Code Description :These Nokia codes will work on most Nokia Mobile Phones
(1) *3370# Activate Enhanced Full Rate Codec (EFR) - Your phone uses the best sound quality but talk time is reduced by approx. 5%
(2) #3370# Deactivate Enhanced Full Rate Codec (EFR) OR *3370# ( Favourite )
(3) *#4720# Activate Half Rate Codec - Your phone uses a lower quality sound but you should gain approx 30% more Talk Time.
(4) *#4720# Deactivate Half Rate Codec.
5) *#0000# Displays your phones software version, 1st Line : Software Version, 2nd Line : Software Release Date, 3rd Line : Compression Type. ( Favourite )
(6) *#9999# Phones software version if *#0000# does not work.
(7) *#06# For checking the International Mobile Equipment Identity (IMEI Number). ( Favourite )
(8) #pw+1234567890+1# Provider Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols).
(9) #pw+1234567890+2# Network Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols).
(10) #pw+1234567890+3# Country Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols).
(11) #pw+1234567890+4# SIM Card Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols).
(12) *#147# (vodafone) this lets you know who called you last.
(13) *#1471# Last call (Only vodofone).(14) *#21# Allows you to check the number that "All Calls" are diverted to
(15) *#2640# Displays security code in use.
(16) *#30# Lets you see the private number.
(17) *#43# Allows you to check the "Call Waiting" status of your phone.
(18) *#61# Allows you to check the number that "On No Reply" calls are diverted to.
(19) *#62# Allows you to check the number that "Divert If Unreachable (no service)" calls are diverted to.
(20) *#67# Allows you to check the number that "On Busy Calls" are diverted to.
(21) *#67705646# Removes operator logo on 3310 & 3330.(22) *#73# Reset phone timers and game scores.
(23) *#746025625# Displays the SIM Clock status, if your phone supports this power saving feature "SIM Clock Stop Allowed", it means you will get the best standby time possible.24) *#7760# Manufactures code.
(25) *#7780# Restore factory settings.
(26) *#8110# Software version for the nokia 8110.
(27) *#92702689# Displays - 1.Serial Number, 2.Date Made, 3.Purchase Date,
(28) *#94870345123456789# Deactivate the PWM-Mem.
(29) **21*number# Turn on "All Calls" diverting to the phone number entered.
(30) **61*number# Turn on "No Reply" diverting to the phone number entered.
(31) **67*number# Turn on "On Busy" diverting to the phone number entered.
(32) 12345 This is the default security code.
Saturday, May 9, 2009
Saturday, May 2, 2009
Tuesday, April 28, 2009
Stop User Account Control (UAC) screen flicker / flash
Every time I get one of those UAC prompts asking me to authorize an administrative action my LCD screen flashes when the box pops up. This is caused by the switch to the secure desktop, similar to what happens when you hit CTRL + ALT + DELETE. The only difference is that the background is a snapshot of your desktop that gives it the effect that it is just a pop up window. Although if you look carefully you will notice it is static since the clock does not change and anything else that was animated is now static. The secure desktop provides an extra level of security to UAC by making it immune to any application that may try to automate the click on the allow button bypassing the purpose of UAC.
This sounds like a great thing but it is really annoying to me. I hate that screen flicker. Rather than disable UAC, there is a better alternative. Instead, I can just disable the secure desktop switch that causes the flicker. I know this is not as secure but it is better than disabling UAC completely.
Follow the steps below to disable UAC secure desktop:
window.google_render_ad();
1. Click on the Start Button and key in secpol.msc and hit Enter.
2. Navigate through Local Policies and Security Options.
3. Scroll to the bottom and right click on “User Account Control: Switch to the secure desktop when prompting for elevation” and select Properties.
4. Set the option to Disabled and hit OK.
This sounds like a great thing but it is really annoying to me. I hate that screen flicker. Rather than disable UAC, there is a better alternative. Instead, I can just disable the secure desktop switch that causes the flicker. I know this is not as secure but it is better than disabling UAC completely.
Follow the steps below to disable UAC secure desktop:
window.google_render_ad();
1. Click on the Start Button and key in secpol.msc and hit Enter.
2. Navigate through Local Policies and Security Options.
3. Scroll to the bottom and right click on “User Account Control: Switch to the secure desktop when prompting for elevation” and select Properties.
4. Set the option to Disabled and hit OK.
Tuesday, December 2, 2008
Unblock attachments in OUTLOOK
Outlook 2007, Outlook 2003, Outlook 2002 and Outlook 2000 SP3 (but not Outlook 98 or earlier Outlook 2000 versions) allow the user to use a registry key to open up access to blocked attachments. (Always make a backup before editing the registry.) To use this key:
Run Regedit, and go to this key: HKEY_CURRENT_USER\Software\Microsoft\Office\10.0\Outlook\Security (change 10.0 to 9.0 for Outlook 2000 SP3 or to 11.0 for Outlook 2003, 12.0 for Outlook 2007 )
Under that key, add a new string value named Level1Remove.
For the value for Level1Remove, enter a semicolon-delimited list of file extensions. For example, entering this: .mdb;.urlwould unblock Microsoft Access files and Internet shortcuts. Note that the use of a leading dot was not previously required, however, new security patches may require it. If you are using "mdb;url" format and extensions are blocked, add a dot to each extension. Note also that there is not a space between extensions.
Run Regedit, and go to this key: HKEY_CURRENT_USER\Software\Microsoft\Office\10.0\Outlook\Security (change 10.0 to 9.0 for Outlook 2000 SP3 or to 11.0 for Outlook 2003, 12.0 for Outlook 2007 )
Under that key, add a new string value named Level1Remove.
For the value for Level1Remove, enter a semicolon-delimited list of file extensions. For example, entering this: .mdb;.urlwould unblock Microsoft Access files and Internet shortcuts. Note that the use of a leading dot was not previously required, however, new security patches may require it. If you are using "mdb;url" format and extensions are blocked, add a dot to each extension. Note also that there is not a space between extensions.
Friday, August 1, 2008
Installing Pre Vista windows after installing Vista
1. To install a previous version of Windows onto a computer running Windows Vista (Post-Beta 2)
With Windows Vista Beta 2 as well as in Windows Vista Build 5456, the only command one needs to run is:
bootsect /NT60 ALL
(Copy bootsect.exe from the boot folder of your Windows Vista DVD and paste it into your Windows XP Windows\system32 folder)
This pulls all Windows operating systems into the Windows Vista boot menu.
With Windows Vista Beta 2 as well as in Windows Vista Build 5456, the only command one needs to run is:
bootsect /NT60 ALL
(Copy bootsect.exe from the boot folder of your Windows Vista DVD and paste it into your Windows XP Windows\system32 folder)
This pulls all Windows operating systems into the Windows Vista boot menu.
Monday, July 7, 2008
Login Logoff looping while starting windows XP
http://support.microsoft.com/kb/555648
Edit these values and type the correct path of shell : Shell = explorer.exe Userinit=X:\windows\system32\userinit.exe NOTE: These files may also be deleted by spywares. You may need to extract them using Windows CD. Steps for rectifying this problem:
•
Log on to a networked computer.
•
Run Regedit.exe
•
Point your cursor to HKEY_LOCAL_MACHINE
•
Select File > Connect Remote Registry
•
Type computer name (infected computer)
•
Navigate to the following location in registry of destination or infected computer HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon
•
Edit these two values in right pane: Shell Userinit
•
Change these two values to Shell=explorer.exe Userinit = x:\windows\system32\userinit.exe
•
Exit from Registry
•
Restart Infected computer.
•
You should be able to log on to computer.
Edit these values and type the correct path of shell : Shell = explorer.exe Userinit=X:\windows\system32\userinit.exe NOTE: These files may also be deleted by spywares. You may need to extract them using Windows CD. Steps for rectifying this problem:
•
Log on to a networked computer.
•
Run Regedit.exe
•
Point your cursor to HKEY_LOCAL_MACHINE
•
Select File > Connect Remote Registry
•
Type computer name (infected computer)
•
Navigate to the following location in registry of destination or infected computer HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon
•
Edit these two values in right pane: Shell Userinit
•
Change these two values to Shell=explorer.exe Userinit = x:\windows\system32\userinit.exe
•
Exit from Registry
•
Restart Infected computer.
•
You should be able to log on to computer.
Subscribe to:
Comments (Atom)