Total Pageviews

Popular Posts

Thursday, December 22, 2011

Boost Your PC's Speed




Increase Your Virtual Ram
 
1) Hold down the 'Windows' Key and Press the 'Pause/Break' button at the top right of your keyboard.
Another way is Right-Clicking 'My Computer' and then Select 'Properties'.

2) Click on the 'Advanced' tab.

3) Under 'Performance', click 'Settings'.

4) Then click the 'Advanced' tab on the button that pops up.

5) Under 'Virtual Memory' at the bottom, click 'Change'.

6) Click the 'Custom Size' button.

7) For the initial size (depending on your HD space), type in anywhere from 1000-1500 (although I use 4000), and for the Maximum size type in anywhere from 2000-2500 (although I use 6000).

8) Click 'Set', and then exit out of all of the windows.

9) Finally, Restart your computer.

10) You now have a faster computer and 1-2GB of Virtual RAM..!

Hiding Application Files into an Image File

Hiding your .exe into a .jpg

This is a good trick to hide your exe files into a jpg file..!
How about sending a trojan or a keylogger into your victim using this trick..??

 
1) Firstly, create a new folder and make sure that the options 'show hidden files and folders' is checked and ‘hide extensions for known file types’ is unchecked.
Basically what you need is to see hidden files and see the extension of all your files on your pc.

2) Paste a copy of your server on the new created folder. let's say it's called 'server.exe' (that's why you need the extension of files showing, cause you need to see it to change it)

3) Now you’re going to rename this 'server.exe' to whatever you want, let’s say for example 'picture.jpeg'

4) Windows is going to warn you if you really want to change this extension from exe to jpeg, click YES.

5) Now create a shortcut of this 'picture.jpeg' in the same folder.

6) Now that you have a shortcut, rename it to whatever you want, for example, 'me.jpeg'.

7) Go to properties (on file me.jpeg) and now you need to do some changes there.

8) First of all delete all the text on field 'Start In' and leave it empty.

9) Then on field 'Target' you need to write the path to open the other file (the server renamed 'picture.jpeg') so you have to write this :-
'C:\WINDOWS\system32\cmd.exe /c picture.jpeg'

10) The last field, 'c picture.jpeg' is always the name of the first file. If you called the first file 'soccer.avi' you gotta write 'C:\WINDOWS\system32\cmd.exe /c soccer.avi'.

11) So what you’re doing is when someone clicks on 'me.jpeg', a cmd will execute the other file 'picture.jpeg' and the server will run.

12) On that file 'me.jpeg' (shortcut), go to properties and you have an option to change the icon. Click that and a new window will pop up and you have to write this :-
%SystemRoot%\system32\SHELL32.dll . Then press OK.

13) You can set the properties 'Hidden' for the first file 'picture.jpeg' if you think it’s better to get a connection from someone.

14) But don’t forget one thing, these 2 files must always be together in the same folder and to get connected to someone they must click on the shortcut created not on the first file. So rename the files to whatever you want considering the person and the knowledge they have on this matter.

15) For me for example I always want the shortcut showing first so can be the first file to be opened. So I rename the server to 'picture2.jpeg' and the shortcut to 'picture1.jpeg'.
This way the shortcut will show up first. If you set hidden properties to the server 'picture.jpeg' then you don’t have to bother with this detail but I’m warning you, the hidden file will always show up inside of a Zip or a Rar file.

16) So the best way to send these files together to someone is compress them into Zip or Rar.

17) inside the Rar or Zip file you can see the files properties and even after all this work you can see that the shortcut is recognized like a shortcut but hopefully the person you sent this too doesn’t know that and is going to open it.

Chat with Friends through ms dos Command Prompt :-

Chat with Friends through Command Prompt :-


1) All you need is your friend's IP Address and your Command Prompt.

2) Open Notepad and write this code as it is.....!

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A


3) Now save this as "Messenger.Bat".

4) Open Command Prompt.

5) Drag this file (.bat file) over to Command Prompt and press Enter.

6) You would then see something like this:

7) Now, type the IP Address of the computer you want to contact and press enter
You will see something like this:

8) Now all you need to do is type your message and press Enter.
Start Chatting.......!

 
 Enjoy!!!

Creating ur personal Internet Messenger BOT

Create your Own Personal IM BOT

This quick tutorial will show you how to develop your own functional IM bot that works with Google Talk, Yahoo! Messenger, Windows Live and all other popular instant messaging clients.
To get started, all you need to know are some very basic programming skills (any language would do) and web space to host your “bot”.
For this example, I have created a dummy bot called “insecure” that listens to your IM messages. To see this live, add insecure@bot.im to your GTalk buddy list and start chatting.

IM Bot

If you like to write a personal IM bot, just follow these simple steps:-
Step 1: Go to www.imified.com and register a new account with a bot.
Step 2: Now it’s time to create a bot which is actually a simple script that resides on your public web server.
It could be in PHP, Perl, Python or any other language.
Example Hello World bot:
The example below illustrates just how easy it is to create a bot.
This example is coded in PHP.
<?php
switch ($_REQUEST['step']) {
case 1:
echo "Hi, what's your name?";
break;
case 2:
echo "Hi " . $_REQUEST['value1'] . ", where do you live?";
break;
case 3:
echo "Well, welcome to this hello world bot, " . $_REQUEST['value1'] . "<br>from " . $_REQUEST['value2'] . ".<reset>";
break;
}
?>
Step 3: Once your script is ready, put it somewhere on your web server and copy the full URL to the clipboard.
Step 4: Now login to your imified account, paste the script URL

Screen Name: insecure@bot.im
Bot Script URL: http://www.insecure.in/imbot.php

Step 5: Add that im bot your friends list. That’s it.
This is a very basic bot but the possibilities are endless.
For instance, you could write a bot that will send an email to all your close friends via a simple IM message. Or you could write one that will does currency conversion.

Remote Shutdown from your cell Phone


Viewing Facebook Photos of Users

View Facebook Photos of Users not our Friend

A new facebook exploit allows anyone to access any photo album of non-friends as long as you have the link.
Facebook Photo Exploit
By following the simple steps shown in above image, you can bypass the security of Facebook and view photos of others online.

Increase Broadband Speed Using Simple Tweak

Increasing Broadband Speed

A Simple Tweak (XP Pro only) which will increase your Broadband Speed.

Make sure you Log on as Administrator, not as a user with Administrator privileges.

Follow the steps as given below-

1) Click on Start Button.

2) Select Run From Start Menu.

3) Type gpedit.msc

4) Expand the [Administrative Templates] branch.

5) Then Expand the [Network] branch.

6) Highlight(Select by Single Click) [QoS Packet Scheduler]

7) Double-click [Limit Reservable Bandwidth] (Available in Right Side Panel)

8) Check(Select By Single Click on it) [Enabled]

9) Change [Bandwidth limit %] to 0 %

10) Click [OK] Button.

11) Restart Your PC.

12) Now Check Your Broadband Speed.

Enjoy!!!

Tuesday, November 15, 2011

My First Self created Software

Dear Readers, Subscribers and Friends 
                I Cyber Spirit am glad to announce that I have created my first software, Cyber Spirit's Cyborg Bank HOME ATM. Home ATM means the Branch ATM(the place where you can DEPOSIT money into your bank account via ATM). So no need of getting into long Queues on one counter to deposit money into your account. You can use the Cyber Spirit's Cyborg Bank HOME ATM for the same without getting into queues and wasting your precious time. I have created the software and will make it free for you guys out there, and will keep on updating the software with new Features and Securities(After all its my First Software). I have created the software in Visual Basic 6 as Front End and Oracle 10G as Back End.


You can download the software for free from any of the link provided below.
Cyber Spirit's Cyborg Bank ATM OS Project without Report.




And for Educational Purpose you can download the Entire Project  from below.
Cyber Spirit's Cyborg Bank ATM OS Project with Report.




And Do read Read Me before Opening Project for operating PIN.
Hope you like the post..... Enjoy!!!! :)


Regards,
Cyber Spirit

Tuesday, November 8, 2011

Windows Xperience Index Hacking

Hacking the Windows Experience Index in Windows 7

If you’ve ever checked your Windows Experience Index, you might wonder whether you can increase these numbers without buying a new PC. Today we’re going to show you how to hack the WEI to show whatever numbers you want.

Why You Might Want To Do This

So you might be wondering why in the world would you want to do this, firstly the Windows Experience Index has an API that programs can use to enable functionality. This means that if your score is too low, some parts of a program may have dumbed down functionality or even be completely disabled. You could use this hack to trick your system into allowing you to use features. Additionally if you are really geeky, like we are, you can use it to cheat in a benchmark test against your friends.

Hacking The XML File

The first method, and the most fun, requires some knowledge of XML files, however if you follow this tutorial you will be fine. So lets get started.
You are going to have to navigate to C:\Windows\Performance\WinSAT\DataStore
Now you are going to need to open a file that ends with Formal.Assessment (Initial).WinSAT) if there is more than one file that ends with that name look at the date and the begining of the file and choose the most current one. Right click on the file and select edit, this will open it in notepad.
Click on the edit menu and then select find. When the find dialog box opens type <WinSPR>, and click find next.
Notepad will then highlight where the code that we need to edit starts. You can edit any values of the WEI, to see what tags edit what values see the blockquote below the image. All the tags that you will be looking for follow the WinSPR tag.
To Change One Of The Values Look For The Following:
<SystemScore> tags change the overall rating
<MemoryScore> tags change the Memory (RAM) rating
<CpuScore> tags chang the Processor rating
<GraphicsScore> tags change the Graphics rating
<GamingScore> tags change the Gaming Graphics rating
<DiskScore> tags change the Primary Hard Disk rating
For example if i wanted to change the value of my system score to 7.9 i would change the value between <ystemScore> and </SystemScore> to 7.9 as seen below.
Save the file on your desktop and dont rename it. Now cut the file from your desktop and paste it in C:\Windows\Performance\WinSAT\DataStore. You will be asked to provide Administrative credentials if you are not a Local Administrator, if you are then you will just need to click continue to provide access.
After you have pasted the file in the DataSore folder, go the the Windows Experience Index to see the changes.

The Alternative Method

The first method was a little advanced and required a little knowledge of XML, however if you are an ordinary end user there is still hope.  As it would turn out, there is a small program that was designed to do all of this for you.
To use it you will have to download it  (see the download link at the end of the article) and run the portable application, which will be called experience_index_editor.exe If you are making the download on a Windows 7 machine the download will be located in the Downloads folder.

You will need to either have Local Admin privileges or know the credentials of a Local Admin account to run the program.
Once the program has run, you will be presented with an easy to use interface, from here you can just change the values of your Windows Experience Index. Each text box changes a different score in the index. You can see what score it changes by looking at the field just before the text boxes. To change one of your scores just type a number between 1 and 7.9 in the box. You can change one or all of your index scores but remember that your overall system rating is taken from the lowest score.
Once you have made your changes click the save button. Close the program and go to the Windows Experience Index to see your changes immediately.

Reseting Your Score To True Values

To reset your Windows Experience Index to the true values, all you have to do is re-run the assessment. To do this go to Computer and click System Properties in the toolbar.
When the System Properties open. Click on the Windows Experience Index link.
The Windows Experience Index will now open, from here you can view your current WEI scores however from here you can also re-run the assessment by clicking on the link that says “Re-run the assessment”

You will need to either have Local Admin privileges or know the credentials of a Local Admin account to re-run the assessment.

Conclusion

Whether you are are just doing this for fun, or to enable functionality that you previously did not have, please remember that this will not actually increase your systems performance.
Download the WEI Editor from here.

Sunday, October 23, 2011

Creating your Personal Run Commands


How to Create Your Own Customized Run Commands

Run command
The Run command on Microsoft Windows operating system allows you to directly open an application or document with just a single command instead of navigating to it’s location and double-clicking the executable icon. However, it only works for some of the inbuilt Windows programs such as Command prompt (cmd), Calculator (calc) etc. So, have you ever wondered how to create your own customized Run commands for accessing your favorite programs, files and folders? Well, read on to find out the answer.

Creating the Customized Run Command

 
Let me take up an example of how to create a customized run command for opening the Internet explorer. Once you create this command, you should be able to open the Internet explorer just by typing “ie” (without quotes) in the Run dialog box. Here is how you can do that.
1. Right click on your Desktop and select New -> Shortcut.
2. You will see a “Create Shortcut” Dialog box as shown below
Create Shortcut
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
3. Click on “Browse”, navigate to: Program Files -> Internet Explorer from your Root drive (usually C:\) and select “iexplore” as shown in the above figure and click on “OK”.
4. Now click on “Next” and type any name for your shortcut. You can choose any name as per your choice; this will be your customized “Run command”. In this case I name my shortcut as “ie”. Click on “Finish”.
5. You will see a shortcut named “ie” on your desktop. All you need to do is just copy this shortcut and paste it in your Windows folder (usually “C:/Windows”). Once you have copied the shortcut onto your Windows folder, you can delete the one on your Desktop.
6. That’s it! From now on, just open the Run dialog box, type ie and hit Enter to open the Internet Explorer.
In this way you can create customized Run commands for any program of your choice. Say “ff” for Firefox, “ym” for Yahoo messenger, “wmp” for Windows media player and so on.
To do this, when you click on “Browse” in the Step-3, just select the target program’s main executable (.exe) file which will usually be located in the C:\Program Files folder. Give a simple and short name for this shortcut as per your choice and copy the shortcut file onto the Windows folder as usual. Now just type this short name in the Run dialog box to open the program.
I hope you like this post! Pass your comments.

Avoiding Phishing.... Securing ur account


How to Identify and Avoid Phishing Scams

Phishing Scam
Phishing is a form of social engineering technique used by hackers to gather sensitive information such as usernames, passwords and credit card details by posing as a trustworty person/organization. Since most online users are unaware of the techniques used in carrying out a phishing attack, they often fall victims and hence, phishing can be very effective.
With the dramatic increase in the number of phishing scams in the recent years, there has also been a steady rise in the number of people being victimized. Lack of awareness among the people is the prime reason behind such attacks. This article will try to create awareness and educate the users about such online scams and frauds.
Phishing scams usually sends an email message to users requesting for their personal information, or redirects them to a website where they are required to enter thier personal information. Here are some of the tips that can be used to identify various phishing techniques and stay away from it.

Identifying a Phishing Scam

1. Beware of emails that demand for an urgent response from your side. Some of the examples are:
  • You may receive an email which appears to have come from your bank or financial organization stating that “your bank account is limited due to an unauthorized activity. Please verify your account asap so as to avoid permanant suspension”. In most cases, you are requested to follow a link (URL) that takes you to spoofed webpage (similar to your bank website) and enter your login details over there.
  • In some cases, phishing emails may ask you to make a phone call. There may be a person or an audio response waiting on the other side of the phone to take away your credit cards details, account number, social security number or other valuable data.
2. Phishing emails are generally not personalized. Since they target a lagre number of online users, they usually use generalized texts like “Dear valued customer”, “Dear Paypal user” etc. to address you. However, some phishing emails can be an exception to this rule.
3. When you click on the links contained in a phishing email, you will most likely be taken to a spoofed webpage with official logos and information that looks exactly same as that of the original webpages of your bank or financial organization. Pay attention to the URL of a website before you enter any of your personal information over there. Even though malicious websites look identical to the legitimate site, it often uses a different domain or variation in the spelling. For example, instead of paypal.com, a phishing website may use different addresses such as:
  • papyal.com
  • paypal.org
  • verify-paypal.com
  • xyz.com/paypal/verify-account/

Tips to Avoid Being a Victim of Phishing

1. Do not respond to suspicious emails that ask you to give your personal information. If you are unsure whether an email request is legitimate, verify the same by calling the respective bank/company. Always use the telephone numbers printed on your bank records or statements and not those mentioned in the suspicious email.
2. Don’t use the links in an email, instant messenger or chat conversation to enter a website. Instead, always type the URL of the website on your browser’s address bar to get into a website.
3. Legitimate websites always use a secure connection (https://) on those pages which are intended to gather sensitive data such as usernames and passwords, account numbers or credic card details. You will see a lock icon Picture of the Lock icon in your browser’s address bar which indicates a secure connection. On some websites like paypal.com which uses an extended validation certificate, the address bar turns GREEN as shown below.
HTTPS Address Bar


In most cases, unlike a legitimate website, a phishing website or a spoofed webpage will not use a secure connection and does not show up the lock icon. So, absence of such security features can be a clear indication of phishing attack. Always double-check the security features of the webpage before entering any of your personal information.
4. Always use a good antivirus software, firewall and email filters to filter the unwanted traffic. Also ensure that your browser is up-to-date with the necessary patches being applied.
5. Report a “phishing attack” or “spoofed emails” to the following groups so as to stop such attacks from spreading all over the Internet:
You can directly send an email to spam@uce.gov orreportphishing@antiphishing.org reporting an attack. You can also notify the Internet Crime Complaint Center of the FBI by filing a complaint on their website: www.ic3.gov.

Thursday, October 13, 2011

Unblocking a disabled USB port... (very important to college guys)

 A very important trick for college guys....

Many colleges, including mine, blocks USB Ports. By this we are not able to use pen drive or other USB enabled portable devices. The ways by which the USB ports are disabled by Administrator are many. In this article I mentioned some ways to unblock Pen Drive USB Port in Colleges. Hope you won’t misuse them. Here are the 3 ways.
1. By Disabling USB Ports from Device Manager.
2. By Tweaking Registry values for USB Mass Storage Devices.
3. By Un-installing the USB Mass Storage Drivers.
Unlock USB ports from device manager:

device manager
1. Go to Run and type “Devmgmt.msc” and press Enter.
2. Go to Universal Serial Bus Controller. See if there are any red colored cross? If yes, right click and enable those USB Ports.
Now try and use the pen drive. If it works fine, then great, else read the next two steps also.

Correct Value for USB Mass Storage device

Correct Registry Value
1. Go to Start > Run , type “regedit” and press enter, this will open registry editor.
2. Navigate to the key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\USBSTOR
Now remove and connect the pen drive again, it should work fine, if it does not, then it means the drivers are missing. Follow the steps below to solve the issue.

Install USB Mass Storage Device drivers

Install USB Mass Storage
In case the USB Mass Storage drivers are not installed, windows will prompt you to install the driver. In such a case, windows will launch Hardware Update Wizard. If you have USB Mass storage drivers, you can install it and restart the computer, it should work. If not, you can download the USB Mass Storage drivers here. Download and uznip the driver files on your desktop.
i) In hardware update wizard, Select the option to install the driver from a specific location and click next.
ii) Now on this screen, click browse and select the path on which you have un-zipped the drivers and press ok.

NOTE: Windows may give you a warning that the drivers has not passed Windows logo testing, so stop installation or Continue anyway, Select Continue anyway to complete installation.
Now restart your computer and re-insert your pen drive, it should now work.

Wednesday, July 27, 2011

Identify Secure sites.... in a minute!!!!

4 Ways to Identify Safe Websites on the Internet

Safe Websites
On the whole Internet, there are approximately more than 150 million active websites up and running. As a result, it often becomes a real challenge for the users to identify safe websites that are trustworthy and reputed. Have you ever wondered to know the reputation of a website before placing the order? Need to know whether a given website is child safe? Well, here are some of the ways to identify safe websites on the Web.
 

1. WOT or Web Of Trust (www.mywot.com):

WOT is a great place to test the reputation of your favorite website. WOT gives real-time ratings for every website based on the feedback that it gets from millions of trustworthy users across the globe and trusted sources, such as phishing and malware blacklists. Each domain name is evaluated based on this data and ratings are applied to them accordingly. A snapshot of WOT ratings for gohacking.com is shown below:
WOT Ratings for Gohacking.com
 
 
As shown in the above snapshot, the reputation of each website is shown in terms of 4 components where green means excellent, yellow warns users to be cautious and red indicates potential danger.
 
Trustworthiness signifies the overall safety of the website. A poor rating may indicate that the site is associated with threats like Internet scams, phishing, identity theft risks and malware.
 
Vendor reliability tells you whether a given site is safe for carrying out buy and sell transactions with it. An excellent rating indicates superior customer satisfaction while a poor rating indicates possible scam or bad shopping experience.
 
Privacy indicates about “to what extent the site respects the privacy of it’s users and protects their personal identity and data”.
 
Child Safety indicates whether the content of a given site is appropriate for children. Site contents like sexual material, nudity and vulgarity will have a poor Child Safety rating.
 
In most cases, the WOT ratings are found to be highly accurate. To check the reputation of any given website, just visit www.mywot.com type-in the address of your favorite website and click on “Check now”. This tool alone can tell you a lot about the reputation and safety level of a website. However, in addition to this, I am giving you another 3 handy tools to identify safe websites on the Web.
 

2. McCafee SiteAdvisor:

McCafee SiteAdvisor is a free tool that is available as a browser add-on. It adds safety ratings to your browser and search engine results. You can download it from www.siteadvisor.com.
 

3. StopBadware:

Using this tool, you can check whether a given site is said to have involved in malware activity in the past. To check this, go to http://www.stopbadware.org/home/reportsearch and enter the URL or domain name of a website and click on “Search Clearinghouse ”. If the search does not return any result, that means the site was never involved in any of the malware activity in the past.
 
4. Google Pagerank:

Google PageRank is another great tool to check the reputation and popularity of a website. The PageRank tool rates every webpage on a scale of 1 to 10 which indicates Google’s view of importance of the page. If a given website has a PageRank of less than 3, then it is said to be less popular among the other sites on the Internet.
 
However, PageRank will only tell you how much popular a given website is and has nothing to do with the safety level of a website. So, this tool alone cannot be used to evaluate a website’s safety and other factors.
 
PageRank feature is available as a part of Google Toolbar. You can install Google Toolbar from http://www.google.com/intl/en_uk/toolbar/ie/index.html.
 
I hope you like this article. Waiting for your comments…

Monday, June 27, 2011

Install Windows 7 from a USB drive in 6 easy steps


How to Install Windows 7 From a USB Drive

Windows-7-USBInstalling Windows from a USB flash drive has several advantages – First of all, the overall speed of the installation process will increase significantly, carrying a USB stick is much more convenient than a DVD, and finally it becomes possible to install the OS even on those systems that do not have a DVD drive, such as a netbook.
In this post, I will show you how to load the Windows installation on to your USB flash drive and make it bootable just like the DVD.
Tools Required:
1. USB flash drive with a minimum capacity of 4 GB.
2. Windows 7 set-up DVD.
 
Step-1: Plug-in your USB flash drive and backup all the existing data in it.
 
Step-2: Open the command prompt. If you are using Windows 7/Vista then open it with administrator rights*.
* Goto Start -> All Programs -> Accessories -> Right-click on “Command Prompt” and select “Run as Administrator”.
 
Step 3: In the command prompt, type in the following command.
DISKPART


This will start the Microsoft DiskPart utility as shown below:
Now issue the following command:
LIST DISK


This will show you a list of  available disks on your system. Disk 0 is usually the hard disk. In my case, Disk 5 is the USB drive (this can be a different one in your case). Now issue the command as shown below

SELECT DISK 5
 
NOTE: In the above command, 5 is the USB drive number on my system. If you have a different number on your system, then you need to replace 5 with that number.
 
Step-4: Now issue the following list of commands one by one as shown below:

CLEAN

CREATE PARTITION PRIMARY

SELECT PARTITION 1

ACTIVE

FORMAT FS=NTFS QUICK

ASSIGN

EXIT


Minimize the command prompt and proceed to the next step.
 
Step 5: Insert the Windows 7/Vista installation disc and note down the “drive letter” of your DVD drive. In my case, it is “H:”. Now type the following list of commands as shown below:

H: CD BOOT
CD BOOT
BOOTSECT.EXE /NT60 M:(NOTE: M: is your USB drive letter)
EXIT


Step-6: Copy the contents of your Windows 7/Vista installation disk into the USB flash drive.
That’s it! Your USB stick is now ready to boot and install the OS for you. Don’t forget to enable the “USB Boot” option and change the “boot priority to USB device from hard disk” in your BIOS settings.
I hope you like this post. Pass your comments to express your opinion. :)

Wednesday, June 1, 2011

Hacking S60's to install unsigned Applications


How to Hack Symbian S60 Phones to Install Unsigned Applications

Hack Symbian S60 PhonesIf you own a Nokia Symbian S60 phone, you will most likely be aware of the fact that it is not possible to install applications on it unless they are signed using a valid certificate. Have you been trying to install applications on your S60 3rd or 5th edition phone but ending up getting a certificate error? At times, this can be really annoying; but here is a smart solution to this problem!
Here in this post, I will show you how to hack your Symbian S60 3rd or 5th edition smartphone, so as to modify the phone’s firmware and completely bypass the mandatory signing requirement. So, once you are done with this one time hack, you should be able to install any compatible application including unsigned and those with an expired certificate.
 
What is the Need for Signing Applications?
From the 3rd edition onwards, all the Symbian S60 applications need to be signed in order to ensure their integrity, so that it would not be possible for a third party to tamper with the application. Also, signing ensures that you always install applications from a trusted source.
However, there are many freeware and beta applications that come unsigned as the developers cannot afford to buy a symbian certificate. Hence, it can be a real nightmare for the users who need to install such applications on their phones. So, here is a step-by-step procedure to hack your phone and permanently disable this security feature.
 
1. Download the latest version of HelloOX2 from the ofiicial website www.helloox2.com.
HelloOx2 is an excellent tool to hack Symbian S60 3rd, 5th and Symbian^3 smartphones which makes it possible to install a root certificate by gaining full access to the phone’s system files. With this capability, you can install anything you want on your phones without the need to worry about the annoying certificate error!
2. The signed version of HelloOX2 demands for a donation and hence, only the unsigned version is available for free download. So, if you have the unsigned version, you need to sign it before installing on your phone. In order to sign any application, you need to have the certificate and the key file which can be obtained as follows:
  • Go to the OPDA Website, get registered and login to your account.
  • Click on the “Apply Certificate” tab, enter the model number and the IMEI of your phone and then click on “Submit and Upload” button.
  • It will usually take up 24 hours for your certificate and key file to be generated and uploaded. To check the status of your certificate click on “My Certificate” tab. If the certificate is ready for the download you will see something as follows:
OPDA Certificate Status



 
  • Download the certificate and the key file on to your computer. Also download the SisSigner tool to sign your HelloOX2 application.
  • Open the SisSigner, load the HelloOX2.sis, certificate and the key file as shown below and click on “Sign”. Leave the “Key File Password” field blank.
SisSigner








  • Your HelloOX2 application is now signed and ready for the installation.
3. Install the signed HelloOX2 application on your phone and run it to start the hacking process, which is completely automatic. Within a minute your phone will be hacked. Once this is done, say goodbye to the annoying certificate error and install any application.
I hope you like this post. Express your opinion through comments. Enjoy!!!