Wednesday, April 17, 2013

Nokia Mobile Sets Secret Codes

Nokia Mobile Sets Secret Codes














Mobile Set: All Nokia Mobile Sets

Use For: Default Security Code.

Code: 12345

Mobile Set: Nokia Mobiles

Use For: Turn On Enhanced Full Rate Codec.

Code: *3370#

Use For: Turn Off Enhanced Full Rate Codec.

Code: *#3370#

Use For: Turn On Half Rate Codec.

Code: *4720#

Use For: Turn Off Half Rate Codec.

Code: *#4720#

Use For: Show Software Version.

Code: *#0000#

Use For: Also For Show Software Version.

Code: *#9999#

Use For: Show IMEI (International Mobile Equipment Identity).

Code: *#06#

Use For: Show Lock Status of Your Nokia Mobile Set.

Code: #pw+1234567890+1#

Use For: Show Lock Status of Your SIM.

Code: #pw+1234567890+4#

Use For: Show Security Code of Your Mobile Phone.

Code: *#2640#

Use For: Reset Game Score And Timer.

Code: *#73#

Simlock info: * # 9 2 7 0 2 6 8 9 #

Provider lock status: # p w + 1 2 3 4 5 6 7 8 9 0 + 1

Network lock status: # p w + 1 2 3 4 5 6 7 8 9 0 + 2

Provider lock status: # p w + 1 2 3 4 5 6 7 8 9 0 + 3

SimCard lock status: # p w + 1 2 3 4 5 6 7 8 9 0 + 4

1234567890 - MasterCode which is generated from IMEI

Blocking USB Ports


Unlocking USB Ports is 3 step process. You have to edit your registry to Lock/Unlock your USB Ports.
Step1: In Windows 7  press Windows key+R and type as “regedit
Step 2: It will open the Registry Editor of  your Windows 7

Step 3: After opening Registry edit browse the following path in reght side bar of registry editor
The Path to go: “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\USBSTOR”
Step4: Then right click the registry “Start” which is rectangled in red color in the below screenshot of registry editor

Step:5 Right Click “Start” and Click modify
  • To enable USB ports: change the value from “4″ to “3″
  • To disable USB ports: change the Value for “3″ to “4″

Make a bootable Pen drive & boot Computer

Boot-able Pen drive
Hello friends, today I shall tell you how to make a bootable USB flash drive. It is very essential to know to make a bootable USB flash drive (Pen drive, External hard disk etc.). Because sometimes it may be your DVD/CD RW drive does not work, or you are using mini laptop and you have no DVD/CD RW drive. In this situation if you want to change or reinstall your operating system, you should to know how to make a bootable USB flash drive. For this you require image file of an operating system, an USB flash drive and 'Power ISO' or 'Novicorp Win To Flash' software.



Using Power ISO Software
  1. First install Power ISO software.
  2. Keep the image file of an operating system into your hard disk or anywhere.
  3. Connect an USB flash drive (Pen Drive).
  4. Open Power ISO and go to tools and click on Create Bootable USB Drive.
  5. Select the Image file as Source Image File. Set your USB flash drive (pen drive) as Destination USB Drive and click on Start button. It will take a few minutes.
Power ISO software : Download
    Using Novicorp Win To Flash

    You required installation CD/DVD or .iso image file of operating system, a flash drive (pen drive), Novicorp Win To Flash software.

    If you use installation CD/DVD :
    • Open 'Novicorp Win To Flash' folder and click on Win To Flash application software.
    • Now click on Task and select Task type.
      • Transfer Windows  XP/2003 setup to USB drive
      • Transfer Windows Vista/2008/7 setup to USB drive
    • Select File system to FAT16 LAB. (Note: This will make your pen drive memory half. You could recover it again.)
    • Click on Run. Select Windows files source path (CD/DVD source path whereinstallation CD/DVD insert) and USB drive (Pen drive or other USB flash drive path). Now click on Run.
    If you use .iso Image file
    • You would have to install Power ISO or Daemon tools to make a virtual CD drive.
    • After install the software, mount the .iso image file.
    • Now follow the above steps (using installation CD/DVD) and at last step selectWindows file source path as virtual CD drive.

    Novicorp Win To Flash software : Download

    Now you can use your USB flash drive as like as an optical hard disk drive (CD/DVD).

    If you use USB flash drive instead of optical hard disk drive (CD/DVD) you need to change Boot Option from BIOS Setup Utility. From Boot Order option set USB Hard Disk as your 1st choice.
    1st Choice USB Hard Disk
    Using Command Prount

    1. 1
      Plug-in your Flash Drive . First plug-in your USB stick to your USB port and copy all the content to a safe location in your hard drive .
    2. 2
      Run Command Prompt as an administrator . For opening Command prompt
      • Go to start menu and type cmd in the search box . Right click on it and select run as Administrator to use it with admin-rights .
    3. 3
      Using the Diskpart utility find the drive number of your Flash Drive . To do so, type in the following commands in the Command Prompt :
      DISKPART
      
      
      • Running DISKPART will display the version of DISKPART you are running, name of your PC . Run the following command .
      list disk
      
      
      • Your Disk Number will be listed and note it down as you'll need this in the next step .
      • Let us assume that the USB Drive is Disk 1 but if it was listed as Disk 2 use Disk 2 instead .
    4. 4
      Format the drive by executing the following commands one by one . Make sure you replace Disk 1 with proper Disk number .
      select disk 1
      clean
      create partition primary
      select partition 1
      active
      format fs=NTFS QUICK
      assign
      exit
      • When its done and if everything goes well , you should have a formatted USB drive .
    5. 5
      Make the Flash Drive bootable by using the bootsect utility that is shipped with Windows 7/Vista .For doing so
      • First insert the Windows 7/Vista DVD and note down the drive letter of the DVD drive . Let us assume it as D: and that of the USB as G .
      • Navigate to the directory where bootsect is found .
      D:
      cd d:\boot
      
      
      • Use the bootsect to make the USB Drive Bootable (ie Updating the drive with BOOTMGR compatible code) and for preparing it to boot Windows 7/Vista . Here, replace G: with the name of your USB Drive .
      BOOTSECT.EXE/NT60 G:
      
      
      • Close the Command Prompt windows .
    6. 6
      Copy all files from the Windows 7/DVD DVD to the formatted USB stick . The safest and the fastest way would be to use the Windows Explorer.
    7. 7
      Change the boot priority at the BIOS to USB.
    8. Warnings

      • Make sure you motherboard is capable of booting USB drive ,if not your computer won't be able to make use of this bootable device .
      • There is no bootsect
      in XP and therefore this might not work in XP .
      
      • You can, from within 64-bit Windows, create a bootable USB drive of your 32-bit or 64-bit Windows disc. In Windows 32-bit you can only create bootable USB drive of 32-bit Windows disc.

    Friday, April 12, 2013

    How to Improve Yourself


    EditSteps

    1. 1
      Imagine what you would be like in your perfect world. How are you different and how could you achieve this?
    2. 2
      Determine what needs improvement and what doesn't. Identify your assets (honest, hard-working, loving...etc.) and your liabilities (angry, lazy...etc.) This is best done with a trusted confident, a loved one, a therapist, a religious leader or even a "Sponsor" in a 12 step group. Most people are experts at self deception. Having an outside party helps to break down some of that. Also, we sometimes have a problem of being either too hard or too soft on ourselves. We need an accurate picture of ourselves if we are to improve.
    3. 3
      Seek out information on how to pursue that change. Information can be gathered from books, articles, friends, family, and professionals. It is amazing how much information will find you when you are ready!
    4. 4
      Pick which suggestions you can apply to yourself and to practice those suggestions. If a certain set doesn't seem to work, try another! Nothing works for everyone. You need to find what works for you!
    5. 5
      Practice, practice, practice! Change comes slowly for most people and can be very uncomfortable. Just keep going until your change is your new reality (the changed you).
    6. 6
      Be sincere. To further improve yourself. If you do good deeds (even if it ranges from simple things like giving someone a smile or helping your mom) with a sincere heart, everything you do automatically becomes better and you'll have true happiness in your life. (Doing any good deed doesn't mean you have to expect anything in return)
    7. 7
      Believe in yourself. Recognize your strengths, even if you have to list all of them down. You have to be your own best friend, then you can be a good friend or lover to others.

    EditTips

    • Don't give up if you don't see improvement right away! Pat yourself on your back for "victories" and give yourself a break if you back slide. "Rome wasn't built in a day"! Just keep at it as you are able. Good luck and good for you!
    • Instead of making large grand goals, start by establishing little goals that achieve the grand goal. For instance losing 50 pounds is a daunting task but something like no chocolate for a week may be more viable
    • It also helps to be generous and charitable

    EditWarnings

    • Use common sense and don't go overboard with anything!

    Thursday, April 4, 2013

    Learn Unethical Hacking Step By Step


    This information is solely for guidance. Hacking is illegal.
    Contact:-
    Prem Shingote
    Email:-premshigote1993@rediffmail.com


     


    LET'S START                                      

                                                 CHAPTER  0 =>
    INTRODUCTION 2 HACKING ERA.
    HACKING,
    FIRST OF ALL WAT IS HACKING ? HACKING IS NOTHING BT BREACHING IN TO A COMPUTER OR IN A SYSTEM OR IN A SOFTWARE RELATED THING,IN VCH ACCESS IS NT PUBLIC..HACKING MEANS GETTING ND MAINTAINING ACCESS IN A CYBER PLACE WHERE U DONT HAVE RIGHTS 2 ENTER.
    IT IS D PERFECT ND MOST APPROPIATE DEFINETION OF HACKING...AGRY?
    SEEMINTERNET IS NT VERY OLD IN DIS WORLD.IT CAME 2 PUBLIC IN 1989 IN YOROPE ND IN U.S.A. ND IN DEVELOPED CONUTRIES ND IN INDIA IT CAME IN 1992.
    ACTUALY INTERNET HAS COME B4 OF MANY YEARS BT USING AT PUBLIC LEVEL ,USING AT A GENERAL HUMAN LEVEL HAS BEEN STARTED IN D YEAR ,IN VCH I HV WRITTEN .
    NOW U MAY THINK INTERNET IS NT VERY MUCH OLD.
    NOW TYPES OF HACKERS---->MOST OF D PPL THINK THEY R OF 2 TYPES.ONE IS ETHICAL HACKERS ND D SECOND 1 IS UNETHICAL HACKER..NO,DTS NT TRUE.
    IN REALITY.HACKERS R OF 3 TYPES.
      
    FIRST--->
    WHITE HAT HACKERS--->THEY R ETHICAL HACKERS.THEY JUST WORK AS A SECURITY EXPERT IN ANY BANK/SOCIETY/ONLINE COMPANY.
    THEY JUST FIND VULNERABILITIES ND POSSIBLE ATTACK IN A SYSTEM ND MAKE DT SYSTEM MOR3E SECURE.THEY HAVE PERMISSION 2 MAKE TESTING OF VULNERABILITIES IN D SYSTEM ND DE DO DERSELF ATACK ND TELL VAT IS D VULNERABILITY.THEY R ETHICAL HACKERS ND NEVER HARM
    ANYTHING .

    SECOND TYPE ---->
    BLACK HAT HACKERS--->THEY R UNETHICAL HACKERS.THEY JUST FUCK ANY ONLINE SYSTEM.THEY DO IT 4 FUN OR MONEY.IT MA SEEM VERY FUNNU BT APART OF FUN ND MONEY THERE IS NO3RD ISSUE 4 VCH HACKING IS DONE
    .
    THIRD TYPE----->
    RED/GREY HAT HACKER--->THEY R D PERSON WHO DO HACKING 4 MONEY .IF U VL PAY THEM MONEY THEY VL SECURE YEW COMPANY IF U VL PAY THEM MONEY THEY VL HARM ANY WEBSITE OR VATEVER U VL SAY 2 THEM 2 DO.
    AS I TOLD U PREVIOUSLY THERE R 3 TYPES OF HACKERS BT IN GENERAL SENSES,IN PUBLIC LAUNGUAGE THEY THINK THERE R 2 TYPES 1 IS HACKER ND S SECOND 1 IS CRACKER.
    WHO IS A HACKER---->NOW THESE LINES R GOING 2 SHAKE UR MIND ABOUT UR CONCEPT OF HACKERS.A HACKER IS A PERSON WHO ONLY SEARCH ND FIND VULNERABILITIES IN A SYSTEM .HE DOES NT HARM IT .A HACKER IS GENERALY A PROGRAMMER WHO IS ONLY INTERESTED IN SEARCHING BUGS IN A ONLINE SYSTEM.THEY R PROGRAMMERS ND GENERALLY WRITE THERE OWN PROGRAAME 2 SEARCH NEW HOLES.
      
    PREREQUISTS 2 LEARN HERE HACKING------->

    if u r thinking vdout knowledge of launguages u cann't do hacking then this is nt true .i know c,c++,v.b.,nd some java bt i have never applied these.there4 all u need 2 learn hacking is ur dedication nd trust in me .
    trust me,if i vl be wrong anywhere then moderators nd piyush vl make dt thing right.oki.... 
    D MOST ESSENTIAL THING,PLZ READ THIS TOPIC VERY VERY CAREFULLY-->
    plz make urself very much sure that u r having winrar in ur computer.i vl give here many softwares .they vl be in rar files , having them is necessary.
    nd plz plz plz upload a second windows in ur computer.make urself sure u r having windows xp in ur system nd have 2 different windows xp in ur system.
    on first windows xp do ur neutral work nd on d second windows xp ,turn off firewall nd dont install antivirus.
    here i vl give u some tools ,2 whom ur antivirus vl nt allow 2 work der4 plz have a second windows in ur computer.such a topic in vch u vl be needing 2 have second xp ,vl come in a week.der4 in next 1 week definetaly upload second windows on ur system .
    let's start hacking now.introduction is over ..actually there r many things 2 explain bt i think it vl spoil d interest .
    let's jump 2 d next chapter.

    EXPLOITING IP ADDRESS.

    IP ADDRESS STANDS
    for internet protocol address.
    your ip address is d unique address on vch data r sent 2 you. ur internet service provider make hiMself sure dt datas r going 2 u bcoz he is sending data on d address specialy assigned 2 you.



    getting ur own ip address---->
    click on start,go on run,open run type cmd hit enter
    a command prompt vl appear
    write der
    netstat -n
    nd hit enter
    a list vl appear..look at local address .d first local address is ur ip address. d second method 2 get ur ip address is open
    whatismyip.com
    on dis site u may easily know ur ip address.
    writing netstat is more good dis command tells about all ip address vch r connected 2 u dis moment. 
    memorize dis small list
    ftp---->21
    smtp--->25
    dns---->53
    http--->80
    https---->81
    pop3---->110
    telnet--->23
    these r port no.s.

    TRACING IP ADDRESS------->

    i know many of u know dis thing,tracing some1 but i vl tell u here many new nd exiting ways.
    let's start.
    first of all,vat is d need we have 2 trace any1?
    see,suppose dt u vant 2 hack anywebsite or 2 any person then d most imp. thing is 2 get his ip address.
    untill d moment u vl nt be knowing his id address how can u do anything?
    here i vl teach u only tracing ip address. attacks vl come in future.
    let's start ,be prepared 4 knowing many new ways 2 trace any1.
    click on start>run>type cmd>hit enter
    write
    tracert websitename
    ex:-
    tracert google.com
    hit enter
    now some information vl come automatically
    u vl see written der[mind written in blue clr]
    tracing route 2 wensite name[ip address of d website]


    nd then many more things.
    yes nw u successfully got d ip address of d website.it is really very easy.
    d line vch i hv written in blue clr vl be d first line automatically came nd in dt first line u may see d ip address of d website.now in second line u vl see written.
    over a maximum hops of 30

    explanation of hopes nd dis thing
    ------------>

    see,wenever u open any website u just send some data 2 dt website 4 vch dt website replies u nd den u send some data gain nd dis process continues ,nw suppose dt after of writing tracert google.com ,ur data packets reached 2 google.com ,now google vl try 2 reply u,bcoz google is a very big website ,it take help of many servers ,replies 4m google vl come 4m dese servers .
    now look at ur command prompt.der u can see written tracing vd a maximum of 30 hopes.here u r getting ip address of d servers 4m vch datas r processing 2 u .
    here u vl see * dis sign in some places,here they have fixed firewall,so dt u cann't attack easily.
    written * means der is a firewall,bcoz tracing any1 is very easy,der4 de webmaster fix some firewalls so dt no1 ud be able 2 attack on dem properly.
    i think u ppl r geting me.
    A GENERAL MISCOnCEPTION------>

    I KNOW DIS THING IS NT RELATED 2 IP ADDRESS bt it is very much essential 2 tell here ,see most of u think on internet we cann't get highly sensitive information..dis is nt true.on internet many person has posted rapidshare accounts vch u need very much bt d problem is u donno where it is?d same thing is vch other things also.on internet many ppl has written many highly secret things about a website bt we donno dt .
    here all u have 2 make urself clear that on internet u can get highly informative topics also.oki?
    let's moov 2 our original place.
    see,
    nslookup command wen u applied ,
    u may see written der .u r nt authentized 2 dis route.
    is der something wrtten like it?
    i know der is.now u can think d importaince of dis command.
    now 4 getting ip address nd 4 getting many sensitive information about a website u may also use these websites.
    open
    samspade.com
    nd open
    dnsstuff.com
    nd open
    whois.net
    on these websites just enter d name of any website nd dis website vl give u each nd every inforamtion about dt website.u may also write down here any ip address nddese sites vl tell u each nd every thing about dt website.
    it is really very cool....plz open al d websites nd try 2 get d inforamtion of orkut.com nd google.com nd ur college's website.u may easily know ur college is taking who's help 2 give u internet .
    u may also know wen a website has been made nd each nd everything about dt website.
    try on orkut nd google nd ur clg website now.

    gathering information is d first job of a hacker.untill d moment u vl nt be aware about each nd everyting about a website or about a ip address u cann't do anything...der is a name of gathering information thing and dt isreconnaisance
    i think on a website now u ppl easily can do reconnaisance. 
    it all was about tracing a website nd 4 gathering inforamtion about a website .
    now jump 2 learn how 2 trace a person.
    mind it till now u did trace onlu a website.
    tracing a person is also easy.no.no..it is very easy. 
    see, first of all we will learn 2 trace a person who has sent u a mail thenwards we vl learn 2 trace a person vd whom u r doing chatting.

    TRACING A PERSON WHO HAS SENT U AN E-MAIL

    open ur mail box ,open any e mail.now click on reply .now click on show original.
    view whole d data written der.now u may find dt person's ip address...in show original column u may find dt person ip address but if some1 has sent u mail 4m gmail.com then u cann't get his ip address 4m dis mehod.
    actually gmail uses https[secured=s]
    there4 u cann't get his id addres.
    but there is an way 2 trace g mail also.wait i am writing. 
    now dis trick is 4 tracing gmail,yahoomail,hotmail nd 4 all mail services.
    4m dis technique[vch i am going 2 write down]u can trace all email's ip address.
    first of all open
    readnotify.com
    register der.
    now wenever u vl be needing to trace any1 then compose a mail 2 him nd in email to section write
    victim'semailid.rednotify.com
    nd send him d mail.wen he vl read ur mail ,a mail 2 ur readnotify wil go automatically nd by opening ur readnotify account der u can see dt person' ip adderess.
    actually readnotify sends an automatic generated image vd ur mail nd dis hidden image gives u victim's ip address.
    dis technique is very good.

    HOT SHOT---------------->
    AFTER OF TRACING A PERSON 4 KNOWING WHERE HE IS,ND 4 KNOWING IN VCH COUNTRY IN VCH STATE ND IN VCH CITY HE IS?
    JUST OPEN

    ip2location.com
    here on dis website put d ip address of dt person nd u vl get 2 know his physical appearance.dis thing is also possible 4m telnet bt leave dt .dt is very complicated.

    ---------------------->TRACING A PERSON VD WHOM U R CHATTING<-----------------
    well,
    if u r chatting vd a person then simpally ask his ip address if he tels then its ok. bt vat if he does nt tell?hehehe LOLZ
    anyway
    see,here r some cases.some different cases nd u must hv 2 do different operation vd different massengers.
    wait i am writing.
    well,
    in dis section first of all i ud like 2 remind u d working method of netsta -n command vch i wrote previously.
    netstat command gives u d information of all the communication vch u r doing vd internet.i mean,suppose dt if u r connected 2 orkut nd g mail nd any porn site at a single instant then netstat tells u about all they 3 server's ip address.
    this moment there r many massengers vch ppl use ,,,4 example--->icq massaneger,msn,yahoo massenger,g talk massenger nd many more ,ppl also use some sites like meebo.com 2 use masenger.
    now der r some cases

    -------------------->CASE [1]<------------------------
    if u r chatting 2 some1 on icq massenger then here is d working method of icq massenger
    you------>ur freind
    ur freind---->you
    well,this thing makes very easy 2 trace some1 while chating on icq massenger,wen u r chatting vd him then b4 of starting chatting just open run type cmd hite enter nd write
    netstat -n
    mind it ,till now u hv nt done started chatting vd him,now many ip address will come,simpally note down them somewhere,
    now start chatting vd him,
    nd while chatting vd him
    again open run,type cmd hit enter nd type
    netsta -n
    now u vl see,a new id address.
    bingo,now u hv got d ip address of ur freind

    ------------------->CASE [2]<----------------------
    CHATTING ON YAHOO,MSN,G TALK MASSENGER
    these massengers works in dis way,
    you------->massenger's server------>ur freind
    if u vl do d previous operation then u vl find massenger's ip addres.
    here,u may use social eengineering,
    social eenginering is d next chapter bt here a small introduction.
    social eengineering mans making some1 fool nd hacking him,
    in dis masenger case[mind it most of d massenger follow dis way]simpally say ur freind 2 send a file or 2 recieve a file,if he agrred then just do previous operation.
    when he vl send u d file then it vl nt come thru massenger ,it vl directly come 2 u nd by writing netstat -n,u may find 1 more ip address dt is of ur freind.
    or der's a 1 more method,u may say him 2 mail you or write a mail 2 him nd use readnotify thing,vch i told previously nd now wen he vl send u mail or wen he vl reply 4 ur mail,u can get his ip address.
    confused

    ---------------------> CASE [3]<-------------------------
    TRACING SOME1 WHILE CHATTING ON MEEBO.COM TYPE ONLINE MASSENGERS.
    ,
    here's no method 2 trace him apart of saying him 2 send a mail 2 you or u may send him a mail nd wen he vl reply u vl get or u may say him 2send u a file.
    dt's it.


    well, tracing some1 is nt a big job nd u can do it very easy.

    der r some more commands 2 find ur id address nd der r many more things about ip address,der r 4 different types of ip addresses,
    der is subnet id nd hostid named things exits,u can open a website by writing dt ip address only in d url nd der r some hexatransFer,qustra transfer named things also exits but trust me de things r of no use.
    u may get each nd every information abour ur ip address by doing dis
    open run ->type cmd
    write ipconfig/all
    dis will tell u ur smtp,dhcp information nd many things,writing only ipconfig in command prompt vl also give u many information nd writing inconfig/series will also give bt netstat is fine.
    only ipconfig/all is a good syntax 2 give u ur onw all informations
    tracing ip address is completed now.
    i m nt writing divisiond nd more useless stuffs about ip address,all d things i told previously r enough 4 ip address bt still if u ppl want 2 know more about ip address then write in mine help desk,i vl tell u .i m waiting 4 u ppl reply der.
    we,, we will moov back 2 d learn doing proxy[changing ur ip address] again but after of next 3 chapters,i m not writing proxy nowbcoz 2 clear u d purpuse of doing proxy is very imp.
    in next chapters u ppl vl learn cracking,social eenginering nd hacking in 2 other person's comuter .after of these 3 chapters we will study 2 do proxy.
    be ready freinds,we r moving 2 hack now.

                                                      CHAPTER 2  
           - SOCIAL ENGINEERING<------------------
    social enginering is a very small chapter,it is nt only related 2 internet arena bt it is also related 2 ur social nd general life.u do flirt vd a girl dt is social engineering.saying lies 2 some1 4 making ur own work succeed is also social engineering.social engineering is nothing else but 2 do some crooking vd some1 4 making ur own work completed.suppose dt der is some1 ur freind nd u want 2 hack his orkut ,then vdout trying 2 hack his password simpally click on forgot password,a general person generally put very comman question here vch is very easy 2 guess if u r his freind,social engineering is a very imp. thing.
    let me tell u d first story of hacking.
    it held thru social engineering.
    in starting wen telephone ws new in d world then d first hacker of d world,just looked at d working method of telephonic service,he found dt wen we call some1 then our reqst goes 2 telephone office then there it originates a specific freequency then it transfer 2 d person 2 whom we r calling.he just made a tofee nd put a small whistle in dt packet of tofee vd saying it is a gift vd tofee.
    ppl nd der children started whistling dt whistle,wenever any1 used dt wistle, it produced d same freequency as d telephone server freequncy nd this thing made dt hacker's calls free around d world.
    just look at d whole incident,he just thought nd used a small whistle.
    it means social engineering is very much imp.,if u r doing something big then vdout taking d help of social enginering u cann't make ur desired work.
    suppose dt der is some1 ur freind nd u want 2 hack his orkut ,then vdout trying 2 hack his password simpally click on forgot password,a general person generally put very comman question here vch is very easy 2 guess if u r his freind,social engineering is a very imp. thing,bcoz he is ur freind den in forgot password.
    ------>STANDARD DEFINITION OF SOCIAL ENGINEERING<---------------------------
    [1]social engineering is d human side of breaking in to a corporate network
    companies3 d authentication processes,firewall,virtual private networks nd network monitoring softwares are still wide open 2 attackssocial engineering is d hardest form of attack to defend against bcoz it can't be defend vd hardware or software alone.
    sometimes wen u open a website then u see der something written like"congrats' u r d 1lakhth visitor click here 2 claim"
    on dese places everyday thousands of ppl give der credit cards information easily,
    der r 2 types of social engineering
    [first]HUMAN BASED SOCIAL ENGINEERING
    IT IS CATEGORIZED IN 2 DESE PARTS
    -->impersonation
    --->posing as imp. user
    --->3rd person approcah
    --->technical support
    --->COMPUTER BASED SOCIAL ENGINEERING<-------------
    these r classified in dese
    -->mail/im attachments
    -->pop up windows
    --->sweepstakes
    --->spam mail
    d second chapter is over now.
    wen u vl do something big in ur future then while planning u vl understand d imporataince of social enginnering.
    mind it,4 tracing some1 wen u send som1 a e mail or wen u say him 2 send a file or accept a file 4m him then these things r also social egineering.
    we wiill be using this social engineering while sending some1 trojan/keylogger nd 4 many more things.these things vl come in dis course in future.keep waiting,

    CHAPTER 3
    - SEARCH ENGINE OPTIMIZATION<-------

    nowwards we will moov 2 SEO[SEARCH ENGINE OPTIMIZATION],thenwards SOFTWARES ND CRACKING ,THEN WARDS PROXY ND THENWARDS HACKING IN 2 OTHER'S COMUTER.
    THESE R D NEXTCHAPTERS.
    LET'S START learning seo.
    Well,SEO gives us d exact thing vch we want 2 get 4m google.suppose dt u r searching 4 something on google then google gives u more than 100000 pages nd it is very much difficult 2 find ur exact needed thing in a single shot.SEO gives u d exact thing vch u need exactly.let's start SEO
    go here,http://newyears.noo.com/noo/m/browse...wevent/id/518/
    plz mind d words,written in red colours.nw
    here u can see written dis line
    "New Years Eve at Pink Elephant"
    this is dCOLOR="RED"] "title"[/color] of dis web page
    d link vch i posted above is d "url"
    nd all d data vch has written der is "text"
    now,suppose dt u vant 2 search anything on google nd u want 2 search 4 forum then simpally type
    inurl:forum
    i mean wenever u hv 2 search anything in url ,write
    inurl:desired thing
    wenever u hv 2 search in text write
    intext:desired thing
    wenever u hv 2 search anything in text write
    intext:desired thing
    well, i know most of u r knowing these things already bt d ppl who r nt knowing these,plz try 2 understand dis thing,vdout SEO,u ppl vl feel a lot of problem while hacking a website 4 sql injection,searching cracks on internet nd 4 deirectry transeversal ,it is very much essential thing
    well,  

    now do some practice vd d thing vch i wrote here
    suppose dt u want 2 search d new year celebration then simpally write in google
    intitle:new year celebration
    if u vant 2 search any websit's login page then type
    intext:login inurl:website address
    nd search 4 .
    now suppose dt u want 2 find anything in a specific website then use dis syntax
    site:website fulll address d thing vch u want2 search in dt website
    dis syntax is really very good.
    NOW SUPPOSE DT U WANT 2 SEARCH ANY PDF TYPEFILE OR doc type file then simpally use dis syntax
    filetype:pdf
    d next thing in SEO IS
    RELATED NAMED STUFF,u know dt yahoo is a search

    D SUMMARY OF D CHAPTER
    [1]4 searching something in url use"inurl:"
    [2]4 srching in title use"intitle:"
    [3]4 srhcing in text use "intext:"
    [4]2 get a file of specific type use "filetype::
    [5]2 restrct ur search in a website use "site:websiteaddress urdesired seacrhing item"
    [6]2 get information about a website use"info:website full addres"
    [7]2 get related type sites type"related:website ful address"
    [8]2 nt appear a syntax in ur srch results use a minus[dash] sign.
    to d person who r reading this type thing first time,i m requsting them 2 do very much practice vd all of dese syntaxes.
    a good person always searches by dese techniques.u can find many books related on google ,i hv read all of dem nd thenwards i hv written all d results driven 4m dem.
    do a hell of practice plz