This is default featured post 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Showing posts with label Mobile Hack. Show all posts
Showing posts with label Mobile Hack. Show all posts

Thursday, 9 February 2012

Satellite phones vulnerable to eavesdropping.


Security researchers in Germany cracked two encryption standards used for protecting satellite phone signals, giving the ability to eavesdrop on calls over an entire continent.

Researchers at Ruhr University Bochum in Germany cracked the encryption algorithms , known as GMR-1 and GMR-2, are standards used across satellite phone operators, including Thuraya, a leading providers. Their technology is widely used in the Middle East and Africa, including in some military applications.

"We were able to completely reverse engineer the encryption algorithms employed," The Daily Telegraph quoted Benedikt Driessen and Ralf Hund of the university as saying, "Don't Trust Satellite Phones".

According to the Telegraph report, the equipment and software needed to intercept and decrypt satellite phone calls from hundreds of thousands of users would cost as little as $2,000.

The demo takes up to half-an-hour to decipher a call, but a more powerful computer would allow eavesdropping in real time, Mr Driessen said.

The Ministry of Defence has said the crack of the A5-GMR-1 and A5-GMR-2 encryption algorithms will not affect military operations.

"All military users of mobile satellite communication systems are aware of the potential threats to such systems and are briefed explicitly that they are only authorised to pass unclassified information (both voice and data) over these systems," an MoD spokeswoman said in an email statement. "Protected information is never sent over an unclassified system, unless it is being employed in conjunction with an accredited secure device."

Saturday, 4 February 2012

Cell Phone Spy: Software to Spy on Cell Phones

                       How to Spy on Cell Phones

Is Someone Holding Secrets from You?
Reveal them All with the World’s Best Cell Phone Spy Software!


Today, there exists hundreds of cell phone spy softwares on the market, where many of them are nothing more than a crap. Some are good and only a few of them are the best. Also, each SpyPhone software has a different set of features and operating format which makes it hard for novice users (perhaps like you) to make the right choice so as to fit their spying needs.


So, in order to help our readers to find the best spy software, I have decided to give a thorough review of the Top 2 Best Selling SpyPhone softwares on the market.

1. Spy Phone GOLD – (TESTED)


2. Mobile Spy – (TESTED)






SpyPhone GOLD and Mobile Spy are the current leaders in the market which are used by thousands across the globe to spy on cheating spouse, monitor employees and keep an eye on their teens. Here is a complete review of these two products.

1. Spy Phone GOLD Review:



Spy Phone GOLD is is the No.1 spy software on the market which turns any compatible cell phone into a Spy Phone within minutes. It offers every feature that a true cell phone spy software should have. Hence most people choose Spy Phone GOLD for their cell phone spying needs.


How Cell Phone Spying Works?


After your purchase, you can directly download the installation module onto the target cell phone. Installation takes only a few minutes. After installation, each activity on the target phone is recorded and uploaded onto the SpyPhone servers. You can login to your online account from your PC to view the logs at any time. The logs contain Text messages, Contacts List, Call History, GPS Locations and many such information.

Call interception: When the target cell phone is on the conversation, you will receive a secret SMS notification on your phone. At this time you can call the target phone to listen to the live conversation going on. All this process takes place in complete stealth mode and is 100% undetectable!


Spy Phone Top Features:
Call Interception – Listen to the actual calls LIVE on the target cell phone
Environment Listening - Make a spy call to the target cell phone running SPY PHONE and listen in to the phone’s surroundings.
SMS Logging – Records both incoming & outgoing SMS
SIM Change Notification – Get instant notification via SMS when the target cell phone changes it’s SIM
Remote Control – Send secret SMS to the target phone to control all functions
Spy from any location across the world
100% Undetectable


Compatible Cell Phones:

Spy Phone GOLD is fully compatible with the following mobile phones
Nokia, LG, Samsung and Sony Ericsson Phones
BlackBerry Phones
Apple iPhones
Windows Mobile Phones

Click Here to Download Spy Phone GOLD



2. Mobile Spy Review:


Although Mobile Spy is not as feature rich as Spy Phone GOLD, it offers a good bunch of features that every spy software should have. It is a very good choice for those who are looking for a mid-range spy software at an affordable price.



How it Works?
The working of Mobile Spy is exactly same as that of Spy Phone GOLD. However Mobile Spy lacks the feature of call interception.


Mobile Spy Features
Mobile Spy offers every common feature such as recording Call Logs, SMS, GPS Locations, IM Conversations, Web Activities, Emails etc. It is very similar to Spy Phone but lacks the vital features like call recording and call interception. Thus with Mobile Spy you cannot listen to live calls on the target cell phone.


Compatible Cell phones: Mobile Spy is compatible with Nokia, Samsung, LG, Apple iPhones, Blackberry, Android and Windows Mobile Phones.

You can download Mobile Spy from the following link

Click Here Download Mobile Spy



Here is a quick comparison between Spy Phone GOLD and Mobile Spy



Which Cell Phone Spy Software to Choose?


If you want a high-end spy software with top features like call interception and call recording then Spy Phone GOLD is the right choice. Or else, if you’re looking for a mid-range spy software with basic features at an affordable price then go for Mobile Spy. So what are you waiting for? Go grab either of the two from the following links now:

1. Click Here to Download Spy Phone GOLD


2. Click Here to Download Mobile Spy 

Cell Phone Lookup: How to Do a Reverse Cell Phone Lookup

A Reverse Cell Phone Lookup is simply a process of finding someone’s personal details such as name, age, address and related information by using their cell phone number. At times it becomes necessary for us to start investigating on someone to know their personal details. The reason for this can be many – Some people may go for a cell phone lookup in order to locate their old friends, some to investigate the prank calls or to trace a suspicious number.


There exists a lot of websites on the Internet that offer reverse cell phone search, some claim to be free while others ask you a small fee for the subscription. There also exists a few directories that provide access to both landline and cell phone numbers thereby providing an all-in-one lookup service.

Since most people wish to access this information for free, they go in search of those websites which provide the reverse cell phone lookup service for free. Most scam websites take up this tendency of people as an added advantage and try to attract more and more visitors by promising them to provide the search service at a free of cost. In reality, the visitors of these websites may pick up malware programs like viruses and trojans. So you should be very careful not to visit any of such websites unless you are 100% confident about their legitimacy. Hence, in order to do a reverse cell phone lookup, you need to find a trusted website/directory service that provide information which is accurate and authentic.

Even though there is no national cell phone lookup directory available in United States due to various privacy concerns, there are still a number of top quality directories used by various private detectives, journalists and those who are in need to spy on their cheating spouse or children. These companies invest a lot of time and financial resources in gathering mobile phone and landline numbers by using both private and public sources, as well as major cell phone carrier restricted databases.

Thus by using this service it becomes just a cakewalk for anyone to find the details associated with any phone number whether it be a cell phone or a landline. The entire process of finding someone by cellphone number is very straightforward – all you need to do is just enter the phone number that you want to trace down and hit the “Search” button. You will be able to instantly view the information such as the phone owner’s name, age, mobile provider, billing address, previous addresses and more.

I recommend the following cell phone directory to search both mobile & landline and listed/unlisted residential numbers. The site is completely safe and uses a 128-bit secured access to maintain 100% privacy of the uses. All searches remains private and anonymous. Click on the following link to gain access now!

Phone Number Scan

NOTE: This works only for Unites States telephone numbers (landline and Mobile)

How to Trace Mobile Numbers

With the rapid growth of mobile phone usage in recent years, we have often observed that the mobile phone has become a part of many illegal and criminal activities. So in most cases, tracing the mobile number becomes a vital part of the investigation process. Also sometimes we just want to trace a mobile number for reasons like annoying prank calls, blackmails, unknown number in a missed call list or similar.


Even though it is not possible to trace the number back to the caller, it is possible to trace it to the location of the caller and also find the network operator. Just have a look at this page on tracing Indian mobile numbers from Wikipedia. Using the information provided on this page, it is possible to certainly trace any mobile number from India and find out the location (state/city) and network operator (mobile operator) of the caller. All you need for this is only the first 4-digit of the mobile number. In this Wiki page you will find all the mobile number series listed in a nice tabular column where they are categorized based on mobile operator and the zone (state/city). This Wiki page is updated regularly so as to provide up-to-date information on newly added mobile number series and operators. I have used this page many a time and have never been disappointed.

If you would like to use a simpler interface where in you can just enter the target mobile number and trace the desired details, you can try this link from Numbering Plans. Using this link, you can trace any number in the world.

By using the information in this article, you can only know “where” the call is from and not “who” the caller is. Only the mobile operator is able to tell you ”who” the caller is. So if you’re in an emergency and need to find out the actual person behind the call, I would recommend that you file a complaint and take the help of police. I hope this information has helped you!

How to Hack Symbian S60 Phones to Install Unsigned Applications

If you own a Nokia Symbian S60 phone, you will most likely be aware of the fact that it is not possible to install applications on it unless they are signed using a valid certificate. Have you been trying to install applications on your S60 3rd or 5th edition phone but ending up getting a certificate error? At times, this can be really annoying; but here is a smart solution to this problem!

Here in this post, I will show you how to hack your Symbian S60 3rd or 5th edition smartphone, so as to modify the phone’s firmware and completely bypass the mandatory signing requirement. So, once you are done with this one time hack, you should be able to install any compatible application including unsigned and those with an expired certificate.



What is the Need for Signing Applications?

From the 3rd edition onwards, all the Symbian S60 applications need to be signed in order to ensure their integrity, so that it would not be possible for a third party to tamper with the application. Also, signing ensures that you always install applications from a trusted source.

However, there are many freeware and beta applications that come unsigned as the developers cannot afford to buy a symbian certificate. Hence, it can be a real nightmare for the users who need to install such applications on their phones. So, here is a step-by-step procedure to hack your phone and permanently disable this security feature.


1. Download HelloOX2 V2.03 or the latest version from the HelloOX2 Ofiicial Website.

HelloOX2 is an excellent tool to hack Symbian S60 3rd, 5th and Symbian^3 smartphones which makes it possible to install a root certificate by gaining full access to the phone’s system files. With this capability, you can install anything you want on your phones without the need to worry about the annoying certificate error!

2. The signed version of HelloOX2 demands for a donation and hence, only the unsigned version is available for free download. So, if you have the unsigned version, you need to sign it before installing on your phone. In order to sign any application, you need to have the certificate and the key file which can be obtained as follows:
Go to the OPDA Website, get registered and login to your account.
Click on the “Apply Certificate” tab, enter the model number and the IMEI of your phone and then click on “Submit and Upload” button.
It will usually take up 24 hours for your certificate and key file to be generated and uploaded. To check the status of your certificate click on “My Certificate” tab. If the certificate is ready for the download you will see something as follows:



Download the certificate and the key file on to your computer. Also download the SisSigner tool to sign your HelloOX2 application.
Open the SisSigner, load the HelloOX2.sis, certificate and the key file as shown below and click on “Sign”. Leave the “Key File Password” field blank.


Your HelloOX2 application is now signed and ready for the installation.

3. Install the signed HelloOX2 application on your phone and run it to start the hacking process, which is completely automatic. Within a minute your phone will be hacked. Once this is done, say goodbye to the annoying certificate error and install any application.

I hope you like this post. Express your opinion through comments. Enjoy!!!