Thursday, March 22, 2012

BALANCE HACKING AND GPRS MOBILE TIPS AND TRICS

GPRS MOBILE AND BALANCE HACKING
HOW ARE YOU? 
1.Mobile balance hacking
To download this software from your mobile open http://wap.mobiletoones.com website on your mobile and enter 13057 WAP code
FREE GPRS: Airtel Mobile Hack:-
link for free mobile balance hacking software:-  Click to Download

2.IDEA BALANCE TRANSFER TRICK:-
Idea Balance Transfering Trick
: Dial
*567*(Mobile No.)*(Transfer Balance)#
Then Press Call Button

3.How to activate Airtel free gprs:-

airtel free gprs hacking
1) Activate Airtel Live

2)Create TWO Airtel GPRS data accounts  and select the
FIRST as the active profile.

3) Connect your mobile to the PC  or Laptop and install the driver for
your mobile’s modem.

4) Create a new dial-up connection using the NEW CONNECTION
WIZARD as follows

Connecting Device :  Your mobile’s modem
ISP Name :  Airtel or anything you like
Phone Number : *99***2#
Username and Password : blank

5) Configure your browser and download manager to use the proxy
100.1.200.99 and port 8080.

6) Connect to the dial-up account. You will be connected at 115.2
kbps (but remember, that is a bad joke).

7) Pick up your mobile and try to access any site. You will get “Access
Denied…”(except for Airtel Live!).

8 ) On the PC or Laptop open your browser, enter any address ,
press ENTER and…….WAIT

9) After a few seconds the page will start to load and you will be able to acess free Gprs.
Advice:-My advice is to use Opera since you can browse both wap and regular websites

Who are Hacker

itially, the term hacker or hackers was coined for those talented computer programmers who could solve almost any problem very fast. They were innovative, following unconventional means. But today, the term is more synonymous for those programmers, who break into the computers of other people, or even a big organization or a company, to steal information. They can also create a virus. So, who are hackers actually? Read on to find out.
Open of the common traits found among hackers is a strong sense of curiosity that sometimes turns into an obsession. A hacker often takes pride in his ability to develop new programs, as well have the ability to crack and understand other systems and how they work. Often, when a code or programming didn’t work properly, the hackers could create and place small sections of code at the right places to fix the issues.
Technically, hackers break into computers and their networks. They can be motivated by several reasons like, challenge, thrill, or money. Although they were often referred to as the computer underground earlier , but today they are more openly accepted. They need not break into a computer with a malicious motive, sometime, their services are important and required for the safety of an organization.

Let us round up the different activates of hackers as below:
  • He loves to explore the details of programmable systems and how to enhance their capabilities
  • He is an enthusiastic programmer and very good at  programming
  • He is an  expert at a particular program
  • He is an  enthusiast of any kind, for example one may enjoy begin just an astronomy hacker
  • He enjoys the intellectual challenge of overcoming limitations.

  • The main tools for the hackers are mainly his intellect and the computer code. There are relatively a very small number of hackers who actually program code when compared to the large community of hackers online. You will come across hundreds of programs used by the hackers to explore computers and networks. Once hacker knows how the system of an organization works, he can devise programs to break into it.

    CAREER IN PROFESSIONAL HACKER

    how to smart professional hacker
    how are you all
    today subject: how to smart professional havker
     Hi friends, Like others I will not talk about going to launch a magazine, please subscribe this, In the world of computer and Internet i will not make a plan to sell a paper made magazine. I am very angry with people who call themselves hacker, even they don't know coding, Everyone is a hacker who can exploit something. I will not say i have created a hacking videos toolkit, this is awesome and available at discounted prizes for some days, Making people fool before first April is not my hobby. I will not use mumbai terrorist attack photos to get traffic,I will not promote a worst product to earn affiliate commission, or write a paid review about a product or company.
    Don't you people think all this is sucking and you are fed up with all this.
       I'll disclose only secrets that no one disclose. Not in this post but in my next post, truth about the security and hacking business.
     I got a lot of questions from my readers that they worked hard on Internet to get deep knowledge about hacking and  security but don't have a certification in hacking. They worked hard but unable to find which job profile suit them best.First of all if you talk about working in a security firm as a professional hacker, you need to know how to become a professional hacker.
    There are some steps to do this--
    (1) Need a mindset/premindset to exploit things even its a human mind, computer or electric appliance
    (2) Sound knowledge of operating systems, application software, Internet and hardware
    (3) Every wanna be professional hacker should be perfect in at least one programming language
    (4) They should have basic knowledge of networking, routers and servers.
    (5) Knowledge of database management is must
    (6) knowledge of One web designing language and one server side srcipting language.
    (7) CEH certificate or a local vendor certification can also work.
    (8) Over confident, Rude behaviour and Attitude, use of abusive words can help you finding a good job( Ha...Ha...Ha)

    If you have these seven things no one can stop you  becoming a hacker, now your skills depends on your hard work but when you are going to join a organization as a professional hacker or security expert these basic things are needed, other professional techniques you will learn in the company's training room only.At that place a hardcore hacker get to know he knows nothing about hacking.
    Now the question comes in which field i can make my career. Here i want to present an example, some of my friends was good in electronics, but at the time they was going to take admission in B.Tech they thought It market is growing day by day, providing attractive salary packages and have a glamours career. So they took computers and now you can understand in which situation they are living....Jobless, Hopeless and aimless.
    So friends never study subject in demand, study which you find interesting.
    (1) If you work good as a web developer , make yourself perfect in that type of hacking techniques.
    (2) If programming, take a move to pen-testing
    (3) If networking, take a move to network security
    (4) If you feel you can hack human minds easily, go to social engineering
    (5) Having security approach in your mind can also make you a good programmer
    (6) If you are operating system worm, that can make you system security engineer
    (7) Other than that if your area of interest are mobile, bluetooth or voip they also have a hot career.
    SOURCE: http://www.hacktheworld.in

    EASY HACKING WINDOWS

    windows hacking trix
    how are you all?
    This post is about an interesting hack to bypass the login passwords in Windows. Application of this hack will result in Windows logging you on everytime as a certain user Follow the steps mentioned below to apply this trick
    • Click Start -> Run.
    • Type Control userpasswords2
    • Press Enter.
    • Click to uncheck the box labelled ‘ Users must enter a user name and password to use this computer’.
    • Press OK.
    • Enter the username and password in the box that appears.

    please coment

    browser hacking

    browser hackng and google chorme
     you can use one of the extensions that function displays the download button when opening one of the youtube video page on the site.
    The extension name is Chrome Youtube Downloader. Use with the following steps :
    1. Open Google Chrome
    2. Visit ChromeExtensions.org to install Chrome Youtube Downloader
    3. Then click the Add button to Chrome to install on the browser Chrome / Chromium you use. The button is in the upper right (which signs +)
    4. After successful installation, you will be taken on the settings page. Just select ‘Classic Download’ on the Style Button option.
    5. Visit Youtube video page (which you want to download of course). It would appear the button to download that is located below the box. If the button is not appear, playing the video ‘streaming’ for the firt time. I’ll definitely button will appear. just click the download button to download the video immediately.
    In the list that appears when you click the download button, please select the quality / type / format of the video you want. Then wait for the download to complete
    THANK TOU FOR VISIT
    please coment this artcle.

    how to bluetooth hacking

    bluetooth hacking
    hacking bluetooth easy and easy see down
    1.) BlueScanner: BlueScanner searches out for Bluetooth-enabled devices. It will try to extract as much information as possible for each newly discovered device.
    2.)BlueSniff: BlueSniff is a GUI-based utility for finding discoverable and hidden Bluetooth-enabled devices.
     3.) BTBrowser: Bluetooth Browser is a J2ME application that can browse and explore the technical specification of surrounding Bluetooth-enabled devices. You can browse device information and all supported profiles and service records of each device. BTBrowser works on phones that supports JSR-82 – the Java Bluetooth specification. .
    4.) BTCrawler: BTCrawler is a scanner for Windows Mobile based devices. It scans for other devices in range and performs service query. It implements the BlueJacking and BlueSnarfing attacks.
    5.) BlueBugger: BlueBugger exploits the BlueBug vulnerability. BlueBug is the name of a set of Bluetooth security holes found in some Bluetooth-enabled mobile phones. By exploiting those vulnerabilities, one can gain an unauthorized access to the phone-book, calls lists and other private information..
    6.) CIHWB: Can I Hack With Bluetooth (CIHWB) is a Bluetooth security auditing framework for Windows Mobile 2005. Currently it only support some Bluetooth exploits and tools like BlueSnarf, BlueJack, and some DoS attacks. Should work on any PocketPC with the Microsoft Bluetooth stack.
    7.) Bluediving: Bluediving is a Bluetooth penetration testing suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, has features such as Bluetooth address spoofing, an AT and a RFCOMM socket shell and implements tools like carwhisperer, bss, L2CAP packetgenerator, L2CAP connection resetter, RFCOMM scanner and greenplaque scanning mode..
    8.) Transient Bluetooth Environment Auditor: T-BEAR is a security-auditing platform for Bluetooth-enabled devices. The platform consists of Bluetooth discovery tools, sniffing tools and various cracking tools.
    9.) Bluesnarfer: Bluesnarfer will download the phone-book of any mobile device vulnerable to Bluesnarfing. Bluesnarfing is a serious security flow discovered in several Bluetooth-enabled mobile phones. If a mobile phone is vulnerable, it is possible to connect to the phone without alerting the owner, and gain access to restricted portions of the stored data.
    10.) BTcrack: BTCrack is a Bluetooth Pass phrase (PIN) cracking tool. BTCrack aims to reconstruct the Passkey and the Link key from captured Pairing exchanges.
    11.) Blooover II: Blooover II is a J2ME-based auditing tool. It is intended to serve as an auditing tool to check whether a mobile phone is vulnerable.
    12.) BlueTest: BlueTest is a Perl script designed to do data extraction from vulnerable Bluetooth-enabled devices.
    13.) BTAudit: BTAudit is a set of programs and scripts for auditing Bluetooth-enabled