Saturday, February 11, 2012

How to Unlock or Hack memory card when you forgot your memory card password.

Some times it happens that you forgot the password of your memory card and you have lots of your important data in your phone.

So there are two types of methods for recovering the password of your memory card with the help of nokia phone.

For Nokia s60 1st and 2nd edition phones.

1. First Install FExplorer in your phone memory.

2. Got to drive C: , you will find a file called mmcstore

3. Send it to your pc directly and open it in notepad or rename the file.

4. At the end of the file you will find your password.
For Nokia S60 3rd Phones, Nokia N-Series and Nokia E-Series

There is almost no way yet known to hack the memory card password in case of these types of phone but there is a way to do it some of the s60 3rd edition phones and almost all the E-series phones.

The remote lock option in E-Series phone allws you to unlock your phone by sending a sms.

The only thing you have to do is to activate this feature by going to Tools | Settings | Security | Phone and SIM | Allow remote lock menu. The password of your memory card will be your remote lock message.

So you have to just send a sms containing your remote lock message that will automatically change your memory card passsword.

Exploit SQL Server System

Whether it is through manual poking and prodding or the use of security testing tools, malicious attackers employ a variety of tricks to break into SQL Server systems, both inside and outside your firewall. It stands to reason then, if the hackers are doing it, you need to carry the same attacks to test the security strength of your systems. Here are 10 hacker tricks to gain access and violate systems running SQL Server.

1. Direct connections via the Internet

These connections can be used to attach to SQL Servers sitting naked without firewall protection for the entire world to see (and access). DShield’s Port Report shows just how many systems are sitting out there waiting to be attacked. I don’t understand the logic behind making a critical server like this directly accessible from the Internet, but I still find this flaw in my assessments, and we all remember the effect the SQL Slammer worm had on so many vulnerable SQL Server systems. Nevertheless, these direct attacks can lead to denial of service, buffer overflows and more.

2. Vulnerability scanning

Vulnerability scanning often reveals weaknesses in the underlying OS, the Web application or the database system itself. Anything from missing SQL Server patches to Internet Information Services (IIS) configuration weaknesses to SNMP exploits can be uncovered by attackers and lead to database server compromise. The bad guys may use open source, home-grown or commercial tools. Some are even savvy enough to carry out their hacks manually from a command prompt. In the interest of time (and minimal wheel spinning), I recommend using commercial vulnerability assessment tools like QualysGuard from Qualys Inc. (for general scanning), WebInspect from SPI Dynamics (for Web application scanning) and Next Generation Security Software Ltd.’s NGSSquirrel for SQL Server (for database-specific scanning). They’re easy to use, offer the most comprehensive assessment and, in turn, provide the best results. Figure 1 shows some SQL injection vulnerabilities you may be able to uncover.

Figure 1: Common SQL injection vulnerabilities found using WebInspect.

3. Enumerating the SQL Server Resolution Service

Running on UDP port 1434, this allows you to find hidden database instances and probe deeper into the system. Chip Andrews’ SQLPing v 2.5 is a great tool to use to look for SQL Server system(s) and determine version numbers (somewhat). This works even if your SQL Server instances aren’t listening on the default ports. Also, a buffer overflow can occur when an overly long request for SQL Servers is sent to the broadcast address for UDP port 1434.

4. Cracking SA passwords

Deciphering SA passwords is also used by attackers to get into SQL Server databases. Unfortunately, in many cases, no cracking is needed since no password has been assigned (Oh, logic, where art thou?!). Yet another use for the handy-dandy SQLPing tool mentioned earlier. The commercial products AppDetective from Application Security Inc. and NGSSQLCrack from NGS Software Ltd. also have this capability.

5. Direct-exploit attacks

Direct attacks using tools such as Metasploit, shown in Figure 2, and its commercial equivalents (CANVAS and CORE IMPACT) are used to exploit certain vulnerabilities found during normal vulnerability scanning. This is typically the silver-bullet hack for attackers penetrating a system and performing code injection or gaining unauthorized command-line access.

Figure 2: SQL Server vulnerability exploitable using Metasploit’s MSFConsole.

6. SQL injection

SQL injection attacks are executed via front-end Web applications that don’t properly validate user input. Malformed SQL queries, including SQL commands, can be inserted directly into Web URLs and return informative errors, commands being executed and more. These attacks can be carried out manually — if you have a lot of time. Once I discover that a server has a potential SQL injection vulnerability, I prefer to perform the follow-through using an automated tool, such as SPI Dynamics’ SQL Injector, shown in Figure 3.

Figure 3: SPI Dynamics’ SQL Injector tool automates the SQL injection process.

7. Blind SQL injection

These attacks go about exploiting Web applications and back-end SQL Servers in the same basic fashion as standard SQL injection. The big difference is that the attacker doesn’t receive feedback from the Web server in the form of returned error messages. Such an attack is even slower than standard SQL injection given the guesswork involved. You need a good tool for this situation, and that’s where Absinthe, shown in Figure 4, comes in handy.

Figure 4: Absinthe tool takes the pain out of blind SQL injection testing.

8. Reverse engineering the system

The reverse engineering trick looks for software exploits, memory corruption weaknesses and so on. In this sample chapter from the excellent book Exploiting Software: How to Break Code by Greg Hoglund and Gary McGraw, you’ll find a discussion about reverse engineering ploys.

9. Google hacks

Google hacks use the extraordinary power of the Google search engine to ferret out SQL Server errors — such as “Incorrect syntax near” — leaking from publicly accessible systems. Several Google queries are available at Johnny Long’s Google Hacking Database. (Look in the sections titled Error Messages and Files containing passwords.) Hackers use Google to find passwords, vulnerabilities in Web servers, underlying operating systems, publicly available procedures and more that they can use to further compromise a SQL Server system. Combining these queries with Web site names via Google’s ’site:’ operator often turns up juicy info you never imagined you could unearth.

10. Perusing Web site source code

Source code can also turn up information that may lead to a SQL Server break in. Specifically, developers may store SQL Server authentication information in ASP scripts to simplify the authentication process. A manual assessment or Google could uncover this information in a split second.

Backtrack video Tutorials

                  This are amazing video tutorials of backtack which include very good collection of hacking videos using backtrack such as sql injection, phine phreaking, wireless hacking, website hacking etc and dont miss to subscribe below for such great tutorials.

  • Episode 1 – Network Hacking – Arp Poisoning
  • Episode 2 – Wireless Hacking – Cracking WEP
  • Episode 3 – Wireless Hacking – DeAuth
  • Episode 5 – Lock Picking – Bump Key
  • Episode 6 – Phone Phreaking – Beige Box
  • Episode 7 – Phone Phreaking/Network Hacking – Sniffing VOIP
  • Episode 8 – Lock Picking – DIY Padlock Shims
  • Episode 9 – Lock Picking – Mult-Disc Combo Locks
  • Episode 10 – Hacking Basics – MD5
  • Episode 11 – Website Hacking – Sql Injection
  • Episode 12 – Hacking Basics – Backtrack
  • Episode 13 – Website Hacking – XSS
  • Episode 14 – Staying Secure – SSH Tunnel
  • Episode 15 – Modding – Xbox Softmod
  • Episode 16 – Wireless Hacking – Cracking WPA
  • Episode 17 – Triple Boot – Windows, Backtrack, & Ubuntu
  • Episode 18 – Local Password Cracking
  • Episode 19 – Lock Picking Basics
  • Episode 20 – Ettercap
  • Episode 21 – XSS Tunnel
  • Episode 22 – Playstation 2 Softmod
  • Episode 23 – Cracking WEP Update
  • Episode 24 – Bypass Hotspot’s Access Controls

  • Underground – Install Backtrack 3 on USB
  • Underground – CSRF(Cross Site Request Forgery)
  • Underground – Alternate Data Streams
  • Underground – Local File Inclusion
  • Underground – Windows Privilege Escalation
  • Underground – Bluetooth Hacking
  • Underground – VMWare
  • Underground – Fix Google Mail Enumerator
  • Underground – Home Made Lock Picks
  • Underground – Downfalls of Anti-Virus Software Part 2
  • Underground – Downfalls of Anti-Virus Software
  • Underground – Evilgrade
  • Underground – Trojan Basics
  • Underground – Manipulating Windows User ***s
  • Underground – Combine Files
  • Underground – Password Phishing
  • Underground – Windows SMB Relay Exploit
  • Underground – Application Patching
  • Underground – Metasploit Autopwn
  • Underground – Email Spoofing
  • Underground – Introduction
  • Extracting Database Information from Information_Schema
  • FPGA MD5 Cracker
  • Arduino ARP Cop
  • Email Injection
  • Ping of Death
  • DNS Spoofing with Virtual Hosts
  • Bypass Cisco Clean Access & Cisco NAC Appliance
  • Dual Boot – Windows & Backtrack
  • Sql Injection Challenge How-to
  • How to use Intel Pro/Wireless 3945ABG in Backtrack 2
  • Local Privilege Escalation Vulnerability in Cisco VPN Client



Learning PHP, MYSQL and Javascript


     This book will help you to:

  • Understand PHP essentials and the basics of object-oriented programming
  • Master MySQL, from database structure to complex queries
  • Create web pages with PHP and MySQL by integrating forms and other HTML features
  • Learn about JavaScript, from functions and event handling to accessing the Document Object Model
  • Use libraries and packages, including the Smarty web template system, PEAR program repository, and the Yahoo! User Interface Library 
  • Make Ajax calls and turn your website into a highly dynamic environment
  • Upload and manipulate files and images, validate user input, and secure your applications

      NOTE : Password for the rar file is tricks4u

CEH v7 Instructor Slides

     This package includes the following modules.
  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffers
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS, Firewalls and Honeypots
  • Buffer Overflows
  • Cryptography
  • Penetration Testing

Send free sms up to 2,048 characters to any mobile phone in the world for free with cellity freeSMS mobile app.

Yes , its really true because with cellity freeSMS installed on your Java MIDP1 and MIDP2 enabled phone you can simply send a free sms up to 2048 characters via gprs to any mobile phone number in the world.

cellity freeSMS, which is available now as a freeware! can be used to send sms to any mobile number with any network in the world.

Are you worried about the Sms Charges ?

Sending and receiving short messages results in no fees through cellity.

Your provider will not charge anything for SMS if you use cellity freeSMS tool

But the cost of data traffic (via GPRS) if any at your mobile connection.

Why it rocks ?

Because it works all over the world, with any cellphone company .so you don’t need to use No new phone number, no new SIM card, no new contract required!
Yes , its really true because with cellity freeSMS installed on your Java MIDP1 and MIDP2 enabled phone you can simply send a free sms up to 2048 characters via gprs to any mobile phone number in the world.

cellity freeSMS, which is available now as a freeware! can be used to send sms to any mobile number with any network in the world.

Are you worried about the Sms Charges ?

Sending and receiving short messages results in no fees through cellity.

Your provider will not charge anything for SMS if you use cellity freeSMS tool

But the cost of data traffic (via GPRS) if any at your mobile connection.

Why it rocks ?
Cellity Ping Free

If your receiver’s cellity freeSms tool is not open then he will immediately receive a unanswerable ping call free of charge! so he knows that a new SMS is waiting and can be directly picked up when starting his cellity freeSMS.

Installation of Cellity Free Sms Tool

* Download the messenger software from here or visit
* after download it will ask you to install the application, so please do so.
* now verify your identity typing in your phone number including the international telephone prefix code for your country (i.e. +91XXXYYYZZZZ for india)
* You will then receive a traditional SMS stating your password.
* so now you can send freeSMS to all your friends now and If they do not have the freeSMS application then: The message is stored on our server and a traditional SMS is sent to reciever, informing him about the new product and offering him to download the file.
* If you are not actively using the application, then put it to “minimize“; but do not turn it off. So now you can still receive new messages, even when the application is running in the background.


Works on all the Java MIDP1 and MIDP2 enabled phone, which means it also works on most of the Symbian and Windows Mobile phones

Because it works all over the world, with any cellphone company .so you don’t need to use No new phone number, no new SIM card, no new contract required!

Download Cellity FreeSms Tool(midp1 high) | Download Cellity FreeSms Tool(midp1 low)
Leave your feedbacks about the cellity free sms application through your comments.

Android 4.0 Ice Cream Sandwich focused on x86

Some developers try to bring the latest version of Android for x86 processors.

Recently, a version of Android 4.0 Ice Cream Sandwich for x86 circulating on the Internet. A first port whose code is primarily intended for developers to make some tests more or less promising tablets and netbooks. Obviously, the optimizations in this version pre-intended mainly to processors AMD , better used.

Chih-Wei Huang, one of the developers who made his name in bump on porting Android on x86, explains that this release supports WiFi and multi-point touch. However, GPUs are not put to use for acceleration OpenGL ES. Same, speakers, photo sensors and Ethernet are not yet recognized.

Remember of course that such ports are not official, and Google has nothing to do with these versions. Google is Focusing on the giant ARM mobile, leaving it to those who wish to adapt it to x86. Note that AMD is no stranger to some of these optimizations in the code for x86 Ice Cream Sandwich. More information on specialized sites, such as

Paste blank Status on Facebook

       Today i will show you how to publish single line or multiple line blank status on facebook. You can also use this method in facebook comments. So lets get started.

   For single line Blank Status

  • Copy below codes into your status
@[0:0: ]
  • Note:- the text is like @[0:0:space]
  • Dont write space where i have writen space rather press spacebar.

   For MultiLine Blank Status :

  • Paste as shown below in your staus.
@[0:0: ]
@[0:0: ]
@[0:0: ]
@[0:0: ]
@[0:0: ]
@[0:0: ]
  • Note there is space after 0:
  Another method

  • Paste below codes into facebook status
@[2:2: ]
Done ! subscribe  for such great posts

Matrix Effect using notepad

  This is amazing notepad trick which will display matrix effect like you might have seen in movies, that is numbers flashes in green colour. Basically we will be creating a small batch file in notepad.

  • Go to Notepad and copy below codes
@echo off

color 02


echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%

goto start
  • Save this file as matrix.bat 
  • Now open this file as see matrix effect on your screen.

A list of the worst passwords on the Internet

123456 - A list of the worst passwords on the Internet
"Password", "123456", "monkey" or "michael". Here are the passwords of the most used by users of the web for email addresses and other accounts on social networks. This is the Telegraph, which reports a list of 25 passwords established by the American Splashdata application.
The daily notes that these accounts are therefore at high risk of piracy and said that hundreds of thousands of Facebook accounts are hacked every day, as recognized by the firm .
Also, note a consultant interviewed by the Telegraph, 35% of people use the same password for each of their various accounts making it possible for a hacker to control all your web identity even greater.
If any of your passwords is listed below, it is time to change.
1. password
2. 123456
4. qwerty
5. abc123
6. monkey
7. 1234567
8. letmein
9. trustno1
10. dragon
11. Baseball
12. 111111
13. iloveyou
14. master
15. sunshine
16. ashley
17. bailey
18. Passw0rd
19. shadow
20. 123123
21. 654321
22. superman
23. qazwsx
24. michael
25. football

Keyboard Dancing Led Light Trick

                 Today i will be showing you an interesting trick which will let your keyboard led light to dance. Basicly we will be creating a vbscript to make caps lock, num lock and scroll lock to perform this trick. So lets get started.

     How to do that ?
       1. Open Notepad and copy below codes into it.

Set wshShell =wscript.CreateObject("WScript.Shell")
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
wshshell.sendkeys "{NUMLOCK}"
wshshell.sendkeys "{SCROLLLOCK}"
       2. Then save this file as led.vbs (.vbs is must)
       3. Open your save file and see your keyboard led blinking like disco lights.

     How to disable blinking Led ?
       1. First open Task Manager [ctrl+alt+del ]
       2. Then Go to process tab.
       3. Select wscript.exe 
       4. Click on End process.

Top 6 Windows 8 Tips

Windows 8 isn’t even out in beta yet, but it has built up quite a bit of buzz. Tech bloggers and analysts have been talking about it for months and months, but beyond the folks at Microsoft and some developers and reviewers, there have been very few who have had the opportunity to go hands on with this operating system.

Even though a lot of folks haven’t been able to try this new operating system, and it isn’t due out for quite some time, there are a lot of hints, tricks and tips already out for Windows 8. If you can get your hands on a copy of Windows 8 when it comes out on Beta, the following top 6 Windows 8 tips should help you get started using this brand new OS like a pro.

1. You don’t have to use the Ribbon Interface in the explorer windows. There are many users who may find this feature useful, making it easier to find and open files. Other users may not be so keen on this feature, finding it distracting and bulky. You can change this in the Computer Configuration. From here, select “Administrative Templates,” “Windows Components,” and finally “Windows Explorer.” You will need to select enabled for the “Start Windows Explorer with the Ribbon Minimized” option to hid the ribbons on your next startup.

2. There are plenty of new Keyboard shortcuts. While some of the old keyboard shortcuts will still work, there are some new ones that you get to use with Windows 8. The Windows Key and “W” brings up the settings search. Windows and “C” call up the simple “Start menu” along with the date and time. If you select Windows and “Q” the application search comes up. These are only a small sampling of the new shortcuts that are already known for this new operating system.

3. You can uninstall programs from the Start Menu. This is a handy new feature that will make it much easier to get unwanted programs off of your system. To uninstall a program from your Start Menu in Windows 8, right click on the icon for the program to get rid of select uninstall and click on it a second time. Windows 8 is made for touch screen systems, as they seem to be the next big thing; with touch screen you uninstall programs from the start menu by holding the program icon to get options, selecting uninstall from there.

4. Bring back the old control panel interface. If you think the new control panel that Windows 8 offers is a bit too new-fangled, you can get the old one back. Simply open the control panel and select “More Settings” at the bottom of the screen. You will see an option for selecting the old control panel interface.

5. Login Automatically. To set this feature, open the Run dialogue box and enter “netplwiz” to launch the User Accounts dialog box in Windows 8. Uncheck the option that requires users to enter a user name and password. Then you will need to enter the username and password of the account you want to be logged in automatically and select OK. Restart your system and automatic login is all set.

6. You can use a picture for a password. In the Control Panel, if you select “Users” you can create a picture password. Instead of the traditional alphanumeric keyword, Windows 8 lets you use a picture. You select the image and then do a serious of clicks and gestures over the image. To login with the picture passwords, you have to produce the same combinations of gestures on the images when you login, so don’t make your picture password too complicated.

BFS 0.416 for 3.2.0

Well 3.2.0 is finally out.

I've done a quick and dirty port of BFS from 3.1 with mostly trivial changes and a minor change to idle CPU selection (it will choose the old CPU first now even if the other "thread" is busy on hyperthreaded CPUs). For the most part the changes are trivial only to stay in sync with the new scheduler changes in mainline so it should be a very safe upgrade. Nonetheless, I'm putting this up for testing here because my Ubuntu laptop seems unhappy starting X but that seems 3.2 related rather than BFS related. I've since moved my home desktop to arch linux and have been very happy on that distro.

So anyway here's BFS for 3.2.0 for those who want things hot off the press:


The -ck patch will not be far behind assuming the first few testers report no problems with this BFS patch. To be honest, the Virtual Memory subsystem has changed so much that I'm having trouble predicting how it will behave now and have no way of confirming the VM patches that go into -ck are even helpful any more, so I'm not even sure if I should continue to support them in light of that.

Besides, I've been too busy playing Zelda - Skyward Sword to really care much about anything code related. I've loved every 3D rendition of Zelda since Ocarina of time, but this latest incarnation is the most amazing game ever...

Towards Transparent CPU Scheduling

Of BFS related interest is an excellent thesis by Joseph T. Meehean
entitled "Towards Transparent CPU Scheduling". Of particular note is
the virtually deterministic nature of BFS, especially in fairness and
latency. While this of course interests me greatly because of
extensive testing of the BFS CPU scheduler, there are many aspects of
both the current CFS CPU scheduler and the older O(1) CPU scheduler
that are discussed that anyone working on issues to do with
predictability, scalability, fairness and latency should read.


In this thesis we propose using the scientific method to develop a deeper understanding of CPU schedulers; we use this approach to explain and understand the sometimes erratic behavior of CPU schedulers. This approach begins with introducing controlled workloads into commodity operating systems and observing the CPU scheduler's behavior. From these observations we are able to infer the underlying CPU scheduling policy and create models that predict scheduling behavior.
We have made two advances in the area of applying scientific analysis to CPU schedulers. The first, CPU Futures, is a combination of predictive scheduling models embedded into the CPU scheduler and user-space controller that steers applications using feedback from these models. We have developed these predictive models for two different Linux schedulers (CFS and O(1)), based on two different scheduling paradigms (timesharing and proportional-share). Using three different case studies, we demonstrate that applications can use our predictive models to reduce interference from low-importance applications by over 70%, reduce web server starvation by an order of magnitude, and enforce scheduling policies that contradict the CPU scheduler's.
Harmony, our second contribution, is a framework and set of experiments for extracting multiprocessor scheduling policy from commodity operating systems. We used this tool to extract and analyze the policies of three Linux schedulers: O(1), CFS, and BFS. These schedulers often implement strikingly different policies. At the high level, the O(1) scheduler carefully selects processes for migration and strongly values processor affinity. In contrast, CFS continuously searches for a better balance and, as a result, selects processes for migration at random. BFS strongly values fairness and often disregards processor affinity.