Hacking tools

BEST  HACKING TOOLS EVER





Open VPN
 
OpenVPN is a full-featured SSL VPN solution which can accomodate a wide range of configurations, including remote access, site-to-site VPNs, WiFi security, and enterprise-scale remote access solutions with load balancing, failover, and fine-grained access-controls. GUI-version for Windows!
http://uploading.com/files/GTWU6PHX/open...l.zip.html


BlueFTP

 
This is an old tool which will helps you to hack mobiles throw bluetooth. Try it by yourself.
http://uploading.com/files/KTR3ONRF/BlueFTP.zip.html


DELmE's Batch Virus Generator v1.0
This tool is a virus creater. It will create very proffesional virus. Never test any virus on your PC. Very effective for bad hackers. All credits go to DELmE
http://uploading.com/files/CS02T8P6/DELm...1.rar.html


DELmE's Batch Virus Generator v2.0
This tool is a virus creater. It will create very proffesional virus. I would say it is best virus creater i have ever saw. Never test any virus on your PC. Very effective for bad hackers. All credits go to DELmE
http://uploading.com/files/0BPU0ZCP/DELm...0.rar.html


Windows command list
This is a list for most of the windows operator commands. It can very useful for virus programmers.
http://uploading.com/files/SG3CU3V8/wind...t.rar.html


THC-Hydra 5.4
This tool is a really good one to hack websites.This tool supports: TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, SMB, SMBNT, MS-SQL, MYSQL, REXEC,RSH, RLOGIN, CVS, SNMP, SMTP-AUTH, SOCKS5, VNC, POP3, IMAP, NNTP, PCNFS, ICQ, SAP/R3, LDAP2, LDAP3, Postgres, Teamspeak, Cisco auth, Cisco enable, LDAP2 and Cisco AAA. It is worth to try it.
http://uploading.com/files/WWZGWNJG/hydr...n.zip.html


John the ripper
This tool  should crack password
http://uploading.com/files/S06PAFJJ/john171w.zip.html


Rainbowcrack 1.2
This tool will helps you to crack the PC users and administartors passwords. This is really good. Tutorial on how to use it is included.
http://uploading.com/files/5R4T4YPI/rain...n.zip.html


Konboot
This tool should recover your lost passwords for your PCs users accounts. This is an iso file so you have to burn it on a CD so it works. Work for Windows/Linux
http://uploading.com/files/7VQ5MFN4/pass...o.zip.html


Firefox Master Password Remover
This tool will remove the Master password on firefox. I create it and test it on my PC and works fine. I got this idea since i saw many people begging for master password on their firefox browser. Very effective
http://uploading.com/files/7KII7524/Fire...r.rar.html


Rapidshare Points Generator v2.4
This tool should generate points for your rapidshare accounts. Clean but not test it. Try it and let us know if it works
http://uploading.com/files/K2IC5Z4G/Rapi...4.rar.html


Icon changer
I noticed that some people asking for ful version icon changer. I couldn't bring the full version but i bring this. A very simple tool to add/remove icons for any application. It is shareware.
http://uploading.com/files/TG37XPXE/Icon...r.rar.html


Icons Extract
The Icons Extract utility scans the files and folders on your computer, and extract the icons and cursors stored in EXE, DLL, OCX, CPL, and in other file types. You can save the extracted icons to ICO files (or CUR files for cursors), or copy the image of a single icon into the clipboard. Very useful
http://uploading.com/files/XDHT9FPG/icon...r.zip.html


XSS_Scanner_1.0
This tool have been posted twice before but looks it is lost in the forum so i took the initiative to post it in my list. This tool will scan the web using google and will search for vulnerable XSS website.
http://uploading.com/files/HU7BBAYR/XSS_...0.zip.html


k9 web protection
This tool will let you control your browsers by control what types of websites to block or what particulary websites to block. It is very effective for parental control to limit what there children can access including hacking . Also ability to protect from infected websites. A full list of websites already exist. Very effective
http://uploading.com/files/7RVR98TU/k9%2...n.rar.html


72389 Mass Bomber
This tool will let you to send messages to multiple emails from a signle email at the same time. very effective. All credit go to Nathan72389
http://uploading.com/files/PS93X57M/7238...r.rar.html


Nsis 2.45
This contain some really good scripts that can be used in your websites and ability to create the script you want. Very good for java writers
http://uploading.com/files/F0CY0R6K/nsis...g.rar.html


Password door
This tool will helps you to restrict access to applications installed on your PC. This tool will put a password that you choose on the application that you choose so no one can open it without a password. Very effective
http://uploading.com/files/SL389H3D/Pass...r.rar.html


Security administrator
This tool will give control on all tasks that all user account have. Block what you don't want them to have as tasks and options eg: block downloading
http://uploading.com/files/Z497IJSP/Secu...r.zip.html


L337 Virus Creator
This tool is a fake virus generator. It looks like a virus generator while in fact it will infect the person himself. Use it to trick your victims. Let them think they can create virus using this one while they will get infected once they press any button. NEVER EVER test it on yourself. It will infect you. All credits go to Right Hand Man.
Code:
http://i275.photobucket.com/albums/jj299/s...titled-1-18.jpg
http://uploading.com/files/7KO7NNNW/L337...r.rar.html




Password generator 2.02
This tool will create complex passwords that you choose the type of the password and ability to personalize the person.
http://uploading.com/files/SQ1FGMAQ/PWGen-2.02.rar.html


Dork list
This is a list for some of the most used dorks in hacking websites.
http://uploading.com/files/7LVF2XEF/Dork...t.rar.html


Avast Virus removal pro v4
This is one of the best virus removal if not the best. It will search for virus on your system and remove them. Very effective
http://uploading.com/files/XPZGHUNA/Avas...4.rar.html


Password Zilla
This is the best password generator i have ever saw in my life. It will create the most complex and complicated passwords in the world. Choose the format of your password and what caracters to use and let it work. Also this tool can crack hashes. I am in love with this tool. My msn was hacked twice but a third time when i used a password generated by this one. Very effective
http://uploading.com/files/PKLLKB3V/Pass...a.rar.html


WinRar Password Remover v1.1
This tool will crack any protected winrar files.
http://uploading.com/files/PEXJGFBY/WinR...1.rar.html


GroundZero's Account Freezer V1.0
This tool will freeze facebook accounts.All credits go to GroundZero
http://uploading.com/files/TGKRE72N/Grou...0.zip.html
Tutorial


LC4
One of the most proffesional windows password crackers. very useful
http://uploading.com/files/H1M3LOB3/LC4.rar.html


1 million serials
This have been posted before and i think it is damn good that it shouldn't be lost with the other files. It will provide you with serials for over 1 million software.
http://uploading.com/files/CFO0UES9/1.Mi...s.rar.html


Forum auto poster
This was posted before in the forum but his owner was quicked out the forum.This tool will helps you to auto post in multiple forums in very few and easy steps.
http://uploading.com/files/J4U3KXUC/foru...r.rar.html


Autorun pro entreprise
This is the best autorun maker i have ever saw. It is damn pro. It can be very useful making your virus to autorun.
http://uploading.com/files/E24WUTUH/Auto...e.rar.html


File renamer
This tool will remane a very big number of files and folders at the same in only few clicks. Pro hackers can use this one to mess victims system.
http://uploading.com/files/S795U2M2/File...r.rar.html


Cheat Engine 55
This tool will helps to hack different things including flash games.
http://uploading.com/files/ZMJOZEIC/Chea...5.exe.html


Alpha editor
Alpha Editor is a Windows based text editor designed to make the creation and use of batch files by administrators easier. Alpha editor includes built in coding for login script creation.
http://uploading.com/files/C52TN3VM/Alph...r.zip.html


CSS Maker
Create stylesheets with no CSS knowledge! Don´t worry about the german intro, language can be adjusted in the program...;) very useful for websites writers
http://uploading.com/files/2R3S5TW0/CSS%...r.zip.html


Scour 2.3.7
I know that many people use scour.com to gain money and that they are getting tireds doing the searches by themself.This tool was posted before in the forum. Use theis tool to automate the searches on scour.com. Jsut input your informations in "Settings.ini" file and you are ready to use it and to win money.
http://uploading.com/files/W1WEC4NL/Scou...7.rar.html

Hacking Basics

<div class="separator" style="clear: both; text-align: center;">
</div>
<b><i><u><span class="Apple-style-span" style="color: #b6d7a8; font-family: Arial, Helvetica, sans-serif; font-size: large;">Can Hacking Be Ethical?</span></u></i></b>

&nbsp;&nbsp;
<div style="border: medium none;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4SsF3qSAXn1Fj7yDl8pv1I6QELWegErKzapcXe3QdvCz2bitMR2ohIBKUvopGirKiHpOFVXcpzKFogcsU-CRStL8shrVscAhlxfPD_F-7ASyKaW9UWrlta9gIoW9ChxOn4ppfXcF1uyA/s1600/hacking.gif" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="200" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4SsF3qSAXn1Fj7yDl8pv1I6QELWegErKzapcXe3QdvCz2bitMR2ohIBKUvopGirKiHpOFVXcpzKFogcsU-CRStL8shrVscAhlxfPD_F-7ASyKaW9UWrlta9gIoW9ChxOn4ppfXcF1uyA/s200/hacking.gif" width="176" /></a></div>
<div style="border: medium none;">

</div>
<div style="border: medium none;">

</div>
<div style="border: medium none;">

</div>
<div style="border: medium none;">

</div>
<div style="border: medium none;">

</div>
<div style="border: medium none;">

</div>
<div style="border: medium none;">

</div>
<div style="border: medium none;">

</div>





<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><b><span class="Apple-style-span" style="color: #9fc5e8;">The noun '<a href="http://www.cdefenders.tk/">hacker</a></span><span class="Apple-style-span" style="color: #9fc5e8;">' refers to a person who enjoys learning the details of computer systems and stretch their capabilities.</span></b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>&nbsp;&nbsp; &nbsp;</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>The verb '<a href="http://www.cdefenders.tk/">hacking</a>' describes the rapid development of new programs or the reverse engineering of already existing software to make the code better, and efficient.</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>&nbsp;&nbsp; &nbsp;</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>The term '<a href="http://www.cdefenders.tk/">cracker</a>' refers to a person who uses his hacking skills for offensive purposes.</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>&nbsp;&nbsp; &nbsp;</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>The term '<a href="http://www.cdefenders.tk/">Ethical hacker</a>' refers to security professionals who apply their hacking skills for defensive purposes.</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>
</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>So these are some terms which u should know.Now u have to decide weather u want to be a ethical hacker or a cracker.</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>
</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>for more hackers communities .click <a href="http://ethicalspot.blogspot.com/p/terms.html">here</a></b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>
</b></span>
<b><i><u><span style="color: #b6d7a8; font-family: Arial, Helvetica, sans-serif; font-size: large;">Essential Terminology</span></u></i></b>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>&nbsp;&nbsp; &nbsp;</b></span>
<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><b><span class="Apple-style-span" style="color: #b6d7a8; font-size: large;">Threat</span><span class="Apple-style-span" style="color: #9fc5e8;"> - An action or event that might prejudice security. A threat is a potential violation of security.</span></b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>&nbsp;&nbsp; &nbsp;</b></span>
<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><b><span class="Apple-style-span" style="color: #b6d7a8; font-size: large;">Vulnerability</span><span class="Apple-style-span" style="color: #9fc5e8;"> - Existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event compromising the security of the system.</span></b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>&nbsp;&nbsp; &nbsp;</b></span>
<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><b><span class="Apple-style-span" style="color: #b6d7a8; font-size: large;">Target of Evaluation</span><span class="Apple-style-span" style="color: #9fc5e8;"> - An IT system, product, or component that is identified/subjected as requiring security evaluation.</span></b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>&nbsp;&nbsp;&nbsp;</b></span>
<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><b><span class="Apple-style-span" style="color: #9fc5e8;">&nbsp;</span><span class="Apple-style-span" style="color: #b6d7a8; font-size: large;">Attack </span><span class="Apple-style-span" style="color: #9fc5e8;">- An assault on system security that derives from an intelligent threat. An attack is any action that attempts to or violates security.</span></b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>&nbsp;&nbsp;&nbsp;</b></span>
<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><b><span class="Apple-style-span" style="color: #9fc5e8;">&nbsp;</span><span class="Apple-style-span" style="color: #b6d7a8; font-size: large;">Exploit</span><span class="Apple-style-span" style="color: #9fc5e8;"> - A defined way to breach the security of an IT system through vulnerability.</span></b></span>



<b><i><u><span style="color: #b6d7a8; font-family: Arial, Helvetica, sans-serif; font-size: large;">Malicious hacker strategies:</span></u></i></b>

<b><i><span class="Apple-style-span" style="color: #ea9999; font-family: Arial, Helvetica, sans-serif;">"THE ONE WHO CAN HACK IT ONLY RESTORE IT"</span></i></b>

<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjW3bAJCik_RkNnjvBON55_L0ThdwSCPGVyT2px-uF3rMRki9GJdhLiX5EXcXXWG1l6DBPhNTx4rAXd6ei48dY-PgnhYHD2E43suWoOu4E3f1-8uRj5BXS_9kJQ9h08_aiV-jTg4RAJNsE/s1600/untitled.bmp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="272" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjW3bAJCik_RkNnjvBON55_L0ThdwSCPGVyT2px-uF3rMRki9GJdhLiX5EXcXXWG1l6DBPhNTx4rAXd6ei48dY-PgnhYHD2E43suWoOu4E3f1-8uRj5BXS_9kJQ9h08_aiV-jTg4RAJNsE/s320/untitled.bmp" width="320" /></a></div>

<span class="Apple-style-span" style="color: #b4a7d6; font-family: Arial, Helvetica, sans-serif;"><b><i><u>HACKING phase&nbsp;1.- Information Gathering</u></i>&nbsp;&nbsp;</b></span>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;


<div class="separator" style="border: medium none; clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh63g_FEe-MNt2_8Mqfgz1hIREqmQLMYyQ9mVigcSmMOiyedljiwHQzUOuB24uwtmpwXBl0k0D9qJcMzzCxGl2DIErhqxFix_fE6nKqw058RmwNcrK1YwtNrjIWeSMj0oxXJAc96L2RF50/s1600/altavista_logo-vert.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="48" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh63g_FEe-MNt2_8Mqfgz1hIREqmQLMYyQ9mVigcSmMOiyedljiwHQzUOuB24uwtmpwXBl0k0D9qJcMzzCxGl2DIErhqxFix_fE6nKqw058RmwNcrK1YwtNrjIWeSMj0oxXJAc96L2RF50/s320/altavista_logo-vert.jpg" width="320" /></a></div>




<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>Information gathering is initial process as far as hacking a investingating is concerned.It is the process of profiling any organisatiom,system,server ar an individual using methodological procedure.</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>Information gathering is used by attacker as well as investigator to get more information about target.</b></span>

<u><span class="Apple-style-span" style="color: #b6d7a8; font-family: Arial, Helvetica, sans-serif;"><b>Attackers point of view:</b></span></u>
<u><span class="Apple-style-span" style="color: #b6d7a8; font-family: Arial, Helvetica, sans-serif;"><b>
</b></span></u>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>Attacker will first gather initial information like domain name,ip address,network ip range,operating system,services,control pannel information,vulnerable services etc before attacking into system.</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>Footprinting is required to ensure that isolated information repositories that are critical to the attack are not overlooked or left undiscovered. footprintingmerely comprosis on aspect of the entire information gathering process,but is considered one of the most inportant stages of a mature hack.</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>Attacker will take 90% of time in information gathering &amp; only 10% of time while attacking &amp; ganing an acess to the&nbsp; system.</b></span>

<u><span class="Apple-style-span" style="color: #b6d7a8; font-family: Arial, Helvetica, sans-serif;"><b>Investigator's point of view:</b></span></u>
<u><span class="Apple-style-span" style="color: #b6d7a8; font-family: Arial, Helvetica, sans-serif;"><b>
</b></span></u>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">Investigator will gather initial information like traces of criminal on an internet,about his name ,occupation,adress,contact, about his/her company/organisation before taking any legel action .</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">This will help investigator to profile the criminal &amp; his/her activities properly during interrogation.</span></b>

<u><span class="Apple-style-span" style="color: #cfe2f3; font-family: Arial, Helvetica, sans-serif;"><b>Following are the various methodologies for informatin gathering.:</b></span></u>

<b><i><u><span class="Apple-style-span" style="color: #b6d7a8; font-family: Arial, Helvetica, sans-serif;">1.Information gathering using search engine:</span></u></i></b>
<b><i><u><span class="Apple-style-span" style="color: #b6d7a8; font-family: Arial, Helvetica, sans-serif;">
</span></u></i></b>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>" one leaves footprint /information everywhere while surfing internet "this is the basic principle for investigators as well as hackers .the only difference is the way they use this information</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>
</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>Attacker will gather information about system information,operating system,vulnerable application running on themand later on exploit it.</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>Investigator will gather information in he got an access to system &amp; where he left his /her footprint behind the same &amp;later on traced it.</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>
</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>search engine are the most powerful tool to search about any individual,organisation &amp; system.</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>
</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>following are the list of top 10 search engines:</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>
</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>*Google search:World's most powerful search engine</b></span>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a href="http://www.google.com/">http://www.google.com/</a></b></span>


<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgh9M6iRvwzIqhk4jkY2n3KfOZwXJDtUqCZ2iM8URxV7wN2GCH8-3cLTcwNNHmYRCa0QXk4VZaOx695J7nHtYMuN9EEMeD2Yqy_ZTvhOp88-hymWuN98dL1cz1_Sm-xEjMNNo54J2wAxtw/s1600/google-logo_2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="140" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgh9M6iRvwzIqhk4jkY2n3KfOZwXJDtUqCZ2iM8URxV7wN2GCH8-3cLTcwNNHmYRCa0QXk4VZaOx695J7nHtYMuN9EEMeD2Yqy_ZTvhOp88-hymWuN98dL1cz1_Sm-xEjMNNo54J2wAxtw/s200/google-logo_2.jpg" width="200" /></a></div>
<div class="separator" style="clear: both; text-align: center;">

</div>
<div class="separator" style="clear: both; text-align: center;">

</div>
&nbsp;<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>*Yahoo search: <a href="http://www.search.yahoo.com/">http://www.search.yahoo.com/</a></b></span>


<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4Pd6fcxKTFS9pNO1HLNHXpH1uLg1LbQX5HkWFRoB82cAan6K5cNu7xLQHEjVnWJWKxg6sEzqSx6rdq5g_-DJTBLWaQNaysqMZTdfQqXx3_bHUdQlqkULfUjqbJ1AHe7ndQmiH7k25REE/s1600/untitled.bmp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4Pd6fcxKTFS9pNO1HLNHXpH1uLg1LbQX5HkWFRoB82cAan6K5cNu7xLQHEjVnWJWKxg6sEzqSx6rdq5g_-DJTBLWaQNaysqMZTdfQqXx3_bHUdQlqkULfUjqbJ1AHe7ndQmiH7k25REE/s1600/untitled.bmp" /></a></div>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>*AOL search:<a href="http://www.search.aol.in/">http://www.search.aol.in/</a> </b></span>

<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5tLDL_-Cgsy9HsOMoi1Qg6pV7TVzipk7Cw7aShMN7w-IXE6SgUq263EFBlXJZnviKQjhoRwSpLbel3kdS4f6q70UW6bLl-LMuvIsFGoZfqCqalIBQCkhr0gLKptUYs3c-tnVVhpmlu7w/s1600/untitled78.bmp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><b><i><img border="0" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5tLDL_-Cgsy9HsOMoi1Qg6pV7TVzipk7Cw7aShMN7w-IXE6SgUq263EFBlXJZnviKQjhoRwSpLbel3kdS4f6q70UW6bLl-LMuvIsFGoZfqCqalIBQCkhr0gLKptUYs3c-tnVVhpmlu7w/s1600/untitled78.bmp" /></i></b></a></div>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>*Ask search:<a href="http://www.ask.com/">http://www.ask.com/</a></b></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiijmCUCAJexHOU1t5luio3Vxws7eyg5s2TeTPP0p8ScjhM36XbuJMdUeYnqaY0bQMhxf5OifeE1XIUHEKvccH2E6lRW-I7LJGqzGw7bfEAFABZInmiQgKhls1blhcK8G7nUBjZICCX1bo/s1600/untitled12.bmp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiijmCUCAJexHOU1t5luio3Vxws7eyg5s2TeTPP0p8ScjhM36XbuJMdUeYnqaY0bQMhxf5OifeE1XIUHEKvccH2E6lRW-I7LJGqzGw7bfEAFABZInmiQgKhls1blhcK8G7nUBjZICCX1bo/s1600/untitled12.bmp" /></a></div>
<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>*Altavista search:<a href="http://www.altavista.com/">http://www.altavista.com/</a></b></span>

<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiH7a9Y4B6cOccB4eJmxSSrqTotLK38T7WZ1rVg9tIjkoZApjjydyO_slIdKTe36yY5nV9Z3XBYsyfCl6MUWp8pWA3S6QaYYnbxBCds__xJ5IWNKT85FKQHcecgr5y1ovlRxeg4AJEMClc/s1600/altavista_logo.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="131" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiH7a9Y4B6cOccB4eJmxSSrqTotLK38T7WZ1rVg9tIjkoZApjjydyO_slIdKTe36yY5nV9Z3XBYsyfCl6MUWp8pWA3S6QaYYnbxBCds__xJ5IWNKT85FKQHcecgr5y1ovlRxeg4AJEMClc/s320/altavista_logo.gif" width="320" /></a></div>


<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>*Fast search:<a href="http://www.alltheweb.com/">http://www.alltheweb.com/</a></b></span>


<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW0N35cswoZqgWdXy-KV7xpPk-ZvL7QTYqVALrCUOGthCwTFNKHC40Ax5H7hqFWcBZF7l4R1sGSkPvGLE0hALoirS8EqLJX4kI-bUw59qvWFYK9Guzd1K2jU7KFdWuJ-8v8YeQdvGYv5M/s1600/atwlogo_h.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhW0N35cswoZqgWdXy-KV7xpPk-ZvL7QTYqVALrCUOGthCwTFNKHC40Ax5H7hqFWcBZF7l4R1sGSkPvGLE0hALoirS8EqLJX4kI-bUw59qvWFYK9Guzd1K2jU7KFdWuJ-8v8YeQdvGYv5M/s1600/atwlogo_h.gif" /></a></div>


<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>*Gigablast:<a href="http://www.gigablast.com/">http://www.gigablast.com/</a></b></span>


<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhl_JUBMwpSEg04BQ-I4qCqOOUJitiXxk0PVjuwBV_VQPJTCJirldfcbO7eJOPRh5M5qUamthiFwxm78hjECI2RqpxiNWEjA8rkWXdtVNV0aCwR_1Va6m6IE0DhxWK9-HuDd6lHusNRqAI/s1600/gigablast.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="148" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhl_JUBMwpSEg04BQ-I4qCqOOUJitiXxk0PVjuwBV_VQPJTCJirldfcbO7eJOPRh5M5qUamthiFwxm78hjECI2RqpxiNWEjA8rkWXdtVNV0aCwR_1Va6m6IE0DhxWK9-HuDd6lHusNRqAI/s320/gigablast.gif" width="320" /></a></div>

<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>*Snap search:<a href="http://www.snap.com/">http://www.snap.com/</a></b></span>

<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSLpF54TjiuvxdAs5uDjCmvgoU44WlothOB08DaH4QiLk3icwrsP0F029J-tk3ZLgq5hgVstfL5r7vZl30d81ktaY61SID23fCQ9Qgta8SiIvQKnhgwJALWzMUR0JbDcxXaKh9G8ZRrj0/s1600/LZ0MCCA452TIBCAH3ZB2ICAJS7IGACA3F1IV6CAS1XCYHCAHORSDKCAYPO6IOCA81AD05CAC4XKTSCAKQNRB9CALBOE4WCA458BSBCATLZCXACA3JJ8AICAV2D2JSCAGCCG3WCANJQSKJCA6J5ZMB.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSLpF54TjiuvxdAs5uDjCmvgoU44WlothOB08DaH4QiLk3icwrsP0F029J-tk3ZLgq5hgVstfL5r7vZl30d81ktaY61SID23fCQ9Qgta8SiIvQKnhgwJALWzMUR0JbDcxXaKh9G8ZRrj0/s1600/LZ0MCCA452TIBCAH3ZB2ICAJS7IGACA3F1IV6CAS1XCYHCAHORSDKCAYPO6IOCA81AD05CAC4XKTSCAKQNRB9CALBOE4WCA458BSBCATLZCXACA3JJ8AICAV2D2JSCAGCCG3WCANJQSKJCA6J5ZMB.jpg" /></a></div>


<b><i><u><span class="Apple-style-span" style="color: #b6d7a8; font-family: Arial, Helvetica, sans-serif;">2.Information gathering using relational search engine:</span></u></i></b>

<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">This type of search engines gets results from different search engine &amp;make relation or connections between those results.</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">*<u><i> kartoo</i></u>&nbsp; <a href="http://www.kartoo.com/">http://www.kartoo.com/</a></span></b>

<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9mQI-acEniIUQb-C8op5SBWNiChPlo6wkFspc_Yb8KQ1ialMWkre_BCpAkyYl1Qv2oAvfr4Q0hGXg-wgXiCBrhlCQPqVc3JGPk1_iAaaefrcQ8phgzWgXlqELQ4svu0O-jrZkq9DWz-s/s1600/kartoo-search-result.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="251" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9mQI-acEniIUQb-C8op5SBWNiChPlo6wkFspc_Yb8KQ1ialMWkre_BCpAkyYl1Qv2oAvfr4Q0hGXg-wgXiCBrhlCQPqVc3JGPk1_iAaaefrcQ8phgzWgXlqELQ4svu0O-jrZkq9DWz-s/s320/kartoo-search-result.jpg" width="320" /></a></div>

<div class="separator" style="clear: both; text-align: center;">
</div>


<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">*<u><i><b>Maltego</b></i></u>&nbsp;<b><i><u><u> <a href="http://www.maltego.com/">http://www.maltego.com/</a></u></u></i></b></span>
<b><i><u>
</u></i></b>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjd0n8zubgG6-4YGZL-0YB1IsIJSWcffOwia6TjOdwH-zdlt3vMQDlJeazX3NbuDSCEPXNYT6VKMQYFpCXQjKib_Zz8hoJ9keQeoiz8atIixObcj0qKKpqt3Fz0EWXQXA2TIbKnUdPPoaA/s1600/Maltego_in_action_610x435.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="228" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjd0n8zubgG6-4YGZL-0YB1IsIJSWcffOwia6TjOdwH-zdlt3vMQDlJeazX3NbuDSCEPXNYT6VKMQYFpCXQjKib_Zz8hoJ9keQeoiz8atIixObcj0qKKpqt3Fz0EWXQXA2TIbKnUdPPoaA/s320/Maltego_in_action_610x435.png" width="320" /></a></div>

<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>*<i><u>Yahoo</u></i> people search:<a href="http://people.yahoo.com/">http://people.yahoo.com/</a></b></span>

<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXGeVVgx4yRqAaIQCOyKIKIawyWd10UKcjXYnJx_phduzrBJBrcVukOlIZbIK6xylVrvs0SQ2NeJf23wegdZ03fvDoNPFXNwXexAdQDwYlfAeVtzdrXBxEPHgBlEt3wqWIHSW84c4B6sQ/s1600/2613243426_814702354f.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="164" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXGeVVgx4yRqAaIQCOyKIKIawyWd10UKcjXYnJx_phduzrBJBrcVukOlIZbIK6xylVrvs0SQ2NeJf23wegdZ03fvDoNPFXNwXexAdQDwYlfAeVtzdrXBxEPHgBlEt3wqWIHSW84c4B6sQ/s320/2613243426_814702354f.jpg" width="320" /></a></div>

<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>*<i><u>Intelius </u></i>search: <a href="http://www.intelius.com/">http://www.intelius.com/</a></b></span>

<div class="separator" style="clear: both; text-align: center;">
</div>

<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2Pba08F82L_rLRS1MMZUq1rVT6KaSrg6XkS_mA3EuSt4kV4nJTtsmCiJHs1-5MrYmcsAXWiJjatF8Wtuj5urFYsBOrFtjRSzfed1IrNca0bmf8IWBhjBq1qd329bTIogUQqJL985eOxs/s1600/untitled.bmp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="172" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2Pba08F82L_rLRS1MMZUq1rVT6KaSrg6XkS_mA3EuSt4kV4nJTtsmCiJHs1-5MrYmcsAXWiJjatF8Wtuj5urFYsBOrFtjRSzfed1IrNca0bmf8IWBhjBq1qd329bTIogUQqJL985eOxs/s320/untitled.bmp" width="320" /></a></div>

<span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;"><b>*<i><u>Whois</u></i> look up :<a href="http://www.whois.net/">http://www.whois.net/</a></b></span>

<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAAG5RxNWpTjhlPPXv9MbrOUYleVAGHZTsosF4comuq5gLeyNnwr8HCEM2inP0im5tQFtF06zOXJMrwNDuwSfz6cUtaTGgwG8TCSXdGv40tmXhYK2Mms-IFvvcJe2-ZB9Ky4-EwE4z74o/s1600/carolyn_01.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="165" ox="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAAG5RxNWpTjhlPPXv9MbrOUYleVAGHZTsosF4comuq5gLeyNnwr8HCEM2inP0im5tQFtF06zOXJMrwNDuwSfz6cUtaTGgwG8TCSXdGv40tmXhYK2Mms-IFvvcJe2-ZB9Ky4-EwE4z74o/s320/carolyn_01.jpg" width="320" /></a></div>



<b><i><u><span style="color: #b6d7a8; font-family: Arial, Helvetica, sans-serif;">HACKING phase2.-Scaning</span></u></i></b>

<span style="color: #9fc5e8; font-family: Arial;"><b>Many times ago we scanned the different ports making telnet manually,today people use more sophiscated programmes with massive methods to scan IP ranges searching o lot of ports.</b></span>
<b><span class="Apple-style-span" style="color: #9fc5e8;">
</span></b>
<span style="color: #9fc5e8; font-family: Arial;"><b>Scaning is the process of finding out open /close ports,vernabilities in remote system,server&amp;networks,scaning will reveal IP addresses ,operating systems,service runing on remote computer.</b></span>
<span style="color: #9fc5e8; font-family: Arial;"><b>There are three types of scaning.</b></span>
<span style="color: #9fc5e8; font-family: Arial;"><b>&nbsp; 1.Port Scaning</b></span>
<span style="color: #9fc5e8; font-family: Arial;"><b>&nbsp;&nbsp;2.Network Scaning</b></span>
<span style="color: #9fc5e8; font-family: Arial;"><b>&nbsp; 3.Vulnerable Scaning</b></span>



<b><span class="Apple-style-span" style="color: #b6d7a8;"><u style="font-family: Arial, Helvetica, sans-serif;"><i>Hacking Phase 3&nbsp; Gaining Access</i></u><span style="font-family: Arial, Helvetica, sans-serif;"> -&nbsp;</span></span></b>
<b><span class="Apple-style-span" style="color: #b6d7a8;"><span style="font-family: Arial, Helvetica, sans-serif;">
</span></span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">The hacker exploits the system </span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">Gaining Access refers to the true attack phase. The hacker exploits the system.</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">The exploit can occur over a LAN, locally, Internet, offline, as a deception or theft. Examples include stack-based buffer overflows, denial of service, session hijacking, password filtering etc.</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">Influencing factors include architecture and configuration of target system, skill level of the perpetrator and initial level of access obtained.</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">Business Risk - 'Highest' - The hacker can gain access at operating system level, application level or network level.</span></b>





<u><i><b><span class="Apple-style-span" style="color: #b6d7a8; font-family: Arial, Helvetica, sans-serif;">Hacking Phase 4 - Maintaining Access </span></b></i></u>

<b><span class="Apple-style-span" style="color: #9fc5e8;">Maintaining Access refers to the phase when the hacker tries to retain his 'ownership' of the system.</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8;">The hacker has exploited a vulnerability and can tamper and compromise the system.</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8;">Sometimes, hackers harden the system from other hackers as well (to own the system) by securing their exclusive access with Backdoors, RootKits, Trojans and Trojan horse Backdoors.</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8;">Hackers can upload, download or manipulate data / applications / configurations on the 'owned' system.</span></b>




<u><i><b style="font-family: Arial,Helvetica,sans-serif;"><span class="Apple-style-span" style="color: #b6d7a8;">Hacking Phase 5 - Covering Tracks </span></b></i></u>

<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">Covering Tracks refers to the activities undertaken by the hacker to extend his misuse of the system without being detected.</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">Reasons include need for prolonged stay, continued use of resources, removing evidence of hacking, avoiding legal action etc.</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">Examples include Steganography, tunneling, altering log files etc.</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">
</span></b>
<b><span class="Apple-style-span" style="color: #9fc5e8; font-family: Arial, Helvetica, sans-serif;">Hackers can remain undetected for long periods or use this phase to start a fresh reconnaissance to a related target system.</span></b>

CELLPHONE HACKING




Hack Nokia Phones | Hack Networks | Use Free Gprs Service | Know The Secrets Codes !!!!

Nokia cell phone hacking codes



*#06#=Display the IMEI (Standard GSM command, works on all phones)

*#0000#=Display the firmware version and date

*#92702689#=Here you can view the S/N and the IMEI as well as the life timer (newer models). The date the phone left the factory and the date it was purchased. If your phone has been repaired the date of the repair is also visible. You will need to turn the phone off to exit this menu. Newer phones simply require you to press ok.

The following codes are specific to older series 40 phones; (Entering the following codes will restart the phone)

*4720#=Activates Half Rate, Half Rate is 5.6kbit/s and uses half the bandwidth at the cost of call quality. Network operators often activate half rate on overloaded towers during peak times to save costs.

#4720#=Deactivates Half Rate

*3370#=Activates Enhanced Full Rate, EFT attempts to match wire quality. The calls are 12.2kbit/s and are not supported by all operators. It is compatibale with the hightest AMR mode.

#3370#=Deactivates Enhanced Full Rate

*#746085685#=Display the SIM clock status

The following codes are phone specific or phase related;
*#7220#=Activate the GPRS PCCCH support (Packet Common Control Channel)

*#7230#=Deactivate the GPRS PCCCH support

*#7760#=Display the manufacturing serial number

This only works on the 3310 and 3330;

*#67705646#=Clear the operator logo, the logo will be reset to the default network operator logo.

The following codes work on newer series 40 & series 60/80 phones;

*#2820#=Display the Bluetooth MAC address (Phone must have a built in bluetooth adapter)

*#7370925538#=Reset the mobile wallet (Phone must have the mobile wallet feature)

*#7370#=Soft-format the memory (Symbian)

*#7780#=Reset to factory defaults, confirmation required (also known has a Hard-format), all phone
contents will be wiped clean



Vodafone Hack For Free GPRS



This method has been tested on different mobiles and has been confirmed to be working.
Followng are the Settings you require to configure on your Mobile:
Account Name: Vodafone_gprs
Homepage: http://live.vodafone.in/
User Name: (no need)
Pass: (no need)
Access Point Settings :-
Proxy: Enabled
Proxy Address: 10.10.1.100
Proxy Port: 9401
Data Bearer: Packet Data
Bearer Settings :-
Packet Data Access Point: portalnmms
Network type: IPV4
Authentication: normal
User Name: (no need)
Password: (no need)
*IF that happen this settings is not working then change the proxy portnumber to:-
Proxy Port: 9401



Airtel hack


Now a days Airtel gives New option to the Subscriber to access Mobile Officedaily @ Rs.25.00/- per day. But this is too Costly.
Only 24 hours and the cost is Rs.25.00 Oh GOD!!
But I got a Trick that’s help me to Activate my Mobile Office whole 30 days only for 25.00/. Its really good.
Just follow the Trick-
1) Your account balance should be above 25.00 for the first time.
2) Activate your mobile office by dialing *444*1#. You will Activate your Mobile Office in the Morning.
3) You got an Activation msg. Your account should deducted by Rs. 25.00/-
4) After that your can enjoy mobile office for 24 hours.
5) But for unlimited access you will do this :: Just switch off your mobile from 7.00 am to 10.00am. and your account balance should be below 25.00 /
6) Just try it enjoy the whole world only by 25.00.
I am Sure you should be Benefited. JUST TRY IT!!!!!!!!!


Docomo hack

The Trick uses Normal Handler Apps like Opera Mini 5, Opera Mini 4.2, Etc.  Just Download Any Handler App and Put The Proxy Server As "203.101.45.215" Instead Of"DIVEIN.TATADOCOMO.COM".   Use Default Dive In Settings. Speed is tremendous in my Area. Almost 20-22 Kbps.






Tata Docomo free gprs



free gprs trick for free surfing and downloading in mobile. This moded software is only for symbian mobile and not for java supportable mobile.. Read out full post to know more
Download Ucweb v7.0 moded for Tata Docomo For Free Surfing And Downloading.
here is the awaited ucweb no balance deduct proxified version and tested by me , this is my own mod and tested on n70 , no balance deduct
steps:-
You Must have Minimum 1 rs balance
Download our ucweb v7.0 Moded for docomo ( for symbiam users only like N70 )
Use default tata docomo dive In settings and change its proxy to 10.124.94.9
And enjoy free surfing and downloading...




BSNL hack



Here is a 100 % working trick to unlimited use BSNL 3G at the cost of
Normal GPRS
First of all Buy a normal 2g bsnl's sim card and keep balance 50+ rs.
now activate gprs by sending sms GPRS PRE to 53733 It will be
actrivated in 24 hours, after activation get gprs settings by calling c.care
Now do e-recharge with 230 rs (or whatever unlimited plan exists in your area)
in it, After activation You have to chnage only one thing in yor 3G enabled cell.
Go to settings>tools>settings>phone&g t;network>network mode> now select UMTS
THEN do manual searching for network u will fing bsnl 3g network there wid small 3g logo along wid its name,select it as default


Now see your data singnals logo..... vola it is converted into 3G
You will get near about 500kbps to 1200 kbps speed
Remember use BSNLEGPRS or BSNLPREPAID as ur access point







Nokia Phone Secrets



First things first, Nokia is a worldwide Corporation which owns 36% of the market share. So no doubt alot of you own a Nokia mobile, whether it be CDMA or GSM.
CDMA : Is a phone which does not need a sim card to run, it just stores everything on the phone.
GSM : Is a phone which has a SIM card (like Vodafone)
There are several codes that you can use on Nokia's, i will run through these in this article.
(Stand-by mode is the main/home screen which displays your battery charge and signal)
(NOTE: The Service Programming Menu only works on CDMA phones)
-------------------------------
1. Service Programming Menu - *3001#12345#
This menu is the mother of all Nokia codes, you can edit your phone like mad here, most of these menus your service provider probably doesn't want you to have the ability to do. So here we go.
On stand-by mode, type in *3001#12345# and wait a few seconds for it to load up. Once the screen comes up you will have several options, all with different functions. (NOTE: this menu differs on different phones.)
1. NAM 1
2. Change SPC
3. Security
4. Server addr.
5. SW version
6. Serial number
7. Programmed
8. Field test
-------------------------------------------
1. NAM 1 (* means explained below)
This is the most useful menu your phone has, it allows you to edit the heck out of your phone! inside NAM 1 there are these different menus:
Own number*
Mobile ID number
A-key code
Alpha tag*
Emergency*
Service No.
CDMA settings
NAM status
Own number:
Self explanitory, but if you want a new number then this is where you want to go. Just enter this menu followed by the SPC (see Change SPC) then change your number. This DOES work, but the new phone number you want must not already be in use.
Alpha tag:
You know on the standby screen, there's the "Vodafone" or "Telecom" or "T-Mobile" that appears? well now you can get rid of that annoying tag. Change this to whatever you please, just to make your phone more personalised.
Emergency:
This menu is basically a menu which displays all the numbers that will divert to the emergency number of your area. For example, if you live in USA and your emergency number is 911, in this menu there will be "911","811", "991" and the obvious numbers that you may type in while trying to reach 911. It's smart not to mess with these, because you never know when you'll be in an emergency. There should be some free slots so why not add in a couple more numbers that you want to divert to your emergency?
Some people think "Wow! emergency number! that calls for free, so maybe if i put in my friends number then it will give me free calls to him/her!" WRONG. This menu can NOT give you free calls. If you were to put in your friends number, then whenever you called them you would end up calling the emergency line - as that's what you're diverted to! REMEMBER THIS!
------------------------------------------
2. Change SPC
The SPC is the Service Programming Code. This code is rather hard to come across, as the service providers try to hide it from the public so they can't access these places on their phones. But luckily enough if you live in New Zealand then here is the code :)
147359 - Is the default code that will let you into 'almost' anything
665*** - Is the 'master' code, that will let you into anything you like.
(The *** is the last 3 digits of your Nokia model, for example: If your Nokia was model number '8734', then your master code will be '665734'. The 665 is the default number for the Nokia company.)
So, this menu just means you can change the code. NOTE: Some mean stores when you buy the phone tend to access this menu and change it so that the owner can't access it :( that is not always the case though, so try it out!
-------------------------------------------
3. Security
This menu just shows you the security code that is installed on your phone, couldn't be more bland.
FUN TRICK: why not have a look at your friend/work mates' phone and access this menu, you could then see their security code or change it just for fun :) But we're nice people and that's naughty, so we arn't going to do that are we..
------------------------------------------
4. Server addr.
This is the server address of your service provider. Nothing you can do here.
------------------------------------------
5. SW version
Once again, another menu with not alot of meaning. All you can do in here is check out when your phone was activated, and what version software it is running. This can also be accessed on GSM phones (see below)
------------------------------------------
6. Serial number
This is your serial number. DUH.
It would be a wise idea to jot this down somewhere safe, because this could be useful. If your phone was ever lost or stolen then you could contact your service provider and give them this code. This would let them shut the phone down so that your robber couldn't use your phone - or access anything on it for that matter.
------------------------------------------
7. Programmed
This is just a menu that you can only access once, which lets you type in when your phone was programmed.
Seem like the menus are getting lamer? Wait for the next one..
---------------------------------------------
8. Field Test
This is an option which is quite cool really. Go into Field test and change "Disabled" to "Enabled". Then get out of the whole service programming menu.
Now, turn your phone off, and back on again.
Once it loads up go to your normal menu and scroll to the bottom. Notice you have just added a new menu to your phone? It is called Net Monitor.
Net Monitor speaks for itself, with this option you can monitor your network to a small extent.
Enter Net Monitor and it will prompt you with "Group/display:" enter in 3101 and press OK.
It should take you back to your standby screen, nothing will have changed. But wait a few seconds and then all these numbers will appear on your screen. What do they mean?
There is only one number you can really understand in this menu. This number is located as the third number down, it will say something like "-50" (the 50 can range anywhere from 10 to 99). This is how strong the signal is.
For example : If your phone displayed -10 here then it's telling you that your neighbour is a cell site and your signal is really really good.
If your phone displayed -90 then it's basically telling you that where you live or where you are at that certain time has really bad signal.
You will notice that as you get closer/further away to a cell site this number will grow or decrease.
------------------------------------------------
That sums up the Service Programming Menu, and the extra things your service provider doesn't want you doing :}
There are many other codes that you can use on CDMA phones, just search around for them.
Extra Codes:
*#66767# - This code when spelt out is "NO-SMS", so shouldn't that mean no texting? well, yes. If you enter this code in on your phone then you will no longer have the ability to "Create Message" or "Reply". If you're really mean then enter it on your brother or sisters phone, that's sure to give you some laughs. You can bring them back again by re-entering the code.
*#639# - This brings you to the menu which just re-programs your phone faster. I wouldn't reccomend you doing this if you value your phone.
*#7780# - This takes you to a menu which says "Restore Factory Settings", i think you understand what will happen if you press yes :p
GSM Code:
This is the only GSM code i know from the top of my head, just search around for more as I'm sure they're out there.
*#0000# - This is probably the most useless code you can find, but anyway it just gives you information on when your phone was activated. If your phone was sent in for repair, then this date will have changed to the date when it was fixed.

Best E-Books !!!!!!!!

Download all coding languages E-books free here :)


1. For C language click 


          


















2.For C++ language click


         






3. For C# language click 


               




  



4. For Java language click 

          




5. For HTML language click 

            



6. For Php e-book click


          














7. For Photoshops E-books click


              















Free Certified Ethical Hacking (C|EH) Traning

"Hacksploit" Free Certified Ethical Hacker (C|EH) Traning 

"Hacksploit" a free Online Certified Ethical Hacker(C|EH) Traning program launched by www.freehacking.in  and powered by "Cyber Squad" . Traning will start from  15th June onwords.





Here you will be provided free Certified Ethical Hacking Traning online with professionally made vedios and written material with hands on practices in presense of skilled ethical hackers and team of "Cyber Squad".
"Hacksploit" traning programm will include all the modules of C|EH and latest vulnerablities and cyber crime cases.


We will start from the very basic level to advanced level so that new  bies can understand much clearly !! 


please subscribe below and grab the full course
Enter your email address:


Delivered by FeedBurner


Eligliblity :
1. You must have some basic knowledge of internet.
2. You must not use this free education for the wrong use.
3. Students of any age can grab this course.

Key Points :
1. "Hacksploit" traning program is 100% free C|EH traning  
    program
2. Traning program will start form 15th june,2011 onwords .
3. In order to grab the complete course you must come online
     daily.
4. If you have any questions ,you can simply comment. our 
     experts will reply soon.
5. After the traning program a online test will be organised.


Awards :
 1. 1st Luckey winner will get chance to work with the team 
     of "Cyber Squad" in solving Cyber Cases .
 2. Top 3 winners will get certificate from "Cyber Squad"
 3. Top 3 selected subscribers will get free domain names.
 4. Next 5 selected subscribers will be get free  T-shirts.

Terms & Conditions Apply ......................

Download Free Premium Magzine Blogger Themes

Download free premium themes At www.freehacking.in

Wanted: Indian Internet workers. Earn Rs.2000/day working part time on internet.


Wanted: Indian Internet workers. Earn Rs.2000/day working part time on internet.
Dear Friends, Are you interested to make Rs.2,000 to Rs.3,000 A Day with part time jobs? This is not a get rich quick scheme. This is a legal opportunity to earn money online when you do it as part time jobs. This opportunity is a proven way to make Rs.20,000 to Rs.1,20,000 A month. There are already 3,00,000 people around the world grabbed this opportunity and making tons of money every month. If you are interested to know more about this opportunity, visithttp://www.earnparttimejobs.com/index.php?id=3394657

Start Recieving Checks Weekly!!!!!

Yeah its true !!!! You can start recieving checks weekly . Simply join us and start your earnigs!!!!

U CAN JOIN US:


* If u are student
* If u are graduate
* If u are jobless
* If u are profetional
* If u are web developer
* If u want to start your buissness. 


No basic skill or knowledge is required..we will give u traning and certificate and many more stuffs..



Stop googling the ways of earnings..............Just call me and c how your life change.....You can earn upto 80000 per month + 6000 per week .

Just pick you cellphone and make a call......

Sachin Chauhan
9958489879







Proof Of Income :- This is weekly income of Gurkirat singh ....!!!





Talk free on Internet using VOIP !!!!!!

I found many people googling the ways to call free to their friends and relatives,but the result they got is a thumb.So i found a method by which we can call free to anyone,method is Voip (voice over internet protocol).

Steps To Follow :

1.GO AND DOWNLOAD THE SOFTPHONE FROM here

2.CREATE ACCOUNT FROM THIShere

 NOTE( no need for buying credit just give your email id confirm it and u will be provide one number ..note down that number ..


3.INSTALL THE SOFTPHONE X-LITE

4.GO INTO THE OPTION MENU..SIP ACCOUNT SETTING 5.THAN CLICK ON ADD

6.CHECK THIS SNAP here AND DO THE SETTING AS GIVEN IN THE SNAP THAN DO APPLY AND OK....CLOSE THE WINDOW..

7>YOU WILL GET THE MESSAGE ON THE SCREEN OF SOFTPHONE(X-LITE) READY ,,AND NUMBER **** THAT U HAD PROVIDED ..

8>NOW IT'S DONE DO THIS SETTING WITH ETERNALLY TWO OR MORE THAN TWO FRIEND'S AND U WILL BE ABLE TO TALK WITH EACH OTHER FOR FREE WHAT U HAVE TO DO IS JUST DIAL THAT NUMBER ....

BELIVE ME IT'S MORE CLEAR THAN ANY OTHER ....SECURE & EASY WAY
TO TALK WITH EACH OTHER U CAN EVEN TO CONFERENCE TOO...

SO ENJOY AND COMMENT THIS POST ....

Easy Earning for students !!!!!!!!!!!!!!!!!!!

Hi friends this time I got the best offer for the students and people who want to earn more n more money!!!!

Earn upto Rs. 9,000 pm with PaisaLive.com!


I have something interesting for you - you can easily earn regular income online via PaisaLive.com!
It’s really amazing! You get paid to open & read the contents of PaisaLive mails. You also receive special discount coupons, promotions and free passes to various events in your city.
Join now and get Rs. 99 instantly, just for joining. What more, as a special bonus you get paid for inviting your friends also!
Create your PaisaLive Account & refer your friends to earn launch referral bonus on every new registration.

http://www.PaisaLive.com/register.asp?2011540-5192054

                                            OR

                                   CLICK HERE


PaisaLive - Get Paid to read emails...........
 
© Copyright 2010-2011 Learn How To Hack! Learn Ethical Hacking & Download Free Hacking Softwares All Rights Reserved.
Template Design by Free Hacking | Published by Daily News | Powered by Free Hacking.