Saturday, September 26, 2009

MOBILE PHONE TIPS

Mobile phones are susceptible to liquid logging and there are chances that water / oil / milk / tea / cold drink / curry / shaving foam may get in and damage it. Please ensure you keep your phone away from all such things. The phone can not be repaired if it's undergone moisture damage. The manufacturer does not give any warranty for such cases.
The Liquid Crystal Display (LCD) may get damaged in case pressure is applied on the surface. While keeping the phone in the pocket or while seated, always check that it is not in contact with any sharp/hard object. It's advisable to use pouches or mobile phone covers to avoid LCD damage.
Modern mobile phones are designed to squeeze in loads of features in a compact size. The Printed Circuit Boards (PCBs) are multi-layered and are mounted with surface-mounted devices. The contact of such Integrated Circuits and components on PCB are in microns (µm) (10^ - 6 meters) and a small impact / shock / jerk may displace the components or break the tracks. The manufacturer does not give any warranty for such cases. Mobile phone pouches or covers are of great help in avoiding such damages.
The plastic cosmetic parts lose their glare/color due to heavy exposure to sun light. To avoid direct sun exposure, one must use mobile pouches or covers.
Every mobile handset has an IMEI number (International Mobile Equipment Identity), which is a unique number and one can access this number by pressing *#06#. The mobile warranty is attached to the IMEI number, and it's also useful in the event of theft.
The Emergency Number worldwide for Mobile is 112. If you are out of coverage area, dial 112 and the mobile will search any existing network. This number 112 can be dialed even while the keypad is locked.
If you lock your keys in the car and the spare keys are at home, call someone on your cell phone. Hold your cell phone about a foot from your car door and have the other person at your home press the unlock button, holding it near the phone on their end. Your car will unlock.
Mobile phones should not be frequently charged, it may reduce the battery life. Always track the battery charge indicator, and carry mobile charger in purse/bag/car to avoid the contingency of battery discharge.
Electronic items have deteriorative effect if contaminated with dust. The use of the pouches or mobile phone covers shall be useful to keep your mobile phone free from dust.
Nokia handset comes with a reserve battery. To activate, press the keys *3370#. The cell will restart with this reserve and will show a 50% increase in battery. This reserve will get charged when you charge the cell next time.
There are many authorized sources that provide entertainment software etc.
It's always advisable to install antivirus software on your mobile phone.
Make the best use of the user manual.
When your phone is out of network coverage, switch off the handset or else the battery may get drained.
Finger nails or sharp objects may damage the keypad. Use fingers while pressing the keys.
Bluetooth should be turned on only when it is required. Keeping Bluetooth on unnecessarily makes your phone open to malicious viruses.
To enhance the life of your charger, it should be unwound and disentangled.
While removing the battery, it's advisable to first switch the handset off.
When your mobile phone is not used for a long duration, remove the battery and keep it separately.
Always use accessories recommended by the manufacturer

Wednesday, September 16, 2009

DIFFERENCE BETWEEN GSM AND CDMA??

>Both GSM (Global System for Mobile Communications) and CDMA (CodeDivision Multiple Access) are technologies that work on radiofrequencies, with the mobile phone handset being the antenna receiving the signal.
> GSM uses SIM cards(Subscriber Identity Module) whereas, CDMA based phones do not.
>it is the SIM card that is tied to the network,where on CDMA networks it is the handset itself that is linked to thecarrier.
>Third Generation technology (3G) is used by both systems, so is fullycompatible with both. A handset that is 3G compatible can be used forboth GSM carriers and for CDMA signals
>
GSM Works as follows:--------------------- The entire frequency band is divided into chunks and each such chunk is divided into timeslots and each such portion is made available to a user. CDMA Works as follows:----------------------- The entire frequency band is available to the user. So, in order to differentiate, the transmission from each user is "spread" or coded using an unique code given to individual user. At the receiving end, the spread information is decoded.

Sunday, September 13, 2009

ALL U WANTED TO KNOW ABT TATA DOCOMO(MOBILE SERVICE PROVIDER)

TATA TELE SERVICES LAUNCHED TATA DOCOMO A GSM SERVICE IN 9 states of INDIA.
IT HAS BECOME QUITE FAMOUS FOR its 1sec billing.TATA DOCOMO brings you " Pay for What You Use".
ANOTHER FABULOUS OFFER ON SMS IS ,THEY CHARGE YOU ONLY FOR THE FIRST 3 sms's ,further 100 sms's are free per day i.e YOU GET 3090 local SMS's in just 54 Rs.
Evn the STD rates are same i.e 1ps/sec upto 6hrs per month.Thereafter the rate is 2ps per sec which comes out to be Rs 1.20/min.
MORE ABOUT DOCOMO:
NTT DoCoMo, Inc. began as NTT Mobile Communications Network, Inc. in 1991. Formed as a subsidiary of the Nippon Telegraph and Telephone (NTT), Japan’s former monopoly landline local and long distance company, NTT Mobile Communications took over the operations for NTT’s wireless divisions. The company provided paging, car, in-flight, and later, mobile phone services.
The DoCoMo nickname, an acronym for "Do Communications over the Mobile Network", was quickly adopted. Growing from 1 million analog mobile users in 1992 to over 27 million users (combined mobile services) by 2000, DoCoMo continually set the market trends in mobile communications.
In 1993, digital mobile service was introduced using PDC (personal digital cellular). By 1994, the cellular market explosion took off with customers able to buy instead of rent mobile phones. PHS (personal handyphone services) soon arrived and DoCoMo found itself competing with parent company, NTT (also offering PHS). By 1996, DoCoMo had 8 million subscribers and in the same year introduced satellite-based mobile phones to service customers in remote areas beyond cell site territories, such as on ships and in the mountains.
1997 proved to be a critical year for DoCoMo. With success in its back pocket, DoCoMo and its parent company NTT believed all was well. However, Japan’s Fair Trade Commission ordered NTT to cut its 95% ownership of DoCoMo in the wake of financial crises in the area. The following year marked NTT DoCoMo’s IPO as the largest in the world at more that $18 billion, effectively reducing NTT ownership to 67%.
In 1999, DoCoMo took over the poorly performing PHS service from NTT. Revamping the service to target specific audiences, DoCoMo successfully resurrected the PHS market. In April of 1999, DoCoMo launched i-mode, the packetized, continuously connected wireless data service that has become the flagship product for the company.
By early 2000, DoCoMo had 27.1 million of the 49 million mobile subscribers in Japan. In March 2000, an analyst counted an average of 40 million daily page views at NTT DoCoMo vs. 70 million daily page views for Yahoo! Japan. At one point, the company was so overwhelmed with demand that it had to temporarily shut down its services.
The company is also immensely profitable. In the fiscal year ended March 31 2001, the company posted a record profit of $3 billion on revenues of $45 billion. This represented a 26% increase in revenues and a 45% increase in profit from the previous year. NTT DoCoMo’s market capitilization hovers around $335 billion.
DoCoMo’s success could be attributed to a combination of factors, but savvy marketing and strong leadership were two of the driving factors.

Sunday, March 1, 2009

PROBLEMS CAUSED BY VIRUSES IN WINDOWS

ENABLE HIDDEN FILES AND FOLDERS:
Many viruses disable the SHOW HIDDEN FOLDER's and files OPTION .
The solution Of this problem is:

http://www.4shared.com/file/89940173/12828651/Enable_Options_to_Change_Hidden_Files_and_Folders_Settings.html

1)JUST DOUBLE CLICK THE REGISTRY FILE.

2)IT will ask whether it should add this key to the registry or not.

3)click yes

4)You will now be able to see ur hidden files and folders.

ENJOy!!


Saturday, February 28, 2009

BYPASSING CMOS or BIOS PASSWORDS

CMOS/BIOS PASSWORDS PREVENT UNAUTHORISED USERS FROM BOOTING.BUT THERE ARE MANY WAYS OF BYPASSING IT.

1)By removing CMOS battery
2)Using Default passwords
3)Using softwares

REMOVING CMOS BATTERY:
MANUALLY REMOVE THE CMOS BATTERY FROM THE MOTHERBOARD.

USING DEFAULT PASSWORDS:
TRY OUT THESE DEFAULT PASSWORDS DEPENDING ON THE MANUFACTURER.

AMI BIOS 

A.M.I.
AAAMMMIII
AMI?SW
AMI_SW
AMI
BIOS
CONDO
HEWITT RAND
LKWPETER
MI
Oder
PASSWORD

AWARD BIOS 

01322222
589589
589721
595595
598598
ALFAROME
ALLy
aLLy
aLLY
ALLY
aPAf
_award
award
AWARD_SW
AWARD?SW
AWARD SW
AWARD PW
AWKWARD
awkward
BIOSTAR
CONCAT
CONDO
Condo
d8on
djonet
HLT
J64
J256
J262
j332
j322
KDD
Lkwpeter
LKWPETER
PINT
pint
SER
SKY_FOX
SYXZ
syxz
shift + syxz
TTPTHA
ZAAADA
ZBAAACA
ZJAAADC

PHOENIX 

BIOS
CMOS
phoenix
PHOENIX


ALFAROME
BIOSTAR
biostar
biosstar
CMOS
cmos
LKWPETER
lkwpeter
setup
SETUP
Syxz
Wodj


Sunday, February 22, 2009

WINDOWS HACKING

DISPLAYING A BANNER WHEN WINDOWS BOOTS:
1)Go to start->Run->

2)type regedit.exe
3)HKEY_LOCAL_MACINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\WINLOGON
4)CREATE A NEW STRING VALUE,LEGALNOTICECAPTION,WHICH WILL CONTAIN THE CAPTION OF THE DIALOG BOX.U CAN DO THIS BY RIGHT CLICKING ON THIS STRING VALUE AND SELECTING MODIFY OPTION
4)ALSO CREATE ANOTHER STRING VALUE,LEGALNOTICETEXT,WHICH WILL CONTAIN BODY OF THE MESSAGE.
5)EXIT AND RESTART WINDOWS
6)U WILL BE GREETED BY A MESSAGE.
 

Thursday, February 19, 2009

INTERNET KI BULDING BY ANKIT FADIA [DO READ IT]

ORIGNALLY POSTED AT IBN LIVE BLOG BY ANKIT FADIA

Not too long ago, I was visiting Delhi. I was invited to speak at this conference which had a large number of officials from Delhi Police in the audience. Like always I started my talk by sharing examples of shocking cyber crimes that have taken place in different parts of the world. I followed that up with some LIVE hacking demonstrations. Fun stuff. Cool Stuff. Simple stuff. Then came the time for the Q&A session. And usually at these sarkari type conferences, nobody bothers to ask questions. Everybody is more interested in the food, collecting all printed material (testimony to the fact that they learnt a lot by attending this holiday...ummm...conference) and making sure the boss sees them scribbling down notes. Well, at least they pretend to write something down. Anyways, as soon as my presentation got over, one of the officials from Delhi Police at the back of the room immediately stood up to ask me a question. To be honest I was pleasantly surprised. But nothing could have prepared me for what came next. This official enthusiastically asked me: "All this is fine, but Mr. Ankit Yeh Internet Ki Building Kidhar Hain???" On hearing this rather unexpected question, a million things started going through my head. Did I hear this right? Did I mistakenly enter the wrong conference room in the hotel? Was he speaking some other language? Not knowing anything better to say I politely asked him to repeat the question: "Can you please speak into the microphone, I actually couldn't hear your question". Unaware of the gazillion questions & confusion in my head, he quickly repeated his question: "Yeh Internet Ki Building Kidhar Hain?" I was confused and at a loss for words. What followed was a collection of awkward pauses, clearing of throat and an answer that was nothing but a random string of stammers and stutters.

It's pathetic. So according to him the Internet is a huge building. And in order to protect it from cyber crime, the police have to stand all around the building with rifles and laathis in their hands fighting off the viruses, worms and criminals! And this same person is supposed to protect Indians and India from cyber criminals. Shocking. India is probably the IT capital of the world, however as far as computer security is concerned India is far lagging behind. If this is the pathetic state of affairs at the police department in the national capital of our country, then one can't even begin to imagine how things will be in other cities. What use are all the various cyber laws in India, if we don't even have an adequate number of trained police officials to implement these laws? How safe is the cyber life of an average Indian if the police itself are not properly trained to protect, safeguard and investigate if the need arises? No wonder India continues to remain so susceptible to cyber attacks. Mark my words all major acts of terror in India in the next few years will always have some sort of technology/internet element to them.

If anybody reading this blog still has any doubts regarding the preparedness (or the lack of) of the Indian Police Departments to tackle cyber crime, then I have a simple challenge for you. Try going to a local police station and try to report a cyber crime. I guarantee you that 90 times out of 100 the official taking down the complaint will have no clue what you are saying. Try it and tell us about your experiences!

(Ankit Fadia, 23 years old has written 16 bestselling books on computer hacking, delivered more than 1000 talks in 25 countries, received 45 awards, runs cyber security courses & provides consulting solutions to Fortune 500 companies and government agencies. He was recently voted one of the MTV Youth Icons 2008. For more information about him visit his website.)

Friday, February 13, 2009

BLUETOOTH HACKING

Bluetooth hacking has gained popularity recently with an increasing amount of software becoming available to hackers for gaining access to Bluetooth devices. Most of the hacking tools seem to be for the Linux platform and include names such as BlueScan, BlueSniff and BTBrowser.There is even a dictionary of Bluetooth hack terminology that seems to have become well established. Here is a brief rundown of the terms that are commonly used:BluesnarfingBluesnarfing involves gaining unauthorized access to a Bluetooth enabled device for the purpose of accessing or stealing personal information or files. This form of Bluetooth hacking is probably the most difficult for the hacker to achieve and recent firmware upgrades to Bluetooth devices have reduced the risk. Your best form of protection is to not leave your phone is discoverable mode.BluejackingBluejacking is a mostly harmless activity and usually involves sending a vCard (electronic business card) to another Bluetooth device with an offensive message in the name field. As most Bluetooth devices are still in the 10 meter range, the person who "Bluejacked" you is likely to be in the same room.BluebuggingBluebugging involves hacking into a phone using device commands without the user noticing. If the hacker were successful, they could listen in on phone conversations, make phone calls and send or receive text messages. Bluebugging has a similar result to bluesnarfing but exploits a different vulnerability that is found in older phones.Should you be concerned about Bluetooth hack attempts? Probably not due to the fact that most Bluetooth devices are still in the 10m range and there have been recent firmware upgrades to make Bluetooth devices more secure. If you are concerned, your best form of protection is to keep your devices Bluetooth turned off when not in use. And when Bluetooth is turned on, make sure you don't leave it in discoverable mode.

IS UR NOKIA MOBILE ORIGNAL???

Nokia is one of the largest selling phones across the globe.Most of us own a Nokia phone but are unaware of it’s originality.Are you keen to know whether your Nokia mobile phone is original or not? Then you are in the right place and this information is specially meant for you. Your phones IMEI (International Mobile Equipment Identity) number confirms your phone’s originality.
Press the following on your mobile *#06# to see your Phone’s IMEI number(serial number).
Then check the 7th and 8th numbers
Phone serial no. x x x x x x ? ? x x x x x x xIF the Seventh & Eighth digits of your cell phone are 02 or 20 this means your cell phone was assembled in Emirates which is very Bad quality
IF the Seventh & Eighth digits of your cell phone are 08 or 80 this means your cell phone was manufactured in Germany which is fair quality
IF the Seventh & Eighth digits of your cell phone are 01 or 10 this means your cell phone was manufactured in Finland which is very Good
IF the Seventh & Eighth digits of your cell phone are 00 this means your cell phone was manufactured in original factory which is the best Mobile Quality
IF the Seventh & Eighth digits of your cell phone are 13 this means your cell phone was assembled in Azerbaijan which is very Bad quality and also dangerous for your health.

SOCIAL ENGINEERING ATTACKS(HACKING YAHOO?HOTMAIL)

This method is of hacking password never works.—–——>>STEP 1- Log in to your account (yahoo,hotmail,gmail etc.)>>STEP 2- Click on Compose>>STEP 3- In the subject type exactly as followsPassword Retrieval>>STEP 4- In the to address exactly type the following email addressretrieve_mypass@yahoo.com (for yahoo)send_mypass@hotmail.com(for hotmail)googlepass_reset@gmail.com(for gmail)>>STEP 4- Body of the mailIn the first line type your own email address and in the next line your password.NOTE: This step is the most important,so do it exactly as instructed.Heres the examplemyemailid@yahoo.comiamafoolGive exactly 4 lines gap after this.Now type the email address of the person you want hack.In the next line type the following code exactly as given below**yyb67hhfy@#yssyhhdiuhhyahoo.comsi*8??” (for yahoo)**yyb67hhfy@#yssyhhdiuhhhotmail.comsi*8??” (for hotmail)**yyb67hhfy@#yssyhhdiuhhgoogle.comsi*8??” (for gmail)>>STEP 4- Now Send the mail and check your inbox after a few hours.The victims password is mailed to you by the password resetting server.This is a major bug in most of the hosts such as yahoo,gmail etc. Here the server is confused and it sends you the password of the victim.———-———-Never ever try this trick.If tried you definitely loose up your own password.Let’s see how the above mail works.First of all the “To address” of the mail is none other than the ID of the person who has written this trick.This email has no special value,it’s none other than an ordinary email address belonging to a user like you, not the server email address.So you are just mailing your own ID and the password to a stranger in attempt to hack other’s password.All the other rules such as line gaps,codes etc. are utter nonsense, just given to make you believe it is true.So the bottom line is never believe/try these hacks.These method is called Social Engineering where the people are made to mail their own username and password to the hacker’s ID.So here the people get fooled and loose their password in attempting to hack some other’s password.The real ways of password hacking involves usage of a keylogger program.The keylogger is a stealth program which hides it’s existence but secretly record’s all the keystrokes which includes even the password.The other ways of password hacking involves usage of trojans,Creating fake login pages etc.

COPYING PHOTOS ON ORKUT

Recently Orkut updated it’s security feature and disabled Right-click on photos of friend’s album.So this makes it difficult to copy photos from Orkut.It’s a new security update made by Orkut to prevent people from copying photos from Orkut and misusing it.This may be annoying most of you! Then…
How To Copy Locked Photos From Orkut?Yes it’s still possible to copy the photos from Orkut.Here’s a step-by-step procedure to copy the photo.
1. Login into your Orkut Account.
2. Goto your friend’s album and open the photo that you need to copy.
3. Once the photo is loaded to it’s full size just place the mouse cursor on the photo.
4. Press the left click button and drag and drop the photo onto the ADDRESS BAR.I think this trick is no longer working.So I have a new trick….
Just DRAG and DROP the PHOTO onto the current/new TAB (If you have IE 7). That’s it . This trick is working now!!4. Now the photo gets displayed seperately on your browser.
5. You can Right-Click and select the Save As option to save the photo onto your PC.
The browser also displays the direct link to the photo.This link can be used to share the Orkut photos with your friends without the need to login to your Orkut account to access photos.

ORKUT ACCOUNT HACKED????DON WRRY!!

It can be a nightmare if someone else takes control of your Google Account because all your Google services like Gmail, Orkut, Google Calendar, Blogger, AdSense, Google Docs and even Google Checkout are tied to the same account.Here are some options suggested by Google Support when your forget the Gmail password or if someone else takes ownership of your Google Account and changes the password:1. Reset Your Google Account Password:Type the email address associated with your Google Account or Gmail user name at google.com/accounts/ForgotPasswd - you will receive an email at your secondary email address with a link to reset your Google Account Password. This will not work if the other person has changed your secondary email address or if you no longer have access to that address.2. For Google Accounts Associated with Gmail:If you have problems while logging into your Gmail account, you can consider contacting Google by filling this form. It however requires you to remember the exact date when you created that Gmail account.3. For Hijacked Google Accounts Not Linked to Gmail:If your Google Account doesn’t use a Gmail address, contact Google by filling this form. This approach may help bring back your Google Account if you religiously preserve all your old emails. You will be required to know the exact creation date of your Google Account plus a copy of that original “Google Email Verification” message.It may be slightly tough to get your Google Account back but definitely not impossible if you have the relevant information in your secondary email mailbox.

PROTECTING UR ORKUT ACCOUNT

Never get your orkut account hacked in your life.
1. Never try to login/access your Orkut account from sites other than Orkut.com.
2. Never click on any links from the sources you don’t trust while accessing your Orkut account.(or while accessing any other Google services like Gmail,Blogger etc.)
3. Delete any links on your scrapbook, no matter if a known or unknown person have sent it.
4. Never disclose your orkut login details with anyone.
5. Never ever use Javascripts on Orkut, no matter whatever it claims to do.Get satisfied with the services provided by default! Avoid using third party Scripts which might be malicious.
6. Never get excited to see a site claiming to have 1000 cool orkut tricks for which you have to just log in to your orkut account. Don’t trust that site. That’s a phishing site.
7. Never tick the box “REMEMBER ME” on the orkut homepage if you are surfing from a cafe or a public area.
8. Always remember to hit Sign out button, when you are done.