Sei sulla pagina 1di 3

Mobile Tips

Code * 3001 # 12345 # * # 639 # * # 6392 # * # 837 # * # 3872 # * # 92772689 # *


# 7780 # * # 9999 # * # # * NEW NEW2 # # * # * # VER # # EVRC WARRANTY * # # *
# # * # RSTO WXYZ # Code in letters Description Accesses the programming of the
phone. Program the cell phone number. Program the second mobile phone number. Ch
ecks the version of the phone. Increases the frequency of the analog phone. Menu
with all functions of the phone. Restores the original configuration of the pho
ne. Version of phone software.
Phacker
HOW TO LISTEN TO A RADIO TELEPHONE CONNECTIONS COMMON To begin to understand tha
t this is only your entertainment. So do not give tips on how to listen to phone
calls from your neighbor. If what you want is this, or start to read. What will
be taught is to listen to a call within your home. The phones in question are c
ordless phones. They transmit the waves for FM. So what you have to do is find t
he frequency. But, it has its restrictions. Unless it is a radio antenna with a
very strong, he has to stay near the base of the phone. Found a frequency that i
s 93.9 MHz, but does not mean that all is well. And not only connect switch on t
he radio and listen. It takes a while to be able to tune. But after tuning in th
e exact spot, you could hear perfectly.
CELLULAR BURLANDO This tip is very cool, this tip is for phones, but I have a sl
ight claim that in ordinary telephones it reaches the 70% reduction in telephone
charges (Only it's not guaranteed!). To do this you simply take the number to b
e dialed, for example 65-9342 (a number that is invented, but if your let me kno
w hehehe) and then you take the last digit and subtract ten, in the example 2, 1
0-2 = 8, then enter the number (65-93 -48) over the last paragraph before being
subtracted. New number 65 93 48 2, this time without pay. First, get the number
you will dial. Ex: 1234567 This number is fictitious. Do not call there, asking
for information. So we get the last phone number to be dialed in case the 7 ...
subtract it from 10, which will result number 3. We will only add the number 3 a
t the end of number dialed. The result will be: Number on without pay: 123-4567-
3 3New remove the battery from your phone, after opening there will be some piec
es of metal it's right down the phone three streaks of
metal, grab a piece of aluminum foil boat and there, give the boat battery and t
urn on the cel, will give a business, type # 1008 # and is only listening to the
conversations.
Fraud Check Box Check boxes (or cabinets in the language "technical" TELESP) are
iron boxes, which are often located on public streets, and are used to make the
checking of telephone lines and detecting problems before they arrive the plant
. Such boxes are usually gray color and is about 1.5 m high, with a code written
in black on the superior.Para do this type of fraud, just that you get one of t
he dozens of pairs of wires that are there and knot the two fos his portable pho
ne, which will be with which its wires stripped. Also note the bias. Remember th
at you should not destroy the box to open it, if it is not already broken down.
Do not go break the drug box. This is something for those who do not outdated. A
nd you're not a thug, you're a Hacker.OBS: There are two more forms of fraud, I'
m not here because the real Hacker discovers what they need.
Public telephone booths with a cheating device common mode phone fraud with the
common public Oreillons: First you must get a regular phone and small and compac
t. Then you have to strip the wires from it (will take 2 wires). Then pack a goo
d pair of pliers, utility knife or knife and go to a pay phone orelhão.Descasqu
e wires (peeling is not to cut) onto the two wires stripped from a pay phone and
twist the two wires with your phone, look at the polarization, or be sure your
mobile phone run out of line reverse the position of telephone wires, therefore,
contrary to what many people think the pay phone wire has negative and positive
. Now just make the connection from your regular phone
Fraud through the public telephone booths notebook The process for connecting la
ptops to public phones, equals to connect phones. Summarize this item, some cons
iderations about the wiring of the notebook, which follows the standards of the
FCC and the American is a little different from nossa.O wire connector of the no
tebook is jack, has four wires inside. Start the clear plastic connector that is
on the tip of the wire, take the central dios wires and separate the wires of e
xtremidades.Estes two central threads, are to be used to connect the phone booth
.€I advise you to put alligators in them (small hook found at any electronics s
tore). Simply connect to the BBS in the same way that you connect at home. If yo
u want to test that it is
okay, open a terminal program and enter any ATA, if you make a noise similar to
dial tone that's OK.
Turning on the card without paying Oreillons Using a cardboard 50 links, with th
e back painted with graphite 6B Using a new card, with the back painted with nai
l enamel base Using a cardboard, wrapped in aluminum foil using a card used 50 l
inks, with the back shaved with a coin using a new card after completing the con
nection (the person speaking Aló) holds on the No. 9 takes the card and keep ho
lding the button until you have finished talking.
Phreakers rules: 1 - Never use the boxes in line with its second home - I never
talk about their projects phreakers in line with your home 3 - Never use your re
al name when making phreak 4 - Be careful with that comment about their projects
preakers 5 - Never leave phreaking materials anywhere, always have a hiding pla
ce to keep it protected. 6 - Do not be caught
Phone Brazilian Have you ever counted how much chips telephonic already spent in
your life (especially those who have no phone), now imagine and multiply by $ 0
.10 will also do this with phone cards and be amazed. Now people, the plug telef
onica of $ 0.10 only gives me two. Local Connection (formerly 3mim.). Now the ph
one card runs out very quickly. For local calls from your home you'll have to pa
y 270% more and 30% more to Interurban. According to the increase in April 1997.
I think something so vulgar and so thief might pay to talk to, we get a sense o
f nature, especially when you have explosive rises like those of today. Hackers
from Brazil, let's show them who's boss, we'll challenge them and we will have s
omething they will never forget. Watch this space forms of bypass, circumvent, a
nd shredding the robbery of Telesp, TELERJ, Embratel, CRT, and many other organi
zations ANATEL telephony ... These Tips a''i above are tested in the United Stat
es, may be that some oprtanto to malfunction.
Anonymizer
Any Home-Page that you visit may well obtain information about you such as: Prov
ider, IP address, operating system that is using, which browser is using and per
haps the e-mail. The Anonymizer www.anonymizer.com acts as intermediary between
your browser and other websites.Assim being, it prevents the sites visited have
access to any information you. To use the service, you must precede URLs with th
e following address of the Anonymizer (http://www.anonymizer.com:8080). If you w
ant to access the home page of Microsoft, for example, and not want it to get yo
ur data, you must type in your browser http://www.anonymizer.com:8080/http://www
.microsoft.com ready so you can even use those passwords to pornographic Web sit
es that you had without worrying about their safety. Ps: The Anonymizer is NOT f
oolproof. So do not think that using the Anonymizer you can go around using pass
words on everything that is false site and will never know who you are!
Strike by port 666
What is this? Well, the port 666 is a port that could only be used by the U.S. g
overnment, NSA, so that they communicate this when you connect the GoM port "Thi
s port is only for use by the NSA and U.S. Government." Well, it does not connec
t to anything hard, but needs some tweaking, it's an intrusion for you to catch
things in his friend's house with him knowing.
What you need:
You need a program called Aabout (htp: / / www.dolphinsys.com) and get this prog
ram. You need a Telnet program to access (OHH). For those who do not know this p
rogram is in the windows directory. (In windows).>
I've got everything ready and now:
Now you must either ICQ or by phone, or chat, contact your friend, he must also
have these two tools, after you contact him, you two should run the program Aabo
ut. After you run and he too. Just open the Telnet, and put the host ip dynamic,
may be, the face, and connect to port 666 and signed the word g! (Not only is G
R gr!, The exclamation point should be). Soon you will be in a prompt, now just
take a dir, and you have TOTAL control over the computer guy, as much control as
you can get the power to FORMAT C:, so only do this with friends.
Invasion by IP
Never managed to make it work.
1 - Make sure you have this program: nbtstat.
2 - Go to MS-DOS Prompt.€3 - Type: nbtstat-IP of the guy you want to invade 4 -
appears if the person has file sharing folders on her PC. If it does not appear
: Host Not Found (the fuck is that the order to invade the computer of some guys
because of that then do not hold your breath as much as only the order to invad
e those people who have the PC file sharing folders) 5 - If it appears a lot of
weird names with this before: "<03>" you should get the name of the business you
're in <03> behind the name. 6 - Create a. Txt file named LMHOSTS. Type there: T
he guy's IP NetBios him. The NetBIOS name is the one that has the weird ago. (En
ter exactly as I typed that) 7 - Map out your hard drive so that the machine's f
ace to become part of your PC. 8 - Go to "Start" "Run" and type: / / IP_do_cara
and put "OK" 9 - Done! You invaded by IP! 10 - Tip: Never delete or modify anyth
ing just enough Fuce lammaH on things and find something interesting picks for y
ou. NOTE: There are some people who VNBT.386 rename the file in windows \ sytem
so that if someone tries to invade or nukar you can not ... , Well then you'll h
ave to rename your file but not to invade the

Potrebbero piacerti anche