Saturday 29 September 2012

Should I buy Xperia U ,xperia u owner review

0 comments
Xperia U review 





Continue reading >>

LIST OF ALL THE POST ON THE BLOG

0 comments


LIST OF ALL THE POST ON THE BLOG 

PLEASE USE SEARCH ( at top right corner ) TO FIND THEM
SORRY AS I HAVE NOT PROVIDED THE LINKS

Copy data from scratched disk cd dvd

ddr2 vs ddr3

linux tips and tricks

Siemens Mobile Secret Codes

Virtual Memory Optimization

hard drive gone bad

Get the Most Out of Your DVD Recorder

evolution of computer virus

Dvd Copying/ripping Definitions

DirectX explained

Digital camera guide

computer acronyms

caught a virus

Beep code manual

Bandwidth explained

all about spywares

GUIDE ON FTP

BASIC GUIDE TO INTERNET

reasons why PCs crash


ascii charecter set

Stop A Restart Process

browser hacking and hijacking

system file checker

TCP\IP: A detailed Description

Antivirus Defense

The difference between DVD-R, DVD+R, DVD+RW and DV...

ports virus list

installing windows xp service pack sp2

bypassing CD Protection

Tips And Tricks For Your Windows XP

Tired Of Reinstalling Windows

To Get And Show The Ip Via Javascript

Myths About Safe Surfing

convert binary to text

trojan ports

list of services that can be turned off to speed u...

hacking bios password

How can I uninstall Windows XP and return to my ol...

secret windows xp tricks

recover Unused space on hard drives

how to avoid virus

Using Google for searching ebooks

download torrent using google

warez definations

how to kick someone's ASS!

registry explained

movie jagron

how to read scratched disks

old winipcfg in xp

Who's Seeding the Net With Spyware?

windows 2000 tricks

Change the CHKDSK countdown time

windows shortcut all

xp true hidden files

Window's Tweak: Hack Your Start Button

Windows Xp: Speed Up Your, Speed Up Your Network a...

WINDOWS XP HIDDEN APPS

Hacking Windows XP Registry

Windows XP Startup and Performance Tweaks

amazing windows xp tricks

WinRar Tutorial Compression profiles, passwords an...

Hidden Back-up utility Win XP Tip

Application and Boot file Defrag

Winxp Applications Startup Time, Decrease your App...

system sudddenly stops responding reboot without r...

Winxp Tips And Tricks, Winsock 2 repair

XP REPAIR INSTALL

Win XP Tweaks

yahoo messenger no adds

Windows Xp Tips and Tricks

My Own Home Server

how to unblock myself on facebook

How To Delete Temporary Files in Windows

Perform tweaksand tricks with Google Chrome:flags

Speeding up Firefox the right way according to you...

firefox tweaks tricks

Top 10 Things To Remember Before Installing Window...

How Hackers Work?

Should I buy Xperia U ,xperia u owner review

How to erase youtube history recommended videos f...

VIDEO THAT SHOWS INDIAN WORKING EFFICIENCY


top ebook websites download

Attention LAPTOP Users ! Do your eyes a favor, use...

50 Common Interview Questions & Answers

How to hack Windows XP Admin Password

Firefox Tricks & Tweaks

Hack Youtube To Watch the Best Quality Videos

Hack Admin Password From User Mode

Chat with Friends through ms dos Command Prompt

What does Refresh Desktop or Refresh explorer wind...

Network Hacking

Password Hacking

Shutdown Command Via Command Prompt

Types of viruses

Where The Saved Passwords Stores In Windows Xp & V...

Wireless Hacking

Creating Shutdown Icon or One Click Shutdown:

SPEED UP UR ACROBAT READER ALMOST LIKE NOTEPAD

Top Ten Tips To Improve System Speed

How to Answer The Tough Interview Questions

Interview Questions For Freshers

Shutdown Computer with Your Cell Phone

101 Google tips, tricks and hacks

Windows 7 Keyboard Shortcuts

Difference between Core i3, Core i5 and Core i7

Desktop shortcut for locking your computer

Remove Shortcut From Pen Drive

What happens on the Internet every 60 seconds

NOKIA SECRET CODES

HIDE DATA FOLDER IN MOBILE WITHOUT

New apple iphone 4 full specifiction The next iPho...
Continue reading >>

Speeding up Firefox the right way according to your computer

0 comments

Speeding up Firefox the right way

Speeding up Firefox seems to be a meme going around lately. Most of the tips I’ve seen, though, are only for broadband connections with the latest hardware and only include some of the settings that would affect performance.

The Firefox Tweak Guide has the full details on how to speed up Firefox regardless of your connection or hardware, reprinted in part below. Don’t forget that the easiest way to tweak user files is with chromEdit extension.

 

YOU WOULD ALSO LIKE TO  READ

Common to all configurations


These are the settings that seem to be common to all configuration files regardless of connection speed or computer speed with a couple of additions – plugin paths can be found with about:plugins and the bookmark menu delay is turned off.

user_pref(“network.http.pipelining”, true);
user_pref(“network.http.proxy.pipelining”, true);
user_pref(“network.http.pipelining.maxrequests”, 8);
user_pref(“content.notify.backoffcount”, 5);
user_pref(“plugin.expose_full_path”, true);
user_pref(“ui.submenuDelay”, 0);


Fast Computer Fast Connection


user_pref(“content.interrupt.parsing”, true);
user_pref(“content.max.tokenizing.time”, 2250000);
user_pref(“content.notify.interval”, 750000);
user_pref(“content.notify.ontimer”, true);
user_pref(“content.switch.threshold”, 750000);
user_pref(“nglayout.initialpaint.delay”, 0);
user_pref(“network.http.max-connections”, 48);
user_pref(“network.http.max-connections-per-server”, 16);
user_pref(“network.http.max-persistent-connections-per-proxy”, 16);
user_pref(“network.http.max-persistent-connections-per-server”, 8);
user_pref(“browser.cache.memory.capacity”, 65536);


A couple settings of note – Firefox is allocated 4096 KB of memory by default and in this configuration we give it roughly 65MB as denoted by the last line. This can be changed according to what is used.

Fast Computer, Slower Connection


This configuration is more suited to people without ultra fast connections. We are not talking about dial up connections but slower DSL / Cable connections.

user_pref(“content.max.tokenizing.time”, 2250000);
user_pref(“content.notify.interval”, 750000);
user_pref(“content.notify.ontimer”, true);
user_pref(“content.switch.threshold”, 750000);
user_pref(“network.http.max-connections”, 48);
user_pref(“network.http.max-connections-per-server”, 16);
user_pref(“network.http.max-persistent-connections-per-proxy”, 16);
user_pref(“network.http.max-persistent-connections-per-server”, 8);
user_pref(“nglayout.initialpaint.delay”, 0);
user_pref(“browser.cache.memory.capacity”, 65536);


Fast Computer, Slow Connection


user_pref(“browser.xul.error_pages.enabled”, true);
user_pref(“content.interrupt.parsing”, true);
user_pref(“content.max.tokenizing.time”, 3000000);
user_pref(“content.maxtextrun”, 8191);
user_pref(“content.notify.interval”, 750000);
user_pref(“content.notify.ontimer”, true);
user_pref(“content.switch.threshold”, 750000);
user_pref(“network.http.max-connections”, 32);
user_pref(“network.http.max-connections-per-server”, 8);
user_pref(“network.http.max-persistent-connections-per-proxy”, 8);
user_pref(“network.http.max-persistent-connections-per-server”, 4);
user_pref(“nglayout.initialpaint.delay”, 0);
user_pref(“browser.cache.memory.capacity”, 65536);


Slow Computer, Fast Connection


user_pref(“content.max.tokenizing.time”, 3000000);
user_pref(“content.notify.backoffcount”, 5);
user_pref(“content.notify.interval”, 1000000);
user_pref(“content.notify.ontimer”, true);
user_pref(“content.switch.threshold”, 1000000);
user_pref(“content.maxtextrun”, 4095);
user_pref(“nglayout.initialpaint.delay”, 1000);
user_pref(“network.http.max-connections”, 48);
user_pref(“network.http.max-connections-per-server”, 16);
user_pref(“network.http.max-persistent-connections-per-proxy”, 16);
user_pref(“network.http.max-persistent-connections-per-server”, 8);
user_pref(“dom.disable_window_status_change”, true);


One of the changes made for this particular configuration is the final line where the status bar is disabled for changing web pages to save processor time.

Slow Computer, Slow Connection


We have entered the doldrums of the dial-up user

user_pref(“content.max.tokenizing.time”, 2250000);
user_pref(“content.notify.interval”, 750000);
user_pref(“content.notify.ontimer”, true);
user_pref(“content.switch.threshold”, 750000);
user_pref(“nglayout.initialpaint.delay”, 750);
user_pref(“network.http.max-connections”, 32);
user_pref(“network.http.max-connections-per-server”, 8);
user_pref(“network.http.max-persistent-connections-per-proxy”, 8);
user_pref(“network.http.max-persistent-connections-per-server”, 4);
user_pref(“dom.disable_window_status_change”, true);


YOU WOULD ALSO LIKE TO  READ
Continue reading >>

How Hackers Work?

0 comments



How Hackers Work?
Thanks to the media, the word “hacker” has gotten a bad reputation. The word summons up thoughts of malicious computer users finding new ways to harass people, defraud corporations, steal information and maybe even destroy the economy or start a war by infiltrating military computer systems. While there’s no denying that there are hackers out there with bad intentions, they make up only a small percentage of the hacker community.

The term computer hacker first showed up in the mid-1960s. A hacker was a programmer — someone who hacked out computer code. Hackers were visionaries who could see new ways to use computers, creating programs that no one else could conceive. They were the pioneers of the computer industry, building everything from small applications to operating systems. In this sense, people like Bill Gates, Steve Jobs and Steve Wozniak were all hackers — they saw the potential of what computers could do and created ways to achieve that potential.

A unifying trait among these hackers was a strong sense of curiosity, sometimes bordering on obsession. These hackers prided themselves on not only their ability to create new programs, but also to learn how other programs and systems worked. When a program had a bug — a section of bad code that prevented the program from working properly — hackers would often create and distribute small sections of code called patches to fix the problem. Some managed to land a job that leveraged their skills, getting paid for what they’d happily do for free.

As computers evolved, computer engineers began to network individual machines together into a system. Soon, the term hacker had a new meaning — a person using computers to explore a network to which he or she didn’t belong. Usually hackers didn’t have any malicious intent. They just wanted to know how computer networks worked and saw any barrier between them and that knowledge as a challenge.

In fact, that’s still the case today. While there are plenty of stories about malicious hackers sabotaging computer systems, infiltrating networks and spreading computer viruses, most hackers are just curious — they want to know all the intricacies of the computer world. Some use their knowledge to help corporations and governments construct better security measures. Others might use their skills for more unethical endeavors.

In this article, we’ll explore common techniques hackers use to infiltrate systems. We’ll examine hacker culture and the various kinds of hackers as well as learn about famous hackers, some of whom have run afoul of the law.

The Hacker Toolbox

The main resource hackers rely upon, apart from their own ingenuity, is computer code. While there is a large community of hackers on the Internet, only a relatively small number of hackers actually program code. Many hackers seek out and download code written by other people. There are thousands of different programs hackers use to explore computers and networks. These programs give hackers a lot of power over innocent users and organizations — once a skilled hacker knows how a system works, he can design programs that exploit it.

Malicious hackers use programs to:


Log keystrokes: Some programs allow hackers to review every keystroke a computer user makes. Once installed on a victim’s computer, the programs record each keystroke, giving the hacker everything he needs to infiltrate a system or even steal someone’s identity.

Hack passwords: There are many ways to hack someone’s password, from educated guesses to simple algorithms that generate combinations of letters, numbers and symbols. The trial and error method of hacking passwords is called a brute force attack, meaning the hacker tries to generate every possible combination to gain access. Another way to hack passwords is to use a dictionary attack, a program that inserts common words into password fields.

Infect a computer or system with a virus: Computer viruses are programs designed to duplicate themselves and cause problems ranging from crashing a computer to wiping out everything on a system’s hard drive. A hacker might install a virus by infiltrating a system, but it’s much more common for hackers to create simple viruses and send them out to potential victims via email, instant messages, Web sites with downloadable content or peer-to-peer networks.

Gain backdoor access: Similar to hacking passwords, some hackers create programs that search for unprotected pathways into network systems and computers. In the early days of the Internet, many computer systems had limited security, making it possible for a hacker to find a pathway into the system without a username or password. Another way a hacker might gain backdoor access is to infect a computer or system with a Trojan horse.

Create zombie computers: A zombie computer, or bot, is a computer that a hacker can use to send spam or commit Distributed Denial of Service (DDoS) attacks. After a victim executes seemingly innocent code, a connection opens between his computer and the hacker’s system. The hacker can secretly control the victim’s computer, using it to commit crimes or spread spam.

Spy on e-mail: Hackers have created code that lets them intercept and read e-mail messages — the Internet’s equivalent to wiretapping. Today, most e-mail programs use encryption formulas so complex that even if a hacker intercepts the message, he won’t be able to read it.

Hacker Culture

Individually, many hackers are antisocial. Their intense interest in computers and programming can become a communication barrier. Left to his or her own devices, a hacker can spend hours working on a computer program while neglecting everything else.

Computer networks gave hackers a way to associate with other people with their same interests. Before the Internet became easily accessible, hackers would set up and visit bulletin board systems (BBS). A hacker could host a bulletin board system on his or her computer and let people dial into the system to send messages, share information, play games and download programs. As hackers found one another, information exchanges increased dramatically.

Some hackers posted their accomplishments on a BBS, boasting about infiltrating secure systems. Often they would upload a document from their victims’ databases to prove their claims. By the early 1990s, law enforcement officials considered hackers an enormous security threat. There seemed to be hundreds of people who could hack into the world’s most secure systems at will [source: Sterling].

There are many Web sites dedicated to hacking. The hacker journal “2600: The Hacker Quarterly” has its own site, complete with a live broadcast section dedicated to hacker topics. The print version is still available on newsstands. Web sites like Hacker.org promote learning and include puzzles and competitions for hackers to test their skills.

When caught — either by law enforcement or corporations — some hackers admit that they could have caused massive problems. Most hackers don’t want to cause trouble; instead, they hack into systems just because they wanted to know how the systems work. To a hacker, a secure system is like Mt. Everest — he or she infiltrates it for the sheer challenge. In the United States, a hacker can get into trouble for just entering a system. The Computer Fraud and Abuse Act outlaws unauthorized access to computer systems [source: Hacking Laws].
Hackers and Crackers

Many computer programmers insist that the word “hacker” applies only to law-abiding enthusiasts who help create programs and applications or improve computer security. Anyone using his or her skills maliciously isn’t a hacker at all, but a cracker.

Crackers infiltrate systems and cause mischief, or worse. Unfortunately, most people outside the hacker community use the word as a negative term because they don’t understand the distinction between hackers and crackers.

Not all hackers try to explore forbidden computer systems. Some use their talents and knowledge to create better software and security measures. In fact, many hackers who once used their skills to break into systems now put that knowledge and ingenuity to use by creating more comprehensive security measures. In a way, the Internet is a battleground between different kinds of hackers — the bad guys, or black hats, who try to infiltrate systems or spread viruses, and the good guys, or white hats, who bolster security systems and develop powerful virus protection software.

Hackers on both sides overwhelmingly support open source software, programs in which the source code is available for anyone to study, copy, distribute and modify. With open source software, hackers can learn from other hackers’ experiences and help make programs work better than they did before. Programs might range from simple applications to complex operating systems like Linux.

There are several annual hacker events, most of which promote responsible behavior. A yearly convention in Las Vegas called DEFCON sees thousands of attendees gather to exchange programs, compete in contests, participate in panel discussions about hacking and computer development and generally promote the pursuit of satisfying curiosity. A similar event called the Chaos Communication Camp combines low-tech living arrangements — most attendees stay in tents — and high-tech conversation and activities.

In the next section, we’ll learn about hackers and legal issues.

Hackers and the Law


In general, most governments aren’t too crazy about hackers. Hackers’ ability to slip in and out of computers undetected, stealing classified information when it amuses them, is enough to give a government official a nightmare. Secret information, or intelligence, is incredibly important. Many government agents won’t take the time to differentiate between a curious hacker who wants to test his skills on an advanced security system and a spy.

Laws reflect this attitude. In the United States, there are several laws forbidding the practice of hacking. Some, like 18 U.S.C. § 1029, concentrate on the creation, distribution and use of codes and devices that give hackers unauthorized access to computer systems. The language of the law only specifies using or creating such a device with the intent to defraud, so an accused hacker could argue he just used the devices to learn how security systems worked.

Another important law is 18 U.S.C. § 1030, part of which forbids unauthorized access to government computers. Even if a hacker just wants to get into the system, he or she could be breaking the law and be punished for accessing a nonpublic government computer [Source: U.S. Department of Justice].

Punishments range from hefty fines to jail time. Minor offenses may earn a hacker as little as six months’ probation, while other offenses can result in a maximum sentence of 20 years in jail. One formula on the Department of Justice’s Web page factors in the financial damage a hacker causes, added to the number of his victims to determine an appropriate punishment [Source: U.S. Department of Justice].
Hacking a Living
Hackers who obey the law can make a good living. Several companies hire hackers to test their security systems for flaws. Hackers can also make their fortunes by creating useful programs and applications, like Stanford University students Larry Page and Sergey Brin. Page and Brin worked together to create a search engine they eventually named Google. Today, they are tied for 26th place on Forbes’ list of the world’s most wealthy billionaires [source: Forbes].

Other countries have similar laws, some much more vague than legislation in the U.S. A recent German law forbids possession of “hacker tools.” Critics say that the law is too broad and that many legitimate applications fall under its vague definition of hacker tools. Some point out that under this legislation, companies would be breaking the law if they hired hackers to look for flaws in their security systems [source: IDG News Service].

Hackers can commit crimes in one country while sitting comfortably in front of their computers on the other side of the world. Therefore, prosecuting a hacker is a complicated process. Law enforcement officials have to petition countries to extradite suspects in order to hold a trial, and this process can take years. One famous case is the United States’ indictment of hacker Gary McKinnon. Since 2002, McKinnon fought extradition charges to the U.S. for hacking into the Department of Defense and NASA computer systems. McKinnon, who hacked from the United Kingdom, defended himself by claiming that he merely pointed out flaws in important security systems. In April 2007, his battle against extradition came to an end when the British courts denied his appeal [Source: BBC News].

In the next section, we’ll look at some famous and notorious hackers.
_________________________________________________________________________________
Famous Hackers




Steve Jobs and Steve Wozniak, founders of Apple Computers, are both hackers. Some of their early exploits even resemble the questionable activities of some malicious hackers. However, both Jobs and Wozniak outgrew their malicious behavior and began concentrating on creating computer hardware and software. Their efforts helped usher in the age of the personal computer — before Apple, computer systems remained the property of large corporations, too expensive and cumbersome for average consumers.

Steve Jobs Stev Wozniak Apple I Apple IIc
_________________________________________________________________________________



Linus Torvalds, creator of Linux, is another famous honest hacker. His open source operating system is very popular with other hackers. He has helped promote the concept of open source software, showing that when you open information up to everyone, you can reap amazing benefits.

_________________________________________________________________________________


Richard Stallman, also known as “rms,” founded the GNU Project, a free operating system. He promotes the concept of free software and computer access. He works with organizations like the Free Software Foundation and opposes policies like Digital Rights Management.
_________________________________________________________________________________

On the other end of the spectrum are the black hats of the hacking world. At the age of 16, Jonathan James became the first juvenile hacker to get sent to prison. He committed computer intrusions on some very high-profile victims, including NASA and a Defense Threat Reduction Agency server. Online, Jonathan used the nickname (called a handle) “c0mrade.” Originally sentenced to house arrest, James was sent to prison when he violated parole.



Kevin Mitnickgained notoriety in the 1980s as a hacker who allegedly broke into the North American Aerospace Defense Command (NORAD) when he was 17 years old. Mitnick’s reputation seemed to grow with every retelling of his exploits, eventually leading to the rumor that Mitnick had made the FBI’s Most Wanted list. In reality, Mitnick was arrested several times for hacking into secure systems, usually to gain access to powerful computer software.






Hacker Kevin Mitnick, newly released from the Federal Correctional Institution in Lompoc, California.

------------------------------------------------------------------------------------------------------------



Kevin Poulsen, or Dark Dante, specialized in hacking phone systems. He’s famous for hacking the phones of a radio station called KIIS-FM. Poulsen’s hack allowed only calls originating from his house to make it through to the station, allowing him to win in various radio contests. Since then, he has turned over a new leaf, and now he’s famous for being a senior editor at Wired magazine.

Group photo of Adrian Lamo(left)Kevin Mitnick (center), and Kevin Lee Poulsen(right) circa 2001
File:Lamo-Mitnick-Poulsen.png


Adrian Lamo hacked into computer systems using computers at libraries and Internet cafes. He would explore high-profile systems for security flaws, exploit the flaws to hack into the system, and then send a message to the corresponding company, letting them know about the security flaw. Unfortunately for Lamo, he was doing this on his own time rather than as a paid consultant — his activities were illegal. He also snooped around a lot, reading sensitive information and giving himself access to confidential material. He was caught after breaking into the computer system belonging to the New York Times.


It’s likely that there are thousands of hackers active online today, but an accurate count is impossible. Many hackers don’t really know what they are doing — they’re just using dangerous tools they don’t completely understand. Others know what they’re doing so well that they can slip in and out of systems without anyone ever knowing.
Continue reading >>

Friday 28 September 2012

how to kick someone's ASS!

0 comments

http://www.thingsthatmustdie.com/blog/wp-content/uploads/2010/06/ass-kicker.jpg

How to kick some-one's ASS!  
___________________________

This letter should not be read by Minors! Or those Sick in the Head!!!
___________________________

Welcome back to another one of the King's addition of Violence. This a good
way to deffand your-self if you come to a situation and you must use
physical force. Now just follow these ruls when you fight and you might just
Win. but only if you know what to do!



1. If some jerky comes up to you and tells you to fuck right off you can do
one of two things. you can a insult him back or b hit him hard in the
gut.
2. If you done A in number one you can expact him to hit you. Look at his
hands the one you see moving back is the one that is going to hit you with
so look and when he puls it up move your hand up and block it. then with
your other free hand hit him on the jaw! (if you put a lot of power into it
you might even knock him out!) O
3. If you done B in number one and he does't hit you back and runswalks away
then you might get charged! but if he hits you back then grab his shirt
coler with your weak hand and with your powerful hand hit him non-stop
in the jaw,nose, or for-head (constant hiting in these areas may make him
k.o. (k.o.=knock out!) 0
4. Now let me tell you about weapons (scince the rest is based on weapons!)
anything can be a weapon when you fight! even a simple twig! how can a
twig be a weapon you ask Well if you are on the ground get up holding
the twig and stab him in the leg! (he wont kick your ass anymore! trust
me on that one!) well back to weapons! If your walking along the
side-walk and some one grabs you around the neck holding a knife and
threating to cut your neck grab his arm, lung the arm stright over your
sholder and pull it down (you will snap elbo the joint.)
5. If some one is holding a knife to you (must be a few inches from you) as
he blinks use your right hand to hit him right on the palm, as your
doing that, with your left hit him on the nuckles of the same hand
if you hit him hard enough you'll pop his hand off the socket!
as he is screaming grab his head pull it down towards your waste lift
your knee and slam it in his Face (the fucker will go down! then you can
call the cops or steel his money and WALK away! if you run some one will
call the cops on you. Only run if the cops are coming after you.!
6. THE BATTAL IN THE SCOOL YARD!
If the bully picks on you, you must kick his ass for the chicksguys
there. When he comes towards you he might whant something in your lunch-
box. But what he doesent know WILL hurt him!
Let your mom but HOT, REALLY HOT coffe in your thermiss as he grabs you
tell him you got some good Necter to offer him. as he looks throw the
coffe in his face as he grabs his face knee him in the balls.
he'll go down! If you relly hate him grab a hand full of sand and put
in his mouth. If he is k.o'ed kick him in the ribs!
when the cops come tell them it was Self Deffance! you'll get off scot-
free and you'll have all the chicksguys!! )
7. When on the street and some punk comes up to you and whants to fuck you
up hit him in the nose with all your might (I had fights with these ass
holes and they are relly hard! Its like there bones wont break I only
lost once to them and thats because I had a few jump me as he was
losing. If you dont have a lot experance run from them.)
well i will tell you what to do if you are experanced.
Grab any thing hard near by and SMACK the fuck'in guy in the head!
when the others rush you Kick,Smack,And hit anywhere., where ever you
land them is good! (hope you can take them!) 0
8. Well im tired of writing so if you whant more wait and call the bbs where
you got this at! Or in the next issue i'll include a form that you can send
money to so if every thing goes well I will put up a bbs and with all the
info on sports,fights,sex, and more fights you can be a major Stud like
the king & the Fly

So I hope all your problems have been

HAPPY ASS-KIKING )  O 0


PS (from the fly)
The king is a good fighter dont take this as a joke! We spent a lot
of hard work on this (the fighting and all!) so if you get in a fight
and use this and lose dont blame us it's your fault becasue you might
not be expreanced enough! so be ready for a fight! (I know i am!)!
Continue reading >>

Friday 7 September 2012

firefox tweaks tricks

0 comments

A handful of Firefox tweaks that will double your browser speed

Firefox users take note: You need to do this. Now. As in, this instant. More savvy users are probably already familiar with editing Firefox’s configuration file but whether you’re a computer rookie or a seasoned veteran, Gnoted has issued a handful of tweaks that really get Firefox cooking. As much as we all love the fox, it can get a bit slow on occasion – especially if you’re like us and have 35 open tabs spread across four windows at any given time. By tweaking the way Firefox handles some caching functions, you can dramatically improve page load speed and even prevent Firefox from hogging your system resources while minimized. If you don’t currently have any experience playing with your configuration file, don’t be scared. Just follow the simple instructions, take your time and if you want a security blanket to squeeze, jot down each setting before you change it so you can always restore the default configuration if need be. So without further ado, hit the jump and get tweaking – just remember to restart Firefox when you’re done.

 

YOU WOULD ALSO LIKE TO  READ

Reduce the amount of RAM Firefox uses for its cache feature

1. Type “about:config” (no quotes) in the adress bar in the browser.
2. Find “browser.sessionhistory.max_total_viewer
3. Set it’s value to “0“;(Zero)

Increase the Speed at Which Firefox loads pages

1. Type “about:config” into the address bar and hit Enter.
(Normally the browser will make one request to a web page at a time. When you enable pipelining it will make several at once, which really speeds up page loading.)
2. Alter the entries as follows:
Set “network.http.pipelining” to “true
Set “network.http.proxy.pipelining” to “true
Set “network.http.pipelining.maxrequests” to some number like 10.
This means it will make 10 requests at once.
3. Lastly, right-click anywhere and select New-> Integer. Name it “nglayout.initialpaint.delay” and set its value to “0“;.(Zero)
This value is the amount of time the browser waits before it acts on information it receives. If you’re using a broadband connection you’ll load pages faster now.
Optionally (for even faster web browsing) here are some more options for your about:config (you might have to create some of these entries by Right Click –> New– > Interger or String
network.dns.disableIPv6: set “false”
content.notify.backoffcount”: set “5“; (Five)
plugin.expose_full_path”: set “true”.
ui.submenuDelay”: set “0; (zero)

Reduce RAM usage to 10MB when Firefox is minimized:

This little hack will drop Firefox’s RAM usage down to 10 Mb when minimized:
1. Open Firefox and go to the Address Bar. Type in about:config and then press Enter.
2. Right Click in the page and select New -> Boolean.
3. In the box that pops up enter “config.trim_on_minimize”. Press Enter.
4. Now select True and then press Enter.
5. Restart Firefox. 

YOU WOULD ALSO LIKE TO  READ
Continue reading >>

Wednesday 15 August 2012

Copy data from scratched disk cd dvd

0 comments

 

It may take time ,but there are large chances that you will be able to recover your data. 
VERY useful for cyclic data redundancy errors .

Roadkil's Unstoppable Copier screenshot 1 - Roadkil's Unstoppable Copier will help you recover data from scratched or damaged disks including floppy, DVD, CD and hard disks
It does not matter what type of media you choose to store your data onto, whether it's a floppy disk, HDD, CD or DVD, there's a big possibility that your storage device could get damaged, especially if it's used or moved quite often.

Roadkil's Unstoppable Copier comes as a solution if you are faced with this type of problem.

The program comes with a simple and user-friendly interface. More than that, all the major options are very easy to find and understand, in case you're a computer novice.

Basically, the program will copy all the files found on your desired source and try to repair the corrupt ones. Details such as the file name, size, integrity and transfer status are displayed after the program has finished copying the all the files.

If you are interested in viewing how many corrupt bytes were transferred, the total number of copied files, the amount of read errors or other information that's related to the file transfer, you can see all these details in the lower part of the application window.

The Batch Mode tab will let you use Roadkil's Unstoppable Copier as a backup tool. You can create transfer lists and save them, so that they can be used at any time in the future. Moreover, if you want to keep it simple, you can choose to perform your transfers from command line.

Roadkil's Unstoppable Copier does come with a couple of other noticeable features that you can choose to activate or deactivate from the Settings tab.

First of all, you'll be able to adjust the type of data recovery. The best and the fastest are the two extremes. You'll be able to recover your files better when choosing best, but it does take more time. The slider will allow you to select what exactly do you want to lose or gain more, time or quality.

Also, if you want to log all your actions, all you have to do is check the appropriate checkbox.

Roadkil's Unstoppable Copier is a simple tool that can help you restore the files you want, and, what's even better, is that the included backup tool can come in really useful.

Continue reading >>

Wednesday 25 July 2012

ddr2 vs ddr3

0 comments


DDR2 VS DDR3


DDR2 (Double Data Rate 2) memory has been available for quite some time. New computers, even computers released within the last three years or so come equipped with DDR2 memory. An improvement over DDR memory, DDR2 produces faster performance with less energy consumption. With the way that DDR memory products are designed, none is backwards or forward compatible with the other. For example, if you have DDR memory, you will not be able to upgrade using DDR2 or DDR3 memory. You can only upgrade DDR memory with other DDR memory. 

As for DDR3, it is essentially doing what DDR2 has done with DDR. DDR3 performs faster, and consumes less power as it works. The past year has seen a steady decline in price with DDR3, and it currently is about on par in price range with DDR2. More specific information in regards to performance and price will be discussed below. 

Performance Differences 

DDR3 uses significantly less power, and can run much faster. It uses 1.5V per chip, which is 0.3V less than DDR2. Additionally, when it comes to its Data rate, DDR2 (depending on its chip) can run at 400-1066 MT/s (megatransfer per second). In regards to its peak transfer rate, it can transfer from 3200-8533 MB/s. DDR3, on the other hand, can run from 800-2133 MT/s and 6400-17066 MB/s. In regards to the I/O bus clock, DDR2 is only available between 200-800 MHz, whereas DDR3 supports from 400-1600 MHz. Essentially, DDR3, when there are improvements from DDR2, can double in processing power. The fact that DDR3 consumes less power in outperforming DDR2 is impressive. 

Which is the Better Value? 

Ultimately, value comes down with what is best available at the time of purchase, and what your computing needs are. If you are building, or shopping for a new computer and want the best available components available, then DDR3 will suit your needs. Most new computers that are equipped with a double-core, triple-core, or quadruple-core processor will most likely come with DDR3 memory. Although it is possible that some models will still come equipped with DDR2 memory. 

For desktop computers, a 1GB stick of DDR3 can cost up to 750rs or more .  As for DDR2, the prices are more or less the same. The difference is so minimal, it is not even worth mentioning. Though it should be stated that the DDR3 price drop does have something to do with that. Naturally, desktop RAM will always be less expensive than laptop RAM, and consumers must always keep that in mind. 

The better value, due to the recent price drop of DDR3, will definitely have to be DDR3. Do keep in mind that if your current computer supports DDR2 memory, you can only upgrade with DDR2 memory. Same goes with DDR3 and the original DDR memory. 
Continue reading >>

Saturday 21 July 2012

linux tips and tricks

0 comments


LINUX Tips and tricks

Speeding up your hard drive (#1)
Get faster file transfer by using 32-bit transfers on your hard drive

Just add the line:

hdparm -c3 /dev/hdX

to a bootup script.

If you use SuSE or other distros based on SYS V,

/sbin/init.d/boot.local
should work for you.

This enables 32-bit transfer on your hard drive. On some systems it can improve transfer performance by 75%.

To test your performance gain, type:

hdparm -t -T /dev/hdX

Protecting yourself from being a spam base(#2)
Sendmail allows for someone to telnet to port 25 and do an expn (expand) to see what users and aliases are on your machine. Also, vrfy (verify) means someone can get legal e-mail addresses from your box and send spam through your machine.

Don't want that, so look in your /etc/sendmail.cf file for a line that looks like this:

###############
# Options #
###############

Now cut and paste these next few lines below that:

# turning off the expand option and requiring a helo from
# a remote computer
Opnoexpn,novrfy,needmailhelo

Now there is no expansion, no verify, and sendmail requires a helo with a legitimate DNS in order to use the mailer.

Then look in your /etc/mail/aliases file and ensure you have only your own boxen and/or subnet in there as OK or RELAY. That will help cut down on spammers' ability to find relay machines to do their dirty work for them.

Cleaning up Netscape crashes(#3)
You have a tip about Netscape leaving copies of itself running below, but you can make a general shell script to clean up a Netscape crash like this:

#!/bin/sh
#kill.netscape
killall -9 netscape
rm ~/.netscape/lock

Then all your users can use it and clean up the dreaded hundred instances of Netscape running when it crashed. Change netscape to netscape-communicator or netscape-navigator as appropriate

More DOS-like commands(#4)
Many people are moving to Linux because they miss the stability of good old DOS. In that light, many users are typing DOS commands (which originated from UNIX in the first place) that look fine but cause errors. The command "cd.." in DOS is perfectly valid, but Linux balks. This is because "cd" is a command, and any parameter for that command must be separated from the command by a space. The same goes for "cd/" and "cd~". A quick fix is here.

Use your favorite text editor in your home directory to edit the file ".bashrc". The period is there on purpose, this hides the file from normal ls display.

Add the lines:

alias cd/="cd /"
alias cd~="cd ~"
alias cd..="cd .."

And I usually add these...

alias md="mkdir"
alias rd="rmdir -i"
alias rm="rm -i"

and my first and still favorite alias...

alias ls="ls --color"

alias is a powerful tool, and can be used in the .bashrc script as well as from the command line. You can, if you want to spend the time, create your own group of shell commands to suit how you work. As long as you put them in your .bashrc file, they'll be there everytime you log in. Note that if you frequently log in as root, you might want to copy /home/username/.bashrc to /root/.bashrc to keep yourself sane.

Resurrecting corrupted floppies(#5)
Here's how to make a floppy disk with "track-0 bad" reusable again:

If the track zero of a floppy disk is found to be bad, no DOS or Windows utility is going to do anything about it--you just have to throw it in your unrecycle bin.

This tip cannot recover the data, but can make the disk carry things again, at least for the time being (moments of desperation).

How to:

(A) Format the disk with Linux. Build a Linux file system (don't use mformat). I did this some time before by invoking the makebootdisk command (in Slakware) and stopped after the formatting was over. There should be better ways to do it in RedHat 5.2 or other recent versions.

( Reformat the disk with Windows. Use the DOS window and the /u option while formatting.

Using DOS-like commands(#6)
There's a package called mtools which is included with most of the distributions out there.

There are several commands for basic DOS stuff. For example, to directory the floppy drive, type mdir a:. This is rather handy--you don't need to mount the floppy drive to use it.

Other commands are: mattrib , mcd, mcopy, mdel, mformat, mlabel, mren (rename), mmd, mrd, and mtype.

This doesn't work for reading from hard disks. In that case, you would add entries to /etc/fstab, drive type msdos for fat16 partitions, and vfat for fat32.

Copying files from Linux to Windows 98 or 95B (FAT32)(#7)
It's as easy as installing the program explore2fs. It uses a Windows Explorer interface and supports drag-and-drop. I have found it reliable and useful for migrating files from my RedHat 6.1 partition to my Win95B partition quickly and with a minimum of fuss.

It's available free--as all software should be--from this URL:
CODE
http://uranus.it.swin.edu.au/~jn/linux/explore2fs.htm


Installing in partitions(#8)
I am using SuSE Linux, which has some interesting options (I don't know if RedHat or other distributions offer you this, too).

1. You can install Linux on a single file in your Windows Partition. Nice to try it out, but I guess it is not that fast then. You can load it then with a DOS program, loadlin.

2. Use Fips or Partition Magic. Defragment your hard drive (you should do this for Point 1, too) and split it up. I guess most users just have one partition, which you should split up into at least three: one for the Linux files, and a smaller swap partition (take about 32 to 64 MB, depending on your RAM--less RAM needs bigger swap partitions). If you decide later to deinstall Linux you can always delete both partitions and create one big one for Windows again.

Fips is a stupid command line program, but if you're too lazy to read at least a little bit, then you should stop thinking about Linux anyway...

Command Pipelines(#9)
Pipes are easy. The Unix shells provide mechanisms which you can use them to allow you to generate remarkably sophisticated `programs' out of simple components. We call that a pipeline. A pipeline is composed of a data generator, a series of filters, and a data consumer. Often that final stage is as simple as displaying the final output on stdout, and sometimes the first stage is as simple as reading from stdin. I think all shells use the "|" character to separate each stage of a pipeline. So:

data-generator | filter | ... | filter | data-consumer

Each stage of the pipeline runs in parallel, within the limits which the system permits. Hey, look closely, because that last phrase is important. Are you on a uni-processor system because if you are, then obviously only one process runs at a time, although that point is simply nitpicking. But pipes are buffers capable of holding only finite data. A process can write into a pipe until that pipe is full. When the pipe is full the process writing into it blocks until some of the data already in the pipe has been read. Similarly, a process can read from a pipe until that pipe is empty. When it's empty the reading process is blocked until some more data has been written into the pipe.

What is IP masquerading and when is it of use?(#10)
IP masquerading is a process where one computer acts as an IP gateway for a network. All computers on the network send their IP packets through the gateway, which replaces the source IP address with its own address and then forwards it to the internet. Perhaps the source IP port number is also replaced with another port number, although that is less interesting. All hosts on the internet see the packet as originating from the gateway.

Any host on the Internet which wishes to send a packet back, ie in reply, must necessarily address that packet to the gateway. Remember that the gateway is the only host seen on the internet. The gateway rewrites the destination address, replacing its own address with the IP address of the machine which is being masqueraded, and forwards that packet on to the local network for delivery.

This procedure sounds simple, and it is. It provides an effective means by which you can provide second class internet connections for a complete LAN using only one (internet) IP address.

Setting UTC or local time(#11)
When Linux boots, one of the initialisation scripts will run the /sbin/hwclock program to copy the current hardware clock time to the system clock. hwclock will assume the hardware clock is set to local time unless it is run with the --utc switch. Rather than editing the startup script, under Red Hat Linux you should edit the /etc/sysconfig/clock file and change the ``UTC'' line to either ``UTC=true'' or ``UTC=false'' as appropriate.
Setting the system clock(#12)
To set the system clock under Linux, use the date command. As an example, to set the current time and date to July 31, 11:16pm, type ``date 07312316'' (note that the time is given in 24 hour notation). If you wanted to change the year as well, you could type ``date 073123161998''. To set the seconds as well, type ``date 07312316.30'' or ``date 073123161998.30''. To see what Linux thinks the current local time is, run date with no arguments.

Setting the hardware clock(#13)
To set the hardware clock, my favourite way is to set the system clock first, and then set the hardware clock to the current system clock by typing ``/sbin/hwclock --systohc'' (or ``/sbin/hwclock --systohc --utc'' if you are keeping the hardware clock in UTC). To see what the hardware clock is currently set to, run hwclock with no arguments. If the hardware clock is in UTC and you want to see the local equivalent, type ``/sbin/hwclock --utc''


Setting your timezone(#14)
The timezone under Linux is set by a symbolic link from /etc/localtime[1] to a file in the /usr/share/zoneinfo[2] directory that corresponds with what timezone you are in. For example, since I'm in South Australia, /etc/localtime is a symlink to /usr/share/zoneinfo/Australia/South. To set this link, type:

ln -sf ../usr/share/zoneinfo/your/zone /etc/localtime

Replace your/zone with something like Australia/NSW or Australia/Perth. Have a look in the directories under /usr/share/zoneinfo to see what timezones are available.

[1] This assumes that /usr/share/zoneinfo is linked to /etc/localtime as it is under Red Hat Linux.

[2] On older systems, you'll find that /usr/lib/zoneinfo is used instead of /usr/share/zoneinfo. See also the later section ``The time in some applications is wrong''.


Zombies(#15)
What are these zombie processes that show up in ps? I kill them but they don't go away!

Zombies are dead processes. You cannot kill the dead. All processes eventually die, and when they do they become zombies. They consume almost no resources, which is to be expected because they are dead! The reason for zombies is so the zombie's parent (process) can retrieve the zombie's exit status and resource usage statistics. The parent signals the operating system that it no longer needs the zombie by using one of the wait() system calls.

When a process dies, its child processes all become children of process number 1, which is the init process. Init is ``always'' waiting for children to die, so that they don't remain as zombies.

If you have zombie processes it means those zombies have not been waited for by their parent (look at PPID displayed by ps -l). You have three choices: Fix the parent process (make it wait); kill the parent; or live with it. Remember that living with it is not so hard because zombies take up little more than one extra line in the output of ps.


How do i give users an ftp only account (no telnet, etc).(#16)

give them shell which doesn't work, but is listed in /etc/shells
for example /bin/false...


How to do backup with tar?(#17)
You can mantain a list of files that you with to backup into a file and tar
it when you wish.

tar czvf tarfile.tar.gz -T list_file

where list_file is a simple list of what you want to include into the tar

i.e:

/etc/smb.conf
/root/myfile
/etc/ppp (all files into the /etc/ppp directory)
/opt/gnome/html/gnome-dev-info.html


How to keep a computer from answering to ping?(#18)

a simple "echo 1 > /proc/sys/net/ipv4/icmp_echo_ignore_all" will do the
trick... to turn it back on, simply
"echo 0 > /proc/sys/net/ipv4/icmp_echo_ignore_all"

Customizing your directory colors.(#19)
I know a lot of you know the command ls --color. Which displays your directory with colors. But, a lot of people may not know that those colors are customizable. All you need to do is add the following line to your /etc/bashrc file.


eval `dircolors /etc/DIR_COLORS`


And then all of the color configuration can be found in the file /etc/DIR_COLORS



Frozen Xwindow(#20)
If your Xwindow freezes sometimes, here are two ways that you may try to kill your server. The first is the simple simple way of killing your X server the key combination: Ctrl+Alt+Backspace

The second way is a little more complicated, but it works most of the time. Hit Ctrl+Alt+F2 to startup a virtual console, then log in with your user name and password and run:



# ps -ax | grep startx



This will give you the PID of your Xserver. Then just kill it with:



# kill -9 PID_Number



To go back to your first console, just hit Alt-F1



Converting all files in a directory to lowercase.(#21)
#!/bin/sh
# lowerit
# convert all file names in the current directory to lower case
# only operates on plain files--does not change the name of directories
# will ask for verification before overwriting an existing file
for x in `ls`
do
if [ ! -f $x ]; then
continue
fi
lc=`echo $x | tr '[A-Z]' '[a-z]'`
if [ $lc != $x ]; then
mv -i $x $lc
fi
done

Wow. That's a long script. I wouldn't write a script to do that; instead, I would use this command:


for i in * ; do [ -f $i ] && mv -i $i `echo $i | tr '[A-Z]' '[a-z]'`;
done;

on the command line.


Script to view those compressed HOWTOs.(#22)
From a newbie to another, here is a short script that eases looking for and viewing howto documents. My howto's are in /usr/doc/faq/howto/ and are gzipped. The file names are XXX-HOWTO.gz, XXX being the subject. I created the following script called "howto" in the /usr/local/sbin directory:

#!/bin/sh
if [ "$1" = "" ]; then
ls /usr/doc/faq/howto | less
else
gunzip -c /usr/doc/faq/howto/$1-HOWTO.gz | less
fi

When called without argument, it displays a directory of the available howto's. Then when entered with the first part of the file name (before the hyphen) as an argument, it unzips (keeping the original intact) then displays the document.
For instance, to view the Serial-HOWTO.gz document, enter:

$ howto Serial



Util to clean up your logfiles.(#23)
If you're like me, you have a list with 430 subscribers, plus 100+ messages per day coming in over UUCP. Well, what's a hacker to do with these huge logs? Install chklogs, that's what. Chklogs is written by Emilio Grimaldo, grimaldo@panama.iaehv.nl, and the current version 1.8 available from ftp.iaehv.nl:/pub/users/grimaldo/chklogs-1.8.tar.gz. It's pretty self explanatory to install(you will, of course, check out the info in the doc subdirectory). Once you've got it installed, add a crontab entry like this:

# Run chklogs at 9:00PM daily.
00 21 * * * /usr/local/sbin/chklogs -m

Handy Script to Clean Up Corefiles.(#24)
Create a file called rmcores(the author calls it handle-cores) with the following in it:

#!/bin/sh
USAGE="$0 "

if [ $# != 2 ] ; then
echo $USAGE
exit
fi

echo Deleting...
find $1 -name core -atime 7 -print -type f -exec rm {} \;

echo e-mailing
for name in `find $1 -name core -exec ls -l {} \; | cut -c16-24`
do
echo $name
cat $2 | mail $name
done

And have a cron job run it every so often.

Moving directories between filesystems.Quick way to move an entire tree of files from one disk to another (#25)
(cd /source/directory && tar cf - . ) | (cd /dest/directory && tar xvfp -)

[ Change from cd /source/directory; tar....etc. to prevent possibility of trashing directory in case of disaster.]

Finding out which directories are the largest.Ever wondered which directories are the biggest on your computer? Here's how to find out.(#26)
du -S | sort -n

How do I stop my system from fscking on each reboot?(#27)
When you rebuild the kernel, the filesystem is marked as 'dirty' and so your disk will be checked with each boot. The fix is to run:

rdev -R /zImage 1

This fixes the kernel so that it is no longer convinced that the filesystem is dirty.

Note: If using lilo, then add read-only to your linux setup in your lilo config file (Usually /etc/lilo.conf)

How to avoid fscks caused by "device busy" at reboot time.(#28)
If you often get device busy errors on shutdown that leave the filesystem in need of an fsck upon reboot, here is a simple fix:
To /etc/rc.d/init.d/halt or /etc/rc.d/rc.0, add the line

mount -o remount,ro /mount.dir

for all your mounted filesystems except /, before the call to umount -a. This means if, for some reason, shutdown fails to kill all processes and umount the disks they will still be clean on reboot. Saves a lot of time at reboot for me.

How to find the biggest files on your hard-drive.(#29)


ls -l | sort +4n

Or, for those of you really scrunched for space this takes awhile but works great:

cd /
ls -lR | sort +4n

A script for cleaning up after programs that create autosave and backup files.(#30)
Here is a simple two-liner which recursively descends a directory hierarchy removing emacs auto-save (#) and backup (~) files, .o files, and TeX .log files. It also compresses .tex files and README files. I call it 'squeeze' on my system.

#!/bin/sh
#SQUEEZE removes unnecessary files and compresses .tex and README files
#By Barry tolnas, tolnas@sun1.engr.utk.edu
#
echo squeezing $PWD
find $PWD \( -name \*~ -or -name \*.o -or -name \*.log -or -name \*\#\) -exec
rm -f {} \;
find $PWD \( -name \*.tex -or -name \*README\* -or -name \*readme\* \) -exec gzip -9 {} \;

How to find out what process is eating the most memory.(#31)
ps -aux | sort +4n

-OR-
ps -aux | sort +5n

How do I find which library in /usr/lib holds a certain function?(#32)
What if you're compiling and you've missed a library that needed linking in? All gcc reports are function names... Here's a simple command that'll find what you're looking for:

for i in *; do echo $i:;nm $i|grep tgetnum 2>/dev/null;done

Where tgetnum is the name of the function you're looking for.

I compiled a small test program in C, but when I run it, I get no output!(#32)
You probably compiled the program into a binary named test, didn't you? Linux has a program called test, which tests if a certain condition is true, it never produces any output on the screen. Instead of just typing test, try: ./test

Continue reading >>

Siemens Mobile Secret Codes

0 comments

Siemens Mobile Secret Codes:


C25:

SP unlock *#0003*(secret code 8 digits)#

*#0606# shows you Secret Code, but only without SIM Card.

*#06# for checking the IMEI (International Mobile Equipment Identity)

Resets language to automatic selection : * # 0000 # then Green button

Pin Out (electrical connections)

1- GND
2- SB
3- POWER
4- NC
5- TX
6- RX
7- CLOCK
8- DATA
9- GND MIC
10- HF MIC
11- AUDIO
12- GND AUDIO


Languages:

*#0000#+green phone - choose automaticaly
*#0001#+green phone - English
*#0030#+green phone - Greek
*#0031#+green phone - Netherlands
*#0032#+green phone - French
*#0034#+green phone - Spanish
*#0039#+green phone - Italian
*#0049#+green phone - German
*#0090#+green phone - Turkish

How to change PIN:

**04*old PIN*new PIN*new PIN#

How to check simlock status

*#0606# and then press left soft-key, you will see strange characters, then text ("brak blokad"). If you see for example 260-02, it means the phone is locked to Era GSM. In older models you can use *#06# and see the same information after clicking on left key (you will see IMEI and software version).


S4:

Monitor Mode - how to activate:

Press left soft-key, then 9 (SET UP) 8 (Phone Status). You will see IMEI number, then press left soft-key and in order 7684666 and red phone at the end (monitor mode has been activated). To read information from Monitor Mode - press left soft-key, then 5 (GSM SERVICE) and 6 (Monitor). Monitor mode turns off when you switch off the phone. You must activate it again if you want.

How to see date of software:

Press left soft-key, then 9 (SET UP) 8 (Phone status). You will see IMEI number, then press twice left soft-key, 98, left soft-key, 7684666, red phone (activates Monitor Mode), left soft-key, 56 (turns on Monitor Mode), left soft-key, 98, left soft-key, 7684666, hang up (red phone) >abck to "normal" and then left soft-key, 56.

S6, S8:

If you add to phonebook under 'own phone number' +12022243121 with namez (for example MMI), then you will see something smile.gif

S10, E10:

In phonebook enter +12022243121 as your own phone no. You will see a picture with sun, two palms and greetings.

S15e:

Monitor Mode:

Code: *#7436267*8378# (*#SIEMENS*TEST#)
Hold red phone button until it code disapears.
Menu 3.3.4 Choose frequency.
Menu 3.3.4.1 Automaticaly.
Menu 3.3.4.2 Choose GSM-900
Menu 3.3.4.3 Choose GSM-1800

Menu 10.1 MS info
Menu 10.2 Soft date
Menu 10.2.1 Software version.
Menu 10.2.2 EEProm version.
Menu 10.3 Tst and product info.
Menu 10.3.1 Handware data.
Menu 10.3.2 Date of manufacture
Menu 10.3.3 Service date
Menu 10.3.4 Date of repair.


S25:

Enhanced Full Rate
*#3370# turns on
#3370# turns off

Haft Rate Mode
*#4720# turns on
#4720# turns off.

Languages:

*#0000#+green phone - choose automaticaly
*#0001#+green phone - English
*#0030#+green phone - Greek
*#0031#+green phone - Netherlands
*#0032#+green phone - French
*#0034#+green phone - Spanish
*#0039#+green phone - Italian
*#0049#+green phone - German
*#0090#+green phone - Turkish

How to change PIN2?

**04*old PIN2*new PIN2*new PIN2#

What is my software version?

Menu 8-8-2 press left-softkey when you see IMEI number, or *#06# and then green phone button and then press left soft-key.

How to extend battery life:

IrDA - turn on only when you need.
Turn off automatic network search (6-3)Turn off Vibration alarm.

SP unlock *#0003*(secret code 8 digits)#

*#0606# shows you Secret Code, but only without SIM Card.

*#06# for checking the IMEI (International Mobile Equipment Identity)

Resets language to automatic selection : * # 0000 # then Green button



S25, M35, S35, C35

SP unlock *#0003*(secret code 8 digits)#

*#0606# shows you Secret Code, but only without SIM Card.

*#06# for checking the IMEI (International Mobile Equipment Identity)

Resets language to automatic selection : * # 0000 # then Green button






Secret Codes Of Nokia Mobiles:


Below we present secret codes of nokia mobile phones which are very useful for people who unlock phones and for amateurs of this topic. These special key sequences entered fromkeyboard of phone allow you to get some important information like IMEI number, release date, software version and much more. You can also choose default language, activatenetmonitor ect.


1610/1630

*#170602112302# (software version)

1610/1611

IMEI number: -*# 0 6 #
Software version: -* # 1 7 0 6 0 2 1 1 2 3 9 2 #
Simlock status: - # 9 2 7 0 2 6 8 9 #


2110

*#9999# (software version)

2110i/2110e

*#170602112302# or (depends on model)*#682371158412125# (software version)


NOKIA3110

*#06# -IMEI

*#3110# -Software version

##002# - allows to turn off voice mail.

*#7780# - restore factory settings

*#746025625#(or *#sim0clock#) - to check if clock of sim (SIM-Clock) can be stopped (SIM-Clock-stop is akind of standby mode which saces battery)

*#92702689# (or *#war0anty#) -"warranty code:"- you have to enter one of the following codes:

6232 (OK)displays month and year of production date (ie "0198")

7332 (OK) - displays date of last repair - if there is (ie. "DATE NOT SAVED")

7832 (OK) - displays date of purchase - if there is (ie. "DATE NOT SAVED")

9268 (OK) -displays serial number

37832 (OK) -sets purchase date in format MMYY (MM - month, YY - year)- attention: you can set it only once, so beware !

87267 (OK)-displays message "Confirm Transfer?" - meaning is unknown (?)

* # 9 2 7 0 2 6 8 9 # -Simlock info

*#31# (call) -sets if your phone no. will be hidden or not (works only in some networks)

*#76# (call) -sets if target phone number when you call should be displayed (works only in some networks)

*#77# (call) -(work s only in some networks)

*#33/35# (call -displays message "Service not active".

**31# (call) -your no. will not be showed to others when you make a call



3210


*#06# -IMEI

*#0000# -software version

*#92702689# (or *#war0anty#)- enters service mode.

*3370# -Turns on sound encoding system - Enhanced Full Rate.


#3370# -Turns off sound encoding system Enhanced Full Rate .

*4720# -Turns on battery save mode - saves about 30 % of energy.

#4720# -Turns off battery save mode.

xx# -Replace xx with desired phonebook entry - press # and you will see it on display.


51XX


*#06# -IMEI

*#0000# - Software version

*#92702689#( or *#war0anty#) Enter service mode.

*3370# -Turns on sound encoding system - Enhanced Full Rate.

#3370# -Turns off sound encoding system - Enhanced Full Rate.

*4720# -Turns on battery save mode - saves about 30 % of energy.

#4720# -Turns off battery save mode.

#pw+1234567890+1 -provider lock status

#pw+1234567890+2 -Network lock status

#pw+1234567890+3 -Provider lock status

#pw+1234567890+4 - SimCard lock status


NOKIA 61XX


*#06# -IMEI

*#0000# ;-*#99 99# (Nokia 6130)


*#92702689# (or *#war0anty#) Software versionEnter service mode.

*3370# -Turns on sound encoding system - Enhanced Full Rate.

#3370# -Turns off sound encoding system - Enhanced Full Rate.

*4720# -Turns on battery save mode - saves about 30 % of energy.

#4720# -Turns off battery save mode.


NOKIA8810


*#06# - IMEI

*#0000# -Software version

*#92702689# (or *#war0anty#) Enter service mode.

*3370# -Turns on sound encoding system - Enhanced Full Rate.

#3370# -Turns off sound encoding system - Enhanced Full Rate.

*4720# -Turns on battery save mode - saves about 30 % of energy

#4720# -Turns off battery save mode - saves about 30 % of energy



NOKIA99OO


*#06# -IMEI

*#682371158412125# -Software version

*#3283# -Displays week and year of manufacture, ie. 1497 means 14th week of 1997.



NOKIA 911O


*#06# IMEI


*#0000# SOFTWARE VERSION

*3370# Turns on sound encoding system - Enhanced Full Rate.

#3370# Turns off sound encoding system - Enhanced Full Rate.

*4720# Turns on battery save mode - saves about 30 % of energy.

#4720# Turns off battery save mode.



NOKIA 81XX


*#06# IMEI
*#8110# Software version
xx# Replace xx with desired phonebook entry - press # and you will see it on display

*#92702689# (or *#warOanty#)

"Warranty code:" - you have to enter one of the following codes:

9268 (OK) displays IMEI (International Mobile Equipment Identification)

6232 (OK) displays date of manufacture in format MMYY (MM - month, RR - year)


7832 (OK) displays date of purchase

7332 (OK) displays date of repair or upgrade

37832 (OK) sets date of purchase in format MMYY (MM - month, RR - year) - attention: you can set it only once, so beware !!!

87267 (OK) transmits user data/move data do service PC




Motorola Codes:



Motorola 920
---------------


Press menu and type one of these numbers and press OK:

11 = Status Review
13 = Available Networks
14 = Preferred Networks
22 = Select Keypad Tones
25 = Require SIM Card PIN
26 = Language Selection
32 = Repetitive Timer
33 = Single Alert Timer
34 = Set IN-Call Display
35 = Show Call Timers
36 = Show Call Charges
37 = Call Charge Settings
38 = Reset All Timers
43 = Reset All Timers
45 = Show Last Call
46 = Total For All Calls
47 = Lifetime Timer
51 = Change Unlock Code
52 = Master Reset
53 = Master Clear (Warning!! May result in deleting the Message Editor!!!)
54 = New Security Code
55 = Automatic Lock
63 = Battery Saving Mode

Free call tip

1 Enter the phone number
2 Enter OK
3 Type *#06#
4 Press Button C
5 And finally press the button for power off.

You should now be able to talk without being billed.


The 54# Tip:

Type 1#, 2#........54# on the keypad (when you're not in the menu) to get the phone number used for with this key when speed dialing.





Motorola 930
--------------


Press menu and type one of these numbers and press OK:

11 = Status Review
13 = Available Networks
14 = Preferred Networks
22 = Select Keypad Tones
25 = Require SIM Card PIN
26 = Language Selection
32 = Repetitive Timer
33 = Single Alert Timer
34 = Set IN-Call Display
35 = Show Call Timers
36 = Show Call Charges
37 = Call Charge Settings
38 = Reset All Timers
43 = Reset All Timers
45 = Show Last Call
46 = Total For All Calls
47 = Lifetime Timer
51 = Change Unlock Code
52 = Master Reset
53 = Master Clear (Warning!! May result in deleting the Message Editor!!!)
54 = New Security Code
55 = Automatic Lock
63 = Battery Saving Mode

Free call tip

1 Enter the phone number
2 Enter OK
3 Type *#06#
4 Press Button C
5 And finally press the button for power off.

You should now be able to talk without being billed.


Motorola 930

The 54# Tip:

Type 1#, 2#........54# on the keypad (when you're not in the menu) to get the phone number used for with this key when speed dialing.





Motorola 6200
--------------



(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.

De-activate RBS

To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.

These countries has been reported working:

UK (Orange)
AU

What's the use of RBS:

Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.

Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.

Pin Outs

Numbered left to right, keypad up, battery down

1. Audio Ground
2. V+
3. True data (TD) (input)
4. Downlink - Complimentary data (CD) (input)
5. Uplink - Return data (RD) (output)
6. GND
7. Audio Out - on/off
8. Audio In
9. Manual Test - ???
10. Battery Feedback
11. Antenna connector






Motorola 7500
-------------



(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.

De-activate RBS

To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.

These countries has been reported working:

IT (model: F16 HW: 5.2 SW: 2.1)


What's the use of RBS:

Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.

Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.

Pin Outs
Numbered right to left, keypad up, battery down looking

1. Gnd
2. Pos
3. True data (TD) (input)
4. Complimentary data (CD) (input)
5. Return data (RD) (output)
6. Audio gnd
7. Audio out
8. Audioin




Motorola 8200
--------------



(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.

De-activate RBS

To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.

These countries has been reported working:

ES, AU, NL, BE


What's the use of RBS:

Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.

Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.

Pin Outs

Numbered right to left, keypad up, battery down looking

1. Audio Ground
2. V+
3. True data (TD) (input)
4. Downlink - Complimentary data (CD) (input)
5. Uplink - Return data (RD) (output)
6. GND
7. Audio Out - on/off
8. Audio In
9. Manual Test - ???
10. Battery Feedback
11. Antenna connector





Motorola 8400
-------------



(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.

De-activate RBS

To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.

These countries has been reported working:

ES, AU, NL, BE


What's the use of RBS:

Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.

Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.

Pin Outs

Numbered right to left, keypad up, battery down looking

1. Audio Ground
2. V+
3. True data (TD) (input)
4. Downlink - Complimentary data (CD) (input)
5. Uplink - Return data (RD) (output)
6. GND
7. Audio Out - on/off
8. Audio In
9. Manual Test - ???
10. Battery Feedback
11. Antenna connector





Motorola 8700
--------------



*#06# for checking the IMEI (International Mobile Equipment Identity)

Activate RBS

(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.

De-activate RBS

To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.

These countries has been reported working:

AU, IT, SG, DE, ES, ZA

What's the use of RBS:

Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.

Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.





Motorola CD 160
---------------



Press menu and type one of these numbers and press OK:

11 = Status Review
13 = Available Networks
14 = Preferred Networks
22 = Select Keypad Tones
25 = Require SIM Card PIN
26 = Language Selection
32 = Repetitive Timer
33 = Single Alert Timer
34 = Set IN-Call Display
35 = Show Call Timers
36 = Show Call Charges
37 = Call Charge Settings
38 = Reset All Timers
43 = Reset All Timers
45 = Show Last Call
46 = Total For All Calls
47 = Lifetime Timer
51 = Change Unlock Code
52 = Master Reset
53 = Master Clear (Warning!! May result in deleting the Message Editor!!!)
54 = New Security Code
55 = Automatic Lock
63 = Battery Saving Mode

Free call tip

1 Enter the phone number
2 Enter OK
3 Type *#06#
4 Press Button C
5 And finally press the button for power off.

You should now be able to talk without being billed.





Motorola CD 520
----------------



Press menu and type one of these numbers and press OK:

11 = Status Review
13 = Available Networks
14 = Preferred Networks
22 = Select Keypad Tones
25 = Require SIM Card PIN
26 = Language Selection
32 = Repetitive Timer
33 = Single Alert Timer
34 = Set IN-Call Display
35 = Show Call Timers
36 = Show Call Charges
37 = Call Charge Settings
38 = Reset All Timers
43 = Reset All Timers
45 = Show Last Call
46 = Total For All Calls
47 = Lifetime Timer
51 = Change Unlock Code
52 = Master Reset
53 = Master Clear (Warning!! May result in deleting the Message Editor!!!)
54 = New Security Code
55 = Automatic Lock
63 = Battery Saving Mode

Free call tip

1 Enter the phone number
2 Enter OK
3 Type *#06#
4 Press Button C
5 And finally press the button for power off.

You should now be able to talk without being billed.





Motorola d460
--------------



#06# for checking the IMEI (International Mobile Equipment Identity)

Activate RBS

(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng
Field Options' function with the keys, and enable it.

De-activate RBS

To de-activate RBS type: [pause] [pause] [pause] 1 1 3
[pause] 0 [pause] [ok]
This only works with some versions of software.

What's the use of RBS:

Get Distance From Base Station - Place a call, when it
is answered, press [MENU] until 'Eng Field Option' is
displayed, press [OK], select 'Active Cell', press [OK],
press [MENU] until 'Time Adv xxx' appears, where xxx is
a number. Multiply this number by 550, and the result is
the distance from the RBS (Radio Base Station), in
meters.

Get Signal Quality - press [MENU] until 'Eng Field
Option' is displayed, press [OK], select 'Active Cell',
press [OK], press [MENU] until 'C1' appears. This is the
signal quality. If it becomes negative for longer than 5
seconds, a new cell is selected.





Motorola V3688
---------------



#06# for checking the IMEI (International Mobile Equipment Identity)

Enhanced Full Rate Codec (EFR):

To Enable EFR press [][][] 119 [] 1 [] OK.
To Disable EFR press [][][] 119 [] 0 [] OK

NOTE: Nothing appears on Screen.





Ericsson Mobile Secret Codes:


T10

*#06# for checking the IMEI (International Mobile Equipment Identity)

>*<<*<* for checking the firmware revision information (software release)

>*<<*<*>> n-row text strings. if pressing yes you can check the phones text programming in currently selected language.

Shortcut for Last Dialed call menu

If you for some reason don't want to enter the 'Last Dialed calls menu' by using the 'YES' key you can use the following key
stroke instead: First '0' then '#'.

Access menu without Sim card

To access to the menu in your phone without having a card inside do the following: type **04*0000*0000*0000# When display say "Wrong Pin" press NO and you have access to the all menus: Info, Access, Settings, Calculator, Clock, Keylock On?, Mail, Phone book. NOTE if you try this on your phone may stop at Keylock On? menu and you´ll have to take your battery out to turn the phone on again. And this will not care about Phone lock!

A way to (un)lock your cell phone on to the network(subset):
1. Press <**<
2. Then on the display appear and give you two choices: Lock to Network ? and Lock to Network subset? (Use arrow keys to select)
3. Enter the NCK number (code is provided by the SP)
4. You have 5 attemps to do this
5. Then your cell phone will work 'only' with the network

Warning: The Service Provider (SP) Lock menu is used to lock the cell phone to the SP's SIM card. Once the cell phone is locked to a specific operator, if one inserts a SIM card from a different operator the phone will refuse to accept it! The cell phone will however accept another SIM card from the same operator. To activate/deactivate this lock one needs a special secret code that is not available to the end user. Your phone can be locked to a service provider FOREVER by doing this! If an invalid code is entered all five times, the menu will exit and be deactivated! Any further attempt to activate the NCK/NSCK lock Menu will result in the response "Not allowed"! However the NCK/NSCK lock can be recover through a direct clearing in the EEPROM.

Message Report

When you writing a message, place at the start of it the code *0# and continue with your message. It's job is like nokias report. It gives you information about the sended message.

T18

*#06# for checking the IMEI (International Mobile Equipment Identity) Information you get from the IMEI:

XXXXXX XX XXXXXX X

TAC FAC SNR SP

TAC = Type approval code
FAC = Final assembly code
SNR = Serial number
SP = Spare

To access SIM-Locking menu of your phone, press: < * [CLR] <
Be careful or you may lock your phone.

Message Report

When you writing a message, place at the start of it the code *0# and continue with your message. It's job is like nokias report. It gives you information about the sended message.

T28

*#06# for checking the IMEI (International Mobile Equipment Identity)

>*<<*<* for checking the firmware revision information (software release)

>*<<*<*> 1-row text strings. if pressing yes you can check the phones text programming in currently selected language.

>*<<*<*>> n-row text strings. if pressing yes you can check the phones text programming in currently selected language.

The Service Provider (SP) Lock

The Service Provider (SP) Lock menu is used to lock the cell phone to the SP's SIM card. Once the cell phone is locked to a specific operator, if one inserts a SIM card from a different operator the phone will refuse to accept it! The cell phone will however accept another SIM card from the same operator.

To activate/deactivate this lock one needs a special secret code that is not available to the end user.

Here is how to activate the menu:

<**< Lock to Network? if pressing yes you have 5 attempts to enter NCK.

<**<< Lock to Network subset? if pressing yes you have 5 attempts to enter NSCK.

Warning: Your phone can be locked to a service provider FOREVER by doing this! If an invalid code is entered all five times, the menu will exit and be deactivated! Any further attempt to activate the NCK/NSCK lock Menu will result in the response "Not allowed"! However the NCK/NSCK lock can be recover through a direct clearing in the EEPROM.

Shortcut for Last Dialed call menu

If you for some reason don't want to enter the 'Last Dialed calls menu' by using the 'YES' key you can use the following key
stroke instead: First '0' then '#'.

Message Report

When you are writing a message, place at the start of it the code *0# and continue with your message. It's job is like nokias report. It gives you information about the sended message.



388

*#06# for checking the IMEI (International Mobile Equipment Identity)

*#0000# to reset the phones menu-language to English.

>*<<*<* for checking the firmware revision information (software release)

>*<<*<*> 1-row text strings. if pressing yes you can check the phones text programming in currently selected language.(298 entries)

>*<<*<*>> n-row text strings. if pressing yes you can check the phones text programming in currently selected language.(160 entries?)

The Service Provider (SP) Lock menu is used to lock the cell phone to the SP's SIM card. Once the cell phone is locked to a specific operator, if one inserts a SIM card from a different operator the phone will refuse to accept it! The cell phone will however accept another SIM card from the same operator.

To activate/deactivate this lock one needs a special secret code that is not available to the end user. (not even to you... or is it ? in case please let me know!)

<**< Lock to Network? if pressing yes you have 5 attempts to enter NCK.

<**<< Lock to Network subset? if pressing yes you have 5 attempts to enter NSCK.

Warning: Your phone can be locked to a service provider FOREVER by doing this! If an invalid code is entered all five times,the menu will exit and be deactivated! Any further attempt to activate the NCK/NSCK lock Menu will result in the response "Not allowed"! However the NCK/NSCK lock can be recover through a direct clearing in the EEPROM.

Shortcut for Last Dialed call menu...

If you for some reason don't want to enter the 'Last Dialed calls menu' by using the 'YES' key you can use the following key
stroke instead: First '0' then '#'.

Access menu without Sim card ...

To access to the menu in your phone without having a card inside do the following: type **04*0000*0000*0000# When display say "Wrong Pin" press NO and you have access to the all menus: Info, Access, Settings, Calculator, Clock, Keylock On?,Mail, Phone book. NOTE if you try this on the GH688 your phone may stop at Keylock On? menu and you´ll have to take your battery out to turn the phone on again.

GA628

*#06# for checking the IMEI (International Mobile Equipment Identity)

*#0000# to reset the phones menu-language to English.

*#103# then YES Time and date will be shown.

>*<<*<* for checking the firmware revision information (software release)

>*<<*<*> 1-row text strings. if pressing yes you can check the phones text programming in currently selected language.(298 entries)

>*<<*<*>> n-row text strings. if pressing yes you can check the phones text programming in currently selected language.(160 entries?)

The Service Provider (SP) Lock

The Service Provider (SP) Lock menu is used to lock the cell phone to the SP's SIM card. Once the cell phone is locked to a specific operator, if one inserts a SIM card from a different operator the phone will refuse to accept it! The cell phone will however accept another SIM card from the same operator.

To activate/deactivate this lock one needs a special secret code that is not available to the end user.

Here is how to activate the menu:

<**< Lock to Network? if pressing yes you have 5 attempts to enter NCK.

<**<< Lock to Network subset? if pressing yes you have 5 attempts to enter NSCK.

Warning: Your phone can be locked to a service provider FOREVER by doing this! If an invalid code is entered all five times,the menu will exit and be deactivated! Any further attempt to activate the NCK/NSCK lock Menu will result in the response "Not allowed"! However the NCK/NSCK lock can be recover through a direct clearing in the EEPROM.

Shortcut for Last Dialed call menu

If you for some reason don't want to enter the 'Last Dialed calls menu' by using the 'YES' key you can use the following key
stroke instead: First '0' then '#'.

Bat. level indicator when turned OFF

When the phone is turned off and the phone is not changing - the bat. level can be seen for a short period of time by pressing the 'NO' key quick once (it has to be quick!) and then wait for about 2 sec. The bat. level will now be shown in the display at its normal position.

Access menu without Sim card

To access to the menu in your phone without having a card inside do the following: type **04*0000*0000*0000# When display say "Wrong Pin" press NO and you have access to the all menus: Info, Access, Settings, Calculator, Clock, Keylock On?,Mail, Phone book. NOTE if you try this on your phone may stop at Keylock On? menu and you´ll have to take your battery out to turn the phone on again.

Alarm Clock Menu

Go to MissedCall Empty the list Press the -> key for a second or two The option Menu size turns up Choose 'yes' and go from there.

An alarm clock turned up too but it never rang. I think this was because there is no clock in the phone.

Free phone calls using the GA628

This trick has only been reported working on PREPAID GSM CARDS and in some countries and with some sw versions.
The prepaid GSM SIM CARD is a kind of "SIM card" which only has a sertant amount of credit on it (like a normal phonebox telecard)... if it can be traced? - we don't know...

Well..here's the trick you dial the no. normally and press YES. While "connecting" is shown on the screen, the following procedure should be carried out: Press CLR then 0 then # and then NO (twice) so as to switch OFF the phone. You can then still speak on the phone while it is switched off but the SIM card does not record your calls which will lead to FREE phone calls in some countries.. we hope!!

Another variant of the code

Make a Call, while the phone says Connecting type 083# (the position 83 must be empty! ), when phone says Pos Emtpy, press the NO key and turn off the phone.

If you can make the call with the phone turned off you will face a problem when you need to hang up the phone...the only way for you to do that is remove the battery...???
Continue reading >>
 

EasyTecX - Copyright  © 2012 All Rights Reserved | Design by OS Templates Converted and modified into Blogger Template by BTDesigner | Back to TOP