Skip to main content

📞 PHONE SHORT CUTS AND TECHS



       We all are using mobile phones in our daily life and 2 billion people are using SmartPhones (1.91 billion to be exact). But most of us don't know the shortcuts about our phone, that can help us a lot to find sufficient information about our phone that we actually don't know or have to search in setting or somewhere else in our mobile phone.
       So I came with the new trick which will help you a lot.



    
Dial the following code (in bold format) in your phone's DialBox.

##4636## Display information about Phone, Battery and Usage statistics

##7780## Resetting your phone to factory state-Only deletes application data and applications

*2767*3855# It’s a complete wiping of your mobile also it reinstalls the phones firmware

##34971539## Shows completes information about the camera

##7594## Changing the power button behavior-Enables direct poweroff once the code enabled

##273283*255*663282*## For a quick backup to all your media files

##197328640## Enabling test mode for service activity

##232339## OR ##526##
Wireless Lan Tests

##232338## Displays Wi-Fi Mac-address

##1472365## For a quick GPS test

##1575## A Different type GPS test

##0283## Packet Loopback test

##0*## LCD display test

##0673## OR ##0289##
Audio test

##0842## Vibration and Backlight test

##2663## Displays touch-screen version

##2664## Touch-Screen test

##0588## Proximity sensor test

##3264## Ram version

##232331## Bluetooth test

##7262626## Field test

##232337#*# Displays bluetooth device address

##8255## For Google Talk service monitoring

##4986*2650468## PDA, Phone, Hardware, RF Call Date firmware info

##1234## PDA and Phone firmware info

##1111## FTA Software version

##2222## FTA Hardware verion

##44336## Displays Build time and change list number

*#06# Displsys IMEI number

##8351## Enables voice dialing logging mode

##8350## Disables voice dialing logging mode

##778 (+call) Brings up Epst menu

hope you enjoy this article.....

Comments

Popular posts from this blog

CREATE AN ANTIVIRUS USING COMMAND PROMPT

In this article we are going to create an antivirus using simply a notepad. It will delete all simple micro viruses in your system. Type the following code into Notepad: @ echo off echo off turn off the active virus taskkill / F / IM  virus1.exe / IM  virus2.exe echo Deleting all of viruses based on size for / RC: \%% a in (*. exe) do if%% ~ za 157,184 equ del / A: HSRA "%% a" echo deleting hidden virus echo for drive c and subfolders for / R C: \%% a in (*. doc.exe) do del "%% a" echo for drive d an d subfolders for / R D: \%% a in (*. doc.exe) do del "%% a" echo Unhide Documentcd / d c: \ echo for drive C and subfolders *. doc attribHSA / S cd / d d: \ echo for drive D an d subfolders *. doc attribHSA / S exit Here, text in green is alert message and text in red are the program that your system will search for those and delete these files. Now, Save the file with .bat extension , For example antivirus.bat. then go...

A Hacker Should Know These Informations(Full Forms)

These Are Some Important Information That A Hacker Need to Know 👇         Guys, Here are some full forms that you should know if you are from Technical Field. This information is mostly been asked in interviews, so don't just read it, store it in your mind.  GOOGLE - Global Organization Of Oriented Group Language Of Earth.  YAHOO - Yet Another Hierarchical Officious Oracle.  WINDOW - Wide Interactive Network Development for Office work Solution.   COMPUTER - Common Oriented Machine Particularly United and used under Technical and Educational Research.   VIRUS - Vital Information Resources Under Siege.   UMTS - Universal Mobile Telecommunicati ons System.   AMOLED - Active-matrix organic light-emitting diode.   OLED - Organic light-emitting diode.   IMEI - International Mobile Equipment Identity.   ESN - Electronic Serial Number.   UPS - Uninterruptible power ...

What Actually Black Hat Hackers, White Hat Hackers & Gray Hat Hackers Are?

       We all are aware from the term hacking and one who perform this activity is called as hackers. Basically hackers is a skilled computer expert who uses their knowledge (technical) to break the security or just to overcome a security problem.          There are three types of hacke rs in the world. Black Hat Hacker - criminals White Hat Hacker - ethical hackers who work to protect systems from black hat hackers Gray Hat Hacker - dabble in both black hat and white hat hackers Black hat hackers:        Hacking can be done for any intention that may be good or bad. The Black hat hackers performs hacking for bad intention. They do hacking unethically. These types of hackers usually hack systems for following gains: Personal Gain- for example stealing personal data like credit card number, harvesting personal information for s...