
Saturday, June 6, 2009
NOKIA CDMA SECRET CODES TRICKS
Nam Set: *3001#12345#
Software Version of mobile: *#837#
Software Version: *#9999#
CDMA Mode : *#7738#
Message sending options: *#66767#
Esn Number: *#92772689#
Current Channel: *#24#
Restart Phone: *#75681#
Restart Phone: *#75682#
Nokia 8887 Nam Programming :
Nam Set: *3001#12345#
Version: *#0000#
Evrc: *#3872#
Esn/Data/Timer: *#92772689#
SID: *#743#
Help: *#4357#
Slot Cycles: *#75681# , *#75682#
Nokia 8587 Nam Programming :
Nam Set: *#626#7764726#
A-Key: #8159357022#4579# (26 digits)
A-Key: #8159357022#4547# (20 digits)
Version: *#0000#
Version: *#837#
Vocoder: *#3872#
Change language: Menu 5, 3, 1
Change DM mode: *#7678#
Debug Screen: *#8378#
Debug: *#8380#
Field Test Menu: *#83788#
SPC Unlock, Factory Reset :
Full Factory Reset: *#7370#
Resets all settings including non-user changeable items (like SPC)
NOKIA TEST MODE:
1) Turn on the phone. Press *3001#12345#
2) Select Field Test and enable it..
3) Exit from NAM.. and restart your phone..
4) you will observe a new menu " Net Monitor "..
5) type appropriate group/display code.. ( 3101 for link info, 6101 for battery info )
6) enter 0000 to back
tags: nokia tricks,all nokia secret codes,cdma mobile tricks
secret codes for symbian based nokia mobiles like s40,s60 mobiles
#06# Display the IMEI (GSM standard)
*#0000# Display the firmware version and date
*#bta0# Display the Bluetooth MAC address (models with build-in Bluetooth radio, activate first to show address)
*#mac0wlan# Display the WLAN MAC address (models with build-in Wi-fi radio)
*#opr0logo# Clear the operator logo (3310 and 3330 only)
*#pca0# Activate the GPRS PCCCH support (early GPRS models)
*#pcd0# Deactivate the GPRS PCCCH support (early GPRS models)
*#res0wallet# Reset the mobile wallet (models with mobile wallet)
*#res0# Soft-format the memory (Symbian models only)
*#rst0# Reset to factory defaults, confirmation required (DCT4 or newer)
*#sim0clock# Display the SIM clock status (DCT3 only)
*#ssn0# Display the manufacturing serial number (mid-range and premium, non-Symbian models, and those devired from them)
*#war0anty# Display the manufacturing and repair info (no exit on DCT3)
*efr0# Enable EFR encoding (pre-2003 models)
#efr0# Disable EFR encoding (pre-2003 models)
*hra0# Enable HR encoding (pre-2003 models)
#hra0# Disable HR encoding (pre-2003 models)
#pw+1234567890+n# Display the SIM lock status: (pre-2003 models)
n = 1: provider lock
n = 2: network lock
n = 3: country lock
n = 4: SIM lock
To know the IMEI (International Mobile Equipment Identity) No.: *#06#
To check the phones Software revision. *#0000#
To enter the service menu type. *#92702689#
Clock Stopping. *#746025625#
tags: symbian mobile tricks,nokia s60,s40 tricks and secret codes
Monday, June 1, 2009
Windows XP Hidden Applications
Run any of these applications: go to Start > Run and type the executable name
• Account Manager
Command to run: syskey.exe
Use: It encrypts Windows XP account database.
Disclaimer: Use with caution, may cause slow performance if enabled.
• Clipboard Viewer
Command to run: clipbrd.exe
Use: To view or delete clipboard contents.
• Character Map
Command to run: charmap.exe
Use: To view and insert special characters.
You can also access it by clicking on Start > All Programs > Accessories > System Tools > Character Map
• Disk Cleanup
Command to run: cleanmgr.exe
Use: To clean downloaded program files, temporary internet files, recycle bin, temporary remote desktop files, setup log files, backup files, offline files and also compresses old files.
You can also access it by clicking on Start > All Programs > Accessories > System Tools > Disk Cleanup
• Driver Verifier
Command to run: verifier.exe
Use: Verifies drivers and helps create settings, delete settings and display information about currently verified drivers.
Disclaimer: Use with caution.
• Dr. Watson Tool
Command to run: drwtsn32.exe
Use: It is used to configure crash log dump settings
• DirectX Diagnostic Tool
Command to run: dxdiag.exe
Use: Provides DirectX version information and also system information, also used to troubleshoot directx components.
• Group & Policy Manager
Command to run: gpedit.msc
Use: To manage user and computer permissions and privileges.
Disclaimer: Use with caution, if you do not know what a setting does, read its description given there, if you don’t understand leave the setting as it is.
• iExpress Wizard
Command to run: iexpress.exe
Use: It helps to create and open self-extracting installable packages.
• Microsoft Synchronization Manger
Command to run: mobsync.exe
Use: It allows synchronization of offline web pages.
• Microsoft Telnet Client
Command to run: telnet.exe
Use: Used to connect telnet networks.
• Network Shared Folder Wizard
Command to run: shrpubw.exe
Use: Helps create shared folders for a network.
• Object Packager
Command to run: packager.exe
Use: Helps packaging objects for insertion into files.
• ODBC Administrator
Command to run: odbcad32.exe
Use: Helps configuring local and network database options.
Can also be accessed from Control Panel > Administrative Tools.
• Private Character Editor
Command to run: eudcedit.exe
Use: Creates and edits new characters for using into documents.
• Performance Monitor
Command to run: perfmon.exe
Use: Monitors CPU hard disk quota and provides detailed logs and reports.
Can also be accessed from Control Panel > Administrative Tools.
• Registry Editor
Command to run: regedit
Use: Helps to create, view and modify registry values.
Disclaimer: Take caution when modifying the registry, always backup the registry before any modifications.
• File Signature Verification Tool
Command to run: sigverif.exe
Use: Helps to check and verify file signatures.
• System Configuration Editor
Command to run: sysedit.exe
Use: Helps to modify SYSTEM.INI, WIN.INI, CONFIG.SYS, AUTOEXEC.BAT
Disclaimer: Take caution when editing any of these files. If you do anything wrong while editing them you may not be able to start Windows.
• System Configuration Utility
Command to run: msconfig
Use: Helps editing SYSTEM.INI, BOOT.INI, WIN.INI. Also helps to control services and startup programs and configure startup modes.
Disclaimer: Use with caution, if you do not know what a setting does, read its description given there, if you don’t understand leave the setting as it is.
• Windows Media Player 5.1 (Retro)
Command to run: mplay32.exe
Use: It is a very basic and plain version of Windows Media Player. Helps to play basic formats of music.
• Windows Workgroup Chat
Command to run: winchat.exe
Use: Helps to chat with other computers in your workgroup.
I hope that it will help a lot to newbies!!!
If I left any or you know any more hidden utilities, feel free to leave your comment!
Monday, May 4, 2009
Keyboard sniffers to steal data!!!!!
Computer criminals could soon be eavesdropping on what you type by analysing the electromagnetic signals produced by every key press.

The attacks were shown to work at a distance of 20 metres
By analysing the signals produced by keystrokes, Swiss researchers have reproduced what a target typed.
The security researchers have developed four attacks that work on a wide variety of computer keyboards.
The results led the researchers to declare keyboards were “not safe to transmit sensitive information”.
Better attacks
The attacks were dreamed up by doctoral students Martin Vuagnoux and Sylvain Pasini from the Security and Cryptography Laboratory at the Swiss Ecole Polytechnique Federale de Lausanne (EPFL).
The EPFL students tested 11 different keyboard models that connected to a computer via either a USB or a PS/2 socket. The attacks they developed also worked with keyboards embedded in laptops.
Every keyboard tested was vulnerable to at least one of the four attacks the researchers used. One attack was shown to work over a distance of 20 metres.
In their work the researchers used a radio antenna to “fully or partially recover keystrokes” by spotting the electromagnetic radiation emitted when keys were pressed.
In a web posting they added: “no doubt that our attacks can be significantly improved, since we used relatively unexpensive equipments [sic].”
In videos showing their early work the researchers are seen connecting keyboards to a laptop running on battery power. They avoided using a desktop computer or an LCD display to minimise the chance of picking up signals from other sources.
Details of the attacks are scant but the work is expected to be reported in a peer-reviewed journal soon.
The research builds on earlier work done by University of Cambridge computer scientist Markus Kuhn who looked at ways to use electromagnetic emanations to eavesdrop and steal useful information.
I can not open my drive or flash memory, what should I do?
Many viruses create a new autorun.inf file for infected drives to run there executable files from autorun. However, antivirus software can kill the virus but they don’t delete the autorun file because it’s not a virus by itself. This is the way to delete autorun.inf and get rid of the problem.
Autorun.inf is a hidden and protected file by Windows Operating System, so first thing you have to go to Folder Options from Tools menu in My Computer:
After that goto view tab in folder options:
You have to make sure that the “Show hidden files and folder” radio button is selected and remove the checkbox from “hide protected operating system files (Recommended)”.
After you click OK or apply a warning message will appear:
Click on Yes and get back to My Computer.
Now go to the drive that you want to remove autorun.inf from it. Right click on the drive icon from my computer and click on Open. If that didn’t work and it showed you the “Open With” window
then click on Browse button and select “C:\%WindowsFolder%\Explorer.exe” to open the file with and click OK.
The drive should opened with Windows Explorer by now and you will be able to see autorun.inf. Delete the file and restart you computer and your problem is solved.
Simple tip to protect from Autorun.inf viruses
External memory devices are common virus distribution method. Once you open an infected memory device the Autorun.inf will copy the virus to your machine and it will get infected as well.
However, there’s a very simple protection method that doesn’t require any third-party software.
First, you have to enable viewing hidden and protected files. You can do this simply by enabling two options from Folder Options as shown in the following image:
Now, all system files will appear in Windows Explorer including autorun.inf. The thing about autorun.inf that it works only when you open the external device not when you explore it. So, don’t use the open option from the Autorun menu
or the Windows Explorer context menu
Instead use the explore option from the context menu when you open the removable device you can see and delete autorun.inf. Also, you can check if this device is infected by skimming for hidden executable files and delete them.
When I double click on my local drive, I get the open with window!
This is a common problem which is usually associated with autorun.inf. If you have a persistent problem with opening your drive, it’s advisable to have a look to the other articles in the Troubleshooting category. If you don’t please continue reading this article:
The problem usually happen when you double click on your local drive. A message just like the one shown below will appear. Before you try these steps, try to right click on drive and click on the “Explore” option. If that didn’t work for you follow these steps:

Click on “Browse” and you will get this window
Locate you windows folder and choose to open your local drive with “Explorer.exe”. After that click on “Open” and you back to the first window just cick “Ok” and your drive will open.