How to save a wet cell-phone?

on Apr 23, 2008

How to save a wet cell-phone?

After having a few terrible monsoons in India, (and floods and tsunamis and all sorts of crazy things…) the question “How to save your wet cell phone?” is close to everyone’s heart!

Wet cell-phone!

Here i have given you a detailed guide that will tell you exactly what you can do to save your wet cell phone, and save 700 bucks in repairing cost, IF you act fast enough! So, lets begin….

Okay, so basically, there are two ways in which water, or some liquid can destroy your phone!

First Way: If the phone is powered with the battery when it is wet, the water can “short-circuit” the phone! So, to solve this problem, you got to remove the battery, cut the power, and get rid of all the water. How to do this? Well, the best way to do this is explained on the next page.

Second Way: If, the liquid is not just pure water. If it is sea water or saline water or any water that contains salts and minerals. If the liquid is a cup of coffee or tea. Basically, if the liquid contains any salts, sugars or minerals that will stay behind after the liquid has dried. In this case, the salts/sugars/minerals etc. that stay behind will “corrode” and “short-circuit” the circuits even after the liquid has been removed. How to solve this problem is explained later!

Now, depending on what kind of liquid or water your phone has got wet in, you need to decide which method is for you. Let us start with the basic method (for water that does not contain salt or sugar or minerals) first....


The basic method (For clean water)
Step 1: Get it out of the water as soon as possible (Obviously! Duh!)

The fact is that cell phones are designed to handle small amounts of water. So, if the cell phone is just slightly wet, nothing much will happen to it. The problem comes when the cell phone falls into a pool of water completely and the water gets into the cell phones circuit board. Then the cell phone gets “short-circuited” and it goes off! So, the point is, if you can avoid the cell phone from getting too wet, avoid it!


Step 2: Dismantle your phone

Remove the battery AS FAST AS POSSIBLE! Do not even waste time thinking about it! Just do it! It is very likely that your phones circuits have survived. But, if they are still powered by the battery, they will short-circuit when the moisture reaches them! So you have to cut the power. You must remove the battery.

Remove the SIM card and the front panel and back panel and any other part of the phone that can be removed! Basically, as we said earlier, dismantle every piece of the phone that can be dismantled!


Step 3: Dry everything that you can manually..

Use a tissue or a soft cloth to wipe every part of the phone you can wipe and remove all the water of the surface of all the pieces of the phone.


Step 4: Be patient and let the phone dry! (The hard part)

Now it is VERY important that you DO NOT try to put in the battery and switch on the phone! Let all the parts be dismantled and let the phone dry. This is a hard thing to do. You will have a constant temptation to put the battery back in “just to see” if the phone is okay. But, DO NOT do this! Leave the phone in pieces and let all the pieces dry.

Once of the best ways to dry your phone is to put your phone on the “heat vents” on the back of your computer of your TV! Just incase you are confused about what “heat vents” are, here is an image of heat vents behind the TV…

Heat vents of TV to dry your phone!

Turns out, the amount of heat coming from the “heat vents” is just the perfect amount required to fix your phone! So place all the pieces of the phone carefully over the heat vents such that the wet insides of the phone are exposed to the heat.

Please Note: Heat other parts of the phone on the “heat vents”, but do not heat the phone’s battery! If you heat the battery, it is likely that the battery will leak and get spoilt.

How long should you leave it on the heat vents? For at least 2-3 days!

Step 5: Test your phone

After 3 days of patient waiting and letting your phone dry, now you could try to put in the battery and all other parts and test your phone. If it works, hurray! If it does not, switch it off quickly and let it dry for some more time. Give it a day or so…if you have the patients!

However: This way of saving your phone may not work if the phone got wet in a liquid containing salts, sugar or minerals etc. So, incase you dipped your phone in sea water, boring water, a cup of coffee or tea etc. you need to use the “alcohol” method…


The "alcohol" method!

If you think the liquid in which your phone has fallen is saline, or containing salts or sugars or minerals (like sea water, coffee etc.), using only the previous method will not do. You will need to do a little bit extra to save your phone!

How do you get rid of the salts, sugars and minerals?

After you dismantle the pieces of your wet phone and remove the battery, try to put the pieces as fast as possible in a bowl of “alcohol”! I know this seems a little scary. I know you are afraid of taking an already wet and damaged phone and putting it into alcohol, but trust us, it’s a good idea!

Why alcohol?

Well, all the water/liquid in the phone (along with the salts, sugars and minerals) will dissolve in the alcohol. The alcohol is supposed to be “hygroscopic”. It means that the alcohol attracts water.

So now, once the phone is soaked in the alcohol, you should try to drain out as much alcohol as possible just by moving the phone around. Having done this, only little alcohol will remain on the insides of the phone. And this alcohol should dry up quite quickly, since alcohol evaporates at room temperature.

Note: If you feel that there is a lot of sugar clogged in the phone (from tea/coffee or some other drink..) you should get your self a bottle of "distilled" water. Let your phone soak in it. The sugars will likely dissolve in the "distilled" water and drip out of the phone.

Where do you get a bottle of distilled water from?

Ask an electrician. Distilled water is generally used for your home inverter batteries, so a local electrician will probably know where to get it in your area.

Fianlly: You could once again dry your phone in the “heat vents” of the computer or TV and wait for at least 2-3 days before you put in the battery and power up the phone.

In most cases, if you act fast enough, these methods will save your phone. But, if it does not, try taking it to your dealer. Sometimes they have a “quick fix”. As a last resort, go to the phone repair guys!




5 steps to increase your computer speed

on Apr 22, 2008

Maintenance tasks that improve performance


If your computer seems slower than it used to be, it probably is. Over time, computers get slower because files become disorganized and resources are consumed by unnecessary software. Fortunately, Microsoft Windows XP includes tools to clean up your computer and restore its performance. The five steps in this article will walk you through the use of these tools to tune up your computer.

Before you do anything, back up your computer. Some of the steps in this article can cause pre-existing but hidden problems to surface, which may keep your computer from starting. A backup allows you to restore your important files in the unlikely event that something does go wrong.

1. Remove unused programs

First, remove programs you don't use anymore. Programs take up space on your computer, and some run in the background without your knowledge. Removing programs you don't use can help restore your computer's performance.


2. Install and run antispyware software

Most programs can be removed using the Add or Remove Programs function accessible from Control Panel, but spyware programs are more stubborn. Windows Defender (a free download from Microsoft) or another antispyware program can detect and remove these programs. You should always have an antispyware program installed, because spyware might install itself on your computer without your knowledge. After you install the antispyware program, run it to detect and remove any unwanted programs.


3. Free up wasted space

Removing unused programs is a great way to free up disk space, which will speed up your computer. Another way to find wasted disk space is to use the Disk Cleanup tool.

To run the Disk Cleanup tool

1. Click Start, and then click My Computer.

2. Right-click Local Disk, and then click Properties.

3. On the General tab, click the Disk Cleanup button. Disk Cleanup will spend a few minutes examining your disk.

4. The Disk Cleanup dialog box will appear. Select each of the check boxes in the Files to delete list, and then click OK.

5. When prompted, click Yes. Disk Cleanup will spend several minutes removing these files, which will provide you with more space.

If you have more than one hard disk drive, repeat this process for each hard disk drive listed in My Computer.



4. Defragment your hard disk drive

Sometimes, a newspaper article skips from the front page to somewhere in the middle of the paper. You have to stop reading the article and flip through the paper to find the page on which it continues. You could read the article much faster if it were printed on a single page.

Files on your computer can either be fragmented, like newspaper articles, or unfragmented, like a book. Over time, more and more files become fragmented. When a file is fragmented, it takes longer for the computer to read it because it has to skip to different sections of the hard disk drive—just like it takes you a few seconds to find a page in the middle of a newspaper.


Defragmentation improves your computer's performance by reorganizing your files.

While fragmentation looks complicated, it's easy to defragment your computer.

To defragment your computer

1. Click Start, and then click My Computer.

2.Right-click Local Disk, and then click Properties.

3. Click the Tools tab, and then click Defragment Now.

4. The Disk Defragmenter appears. Click your hard disk drive, and then click defragment and analyze the disk first and then on the basis of analyzing report, defragment the disk if it is required.

5. Disk Defragmenter will work for at least several minutes, although it might take several hours. When prompted, click Close.

If you have more than one hard disk drive, repeat this process for each hard disk drive listed, starting at step 4.


5. Disconnect unused network connections

If you have, or ever have had, a network with more than one computer, you probably found it useful to share files between the computers by mapping a network drive. Mapping network drives allows one computer to read and write files to another computer's hard disk drive as if they were directly connected to each other.

The problem with network drives is that Windows XP will attempt to connect to the network drive when it starts up. If the remote computer does not respond immediately, Windows XP will wait, which will slow down your startup time. Additionally, some programs will attempt to connect to the network drive when you browse for files and folders. If you have ever tried to open a file and had to wait several seconds, it is probably because the program was trying to establish a network connection—even if the file you are opening is on your local computer.

To reduce the problem, disconnect any unused drives

1. Click Start, and then click My Computer.

2. On the Tools menu, click Disconnect Network Drive.

3. Select the network drives that you no longer need, and then click OK.


Performing the five steps in this article once a month will help you keep your computer running at peak performance.

Hacking

on Apr 12, 2008

Google search tips for hacking
Google search engine can be used to hack into remote servers or gather confidential or sensitive information which are not visible through common searches.
Google is the world’s most popular and powerful search engine. It has the ability to accept pre-defined commands as inputs which then produces unbelievable results.
Google’s Advanced Search Query Syntax
Discussed below are various Google’s special commands and I shall be explaining each command in brief and will show how it can be used for getting confidential data.
[ intitle: ]
The “intitle:” syntax helps Google restrict the search results to pages containing that word in the title.
intitle: login password
will return links to those pages that has the word "login" in their title, and the word "password" anywhere in the page.
Similarly, if one has to query for more than one word in the page title then in that case “allintitle:” can be used instead of “intitle” to get the list of pages containing all those words in its title.
intitle: login intitle: password
is same as
allintitle: login password
[ inurl: ]
The “inurl:” syntax restricts the search results to those URLs containing the search keyword. For example: “inurl: passwd” (without quotes) will return only links to those pages that have "passwd" in the URL.
Similarly, if one has to query for more than one word in an URL then in that case “allinurl:” can be used instead of “inurl” to get the list of URLs containing all those search keywords in it.
allinurl: etc/passwd
will look for the URLs containing “etc” and “passwd”. The slash (“/”) between the words will be ignored by Google.
[ site: ]
The “site:” syntax restricts Google to query for certain keywords in a particular site or domain.
exploits site:hackingspirits.com
will look for the keyword “exploits” in those pages present in all the links of the domain “hackingspirits.com”. There should not be any space between “site:” and the “domain name”.
[ filetype: ]
This “filetype:” syntax restricts Google search for files on internet with particular extensions (i.e. doc, pdf or ppt etc).
filetype:doc site:gov confidential
will look for files with “.doc” extension in all government domains with “.gov” extension and containing the word “confidential” either in the pages or in the “.doc” file. i.e. the result will contain the links to all confidential word document files on the government sites.
[ link: ]
“link:” syntax will list down webpages that have links to the specified webpage.
link:www.expertsforge.com
will list webpages that have links pointing to the SecurityFocus homepage. Note there can be no space between the "link:" and the web page url.
[ related: ]
The “related:” will list web pages that are "similar" to a specifiedweb page.
related:www.expertsforge.com
will list web pages that are similar to the Securityfocus homepage. Note there can be no space between the "related:" and the web page url.
[ cache: ]
The query “cache:” will show the version of the web page that Googlehas in its cache.
cache:www.hackingspirits.com
will show Google's cache of the Google homepage. Note there can be no space between the "cache:" and the web page url.
If you include other words in the query, Google will highlight those words within the cached document.
cache:www.hackingspirits.com guest
will show the cached content with the word "guest" highlighted.
[ intext: ]
The “intext:” syntax searches for words in a particular website. It ignores links or URLs and page titles.
intext:exploits
will return only links to those web pages that has the search keyword "exploits" in its webpage.
[ phonebook: ]
“phonebook” searches for U.S. street address and phone number information.
phonebook:Lisa+CA
will list down all names of person having “Lisa” in their names and located in “California (CA)”. This can be used as a great tool for hackers incase someone want to do dig personal information for social engineering.
Google Hacks
Well, the Google’s query syntaxes discussed above can really help people to precise their search and get what they are exactly looking for.
Now Google being so intelligent search engine, hackers don’t mind exploiting its ability to dig much confidential and secret information from the net which they are not supposed to know. Now I shall discuss those techniques in details how hackers dig information from the net using Google and how that information can be used to break into remote servers.
Index Of
Using “Index of ” syntax to find sites enabled with Index browsing
A webserver with Index browsing enabled means anyone can browse the webserver directories like ordinary local directories. The use of “index of” syntax to get a list links to webserver which has got directory browsing enabled will be discussd below. This becomes an easy source for information gathering for a hacker. Imagine if the get hold of password files or others sensitive files which are not normally visible to the internet. Below given are few examples using which one can get access to many sensitive information much easily.
Index of /adminIndex of /passwdIndex of /passwordIndex of /mail
"Index of /" +passwd"Index of /" +password.txt"Index of /" +.htaccess
"Index of /secret""Index of /confidential""Index of /root""Index of /cgi-bin""Index of /credit-card""Index of /logs""Index of /config"