Click Here for Free Traffic!
Click Here for your Free Traffic!
Google

April 20, 2007

Cell phones - Hackers Next Target!

Cell phones - Hackers Next Target!
It was bound to happen -
they have hacked just about everything else. Now it's the cell phones. Cellphone hacking has just recently surfaced and been made public ever since some one did some cellular phone hacking on Paris Hilton's cell phone.

This article will give you some information about what is going on out there and what you can do to better protect your cell phone information.

What Does It Involve
The fact of someone hacking cell phone became public knowledge when Paris Hilton's cell phone, along with her information was recently hacked. Unfortunately for her, all her celebrity friends and their phone numbers were also placed on the Internet - resulting in a barrage of calls to each of them.Cell phone hackers have apparently found a glitch in the way the chips are manufactured. The good news, though, is that it only applies to the first generation models of cell phones that use the Global System for Mobile communications (GSM).
Another requirement is that the hacker must have physical access to the cell phone for at least three minutes - which is a real good reason not to let it out of your sight. Currently, although the problem has been remedied (at least for now) in the second and third generation phones, it seems that about 70% of existing cell phones fall within the first generation category. Another way that mobile phone hacking can take place is for a hacker to walk around an area with people that have cell phones and a laptop that has cellphone hacker programs on it.
Through an antenna, and a little patience, his computer can literally pick up your cell phone data - if it is turned on. This is more applicable to cell phones that use Bluetooth technology.

What Can A Hacker Do?
Surprisingly, there are quite a number of things that can be accomplished by the hacker. Depending on their intent here are a few of them.

Steal Your Number
Your phone number can be accessed and obtained by cellphone hacking. This allows them to make calls and have it charged to your account.

Take Your Information
Mobile hacking allows a hacker to contact your cell phone, without your knowledge, and to download your addresses and other information you might have on your phone. Many hackers are not content to only get your information. Some will even change all your phone numbers! Be sure to keep a backup of your information somewhere. This particular technique is called Bluesnarfing
Be Prepared for Cell Phone Hacks

Rob Your MoneyOther options might use a particular buying feature called SMS. This refers to the fact that money can be taken from your account and transferred into another

- and a good hacker can sit in one place and access a lot of phones and transfer a lot of money rather quickly - probably in less time than you think!

Give The System A Virus
By using another cell phone hack code, a hacker could kidnap your phone, send it a camouflaged program or send it a virus. But it does not end there, since, from that point, he can use your phone to retransmit the virus to many other phones almost instantly - potentially disabling the system.

Spy On You

Rate this Article
Excellent Good Average Bad TerribleCurrent Rating
getRating();

A hacker can also gain access and take over for cell phone spying and remote mobile phone hacking. Literally, once secured, the hacker can have the phone call him, and then be able to listen to all conversations going on around the owner of the phone.

Access Your Voice MailsVoice mails can also be retrieved by a hacker through a hacking cell phone. After stealing your number, this can easily be done - if your password is disabled. The main thing that needs to be understood here, is that the electronics that give you the modern convenience of interacting with the Internet (getting your voice mails, emails, Web surfing, etc.) , is also the same technology that allows you to receive the same ills as can befall someone on the Internet.

What Can You Do?
It seems that the major cell phone companies, at least at this point, really are not interested in bringing the system up to be able to cope with this threat. Meetings are starting to take place, but for now it is not perceived to be real serious. This could be because it is primarily the older phones that are most susceptible to some types of this mobile hacking. Until the cell phone manufacturers are able to cope with, or eliminate, the glitches in the system that allows them to overcome these problems, you will largely have to help yourself to cope with these things. Here are a couple of tips that will help you protect your cell phone, its information, and other things.

Use Your Passwords
The cell phone companies tell us that many people have turned off their passwords when they access their voice mail messages, or other things. This little feature, though it may seem to be an annoyance to some, could protect your phone from unauthorized purposes.

Leave The Phone Off
This one is obviously the harder choice, here, simply because most of us who have cell phones like to be reached anytime and anywhere. Others do need to be reachable at all times.

Upgrade Your Phone
While this cannot guarantee that your phone is not hackable, it certainly will help. It should be remembered that the phone companies work hard to deliver the best technology and conveniences - but the cell phone hacks work just as hard to be the first to break the systems designed to defeat them. It is an ongoing battle. Cellular phone hacking, for now, is a fact of life that affects a few of us. Gladly, the numbers are still small, but many feel this problem is just getting started. By being aware of the problems, you can wisely take steps to prevent them from happening to you. Cellphone hacking does not need to catch you unprepared

What is SMS (Short Message Service)?

What is SMS (Short Message Service)?

SMS stands for Short Message Service. It is a technology that enables the sending and receiving of messages between mobile phones. SMS first appeared in Europe in 1992. It was included in the GSM (Global System for Mobile Communications) standards right at the beginning. Later it was ported to wireless technologies like CDMA and TDMA. The GSM and SMS standards were originally developed by ETSI. ETSI is the abbreviation for European Telecommunications Standards Institute. Now the 3GPP (Third Generation Partnership Project) is responsible for the development and maintenance of the GSM and SMS standards.

As suggested by the name "Short Message Service", the data that can be held by an SMS message is very limited. One SMS message can contain at most 140 bytes (1120 bits) of data, so one SMS message can contain up to:

160 characters if 7-bit character encoding is used. (7-bit character encoding is suitable for encoding Latin characters like English alphabets.)

70 characters if 16-bit Unicode UCS2 character encoding is used. (SMS text messages containing non-Latin characters like Chinese characters should use 16-bit character encoding.)
SMS text messaging supports languages internationally. It works fine with all languages supported by Unicode, including Arabic, Chinese, Japanese and Korean.

Besides text, SMS messages can also carry binary data. It is possible to send ringtones, pictures, operator logos, wallpapers, animations, business cards (e.g. VCards) and WAP configurations to a mobile phone with SMS messages.

One major advantage of SMS is that it is supported by 100% GSM mobile phones. Almost all subscription plans provided by wireless carriers include inexpensive SMS messaging service. Unlike SMS, mobile technologies such as WAP and mobile Java are not supported on many old mobile phone models.

Concatenated SMS Messages / Long SMS Messages

One drawback of the SMS technology is that one SMS message can only carry a very limited amount of data. To overcome this drawback, an extension called concatenated SMS (also known as long SMS) was developed. A concatenated SMS text message can contain more than 160 English characters. Concatenated SMS works like this: The sender's mobile phone breaks down a long message into smaller parts and sends each of them as a single SMS message. When these SMS messages reach the destination, the recipient mobile phone will combine them back to one long message.

The drawback of concatenated SMS is that it is less widely supported than SMS on wireless devices.

EMS (Enhanced Messaging Service)

Besides the data size limitation, SMS has another major drawback -- an SMS message cannot include rich-media content such as pictures, animations and melodies. EMS (Enhanced Messaging Service) was developed in response to this. It is an application-level extension of SMS. An EMS message can include pictures, animations and melodies. Also, the formatting of the text inside an EMS message is changeable. For example, the message sender can specify whether the text in an EMS message should be displayed in bold or italic, with a large font or a small font.

The drawback of EMS is that it is less widely supported than SMS on wireless devices. Also, many EMS-enabled wireless devices only support a subset of the features defined in the EMS specification. A certain EMS feature may be supported on one wireless device but not on the other

Short Message Service / SMS Tutorial

Short Message Service / SMS Tutorial

SMS (Short Message Service) has achieved huge success in the wireless world. Billions of SMS messages are sent every day. SMS is now a major revenue generator for wireless carriers. A lot of innovative applications are now built on top of the SMS technology and more are being developed.
This SMS tutorial provides information about SMS application development. It begins with an introduction of mobile messaging technologies like SMS, concatenated SMS and EMS. You will learn what SMS is, what causes SMS messaging to be so popular worldwide, what applications can be developed with the SMS technology, what SMS center and SMS gateway are, and some other basic concepts of SMS messaging.
After that, we will discuss in detail various ways to send and receive SMS messages from a computer, the advantages and disadvantages of each way, what SMS service providers are, the hardware (e.g. GSM / GPRS modem) and software (e.g. HyperTerminal) required to send and receive SMS messages from a computer, and where to find some free SMS messaging libraries and tools.

Push to Talk: Summary and Conclusion

Push to Talk: Summary and Conclusion

Beneficiaries of PTT

The beneficiaries of PTT will be all major players involved in the deployment and operation of PTT service. Providers of Wireless Softswitch infrastructure and intermediation services will benefit as infrastructure is deployed and service evolution requires various support services such as billing, settlement, protocol conversion and transport required for PTT service. Wireless carriers will benefit from additional revenue generation, service offering differentiation, and cost reduction resulting from PTT operation.

Predictions for PTT

All tier-one carriers will offer their own differentiated PTT service offerings, which will evolve over time, but will also ultimately enable inter-carrier PTT.

Growth of PTT usage will further commoditize long distance service, especially as inter-carrier PTT service is commonplace and optimized.

Evolution of PTT will represent a leading VAS and will spawn the introduction and growth of various synergistic/complementary capabilities and services including Presence and LBS-based services, MCM, and other Unified Communications.Additional Resources:Books about: IP-based Communication

The Future of Push to Talk Service and Technology

The Future of Push to Talk Service and Technology

PTT Standardization

OMA is standardizing the infrastructure and processes supporting Push-to-Talk over Cellular (PoC), which is the evolution of PTT from proprietary approaches to a more open approach that would operated uniformly and seamlessly between and among technologies and service providers.

OMA is seeking to offer the following infrastructure network elements:

PoC Server: Contains the PoC server-side logic, providing the following functions: end-point for SIP signaling and voice bursts, handles participant lists distribution, reporting to the charging system, and media distribution.

IMS Core: Contains SIP proxies and SIP registers. The Ue access the IMS Core for purposes of SIP signaling to the PoC Server. The IMS Core also handles AAA functions and triggering of personal and group instant talk sessions.

Group/List Manager Server (GLMS): Responsible for management of contact lists, group lists, access lists, and permissions management such as the Do-Not-Disturb (DnD) flag.
User Equipment (Ue): Terminal equipment (mobile phone) containing the PoC application software

OMA is also seeking to standardize the following processes: roaming, identification, addressing, and modes of operation (session establishment and answering).

Inter-carrier PTT

The evolution of PTT to encompass the ability to offer inter-carrier PTT service (the ability for end-users to engage in a PTT session between different mobile network operators), will entail network and service optimization in many areas including the following:
Interoperability: There is a need for basic interoperability between PTT systems, including interface and protocol interoperability.

Clearing and Settlement: There is a need for an efficient clearing and settlement system for managing charges between mobile network operators as they charge different rates for PTT service (e.g. supporting for roaming and any service charge differentials for things like international PTT)

Integrated and Robust Presence Detection and Management

PTT will evolve to encompass robust Presence detection and controls such as availability management. The ability for people to be able to very easily manage their settings will become increasingly important, fostering the need for a Mobile Contact Manager – see below.

Integration of Location-based Services

As with presence and availability, integration of LBS with PTT will add a whole new dimension to the PTT communications experience, as members of a closed user group (e.g. a certain community of interest) will be able to engage in a much improved Unified Communications experience.

Multimedia Integration with PTT

Integration of MMS and other advanced messaging features with PTT service makes sense because both services are a VAS, but perhaps more so, because of the service synergy opportunities. For example, a user could (1) detect a friend (Presence), (2) find a friend (LBS), (3) talk to a friend (PTT) and/or message with a friend (MIM), and then (4) send multimedia messages (MMS) or engage in other Advanced Messaging Services with a friend.

Mobile Contact Manager

The above use case example illustrates the point that perhaps, even more so than MIM, PTT will spawn rapid expansion of Mobile Contact Manager (MCM) service. MCM represents a service (extension to PTT, MIM, and others) that allows for the management of contacts (personal, professional, and even ad-hoc) in terms of presence and availability, location, and contact details (phone number and other alias/addresses such as IM). The ability to quickly and efficiently manage the communications experience, such as add/modify/delete both pre-determined and ad hoc contacts will be of particular importance and synergy with PTT service.
Expansion of MCM will foster the further development and use of various community of interest VAS applications such as friend finder service, interactive mobile games (in the physical and virtual worlds), and more.

Downloadable PTT Client for the Cellular Phone

Even if the PTT client itself is not standardized, a more-or-less standardized method for downloading the client onto the mobile phone will be of great use for those that seek to try PTT very easily (no need to go to the mobile phone store), rapidly accelerating the adoption of PTT.

Push to Talk Implementation, Operations and Technology Supporting

Push to Talk Implementation and Operations

Implementing and operating PTT is not a simple issue as there are many issues that must be considered and ultimately resolved/managed for optimal success including:

Voice Quality: The use of IP technology for PTT inherently ads the issue of voice quality of service (QoS), just as QoS is an issue with VoIP on fixed networks

Call-Set-up Time: The duration of time from the instance of selecting a user to engage in a PTT session to the time that one is able to initiate a conversation.

PTT Interoperability: Currently, PTT implementations are strictly proprietary based, creating a situation in which there is little or no opportunity for interconnection between PTT systems and thus no inter-carrier PTT communication for end-users.

Numbering Issues: For example, one decision point is to use of a single number (for both normal cellular and PTT) or a separate number for PTT calling.
Technology Supporting Push to Talk

At the core of PTT is an IETP standardized protocol known as Session Initiation Protocol (SIP) used for IP communications and Wireless Softswitch network infrastructure.

Being that it uses IP as a transport/bearer, PTT is highly dependent on the roll-out, expansion and improvements of 2.5G and 3G technology and infrastructure.

The Open Mobile Alliance (OMA) is working to standardize Push-to-Talk over Cellular (PoC) – see PTT Standardization (below).
Benefits of Deploying and Operating Push to Talk

Incremental Revenue

PTT represents incremental revenue to the wireless carrier, as it is an additional service that does not replace normal cellular mobile communications service, but rather is a VAS add-on to existing service.

Differentiation

Being a VAS, PTT represents a significant differentiator for both carriers that implement and optimize early as well as those that find clever ways to integrate PTT with other VAS services in ways that maintain differentiation even after PTT is more mature (for example: even after inter-carrier PTT is in place and optimized).

Cost Savings

Perhaps one of the greatest benefits that wireless carriers enjoy from PTT is the network cost efficiencies that are realized in at least two ways. Use of the underlying IP-based network with half-duplex transmissions has the advantage of both requiring less bandwidth (e.g. network and facility savings) as well as avoiding interconnection to the PSTN (e.g. savings against interconnection charges).

Push to Talk Market

Push to Talk Market

Rather then being a replacement of long, interactive communication, PTT is best suited for demands for quick communication among end-users. Due to the fact that PTT is provided in half-duplex mode (e.g. transmission occurs in both directions, but not at the same time – each party must wait to speak), the inability to interrupt lends itself to quick exchanges of information, as is the case with the market for business users that need to quickly exchange information and then get along with their business.

The market for PTT will continue to evolve and ultimately represent service opportunities for the more traditional markets (dispatch and mobile workforce users) as well as more mass market users such as the youth market, which is very community-of-interest oriented (e.g. staying in close with one’s close personal friends is very important) and will thus be very closely tied with other Unified Communications type services such as Mobile Instant Messaging and other Advanced Messaging Services, call management services, LBS, and others.

With a significant world-wide emphasis on Public Safety and Homeland Security, PTT will increasingly become important for government, public safety personnel and other officials as a communications tool (among other tools such as Wireless Emergency Service, Priority Service, etc.), serving the need for efficient communications during times of emergency, disaster, or threats.

Introduction to Push-to-Talk

Introduction to Push-to-Talk
Push-to-Talk (PTT or P2T), originally introduced in the US by Nextel through its partnership with Motorola and its use of the iDEN technology is now poised to emerge as one of the premier voice-based VAS applications for many leading mobile communications service providers. Combining aspects of cellular mobile communications, presence detection, and walkie-talkie style communications, push to talk provides end-users with the ability to quickly find one another and engage in brief, burst-oriented style communication. Advances in market adoption and technology evolution of voice over wireless IP will enable improvements in Push-to-Talk (PTT).
Push to Talk over Cellular (PoC) introduces a new real-time direct one-to-one and one-to-many voice communication service in the cellular network. The principle of communication behind the service is simple - just push to talk. Thanks to the 'always-on'1) connection, calls can be started to both individuals and talk groups with just a push of a key. The call connection is almost instantaneous and the receiver doesn't have to answer the call.
Push to Talk service users are typically engaged in some other activity than a telephone call, and they listen to the group traffic during their activity. A user can be contacted by the name, or he may occasionally want to say something to the group. Half-duplex traffic is ideal for such use cases. This simple, real-time direct communication serves the diverse needs of both business users and private consumers ranging from controlled team management to spontaneous sharing of experiences. Among the many benefits of this solution over conventional two-way radio systems are the attractive cellular phones and the simple and fast creation of talk groups and group calls.
Push to Talk service is a genuine differentiated voice service, because it is not a substitute of any existing cellular services. It gives operators an opportunity to develop their voice service offering without changing conventional voice services.
The Push to Talk service is an integral part of the IP Multimedia communication portfolio envisioned by Nokia, and a part of the service offering in IP Multimedia Subsystem (IMS). It is based on half-duplex Voice over IP (VoIP) technology over mobile networks. Thanks to the IP technology, the Push to Talk service uses cellular access and radio resources more efficiently than circuit-switched cellular services, reserving network resources only for the duration of talk spurts instead of for an entire call session.
Nokia believes that Push to Talk service must be based on open standards to enable multivendor environment and interoperability between different terminals and services. Nokia has been the main contributor for the coming OMA (Open Mobile Alliance) PoC standard, which is now under IOP (Interoperability) testing. This solution offers terminal manufacturers an opportunity to implement the Push to Talk facility across mobile phone categories, thus giving end-users more freedom to choose the products that best meet their communication needs.

April 18, 2007

Tricks for other phones

Ericsson ::.
Ericson T65
*#05# Fake Insert puk screen Press no to exit Ericsson T20Ericsson T20

MENU tecnichal Info[type] >*<<*<* Displays :1] Info service1] Info SW2] Info hardware3] SIMlock4]setup
2] Service setup1] Contrast
3]Service Test
  1. Display
  2. Leds
  3. Keyboard
  4. ringer
  5. Vibration
  6. Headset
  7. Microphone
  8. Clock

Names ListMENU info[Type]

>*<<**

NCK and NSCK Ericsson T28

>*<<*<* menu Tecnichal infoSW vers. and name list

>*<<**<>

NCK and NSCK<> are the right and left menu's keys Ericsson T18s/T10/A1018s

>*<<*<* softwareCXC125065 Internal product codePRG970715 1515

Software version and SW rev.<* CLR <><**<> are the right and left menu's keys!!!><**Control /Enable SIM Lock!!!

Ericsson R310 Technical Info : >*<<*<*

Options :

1) service Infoinfo SoftwareSimlockConfiguration

2) Service TestDisplayLed/IlluminationKeyboardringerVibrationHeadsetMicrophoneClock

3)Text's name ListInfo personal : >*<<**<>

( it could harm your phone )

1) Network

2) Subnetwork

3) SP

4) Corporate.::

Siemens ::.
Siemens C25 IMEI number: * # 0 6 #
Software version: put off sim card and enter: : * # 0 6 # and press LONG KEYBonus screen: in phone booke: + 1 2 0 2 2 2 4 3 1 2 1 .::
Bosch ::. IMEI Number: * # 0 6 #Dafault Language: * # 0 0 0 0 #Net Monitor: * # 3 2 6 2 2 5 5 * 8 3 7 8 # .::
Alcatel ::.
IMEI number: * # 0 6 #Software version: * # 0 6 #Net Monitor: 0 0 0 0 0 0 * .::
Samsung ::.
Samsung SGH600/2100DB IMEI number: * # 0 6 #Software version: * # 9 9 9 9 #
albo * # 0 8 3 7 #
Net Monitor: * # 0 3 2 4 #
Chaning LCD contrast: * # 0 5 2 3 #
Memory info: * # 0 3 7 7 #
albo * # 0 2 4 6 #
Reset pamieci (SIMLOCK`a removing!!!): *2767*3855#
Reset pamieci CUSTOM: *2767*2878#
Battery state: * # 9 9 9 8 * 2 2 8 #
Alarm beeper: *#9998*289#
Vibra test: *#9998*842# .::
Dancall ::.
IMEI number: * # 0 6 #
Software version: * # 9 9 9 9 # .::
Philips ::. *#3333*#
Displays the blocking list.*#7489*#
Displays the security code.*#06#
Displays the IMEI number.*#8377*#
Displays the SW info. .::
Panasonic ::.
Panasonic gd90 gd93 *#9999#
SW - Type the code on switch on , during network seek-Vers. SW and production codeEnable ringing and vibration contemporarilyEnable vibration with # then increase volume with "tone menu "
Panasonic gd70 *#9999#
SW - Type the code on switch on , during network seek-Vers. SW and production codeEnable ringing and vibration contemporarilyEnable vibration with # then increase volume with "tone menu " .::
Acer ::
. Acer V 750 *#400#
Display Adc/ Set Cal-Value -*#402#
Set LCD Contrast*#403#
Display Errors Info*#300#
Display Info Hw & Sw*#301#
Menu Test*#302#
Menu Acoustics*#303#
(Settings saved) Set English language?*#307#
Menu Engineering*#311#
Reset Phone Code - [ Also reset Security Codes ! ]*#330#
(Execute not success) [ unknown ]*#331#
(Service deactivated) [ unknown ]*#332#
(Service unavailable)[ unknown ]*#333#
(Execute not success)[ unknown ]*#351#
(Service unavailable) [ unknown ]*#360#
(Invalid input)[ unknown ]*#361#
(Invalid input) [ unknown ]*#362# (Invalid input) [ unknown ]*#363#
(Invalid input) [ unknown ] .::
Genie ::.
Genie DB *#06#
IMEI.*#2254*#
Near Cell Mode. For every received BTS will be displayed :Current channel and 2 channel levels*#06#
IMEI*#2558# time of network connection ( D/H/M )*#2562#
Fores reconnection to network!!!*#7489#
Dispalys and modify phones' security code!!!!!!*#3377#
SIM lock information !!!*#7378#
SIM card Informations : supported phase name and tipe*#7693#
Enable/disable "Sleep Mode"*#8463#
State of "Sleep Mode"*#2255#
Debug Call Mode enable/disable*#3333*#
Displays the blocking list.*#7489*#
Displays the security code*#06#
Displays the IMEI number*#8377*#
Displays the SW info. .:: NEC ::. NEC db2000 *#2820#
software vers.IMEI *#06#
Reset *73738# (send?)SP Lock info:* # 3210 #
(send?)Network barring info : *#8140#
(send?)( it could harm your phone )SIM lock it could harm your phone )*#4960 #
(send?) -Inquiry * 4960 * password * password #
(send?) lock#4960* password #
(send?) unlock[password] [8 digits]Net Lock*#7320#
(send?) -Inquiry * 7320 * password * password #
(send?) lock#7320* password #
(send?) unlock[password] [ 8 digits]Net Lock 2:*#2220#
(invio) - Inquiry * 2220 * password * password #
(send?) lock#2220* password #
(invio?)unlock[password] [8 digits]Unlock subnetwork*#1110#
(send?) - inquiry * 1110 * password * password #
(send?) lock#1110* password #
(send?) unlock[password] [nĂ¯¿½ 8 cifre]( it could harm your phone ) .::
Trium ::.
Trium Geo/Geo @ - Astral - Cosmo -Aria Enter the menu and type *A new menu will be displayed :Application : SW version and battery's voltage
Trium GalaxyPush * and type 5806: Production date and SW version .::
Telit ::.
Telit GM 810 MONITOR - technical menu - : type ++++ and push OK.
Adiacent cells list : # and *Now if you push OK the phone displays battery ' s voltage and temperature .::
Sagem ::.
Sagem MC959/940 Select commands' menu and push *Displays a new menu' :
Appli : software vers. and battery's voltageEpromSim LockTest LCD: display test , green/red and vibration Sagem MC920 Select commands' menu and push *Displays 5 new menus :
1 APPLIVERSION ( SW)BATTERY (voltage )
2 PROM (IMEI)
3!!! SIM LOCK (10 digits code requested ) !!!
4- NETWORK (returns : OPTION NOT AVAILABLE)
5- TEST LCDSYMBOL
  1. (LCD)SYMBOL
  2. (test2 LCD)BLACK (all icons and carachters displayed )FOR PHOTO (welcome message and time )VIBRATOR (vibration test ).::

Sony ::.

Sony CMD Z5/J5 Vers. SW :Without SIM ,

switch on phone and type l *#7353273# .::

Eprom ::.!!! Sim Lock [10 digits code ] ( it could harm your phone )

NETWORK : OPTION NOT AVAILABLETest LCD: display test of the green/red leds and vibrationPush * and type 4329 :enables/disables network monitor

1 (the same of MT35)Push * and type 621342 :enables/disables network monitor

2Push * and type 5807 : Serial Number Software Vers.Push * and type 936505:

IMEI -- Software Vers.TPush * and type 547 :

Test serial Data Cable DISPLAYS :"Testmode"Push * and type 362628:

ISMI BLOCK (UNKNOWN)Push * and type 476989:

NS BLOCK (UNKNOWN)Push * and type 482896:

CP BLOCK (UNKNOWN)Push * and type 787090: ?

BLOCK (UNKNOWN)Push * and type 787292 :

block current network!!! Push * and type 967678:

SP LOCK!!!Push * and type 850696:

Warm Start ( ENABLE/DISABLE)Push * and type 3926 :

Swicth off phonePush * and type 5806: Production date and SW version .::

Motorola ::.

Motorola V3688

IMEI *#06#

Enhanced Full Rate Codec EFREnable EFR : [][][] 119 [] 1 [] OK.disable EFR :

[][][] 119 [] 0 [] OK .::

Tricks4nokia

(1) *3370# Activate Enhanced Full Rate Codec (EFR) - Your phone uses the best sound quality but talktime is reduced my approx। 5%

(2)#3370# Deactivate Enhanced Full Rate Codec (EFR) OR *3370# ( Favourite )

(3)*#4720# Activate Half Rate Codec - Your phone uses a lower quality sound but you should gain approx 30% more Talk Time।

(4)*#4720# Deactivate Half Rate Codec।

(5)*#0000# Displays your phones software version, 1st Line : Software Version, 2nd Line : Software Release Date, 3rd Line : Compression Type। ( Favourite )

(6)*#9999# Phones software version if *#0000# does not work।

(7)*#06# For checking the International Mobile Equipment Identity (IMEI Number)। ( Favourite )

(8)#pw+1234567890+1# Provider Lock Status। (use the "*" button to obtain the "p,w"and "+" symbols).

(9)#pw+1234567890+2# Network Lock Status। (use the "*" button to obtain the "p,w"and "+" symbols).

(10)#pw+1234567890+3# Country Lock Status। (use the "*" button to obtain the "p,w"and "+" symbols).

(11)#pw+1234567890+4# SIM Card Lock Status। (use the "*" button to obtain the "p,w"and "+" symbols).

(12)*#147# (vodafone) this lets you know who called you last

(13)*#1471# Last call (Only vodofone)

(14)*#21# Allows you to check the number that "All Calls" are diverted to

(15)*#2640# Displays security code in use

(16)*#30# Lets you see the private number।

(17)*#43# Allows you to check the "Call Waiting" status of your phone।

(18)*#61# Allows you to check the number that "On No Reply" calls are diverted to।

(19)*#62# Allows you to check the number that "Divert If Unreachable (no service)" callsare diverted to।

(20)*#67# Allows you to check the number that "On Busy Calls" are diverted to।

(21)*#67705646# Removes operator logo on 3310 & 3330।

(22)*#73# Reset phone timers and game scores।

(23)*#746025625# Displays the SIM Clock status, if your phone supports this power saving feature "SIM Clock Stop Allowed", it means you will get the best standby time possible।

(24) *#7760# Manufactures code।

(25)*#7780# Restore factory settings।

(26)*#8110# Software version for the nokia 8110।

(27)*#92702689# Displays - 1।Serial Number, 2.Date Made, 3.Purchase Date, 4.Date of last repair (0000 for no repairs), 5.Transfer User Data. To exit this mode you need to switch your phone off then on again. ( Favourite )

(28)*#94870345123456789# Deactivate the PWM-Mem।

(29)**21*number# Turn on "All Calls" diverting to the phone number entered।

(30)**61*number# Turn on "No Reply" diverting to the phone number entered।

(31)**67*number# Turn on "On Busy" diverting to the phone number entered।

(32)12345 This is the default security

press and hold # Lets you switch between

NOKIA 5110/5120/5130/5190 IMEI number: * # 0 6 #Software version:
* # 0 0 0 0 #Simlock info: * # 9 2 7 0 2 6 8 9 #
Enhanced Full Rate: * 3 3 7 0 # [ # 3 3 7 0 # off]Half Rate: * 4 7 2 0 #
Provider lock status: #pw+1234567890+
1Network lock status #pw+1234567890+
2Provider lock status: #pw+1234567890+
3SimCard lock status: #pw+1234567890+

4 NOKIA 6110/6120/6130/6150/6190

IMEI number: * # 0 6 #Software version:

* # 0 0 0 0 #Simlock info:

* # 9 2 7 0 2 6 8 9 #Enhanced Full Rate:
* 3 3 7 0 # [ # 3 3 7 0 # off]Half Rate:
* 4 7 2 0 #

NOKIA 3110

IMEI number: * # 0 6 #
Software version: * # 0 0 0 0 # or * # 9 9 9 9 # or * # 3 1 1 0 #

Simlock info: * # 9 2 7 0 2 6 8 9 #
NOKIA 3330 *#06#

This will show your warranty details *#92702689#*3370#
Basically increases the quality of calling sound, but decreases battery length।#3370#

Deactivates the above*#0000#Shows your software version*#746025625#

This shows if your phone will allow sim clock stoppage*4370#Half Rate Codec activation।

It will automatically restart#4370#Half Rate Codec deactivation।

It will automatically restartRestore Factory सेत्तिन्ग्स

To do this simply use this code *#7780#Manufacturer InfoDate of Manufacturing *#3283#*3001#12345# (TDMA phones only)

This will put your phone into programming mode, and you'll be presented with the programming menu।2) Select "NAM1"3) Select "PSID/RSID"4) Select "P/RSID 1"Note: Any of the P/RSIDs will work5)

Select "System Type" and set it to Private6) Select "PSID/RSID" and set it to 17) Select "Connected System ID"Note: Enter your System ID for Cantel, which is 16401 or 16423। If you don't know yours,ask your local dealer for it।8) Select "Alpha Tag"9)

Enter a new tag, then press OK10)
Select "Operator Code (SOC)" and set it to 205011) Select "Country Code" and set it to 302 for Canada, and 310 for the US।12) Power down the phone and power it back on againISDN CodeTo check the ISDN number on your Nokia use this code *#92772689# ।::

April 14, 2007

mobile secret codes

Nokia 31xx
Firmware version--- *#0000# or *#3110#
IMEI Code*# 06 #
Restores Factory Settings*#7780#
Warranty Codes*#92702689# (= *#war0anty#)
Just scroll down through the information.
If entering the above code requires afurther warranty code try entering the following:
6232 (OK) : Month and year of manufacture
7332 (OK) : Last repair date
7832 (OK) : Purchase date (if previously set)
9268 (OK) : Serial number
37832 (OK) :Set purchase date (this can only be done once)
87267 (OK) :Confirm transfer
Nokia 5110
IMEI Number *#06#
For checking the IMEI (International Mobile Equipment Identity).
---------------------------------------------------------
Security Code 12345
Default security code is 12345.
If you forgot your security code, there s so many program on the net which allowed you to know the security code likes Security ID Generator, Nokia IMEI Changer, etc.
update:
Security ID Generator (SID.EXE) and IMEI Generator (NOKIAIMEI.EXE) doesn t works with Nokia 5110Resetting Security Code
If you accidentally lock the phone or forgot the security code, the best thing to do is check it with your local Nokia dealer. For advanced user, you can use WinTesla, PCLocals or LogoManager program to read the security code or resetting the code (You will need an FBUS/MBUS (or compatible) cable to do this.
---------------------------------------------------------
Software Version *#0000#
For checking the phones software (SW) - called firmware revision information.
e.q : Version V. 4.51 (26-03-98) will displayV 04.5126-03-98NSE-1
first line:The Software Version (my guess is that this software has been used in previously Nokia-phones, what do you say?!).
second line:The Date of the SW release.
third line:NHE-8 has something to do with the type of phone you are dealing with. Is it GSM 900 (standard), GSM 1800 (DCS1800) or GSM 1900 (PCS1900)?
Nokia 2110, 3110, 8110(i) are all NHE types. The only thing that vary is the code after NHE- ("8").
NHE = GSM 900, NHK =GSM 1800 - The number in the end = the model (2110i = 4 etc.)
The 5110 and 6110 is called NSE-1 and NSE-3...this may be because it supports EFR (?)
update:
Newest Software Version was V5.22 (xx-xx-99)
V 05.22
01-07-99
NSE-1
If your software version is V4.00, upgrade your software version to latest version. V4.00 contains bugs that sometimes will show message,"SIM Card Not Ready" even the card is already inside the phone.
---------------------------------------------------------
Software Update
The only thing to do (for you and me) is for us to go to the nearest Nokia dealer and make him do it for you. Just remember that it is supposed to be free (a receipt is required) so don t let him tell you anything else!
---------------------------------------------------------
SIM clock *#746025625# [*#sim0clock#]to check if the Sim-Clock can be Stopped. This option is depen on your service provider network. (Sim-clock-stop is a kind of standby mode which will save battery time)
update:
This code doesn t work on phone with software version 4.59.
---------------------------------------------------------
Waranty Code *#92702689# [*#war0anty#]
Menu:Displays Serial Number.
Displays the Month and Year of Manufacture (0698)
Displays (if there) the date where the phone was purchased
(MMYY) you can here set the Purchasing Date(Warning: You can only do this once - so be careful what you write)
Displays the date of the last repairment - if found (0000)
The next screen has Transfer User Data? (the same option as the 8110)
To exit turn the phone off and then back on
.---------------------------------------------------------
SP Lock The Service provider (SP) lock
Is used to lock the cell phone to the SP s SIM card. Once the cell phone is locked to a specific operator, if one inserts a SIM card from a different operator the phone will refuse to accept it!The cell phone will however accept another SIM card from the same operator.
All Nokia phones (2110 and newer) have four different SIM locks which can be used to lock the phone for up to 4 different providers. But most phones with restriction only have one lock activated. ( lock 1)
The main code used in Nokia phones is:
#pw+(master code)+Y#
This code is able to check, activate or remove Sim card restriction (SP-lock).
Use the * key to get the p, + and w chars.Y has to be 1,2,3 or 4 - depending of what lock you what to deal with.
#pw+1234567890+1# for Provider-Lock status
#pw+1234567890+2# for Network-Lock status
#pw+1234567890+3# for Provider(???)-Lock status
#pw+1234567890+4# for SimCard-Lock status(master code) is a 10 digit code, based on the phones IMEI number.
(I can NOT give you the master code SO DON T ASK ME FOR IT! )
Please click here to learn more about how to obtain mastercode and find out the lock status of your phone
eq. To remove restriction on lock 1 type following code:
#pw+(master code)+1#
If you just want to check your phone use 10 random numbers
Eg. 1234567890 as the (master code)eq.
To check if phone if restricted on lock 1 type the following code:
#pw+1234567890+1#
Please NOTE that these codes could be used with care!A user told me that it s only possible to type in about 3 different codes on each lock! Then something bad will happen ..therefore be careful!
---------------------------------------------------------
How can I check what locks have my phone closed?
There is 2 methods:
Use winlock to see the state of the locks, pressing Read Info.
The Counter is the number of times that you have tried unlock your phone using an incorrect master code.
You can check it entering an imaginary mastercode on your phone but, it s not recommended because if you try enter a code 5 times your phone will not work anymore.
By example, if you press at your phone
#pw+1234567890+2#
(note that # , p , w and + characters must be selected from * key) and your phone give you Code Error then your phone have lock 2 closed,
if you get the message SIM Restriction Off your phone have lock 2 opened.
Look the table above to see how can check all locks:Lock number Description Sequence to
Check1 Provider Lock
#pw+1234567890+1#2
Network-Lock #pw+1234567890+2#3
Another Provider Lock #pw+1234567890+3#4
SIM Card Lock #pw+1234567890+4#
---------------------------------------------------------
Unlock SP-LockHere is a way to Unlock your phone which is Service Provider locked, without to know SPLock code.
With a Nokia 16xx/21xx/31xx/51xx/81xx that are SIMlocked to one privider you can bypass the SP lock like this:
First of all, PIN CODE MUST BE ON, then press:
C
C and hold until it clears display
* and hold until start to blink
* and hold until start to blink
04***your pin>#
Each time you turn your phone OFF it resets the lock, so this need to be done each time you ll turn your phone ON
The phone now says: PIN CODE CHANGED (or ACCEPTED)and the SIM card is accepted until you restart the phone again.
NOTE: On vesion 5.04 Nokia has removed this option !
update:
There s another Nokia service provider lock generator for DOS (somehere on the net) called 5161un.zip (for Nokia 51xx-61xx models) This program uses the #pw+(master code)+1# code to unlock the phone. With this software you need to have a access to the eeprom..
---------------------------------------------------------
Bypass the SP-lock
With a Nokia 16xx/21xx/31xx/51xx/81xx that are SIM locked to one privider you can bypass the SP lock like this:
Insert sim card of diferent provider.
Turn on the phone and press the UP VOLUME key for 3 sec. then release it and the phone says PIN CODE ?
Press the "C" key.
Then Press * and wait until it desapear and apear again, then press * one more time and 04*PIN*PIN*PIN#
The phone now says: PIN CODE CHANGED (or ACCEPTED)and the SIM card is accepted until you restart the phone again.
update:
On version 5.04 Nokia has removed this option !
---------------------------------------------------------
How to open lock 1 and 4?
You will need Winlock software and MBUS cable to do this.
Winlock is a Nokia service program that you can use to open lock 1 and 4, really you are closing locks when you do that, but when you write ????? at MCC+MNC and MSIN text box, the phone don t understand it and consider that it s open.
That trick only works for lock 1 and 4, but not for lock 2 and 3. If you did not know your lock type, please read our miscellaneous tips page first. or read at above section in this page.
Install winlock 1.10
Connect your MBUS nokia data cableRun Winlock
Push Read Phone,
if you have Lock 2 or Lock 3 closed you can not open your phone, but you can try change Lock 2.Select State Close in Lock 1 and Lock 4,
fill out MCC+MNC and MSIN text boxes with ??????? and Push Close Locks.Now you can use any operator card in your phone.
If you get any error when you do that do the following steps:Select State Automatic in Lock 1 and Lock 4 and change type to User in Lock 1 and Lock 4,
fill out MCC+MNC and MSIN text boxes with ?????????? and Push Close Locks.
Select State Automatic in Lock 1 and Lock 4 and change type to Factory in Lock 1 and Lock 4,
fill out MCC+MNC and MSIN text boxes with ?????????? and Push Close Locks.If you continue getting errors you must turn off your phone and reset computer and try again.
---------------------------------------------------------
How to open lock 2?
When operators companies close lock2 you can only use the contract or prepaid card for this operator, but you can use another operator company prepaid card if you know what GID1 must write.
Install WinlockRun
WinlockConfigure Winlock.
Select menu Winlock->Defaults and change GID byte count to 2.
Push Read Phone, and write down GID1 info that appear in lock 2.
Insert the prepaid card from a different operator company.We must find out a the GID1 info adecuate for our new prepaid or contract card, take a look at our GID1 list and check if your operator and SIM card type is included, if not try to get a phone that have lock 2 closed and have the SIM card type that you want to use in your phone, and read GID1 info with winlock. You can try to write the most used GID1 codes like 0000,10FF,01FF, or FFFF, etc.
Change Lock 2 Type from User To Factory or from Factory to User.
Push Close Locks
Your phone will be reset every time you push Close Locks, if your card is not acepted the GID1 is not correct, repeat from step 4 until you find the correct GID1.
If you get error you must turn off your phone and reset computer and try again.
If you want your phone accept your original prepaid card write in GID1 the code you read at step 2 and close locks.
Exist a GID1 list?
In addition to the official way to open locks that Nokia service centers use with TDB4 or TDF-4(for WinTesla) security boxes, there is two secrets methods:
Opening the phone and adding a chip inside phone motherboard. But you will loose any warranty of your phone.Using a special software with a MBUS Nokia cable. I don t have this software. Please don t bother me asking me about that. The only thing i know about that is that a friend is removing lock 2 using a special software. He don t make this for money, only for fun.
--------------------------------------------------------
Main Code #pw+(master code)+Y#
This code is able to check, activate or remove Sim card restriction (SP-lock).
Use the * key to get the p, + and w chars.Y has to be 1,2,3 or 4 -
depending of what lock you what to deal with
#pw+1234567890+1#
for Provider-Lock status#pw+1234567890+2#
forNetwork-Lockstatus#pw+1234567890+3#
for Provider(???)-Lock status#pw+1234567890+4#
for SimCard-Lock status(master code) is a 10 digit code, based on the phones IMEI number.update:I get report that told me the code didn t works for Optimus Card
---------------------------------------------------------
Enhanced Full Rate Codec (EFR)Enhanced Full Rate will give you much better sound quality when you enable it. The new Enhanced Full Rate CODEC adopted by GSM uses the ASELP (AlgebraicCode Excitation Linear Prediction) compression technology.
This technology allows for much great voice quality in the same number of bits as the older Full Rate CODEC.
The older technology was called LPC-RPE (Linear Prediction Coding with Regular Pulse Excitation). Both operate at 13 kilobits.(but you take up more space on the network, so they can charge you more)
*3370# and EFR will be activated after a reboot of the phone ( consumes more power )#3370#and EFR will be switched off after a reboot of the phone.
---------------------------------------------------------
Half Rate Codec (HR)Half Rate will give you bad sound quality, which gives the service provider the opportunity to have more calls on the network; and you might get a lower charge from them.
(Will give you 30% longer talk-time)
*4720# Half Rate coded will be activated after a reboot of the phone ( better standby time )#4720# Half Rate coded will be de-activated after a reboot of the phone
---------------------------------------------------------
unblocking CodeUnblock
PIN2 : **052*PUK2*newPIN2*newPIN2#@
---------------------------------------------------------
Hiding your phone numberDial 141 then the number you want to call
eg. 141#######
This should stop your number been sent to the caller.
(*)(*) This only works on UK phones, if anybody has tried this and works, please let me know.
---------------------------------------------------------
Unlocking PIN2 for software versionV 05.0720.11.98NSE-1
If your SimCard is locked by your SP, you can check it and if it is, you will get the "wrong code" message on the display (for use 1234567890)
If your SimCard is locked by your SP, you can t unlock PIN2 !
---------------------------------------------------------
Blocking phone number at Cantel AT&TIf you have one of those cantel at&t phones if you press #0000# you can block your numberat no extra charge.
---------------------------------------------------------
New Menu on Emergency Calls *3001#12345#Brings a new menu that gives you access to the emergency calls ( 911 Etc. ).
It will give you FREE calls! (only the ones you put in the emergency!! )This option will depend on your GSM operator
---------------------------------------------------------
Your number in your displayGoto menu 3-7 Call cost settings.
Turn ON the Call costs limit 3-7-1.
PIN2 code Required.Put in the limit with the phone number.
eg. my phone # is 019 2184697 Enter the limit as 2184697
Goto menu 3-7-2 Show costs in.
PIN2 code Required.
Select Currency.
Enter Unit price : 1
Enter Currency name as 019 (per my phone # eg. above)
Now the phone number 019 2184697 will remains on the 4th row of the display.
Secondly, if you press the # key,
it prompt which line to be used; Line 1 or 2.
---------------------------------------------------------
Free Call TipThe tips needs Net Monitor enabled.
Be aware that the trick will remove Netmonitor in some sw versions like v4.73 and v5.04.
Launch the Net Monitor in your Nokia 51xx / 61xx
Execute the test number 497Free calling for about 90 sec should now have been activated.
---------------------------------------------------------
Nokia 5110
PIN-OutPin-Outs: Bottom view, keyboard up,
counting from the leftV V 1 2 3 4 5 6 V(o) [= = = = = =] 7 8 9 10 11 121 - VIN CHARGER INPUT VOLTAGE 8.4V 0.8A2 -
CHRG CTRL CHARGER CONTROL PWM 32Khz3 - XMIC MIC INPUT 60mV - 1V4 - SGND SIGNAL GROUND5 - XEAR EAR OUTPUT 80mV - 1V6 - MBUS 9600 B/S7 - FBUS_RX 9.6 - 230.4 KB/S8 - FBUS_TX 9.6 - 230.4 KB/S9 - L_GND CHARGER / LOGIC GND
Nokia 61xx
__________
Firmware version*#0000# or *#61x0#
IMEI Code* # 06 #
Warranty Codes*#92702689# (= *#war0anty#)
Just scroll down through the information. If entering the above code requires afurther warranty code try entering the following:
6232 (OK) : Month and year of manufacture
7332 (OK) : Last repair date
7832 (OK) : Purchase date (if previously set)
9268 (OK) : Serial number
37832 (OK) : Set purchase date (this can only be done once)
87267 (OK) : Confirm transferEnhanced Full Rate (EFR) and Half Rate Mode (HFR)
*3370# to activate Enhanced Full Rate - Makes calls sound better, but decreases the battery life by about 5%.(I recommend this one)
#3370# to deactivate Enhanced Full Rate
*4720# to activate Half Rate Mode - Drops call quality, but increases batterylife by about 30%.
#4720# to deactivate Half Rate Mode
Nokia 81xx
_____________
Show IMEI code* # 06 #
Software Version* # 8110 #
This code shows you software version, date of manufacture and hardware number of your phone.
Warranty Codes*#92702689# (= *#war0anty#)
Just scroll down through the information. If entering the above code requires afurther warranty code try entering the following:
6232 (OK) : Month and year of manufacture
7332 (OK) : Last repair date
7832 (OK) : Purchase date (if previously set)
9268 (OK) : Serial number
37832 (OK) : Set purchase date (this can only be done once)
87267 (OK) : Confirm transferSim Clock information
To check if the Sim-Clock can be stopped type: *#746025625# (= *#sim0clock#)
Nokia 8810
____________
Firmware version*#0000# or *#8810#
IMEI Code* # 06 #
Warranty Codes*#92702689# (= *#war0anty#)
Just scroll down through the information. If entering the above code requires afurther warranty code try entering the following:
6232 (OK) : Month and year of manufacture
7332 (OK) : Last repair date
7832 (OK) : Purchase date (if previously set)
9268 (OK) : Serial number
37832 (OK) : Set purchase date (this can only be done once)
87267 (OK) : Confirm transferEnhanced Full Rate (EFR) and Half Rate Mode (HFR)
*3370# to activate Enhanced Full Rate - Makes calls sound better, but decreases the battery life by about 5%.(I recommend this one)
#3370# to deactivate Enhanced Full Rate
*4720# to activate Half Rate Mode - Drops call quality, but increases batterylife by about 30%.
#4720# to deactivate Half Rate Mode

BSNL hack for Internet

Free gprs in bsnl here are the steps to perform:-

Logic: the server has a major bug in it, by which it fails to block two simultaneous connections from the phone and establishes a connection with full internet working, Supported devices: all phones with multichannel gprs support

For connection on your mobile phone:-

1) Make two connections like bsnlportal and BSNLPORTAL1 (names of profile don’t matter, u can keep one as billgates and shahrukhkhan lol..the basic purpose of names is to enable the user to differentiate between the two accounts,)

2) Select the application you got to have the full connection working on. Surpassingly “web” now just select “bsnlportal” profile and select a link like wap.cellone.in the page will get open, just press the red button such that the “web” application goes in the background. Make sure that the gprs connection is still established with the web app. Two parallel lines on the top left of the screen will confirm this

3) Now open any other app that requires web connection like opera. Select BSNLPORTAL and open any other link like wap.google.com, u will get error – the aim of using the other app is to perform multi-channel gprs, this is verified by seeing some dots on the pre-existing connection established by “web”

(step 2)

“Access denied. Technical description: 403 Forbidden - You are not allowed to communicate with the requested resource.”

4) close opera and open web and open a site like esato.com

5) if everything is done as said here then esato will load and voila! We have the whole internet!

For connection on pc.

1)create a connection and enter the number to be dialed as *99***1#

2) enter the following string as extra initialization command

3)now dial from pc, the connection will be established

4)pick the phone and open “web” open “wap.cellone.in” the phone shows error .

5) close “web” and then from the browser open www.google.com and voila! The whole intenet is here settings for profiles apn: celloneportal ip: 192.168.51.163 port : 8080 leave other fields blank as they are of the least concern! the browser settings on pc too go the same as mentioned above!

Free internet through gprs on Airtel

You need a PC or a Laptop and the required connectivity tools ,ie.,Serial/USB cable OR Infrared Device OR Bluetooth dongle

1) Activate Airtel Live! ( It’s FREE so no probs)

2) Create TWO Airtel gprs data accounts (yep TWO) and select theFIRST as the active profile.

3) Connect your mobile to the PC (or Laptop) and install the driver foryour mobile’s modem.

4) Create a new dial-up connection using the NEW CONNECTIONWIZARD as followsConnecting Device : Your mobile’s modemISP Name : Airtel (or anything you like)Phone Number : *99***2#Username and Password : blank

5) Configure your browser and download manager to use the proxy100.1.200.99 and port 8080.( My advice is to use Opera since youcan browse both wap and regular websites)

6) Connect to the dial-up account. You will be connected at 115.2kbps (but remember, that is a bad joke).

7) Pick up your mobile and try to access any site. You will get “AccessDenied…”(except for Airtel Live!). IT DOES NOT MATTER.Keep the mobile down.

8 ) On the PC ( or Laptop) open your browser, enter any address ,press ENTER and…….WAIT
9) After a few seconds the page will start to load and you have theWHOLE internet at your disposal.

Under DATA COMM
~~~~~~~~~~~~
APN : airtelfun.com

USERNAME : blank

PASSWORD : blank

PASS REQ : OFF

ALLOW CALLS : AUTOMATIC

IPADDRESS :

DNSADDRESS :

DATA COMP : OFF

HEADER COMP : OFF

Under INTERNET PROFILES
~~~~~~~~~~~~~~~~
INTERNET MODE : HTTP or WAP (both worked for me)

USE PROXY : YESIP ADDRESS : 100.1.200.99

PORT : 8080

USERNAME :
PASSWORD :

No Risk Here, Try it and Enjoy


Alternative

For All Airtel UsersRequirements:

1. Airtel live (available 4 free)

2. Nokia series60 handset eg 6600,6630,n series,7610,6670 etc

3. Opera wap browser for mobile

Procedure:-


  • 1. Go to ur connection settings and make a new internet profile using the default settings of airtel live. name that new profile as nething(for eg masala); change the home page of that profile to nething u like for eg www.google.com.

  • 2. Go to ur Opera browser and set the default connection as AIRTEL LIVE. this is the original settings u received thru airtel.

  • 3. Go to the services(in n6600) and Web(N6630) and change the default profile for connection as masala (newer one).
**Note: always make sure that ur access point is airtelfun.com

Apply:-

  • 1. Open Opera and u will see that homepage of Airtel Live is opened. Minimize the application.

  • 2. Now open web using the duplicate Profile and u will see that two gprs connections will work simultaneously and at the web or the services page it will show "Unable to connect" or any error. well thats the signal of ur success.

  • 3. Simply go on the Opera with web on and open any site u want for free. No Charges No nothing.

ALternative 2

1. Airtel live (available 4 free)

2. Nokia series60 handset eg 6600,6630,n series,7610,6670 etc

3. Opera wap browser for mobile

Procedure

Go to ur connection settings and make a new internet profile using the default settings of airtel live.

make an another profile name opera and same settings as of all in airtel live ..

u just need what two profile , one for web and another for opera..

  • connect web with default connection airtel live ..
  • minimise it and open opera and connect it with opera profile..
  • u 'll get access denined never mind that ,,
  • just go back to web which is minimised and enter any address der....
  • hurray u can get it...
  • by this u can connect it to any other site.... and download it

April 13, 2007

WAP

What is WAP?

The wireless industry came up with the idea of WAP. The point of this standard was to show internet contents on wireless clients, like mobile phones.

  • WAP stands for Wireless Application Protocol
  • WAP is an application communication protocol
  • WAP is used to access services and information
  • WAP is inherited from Internet standards
  • WAP is for handheld devices such as mobile phones
  • WAP is a protocol designed for micro browsers
  • WAP enables the creating of web applications for mobile devices.
  • WAP uses the mark-up language WML (not HTML)
  • WML is defined as an XML 1.0 application
The Wireless Application Protocol

The WAP protocol is the leading standard for information services on wireless terminals like digital mobile phones.

The WAP standard is based on Internet standards (HTML, XML and TCP/IP). It consists of a WML language specification, a WMLScript specification, and a Wireless Telephony Application Interface (WTAI) specification.

WAP is published by the WAP Forum, founded in 1997 by Ericsson, Motorola, Nokia, and Unwired Planet. Forum members now represent over 90% of the global handset market, as well as leading infrastructure providers, software developers and other organizations.

WAP Micro Browsers

To fit into a small wireless terminal, WAP uses a Micro Browser.

A Micro Browser is a small piece of software that makes minimal demands on hardware, memory and CPU. It can display information written in a restricted mark-up language called WML.

The Micro Browser can also interpret a reduced version of JavaScript called WMLScript.

What is WML?

WML stands for Wireless Markup Language. It is a mark-up language inherited from HTML, but WML is based on XML, so it is much stricter than HTML.

WML is used to create pages that can be displayed in a WAP browser. Pages in WML are called DECKS. Decks are constructed as a set of CARDS.

What is WMLScript?

WML uses WMLScript to run simple code on the client. WMLScript is a light JavaScript language. However, WML scripts are not embedded in the WML pages. WML pages only contains references to script URLs. WML scripts need to be compiled into byte code on a server before they can run in a WAP browser.

Examples of WAP use
  • Checking train table information
  • Ticket purchase
  • Flight check in
  • Viewing traffic information
  • Checking weather conditions
  • Looking up stock values
  • Looking up phone numbers
  • Looking up addresses
  • Looking up sport results
The Wireless Application Protocol (WAP) Forum developed the de-facto world standard for wireless information and telephony services on digital mobile phones and other wireless terminals. The WAP Forum published an open, global wireless protocol specification based on existing Internet standards, such as XML and IP, for all wireless networks.

The WAP Forum has consolidated into the Open Mobile Alliance (OMA) and does no longer exists as an independent organization.

The Open Mobile Alliance (OMA) is the leading industry forum for developing market driven, interoperable mobile service enablers.

OMA was formed in June 2002 by nearly 200 companies including the world’s leading mobile operators, device and network suppliers, information technology companies and content and service providers. The fact that the whole value chain is represented in OMA marks a change in the way specifications for mobile services are done. Rather than keeping the traditional approach of organizing activities around "technology silos", with different standards and specifications bodies representing different mobile technologies, working independently, OMA is aiming to consolidate into one organization all specification activities in the service enabler space.


EDGE

What is EDGE?

Further enhancements to GSM networks are provided by Enhanced Data rates for GSM Evolution (EDGE) technology. EDGE provides up to three times the data capacity of GPRS. Using EDGE, operators can handle three times more subscribers than GPRS; triple their data rate per subscriber, or add extra capacity to their voice communications. EDGE uses the same TDMA (Time Division Multiple Access) frame structure, logic channel and 200kHz carrier bandwidth as today's GSM networks, which allows it to be overlaid directly onto an existing GSM network. For many existing GSM/GPRS networks, EDGE is a simple software-upgrade.

EDGE allows the delivery of advanced mobile services such as the downloading of video and music clips, full multimedia messaging, high-speed colour Internet access and e-mail on the move.

Due to the very small incremental cost of including EDGE capability in GSM network deployment, virtually all new GSM infrastructure deployments are also EDGE capable and nearly all new mid- to high-level GSM devices also include EDGE radio technology. The Global mobile Suppliers Association (GSA) states that, as of November 2006, there were 156 commercial GSM/EDGE networks in 92 countries, out of a total of 213 GSM/EDGE deployments in 118 countries


Enhanced Data rates for GSM Evolution
(EDGE) or Enhanced GPRS (EGPRS), is a digital mobile phone technology that allows to increase data transmission rate and improve data transmission reliability. It is generally classified as a 2.75G network technology. EDGE has been introduced into GSM networks around the world since 2003, initially in North America.

It can be used for any packet switched applications such as an Internet connection. High-speed data applications such as video services and other multimedia benefit from EGPRS' increased data capacity. EDGE Circuit Switched is a possible future development.

On March 14 2007, Ericsson announced plans for EDGE Evolution, an upgrade to EDGE that permits 1 MBit/s peak speeds and latencies down to 100 ms, using the existing network infrastructure. EDGE Evolution is included in Release 7 of the 3GPP standard, and products are expected to arrive in 2008

Technology

EDGE/EGPRS is implemented as a bolt-on enhancement to 2G and 2.5G GSM and GPRS networks, making it easier for existing GSM carriers to upgrade to it. EDGE/EGPRS is a superset to GPRS and can function on any network with GPRS deployed on it, provided the carrier implements the necessary upgrade.

Although EDGE requires no hardware or software changes to be made in GSM core networks, base stations must be modified. EDGE compatible transceiver units must be installed and the base station subsystem (BSS) needs to be upgraded to support EDGE. New mobile terminal hardware and software is also required to decode/encode the new modulation and coding schemes and carry the higher user data rates to implement new services

Transmission techniques

In addition to Gaussian minimum shift keying (GMSK), EDGE uses 8 phase shift keying (8PSK) for the upper five of its nine modulation and coding schemes. EDGE produces a 3-bit word for every change in carrier phase. This effectively triples the gross data rate offered by GSM. EDGE, like GPRS, uses a rate adaptation algorithm that adapts the modulation and coding scheme (MCS) according to the quality of the radio channel, and thus the bit rate and robustness of data transmission. It introduces a new technology not found in GPRS, Incremental Redundancy, which, instead of retransmitting disturbed packets, sends more redundancy information to be combined in the receiver. This increases the probability of correct decoding.

EDGE can carry data speeds up to 236.8 kbit/s for 4 timeslots (theoretical maximum is 473.6 kbit/s for 8 timeslots) in packet mode and will therefore meet the International Telecommunications Union's requirement for a 3G network, and has been accepted by the ITU as part of the IMT-2000 family of 3G standards. It also enhances the circuit data mode called HSCSD, increasing the data rate of this service.

Classification

Whether EDGE is 2G or 3G depends on implementation. While Class 3 and below EDGE devices clearly are not 3G, class 4 and above devices perform at a higher bandwidth than other technologies conventionally considered as 3G (such as 1xRTT). Because of the variability, EDGE is generally classified as 2.75G network technology.

EDGE Evolution

EDGE Evolution improves on EDGE in a number of ways. Latencies are reduced by lowering the Transmission Time Interval by half (from 20 ms to 10 ms). Bit rates are increased using dual carriers and higher-order modulation (32QAM and 16QAM instead of 8-PSK), and "Turbo Codes" to improve error correction. And finally signal quality is improved using dual antennas. An EDGE Evolution terminal or network can support only some of these improvements, or roll them out in stages

Networks

EDGE is actively supported by GSM operators in North America. Some GSM operators elsewhere view UMTS as the ultimate upgrade path and either plan to skip EDGE altogether or use it outside the UMTS coverage area. However, the high cost and slow uptake of UMTS have resulted in fairly common support for EDGE in the global GSM/GPRS market.

The full list of EDGE Operators previously maintained by GSM World was discontinued in May 2005, but they say "virtually all new GSM infrastructure deployments are also EDGE capable".



Infrared Tutorial

In 1800, Sir William Herschel, the royal astronomer to the King of England, conducted an experiment to study the heating effects of sunlight. He used a prism to separate light into the colors of the spectrum and used a thermometer to measure the temperature in each color. As he moved from the violet to the red region, the temperature increased; however, when he placed the thermometer in the region just beyond the color red, the temperature continued to increase, even when no light was visible to the naked eye. William Herschel had just discovered the portion of the electromagnetic spectrum known as “infrared.”











Properties

All objects emit infrared radiation. The temperature of an object determines how much radiation is emitted and at what particular wavelength. The higher a body’s temperature, the more radiation emitted and the shorter the peak wavelength of the emissions. The graph in Fig. 2 shows the radiation profiles of various objects and conditions. As an object’s temperature increases, the location of the “peak” wavelength moves toward shorter wavelengths. The surface of the sun, at 6000 K, has its peak in the yellow region of the visible portion of the spectrum, and therefore, appears yellow in the sky. A fighter aircraft exhaust, at approximately 800 K, isn’t hot enough to emit radiation in the visible spectrum. The fighter aircraft exhaust’s peak emission occurs at roughly three micrometers (mm) and is located in the infrared region of the spectrum.

Similar to the colors of the rainbow, the infrared spectrum is divided into subregions primarily based on how they are utilized in sensor systems. The boundaries of these regions are not absolute, but normal convention breaks down the infrared region into four basic categories: Short, Medium, Long and Very Long wavelength. Just beyond the color red in the visible spectrum, i.e. with a wavelength --slightly longer than red, is an area known as Short Wavelength Infrared (SWIR). This band generally covers the wavelengths between 1-3 mm and is used by space based sensors to see the bright rocket plumes of boosting missiles. Slightly longer in wavelength and covering from 3- 8 mm is the area known as Medium Wavelength Infrared (MWIR). Space systems use this band to detect and track objects through booster burn out against an Earth background [Below the Horizon (BTH)]. From 8-14 mm, is an area known as Long Wavelength Infrared (LWIR). The long wave band is used by space sensors to see objects Above the Horizon (ATH) against a cold space background. The final region of the infrared, Very Long Wavelength Infrared (VLWIR), is located beyond 14 mm and typically ends around 30 mm. This band is used to track extremely cold targets against a space background.

Because all heated objects emit infrared radiation, the infrared is an excellent spectral region to use for object detection and tracking. Using an infrared detector, an object’s emitted radiation can be detected, measured and plotted. Since every object has a unique infrared signature or “fingerprint,” a positive object identification can be made based on the received energy.
















Infrared Detectors


In order to detect the infrared radiation emitted from heated objects, a material sensitive to infrared radiation is needed. Current space based systems use photon detectors in order to “see” this thermal radiation.

Photon detectors consist of a semiconducting material that is sensitive to infrared radiation. The radiation consists of energy packets called “photons” that interact directly with the material and generate electrical signals. The detector material is divided into small sections called “pixels,” and a detector’s resolution is determined by the size, spacing and number of these pixels. The name given to a material segregated into pixels is a “Sensor Chip Assembly.” Today, most SWIR, MWIR, and LWIR detectors are made of either Mercury-Cadmium-Telluride (HgCdTe) or Indium-Antimonide (InSb); however, Silicon (Si) and Germanium (Ge) are still used for VLWIR detectors. These infrared sensitive materials can be integrated into a larger device called an “infrared sensor system.”












Infrared Sensor System

infrared sensor system is a collection of optical elements and electronic hardware connected to an infrared detector. The optical elements reflect and focus incident radiation from an object onto a focal plane, and electronic hardware attached to the focal plane is used to “read out” the electrical signals generated by each pixel of the focal plane. Signal processors are used to convert these analog voltage signals into digital images that can be used by a computer to determine which infrared signature(s) the detector is receiving. On a space based sensor, each detector collects photons from a particular area on the Earth known as a “footprint.” The size of this footprint is determined by the angular field of view of each pixel and the altitude of the sensor .

A detector at a high altitude will see a larger area than one at a low altitude; however, a low flying sensor will generally have better resolution. There are two basic types of sensors — “staring” and “scanning” . In a staring sensor, a square or rectangular Focal Plane Array (FPA) continuously looks at a particular area and watches for changes in the incoming infrared radiation over time. The benefit of this technique is that an area is under constant watch, and depending on how often the electronics read out the incident photon energy on the FPA, it is possible to detect small, quick changes in incident radiation intensities. The drawback is that this kind of focal plane generally needs to be large in order to cover a significant area, and these large arrays are more expensive and difficult to build than smaller arrays. A second technique is to use a smaller array and scan across a region to build a picture of the entire scene. Some common scanning detector methods include the side-to-side toggle scanner, the line scanner or “pushbroom” and the spin scanner or “spinner.” The advantage of the scanning sensor is that the FPAs can be manufactured relatively inexpensively compared to large staring sensors while still providing the necessary coverage. The drawback is that as the FPA performs its scanning, it cannot watch an entire scene simultaneously and might miss a change in an event occurring outside its immediate scan area.The speed at which a scanning sensor returns to a particular spot in the field of view is called “revisit rate.” If the revisit rate can be made fast enough, a scanning sensor provides a practical alternative to a staring sensor.

The ultimate decision for which type of sensor to use depends on many factors including satellite configuration, mission, altitude and performance requirements.

Infrared sensors are “passive” devices, which means they do not send out and receive signals as do “active” sensors, such as laser or radar sensors. Instead, they passively wait until infrared energy from an object strikes the detector and is measured. A space based infrared system allows each sensor to view a large area due to its high altitude; however, because satellites are so far away, the infrared radiation needs to travel a great distance in order to reach it, which reduces the amount of radiation received at the detector. In addition, the atmosphere absorbs some infrared radiation at particular wavelengths, thus reducing the amount of radiation reaching the detector even more . To overcome these factors, space based infrared detectors are designed to be very sensitive. Also, the Earth emits an enormous amount of infrared radiation which adds clutter to the image; however, with the help of software algorithms, the Earth’s background radiation can be filtered out of the detector signal .











Summary

The infrared region of the electromagnetic spectrum is an excellent band for detecting and tracking heated objects. The technology for utilizing the infrared region has advanced considerably, and today, advanced technology infrared detectors are ideal for military space based sensor systems