Search This Site

23.11.11

Display the hidden settings of Nokia mobiles

*#7780#                              To restore the factory settings of mobile set

*#3283#                               To verify the set Manufacturing date

*#746025625#                 To stop the sim clock

*#67705646#                    Use to delete the operator logo

*#73#                                     Use to reset game scores and phone timers

*#0000#                               Use to display the mobile software version

*#06#                                     To display the IMEI Number of the mobile

*#92702689#                     To display the mobile warranty related settings  (Serial   no, Made,Purchasing  date, Repaired date, Life time).

*#7760#                               To display the Production serial number

*#bta0#                                 Use to display Bluetooth MAC address

*#9999#                                Use to display the mobile software version

*#147#                                  If you are using Vodafone then this code will help you  show the last call detail

*#2640#                               To display the mobile security code

*#7328748263373738#   Apply to resets the set default security code

*#43#                                    To verify the call waiting status

*#2820#                                To verify the Bluetooth information

*#7370#                                To format the mobile phone memory

*#delset#                              To delete the GPRS AND EMAIL settings

#pw+1234567890+1#       To display the lock status of mobile set

#pw+1234567890+4#       To display the lock status of your SIM

Quickly repair your Mobile Phone dropped in water

Many of you get your mobile phone wet by one way or another. You worry as you mistakenly drop your mobile phone in water. It can also get wet if you are out in a heavy rain.  However, there is no need to panic. It is possible to save your wet mobile phone by quickly repairing it. In order to save your mobile phone from water damage, you can consider these easy and simple solutions:


Act rapidly :

The first thing you have to do in order to save your wet mobile phone is to act rapidly. Quickly remove all the detachable parts as well as covers possible such as the back cover, battery, the SIM card, memory card etc. Next, take a piece of cloth or a tissue paper to wipe the excess water you are able to notice within the mobile phone. Make sure that you dry it completely. If you don' t do this, the water inside the mobile phone will begin to evaporate and gather in places which will be difficult to reach.


This will save your wet mobile phone and it will start working if it was under water for just a little while.

Using a hairdryer :

Take a hairdryer and begin drying the mobile phone while giving more consideration to the place where the battery is located. The battery housing usually consists of tiny holes to let in air (so giving more space for water) inside the mobile phone.

Make sure that you are not holding the hairdryer very near to the mobile phone. Keeping it too close to the mobile phone may harm the electrical mechanism of the mobile phone. Keep on drying the mobile phone from a safe distance for about twenty to thirty minutes.

If solution number 1 and solution number 2 don't work, try solution number 3.

Drying for a long time:

Take off the covers as well as battery from the mobile phone. Put the phone in a dry as well as warm place to let the water inside the phone evaporate gradually from the little holes in the mobile phone.

Secure a Wireless Network from Hackers

The reason we secure a wireless network is to stop people from using the services of our network who don't have permission to utilize them. It is harder to secure a wireless network from hackers as compared to a classic wired network. This is due to the fact that a wireless network can be accessed anywhere inside the range of its antenna.


In order to secure a wireless network from hackers, we should take proper steps to save ourselves against security issues. If you don't secure a wireless network from hackers, you might end up without its service. The consequence might also include the utilization of our network to attack further networks. To secure a wireless network from hackers, you should follow these simple wireless networking tips:


1.       Strategic antenna placement:

The first thing you have to do is to position the access point's antenna in a place which restricts the range of its signal to go further than the required area. You should not put the antenna close to a window because glass can't obstruct its signals. Place it in a central location of the building.

Use WEP:

WEP stands for Wireless encryption protocol.  It's a customary technique for encrypting traffic on a wireless network. You should never skip it as that will allow hackers to get instant access to the traffic over a wireless network.

3.       Change the SSID, disable the broadcast of SSID:

SSID stands for service set identifier.  It is the recognition thread utilized by the wireless access point due to which the customers are capable of starting connections. For every wireless access point arranged, select an exclusive as well as unique SSID. Also, if it's attainable, hold back the broadcast of the SSID out over the antenna. It won\t appear in the listing of offered networks, while being able to provide services as usual.

4.       Disable DHCP:

By doing this, the hackers will have to decode the TCP/IP parameters, subnet mask as well as the IP address in order to hack your wireless network.

5.       Disable or modify SNMP settings:

Change the private as well as public community settings of SNMP. You can also just disable it. Otherwise the hackers will be able to utilize SNMP to get significant info regarding your wireless network.

6.       Utilize access lists:

For additional security of your wireless network, and if your access point support this feature, employ an access list. An access list lets us determine precisely which machinery is permitted to attach to an access point. The access points which include the access list can employ trivial file transfer protocol (TFTP) now and then in order to download modernized lists to steer clear of hackers.
Related Posts Plugin for WordPress, Blogger...