Pages

Showing posts with label Information. Show all posts
Showing posts with label Information. Show all posts

Friday, March 2, 2012

How to Use Windows 7 Without Activation

Most of you might be aware of the fact that it is possible to use Windows 7 and Vista for 120 days without activation. This is actually possible using the slmgr -rearm command which will extend the grace period from 30 days to 120 days. However in this post I will show you a small trick using which it is possible to use Windows 7 without activation for approximately an year! Here is a way to do that.
1. Goto “Start Menu -> All Programs -> Accessories” . Right click on “Command Prompt” and select “Run as Administrator“. If you are not the administrator then you are prompted to enter the password, or else you can proceed to step-2.
2. Now type the following command and hit enter
slmgr -rearm
3. You will be prompted to restart the computer. Once restarted the trial period will be once again reset to 30 days. You can use the above command for up to 3 times by which you can extend the trial period to 120 days without activation.
4. Now comes the actual trick by which you can extend the trial period for another 240 days. Open Registry Editor (type regedit in “Run” and hit Enter) and navigate to the following location
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform

5. In right-side pane, change value of SkipRearm to 1.

6. Now you will be able to use the slmgr -rearm command for another 8 times so that you can skip activation process for another 240 days. So you will get 120 + 240 = 360 days of free Windows 7 usage.

120 days using “slmgr -rearm” command before registry edit
+
240 days using “slmgr -rearm” command after registry edit
= 360 Days

Hope you like this .......
post.

What to Do When Your Email Account is Hacked?

How to Recover Hacked Email Accounts?

Email Hacked?It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures to get back your hacked email account.

For Gmail:

It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try.
Step -1: Try resetting your password since it is the easiest way to get your account back in action. In this process Google may ask you to answer the secret question or may send the password reset details to the secondary email address associated with your compromised account. You can reset you password from the following link
If you cannot find success from the Step-1 then proceed to Step-2.
Step-2: Many times the hacker will change the secret question and secondary email address right after the account is compromised. This is the reason for the Password Reset process to fail. If this is the case then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like
1. Email addresses of up to five frequently emailed contacts
2. Names of any 4 Labels that you may have created in your account
3. List of other services associated with your compromised account
4. Your last successful login date
5. Account created date
6. Last password that you remember and many more…
You need to fill out this form as much accurately as possible. It is obvious to forget the dates of last login, account creation and similar terms. However you need to figure out the closest possible date/answers and fill out this form. This is your last chance! The more accurate the information filled out in the recovery form, the more the chances of getting your account back. You may reach the account recovery page form the following link

For Yahoo and Hotmail:

Unfortunately for Yahoo/Hotmail there is no second option like filling out the form or contacting the support team. All you need to do is either answer the secret questions that you have setup or reset the password using the secondary email option.
To initiate the password reset process just click on the Forgot password link in your login page and proceed as per the screen instructions.
I hope this post will help you recover the lost account.

How to Hide Data in Image, Audio & Video Files: Steganography

Ever wondered to know how to hide secret messages in images, audio and video files? Well, in this post I will take you through a concept called steganography using which, it is possible to hide your secret information in image files, songs or any other file of your choice. At the end of this post, you can also download free stegnographic tools and start hiding your data.

What is Steganography?

Steganography is a means of obscuring data where secret messages are hidden inside computer files such as images, sound files, videos and even executable files so that, no one except the sender and the receiver will suspect the existence of stealth information in it. Steganography may also involve the usage of cryptography where the message is first encrypted before it is concealed in another file. Generally, the messages appear to be something else such as an image, sound or video so that the transfer of secret data remains unsuspected.
The main advantage of steganography over other methods such as cryptography is that, it will not arose suspicion even if the files fall in the hands of a third party. Unlike cryptographic messages, stegnographic messages will no way attract the attention of a third party by themselves. Thus stegnanography has an upper hand over cryptography as it involves both encryption and obscurity.

What are the Applications of Steganography?

Steganography is mainly used to obscure confidential information/data during storage or transmission. For example, one can hide a secret message in an audio file and send this to another party via email instead of sending the message in the textual format. The receiver on the other end will decrypt the hidden message using the private decryption key. In a worst case scenario, even if a third party does manage to gain access to the email, all he can find is the audio file and not the hidden data inside it. Other usage of steganography include digital watermarking of images for reasons such as copyright protection.
Eventhough steganography has many useful applications, some may use this technique for illegitimate purposes such as hiding a pornographic content in other large files. Roumors about terrorists using steganography for hiding and communicating their secret information and instructions are also reported. An article claiming that, al-Queda had used steganography to encode messages in images and transported them via e-mails, was reported by New York Times, in October 2001.

How do Steganography Tools Work?

Stegnography tools implement intelligent algorithms to carefully embed the encrypted text messages or data inside other larger files such as an image, audio, video or an executable file. Some tools will embed the encrypted data at the end of another file so that there will be enough room for storing larger data.
There are many steganography tools available online but only a few are able to work flawlessly. I did not find any tool that worked perfectly on both small and large data. However I have managed to develop my own tool that can work perfectly on all types of files and all size of data. The tool is called “Stego Magic“. You can download it from the following link.
Download Stego Magic

The zip file contains two versions of Stego Magic: One for encrypting the text messages and the other for encrypting binary files. StegoMagic_TXT can be used to hide text messages in other files such as an image or a sound file. StegoMagic_BIN can be used to hide one binary file in another such as an executable file inside an image or an image inside a video file.
With Stego Magic, there is no limitation on the size and type of the file that you are intending to hide. For example, you can hide a video of size 1 GB in an image of size 1 MB or hide an executable file inside a WORD document. The tool is pretty straightforward to use and requires no special understanding of the concept.
At the end of the encryption process, a secret decryption key will be generated and the same is required during the decryption process.

How to Use Stego Magic?

Suppose you want to hide a text message inside a JPG file:
1. Place the JPG and the text file (.txt) in the same folder as that of StegoMagic_TXT.exe
2. Run StegoMagic_TXT.exe and follow the screen instructions to embed the text message inside the JPG image.
3. Note down the secret decryption key.
Now you can send this image to your friend via email. To decrypt the hidden message, your friend should load this JPG file onto the Stego Magic tool and use the secret decryption key.
I hope you enjoy this post :) . For queries and feedback, please pass your comments .

How to Install Windows 7 From a USB Drive

Installing Windows from a USB flash drive has several advantages – First of all, the overall speed of the installation process will increase significantly, carrying a USB stick is much more convenient than a DVD, and finally it becomes possible to install the OS even on those systems that do not have a DVD drive, such as a netbook.
In this post, I will show you how to load the Windows installation on to your USB flash drive and make it bootable just like the DVD.
Tools Required:
1. USB flash drive with a minimum capacity of 4 GB.
2. Windows 7 set-up DVD.
Step-1: Plug-in your USB flash drive and backup all the existing data in it.
Step-2: Open the command prompt. If you are using Windows 7/Vista then open it with administrator rights*.
* Goto Start -> All Programs -> Accessories -> Right-click on “Command Prompt” and select “Run as Administrator”.
Step 3: In the command prompt, type in the following command:

DISKPART

This will start the Microsoft DiskPart utility as shown below:
Microsoft DiskPart

Now issue the following command:

LIST DISK

This will show you a list of available disks on your system. Disk 0 is usually the hard disk. In my case, Disk 5 is the USB drive (this can be a different one in your case). Now issue the command as shown below:
SELECT DISK 5

Install Windows 7 from USB

NOTE: In the above command, 5 is the USB drive number on my system. If you have a different number on your system, then you need to replace 5 with that number.
Step-4: Now issue the following list of commands one by one as shown below:

CLEAN

CREATE PARTITION PRIMARY

SELECT PARTITION 1

ACTIVE

FORMAT FS=NTFS QUICK

ASSIGN

EXIT

Install Windows 7 from USB

Minimize the command prompt and proceed to the next step.
Step 5: Insert the Windows 7/Vista installation disc and note down the “drive letter” of your DVD drive. In my case, it is “H:”. Now type the following list of commands as shown below:

H: CD BOOT
CD BOOT
BOOTSECT.EXE /NT60 M:(NOTE: M: is your USB drive letter)
EXIT

Win 7 from USB flash drive






Step-6: Copy the contents of your Windows 7/Vista installation disk into the USB flash drive.
That’s it! Your USB stick is now ready to boot and install the OS for you. Don’t forget to enable the “USB Boot” option and change the “boot priority to USB device from hard disk” in your BIOS settings.
I hope you like this post. Pass your comments to express your opinion. :)

 

How- To Bypass the Passwords in Windows

This post is about an interesting hack to bypass the login passwords in Windows. Application of this hack will result in Windows logging you on everytime as a certain user Follow the steps mentioned below to apply this trick
  • Click Start -> Run.
  • Type Control userpasswords2
  • Press Enter.
  • Click to uncheck the box labelled ‘ Users must enter a user name and password to use this computer’.
  • Press OK.
  • Enter the username and password in the box that appears.
  • Click OK.

Bluetooth hacking tools.....

Bluetooth is one of the most rapidly growing connection technology. If you are someone who is planning to gain better understanding of Bluetooth Security, you will need some essential tools. This article lists down the Essential Bluetooth Hacking Tools.
1.) BlueScanner: BlueScanner searches out for Bluetooth-enabled devices. It will try to extract as much information as possible for each newly discovered device.
2.)BlueSniff: BlueSniff is a GUI-based utility for finding discoverable and hidden Bluetooth-enabled devices.
3.) BTBrowser: Bluetooth Browser is a J2ME application that can browse and explore the technical specification of surrounding Bluetooth-enabled devices. You can browse device information and all supported profiles and service records of each device. BTBrowser works on phones that supports JSR-82 – the Java Bluetooth specification. .
4.) BTCrawler: BTCrawler is a scanner for Windows Mobile based devices. It scans for other devices in range and performs service query. It implements the BlueJacking and BlueSnarfing attacks.
5.) BlueBugger: BlueBugger exploits the BlueBug vulnerability. BlueBug is the name of a set of Bluetooth security holes found in some Bluetooth-enabled mobile phones. By exploiting those vulnerabilities, one can gain an unauthorized access to the phone-book, calls lists and other private information..
6.) CIHWB: Can I Hack With Bluetooth (CIHWB) is a Bluetooth security auditing framework for Windows Mobile 2005. Currently it only support some Bluetooth exploits and tools like BlueSnarf, BlueJack, and some DoS attacks. Should work on any PocketPC with the Microsoft Bluetooth stack.
7.) Bluediving: Bluediving is a Bluetooth penetration testing suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, has features such as Bluetooth address spoofing, an AT and a RFCOMM socket shell and implements tools like carwhisperer, bss, L2CAP packetgenerator, L2CAP connection resetter, RFCOMM scanner and greenplaque scanning mode..
8.) Transient Bluetooth Environment Auditor: T-BEAR is a security-auditing platform for Bluetooth-enabled devices. The platform consists of Bluetooth discovery tools, sniffing tools and various cracking tools.
9.) Bluesnarfer: Bluesnarfer will download the phone-book of any mobile device vulnerable to Bluesnarfing. Bluesnarfing is a serious security flow discovered in several Bluetooth-enabled mobile phones. If a mobile phone is vulnerable, it is possible to connect to the phone without alerting the owner, and gain access to restricted portions of the stored data.
10.) BTcrack: BTCrack is a Bluetooth Pass phrase (PIN) cracking tool. BTCrack aims to reconstruct the Passkey and the Link key from captured Pairing exchanges.
11.) Blooover II: Blooover II is a J2ME-based auditing tool. It is intended to serve as an auditing tool to check whether a mobile phone is vulnerable.
12.) BlueTest: BlueTest is a Perl script designed to do data extraction from vulnerable Bluetooth-enabled devices.
13.) BTAudit: BTAudit is a set of programs and scripts for auditing Bluetooth-enabled devices.

Friday, February 24, 2012

Feds request DNS Changer extension to keep 400K users online


Computerworld - Officials with the U.S. government have asked a New York judge to extend an impending deadline that could sever ties to the Internet for hundreds of thousands of users infected with the "DNS Changer" malware.
DNS Changer, which at its peak was installed on more than four million Windows PCs and Macs worldwide -- a quarter of them in the U.S. alone -- was the target of a major takedown last November organized by the U.S. Department of Justice.
The malware hijacked users' clicks by modifying their computers' domain name system (DNS) settings to send URL requests to the criminals' own servers, a tactic that shunted victims to hacker-created sites that resembled the real domains.
As part of "Operation Ghost Click," the FBI seized more than 100 servers hosted at U.S. data centers. To replace those servers -- and allow infected computers to use the Internet -- a federal judge approved a plan where substitute DNS servers were deployed by the Internet Systems Consortium (ISC), the non-profit group that maintains the popular BIND DNS open-source software.
Without that move, DNS Changer-infected systems would have been immediately cut off from the Internet.
Last week, authorities filed a request with a New York federal court asking that the replacement servers operate until July 9.
Previously, U.S. District Court Judge William Pauley had said the ISC must pull the plug on the stand-in servers on March 8.
That was thought sufficient time for consumers, enterprises and Internet service providers (ISPs) to scrub systems of the malware and restore valid DNS settings.
Apparently not.
"Extending the operation of the Replacement DNS Servers will provide additional time for victims to remove the malware from their computers, thereby enabling them to reach websites without relying on the Replacement DNS Servers," the government's request read.
According to the extension request, the substitute DNS servers were keeping an average of 430,000 unique IP addresses connected to the Web last month. Each IP address represented at least one computer, and in some cases, numerous machines.
Both the office of the U.S. Attorney for the Southern District of New York -- the jurisdiction prosecuting the case -- and the FBI have fielded calls from victims saying that they need more time to clean up their computers before the replacement DNS servers are shut down.
"In a communication dated January 27, 2012, a representative of one ISP estimated that approximately 50,000 of its customers are infected with the malware," the government said. "According to [that] ISP, absent continued operation of the Replacement DNS Servers, its customers are at risk of being unable to access the Internet."
The FBI also needs additional time to finish notifying victims in foreign countries, the filing said.
Earlier this month, Tacoma, Wash.-based Internet Identity (IID) reported thatDNS Changer remained a potent threat months after the takedown. IID claimed that half of the firms in the Fortune 500, and a similar percentage of major U.S. government agencies, harbored one or more computers infected with DNS Changer, and so would be unable to access the Internet when the substitute servers were switched off.
Users who suspect that their computer is infected with DNS Changer can follow the detection and disinfection steps posted on the DNS Changer Working Group's website.
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.

Thursday, January 26, 2012

How to Change IP address



How to change your IP address in less than a minute? The following trick gives you a step-by-step procedure to change your IP address.




1. Click on “Start” in the bottom left hand corner of screen.

2. Click on “Run”.

3. Type in “command” and hit ok.You should now be at an MSDOS prompt screen.

4. Type “ipconfig /release” just like that, and hit “enter”.

5. Type “exit” and leave the prompt.

6. Right-click on “Network Places” or “My Network Places” on your desktop.

7. Click on “properties”.

You should now be on a screen with something titled “Local Area Connection”, or something close to that.

8. Right click on “Local Area Connection” and click “properties”.

9. Double-click on the “Internet Protocol (TCP/IP)” from the list under the “General” tab.

10. Click on “Use the following IP address” under the “General” tab.

11. Create an IP address (It doesn’t matter what it is. I just type 1 and 2 until i fill the area up).

12. Press “Tab” and it should automatically fill in the “Subnet Mask” section with default numbers.

13. Hit the “Ok” button here.

14. Hit the “Ok” button again. You should now be back to the “Local Area Connection” screen.

15. Right-click back on “Local Area Connection” and go to properties again.

16. Go back to the “TCP/IP” settings.

17. This time, select “Obtain an IP address automatically”.

18. Hit “Ok”.

19. Hit “Ok” again.

20. Now You have a new IP address.




Some ISPs do not support this type of procedure and hence there are chances of getting back the same old IP address even after trying this hack. In this case you need to switch off the modem and then switch it on to get the new IP address.

NOTE: All these tricks works only if you have a dynamic IP address. But if you have a static IP address you have no option to change your IP.

Enjoy....!!

Wednesday, January 11, 2012

World’s Top 10 rich people(men and women)



1.CARLOS SLIM HELU & FAMILY

Net Worth:$74 B
Age: 71
Title: Chairman
Organization: Telmex
Source: telecom, self-made
Residence: Mexico City, Mexico
Country of citizenship: Mexico
Education: BA/BS, Universidad Nacional Autonoma de Mexico
Marital Status: Widow
Children: 6

2.BILL GATES

Net Worth:$56 B
Age: 55
Title: Co-Chair
Organization: Bill & Melinda Gates Foundation
Source: Microsoft, self-made
Residence: Medina, WA
Country of citizenship: United States
Education: Dropout, Harvard University
Marital Status: Married
Children: 3

3.WARREN BUFFETT
Net Worth:$50 B
Age: 80
Title: CEO
Organization: Berkshire Hathaway
Source: Berkshire Hathaway, self-made
Residence: Omaha, NE
Country of citizenship: United States
Education: MS, Columbia University; BA/BS, University of Nebraska Lincoln
Marital Status: Widowed, Remarried
Children: 3

4.BERNARD ARNAULT
Net Worth:$41 B
Age: 62
Title: Chairman
Organization: Louis Vuitton Moet Hennessy (LVMH)
Source: LVMH, inherited and growing
Residence: Paris, France
Country of citizenship: France
Education: BA/BS, Ecole Polytechnique de Lausanne; BA/BS, Ecole Polytechnique de Paris
Marital Status: Married
Children: 5

5.LARRY ELLISON
Net Worth:$39.5 B
Age: 66
Source: Oracle, self-made
Residence: Woodside, CA
Country of citizenship: United States
Education: Dropout, University of Chicago; Dropout, University of Illinois at Urbana
Marital Status: Divorced
Children: 2

6.LAKSHMI MITTAL
Net Worth:$31.1 B
Age: 60
Title: Chairman
Organization: ArcelorMittal ADS
Source: Steel, inherited and growing
Residence: London, United Kingdom
Country of citizenship: India
Education: BA/BS, St Xavier’s College Calcutta
Marital Status: Married
Children: 2

7.AMANCIO ORTEGA
Net Worth:$31 B
Age: 75
Source: Zara, self-made
Residence: La Coruna, Spain
Country of citizenship: Spain
Marital Status: Married
Children: 3

8.EIKE BATISTA
Net Worth:$30 B
Age: 54
Title: CEO
Organization: EBX Group
Source: mining, oil, self-made
Residence: Rio de Janeiro, Brazil
Country of citizenship: Brazil
Education: Dropout, RWTH Aachen University
Marital Status: Divorced
Children: 2

9.MUKESH AMBANI
Net Worth:$27 B
Age: 54
Title: Chairman
Organization: Reliance Industries
Source: petrochemicals, oil & gas, inherited and growing
Residence: Mumbai, India
Country of citizenship: India
Education: Dropout, Stanford University; BA/BS, University of Bombay
Marital Status: Married
Children: 3

10.CHRISTY WALTON & FAMILY
Net Worth:$26.5 B
Age: 56
Source: Walmart, inherited
Residence: Jackson, WY
Country of citizenship: United States
Marital Status: Widow
Children: 1




Watch this video.....






Hope you like this and do not forget to comment....

Top 5 Security Tips To Protect Your Computer From USB Viruses




With increasing anti-virus security in place against email-aware viruses and malware, hackers are turning their attention to less well-defended routes such as USB drives. This is the latest method that’s used by hackers to torment innocent users. However, there are ways you can protect your computer from USB and Pen drive viruses.

1.Block USB Viruses


Invest in an excellent anti-virus program that has built in USB virus scan and remover. These anti-USB virus scan programs not only protect your computer from USB Autorun viruses but can also clean worms, Trojans and viruses in your USB memory sticks.You can try anti-virus programs for USB virus such as USB Virus Scan, USB Drive Antivirus and so on.

2.Disable Your Computer’s Autorun Feature

When you plug in a USB drive stick into your system, the Autorun feature initiates automatically. If your USB contains any virus programs, it’ll use the Autorun feature to infect your computer. To protect your computer, disable the Autorun feature.You can disable the Autorun feature via the Control Panel.
Alternatively, you can use antivirus software to disable and enable the Autorun feature whenever you want. Additionally, these USB blocking softwares allow system administrators to specify which removable storage drives users can access.

3.Update Your Device Driver

Keeping your USB device driver updated is a good way to ensure greater stability for your USB drives. While this won’t help eradicate USB viruses, USB device drivers are constantly updated to block viruses and deliver timely warnings. You can update your USB device drive from your Windows Computer Management feature in the Control Panel.

4.Use USB Firewall Software

USB firewalls prevent Windows OS from processing malicious programs when a virus infected portable USB device is opened. USB firewalls monitor only your USB devices, and not your CD and DVD drives. By using USB firewalls, you’ll be enabling a basic level of protection from the autorun.inf viruses that spread from portable USB devices.

5.Always Safely Remove USB Devices

Viruses are sometimes created via damaged documents. If you are transferring a set of files to your USB drive, make sure the transfer is complete before you eject the device. Always use the Safely Remove Hardware feature of Windows OS. This is because partially transferred or damaged files can in turn corrupt other files on your USB drive.

Hope you Like disssss.......

Saturday, December 31, 2011

Samsung Mobile Secret Codes



You can try these in case you downloaded corrupted or incompatible Java midlets or other media, which are causing problems with the phone.
*2767*JAVA# Java Reset and (Deletes all Java Midlets)
*2767*MEDIA# Reset Media (Deletes All Sounds and Pics)
*2767*WAP# Wap Reset
*2767*CUST# Reset Custom EEPR0M
*2767*FULL# Reset Full EEPR0M (Caution)
For example : *2767*JAVA# would be keyed in as *2767*5282#
Note : Not all codes will work with SGH-C100.


Other Samsung Codes
*#06# IMEI code
*#9998*4357# Help Menu
*#9998*5282# Java menu (GRPS/CSD settings for JAVA server)
*#9999#0# Monitor Mode
*#9999# or *#9998*9999# Software Version
*#8888# or *#9998*8888# Hardware Version
*#9998*746# or *#9998*0746# or *#0746# Sim Infos
*#9998*523# or *#9998*0523# or *#0523# Display Contrast
*#9998*842# or *#9998*0842# or *#0842# Vibration On (until you push OK)
*#9998*289# or *#9998*0289# or *#0289# Buzzer On (until you push OK)
*#9998*288# or *#9998*0288# or *#0288# Battery & Field Infos
*#9998*377# or *#9998*0377# Error log
*#9998*778# or *#9998*0778# or *#0778# Sim Service table
*#9998*782# show date and alarm clock
*#8999*638# show network information
*#9998*5646# change operator logo at startup
*#9998*76# production number
*#9998*968# view melody for alarm
*#9998*585# Non-Volatile Memory (NVM)
*#3243948# Digital Audio Interference Off
*#32436837# Digital Audio Interference On




SAMSUNG T100 SECRET CODES
============================
*#06# -> Show IMEI
*#9999# -> Show Software Version
*#0001# -> Show Serial Parameters


*2767*3855# -> Full EEPROM Reset ( THIS CODE REMOVES SP-LOCK!!!! but also change IMEI to 447967-89-400044-0, you must use CHGIMEI to restore it)


*2767*2878# -> Custom EEEPROM Reset
*#8999*228# -> Battery status (capacity, voltage, temperature)
*#8999*246# -> Program status
*#8999*289# -> Change Alarm Buzzer Frequency
*#8999*324# -> Debug screens
*#8999*364# -> Watchdog
*#8999*377# -> EEPROM Error Stack
*#8999*427# -> Trace Watchdog
*#8999*523# -> Change LCD contrast
*#8999*544# -> Jig detect
*#8999*636# -> Memory status
*#8999*746# -> SIM File Size
*#8999*778# -> SIM Service Table
*#8999*785# -> RTK (Run Time Kernel) errors
*#8999*786# -> Run, Last UP, Last DOWN
*#8999*837# -> Software Version
*#8999*842# -> Test Vibrator
*#8999*862# -> Vocoder Reg
*#8999*872# -> Diag
*#8999*947# -> Reset On Fatal Error
*#8999*999# -> Last/Chk
*#8999*9266# -> Yann debug screen (=Debug Screens?)
*#8999*9999# -> Software version




SAMSUNG V200 SECRET CODES


v200 Unlock Code-> *2767*7822573738#
*#9324# Netmon (press the hangup key to exit)
*#9998*JAVA# Edit GPRS/ CSD settings (S100 Only)
*#9998*Help# Help screen/ List of codes
*#9998*LOGO# Change operator Logo
*#9998*RTC# RTC Display
*#9998*Bat# Battery Status
*#9998*Buz# Turns Buzzer ON
*#9998*Vib# Turns Vibrator ON
*#9998*LCD# LCD Contrast
*#9998*9999# Softwre Version
*#9998*8888# Hardware Version
*#9998*377# NVM Error Log (?????)
*#9998*NET# SIM Network ID
*#9998*778# SIM Serv. Table
*#9998*SIM# SIM Info
*#9998*PN# Production No.
*#9998*968# Reminder Tune
*#9998*NVM# Displays Non-Volitile Memory Status
*#9999*C# ???????????????????
*#06# Displays phones I**I No.
***/// ***/// NOTE /// *** RED COLOR , they appear serious !!! Use at
own risk !!!
*#9998*2576# Forces SIM Error
*#9998*DEAD# Forces Phone Crash
*2767*MEDIA# Resets the medis on the phone (deletes all downloaded
pics/tones)
*2767*FULL# Resets the EEPRON *DANGEROUS*
*2767*CUST# Resets the Custom EEPRON
*2767*JAVA# Resets JAV downloads (deletes all downloaded midlits)
*2767*STACKRESET# Resets Stack
*2767*225RESET# ????????????????? * Dangerous *
*2767*WAP# Resets WAP Setting & Deletes Favorites


SAMSUNG A800 SECRET CODES


The universal unlock code is *2767*637# do this with out your sim in
By default, the firmware (software) for x600 only receives java
apps and other applications like stuff by serial port.
but even for it, you have to enable the serial port, which also
causes
the closing of all other ports, even the IrDA too :-( ..
well, guess what, i have very good news for you,
do you know, you can increase the sound level,
the sound level for tones, speaker fone, etc,
can be increase even then if it is at max (level 4)
you still can do it,
just follows the instructions!


**************** HERE WE GO **************
Enter the following code:
*#8999*8378#
(You'll be shown menu, then ...)
then go to:
"H/W test"
then go to:
"Audio Settings"


then go to:
"Melody Gain"


There will you see a number.
there are five (5) Melody Levels" of it.
(and currently, you are at level 1 and after
pressing the "save" button, you will move to
level 2 and so on .........................)
you have to change the values of all the levels.
and as the resultant, it will give increase the
melody sound!, your tones will more louder,
even more louder then the max. ringing volume.
the level wise numbers are: (as its my setting :-) )


Melody Level 1: 13
Melody Level 2: 17
Melody Level 3: 18
Melody Level 4: 25
Melody Level 5: 31
you even can make your own combinations of level wise
sounding numbers that can change the sound level!.


if your combination cause more louder sound level,
then mine,
then do share it with the group! ... :-)
meanwhile, try my figured-out combination!


************ CAUTION ************
if anything goes wrong,
then you can apply the master reset code,
that will NOT delete anything, ANYTHING from your
cell fone, but set each and eveything to its
default/standard setting ...
(likes, factory settings :-) )
the master reset code is:
#*7728#


#########################################
I take no responsibility of these codes are working or not,
or its effects on your cell fone
but i have tried these codes on my cell fone.
and i bet, nothing goes wrong,
but even then of my words, be carefull!,
#########################################
The code: *#8999*8378#
as i regarded it a informative code,
will tell you each and everything about your cell fone.
and in the "H/W test",
there are lot of other Audio settings,
each of them having five (5) levels,
you can change the combination, but before doing anything,
do write the defult number sequence to some place so that
you'll be then able to invert it again! .. :-) ...
#*2558# - Time ON
#*2527# - GPRS Switching Set to class {4/8/9/10}
#*4263# - Handsfree Mode: ACTIVATED
#*53696# - [Java dnload] WAPSAR mode
#*536961# - WAPSAR enable HTTP disable
#*536962# - HTTP enable WAPSAR disable
#*536963# - SERIAL enable Others disable
#*5663351# - [Phone Model] SAMSUNG SGH-X100
#*6420# - Mic off
#*6421# - Mic on
#*7632# - Sleep mode
*#8999*523# - Main LCD Brightness
*#8999*3825523# - (?) External display
*2767*3855# - Full EEPROM reset(Reset all type of locks)also you'll
lose pictures and java not melody
Remove camera sound:
On main screen type:
*#8999*8378# --> Test mode
H/W test
Audio Settings
Melody Gain
Then replace 6 by 0, it'll show 12 but it's OK
Press back until main screen
Then press key volume to minimum and let's try !!! no more sound
tip by C-Quest


*2767*688# resets the phone
Thats all!!!!!!!!!!!!!!!
Samsung X100 Tricks


#*0000#
#*0400#
#*1200# - AFC DAC Val
#*1300# - IMEI
#*1400# - IMSI
#*1700# - ( ) Command #*1700 Executed
#*1800# - ( ) Command #*1800 Executed
#*1900# - ( ) Command #*1900 Executed
#*2000# - ( ) Command #*2000 Executed
#*2100# - ( ) Command #*2100 Executed
#*2200# - ( ) Command #*2200 Executed
#*2252# - Current CAL
#*2255# -
#*2256# - Calibr.-Info
#*2282#
#*2285#
#*2286# - Databattery
#*2337# - ( ) Permanent Registration - Not Yet Implemented
#*2355#
#*2400# - ( ) Command #*2400 Executed
#*2474# - For CMD Set - DEBUGBATTERY in cihard.opt
#*2527# - GPRS Switching Set to class {4/8/9/10}
#*2558# - Time ON
#*2562#
#*2565#
#*2677# - AMR State: {None / Full Rate}
#*2679# - Copycat Feature: {ACTIVATED/DEACTIVATED}
#*2787# - CRTP {ON/OFF}
#*2834# - Audio path Mobile Normal
#*2836# - AVDDSS Management: {DEACTIVATED/ACTIVATED}
#*3230# - Trace Enable DCD disable
#*3231# - Trace disable DCD Enable
#*3232# - Current Mode {Trace enabled/DCD enabled}
#*3270# - DCS Support: {DEACTIVATED/ACTIVATED}
#*3282# - Data: {DEACTIVATED/ACTIVATED}
#*3333#
#*3353# - General Defence Code Erased
#*3370#
#*3377#
#*3476# - EGSM: {DEACTIVATED/ACTIVATED}
#*3676# - Flash Volume Formated
#*3683#
#*3737# - Some Codes
#*3777#
#*3779#
#*3825# - ( ) Command #*3825 Executed
#*3837#
#*3849#
#*3851#
#*3876#
#*3877# - Dump of SPY Trace
#*3900#
#*3940# - External looptest 9600 bps not available in SYSOL2
#*3940# - External looptest 115200 bps not available in SYSOL2
#*3941#
#*4200#
#*4263# - Handsfree Mode: ACTIVATED
#*4300#
#*4500#
#*4674# - IMSI MCC:2 5 0 MNC 9 2 10 11 91 83 50
#*4700# - Half Rate: {ACTIVATED/DEACTIVATED}
#*4760# - GSM: {ACTIVATED/DEACTIVATED}
#*4864#
#*5100#
#*5111# - ( ) Some Codes
#*5132#
#*5133# - ( ) Some Codes
#*5143#
#*5156#
#*5165#
#*5171# - ( ) Some Codes
#*5172# - ( ) Some Codes
#*5173# - ( ) Some Codes
#*5174#
#*5175#
#*5176# - ( ) Some Codes
#*5177#
#*5187# - L1C2G trace: {ACTIVATED/DEACTIVATED}
#*53696# - [Java dnload] WAPSAR mode
#*536961# - WAPSAR enable HTTP disable
#*536962# - HTTP enable WAPSAR disable
#*536963# - SERIAL enable Others disable
#*5376#
#*5400# - ( ) Command #*5400 Executed
#*5500#
#*5600#
#*566335# - [WAP model ID]
#*5663351# - [Phone Model] SAMSUNG SGH-X100
#*5663352# - [Java Model] SEC-SGHS300/1.0
#*5737425# - Java Serial
#*577699# - APN
#*5800# - ( ) Command #*5800 Executed
#*6100# - ( ) Command #*6100 Executed
#*6200#
#*6420# - Mic off
#*6421# - Mic on
#*6422# - Mic dep RXdata
#*6428# - Mic measurement
#*6700#
#*6837# - Official Software Version
#*6900#
#*7200#
#*7222# - Operation Typ: Class C GSM
#*7224# - ERROR
#*7247#
#*7252# - Operation Typ: Class B GPRS
#*7271# - Multi slot: Class 1 GPRS
#*7274# - Multi slot: Class 4 GPRS
#*7276#
#*7284# - Class B
#*7287# - GPRS Attached
#*7288# - GPRS Detached
#*7326# - Accessory: Vibrator
#*7337# - Some kind of Reset Settings
#*7352# - Some Kind of Debug Info
#*7462# - SIM phase
#*7524# - KCGPRS
#*7562# - LOCI GPRS
#*7636#
#*7639#
#*7632# - Sleep mode
#*7633#
#*7638# - RLC always open ended TBF: {ACTIVATED/DEACTIVATED}
#*7646#
#*7665#
#*7666# - SrCell Data
#*7673# - Sleep mode
#*7676# - Command #*7676 Executed
#*7683# - Sleep variable
#*7693# - Sleep deact
#*7728# - RSAV done->reset
#*7763# - SMS bearer CS {ACTIVATED/DEACTIVATED}
#*7825#
#*7828# - Midl Rl51
#*7957# - Command #*7957 Executed
#*7983# - Voltage/Freq {DEACTIVATED/ACTIVATED}
#*7986# - Voltage {DEACTIVATED/ACTIVATED}
#*8462# - Sleep time since SwitchOff
#*8465# - Time in L1
#*8466# - Old Time
#*8645#
#*9278# - Command #*9278 Executed
#*9795# - wtls key: reset
#7263867# - RAM Dump {On/Off}
#7465625*228# - Activa lock deactivated
#7465625*27*
#7465625*2827# - Auto CP lock deactivated
#7465625*28638# - Auto Network lock deactivated
#7465625*28746# - Auto SIM lock deactivated
#7465625*2877# - Auto SP lock deactivated
#7465625*28782# - Auto subset lock deactivated
#7465625*638*
#7465625*746*
#7465625*77*
#7465625*782*
#8999*324#
*#0*
*#0020# –
*#06# – IMEI
*#2255# - Call List
*#4777*8665# – GPRS
*#7465625# – Interrogate ( )
*#8377466# – Software && Hardware Versions
*#8888# – Hardware Version
*#8999*324# - ( ) Some Strange Numbers
*#8999*377# -
*#8999*3825523# - ( )
*#8999*523# - Main LCD Brightness
*#8999*636# - ( ) Another Strange Numbers
*#8999*8376363# - . HW, SW, + Some Code And Data
*#8999*8378# - . , , , HW SW
*#9999# – Software Version


=== : ===


*2767*xx927 - WAP . xx - . , xx=44: *2767*44WAP# xx=31: *2767*31WAP#


*2767*xx667 - MMS.


.


*2767*2877368#
*2767*2878# – EEPROM ( , )
*2767*31667#
*2767*31927#
*2767*33667#
*2767*33927#
*2767*34667#
*2767*34927#
*2767*351667#
*2767*351927#
*2767*3700#
*2767*380667#
*2767*380927#
*2767*3855# - l EEPROM ( SP- !! ) IMEI 447967-89-400044-0, IMEI ( )
*2767*39667#
*2767*39927#
*2767*420667#
*2767*420927#
*2767*43667#
*2767*43927#
*2767*44667#
*2767*44927#
*2767*46667#
*2767*46927#
*2767*49667#
*2767*49927#
*2767*66335#
*2767*688# ( ) [Unlocking Code]
*2767*7100#
*2767*7300#
*2767*73738927# = *2767*RESETWAP#
*2767*7650#
*2767*7667#
*2767*7927#
*2767*8200#
*2767*927#


=== / : ===


*335#
*663867# - mm file dumped
*7465625# -
*7465625*228# - Activa lock personalized
*7465625*27*
*7465625*2827# - Auto CP lock activated
*7465625*28638# - Auto Network lock activated
*7465625*28746# - Auto SIM lock activated
*7465625*2877# - Auto SP lock activated
*7465625*28782# - Auto subset lock activated
*7465625*638*
*7465625*746
*7465625*746*
*7465625*77*
*7465625*782*








Secret Codes


*#06# -> Show IMEI
*#9999# -> Show Software Version
*#0837# -> Show Software Version (instructions)
*#0001# -> Show Serial Parameters
*#9125# -> Activates the smiley when charging.


*#9998*228# -> Battery status (capacity, voltage, temperature)
*#9998*246# -> Program status
*#9998*289# -> Change Alarm Buzzer Frequency
*#9998*324# -> Debug screens
*#9998*364# -> Watchdog
*#9998*377# -> EEPROM Error Stack - Use side keys to select values. Cancel and ok.
*#9998*427# -> Trace Watchdog
*#9998*523# -> Change LCD contrast - Only with version G60RL01W
*#9998*544# -> Jig detect
*#9998*636# -> Memory status
*#9998*746# -> SIM File Size
*#9998*778# -> SIM Service Table
*#9998*785# -> RTK (Run Time Kernel) errors - if ok then phn is reset, info is put in memory error. *#9998*786# -> Run, Last UP, Last DOWN
*#9998*837# -> Software Version
*#9998*842# -> Test Vibrator - Flash the screenligth during 10 seconds and vibration activated.
*#9998*862# -> Vocoder Reg - Normal, Earphone or carkit can be selected
*#9998*872# -> Diag
*#9998*947# -> Reset On Fatal Error
*#9998*999# -> Last/Chk


*#9998*9266# -> Yann debug screen (=Debug Screens?)
*#9998*9999# -> Software version


*0001*s*f*t# -> Changes serial parameters (s=?, f=0,1, t=0,1) (incomplete)
*0002*?# -> unknown
*0003*?# -> unknown


SP-unlock SGH-600 and SGH 2100


*2767*3855# -> Full EEPROM Reset ( THIS CODE REMOVES SP-LOCK!! )
But also changes IMEI to 447967-89-400044-0, To restore your old IMEI use the IMEI program found on the software page.


*2767*2878# -> Custom EEEPROM Reset


Hope you like this much as i like much when i written.....