1ND14N H4X0R5 T34M (IHT) JAI HIND JAI BHARAT

We are :- DeadManINDIA,Null_Port_Govind,Haxor Rahul,EagleShadow,Karate-Katrina,Spy-Hunter,Grey-Noob,Mr.R@66!T.

A big Slute to Our Indian Armies

Freedom is not free Our Soldiers Donates theirs lifes for us

We are Indians and We are Proud to be Indians

India is great.Because their is one place in the world where Peoples Recpect all Religious.

Kali is good OS for Hacking

Peoples Says this OS is best This OS is best but no one OS like Kali Linux .

MOM and DAD

I can't saw God but When i see my MOM and DAD then i think God in there they are My Gods Love You MOM DAD.

Showing posts with label Mobile tricks. Show all posts
Showing posts with label Mobile tricks. Show all posts

Tuesday, 25 March 2014

Sim-Cloning tut

1. Buy a Sim card Reader
2.Need a Blank sim card or super sim card
3.Download Magicsim at http://www.magicsim.com/en/multi-sim.asp? new_id=6
4. Download http://www.filecart.com/Windows/System-Utilities/Backup-Restore/USB-SIM-Card-Reader- Software_1711_1.html
5. Install programs.
6. go in phone tools, select sim card, then select unlock sim, it will promt for a code.
7 call network provider, they will ask for your phone number, your account info, name and security code,
then they will ask why you want to unlock your simcard, just tell them you need to unlock your sim to get it
to work with your overseas phone or something.
8. Once they give you the sim unlock code, enter it, and it will say sim unlocked.
9. remove the sim from your phone, place it in the cardreader, click read from card in magic sim program.
10. once it says connected, select crack sim in the toolbar. click strong ki and clink all of the other find options and then click start.
11. Once your ki is found and the crack is finished, click file, save as and save your cracked sim info to a that file.
12. IMPORTANT!!! you must click disconnect from the file menu or you will ruin your simcard. once it says
disconnected, remove the sim. put it in your phone and see if it still works, it should. if not, you either did not unlock your sim, or you tried to copy it instead of crack and save.
13. insert black 3g card Use other program, not magic sim at this point.
14. click connect
15. it will say no info found if it is truly blank.
16. select write to sim, it will promt you to select a dat file, select the one you saved before, now click start, it will take about 10 minutes to write it, once it is complete, it will ask for a security code, enter the security code network provider gave you, then click finish.
17. your card is cloned. if you try to make 2 calls at the same time, one will go through, the other will say call failed, and both phones will get the same messages, text and voice, and both will recieve the same calls, but only one can talk at a time.

Monday, 24 March 2014

Bypassing AirWatch Root Restriction

Mobile devices are becoming more common in corporate environments. As a result, mobile device management solutions (MDM) have cropped up so that employers can remotely manage and wipe devices if necessary along with setting certain requirements that employees must comply with, such as setting a passcode, encrypting the device, and not jailbreaking or rooting the device. It’s certainly not a bad idea to enforce restrictions on devices that may contain sensitive information. However, bypassing some of the restrictions that an employer may put in place it not difficult. This is especially true if someone wants to keep their device rooted.  There are many contenders in the sphere of MDM software. For this blog I will be looking at AirWatch for Android. The device I will be using is a rooted Nexus 4 running Android 4.2.2.
[Note Update at End of Post - 09.13.13]

Background

AirWatch is an MDM solution that provides employers with the ability to manage mobile devices and enforce policies. An agent is installed on the device and monitors whether the device is compliant or not for specific policies. If a device is found to be non-compliant, the agent phones home to a server, notifying the employer of a non-compliant device.

Here is the default web interface for an AirWatch enrolled device. As you can see, my Nexus 4 is enrolled, is encrypted, and requires a passcode. However, it is still not compliant because my device has been “compromised,” i.e. rooted by myself. A poor word choice in my opinion. The same can be seen on the AirWatch agent.


If we navigate to the compliance section, we can see why we are not compliant.

Again, the agent shows that we are encrypted, but our device is “compromised.”

Digging Deeper

At this point I want to know how AirWatch is detecting that my phone is rooted. I tried removing the su binary and any superuser applications, but that didn’t seem to work. As a rooted phone, we can certainly grab the apk of the agent and tear it apart. That only revealed obfuscated java classes that would take a while to decipher. Next, I tried running strace against the agent process to get an idea of the calls that it is making, hoping that there would be something there that reveals what it is doing to detect root. Again, there weren’t any answers that I could find.

I decided to shelve looking for how AirWatch was detecting root for another day and instead I started focusing on the HTTP request and responses that the agent was sending and receiving. I started burp and setup a proxy on my Nexus 4. There is a fair amount of traffic that goes between the AirWatch agent and the server it’s talking to. One request in particular caught my eye.

This AirWatchBeacon checkin request. I omitted some of the more sensitive information in the request. As you can see there is an “IsCompromised” field in the request that is set as true. So I change that to false and sent the request off. After refreshing the web interface, my device is no longer compromised.

The agent also shows that my device is no longer compromised.

So now we know how the agent is checking into the server and whether or not your device is compromised. By changing a simple flag, we now control that. Furthermore, there doesn't seem to be any type of session information related with the request. We can replay the same request hours, even days later, and the server will accept it. The only downside now is that the agent will periodically do a check-in request with the server and report that the device is compromised. It’s a hassle to send a non-compromised request every time we want to be compliant. The first step I took in resolving this issue was to look at the AirWatch configuration options in its SQLite database.

Using the SQLite Editor app from the Android market, I open up the AirWatch database with root access.

Selecting the AirWatch database reveals a number of interesting tables.

The profileGroupSetting table is where most of the AirWatch configurations are stored.

There are a few rows that look interesting. The ones that contain interval in the name seem to set how often the AirWatch requests are sent. I tried changing the BeaconInterval to large values to see if it would take longer for the check in requests to be sent. That didn't seem to work. Neither did setting the value to zero or a negative value. For the most part, setting the interval values do not seem to do anything in my testing.

There is, however, another way to stop AirWatch from sending out request. Modifying the Android hosts file to block the host that the requests are being sent to. The Android hosts file is located in /system/etc/. Again, you have to be root to be able to modify the hosts file. I modified the hosts file to redirect the requested host to my localhost. The requested host is going to be different for every company, so I won’t be showing that. It’s been well over a week and my device has still not checked in and still shows that I’m compliant.

The only downside to not checking in often is that your device will show as not being seen for sometime. You employer may have a policy in place to remove devices that AirWatch shows as being inactive. One way to mitigate this is to periodically send out the checkin request yourself. Simply setting up a cronjob with curl to send out the checkin request work very well.
#!/bin/bash
 
curl -X POST -d @request https://host/DeviceServices/AirWatchBeacon.svc/checkin -H "Content-Type: application/json" -H "User-Agent: AirWatch Agent/4.0.401/Android/4.2.2" -H "Host: host"


Here is the json POST request data the curl command uses for –d @request:

{"payLoad":{"FriendlyName":"Android_sdNexus 4_353918050698915","Model":"Nexus 4","CustomerLocationGroupRef":"YourGroup","PhoneNumber":"1111111111","DeviceType":5,"C2dmToken":"APA91bHcoJnegJy23fPaa2Fg2miP0vJEuC9aVcAw9iuwKb8AQcnzr7OyiXShrJSGD_AajBPUwuSm4Y_gcuz3ibnnjfbfpkLnAnoF599IM2yZhTVaUq0XWLKFfNP11oYzIavq4OjTO5DH4y3XpkvWmQBD16qkFJEg1BFFuOA2y1SJo6aE2yILIIo","IsCompromised":"false","OsVersion":"4.2.2","SerialNumber":"1111111111","Name":"Google occam","MacAddress":"ff:ff:ff:ff:ff:ff","DeviceIdentifier":"11111111111111","AWVersion":"4.0.401","TransactionIdentifier":"a8098ea5-a54e-412f-a911-a58920a24dc7"}}

Finally add the bash script to your crontab by running “crontab –e” to edit the crontab and add the following at the end of the file:

0 */2 * * * /root/command.sh

This will cause the script to run every two hours.  Conclusion
MDM solutions are great for employers to manage mobile devices. However, they are not without their problems. Not only was I able to bypass compliance for having a rooted device, but I was also able to bypass the need to encrypt my device from the profileGroupSetting table. Bypassing compliance restrictions for AirWatch is relatively trivial after a few hours and I’m sure it is probably similar with many others MDM solutions.

Tuesday, 11 March 2014

Call Forging Trick In Moblie hacking

Call Forging:

To call someone from their own number or any number.
1. Go to http://www.mobivox.com and register there for free account.

2. During registration, remember to insert Victim mobile number in "Phone number
"field as shown below.




3. Complete registration and confirm your email id and then login to your account.
click on "Direct WebCall".




4. You will arrive at page shown below. In "Enter a number" box, select your country
and also any mobile number(you can enter yours). Now, simply hit on "Call Now"
 button to call your friend with his own number.




5. That's it. Your friend will be shocked to see his own number calling him. I have
spent last two days simply playing this cool mobile hack prank.


Note: This trick will only knowledge purpose...
         Just try this trick only known person.

Saturday, 23 November 2013

How to Bypass Android Pattern Lock

Android introduces a cool new feature to ensure protection of private data to it's users by Pattern Lock technique. It is a unique thinking , other than remembering or setting difficult combination of password characters whether in numeric or alphabetic form. Pattern lock provides a huge set of patterns to choose from. User may set any unique and different pattern according to their wish anytime.



With advantage of locking screen using this unique way , there is also a problem that sometimes many of android users have to face i.e. what if they forget the pattern they had used to lock their device or try to unlock it with wrong pattern number of times that turned device to get locked permanently ?
If you stuck in such problem so dont worry there are three methods to unlock your device.

Method 1. Unlock Lock Pattern Using Your Email




First method includes a simple way of logging in to your Google account and then getting RID of that lock pattern.This is easiest and most recommended way of unlocking your device.So if you have entered wrong pattern for 5 times and then if it is showing you the Forgot Lock Pattern option, then you can login through your Google account and bypass the lock pattern system on your device.

Method 2. Unlock Lock Pattern Using Command Prompt

If you have forgotten your email too and unable to log in to your google account then the second method could be handy that includes executing few lines of script in command prompt which will allow you to write any pattern and to get into your OS . As this method includes use of command lines , so it is not that user friendly but it is the most effective way for sure. It involves a few steps :
Step 1: Connect your Android Phone to Your Computer.
Step 2 : Open command prompt as administrator.
Step 3 : Now in command prompt window type the following code carefully exactly as it is and then press  enter.
adb shell
cd /data/data/com.android.providers.settings/databases
sqlite3 settings.db
update system set value=0 where name='lock_pattern_autolock';
update system set value=0 where name='lockscreen.lockedoutpermanently';
.quit
 Step 4 : Now you will some screen as shown below and then you can reboot your phone and now when your will start again then try unlocking your phone using any random lock pattern and it will work pretty fine.
Step 5 : If you face any problem repeat same steps but instead of the above code try using adb shell rm /data/system/gesture.key and then press enter and now try rebooting your device to see if it works.

 Method 3. Unlock Using Hard Reset Option

Hard Reset is an inbuilt feature of android phones and tablets and every device has it. This method will unlock your device but will remove all user's data and settings as well. You should use this method when none of the above methods work for you and you need to unlock your device urgently. This will remove only the data from phone memory and not from the SD card available in phone.
It involves a few steps to unlock device :
Step 1 : Switch off your phone.
Step 2 : Now while turning your phone on , you need to press some specific combination of keys. Generally it is volume up + power button in many of the android devices so try them first and if they dont work for you so here are list of some popular device combination keys or else better way is to google it.
  • Nexus 7 - Volume Up + Volume Down + Power
  • Samsung Galaxy S3 - Volume Up + Home + Power
  • Motorola Droid X - Home + Power 
Step 3 : Now when your phone starts up and you see the logo of your phone , leave the power but but continue holding the volume up button until you see android recovery screen.

you will see some screen like shown above. Just navigate to wipe data/factory reset using volume keys and then press Power button to select it.
Step 4 : You will see a screen as shown below :
Step 5 : After you reach to Yes option , select it by using power switch and then it will erase all data on your phone and will unlock it and so ready to be used once again .
So these were possibly all methods for unlocking Android device and to Bypass the pattern lock of android device but if you know any other methods so please do comment below and I will add your method too .

Friday, 22 November 2013

Balance transfer codes for all Indian network operators in Network Tricks

Vodafone Balance Transfer Trick


  • Dial *131*Amount*target Vodafone mobile number#  [eg: *131*50*9052XXXXXX#]
  • Terms and conditions: Charges Rs.1/- for balance transfer

Airtel Balance Transfer Trick

  • Dial *141# and follow the instruction
OR
  • Dial *141*1*Amount*target mobile number# [eg: *141*1*5*9910XXXXXX#]

BSNL Prepaid Balance Transfer Trick

  • SMS  GIFT  target BSNL number amount to 53733 or 53738 [eg: GIFT 949XXXXXXX 50 ] 
  • Terms and Conditions apply.


Idea Balance Transfer Trick

  • Dial *567*target mobile number*amount# [eg:*567 *9092 XXXXXX*50#] Finish.
  • Term and Conditions: You will be charged Rs/- 2 for this transaction.

Tata Docomo Balance Transfer Trick

  • Dial *363# , select first option to share talktime.
  • Charges may vary depending upon amount to be transfered!
  • Balance should be greater than 15 Rs.

Uninor Balance Transfer Trick

  • Dial *202*target mobile number*amount# [eg: *202*962XXXXXXX*50#] 
  • Terms and Conditions: Minimum balance should be rs.5/-

Aircel Balance Transfer Trick

  • Dial *122*666# and follow the instructions. 
  • You can transfer 10, 20 Or 100 rupees of balance.

How to Track Cell Phone

Cell Phone Tracking Services

Many popular tracking software are available that can help you to trace a cell phone's whereabouts. All these apps have the basic GPS tracking, message tracker, call tracking, and website browsing tracker. Apart from these, there are other important features that help you in your cause. Here are five popular tracking apps/software.


My Mobile Watchdog (Free 7-day Trial)

◆ As the name suggests, it is a watchdog that will keep a watch on all the activities of a particular cell phone.

◆ You can monitor phone calls, text messages, and MMSes. You will receive instant notifications regarding your child's activities via email or text messages.

◆ If you are suspicious about a friend of your child, you can set alerts for that contact. Your child's contact list will be copied onto your master contact list. So, you can mark "Allow" or "Alert" and only then you will be authorized to make changes to this list.

◆ Internet can be a bane, if not used appropriately. You can block websites which you do not find appropriate enough for your child's usage. And if your child attempts to browse the blocked website, you will be notified about the same.

◆ Phones can be a distraction during study time. Now, you can set time blocks during which your child will be allowed to make only emergency calls and calls to some important numbers, like yours.

◆ One of the best features the software has is a tracker that alerts you whenever there are certain keywords included in a text message sent or received on the phone.

◆ Also, you can block the inbuilt apps, like social networking apps, instant messaging apps, gaming apps, etc. Only if the correct password is provided will the app unblock. My Mobile Watchdog claims their products are in use by the F.B.I. and Homeland Security services, which gives them quite a credibility boost.

Mobile Monitor (Free version is available)

◆ Apart from the regular call, messaging, email, images, audio, and video tracking, Mobile Monitor lets you track many other activities of the target phone.

◆ All it takes is a few minutes with the target phone to install the software onto it, and then connect to the receiving end dashboard via the Internet.

◆ If you are using an iOS, you will be familiar with the Viber feature which allows you to make free calls and messages. All the text messages, call data, and images that are shared can be logged.

◆ Skype is the most used app for video calling and can often be used for all the wrong reasons. All the text messages exchanged and calls made/received on Skype can be monitored.

◆ Even iMessage cannot escape the monitoring of Mobile Monitor. iOS users enjoy free messaging over 3G or Wi-Fi using this app. You can view all the messages that are sent/received using this app.

◆ In case of thefts, it is often the case that the SIM card is replaced by a new one. Now, you don't need a separate theft tracker device. This software will alert the monitoring device about SIM change, and you will also get information about the number of the new SIM card.

◆ In similar situations, you can rest assured that your private data has not been viewed by the thief. All this data is safe with you. In case you have forgotten the device, you can reset or restart the device by sending an SMS to it.

Friday, 1 November 2013

How to track a cell phone ?

How to track a cell phone

If you are searching for a way to monitor the activities in the smartphones you gave to your kids or employees, you have found just the right tool with mSpy. The application is undetectable to the user of the target device unless you tell them about it. You get the easiest way to keep track of all calls, text messages, email exchange, background noise, browsing history and GPS location.
You need to download mSpy on the target phone and it will automatically be activated. You then create an online account that will allow you to access the information you want on that particular device. All records are uploaded to the server and you can view it 24/7. This cell phone tracking app is compatible with iPhone, Android, Windows and Blackberry phones.
Users who had spying software earlier were only able to access text messages and call logs. With the growth of modern technology, mobile spying has also progressed. GPS has become very important in terms of safety because it provides you with the details of targeted devices location. Text messages are recorded whether they are sent, received or deleted. You can also see the details of the sender and the time it was sent. If it is in the contacts of the device, then you will see the name of the sender.

Call logs are accessible and you get to choose if you want to listen to the recordings or simply listen to live calls. You also get the same access for the details as with the messages. If you want to restrict a particular number from making calls to the target device, you can do so using mSpy. The following are the main features of this cell phone spy:

  • Read all emails whether it is incoming, outgoing or deleted
  • Watch videos and view photos without the user knowing 
  • Check bookmarks and browsing history on the target device. This applies to all the websites that were visited
  • Check all activities of the instant messaging applications like Skype or WhatsApp
  • Listen to and record the background noises, so you have an idea of what is going on near the device being tracked 
  • You can have an access to all the contents of the address book as well as the calendar 
  • No icons which can indicate the application will be showing on the device, so you have no worries that it can be found and deleted by target person. 

mSpy is used by :


  • Spouses who suspect their partners of cheating – installing mSpy on your partner’s phone will allow you to confirm if there is cheating from their side that may jeopardize your relationship. There will be no indication that you are doing so since the app is undetectable. 
  • Parents who want to keep their kids safe – young people who use smartphones do not necessarily tell parents everything, so it is up to the parents to ensure that there are no improper activities going on when the kids use the mobile phone for texting, calls, emails or exchanging photos or videos. 
  • Employers who want to monitor their employees – companies have been issuing mobile devices to their employees to keep in constant contact with them. But there is a risk of information being accessed by a competitor or a third party who can use it against the company. Installing mSpy on all mobile phones will ensure the safety of company’s information. 
As a whole, mSpy is a must for parents and employers as it is the simplest and stress-free way oftracking the smartphones. It has the best features available for mobile spy and will give the best value for your expense at only $39.99 per month.

Incoming Search terms:

  • how to track a cell phone
  • how to track a mobile phone
  • cell phone tracking software
  • mobile phone tracking
  • tracking cell phone
  • tracking mobile phone

Wednesday, 30 October 2013

Check any prepaid mobile number call detail online

Hey all of my friends welcome again now you can see any prepaid or postpaid mobile call detail online for last up-to 15 days back call detail.you can see your compliant also.You can manage your account also.See balance of any prepaid mobile no.Simply register on your mobile operator site given link below and see your call detail etc online for prepaid user.
Links For various mobile Operator Services Online For Prepaid Mobile Holder…You Can Atleast Take Printshot With Your Name, Address & Mobile No. By Registering My online Services & Giving Few Details Such As Mobile No. Email Id And Login ID…Check & Register Ur Prepaid Mobile No.And Get Helpful Document For requirement In Exit Process…
Vodafone India:-
https://myvodafone.vodafone.in/portal/page/portal/myvodafoneselfcare/registration
Videocon India:-
http://180.214.158.66:40000/loadLoginSelfRegistrationAction.do
Air-tel India:-

https://ebpp.airtelworld.com/cares/wps/myportal?__utma=1.1302916359.1350913517.135091
BSNL Mobile:-
http://portal.bsnl.in/portal/aspxfiles/registration.aspx
IDEA Mobile:-
https://care.ideacellular.com/wps/portal/Registration
TATA DOCOMO:-
http://www.tatadocomo.com/myaccount.aspx
For Reliance Mobile:-
http://myservices.relianceada.com/ImplLoadUserRegistrationAction.do
Aircel Mobile:-
http://www.aircel.com/AircelWar/appmanager/aircel/tn

MICRO SD Memory Card Password Recovery / removing 4 method.

MICRO SD Memory Card Password Recovery / removing 4 method. 

Solution 1:

For Symbian Mobiles:
1. Download and Install  FExplorer
2. Insert your card into your phone, without accessing it through the phone
3. Run FExplorer and Open the path C:\system
4. Find the file called mmcstore, and rename it mmcstore.txt
5. Copy that file (mmcstore.txt) to your PC and open it in Notepad
6. Your password will be located within that file.


Solution 2:

For Symbian Mobiles:

1. Download and Instal X-Plore
2. Now open the X-Plore and press Zero(0) then check you have marked the
    "Show the System Files".
3. After you done the above step now go to the file:
    C:/Sys/Data/Mmcstore
4. If you found the above path then press the option "3" to set the Hex-Viewer.
5.  Now look the third column you can see the code like ! TMSD02G (c ??”? x???3?3?3?3?3) 
Now see the characters between '?' because it is your password 33333.
6. You mayn't able to access the path file:
    C:/Sys/Data/Mmcstore
    if you don't set the password for the memory card. 

 

Solution 3:

For Micro SD:
Put the card in any E series mobile or N95 etc and format it.

It will not ask for a password.


Solution 4:

1. Go to file manager on your mobile 
2. In Settings choose system folders, 
3. In the System folder, find a file called mmcstore 
4. Send the file to your PC using IR/Bluetooth 
5. Open the file in Notepad 
6. The password you need for your memory card is located within that file

Tuesday, 6 August 2013

|| HOW TO ROOT GALAXY MEGA 5.8 GT-I9152 100% WORKING ||

|| HOW TO ROOT GALAXY MEGA 5.8 GT-I9152 100% WORKING ||

Hello friends their have been lot of people who have tried many rooting their galaxy mega 5.8 but ver not successful

But now we have a 100% working method to root galaxy mega 5.8

Requirements

1. Odin 3.7 Download from here
2. I9152-JB_4.2.2-boot.tar download from here

Procedure to Root Samsung Galaxy Mega 5.8
1. Download all the 2 files on your computer to root Samsung Galaxy Mega 5.8.
2. Extract “Odin.zip” on the desktop and place “I9152-JB_4.2.2-boot.tar” in it.
3. Switch Off your phone, take out the battery and insert it back. Now boot your phone into Download Mode by pressing and holding the “Volume Down + Home button“ together, and then press the “Power button“ till you see the Android Construction logo. Once again press “Volume Up” button to confirm.
4. Open “Odin.exe” (from extracted folder) and connect your phone via USB cable to your computer in download mode. If your phone is connected successfully the one of the ID:COM boxes will turn yellow/green.
5. Click on “PDA” button and select file “I9152-JB_4.2.2-boot.tar” (from extracted folder).
6. Please make sure that only “F. Reset Time“ and “Auto Reboot“ options are checked on Odin.
7. Now, click on the Start button on Odin to start the installation process. Installation will take a few minutes to complete so please wait for the complete process.
8. Finally, when the installation process is completed successfully you will see the “PASS” message on Odin and then your device will reboot automatically. Now, you can disconnect your phone from computer.
That’s it! You have successfully Rooted Samsung Galaxy Mega 5.8.

You can install any app required root access to check if its rooted or not

Note:- Method tested on my galaxy mega 5.8 and it worked 100 %

Thanks to oldmanhp from xda for making this possible
source:-xda

Tuesday, 11 June 2013

hack ur friends mobile with sms

 hack ur friends mobile with sms
Amazing trick to restart your
friends mobile via SMS.......
Hey frnds today i have brought a very very very awesome nd cool trick for u all when i saw this tricki was very much impresed.
This trick for those who likes to doing fun
with friends.
Now I show you how to restart your friends
mobile via simple sms.
You can send message to friend they received
your message then his mobile willbe
restart…. Simple and easy trick butit’s
working only for
Nokia 1100,1110,1112 and more sets like this.
Follow these simple procedure /b> 1. Go to
message box. 2. Write a new message. 3. Type
79 time ( , )Commas in message
then send to any friend. Example:,,,,,,,­,,,,,,,, ­,,
Totall 79 commas and send to your friend.

create virus using phone !!!!

 create virus using phone !!!!

How to make a txt message virus uring mobile phone???
This is question by one of our member !!
but here is the Solution :-
Step1. Make sure that the sim cardyou are using is not Familiar to the person you want to virus.
we suggest you to used brand new Simcard
Step 2.Load The simcard. at least 30.00 so you can register it to UNLITXT Promo
You can do it to any Network like SUN or Smart
Step 3.Prepare your weird random txt character.you can create your own language,
Whatever that will looks like a programming language, Use you creativity
Samle Character¦ Cellphone Virus
<.>Script/­ ­<>%100.15.25.000 ­.87.:"Fatal Error"
Begin<>Virus Name=I Love You^xrun ? Yes
/­ ­Void-Progindex{N­ ­okia+32bits#.0­0 ­000&%>
Str:STOP/ ­Config-Never>
<>
Step 4.Get the cellphone Number of the person you want to Virus
Step 5. Start Sending The Virus you Created
Step 6. Do the sending in Full Accelerations and Frequecy (YOu can send the message in 100times per hour or do it in whole a day process!)
By overdoing this. the number where you send the message cantused its cellphone properly because of the abnormal messages that keep popping every seconds or minutes.
This will result.Text message Delayfrom its realtime Text Messages from Important contacts he have.Even permitted calls will affect the Procedure you made.
Virus Effect:
1.Text Message Receive Failures
2.Consistent Phone Ring
3.Easy Battery Low
4.Frequent Charging
5.Busy or always UN available Line
6.Your Favorite!! " Sweet Vengeance" the person is now irritated and 100% mad!!!
with no clue who is sending that Freaking Message,
YOu can deactivate all your incoming calls so the person can not make a return calls to trace Number of the Cellphone where the virus where came from.
That's it!! You can Now have your sweet Revenge!!!!to the person you hated most!!
Hope you like our Trick
thnx!!