HIDE DATA IN MOBILE WITHOUT ANY SOFTWARE

0 comments

Have you ever wanted to hide folders in your phone? If yes,there here is very interesting solution for you to hide folders in your phone and you dont even need any software for that.
This trick can be used for any JAVA phone from Nokia,Samsung,Motorola,LG or any other company.


JUST FOLLOW SIMPLE STEPS

Create any new folder or you can use any existing folder that is to be hidden.
Rename the folder to any name but with the extension of .jad like if I want to hide my images folder then I will name it as IMG.jad

Now create a new folder with the same name in the same directory but with the extension of.jar So, I would create the folder with the name IMG.jar

And thats it!! My orignal images folder which has been renamed with .jad gets hidden and only folder with.jar extension is visible which is empty. So, my data is protected/hidden from unwanted eyes.


To unhide the orignal folder you have to remove the .jar extension from the new folder and your orignal folder with all the files and with .jad will become visible.

Plz free to comment below..If u faces any type of difficulty...
ThanKU for Visiting...
Read More..

How to Remove Virus from Pendrive

0 comments

Hi friendz..If you are using pendrive for data transfer at school, college or at your office or any where you must have come across the VIRUS creates an exe file in your usb drive with the name New Folder.exe.



WITH THIS VIRUS

Task manager is disabled.
Registry Editor is disabled.
Folder options not working.
Taking too much time for accessing pendrive.
Uses half of your computers processing power.

Now you can easily remove this virus Just download the tool from the link below.
Run this downloaded exe by double clicking on it.
Then click on “Delete Autorun.inf file”.

After that click on ” Remove virus from USB”. The virus will be removed from your pendrive. with this tool you cal also restore your task manager, registry editor and other things which were disabled by virus
just click on “Restore Default Windows Settings”. thats it.............









Read More..

All run commands

0 comments


Accessibility Controls
access.cpl
Add Hardware Wizard                       
hdwwiz.cpl
Add/Remove Programs
appwiz.cpl
Administrative Tools
control admintools
Automatic Updates
wuaucpl.cpl
Bluetooth Transfer Wizard
fsquirt
Calculator
calc
Certificate Manager
certmgr.msc
Character Map
charmap
Check Disk Utility
chkdsk
Clipboard Viewer
clipbrd
Command Prompt
cmd
Component Services
dcomcnfg
Computer Management
compmgmt.msc
timedate.cpl
ddeshare
Device Manager
devmgmt.msc
Direct X Control Panel (If Installed)*
directx.cpl
Direct X Troubleshooter
dxdiag
Disk Cleanup Utility
cleanmgr
Disk Defragment
dfrg.msc
Disk Management
diskmgmt.msc
Disk Partition Manager
diskpart
Display Properties
control desktop
Display Properties
desk.cpl
Display Properties (w/Appearance Tab Preselected)
control color
Dr. Watson System Troubleshooting Utility
drwtsn32
Driver Verifier Utility
verifier
Event Viewer
eventvwr.msc
File Signature Verification Tool
sigverif
Findfast
findfast.cpl
Folders Properties
control folders
Fonts
control fonts
Fonts Folder
fonts
Free Cell Card Game
freecell
Game Controllers
joy.cpl
Group Policy Editor (XP Prof)
gpedit.msc
Hearts Card Game
mshearts
Iexpress Wizard
iexpress
Indexing Service
ciadv.msc
Internet Properties
inetcpl.cpl
IP Configuration (Display Connection Configuration)
ipconfig /all
IP Configuration (Display DNS Cache Contents)
ipconfig /displaydns
IP Configuration (Delete DNS Cache Contents)
ipconfig /flushdns
IP Configuration (Release All Connections)
ipconfig /release
IP Configuration (Renew All Connections)
ipconfig /renew
IP Configuration (Refreshes DHCP & Re-Registers DNS)
ipconfig /registerdns
IP Configuration (Display DHCP Class ID)
ipconfig /showclassid
IP Configuration (Modifies DHCP Class ID)
ipconfig /setclassid
Java Control Panel (If Installed)
jpicpl32.cpl
Java Control Panel (If Installed)
javaws
Keyboard Properties
control keyboard
Local Security Settings
secpol.msc
Local Users and Groups
lusrmgr.msc
Logs You Out Of Windows
logoff
Microsoft Chat
winchat
Minesweeper Game
winmine
Mouse Properties
control mouse
Mouse Properties
main.cpl
Network Connections
control netconnections
Network Connections
ncpa.cpl
Network Setup Wizard
netsetup.cpl
Notepad
notepad
Nview Desktop Manager (If Installed)
nvtuicpl.cpl
Object Packager
packager
ODBC Data Source Administrator
odbccp32.cpl
On Screen Keyboard
osk
Opens AC3 Filter (If Installed)
ac3filter.cpl
Password Properties
password.cpl
Performance Monitor
perfmon.msc
Performance Monitor
perfmon
Phone and Modem Options
telephon.cpl
Power Configuration
powercfg.cpl
Printers and Faxes
control printers
Printers Folder
printers
Private Character Editor
eudcedit
Quicktime (If Installed)
QuickTime.cpl
Regional Settings
intl.cpl
Registry Editor
regedit
Registry Editor
regedit32
Remote Desktop
mstsc
Removable Storage
ntmsmgr.msc
Removable Storage Operator Requests
ntmsoprq.msc
Resultant Set of Policy (XP Prof)
rsop.msc
Scanners and Cameras
sticpl.cpl
Scheduled Tasks
control schedtasks
Security Center
wscui.cpl
Services
services.msc
Shared Folders
fsmgmt.msc
Shuts Down Windows
shutdown
Sounds and Audio
mmsys.cpl
Spider Solitare Card Game
spider
SQL Client Configuration
cliconfg
System Configuration Editor
sysedit
System Configuration Utility
msconfig
System File Checker Utility (Scan Immediately)
sfc /scannow
System File Checker Utility (Scan Once At Next Boot)
sfc /scanonce
System File Checker Utility (Scan On Every Boot)
sfc /scanboot
System File Checker Utility (Return to Default Setting)
sfc /revert
System File Checker Utility (Purge File Cache)
sfc /purgecache
System File Checker Utility (Set Cache Size to size x)
sfc /cachesize=x
System Properties
sysdm.cpl
Task Manager
taskmgr
Telnet Client
telnet
User Account Management
nusrmgr.cpl
Utility Manager
utilman
Windows Firewall
firewall.cpl
Windows Magnifier
magnify
Windows Management Infrastructure
wmimgmt.msc
Windows System Security Tool
syskey
Windows Update Launches
wupdmgr
Windows XP Tour Wizard
tourstart
Wordpad
write



Plz free to Comment below...

ThanQ U for Visiting... 
Read More..

How to Clear BIOS password

0 comments

TRICK TO REMOVE BIOS PASSWORD



HERE WE STARTS:-

At command prompt type debug
you will get a - prompt where you can type the following ( means hit enter, not type enter*)

A
MOV AX,0
MOV AX,CX
OUT 70,AL
MOV AX,0
OUT 71,AL
INC CX
CMP CX,100
JB 103
INT 20
just hit enter on this line
G

Basic BIOS password crack -

This is a password hack but it clears the BIOS such that the next time you start the PC, the CMOS does not ask for any password. Now if you are able to bring the DOS prompt up, then you will be able to change the BIOS setting to the default. To clear the CMOS do the following:
Get DOS prompt and type:
DEBUG hit enter
-o 70 2e hit enter
-o 71 ff hit enter
-q hit enter
exit hit enter

Restart the computer. It works on most versions of the AWARD BIOS.


ThanQ for Visiting..

Plz free to Comment below..


Read More..

Bluetooth Technology

0 comments
Hi folkz..every time we are coming with different techniques..But today I am sharing a  technology which we are using daily life i.e, BLUETOOTH



Bluetooth is a wireless technology that enables any electrical device to wirelessly communicate in the range of 2.5 GHz ISM frequency band. Mobile phones, headsets, PDA's and portable computers can communicate and send data to each other without wires or cables to link to devices together. The name of Bluetooth derived from the name of an English king Harold Bluetooth.


It a low cost, low power, radio technology, which is particularly suited to the short range Personal Area Network (PAN) application. Bluetooth Special Interest Group is authorized to develop its specifications & license.

The Main Features of Bluetooth are given below:


* It operates in the 2.4GHz frequency band without having a license for wireless communication.

* Up to 10-100 meters data can be transfer in real time.
* Close proximity & accuracy is not required for Bluetooth as in case of infrared data (IrDA) communication device. Bluetooth does not suffer from interference from obstacles such as walls while infrared suffers due to obstacles.
* Bluetooth supports both point-to-point and point-to-multipoint wireless connectionswithout cables between mobile phones and personal computers.
* Data transfer rate of blue tooth varies from version to version. Data rate of 1 Mbps for Version 1.2 Up to 3 Mbps for Version 2.0.


Then major parts of Bluetooth system are RF transceiver, base band, and protocol stack. Bluetooth is used for small-area networking without user intervention. Due to extremely low transmission power in Bluetooth technique battery power is saved. It is a networking standard that works at two levels:


· Physical level.
· Protocol level


Due to these levels mobiles have to agree on these levels when bits are sent. It decides the amount of data to be sent at a time, and how the parties in a conversation can be sure that the message received is the same as the message sent.


Bluetooth networking transmits data through low-power radio waves. It can connect up to eight devices simultaneously. With in the range of about ten meters you must think that the devices will not interfere with each other. Bluetooth solved the problem of devices interference while sending the data by using the technique of Spread-Spectrum Frequency Hopping due to which devices may transfer data at the same frequency at the same time. The question rises here is how Bluetooth send the same data using same frequency band without devices interferences? In Bluetooth technique, transmitters change frequencies 1,600 times in every second. In this way devices can make full use of a limited band of the radio spectrum.


When Bluetooth devices came into the range of each other, conversations take place automatically. This conversation automatically determines whether they have the data to share or not. In this way Bluetooth devices not only share the data but also control the data to be transferred. When the connection is established, the devices either they are part of a computer system or a network, Bluetooth systems create a personal-area network.


The technology used in Bluetooth also provides security in three ways:


· Pseudo-random frequency hopping,


· Authentication,


· Encryption.


Frequency hops make it difficult for anyone to eavesdrop. Authentication allows a user to limit connectivity to specified devices. Encryption uses secret keys to make data intelligible only to authorized parties.


Service-level security and device-level security work together to protect Bluetooth devices from unauthorized data transmission.


Many serious problems create only due to improper security issues. Some of them are given below:



* Blue jacking

* Blue bugging
* Car Whisperer

Blue Jacking


It is used to send a business card in the form of text message via Bluetooth to other users. It should be noted that the distance between two users is not more than 10 meters. If the user doesn't found the proper text, he should add the contact to his phone book. After saving his contact in his address book retry to send the same message. In this way the user can get business card from other user via Bluetooth. It’s all because of the known destination from where the massage is being coming.


Blue Bugging


Due to this hackers can access user’s phone. It not only access one’s mobile phone, but also use its features including placing call, messaging. Even though the user doesn't realize it’s happening.


Car Whisperer


Car whisper is a type of software due to which hackers can send and receive audio file from a Bluetooth-enabled car stereo.


Plz free to comment below..

ThanK You for Visiting...
Read More..

Basic Unix / Linux shortcut keys

0 comments
Hi friend z...every time we are with different tricks..but today I Am presenting a simple and basic short cut keys for Linux/Unix Operating system that you must know.........                                                    

Keyboard shortcut keys 

CTRL + B
Moves the cursor backward one character.
CTRL + C
Cancels the currently running command.
CTRL + D
Logs out of the current session.
CTRL + F
Moves the cursor forward one character.
CTRL + H
Erase one character. Similar to pressing backspace.
CTRL + P
Paste previous line and/or lines.
CTRL + S
Stops all output on screen (XOFF).
CTRL + Q
Turns all output stopped on screen back on (XON).
CTRL + U
Erases the complete line.
CTRL + W
Deletes the last word typed in. For example, if you typed 'mv file1 file2' this shortcut would delete file2.
CTRL + Z
Cancels current operation, moves back a directory and/or takes the current operation and moves it to the background. See bg commandfor additional information about background.

Command line shortcuts

In addition to the below command line shortcuts, it is also helpful to use the alias command that allows you to specify a keyword for frequently used commands or mistakes.
~
Moves to the user's home directory.
!!
Repeats the line last entered at the shell. See history command for previous commands.
!$
Repeats the last argument for the command last used. See history command for previous commands.
reset
Resets the terminal if terminal screen is not displaying correctly.
shutdown -h now



Read More..
Icon Icon Icon Follow Me on Google Plus

Copyright 2011 All Rights Reserved / Privacy Policy / Sitemap / Contact Us

Template by / TricksWonder / Powered by / Blogger