Proxy > Gmail Facebook Yahoo!

Microsoft – Adobe partnering plans rumored



Microsoft CEO Steve Ballmer was reported to have visited the offices of Adobe CEO Shantanu Narayen, ostensibly to discuss strategies to counter Apple's dominance of the smart phone market. However, rumor mills have been speculating that the hour-long meeting discussed more than just that, including possibility of Adobe being acquired by Microsoft.

windowsphone7Most reports in the media centered around Microsoft's interest in Adobe from yesteryears, a period before Apple and Google became giants, which did not progress beyond the pleasantries on account of Microsoft's belief that the Justice Department would not allow an acquisition on account of anti-trust regulations.

Interestingly, Ballmer's visit to Narayen's office comes at a time when he and Ralph de la Vega, President & CEO of AT&T Mobility and Consumer Markets are scheduled to address a joint press conference in New York to discuss the latest developments for Windows Phone 7, on Monday. The smart phone platform moved to manufacturers in September, and the press conference is being viewed as a step in the run up to the official launch. Microsoft had launched its last phone offering, the Kin, with Verizon Wireless earlier in the year, only to kill the product line within launch despite billions in investment. 
[Read More...]


Oracle and IBM collaborate for open source Java



IBM has said that it will collaborate with Oracle to contribute to the Open JDK community in the development of the open source Java environment. The two companies will collaborate to help developers and customers build and innovate, based on existing Java investments and the OpenJDK reference implementation.

acqusition1Java is a general-purpose software development platform designed to be open and enable application developers to "write once, run anywhere." It is widely used in business software, web and mobile applications. Specifically, the companies will collaborate in the OpenJDK community to develop the leading open source Java environment, IBM said in a statement, making the community the primary location for open source Java SE development.

The collaboration will center on the OpenJDK project, the open source implementation of the Java Platform, Standard Edition (Java SE) specification, the Java Language, the Java Development Kit (JDK), and Java Runtime Environment (JRE). IBM said that both companies will support the recently announced OpenJDK development roadmap, which accelerates the availability of Java SE across the open source community.
[Read More...]


Nokia switches platforms in a bid to change track; Users revolt



Nokia has announced that it is ditching open source Meego, the platform it was developing for its smart phone line up, in favor of Microsoft's Windows Phone 7.

Reports pegged the number of smart phones sold by Nokia at around 30 million per quarter. The volume marks a definite win for Microsoft's Windows Phone platform, which had seen its market share plummet to dismal levels after competition from Android and Apple's iPhone.

event_BallmerElop_heroHowever, markets seemed not to share Nokia CEO Stephen Elop's buoyant view about the prospect of Nokia running Windows Phone 7. Reports on February 11 said Nokia's shares were in free-fall, dropping as much as 14 percent on the belief that the move would sink the company's prospects and erode its position. Investors, apparently, do not share Elop's enthusiasm about Nokia partnering a weak player, given that the Android and iPhone platforms could well fortify their hold on the market even before the first piece of Nokia hardware running Windows moves off a store shelf. This gains even more prominance when viewed against the backdrop of the role that Nokia plays in the economy of Finland, as a company that accounted for around a third of the market capitalization of the Helsinki Stock Exchange as late as 2007.

Finnish multinational Nokia is known for reinventing itself – from a ground-wood pulp mill and paper manufacturer, rubber manufacturer, phone / telegraph / electric cable manufacturer, car and bicycle tires, footwear, communications cables, televisions and other consumer electronics, personal computers, electricity generation machinery, robotics, capacitors, military communications and equipment (such as the SANLA M/90 device and the M61 gas mask for the Finish Army), plastics, aluminum and chemicals – even before it made its way into the industry of telecommunications, which it commanded until recently. However, the company made those transitions under a Finnish CEO - Elop is the company's first non-Fin CEO. As a former Microsoft man, he worked at the company he has now inked a deal with between January 2008 and September 2010, heading the  Business Division that looked after the Microsoft Office line of products. Prior to that, he was COO at Juniper Networks, before which he was CEO of Macromedia until it was acquired by Adobe.

Nokia-Microsoft-Ecosystem-SlideNokia plans to retain its Symbian OS for its mid-to-low-end devices, invest into the Series 40 platform and release a lone MeeGo product in 2011. The company intends to shrink its spend on research and development, while refocusing on customising and enhancing the software line for Windows Phone 7. Ovi, Nokia's applications and content store is to merge with Microsoft Marketplace and Nokia Maps will find itself tied into Microsoft's Bing and AdCenter. Microsoft will provide developer tools to Nokia, to replace Qt which will not be supported by Windows Phone 7 devices.  Bing will also be the search engine for all Nokia phones.

After the announcement, Nokia's share price fell around 14%, its biggest drop since July 2009. Comments by users and readers on Nokia's Conversation's page announcing the move, barring the occasionaly wait-and-watch view, largely decried the idea of partnering with Microsoft, with some going as far as advising the company to get a new CEO.
[Read More...]


Firefox 4 beats IE9 in first 24-hour download count



Mozilla's Firefox, the community developed open source browser from the Mozilla Foundation, debut its latest version, numbering 4, on Tuesday. According to Mozilla's download statistics tally, the browser was downloaded over seven million times with the first 24 hours of its launch, almost three times the 2.4 million downloads boasted by Microsoft for its recently released Internet Explorer 9.

firefox4While Internet Explorer 9 leverages hardware acceleration using Vista and Windows 7 DirectX multimedia APIs,  Firefox, on the other hand, leverages the appeal of an updated browser for the world's legacy Windows XP systems while simultaneously appealing to Linux, Windows, and Mac OS users. According to research firm Net Applications February 2011 data, over half the world still runs on Windows XP, while around 34% runs on either Windows Vista or Windows 7. Close to 5% runs on Mac OS versions, while just under a percent are Linux users. Consequentially, the addressable universe of users for Firefox is much larger than that of IE9, which is evident from its download popularity.

Firefox 4 features include tab groups, a do-not-track option, addons, and performance upgrades.
DOWNLOAD Firefox:
Firefox Setup 4.0.1.exe
Firefox Setup 5.0b2.exe
[Read More...]


Google speeds up Chrome 10



Google has rolled out the benefits from its speedy Chrome beta from three weeks ago, bring speed improvements to all Chrome users. Chrome 10, Google says, runs even the most complex web apps quicker and more responsively within the browser, corresponding to a 66% improvement in JavaScript performance on the V8 benchmark suite.

ChromeThe new Chrome sports updated, simple interfaces, with its new settings interface speeding up user access to the right settings quickly. Also added is a search box that shows the settings users may be looking for, “as you type” and even copy-paste enabled direct links that work with Chrome’s address bar to jump to a specific settings page.

Users who prefer to save their passwords within their browser will find faster logins to the websites they frequent, even when switching computers, by simply synchronizing those passwords across computers. They can, if they so choose, encrypt those passwords with their own secret passphrase for enhanced security. “Sync” can be enabled from the “Personal Stuff” section within Chrome’s settings, where they can also choose to sync bookmarks, extensions, preferences, and themes.

For added safety, Chrome 10 boasts an extension of its sandboxing technology to the integrated Flash Player that will be a specially welcome move for users of Windows Vista or later versions, given the additional layer of protection against malicious webpages.

Speed, simplicity and security are the underpinnings of this latest release. Users who already have Chrome installed need to do nothing as an automatic update will ensure the benefits of the new version soon.
[Read More...]


Google adds e-books to Android Market



Google has opened up its e-bookstore to the Android Market. Android users will now be able to buy e-books from Google's Android Market, a logical tie in to Google's own eBookstore that was launched in December last year. Android users can choose between viewing the book on the Web or downloading a copy to their Android device for reading on the Google Books app.

Android_reader_PageViewGoogle's book sales arrives at the Android Market close on the heels of an update announced by book and e-book retailer Barnes & Noble to its free NOOK for Android app. The update adds requested features, including a new library grid view, wish list feature and download progress meter, amongst other improvements. Barnes & Noble has also promised a new release of Nook for Android this spring that would feature enhanced graphics, grid views and other improvements that would be optimized for shopping and reading on larger 10-inch Honeycomb-based tablets, which would span to-be-launched products from Motorola, Samsung, and Toshiba.
[Read More...]


Global Software Top 100 Edition 2010: The Highlights



The largest software companies in the world together generated software revenues of over $220 billion in 2009. The top 10 companies accounted for over 60% of that huge amount. Microsoft is by far the largest software company in the world, as it has been since the inception of the Global Software Top 100 list in 2003.
In one of the most difficult years for the software industry to date, 46 of the 100 largest companies had lower software revenues than in the previous year. Still, the average revenue growth of the Software Top 100 was 3.2%, as some companies continued to post healthy growth figures.

Leaders

TOP 10 LARGEST SOFTWARE COMPANIES

Rank Company
1 Microsoft
2 IBM
3 Oracle
4 SAP
5 Ericsson
6 Nintendo
7 HP
8 Symantec
9 Nokia Siemens Networks
10 Activision Blizzard
A record number of 38 software companies made over a billion dollars of software revenue in 2009. For comparison, seven years ago, only 15 software companies posted revenue figures above one billion.

Microsoft, IBM and Oracle are the top 3 software companies, with Microsoft bringing in more software dollars than IBM and Oracle combined.
Remarkably, no changes have taken place in the top 10 of the Software Top 100 compared to last year. This is does not mean the sector has come to a standstill. Competition between technology giants seems to have increased as Microsoft, Google and Apple started to challenge each other on their traditional terrains. The battle horns sounded in the software arena upon the introductions of Bing, Android, iOS and Chrome OS (coming soon). Even though the impact of some of these introductions are insignificant in sales figures at this moment, they can – and will-  stir up the industry in the longer term.
Oracle held on to its acquisitive growth strategy, taking over Sun Microsystems (#53) in a transaction worth $7.4 billion. The takeover formally took effect in January of 2010. In this year's list, Sun is still ranked separately.
In the top 10, Oracle and Ericsson are the only companies that managed to increase software revenues this year. HP and Nokia Siemens Networks retained their positions, despite software revenue declines of close to 15%.
Salesforce.com (#31), the largest software-as-a-service company, made over a billion dollar software revenues and became the fastest growing billion dollar software company.

Countries

SOFTWARE PRODUCING COUNTRIES

Country Number of companies
United States 65
Japan 10
France 6
United Kingdom 4
Germany 3
China 2
Netherlands 2
South Korea 2
Other 6
Most large software companies are headquartered in the USA, 64 companies in this year's Global Software Top 100 are US based*. But non-US software companies are on the rise – big time. Last year, the list counted 26 non-US companies, this year the number grew to 36! Japan and France are 2nd and 3rd on the list of software-producing countries. Both countries have 2 companies more in the top 100 than last year.
Companies from developing economies play a minor role in the global software industry, but signs of fast growth are clearly visible in China, Russia and Brazil. South Korean software companies also made great strides on the path towards Global Software Top 100 recognition.

Arrivals and departures

Forteen new entries made it to the Top 100, some thanks to revenue growth, some as a result of increased research efforts and better financial disclosure. The new arrivals are: General Electric, Wolters Kluwer, Cerner, NetApp, Nexon Corporation, NCSoft, SAIC, Intel Corporation, Verint, Sopra Group, Epic Sytems, Totvs, Pgi and Inspur.

Among the departures are Lockheed Martin, NEC and Acxiom after editorial re-evaluation and/or better financial disclosure. Omniture, SPSS and Wind River were acquired in 2009. Eight other companies did not make the list as a result of the increased revenue threshold.**

Fast growing software companies

FAST GROWING SOFTWARE COMPANIES

Company Growth
NCSoft 99,6%
Nexon Corporation 70,3%
Intel Corporation 67,8%
Square Enix 62,1%
Totvs 51,1%
Autonomy 47,2%
Shanda Interactive 40,2%
Kaspersky Lab 33,3%
Capcom 31,8%
Sopra Group 26,3%
The 10 fastest growing companies achieved impressive growth percentages. Software revenues of these companies are range in revenues from $400 million to $900 million. Two companies from South Korea lead the way.
NCSoft is this year's fastest growing company at almost 100%. In the previous list NCSoft fell just outside the Software Top 100: now the company is proudly ranked 71st with software revenues of $549 million. A maker of online games, NCSoft is known for successful titles like Lineage, Exteel, Guild Wars and Aion.
Nexon Corporation is an even larger online gaming company from Korea. The most successful game of Nexon is MapleStory. With sofware revenues of $608 million, the company is now the 65th largest software company in the world.
Autonomy and Kaspersky managed to be in the fast growth top 10 for the second consecutive year.
Intel, one of the largest hardware companies in the world, entered the Software Top 100 after buying Wind River, a producer of embedded software.
Apart from Intel, all companies in the top 10 are from outside the US. This could signal a trend of companies in upcoming markets catching up with the US. Totvs (Brazil), Shanda (China) and Kaspersky (Russia) are all leading software companies growing at high speed.
Totvs is the first South American company in the Software Top 100. The Brazilian software company expanded its operations heavily in recent years, and operates in 23 countries now. Totvs is a top 10 ERP company worldwide.
Square Enix, a Japanese gaming company, took over Eidos in 2009, which contibuted to fast revenue  growth. Capcom, the other Japanese video gaming company in this list, also very strong results in 2009.

Sectors

The gaming sector in general operates with mixed results, some of the fast growing video gaming companies of last year saw revenues decline. All gaming companies with revenues of over 1 billion USD saw their sales decrease. On the other hand, their smaller colleagues did extremely well: 5 out of 10 fastest growing companies are gaming companies.
Since gaming has moved onto the internet, online games are quickly becoming big business, and 3 pure-play online gaming companies are in the fast growth top 10. Asian companies lead the online trend.
More about the Top 25 gaming companies >>
Security and antivirus software companies performed well, a continued trend of recent years. While Symantec saw revenues decrease slightly (-2,2%), Trend Micro (+4,5%), McAfee (+21,3%), Check Point (+20,7%) and Kaspersky (+33,3%) all grew above average.
More about the top security software companies >>

Outlook

Although the economy is dull, 2010 will be a better year for the software industry. Corporate investment budgets are growing again, and corporate cost-cutters are leaving the IT departments alone, resulting in new license sales.
Big cash flows from maintenance contracts continue to finance very acquisitive behaviour among many of the biggest software companies, year after year. Large acquistions that have already taken place in 2010 are: SAP-Sybase, Intel-McAfee, Oracle-SUN. IBM does not buy large companies, but they certainly buy a lot of them. IBMs stated focus on software acquisitions is bound to drive more acquisitions for several years to come. As the number of successful newborne software companies is decreasing year after year, the flurry of acquisitions results in consolidation. The Top 10 companies increase in size, and represent an ever larger share of the world's software sales.
The only sure way not to be acquired is to have a stubborn large shareholder, usually the person who founded the company. Take SAS institute for instance. All its competitors (Cognos, Hyperion, Business Objects) were acquired, but CEO/founder Jim Goodnight will not sell his baby.
The credit crisis abruptly stopped acquisitions by private equity firms. As most PE firms use a limited time frame for their investments (usually seven years), we may see some selling on their behalf, as soon as the price is right. Large software companies owned by private equity are: SunGard and Infor.
[Read More...]


Microsoft rolls out IE9




Microsoft has rolled out the latest version of its IE9 web browser at an event at the SXSW Interactive conference. Straddling no less than 39 languages, Internet Explorer 9 downloads hit the 40 million mark within a day of its download, notching up more than two percent usage on Windows 7, Microsoft said.

ie031311_5_web
Internet Explorer 9 features include Pinned Sites and Jump List, which allow people to put websites directly on the Windows 7 Taskbar, imitating native applications, foe easy task management with those sites for commonplace tasks such as checking email inboxes, changing the Internet music station, accept friend invitations or following breaking news.
The new version leverages modern Windows PC hardware to improve Web browsing performance, including hardware-accelerated HTML5 spanning graphics, text, audio and video. Developers, Microsoft said, can build faster, more immersive websites that feel like native applications using HTML5, as well as runtimes such as Adobe Flash Player and Microsoft Silverlight, both of which leverage hardware acceleration in Internet Explorer 9 in their next versions.

For security, IE9 features Tracking Protection by adding Tracking Protection Lists to the browser and partners such as PrivacyChoice, TRUSTe, Abine and Adblock Plus that have already published these lists. IE9's Download Manager is integrated with SmartScreen malware protection that also uses download reputation data to remove unnecessary warnings for well-known files and show more severe warnings when the download has a higher risk of being malicious.
[Read More...]


Google invests in the world's largest solar power tower plant



Google has invested $168 million in a new solar energy power plant that is being developed by BrightSource Energy in the Mojave Desert in California. 

Brightsource’s Ivanpah Solar Electric Generating System (ISEGS) will generate 392 MW of clean, solar energy, which Google said was like taking over 90,000 cars off the road over the 25 year-plus projected lifetime of the plant.

Google_BSEs_Solar_Energy_Development_CenterThe Ivanpah Power Tower measures in at approximately 450 feet, and will use 173,000 heliostats, each with two mirrors. The project is being constructed by Bechtel, and construction began in October 2010, with a projected completion date in 2013. It is also financed by NRG and with clean energy technology loan guarantees provided by the US Department of Energy.

Power towers are based on a relatively simple idea – by using a field of mirrors called heliostats, the sun’s rays are concentrated onto a solar receiver on top of a tower. The solar receiver then generates steam, which in-turn spins a traditional turbine and generator to make electricity. Power towers are extremely efficient as all the mirrors focus a tremendous amount of solar energy onto a small area to produce steam at high pressure and temperature (up to 1000 degrees F). “Think about burning a tuft of grass with a magnifying glass, only multiplied by thousands (or the original application: Archimedes’ heat ray that allegedly used mirrors to burn enemy ships!),” Google explained in its statement.

The investment brings Google's tally to $250 million in the clean energy sector, with this being the largest investment till date.
[Read More...]


Adobe releases Creative Suite 5.5



Adobe Systems has made available its AdobeCreative Suite 5.5 product family, which includes important advances in HTML5 and Flash authoring that enable designers and developers to create compelling content and applications. The Creative Suite 5.5 products also have significant innovations in the areas of video production and editing. The suite also delevers new capabilities in digital publishing, allowing content authors to deliver high-impact work across multiple platforms, operating systems, web browsers, smartphones and tablets – including Android, BlackBerry Tablet OS, and Apple iOS devices.

The release provides Web designers and developers a software solution that allows them to produce HTML5 content in the browser and deliver high-impact mobile applications through sweeping advances in Flash tooling. Pricing for the suite starts at $1,299.

Adobe_cs55_family
 
[Read More...]


Ericsson to manage Clearwire's 4G network



Clearwire, the US-based 4G broadband services provider has decided to outsource the management of its 4G network to Ericsson.

The move helps the telecommunications company save a lot of money in costs while leveraging Ericsson's best practices, tools and processes to maximize efficiencies and provide continued network quality at reduced operating costs.

While Clearwire will retain ownership of network assets, Ericsson will look after network engineering, operations and maintenance for Clearwire's core, transmission and access networks. Ericsson will take on around 700 employees from Clearwire as part of the agreement. Ericsson formed a similar network management partnership with Sprint in 2009, which is Clearwire's largest shareholder and wholesale partner.
[Read More...]


Apple is the world's most valuable brand – WPP



Skyrocketing a penomenonal 84 percent in value over the past year, Apple is now the most valuable brand in the world, bringing down the curtains on the four-year reign of Google at the top of the table, advertising and marketing giant WPP found in its sixth annual BrandZ Top 100 Most Valuable Global Brands study.

Apple-logoThe Apple brand, as calculated by Millward Brown Optimor, a WPP company, increased in value by 859 percent since 2006, standing currently at $153.3 billion. Emerging markets account for 19 of the top 100 brands, Millward Brown Optimor found in its 2011 study of the Most Valuable Global Brands.

Technology brands make up one-third of the Top 100 brands.  he top three brands on the list are information technology companies, with the second and third place going to Google and IBM, respectively. Google's brand value was $111.5 billion while IBM's was $100.9 billion. Microsoft comes in at number five with $78.2 billion, wrapping up 40% of the top-ten list in favor of software companies.

Facebook too made its debut on the Top 100 ranking this year at No. 35 with the highest increase in brand value, 246 percent, valuing the brand at $19.1 billion.

The BrandZ Top 100 Most Valuable Global Brands study, commissioned by WPP and conducted by Millward Brown Optimor, identifies and ranks the world’s most valuable 100 brands by their dollar value, an analysis based on financial data combined with consumer measures of brand equity.
[Read More...]


Strong growth for Security Software Top 12



Large security software companies have shown remarkable growth during the economic crisis. While corporations worldwide were cutting their IT budgets, security software spending was spared. In 2008, the weighted average revenue growth was 16% for the major security software firms.


The security software market is worth 16 billion USD, according to the Top 100 Research Foundation. The Top 12 security software companies account for over 10.5 billion USD, about two third of the total market. The market is expected to grow 12% this year and 17% in 2010 to 21 billion USD. The table displays the Top 12 Security Software Companies, ranked by software revenues from 2008 in millions of US dollars.

The World's Largest Security Software Companies

# Company Country Software
revenues
Growth
rate
1. Symantec USA 5,692 8%
2. Trend Micro Japan 985 16%
3. McAfee USA 795 25%
4. Check Point Israel 691 10%
5. EMC USA 462 5%
6. CA USA 450* N/A
7. Kaspersky Russia 360 177%
8. Websense USA 296 40%
9. Verint USA 260* N/A
10. AVG Czech Rep. 250 213%
11. Sophos UK 163 45%
12. Panda Security Spain 111 37%
* Estimate, insufficient data

Several acquisitions have taken place last year. McAfee bought Secure Computing, Sophos took over the German Utimaco and Symantec acquired MessageLabs. More consolidation is likely, as the sector grows rich and large software companies buy smaller competitors for market share and additional growth potential.

Security software is a very international sector. Though US companies are leading, they are not as dominant as they are in the rest of the software industry. The fastest growth takes place outside the US.
Various successful antivirus companies come from Eastern Europe, with Russian Kaspersky as a frontrunner. AVG, the fastest growing company in the list, has its roots in the Czech Republic. Among the runners-up, just below the Top 12, are Softwin from Romania (the maker of BitDefender), ESET from Slovakia and Czech ALWIL Software (the maker of Avast).

The antivirus market is growing substantially faster than the firewall- and intrusion detection market, driven by volume contracts with PC makers and increasing public awareness of virus threats.
[Read More...]


Microsoft buys Skype for $8.5 billion cash



Microsoft has agreed to acquire Skype, the Internet communications company, for $8.5 billion in cash. Skype is owned by an investor group led by Silver Lake, which includes eBay Inc, Joltid Limited and founders Niklas Zennström and Janus Friis, the Canada Pension Plan Investment Board and Andreessen Horowitz, according to its website. The acquisition agreement has been approved by the boards of directors of both both companies.

Skype_LogoA statement by both companies said the acquisition could enhance the accessibility of real-time video and voice communications, expanding the benefits to both consumers and enterprise users, besides generating new business and revenue opportunities.

Microsoft CEO Steve Ballmer called Skype “a phenomenal service that is loved by millions of people around the world.” Skype has around 170 million connected users, with a usage tally of over 207 billion minutes of voice and video in 2010. Microsoft's earlier acquisitions in real-time communications include Lync, Outlook, Messenger, Hotmail and Xbox LIVE.

Founded in 2003, Skype was earlier acquired by eBay in September 2005, and thereafter acquired by the investment group led by Silver Lake in November 2009. In the past 18 months, Skype has seen monthly calling minutes increase by 150 percent, developed new revenue streams and strategic partnerships, acquired intellectual property powering its peer-to-peer network and recruiting a skilled senior management team. Reports said that the investment group that owned Skype has seen a virtual windfall, pegging their gains in the 18 months that they have owned the company at between 70 and 80 percent. The Silver Lake-led investor group acquired the majority stake in Skype from eBay in November 2009, a time marked by the global economic downturn, for $1.9 billion in cash and a $125 million note. eBay had kept around a third of Skype, and is reported to have made a total return of $1.4 billion on its original investment.

Skype will now support Microsoft's devices including gaming devices Xbox and Kinect besides the Windows Phone and other Windows devices. Microsoft said it will connect Skype users with Lync, Outlook, Xbox Live and other communities. Microsoft also committed to continued investment and support for Skype clients on non-Microsoft platforms. Skype works on a number of mobile devices running Nokia's Symbian platform, Apple's iOS, Blackberry and Android devices and on computers running Windows, Mac OS X, and Linux. Skype will form a new business division within Microsoft, with Skype CEO Tony Bates assuming the title of president of the Microsoft Skype Division, reporting directly to Microsoft CEO Ballmer.
[Read More...]


Learn Hacking



click here
http://mycodelogic.blogspot.com/search/label/Hacking
if not working then copy link in paste it in your browser address bar
[Read More...]


Mobile Secret Codes



Nokia Secret Codes


On the main screen type

*#06# for checking the IMEI (International Mobile Equipment Identity).

*#7780# reset to factory settings.

*#67705646# This will clear the LCD display(operator logo).

*#0000# To view software version.

*#2820# Bluetooth device address.

*#746025625# Sim clock allowed status.

*#62209526# - Display the MAC address of the WLAN adapter. This is available only in the newer devices that supports WLAN like N80

#pw+1234567890+1# Shows if sim have restrictions.

*#92702689# - takes you to a secret menu where you may find some of the information below:

1. Displays Serial Number.

2. Displays the Month and Year of Manufacture

3. Displays (if there) the date where the phone was purchased (MMYY)

4. Displays the date of the last repair - if found (0000)

5. Shows life timer of phone (time passes since last start)

*#3370# - Enhanced Full Rate Codec (EFR) activation. Increase signal strength, better signal reception. It also help if u want to use GPRS and the service is not responding or too slow. Phone battery will drain faster though.

*#3370* - (EFR) deactivation. Phone will automatically restart. Increase battery life by 30% because phone receives less signal from network.

*#4720# - Half Rate Codec activation.

*#4720* - Half Rate Codec deactivation. The phone will automatically restart

If you forgot wallet code for Nokia S60 phone, use this code reset: *#7370925538#
Note, your data in the wallet will be erased. Phone will ask you the lock code. Default lock code is: 12345

Press *#3925538# to delete the contents and code of wallet.

*#7328748263373738# resets security code.

Default security code is 12345

Unlock service provider: Insert sim, turn phone on and press vol up(arrow keys) for 3 seconds, should say pin code. Press C,then press * message should flash, press * again and 04*pin*pin*pin#

Change closed caller group (settings >security settings>user groups) to 00000 and ure phone will sound the message tone when you are near a radar speed trap. Setting it to 500 will cause your phone 2 set off security alarms at shop exits, gr8 for practical jokes! (works with some of the Nokia phones.)

Press and hold "0" on the main screen to open wap browser.
______________________________________________________________________________
 Sony Ericsson Secret Codes


Sony Ericsson Secret Menu: -> * <- <- * <- *

(-> means press joystick, arrow keys or jogdial to the right and <- means left.)

You'll see phone model, software info, IMEI, configuration info, sim lock status, REAL time clock, total call time and text labels.

You can also test your phones services and hardware from this menu (main display, camera, LED/illumination, Flash LED, keyboard, earphone, speaker, microphone, radio and vibrator tests)


IMEI Number: *#06#


Lockstatus: <- * * <-

Shortcut to last dialed numbers: 0#

Shortcut to sim numbers: On main menu type a number and press #

If you change the language from default to any other language, then it may be difficult to switch to default language. The shortcut is very simple. Just press < 0000 > .  <  stands for left arrow button or joystick and > stands for right arrow button or joystick.
________________________________________________________________________________
 Samsung Secret Codes


Software version: *#9999#

IMEI number: *#06#

Serial number: *#0001#

Battery status- Memory capacity : *#9998*246#

Debug screen: *#9998*324# - *#8999*324#

LCD kontrast: *#9998*523#

Vibration test: *#9998*842# - *#8999*842#

Alarm beeper - Ringtone test : *#9998*289# - *#8999*289#

Smiley: *#9125#

Software version: *#0837#

Display contrast: *#0523# - *#8999*523#

Battery info: *#0228# or *#8999*228#

Display storage capacity: *#8999*636#

Display SIM card information: *#8999*778#

Show date and alarm clock: *#8999*782#

The display during warning: *#8999*786#

Samsung hardware version: *#8999*837#

Show network information: *#8999*638#

Display received channel number and received intensity: *#8999*9266#

*#1111# S/W Version

*#1234# Firmware Version

*#2222# H/W Version

*#8999*8376263# All Versions Together

*#8999*8378# Test Menu

*#4777*8665# GPSR Tool

*#8999*523# LCD Brightness

*#8999*377# Error LOG Menu

*#8999*327# EEP Menu

*#8999*667# Debug Mode

*#92782# PhoneModel (Wap)

#*5737425# JAVA Mode

*#2255# Call List

*#232337# Bluetooth MAC Adress

*#5282837# Java Version

Type in *#0000# on a Samsung A300 to reset the language

Master reset(unlock) #*7337# (for the new samsungs E700 x600 but not E710)

Samsung E700 type *#2255# to show secret call log (not tested)

Samsung A300, A800 phone unlock enter this *2767*637#

Samsung V200, S100, S300  phone unlock : *2767*782257378#

#*4773# Incremental Redundancy

#*7785# Reset wakeup & RTK timer cariables/variables

#*7200# Tone Generator Mute

#*3888# BLUETOOTH Test mode

#*7828# Task screen

#*#8377466# S/W Version & H/W Version

#*2562# Restarts Phone

#*2565# No Blocking? General Defense.

#*3353# General Defense, Code Erased.

#*3837# Phone Hangs on White screen.

#*3849# Restarts Phone

#*7337# Restarts Phone (Resets Wap Settings)

#*2886# AutoAnswer ON/OFF

#*7288# GPRS Detached/Attached

#*7287# GPRS Attached

#*7666# White Screen

#*7693# Sleep Deactivate/Activate

#*2286# Databattery

#*2527# GPRS switching set to (Class 4, 8, 9, 10)

#*2679# Copycat feature Activa/Deactivate

#*3940# External looptest 9600 bps

#*4263# Handsfree mode Activate/Deactivate

#*2558# Time ON

#*3941# External looptest 115200 bps

#*5176# L1 Sleep

#*7462# SIM Phase

#*7983# Voltage/Freq

#*7986# Voltage

#*8466# Old Time

#*2255# Call Failed

#*5376# DELETE ALL SMS!!!!

#*6837# Official Software Version: (0003000016000702)

#*2337# Permanent Registration Beep

#*2474# Charging Duration

#*2834# Audio Path (Handsfree)

#*3270# DCS Support Activate/Deactivate

#*3282# Data Activate/Deactivate

#*3476# EGSM Activate/Deactivate

#*3676# FORMAT FLASH VOLUME!!!

#*4760# GSM Activate/Deactivate

#*4864# White Screen

#*7326# Accessory

#*7683# Sleep variable

#*3797# Blinks 3D030300 in RED

#*7372# Resetting the time to DPB variables

#*3273# EGPRS multislot (Class 4, 8, 9, 10)

#*7722# RLC bitmap compression Activate/Deactivate

#*2351# Blinks 1347E201 in RED

#*2775# Switch to 2 inner speaker

#*7878# FirstStartup (0=NO, 1=YES)

#*3838# Blinks 3D030300 in RED

#*2077# GPRS Switch

#*2027# GPRS Switch

#*0227# GPRS Switch

#*0277# GPRS Switch

#*22671# AMR REC START

#*22672# Stop AMR REC (File name: /a/multimedia/sounds/voice list/ENGMODE.amr)

#*22673# Pause REC

#*22674# Resume REC

#*22675# AMR Playback

#*22676# AMR Stop Play

#*22677# Pause Play

#*22678# Resume Play

#*77261# PCM Rec Req

#*77262# Stop PCM Rec

#*77263# PCM Playback

#*77264# PCM Stop Play

#*22679# AMR Get Time

*#8999*364# Watchdog ON/OFF

*#8999*427# WATCHDOG signal route setup

*2767*3855# = Full Reset (Caution every stored data will be deleted.)

*2767*2878# = Custom Reset

*2767*927# = Wap Reset

*2767*226372# = Camera Reset (deletes photos)

*2767*688# Reset Mobile TV

#7263867# = RAM Dump (On or Off)

*2767*49927# = Germany WAP Settings

*2767*44927# = UK WAP Settings

*2767*31927# = Netherlands WAP Settings

*2767*420927# = Czech WAP Settings

*2767*43927# = Austria WAP Settings

*2767*39927# = Italy WAP Settings

*2767*33927# = France WAP Settings

*2767*351927# = Portugal WAP Settings

*2767*34927# = Spain WAP Settings

*2767*46927# = Sweden WAP Settings

*2767*380927# = Ukraine WAP Settings

*2767*7927# = Russia WAP Settings

*2767*30927# = GREECE WAP Settings

*2767*73738927# = WAP Settings Reset

*2767*49667# = Germany MMS Settings

*2767*44667# = UK MMS Settings

*2767*31667# = Netherlands MMS Settings

*2767*420667# = Czech MMS Settings

*2767*43667# = Austria MMS Settings

*2767*39667# = Italy MMS Settings

*2767*33667# = France MMS Settings

*2767*351667# = Portugal MMS Settings

*2767*34667# = Spain MMS Settings

*2767*46667# = Sweden MMS Settings

*2767*380667# = Ukraine MMS Settings

*2767*7667#. = Russia MMS Settings

*2767*30667# = GREECE MMS Settings

*#7465625# = Check the phone lock status

*7465625*638*Code# = Enables Network lock

#7465625*638*Code# = Disables Network lock

*7465625*782*Code# = Enables Subset lock

#7465625*782*Code# = Disables Subset lock

*7465625*77*Code# = Enables SP lock

#7465625*77*Code# = Disables SP lock

*7465625*27*Code# = Enables CP lock

#7465625*27*Code# = Disables CP lock

*7465625*746*Code# = Enables SIM lock

#7465625*746*Code# = Disables SIM lock

*7465625*228# = Activa lock ON

#7465625*228# = Activa lock OFF

*7465625*28638# = Auto Network lock ON

#7465625*28638# = Auto Network lock OFF

*7465625*28782# = Auto subset lock ON

#7465625*28782# = Auto subset lock OFF

*7465625*2877# = Auto SP lock ON

#7465625*2877# = Auto SP lock OFF

*7465625*2827# = Auto CP lock ON

#7465625*2827# = Auto CP lock OFF

*7465625*28746# = Auto SIM lock ON

#7465625*28746# = Auto SIM lock OFF



Type *#9998*627837793# Go to the 'my parameters' and there you will find new menu where you can unlock phone.(not tested-for samsung C100)

To unlock a Samsung turn the phone off take the sim card and type the following code *#pw+15853649247w# .

Java status code: #*53696# (Samsung X600)



If you want to unlock your phone put a sim from another company then type *#9998*3323# it will reset your phone. Push exit and then push 7,
it will reset again. Put your other  sim in and it will say sim lock, type in 00000000 then it should be unlocked. Type in *0141# then
the green call batton and it's unlocked to all networks. This code may not work on the older phones and some of the newer phones. If it doesn't work you will have to reset your phone without a sim in it by typing *#2767*2878# or *#9998*3855# (not tested)
LG Secret Codes

LG all models test mode: Type 2945#*# on the main screen.

2945*#01*# Secret menu for LG



IMEI (ALL): *#06#

IMEI and SW (LG 510): *#07#

Software version (LG B1200): *8375#

Recount cheksum (LG B1200): *6861#

Factory test (B1200): #PWR 668

Simlock menu (LG B1200): 1945#*5101#

Simlock menu (LG 510W, 5200): 2945#*5101#

Simlock menu (LG 7020, 7010): 2945#*70001#

Simlock menu (LG 500, 600): 2947#*



LG-U81XX SPECIAL CODES

Code to read phone version :

- Phone without SIM

- Enter 277634#*# or 47328545454#

- Select 'SW Ver.info'

Code to reset phone :

- Phone without SIM

- Enter 277634#*# or 47328545454#

- Select 'Factory Reset'

Code to enter UNLOCK MENU :

- Phone wit SIM inside

- Enter 2945#*88110#

Test Menu 8330 : 637664#*#

Test Menu 8180 V10a: 49857465454#

Test Menu 8180 V11a: 492662464663#

Test Menu 8130-8138: 47328545454#

Test Menu 8110-8120: 277634#*#
[Read More...]


Wireless Hacking



Wireless networks broadcast their packets using radio frequency or optical wavelengths. A modern laptop computer can listen in. Worse, an attacker can manufacture new packets on the fly and persuade wireless stations to accept his packets as legitimate.
The step by step procerdure in wireless hacking can be explained with help of different topics as follows:-

1) Stations and Access Points :- A wireless network interface card (adapter) is a device, called a station, providing the network physical layer over a radio link to another station.
An access point (AP) is a station that provides frame distribution service to stations associated with it.
The AP itself is typically connected by wire to a LAN. Each AP has a 0 to 32 byte long Service Set Identifier (SSID) that is also commonly called a network name. The SSID is used to segment the airwaves for usage.

2) Channels :- The stations communicate with each other using radio frequencies between 2.4 GHz and 2.5 GHz. Neighboring channels are only 5 MHz apart. Two wireless networks using neighboring channels may interfere with each other.

3) Wired Equivalent Privacy (WEP) :- It is a shared-secret key encryption system used to encrypt packets transmitted between a station and an AP. The WEP algorithm is intended to protect wireless communication from eavesdropping. A secondary function of WEP is to prevent unauthorized access to a wireless network. WEP encrypts the payload of data packets. Management and control frames are always transmitted in the clear. WEP uses the RC4 encryption algorithm.

4) Wireless Network Sniffing :- Sniffing is eavesdropping on the network. A (packet) sniffer is a program that intercepts and decodes network traffic broadcast through a medium. It is easier to sniff wireless networks than wired ones. Sniffing can also help find the easy kill as in scanning for open access points that allow anyone to connect, or capturing the passwords used in a connection session that does not even use WEP, or in telnet, rlogin and ftp connections.

5 ) Passive Scanning :- Scanning is the act of sniffing by tuning to various radio channels of the devices. A passive network scanner instructs the wireless card to listen to each channel for a few messages. This does not reveal the presence of the scanner. An attacker can passively scan without transmitting at all.

6) Detection of SSID :- The attacker can discover the SSID of a network usually by passive scanning because the SSID occurs in the following frame types: Beacon, Probe Requests, Probe Responses, Association Requests, and Reassociation Requests. Recall that management frames are always in the clear, even when WEP is enabled.
When the above methods fail, SSID discovery is done by active scanning

7) Collecting the MAC Addresses :- The attacker gathers legitimate MAC addresses for use later in constructing spoofed frames. The source and destination MAC addresses are always in the clear in all the frames.

8) Collecting the Frames for Cracking WEP :- The goal of an attacker is to discover the WEP shared-secret key. The attacker sniffs a large number of frames An example of a WEP cracking tool is AirSnort ( http://airsnort.shmoo.com ).

9) Detection of the Sniffers :- Detecting the presence of a wireless sniffer, who remains radio-silent, through network security measures is virtually impossible. Once the attacker begins probing (i.e., by injecting packets), the presence and the coordinates of the wireless device can be detected.

10) Wireless Spoofing :- There are well-known attack techniques known as spoofing in both wired and wireless networks. The attacker constructs frames by filling selected fields that contain addresses or identifiers with legitimate looking but non-existent values, or with values that belong to others. The attacker would have collected these legitimate values through sniffing.

11) MAC Address Spoofing :- The attacker generally desires to be hidden. But the probing activity injects frames that are observable by system administrators. The attacker fills the Sender MAC Address field of the injected frames with a spoofed value so that his equipment is not identified.

12) IP spoofing :- Replacing the true IP address of the sender (or, in rare cases, the destination) with a different address is known as IP spoofing. This is a necessary operation in many attacks.

13) Frame Spoofing :- The attacker will inject frames that are valid but whose content is carefully spoofed.

14) Wireless Network Probing :-
The attacker then sends artificially constructed packets to a target that trigger useful responses. This activity is known as probing or active scanning.

15) AP Weaknesses :-
APs have weaknesses that are both due to design mistakes and user interfaces

16) Trojan AP :- An attacker sets up an AP so that the targeted station receives a stronger signal from it than what it receives from a legitimate AP.

17) Denial of Service :- A denial of service (DoS) occurs when a system is not providing services to authorized clients because of resource exhaustion by unauthorized clients. In wireless networks, DoS attacks are difficult to prevent, difficult to stop. An on-going attack and the victim and its clients may not even detect the attacks. The duration of such DoS may range from milliseconds to hours. A DoS attack against an individual station enables session hijacking.

18) Jamming the Air Waves :- A number of consumer appliances such as microwave ovens, baby monitors, and cordless phones operate on the unregulated 2.4GHz radio frequency. An attacker can unleash large amounts of noise using these devices and jam the airwaves so that the signal to noise drops so low, that the wireless LAN ceases to function.

19) War Driving :- Equipped with wireless devices and related tools, and driving around in a vehicle or parking at interesting places with a goal of discovering easy-to-get-into wireless networks is known as war driving. War-drivers (http://www.wardrive.net) define war driving as “The benign act of locating and logging wireless access points while in motion.” This benign act is of course useful to the attackers.
Regardless of the protocols, wireless networks will remain potentially insecure because an attacker can listen in without gaining physical access.


Tips for Wireless Home Network Security

1) Change Default Administrator Passwords (and Usernames)
2) Turn on (Compatible) WPA / WEP Encryption
3) Change the Default SSID
4) Disable SSID Broadcast
5) Assign Static IP Addresses to Devices
6) Enable MAC Address Filtering
7) Turn Off the Network During Extended Periods of Non-Use
8) Position the Router or Access Point Safely
[Read More...]


Java interview Questions




1.  What is java run time environment?
2.  How java is platform independent language?
3.  What is difference between compiler and interpreter?
4.  Java is secure language. Why?
5.  Why main function in java is static?
6.  What is abstract class and what is use of abstract class?
7.  Why a class cannot be static?
8.  Why abstract class cannot be final?
9.  What are final class, final method and final variable?
Answer:
A final class is special type of class which cannot be inherited i.e. we cannot create any subclass of final class. All the methods and variables of final class are also final.
A final method is special type of method which cannot be overridden in the subclass.
A final variable is special type of variable which after assigning a value at the time of declaration we cannot modified its value. It is necessary to initialize the final variable at the time of declaration.
10. What is default access specifier?
11. What is static import in java?
12. What is difference between checked and unchecked exception?
13. What is wrapper class in java?
14. What is generic?
15. What is difference between throw and throws keyword?
16. Can interface implements another interface?
17. Is it possible that any class which extends an abstract class and doesn’t override all the method of that abstract class?
18. Is it true, all the methods and member variables of final class is also final? If it is true then why and if is false then why?
19. Can abstract class have a method which has body?
20. What is automatic type casting?
21. Why in java array can be declared as: int [] array;
22. Can a method whose return type is void have return keyword?
23. What is task of >>> operator?
24. What is meaning of variable number of argument in java?
25. What are difference between private, protected, public and default access specifiers?
26. What are the non access specifiers in java?
27. What is error in the declaration: float f=5.5;
28. Which of the following comparison more appropriate and why?
(a) if (a==5)
(b) if (5==a)
29. What are differences between following two if statements
(a) if (a&b)
(b) if (a&&b)
30. What is meaning of multiple catch clauses?
31. What is meaning of package in java?
32. What is difference between path and classpath command?
33. What is meaning of access protection?
34. Defined interface?
35. What are difference between class and interface?
36. What is use of this keyword?
37. How can you find the class name of given object?
38. Can exception in java can be cause of compilation error? If yes then why?
39. What are the properties of nested interface?
40. What is nested class?
41. Can class be protected? Why?
42. Can class be private? Why?
43. What are the properties of constructor?
44. What is default constructor?
45. What are uses of super keyword?
Answer:
(a) It is used to access the super class member variable from subclass either it is hidden in subclass or not.
(b) It is used to access the super class method from the subclass either it has overridden in subclass or not.
(c) In method form super keyword is used to call super class constructor.
46. What is dynamic method dispatch?
47. What is difference between c++ and java?
48. Give any examples of run time polymorphism.
49. What is difference between late and early binding?
50. What is encapsulation?
51. What is difference between overloading and overriding?
52. What is difference between final, finally and finalize ()?
Answer:
finalize (): It is method of Object class. This method is called by java garbage collector when garbage collector think there is not any reference of object of any class and it deletes the object of that class automatically.
53. What is meaning of abstraction?
54. How can you delete any object in java?
55. What is garbage collection in java?
56. Why java doesn’t support multiple inheritances?
57. How can you say java is robust language?
58. Define inheritance.
Answer:
Inheritance is mechanism by which we can derive a new class from a already existing class. New class is called subclass or child class while exiting class is called as super class or sub class. Sub class may inherit some or all properties of super class. For this we use extends keyword in java. So, inheritance is based on the concept of reusability.
59. What is JVM?
60. What is quick logical operator?
61. What is difference between .exe file and .class file?
62. What is byte code?
63. What is Unicode character?
64. Give an example of dynamic initialization in java?
65. What is multidimensional array in java?
65. What is difference between break and continue keyword?
66. What is for each version of loop?
67. What is class in java?
68. What is object in java?
69. When new operator allocates the memory for objects:
(a) Complier time
(b) Run time
70. What is multithreading programming?
Answer:
Thread is smallest unit of code. In a program when two or more threads execute at the same or concurrently is known as multithreading programming. Each thread has different path of execution. It makes program more efficient because each thread perform different task. Some tasks like to read or write the files or print a text is slower process. In this time can be utilized by the other thread to perform other tasks, which maximize the utilization of CPU. Hence a thread program is also known as multitasking program.
71. Can sub class inherit constructors from the super class? Why?
Answer: Not, Sub class cannot inherit the constructors of super class by using extends keyword because constructors are not members of any class and extends keyword only inherits members of any class.
72. Which class is super class of all the classes in java?
Answer:
Object
Object class has defined in java.lang package.
73. If any subclass is in different package of the super class then which type of members of super class, it will not inherit?
Answer:
(a) protected members.
(b) Members which have default access specifier
74. What is difference between hidden methods and overridden methods?
Answer:
When we writes any method with same name, with same parameters and return type i.e. with same signature of any method of super class in the subclass then subclass method is called as overridden method while when you override any static method of super class in the subclass then that super class method is known as hidden method.
Example:
class Top{
void display(){
System.out.println("Top:display");
}
static void show(){ //hidden method
System.out.println("Top:show");
}
}
public class Test extends Top{
void display(){ //overridden method
System.out.println("Test:display");
}
static void show(){
System.out.println("Test:show");
}
public static void main(String [] args){
}
}
75. What is no-argument super class constructor?
Answer:
If super class has not any constructor or it has only no-argument constructor and if you doesn’t call super class constructor from explicitly from subclass constructor then java compiler automatically inset a no-argument of constructor at the first line of each subclass class constructors either it has written explicitly or not to call the super class constructors. Such constructor is known as no-argument super class constructor.
76. What is constructor chaining in java?
Answer:
When you creates object of any class it calls the constructor of this class either its constructor has written explicitly or not and this constructor also calls its super class constructor either explicitly or implicitly and so on until it doesn’t call the constructor of Object class. Such phenomenon of constructor calling is known as constructor chaining.
77. Suppose any class implements any interface and it overrides all the methods of that interface. If any other class extends that class then it is necessary to override the all the methods in subclass which has already overridden in the super class? If yes then why and if not then why?
Answer:
78. Why we cannot use abstract keyword before methods of an interface?
79. What are differences between an abstract class and an interface?
(a)All the methods and variables of interface are final and static.
(b)A class can implement more than one interface.
(c) All the methods of an interface are abstract i.e. which cannot have anybody.
(d)If any class is implementing any interface then it is necessary to overrides all the methods of an interface.
(e) An interface can extend more than other interface but it cannot extend any class.
(a)Abstract class can have methods and variables which is not static and final.
(b)A class can extends only one abstract class at a time.
(c) An abstract class can have a method which is not abstract i.e. which has method’s body.
(d) If any class which extends an abstract class which may override the all the abstract method of abstract class or it is itself an abstract class.
(e) An abstract class can extend another class or it can implement more than interfaces.
(f) We cannot create object of abstract class.
80. Declare a class which implements an interface but it is not necessary to override all the methods of an interface?
81. What is API?
82. Can any interface extend other interfaces? 
[Read More...]



Send mail to your Friends.  

Expert Feed

 
Return to top of page Copyright © 2011 | My Code Logic Designed by Suneel Kumar