Wednesday, July 27, 2011

changing music player skins in S40 devices

first download oxycube from here then connect your phone,download skins and copy the files to folders:

C:\Hiddenfolder\Mediaplayer
C:\Hiddenfolder\Equalizer
C:\Hiddenfolder\Fmradio


access hidden system folders with OXYCUBE



fmr = Fmradio of phone

eql = Equalizer of phone

mpl = Mediaplayer of the phone



Enclosed beside the Nokia phone model is the compatible file format of the theme.


Nokia s40v5 uses SWF
Nokia s40v6 uses NFL

5310xm (.swf)
5610xm (.swf)
6500c (.swf)
3600slide (.swf)
5220xm (.nfl)
7210sn (.nfl)
7310sn (.nfl)
7510sn (.nfl)
7610sn (.nfl)
6303c (.nfl)
5130xm (.nfl)
download skins of .nfl format here you can also extract skin from other phones(S40) and add them into corresponding location of your phone download skins here music player skins  

Sunday, July 24, 2011

flashing with JAF


REQUIREMENTS:
  • J.A.F Software pkey emulator.
  • USB data cable.
  • Nokia phone.
WHAT IS THE NEED OF FLASHING?
There are many uses you can keep updated with latest features and you can modify your phone according to your wish.
TYPES OF FLASHING:
There are several types.
  • using J.A.F box and Fbus cables .
  • Nokia software updater(NSU) .
  • phoenix .
  • J.A.F Software with Pkey .
Instalation:
  • download J.A.f from Here.
  • get navifirm from here
  • extract that zip archive from above file,you will get J.a.f setup file and a virtual pkey.
  • install j.a.f
warning: many antivirus softwares will show some j.a.f components as virus But just ignore it.
note: windows 7 and vista users must run pkey as administrator and set compatibility as windows xp
Obtaining Firmware(software):
  • open navifirm and select target as ‘product external’.
  • it will display the list of nokia handsets and their RM version.
  • click on your handset name with correct Rm version.
note: you can check rm version by dialling *#0000#
  • next another list will display in release column, select your firmware version.
CAUTION!: download correct firmware version, or even higher version but not lower versions, because by downgrading or flashing with lower versions may cause you phone to dead, but you can revive dead phone too via jaf
  • next comes variant, you can download and flash with any variants of software that doesn’t matter, but if you want exact variant, than open your phone’s back cover, remove battery under that you will find code like this 0559107(phone specific).
  • next firmware contents will be displayed download only these files.
  • .mcu
  • .cnt or .image
  • .ppm
About firmware components:
  • .mcu this is the largest one among firmware files,it contains all program data of firmware,some versions of j.a.f wont detect .mcu then just rename it to .c0r (c zero r).
  • .image all gallery elements such as tones,wallpapers,default games,apps are included in this file.
  • .ppm this is the most important one,it contains all tones such as keypad tone,recording beep,menu icons etc.we can change every element of this file,firmware modification is possible.
Preparation:
“flashing is the process of upgrading, downgrading* and reinstalling phones firmware or software”
  • open pkey, then run J.a.f, keep pkey opened don’t close it just minimize it.
  • go to bb5 column.
  • check the following there.
    a)manual flash
    b)Factory set
    c)normal mode
  • 4)then click on mcu,browse to folder where you downloaded mcu and select it(if jaf wont detects mcu file then rename it to .c0r then re try).
  • 5)like that select ppm ant .cnt or .image files.
  • 6)connect your phone with the help of usb data cable,in pc suite mode.
  • 7)before flashing make sure your phone battery has enough charge,i recommend connecting to charger while flashing.

fashing:
*Downgrading is not possible on all phones, it depends on firmware, it’s not recommended.
after doing these steps,then click on flash button,you will get two warnings,just ignore them,don’t touch your phone till j.a.f says “done!”.
thats it you have flashed your phone .
Dead flashing:
  • same as flashing,just tick ,dead flash at bb5 coloumn in jaf
  • it is necessary to connect charger now,click on flash
  • press power button when prompted by jaf
note:sim card must be inserted while flashing.

Sunday, July 10, 2011

Use google for hacking

Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google.
 

1. Hacking Security Cameras

 
There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. All you have to do is use the following search query in Google. Type in Google search box exactly as follows and hit enter
inurl:”viewerframe?mode=motion”
Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. You will see something as follows
As you can see in the above screenshot, you now have access to the Live cameras which work in real-time. You can also move the cameras in all the four directions, perform actions such as zoom in and zoom out. This camera has really a less refresh rate. But there are other search queries through which you can gain access to other cameras which have faster refresh rates. So to access them just use the following search query.
intitle:”Live View / – AXIS”
Click on any of the search results to access a different set of live cameras. Thus you have hacked Security Cameras using Google.
 

2. Hacking Personal and Confidential Documents

 
Using Google it is possible to gain access to an email repository containing CV of hundreds of people which were created when applying for their jobs. The documents containing their Address, Phone, DOB, Education, Work experience etc. can be found just in seconds.
intitle:”curriculum vitae” “phone * * *” “address *” “e-mail”
You can gain access to a list of .xls (excel documents) which contain contact details including email addresses of large group of people. To do so type the following search query and hit enter.
filetype:xls inurl:”email.xls”
Also it’s possible to gain access to documents potentially containing information on bank accounts, financial summaries and credit card numbers using the following search query
intitle:index.of finances.xls
 

3. Hacking Google to gain access to Free Stuffs

 
Ever wondered how to hack Google for free music or ebooks. Well here is a way to do that. To download free music just enter the following query on google search box and hit enter.
“?intitle:index.of?mp3 eminem
Now you’ll gain access to the whole index of eminem album where in you can download the songs of your choice. Instead of eminem you can subtitute the name of your favorite album. To search for the ebooks all you have to do is replace “eminem” with your favorite book name. Also replace “mp3″ with “pdf” or “zip” or “rar”.
I hope you enjoy this post. Pass your comments. Cheers!

Chat without Yahoo Messenger or Gtalk

Chat without Yahoo Messenger or Gtalk

Can we chat without Yahoo messenger? Most of us are familiar with the most widely used applications such as Yahoo messenger and Gtalk to carry out chatting with our friends. But here I’ll show how to chat without Yahoo messenger or Gtalk. As we all know the information we exchange with their servers(Yahoo or Gtalk) are recorded and stored along with the corresponding IP addresses. This may hurt our privacy since all the information we exchange while chatting has to pass through a third party server.

Moreover if the matter is highly confidential, then it is necessary to have a totally private chat where the messages are exchanged only between the people involved in the chat and not with any other third party servers. At these situations, it is better to chat without Yahoo messenger.
 
So, how to carry out a private chat without Yahoo messenger or Gtalk?
For this purpose there exists many softwares that support’s you to host a web-based chat system without any additional software or services. So with these softwares the exchange of messages takes place directly between the two persons engaging in the chat and will not pass through any other third party server. This ensures 100% privacy and eliminates the desperate need to chat with Yahoo messenger.
 
One of my favorite program for private chat is Easy Chat Server
 
Easy Chat Server is a Windows program that allows you to host a web-based chat system without any additional software or services. Unlike other chat server, you do not need to install Java. It allows you to build one or more web-based chat rooms on your machine, and provides advanced chat functionalities aiming to offer discussion space for your users, customers and partners.
Here are some of the screenshots of Easy Chat Server.

 
 
Key Features of Easy Chat Server:
  • Easy to use, Simple installation that will have you up and running in minutes.
  • 128-Bit Security Socket Layer(SSL) support. Support for server level certificate creation.
  • Instantly runs a complete chat server on your PCs – does not need to install any Web Server.
  • Supports full private messaging and One to One private chat.
  • Support of images, smileys, avatar icons.
  • Full chat and access logs are available within the chat server.
  • Have a built-in IP Filter, supports banning/unbanning IP address, securely.
  • Multiple styles available for the user to customize rooms.
  • Unlimited rooms and users, no any annual, per-user, or maintenance fees.
  • No spyware, adware or other unwanted extra programs.

Wednesday, July 6, 2011

Netbois hacking


THIS NETBIOS HACKING GUIDE WILL TELL YOU ABOUT HACKING REMOTE COMPUTER AND GAINING ACCESS TO IT’S HARD-DISK OR PRINTER. NETBIOS HACK IS THE EASIEST WAY TO BREAK INTO A REMOTE COMPUTER.
STEP-BY-STEP NETBIOS HACKING PROCEDURE
1.Open command prompt
2. In the command prompt use the “net view” command
( OR YOU CAN ALSO USE “NB Scanner” OPTION IN “IP TOOLS” SOFTWARE BY ENTERING RANGE OF IP ADDRESSS. BY THIS METHOD YOU CAN SCAN NUMBER OF COMPUTERS AT A TIME).
Example: C:\>net view \\219.64.55.112
The above is an example for operation using command prompt. “net view” is one of the netbios command to view the shared resources of the remote computer. Here “219.64.55.112″ is an IP address of remote computer that is to be hacked through Netbios. You have to substitute a vlaid IP address in it’s place. If succeeded a list of HARD-DISK DRIVES & PRINTERS are shown. If not an error message is displayed. So repeat the procedure 2 with a different IP address.
3. After succeeding, use the “net use” command in the command prompt. The “net use” is another netbios command which makes it possible to hack remote drives or printers.
Example-1: 
C:\>net use D: \\219.64.55.112\F
Example-2: 
C:\>net use G: \\219.64.55.112\SharedDocs
Example-3: 
C:\>net use I: \\219.64.55.112\Myprint
 
NOTE: In Examples 1,2 & 3, D:,G: & I: are the Network Drive Names that are to be created on your computer to access remote computer’s hard-disk.
NOTE: GIVE DRIVE NAMES THAT ARE NOT USED BY ANY OTHER DRIVES INCLUDING HARD-DISK DRIVES, FLOPPY DRIVES AND ROM-DRIVES ON YOUR COMPUTER. THAT IS, IF YOU HAVE C: & D: AS HARD DIRVES, A: AS FLOPPY DIVE AND E: AS CD-DRIVE, GIVE F: AS YOUR SHARED DRIVE IN THE COMMAND PROMPT
F:,”SharedDocs” are the names of remote computer’s hard-disk’s drives that you want to hack. “Myprint” is the name of remote computer’s printer. These are displayed after giving “net use” command. “219.64.55.112″ is the IP address of remote computer that you want to hack.
4. After succeeding your computer will give a message that “The command completed successfully“. Once you get the above message you are only one step away from hacking the computer.
Now open “My Computer” you will see a new “Hard-Disk drive”(Shared) with the specified name. You can open it and access remote computer’s Hard-Drive. You can copy files, music, folders etc. from victim’s hard-drive. You can delete/modify data on victim’s hard-drive only if WRITE-ACCESS is enabled on victim’s system. You can access files/folders quickly through “Command Prompt”.
NOTE: If Remote Computer’s Firewall Is Enabled Your Computer Will Not Succeed In Gaining Access To Remote Computer Through Netbios. That is Netbios Hacking Is Not Possible In This Situation.(An Error Message Is Displayed). So Repeat The Procedure 2,3 With Different IP Address.
HAPPY NETBOS HACKING!!



Speed Up your PCIf you have a Windows PC that is not maintained properly on a regular basis, it’s performance will most likely tend to degrade with the passage of time. 
To counter this decreased performance, visiting a computer shop isn’t the only solution. Rather, it is possible to improve your computer’s performance yourself. Here is a way to save your money and squeeze more speed out of your Windows PC.
 

Steps to Speed Up your PC

 
1. Free Up Disk Space by eliminating junk files and unused programs from your computer
  • Remove temporary Internet files.
  • Empty the Recycle Bin.
  • Remove Windows temporary files.
  • Uninstall Programs that you no longer use.
 
2. Periodically perform Hard Disk Defragmentation.
  • Goto Start -> All Programs -> Accessories -> System tools
  • Open the Disk Defragmentor program
  • Click on Analyze Disk
 
3. Clean Up your Registry (Highly Recommended)
Cleaning up your Windows registry plays a major role in increasing the speed of your computer. Unfortunately, Windows doesn’t provide any in built tool for cleaning the registry. So, you have to use a commercial registry Cleaner like PC Health Advisor to do this.
Every time you install/uninstall a program or make changes to your computer, a new entry is added to the registry. So, with the passage of time, a large amount of unwanted or invalid entries will get accumulated which begins to clog your registry. This will result in decreased performance of your PC causing error messages and system crashes.
So, clean up your registry on a regular basis to keep your computer performance at it’s best. You can download PC Health Advisor from the following link:
 
 
4. Remove Unwanted Programs from the Start-Up
  • Type msconfig in Run dialog box and hit Enter.
  • Now in the System Configuration window, goto Startup tab
  • Uncheck unwanted programs that you wish to remove from the start-up programs
 
5. Scan for Malware programs like viruses and spyware
The presence of virus and spyware programs can bring down the performance of your computer down to it’s knees. So install a good antivirus software and keep it updated so as to stay away from malware programs. 

Is your Nokia Cell Phone Of good quality


Nokia is one of the largest selling phones across the globe. Most of us own a Nokia phone but are unaware of it’s originality. Are you keen to know whether your Nokia mobile phone is original or not? Then you are in the right place and this information is specially meant for you. Your phones IMEI(International Mobile Equipment Identity) number confirms your phone’s originality.
Press the following on your mobile *#06# to see your Phone’s IMEI number(serial number).
Then check the 7th and 8th numbers
Phone serial no. x x x x x x ? ? x x x x x x x

IF the Seventh & Eighth digits of your cell phone are 02 or 20 this means your cell phone was assembled in Emirates which is very Bad quality
IF the Seventh & Eighth digits of your cell phone are 08 or 80 this means your cell phone was manufactured in Germany which is fair quality
IF the Seventh & Eighth digits of your cell phone are 01 or 10 this means your cell phone was manufactured in Finland which is very Good
IF the Seventh & Eighth digits of your cell phone are 00 this means your cell phone was manufactured in original factory which is the best Mobile Quality
IF the Seventh & Eighth digits of your cell phone are 13 this means your cell phone was assembled in Azerbaijan which is very Bad quality and also dangerous for your health.

Monday, July 4, 2011

Inside GoOgLe – A Collection of Strange Links on Google


Although Google is a search engine, it’s also a website. It has millions of it’s own pages indexed in it. When i was digging deep inside Google i found some strange links inside it. So I decided to compile a list of strange Google links. Enjoy!
1. If you ever wondered all the misspellings of Britney Spears and their volume, you must check this out.
http://www.google.com/jobs/britney.html
2. These two links are to fun Google games
http://www.google.com/Easter/feature_easter.html
3. Quench your thirst for knowledge with Google Gulp
www.google.com/googlegulp
4. Check out Google’s latest ideas
http://www.google.com/experimental
5. If you are fond of puzzles
http://www.google.com/puzzles
9. Are you scary smart?
http://www.google.com/scarysmart
10. Google press center
http://www.google.com/press
12. Mind-racing problems
http://www.google.com/indiacodejam
16. Urchin Software from Google
http://www.google.com/urchin
22. Google’s next Coding Competition site
http://www.google.com/codejam
28.Microsoft on google
http://www.google.com/microsoft
37. Google Adult content
http://www.google.com/Top/Adult
38. Google & Dilbert Doodle
http://www.google.com/dilbert.html
39. Google in Kannada
www.google.com/intl/kn
30.Win Registry files in google
http://www.google.com/google_rsearch.reg
Oops there’s still lot more.But only this much for now….

Hack software run trial period forever


In this post I’ll show you how to hack a Software and run the trial program forever. Most of us are familiar with many softwares that run only for a specified period of time in the trial mode. Once the trial period is expired these softwares stop functioning and demand for a purchase. But there is a way to run the softwares and make them function beyond the trial period. Isn’t this interesting?
Before I tell you how to hack the software and make it run in the trial mode forever, we have to understand the functioning of these softwares. I’ll try to explain this in brief.
When these softwares are installed for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc. After installation every time you run the software, it compares the current system date and time with the installed date and time. So, with this it can make out whether the trial period is expired or not.
So with this being the case, just manually changing the system date to an earlier date will not solve the problem. For this purpose there is a small Tool known as RunAsDate.
RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn’t change the current system date, but it only injects the date/time that you specify into the desired application.
RunAsDate intercepts the kernel API calls that returns the current date and time (GetSystemTime, GetLocalTime, GetSystemTimeAsFileTime), and replaces the current date/time with the date/time that you specify. It works with Windows 2000, XP, 2003 and Vista.
NOTE: FOLLOW THESE TIPS CAREFULLY
You have to follow these tips carefully to successfully hack a software and make it run in it’s trial mode forever.
1. Note down the date and time, when you install the software for the first time.
2. Once the trial period expires, you must always run the software using RunAsDate.
3. After the trial period is expired, do not run the software(program) directly. If you run the software directly even once, this hack may no longer work.
4. It is better and safe to inject the date of the last day in the trial period.
For example, if the trial period expires on sept 30 2009, always inject the date as sept 29 2011 in the RunAsDate. I hope this helps! Please express your experience and opinions through comments.

Sunday, July 3, 2011

What is IMEI???


What is the Importance of IMEI Number-Mobile Safety Tips

Two months back, my friend's mobile is stolen by someone.  He lost his 5130 Nokia express music mobile.  He didn't know the IMEI number, the mobile is untraceable.  So i am here to share the information about the IMEI.

What is IMEI Number?

IMEI stands for International Mobile Equipment Identity Number. It is 15 digit unique number of Cell Phone. Usually the IMEI is number printed in the battery compartment.  You can display the IMEI number by pressing *#06# in your Mobile phone.



What is the use of IMEI Number?

IMEI number is identify the Mobile Device. It is used to deny the access of stolen mobile from accessing the Mobile services of a country. Using IMEI number we can trace the location of Mobile.

Equipment Identity Register(EIR)
When a phone is switched on, the IMEI number is transmitted and checked against a database in the network's EIR.  The EIR has three categories namely the "white lists", "grey lists" and "black lists". if the IMEI number is in blacklist, the mobile can not use the mobile service. 

Stolen Mobile

Block the Mobile
When mobile is stolen, you can block the mobile from being used by thief using IMEI number. You have to contact your local operator and request to block your mobile. They will add your stolen IMEI number to the blacklist of IMEI numbers. So thief can not use the mobile.

Trace the Location of Mobile
You can trace the location of your mobile by using Global Positioning System(GPS). Contact your local operator for tracing.

Online IMEI Number Tracking Website

http://www.trackimei.com/
Report Theft
If your mobile is stolen, you can register with IMEI number in the above website. They will track your mobile phone and inform you.
Register IMEI
You can register your IMEI number for safety purpose. This will be useful to track, when your mobile is stolen

hacking facebook account


How to Hacking Facebook with security Question Vulnerability?

You can bypass the security question and hack the friend's face book account with 2 mutual Friends.

Facebook Feature(drawback)?
 Facebook provides option to recover your account with security question.  But if you forget the answer , still you can recover with your 3 friends account.


How the Hackers hacking the facebook accounts?

 if they are not your friends, they may request with 3 fake facebook accounts to become a friend. if they are your friend, it is very simple to hack your account.

 At first hacker will visit the forget password page of facebook.  and search for your/victim account with their details (if he want to hack means, definitely he analyze completely about you).  So he will enter the details of yours and find your account.






Select "This is my account" and click the next button.  Facebook will show the password recovery option.  But simply you can bypass this by clicking "No longer have access to these?"

Facebook will ask you to enter the new email address.  When you enter, it will ask you to answer for the "Security Question".  Here is the major security hole of the Facebook.  Facebook provides here to recover the password in another way, when you don't know the security question answer.  You can recover/hack the account with three friends of the account.

If you answer three times wrongly for the security question, it will bring you to the recover the account with friends page. So if you select any trusted friends, the security code will be send to the friends.  By getting all security codes, you can gain access to the account.  The main drawback is that hackers can be a friend.  He can select 3 trusted friends as his fake profile. Now your account will be hacked.

So sad..!!! Don't worry ..!! i am here to give you some security tips to protect your account from hackers.

Facebook Security Tips

  • Don't Set "Security Question" for your Facebook account.
  •  Register your mobile: This is best security provided by Facebook.com.  
    • Login to your facebook account
    • click the Account->Account Settings
    • click the change button near to the Account security
    • Select the third option i.e. "Login Approvals.  This means that facebook account will send  message to your mobile whenever you/hacker logins from different system. 
    • Enter your own mobile number. 
    • oh i forget to ask you 1 thing.  are you from your own system? if you yes, you will have some additional security.  if you have public cafe, sorry your account can not use this security option.
    • Enter your computer name.


That's all your account is safe until there is another vulnerability found by hackers.  Keep in touch , i will give you security tips for you.

learn hacking

if u want to learn any type of hacking then comment here i will give whole details of hacking 

multitasking in S40 phones





link for JAF http://www.4shared.com/file/5QWxi_SU/JAF_19864_FULL_CRACK.html
Steps.
1-Download JAF on pc.
2-Connect your Phone with pc in PC-Suite Mode.
3-Open JAF and go to BB5 Tab.
4-Tick the following.
a-Read pp.
b-Normal Mode.
c-CRT 308(Already Ticked).
5-Now Click Service.
6-Save the *.pp file on Desktop.
7-Open the *.pp file in Notepad.
8-In case the Phone is-
a-Nokia s40 v3 then Search for 28 1 line and change it to 28 2
b-Nokia s40 v5 then Search for 48 and change it to 48 2
c-In case there is no 48 or 28 then add the Appropriate line i.e 48 2 or 28 2. to the first row.
9-Save the *.pp
10-Open JAF>BB5 Tab.
11-Tick the following:
a-Upload pp
b-Normal Modec CRT-308 (Already Ticked)
12-Click on Service.
13-Select the *.pp File.
14-After it shows Done, Select Normal Mode from the Drop Down Menu.
15-Phone will Restart and show "Test in RNDIS USB mode?" Press NO. This popup will be shown on every restart. This is normal..
Now we have successfully disabled the Nokia Security wall.Edit Java Application u want to do multitasking

Steps
1-Copy the Java(.jar) application to the computer.
2-Open the *.jar file with WinRAR.
3-Browse to Meta-Inf Folder and Open it.
4-Open the Manifest.MF file in Notepad.
5-At the end of the codes add this line Nokia-MIDlet-no-exit: true
6-Save the notepad file.
7-Click on Yes when WinRAR asks to Update the Archive.
8-Copy the *.jar file to Nokia.


new to blog

hi friends i am raj this is a blog for technology,science,knowledge for u only

Twitter Delicious Facebook Digg Stumbleupon Favorites More