Skip to main content

5 BEST nokia S40 TRICKS

1) CHANGE ICON OF YOUR FOLDERNOW YOU CAN CHANGE THE ICON OF THE FOLDER. THE ONLY THING YOU HAVE TO DO IS ADD .nth AFTER THE NAME OF THE FOLDER.

2) HIDE YOUR FOLDER ICONNOW YOU CAN HIDE THE ICON OF YOUR FOLDER. THE ONLY THING YOU HAVE TO DO IS ADD .ota AFTER THE NAME OF THE FOLDER

3)HIDE FOLDER WITHOUT ANY SOFTWAREThis trick is very simple friends.You dont need any thing for this trick. Just simply follow the steps and your work will be done.
1. Create a folder of any name like abc
2. Move the files you want to hide.
3. Now just add the extension .jad like if you have abc folder rename it to abc.jad
4. Now create anotherfolder in same directory with the same name but different extension of.jar (example abc.jar)
5. now your main folder (with .Jad extention) will hide and it will not be shown.To see the original folder rename the visible folder (of.Jar extention) and your hidden folder will appear.



4)RECORD FM With this trick you canrecord FM
broadcast in amr format. First download
a java application named XploreME in
your phone. Now switch on the radio and
play it through the loudspeaker. Now
open XploreME and select the Record
option. You will see two fields, first
field is to set the folder you want to
save the recorded file and the second
field is for choosing the time limit of
recording. If you have a memory card,
write E:/ in the first field. Now
press Ok and start recording. After
recording, you will findthe file inside
your memory card.
NOTE-THIS IS A MULTI UTILITY APP ITS A FILE EXPLORER too


5) COPY COPYRIGHT ITEMS FROM YOUR PHONE MEMORYTHIS TRICK WORKS ONLY FOR SOME PHONES. COPYRIGHT ITEMS ARE THOSE ITEMS WHICH CAN NOT BE COPIED, MOVED OR DELETED AND THESE STORE PERMANENTLY TO YOUR PHONE. FIRST OF ALL, YOU HAVE TO GO TO YOUR DEFAULT WEB BROWSER (NOT OPERAMING). IF YOU HAVE TO COPY A THEME THEN YOU HAVE TO WRITE-
file:///c:/predefgallery/predefthemes/name of the theme

and press ok. FOR COPYING TONES, JUST WRITE
file:///c:/predefgallery/predeftones/predefringtones/name of tone

and press ok.

Comments

Popular posts from this blog

Sharecash Downloader | Bypass Surveys and Download from Sharecash

Sometimes when your looking for the right file and when you have found it,you end up with a sad note because you realize that its a SHARECASH Link.So now,this is the tool which your looking for.To know more about this tool let us see what it actually does. What does the Sharecash Downloader Do ? This auto downloader bypasses the sharecash server by using a premium account and gives you the direct link for the sharecash download.But the important thing to be noted here that in Normal Sharecash you have to finish the survey which takes nearly 10 minutes.But this will get you the the sharecash files download link in seconds ! If your too lazy I have an alternate for you !! I'll Download the Sharecash files for you !! How to use Sharecash Auto Downloader ? It is quite self explanatory to use this tool.Some times you might have a mirror for your Sharecash file.For ex. http://fileups.net/1g9Xe.So in order to convert this link into the original sharecash link for ex. http://sh...

What is Autosys ?

Introduction to Autosys Autosys is an automated job control system for scheduling, monitoring, and reporting. These jobs can reside on any Autosys-configured machine that is attached to a network. An AutoSys job is any single command, executable, script, or Windows batch file. Each AutoSys job definition contains a variety of qualifying attributes, including the conditions specifying when and where a job should be run. Defining Jobs : There are the two methods you can use to create job definitions: ¦ Using the AutoSys Graphical User Interface (GUI). ¦ Using the AutoSys Job Information Language (JIL) through a command-line interface. Autosys Jobs: Job Types and Structure : There are three types of jobs: command, file watcher, and box. As their names imply, command jobs execute commands, box jobs are containers that hold other jobs (including other boxes), and file watcher jobs watch for the arrival of a specif...

Evil Twin and Fake Wireless Access Point Hacks: What They Are, How To Defend

Hacking is a term with a wide variety of acts associated with it. Some are incredibly complex and demand a high degree of knowledge, others are little more than installing some software on your device and acting a bit...less than ethically. One of the most common hacks is also one of the easiest to defend against. This is what is known as a fake wireless access point. Hackers use this tactic to easily steal data of unsuspecting wireless users in public places. What is a fake wireless access point data theft? This type of attack has a number of nicknames associated with it: AP Phishing, Wi-Fi Phishing, Hotspotter, Evil Twins, and Honeypot AP. All of these are associated with creating a fake Wi-Fi connection that people log into, and whose goal is to steal credentials, logins, and passwords. To accomplish this, hackers simply use a piece of software, or app, that is designed to capture data that is sent over a wireless connection. Examples of software that is sued d...