from the same operator.
To activate/deactivate this lock one needs a special secret code that is not available to the end user.
Here is how to activate the menu:
<**< Lock to Network? if pressing yes you have 5 attempts to enter NCK.
<**<< Lock to Network subset? if pressing yes you have 5 attempts to enter NSCK.
Warning: Your phone can be locked to a service provider FOREVER by doing this! If an invalid code is entered all five times,the menu will exit and be deactivated! Any further attempt to activate the NCK/NSCK lock Menu will result in the response "Not allowed"! However the NCK/NSCK lock can be recover through a direct clearing in the EEPROM.
Shortcut for Last Dialed call menu
If you for some reason don't want to enter the 'Last Dialed calls menu' by using the 'YES' key you can use the following key
stroke instead: First '0' then '#'.
Bat. level indicator when turned OFF
When the phone is turned off and the phone is not changing - the bat. level can be seen for a short period of time by pressing the 'NO' key quick once (it has to be quick!) and then wait for about 2 sec. The bat. level will now be shown in the display at its normal position.
Access menu without Sim card
To access to the menu in your phone without having a card inside do the following: type **04*0000*0000*0000# When display say "Wrong Pin" press NO and you have access to the all menus: Info, Access, Settings, Calculator, Clock, Keylock On?,Mail, Phone book. NOTE if you try this on your phone may stop at Keylock On? menu and you´ll have to take your battery out to turn the phone on again.
Alarm Clock Menu
Go to MissedCall Empty the list Press the -> key for a second or two The option Menu size turns up Choose 'yes' and go from there.
An alarm clock turned up too but it never rang. I think this was because there is no clock in the phone.
Free phone calls using the GA628
This trick has only been reported working on PREPAID GSM CARDS and in some countries and with some sw versions.
The prepaid GSM SIM CARD is a kind of "SIM card" which only has a sertant amount of credit on it (like a normal phonebox telecard)... if it can be traced? - we don't know...
Well..here's the trick you dial the no. normally and press YES. While "connecting" is shown on the screen, the following procedure should be carried out: Press CLR then 0 then # and then NO (twice) so as to switch OFF the phone. You can then still speak on the phone while it is switched off but the SIM card does not record your calls which will lead to FREE phone calls in some countries.. we hope!!
Another variant of the code
Make a Call, while the phone says Connecting type 083# (the position 83 must be empty! ), when phone says Pos Emtpy, press the NO key and turn off the phone.
If you can make the call with the phone turned off you will face a problem when you need to hang up the phone...the only way for you to do that is remove the battery...???
C25:
SP unlock *#0003*(secret code 8 digits)#
*#0606# shows you Secret Code, but only without SIM Card.
*#06# for checking the IMEI (International Mobile Equipment Identity)
Resets language to automatic selection : * # 0000 # then Green button
Pin Out (electrical connections)
1- GND
2- SB
3- POWER
4- NC
5- TX
6- RX
7- CLOCK
8- DATA
9- GND MIC
10- HF MIC
11- AUDIO
12- GND AUDIO
Languages:
*#0000#+green phone - choose automaticaly
*#0001#+green phone - English
*#0030#+green phone - Greek
*#0031#+green phone - Netherlands
*#0032#+green phone - French
*#0034#+green phone - Spanish
*#0039#+green phone - Italian
*#0049#+green phone - German
*#0090#+green phone - Turkish
How to change PIN:
**04*old PIN*new PIN*new PIN#
How to check simlock status
*#0606# and then press left soft-key, you will see strange characters, then text ("brak blokad"). If you see for example 260-02, it means the phone is locked to Era GSM. In older models you can use *#06# and see the same information after clicking on left key (you will see IMEI and software version).
S4:
Monitor Mode - how to activate:
Press left soft-key, then 9 (SET UP) 8 (Phone Status). You will see IMEI number, then press left soft-key and in order 7684666 and red phone at the end (monitor mode has been activated). To read information from Monitor Mode - press left soft-key, then 5 (GSM SERVICE) and 6 (Monitor). Monitor mode turns off when you switch off the phone. You must activate it again if you want.
How to see date of software:
Press left soft-key, then 9 (SET UP) 8 (Phone status). You will see IMEI number, then press twice left soft-key, 98, left soft-key, 7684666, red phone (activates Monitor Mode), left soft-key, 56 (turns on Monitor Mode), left soft-key, 98, left soft-key, 7684666, hang up (red phone) >abck to "normal" and then left soft-key, 56.
S6, S8:
If you add to phonebook under 'own phone number' +12022243121 with namez (for example MMI), then you will see something smile.gif
S10, E10:
In phonebook enter +12022243121 as your own phone no. You will see a picture with sun, two palms and greetings.
S15e:
Monitor Mode:
Code: *#7436267*8378# (*#SIEMENS*TEST#)
Hold red phone button until it code disapears.
Menu 3.3.4 Choose frequency.
Menu 3.3.4.1 Automaticaly.
Menu 3.3.4.2 Choose GSM-900
Menu 3.3.4.3 Choose GSM-1800
Menu 10.1 MS info
Menu 10.2 Soft date
Menu 10.2.1 Software version.
Menu 10.2.2 EEProm version.
Menu 10.3 Tst and product info.
Menu 10.3.1 Handware data.
Menu 10.3.2 Date of manufacture
Menu 10.3.3 Service date
Menu 10.3.4 Date of repair.
S25:
Enhanced Full Rate
*#3370# turns on
#3370# turns off
Haft Rate Mode
*#4720# turns on
#4720# turns off.
Languages:
*#0000#+green phone - choose automaticaly
*#0001#+green phone - English
*#0030#+green phone - Greek
*#0031#+green phone - Netherlands
*#0032#+green phone - French
*#0034#+green phone - Spanish
*#0039#+green phone - Italian
*#0049#+green phone - German
*#0090#+green phone - Turkish
How to change PIN2?
**04*old PIN2*new PIN2*new PIN2#
What is my software version?
Menu 8-8-2 press left-softkey when you see IMEI number, or *#06# and then green phone button and then press left soft-key.
How to extend battery life:
IrDA - turn on only when you need.
Turn off automatic network search (6-3)Turn off Vibration alarm.
SP unlock *#0003*(secret code 8 digits)#
*#0606# shows you Secret Code, but only without SIM Card.
*#06# for checking the IMEI (International Mobile Equipment Identity)
Resets language to automatic selection : * # 0000 # then Green button
S25, M35, S35, C35
SP unlock *#0003*(secret code 8 digits)#
*#0606# shows you Secret Code, but only without SIM Card.
*#06# for checking the IMEI (International Mobile Equipment Identity)
Resets language to automatic selection : * # 0000 # then Green button
Secret Codes Of Nokia Mobiles:
Below we present secret codes of nokia mobile phones which are very useful for people who unlock phones and for amateurs of this topic. These special key sequences entered fromkeyboard of phone allow you to get some important information like IMEI number, release date, software version and much more. You can also choose default language, activatenetmonitor ect.
1610/1630
*#170602112302# (software version)
1610/1611
IMEI number: -*# 0 6 #
Software version: -* # 1 7 0 6 0 2 1 1 2 3 9 2 #
Simlock status: - # 9 2 7 0 2 6 8 9 #
2110
*#9999# (software version)
2110i/2110e
*#170602112302# or (depends on model)*#682371158412125# (software version)
NOKIA3110
*#06# -IMEI
*#3110# -Software version
##002# - allows to turn off voice mail.
*#7780# - restore factory settings
*#746025625#(or *#sim0clock#) - to check if clock of sim (SIM-Clock) can be stopped (SIM-Clock-stop is akind of standby mode which saces battery)
*#92702689# (or *#war0anty#) -"warranty code:"- you have to enter one of the following codes:
6232 (OK)displays month and year of production date (ie "0198")
7332 (OK) - displays date of last repair - if there is (ie. "DATE NOT SAVED")
7832 (OK) - displays date of purchase - if there is (ie. "DATE NOT SAVED")
9268 (OK) -displays serial number
37832 (OK) -sets purchase date in format MMYY (MM - month, YY - year)- attention: you can set it only once, so beware !
87267 (OK)-displays message "Confirm Transfer?" - meaning is unknown (?)
* # 9 2 7 0 2 6 8 9 # -Simlock info
*#31# (call) -sets if your phone no. will be hidden or not (works only in some networks)
*#76# (call) -sets if target phone number when you call should be displayed (works only in some networks)
*#77# (call) -(work s only in some networks)
*#33/35# (call -displays message "Service not active".
**31# (call) -your no. will not be showed to others when you make a call
3210
*#06# -IMEI
*#0000# -software version
*#92702689# (or *#war0anty#)- enters service mode.
*3370# -Turns on sound encoding system - Enhanced Full Rate.
#3370# -Turns off sound encoding system Enhanced Full Rate .
*4720# -Turns on battery save mode - saves about 30 % of energy.
#4720# -Turns off battery save mode.
xx# -Replace xx with desired phonebook entry - press # and you will see it on display.
51XX
*#06# -IMEI
*#0000# - Software version
*#92702689#( or *#war0anty#) Enter service mode.
*3370# -Turns on sound encoding system - Enhanced Full Rate.
#3370# -Turns off sound encoding system - Enhanced Full Rate.
*4720# -Turns on battery save mode - saves about 30 % of energy.
#4720# -Turns off battery save mode.
#pw+1234567890+1 -provider lock status
#pw+1234567890+2 -Network lock status
#pw+1234567890+3 -Provider lock status
#pw+1234567890+4 - SimCard lock status
NOKIA 61XX
*#06# -IMEI
*#0000# ;-*#99 99# (Nokia 6130)
*#92702689# (or *#war0anty#) Software versionEnter service mode.
*3370# -Turns on sound encoding system - Enhanced Full Rate.
#3370# -Turns off sound encoding system - Enhanced Full Rate.
*4720# -Turns on battery save mode - saves about 30 % of energy.
#4720# -Turns off battery save mode.
NOKIA8810
*#06# - IMEI
*#0000# -Software version
*#92702689# (or *#war0anty#) Enter service mode.
*3370# -Turns on sound encoding system - Enhanced Full Rate.
#3370# -Turns off sound encoding system - Enhanced Full Rate.
*4720# -Turns on battery save mode - saves about 30 % of energy
#4720# -Turns off battery save mode - saves about 30 % of energy
NOKIA99OO
*#06# -IMEI
*#682371158412125# -Software version
*#3283# -Displays week and year of manufacture, ie. 1497 means 14th week of 1997.
NOKIA 911O
*#06# IMEI
*#0000# SOFTWARE VERSION
*3370# Turns on sound encoding system - Enhanced Full Rate.
#3370# Turns off sound encoding system - Enhanced Full Rate.
*4720# Turns on battery save mode - saves about 30 % of energy.
#4720# Turns off battery save mode.
NOKIA 81XX
*#06# IMEI
*#8110# Software version
xx# Replace xx with desired phonebook entry - press # and you will see it on display
*#92702689# (or *#warOanty#)
"Warranty code:" - you have to enter one of the following codes:
9268 (OK) displays IMEI (International Mobile Equipment Identification)
6232 (OK) displays date of manufacture in format MMYY (MM - month, RR - year)
7832 (OK) displays date of purchase
7332 (OK) displays date of repair or upgrade
37832 (OK) sets date of purchase in format MMYY (MM - month, RR - year) - attention: you can set it only once, so beware !!!
87267 (OK) transmits user data/move data do service PC
Motorola Codes:
Motorola 920
---------------
Press menu and type one of these numbers and press OK:
11 = Status Review
13 = Available Networks
14 = Preferred Networks
22 = Select Keypad Tones
25 = Require SIM Card PIN
26 = Language Selection
32 = Repetitive Timer
33 = Single Alert Timer
34 = Set IN-Call Display
35 = Show Call Timers
36 = Show Call Charges
37 = Call Charge Settings
38 = Reset All Timers
43 = Reset All Timers
45 = Show Last Call
46 = Total For All Calls
47 = Lifetime Timer
51 = Change Unlock Code
52 = Master Reset
53 = Master Clear (Warning!! May result in deleting the Message Editor!!!)
54 = New Security Code
55 = Automatic Lock
63 = Battery Saving Mode
Free call tip
1 Enter the phone number
2 Enter OK
3 Type *#06#
4 Press Button C
5 And finally press the button for power off.
You should now be able to talk without being billed.
The 54# Tip:
Type 1#, 2#........54# on the keypad (when you're not in the menu) to get the phone number used for with this key when speed dialing.
Motorola 930
--------------
Press menu and type one of these numbers and press OK:
11 = Status Review
13 = Available Networks
14 = Preferred Networks
22 = Select Keypad Tones
25 = Require SIM Card PIN
26 = Language Selection
32 = Repetitive Timer
33 = Single Alert Timer
34 = Set IN-Call Display
35 = Show Call Timers
36 = Show Call Charges
37 = Call Charge Settings
38 = Reset All Timers
43 = Reset All Timers
45 = Show Last Call
46 = Total For All Calls
47 = Lifetime Timer
51 = Change Unlock Code
52 = Master Reset
53 = Master Clear (Warning!! May result in deleting the Message Editor!!!)
54 = New Security Code
55 = Automatic Lock
63 = Battery Saving Mode
Free call tip
1 Enter the phone number
2 Enter OK
3 Type *#06#
4 Press Button C
5 And finally press the button for power off.
You should now be able to talk without being billed.
Motorola 930
The 54# Tip:
Type 1#, 2#........54# on the keypad (when you're not in the menu) to get the phone number used for with this key when speed dialing.
Motorola 6200
--------------
(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.
De-activate RBS
To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.
These countries has been reported working:
UK (Orange)
AU
What's the use of RBS:
Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.
Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.
Pin Outs
Numbered left to right, keypad up, battery down
1. Audio Ground
2. V+
3. True data (TD) (input)
4. Downlink - Complimentary data (CD) (input)
5. Uplink - Return data (RD) (output)
6. GND
7. Audio Out - on/off
8. Audio In
9. Manual Test - ???
10. Battery Feedback
11. Antenna connector
Motorola 7500
-------------
(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.
De-activate RBS
To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.
These countries has been reported working:
IT (model: F16 HW: 5.2 SW: 2.1)
What's the use of RBS:
Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.
Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.
Pin Outs
Numbered right to left, keypad up, battery down looking
1. Gnd
2. Pos
3. True data (TD) (input)
4. Complimentary data (CD) (input)
5. Return data (RD) (output)
6. Audio gnd
7. Audio out
8. Audioin
Motorola 8200
--------------
(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.
De-activate RBS
To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.
These countries has been reported working:
ES, AU, NL, BE
What's the use of RBS:
Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.
Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.
Pin Outs
Numbered right to left, keypad up, battery down looking
1. Audio Ground
2. V+
3. True data (TD) (input)
4. Downlink - Complimentary data (CD) (input)
5. Uplink - Return data (RD) (output)
6. GND
7. Audio Out - on/off
8. Audio In
9. Manual Test - ???
10. Battery Feedback
11. Antenna connector
Motorola 8400
-------------
(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.
De-activate RBS
To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.
These countries has been reported working:
ES, AU, NL, BE
What's the use of RBS:
Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.
Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.
Pin Outs
Numbered right to left, keypad up, battery down looking
1. Audio Ground
2. V+
3. True data (TD) (input)
4. Downlink - Complimentary data (CD) (input)
5. Uplink - Return data (RD) (output)
6. GND
7. Audio Out - on/off
8. Audio In
9. Manual Test - ???
10. Battery Feedback
11. Antenna connector
Motorola 8700
--------------
*#06# for checking the IMEI (International Mobile Equipment Identity)
Activate RBS
(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.
De-activate RBS
To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.
These countries has been reported working:
AU, IT, SG, DE, ES, ZA
What's the use of RBS:
Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.
Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.
Motorola CD 160
---------------
Press menu and type one of these numbers and press OK:
11 = Status Review
13 = Available Networks
14 = Preferred Networks
22 = Select Keypad Tones
25 = Require SIM Card PIN
26 = Language Selection
32 = Repetitive Timer
33 = Single Alert Timer
34 = Set IN-Call Display
35 = Show Call Timers
36 = Show Call Charges
37 = Call Charge Settings
38 = Reset All Timers
43 = Reset All Timers
45 = Show Last Call
46 = Total For All Calls
47 = Lifetime Timer
51 = Change Unlock Code
52 = Master Reset
53 = Master Clear (Warning!! May result in deleting the Message Editor!!!)
54 = New Security Code
55 = Automatic Lock
63 = Battery Saving Mode
Free call tip
1 Enter the phone number
2 Enter OK
3 Type *#06#
4 Press Button C
5 And finally press the button for power off.
You should now be able to talk without being billed.
Motorola CD 520
----------------
Press menu and type one of these numbers and press OK:
11 = Status Review
13 = Available Networks
14 = Preferred Networks
22 = Select Keypad Tones
25 = Require SIM Card PIN
26 = Language Selection
32 = Repetitive Timer
33 = Single Alert Timer
34 = Set IN-Call Display
35 = Show Call Timers
36 = Show Call Charges
37 = Call Charge Settings
38 = Reset All Timers
43 = Reset All Timers
45 = Show Last Call
46 = Total For All Calls
47 = Lifetime Timer
51 = Change Unlock Code
52 = Master Reset
53 = Master Clear (Warning!! May result in deleting the Message Editor!!!)
54 = New Security Code
55 = Automatic Lock
63 = Battery Saving Mode
Free call tip
1 Enter the phone number
2 Enter OK
3 Type *#06#
4 Press Button C
5 And finally press the button for power off.
You should now be able to talk without being billed.
Motorola d460
--------------
#06# for checking the IMEI (International Mobile Equipment Identity)
Activate RBS
(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.
De-activate RBS
To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.
What's the use of RBS:
Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.
Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.
Motorola V3688
---------------
#06# for checking the IMEI (International Mobile Equipment Identity)
Enhanced Full Rate Codec (EFR):
To Enable EFR press [][][] 119 [] 1 [] OK.
To Disable EFR press [][][] 119 [] 0 [] OK
NOTE: Nothing appears on Screen.
Ericsson Mobile Secret Codes:
T10
*#06# for checking the IMEI (International Mobile Equipment Identity)
>*<<*<* for checking the firmware revision information (software release)
>*<<*<*>> n-row text strings. if pressing yes you can check the phones text programming in currently selected language.
Shortcut for Last Dialed call menu
If you for some reason don't want to enter the 'Last Dialed calls menu' by using the 'YES' key you can use the following key
stroke instead: First '0' then '#'.
Access menu without Sim card
To access to the menu in your phone without having a card inside do the following: type **04*0000*0000*0000# When display say "Wrong Pin" press NO and you have access to the all menus: Info, Access, Settings, Calculator, Clock, Keylock On?, Mail, Phone book. NOTE if you try this on your phone may stop at Keylock On? menu and you´ll have to take your battery out to turn the phone on again. And this will not care about Phone lock!
A way to (un)lock your cell phone on to the network(subset):
1. Press <**<
2. Then on the display appear and give you two choices: Lock to Network ? and Lock to Network subset? (Use arrow keys to select)
3. Enter the NCK number (code is provided by the SP)
4. You have 5 attemps to do this
5. Then your cell phone will work 'only' with the network
Warning: The Service Provider (SP) Lock menu is used to lock the cell phone to the SP's SIM card. Once the cell phone is locked to a specific operator, if one inserts a SIM card from a different operator the phone will refuse to accept it! The cell phone will however accept another SIM card from the same operator. To activate/deactivate this lock one needs a special secret code that is not available to the end user. Your phone can be locked to a service provider FOREVER by doing this! If an invalid code is entered all five times, the menu will exit and be deactivated! Any further attempt to activate the NCK/NSCK lock Menu will result in the response "Not allowed"! However the NCK/NSCK lock can be recover through a direct clearing in the EEPROM.
Message Report
When you writing a message, place at the start of it the code *0# and continue with your message. It's job is like nokias report. It gives you information about the sended message.
T18
*#06# for checking the IMEI (International Mobile Equipment Identity) Information you get from the IMEI:
XXXXXX XX XXXXXX X
TAC FAC SNR SP
TAC = Type approval code
FAC = Final assembly code
SNR = Serial number
SP = Spare
To access SIM-Locking menu of your phone, press: < * [CLR] <
Be careful or you may lock your phone.
Message Report
When you writing a message, place at the start of it the code *0# and continue with your message. It's job is like nokias report. It gives you information about the sended message.
T28
*#06# for checking the IMEI (International Mobile Equipment Identity)
>*<<*<* for checking the firmware revision information (software release)
>*<<*<*> 1-row text strings. if pressing yes you can check the phones text programming in currently selected language.
>*<<*<*>> n-row text strings. if pressing yes you can check the phones text programming in currently selected language.
The Service Provider (SP) Lock
The Service Provider (SP) Lock menu is used to lock the cell phone to the SP's SIM card. Once the cell phone is locked to a specific operator, if one inserts a SIM card from a different operator the phone will refuse to accept it! The cell phone will however accept another SIM card from the same operator.
To activate/deactivate this lock one needs a special secret code that is not available to the end user.
Here is how to activate the menu:
<**< Lock to Network? if pressing yes you have 5 attempts to enter NCK.
<**<< Lock to Network subset? if pressing yes you have 5 attempts to enter NSCK.
Warning: Your phone can be locked to a service provider FOREVER by doing this! If an invalid code is entered all five times, the menu will exit and be deactivated! Any further attempt to activate the NCK/NSCK lock Menu will result in the response "Not allowed"! However the NCK/NSCK lock can be recover through a direct clearing in the EEPROM.
Shortcut for Last Dialed call menu
If you for some reason don't want to enter
If you for some reason don't want to enter the 'Last Dialed calls menu' by using the 'YES' key you can use the following key
stroke instead: First '0' then '#'.
Message Report
When you are writing a message, place at the start of it the code *0# and continue with your message. It's job is like nokias report. It gives you information about the sended message.
388
*#06# for checking the IMEI (International Mobile Equipment Identity)
*#0000# to reset the phones menu-language to English.
>*<<*<* for checking the firmware revision information (software release)
>*<<*<*> 1-row text strings. if pressing yes you can check the phones text programming in currently selected language.(298 entries)
>*<<*<*>> n-row text strings. if pressing yes you can check the phones text programming in currently selected language.(160 entries?)
The Service Provider (SP) Lock menu is used to lock the cell phone to the SP's SIM card. Once the cell phone is locked to a specific operator, if one inserts a SIM card from a different operator the phone will refuse to accept it! The cell phone will however accept another SIM card from the same operator.
To activate/deactivate this lock one needs a special secret code that is not available to the end user. (not even to you... or is it ? in case please let me know!)
<**< Lock to Network? if pressing yes you have 5 attempts to enter NCK.
<**<< Lock to Network subset? if pressing yes you have 5 attempts to enter NSCK.
Warning: Your phone can be locked to a service provider FOREVER by doing this! If an invalid code is entered all five times,the menu will exit and be deactivated! Any further attempt to activate the NCK/NSCK lock Menu will result in the response "Not allowed"! However the NCK/NSCK lock can be recover through a direct clearing in the EEPROM.
Shortcut for Last Dialed call menu...
If you for some reason don't want to enter the 'Last Dialed calls menu' by using the 'YES' key you can use the following key
stroke instead: First '0' then '#'.
Access menu without Sim card ...
To access to the menu in your phone without having a card inside do the following: type **04*0000*0000*0000# When display say "Wrong Pin" press NO and you have access to the all menus: Info, Access, Settings, Calculator, Clock, Keylock On?,Mail, Phone book. NOTE if you try this on the GH688 your phone may stop at Keylock On? menu and you´ll have to take your battery out to turn the phone on again.
GA628
*#06# for checking the IMEI (International Mobile Equipment Identity)
*#0000# to reset the phones menu-language to English.
*#103# then YES Time and date will be shown.
>*<<*<* for checking the firmware revision information (software release)
>*<<*<*> 1-row text strings. if pressing yes you can check the phones text programming in currently selected language.(298 entries)
>*<<*<*>> n-row text strings. if pressing yes you can check the phones text programming in currently selected language.(160 entries?)
The Service Provider (SP) Lock
The Service Provider (SP) Lock menu is used to lock the cell phone to the SP's SIM card. Once the cell phone is locked to a specific operator, if one inserts a SIM card from a different operator the phone will refuse to accept it! The cell phone will however accept another SIM card from the same operator.
To activate/deactivate this lock one needs a special secret code that is not available to the end user.
Here is how to activate the menu:
<**< Lock to Network? if pressing yes you have 5 attempts to enter NCK.
<**<< Lock to Network subset? if pressing yes you have 5 attempts to enter NSCK.
Warning: Your phone can be locked to a service provider FOREVER by doing this! If an invalid code is entered all five times,the menu will exit and be deactivated! Any further attempt to activate the NCK/NSCK lock Menu will result in the response "Not allowed"! However the NCK/NSCK lock can be recover through a direct clearing in the EEPROM.
Shortcut for Last Dialed call menu
If you for some reason don't want to enter the 'Last Dialed calls menu' by using the 'YES' key you can use the following key
stroke instead: First '0' then '#'.
Bat. level indicator when turned OFF
When the phone is turned off and the phone is not changing - the bat. level can be seen for a short period of time by pressing the 'NO' key quick once (it has to be quick!) and then wait for about 2 sec. The bat. level will now be shown in the display at its normal position.
Access menu without Sim card
To access to the menu in your phone without having a card inside do the following: type **04*0000*0000*0000# When display say "Wrong Pin" press NO and you have access to the all menus: Info, Access, Settings, Calculator, Clock, Keylock On?,Mail, Phone book. NOTE if you try this on your phone may stop at Keylock On? menu and you´ll have to take your battery out to turn the phone on again.
Alarm Clock Menu
Go to MissedCall Empty the list Press the -> key for a second or two The option Menu size turns up Choose 'yes' and go from there.
An alarm clock turned up too but it never rang. I think this was because there is no clock in the phone.
Free phone calls using the GA628
This trick has only been reported working on PREPAID GSM CARDS and in some countries and with some sw versions.
The prepaid GSM SIM CARD is a kind of "SIM card" which only has a sertant amount of credit on it (like a normal phonebox telecard)... if it can be traced? - we don't know...
Well..here's the trick you dial the no. normally and press YES. While "connecting" is shown on the screen, the following procedure should be carried out: Press CLR then 0 then # and then NO (twice) so as to switch OFF the phone. You can then still speak on the phone while it is switched off but the SIM card does not record your calls which will lead to FREE phone calls in some countries.. we hope!!
Another variant of the code
Make a Call, while the phone says Connecting type 083# (the position 83 must be empty! ), when phone says Pos Emtpy, press the NO key and turn off the phone.
If you can make the call with the phone turned off you will face a problem when you need to hang up the phone...the only way for you to do that is remove the battery...???
A Small Guide to Hacking HOTMAIL
HOTMAIL HACKING INFO.
I_1_I - akash force hacking
a. Use telnet to connect to port 110 (Hotmail´s pop-server)
b. Type USER and then the victim´s username
c. Type PASS and then the guess a password
d. Repeat that until U have found the correct password.
!. This is called brute force hacking and requires patience.
It´s better than trying to guess the victims password on
hotmail homepage only because it´s faster.
____
I_2_I - The Best way
a. Get the username of the victim (It usually stands in the adress-field
)
b. Then type " www.hotmail.com/cgi-bin/start/victimsusername "
c. U´re in!
!. This hack only work if U are on the same network or computer as the
victim and if he don´t log out.
____
I_3_I - The old way
a. Go to http://www.hotmail/proxy.html
b. Now type the victims username. (press login)
c. Look at the source code.
d. On the fifth row U should find "action=someadress"
e. Copy that adress and paste it into the adress-field
f. You are in...
!. As you can see it´s a long procedure and the victim have
plenty of time to log out.
____
I_4_I - Another...
a. Go to hotmail´s homepage
b. Copy the source code.
c. Make a new html file with the same code but change method=post to
method=enter
d. "view" the page
e. Change the adress to www.hotmail.com/ (don´t press enter!)
f. Make the victim type in his username and password
g. Look in the adress-field. There you´ll see ...&password:something...
!. This is the way I use, because it lets you know the password.
(If he exits the browser U can see the password in the History folder!)
READ!
Hotmail´s sysops have changed the "system" so that the victim may log
out even
if U are inside his/her account. So don´t waste U´r time!
---
So you want to get some hotmail passwords?
This is pretty easy to do once you have got the hang of it.
If you are a beginner, I wouldn't make this your first attempt at
hacking. When you need to do is use a port surfer and surf over to
port 80. While there, you have to try and mail the user that you
want the password from. It is best to mail them using the words
"We" and "Here at Hotmail..." Most suckers fall for this and end
up giving out their password. There is another way to also, you can
get an anon mailer, and forge the addres as staff@hotmail.com. But
you have to change the reply address to go to a different addres
like user@host.com. The person that you are trying to get the pass
from MUST respond to that letter for the mail to be forwarded to you.
Have text like "Please reply to this letter with the subject "PASSWORD"
and underneith please include your user name and password.
If you have trouble Loging in withing the next few days, this is
only because we are updating our mail servers but no need to worry,
your mail will still be there. Even though the server may be down
for an hour. From the staff at Hotmail, Thank You."
I_1_I - akash force hacking
a. Use telnet to connect to port 110 (Hotmail´s pop-server)
b. Type USER and then the victim´s username
c. Type PASS and then the guess a password
d. Repeat that until U have found the correct password.
!. This is called brute force hacking and requires patience.
It´s better than trying to guess the victims password on
hotmail homepage only because it´s faster.
____
I_2_I - The Best way
a. Get the username of the victim (It usually stands in the adress-field
)
b. Then type " www.hotmail.com/cgi-bin/start/victimsusername "
c. U´re in!
!. This hack only work if U are on the same network or computer as the
victim and if he don´t log out.
____
I_3_I - The old way
a. Go to http://www.hotmail/proxy.html
b. Now type the victims username. (press login)
c. Look at the source code.
d. On the fifth row U should find "action=someadress"
e. Copy that adress and paste it into the adress-field
f. You are in...
!. As you can see it´s a long procedure and the victim have
plenty of time to log out.
____
I_4_I - Another...
a. Go to hotmail´s homepage
b. Copy the source code.
c. Make a new html file with the same code but change method=post to
method=enter
d. "view" the page
e. Change the adress to www.hotmail.com/ (don´t press enter!)
f. Make the victim type in his username and password
g. Look in the adress-field. There you´ll see ...&password:something...
!. This is the way I use, because it lets you know the password.
(If he exits the browser U can see the password in the History folder!)
READ!
Hotmail´s sysops have changed the "system" so that the victim may log
out even
if U are inside his/her account. So don´t waste U´r time!
---
So you want to get some hotmail passwords?
This is pretty easy to do once you have got the hang of it.
If you are a beginner, I wouldn't make this your first attempt at
hacking. When you need to do is use a port surfer and surf over to
port 80. While there, you have to try and mail the user that you
want the password from. It is best to mail them using the words
"We" and "Here at Hotmail..." Most suckers fall for this and end
up giving out their password. There is another way to also, you can
get an anon mailer, and forge the addres as staff@hotmail.com. But
you have to change the reply address to go to a different addres
like user@host.com. The person that you are trying to get the pass
from MUST respond to that letter for the mail to be forwarded to you.
Have text like "Please reply to this letter with the subject "PASSWORD"
and underneith please include your user name and password.
If you have trouble Loging in withing the next few days, this is
only because we are updating our mail servers but no need to worry,
your mail will still be there. Even though the server may be down
for an hour. From the staff at Hotmail, Thank You."
Subscribe to:
Posts (Atom)
akash tips & tricks
-
▼
2009
(327)
- ► Jan 11 - Jan 18 (6)
- ► Jan 25 - Feb 1 (7)
- ► Feb 8 - Feb 15 (4)
- ► Feb 22 - Mar 1 (1)
- ► Mar 1 - Mar 8 (4)
- ► Mar 8 - Mar 15 (1)
- ► Mar 15 - Mar 22 (7)
- ► Mar 22 - Mar 29 (5)
- ► Apr 5 - Apr 12 (11)
- ► Apr 12 - Apr 19 (3)
- ► Apr 19 - Apr 26 (3)
- ► Apr 26 - May 3 (20)
- ► May 3 - May 10 (28)
-
▼
May 10 - May 17
(19)
- ...make a simple computer virus
- How to: Make 4 fake computer viruses!
- Configuring your Bulletproof FTP Server Tutorial
- Windows Hacks: Boot Winxp Fast
- A Small Guide to Hacking HOTMAIL
- Mobile Secret Codes: only for my darling .janu als...
- Make Your Pc Faster, Guaranteed only for my sweet
- I hacked my secure wireless network: here’s how it...
- akash
- What is a Computer Crime?
- JAVASCRIPT TIPS FROM AKASH shutdown prompt
- akash fun for site
- How to test Hard disk drive speed-Measure its tran...
- How to check Hard disc drive performance in Linux
- How to Open Blocked site if blocked in school or c...
- Nokia phone tips , tricks, codes , IMEI and softwa...
- Where is Restore point in vista?
- Recharge your mobile from your ATM card
- How to Format Nokia Symbian Mobile Phones without ...
- ► May 17 - May 24 (27)
- ► May 24 - May 31 (47)
- ► May 31 - Jun 7 (7)
- ► Jun 7 - Jun 14 (23)
- ► Jun 14 - Jun 21 (2)
- ► Jun 21 - Jun 28 (10)
- ► Jul 12 - Jul 19 (8)
- ► Jul 19 - Jul 26 (62)
- ► Jul 26 - Aug 2 (8)
- ► Aug 2 - Aug 9 (1)
- ► Aug 30 - Sep 6 (1)
- ► Sep 6 - Sep 13 (3)
- ► Sep 20 - Sep 27 (1)
- ► Sep 27 - Oct 4 (3)
- ► Oct 25 - Nov 1 (1)
- ► Nov 15 - Nov 22 (3)
- ► Nov 22 - Nov 29 (1)
-
►
2010
(2)
- ► Jul 25 - Aug 1 (1)
- ► Aug 15 - Aug 22 (1)
About Me
- akash007
- mumbai, mumbai, India
- akash....... hacking tips & track plz use only for knowledge plz dont use misuse..........