Thursday, June 4, 2009

Smart Terror - terror Bluetooth - Beta version - V.2.2

Google translation:
Intelligentterror - Betaversion - Program V.2.2Programmistov.Napisana 14/04/2009 to compete for the use ofthe Python programming language platform for Symbian 9.x.Project Update! (27/05/09 ) (On 27/05/09)Version 2.2
Changes:-
-Adjusted the UID program (because it coincides with another program)
- Delete settings show the direction of change
- Delete the system protection against the use of a third party
- Remove to change the display settings
- Change the function settings (set to be submitted to the list)
- Functional Speech Synthesis control (now full control synthesizer)
- The progress of time to initialize, save the settings, the completion of this work (now you can estimate the speed, functionality)
- Increase the initialization splash screen to save your settings and complete the work
- Upgrade scanner error (now Initialization error, scanner error of visual and audible
notification communication)
- Adjust the power management radiomodulya Bluetooth (now used for these purposes, other modules, and other common * County)
- Adjustment of the entire context of the procedure (amendment of all spelling errors and grammar errors)
- Adjusted the voice synthesizer (delete unnecessary notification)
- New projects would like to thank the author (function “tools” the author of “Thank the author)
- Adjustment of the launch and complete the process (to remove all unnecessary)
- Fixed minor errors inversion 2.0 and installation of bug fixes from the 2.1version of the Symbian 7 on 8 days;- Will be the first “tool”
- Automatically save / load settings;- Functional real-time voice changing application parameters synthesizer (the settings take effect immediately, rather than at the next boot)
- Update the list of tests
- Fixed logic error to observe and optimize the code. This all …
On the scheme:
The main purpose ofterror is a smart plan for all mobile phones (smart phones) and Bluetooth in sight “is available to all, to receive endless requests for documents. The plan continued to issue a request to receive documents, so that cell phones (smart phones) is the number of linked onwards, and to that end (linked) does not require consent of the attacks on Bluetooth devices. The plan provides an opportunity to view the relevant address,Bluetooth devices, an open port to connect the Bluetooth device into service. The can also chat, correspondence with otherBluetooth devices and exchange files. In addition to the standard list of the functions of a public utility to strengthen the program.
Interface:
In the main menu screen is a welcome plan, her name and the currentversion of the code listed in parentheses after the title. The left soft button is used to call a list of the main functions ofthe program. The right soft button is used to save configuration procedures, followed by the completion of the correct plan. Find the necessary information, more opportunities and the basic functions of the process, press the left soft button, and then * category you are interested in the functions and press Select.
Main functions
Scaner Bluetooth Scaner
When you * this feature,the program will search all available mobile phone (smart phones) and Bluetooth can be seen, including model “applicable to all the scope of radiomodulya Bluetooth (usually 10ti m), and the implementation of an attempt to get Bluetooth device address, this is the contrast the Bluetooth device name (nicknameBluetooth devices), programming, use the System Management Interface radiomodulem Bluetooth, can not be changed. After that,the program to scan and display a list of your phone service can be used to determine scanning
Bluetooth devices.
This feature is Bluetooth attack programs designed to document the attack
Bluetooth device using Bluetooth technology to issue common * s (request) to accept a particular file. When you * this feature,the program will launch the File Manager, and invite you to the documents * Bluetooth device attacks.
The program then displayed on the screen of your mobile phone information * Customs document for the attack and with the help ofthe program can either search forBluetooth devices, and achieve positive results and maintain the unique Bluetooth device address, or use a database of previously saved address. Once you choose your favorite device is the Bluetooth technology,the program will scan open ports and connectors comply with the attempt to access the Bluetooth device address. If as a result of the success of the scheme will be able to get it, you will be prompted to save the address. With a positive response,the program will ask your name,Bluetooth devices, voice synthesizers and then will notify the appropriate sound signals. After that, you need to open a database a list of related equipment and * Bluetooth.Then,the program will read the database and displays information on the screen of the address, the Bluetooth device and port connections. At this stage, you will be able to either when you press the right soft button, * another Bluetooth device, or throughthe program return to the main menu, or attackBluetooth devices.
DOWNLOAD




Top Blogs

IF YOU LIKE SHARK MOBILE SERVICE THEN BE COME WITH US AS A FOLLOWERS.
(JUST CLICK & SIGN IN : Follow this blog )

No comments: