Wednesday, 10 July 2013

have a unknown number ..want to find ? the best app to find unknown number


Have you ever tried to find a person in your town or anywhere in the world by a name or phone number without browsing through millions of search engines, directories and phonebooks?

In 2009, two students studying at the Royal Institute of Technology in Sweden, wished it was easier to look up phone numbers for the missed calls they received from family members living abroad. They could not find a fast and easy solution to discover who called. With this problem in mind, Nami Zarringhalam and Alan Mamedi created the fledgling startup Truecaller, which first lived on an online forum. Amazingly, they saw 10,000 downloads of their app within a week! The downloads came at a time before App Stores existed and downloading apps to your phone was a big hassle.

By 2010, the Truecaller app had gained a strong user base. Alan and Nami had flexed their friendship muscle into a couple of other startups which eventually gave them the opportunity to quit their day jobs and focus on Truecaller full time.

Truecaller’s vision was to make it easy for people all over the world to get in contact with each other. They originally thought of connecting all white and yellow pages around the world. As Nami and Alan continued to research the market, they soon discovered that many directories provided poor results. For example, White Pages in America could not find numbers to mobile phones since operators do not share that information. Unlike in the Nordics, where there’s a busy and competitive market place with many phone directories to choose from, large markets such as India had no existing public directories. In India, there are approximately 960 million mobile subscribers of which 97% have pre-paid phones. With poor, if any, public directories to build from, along with the vast amount of pre-paid phones, the depth of the problem became obvious.

How could Nami and Alan build a global phone directory to cover markets where no public directories are available? How could they include numbers to pre-paid phones? It seemed like an impossible task. They realized soon that great things are built in collaboration with others. So, they simply asked their users for help. In order to improve number lookup results and expand the database worldwide at a rapid pace, would people be interested in sharing their phone books with Truecaller? In return, users would benefit from sharing by being given free access to this new and extended database, and be able to look up phone numbers. Fast-forward in time, and it appears that this collaborative take on building an accurate and complete database has been a success. Together with people from all over the world, we reinvent the way people get in touch by creating a collaborative global phone directory that fits in your pocket.

Friday, 17 May 2013

How to Bypass or Remove a BIOS Password

How to Bypass or Remove a BIOS Password

A BIOS password is a protection measure that can be used to stop someone powering up a computer system or making changes in some of the computers most sensitive areas. Many big name computer manufacturers such as Dell and HP lock the customers out of this area because they don’t want the customer changing anything and potentially damaging the machine (which the manufacturer may have to warranty). However, when someone like a computer technician or hardware enthusiast needs to make some hardware changes to the computer, they will need to access the BIOS. Here are some methods to be a bios password cracker, removing a BIOS password.

NOTE: Do not try to guess the password on a passworded Hard Drive. 3 wrong guesses will often result in the information on the hard drive being lost forever.
How to Bypass or Remove a BIOS Password by Removing the CMOS Battery:
The simplest way to remove a BIOS password is to simply remove the CMOS battery. A computer will remember its settings and keep the time even when it is turned off and unplugged because these parts are powered by small battery inside the computer called a CMOS battery. If we pull out this battery, the computer will forget alot of its hardware settings, including its BIOS password. This should not be performed on Laptops if you are not experienced working with laptop hardware.
Finding the CMOS BatteryAnyway, open up the computer case using a screw driver and locate the flat, circular and metallic CMOS battery. It should look something like the picture to the right. Some computers have this part standing upright.
Once you have located it, observe how the latches are holding it. There are many different ways to remove a CMOS battery but the most common way on newer computers can be seen in the picture below.
Removing the CMOS Battery
Make sure to power down the computer, unplug the power cables and unplug any USB devices if they are powered. The computer must not be able to get power from anywhere for this to work. Take out the CMOS battery and wait 10 – 25 minutes before putting it back in. The reason for this wait is because the computer can still store power in its capacitors even though everything is unplugged. The waiting period allows enough time for them to discharge.
Plug everything back in, power up the computer and enter the BIOS again. If everything went well there should be no more password. In some cases, if you get weird error messages during bootup now, you will need to goto “Load BIOS Defaults” in BIOS and save the changes to fix them.
If this method didn’t work, try one of the methods below.
How to Bypass or Remove a BIOS Password using Software:
!BIOS is a freeware utility which is designed to be a whole BIOS and security suite. It has the ability to decrypt the passwords used in some of the most common BIOS makes such as Award, Phoenix, American Megatrends, IMB etc..
It also has the ability to brute force the password (known as “blasters”). However, this method is dangerous and can result in some unexpected and unwanted results.
Note: Because of this applications password cracking abilities, some antivirus software may report it as a virus/trojan. This is a false positive.
To start using !BIOS, reboot your computer and take note of the BIOS type and version you are running. For example, If your motherboard uses Award BIOS you should look for the text “Award Medallion BIOS 6.0″ or something similar.
Download !BIOS from here and save it to your desktop. Then, open a DOS command windows by going to Start > Run and type: cmd
Once you see a black screen in front of you, type: cd desktop
You should now see something like: C:\Documents and Settings\YourUserName\Desktop>
Now type the name of the file you just downloaded, if you haven’t changed the name just type in: bios320.exe
!BIOS - Decrypting a BIOS Password
Use the down arrow and choose “Crackers” and then press the right arrow. Using the up and down arrows, select the BIOS that the motherboard is using and press Enter.
You should now see a menu asking what you want to crack, in most cases its the Supervisor or System Passwords you want to crack, so press the 1 key on your keyboard. It will then show you another menu asking how you want it to be cracked. Option 1 is pretty good so try that first by pressing the 1 key on your keyboard. You should now have your BIOS password.
Reboot the computer, enter the BIOS and try it out.
How to Bypass or Remove a BIOS Password using the manufacturer backdoor password:
On many computers (especially old ones), computer manufacturers build in backdoor passwords for their own technicians to use so they can access the BIOS when the hardware is being serviced. Here are some of the ones that have been reported. You may need to try quite a few passwords before you find one that works
These passwords are CaSe SeNsItIve.
AMI BIOS Backdoor Passwords:
  • A.M.I.
  • AMI
  • AMI?SW
  • AMI_SW
  • BIOS
  • MI
  • Oder
Award BIOS Backdoor Passwords:
    • (eight spaces)
    • 01322222
    • 589589
    • 589721
    • 595595
    • 598598
    • ALLY
    • ALLy
    • aLLY
    • aLLy
    • aPAf
    • award
    • AWARD PW
    • AWARD SW
    • AWARD?SW
    • AWARD_PW
    • AWARD_SW
    • awkward
    • IOSTAR
    • CONCAT
    • CONDO
    • Condo
    • condo
    • d8on
    • djonet
    • HLT
    • J256
    • J262
    • j262
    • j322
    • j332
    • J64
    • KDD
    • Lkwpeter
    • PINT
    • pint
    • SER
    • SKY_FOX
    • syxz
    • SYXZ
    • TTPTHA
    • ZAAADA
Russian Award BIOS Passwords:
  • %øåñòü ïpîáåëîâ%
  • %äåâÿòü ïpîáåëîâ%
Phoenix Backdoor BIOS Passwords:
  • BIOS
  • CMOS
  • phoenix
Other Manufcaturers Backdoor Passwords: (manufacturer name – password)
  • VOBIS and IBM – merlin
  • Dell – Dell
  • Biostar – Biostar
  • Compaq – Compaq
  • Enox – xo11nE
  • Epox – central
  • Freetech – Posterie
  • IWill – iwill
  • Jetway – spooml
  • Packard Bell – bell9
  • QDI – QDI
  • Siemens – SKY_FOX
  • SOYO – SY_MB
  • TMC – BIGO
  • Toshiba – Toshiba

Wednesday, 15 May 2013

Take advantage of Windows 8 apps

Take advantage of Windows 8 apps

Windows 8 comes included with several apps to help you get the most from your computer. Below are just a few of the included apps.


Microsoft touts the People feature in Windows 8 because they understand how many people are using social networks today. In the People feature you'll be able to connect your Windows computer to all the major social networks including Facebook, LinkedIn, and Twitter. Once connected, you can pin the people app and monitor your social network (as shown below), use People in Search to find people, and get an overview of what is happening in all your social networks.
Windows 8 People


The Reader app will give you PDF support right out of the box.


The SkyDrive app will give you access to the Microsoft cloud service SkyDrive, which allows you to store your photos, documents, and other files in the cloud and access or share those files with any computer with Internet access.


Take advantage of the Windows Store and install one or more of the thousands of available apps designed for Windows 8. The Store is found in the Start screen, or use Search to search the Store app for any apps that you are trying to find.

Use a picture password to log into your computer

Use a picture password to log into your computer
Windows 8 includes a new feature called Picture password, which allows you to authenticate with the computer using a series of gestures that include circles, straight lines, and taps. Enable this feature if you want a new way to access your computer or have a hard time with passwords.
  1. Open the Windows Charms.
  2. Click Settings and then More PC settings
  3. In the PC settings window click Users and then select Create a picture password
Bonus tip: A four digit pin password can also be created and used to access your computer.

Windows 8 Task Manager

Windows 8 Task Manager
The Windows 8 Task Manager has been significantly improved over previous versions of Windows. Some of the new changes include showing a total percent usage at the top of your Processes, which makes it easier to determine total memory and CPU usage, improved Performance graphs, a Startup tab to see startup processes and their impact to system performance, and the App history tab (as shown below) that gives you the total resources an app has used over a period of time. Press Ctrl + Shift + Esc to start exploring the new Task Manager.
Windows 8 Task Manager

windows 8:Taking advantage of search

Taking advantage of search
The Search in Windows 8 has been significantly improved when compared to all previous versions of Windows. To search for a file or run a program in Windows 8 from the Start screen just start typing what you're trying to find or want to run.
As you begin typing, the results will start appearing on the left-hand side. In addition to being able to search for files and run programs, the Search also supports limiting the search to apps such as Finance, People, Maps, Photos, Mail, Music, Videos, Weather, and much more. If what you are searching for is not a file or program, click on the app you wish to use as the search. For example, if you were searching for "New York" and selected the Weather App you would be shown the weather in New York, NY.
By default, Search organizes the available Apps by how frequently they are used and then in alphabetical order. If you want to keep your favorite app at the top of the Search list, right-click the app and choose Pin. Pinning the app will lock it in place regardless of how often it is used. If there is an app you don't want (e.g. Finance) you can turn on and off any of the search apps through the PC settings, which is found under the Settings in the Charms.
Bonus tip: The Search is also found through Charms and can also be opened by pressing Windows key + F.

win 8 :Know your hot corners

Know your hot corners
The corners on your screen are hot corners and give you access to different Windows features. Below, is a brief explanation of each of these corners.
Bottom Left-hand corner
The bottom left-hand hot corner of the screen will allow you to access the Start screen, if you're in the Start screen and have the Desktop open, this corner will open the Desktop from the Start screen.
Tip: Right-clicking in the left hand corner will open the power user menu.
Top-left corner of the screen
Moving the mouse to the top-left corner and then down will display all the apps running on the computer. Clicking and dragging any of these apps to the left or right-hand side of the screen will snap that app to that side of the screen. Each of these open app icons can also be right-clicked to close or snap.
Right-hand side of the screen
On the full right-hand side of the screen will be given access to the Windows Charms.

Sunday, 5 May 2013

How To Merg Facebook Profile & Timeline Photo?

How To Merg Facebook Profile & Timeline Photo? 

wanna see my timeline:

This is very cool and simple trick to make your Facebook profile
attractive. There is lot of websites
that providing timeline covers but
this a cool site to create attractive
designs like merging, zooming,
jigsaw, editing the bottom of the

How To Merge Profile Picture and
Timeline cover on Facebook
Go to THIS WEBSITE and click
on Merge profile &
Cover photo.

trickedouttimeline will
ask you to upload a
picture [Upload the
picture that you want
to merge]

after uploading the
picture, select the part
of the picture to ur
cover picture and click
onDONE .

Saturday, 4 May 2013

Six of the craziest moments in tech (2012)

Six of the craziest moments in tech (2012)

1.John McAfee: Where do we even begin? First, a man is found dead in Belize, then he spends a night hidden in a cardboard box, then he’s in Guatamela, a photo from there finds its way to the internet.
He apologizes saying the EXIF data was faked and he tampered with it; turns out he was in Guatamela and he apologizes again for apologizing about tampering with the photo.
2.Apple Maps: The maps fiasco of iOS 6 was one of the most unexpected from Apple. What it did was send the entire iWorld back to the Stone Age.
People had to actually talk to strangers (“shudder”) and ask for directions. A dire situation indeed! No matter, Google’s maps soon came along and returned the iFaithfuls to the 21st century.
3.A fresh start. Or not: The disappearance of the Start Menu in Windows 8 was met with much agitation from the Windows community at large.
People were lost without it and the new Metro, or Modern, or New Style or whatever the UI is called now just seems so incomplete without it. It was a sad day indeed when Microsoft finally decided to kill it. R.I.P. Start button.
4.The one, true religion: Isak Gerson is your God and the Missionary Church of Kopimism your place of worship, Kopimism being your new religion. Begone to Sweden ye perfidious pirates. The only country that recognises file-sharing as a true religion.
A religion that holds Ctrl+C and Ctrl+V as holy symbols demands our attention. The message, “Have internet, will copy.”
5.A second too soon: Time Keepers add an extra second to the world’s atomic clocks and parts of the world grind to a halt.
minor glitch in the Linux kernel caused many servers (not updated in time) to just crash. The crashed servers include those of Reddit and Mozilla. In a world where every second counts, Time is truly our mistress.
6.Space Age parts: When you are accidentally shipped weird spares with a suitably cryptic id. “Google Planet8541 Pluto switch”, you know that Google’s plans at world domination are grander than you think.
Nobody has yet been able to solve the mystery of the spares and Google has graciously presented T-Shirts to the engineers who received those parts.

Friday, 29 March 2013

What Happens When We Click Refresh??

Everyone uses REFRESH in Windows many times…. have you ever wondered what would this option actually do in the backend…. Lets learn about it today….

False Assumptions

Some people assumes that it refreshes the RAM, while some others believe that doing it will somehow keep their PCs running smooth and easy. I have seen users obsessed with refreshing the desktop, doing it every 30 seconds or so. They have even learnt the keyboard shortcut – F5 (just to mention, these are the people who never use keyboard shortcuts). They would press the key and hold it down for a long time, sending the desktop into a frenzy of refreshes.
People are under the false impression that doing so will increase the speed and performance of the system. This belief is passed to them from their computer gurus and they religiously follow what they have been told and it become part of their daily life just like chanting a mantra .

The Truth

Technically , if you press refresh , the system is taking few micro seconds out of its life to serve your idiotic request and if you right click and refresh continuously , the system will slow down a bit because of the extra hard disk read write cycles it has to perform.
Refreshing the desktop simply redraws the icons on the desktop. That’s it! It doesn’t refreshes the RAM. It doesn’t clean your PC. It doesn’t refreshes your computer the way it refreshes you when you wake up from a nap. Refreshing the desktop has absolutely no effect on the performance of the computer.
So be aware of what refresh option does for you and use it more productively….. instead of using it continuosly which would kill your CPU Cycles….

Monday, 18 March 2013

How To Change Facebook Login Screen Background

How To Change Facebook Login Screen Background

Most of the people are using Facebook these days. It is the #1 social networking website in the world. I want to ask you a question, Are you tired of using the same old blue login screen on Facebook and want to customize it? 

If your answer is yes then you are at the right place. Today i am going to tell you about a simple   Google chrome extension with which you can customize the login screen.

FB Refresh is a nice chrome extension which enables you to change the background images on Facebook login screen.

Click here to Install FB Refresh

How To Change Facebook Login Screen Background

After installing this extension go to settings-> extensions-> FB Refresh and click on options. You have to enter the url of the background image which you want to use as background image or you can upload an image from your computer. You can edit whether the image should be displayed in horizontal or vertical and many other options. 

If you find this post useful please share it with your friends using social media buttons below. 



There are a lot of people all over the world whose mobile phone was stolen or lost. Because mobile phone is a device which has its own serial number called IMEI we can do something to increase possibility to find it or to prevent usage of it.


First of all the case should be reported to your mobile operator and to local police station. After this you can submit your phones IMEI number to global stolen phones database. A lot of people checks thedatabase and can recognize your mobile before buying it from second hand (if it is submited in database). If you are not sure what phone model and manufacturer you have check here.


Is it possible to trace your phone? Well, actualy it is possible, but it depends where your mobile is, how much will your operator care about your phone, what kind of software is instaled on your lost or stolen phone, what did new owner do to prevent finding it and few more things…


The best way is to do something by yourself. There is a lot of software on the internet which allows you to get information about the current user of your phone, location (if your phone supports GPS), to delete your phonebook remotely, to lock your phone etc…
Check the program list for  anti-theft, tracking, locating software for mobile phones which works on different platforms, some of them are FREE and some are commercial


Your phones IMEI number can be changed but not so easy as it was with old mobile phones. Now chips and electronic is not done the same way because it is not rewritable as you want. It is one time writable and not rewritable. Changing chips on mobile phones motherboard is harder and not everybody have a knowledge to change it… if they know how then they will do it but it could be very expensive because it is harder. The question is if the price is still acceptable.