Monday, May 23, 2011

32 hacks and secrets of nokia cell phones

These Nokia codes will work on most Nokia Mobile Phones:

(1) *3370# Activate Enhanced Full Rate Codec (EFR) - Your phone uses the best
sound quality but talk time is reduced usually approx. 5%

(2) #3370# Deactivate Enhanced Full Rate Codec (EFR) OR *3370# ( F avourite )

(3) *#4720# Activate Half Rate Codec - Your phone uses a lower quality sound but you
should gain approx 30% more Talk Time.

(4) *#4720# Deactivate Half Rate Codec.

(5) *#0000# Displays your phones software version, 1st Line : Software Version, 2nd
Line : Software Release Date, 3rd Line : Compression Type. ( Favourite )

(6) *#9999# Phones software version if *#0000# does not work.

(7) *#06# For checking the International Mobile Equipment Identity (IMEI Number).
( Favourite )

(8) #pw+1234567890+1# Provider Lock Status. (use the "*" button to obtain the "p,w"
and "+" symbols).

(9) #pw+1234567890+2# Network Lock Status. (use the "*" button to obtain the "p,w"
and "+" symbols).

(10) #pw+1234567890+3# Country Lock Status. (use the "*" button to obtain the "p,w"
and "+" symbols).

(11) #pw+1234567890+4# SIM Card Lock Status. (use the "*" button to obtain the "p,w"
and "+" symbols).

(12) *#147# (vodafone) this lets you know who called you last.

(13) *#1471# Last call (Only vodofone).

(14) *#21# Allows you to check the number that "All Calls" are diverted to

(15) *#2640# Displays security code in use.

(16) *#30# Lets you see the private number.

(17) *#43# Allows you to check the "Call Waiting" status of your phone.

(18) *#61# Allows you to check the number that "On No Reply" calls are diverted to.

(19) *#62# Allows you to check the number that "Divert If Unreachable
(no service)" calls are diverted to.

20) *#67# Allows you to check the number that "On Busy Calls" are diverted to.

(21) *#67705646# Removes operator logo on 3310 & 3330.

(22) *#73# Reset phone timers and game scores.

(23) *#746025625# Displays the SIM Clock status, if your phone supports this power
saving feature "SIM Clock Stop Allowed", it means you will get the best standby
time possible.

(24) *#7760# Manufactures code.

(25) *#7780# Restore factory settings.

(26) *#8110# Software version for the nokia 8110.

(27) *#92702689# Displays - 1.Serial Number, 2.Date Made, 3.Purchase Date, 4.Date of
last repair (0000 for no repairs), 5.Transfer User Data. To exit this mode you
need to switch your phone off then on again. ( Favourite )

(28) *#94870345123456789# Deactivate the PWM-Mem.

(29) **21*number# Turn on "All Calls" diverting to the phone number entered.

(30) **61*number# Turn on "No Reply" diverting to the phone number entered.

(31) **67*number# Turn on "On Busy" diverting to the phone number entered.

(32) 12345 This is the default security code.

Thursday, May 12, 2011

Free Tools For Spyware Removal

There are lot of PC users who know only little about “Spyware”, “Malware”, “hijackers”, “Dialers” & many more. This article will help you avoid pop-ups, spammers and all those baddies.

What is spy-ware? 
Spyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user’s interaction with the computer, without the user’s informed consent.The term spyware suggests software that secretly monitors the user’s behavior.Spyware programs can collect various types of personal information, such as Internet surfing habit, sites that have been visited etc.

How to check if a program has spyware?
It is this little site that keeps a database of programs that are known to install spyware.
Check Out: SpywareGuide
How To Block Pop-Ups? 
If you would like to block pop-ups (IE Pop-ups) there are tons of different tools out there, but these are the two best, I think.
 Google Toolbar - This tool is a Freeware.
 AdMuncher – This tool is a Shareware.

How To Remove Spywares?
If you want to remove spwares then you may try the following tools/programs :
 Lavasoft Ad-Aware - This tool is a freeware. 
Info: Ad-aware is a multi spyware removal utility, that scans your memory, registry and hard drives for known spyware components and lets you remove them. The included backup-manager lets you reinstall a backup, offers and multi language support.
 Spybot-S&D – This tool is a freeware.
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. Blocks ActiveX downloads, tracking cookies and other threats. Over 10,000 detection files and entries. Provides detailed information about found problems.
 Spy Sweeper - This tool is a shareware. 
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer.The best scanner out there, and updated all the time.
 BPS Spyware and Adware Remover – This tool is a shareware.
Info: Adware, spyware, trackware and big brotherware removal utility with multi-language support. It scans your memory, registry and drives for known spyware and lets you remove them. Displays a list and lets you select the items you’d like to remove.
How To Prevent Spyware?
To prevent spyware attack you can try the following tools.

SpywareBlaster - This tool is a freeware.
Note: SpywareBlaster doesn’t scan and clean for so-called spyware, but prevents it from being installed in the first place. It achieves this by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage. 

XP-AntiSpy - This tool is a freeware. 

Note: XP-AntiSpy is a small utility to quickly disable some built-in update and authentication features in WindowsXP that may rise security or privacy concerns in some people 

Monday, May 9, 2011

Gmail Hacking By Phishing (Phisher Included)

This much awaited article will tell you,"How to hack Email account using smart Phishing Techniques". Most of the people think that phishing is a very common technique and anyone can detect it. But doing it in smart way makes it 100% undetectable and the victim falls in the trap easily. Also why I haven't explained this with earlier post ie How to hack an Email Account because this Hack is specific for specific website means you need specific phisher for each website and also you have to take care about creating your account on web hosting accordingly. So guys If you want to learn how to hack Gmail Account Password then gear up yourself for awesome hacking experience.

Things that you will need for hacking Gmail Account Password:
1. Gmail Phisher (included)
2. Free Web hosting Site (as the name suggests, its free)
3. Little bit of manual Work (you can do that)

Introduction to Phishing

If you know little bit of hacking then you must be knowing about Phishing that is, What is Phishing and how it works and most important, How you can protect yourself from getting into the Trap. I will try to explain all of these in my article.

First of all, What are Phish pages and what is phishing? Phish pages are basically the fake pages or virtual pages that looks similar to the original website page. The only difference is the batch program running in the background i.e Original Webpage sends requests to Gmail server while Phish Page sends request to hacker's php server. Now Phishing is a password hacking technique commonly used by hackers using phish pages that looks similar to original web page. The only difference is the URL in the address bar so Guys One Important Tip for you all always check the Address bar while going to any website.

Now, What is Smart Phishing?
Normal phishing page sends the password to hacker but it doesn't redirects the page to original website but smart phishing does. Means victim can never know what really happened and his account is got hacked. He will only think that he has entered the wrong password as in second attempt the web page is original and he will be able to login and the most fantastic thing is that the original redirected page has username already entered in it that makes it even smarter. Now lets come to how it works? When a user types a Username and Password in the the text box, the info is sent to "login.php" which acts as a password logger and redirects the page to "LoginFrame2.htm" which shows "There has been a temporary error Please Try Again" in it . So when the person clicks on try again it redirects to the actual URL so that the victim does not know that your site is a fake site and gets his password hacked.


  1. First of all download the Gmail Phisher. by
  2. Extract the rar file now you will get three files as given below:
    • gmail.html
    • log.txt
    • mail.php
  3. Upload all the three files to any of the free Web hosting server. Remember while creating the account on these servers try the username as nearer as possible to the original URL like mail.gmaile or maile.gmall etc. As its the most crucial step. Some Free Web hosting servers are given below you can also find few more for yourself.

    Note: Get more and more free hosting site at
  4. Once you have uploaded all the three files to web hosting server now you have to send these ( ) to your victim. This is the most important step regarding smart phishing technique.

    Most People use same password for orkut and gmail and here is the main hack lies. What you have to do you have to send the HTML email to the victim which looks similar to the Orkut scrap to his email you can easily do this using simple editing to the existing mail. Just you have to change the link with your phish link and content according to the person likings so that he will surely come inside the trap. Also, you can try changing the URL by going to and change your long URL to short type.

    Another technique is that you can send him a request to join a particular community in the format orkut does. And last but the most important one send him mail from Gmail Admin such that "We have seen illegal activity from your account and you need to verify your account and your account is temporarily disabled after this login. To unlock your account Verify your Email and in that link put your Phish link. Now, you all now know how it works. If you want to protect yourself its must that you should know what techniques a hacker can use to hack your Gmail Account.
  5. Now After sending phisher to victim, once the user logs in to his Gmail account using your Phisher, his user ID and password are ours..And these are stored in log.txt What you have to do is just refresh your Web hosting account files.
  6. Your log.txt file will contain the passwords and will look like this :

Thats all, now you have hacked the password of victim. I hope you all have liked it.

You can see a phishing page created by me here at . Use internet explorer for best results.
How to protect your Gmail Account from a Phisher?
1. Always check the URL in the address bar before entering username and password.
2. Never follow any link from your email and any website until u have confirmed the Address bar URL.
3. Never follow spam mails and "Win lottery or Cash" mails.
If you have any queries ask me in comments... Enjoy and have Happy hacking.

Wednesday, May 4, 2011

Cell Phone Lookup: How to Do a Reverse Cell Phone Lookup

A Reverse Cell Phone Lookup is simply a process of finding someone’s personal details such as name, age, address and related information by using their cell phone number. At times it becomes necessary for us to start investigating on someone to know their personal details. The reason for this can be many – Some people may go for a cell phone lookup in order to locate their old friends, some to investigate the prank calls or to trace a suspicious number.

There exists a lot of websites on the Internet that offer reverse cell phone search, some claim to be free while others ask you a small fee for the subscription. There also exists a few directories that provide access to both landline and cell phone numbers thereby providing an all-in-one lookup service.

Since most people wish to access this information for free, they go in search of those websites which provide the reverse cell phone lookup service for free. Most scam websites take up this tendency of people as an added advantage and try to attract more and more visitors by promising them to provide the search service at a free of cost. In reality, the visitors of these websites may pick up malware programs like viruses and trojans. So you should be very careful not to visit any of such websites unless you are 100% confident about their legitimacy. Hence, in order to do a reverse cell phone lookup, you need to find a trusted website/directory service that provide information which is accurate and authentic.

Even though there is no national cell phone lookup directory available in United States due to various privacy concerns, there are still a number of top quality directories used by various private detectives, journalists and those who are in need to spy on their cheating spouse or children. These companies invest a lot of time and financial resources in gathering mobile phone and landline numbers by using both private and public sources, as well as major cell phone carrier restricted databases.

Thus by using this service it becomes just a cakewalk for anyone to find the details associated with any phone number whether it be a cell phone or a landline. The entire process of finding someone by cellphone number is very straightforward – all you need to do is just enter the phone number that you want to trace down and hit the “Search” button. You will be able to instantly view the information such as the phone owner’s name, age, mobile provider, billing address, previous addresses and more.

I recommend the following cell phone directory to search both mobile & landline and listed/unlisted residential numbers. The site is completely safe and uses a 128-bit secured access to maintain 100% privacy of the uses. All searches remains private and anonymous. Click on the following link to gain access now!

Phone Number Scan

NOTE: This works only for Unites States telephone numbers (landline and Mobile)

Monday, May 2, 2011

How to Trace Mobile Numbers

With the rapid growth of mobile phone usage in recent years, we have often observed that the mobile phone has become a part of many illegal and criminal activities. So in most cases, tracing the mobile number becomes a vital part of the investigation process. Also sometimes we just want to trace a mobile number for reasons like annoying prank calls, blackmails, unknown number in a missed call list or similar.

Even though it is not possible to trace the number back to the caller, it is possible to trace it to the location of the caller and also find the network operator. Just have a look at this page on tracing Indian mobile numbers from Wikipedia. Using the information provided on this page, it is possible to certainly trace any mobile number from India and find out the location (state/city) and network operator (mobile operator) of the caller. All you need for this is only the first 4-digit of the mobile number. In this Wiki page you will find all the mobile number series listed in a nice tabular column where they are categorized based on mobile operator and the zone (state/city). This Wiki page is updated regularly so as to provide up-to-date information on newly added mobile number series and operators. I have used this page many a time and have never been disappointed.

If you would like to use a simpler interface where in you can just enter the target mobile number and trace the desired details, you can try this link from Numbering Plans. Using this link, you can trace any number in the world.

By using the information in this article, you can only know “where” the call is from and not “who” the caller is. Only the mobile operator is able to tell you ”who” the caller is. So if you’re in an emergency and need to find out the actual person behind the call, I would recommend that you file a complaint and take the help of police. I hope this information has helped you!