Showing posts with label Hacking Stuff. Show all posts
Showing posts with label Hacking Stuff. Show all posts

Tuesday, December 14, 2010

Which CPU's Can Be Hacked | How To hack A CPU

Know which CPUs can be hacked or overclocked.
With this brief look at the evolution of CPUs, you'll quickly see who makes the most hackable CPU. Armed with positive CPU identification and knowing what you want to accomplish in terms of performance, you'll be able to determine if your present CPU can be hacked or if you need a new CPU to gain better performance.
AMD CPUs are typically deemed more hackable than Intel CPUs as there are usually more system boards for AMD CPUs that provide the option to adjust the base clock speed and clock multiplierand Intel has typically locked down their CPUs to function at only one or a few clock multiplier settings, and they have usually rated and sold most of their CPUs at the highest speed they can be reliably be run. Table provides a quick overview of the most hackable CPU types and methods. Most CPUs can be overclocked by changing the base clock frequency, while some allow multiplier changes. In the case of a number of AMD and a few Intel CPUs, the chip can be modified to support overclocking.
Overclocking methods by CPU type
CPU
Overclocking options
Overclocking method
AMD Athlon
FSB clock, multiplier
Jumpers, BIOS, chip mod
AMD Duron
FSB clock, multiplier
Jumpers, BIOS, chip mod
Intel Celeron
FSB clock, multiplier
Jumpers, BIOS, chip mod
Intel Pentium I
FSB clock, multiplier
Jumpers, BIOS
Intel Pentium II (pre-8/98)
FSB clock, multiplier
Jumpers, BIOS, chip mod
Intel Pentium II (post-8/98)
FSB clock
Jumpers, BIOS
Intel Pentium III
FSB clock
Jumpers, BIOS
Intel Pentium 4
FSB clock
Jumpers, BIOS

The most significant limiting factors in overclocking potential are the features of the system board. As the Front Side Bus (FSB) speed is increased, the PCI and AGP bus speeds are also increased. So if the clock settings alter the FSB and PCI/AGP speeds in proportion to each other, you may reach the speed limit of the system components before you reach the limits of your CPU. If your system board features provide a variety of FSB speeds with separate PCI/AGP speed options, you can likely increase the CPU speed by 100% and still maintain reliable PCI/AGP bus speeds. The available clock setting options vary from system board to system board, even across boards from the same manufacturer.
According to http://www.sysopt.com, one of the most popular CPU analysis and overclocking sites, which collect data from dozens of real-world users who thrive on overclocking, the most overclockable CPUs are:
  • AMD Thunderbird
  • Pentium III Coppermine
  • Pentium 4
  • AMD Duron
Perhaps Intel saw the light in trying to recapture hobbyist market share and decided not to limit the overclockability of the Pentium III and 4 CPUs, a departure from their earlier restrictions on some Pentium II and Celerons chips. Do not let the lack of being able to change the multiplier values for Intel CPUs fool you into thinking they cannot run faster than rated speeds; most do run faster and quite well. While considering CPUs, you have to consider the most popular system boards for overclocking. According to http://www.sysopt.com, the top four overclockable system boards are:
  • Asus Tek
  • Abit
  • MicroStar
  • Epox

Intel CPUs

Relatively few Intel CPUs can be hacked because it's not in Intel's best interest to sell lower performance chips that can be made to perform like their higher performance versions. Some Intel CPUs perform better under overclocking conditions than others. Table lists the most hackable CPUs based on end-user reports from http://www.sysopt.com.
Hackable Intel CPUs
Processor
Published speed
Achieved speed
Percent increase
Pentium 4
3.1 GHz
5.0 GHz
+ 163%
Pentium 4
2.7 GHz
3.4 GHz
+ 25%
Celeron II
2.0 GHz
2.9 GHz
+ 45%
Pentium III Tualatin
450 MHz
1.2 GHz
+ 166%
Pentium II
400 MHz
2.6 GHz
+ 550%

While these performance gains are impressive, the claims by users who have achieved these speeds were not accompanied by how-to tips. Intel CPUs can be two to five times more expensive than comparable AMD CPUs, and hacking these CPUs and the system boards that support them is not well documented.

AMD CPUs

AMD CPUs are generally more overclockable than Intel's, with more parameter flexibility in the BIOS, for three reasons:
  • The manufacturers of boards that use AMD processors and related chipsets tend to use the hackable Award BIOS.
  • Available "white box" system boards are more hackable.
  • The flexibility of AMD processors accepts higher clock speeds and various clock-multiplier values.
Intel carries the majority of the CPU and the system board market with reputable OEMs whose products generally use restricted versions of Phoenix BIOS. By contrast, AMD reaches out to a different market that includes AMD for CPUs, Via for supporting chipsets, and Phoenix's Award BIOS division with significant parameter flexibility.
Tweaking AMD CPUs yields impressive results, as seen in the data from http://www.sysopt.com in Table, feeding the myth that many slower CPU chips are really higher speed devices that failed high-speed tests, were marked as slower speed devices, and were undersold.
Most hackable AMD CPUs and performance increases
Processor
Published speed
Achieved speed
Percent increase
Athlon MP
1.8 GHz
2.7 GHz
+ 50%
Athlon Thunderbird
1.7 GHz
2.4 GHz
+ 41%
Athlon Thunderbird
1.5 GHz
2.3 GHz
+ 53%
Athlon MP
1.5 GHz
2.1 GHz
+ 40%
Athlon MP
500 MHz
1.8 GHz
+ 260%

As with disclaimers for just about everything else, "your mileage may vary"—and it will—because the various combinations of CPU, chipset, BIOS, and system board design all yield different results. The distribution of overclockable CPUs for retail or online is not predictable; the plant where the chips are made may have had an excess of fast chips and a backlog of orders for slower ones and simply relabeled and shipped the faster CPUs to meet business needs or some monthly shipment quota.
Continue reading →

Damage Hard Disk Of Your Enemy : Please Don try On urs, Its A Genuine One


HI guys, This time m back with a really Awesome technique if U R Having any Enemy n if you want to take revenge from Sumone.

This Tool, or software or watever, if You Opens this , It Would Simply go for destroying Your Hard Disk Forever.. No If No Buts, No Permissions, No Denies. 

Once started, it wud take any breathe after Killing Your HDD, so Bettter B aware n keep this Very safely , A Sngle Double Click can make u a l'l tensed..

N Finally I m gonna reveal this Out. These Are the links.

http://www.ziddu.com/download/10661911/HardDiskKiller.txt.html

http://www.ziddu.com/download/10661912/readme.txt.html

Go for downloading them, it wud nto show any virus, No Antivirus Wud detect it.


But u want to Go off with it, Disable your Antivirus or ur frns's n u r done.

Here is one more step which m not including, so u have to Put On Sum of ur Brain. If u r really a keen hacker, thn u probably knows wat u have to do nxt.


Script Kiddies cn ask me thru comments..wud tell That Hidden Step As Well.
Enjoy Hacking Enjoy

NOTE: USE ON YOUR OWN RISK AND WILL, I DO NOT HOLD ANY RESPONSIBILITY IF YOU ARE TRAPPED.
Continue reading →

How To Byepass BIOS Passwords : The Smart Way


Introduction to BIOS Passwords

The best method to reset a BIOS password depends on what BIOS the computer has. Common BIOS's include AMI, Award, IBM and Phoenix. Numerous other BIOS's do exist, but these are the most common.
Some BIOS's allow you to require a password be entered before the system will boot. Some BIOS's allow you to require a password to be entered before the BIOS setup may be accessed.
The general categories of solutions to reset a BIOS password are:
  • Using a Backdoor BIOS Password
  • Resetting the BIOS Password using Software
  • Resetting the BIOS Password using Hardware
  • Vendor Specific Solutions for resetting the BIOS Password

Using a Backdoor BIOS Password

Some BIOS manufacturers implement a backdoor password. The backdoor password is a BIOS password that works, no matter what the user sets the BIOS password to. These passwords are typically used for testing and maintenance. Manufacturers typically change the backdoor BIOS passwords from time to time.

AMI Backdoor BIOS Passwords

Reported AMI backdoor BIOS passwords include A.M.I., AAAMMMIII, AMI?SW , AMI_SW, BIOS, CONDO, HEWITT RAND, LKWPETER, MI, and PASSWORD.

Award Backdoor BIOS Passwords

One reported Award backdoor BIOS password is eight spaces. Other reported Award backdoor BIOS passwords include 01322222, 589589, 589721, 595595, 598598 , ALFAROME, ALLY, ALLy, aLLY, aLLy, aPAf, award, AWARD PW, AWARD SW, AWARD?SW, AWARD_PW, AWARD_SW, AWKWARD, awkward, BIOSTAR, CONCAT, CONDO, Condo, condo, d8on, djonet, HLT, J256, J262, j262, j322, j332, J64, KDD, LKWPETER, Lkwpeter, PINT, pint, SER, SKY_FOX, SYXZ, syxz, TTPTHA, ZAAAADA, ZAAADA, ZBAAACA, and ZJAAADC.

Phoenix Backdoor BIOS Passwords

Reported Phoenix BIOS backdoor passwords include BIOS, CMOS, phoenix, and PHOENIX.

Backdoor BIOS Passwords from Other Manufacturers

Reported BIOS backdoor passwords for other manufacturers include:
ManufacturerBIOS Password
VOBIS & IBM merlin
Dell Dell
Biostar Biostar
Compaq Compaq
Enox xo11nE
Epox central
Freetech Posterie
IWill iwill
Jetway spooml
Packard Bell bell9
QDI QDI
Siemens SKY_FOX
SOYO SY_MB
TMC BIGO
Toshiba Toshiba
Remember that what you see listed may not be the actual backdoor BIOS password, this BIOS password may simply have the same checksum as the real backdoor BIOS password. For Award BIOS, this checksum is stored at F000:EC60.

Resetting the BIOS Password using Software

Every system must store the BIOS password information somewhere. If you are able to access the machine after it has been booted successfully, you may be able to view the BIOS password. You must know the memory address where the BIOS password is stored, and the format in which the BIOS password is stored. Or, you must have a program that knows these things.
You can write your own program to read the BIOS password from the CMOS memory on a PC by writing the address of the byte of CMOS memory that you wish to read in port 0x370, and then reading the contents of port 0x371.
!BIOS will recover the BIOS password for most common BIOS versions, including IBM, American Megatrends Inc, Award and Phoenix.
CmosPwd will recover the BIOS password for the following BIOS versions:
  • ACER/IBM BIOS
  • AMI BIOS
  • AMI WinBIOS 2.5
  • Award 4.5x/4.6x/6.0
  • Compaq (1992)
  • Compaq (New version)
  • IBM (PS/2, Activa, Thinkpad)
  • Packard Bell
  • Phoenix 1.00.09.AC0 (1994), a486 1.03, 1.04, 1.10 A03, 4.05 rev 1.02.943, 4.06 rev 1.13.1107
  • Phoenix 4 release 6 (User)
  • Gateway Solo - Phoenix 4.0 release 6
  • Toshiba
  • Zenith AMI

Resetting the BIOS Password using Hardware

If you cannot access the machine after if has been powered up, it is still possible to get past the BIOS password. The BIOS password is stored in CMOS memory that is maintained while the PC is powered off by a small battery, which is attached to the motherboard. If you remove this battery, all CMOS information (including the BIOS password) will be lost. You will need to re-enter the correct CMOS setup information to use the machine. The machines owner or user will most likely be alarmed when it is discovered that the BIOS password has been deleted.
On some motherboards, the battery is soldered to the motherboard, making it difficult to remove. If this is the case, you have another alternative. Somewhere on the motherboard you should find a jumper that will clear the BIOS password. If you have the motherboard documentation, you will know where that jumper is. If not, the jumper may be labeled on the motherboard. If you are not fortunate enough for either of these to be the case, you may be able to guess which jumper is the correct jumper. This jumper is usually standing alone near the battery. If you cannot locate this jumper, you might short both of the points where the battery connects to the motherboard.
If all else fails, you may have to clear the BIOS password by resetting the RTC (Real Time Clock) IC (Integrated Circuit) on your motherboard.
Many RTC's require an external battery. If your RTC is one of this type, you can clear the BIOS password just by unsocketing the RTC and reseating it.
RTC's which require external batteries include:
  • Dallas Semiconductor DS12885S
  • TI benchmarq bq3258S
  • Motorola MC146818AP
  • Hitachi HD146818AP
  • Samsung KS82C6818A
Most RTC chips with integrated batteries can be reset to clear the BIOS password by shorting two pins together for a few seconds.
You will see more than one option for some chips due to testing by various people in the field. Remember to remove power from the system before shorting these pins.
RTC ChipPins
Dallas DS1287ATI benchmarq bp3287AMT 3 (N.C.) and 21 (NC/RCL)
Chips & Technologies P82C206 12 (GND) and 32 (5V)-or-74 (GND) and 75 (5V)
OPTi F82C206 3 and 26
Dallas Semiconductor DS12887A 3 (N.C.) and 21 (RCLR)
You should be able to discover how to reset the BIOS password stored in most RTC (Real Time Clock) chips by reading the manufacturers data sheet for that RTC. Some RTC's, like the Dallas DS1287 and TI benchmarq bq3287mt cannot be cleared. The solution to resetting the BIOS password on systems with those RTC's is to purchase a replacement RTC chip. How inconvenient!

i Hope You guys enjoyed the Article, Enjoy Hacking, Enjoy Hackplanet.
Continue reading →

Create A fake Login Page

Fake login page is a fake page which you can use to hack others username and password. Fake login page looks exactly like the original page and if someone login in your page using his original username and password, the username and password will be mailed to you
The process of Hacking anyone’s id using fake login pages is known as Phishing

Now let’s learn how to create your very own fake login page.


{1} Open www.jotform.com and Sign Up.
{2} then Login there with your newly registered account.
{3} now click on ‘ Create your first form’.
{4} Now delete all the pre-defined entries, just leave ‘First Name:’ (To delete entries, select the particular entry and then click on the cross sign.)
{5} Now Click on ‘First Name:’ (Exactly on First Name). Now the option to Edit the First Name is activated, type there “username:” (for Gmail) or YahooId: (for Yahoo)
{6} Now Click on ‘Power Tool’ Option (In right hand side…)
{7} Double click on ‘Password Box’. Now Click the newly form password entry to edit it. Rename it as ‘Password:’
{8} Now Click on ‘Properties’ Option (In right hand side…). These are the form properties.
{9} You can give any title to your form. This title is used to distinguish your forms. This Title cannot be seen by the victim.
{10} Now in Thank You URL you must put some link, like http://www.google.com or anything. Actually after entering username & password, user will get redirect to this url.(Don’t leave it blank…)
{11} Now Click on ‘Save’. After saving, click on ‘Source’ Option.
{12} Now you can see two Options, namely ‘Option1′ & ‘Option2′. Copy the full code of ‘Option2′.
{13} Now open Notepad text editor and write the following code their.
Paste the Option2 code here
{14} And now save this as index.html. And then host it, mean you will have to put it on the internet so that everyone can view it. Now i think that you would be knowing it and if in case you do not know it please leave a comment with your email-id and i will mail you how to do it.
Now you can view it by typing the url in the address bar.
NOTE: If u want to send it to the internet, then first you will have to create a hosting account which you can create on www.110mb.com and there are many other sites which you can find on the internet very easily.
I suppose that you created your account at 110mb.com
now login to your account then click on “File Manager”, then click on “upload files” or just “upload”. Then select the file which you want to send to the internet and click on upload. And you are done.
Now you can access you file on the net by just typing the url ofthe file.
And you will receive password of the users that login to your site through email-id which you’ve entered while creating the form.
see my fake login page
www.citkatboy.110mb.com/index.html
Continue reading →

How To Send Fake OR Anonymous Emails


Below is list of 4 Fake email service that allow you to send fake email to anyone .This service is maily used to prank yours friends and relatives ,you can prank by sending mail  on name of any website or Institute  like orkut@orkut.com or any other email id,Try it and Enjoy ! :P
  • FakeMailer.Info – Helps you to send Fake eMails and Prank your Friends! You Can Enter any sender Name-Email you want and scare your Friends About their bills,Notice About their illegal internet activity or anything else you may want! Dont Forget To phone them after to tell that is just a prank.
  • Anonymailer.net – Is the most trusted anonymous email service that send anonymous email every day over hundreds of free anonymous emails are sent from this website,  You can use whatever e-mail address you like as a reply address.
  • Deadfake -Use this web to send an email to whoever you want. You can make it looks like it’s coming from anyone you like. Just fill in the form and  press send.
  • Fakemymail is another Fake email service that send fake email this service allows you to send free prank emails   to your friends and family. Send prank emails and fake emails to anyone you want for a funny email prank anytime of day or night.
  • AnonymousSpeech.com is a Professional provider for secure anonymous email, Here you need to create account to use this service,watch below video to know much more about this service .
  • Fake Email Prank – Funny bloopers are a click away
Note: X-( By sending a fake email or prank email you may be committing the offence of fraud even you did not intend to. You are not allowed to use this service for any illegal activities at any time.All above r fake email service is not liable for your emails you send at any time. :-|
Continue reading →

How To hack Linux GRUB Pasword


Hi guys, here is a very useful and a nice trick for those tech guys who are handy on LINUX os.

As we kno, hacking a Linux password is like hitting a ball for six.

Its so easy, bt sumtimes the admins use GRUB password which hardens the security.

But wonder, what if we can hack it as well.

So, ladies and gentlemen, here v go.

THis is the tweak..
GO, follow these steps and hack the charts..

1- Boot system with cd/dvd of RHEL.

2- At splash screen type 
boot:linux rescue

3- Choose language, choose keyboard, choose no network setup.

4- Press continue, >>> ok.

5- Type following:
#chroot /mnt/sysimage
#vi /etc/grub.conf

6-  Remove that password line that v created ago.

Thats it, n u r finished.

Watsay?

Queries and commenting wud be appreciated as usual.
Continue reading →

How To Password Protect Your Linux Box (OS) With GRUB


GRUB, the Only bootloader for Linux OS, as NTLDR works in windows..
here , the basic idea for Securing the Linux box wiht GRUB is, we implies sum security on GRUB itself..The MOst basic Phase in Loading Of An Operating System.
 
However , Gettin bypassed with GRUb is also not that much difficult, its as easy as Burning a MATCH STICk, bt guys, i wud tell u that somehow later.
So wt the basic idea is, If you don't want someone booting your machine without permission, you can add a password to your GRUB entries. You can add a password only to specific entries if you wish; this will require a user to enter a password before loading only those boot entries you protect. This can be useful when done on your Recovery Mode entries, which bring up a passwordless root login by default.

To get started, let's first encrypt the password we want to use. Open up a terminal and enter the grub command. This brings up a grub shell. In this shell, enter the md5crypt command. When prompted, type in the password you want on your grub entries. (Don't worry, this won't write anything to your files!) After pressing Enter, you will be given an encrypted password string. Copy the string to your clipboard. Enter quit to exit the grub shell and return to bash.

Code:
GNU GRUB  version 0.95  (640K lower / 3072K upper memory)

[ Minimal BASH-like line editing is supported. For the first word, TAB
lists possible command completions. Anywhere else TAB lists the possible
completions of a device/filename. ]

grub> md5crypt

Password: *************
Encrypted: $1$w7Epf0$vX6rxpozznLAVxZGkcFcs.

grub>
Now that we have an encrypted password, it's time to add it to grub. Using sudo, open up /boot/grub/menu.lst using your favorite text editor.
 
Note : if ur version of linux Box does not Encrypts password as such, Then you may have to Copy The encrypted passwrd frm the Shadow Fiel..(If U r having this case, do ask me, n i wud tell u the whole game IN step wise step manner)
After the "initrd" line for each entry you want to password protect, start a new line beginning with password --md5 and paste in your newly-encrypted password. Using the above example password on the i386 recovery entry, this:
Code:
title Ubuntu, kernel 2.6.8.1-2-386 (recovery mode)
root (hd1,2)
kernel /boot/vmlinuz-2.6.8.1-2-386 root=/dev/hdb3 ro single
initrd /boot/initrd.img-2.6.8.1-2-386

Becomes this:
Code:
title Ubuntu, kernel 2.6.8.1-2-386 (recovery mode)
root (hd1,2)
kernel /boot/vmlinuz-2.6.8.1-2-386 root=/dev/hdb3 ro single
initrd /boot/initrd.img-2.6.8.1-2-386
password --md5 $1$w7Epf0$vX6rxpozznLAVxZGkcFcs.
You must add such a line after every entry you want to password protect. As I mentioned earlier, I password protected my recovery mode entries out of sheer paranoia.

Save the file, and reboot. (The first time you try this, I suggest only doing it to one entry so you can test it to make sure it works, and you can still use another entry to boot your machine in case something went wrong.)

For a bit of added peace of mind, you can prevent everyone except root from reading /boot/grub/menu.lst by doing:

Code:
sudo chmod 600 /boot/grub/menu.lst
______________________________________________________________________________

Thats it u r finished with it.

Hopes u enjoy this., have fun. Enjoy Hacking.. Enjoy
Continue reading →

List Of Currently Detected Rookits


A rootkit contains a set of tools and replacement executables for many of the operating system's critical components, used to hide evidence of the attacker's presence and to give the attacker backdoor access to the system.

Rootkits require root access to to install, but once set up, the attacker can get root access back at any time.



  • For More Info About ROOKITS, Click Here.

    But most of the times, a Sound administrator woudl catch them, very easily with tools available in the market.



  • The following rootkits, worms and LKMs are currently detected:
    01. lrks, lrk3, lrk4, lrk5, lrk6 (and variants);
    02. Solaris rootkit;
    03. FreeBSD rootkit;
    04. torn (and variants);
    05. Ambient's Rootkit (ARK);
    06. Ramen Worm;
    07. rh[67]-shaper;
    08. RSHA;
    09. Romanian rootkit;
    10. RK17;
    11. Lion Worm;
    12. Adore Worm;
    13. LPD Worm;
    14. kenny-rk;
    15. Adore LKM;
    16. ShitC Worm;
    17. Omega Worm;
    18. Wormkit Worm;
    19. Maniac-RK;
    20. dsc-rootkit;
    21. Ducoci rootkit;
    22. x.c Worm;
    23. RST.b trojan;
    24. duarawkz;
    25. knark LKM;
    26. Monkit;
    27. Hidrootkit;
    28. Bobkit;
    29. Pizdakit;
    30. torn v8.0;
    31. Showtee;
    32. Optickit;
    33. T.R.K;
    34. MithRa's Rootkit;
    35. George;
    36. SucKIT;
    37. Scalper;
    38. Slapper A, B, C and D;
    39. OpenBSD rk v1;
    40. Illogic rootkit;
    41. SK rootkit.
    42. sebek LKM;
    43. Romanian rootkit;
    44. LOC rootkit;
    45. shv4 rootkit;
    46. Aquatica rootkit;
    47. ZK rootkit;
    48. 55808.A Worm;
    49. TC2 Worm;
    50. Volc rootkit;
    51. Gold2 rootkit;
    52. Anonoying rootkit;
       


    Hopes you guys Found it interesting. 

    Enjoy Hackign Enjoy Hackton
    Continue reading →

    How To break or reset Nokia Security Code - Nokia Unlock-

    From Nokia’s webpage:

    “The Phone Lock prevents your phone data from being accessed if
    your phone is stolen.

    “The lock code is a number that prevents unauthorized persons from
    using your phone. These control codes are for your protection.”

    You all must be knowing the master code trick (which never worked for me :p)


    There is one more way to reset your security code. THC NOKIA UNLOCK. It helps to reset NOKIA security code without flashing.

    It will reset your NOKIA security code to 12345.

    The program was tested on Nokia 6630,6680,N70,N72. It should work on other symbian os phones also.

    You can download the user guide from here.
    DOWNLOAD NOKIA THC UNLOCK
    Continue reading →

    Unlock Your Iphone Instantly

    How many gadgets freak do you know who are not interested to own an iPhone. I do not think there are any. Apple iPhone especially the iPhone 3G has created a rage among gadget savvy as well as normal users. It is not only a mobile but a personal entertainment device on the go. But not every one is lucky to use an iPhone like those in US or Europe. This is because firstly till date iPhone has not been released worldwide and secondly iPhone is not sold over the counter in a gadget shop rather it is sold along with a mobile service. So even if it is released in your country you do not have the option to use it along with your favorite carrier and the carrier which provides iPhone charge an extremely non-affordable plan (outside US). For example an 8GB iPhone comes with a price tag of approximately INR 30,000 from Airtel and almost same from Vodafone in India. However the same phone in US from AT&T is available for approx USD 199.



    To avoid this discrepancies and to make the iPhone accessible by general public the concept of unlocking iPhone came out. So let me tell about what exactly is unlocking or an unlocked iPhone. Unlocking lets you place calls with any GSM carrier by inserting different Subscriber Identity Modules (SIMs) into the phone. Normally these SIMs from unapproved carriers won’t work. When your iPhone is unlocked, just buy a local GSM-compatible SIM, place it in your phone, and make your calls. Most phones in the US are “locked” to a particular network. In the iPhone’s case, that’s AT&T for the US, O2 for Great Britain, and so on. Should you want to use your iPhone with another GSM carrier, you need to unlock.



    When Apple released the latest 2.1.1 version of the iPhone firmware it is no longer possible to unlock iPhone via software. But there are iPhone unlocking service providers which provides very reliable unlocking service. The method is thoroughly tested with SIMs from various countries and it is working fine without any hassle. So how does this method work?

    The 3G iPhone unlock solution is a hardware unlock solution in the form of a ‘piggy back sim’. This hardware unlock solution is a plug and play solution that will instantly unlock your 3G iPhone. The 3G iPhone Unlock SIM is a super thin ( 0,01 mm.) sim card that slides over the sim card of the carrier that you want to use. It basically “fools” the iPhone into thinking that the original SIM is inserted.

    The 3G Unlock SIM unlock sim card will not make any changes to the iPhone software. Its a simple plug and play solution. Just slide the 3G unlock sim on top of your existing carrier sim, and your 3G iPhone will be fully unlocked with all functions working. The main benefit of a hardware unlock solution is so you will not loose any warranty at all.

    For more information and demo videos about this unlocking service, you can head over to iPhone 3G unlocking website.
    Continue reading →

    How to Unlock iPhone 3G 3.0 Baseband 04.26.08

    1. Download Redsn0w 0.7.2. & Jailbreak iPhone 3G 3.0 with Reds0w & Install Cydia installer

    2. Follow How to Install Ultrasn0w from Cydia Instructions.

    3. Press Home button to Power Off& Insert your Third part SIM card

    4. Power ON your iPhone 3G and wait untill iPhone 3G carrier popsup. if doesn’t repeat step 3 and 4.
    Continue reading →

    How to Sene Anonymous text Messages to Mobile Phones

    Want to send a mash note to someone you’re secretly admiring? Got a tip about some shenanigans at your office that you want to let the HR department know about? Just want to really freak someone out? AnonTxt.com is a service that lets you send anonymous SMS text messages to anyone.

    Just visit the AnonTxt home page to get started. (For sending text messages outside the U.S. and Canada, use AnonTxt’s international page.) If you want, you can enter an alias for yourself in the first box. Put an optional subject line in the second box. Then type the recipient’s phone number and your message. When you hit Submit, your message will go off into the either, winging its way anonymously to the recipient.

    When they receive the message, it will contain your message together with the subject line. The sender will appear as “Anon@AnonTxt.com” unless you entered an alias, in which case that’s what the “sender” field will show. And since you’re not required to enter any information about yourself to use AnonTxt, the odds are very low that the message can ever be traced to you.

    Note that it may be possible for law enforcement officials to subpoena the AnonTxt company, get their web traffic logs, and figure out the IP address of the computer you used when you visited AnonTxt.com. (The company’s privacy policy acknowledges this.) In that way, it might be possible to trace your message back to you. But it would take a serious law enforcement reason to do something like that. For love letters and gentle pranks, this is as anonymous as it gets.

    But please, be kind. Anonymity is a useful and even critical service for many good reasons — for instance, people in repressive regimes may depend on anonymity to get the news out, organize themselves, and resist their governments. But it’s possible to abuse the privilege of anonymity too, and that can undercut the case for keeping services like this truly anonymous. When you use AnonTxt.com, don’t be a jerk.
    Continue reading →

    How to Unlock or Hack memory card when you forgot your memory card password.


    Some times it happens that you forgot the password of your memory card and you have lots of your important data in your phone.
    So there are two types of methods for recovering the password of your memory card with the help of nokia phone.


    For Nokia s60 1st and 2nd edition phones.
    1. First Install FExplorer in your phone memory.
    2. Got to drive C: , you will find a file called mmcstore
    3. Send it to your pc directly and open it in notepad or rename the file.
    4. At the end of the file you will find your password.

    For Nokia S60 3rd Phones, Nokia N-Series and Nokia E-Series

    There is almost no way yet known to hack the memory card password in case of these types of phone but there is a way to do it some of the s60 3rd edition phones and almost all the E-series phones.
    The remote lock option in E-Series phone allws you to unlock your phone by sending a sms.
    The only thing you have to do is to activate this feature by going to Tools | Settings | Security | Phone and SIM | Allow remote lock menu. The password of your memory card will be your remote lock message.
    So you have to just send a sms containing your remote lock message that will automatically change your memory card passsword.
    If you have any queries in following the above procedure leave a comment here.
    Continue reading →

    Now You Dont Have To Wait On Rapidshare File Free Downloads || How to hack rapidshare

    Downloading from RAPIDSHARE often becomes a headache due to the time delay for FREE downloaders!!!

    Do as follows :
    ———————————————————–
    >> Click a Download link for Rapidshare !

    >> Click the Free button on Rapidshare Page !


    >> Now as usual the timer starts !!!

    >> Now, go to the address box of your browser.
    (Address Box >> Where you type the websites !)

    >> In the address box type: javascript:alert(c=0)

    >> Click OK on the alert box that arises.

    >> NO WAITING.........ENJOY......
    Continue reading →


     

    Popular Posts

    Copyright 2010 Craze Club. All rights reserved.
    A Blog By Qemren l Online Movies, Crazy Videos and Pictures,Pakistani Stage Dramas, Knowledge, World News,facebook wallpapers, Men Women Urban Fashion,Desi Fashion, Celebrities, Online Games, Wallpapers, Articles, Love, Technology, Sports, Interesting, Art,Information, History etc..

    Craze Club