Windows 7 (formerly codenamed Blackcomb and Vienna) is the next release of Microsoft Windows, an operating system produced by Microsoft for use on personal computers, including home and business desktops, laptops, Tablet PCs, netbooks and media center PCs.Microsoft stated in 2007 they were planning Windows 7 development for a three-year time frame starting after the release of its predecessor, Windows Vista. Microsoft has stated that the final release date would be determined by product quality WINDOWS 7 has not been officialy released but still beeta versions of the same is leaked through torrents…the WINDOWS 7 beta version needs activation and unless it is activated you cant even acess all the hidden themes ment for the use of registered users.And at last here is a working PATCH by ORBIT for the MICROSOFT WINDOWS 7
Windows 7 (formerly codenamed Blackcomb and Vienna) is the next release of Microsoft Windows, an operating system produced by Microsoft for use on personal computers, including home and business desktops, laptops, Tablet PCs, netbooks and media center PCs.Microsoft stated in 2007 they were planning Windows 7 development for a three-year time frame starting after the release of its predecessor, Windows Vista. Microsoft has stated that the final release date would be determined by product quality WINDOWS 7 has not been officialy released but still beeta versions of the same is leaked through torrents…the WINDOWS 7 beta version needs activation and unless it is activated you cant even acess all the hidden themes ment for the use of registered users.And at last here is a working PATCH by ORBIT for the MICROSOFT WINDOWS 7
- If your scrapbook is locked (viewable by friends only), you MUST add Orkutfeeds Bot as your friend on Orkut. Add Orkutfeeds bot.
- It might take up to 4-6 hours to get new scrap notification SMS on mobile. This fully depends on Google server load.
Nokia has a feature called SMS e-mail
This feature is used to send e-mail by SMS. You network operator will have a SMS e-mail server.
You are supposed to send a SMS to the SMS mail server with the To address, subject and e-mail body as a partof the SMS text body by following the conventions provideded by your Network operator.
You SMS server will read the To address, Subject and the Body of e-mail from the SMS message and forwards the mail to the corresponding e-mail address.
If im confusing you, better take a look at this example
Compose a SMS with the following text
“to:xyz@gmail.com sub:hello body: hi test msg” excluding the double quotes
send the SMS to 9915 which is the SMS server for Airtel network, India.
Airtel will forward the SMS to the corresponding mail address xyz@gmail.com
Some Nokia phones have a seperate feature for this e-mail. So we can use this feature to send Fake messages
Fake Message steps:
step 1:
Compose a SMS msg with the text you want to send
Step 2:
Go to sending Options-> Send to E-mail
Step 3:
in the text box that appears key in an e-mail address which has to be a fake from address in your message.
Step 4:
Subject text box appears. Leave it blank or type in something you want
Step 5:
E-mai Server text box
This is the place where spoofing happens.
Instead of typing your e-mail server number 9915
Type in the mobile number of your friend/enemy you want to spoof
Then send the message
yipee !!!! You are done !!!! You ve sent a fake SMS message
Your friend/enemy will receive the message.
But the Sender number will be replaced with the e-mail address you gave.
Your number will not be displayed in the sender part.
I tried this trick in Nokia 6060 and Nokia 6610.
In other phones also the steps must be the same but the menu layout might change.
Youtube is known for its videos but it does not allows to download videos.But here are the steps to download any video of youtube
1. YouTube Downloader which not only allows me to save those youtube videos on my hard disk but also converts it to any other file format I want. That’s cool.
To DownLoad This The Link is:Click here
2. Keepvid.com was an alternate for the app mentioned above..
just visit www.keepvid.com,
paste in the link from the adress bar,
click download.
next step is to chose the quality of the download as shown below.
And The Third Thing Is :123tools.org
It is also to same about keepvid but its is a better quality .Try this also
At a point of time, the Windows Vista logon screen may get quite annoying. To add more to the annoyance, Windows Vista does not allow the user to change the default logon screen. You can download a third party software called “Logon Studio Vista” from this link which lets you customize the default logon screen as and when required.
- Click “Create” to browse for a new logon screen picture
- In the resulting window, enter an appropriate name for the picture and click the “Browse” button to
locate it. - Once done, simply click “Load” to view it in the right pane.
- Double-click the image to set it as your logon screen
- Once done, click “Save”.
- Now in the main window, simply select the picture and click “Apply”.
If you are looking to Know whether your friend on Yahoo Messenger is actually Offline or is Invisible, you came to the right place.It’s not nice to spy on someone, especially on your friends. We can detect the invisible users on yahoo messenger online. To do that you just need their yahoo id . You have to enter their id in the below listed sites and they will produce your required information.
Here are 4 best sites to detect invisible users :
1. Invisible- Scanner :
Searches for the the people who are invisible based on the Yahoo ID you inputted and exposes their online status.
2. Detect-Invisible :
Lets you detect the buddies from your yahoo messenger list that stay Invisible on Yahoo Messenger. There is also an option to download avatar of your friend.
3. YDetector :
Another online service to detect invisible users. It has a good interface which resembles Yahoo and its bugs are all fixed too.
4. Invisible.ir :
Anew one that works really well. You can also do some other things like check multiple Yahoo users at once and detect a users mainYahoo ID.
Pinnacle Studio 14 HD Ultimate
&
Bonus Content DVDs- 2009
Take advantage of powerful features for a professional editor, easily performs operations that are under your control.
Tell his story through selective high-definition video set, stunning effects, smooth transitions and animations, sound Dolby DIGITAL ® 5.1 and technology company Abida ® (used in most of the most popular films). Then prepare to make their feelings to infect the entire world, translating them to the widescreen format, which is required for viewing.Download From HOTFILE
Download From ULD
After much rumors regarding the Return of Max Payne, Rockstar has confirmed that they are working on the third installment of the game called Max Payne 3.
The game will feature a much older Max Payne and it will feature a new chapter in his life. The Splash Screen shown above shows a very different Max Payne from the one we got to see in the previous versions. The game will be full of ¡°Corruption, turmoil and Intense Violence¡± and Max will be ¡± a few years older, more world-weary and cynical than ever¡±. The game will show the downward spiral of the life of Max Payne after Max Payne 2. The game will feature a new city as Max has moved out of New York and is being chased by unknown assassins.
Minimum System Requirements
Processor: Intel Core 2 Duo 1.8Ghz or equivalent AMD Athlon X2 64 2.4Ghz
Memory/RAM: 1GB for XP and 1.5GB for Vista
Video Card: 256MB NVIDIA 7900 or 256MB ATI X1900
Hard Disk Space: 16GB free
Operating System: Windows XP SP3 or Windows Vista SP1
Recommended System Requirements
Processor: Intel Core 2 Quad 2.4GHz or equivalent AMD Phenom X3 2.1GHz
Memory/RAM: 2.5 GB for XP or Vista
Video Card: 512MB NVIDIA 8600 or 512MB ATI 3870
Hard Disk Space: 18GB free
Operating System: Windows XP SP3 or Windows Vista SP1
115 MB | Rapidshare - Megaupload - Hotfile
Download Norton Internet Security 2010
1. Use Keyboard Shortcuts
Using the mouse, you can drag-‘n-dock windows to either side of the screen, or drag it to the top to maximize it. These keyboard shortcuts are even faster:- Win+Left Arrow and Win+Right Arrow dock the window to the left and right side of the screen
- Win+Up Arrow and Win+Down Arrow maximize and restore/minimize
- Win+M minimizes everything
- Alt+Up, Alt+Left Arrow, Alt+Right Arrow navigate to parent folder, or browse Back and Forward through folders in Explorer
- Win+Home minimizes/restores all open windows except the active window
- Alt+Win+# accesses the Jump List of program number ‘#’ on the taskbar
2.Rearrange System Tray Icons
3. Access Jump Lists with the Left Mouse Button
Jump Lists usually show up when you right-click on a taskbar icon. However, they can also be accessed by holding the left mouse button and dragging upwards. If you’re using a laptop touchpad or a touch screen, this is convenient because you do not have to click any button to access a context menu.4. Add Any Folder to Favorites
5. Pin Frequently Used Folders to the Taskbar
Right-click, drag, and pin your favorite folders to Windows Explorer on the taskbar. They will now show up in the Jump List when you right click on Explorer giving you quick access to your favorite folders.6. Pin Control Panel to the Taskbar
7. Create Keyboard Shortcuts for Programs
You can create keyboard shortcuts for any program in Windows 7. Right-click the program icon and select Properties. Select the Shortcut tab, click in Shortcut key, to set the keyboard shortcut for that program.8. Open Command Prompt in Any Folder
Like the command prompt? Miss the ‘Open Command Window Here’ Windows XP power toy? Press ‘Shift’ when right-clicking on a folder to get that option in the context menu. This also works on the desktop. No power toy required!9. View Expanded ‘Send To’ Menu
Press Shift when right-clicking on a folder to get an expanded Send To menu.10. Adjust Screen Text with Clear Type
Use Clear Type Tuner for the best look on your LCD monitor or laptop screen. Run ‘cttune.exe’ from the Start Menu search box, or go to the Control Panel Display applet, and select Adjust ClearType Text from the left.11. Get Exact Colors On Your Screen
If you are an artist or you work with colors, use the Calibrate Color option in the Control Panel Display applet or run dccw.exe from the Start Menu search box. You can adjust gamma, brightness, contrast, and color balance, ensuring that colors are displayed correctly on your screen.12. Customize the Power Button
If you restart your computer more often than you shut it down, change the default Shutdown power button to Restart. Right-click on Start, select Properties, and choose the Power button action that you use the most.13. Customize Number of Items in Jump Lists & Start Menu
Right-click Start, select Properties, click Customize and choose the number of recent programs to be shown in the Start Menu and the number of items displayed in Jump Lists from the Start Menu Size section below.14. Search Internet from the Start Menu
15. Add Videos to Start Menu
Windows 7 does not place a link to your videos on the Start Menu by default. To add a link to your videos on the Start Menu, right-click Start, select Properties, click on Customize. In the Videos section at the bottom, choose Display as a link.Did you like these tips? Tell us or share your tricks with us in the comments!
As you know Facebook has become very famous in last 1 year. Orkut which was considered to be the best Social networking website has been sidetracked by emerging Social Networking Websites like Facebook and Twitter. Considering the popularity of Facebook we have collected the Most Essential Hacks of Facebook and presented them to you.
1.How to View the Album of Any User Even if it is Private
You can use this script to view a photo in the original album, even if you’re not friends with the person.
Get it Here
2. How to Remove Annoying Facebook Advertisement
Get rid of some of the Facebook advertising and sponsored by sections with this tool.
Get it Here
3. How to see Real Profiles from Public Pages
This script redirects to real profiles from the Facebook people pages (public profiles). There is a risk of an infinite redirect loop if not logged in, so be logged in.
Get it Here
4. How to Undo Facebook Changes
If you hate some or all of the new Facebook changes, undo them with these scripts and use what you liked previously.
Get it Here
5. How to View All the Photos from a Person
You can search for pictures of a Facebook member who has tight privacy settings and view all his/ her pictures without his/ her consent.
Get it Here
6. How to Find More Friends at Facebook
Suppose some of your friends have newly joined Facebook and you didn’t even knew. Use this script and it will help you go through your friends’ friends list and find them out.
Get it Here
7. How to Share Files from Facebook
With this box widget, you can share files from your computer through Facebook. Isn’t it great?
Get it Here
8. How to Get a Job from FacebookLooking for a job?
This application gives Facebook users unique access to job information, networking opportunities and other career resources.
Get it Here
9. How to Tighten up the Privacy and still Maintain Communication Convenience
The Private Wall combines the best of both worlds of Facebook: online convenience and communication with more serious privacy settings.
Get it Here
10 How to Cheat Facebook Texas Hold em Poker
This is one of my Favorite hacks and that is why I have saved it for the last one. Using this software you can see the cards of any player and the advanced version of this software allows you to even add credits to your account for free.
Get it Here
•Click Start, click Run, type GPEDIT.MSC to open Group Policy in the Microsoft Management Console.
•Double-click Computer Configuration, double-click Administrative templates, double-click System, and then click Turn off autoplay.
•The instructions on your screen describe how to configure this setting. Click Properties to display the setting dialog.
•Click Enabled, and choose CD-ROM drives or Any drives, then click OK,
This setting does not prevent Autoplay for music CDs and any drives that connected to the computer.
What Is A RIP?
A rip is basically a game which has been cut down in size (Things have been deleted, audio etc.)
These are what you will need:
1. An installed game (I choose GTA San Andreas)
2. A Crack for your game (dOWNLOAD cRACK hERE)
3.An UHARC GUI (Download Here)
Go into your game installtion folder and find stuff that will only make your game higher in size. In this picture, i am deleting some audio files (Some over 100MB) that we do not need:
Ok, step 2. Open op your UHARC GUI and select your files that you need (Game files and crack) and make a new archive and save it as “game.uha” in the folder that your gonna upload.
Step 3. Open up notepad and add the following:
@echo off
clsUHARC.exe x -o+ -vm+ -y+ game.uha
clsdel game.uha
echo Done!
pause
echo Ripped By Hackersorigin.com echo Visit www.hackersorigin.com for more
echo Thanks for Visiting the site….
pause
Save it as “install.bat” in the same folder as “game.uha”
Your now done! upload it and ask users to run install.bat!
javascrip
copy and paste d Above link On Address Bar.. n replace “rekcaH yrgnuH” by ur own Name.. n send it to ur friends
Or u can Manually create Any kind of Alert Box by
javascript:alert(” TYPE ANY MESSAGE HERE TO APPEAR IN ALERT BOX
Follow the steps:
1) Create a fake account or simply login with ur friends Id.. and add yourself as a friend there.
2) Visit the FRIENDS page by logging into your just created fake account or the Friends account.
3) Point your cursor on the fan icon () beside your real profile. Note your status bar. It should be showing something like javascript:setKarma(’FRUS*******/US*******’). Note the code FRUS******* and US******* somewhere. Now, click on the star so as to make your fake account a fan of your real account.
4) Copy the following code to your address bar (The location where you type http://www.orkut.com ). Replace FRUS******* and US******* in the following script with the one you noted in the above step.
javascript:function cmd(){window.location=”/setkarma?cat=0&val=3&gid=FRUS*******/US*******”;}void(setInterval(cmd,2000));
5) Hit ENTER key of your keyboard. The page will keep on reloading and your fans will keep on increasing with an approximate speed of 6 fans per second untl you close the window.
[PLEASE POST IN YOUR COMMENTS SO THAT OTHER USERS CAN JUDGE..]
Here one more more hotter stuff..Lemme introduce a new generation of mobile browsing with the brand new MOBILE OFFICE moded browser by Br@ve for free browsing in airtel live settings for all india airtel usersBut this one was released a few months ago and airtel has cracked it by just re-naming the indiatimes address…. so we have to mannualy fix it… choose the handler menu..the text that appears when u first open the browser.. change all the ‘wap’ in the given address..to ‘wap4′..now you are done..
also i cant gurantee its working in s60v2/ java handsets since i tried this stuff and is 100% working in my s60v3 cellphone…
* download the browser mod by Br@ve from the link below [thanks to Br@ve]
*extract it
* install it in your handset
* make sure that you have balance below 1/-
* open the installed browser
* change the handler..the address that i have discussed above..
* Chose MO settings…
* wait for authetication
* start browsing..
DOWNLOAD
..
This is the new section and each download will be removed after 1 week,you can download more softwares from Download menu
Download AVG Internet Security 9.0
Have you heard the story of Aladdin and his genie? Well, If you ever wished free calls, your prayers have been answered by this genie called FREE-411. You can use 411 service to make free international calls for 5 minutes per call. All you have to do is:
1) Dial 1-800-373-3411 (1-800-FREE-411),
2) When the automated operator greets you (probably after an ad) you need to say “Free Call”. You will, then, be connected to the server.
3) Enter (key in) your destination number in “country code + destination number” format. For example 9122********* could connect you to someone in Mumbai.
4) Continue talking for 5 minutes and then this free call will get disconnected. You know what you want to do after that, yes follow steps 1-4 again.
This number 1-800-FREE-411, when dialed from a landline in USA is a free number. For our readers outside USA there is no reason to get disappointed. You can use skype to call 1-800-373-3411 for free and you can get free international calls anywhere in the world. Yes!! That is free ISD as well as STD calls.
Google released the code behind Chrome OS. Dubbed Chromium OS, Google is essentially allowing you to test their operating system before the 2010 release date. Apparently, it’s been a little difficult to get this OS running straight from google’s code so I suggest downloading a pre-constructed image from gdgt(you must register and login inorder to get the download link of the google chrome os image)
DOWNLOAD CHROME OS IMAGE
Helpful tips, if you download it:
1.) To use the vmdk file, open VMware and create a new virtual machine. One of the options will be to use an “existing virtual disk.” (In VMware Fusion, this is the last option below, “use operating system disk” and “use OS disc image file.”)
2.) Make sure your VM is set to use bridged networking, rather than NAT.
2.) The username and password to login to Chrome OS / Chromium OS is your google account!
Alternatively, if you don’t have VMware, some users have had luck getting this image to run using VirtualBox, which is a free cross-platform (Windows / Mac / Linux) virtual machine created by Sun Microsystem. You can download VirtualBox here
Anyway, get downloading and try out Chrome OS! And definitely share your impressions.
also check out the video on installing and running Chrome os
PART A: CONFIGURING SMTP SERVER
Once you have installed the QK SMTP server on your comp you must perform the following configuration.
1. Click on “Settings” button on the main screen,the Settings window pops up
2. On Settings window click on “Basic Parameter” tab
3. Set binding IP to “127.0.0.1″
4. Set port to “25″
PART B: SENDING FAKE EMAIL (EMAIL FORGING)
1. Click on SMTP server icon on your desktop to start your SMTP server to run(The icon is shown on the notification area of the taskbar if it is running). If it is already running then this step can be ignored
2. Goto command prompt(Start-Accessories-Command prompt)
3. Type exactly as follows
C:>telnet 127.0.0.1 25
Here 127.0.0.1 is the default IP of every computer.25 is the port number. SO you are connecting to the SMTP server running on your own computer.This step is very importand to send fake email.
NOTE: The IP 127.0.0.1 should not be substituted by any other IP.
Heres the snapshot of what you see after step 3. Click on it to enlarge
4. After typing the telnet command in the command prompt you get entry to the server which displays the following message. The response of a OK SMTP server is given below. Message within Green color is only explanation.
220 Welcome to QK SMTP Server 3
helo hacker (Type helo & any name followed by space)
250 Hello hacker (Server Welcomes You)
mail from:billg@microsoft.com (email ID can be anything of your choice. This is the ID from which fake email appears to have come from)
250 billg@microsoft.com Address Okay (Server gives a positive response)
rcpt to:admin@gmail.com (Type any valid recipient email address)
250 admin@gmail.com Address Okay (Server gives a positive response)
data (type this command to start input data)
354 Please start mail input
From:Gates <billg@microsoft.com>
To:admin@gmail.com
Date:Sat Jan 5,2008 9:45 PM
Subject:Test to send fake email
You can create as many headers followed by the “:” symbol.
NOTE:HEADERS SHOULD NOT CONTAIN A LINE GAP. IF SO IT IS CONSIDERED AS BODY OF THE EMAIL. Press enter twice so that there is a line gap between the header & body data
250 Mail queued for delivery (Sever indicates that the email is ready for sending)
quit (Type this command to quit from server)
221 Closing connection. Good bye.
Connection to host lost
(You will get the above 2 lines of message after typing “quit” command)
(Your fake email is sent to the recipient)
NOTE: THE ABOVE METHOD HAS A VERY LOW SUCCESS RATE.
Some times it becomes necessary to block a website on our Computers for one or other reason.You can easily and effectivily block access to a website by adding it to your Windows HOSTS file.Once the website is blocked in the HOSTS file,it will not appear in any of the browsers.That is,the website becomes completely unavailable.
1.Go to your HOSTS file which is located at:
C:\WINDOWS\SYSTEM32\DRIVERS\ETC for Vista and XP
C:\WINNT\SYSTEM32\DRIVERS\ETC for Win 2000
C:\WINDOWS for Windows 98 and ME
2. Open HOSTS with Notepad.
The default Windows HOSTS looks like this:
______________________
# Copyright © 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a “#” symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
#
127.0.0.1 localhost
_____________________________
3. Directly under the line that says 127.0.0.1 Localhost, you will want to type:
127.0.0.1 name of the URL you want to block
For example to block the website MySpace.com, simply type:
127.0.0.1 myspace.com
127.0.0.1 www.myspace.com
Other parts of MySpace could be blocked in a similar way:
127.0.0.1 search.myspace.com
127.0.0.1 profile.myspace.com
etc etc etc…
It is necessary to add a website with and without the “www.”. You can add any number of websites to this list.
4. Close Notepad and answer “Yes” when prompted.
5. After blocking the website, test it in any of the browser.If every thing is done as said above,the website must not appear in any of the web browsers. You should see a Cannot find server or DNS Error saying: “The page cannot be displayed”.
Some people suggest that your add a website to the Internet Explorer ‘Privacy’ settings. This does not block a site. It only stops that site from using cookies.
Here’s how you change the title text that appears at the top of the Messenger window. By default, this is “Yahoo! Messenger”, followed by your status. Simply edit the ymsgr.ini file, which you will find in the same folder as the Messenger program, in your Program Files folder. Locate the file and open it in Notepad. Then, at the end, add the following:
[APP TITLE]
caption=YOUR TEXT
Here, “YOUR TEXT” is whatever you want in the title bar. Save the file and close Messenger. When you restart it you will see your text in the title bar.
One of most the frequently asked question is how to track an email back to the sender.That is how to determine the sender of the email? The most obvious answer is by looking at the “From:” line! But this way of tracking does not work all the time since most of the spammers forge the email address or most of the spam that we get has a forged email address.This is also known as a spoofed email.Is it possible to send email from other’s address?Yes it is possible to send email from anyone’s name.Why not, you can send an email even from Bill Gate’s Email ID.I
OK now let’s come back to the topic of email tracking.So how do you determine where a message actually came from?Inorder to track an email we have to understand how email messages are put together in order to backtrack an email message. SMTP is a text based protocol for transferring messages across the internet. A series of headers are placed in front of the data portion of the message. By examining the headers you can usually backtrack an email to the source network, sometimes the source host.
If you are using Outlook or Outlook Express you can view the headers by right clicking on the message and selecting properties or options.
Below are listed the headers of an actual spam message.I have double spaced the headers to make them more readable.
Return-Path: <s359dyxtt@yahoo.com>
X-Original-To: sriki@example.com
Delivered-To: sriki@example.com
Received: from 12-218-172-108.client.mchsi.com (12-218-172-108.client.mchsi.com [12.218.172.108])by mailhost.example.com (Postfix) with SMTP id 1F9B8511C7for <sriki@example.com>; Sun, 16 Nov 2003 09:50:37 -0800 (PST)
Received: from (HELO 0udjou) [193.12.169.0] by 12-218-172-108.client.mchsi.com with ESMTP id <536806-74276>; Sun, 16 Nov 2003 19:42:31 +0200
Message-ID: <n5-l067n7z$46-z$-n@eo2.32574>
From: “Maricela Paulson” <s359dyxtt@yahoo.com>
Reply-To: “Maricela Paulson” <s359dyxtt@yahoo.com>
To: sriki@example.com
Subject: You Have won $10000 in US Lottery Scheme
Date: Sun, 16 Nov 2003 19:42:31 +0200
X-Mailer: Internet Mail Service (5.5.2650.21)
X-Priority: 3
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary=”MIMEStream=_0+211404_90873633350646_4032088448″
According to the From header this message is from Maricela Paulson at s359dyxxt@yahoo.com. I could just fire off a message to abuse@yahoo.com, but that would be waste of time.
This message didn’t come from yahoo’s email service.
The header most likely to be useful in tracking the actual source of an email message is the Received header. According to the top-most Received header this message was received from the host 12-218-172-108.client.mchsi.com with the ip address of 21.218.172.108 by my server mailhost.example.com. An important item to consider in tracking is at what point in the chain does the email system become untrusted? I consider anything beyond my own email server to be an unreliable source of information. Because this header was generated by my email server it is reasonable for me to accept it at face value.
The next Received header (which is chronologically the first) shows the remote email server accepting the message from the host 0udjou with the ip 193.12.169.0. Those of you who know anything about IP will realize that that is not a valid host IP address. In addition, any hostname that ends in client.mchsi.com is unlikely to be an authorized email server. This has every sign of being a cracked client system.
Here’s is where we start digging. By default Windows is somewhat lacking in network diagnostic tools; however, you can use the tools at to do your own checking.
sriki@nqh9k:[/home/sriki] $whois 12.218.172.108 AT&T WorldNet Services ATT (NET-12-0-0-0-1)12.0.0.0 – 12.255.255.255Mediacom Communications Corp MEDIACOMCC-12-218-168-0-FLANDREAU-MN (NET-12-218-168-0-1)12.218.168.0 – 12.218.175.255
# ARIN WHOIS database, last updated 2003-12-31 19:15# Enter ? for additional hints on searching ARIN’s WHOIS database.
I can also verify the hostname of the remote server by using nslookup, although in this particular instance, my email server has already provided both the IP address and the hostname.
sriki@nqh9k:[/home/sriki] $nslookup 12.218.172.108
Server: localhostAddress: 127.0.0.1
Name: 12-218-172-108.client.mchsi.comAddress: 12.218.172.108
Ok, whois shows that Mediacom Communications owns that netblock and nslookup confirms the address to hostname mapping of the remote server,12-218-172-108.client.mchsi.com. If I preface a www in front of the domain name portion and plug that into my web browser, http://www.mchsi.com/, I get Mediacom’s web site.
There are few things more embarrassing to me than firing off an angry message to someone who is supposedly responsible for a problem, and being wrong. By double checking who owns the remote host’s IP address using two different tools (whois and nslookup) I minimize the chance of making myself look like an idiot.
A quick glance at the web site and it appears they are an ISP. Now if I copy the entire message including the headers into a new email message and send it to abuse@mchsi.com with a short message explaining the situation, they may do something about it.
But what about Maricela Paulson? There really is no way to determine who sent a message, the best you can hope for is to find out what host sent it. Even in the case of a PGP signed messages there is no guarantee that one particular person actually pressed the send button. Obviously determining who the actual sender of an email message is much more involved than reading the From header. Hopefully this example may be of some use to other forum regulars.
Here in this post I will try to give you every possible information to hide the IP address.If you seriously want to hide your IP address then this post is for you!
One of the most frequently asked questions by the internet users is How To Hide IP Address ?. Many times it becomes necessary to hide the real IP address for the sake of privacy.For this, I have tried many softwares, proxy servers and many such tools that guaranteed to hide my IP address.But still none of them worked for me. I think most of you have the same experience.Are you fed up with these dummy softwares that fails to hide the real IP address? Then is there any working way to hide the IP address?
YES, you can definitely hide your IP .
Now I’ll come to the heart of the post, which contains the answer to your curious question How to Hide the IP address ? The only solution to hide your IP address is by using a Proxy Server.But Wait! The story doesn’t end here.Even though proxy servers are the only way to hide your IP address, there are several ways of connecting your PC to the proxy server.Before setting up the connection with the proxy servers you must know some information about different types of proxy servers and their uses.
1. Transparent Proxy Server
This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used to speedup the web browsing since thay have a very good ability to cache websites.But they do not conceal the IP of it’s users. It is widely known as transparent proxy because it will expose your real IP address to the web.This type of proxy server does not hide your IP address.
2. Anonymous Proxy Server
This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users. This type of proxy server will hide your IP address.
3. Distorting Proxy Server
This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers. This type of proxy server will hide your IP address.
4. High Anonymity Proxy Server ( Elite Proxy)
This type of proxy server does not identify itself as a proxy server and does not make available the original IP address. This type of proxy server will hide your IP address.So this is the best way to mask your IP.
Which Proxy Server is the best to Hide My IP ?
I know, you can answer this question better than me.Obviously High Anonymity Proxy or Elite Proxy is the best to hide your IP.But it’s not easy to get a list of working elite proxies.If you search the Google, you will definitely get tons of proxy list.You’ll get a list of proxies in the following format
IP:Port Number
Eg: 221.90.45.67:8080 (221.90.45.67 is the IP of the proxy server and 8080 is the port number)
But most of them don’t work.Here are some of the problems/risks associated with using free proxies that are available on the internet.
- Most of them do not work since the proxy servers frequently changes it’s IP/Port number.
- Even if you find a working proxy server it may be too slow.
- Your privacy is not guaranteed since all your traffic is routed through the proxy server.
- The administrators of the proxy servers may steal your valuable information such as passwords,SSN (Social security number),Credit Card details etc.
Now I will give a list of softwares that will really hide your IP address.I have tried many such softwares and have found only few of them working perfectly.Here is a list of working IP Hiding softwares that you can try.I have listed them in the order of their popularity
1. Hide The IP
Let’s you choose the country,Type and speed of the proxy.Not so popular but personally I recommend this to the users.
2. Hide My IP
3. Hide IP NG
You can get more informations about these products on their respective homepages.
How to ensure that the IP is hidden ?
Before you hide your IP you can check your real IP by visiting the following site.
WhatIsMyIPAddress.Com
Once you get your real IP, switch on your IP hiding software.Now once again visit the above site and check your IP address.If you see a new IP then this means that your software is doing the right job.Also the above site(Whatismyipaddress.com) is capable of detecting many proxies.If you see the words such as “Suspected proxy server or network sharing device” or similar words then it means that the proxy you are using is not an Elite Proxy.
One Final Word before you leave! Even though Elite proxies are almost undetectable this doesn’t mean that you can escape from online crimes by hiding your IP.There are many proxy detecting services available which detect almost any proxy.So if you involve in any cyber crimes then you will definitely be behind the bars.Using proxy will not help you in this case.
One More thing, It is unsafe to use proxy during e-commerce transactions such as Online banking,Online Credit Card payment etc.So please avoid proxies during these circumstances.