Monday 28 July 2014

Secret Hack Codes for Android Mobile Phones

Secret Hack codes are those codes which are
usually hidden from users for any misuse and
exploit. As we all know android is very new
platform and thus very few hack codes of
androids are there on internet. Today i am
sharing all the hack codes of androids
cellphones that i know. And i surely hope you
can't find codes better than that. So friends
let's hack and explore our android Phones. I
have tested these codes on my Phone
Samsung Note having an Android OS version
2.2 . I am sure these will work on all previous
versions.
Secret Hacking codes for Android Mobile
Phones:
1. Complete Information About your Phone
*#*#4636#*#*
This code can be used to get some interesting
information about your phone and battery. It
shows following 4 menus on screen:
Phone information
Battery information
Battery history
Usage statistics
2. Factory data reset
*#*#7780#*#*
This code can be used for a factory data
reset. It'll remove following things:
Google account settings stored in your phone
System and application data and settings
Downloaded applications
It'll NOT remove:
Current system software and bundled
application
SD card files e.g. photos, music files, etc.
Note: Once you give this code, you get a
prompt screen asking you to click on "Reset
phone" button. So you get a chance to cancel
your operation.
3. Format Android Phone
*2767*3855#
Think before you give this code. This code is
used for factory format. It'll remove all files
and settings including the internal memory
storage. It'll also reinstall the phone firmware.
Note: Once you give this code, there is no way
to cancel the operation unless you remove the
battery from the phone. So think twice before
giving this code.
4. Phone Camera Update
*#*#34971539#*#*
This code is used to get information about
phone camera. It shows following 4 menus:
Update camera firmware in image (Don't try
this option)
Update camera firmware in SD card
Get camera firmware version
Get firmware update count
WARNING: Never use the first option
otherwise your phone camera will stop working
and you'll need to take your phone to service
center to reinstall camera firmware.
5. End Call/Power
*#*#7594#*#*
This one is my favorite one. This code can be
used to change the " End Call / Power " button
action in your phone. Be default, if you long
press the button, it shows a screen asking you
to select any option from Silent mode, AirPlane
mode and Power off.
You can change this action using this code. You
can enable direct power off on this button so
you don't need to waste your time in selecting
the option.
6. File Copy for Creating Backup
*#*#273283*255*663282*#*#*
This code opens a File copy screen where you
can backup your media files e.g. Images,
Sound, Video and Voice memo.
7. Service Mode
*#*#197328640#*#*
This code can be used to enter into Service
mode. You can run various tests and change
settings in the service mode.
8. WLAN, GPS and Bluetooth Test Codes:
*#*#232339#*#* OR *#*#526#*#* OR
*#*#528#*#* - WLAN test (Use
"Menu" button to start various tests)
*#*#232338#*#* - Shows WiFi
MAC address
*#*#1472365#*#* - GPS test
*#*#1575#*#* - Another GPS
test
*#*#232331#*#* - Bluetooth test
*#*#232337#*# - Shows
Bluetooth device address
9. Codes to get Firmware version
information:
*#*#4986*2650468#*#* - PDA, Phone, H/W,
RFCallDate
*#*#1234#*#* - PDA and Phone
*#*#1111#*#* - FTA SW Version
*#*#2222#*#* - FTA HW Version
*#*#44336#*#* - PDA, Phone, CSC, Build
Time, Changelist number
10. Codes to launch various Factory Tests:
*#*#0283#*#* - Packet Loopback
*#*#0*#*#* - LCD test
*#*#0673#*#* OR *#*#0289#*#* - Melody
test
*#*#0842#*#* - Device test (Vibration test
and BackLight test)
*#*#2663#*#* - Touch screen version
*#*#2664#*#* - Touch screen test
*#*#0588#*#* - Proximity sensor test
*#*#3264#*#* - RAM version

Top 4 Twitter Hacks

Looking for cool twitter hacks ? In this post I’ll
show you top 4 twitter hacks : custom twitter
backgrounds, how to do twit of more than 140
characters, how to know who has unfollowed
you, automated twitter followers
1. Custom Twitter Backgrounds
Good background themes really can add
charms in your profile. In twitter, you can
choose nineteen basic background themes as
you have no option to choose rather than
them but, it is possible to use and customize
backgrounds according to your choice. In
order to do it, you have to go to
www.tweetstyle.com and there, select your
desired theme and download it. Now, the next
step is to upload it in your twitter account. In
this way, you can set your own custom twitter
background. You can also go-to
Colourlovers.com and can create your own
custom theme as all you need to sign in your
twitter account in order to set it for twitter.
So, in-order to select background theme for
your twitter’s profile, you have to go to-
Settings- Design Menu.
2. How to do twit of more than
140 characters
Twitter doesn’t allow posting texts more than
140 characters but, it is possible to post texts
more that 140 characters by using web-site
named- TwitLonger.com . Yes, Twit Longer is an
easy way to post long messages to twitter as
write what you need at Tweet Longer and
Tweet Longer will post the link to twitter for
you.
3. How to know who has
unfollowed you
In order to know about who has un-followed
you in your twitter’s account as for it; you
have to go to www.twunfollow.com and there,
sign in by your twitter account. Now, the next
step is to enter your email-id and then, this
service will tell you information about who has
un-followed you.
4. Automated Twitter Followers
Yes, now you can get automated twitter’s
followers with the help of Free-Followers.com .
Free-Followers.com is a unique service that
allows you to automatically grow and maintain
your Twitter’s Follower base. In Free-
Followers.com, you can do-
1. Automatically searches recent tweets and
user profiles for people with similar interests.
2. Automatically Follows People with the same
interests.
3. Automatically Un-Follows those Twitter
users that don’t follow you back, this helps
maintain a balance between followers and
following.
So, free-followers.com is a great way in-order
to increase your twitter followers and manage
your twitter account.
Finally, these above twitter features are really
interesting to do. I hope you like this page

100+ Best Run Commands List Cmd Hacking Tricks>>Click Here

1. Accessibility Options : access.cpl
2. Add Hardware : hdwwiz.cpl
3. Add / Remove Programs : appwiz.cpl
4. Administrative Tools : control admintools
5. Automatic Updates : wuaucpl.cpl
6. Wizard file transfer Bluethooth : fsquirt
7. Calculator : calc
8. Certificate Manager : certmgr.msc
9. Character : charmap
10. Checking disk : chkdsk
11. Manager of the album (clipboard) : clipbrd
12. Command Prompt : cmd
13. Service components (DCOM) : dcomcnfg
14. Computer Management : compmgmt.msc
15. DDE active sharing : ddeshare
16. Device Manager : devmgmt.msc
17. DirectX Control Panel (if installed) : directx.cpl
18. DirectX Diagnostic Utility : dxdiag
19. Disk Cleanup : cleanmgr
20. System Information : dxdiag
21. Disk Defragmenter : dfrg.msc
22. Disk Management : diskmgmt.msc
23. Partition manager : diskpart
24. Display Properties : control desktop
25. Properties of the display (2) : desk.cpl
26. Properties display (tab "appearance") : control
color
27. Dr. Watson : drwtsn32
28. Manager vérirficateur drivers : check
29. Event Viewer : Eventvwr.msc
30. Verification of signatures of files : sigverif
31. Findfast (if present) : findfast.cpl
32. Folder Options : control folders
33. Fonts (fonts) : control fonts
34. Fonts folder windows : fonts
35. Free Cell : freecell
36. Game Controllers : Joy.cpl
37. Group Policy (XP Pro) : gpedit.msc
38. Hearts (card game) : mshearts
39. IExpress (file generator. Cab) : IExpress
40. Indexing Service (if not disabled) : ciadv.msc
41. Internet Properties : inetcpl.cpl
42. IPConfig (display configuration) : ipconfig / all
43. IPConfig (displays the contents of the DNS
cache) : ipconfig / displaydns
44. IPConfig (erases the contents of the DNS
cache) : ipconfig / flushdns
45. IPConfig (IP configuration cancels
maps) : ipconfig / release
46. IPConfig (renew IP configuration
maps) : ipconfig / renew
47. Java Control Panel (if present) : jpicpl32.cpl
48. Java Control Panel (if present) : javaws
49. Keyboard Properties : control keyboard
50. Local Security Settings : secpol.msc
51. Local Users and Groups : lusrmgr.msc
52. Logout : logoff
53. Microsoft Chat : winchat
54. Minesweeper (game) : winmine
55. Properties of the mouse : control mouse
56. Properties of the mouse (2) : main.cpl
57. Network Connections : control NetConnect
58. Network Connections (2) : ncpa.cpl
59. Network configuration wizard : netsetup.cpl
60. Notepad : notepad
61. NView Desktop Manager (if
installed) : nvtuicpl.cpl
62. Manager links : packager
63. Data Source Administrator
ODBC : odbccp32.cpl
64. Screen Keyboard : OSK
65. AC3 Filter (if installed) : ac3filter.cpl
66. Password manager (if present) : Password.cpl
67. Monitor performance : perfmon.msc
68. Monitor performance (2) : perfmon
69. Dialing Properties (phone) : telephon.cpl
70. Power Options : powercfg.cpl
71. Printers and Faxes : control printers
72. Private Character Editor : eudcedit
73. Quicktime (if installed) : QuickTime.cpl
74. Regional and Language Options : intl.cpl
75. Editor of the registry : regedit
76. Remote desktop connection : mstsc
77. Removable Storage : ntmsmgr.msc
78. requests the operator to removable
storage : ntmsoprq.msc
79. RSoP (traduction. ..) (XP Pro) : rsop.msc
80. Scanners and Cameras : sticpl.cpl
81. Scheduled Tasks : control schedtasks
82. Security Center : wscui.cpl
83. Console management services : services.msc
84. shared folders : fsmgmt.msc
85. Turn off windows : shutdown
86. Sounds and Audio Devices : mmsys.cpl
87. Spider (card game) : spider
88. Client Network Utility SQL server : cliconfg
89. System Configuration Editor : sysedit
90. System Configuration Utility : msconfig
91. System File Checker (SFC =) (Scan Now) : sfc /
scannow
92. SFC (Scan next startup) : sfc / scanonce
93. SFC (Scan each démarraget) : sfc / scanboot
94. SFC (back to default settings) : sfc / revert
95. SFC (purge cache files) : sfc / purgecache
96. SFC (define size CAHC x) : sfc / cachesize = x
97. System Properties : sysdm.cpl
98. Task Manager : taskmgr
99. Telnet client : telnet
100. User Accounts : nusrmgr.cpl
101. Utility Manager (Magnifier, etc) : utilman
102. Windows firewall (XP SP2) : firewall.cpl
103. Microsoft Magnifier : magnify
104. Windows Management
Infrastructure : wmimgmt.msc
105. Protection of the accounts database : syskey
106. Windows update : wupdmgr
107. Introducing Windows XP (if not
erased) : tourstart
108. Wordpad : write
109. Date and Time Properties : timedate.cpl

Computer Hacking in the New Age, All you Need to Know about Hacking Today

Every human discovery has pros and cons, so
is the computer which has pervaded all our
lives. The modern humanity is increasingly
dependent on computer for various day-to-
day activities. Computers do us a whole lot of
good things, but it is not without some
pitfalls. With the extensive use of internet for
hundreds of our needs, computer opens a
vicious cycle of hackers. Computer hacking is
a term which refers to an individual’s illegal
and unauthorized access to the data which are
stored in a user’s system. This is done to
disturb the confidentiality and security of the
user’s computer.
The hackers focus on individuals’ computer
system when they are online. As long as you
are not connected to internet you are less
prone to hacking. The access to internet has
actually made computer hacking easy. You
must protect your computer with strong
antivirus and firewall programs to keep
hackers away. Hackers are known for creating
problems which are difficult to solve. This
gives a good business to computer
investigators and technicians. Hacking can be
done in lots of ways. Few of them are given
below:
Worms: These are the
programs which propagate
through networks.
Trojans: These are hidden in
websites, attached files and
emails.
Viruses: These attach
themselves to various kinds of
files. They can damage certain
functions of your computer.
Hackers also crash on wireless networks which
do not have firewall installed and enabled.
They can also send email attachments with
malicious software which get embedded on
the victim’s computer. Hackers attack
accounts which have weak passwords. All
these are done to get access to confidential
and sensitive information of the users.
Whatever is the method of hacking, the effect
is harmful for the user. Your system will be
flooded with viruses, malwares which steal
your information. In order to avoid hacking
one has to make sure that the systems at
home or office have the latest anti-virus
program and firewall installed and enabled.
These programs need to be regularly updated.
Use the latest browser and scan your
computer on a regular basis.
The New Age of internet has brought with it
many risk factors along with umpteen
advantages. The New Age is the time where
our personal lives are no longer very
personal, but people are able to access
personal information of internet users from
various sources in the virtual world. We need
to be careful about usernames and passwords,
else it will lead to dangerous consequences.
Universities, large companies and government
agencies are mostly targeted by hackers
simply because of the bulk of information
they handle. The great newspapers like The
Wall Street Journal and The New York Times
were also targeted by hackers.
Computer hackers are people who gain
remote access to information stored in a
system elsewhere. During the 1950s and 60s
hackers were more drawn towards learning
the operations of a computer rather than
stealing confidential information of a remote
user. Unlike the olden days, now computer
hacking has become more sophisticated and
organized. In the late 1990s hackers tried to
get access to files in the network of Pentagon.
Some more expert hackers gained access to
the patent files at the Indiana University
School of Medicine in February 2003. Many
hackers were sentenced in the history since
hacking represents a potential national
security threat.
One major tool hackers use to steal
information from computer systems is the
use of viruses. Over the years the number of
viruses has increased drastically. The virtual
world now has above 100000 viruses and the
number grows virtually every day. Apart from
the threat the computer hackers pose, they
also can be beneficial in one way. They can
bring to light the flaws in a computer
network. Hackers can help in redesigning the
system and in making information inaccessible
to illegal users and to unauthorized access.
Getting a log in password is one of the
predominant ways to get access to a
computer which is by the side of the hacker.
Getting remote access to a computer is
another way to hack a system. Managing to
crack a Wi-Fi password is the third method of
sneaking into someone else’s system. Hacking
if done on a public or school computer will
have serious consequences. The hacker will be
put behind the bars for illegally accessing the
computer which does not belong to him or
her.

Tabnabbing Attack with social Engineering toolkit on Backtrack | kali

Hi everyone here is the post that basically
explain about very fundamental attack known
to be tab nabbing attack.the attack is very
simple again you sent an link to the victim
he/she click on it and redirected to your
desired login page which looks like original
and the after putting his/her credentials you
get that in no time .
so lets do this with social engineering toolkit
as here more social engineering trick is very
necessary .
So before doing all do check your own BT/
Kali System IP address by typing ifconfig
command.
then Open Your Backtrack terminal and Type
cd /pentest/exploits/set
Now Open Social Engineering Toolkit (SET) ./
set
after that choose social engineering attack
that is option 1 and then choose option 2,
“Website Attack Vectors”.
a list of options will be populated you have
to select option 4 “Tabnabbing Attack
Method”.
next choose option 2 “Site Cloner”.
it will ask for your system ip which you can
give that you got from ifconfig (your
backtrack machine ip)
Then Enter the URL of the site you want to
clone. In this case http://www.facebook.com
and hit enter. SET will clone up the web site.
And press return to continue.
Now convert your URL into Google URL using
goo.gl and send this link address to your
victim via Email or Chat or any other social
way you can make it reach to victim.
When victim open in their browser it should
be a message that the page is still loading. so
victim start to open another tab. As soon as
victim open new tab, our fake website start
working. That script will redirect the victim
to the phishing page your derived.

3 Basic Tips to Prevent A DDoS Attack

Distributed denial-of-service (DDoS) attacks
are always in top headlines worldwide, as
they are plaguing websites in banks, and
virtually of almost every organization having
a prominent online presence. The main cause
behind the proliferation of DDoS attacks is
that there is a very low-cost that the attacker
has to incur to put such attack in motion.
Fortunately, today various prevention
methods have been developed to tackle such
attacks. Before delving further into
understanding about the ways to prevent
DDoS attack, let’s first understand what
exactly a DDoS attack is!
Understanding DDOS Attack
A DDoS (distributed denial-of-service) attack
is an attempt made by attackers to make
computers’ resources inaccessible to its
anticipated user. In order to carry out a
DDOS attack the attackers never uses their
own system; rather they create a network of
zombie computers often called as a “Botnet”
– that is a hive of computers, to incapacitate
a website or a web server.
Let’s understand the basic idea! Now, the
attacker notifies all the computers present
on the botnet to keep in touch with a
particular site or a web server, time and
again. This increases traffic on the network
that causes in slowing down the speed of a
site for the intended users. Unfortunately, at
times the traffic can be really high that could
even lead to shutting a site completely.
3 Basic Tips to Prevent a DDoS Attack
There are several ways to prevent the DDOS
attack; however, here in this guest post I’ll
be covering three basic tips that will help
you to protect your website from the DDoS
attack
1. Buy More Bandwidth.
One of the easiest methods is to ensure that
you have sufficient bandwidth on your web.
You’ll be able to tackle lots of low-scale
DDOS attacks simply by buying more
bandwidth so as to service the requests. How
does it help? Well, distributed denial of
service is a nothing more than a game of
capacity. Let’s suppose you have 10,000
computer systems each distributing 1 Mbps
directed towards your way. This means
you’re getting 10 GB of data that is hitting
your web server every second. Now, that’s
causes a lot of traffic!
So to avoid such issue, you need to apply the
same rule intended for normal redundancy.
According to this technique, if you wish to
have more web servers just multiply around
diverse datacenters and next make use of
load balancing. By spreading your traffic to
various servers will help you balance the load
and will most likely create large space
adequate to handle the incessant increase in
traffic.
However, there’s a problem with this method
that is buying more bandwidth can be a
costly affair. And as you’ll know that the
current DDoS attacks are getting large, and
can be a lot bigger exceeding your budget
limit.
2. Opt for DDoS Mitigation Services.
A lot of network or Internet-service
providers render DDoS mitigation
capabilities. Look for an internet service
provider having the largest DDoS protection
and mitigation network, automated tools,
and a pool of talented anti-DDoS technicians
with the wherewithal to take action in real-
time as per the varying DDoS attack
characteristics. A viable alternative is to
utilize a DDoS prevention appliance, which is
specifically intended to discover and prevent
distributed denial-of-service attacks.
3. Restricted Connectivity.
In case you have computer systems that are
connected to the web directly, a better idea
is to properly install/configure your routers
and firewall so as to limit the connectivity.
For an instance, while receiving some data
from a client machine you can only allow
traffic to pass from the machine only on a
few chosen ports (like HTTP, POP, SMTP etc.)
via the firewall.
Wrapping Up!
Websites are largely getting attacked by
hackers every second. Denial-of-service
attack is insanely getting huge and is
creating a lot of problems for business
organizations having strong online vicinity.
In this guest post you’ll not only understand
what a DDoS attack actually means, but will
also come to know about a few type of
methods to prevent DDoS attacks.
Aforementioned are three tips that I’ll
recommend you to run through to at least
understand where to get started towards
building a resilient web network with
chances of surviving a DDoS attack.