IP

Showing posts with label mobile hacking. Show all posts
Showing posts with label mobile hacking. Show all posts

How to Unlocked Cell Phones


Various types of cellular phones are made to function with a SIM card, also called a “subscriber identification module.” This card is able to store all calling information about a person’s cell phone subscription. All SIM cards are given to customers by their service provider and are able to give the customer access to calling others when the card is put inside of the cell phone.


When it comes to unlocked cell phones, they are able to connect with the SIM card of any cellular phone provider. On the other hand, if you have a “locked cell phone,” you are limited to using certain types of phones that will only work properly with a certain provider. Many cell phone companies offer only certain phones so that they can maximize their profits by only offering phones that are manufactured by their company.

Most cell phone services in the United States of America do not usually allow the use of SIM cards. If you have gotten your cell phone service in the U.S., then you are probably familiar with the process of choosing a new phone for your plan; you will only be offered cellular phones that are made by the company that provides your calling service. There are certain carriers that allow people to get unlocked cell phones, but most of the time they do not allow it. Why wouldn’t they let more people have their cell phones unlocked? Mostly due to the fact that they want to make sure that their customers are not buying phones through another provider.

A lot of people are very unhappy that they are not given the freedom of getting any phone with their provider. With that said, the provider of the cell phone contract that you have is in full control of your phone options. This means that not everyone can go out and get themselves an iPhone to use with any service provider.

Some people still feel jeopardized by the fact that unlocked cell phones are not offered at most major retailers in the United States. There have been cases where people have purchases unlocked phones on the internet or from private sellers, but most of them have a tough time configuring it to work properly in correspondence with their policy.

The whole trick is finding a cell phone company that allows the use of SIM cards in their plans. In non-U.S. countries, unlocked cell phones are fairly popular. This gives people the opportunity to use whatever kind of phone they want as long as it has a SIM card. There have been individuals in the United States that have been able to make significant tweaks and changes to their phone in order to “unlock it,” but the process is usually very intricate and detailed.

All GSM cell phones' service providers allow the usage of SIM cards. This means that if you are affiliated with T-Mobile, AT&T, or Cingular, you will be able to get a phone that can be unlocked. All other carriers, which are considered “CDMA phone providers,” do not allow phones to be unlocked.

AIRTEL TRICKS

Latest Airtel Hack:

 Now a days Airtel gives New option
to the Subscriber to access Mobile Office daily @ Rs.25.00/- per day. But this is too Costly.
Only 24 hours and the cost
is Rs.25.00 Oh GOD!!


But I got a Trick that’s help me to Activate my Mobile Office whole 30 days only for 25.00/. Its really good.


Just follow the Trick-
1) Your account balance should be above 25.00 for the first time.
2) Activate your mobile office by dialing *444*1#. You will Activate your Mobile Office in the Morning.
3) You got an Activation msg. Your account
should deducted by Rs. 25.00/-
4) After that your can enjoy mobile office for 24 hours.
5) But for unlimited access you will do this :: Just switch off your mobile from 7.00 am to 10.00am. and your account balance should be below 25.00 /
6) Just try it enjoy the whole world only by 25.00.


I am Sure you should be Benefited. JUST TRY IT!!!!!!!!!


 




VODAFONE TRICKS

Vodafone Hack For Free GPRS:
 

This method has been tested on different mobiles and has been confirmed to be working.
Followng are the Settings you require to configure on your Mobile:

Account Name: Vodafone_gprs
Homepage: http://live.vodafone.in
User Name: (no need)
Pass: (no need)

Access Point
Settings :-
Proxy: Enabled
Proxy Address: 10.10.1.100
Proxy Port: 9401
Data Bearer: Packet Data

Bearer Settings :-
Packet Data Access
Point: portalnmms
Network type: IPV4
Authentication: normal
User Name: (no need)
Password: (no need)

*IF that happen this settings is not working then change the proxy port number to:-

Proxy Port: 9401






Vodafone Free GPRS Tricks Unlimited 2010:

Vodafone Free GPRS tricks 2010Now You Can Enjoy The Free GPRS With The Vodafone MobileBut You Must Change / Add The Settings Given BelowIn Your MobileThen Switch Off And On It Again Thats AllNow You Are Done ! Please Use The Following Settings
  1. Settings -> Connection -> Access Points.
  2. Select your Acces point to alter, ( or ) Options -> New acess Point.
  3. Then Change the following :
  • Connection Name : VODAFONE GPRS
  • APN : vlive
  • Port : 8080
  • Proxy Number : 196.6.120.12 Or 196.6.120.13
 
 
 

 






Phone Hacking




One group that is often subsumed (notably by the media) under the hacker label, is phreaks. Phreaking started with the Yippies! (a radical political off-shoot of the hippies). Abbie Hoffman’s Steal This Book: A Survival Guide for Yippie! Nation showed how Yippies! could survive and work for revolution, doing things for free or as cheap as possible. Some of the areas covered were clothes, drugs, housing, travel, and communications. The Youth International Party Line newsletter described how to get free phone calls, and in 1971 lost its political orientation though continued its leading role in the phreaking field under the name of Technical Assistance Program (TAP). The June 1972 issue of Ramparts (an alternative New Left publication) was confiscated for publishing a design for a phreaking box, and Ramparts soon ceased operation. The early phreaks used simple electronic boxes, or other devices, to alter voltages or generate tones that were able to control the phone network. One of the first inventions was the black box. It only required a switch and a 10k-ohm resistor, and allowed people to receive free calls by lowering the line voltage so it appeared that there was no conversation. The famous blue box produced a 2600hz tone which gave it control of a trunk, allowing a phreak to literally surf the phone network going from one switching station to another. A common trick was to use the box to hop around the world through a dozen locations to call the pay phone next to you. Phreaks not only wanted free phone calls (and they used their knowledge of the system to setup conference calls and build a phreak network), but also to explore the Ma Bell phone system. The ability to control switches and guide a phone call around the world is similar to the approach hackers would take on the Internet.
Phreaks had power, and some could even tap other peoples’ phone calls. In the mid-1970s AT&T was losing $30 million a year to phreaks, so in the 1980s they upgraded the system and started scanning for people playing tones on their lines and tracking them down. In 1983, the editors of TAP had an attempted arson on their house. In the mid eighties Phreaks started using computer programs called "war-dialers." These programs used the modem to call a range of phone numbers and keep a log of the results. Phreaks were looking for internal numbers used by the phone company. Hackers used them to find computers with dial-ups that they could try to break-in. The phone companies are now aware of these programs, and in some areas they are illegal. One easy phreak trick that still works in most areas is the red box. It fools a pay phone into thinking money was deposited by playing the same tone that the phone generates when you deposit of a nickel, dime or quarter.
The connection between phreaking and hacking grew as hackers wanted free, untraceable phone calls so that they could gain access into computer networks. Also as the phone system became digital, phreaks needed to learn how to hack into the computers that controlled the switches. Some individuals participated in both hacking and phreaking (Ex. Kevin Mitnick). Phrack, a hacking and phreaking electronic journal, is a prime example of the overlap between the two as it serves both communities.