arungeek
Hacks and Tweaks



Uncategorized

January 10, 2010

Must Know Mobile Phone Codes And Secrets

More articles by »
Written by: arunenigma


There are a few things that can be done in times of grave emergencies. Your mobile phone can actually be a life saver or an emergency tool for survival.

Check out the things that you can do with it:


1. Emergency

The Emergency Number worldwide for Mobile is 112. If you find yourself out of the coverage area of your mobile; network and there is an emergency, dial 112 and the mobile will search any existing network to establish the emergency number for you, and interestingly this number 112 can be dialed even if the keypad is locked. Try it out.


2. Have you locked your keys in the car?

Does your car have remote key less entry? This may come in handy someday. Good reason to own a cell phone: If you lock your keys in the car and the spare keys are at home, call someone at home on their mobile phone from your cell phone.

Hold your cell phone about a foot from your car door and have the person at your home press the unlock button, holding it near the mobile phone on their end. Your car will unlock. Saves someone from having to drive your keys to you. Distance is no object. You could be hundreds of miles away, and if you can reach someone who has the other “remote” for your car, you can unlock the doors (or the trunk).

P.S: It works fine ! We tried it out and it unlocked our car over a mobile phone !

3. Hidden Battery Power

Imagine your mobile battery is very low. To activate, press the keys *3370# Your mobile will restart with this reserve and the instrument will show a 50% increase in battery. This reserve will get charged when you charge your mobile next time.

4. How to Disable a Stolen Mobile Phone?

To check your Mobile phone’s serial number, key in the following digits on your phone:

* # 0 6 #

A 15 digit code will appear on the screen. This number is unique to your handset. Write it down and keep it somewhere safe. When your phone get stolen, you can phone your service provider and give them this code. They will then be able to block your handset so even if the thief changes the SIM card, your phone will be totally useless.

You probably won’t get your phone back, but at least you know that whoever stole it can’t use/sell it either. If everybody does this, there would be no point in people stealing mobile phones.



About the Author

arunenigma
Computer Science Graduate Student @ Case Western Reserve University, Cleveland, USA




 
 

 
Factory_1

Python Factory Design Patterns using Switch Case

I googled for Factory Method Design Pattern in Python but couldn’t find a good resource. So, I  am sharing an example program to demonstrate this design pattern in Python which I frequently use. The factory method pattern is...
by arunenigma
 

 
 
Gospers_glider_gun

Conway’s Game of Life Implemetation in Python with cool patterns

he Game of Life (or simply Life) is not a game in the conventional sense. There are no players, and no winning or losing. Once the “pieces” are placed in the starting position, the rules determine everything that ha...
by arunenigma
 

 
 
bin-tree

Python AVL Tree Implementation with ASCII visualization

n computer science, an AVL tree is a self-balancing binary search tree. It was the first such data structure to be invented. In an AVL tree, the heights of the two child subtrees of any node differ by at most one; if at any tim...
by arunenigma
 

 

 
bst

Binary Search Tree in Python with ASCII art visualization

Binary search tree implementation in Python with: in, post and pre-order traversals. Also includes methods for insertion, deletion and search of nodes. Deletion is fairly complex and is made possible by keeping track of parents...
by arunenigma
 

 
 
fibonacci

Python, Memoization, Dynamic Programming, Fibonacci Series and some Fun!

ython can implement the recursive formulation directly, caching return values. Memoization is a method where if a call is made more than once with the same arguments, and the result is returned directly from the cache. For exam...
by arunenigma
 

 




0 Comments


Be the first to comment!


You must be logged in to post a comment.