Saturday, 6 August 2011

How to Activate 3g services in Vodafone India



........................


Step 1: Send “ACT 3G“ to 111

Step 2: You will receive two SMS

1. Enjoy high speed Internet and downloads, Video Calls, Live Mobile TV, HD Gaming with Vodafone 3G. We have your request for 3G service and will revert shortly
2. 3G services on your phone will be activated in 24 Hrs. Your charges will remain the same as your current 2G plan. Video calling will be charged at  Rs 3 per minute
Step 3: If it is activated( one day) and send the SMS again you will get the reply

1.The ACT 3G service is already active for your Vodafone mobile phone

You may need to restart ( switch off and switch on ) your phone to browse in 3G. Otherwise only Video calling will work and data services.

..............................................................................................................................

How to Activate 3g services in Tata Docomo

Tata,  one of the pioneer since 19th centuries . At First They have launched Tata communications in india, Later in recent they have also Launched Tata docomo. Due to the viral craze in Docomo they have got the license for 3g. They have launched 3g services in 10 states. If you are an existing Tata Docomo subscriber , follow  the procedure to enable 3g.


To Activate 3g services in Tata Docomo follow the steps below:

Step 1: SMS “3G LIFE” to 53333

Step 2:You will receive  a WAP link for 3G portal

Step 3:Go to the Portal

Step 4:Browse and click “3G Life”

Step 5:Download the 3G Life experience and install it

.........................................................................................................................................

Friday, 5 August 2011

"Lulzsec arrested in london picture" a new scam on facebook

"Lulzsec arrested  in london picture" a new scam on facebook


Lulzsec is the hot topic on the cyber world and after the rumers of yesterday when british police calimed to arrest the mastermaind of the hacker group, scammers are trying to spread spams by taking the advantage of people's interest in this group.


Rogue messages posted on the social networking site yesterday read "The Creator of LulzSec arrested in London (PHOTO TAKEN BY THE POLICE) SEE THE PICTURE WITHOUT BLURRING, SHARE THIS PAGE AND LIKE IT !! http://bit.ly/[censored]"


The post also show the blurrd image and linked to the article about the arrest on Sophos' Naked Security blog. This is done to exploit the trust of users on the security blog.


After the clicking on the link it asks users for sharing and liking in order to see the uncensored image and lead user to a third party website and forced to download a program iLividSetupV1.exe that attempted to install a series of toolbars.


"Presumably whoever is behind this Facebook scam (and I doubt it is anyone connected with LulzSec) is earning commission the more people they convince to install the software," says Sophos senior technology consultant Graham Cluley.

...........................................................................................................................

Hackers hacked australian host distribute.it and destroyed all data including backup

Hackers hacked australian host distribute.it and destroyed all data including backup


Hackers have managed to break into the network of a famous australian web hosting provider Distribute.it and destroyed all its data including backup. This attack was performed the last week which is a great loss to the company because customers are unhappy due to loss of data.


there were 4,800 affected websites can be restored from backup done by their owners but those websites whose back up was not done y owners have been lost foreve. This is a great stupidity of the company why it hadn't create any offline backup of data. Since recovery is not possible means a low level operations were executed to delete data.


The company issued a statement today, "We regret to inform that the data, sites and emails that were hosted on Drought, Hurricane, Blizzard and Cyclone can be considered by all the experts to be unrecoverable, While every effort will be made to continue to gain access to the lost information from those hosting servers, it seems unlikely that any usable data will can be salvaged from these platforms.


Source Techlomedia.in

......................................................................................................................................

More than 100 websites hacked by SWATS - the toxified crew


More than 100 websites hacked by SWATS - the toxified crew




A list of hacked website is posted on PASTEBIN. the hacker gropu is SWATS. They have posted more than 100 hacked website links on the PASTEBIN.


The group is seems to be indian and the members are
Bluff Master Hacker
d3c0mpli3r
Sonam The Gray Hat Hacker
Steve
D4rkShell Maroof


See the complete list of hacked website
http://pastebin.com/6GHhzuY1

................................................................................................................

More than 100 website defaced having domains of UNITED KINGDOM by blackzero

More than 100 website defaced having domains of UNITED KINGDOM by blackzero




Recently i got a news from the website http://pastebin.com which is used by hackers now a days that more than 100 websites of co.uk and org.uk domains are defaced by black zero.


The list of website is posted by THE HACKER NEWS


http://pastebin.com/tVVzXMbf

.........................................................................................................................

LulzSec finally Quits after 50 days hacking attacks

LulzSec finally Quits after 50 days hacking attacks
Hacker group LulzSec which is responsible of many hacking attacks on sony aattacks on PBS, the US Senate, the CIA, and a slew of gaming sites popular with 4Chan users including EVE Online, Minecraft and League of Legends, finally calls for a quit for its hacking attacks. They announced it by posting this to twitter and pastebin. They are the team of 6 hackers who started the mission anti security 50 days ago.




They wrote,"We are Lulz Security, and this is our final release, as today marks something meaningful to us. 50 days ago, we set sail with our humble ship on an uneasy and brutal ocean: the Internet. The hate machine, the love machine, the machine powered by many machines. We are all part of it, helping it grow, and helping it grow on us."



"Again, behind the mask, behind the insanity and mayhem, we truly believe in the AntiSec movement. We believe in it so strongly that we brought it back, much to the dismay of those looking for more anarchic lulz. We hope, wish, even beg, that the movement manifests itself into a revolution that can continue on without us. The support we've gathered for it in such a short space of time is truly overwhelming, and not to mention humbling. Please don't stop. Together, united, we can stomp down our common oppressors and imbue ourselves with the power and freedom we deserve.", they added
http://pastebin.com/1znEGmHa


They posted some links too and adviced to make mirrors of material on the website
http://lulzsecurity.com/releases/
http://thepiratebay.org/user/LulzSec/
http://thepiratebay.org/torrent/6495523/50_Days_of_Lulz

............................................................................................................................

dating website Pepper hacked by Anonymous

dating website Pepper hacked by Anonymous


Onlne dating website hacked by Anonymous hackers group dor Antisec operation and users data leaked online on a website privatepaste.com


See the data from below link
http://privatepaste.com/af59e5a969

....................................................................................................................

Hackers now target mobile users for phishing attack

Mobile phishing attacks are rising

Security researchers from symantec have spotted some phishing attacks that use fake WAP pages. This type of phishing is not so popular among hackers but the numbers of attacks are expected to grow with the time due to the increasing use of smartphones.
Now a days every company also design its mobile websites for mobile users and wap websites for those users whose mobile use old browser.
"Symantec has recorded phishing sites spoofing such Web pages and has monitored the trend. In June, social networking and information services brands were observed in these phishing sites," the company warns.
"Over the past six months, about 65 percent of these phishing sites spoofed brands from the banking sector, whereas 19 percent were from the e-commerce sector and the remaining were from the ISP, social networking, and information services sectors," says Symantec security expert Mathew Maniyara.
Security experts have warned in the past that mobile users are more susceptible to phishing because of the way mobile browsers display URLs. Since a phone's screen has limited space, URLs are truncated when shown in the address bar. This allows attackers to create overly long URLs in order to hide the rogue domain name.

Source: news softpedia 
 
 
.......................................................................................................................................

German Fedral Police servers hacked and data leaked by NN crew

Angry face


German Fedral Police servers hacked and data leaked by NN crew
A group of hackers NN crew broke into the servers of German fedral police and stolen a large amount of data and also published the data on a website which includes several usernames and passwords along with telephone numbers, license plate numbers, locations, and coordinates.

Published data link
.................................................................................................................................................

Indian hacker claimed to hack into the email id of ISI chief Ahmed Shuja Pasha

Indian hacker claimed to hack into the email id of ISI chief Ahmed Shuja Pasha


I was browsing some latest news, then i saw a buzzing headline from Hacker news media, The hacker news in which an Indian hacker "Creatrix" had claimed to hack into the email account of ISI chief Ahmed Shuja Pasha. 
Hacker also provide some screen shots of the inbox and some documents from the emails.
See full story in TheHackerNews

......................................................................................................................

DNS Cache Poisoning Used in Brazilian Phishing Attack

DNS Cache Poisoning Used in Brazilian Phishing Attack


Zscaler Security researchers have found a phishing attack that used DNS cache poisoning to direct victims to a spoofed banking website. The unusual attack was detected to target customers of Banco Santander Brasil, in Brazil. Attackers managed to force several DNS servers to resolve santander.com.br to an IP address under their control. The spoofed page hosted on the rogue web server was very well crafted and looked identical to the real one.
"In such a situation, phishers do not need to blast e-mails to random Brazilian e-mail accounts. They just need to wait for the Santander customers to login into their bank account, when accessing the site via the poisoned DNS servers," Zscaler's Julien Sobrier explains.
This type of phishing attack is very hard to detect and block. Victims have no indication that they are on a different website
Fortunately, the affected DNS servers have been cleaned up and are now functional properly. The number of potentially affected users is not known.

 


.............................................................................................................................

Hackers boldly claimed, FBI and others can't stop them

Hackers boldly claimed, FBI and others can't stop them


Lulzsec and Anonymous have published a letter in which they addressed to FBI and others that they can't stop them.
they wrote,"We want to send a message that chaos on the Internet is unacceptable, [even if] hackers can be believed to have social causes, it's entirely unacceptable to break into websites and commit unlawful acts," Chabinsky told the National Public Radio (NPR)."
They published this letter after the claim of FBI that they caught members of hacker groups. Hackers adviced FBI not to lie to world.
"These governments and corporations are our enemy. And we will continue to fight them, with all methods we have at our disposal, and that certainly includes breaking into their websites and exposing their lies," the hackers added.
Read the full published letter
http://pastebin.com/RA15ix7S

...........................................................................................................................

Hackers can blow up your MacBook

Hackers can blow up your MacBook


A security researcher has discovered a bug in the Mac Book. Security expert Charlie Miller, explained that the microcontroller that monitors the power level of Apple laptops can be compromised to run a malicious code on it. The researcher has found that the batteries’ microcontroller chips ship with default passwords. Once a hacker learns that password, they can learn to control the chips’ firmware and potentially hijack them. A hacker can well cause the laptop’s battery to explode.
“These batteries just aren’t designed with the idea that people will mess with them,” Miller said. “What I’m showing is that it’s possible to use them to do something really bad.”
“You could put a whole hard drive in, reinstall the software, flash the BIOS, and every time it would reattack and screw you over. There would be no way to eradicate or detect it other than removing the battery.” said Miller.
Miller plans to publicly disclose the flaw, and provide a fix at the Black Hat security conference in August.

.............................................................................................................................................

VirtualBox 4.1 Final released for Linux

VirtualBox 4.1 Final released for Linux
 
 


VirtualBox 4.1 final is released for Linux. It is a general-purpose full virtualizer for x86 hardware, targeted at server, desktop and embedded use. VirtualBox is a cross-platform virtualization application. What does that mean? For one thing, it installs on your existing Intel or AMD-based computers, whether they are running Windows, Mac, Linux or Solaris operating systems. Secondly, it extends the capabilities of your existing computer so that it can run multiple operating systems (inside multiple virtual machines) at the same time. So, for example, you can run Windows and Linux on your Mac, run Windows Server 2008 on your Linux server, run Linux on your Windows PC, and so on, all alongside your existing applications. You can install and run as many virtual machines as you like -- the only practical limits are disk space and memory.


VirtualBox is deceptively simple yet also very powerful. It can run everywhere from small embedded systems or desktop class machines all the way up to datacenter deployments and even Cloud environments.


This version is a major update. The following major new features were added:

  • Support for cloning of VMs (bug #5853, see the manual for more information): full clones can be created through the GUI and VBoxManage, linked clones only through VBoxManage
  • GUI: enhanced wizard for creating new virtual disks
  • GUI: new wizard for copying virtual disks
  • GUI: keep the aspect ratio in scale mode (Windows and OSX hosts only; bug #7822)
  • VMM: raised the memory limit for 64-bit hosts to 1TB
  • Experimental support for PCI passthrough for Linux hosts, see the manual for more information
  • Windows guests: Experimental WDDM graphics driver, supporting Windows Aero (bug #4607) and providing Direct3D support using a cleaner approach (no need to install the guest drivers in Safe Mode anymore)
  • Guest Additions: status of modules and features can now be queried separately by the frontends
  • Networking: new network attachment mode "Generic Driver", which offers an open plugin architecture for arbitrary and separately distributable virtual network implementations
  • Host-only Networking: fixed host crash in kernels prior to 2.6.29
  • New Networking Mode UDP Tunnel: allows to interconnect VMs running on different hosts easily and transparently, see the manual for more information
  • Experimental support for SATA hard disk hotplugging available with VBoxManage
  • Solaris hosts: New Crossbow based bridged networking driver for Solaris 11 build 159 and above
..........................................................................................................................................


Lulzsec member Topiary arrested in Shetland Islands

Officers from the Metropolitan Police Service's Police Central e-Crime Unit (PCeU) arrested an 18 year old man in Shetland Islands as part of an international investigation into the activities of the Anonymous and LulzSec hacktivist groups. This man is alleged to be involved in hacking attacks with  Anonymous and LulzSec hacktivist groups. The man have an online nickname Topiary  and acted as spokesperson for the gropus in Twitter.
He was arrested at a residential address in the Shetland Islands and is currently being transported to a police station in central London.
This arrest can open various mystries about hacker groups and many more arrests can be seen in near future.

...........................................................................................................................................

New Account hijacking vulnerability found in Skype

New Account hijacking vulnerability found in Skype


A critical Cross site scripting (XSS) has been found in Skype which leads to account hijacking. This vulnerability is found in the versions which have facebook integration. This integration alllows users to  see the facebook activity and post status updates. 
security researcher David Vieira-Kurz discovered that the status comment field does not properly sanitize input and executes JavaScript code. Any attacker can exploit this vulnerability to post a comment that executes rogue code which steals a visitor's Skype session cookie when they view it in the browser.
But the attacker should in friend list, this is the limitation of this attack

....................................................................................................................................

facebook bug bounty program offers $500 for bug reporting

facebook bug bounty program offers $500 for bug reporting


Facebook has taken a step to find bugs in its social networking website. It has announced a bug bounty program rewarding $500 for finding bugs in the facebook. facebook announced this by its page.  facebook wrote, "To show our appreciation for our security researchers, we offer a monetary bounty for certain qualifying security bugs."
To qualify for a bounty, you must:




  • Adhere to our Responsible Disclosure Policy (... give us a reasonable time to respond to your report before making any information public and make a good faith effort to avoid privacy violations, destruction of data and interruption or degradation of our service during your research ...)
  • Be the first person to responsibly disclose the bug
  • Report a bug that could compromise the integrity or privacy of Facebook user data, such as:
  1. Cross-Site Scripting (XSS)
  2. Cross-Site Request Forgery (CSRF/XSRF)
  3. Remote Code Injection
  • Reside in a country not under any current U.S. Sanctions (e.g., North Korea, Libya, Cuba, etc.)
Read More
 
...........................................................................................................................................

Vimeo, video sharing website hacked and defaced 2 times a day

Vimeo, video sharing website hacked and defaced


A hacker named as terminal_pk hacked the website of brazilian video sharing website Vimeo and replace the home page with the deface page.


 I saw the deface page. You can also see in a mirror


But after some time when i opened the website.. Oh my god what is this??
that was the different deface page by another team, of hacker. It was hacked again and defaced again with this team of hackers. 
Hacking crimes are on peak and lulzsec and antisec operation is promoting these crimes. 




..................................................................................................................................................


Operation Shady RAT- Biggest cyber attack revealed by McAfee

Operation Shady RAT- Biggest cyber attack revealed by McAfee


Security researchers from McAfee have released a report revealing the biggest cyber attack in which 76 organizations have been compromised during the past five years. in all compromised organizations, 49 are from US. This investigation was started in 2006 under the vice president of threat research of McAfee. They have released a 14 pages report about this operation with details the cyber attacks recorded. see the report and image below

McAfee believes that a single nation is behind it but didn't give any name. But After reading the line, i know you are also thinking about the 1 nation china. 
According to the report, The shortest time a targeted organization remained compromised by the actor behind Shady RAT was one month and the longest was 28 months, the Olympic Committee of an Asian country. SOme other long term compromised include a South Korean government agency (27 months), a U.S. federal government agency (25 months), a U.S. satellite communications company (25 months), a Southern California county government (24 months) and the Hong Kong office of a U.S. news organization (21 months).

PWSB5ZXWSJ4C
 
................................................................................................................................................................................

Microsoft BlueHat security contest - win $268,000

Microsoft has announced a big contest for security researchers who develop exploits and work for defensive security technologies. The total cost of award is big enough to attract good security researchers to the program.


Microsoft announced this contest and wrote on website, "The object of this Contest is to design a novel runtime mitigation technology solution that is capable of preventing the exploitation of memory safety vulnerabilities. For purposes of this Contest, each prototype that is capable of protecting an application that runs on Windows you create and submit in the Contest will be called an "entry." All eligible entries received will be judged using the criteria described below to determine the winners of the prizes described below."


This Contest starts at 12:01 a.m. Pacific Time (PT) on August 3, 2011, and ends at 11:59 p.m. PT on April 1, 2012 ("Entry Period").


Read the full story about the program
https://www.microsoft.com/security/bluehatprize/rules.aspx

........................................................................................................................................

BlackBuntu V0.3 Released

BlackBuntu V0.3 Released

Blackbuntu is an environment for penetration testing. This operating system was specially designed for security training students who practice for information security. It is Ubuntu based distribution with GNOME Desktop Environment. It's currently being built using the Ubuntu 10.10 and work on reference Back|Track. 
For Blackbuntu 0.3 we are supporting both x86 and x86_64 architectures.Security and Penetration Testing tools available in Blackbuntu :
Information Gathering
Network Mapping
Vulnerability Identification
Penetration
Privilege Escalation
Maintaining Access
Radio Network Analysis
VoIP Analysis
Digital Forensic
Reverse Engineering
Miscellanious


System requirements
1GHz x86 processor
768 MB of system memory (RAM)
10 GB of disk space for installation
Graphics card capable of 800×600 resolution
DVD-ROM drive or USB 


Download Here
http://www.blackbuntu.com/download

..............................................................................................................................

Cross Site Request Forgery Attack | CSRF Attack

 Cross Site Request Forgery Attack


Cross-site request forgery ( CSRF or XSRF) is a type of malicious exploit of a website in which legitimate commands are sent from a user to a website without his permission.CSRF exploits is the trust that a site is in a user's browser.It is also known as a one-click attack or session riding.


Suppose a user login in a website A. After the authentication process, website provides a session id to the user and it'll expire after the logout process. But this session id will exists
between login to logout period. In mean time all the request sent from victims browser to the website A will be recognised as a legitimate requests of this user because of this active valid session id which is stored as cookies and authenticate the user.This is called the trust of a website on the user's browser. If the browser has valid session keys, it means all the request sent by this browser is valid an belong to this user.
Here comes the attacker. He posted a link on a website or forum which would send a http request to website A. User's session is active so this http requset would be recognised as a request sent by this user and website would act according to this request.


Ex: The website A is the website of user's bank.  User login into website. Website has a form for transfer of money to another account. suppose this for action generate this type of get request.
< img src="http://bank.example.com/withdraw?account=sender&amount=amount&for=reciever">
Attacker know the format of the form so he send the link in an image tag (as give below) to the user..
< img src="http://bank.example.com/withdraw?account=bob&amount=1000000&for=alice">

Browsers do not restrict the IMG tag to specific image types IMG tag could point to a page instead of an image.


If user (bob-in case of given url) will click on the image with running session then it's money will be transfered to attacker's(alice-in case of url) by the bank.


we can see this process in figures.



Web Browser has established an authenticated session with the Trusted Site. Trusted Action should only be performed when the Web Browser makes the request over the authenicated session.



Web Browser attempts to perform a Trusted Action. The Trusted Site confirms that the
Web Browser is authenticated and allows the action to be performed.


The Attacking Site causes the browser to send a request to the Trusted Site. The Trusted Site sees a valid, authenticated request from the Web Browser and performs the Trusted Action.

Preventing CSRF:
  1. Use POST rather than GET in forms
  2. Do not focus on convenience
  3. Force the use of your own forms
  4. Checking the HTTP Referer header
  5. Limiting the lifetime of authentication cookies
  1. Use of random token with each session

...........................................................................................................................................

Download free torrents on airtel with full speed (working in pc)

free torrents in airtel

Once again i am back with a new 100% working trick. This trick works only in pc connected to airtel network First Download and install utorrent or bit torrent.
Now Go to Options > Preferences > Connection.

Change port, Use from incoming connection to port 53. Uncheck random port. Use MO Setting.
Now add any torrent file in utorrent or bit torrent wait for 2 or 3 min, your download will start ( if not start exit utorrent or bit torrent and open it again)

Speed: You get Different speeds in different area.


In my area i get 30-45 kbps.

..................................................................................................................................

Thursday, 4 August 2011

How to check friends mobile balance in Airtel?



check friends mobile balance in Airtel

 How to check friends mobile balance in Airtel?

Actually this works only for tamil nadu. Try this in your state and share your result.
Dial 12140 from your Airtel mobile number. When the call get connected, Select your language( if you haven ’t changed it). 
After the IVR language is selected then Press 2. Now enter your your friend ’s mobile number without any “0″ or +91 at the beginning of the number (enter only 10 digit mobile number). The system replies the mobile number which you entered. Just confirm it by Pressing 1 It will surely ask for the PIN of entered mobile
number. Enter the PIN as 1234. This step is more important. If you finished all the above steps now finally Press 3 to find the balance of any Airtel number.
Working in some states....


.................................................................................................................................

How to check friends mobile Balance in Docomo and Airtel


Today my friend told me about checking others balance from my phone. So i taught to post this tricks for my fella readers. Impress your friends with this trick....

check friends mobile balance in Docomo

How to check friends mobile balance in Docomo?
Dial 09045012345 Select language by pressing 1 Or 2
Then, Select 1
Type < your friends 10 digit tata docomo no >
Then Select 1.
That's it....Enjoy!!!!

......................................................................................................................

Airtel working proxy trick for july 2011


Hi, friends its been many days since i posted any gprs tricks. Now i am back with a new trick, this "Airtel working proxy trick" is working in all states.
Just change your default mobile office settings as given below:

Home Page : http://0.facebook.com
APN : airtelgprs.com
Proxy Address or Proxy Server : www.german-proxy.de
Proxy Port : 80
Save settings...
I use proxy servers instead of address because it gives much speed in my area.You can use as your wish but use that only which is speed and faster.
Try this trick at below Rs.1/-


................................................................................................................................

Wednesday, 3 August 2011

Tata Docomo(2g and 3g) free gprs trick for june 2011

in 06 June 2011

Hi Readers first of all i want to tell you that this trick was found on some forum all credit goes to that forum, it was checked by me and working without deducting money in Haryana, Andhra Pradesh,Maharastra,Karnataka, Uttar Pradesh,Kerala and Tamil nadu. Below are two tricks, Try out two tricks and see which works bettar for you and use them.

Trick1 :

Follow the Steps below to get free gprs in your Tata Docomo mobile:

Step1 : Use any handler browser(i tested on operamini4.3 handler mod), just leave all field untouched except front query, where you put-

 10.124.72.171.html.flyproxy.com/nph-proxy.pl/010110A/http/

Step2 : Here you have another proxys for front query, try and find out which one is fastest for you

10.124.72.171.php.lelook.com/cgi-bin/nph-get.cgi/000110A/http/

10.124.72.171.php.gowingo.com/cgi-bin/nph-get.cgi/000100A/http/

10.124.72.171.php.concealme.com/nph-proxy.pl/000010A/http/

10.124.72.171.php.scarewar.com/cgi-bin/nph-get.cgi/000110A/http/


10.124.72.171.php.anonlove.com/cgi-bin/nph-get.cgi/000000A/http/


Note - Use divein setting for this trick, balance should be above rs 1.


Trick 2:

Use any opera handler mod, DON'T CHANGE ANY PRIMARY N SECONDARY SERVER, ANY QUERTIES ETC, ONLY  change proxy type to http and  enter this in proxy server.

10.124.88.22.server4.operamini.com

ENJOY FAST SPEED

................................................................................................................................

Tuesday, 2 August 2011

Airtel Gprs Trick for june 2011 works in pc and mobile

First of all i want to say something to my readers, I am posting many tricks in my blog some works in some states and some not. If it won't work in your state please comment me with your state name and tell me the problem. I will help you. Please comment, because i want to know your response and help you out.
Now we shall go to our trick.
Airtel gprs trick for june 2011:

Use this proxy site - http://100.1.200.188.t9space.com/

Use front query as  - 100.1.200.188 or 100.1.200.188.PHP.FOXYN.COM/CGI-BIN/NPH-GET.CGI/111101A/HTTP/

Downlod this UC browser where front query has already installed

Works in high speed . 
 
...................................................................................................................................

Monday, 1 August 2011

Tata Docomo Free Gprs For PC

I present you with on going free gprs for tata docomo in pc using kemulator here are the steps......

1] Download kemulator from pc sec and operaMini v4,5 or ucweb.
2] connect with tata docomo Divein setting in PC. it will get connected
3] In kemulator do setting of dive-in settings den open any handler browser and do same setting like we do on mobile eg.select "https" nd in proxy server write any free server frm below New free server.
tata.cellmania.com
divein.tatadocomo.com
10.124.72.171
203.101.45.215
202.87.41.147
122.170.122.191
122.170.122.194
202.87.41.147
wap.hungama.com
www.tata.com