Saturday, October 10, 2009
A True Foreign Beauty: The Winning 2014 Asian Games Stadium Design
We can argue about whether it looks like an alien spaceship, a colony on a distant planet, or something else, but let's agree that the winning stadium design for the 2014 Asian Games is mind-blowingly gorgeous. More »
F-Secure Internet Security 2010 Review
F-Secure has released a new internet Security 2010 software featuring redesigned interface coupled with very easy to use parental control features that you can setup during your initial installation while F-Secure is downloading updates in the background, this new build is easy on system resources and F-Secure claims to have 60% faster virus scans than the previous version.
Our installation of the F-Secure Internet Security 2010 on a test PC having C2D E6320 and 2.5 GB RAM was finished in around 1 minute, after a restart and verification of the key, it showed the programs requesting Internet access like Steam client and others installed in our system, after clicking allow couple of times we were good to go , downloading updates and further installation took another 15 minutes on our 1 Mbps connection.
The parental control settings in the F-Secure 2010 Internet security are one of the easiest out there, so lets have a look at the parental controls
Browsing modes
You can also set time limit on the daily and weekend Internet browsing.
Better Content blocking based on cloud computing technology
System Scanning- Virus, Spyware removal
The overall speed of the scanning was good, our almost full 160 HDD including lots of software, games, applications, was scanned in 1 hours and 4 minutes, however there isn’t a pause scan option while scanning the hard drive so if you stop the scan, you would have to run it again from scratch. Pause scan option is particularly good when you just want to Hibernate your PC after pausing the scan and then turn it on later to resume scan from where it left, very helpful these days as HDD capacities have grown manifolds and scanning takes time. It detected all the viruses we have in our virus-pendrive with ease and the Anti-Spyware was pretty hard on the advertising agencies, and detected their tracking cookies as Spyware.
Full System Scan in Action - no pause button
Other thoughts: After installation of F-Secure our Local Area Network stopped working, we weren’t able to access files of our test PC from other PCs on LAN, Even after configuring again with the Windows “Set up a home or small office network” it didn’t work, nor does it showed any warnings or asked for permission. I have to set this up manually by going to Settings -> Firewall -> Firewall Settings -> Trusted Network Adapter -> Select your Network Interface Card.
It was not able to detect our LAN IC on our Intel DG965RY motherboard, after selecting the network IC, local network access was restored. This might be a problem specific to our system.
Pros and Cons of F-Secure Internet Security 2010
Pros :
- Very Easy on System Resources
- Great Design and User Interface
- Provides superb protection, it was able to detect and clean 4 viruses on our test system, which up to date free Avira couldn’t.
- Easy to Set-Up
- Good and easy to use Parental Control Settings
- Browsing Protection
- Statistics: provides quick overview of security history
- Anti-Virus, Anti-Spyware and Anti-Spam protection in one package
- Compatible with Windows 7, Windows Vista and Window XP
Cons:
- While performing full system scan, System got noticeably slow and CPU usage went to as high as 75%, 10% being average
- No Pause Scan button
- Didn’t Detect LAN card automatically (this could be specific to our system)
Intel's Light Peak Technology - Optical Cabling For the Masses
Fiber optics typically use a cigarette-box-sized optical transceiver, which contains tiny lasers and photo cells, to facilitate the connections. Intel miniaturized the box down to the dimensions of a wafer thin dime. Optical cables are already pretty tiny; each one is just 125 microns wide or about the width of a single human hair. The transceiver can deliver two channels of information over the fiber-optic cable—necessary since PCs need at least two ports.
Intel states that the technology will eventually scale up to a blazing 100 Gb/s.
Inside each transceiver are two tiny lasers only 250 microns wide, or the width of two human hairs, that transmit the light over each channel. The industry name for the lasers is VCSELs which stands for Vertical Cavity Surface Emitting Laser. Accompanying the lasers is a matching pair of photo detectors that receive laser light from the other end of the channels. Another advantage of the optical cabling is that, unlike electrical cable, multiple protocols can be run over a single cable. Photons don't interfere with each other the way electrons do so multiple devices can share a single cable even if those devices are using different protocols. This will allow manufacturers to make even smaller yet more efficient components when building computer and electronic devices since they can use a single Light Peak component for connected devices. Light Peak's optical cabling will also allow for much longer cables since light does not degrade the same way electricity does over long distances. Intel representatives explained that Light Peak could provide a better cabling solution to companies like 3ality. It makes a 3D video camera that transmits data at 8 Gb/s per second and currently uses bulky electrical cables. Light Peak stands ready to replace the existing data transfer technologies of USB and FireWire and there is even speculation that Apple may skip over USB 3.0 and go straight to Light Peak. There are reports on the web that Light Peak is an outgrowth of Apple's desire to replace the multiple ports on their systems for a single port that could service all connected devices and that Apple's Steve Jobs might haves reached out to Intel's Paul Otellini for a fiber-optic solution. Light Peak-based products could arrive as early as 2010.
Illustrated walk-through: Creating a bootable USB flash drive for Windows XP
--------------------------------------------------------------------------------------------------
The ability to boot Windows XP from a USB Flash Drive (UFD) offers endless possibilities. For example, you might make an easy-to-use troubleshooting tool for booting and analyzing seemingly dead PCs. Or you could transport your favorite applications back and forth from home to work without having to install them on both PCs.
However, before you can create a bootable UFD, you must clear a few hurdles. You saw that one coming didn't you?
The first hurdle is having a PC in which the BIOS will allow you to configure the USB port to act as a bootable device. The second hurdle is having a UFD that that will work as a bootable device and that's large enough and fast enough to boot an operating system such as Windows XP. The third hurdle is finding a way to condense and install Windows XP on a UFD.
If you have a PC that was manufactured in the last several years, chances are that its BIOS will allow you to configure the USB port to act as a bootable device. If you have a good quality UFD that's at least 512 KB and that was manufactured in the last couple of years, you've probably cleared the second hurdle. And once you've cleared those first two hurdles, the third one is a piece of cake. All you have to do is download and run some free software to create the bootable UFD.
I'll start by showing you how to determine whether your PC's BIOS will support booting from USB and explain how to configure it to do so. Then, I'll show you how to download and use the free software to create a bootable UFD running Windows XP Professional.
The UFD hurdle
You probably noticed that I didn't mention how to determine if your UFD would support being configured as a bootable device, except that it must be a good quality unit of recent manufacture. Well, I've discovered that when it comes to the actual UFD, you'll just have to try it and see what happens. As long as you have a PC with a BIOS that will allow you to configure the USB port to act as a bootable device and you have configured the installation correctly, it should work. If it doesn't, you probably have a UFD that can't boot.
I tested three UFDs on two new computers and had mixed success. First, I attempted to use a 128 MB PNY Attache but received an error message that said "Invalid or damaged Bootable partition" on both PCs. Next, I tried a 1GB Gateway UFD and it worked on both PCs. Then, I tried a 256 MB Lexar JumpDrive Pro and it worked on only one of the PCs. You can find lists of UFD brands that others have had success with on the Internet.
Checking the BIOS
Not every new BIOS will allow you to configure the USB port to act as a bootable device. And some that do allow it don't make it easy. On one of my example systems, it was a no-brainer. On the other, the UFD had to be connected to the USB port before it was apparent that I could configure it as a bootable device. Let's take a closer look.
On the test system with a PhoenixBIOS version 62.04, I accessed the BIOS, went to the boot screen, and found that USB Storage Stick was one of the options. I then moved it to the top of the list, as shown in Figure A, thus making it the first device to check during the boot sequence. (This particular BIOS also allowed me to press the [F10] key during the boot sequence and select any one of the available bootable devices, so it really wasn't necessary to move it to the top.)
Figure A
The settings on the Boot Screen of the PhoenixBIOS made it a no-brainer to select the device.
On the test system with an AMI BIOS version 2.59, I accessed the BIOS, went to the Boot Sequence screen, and didn't find a USB boot option, as shown in Figure B.
Figure B
A USB boot option didn't appear on the Boot Sequence screen.
I then went one step further and checked the Hard Disk Drives screen and still didn't find a USB boot option, as shown in Figure C.
Figure C
The Hard Disk Drives screen only showed the SATA hard disk.
I then plugged a UFD into the USB port, booted up the system, and accessed the BIOS. When I checked the Hard Disk Drives screen, the UFD appeared in the list and I could select it as the first drive (Figure D).
Figure D
With the UFD plugged into the USB port, I could configure the UFD as a bootable device.
When I returned to the Boot Sequence screen, the UFD was indeed set as the first bootable device (Figure E).
Figure E
As the Boot Sequence screen indicates, the UFD was set to be the first bootable device.
Rounding up the software
To condense and install Windows XP on a UFD, you'll need a program called PE Builder by Bart Lagerweij. You'll also need two files from the Windows Server 2003 Service Pack 1. And of course, you need to have a Windows XP Professional CD.
You can download PE Builder from Bart's Web site. At the time of this writing, the most current version of PE Builder was 3.1.10a.
You can download Windows Server 2003 SP1 by following the link in the Knowledge Base article "How to obtain the latest service pack for Windows Server 2003." Be sure to get the 32-bit version!
Keep in mind that at 329 MB, Windows Server 2003 SP1 will take some time to download. And although you need just two small files, the only way to get them is to download the entire package.
------------------------------------------------------------------------------------------------Warning
Do not run the Windows Server 2003 SP1 executable file! Doing so will completely corrupt Windows XP. We will use a set of special commands to extract the two files and then delete the rest of the package.
------------------------------------------------------------------------------------------------
Preparing the software
Installing PE Builder is quick and easy. Just run the installation program and follow the onscreen instructions. To make things simpler, I installed the program in the root directory in a folder called PEBUILDER3110a.
Once PE Builder is installed, you'll need to create a folder in C:\PEBUILDER3110a called SRSP1, as shown in Figure F. This is the folder in which PE Builder will look for the extracted Windows Server 2003 SP1 files.
Figure F
Once PE Builder is installed, you'll need to create folder called SRSP1 in C:\PEBUILDER3110a.Now, you can begin extracting the two needed files from Windows Server 2003 SP1. When you download the Windows Server 2003 SP1, the executable file will have a long name: WindowsServer2003-KB889101-SP1-ENU.exe. To save on typing, you can rename the file to something shorter, such as WS-SP1.exe.
To begin, open a Command Prompt window and use the CD command to change to the folder in which you downloaded the Windows Server 2003 SP1 executable file. I downloaded the file to a folder called Downloads. Now, to extract the files contained in SP1, type the command
WS-SP1.exe -x
You'll immediately see a dialog box that prompts you to select a folder in which to extract the files and can type the name of the same folder, as shown in Figure G. Click OK to proceed with the extraction procedure. When the procedure is complete, just leave the Command Prompt window open.
Figure G
You can extract the files into the same folder containing the Windows Server 2003 SP1 executable fileThe extraction procedure will create a subdirectory called i386 and extract all the Windows Server 2003 SP1 files there. Use the CD command to change to the i386 folder and then copy the setupldr.bin file to the SRSP1 folder with the command:
copy setupldr.bin c:\pebuilder3110a\srsp1
Expand the ramdisk.sy_ file to the SRSP1 folder with the command:
expand -r ramdisk.sy_ c:\pebuilder3110a\srsp1
These three steps are illustrated in Figure H.
Figure H
You'll copy and expand the two necessary files to the SRSP1 folder.
Now, using Windows Explorer, verify that the two necessary files are in the SRSP1 folder, as shown in Figure I. Once you do so, you can delete all the Windows Server 2003 SP1 files.
Figure I
You'll want to verify that the setupldr.bin and ramdisk.sys files are in the SRSP1 folder.
Running PE Builder
Now that you've extracted the necessary files from the Windows Server 2003 SP1 package, you're ready to use PE Builder to create a compressed version of Windows XP. To begin, place your Windows XP Professional CD into the drive and hold down the [Shift] key to prevent Autostart from launching the CD. Then, launch PE Builder.
In the Source field on the main PE Builder screen, simply type the letter of drive in which you put the Windows XP Professional CD, as shown in Figure J. Make sure that the Output box contains BartPE and that the None option is selected in the Media Output panel. Then, click the Build button.
Figure J
Fill in the Source field on the main PE Builder screen.
As PE Builder compresses Windows XP Professional into a bootable image, you'll see a detailed progress dialog box. When the operation is complete, as shown in Figure K, click the Close button.
Figure K
PE Builder displays a detailed progress report.
Preparing the UFD to boot Windows XP
At this point, you're ready to format and copy the Windows XP Professional bootable image to the UFD with the BartPE USB Installer. To do so, open a Command Prompt window and use the CD command to change to the pebuilder3110a folder. Then, insert your UFD into a USB port and take note of the drive letter that it is assigned. On my example system, the UFD was assigned drive E.
Now, type the command
pe2usb -f e:
You'll then be prompted to confirm this part of the operation, as shown in Figure L. While the operation is underway, you'll see progress indicators.
Figure L
You'll be prompted to confirm that you want to format your UFD.
Once the BartPE USB Installer finishes its job, you'll be prompted press any key to exit the program. Now you can use your UFD to boot your computer into the BartPE interface for Windows XP, as shown in Figure M.
Figure M
The BartPE interface provides you with a pared down version of Windows XP.
You can find a list of specialized applications on Bart's Web site, which you can install on your UFD as Plugins. For example, you can find such things as Firefox or McAfee command-line virus scanner.
Conclusion
Booting Windows XP from a UFD requires that your PC's BIOS support booting from USB and that you have a UFD that can be formatted as a bootable device. If you can meet these two requirements, all you need is PE Builder, a couple of files from the Windows Server 2003 Service Pack 1, and a little effort to configure a UFD to boot the BartPE interface to Windows XP.
Friday, October 9, 2009
Firefox 3.5 now available
While Firefox 3.5 is unlikely to beat its predecessor's world record of 8 million downloads in one day, this one is still a significant step forward, especially with its support for many of the HTML5 features we're all waiting for. What was meant to be a rather small 3.1 update has now become a major version in its own right.
Since the release of Google Chrome, the browser world had become rather more complicated, with some praising its simplicity while others criticizing its lack of features and lack of extendability. Most browsers have had to adapt to the Chrome's new innovative tab managements system, a feature has since been adopted in Opera and Safari too, and as of Firefox 3.5, you can now tear away tabs, and recombine them into the same window.
Another feature of Firefox which comes as a result of peer pressure is a private Browsing mode. By clicking on "Start Private Browsing" (shortcut Ctrl+Shift+P) you can now enter a land of no worries. No traces of your actions during a Private Browsing session are maintained across sessions. Even besides that the privacy features have been ramped up, and now you can choose to discard only the "offending" part of your history, for the last hour, two hours, four hours, or day.
Firefox 3.5 packs an updated Gecko 1.9.1 layout engine and the new TraceMonkey javascript just-in-time (JIT) compiler for blazing fast JavaScript execution, which means faster running web-apps, although it still doesn't manage to overtake Safari 4 or Chrome 3.
Other improvements in speed can come from Web-Workers which will allow web-developers to create multi-threaded web applications resulting in more responsive interfaces even while complicated JavaScript application churn away in the background, and native support for JSON. All resulting in a much happier Ajax experience.
Location sensitive browsing support is now also a part of Firefox. Web sites can now access data about your physical location to provide targeted content, and can share you location with others (with your permission, of-course!). With the new era of multi-touch computing Firefox is now also multi-touch aware, with support for pinching and swiping gestures for zooming, and moving in the history respectively.
This rather impressive list of features, which was more than what was initially planned was enough for it to be upgraded from a simple single point release (and till beta 3 it was Firefox 3.1) to rather more significant 3.5 release. This isn't the end of line for the Firefox 3 series though, coming up next is Firefox 3.6 (earlier 3.2) which besides other things will bring you a new graphical tab-switcher. Look out Safari, Opera and Chrome, your competition has arrived!
Download Firefox 3.5 here.
NASA crashes rocket on the moon in search of water!
Touch Screens for the visually impaired
With all the success that touchscreens have, they are still essentially useless unless you are looking at the device while using it. Despite its multi-touch goodiness, you'll still need to take you iPod Touch out if you want to change the song. This is also a distinct disadvantage to the visually impaired, since they are not able to feel the 'features' on the screen.
Jussi Rantala of the University of Tampere in Finland along with colleagues have come up with a way to simulate a braille on the screen of a device, using vibrations. They simulated a braille character by representing a raised dot as an intense vibration, and the absence of a dot as longer but weaker pulsed vibrations. Braille encodes characters as a 2x3 grid of dots, where characters are represented based on which dots are raised. People trained to read braille can read the patterns using their finger and hence can read texts even without sight. This innovation promises to bring this marvelous.
To enable this they developed software for the Nokia 770 Internet Tablet, which has piezoelectric1 material built into the touchscreen. They tested two modes of operation for this virtual braille, one in which the reader places his finger on the left side of the screen and sweeps horizontally to read the rest of the dots, and the other in which the reader keeps the finger fixed on one location, and the dots vibrate in and out sequentially in that spot. The first one seemed to be quite difficult to read however. Much like many screen reading software read out the text displayed on the screen, they hope to present the screen content in braille form.
This is a wonderful innovation for touchscreens, as they can finally become more accessible to the visually impaired. This technology can have pretty interesting applications otherwise too. Using vibrations they can also indicate the presence of buttons and controls on the screen, allowing people to control their devices without looking at them.
Western Digital 1 Terabyte Caviar Black Edition HDD
It don’t matter if you’re black or white?
With newer Hi-Def video and audio formats becoming popular, games getting larger, and collections growing, you need more space, period. Western Digital plans to satiate your hunger for space with their new 1 Terabyte Caviar Black edition HDD.
This HDD is almost the same size of a 500GB HDD, despite the increased amount of memory platters. They managed to keep the height low by using perpendicular recording.
The WD caviar comprises of dual processors for twice the data processing speed as normal drives, coupled with a massive 32 MB of buffer memory that ensures that you get the maximum performance. Along with Acoustic management this drive also features Power management that allows it to power itself down when the drive is not in use or reduce its speed to a lower RPM when lower levels of performance are required.
We tested the WD Caviar Black edition HDD for its performance in real world scenarios using HD tach and SiSoft Sandra, and it did well, but not that much better. It gave us a random access time of 12.3 ms, while the average read and write speeds came to 81.1 and 92 MBps respectively, with CPU utilization at a maximum of 4 per cent. SiSoft Sandra gave it a Drive Index of 80 MBps, and listed the access time as 12 ms.
[Review] Need For Speed: Shift
Need For Speed: Shift isn’t the wild ride that we have come to expect from the franchise. It’s an emperor trying out new clothes, while still trying to make the followers accept the change in garments.
Office 2010 to come in Ad-supported version
No doubt Microsoft Office is popular, and a large number of its users, especially in India, use unlicensed versions. Few here can afford even the cheapest Home and Student Edition which comes for around Rs. 300 after spending 5,000 to 10,000 on a Windows license (if they even bought that).
According to Mcrosoft's statistics, 500 million people around the world use Office, and that the last two years have seen s boost in sales of their entry-level product, the Home and Student edition of Office.
Now they plan to introduce another edition of Office, the Starter Edition. Much like the starter editions of Windows, they plan to have this product available only on new PCs. This version will be ad-supported, and will only include Word 2010 and Excel 2010, and offer "basic functionality for creating, viewing and editing documents."
Till now new laptop or PC buyers often found themselves with either a trial version of Microsoft Office, or a Microsoft Works, which is another office suite by Microsoft which has a rather poor workflow with the Microsoft Office suite. The new Starter edition of Office will replace Microsoft Works and eliminate the need for a trial by straight away giving people a version of Office which doesn't expire.
This is a smart way of raking in money from those who are uninterested or uninclined to purchase a full copy of the Office suite, and to get some money from an audience which would otherwise have just installed a pirated version.
Another new optimization in Microsofts approach towards Office is the introduction of a new "Product Key Card". It is essentially just the serial key you need to activate the version of Office bundled with your PC, and does away with everything else which is inessential, such as the DVD itself!
These new models are mostly to the benefit of those buying a new PC bundled with Office. For the people who already have PCs, Microsoft will offer a new Click-to-Run Office 2010 version, which will allow people to install and run a trial of Office 2010 with ease, and in fact it even uses virtualization technology which allows you to try Office 2010 even with an older version installed.
It is nice to see Microsoft realizing that piracy will not stop no matter how much protection you add, as people will find a way around it. The answer lies instead social engineering, providing people with something they need or want is such a way as to still make a profit, but Microsoft still needs to cater to those not buying new PCs, and provide a downloadable version, we're sure it'll end up on the web anyway.
Nokia launches two new camera-centric phones
Mobile Secret Codes
____________
Firmware version
*#0000# or *#3110#
IMEI Code
*# 06 #
Restores Factory Settings
*#7780#
Warranty Codes
*#92702689# (= *#war0anty#)
Just scroll down through the information. If entering the above code requires a
further warranty code try entering the following:
6232 (OK) : Month and year of manufacture
7332 (OK) : Last repair date
7832 (OK) : Purchase date (if previously set)
9268 (OK) : Serial number
37832 (OK) : Set purchase date (this can only be done once)
87267 (OK) : Confirm transfer
Nokia 5110
_____________
IMEI Number *#06#
For checking the IMEI (International Mobile Equipment Identity).
---------------------------------------------------------
Security Code 12345
Default security code is 12345. If you forgot your security code, there s so many program on the net which allowed you to know the security code likes Security ID Generator, Nokia IMEI Changer, etc.
update:
Security ID Generator (SID.EXE) and IMEI Generator (NOKIAIMEI.EXE) doesn t works with Nokia 5110
Resetting Security Code
If you accidentally lock the phone or forgot the security code, the best thing to do is check it with your local Nokia dealer. For advanced user, you can use WinTesla, PCLocals or LogoManager program to read the security code or resetting the code (You will need an FBUS/MBUS (or compatible) cable to do this.
---------------------------------------------------------
Software Version *#0000#
For checking the phones software (SW) - called firmware revision information.
e.q : Version V. 4.51 (26-03-98) will display
V 04.51
26-03-98
NSE-1
first line:
The Software Version (my guess is that this software has been used in previously Nokia-phones, what do you say?!).
second line:
The Date of the SW release.
third line:
NHE-8 has something to do with the type of phone you are dealing with. Is it GSM 900 (standard), GSM 1800 (DCS1800) or GSM 1900 (PCS1900)?
Nokia 2110, 3110, 8110(i) are all NHE types. The only thing that vary is the code after NHE- ("8").
NHE = GSM 900, NHK =GSM 1800 - The number in the end = the model (2110i = 4 etc.)
The 5110 and 6110 is called NSE-1 and NSE-3...this may be because it supports EFR (?)
update:
Newest Software Version was V5.22 (xx-xx-99)
V 05.22
01-07-99
NSE-1
If your software version is V4.00, upgrade your software version to latest version. V4.00 contains bugs that sometimes will show message,
"SIM Card Not Ready" even the card is already inside the phone.
---------------------------------------------------------
Software Update
The only thing to do (for you and me) is for us to go to the nearest Nokia dealer and make him do it for you. Just remember that it is supposed to be free (a receipt is required) so don t let him tell you anything else!
---------------------------------------------------------
SIM clock *#746025625# [*#sim0clock#]
to check if the Sim-Clock can be Stopped. This option is depen on your service provider network. (Sim-clock-stop is a kind of standby mode which will save battery time)
update:
This code doesn t work on phone with software version 4.59.
---------------------------------------------------------
Waranty Code *#92702689# [*#war0anty#]
Menu:
Displays Serial Number.
Displays the Month and Year of Manufacture (0698)
Displays (if there) the date where the phone was purchased (MMYY) you can here set the Purchasing Date
(Warning: You can only do this once - so be careful what you write)
Displays the date of the last repairment - if found (0000)
The next screen has Transfer User Data? (the same option as the 8110)
To exit turn the phone off and then back on.
---------------------------------------------------------
SP Lock The Service provider (SP) lock
Is used to lock the cell phone to the SP s SIM card. Once the cell phone is locked to a specific operator, if one inserts a SIM card from a different operator the phone will refuse to accept it!
The cell phone will however accept another SIM card from the same operator.
All Nokia phones (2110 and newer) have four different SIM locks which can be used to lock the phone for up to 4 different providers. But most phones with restriction only have one lock activated. ( lock 1)
The main code used in Nokia phones is:
#pw+(master code)+Y#
This code is able to check, activate or remove Sim card restriction (SP-lock).
Use the * key to get the p, + and w chars.
Y has to be 1,2,3 or 4 - depending of what lock you what to deal with.
#pw+1234567890+1# for Provider-Lock status
#pw+1234567890+2# for Network-Lock status
#pw+1234567890+3# for Provider(???)-Lock status
#pw+1234567890+4# for SimCard-Lock status
(master code) is a 10 digit code, based on the phones IMEI number.
(I can NOT give you the master code SO DON T ASK ME FOR IT! )
Please click here to learn more about how to obtain mastercode and find out the lock status of your phone
eq. To remove restriction on lock 1 type following code:
#pw+(master code)+1#
If you just want to check your phone use 10 random numbers Eg. 1234567890 as the (master code)
eq. To check if phone if restricted on lock 1 type the following code:
#pw+1234567890+1#
Please NOTE that these codes could be used with care!
A user told me that it s only possible to type in about 3 different codes on each lock! Then something bad will happen ..therefore be careful!
---------------------------------------------------------
How can I check what locks have my phone closed?
There is 2 methods:
Use winlock to see the state of the locks, pressing Read Info.The Counter is the number of times that you have tried unlock your phone using an incorrect master code.
You can check it entering an imaginary mastercode on your phone but, it s not recommended because if you try enter a code 5 times your phone will not work anymore. By example, if you press at your phone #pw+1234567890+2# (note that # , p , w and + characters must be selected from * key) and your phone give you Code Error then your phone have lock 2 closed, if you get the message SIM Restriction Off your phone have lock 2 opened.
Look the table above to see how can check all locks:
Lock number Description Sequence to Check
1 Provider Lock #pw+1234567890+1#
2 Network-Lock #pw+1234567890+2#
3 Another Provider Lock #pw+1234567890+3#
4 SIM Card Lock #pw+1234567890+4#
---------------------------------------------------------
Unlock SP-Lock
Here is a way to Unlock your phone which is Service Provider locked, without to know SPLock code. With a Nokia 16xx/21xx/31xx/51xx/81xx that are SIMlocked to one privider you can bypass the SP lock like this:
First of all, PIN CODE MUST BE ON, then press:
C
C and hold until it clears display
* and hold until start to blink
* and hold until start to blink
04***your pin>#
Each time you turn your phone OFF it resets the lock, so this need to be done each time you ll turn your phone ON
The phone now says: PIN CODE CHANGED (or ACCEPTED)
and the SIM card is accepted until you restart the phone again.
NOTE: On vesion 5.04 Nokia has removed this option !
update:
There s another Nokia service provider lock generator for DOS (somehere on the net) called 5161un.zip (for Nokia 51xx-61xx models) This program uses the #pw+(master code)+1# code to unlock the phone. With this software you need to have a access to the eeprom..
---------------------------------------------------------
Bypass the SP-lock
With a Nokia 16xx/21xx/31xx/51xx/81xx that are SIM locked to one privider you can bypass the SP lock like this:
Insert sim card of diferent provider.
Turn on the phone and press the UP VOLUME key for 3 sec. then release it and the phone says PIN CODE ?
Press the "C" key.
Then Press * and wait until it desapear and apear again, then press * one more time and 04*PIN*PIN*PIN#
The phone now says: PIN CODE CHANGED (or ACCEPTED)
and the SIM card is accepted until you restart the phone again.
update:
On version 5.04 Nokia has removed this option !
---------------------------------------------------------
How to open lock 1 and 4?
You will need Winlock software and MBUS cable to do this. Winlock is a Nokia service program that you can use to open lock 1 and 4, really you are closing locks when you do that, but when you write ????? at MCC+MNC and MSIN text box, the phone don t understand it and consider that it s open.
That trick only works for lock 1 and 4, but not for lock 2 and 3. If you did not know your lock type, please read our miscellaneous tips page first. or read at above section in this page.
Install winlock 1.10
Connect your MBUS nokia data cable
Run Winlock
Push Read Phone, if you have Lock 2 or Lock 3 closed you can not open your phone, but you can try change Lock 2.
Select State Close in Lock 1 and Lock 4, fill out MCC+MNC and MSIN text boxes with ??????? and Push Close Locks.
Now you can use any operator card in your phone. If you get any error when you do that do the following steps:
Select State Automatic in Lock 1 and Lock 4 and change type to User in Lock 1 and Lock 4, fill out MCC+MNC and MSIN text boxes with ?????????? and Push Close Locks.
Select State Automatic in Lock 1 and Lock 4 and change type to Factory in Lock 1 and Lock 4, fill out MCC+MNC and MSIN text boxes with ?????????? and Push Close Locks.
If you continue getting errors you must turn off your phone and reset computer and try again.
---------------------------------------------------------
How to open lock 2?
When operators companies close lock2 you can only use the contract or prepaid card for this operator, but you can use another operator company prepaid card if you know what GID1 must write.
Install Winlock
Run Winlock
Configure Winlock. Select menu Winlock->Defaults and change GID byte count to 2.
Push Read Phone, and write down GID1 info that appear in lock 2.
Insert the prepaid card from a different operator company.
We must find out a the GID1 info adecuate for our new prepaid or contract card, take a look at our GID1 list and check if your operator and SIM card type is included, if not try to get a phone that have lock 2 closed and have the SIM card type that you want to use in your phone, and read GID1 info with winlock. You can try to write the most used GID1 codes like 0000,10FF,01FF, or FFFF, etc.
Change Lock 2 Type from User To Factory or from Factory to User.
Push Close Locks
Your phone will be reset every time you push Close Locks, if your card is not acepted the GID1 is not correct, repeat from step 4 until you find the correct GID1.
If you get error you must turn off your phone and reset computer and try again.
If you want your phone accept your original prepaid card write in GID1 the code you read at step 2 and close locks.
Exist a GID1 list?
In addition to the official way to open locks that Nokia service centers use with TDB4 or TDF-4(for WinTesla) security boxes, there is two secrets methods:
Opening the phone and adding a chip inside phone motherboard. But you will loose any warranty of your phone.
Using a special software with a MBUS Nokia cable. I don t have this software. Please don t bother me asking me about that. The only thing i know about that is that a friend is removing lock 2 using a special software. He don t make this for money, only for fun.
--------------------------------------------------------
Main Code #pw+(master code)+Y#
This code is able to check, activate or remove Sim card restriction (SP-lock).
Use the * key to get the p, + and w chars.
Y has to be 1,2,3 or 4 - depending of what lock you what to deal with.
#pw+1234567890+1# for Provider-Lock status
#pw+1234567890+2# for Network-Lock status
#pw+1234567890+3# for Provider(???)-Lock status
#pw+1234567890+4# for SimCard-Lock status
(master code) is a 10 digit code, based on the phones IMEI number.
update:
I get report that told me the code didn t works for Optimus Card
---------------------------------------------------------
Enhanced Full Rate Codec (EFR)
Enhanced Full Rate will give you much better sound quality when you enable it. The new Enhanced Full Rate CODEC adopted by GSM uses the ASELP (AlgebraicCode Excitation Linear Prediction) compression technology. This technology allows for much great voice quality in the same number of bits as the older Full Rate CODEC. The older technology was called LPC-RPE (Linear Prediction Coding with Regular Pulse Excitation). Both operate at 13 kilobits.(but you take up more space on the network, so they can charge you more)
*3370# and EFR will be activated after a reboot of the phone ( consumes more power )
#3370#
and EFR will be switched off after a reboot of the phone.
---------------------------------------------------------
Half Rate Codec (HR)
Half Rate will give you bad sound quality, which gives the service provider the opportunity to have more calls on the network; and you might get a lower charge from them. (Will give you 30% longer talk-time)
*4720# Half Rate coded will be activated after a reboot of the phone ( better standby time )
#4720# Half Rate coded will be de-activated after a reboot of the phone
---------------------------------------------------------
Unblocking Code
Unblock PIN1 : **05*PUK*newPIN1*newPIN1#@
UnBlock PIN2 : **052*PUK2*newPIN2*newPIN2#@
---------------------------------------------------------
Hiding your phone number
Dial 141 then the number you want to call eg. 141#######
This should stop your number been sent to the caller. (*)
(*) This only works on UK phones, if anybody has tried this and works, please let me know.
---------------------------------------------------------
Unlocking PIN2 for software version
V 05.07
20.11.98
NSE-1
If your SimCard is locked by your SP, you can check it and if it is, you will get the "wrong code" message on the display (for use 1234567890)
If your SimCard is locked by your SP, you can t unlock PIN2 !
---------------------------------------------------------
Blocking phone number at Cantel AT&T
If you have one of those cantel at&t phones if you press #0000# you can block your number
at no extra charge.
---------------------------------------------------------
New Menu on Emergency Calls *3001#12345#
Brings a new menu that gives you access to the emergency calls ( 911 Etc. ). It will give you FREE calls! (only the ones you put in the emergency!! )
This option will depend on your GSM operator
---------------------------------------------------------
Your number in your display
Goto menu 3-7 Call cost settings.
Turn ON the Call costs limit 3-7-1. PIN2 code Required.
Put in the limit with the phone number.
eg. my phone # is 019 2184697
Enter the limit as 2184697
Goto menu 3-7-2 Show costs in. PIN2 code Required.
Select Currency.
Enter Unit price : 1
Enter Currency name as 019 (per my phone # eg. above)
Now the phone number 019 2184697 will remains on the 4th row of the display.
Secondly, if you press the # key, it prompt which line to be used; Line 1 or 2.
---------------------------------------------------------
Free Call Tip
The tips needs Net Monitor enabled. Be aware that the trick will remove Netmonitor in some sw versions like v4.73 and v5.04.
Launch the Net Monitor in your Nokia 51xx / 61xx
Execute the test number 497
Free calling for about 90 sec should now have been activated.
---------------------------------------------------------
Nokia 5110 PIN-Out
Pin-Outs: Bottom view, keyboard up, counting from the left
V V 1 2 3 4 5 6 V
(o) | | [= = = = = =] | |
7 8 9 10 11 12
1 - VIN CHARGER INPUT VOLTAGE 8.4V 0.8A
2 - CHRG CTRL CHARGER CONTROL PWM 32Khz
3 - XMIC MIC INPUT 60mV - 1V
4 - SGND SIGNAL GROUND
5 - XEAR EAR OUTPUT 80mV - 1V
6 - MBUS 9600 B/S
7 - FBUS_RX 9.6 - 230.4 KB/S
8 - FBUS_TX 9.6 - 230.4 KB/S
9 - L_GND CHARGER / LOGIC GND
Nokia 61xx
__________
Firmware version
*#0000# or *#61x0#
IMEI Code
* # 06 #
Warranty Codes
*#92702689# (= *#war0anty#)
Just scroll down through the information. If entering the above code requires a
further warranty code try entering the following:
6232 (OK) : Month and year of manufacture
7332 (OK) : Last repair date
7832 (OK) : Purchase date (if previously set)
9268 (OK) : Serial number
37832 (OK) : Set purchase date (this can only be done once)
87267 (OK) : Confirm transfer
Enhanced Full Rate (EFR) and Half Rate Mode (HFR)
*3370# to activate Enhanced Full Rate - Makes calls sound better, but
decreases the battery life by about 5%.(I recommend this one)
#3370# to deactivate Enhanced Full Rate
*4720# to activate Half Rate Mode - Drops call quality, but increases battery
life by about 30%.
#4720# to deactivate Half Rate Mode
Nokia 81xx
_____________
Show IMEI code
* # 06 #
Software Version
* # 8110 #
This code shows you software version, date of manufacture and hardware number of your phone.
Warranty Codes
*#92702689# (= *#war0anty#)
Just scroll down through the information. If entering the above code requires a
further warranty code try entering the following:
6232 (OK) : Month and year of manufacture
7332 (OK) : Last repair date
7832 (OK) : Purchase date (if previously set)
9268 (OK) : Serial number
37832 (OK) : Set purchase date (this can only be done once)
87267 (OK) : Confirm transfer
Sim Clock information
To check if the Sim-Clock can be stopped type: *#746025625# (= *#sim0clock#)
Nokia 8810
____________
Firmware version
*#0000# or *#8810#
IMEI Code
* # 06 #
Warranty Codes
*#92702689# (= *#war0anty#)
Just scroll down through the information. If entering the above code requires a
further warranty code try entering the following:
6232 (OK) : Month and year of manufacture
7332 (OK) : Last repair date
7832 (OK) : Purchase date (if previously set)
9268 (OK) : Serial number
37832 (OK) : Set purchase date (this can only be done once)
87267 (OK) : Confirm transfer
Enhanced Full Rate (EFR) and Half Rate Mode (HFR)
*3370# to activate Enhanced Full Rate - Makes calls sound better, but
decreases the battery life by about 5%.(I recommend this one)
#3370# to deactivate Enhanced Full Rate
*4720# to activate Half Rate Mode - Drops call quality, but increases battery
life by about 30%.
#4720# to deactivate Half Rate Mode
How to improve your internat speed...?
Increase internet speed :ugeek:
To get it back:
Click Start then Run and type "gpedit.msc" without quotes.
This opens the "group policy editor" and go to: "Local Computer Policy"
Then "Computer Configuration" Then "Administrative Templates"
Then select "Network" then "QOS Packet Scheduler"
After that select "Limit Reservable Bandwidth".
Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab i.e." By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."
So the trick is to ENABLE reservable bandwidth, then set it to ZERO. This will allow the system to reserve nothing, rather than the default 20
Google search hackingThis is a featured page
Google Operators:
Operators are used to refine the results and to maximize the search value. They are your tools as well as ethical hackers’ weaponsBasic Operators:
+, -, ~ , ., *, “”, |,
OR
Advanced Operators:
allintext:, allintitle:, allinurl:, bphonebook:, cache:, define:, filetype:, info:, intext:, intitle:, inurl:, link:, phonebook:, related:, rphonebook:, site:, numrange:, daterange
Basic Operators !!
(+) force inclusion of something common
Google ignores common words (where, how, digit, single letters) by default:
Example: StarStar Wars Episode +I
(-) exclude a search term
Example: apple –red
(“) use quotes around a search term to search exact phrases:
Example: “Robert Masse”
Robert masse without “” has the 309,000 results, but “robert masse” only has 927 results. Reduce the 99% irrelevant results
Basic Operators
(~) search synonym:
Example: ~food
Return the results about food as well as recipe, nutrition and cooking information
( . ) a single-character wildcard:
Example: m.trix
Return the results of M@trix, matrix, metrix…….
( * ) any word wildcard
Advanced Operators: “Site:”
Site: Domain_name
Find Web pages only on the specified domain. If we search a specific site, usually we get the Web structure of the domain
Find documents with specified extensions
The supported extensions are:
- HyperText Markup Language (html) - Microsoft PowerPoint (ppt)
- Adobe Portable Document Format (pdf) - Microsoft Word (doc)
- Adobe PostScript (ps) - Microsoft Works (wks, wps, wdb)
- Lotus 1-2-3 - Microsoft Excel (xls)
(wk1, wk2, wk3, wk4, wk5, wki, wks, wku) - Microsoft Write (wri)
- Lotus WordPro (lwp) - Rich Text Format (rtf)
- MacWrite (mw) - Shockwave Flash (swf)
- Text (ans, txt)
Note: We actually can search asp, php and cgi, pl files as long as it is text-compatible.
Example: Budget filetype: xls
Advanced Operators “Intitle:”
Intitle: search_term
Find search term within the title of a Webpage
Allintitle: search_term1 search_term2 search_term3
Find multiple search terms in the Web pages with the title that includes all these words
These operators are specifically useful to find the directory lists
Example:
Find directory list:
Intitle: Index.of “parent directory”
Advanced Operators “Inurl:”
Inurl: search_term
Find search term in a Web address
Allinurl: search_term1 search_term2 search_term3
Find multiple search terms in a Web address
Examples:
Inurl: cgi-bin
Allinurl: cgi-bin password
Advanced Operators “Intext;”
Intext: search_term
Find search term in the text body of a document.
Allintext: search_term1 search_term2 search_term3
Find multiple search terms in the text body of a document.
Examples:
Intext: Administrator login
Allintext: Administrator login
Advanced Operators: “Cache:”
Cache: URL
Find the old version of Website in Google cache
Sometimes, even the site has already been updated, the old information might be found in cache
Advanced Operatorst
..
Conduct a number range search by specifying two numbers, separated by two periods, with no spaces. Be sure to specify a unit of measure or some other indicator of what the number range represents
Examples:
Computer $500..1000
DVD player $250..350
Conduct a number range search by specifying two numbers, separated by two periods, with no spaces. Be sure to specify a unit of measure or some other indicator of what the number range represents
Examples:
Computer $500..1000
DVD player $250..350
Advanced Operators: “Daterange:”
Daterange:
Find the Web pages between start date and end date
Note: start_date and end date use the Julian date
The Julian date is calculated by the number of days since January 1, 4713 BC. For example, the Julian date for August 1, 2001 is 2452122
Examples:
2004.07.10=2453196
2004.08.10=2453258
Vulnerabilities date range: 2453196-2453258
Advanced Operators “Link:”
Link: URL
Find the Web pages having a link to the specified URL
Related: URL
Find the Web pages that are “similar” to the specified Web page
info: URL
Present some information that Google has about that Web page
Define: search_term
Provide a definition of the words gathered from various online sources
Define: Network security
Advanced Operators “phonebook:”
Phonebook
Search the entire Google phonebook
rphonebook
Search residential listings only
bphonebook
Search business listings only
Examples:
Phonebook: robert las vegas (robert in Las Vegas)
Phonebook: (702) 944-2001 (reverse search, not always work)
The phonebook is quite limited to U.S.A
But the Question rises What can Google can do for an Ethical Hacker?
Search sensitive information like payroll, SIN, even the personal email box
Vulnerabilities scanner
Transparent proxy
So how but if i tell u a different way to search
k lets do this type in the following statements n c d results
we can only provide u the guidelines, now u need to implement your Creativity to Keep it rolling.
Salary
Salary filetype: xls site: eduSecurity social insurance number
Intitle: Payroll intext: ssn filetype: xls site: edu
Security Social Insurance Number
Payroll intext: Employee intext: ssn Filetype: xlsFiletype: xls “checking account” “credit card” - intext: Application -intext:
Form (only 39 results)
Financial Information
Intitle: “Index of” finances.xls (9)
Personal Mailbox
Intitle: Index.of inurl: Inbox (inurl: User OR inurl: Mail) (220)
Confidential Files
“not for distribution” confidential (1,760)Confidential Files
“not for distribution” confidential filetype: pdf (marketing info) (456)
OS Detection
Use the keywords of the default installation page of a Web server to search.
Use the title to search
Use the footer in a directory index page
OS Detection-Windows
“Microsoft-IIS/5.0 server at”
OS Detection - Windows
Default web page?
Intitle: “Welcome to Windows 2000 Internet Services” IIS 5.0
OS Detection –Apache 1.3.11-1.3.26
Intitle: Test.Page.for.Apache seeing.this.instead
OS Detection-Apache SSL enable
Intitle: Test.page “SSL/TLS-aware” (127)
Search Passwords
Search the well known password filenames in URL
Search the database connection files or configuration files to find a password and username
Search specific username file for a specific product
Search Passwords
Inurl: etc inurl: passwd
Search Passwords
Intitle: “Index of..etc” passwd
Search Passwords
Intitle: “Index of..etc” passwd
Search Passwords
Inurl: admin.pwd filetype: pwd
Search Passwords
Filetype: inc dbconn
Search Passwords
Filetype: inc intext: mysql_connect
Search Passwords
Filetype: ini +ws_ftp +pwd (get the encrypted passwords)
Search Passwords
Filetype: log inurl: “password.log”
Search Username
+intext: "webalizer" +intext: “Total Usernames” +intext: “Usage Statistics for”
License Key
Filetype: lic lic intext: key (33) (license key)
Sensitive Directories Listing
Powerful buzz word: Index of
Search the well known vulnerable directories names
Sensitive Directories Listing
“index of cgi-bin” (3590)
Sensitive Directories Listing
Intitle: “Index of” cfide (coldfusion directory)
Sensitive Directories Listing
Intitle: index.of.winnt
Get the serial number you need ! (For Certain Things)
1) Go to Google.2) Use Keyword as "Product name" 94FBR
3) Where, "Product Name" is the name of the item you want to find the serial number for.
4) And voila - there you go - the serial number you needed.
HOW DOES THIS WORK?
Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things. 1) The pages that are returned are pages dealing specifically with the product you're wanting a serial for. 2) Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.
See these example searches:
Code: |
"Photoshop 7"+94FBR "Age of Mythology"+94FBR "Nero Burning Rom 5.5"+94FBR |
Hacking AIO 2007-2008
-DESCRIPTION-
=====================================
This is a little pack created for
educational purposes only.
It contains the Following Porgrams.
-------------------------------------
Keyloggers
-------------------------------------
-Dark Keylogger
-Elite Keylogger 3.0
-tiny keylogger 1.0
-------------------------------------
Phishing
-------------------------------------
-AOL - AIM
-EverQuest Forum
-Gmail
-MySpace
-PhotoBucket
-Runescape
-Yahoo
-DailyMotion
-Habbo
-RapidShare
-Skype
-YouTube
-eBay
-FileFront
-Hi5
-PayPal
-Ripway
-VanGuard
-------------------------------------
Rapidshare
-------------------------------------
-Premium Downloads Tutorial
-------------------------------------
Brute Force
-------------------------------------
-BruteForceMD5
-http_brute_forcer_1.0
-phpftpbrute_1.0
-Brutus
-john-16
-ftp_brute_hacker_0.1
-L0phtCrack 2.52
-MD5 Toolbox 1.0.exe
-------------------------------------
DDos
-------------------------------------
-bitchslap_1.0
-donut_http_flooder_1.4
-click_2.2
-crazyping_1.1
-Hartz4Flooder_v0.2..exe
-------------------------------------
Construction Kits
-------------------------------------
-batch_o_matic_7.6
-BioHazard
-Html Virus ConstructionKit 2.0
-batch_virus_construction_kit
-davs_delphi_w0rm_gen_1.0
-javascript_generator_1.1
-batch_virus_maker_2.0
-evil_tool_1.6
-------------------------------------
Root Kits
-------------------------------------
-RootKitRevealer
-Windows RootKit
-------------------------------------
Wlan
-------------------------------------
-aircrack-2.3
-aircrack-ng-0.6.2-win
-bsd_airtools
Download Link: http://rapidshare.com/files/86444713/Hacking_AIO_2007-2008.zip