Mobile tips,NOKIA secret codes,AIRTEL hack for free internet, HACKING,Sms upto 2048 characters,Mobile tips and tricks,Samsung codes,connect mobile to pc ,tips and tricks,and much more.. .

Google Search

Click here and get 1$

Your Ad Here

May 1, 2009

7 Tips for reworking your mobile phones after being dropped in water

People cannot imagine a day without their mobile phones nowadays with phones occupying a very significant place in our lives. Mobile phones are prone to damage due to their rampant usage as also many times we have observed that there is whole lot of mayhem when it is dropped in the water. Well here are the 7 useful tips for bringing your mobile phone back to normalcy after it has been dropped into the water.

mobile phones in water

1. The first step you need to take is the immediate shutting off your mobile once it is recovered, although in most cases you will not have to do that as they itself get off automatically. Patience pays off - do not dare to experiment anything new and test the phone whether it is working or not until the phone is absolutely dry which takes around 2-4 days generally.

2. Then you need to remove all its vital parts that include a battery, phone covers, faceplates, SIM card and others.

3. The next big step includes the removal of salt as soon as possible which will demand a bottle filled of distilled water. You actually need to re-submerge the phone to make sure that the metals in your phone are immune from the rust problem. I say it again as you do not dare to check whether the phone is in the working condition or not.

4. Then pleasingly soak all the parts of the phone with distilled water except for the SIM card and battery as also the LCD screens.

5. Take help of the direct sunlight as you need to keep the device to air dry for 2-3 days under direct sunlight. Do not in any case, attempt to experiment and use a hair dryer for providing immediate heat to fasten the process.

6. For those who are in a big hurry, use a electronics cleaner as also rubbing alcohol in place of distilled water.

7. Last but not the least, you will observe a miracle after 2-4 days of air drying the device as you need to plug it into the charger or battery and then test the device. Hopefully your patience will pay off!!!

February 6, 2009

Utorrent settings for bsnl dataone users

if u got any problems by the following steps we are not responsible for ur damage...this is written purely for bsnl dataone users to improve their torrent speed.

1. First download this file for windows xp servicepack2 or servicepack3 which ur using...( ur antivirus detect this as virus because it is windows half open tcp connection modification file. so u can ignore this)
2. for sp2 open ur appropriate file give yes in the dos prompt.
3. for sp3 users give the value between 500-600 as ur wish.
4. now open ur torrent client( here utorrent is considered and others search for the specified options)
5. go to options ---> preferences.
6.now select button in the sidebar then choose connection. change the port value to 443. and uncheck the Enable UPnp portmapping.



7.then go for bandwidth (sidebar option). and give the max upload rate to 10.
8. after that select BitTorrent. and then select outgoing as forced.
9. then go for Queueing and give ratio <= 100 10. Then click advanced( the last one). and select net.max_halfopen and give the value between 40-80 a
nd then click the set button.
That all!!!!! check ur speed

Installing unsigned application using Drakkarious 3.01 Orginal

i am going to explain how to install expired and unsigned your mobile application using Drakkarious aplication installer, this is one of the working method that was confirmed by many user in other mobile community.This is an All applications installer {unsigned and Expired Files} update 01/09/2008.

Drakkarious 3.01 FP1, FP2 & PreFP1 is developed for only hacking purpose

All you have to do with this simple install this application and follow the instruction given on your screen by which you can easily learn at first time and it help you to hack any mobile phone. this is one time hacking process.

With this method you can install the following mobile application which are Unsigned files, Signed files, BinPDA files, Non-Binpda Files, Dated application, Out-Dated application files etc etc etc...First this is you should try and see. Even you can install N-Gage cracked game on your mobile.For Hacking instrusctionThis method is word for the following handsets.

Pre-FP1 devices:-------------------Nokia N77,Nokia E61i,Nokia E65Nokia N93i,Nokia N91 8GB,Nokia E62,Nokia E50,Nokia 5500,Nokia N93,Nokia N73,Nokia N80,Nokia N71,Nokia N92,Nokia E70,Nokia E60,Nokia E61,Nokia 3250

FP1 devices:-------------------Nokia 6124 classic,Nokia N82,Nokia N95-3 NAM,Nokia E51,Nokia N95 8GB,Nokia N81,Nokia N81 8GB,Nokia 6121 classic,Nokia 6120 classic,Nokia 5700 XpressMusic,Nokia 6110 Navigator,Nokia E90 Communicator,Nokia N76,Nokia 6290,Nokia N95

FP2 devices-------------------Nokia 5320 XpressMusic,Nokia N78,Nokia N96,Nokia 6210 Navigator,Nokia 6220

classicSpecific devices-------------------Nokia 3250 v4.14,Nokia 3250 v4.60,Nokia 5500,Nokia E50,Nokia E51,Nokia E61

Hay its time to hack you Hand set.
At First Change phone date to : 15-05-2007* This is the important procedure you should follow for Drakkarious Hack Compilation.install the following application on your mobile.
dont worry they wont harm your mobile
CapsOnCapsOffHelloCarbideX-plore

Download This package form Rapidshare / megauploader

After installing all these 4 application please follow this procedure:
1.-Run X-plore and press "0". Now tick the 4 check boxes (if ticked already please leave it as it is )
2.-Now Without closing X-plore switch to the Phone menu and run hellocarbide
3.-Inside hellocarbide press options and chose Menu1 and answer "yes".
4.-Go back to X-plore and extract installserver.exe and CProfDriver_SISX.ldd from your c:\hack.rar into c:\sys\bin
5.-Restart your phone.Run capsOff if you wish to see private folders using X-plore and capsOn to hide them again

Note: I advice you to always hide private folders
Note: After completing you must restart your phone to be able to install any app, and remember to always put your phones date back to the present again, always choose the correct version for your phone, and if you dont youll need to manually remove installserver.exe from c:\sys\bin\ using x-plore and hellocarbide...If you make this mistake please repeat the process using the correct version: fp1 & fp2 or prefp1

Note : I am not responsible for any harm to your mobile .try it at your own risk.

January 26, 2009

4 Things You Never Knew Your Mobile Phone Could Do

There are a few things that can be done in times of grave emergencies. Your mobile phone can actually be a life saver or an emergency tool for survival. Check out the things that you can do with it:


1. Emergency

The Emergency Number worldwide for Mobile is 112. If you find yourself out of the coverage area of your mobile; network and there is an emergency, dial 112 and the mobile will search any existing network to establish the emergency number for you, and interestingly this number 112 can be dialed even if the keypad is locked. Try it out.

999 for UK.
100 for India
911 for US. Actually 911 can be dialed on all phones


Also in Australia , the Australian emergency number 000 can be dialled whilst your mobile phone keyboard is locked. This is another reason why 000 receives so many false emergency calls!

2. Have you locked your keys in the car?

Does your car have remote keyless entry? This may come in handy someday. Good reason to own a cell phone: If you lock your keys in the car and the spare keys are at home, call someone at home on their mobile phone from your cell phone.

Hold your cell phone about a foot from your car door and have the person at your home press the unlock button, holding it near the mobile phone on their end. Your car will unlock. Saves someone from having to drive your keys to you. Distance is no object. You could be hundreds of miles away, and if you can reach someone who has the other "remote" for your car, you can unlock the doors (or the trunk).

Editors Note: It works fine! We tried it out and it unlocked our car over a mobile phone!"

3. Hidden Battery Power

Imagine your mobile battery is very low. To activate, press the keys *3370# Your mobile will restart with this reserve and the instrument will show a 50% increase in battery. This reserve will get charged when you charge your mobile next time.

4. How to disable a STOLEN mobile phone?

To check your Mobile phone's serial number, key in the following digits on your phone!:

star-hash-zero-six-hash

* # 0 6 #

A 15 digit code will appear on the screen. This number is unique to your handset. Write it down and keep it somewhere safe. When your phone get stolen, you can phone your service provider and give them this code. They will then be able to block your handset so even if the thief changes the SIM card, your phone will be totally useless. You probably won't get your phone back, but at least you know that whoever stole it can't use/sell it either. If everybody does this, there would be no point in people stealing mobile phones.

Not only the above, but also in Australia your stolen phone is added to a "Stolen Mobile Phone" database, so if your phone is found later on it can be returned to you

January 1, 2009

Tips For Safer Computing Online

New computer viruses threaten the unwary user everyday. Hackers

jeopardize your online security with invasive computer techniques to
steal your passwords, personal information, even identity.

Unscrupulous marketers bait you with free software that unleashes
spyware, trojans, or worms, on your system.

While other marketers bombard you with popups at every turn. And
others send unsolicited spy emails asking you to click links to unsafe websites that install threating software on your computer, or try to download your private information.

These are only a few of the security issues involved while online.

Read through the following list to arm your computer and protect yourself against these vicious and often malicious online attacks.


1. Install a good anti-virus software.
Here's a good free anti-virus software...
Fr** AVG Anti-Virus......
New - AVG Fr** Edition is now available for all single home users
worldwide! More detailed information can be found in the AVG Free
Edition License Agreement.
Click Here To Download:
http://www.grisoft.com/us/us_dwnl_free.php


2. Install a personal firewall.
This personal firewall is one of the best online....
http://www.zonealarm.com

3. Install a good pop up blocker.
Google has a free pop up blocker so does Yahoo. The only drawback
is you will have to download and install their toolbar.

4. Know Privacy Policy.
Read the websites privacy policy before releasing personal information.
Note do they share or sell your information with third parties. If they do you might reconsider releasing your personal information.

5. Passwords.
Never use easy to guess passwords like your favorite color, your social security number, your birthdate, words less than six characters. Mix up passwords with combinations of numbers and symbols.

6.Virus Warnings.
Don't forward virus warnings you receive in emails. It's not your
job to warn others. And you might be circulating a fake warning
designed to scare receivers into downloading trojans or removing
important files on their computer.

7. Keep It Secret.
Don't give your password to anyone. Be wary of emails asking you to give out your personal passwords for accounts online. Or emails asking you to click a link and enter your password on the site. This site might be a fake sent by hackers "phishing" for victims.

8. Primary Email Address.
Don't divulge your primary email address on unfamiliar sites. You
might be bombarded with unsolicited emails by marketers who
sell your address to third parties online.

9. Free Accounts
Set up several free email accounts with a psuedo name to handle
spam, when you register with unfamiliar sites, or to use on chat and message boards.

10. Chat Line And Message Board Warnings.
Don't release personal information on chat lines or
message boards. This is one way many identity thefts occur.

Steps to Reduce Counter Strike Latency or Ping

One of the most popular online games Counter Strike or CS also has some problems related to it. Almost one out of two people playing this game is troubled by the problem of facing a high ping or uneven latency. The high latency makes thegame laso badly that it becomes very difficult to play.

In spite of having good configuration of the PC and a high speed internet connection the gamers come across this strange problem. This is a major problem of CS players around the world and of one of our readers. The reasons for this problem can differ person to person and there is no fix solution to the problem but I have listed here various solutions that may solve your problem.

Steps to try:

1.    Since there is no definite solution to the problem, the first and the foremost thing you should do is to change your ISP. Yes, it happens that if you are getting high latency/ping in the game, changing the Internet Service Provider will solve your problem.

2.    Though it would be difficult to know, but having the same ISP as of the server will greatly reduce the ping while playing the game.

3.    Do delete all the temporary stuffs of the system like caches, temporary files to free up the system’s resources. To perform the disk cleanup, right click on the drive and click on Properties, then click on Disk Cleanup button below.

4.    If you are facing uneven (quite high latency one moment and quite low the other) then it is sure a virus/spyware infection. Run a good updated Anti Virus scan to clean the system.

5.    Strange but true, Hardware used for playing also plays an important role in reducing the ping.

6.    It would be better if you run least number of programs in the background so that the game can utilize all the bandwidth of the internet solely.

7.    CFGs used in the game are also important while reducing the ping. Usually servers have their own CFGs but it is an important factor.

8.    Then there are various server and client rates like cl_cmdrate andcl_updaterate. Generally the lower values of these rates are preferred but these are different for different systems. Default values are cl_cmdrate 101 and cl_updaterate 101.

So how many of you found the above info helpful?

December 11, 2008

Bluejacking Intro

Bluejacking is not mobile hacking or hijacking its totaly different. Bluejacking is a harmless prank played on people who have switched Bluetooth on their phones.

Blue       : is taken from Bluetooth, the technology bluejacking uses. 
jacking is derived from both "ajack" and "hijacking" 

Even thought bluejacking does not resemble hijacking There is no accessing or taking private data from your victim's device.

Bluejacking is totally limited to Bluetooth enabled devices.Bluetooth has a very limited range, usually around 10 metres on mobile phones, but laptops and other instrument with high power transmitters can reach up to 100 meters.

Bluejacking Explanation

Bluejacking is define as sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs, Laptops, sending a contact which typically contains a message in the name field to another bluetooth enabled device via the OBEX protocol.

Few prople say the term “Bluejacking” originated with a user named ajack on esato.com. Some people say that the term bluejacking comes from Bluetooth and hijacking. While that certainly sounds logical, a bluejacker doesn't hijack anything, he just send a contact to the recipient's device. Both parties have absolute control over their devices, and a bluejacker will not be able to take control of your phone or steal your personal information.

You can create a phonebook contact and write a message, eg. 'Hello, you've been bluejacked', in the 'Name' field. Then you can search for other phones with Bluetooth and send that phonebook contact to them. On their phone, a message will popup saying "'Hello, you've been bluejacked' has just been received by Bluetooth" or something along those lines. For most 'victims' they will have no idea as to how the message appeared on their phone. So, personalised messages like 'I like your pink top' and the startled expressions that result is where the fun really starts.

Bluejacking is quite harmless, but because bluejacked people don't know what is happening, they think their phone is malfunctioning. Usually, a bluejacker will only send a text message, but with modern phones it's possible to send images or sounds as well.

But with the increase in the availability of bluetooth enabled devices, these devices have become vulnarable to virus attacks and even complete take over of devices through a trojan horse program.

Bluejacking Process

  • Go to Contacts.
  • Create a new contact.
  • Write the short message you want to send on the line next to 'Last name'
  • Save this contact.
  • Select this contact and send via Bluetooth.
  • Your phone will search for devices
  • All the Bluetooth devices near you will be displayed.
  • Select any one you like and send.
  • You have bluejacked someone.

You can also send pictures to your victim by adding them to your bluejack contact. The best thing about this is even if the victim rejects the contact that you sent him/her, the picture gets automatically saved in the victim's My Pictures section.