Welcome To The Hacker Club 4U

On This Blog Now You can get knowledge about how to to do hacking and also Know how to prevent from hacking and know many tips And tricks of computer and internet

Hacking

Click Here To Know Many Tricks and Tips Of HACKING facebook,twitter and other accounts and passwords

Hacking Safety And Security

Click Here to know how to protect your computer and inetrnet from hacking and know hacking safety and security tips and tricks

Facebook And Twitter

Click On Picture For TWITTER And Click On This Tittle For FACEBOOK .Hacking And Security Tips Of facebook and twitter.Know how to byepass facebook login and twitter login

Gmail And Yahoo

Click On Above Picture For GMAIL Hacking And Security Tips . And.Click On This Title For YAHOO Hacking and security tips


Showing posts with label Mobile Hacking. Show all posts
Showing posts with label Mobile Hacking. Show all posts

USING BLACKBERRY MESSENGER ON COMPUTER

While you're busy doing something on the computer, sometimes you also have to reply to incoming messages on Blackberry Messenger. So it must go back and forth between the computer and Blackberry.

With an Application called Fixmo Web Messenger, you do not bother using a Blackberry and computer, because you can access the fuel through the computer, so that will make you more easily and quickly reply to any message in the fuel through Computer.

Here are the easy steps to you:
1. Download an application called Fixmo Web Messenger for your BlackBerry.

2. install Fixmo Web Messenger on the Blackberry, then run the application and make an account using your email.

3. From your computer, visit Fixmo after that login using the account you created on the Blackberry (Step 2) above.

With the above steps, you can now use the Blackberry Messenger from your computer, such as replying to the message to access the contacts on BBM.

TAKE ADVANTAGE OF FREE SMS FEATURE VIA FACEBOOK

Facebook fever have mushroomed in such a way in the association development. Communication between persons through facebook more interest than on other social networking sites.

Facebook fever would be even better if added with a feature such as "free SMS via Facebook." This feature will be very useful if we will chat with an offline friend. So the message will still be up to him.

Free SMS is provided by dodotext, a free SMS provider via Facebook, Friendster and dodotext mobile applications. Dodo text is an online service owned by Tactica Labs Pte Ltd Singapora origin serving GSM SMS to the number of all countries around the world for free.

To use SMS dodotext via facebook:

1. Visit Dodotext
2. Click the Facebook link in the Add Our Facebook Application
3. Log into your Facebook account
4. Press the Allow button to allow entry into the facebook application
5. Then add the application to the profile.

To start an SMS, SMS settings first destination country, destination phone number, and type your message (max 100 characters), then press the Send SMS.

Additional features for free SMS via Friendster is not much different with facebook. Whereas for use dodotext mobile SMS applications, we need to register first and will get 5 free SMS every day. Let's try it now ..!


CLICK ON BELOW BUTTON PLZ 

How To Jailbreak Any iPhone, iPod Touch or iPad

So, you've heard about jailbreaking, and it sounds intriguing. And dangerous. (But mostly just intriguing.) Here's how to hack your iPhone, iPod Touch or iPad—yes, iPad—into an unrestricted, freshly empowered mega-machine.

Jailbreaking: The What and the Why

In buying an iProduct, you're accepting that its fate will be dictated by Apple. They control what kind of apps you install on your device, which of the hardware functions you can exploit to their full potential, and which carrier you can use your iPhone with. They've loosened up on at least one of those fronts in the last year or so, expanding the types of apps available in the App Store, but many—screw that, most—of the same restrictions still apply. Want to install an app that Apple hasn't explicitly approved? Sorry. Want to use an app over 3G that's been designated for Wi-Fi? Nope. Want to tether your phone? Run applications in the background? Change your device theme? Install system-wide gestures? No. Such. Luck.
Enter jailbreaking. In technical terms, to jailbreak is to enable a device to run code, meaning programs or system modifications, that hasn't been sanctioned by Apple. Its roots reach back to a time when there were no apps for iPhone OS, and a clever group of hackers zeroed in on some exploits gave people their first way to install apps on their devices, by way of an underground App Store called Installer. It used to be that you could hack your device simply by visiting a webpage. That was two years ago. Since then, the iPhone and iPod Touch have been given a legit App Store, Apple has closed one security hole after another, and jailbreaking has become alternately more and less difficult, depending which device and software version you have.
But just last week, a Windows and Mac tool called Spirit was released to the world. It's simple, relatively safe, and finally, works on all devices. Every iPod Touch can now be jailbroken to run custom apps. Every iPhone, too. Even the brand new iPad can be hacked. Theming, data tethering, multitasking, console emulation, secret settings, and yes, you filthy thief, even pirated apps: With jailbreak, your iThing is truly yours.
Here's how to jailbreak (or in the case of phones, unlocked) any iPod Touch, iPhone or iPad, using the new Spirit tool. But first, a disclaimer:
When you jailbreak or unlock a device, you're changing some fundamental aspects of the system software—you know, real low-level stuff. The tools are generally good, and if you follow directions carefully, you should be fine. But if something goes wrong—and there is more than one way this can happen—you can suffer data loss, or even brick your phone. Even worse, Apple claims that jailbreaking voids your warranty. You can restore your device to remove evidence that it ever happened, but if the device goes down while jailbroken, you could well be stuck. In addition, jailbreaking does not jibe with the DMCA, and breaks relate license agreements.
To the point: Follow this guide at your own peril, know that there's risk and be careful. Consult elsewhere if you're nervous, or worry that I've missed something.

How To Jailbreak

The Spirit tool has made the jailbreak fairly simple, but there's still room for error. Step by step:
What You Need:
• Spirit Jailbreak Tool (Windows and Mac)
• iTunes 9.x (Latest confirmed working version: 9.1.1)
• iPod cable
• An iPad, iPhone or iPod Touch that a.) Isn't currently jailbroken (obvious, but just in case), b.) is working, i.e. not stuck in a startup loop, or displaying that "Connect to iTunes" screen and c.) is running a device software version 3.1.3 or lower (or in the case of the iPad, version 3.2) 1. Plug your device in, so that it's recognized by iTunes
2. Back up your device to your iTunes library, and sync it. Having the backup handy will allow to you restore your settings in case you need to wipe your device later; syncing everything—including photos, which some users report losing during the jailbreak process—ensures that all the media on your device will remain untouched, or at least restorable.
3. Open the Spirit Jailbreak tool. It will open in a small window, and should display a message like "iPad (3.2) Connected." If not, disconnect and reconnect your device, and open the tool again.
4. Click "Jailbreak"
5. During the jailbreak routine, don't interfere with the device. It's probably better to leave your computer alone as well, to avoid a crash at a critical moment. First, you should see a screen on the device that says "Restore Complete." The device will restart, display a spinning pinwheel icon, and open up a colorful screen like this, with a progress bar:
How To: Jailbreak Any iPhone, iPod Touch or iPad
Spirit should be done doing its thing in under 30 seconds. Your device should then boot up to your homescreen, as it was before—same background, same apps, same settings. Now you're jailbroken. But there's one more thing:
6. When you restart your device, you'll see a new icon on your homescreen, called Cydia. Open it up. This is your new App Store. Don't worry, the regular App Store still works. Now you've just got another one.
How To: Jailbreak Any iPhone, iPod Touch or iPad
Cydia will look a bit different on the iPad and iPhone or iPod Touch, but will contain most of the same software.
How To: Jailbreak Any iPhone, iPod Touch or iPadThe first thing you need to do, though, is click the button that says, "Make my life easier, thanks!"
This will back up your device activation profile (called an SHSH blob) to remote servers, which ensures that you won't lose the ability to jailbreak if you accidentally upgrade your device device software in the future. More on that later.
Regarding Unlocking
Traditionally, unlocking (opening your phone to use with different carriers) and jailbreaking have fallen to the same tools. Since unlocking has become more difficult with later firmwares, the tools have grown apart. Spirit doesn't unlock. If you want to unlock, though, there may be hope.
If you haven't upgraded your iPhone to firmware 3.1.3, or can downgrade to an earlier build, you can use the Pwnage Tool, located here. The process is self-guided and quite similar to using Spirit. Unlocking is a comparatively narrow concern, and can get much more complicated, so I'll leave it at that. More info here.
Anyway, that's it! It's time to explore Cydia.

What to Download

Now that you're jailbroken, it's time to start downloading apps. Here are a handful of must-tries to get you started:
How To: Jailbreak Any iPhone, iPod Touch or iPad
Backgrounder: Lets you run apps in the background, full stop. Perhaps my top reason to jailbreak, period. The latest version lets you set apps to run in the background with a huge variety of gestures.
Activator: Speaking of gestures, this provides a framework for all kinds of gestures across jailbroken apps. (iPad and iPhone)
Kirikae: A task switcher to be used with Backgrounder. (Think alt+tab) (iPhone)
SBSettings: This opens up a whole slew of settings, accessible at any time via a pop-down system tray. Adjust brightness, toggle Wi-Fi, whatever. (iPad and iPhone)
Cycorder: Lets you take full-motion video with your pre-3GS iPhone. (iPhone)
MyWy: Lets you share your 3G connection with other devices over Wi-Fi. It's paid software, but a trial is available. (iPhone and iPad 3G)
Winterboard: Lets you change themes, and install a lot of interesting modifications to your device's homescreen, including folders, different icon arrangements, widgets and more.
iRealSMS: Lets you send text messages without opening the SMS app. (iPhone)
VoIPOver3G: Tricks apps into thinking they're connected over Wi-Fi, even if they're connected to 3G. (iPhone, iPad 3G)
How To: Jailbreak Any iPhone, iPod Touch or iPad
Intelliscreen: Puts all kinds of useful information on your lock screen, from weather to email to calendar events. Another paid app, but one that will be worth it to a lot of people. (iPhone)
Console emulators: Do your own searching on this one; there's one for virtually ever console released pre-2000, and many have different approaches to controls, and acquiring games. Some, like those by ZOTDD, actually let you search for and download ROMs from within the app. (iPhone and iPad)
Veency: A VNC server. No, not a client—a server. Control your iPhone from your computer. (iPhone)
Illicit goods: They're there, but I won't tell you how to find them. Pay for your apps! Trying before you buy is only a conscionable excuse if it's actually true.
Some general observations: Right now, a lot of apps haven't been updated for the iPad, so it's worth doing a little Googling to see how they handle the subtle changes in the new OS. That said, most apps do work, although if you experiment enough, you'll eventually get burned and have to restore your OS and start over, losing whatever tweaks you've made in the jailbreak process.

Un-Jailbreaking

If you've decided the jailbreak lifestyle isn't for you, or managed to screw up your device software enough that you want to switch back, it's easy. (Also, if Apple will be handling your device for any reason, you should probably un-jailbreak it. Warranties!)
How To: Jailbreak Any iPhone, iPod Touch or iPad
All you need is your device's latest firmware file, helpfully linked here.
Oh, and make sure you've backed up—you're going to lose everything.
(This guide only applies to software versions 3.1.3 for the iPhone and iPod Touch, and 3.2 for the iPad. These are the latest versions at the time of posting, and newer software could break compatibility.)
1. Plug your device in, and open iTunes
2. Shift-click (Windows) or Option-click the "Restore" button in your iTunes device summary page. Navigate to the firmware you've downloaded, and restore.
3. Once this is done, iTunes will ask you if you want to set up your device as a new device, or from a previously stored backup. If your goal is to return to a life before jailbreak, you're probably going to want to restore.
And that's it!

FAQ

What are the Downsides?
As mentioned before, there is a real risk of bricking your device, or losing data. But beyond that, there are stability issues with some jailbreak apps, and using apps like Backgrounder can seriously diminish your battery life. Also, flaunting your new found ability to tether your phone by running, say, torrents through your 3G connection is a good way to get in trouble with your carrier.
What about future software upgrades?
Apple's software updates almost always break jailbreak. When they come out, hold off on upgrading until the jailbreak community develops a hack, or an upgrade path. Upgrading to new software versions after a jailbreak often means installing a patched version of the update, specifically for jailbreakers.
Why did I click that "Make My Life Easier" button?
If Apple does thwart jailbreak in its next software update (likely), and you accidentally upgrade, you could be locked out of jailbreaking forever. Seriously! Why? Because as of late, Apple has been cracking down on jailbreakers by forcing their devices to authenticate with official servers every time they're upgraded or downgraded.
What this prevents, specifically, is restoring to older versions of the iPhone/iPad software, which contain the security holes necessary for jailbreaking. By keeping users from downgrading, Apple essentially locks them out of jailbreaking once they've upgraded to an un-jailbreakable OS.
The button you pressed in Cydia remotely saves what's called an SHSH blob, which is the "Go!" signal passed from Apple's servers to your specific device. In the event of a later downgrade, iTunes can be spoofed into thinking that Apple has approving the device's software change, when in fact it's just the Cydia store's servers giving the green light. The downgrade process is something we won't have to worry about until Apple issues another update, after which I'll update this guide. Until then, you can get a rough idea of how this whole thing by reading Saurik's (the guy behind Cydia) blog post on how it works.
Will It Work With OS 4.0?
Surprisingly, yes! OS 4.0 builds seem to respond well to jailbreaking with the Spirit tool. That said, this software is already fairly precarious, so I'm not sure I would risk it. Update: Turns out I was wrong. The Spirit jailbreak tool doesn't yet work on 4.0. They're working on it.
I've never owned and iProduct, and just bought an iPad. Should I do this?
Maybe! Kyle put together a helpful guide for iPadders earlier this week.
In the Event of Emergency, Who Can Help?
Google. But no, seriously, Google. Another great resource is the ModMyi forums, where just about any question you can have has probably already been asked, and answered.

How To Unlock an iPhone A step-by-step guide to unlocking the iPhone's SIM card and making it available to other cell carriers' networks

If you're one of the million people who've purchased an iPhone since the end of June, you probably signed up with Apple's exclusive carrier in the U.S., AT&T, when you activated your phone. That means your iPhone identifies itself to AT&T's network using an AT&T SIM card, a smart card that's located in a small tray between your iPhone's sleep/wake button and its recessed headphone jack.
But what if you're planning a trip to Europe and rather than paying AT&T to use the networks of its European partners, you want to take advantage of the favorable rates and local phone numbers offered by replacing your AT&T SIM card with a pre-paid European card? Or what if you'd prefer to use T-Mobile as your cellular provider, rather than AT&T?
In the past month several groups have announced that they've found a way to "unlock" the iPhone, allowing it to use a SIM card from any provider. (Keep in mind that this is only half the story: the iPhone uses the GSM radio band for its communications, meaning that it'll only work with providers that use the GSM network. In the U.S., that means T-Mobile and AT&T.)
In August, a group of hackers demonstrated a method for unlocking SIM cards and sold its software to resellers, who in turn began selling it to the public for as much as $100 last week.
But another group has came up with its own hack that, with the help of some free, open-source software, lets you unlock your iPhone in about an hour, free of charge. Below, I'll show you how it works - and it does work, because I've used this technique to unlock my own phone. (One important caveat: Certain AT&T-only features, such as Visual Voicemail, will not work when you're connected to other cellular networks.)
Before we get started, you'll want to disable the iTunes helper application that may get in the way of the installation. Make sure iTunes is not running, then open OS X's Activity Monitor in the Utilities folder of the Applications folder. Search for or scroll down to iTunes Helper, select it, and then click on the Quit Process button in the top left of the screen. You'll also need your iPhone, your data cable, and a Wi-Fi connection to the Internet.
(If you haven't already activated your iPhone with AT&T-and aren't planning to-you need to conduct a fake activation. To do this, you'll need to follow the excellent instructions at ModMyiPhone and download and install a program called iNdependence.)

Install AppTapp

Apple doesn't support the installation of third-party applications on the iPhone, but the enterprising developers at NullRiver have created a program called AppTapp that will let you install including chat clients, games, and other pieces of software - including those that are needed to unlock your iPhone. (For more detailed instructions on using AppTapp,
Download and install AppTapp. Once you run the program, the first thing it will do is ask what version of the firmware you're running. If you've just updated your iPhone, you probably have Firmware 1.0.2-select that and click on Continue.

Assuming all goes well, you should get a screen that begins with the words: "Congratulations! You have successfully installed AppTapp Installer onto your iPhone." You should then find a new application on the iPhone's home screen called Installer.
The next instructions will require downloading some applications from the Internet to your iPhone-so make sure your iPhone is connected to a WiFi network. Launch the Installer program, and you'll see a long list of various applications that you can install. Scroll down, then select and install-in order-Community Sources, BSD Subsystem and OpenSSH.

Perform the GSM Unlock

First, download and install Unlock.app, lockdownd, and Cyberduck.
Then go to the iPhone's General settings and set Auto-Lock to Never. Next, you'll need to get your iPhone's IP address on your local network. To do this, go to Settings: Wi-Fi and click on the blue arrow next to the network that you're connected too. Write down the IP address, as you'll need it for later.
Now, open Cyberduck and click on the Open Connection button in the top left of the window. In the connection window, type the IP address that you just noted. Make sure that SFTP (SSH Secure File Transfer) is selected, and that you are using Port 22. For the username, type root, with the password of dottie.
Once connected, navigate from /private/var/root to the main directory by choosing the / item. Next, navigate to /usr/libexec and drag the file named lockdownd (the one you downloaded earlier) into it. It will ask if you want to overwrite the existing file-click on Continue to do so.
Now, in Cyberduck, drag the Unlock file from the Mac's desktop into the /Applications folder at the top of the main window. Once that's done, turn off your iPhone and remove the SIM card, then turn your iPhone back on and choose the application on your iPhone called Unlock.
Assuming everything went smoothly, there should be a white screen that says "All files found. Ready to go. Press Start." Once you press start, it will take about 20 minutes for all the files to install.
The progress messages will appear at the top of the screen as it progress-once you see "Completed" then you're finished. Insert a new SIM card of your choosing into your iPhone. Congratulations, you've just unlocked your iPhone!
(If you're planning on using a T-Mobile SIM card in your iPhone, you'll want to modify the iPhone's settings. Follow the instructions at the bottom of the ModMyiPhone tutorial to make sure the settings you enter conform to your T-Mobile data plan.)

The aftermath

One Macworld editor tried this approach - minus the faux-activation step - on his iPhone and was able to insert a T-Mobile SIM card from a co-worker and get the iPhone up and running on the T-Mobile network, as if it were her phone.
(To swap SIM cards in your iPhone, insert an unfolded paper clip into the small hole in the top of the iPhone, next to the headphone jack. This will open the iPhone's SIM card slot, allowing you to remove your AT&T card and replace it with a different one.)
We don't know if future Apple iPhone updates will break this functionality. But if you're about to embark on a European vacation, or if you avoid downloading those iPhone updates, this method will allow you to use the SIM cards of other cellular providers in your iPhone, provided that those providers also use the GSM cellular radio frequencies.

Top 10 Ways How Hackers Can Hack Facebook Accounts In 2011

13
Facebook is one of the most widely used social networking site with more than 750 million users, as a reason if which it has become the number 1 target of hackers, I have written a couple of post related to facebook hacking here at THC4U, In my previous post which I wrote in 2010 related to facebook hacking and security 4 ways on How to hack facebook password, I mentioned the top methods which were used by hackers to hack facebook accounts, however lots of things have changed in 2011, Lots of methods have went outdated or have been patched up by facebook and lots of new methods have been introduced, So in this post I will write the top 10 methods how hackers can hack facebook accounts in 2010.


10 Ways How Hackers Can Hack Facebook Accounts In 2011

So here are the top 10 methods which have been the most popular in 2011:


1. Facebook Phishing 




Phishing still is the most popular attack vector used for hacking facebook accounts, There are variety of methods to carry out phishing attack, In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real facebook page and then asks the victim to login into that page, Once the victim logins through the fake page the victims "Email Address" and "Password" is stored in to a text file, The hacker then downloads the text file and get's his hands on the victims credentials.

I have explained the step by step phishing process in my post below:

2. Keylogging 

Keylogging, according to me is the easiest way to hack a facebook password, Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A keylogger is basically a small program which once is installed on victims computer will record every thing which victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address. I have dedicated a half of my newsest book "An introduction to keyloggers, RATS And Malware" to this topic.

Ethical Hacking Book
3. Stealers 



Almost 80% percent people use stored passwords in their browser to access the facebook, This is is quite convenient but can sometimes be extremely dangerous, Stealers are software's specially designed to capture the saved passwords stored in the victims browser, Stealers once FUD can be extremely powerful. If you want to how stealers work and how you can set up your own one?, Kindly refer the book above.


4. Session Hijacking




Session Hijacking can be often very dangerous if you are accessing Facebook on a http:// connection, In a Session Hijacking attack a hacker steals the victims browser cookie which is used to authenticate a user on a website and uses to it to access victims account, Session hijacking is widely used on Lan's. I have already written a three part series on How session hijacking works? and also a separate post on Facebook session hijacking.


5. Sidejacking With Firesheep


Sidejacking attack went common in late 2010, however it's still popular now a days, Firesheep is widely used to carry out sidejacking attacks, Firesheep only works when the attacker and victim is on the same wifi network. A sidejacking attack is basically another name for http session hijacking, but it's more targeted towards wifi users.

To know more about sidejacking attack and firesheep, read the post mentioned below:

6. Mobile Phone Hacking



Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are lots of Mobile Spying softwares used to monitor a Cellphone.

The most popular Mobile Phone Spying softwares are:

1. Mobile Spy
2. Spy Phone Gold

7. DNS Spoofing 


If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original facebook.com page to his own fake page and hence can get access to victims facebook account.




8. USB Hacking 

Usb password stealer
If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the browser, I have also posted related to this attack which you can read by accessing the link below:
9. Man In the Middle Attacks


If the victim and attacker are on the same lan and on a switch based network, A hacker can place himself b/w the client and the server or he could also act as a default gateway and hence capturing all the traffic in between, ARP Poisoning which is the other name for man in the middle attacks is a very broad topic and is beyond the scope of this article, We have written a couple of articles on man in the middle attacks which canb be accessed from the links mentioned below:
If you are really interested in learning how man in the middle attacks, you can view the presentation below by oxid.it.

10. Botnets 


Botnets are not commonly used for hacking facebook accounts, because of it's high setup costs, They are used to carry more advanced attacks, A botnet is basically a collection of compromised computer, The infection process is same as the keylogging, however a botnet gives you, additional options in for carrying out attacks with the compromised computer. Some of the most popular botnets include Spyeye and Zeus.


Facebook Hacking Course
Facebook hacking course is a facebook security course created by me, which tells you exactly how how hackers can compromise your facebook accounts and what can you do to protect your facebook accounts from getting hacked.



Hope you have enjoyed reading the post as much i did while writing.

Note: Copying or reproducing this article is strictly prohibited and will lead to certain consequences, If you are reproducing or copying this article, make sure that you give a proper credit.

How to WiFi hack PRO v1.2.5 for All Mobile Phones tricks & HACKS 2010


                               bybass all type of WiFi connection.


click here    :-  click me             
 Attached Files :-  download here

How To Hack Idea Free GPRS(Idea Hack for Free GPRS )

This is the new trick for the user of idea cellular.
cell phone or pc/laptop.....

Before starting the detailed procedure these things described as


#1... YOU MUST NOT HAVE CONNECTION !
#2... YOU MUST NOT HAVE ANY ACTIVE PLANS OF GPRS/INTERNET !
#3... YOU MUST HAVE PREPAID CONNECTION !( USING OF THIS TRICK IN

POST PAID WILL LEAD TO YOU HIGHER AMOUNT OF BILL )
#4... YOU MUST HAVE TO USE S60 DEVICES OR HIGHER..NEVER USE THIS

TRICK FOR THE S40 DEVICES(FOR CERTAIN S40 DEVICES THIS TRICK

WORKS)
#5... THIS TRICK HAS BEEN TESTED SUCCESSFULLY IN NOKIA AND SONY

ERICSSON DEVICES !

NOW COME TO THE PROCEDURE TO GET FREE INTERNET:

From your idea cell phone type GP13 and send it to 4444.
now you will receive that your GP13 pack will be activated within

24 hours...
now wait for 12 to 16 hours..
now send the same sms to 4444..
you will receive that your request has been already registered.
now again after 24 hours you will find that your GP13 pack has

been activated...!!!

BUT thats not a trick...yes because you have been have been

charged 13 rs because of activation of GP13..
real trick starts now..

After successfull activation of GP13 pack just send NOGP13 to

4444.(4444 No is free of charge)
you will receive that your GP13 pack will be deactivated within

24 hours..
now after just 10 to 12 hours of sending dectivation sms again

send GP13 to 4444..

now its enough ...you have completed your all steps to get free

internet..
its because due to last activation sms after deactivation sms

system will be hacked!!!System isnt able to take decision what to

do!!

now after some time of sending sms for activation just reboot

your system from file explorer..

now restart your device/cell..you are able to surf free..

but note that if you are using cell phone than use opera mini or

uc web browser and if you are using pc/laptop than use smart web

browser or opera 9.27.

if you wish to use proxy for your opera than you must have to use

the proxy given below.....

1.
i.p.Adderss: 12.148.192.178
Port :1080(common for all)

2.
i.p.Adderss: 63.127.192.178

3.
i.p.Adderss: 199.105.112.152

4.
i.p.Adderss: 199.105.112.163

5.
i.p.Adderss: 12.148.162.37.......

Free Calling Worldwide 100% Working


In this tutorial i am going to show you how to make free world wide phone calls and talk as long as you like

Lets start:
YOU WILL NEED JAVA INSTALLED IN YOUR PC

IF YOU NOT HAVE JAVA DOWNLOAD FROM HERE
THEN
First of all download FriendCaller from Here.

After it is fully installed, open friend caller from desktop. Then register. check email and verify account otherwise you will be not able to call though you have free credits



Then go to your email and confirm your account and you will be credited $ 0.10 for free calls. So you can only call for 10 seconds for free but this what I made this tut so you can call free.

Now login with your account.
Then click on the phone icon.


Now comes the great part. Download a software called Cheat Engine from here.

Run the software and click on "Open Process".


Then click on window list.


Select friend caller, and open it.


Now dial number in friend caller. [First test your own number] and click call.


It will start ringing...


Now in Cheat Engine, enable speed hack. Edit speed to 0.00 and click "Apply"



Now enjoy your call. The timer will freeze. You can talk as much as you want. When you finish call, you will be only charged 0.02 but after your balance is finished, make new account and enjoy.

How To Hack Your Device In Under 5 Minutes

Having to sign an application every time you want to install something that’s not Symbian Signed is a bit of a pain, yes it can be done on the phone but if you want to completely rid yourself of this hassle then hacking your device is the best way forward. Unfortunately, Nokia had blocked this procedure via a new firmware for devices such as the E71, N96 and devices like the N97 were previously unhackable.
However, the Symbian community has once again managed a breakthrough in the from of the spanking new HelloOX2 application and you can hack almost any S60 3rd or 5th Edition device, Samsung i8910 HD included. This simple app will help you hack your device in under 5 minutes, all from the comfort of your bed without needing a computer. Difficulty level- Noob. Here’s how:
  • Extract the contents. I used X-plore to do so, but you can use any application of your choosing or even extract it on the computer and then send the file to your phone.
How To Hack Nokia N97
  • Sign the application with a 17 capability developer certificate which you can easily get by following this post. Next sign the application on the phone itself, using the Free Signer application.
  • Next run the application, you will see quite a few screens like the following appear:
How To Hack Nokia N97
How To Hack Nokia N97
How To Hack Nokia N97
  • Now you will be asked if you want to install Modo, a file manager with the capability of seeing all files, including the ones in the ‘Sys’ folder. Installing it or not will not affect the hack, I chose to install it. The application will then quit and your phone would be ‘hacked’.
How To Hack Nokia N97
  • But before you can install any unsigned application, you will need to open ‘ROM Patcher’ from the ‘Applications’ folder and activate the ‘Installserver_FP2′ patch.
How To Hack Nokia N97
  • Hit Options and then ‘Apply’. That’s it. You can now forget about signing files.
How To Hack Nokia N97
  • Lastly, a word of caution. Please be very careful in what unsigned files you install. Wares and applications from untrusted sources can damage your device. Also, please do this at your own risk.

Best Latest Mobile Phone Hacking With BlueHack 001V

Hello friends, in this article I will show you how to hack mobile phone with simple software called Super Bluetooth Hack v. 1.08 . Once connected to a another phone via bluetooth you can do the following:
1) Call from his phone. It includes all call functions like hold etc.
2) Read his messages
3) Read his contacts
4) Change profile
5) Play his ringtone even if phone is on silent
6) Play his songs(in his phone)
7) Restart the phone
8) Switch off the phone
9) Restore factory settings
10) Change ringing volume

Follow the steps:
1) Download the Super Bluetooth Hack V1.07.
2) Unzip the file and send it to your mobile phone.
3) Install the software in your mobile phone.
4) Inquire new devices through the software.
5) When connecting devices use a code 0000

Steve Jobs: Android is a stolen idea!

Nexus and iPhone
We are somehow sure that the upcoming biography of Steve Jobs will reveal many interesting facts and ideas valuable and intriguing to Apple users and fans. Author of this biography, Walter Isaacson was authorized by Steve Jobs himself to write this biography, as Jobs wanted to reveal more about himself to his family and his friends as wells as to all Apple users and fans.
Isaacson has released an excerpt to the public where Jobs revealed hist thoughts about HTC and its iPhone like products. His deep impression was that HTC stole ideas and solutions from Apple to launch their own smartphone contender. Jobs reaction to this was very emotional and he claimed that he will do whatever necessary to fight this. He has gone even so far as to promise that he will finally destroy Android, because it is a theft from Apple.
Jobs has told to Google CEO Eric Schmidt that he isn’t interested in getting money from Google. Money is not what Apple wants no matter the sum offered. Jobs main goal was to stop Android exploiting Apple’s ideas.
If you are following the developments in this continuous fight between Apple and Android you will known that the legal battle is continuing with law suits and counter law suits between Apple on one side and HTC, Samsung and other Android device manufacturers quietly supported by Google on the other side.

How To Hack Siri To Use Twitter, Facebook Or Google+



How To Hack Siri To Use Twitter, Facebook Or Google+
Siri’s an amazing advancement in the way that we interact with out iPhones, but it doesn’t exactly do everything you want it to do out of the box. In fact, three conspicuous abilities absent from Siri’s feature set include the ability to make a Facebook status update, send a message to Google+ or even tweet… doubly absurd given iOS 5”s native Twitter integration.
Don’t worry, though. It’s easy enough to hack any iPhone 4S to Tweet, Facebook or Google+ through Siri. Here’s how.

Techland gives us a great run down of easy Siri hacks that will get you up and running with voice control Twitter, Facebook and Google+ in no time:
For Facebook, text “Hello” to 32665 in the United States (or the short code for whatever country you’re in), then follow the link in the reply to finish the setup process. Add the short code to your Contacts, and name it “Facebook.” That way, you can tell Siri to “send a text to Facebook saying …”
For Twitter, text “START” to 40404 in the United States (or the short code for other countries), then respond with your username, then your password. Add the short code to your Contacts with the name “Twitter.”
For Google+, visit your settings page and scroll down to “Set delivery preferences.” Add your cell phone number, but be sure to click “don’t notify me” if you don’t want incoming Google+ messages by text. Verify your number with the code you receive by phone, then add the short code “33669” (in the U.S.) to your contacts as “Google Plus.” Updates are shared with everyone in your circles.

How To Hack Mobile Phones Through Bluetooth

Yes guys it is the mobile bluetooth hacker. It is a software which can be used to hack any mobile phone through bluetooth network. Once connected to a another phone via bluetooth you can do the following:
1) Call from his phone. It includes all call functions like hold etc.
2) Read his messages
3) Read his contacts
4) Change profile

5) Play his ringtone even if phone is on silent
6) Play his songs(in his phone)
7) Restart the phone
8) Switch off the phone
9) Restore factory settings
10) Change ringing volume
Notes:
1.) When connecting devices use a code 0000
2.) At start of programming on smartphones do not forget to turn on bluetooth before start of the application
What else you want
Just go and downlaod it
download
enjoy and keep visiting us

How Hackers hacks your cell phone to get information?? How Hackers spy conversations of your cell phone??

 
 













Hackers can get your information, and even spy on your conversations all through your cell phone.
Have you ever put your phone down for a few minutes, maybe left it on your desk, or on the table at a restaurant while you head to the ladies room?

If you’ve ever left it unattended you’re at risk.

When your phone rings, you answer. But your phone can pickup without making a sound, and turn into a hidden microphone.

Expert Tom Slovenski explains, “You can hear everything that is going on in the room.“
It happened to the Kuykendall family in Washington State. “They’ve totally taken over the phone,“ Heather Kuykendall says. And it was hard to convince authorities something was going on. “I can’t sleep at night I worry constantly,“ she says.

More on their story visit here

Tom Slovenski, with Cellular Forensics knows it can happen. He’s one of the leading experts in the US, who trains private detectives, law enforcement officers and members of the military on phone forensics—how to flush out spyware and go after the hackers.

Spyware works fast, if you’re at a bar and you’re busy dancing and having a fun time, and you leave your phone here, it only takes a creep 5 minutes to grab your phone load software and turn your phone into their personal spying device.
Corporations are getting worried about guarding secrets shared in important meetings. There is only one failsafe way to do that.

David, the Chicago based detective explains: “If you’re having an important meeting or something that you definitely don’t want anything getting out about is to actually remove the battery from your phone. That’s the number one thing to do. “

Protecting your phone from a spyware attack is free and simple.

“If you simply put a password on your phone its going to protect you from the majority of what is out there,“ Robert Kresson said.

Tom Slovenski says it’s simple. “It’s four digits and you’re in.“

The danger will escalate our expert says, with the launch of mobile banking from your phone… when that happens the incentive to hack into your phone, will multiply a lot faster than any interest on your accounts.

So what can you do to protect yourself? The free solution… set the password on your phone.

How to protect your phone:
  • Put a password on your phone
  • Turn off blue tooth when not using it.
  • Don’t go to websites or click on links you don’t trust

Unlimited free call hack, India ,UK, Germany and Many more

Hii! This is Pc Hackers Guru Know Many about Hacking

How To do Practical WiFi Hacking Using Mobile Phones

Hii! This is Pc Hackers Guru Know Many about Hacking
In order to steal your data trough a rogue access point attack, a hacker needs only to overpower the local Wi-Fi access point and have your laptop associate with his evil network rather than the public one. You will still be connected to the Internet, except all your personal data will pass through the hacker’s computer which acts as a man-in-the-middle.

To run a successful rogue access point attack you need to control DNS and Internet traffic, as well as be able to sniff that traffic, and in the past that required another laptop. But Cnet’s reporter, Robert Vamosi presents a mobile phone scenario outlined by Carl Banzhof, VP and chief technology evangelist for McAfee during the RSA Conference 2007 in San Francisco.

Mobile phones vs laptops

The market for smart phones, some with the memory and capacity of a small laptop, continues to grow everyday.
Banzhof cites that many mobile devices today currently or will soon support Bluetooth, infrared, GPRS/EDGE, and Wi-Fi 802.11 technology. The market is evenly split in operating systems between Blackberry OS, Palm OS, and Windows Mobile, with the latter capable of running Internet Information Server (IIS). It's the Windows Mobile OS that interested Banzhof most.

The advantages of using a mobile device in an evil twin attack instead of a bulky laptop are many: mobile devices are easily camouflaged, portable, and can allow close proximity to the intended victim. Mobile devices are rapidly becoming transparent; everyone has one, so what's the big security concern?

Creating a mobile access point

To carry out this mobile evil twin attack, Banzhof chose the T Mobile MDA for his experiment. It runs Windows Mobile 5.0 as its operating system. It uses a TI OMAP 850 processor, so it has enough oomph, and it includes an 802.11 chipset, TI ACX100. Best of all, it has a robust developer community.

Banzhof faced a number of technical challenges--in part because most of the tools were written for Linux, not Windows Mobile. He looked around for other work done on WinCE and Windows Mobile 5 and found none. He considered converting the device to Linux but decided that violated the spirit of the project. He found some Linux projects that could be ported over, namely Hostapd and Karma. He started to use Visual Studio 2005 to compile the new code by hand, and instead found an open-source tool, CeGCC, to cross compile.

Devil in the details
By using Hostapd, Banzhof had many user-space 802.11 functions at his disposal, such as user authentication, encryption, initializing a network interface, beacon intervals to call out to susceptible laptops, and Extended Authoritization Protocol (EAP) keys. It also gave him an interface into the ACX100 driver (which handles the 802.11 protocol) so he could handle the management, transmission, and reception of wireless data packets. But again, there were problems. The open source app, CeGCC, doesn't always work right so he had to improvise, and wireless card selection for Hostapd was limited and didn't exist for the mobile device form factor.

The IIS for Windows Mobile server posed similar challenges. ISS for Windows Mobile supports Active Server Pages and ISAPI, with configurable options found in the system registry for allowing ports, creating virtual directors, and controlling bandwidth.

Testing it out
Banzhof reported to the RSA conference that he'd successfully ported Hostapd to Windows CE, he had his DHCP/DNA Server operational, and his Web server was online. He hopes in the future to route his sniffed Internet traffic to legitimate access points or via smart phone radio (EDGE) for further analysis.

Banzhof also hinted that similar hacks could be carried out with the new iPhone from Apple, given that many of the tools he used already run on Unix and Linux. Never mind that Apple promises that the iPhone will be a closed system. Banzhof noted that hasn't stopped anyone before.

How To Hack Your Friends Mobile Phone

Hii! This is Pc Hackers Guru Know Many about Hacking
  • log into your friends mobile
  • read his messages
  • change his phone settings- read his messages
  • change profile
  • play his ringtone even if phone is on silent
  • play his songs(in his phone)
  • restart the phone
  • switch off the phone
  • restore factory settings
  • change ringing volume
  • call from his phone




Ok so how the hell to do this Ok for starters this is no hack. It uses bluetooth's existing functionality to access the features being talked about.

Prerequisites:
  • The other phone must be bluetooth enabled(most are these days)
  • The other phone must have bluetooth on(Surprisingly a lot of people always have it on, in spite of the fact that you should never have it on, it eats you battery. How many people, a BBC panaroma program some time back used this to find out that more than 60% of people have left bluetooth on
  • Unless the other person configured it that way, you do require permission to pair once. So you need to be paired with the other phone once to use this hack next time without anyone's knowing. (Thats why its hack your friends mobile, your friend might have paired you already

Download: Super Bluetooth Hack


Usage:
  • On series 60, install directly
  • If you have a cellphone like series 40 (Nokia 6230) with bluetooth and Java 2 support make .jad file with jad generator (included on package).
  • When connecting devices use a code 0000
  • Before starting the application on smartphones do not forget to turn on bluetooth.
----------------------------------------------

Some software for bluetooth hacking to hack any bluetooth enabled phone or device.

Hii! This is Pc Hackers Guru Know Many about Hacking

Bluetooth provides an easy way pf communication for a wide range of mobile devices to communicate with each other without the need for cables or wires and transfer files in between them.
Note: But it can be a potential threat for a person privacy.
There are large amount of information that is available on internet about on how you can hack various blue tooth enabled devices.
So Today i am going to list out some Freewares For Blutooth Hacking.

Various Softwares For Bluetooth Hacking
BlueScanner – It search out for Bluetooth devices and extract much amount of information of the newly discovered device. Download BlueScan.
BlueSniff – It is a simple utility for discovering hidden Bluetooth devices. Download BlueSniff.
BlueBugger -It simply exploits the BlueBug vulnerability of the bluetooth enabled devices. By exploiting these vulnerabilities and leakes, you can gain access to the phone-book, calls lists and other information of the bluetooth device. Download BlueBugger.
BTBrowser – Is a Bluetooth Browser is a J2ME app. which can browse and explore all the  surrounding Bluetooth devices. Browse to different kind of device information. Download BTBrowser.
BTCrawler -It is a Bluetooth scanner for Windows Mobile based devices. It can implement BlueJacking and BlueSnarfing attacks. Download BTCrawler.
If you find any of the above utilities usefull leave a comment here.

How to Make FREE Calls to Landline and Mobile phones

Hii! This is Pc Hackers Guru Know Many about Hacking
Make FREE calls quickly
Simply type gizmocall.com/18005551212 into your browsers address bar.
(put the number you want to dial in place of 18005551212)
Make FREE calls to landline and mobile phones in over 60 countries by participating in the All Calls Free plan.
Users NEW to the All Calls Free plan get 20 minutes of free calling simply by getting ONE friend to sign up for a new Gizmo account. There are no commitments and no hidden fees.

Get Started Now!
  1. Tell a friend to download Gizmo5 and have them add their phone number to their profile.
    img-calls-1 Free Calls
  2. Add each other to your contact lists and you can call that person for FREE using Gizmo5.
    img-calls-3 Free Calls
  3. Be sure to make at least 1 Gizmo5 to Gizmo5 call per week or your free minutes will expire.
    img-calls-free-app Free Calls

  • Download Softwares

1 poivY Rates downloadnow Free Calls Kuwait
2 VoipBuster Rates downloadnow Free Calls Thailand
3 VoipStunt Rates downloadnow Free Calls UK, USA
4 InternetCalls Rates downloadnow Free Calls Egypt, Pakistan
5 InterVoip Rates downloadnow Free Calls Iraq, Lebanon, Palestine, Qatar, Sudan
6 LowrateVoip Rates downloadnow Free Calls Bangladesh, Jordan, Indonesia, Iraq, Malaysia Thailand, UK, USA
7 FreeCall Rates downloadnow Free Calls Russia
8 SMSListo Rates downloadnow Free Calls Sudan, Syria, China
9 WebCallDirect Rates downloadnow Free Calls India, Pakistan, Philippines, Malaysia
10 JustVoip Rates downloadnow Free Calls Russia
11 12Voip Rates downloadnow Free Calls Bahrain, China, Sri Lanka
12 DialNow Rates Phone-to-Phone Use if you live in a FREE Call Country!.
13 nonoh Rates Phone-to-Phone Use if you live in a FREE Call Country!.
14 VoipWise Rates downloadnow Free Calls
15 BudgetSIP Rates downloadnow Free Calls We create your SIP account.
16 Calleasy Rates Phone-to-Phone Web Call
17 SIPDiscount Rates for SIP Devices
18 SMSdiscount Rates downloadnow Free Calls India, Morocco, Turkey
19 VoipCheap Rates downloadnow Free Calls
20 VoIPRaider Rates downloadnow Free Calls

Recommend us on Google!

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More