MACHU
Wednesday, 15 June 2011
MACHU: How to Spying Other Peoples Conversations with you...
MACHU: How to Spying Other Peoples Conversations with you...: "How to Spying Other Peoples Conversations with your nokia cell phone 1. Activate the 'Automatic Answer' in the headset profile of your cell..."
How to Spying Other Peoples Conversations with your cell phone
How to Spying Other Peoples Conversations with your nokia cell phone
1. Activate the "Automatic Answer" in the headset profile of your cellphone and set the ringing volume to "Mute"
2. Short-circuit the left middle and right pins on the bottom of the mobile phone with all connections touching each other this will activate profile "Headset".
If you cant do this just keep your earphone connected to mobile.
3. Now place it under a table in a room and call it. Now you can use your phone for checking out what people are talking about in a room. Just call on your phone.
4. Your nokia Mobile phone receives the call without ringing and you can listen to what people are saying.
2. Short-circuit the left middle and right pins on the bottom of the mobile phone with all connections touching each other this will activate profile "Headset".
If you cant do this just keep your earphone connected to mobile.
3. Now place it under a table in a room and call it. Now you can use your phone for checking out what people are talking about in a room. Just call on your phone.
4. Your nokia Mobile phone receives the call without ringing and you can listen to what people are saying.
- Note: This secret trick wont work with other phones Models
Tuesday, 17 May 2011
MACHU: HACKER..............
MACHU: HACKER..............: "Web Application Vulnerability Characteristic chandhu.sevenstar@gmail.com Affects all Web applications: •Exists in your own applicatio..."
Sunday, 17 April 2011
HACKER..............
Web Application Vulnerability Characteristic
| chandhu.sevenstar@gmail.com |
Affects all Web applications:
•Exists in your own application, not the operating system
•Can exit regardless of the Web server, operating system, configuration,
or patch level
Extremely easy to exploit:
• Sometimes requires nothing more than a Web browser
• Orders of magnitude easier than buffer overflows
Difficult to deal with at the perimeter:
•SSL Encrypted Traffic , Huge Volume
•Rules granular to each input on each page, change as app changes
More detail click this E-mail address: chandhu.sevenstar@gmail.com
More detail click this E-mail address: chandhu.sevenstar@gmail.com
Subscribe to:
Comments (Atom)