Welcome To The Hacker Club 4U

On This Blog Now You can get knowledge about how to to do hacking and also Know how to prevent from hacking and know many tips And tricks of computer and internet

Hacking

Click Here To Know Many Tricks and Tips Of HACKING facebook,twitter and other accounts and passwords

Hacking Safety And Security

Click Here to know how to protect your computer and inetrnet from hacking and know hacking safety and security tips and tricks

Facebook And Twitter

Click On Picture For TWITTER And Click On This Tittle For FACEBOOK .Hacking And Security Tips Of facebook and twitter.Know how to byepass facebook login and twitter login

Gmail And Yahoo

Click On Above Picture For GMAIL Hacking And Security Tips . And.Click On This Title For YAHOO Hacking and security tips


Showing posts with label Mobile. Show all posts
Showing posts with label Mobile. Show all posts

EASY TO SEND FAKE SMS TO ALL NUMBER

Yes, Spoofing SMS is a simple step to send a message anonymously using a fake phone number or the number belongs to someone else to anyone. With spoofing SMS you can send SMS to HP using the phone number to anyone.

Actually there is no special trick to run Spoofing SMS. In this way, we only use the service company who forgot to send free SMS includes SMS sender ID. So, this one allows us to send SMS from any number to any number.

SMS spoofing features:

a. Capable of sending fake SMS
b. 100% anonymous messages are
c. Sending message to world network

To run it:
A. First of all, register here.
2. After registration, you will get 25 free SMS quota which means you can send just 25 SMS free from any number to any number. In order to obtain additional quota and use them later, you need to register again with a new ID.
Also Read How To Send Free SMS From Facebook




PLEASE CLICK ON BELOW BUTTON FIRST

TAKE ADVANTAGE OF FREE SMS FEATURE VIA FACEBOOK

Facebook fever have mushroomed in such a way in the association development. Communication between persons through facebook more interest than on other social networking sites.

Facebook fever would be even better if added with a feature such as "free SMS via Facebook." This feature will be very useful if we will chat with an offline friend. So the message will still be up to him.

Free SMS is provided by dodotext, a free SMS provider via Facebook, Friendster and dodotext mobile applications. Dodo text is an online service owned by Tactica Labs Pte Ltd Singapora origin serving GSM SMS to the number of all countries around the world for free.

To use SMS dodotext via facebook:

1. Visit Dodotext
2. Click the Facebook link in the Add Our Facebook Application
3. Log into your Facebook account
4. Press the Allow button to allow entry into the facebook application
5. Then add the application to the profile.

To start an SMS, SMS settings first destination country, destination phone number, and type your message (max 100 characters), then press the Send SMS.

Additional features for free SMS via Friendster is not much different with facebook. Whereas for use dodotext mobile SMS applications, we need to register first and will get 5 free SMS every day. Let's try it now ..!


CLICK ON BELOW BUTTON PLZ 

How To Jailbreak Any iPhone, iPod Touch or iPad

So, you've heard about jailbreaking, and it sounds intriguing. And dangerous. (But mostly just intriguing.) Here's how to hack your iPhone, iPod Touch or iPad—yes, iPad—into an unrestricted, freshly empowered mega-machine.

Jailbreaking: The What and the Why

In buying an iProduct, you're accepting that its fate will be dictated by Apple. They control what kind of apps you install on your device, which of the hardware functions you can exploit to their full potential, and which carrier you can use your iPhone with. They've loosened up on at least one of those fronts in the last year or so, expanding the types of apps available in the App Store, but many—screw that, most—of the same restrictions still apply. Want to install an app that Apple hasn't explicitly approved? Sorry. Want to use an app over 3G that's been designated for Wi-Fi? Nope. Want to tether your phone? Run applications in the background? Change your device theme? Install system-wide gestures? No. Such. Luck.
Enter jailbreaking. In technical terms, to jailbreak is to enable a device to run code, meaning programs or system modifications, that hasn't been sanctioned by Apple. Its roots reach back to a time when there were no apps for iPhone OS, and a clever group of hackers zeroed in on some exploits gave people their first way to install apps on their devices, by way of an underground App Store called Installer. It used to be that you could hack your device simply by visiting a webpage. That was two years ago. Since then, the iPhone and iPod Touch have been given a legit App Store, Apple has closed one security hole after another, and jailbreaking has become alternately more and less difficult, depending which device and software version you have.
But just last week, a Windows and Mac tool called Spirit was released to the world. It's simple, relatively safe, and finally, works on all devices. Every iPod Touch can now be jailbroken to run custom apps. Every iPhone, too. Even the brand new iPad can be hacked. Theming, data tethering, multitasking, console emulation, secret settings, and yes, you filthy thief, even pirated apps: With jailbreak, your iThing is truly yours.
Here's how to jailbreak (or in the case of phones, unlocked) any iPod Touch, iPhone or iPad, using the new Spirit tool. But first, a disclaimer:
When you jailbreak or unlock a device, you're changing some fundamental aspects of the system software—you know, real low-level stuff. The tools are generally good, and if you follow directions carefully, you should be fine. But if something goes wrong—and there is more than one way this can happen—you can suffer data loss, or even brick your phone. Even worse, Apple claims that jailbreaking voids your warranty. You can restore your device to remove evidence that it ever happened, but if the device goes down while jailbroken, you could well be stuck. In addition, jailbreaking does not jibe with the DMCA, and breaks relate license agreements.
To the point: Follow this guide at your own peril, know that there's risk and be careful. Consult elsewhere if you're nervous, or worry that I've missed something.

How To Jailbreak

The Spirit tool has made the jailbreak fairly simple, but there's still room for error. Step by step:
What You Need:
• Spirit Jailbreak Tool (Windows and Mac)
• iTunes 9.x (Latest confirmed working version: 9.1.1)
• iPod cable
• An iPad, iPhone or iPod Touch that a.) Isn't currently jailbroken (obvious, but just in case), b.) is working, i.e. not stuck in a startup loop, or displaying that "Connect to iTunes" screen and c.) is running a device software version 3.1.3 or lower (or in the case of the iPad, version 3.2) 1. Plug your device in, so that it's recognized by iTunes
2. Back up your device to your iTunes library, and sync it. Having the backup handy will allow to you restore your settings in case you need to wipe your device later; syncing everything—including photos, which some users report losing during the jailbreak process—ensures that all the media on your device will remain untouched, or at least restorable.
3. Open the Spirit Jailbreak tool. It will open in a small window, and should display a message like "iPad (3.2) Connected." If not, disconnect and reconnect your device, and open the tool again.
4. Click "Jailbreak"
5. During the jailbreak routine, don't interfere with the device. It's probably better to leave your computer alone as well, to avoid a crash at a critical moment. First, you should see a screen on the device that says "Restore Complete." The device will restart, display a spinning pinwheel icon, and open up a colorful screen like this, with a progress bar:
How To: Jailbreak Any iPhone, iPod Touch or iPad
Spirit should be done doing its thing in under 30 seconds. Your device should then boot up to your homescreen, as it was before—same background, same apps, same settings. Now you're jailbroken. But there's one more thing:
6. When you restart your device, you'll see a new icon on your homescreen, called Cydia. Open it up. This is your new App Store. Don't worry, the regular App Store still works. Now you've just got another one.
How To: Jailbreak Any iPhone, iPod Touch or iPad
Cydia will look a bit different on the iPad and iPhone or iPod Touch, but will contain most of the same software.
How To: Jailbreak Any iPhone, iPod Touch or iPadThe first thing you need to do, though, is click the button that says, "Make my life easier, thanks!"
This will back up your device activation profile (called an SHSH blob) to remote servers, which ensures that you won't lose the ability to jailbreak if you accidentally upgrade your device device software in the future. More on that later.
Regarding Unlocking
Traditionally, unlocking (opening your phone to use with different carriers) and jailbreaking have fallen to the same tools. Since unlocking has become more difficult with later firmwares, the tools have grown apart. Spirit doesn't unlock. If you want to unlock, though, there may be hope.
If you haven't upgraded your iPhone to firmware 3.1.3, or can downgrade to an earlier build, you can use the Pwnage Tool, located here. The process is self-guided and quite similar to using Spirit. Unlocking is a comparatively narrow concern, and can get much more complicated, so I'll leave it at that. More info here.
Anyway, that's it! It's time to explore Cydia.

What to Download

Now that you're jailbroken, it's time to start downloading apps. Here are a handful of must-tries to get you started:
How To: Jailbreak Any iPhone, iPod Touch or iPad
Backgrounder: Lets you run apps in the background, full stop. Perhaps my top reason to jailbreak, period. The latest version lets you set apps to run in the background with a huge variety of gestures.
Activator: Speaking of gestures, this provides a framework for all kinds of gestures across jailbroken apps. (iPad and iPhone)
Kirikae: A task switcher to be used with Backgrounder. (Think alt+tab) (iPhone)
SBSettings: This opens up a whole slew of settings, accessible at any time via a pop-down system tray. Adjust brightness, toggle Wi-Fi, whatever. (iPad and iPhone)
Cycorder: Lets you take full-motion video with your pre-3GS iPhone. (iPhone)
MyWy: Lets you share your 3G connection with other devices over Wi-Fi. It's paid software, but a trial is available. (iPhone and iPad 3G)
Winterboard: Lets you change themes, and install a lot of interesting modifications to your device's homescreen, including folders, different icon arrangements, widgets and more.
iRealSMS: Lets you send text messages without opening the SMS app. (iPhone)
VoIPOver3G: Tricks apps into thinking they're connected over Wi-Fi, even if they're connected to 3G. (iPhone, iPad 3G)
How To: Jailbreak Any iPhone, iPod Touch or iPad
Intelliscreen: Puts all kinds of useful information on your lock screen, from weather to email to calendar events. Another paid app, but one that will be worth it to a lot of people. (iPhone)
Console emulators: Do your own searching on this one; there's one for virtually ever console released pre-2000, and many have different approaches to controls, and acquiring games. Some, like those by ZOTDD, actually let you search for and download ROMs from within the app. (iPhone and iPad)
Veency: A VNC server. No, not a client—a server. Control your iPhone from your computer. (iPhone)
Illicit goods: They're there, but I won't tell you how to find them. Pay for your apps! Trying before you buy is only a conscionable excuse if it's actually true.
Some general observations: Right now, a lot of apps haven't been updated for the iPad, so it's worth doing a little Googling to see how they handle the subtle changes in the new OS. That said, most apps do work, although if you experiment enough, you'll eventually get burned and have to restore your OS and start over, losing whatever tweaks you've made in the jailbreak process.

Un-Jailbreaking

If you've decided the jailbreak lifestyle isn't for you, or managed to screw up your device software enough that you want to switch back, it's easy. (Also, if Apple will be handling your device for any reason, you should probably un-jailbreak it. Warranties!)
How To: Jailbreak Any iPhone, iPod Touch or iPad
All you need is your device's latest firmware file, helpfully linked here.
Oh, and make sure you've backed up—you're going to lose everything.
(This guide only applies to software versions 3.1.3 for the iPhone and iPod Touch, and 3.2 for the iPad. These are the latest versions at the time of posting, and newer software could break compatibility.)
1. Plug your device in, and open iTunes
2. Shift-click (Windows) or Option-click the "Restore" button in your iTunes device summary page. Navigate to the firmware you've downloaded, and restore.
3. Once this is done, iTunes will ask you if you want to set up your device as a new device, or from a previously stored backup. If your goal is to return to a life before jailbreak, you're probably going to want to restore.
And that's it!

FAQ

What are the Downsides?
As mentioned before, there is a real risk of bricking your device, or losing data. But beyond that, there are stability issues with some jailbreak apps, and using apps like Backgrounder can seriously diminish your battery life. Also, flaunting your new found ability to tether your phone by running, say, torrents through your 3G connection is a good way to get in trouble with your carrier.
What about future software upgrades?
Apple's software updates almost always break jailbreak. When they come out, hold off on upgrading until the jailbreak community develops a hack, or an upgrade path. Upgrading to new software versions after a jailbreak often means installing a patched version of the update, specifically for jailbreakers.
Why did I click that "Make My Life Easier" button?
If Apple does thwart jailbreak in its next software update (likely), and you accidentally upgrade, you could be locked out of jailbreaking forever. Seriously! Why? Because as of late, Apple has been cracking down on jailbreakers by forcing their devices to authenticate with official servers every time they're upgraded or downgraded.
What this prevents, specifically, is restoring to older versions of the iPhone/iPad software, which contain the security holes necessary for jailbreaking. By keeping users from downgrading, Apple essentially locks them out of jailbreaking once they've upgraded to an un-jailbreakable OS.
The button you pressed in Cydia remotely saves what's called an SHSH blob, which is the "Go!" signal passed from Apple's servers to your specific device. In the event of a later downgrade, iTunes can be spoofed into thinking that Apple has approving the device's software change, when in fact it's just the Cydia store's servers giving the green light. The downgrade process is something we won't have to worry about until Apple issues another update, after which I'll update this guide. Until then, you can get a rough idea of how this whole thing by reading Saurik's (the guy behind Cydia) blog post on how it works.
Will It Work With OS 4.0?
Surprisingly, yes! OS 4.0 builds seem to respond well to jailbreaking with the Spirit tool. That said, this software is already fairly precarious, so I'm not sure I would risk it. Update: Turns out I was wrong. The Spirit jailbreak tool doesn't yet work on 4.0. They're working on it.
I've never owned and iProduct, and just bought an iPad. Should I do this?
Maybe! Kyle put together a helpful guide for iPadders earlier this week.
In the Event of Emergency, Who Can Help?
Google. But no, seriously, Google. Another great resource is the ModMyi forums, where just about any question you can have has probably already been asked, and answered.

How To Unlock an iPhone A step-by-step guide to unlocking the iPhone's SIM card and making it available to other cell carriers' networks

If you're one of the million people who've purchased an iPhone since the end of June, you probably signed up with Apple's exclusive carrier in the U.S., AT&T, when you activated your phone. That means your iPhone identifies itself to AT&T's network using an AT&T SIM card, a smart card that's located in a small tray between your iPhone's sleep/wake button and its recessed headphone jack.
But what if you're planning a trip to Europe and rather than paying AT&T to use the networks of its European partners, you want to take advantage of the favorable rates and local phone numbers offered by replacing your AT&T SIM card with a pre-paid European card? Or what if you'd prefer to use T-Mobile as your cellular provider, rather than AT&T?
In the past month several groups have announced that they've found a way to "unlock" the iPhone, allowing it to use a SIM card from any provider. (Keep in mind that this is only half the story: the iPhone uses the GSM radio band for its communications, meaning that it'll only work with providers that use the GSM network. In the U.S., that means T-Mobile and AT&T.)
In August, a group of hackers demonstrated a method for unlocking SIM cards and sold its software to resellers, who in turn began selling it to the public for as much as $100 last week.
But another group has came up with its own hack that, with the help of some free, open-source software, lets you unlock your iPhone in about an hour, free of charge. Below, I'll show you how it works - and it does work, because I've used this technique to unlock my own phone. (One important caveat: Certain AT&T-only features, such as Visual Voicemail, will not work when you're connected to other cellular networks.)
Before we get started, you'll want to disable the iTunes helper application that may get in the way of the installation. Make sure iTunes is not running, then open OS X's Activity Monitor in the Utilities folder of the Applications folder. Search for or scroll down to iTunes Helper, select it, and then click on the Quit Process button in the top left of the screen. You'll also need your iPhone, your data cable, and a Wi-Fi connection to the Internet.
(If you haven't already activated your iPhone with AT&T-and aren't planning to-you need to conduct a fake activation. To do this, you'll need to follow the excellent instructions at ModMyiPhone and download and install a program called iNdependence.)

Install AppTapp

Apple doesn't support the installation of third-party applications on the iPhone, but the enterprising developers at NullRiver have created a program called AppTapp that will let you install including chat clients, games, and other pieces of software - including those that are needed to unlock your iPhone. (For more detailed instructions on using AppTapp,
Download and install AppTapp. Once you run the program, the first thing it will do is ask what version of the firmware you're running. If you've just updated your iPhone, you probably have Firmware 1.0.2-select that and click on Continue.

Assuming all goes well, you should get a screen that begins with the words: "Congratulations! You have successfully installed AppTapp Installer onto your iPhone." You should then find a new application on the iPhone's home screen called Installer.
The next instructions will require downloading some applications from the Internet to your iPhone-so make sure your iPhone is connected to a WiFi network. Launch the Installer program, and you'll see a long list of various applications that you can install. Scroll down, then select and install-in order-Community Sources, BSD Subsystem and OpenSSH.

Perform the GSM Unlock

First, download and install Unlock.app, lockdownd, and Cyberduck.
Then go to the iPhone's General settings and set Auto-Lock to Never. Next, you'll need to get your iPhone's IP address on your local network. To do this, go to Settings: Wi-Fi and click on the blue arrow next to the network that you're connected too. Write down the IP address, as you'll need it for later.
Now, open Cyberduck and click on the Open Connection button in the top left of the window. In the connection window, type the IP address that you just noted. Make sure that SFTP (SSH Secure File Transfer) is selected, and that you are using Port 22. For the username, type root, with the password of dottie.
Once connected, navigate from /private/var/root to the main directory by choosing the / item. Next, navigate to /usr/libexec and drag the file named lockdownd (the one you downloaded earlier) into it. It will ask if you want to overwrite the existing file-click on Continue to do so.
Now, in Cyberduck, drag the Unlock file from the Mac's desktop into the /Applications folder at the top of the main window. Once that's done, turn off your iPhone and remove the SIM card, then turn your iPhone back on and choose the application on your iPhone called Unlock.
Assuming everything went smoothly, there should be a white screen that says "All files found. Ready to go. Press Start." Once you press start, it will take about 20 minutes for all the files to install.
The progress messages will appear at the top of the screen as it progress-once you see "Completed" then you're finished. Insert a new SIM card of your choosing into your iPhone. Congratulations, you've just unlocked your iPhone!
(If you're planning on using a T-Mobile SIM card in your iPhone, you'll want to modify the iPhone's settings. Follow the instructions at the bottom of the ModMyiPhone tutorial to make sure the settings you enter conform to your T-Mobile data plan.)

The aftermath

One Macworld editor tried this approach - minus the faux-activation step - on his iPhone and was able to insert a T-Mobile SIM card from a co-worker and get the iPhone up and running on the T-Mobile network, as if it were her phone.
(To swap SIM cards in your iPhone, insert an unfolded paper clip into the small hole in the top of the iPhone, next to the headphone jack. This will open the iPhone's SIM card slot, allowing you to remove your AT&T card and replace it with a different one.)
We don't know if future Apple iPhone updates will break this functionality. But if you're about to embark on a European vacation, or if you avoid downloading those iPhone updates, this method will allow you to use the SIM cards of other cellular providers in your iPhone, provided that those providers also use the GSM cellular radio frequencies.

How To Hack Idea Free GPRS(Idea Hack for Free GPRS )

This is the new trick for the user of idea cellular.
cell phone or pc/laptop.....

Before starting the detailed procedure these things described as


#1... YOU MUST NOT HAVE CONNECTION !
#2... YOU MUST NOT HAVE ANY ACTIVE PLANS OF GPRS/INTERNET !
#3... YOU MUST HAVE PREPAID CONNECTION !( USING OF THIS TRICK IN

POST PAID WILL LEAD TO YOU HIGHER AMOUNT OF BILL )
#4... YOU MUST HAVE TO USE S60 DEVICES OR HIGHER..NEVER USE THIS

TRICK FOR THE S40 DEVICES(FOR CERTAIN S40 DEVICES THIS TRICK

WORKS)
#5... THIS TRICK HAS BEEN TESTED SUCCESSFULLY IN NOKIA AND SONY

ERICSSON DEVICES !

NOW COME TO THE PROCEDURE TO GET FREE INTERNET:

From your idea cell phone type GP13 and send it to 4444.
now you will receive that your GP13 pack will be activated within

24 hours...
now wait for 12 to 16 hours..
now send the same sms to 4444..
you will receive that your request has been already registered.
now again after 24 hours you will find that your GP13 pack has

been activated...!!!

BUT thats not a trick...yes because you have been have been

charged 13 rs because of activation of GP13..
real trick starts now..

After successfull activation of GP13 pack just send NOGP13 to

4444.(4444 No is free of charge)
you will receive that your GP13 pack will be deactivated within

24 hours..
now after just 10 to 12 hours of sending dectivation sms again

send GP13 to 4444..

now its enough ...you have completed your all steps to get free

internet..
its because due to last activation sms after deactivation sms

system will be hacked!!!System isnt able to take decision what to

do!!

now after some time of sending sms for activation just reboot

your system from file explorer..

now restart your device/cell..you are able to surf free..

but note that if you are using cell phone than use opera mini or

uc web browser and if you are using pc/laptop than use smart web

browser or opera 9.27.

if you wish to use proxy for your opera than you must have to use

the proxy given below.....

1.
i.p.Adderss: 12.148.192.178
Port :1080(common for all)

2.
i.p.Adderss: 63.127.192.178

3.
i.p.Adderss: 199.105.112.152

4.
i.p.Adderss: 199.105.112.163

5.
i.p.Adderss: 12.148.162.37.......

Free Calling Worldwide 100% Working


In this tutorial i am going to show you how to make free world wide phone calls and talk as long as you like

Lets start:
YOU WILL NEED JAVA INSTALLED IN YOUR PC

IF YOU NOT HAVE JAVA DOWNLOAD FROM HERE
THEN
First of all download FriendCaller from Here.

After it is fully installed, open friend caller from desktop. Then register. check email and verify account otherwise you will be not able to call though you have free credits



Then go to your email and confirm your account and you will be credited $ 0.10 for free calls. So you can only call for 10 seconds for free but this what I made this tut so you can call free.

Now login with your account.
Then click on the phone icon.


Now comes the great part. Download a software called Cheat Engine from here.

Run the software and click on "Open Process".


Then click on window list.


Select friend caller, and open it.


Now dial number in friend caller. [First test your own number] and click call.


It will start ringing...


Now in Cheat Engine, enable speed hack. Edit speed to 0.00 and click "Apply"



Now enjoy your call. The timer will freeze. You can talk as much as you want. When you finish call, you will be only charged 0.02 but after your balance is finished, make new account and enjoy.

Best Latest Mobile Phone Hacking With BlueHack 001V

Hello friends, in this article I will show you how to hack mobile phone with simple software called Super Bluetooth Hack v. 1.08 . Once connected to a another phone via bluetooth you can do the following:
1) Call from his phone. It includes all call functions like hold etc.
2) Read his messages
3) Read his contacts
4) Change profile
5) Play his ringtone even if phone is on silent
6) Play his songs(in his phone)
7) Restart the phone
8) Switch off the phone
9) Restore factory settings
10) Change ringing volume

Follow the steps:
1) Download the Super Bluetooth Hack V1.07.
2) Unzip the file and send it to your mobile phone.
3) Install the software in your mobile phone.
4) Inquire new devices through the software.
5) When connecting devices use a code 0000

How to Update Twitter and Facebook with Siri on Your iPhone 4S



How to Update Twitter and Facebook with Siri on Your iPhone 4S
One of the most obvious features Siri lacks on the iPhone 4S is social network integration. Although Twitter is integrated into iOS 5, you still can’t tweet or update your Facebook account from Siri.
There’s actually an easy workaround to update Twitter and Facebook with Siri on your iPhone 4S.
Many forget that Twitter and Facebook both let you update your status via SMS. Once you authenticate your profile with your mobile number, you can text a certain number in your address book to tweet or quickly post a status.
Here’s how to update Twitter with Siri:
Step 1: Login to Twitter.com and visit the “Mobile” section of your account settings. Make sure that you have all of the SMS Message Notifications unchecked if you have push notifications already enabled on a Twitter app for your iPhone.
How to Update Twitter and Facebook with Siri on Your iPhone 4S
Step 2: Authenticate your iPhone 4S with Twitter’s SMS service. You have to type in your number and enter the verification code that’s sent.
Step 3: Create a new contact on your iPhone 4S for Twitter’s 40404 number. I recommend naming it “Twitter,” but you can make it whatever you want.
How to Update Twitter and Facebook with Siri on Your iPhone 4S
That’s it! You should now be able to say something along the lines of, “Send message to Twitter [insert tweet].” Siri will treat it like a regular message.
For Facebook, the steps are basically the same. You can connect your iPhone with your Facebook account from this page. Follow the same instructions for verifying your iPhone and creating a new contact with Facebook’s 32665 number.
While Twitter and Facebook offer SMS updates for free, your carriers will still charge you normally. Although you’re “using Siri” to update your status, you’re still just sending a text message, and the status will be displayed in your Messages app alongside your other texts.
But hey, when you need to tweet, you need to tweet. Simple as that, right?

Steve Jobs: Android is a stolen idea!

Nexus and iPhone
We are somehow sure that the upcoming biography of Steve Jobs will reveal many interesting facts and ideas valuable and intriguing to Apple users and fans. Author of this biography, Walter Isaacson was authorized by Steve Jobs himself to write this biography, as Jobs wanted to reveal more about himself to his family and his friends as wells as to all Apple users and fans.
Isaacson has released an excerpt to the public where Jobs revealed hist thoughts about HTC and its iPhone like products. His deep impression was that HTC stole ideas and solutions from Apple to launch their own smartphone contender. Jobs reaction to this was very emotional and he claimed that he will do whatever necessary to fight this. He has gone even so far as to promise that he will finally destroy Android, because it is a theft from Apple.
Jobs has told to Google CEO Eric Schmidt that he isn’t interested in getting money from Google. Money is not what Apple wants no matter the sum offered. Jobs main goal was to stop Android exploiting Apple’s ideas.
If you are following the developments in this continuous fight between Apple and Android you will known that the legal battle is continuing with law suits and counter law suits between Apple on one side and HTC, Samsung and other Android device manufacturers quietly supported by Google on the other side.

How To Hack Siri To Use Twitter, Facebook Or Google+



How To Hack Siri To Use Twitter, Facebook Or Google+
Siri’s an amazing advancement in the way that we interact with out iPhones, but it doesn’t exactly do everything you want it to do out of the box. In fact, three conspicuous abilities absent from Siri’s feature set include the ability to make a Facebook status update, send a message to Google+ or even tweet… doubly absurd given iOS 5”s native Twitter integration.
Don’t worry, though. It’s easy enough to hack any iPhone 4S to Tweet, Facebook or Google+ through Siri. Here’s how.

Techland gives us a great run down of easy Siri hacks that will get you up and running with voice control Twitter, Facebook and Google+ in no time:
For Facebook, text “Hello” to 32665 in the United States (or the short code for whatever country you’re in), then follow the link in the reply to finish the setup process. Add the short code to your Contacts, and name it “Facebook.” That way, you can tell Siri to “send a text to Facebook saying …”
For Twitter, text “START” to 40404 in the United States (or the short code for other countries), then respond with your username, then your password. Add the short code to your Contacts with the name “Twitter.”
For Google+, visit your settings page and scroll down to “Set delivery preferences.” Add your cell phone number, but be sure to click “don’t notify me” if you don’t want incoming Google+ messages by text. Verify your number with the code you receive by phone, then add the short code “33669” (in the U.S.) to your contacts as “Google Plus.” Updates are shared with everyone in your circles.

How To Hack Mobile Phones Through Bluetooth

Yes guys it is the mobile bluetooth hacker. It is a software which can be used to hack any mobile phone through bluetooth network. Once connected to a another phone via bluetooth you can do the following:
1) Call from his phone. It includes all call functions like hold etc.
2) Read his messages
3) Read his contacts
4) Change profile

5) Play his ringtone even if phone is on silent
6) Play his songs(in his phone)
7) Restart the phone
8) Switch off the phone
9) Restore factory settings
10) Change ringing volume
Notes:
1.) When connecting devices use a code 0000
2.) At start of programming on smartphones do not forget to turn on bluetooth before start of the application
What else you want
Just go and downlaod it
download
enjoy and keep visiting us

Boost Your Wi-Fi Signals With Beer Cans

Boost Your Wi-Fi Signals With Beer Cans


I love a good hack, especially one that requires me to throw back a cold one before hand (or during). This simple wifi boost has actually been shown to increase signal strength by at least 2 to 4 bars. And, well, I will drink to that.
These instructions came to us via The Chive and we think they are most definitely worth checking out. But here is the most important question: what kind of beer will you use?
For this project you are going to need scissors, a utility knife, some adhesive putty and an empty beer can. More than one empty beer can is acceptable but don’t kid yourself, the router only needs the one.






The first step is to wash out your empty beer can, unless of course said beer is a can of Pabst Blue Ribbon. If it is PBR, promptly go drink a better beer. You really should be ashamed of yourself.
Once the can has dried, you will want to remove it’s pull tab.
Only perform this next step if you have not been drinking. Using the utility knife, saw off the bottom of the can. Chances are your can will not have a red dotted line. If you see one, put down the knife…you’ve had too much beer.



You’ll notice in the above step that the can’s pull tab has returned. Clearly, there are only two possible reasons for this. One, you are really drunk and you never removed the tab in the first place. Or–the more likely answer–beer cans can regenerate themselves.



It’s the home stretch! You just need to attach your modded beer can to the wifi router. Hopefully no other parts of the can have actually grown back. You now have beer-fi!
So, what kind of beer did you use?


How Hackers hacks your cell phone to get information?? How Hackers spy conversations of your cell phone??

 
 













Hackers can get your information, and even spy on your conversations all through your cell phone.
Have you ever put your phone down for a few minutes, maybe left it on your desk, or on the table at a restaurant while you head to the ladies room?

If you’ve ever left it unattended you’re at risk.

When your phone rings, you answer. But your phone can pickup without making a sound, and turn into a hidden microphone.

Expert Tom Slovenski explains, “You can hear everything that is going on in the room.“
It happened to the Kuykendall family in Washington State. “They’ve totally taken over the phone,“ Heather Kuykendall says. And it was hard to convince authorities something was going on. “I can’t sleep at night I worry constantly,“ she says.

More on their story visit here

Tom Slovenski, with Cellular Forensics knows it can happen. He’s one of the leading experts in the US, who trains private detectives, law enforcement officers and members of the military on phone forensics—how to flush out spyware and go after the hackers.

Spyware works fast, if you’re at a bar and you’re busy dancing and having a fun time, and you leave your phone here, it only takes a creep 5 minutes to grab your phone load software and turn your phone into their personal spying device.
Corporations are getting worried about guarding secrets shared in important meetings. There is only one failsafe way to do that.

David, the Chicago based detective explains: “If you’re having an important meeting or something that you definitely don’t want anything getting out about is to actually remove the battery from your phone. That’s the number one thing to do. “

Protecting your phone from a spyware attack is free and simple.

“If you simply put a password on your phone its going to protect you from the majority of what is out there,“ Robert Kresson said.

Tom Slovenski says it’s simple. “It’s four digits and you’re in.“

The danger will escalate our expert says, with the launch of mobile banking from your phone… when that happens the incentive to hack into your phone, will multiply a lot faster than any interest on your accounts.

So what can you do to protect yourself? The free solution… set the password on your phone.

How to protect your phone:
  • Put a password on your phone
  • Turn off blue tooth when not using it.
  • Don’t go to websites or click on links you don’t trust

CYBER CRIME INVESTIGATION CELL (MUMBAI)



Cyber Cell Mumbai

Do and don't for mobile user

Don’ts
  • Please do not click photographs without permission by your  mobile phones. You are invading the privacy.
  • Do not send obscene/pornographic text, images. SMS.
  •  Do not send obscene/pornographic text, MMS (multimedia messaging service)
  •  Do not receive from or reply to sms/mms of strangers.
  •  Do not transmit obscene/ pornographic material, as it is an offence under Information Technology act –2000.punishment         is 5 yrs imprisonment and 1lac rupees fine.
  •  Do not call to the unknown phone/mobile numbers you get while chatting or exhibited on various profiles on Internet.  Which you are not familiar with. If you do you may be causing harassment on behalf of other person.
  •  Do not keep your Blue tooth  open to all,  you may receive obscene/phornographic text, images and viruses.
  •  Do not give your mobile numbers while chatting on INTERNET to avoid “STALKING”.
  •  DO not handover your mobile phone to unauthorised service center, to avoid CLONING.

      Do’s
  • Note down your IMEI number.
  • Security pin code should be used to avoid misuse of your mobile phones.
  •  mms/sms received should be checked before opening the message.
  •  Delete obscene/phornographic text, images. SMS/MMS.from your mobile phones.
  •  Anti-virus software should be loaded in the mobile phone.
  •  Mobile phone keypad should be locked after every use.
  •  Use your mobile phone when necessary

 

How To do Practical WiFi Hacking Using Mobile Phones

Hii! This is Pc Hackers Guru Know Many about Hacking
In order to steal your data trough a rogue access point attack, a hacker needs only to overpower the local Wi-Fi access point and have your laptop associate with his evil network rather than the public one. You will still be connected to the Internet, except all your personal data will pass through the hacker’s computer which acts as a man-in-the-middle.

To run a successful rogue access point attack you need to control DNS and Internet traffic, as well as be able to sniff that traffic, and in the past that required another laptop. But Cnet’s reporter, Robert Vamosi presents a mobile phone scenario outlined by Carl Banzhof, VP and chief technology evangelist for McAfee during the RSA Conference 2007 in San Francisco.

Mobile phones vs laptops

The market for smart phones, some with the memory and capacity of a small laptop, continues to grow everyday.
Banzhof cites that many mobile devices today currently or will soon support Bluetooth, infrared, GPRS/EDGE, and Wi-Fi 802.11 technology. The market is evenly split in operating systems between Blackberry OS, Palm OS, and Windows Mobile, with the latter capable of running Internet Information Server (IIS). It's the Windows Mobile OS that interested Banzhof most.

The advantages of using a mobile device in an evil twin attack instead of a bulky laptop are many: mobile devices are easily camouflaged, portable, and can allow close proximity to the intended victim. Mobile devices are rapidly becoming transparent; everyone has one, so what's the big security concern?

Creating a mobile access point

To carry out this mobile evil twin attack, Banzhof chose the T Mobile MDA for his experiment. It runs Windows Mobile 5.0 as its operating system. It uses a TI OMAP 850 processor, so it has enough oomph, and it includes an 802.11 chipset, TI ACX100. Best of all, it has a robust developer community.

Banzhof faced a number of technical challenges--in part because most of the tools were written for Linux, not Windows Mobile. He looked around for other work done on WinCE and Windows Mobile 5 and found none. He considered converting the device to Linux but decided that violated the spirit of the project. He found some Linux projects that could be ported over, namely Hostapd and Karma. He started to use Visual Studio 2005 to compile the new code by hand, and instead found an open-source tool, CeGCC, to cross compile.

Devil in the details
By using Hostapd, Banzhof had many user-space 802.11 functions at his disposal, such as user authentication, encryption, initializing a network interface, beacon intervals to call out to susceptible laptops, and Extended Authoritization Protocol (EAP) keys. It also gave him an interface into the ACX100 driver (which handles the 802.11 protocol) so he could handle the management, transmission, and reception of wireless data packets. But again, there were problems. The open source app, CeGCC, doesn't always work right so he had to improvise, and wireless card selection for Hostapd was limited and didn't exist for the mobile device form factor.

The IIS for Windows Mobile server posed similar challenges. ISS for Windows Mobile supports Active Server Pages and ISAPI, with configurable options found in the system registry for allowing ports, creating virtual directors, and controlling bandwidth.

Testing it out
Banzhof reported to the RSA conference that he'd successfully ported Hostapd to Windows CE, he had his DHCP/DNA Server operational, and his Web server was online. He hopes in the future to route his sniffed Internet traffic to legitimate access points or via smart phone radio (EDGE) for further analysis.

Banzhof also hinted that similar hacks could be carried out with the new iPhone from Apple, given that many of the tools he used already run on Unix and Linux. Never mind that Apple promises that the iPhone will be a closed system. Banzhof noted that hasn't stopped anyone before.

How To Hack Your Friends Mobile Phone

Hii! This is Pc Hackers Guru Know Many about Hacking
  • log into your friends mobile
  • read his messages
  • change his phone settings- read his messages
  • change profile
  • play his ringtone even if phone is on silent
  • play his songs(in his phone)
  • restart the phone
  • switch off the phone
  • restore factory settings
  • change ringing volume
  • call from his phone




Ok so how the hell to do this Ok for starters this is no hack. It uses bluetooth's existing functionality to access the features being talked about.

Prerequisites:
  • The other phone must be bluetooth enabled(most are these days)
  • The other phone must have bluetooth on(Surprisingly a lot of people always have it on, in spite of the fact that you should never have it on, it eats you battery. How many people, a BBC panaroma program some time back used this to find out that more than 60% of people have left bluetooth on
  • Unless the other person configured it that way, you do require permission to pair once. So you need to be paired with the other phone once to use this hack next time without anyone's knowing. (Thats why its hack your friends mobile, your friend might have paired you already

Download: Super Bluetooth Hack


Usage:
  • On series 60, install directly
  • If you have a cellphone like series 40 (Nokia 6230) with bluetooth and Java 2 support make .jad file with jad generator (included on package).
  • When connecting devices use a code 0000
  • Before starting the application on smartphones do not forget to turn on bluetooth.
----------------------------------------------

Some software for bluetooth hacking to hack any bluetooth enabled phone or device.

Hii! This is Pc Hackers Guru Know Many about Hacking

Bluetooth provides an easy way pf communication for a wide range of mobile devices to communicate with each other without the need for cables or wires and transfer files in between them.
Note: But it can be a potential threat for a person privacy.
There are large amount of information that is available on internet about on how you can hack various blue tooth enabled devices.
So Today i am going to list out some Freewares For Blutooth Hacking.

Various Softwares For Bluetooth Hacking
BlueScanner – It search out for Bluetooth devices and extract much amount of information of the newly discovered device. Download BlueScan.
BlueSniff – It is a simple utility for discovering hidden Bluetooth devices. Download BlueSniff.
BlueBugger -It simply exploits the BlueBug vulnerability of the bluetooth enabled devices. By exploiting these vulnerabilities and leakes, you can gain access to the phone-book, calls lists and other information of the bluetooth device. Download BlueBugger.
BTBrowser – Is a Bluetooth Browser is a J2ME app. which can browse and explore all the  surrounding Bluetooth devices. Browse to different kind of device information. Download BTBrowser.
BTCrawler -It is a Bluetooth scanner for Windows Mobile based devices. It can implement BlueJacking and BlueSnarfing attacks. Download BTCrawler.
If you find any of the above utilities usefull leave a comment here.

How to Make FREE Calls to Landline and Mobile phones

Hii! This is Pc Hackers Guru Know Many about Hacking
Make FREE calls quickly
Simply type gizmocall.com/18005551212 into your browsers address bar.
(put the number you want to dial in place of 18005551212)
Make FREE calls to landline and mobile phones in over 60 countries by participating in the All Calls Free plan.
Users NEW to the All Calls Free plan get 20 minutes of free calling simply by getting ONE friend to sign up for a new Gizmo account. There are no commitments and no hidden fees.

Get Started Now!
  1. Tell a friend to download Gizmo5 and have them add their phone number to their profile.
    img-calls-1 Free Calls
  2. Add each other to your contact lists and you can call that person for FREE using Gizmo5.
    img-calls-3 Free Calls
  3. Be sure to make at least 1 Gizmo5 to Gizmo5 call per week or your free minutes will expire.
    img-calls-free-app Free Calls

  • Download Softwares

1 poivY Rates downloadnow Free Calls Kuwait
2 VoipBuster Rates downloadnow Free Calls Thailand
3 VoipStunt Rates downloadnow Free Calls UK, USA
4 InternetCalls Rates downloadnow Free Calls Egypt, Pakistan
5 InterVoip Rates downloadnow Free Calls Iraq, Lebanon, Palestine, Qatar, Sudan
6 LowrateVoip Rates downloadnow Free Calls Bangladesh, Jordan, Indonesia, Iraq, Malaysia Thailand, UK, USA
7 FreeCall Rates downloadnow Free Calls Russia
8 SMSListo Rates downloadnow Free Calls Sudan, Syria, China
9 WebCallDirect Rates downloadnow Free Calls India, Pakistan, Philippines, Malaysia
10 JustVoip Rates downloadnow Free Calls Russia
11 12Voip Rates downloadnow Free Calls Bahrain, China, Sri Lanka
12 DialNow Rates Phone-to-Phone Use if you live in a FREE Call Country!.
13 nonoh Rates Phone-to-Phone Use if you live in a FREE Call Country!.
14 VoipWise Rates downloadnow Free Calls
15 BudgetSIP Rates downloadnow Free Calls We create your SIP account.
16 Calleasy Rates Phone-to-Phone Web Call
17 SIPDiscount Rates for SIP Devices
18 SMSdiscount Rates downloadnow Free Calls India, Morocco, Turkey
19 VoipCheap Rates downloadnow Free Calls
20 VoIPRaider Rates downloadnow Free Calls

Recommend us on Google!

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More