Friday, 13 September 2013

How to Spy on Cellphones?

Is Someone Holding Secrets from You?
Reveal them All with the World’s Best Cell Phone Spy Software! 
Today, there exists hundreds of cell phone spy software applications on the market where many of them are nothing more than a crap. Some are good and only a few of them are the best. Also, each spy software has a different set of features and operating format which makes it hard for the novice users (perhaps like you) to make the right choice so as to match their monitoring needs.
So, in order to help our readers find the best spy software, I have decided to give a thorough review of the Top 2 Best Selling spy phone software on the market.
1. Mobile Spy – (TESTED)
2. SpyBubble - (TESTED)
Mobile Spy and SpyBubble are the current leaders in the market which are used by thousands across the globe to spy on a cheating spousemonitor employees and keep an eye on their children. You can find a complete review of these two products below:

1. Mobile Spy Review:

Mobile SpyMobile Spy is one of the best and most popular cell phone spy software out there on the market. It offers an effective means to monitor the target cell phone and record activities like phone calls, text messages, GPS location, emails, web activities and much more. All the monitoring/recording process takes place in a complete stealth mode, so that the target user never gets to know that he/she is under surveillance. Mobile Spy has every feature that a true spy software should have. This makes it a complete cell phone spying kit.

How Mobile Spy Works?

After your purchase, you can directly download the installation module onto the target cell phone. Installation takes only a few minutes (2-3 min approx). After the installation, each activity on the target phone is recorded and uploaded onto the Mobile Spy servers. You can login to your online account from your PC (or any computer in the world) to view the logs at any time. The logs contain Text messagesContacts ListCall History,GPS Locations and many other information as mentioned below.

Mobile Spy Features:

Here is a list of features that you get with Mobile Spy:
  • Live Control Panel – This is a wonderful feature that makes it possible to watch the live screen activities of the target cell phone just like a telivision.
  • Stealth Camera -With this feature, you can initiate the target phone to take a secret photo that you can view later through the control panel.
  • Record Phone Surroundings – Remotely record the activities of phone surroundings in the form of an audio clip.
  • Phone Call Logs – Each incoming and outgoing number is logged along with duration and time stamp.
  • SMS Logging – Records both incoming and outgoing SMS.
  • Phone Book Access – Gain access to all the contacts that is stored on the target cell phone’s memory.
  • Record Web Activity – The program records all web activities including emails, websites visited, Instant Messenger, YouTube and social media activity.
  • GPS Location Tracking – Track the exact location of the cell phone user at any given time.
  • Instant Alerts: – Get instant notification when the user conducts some prohibited actions on the target phone.
  • Application Blocking – You have the option to block certain applications from being accessed on the target cell phone.
  • Cell ID Tracking: – With this option, it is possible to track the phone’s location during the absence of GPS.
  • SMS Commands – Remotely send SMS commands to lock/unlock the phone usage or delete call history, SMS logs, photos and videos from the target phone at any time.
  • Remote Uninstall – With this feature, you can remotely uninstall the spy program any time you decide to stop spying.
  • 100% Undetectable.

Compatible Cell phones:

Mobile Spy is compatible with most types of phones currently available in the market including:
  • Android
  • Blackberry
  • Windows Mobile
  • iPhone
  • Symbian OS (old Nokia phones)
  • iPod and Tablets
2. SpyBubble PRO Review:
SpyBubbleSpyBubble PRO is one of the top rated cell phone monitoring software on the market which turns any compatible cell phone into a spy phone within minutes.
It offers a rich set of features that are sufficient for most parents and employers to monitor the activities of their children and employees.

How SpyBubble PRO Works?

The working of SpyBubble PRO is exactly same as mentioned in the case of Mobile Spy.

SpyBubble PRO Features:

SpyBubble PRO supports most features as that of Mobile Spy except some of the advanced ones like: “Live Control Panel”, “Stealth Camera”, “Application Blocking, “Remote Uninstall” and “Cell ID Tracking”. However, it supports the “Call Interception” feature (Listen to the actual calls LIVE on the target cell phone) which you do not get on Mobile Spy.
LIVE Call Listening (Call Interception): When the target cell phone is on the conversation, you will receive a secret SMS notification on your phone. At this time you can call the target phone to listen to the live conversation going on. This feature simply works like a 3-way conference call but takes place in a complete stealth mode and hence 100% undetectable!

Compatible Cell Phones:

  1. Nokia, LG, Samsung and Sony Ericsson Phones (Symbian & Android)
  2. BlackBerry Phones
  3. Apple iPhones and iPads
  4. Windows Mobile Phones
Below is a head-to-head comparison of features supported by these to spy programs.
Mobile Spy vs. SpyBubble PRO:
Mobile Spy vs. SpyBubble Pro

Which Cell Phone Spy Software to Choose?

If you ask me, Mobile Spy is my choice! Because, this feature rich software at a very low price of $49.97 (for 3 months) is nothing more than a steal. However, if you wish to listen to the LIVE phone calls, you need to go for SpyBubble PRO which costs you a few extra bucks.
If you’re looking for an all-round spy software at an affordable price then Mobile Spy should be your choice. If3 you really need the “LIVE phone call interception” feature, then go for SpyBubble PRO.
This post was originally posted on GoHacking.com

Caller ID Spoofing.

Caller ID spoofing is the act of making the telephone network to display any desired (fake) incoming number on the recipient’s Caller ID display unit instead of the original one. With this, it is possible to make a call appear to have come from any phone number that the caller wishes.
Have you ever wondered to know how to perform this? Well, read on to discover more information on how to spoof Caller ID and play prank on your friends.
Unlike what most people think, an incoming call may not be from the number that is displayed on the Caller ID display unit. Because of the high amount trust that the people have in the Caller ID system, it is often possible for the caller to easily fool the call recipients and make them believe that the number displayed on the Caller ID display is real. This is all possible through the technique called Caller ID spoofing.

How to Spoof Caller ID?

You can easily spoof any Caller ID using services like SpoofCard. In order to use the spoofcard service, you need to pay in advance and obtain a PIN (Personal Identification Number) which grants access to make a call using the Caller ID spoofing service. Once you have purchased the service, you will be given access to login to your SpoofCard account. To begin with, you need to call the phone number given by the SpoofCard service and enter the PIN. Now, you will be given access to enter any phone number you want to call and also the number you wish to appear on the recipient’s Caller ID display unit.
Once you select the options and initiate the calling process, the call is bridged and the person on the other end receives your call. The receiver would normally assume that the call was coming from a different phone number (the spoofed number chosen by you), thus deceiving the recepient into thinking that the call was coming from a different individual or organization than the caller’s. In this way, it becomes just a cakewalk to spoof Caller ID and fool the receiver on the other end. SpoofCard also provides an option to change the tone of your voice so that it can appear as a male or a female voice.
Thus, you neither need to be a computer expert nor have any technical knowledge to spoof Caller ID. For more information on this service, you can visit the SpoofCard website from the link below:

How Caller ID Spoofing works?

Caller ID spoofing is done through various methods and using different technologies. The most commonly used technology to spoof Caller ID is VOIP (Voice Over IP) and PRI (Primary Rate Interface) lines.
Today, most VOIP systems provide an option for its users to enter whatever number they want in the calling party field and this number is sent out when they make a call. Hence, it is easily possible for any user to spoof Caller ID provided they have a VOIP system and know how to properly configure it to spoof the Caller ID. However, sites like SpoofCard provide an easy and cheap spoofing services for those who aren’t using VOIP systems that they can configure themselves.
Caller ID spoofing is possible and being performed right from the days Called ID system was introduced. However, most people are unaware of the fact that it is possible to spoof  Caller ID and make any number to be displayed on the receiver’s end. In the past, this was mostly used by telemarketers, collection agencies, law-enforcement officials, and private investigators. But today, it is available to any Internet user who wish to do this.
This post was originally posted on GoHacking.com

How to Hack Symbian S60 Phone to Install Unsigned apps?

If you own a Nokia Symbian S60 phone, you will most likely be aware of the fact that it is not possible to install applications on it unless they are signed using a valid certificate. Have you been trying to install applications on your S60 3rd or 5th edition phone but ending up getting a certificate error? At times, this can be really annoying, but here is a smart solution to this problem!
Here in this post, I will show you how to hack your Symbian S60 3rd or 5th edition smartphone, so as to modify the phone’s firmware and completely bypass the mandatory signing requirement. So, once you are done with this one time hack, you should be able to install any compatible application including unsigned and those with an expired certificate.

What is the Need for Signing Applications?

From the 3rd edition onwards, all the Symbian S60 applications need to be signed in order to ensure their integrity, so that it would not be possible for a third party to tamper with the application. Also, signing ensures that you always install applications from a trusted source.
However, there are many freeware and beta applications that come unsigned as the developers cannot afford to buy a symbian certificate. Hence, it can be a real nightmare for the users who need to install such applications on their phones. So, here is a step-by-step procedure to hack your phone and permanently disable this security feature:
  1. Download HelloOX2 V2.03 or the latest version from the HelloOX2 Ofiicial Website.
    HelloOX2 is an excellent tool to hack Symbian S60 3rd, 5th and Symbian^3 smartphones which makes it possible to install a root certificate by gaining full access to the phone’s system files. With this capability, you can install anything you want on your phones without the need to worry about the annoying certificate error!
  2. The signed version of HelloOX2 demands for a donation and hence, only the unsigned version is available for free download. So, if you have the unsigned version, you need to sign it before installing on your phone. In order to sign any application, you need to have the certificate and the key file which can be obtained as follows:
    • Go to the OPDA Website, get registered and login to your account.
    • Click on the “Apply Certificate” tab, enter the model number and the IMEI of your phone and then click on “Submit and Upload” button.
    • It will usually take up 24 hours for your certificate and key file to be generated and uploaded. To check the status of your certificate click on “My Certificate” tab. If the certificate is ready for the download, you will see something as follows:
    OPDA Certificate Status
    • Download the certificate and the key file on to your computer. Also download the SisSigner tool to sign your HelloOX2 application.
    • Open the SisSigner, load the HelloOX2.sis, certificate and the key file as shown below and click on “Sign”. Leave the “Key File Password” field blank.
    Hack S60 Phones
    • Your HelloOX2 application is now signed and ready for the installation.
  3. Install the signed HelloOX2 application on your phone and run it to start the hacking process, which is completely automatic. Within a minute your phone will be hacked. Once this is done, say goodbye to the annoying certificate error and install any application.
I hope you like this post. Express your opinion through comments. Enjoy!!!
This post was originally posted at GoHacking.com

How to Spy on BBM messages?

Just when we thought that BlackBerry was dead and gone, or perhaps on its last breath, the BlackBerry Corporation (formerly known as Research In Motion) released a new series of handsets at the beginning of the year with the latest version of their OS the BlackBerry 10 OS. As soon as the set was released the initial worldwide reception was enough to get just about any BlackBerry critic to admit the comeback.
So BlackBerry sets are being seen sported around again which consequently means that the company’s legendary BlackBerry Messenger service is kicking and roaring back into action. The service is an in platform messaging software which allows individuals who use the BlackBerry platform to communicate with each other through messages without incurring any extra data plan or package fee. If someone close to you owns a BlackBerry then you will be only too familiar with this service and might also get the itch to read the messages that are being exchanged. Whether you are a concerned parent or suspicious spouse, to know what’s happening in their life, you must know how to access their BBM messages. Here is how to go about it.
1. Look For BBM Spy Software: In order to get into their BBM messages, you will need the help of specially designed software that can retrieve the desired data. However, there is a dearth of good programs that will specifically target the messaging service. Many apps will allow you to access phone conversations or call logs but not the actual messages exchanged in BBM chat. So when looking for software to use, make sure it specifies itself as a Blackberry Spy app.
2. Evaluate the Options: Once you find software that can access BBM messages, pick one that suits your needs the best. If you are unable to figure out any at all, then there are two good apps for starters that you can try. Spyera is a good option that solves many problems when it comes to spying. With this one you can access BBM conversations, emails, texts and even ongoing phone calls. You can also try MobiStealth spy software. Like Spyera you can use it to access BBM messages, videos and photos but not live calls. Both of them allow for the user to monitor the target BlackBerry remotely. With MobiStealth you can receive the data from an online dashboard or private email account.
3. Download and Install: Once you have decided on BBM spy software, you need to purchase it. In order for it to work it needs to be accessed from the target’s phone. That means you must physically retrieve the BlackBerry you wish to monitor and access the Internet. Stealth would be required on your side of course. After that you proceed to downloading it from the source site. Once download is complete, begin the installation process. Once the notification of installation completion appears, you can be sure that the spy software is successfully in place. Simply wait for conversations to take place and then monitor them!

This post was originally posted at GoHacking.com

How to make Solar Water Geyser at Home?

You Will Need :

  •  2L plastic bottles (60),
  • Cartons (50)
  • 100mm PVC pipe (70 cm)
  • 20mm PVC pipe (11.7m)
  • 90-degree 20 mm PVC elbows (4)
  • 20mm PVC T-connectors (20)
  • 20 mm PVC end caps (2)
  • PVC glue
  • Black matt paint
  • Paint Roller
  • Sand paper
  • Self-amalgamating tape
  • Tools – Rubber hammer, saw, wood or other material for the support

Process :


Use the 100mm PVC pipe as a mold and cut off the bottom of the bottles. Cut the 20mm PVC pipes into 10 x 1m and 20 x 8.5 cm pieces, and assemble with the T-connectors. Cut and paint the cartons, as well as the one-meter long pipes. Assemble according to figure B.


The panels must be placed at least 30 cm below the tank and be sited on a south facing wall or roof. To optimize heat absorption, the panels must be mounted at the angle of your latitude, plus 10°. In London, for instance, the panel’s inclination should be 61°. We recommends that the plastic bottles in the panels should be swapped for new ones every 5 years: ‘Over time, the plastic becomes opaque, which reduces the heat caption, while the black cartons can be repainted.’ So once the bottles become opaque it is time to replace the bottles and send the used ones to the recycle dump.

How to make Hot Ice?

All you need are two common kitchen ingredients to make hot ice - a non-toxic chemical that crystallizes when you touch it into a material that looks like ice except it gives off heat. See how to make hot ice and get ideas for fun hot ice activities.


You Will Need :

  • White Vinegar
  • Backing Soda

Process :

          Mix one liter of vinegar with 4 tablespoons of baking soda. These chemicals react to form nontoxic sodium acetate or hot ice in water. You need to boil off most of the water, so heat the solution until it is boiling and keep applying low heat until you see a crystal skin start to form on the surface of the liquid. Remove the hot ice solution from heat, pour it into a new container and refrigerate the solution until it is chilled.

          When the hot ice has cooled, you can get it to instantly crystallize simply by touching it. You can try crystallizing the hot ice as you pour it, too. Either way, the solution will give off heat as it crystallizes.

          You can re-dissolve and reheat the hot ice to play with it again or you can throw it away when you are finished. 

          I hope you've enjoyed making hot ice.

How to make Fake Fingerprints?

Courtesy: Gujranwala Science Club


NOTE : The post is only for educational purpose. I'm not responsible for ANY misuse of this post.

In order to fake a fingerprint, one needs an original first. Latent fingerprints are nothing but fat and sweat on touched items. Thus to retrieve someone else's fingerprint (in this case the fingerprint you want to forge) one should rely on well tested forensic research methods. Which is what's to be explained here.


Process :

Find some good counterfeits. A good source of originals for our counterfeits are glasses, doorknobs and glossy paper. The standard method of forensic research makes them visible: Sprinkling it with colored powder, which sticks to the fat.


Try something related to superglue. Another solution involves Cyanoacrylate, the main ingredient of superglue. A small amount thereof is poured into a bottlecap, which is then turned upside down and put over the fingerprint. The Cyanoacrylate gasses out and reacts with the fat residue to a solid, white substance.


Get a digital reproduction. The further treatment involves scanning/photographing (Figure 5) and a bit of graphical refurbishment. The goal is to get an exact image of the fingerprint, for further use as mold, out of which the dummy is made. The easiest way is to print the image on a transparency slide (the ones normally used for an overhead projector) with a laser printer. The toner forms a relief, which is later used similar to letter press printing. Wood glue is suitable for producing the dummy.


Use a small dash of glycerin to optimize humidity and workability. After thorough mixing, the dummy gets coated with a thin layer of the compound.


After the glue has dried (Figure 10), pull off the foil (Figure 11) and cut it to finger size.


Glue the counterfeit to your own finger. Theatrical glue is used to glue the dummy onto the own finger. The new identity is ready!

Featured

 

© 2013 GEEK's Radar. All Rights Resevered by the Original Owners of thr Data and/or Information and/or Stats used on this Blog. Designed by Templateism

Back To Top