This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

Sunday, September 25, 2011

How to Spoof Caller ID – Caller ID Spoofing

Caller ID SpoofingCaller ID spoofing is the act of making the telephone network to display any desired (Fake) number on the recipient’s Caller ID display unit instead of the original number. The Caller ID spoofing can make a call appear to have come from any phone number that the caller wishes.
Have you ever wondered how to perform Caller ID spoofing? Read on to know more information on how to spoof Caller ID.
Unlike what most people think, an incoming call may not be from the number that is displayed on the Caller ID display unit. Because of the high trust that the people have in the Caller ID system, it is possible for the caller to easily fool them and make them believe that the number displayed on the Caller ID display is real. This is all possible through Caller ID spoofing.

How to Spoof Caller ID?

 

You can easily spoof any Caller ID using services like SpoofCard. In order to use the spoofcard service, you need to pay in advance and obtain a PIN (Personal Identification Number) which grants access to make a call using the Caller ID spoofing service. Once you have purchased the service, you will be given access to login to your SpoofCard account. To begin with, you need to call the number given by SpoofCard and enter the PIN. Now you will be given access to enter the number you wish to call and the number you wish to appear as the Caller ID.
Once you select the options and initiate the calling process, the call is bridged and the person on the other end receives your call. The receiver would normally assume that the call was coming from a different phone number ie: the spoofed number chosen by you - thus tricking the receiver into thinking that the call was coming from a different individual or organization than the caller’s. In this way, it becomes just a cakewalk to spoof Caller ID and trick the receiver on the other end. Thus, you neither need to be a computer expert nor have any technical knowledge to spoof caller ID. For more information on SpoofCard service visit the following link.
SpoofCard - Caller ID Spoofing Service

How Caller ID Spoofing works?

 

Caller ID spoofing is done through various methods and using different technologies. The most commonly used technologies to spoof Caller ID is VOIP (Voice Over IP) andPRI (Primary Rate Interface) lines.
Today most VOIP systems provide an option for it’s users to enter whatever number they want in the calling party field and this number is sent out when they make a call. Hence it is easily possible for any user to spoof Caller ID provided they have a VOIP system and know how to properly configure it to spoof the Caller ID. However sites like SpoofCard provide an easy and cheap spoofing services for those who aren’t using VOIP systems that they can configure themselves.
Caller ID spoofing is possible and being performed right from the days Called ID system was introduced. However most people are unaware of the fact that it is possible to spoof  Caller ID and make any number to be displayed on the receiver’s end. In the past, Caller ID spoofing service was mostly used by telemarketers, collection agencies, law-enforcement officials, and private investigators. But today, it is available to any Internet user who wish to spoof caller ID.

Thursday, September 22, 2011

Android vulnerabilities exposed [Video ]

It's been more than a month since researchers reported two serious security vulnerabilities in Android, but so far there's no indication when they will be purged from the Google-spawned operating system that's the world's most popular smartphone platform.

Oberheide and Lanier are set to teach a two-day mobile security training course at SOURCE Barcelona this November where they will presumably refer to this and other Android vulnerabilities. Let's hope, for the sake of Android's reputation, that these things are resolved much sooner.
The first vulnerability is known as a “Permission escalation vulnerability”, and allows attackers to install additional “arbitrary applications with arbitrary permissions”, without first asking the user if they want to permit such actions. This would allow attackers to access call records, texts, web browsing history and media stored on the device.

The second bug only affects the Samsung Nexus S smartphone. It lets attackers gain root access on the device, providing them with full control over the handset. Google has yet to address the security issues.




Wednesday, September 21, 2011

iPhone Skype XSS Vulnerability Lets Hackers Steal Phonebook [Video]


A bug in the latest version of Skype for iPhone and iPod touch makes its users vulnerable to having their address book stolen just by viewing a specially crafted message, says AppSec Consulting security researcher Phil Purviance.

The problem is made more exploitable by the way Skype uses the embeddable WebKit browser; Skype developers have set the URI scheme for the embedded browser to "file://". This error allows an attacker to access the file system and read any file that the app would be allowed to read by the iOS application sandbox. One file that every iOS application has access to is the user's SQLlite AddressBook database. In a demonstration of the bugs, Phil Purviance, AppSec Consulting security researcher, showed how it was possible to extract the iPhone address book using the vulnerabilities.

Skype is aware of the issue and is working on a fix. “We are working hard to fix this reported issue in our next planned release, which we hope to roll out imminently,” Skype said in a statement.
 
 

Simple solution: Don't open text messages in the chat window, and check for a really quick update.

Tuesday, September 20, 2011

Droidsheep : Android Application for Session Hijacking


Droidsheep is free alternate of faceniff which is available on download droidsheep website for free. Its one click hijacking tool which supports
  • Amazon.de
  • facebook.com
  • flickr.com
  • twitter.com
  • linkdein.com
  • yahoo.com
  • live.com
  • google.de (only the non-encrypted services like "maps")
What do you need to run DroidSheep.?

  • You need an android-powered device, running at least version 2.1 of Android
  • You need Root-Access on your phone (link)
  • You need DroidShep (You can get it in the "GET IT" section)

Download Droidsheep

Monday, September 12, 2011

Common Codes for Nokia-CDMA

Nam Set: *3001#12345#

Software Version: *#837#

Software Version: *#9999#

CDMA Mode : *#7738#


Message sending options: *#66767#


Esn Number: *#92772689#

Current Channel: *#24#


Restart Phone: *#75681#

Restart Phone: *#75682#

Nokia 8887 Nam Programming :
Nam Set: *3001#12345#
Version: *#0000#
Evrc: *#3872#
Esn/Data/Timer: *#92772689#
SID: *#743#
Help: *#4357#
Slot Cycles: *#75681# , *#75682#


Nokia 8587 Nam Programming :
Nam Set: *#626#7764726#
A-Key: #8159357022#4579# (26 digits)
A-Key: #8159357022#4547# (20 digits)
Version: *#0000#
Version: *#837#
Vocoder: *#3872#
Change language: Menu 5, 3, 1
Change DM mode: *#7678#
Debug Screen: *#8378#
Debug: *#8380#
Field Test Menu: *#83788#
SPC Unlock, Factory Reset :
Full Factory Reset: *#7370#
Resets all settings including non-user changeable items (like SPC)

NOKIA TEST MODE:
1) Turn on the phone. Press *3001#12345#
2) Select Field Test and enable it..
3) Exit from NAM.. and restart your phone..
4) you will observe a new menu " Net Monitor "..
5) type appropriate group/display code.. ( 3101 for link info, 6101 for battery info )
6) enter 0000 to back.

Saturday, September 3, 2011

Increase Font Size On Nokia E50

 

You’ll need a memory card and a file manager (e.g. Y-Browser or ActiveFile).

1. Open your file manager and navigate to Z:\resource\Fonts

2. Check the names of the files (these are the fonts that are actually used); they have extension .ttf and most likely they are nosnr60.ttf, nssb60.ttf, nstsb60.ttf and S60ZDIGI.ttf; write them down, you’ll need them later

3. On your memory card create a folder called resource and inside it a folder called Fonts

4. Copy the new fonts to the Fonts folder on your memory card (there are numerous fonts available on the internet for free; try a few of them, experiment and see which fits the best)

5. Rename them in the following order: – nosnr60.ttf regular (normal) font – nssb60.ttf bold font – nstsb60.ttf font for titles

Note: if your font files have different names rename them accordingly. Font names on your memory card must match those on phone memory in Z:\resource\Fonts.

6. Reboot the phone

If you want to switch back to the default font simply erase the whole resource folder from your memory card. If you take your memory card out of the phone the default font will be used.


A Software can also increases font sizes use it for any s60...

Software: Font Magnifier
avialable at: http://shop.psiloc.com