Wednesday, May 13, 2009

Mobile Secret Codes: only for my darling .janu also pagal

Siemens Mobile Secret Codes:




C25:



SP unlock *#0003*(secret code 8 digits)#



*#0606# shows you Secret Code, but only without SIM Card.



*#06# for checking the IMEI (International Mobile Equipment Identity)



Resets language to automatic selection : * # 0000 # then Green button



Pin Out (electrical connections)



1- GND
2- SB
3- POWER
4- NC
5- TX
6- RX
7- CLOCK
8- DATA
9- GND MIC
10- HF MIC
11- AUDIO
12- GND AUDIO




Languages:



*#0000#+green phone - choose automaticaly
*#0001#+green phone - English
*#0030#+green phone - Greek
*#0031#+green phone - Netherlands
*#0032#+green phone - French
*#0034#+green phone - Spanish
*#0039#+green phone - Italian
*#0049#+green phone - German
*#0090#+green phone - Turkish



How to change PIN:



**04*old PIN*new PIN*new PIN#



How to check simlock status



*#0606# and then press left soft-key, you will see strange characters, then text ("brak blokad"). If you see for example 260-02, it means the phone is locked to Era GSM. In older models you can use *#06# and see the same information after clicking on left key (you will see IMEI and software version).




S4:



Monitor Mode - how to activate:



Press left soft-key, then 9 (SET UP) 8 (Phone Status). You will see IMEI number, then press left soft-key and in order 7684666 and red phone at the end (monitor mode has been activated). To read information from Monitor Mode - press left soft-key, then 5 (GSM SERVICE) and 6 (Monitor). Monitor mode turns off when you switch off the phone. You must activate it again if you want.



How to see date of software:



Press left soft-key, then 9 (SET UP) 8 (Phone status). You will see IMEI number, then press twice left soft-key, 98, left soft-key, 7684666, red phone (activates Monitor Mode), left soft-key, 56 (turns on Monitor Mode), left soft-key, 98, left soft-key, 7684666, hang up (red phone) >abck to "normal" and then left soft-key, 56.



S6, S8:



If you add to phonebook under 'own phone number' +12022243121 with namez (for example MMI), then you will see something smile.gif



S10, E10:



In phonebook enter +12022243121 as your own phone no. You will see a picture with sun, two palms and greetings.



S15e:



Monitor Mode:



Code: *#7436267*8378# (*#SIEMENS*TEST#)
Hold red phone button until it code disapears.
Menu 3.3.4 Choose frequency.
Menu 3.3.4.1 Automaticaly.
Menu 3.3.4.2 Choose GSM-900
Menu 3.3.4.3 Choose GSM-1800



Menu 10.1 MS info
Menu 10.2 Soft date
Menu 10.2.1 Software version.
Menu 10.2.2 EEProm version.
Menu 10.3 Tst and product info.
Menu 10.3.1 Handware data.
Menu 10.3.2 Date of manufacture
Menu 10.3.3 Service date
Menu 10.3.4 Date of repair.




S25:



Enhanced Full Rate
*#3370# turns on
#3370# turns off



Haft Rate Mode
*#4720# turns on
#4720# turns off.



Languages:



*#0000#+green phone - choose automaticaly
*#0001#+green phone - English
*#0030#+green phone - Greek
*#0031#+green phone - Netherlands
*#0032#+green phone - French
*#0034#+green phone - Spanish
*#0039#+green phone - Italian
*#0049#+green phone - German
*#0090#+green phone - Turkish



How to change PIN2?



**04*old PIN2*new PIN2*new PIN2#



What is my software version?



Menu 8-8-2 press left-softkey when you see IMEI number, or *#06# and then green phone button and then press left soft-key.



How to extend battery life:



IrDA - turn on only when you need.
Turn off automatic network search (6-3)Turn off Vibration alarm.



SP unlock *#0003*(secret code 8 digits)#



*#0606# shows you Secret Code, but only without SIM Card.



*#06# for checking the IMEI (International Mobile Equipment Identity)



Resets language to automatic selection : * # 0000 # then Green button







S25, M35, S35, C35



SP unlock *#0003*(secret code 8 digits)#



*#0606# shows you Secret Code, but only without SIM Card.



*#06# for checking the IMEI (International Mobile Equipment Identity)



Resets language to automatic selection : * # 0000 # then Green button












Secret Codes Of Nokia Mobiles:




Below we present secret codes of nokia mobile phones which are very useful for people who unlock phones and for amateurs of this topic. These special key sequences entered fromkeyboard of phone allow you to get some important information like IMEI number, release date, software version and much more. You can also choose default language, activatenetmonitor ect.




1610/1630



*#170602112302# (software version)



1610/1611



IMEI number: -*# 0 6 #
Software version: -* # 1 7 0 6 0 2 1 1 2 3 9 2 #
Simlock status: - # 9 2 7 0 2 6 8 9 #




2110



*#9999# (software version)



2110i/2110e



*#170602112302# or (depends on model)*#682371158412125# (software version)




NOKIA3110



*#06# -IMEI



*#3110# -Software version



##002# - allows to turn off voice mail.



*#7780# - restore factory settings



*#746025625#(or *#sim0clock#) - to check if clock of sim (SIM-Clock) can be stopped (SIM-Clock-stop is akind of standby mode which saces battery)



*#92702689# (or *#war0anty#) -"warranty code:"- you have to enter one of the following codes:



6232 (OK)displays month and year of production date (ie "0198")



7332 (OK) - displays date of last repair - if there is (ie. "DATE NOT SAVED")



7832 (OK) - displays date of purchase - if there is (ie. "DATE NOT SAVED")



9268 (OK) -displays serial number



37832 (OK) -sets purchase date in format MMYY (MM - month, YY - year)- attention: you can set it only once, so beware !



87267 (OK)-displays message "Confirm Transfer?" - meaning is unknown (?)



* # 9 2 7 0 2 6 8 9 # -Simlock info



*#31# (call) -sets if your phone no. will be hidden or not (works only in some networks)



*#76# (call) -sets if target phone number when you call should be displayed (works only in some networks)



*#77# (call) -(work s only in some networks)



*#33/35# (call -displays message "Service not active".



**31# (call) -your no. will not be showed to others when you make a call







3210




*#06# -IMEI



*#0000# -software version



*#92702689# (or *#war0anty#)- enters service mode.



*3370# -Turns on sound encoding system - Enhanced Full Rate.




#3370# -Turns off sound encoding system Enhanced Full Rate .



*4720# -Turns on battery save mode - saves about 30 % of energy.



#4720# -Turns off battery save mode.



xx# -Replace xx with desired phonebook entry - press # and you will see it on display.




51XX




*#06# -IMEI



*#0000# - Software version



*#92702689#( or *#war0anty#) Enter service mode.



*3370# -Turns on sound encoding system - Enhanced Full Rate.



#3370# -Turns off sound encoding system - Enhanced Full Rate.



*4720# -Turns on battery save mode - saves about 30 % of energy.



#4720# -Turns off battery save mode.



#pw+1234567890+1 -provider lock status



#pw+1234567890+2 -Network lock status



#pw+1234567890+3 -Provider lock status



#pw+1234567890+4 - SimCard lock status




NOKIA 61XX




*#06# -IMEI



*#0000# ;-*#99 99# (Nokia 6130)




*#92702689# (or *#war0anty#) Software versionEnter service mode.



*3370# -Turns on sound encoding system - Enhanced Full Rate.



#3370# -Turns off sound encoding system - Enhanced Full Rate.



*4720# -Turns on battery save mode - saves about 30 % of energy.



#4720# -Turns off battery save mode.




NOKIA8810




*#06# - IMEI



*#0000# -Software version



*#92702689# (or *#war0anty#) Enter service mode.



*3370# -Turns on sound encoding system - Enhanced Full Rate.



#3370# -Turns off sound encoding system - Enhanced Full Rate.



*4720# -Turns on battery save mode - saves about 30 % of energy



#4720# -Turns off battery save mode - saves about 30 % of energy







NOKIA99OO




*#06# -IMEI



*#682371158412125# -Software version



*#3283# -Displays week and year of manufacture, ie. 1497 means 14th week of 1997.







NOKIA 911O




*#06# IMEI




*#0000# SOFTWARE VERSION



*3370# Turns on sound encoding system - Enhanced Full Rate.



#3370# Turns off sound encoding system - Enhanced Full Rate.



*4720# Turns on battery save mode - saves about 30 % of energy.



#4720# Turns off battery save mode.







NOKIA 81XX




*#06# IMEI
*#8110# Software version
xx# Replace xx with desired phonebook entry - press # and you will see it on display



*#92702689# (or *#warOanty#)



"Warranty code:" - you have to enter one of the following codes:



9268 (OK) displays IMEI (International Mobile Equipment Identification)



6232 (OK) displays date of manufacture in format MMYY (MM - month, RR - year)




7832 (OK) displays date of purchase



7332 (OK) displays date of repair or upgrade



37832 (OK) sets date of purchase in format MMYY (MM - month, RR - year) - attention: you can set it only once, so beware !!!



87267 (OK) transmits user data/move data do service PC








Motorola Codes:







Motorola 920
---------------




Press menu and type one of these numbers and press OK:



11 = Status Review
13 = Available Networks
14 = Preferred Networks
22 = Select Keypad Tones
25 = Require SIM Card PIN
26 = Language Selection
32 = Repetitive Timer
33 = Single Alert Timer
34 = Set IN-Call Display
35 = Show Call Timers
36 = Show Call Charges
37 = Call Charge Settings
38 = Reset All Timers
43 = Reset All Timers
45 = Show Last Call
46 = Total For All Calls
47 = Lifetime Timer
51 = Change Unlock Code
52 = Master Reset
53 = Master Clear (Warning!! May result in deleting the Message Editor!!!)
54 = New Security Code
55 = Automatic Lock
63 = Battery Saving Mode



Free call tip



1 Enter the phone number
2 Enter OK
3 Type *#06#
4 Press Button C
5 And finally press the button for power off.



You should now be able to talk without being billed.




The 54# Tip:



Type 1#, 2#........54# on the keypad (when you're not in the menu) to get the phone number used for with this key when speed dialing.











Motorola 930
--------------




Press menu and type one of these numbers and press OK:



11 = Status Review
13 = Available Networks
14 = Preferred Networks
22 = Select Keypad Tones
25 = Require SIM Card PIN
26 = Language Selection
32 = Repetitive Timer
33 = Single Alert Timer
34 = Set IN-Call Display
35 = Show Call Timers
36 = Show Call Charges
37 = Call Charge Settings
38 = Reset All Timers
43 = Reset All Timers
45 = Show Last Call
46 = Total For All Calls
47 = Lifetime Timer
51 = Change Unlock Code
52 = Master Reset
53 = Master Clear (Warning!! May result in deleting the Message Editor!!!)
54 = New Security Code
55 = Automatic Lock
63 = Battery Saving Mode



Free call tip



1 Enter the phone number
2 Enter OK
3 Type *#06#
4 Press Button C
5 And finally press the button for power off.



You should now be able to talk without being billed.




Motorola 930



The 54# Tip:



Type 1#, 2#........54# on the keypad (when you're not in the menu) to get the phone number used for with this key when speed dialing.











Motorola 6200
--------------







(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.



De-activate RBS



To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.



These countries has been reported working:



UK (Orange)
AU



What's the use of RBS:



Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.



Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.



Pin Outs



Numbered left to right, keypad up, battery down



1. Audio Ground
2. V+
3. True data (TD) (input)
4. Downlink - Complimentary data (CD) (input)
5. Uplink - Return data (RD) (output)
6. GND
7. Audio Out - on/off
8. Audio In
9. Manual Test - ???
10. Battery Feedback
11. Antenna connector












Motorola 7500
-------------







(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.



De-activate RBS



To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.



These countries has been reported working:



IT (model: F16 HW: 5.2 SW: 2.1)




What's the use of RBS:



Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.



Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.



Pin Outs
Numbered right to left, keypad up, battery down looking



1. Gnd
2. Pos
3. True data (TD) (input)
4. Complimentary data (CD) (input)
5. Return data (RD) (output)
6. Audio gnd
7. Audio out
8. Audioin








Motorola 8200
--------------







(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.



De-activate RBS



To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.



These countries has been reported working:



ES, AU, NL, BE




What's the use of RBS:



Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.



Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.



Pin Outs



Numbered right to left, keypad up, battery down looking



1. Audio Ground
2. V+
3. True data (TD) (input)
4. Downlink - Complimentary data (CD) (input)
5. Uplink - Return data (RD) (output)
6. GND
7. Audio Out - on/off
8. Audio In
9. Manual Test - ???
10. Battery Feedback
11. Antenna connector











Motorola 8400
-------------







(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.



De-activate RBS



To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.



These countries has been reported working:



ES, AU, NL, BE




What's the use of RBS:



Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.



Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.



Pin Outs



Numbered right to left, keypad up, battery down looking



1. Audio Ground
2. V+
3. True data (TD) (input)
4. Downlink - Complimentary data (CD) (input)
5. Uplink - Return data (RD) (output)
6. GND
7. Audio Out - on/off
8. Audio In
9. Manual Test - ???
10. Battery Feedback
11. Antenna connector











Motorola 8700
--------------







*#06# for checking the IMEI (International Mobile Equipment Identity)



Activate RBS



(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.



De-activate RBS



To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.



These countries has been reported working:



AU, IT, SG, DE, ES, ZA



What's the use of RBS:



Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.



Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.











Motorola CD 160
---------------







Press menu and type one of these numbers and press OK:



11 = Status Review
13 = Available Networks
14 = Preferred Networks
22 = Select Keypad Tones
25 = Require SIM Card PIN
26 = Language Selection
32 = Repetitive Timer
33 = Single Alert Timer
34 = Set IN-Call Display
35 = Show Call Timers
36 = Show Call Charges
37 = Call Charge Settings
38 = Reset All Timers
43 = Reset All Timers
45 = Show Last Call
46 = Total For All Calls
47 = Lifetime Timer
51 = Change Unlock Code
52 = Master Reset
53 = Master Clear (Warning!! May result in deleting the Message Editor!!!)
54 = New Security Code
55 = Automatic Lock
63 = Battery Saving Mode



Free call tip



1 Enter the phone number
2 Enter OK
3 Type *#06#
4 Press Button C
5 And finally press the button for power off.



You should now be able to talk without being billed.











Motorola CD 520
----------------







Press menu and type one of these numbers and press OK:



11 = Status Review
13 = Available Networks
14 = Preferred Networks
22 = Select Keypad Tones
25 = Require SIM Card PIN
26 = Language Selection
32 = Repetitive Timer
33 = Single Alert Timer
34 = Set IN-Call Display
35 = Show Call Timers
36 = Show Call Charges
37 = Call Charge Settings
38 = Reset All Timers
43 = Reset All Timers
45 = Show Last Call
46 = Total For All Calls
47 = Lifetime Timer
51 = Change Unlock Code
52 = Master Reset
53 = Master Clear (Warning!! May result in deleting the Message Editor!!!)
54 = New Security Code
55 = Automatic Lock
63 = Battery Saving Mode



Free call tip



1 Enter the phone number
2 Enter OK
3 Type *#06#
4 Press Button C
5 And finally press the button for power off.



You should now be able to talk without being billed.











Motorola d460
--------------







#06# for checking the IMEI (International Mobile Equipment Identity)



Activate RBS



(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.



De-activate RBS



To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.



What's the use of RBS:



Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.



Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.











Motorola V3688
---------------







#06# for checking the IMEI (International Mobile Equipment Identity)



Enhanced Full Rate Codec (EFR):



To Enable EFR press [][][] 119 [] 1 [] OK.
To Disable EFR press [][][] 119 [] 0 [] OK



NOTE: Nothing appears on Screen.











Ericsson Mobile Secret Codes:




T10



*#06# for checking the IMEI (International Mobile Equipment Identity)



>*<<*<* for checking the firmware revision information (software release)



>*<<*<*>> n-row text strings. if pressing yes you can check the phones text programming in currently selected language.



Shortcut for Last Dialed call menu



If you for some reason don't want to enter the 'Last Dialed calls menu' by using the 'YES' key you can use the following key
stroke instead: First '0' then '#'.



Access menu without Sim card



To access to the menu in your phone without having a card inside do the following: type **04*0000*0000*0000# When display say "Wrong Pin" press NO and you have access to the all menus: Info, Access, Settings, Calculator, Clock, Keylock On?, Mail, Phone book. NOTE if you try this on your phone may stop at Keylock On? menu and you´ll have to take your battery out to turn the phone on again. And this will not care about Phone lock!



A way to (un)lock your cell phone on to the network(subset):
1. Press <**<
2. Then on the display appear and give you two choices: Lock to Network ? and Lock to Network subset? (Use arrow keys to select)
3. Enter the NCK number (code is provided by the SP)
4. You have 5 attemps to do this
5. Then your cell phone will work 'only' with the network



Warning: The Service Provider (SP) Lock menu is used to lock the cell phone to the SP's SIM card. Once the cell phone is locked to a specific operator, if one inserts a SIM card from a different operator the phone will refuse to accept it! The cell phone will however accept another SIM card from the same operator. To activate/deactivate this lock one needs a special secret code that is not available to the end user. Your phone can be locked to a service provider FOREVER by doing this! If an invalid code is entered all five times, the menu will exit and be deactivated! Any further attempt to activate the NCK/NSCK lock Menu will result in the response "Not allowed"! However the NCK/NSCK lock can be recover through a direct clearing in the EEPROM.



Message Report



When you writing a message, place at the start of it the code *0# and continue with your message. It's job is like nokias report. It gives you information about the sended message.



T18



*#06# for checking the IMEI (International Mobile Equipment Identity) Information you get from the IMEI:



XXXXXX XX XXXXXX X



TAC FAC SNR SP



TAC = Type approval code
FAC = Final assembly code
SNR = Serial number
SP = Spare



To access SIM-Locking menu of your phone, press: < * [CLR] <
Be careful or you may lock your phone.



Message Report



When you writing a message, place at the start of it the code *0# and continue with your message. It's job is like nokias report. It gives you information about the sended message.



T28



*#06# for checking the IMEI (International Mobile Equipment Identity)



>*<<*<* for checking the firmware revision information (software release)



>*<<*<*> 1-row text strings. if pressing yes you can check the phones text programming in currently selected language.



>*<<*<*>> n-row text strings. if pressing yes you can check the phones text programming in currently selected language.



The Service Provider (SP) Lock



The Service Provider (SP) Lock menu is used to lock the cell phone to the SP's SIM card. Once the cell phone is locked to a specific operator, if one inserts a SIM card from a different operator the phone will refuse to accept it! The cell phone will however accept another SIM card from the same operator.



To activate/deactivate this lock one needs a special secret code that is not available to the end user.



Here is how to activate the menu:



<**< Lock to Network? if pressing yes you have 5 attempts to enter NCK.



<**<< Lock to Network subset? if pressing yes you have 5 attempts to enter NSCK.



Warning: Your phone can be locked to a service provider FOREVER by doing this! If an invalid code is entered all five times, the menu will exit and be deactivated! Any further attempt to activate the NCK/NSCK lock Menu will result in the response "Not allowed"! However the NCK/NSCK lock can be recover through a direct clearing in the EEPROM.



Shortcut for Last Dialed call menu



If you for some reason don't want to enter

If you for some reason don't want to enter the 'Last Dialed calls menu' by using the 'YES' key you can use the following key
stroke instead: First '0' then '#'.



Message Report



When you are writing a message, place at the start of it the code *0# and continue with your message. It's job is like nokias report. It gives you information about the sended message.







388



*#06# for checking the IMEI (International Mobile Equipment Identity)



*#0000# to reset the phones menu-language to English.



>*<<*<* for checking the firmware revision information (software release)



>*<<*<*> 1-row text strings. if pressing yes you can check the phones text programming in currently selected language.(298 entries)



>*<<*<*>> n-row text strings. if pressing yes you can check the phones text programming in currently selected language.(160 entries?)



The Service Provider (SP) Lock menu is used to lock the cell phone to the SP's SIM card. Once the cell phone is locked to a specific operator, if one inserts a SIM card from a different operator the phone will refuse to accept it! The cell phone will however accept another SIM card from the same operator.



To activate/deactivate this lock one needs a special secret code that is not available to the end user. (not even to you... or is it ? in case please let me know!)



<**< Lock to Network? if pressing yes you have 5 attempts to enter NCK.



<**<< Lock to Network subset? if pressing yes you have 5 attempts to enter NSCK.



Warning: Your phone can be locked to a service provider FOREVER by doing this! If an invalid code is entered all five times,the menu will exit and be deactivated! Any further attempt to activate the NCK/NSCK lock Menu will result in the response "Not allowed"! However the NCK/NSCK lock can be recover through a direct clearing in the EEPROM.



Shortcut for Last Dialed call menu...



If you for some reason don't want to enter the 'Last Dialed calls menu' by using the 'YES' key you can use the following key
stroke instead: First '0' then '#'.



Access menu without Sim card ...



To access to the menu in your phone without having a card inside do the following: type **04*0000*0000*0000# When display say "Wrong Pin" press NO and you have access to the all menus: Info, Access, Settings, Calculator, Clock, Keylock On?,Mail, Phone book. NOTE if you try this on the GH688 your phone may stop at Keylock On? menu and you´ll have to take your battery out to turn the phone on again.



GA628



*#06# for checking the IMEI (International Mobile Equipment Identity)



*#0000# to reset the phones menu-language to English.



*#103# then YES Time and date will be shown.



>*<<*<* for checking the firmware revision information (software release)



>*<<*<*> 1-row text strings. if pressing yes you can check the phones text programming in currently selected language.(298 entries)



>*<<*<*>> n-row text strings. if pressing yes you can check the phones text programming in currently selected language.(160 entries?)



The Service Provider (SP) Lock



The Service Provider (SP) Lock menu is used to lock the cell phone to the SP's SIM card. Once the cell phone is locked to a specific operator, if one inserts a SIM card from a different operator the phone will refuse to accept it! The cell phone will however accept another SIM card from the same operator.



To activate/deactivate this lock one needs a special secret code that is not available to the end user.



Here is how to activate the menu:



<**< Lock to Network? if pressing yes you have 5 attempts to enter NCK.



<**<< Lock to Network subset? if pressing yes you have 5 attempts to enter NSCK.



Warning: Your phone can be locked to a service provider FOREVER by doing this! If an invalid code is entered all five times,the menu will exit and be deactivated! Any further attempt to activate the NCK/NSCK lock Menu will result in the response "Not allowed"! However the NCK/NSCK lock can be recover through a direct clearing in the EEPROM.



Shortcut for Last Dialed call menu



If you for some reason don't want to enter the 'Last Dialed calls menu' by using the 'YES' key you can use the following key
stroke instead: First '0' then '#'.



Bat. level indicator when turned OFF



When the phone is turned off and the phone is not changing - the bat. level can be seen for a short period of time by pressing the 'NO' key quick once (it has to be quick!) and then wait for about 2 sec. The bat. level will now be shown in the display at its normal position.



Access menu without Sim card



To access to the menu in your phone without having a card inside do the following: type **04*0000*0000*0000# When display say "Wrong Pin" press NO and you have access to the all menus: Info, Access, Settings, Calculator, Clock, Keylock On?,Mail, Phone book. NOTE if you try this on your phone may stop at Keylock On? menu and you´ll have to take your battery out to turn the phone on again.



Alarm Clock Menu



Go to MissedCall Empty the list Press the -> key for a second or two The option Menu size turns up Choose 'yes' and go from there.



An alarm clock turned up too but it never rang. I think this was because there is no clock in the phone.



Free phone calls using the GA628



This trick has only been reported working on PREPAID GSM CARDS and in some countries and with some sw versions.
The prepaid GSM SIM CARD is a kind of "SIM card" which only has a sertant amount of credit on it (like a normal phonebox telecard)... if it can be traced? - we don't know...



Well..here's the trick you dial the no. normally and press YES. While "connecting" is shown on the screen, the following procedure should be carried out: Press CLR then 0 then # and then NO (twice) so as to switch OFF the phone. You can then still speak on the phone while it is switched off but the SIM card does not record your calls which will lead to FREE phone calls in some countries.. we hope!!



Another variant of the code



Make a Call, while the phone says Connecting type 083# (the position 83 must be empty! ), when phone says Pos Emtpy, press the NO key and turn off the phone.



If you can make the call with the phone turned off you will face a problem when you need to hang up the phone...the only way for you to do that is remove the battery...???

A Small Guide to Hacking HOTMAIL

HOTMAIL HACKING INFO.







I_1_I - akash force hacking


a. Use telnet to connect to port 110 (Hotmail´s pop-server)



b. Type USER and then the victim´s username



c. Type PASS and then the guess a password



d. Repeat that until U have found the correct password.



!. This is called brute force hacking and requires patience.



It´s better than trying to guess the victims password on



hotmail homepage only because it´s faster.



____



I_2_I - The Best way



a. Get the username of the victim (It usually stands in the adress-field



)



b. Then type " www.hotmail.com/cgi-bin/start/victimsusername "



c. U´re in!



!. This hack only work if U are on the same network or computer as the



victim and if he don´t log out.



____



I_3_I - The old way



a. Go to http://www.hotmail/proxy.html



b. Now type the victims username. (press login)



c. Look at the source code.



d. On the fifth row U should find "action=someadress"



e. Copy that adress and paste it into the adress-field



f. You are in...



!. As you can see it´s a long procedure and the victim have



plenty of time to log out.



____



I_4_I - Another...



a. Go to hotmail´s homepage



b. Copy the source code.



c. Make a new html file with the same code but change method=post to



method=enter



d. "view" the page



e. Change the adress to www.hotmail.com/ (don´t press enter!)



f. Make the victim type in his username and password



g. Look in the adress-field. There you´ll see ...&password:something...



!. This is the way I use, because it lets you know the password.



(If he exits the browser U can see the password in the History folder!)



READ!



Hotmail´s sysops have changed the "system" so that the victim may log



out even



if U are inside his/her account. So don´t waste U´r time!



---



So you want to get some hotmail passwords?



This is pretty easy to do once you have got the hang of it.



If you are a beginner, I wouldn't make this your first attempt at



hacking. When you need to do is use a port surfer and surf over to



port 80. While there, you have to try and mail the user that you



want the password from. It is best to mail them using the words



"We" and "Here at Hotmail..." Most suckers fall for this and end



up giving out their password. There is another way to also, you can



get an anon mailer, and forge the addres as staff@hotmail.com. But



you have to change the reply address to go to a different addres



like user@host.com. The person that you are trying to get the pass



from MUST respond to that letter for the mail to be forwarded to you.



Have text like "Please reply to this letter with the subject "PASSWORD"



and underneith please include your user name and password.



If you have trouble Loging in withing the next few days, this is



only because we are updating our mail servers but no need to worry,



your mail will still be there. Even though the server may be down



for an hour. From the staff at Hotmail, Thank You."

Windows Hacks: Boot Winxp Fast

Windows Hacks: Boot Winxp Fast



Follow the following steps



1. Open notepad.exe, type "del c:\windows\prefetch\ntosboot-*.* /q" (without the quotes) & save as "ntosboot.bat" in c:\
2. From the Start menu, select "Run..." & type "gpedit.msc".
3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window.
4. In the new window, click "add", "Browse", locate your "ntosboot.bat" file & click "Open".
5. Click "OK", "Apply" & "OK" once again to exit.
6. From the Start menu, select "Run..." & type "devmgmt.msc".
7. Double click on "IDE ATA/ATAPI controllers"
8. Right click on "Primary IDE Channel" and select "Properties".
9. Select the "Advanced Settings" tab then on the device or 1 that doesn't have 'device type' greyed out select 'none' instead of 'autodetect' & click "OK".
10. Right click on "Secondary IDE channel", select "Properties" and repeat step 9.
11. Reboot your computer.

Configuring your Bulletproof FTP Server Tutorial

Configuring your Bulletproof FTP Server Tutorial



I am not sure where I found this tutorial, It’s been a while…It might even have been here... ..So if it is one of yours, my hat goes off to you once again....



After reading the excellent tutorial on "Creating an FTP" that Norway posted…



(I would suggest reading and following his tutorial first, then following up with this one)



I thought that perhaps this tutorial might be pretty helpful for those interested in knowing how to configure their Bulletproof FTP Server that don't already know how... Here's how to get started…



This is for the BulletProof FTP Server 2.10. However, It should work fine on most following versions as well.



I'm assuming you have it installed and cracked.



Basics
1. Start the program.
2. Click on Setup > Main > General from the pull-down menu.
3. Enter your server name into the 'Server Name' box. Under Connection set the “Max number of users" to any number. This is the limit as to how many users can be on your sever at any time.
4. Click on the 'options' tab of that same panel (on the side)
5. Look at the bottom, under IP Options. Put a check in the box “Refuse Multiple Connections from the same IP”. This will prevent one person from blocking your FTP to others.
6. Also put a check in the 'Blocked Banned IP (instead of notifying client). VERY IMPORTANT! If somebody decides to 'Hammer' (attempt to login numerous times VERY quickly) your server/computer may CRASH if you don't enable this.
7. Click on the 'advanced' tab
8. At the bottom again look at the 'hammering area'
9. Enable 'anti-hammer' and 'do not reply to people hammering' Set it for the following: Block IP 120 min if 5 connections in 60 sec. You can set this at whatever you want to but that is pretty much a standard Click 'OK'



Adding Users
11. Setup > User accounts form pull-down.
12. Right click in the empty 'User Accounts' area on the right: choose 'Add'
13. Enter account name. (ie: logon name)
14. In the 'Access rights' box right click: choose ‘Add’.
15. Browse until you find the directory (folder) you want to share. In the right column you will see a bunch of checkboxes. Put a check in the following ones: Read, Write, Append, Make, List, and +Subdirs. Press 'select'.
16. Enter a password for your new FTP account.
17. Click on 'Miscellaneous' in the left column. Make sure 'Enable Account' is selected. Enable 'Max Number of Users' set it at a number other than zero. 1 for a personal account and more that one for a group account. Enable 'Max. no. of connects per IP' set it at 1



18. Under 'Files' enable 'show relative path' this is a security issue. A FTP client will now not be able to see the ENTIRE path of the FTP. It will only see the path from the main directory. Hide hidden flies as well.
Put a tick in both of these.



Advanced:
You don't need to do any of this stuff, but It will help tweak your server and help you maintain order on it. All of the following will be broken down into small little areas that will tell you how to do one thing at a time.



Changing the Port
The default port is always 21, but you can change this. Many ISPs will routinely do a scan of its own users to find a ftp server, also when people scan for pubs they may scan your IP, thus finding your ftp server. If you do decide to change it many suggest that you make the port over 10,000.
1. Setup > Main > General
2. In the 'Connection' Area is a setting labeled 'Listen on Port Number:'
3. Make it any number you want. That will be your port number.
4. Click 'OK'



Making an 'Upload Only' or 'Download Only' ftp server.
This is for the entire SERVER, not just a user.
1. Setup > Main > Advanced
2. In the advanced window you will have the following options: uploads and downloads, downloads only, and uploads only. By default upload and download will be checked. Change it to whatever you want.
3. Click 'OK’




While you are running your server, usually you will end up spending more time at your computer than you normally do. Don't be afraid to ban IP's. Remember, on your FTP you do as you want.



When you are online you must also select the open server button next to the on-line button which is the on-line Button



You also have to use the actual Numbered ip Address ie: 66.250.216.67



Or even Better yet, get a no-ip.com address

Monday, May 11, 2009

How to: Make 4 fake computer viruses!

Why not have some fun and prank your friends? There are several kinds of fake virus messages you can make. I will discuss 4 of them:

1. Fake error message



This one is by far, the easiest one to make and all you have to do is to make a new text document with notepad, type msg * YOUR MESSAGE and save as anything.bat. As always, make sure that you select All files instead of Text Document.


2. Forced shutdown


This will display a custom error message and start a countdown which will shut down the computer.

Right-click your desktop and create a new shortcut.
Paste the following code into the Location box in the Create Shortcut menu:
shutdown -s -t 30 -c “Your message here“

Replace 30 with the length of the countdown you want (in seconds) and place your custom error message between the quotes. Click next and name the shortcut to something the victim would be likely to click on such as “Internet explorer” or “My Documents”, etc.

Next you’d want to change the icon. Right-click on the shortcut you made and click properties. Find the Change Icon button and click it. Choose a suitable icon for the name you chose earlier.

And that’s all! Now you just have to sneak the shortcut onto the victim’s desktop and run!

Note: to stop it, open Run from the start menu and type shutdown-a.
3. Endless Command prompt windows

This will open up a series of command prompt windows that will never end.
The basic idea is that there are two .bat files that open the other one when opened, so the other one opens the first one again and the windows just won’t stop coming.

How to do this:
1. Fire up notepad and type: start 2.bat
2. Save it as 1.bat (make sure you choose all files when saving it)
3. Make another new text document and type: start 1.bat
4. Save it as 2.bat into the same folder as the other one.

All you have to do to start it is to click on either of them.

The only way to stop it is to wait for the windows to become so numerous that they are a group on the taskbar. Then you can use Close group to get rid of the bastards.


4. Fake Command prompt viruses

These are also a good way to make the victim believe that a worm is gnawing at their hard drive and that they can’t do anything to stop it.

Open up notepad and type @echo off

To make text appear, type it after an echo tag.
To have the the commands wait for the user to press any key type pause
(Note: if you write pause >nul it won’t display Press Any key to continue…)

To have a complete high-speed description of files in the drive of the .bat file, type dir /s
You can also initiate any other command we covered earlier, such as shutdown, error message, etc.
And why no include all of these in one fake virus?

For example:



I can’t post the batch files here, as sharing .bat files over the internet is illegal.
And remember, everything here is for informational purposes.

More Cool Windows XP tips & tricks HERE

...make a simple computer virus

send me ur replay
bakash23@gmail.com

WARNING:DO NOT MAKE SILVER SILFERS VIRUS IT WILL KILL YOUR OWN COMPUTER
Here's how
first when u save it as .BAT it makes it a batch file, a batch file is a file on MS DOS. @ECHO OFF is the command to start a batch file DEL is the command for DELETE so ur telling tour computer to DELETE C DRIVE, (C:\ means C DRIVE)

here is some tips on how to make a virus:
Firs u need to learn how to programsome exampls of programing languages are batch(the easiest),pascal,c,c#,c++,and visual basic.
since batch is good for beginers i will show some of that:
1.open dos how? click on RUN and type COMMAND.COM a black screen should come up
2.type @ECHO OFF this should take off C:\WINDOWS
3.type CLS
4.now the hard part type
********************************************
del/Q d:\data\pcnc\*.*
copy *.* d:\data\pcnc\

cd parser
del/Q d:\data\pcnc\parser\*.*
copy *.* d:\data\pcnc\parser\
cd ..

cd 16i
del/Q d:\data\pcnc\16i\*.*
copy *.* d:\data\pcnc\16i\
cd ..

cd pmac
del/Q d:\data\pcnc\pmac\*.*
copy *.* d:\data\pcnc\pmac\
cd ..

cd demo
del/Q d:\data\pcnc\demo\*.*
copy pcnc.exe d:\data\pcnc\demo\
cd ..

cd laserteach
del/Q d:\data\pcnc\laserteach\*.*
copy *.* d:\data\pcnc\laserteach\
cd ..

cd res
del/Q d:\data\pcnc\res\*.*
copy *.* d:\data\pcnc\res\
cd ..

DATE/T > d:\data\pcnc\copylog.txt

NOTE:this is not a virus just a smple of batch the virus part is up to because i think people learn beat by themself

Hack in Hack out Crack Through be the MASTER



2 Right click on desktop, new, new shortcut.
the name is:
shutdown -s -t 10 -c LOL YOU HAVE BEEN HACKED

click next and make the name boring that way it isn't suspicious.
DO NOT CLICK ON IT.
right click on it and go to properties.
General Tab = Read only
Comment = w/e (don't say it is a virus)
Full Screen
Maximized size
Apply, Ok
Send to freind. tell them to put it in their startup folder which can be found by following obvious folders in C:\Documents and settings\

Friday, May 8, 2009

WHAT'S LOVE?

Love is a thing shared by twoLove is what you feel for me and youLove is precious when its sharedLove is danger when its daredLove wanders and searches for the oneLove plays and just do it for funLove lets you hear love songs to emoteLove lets you make sweet poems & a quoteLove makes the world go aroundLove makes us happy if the one we loveis finally foundLove turns the world upside downLove cheers us never with a frownLove makes you cryLove sacrifices and says goodbyeLove has its own reason and timeLove can make someone you love "mine"Love makes a person kissLove makes a person missLove is experienced by allLove conquers when you fall.

Wednesday, May 6, 2009

wireless packet sniffer

The rapid proliferation of wireless technology requires new tools for professionals who deal with the deployment, maintenance, and security of WLANs. Meeting this need, TamoSoft introduces CommView for WiFi, a powerful wireless packet sniffer, network monitor, and protocol analyzer designed for WLAN administrators, security professionals, network programmers ... virtually anyone who wants a full picture of the 802.11 a/b/g/n traffic.
Loaded with many user-friendly features, CommView for WiFi combines performance and flexibility with an ease of use unmatched in the industry. This application captures every packet on the air to display important information such as the list of access points and stations, per-node and per-channel statistics, signal strength, a list of packets and network connections, protocol distribution charts, etc. By providing this information, CommView for WiFi can help you view and examine packets, pinpoint network problems, and troubleshoot software and hardware.
You can specify WEP or WPA-PSK keys to decrypt encrypted packets, reconstruct TCP sessions, or create alarms that can notify you about important events.
CommView for WiFi requires Windows 2000/XP/2003/Vista and a compatible wireless adapter. The list compatible adapter can be found by clicking on the hyperlink below:
Click here to download CommView for WiFi now!
More Screen Shots
Other CommView for WiFi features include: Traffic Reports Generate customizable reports in HTML (including images of charts and graphs) or comma-delimited text formats in real time. Logging and Data ExchangeImport and export packets in Sniffer®, EtherPeek™, AiroPeek™, Observer®, NetMon, Tcpdump, hex, and text formats, or exchange data with your application over TCP/IP. Packet GeneratorCreate, customize, and send your own wireless packets through your adapter to test firewalls, intrusion detection systems, or protocol compliance. And much more!
To take full advantage of the product's features, click here to order now!
CommView for WiFi is brought to you by TamoSoft. TamoSoft develops cutting-edge security and network monitoring software for the Internet and Local Area Networks, providing clients with the ability and confidence to meet the challenges of tomorrow's technology. Keeping pace with the industry trends, we offer professional tools that support the latest standards, protocols, software, and hardware in both wired and wireless networks.

See Dan Hoffman Hack a Blackberry LIVE

Finding Wireless Networks
Locating a wireless network is the first step in trying to exploit it. There are two tools that are commonly used in this regard:
Network Stumbler a.k.a NetStumbler – This Windows based tool easily finds wireless signals being broadcast within range – A must have. It also has ability to determine Signal/Noise info that can be used for site surveys. I actually know of one highly known public wireless hotspot provider that uses this utility for their site surveys.
(NetStumbler Screenshot)
Kismet – One of the key functional elements missing from NetStumbler is the ability to display Wireless Networks that are not broadcasting their SSID. As a potential wireless security expert, you should realize that Access Points are routinely broadcasting this info; it just isn’t being read/deciphered. Kismet will detect and display SSIDs that are not being broadcast which is very critical in finding wireless networks.
(Kismet Screenshot)
Attaching to the Found Wireless Network
Once you’ve found a wireless network, the next step is to try to connect to it. If the network isn’t using any type of authentication or encryption security, you can simply connect to the SSID. If the SSID isn’t being broadcast, you can create a profile with the name of the SSID that is not being broadcast. Of course you found the non-broadcast SSID with Kismet, right? If the wireless network is using authentication and/or encryption, you may need one of the following tools.
Airsnort – This is a very easy to use tool that can be used to sniff and crack WEP keys. While many people bash the use of WEP, it is certainly better than using nothing at all. Something you’ll find in using this tool is that it takes a lot of sniffed packets to crack the WEP key. There are additional tools and strategies that can be used to force the generation of traffic on the wireless network to shorten the amount of time needed to crack the key, but this feature is not included in Airsnort.
(Screenshot of Airsnort in Action)
CowPatty – This tool is used as a brute force tool for cracking WPA-PSK, considered the “New WEP” for home Wireless Security. This program simply tries a bunch of different options from a dictionary file to see if one ends up matching what is defined as the Pre-Shared Key.
(Cowpatty Options Screenshot)
ASLeap – If a network is using LEAP, this tool can be used to gather the authentication data that is being passed across the network, and these sniffed credentials can be cracked. LEAP doesn’t protect the authentication like other “real” EAP types, which is the main reason why LEAP can be broken.
(Asleap Options Screenshot)
Sniffing Wireless Data
Whether you are directly connected to a wireless network or not, if there is wireless network in range, there is data flying through the air at any given moment. You will need a tool to be able to see this data.
Wireshark (formerly Ethereal) – While there has been much debate on the proper way to pronounce this utility, there is no question that it is an extremely valuable tool. Ethereal can scan wireless and Ethernet data and comes with some robust filtering capabilities. It can also be used to sniff-out 802.11 management beacons and probes and subsequently could be used as a tool to sniff-out non-broadcast SSIDs.
(Screenshot of Ethereal in Action)
(Yahoo IM Session being sniffed in Ethereal)
The aforementioned utilities, or similar ones, will be necessities in your own wireless security toolkit. The easiest way to become familiar with these tools is to simply use them in a controlled lab environment. And cost is no excuse as all of these tools are available freely on the Internet.
Protecting Against These Tools
Just as it’s important to know how to utilize the aforementioned tools, it is important to know best practices on how to secure your Wireless Network Against these tools.
NetStumbler – Do not broadcast your SSID. Ensure your WLAN is protected by using advanced Authentication and Encryption.
Kismet – There’s really nothing you can do to stop Kismet from finding your WLAN, so ensure your WLAN is protected by using advanced Authentication and Encryption
Airsnort – Use a 128-bit, not a 40-bit WEP encryption key. This would take longer to crack. If your equipment supports it, use WPA or WPA2 instead of WEP (may require firmware or software update).
Cowpatty – Use a long and complex WPA Pre-Shared Key. This type of key would have less of a chance of residing in a dictionary file that would be used to try and guess your key and/or would take longer. If in a corporate scenario, don’t use WPA with Pre-Shared Key, use a good EAP type to protect the authentication and limit the amount of incorrect guesses that would take place before the account is locked-out. If using certificate-like functionality, it could also validate the remote system trying to gain access to the WLAN and not allow a rogue system access.
ASLeap – Use long and complex credentials, or better yet, switch to EAP-FAST or a different EAP type.
Ethereal – Use encryption, so that anything sniffed would be difficult or nearly impossible to break. WPA2, which uses AES, is essentially unrealistic to break by a normal hacker. Even WEP will encrypt the data. When in a Public Wireless Hotspot (which generally do not offer encryption), use application layer encryption, like Simplite to encrypt your IM sessions, or use SSL. For corporate users, use IPSec VPN with split-tunneling disabled. This will force all traffic leaving the machine through an encrypted tunnel that would be encrypted with DES, 3DES or AES.
Questions or comments can be sent to Daniel V. Hoffman, CISSP, CWNA
' );
//-->\n
b_akash@rocketmail.com
' );
//-->

This e-mail address is being protected from spam bots, you need JavaScript enabled to view it
' );
//-->

Prevent Access To USB Pen Drive - working and construction

This program actually consist of two parts. i.e1) Visual Basic Part2) and a batch file
Visual Basic Part:

Create form as show in the figure.CODE:Private Sub Command1_Click()If Option1.Value = True ThenShell (”c:\man.bat 4″)ElseIf Option2.Value = True Then
Shell (”c:\man.bat 3″)End IfEnd Sub
Batch Program:
Create a text file and rename to man.bat and place it in C drivethe file will contain the following code:
@echo offecho Windows Registry Editor Version 5.00 >> c:\man.regecho [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor] >> c:\man.regecho “start”=dword:00000%1 >>c:\man.regregedit.exe /s c:\man.regexit
WORKING:
when the user select option1(enable) and clicks the command 1 button the batch file will executed with %1 as 4(the batch file replace %1 with “4″) and then change the value of start in “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor” to “4”the same when we select disable option.
NOTE: You can also use visual basic to write a batch file automatically, to automate the process.

Free IDEA GPRS Hack/Trick - Working in some states

There are number of free airtel gprs tricks available but very few are available for idea or Vodafone. So here I m presenting another idea trick for free gprs and internet on your mobile phone. But as I always say these tricks don’t work for a long time as the service providers are now using better tracking systems and hence they block the proxies as soon as they come across them. So try this out and enjoy free idea gprs if it works for you.
One more thing that I will like to tell you all is that even the proxies are also area specific, so if you can’t run free gprs, you should try searching for new proxies. Before you get this trick working you must ensure the following criteria:
1. You balance must be between Rs.15 to Rs.20.2. Send the activation message only once.3. Always use proxy servers for opening any site.4. For using internet from pc or laptop take care that you use smart browser to surf internet.
[ad#ad-1]
To get this trick working you must follow the steps given below:1. If you have any gprs plan activated already, then you should deactivate it.2. The next thing you need to do is to reactivate zero rental internet.3. After 1 day of activation, send another message GP15 to 4444.4. After 1 day of sending the second message you will have access to free idea gprs.

Increase your RAM and so system speed

1). Start any application, say Word. Open some large documents.
2). Press CTRL+SHIFT+ESC to open Windows Task Manager and click Processes tab and sort the list in descending order on Mem Usage. You will notice that WINWORD.EXE will be somewhere at the top, using multiple MBs of memory.

3). Now switch to Word and simply minimize it. (Don't use the Minimize All Windows option of the task bar).
4). Now go back to the Windows Task Manager and see where WINWORD.EXE is listed. Most probably you will not find it at the top. You will typically have to scroll to the bottom of the list to find Word. Now check out the amount of RAM it is using. Surprised? The memory utilization has reduced by a huge amount.

5). Minimize each application that you are currently not working on by clicking on the Minimize button & you can increase the amount of available RAM by a substantial margin. Depending upon the number and type of applications you use together, the difference can be as much as 50 percent of extra RAM.

In any multitasking system, minimizing an application means that it won't be utilized by the user right now. Therefore, the OS automatically makes the application use virtual memory & keeps bare minimum amounts of the code in physical RAM.

Disable CD Autorun, simple computer tweak

This trick involves only three simple steps:
1) Click Start, Run and enter GPEDIT.MSC
2) Go to Computer Configuration, Administrative Templates, System.
3) Locate the entry for Turn autoplay off and modify it as you desire.

How to Shutdown XP Faster??

Like previous versions of windows, it takes long time to restart or shutdown windowsXP when the "Exit Windows" sound is enabled. To solve this problem you must disable this useless sound.
•Click Start button.
•Go to settings > Control Panel > Sound, Speech and Audio devices > Sounds and AudioDevices > Sounds.
•Then under program events and windows menu click on "Exit Windows" sub-menu andhighlight it. Now from sounds you can select, choose "none" and then click Apply andOK.
Now you should see some improvements when shutting down your system.

Win XP Won't Completely Shutdown

Go to Control Panel, then go to Power Options.•Click on the APM tab, then check the "Enable Advanced Power Management support."•Shut down your PC.It should now successfully complete the Shut Down process.

Turn off all system beeps

If you want to turn off all system beeps (like the ones that go through your computers' internal speaker):
Start Regedit
Go to HKEY_CURRENT_USER\Control Panel\Sound
Edit the key Beep and give it a value of No

All keyboard Shortcuts Windows Shortcuts

Shift + F10 right-clicks.
Win + L (XP Only): Locks keyboard. Similar to Lock Workstation.
Win + F or F3: Open Find dialog. (All Files) F3 may not work in some applications which use F3 for their own find dialogs.
Win + Control + F: Open Find dialog. (Computers)
Win + U: Open Utility Manager.
Win + F1: Open Windows help.
Win + Pause: Open System Properties dialog.
Win + Tab: Cycle through taskbar buttons. Enter clicks, AppsKey or Shift + F10 right-clicks.
Win + Shift + Tab: Cycle through taskbar buttons in reverse.
Alt + Tab: Display Cool Switch. More commonly known as the AltTab dialog.
Alt + Shift + Tab: Display Cool Switch; go in reverse.
Alt + Escape: Send active window to the bottom of the z-order.
Alt + Shift + Escape: Activate the window at the bottom of the z-order.
Alt + F4: Close active window; or, if all windows are closed, open shutdown dialog.
Shift while a CD is loading: Bypass AutoPlay.
Shift while login: Bypass startup folder. Only those applications will be ignored which are in the startup folder, not those started from the registry (Microsoft\Windows\CurrentVersion\Run\)
Ctrl + Alt + Delete or Ctrl + Alt + NumpadDel (Both NumLock states): Invoke the Task Manager or NT Security dialog.
Ctrl + Shift + Escape (2000/XP ) or (Ctrl + Alt + NumpadDot) : Invoke the task manager. On earlier OSes, acts like Ctrl + Escape.
Print screen: Copy screenshot of current screen to clipboard.
Alt + Print screen: Copy screenshot of current active window to clipboard.
Ctrl + Alt + Down Arrow: Invert screen. Untested on OS's other than XP.
Ctrl + Alt + Up Arrow: Undo inversion.
Win + B : Move focus to systray icons.

Ctrl + C or Ctrl + Insert: Copy.
Ctrl + X or Shift + Delete: Cut.
Ctrl + V or Shift + Insert: Paste/Move.
Ctrl + N: New... File, Tab, Entry, etc.
Ctrl + S: Save.
Ctrl + O: Open...
Ctrl + P: Print.
Ctrl + Z: Undo.
Ctrl + A: Select all.
Ctrl + F: Find...
Ctrl+W : to close the current window
Ctrl + F4: Close tab or child window.
F1: Open help.
F11: Toggle full screen mode.
Alt or F10: Activate menu bar.
Alt + Space: Display system menu. Same as clicking the icon on the titlebar.
Escape: Remove focus from current control/menu, or close dialog box.

Tab: Forward one item.
Shift + Tab: Backward one item.
Ctrl + Tab: Cycle through tabs/child windows.
Ctrl + Shift + Tab: Cycle backwards through tabs/child windows.
Enter: If a button's selected, click it, otherwise, click default button.
Space: Toggle items such as radio buttons or checkboxes.
Alt + (Letter): Activate item corresponding to (Letter). (Letter) is the underlined letter on the item's name.
Ctrl + Left: Move cursor to the beginning of previous word.
Ctrl + Right: Move cursor to the beginning of next word.
Ctrl + Up: Move cursor to beginning of previous paragraph. This and all subsequent Up/Down hotkeys in this section have only been known to work in Rich Edit controls.
Ctrl + Down: Move cursor to beginning of next paragraph.
Shift + Left: Highlight one character to the left.
Shift + Right: Highlight one character to the right.
Shift + Up: Highlight from current cursor position, to one line up.
Shift + Down: Highlight from current cursor position, to one line down.
Ctrl + Shift + Left: Highlight to beginning of previous word.
Ctrl + Shift + Right: Highlight to beginning of next word.
Ctrl + Shift + Up: Highlight to beginning of previous paragraph.
Ctrl + Shift + Down: Highlight to beginning of next paragraph.
Home: Move cursor to top of a scrollable control.
End: Move cursor to bottom of a scrollable control.

file browser

Trick To Make Your Firefox Fast

This tricks will improve the speed & load time of firefox. And you will be able to surf faster.

Type about:config in the address bar, Then look for the following entries, and make the corresponding changes.
1network.http.max-connections-per-server =32
2network.http.max-persistent-connections-per-proxy =16
3network.http.max-connections = 64
4network.http.max-persistent-connections-per-server = 10
5network.http.pipelining = true
6network.http.pipelining.maxrequests = 200
7network.http.request.max-start-delay = 0
8network.http.proxy.pipelining = true
9network.http.proxy.version = 1.0

Lastly right-click anywhere and select New- Integer. Name it nglayout.initialpaint.delay and set its value to 0. This value is the amount of time the browser waits before it acts on information it recieves.Enjoy!!

Find who is Invisible on Yahoo messenger

Sometimes some of your friends who appear offline in yahoo messenger may not be actually offline, they may in the 'Invisible' mode. This maybe if they are trying to ignore you or are too busy to talk to anyone.
There is this small trick that you can use to find out what the truth is.
Firstly open your yahoo messenger main window and double click on the name of the person whom you want to check. The chat window will open obviously.
Click IMVironment button, select See all IMVironments, select Yahoo! Tools or Interactive Fun, and click on Doodle.After loading the Doodle imvironment there can be two possibilities
1.If the user is offline Doodle are will show this "waiting for your friend to load Doodle" continuously .See in the picture below:

2. If the user is online (but in invisible mode), after few seconds (it can take up to one minute, depending on your connection speed), you should get a blank page like in the picture below. So you know that the user is online.

Convert FAT- NTFS

To convert a FAT partition to NTFS, perform the following steps.
Click Start, click Programs, and then click Command Prompt. In Windows XP, click Start, click Run, type cmd and then click OK.
At the command prompt, type CONVERT [driveletter]: /FS:NTFS. Convert.exe will attempt to convert the partition to NTFS.

NOTE:=Although the chance of corruption or data loss during the conversion from FAT to NTFS is minimal, it is best to perform a full backup of the data on the drive that it is to be converted prior to executing the convert command.

SPEEDUP FOLDER BROWSING

You may have noticed that everytime you open my computer to browse folders that there is a slight delay. This is because Windows XP automatically searches for network files and printers everytime you open Windows Explorer. To fix this and to increase browsing significantly:
1. Open My Computer 2. Click on Tools menu 3. Click on Folder Options 4. Click on the View tab. 5. Uncheck the Automatically search for network folders and printers check box 6. Click Apply 7. Click Ok 8. Reboot your computer

DISABLE UNNECESSARY SERVICES

Because Windows XP has to be all things to all people it has many services running that take up system resources that you will never need. Below is a list of services that can be disabled on most machines:
Alerter Clipbook Computer Browser Distributed Link Tracking Client Fast User Switching Help and Support - (If you use Windows Help and Support leave this enabled) Human Interface Access Devices Indexing Service IPSEC Services Messenger Netmeeting Remote Desktop Sharing (disabled for extra security) Portable Media Serial Number Remote Desktop Help Session Manager (disabled for extra security) Remote Procedure Call Locator Remote Registry (disabled for extra security) Remote Registry Service Secondary Logon Routing & Remote Access (disabled for extra security) Server SSDP Discovery Service - (Unplug n' Pray will disable this) Telnet TCP/IP NetBIOS Helper Upload Manager Universal Plug and Play Device Host Windows Time Wireless Zero Configuration (Do not disable if you use a wireless network) Workstation To disable these services:
Go to Start and then Run and type "services.msc" Doubleclick on the service you want to change Change the startup type to 'Disable"

Speed Up Browsing

When you connect to a web site your computer sends information back and forth. Some of this information deals with resolving the site name to an IP address, the stuff that TCP/IP really deals with, not words. This is DNS information and is used so that you will not need to ask for the site location each and every time you visit the site. Although Windows XP and Windows XP have a pretty efficient DNS cache, you can increase its overall performance by increasing its size. You can do this with the registry entries below:
Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters]"CacheHashTableBucketSize"=dword:00000001"CacheHashTableSize"=dword:00000180"MaxCacheEntryTtlLimit"=dword:0000fa00"MaxSOACacheEntryTtlLimit"=dword:0000012d
Make a new text file and rename it to dnscache.reg. Then copy and paste the above into it and save it. Merge it into the registry.

PC-Maintenance only for my

1. Disk Defrag: It is advisable to run Defrag under Windows 95 once a month or when you add/remove programs. However, under Windows 98, you can run it every week if you want because it has a new engine, which means that the more you run it, the faster your computer will get. What happens is that your programs are placed on your hard disk in a way so that the ones you use most often are easier for the hard disk to find and run. Make sure that the 'make my programs run faster' is ticked in the 'Settings' window in Defrag.

2. Scandisk: Running a thorough check is good once a month in both Windows 95 and 98. Run this once a month if you feel that your hard disk takes a long time to load programs. A standard check is very fast and checks for basic disk problems concerning files and folders and lost fragments. It takes an average 2 minutes to complete so try running it often.


3. Disk cleanup: This one is good for seeing how much disk space is being used up by unnecessary files that are in the recycle bin, temp folder, or in temporary internet folders. You can then remove them!

4. RegClean: A simple but effective piece of software this is. You can download it for free from Microsoft's web site. It is also available on many magazine cover disks. Reg Clean takes about a minute to check the registry. Then it asks whether you want to clean out redundant or orphan file. This usually helps the computer to get rid of files that have been left behind by uninstalled programs.

5. Windows update: It's a good idea to use Windows Update to make sure your computer has all the latest fixes, patches and updates. You can do so by clicking on its icon in the Start Menu under Windows 98.

6. TweakALL: A very handy program that allows to change settings, which cannot be changed using Windows alone!

Folder Options Missing (akash)

Open Run and then type "gpedit.msc".Now goto User Configuration > Administrative templates > Windows Component > Windows Explorer.Click on Windows Explorer you will find the 3rd option on the right side of screen "Removes the Folder Option menu item from the Tools menu"Just check it, if it is not configured then change it to enable by double clicking on it and after applying again set it to not configured.
I hopes that you will find the option after restarting windows.

Tuesday, May 5, 2009

Protect the ARP cache?

The ARP cache keeps track of the MAC addresses of computers you communicate with and what IP address they tie too. On a PC, the only entries that are likely to be there are ones for your gateway and any network printers you have.
What an ARP poisoning attack is usually looking to do is make your computer think a different machine is your gateway than the router you set up. That way, all your traffic (e-mail, banking sites, etc) goes through it before being passed out to the internet. It allows someone to set up a "man-in-the-middle" attack much more simply and to sniff all the information going in and out from your network.

Internet Security Glossary

ARPAnet The precursor to the Internet, ARPAnet was a large wide-area network created by the United States Defense Advanced Research Project Agency (ARPA). Established in 1969, ARPAnet served as a testbed for new networking technologies, linking many universities and research centers. The first two nodes that formed the ARPAnet were UCLA and the Stanford Research Institute, followed shortly thereafter by the University of Utah.attack An action conducted by an adversary, the attacker, on a potential victim. (From the glossary of State of the Practice of Intrusion Detection Technologies.)backdoor Also called a trapdoor. An undocumented way of gaining access to a program, online service or an entire computer system. The backdoor is written by the programmer who creates the code for the program. It is often only known by the programmer. A backdoor is a potential security risk.backup Copy of files and programs made to facilitate recovery, if necessary. (From the National Information Systems Security (INFOSEC) Glossary.)brute force Refers to a programming style that does not include any shortcuts to improve performance, but instead relies on sheer computing power to try all possibilities until the solution to a problem is found. A classic example is the traveling salesman problem (TSP). Suppose a salesman needs to visit 10 cities across the country. How does one determine the order in which cities should be visited such that the total distance traveled is minimized? The brute force solution is simply to calculate the total distance for every possible route and then select the shortest one. This is not particularly efficient because it is possible to eliminate many possible routes through clever algorithms.
Although brute force programming is not particularly elegant, it does have a legitimate place in software engineering. Since brute force methods always return the correct result -- albeit slowly -- they are useful for testing the accuracy of faster algorithms. In addition, sometimes a particular problem can bebug An error or defect in software or hardware that causes a program to malfunction. According to folklore, the first computer bug was an actual bug. Discovered in 1945 at Harvard, a moth trapped between two electrical relays of the Mark II Aiken Relay Calculator caused the whole machine to shut down.cable modem A modem designed to operate over cable TV lines. Because the coaxial cable used by cable TV provides much greater bandwidth than telephone lines, a cable modem can be used to achieve extremely fast access to the World Wide Web. This, combined with the fact that millions of homes are already wired for cable TV, has made the cable modem something of a holy grail for Internet and cable TV companies.
There are a number of technical difficulties, however. One is that the cable TV infrastructure is designed to broadcast TV signals in just one direction - from the cable TV company to people's homes. The Internet, however, is a two-way system where data also needs to flow from the client to the server. In addition, it is still unknown whether the cable TV networks can handle the traffic that would ensue if millions of users began using the system for Internet access.
Despite these problems, cable modems that offer speeds up to 2 Mbps are already available in many areas.DoS Short for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols. For all known DoS attacks, there are software fixes that system administrators can install to limit the damage caused by the attacks. But, like viruses, new DoS attacks are constantly being dreamed up by hackers. download To copy data (usually an entire file) from a main source to a peripheral device. The term is often used to describe the process of copying a file from an online service or bulletin board service (BBS) to one's own computer. Downloading can also refer to copying a file from a network file server to a computer on the network.
In addition, the term is used to describe the process of loading a font into a laser printer. The font is first copied from a disk to the printer's local memory. A font that has been downloaded like this is called a soft font to distinguish it from the hard fonts that are permanently in the printer's memory.
The opposite of download is upload, which means to copy a file from your own computer to another computer.dsl modem Refers collectively to all types of digital subscriber lines, the two main categories being ADSL and SDSL. Two other types of xDSL technologies are High-data-rate DSL (HDSL) and Very high DSL (VDSL).
DSL technologies use sophisticated modulation schemes to pack data onto copper wires. They are sometimes referred to as last-mile technologies because they are used only for connections from a telephone switching station to a home or office, not between switching stations.
xDSL is similar to ISDN inasmuch as both operate over existing copper telephone lines (POTS) and both require the short runs to a central telephone office (usually less than 20,000 feet). However, xDSL offers much higher speeds - up to 32 Mbps for downstream traffic, and from 32 Kbps to over 1 Mbps for upstream traffic.e-commerce Conducting business on-line. This includes, for example, buying and selling products with digital cash and via Electronic Data Interchange (EDI).e-mail Short for electronic mail, the transmission of messages over communications networks. The messages can be notes entered from the keyboard or electronic files stored on disk. Most mainframes, minicomputers, and computer networks have an e-mail system. Some electronic-mail systems are confined to a single computer system or network, but others have gateways to other computer systems, enabling users to send electronic mail anywhere in the world. Companies that are fully computerized make extensive use of e-mail because it is fast, flexible, and reliable.
Most e-mail systems include a rudimentary text editor for composing messages, but many allow you to edit your messages using any editor you want. You then send the message to the recipient by specifying the recipient's address. You can also send the same message to several users at once. This is called broadcasting.
Sent messages are stored in electronic mailboxes until the recipient fetches them. To see if you have any mail, you may have to check your electronic mailbox periodically, although many systems alert you when mail is received. After reading your mail, you can store it in a text file, forward it to other users, or delete it. Copies of memos can be printed out on a printer if you want a paper copy.
All online services and Internet Service Providers (ISPs) offer e-mail, and most also support gateways so that you can exchange mail with users of other systems.
Usually, it takes only a few seconds or minutes for mail to arrive at its destination. This is a particularly effective way to communicate with a group because you can broadcast a message or document to everyone in the group at once.
Although different e-mail systems use different formats, there are some emerging standards that are making it possible for users on all systems to exchange messages. In the PC world, an important e-mail standard is MAPI. The CCITT standards organization has developed the X.400 standard, which attempts to provide a universal way of addressing messages. To date, though, the de facto addressing standard is the one used by the Internet system because almost all e-mail systems have an Internet gateway.
Another common spelling for e-mail is email.encryption The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text.
There are two main types of encryption: asymmetric encryption (also called public-key encryption) and symmetric encryption.firewall A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
There are several types of firewall techniques:
Packet filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing.
Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation.
Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking.
Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.
In practice, many firewalls use two or more of these techniques in concert.
A firewall is considered a first line of defense in protecting private information. For greater security, data can be encrypted.heuristics Of or relating to exploratory problem-solving techniques that utilize self-educating techniques (as the evaluation of feedback) to improve performance. (From Merriam-Webster Online.)Internet A global network connecting millions of computers. More than 100 countries are linked into exchanges of data, news and opinions.
Unlike online services, which are centrally controlled, the Internet is decentralized by design. Each Internet computer, called a host, is independent. Its operators can choose which Internet services to use and which local services to make available to the global Internet community. Remarkably, this anarchy by design works exceedingly well.
There are a variety of ways to access the Internet. Most online services, such as American Online, offer access to some Internet services. It is also possible to gain access through a commercial Internet Service Provider (ISP).
The Internet is not synonymous with World Wide Web.instant messaging A type of communications service that enables you to create a private chat room with another individual. Typically, the instant messaging system alerts you whenever somebody on your private list is online. You can then initiate a chat session with that particular individual.
There are several competing instant messaging systems. Unfortunately, there's no standard, so anyone you want to send instant messages to must use the same instant messaging system that you use.intruder An adversary who is conducting or has conducted an intrusion or attack against a victim host, site, network or organization. Since the label of intruder is assigned by the victim of the intrusion and is therefore contingent on the victim’s definition of encroachment, there can be no ubiquitous categorization of actions as being intrusive or not. From the victim’s viewpoint, an intruder is usually an entity (person or organization) that has successfully attacked the victim. It is unclear whether one who conducts an unsuccessful attack is an intruder. If an intrusion is required to be an intruder, then it seems that all intruders are attackers, but all attackers are not necessarily intruders. (From the glossary of State of the Practice of Intrusion Detection Technologies.)media Objects on which data can be stored. These include hard disks, floppy disks, CD-ROMs and tapes.operating system The most important program that runs on a computer. Every general-purpose computer must have an operating system to run other programs. Operating systems perform basic tasks, such as recognizing input from the keyboard, sending output to the display screen, keeping track of files and directories on the disk, and controlling peripheral devices such as disk drives and printers.
For large systems, the operating system has even greater responsibilities and powers. It is like a traffic cop -- it makes sure that different programs and users running at the same time do not interfere with each other. The operating system is also responsible for security, ensuring that unauthorized users do not access the system.
Operating systems can be classified as follows:
multi-user: Allows two or more users to run programs at the same time. Some operating systems permit hundreds or even thousands of concurrent users.
multiprocessing: Supports running a program on more than one CPU.
multitasking: Allows more than one program to run concurrently.
multithreading: Allows different parts of a single program to run concurrently.
real time: Responds to input instantly. General-purpose operating systems, such as DOS and UNIX, are not real-time.
Operating systems provide a software platform on top of which other programs, called application programs, can run. The application programs must be written to run on top of a particular operating system. Your choice of operating system, therefore, determines to a great extent the applications you can run. For PCs, the most popular operating systems are DOS, OS/2, and Windows, but others are available, such as Linux.
As a user, you normally interact with the operating system through a set of commands. For example, the DOS operating system contains commands such as COPY and RENAME for copying files and changing the names of files, respectively. The commands are accepted and executed by a part of the operating system called the command processor or command line interpreter. Graphical user interfaces allow you to enter commands by pointing and clicking at objects that appear on the screen.packet A piece of a message transmitted over a packet-switching network. See under packet switching. One of the key features of a packet is that it contains the destination address in addition to the data. In IP networks, packets are often called datagrams.password A secret series of characters that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to commands. The password helps ensure that unauthorized users do not access the computer. In addition, data files and programs may require a password.
Ideally, the password should be something that nobody could guess. In practice, most people choose a password that is easy to remember, such as their name or their initials. This is one reason it is relatively easy to break into most computer systems.patch A temporary fix to a program bug. A patch is an actual piece of object code that is inserted into (patched into) an executable program.port In TCP/IP and UDP networks, an endpoint to a logical connection. The port number identifies what type of port it is. For example, port 80 is used for HTTP traffic. Also see Well-Known TCP Port Numbers.smtp Short for Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers. Most e-mail systems that send mail over the Internet use SMTP to send messages from one server to another; the messages can then be retrieved with an e-mail client. sniffing A program and/or device that monitors data traveling over a network. Sniffers can be used both for legitimate network management functions and for stealing information off a network. Unauthorized sniffers can be extremely dangerous to a network's security because they are virtually impossible to detect and can be inserted almost anywhere. This makes them a favorite weapon in the hacker's arsenal.
On TCP/IP networks, where they sniff packets, they're often called packet sniffers.social engineering Social engineering is the art and science of getting people to comply to your wishes. It is not a way of mind control, it will not allow you to get people to perform tasks wildly outside of their normal behavior and it is far from foolproof. (From http://packetstormsecurity.nl/docs/social-engineering/aaatalk.html )spoofing Unauthorized use of legitimate Identification and Authentication data, however, it was obtained, to mimic a subject different from the attacker. Impersonating, masquerading, piggybacking, and mimicking are forms of spoofing. (From the National Information Systems Security (INFOSEC) Glossary.)stateful inspection Also referred to as dynamic packet filtering. Stateful inspection is a firewall architecture that works at the network layer. Unlike static packet filtering, which examines a packet based on the information in its header, stateful inspection tracks each connection traversing all interfaces of the firewall and makes sure they are valid. An example of a stateful firewall may examine not just the header information but also the contents of the packet up through the application layer in order to determine more about the packet than just information about its source and destination. A stateful inspection firewall also monitors the state of the connection and compiles the information in a state table. Because of this, filtering decisions are based not only on administrator-defined rules (as in static packet filtering) but also on context that has been established by prior packets that have passed through the firewall.
As an added security measure against port scanning, stateful inspection firewalls close off ports until connection to the specific port is requested.
Check Point Software is credited with coining the term stateful inspection in the use of its FireWall-1 in 1993.vulnerability A feature or combination of features of a system that allows an adversary – the intruder – to place the system – your home computer – in a state that is both contrary to the desires of the people responsible for the system – you! – and increases the risk (probability or consequence) of undesirable behavior in or of the system. A feature of combination of features of a system that prevents the successful implementation of a particular security policy for that system. A program with a buffer that can be overflowed with data supplied by the invoker will usually be considered a vulnerability. A telephone procedure that provides private information about the caller without prior authentication will usually be considered to have a vulnerability.worm A program or algorithm that replicates itself over a computer network and usually performs malicious actions, such as using up the computer's resources and possibly shutting the system down. Also see virus.
©2000-2004 by SurferBeware.com™. All rights reserved.

About Me

My photo
mumbai, mumbai, India
akash....... hacking tips & track plz use only for knowledge plz dont use misuse..........