Labels

BSNL 3G hack



First of all Buy a normal 2g bsnl's sim card and keep balance 50+ rs.

now activate gprs by sending sms GPRS E to 53733 It will be

actrivated in 24 hours, after activation get gprs settings by calling c.care


APN:-gprseast.cellone.in or bsnlnet


Now do e-recharge with 230 rs (or whatever unlimited plan exists in your area)

in it, After activation You have to chnage only one thing in yor 3G enabled cell.


Go to settings>tools>settings>phone&g
t;network>network mode> now select UMTS


THEN do manual searching for network u will fing bsnl 3g network there wid small 3g logo along wid its name,select it as default


Now see your data singnals logo..... vola it is converted into 3G

You will get near about 500kbps to 1200 kbps speed

Remember use gprseast.cellone.in or bsnlnet as ur access point


but its 100% working

Enjoy 3G at appr. no cost.....


Here IS the SPEED Proove :-

Category: , , , 5 comments

Making a external hard disk

If your have a non use hard disk you may can use it for as a external! Let us made it..


Figure A



The I/OMagic hard drive enclosure fit my needs perfectly

Made by I/OMagic, a reputable company that specializes in a variety of peripheral computer products, this USB 2.0 hard drive enclosure was on sale for $19.97 — a deal that I just couldn’t pass up. As you can see in Figure B, this is a very basic hard drive enclosure with a compact, yet very sturdy, aluminum case which acts as a heat sink — there’s no fan and no fancy lights either. The kit comes with the enclosure, a vertical stand, a power supply, a USB cable, small package of screws, and a quick installation guide.


Figure B



The kit included all the necessary components

Configuring the hard drive


One of the biggest problems people encounter when building an external hard drive using an IDE drive has to do with the jumper setting configuration on the hard drive itself. The correct setting may depend on any one of several factors: the IDE to USB converter circuitry in the enclosure, your computer’s BIOS, or the hard disk specifications. Of course, the first place to look for information on the correct settings is in the manual or guide that came with the hard drive enclosure. If the manual doesn’t recommend a specific setting or your drive doesn’t seem to work with the recommended setting, you’ll just have to experiment.


Now, I’ve built several external hard drives using different hard disk enclosure products and have discovered that many products specifically recommend using the Master jumper setting configuration. However, the user guide for the I/OMagic enclosure did not provide any indication of how the drive should be configured.


As such, I was left to my own to find the correct setting. If you find yourself in the same position, you need to understand how the jumper settings on IDE hard drives work.


How jumper settings work


To begin with you need to understand that in a standard internal configuration of IDE hard drives the jumper settings are used to determine the order in which hard drives and other devices, such as CD/DVD drives, attached to a single interface cable are detected by a computer system. Setting the jumpers correctly on a hard drive requires the placement of a jumper shunt over two pins on the hard drive jumper block. Figure C shows a jumper block on a typical IDE hard drive and a jumper shunt.


Figure C



The jumper shunt fits over a pair of pins on the jumper block

There are four possible jumper settings on most IDE drives:



  • Master

  • Slave

  • CS (Cable Select)

  • Single


The Master and Slave settings work together when there are two drives attached to the same cable. One drive is jumpered as the Master and placed on the end of the cable. The other drive is jumpered as the Slave and placed in the middle of the cable. The Cable Select settings can also be used when there are two drives attached to the same cable. In this type of configuration, each drive is jumpered as Cable Select and the drives actual position on the cable determines whether it is the master or the slave.


If there is only one drive on the cable, it can be “jumpered” in any one of several configurations depending on the hard drive. The most logical is the Single setting, which in most cases means that there are no jumper shunts on the jumper block. The other logical setting is Cable Select. However, in some situations a single internal IDE drive can be configured using the Master setting.


Setting jumpers for external configurations


Now that you understand the jumper settings function, you have a good idea of what you need to try when the manual doesn’t recommend a specific setting or your drive doesn’t seem to work with the recommended setting. Since the majority of the enclosures that I’ve worked with recommend the Master jumper setting, that’s the one that I experimented with first. However, when I did, the drive simply was not recognized by the operating system.


I then tried the Single setting by removing no jumper shunt from the jumper block, the drive was then recognized by the operating system. Just to be complete, I also tried the Cable Select jumper setting. Again the drive was recognized by the operating system.


Many hard drives have a diagram on the label that shows the various settings; however, others, such as my old Western Digital drive, have labels printed on the circuit board that indicate the various jumper settings, as shown in Figure D.


Figure D



This drive has labels printed on the circuit board that indicate the various jumper settings

Using a tweezers, you can remove or reposition the jumper to the pins that correspond to the correct position, as shown in Figure E.


Figure E



To work with the I/OMagic enclosure, I decided to use the Cable Select setting

Installing the drive


Opening my example enclosure simply involved removing a couple of screws and then sliding the drive tray out of the enclosure. With the drive tray out of the enclosure, you can then connect the hard drive to the IDE and power connectors, as shown in Figure F. You’ll then fasten the drive to the tray using the included screws.


Figure F



With the drive tray out of the enclosure, you can easily connect the IDE and power cables to the drive

With the drive securely anchored, you can slide the tray back into the enclosure, as shown in Figure G. As you do so, you may need to gently tuck the IDE and power cables under the edge of the case. Then, all you need to do is refasten the tray to the enclosure using the screws that you removed earlier.


Figure G



Once everything is connected, you can then slide the tray carefully back into the enclosure

Connecting the drive


Once you’ve assembled the hard drive enclosure, you can connect it to your computer. To begin, make sure that the enclosure’s switch is set to the off position. Next, connect the USB cable to the back of your computer and to the back of the enclosure. Then connect the power cable to the back of enclosure and plug it into an outlet. With all the connections made, as shown in Figure H, all you have to do is flip on the switch.


Figure H



With the enclosure completely assembled, you can just connect the power and USB cables to the back of the unit

As soon as the enclosure powers up the hard drive, Windows will recognize the new USB connection and will begin installing the device drivers. When the drivers are installed, you’ll see a pop up balloon that lets you know the operation is complete. Since you’re using an old hard disk that has been initialized and formatted, it will immediately show up in My Computer, as shown in Figure I, and you can access it immediately. However, you’ll probably want to reformat the drive in order to give yourself a fresh start.


Figure I



Once Windows recognizes the external hard drive and installs the drivers, you can find the drive in My Computer

Building your own


Building an external storage system using an old hard disk and an external enclosure kit is a great way to put your old equipment to good use. Following the steps in this article will allow you to quickly and easily build an external hard disk that you can use for extra data storage or as a new backup destination.



Thanking you,

cutesayantan@gmail.com


Category: 1 comments

Space Time ........... Einstine Says

I checked my I.Q. on net.. The result is 128 points and Einstine was the IQ of 180 too far to me.He is just no a exceptional, but a complete mysterious .Some of his theories now still undiscovered but it's prooved already dat he was perfect .I think of to share a theory of Einstine's SPACETIME ,Some infomation may collected from net .It's not ma completly exclusive I selendered



In physics, spacetime (or space–time; or space/time) is any mathematical model that combines space and time into a single continuum. Spacetime is usually interpreted with space being three-dimensional and time playing the role of a fourth dimension that is of a different sort from the spatial dimensions. According to certain Euclidean space perceptions, the universe has three dimensions of space and one dimension of time. By combining space and time into a single manifold, physicists have significantly simplified a large number of physical theories, as well as described in a more uniform way the workings of the universe at both the supergalactic and subatomic levels.

In classical mechanics, the use of Euclidean space instead of spacetime is appropriate, as time is treated as universal and constant, being independent of the state of motion of an observer. In relativistic contexts, however, time cannot be separated from the three dimensions of space, because the rate at which time passes depends on an object's velocity relative to the speed of light and also on the strength of intense gravitational fields, which can slow the passage of time.


See sume picture which draws by the fiction of artists

Videoes:-~Abraham-Hicks~Time and Space Illusion,What Lies Beyond Our Own Space-Time Continuum ...


I'm waiting for your reply and comments

Category: 1 comments

Hack orkut account

May this question roaming on your mind “why I’m sharing personal secrets here and why I’m post some cyber cryme offense like how to hack accounts?”. I do so just for money!! Yes now you think of I am just 16 years old and what I do with money!.I waana to make a icon of this computer generation like billgrades.So I need a huge number of money to start higher study so I make this bloh and many more website.I have now still no money so I cannot make any domain names.So please help me by clicking on advertisements and make a donation..A kind request from your brother..
Let’s come to the main part. I got many mails and many feedbacks after posting two story of my life. First many thanks of them who are read my blog and mail me .Many mailers want to know how to hack an Orkut accounts .I know some method to steal the password .Note I know ‘stealing’ method .That mean you need to steel them’s password by intelligency and getting a chance of his careless movements. Let us talk about the method , there have many method to steal passwords…Phising method is more easy and more successfully method but phising method is known to 70% of users who using internet scince 3 months .So be carefull about it.For beginner users I will post next for details about it and now I’m giving readymade scripts of phising for hacking……
Download it:- http://www.ziddu.com/download/5874400/hackorkut.zip.html
Note:-Instruction file also included……… For any proplems or help you may mail me on cutesayantan@gmail.com or leave comments here… You are almost welcome

Kaspersky Antivirus 2010 Direct Link Exclusive










Kaspersky Anti-Virus Personal 2010 9.0.0.684 | 60 Mb



The Kaspersky Anti-Virus 2010 application was designed to be the backbone of your PC's security system, offering protection from a range of IT threats.

Kaspersky Anti-Virus 2010 provides the basic tools needed to protect your PC.

Here are some key features of "Kaspersky Antivirus Personal":



· Detects viruses based on the packers used to compress code

· Global threat monitoring (Kaspersky Security Network)



Advanced Protection & Recovery



· The program can be installed on infected computers

· Self-protection from being disabled or stopped

· Restores correct system settings after removing malicious software

· Tools for creating a rescue disk

· Data & Identity Theft Protection

· Disables links to fake (phishing) websites

· Blocks all types of keyloggers







DOWNLOAD LINK


Direct Link ,Pause Enabled

Direct Link ,Pause Enabled


Download Key for Direct Download

Download Key for Direct Download


Download Via Rapidshare

For Hacker Sayantan Says

When I'm read in class eight.Oneday I think for Phising.I tried to find any conception and method for phising.Then I think to make a script that can store username and passwords.I trued to made this script myselves but some error comes in php script file.Then I find the scripts in Google.And I find it.Then I made a orkut login page from its source code.I change some layout for it looking like updated version of orkut.I upload the site on 110mb.com .After that I forward the links of the phising site to my orkut friends saying that it is update version of ORKUT.Then everyone goes this site and login with their password but they got error message.I got password of them.This day first time I successfull to hack any Orkut Password.I login with their ID and spread my phising site to all orkut users.A friend of my brother also got this.They also login there and his password also to me.After that next day I'm chatting with my brother's friend then unforunately just for fun I say him that I hacked his password.It is too wrong for me.YOU NEED TO NEVER DECLARE YOU AS A HACKER.After that he feared about that.And say all about my brother and I think they issued case against me.My brother call my Father.I don't know what was the conference then between my father and my brother.Father come back with angry and scold me.After that I also feared deeply.......and delete all my gmail.....orkut.....and 110mb accounts.By requesting my brother the case may be withdtrawn then.I promise that day that I will not hack any orkut account.Although I promise for not hacking anyones account but hacking is my vain I continue to increase my hacking skills.I'm advising all hacker to not say about you are a hacker,Inspite of a good friends and relative.Its amy be harmfull for you for any time and therefore many blackmailer may create.

Next day I will discuss about How to hide your Identify,and what need to protection for Hacking.


Thanking You

Sayantan Says 20-2-10

It is first post on this Blog.I think to make a blog for share my personal secrets.Now You can think what you do by knowing others personal secrets...So I think to share my Interesting movement and activity on this cyber world.I want to share my views on hacking and ethical hacking.I want to share some tips.Not it, Hacking is not my profession..Its ma pashion.

I'm Sayantan....Sayantan Halder from INDIA. I'm from Bengal.I'm Bangali...Wheather the technology is not devoloped properly.I'm now read in class X.I know you think that I'm so little but My journey of experience of the computers start on class V. From first I think of to create a web site and little thinking about hacking.So I start learning web design online.I purchased some books about HTML.And w3schools.com is the most reach website for biginner.It is mendotory to learn and have sum basic knowledge about web design.So this help me to grows up.You smile to know that I hav Internet Connection by hacking since 16 months.I hav successfully hacked the Mobile Office package of AIRTEL.Although it is not working now.I want to tell you a thing Vodafone has its most powerfull network..So It is too hard to hack them and maximum impossible......But airtel have lot of offers and scheme.But they can not controll them probably.Maximum time system failesd to store user information on their server.


First day,I want not write more.I promise all I will post back to back rocking tips.Next day I will tell you my most important one day of my life......that day I caught for Hacking ORKUT profiles.And they issued a cased against me in Chennai Anti Cyber Crime police.

I'm waiting for your reply.....Please reply and email me at cutesayantan@gmail.com You can share your biography and any proplems.I will try to Help to omit your proplems.You may can ask about any hacks.


Thanking You,



Counter