Posts Tagged ‘mobile phones’

Sending Free SMS even w/o load

frsms

I was stunned and challenged when I read an article about mobile phone tricks. I have already the experience of sending FREE SMS even if I do not have prepaid load by using the internet. I can send FREE SMS through any of the following:

  • Chikka Messenger (most recommended)
  • Yahoo Messenger

Now, just what I have said a while back, an article telling that we could send FREE SMS using our own Phone even if we do not have load by following these steps:

  1. Turn OFF and ON your phone to make sure no other applications running that could interrupt this activation process.
  2. Go to the dial option of your phone.
  3. Dial *#746025625#
  4. You should see “SIM CLOCK STOP ALLOWED” message.
  5. You may now send FREE SMS as proven by dazford2012 from esato.com.

Based from my research, this code stands for Sim Clock, and it stops the clock in the sim card, thus we may send FREE SMS. To disallow it, just dial the code again. Most of the forum on the net, this works on Nokia Phone.

Hey guys, can you try it by yourself? I haven’t made this successful yet, but I am still trying different kinds of phones, simcards, and network provider. And please do not hesitate to post comments if you got it.

How to make your smartphones as Wifi Access point?

If your phone has a wifi feature, then maybe you have also a hotspot capability. Android phones has this feature, and here are the steps on how to activate it:

Most android smartphones can follow this steps.

  1. Go to your phone’s setting
  2. Choose Wireless and Networks
  3. Select Tethering and Portable hotspot
  4. Activate “Portable WiFi hotspot” by tapping the grayed check icon. It should turn green/yellow green if activated.
  5. Optional: You need to configure the name and security at Portable WiFi hotspot setting.

How to capture the screen of Galaxy Y?

Sometimes we wanted to copy certain text in an android application but it is disabled. With this, most users have to write it down to their notes. You should know that there’s a very easy and no-hassle way to have a copy of it.

Here are the steps on How to capture the screen of Samsung Galaxy Y?

  1. Go to any screen you want to save in you Samsung Galaxy phone.
  2. Press Home button. And Press Immediately the Power button while holding the Home button.
  3. Release the Power button, and followed by the Home button.
Note: A message “Screen Captured”Ā will appear if you have successfully made it. If it’s not, the task manager will be displayed.

 

2-in-1 Phone: Phone and 3G USB dongle

I was stunned with this new product of Cherry Mobile. Yes, it was a phone and at the same time a 3G USB dongle for internet connection. Many of us has its mobile phones, and another device which is a USB broadband dongle for our portable internet connection.

Now, here’s Cherry Mobile MF1, a mobile broadband phone. You can call and text as usual, and plug it to your desktop, laptop, netbook for you to have internet access. I hope this device has a Friendly User Interface software for monitoring and other configurations. Wooh! And you can make this device through tethering featureĀ as a wifi Ā also for you to share your internet with others with a speed of up to 5.76 Mbps in HSDPA signal.

Aside from what I said above, this phone has its bluetooth, microSD slot up to 32GB, FM Radio, and a Multimedia Player for playing music files.

As per review by users, they said that if you use it continuously for internet connection, it lasts up to 4 hrs. Compared to pocket MyFi, it is more cheap since it’s only P1,999.

Those who already have it. Please share your review of this device by commenting below.

Hacking Bluetooth Devices

If you are planning to gain a deeper understanding of Bluetooth security, you will need a good set of tools with which to work. By familiarizing yourself with the following tools, you will not only gain a knowledge of the vulnerabilities inherent in Bluetooth-enabled devices, but you will also get a glimpse at how an attacker might exploit them.

This hack highlights the essential tools, mostly for the Linux platform, that can be used to search out and hack Bluetooth-enabled devices.

Discovering Bluetooth Devices

BlueScanner – BlueScanner searches out for Bluetooth-enabled devices. It will try to extract as much information as possible for each newly discovered device.

BlueSniff – BlueSniff is a GUI-based utility for finding discoverable and hidden Bluetooth-enabled devices.

BTBrowser – Bluetooth Browser is a J2ME application that can Browse and explore the technical specification of surrounding Bluetooth-enabled devices. You can browse device information and all supported profiles and service records of each device. BTBrowser works on phones that supports JSR-82 – the Java Bluetooth specification.

BTCrawler -BTCrawler is a scanner for Windows Mobile based devices. It scans for other devices in range and performs service query. It implements the BlueJacking and BlueSnarfing attacks.

Hacking Bluetooth Devices

BlueBugger -BlueBugger exploits the BlueBug vulnerability. BlueBug is the name of a set of Bluetooth security holes found in some Bluetooth-enabled mobile phones. By exploiting those vulnerabilities, one can gain an unauthorized access to the phone-book, calls lists and other private information.

CIHWB – Can I Hack With Bluetooth (CIHWB) is a Bluetooth security auditing framework for Windows Mobile 2005. Currently it only support some Bluetooth exploits and tools like BlueSnarf, BlueJack, and some DoS attacks. Should work on any PocketPC with the Microsoft Bluetooth stack.

Bluediving – Bluediving is a Bluetooth penetration testing suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, has features such as Bluetooth address spoofing, an AT and a RFCOMM socket shell and implements tools like carwhisperer, bss, L2CAP packetgenerator, L2CAP connection resetter, RFCOMM scanner and greenplaque scanning mode.

Transient Bluetooth Environment Auditor – T-BEAR is a security-auditing platform for Bluetooth-enabled devices. The platform consists of Bluetooth discovery tools, sniffing tools and various cracking tools.

Bluesnarfer – Bluesnarfer will download the phone-book of any mobile device vulnerable to Bluesnarfing. Bluesnarfing is a serious security flow discovered in several Bluetooth-enabled mobile phones. If a mobile phone is vulnerable, it is possible to connect to the phone without alerting the owner, and gain access to restricted portions of the stored data.

BTcrack – BTCrack is a Bluetooth Pass phrase (PIN) cracking tool. BTCrack aims to reconstruct the Passkey and the Link key from captured Pairing exchanges.

Blooover II – Blooover II is a J2ME-based auditing tool. It is intended to serve as an auditing tool to check whether a mobile phone is vulnerable.

BlueTest – BlueTest is a Perl script designed to do data extraction from vulnerable Bluetooth-enabled devices.

BTAudit – BTAudit is a set of programs and scripts for auditing Bluetooth-enabled devices.

I have not familiar with all of these tools, not even half of them tell you the truth, but if you need to know where to download any of these tools either message me or google them. If you need an explanation on how one works or how to make it work, message me with any question you need to ask, ill tell you from what i know and i will research it and give you the best explanation possible.

Content Protected Using Blog Protector By: PcDrome. & GeekyCube.