HackerInfo
Saturday, 17 June 2017
Campaign-5
GMAIL CAMPAIGN
Campaign end here copy your code is comment below by your name
After copyed your code click here and paste ...
Thank You for participanting...
Saturday, 17 September 2016
Solution For Laptop Battery Overheating
Should I Keep My Laptop Battery Plugged
In All The Time
Most laptop batteries are either lithium-ion or lithium-polymer. These batteries are designed to withstand numerous charge cycles. These batteries can not be overcharged, which means that as soon as they are 100% charged, they stop charging. These batteries stop receiving energy which is bypassed directly to your laptop’s power supply. So, keeping it plugged in won’t harm your battery and cause much difference to the overall battery life. But, there are some other critical factors that we’ll be discussing later.
Another concept that one must keep in mind is that there are some good practices that extend the life of your laptop battery. Your battery has a finite number of charge-discharge cycles, so, discharging your battery completely repeatedly is going to harm its life.
You’ll be surprised to know that overheating is the most critical factor when it comes to the prolonged life of a battery. We told you above that keeping your laptop plugged in won’t kill your battery. True. But, you also need to take care of the excessive heating caused by laptop hardware.
So, if your laptop’s CPU/HDD temperature is around 40ÂșC, keeping the laptopplugged in is fine. But, if your laptop has got a removable battery and you wish to use your laptop intensively, you are advised to remove the battery from the socket.
Tips:
1.Avoid discharging your laptop completely after charging it. The best thing you can do is try to keep the battery level between 40 percent to 80 percent.
2.Make sure that your laptop doesn’t get too hot and your cooling fan is working properly
3.Your laptop battery can’t “overcharge” and harm itself due to excessive charging. It’s smart enough to bypass the charging energy.
Source : https://fossbytes.com
Monday, 12 September 2016
SECRET CODES OF ANDROID MOBILES
50+ HIDDEN SECRET CODES FOR
ANDROID MOBILE PHONES
Since the first “Digital Network” (2G) came with some secret codes which are beginning to be used to access functions for advanced configuration and testing in Android. It exists to help employees operators as well as manufacturers in a few procedure. However, many of them use it for fun also, when you’re just curious by rolling a device Android.
Hidden Android Secret Codes
Galaxy S6
* # 9090 # Control diagnosis (serviceMode)
* # 9900 # SysDump
* # 7353 # Menu with several screen tests, camera, sensors, vibration and other
** 05 ** # Unlock PUK code from the emergency dialer
* # 06 # Displays IMEI and SN
* # 0 * # Menu with screen tests, sound, sensors and color verification
Moto X 2014
4636 # * # * # * # * connectivity test
** 05 ** # Unlock PUK code from the emergency dialer
* # 06 # Displays IMEI and SN LG G4
** 05 ** # Unlock PUK code from the emergency dialer – LG G4
Common Android Codes
* # * # 7780 # * # * Factory Restore
* 2767 * 3855 # Reinstall firmware
* 2767 * 3855 # Reset all settings and delete data or reinstall firmware
* # * # * # * # 197328640 Enable mode for testing services
4636 # * # * # * # * basic unit information
* # * # 34971539 # * # * Camera Information
* # * # 7594 # * # * Change behavior of the power button
* # * # * 273 283 255 * 663 282 * # * # * Create backup of all media files
* # * # 8255 # * # * Open Google Talk monitoring service / Hangouts
* 2767 * 4387264636 * Display product code
* # 0228 # Show battery status
* # 12580 * 369 * hardware and software information
* # 32489 # information of “encryption”
# * 273 283 * 255 * 3282 # * Create Data menu
* # 12580 * 369 * hardware and software information
* # 32489 # information of “encryption”
# * 273 283 * 255 * 3282 # * Create Data menu
# 3282 * 727 336 * # data usage stats
* # 8736364 # Menu OTA updates
Test Bluetooth and WLAN
526 # * # * # * # * WLAN Test
528 # * # * # * # * WLAN Test
* # * # * # * # 232339 WLAN Test
* # * # * # * # 232338 Show MAC addresses
* # * # 1472365 # * # * Quick GPS Test
* # * # 1575 # * # * GPS fuller Test
* # * # 232331 # * # * Test Bluetooth
* # * # 232337 # * # Show Bluetooth devices addresses connected
Check Firmware
* # * # 1111 # * # * Shows version of FTA SW
* # * # 2222 # * # * Shows version of FTA hardware
* # * # 4986 * 2650468 # * # * firmware information, PDA, phone, H / W and RF
* # * # 1234 # * # * firmware information and PDA
* # 2263 # band selection RF
* # 9090 # diagnostic settings
* # 7284 # USB control mode 12C
* # 872564 # USB login control
* # 745 # menu RIL
* # 746 # Debug Menu
* # 9900 # SystemDump Mode
* # * # * # * # 44336 Show number Build
* # 03 # serial number NAND
# 3214789 # * Status Mode GCF
Factory tests
* # * # 0283 # * # * Loopback Test
0 * # * # * # * # * LCD Test
0673 # * # * # * # * Audio Test
0289 # * # * # * # * Audio Test
* # * # 0842 # * # * Vibration tests, backlight and devices
* # * # 2663 # * # * Display Version touch
* # * # 2664 # * # * Touch Sensitivity Test
* # * # 0588 # * # * Proximity sensor test
3264 # * # * # * # * RAM Version
* # 0782 # real-time test clock
* # 0589 # brightness sensor test
* # 7353 # Menu rapid tests
Others
* # * # 0 service menu in Samsung devices
## 7764726 Service menu in Motorola DROID devices
1809 # * 990 # service menu on some devices
3845 # * 920 # 3D tests on some devices Menu
Trick Source:https://www.technotification.com
Image Source :http://2.bp.blogspot.com
To Become A Hacker Than Learn These Programming Languages
Important Programming languages for Hackers
Many of our readers often send us queries about which programming language they should learn. Some want to know quick fix hacking solutions. Almost all tech gadgets are built with coding. Every App, game or site that you use is programmed in a particular computer language. You need to know that hacking is not a click-of-a-button job but a serialized and compartmentalized vocation which uses different programming languages for different uses.
Most of the websites out there will give you list of most popular programming languages in the world. We at Techworm try to make it more easy for budding security researchers and hackers by breaking up the programming languages used by hackers.
Hacking is usually meant to break a code. There are three sections of hacking ― Web Hacking, Exploit Writing & Reverse Engineering and each of it requires different programming language
1. Web Hacking
Since most of the tech is build around world wide web, it is important to learn web hacking to be a good hacker. Let’s say you are interested in hacking web apps and/or websites then you will need to learn web coding. Websites use mostly HTML, PHP and JavaScript so it is important to learn these three.
HTML:
One of the easiest and widely used static markup web language present in each and every website you see in your browser. It’s recommended to learn HTML because it helps understanding web actions, response, and logic.
JavaScript:
JS is a client-side web programming mostly used in web sites for better user interface and quick response. If you are interested in a hacking career you need to learn JavaScript because it helps to understand client-side mechanism which is essential for finding client-side flaws.
PHP:
A dynamic server-side language which is responsible for managing web-apps and database. PHP is considered one of the most essential language because it controls everything on site and server, like a captain of a ship. It is advised to learn PHP nicely.
SQL:
SQL is responsible for storing and managing sensitive and confidential data such as user credentials, bank and personal information about the website visitors. Black hat hackers mostly target SQL database and steal information which is later sold on underground dark web forum. If you want to be good security researcher, you should learn SQL so that you can find flaws in a website and report them.
2. Exploit Writing
After web hacking, another most important feature of hacking is exploits. You can crack a particular software by writing a exploit. But to write a exploit you need to learn either Python or Ruby.
Python:
It is said that a security researcher or hacker should know Python because it the core language for creating exploits and tools. Security experts and even pro hackers suggest that master Python is the best way to learn hacking. Python offers wider flexibility and you can create exploits only if you are good in Python.
Ruby:
Ruby is a simple yet complicated object-oriented language. Ruby is very useful when it comes to exploit writing. It is used for meterpreter scripting by hackers. The most famous hacker tool, Metasploit framework is programmed in Ruby. Though Ruby may not be as versatile as Python, knowledge of Ruby is must in understanding exploits.
3. Reverse Engineering
Reverse engineering, the process of taking a software program’s binary code and recreating it so as to trace it back to the original source code. If you know reverse engineering you can find flaws and bugs easily. If you want to learn reverse engineering you need to know C, C++ and Java. The process of converting the code written in high level language into a low level language without changing the original program is known as reverse engineering.
Trick Source:http://www.techworm.net
Sunday, 11 September 2016
Computer Trick - 2 ( KeyBoard )
Do you know why is the keyboard not
arranged in alphabetical order?
We use keyboard every day, be it our desktop, or laptop, or tablet or smartphone. But have you ever wondered as to why the keyboard is not arranged in alphabetical order?
The reason goes back to the time of manual typewriters. These typewriters in earlier days did have the keys arranged in alphabetical order. However, it was later discovered that the people typed so fast that the mechanical character keys got jammed very easily with this arrangement.
To prevent this, the keys were randomly positioned so that the weaker fingers were needed more frequently. This meant that people typed at a speed which the machine could handle. As a result, the ‘QWERTY’ keyboard came into existence that we find and use today.
The QWERTY keyboard layout was devised and created in the 1860s by the creator of the first modern typewriter, Christopher Sholes, a newspaper editor who lived in Milwaukee. Originally, the characters on the typewriters he invented were arranged alphabetically, set on the end of a metal bar which struck the paper when its key was pressed. However, once an operator had learned to type at speed, the bars attached to letters that lay close together on the keyboard became entangled with one another, compelling the typist to manually unstick the typebars, and also regularly blotting the document. A business associate of Sholes, James Densmore, suggested splitting up keys for letters commonly used together to speed up typing by preventing common pairs of typebars from striking the platen at the same time and sticking together.
There are varied opinions on this rearrangement of letters in the keyboard. The logic of the QWERTY layout was based on letter usage in English rather than positioning of letter in the alphabet. However, some sources assert that the QWERTY layout was designed to slow down typing speed to further reduce jamming. Also, the QWERTY keyboards were made so one could type using keys from the top row of the keyboard. On the other hand, there are sources who assert the rearrangement worked by separating common sequences of letters in English. Apparently, the hammers that were likely to be used in quick succession were less likely to hinder with each other. This random arrangement eventually became standard in computers later followed by the devices made after that.
Trick From : http://www.techworm.net
Onion Tip - 1
Put Onions In your Sock And See This
Magic Happen
Onions are known to have anti bacterial and anti fungal properties. Sure they give you tears when you try to interact with them, but they can be very helpful indeed. Sometimes doctors suggest you have onions when you are feeling sick. There’s a reason behind this.
But can you apply onions topically? I mean what is the logic behind applying onions on your socks? Does it kill fungi over there? Let us find out:
They help make the skin soft
So if you are currently suffering from cracked heels, you might want to tap this thing under your feet. This shows that your feet not only gets ample moisture, but also heals itself wherever it is cracked. This is one of the best methods to get your feet revived.
If you have been struggling with cracked heels then we recommend this method.
Thursday, 8 September 2016
Steps to get Reliance JIO 4G Connection ---- Full Detail
How To Port Your Existing Number To New Reliance JIO 4G Connection For Free:-
Reliance on Thursday officially announced the Jio 4G services in India. It is a truly disruptive launch. Not only it is a service with comparatively affordable data plans but it is also available to anyone with a compatible 4G phone for free for until December 31.
Reliance Jio 4G services will be open for anyone to avail from September 5. However, there is still a lot of confusion in the market on which all smartphones the services will be available on? Here’s a comprehensive list of smartphones supporting Reliance Jio’s 4G services.
Your existing mobile number can be converted into JIO network using Mobile Number Portability (MNP). Trade pundits expect Reliance Digital Xpress and Reliance Digital Xpress mini stores to be bombarded with requests from a lot of subscribers to port out of their existing networks into Jio . Here’s a quick guide on how to port to India’s newest telecom sensation
Step 1: To port, you need to send the following text message – PORT followed by your 10-digit mobile number to TRAI’s central number for mobile number portability – “1900” as a part of the Free Welcome Offer from JIO.
Step 2: Download the ‘MyJio’ app from Google’s PlayStore and generate an offer code through the app. Walk into any Preferred Jio, Reliance Digital Xpress, Reliance Digital Xpress mini, or prominent multi-brand Jio stores with the port out specific code and your Free Welcome Offer code along with your mobile handset.
Step 3: Submit a copy of any of your identity and address proofs. It can be either Voter Id Card or Passport, Aadhaar Card along with a couple of same person’s passport-sized photos for obtaining your Jio SIM card.
That’s it. Follow the above three steps and get your sim ported for free without changing your number. Stay tuned for more updates by bookmarking our sites
Source:http://allindiaroundup.com
Subscribe to:
Posts (Atom)