NOTE:>> All Codings are depend on mobile versions......
On the main screen type *#06# For Information you get from the IMEI (International Mobile Equipment Identity)
XXXXXX XX XXXXXX X
TAC FAC SNR SP
TAC = Type approval code of your LG Mobile
FAC = Final assembly code of your cellphone
SNR = Serial number of your LG Phone
SP = Spare
>>Other secret tricks for LG mobile or cellphone
LG all models test mode:
Type 2945#*# on the main screen.
2945*#01*# Secret menu for LG
IMEI and SW (LG 510): *#07#
Software version (LG B1200): *8375#
Recount cheksum (LG B1200): *6861#
Factory test (B1200): #PWR 668
Simlock menu (LG B1200): 1945#*5101#
Simlock menu (LG 510W, 5200): 2945#*5101#
Simlock menu (LG 7020, 7010): 2945#*70001#
Simlock menu (LG 500, 600): 2947#*
LG-U81XX SPECIAL CODES
Code to read phone version :
- Phone without SIM
- Enter 277634#*# or 47328545454#
- Select 'SW Ver.info'
Code to reset phone :
- Phone without SIM
- Enter 277634#*# or 47328545454#
- Select 'Factory Reset'
Code to enter UNLOCK MENU :
- Phone wit SIM inside
- Enter 2945#*88110#
Test Menu 8330 : 637664#*#
Test Menu 8180 V10a: 49857465454#
Test Menu 8180 V11a: 492662464663#
Test Menu 8130-8138: 47328545454#
Test Menu 8110-8120: 277634#*
LG Mobile Codes
Kategori
Kategori
MY BLOGGER. Powered by Blogger.
Recent Comments
Tags
- 3 Necessary things to become Expert Certified Hacker
- DNSMAP Video Tutorial on Kali Linux – DNS Information Gathering
- DNSTRACER Video Tutorial on Kali Linux – DNS Analysis Tool
- Enums: Functions
- Hack Any Facebook Account !
- Hack like a pro (How to hack a Facebook part 2 )
- Hack: a new programming language for HHVM
- How to Become a Free Software Hacker
- How to Become a Hacker
- How to become a Professional Hacker | Hackingloops
- How to Crack Wi-Fi Passwords—For Beginners!
- I will make you expert How to become Professional Hacker 3 Necessary things to become a expert Hacker
- Penetration Testing of Apple iOS : Exploited by Sandbox Vulnerability
- security scanning and auditing.
- Shapes: Introduction
- Tools: Hh_server
- Using Nmap for Network Mapper. It is an open source security tool for network exploration
- Want to become Hacker
Formulir Kontak
Followers
Archives
-
▼
2016
(158)
-
▼
March
(156)
- Want to become Hacker, I will make you expert
- 3 Necessary things to become Expert Certified Hacker
- How to become a Professional Hacker | Hackingloops
- DNSMAP Video Tutorial on Kali Linux – DNS Informat...
- DNSTRACER Video Tutorial on Kali Linux – DNS Analy...
- Penetration Testing of Apple iOS : Exploited by Sa...
- 4 ways to Hack Facebook account password
- Hack: a new programming language for HHVM
- Enums: Functions
- Shapes: Introduction
- Overview: Typing
- Hack
- How to Crack Wi-Fi Passwords—For Beginners!
- How Do I Share ZIP, PDF or APK Files on WhatsApp?
- 2 Simple Ways to Spy on WhatsApp Account of Someon...
- How Do I Stop WhatsApp Downloading Media Automatic...
- How Can I Hide Last Seen Timestamp on My Android D...
- How Can I Make Fake Whatsapp Conversation to Fool ...
- How Can I Get All My Deleted WhatsApp Messages Back?
- Tips to speed up your pc
- How to Hack Databases: Running CMD Commands from a...
- How to Hack Databases: Extracting Data from Online...
- How to Hack Databases: Hacking MySQL Online Databa...
- How to Hack Databases: Cracking SQL Server Passwor...
- How to Hack Databases: Hunting for Microsoft's SQL...
- How to Hack Databases: The Terms & Technologies Yo...
- C/C++ for Hackers: Part 10 (System Commands)
- C/C++ for Hackers: Part 9 (Installing CodeBlocks i...
- C/C++ for Hackers: Part 8 (Getting User Input)
- C/C++ for Hackers: Part 7 (Variables)
- C/C++ for Hackers: Part 6 (Our First Program in C+...
- C/C++ for Hackers: Part 5 (More on the GNU GCC Com...
- C/C++ for Hackers: Part 4 (Programming vs Scripting)
- C/C++ Programming for Hackers: Part 3 (Examining t...
- C/C++ Programming for Hackers: Part 2 (The History...
- C/C++ Programming for Hackers: Part 1 (Introduction)
- How to Hack Bluetooth, Part 3: Reconnaissance
- How to Hack Bluetooth, Part 2: Using MultiBlue to ...
- How to Hack Bluetooth, Part 1: Terms, Technologies...
- 5 Smarter Ways to Search On Your iPhone Or iPad, S...
- How to run Android apps in Windows with a Virtual ...
- 20 EVERNOTE TRICKS, EVERNOTE TIPS, EVERNOTE TRICKS
- 15 Google Maps Tricks You Need to Try, google maps...
- How to switch from iPhone to Android and keep all ...
- How to Turn off Photo Back up with the Google Sett...
- change, How to add, or delete users in Android Lol...
- Best Ways To Recover Photos From A Lost Phone, Way...
- THE WAYS IN WHICH YOU CAN TAKE CHARGE OF YOUR IPHO...
- make your own antivirus
- CONVERT ANY TEXT TO AUDIO WITHOUT ANY SOFTWARE, CO...
- WHAT MEASURES TO TAKE IF YOUR PC IS DAMAGED DUE TO...
- Three Easy Ways to Paste Plain Text Into Word
- Three Easy Ways to Paste Plain Text Into Word
- Smart Charger - Hack
- One-Key Keyboard Hack
- Apple ipod headphone hack
- How to hack Telnet
- Nightlight IR Detector Hack
- how to use cmd to hack (basic codes)
- How to Do Advanced Computer Yoga
- How to Hack
- Facebook Tricks
- Exploits
- Ethical Hacking Training Course Online
- Earn Money Online
- Earn Bitcoins
- Phlashing-PDOS
- DOS Attacks
- Donate Us
- Cryptography
- Cross Site Scripting (XSS)
- Computer Forensic Tools And Tricks
- Chat with Friends through Command Prompt
- Bypass Android Pattern lock
- Bug Bounty Web List
- Botnets
- Anonymous Surfing
- Android Vulnerability Updates
- Android Tools
- Locked Out of Your Phone? Here's How You Bypass th...
- Locked Out of Your Phone? Here's How You Bypass th...
- Advice from a Real Hacker: Why I'm Skeptical That ...
- Advice from a Real Hacker: How I Would Build the G...
- Wireshark Training
- How to find out what programming language a websit...
- JavaSnoop: How to hack anything in Java
- Introduction to Public-Key Cryptography
- The Six Dumbest Ideas in Computer Security
- Pentesting Tutorial 1 - Information Gathering Part...
- Backtrack Penetration Testing Tutorial
- Learn Penetration Testing
- Hacking For Dummies - Beginners Tutorials Cybrary
- League of Legends List of champions LOL
- Best Kali Linux Books
- 5 Best Hacking and Pentesting Books of 2016
- These engineers are developing artificially intell...
- Hackers targeting internet-connected systems to st...
- Spelling mistake prevented hackers taking $1bn in ...
- HOW TO HACK BEATPORT: BUY YOUR WAY INTO THE TOP 10
- Aircrack-ng 1.2 RC 4
-
▼
March
(156)
love hacker triks
Label
- 3 Necessary things to become Expert Certified Hacker
- DNSMAP Video Tutorial on Kali Linux – DNS Information Gathering
- DNSTRACER Video Tutorial on Kali Linux – DNS Analysis Tool
- Enums: Functions
- Hack Any Facebook Account !
- Hack like a pro (How to hack a Facebook part 2 )
- Hack: a new programming language for HHVM
- How to Become a Free Software Hacker
- How to Become a Hacker
- How to become a Professional Hacker | Hackingloops
- How to Crack Wi-Fi Passwords—For Beginners!
- I will make you expert How to become Professional Hacker 3 Necessary things to become a expert Hacker
- Penetration Testing of Apple iOS : Exploited by Sandbox Vulnerability
- security scanning and auditing.
- Shapes: Introduction
- Tools: Hh_server
- Using Nmap for Network Mapper. It is an open source security tool for network exploration
- Want to become Hacker
Label
- 3 Necessary things to become Expert Certified Hacker
- DNSMAP Video Tutorial on Kali Linux – DNS Information Gathering
- DNSTRACER Video Tutorial on Kali Linux – DNS Analysis Tool
- Enums: Functions
- Hack Any Facebook Account !
- Hack like a pro (How to hack a Facebook part 2 )
- Hack: a new programming language for HHVM
- How to Become a Free Software Hacker
- How to Become a Hacker
- How to become a Professional Hacker | Hackingloops
- How to Crack Wi-Fi Passwords—For Beginners!
- I will make you expert How to become Professional Hacker 3 Necessary things to become a expert Hacker
- Penetration Testing of Apple iOS : Exploited by Sandbox Vulnerability
- security scanning and auditing.
- Shapes: Introduction
- Tools: Hh_server
- Using Nmap for Network Mapper. It is an open source security tool for network exploration
- Want to become Hacker
Flickr
Featured Post
Popular
-
iCloud Apple iD BruteForcer This tool is released by "Pr0x13" at GitHub. Attackers to break into any iCloud account, potentia...
-
6×03 Oathbreaker– VideoMega ( HD )– OpenLoad – iDoWatch – Streamin – Nowvideo – WStream – FlashX
-
Prerequisites: All tutorials will need: Backtrack 5, Pentesting Lab, and Patience This will be the first tutorial on a series th...
-
In the starting of this tutorial i want clear this if u misuse this information in hacking someones computer then i am no...
-
'XSS' also known as 'CSS' - Cross Site Scripting . It is a very common vulnerability found in Web Applications, 'XSS...
-
Reward Program AT&T - http://developer.att.com/developer...
-
Basic Scanning Techniques So here I will show the basic techniques for scanning network/host. But before that, you should know some bas...
-
Google queries for locating various Web servers “Apache/1.3.28 Server at” intitle:index.of Apache 1.3.2 “Apache/2.0 Server at” intitle:inde...
-
BY: UJJWAL SAHAY CO-FOUNDER [www.thebigcomputing.com] FIND OUT MORE STUFF LIKE THIS ON TheBigComputing.com We cover unique Ethica...
-
Nir Goldshlager Founder of Break Security find the critical vulnerability in Instagram. Succesful hack allows attacker to access private p...
0 comments:
Post a Comment