Saturday, October 17, 2009

BLACK BERRY STROM


Network Support: Dual–band 800/1900 MHz CDMA/EV–DO Rev. A networks; Quad–Band: 850/900/1800/1900 MHz GSM/GPRS/EDGE networks Single–Band: 2100 MHz UMTS/HSPA networks
Memory: 128MB Flash Memory, 192MB RAM, 1GB On–board memory
Display: High resolution (480×360 pixel), 3.25″ color, TFT LCD. Supports over 65k colors
Memory card support: 8GB SanDisk microSD card installed (device supports up to 16GB)
Camera: 3.2 Megapixel Camera w/Flash, auto–focus and Video Capture
Integrated speaker and microphone, Hands–free headset capable (3.5mm 4 Pole)
Bluetooth: (v2.0) including A2DP for Stereo sound
Standard Lithium Cell (1400 mAh)Usage: Up to 270 minutes of talk time or Standby: Up to 372 hours
SAR Information: 0.50 W/kg at ear; 0.57 W/kg on body
Dimensions: 4.43″ (H) x 2.45″ (W) x 0.55″ (D)
Weight: Approximately 5.47 oz. including battery

BlackBerry TOUCH SCREEN


A touchscreen BlackBerry device, it’s only fitting that we follow up and give y’all the real lowdown on it! This is going to excite a lot of people, but anger many. Are you ready? The BlackBerry Thunder, as it is codenamed now, (all you "reporting" on it as the Storm are incorrect) will launch in Q3 of this year. It is a full touchscreen BlackBerry — no slide out keyboard — with only 4 physical keys. Those are the send / end phone keys, the BlackBerry menu key, and the back key. Here is the most interesting part, though: it will launch as a worldwide lifetime exclusive on Verizon and Vodafone! We’ve heard the unit will be a hybrid device with CDMA EV-DO Rev. C (for clarification, Rev C., known as UMB is practically dead. If the device will indeed launch with a 4G solution, our bet is on LTE), and GSM HSPA for traveling internationally. Verizon and Vodafone will have the same unit. Currently, the model number is the BlackBerry 9500, though it’s very early and that’s likely to change. This is HUGE for the Verizon lovers. For once they’ll get an exclusive device, but Verizon will have a sales quota for the device and if they don’t meet those numbers, we’ve heard the exclusivity will then dissolve and it’s over. This will be extremely interesting to see play out

Nokia 6760


The Nokia 6760 slide is Nokia’s latest mobile offering to the smartphone market. Looking to sate happy-tappers’ itchy fingers with a slide-out QWERTY keyboard it’s a similar beast to the Nokia Surge that was unveiled to the US last week.

The Nokia 6760 slide gets its name from that full QWERTY keyboard that slides out from under a 2.4-inch screen. We already know that Nokia makes some of the best mobile keyboards in the business (check out the Nokia N97’s keyboard), and this looks to continue that trend, making typing out emails and texts on the move as easy as, well, typing. Which is good as the Nokia 6760 slide supports Mail for Exchange, Google Talk and Windows Live Messager.

Nokia Mural handset


Nokia has again captured the market with the latest Mural handset. It’s not very appealing like the other mobile phones. But still some specs will catch your attention. Its very cheap and affordable, the flip one. It has a similar look like the Motorola phones, the one very famous. This Nokia mobile phone will be given to the AT&T recipients. It’s exclusive for the girls who love coloured phones. It suffices 2 MP cameras, micro SD card, 3G HSDPA compatible, Bluetooth, AT&T navigation, AT& T video, AT & T music and more therein. You can also get the covers of this phone in different colour, thus you can match it with your clothes and other accessories.

Nokia Aeon.


The Nokia has announced, they launch her latest iPhone model Nokia Aeon. When people are heard about this mobile phone then everybody had gone crazy about this phone

LATEST NOKIA PHONES

Nokia 6600 slide and 3600 slide
Nokia just announced a trio of "Beautiful to use" Nokia handsets with its Nokia 6600 slide, 6600 fold, and 3600 slide. The €250 6600 fold is said to smoothly arc open with the press of a button to reveal a 2.13-inch OLED display sporting 16 million colors. It also features tap commands. When off, a double-tap of the monolithic cover reveals the time, messages and missed calls. A double-tap also snoozes alerts and silences or rejects incoming phone calls. The €275 6600 slide (pictured left) features the same tap technology but bumps the digital camera up from 2 to 3.2 megapixels with a 2.2-inch QVGA display based on LCD tech, presumably. The 3600 slide offers the same camera with built-in background noise cancellation --

Nokia Morph


The main idea behind Nokia Morph concept phone is the use of nanotechnology based flexible materials, transparent electronics and self-cleaning surfaces. These materials should enable Nokia to produce a mobile device that “…might be stretchable and flexible, allowing the user to transform their mobile device into radically different shapes”.
Different shaped devices you see in the picture, is actually the same one mobile handset, that transforms itself into the concrete shape according to the user needs.
The concept was developed by Nokia research center in cooperation with Cambridge University and is on display at The Museum of Modern Art (MoMA) in New York

SMS HISTORY


SMS (Short Message Service)
How would we survive with texting? Many companies have claimed to have sent the very first text message however reports suggest that the honour went to Edward Lantz, an employee at NASA who sent a simple message via his Motorola Beeper using upside down numbers to spell out words. The first commercial SMS message was sent over the Vodafone GSM network in the UK on 3rd December 1992 from Neil Papworth on a personal computer to Richard Jarvis using an Orbitel 901 handset. The message read "Happy Christmas". Today we have moved on again to predictive text but I think the verdict is still out on it seeing as a good portion of the mobile using world prefer to stick to the single letter format.

HISTORY OF MOBILE PHONE


It has been more than 35 years since Martin Cooper placed the first call on a mobile phone to his rival at Bell Labs while working at Motorola. Heck, it's been nearly 20 years since Saved by the Bell’s Zack Morris placed a phone call to Kelly Kapowski from his locker. In that time, phones have come a long way.
We now live in a golden age of mobile phones. Or, perhaps more accurately, the end of the age of mobile phones. The iPhone, the G2, the N95, the Bold: These are exceptionally small mobile computers with built-in telephony features.
It has been a long trek from the monstrous, if revolutionary, Motorola DynaTAC to the elegant and refined modern devices that not only allow us to make calls, but also to send e-mails, surf the web, track our movements, listen to music, watch movies and generally handle our varied communications.

Friday, October 16, 2009

Arrest Warrant of hacker

Utah v. Mark Hacking -- Criminal Information and Arrest Warrant (August 9, 2004)-->
Criminal CaseState of Utah v. Mark Douglas HackingDomestic Violence Information and Arrest Warrant
First degree murder and obstruction of justice charges, alleging that he admitted to his brothers that he shot and killed his wife with a .22 caliber rifle while she was sleeping, following an argument the couple had after the defendant reportedly told his wife that he misled her about medical school

HACKING VIA BLUETOOTH

Hacking a Bluetooth Cellphone
Walking around with Bluetooth enabled on your cell phones is just like presenting food to a hungry man.
Hackers can easily connect to your device using simple Bluetooth Transmitter and they are then able to manipulate your device without letting you know about it. Let me first define how it happens and then we’ll go to – how to protect your device from Bluetooth hacking attacks.Bluetooth is a well-known and widely used short range wireless communication technology which uses 2.4GHz frequency range for transmission of data without any physical link. Most of the latest cell phones have the Bluetooth technology. People use it for attaching their cell phone with computers, enabling Bluetooth wireless hands-free and in-car connectivity without knowing that it is an open door to hackers.While discussing about the past, cell phones and telecommunication companies were “closed network” but as technology grew, Cell phones become more than an ordinary cell phone to a mini-computer. And so, hackers have tended their concentration towards hacking of these mini-computers or so called Cell phones.

HACKING XBOX 360

The Xbox 360 DVD-ROM drive firmware hack is currently the only modification or hack available for the Xbox 360 that allows you to play properly created backup copies of Xbox 360 games. The firmware hack does NOT allow homebrew programs to run and does NOT bypass region protection. If a video game is locked to a particular region, then it will only play on an Xbox 360 of that same region. Before jumping into this modification, it is a good idea to learn how this hack works.

GMAIL HAKING



* The first book to unlock the true power behind Gmail, Hacking Gmail will immediately appeal to Google and Gmail fans* This is serious, down-and-dirty, under-the-hood, code-level hacking that will have readers eliminating the default settings, customizing appearance, disabling advertising, and taking control over their Gmail accounts* Covers turning Gmail into an online hard drive for backing up files, using it as a blogging tool, and even creating customized Gmail tools and hacks* Shows readers how to check their Gmail without visiting the site; use Gmail APIs in Perl, Python, PHP, and other languages, or create their own; and maximize Gmail as a host for message boards, photo galleries, even a blog

Wireless Hacking



Wireless Hacking Live
Wireless Hacking Live - FBI version ISO from Rapidshare, Megaupload, Hotfile & direct download service called IDA. Download anything with more then 2000+ Kb/s downloading speed, or Download via Bittorrent.
Wireless Hacking Live - FBI version ISOLive Cd For Wireless Hacking, Also Used By The FBIThis version is for all systems except systems with the Intel B/G wireless cards (IPW2200).- Live CD with all the tools you need to hack a WLAN / wireless Access point - Linux Live-CD - OS runs from CD - 635 mb - .iso- also used by the FBI.WEP Hacking - The Next GenerationWEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of “strong” encryption while a 128 bit key has 104. The IV is placed in encrypted frame’s header, and is transmitted in plain text.Traditionally, crac*ing WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packetsa€”a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP crac*ing program such as Aircrac* would be used to find the WEP key.Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, “It doesn’t matter if you use 128 bit WEP keys, you are vulnerable!”WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products.WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long.A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of “strong” encryption while a 128 bit key has 104.The IV is placed in encrypted frame’s header, and is transmitted in plain text.Traditionally, cracking WEP keys has been a slow and boring process.An attacker would have to capture hundreds of thousands or millions of packets a process that could take hours or even days, depending on the volume of traffic passing over the wireless network.After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared.This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours.Basic Directions:1)Boot from cd2)get the wep key3)write it down4)reboot into windows5)connect using wep key.Note: if you have problems burning the ISO, convert the ISO using Magic ISO to nrg image, before burning.Size : 626 MB(6X100+26)
Code: http://w14.easy-share.com/1702310530.html
http://w14.easy-share.com/1702310652.html
http://w15.easy-share.com/1702310933.html
http://w15.easy-share.com/1702311051.html
http://w18.easy-share.com/1702311340.html
http://w18.easy-share.com/1702311421.html
http://w15.easy-share.com/1702311417.htm

Concept of Hacking



‘Hacking’ is a concept known by most of the people who log on to the internet. Hacking is a crime! By simply punching some codes, one can get a copy of the passwords and then in turn misuse the account that belongs to someone else. These spoofs hamper the safety of the internet users. Generally people wanting to explore the possibilities of getting into someone else’s account indulge themselves in these hacking tactics. But this is also a way of misusing the information. People who indulge in these crimes are known as Hackers. Usually the hackers hack the computers of big companies and leak the important information. Hackers normally are not differentiated from the crackers, who are the people who get the unauthorized access to any of the restricted computers. The security of the computers is hampered due to the hacking that takes place. Most of your important information is leaked out due to the hackers. If most of your files are deleted or blocked by the hackers, you cannot access your own PC. This is when we end up saying “My PC has been hacked!”Just as to protect your PC from such cases, you can install the firewall that can help you and protect you from the existing hackers to a certain extent.
I will continue my series on hacking, phishing, viruses and all other online threats, and how to protect yourself. I shall discuss later who ar ethical hackers and how they can be helpful.

Hacking History


History of Hacking
Well, things are moving a little slow around the Dojo today. It may be because Heroes came back on last night, and I was busy watching… or because the Red Sox swept the Yankees out of Fenway for the first time in 17 years. Or it may be that I’m still recovering from the shock that 1990 was 17 years ago.

Hit Counter