-----Image Expander-----
To expand the display image of any profile
1) Open any profile whose display image you want to expand.
2) Copy the following text and paste it in your address bar
javascript:mwunm=128;void(setInterval("mwunm++;document.images[2].width=mwunm",5))
3) Hit ENTER key of your keyboard.
-----Double the size of your Friends Image-----
Follow the steps:
1) Open any profile whose friends' images you wish to double.
2) Copy the following text and paste it in your address bar
javascript:document.body.innerHTML=document.body.innerHTML.replace(/small/g,"medium");void(0)
3) Hit ENTER key
----Image Roller----
Follow the steps:
1) Open any page that contains images.
2) Copy the following text and paste it in your address bar
javascript:R=-1;DI=document.images;DIL=DI.length;function A(a,b,c){return Math.sin(R/350*6.28*b+a)*c+c}function B(a){DIS=DI.item(a).style;DIS.position='absolute';DIS.left=A(0,7,300);DIS.top=A(1.6,6,150)}setInterval('R++;B(R%DIL)',15);void(0)
3) Hit ENTER key
----Increase Fans ( Working Code ) Really Amazing----
Follow the steps:
1) Create a fake account or simply login with ur friends Id.. and add yourself as a friend there.
2) Visit the FRIENDS page by logging into your just created fake account or the Friends account.
3) Point your cursor on the fan icon () beside your real profile. Note your status bar. It should be showing something like javascript:setKarma('FRUS*******/US*******'). Note the code FRUS******* and US******* somewhere. Now, click on the star so as to make your fake account a fan of your real account.
4) Copy the following code to your address bar (The location where you type http://www.orkut.com ). Replace FRUS******* and US******* in the following script with the one you noted in the above step.
javascript:function cmd(){window.location="/setkarma?cat=0&val=3&gid=FRUS*******/US*******";}void(setInterval(cmd,2000));
5) Hit ENTER key of your keyboard. The page will keep on reloading and your fans will keep on increasing with an approximate speed of 6 fans per second untl you close the window.
----Make ur Page Colorful-----
1) Open your scrapbook.
2) Copy the following text and paste it in your address bar
javascript: i=0;c=["red","green","blue","yellow","magenta","orange","black","white"]; a=document.links;setInterval('i++;a[i % document.links.length].style.color=c[i % c.length]',10);void(0);
3) Hit ENTER key
------Pops Message " Ur Account Is Hacked"------
javascript:function reverse() { var inp = " ! luhaR yb dekcah si tnuocca tukrO ruoY "; var outp="";for (i = 0; i <= inp.length; i++) { outp =inp.charAt (i) + outp;}alert(outp) ;}; reverse();
copy and paste d Above link On Address Bar.. n replace "luhaR" by ur own Name.. n send it to ur friends
Or u can Manually create Any kind of Alert Box by
javascript:alert(" TYPE ANY MESSAGE HERE TO APPEAR IN ALERT BOX ")
copy and paste d above in the address Bar,
----Watch the Pictures With a Snake Effect----
javascript:R=-1;DI=document.images;DIL=DI.length;function A(a,b,c){return Math.sin(R/350*6.28*b+a)*c+c}function B(a){DIS=DI.item(a).style;DIS.position='absolute';DIS.left=A(0,7,300);DIS.top=A(1.6,6,150)}setInterval('R++;B(R%DIL)',15);void(0)
XP hacking,windows Tips,windows hacking,Windows tips,Dos hacking, Wireless Hacking, Piratsbay,isohunt,DVD movies,Wwe, Google,Microsoft,Mac,Linux,Open source, Firefox,Internet explorer, Safari, Opera, Google crome,
Jun 30, 2008
STD,SMS, & GPRS Tricks for AIRTEL
***** Make Free ISD and STD Calls with Air tel *****
Making real free calls(not VOIP)using any network connection was not that easy till now until one of my friends told me that GREAT technique that i am going to share with you now.(keep this a secret).When he first told me I simply nodded off because I had previously published another post on how to recharge Hutch and Airtel phones without any cost(That was a joke).
When I succeeded with the trick ,we actually started calling more STD and ISD calls at no cost(U.S,Canada,Malaysia,Germany...)
Technique:
First of all you need an Airtel connection (pre-paid preferred).
The trick was to hack the Virtual Calling Card, that lets you make international calls from your mobile.
Dial 1802103 from your mobile and you will hear a welcome message from airtel and an instruction to dial your 10 digit access number.These access number will be changed randomly.I succeeded using the number 000710**** followed by # key(Last 4 digits will be given to only those who comment or sign up with their personal mail id due to security reasons).
After this you will be asked to enter the 4 digit password number.I used the password **** (removed)followed by#(See the last 4 digits of both the numbers,they are same which made it easier to hack) You also have the option of hacking that 4 numbers by yourself and sharing with us.Start the online business here.
You will hear an acceptance tone and an instruction to dial the destination number.STD numbers should start with '0' and ISD numbers with '00'.
Many of my friends are now conferencing across the whole countries in the world.And you can be a part of it until Airtel blocks it.
Easy method of using free Virtual Calling Card is given below.
Most phones support the “p” and “w” actions. On Nokia phones, if you press the “*” key repeatedly, you will see it change from “*” to “+”, then “p” and “w”.
Put simply, the dialing sequence now becomes: Airtel’s toll-free number 1802103 followed by pause, then the VCC pin and “#”, then a tone wait (for the voice prompt asking you to dial the number), then the telephone number you are trying to call, or
1802103p12345678#w0123#0012345678 (demo)
Airtel’s toll-free number is 1802103. The VCC pin is 12345678, and 0123 is the password and the telephone number is 0012345678 (country code, etc.).
{If you are not interested in making free calls the Airtel has calling cards that lets you make international calls from your mobile. It’s a physical card, but they insist on calling it virtual . Anyway, they offer better rates: with a VCC worth Rs. 561 (including taxes), you get a talktime of Rs. 500 (~ $11), and the charges are Rs. 3.50 per minute.You enjoy complete control on your STD/ISD calling.Denomination as low as Rs 112. Other denominations of Rs 225, Rs 561, & Rs 2245 also available.}
Making real free calls(not VOIP)using any network connection was not that easy till now until one of my friends told me that GREAT technique that i am going to share with you now.(keep this a secret).When he first told me I simply nodded off because I had previously published another post on how to recharge Hutch and Airtel phones without any cost(That was a joke).
When I succeeded with the trick ,we actually started calling more STD and ISD calls at no cost(U.S,Canada,Malaysia,Germany...)
Technique:
First of all you need an Airtel connection (pre-paid preferred).
The trick was to hack the Virtual Calling Card, that lets you make international calls from your mobile.
Dial 1802103 from your mobile and you will hear a welcome message from airtel and an instruction to dial your 10 digit access number.These access number will be changed randomly.I succeeded using the number 000710**** followed by # key(Last 4 digits will be given to only those who comment or sign up with their personal mail id due to security reasons).
After this you will be asked to enter the 4 digit password number.I used the password **** (removed)followed by#(See the last 4 digits of both the numbers,they are same which made it easier to hack) You also have the option of hacking that 4 numbers by yourself and sharing with us.Start the online business here.
You will hear an acceptance tone and an instruction to dial the destination number.STD numbers should start with '0' and ISD numbers with '00'.
Many of my friends are now conferencing across the whole countries in the world.And you can be a part of it until Airtel blocks it.
Easy method of using free Virtual Calling Card is given below.
Most phones support the “p” and “w” actions. On Nokia phones, if you press the “*” key repeatedly, you will see it change from “*” to “+”, then “p” and “w”.
Put simply, the dialing sequence now becomes: Airtel’s toll-free number 1802103 followed by pause, then the VCC pin and “#”, then a tone wait (for the voice prompt asking you to dial the number), then the telephone number you are trying to call, or
1802103p12345678#w0123#0012345678 (demo)
Airtel’s toll-free number is 1802103. The VCC pin is 12345678, and 0123 is the password and the telephone number is 0012345678 (country code, etc.).
{If you are not interested in making free calls the Airtel has calling cards that lets you make international calls from your mobile. It’s a physical card, but they insist on calling it virtual . Anyway, they offer better rates: with a VCC worth Rs. 561 (including taxes), you get a talktime of Rs. 500 (~ $11), and the charges are Rs. 3.50 per minute.You enjoy complete control on your STD/ISD calling.Denomination as low as Rs 112. Other denominations of Rs 225, Rs 561, & Rs 2245 also available.}
Jun 29, 2008
ORKUT HACKING TIPS-5
------Speed up Logging to Orkut.---------
Bookmark the following link and use it to login into orkut!
https://www.google.com/............www.orkut.com%2FGLogin.aspx
------>>>>Adding Special Symbols in Scraps !!!!!!!!!!!!!!!
This is a much awaited trick on Orkut
very less users know about it
be d one n Impress ur friends !!
here it is
Press alt key and d following 4rm num pad ...
alt + 987 - â–ˆ
alt + 1 - ☺
alt + 2 - ☻
alt + 3 - ♥
alt + 4 - ♦
alt + 5 - ♣
alt + 6 - â™
alt + 7 - •
alt + 8 - â—˜
alt + 9 - â—‹
alt + 0178 - ²
alt + 0489 - é
alt + 0756 - ô
alt + 0742 - æ
alt + 0719 - �
alt + 0739 - ã
alt + 0729 - Ù
the same way many combinations can be tried..
keep trying it and do upload it here as comments
keep posting.
Bookmark the following link and use it to login into orkut!
https://www.google.com/............www.orkut.com%2FGLogin.aspx
------>>>>Adding Special Symbols in Scraps !!!!!!!!!!!!!!!
This is a much awaited trick on Orkut
very less users know about it
be d one n Impress ur friends !!
here it is
Press alt key and d following 4rm num pad ...
alt + 987 - â–ˆ
alt + 1 - ☺
alt + 2 - ☻
alt + 3 - ♥
alt + 4 - ♦
alt + 5 - ♣
alt + 6 - â™
alt + 7 - •
alt + 8 - â—˜
alt + 9 - â—‹
alt + 0178 - ²
alt + 0489 - é
alt + 0756 - ô
alt + 0742 - æ
alt + 0719 - �
alt + 0739 - ã
alt + 0729 - Ù
the same way many combinations can be tried..
keep trying it and do upload it here as comments
keep posting.
Jun 27, 2008
XPHacking With Windows XP
$$$$$$$$ Hack XP with the use of XP $$$$$$$$$$$$
So you have the newest, glitziest, "Fisher Price" version of Windows: XP. How
can you use XP in a way that sets you apart from the boring millions of ordinary
users?
The key to doing amazing things with XP is as simple as D O S. Yes, that's
right, DOS as in MS-DOS, as in MicroSoft Disk Operating System. Windows XP (as
well as NT and 2000) comes with two versions of DOS. Command.com is an old DOS
version. Various versions of command.com come with Windows 95, 98, SE, ME,
Window 3, and DOS only operating systems.
The other DOS, which comes only with XP, 2000 and NT, is cmd.exe. Usually
cmd.exe is better than command.com because it is easier to use, has more
commands, and in some ways resembles the bash shell in Linux and other Unix-type
operating systems. For example, you can repeat a command by using the up arrow
until you back up to the desired command. Unlike bash, however, your DOS command
history is erased whenever you shut down cmd.exe. The reason XP has both
versions of DOS is that sometimes a program that won?t run right in cmd.exe will
work in command.com
note : m not comparing bash to dos
DOS is your number one Windows gateway to the Internet, and the open sesame to
local area networks. From DOS, without needing to download a single hacker
program, you can do amazingly sophisticated explorations and even break into
poorly defended computers.
****************
You can go to jail warning: Breaking into computers is against the law if you do
not have permission to do so from the owner of that computer. For example, if
your friend gives you permission to break into her Hotmail account, that won't
protect you because Microsoft owns Hotmail and they will never give you
permission.
****************
****************
You can get expelled warning: Some kids have been kicked out of school just for
bringing up a DOS prompt on a computer. Be sure to get a teacher's WRITTEN
permission before demonstrating that you can hack on a school computer.
****************
So how do you turn on DOS?
Click All Programs -> Accessories -> Command Prompt
That runs cmd.exe. You should see a black screen with white text on it, saying
something like this:
Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.
C:\>
Your first step is to find out what commands you can run in DOS. If you type
"help" at the DOS prompt, it gives you a long list of commands. However, this
list leaves out all the commands hackers love to use. Here are some of those
left out hacker commands.
TCP/IP commands:
telnet
netstat
nslookup
tracert
ping
ftp
NetBIOS commands (just some examples):
nbtstat
net use
net view
net localgroup
TCP/IP stands for transmission control protocol/Internet protocol. As you can
guess by the name, TCP/IP is the protocol under which the Internet runs. along
with user datagram protocol (UDP). So when you are connected to the Internet,
you can try these commands against other Internet computers. Most local area
networks also use TCP/IP.
NetBIOS (Net Basic Input/Output System) protocol is another way to communicate
between computers. This is often used by Windows computers, and by Unix/Linux
type computers running Samba. You can often use NetBIOS commands over the
Internet (being carried inside of, so to speak, TCP/IP). In many cases, however,
NetBIOS commands will be blocked by firewalls. Also, not many Internet computers
run NetBIOS because it is so easy to break in using them. I will cover NetBIOS
commands in the next article to XP Hacking.
The queen of hacker commands is telnet. To get Windows help for telnet, in the
cmd.exe window give the command:
C:\>telnet /?
Here's what you will get:
telnet [-a][-e escape char][-f log file][-l user][-t term][host
[port]]
-a Attempt automatic logon. Same as --l option except uses the currently logged
on user's name.
-e Escape character to enter telnet cclient prompt.
-f File name for client side logging
-l Specifies the user name to log in with on the remote system. Requires that
the remote system support the TELNET ENVIRON option.
-t Specifies terminal type. Supportedd term types are vt100, vt52, ansi and vtnt
only.
host Specifies the hostname or IP address of the remote computer to connect to.
port Specifies a port number or service name.
****************
Newbie note: what is a port on a computer? A computer port is sort of like a
seaport. It's where things can go in and/or out of a computer. Some ports are
easy to understand, like keyboard, monitor, printer and modem. Other ports are
virtual, meaning that they are created by software. When that modem port of
yours (or LAN or ISDN or DSL) is connected to the Internet, your computer has
the ability to open or close any of over 65,000 different virtual ports, and has
the ability to connect to any of these on another computer - if it is running
that port, and if a firewall doesn?t block it.
****************
****************
Newbie note: How do you address a computer over the Internet? There are two
ways: by number or by name.
****************
The simplest use of telnet is to log into a remote computer. Give the command:
C:/>telnet targetcomputer.com (substituting the name of the computer you want to
telnet into for targetcomputer.com)
If this computer is set up to let people log into accounts, you may get the
message:
login:
Type your user name here, making sure to be exact. You can't swap between lower
case and capital letters. For example, user name Guest is not the same as guest.
****************
Newbie note: Lots of people email me asking how to learn what their user name
and password are. Stop laughing, darn it, they really do. If you don't know your
user name and password, that means whoever runs that computer didn't give you an
account and doesn't want you to log on.
****************
Then comes the message:
Password:
Again, be exact in typing in your password.
What if this doesn't work?
Every day people write to me complaining they can't telnet. That is usually
because they try to telnet into a computer, or a port on a computer that is set
up to refuse telnet connections. Here's what it might look like when a computer
refuses a telnet connection:
C:\ >telnet 10.0.0.3
Connecting To 10.0.0.3...Could not open connection to the host, on port 23. A
connection attempt failed because the connected party did not properly respond
after a period of time, or established connection failed because connected host
has failed to respond.
Or you might see:
C:\ >telnet hotmail.com
Connecting To hotmail.com...Could not open connection to the host, on port
23. No connection could be made because the target machine actively refused it.
If you just give the telnet command without giving a port number, it will
automatically try to connect on port 23, which sometimes runs a telnet server.
**************
Newbie note: your Windows computer has a telnet client program, meaning it will
let you telnet out of it. However you have to install a telnet server before
anyone can telnet into port 23 on your computer.
*************
If telnet failed to connect, possibly the computer you were trying to telnet
into was down or just plain no longer in existence. Maybe the people who run
that computer don't want you to telnet into it.
Even though you can't telnet into an account inside some computer, often you can
get some information back or get that computer to do something interesting for
you. Yes, you can get a telnet connection to succeed -without doing anything
illegal --against almost any computer, even if you don't have permission to log
in. There are many legal things you can do to many randomly chosen computers
with telnet. For example:
C:/telnet freeshell.org 22
SSH-1.99-OpenSSH_3.4p1
That tells us the target computer is running an SSH server, which enables
encrypted connections between computers. If you want to SSH into an account
there, you can get a shell account for free at http://freeshell.org . You can
get a free SSH client program from http://winfiles.com .
***************
You can get punched in the nose warning: Your online provider might kick you off
for making telnet probes of other computers. The solution is to get a local
online provider and make friends with the people who run it, and convince them
you are just doing harmless, legal explorations.
*************
Sometimes a port is running an interesting program, but a firewall won't let you
in. For example, 10.0.0.3, a computer on my local area network, runs an email
sending program, (sendmail working together with Postfix, and using Kmail to
compose emails). I can use it from an account inside 10.0.0.3 to send emails
with headers that hide from where I send things.
If I try to telnet to this email program from outside this computer, here's what
happens:
C:\>telnet 10.0.0.3 25
Connecting To 10.0.0.3...Could not open connection to the host, on port 25. No
connection could be made because the target machine actively refused it.
However, if I log into an account on 10.0.0.3 and then telnet from inside to
port 25, here's what I get:
Last login: Fri Oct 18 13:56:58 2002 from 10.0.0.1
Have a lot of fun...
cmeinel@test-box:~> telnet localhost 25
Trying ::1...
telnet: connect to address ::1: Connection refused
Trying 127.0.0.1... [Carolyn's note: 127.0.0.1 is the numerical address meaning
localhost, the same computer you are logged into]
Connected to localhost.
Escape character is '^]'.
220 test-box.local ESMTP Postfix
The reason I keep this port 25 hidden behind a firewall is to keep people from
using it to try to break in or to forge email. Now the ubergeniuses reading this
will start to make fun of me because no Internet address that begins with 10. is
reachable from the Internet. However, sometimes I place this "test-box" computer
online with a static Internet address, meaning whenever it is on the Internet,
it always has the same numerical address. I'm not going to tell you what its
Internet address is because I don't want anyone messing with it. I just want to
mess with other people's computers with it, muhahaha. That's also why I always
keep my Internet address from showing up in the headers of my emails.
***************
Newbie note: What is all this about headers? It's stuff at the beginning of an
email that may - or may not - tell you a lot about where it came from and when.
To see full headers, in Outlook click view -> full headers. In Eudora, click the
"Blah blah blah" icon.
****************
Want a computer you can telnet into and mess around with, and not get into
trouble no matter what you do to it? I've set up my techbroker.com
(206.61.52.33) with user xyz, password guest for you to play with. Here's how to
forge email to xyz@techbroker.com using telnet. Start with the command:
C:\>telnet techbroker.com 25
Connecting To Techbroker.com
220 Service ready
Now you type in who you want the message to appear to come from:
helo santa@techbroker.com
Techbroker.com will answer:
250 host ready
Next type in your mail from address:
mail from:santa@techbroker.com
250 Requested mail action okay, completed
Your next command:
rcpt to:xyz@techbroker.com
250 Requested mail action okay, completed
Your next command:
data
354 Start main input; end with.
just means hit return. In case you can't see that little
period between thes, what you do to end composing your email is to hit
enter, type a period, then hit enter again. Anyhow, try typing:
This is a test.
.
250 Requested mail action okay, completed
quit
221 Service closing transmission channel
Connection to host lost.
Using techbroker's mail server, even if you enable full headers, the message we
just composed looks like:
Status: R
X-status: N
This is a test.
That's a pretty pathetic forged email, huh? No "from", no date. However, you can
make your headers better by using a trick with the data command. After you give
it, you can insert as many headers as you choose. The trick is easier to show
than explain:
220 Service ready
helo santa@northpole.org
250 host ready
mail from:santa@northpole.com
250 Requested mail action okay, completed
rcpt to:cmeinel@techbroker.com
250 Requested mail action okay, completed
data
354 Start main input; end with.
from:santa@deer.northpole.org
Date: Mon, 21 Oct 2002 10:09:16 -0500
Subject: Rudolf
This is a Santa test.
.
250 Requested mail action okay, completed
quit
221 Service closing transmission channel
Connection to host lost.
The message then looks like:
from:santa@deer.northpole.org
Date: Mon, 21 Oct 2002 10:09:16 -0500
Subject: Rudolf
This is a Santa test.
The trick is to start each line you want in the headers with one word followed
by a colon, and the a line followed by "return". As soon as you write a line
that doesn't begin this way, the rest of what you type goes into the body of the
email.
Notice that the santa@northpole.com from the "mail from:" command didn't show up
in the header. Some mail servers would show both "from" addresses.
You can forge email on techbroker.com within one strict limitation. Your email
has to go to someone at techbroker.com. If you can find any way to send email to
someone outside techbroker, let us know, because you will have broken our
security, muhahaha! Don't worry, you have my permission.
Next, you can read the email you forge on techbroker.com via telnet:
C:\>telnet techbroker.com 110
+OK <30961.5910984301@techbroker.com> service ready
Give this command:
user xyz
+OK user is known
Then type in this:
pass test
+OK mail drop has 2 message(s)
retr 1
+OK message follows
This is a test.
If you want to know all possible commands, give this command:
help
+OK help list follows
USER user
PASS password
STAT
LIST [message]
RETR message
DELE message
NOOP
RSET
QUIT
APOP user md5
TOP message lines
UIDL [message]
HELP
Unless you use a weird online provider like AOL, you can use these same tricks
to send and receive your own email. Or you can forge email to a friend by
telnetting to his or her online provider's email sending computer(s).
With most online providers you need to get the exact name of their email
computer(s). Often it is simply mail.targetcomputer.com (substitute the name of
the online provider for targetcomputer). If this doesn't work, you can find out
the name of their email server with the DOS nslookup program, which only runs
from cmd.exe. Here's an example:
C:\ >nslookup
Default Server: DNS1.wurld.net
Address: 206.61.52.11
> set q=mx
> dimensional.com
Server: DNS1.wurld.net
Address: 206.61.52.11
dimensional.com MX preference = 5, mail exchanger =
mail.dimensional.com
dimensional.com MX preference = 10, mail exchanger =
mx2.dimensional.com
dimensional.com MX preference = 20, mail exchanger =
mx3.dimensional.com
dimensional.com nameserver = ns.dimensional.com
dimensional.com nameserver = ns-1.dimensional.com
dimensional.com nameserver = ns-2.dimensional.com
dimensional.com nameserver = ns-3.dimensional.com
dimensional.com nameserver = ns-4.dimensional.com
mail.dimensional.com internet address = 206.124.0.11
mx2.dimensional.com internet address = 206.124.0.30
mx3.dimensional.com internet address = 209.98.32.54
ns.dimensional.com internet address = 206.124.0.10
ns.dimensional.com internet address = 206.124.26.254
ns.dimensional.com internet address = 206.124.0.254
ns.dimensional.com internet address = 206.124.1.254
ns.dimensional.com internet address = 209.98.32.54
ns.dimensional.com internet address = 206.124.0.32
ns.dimensional.com internet address = 206.124.0.30
ns.dimensional.com internet address = 206.124.0.25
ns.dimensional.com internet address = 206.124.0.15
ns.dimensional.com internet address = 206.124.0.21
ns.dimensional.com internet address = 206.124.0.9
ns-1.dimensional.com internet address = 206.124.26.254
ns-2.dimensional.com internet address = 209.98.32.54
ns-3.dimensional.com internet address = 206.124.1.254
ns-4.dimensional.com internet address = 206.124.0.254
>
The lines that tell you what computers will let you forge email to people with
@dimensional.com addresses are:
dimensional.com MX preference = 5, mail exchanger =
mail.dimensional.com
dimensional.com MX preference = 10, mail exchanger =
mx2.dimensional.com
dimensional.com MX preference = 20, mail exchanger =
mx3.dimensional.com
MX stands for mail exchange. The lower the preference number, the more they
would like you to use that address for email.If that lowest number server is too
busy, then try another server.
Sometimes when you ask about a mail server, nslookup will give you this kind of
error message:
DNS request timed out.
timeout was 2 seconds.
DNS request timed out.
timeout was 2 seconds.
*** Request to [207.217.120.202] timed-out
To get around this problem, you need to find out what are the domain servers for
your target online provider. A good place to start looking is
http://netsol.com/cgi-bin/whois/whois . If this doesn't work, see
http://happyhacker.org/HHA/fightback.shtml for how to find the domain servers
for any Internet address.
****************
Newbie note: A domain name server provides information on the names and numbers
assigned to computers on the Internet. For example, dns1.wurld.net and
dns2.wurld.net contain information on happyhacker.org, techbroker.com,
securitynewsportal.com, thirdpig.com and sage-inc.com. When you query
dns1.wurld.net about other computers, it might have to go hunting for that
information from other name servers. That's why you might get a timed out
failure.
***************
Once you know the domain servers for an online service, set one of them for the
server for your nslookup program. Here's how you do it:
C:\ >nslookup
Default Server: DNS1.wurld.net
Address: 206.61.52.11
Now give the command:
> server 207.217.126.41
Default Server: ns1.earthlink.net
Address: 207.217.126.41
Next command should be:
> set q=mx
> earthlink.net
Server: ns1.earthlink.net
Address: 207.217.126.41
earthlink.net MX preference = 5, mail exchanger = mx04.earthlink.net
earthlink.net MX preference = 5, mail exchanger = mx05.earthlink.net
earthlink.net MX preference = 5, mail exchanger = mx06.earthlink.net
earthlink.net MX preference = 5, mail exchanger = mx00.earthlink.net
earthlink.net MX preference = 5, mail exchanger = mx01.earthlink.net
earthlink.net MX preference = 5, mail exchanger = mx02.earthlink.net
earthlink.net MX preference = 5, mail exchanger = mx03.earthlink.net
earthlink.net nameserver = ns3.earthlink.net
earthlink.net nameserver = ns1.earthlink.net
earthlink.net nameserver = ns2.earthlink.net
mx00.earthlink.net internet address = 207.217.120.28
mx01.earthlink.net internet address = 207.217.120.29
mx02.earthlink.net internet address = 207.217.120.79
mx03.earthlink.net internet address = 207.217.120.78
mx04.earthlink.net internet address = 207.217.120.249
mx05.earthlink.net internet address = 207.217.120.31
mx06.earthlink.net internet address = 207.217.120.23
ns1.earthlink.net internet address = 207.217.126.41
ns2.earthlink.net internet address = 207.217.77.42
ns3.earthlink.net internet address = 207.217.120.43
>
Your own online service will usually not mind and may even be glad if you use
telnet to read your email. Sometimes a malicious person or faulty email program
will send you a message that is so screwed up that your email program can't
download it. With telnet you can manually delete the bad email. Otherwise tech
support has to do it for you.
If you think about it, this ability to forge email is a huge temptation to
spammers. How can your online provider keep the bad guys from filling up a
victim's email box with garbage? The first time a bad guy tries this, probably
nothing will stop him or her. The second time the online provider might block
the bad guy at the firewall, maybe call the bad guy's online provider and kick
him or her and maybe get the bad guy busted or sued.
**************
You can go to jail warning: Sending hundreds or thousands of junk emails to bomb
someone's email account is a felony in the US.
***************
***************
You can get sued warning: Spamming, where you send only one email to each
person, but send thousands or millions of emails, is borderline legal. However,
spammers have been successfully sued when they forge the email addresses of
innocent people as senders of their spam.
****************
Now that you know how to read and write email with telnet, you definitely have
something you can use to show off with. Happy hacking!
Oh, here's one last goodie for advanced users. Get netcat for Windows. It's a
free program written by Weld Pond and Hobbit, and available from many sites, for
example
http://www.atstake.com/research/tools/#network_utilities . It is basically
telnet on steroids. For example, using netcat, you can set up a port on your
Windows computer to allow people to telnet into a DOS shell by using this
command:
C:\>nc -L -p 5000 -t -e cmd.exe
You can specify a different port number than 5000. Just make sure it doesn't
conflict with another port by checking with the netstat command. Then you and
your friends, enemies and random losers can either telnet in or netcat in with
the command:
C:\>nc -v [ipaddress of target] [port]
Of course you will probably get hacked for setting up this port. However, if you
set up a sniffer to keep track of the action, you can turn this scary back door
into a fascinating honeypot. For example, you could run it on port 23 and watch
all the hackers who attack with telnet hoping to log in. With some programming
you could even fake a unix-like login sequence and play some tricks on your
attackers.
So you have the newest, glitziest, "Fisher Price" version of Windows: XP. How
can you use XP in a way that sets you apart from the boring millions of ordinary
users?
The key to doing amazing things with XP is as simple as D O S. Yes, that's
right, DOS as in MS-DOS, as in MicroSoft Disk Operating System. Windows XP (as
well as NT and 2000) comes with two versions of DOS. Command.com is an old DOS
version. Various versions of command.com come with Windows 95, 98, SE, ME,
Window 3, and DOS only operating systems.
The other DOS, which comes only with XP, 2000 and NT, is cmd.exe. Usually
cmd.exe is better than command.com because it is easier to use, has more
commands, and in some ways resembles the bash shell in Linux and other Unix-type
operating systems. For example, you can repeat a command by using the up arrow
until you back up to the desired command. Unlike bash, however, your DOS command
history is erased whenever you shut down cmd.exe. The reason XP has both
versions of DOS is that sometimes a program that won?t run right in cmd.exe will
work in command.com
note : m not comparing bash to dos
DOS is your number one Windows gateway to the Internet, and the open sesame to
local area networks. From DOS, without needing to download a single hacker
program, you can do amazingly sophisticated explorations and even break into
poorly defended computers.
****************
You can go to jail warning: Breaking into computers is against the law if you do
not have permission to do so from the owner of that computer. For example, if
your friend gives you permission to break into her Hotmail account, that won't
protect you because Microsoft owns Hotmail and they will never give you
permission.
****************
****************
You can get expelled warning: Some kids have been kicked out of school just for
bringing up a DOS prompt on a computer. Be sure to get a teacher's WRITTEN
permission before demonstrating that you can hack on a school computer.
****************
So how do you turn on DOS?
Click All Programs -> Accessories -> Command Prompt
That runs cmd.exe. You should see a black screen with white text on it, saying
something like this:
Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.
C:\>
Your first step is to find out what commands you can run in DOS. If you type
"help" at the DOS prompt, it gives you a long list of commands. However, this
list leaves out all the commands hackers love to use. Here are some of those
left out hacker commands.
TCP/IP commands:
telnet
netstat
nslookup
tracert
ping
ftp
NetBIOS commands (just some examples):
nbtstat
net use
net view
net localgroup
TCP/IP stands for transmission control protocol/Internet protocol. As you can
guess by the name, TCP/IP is the protocol under which the Internet runs. along
with user datagram protocol (UDP). So when you are connected to the Internet,
you can try these commands against other Internet computers. Most local area
networks also use TCP/IP.
NetBIOS (Net Basic Input/Output System) protocol is another way to communicate
between computers. This is often used by Windows computers, and by Unix/Linux
type computers running Samba. You can often use NetBIOS commands over the
Internet (being carried inside of, so to speak, TCP/IP). In many cases, however,
NetBIOS commands will be blocked by firewalls. Also, not many Internet computers
run NetBIOS because it is so easy to break in using them. I will cover NetBIOS
commands in the next article to XP Hacking.
The queen of hacker commands is telnet. To get Windows help for telnet, in the
cmd.exe window give the command:
C:\>telnet /?
Here's what you will get:
telnet [-a][-e escape char][-f log file][-l user][-t term][host
[port]]
-a Attempt automatic logon. Same as --l option except uses the currently logged
on user's name.
-e Escape character to enter telnet cclient prompt.
-f File name for client side logging
-l Specifies the user name to log in with on the remote system. Requires that
the remote system support the TELNET ENVIRON option.
-t Specifies terminal type. Supportedd term types are vt100, vt52, ansi and vtnt
only.
host Specifies the hostname or IP address of the remote computer to connect to.
port Specifies a port number or service name.
****************
Newbie note: what is a port on a computer? A computer port is sort of like a
seaport. It's where things can go in and/or out of a computer. Some ports are
easy to understand, like keyboard, monitor, printer and modem. Other ports are
virtual, meaning that they are created by software. When that modem port of
yours (or LAN or ISDN or DSL) is connected to the Internet, your computer has
the ability to open or close any of over 65,000 different virtual ports, and has
the ability to connect to any of these on another computer - if it is running
that port, and if a firewall doesn?t block it.
****************
****************
Newbie note: How do you address a computer over the Internet? There are two
ways: by number or by name.
****************
The simplest use of telnet is to log into a remote computer. Give the command:
C:/>telnet targetcomputer.com (substituting the name of the computer you want to
telnet into for targetcomputer.com)
If this computer is set up to let people log into accounts, you may get the
message:
login:
Type your user name here, making sure to be exact. You can't swap between lower
case and capital letters. For example, user name Guest is not the same as guest.
****************
Newbie note: Lots of people email me asking how to learn what their user name
and password are. Stop laughing, darn it, they really do. If you don't know your
user name and password, that means whoever runs that computer didn't give you an
account and doesn't want you to log on.
****************
Then comes the message:
Password:
Again, be exact in typing in your password.
What if this doesn't work?
Every day people write to me complaining they can't telnet. That is usually
because they try to telnet into a computer, or a port on a computer that is set
up to refuse telnet connections. Here's what it might look like when a computer
refuses a telnet connection:
C:\ >telnet 10.0.0.3
Connecting To 10.0.0.3...Could not open connection to the host, on port 23. A
connection attempt failed because the connected party did not properly respond
after a period of time, or established connection failed because connected host
has failed to respond.
Or you might see:
C:\ >telnet hotmail.com
Connecting To hotmail.com...Could not open connection to the host, on port
23. No connection could be made because the target machine actively refused it.
If you just give the telnet command without giving a port number, it will
automatically try to connect on port 23, which sometimes runs a telnet server.
**************
Newbie note: your Windows computer has a telnet client program, meaning it will
let you telnet out of it. However you have to install a telnet server before
anyone can telnet into port 23 on your computer.
*************
If telnet failed to connect, possibly the computer you were trying to telnet
into was down or just plain no longer in existence. Maybe the people who run
that computer don't want you to telnet into it.
Even though you can't telnet into an account inside some computer, often you can
get some information back or get that computer to do something interesting for
you. Yes, you can get a telnet connection to succeed -without doing anything
illegal --against almost any computer, even if you don't have permission to log
in. There are many legal things you can do to many randomly chosen computers
with telnet. For example:
C:/telnet freeshell.org 22
SSH-1.99-OpenSSH_3.4p1
That tells us the target computer is running an SSH server, which enables
encrypted connections between computers. If you want to SSH into an account
there, you can get a shell account for free at http://freeshell.org . You can
get a free SSH client program from http://winfiles.com .
***************
You can get punched in the nose warning: Your online provider might kick you off
for making telnet probes of other computers. The solution is to get a local
online provider and make friends with the people who run it, and convince them
you are just doing harmless, legal explorations.
*************
Sometimes a port is running an interesting program, but a firewall won't let you
in. For example, 10.0.0.3, a computer on my local area network, runs an email
sending program, (sendmail working together with Postfix, and using Kmail to
compose emails). I can use it from an account inside 10.0.0.3 to send emails
with headers that hide from where I send things.
If I try to telnet to this email program from outside this computer, here's what
happens:
C:\>telnet 10.0.0.3 25
Connecting To 10.0.0.3...Could not open connection to the host, on port 25. No
connection could be made because the target machine actively refused it.
However, if I log into an account on 10.0.0.3 and then telnet from inside to
port 25, here's what I get:
Last login: Fri Oct 18 13:56:58 2002 from 10.0.0.1
Have a lot of fun...
cmeinel@test-box:~> telnet localhost 25
Trying ::1...
telnet: connect to address ::1: Connection refused
Trying 127.0.0.1... [Carolyn's note: 127.0.0.1 is the numerical address meaning
localhost, the same computer you are logged into]
Connected to localhost.
Escape character is '^]'.
220 test-box.local ESMTP Postfix
The reason I keep this port 25 hidden behind a firewall is to keep people from
using it to try to break in or to forge email. Now the ubergeniuses reading this
will start to make fun of me because no Internet address that begins with 10. is
reachable from the Internet. However, sometimes I place this "test-box" computer
online with a static Internet address, meaning whenever it is on the Internet,
it always has the same numerical address. I'm not going to tell you what its
Internet address is because I don't want anyone messing with it. I just want to
mess with other people's computers with it, muhahaha. That's also why I always
keep my Internet address from showing up in the headers of my emails.
***************
Newbie note: What is all this about headers? It's stuff at the beginning of an
email that may - or may not - tell you a lot about where it came from and when.
To see full headers, in Outlook click view -> full headers. In Eudora, click the
"Blah blah blah" icon.
****************
Want a computer you can telnet into and mess around with, and not get into
trouble no matter what you do to it? I've set up my techbroker.com
(206.61.52.33) with user xyz, password guest for you to play with. Here's how to
forge email to xyz@techbroker.com using telnet. Start with the command:
C:\>telnet techbroker.com 25
Connecting To Techbroker.com
220
Now you type in who you want the message to appear to come from:
helo santa@techbroker.com
Techbroker.com will answer:
250
Next type in your mail from address:
mail from:santa@techbroker.com
250 Requested mail action okay, completed
Your next command:
rcpt to:xyz@techbroker.com
250 Requested mail action okay, completed
Your next command:
data
354 Start main input; end with
period between the
enter, type a period, then hit enter again. Anyhow, try typing:
This is a test.
.
250 Requested mail action okay, completed
quit
221
Connection to host lost.
Using techbroker's mail server, even if you enable full headers, the message we
just composed looks like:
Status: R
X-status: N
This is a test.
That's a pretty pathetic forged email, huh? No "from", no date. However, you can
make your headers better by using a trick with the data command. After you give
it, you can insert as many headers as you choose. The trick is easier to show
than explain:
220
helo santa@northpole.org
250
mail from:santa@northpole.com
250 Requested mail action okay, completed
rcpt to:cmeinel@techbroker.com
250 Requested mail action okay, completed
data
354 Start main input; end with
from:santa@deer.northpole.org
Date: Mon, 21 Oct 2002 10:09:16 -0500
Subject: Rudolf
This is a Santa test.
.
250 Requested mail action okay, completed
quit
221
Connection to host lost.
The message then looks like:
from:santa@deer.northpole.org
Date: Mon, 21 Oct 2002 10:09:16 -0500
Subject: Rudolf
This is a Santa test.
The trick is to start each line you want in the headers with one word followed
by a colon, and the a line followed by "return". As soon as you write a line
that doesn't begin this way, the rest of what you type goes into the body of the
email.
Notice that the santa@northpole.com from the "mail from:" command didn't show up
in the header. Some mail servers would show both "from" addresses.
You can forge email on techbroker.com within one strict limitation. Your email
has to go to someone at techbroker.com. If you can find any way to send email to
someone outside techbroker, let us know, because you will have broken our
security, muhahaha! Don't worry, you have my permission.
Next, you can read the email you forge on techbroker.com via telnet:
C:\>telnet techbroker.com 110
+OK <30961.5910984301@techbroker.com> service ready
Give this command:
user xyz
+OK user is known
Then type in this:
pass test
+OK mail drop has 2 message(s)
retr 1
+OK message follows
This is a test.
If you want to know all possible commands, give this command:
help
+OK help list follows
USER user
PASS password
STAT
LIST [message]
RETR message
DELE message
NOOP
RSET
QUIT
APOP user md5
TOP message lines
UIDL [message]
HELP
Unless you use a weird online provider like AOL, you can use these same tricks
to send and receive your own email. Or you can forge email to a friend by
telnetting to his or her online provider's email sending computer(s).
With most online providers you need to get the exact name of their email
computer(s). Often it is simply mail.targetcomputer.com (substitute the name of
the online provider for targetcomputer). If this doesn't work, you can find out
the name of their email server with the DOS nslookup program, which only runs
from cmd.exe. Here's an example:
C:\ >nslookup
Default Server: DNS1.wurld.net
Address: 206.61.52.11
> set q=mx
> dimensional.com
Server: DNS1.wurld.net
Address: 206.61.52.11
dimensional.com MX preference = 5, mail exchanger =
mail.dimensional.com
dimensional.com MX preference = 10, mail exchanger =
mx2.dimensional.com
dimensional.com MX preference = 20, mail exchanger =
mx3.dimensional.com
dimensional.com nameserver = ns.dimensional.com
dimensional.com nameserver = ns-1.dimensional.com
dimensional.com nameserver = ns-2.dimensional.com
dimensional.com nameserver = ns-3.dimensional.com
dimensional.com nameserver = ns-4.dimensional.com
mail.dimensional.com internet address = 206.124.0.11
mx2.dimensional.com internet address = 206.124.0.30
mx3.dimensional.com internet address = 209.98.32.54
ns.dimensional.com internet address = 206.124.0.10
ns.dimensional.com internet address = 206.124.26.254
ns.dimensional.com internet address = 206.124.0.254
ns.dimensional.com internet address = 206.124.1.254
ns.dimensional.com internet address = 209.98.32.54
ns.dimensional.com internet address = 206.124.0.32
ns.dimensional.com internet address = 206.124.0.30
ns.dimensional.com internet address = 206.124.0.25
ns.dimensional.com internet address = 206.124.0.15
ns.dimensional.com internet address = 206.124.0.21
ns.dimensional.com internet address = 206.124.0.9
ns-1.dimensional.com internet address = 206.124.26.254
ns-2.dimensional.com internet address = 209.98.32.54
ns-3.dimensional.com internet address = 206.124.1.254
ns-4.dimensional.com internet address = 206.124.0.254
>
The lines that tell you what computers will let you forge email to people with
@dimensional.com addresses are:
dimensional.com MX preference = 5, mail exchanger =
mail.dimensional.com
dimensional.com MX preference = 10, mail exchanger =
mx2.dimensional.com
dimensional.com MX preference = 20, mail exchanger =
mx3.dimensional.com
MX stands for mail exchange. The lower the preference number, the more they
would like you to use that address for email.If that lowest number server is too
busy, then try another server.
Sometimes when you ask about a mail server, nslookup will give you this kind of
error message:
DNS request timed out.
timeout was 2 seconds.
DNS request timed out.
timeout was 2 seconds.
*** Request to [207.217.120.202] timed-out
To get around this problem, you need to find out what are the domain servers for
your target online provider. A good place to start looking is
http://netsol.com/cgi-bin/whois/whois . If this doesn't work, see
http://happyhacker.org/HHA/fightback.shtml for how to find the domain servers
for any Internet address.
****************
Newbie note: A domain name server provides information on the names and numbers
assigned to computers on the Internet. For example, dns1.wurld.net and
dns2.wurld.net contain information on happyhacker.org, techbroker.com,
securitynewsportal.com, thirdpig.com and sage-inc.com. When you query
dns1.wurld.net about other computers, it might have to go hunting for that
information from other name servers. That's why you might get a timed out
failure.
***************
Once you know the domain servers for an online service, set one of them for the
server for your nslookup program. Here's how you do it:
C:\ >nslookup
Default Server: DNS1.wurld.net
Address: 206.61.52.11
Now give the command:
> server 207.217.126.41
Default Server: ns1.earthlink.net
Address: 207.217.126.41
Next command should be:
> set q=mx
> earthlink.net
Server: ns1.earthlink.net
Address: 207.217.126.41
earthlink.net MX preference = 5, mail exchanger = mx04.earthlink.net
earthlink.net MX preference = 5, mail exchanger = mx05.earthlink.net
earthlink.net MX preference = 5, mail exchanger = mx06.earthlink.net
earthlink.net MX preference = 5, mail exchanger = mx00.earthlink.net
earthlink.net MX preference = 5, mail exchanger = mx01.earthlink.net
earthlink.net MX preference = 5, mail exchanger = mx02.earthlink.net
earthlink.net MX preference = 5, mail exchanger = mx03.earthlink.net
earthlink.net nameserver = ns3.earthlink.net
earthlink.net nameserver = ns1.earthlink.net
earthlink.net nameserver = ns2.earthlink.net
mx00.earthlink.net internet address = 207.217.120.28
mx01.earthlink.net internet address = 207.217.120.29
mx02.earthlink.net internet address = 207.217.120.79
mx03.earthlink.net internet address = 207.217.120.78
mx04.earthlink.net internet address = 207.217.120.249
mx05.earthlink.net internet address = 207.217.120.31
mx06.earthlink.net internet address = 207.217.120.23
ns1.earthlink.net internet address = 207.217.126.41
ns2.earthlink.net internet address = 207.217.77.42
ns3.earthlink.net internet address = 207.217.120.43
>
Your own online service will usually not mind and may even be glad if you use
telnet to read your email. Sometimes a malicious person or faulty email program
will send you a message that is so screwed up that your email program can't
download it. With telnet you can manually delete the bad email. Otherwise tech
support has to do it for you.
If you think about it, this ability to forge email is a huge temptation to
spammers. How can your online provider keep the bad guys from filling up a
victim's email box with garbage? The first time a bad guy tries this, probably
nothing will stop him or her. The second time the online provider might block
the bad guy at the firewall, maybe call the bad guy's online provider and kick
him or her and maybe get the bad guy busted or sued.
**************
You can go to jail warning: Sending hundreds or thousands of junk emails to bomb
someone's email account is a felony in the US.
***************
***************
You can get sued warning: Spamming, where you send only one email to each
person, but send thousands or millions of emails, is borderline legal. However,
spammers have been successfully sued when they forge the email addresses of
innocent people as senders of their spam.
****************
Now that you know how to read and write email with telnet, you definitely have
something you can use to show off with. Happy hacking!
Oh, here's one last goodie for advanced users. Get netcat for Windows. It's a
free program written by Weld Pond and Hobbit, and available from many sites, for
example
http://www.atstake.com/research/tools/#network_utilities . It is basically
telnet on steroids. For example, using netcat, you can set up a port on your
Windows computer to allow people to telnet into a DOS shell by using this
command:
C:\>nc -L -p 5000 -t -e cmd.exe
You can specify a different port number than 5000. Just make sure it doesn't
conflict with another port by checking with the netstat command. Then you and
your friends, enemies and random losers can either telnet in or netcat in with
the command:
C:\>nc -v [ipaddress of target] [port]
Of course you will probably get hacked for setting up this port. However, if you
set up a sniffer to keep track of the action, you can turn this scary back door
into a fascinating honeypot. For example, you could run it on port 23 and watch
all the hackers who attack with telnet hoping to log in. With some programming
you could even fake a unix-like login sequence and play some tricks on your
attackers.
Jun 18, 2008
ORKUT HACKING TIPS-1
---> TO SEE LOCKED FOTOS
javascript:alert("Wait for few seconds for pic`s to load......");nb=document.all[0].innerHTML.match(/[0-9]*.jpg\)/g);nb=parseInt(nb);document.body.innerHTML="ALBUM HACK
by 9Eleven™";for(i=1;i<=100;i++){document.body.innerHTML+='
';};void(0)
just copy the above code to the address bar and hit enter
--> TO VIEW CHAT ROOM IN SCRAPBOOK:
copy and paste it in ur scrapbook
--> Unlimited Photos at Orkut
Orkut is the most popular social networking website, next only to myspace. In the orkut
profile the user can only upload 12 photos. But now you can show unlimited number of
photos using the Flickr RSS Feed option. However you can do so also with the
feed of Picasa. Actually this method can be used for any
image hosting service which supports RSS photo-feed.
The process if very simple ::
• In your orkut profile, on the left site, click on “edit feedsâ€�.
• Now you will find a URL box, in which you have to enter the address of the RSS feed of your image hosting service like Flickr, Picasa etc.
• Make and find yours on your flickr home page.
• On Submitting and verifying the code, you will find your snaps on orkut.
If you find any problem while doing this then do leave a comment here, I will try to help you.
javascript:alert("Wait for few seconds for pic`s to load......");nb=document.all[0].innerHTML.match(/[0-9]*.jpg\)/g);nb=parseInt(nb);document.body.innerHTML="
by 9Eleven™";for(i=1;i<=100;i++){document.body.innerHTML+='
';};void(0)
just copy the above code to the address bar and hit enter
--> TO VIEW CHAT ROOM IN SCRAPBOOK:
copy and paste it in ur scrapbook
--> Unlimited Photos at Orkut
Orkut is the most popular social networking website, next only to myspace. In the orkut
profile the user can only upload 12 photos. But now you can show unlimited number of
photos using the Flickr RSS Feed option. However you can do so also with the
feed of Picasa. Actually this method can be used for any
image hosting service which supports RSS photo-feed.
The process if very simple ::
• In your orkut profile, on the left site, click on “edit feedsâ€�.
• Now you will find a URL box, in which you have to enter the address of the RSS feed of your image hosting service like Flickr, Picasa etc.
• Make and find yours on your flickr home page.
• On Submitting and verifying the code, you will find your snaps on orkut.
If you find any problem while doing this then do leave a comment here, I will try to help you.
Mobile Cheat Stuff
::::: FOR MOBILE ONLY NOKIA :::::
1 Imagine ur cell battery is very low, u r expecting an important call and u don't have a charger.
Nokia instrument comes with a reserve battery. To activate, key is "*3370#"
Ur cell will restart with this reserve and ur instrument will show a 50% incerase in battery.
This reserve will get charged when u charge ur cell next time.
*3370# Activate Enhanced Full Rate Codec (EFR)-Your phone uses the best sound quality but talk time is reduced by approx. 5%
#3370# Deactivate Enhanced Full Rate Codec( EFR)
*#4720# Activate Half Rate Codec - Your phone uses a lower quality sound
but you should gain approx 30% more Talk Time
*#4720# Deactivate Half Rate Codec
2 *#0000# Displays your phones software version,
1st Line :S oftware Version,
2nd Line : Software Release Date,
3rd Line : Compression Type
3 *#9999# Phones software v ersion if *#0000# does not work
4 *#06# For checking the International Mobile Equipment Identity (IMEI Number)
5 #pw+1234567890+1# Provider Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)
6 #pw+1234567890+2# Network Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)
7 #pw+1234567890+3# Country Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)
8 #pw+1234567890+4# SIM Card Lock Status.(use the "*" button to obtain the "p,w" and "+" symbols)
9 *#147# (vodafone) this lets you know who called you last *#1471# Last call (Only vodofone)
10 *#21# Allows you to check the number that "All Calls" are diverted To
11 *#2640# Displays security code in use
12 *#30# Lets you see the private number
13 *#43# Allows you to check the "Call Waiting" status of your phone.
14 *#61# Allows you to check the number that "On No Reply" calls are diverted to
15 *#62# Allows you to check the number that "Divert If Unrea chable(no service)" calls are diverted to
16 *#67# Allows you to check the number that "On Busy Calls" are diverted to
17 *#67705646#R emoves operator logo on 3310 & 3330
18 *#73# Reset phone timers and game scores
19 *#746025625# Displays the SIM Clock status, if your phone supports this power saving feature "SIM Clock Stop Allowed", it
means you will get the best standby time possible
20 *#7760# Manufactures code
21 *#7780# Restore factory settings
22 *#8110# Software version for the nokia 8110
23 *#92702689# (to rember *#WAR0ANTY#)
Displays -
1.Serial Number,
2.Date Made
3.Purchase Date,
4.Date of last repair (0000 for no repairs),
5.Transfer User Data.
To exit this mode -you need to switch your phone off then on again
24 *#94870345123456789# Deactivate the PWM-Mem
25 **21*number# Turn on "All Calls" diverting to the phone number entered
26 **61*number# Turn on "No Reply" diverting to the phone number entered
27 **67*number# Turn on "On Busy" diverting to the phone number entered
Each command is prefixed with either one or two * or # characters as follows:
** Register and Activate
* Activate
## De-Register (and Deactivate)
# Deactivate
*# Check Status
© Call button
Once each command has been entered, if it is a network command (as opposed to a local handset command) it must be transmitted to the network by pressing the YES (receiver) key which acts as an enter key - this is represented here with the © character. Always enter numbers in full international format +CountryAreaNumber ( e.g. +447712345678).
Command Description Command String
Security
Change call barring code **03*OldCode*NewCode*NewCode#©
Change call barring code **03*330*OldCode*NewCode*NewCode#©
Change PIN code **04*OldPIN*NewPIN*NewPIN#©
Change PIN2 code **042*OldPIN2*NewPIN2*NewPIN2#©
Unlock PIN code (when PIN is entered wrong 3 times) **05*PUK*NewPIN*NewPIN#©
Unlock PIN2 code (when PIN2 is entered wrong 3 times) **052*PUK2*NewPIN2*NewPIN2#©
Display IMEI *#06#
Call Forwarding (Diversions)
De-register all call diversions ##002#©
Set all configured call diversions to number and activate **004*number#©
De-register all configured call diversions (no answer, not reachable, busy) ##004#©
Unconditionally divert all calls to number and activate **21*number#©
Activate unconditionally divert all calls *21#©
De-register unconditionally divert all calls ##21#©
Deactivate unconditionally divert all calls #21#©
Check status of unconditionally divert all calls *#21#©
Divert on no answer to number and activate **61*number#©
Activate divert on no answer *61#©
De-register divert on no answer ##61#©
Deactivate divert on no answer #61#©
Check status of divert on no answer *#61#©
Divert on not reachable to number and activate **62*number#©
Activate divert on not reachable *62#©
De-register divert on not reachable ##62#©
Deactivate divert on not reachable #62#©
Check status of divert on not reachable *#62#©
Divert on busy to number and activate /td> **67*number#©<
Activate divert on busy *67#©
De-register divert on busy ##67#©
Deactivate divert on busy #67#©
Check status of divert on busy *#67#©
Change number of seconds of ringing for the given service before diverting a call (such as on no answer). Seconds must be a value from 5 to 30. De-registering the same divert will also delete this change! **service*number**seconds#© (Service numbers, see below)
Call barring
Activate barr all outgoing calls (see Security to set code) **33*code#©
Deactivate barr all outgoing calls #33*code#©
Check status of barr all outgoing calls *#33#©
Activate barr all calls **330*code#©
Deactivate barr all calls #330*code#©
Check status of barr all calls /td> *#330*code#©<
Activate barr all outgoing international calls **331*code#©
Deactivate barr all outgoing international calls #331*code#©
Check status of barr all outgoing international calls *#331#©
Activate barr all outgoing international calls except to home country **332*code#©
Deactivate barr all outgoing international calls except to home country #332*code#©
Check status of barr all outgoing international calls except to home country *#332#©
Activate barr all outgoing calls **333*code#©
Deactivate barr all outgoing calls #333*code#©
Check status of barr all outgoing calls *#333#©
Activate barr all incoming calls **35*code#©
Deactivate barr all incoming calls #35*code#©
Check status of barr all incoming calls *#35#©
Activate barr all incoming calls when roaming **351*code#©
Deactivate barr all incoming calls when roaming #351*code#©
Check status of barr all incoming calls when roaming *#351#©
Activate barr all incoming calls **353*code#©
Deactivate barr all incoming calls #353*code#©
Check status of barr all incoming calls *#353#©
Call waiting
Activate call waiting *43*#©
Deactivate call waiting #43##©
Check status of call waiting *#43#©
Calling Line Identification
The following only works if CLIP and CLIR are enabled (ask your service provider)
CLIP: Presentation of the number of the incoming call
Activate CLIP **30#©
Deactivate CLIP ##30#©
Check status of CLIP *#30#©
CLIR: Presentation of one's own number to the to the called party
Activate CLIR **31#©
Activate CLIR for the actual call *31#number©
Deactivate CLIR ##31#©
Deactivate CLIR for the actual call #31#number©
Check status of CLIR *#31#©
COLP: Presentation of the actual number reached (if number called was diverted to another number
Activate COLP *76#©
Deactivate COLP #76#©
Check status of COLP *#76#©
COLR: Presentation of the original number called by the calling party (if the call was diverted to this cellphone)
Activate COLR *77#©
Deactivate COLR #77#©
Check status of COLR *#77#©
1 Imagine ur cell battery is very low, u r expecting an important call and u don't have a charger.
Nokia instrument comes with a reserve battery. To activate, key is "*3370#"
Ur cell will restart with this reserve and ur instrument will show a 50% incerase in battery.
This reserve will get charged when u charge ur cell next time.
*3370# Activate Enhanced Full Rate Codec (EFR)-Your phone uses the best sound quality but talk time is reduced by approx. 5%
#3370# Deactivate Enhanced Full Rate Codec( EFR)
*#4720# Activate Half Rate Codec - Your phone uses a lower quality sound
but you should gain approx 30% more Talk Time
*#4720# Deactivate Half Rate Codec
2 *#0000# Displays your phones software version,
1st Line :S oftware Version,
2nd Line : Software Release Date,
3rd Line : Compression Type
3 *#9999# Phones software v ersion if *#0000# does not work
4 *#06# For checking the International Mobile Equipment Identity (IMEI Number)
5 #pw+1234567890+1# Provider Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)
6 #pw+1234567890+2# Network Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)
7 #pw+1234567890+3# Country Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)
8 #pw+1234567890+4# SIM Card Lock Status.(use the "*" button to obtain the "p,w" and "+" symbols)
9 *#147# (vodafone) this lets you know who called you last *#1471# Last call (Only vodofone)
10 *#21# Allows you to check the number that "All Calls" are diverted To
11 *#2640# Displays security code in use
12 *#30# Lets you see the private number
13 *#43# Allows you to check the "Call Waiting" status of your phone.
14 *#61# Allows you to check the number that "On No Reply" calls are diverted to
15 *#62# Allows you to check the number that "Divert If Unrea chable(no service)" calls are diverted to
16 *#67# Allows you to check the number that "On Busy Calls" are diverted to
17 *#67705646#R emoves operator logo on 3310 & 3330
18 *#73# Reset phone timers and game scores
19 *#746025625# Displays the SIM Clock status, if your phone supports this power saving feature "SIM Clock Stop Allowed", it
means you will get the best standby time possible
20 *#7760# Manufactures code
21 *#7780# Restore factory settings
22 *#8110# Software version for the nokia 8110
23 *#92702689# (to rember *#WAR0ANTY#)
Displays -
1.Serial Number,
2.Date Made
3.Purchase Date,
4.Date of last repair (0000 for no repairs),
5.Transfer User Data.
To exit this mode -you need to switch your phone off then on again
24 *#94870345123456789# Deactivate the PWM-Mem
25 **21*number# Turn on "All Calls" diverting to the phone number entered
26 **61*number# Turn on "No Reply" diverting to the phone number entered
27 **67*number# Turn on "On Busy" diverting to the phone number entered
Each command is prefixed with either one or two * or # characters as follows:
** Register and Activate
* Activate
## De-Register (and Deactivate)
# Deactivate
*# Check Status
© Call button
Once each command has been entered, if it is a network command (as opposed to a local handset command) it must be transmitted to the network by pressing the YES (receiver) key which acts as an enter key - this is represented here with the © character. Always enter numbers in full international format +CountryAreaNumber ( e.g. +447712345678).
Command Description Command String
Security
Change call barring code **03*OldCode*NewCode*NewCode#©
Change call barring code **03*330*OldCode*NewCode*NewCode#©
Change PIN code **04*OldPIN*NewPIN*NewPIN#©
Change PIN2 code **042*OldPIN2*NewPIN2*NewPIN2#©
Unlock PIN code (when PIN is entered wrong 3 times) **05*PUK*NewPIN*NewPIN#©
Unlock PIN2 code (when PIN2 is entered wrong 3 times) **052*PUK2*NewPIN2*NewPIN2#©
Display IMEI *#06#
Call Forwarding (Diversions)
De-register all call diversions ##002#©
Set all configured call diversions to number and activate **004*number#©
De-register all configured call diversions (no answer, not reachable, busy) ##004#©
Unconditionally divert all calls to number and activate **21*number#©
Activate unconditionally divert all calls *21#©
De-register unconditionally divert all calls ##21#©
Deactivate unconditionally divert all calls #21#©
Check status of unconditionally divert all calls *#21#©
Divert on no answer to number and activate **61*number#©
Activate divert on no answer *61#©
De-register divert on no answer ##61#©
Deactivate divert on no answer #61#©
Check status of divert on no answer *#61#©
Divert on not reachable to number and activate **62*number#©
Activate divert on not reachable *62#©
De-register divert on not reachable ##62#©
Deactivate divert on not reachable #62#©
Check status of divert on not reachable *#62#©
Divert on busy to number and activate /td> **67*number#©<
Activate divert on busy *67#©
De-register divert on busy ##67#©
Deactivate divert on busy #67#©
Check status of divert on busy *#67#©
Change number of seconds of ringing for the given service before diverting a call (such as on no answer). Seconds must be a value from 5 to 30. De-registering the same divert will also delete this change! **service*number**seconds#© (Service numbers, see below)
Call barring
Activate barr all outgoing calls (see Security to set code) **33*code#©
Deactivate barr all outgoing calls #33*code#©
Check status of barr all outgoing calls *#33#©
Activate barr all calls **330*code#©
Deactivate barr all calls #330*code#©
Check status of barr all calls /td> *#330*code#©<
Activate barr all outgoing international calls **331*code#©
Deactivate barr all outgoing international calls #331*code#©
Check status of barr all outgoing international calls *#331#©
Activate barr all outgoing international calls except to home country **332*code#©
Deactivate barr all outgoing international calls except to home country #332*code#©
Check status of barr all outgoing international calls except to home country *#332#©
Activate barr all outgoing calls **333*code#©
Deactivate barr all outgoing calls #333*code#©
Check status of barr all outgoing calls *#333#©
Activate barr all incoming calls **35*code#©
Deactivate barr all incoming calls #35*code#©
Check status of barr all incoming calls *#35#©
Activate barr all incoming calls when roaming **351*code#©
Deactivate barr all incoming calls when roaming #351*code#©
Check status of barr all incoming calls when roaming *#351#©
Activate barr all incoming calls **353*code#©
Deactivate barr all incoming calls #353*code#©
Check status of barr all incoming calls *#353#©
Call waiting
Activate call waiting *43*#©
Deactivate call waiting #43##©
Check status of call waiting *#43#©
Calling Line Identification
The following only works if CLIP and CLIR are enabled (ask your service provider)
CLIP: Presentation of the number of the incoming call
Activate CLIP **30#©
Deactivate CLIP ##30#©
Check status of CLIP *#30#©
CLIR: Presentation of one's own number to the to the called party
Activate CLIR **31#©
Activate CLIR for the actual call *31#number©
Deactivate CLIR ##31#©
Deactivate CLIR for the actual call #31#number©
Check status of CLIR *#31#©
COLP: Presentation of the actual number reached (if number called was diverted to another number
Activate COLP *76#©
Deactivate COLP #76#©
Check status of COLP *#76#©
COLR: Presentation of the original number called by the calling party (if the call was diverted to this cellphone)
Activate COLR *77#©
Deactivate COLR #77#©
Check status of COLR *#77#©
Jun 16, 2008
ORKUT HACKING TIPS-2
--->>Trick Number Two "STAR"
Try ★ in your scrap book editor box above your Scraps and Write Your Message
Voila!! a STAR comes up Before ur Message. isnt it Cool
Drop in Your Comments Please
-->>Secret Writings in Orkut
I came across the tip some time back which will allow you to write scraps in reverse order... more like mirror image llits quite common now but Still
write this code at the beginning of the scrap without quotes
""
-->>Watch the Pictures of ur Friends in Action:
copy and paste this code in your Scrapbook's Address Bar
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.images; DIL=DI.length; function A(){for(i=0; i
-->>Blank Scrap
How to write blank scrap / blank post ?
If you like the service, please do refer your friends to use our free service by clicking HERE
For writing blank scrap, follow the steps:
1) Open any scrapbook.
2) Write [i] in the scrapbook.
3) Do NOT write anything else in the scrapbook, and submit the scrap.
That's all.
NOTE:
You can also use [b] tag instead of [i] tag
You can also use this method to post a blank entry in any community forum.
` You can try these various combinations also if u want to send a big no of invisible scraps, as after your few submissions it will start displaying the message "message sent too recently". So try these combinations out:
[u]
[b]
[i][u]
[i][b]
[u][i]
[u][b]
[u][i][b]
[i][u][b]
[i][u][b][i]
-->>Colorful Scrap
For writing multi colored scrap, follow the steps:
1) Open any scrapbook.
2) Write your message in the scrap. Do NOT click on submit.
3) Copy the following text and paste it in your address bar
javascript:cor=new Array('aqua','blue','fuchsia','gold','gray','green','lime','maroon','navy','olive','orange','pink','purple','red','silver','teal','violet', 'yellow' );var z=0;txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/(.)/gi,"§$1");txt.value=txt.value.replace(/\§ /gi," ");for(y=0;y
4) Hit ENTER key .
5) Click on Submit
n ur scrap is now multicoloured
-----How to make your name invisible in your profile?------
For making your name invisible follow the steps:
1) Click on edit profile
2) Type ALT + 0173 in your first name and last name. (i.e. Type 0173 while pressing the ALT key of your keyboard.)
3) Click on Update
Try ★ in your scrap book editor box above your Scraps and Write Your Message
Voila!! a STAR comes up Before ur Message. isnt it Cool
Drop in Your Comments Please
-->>Secret Writings in Orkut
I came across the tip some time back which will allow you to write scraps in reverse order... more like mirror image llits quite common now but Still
write this code at the beginning of the scrap without quotes
""
-->>Watch the Pictures of ur Friends in Action:
copy and paste this code in your Scrapbook's Address Bar
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.images; DIL=DI.length; function A(){for(i=0; i
-->>Blank Scrap
How to write blank scrap / blank post ?
If you like the service, please do refer your friends to use our free service by clicking HERE
For writing blank scrap, follow the steps:
1) Open any scrapbook.
2) Write [i] in the scrapbook.
3) Do NOT write anything else in the scrapbook, and submit the scrap.
That's all.
NOTE:
You can also use [b] tag instead of [i] tag
You can also use this method to post a blank entry in any community forum.
` You can try these various combinations also if u want to send a big no of invisible scraps, as after your few submissions it will start displaying the message "message sent too recently". So try these combinations out:
[u]
[b]
[i][u]
[i][b]
[u][i]
[u][b]
[u][i][b]
[i][u][b]
[i][u][b][i]
-->>Colorful Scrap
For writing multi colored scrap, follow the steps:
1) Open any scrapbook.
2) Write your message in the scrap. Do NOT click on submit.
3) Copy the following text and paste it in your address bar
javascript:cor=new Array('aqua','blue','fuchsia','gold','gray','green','lime','maroon','navy','olive','orange','pink','purple','red','silver','teal','violet', 'yellow' );var z=0;txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/(.)/gi,"§$1");txt.value=txt.value.replace(/\§ /gi," ");for(y=0;y
4) Hit ENTER key .
5) Click on Submit
n ur scrap is now multicoloured
-----How to make your name invisible in your profile?------
For making your name invisible follow the steps:
1) Click on edit profile
2) Type ALT + 0173 in your first name and last name. (i.e. Type 0173 while pressing the ALT key of your keyboard.)
3) Click on Update
G.D. Topics For MBA-2008
****** GD Topics ****
• Is China a threat to the Indian software industry.
• Role of UN in peacekeeping.
• Position of Women in India compared to other nations.
• Environment Management.
• Is China better than India in software.
• Govt contribution to IT
• is china a threat to Indian industry
• India or west , which is the land of opportunities
• water resources should be nationalised
• "BALANCE BETWEEN PROFESSIONALISM AND FAMILY"
• Effect of cinema on Youth
• Education in India compared to Foreign nations
• What is the effect of movies on youth. is it good or bad)
• Are studies more beneficial in India or in Abroad.
• "UN's peace activities" and "America's war on Iraq".
• "Environment-Whose Responsibility".
• US war on iraq-justified or not.
• Role of UN in Peace keeping
• War on Iraq
• About Hockey being the primary game in India.
• Can America occupy Iraq
• IS CHINA A THREAT TO INDIA
• Present state of Indian Cricket team
• Advantages of Co-education.
• How to deal with international terrorism.
• Should we pursue our policy of dialogue with Pakistan?
• Is peace and non-violence outdated concepts?
• A Unipolar World spells disaster for underdeveloped countries like India.
• Is Globalization Really Necessary?
• What shall we do about our ever-increasing Population?
• Corruption is the price we pay for Democracy.
• Foreign Television Channels are destroying our culture.
• What India needs is a Dictatorship.
• With media publishing and telecasting trivia, censorship is the need of the hour.
• Kaun Banega Krorepati is less about knowledge but more about money and personality.
• Beauty contests degrade womanhood
• The rise of regional blocs threatens independent nations like India
• Six billion and one bronze!
• Is dependence on computers a good thing?
• Should the public sector be privatised?
• China and India are similar nations with contrasting ways
• Is India a Soft Nation?
• Value based politics is the need of the hour
• Religion should not be mixed with politics
• How to deal with high oil prices
• Our cricketers are not to blame for match fixing
• Why cant we be world players in industry as we are in software?
• Multinational corporations: Are they devils in disguise?
• Should there be limits on artistic freedom (the controversy on Fire).
• Should there be private universities?
• Does banning fashion shows and New Year parties save our culture?
• Public sector is more a hindrance than help to promote socialism.
• Economic betterment of the poorer nations is as important as disarmament to ensure lasting world peace.
• From public sector to privatization as in the U.K., is the right answer for India's instant economic breakthrough.
• The doctrine of "limited nuclear war" is an ill-convinced, ill- logical, irrational and extremely dangerous concept.
• Some simple but effective electoral reforms will enable us to retain the present parliamentary system and ensure the preservation of democracy in India.
• Nuclear war cannot be won and should not be fought.
• Private enterprise and not public sector will contribute to faster and higher economic growth in India
• Inflation is inevitable in our developing country.
• The policy of reservation is a legacy of the British and it has done more harm than good.
• For a marketing post graduate, without prior work experience working in a big marketing firm is a disadvantage when compared with working in a small firm. Discuss.
• Consumerism is destroying the social fabric of Indian culture
• Free market is a prerequisite for growth.
• Cricket as a national obsession is a detriment to other sports.
• To develop India has to empower women.
• .Formulate the government's health policy to control the spread of AIDS.
• Advertising is a waste of resources.
• Privatization will lead to less corruption.
• State is the biggest violator of human rights.
• There can never be a classless society.
• Beauty pageants are a marketing gimmick.
• Voting rights to illiterates in India is illogical because it is widely misused.
• Joint family is a blessing in disguise
• Higher education should be made possible only for those who can pay for it.
• Women cannot successfully combine both career and home
• Women are good managers.
• Executive should be allowed to form unions.
• Effect of liberalization on poverty.
• Indians perform better as individuals rather than in groups.
• Business and ethics go hand in hand, or do they?
• Developing countries should spend more on development than on defense.
• Political parties have outlived their utility.
• Is Swadeshi relevant for India today?
• Money is required to earn more money.
• Foreign trade is necessary for any country to survive
• Presidential Vs Parliamentary form of government of India.
• Technology: The Ism' Of The New Millennium?
• Religion And Politics Should Not Mix
• TRIPS Controversy And The Patent Act Amendment
• Should India Sign The CTBT
• State Interventions In Market Kind Or Mixed Economy
• Science Is A Boon Or Bane
• Is Swapping Terrorists For Hostages An Encouragement For Plane- Hijackers?
• Nice Guys Finish Last
• All Work And No Play Makes Jack A Dull Boy
• Individual Freedom And Civil Society
• Conventionalism And Modernity: The Ever going Debate
• Should There Be A Restriction On Permissiveness Being propagated by The MTV Culture And Foreign Media?
• Marxism And Its Future All Over The World
• The Growing Menace Of Casteism And Regionalism
• Presidential Form Of Government Is Needed In India
• Bullet For Bullet: Is It The Right Policy?
• Capitation Fees Should Be Abolished
• Brain-Drain Has To Be Stopped
• Business And Ethics Can't / Don't Go Together
• Are women As good as Men Or Inferior?
• Nothing Succeeds Like Success
• The Malthusian Economic Prophecy Is No Longer Relevant
• Secessionism In The North-East: Who's To Blame?
• Should India Break Diplomatic Ties With Pakistan?
• Age and Youth: Experience And Young Talent
• East Is East & West Is Where All The Action Is': Mark Twain
• Freedom Of _Expression And The State Authority
General GD Topics
• US war on Iraq-justified or not.
• Role of UN in peacekeeping.
• Position of Women in India compared to other nations.
• Environment Management.
• Is China better than India in software.
• Should SONIA Gandhi be made the PM
• BPOs in INDIA
• Govt contribution to IT
• will punch lines rule the Advt
• premarital sex
• is china a threat to Indian industry
• India or west , which is the land of opportunities
• water resources should be nationalized
• "BALANCE BETWEEN PROFESSIONALISM AND FAMILY"
• Effect of cinema on Youth
• Education in India compared to Foreign nations
• Is it necessary to ban COCO COLA in India.
• What is the effect of movies on youth. is it good or bad)
• Are studies more beneficial in India or in Abroad.
• "UN's peace activities" and "America's war on Iraq".
• "Environment-Whose Responsibility".
• Is China a threat to the Indian software industry.
• Role of UN in Peace keeping
• War on Iraq
• About Hockey being the primary game in India
• Can America occupy Iraq
• Cricket should be banned or not.
• IS CHINA A THREAT TO INDIA
• Present state of Indian Cricket team.
• Love marriage/Arranged marriage.
• Advantages of Co-education.
• How to deal with international terrorism.
• Should we pursue our policy of dialogue with Pakistan?
• Is peace and non-violence outdated concepts
• Is China a threat to the Indian software industry.
• Role of UN in peacekeeping.
• Position of Women in India compared to other nations.
• Environment Management.
• Is China better than India in software.
• Govt contribution to IT
• is china a threat to Indian industry
• India or west , which is the land of opportunities
• water resources should be nationalised
• "BALANCE BETWEEN PROFESSIONALISM AND FAMILY"
• Effect of cinema on Youth
• Education in India compared to Foreign nations
• What is the effect of movies on youth. is it good or bad)
• Are studies more beneficial in India or in Abroad.
• "UN's peace activities" and "America's war on Iraq".
• "Environment-Whose Responsibility".
• US war on iraq-justified or not.
• Role of UN in Peace keeping
• War on Iraq
• About Hockey being the primary game in India.
• Can America occupy Iraq
• IS CHINA A THREAT TO INDIA
• Present state of Indian Cricket team
• Advantages of Co-education.
• How to deal with international terrorism.
• Should we pursue our policy of dialogue with Pakistan?
• Is peace and non-violence outdated concepts?
• A Unipolar World spells disaster for underdeveloped countries like India.
• Is Globalization Really Necessary?
• What shall we do about our ever-increasing Population?
• Corruption is the price we pay for Democracy.
• Foreign Television Channels are destroying our culture.
• What India needs is a Dictatorship.
• With media publishing and telecasting trivia, censorship is the need of the hour.
• Kaun Banega Krorepati is less about knowledge but more about money and personality.
• Beauty contests degrade womanhood
• The rise of regional blocs threatens independent nations like India
• Six billion and one bronze!
• Is dependence on computers a good thing?
• Should the public sector be privatised?
• China and India are similar nations with contrasting ways
• Is India a Soft Nation?
• Value based politics is the need of the hour
• Religion should not be mixed with politics
• How to deal with high oil prices
• Our cricketers are not to blame for match fixing
• Why cant we be world players in industry as we are in software?
• Multinational corporations: Are they devils in disguise?
• Should there be limits on artistic freedom (the controversy on Fire).
• Should there be private universities?
• Does banning fashion shows and New Year parties save our culture?
• Public sector is more a hindrance than help to promote socialism.
• Economic betterment of the poorer nations is as important as disarmament to ensure lasting world peace.
• From public sector to privatization as in the U.K., is the right answer for India's instant economic breakthrough.
• The doctrine of "limited nuclear war" is an ill-convinced, ill- logical, irrational and extremely dangerous concept.
• Some simple but effective electoral reforms will enable us to retain the present parliamentary system and ensure the preservation of democracy in India.
• Nuclear war cannot be won and should not be fought.
• Private enterprise and not public sector will contribute to faster and higher economic growth in India
• Inflation is inevitable in our developing country.
• The policy of reservation is a legacy of the British and it has done more harm than good.
• For a marketing post graduate, without prior work experience working in a big marketing firm is a disadvantage when compared with working in a small firm. Discuss.
• Consumerism is destroying the social fabric of Indian culture
• Free market is a prerequisite for growth.
• Cricket as a national obsession is a detriment to other sports.
• To develop India has to empower women.
• .Formulate the government's health policy to control the spread of AIDS.
• Advertising is a waste of resources.
• Privatization will lead to less corruption.
• State is the biggest violator of human rights.
• There can never be a classless society.
• Beauty pageants are a marketing gimmick.
• Voting rights to illiterates in India is illogical because it is widely misused.
• Joint family is a blessing in disguise
• Higher education should be made possible only for those who can pay for it.
• Women cannot successfully combine both career and home
• Women are good managers.
• Executive should be allowed to form unions.
• Effect of liberalization on poverty.
• Indians perform better as individuals rather than in groups.
• Business and ethics go hand in hand, or do they?
• Developing countries should spend more on development than on defense.
• Political parties have outlived their utility.
• Is Swadeshi relevant for India today?
• Money is required to earn more money.
• Foreign trade is necessary for any country to survive
• Presidential Vs Parliamentary form of government of India.
• Technology: The Ism' Of The New Millennium?
• Religion And Politics Should Not Mix
• TRIPS Controversy And The Patent Act Amendment
• Should India Sign The CTBT
• State Interventions In Market Kind Or Mixed Economy
• Science Is A Boon Or Bane
• Is Swapping Terrorists For Hostages An Encouragement For Plane- Hijackers?
• Nice Guys Finish Last
• All Work And No Play Makes Jack A Dull Boy
• Individual Freedom And Civil Society
• Conventionalism And Modernity: The Ever going Debate
• Should There Be A Restriction On Permissiveness Being propagated by The MTV Culture And Foreign Media?
• Marxism And Its Future All Over The World
• The Growing Menace Of Casteism And Regionalism
• Presidential Form Of Government Is Needed In India
• Bullet For Bullet: Is It The Right Policy?
• Capitation Fees Should Be Abolished
• Brain-Drain Has To Be Stopped
• Business And Ethics Can't / Don't Go Together
• Are women As good as Men Or Inferior?
• Nothing Succeeds Like Success
• The Malthusian Economic Prophecy Is No Longer Relevant
• Secessionism In The North-East: Who's To Blame?
• Should India Break Diplomatic Ties With Pakistan?
• Age and Youth: Experience And Young Talent
• East Is East & West Is Where All The Action Is': Mark Twain
• Freedom Of _Expression And The State Authority
General GD Topics
• US war on Iraq-justified or not.
• Role of UN in peacekeeping.
• Position of Women in India compared to other nations.
• Environment Management.
• Is China better than India in software.
• Should SONIA Gandhi be made the PM
• BPOs in INDIA
• Govt contribution to IT
• will punch lines rule the Advt
• premarital sex
• is china a threat to Indian industry
• India or west , which is the land of opportunities
• water resources should be nationalized
• "BALANCE BETWEEN PROFESSIONALISM AND FAMILY"
• Effect of cinema on Youth
• Education in India compared to Foreign nations
• Is it necessary to ban COCO COLA in India.
• What is the effect of movies on youth. is it good or bad)
• Are studies more beneficial in India or in Abroad.
• "UN's peace activities" and "America's war on Iraq".
• "Environment-Whose Responsibility".
• Is China a threat to the Indian software industry.
• Role of UN in Peace keeping
• War on Iraq
• About Hockey being the primary game in India
• Can America occupy Iraq
• Cricket should be banned or not.
• IS CHINA A THREAT TO INDIA
• Present state of Indian Cricket team.
• Love marriage/Arranged marriage.
• Advantages of Co-education.
• How to deal with international terrorism.
• Should we pursue our policy of dialogue with Pakistan?
• Is peace and non-violence outdated concepts
Jun 14, 2008
SMS SHORT CODE
HERE I HAVE TRIED TO PUT ALMOST ALL THE CODES WHICH WE ARE USING WHILE SENDING AN SMS, THESE ARE VERY USEFUL WHILE MESSAGE IS VERY LONG OR MORE THAN 160 CHARACTER. USE THIS CODE AND ENJOY EASY SMSING..................................
1dRfl - wonderful
2 - to/too/two
2dA - today
2moro - tomorrow
2nite - tonite
3dom - freedom
4 - for
4get - forget
4N - foreign
ADN - any day now
AFAIK - as far as I know
AFAIR - as far as I recall
ASAP - as soon as possible
ATM - at the moment
B - be
B4 - before
B4N - bye for now
BB - bye-bye
Bf -boyfriend
BG - big grin
BION - believe it or not
BK - big kiss
BTDT - been there, done that
BTW - by the way
By - busy
C - see/sea
CB - call back
CUL - see you later
CWYL - chat with you later
DUZ - does
DUZNT - doesn't
F2F - free to talk?
G2G - got to go
Gf - girlfried
Gr8 - great
Grr - angry
H2 - how to
HUH - have you heard?
IC - I see
ICCL - I couldn't care less
IK - I know
ILU (or ILY) - I love you
in4ml - informal
KISS - keep it simple, stupid
KUTGW - keep up the good work
@ "At"
MSG "Message"
W "With"
ATB "All the best"
NE "Any"
W/O "Without"
B "Be, Bee"
NETHNG "Anything"
WKND "Weekend"
BCNU "I'll be seeing you"
NE1 "Anyone"
XLNT "Excellent"
BWD "Backward"
NO1 "No-one"
XOXOX "Hugs and kisses"
B4 "Before"
OIC "Oh, I see"
YR "Your"
C "See, Sea"
PCM "Please call me"
1 "One, Won"
CU "See you"
PLS "Please"
2 "Too, To, Two"
DOIN "Doing"
PPL "People"
Original smiley
:-) Classic smiley
;-) Wink
:-)) Very happy
|-) Hee-hee
:-D Laugh loud
:-o Amazement
:^D" Great! I like it!
:-* Kiss
<3 I love you
:-s Confusion
{} No comment
:-C Totally unbelievable
:-X Big wet kiss
:-9 Licking lips
%-) Confused
*:* Fuzzy face
:-@ Screaming
:-7 Wry remark
:-p Sticking out tongue
:-( Frown
:> Develish grin
(:-|K- Dressed to kill
:-|| Angry
::=)) Seeing double
:-> Hey
|:-0 No explanation
#:-) Hair in a mess
>;-(' I am spitting mad
#-) Partied all night
:-| Hmmm
:-& Tongue-tied
L8 - late
L8r - later
LMK - let me know
M8 - mate
MOF - matter of fact
MT - empty
MTE - my thoughts exactly
NAGI - not a good idea
Ne - any
Ne1 - anyone
No1 - no one
nrg - energy
OIC - Oh I see
OK - okay
ONNA - oh no, not again!
OTT- over the top
PCM - please call me
Pls - please
Ppl - people
PTL - praise the Lord
R - are
Re - regarding
RUOK - are you okay?
Spk - speak
Sry - sorry
SWAK - sealed with a kiss
THX - thanks
TTYL - talk to you later
TXT - text
U - you
U@ - you at? (where are you?)
UOK - you okay?
UR - your/you're
Usu - usually
W8 - wait
W84M - wait for me
W/ - with
Wan2 - want to
wn - when
WMF - works for me
XLNT - excellent
Y - why
YM - you mean
YR - yeah, right
GONNA "Going to"
SUM1 "Someone"
3SUM "Threesome"
GR8 "Great"
STRA "Stray"
4 "For, Four"
H8 "Hate"
THNQ "Thank you"
:-) "I'm happy"
L8 "Late"
THX "Thanks"
:-o "I'm surprised"
L8R "Later"
U "You"
:-( "Sad face"
LUV "Love"
UR "You are "
d
"Baseball cap "
MOB "Mobile"
WAN2 "Want to?"
;-/ "Confused"
2DAY "Today"
F2T "Free to talk"
RUOK "Are you okay?"
2MORO "Tomorrow"
FWD "Forward"
RGDS "Regards"
(:-... Heart-broken
%-) I'm tipsy but happy
#:-o Oh no!
:-# My lips are sealed
8-) Sender wears glasses
:+( I'm hurt by that
:*)? Are you drunk?
<:-0 Eeek!
:-e I'm disappointed
(-: Sender is left-handed
<:-) Dumb question
~o~ Bird
:@ Ouch!
:-(*) Sick comment
(:-) Bald
:// Frustrated
:3-< Dog
d:-) Hats off to your great idea
:-$ Put your money where your mouth is
:-{) Sender has moustache
|-| Going to sleep
:@) Pig
\o/ Praise the Lord
*<
) Clown
:-{)} Sender has moustache & beard
:=8) Baboon
8^ Chicken
~#:-( Bad hair day
:'-( I am crying
:*) I' tipsy
:-o Oh
O:-) Innocent
&:-) Sender has curly hair
enjoy and keep sms
1dRfl - wonderful
2 - to/too/two
2dA - today
2moro - tomorrow
2nite - tonite
3dom - freedom
4 - for
4get - forget
4N - foreign
ADN - any day now
AFAIK - as far as I know
AFAIR - as far as I recall
ASAP - as soon as possible
ATM - at the moment
B - be
B4 - before
B4N - bye for now
BB - bye-bye
Bf -boyfriend
BG - big grin
BION - believe it or not
BK - big kiss
BTDT - been there, done that
BTW - by the way
By - busy
C - see/sea
CB - call back
CUL - see you later
CWYL - chat with you later
DUZ - does
DUZNT - doesn't
F2F - free to talk?
G2G - got to go
Gf - girlfried
Gr8 - great
Grr - angry
H2 - how to
HUH - have you heard?
IC - I see
ICCL - I couldn't care less
IK - I know
ILU (or ILY) - I love you
in4ml - informal
KISS - keep it simple, stupid
KUTGW - keep up the good work
@ "At"
MSG "Message"
W "With"
ATB "All the best"
NE "Any"
W/O "Without"
B "Be, Bee"
NETHNG "Anything"
WKND "Weekend"
BCNU "I'll be seeing you"
NE1 "Anyone"
XLNT "Excellent"
BWD "Backward"
NO1 "No-one"
XOXOX "Hugs and kisses"
B4 "Before"
OIC "Oh, I see"
YR "Your"
C "See, Sea"
PCM "Please call me"
1 "One, Won"
CU "See you"
PLS "Please"
2 "Too, To, Two"
DOIN "Doing"
PPL "People"
Original smiley
:-) Classic smiley
;-) Wink
:-)) Very happy
|-) Hee-hee
:-D Laugh loud
:-o Amazement
:^D" Great! I like it!
:-* Kiss
<3 I love you
:-s Confusion
{} No comment
:-C Totally unbelievable
:-X Big wet kiss
:-9 Licking lips
%-) Confused
*:* Fuzzy face
:-@ Screaming
:-7 Wry remark
:-p Sticking out tongue
:-( Frown
:> Develish grin
(:-|K- Dressed to kill
:-|| Angry
::=)) Seeing double
:-> Hey
|:-0 No explanation
#:-) Hair in a mess
>;-(' I am spitting mad
#-) Partied all night
:-| Hmmm
:-& Tongue-tied
L8 - late
L8r - later
LMK - let me know
M8 - mate
MOF - matter of fact
MT - empty
MTE - my thoughts exactly
NAGI - not a good idea
Ne - any
Ne1 - anyone
No1 - no one
nrg - energy
OIC - Oh I see
OK - okay
ONNA - oh no, not again!
OTT- over the top
PCM - please call me
Pls - please
Ppl - people
PTL - praise the Lord
R - are
Re - regarding
RUOK - are you okay?
Spk - speak
Sry - sorry
SWAK - sealed with a kiss
THX - thanks
TTYL - talk to you later
TXT - text
U - you
U@ - you at? (where are you?)
UOK - you okay?
UR - your/you're
Usu - usually
W8 - wait
W84M - wait for me
W/ - with
Wan2 - want to
wn - when
WMF - works for me
XLNT - excellent
Y - why
YM - you mean
YR - yeah, right
GONNA "Going to"
SUM1 "Someone"
3SUM "Threesome"
GR8 "Great"
STRA "Stray"
4 "For, Four"
H8 "Hate"
THNQ "Thank you"
:-) "I'm happy"
L8 "Late"
THX "Thanks"
:-o "I'm surprised"
L8R "Later"
U "You"
:-( "Sad face"
LUV "Love"
UR "You are "
d
"Baseball cap "
MOB "Mobile"
WAN2 "Want to?"
;-/ "Confused"
2DAY "Today"
F2T "Free to talk"
RUOK "Are you okay?"
2MORO "Tomorrow"
FWD "Forward"
RGDS "Regards"
(:-... Heart-broken
%-) I'm tipsy but happy
#:-o Oh no!
:-# My lips are sealed
8-) Sender wears glasses
:+( I'm hurt by that
:*)? Are you drunk?
<:-0 Eeek!
:-e I'm disappointed
(-: Sender is left-handed
<:-) Dumb question
~o~ Bird
:@ Ouch!
:-(*) Sick comment
(:-) Bald
:// Frustrated
:3-< Dog
d:-) Hats off to your great idea
:-$ Put your money where your mouth is
:-{) Sender has moustache
|-| Going to sleep
:@) Pig
\o/ Praise the Lord
*<
) Clown
:-{)} Sender has moustache & beard
:=8) Baboon
8^ Chicken
~#:-( Bad hair day
:'-( I am crying
:*) I' tipsy
:-o Oh
O:-) Innocent
&:-) Sender has curly hair
enjoy and keep sms
G.D. Tips
$$$$$ Useful GD Tips $$$$$
1. Initiation Techniques
2. Body of the group discussion
3. Summarization/ Conclusion
Initiation Techniques
• Initiating a GD is a high profit-high loss strategy.
When you initiate a GD, you not only grab the opportunity to speak, you also grab the attention of the examiner and your fellow candidates.
If you can make a favourable first impression with your content and communication skills after you initiate a GD, it will help you sail through the discussion.
But if you initiate a GD and stammer/ stutter/ quote wrong facts and figures, the damage might be irreparable.
If you initiate a GD impeccably but don't speak much after that, it gives the impression that you started the GD for the sake of starting it or getting those initial kitty of points earmarked for an initiator!
When you start a GD, you are responsible for putting it into the right perspective or framework. So initiate one only if you have in-depth knowledge about the topic at hand.
Body of the group discussion
• Different techniques to initiate a GD and make a good first impression:
i. Quotes
ii. Definition
iii. Question
iv. Shock statement
v. Facts, figures and statistics
vi. Short story
vii. General statement
i. Quotes
Quotes are an effective way of initiating a GD.
If the topic of a GD is: Should the Censor Board be abolished?, you could start with a quote like, 'Hidden apples are always sweet'.
For a GD topic like, Customer is King, you could quote Sam (Wall-mart) Walton's famous saying, 'There is only one boss: the customer. And he can fire everybody in the company -- from the chairman on down, simply by spending his money somewhere else.'
ii. Definition
Start a GD by defining the topic or an important term in the topic.
For example, if the topic of the GD is Advertising is a Diplomatic Way of Telling a Lie, why not start the GD by defining advertising as, 'Any paid form of non-personal presentation and promotion of ideas, goods or services through mass media like newspapers, magazines, television or radio by an identified sponsor'?
For a topic like The Malthusian Economic Prophecy is no longer relevant, you could start by explaining the definition of the Malthusian Economic Prophecy.
iii. Question
Asking a question is an impact way of starting a GD.
It does not signify asking a question to any of the candidates in a GD so as to hamper the flow. It implies asking a question, and answering it yourself.
Any question that might hamper the flow of a GD or insult a participant or play devil's advocate must be discouraged.
Questions that promote a flow of ideas are always appreciated.
For a topic like, Should India go to war with Pakistan, you could start by asking, 'What does war bring to the people of a nation? We have had four clashes with Pakistan. The pertinent question is: what have we achieved?'
iv. Shock statement
Initiating a GD with a shocking statement is the best way to grab immediate attention and put forth your point.
If a GD topic is, The Impact of Population on the Indian Economy, you could start with, 'At the centre of the Indian capital stands a population clock that ticks away relentlessly. It tracks 33 births a minute, 2,000 an hour, 48,000 a day. Which calculates to about 12 million every year. That is roughly the size of Australia. As a current political slogan puts it, 'Nothing's impossible when 1 billion Indians work together'.'
v. Facts, figures and statistics
If you decide to initiate your GD with facts, figure and statistics, make sure to quote them accurately.
Approximation is allowed in macro level figures, but micro level figures need to be correct and accurate.
For example, you can say, approximately 70 per cent of the Indian population stays in rural areas (macro figures, approximation allowed).
But you cannot say 30 states of India instead of 28 (micro figures, no approximations).
Stating wrong facts works to your disadvantage.
For a GD topic like, China, a Rising Tiger, you could start with, 'In 1983, when China was still in its initial stages of reform and opening up, China's real use of Foreign Direct Investment only stood at $636 million. China actually utilized $60 billion of FID in 2004, which is almost 100 times that of its 1983 statistics."
vi. Short story
Use a short story in a GD topic like, Attitude is Everything.
This can be initiated with, 'A child once asked a balloon vendor, who was selling helium gas-filled balloons, whether a blue-colored balloon will go as high in the sky as a green-colored balloon. The balloon vendor told the child, it is not the color of the balloon but what is inside it that makes it go high.'
vii. General statement
Use a general statement to put the GD in proper perspective.
For example, if the topic is, Should Sonia Gandhi be the prime minister of India?, you could start by saying, 'Before jumping to conclusions like, 'Yes, Sonia Gandhi should be', or 'No, Sonia Gandhi should not be', let's first find out the qualities one needs to be a a good prime minister of India. Then we can compare these qualities with those that Mrs. Gandhi possesses. This will help us reach the conclusion in a more objective and effective manner.'
Summarization/ Conclusion
• Most GD do not really have conclusions. A conclusion is where the whole group decides in favor or against the topic.
• But every GD is summarized. You can summaries what the group has discussed in the GD in a nutshell.
Keep the following points in mind while summarizing a discussion:
1. Avoid raising new points.
2. Avoid stating only your viewpoint.
3. Avoid dwelling only on one aspect of the GD.
4. Keep it brief and concise.
5. It must incorporate all the important points that came out during the GD.
6. If the examiner asks you to summaries a GD, it means the GD has come to an end.
7. Do not add anything once the GD has been summarized
1. Initiation Techniques
2. Body of the group discussion
3. Summarization/ Conclusion
Initiation Techniques
• Initiating a GD is a high profit-high loss strategy.
When you initiate a GD, you not only grab the opportunity to speak, you also grab the attention of the examiner and your fellow candidates.
If you can make a favourable first impression with your content and communication skills after you initiate a GD, it will help you sail through the discussion.
But if you initiate a GD and stammer/ stutter/ quote wrong facts and figures, the damage might be irreparable.
If you initiate a GD impeccably but don't speak much after that, it gives the impression that you started the GD for the sake of starting it or getting those initial kitty of points earmarked for an initiator!
When you start a GD, you are responsible for putting it into the right perspective or framework. So initiate one only if you have in-depth knowledge about the topic at hand.
Body of the group discussion
• Different techniques to initiate a GD and make a good first impression:
i. Quotes
ii. Definition
iii. Question
iv. Shock statement
v. Facts, figures and statistics
vi. Short story
vii. General statement
i. Quotes
Quotes are an effective way of initiating a GD.
If the topic of a GD is: Should the Censor Board be abolished?, you could start with a quote like, 'Hidden apples are always sweet'.
For a GD topic like, Customer is King, you could quote Sam (Wall-mart) Walton's famous saying, 'There is only one boss: the customer. And he can fire everybody in the company -- from the chairman on down, simply by spending his money somewhere else.'
ii. Definition
Start a GD by defining the topic or an important term in the topic.
For example, if the topic of the GD is Advertising is a Diplomatic Way of Telling a Lie, why not start the GD by defining advertising as, 'Any paid form of non-personal presentation and promotion of ideas, goods or services through mass media like newspapers, magazines, television or radio by an identified sponsor'?
For a topic like The Malthusian Economic Prophecy is no longer relevant, you could start by explaining the definition of the Malthusian Economic Prophecy.
iii. Question
Asking a question is an impact way of starting a GD.
It does not signify asking a question to any of the candidates in a GD so as to hamper the flow. It implies asking a question, and answering it yourself.
Any question that might hamper the flow of a GD or insult a participant or play devil's advocate must be discouraged.
Questions that promote a flow of ideas are always appreciated.
For a topic like, Should India go to war with Pakistan, you could start by asking, 'What does war bring to the people of a nation? We have had four clashes with Pakistan. The pertinent question is: what have we achieved?'
iv. Shock statement
Initiating a GD with a shocking statement is the best way to grab immediate attention and put forth your point.
If a GD topic is, The Impact of Population on the Indian Economy, you could start with, 'At the centre of the Indian capital stands a population clock that ticks away relentlessly. It tracks 33 births a minute, 2,000 an hour, 48,000 a day. Which calculates to about 12 million every year. That is roughly the size of Australia. As a current political slogan puts it, 'Nothing's impossible when 1 billion Indians work together'.'
v. Facts, figures and statistics
If you decide to initiate your GD with facts, figure and statistics, make sure to quote them accurately.
Approximation is allowed in macro level figures, but micro level figures need to be correct and accurate.
For example, you can say, approximately 70 per cent of the Indian population stays in rural areas (macro figures, approximation allowed).
But you cannot say 30 states of India instead of 28 (micro figures, no approximations).
Stating wrong facts works to your disadvantage.
For a GD topic like, China, a Rising Tiger, you could start with, 'In 1983, when China was still in its initial stages of reform and opening up, China's real use of Foreign Direct Investment only stood at $636 million. China actually utilized $60 billion of FID in 2004, which is almost 100 times that of its 1983 statistics."
vi. Short story
Use a short story in a GD topic like, Attitude is Everything.
This can be initiated with, 'A child once asked a balloon vendor, who was selling helium gas-filled balloons, whether a blue-colored balloon will go as high in the sky as a green-colored balloon. The balloon vendor told the child, it is not the color of the balloon but what is inside it that makes it go high.'
vii. General statement
Use a general statement to put the GD in proper perspective.
For example, if the topic is, Should Sonia Gandhi be the prime minister of India?, you could start by saying, 'Before jumping to conclusions like, 'Yes, Sonia Gandhi should be', or 'No, Sonia Gandhi should not be', let's first find out the qualities one needs to be a a good prime minister of India. Then we can compare these qualities with those that Mrs. Gandhi possesses. This will help us reach the conclusion in a more objective and effective manner.'
Summarization/ Conclusion
• Most GD do not really have conclusions. A conclusion is where the whole group decides in favor or against the topic.
• But every GD is summarized. You can summaries what the group has discussed in the GD in a nutshell.
Keep the following points in mind while summarizing a discussion:
1. Avoid raising new points.
2. Avoid stating only your viewpoint.
3. Avoid dwelling only on one aspect of the GD.
4. Keep it brief and concise.
5. It must incorporate all the important points that came out during the GD.
6. If the examiner asks you to summaries a GD, it means the GD has come to an end.
7. Do not add anything once the GD has been summarized
GCET MBA Exam Information-2008
::::: GCET exam for M.B.A :::::
GCET is a GUJARAT COMMON ENTRANCE TEST for the student in Gujarat state only to get ADMISSION in any M.B.A. Programme in any college within Gujarat state.
To get admitted good rank is compulsory otherwise u will not be able to get admission.
<< Here is the some guide line for the GCET Exam <<
FIRST I AM ADVISED TO ALL STUDENT WHO ARE GOING TO FACE GCET EXAM TO PURCHASE ALL THE BOOKS GIVEN BELOW ;
(1) Verbal And Non verbal Reasoning ( INCLUDED FROM 2007 ) . . . .By R.S.AGGARWAL
(2) Mathematics For M.B.A . . . .By R.S.AGGARWAL
(3) Objectives Of English . . . . .By EDGAR THORPE & SHOWICK THORPE.
(4) General Knowledge . . . .By EDGAR THORPE & SHOWICK THORPE.
(5) MUST NOTE that another books must be required to Refered to increase G.K. ( General Knowledge )
GCET exam is consist of a
>> WRITTEN TEST ( covers 80% of total marks )
>> GROUP DISCUSSION ( covers 10% of total marks )
>> PERSONAL INTERVIEW ( covers 10% of total marks )
ALL OF THE ABOVE THREE GROUPS ARE COMPULSORY .
IF ANY OF THAM ARE NOT ATTEMPTED U WILL NOT BE ADMITTED.
Now Some important topics
>>>> Exam test paper consist of 250 questions.
>>>> All the questions are compulsory NO OPTIONS.
>>>> Time duration is 3 hours
>>>> Negative marking is 25%
>>>> Test paper questions will be depended on READING, COPSEIENSION, LANGUAGE
PROFICIENCY, NUMERICAL ABILITY, LOGICAL REASONING, CRITICAL REASONING, PSYCHOLOGICAL ASPECTS, GENERAL KNOWLEDGE, GENERAL BUSINEES ENVIRONMENT, DATA SUFFICIENCY and DATA ANALYSIS .And note that all have equal weightage no one can be left as a OPTION.
NOW SYLLABUS OF GCET ;
***Reasoning ****
(1) analogy
(2) blood relation
(3) series completion
(4) puzzle test
(5) coding and decoding
(6) logical venn diagram
(7) data sufficiency
(8) number ranking and time sequence test
(9) verification of truth statement
(10) assertion and reason
(11) statement - argument
(12) statement - assumption
NON VERBAL REASONING (included from 2007)
(1) series and
(2) analogy ( both are asked up to 9 to 12 marks )
MATHEMATICS FOR M.B.A
(1) basic operation and factorization
(2) numbers
(3) square roots
(4) percentage
(5) profit and loss
(6) partnership
(7) time and distance
(8) area and field work
(9) data interpretation
NOTE ; only IMP chapters are included.
OBJECTIVES OF ENGLISH
(1) test of synonyms
(2) test of antonyms
(3) one word substitution
(4) idiomp an phrases
(5) rearrangendnv of jumble words in sentences
(6) reading comprehension tests
NOTE : only IMP chapters are included.
GCET is a GUJARAT COMMON ENTRANCE TEST for the student in Gujarat state only to get ADMISSION in any M.B.A. Programme in any college within Gujarat state.
To get admitted good rank is compulsory otherwise u will not be able to get admission.
<< Here is the some guide line for the GCET Exam <<
FIRST I AM ADVISED TO ALL STUDENT WHO ARE GOING TO FACE GCET EXAM TO PURCHASE ALL THE BOOKS GIVEN BELOW ;
(1) Verbal And Non verbal Reasoning ( INCLUDED FROM 2007 ) . . . .By R.S.AGGARWAL
(2) Mathematics For M.B.A . . . .By R.S.AGGARWAL
(3) Objectives Of English . . . . .By EDGAR THORPE & SHOWICK THORPE.
(4) General Knowledge . . . .By EDGAR THORPE & SHOWICK THORPE.
(5) MUST NOTE that another books must be required to Refered to increase G.K. ( General Knowledge )
GCET exam is consist of a
>> WRITTEN TEST ( covers 80% of total marks )
>> GROUP DISCUSSION ( covers 10% of total marks )
>> PERSONAL INTERVIEW ( covers 10% of total marks )
ALL OF THE ABOVE THREE GROUPS ARE COMPULSORY .
IF ANY OF THAM ARE NOT ATTEMPTED U WILL NOT BE ADMITTED.
Now Some important topics
>>>> Exam test paper consist of 250 questions.
>>>> All the questions are compulsory NO OPTIONS.
>>>> Time duration is 3 hours
>>>> Negative marking is 25%
>>>> Test paper questions will be depended on READING, COPSEIENSION, LANGUAGE
PROFICIENCY, NUMERICAL ABILITY, LOGICAL REASONING, CRITICAL REASONING, PSYCHOLOGICAL ASPECTS, GENERAL KNOWLEDGE, GENERAL BUSINEES ENVIRONMENT, DATA SUFFICIENCY and DATA ANALYSIS .And note that all have equal weightage no one can be left as a OPTION.
NOW SYLLABUS OF GCET ;
***Reasoning ****
(1) analogy
(2) blood relation
(3) series completion
(4) puzzle test
(5) coding and decoding
(6) logical venn diagram
(7) data sufficiency
(8) number ranking and time sequence test
(9) verification of truth statement
(10) assertion and reason
(11) statement - argument
(12) statement - assumption
NON VERBAL REASONING (included from 2007)
(1) series and
(2) analogy ( both are asked up to 9 to 12 marks )
MATHEMATICS FOR M.B.A
(1) basic operation and factorization
(2) numbers
(3) square roots
(4) percentage
(5) profit and loss
(6) partnership
(7) time and distance
(8) area and field work
(9) data interpretation
NOTE ; only IMP chapters are included.
OBJECTIVES OF ENGLISH
(1) test of synonyms
(2) test of antonyms
(3) one word substitution
(4) idiomp an phrases
(5) rearrangendnv of jumble words in sentences
(6) reading comprehension tests
NOTE : only IMP chapters are included.
Jun 12, 2008
SARDAR Amazing Jokes
Stick a tire pressure gauge in his ear
* * * * * *
What do you do when a Sardar throws a pin at you?
Run like Hell....he's got a hand grenade in his mouth.
* * * * * *
How do you make a Sardar laugh on Saturday?
Tell him a joke on Wednesday.
* * * * * *
What is the Sardar doing when he holds his hands tightly over his ears?
Trying to hold on to a thought.
* * * * * *
Why do Sardars work seven days a week?
So you don't have to re-train them on Monday.
* * * * * *
Why can't Sardars make ice cubes?
They always forget the recipe.
* * * * * *
How did the Sardar try to kill the bird?
He threw it off a cliff.
* * * * * *
What do you call 10 Sardars standing ear to ear?
A wind tunnel.
* * * * * *
What do you see when you look into a Sardar's eyes?
The back of his head.
* * * * * *
What do you do when a Sardar throws a hand grenade at you?
Pull the pin and throw it back.
* * * * * *
What do you call a sardar who drinks only beer?
Just-beer Singh ('T' silent!).
* * * * * *
What do you call a sardar who has only one drink?
Just-one Singh.
* * * * * *
Why does Sardar always smile during lightning storms?
They think their picture is being taken.
* * * * * *
Why does Sardar have "TGIF" written on their shoes?
Toes Go In First.
* * * * * *
How can you tell when Sardar sends you a fax?
It has a stamp on it.
For time pass purpose only ......
* * * * * *
What do you do when a Sardar throws a pin at you?
Run like Hell....he's got a hand grenade in his mouth.
* * * * * *
How do you make a Sardar laugh on Saturday?
Tell him a joke on Wednesday.
* * * * * *
What is the Sardar doing when he holds his hands tightly over his ears?
Trying to hold on to a thought.
* * * * * *
Why do Sardars work seven days a week?
So you don't have to re-train them on Monday.
* * * * * *
Why can't Sardars make ice cubes?
They always forget the recipe.
* * * * * *
How did the Sardar try to kill the bird?
He threw it off a cliff.
* * * * * *
What do you call 10 Sardars standing ear to ear?
A wind tunnel.
* * * * * *
What do you see when you look into a Sardar's eyes?
The back of his head.
* * * * * *
What do you do when a Sardar throws a hand grenade at you?
Pull the pin and throw it back.
* * * * * *
What do you call a sardar who drinks only beer?
Just-beer Singh ('T' silent!).
* * * * * *
What do you call a sardar who has only one drink?
Just-one Singh.
* * * * * *
Why does Sardar always smile during lightning storms?
They think their picture is being taken.
* * * * * *
Why does Sardar have "TGIF" written on their shoes?
Toes Go In First.
* * * * * *
How can you tell when Sardar sends you a fax?
It has a stamp on it.
For time pass purpose only ......
Jun 3, 2008
Free Mobile T.V. Setting...
***** FREE TRIAL MOBILE TV SETTING *****
RealPlayer> Option> Setting> Connection> Network> Option> Advance Setting> GPRS BandWidth.
(Gprs BandWidth Should Grater Then < 37.52)..
Right now only one channel is available CNN-IBN ...
so enjoy this free news channel...
RealPlayer> Option> Setting> Connection> Network> Option> Advance Setting> GPRS BandWidth.
(Gprs BandWidth Should Grater Then < 37.52)..
Right now only one channel is available CNN-IBN ...
so enjoy this free news channel...
Jun 1, 2008
BSNL Internet trick
$$$$$ BSNL hack for Internet $$$$$
For connection on your mobile phone:-
1) Make two connections like bsnlportal and BSNLPORTAL1
(names of profile don’t matter, u can keep one as billgates and shahrukhkhan lol..
the basic purpose of names is to
enable the user to differentiate between the two accounts,)
2) Select the application you got to have the full connection working on.
Surpassingly “web” now just select “bsnlportal” profile and
select a link like wap.cellone.in the page will get open,
just press the red button such that the “web” application goes in the background.
Make sure that the gprs connection is still established with the web app.
Two parallel lines on the top left of the screen will confirm this.
3) Now open any other app that requires web connection like opera.
Select BSNLPORTAL and open any other link like wap.google.com, u will get error –
the aim of using the other app is to perform multi-channel gprs,
this is verified by seeing some dots on the pre-existing connection established by “web”
(step 2)
“Access denied.
Technical description:
403 Forbidden - You are not allowed to communicate with the requested resource.”
4) close opera and open web and open a site like esato.com
5) if everything is done as said here then esato will load and voila! We have the whole internet!
For connection on pc.
1)create a connection and enter the number to be dialed as *99***1#
2) enter the following string as extra initialization command
3)now dial from pc, the connection will be established
4)pick the phone and open “web” open “wap.cellone.in” the phone shows error .
5) close “web” and then from the browser open www.google.com
and voila! The whole intenet is here
settings for profiles
apn: celloneportal
ip: 192.168.51.163
port : 8080
leave other fields blank as they are of the least concern!
the browser settings on pc too go the same as mentioned above!
For connection on your mobile phone:-
1) Make two connections like bsnlportal and BSNLPORTAL1
(names of profile don’t matter, u can keep one as billgates and shahrukhkhan lol..
the basic purpose of names is to
enable the user to differentiate between the two accounts,)
2) Select the application you got to have the full connection working on.
Surpassingly “web” now just select “bsnlportal” profile and
select a link like wap.cellone.in the page will get open,
just press the red button such that the “web” application goes in the background.
Make sure that the gprs connection is still established with the web app.
Two parallel lines on the top left of the screen will confirm this.
3) Now open any other app that requires web connection like opera.
Select BSNLPORTAL and open any other link like wap.google.com, u will get error –
the aim of using the other app is to perform multi-channel gprs,
this is verified by seeing some dots on the pre-existing connection established by “web”
(step 2)
“Access denied.
Technical description:
403 Forbidden - You are not allowed to communicate with the requested resource.”
4) close opera and open web and open a site like esato.com
5) if everything is done as said here then esato will load and voila! We have the whole internet!
For connection on pc.
1)create a connection and enter the number to be dialed as *99***1#
2) enter the following string as extra initialization command
3)now dial from pc, the connection will be established
4)pick the phone and open “web” open “wap.cellone.in” the phone shows error .
5) close “web” and then from the browser open www.google.com
and voila! The whole intenet is here
settings for profiles
apn: celloneportal
ip: 192.168.51.163
port : 8080
leave other fields blank as they are of the least concern!
the browser settings on pc too go the same as mentioned above!
Subscribe to:
Posts (Atom)
Subscribe via email N get Tips
Label Cloud
2009
(1)
2010
(3)
2011
(1)
2011 IPL Player
(1)
3 IDIOTS
(1)
3G dongle
(1)
Academics
(3)
ACCOUNT
(1)
ACRTICALS
(3)
acta
(1)
Addons
(1)
ADSL Router
(1)
Adzero
(1)
AIRTEL
(14)
Airtel 3G
(1)
airtel Grps
(1)
airtel proxy
(1)
android
(3)
Android Phone
(3)
Android Phone codes
(1)
ANTIVIRUS
(7)
ARP hacking
(1)
BAT
(2)
BHUVAN
(1)
BIOS
(2)
bitcomet
(16)
BITTORRENT
(21)
BLOG
(4)
BLOGGER
(5)
blu ray
(1)
BOLLYWOOD LATEST MOVIES
(4)
BOLLYWOOD MOVIES
(4)
BOOK
(2)
British rapper
(1)
BROADBAND
(4)
BSNL
(7)
BTJunkie
(1)
BTJunkie Shut down
(1)
BTJUNKIES
(17)
Cabana
(1)
calender
(2)
Caller ID
(1)
CAM RIPS
(8)
CAPCHA
(1)
CAT
(1)
CCNA
(6)
CCNP
(1)
CES 2011
(1)
CHAT
(2)
CHATING
(1)
CHATTING
(1)
CHINA
(3)
Christmas
(1)
CID
(1)
CISCO
(8)
CISCO PRESS
(2)
CLONING
(1)
CODE
(5)
COLLECTION
(2)
COMMAND
(2)
CRACK
(26)
crack key
(3)
CRACKSOFTWARE
(11)
CSS
(1)
DAILY MOTION
(1)
Dan Bull
(1)
DAP
(1)
data backup
(1)
data storage
(1)
dekstop
(1)
Delhi 100 Year
(1)
DESI TORRENTS
(20)
DISK
(1)
DIY
(1)
DOCOMO
(2)
Docs
(1)
DOWNLOAD
(13)
DragonBall Browser
(1)
dvd
(1)
DVD Rip
(12)
dvd vs blu ray
(1)
E-mail
(1)
Ebook
(7)
EDUCATION
(3)
ERROR
(3)
ESET
(1)
ET
(4)
EXAM
(8)
EXPLORER
(2)
EXRTA TORRENT
(20)
extratorrent
(10)
FACEBOOK
(8)
facebook hacking
(6)
FACEBOOK TIMELINE
(2)
FACEBOOK Tips
(1)
FAT32
(1)
FILESHARNING
(1)
FIRE FOX
(14)
First Bamboo Smartphone
(1)
FIRST ON NET
(1)
FOLDER
(2)
FORMAT
(1)
Free DNS
(1)
FREE GPRS
(22)
FREE MMS
(12)
FREE SMS
(16)
freesoftware
(6)
FRIST ON NET
(1)
FTP
(1)
full software
(25)
FUNNY
(3)
G.D
(1)
G.D.
(1)
GAME HACKING
(12)
GAME KEYS
(2)
GMAIL
(12)
GMAIL HACKING
(16)
GMAT
(1)
GNS3
(1)
GOOGLE
(53)
GOOGLE CROME
(20)
Google Doodles
(3)
GOOGLE EARTH
(23)
Google Global DNS
(2)
Google Map.
(1)
Google Nexus
(2)
Google Nexus mobile
(2)
Google Open DNS
(2)
google pulgins
(16)
google Search Tips
(7)
google software
(5)
Google Tip
(6)
Google Tricks
(6)
GOOLGE HACK
(35)
GSM
(2)
gsm hack
(1)
GTALK
(7)
GURU OF HACKING
(8)
H
(3)
HA
(1)
HAC
(3)
HACK
(100)
HACKER
(39)
Hackers
(14)
HACKING
(76)
HACKINGTOOLS
(38)
Happy holidays
(1)
Happy holidays 2011
(1)
HARDWARE
(2)
HOLLYWOOD MOVIES
(4)
hotmai
(1)
How To
(1)
how to backup data
(1)
how to store data
(1)
HSTR
(2)
HTML
(1)
HUTCH
(2)
I-PHONE
(4)
I-phone 4
(3)
I-Phone 5
(3)
I-Phone 5 Leak
(2)
I-phone Leak Video
(2)
IDEA
(6)
IDM software
(1)
IE
(8)
IE8
(6)
IE9
(6)
India Delhi
(1)
INFORMATION
(3)
INTERNET
(22)
IP-ADDRESS
(6)
iPhone 3
(1)
iPhone 4s
(1)
iPhone 4s Tariff plan for india
(1)
iPhone 5
(1)
iPhone4
(1)
IPL 2011
(1)
IPL 4 Auction News
(1)
IPL4
(1)
IPLT20 Schedule
(1)
ISOHUNT
(2)
ISP
(2)
IT
(2)
jingle bells
(1)
JOKES
(2)
JTO 2009
(1)
KEY
(4)
KeyBoard
(1)
Keyboard Tips
(1)
Kieron-Scott
(1)
KUTCH
(1)
learning software . Photoshop
(2)
lightroom
(1)
long term data backup
(1)
long term storage
(1)
Lumia 710
(1)
Lumia 800
(1)
MAC
(2)
MAC OS
(1)
Malware
(1)
Mango
(1)
MANGO Mobile OS
(1)
MANGO OS
(2)
MAT
(1)
MBA
(3)
Meego
(1)
MESSENGER
(3)
METACAFE
(1)
MICROSOFT
(7)
Microsoft Onenote
(1)
Microsoft PowerPoint
(3)
MOBILE
(41)
MOBILE CODES
(27)
Mobile Memory Card
(1)
Mobile Repair.
(2)
Mobile Save
(1)
mobile software
(1)
MODEM
(2)
MOTOROLA
(2)
MOUSE
(1)
MOVIES
(5)
MS-DOS
(4)
MS-OFFICE
(3)
MS-OFFICE KEYS
(2)
MSN HACKING
(7)
MSN PASSWORD
(11)
MTV
(2)
MYSPACE
(1)
N-SERIES
(1)
Network
(5)
NETWORKING
(6)
new camera
(1)
New Year
(5)
NEWS
(3)
NOD32
(1)
NOKIA
(10)
Nokia lumia
(1)
Nokia Lumia 800
(1)
Nokia Lumia 820
(1)
Nokia Lumia 900
(1)
Nokia Lumia 920
(1)
Nokia Mango
(2)
Nokia meego
(2)
Nokia N9
(1)
NORTON 360
(1)
NOTEPAD
(1)
NOTIFICATION
(1)
NTFS
(1)
OPERA
(5)
ORKUT
(16)
ORKUT HACKING
(18)
ORKUT VIRUS
(8)
OUTLOOK
(4)
P2P
(10)
PAPER
(1)
PASSWORD
(7)
PC SUITE
(3)
Peer To Peer
(8)
PENDRIVE
(1)
PHILIPS
(1)
PHOTO
(2)
photoshop
(1)
pipa
(1)
Piracy
(13)
PIRATESBAY
(26)
PRINTER
(1)
PROXY SITES
(3)
Ragaa.com
(1)
RAPID HACK
(6)
rapidshare
(1)
Rapper protests piracy
(1)
REGISTRY
(4)
Reset Your Mobile Memory
(1)
RESULTS
(4)
ROADIES
(4)
Roadies 8.0 Raghu Rajiv RAnvijay Bani Roadies 5.0 Roadies 6.0 Roadies 7.0
(2)
ROUTER
(4)
RSS
(1)
S60
(5)
SAGEM
(2)
SAMSUNG
(7)
SARDAR
(1)
SCPIRTING
(5)
SCRAP
(2)
Search by Image
(1)
secret codes
(2)
Secure Your Computer
(1)
SECURITY
(6)
Serial key
(2)
SETTING
(2)
Shirt
(1)
SIM
(1)
SIMULATOR
(3)
SITEMETER HACK
(1)
SKYPE
(1)
Smartphone
(1)
SMS
(7)
SOFTWARE
(17)
Songs
(1)
Songs.pk
(1)
SOPA
(2)
SOPA Cabana
(1)
SPAM MAIL
(3)
statcounter
(1)
STD
(1)
storage
(1)
suraj fake
(1)
SYSTEM
(1)
T
(1)
TAG
(1)
Tango OS
(1)
TECH NEWS
(1)
THEMES
(3)
Timeline
(1)
TIMEPASS
(4)
TIP
(110)
TIPS
(126)
TNA
(1)
TOOLBAR
(1)
TOOLS
(7)
torrent
(23)
TORRENT HACK
(9)
TRICK
(187)
TROJAN
(4)
TUTORIAL
(1)
TV
(1)
TWEAK
(8)
UK
(1)
Unlimited Download
(1)
unlocking
(1)
UNRATED EDITIONS
(3)
USB
(9)
USB dongle
(1)
UTORRENT
(15)
VIDEO
(4)
Virus
(2)
Virus google
(1)
Virus total
(1)
Virustotal
(1)
VODAFONE
(5)
w3 counter
(1)
WAY2SMS
(2)
website
(1)
WI-FI
(14)
WINDOWS
(96)
WINDOWS 7
(44)
windows 7 GodMode
(2)
Windows 7.5 OS
(5)
Windows 8
(9)
windows 8 installation
(2)
WINDOWS VISTA
(27)
WINDOWS XP
(92)
windowsphone
(1)
Winzip
(1)
WIRELESS
(12)
WORDPRESS
(1)
WP7
(3)
WP8
(3)
WVIL
(1)
WVIL unbelievable
(1)
WWE PAYPER VIEW
(1)
WWE RAW
(1)
WWE SMACKDOWN
(1)
www.extrattorrent.com
(5)
XAT
(1)
XP Password
(2)
Xvid
(9)
YAHOO
(18)
YAHOO HACKING
(11)
yahoo messanger
(4)
YOUTUBE
(9)
YOUTUBE dOWNLOAD
(3)
YOUTUBE DOWNLOADER
(3)
youtube new look
(2)
zip7
(1)