Saturday, August 11, 2012

NOKIA MOBILE HACK


Imagine your cell battery is very low, you are expecting an important call and you don’t have a charger. Problem? Problem?? Problem??? Problem?????


Nokia instrument comes with a reserve battery. To activate, key is “*3370#


Ur cell will restart with this reserve and ur instrument will show a 50% increase in battery.This reserve will get charged when u charge ur cell next time.


*3370# Activate Enhanced Full Rate Codec(EFR)-Your phone uses the best sound quality but talk time    is reduced by approx 5%
 #3370# Deactivate Enhanced Full Rate Codec( EFR)
 *#4720# Activate Half Rate Codec – Your phone uses a lower quality sound but you should gain approx 30% more Talk Time
 *#4720# Deactivate Half Rate Codec

Thursday, August 9, 2012

Finger Multiplication of 9


More and more in my teaching career, I'm seeing that children no longer memorize their multiplication tables. With the math curriculum as extensive as it is, teachers cannot afford to take the time to ensure that students learn the basic facts. Parents are partners in the process and will have greater opportunities for their children to succeed in math if they support the learning of the basics at home. Work with your children to ensure that they do not fall between the cracks. Help your children learn the facts. There are many tricks to teach children multiplication facts in mathematics. Some tricks that I used to use in my classroom are listed here. If you know of some that I may have missed, drop into the forum and let everyone know. I'll add them to this list as I see them.

 1. Hold your hands in front of you with your fingers spread out.












2. For 9 X 3 bend your third finger down. (9 X 4 would be the fourth finger etc.)



 













 
3. You have 2 fingers in front of the bent finger and 7 after the bent finger.






























































































































   













4. Thus the answer must be 27.

5. This technique works for the 9 times tables up to 10.

Wednesday, August 8, 2012

TROJAN SOFTWARES


Tools Description of Trojans - Trojan Softwares
 1.Beast
Beast is a Windows-based backdoor trojan horse more commonly known in the underground cracker community as a RAT (Remote Administration Tool). Beast was one of the first trojans to feature a 'reverse connection' to its victims and once established, it gave the attacker complete control over the infected computer.

----------------WANT TO DOWNLOAD THIS TROJAN BE MY MEMBER----------------
2.Back Attack
Back Attack is a Windows Based Trojan horse, which can also be called as Remote Administration Tool.

----------------WANT TO DOWNLOAD THIS TROJAN BE MY MEMBER----------------
3.Back Orifice
BackOrifice Trojan when installed on a Microsoft Windows system, this backdoor trojan horse program allows others to gain full access to the system through a network connection

----------------WANT TO DOWNLOAD THIS TROJAN BE MY MEMBER----------------
4.Donald Dick
Backdoor Donald Dick 1.52 is a Trojan that opens up a backdoor program that, once installed on a system, permits unauthorized users to remotely extract passwords, edit the registry, log keystrokes, etc. Donald Dick runs from the server file "c:\WINDOWS\SYSTEM\pnpmgr.pci" over the ports 23476 and 23477 via TCP.

----------------WANT TO DOWNLOAD THIS TROJAN BE MY MEMBER----------------
5.Girl Friend
The Girlfriend trojan horse is one of many trojan horse programs that attackers can use to access your computer system without your knowledge or consent.

6.Net Bus
The Netbus trojan is one of the most famous trojans around. Its authored by Carl-Frederik Neikter that is very similar to the "Back Orifice" trojan distributed by CdC. It allows ANYONE running the client portion to connect and control ANYONE running the server portion of it, with the same rights and privileges as the currently logged on user.

----------------WANT TO DOWNLOAD THIS TROJAN BE MY MEMBER----------------
7.Snow Door
Snow Door is a trojan program with help of this hacker can gain access of Victim.

----------------WANT TO DOWNLOAD THIS TROJAN BE MY MEMBER----------------
8.Sub Seven
Sub7 or Subseven Gold (also known as Backdoor-G and all of its variants) is the most well known Trojan backdoor application available. You can download the setup-file of Sub7 from anywhere.

----------------WANT TO DOWNLOAD THIS TROJAN BE MY MEMBER----------------