31 December, 2010

How to Trace Any Number in The WORLD [International Tracing]

0 comments


With the rapid growth of mobile phone usage in recent years, we have often observed that the mobile phone has become a part of many illegal and criminal activities. So in most cases, tracing the mobile number becomes a vital part of the investigation process. Also sometimes we just want to trace a mobile number for reasons like annoying prank calls, blackmails, unknown number in a missed call list or similar.

Even though it is not possible to trace the number back to the caller, it is possible to trace it to the location of the caller and also find the network operator. Just have a look at this page on tracing Indian mobile numbers from Wikipedia. Using the information provided on this page, it is possible to certainly trace any mobile number from India and find out the location (state/city) and network operator (mobile operator) of the caller. All you need for this is only the first 4-digit of the mobile number. In this Wiki page you will find all the mobile number series listed in a nice tabular column where they are categorized based on mobile operator and the zone (state/city). This Wiki page is updated regularly so as to provide up-to-date information on newly added mobile number series and operators. I have used this page many a time and have never been disappointed.



If you would like to use a simpler interface where in you can just enter the target mobile number and trace the desired details, you can try this link from Numbering Plans. Using this link, you can trace any number in the world.

By using the information in this article, you can only know “where” the call is from and not “who” the caller is. Only the mobile operator is able to tell you ”who” the caller is. So if you’re in an emergency and need to find out the actual person behind the call, I would recommend that you file a complaint and take the help of police. I hope this information has helped you!
Read More ->>

What are Private and Public IP Addresses

0 comments


Internet Protocol (IP) addresses are usually of two types: Public and Private. If you have ever wondered to know what is the difference between a public and a private IP address, then you are at the right place. In this post I will try to explain the difference between a public and a private IP addres in layman’s terms so that it becomes simple and easy to understand.



What are Public IP Addresses?

A public IP address is assigned to every computer that connects to the Internet where each IP is unique. Hence there cannot exist two computers with the same public IP address all over the Internet. This addressing scheme makes it possible for the computers to “find each other” online and exchange information. User has no control over the IP address (public) that is assigned to the computer. The public IP address is assigned to the computer by the Internet Service Provider as soon as the computer is connected to the Internet gateway.

A public IP address can be either static or dynamic. A static public IP address does not change and is used primarily for hosting webpages or services on the Internet. On the other hand a dynamic public IP address is chosen from a pool of available addresses and changes each time one connects to the Internet. Most Internet users will only have a dynamic IP assigned to their computer which goes off when the computer is disconnected from the Internet. Thus when it is re-connected it gets a new IP.

You can check your public IP address by visiting www.whatismyip.com

What are Private IP Addresses?

An IP address is considered private if the IP number falls within one of the IP address ranges reserved for private networks such as a Local Area Network (LAN). The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP address space for private networks (local networks):





10.0.0.0 – 10.255.255.255 (Total Addresses: 16,777,216)

172.16.0.0 – 172.31.255.255 (Total Addresses: 1,048,576)

192.168.0.0 – 192.168.255.255 (Total Addresses: 65,536)




Private IP addresses are used for numbering the computers in a private network including home, school and business LANs in airports and hotels which makes it possible for the computers in the network to communicate with each other. Say for example, if a network X consists of 10 computers each of them can be given an IP starting from 192.168.1.1 to 192.168.1.10. Unlike the public IP, the administrator of the private network is free to assign an IP address of his own choice (provided the IP number falls in the private IP address range as mentioned above).

Devices with private IP addresses cannot connect directly to the Internet. Likewise, computers outside the local network cannot connect directly to a device with a private IP. It is possible to interconnect two private networks with the help of a router or a similar device that supports Network Address Translation.

If the private network is connected to the Internet (through an Internet connection via ISP) then each computer will have a private IP as well as a public IP. Private IP is used for communication within the network where as the public IP is used for communication over the Internet. Most Internet users with a DSL/ADSL connection will have both a private as well as a public IP.

You can know your private IP by typing ipconfig command in the command prompt. The number that you see against “IPV4 Address:” is your private IP which in most cases will be 192.168.1.1 or 192.168.1.2. Unlike the public IP, private IP addresses are always static in nature.

Unlike what most people assume, a private IP is neither the one which is impossible to trace (just like the private telephone number) nor the one reserved for stealth Internet usage. In reality there is no public IP address that is impossible to trace since the protocol itself is designed for transperancy.
Read More ->>

How to Detect Anonymous IP Addresses

0 comments


As the fraudsters are now becoming more sophisticated in bypassing the Geo-location controls by using proxies (Anonymous IPs) to spoof their IP address, it has become very much necessary to come up with a means for detecting the proxies so that the authenticity of the users can be verified. Using a proxy (web proxy) is the simplest and easiest way to conceal the IP address of an Internet user and maintain the online privacy. However proxies are more widely used by online fraudsters to engage in cyber crimes since it is the easiest way to hide their actual Geo-location such as city/country through a spoofed IP address. Following are some of the examples where fraudsters use the proxies to hide their actual IP.



1. Credit Card Frauds

For example, say a Nigerian fraudster tries to purchase goods online with a stolen credit card for which the billing address is associated with New York. Most credit card merchants use Geo-location to block orders from countries like Nigeria and other high risk countries. So in order to bypass this restriction the credit card fraudster uses a proxy to spoof his IP address so that it appears to have come from New York. The IP address location appears to be legitimate since it is in the same city as the billing address. A proxy check would be needed to flag this order.

2. Bypass Website Country Restrictions

Some website services are restricted to users form only a selected list of countries. For example, a paid survey may be restricted only to countries like United States and Canada. So a user from say China may use a proxy so as to make his IP appear to have come from U.S. so that he can earn from participating in the paid survey.

Proxy Detection Services

So in order to stop such online frauds, Proxy Detection has become a critical component. Today most companies, credit card merchants and websites that deal with e-commerce transactions make use of Proxy Detection Services like MaxMind and FraudLabs to detect the usage of proxy or spoofed IP from users participating online.

Proxy Detection web services allow instant detection of anonymous IP addresses. Even though the use of proxy address by users is not a direct indication of fraudulent behaviour, it can often indicate the intention of the user to hide his or her real IP. In fact, some of the most used ISPs like AOL and MSN are forms of proxies and are used by both good and bad consumers.

How Proxy Detection Works?

Proxy detection services often rely on IP addresses to determine whether or not the IP is a proxy. Merchants can obtain the IP address of the users from the HTTP header on the order that comes into their website. This IP address is sent to the proxy detecting service in real time to confirm it’s authenticity.

The proxy detection services on the other hand compare this IP against a known list of flagged IPs that belong to proxy services. If the IP is not on the list then it is authenticated and the confirmation is sent back to the merchant. Otherwise it is reported to be a suspected proxy. These proxy detection services work continuously to grab a list or range of IPs that are commonly used for proxy services. With this it is possible to tell whether or not a given IP address is a proxy or spoofed IP.

How to Tell Whether a given IP is Real or a Proxy?

There are a few free sites that help you determine whether or not a given IP is a proxy. You can use free services like WhatisMyIPAddress to detect proxy IPs. Just enter the suspected IP in the field and click on “Lookup IP Address” button to check the IP address. If it is a suspected proxy then you will see the results something as follows.





So for all those who think that they can escape by using a spoofed IP, this post is the answer. I hope this information helps. Pass your comments.
Read More ->>

29 December, 2010

Enable checkboxes for selecting files in Windows Vista/7 Explorer

0 comments
You’re probably used to hit either CTRL or SHIFT to select multiple files (one by one or a consecutive bunch, respectively). However, if you accidentally misclick, your selection is lost and you have to start over.

This is would not happen if you’d be able to select files in a checkbox manner, would it?






To implement the checkboxes, simply do this..
1.) Go to folder options
2.) Go to the View tab, scroll down under the Advanced Settings area and tick the option: Use checkboxes to select items
3.) When hovering over a file or folder in Explorer, a checkbox will now appear near it, allowing you to select that item.
Read More ->>

Add any Folder to Send To Menu..Step-by-step Guide..

0 comments
To add any folder or destination there follow this step-by-step guide.. :



1]- Open any folder.In the menu go to Tools > Foder Otions > Click on ‘view’ Tab .Click on show hidden files and folder and then on apply.
2]- Now Open My Computer and browse to C:\Documents and Settings\[username]\SendTo folder

(Where C: is the drive in which windows is installed.)
3]- Inside the ‘Send To folder’ paste any shortcut to any folder or destination that u want to see in ur send to menu.

(Suppose u want to add a folder named ‘abc’ . then right click on that folder , click on copy. Then in the ‘Send To’ folder right click anywhere and click on paste shortcut.)
4]- Voila..! Its all done now. Sit back and njoy.. U have just added the folder ‘abc’ to ur send to menu.
PS: tried on XP. Pls report if it works on vista as well or not.
Read More ->>

MICROSOFT TRICKS

0 comments
MAGIC #1
An Indian discovered that nobody can create a FOLDER anywhere on the computer which can be named as “CON”. This is something pretty cool…and unbelievable… At Microsoft the whole Team, couldn’t answer why this happened!

TRY IT NOW ,IT WILL NOT CREATE ” CON ” FOLDER


[ The name “CON” in windows is reserved for console devices (Keyboard if used as input and Monitor if used as output) hence it can not be used to create any file or directory of this name.]






MAGIC #2

For those of you using Windows, do the following:
1.) Open an empty notepad file

2.) Type “Bush hid the facts” (without the quotes)

3.) Save it as whatever you want.

4.) Close it, and re-open it.
is it just a really weird bug? :-? ?




MAGIC #3

microsoft crazy facts
This is something pretty cool and neat…and unbelievable… At Microsoft the whole Team, including Bill Gates, couldn’t answer why this happened!
It was discovered by a Brazilian. Try it out yourself…
Open Microsoft Word and type
=rand (200, 99)
And then press ENTER

then see the magic………………………….
AND TRY THIS: GOTO NOTEPAD

TYPE “Q33N”. NOW CHANGE THE FONT SIZE TO 72 AND CHANGE THE FONT TO “WINGDINGS”.

NOW SEE THE MAGIC. FOR 11/9 WTC ATTACK, THE PLANES THAT CRASHED-ONE HAD THE NUMBER “Q33N”.

NOW IF YOU WILL TRY TYPING Q33N AFTER FONT CHANGING IT WONT WORK
enjoy,n add replies
Read More ->>

The Magical God Mode Folder in Windows 7

0 comments
What is GOD Mode Folder?
It’s a folder packed with shortcuts to just about every settings change and administrative function in Windows 7. Everything you’ll find in the Action Center, Backup and Restore, Autorun, Desktop Gadgets, Devices and Printers — it’s all there. All dumped in one central location for easy access. Learn how to do it:
1]- Create a New Folder anywhere in the drive your Windows is installed(You can create a new folder in My Documents or Desktop..anywhere its your wish).


2]- After creating the New Folder, right click on it and rename it to-



GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}



3]- You are done, you now have the GODMODE Folder with you. Enjoy all your powers!!


PS- It works with all versions of Windows 7, Works with Vista 32 bit as well, though I have heard that Vista 64 bit crashes on attempting this. So 64 Bitters with Vista Beware!
Read More ->>

Make an Undeleteable Folder in windows

0 comments
 It often happens that some of your folders contain very important data and you delete those folders by mistake. So why not make such folders UNDELETEABLE & avoid such mistakes..! [Works with Windows XP|Vista|Seven]






1]- Open CMD ( Type in Run option, the command ‘cmd’ or navigate to All Programs->Accessories-> Command Prompt)
 


2]- Change the directory to where you want to create the folder.Type ‘cd..’ to exit the current directory. As an example i will be creating the folder in C:, so i will use the ‘cd..’ command twice to navigate to C:
 
3]- Type md\lpt1\\ and press enter, the folder now will be in your C:




4]- If you try to delete it, it wont delete. This works on all version of windows.
 
5]- If you want to delete it just go to ‘CMD’, navigate to the directory and type

rd\lpt1\\ and press Enter.




Read More ->>

Assign a Permanent Drive Letter to USB Drive

0 comments
If you have multiple pen drives you might have noticed that every time you put in your drive it will be assigned a different drive letter. This can be very annoying, when you trying to open files of pendrive from some software as recent drive letter is changed you have to change address again. So now here is one solution for this problem assign permanent letter to your USB pendrive. Its very simple just follow given steps:









1]- Go to Start and then Run.



2]- Type Compmgmt.msc and hit Enter. Computer Management console will open up.



3]- In the menu on the left select Disk Management under the storage tab. You will now see all of your drives/partitions in the right hand side panel.



4]- Right click the USB drive you want to assign a permanent letter to and select Change Drive Letter and Paths.



5]- Click on Change.



6]- Assign any drive letter you want and click OK



7]- It will give a warning-you can ignore it since there are hardly any programs that depend on USB drive letters. But at the end of the day its your call, whether to go for it or not.



8]- The final step is to select File > Save and save the file in the default directory. Close the Console and you are done.

Read More ->>

How to Enable Right Click on Sites that Disable it!!!

0 comments
There are lots of web sites that have disabled the right click function

of the mouse button… which it’s really, really annoying!!

This is done so that you don’t steal (via right-click->save picture) their photos

or images or any other goodies.

But It’s easy to change, assuming your using IE 6 or higher:



  1. Click “Tools”->”Internet Options”

  2. Click the “Security” tab

  3. Click “Custom Level”

  4. Scroll down to the “Scripting” section

  5. Set “Active Scripting” to “disable”

  6. Click “Ok” a couple of times.

You’ll probably want to turn this back to “enable” when your done,

’cause generally the java script enhances a website.

ALTERNATIVELY:

Before you change settings try holding down the Ctrl key and right clicking.

This also works in a lot of cases..

or in firefox..

tools->options->content..

turn off java and javascript, then reload the site..
Read More ->>

How Long Has Your Windows XP/Vista/7 System Been Running?

0 comments
Have you ever been excited about knowing your complete system ..!!!!

If yes...!!! Then here is a solution for your question.....

You can check full system info like : 

OS Version

Product ID

Installation Date

System Boot Time

Processor

Hardware configurations etc etc.......





1).Just go to command prompt by opening run and typing CMD

      or press windowskey + r

      type CMD





2).Then type systeminfo





And you will come to know every info about your computer/laptop.
Read More ->>

27 December, 2010

My Cousin Vinny (1992) BRRip 750mb

0 comments

Movie Info

http://www.imdb.com/title/tt0104952/

[FORMAT]:…………………..[ Matroska

[iMDB RATING ]………………[ 7.4/10

[GENRE]:……………………[ Comedy | Crime

[FILE SIZE]:………………..[ 750 MB

[NO OF CDs]:………………..[ 1

[RESOLUTION]:……………….[ 1280x688

[ASPECT RATIO]:……………..[ 16/9

[FRAME RATE]:……………….[ 23.976 fps

[LANGUAGE ]:………………..[ English

[SUBTITLES]:………………..[ English (Muxed : Not hardsubbed : Can turn off)

[ORIGINAL RUNTIME]:………….[ 01:59:18

[RELEASE RUNTIME]:…………..[ 01:59:18

[SOURCE]:…………………..[ 720p

[Encoder]:………………….[ sUN
















  
Password : freezilla.in












Read More ->>

The Tourist (2010) TS 350mb

0 comments

Movie Info

http://www.imdb.com/title/tt1243957/

[TITLE]…………………….[ The Tourist

[DIRECTOR]………………….[ Florian Henckel von Donnersmarck

[RELEASE DATE]………………[ 10 December 2010 (USA)

[FORMAT]:…………………..[ Matroska (MKV)

[GENRE]:……………………[ Action | Drama | Thriller

[NO OF CDs]…………………[ 1

[FILE SIZE]:………………..[ 350MB

[RESOLUTION]:……………….[ 720x304

[LANGUAGE ]:………………..[ English

[SUBTITLES]:………………..[ ENGLISH SUBS ON FOREIGN PARTS!

[ORIGINAL RUNTIME]:………….[ 01:35:57

[RELEASE RUNTIME]:…………..[ 01:35:57

[ENCODER]:………………….[ ShAaNiG

[SOURCE]:…………………..[ The Tourist 2010 TS READNFO XViD - IMAGiNE

[iMDB RATING]:………………[ 6.0/10
















  
Password : freezilla.in












Read More ->>

26 December, 2010

How To Hack : Hackers Underground Handbook | Download For Free

0 comments
Hi friends I hope you all are fine, Now a days learning hacking is very hard but if we have any good mentor and its very easy to learn hacking , but now a days no hack guide is available for us to teach us hacking for free. Even e-books on hacking are costing a little. but now you can learn ethical hacking for free with the professional e-book hacking which costs 20$ , but I am posting it for free . Just read out whole post to know more....





How To Hack : Learn Hacking From Professional Book Free .



The Hacker’s Underground Handbook will guide you through password hacking, windows hacking, malware, phising, web hacking, network hacking and Linux (intro, installation, etc). All this material fully packed with images, thus being a top step-by-step guide, on the course of which you cannot fail.





The Hacker's Underground Handbook which contains information unknown to 99.9% of the world will teach you the hacker's ways.



A great starting book which will guide you in the right direction, helping you understand the basic concepts of computer security and matters that you should take in consideration.









Benefits and features of this new e-book on hacking :-



    *Learn ethical hacking , garanteed

    *It personally used by me to learn hacking

    *You will learn all the hackers tricks and learn to apply them in real world situations.

    *You will be put into a hackers mindset and learn to think like one.

    *By Learning how a hacker thinks and acts, you will be able to protect yourself.

    *You will aquire knowledge nonexistant to 99.9% of the people in the world!

    *Underground handbook may get you interested in pursuing career as a Ethical Hacker.



File Information :-



Name        :- The Hackers Underground Handbook

Size          :- 2.7 Mb

Format      :- .pfd [Compressed RAR format]





  
Password : freezilla.in












Read More ->>

25 December, 2010

Tees Maar Khaan CamRip

0 comments
Movie Info:
Source..............- CAMDVD [DDR]
Ripper..............- -=KaMaL=-
Release Date........- 25/12/2010
Runtime.............- 1:58:45
Resolution..........- 672 x 256
Framerate...........- 25.000 FPS
Disks...............- 1CD
Size................- 696 MB


Video Codec.........- XviD


Video Bitrate.......- 735 Kb/s


Audio Info..........- 80Kbps MP3 CBR
Audio Language......- Hindi
Subtitles...........- NoNe
Container...........- AVI























  

Password : freezilla.in




Read More ->>

24 December, 2010

Dinner for Schmucks (2010) BRRip 650mb

0 comments

Movie Info

http://www.imdb.com/title/tt0427152/

[FORMAT]:…………………..[ Matroska

[AWARDS]:…………………..[ 1 nomination

[GENRE]:……………………[ Comedy

[FILE SIZE]:………………..[ 650 MB

[NO OF CDs]:………………..[ 1

[RESOLUTION]:……………….[ 1280x720

[ASPECT RATIO]:……………..[ 16:9

[FRAME RATE]:……………….[ 23.976 fps

[LANGUAGE ]:………………..[ English

[SUBTITLES]:………………..[ muxed

[ORIGINAL RUNTIME]:………….[ 01:54:00

[RELEASE RUNTIME]:…………..[ 01:50:00

[SOURCE]:…………………..[ cbgb

[Encoder]:………………….[ scOrp

[iMDB RATING]:………………[ 6.2/10
































  
Password : freezilla.in












Read More ->>

22 December, 2010

TRON: Legacy (2010) TS 450mb

0 comments

Movie Info

http://www.imdb.com/title/tt1104001/

[TITLE]…………………….[ TRON: Legacy

[DIRECTOR]………………….[ Joseph Kosinski

[RELEASE DATE]………………[ 17 December 2010 (USA)

[FORMAT]:…………………..[ Matroska (MKV)

[GENRE]:……………………[ Action | Adventure | Sci-Fi

[NO OF CDs]…………………[ 1

[FILE SIZE]:………………..[ 450MB

[RESOLUTION]:……………….[ 720x304

[LANGUAGE ]:………………..[ English

[SUBTITLES]:………………..[ none

[ORIGINAL RUNTIME]:………….[ 01:57:59

[RELEASE RUNTIME]:…………..[ 01:57:59

[ENCODER]:………………….[ ShAaNiG

[SOURCE]:…………………..[ TRON Legacy 2010 TS XViD - IMAGiNE

[iMDB RATING]:………………[ 7.7/10














  
Password : freezilla.in












Read More ->>

Search FREEZILLA

Original Look

FREEZILLA UPDATES

Blog Archive

 

Contributors

Recent Comments

| IGNITED MIND--VTU © 2009. All Rights Reserved | Template Style by My Blogger Tricks .com | Design by Brian Gardner | Back To Top |