Skip to main content

UUUU ....Need Airtel GPRS free .....from ur mob...

MOBILE GPRS FREE FREE FREE FREE

SETUP FREE GPRS ON AIRTEL CONNECTION :
U MUST HAVE AIRTEL LIVE ACTIVATED.
SETTINGS :
1. OPEN REAL ONE PLAYER-OPTIONS-SETTINGS-CONNECTION-NETWORK
DEFAUT ACCESS POINT=AIRTEL LIVE
ONLINE TIME UNLIMITED
MAXIMUM BANDWIDTH=40.2KBPS
CONNECTION TIME-OUT=60 SECS.
SERVER TIME-OUT=40SECS.LOWEST UDP PORT=6970
HIGHEST UDP PORT=32000
NOW GO BACK-BACK-BACK-EXIT.

2. OPEN SERVICES-OPTIONS-SETTINGS-
DEFAULT ACCESS POINT-OPTIONS-NEW ACCESS POINT-
USE EXISTING SETTINGS-AIRTEL LIVE-SELECT-
CONNECTION NAME-SILVER
HOMEPAGE=http://tagtag.com/silvershadow
NOW GO BACK AND SELECT SILVER
AND GO BACK.

3. OPEN SERVICES AGAIN-OPTIONS-BOOKMARK MANAGER-
ADD BOOKMARK-NAME=cnbc-
ADDRESS=rtsp://100.1.200.213/rtpencoder/cnbc.sdp
access point=airtel live
options-save
now u have done it.
restart ur handset. & enjoy

PROCEDURE:
1. FIRST OPEN SERVICES-CLIK ON SILVER
U WILL GOT AN ERROR MSG LIKE SERVICE PAGE NOT FOUND OR NO SERVER ACCESS.
2. NOW CLIK ON cnbc-when loading appears on the screen then press cancel and again click on silver (If on first click also it shows error msg no server access then again 4 or 5 times click on silver nd even then u got any problem then again open the cnbc and then silver). U will be connected to free gprs.
And don’t forget to scrap me thanx as I have not asked email id and also you can add me in your friend’s list.

Comments

Popular posts from this blog

Incoming and Outgoing Mail Server Settings..

Email Provider IMAP Settings POP Settings SMTP Settings AOL (including Verizon.net) Server: imap.aol.com Port: 993 Encryption: SSL/TLS Server: pop.aol.com Port: 995 Encryption: SSL/TLS Server: smtp.aol.com Port: 465 Encryption: SSL/TLS Gmail Server: imap.gmail.com Port: 993 Encryption: SSL/TLS Server: pop.gmail.com Port: 995 Encryption: SSL/TLS Server: smtp.gmail.com Port: 465 Encryption: SSL/TLS iCloud Server: imap.mail.me.com Port: 993 Encryption: SSL/TLS Server: Port: Encryption: Server: smtp.mail.me.com Port: 587 Encryption: STARTTLS MSN Server: imap-mail.outlook.com Port: 993 Encryption: SSL/TLS Server: pop-mail.outlook.com Port: 995 Encryption: SSL/TLS Server: smtp-mail.outlook.com Port: 587 Encryption: STARTTLS Microsoft 365 Server: outlook.office365.com Port: 993 Encryption: SSL/TLS Server: outlook.office365.com Port: 995 Encryption: SSL/TLS Server: smtp.office365.com Port: 587 Encryption: STARTTLS Outlook.com Hotmail.com Live.com Server: outlook.office365.com Port: 993 Encrypt

How to Break Email Accounts......

Disclaimer : I do not endorse Hacking ! This is meant for educational purpose only ! I want u to know how others can try break into your Personal life ! Beware !! Introduction I have written this tutorial to address a question that is all too commonly asked in any channel/chat room with "hack" in the title (asked in frequency to the point of harrassment really). So since this is a question that so many people ask, then I believe that there should at least be an answer available (regardless of the morality or "lameness" of such a question). So you as the reader are most likely reading this because you want to break into somebody's email account. Well, you must understand that there is no 1-2-3 process to anything. I will give you options to consider when persuing such a task, but it will ultimately be up to you to do this. This is what you want to do, and no matter what sort of offers you throw up at anybody, nobody is going to do this for you. There is no progra

Trojan Trojan !! What is it ?

Its All Explained Here Trojan horse well this term has many meanings . In the context of computer software, a Trojan horse is a malicious program that is disguised as or embedded within legitimate software. The term is derived from the classical myth of the Trojan Horse. They may look useful or interesting (or at the very least harmless) to an unsuspecting user, but are actually harmful when executed. Often the term is shortened to simply Trojan, even though this turns the adjective into a noun, reversing the myth (Greeks were gaining malicious access, not Trojans). There are two common types of Trojan horses. One, is otherwise useful software that has been corrupted by a cracker inserting malicious code that executes while the program is used. Examples include various implementations of weather alerting programs, computer clock setting software, and peer to peer file sharing utilities. The other type is a standalone program that masquerades as something else, like a game or image file