SAMSUNG MOBILE SECRET CODES

SAMSUNG MOBILE SECRET CODES.. helps make your life easier and gives you more control.. -LIKE and SHARE if you find this info useful.

This are codes collected from the internet so i take no Responsibility. try them at your own risk

*#9125# : Smiley
*#9999# : Software Version
*#06# : IMEI Number
*#0001# : Serial Number
*#9998*523# : LCD Contrast
*#0228# or *#8999*228# : Battery Info
*#8999*636# : Display Storage Capacity
*#8999*778# : Display SIM Card Information
*#8999*782# : Show Date And Alarm Clock
*#8999*786# : The Display During Warning
*#8999*837# : Samsung Hardware Version
*#0523# - *#8999*523# : Display Contrast
*#8999*638# : Show Network Information
*#9998*246# : Battery Status- Memory Capacity
*#9998*324# - *#8999*324# : Debug Screen
*#9998*842# - *#8999*842# : Vibration Test
*#9998*289# - *#8999*289# : Alarm Beeper - Ringtone Test
*#8999*9266# : Display Received Channel Number And Received Intensity

*#8999*364# : Watchdog ON/OFF
*#8999*427# : WATCHDOG Signal Route Setup
*2767*3855# : Full Reset (Caution every stored data will be deleted.)
*2767*2878# : Custom Reset
*2767*927# : Wap Reset
*2767*226372# : Camera Reset (deletes photos)
*2767*688# : Reset Mobile TV
#7263867# : RAM Dump (On or Off)
#*4773# : Incremental Redundancy
#*7785# : Reset wake-up & RTK Timer Variables
#*7200# : Tone Generator Mute

#*3888# : BLUETOOTH Test Mode
#*7828# : Task Screen
#*2562# : Restarts Phone
#*2565# : No Blocking? General Defense.
#*3353# : General Defense, Code Erased.
#*3837# : Phone Hangs on White screen.
#*3849# : Restarts Phone
#*7337# : Restarts Phone (Resets Wap Settings)
#*2886# : Auto Answer ON/OFF
#*7288# : GPRS Detached/Attached
#*7287# : GPRS Attached
#*2077# : GPRS Switch

#*22671# : AMR REC START
#*22673# : Pause REC
#*22674# : Resume REC
#*22675# : AMR Playback
#*22676# : AMR Stop Play
#*22677# : Pause Play
#*22678# : Resume Play
#*77261# : PCM Rec Req
#*77262# : Stop PCM Rec
#*77263# : PCM Playback
#*77264# : PCM Stop Play
#*22679# : AMR Get Time
#*7666# : White Screen

#*7693# : Sleep Deactivate/Activate
#*2286# : Data Battery
#*2679# : Copycat Feature Active/Deactivate
#*3940# : External Loop-Test 9600 bps
#*4263# : Hands Free Mode Activate/Deactivate
#*2558# : Time ON
#*3941# : External Loop-Test 115200 bps
#*5176# : L1 Sleep
#*7462# : SIM Phase
#*7983# : Voltage/Freq
#*7986# : Voltage
#*8466# : Old Time
#*2255# : Call Failed

#*5376# : Delete All Sms!!!!
#*2337# : Permanent Registration Beep
#*2474# : Charging Duration
#*2834# : Audio Path (Hands-free)
#*3270# : DCS Support Activate/Deactivate
#*3282# : Data Activate/Deactivate
#*3476# : EGSM Activate/Deactivate
#*3676# : Format Flash Volume!!!
#*4760# : GSM Activate/Deactivate
#*4864# : White Screen
#*7326# : Accessory
#*7683# : Sleep Variable
#*3797# : Blinks 3D030300 In RED
#*7372# : Resetting The Time To DPB Variables

*#8999*667# : Debug Mode
*#92782# : Phone Model (Wap)
#*5737425# : JAVA Mode
*#2255# : Call List
*#232337# : Bluetooth MAC Address
*#5282837# : Java Version
*#8999*8376263# : All Versions Together
*#8999*8378# : Test Menu
*#4777*8665# : GPSR Tool
*#8999*523# : LCD Brightness
*#8999*377# : Error LOG Menu
*#8999*327# : EEP Menu

*7465625*228# : Active Lock ON
#7465625*228# : Active Lock OFF
*7465625*28638# : Auto Network Lock ON
#7465625*28638# : Auto Network Lock OFF
*7465625*28782# : Auto Subset Lock ON
#7465625*28782# : Auto Subset Lock OFF
*7465625*2877# : Auto SP Lock ON
#7465625*2877# : Auto SP Lock OFF
*7465625*2827# : Auto CP Lock ON
#7465625*2827# : Auto CP Lock OFF
*7465625*28746# : Auto SIM Lock ON
#7465625*28746# : Auto SIM Lock OFF

*#7465625# : Check the phone lock status
*7465625*638*Code# : Enables Network lock
#7465625*638*Code# : Disables Network lock
*7465625*782*Code# : Enables Subset lock
#7465625*782*Code# : Disables Subset lock
*7465625*77*Code# : Enables SP lock
#7465625*77*Code# : Disables SP lock
*7465625*27*Code# : Enables CP lock
#7465625*27*Code# : Disables CP lock
*7465625*746*Code# : Enables SIM lock
#7465625*746*Code# : Disables SIM lock

WINDOWS 8- HACKS AND TWEAKS

WINDOWS 8- HACKS AND TWEAKS:
Hey guys.. so now lets look at some hacks and tweaks to customize your windows 8...If you have used it,, you may have noted that microsoft decided to put the metro interface as their default start screen..as this screen is well suited for touch devices and not PC's, so those of you who would prefer to be switching to the desktop right away on start of the operating system, youmay be interested in bypassing the Metro interfaceautomatically. This method is not disabling Metronor the interface enhancements that go along withit. A tap on the Windows-key for instance bringsyou right back to the Metro interface.

To automatically switch to the desktop during startof the system you need to complete the following
steps:

Create a new plain text document on yourdesktop or another location. You can do so with
a right-click and the selection of New > TextDocument from the context menu. Add the following contents to the new documentand save it afterwards:

[Shell]
Command=2
IconFile=Explorer.exe,3
[Taskbar]
Command=ToggleDesktop

Rename the text document to metro.scf. Make icon before and after the renaming: it should be different after you have renamed it. Now it is time to add the file as a Task to the Task Scheduler. The easiest way to open the Windows Task Scheduler is to press the Windows-key to get into Metro (how ironic), enter schedule, switch to the settings filter on the right, and select the scheduler from the results listing. Select Task Scheduler Library in the new window, right-click in the task listing, and pick the create new task option from the context menu. Enter a name for the task, e.g. Metro, and switch to the triggers tab. Click on the add button here and select at log on in the begin the task menu at the top of the new window. Switch to the actions tab afterwards, select browse, and then the metro.scf file that you have created previously. When you restart Windows 8 now, the operating
system should automatically bypass the Metro interface. On most PCs, This will work..

FREE INTERNET PHONE CALLS

Most of the free phone call applications I list below are PC to phone programs, meaning you can make a free call from your computer to a real telephone number so you don't even need a telephone yourself. Some of the other free internet phone programs will connect your real phone to another real phone for free, making a long distance plan unnecessary.
No matter how it works, it's a free call!
To make a free call using an Internet phone, you might have to download free phone call software or use a soft phone from an Internet phone                                                                                      provider website.

1. Google Voice

As of September 2011, Google Voice is the very best way to make free Internet phone calls. With Google Voice, you can make free phone calls, free PC to phone calls (via Google Talk browser plugin), and free PC to PC calls (also via Google Talk).
Google Voice is much more than a way to make free phone calls on the Internet. Google Voice is primarily a way to manage the phone numbers in your life and can be used to intelligently route incoming calls to your free phone number provided by Google Voice to any other phone you have. With Google Voice, you can also get free SMS, make a free conference call, and get free voice mail services.
Free calls you make with Google Voice must be to numbers in the United States or Canada.
Google Voice is available as a web app that you can use in any browser, including mobile browsers (as pictured here). Dedicated apps are available for Android, BlackBerry, and iPhone users.
Free phone calls with Google Voice are limited to three hours. However, you can continue to make a free call to the same number over and over again.

2. iCall

iCall is another tool you can use to make free internet phone calls. With iCall, you can make free calls from PC to phone using their free software.
The computer that you make calls from can be anywhere in the world but for the call to be free, the number you call must be in the United States or Canada. You can't make free phone calls using iCall if you're calling outside the US or Canada.
iCall is available as a free desktop application for Windows, Mac OS X, or Linux and as a free iPhone app. Free phone calls will be disconnected after a short five minutes but you can call the number back again as many times as you want. You will also hear an advertisement before each call that's around ten seconds long.
A flash-based version of iCall is also available on their website but free calls here are limited to three minutes.

3. EvaPhone

EvaPhone is yet another way to make free Internet phone calls. EvaPhone lets you make free, but incredibly short, PC to phone calls all from a Flash-based interface right on their website.
What makes EvaPhone unique is that you can call nearly any phone in the entire world for free. Another thing that makes EvaPhone unique is how incredibly short that free call is. Free calls range from ten seconds to one minute in length, depending on the destination. You're also also limited to just two calls per day.
After dialing a number on EvaPhone, you'll watch a short video advertisement and then your free call will begin. A countdown timer will begin so you know when you'll be disconnected.
I certainly don't think EvaPhone is the best way to make a free call on the Internet, but if you need to tell someone something fast, don't have your own phone, and don't want to pay for the call or download software, EvaPhone might be the perfect free Internet phone for you.

Free PC to PC Phone Calls

I compiled this list of ways to make free Internet phone calls assuming that you're looking for ways to call "real" telephones. However, if you're only interested in free PC to PC calls, several programs can do that.
A few of the many programs that offer free PC to PC calls that I didn't already mention above include Skype,Yahoo! Voice, and Windows Live Messenger.

HACKING TOOLS

winAUTOPWN v3.0 Released - System vulnerability exploitation Framework
WINAUTOPWN ACTIVE SYSTEMS TRANSGRESSOR GUI [ C4 - WAST ] is a Systems and Network Exploitation Framework built on the famous winAUTOPWN as a backend. 
C4 - WAST gives users the freedom to select individual exploits and use them.
BSDAUTOPWN has been compiled, like always for various flavours and has been upgraded to version 1.8                                                                                                  alongwith all applicable exploits
WINAUTOPWN requires PERL,PHP,PYTHON,RUBY and its dependencies alongwith a few others' too for smooth working of exploits included in it.
The Mole: Automatic SQL Injection Exploitation Tool
Mole is an automatic SQL Injection exploitation tool. Only by providing a vulnerable URL and a valid string on the site it can detect the injection and exploit it, either by using the union technique or a Boolean query based technique. The Mole uses a command based interface, allowing the user to indicate the action he wants to perform easily.
Sqlninja 0.2.6
Features:

 >> Fingerprint of the remote SQL Server (version, user performing the queries, user privileges, xp_cmdshell availability, DB authentication mode)
>>  Bruteforce of 'sa' password (in 2 flavors: dictionary-based and incremental).
>> Creation of a custom xp_cmdshell if the original one has been removed
>> Upload of netcat (or any other executable) using only normal HTTP requests (no FTP/TFTP needed).
>> TCP/UDP portscan from the target SQL Server to the attacking machine, in order
to find a port that is allowed by the firewall of the target network
and use it for a reverse shell.
>> Direct and reverse bindshell, both TCP and UDP
>> ICMP-tunneled shell, when no TCP/UDP ports are available for a direct/reverse
shell but the DB can ping your box.
>>
 DNS-tunneled pseudo-shell, when no TCP/UDP ports are available for
 a direct/reverse shell, but the DB server can resolve external hostnames
 (check the documentation for details about how this works).
>>
 Evasion techniques to confuse a few IDS/IPS/WAF.
>> Integration with Metasploit3, to obtain a graphical access to the remote DB
 server through a VNC server injection.
HexorBase - The DataBase Hacker Tool
HexorBase is a database application designed for management and audit multiple database servers simultaneously from a single location, is able to perform SQL queries and brute force attacks against servers common database ( MySQL, SQLite, Microsoft
SQL Server, Oracle, PostgreSQL ).
This tool is simple to use and very practical, may have to know a little SQL, but the basics.
Net Tools 5.0 (Net Tools 5.x)
This tools is a hacker friendly. Net Tools is a comprehensive set of host monitoring, network scanning, security, administration tools and much more, all with a highly intuitive user interface. It's an ideal tool for those who work in the network security, administration, training, internet forensics or law enforcement internet crimes fields. Net Tools is mainly written in Microsoft Visual Basic 6, Visual C++, Visual C# and Visual Studio .NET.
There has a 175 tools list in one software..
DRIL – Domain Reverse IP Lookup Tool
DRIL (Domain Reverse IP Lookup) Tool is a Reverse Domain Tool that will really be useful for penetration testers to find out the domain names which are listed in the the target host, DRIL is a GUI, JAVA based application which uses a Bing API key.

DRIL has a simple user friendly interface which will be helpful for penetration tester to do their work fast without a mess, this is only tested on Linux but as it is JAVA it should work on Windows too.
There are various other tools which carry out similar tasks..
SQL MAP 0.9
sqlmap 0.9 has been released and has a considerable amount of changes including an almost entirely re-written SQL Injection detection engine.

Sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a kick-ass detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections. Its a good tools for find Sql Vulnerability.

New Features/Changes-->

Rewritten SQL injection detection engine (Bernardo and Miroslav).
Support to directly connect to the database without passing via a SQL injection, -d switch (Bernardo and Miroslav).
Added full support for both time-based blind SQL injection and error-based SQL injection techniques (Bernardo and Miroslav).
Implemented support for SQLite 2 and 3 (Bernardo and Miroslav).
Implemented support for Firebird (Bernardo and Miroslav).
Implemented support for Microsoft Access, Sybase and SAP MaxDB (Miroslav).
Added support to tamper injection data with –tamper switch (Bernardo and Miroslav).
Added automatic recognition of password hashes format and support to crack them with a dictionary-based attack (Miroslav).
Added support to fetch unicode data (Bernardo and Miroslav).
Added support to use persistent HTTP(s) connection for speed improvement, –keep-alive switch (Miroslav).
Implemented several optimization switches to speed up the exploitation of SQL injections (Bernardo and Miroslav).
Support to parse and test forms on target url, –forms switch (Bernardo and Miroslav).
Added switches to brute-force tables names and columns names with a dictionary attack, –common-tables and –common-columns.
Ani-Shell
Ani-Shell is a simple PHP shell with some unique features like Mass Mailer , A simple Web-Server Fuzzer , DDoser, Back Connect , Bind Shell etc etc ! This shell has immense capabilities and have been written with some coding standards in mind for better editing and customization.

  Customization

1. Email Trace back is set to Off as default and emails will not be sent , If you are setting
this feature on make sure you change the default email address (lionaneesh@gmail.com)
 to Your email address , Please Change it before using.
2. Username and Passwords are set to lionaneesh and lionaneesh respectively , Please change them for better
security.
3. As a default Lock Mode is set to on! This should not be change unless you want your shell exposed.

Default Login
Username : lionaneesh
Password : lionaneesh

Features

    Shell
    Platform Independent
    Mass - Mailer
    Small Web-Server Fuzzer
    DDoser
    Design
    Secure Login
    Deletion of Files
    Bind Shell
    Back Connect
    Fixed Some Coding errors!
    Rename Files
    Encoded Title
    Traceback (Email Alerts)
    PHP Evaluate
    Better Command Execution (even supports older version of PHP)
    Mass Code Injector (Appender and Overwriter)
    Lock Mode Customization

Latest Version Addition
    Mail Bomber (With Less Spam detection feature)
    PHP Decoder
    Better Uploader
    Fixed some Coding errors

Intercepter Sniffer
Intercepter is a sniffer tool which offers various capabilities including sniffing for password hashes related to ICQ/IRC/AIM/FTP/IMAP/POP3/SMTP/LDAP/BNC/SOCKS/HTTP/
WWW/NNTP/CVS/TELNET/MRA/DC++/VNC/MYSQL and ORACLE. It also sniffs ICQ/
AIM/JABBER/YAHOO/MSN/GADU-GADU/IRC and MRA protocols. It has a built-in arp poisoning module, can change MAC addresses of LAN adapters, and has various other interesting functionality.

COMPUTER BASIC

Easy Learn Computer will discuss about computers ranging from the most basic. Before going on to further yahap is useful to know the basic computer first. In this case the basic knowledge to be learned about the introduction of Hardware and Software. 

HARDWARE
Computer hardware can be divided into several parts :

     CPU (Central Processing Unit)
     Input Device
     Output Devices
                                                                                                  Storage Device

CPU (Central Processing Unit)
The CPU is the most important part of a computer. In it there is a lot of hardware to connect and work processes input devices and send the results to the Output Device. CPU Unit consists of: main board, processor, RAM / Memory, Power Supply, Input / Output Controller, Display Controller, Multimedia Controller, Network Controller.
  • Main board
Main board serves to put the whole device controllers. Including Processor, RAM, Power Supply, I / O Controller, Display Controller and all the equipment is placed in the socket provided by the main board. Manufacturer Main board: Asus P5Series, AMPTRON, Compaq, Chip PC, Gigabyte, ECS, Dell, IBM
  • Processor
Processor is the brain of the computer, such as the human brain in all commands and command results in the process by the Processor. The processor is a chip that is often called "Microprocessor" which is now the size has reached Gigahertz (GHz). The measure is a matter of the speed of the processor to process data or information. Part of Processors the most important part of the processor that is divided into three: Arithmetic’s Logical Unit (ALU) Control Unit (CU) Memory Unit (MU) The more velocity and higher processor technology, the better the performance of the computer.
Interface = Socket 370 (P-3), Socket 478 (P-4), Socket A / B (AMD), PGA 778 (Dual Core and up) For example, Intel P1, P2, P3, P4, Dual Core, AMD Duron, Athlon, etc. 
Manufacturers processors are widely circulated in the market are AMD, Apple, VIA Cyrix, IBM, IDT, and Intel.
  • RAM / Memory
Random Access Memory file storage program executed by the computer functions. The greater the capacity, the more closely the process as well. My experience with the system Windows XP CPU will be very responsive to 2:00 GHz with 512MB RAM. 
Type / Interface = EDO (oldest), SDRAM, DDR1, DDR2, DDR3 (newest, fastest, cheapest)
  • Power Supply
Power Supply serves as the resources used to use all the tools available on the computer. Recommendations When Power Supply for your computer is one that has great power, better computer power advantages. 
Pin Type: 12 Pin Interface (old type), 20 Pin ATX, ATX 20 Pin + 4 Pin, ATX 24 Pin + 4 Pin (Latest)
  •  I / O Controller
Controller to manage devices connected to the I / O ports (Port Serial, PS2, LPT). Examples of devices that connect to the PS2 Mouse, Keyboard P2, Printer LPT.
Interface = ISA, PCI
  • IDE controller and SCSI Controller
The controller is to manage the performance of the devices connected to the IDE or SCSI port. The tools are used to connect hard drives, floppy disks, CD Rom.
Interface = ISA, PCI
  • Display Controller
Display Controller to produce a display to a monitor or TV. There are two types of the first on board, both are often called VGA Card. VGA has its own RAM larger capacity, greater RAM then the display on the monitor will be more subtle. VGA Card also serves to reduce load performance RAM / Memory on the use of certain 3D games, 3D video, and programs that require high-resolution graphics. 
Example RAM VGA: 16, 32, 64, 128, 224, 256, 512, 1G. 
Interface = ISA (Old Type), PCI (Old Type), AGP, PCI-Express (New) 
Manufacturer VGA: Nvidia, S3 Trio, SIS, ATI Rage Series, etc.
  • Multimedia Controller
Multimedia Controller for producing sound often called a Sound Card (Sound). Sound Card Technology Today technology developed to support 3D Surround 5.1 (mean 5 speakers with 1 Central as Base 6 Channel). 
Manufacturer: Realtek, CMedia, ESS, Creative Sound Blaster. Interface = ISA, PCI
  • Network Controller / Network Adapter / LAN Card
Network Controller / Network Adapter / LAN Card are used as a port that connects two or more computers. Usually used for Chat, File Transfer, Database Programs, internet access (if using a modem), Multi Player Games, etc. 
Interface = ISA, PCI


INPUT DEVICE
Device used to enter commands.
  • Keyboard
This tool is to include input ASCII characters to be translated so that the system will generate an order.
Port Interface = Serial / PS2 / USB
  • Mouse
This tool is a pointing device (pointer) that will help to access the computer.
Port Interface = Serial / PS2 / USB
  • Scanner
This tool will convert real image into Image File (File Photo)
Port Interface = LPT / USB
  • Joystick
This tool as a game controller.
Port Interface = LPT / USB


Output Devices 
That tool works issued the results of a command input device.
  • Monitor
To display the results of the CPU.
  • Printer
As a means of printed documents. 1. Laser printers, this printer to print quality documents the approach documents have been processed in a computer. 2. Ink-jet printers, laser printers compared to New Media, the initial cost of the printer type more efficiently. 3. Dot matrix printer, this being the most preferred type ON PC era. In this type of printer, the image produced by a collection of the check point spread short distances so it looks uneven. 4. Plotter, printers use a pen set to make World Prints related engineering or architecture. 
Manufacturer : Canon, Epson, HP, Lexmark, Apollo, etc. Port Interface = LPT, USB
  • Speaker 
As the sound output device. We can also use earphones.

Storage Device 
That the tool serves as a place to store data in a file.
  • Fixed Hard disk / Hard Disk 
Chasing placed inside the CPU, is used to store files in a very large capacity. At present, the production capacity of hard disk storage has reached more than 512 GB. 
1KB = 1024 B 
1MB = 1024 KB 
1GB = 1024 MB 
For example, file documents / letters usually only takes 200kb, 4MB MP3, Video CD 50MB / song, 700MB / CD full. 
Interface = IDE, SCSI, SATA Manufacturer: Samsung, Maxtor, Seagate
  • Floppy disk Drive
Floppy disk drive is the additional storage that can be moved - moved / not fixed, including the Removable disk. Since capacity is only 1.44 MB floppy disk now abandoned and turned to flash a current capacity up to 8GB, safer and maintenance free. 
Interface = floppy interface 
Manufacturer: Panasonic, Samsung
  • CD / DVD Drive
Used as a media reader CD (Compact Disk / Disk tile) or a DVD. CD / DVDRW can be used to read the CD / DVD, and burn to CD / DVD. The storage capacity of a standard 700MB CD, DVD 1 Layer 4.48 GB, 8.15 GB DVD 2 Layer. 
Interface = IDE, SCSI, SATA 
Manufacturer: Samsung, Liteon, LG, Pioneer
 
Other Device (Other Devices)
  • Flash Disk 
Flash Disk is also included in the Storage Device, floppy disk the same function, but has a large capacity and maintenance free. My experience using a floppy disk is very uncomfortable and unsafe, because it must be protected from dust, sunlight, water, magnets, etc. A common mistake because unreadable. Flash disk capacity from 512, 1GB, 2GB, 4GB, 8GB and growing. 
Interface: USB
  • Bluetooth Adapter 
This tool converts the digital data into a particular frequency radio signals to connect with other tools such as HP, other PCs, Bluetooth Mouse, Bluetooth Speaker, etc.
Interface: USB
  •  TV Tuner
This tool serves to convert the RF signal (TV signals) into digital signals. With this tool for watching TV on the computer is not a problem. Usually equipped with a radio. 
Interface: PCI / USB
  • External Hard Drive 
Function and capacity similar to a fixed disk / hard drive. The difference this device can be taken anywhere, because it includes the Removable Disk. 
Interface: USB 
SOFTWARE
Software is a program, device drivers, and files on the computer. Namely;
  • Operating System (OS)
The operating system is the software that controls the performance of the main system. In determining the OS to consider the compatibility (support for programs to third parties, as well as support for hardware), stability (Often Mistake or not), and Price Range (OS Windows XP Home Edition for dollar cost nearly 800ribu, Linux offers a free OS such as Ubuntu). 
Example OS, DOS 6.22, Windows 3.11, Windows 95, 97, 98, 2000 Server, XP, 2003, Vista, Linux Mandrage, Linux Ubuntu, Suse Linux, etc.
  • Program Application
The application program is a supplemental program to support the performance of the computer. (Price Software Microsoft Office Word, Excel Access to 1.7 million). Example Applications, Office (Word, Excel, etc.), Winamp, Power DVD, Pascal, Application Games, etc.
  • Device Driver 
All the hardware described above will not work without a Device Driver is installed in the Operating System. For example, the printer cannot print without a Device Driver. For Exsample : Suppose we want to install a TV tuner card installed in the PCI slot. Once the computer is turned on it will be confirmation that the new hardware found and then the computer asks Device Drivers for new hardware. This could mean that the computer wants to know what the name, the function and workings of the new hardware and ask identifier wheel / in the form of software (usually included in the package tool). After we gave the driver files in the form of software, the computer will know that the name of this tool is the TV Tuner, Brand A, mounted on a PCI-X slot, and so on. However, the operating system has been equipped with many hardware-hardware drivers that are often used in PCs. If we put a new tool to the computer then the tool is ready for use, it is called Tool Compatible. Stay updated drivers so we can work optimally. For example, flash, LX-300 Printer, Monitor

SOFTWARE KEYS AND SERIALS

Serial numbers (a.k.a. key codes, product keys, installation keys, serials, etc.) are needed before you can install almost any popular software program. Serials and key codes are often required during installation or after using a program for a certain period of time.
If you've lost your serial number or product key code, there is a really easy way to find it if the program is still installed. You might even be able to find a program's serial number if you've uninstalled the software but only if the serial number information was left in the Windows Registry during the uninstall process.
The easiest way to find a lost serial number or product key code is with a free product key finder program.
Product key finder programs are software tools that automatically search your computer for the serials and keys stored in the registry. When you installed your operating system and other software, the serial numbers and product keys used during their installations were stored inside the registry.
You could look in the registry for the serials and keys yourself but they can be very hard to find and are often encrypted.
Most product key finder programs were originally designed to find the serial numbers and key codes for operating systems like Windows 7, Windows Vista, or Windows XP but many of them find serials and keys for many other programs too.
 In your search for help with serials and key codes, you've probably come across software cracking tools, keygen programs or maybe even lists of key codes free for the taking. It's very important to realize that none of those resources are legal ways of obtaining serial numbers, key codes, product keys, or any other unique code designed to protect programs from being pirated. The only legal way of installing software is by using a valid serial number or key code obtained through a legal purchase of the software program.

NEW PC SOFTWARES SERIAL KEYS IN UR MOBiLE Just sMs JOIN LAL2011 to 9219592195.
Convert u r PC in 3D.
 
CubeDesktop Pro 1.4.0 Download at www.cubedesktop.com Serial: KI55I- BQRM5-DKTA4-IXE6Y-KNIBK.
 
IDM V6.05 Serial: N3QM3-BQBR3-EWKOZ- WJ6TC VQ6UH-CS1K6-7WN2V-IY2NA S375D-1TPSQ-Q2330-8CQR9
 
Note: Offline. TUNE UP UTILITES.2011 KEY JDV194- TAB6KJ-X661V2- Y9NHN2-34FRR7- B2JW2Q OR J250BQ-JV7CKD-57MEQ9- TNQY37- T227VK-NNKJ0F
 
Avg 2011 antivirus key: P9UZV8- UZ77YE-1DN92W-PCRMH7- B6QK52- MEH05T.
 
MS office 2007 KGFVY-7733B-8WCK9- KTG64- BC7D8.
 
Nero 9.4.26.0 9M03-01A1-PCX7- K31A-8A94-98PT-KT2E-522A.
 
Malwarebytes Serials ID:8LA62 Key:MY5WD0CT75QT60C1 ID:2TN84 Key:MTQ78EXCEVM0JECN ID:9QX86 Key:4P6YR7J9GFRD9BEH ID:6IA26 Key:AT8HKXXTFATNMDF9
 
Bigasoft FLV Converter 3.5.0.3947 Serial Bigasoft FLV Converter 3.5.0.3947 Serial Serial :- 0169- AB70-49A9-5A51- FD1F-3D95- DBBF-BC9B
 
ESET Nod32 Antivirus [all versions] Username & Password Username: EAV-36902568 Password: efpsuf6btn Usrnm: EAV-36902580 Psswrd: 566k3ap8ep Usrnm: EA
 
Adobe photoshop cs4 Name: Cyberspirit 21 s/n: 1325-1454-5884-7210-4830-3247.
internet download manager Y30OZ- DNQH7-FRWPW-YYZÍA.
 
Nero Multimedia Suite 10 Platinum HD Nero Multimedia Suite 10 Platinum HD: - 9X13-01AA- TU89-2UCZ-L852-H2P8- PP40-K0XE 9X03-014M-337H-H1CZ- L2KK-229X-1Z.
 
Cinema 4D Keys Cinema 4D Keys Cnma 4D:- 10901034523-CFVZ-NMRF-MBGK- XPTZ BodyPaint:- 31000034523- CJLT- DJLP-RTNM-PJPV Cnma 4D 9.5:- 39500034523-RDXP-N.
 
Tune Up Utilities 2011 Serial Tune Up Utilities 2011 Serial Serial :- J250BQ- JV7CKD-57MEQ9- TNQY37-T227VK- NNKJ0F
 
4Media HD Video Converter 6.0.12.0914 Serial 4Media HD Video Converter 6.0.12.0914 Serial User Name :- Adrian Dennis Srl Number:- Adrians Cool Subscr
 
DivX Plus 8.1 Build 1.0.8.22 Serial DivX Plus 8.1 Build 1.0.8.22 Serial Serial:- 6TRBSNAHECFKIVYPDJNZ
 
Nero Serials New Serials :- Nero Multimedia Suite 10:- Serial number: 9X03-0154-4H84-WWPL-1WPZ- AP64- K532-XMML Srl nmbr: 9X03-016C- MXEX-4536-T0L7-2W2
 
Cool Record Edit Pro v7.9.9 Serial Cool Record Edit Pro v7.9.9 Serial Name:- Adrian Dennis Key:- CPRO- TF477-46YM4-W74MH-6YDQ8
 
CorelDRAW Graphics Suite X5.v15.0.0.486.Keymaker ( CorelDRAW Graphics Suite X5.v15.0.0.486.Keymaker Size:-20Kb Download Link :- http:// adf.ly/6sTE
 
Ahead Nero v7.5.1.1Keymaker or Keygen Ahead Nero v7.5.1. Keygen Size:-121Kb Download Link :- http:// www.ziddu.com/ download/11714194/ Ahead.Nero.v7.5.1
 
iPhone Ringtone Maker Serial iPhone Ringtone Maker Serial Name:- Adrian Dennis License Code:- STX! LZ67251577250Z3U4C68- FAB1-73B2-5D1E
 
ESET NOD32 SMART SECURITY Username Password Sep 14 ESET Nod32 Antivirus [all versions] Username & Password Username:EAV-34426223 Password:vpvepun3vf
 
Adobe Acrobat v9.0.0 Pro Extended Patch Adobe Acrobat v9.0.0 Pro Extended Patch Size:- 288kb Download Link :- http:// adf.ly/6eb5
 
Xilisoft Video Converter Ultimate 6.0.3.0416 Patch Xilisoft Video Converter Ultimate 6.0.3.0416 Patch Size:-302Kb Download Link :- http:// tinyurl.com
 
Emicsoft Video Converter v 4.1.16 Patch Emicsoft Video Converter v 4.1.16 Patch Download Link :- http:// adf.ly/6SkR
 
AVG 9.0 antivirus software key valid till 2018 and aslo update ur antivirus: 9A- ABL8Y-29G62-C33BA-QTNSH- GETW3.
 
Subliminal Flash-3.0 Crack Subliminal Flash-3.0 Crack Download Link :- http:// www.ziddu.com/ download/11577120/ subliminal- flash-3.0CrackbyMAnju.rar.ht
 
Adobe Photoshop CS5 Serial Serials :- 1188-1702-9219-4234-2059-4581 1330-1281-8916-6015-7348-5124 1325-1558-5864-4422-1094
 
System Mechanic V9.5 Serial System Mechanic V9.5 Serial Name:- ReanimatoR 3.7i Standard Edition:- 64898- ST524-7299881907 Professional Edtn:- 58959-P
 
StyleXP 3.13 Keygen Download Link :- http://www.ziddu.com/ download/11466753/ Style.XP.3.13KeygenByMAnju.zip.html
 
Red Call Recorder 1.1 Serial Red Call Recorder 1.1 Serial 1.Install Application 2.2 register Just use this serial Serial:564fdf867g9a65d47fg987h

COMPUTER MAINTENANCE

Simple Way Maintenance Your Computer

Maintenance Computer or Computer Care, especially the CPU will usually only be done after the complaint or damage, it is less precise. Computer maintenance should be performed regularly both on the CPU and the monitor. Actually there are some fundamental things that we often forget to do with how to care for a computer or a computer or a PC maintenance tips, which can cause damage to the computer.


Computer Hardware Maintenance section

The concentration of dust on the device in the CPU and Monitor. Especially on computers (PCs) are placed in open space. High dust concentrations will cause impaired peripheral connections on the socket. Also during the rainy season or the temperature of moist dust will absorb moisture and behaves like a conductor who can connect short (surge). It also resulted in an insulator layer on the PCB peeling causing corrosion on copper lines. If this happens, the computer maintenance will be more difficult because there is no way but to replace the peripherals.

Refrigeration, on several types of computers, especially older computers have a processor that is high enough temperature but has a way of cooling which I think is still lacking. Room temperature is ideal for the PC about 19 degrees Celsius


HardDisk space is not proportional. 80GB hard drive size is certainly not proportional if there are only 2 partitions each 40GB C and D. Whereas the use of System C is not more than 10 GB.

Installation of peripherals that are less fit or less sturdy. Usually this happens on a local PC assembly. Often means the installation of Motherboard or other peripherals with screws that are incomplete or less tight. This is often overlooked in how to care or computer maintenance tips. This can be fatal. How to install socket fitting, it also can be fatal.

Power Suply conditions.
It often escapes attention when we take care of the computer. On the use of long, most power supply will decrease power. Power Capacity Power Supply is inadequate and does not use Stavolt, also can damage your CPU componen. Frequent power drop / off or less power. This will cause the computer to suddenly die without process shutdown


Computer Maintenance Software section

Incompatibility of OS, Application, and the volume of data with computer specifications are used.
Frequent use of computers for heavy games. Running games on the PC will generate a lot of space-space fragment and temporary files that slow computer performance

The virus. The virus can lead to slow access to the computer and damage to systems or data. Even in extreme conditions can cause the computer to jam / hang. If it's stuck there is no other way than pressing the Restart button on the CPU. This often occurs automatically when the CPU is often die without ShutDown process which means it will shorten the life of the computer hard drive in particular. Usually the virus is transmitted through the stick and the Internet. Besides the selection of inappropriate anti-virus also can affect computer performance.

By knowing the things above, to anticipate needs to be done to care for a computer or  computer / PC maintenance tips in total as follows:

Clean the dust on the motherboard and other peripherals on the inside of the CPU with a paint brush and small to medium-size angle and narrow crevices. Perform well on Power Suply by opening the casing / box power supply first and note the solder-solderannya whether to re-soldering. Or use a high pressure air (compressor) so that peripherals completely clean of dust.

Remove and reinsert the peripheral sockets. This is to ensure a perfect connection to the connectors periphera. just once every PC maintenance.
Remember, Do not use liquid cleaning Contact Cleaner in peripheral connector sockets because of the way is wrong. Fluid Contact Cleaner is very difficult (very long) dry and it makes dust stick easily.

Notice how the installation of motherboard and other peripherals is there a screw is still lacking or lax. Complete and tighten the screw-couplers.

Customize the OS and Applications with the specifications of the computer and do not store data on the hard drive is too big. This will aggravate the performance of your PC

Make a hard drive partition that is proportional. For example 80GB Hard Disk Space Used C with no more than 5GB would be better if we created 3 partitions with 10GB for C, 35GB to 35GB for D and E. Accordingly with access to the System and data loading will be faster.

Do not use the PC for heavy games unless your computer is designed for the Game. If it's maniac game, just use the Playstation.

Use appropriate and always Antivirus Update, in the presence of antiviral always update will alleviate or tips on how to care for computer maintenance computer or PC.

Use Air Conditioning to the PC or if not possible can be compensated by way of mounting Coolling Fan Extras when the processor is too high a temperature above 36 degrees Celsius. This happens especially on old computers.

At certain times do Defragment Hard Drive to rearrange the order of the files to your computer's performance easier. But not too often ..!

Perform Reinstalling the OS and applications when necessary. Reinstallation thoroughly once in a year it's no exaggeration to refresh the entire system. especially if we want a system upgrade. (Eg from XP-SP1 to XP-SP2 or XP-SP3)

Perform the removal or Remove data or application in which if not effectively (never used)

Frequently cleaning the Temporary files, Prefetch files, Chokies files and junk files in the Recycle Bin.

1. The steps to clean Prefetch File:

Log Explorer - Go to C: / Windows / Prefetch - Select All (Ctrl-A) - Dell

2. The steps to clean Temporary Files:

Log Explorer - Go to C: / Windows / Temp - Select All (Ctrl-A) - Dell

After these two steps above do not forget to clean the garbage file2 in the Recycle Bin by right-click the Recycle Bin - click Empty Recycle Bin - Click Yes

3. As for cleaning Chokies files you can use CCleaner Software

CCleaner Freeware Software

4. Using Utility Software for repairing your computer registry

Chokies file2 will appear whenever we connect to the internet. The more we often connect to the internet ... it's a good browse, download or upload, the more files Chokiesnya. If you connect to the internet every day, clean the file Chokies at least once or twice a week.

Always Backup the data were deemed important, you can copy and paste on the CD. this is to anticipate at any time if exposed to a virus attack or fatal damage to the Hard Drive

Complete with UPS so that if a sudden power failure there is still time to save data and shutdown the computer

Do not let your computer too long unused (never turned on at all in a long time). At least a minimum of every day the computer is started about 1 s / d 2 hours. This is to warm the inside of the CPU so that the air free from moisture.

Do not expose your computer from shock, vibration and pounding especially when the computer is on, this is very dangerous because it can cause fatal damage

Do not hesitate to call a computer technician to perform maintenance on your computer, if you feel unable to do so.

Maintenance Computer or Computer Treatment in the above can be carried out regularly according to the condition of the computer and its environment. Usually computers that require immediate treatment have symptoms such as access starts to slow down, frequent jams / hangs, often scanning the C drive every time the computer is turned on, blue screen memory, applications often error or do not go according to their functions, and other things that lead users begin to feel uncomfortable with computer performance.

With the computer how to care for a total and expected performance of our computers regularly will always excellent and durable