Update yourself with the latest security threats in the IT industry... I'l be providing info about the latest softwares,Gadgets etc
Saturday, September 26, 2009
MOBILE PHONE TIPS
The Liquid Crystal Display (LCD) may get damaged in case pressure is applied on the surface. While keeping the phone in the pocket or while seated, always check that it is not in contact with any sharp/hard object. It's advisable to use pouches or mobile phone covers to avoid LCD damage.
Modern mobile phones are designed to squeeze in loads of features in a compact size. The Printed Circuit Boards (PCBs) are multi-layered and are mounted with surface-mounted devices. The contact of such Integrated Circuits and components on PCB are in microns (µm) (10^ - 6 meters) and a small impact / shock / jerk may displace the components or break the tracks. The manufacturer does not give any warranty for such cases. Mobile phone pouches or covers are of great help in avoiding such damages.
The plastic cosmetic parts lose their glare/color due to heavy exposure to sun light. To avoid direct sun exposure, one must use mobile pouches or covers.
Every mobile handset has an IMEI number (International Mobile Equipment Identity), which is a unique number and one can access this number by pressing *#06#. The mobile warranty is attached to the IMEI number, and it's also useful in the event of theft.
The Emergency Number worldwide for Mobile is 112. If you are out of coverage area, dial 112 and the mobile will search any existing network. This number 112 can be dialed even while the keypad is locked.
If you lock your keys in the car and the spare keys are at home, call someone on your cell phone. Hold your cell phone about a foot from your car door and have the other person at your home press the unlock button, holding it near the phone on their end. Your car will unlock.
Mobile phones should not be frequently charged, it may reduce the battery life. Always track the battery charge indicator, and carry mobile charger in purse/bag/car to avoid the contingency of battery discharge.
Electronic items have deteriorative effect if contaminated with dust. The use of the pouches or mobile phone covers shall be useful to keep your mobile phone free from dust.
Nokia handset comes with a reserve battery. To activate, press the keys *3370#. The cell will restart with this reserve and will show a 50% increase in battery. This reserve will get charged when you charge the cell next time.
There are many authorized sources that provide entertainment software etc.
It's always advisable to install antivirus software on your mobile phone.
Make the best use of the user manual.
When your phone is out of network coverage, switch off the handset or else the battery may get drained.
Finger nails or sharp objects may damage the keypad. Use fingers while pressing the keys.
Bluetooth should be turned on only when it is required. Keeping Bluetooth on unnecessarily makes your phone open to malicious viruses.
To enhance the life of your charger, it should be unwound and disentangled.
While removing the battery, it's advisable to first switch the handset off.
When your mobile phone is not used for a long duration, remove the battery and keep it separately.
Always use accessories recommended by the manufacturer
Wednesday, September 16, 2009
DIFFERENCE BETWEEN GSM AND CDMA??
> GSM uses SIM cards(Subscriber Identity Module) whereas, CDMA based phones do not.
>it is the SIM card that is tied to the network,where on CDMA networks it is the handset itself that is linked to thecarrier.
>Third Generation technology (3G) is used by both systems, so is fullycompatible with both. A handset that is 3G compatible can be used forboth GSM carriers and for CDMA signals
>
GSM Works as follows:--------------------- The entire frequency band is divided into chunks and each such chunk is divided into timeslots and each such portion is made available to a user. CDMA Works as follows:----------------------- The entire frequency band is available to the user. So, in order to differentiate, the transmission from each user is "spread" or coded using an unique code given to individual user. At the receiving end, the spread information is decoded.
Sunday, September 13, 2009
ALL U WANTED TO KNOW ABT TATA DOCOMO(MOBILE SERVICE PROVIDER)
IT HAS BECOME QUITE FAMOUS FOR its 1sec billing.TATA DOCOMO brings you " Pay for What You Use".
ANOTHER FABULOUS OFFER ON SMS IS ,THEY CHARGE YOU ONLY FOR THE FIRST 3 sms's ,further 100 sms's are free per day i.e YOU GET 3090 local SMS's in just 54 Rs.
Evn the STD rates are same i.e 1ps/sec upto 6hrs per month.Thereafter the rate is 2ps per sec which comes out to be Rs 1.20/min.
MORE ABOUT DOCOMO:
NTT DoCoMo, Inc. began as NTT Mobile Communications Network, Inc. in 1991. Formed as a subsidiary of the Nippon Telegraph and Telephone (NTT), Japan’s former monopoly landline local and long distance company, NTT Mobile Communications took over the operations for NTT’s wireless divisions. The company provided paging, car, in-flight, and later, mobile phone services.
The DoCoMo nickname, an acronym for "Do Communications over the Mobile Network", was quickly adopted. Growing from 1 million analog mobile users in 1992 to over 27 million users (combined mobile services) by 2000, DoCoMo continually set the market trends in mobile communications.
In 1993, digital mobile service was introduced using PDC (personal digital cellular). By 1994, the cellular market explosion took off with customers able to buy instead of rent mobile phones. PHS (personal handyphone services) soon arrived and DoCoMo found itself competing with parent company, NTT (also offering PHS). By 1996, DoCoMo had 8 million subscribers and in the same year introduced satellite-based mobile phones to service customers in remote areas beyond cell site territories, such as on ships and in the mountains.
1997 proved to be a critical year for DoCoMo. With success in its back pocket, DoCoMo and its parent company NTT believed all was well. However, Japan’s Fair Trade Commission ordered NTT to cut its 95% ownership of DoCoMo in the wake of financial crises in the area. The following year marked NTT DoCoMo’s IPO as the largest in the world at more that $18 billion, effectively reducing NTT ownership to 67%.
In 1999, DoCoMo took over the poorly performing PHS service from NTT. Revamping the service to target specific audiences, DoCoMo successfully resurrected the PHS market. In April of 1999, DoCoMo launched i-mode, the packetized, continuously connected wireless data service that has become the flagship product for the company.
By early 2000, DoCoMo had 27.1 million of the 49 million mobile subscribers in Japan. In March 2000, an analyst counted an average of 40 million daily page views at NTT DoCoMo vs. 70 million daily page views for Yahoo! Japan. At one point, the company was so overwhelmed with demand that it had to temporarily shut down its services.
The company is also immensely profitable. In the fiscal year ended March 31 2001, the company posted a record profit of $3 billion on revenues of $45 billion. This represented a 26% increase in revenues and a 45% increase in profit from the previous year. NTT DoCoMo’s market capitilization hovers around $335 billion.
DoCoMo’s success could be attributed to a combination of factors, but savvy marketing and strong leadership were two of the driving factors.
Sunday, March 1, 2009
PROBLEMS CAUSED BY VIRUSES IN WINDOWS
http://www.4shared.com/file/89940173/12828651/Enable_Options_to_Change_Hidden_Files_and_Folders_Settings.html
1)JUST DOUBLE CLICK THE REGISTRY FILE.
2)IT will ask whether it should add this key to the registry or not.
3)click yes
4)You will now be able to see ur hidden files and folders.
ENJOy!!
Saturday, February 28, 2009
BYPASSING CMOS or BIOS PASSWORDS
AMI BIOS
A.M.I.
AAAMMMIII
AMI?SW
AMI_SW
AMI
BIOS
CONDO
HEWITT RAND
LKWPETER
MI
Oder
PASSWORD
AWARD BIOS
01322222
589589
589721
595595
598598
ALFAROME
ALLy
aLLy
aLLY
ALLY
aPAf
_award
award
AWARD_SW
AWARD?SW
AWARD SW
AWARD PW
AWKWARD
awkward
BIOSTAR
CONCAT
CONDO
Condo
d8on
djonet
HLT
J64
J256
J262
j332
j322
KDD
Lkwpeter
LKWPETER
PINT
pint
SER
SKY_FOX
SYXZ
syxz
shift + syxz
TTPTHA
ZAAADA
ZBAAACA
ZJAAADC
PHOENIX
BIOS
CMOS
phoenix
PHOENIX
ALFAROME
BIOSTAR
biostar
biosstar
CMOS
cmos
LKWPETER
lkwpeter
setup
SETUP
Syxz
Wodj
Sunday, February 22, 2009
WINDOWS HACKING
Thursday, February 19, 2009
INTERNET KI BULDING BY ANKIT FADIA [DO READ IT]
ORIGNALLY POSTED AT IBN LIVE BLOG BY ANKIT FADIA
Not too long ago, I was visiting Delhi. I was invited to speak at this conference which had a large number of officials from Delhi Police in the audience. Like always I started my talk by sharing examples of shocking cyber crimes that have taken place in different parts of the world. I followed that up with some LIVE hacking demonstrations. Fun stuff. Cool Stuff. Simple stuff. Then came the time for the Q&A session. And usually at these sarkari type conferences, nobody bothers to ask questions. Everybody is more interested in the food, collecting all printed material (testimony to the fact that they learnt a lot by attending this holiday...ummm...conference) and making sure the boss sees them scribbling down notes. Well, at least they pretend to write something down. Anyways, as soon as my presentation got over, one of the officials from Delhi Police at the back of the room immediately stood up to ask me a question. To be honest I was pleasantly surprised. But nothing could have prepared me for what came next. This official enthusiastically asked me: "All this is fine, but Mr. Ankit Yeh Internet Ki Building Kidhar Hain???" On hearing this rather unexpected question, a million things started going through my head. Did I hear this right? Did I mistakenly enter the wrong conference room in the hotel? Was he speaking some other language? Not knowing anything better to say I politely asked him to repeat the question: "Can you please speak into the microphone, I actually couldn't hear your question". Unaware of the gazillion questions & confusion in my head, he quickly repeated his question: "Yeh Internet Ki Building Kidhar Hain?" I was confused and at a loss for words. What followed was a collection of awkward pauses, clearing of throat and an answer that was nothing but a random string of stammers and stutters.
It's pathetic. So according to him the Internet is a huge building. And in order to protect it from cyber crime, the police have to stand all around the building with rifles and laathis in their hands fighting off the viruses, worms and criminals! And this same person is supposed to protect Indians and India from cyber criminals. Shocking. India is probably the IT capital of the world, however as far as computer security is concerned India is far lagging behind. If this is the pathetic state of affairs at the police department in the national capital of our country, then one can't even begin to imagine how things will be in other cities. What use are all the various cyber laws in India, if we don't even have an adequate number of trained police officials to implement these laws? How safe is the cyber life of an average Indian if the police itself are not properly trained to protect, safeguard and investigate if the need arises? No wonder India continues to remain so susceptible to cyber attacks. Mark my words all major acts of terror in India in the next few years will always have some sort of technology/internet element to them.
If anybody reading this blog still has any doubts regarding the preparedness (or the lack of) of the Indian Police Departments to tackle cyber crime, then I have a simple challenge for you. Try going to a local police station and try to report a cyber crime. I guarantee you that 90 times out of 100 the official taking down the complaint will have no clue what you are saying. Try it and tell us about your experiences!
(Ankit Fadia, 23 years old has written 16 bestselling books on computer hacking, delivered more than 1000 talks in 25 countries, received 45 awards, runs cyber security courses & provides consulting solutions to Fortune 500 companies and government agencies. He was recently voted one of the MTV Youth Icons 2008. For more information about him visit his website.)
Friday, February 13, 2009
BLUETOOTH HACKING
IS UR NOKIA MOBILE ORIGNAL???
Press the following on your mobile *#06# to see your Phone’s IMEI number(serial number).
Then check the 7th and 8th numbers
Phone serial no. x x x x x x ? ? x x x x x x xIF the Seventh & Eighth digits of your cell phone are 02 or 20 this means your cell phone was assembled in Emirates which is very Bad quality
IF the Seventh & Eighth digits of your cell phone are 08 or 80 this means your cell phone was manufactured in Germany which is fair quality
IF the Seventh & Eighth digits of your cell phone are 01 or 10 this means your cell phone was manufactured in Finland which is very Good
IF the Seventh & Eighth digits of your cell phone are 00 this means your cell phone was manufactured in original factory which is the best Mobile Quality
IF the Seventh & Eighth digits of your cell phone are 13 this means your cell phone was assembled in Azerbaijan which is very Bad quality and also dangerous for your health.
SOCIAL ENGINEERING ATTACKS(HACKING YAHOO?HOTMAIL)
COPYING PHOTOS ON ORKUT
Recently Orkut updated it’s security feature and disabled Right-click on photos of friend’s album.So this makes it difficult to copy photos from Orkut.It’s a new security update made by Orkut to prevent people from copying photos from Orkut and misusing it.This may be annoying most of you! Then…
How To Copy Locked Photos From Orkut?Yes it’s still possible to copy the photos from Orkut.Here’s a step-by-step procedure to copy the photo.
1. Login into your Orkut Account.
2. Goto your friend’s album and open the photo that you need to copy.
3. Once the photo is loaded to it’s full size just place the mouse cursor on the photo.
4. Press the left click button and drag and drop the photo onto the ADDRESS BAR.I think this trick is no longer working.So I have a new trick….
Just DRAG and DROP the PHOTO onto the current/new TAB (If you have IE 7). That’s it . This trick is working now!!4. Now the photo gets displayed seperately on your browser.
5. You can Right-Click and select the Save As option to save the photo onto your PC.
The browser also displays the direct link to the photo.This link can be used to share the Orkut photos with your friends without the need to login to your Orkut account to access photos.
ORKUT ACCOUNT HACKED????DON WRRY!!
PROTECTING UR ORKUT ACCOUNT
Never get your orkut account hacked in your life.
1. Never try to login/access your Orkut account from sites other than Orkut.com.
2. Never click on any links from the sources you don’t trust while accessing your Orkut account.(or while accessing any other Google services like Gmail,Blogger etc.)
3. Delete any links on your scrapbook, no matter if a known or unknown person have sent it.
4. Never disclose your orkut login details with anyone.
5. Never ever use Javascripts on Orkut, no matter whatever it claims to do.Get satisfied with the services provided by default! Avoid using third party Scripts which might be malicious.
6. Never get excited to see a site claiming to have 1000 cool orkut tricks for which you have to just log in to your orkut account. Don’t trust that site. That’s a phishing site.
7. Never tick the box “REMEMBER ME” on the orkut homepage if you are surfing from a cafe or a public area.
8. Always remember to hit Sign out button, when you are done.