Pages

Showing posts with label Mobile. Show all posts
Showing posts with label Mobile. Show all posts

Friday, January 17, 2014

Vodafone 3G settings for Android mobile phone


Step 1 : How to activate 3G in Vodafone

Vodafone 3G services can activated by using the following codes.

SMS (prepaid) ACT 3G to 144
SMS (postpaid) ACT 3G to 111

To activate 3G in vodafone sms ACT 3G to 144 in case of prepaid.

To activate 3G in vodafone sms ACT 3G to 111 in case of postpaid.

In some states first time 3G can be activated by only recharging a any 3G pack

Step 2 : Vodafone APN for 2G/3G/GPRS

You can get internet settings for Vodafone 2G/3G , delivered on your mobile by sending an SMS VMC to 52586

You can also manually type the Vodafone internet settings on your mobile by using the following information.

Operator - Vodafone
APN - www
Access Number - *99***1# or *99#
Username - [blank]
Password - [blank]
Authentication Type - normal
Proxy - off/Disable
Proxy address - [blank]
Port - [blank]
Data Bearer - PACKET DATA
DNS1 [blank]
DNS2 [blank]
As you now have the settings for Vodafone APN, you can also check out the 3G settings for Android.

Step 3 : Manual Vodafone 3G Settings for Android Smartphones

go to SETTINGS
go to WIRELESS & NETWORKS
go to MOBILE NETWORKS
APN: www
Restart mobile if necessary

By using the above settings, Vodafone 3G can be activated on your Android.

Tuesday, October 15, 2013

Selling your smartphone? Here are some must-dos

While most phones, in general, are pretty good at securely removing your data when you're done with the device. There are still some measures you need to take to protect yourself before you pass the handset off, though.

What everyone should do
No matter what type of smartphone you use, there are a few basic things you should check outside of wiping your phone:

Wednesday, July 24, 2013

SIM card hack could affect millions worldwide

A United Nations group that advises nations on cyber-security plans to send out an alert about significant vulnerabilities in mobile phone technology that could potentially enable hackers to remotely attack at least half a billion phones.

The bug, discovered by German firm, allows hackers to remotely gain control of and also clone certain mobile SIM cards.

Hackers could use compromised SIMs to commit financial crimes or engage in electronic espionage, according to Berlin's Security Research Labs, which will describe the vulnerabilities at the Black Hat hacking conference that opens in Las Vegas on July 31.

The U.N.'s Geneva-based International Telecommunications Union, which has reviewed the research, described it as "hugely significant."

"These findings show us where we could be heading in terms of cyber-security risks," ITU Secretary General Hamadoun Touré told Reuters.

He said the agency would notify telecommunications regulators and other government agencies in nearly 200 countries about the potential threat and also reach out to hundreds of mobile companies, academics and other industry experts.

A spokeswoman for the GSMA, which represents nearly 800 mobile operators worldwide, said it also reviewed the research.

"We have been able to consider the implications and provide guidance to those network operators and SIM vendors that may be impacted," said GSMA spokeswoman Claire Cranton.

Nicole Smith, a spokeswoman for Gemalto NV, the world's biggest maker of SIM cards, said her company supported GSMA's response.

"Our policy is to refrain from commenting on details relating to our customers' operations," she said.

Becoming the SIM

Cracking SIM cards has long been the Holy Grail of hackers because the tiny devices are located in phones and allow operators to identify and authenticate subscribers as they use networks.

Karsten Nohl, the chief scientist who led the research team and will reveal the details at Black Hat, said the hacking only works on SIMs that use an old encryption technology known as DES.

Nohl said he conservatively estimates that at least 500 million phones are vulnerable to the attacks he will discuss at Black Hat. He added that the number could grow if other researchers start looking into the issue and find other ways to exploit the same class of vulnerabilities.

The ITU estimates some 6 billion mobile phones are in use worldwide. It plans to work with the industry to identify how to protect vulnerable devices from attack, Touré said.

Once a hacker copies a SIM, it can be used to make calls and send text messages impersonating the owner of the phone, said Nohl, who has a doctorate in computer engineering from the University of Virginia.

"We become the SIM card. We can do anything the normal phone users can do," Nohl said in a phone interview.

"If you have a MasterCard number or PayPal data on the phone, we get that too," if it is stored on the SIM, he said.

The newly identified attack method only grants access to data stored on the SIM, which means payment applications that store their secrets outside of the SIM card are not vulnerable to this particular hacking approach.

Yet Nohl warned that when data is stored outside of a SIM card it could fall victim to a large range of other already known vulnerabilities, which is what has prompted the industry to put payment information on SIMs in the first place.

iPhone, Android, BlackBerry

The mobile industry has spent several decades defining common identification and security standards for SIMs to protect data for mobile payment systems and credit card numbers. SIMs are also capable of running apps.

Nohl said Security Research Labs found mobile operators in many countries whose phones were vulnerable, but declined to identify them. He said mobile phone users in Africa could be among the most vulnerable because banking is widely done via mobile payment systems with credentials stored on SIMs.

All types of phones are vulnerable, including iPhones from Apple Inc, phones that run Google Inc's Android software and BlackBerry Ltd smartphones, he said.

BlackBerry's director of security response and threat analysis, Adrian Stone, said in a statement that his company proposed new SIM card standards last year to protect against the types of attacks described by Nohl, which the GSMA has adopted and advised members to implement. (Source: NDTV)

Sunday, July 21, 2013

Dropped your handset in the bath ??

Dropped your handset in the bath?? Is it
drenched in unexpected downpour??

Don't panic -- just follow these steps
1. Firstly, retrieve your handset from the drink
straight away. It will decrease the risk of
damage.

2. Resist the urge to check if it still works or
press any buttons, since putting pressure on the
keys could shift liquid further into the device.

3. In all cases, the best thing to do is
immediately pull out the battery, thus
minimizing power to the device that may cause
it to short circuit. THIS IS VERY IMPORTANT..!!

4. Remove any peripherals and attachments on
your phone, such as cases.
5. Extract the SIM card and any SD cards it
carries, leaving ports or covers on your handset
open to aid ventilation.

6. Dry off everything with a towel, including the
exterior of your handset, being careful not to let
any water drain into openings on the phone.

7. Even when everything's dry, it's very likely
there's latent moisture within the device that
you'll want to get out before turning it on. The
most oft-reported fix for a sodden phone is to
bury the handset in a bowl of dry rice. You can
also use silica gel packs -- the kind used in
shoeboxes -- to greater effect.
Place your phone in an airtight container and
completely cover it with your choice of
desiccant. Leave the container for 24-48 hours
for the material to draw all the moisture out of
your handset.

8. When you're confident it's dried out, replace
the battery and try switching it on.

My Blog List

Popular Posts