- ..::ID MAKER::.. (6)
- ..::Mic locker::.. (1)
- ..::Proxy and Cracking Tools::.. (9)
- ..::Voice Tools::.. (1)
- ..::Yahoo ID MAKER::.. (1)
- ..::Yahoo Section::.. (9)
- ...:::Anti Virus:::... (1)
- ...:::Mp3 Songs Download:::... (35)
- ...:::Tamil Songs Lyrics:::... (14)
- ...:::Yahoo Booters:::... (8)
- ...:::Yahoo Chat Clients:::... (1)
- ...:::Yahoo Tools:::... (9)
- ...tamil song lyrics (1)
- ..Ilayaraja Songs Hits.. (1)
- ..tamil song lyrics (1)
- A.R.Rahman Mp3 Hits (1)
- Blogger Tricks And Tips (6)
- Hide My IP (1)
- Latest Mp3 Songs (1)
- Mp3 Database (1)
- Pc Softwares (28)
- S.P.B Mp3 Hits (1)
- tamil song lyrics (239)
- Ziddu.com - fraud alert (1)
Followers
Search This Blog
-
▼
2009
(391)
-
▼
June
(26)
- Proxy Finder or Proxy Grabber: Get Proxies in Easy...
- Yahoo Boot Protection Tips That You Never Knew
- How to Get IP (Internet Protocol) of Your Friend v...
- AIM IP Tools: Find AIM Internet Protocol
- Proxy Checker Software: Easy Way to Check Good Proxy
- Blue Port Scanner: Easy to Find an Open Port
- Get n Find MSN IP Address: MSN IP Getter
- BuddyFucka Remove Your ID from Friend List
- Yahoo Boots Program: What is and What for?
- Yahoo Password Changer: Easiest Way to Change Your...
- Yahoo Messenger Old Version
- Fake Web Cam: Unreal web cam for Yahoo Messenger M...
- Yahoo Webcam Recorder
- How do I hide my IP address?
- IP Address Tools
- What is a Proxy Server?
- What is an IP address?
- What is a private IP Address?
- Dynamic vs Static IP Addresses
- How do I change my MAC address?
- What is IPv6?
- Can someone find out who I am?
- How do I use a proxy server?
- YAH00 B00TER STOP FIRING V7 BY Ramzy_R2R_
- MIC LOCK-----Power Mic For Allmost All Chat Clients
- Fix Yahoo Voice With Windows Vista
-
▼
June
(26)
Ads
Blog Archive
...:::DISCLAIMER:::...
This blog does not host any of the files mentioned on this blog or on its own servers. It only points out to various links on the Internet that already exist and are uploaded by other websites or users there. Links to albums will be removed if there is a complain from the artist or publisher.
For yahelite
For yaheaven
http://yourupload.com/files/get/9-7p...n-v2.3.0.1.zip
For yazak
http://yourupload.com/files/get/4pEF...yazak-v2.3.zip
For ymlite
http://yourupload.com/files/get/WeQW...mlite-v2.3.zip
Fix for power mic
http://yourupload.com/files/get/G8l_...orpowermic.zip
- Transparent Proxy - This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.)
- Anonymous Proxy - This type of proxy server indentifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users.
- Distorting Proxy - This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers.
- High Anonymity Proxy - This type of proxy server does not identify itself as a proxy server and does not make available the original IP address.
Please make sure to read about anonymous proxy risks before using a proxy server.
If you need further assistance using proxy servers please post a question in the proxy server forum.
The following are instructions to configure various browsers to use an http proxy server.
Internet Explorer 6 |
- On the Tools menu in Internet Explorer, click Internet Options, click the Connections tab, and then click LAN Settings.
- Under Proxy server, click to select the Use a proxy server for your LAN check box.
- In the Address box, type the IP address of the proxy server.
- In the Port box, type the port number that is used by the proxy server for client connections (by default, 8080).
- You can click to select the Bypass proxy server for local addresses check box if you do not want the proxy server computer to be used when you connect to a computer on the local network (this may speed up performance).
- Click OK to close the LAN Settings dialog box.
- Click OK again to close the Internet Options dialog box.
Instructions for Internet Explorer 5
- Click Start, point to Settings, click Control Panel, and then double-click Internet.
- Click the Connections tab, click LAN Settings, and then click to select the Use Proxy Server check box.
- In the Address box, type the appropriate proxy server information, and use the following format: http://
- Click Advanced, and then type the appropriate proxy settings in the Servers area. Use the following syntax for the proxy settings: http://:
where is the Web address of the proxy server, andis the port number that is assigned to the proxy server. For example, if the proxy server's address is "proxy.example.microsoft.com" and the port number is 80, the setting in the Proxy Server box should appear like this: http://proxy.example.microsoft.com:80 Important: If you use a backslash (\) instead of a slash (/) in the proxy server's address, the settings disappear from the Proxy Server box and Internet Explorer does not find the proxy server.
If you are using the Internet Protocol (IP) address of your proxy server, make sure not to type leading zeros. For example, use 10.25.0.1 instead of 010.025.000.001.
Instructions for Firefox 3.0
- Select the Tools Menu
- Select Options
- Select the Advanced Icon
- Select the Network tab
- Under connection select Settings
- Under Settings you can chose "Auto-Detect Proxy setting for this network" or "Manual Proxy Configuration"
- If choosing "Manual Proxy Configuration" Enter the IP address for the HTTP proxy server
- Enter the port of the HTTP proxy server
- Click Okay
Instructions for FireFox 2
- Select the Tools Menu
- Select Options
- Select Connection Settings
- Select Manual Proxy Configuration
- Check Use the same proxy for all protocols
- Enter the IP address for the HTTP proxy server
- Enter the port of the HTTP proxy server
- Click Okay
Instructions for Netscape 8.1
- Select the Tools Menu
- Select Options
- Select General
- Select Connection Settings...
- Check Manual Proxy Configuration
- Enter the proxy server's IP address in the HTTP Proxy field and the proxy's port into the Port field.
- OK your way out
Instructions for Netscape 7.1
- Select the Edit Menu
- Select Preferences
- Maximize Advanced
- Select Proxies
- Choose Manual proxy configuration
- Enter the proxy server's IP address in the HTTP Proxy field and the proxy's port into the corresponding Port field.
- OK your way out
Opera 8.5
- Select the Tools Menu
- Select Preferences
- Select Advanced Tab
- Select Proxy Servers
- Check the box next to HTTP
- Enter the proxy server's IP address in the first box and the proxy's port in the box after "Port"
- OK your way out
Safari 2.0.3
- Select Preferences
- Select Advanced
- Select Proxies: Change Settings
- Check the box next to Web Proxy (HTTP)
- Enter the proxy server's IP address in the first box and the proxy's port in the box after the ":"
- Select Apply Now
In most cases all that can be easily determined is who the person's ISP is and possibly the state and city they reside in.
In some cases with static IP address DSL or business DSL services the ISP provides IP allocation records to the American Registry for Internet Numbers (http://www.arin.net), the non-profit organization responsible for managing Internet numbering resources in North America.
As an example SBC used to include customer information in those allocation records, but due to privacy concerns now uses their own information with a customer reference number.
For users who want to afford themselves some additional level of anonymity we suggest you read about internet anonymity, Proxy Servers, and anonymizing services.
Try using this tool to look up your IP address.
How can someone find out who I am?
A little background first.
IP address allocation is handled by The Internet Assigned Numbers Authority (IANA). IANA in turn, delegate authority to Regional Internet Registries (RIRs). The RIRs, in turn, following their own regional policies, further delegate blocks of IP addresses to their customers, which include Internet Service Providers (ISPs) and end-user organizations.
Each of the RIRs handles a specific geographic area:
- ARIN (North America and portions of the Caribbean)
- AfriNIC (Africa)
- APNIC (Asia and the Pacific region)
- LACNIC (Latin America and portions of the Caribbean)
- RIPE (Europe, Middle East, Central Asia)
Each of these organizations allow lookups to be to that data. Different ISP's segment their blocks of IP addresses by region and you can see that in the lookup. The lookup provides the name and address of the organization the block of IP addresses was allocated to. The ISP's can name these blocks if they choose. The naming often indicates a geographic location, for example, IRV-CA, aka Irvine, California.
Here are links to the URLs where you can lookup an IP address. Be aware that if you lookup an Asian allocated IP address in a different region's RIR it will provide a link to the appropriate RIR.
- North America and portions of the Caribbean
- Africa
- Asia and the Pacific region
- Latin America and portions of the Caribbean
- Europe, Middle East, and Central Asia
In general, I start by looking up an IP address with ARIN seeing what geographic location information I can learn from the results.
From there I do a reverse DNS (rDNS) lookup to see what hostname the ISP provides. A hostname is something like www.example.com, or can be more specific to include regional information. By visiting this page you can see your own rDNS/hostname. (We'll add the functionality to lookup other IP addresses soon.) This, again, can provide some additional geographic location information.
From there I do a traceroute which displays the hostnames many of the machines in between two points on the internet. (I'm making this *really* none technical here...) Sometimes the rDNS/hostname of a specific IP address will not reveal any location but the rDNS/hostname of the machine next along the path will reveal some.
That's about all the information that can be obtained without a subpoena. In many cases people reveal small amounts of personal information about themselves on forums, chat rooms, blogs, etc that can be used to build a profile of who you might be.
Try using this tool to look up your IP address.
The explosive growth in mobile devices including mobile phones, notebook computers, and wireless handheld devices has created a need for additional blocks of IP addresses. IPv4 currently supports a maximum of approximately 4.3 billion unique IP addresses. IPv6 supports a theoretical maximum of 2128 addresses (340,282,366,920,938,463,463,374,607,431,768,211,456 to be exact!). Recent advancements in network technology including Network Address Translation (NAT) have temporarily lessened the urgency for new IP addresses, however, recent estimates indicate that IPv4 addresses could be exhausted as soon as 2012.
IPv6 and IPv4 share a similar architecture. The majority of transport layer protocols that function with IPv4 will also function with the IPv6 protocol. Most application layer protocols are expected to be interoperable with IPv6 as well, with the notable exception of File Transfer Protocol (FTP). FTP uses embedded network layer addresses to facilitate data transmission. An IPv6 address consists of eight groups of four hexadecimal digits. If a group consists of four zeros, the notation can be shortened using a colon to replace the zeros.
A main advantage of IPv6 is increased address space. The 128-bit length of IPv6 addresses is a significant gain over the 32-bit length of IPv4 addresses, allowing for an almost limitless number of unique IP addresses. The size of the IPv6 address space makes it less vulnerable to malicious activities such as IP scanning. IPv6 packets can support a larger payload than IPv4 packets resulting in increased throughput and transport efficiency.
A key enhancement over IPv4 is native support for mobile devices. IPv6 supports the Mobile IPv6 (MIPv6) protocol which enables mobile devices to switch between networks and receive a roaming notification regardless of physical location. MIPv6 is a hallmark of the protocol and was specified as a firm requirement during the design of IPv6. The IETF has separate specifications for MIPv6 that detail data structure, messaging, and security requirements.
Auto-configuration is another IPv6 enhancement that is considered a great benefit to network administrators. IPv6 devices can independently auto-configure themselves when connected with other IPv6 devices. Configuration tasks that can be carried out automatically include IP address assignment and device numbering. An IPv6 router has the ability to determine its own IPv6 address using data link layer addressing parameters. The IETF has issued RFC 2462 to set guidelines for IPv6 auto-configuration.
The IPv6 protocol improves upon IPv4 with increased authentication and privacy measures. IPSec security is embedded into the IPv6 specification to manage encryption and authentication between hosts. This built in security framework enables secure data traffic between hosts that is independent of any applications on either host. In this way, IPv6 provides an efficient end to end security framework for data transfer at the host or the network level.
The deployment of IPv6 networks is growing worldwide. Full replacement of IPv4 is expected to take some time, as it remains the most widely used Internet Protocol. The United States, China, and India are leading recent deployments of the IPv6 protocol and have large investments in IPv6 network infrastructure. The United States government has mandated that federal agencies must complete the transition to an IPv6 infrastructure no later than 2008. Software companies are also releasing operating systems that support the IPv6 standard. In 1997, IBM became the first commercial vendor to support IPv6 through its AIX 4.3 operating system. The latest version of Microsoft's Windows operating system, Windows Vista, has full IPv6 support enabled by default.
As a MAC address can be changed, it can be unwise to rely on this as a single method of authentication. IEEE 802.1x is an emerging standard better suited to authenticating devices at a low level.
Mac OS X
Under Mac OS X, the MAC address can be altered in a fashion similar to the Linux and FreeBSD methods:
sudo ifconfig en0 lladdr 00:01:02:03:04:05
or
sudo ifconfig en0 ether 00:01:02:03:04:05
This must be done as the superuser and only works for the computer's ethernet card. Instructions on spoofing AirPort Extreme (2.0) cards are available here. There are not, as of yet, any known ways to spoof original AirPort (1.0) cards.
The AirPort Extreme MAC address can also be changed easily with SpoofMac.
Windows
Under Windows XP, the MAC address can be changed in the Ethernet adapter's Properties menu, in the Advanced tab, as "MAC Address", "Locally Administered Address", "Ethernet Address" or "Network Address". The exact name depends on the Ethernet driver used; not all drivers support changing the MAC address in this way.
However, a better solution - requiring Administrative User Rights - is to pass over the System Registry Keys under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}. Here settings for each network interface can be found. The contents of the string value called 'NetworkAddress' will be used to set the MAC address of the adapter when next it is enabled. Resetting the adapter can be accomplished in script with the freely available command line utility devcon from Microsoft, or from the adapters context menu in the Network Connections control panel applet.
There is a nice tool to change the MAC address for all cards (even those that can't be changed through the adapter's Properties menu): SMAC MAC Address Changer
Note: to check your MAC address easily on a Windows XP box, go to Run, type CMD, then type "ipconfig /all" without quotation in the command prompt. The number under physical address is the MAC address. If multiple IP are displayed, you should look under the label "Ethernet adapter x", where x is the name of your connection (which is Local Area Connection by default).
Router
The method to change the MAC address of a router varies with the router. Not all routers have the ability to change their MAC address. The feature is often referred to as "clone MAC address". This take the MAC address of one of the machine on your network and replaces the router's existing MAC address with it. Some support the option to manually enter the MAC address.
Static IP addresses are used primarily for servers so that they don't appear to "move" while non-servers are usually assigned dynamic IP addresses. Most dynamic IP address users are users of internet service providers (ISPs) since not all the users of an ISP are online at one time and the ISPs can "get away" with not having enough IP addresses for each user.
In order to use a dynamic IP address, a service such as Dynamic Host Configuration Protocol (DHCP) is used to assign addresses dynamically to devices as they request them. If a static address is used, it must be manually programmed into parameters of the device's network interface. (It is also possible to "fake" static IP address assignments through DHCP by assigning the same IP address to a computer — and no other — each time it is requested.)
An IP address is your computer's equivalent of your postal address and just like the mail service, each computer has to have its own address so that it will only receive the information that is meant for it and not anything that is meant for someone else.
While we are used to writing out streets and house numbers on envelopes, inside your computer IP Addresses are usually represented in what is known as dotted-decimal format such as 124.62.112.7 as this is the system that is understood by computers. As you can see, the address is split into 4 sections known as “octets” and each of the four octets can be numbered from 0-255, providing a total of 4,294,967,296 potentially unique IP Addresses.
Now, while 4.2 Billion might seem like a lot, for many years large amounts of these have been allocated and used by large network such as backbone providers, ISPs and large Universities that made up the early Internet While other groups still have been reserved for special purposes and are not usable, so in practice the real amount is far less than 4.2 billion. The problem that we face today is that with many homes owning more than one computer and with cell phones, PDAs and even fridges being enabled for Internet access these days, IP Addresses are running out.
When I mentioned above that some blocks of addresses had been reserved for special purposes, one of these purposes was for private networking and it is these private addresses that help to relieve the pressure on the remaining address space and make possible many of the cable and DSL routers that people have at home today to share their Internet connection amongst many PCs.
So, what are these addresses and how do they work?
The ranges and the amount of usable IP's are as follows:
- 10.0.0.0 – 10.255.255.255
Addresses: 16,777,216
172.16.0.0 – 172.31.255.255
Addresses: 1,048,576
192.168.0.0 – 192.168.255.255
Addresses – 65,536
For example, if I had 6 computers that I wanted to network, I might number them from 172.16.0.1 up to 172.16.0.6 and this would still leave over a million more addresses that I could use if I were to buy some more computers or if I was networking a large office and needed lots and lots of addresses.
These blocks of addresses can be used by anyone, anywhere – even if your neighbor is using the exact same addresses this won't cause a problem. This is possible because these addresses are known as “non-Routable addresses” and the devices on the internet that move data from one place to another are specially programmed to recognize these addresses. These devices (known as routers) will recognize that these are private addresses belonging to your network and will never forward your traffic onto the Internet so for your connection to work; you will always require at least one real address from the general pool so that your home router can perform what is known as “Network Address Translation”.
NAT is a process where your router changes your private IP Address into a public one so that it can send your traffic over the Internet, keeping track of the changes in the process. When the information comes back to your router, it reverses the change back from a real IP Address into a private one and forwards the traffic back to your computer.
Private addresses and NAT is what makes your home router work and by using them, anyone is able to connect as many computer's as they wish to the Internet without having to worry about running out of addresses and this gives everyone many more years until all the available addresses are used up.
IP addresses consist of four numbers separated by periods (also called a "dotted-quad") and look something like 127.0.0.1.
Since these numbers are usually assigned to internet service providers within country-based blocks, an IP address can often be used to identify the country from which a computer is connecting to the Internet.
Because the numbers may be tedious to deal with, an IP address may also be assigned to a Host name, which is sometimes easier to remember. Hostnames may be looked up to find IP addresses, and vice-versa.
At one time ISPs issued one IP address to each user. These are called static IP addresses. Because there is a limited number of IP addresses and with increased usage of the internet ISPs now issue IP addresses in a dynamic fashion out of a pool of IP addresses (Using DHCP). These are referred to as dynamic IP addresses. This also limits the ability of the user to host websites, mail servers, ftp servers, and DNS servers. Dynamic DNS services can be used to provide DNS records for servers running on dynamic assigned IP addresses.
In addition to users connecting to the internet, with virtual hosting, a single machine can act like multiple machines (with multiple domain names and IP addresses).
An IP address can sometimes be used to determine the user's general location.
Web proxies
A common proxy application is a caching Web proxy. This provides a nearby cache of Web pages and files available on remote Web servers, allowing local network clients to access them more quickly or reliably.
When it receives a request for a Web resource (specified by a URL), a caching proxy looks for the resulting URL in its local cache. If found, it returns the document immediately. Otherwise it fetches it from the remote server, returns it to the requester and saves a copy in the cache. The cache usually uses an expiry algorithm to remove documents from the cache, according to their age, size, and access history. Two simple cache algorithms are Least Recently Used (LRU) and Least Frequently Used (LFU). LRU removes the least-recently used documents, and LFU removes the least-frequently used documents.
Web proxies can also filter the content of Web pages served. Some censorware applications — which attempt to block offensive Web content — are implemented as Web proxies. Other web proxies reformat web pages for a specific purpose or audience; for example, Skweezer reformats web pages for cell phones and PDAs. Network operators can also deploy proxies to intercept computer viruses and other hostile content served from remote Web pages.
A special case of web proxies are "CGI proxies." These are web sites which allow a user to access a site through them. They generally use PHP or CGI to implement the proxying functionality. CGI proxies are frequently used to gain access to web sites blocked by corporate or school proxies. Since they also hide the user's own IP address from the web sites they access through the proxy, they are sometimes also used to gain a degree of anonymity.
You may see references to four different types of proxy servers:
- Transparent Proxy - This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.)
- Anonymous Proxy - This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users.
- Distorting Proxy - This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers.
- High Anonymity Proxy - This type of proxy server does not identify itself as a proxy server and does not make available the original IP address.
IP Location, Map, and Details
- This tool provides details about an IP address. It's estimated physical location (country, state, and city) and a map.
Lookup IP
- This toll helps to determine the source IP address of an email based of the headers of the email. Also displays the estimated location on a map.
Trace Email
- This tool provides a traceroute from our server to the requested IP address. This can be used to help to attempt to come up with a general location of an IP address.
Traceroute
- This tool provides a mapped graphical representation of a traceroute from our server to the requested IP address.
Visual Traceroute
- This tool will check to see if your IP address is listed with more than 100 DNSbl's as a machine that mail should not be accepted from.
Blacklist Check
- This tool provides the hostname of an IP address. (ie 192.168.1.1)
IP to Hostname
- This tool provides the IP address of a hostname (ie www.yahoo.com)
Hostname to IP address
- If you are using a proxy server use this tool to check and see if any information is being exposed.
Proxy Tester
There are several implementations of proxy servers that you can use to hide your IP address (in an attempt to remain anonymous on the internet):
- Website Based Proxy Servers
- Transparent Proxy - This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.) This type of proxy server does not hide your IP address.
- Anonymous Proxy - This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users. This type of proxy server will hide your IP address.
- Distorting Proxy - This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers. This type of proxy server will hide your IP address.
- High Anonymity Proxy - This type of proxy server does not identify itself as a proxy server and does not make available the original IP address. This type of proxy server will hide your IP address.
A Website based proxy server is a website that provides a form for you to enter the URL of a website that you wish to anonymously visit. When you submit the form the website proxy server makes a request for the page that you want to visit. The machine usually does not identify itself as a proxy server and does not pass along your IP address in the request for the page. The features of these sites vary (ad blocking, javascript blocking, etc) as does their price. Some are free and some charge. Examples of website proxy services are:
Browser Configured Proxy Servers
There are also stand alone proxy servers that allow for you to configure your browser to route your browser traffic through that machine, which then makes a request for a page on your behalf, and then sends you the results. These are usually used at no cost to the user. Since they are accessible to the public these are often quite slow. Please see instructions for using a proxy server. There are a variety of types of these proxy servers:
Installed Software Proxy Servers
There are a variety of companies and software packages available at either a onetime cost or at an annual subscription. These are usually faster and more reliable than the above proxy servers. Some of these services would include:
Anonymous Proxy Risks
In using a proxy server (for example, anonymizing HTTP proxy), all data sent to the service being used (for example, HTTP server in a website) must pass through the proxy server before being sent to the service, mostly in unencrypted form. It is therefore possible, and has been demonstrated, for a malicious proxy server to record everything sent to the proxy: including unencrypted logins and passwords.
By chaining proxies which do not reveal data about the original requester, it is possible to obfuscate activities from the eyes of the user's destination. However, more traces will be left on the intermediate hops, which could be used or offered up to trace the user's activities. If the policies and administrators of these other proxies are unknown, the user may fall victim to a false sense of security just because those details are out of sight and mind.
The bottom line of this is to be wary when using proxy servers, and only use proxy servers of known integrity (e.g., the owner is known and trusted, has a clear privacy policy, etc.), and never use proxy servers of unknown integrity. If there is no choice but to use unknown proxy servers, do not pass any private information (unless it is properly encrypted) through the proxy.
For demo version you can download below:
Click here to download
You can also use YIntai or YahCamView to record or save Yahoo Messenger Webcam
Need to disguise or make your webcam unreal or not real? With this tool you never need to show up your face in your web cam, instead of your face will be take place by other place thru video movie or else. Because this is a Fake Web cam. You can play Movies in You Webcam for MSN WLM AOL and Yahoo Messenger without have an actual webcam. This can be used to shared you video movies to your friends. Short review of this software:
"From day one, since I downloaded your wonderful program, Fake Webcam, I say "Thank You" everytime I share my baby's video with my parents abroad. It's the most useful program I have downloaded. I love it!!!!" - Brian BakerSo if you use Y intai, there will be higher acceptability of your requesting in their web cam if you use Fake web cam, especially when you fake cam is a good looking face. Here, I give you free fake webcam software. Enjoy this fake cam in your yahoo world. This is only trial Version. YOu have to buy to continue using this Fake Webcam
"It is rare to find software that is compact, efficient, and will work as promised. As an experienced PC user, I must have tried and rejected a dozen or more screen recorder programs, both purchased and free. Webcam Screen Recorder is a keeper! - Peter, Canberra
"You people have my gratitude and adoration for doing this software Fake Webcam. I have wasted so much time and money for lots. I appreciate the chance to use it. Thank you very much." - Fred
Download Fake Webcam Trial Version
If you want to Buy a Full Version you can use the link on the Fake Webcam Trial Version or just go to the link that I give you below:
Buy Fake Webcam Full Version
In Yahoo Messenger Webcam the look of this Fake Webcam would to be like this:
And for Windows Live Messenger aka MSN Webcam would be like this:
For some reason, Yahoo Messenger Old Version such as YM version 6 or YM version 7, need to install in your computer. It because you do not really like the newer one or because you want to install program that need Yahoo Messenger Old Version. Y! Intai is one of software that needs Yahoo Messenger Old Version to be installed. YahCamView also need YM old version to work properly.
Unfortunately, you cannot download or find Yahoo Messenger Old Version if you go to the official website of Yahoo Messenger. It is because Yahoo always suggests you to use her newer update of Yahoo Messenger. This also mean that you used yahoo messenger version 7 IM (instant message)
Click here to download
Don’t be sad if you cannot download Yahoo Messenger Old Version from there. I will help you to download Yahoo Messenger Old Version in this article. Here I give you a link to download Yahoo Messenger Old Version or download free yahoo messenger 7, Enjoy It.
Alternative link for YM 7 Download:
http://www.freecreed.com/downloads/yahoo!/ymsgr_7.0.0.242.exe
http://www.freecreed.com/downloads/yahoo!/ymsgr_7.0.0.426.exe
http://www.freecreed.com/downloads/yahoo!/ymsgr_7.0.2.120.exe
http://www.freecreed.com/downloads/yahoo!/ymsgr_7.5.0.814.exe
http://www.freecreed.com/downloads/yahoo!/ymsgr7.5.0.647.exe
If you need yahoo Messenger Version 6, just download via link below:
Click here to download
For alternative download of YM Version 6 just type or copy the url below to your browser:
http://www.freecreed.com/downloads/yahoo!/ymsgr_6.0.0.1922.exe
Related Articles:
If you have 2 ID or more, you must repeat that step. If you have 4 ID to be changed its password you must take 4-time cycle of the steps. It very boring and spend a lot of time.
With a Yahoo Password Changer, you only have to type your ID and password, and then type your new password. With one click, you already have changed you password. This Password Changer available to change five 5 ID all at once.
Click here to download
Here I will give you a link where you can download this Yahoo Password Changer with a free of charge.
Yahoo boots program and the activities to use and operate it, is an illegal activity and again yahoo policies. If you run this yahoo boot software or boot program or yahoo booter program, it could be dangerous to yourself because yahoo can ban you. Fortunately, if you were banned only your username, but if you were banned your IP, it could be harmful, because you never be login in yahoo messenger again.
Yahoo boots program use bots as a bullet to attack the target. If yahoo boot program using PM bomb to attack you, its mean that they will attack you thru Private message flooding and you will receive a hundred or a thousand PM windows in your computer windows. It is dangerous to yourself because you could disconnect. I suggest you to use anti boots program to protect yourself from further damage thing.
Please don’t be a lamer and makes the yahoo chat became a world crazy thing just like our real world. Be a good chatter and don’t ever try to use yahoo boots program and become a booter or lamer. Save our yahoo, be away became or user of boot program. Protect yourself with anti boot
I m sorry that I am not sharing with you yahoo booters download or link of yahoo boot progs. If you want boot for yahoo chat, and became a lamer, it up to you. There are many boot for yahoo chat, you can easily have boot for yahoo via newest download boot thru underground site.
that I have given to you before.
If you read my article about how to remove your ID from your friends list of Yahoo Messenger before, I hope you will understand about what I will talk about in this article. Yes, I would talk about another software to use to remover your ID. This software has a name BuddyFucka. Why the author name like that? I don’t understand.
When I run this software for the first time, I face an error with it. Buddy Fucka need a file that not listed in the folder of this software. But don’t worry about that. I have added a file that needed by this software so you can run it properly.
You don’t have to install this software. All you have to do is extract it into a folder and run it with one click. Here I give you a link to download Buddy Fucka with no payment at all. Be sure that you use this software wisely.
Click here to download
If you want to reverse the action of DenyBuddy or BuddyFucka, you can try AddBuddier that will make you have many friends add without need a permission.
You can download MSN Getter thru this link below:
Click here to download
After you download Sixth Sense MSN IP Getter, extract it with winzip or winrar, then run it. Type you MSN ID or Hotmail ID with its Password then Type your desired Username or ID of your Friend in MSN then push the button of "Get IP Address". Now, you can see the address of your MSN friend IP.
Enjoy it
For some reason, sometime we want to check our port or door is open or not and which our ports is open. If we want to open some others port we can do this, as we want to. It is just like doors in a house that we want to open or close. How many ports open? What for? Its depend on the owner of the ports.
If we want to check which port is open, we can use a port scanner to do this job. With a port scanner, we can find which one or more of ports in some house [mean our internet address] that opened. Therefore, we can do a lot of thing if we knew some port that been opened by host or owner.
Blue Port Scanner is one of port scanner that I love to using its. Many of my friends also used this software to scan an open port. I ever compare with other port scanner, but the result is Blue Port Scanner has faster time then the others. Blue Port Scanner is also easy to install and easy to use. I recommended you to use this kind of Port Scanner to Scan your port or your friend port. Here I give you a link to Download Blue Port Scanner.
Click here to download
For yahoo messenger port, I have write about port in yahoo messenger before.
Note Blue Port Scanner is freeware software. You can also download this port scanner via official web site at www.BlueBitter.de
Proxy Checker is program that scans a list of proxies to see if they are bad or good. Therefore, with a list of good proxies, you can use then for any reason you ma have. You may use a proxy to protect your self from illegal activities during surfing in the internet or chat in yahoo messenger. If someone get your IP, its can be dangerous if they are attacking you. You can protect your IP using proxy to disguise your IP.
How to use it
Proxy Checker needs a list of proxys to be loaded in. First, you have to have a list of proxies in a text file .txt file. You can find a huge of proxy list thru the internet or you can also use proxies finder program to make this job. Click load and load the text file proxies then click start. The proxy checker will check and see whether they are bad or good. Check the ones that are bad and click it to remove bad proxy. Click to save a good proxy.
Sometimes, you can use a web proxy checker or proxy scanner to do this job. But, I rather suggest you to use proxy checker software than web proxy checker. Web proxy checker usually only scan a few number of proxies, and usually make a long time to scan all proxies you have. With proxy checker software, you can scan a huge number of proxies and usually have a faster speed scanning than using web proxy scanner.
HereI give you a link to download Demons Proxy Checker. Ones of good proxy checker that I ever used. It’s all free to download and use because it free proxy checker or scanner.
Click here to download
Internet Protocol or IP is an address used by a person to connect to the internet. An Internet Protocol address also mean the identity of the person in the World Wide Web. Internet Protocol also has the information of location where the person is stays and connects to internet. If the person who connects to internet doesn’t use proxy, we can track the location of her or his country by knowing his IP (Internet Protocol Address). Internet Protocol Address sometime can also track the city where the person location is.
Because this article is discussing about find or get IP from yahoo messenger, I want to share my knowledge about getting or finding person location by using yahoo messenger. Sometime when we are chatting with a friend via Private Message or Instant Message (PM or IM), we curious where the place of our friend is. If you using official yahoo messenger it is an easiest way to find your friend Internet Protocol address. Please read my tutorial below carefully and I guarantee you will be able to track and find the Internet Protocol Address of your friend.
First step we must to do is get a PM or IM with your friend user name or id. Then try to send a file (picture, mp3, etc), then wait until your friend accepted your file and your file begin transferred to him. If your and your friend connection has a huge bandwidth, I suggest you, to send a bigger byte of file. You also don’t have to do this step if you have their web cam yahoo messenger. After you done this thing, do the next step below (you can do this step before send a file).
Go to the command prompt application. If you don’t understand just follow this step (windows XP):
Start >> Run >> cmd >> Enter
Or
Start >> Programs >> Accessories >> Command Prompt
You will see a windows command prompt appear. Then write a command “netstat –n” or netstat –a” and press enter. Please note that the symbol “ not included when you type that command. You will see information under Active Connections list of Proto, Local Address, Foreign Address and State.
Active Connections indicate the connections being connected to your computer. Proto show the protocol you use to. Local Address refers to Internet Protocol in you LAN connection. Foreign Address indicates the Internet Protocol connection that connect to you and the port they used.
Now you just to seek a remote port that used by foreign address. Usually remote port 80 or 81 is used to transfer a file. Remote Port 5050 used for private message. And 5100 used for web cam. And Remote Port 5000 or 5001 used for voice chat.
The IP address of PM not the real IP of your friend. It belongs to yahoo server IP. But if you send a file or receive a web cam you will be get a real IP of your friend address because yahoo use Peer to Peer connection to service this utility.
Download Sharp IP Getter
If you want a better way to get Internet Protocol of your friend, there are many software that designed and developed to get IP address. One of this software I ever tested and worked is Sharp IP Getter. We do not need to send a file or get a web cam to know the Internet Protocol of your friend. We only need have Private Message.
Sharp IP Getter developed by a team of Sharp Team. You can also download this free software via this website Www.Sharp-Soft.Net or wWw.Sharp-Zone.Com .
You can also get IP address from AIM or MSN with AIM IP Getter and MSN IP Getter.
First, you must know how to use Multi ID Yahoo Messenger and how to use and make Public ID Yahoo Messenger (Just follow the link to find the way to make and use Multi ID and Public ID). I give you that such condition need because of this tips will use that knowledge of using and making Multi ID and Public ID. Remember, this trick only tested in official Yahoo Messenger!
Now prepare to chat and do what I say to make you unbootable. Use Multi ID first. This means that you must login with 2 or more ID in yahoo messenger (Official Yahoo Messenger software run in two or three). One of 2 or more Yahoo ID must have Public ID (its can be 2 or more Public ID). Then please login in to chat room yahoo messenger that you desire or want to join (one of your ID). After that Log in with your another ID in a same room but in this time use your secondary ID (ones of your Public ID) not your primary ID. Now, your 2 ID has been joining in the same room. You have 2 Yahoo ID in the same room.
After that Read carefully this paragraph because this is the core of your protection. Dis-activate or Inactivate your Secondary ID (Public ID) through:
Yahoo Messenger >> Messenger >> My Profile >> Inactive (You secondary ID of Public ID that joining in chat room, not your Primary ID. Your Primary ID always active, and cannot be set to inactive mode)
Now your secondary ID is save with full of protection (in fact, you id is inactive so no one can bother your id). You still use voice talk chat or even webcam using this inactive ID. Amazing? But, wait. Why we must use another ID using Multi ID? The answer is because your inactive ID even still can use voice talk chat and viewing others people webcam, this inactive ID can not see the letter message typed in chat room. To know all activity, especially message text in chat room, you have to use another ID. But, don’t talk, type a message using this ID because this ID wasn’t protected! Just use this ID like ID Spy or Monitoring ID. Use your inactive ID to type a message text, and others activity.
End of tips and trick
You can see the proxy country and the port that the proxy used thru this proxy grabber. It is also available the type of your proxies. It can be anonymous proxies or may be transparent proxies. You can choice which type of proxy and belong to which country they are. After that, save in text file, than scan with proxy checker to check whether your proxies good or bad.
Here I give you a Leet grabber software to grab proxies and used as you want. I almost forget: It all free to download and to use proxy getter. May be I should be named: free proxy grabber or free proxy getter or free proxy finder. Its all up to you.