This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Sunday, 1 April 2012

On the U.S.-Mexico border, a massive CPV solar project will rise


On the U.S.-Mexico border, a massive CPV solar project will rise

SolFocus announced today it will help build a 50-megawatt concentrating solar photovoltaic power plant near Tecate, Mexico, just a few clicks from the U.S.-Mexico border. The project, which will be developed in phases by Mexican land and real estate developer Grupo Musa and U.S.-based Synergy Technologies, is expected to eventually reach 450-megawatt capacity, making it the largest CPV solar farm in the world.
Construction on the first 50-megawatt phase will begin in late 2012, according to the announcement. The power plant will use SolFocus’ concentrator photovoltaic equipment. It will be owned and operated by SolMex Energy, a new company formed by Grupo Musa and energy developer Synergy Technologies. Most of the initial 50MW installation will meet energy demands of various facilities located in the area.
SolFocus CEO Mark Crowley said in a statement the first year of operation should deliver at least 120,000 megawatt hours of electricity to Baja California. The power plant will contain 3,850 SolFocus systems on the 300-acre site. International corporation FINEXIM has allocated $720 million to the first four of nine 50-MW phases of the solar project.
Until now, Mexico’s renewable energy market has been comprised primarily of wind power. But the country also is an ideal locale for solar, and more specifically CPV.
Conventional photovoltaic panels don’t perform as well in hot temperatures. CPV does, making it a suitable technology for the high-heat borderlands. CPV is essentially a mashup of two more common technologies: photovoltaic solar (PV) and concentrating solar thermal (CST). With conventional PV, sunlight hits a solar panels that usually contains silicon-based cells and turns it into electricity. With concentrating solar thermal, mirrors are used to concentrate sunlight onto a tower containing a fluid such as oil. The fluid gets hot and generates steam that drives a turbine to generate electricity.
CPV, on the other hand, uses mirrors and lenses to concentrate light from the sun onto super-efficient cells to produce electricity. CPV manufacturers, which includes Amonix, Soitec and SolFocus, serves a small, niche market. The technology doesn’t require water like solar thermal to produce power and performs especially well in areas like the Southwest that have high percentage of direct sunlight.

TRAI Introduces Telecom Consumers Protection Regulations 2012

TRAI Introduces Telecom Consumers Protection Regulations 2012


Telecom Consumers Protection Regulations 2012
TRAI (Telecom Regulatory Authority Of india) Introduces telecom consumers protection Regulations 2012 across telecom operators in the country.This regulations are introduced to increase quality of services and also this increases simplicity in plans and services offered by the telecom operators.
BSNL is the first telecom operator who implements all these guidelines and all other network providers will follow the guidelines soon..



Following are the benefits the new guidelines bring to consumers:
Simplicity & standardization of tariff vouchers across operators.
Transparency for Value Added Services activated on the account.
Information on premium rate VAS.
Changes which would be ‘seen’ by consumers from now onwards:
New Start Up Kit:
Will contain only the SIM with no rate plan attached (no confusion of tariffs for the customer).
New Vouchers :
Only 3 voucher types will exist (Plan Voucher, Top-up, STV) (easy to differentiate between talktime vouchers against tariff benefits).
Plan Vouchers :
These would offer only the basic plan, with no talktime attached.
Top-Up Vouchers :
These would provide only talktime (in Rupees) with main account validity.
STV Vouchers :
These would provide only rate cutters, and no talktime.
Colour Coding :
The 3 vouchers would be segregated by different colours, for ease of understanding by consumers.
Usage information :
Consumers would be informed of the usage after every call / data session / VAS activation. While this may be already available with several operators, the same has been now made mandatory.
Past Usage information:
Consumers can now avail their usage over the last 180 days by paying a fee of Rs. 50 per request. Details that would be made available are Calls / SMS / VAS / Roaming.
Account related information:
Consumers can also avail information about their accounts – Tariff plan activated / Account Balance / Active VAS details are now available via SMS to the customer.
Premium VAS Service:
Consumers will be informed that the number they are calling is chargeable, and after a ‘beep’ the VAS service would be connected, thereby offering consumer greater awareness of the tariffs.

World’s smallest .45 caliber pistol

World’s smallest .45 caliber pistol


You’re looking at what’s perhaps the world’s most compact .45 caliber pocket pistol.
Despite sporting dimensions similar to a standard smartphone (5/8ths of an inch thick) and weighing only 14 ounces, the DoubleTap features a no-snag, hammerless design (firing mechanism is internal) that’s capable of the kind of precision and efficiency offered by high-performance .45 caliber handguns. And, according to the manufacturer, Heizer Defense, you won’t find a slimmer and lighter pocket pistol anywhere on the market.
For gun enthusiasts, here’s a rundown of the handgun’s features as highlighted on Heizer’s website:
  • Available in .45 ACP or 9MM
  • A patent-pending progressive barrel porting option that cuts muzzle rise and recoil.
  • A one-of-a-kind double-action trigger system that utilizes ball bearings for a smooth action and crisp trigger pull.
  • Designed to hold two rounds in the chamber and two additional spare rounds inside the handle
Buyers can choose between an aluminum model that starts at $500 or one made out of titanium with a MIL-STD finish, the same used on military aircraft, for a protection against corrosion and wear damage for $730.
The DoubleTap is slated to go on sale in the first quarter of 2012.



How to make your own tricorder

How to make your own tricorder

Take one part open-source code, two parts OLED display, mix in a generous helping of curiosity and serve with a side of extra-delicious geekiness. That’s your basic recipe for a real-life tricorder, as envisioned and modeled by Dr. Peter Jansen. The result is a handheld device with sensors for reading atmospheric, electromagnetic and spacial properties in the surrounding environment. Dr. Jansen’s tricorder won’t necessarily detect alien life-forms, but there’s plenty of room to expand on his open-source design. Your mileage may vary.
Dr. Jansen’s Tricorder Project is a self-professed labor of love. In his spare time, Jansen built his first tricorder, the Science Tricorder Mark 1, with a goal of bringing to life “phenomena that we can’t normally see.” These include things like the release of particles from a car’s exhaust pipe, or the process of photosynthesis in a single leaf from a neighbor’s tree. With measurements showing the presence of pollution or chlorophyll, Jansen believed the Mark 1 could tell a great deal about the world around him, and maybe get other people excited about environmental learning too.
The Mark 1 quickly led to the Mark 2, and as Jansen continues to innovate on his original concept, he hopes others will join his quest of discovery. Anyone can download Jansen’s open-source tricorder plans and build their own prototypes. Jansen himself is at work on Mark 4. He apparently wasn’t happy with version three of his device and has moved on to the next model.
Tricorders, meanwhile, are a popular hobby these days. The X Prize Foundation launched a contest earlier this year asking innovators to design tricorders with health diagnostic capabilities. The winning team will get a $10 million prize.
You can imagine the implications of putting tricorders into daily use around the world. Beyond individual discovery, there is also the possibility of collecting mass data for analysis. Combine tricorders with web connectivity, and you have a new layer of information for mapping the world in real time. That’s boldly going where no man has gone before.

UK Biobank: world’s biggest biomedical database opens today

UK Biobank: world’s biggest biomedical database opens today

Information on 500,000 Brits is now available for medical research.
At 20 terabytes – the equivalent of 30,000 CDs stacked over 100 feet high – the UK Biobank is the world’s biggest and most detailed biomedical database.
The resource is expected to advance research into the causes, prevention and treatment of a huge variety of chronic, painful and life-threatening illnesses: from cancer and heart disease to dementia and depression.
“For years, people have asked about nature versus nurture but now, with the data we have, we can tease out the contributions of what you’re born with versus the environment you grow up in,” says Wendy Ewart of the UK Medical Research Council, one of several backers of the project.
The volunteers were between 40 and 69 years old (thus chosen because they won’t keep researchers waiting too long before developing interesting conditions).
Among them: 26,000 people with diabetes, 50,000 with joint disorders, 41,000 teetotallers, and 11,000 heart attack patients.
By the end of this year, 10,000 are expected to have developed diabetes and 2,500 will develop breast cancer. By 2022, an estimated 10,000 will have breast cancer, 9,000 will have Alzheimer’s, and 28,000 will have died from heart disease.
More than 1,000 pieces of information about each participant are be available:
  • Results of genetic tests, and tests on donated blood, urine and saliva samples.
  • In addition to medical history, lifestyle details and standard measurements, there are also less obvious assessments like hand grip strength, bone density, and psychosocial events.
  • Changes in health are recorded via electronic records (hospital statistics, cancer and death registers).
  • Some participants will be completely retested every couple years, and additional details will be added (such as diet, work and residential questionnaires, body scanning, and physical activity tracked with accelerometers).
  • Results from studies using UK Biobank are put back into the resource for other researchers to use.
  • And it will keep growing. Plans are afoot to include fMRI scans, ultrasound scans, and X-rays of bones and joints.
“It’s the biggest, most detailed collection of data that’s ever been put in place,” says founder Rory Collins. Its impact on dissecting the causes of disease, he says, will be as profound as the invention of the telescope was to astronomy, or the microscope to microbiology.
It cost nearly £100 million (about $160 million). And about 15 million biological samples are stored in a giant freezer facility in northern England.
The US National Institutes of Health had plans to set up a similar resource, but the $2 billion pricetag was too high. China has a similar database, China Kadoorie Biobank, also with 500,000 volunteers.
The Biobank doesn’t have any research projects… it’s up to researchers to register on the website and send in applications to use the data.

Mobile YouTube Downloader free download

Mobile YouTube Downloader free download


Youtube downloader
Finally we got a good mobile YouTube downloader. So download the software and enjoy downloading YouTube videos into your mobiles..

android mobile users can download tube mate application from Google play store and enjoy downloading videos. have fun..



Click here to download

Crystals “grow” in Los Angeles brick walls

Crystals “grow” in Los Angeles brick walls

Cities are, by definition, densely populated. With so many people roaming city streets, why aren’t public art interventions more popular? Who doesn’t want to find old telephone booths regaled with crystal-like ‘bling’?
Graphic designer and artist, A Common Name,  indulges our childlike nature with the “Geode” Street Art Project.
Rather than using traditional paint or wheat paste methods in a 2D platform, I’ve been using paper in 3D. These sculptures come in all sizes and fit in the holes of buildings and pipes found while walking around. The finished shapes represent geodes, crystal, quartz, or any mineral formation that you would normally find in nature, now in our planned out cities.
Cities are also, by definition, landscapes that lack the chaotic spontaneous aesthetic of the wilderness. It is very difficult to find spaces in urban environments that are not constructed. But highly constructed design interventions can breath new life into the inevitably drab style of a brick wall or out-of-commission parking meter.
A parallel aspect of these “geodes” in nature and in the city is they are always unexpected treasures. You might go hunting for treasures but you generally happen upon them during your adventures or casual interaction with the environment. I enjoy the fact that many people will not notice these, but some astute people will; that these will not last forever and the weather will affect them as naturally as it might in nature.
So far, nine geodes speckle Los Angeles’ streets. Some have been stolen, some have been trashed, and others have crumbled away in the rain.
Even crystals don’t last forever - especially if they’re made out of paper.




Core Player for mobile phones to play mp3,mp4,3gp,wmv,avi and other more format

Core Player for mobile phones to play mp3,mp4,3gp,wmv,avi and other more format


After lots of requests from my friends iam adding a new software core player. This player helps to play avi, mp4 ,mp3 ,3gp ,mkv and many other formats in your mobile phone.



Audio Formats:MP3, MP2, AAC, MKA, WMA, Midi*, WAV, OGG, Speex, WAVPACK, TTA, FLAC, MPC, AMR, ADPCM, ALaw, MuLaw, G.729, GSM

Video Formats:

H.264 (AVC), AVCHD, MKV, MPEG-1, MPEG-4 part 2 (ASP), DivX, XviD, WMV*, Theora*, Dirac*, MJPEG, MSVIDEO1

Image Formats:
JPEG (420, 422, 440, EXIF Headers)*, BMP, GIF, PNG, TIFF, MJPEG
Container Formats:
Flash/FLV, Matroska, ASF, ASX, AVI, PS, M2TS, TS, 3GPP, MOV, MPEG-4, OGM, NSV*
Streaming Formats:
HTTP, UDP, UDP Multicast, UDP Unicast, RDP, RTP. RTSP, RTCP (keep alive), ASX, ASF, Multicast, HTTP Tunneling
Additional Features:
Google Data, Benchmarking, Integrated Pocket IE/IE Support, SMB Browsing

This is a Symbian software and works great


Click here to download




This is a fully cracked version and if you find any certificate expiration eroor then change your phone date to 2007,2008,2009 etc and try installing...


if found any other errors comment here..


Enjoy....

New Tricks Special Secrets & Codes for Mobile/Cell Phone

New Tricks Special Secrets & Codes for Mobile/Cell Phone

Hi, here I providing Special Secrets* & Codes* for Cell Phone, hope you enjoy this. Plz leave your comments. For educational purpose only.
Nokia Secrets (may works on all models)


Check the IMEI*#06#
Check software version

*#8110#
Sim Clock Stop
*#746025625#
Warranty menu
*#92702689#
Press the following warranty code
6232 (OK) Displays the Month and Year of Manufacture
7332 (OK) Displays the date of the last repairment
7832 (OK) Displays the date where the phone was purchased
9268 (OK) Displays Serial Number
37832 (OK) Set the Purchasing Date MMYY
87267 (OK) Transfers ALL phone numbers, pictures, sounds from one phone to another
Hands Free
To continue an existing call when placing the 8110i into the hands free car kit without it dropping the call, press the Memory button just before connecting the cable and placing it in the cradle.
Display extra text in call costs feature
If your network operator doesn't offer a call costs service, you can still make use of that function to display some personalized text on the screen of your 8110i. Go to Menu, [5], [7], [1], enter PIN2-code and choose Set. Then type in the limit of the currency units you're using (if the call cost service worked, you would have to type the cost limit of the calls) and choose OK. In this case I typed 8110. Then go to the next sub menu (Menu, [5], [7], [2]), the Show costs in menu. Type in the PIN2 code again and select Currency. Type in the unit price, in this case number 1. Then type the name of the currency - you can use any string of letters and numbers 1-3 characters long. then type 2 letter then to confirm type two names beginning with one of each of the letters. Then press OK to confirm it.
Quick saving while in call
Saving numbers to memory during a call If you type a number into your phone during a call, you will lose it when the call ends. To prevent this happening just hold down Memory button -- the number will be saved (with no name) to the next available memory location.
Deleting SMS messages quickly
When reading an SMS message, instead of pressing Option, Erase to delete the message, simply press [C].
Turning lights on temporarily
If you have display lights turned off, you can turn them on by quickly pressing and releasing the power button. They will stay on as long as you are pressing button.

Silent mode temporarily
You can put your phone into silent ringing mode temporarily by pressing Menu then [#].
Closing the cover without ending a call
If you press the menu key and then close the sliding cover during a call you will not end your call.

Nokia 6150 Secrets (also work on other models)

Check the IMEI
*#06#
Service menu
*#92702689#
Show software version
*#0000# or *#6110#
Sim Clock Stop
*#746025625#
Warranty menu
*#92702689#
Press the following warranty code
6232 (OK) Displays the Month and Year of Manufacture
7332 (OK) Displays the date of the last repair
7832 (OK) Displays the date where the phone was purchased
9268 (OK) Displays Serial Number
37832 (OK) Set the Purchasing Date MMYY
87267 (OK) Transfers ALL phone numbers, pictures, sounds from one phone to another

Power Button Tip

If you press the button for a short moment, the menu with the profiles is shown on the display. If you press one more time, the mobile turns itself off. You can use the up and down cursor keys to scroll and enable a different alert setting.
The 54# Tip
Type 1#, 2#........54# on the keypad (when you're not in the menu) to get the phone number used for with this key when speed dialing.
Toggle Headset and Auto settings
#1: Try Connect the pin-out 1-2 (in front from the right.) to toggle headset settings (The phone will think that you ar using a headset - "headset" is displayed in the LCD)
#2:Try Connect the pin-out 2-3 (in front from the right.) to toggle auto settings (The phone will think that you are using it in the car - "auto" is displayed in the LCD)
Call Menu
(In a call) you can press and hold down the menu button for 3 sec. and a menu appears. (transfer, mute etc.)
Quick SMS Typing
When typing SMS messages, you have to wait some seconds before you can type the next letter if it is in the same button than the previous one. For example try to write the word "letter", you have to wait before you can enter the second "t". A much faster solution is to press the # button twice and then the letter "t".
The Reboot Trick
1. Go to calendar ( menu - 8 )
2. Make note / reminder
3. Enter some text into the edit box
4. Hold clear until whole text is cleared, then press back
5. Press 0. Main screen is shown but a space appears on the screen. You can't see it of course.
6. Enter 4 digits ( 1234 for example )
7. Use the down arrow to move the cursor to the left side of the numbers and the space (2 times down arrow)
8. Now enter 6 digits and press the green "Call button".
9. Wait some seconds..the phone will now flash the background light and finally reboot.
Philips Genie Secrets (also work on other models)
View the IMEI
*#06#
Status register
*#2254*#
Activate and deactivate the "DEBUG CALL"-Mode
*#2255*#
Time you are connected to the network
*#2558*#
Phone reconnects to the network
*#2562*#
Warm start
*#2565*#
(NO) BLOCKING - list (15 items)
*#3333*#
Init, Flags, SIM LOCK
*#3377*#
Reset the (NO) BLOCKING - list
*#3353*#
Name, Length, SIM phase
*#7378*#
SECURITY CODE
*#7489*#
Activate and deactivate the SLEEP MODE
*#7693*#
SPURIOUS INTERRUPT
*#7787*#
Activate the beep signal when the phone is reconnected to the network
*#2337*#
Samsung SGH-600 Secrets (also work on other models)
Show IMEI
*#06#
Show Software Version
*#9999#
Show Software Version (instructions)
*#0837#
Show Serial Parameters
*#0001#
Activates the smiley when charging
*#9125#
Battery status (capacity, voltage, temperature)
*#9998*228#
Program status
*#9998*246#
Change Alarm Buzzer Frequency
*#9998*289#
Debug screens
*#9998*324#
Watchdog
*#9998*364#
EEPROM Error Stack - Use side keys to select values. Cancel and ok.
*#9998*377#
Trace Watchdog
*#9998*427#
Change LCD contrast
*#9998*523#
Jig detect
*#9998*544#
Memory status
*#9998*636#
SIM File Size
*#9998*746#
SIM Service Table
*#9998*778#
RTK (Run Time Kernel) errors
*#9998*785#
Run, Last UP, Last DOWN
*#9998*786#
Software Version
*#9998*837#
Test Vibrator - Flash the screenligth during 10 seconds and vibration activated
*#9998*842#
Vocoder Reg - Normal, Earphone or car kit can be selected
*#9998*862#
Diag
*#9998*872#
Reset On Fatal Error
*#9998*947#
Last/Chk
*#9998*999#
Yann debug screen
*#9998*9266#
Software version
*#9998*9999#
Changes serial parameters (s=?, f=0,1, t=0,1)
*0001*s*f*t#
Sony CMDZ1 Secrets (also work on other models)
View IMEI
*#06#
Show Software version and manufacture date
# 8377466 #
Alcatel One Touch Secrets
View IMEI Number
*#06#
Enter Service Menu
*#000000#
View Secret Menu
000000 then press *

Sagem RC712 Secrets (also work on other models)

Enter Engineering menu
MENU - 5 - 1 - 1 - #
1) IMEI
2) Flash Eprom etc.
3) ?
4) SP unblock
5) ?
6) Contrast Settings.
When in menu type * and a new menu with new options will appear.
Siemens S1 Secrets (also work on other models)
Show IMEI
*#06#
Tetris
Power on phone and enter PIN. before phone has locked onto network, F9, send own number, hit right button, hit 9. left is 2, right is 8, rotate is 5,
and drop is 4.
Monitor Mode
Menu, 9 (Phone Options), 7 (Phone Status), Left Display Button (left MENU key), 5553756, HangUp Button (Red HandSet key)
Now "Monitor" should appear at the bottom of the Network Options menu.
Pressing the right Display Button when in monitor mode will show a list of the
six cells with the strongest signals.
Trium MTD30 Secrets (also work on other models)
Monitor mode
Hold C and press 379
Secret menu
Hold C and press 987
Version number
Hold C and press 597
Phase1 and 2
Hold C and press 499
Warm start
Hold C and press 179
Instant turn off
Hold C and press 999
Unlock menu
Hold C and press 787090
Bosch 718 (also work on other models)
Secret Engineering menu (menu 10) appear
*#3262255*8378#
Display the IMEI
*#06#
To set the language automatically (Reset to English)
*#0000#
Set the Enhaced Full Rate
*#3370#
Reset the phone
#3370#
Enter sim lock code
*#9000#
Enter the network code
*#9003#
Enter the subset code
*#9004#
Remove the sim lock permanently
*#9100#
Remove the corporate lock permanently
*#9101#
Remove the provider lock permanently
*#9102#
Remove the network lock permanently
*#9103#
Remove the subset lock permanently
*#9104#

Bosch 738 (also work on other models)
Secret Engineering menu (menu 10) appear
*#3262255*8378#
Display the IMEI
*#06#
To set the language automatically (Reset to English)
*#0000#
Set the Enhaced Full Rate
*#3370#
Reset the phone
#3370#
Enter sim lock code
*#9000#
Enter the network code
*#9003#
Enter the subset code
*#9004#
Remove the sim lock permanently
*#9100#
Remove the corporate lock permanently
*#9101#
Remove the provider lock permanently
*#9102#
Remove the network lock permanently
*#9103#
Remove the subset lock permanently
*#9104#

Bosch COM607 (also work on other models)
Secret Engineering menu (menu 10) appear
*#3262255*8378#
Display the IMEI
*#06#
To set the language automatically (Reset to English)
*#0000#
Set the Enhaced Full Rate
*#3370#
Reset the phone
#3370#
Enter sim lock code
*#9000#
Enter the network code
*#9003#
Enter the subset code
*#9004#
Remove the sim lock permanently
*#9100#
Remove the corporate lock permanently
*#9101#
Remove the provider lock permanently
*#9102#
Remove the network lock permanently
*#9103#
Remove the subset lock permanently
*#9104#

Bosch 908 (also work on other models)
Secret Engineering menu (menu 10) appear
*#3262255*8378#
Display the IMEI
*#06#
To set the language automatically (Reset to English)
*#0000#
Set the Enhaced Full Rate
*#3370#
Reset the phone
#3370#
Enter sim lock code
*#9000#
Enter the network code
*#9003#
Enter the subset code
*#9004#
Remove the sim lock permanently
*#9100#
Remove the corporate lock permanently
*#9101#
Remove the provider lock permanently
*#9102#
Remove the network lock permanently
*#9103#
Remove the subset lock permanently
*#9104#

Bosch 909/909s (also work on other models)
Display the IMEI
*#06#
Set the language automatically
*#0000#
Set the Enhanced Full Rate
*#3370#
Reset the phone
#3370#
Enter sim lock code
*#9000#
Enter the network code
*#9003#
Enter the subset code
*#9004#
Remove the sim lock permanently
*#9100#
Remove the corporate lock permanently
*#9101#
Remove the provider lock permanently
*#9102#
Remove the network lock permanently
*#9103#
Remove the subset lock permanently
*#9104#
Ericsson 688 Secrets (also work on other models)
Check the IMEI (International Mobile Equipment Identity)
*#06#
Reset the phones menu-language to English.
*#0000#
Check the software release information
>*<<*<* Shortcut for Last Dialed call menu If you for some reason don't want to enter the 'Last Dialed calls menu' by using the 'YES' key you can use the following key stroke instead: First '0' then '#'. Bat. level indicator when turned OFF... When the gh688 is turned off and the phone is not changing - the bat. level can be seen for a short period of time by pressing the 'NO' key quick once (it has to be quick!) and then wait for about 2 sec. The bat. level will now be shown in the display at its normal position. Access menu without Sim card To access to the menu in your phone without having a card inside do the following: type **04*0000*0000*0000# When display say "Wrong Pin" press NO and you have access to the all menus: Info, Access, Settings, Calculator, Clock, Keylock On?, Mail, Phone book. NOTE: If you try this on the GH688 your phone may stop at Keylock On? menu and you´ll have to take your battery out to turn the phone on again. Full Network Name You can see the Full Network Name by doing the following: Go to the network menu, when the phone displays the networks available (in 'Select net' and 'Edit list' menu) you can press * and you will see the full name. Full Operator List You can view the full operator list by doing the following: Go to the 'Edit list' menu under 'networks'. The phone say 'please wait' (searching for other networks). When finished, Press the <> keys.
How to enable net monitor on Ericson 688
1. Remove SIM from phone
2. Dial 112, press YES, hear something,
3. Dial 112YESNO
4. Press <>
Ericsson 628 Secrets (also work on other models)
Check the IMEI (International Mobile Equipment Identity)
*#06#
Reset the phones menu-language to English.
*#0000#
To see the time and date
*#103#
Check the software release information
>*<<*<* Shortcut for Last Dialed call menu If for some reason you don't want to enter the 'Last Dialed calls menu' by using the 'YES' key you can use the following key stroke instead: First '0' then '#'. Battery level indicator when turned OFF When the phone is turned off and the phone is not changing - the battery level can be seen for a short period of time by pressing the 'NO' key quick once (it has to be quick!) and then wait for about 2 sec. The battery level will now be shown in the display at its normal position. Access menu without Sim card To access to the menu in your phone without having a card inside do the following: type **04*0000*0000*0000# When display say "Wrong Pin" press NO and you have access to the all menus: Info, Access, Settings, Calculator, Clock, Keylock On?, Mail, Phone book. Alarm Clock Menu Go to MissedCall Empty the list Press the -> key for a second or two
The option Menu size turns up
Choose 'yes' and go from there.
You can make free phone calls with GA628 (also work on other models)
NOTE: This trick has only been reported working on PREPAID GSM CARDS and in some countries and with some software versions.
The prepaid GSM SIM CARD is a kind of "SIM card" which only has a certain amount of credit on it.
Here's the trick: Dial the number normally and press YES. While "connecting" is shown on the screen, the following procedure should be carried out:
Press CLR then 0 then # and then NO (twice) so as to switch OFF the phone. You can then still speak on the phone while it is switched off but the SIM card does not record your calls which will lead to FREE phone calls in some countries.. I hope!!
Motorola Flare Secrets (also work on other models)
View IMEI Number
*#06#
RBS
Activate RBS
(Note: pause means the * key held in until box appears)
To activate RBS type: [pause] [pause] [pause] 1 1 3 [pause] 1 [pause] [ok]
You now have to press the [MENU] and scroll to the 'Eng Field Options' function with the keys, and enable it.
De-activate RBS
To de-activate RBS type: [pause] [pause] [pause] 1 1 3 [pause] 0 [pause] [ok]
This only works with some versions of software.
What's the use of RBS
Get Distance From Base Station - Place a call, when it is answered, press [MENU] until 'Eng Field Option' is displayed, press [OK], select 'Active Cell', press [OK], press [MENU] until 'Time Adv xxx' appears, where xxx is a number. Multiply this number by 550, and the result is the distance from the RBS (Radio Base Station), in meters.
Get Signal Quality - press [MENU] until 'Eng Field Option' is displayed, press [OK], select 'Active Cell', press [OK], press [MENU] until 'C1' appears. This is the signal quality. If it becomes negative for longer than 5 seconds, a new cell is selected.
NEC DB2000 Secrets (also work on other models)
See IMEI code
*#06#
Reset to defaults
*73738#
Show Software version
*#2820#
SP Lock info
The procedure will show if your phone is locked.
*#3210# for SIM lock info,
*#8140# for Net lock info.
SIM lock
*#4960 # - Inquiry * 4960 * password * password # (send?) to Lock
#4960* password # to Unlock
[password] is an 8 digits number
Net Lock
*#7320# - Inquiry * 7320 * password * password # to Lock.
#7320* password # to Unlock.
[password] is an 8 digits number
Net Lock 2
*#2220# - Inquiry * 2220 * password * password # to Lock
#2220* password # to Unlock
[password] is an 8 digits number
ü Subnet Lock
*#1110# - Inquiry * 1110 * password * password # to Lock
#1110* password # to Unlock [password] is an 8 digits number

Watch live Tv In VLC Player with RtmpGUI

Watch live Tv In VLC Player with RtmpGUI


1. Download rtmpGUI and run it. It’ll show a error message saying config file is not valid. Ignore it. rtmpGUI: http://www.mediafire.com/?gy37rb7j26fi1hs
2. options menu will open up. These is a path box for location of media player. Locate VLC.exe using it.



3.Now it will update its channel list. It’ll take some time, leave it as it is for few minutes. When done, click on any channel you would like to watch. VLC will launch and play it live!
4.You can also record channels. Right click and click record. A command line window will open up. The recorded file will be in the app folder itself. Rename the recorded file to file.flv to play it.

Windows Password Myth - Tips To Secure Your Password

Windows Password Myth - Tips To Secure Your Password

With the virtual world threatening to envelope the real world in terms of impact and the host of activities that happens online, security assumes paramount importance. Creating and using passwords is an integral part of this security. With the goal of helping the users create better, easy-to-remember and tough-to-crack passwords, we go on a myth-busting spree. Here are 9 myths laid bare before you.


1. 14 characters form the optimal password Length: LanManagers (LMs) used two separate 7-character hashes for passwords which made them very susceptible to brute-force attacks. For instance, a 10 character password could be cracked by easily by breaking it into a 7-character and a 3-character has which could be processed simultaneously by the hacker.Today, things have changed - a lot at that. Windows 2000 onwards, it is possible to store passwords that are up to 127 characters long. Actually, when a password is more than 15 characters long, Windows stores a constant, AAD3B435B51404EEAAD3B435B51404EE, as the LM hash, which is equivalent to a null password. It then becomes almost impossible to crack the password. So, go on and get longer and stronger passwords.

2. Passwords give an insight into your personality: It is often construed that obsessive people who lack imagination would generate a password with their lover's name. So also, an unimaginative, career-obsessed person would choose a work-related password, an extra-logical and humorless person would choose a numerical password, a fantasist would use own name or words like 'sexy' and 'stud' and so on. This better not be true for, if it is, it will only make the hackers work that easier because any intelligent hacker starts by working on related terms.

3. It is best to use passwords created by Random Password Generators: Random password generators create very complex passwords. These are very tough for the maker to remember. For instance, try remembering '4rfgo*ql9p'. On the other hand, as far as cracking the password is concerned, it is as easy or tough as any other password of similar length. For instance, '4race*car4' is equivalent to '4rfgo*ql9p' for a hacker but is much easier to remember for the user. Complexity may be useful in a classroom, but in the real world password length is much better than complexity for security.

4. Any password can eventually be cracked: Theoretically this is true. Practically, it is definitely not - unless the Federal Government loans the hacker their impressive computing powers! Unless it is something vital like a nuclear installation, hackers will usually give up after a few minutes of effort. There is no need to get paranoid about no password being secure for the 'eventually' can take a lifetime!

5. Use ALT+ 'number' for the strongest possible password: For those that are unaware, here is something interesting. Holding down the 'ALT' key and typing any character's ASCII value on the numeric keypad creates a hitherto unavailable character. For example, the sequence ALT-020 creates 'ú'. But again, this is difficult for the creator to remember and it also involves holding down the 'ALT' key which hints anyone watching nearby.It is also more time-consuming. Better would be to increase the password by the same number of keystrokes! One trick that can however be used is ALT+ 0160 which creates a 'non-breaking' space which can fool a hacker.

6. Passwords cannot have spaces: Another absolute misnomer! Maybe it arose from the different forms which advise you not to leave any blank space between characters. From Windows 2000 onwards, 'space' is a legit character. Since space is used between words, it automatically encourages users to create a complex password with multiple words that is also easy to remember.

7. It is safer to store passwords in software utilities rather than writing it down: What guarantee is there that the software utility itself will not be cracked open? It would then be like locking all the rooms of a home and handing over the master key to the thief. Writing it down on paper is better because it would require the 'thief' to be physically present at the place where the paper is stored.Where it is critical, it would be a good practice to note the password on paper and store the same in a safe or locker.

8. Passwords must be changed regularly (once a month): This is one of the most irritating and self-defeating myths. Constant changing of passwords forces one to come up with passwords that are easy to remember. Multiple passwords can lead to the creation of a new password which is much weaker than the original.It would be advisable to have good password-creation measures and advice in place rather than the compulsory and regular changing of passwords.

9. Using Passfilt.dll is the best way to enforce strong passwords: Though it is a component to enforce 'complex' passwords, Passfilt.dll is likely to bug and irritate users who find their passwords getting rejected. Again, it would be a better idea to enthuse users into making longer passwords rather than complex ones.

 

 

Friday, 23 March 2012

Electric poncho keeps you warm on the go

Electric poncho keeps you warm on the go

electric-poncho
With the mild winter and spring we have had, it might seem strange to think about ways to keep yourself warm, but there’s no better time than the present to prepare for chilly weather down the line.
In his blog [Berto] was thinking about how to keep warm when things cool off again, and decided that a heated poncho would be great to have on hand. He found a dead simple way to craft his heated poncho, requiring little more than a bit of wiring, some thread and cloth, as well as a pair of scissors.
[Berto] picked up a 12V-powered electric blanked, then proceeded to cut a head-sized slit in the middle of it, avoiding the heating coils. He sewed a bit of cloth around the hole to ensure it didn’t end up ripping over time, then he wired the blanket up to a 12V battery he tucked away in his backpack.
The result is a variable-temp poncho that you can use to keep warm in a variety of situations. [Alan Parekh] from Hacked Gadgets says that he thinks the poncho would be awesome on a full-day snowmobiling trip, and we think he’s right!
Continue reading to see a short video where [Berto] explains how to put one of these heated ponchos together.

Nokia Giving Out Free Mobile Charger Replacement

Nokia Giving Out Free Mobile Charger Replacement

 

Nokia has announced to recall 14 million mobile phone chargers through an exchange programme. These chargers are said to be faulty.
So how to get the Nokia Replacement battery charger?
The affected chargers are those manufactured by BYD between June 15, 2009 and August 9, 2009 and with the following model types
  • AC -3U
  • AC-3E
and those manufactured by BYD between April 13, 2009 and October 25, 2009 and with the following model type
  • AC-4U
Charger label one
Nokia has launched a site to check your affected nokia battery charger. You can visit chargerexchange.nokia and find out whether your battery charger is affected or not. You can also view this site in Hindi or other langagues

Saturday, 17 March 2012

Rise of the Hack


Rise of the Hack

I didn’t know it could be someone’s job to attend hackathons. I hadn’t heard of a developer evangelist before, so a year ago when I stumbled across an opportunity to become one, I was drawn by its novelty.
The mission was to build a developer community from the bottom up by saturating the hackathon scene, gaining allegiance from the early-adopters, the enthusiasts, the hackers. The kind of people who geek out over a new JavaScript library, smother their MacBook Airs with stickers, and maintain wardrobes consisting primarily of startup t-shirts.
If the goal is to build a business on an API, were hackathons the place to start? I wasn’t sure. The tactic seemed so niche. But hey, if someone wanted to pay me to travel and build weekend hacks, that sounded fun to me.

My first hackathon surprised me. I expected it to be quiet and secluded, consisting of the most die-hard geeks, an exclusive community disconnected from the outside world.
But it wasn’t. It was inviting. It was cool. It was a spot for anyone with an entrepreneurial itch to try something new, from bankers to artists to lawyers, all sprinkled amongst designers and developers of all skill levels.
I expected it to feel underground, but it didn’t. Microsoft and Amazon, among other high-profile sponsors, pitched their tools, platforms, and APIs to an eclectic group of would-be world-changers.
I realized after that first event that my weekend calendar was not going to be free for a while. There was no shortage of events to attend or companies wanting to throw sponsorship dollars at them.
I travelled to hackathons in Dallas, Portland, Boulder, Chicago, Las Vegas, Seattle, DC, and Boston, among others. Every city I went, I asked them the same question: what’s the tech scene like here?
Every time I got the same response: It’s growing.
Everywhere I went, people told me that their tech community was thriving, that their city was going to be the next big tech hub. A year ago there was nothing. Now there were incubators, investors, meetups, and new hackathons popping up every month.
It quickly became clear to me that hackathons are not an outlandish trend, popular only among techies in Silicon Valley and NYC. They are a national phenomenon.

We asked 150 hackathon attendees, hosts, and sponsors from across the country what they thought about the rise in hackathons. This is what we found;

Mozilla Firefox all shortcuts keys

Mozilla Firefox all shortcuts keys

Shortcut keys Action
CTRL+A Selects the all items on active page
CTRL+B Display the "Organize Bookmarks" dialog box
CTRL+D Include the active page to your Bookmarks list
CTRL+F Display the "Find" dialog box to search text
CTRL+I Display the Bookmarks pane
CTRL+H Display the History sidebar of Mozilla Firefox
CTRL+N Use to open new Mozilla Firefox page
CTRL+P Use to print the active web page
CTRL+R Use to reload the active web page
CTRL+T Display a new Tab in active Firefox window
CTRL+U View the source code of active web page
CTRL+W Closes the active Mozilla Firefox window
CTRL++ Use to increase the font size of active page
CTRL+ - Use to decrease the font size of active page
CTRL+Tab Move to next Tab in Mozilla Firefox
ALT+Home Use to open the home page of internet explorer
ALT+Left Arrow Go to previous page of active page
ALT+Right Arrow Go to next page of active page
ALT+B Go to Mozilla Firefox Favorites Menu
ALT+D Go to address bar of current Firefox page
ALT+E Go to Mozilla Firefox Edit Menu
ALT+F Go to Mozilla Firefox File Menu
ALT+S Go to Mozilla Firefox History Menu
ALT+T Go to Mozilla Firefox Tools Menu
ALT+V Go to Mozilla Firefox View Menu
Tab Move forward between all items on active web page
F5 Refresh the active web page
F7 F7 activate the cursor to move with keyboard
CTRL+SHIFT+DEL Use to clear all Private Data history
CTRL+SHIFT+D Use to Bookmarks all Firefox Tabs
F11 Press F11 key to view any webpage in full-screen view and then again press for normal view.
Press Ctrl+Enter Windows will automatically add both "www" and ".com". For example, if we type google in an address bar and then press Ctrl-Enter,Windows will take us to the ........... www.google.com
Press Shift+Enter Windows will automatically add both "www" and ".net"
Press Ctrl+Shift+Enter Windows will automatically add both "www" and ".org"

Wi-Fi users in India vulnerable to virus attack, warn analysts

Wi-Fi users in India vulnerable to virus attack, warn analysts

 
Wi-Fi users in India vulnerable to virus attack, warn analysts 
Wi-Fi users in the country are vulnerable to virus attack, warns an Indian computer security analysis firm. According to the Indian Computer Emergency Response Team (CERT-In), the virus attacks through Wi-Fi could lead to crashing and even hacking of the secure networks. The firm has discovered that the Wi-Fi Protected Setup (WPS) has a design error, which increases risks of virus attacks and may allow attackers to take unauthorised control of the affected system. The error can also help attackers crack and stealthily enter into an encrypted and password protected system.
“The virus is streaming in the Indian Internet networks with a high severity. The combat mechanisms are being deployed,” a computer security analyst with a government agency said. “An unauthenticated, remote attacker within range of the wireless access point could use the PIN (password) to gain unauthorised access to the device to retrieve the password for the wireless network or change the configuration of the device. Failed attempts to exploit the vulnerability could lead to a denial of service condition,” the CERT-In said in its alert to Wi-Fi users.
The agency also pointed out its reports that revealed several WPS devices do not feature any kind of lockout policy for such attack attempts. Users in India mostly use the WPS method to set up a wireless router for home network. The WPS procedure requires a PIN that can be used during the setup phase. Issuing an advisory to the Wi-Fi users, analysts of CERT-In said that users should disable the external registrar feature of the WPS to protect their device from virus attacks.

Free gprs for idea, hutch, airtel, bsnl

Free gprs for idea, hutch, airtel, bsnl

Manual Hutch Gprs Settings
1. Account Name - Hutch_GPRS
2. User Name - Blank
3. Password - Blank
4. Proxy - Enabled/yes
5. Access Point Name - portalnmms
6. Full Internet Access Point Name - www
7. Proxy and Server address - 10.10.1.100
8. Proxy and Server Port - 8080
9. Homepage - http://hutchworld.co.in
10. Authentication Type - Normal

Manual Airtel Gprs Settings
1. Homepage - any page you want to set.
2. User Name - Blank
3. Password - Blank
4. Proxy - Enabled/yes.
5. Proxy and Server Adress - 202.56.231.117
6. Proxy and Server Port - 8080
7. Data bearer - GPRS or Packet Data.
8. Access Point Name - airtelgprs.com
9. Authentication Type - Normal
10. Use preferred access point - No

Manual Airtel live settings
1. Account Name - Airtel_live
2. Homepage - http://live.airtelworld.com
3. Username - Blank
4. Password - Blank
5. Proxy - Enabled/yes
6. Proxy and Server Adress - 100.1.200.99
7. Accespoint Name - airtelfun.com
8. Proxy and Server Port - 8080
9. Data bearer - GPRS/ Packet Data
10. Authentication Type - Normal


Free gprs for idea, hutch, airtel, bsnl

Manual Idea Gprs Settings
1. Account Name - idea_GPRS
2. Username - Blank
3. Password - Blank
4. Homepage - http://wap.ideafresh.com
5. Proxy and Server Port - 8080
6. Proxy and Server adress - 10.4.42.45
7. Databearer - GPRS / Packetdata
8. Acces Point Name - imis
9. Proxy - Enabled/yes
10. Authentication Type - Normal

Manual Bsnl Gprs Settings
1. Account Name - BPL WAP
2. Username -
3. Password -
4. Proxy - Enabled/yes
5. Homepage - http://wap.mizone.bplmobile.com
6. Proxy and Server address - 10.0.0.10
7. Proxy and Server Port - 8080
8. Acces Point Name - mizone
9. Data bearer - GPRS/ Packetdata
10. Authentication Type - Normal

Free gprs for hutch

 Free gprs for  hutch 


Manual Hutch Gprs Settings
1. Account Name - Hutch_GPRS
2. User Name - Blank
3. Password - Blank
4. Proxy - Enabled/yes
5. Access Point Name - portalnmms
6. Full Internet Access Point Name - www
7. Proxy and Server address - 10.10.1.100
8. Proxy and Server Port - 8080
9. Homepage - http://hutchworld.co.in
10. Authentication Type - Normal

Top 15 Hacking Software

Top 15 Hacking Software

1. Nmap
I think everyone has heard of this one, recently evolved into the 4.x series.
Nmap (”Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.
Can be used by beginners (-sT) or by pros alike (–packet_trace). A very versatile tool, once you fully understand the results.
Get Nmap Here

2. Nessus Remote Security Scanner
Recently went closed source, but is still essentially free. Works with a client-server framework.
Nessus is the world’s most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the world’s largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.
Get Nessus Here

3. John the Ripper
Yes, JTR 1.7 was recently released!
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.
You can get JTR Here

4. Nikto
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).
Nikto is a good CGI scanner, there are some other tools that go well with Nikto (focus on http fingerprinting or Google hacking/info gathering etc, another article for just those).
Get Nikto Here

5. SuperScan
Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the highly popular Windows port scanning tool, SuperScan.
If you need an alternative for nmap on Windows with a decent interface, I suggest you check this out, it’s pretty nice.
Get SuperScan Here

6. p0f
P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on:
- machines that connect to your box (SYN mode),
- machines you connect to (SYN+ACK mode),
- machine you cannot connect to (RST+ mode),
- machines whose communications you can observe.
Basically it can fingerprint anything, just by listening, it doesn’t make ANY active connections to the target machine.
Get p0f Here

7. Wireshark (Formely Ethereal)
Wireshark is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers.
Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams! Will do a tutorial on Wireshark later.
Get Wireshark Here

8. Yersinia
Yersinia is a network tool designed to take advantage of some weakeness in different Layer 2 protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. Currently, the following network protocols are implemented: Spanning Tree Protocol (STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration Protocol (DHCP), Hot Standby Router Protocol (HSRP), IEEE 802.1q, Inter-Switch Link Protocol (ISL), VLAN Trunking Protocol (VTP).
The best Layer 2 kit there is.
Get Yersinia Here

9. Eraser
Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP and DOS. Eraser is Free software and its source code is released under GNU General Public License.
An excellent tool for keeping your data really safe, if you’ve deleted it..make sure it’s really gone, you don’t want it hanging around to bite you in the ass.
Get Eraser Here.

10. PuTTY
PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms, along with an xterm terminal emulator. A must have for any h4×0r wanting to telnet or SSH from Windows without having to use the crappy default MS command line clients.
Get PuTTY Here.

11. LCP
Main purpose of LCP program is user account passwords auditing and recovery in Windows NT/2000/XP/2003. Accounts information import, Passwords recovery, Brute force session distribution, Hashes computing.
A good free alternative to L0phtcrack.
LCP was briefly mentioned in our well read Rainbow Tables and RainbowCrack article.
Get LCP Here

12. Cain and Abel
My personal favourite for password cracking of any kind.
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort.
Get Cain and Abel Here

13. Kismet
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.
A good wireless tool as long as your card supports rfmon (look for an orinocco gold).
Get Kismet Here

14. NetStumbler
Yes a decent wireless tool for Windows! Sadly not as powerful as it’s Linux counterparts, but it’s easy to use and has a nice interface, good for the basics of war-driving.
NetStumbler is a tool for Windows that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:
Verify that your network is set up the way you intended.
Find locations with poor coverage in your WLAN.
Detect other networks that may be causing interference on your network.
Detect unauthorized “rogue” access points in your workplace.
Help aim directional antennas for long-haul WLAN links.
Use it recreationally for WarDriving.
Get NetStumbler Here

15. hping
To finish off, something a little more advanced if you want to test your TCP/IP packet monkey skills.
hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping unix command, but hping isn’t only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.