Monday, December 19, 2011

Use any sim in modem whithout unlocking

You Can't use any other SIM in any modem without unlocking the modem. Now you can do that It's very simple.
Step by step instruction:
1. Insert SIM in Modem(for wireless modems that connect internet using sim)(eg idea net setter,vodafone usb stick,etc)
2. Modem software will show invalid SIM, just ignore it and close modem software.
3. Start NOKIA PC suite.
4. Goto nokia pc suite connect to internet option.
5. Goto Configure. Select your data card modem,and make all operator apn settingas like when we use nokia mobile connection.
6. Finish set up.
7. Now connect to internet through PC suite
8. Now see your net is connected without unlocking the modem enjoy for Any problems ask in comments

Saturday, December 17, 2011

Best hacking books and other materials

Today i am gonna give you my another collection of hacking Ebooks so that you can learn it
1)Its pretty popular book may be you have read it, it was released it 2008 yes its pretty old but best for newbies  still its nice book i think ankit fadia learnd form it lolx . good thing is it has COUNTERMEASURES that will help you to increase security
BOOK info

The Hackers Underground Handbook | 2.5 MB 116 pages | PDF

The Hackers Underground Handbook will guide you through password hacking, windows hacking, malware, phising, web hacking, network hacking and Linux (intro, installation, etc). All this material fully packed with images, thus being a top step-by-step guide, on the course of which you cannot fail. The HackerΓΓé¼Γäós Underground Handbook which contains information unknown to 99.9% of the world will teach you the hackers ways.
A great starting book which will guide you in the right direction, helping you understand the basic concepts of computer security and matters that you should take in consideration.

How will the skills uncovered in this handbook affect me?

- You will learn all the hackers underground tricks and learn to apply them in real world situations.
- You will be put into a hackers mindset and learn to think like one.
- By Learning how a hacker thinks and acts, you will be able to protect yourself from future hack attacks.
- You will aquire knowledge nonexistant to 99.9% of the people in the world!
- This Underground handbook may get you interested in pursuing a career as an Ethical Hacker.

A. Introduction
1. How can I use this eBook?
2. What is a hacker
3. Hacker Hierarchy
4. What does it take to become a hacker?
5. Disclaimer

B. Programming
1. Do I really need it?
2. Where should I start?
3. Best way to learn

C. Linux
1. What is it?
2. Choosing a distribution
3. Running Linux
4. Learning Linux

D. Passwords
1. Password Cracking
2. Phishing
3. Countermeasures
4. More Programs

E. Network Hacking
1. Foot printing
2. Port Scanning
3. Banner Grabbing
4. Searching for Vulnerabilities
5. Penetrating
6. Countermeasures

F. Wireless Hacking
1. Scanning for Wireless Networks
2. Cracking WEP
3. Packet Sniffing
4. Countermeasures

G. Windows Hacking
1. NetBIOS
2. Cracking Windows Passwords
3. Countermeasures

H. Malware
1. Definitions
2. ProRat
3. Countermeasures

I. Web Hacking
1. Cross Site Scripting
2. Remote File Inclusion
3. Local File Inclusion

J. Conclusion
Download NOW

2)CEH the worlds best ethical hacking training company, its sildes
go here for CEH ver7 =>> DOWNLOAD 
go here for Certified Ethical Hacker V6 training-dvds(CEH v6 CBT) =>>download

3)CBT Nuggets [CEH] Certified Ethical Hacker [2010]
Go here =>> DOWNLOAD 

just now in hurry i will bring update

Create your own facebook App for pages

hi guys today there are lots of good things going on we have 10,000 pageviews and we have a new friend blackbox. and today is my birthday. :))
So how to get that coool apps that we see on big companies pages for FREE here is the solution

1st Goto iwipa app page =>>from here 

2nd select click here to install it at the bottom of page then when page reloads click on same type of button I.E. click here to install it for free.

3rd then it will take to a page where you can select your page after selection of page let it reload and then click.
Add Iwipa Website:HTML+Iframe+FBML  
4th then follow screen shots and now get your own app for your own page play around with it, its a good utility for those who dont know coding and other things.
here is my page app check it out =>>go here
and YOU have members, comments,etc lots of other features


Any problems ask in comments

NSS Labs claims Chrome-Firefox security report to be bogus

A report by Accuvant, according to which Chrome was the most secure browser ,ahead of Internet Explorer and Firefox. NSS Labs , another securityresearching and testing firm has put out a report that states that the Accuvant report was paid for by Google and the tests were completed back in July 2011.The report comes out soon after Google’scontract with Mozilla for the search bar in Firefox expired in November. NSS says that the report was biased because there is a possibility that Google influenced the kind of tests that were used to test the three products - Chrome, Internet Explorer and Firefox. Tests for features in Firefox were not highlighted - frame poisoning is one suchexample stated.
NSS Labs monitored an 11-day period, starting from the 22nd of November and went on till the 2nd of December. It noticed that there was an increase in protection against malware from 8 percent to 40 percent. Firefox and Safari saw a drop of 2 percent, in comparison during the same period. NSSLabs has made it clear that their testing and research, which is in progress is independent. There were some key points that NSS Labs emphasised on - the number of updates brought out, means there are issues with the browser. The malware lists and sampleswere from the public domain and are not the ideal ones to use. So use firefox

Friday, December 16, 2011

Windows Firewall!

******************** How To Use Windows Firewall? ************************

1. Make sure Windows Firewall is [Enable] on your Computer

2. Install Windows Firewall Control (Outbound)

3. Drag and Drop Sound files into path: C:\Program Files\WindowsFirewallControl

4. Network.wfw file is a Router Network firewall Policy for Windows Firewall, you need to Import Policy

Control Panel\Windows Firewall\Advanced Settings

5. Find Inbound Rules and edit the Network blocking rule

6. Change Scope -

Note: This will block all Computers on Router from range!!!!!!


------------------ If you use the Public WIFI's including Coffee Shops? ------------------------

1. Windows Firewall

2. Click reset defaults

3. Click Allow a program or feature through Windows Firewall

4. Disable File Sharing and other stuff


Home User Public Network:

1. Disable File Sharing *
2. Blocking Any Programs use Windows Firewall *
3. Install Windows Firewall Control (Sealed Outbound) *

Home User Private Network:

1. Enable File Sharing * (Network.wfw)
2. Allow Or Block Any Programs use Windows Firewall *
3. Install Windows Firewall Control (Sealed Outbound) *

Network Monitoring Or Spying:

1. Enable File Sharing *
2. Allowing Any Programs use Windows Firewall *
3. Install Windows Firewall Control (Sealed Outbound) *

Full Windows Firewall Pack:

Remote Firewall Scanner

Uploaded by on Dec 2, 2011

Remote Firewall Scanner is a Program that can test firewalls for leaks remotely on any Network, It also has a built in Telnet Scanner for Monitoring and controlling PC's. Compatible with Windows 7 and any older versions of Windows.

Program Features:

1. Telnet Scanner *
2. IP Scanner *
3. Remote Firewall Leak Tester *
4. Remote Telnet Monitoring *
5. Easy To Use *
6. Very Fast
7. Test Any Firewall (Scan rubbish Firewalls) *
8. Helps Seal All Network Computers Behind Router *
9. Better Screen Designs *
10. 100% FREWARE
11. Very Small Security Audit Program *
12. Remote Admin Tool Client *
13. Network Logs (Network Auditing) *
14. Beep Sound (Firewall Leak Warning) *

Windows 7 Version

Download Source:

Windows XP Version RFS (1.0)

Download Source:

Wednesday, December 14, 2011

Hacking wave in wrong direction

Bros today every body is proving themselves in some or the other way. on one side pakistani hackers hack indian and other US sites and on other side indian hackers like lucky and indishell hack pakistani sites. people love to see hacked site they just love it like anything. thats why thehackernews type of websites are getting more attention and they are doing good by providing information and alerting peoples. but that also creates some negative thinking in peoples mind due to different nationalities.and there is a wild uproar of script kiddys today they think that they can hack sites by just SCANNING AND LEARNING from other websites/blogs its not that fucking easy (sorry for language). so a good request to them that they should study now and then make use of their study to learn hacking by themselves. do you know what is hacking its not like a guy sitting with a big screen pc eating pizzas and defacing FBI websites lol thats pretty old.hacking is curiosity to do something new its the attitude that i want to do some thing . so now i think some or might all script kiddys will study that how computers work and how programs work. and some times exploit writers put some unwanted codes in their script to keep it unusable to script kiddys. so now do HAPPY HACKING.

Top 5 hot SeCuRiTy JObs in 2012

Top 5 Hot Security Jobs in 2012 for Hackers

Information security is one of those rare fields - it has more job openings than people to fill them., the largest IT job site, confirms this job growth and indicates a 79 percent increase in the total number of information security jobs posted on the site from September 2009 to September 2011.

Based on a review of job postings, here are the five hottest jobs for information security pros in 2012:

Security Analyst

Employers have posted 42 percent more security analyst jobs on Dice in September 2011 than in 2010. This is no surprise, especially when employment among information security analysts soared by 16 percent this year during the second quarter, with the Bureau of Labor reporting no unemployment during the first two quarters of 2011. (see Infosec Joblessness Remains Steady, at 0%).
John Reed, executive director at Robert Half Technology, an IT staffing firm, attributes the high growth to organizations becoming more security aware in light of cyber crimes, and needing hands-on IT security folks to uncover new vulnerabilities in order to keep their environment secure.

"These are individuals on the front lines of security, fighting the fight everyday, and as such are critical for organizations to have," he says.

BLS defines information security analysts as those who plan, implement, upgrade or monitor security measures for the protection of computer networks and information. Information security analysts may ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure, as well as respond to computer security breaches and viruses.

Average Salary: $84,000 for a security analyst position.

Who's Hiring: Demand is high with federal government, state agencies, defense contractors and healthcare organizations.

Security Architect

Forty percent more jobs are posted on Dice this year. The move to mobile, wireless and cloud services by organizations has created a huge demand for this position, says Mano Paul, (ISC)2 software assurance adviser. These services are pushing the need for a "new breed of architects and business- savvy leaders who understand business requirements, and can translate them into functional specifications without compromising on the assurance aspects," he says. defines a security architect as a professional who designs systems, databases, infrastructure and networks to be secure. They provide information security solutions to the architecture of an enterprise ensuring the security of business information at every point.

Average Salary: $120,000 for a security architect position.

Who's Hiring: Large financial institutions, healthcare organizations, technology companies and cloud providers.

Application Security

Thirty-three percent more jobs are posted on Dice in application security this year. The increased focus on customer-facing technologies, use of mobile applications, need for secure software and products within organizations and transitions to electronic health records have led to the demand for these jobs.

"High incidences of application attacks, data breaches and applications that are conduits to the data, combined with surge in tech businesses, is pushing growth for qualified professionals," Paul says.

The Open Web Application Security Project, a not-for-profit organization focused on improving the security of application software, defines application security professionals as those that use software and security methods to protect applications from external threats and vulnerabilities. They are largely involved in building security measures into an application's life cycle including design, development, deployment, upgrade or maintenance.

Average Salary: $93,000 for an application security position.

Who's Hiring: Online companies, technology firms, cloud providers and security vendors.
Security Engineer

Employers have posted 27 percent more security engineer jobs on Dice this year. This field is hot because the role is broad and covers areas from penetration testing, vulnerability assessments, programming, designing systems to testing software. "It's not like a painting on the wall that you hang up and it's done. Organizations need constant assessment of their risk and vulnerabilities, and therefore require such breadth of expertise," Reed says.

BLS defines security engineers as those who securely design, develop, test and evaluate computer applications and system software. Although programmers write and support programs in new languages, much of the design, security and development are the responsibility of security engineers. They also focus in developing algorithms, and analyzing and solving programming problems for specific network systems.

Average Salary: $94,000 for a security engineer position.

Who's Hiring: This position is in demand in all sectors, including government, healthcare, finance, in addition to online and technology companies.

Network Security

Twenty-five percent more jobs are posted on Dice within network security this year. Of the 100 jobs that make Money magazine's and's list, network security was ranked number eight last year as one of the most desirable job positions, carrying an annualized 10-year forecast growth of 27 percent.

"Network security continues to be a pain point for companies," says Alice Hill, managing director of She finds that organizations continue to prioritize investing in these professionals to protect critical infrastructure and keep their technology platforms safe from ongoing cyber threats like malware and hacking. Further, she says that the growing use of sophisticated computer networks, including Internet and intranet sites, and the need for faster, more efficient networking products, are increasing the demand for these professionals.

BLS defines network security as those who design and evaluate network systems, such as local area networks, wide area networks and Internet systems. They perform network modeling, analysis, and planning, that deals with the interfacing of computer and communications equipment. Their primary focus is in protecting the computer systems in the network from unwanted intrusions, misuse, access or modifications.

Average Salary: $93,000 for a network security engineer position.

Who's Hiring: An increased demand is coming from government agencies, healthcare organizations, consulting companies and defense contractors.

Editors Note: Salaries cited in the story came from salary tracking websites and

Any problems ask in comments

Saturday, December 10, 2011

Best Hacking and penetration testing E-books

HI guys wassup guess what i have a super awesome book on web applications hacking and attacking here is the info of the book its the second editon and released just now before 1 months i found it from torrent and reading just now its no doubt the  best of all.

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

Publisher: Wiley; 2 Edition
Dafydd Stuttard in 2011
ISBN: 1118026470
912 pages
13.5 MB

>>Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side.
Reveals how to overcome the new technologies and techniques aimed at defending web applications against attacks that have appeared since the previous edition
Discusses new remoting frameworks, HTML5, cross-domain integration techniques, UI redress, framebusting, HTTP parameter pollution, hybrid file attacks, and more
Features a companion web site hosted by the authors that allows readers to try out the attacks described, gives answers to the questions that are posed at the end of each chapter, and provides a summarized methodology and checklist of tasks
Focusing on the areas of web application security where things have changed in recent years, this book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security all you have to do is download it and start researching and hacking it 

first see the contents of the boook
Chapter 1 Web Application (In)security 
Chapter 2 Core Defense Mechanisms 
Chapter 3 Web Application Technologies 
Chapter 4 Mapping the Application
Chapter 5 Bypassing Client-Side Controls 
Chapter 6 Attacking Authentication 
Chapter 7 Attacking Session Management 
Chapter 8 Attacking Access Controls 
Chapter 9 Attacking Data Stores 
Chapter 10 Attacking Back-End Components 
Chapter 11 Attacking Application Logic 
Chapter 12 Attacking Users: Cross-Site Scripting 
Chapter 13 Attacking Users: Other Techniques 
Chapter 14 Automating Customized Attacks 
Chapter 15 Exploiting Information Disclosure 
Chapter 16 Attacking Native Compiled Applications 
Chapter 17 Attacking Application Architecture 
Chapter 18 Attacking the Application Server 
Chapter 19 Finding Vulnerabilities in Source Code 
Chapter 20 A Web Application Hacker’s Toolkit 
Chapter 21 A Web Application Hacker’s Methodology 

THE cover is also good looking 


again new books now i will update all books here only

2) EC council computer forensics- Investigationg network
this book is damn serious as the name suggests FORENSICS lol but a must read good book by EC council and it has almost all topics covered about network and lots lots lots of tooools are mentioned in it so you can do a google search and get them.


Computer Forensics: Investigating Network Intrusions and Cyber Crime By EC-Council
Publisher: Course Technology 2010 | 394 Pages | ISBN: 1435483529 | PDF + EPUB | 30.0 MB

The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute the cyber-criminal. The series is comprised of five books covering a broad base of topics in Computer Hacking Forensic Investigation, designed to expose the reader to the process of detecting attacks and collecting evidence in a forensically sound manner with the intent to report crime and prevent future attacks. Learners are introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. In full, this and the other four books provide preparation to identify evidence in computer related crime and abuse cases as well as track the intrusive hacker's path through a client system. The series and accompanying labs help prepare the security student or professional to profile an intruder's footprint and gather all necessary information and evidence to support prosecution in a court of law. Network Intrusions and Cybercrime includes a discussion of tools used in investigations as well as information on investigating network traffic, web attacks, DOS attacks, Corporate Espionage and much more!                
 and a goood cover too, DOWNLOAD


3) Next is Basics of penetration testing and hacking a good book for beginners it also teaches meaning of penetration testing. and small in size, easy to understand and if you want to learn penetration testing and hacking basics in linux then this book is must read..... it also teaches backtrack linux and its basics 

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed. You learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, Hacker Defender rootkit, and more. A simple and clean explanation of how to effectively utilize these tools as well as the introduction to a four-step methodology for conducting a penetration test or hack, will provide you with know-how required to jump start your career or gain a better understanding of offensive security. The book serves as an introduction to penetration testing and hacking and will provide you with a solid foundation of knowledge. After completing the book readers will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks through each of the steps and tools in a structured, orderly manner allowing readers to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process allows readers to clearly see how the tools and phases relate.

Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases
Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University
Utilizes the Backtrack Linux distribution and focuses on the seminal tools required to complete a penetration test
Have you heard of penetration testing but have no idea what it entails?  This is the perfect book to get you started,  easy to read, does not assume prior knowledge, and is up-to-date.  I strongly recommend this latest work.-Jared DeMott, Principle Security Researcher, Crucial Security, Inc.

Book Details
Paperback: 180 pages
Publisher: Syngress (August 2011)
Language: English
ISBN-10: 1597496553
ISBN-13: 978-1597496551  what are you waiting for DOWNLOAD

4) whos next ok its NINJA hacking lol you heard right ninja hacking the author claims that the book shows how modern day hackers are like older ninjas but still the comparison and techniques discussed in it are really good and useful 

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does with these unorthodox techniques. Use all of the tools that the ninja has: disguise, espionage, stealth, and concealment. Learn how to benefit from these tools by laying your plans, impersonating employees, infiltrating via alarm system evasion, discovering weak points and timing, spyware and keylogging software, and log manipulation and logic bombs. And, really, don't you want to be a ninja for a day just because they're cool? Let this book be your excuse!
 * Discusses techniques used by malicious attackers in real-world situations
 * Details unorthodox penetration testing techniques by getting inside the mind of a ninja
 * Expands upon current penetration testing methodologies including new tactics for hardware and physical

# Paperback: 376 pages
# Publisher: Syngress (September 24, 2010)
# Language: English
# ISBN-10: 1597495883
# ISBN-13: 978-1597495882     
 Cover is also good  DOWNLOAD 

5)now we have everybodys favourite BACKTRACK 5 penetration testing.nice book no comments just simply awesome 

Written in Packt's Beginner's Guide format, you can easily grasp the concepts and understand the techniques to perform wireless attacks in your lab. Every new attack is described in the form of a lab exercise with rich illustrations of all the steps associated. You will practically implement various attacks as you go along. If you are an IT security professional or a security consultant who wants to get started with wireless testing with Backtrack, or just plain inquisitive about wireless security and hacking, then this book is for you. The book assumes that you have familiarity with Backtrack and basic wireless concepts.

Product Details
    Paperback: 220 pages
    Publisher: Packt Publishing (September 9, 2011)
    Language: English
    ISBN-10: 1849515581
    ISBN-13: 978-1849515580
    Product Dimensions: 9.1 x 7.4 x 0.9 inches
    Shipping Weight: 1 pounds (View shipping rates and policies)
    Average Customer Review: 5.0 out of 5 stars  See all reviews (6 customer reviews)
    Amazon Best Sellers Rank: #7,283 in Books (See Top 100 in Books)           

but i didnt like the cover means WTF like you put a dry twigs in a backtrack penetration testing book really sad that they are not getting good covers lol 

dont click on the book go here to DOWNLOAD 

now wait for sometime i will post new ones till you get bored with these ones 

Tuesday, December 6, 2011

Best security extensions for chrome

hi guys today i will give you some security extensions which will help you a lot
1)Hide My ass
its the best elite proxy and with its extension you can just proxy your site in a second and be anoynymous download from here
If you are tired of facebook tracking and other websites tracking you then this is for you.
here is discription

Stop third parties and search engines from tracking the webpages you go to and searches you do.
If you’re a typical web user, you’re unintentionally sending your browsing and search history with your name and other personal information to third parties and search engines whenever you’re online.

Take control of the data you share with Disconnect!

From the developer of the top-10-rated Facebook Disconnect extension, Disconnect lets you:

• Disable tracking by third parties like Digg, Facebook, Google, Twitter, and Yahoo, without requiring any setup or significantly degrading the usability of the web.

• Truly depersonalize searches on search engines like Google and Yahoo (by blocking identifying cookies not just changing the appearance of results pages), while staying logged into other services — e.g., so you can search anonymously on Google and access iGoogle at once.

• See how many resource and cookie requests are blocked, in real time.

• Easily unblock services, by clicking the toolbar button then services (and reloading current pages) — e.g., so you can play games on Facebook.
get it from here

3)Edit this cookie
Edit This Cookie is a cookie manager. You can add, delete, edit, search, protect and block cookies!
Inspired by the lack of a good cookie manager in google chrome i developed this small simple and extremely useful extension, that let's you perform anything you might actually need to do with cookies

This extension lets you:
   Delete all cookies in a page
   Delete only the chosen cookie on a page
   Edit any cookie
   Add a new cookie
   Search a cookie
   Protect a cookie (read-only)
   Block cookies (cookie filter)

4)tamper mokey 
love grease monkey on firefox then tempermonkey is its chrome version.
Greasemonkey compatible script manager for Chrome.
Tampermonkey is a userscript manager for Google Chrome and Chromium Browser. 

Beneath of other tags, functions and features the following ones are supported:
- full unsafeWindow access
- iframe support
- all GM_* functions including:
  * GM_registerMenuCommand
  * GM_xmlhttpRequest with cross domain support
  * GM_getResourceText
  * GM_getResourceURL
  * GM_notification
- the tags:
  * @resource and
  * @require
  * ...
- search scripts from by URL with TamperFire (GreaseFire clone)
download from here
5)HTTP headers  

 its cool extension for watching http response headers download from here

Any problems ask in comments

Saturday, December 3, 2011

Rooting your Android phone-2(almost all phones included)

today i found in xda-developers that they have new version of Superoneclick short fuse
 SuperOneClick updated to v2.2

The program requires Microsoft .NET Framework 2.0+ or Mono v1.2.6+
Operations systems with native support:
Windows Vista
Windows 7
Ubuntu Hardy (8.04 LTS)
Ubuntu Jaunty (9.04)
Ubuntu Karmic (9.10)
Ubuntu Lucid (10.04 LTS)
Ubuntu Maverick (10.10)
Debian Lenny (5.0)
Debian Squeeze (testing)
Debian Sid (unstable)
Debian Experimental

If you run Microsoft Windows XP, install .NET Framework v2.0 or above
If you run Mac or another Linux flavor, make sure you install Mono:

You NEED to put your phone on USB Debugging mode
You NEED to install make sure the Android drivers for your phone are installed
Make sure you DO NOT mount your SD card. 
If you still can't get something to run, try doing it in recovery mode.
every problem of last version are fixed so just connect phone root enjoy 

Compatibility list 
Please note that if you device is not listed here, it doesn't automatically make it incompatible. The list is definitely incomplete.
Acer Liquid Metal
Dell Streak
HTC Magic (Sapphire) 32B
LG Ally
Motorola Atrix4G
Motorola Charm
Motorola Cliq
Motorola Droid
Motorola Flipside
Motorola Flipout
Motorola Milestone
Nexus One
Samsung Captivate
Samsung Galaxy 551 (GT-I5510)
Samsung Galaxy Portal/Spica I5700
Samsung Galaxy S 4G
Samsung Galaxy S I9000
Samsung Galaxy S SCH-I500
Samsung Galaxy Tab
Samsung Transform M920
Samsung Vibrant
Sony Ericsson Xperia E51i X8
Sony Ericsson Xperia X10
Sprint Hero
Telus Fascinate
Toshiba Folio 100

Incompatibility list

Twitter Delicious Facebook Digg Stumbleupon Favorites More