Archive for March, 2011

Gprs settings for idea, hutch, airtel, bsnl, airtel live, airtel mobile configure manually

Manual Hutch Gprs Settings
  1. Account Name – Hutch_GPRS
  2. User Name – Blank
  3. Password – Blank
  4. Proxy – Enabled/yes
  5. Access Point Name – portalnmms
  6. Full Internet Access Point Name – www
  7. Proxy and Server address – 10.10.1.100
  8. Proxy and Server Port – 8080
  9. Homepage – http://hutchworld.co.in
  10. Authentication Type – Normal
Manual Airtel Gprs Settings
  1. Homepage – any page you want to set.
  2. User Name – Blank
  3. Password – Blank
  4. Proxy – Enabled/yes.
  5. Proxy and Server Adress – 202.56.231.117
  6. Proxy and Server Port – 8080
  7. Data bearer – GPRS or Packet Data.
  8. Access Point Name – airtelgprs.com
  9. Authentication Type – Normal
  10. Use preferred access point – No
Manual Airtel live settings
  1. Account Name – Airtel_live
  2. Homepage – http://live.airtelworld.com
  3. Username – Blank
  4. Password – Blank
  5. Proxy – Enabled/yes
  6. Proxy and Server Adress – 100.1.200.99
  7. Accespoint Name – airtelfun.com
  8. Proxy and Server Port – 8080
  9. Data bearer – GPRS/ Packet Data
  10. Authentication Type – Normal
Manual Idea Gprs Settings
  1. Account Name – idea_GPRS
  2. Username – Blank
  3. Password – Blank
  4. Homepage – http://wap.ideafresh.com
  5. Proxy and Server Port – 8080
  6. Proxy and Server adress – 10.4.42.45
  7. Databearer – GPRS / Packetdata
  8. Acces Point Name – imis
  9. Proxy – Enabled/yes
  10. Authentication Type – Normal
Manual Bsnl Gprs Settings
  1. Account Name – BPL WAP
  2. Username – <Blank>
  3. Password – <Blank>
  4. Proxy – Enabled/yes
  5. Homepage – http://wap.mizone.bplmobile.com
  6. Proxy and Server address – 10.0.0.10
  7. Proxy and Server Port – 8080
  8. Acces Point Name – mizone
  9. Data bearer – GPRS/ Packetdata
  10. Authentication Type – Normal

How to Break into a Mac (And Prevent It from Happening to You)

How to Break into a Mac (And Prevent It from Happening to You)We recently went through a few ways to break into a Windows PC without the password, and it turns out it’s just as easy to break into a Mac too. Here’s how to do it and keep yourself protected.
Just like on Windows, there are quite a few ways to break into a Mac, but many of them are variations on the same thing, so we’re going to highlight the two easiest ways—one with a Mac OS X installer CD and one without—and show you how to keep yourself protected. Note that while these two methods will get you into the OS without knowing the password, you can always just use our previously mentioned “lazy method” with a Mac too—just boot up the computer with a Linux Live CD and start grabbing files.

How to Reset the Mac OS X Password

Both of the methods outlined below are ways to reset the Mac OS X password. While there are cracking utilities like John the Ripper or THC-Hydra, they’re either complicated to use or expensive to buy, so we won’t go into them here like we did with Windows (which has the very easy-to-use Ophcrack). Both of these methods assume the target computer is running Snow Leopard.

Method One: Use the Mac OS X Installer CD

How to Break into a Mac (And Prevent It from Happening to You)If you have the Mac OS X installer CD handy, it’s super easy to change the administrator account’s password. Just insert the CD into the target Mac and hold the “c” key as you boot up the computer. It will boot into the Mac OS X installer. Once it does, head up to Utilities in the menu bar and choose Password Reset. You’ll get a window prompting you to select the drive on which OS X is installed; so choose the drive you want to get into and select the user whose password you want from the drop-down menu.
How to Break into a Mac (And Prevent It from Happening to You)
Enter a new password for that user and hit the save button. That’s it! When you reboot the computer, you can use your new password to log into the computer. Note that unfortunately, you still won’t be able to unlock the Keychain, so if what you’re trying to access has another layer of password protection, you won’t be able to access it.

Method Two: Boot into Single-User Mode

How to Break into a Mac (And Prevent It from Happening to You)
If you don’t have an installer CD handy, you just need to do a bit of fancy command-line footwork to achieve the same end as the CD method. Boot up the computer, holding Command+S as you hear the startup chime. The Mac will boot into single user mode, giving you a command prompt after loading everything up. Type the following commands, hitting Enter after each one and waiting for the prompt to come up again before running the next one:

/sbin/fsck -fy
/sbin/mount -uw /
launchctl load /System/Library/LaunchDaemons/com.apple.DirectoryServices.plist
dscl . -passwd /Users/whitsongordon lifehacker

Replace whitsongordon with the user whose account you want to access and lifehacker with the new password you want to assign to that user.
If you don’t know the user’s username, it should be pretty easy to run ls /Users at any time during single user mode to list all the home folders on the Mac, which usually correspond to the usernames available on the Mac. Note that, once again, this doesn’t give you access to the OS X Keychain, so anything protected with another layer of passwords will be off-limits.

How to Protect Your Mac from Being Broken Into

Luckily, while it’s pretty easy to break into a Mac, it’s also just as easy to protect yourself. Just like last time, our main recommendation is encrypting your entire OS. Note that this does not mean use OS X’s built-in FileVault tool. We weren’t impressed with FileVault the last time we looked at it, and it turns out it’s pretty easy to get past FileVault’s protection.
How to Break into a Mac (And Prevent It from Happening to You)Instead, we recommend you use our favorite free, open-source encryption tool TrueCrypt. It came out with a Mac version back in 2008, and it still works wonderfully at encrypting entire partitions and drives on your computer. And, since anyone wanting to boot the computer needs to know your TrueCrypt password, they’ll never even get to the password reset stage—so all your files will be safe.
Update: As many of you have pointed out in the comments, I misunderstood a few things about both FileVault and TrueCrypt. FileVault is not easily bypassable, and while it won’t encrypt your entire drive, it should keep you safe from the above methods. TrueCrypt cannot currently encrypt an entire boot drive on a Mac.
However, you also pointed out that there’s another simple way to keep people from resetting your password, and that’s using a firmware password. If you have a Mac OS X installer CD, you can boot up from it and go to Utilities > Firmware Password Utility and set a firmware password. This prevents other folks from being able to boot up your computer from another hard disk, CD, or in single user mode. Someone with bad intentions could still bypass it, but it would require quite a bit of alone time with your hardware. So, for best results, you’ll probably want to encrypt your files with FileVault and set up a firmware password.


As always, these are just a few of the easiest ways to break into a Mac. Do you know of any others? Share them with us in the comments (don’t forget to share their weaknesses, too, so we know how to protect ourselves from them).

How to Break into a Windows PC (And Prevent It from Happening to You

Whether you’ve forgotten your password or you have a more malicious intent, it’s actually extremely easy to break into a Windows computer without knowing the password. Here’s how to do it, and how to prevent others from doing the same to you.
There are a few methods to breaking into a computer, each with their own strengths and weaknesses. We’ll go through three of the best and most common methods, and nail down their shortcomings so you know which one to use—and how to exploit their weaknesses to keep your own computer secure.

The Lazy Method: Use a Linux Live CD to Get at the Files

If you don’t need access to the OS itself, just a few files, you don’t need to go through much trouble at all. You can grab any Linux live CD and just drag-and drop files onto a USB hard drive, as you would in any other OS.

How It Works

How to Break into a Windows PC (And Prevent It from Happening to You)
Just download the live .iso file for any Linux distribution (like the ever-popular Ubuntu) and burn it to CD. Stick it in the computer you want to access and boot up from that CD. Pick “Try Ubuntu” when it comes up with the first menu, and it should take you right into a desktop environment. From here, you can access most of the hard drive just by going to the Places menu in the menu bar and choosing the Windows drive. It should see any NTFS drives just fine.
Note that depending on the permissions of some files, you might need root access. If you’re having trouble viewing or copying some files, open up a terminal window (by going to Applications > Accessories > Terminal) and type in gksudo nautilus, leaving the password blank when prompted. You should now have access to everything.

How to Beat It

This method can give you access to the file system, but its main weakness is that the malicious user still can’t access any encrypted files, even when using gksudo. So, if the owner of the computer (or you) has encrypted their files (or encrypted the entire OS), you won’t get very far.

Sneaky Command-Line Fu: Reset the Password with the System Rescue CD

If you need access to the operating system itself, the Linux-based System Rescue CD is a good option for breaking in. You’ll need to do a bit of command line work, but as long as you follow the instructions closely you should be fine. Hat tip to our friends at the How-To Geek.

How t Works


Just download the .iso file for the System Rescue Live CD and burn it to disc. Boot from the disc and hit the default option when the blue screen comes up. After everything loads and you’re presented with a command-line interface, type fdisk -l to see the drives and partitions on your computer. Pick the Windows partition (usually the largest NTFS partition) and note the name, e.g. /dev/sda3.
Then, run the following command:

ntfs-3g /dev/sda3 /mnt/windows –o force

Make sure to replace /dev/sda3 with the partition you noted earlier. Next, cd to your Windows/System32/config directory with this command:

cd /mnt/windows/Windows/System32/config

We want to edit the SAM file in this folder, so type the following command to get a list of users:

chntpw –l SAM

Note the username you want to access, and then type the following command, replacing Whitson Gordon with the username in question.

chntpw –u "Whitson Gordon" SAM

At the next screen, choose the first option by typing the number 1 and hitting Enter. This will clear the user password, making it blank. When it asks you to write hive files, hit y and press Enter. It should say OK, and then you can type reboot to reboot the computer. When you boot into Windows, you’ll be able to log in to that user’s account without a password.

How to Beat It

Once again, the weakness of this method is that it still can’t beat encryption. Changing the password will disallow you access to those encrypted files, which, if the user has encrypted their entire OS, makes this method pretty useless. If they’ve only encrypted a few files, though, you’ll still be able to access all the unencrypted stuff without a problem.

Brute Force: Crack the Password with Ophcrack

Where the other two methods are vulnerable to encryption, this method will give you full access to everything the user can access, including encrypted files, since this method relies on finding out the user’s password instead of bypassing it.

How It Works


We’ve actually gone through this method before, but it doesn’t hurt to have a refresher. All you need to do is download and burn the Ophcrack Live CD (use the Vista version if you’re cracking a Windows 7 PC) and boot from it on your computer. It’ll take a little bit of time to boot, but eventually it will bring you to a desktop environment and start attempting to crack passwords. This may take a while. You’ll see the passwords pop up in the top pane of the window, though, when it finds them (or, if it doesn’t find them, it’ll notify you). You can then reboot and log in to Windows using those passwords.

How to Beat It

While this method works on encrypted OSes, it can’t crack every password out there. To increase your chance of having an uncrackable password, use something complicated and greater than 14 characters. The stronger your password, the less likely Ophcrack will be able to figure it out.


There are a lot of methods to break into a Windows computer (in fact, we’ve featured some of them before), but these are a few of the best and most widely useful. Apart from encryption, very little can stop the first two methods, and on those occasions you have Ophcrack to possibly fall back on. Got your own favorite method for getting into your computer without a password? Share it with us in the comments.

Want to use internet on Chinese mobiles

Here is the Mobile Office, Airtel Live and Airtel MMS settings for ALL CHINA Mobiles

1) Mobile Office

first click SERVICES icon in main menu==>DATA ACCOUNT==>GPRS==>EDIT any existing account==>

Account Name–> MO

APN–>airtelgprs.com

Auth. Type–>Normal

save all the settings.

Come back to SERVICES==>WAP==>SETTINGS==>EDIT PROFILE==>EDIT any existing account==>

Rename Profile==> Mobile Office

Homepage==>Google

data account==> MO (which we created previously)

Connection Type==>

Here u find three option

a) Connection-oriented

b) Connectionless

c) HTTP

choose a) Connection-oriented==>

IP Address==>202.056.231.117

Security==> off

Again save all the settings and click BACK button and choose “Activate Profile”

Come back to SERVICES==>WAP==>Homepage

and you r ready to use Mobile Office…

2) Airtel Live

first click SERVICES icon in main menu==>DATA ACCOUNT==>GPRS==>EDIT any existing account==>

Account Name–> LIVE

APN–>airtelfun.com

Auth. Type–>Normal

save all the settings.

Come back to SERVICES==>WAP==>SETTINGS==>EDIT PROFILE==>EDIT any existing account==>

Rename Profile==> Airtel Live

Homepage==>http://live.airtelworld.com

data account==> LIVE (which we created previously)

Connection Type==>

Here u find three option

a) Connection-oriented

b) Connectionless

c) HTTP

choose c) HTTP==>

Proxy Address==>100.001.200.099

Proxy Port==> 8080

Again save all the settings and click BACK button and choose “Activate Profile”

Come back to SERVICES==>WAP==>Homepage

and you r ready to use Airtel Live…

3) Airtel MMS

first click SERVICES icon in main menu==>DATA ACCOUNT==>GPRS==>EDIT any existing account==>

Account Name–> MMS

APN–>airtelmms.com

Auth. Type–>Normal

save all the settings.

Come back to SERVICES==>WAP==>SETTINGS==>EDIT PROFILE==>EDIT any existing account==>

Rename Profile==> Airtel MMS

Homepage==>http://100.1.201.171:10021/mmsc

data account==> MMS (which we created previously)

Connection Type==>

Here u find three option

a) Connection-oriented

b) Connectionless

c) HTTP

choose c) HTTP==>

Proxy Address==>100.1.201.172

Proxy Port==>8799

Again save all the settings and click BACK button and choose “Activate Profile”

Come back to SERVICES==>WAP==>Homepage

and you r ready to use Airtel MMS…