Archive for May 2015
Internet Download Manager 2015
Internet Download Manager is the choice of many, when it comes to increasing download speeds up to 5x. IDM has a clever download logic accelerator that features intelligent dynamic file segmentation and incorporates safe multipart downloading technology to increase the speed of your downloads. IDM reuses available connections without additional connections to gain the best acceleration performance.
Finger Scanner Software
ASSALAMO ALAIKUM :My name is Umair ali and i am Bring a Free Finger Scanner Software Free download . This is 2015 Finger Scanner Software and So Enjoy the Finger Scanner Software Free download .
![]() |
| Finger Scanner Software |
Step No.1:
First download below document and read the how to install the finger scanner software
How to become a Hacker?
Hacking is an enggaging field but it is sureily not easy too much. To become a hacker one has to have an attitude and curiosity of learning and adapting new skills. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and on. Some people think that a hacker is always a criminal and do illegal activities but they are wrong. Actually many big companies hire hackers to protect their systems and information and are highly paid. We have prepared a list of 12 most important steps necessary to become a hacker, have a deeper look
1. Learn UNIX/LINUX
UNIX/LINUX is an open source operating system which provides better security to computer systems. It was first developed by AT&T in Bell labs and contributed a lot in the world of security. You should install LINUX freely available open source versions on your desktops as without learning UNIX/LINUX, it is not possible to become a hacker.
2. Code in C language
3. Learn to code in more than one Programming Language
It is important for a person in the hacking field to learn more than one programming. There are many programming languages to learn such as Python, JAVA, C++. Free eBooks, tutorials are easily available online.
4. Learn Networking Concepts
Another important and essential step to become a hacker is to be good at networking concepts and understanding how the networks are created. You need to know the differences between different types of networks and must have a clear understanding of TCP/IP and UDP to exploit vulnerabilities (loop holes) in system.Understanding what LAN, WAN, VPN, Firewall is also important.
You must have a clear understanding and use of network tools such as Wireshark, NMAP for packet analyzing, network scanning etc.
5. Learn More Than One Operating Systems
It is essential for a hacker to learn more than one operating system. There are many other Operating systems apart from Windows, UNIX/LINUX etc. Every system has a loop hole, hacker needs it to exploit it.
6. Learn Cryptography
To become a successful hacker you need to master the art of cryptography. Encryption and Decryption are important skills in hacking. Encryption is widely done in several aspects of information system security in authentication, confidentiality and integrity of data. Information on a network is in encrypted form such as passwords. While hacking a system, these encrypted codes needs to be broken, which is called decryption.
7. Learn more and more about hacking
Go through various tutorials, eBooks written by experts in the field of hacking. In the field of hacking, learning is never ending because security changes every day with new updates in systems.
8. Experiment A Lot
After learning some concepts, sit and practice them. Setup your own lab for experimental purpose. You need a good computer system to start with as some tools may require powerful processor, RAM etc. Keep on Testing and learning until you breach a system.
9. Write Vulnerability (Loop hole program)
Vulnerability is the weakness, loop hole or open door through which you enter the system. Look for vulnerabilities by scanning the system, network etc. Try to write your own and exploit the system.
10. Contribute To Open Source Security Projects
An open source computer security project helps you a lot in polishing and testing your hacking skills. It’s not a piece of cake to get it done. Some organizations such as MOZILLA, APACHE offer open source projects. Contribute and be a part of them even if your contribution is small, it will add a big value to your field.
11. Continue never ending Learning
Learning is the key to success in the world of hacking. Continuous learning and practicing will make you the best hacker. Keep yourself updated about security changes and learn about new ways to exploit systems
12. Join Discussions and meet hackers
Most important for a hacker is to make a community or join forums, discussions with other hackers worldwide, so that they can exchange and share their knowledge and work as a team. Join Facebook groups related to hacking where you can get more from experts.
Regards: Umair Ali
Here is CMD Commands 2015 – I’m going to share list of all CMD Commands 2015 : Command Prompt is one of the most powerful tools in Windows. Things were not always like this; but with the advent of GUI based operating systems, people started feeling that computing through command based tools was boring. This ultimately lead the command prompt into obscurity.
List of All CMD Commands 2015 :-
- First of all open the CMD by clocking on START > RUN > CMD.
- Then type these CMD Commands 2015 :-1. Accessibility Controls – access.cpl
2. Accessibility Wizard – accwiz
3. Add Hardware Wizard – hdwwiz.cpl
4. Add/Remove Programs – appwiz.cpl
5. Administrative Tools – control admintools
6. Automatic Updates – wuaucpl.cpl
7. Bluetooth Transfer Wizard – fsquirt
8. Calculator – calc
9. Certificate Manager – certmgr.msc
10. Character Map – charmap
11. Check Disk Utility – chkdsk
12. Clipboard Viewer – clipbrd
13. Command Prompt – cmd
14. Component Services – dcomcnfg
15. Computer Management – compmgmt.msc
16. Control Panel – control
17. Date and Time Properties – timedate.cpl
18. DDE Shares – ddeshare
19. Device Manager – devmgmt.msc
20. Direct X Troubleshooter – dxdiag
21. Disk Cleanup Utility – cleanmgr
22. Disk Defragment – dfrg.msc
23. Disk Management – diskmgmt.msc
24. Disk Partition Manager – diskpart
25. Display Properties – control desktop
26. Display Properties – desk.cpl
27. Dr. Watson System Troubleshooting Utility – drwtsn32
28. Driver Verifier Utility – verifier
29. Event Viewer – eventvwr.msc
30. Files and Settings Transfer Tool – migwiz
31. File Signature Verification Tool – sigverif
32. Findfast – findfast.cpl
33. Firefox – firefox
34. Folders Properties – control folders
35. Fonts – control fonts
36. Fonts Folder – fonts
37. Free Cell Card Game – freecell
38. Game Controllers – joy.cpl
39. Group Policy Editor (for xp professional) – gpedit.msc
40. Hearts Card Game – mshearts
41. Help and Support – helpctr
42. HyperTerminal – hypertrm
43. Iexpress Wizard – iexpress
44. Indexing Service – ciadv.msc
45. Internet Connection Wizard – icwconn1
46. Internet Explorer – iexplore
47. Internet Properties – inetcpl.cpl
48. Keyboard Properties – control keyboard
49. Local Security Settings – secpol.msc
50. Local Users and Groups – lusrmgr.msc
51. Logs You Out Of Windows – logoff
52. Malicious Software Removal Tool – mrt
53. Microsoft Chat – winchat
54. Microsoft Movie Maker – moviemk
55. Microsoft Paint – mspaint
56. Microsoft Syncronization Tool – mobsync
57. Minesweeper Game – winmine
58. Mouse Properties – control mouse
59. Mouse Properties – main.cpl
60. Netmeeting – conf
61. Network Connections – control netconnections
62. Network Connections – ncpa.cpl
63. Network Setup Wizard – netsetup.cpl
64. Notepad – notepad
65. Object Packager – packager
66. ODBC Data Source Administrator – odbccp32.cpl
67. On Screen Keyboard – osk
68. Outlook Express – msimn
69. Paint – pbrush
70. Password Properties – password.cpl
71. Performance Monitor – perfmon.msc
72. Performance Monitor – perfmon
73. Phone and Modem Options – telephon.cpl
74. Phone Dialer – dialer
75. Pinball Game – pinball
76. Power Configuration – powercfg.cpl
77. Printers and Faxes – control printers
78. Printers Folder – printers
79. Regional Settings – intl.cpl
80. Registry Editor – regedit
81. Registry Editor – regedit32
82. Remote Access Phonebook – rasphone
83. Remote Desktop – mstsc
84. Removable Storage – ntmsmgr.msc
85. Removable Storage Operator Requests – ntmsoprq.msc
86. Resultant Set of Policy (for xp professional) – rsop.msc
87. Scanners and Cameras – sticpl.cpl
88. Scheduled Tasks – control schedtasks
89. Security Center – wscui.cpl
90. Services – services.msc
91. Shared Folders – fsmgmt.msc
92. Shuts Down Windows – shutdown
93. Sounds and Audio – mmsys.cpl
94. Spider Solitare Card Game – spider
95. SQL Client Configuration – cliconfg
96. System Configuration Editor – sysedit
97. System Configuration Utility – msconfig
98. System Information – msinfo32
99. System Properties – sysdm.cpl
100. Task Manager – taskmgr
101. TCP Tester – tcptest
102. Telnet Client – telnet
103. User Account Management – nusrmgr.cpl
104. Utility Manager – utilman
105. Windows Address Book – wab
106. Windows Address Book Import Utility – wabmig
107. Windows Explorer – explorer.
An Android operating system is most widely used in the world. Android developers also creates many backdoor through which you can enter into the system and you can change settings. It is not meant to be used these backdoor for malicious intent because developers blocked some modes and these backdoor are the way or allow the users to enter into the system and let you become familiar to the system. In smartphone these backdoor are calledsecret codes. These are the numeric/symbolic sequences which allow you to access system settings for several uses. So here we collect some Secret Hidden Codes for Android 2015. May be some of them not work on specific device but you can try it if you can !
List of all Android Secret or Hidden Codes 2015 :-
#1 Common Android Secret Codes :
| Codes | Functioning |
|---|---|
| *#*#7780#*#* |
|
| *2767*3855# |
|
| *#*#197328640#*#* |
|
| *#*#4636#*#* |
|
| *#*#34971539#*#* |
|
| *#*#7594#*#* |
|
| *#*#273283*255*663282*#*#* |
|
| *#*#8255#*#* |
|
| *2767*4387264636* |
|
| *#0228# |
|
| *#12580*369* |
|
| *#32489# |
|
| *#273283*255*3282*# |
|
| *#3282*727336*# |
|
| *#8736364# |
|
#2 WLAN, GPS and Bluetooth Test Android Secret Codes :
| Codes | Functioning |
|---|---|
*#*#526#*#*
*#*#528#*#*
*#*#232339#*#*
|
|
| *#*#232338#*#* |
|
| *#*#1472365#*#* |
|
| *#*#1575#*#* |
|
| *#*#232331#*#* |
|
| *#*#232337#*# |
|
#3 Firmware version information :
| Codes | Functioning |
|---|---|
| *#*#1111#*#* |
|
| *#*#2222#*#* |
|
| *#*#4986*2650468#*#* |
|
| *#*#1234#*#* |
|
| *#2263# |
|
| *#9090# |
|
| *#7284# |
|
| *#872564# |
|
| *#745# |
|
| *#746# |
|
| *#9900# |
|
| *#*#44336#*#* |
|
| *#03# |
|
| *#3214789# |
|
#4 Factory Tests Android Secret / Hidden Codes 2015 :
| Coding | Functioning |
|---|---|
| *#*#0283#*#* |
|
| *#*#0*#*#* |
|
*#*#0673#*#*
*#*#0289#*#*
|
|
| *#*#0842#*#* |
|
| *#*#2663#*#* |
|
| *#*#2664#*#* |
|
| *#*#0588#*#* |
|
| *#*#3264#*#* |
|
| *#0782# |
|
| *#0589# |
|
| *#7353# |
|
#5 PDA and Phone Android Secret or Hidden Codes 2015 :
| Codes | Functioning |
|---|---|
| *#*#7262626#*#* |
|
| *#06# |
|
| *#*#8351#*#* |
|
| *#*#8350#*#* |
|
| **05***# |
|
| *#301279# |
|
| *#7465625# |
|
#6 Other Android Secret Codes 2015 :
| Codes | Functioning |
|---|---|
| *#0*# |
|
| ##7764726 |
|
| 1809#*990# |
|
| 3845#*920# |
|
Note:- Some of these codes can reason for serious changes on your device assortment so please be advised run these codes on your own risk and don’t play with them if you don’t have sufficient knowledge about them.










.jpg)







