<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-5145860179828431135</id><updated>2026-03-01T20:03:16.615+00:00</updated><category term="Phone tips"/><category term="Network tips"/><category term="Hacking tips"/><category term="Computer tips"/><title type='text'>Ethical Hacking Institute</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://ethicalhackinginstitute1.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>ethicalhackinginstitute</name><uri>http://www.blogger.com/profile/03158890439235970060</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>21</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-5145860179828431135.post-6226223951178472137</id><published>2011-09-10T19:26:00.003+01:00</published><updated>2011-09-10T19:26:34.592+01:00</updated><title type='text'>The Future Of Mobile Software Development</title><content type='html'>&lt;div id=&quot;article-content&quot;&gt;

				A process in which apps are developed for portable devices is 
mobile software development. During manufacture the applications may be 
pre-installed on devices, or may be downloaded from App Stores, Android 
Market or other mobile software platforms by users. Today mobile 
software outsourcing is becoming very popular.&lt;br /&gt;
There is great 
number of platforms that support devices through single as well as 
numerous manufacturers. Android, iOS (Apple), Java ME, Flash Lite, 
BlackBerry and Qt are platforms which support devices by single 
manufacturer. Each of these platforms has a development environment 
tools that allow a developer to build, test and spread out applications 
into the target platform environment.&lt;br /&gt;
There are many software 
outsourcing companies that deliver professional android application 
development as well as app development for other mobile platforms.&lt;br /&gt;
The
 idea of mobile technology in every offshore software development 
company has been modernized by the mobile application development 
features. Mobile applications involve a collection of powerful mobile 
apps that assist video and audio application, Internet browsing, gaming,
 video players, utilities etc. To put it differently, it is essential to
 claim data which many people have access to the world through mobile.&lt;br /&gt;
&lt;a href=&quot;http://www.qarea.com/mobile-development-services/iphone-app-development.php&quot; rel=&quot;nofollow&quot; target=&quot;_new&quot;&gt;iPhone app development company&lt;/a&gt; delivers sophisticated apps on iOS platform. There are plenty of benefits of mobile applications, there are some of them:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Interactive intermediate. Programmers of mobile application may 
develop, imagine and customize the application according to the 
customer&#39;s requirements.&lt;/li&gt;
&lt;br /&gt;
&lt;li&gt;A customer fully receives the mobile application which is brought 
out through the mobile program and that is essentially to involve any 
way a third party for marketing its products.&lt;/li&gt;
&lt;br /&gt;
&lt;li&gt;Owing to the presence of manifold mobile platform development 
options for example Java, Android, Brew and others mobile application 
development is becoming very popular today.&lt;/li&gt;
&lt;br /&gt;
&lt;li&gt;Thanks to compact size, mobile devices are very user-friendly and 
handy. Up-to-date&#39;s mobile application development offer great number of
 features which allow not just communication but also offer improved 
features as for example Internet support by GPRS technology, music 
facilities, advanced satellite navigation and live video conferencing. 
Moreover mobile devices let you play games, watch TV and listen to the 
music anytime and anywhere.&lt;/li&gt;
&lt;/ul&gt;
In order to improve your business and receive 
cost-effective solution all you need is just choose  software 
outsourcing  company. It has a lot of benefits if to compare with 
in-house one. Additionally to cost savings offshore software development
 improves the productivity of the company. The company may deploy the 
saved costs in reaching core business expansion of a company. Due to the
 profit evolved and the savings gathered company may furrow all these 
back and develop higher quality products, create company brand and 
service more clients.&lt;br /&gt;
			&lt;/div&gt;
&lt;div id=&quot;article-resource&quot;&gt;

				&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://ethicalhackinginstitute1.blogspot.com/feeds/6226223951178472137/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/09/future-of-mobile-software-development.html#comment-form' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/6226223951178472137'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/6226223951178472137'/><link rel='alternate' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/09/future-of-mobile-software-development.html' title='The Future Of Mobile Software Development'/><author><name>ethicalhackinginstitute</name><uri>http://www.blogger.com/profile/03158890439235970060</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5145860179828431135.post-1253891830056827829</id><published>2011-08-21T07:44:00.000+01:00</published><updated>2011-08-21T07:44:11.307+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer tips"/><title type='text'>How to know if the web server is Windows or Linux based</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5O5hoTiqTdO-hXEOEd0saZJ6dJwPdU5zPnx1trlAP77nMiWaHUgZxVtRN9H4eMVRrG-ZFmJPROrWZPQnfFgdOj-S-yo9ZUECfq2fS_kC5N0VdhujZIVjyc1T4r-d3h2Vn5BiaCiCTRISR/s1600/linux.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;146&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5O5hoTiqTdO-hXEOEd0saZJ6dJwPdU5zPnx1trlAP77nMiWaHUgZxVtRN9H4eMVRrG-ZFmJPROrWZPQnfFgdOj-S-yo9ZUECfq2fS_kC5N0VdhujZIVjyc1T4r-d3h2Vn5BiaCiCTRISR/s320/linux.jpg&quot; width=&quot;146&quot; /&gt;&lt;/a&gt;Just follow the given steps:-&lt;br /&gt;
1) Goto the link below and find the IP Address of the website you want to gather information about. You may do this by writing its name in the Get IP box&lt;br /&gt;
http://www.selfseo.com/find_ip_address_of_a_website.php&lt;br /&gt;
(This step was optional just to tell you that it can be done this way also):-P&lt;br /&gt;
2)Goto run-&amp;gt;type CMD&lt;br /&gt;
IN CMD type&lt;br /&gt;
ping Target _Website_Name . For Eg- ping google.com&lt;br /&gt;
or&lt;br /&gt;
ping target_website/computer_ip_address . For Eg:- 59.172.45.1&lt;br /&gt;
Now you will see several ping requests coming&lt;br /&gt;
Ping Google Server&lt;br /&gt;
We Are interested in seeing the TTL time which you can see at the end of each request in ping.&lt;br /&gt;
NOTE:-&lt;br /&gt;
1) If TTL&lt;br /&gt;
2) If TTL&amp;gt;64 but&lt;br /&gt;
3) TTL&amp;gt;128 Mac and others.&lt;br /&gt;
From the above screenshot, it is clear that the servers of google are linux based.&lt;br /&gt;
Note:- In some Cases you may not get ping replies ( Eg. you try it on your friend’s PC ). Now This can have two reasons, The server is down ie.. The machine is not connected to internet. Else the most common reason, The Firewall is protecting that PC and is not allowing your request to access that system.&lt;br /&gt;
Same thing may happen in case of some websites as well, Reason is same.&lt;br /&gt;
Caution:- If you are trying this on your friends machine then do not enter the local IP address like 192.168.1.1&lt;br /&gt;
Ask him to goto:&amp;nbsp;&lt;a href=&quot;http://whatismyip.com/&quot;&gt;http://whatismyip.com&lt;/a&gt; and check the IP address from there</content><link rel='replies' type='application/atom+xml' href='http://ethicalhackinginstitute1.blogspot.com/feeds/1253891830056827829/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/07/how-to-know-if-web-server-is-windows-or.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/1253891830056827829'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/1253891830056827829'/><link rel='alternate' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/07/how-to-know-if-web-server-is-windows-or.html' title='How to know if the web server is Windows or Linux based'/><author><name>ethicalhackinginstitute</name><uri>http://www.blogger.com/profile/03158890439235970060</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5O5hoTiqTdO-hXEOEd0saZJ6dJwPdU5zPnx1trlAP77nMiWaHUgZxVtRN9H4eMVRrG-ZFmJPROrWZPQnfFgdOj-S-yo9ZUECfq2fS_kC5N0VdhujZIVjyc1T4r-d3h2Vn5BiaCiCTRISR/s72-c/linux.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5145860179828431135.post-7563403869432814951</id><published>2011-08-16T07:49:00.002+01:00</published><updated>2011-08-16T17:39:41.071+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking tips"/><title type='text'>Becoming A Certified Hacker</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdWxlXd-5kyGnR2qM7qgBOVgHCbJcM4yUVyJb0QTuCRsZYsnxeT-GCBRyVT-Okk6A3B8h_D_XNb-py1KfwUY87fME0rE2Wlqp6NVpaILFNP26jQM1L-Iy4pj25lKyAL2hcXKdME0cZwNw8/s1600/certified.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;168&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdWxlXd-5kyGnR2qM7qgBOVgHCbJcM4yUVyJb0QTuCRsZYsnxeT-GCBRyVT-Okk6A3B8h_D_XNb-py1KfwUY87fME0rE2Wlqp6NVpaILFNP26jQM1L-Iy4pj25lKyAL2hcXKdME0cZwNw8/s320/certified.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;1: Introduction to Ethical Hacking&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Why Security?&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; The Security, functionality and ease of use Triangle&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Can Hacking be Ethical?&lt;br /&gt;
Module 2: Footprinting&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Defining Footprinting&lt;br /&gt;
Module 3: Scanning&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Definition of Scanning.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Types of scanning&lt;br /&gt;
Module 4: Enumeration&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; What is Enumeration?&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; NetBios Null Sessions&lt;br /&gt;
Module 5: System Hacking&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Administrator Password Guessing&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Manual Password Cracking Algorithm&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Automated Password Cracking&lt;br /&gt;
Module 6: Trojans and Backdoors&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Effect on Business&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; What is a Trojan?&lt;br /&gt;
Module 7: Sniffers&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Definition of sniffing&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; How a Sniffer works?&lt;br /&gt;
Module 8: Denial of Service&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; What is Denial of Service?&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Goal of DoS(Denial of Service)&lt;br /&gt;
Module 9: Social Engineering&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; What is Social Engineering?&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Art of Manipulation&lt;br /&gt;
&lt;br /&gt;
Module 10: Session Hijacking&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Understanding Session Hijacking&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Spoofing vs Hijacking&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; How Web Servers Work?&lt;br /&gt;
Module 11: Hacking Web Servers&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; How are Web Servers Compromised?&lt;br /&gt;
Module 12: Web Application Vulnerabilities&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Web Application Set-up&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Web Application Hacking&lt;br /&gt;
Module 13: Web Based Password Cracking Techniques&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Authentication- Definition&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Authentication Mechanisms&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; HTTP Authentication&lt;br /&gt;
Module 14: SQL Injection&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Attacking SQL Servers&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; SQL Server Resolution Service (SSRS)&lt;br /&gt;
Module 15: Hacking Wireless Networks&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Introduction to Wireless Networking&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Business and Wireless Attacks&lt;br /&gt;
Module 16: Virus&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Virus Characteristics&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Symptoms of &#39;virus-like&#39; attack&lt;br /&gt;
Module 17: Physical Security&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Security statistics&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Physical Security breach incidents&lt;br /&gt;
Module 18: Linux Hacking&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Why Linux?&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Linux basics&lt;br /&gt;
Module 19: Evading Firewalls, IDS and Honeypots&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Intrusion Detection Systems&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Ways to Detect Intrusion&lt;br /&gt;
Module 20: Buffer Overflows&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Significance of Buffer Overflow Vulnerability&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Why are Programs/Applications Vulnerable?&lt;br /&gt;
Module 21: Cryptography&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Public-key Cryptography&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Working of Encryption&lt;br /&gt;
Module 22: Penetration Testing Course&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Introduction to Penetration Testing (PT)&lt;br /&gt;
Module 23: Advanced Exploit Writing Module 24: Advanced Covert Hacking TechniquesModule 25: Advanced Virus Writing Techniques Module 26: Advanced Reverse Engineering Techniques</content><link rel='replies' type='application/atom+xml' href='http://ethicalhackinginstitute1.blogspot.com/feeds/7563403869432814951/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/08/becoming-certified-hacker.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/7563403869432814951'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/7563403869432814951'/><link rel='alternate' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/08/becoming-certified-hacker.html' title='Becoming A Certified Hacker'/><author><name>ethicalhackinginstitute</name><uri>http://www.blogger.com/profile/03158890439235970060</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdWxlXd-5kyGnR2qM7qgBOVgHCbJcM4yUVyJb0QTuCRsZYsnxeT-GCBRyVT-Okk6A3B8h_D_XNb-py1KfwUY87fME0rE2Wlqp6NVpaILFNP26jQM1L-Iy4pj25lKyAL2hcXKdME0cZwNw8/s72-c/certified.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5145860179828431135.post-7290981140952422348</id><published>2011-07-28T13:00:00.001+01:00</published><updated>2011-08-16T17:18:02.397+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking tips"/><title type='text'>Network Hacking</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCCVWSNNXQaPN5cQms6HGkEJB2A4v94hYHtNO9KLOaPmNRvUO436XdUgdelWfxwU-b_zE2E5bdvRQPQvO4Y8Lc2XdtLZJAlw1-nYEf8CB26ib5GSKb_UQe13L9B2uT0vVV5T5a-tBuHl34/s1600/internet-hacking.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;270&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCCVWSNNXQaPN5cQms6HGkEJB2A4v94hYHtNO9KLOaPmNRvUO436XdUgdelWfxwU-b_zE2E5bdvRQPQvO4Y8Lc2XdtLZJAlw1-nYEf8CB26ib5GSKb_UQe13L9B2uT0vVV5T5a-tBuHl34/s320/internet-hacking.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;This PART introduces TCP/IP to a person with any level of computer skills or computer&lt;br /&gt;
background knowledge. My hope in writing this PART is to explain in a simple way some concepts that may be considered difficult. My ambition is to write a note that makes no assumptions and that leads a TCP/IP beginner to an intermediate understanding of TCP/IP.&lt;br /&gt;
This note isn&#39;t boringly technical; each topic is covered to sufficient depth but not to an EXTREME.&lt;br /&gt;
part :1 &lt;br /&gt;
chapter : origin of Tcp/ip&lt;br /&gt;
so let us start:=====&amp;gt;&lt;br /&gt;
Q :  WHAT IS TCP/IP ? WHY WE NEED IT?&lt;br /&gt;
ANS :TCP/IP Transmission Control Protocol/Internet Protocol (TCP/IP) is a set of protocols that enable communication between computers. There was a time when it was not important for computers to communicate with each other. There was no need&lt;br /&gt;
for a common protocol. But as computers became networked, the need arose for computers to agree on certain protocols.SO WE NEED IT TO COMMUNICATE TWO COMPUTER SIMPLY .&lt;br /&gt;
ORIGIN :&lt;br /&gt;
Understanding the roots of the Internet will give you insight into the development of TCP/IP&lt;br /&gt;
and many of its rules and standards. If you know why TCP/IP was created and how it evolved,&lt;br /&gt;
the TCP/IP protocol suite is easier to understand.&lt;br /&gt;
&lt;span class=&quot; fbUnderline&quot;&gt;The predecessor of today&#39;s Internet was ARPAnet ,but we will not cover to arpanet .because to day is latest tcp/ip.so will cover it but some understanding of it also require&lt;/span&gt;&lt;br /&gt;
ARPAnet, a supernetwork that was created by the&lt;br /&gt;
Advanced Research Projects Agency (ARPA)&lt;br /&gt;
The protocol, or language of choice, used on the ARPAnet was called Network Control&lt;br /&gt;
Protocol (NCP)-TCP/IP had not yet been developed. As the ARPAnet grew, however, a new&lt;br /&gt;
protocol was needed because NCP simply didn&#39;t fulfill all the needs of a larger network. The&lt;br /&gt;
NCP protocol was similar to a human language that has only a few words. The language&lt;br /&gt;
might enable a few people to communicate, but as you include more people who want to talk&lt;br /&gt;
about many more subjects, you have to improve the language.so due to limitation a tcp/ip came in origin&lt;br /&gt;
&lt;div=&quot;align=&quot;center&quot;&gt;&lt;b&gt;The Birth of TCP/IP&lt;/b&gt;&amp;nbsp;&lt;/div=&quot;align=&quot;center&quot;&gt;&lt;div=&quot;align=&quot;center&quot;&gt;As stated earlier, the &quot;language&quot; spoken by hosts on the ARPAnet in 1969 was called NCP.&lt;br /&gt;
However, NCP had too many limitations and was not robust enough for the supernetwork,&lt;br /&gt;
which was beginning to grow out of control. The limitations of NCP and the growth of the&lt;br /&gt;
ARPAnet lead to research and development of a new network language.&lt;br /&gt;
SO TCP/IP CAME INTO EVOLUTION .&lt;br /&gt;
As you will learn in later chapters, TCP is responsible for making sure that the data gets&lt;br /&gt;
through to the other host. It keeps track of what is sent and retransmits anything that did not&lt;br /&gt;
get through. If any message is too large for one package, TCP splits the message into several&lt;br /&gt;
packages and makes sure that they all arrive correctly. After they have arrived, TCP at the&lt;br /&gt;
other end puts all the packages back together in the proper order.&lt;br /&gt;
==== &lt;viv align=&quot;center&quot;&gt;&lt;b&gt;So Ma fRend this is birth of tcp/ip&lt;/b&gt;=======&lt;br /&gt;
Actually tcp/ip is set of different protocol for e.g = we can say that there is a person whose name is pappu and he has 14 child . so when outsider person call to thier child ,they will simply use word that [o pappu ke bachey ] pappu&#39;child  .such like that there is so many protocol and tcp ,ip is also a partbut when we called this we simply say tcp/ip stack .hope u understand it.&lt;br /&gt;
&lt;/viv&gt;&lt;/div=&quot;align=&quot;center&quot;&gt;&lt;br /&gt;
&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-5021465111128165&quot;;
/* tempt */
google_ad_slot = &quot;4765544474&quot;;
google_ad_width = 336;
google_ad_height = 280;
//--&gt;
&lt;/script&gt;&lt;br /&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;</content><link rel='replies' type='application/atom+xml' href='http://ethicalhackinginstitute1.blogspot.com/feeds/7290981140952422348/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/07/network-hacking.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/7290981140952422348'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/7290981140952422348'/><link rel='alternate' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/07/network-hacking.html' title='Network Hacking'/><author><name>ethicalhackinginstitute</name><uri>http://www.blogger.com/profile/03158890439235970060</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCCVWSNNXQaPN5cQms6HGkEJB2A4v94hYHtNO9KLOaPmNRvUO436XdUgdelWfxwU-b_zE2E5bdvRQPQvO4Y8Lc2XdtLZJAlw1-nYEf8CB26ib5GSKb_UQe13L9B2uT0vVV5T5a-tBuHl34/s72-c/internet-hacking.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5145860179828431135.post-8223493389006243791</id><published>2011-07-25T13:23:00.001+01:00</published><updated>2011-08-16T17:21:34.705+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking tips"/><title type='text'>How To Hack Using Google</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjA1djQ_cxxZRRsLX2MkqOidOKF56sLhAvJA-2aQ3aVb7mVovYFBE8Qv6AWGE9Zp9CmcH8wFI7Wa9JmddTWF5CKNdTVL2L5RvgUpSrMy_FrHSYpNRJQ-5mitZH1e_H22ZSF0VrBIUKPNEED/s1600/google.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjA1djQ_cxxZRRsLX2MkqOidOKF56sLhAvJA-2aQ3aVb7mVovYFBE8Qv6AWGE9Zp9CmcH8wFI7Wa9JmddTWF5CKNdTVL2L5RvgUpSrMy_FrHSYpNRJQ-5mitZH1e_H22ZSF0VrBIUKPNEED/s1600/google.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
&lt;!--
google_ad_client = &quot;ca-pub-5021465111128165&quot;;
/* tempt */
google_ad_slot = &quot;4765544474&quot;;
google_ad_width = 336;
google_ad_height = 280;
//--&gt;
&lt;/script&gt;&lt;br /&gt;
&lt;script src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;&lt;br /&gt;
&lt;br /&gt;
Google is able to index almost everything now is more than satisfied, even this feature plays her very often to the benefit of those who have some pretty questionable purposes related all&#39;hacking and infringement of Internet servers and websites. And &#39;Just a poorly configured web server to enable the&#39; access to Google&#39;s crawlers, and directories containing sensitive information resources, configuration files and utilities password. And of course when Googlebot access to a resource accessible via HTTP provides &quot;right&quot; to index it and then making it available for research.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; In this article we will see a list of interesting hacking techniques based on using Google to obtain credentials for access and use information to make intrusions and attacks. Try to just enter in the Google search box the search strings below in italics.&lt;br /&gt;
#1 Utilities and passwords stored on FTP and WS FlashFXP WS FlashFXP and FTP are two popular FTP client, respectively, using a file called ws_ftp.ini and flashFXP.ini to save the information for access to FTP sites configured. Search string for WAS FTP: intitle: index.of ws_ftp.ini or filetype: ini pwd WS_FTP or &quot;index of /&quot; &quot;ws_ftp.ini&quot; &quot;parent directory&quot; Search string for FlashFXP: filetype: ini inurl: flashFXP.ini.&lt;br /&gt;
#2 Utilities and passwords of sites created with Frontpage Frontpage client is still widely used to create static web sites: the authentication system for automatic connection is based on the service.pwd file that contains the users and encrypted passwords that can be decoded with little effort by using John The Ripper. Ricenca string: &quot;#-FrontPage-&quot; inurl: service.pwd &lt;br /&gt;
#3 Log files with users and passwords It seems incredible but that happens very often the users and passwords for access to restricted areas or sites are stored in a file passwords.log. Try it yourself ...Search string: filetype: log inurl: &quot;password.log&quot;&lt;br /&gt;
#4 Download complete database mdb Forums Web Wiz Forums If a forum Web Wiz Forums is not properly configured, you can download the entire database in an instant!String of ricenca: filetype: mdb wwforum&lt;br /&gt;
#5 VNC server interface exposed via Java Applet VNC is a remote control software that can also be exposed via web through a Java applet that is normally listens on port 5800.String of ricenca: intitle: vnc.desktop inurl: 5800 or &quot;VNC Desktop&quot; inurl: 5800&lt;br /&gt;
#6 Configuration file for proftpd The configuration file for proftpd server contains a lot of information about installing, utilities and logs.Search string: filetype: conf inurl: proftpd.conf-sample&lt;br /&gt;
#7 Create a user on the mail server pro Argosoft If a mail server Argosoft is not properly configured, you can create your own mail user entering a URL ad hoc.Search string: &quot;adding new user&quot; inurl: addnewuser - &quot;there are no domains&quot;&lt;br /&gt;
#8 Administration interface for Web Data Administrator Microsoft SQL Server Web Data Administrator is a web utility written in ASP.NET and used to manage via a web database SQL Server.Search string: intitle: &quot;Web Data Administrator - Login&quot;&lt;br /&gt;
#9 Files backup of passwords and configurations Many managers are (rightly) used to make a backup copy before you edit a configuration file, and often change the extension. &quot;Bak&quot;.Search string: filetype: bak inurl: &quot;htaccess | passwd | shadow | htusers&quot; &lt;br /&gt;
#10 Archives of e-mail in Microsoft Outlook Outlook stores the email on file with the extension. Pst: uploading a file of this type on Outlook you can access all the email that contains immediately.Search string: outlook filetype: pst</content><link rel='replies' type='application/atom+xml' href='http://ethicalhackinginstitute1.blogspot.com/feeds/8223493389006243791/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/07/how-to-hack-using-google.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/8223493389006243791'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/8223493389006243791'/><link rel='alternate' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/07/how-to-hack-using-google.html' title='How To Hack Using Google'/><author><name>ethicalhackinginstitute</name><uri>http://www.blogger.com/profile/03158890439235970060</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjA1djQ_cxxZRRsLX2MkqOidOKF56sLhAvJA-2aQ3aVb7mVovYFBE8Qv6AWGE9Zp9CmcH8wFI7Wa9JmddTWF5CKNdTVL2L5RvgUpSrMy_FrHSYpNRJQ-5mitZH1e_H22ZSF0VrBIUKPNEED/s72-c/google.jpg" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5145860179828431135.post-9178404006121714696</id><published>2011-07-19T16:22:00.001+01:00</published><updated>2011-08-16T17:22:39.394+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking tips"/><title type='text'>How to detect a hacker attack</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhX99TlWF72dRyh-E-G9ZB8Sn35MyVaeLswTViTLvFOw1Z2q45r0_KKrl7J0ZwdorN5GNq024xwlAsXNhR5Jw7gfMgJcu8iIduGyT-3EpKHokjlJv-535K-FUlxf7fbW4iLt3ZoGltZy3i6/s1600/images56.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhX99TlWF72dRyh-E-G9ZB8Sn35MyVaeLswTViTLvFOw1Z2q45r0_KKrl7J0ZwdorN5GNq024xwlAsXNhR5Jw7gfMgJcu8iIduGyT-3EpKHokjlJv-535K-FUlxf7fbW4iLt3ZoGltZy3i6/s1600/images56.jpeg&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
&lt;!--
google_ad_client = &quot;ca-pub-5021465111128165&quot;;
/* tempt */
google_ad_slot = &quot;4765544474&quot;;
google_ad_width = 336;
google_ad_height = 280;
//
&lt;/script&gt;&lt;script src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;&lt;br /&gt;
Most computer vulnerabilities can be exploited in a variety of ways. Hacker attacks may use a single specific exploit, several exploits at the same time, a misconfiguration in one of the system components or even a backdoor from an earlier attack.Due to this, detecting hacker attacks is not an easy task, especially for an inexperienced user. This article gives a few basic guidelines to help you figure out either if your machine is under attack or if the security of your system has been compromised. Keep in mind just like with viruses, there is no 100% guarantee you will detect a hacker attack this way. However, there&#39;s a good chance that if your system has been hacked, it will display one or more of the following behaviours.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;For windows: &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;1. Suspiciously high outgoing network traffic. If you are on a dial-up account or using ADSL and notice an unusually high volume of outgoing network (traffic especially when you computer is idle or not necessarily uploading data), then it is possible that your computer has been compromised. Your computer may be being used either to send spam or by a network worm which is replicating and sending copies of itself. For cable connections, this is less relevant - it is quite common to have the same amount of outgoing traffic as incoming traffic even if you are doing nothing more than browsing sites or downloading data from the Internet.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;2. Your resident antivirus suddenly starts reporting that backdoors or trojans have been detected, even if you have not done anything out of the ordinary. Although hacker attacks can be complex and innovative, many rely on known trojans or backdoors to gain full access to a compromised system. If the resident component of your antivirus is detecting and reporting such malware, this may be an indication that your system can be accessed from outside.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Unix machines:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;1. Suspiciously named files in the /tmp folder. Many exploits in the Unix world rely on creating temporary files in the /tmp standard folder which are not always deleted after the system hack. The same is true for some worms known to infect Unix systems; they recompile themselves in the /tmp folder and use it as &#39;home&#39;.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;2. Modified /etc/passwd, /etc/shadow, or other system files in the /etc folder. Sometimes hacker attacks may add a new user in /etc/passwd which can be remotely logged in a later date. Look for any suspicious usernames in the password file and monitor all additions, especially on a multi-user system.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Regards!&amp;nbsp;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://ethicalhackinginstitute1.blogspot.com/feeds/9178404006121714696/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/07/how-to-detect-hacker-attack.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/9178404006121714696'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/9178404006121714696'/><link rel='alternate' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/07/how-to-detect-hacker-attack.html' title='How to detect a hacker attack'/><author><name>ethicalhackinginstitute</name><uri>http://www.blogger.com/profile/03158890439235970060</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhX99TlWF72dRyh-E-G9ZB8Sn35MyVaeLswTViTLvFOw1Z2q45r0_KKrl7J0ZwdorN5GNq024xwlAsXNhR5Jw7gfMgJcu8iIduGyT-3EpKHokjlJv-535K-FUlxf7fbW4iLt3ZoGltZy3i6/s72-c/images56.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5145860179828431135.post-5116256443367809745</id><published>2011-07-15T14:19:00.001+01:00</published><updated>2011-08-16T17:23:31.903+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Network tips"/><title type='text'>Wlan Hacking Security</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjYDPvmFqayAzF0jmfD2C4Css8Mp_tV_J9z7Uzdq3q7Sb4TdMhDqLspx6Ky5sKlflOkTrXT417sEKKwrDB_XrCquwmrfVnxW9sLUFCmI32WcU8Hfg51kCRKlCtgvT4ffL-shTJv6fbVUXX/s1600/images.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjYDPvmFqayAzF0jmfD2C4Css8Mp_tV_J9z7Uzdq3q7Sb4TdMhDqLspx6Ky5sKlflOkTrXT417sEKKwrDB_XrCquwmrfVnxW9sLUFCmI32WcU8Hfg51kCRKlCtgvT4ffL-shTJv6fbVUXX/s1600/images.jpeg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
&lt;!--
google_ad_client = &quot;ca-pub-5021465111128165&quot;;
/* tempt */
google_ad_slot = &quot;4765544474&quot;;
google_ad_width = 336;
google_ad_height = 280;
//--&gt;
&lt;/script&gt;&lt;br /&gt;
&lt;script src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;&lt;br /&gt;
It sounds bad each time I hear people say that their WLAN have been hacked or difficult for them to secure their WLAN from crackers.&lt;br /&gt;
A friend of mine by name Mankind once told me that the best way to secure your WLAN password is to make use of a german password.But today,I am confidently telling you guys that your german password can still be cracked.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; HOW POSSIBLE???&lt;br /&gt;
Every (L)WAN have a password and as we all know that if your password is cracked,you are no longer sure of your privacy nor the life time of your (L)WAN.These crackers make use of some techniques and softwares that enables them gain access to your login details and once your login details have been gotten,it&#39;s already known that you have been hacked.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; SOLUTION&lt;br /&gt;
Let&#39;s take for instance that you are making use of a german password and the cracker is making use of a german cracker,what will be your fate of security?&lt;br /&gt;
If am to rate,I will say that you are as good as someone that is already hacked with out stress.&lt;br /&gt;
Now let&#39;s take a good reasoning!&lt;br /&gt;
I have not heard that any traditional dictionary exists.&lt;br /&gt;
So I think with my own findings,your password is save.All you need to do is just make use of a traditional word and combine it with an upper case word and also with numbers,I can assure you that your account is very secured.&lt;br /&gt;
Give it a try and lets see how the cracker cracks your password.&lt;br /&gt;
If you later find out that your password is still cracked,know that it must have been cracked using scam page hacking or a keylogger.&lt;br /&gt;
Hope your privacy is a bit secured now?&lt;br /&gt;
Place your comment and questions for fast answers.</content><link rel='replies' type='application/atom+xml' href='http://ethicalhackinginstitute1.blogspot.com/feeds/5116256443367809745/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/07/wlan-hacking-security.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/5116256443367809745'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/5116256443367809745'/><link rel='alternate' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/07/wlan-hacking-security.html' title='Wlan Hacking Security'/><author><name>ethicalhackinginstitute</name><uri>http://www.blogger.com/profile/03158890439235970060</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjYDPvmFqayAzF0jmfD2C4Css8Mp_tV_J9z7Uzdq3q7Sb4TdMhDqLspx6Ky5sKlflOkTrXT417sEKKwrDB_XrCquwmrfVnxW9sLUFCmI32WcU8Hfg51kCRKlCtgvT4ffL-shTJv6fbVUXX/s72-c/images.jpeg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5145860179828431135.post-4597422414583015685</id><published>2011-07-11T18:36:00.000+01:00</published><updated>2011-07-11T18:37:49.204+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Network tips"/><title type='text'>Hacking and cracking news</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXf9l-_pDFbl2LynQeanAhKXtlJBmhVhnRV3VSEy9h75wQFgVdQKEKfvIHfdjP8RKZDlt_2BlfY-Nfe3hC9UxD3moL5hode9ZIk4COzo7H-k6eiWn7GXWMh9ag3ov_z58TlQgZ5Ne1rgNN/s1600/Black_Hat_Logo.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXf9l-_pDFbl2LynQeanAhKXtlJBmhVhnRV3VSEy9h75wQFgVdQKEKfvIHfdjP8RKZDlt_2BlfY-Nfe3hC9UxD3moL5hode9ZIk4COzo7H-k6eiWn7GXWMh9ag3ov_z58TlQgZ5Ne1rgNN/s1600/Black_Hat_Logo.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Every year the Web security community produces a stunning amount of new  hacking techniques published in various white papers, blog posts,  magazine articles, mailing list emails, etc. Within the thousands of  pages are the latest ways to attack websites, Web browsers, Web proxies,  and so on. Beyond individual vulnerability instances with CVE numbers  or system compromises, we&#39;re talking about actual new and creative  methods of Web-based attack. Now it its fifth year the &lt;span style=&quot;font-weight: bold;&quot;&gt;Top Ten Web Hacking Techniques&lt;/span&gt;  list encourages information sharing, provides a centralized  knowledge-base, and recognizes researchers who contribute excellent  work.&lt;br /&gt;
Since inception of the Top Ten Web Hacking Techniques list, the  diversity, volume, and innovation of security research has always been  impressive. 2010 produced 69 new attack techniques! This years  point-position voting  system worked well and the results showed exceptionally strong  competition throughout all the entries. In fact, only two entries did  not gain any points.&lt;br /&gt;
Please do not go to sleep after all these warnings all in the name of having a well formed firewall security.&lt;br /&gt;
Always on the run to help out in making sure your passwords and privacy is always save.&lt;br /&gt;
Regards!</content><link rel='replies' type='application/atom+xml' href='http://ethicalhackinginstitute1.blogspot.com/feeds/4597422414583015685/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/07/reasons-for-cracking.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/4597422414583015685'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/4597422414583015685'/><link rel='alternate' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/07/reasons-for-cracking.html' title='Hacking and cracking news'/><author><name>ethicalhackinginstitute</name><uri>http://www.blogger.com/profile/03158890439235970060</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXf9l-_pDFbl2LynQeanAhKXtlJBmhVhnRV3VSEy9h75wQFgVdQKEKfvIHfdjP8RKZDlt_2BlfY-Nfe3hC9UxD3moL5hode9ZIk4COzo7H-k6eiWn7GXWMh9ag3ov_z58TlQgZ5Ne1rgNN/s72-c/Black_Hat_Logo.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5145860179828431135.post-2178502657621059545</id><published>2011-07-11T18:24:00.000+01:00</published><updated>2011-07-13T20:19:41.400+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer tips"/><title type='text'>Keylogger hacking security</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhALn7Mon8m-rwOF16kRFNd6-3UeMtcs6yN57H3Nr7L9EKOV4ApehTl5gTD4QORisAiPy0DKg_NetxEQUGEalKMBTeba_uO9oMSMcRcFfX_tAYDbDZeOAkBXM-_52WkqX_sXnzfGE0r9FOi/s1600/keylogger.GIF&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;241&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhALn7Mon8m-rwOF16kRFNd6-3UeMtcs6yN57H3Nr7L9EKOV4ApehTl5gTD4QORisAiPy0DKg_NetxEQUGEalKMBTeba_uO9oMSMcRcFfX_tAYDbDZeOAkBXM-_52WkqX_sXnzfGE0r9FOi/s320/keylogger.GIF&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;What is a keylogger?&lt;br /&gt;
A keylogger is a kind of software that steals information from a computer and sends it to the database of the sender.It steals every stroke you make on your keyboard and also does screen snapping in time intervals.&lt;br /&gt;
What is a database?&lt;br /&gt;
A database is a space on the web that information is stored.For instance,a website.A website makes use of a database in other to exist on the internet.For a website the url{www.**************.com} you type is the name of the D.N.S in other for you to be able to view the destination you typed.I am sorry,I will not be discussing about web hosting for now but will focus on security.&lt;br /&gt;
This keylogger steals your information and stores it at the database of the sender.Any time he or she checks his database,he finds all your information that your computer have been doing.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; Security&lt;br /&gt;
This is mostly for those of you that checks your email account on cafes.If keylogger is installed on the system,you have been hacked.&lt;br /&gt;
Although,some people binds keylogger with software,application and any other thing they know you will like to download.I will advise you mind what ever download and install.&lt;br /&gt;
To manually detect if keylogger is installed on a system,press and hold this short code: shift+Ctrl+Alt and then tap H twice.&lt;br /&gt;
For some stubborn system hold: Shift+Ctrl+Alt+Del and then tap H twice.&lt;br /&gt;
If you are making use of a personal computer,get a version of system care.But the best is to format the computer if it is infected.</content><link rel='replies' type='application/atom+xml' href='http://ethicalhackinginstitute1.blogspot.com/feeds/2178502657621059545/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/07/keylogger-hacking-security.html#comment-form' title='6 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/2178502657621059545'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/2178502657621059545'/><link rel='alternate' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/07/keylogger-hacking-security.html' title='Keylogger hacking security'/><author><name>ethicalhackinginstitute</name><uri>http://www.blogger.com/profile/03158890439235970060</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhALn7Mon8m-rwOF16kRFNd6-3UeMtcs6yN57H3Nr7L9EKOV4ApehTl5gTD4QORisAiPy0DKg_NetxEQUGEalKMBTeba_uO9oMSMcRcFfX_tAYDbDZeOAkBXM-_52WkqX_sXnzfGE0r9FOi/s72-c/keylogger.GIF" height="72" width="72"/><thr:total>6</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5145860179828431135.post-4356871428818926183</id><published>2011-07-09T18:22:00.000+01:00</published><updated>2011-07-09T18:22:18.572+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Network tips"/><title type='text'>The difference between a hacker and a cracker</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIRlXzQ9JpL74VdUQoG3lmM5TGPi5XLQk-VVi8ph1SzdWXq3UCHaG7A-Xv1gd5u1L1JzG8hrGn3JB5zwGhYYds6h27XFyaxnfPB8O4Ft8nr78LtI3aBdj1rDAyZz-JOkBmvNzgtrD04b_-/s1600/hack.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIRlXzQ9JpL74VdUQoG3lmM5TGPi5XLQk-VVi8ph1SzdWXq3UCHaG7A-Xv1gd5u1L1JzG8hrGn3JB5zwGhYYds6h27XFyaxnfPB8O4Ft8nr78LtI3aBdj1rDAyZz-JOkBmvNzgtrD04b_-/s1600/hack.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Today I found out that most people do not know the difference between hacking and cracking so I decided to make a clear understanding.&lt;br /&gt;
&lt;b style=&quot;color: blue;&quot;&gt;What is hacking?&lt;/b&gt;&lt;br /&gt;
Hacking is the practice of modifying the features of a system, in  order to accomplish a goal outside of the creator&#39;s original purpose.  The person who is consistently engaging in hacking activities, and has  accepted hacking as a lifestyle and philosophy of their choice, is  called a &lt;strong&gt;hacker&lt;/strong&gt;.&lt;br /&gt;
&lt;strong&gt;Computer hacking&lt;/strong&gt; is the most popular form of hacking  nowadays, especially in the field of computer security, but hacking  exists in many other forms, such as phone hacking, brain hacking, etc.  and it&#39;s not limited to either of them.&lt;br /&gt;
Due to the mass attention given to &lt;span style=&quot;color: green; font-weight: bold;&quot;&gt;blackhat&lt;/span&gt;  hackers from the media, the whole hacking term is often mistaken for  any security related cyber crime. This damages the reputation of all  hackers, and is very cruel and unfair to the law abiding ones of them,  from who the term itself originated. The goal of this website is to  introduce people the true philosophy and ethics of hackers, hopefully  clearing their name and giving them the social status they deserve.&lt;br /&gt;
&lt;b style=&quot;color: blue;&quot;&gt;What is cracking? &lt;/b&gt;&lt;br /&gt;
Cracking means to break into a computer system. The term was coined in the mid-80s by hackers who wanted to differentiate themselves from individuals whose sole purpose is to sneak through security systems. Whereas &lt;em&gt;crackers&lt;/em&gt;  sole aim is to break into secure systems, hackers are more interested  in gaining knowledge about computer systems and possibly using this  knowledge for playful pranks. Although hackers still argue that there&#39;s a  big difference between what they do and what crackers do, the mass  media has failed to understand the distinction, so the two terms -- &lt;em&gt;hack&lt;/em&gt; and &lt;em&gt;crack&lt;/em&gt; -- are often used interchangeably.&lt;br /&gt;
Hope this will give you a clearer understanding of hacking and cracking.</content><link rel='replies' type='application/atom+xml' href='http://ethicalhackinginstitute1.blogspot.com/feeds/4356871428818926183/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/07/difference-between-hacker-and-cracker.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/4356871428818926183'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/4356871428818926183'/><link rel='alternate' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/07/difference-between-hacker-and-cracker.html' title='The difference between a hacker and a cracker'/><author><name>ethicalhackinginstitute</name><uri>http://www.blogger.com/profile/03158890439235970060</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIRlXzQ9JpL74VdUQoG3lmM5TGPi5XLQk-VVi8ph1SzdWXq3UCHaG7A-Xv1gd5u1L1JzG8hrGn3JB5zwGhYYds6h27XFyaxnfPB8O4Ft8nr78LtI3aBdj1rDAyZz-JOkBmvNzgtrD04b_-/s72-c/hack.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5145860179828431135.post-6947257311635536044</id><published>2011-07-03T20:38:00.000+01:00</published><updated>2011-07-03T20:38:37.552+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Network tips"/><title type='text'>Javasript hacking security</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglw9ULQWncrvs7xAwJ-4CB0VxOfZzySW3Co_hrpR6oEgw05qV8y1lJ81ey8OSUB3cvsivfIqMlkfrB6Czvi3r5qWoX9ZWQHMjgnY8Ryq0zeQMBCC4PraL-v1iByWJjRfPjjkBwUXFntNTC/s1600/logoJavascript.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglw9ULQWncrvs7xAwJ-4CB0VxOfZzySW3Co_hrpR6oEgw05qV8y1lJ81ey8OSUB3cvsivfIqMlkfrB6Czvi3r5qWoX9ZWQHMjgnY8Ryq0zeQMBCC4PraL-v1iByWJjRfPjjkBwUXFntNTC/s1600/logoJavascript.jpg&quot; /&gt;&lt;/a&gt;I talked about &lt;a href=&quot;http://ethicalhackinginstitute1.blogspot.com/2011/07/scam-page-hacking-security.html&quot;&gt;scam page hacking security&lt;/a&gt; and now we are on the most deadly type of hacking,javascript hacking.&lt;br /&gt;
Javascript&amp;nbsp; is one of the most deadly type of hacking and the hardest to secure against because,it can be used to hack even a hacker.So I wonder how easy it will look like for a non hacker to secure.&lt;br /&gt;
Never the less,am sure with this little you should be able to secure yourself from every form of javascript hacking.&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;HOW IT IS PERFORMED&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Javascript hacking can only be secured against if only you are careful enough to be in readiness and always cautious of your &lt;b&gt;url&lt;/b&gt; box.&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Javascript can is sent to steal your cookies and for sure,once your cookies is stolen,you have been hacked and you might not even know that you have been hacked.It even steals your browser&#39;s detail.&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;SOLUTION&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;* You must always be on a cautious mind each time you click on any unread message.&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;* Your eyes must always be on the {URL} tab while loading.if you see anything like &quot;checkscript&quot; or anything related to &lt;b style=&quot;color: red;&quot;&gt;script&lt;/b&gt;&lt;span style=&quot;color: black;&quot;&gt; know that you have been script hacked.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;* Change your password periodically.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;* Only check your email account with a computer each time.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;* Sometimes you will see on the subject of your mail in this format: javacript: getform/script*******************,just ignore it or delete it less you will be hacked once you click on it&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://ethicalhackinginstitute1.blogspot.com/feeds/6947257311635536044/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/07/javasript-hacking-security.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/6947257311635536044'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/6947257311635536044'/><link rel='alternate' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/07/javasript-hacking-security.html' title='Javasript hacking security'/><author><name>ethicalhackinginstitute</name><uri>http://www.blogger.com/profile/03158890439235970060</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglw9ULQWncrvs7xAwJ-4CB0VxOfZzySW3Co_hrpR6oEgw05qV8y1lJ81ey8OSUB3cvsivfIqMlkfrB6Czvi3r5qWoX9ZWQHMjgnY8Ryq0zeQMBCC4PraL-v1iByWJjRfPjjkBwUXFntNTC/s72-c/logoJavascript.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5145860179828431135.post-6419470805162838965</id><published>2011-07-03T20:16:00.000+01:00</published><updated>2011-07-03T20:16:16.904+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Network tips"/><title type='text'>Scam page hacking security</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinHNpFuuQGQxO0I5uQV4KFww7LwMhTaEmleymYMo42vY1x0CX5pKV_ENzIqv5jVRTWQkwBPSfM3vknjSivtC31WOW6uWkuCnBAPwv5e0I8t6KrVNgnTcC22uKNU1Xv14KYOt-C0sRyHIp_/s1600/fake.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinHNpFuuQGQxO0I5uQV4KFww7LwMhTaEmleymYMo42vY1x0CX5pKV_ENzIqv5jVRTWQkwBPSfM3vknjSivtC31WOW6uWkuCnBAPwv5e0I8t6KrVNgnTcC22uKNU1Xv14KYOt-C0sRyHIp_/s1600/fake.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Today I found out that it is necessary for you guys to know that yahoo,gmail and every other mail agents will not ask you guys to re-login to your account when an upgrade or anything want&#39;s to be done to your account.&lt;br /&gt;
As for some of you that makes use of online account,you must take this very serious.&lt;br /&gt;
HOW POSSIBLE?&lt;br /&gt;
These days cracking is very common especially with teenagers.I know you must have heard of something called scam page one way or the other.&lt;br /&gt;
Scam page is a fake page configured by a cracker to steal information from you in other to get access to your privacy.This scam page is sent to the victim after configuration and in you by any means make use of it, your information will be sent to the sender of the scam page and he will have full access to your privacy and can do anything with it.&lt;br /&gt;
SOLUTION&lt;br /&gt;
Some people sends this scam page with their email account and with my post on &lt;a href=&quot;http://ethicalhackinginstitute1.blogspot.com/2011/07/how-to-trace-source-of-e-mail.html&quot;&gt;how to trace the source of an email&lt;/a&gt;,you would be able to detect where it is from,if from a right source or a cracker.&lt;br /&gt;
Just trace the source of the message and you will verify if it&#39;s from the right source or not</content><link rel='replies' type='application/atom+xml' href='http://ethicalhackinginstitute1.blogspot.com/feeds/6419470805162838965/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/07/scam-page-hacking-security.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/6419470805162838965'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/6419470805162838965'/><link rel='alternate' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/07/scam-page-hacking-security.html' title='Scam page hacking security'/><author><name>ethicalhackinginstitute</name><uri>http://www.blogger.com/profile/03158890439235970060</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinHNpFuuQGQxO0I5uQV4KFww7LwMhTaEmleymYMo42vY1x0CX5pKV_ENzIqv5jVRTWQkwBPSfM3vknjSivtC31WOW6uWkuCnBAPwv5e0I8t6KrVNgnTcC22uKNU1Xv14KYOt-C0sRyHIp_/s72-c/fake.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5145860179828431135.post-4569729824379824739</id><published>2011-07-03T19:59:00.000+01:00</published><updated>2011-07-03T20:05:25.346+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Network tips"/><title type='text'>How to trace the source of an e-mail</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjciWbdq_ejSQTGkvqdTTQF5mNsWB_5ZL10goxAz1wv5pFr_QYDN3Wvz-xjUoXmGQvgUwneFbd6eB82FJyaAJNhUYkU-438d0HyXJsyZjOAgeGNTaNU9427GBVSXvcEwTSJ6bmnCEYwwwfy/s1600/trace.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjciWbdq_ejSQTGkvqdTTQF5mNsWB_5ZL10goxAz1wv5pFr_QYDN3Wvz-xjUoXmGQvgUwneFbd6eB82FJyaAJNhUYkU-438d0HyXJsyZjOAgeGNTaNU9427GBVSXvcEwTSJ6bmnCEYwwwfy/s1600/trace.jpeg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Tracing the source of an email sent to you is one of my favorite due to the fact that it gives me more confidence of where and who sent the mail and avoid being hacked unknowingly.&lt;br /&gt;
This tutor will be covering outlook,Gmail,Yahoomail,Hotmail,AOL and Windows live.&lt;br /&gt;
I found it necessary to make an article of this because,these days cracking is so common among teenagers making it deadly for you and me to keep our heads layed down asleep.&lt;br /&gt;
Most crackers makes use of something called scam page which I will be making a post of in my next post.with this,you should be able to know if it is a scam or real.&lt;br /&gt;
For sure we all know that all email comes with headers,these headers contains various information that could be used to identify where it comes from in which containing the original internet protocol(I.P) address and the routing of the message.&lt;br /&gt;
Although not all electronic message you receive will allow you to trace them back to their originating point.&lt;br /&gt;
HOW TO&lt;br /&gt;
For:&lt;br /&gt;
Outlook - Right click on the message while in inbox and chose MESSAGE OPTION ,a new window will appear containing the headers at the bottom of it.&lt;br /&gt;
Gmail - Open the correspondent,at the upper right corner of the page,you will see the word REPLY with a little down arrow,chose chow original,the headers will be shown.&lt;br /&gt;
Yahoomail - Right click on the note and chose VIEW FULL HEADER,and you will be left with the headers of the mail.&lt;br /&gt;
AOL - Click on ACTION and then VIEW MESSAGE SOURCE&lt;br /&gt;
Windows - Right click on the correspondent while in inbox and then chose PROPERTIES,then click the DETAIL tab and you will be left with headers.&lt;br /&gt;
Note: You have to look carefully less you mistake something else for another.&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;You have successfully traced the source of you mail!&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://ethicalhackinginstitute1.blogspot.com/feeds/4569729824379824739/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/07/how-to-trace-source-of-e-mail.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/4569729824379824739'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/4569729824379824739'/><link rel='alternate' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/07/how-to-trace-source-of-e-mail.html' title='How to trace the source of an e-mail'/><author><name>ethicalhackinginstitute</name><uri>http://www.blogger.com/profile/03158890439235970060</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjciWbdq_ejSQTGkvqdTTQF5mNsWB_5ZL10goxAz1wv5pFr_QYDN3Wvz-xjUoXmGQvgUwneFbd6eB82FJyaAJNhUYkU-438d0HyXJsyZjOAgeGNTaNU9427GBVSXvcEwTSJ6bmnCEYwwwfy/s72-c/trace.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5145860179828431135.post-2923318669909268941</id><published>2011-07-03T19:41:00.000+01:00</published><updated>2011-07-03T19:41:20.399+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer tips"/><title type='text'>How to activate windows after expiration</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtyudhknkry38X4W73m6R-RzKmiJ6AbHQMBL2uV3dbvlAIR6SBoEeXhbSaQ3leVNuBd-fPBHPYsgmePKUj5s6Hn2wpT91qBKheArzmexRL06qErUh651We8BxUJfA50u4TGkvv3kkp7W4F/s1600/win.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;239&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtyudhknkry38X4W73m6R-RzKmiJ6AbHQMBL2uV3dbvlAIR6SBoEeXhbSaQ3leVNuBd-fPBHPYsgmePKUj5s6Hn2wpT91qBKheArzmexRL06qErUh651We8BxUJfA50u4TGkvv3kkp7W4F/s320/win.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;To activate your expired windows,just follow my little explanation below!&lt;br /&gt;
Click on START &amp;gt;&amp;gt; RUN &amp;gt;&amp;gt; and then type &#39;regedit&#39;.&lt;br /&gt;
Now click on HKEY_LOCAL_MACHINE &amp;gt;&amp;gt; SOFTWARE &amp;gt;&amp;gt; MICROSOFT &amp;gt;&amp;gt; WINDOWS INT&lt;br /&gt;
Now you will see WPAEvent,all you need to do is just to locate OOBETimer,double click on it for it to open.&lt;br /&gt;
You will see a code,delete it and let&#39;s proceed...&lt;br /&gt;
In the position in which you deleted the old code,type and insert the following code:&lt;br /&gt;
FF D5 71 D6 8D 6F D5 33 93 FD&lt;br /&gt;
Note:You must not copy paste the code above because,if you do,it may not work so type it as shown above.&lt;br /&gt;
Next is to click on OK.&lt;br /&gt;
Right click on WPAEvents and then permissions and then select system and then DENY of FULL CONTROL and finally,click on OK.&lt;br /&gt;
Now click on OK dialog box until you are finished with it.&lt;br /&gt;
Next step is to close everything cos you are done.&lt;br /&gt;
CHECK IF IT WORKED&lt;br /&gt;
Now click on START &amp;gt;&amp;gt; ALL PROGRAMS &amp;gt;&amp;gt; ACTIVATE WINDOWS.&lt;br /&gt;
You will find out that the message that comes up will no longer be that windows is expired but windows already updated.&lt;br /&gt;
Regards!</content><link rel='replies' type='application/atom+xml' href='http://ethicalhackinginstitute1.blogspot.com/feeds/2923318669909268941/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/07/how-to-activate-windows-after.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/2923318669909268941'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/2923318669909268941'/><link rel='alternate' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/07/how-to-activate-windows-after.html' title='How to activate windows after expiration'/><author><name>ethicalhackinginstitute</name><uri>http://www.blogger.com/profile/03158890439235970060</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtyudhknkry38X4W73m6R-RzKmiJ6AbHQMBL2uV3dbvlAIR6SBoEeXhbSaQ3leVNuBd-fPBHPYsgmePKUj5s6Hn2wpT91qBKheArzmexRL06qErUh651We8BxUJfA50u4TGkvv3kkp7W4F/s72-c/win.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5145860179828431135.post-4599959507721685727</id><published>2011-06-28T12:50:00.000+01:00</published><updated>2011-06-28T12:50:27.839+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Phone tips"/><title type='text'>List of Sony Ericsson Secret Codes, Tips and Tricks</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8H_355NecLqNzml3w7mW2cmLOdmkQ4GD3J2KLMQ412gQGmM59WVLOzOdIaWJ3F5pn4uwKNxJ9hI_ptNRwbBVUpsEpuSD9WKR7hF7uAp7SHWn6ajqdJPKapFiQKb1Faca-97NjuBqHdGsV/s1600/Sony-Ericsson-S500.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8H_355NecLqNzml3w7mW2cmLOdmkQ4GD3J2KLMQ412gQGmM59WVLOzOdIaWJ3F5pn4uwKNxJ9hI_ptNRwbBVUpsEpuSD9WKR7hF7uAp7SHWn6ajqdJPKapFiQKb1Faca-97NjuBqHdGsV/s320/Sony-Ericsson-S500.jpg&quot; width=&quot;225&quot; /&gt;&lt;/a&gt;&lt;/div&gt;*#06# for checking the IMEI&lt;br /&gt;
(International Mobile&lt;br /&gt;
Equipment Identity) &amp;gt;*&amp;lt;&amp;lt;*&amp;lt;* for checking the firmware revision information (software release) &amp;gt;*&amp;lt;&amp;lt;*&amp;lt;*&amp;gt;&amp;gt; n-row text&lt;br /&gt;
strings. if pressing yes you&lt;br /&gt;
can check the phones text&lt;br /&gt;
programming in currently&lt;br /&gt;
selected language. Shortcut for Last Dialed call&lt;br /&gt;
menu&lt;br /&gt;
If you for some reason don ’t want to enter the ‘Last Dialed calls menu’  by using the ‘YES ’ key you can use the following key stroke&lt;br /&gt;
instead: First ’0′ then ‘#’. Access menu without Sim&lt;br /&gt;
card&lt;br /&gt;
To access to the menu in&lt;br /&gt;
your phone without having&lt;br /&gt;
a card inside do the&lt;br /&gt;
following: type **04*0000*0000*0000# When&lt;br /&gt;
display say “Wrong Pin ” press NO and you have access&lt;br /&gt;
to the all menus: Info,&lt;br /&gt;
Access, Settings, Calculator,&lt;br /&gt;
Clock, Keylock On?, Mail,&lt;br /&gt;
Phone book. NOTE if you try&lt;br /&gt;
this on your phone may stop at Keylock On? menu and&lt;br /&gt;
you´ll have to take your&lt;br /&gt;
battery out to turn the&lt;br /&gt;
phone on again. And this will&lt;br /&gt;
not care about Phone lock! A way to (un)lock your cell&lt;br /&gt;
phone on to the network&lt;br /&gt;
(subset):&lt;br /&gt;
1. Press &amp;lt;**&amp;lt; 2. Then on the display appear and give you two choices: Lock to Network ? and Lock to Network subset? (Use arrow keys to select) 3. Enter the NCK number (code is provided by the SP) 4. You have 5 attemps to do this 5. Then your cell phone will work &#39;only&#39; with the network Warning: The Service Provider (SP) Lock menu is used to lock the cell phone to the SP&#39;s SIM card. Once the cell phone is locked to a specific operator, if one inserts a SIM card from a different operator the phone will refuse to accept it! The cell phone will however accept another SIM card from the same operator. To activate/deactivate this lock one needs a special secret code that is not available to the end user. Your phone can be locked to a service provider FOREVER by doing this! If an invalid code is entered all five times, the menu will exit and be deactivated! Any further attempt to activate the NCK/ NSCK lock Menu will result in the response &quot;Not allowed&quot;! However the NCK/NSCK lock can be recover through a direct clearing in the EEPROM. Message Report When you writing a message, place at the start of it the code *0# and continue with your message. It&#39;s job is like nokias report. It gives you information about the sended message. T18 *#06# for checking the IMEI (International Mobile Equipment Identity) Information you get from the IMEI: XXXXXX XX XXXXXX X TAC FAC SNR SP TAC = Type approval code FAC = Final assembly code SNR = Serial number SP = Spare To access SIM-Locking menu of your phone, press: &amp;lt; * [CLR] &amp;lt; Be carefull or you may lock your phone. Message Report When you writing a message, place at the start of it the code *0# and continue with your message. It&#39;s job is like nokias report. It gives you information about the sended message. T28 *#06# for checking the IMEI (International Mobile Equipment Identity) &amp;gt;*&amp;lt;&amp;lt;*&amp;lt;* for checking the firmware revision information (software release) &amp;gt;*&amp;lt;&amp;lt;*&amp;lt;*&amp;gt; 1-row text strings.&lt;br /&gt;
if pressing yes you can check&lt;br /&gt;
the phones text&lt;br /&gt;
programming in currently&lt;br /&gt;
selected language. &amp;gt;*&amp;lt;&amp;lt;*&amp;lt;*&amp;gt;&amp;gt; n-row text&lt;br /&gt;
strings. if pressing yes you&lt;br /&gt;
can check the phones text&lt;br /&gt;
programming in currently&lt;br /&gt;
selected language. The Service Provider (SP)&lt;br /&gt;
Lock&lt;br /&gt;
The Service Provider (SP)&lt;br /&gt;
Lock menu is used to lock&lt;br /&gt;
the cell phone to the SP ’s SIM card. Once the cell phone is&lt;br /&gt;
locked to a specific operator,&lt;br /&gt;
if one inserts a SIM card from&lt;br /&gt;
a different operator the&lt;br /&gt;
phone will refuse to accept&lt;br /&gt;
it! The cell phone will however accept another SIM&lt;br /&gt;
card from the same operator. To activate/deactivate this&lt;br /&gt;
lock one needs a special&lt;br /&gt;
secret code that is not&lt;br /&gt;
available to the end user. Here is how to activate the&lt;br /&gt;
menu: &amp;lt;**&amp;lt; Lock to Network? if pressing yes you have 5 attempts to enter NCK. &amp;lt;**&amp;lt;&amp;lt; Lock to Network subset? if pressing yes you have 5 attempts to enter NSCK. Warning: Your phone can be locked to a service provider FOREVER by doing this! If an invalid code is entered all five times, the menu will exit and be deactivated! Any further attempt to activate the NCK/NSCK lock Menu will result in the response &quot;Not allowed&quot;! However the NCK/ NSCK lock can be recover through a direct clearing in the EEPROM. Shortcut for Last Dialed call menu If you for some reason don&#39;t want to enter the &#39;Last Dialed calls menu&#39; by using the &#39;YES&#39; key you can use the following key stroke instead: First &#39;0&#39; then &#39;#&#39;. Message Report When you are writing a message, place at the start of it the code *0# and continue with your message. It&#39;s job is like nokias report. It gives you information about the sended message. 388 *#06# for checking the IMEI (International Mobile Equipment Identity) *#0000# to reset the phones menu-language to English. &amp;gt;*&amp;lt;&amp;lt;*&amp;lt;* for checking the firmware revision information (software release) &amp;gt;*&amp;lt;&amp;lt;*&amp;lt;*&amp;gt; 1-row text strings.&lt;br /&gt;
if pressing yes you can check&lt;br /&gt;
the phones text&lt;br /&gt;
programming in currently&lt;br /&gt;
selected language. (298&lt;br /&gt;
entries) &amp;gt;*&amp;lt;&amp;lt;*&amp;lt;*&amp;gt;&amp;gt; n-row text&lt;br /&gt;
strings. if pressing yes you&lt;br /&gt;
can check the phones text&lt;br /&gt;
programming in currently&lt;br /&gt;
selected language. (160&lt;br /&gt;
entries?) The Service Provider (SP)&lt;br /&gt;
Lock menu is used to lock&lt;br /&gt;
the cell phone to the SP ’s SIM card. Once the cell phone is&lt;br /&gt;
locked to a specific operator,&lt;br /&gt;
if one inserts a SIM card from&lt;br /&gt;
a different operator the&lt;br /&gt;
phone will refuse to accept&lt;br /&gt;
it! The cell phone will however accept another SIM&lt;br /&gt;
card from the same operator. To activate/deactivate this&lt;br /&gt;
lock one needs a special&lt;br /&gt;
secret code that is not&lt;br /&gt;
available to the end user.&lt;br /&gt;
(not even to you … or is it ? in case please let me know!) &amp;lt;**&amp;lt; Lock to Network? if pressing yes you have 5 attempts to enter NCK. &amp;lt;**&amp;lt;&amp;lt; Lock to Network subset? if pressing yes you have 5 attempts to enter NSCK. Warning: Your phone can be locked to a service provider FOREVER by doing this! If an invalid code is entered all five times, the menu will exit and be deactivated! Any further attempt to activate the NCK/NSCK lock Menu will result in the response &quot;Not allowed&quot;! However the NCK/ NSCK lock can be recover through a direct clearing in the EEPROM. Shortcut for Last Dialed call menu... If you for some reason don&#39;t want to enter the &#39;Last Dialed calls menu&#39; by using the &#39;YES&#39; key you can use the following key stroke instead: First &#39;0&#39; then &#39;#&#39;. Access menu without Sim card ... To access to the menu in your phone without having a card inside do the following: type **04*0000*0000*0000# When display say &quot;Wrong Pin&quot; press NO and you have access to the all menus: Info, Access, Settings, Calculator, Clock, Keylock On?, Mail, Phone book. NOTE if you try this on the GH688 your phone may stop at Keylock On? menu and you´ll have to take your battery out to turn the phone on again. GA628 *#06# for checking the IMEI (International Mobile Equipment Identity) *#0000# to reset the phones menu-language to English. *#103# then YES Time and date will be shown. &amp;gt;*&amp;lt;&amp;lt;*&amp;lt;* for checking the firmware revision information (software release) &amp;gt;*&amp;lt;&amp;lt;*&amp;lt;*&amp;gt; 1-row text strings.&lt;br /&gt;
if pressing yes you can check&lt;br /&gt;
the phones text&lt;br /&gt;
programming in currently&lt;br /&gt;
selected language. (298&lt;br /&gt;
entries) &amp;gt;*&amp;lt;&amp;lt;*&amp;lt;*&amp;gt;&amp;gt; n-row text&lt;br /&gt;
strings. if pressing yes you&lt;br /&gt;
can check the phones text&lt;br /&gt;
programming in currently&lt;br /&gt;
selected language. (160&lt;br /&gt;
entries?) The Service Provider (SP)&lt;br /&gt;
Lock&lt;br /&gt;
The Service Provider (SP)&lt;br /&gt;
Lock menu is used to lock&lt;br /&gt;
the cell phone to the SP ’s SIM card. Once the cell phone is&lt;br /&gt;
locked to a specific operator,&lt;br /&gt;
if one inserts a SIM card from&lt;br /&gt;
a different operator the&lt;br /&gt;
phone will refuse to accept&lt;br /&gt;
it! The cell phone will however accept another SIM&lt;br /&gt;
card from the same operator. To activate/deactivate this&lt;br /&gt;
lock one needs a special&lt;br /&gt;
secret code that is not&lt;br /&gt;
available to the end user. Here is how to activate the&lt;br /&gt;
menu: &amp;lt;**&amp;lt; Lock to Network? if pressing yes you have 5 attempts to enter NCK. &amp;lt;**&amp;lt;&amp;lt; Lock to Network subset? if pressing yes you have 5 attempts to enter NSCK. Warning: Your phone can be locked to a service provider FOREVER by doing this! If an invalid code is entered all five times, the menu will exit and be deactivated! Any further attempt to activate the NCK/NSCK lock Menu will result in the response &quot;Not allowed&quot;! However the NCK/ NSCK lock can be recover through a direct clearing in the EEPROM. Shortcut for Last Dialed call menu If you for some reason don&#39;t want to enter the &#39;Last Dialed calls menu&#39; by using the &#39;YES&#39; key you can use the following key stroke instead: First &#39;0&#39; then &#39;#&#39;. Bat. level indicator when turned OFF When the phone is turned off and the phone is not changing - the bat. level can be seen for a short period of time by pressing the &#39;NO&#39; key quick once (it has to be quick!) and then wait for about 2 sec. The bat. level will now be shown in the display at its normal position. Access menu without Sim card To access to the menu in your phone without having a card inside do the following: type **04*0000*0000*0000# When display say &quot;Wrong Pin&quot; press NO and you have access to the all menus: Info, Access, Settings, Calculator, Clock, Keylock On?, Mail, Phone book. NOTE if you try this on your phone may stop at Keylock On? menu and you´ll have to take your battery out to turn the phone on again. Alarm Clock Menu Go to MissedCall Empty the list Press the -&amp;gt; key for a&lt;br /&gt;
second or two The option&lt;br /&gt;
Menu size turns up Choose&lt;br /&gt;
‘yes ’ and go from there. An alarm clock turned up&lt;br /&gt;
too but it never rang. I think&lt;br /&gt;
this was because there is no&lt;br /&gt;
clock in the phone. Free phone calls using the&lt;br /&gt;
GA628&lt;br /&gt;
This trick has only been&lt;br /&gt;
reported working on&lt;br /&gt;
PREPAID GSM CARDS and in&lt;br /&gt;
some countries and with some sw versions. The prepaid GSM SIM CARD is&lt;br /&gt;
a kind of “SIM card” which only has a sertant amount of&lt;br /&gt;
credit on it (like a normal&lt;br /&gt;
phonebox telecard) … if it can be traced? – we don ’t know … Well..here ’s the trick you dial the no. normally and press&lt;br /&gt;
YES. While “connecting ” is shown on the screen, the&lt;br /&gt;
following procedure should&lt;br /&gt;
be carried out: Press CLR then&lt;br /&gt;
0 then # and then NO (twice)&lt;br /&gt;
so as to switch OFF the&lt;br /&gt;
phone. You can then still speak on the phone while it&lt;br /&gt;
is switched off but the SIM&lt;br /&gt;
card does not record your&lt;br /&gt;
calls which will lead to FREE&lt;br /&gt;
phone calls in some&lt;br /&gt;
countries.. we hope!! Another variant of the code&lt;br /&gt;
Make a Call, while the phone&lt;br /&gt;
says Connecting type 083#&lt;br /&gt;
(the position 83 must be&lt;br /&gt;
empty! ), when phone says&lt;br /&gt;
Pos Emtpy, press the NO key and turn off the phone. If you can make the call&lt;br /&gt;
with the phone turned off&lt;br /&gt;
you will face a problem&lt;br /&gt;
when you need to hang up&lt;br /&gt;
the phone …the only way for you to do that is remove the&lt;br /&gt;
battery …??? Gh688 *#06# for checking the IMEI&lt;br /&gt;
(International Mobile&lt;br /&gt;
Equipment Identity) *#0000# to reset the phones&lt;br /&gt;
menu-language to English. *#103# then YES Time and&lt;br /&gt;
date will be shown. &amp;gt;*&amp;lt;&amp;lt;*&amp;lt;* for checking the firmware revision information (software release) &amp;gt;*&amp;lt;&amp;lt;*&amp;lt;*&amp;gt; 1-row text strings.&lt;br /&gt;
if pressing yes you can check&lt;br /&gt;
the phones text&lt;br /&gt;
programming in currently&lt;br /&gt;
selected language. (298&lt;br /&gt;
entries) &amp;gt;*&amp;lt;&amp;lt;*&amp;lt;*&amp;gt;&amp;gt; n-row text&lt;br /&gt;
strings. if pressing yes you&lt;br /&gt;
can check the phones text&lt;br /&gt;
programming in currently&lt;br /&gt;
selected language. (160&lt;br /&gt;
entries?) The Service Provider (SP)&lt;br /&gt;
Lock&lt;br /&gt;
The Service Provider (SP)&lt;br /&gt;
Lock menu is used to lock&lt;br /&gt;
the cell phone to the SP ’s SIM card. Once the cell phone is&lt;br /&gt;
locked to a specific operator,&lt;br /&gt;
if one inserts a SIM card from&lt;br /&gt;
a different operator the&lt;br /&gt;
phone will refuse to accept&lt;br /&gt;
it! The cell phone will however accept another SIM&lt;br /&gt;
card from the same operator. To activate/deactivate this&lt;br /&gt;
lock one needs a special&lt;br /&gt;
secret code that is not&lt;br /&gt;
available to the end user. Here is how to activate the&lt;br /&gt;
menu: &amp;lt;**&amp;lt; Lock to Network? if pressing yes you have 5 attempts to enter NCK. &amp;lt;**&amp;lt;&amp;lt; Lock to Network subset? if pressing yes you have 5 attempts to enter NSCK. Warning: Your phone can be locked to a service provider FOREVER by doing this! If an invalid code is entered all five times, the menu will exit and be deactivated! Any further attempt to activate the NCK/NSCK lock Menu will result in the response &quot;Not allowed&quot;! However the NCK/ NSCK lock can be recover through a direct clearing in the EEPROM. Shortcut for Last Dialed call menu If you for some reason don&#39;t want to enter the &#39;Last Dialed calls menu&#39; by using the &#39;YES&#39; key you can use the following key stroke instead: First &#39;0&#39; then &#39;#&#39;. Bat. level indicator when turned OFF When the phone is turned off and the phone is not changing - the bat. level can be seen for a short period of time by pressing the &#39;NO&#39; key quick once (it has to be quick!) and then wait for about 2 sec. The bat. level will now be shown in the display at its normal position. Access menu without Sim card To access to the menu in your phone without having a card inside do the following: type **04*0000*0000*0000# When display say &quot;Wrong Pin&quot; press NO and you have access to the all menus: Info, Access, Settings, Calculator, Clock, Keylock On?, Mail, Phone book. NOTE if you try this on your phone may stop at Keylock On? menu and you´ll have to take your battery out to turn the phone on again. Full Operator List You can view the full operator list by doing the following: Go to the &#39;Edit list&#39; menu under &#39;networks&#39;. The phone say &#39;please wait&#39; (searching for other networks). When finished, Press the &amp;lt; key once, then YES twice. Now the phone displays the full list. Browse through the list with the &amp;lt; &amp;gt; keys. Monitor mod on Ericsson&lt;br /&gt;
GH688&lt;br /&gt;
How to enable net monitor&lt;br /&gt;
on Ericson 688.. 1. Remove SIM from phone&lt;br /&gt;
2. Dial 112, press YES, hear&lt;br /&gt;
something&lt;br /&gt;
3. Dial 112YESNO 4. Press &amp;lt; (left arrow) before SETTINGS 5. Then YES, &amp;lt;(left arrow), then you will see NM on? 6. press YES Free phone calls using the GH688 This trick has only been reported working on PREPAID GSM CARDS and in some countries and with some sw versions. The prepaid GSM SIM CARD is a kind of &quot;SIM card&quot; which only has a sertant amount of credit on it (like a normal phonebox telecard)... if it can be traced? - we don&#39;t know... Well..here&#39;s the trick you dial the no. normally and press YES. While &quot;connecting&quot; is shown on the screen, the following procedure should be carried out: Press CLR then 0 then # and then NO (twice) so as to switch OFF the phone. You can then still speak on the phone while it is switched off but the SIM card does not record your calls which will lead to FREE phone calls in some countries.. we hope!! Another variant of the code Make a Call, while the phone says Connecting type 083# (the position 83 must be empty! ), when phone says Pos Emtpy, press the NO key and turn off the phone. If you can make the call with the phone turned off you will face a problem when you need to hang up the phone...the only way for you to do that is remove the battery...??? GF788 *#06# for checking the IMEI (International Mobile Equipment Identity) If you dial 923885 and &amp;gt; .It ’ll appear a great menu, to&lt;br /&gt;
change several options like&lt;br /&gt;
menu’s string( welcome, roaming, normal), to change&lt;br /&gt;
band codes and other things. &amp;gt;*&amp;lt;&amp;lt;*&amp;lt;* for checking the firmware revision information (software release) &amp;gt;*&amp;lt;&amp;lt;*&amp;lt;*&amp;gt; 1-row text strings.&lt;br /&gt;
if pressing yes you can check&lt;br /&gt;
the phones text&lt;br /&gt;
programming in currently&lt;br /&gt;
selected language. (298&lt;br /&gt;
entries) &amp;gt;*&amp;lt;&amp;lt;*&amp;lt;*&amp;gt;&amp;gt; n-row text&lt;br /&gt;
strings. if pressing yes you&lt;br /&gt;
can check the phones text&lt;br /&gt;
programming in currently&lt;br /&gt;
selected language. (160&lt;br /&gt;
entries?) The Service Provider (SP)&lt;br /&gt;
Lock&lt;br /&gt;
The Service Provider (SP)&lt;br /&gt;
Lock menu is used to lock&lt;br /&gt;
the cell phone to the SP ’s SIM card. Once the cell phone is&lt;br /&gt;
locked to a specific operator,&lt;br /&gt;
if one inserts a SIM card from&lt;br /&gt;
a different operator the&lt;br /&gt;
phone will refuse to accept&lt;br /&gt;
it! The cell phone will however accept another SIM&lt;br /&gt;
card from the same operator. To activate/deactivate this&lt;br /&gt;
lock one needs a special&lt;br /&gt;
secret code that is not&lt;br /&gt;
available to the end user. Here is how to activate the&lt;br /&gt;
menu: &amp;lt;**&amp;lt; Lock to Network? if pressing yes you have 5 attempts to enter NCK. &amp;lt;**&amp;lt;&amp;lt; Lock to Network subset? if pressing yes you have 5 attempts to enter NSCK. Warning: Your phone can be locked to a service provider FOREVER by doing this! If an invalid code is entered all five times, the menu will exit and be deactivated! Any further attempt to activate the NCK/NSCK lock Menu will result in the response &quot;Not allowed&quot;! However the NCK/ NSCK lock can be recover through a direct clearing in the EEPROM. Shortcut for Last Dialed call menu If you for some reason don&#39;t want to enter the &#39;Last Dialed calls menu&#39; by using the &#39;YES&#39; key you can use the following key stroke instead: First &#39;0&#39; then &#39;#&#39;. Bat. level indicator when turned OFF When the phone is turned off and the phone is not changing - the bat. level can be seen for a short period of time by pressing the &#39;NO&#39; key quick once (it has to be quick!) and then wait for about 2 sec. The bat. level will now be shown in the display at its normal position. Access menu without Sim card To access to the menu in your phone without having a card inside do the following: type **04*0000*0000*0000# When display say &quot;Wrong Pin&quot; press NO and you have access to the all menus: Info, Access, Settings, Calculator, Clock, Keylock On?, Mail, Phone book. NOTE if you try this on your phone may stop at Keylock On? menu and you´ll have to take your battery out to turn the phone on again. Free phone calls using the GF788 This trick has only been reported working on PREPAID GSM CARDS and in some countries and with some sw versions. The prepaid GSM SIM CARD is a kind of &quot;SIM card&quot; which only has a sertant amount of credit on it (like a normal phonebox telecard)... if it can be traced? - we don&#39;t know... Well..here&#39;s the trick you dial the no. normally and press YES. While &quot;connecting&quot; is shown on the screen, the following procedure should be carried out: Press CLR then 0 then # and then NO (twice) so as to switch OFF the phone. You can then still speak on the phone while it is switched off but the SIM card does not record your calls which will lead to FREE phone calls in some countries.. we hope!! Another variant of the code Make a Call, while the phone says Connecting type 083# (the position 83 must be empty! ), when phone says Pos Emtpy, press the NO key and turn off the phone. If you can make the call with the phone turned off you will face a problem when you need to hang up the phone...the only way for you to do that is remove the battery...??? SH888 *#06# for checking the IMEI (International Mobile Equipment Identity) &amp;gt;*&amp;lt;&amp;lt;*&amp;lt;* for checking the firmware revision information (software release) &amp;gt;*&amp;lt;&amp;lt;*&amp;lt;*&amp;gt; 1-row text strings.&lt;br /&gt;
if pressing yes you can check&lt;br /&gt;
the phones text&lt;br /&gt;
programming in currently&lt;br /&gt;
selected language. &amp;gt;*&amp;lt;&amp;lt;*&amp;lt;*&amp;gt;&amp;gt; n-row text&lt;br /&gt;
strings. if pressing yes you&lt;br /&gt;
can check the phones text&lt;br /&gt;
programming in currently&lt;br /&gt;
selected language. &amp;gt;*&amp;lt;&amp;lt;*&amp;lt;*&amp;gt;&amp;gt;&amp;gt; IR version info. if&lt;br /&gt;
pressing yes you can check&lt;br /&gt;
the phones IR device ’s driver version. The Service Provider (SP)&lt;br /&gt;
Lock&lt;br /&gt;
The Service Provider (SP)&lt;br /&gt;
Lock menu is used to lock&lt;br /&gt;
the cell phone to the SP ’s SIM card. Once the cell phone is&lt;br /&gt;
locked to a specific operator,&lt;br /&gt;
if one inserts a SIM card from&lt;br /&gt;
a different operator the&lt;br /&gt;
phone will refuse to accept&lt;br /&gt;
it! The cell phone will however accept another SIM&lt;br /&gt;
card from the same operator. To activate/deactivate this&lt;br /&gt;
lock one needs a special&lt;br /&gt;
secret code that is not&lt;br /&gt;
available to the end user. Here is how to activate the&lt;br /&gt;
menu: &amp;lt;**&amp;lt; Lock to Network? if pressing yes you have 5 attempts to enter NCK. &amp;lt;**&amp;lt;&amp;lt; Lock to Network subset? if pressing yes you have 5 attempts to enter NSCK. Warning: Your phone can be locked to a service provider FOREVER by doing this! If an invalid code is entered all five times, the menu will exit and be deactivated! Any further attempt to activate the NCK/NSCK lock Menu will result in the response &quot;Not allowed&quot;! However the NCK/ NSCK lock can be recover through a direct clearing in the EEPROM. Shortcut for Last Dialed call menu If you for some reason don&#39;t want to enter the &#39;Last Dialed calls menu&#39; by using the &#39;YES&#39; key you can use the following key stroke instead: First &#39;0&#39; then &#39;#&#39;. Bat. level indicator when turned OFF When the phone is turned off and the phone is not changing - the bat. level can be seen for a short period of time by pressing the &#39;NO&#39; key quick once (it has to be quick!) and then wait for about 2 sec. The bat. level will now be shown in the display at its normal position. Access menu without Sim card To access to the menu in your phone without having a card inside do the following: type **04*0000*0000*0000# When display say &quot;Wrong Pin&quot; press NO and you have access to the all menus: Info, Access, Settings, Calculator, Clock, Keylock On?, Mail, Phone book. NOTE if you try this on your phone may stop at Keylock On? menu and you´ll have to take your battery out to turn the phone on again. OTHERS Ericsson DH368 Try these Codes on your DH-368 phone: 1. Power on. 2. Press 904059 + &#39;MENU&#39; 3. &#39;TEST SET&#39; display ... 4. Press &#39;YES&#39; will display @ then press 1 &#39;RCL&#39; will turn light off and you will see &#39;DONE&#39; 5. Press &#39;YES&#39; will display @ then press 86 &#39;RCL&#39; display &#39;DONE&#39; also you will hear static... You can just enter the channel number (up to 1023) by pressing &#39;Yes&#39; 3 &#39;CLR&#39; XXXX - channel number to enter a channel directly. You can also see the signal level on channel by pressing 3 &#39;MENU&#39;. You can see the ESN number by pressing &#39;YES&#39; 1 &#39;RCL&#39; 96 in HEX format. 6. Press 3 to exit, now you phone will power down and power up again. You can install the phone number into the phone by pressing 923885 + &#39;MENU&#39; Ericsson GF768 Edit Greetings Tip 1. Go to the Keylock menu. 2. Set lock to Auto. 3. Press YES then hold the left arrow untill the Greetings menu appears. GF788 menu in your GF768 phone! (1) 1. Go to the EDIT MENU and press YES. 2. Type the number &quot;2&quot; and press YES. 3. In &quot;NAME&quot; HOLD DOWN the &quot;2&quot; key untill the number &quot;2&quot; apperars. Press YES. 4. Press YES again (to save any position) then QUICKLY press and hold left arrow (&amp;lt;) untill &quot;SIZE&quot; appears in the display. 5.Press YES and choose &quot;Full size&quot;. You now have the GF788 menu! NB. Confirmed working on version 970716 and 980318. GF788 menu in your GF768 phone! (2) 1.Go to MissedCall 2. Empty the list 3. Press the -&amp;gt; key for a&lt;br /&gt;
second or two&lt;br /&gt;
4. The option Menu size turns&lt;br /&gt;
up 5. Choose ‘yes ’ and go from there NB. Confirmed working on&lt;br /&gt;
version 990122. GF788 menu in your GF768&lt;br /&gt;
phone! (3) 1. Go and set the ring volume&lt;br /&gt;
and press yes.&lt;br /&gt;
2. When ‘STORED ’ is displayed – keep the right button -&amp;gt; pressed  until ‘Extended Menu’ is displayed. 3. Select “Activate ” the menus and  you now have&lt;br /&gt;
lots of extra features NB. Confirmed working on&lt;br /&gt;
version 980910 Ericsson A1018s (UN)LOCKING YOUR ERICSSON&lt;br /&gt;
A1018s TO SPECIFIC&lt;br /&gt;
NETWORK : A way to (un)lock your cell&lt;br /&gt;
phone on to the network: 1. Press : &amp;lt;**&amp;lt;&lt;br /&gt;
2. Then on the display appear&lt;br /&gt;
and give you two choices:&lt;br /&gt;
Lock to Network ? and Lock&lt;br /&gt;
to Network subset?&lt;br /&gt;
3. Enter the NCK number (code is provided by the SP)&lt;br /&gt;
4. You have 5 attempts to do&lt;br /&gt;
this&lt;br /&gt;
5. Then your cell phone will&lt;br /&gt;
work ‘only ’ with the network</content><link rel='replies' type='application/atom+xml' href='http://ethicalhackinginstitute1.blogspot.com/feeds/4599959507721685727/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/06/list-of-sony-ericsson-secret-codes-tips.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/4599959507721685727'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/4599959507721685727'/><link rel='alternate' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/06/list-of-sony-ericsson-secret-codes-tips.html' title='List of Sony Ericsson Secret Codes, Tips and Tricks'/><author><name>ethicalhackinginstitute</name><uri>http://www.blogger.com/profile/03158890439235970060</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8H_355NecLqNzml3w7mW2cmLOdmkQ4GD3J2KLMQ412gQGmM59WVLOzOdIaWJ3F5pn4uwKNxJ9hI_ptNRwbBVUpsEpuSD9WKR7hF7uAp7SHWn6ajqdJPKapFiQKb1Faca-97NjuBqHdGsV/s72-c/Sony-Ericsson-S500.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5145860179828431135.post-3182167749860587073</id><published>2011-06-28T12:44:00.000+01:00</published><updated>2011-06-28T12:44:26.446+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Phone tips"/><title type='text'>Motorola unlock code-V300&gt; Motorola razr Cell phone UnlockMotorola unlock code-V300&gt; Motorola razr Cell phone Unlock</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSiM5OFe6g216k5Fj-mppzAEqwQ-k39S8aZUVmaUoaQSJ9SjAzsTKmzmVWJGdZA9f_8fsWkvOwVXZ2YJ217J5txjxviUl0RpSa5W6OaR90Y3K0XuPAxr1m5W_za5UEZvYOYc7AqUSr5dow/s1600/motorola.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSiM5OFe6g216k5Fj-mppzAEqwQ-k39S8aZUVmaUoaQSJ9SjAzsTKmzmVWJGdZA9f_8fsWkvOwVXZ2YJ217J5txjxviUl0RpSa5W6OaR90Y3K0XuPAxr1m5W_za5UEZvYOYc7AqUSr5dow/s1600/motorola.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Unlock motorola codes for&lt;br /&gt;
v3 and rar. motorola cellular T205/T19x&lt;br /&gt;
most of the code applicable to&lt;br /&gt;
Motorola d460,6200,Motorola&lt;br /&gt;
cellphone 7500, Motorola Unlock codes for 8200,8400, 8700,V3688.&lt;br /&gt;
*#06# -&amp;gt; Displays imei for&lt;br /&gt;
*#300# OK -&amp;gt; List the&lt;br /&gt;
Software &amp;amp; Hardware Version&lt;br /&gt;
of motorola cellular&lt;br /&gt;
*#301# OK -&amp;gt; Full Keypads Functional Test&lt;br /&gt;
*#303# Ok -&amp;gt; Set Default&lt;br /&gt;
Language to English&lt;br /&gt;
*304# OK -&amp;gt; Set OFF&lt;br /&gt;
engineering mode new cellular&lt;br /&gt;
phone #304*19980722# -&amp;gt; Set ON&lt;br /&gt;
Engineering mode&lt;br /&gt;
*#305# OK -&amp;gt; Location: 1 OK&lt;br /&gt;
*#307# OK -&amp;gt; Engineering Test&lt;br /&gt;
Mode&lt;br /&gt;
*#311# OK -&amp;gt; Phone code changed to default code&lt;br /&gt;
*#400# OK -&amp;gt; ADC, Cal val*&lt;br /&gt;
*#402# OK -&amp;gt; Adjust Display&lt;br /&gt;
Intensity/Contrast&lt;br /&gt;
*#403# OK -&amp;gt; List the&lt;br /&gt;
manufacturing Informations of motorola cellular&lt;br /&gt;
19980722 OK -&amp;gt; Master Unlock&lt;br /&gt;
code for Phone &amp;amp; Sim&lt;br /&gt;
Lock. this code are independent of&lt;br /&gt;
whether it is new cellular&lt;br /&gt;
phone or pre paid cell&lt;br /&gt;
phone.And it may work with one model and not working&lt;br /&gt;
with other model like Unlock&lt;br /&gt;
Motorola rarz code may not&lt;br /&gt;
work with motorla v3.&lt;br /&gt;
*#302# OK -&amp;gt; Acoustic Test*&lt;br /&gt;
*3370# -&amp;gt; Enhanced Full Rate #3370# -&amp;gt; Deactivate&lt;br /&gt;
Enhanced full Rate&lt;br /&gt;
*#72837726# OK -&amp;gt; Confirm?,&lt;br /&gt;
Data Saved&lt;br /&gt;
1234 OK Phone Code Default&lt;br /&gt;
*#0000# OK -&amp;gt; Settings saved, restore set phone&lt;br /&gt;
to default language. new cellular phone EFR: ###119#1#, (OK) to activate&lt;br /&gt;
EFR mode.&lt;br /&gt;
###119#0#, (OK) to&lt;br /&gt;
deactivate EFR mode. Code to lock keys. Press&lt;br /&gt;
together *7&lt;br /&gt;
Note: [] (pause) means the *&lt;br /&gt;
key held in until box appears. OTHER SECRET MASTER&lt;br /&gt;
CODES FOR MOTOROLA&lt;br /&gt;
PHONES. Select phone line - (use this to&lt;br /&gt;
write things below the&lt;br /&gt;
provider name):&lt;br /&gt;
[] [] [] 0 0 8 [] 1 []&lt;br /&gt;
Add phonebook to main&lt;br /&gt;
menu of motorola cellphone: [] [] [] 1 0 5 [] 1 []&lt;br /&gt;
Add messages to main menu:&lt;br /&gt;
[] [] [] 1 0 7 [] 1 []&lt;br /&gt;
Copy SIM memory&lt;br /&gt;
(phonebook menu):&lt;br /&gt;
[] [] [] 1 0 8 [] 1 [] Eng Field options (main&lt;br /&gt;
menu):&lt;br /&gt;
[] [] [] 1 1 3 [] 1 []&lt;br /&gt;
Slow (Frequency of search&lt;br /&gt;
menu):&lt;br /&gt;
[] [] [] 1 0 1 [] 1 [] Medium (Frequency of search&lt;br /&gt;
menu):&lt;br /&gt;
[] [] [] 1 0 2 [] 1 []&lt;br /&gt;
Fast (Frequency of search&lt;br /&gt;
menu):&lt;br /&gt;
[] [] [] 1 0 3 [] 1 [] Enable EFR:&lt;br /&gt;
[] [] [] 1 1 9 [] 1 []&lt;br /&gt;
Function :&lt;br /&gt;
[] [] [] # # # [] 1 [] Change pin:&lt;br /&gt;
[] [] [] 0 0 4 [] 1 []&lt;br /&gt;
Unblocking using the &quot;puk&quot;&lt;br /&gt;
number:&lt;br /&gt;
[] [] [] 0 0 5 [] 1 [] You can change motorola&lt;br /&gt;
cellular GSM frequencies to 900/1800 by entering the&lt;br /&gt;
&amp;nbsp;engineering model. Following&lt;br /&gt;
the below steps:&lt;br /&gt;
enter menu and press 048263*&lt;br /&gt;
quickly, then you will enter&lt;br /&gt;
the secret engineering menu under &quot;Opcode&quot;&lt;br /&gt;
input 10*0*3 for GSM 900&lt;br /&gt;
10*0*4 for GSM 1800&lt;br /&gt;
10*0*5 for GSM 1900&lt;br /&gt;
10*0*6 for dual band GSM&lt;br /&gt;
900/1800 10*0*7 for dual band GSM&lt;br /&gt;
850/1900 To add extra message space 4&lt;br /&gt;
your Motorola C350 C450 C550&lt;br /&gt;
or C650, press menu button,&lt;br /&gt;
press 048263* quickly, then on&lt;br /&gt;
the popup menu enter 47&lt;br /&gt;
press ok.press 50 and ok.press 1 ok.press 64 ok.press 1&lt;br /&gt;
ok.press 186 and ok.You will&lt;br /&gt;
receive an extra 50 messages memory space.Switch phone&lt;br /&gt;
off and back on.(not tested) Net Monitor ON: * * * 1 1 3 * 1 *&lt;br /&gt;
[OK]&lt;br /&gt;
Net Monitor OFF: * * * 1 1 3 * 1&lt;br /&gt;
* [OK]&lt;br /&gt;
* - press this until box shown&lt;br /&gt;
up Activate RBS (Radio Base&lt;br /&gt;
Station) Motorola&lt;br /&gt;
cellphone. (Note: pause means the * key&lt;br /&gt;
held in until box appears)&lt;br /&gt;
To activate RBS type: [pause]&lt;br /&gt;
[pause] [pause] 1 1 3 [pause] 1&lt;br /&gt;
[pause] [ok]&lt;br /&gt;
You now have to press the [MENU] and scroll to the &#39;Eng&lt;br /&gt;
Field Options&#39; function with&lt;br /&gt;
the keys, and enable it. De-activate RBS To de-activate RBS type:&lt;br /&gt;
[pause] [pause] [pause] 1 1 3&lt;br /&gt;
[pause] 0 [pause] [ok]&lt;br /&gt;
This only works with some&lt;br /&gt;
versions of software. What&#39;s the use of RBS: Get Distance From Base Station - Place a call, when it is&lt;br /&gt;
answered, press [MENU] until&lt;br /&gt;
&#39;Eng Field Option&#39; is displayed,&lt;br /&gt;
press [OK], select &#39;Active Cell&#39;,&lt;br /&gt;
press [OK], press [MENU] until&lt;br /&gt;
&#39;Time Adv xxx&#39; appears, where xxx is a number.&lt;br /&gt;
Multiply this number by 550,&lt;br /&gt;
and the result is the distance&lt;br /&gt;
from the RBS (Radio Base&lt;br /&gt;
Station), in meters. Get Signal Quality - press [MENU] until &#39;Eng Field Option&#39;&lt;br /&gt;
is displayed, press [OK], select&lt;br /&gt;
&#39;Active Cell&#39;, press [OK], press&lt;br /&gt;
[MENU] until &#39;C1&#39; appears. This&lt;br /&gt;
is the signal quality. If it&lt;br /&gt;
becomes negative for longer than 5 seconds, a new cell is&lt;br /&gt;
selected. Other Phones from Motorola&lt;br /&gt;
cellular (CD 160, CD 520, 920,&lt;br /&gt;
930)&lt;br /&gt;
new cellular phone Motorola&lt;br /&gt;
CD 160&lt;br /&gt;
Press menu and type one of these numbers and press OK: 11 = Status Review for new&lt;br /&gt;
cellular phone&lt;br /&gt;
13 = Available Networks&lt;br /&gt;
14 = Preferred Networks&lt;br /&gt;
22 = Select Keypad Tones&lt;br /&gt;
25 = Require SIM Card PIN 26 = Language Selection&lt;br /&gt;
32 = Repetitive Timer&lt;br /&gt;
33 = Single Alert Timer&lt;br /&gt;
34 = Set IN-Call Display&lt;br /&gt;
35 = Show Call Timers&lt;br /&gt;
36 = Show Call Charges 37 = Call Charge Settings&lt;br /&gt;
38 = Reset All Timers&lt;br /&gt;
43 = Reset All Timers&lt;br /&gt;
45 = Show Last Call&lt;br /&gt;
46 = Total For All Calls&lt;br /&gt;
47 = Lifetime Timer for Motorola cellular&lt;br /&gt;
51 = Change Unlock Code&lt;br /&gt;
52 = Master Reset&lt;br /&gt;
53 = Master Clear (Warning!!&lt;br /&gt;
May result in deleting the&lt;br /&gt;
Message Editor!!!) 54 = New Security Code&lt;br /&gt;
55 = Automatic Lock&lt;br /&gt;
63 = Battery Saving Mode. Free call tip 1 Enter the phone number&lt;br /&gt;
2 Enter OK&lt;br /&gt;
3 Type *#06#&lt;br /&gt;
4 Press Button C&lt;br /&gt;
5 And finally press the button&lt;br /&gt;
for power off. You should now be able to&lt;br /&gt;
talk without being billed. Keyboard lock for Motorola&lt;br /&gt;
cellular&lt;br /&gt;
if you push * and # on the&lt;br /&gt;
same time your keyboard&lt;br /&gt;
locked. When you press it&lt;br /&gt;
again, you unlock your keyboard. Supplementary Menu for&lt;br /&gt;
Motorola cellular&lt;br /&gt;
If your Motorola CD920 or 930&lt;br /&gt;
has the engineering software,&lt;br /&gt;
you can get an engineering&lt;br /&gt;
mode by typing : ***113*1*, but you have to maintain each&lt;br /&gt;
* during 3 sec to get a square.&lt;br /&gt;
So 3 squares, 113, 1 square, 1, 1&lt;br /&gt;
square, CALL.&lt;br /&gt;
If the software is present you&lt;br /&gt;
have one supplementary menu. To remove it type&lt;br /&gt;
***113*0* like above. To put the counter to 0 even&lt;br /&gt;
global counter, just do a reset&lt;br /&gt;
factory in the Config menu. In future give u more on&lt;br /&gt;
Motorola unlock codes for v3&lt;br /&gt;
and Motorola rar cellular&lt;br /&gt;
phone.</content><link rel='replies' type='application/atom+xml' href='http://ethicalhackinginstitute1.blogspot.com/feeds/3182167749860587073/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/06/motorola-unlock-code-v300-motorola-razr.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/3182167749860587073'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/3182167749860587073'/><link rel='alternate' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/06/motorola-unlock-code-v300-motorola-razr.html' title='Motorola unlock code-V300&gt; Motorola razr Cell phone UnlockMotorola unlock code-V300&gt; Motorola razr Cell phone Unlock'/><author><name>ethicalhackinginstitute</name><uri>http://www.blogger.com/profile/03158890439235970060</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSiM5OFe6g216k5Fj-mppzAEqwQ-k39S8aZUVmaUoaQSJ9SjAzsTKmzmVWJGdZA9f_8fsWkvOwVXZ2YJ217J5txjxviUl0RpSa5W6OaR90Y3K0XuPAxr1m5W_za5UEZvYOYc7AqUSr5dow/s72-c/motorola.jpg" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5145860179828431135.post-7533675117104797110</id><published>2011-06-28T12:37:00.000+01:00</published><updated>2011-06-28T12:37:51.367+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Phone tips"/><title type='text'>INSTALLING JAVA SOFTWARES ON SOME STUBBORN PHONEs like Samsung.</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEha6Oa9OSNxgQ8k7aGNhFTWr6ekwrJwxw7TUGEc1NdoOnLzXa7q8U6IJNE13kUhFK3gk84rWSbkqq8ysiaCqszmbJT9VX6RotclrEYbZfI15pcwZPfZSDjHkednoFYiBcds4o3XKwuJGEsJ/s1600/samsung.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEha6Oa9OSNxgQ8k7aGNhFTWr6ekwrJwxw7TUGEc1NdoOnLzXa7q8U6IJNE13kUhFK3gk84rWSbkqq8ysiaCqszmbJT9VX6RotclrEYbZfI15pcwZPfZSDjHkednoFYiBcds4o3XKwuJGEsJ/s1600/samsung.jpg&quot; /&gt;&lt;/a&gt;First of all send the java file&lt;br /&gt;
from any phone that can&lt;br /&gt;
send e.g Sony Ericsson (from&lt;br /&gt;
others) or Symbian Phones&lt;br /&gt;
(from Explore)&lt;br /&gt;
&lt;br /&gt;
Next it enters your phone as&lt;br /&gt;
an invalid file which you cant&lt;br /&gt;
install or it enters but in the&lt;br /&gt;
form of an already Installed&lt;br /&gt;
java file which cannot be re&lt;br /&gt;
installed (i.e)You sent Opera&lt;br /&gt;
of 283kb but when it entered&lt;br /&gt;
your phone, it became&lt;br /&gt;
790kb...and it says,&#39;Cant&lt;br /&gt;
install an already Installed&lt;br /&gt;
java file&#39;.&lt;br /&gt;
&lt;br /&gt;
Now here&#39;s what you do,&lt;br /&gt;
Delete the File,then go back&lt;br /&gt;
to the Ericsson or&lt;br /&gt;
Symbian,Open Blue fTP or&lt;br /&gt;
Explore,Locate and rename&lt;br /&gt;
the java File eg&lt;br /&gt;
Operamini_4.2.jar to&lt;br /&gt;
Operamini_4.2&lt;br /&gt;
&lt;br /&gt;
Clear the &#39;.jar&#39; and send&lt;br /&gt;
again to your phone.&lt;br /&gt;
&lt;br /&gt;
On getting to your phone,it&lt;br /&gt;
enters as an invalid file,&lt;br /&gt;
Just press Options,scroll to&lt;br /&gt;
rename and rename it from&lt;br /&gt;
Operamini_4.2&lt;br /&gt;
to&lt;br /&gt;
Operamini_4.2.jar&lt;br /&gt;
&lt;br /&gt;
Then press OK and install it.&lt;br /&gt;
&lt;br /&gt;
That&#39;s that...&lt;br /&gt;
&lt;br /&gt;
Who doesn&#39;t know how to&lt;br /&gt;
send Java Games or&lt;br /&gt;
Applications from his/her&lt;br /&gt;
Ericsson or Symbian?</content><link rel='replies' type='application/atom+xml' href='http://ethicalhackinginstitute1.blogspot.com/feeds/7533675117104797110/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/06/installing-java-softwares-on-some.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/7533675117104797110'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/7533675117104797110'/><link rel='alternate' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/06/installing-java-softwares-on-some.html' title='INSTALLING JAVA SOFTWARES ON SOME STUBBORN PHONEs like Samsung.'/><author><name>ethicalhackinginstitute</name><uri>http://www.blogger.com/profile/03158890439235970060</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEha6Oa9OSNxgQ8k7aGNhFTWr6ekwrJwxw7TUGEc1NdoOnLzXa7q8U6IJNE13kUhFK3gk84rWSbkqq8ysiaCqszmbJT9VX6RotclrEYbZfI15pcwZPfZSDjHkednoFYiBcds4o3XKwuJGEsJ/s72-c/samsung.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5145860179828431135.post-5340016608359741352</id><published>2011-06-28T12:32:00.000+01:00</published><updated>2011-06-28T12:32:58.899+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Phone tips"/><title type='text'>How to create your own themes</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmWOqqGXNOd4hlVSYS4madozeIoqU8OoUQx2M-DNQ6AqBXxCaNaYxQCxpd-fOHKrzO9kqGpGDz8jTot6LuhFXZ5GOMSdNflVtcJ9-n2GhLRB7lVft0cRsZFI7SxOsi_kPSgsMckBB54bM-/s1600/theme.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmWOqqGXNOd4hlVSYS4madozeIoqU8OoUQx2M-DNQ6AqBXxCaNaYxQCxpd-fOHKrzO9kqGpGDz8jTot6LuhFXZ5GOMSdNflVtcJ9-n2GhLRB7lVft0cRsZFI7SxOsi_kPSgsMckBB54bM-/s1600/theme.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;We&#39;re making use of Blue&lt;br /&gt;
FTP through out, once you&lt;br /&gt;
Open it,don&#39;t close it till&lt;br /&gt;
you&#39;re done.&lt;br /&gt;
&lt;br /&gt;
STEP 1&lt;br /&gt;
Open your Blue FTP&lt;br /&gt;
&lt;br /&gt;
STEP 2&lt;br /&gt;
PROCEDURE 1&lt;br /&gt;
With your Blue FTP,&lt;br /&gt;
locate your Memory card&lt;br /&gt;
(e : )&lt;br /&gt;
or&lt;br /&gt;
Locate your Phones Memory&lt;br /&gt;
(c: )&lt;br /&gt;
&lt;br /&gt;
PROCEDURE 2&lt;br /&gt;
With your Blue FTP,&lt;br /&gt;
Create a Folder either in&lt;br /&gt;
your phone Memory or&lt;br /&gt;
Memory Card&lt;br /&gt;
&lt;br /&gt;
HOW DO I CREATE A FOLDER WITH BLUE FTP?&lt;br /&gt;
It&#39;s easy,&lt;br /&gt;
Just Press the &#39;MENU&#39;&lt;br /&gt;
button,then scroll down to&lt;br /&gt;
&#39;CREATE FOLDER&#39;&lt;br /&gt;
select it and Name it&lt;br /&gt;
&#39;Hacking&#39; Theme Creator&#39;&lt;br /&gt;
Or name it whatever.&lt;br /&gt;
After that Click &#39;OK&#39;&lt;br /&gt;
&lt;br /&gt;
NOTE: You can create the&lt;br /&gt;
Folder anywhere...either in&lt;br /&gt;
your Music Folder,Theme&lt;br /&gt;
Folder ....etc&lt;br /&gt;
,or you create a Folder&lt;br /&gt;
Directly under your Memory&lt;br /&gt;
Card or Phone Memory&lt;br /&gt;
&lt;br /&gt;
STEP 3&lt;br /&gt;
PROCEDURE 1&lt;br /&gt;
After creating your New&lt;br /&gt;
Folder with your Blue FTP,&lt;br /&gt;
Locate your Normal Theme&lt;br /&gt;
Folder or anywhere you save&lt;br /&gt;
your Themes&lt;br /&gt;
&lt;br /&gt;
NOTE: You must have a&lt;br /&gt;
Theme(s) on your Phone&lt;br /&gt;
already&lt;br /&gt;
&lt;br /&gt;
PROCEDURE 2&lt;br /&gt;
With your Blue FTP,&lt;br /&gt;
Scroll to your Best Theme /&lt;br /&gt;
any Theme you would like to&lt;br /&gt;
make use of (you always wish&lt;br /&gt;
you were in the Theme...)&lt;br /&gt;
Don&#39;t worry,you would soon&lt;br /&gt;
enter&lt;br /&gt;
After scrolling to the Theme&lt;br /&gt;
of your Choice,with your&lt;br /&gt;
Blue FTP &#39;COPY&#39; it.&lt;br /&gt;
&lt;br /&gt;
HOW DO I COPY WITH BLUE FTP?&lt;br /&gt;
Easy,&lt;br /&gt;
Press your MENU button,and&lt;br /&gt;
scroll down to &#39;COPY&#39; then&lt;br /&gt;
select it&lt;br /&gt;
or&lt;br /&gt;
Just Press the number &#39;1&#39; key&lt;br /&gt;
and automatically your&lt;br /&gt;
Theme gets COPIED&lt;br /&gt;
That&#39;s a shortcut to COPY in&lt;br /&gt;
Blue FTP&lt;br /&gt;
Shortcut saves time.&lt;br /&gt;
&lt;br /&gt;
PROCEDURE 3&lt;br /&gt;
With your Blue FTP,&lt;br /&gt;
Go back to the New Folder&lt;br /&gt;
you just Created and Open&lt;br /&gt;
it....(it would be empty)&lt;br /&gt;
After Opening it,&lt;br /&gt;
&#39;PASTE&#39; the Theme you just&lt;br /&gt;
Copied there&lt;br /&gt;
&lt;br /&gt;
HOW DO I PASTE WITH BLUE&lt;br /&gt;
FTP?&lt;br /&gt;
Easy,&lt;br /&gt;
Press your MENU button,and&lt;br /&gt;
scroll down to &#39;PASTE&#39; then&lt;br /&gt;
select it (it would Paste the&lt;br /&gt;
Theme there)&lt;br /&gt;
or&lt;br /&gt;
Just Press the number &#39;3&#39; key&lt;br /&gt;
and automatically your&lt;br /&gt;
Copied Theme would be&lt;br /&gt;
Pasted.&lt;br /&gt;
That&#39;s a shortcut to PASTE in&lt;br /&gt;
Blue FTP&lt;br /&gt;
Shortcut saves time.&lt;br /&gt;
&lt;br /&gt;
STEP 4&lt;br /&gt;
PROCEDURE 1&lt;br /&gt;
After Pasting with your Blue&lt;br /&gt;
FTP,&lt;br /&gt;
Select the Theme and Open&lt;br /&gt;
it&lt;br /&gt;
When you Open it,You&#39;ll see&lt;br /&gt;
different things that are&lt;br /&gt;
Comprised of the Theme&lt;br /&gt;
Then select all of them by&lt;br /&gt;
Pressing MENU,then scroll&lt;br /&gt;
down to &#39;SELECT ALL&#39;&lt;br /&gt;
(Everything gets Highlighted&lt;br /&gt;
now)&lt;br /&gt;
The Extract them All by Press&lt;br /&gt;
MENU then scroll to&lt;br /&gt;
&#39;EXTRACT SELECTED ITEMS&#39;&lt;br /&gt;
and select it&lt;br /&gt;
Or just press 1&lt;br /&gt;
After Selecting it,that Page&lt;br /&gt;
would automatically close&lt;br /&gt;
and take you back to your&lt;br /&gt;
Folder,you&#39;ll see the Theme&lt;br /&gt;
you Pasted only(so when you&lt;br /&gt;
experience am,no fear,You&#39;re&lt;br /&gt;
getting it)&lt;br /&gt;
I would advise you Now to&lt;br /&gt;
Create another Folder in that&lt;br /&gt;
your Folder or you can&lt;br /&gt;
create it anywhere&lt;br /&gt;
or&lt;br /&gt;
When it takes you&lt;br /&gt;
back,Delete the Theme you&lt;br /&gt;
Pasted there so it doesn&#39;t&lt;br /&gt;
confuse you&lt;br /&gt;
if you like leave it&lt;br /&gt;
&lt;br /&gt;
NOTE: When you Delete your&lt;br /&gt;
Pasted Theme,it wont affect&lt;br /&gt;
the Original one,the Original&lt;br /&gt;
File would still be&lt;br /&gt;
Intact.....Remember you only&lt;br /&gt;
Copied it,You didnt Cut it.&lt;br /&gt;
&lt;br /&gt;
PROCEDURE 2&lt;br /&gt;
After following any of my&lt;br /&gt;
Advice,&lt;br /&gt;
Press MENU,then scroll down&lt;br /&gt;
to &#39;EXTRACT ITEMS HERE&#39;&lt;br /&gt;
Or&lt;br /&gt;
Press 3&lt;br /&gt;
Immediately,Extraction would&lt;br /&gt;
take place.&lt;br /&gt;
&lt;br /&gt;
STEP 5&lt;br /&gt;
PROCEDURE 1&lt;br /&gt;
After the Extraction,you can&lt;br /&gt;
View any picture you wanna&lt;br /&gt;
view&lt;br /&gt;
Then any Picture you see and&lt;br /&gt;
would love to see your self in&lt;br /&gt;
it&lt;br /&gt;
Press MENU,then scroll down&lt;br /&gt;
to &#39;RENAME&#39; and select it&lt;br /&gt;
The Name of the picture&lt;br /&gt;
would get Edited&lt;br /&gt;
It can be something like this&lt;br /&gt;
thm+ACA-menu.png&lt;br /&gt;
etc&lt;br /&gt;
Just press Options or More ...&lt;br /&gt;
(depends on the phone) and&lt;br /&gt;
Copy the Name&lt;br /&gt;
(I&#39;ve taught you guys how to&lt;br /&gt;
Copy and Paste before...so if you dont know&lt;br /&gt;
how to do it, &#39;Na your Luck&#39;&lt;br /&gt;
thats why it&#39;s always good to&lt;br /&gt;
take your time and read all my&lt;br /&gt;
messages well)&lt;br /&gt;
I gat an Alternative for those&lt;br /&gt;
that cant Copy and Paste,&lt;br /&gt;
Whatever you see,write in a&lt;br /&gt;
sheet of Paper&lt;br /&gt;
Stressful!&lt;br /&gt;
Na you sabi.&lt;br /&gt;
&lt;br /&gt;
PROCEDURE 3&lt;br /&gt;
After Coping, Press OK and&lt;br /&gt;
go back&lt;br /&gt;
Then Delete the File of which&lt;br /&gt;
Name you just copied&lt;br /&gt;
After Deleting with your Blue&lt;br /&gt;
FTP, go back and look for&lt;br /&gt;
any (of your) Picture and&lt;br /&gt;
Copy it,...(like the way you&lt;br /&gt;
copied the Theme) by&lt;br /&gt;
Pressing key 1&lt;br /&gt;
Then go back to your Theme&lt;br /&gt;
Creator folder (where you&lt;br /&gt;
just Deleted a Pic) and Paste&lt;br /&gt;
your Picture there by&lt;br /&gt;
Pressing Key 3.&lt;br /&gt;
&lt;br /&gt;
PROCEDURE 4&lt;br /&gt;
After Pasting your Picture&lt;br /&gt;
Press MENU,then scroll to&lt;br /&gt;
&#39;RENAME AND SELECT IT&#39;&lt;br /&gt;
Clear whatever name you&lt;br /&gt;
used to save your picture&lt;br /&gt;
then Press Options or More&lt;br /&gt;
(depending on the Phone)&lt;br /&gt;
and Paste the Name of the&lt;br /&gt;
Already Deleted Theme Pic&lt;br /&gt;
which you copied&lt;br /&gt;
So if your Picture name was&lt;br /&gt;
Hacking.jpg&lt;br /&gt;
It would be&lt;br /&gt;
thm+ACA-menu.png&lt;br /&gt;
Hope we get it now?&lt;br /&gt;
We should always make sure&lt;br /&gt;
we Delete A picture First&lt;br /&gt;
before Replacing with Yours&lt;br /&gt;
&lt;br /&gt;
NOTE: Pictures are in some&lt;br /&gt;
Formats&lt;br /&gt;
We have .png, .jpg or jpeg etc&lt;br /&gt;
You can replace any picture&lt;br /&gt;
in any format but you cant&lt;br /&gt;
replace them with&lt;br /&gt;
Animations...&lt;br /&gt;
If you do so,you wont see any&lt;br /&gt;
Effect at all&lt;br /&gt;
Animations are in&lt;br /&gt;
.gif Format&lt;br /&gt;
Replace Picture with Picture&lt;br /&gt;
(in any Format mostly &amp;lt; .png&lt;br /&gt;
and .jpg&amp;gt;) and replace&lt;br /&gt;
Animations with Animations&lt;br /&gt;
If you dont have any and you&lt;br /&gt;
dont know how to Create&lt;br /&gt;
one,&lt;br /&gt;
Just leave it like that&lt;br /&gt;
There may be Music attached&lt;br /&gt;
to your Theme too&lt;br /&gt;
Just do the same kind of&lt;br /&gt;
Replacement with any Music&lt;br /&gt;
of your&lt;br /&gt;
Choice (but make sure the&lt;br /&gt;
Music is not too high...)&lt;br /&gt;
It Should be around 300kb to&lt;br /&gt;
600kb or anyhow you want&lt;br /&gt;
am&lt;br /&gt;
Just dont touch all the &#39;WEB&#39;&lt;br /&gt;
material&lt;br /&gt;
(ie) Theme.xml&lt;br /&gt;
&lt;br /&gt;
FINALLY&lt;br /&gt;
After your&#39;re done with&lt;br /&gt;
Replacing,&lt;br /&gt;
Select All by Pressing MENU&lt;br /&gt;
and scrolling to &#39;SELECT&lt;br /&gt;
ALL&#39; (everything gets&lt;br /&gt;
Highlighted)&lt;br /&gt;
Then,Press Menu again,scroll&lt;br /&gt;
to &#39;COMPRESS ITEMS&#39;&lt;br /&gt;
Select either thm or nth&lt;br /&gt;
Those are Theme Formats&lt;br /&gt;
.nth&lt;br /&gt;
are Mostly For Nokia&lt;br /&gt;
.thm&lt;br /&gt;
are mostly for Erics son&lt;br /&gt;
Select the One that would&lt;br /&gt;
Suite your phone and Press&lt;br /&gt;
OK&lt;br /&gt;
Nokia users might see all this&lt;br /&gt;
Deflate BEst choice whatever&lt;br /&gt;
Dont touch anything (it&#39;s&lt;br /&gt;
Proerly set)&lt;br /&gt;
just Press OK and Compress&lt;br /&gt;
After the Compression,it&lt;br /&gt;
saves as &#39;FILE.thm&#39; or&lt;br /&gt;
&#39;FILE.nth&#39;&lt;br /&gt;
You can Rename it to&lt;br /&gt;
whatever you like...&lt;br /&gt;
Now you have your Theme..&lt;br /&gt;
You can Move it to your&lt;br /&gt;
Normal Theme Folder and&lt;br /&gt;
Delete the Scraps that are&lt;br /&gt;
left in that New Folder you&lt;br /&gt;
Created earlier on.</content><link rel='replies' type='application/atom+xml' href='http://ethicalhackinginstitute1.blogspot.com/feeds/5340016608359741352/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/06/how-to-create-your-own-themes.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/5340016608359741352'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/5340016608359741352'/><link rel='alternate' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/06/how-to-create-your-own-themes.html' title='How to create your own themes'/><author><name>ethicalhackinginstitute</name><uri>http://www.blogger.com/profile/03158890439235970060</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmWOqqGXNOd4hlVSYS4madozeIoqU8OoUQx2M-DNQ6AqBXxCaNaYxQCxpd-fOHKrzO9kqGpGDz8jTot6LuhFXZ5GOMSdNflVtcJ9-n2GhLRB7lVft0cRsZFI7SxOsi_kPSgsMckBB54bM-/s72-c/theme.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5145860179828431135.post-3209498261416163813</id><published>2011-06-28T12:21:00.000+01:00</published><updated>2011-06-28T12:21:44.817+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Phone tips"/><title type='text'>Use more than one application on a java phone</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8sjYx3k-yZzOPwPR7sqwFV-GvyjLXorE4uYCEny7IDVLYRYCH-zVC8KJhUnsVL5EvCy5IZxRbmNRtfNpBjEik8hi4IH3WW6NDITD2SxufGk9Jk40uZSLneLcbuDYRJ9GIUOaPxivrs6YU/s1600/nokia-5310-xpressMusic.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8sjYx3k-yZzOPwPR7sqwFV-GvyjLXorE4uYCEny7IDVLYRYCH-zVC8KJhUnsVL5EvCy5IZxRbmNRtfNpBjEik8hi4IH3WW6NDITD2SxufGk9Jk40uZSLneLcbuDYRJ9GIUOaPxivrs6YU/s1600/nokia-5310-xpressMusic.jpg&quot; /&gt;&lt;/a&gt;First of all,register at &lt;a href=&quot;http://multime.org/&quot;&gt;http://multime.org/&lt;/a&gt;&lt;br /&gt;
(better&lt;br /&gt;
done on a PC)&lt;br /&gt;
After that&lt;br /&gt;
Click on&lt;br /&gt;
&quot;My Midlets&quot; then add any&lt;br /&gt;
Application you would like to&lt;br /&gt;
Minimize with..&lt;br /&gt;
You can add Applications or&lt;br /&gt;
Software through links or by&lt;br /&gt;
uploading from a&lt;br /&gt;
Computer or your Phone. (I also use my Phone)&lt;br /&gt;
When you&#39;re done with uploading, go to&lt;br /&gt;
&#39;My Projects&#39; and add click &#39;New Project&#39;.&lt;br /&gt;
When it Loads, scroll down and name it whatever.&lt;br /&gt;
(IE)&lt;br /&gt;
&#39;Hacking&#39;&lt;br /&gt;
But when you create a New Project, there would be 0 in Front&lt;br /&gt;
(IE)&lt;br /&gt;
&#39;Hacking&#39; [0]&lt;br /&gt;
(Cos you&#39;ve not added any Midlet to it)&lt;br /&gt;
Now click on your Projects Name, then scroll to &#39;Add Midlet&#39; (It&#39;s beside Permissions)&lt;br /&gt;
Then it would add any of the&lt;br /&gt;
Applications that you have&lt;br /&gt;
uploaded,&lt;br /&gt;
NOTE:-Adding too much&lt;br /&gt;
Applications is not advisable&lt;br /&gt;
because it might slow down&lt;br /&gt;
the speed rate of your&lt;br /&gt;
Phone and congest your Project.&lt;br /&gt;
Now when you Add your Midlet, scroll down to it, and click on the &#39;+&#39; sign on the Midlet to Add it well.&lt;br /&gt;
Now, You&#39;ll see things like&lt;br /&gt;
this:-&lt;br /&gt;
Project:&lt;br /&gt;
That&#39;s the Name of your Project&lt;br /&gt;
Name:&lt;br /&gt;
Name your Midlet Whatever you like&lt;br /&gt;
Manager:&lt;br /&gt;
It would be on &#39;Generic&#39; click it and change it to &#39;Light&#39;&lt;br /&gt;
Language:&lt;br /&gt;
English or any Language you seem to understand&lt;br /&gt;
Certificate:&lt;br /&gt;
This would be on &#39;NO&#39; click it and change it to &#39;EXP&#39;.&lt;br /&gt;
You can Ignore permissions then click&lt;br /&gt;
BUILD.&lt;br /&gt;
After Building, You can&lt;br /&gt;
download it.&lt;br /&gt;
Note,when you download&lt;br /&gt;
it,you just press the &#39;*&#39; key to&lt;br /&gt;
Minimize the Application.&lt;br /&gt;
That&#39;s that for it.&lt;br /&gt;
&lt;br /&gt;
Do you still need my username and Password for multime?</content><link rel='replies' type='application/atom+xml' href='http://ethicalhackinginstitute1.blogspot.com/feeds/3209498261416163813/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/06/use-more-than-one-application-on-java.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/3209498261416163813'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/3209498261416163813'/><link rel='alternate' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/06/use-more-than-one-application-on-java.html' title='Use more than one application on a java phone'/><author><name>ethicalhackinginstitute</name><uri>http://www.blogger.com/profile/03158890439235970060</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8sjYx3k-yZzOPwPR7sqwFV-GvyjLXorE4uYCEny7IDVLYRYCH-zVC8KJhUnsVL5EvCy5IZxRbmNRtfNpBjEik8hi4IH3WW6NDITD2SxufGk9Jk40uZSLneLcbuDYRJ9GIUOaPxivrs6YU/s72-c/nokia-5310-xpressMusic.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5145860179828431135.post-7903404641960246790</id><published>2011-06-28T12:14:00.000+01:00</published><updated>2011-06-28T12:14:40.445+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Phone tips"/><title type='text'>HOW TO UN-ZIP FILES USING BLUE FTP</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOOwWc2qS1fxILv9S7gZ_y8rRAZ7HO4P01M_J7rN1K5BFbUefIZpTrfWgxja1Al4olHJZJz9jZMsVUektaopwtks8YTJ_HR5-6x1agQi_HM_mBLL9QnU-6h2Fcc_yt2OWpWF-LHoIIroeE/s1600/5011.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOOwWc2qS1fxILv9S7gZ_y8rRAZ7HO4P01M_J7rN1K5BFbUefIZpTrfWgxja1Al4olHJZJz9jZMsVUektaopwtks8YTJ_HR5-6x1agQi_HM_mBLL9QnU-6h2Fcc_yt2OWpWF-LHoIIroeE/s1600/5011.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Some people still don&#39;t know some Valid Operations Blue FTP can Perform...Part of which is ZIPPING and UNZIPPING Files.TO UNZIP WITH BLUE FTP,Open your Blue FTP,locate and select the zip file.&lt;br /&gt;
With your Blue FTP,open the zip file and Locate the Java Application from the zip file.&lt;br /&gt;
(Sometimes  the java / .jar File maybe hidden in Many Folders {like the zip files  downloaded at xchanger.mobi} so you have to keep opening and opening  till you get the java file or any File. It could be .sis, .exe,  whatever).&lt;br /&gt;
Press the key &#39;1&#39; to Copy the&lt;br /&gt;
Application and then go back&lt;br /&gt;
to another Folder then Paste&lt;br /&gt;
it there with key &#39;3&#39;&lt;br /&gt;
Then exit the Blue FTP&lt;br /&gt;
and from your phone locate&lt;br /&gt;
the Folder where you Pasted&lt;br /&gt;
the Valid java file.&lt;br /&gt;
If it shows the File as an&lt;br /&gt;
Invalid one,&lt;br /&gt;
press options and rename it&lt;br /&gt;
from&lt;br /&gt;
e.g Opera_jar to&lt;br /&gt;
Opera.jar&lt;br /&gt;
then go back and Open the&lt;br /&gt;
File.&lt;br /&gt;
NOTE - You can use the Process to Unzip anything.&lt;br /&gt;
Not only java Files.&lt;br /&gt;
Zipping just as the Name Implies is used to compress one or more Application together.&lt;br /&gt;
(IE)&lt;br /&gt;
I can compress a java Application, symbian Application, Theme, Music  Etc... Together in Zip Format and Make it one.&lt;br /&gt;
Yours is to download and Extract whatever you want from there.</content><link rel='replies' type='application/atom+xml' href='http://ethicalhackinginstitute1.blogspot.com/feeds/7903404641960246790/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/06/how-to-un-zip-files-using-blue-ftp.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/7903404641960246790'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/7903404641960246790'/><link rel='alternate' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/06/how-to-un-zip-files-using-blue-ftp.html' title='HOW TO UN-ZIP FILES USING BLUE FTP'/><author><name>ethicalhackinginstitute</name><uri>http://www.blogger.com/profile/03158890439235970060</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOOwWc2qS1fxILv9S7gZ_y8rRAZ7HO4P01M_J7rN1K5BFbUefIZpTrfWgxja1Al4olHJZJz9jZMsVUektaopwtks8YTJ_HR5-6x1agQi_HM_mBLL9QnU-6h2Fcc_yt2OWpWF-LHoIIroeE/s72-c/5011.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5145860179828431135.post-2355305649449744022</id><published>2011-06-28T12:04:00.000+01:00</published><updated>2011-06-28T12:04:17.970+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Phone tips"/><title type='text'>Convert 1GB micro sd memory card to 2GB</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLUlDJzdtBo82Aw-YdRMM5URiXR23yqu6ADWBzGalJLGebrP9Dn380MocuZjBP3DiVRLdi5tjJCPIt05mwvN01nJSeeRwD-HxUWMLZBTDJXNXZtKvvKJRVwb7mVqc3WlikDm6QvwyAUJzk/s1600/micro.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;263&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLUlDJzdtBo82Aw-YdRMM5URiXR23yqu6ADWBzGalJLGebrP9Dn380MocuZjBP3DiVRLdi5tjJCPIt05mwvN01nJSeeRwD-HxUWMLZBTDJXNXZtKvvKJRVwb7mVqc3WlikDm6QvwyAUJzk/s320/micro.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;It was a week ago while I was searching the web that I found out that micro sd memory card is now convertable in size and space.&lt;br /&gt;
It was so unsuspecting and strange when I saw it and after trying it out my self,I had no body to tell me that it really rocks.&lt;br /&gt;
I will show you How to Convert a 1GB Memory Card to 2GB without any  Stress whatsoever using a simple software, The Good News is that, I will  be giving out the Software for Free. With this Software you can keep  converting your Memory Card to Higher Capacity!&lt;br /&gt;
&lt;b style=&quot;color: cyan;&quot;&gt;&lt;span class=&quot;style1&quot;&gt;WARNING:&lt;/span&gt;&lt;/b&gt; It only work 1GB Memory Card Only!  &lt;br /&gt;
&lt;img height=&quot;65&quot; src=&quot;http://www.naijaloaded.com/Images/memory_gb.png&quot; width=&quot;89&quot; /&gt;&lt;br /&gt;
&lt;span class=&quot;style2&quot;&gt;&lt;u&gt;FOLLOW THIS PROCEDURE TO CONVERT YOUR MEMORY CARD&lt;/u&gt; &lt;br /&gt;
&lt;/span&gt;1.Get the Memory Card you wish to Increase it Capacity, It must be a 1GB Memory card.&lt;br /&gt;
2.Back Up the Memory Card because we will surely Format it during the Conversion Process.&lt;br /&gt;
3.Insert your Memory Card to your PC.&lt;br /&gt;
4.Download this Software for Converting your Memory Capacity by&amp;nbsp;&lt;a href=&quot;http://www.4shared.com/file/tNJZSBjX/skimedi_fix-1gb_to_2gb.html&quot;&gt;clicking here&lt;/a&gt;&lt;br /&gt;
5.After Installation, It will Auto-Open, Showing the FIX and Cancel  option. And you have to browse the drive where your Memory Card is  located (generally &lt;strong&gt;G&lt;/strong&gt;: or &lt;strong&gt;L&lt;/strong&gt;: drive for USB&lt;br /&gt;
6.After Selecting the Drive, Click on the &lt;strong&gt;Fix&lt;/strong&gt; button, and  then the updating process will be followed up. It will ask you for  conformation whether you agree to format or not. click on Yes.&lt;br /&gt;
7.It will ask you to Unplug the Memory Card, Remove it and Insert it again. Now the Size of the Memory Card has been Increased to &lt;strong&gt;2GB&lt;/strong&gt;, You can now check the Properties of the Memory card by Going to &lt;strong&gt;My Computer&lt;/strong&gt; &lt;strong&gt;»&lt;/strong&gt; Right click on the Memory Card &lt;strong&gt;»&lt;/strong&gt; &lt;strong&gt;Properties&lt;/strong&gt;, Now the Size of the Memory card will show &lt;strong&gt;2GB&lt;/strong&gt;. You can check the Properties before and after the Conversion Process.&lt;br /&gt;
Enjoy your new memory card!</content><link rel='replies' type='application/atom+xml' href='http://ethicalhackinginstitute1.blogspot.com/feeds/2355305649449744022/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/06/convert-1gb-micro-sd-memory-card-to-2gb.html#comment-form' title='13 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/2355305649449744022'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5145860179828431135/posts/default/2355305649449744022'/><link rel='alternate' type='text/html' href='http://ethicalhackinginstitute1.blogspot.com/2011/06/convert-1gb-micro-sd-memory-card-to-2gb.html' title='Convert 1GB micro sd memory card to 2GB'/><author><name>ethicalhackinginstitute</name><uri>http://www.blogger.com/profile/03158890439235970060</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLUlDJzdtBo82Aw-YdRMM5URiXR23yqu6ADWBzGalJLGebrP9Dn380MocuZjBP3DiVRLdi5tjJCPIt05mwvN01nJSeeRwD-HxUWMLZBTDJXNXZtKvvKJRVwb7mVqc3WlikDm6QvwyAUJzk/s72-c/micro.jpg" height="72" width="72"/><thr:total>13</thr:total></entry></feed>