Monday, May 2, 2011

How to Unlock BlackBerry Cell Phones

                                              Previously Blackberry phones were only chosen by the business people but now it seems that even college going student is now choosing Blackberry for fulfilling the communication needs. Right from internet to email, GPS to social media apps, Blackberry has in store to deliver all genre of people. But almost every Blackberry phone comes with operator locked and due to which you need to opt for operator specific plans and offers. You can easily remove these network restrictions just by unlocking the device from the locked network. Ranging from the basic Blackberry handsets to the most sort of range of handsets like Blackberry Curve, Blackberry Torch 9800, Blackberry Curve series, Blackberry Bold 9000, Blackberry 9700 Bold, Blackberry Storm, Blackberry Curve 8900 or any Blackberry device can be unlocked very easily. Most of the unlocking procedures in the market may harm your device but the procedure which we are going to see in the further part of this post is very simple, safe and reliable too.

Procedure to unlock your BlackBerry Smart Phone in 3 Steps:
Step 1: Detect Your BlackBerry Smart Phone Unlocking Model & Network

                                                                                          So, before we proceed for the unlocking of the device, you need to first find the model name, model number and the network on which your Blackberry device is locked on to needs to be found. You can easily find the model name and number on the box packaging of your Blackberry device or also you can find the same below your batter on the sticker. Now after finding the model name and number, you will also need to find the operator on which your Blackberry device is locked on to like on Vodafone, T Mobile, att or any other network service provider. You can easily find the operator on which your device is locked on to, just see the operator logo on your home screen and you will be able to find the operator name or alternatively you can also find the operator name on the Blackberry device itself.
Step 2: Provide Information to Unlock Your BlackBerry Smart Phone

                                                                                            Next up, after finding model name and number plus the operator name on which the device is locked on to, you will also have to find the information on the IMEI number of your device. The IMEI number can be easily found on the label which is generally located below the battery or you can also find the IMEI number of your device just by dialing *#06# from your mobile. Now, after mobilizing all the information as mentioned above, you need to proceed to buy the unlock code by doing a payment using Google Checkout or PayPal service or alternatively the unlock code can also be bought via payment from direct credit card using Google Checkout or Paypal. These payment gateways are cent present secure and are safe.
Step 3: Key in the BlackBerry Unlock Code into Your BlackBerry Phone

                                                                                        
                                                                                           Now, after purchasing the unlock code for your Blackberry device, you now need to proceed for a step by step tutorial on how to complete the unlocking process. To proceed, you will need to select the Blackberry device which needs to be unlocked from a drop down list, if you are unable to find your model then not to worry, just select Any Blackberry device and proceed for the unlocking of the device. So, in just 3 simple steps you have successfully learnt on how to unlock the device easily and safely too.

Wednesday, March 30, 2011

Backtrack 2011

Best Operating system for Hackers

                                                                                                                                                     Hi Friends,TechnologyRatings is now going to explain new article...previous article was on hackers and for doing hacking activities like hacking wireless network passwords, network sniffers,reverse engineering tools, application hacking tools and other encrypting and spoofing hacking tools. Today i will share with you which operating system i use for hacking activities. My favorite operating system is Backtrack Linux and Windows XP not because they are easier to use but because i love their vast functionality and features. But you can also give a try to Matriux Operating System and knoppix , Matriux OS is just awesome but its still under construction as designers are still working on it and patching it. Now lets discuss more about functionality of Backtrack operating system. 



Best Operating System : Backtrack Linux
BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking.
Regardless if you’re making BackTrack your primary operating system, booting from a Live DVD, or using your favourite thumb drive, BackTrack has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester.
BackTrack is intended for all audiences from the most savvy security professionals to early newcomers to the information security field. BackTrack promotes a quick and easy way to find and update the largest database of security tool collection to-date.
Back Track is quite possibly the most comprehensive Linux distribution of security tools. Both hackers and crackers can appreciate the features of this distribution. For black-hat hackers, it provides an easy access to software that facilitates exploitations for secured systems and other reverse engineering. For white-hatters, it is a penetration tester that finds holes in a security scheme. See, everybody wins!
 
Major Features of BackTrack Linux
BackTrack features the latest in security penetration software. The current Linux kernel is patched so that special driver installation is unnecessary for attacks. For example, an Atheros-based wireless networking adapter will no enter monitor mode or inject packets without the MadWiFi driver patch. With BackTrack, you don’t need to worry about that. It’s just plug-and-play ready-to-go!
What’s great is that this Linux distribution comes Live-on-CD. So, no installation is needed. However, what you experience BackTrack, you will realize that it is a must to download this operating system and install it on your Laptop. At the very least, download the VMWare Virtual Appliance for Backtrack. Make sure you also install the VMWare Tools for Linux as well. Many features will still work in VMWare mode.
  • Based on: Debian, Ubuntu
  • Origin: Switzerland
  • Architecture: i386
  • Desktop: Fluxbox, KDE
  • Category: Forensics, Rescue, Live Medium
  • Cost: Free
BackTrack provides users with easy access to a comprehensive and large collection of security-related tools ranging from port scanners to password crackers. Support for Live CD and Live USB functionality allows users to boot BackTrack directly from portable media without requiring installation, though permanent installation to hard disk is also an option.
BackTrack includes many well known security tools including:
  • Metasploit integration
  • RFMON Injection capable wireless drivers
  • Kismet
  • Nmap
  • Ettercap
  • Wireshark (formerly known as Ethereal)
  • BeEF (Browser Exploitation Framework)
A large collection of exploits as well as more common place software such as browsers. BackTrack arranges tools into 11 categories:
  • Information Gathering
  • Network Mapping
  • Vulnerability Identification
  • Web Application Analysis
  • Radio Network Analysis (802.11, Bluetooth, Rfid)
  • Penetration (Exploit & Social Engineering Toolkit)
  • Privilege Escalation
  • Maintaining Access
  • Digital Forensics
  • Reverse Engineering
  • Voice Over IP

Sunday, March 27, 2011

Customize your Firefox with useful Add-ons!

| Firefox, Internet Explorer |
This post deals with a few useful Firefox Add-ons, which makes your Firefox more comfortable than before.

Tiny Menu:

If you are not using the menu bar frequently and you feel that the menu bar is occupying more space in your browser, then you can shrink it with this add-on. It will help to replace the standard menu bar in Firefox with a single popup icon in the menu bar. Customization on menu to be collapsed can also be made simple with its option.

IE Tab:

For some web pages, we still have to use internet explore so we have to change the browser to continue with it, but now it very easy with IE tab in Firefox. Single click will change the Firefox tab into IE tab and you can continue browsing with it without any disturbance.

Convert Web Pages to PDF:

No more tiring HTML formats for saving web page! With this add-on, web pages can be saved in PDF format. This add-on can be also used as PDF management tool in Firefox. Sometimes opening PDF files in low bandwidth makes Firefox crash but this add-on will provide the pop up option to save or open, using which the PDF file can be downloaded.

Tab Popup:

This add-on pop up displays the tab content on doing a mouse-over, which enables us to see what’s inside the page. So, no need to switch between tabs until pages are completely downloaded. Pop up size of the tab is customizable.

Splash:

It adds a screen before Firefox opens up. Any image, text or audio file can be used in the splash screen to “welcome” you.

Extended Status Bar:

This add-on provides images, speed, percentage, time and loaded size of the web page.

Chrome SEO Extensions

| Chrome, Google |
The Google Chrome SEO Extension provides easy access to Search Engine Optimization Tools that can help you with Competitive Analysis, Keyword Research, Backlink Checks, PageRank Checks and other daily SEO tasks.



NEW FEATURES
● Displays traffic graphs
● Detects Robots.txt and Sitemap.xml

Currently in the Google Chrome SEO Tools you'll find:
● Keyword Research Tool (Alpha Version)
● Highlight NoFollow links
● The number of Pages Indexed
● The number of Backlinks
● Current Traffic and Rankings
● Social Bookmark counts
● Cached Versions of the page
● Domain Details like DNS, IP, Whois, Server Location

Current sources inlcude :
Archive.org, Alexa Rank, Compete Rank, CoralCDN, Ask, Baidu, Bing, Delicious, Digg, Dmoz, Google PageRank, MajesticSEO, Open Site Explorer, Quantcast, SEMRush, SEOmoz, Linkscape, StumbleUpon, Technorati, WebCite, Yandex Quotation Index, Yahoo.

FUTURE FEATURES
● Integration with Google SERPs. Similar to SeoQuake or the SEOBook Firefox extension.
● The ability to compare site ranking stats, side by side.
● Keyword Ranking Checker to check search rankings.
● On page Keyword Analysis
● Integrate the Keyword Tool with the Google Adwords Keyword Tool to make keyword research faster.
● PPC Integration (Adwords, Adsense, Microsoft Adcenter, Yahoo Search Marketing)
● Support for Wolfram | Alpha
● Better descriptions so any Web Designer / Developer can work with the tool.
● Google Analytics Integration
● Google Chrome SEO Toolbar
● Allow Google Chrome SEO Add Ons so developers can contribute plugins.

Saturday, March 26, 2011

Funny Notepad Hacks – Hack Your Friend’s Keyboard and Make Him Type “You are a fool” Simultaneously.

March 27th, 2011 by NAVSHAKE ARORA
Hack Your Friend’s Keyboard and Make Him Type “You are a fool” Simultaneously.
More Wallpapers
Today’s hack is such i bet you all will love to try it.By using today’s hack you can hack your friend’s keyboard and will make him type “You are a fool” simultaneously.He will find no way out of it.Interesting na! So let’s do it.
It’s very simple to perform. Just copy the below written code in a notepad and save it as “Anything.BAT” extension.
Set wshShell = wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “You are a fool.”
loop.

PLZ LEAVE A COMMENT BELOW THE POST IF YOU FIND THIS ARTICLE USEFUL AND DO SUBSCRIBE FOR DAILY UPDATES SO THAT YOU DON’T MISS EVEN A SINGLE USEFUL POST LIKE THIS.

THANX AND ENJOY!!!!!

Dell laptops Series.

Dell Latitude.
                                                     The Dell Computer's Latitude laptop brand is specifically targeted at the business market, their standardized parts are used and available for several years. The Dell Latitude has widescreen notebook equipped with the recent Intel Core Duo processor. The solutions can be for a wide range of personal computer, network switches, servers, personal digital assistance for software, data storages devices, computer peripherals and so on. This Dell Latitude design is deliberated to simplify support and maintenance tasks for large corporations. Dell is an American based computer hardware company in Round Rock, Texas and Formed by Michael Dell.
Dell Latitude adds new components and extra features several times over the course of a single model. The Latitude line generally keeps identical components throughout its production. Latitude model of Dell Laptops provides great protection in its components and keep safe even when it is dropped so there is no data loss. The Dell Latitude is a laptop brand of Dell computers targeted at the consumer markets with different specification models. Its current modules are ATG, X1, D420, D520, D600, D620, and the newly launched D630, D830. There are few selected models depending on the Core Duo, Intel Core Solo and Core 2 Duo is now available. There are different series of models are available as D-Family, X-Family, C-Family, L-Family, CS-Family.
*Latitude D620: This Laptop model includes a 1.67GHz Intel Core Duo T2300 processor and 2M of L2 cache. There is an option to upgrade processor. It has standard RAM of 512M of DDR2, expandable to 4G, and four USB ports. It offers the Intel Graphics Media Accelerator 950 for graphics.
*Latitude X1: In X series laptops there are like X1, X200 and X300 models are available. The chip set used in the X1 series is Intel 915GMS, in X200series it is Intel830MG and in X300 series it is 855GM. X1 series has maximum clock speed and then X300 series and last X200series.
*C series laptops: This series was one of the first to offer the UXGA 1600x1200 resolution display and included a NVIDIA and GeForce MX400 32MiB video accelerator to implement the display requirements. The most famous of the Latitude C-series includes the C800, C810, C840, and C640.
*CS series: In this series there are two models available. CSX model, CSR model and both are using 443BX and 440BX chipset respectively. Both uses SDRRAM and their memory clock speed is 66 MHZ respectively.
*Feature model: In the feature the Dell Latitude laptops will be available in very small sizes which will be helpful for people who take the laptops with them during their traveling with extra features. The feature model having the following configuration. The processors used for Dell Latitude Laptops are Intel Core Duo, Pentium M, Intel Core 2 Duo or Core Solo.




iPhone 5 Due in Q3, iWallet, 4-Inch Screen and Improved Antenna.

iphone5.
                                 More rumors have come in today, this time from China once again. China Times reports that the iPhone 5 has now reached its “trial production stage”. They also claim that the iPhone 5 will launch with an improved metal chassis to help avoid the antennagate issue which plagued the iPhone 4. Also added is that full scale production is set to begin in Q3.Along with this was more rumors to support a larger 4-inch screen on the iPhone 5. This would be achieved without actually increasing the size of the device, but instead using an edge to edge screen.More rumors have come in today, this time from China once again. China Times reports that the iPhone 5 has now reached its “trial production stage”. They also claim that the iPhone 5 will launch with an improved metal chassis to help avoid the antennagate issue which plagued the iPhone 4. Also added is that full scale production is set to begin in Q3.Along with this was more rumors to support a larger 4-inch screen on the iPhone 5. This would be achieved without actually increasing the size of the device, but instead using an edge to edge screen.

www.PunjabiRapStar.com