YAHOO CHIEF ZONE

YAHOO SECTION, TAMIL Mp3 SONGS, TAMIL TORRENTS, TAMIL SONG LYRICS, AND SOFTWARES

3:44 AM

Fix Yahoo Voice With Windows Vista

Posted by C H I E F
2:55 AM

YAH00 B00TER STOP FIRING V7 BY Ramzy_R2R_

Posted by C H I E F
1:09 PM

How do I use a proxy server?

Posted by C H I E F

You may see references to four different types of proxy servers:
  • Transparent Proxy - This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.)

  • Anonymous Proxy - This type of proxy server indentifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users.

  • Distorting Proxy - This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers.

  • High Anonymity Proxy - This type of proxy server does not identify itself as a proxy server and does not make available the original IP address.

Please make sure to read about anonymous proxy risks before using a proxy server.

If you need further assistance using proxy servers please post a question in the proxy server forum.

The following are instructions to configure various browsers to use an http proxy server.

Internet Explorer 6 Proxy Server Configuration Screen
Internet Explorer 6

FireFox Proxy Server Configuration Screen
FireFox

Netscape 8 Proxy Server Configuration Screen
Netscape 8

Opera Proxy Server Configuration Screen
Opera

Instructions for Internet Explorer 6.0
  1. On the Tools menu in Internet Explorer, click Internet Options, click the Connections tab, and then click LAN Settings.
  2. Under Proxy server, click to select the Use a proxy server for your LAN check box.
  3. In the Address box, type the IP address of the proxy server.
  4. In the Port box, type the port number that is used by the proxy server for client connections (by default, 8080).
  5. You can click to select the Bypass proxy server for local addresses check box if you do not want the proxy server computer to be used when you connect to a computer on the local network (this may speed up performance).
  6. Click OK to close the LAN Settings dialog box.
  7. Click OK again to close the Internet Options dialog box.

Instructions for Internet Explorer 5

  1. Click Start, point to Settings, click Control Panel, and then double-click Internet.
  2. Click the Connections tab, click LAN Settings, and then click to select the Use Proxy Server check box.
  3. In the Address box, type the appropriate proxy server information, and use the following format: http://
  4. Click Advanced, and then type the appropriate proxy settings in the Servers area. Use the following syntax for the proxy settings: http://
    : where
    is the Web address of the proxy server, and is the port number that is assigned to the proxy server. For example, if the proxy server's address is "proxy.example.microsoft.com" and the port number is 80, the setting in the Proxy Server box should appear like this: http://proxy.example.microsoft.com:80 Important: If you use a backslash (\) instead of a slash (/) in the proxy server's address, the settings disappear from the Proxy Server box and Internet Explorer does not find the proxy server.

    If you are using the Internet Protocol (IP) address of your proxy server, make sure not to type leading zeros. For example, use 10.25.0.1 instead of 010.025.000.001.

Instructions for Firefox 3.0

  1. Select the Tools Menu
  2. Select Options
  3. Select the Advanced Icon
  4. Select the Network tab
  5. Under connection select Settings
  6. Under Settings you can chose "Auto-Detect Proxy setting for this network" or "Manual Proxy Configuration"
  7. If choosing "Manual Proxy Configuration" Enter the IP address for the HTTP proxy server
  8. Enter the port of the HTTP proxy server
  9. Click Okay

Instructions for FireFox 2

  1. Select the Tools Menu
  2. Select Options
  3. Select Connection Settings
  4. Select Manual Proxy Configuration
  5. Check Use the same proxy for all protocols
  6. Enter the IP address for the HTTP proxy server
  7. Enter the port of the HTTP proxy server
  8. Click Okay

Instructions for Netscape 8.1

  1. Select the Tools Menu
  2. Select Options
  3. Select General
  4. Select Connection Settings...
  5. Check Manual Proxy Configuration
  6. Enter the proxy server's IP address in the HTTP Proxy field and the proxy's port into the Port field.
  7. OK your way out

Instructions for Netscape 7.1

  1. Select the Edit Menu
  2. Select Preferences
  3. Maximize Advanced
  4. Select Proxies
  5. Choose Manual proxy configuration
  6. Enter the proxy server's IP address in the HTTP Proxy field and the proxy's port into the corresponding Port field.
  7. OK your way out

Opera 8.5

  1. Select the Tools Menu
  2. Select Preferences
  3. Select Advanced Tab
  4. Select Proxy Servers
  5. Check the box next to HTTP
  6. Enter the proxy server's IP address in the first box and the proxy's port in the box after "Port"
  7. OK your way out

Safari 2.0.3

  1. Select Preferences
  2. Select Advanced
  3. Select Proxies: Change Settings
  4. Check the box next to Web Proxy (HTTP)
  5. Enter the proxy server's IP address in the first box and the proxy's port in the box after the ":"
  6. Select Apply Now

1:07 PM

Can someone find out who I am?

Posted by C H I E F

Possibly, but most likely not without a subpoena.

In most cases all that can be easily determined is who the person's ISP is and possibly the state and city they reside in.

In some cases with static IP address DSL or business DSL services the ISP provides IP allocation records to the American Registry for Internet Numbers (http://www.arin.net), the non-profit organization responsible for managing Internet numbering resources in North America.

As an example SBC used to include customer information in those allocation records, but due to privacy concerns now uses their own information with a customer reference number.

For users who want to afford themselves some additional level of anonymity we suggest you read about internet anonymity, Proxy Servers, and anonymizing services.

Try using this tool to look up your IP address.

How can someone find out who I am?

A little background first.

IP address allocation is handled by The Internet Assigned Numbers Authority (IANA). IANA in turn, delegate authority to Regional Internet Registries (RIRs). The RIRs, in turn, following their own regional policies, further delegate blocks of IP addresses to their customers, which include Internet Service Providers (ISPs) and end-user organizations.

Each of the RIRs handles a specific geographic area:

  • ARIN (North America and portions of the Caribbean)
  • AfriNIC (Africa)
  • APNIC (Asia and the Pacific region)
  • LACNIC (Latin America and portions of the Caribbean)
  • RIPE (Europe, Middle East, Central Asia)

Each of these organizations allow lookups to be to that data. Different ISP's segment their blocks of IP addresses by region and you can see that in the lookup. The lookup provides the name and address of the organization the block of IP addresses was allocated to. The ISP's can name these blocks if they choose. The naming often indicates a geographic location, for example, IRV-CA, aka Irvine, California.

Here are links to the URLs where you can lookup an IP address. Be aware that if you lookup an Asian allocated IP address in a different region's RIR it will provide a link to the appropriate RIR.

In general, I start by looking up an IP address with ARIN seeing what geographic location information I can learn from the results.

From there I do a reverse DNS (rDNS) lookup to see what hostname the ISP provides. A hostname is something like www.example.com, or can be more specific to include regional information. By visiting this page you can see your own rDNS/hostname. (We'll add the functionality to lookup other IP addresses soon.) This, again, can provide some additional geographic location information.

From there I do a traceroute which displays the hostnames many of the machines in between two points on the internet. (I'm making this *really* none technical here...) Sometimes the rDNS/hostname of a specific IP address will not reveal any location but the rDNS/hostname of the machine next along the path will reveal some.

That's about all the information that can be obtained without a subpoena. In many cases people reveal small amounts of personal information about themselves on forums, chat rooms, blogs, etc that can be used to build a profile of who you might be.

Try using this tool to look up your IP address.

1:04 PM

What is IPv6?

Posted by C H I E F

Internet Protocol Version 6 (IPv6) is a network layer protocol that enables data communications over a packet switched network. Packet switching involves the sending and receiving of data in packets between two nodes in a network. The working standard for the IPv6 protocol was published by the Internet Engineering Task Force (IETF) in 1998. The IETF specification for IPv6 is RFC 2460. IPv6 was intended to replace the widely used Internet Protocol Version 4 (IPv4) that is considered the backbone of the modern Internet. IPv6 is often referred to as the "next generation Internet" because of it's expanded capabilities and it's growth through recent large scale deployments. In 2004, Japan and Korea were acknowledged as having the first public deployments of IPv6.

The explosive growth in mobile devices including mobile phones, notebook computers, and wireless handheld devices has created a need for additional blocks of IP addresses. IPv4 currently supports a maximum of approximately 4.3 billion unique IP addresses. IPv6 supports a theoretical maximum of 2128 addresses (340,282,366,920,938,463,463,374,607,431,768,211,456 to be exact!). Recent advancements in network technology including Network Address Translation (NAT) have temporarily lessened the urgency for new IP addresses, however, recent estimates indicate that IPv4 addresses could be exhausted as soon as 2012.

IPv6 and IPv4 share a similar architecture. The majority of transport layer protocols that function with IPv4 will also function with the IPv6 protocol. Most application layer protocols are expected to be interoperable with IPv6 as well, with the notable exception of File Transfer Protocol (FTP). FTP uses embedded network layer addresses to facilitate data transmission. An IPv6 address consists of eight groups of four hexadecimal digits. If a group consists of four zeros, the notation can be shortened using a colon to replace the zeros.

A main advantage of IPv6 is increased address space. The 128-bit length of IPv6 addresses is a significant gain over the 32-bit length of IPv4 addresses, allowing for an almost limitless number of unique IP addresses. The size of the IPv6 address space makes it less vulnerable to malicious activities such as IP scanning. IPv6 packets can support a larger payload than IPv4 packets resulting in increased throughput and transport efficiency.

A key enhancement over IPv4 is native support for mobile devices. IPv6 supports the Mobile IPv6 (MIPv6) protocol which enables mobile devices to switch between networks and receive a roaming notification regardless of physical location. MIPv6 is a hallmark of the protocol and was specified as a firm requirement during the design of IPv6. The IETF has separate specifications for MIPv6 that detail data structure, messaging, and security requirements.

Auto-configuration is another IPv6 enhancement that is considered a great benefit to network administrators. IPv6 devices can independently auto-configure themselves when connected with other IPv6 devices. Configuration tasks that can be carried out automatically include IP address assignment and device numbering. An IPv6 router has the ability to determine its own IPv6 address using data link layer addressing parameters. The IETF has issued RFC 2462 to set guidelines for IPv6 auto-configuration.

The IPv6 protocol improves upon IPv4 with increased authentication and privacy measures. IPSec security is embedded into the IPv6 specification to manage encryption and authentication between hosts. This built in security framework enables secure data traffic between hosts that is independent of any applications on either host. In this way, IPv6 provides an efficient end to end security framework for data transfer at the host or the network level.

The deployment of IPv6 networks is growing worldwide. Full replacement of IPv4 is expected to take some time, as it remains the most widely used Internet Protocol. The United States, China, and India are leading recent deployments of the IPv6 protocol and have large investments in IPv6 network infrastructure. The United States government has mandated that federal agencies must complete the transition to an IPv6 infrastructure no later than 2008. Software companies are also releasing operating systems that support the IPv6 standard. In 1997, IBM became the first commercial vendor to support IPv6 through its AIX 4.3 operating system. The latest version of Microsoft's Windows operating system, Windows Vista, has full IPv6 support enabled by default.

1:00 PM

How do I change my MAC address?

Posted by C H I E F

Although physical MAC (Media Access Control) addresses are permanent by design, several mechanisms allow modification, or "spoofing", of the MAC address that is reported by the operating system. This can be useful for privacy reasons, for instance when connecting to a Wi-Fi hotspot, or to ensure interoperability. Some internet service providers bind their service to a specific MAC address; if the user then changes their network card or intends to install a router, the service won't work anymore. Changing the MAC address of the new interface will solve the problem. Similarly, some software licenses are bound to a specific MAC address. Changing the MAC address in this way is not permanent: after a reboot, it will revert to the MAC address physically stored in the card. A MAC address is 48 bits in length.

As a MAC address can be changed, it can be unwise to rely on this as a single method of authentication. IEEE 802.1x is an emerging standard better suited to authenticating devices at a low level.

Mac OS X

Under Mac OS X, the MAC address can be altered in a fashion similar to the Linux and FreeBSD methods:

sudo ifconfig en0 lladdr 00:01:02:03:04:05

or

sudo ifconfig en0 ether 00:01:02:03:04:05

This must be done as the superuser and only works for the computer's ethernet card. Instructions on spoofing AirPort Extreme (2.0) cards are available here. There are not, as of yet, any known ways to spoof original AirPort (1.0) cards.

The AirPort Extreme MAC address can also be changed easily with SpoofMac.

Windows

Under Windows XP, the MAC address can be changed in the Ethernet adapter's Properties menu, in the Advanced tab, as "MAC Address", "Locally Administered Address", "Ethernet Address" or "Network Address". The exact name depends on the Ethernet driver used; not all drivers support changing the MAC address in this way.

However, a better solution - requiring Administrative User Rights - is to pass over the System Registry Keys under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}. Here settings for each network interface can be found. The contents of the string value called 'NetworkAddress' will be used to set the MAC address of the adapter when next it is enabled. Resetting the adapter can be accomplished in script with the freely available command line utility devcon from Microsoft, or from the adapters context menu in the Network Connections control panel applet.

There is a nice tool to change the MAC address for all cards (even those that can't be changed through the adapter's Properties menu): SMAC MAC Address Changer

Note: to check your MAC address easily on a Windows XP box, go to Run, type CMD, then type "ipconfig /all" without quotation in the command prompt. The number under physical address is the MAC address. If multiple IP are displayed, you should look under the label "Ethernet adapter x", where x is the name of your connection (which is Local Area Connection by default).

Router

The method to change the MAC address of a router varies with the router. Not all routers have the ability to change their MAC address. The feature is often referred to as "clone MAC address". This take the MAC address of one of the machine on your network and replaces the router's existing MAC address with it. Some support the option to manually enter the MAC address.

12:58 PM

Dynamic vs Static IP Addresses

Posted by C H I E F

There are two methods to assigning IP addresses to computers: dynamic and static.

Static IP addresses are used primarily for servers so that they don't appear to "move" while non-servers are usually assigned dynamic IP addresses. Most dynamic IP address users are users of internet service providers (ISPs) since not all the users of an ISP are online at one time and the ISPs can "get away" with not having enough IP addresses for each user.

In order to use a dynamic IP address, a service such as Dynamic Host Configuration Protocol (DHCP) is used to assign addresses dynamically to devices as they request them. If a static address is used, it must be manually programmed into parameters of the device's network interface. (It is also possible to "fake" static IP address assignments through DHCP by assigning the same IP address to a computer — and no other — each time it is requested.)

12:57 PM

What is a private IP Address?

Posted by C H I E F

When you send a letter from your house to a friend, you have to know the address to send it to so that the postman knows which street and which house to take it to. Computer networks such as the Internet are no different except instead of sending your web traffic to “1145 Main Street”; your computer's location is known as an IP Address.

An IP address is your computer's equivalent of your postal address and just like the mail service, each computer has to have its own address so that it will only receive the information that is meant for it and not anything that is meant for someone else.

While we are used to writing out streets and house numbers on envelopes, inside your computer IP Addresses are usually represented in what is known as dotted-decimal format such as 124.62.112.7 as this is the system that is understood by computers. As you can see, the address is split into 4 sections known as “octets” and each of the four octets can be numbered from 0-255, providing a total of 4,294,967,296 potentially unique IP Addresses.

Now, while 4.2 Billion might seem like a lot, for many years large amounts of these have been allocated and used by large network such as backbone providers, ISPs and large Universities that made up the early Internet While other groups still have been reserved for special purposes and are not usable, so in practice the real amount is far less than 4.2 billion. The problem that we face today is that with many homes owning more than one computer and with cell phones, PDAs and even fridges being enabled for Internet access these days, IP Addresses are running out.

When I mentioned above that some blocks of addresses had been reserved for special purposes, one of these purposes was for private networking and it is these private addresses that help to relieve the pressure on the remaining address space and make possible many of the cable and DSL routers that people have at home today to share their Internet connection amongst many PCs.

So, what are these addresses and how do they work?

The ranges and the amount of usable IP's are as follows:

    10.0.0.0 – 10.255.255.255
    Addresses: 16,777,216

    172.16.0.0 – 172.31.255.255
    Addresses: 1,048,576

    192.168.0.0 – 192.168.255.255
    Addresses – 65,536

For example, if I had 6 computers that I wanted to network, I might number them from 172.16.0.1 up to 172.16.0.6 and this would still leave over a million more addresses that I could use if I were to buy some more computers or if I was networking a large office and needed lots and lots of addresses.

These blocks of addresses can be used by anyone, anywhere – even if your neighbor is using the exact same addresses this won't cause a problem. This is possible because these addresses are known as “non-Routable addresses” and the devices on the internet that move data from one place to another are specially programmed to recognize these addresses. These devices (known as routers) will recognize that these are private addresses belonging to your network and will never forward your traffic onto the Internet so for your connection to work; you will always require at least one real address from the general pool so that your home router can perform what is known as “Network Address Translation”.

NAT is a process where your router changes your private IP Address into a public one so that it can send your traffic over the Internet, keeping track of the changes in the process. When the information comes back to your router, it reverses the change back from a real IP Address into a private one and forwards the traffic back to your computer.

Private addresses and NAT is what makes your home router work and by using them, anyone is able to connect as many computer's as they wish to the Internet without having to worry about running out of addresses and this gives everyone many more years until all the available addresses are used up.

12:54 PM

What is an IP address?

Posted by C H I E F

Every computer connected to the Internet is assigned a unique number known as an Internet Protocol (IP) address.

IP addresses consist of four numbers separated by periods (also called a "dotted-quad") and look something like 127.0.0.1.

Since these numbers are usually assigned to internet service providers within country-based blocks, an IP address can often be used to identify the country from which a computer is connecting to the Internet.

Because the numbers may be tedious to deal with, an IP address may also be assigned to a Host name, which is sometimes easier to remember. Hostnames may be looked up to find IP addresses, and vice-versa.

At one time ISPs issued one IP address to each user. These are called static IP addresses. Because there is a limited number of IP addresses and with increased usage of the internet ISPs now issue IP addresses in a dynamic fashion out of a pool of IP addresses (Using DHCP). These are referred to as dynamic IP addresses. This also limits the ability of the user to host websites, mail servers, ftp servers, and DNS servers. Dynamic DNS services can be used to provide DNS records for servers running on dynamic assigned IP addresses.

In addition to users connecting to the internet, with virtual hosting, a single machine can act like multiple machines (with multiple domain names and IP addresses).

An IP address can sometimes be used to determine the user's general location.

12:50 PM

What is a Proxy Server?

Posted by C H I E F

A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server, then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. In some cases, the proxy may alter the client's request or the server's response for various purposes.

Web proxies

A common proxy application is a caching Web proxy. This provides a nearby cache of Web pages and files available on remote Web servers, allowing local network clients to access them more quickly or reliably.

When it receives a request for a Web resource (specified by a URL), a caching proxy looks for the resulting URL in its local cache. If found, it returns the document immediately. Otherwise it fetches it from the remote server, returns it to the requester and saves a copy in the cache. The cache usually uses an expiry algorithm to remove documents from the cache, according to their age, size, and access history. Two simple cache algorithms are Least Recently Used (LRU) and Least Frequently Used (LFU). LRU removes the least-recently used documents, and LFU removes the least-frequently used documents.

Web proxies can also filter the content of Web pages served. Some censorware applications — which attempt to block offensive Web content — are implemented as Web proxies. Other web proxies reformat web pages for a specific purpose or audience; for example, Skweezer reformats web pages for cell phones and PDAs. Network operators can also deploy proxies to intercept computer viruses and other hostile content served from remote Web pages.

A special case of web proxies are "CGI proxies." These are web sites which allow a user to access a site through them. They generally use PHP or CGI to implement the proxying functionality. CGI proxies are frequently used to gain access to web sites blocked by corporate or school proxies. Since they also hide the user's own IP address from the web sites they access through the proxy, they are sometimes also used to gain a degree of anonymity.

You may see references to four different types of proxy servers:

  • Transparent Proxy - This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.)

  • Anonymous Proxy - This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users.

  • Distorting Proxy - This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers.

  • High Anonymity Proxy - This type of proxy server does not identify itself as a proxy server and does not make available the original IP address.

12:48 PM

IP Address Tools

Posted by C H I E F

The following IP address related tools are provided to our users free of charge. They can be used to help trace or track an IP address.

IP Location, Map, and Details

    This tool provides details about an IP address. It's estimated physical location (country, state, and city) and a map.
    Lookup IP
Email Source IP Address
    This toll helps to determine the source IP address of an email based of the headers of the email. Also displays the estimated location on a map.
    Trace Email
IP Traceroute
    This tool provides a traceroute from our server to the requested IP address. This can be used to help to attempt to come up with a general location of an IP address.
    Traceroute
Visual Traceroute
    This tool provides a mapped graphical representation of a traceroute from our server to the requested IP address.
    Visual Traceroute
DNSbl Check
    This tool will check to see if your IP address is listed with more than 100 DNSbl's as a machine that mail should not be accepted from.
    Blacklist Check
IP to Hostname Lookup
    This tool provides the hostname of an IP address. (ie 192.168.1.1)
    IP to Hostname
Hostname to IP Lookup
Advanced Proxy Check
    If you are using a proxy server use this tool to check and see if any information is being exposed.
    Proxy Tester

12:46 PM

How do I hide my IP address?

Posted by C H I E F

The most common method to hide your IP address is to use a proxy server in one form or another. A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server and then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. In some cases, the proxy may alter the client's request or the server's response for various purposes.

There are several implementations of proxy servers that you can use to hide your IP address (in an attempt to remain anonymous on the internet):

    Website Based Proxy Servers

    A Website based proxy server is a website that provides a form for you to enter the URL of a website that you wish to anonymously visit. When you submit the form the website proxy server makes a request for the page that you want to visit. The machine usually does not identify itself as a proxy server and does not pass along your IP address in the request for the page. The features of these sites vary (ad blocking, javascript blocking, etc) as does their price. Some are free and some charge. Examples of website proxy services are:

    Browser Configured Proxy Servers

    There are also stand alone proxy servers that allow for you to configure your browser to route your browser traffic through that machine, which then makes a request for a page on your behalf, and then sends you the results. These are usually used at no cost to the user. Since they are accessible to the public these are often quite slow. Please see instructions for using a proxy server. There are a variety of types of these proxy servers:

    • Transparent Proxy - This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.) This type of proxy server does not hide your IP address.

    • Anonymous Proxy - This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users. This type of proxy server will hide your IP address.

    • Distorting Proxy - This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers. This type of proxy server will hide your IP address.

    • High Anonymity Proxy - This type of proxy server does not identify itself as a proxy server and does not make available the original IP address. This type of proxy server will hide your IP address.

    Installed Software Proxy Servers

    There are a variety of companies and software packages available at either a onetime cost or at an annual subscription. These are usually faster and more reliable than the above proxy servers. Some of these services would include:


Anonymous Proxy Risks

In using a proxy server (for example, anonymizing HTTP proxy), all data sent to the service being used (for example, HTTP server in a website) must pass through the proxy server before being sent to the service, mostly in unencrypted form. It is therefore possible, and has been demonstrated, for a malicious proxy server to record everything sent to the proxy: including unencrypted logins and passwords.

By chaining proxies which do not reveal data about the original requester, it is possible to obfuscate activities from the eyes of the user's destination. However, more traces will be left on the intermediate hops, which could be used or offered up to trace the user's activities. If the policies and administrators of these other proxies are unknown, the user may fall victim to a false sense of security just because those details are out of sight and mind.

The bottom line of this is to be wary when using proxy servers, and only use proxy servers of known integrity (e.g., the owner is known and trusted, has a clear privacy policy, etc.), and never use proxy servers of unknown integrity. If there is no choice but to use unknown proxy servers, do not pass any private information (unless it is properly encrypted) through the proxy.

12:41 PM

Yahoo Webcam Recorder

Posted by C H I E F

Need to record Yahoo Webcam? Yahoo Web cam Recorder is the answer of you problem. Unfortunately, this is only a demo version that has 60 seconds recording time limited and watermark on the output video. For demo version you can used freely, but if you want to have a full version of ahoo Webcam Recorder, and record webcam to video as long as you like, you have to purchase this Software.

For demo version you can download below:

Click here to download

You can also use YIntai or YahCamView to record or save Yahoo Messenger Webcam

Need to disguise or make your webcam unreal or not real? With this tool you never need to show up your face in your web cam, instead of your face will be take place by other place thru video movie or else. Because this is a Fake Web cam. You can play Movies in You Webcam for MSN WLM AOL and Yahoo Messenger without have an actual webcam. This can be used to shared you video movies to your friends. Short review of this software:

"From day one, since I downloaded your wonderful program, Fake Webcam, I say "Thank You" everytime I share my baby's video with my parents abroad. It's the most useful program I have downloaded. I love it!!!!" - Brian Baker

"It is rare to find software that is compact, efficient, and will work as promised. As an experienced PC user, I must have tried and rejected a dozen or more screen recorder programs, both purchased and free. Webcam Screen Recorder is a keeper! - Peter, Canberra

"You people have my gratitude and adoration for doing this software Fake Webcam. I have wasted so much time and money for lots. I appreciate the chance to use it. Thank you very much." - Fred
So if you use Y intai, there will be higher acceptability of your requesting in their web cam if you use Fake web cam, especially when you fake cam is a good looking face. Here, I give you free fake webcam software. Enjoy this fake cam in your yahoo world. This is only trial Version. YOu have to buy to continue using this Fake Webcam

Download Fake Webcam Trial Version

If you want to Buy a Full Version you can use the link on the Fake Webcam Trial Version or just go to the link that I give you below:

Buy Fake Webcam Full Version

In Yahoo Messenger Webcam the look of this Fake Webcam would to be like this:


And for Windows Live Messenger aka MSN Webcam would be like this:

12:36 PM

Yahoo Messenger Old Version

Posted by C H I E F

For some reason, Yahoo Messenger Old Version such as YM version 6 or YM version 7, need to install in your computer. It because you do not really like the newer one or because you want to install program that need Yahoo Messenger Old Version. Y! Intai is one of software that needs Yahoo Messenger Old Version to be installed. YahCamView also need YM old version to work properly.

Unfortunately, you cannot download or find Yahoo Messenger Old Version if you go to the official website of Yahoo Messenger. It is because Yahoo always suggests you to use her newer update of Yahoo Messenger. This also mean that you used yahoo messenger version 7 IM (instant message)

Click here to download

Don’t be sad if you cannot download Yahoo Messenger Old Version from there. I will help you to download Yahoo Messenger Old Version in this article. Here I give you a link to download Yahoo Messenger Old Version or download free yahoo messenger 7, Enjoy It.

Alternative link for YM 7 Download:

http://www.freecreed.com/downloads/yahoo!/ymsgr_7.0.0.242.exe
http://www.freecreed.com/downloads/yahoo!/ymsgr_7.0.0.426.exe
http://www.freecreed.com/downloads/yahoo!/ymsgr_7.0.2.120.exe
http://www.freecreed.com/downloads/yahoo!/ymsgr_7.5.0.814.exe
http://www.freecreed.com/downloads/yahoo!/ymsgr7.5.0.647.exe

If you need yahoo Messenger Version 6, just download via link below:

Click here to download

For alternative download of YM Version 6 just type or copy the url below to your browser:

http://www.freecreed.com/downloads/yahoo!/ymsgr_6.0.0.1922.exe

Related Articles:

  1. Yahoo Messenger 8 Free Download
  2. Yahoo Messenger for Windows Vista
  3. Yahoo Messenger 9 Free Download

How you change your yahoo password? You must take a few steps via internet browser to change your password. Consequently, you step to change your password spend long time to make a change. You have to login your yahoo ID and type a password in a internet browser, than you must click some link to the directions where you can change your password

If you have 2 ID or more, you must repeat that step. If you have 4 ID to be changed its password you must take 4-time cycle of the steps. It very boring and spend a lot of time.

With a Yahoo Password Changer, you only have to type your ID and password, and then type your new password. With one click, you already have changed you password. This Password Changer available to change five 5 ID all at once.

Click here to download

Here I will give you a link where you can download this Yahoo Password Changer with a free of charge.

12:33 PM

Yahoo Boots Program: What is and What for?

Posted by C H I E F

Yahoo Boots Program is software that developed to load a certain kind of bots then use it to flood ( yahoo messenger bots flood) somebody else in yahoo messenger chat wiht yahoo booter id. Without yahoo boots program or booter program a lamer cannot attack us or make us disconnected. Sometime, yahoo boot program is developed to attack a special chat client such as YahElite, Yazak, YmLite or else.

Yahoo boots program and the activities to use and operate it, is an illegal activity and again yahoo policies. If you run this yahoo boot software or boot program or yahoo booter program, it could be dangerous to yourself because yahoo can ban you. Fortunately, if you were banned only your username, but if you were banned your IP, it could be harmful, because you never be login in yahoo messenger again.

Yahoo boots program use bots as a bullet to attack the target. If yahoo boot program using PM bomb to attack you, its mean that they will attack you thru Private message flooding and you will receive a hundred or a thousand PM windows in your computer windows. It is dangerous to yourself because you could disconnect. I suggest you to use anti boots program to protect yourself from further damage thing.

Please don’t be a lamer and makes the yahoo chat became a world crazy thing just like our real world. Be a good chatter and don’t ever try to use yahoo boots program and become a booter or lamer. Save our yahoo, be away became or user of boot program. Protect yourself with anti boot

I m sorry that I am not sharing with you yahoo booters download or link of yahoo boot progs. If you want boot for yahoo chat, and became a lamer, it up to you. There are many boot for yahoo chat, you can easily have boot for yahoo via newest download boot thru underground site.
that I have given to you before.

12:32 PM

BuddyFucka Remove Your ID from Friend List

Posted by C H I E F

If you read my article about how to remove your ID from your friends list of Yahoo Messenger before, I hope you will understand about what I will talk about in this article. Yes, I would talk about another software to use to remover your ID. This software has a name BuddyFucka. Why the author name like that? I don’t understand.

When I run this software for the first time, I face an error with it. Buddy Fucka need a file that not listed in the folder of this software. But don’t worry about that. I have added a file that needed by this software so you can run it properly.

You don’t have to install this software. All you have to do is extract it into a folder and run it with one click. Here I give you a link to download Buddy Fucka with no payment at all. Be sure that you use this software wisely.

Click here to download

If you want to reverse the action of DenyBuddy or BuddyFucka, you can try AddBuddier that will make you have many friends add without need a permission.

12:30 PM

Get n Find MSN IP Address: MSN IP Getter

Posted by C H I E F

In Yahoo Messenger You can Get Yahoo Messenger IP Address of Your Friend Yahoo ID using Sharp IP Getter or type netstat-n command in command prompt while you use you Peer to Peer YM such as Send File or use webcam. Actually, you can do with the same thing like Sharp IP Getter in MSN Messenger. Yeah, You can Get MSN IP Address or Find MSN IP with small tools calls as SixthSense MSN IP Getter and MSN Status Finder. The Look of the software is like this:



You can download MSN Getter thru this link below:

Click here to download

After you download Sixth Sense MSN IP Getter, extract it with winzip or winrar, then run it. Type you MSN ID or Hotmail ID with its Password then Type your desired Username or ID of your Friend in MSN then push the button of "Get IP Address". Now, you can see the address of your MSN friend IP.

Enjoy it

12:29 PM

Blue Port Scanner: Easy to Find an Open Port

Posted by C H I E F

We are connected to internet using a kind of system connection. Like a home or building that has a window or a door to connect with others neighborhoods, connection system of our internet also use a kind of window or door. Port in internet has a behavior like a door or window in a house. We connected to internet must have a port that open to the World Wide Web. If we do not open our port or door, we never get connection to internet.

For some reason, sometime we want to check our port or door is open or not and which our ports is open. If we want to open some others port we can do this, as we want to. It is just like doors in a house that we want to open or close. How many ports open? What for? Its depend on the owner of the ports.

If we want to check which port is open, we can use a port scanner to do this job. With a port scanner, we can find which one or more of ports in some house [mean our internet address] that opened. Therefore, we can do a lot of thing if we knew some port that been opened by host or owner.

Blue Port Scanner is one of port scanner that I love to using its. Many of my friends also used this software to scan an open port. I ever compare with other port scanner, but the result is Blue Port Scanner has faster time then the others. Blue Port Scanner is also easy to install and easy to use. I recommended you to use this kind of Port Scanner to Scan your port or your friend port. Here I give you a link to Download Blue Port Scanner.

Click here to download

For yahoo messenger port, I have write about port in yahoo messenger before.

Note Blue Port Scanner is freeware software. You can also download this port scanner via official web site at www.BlueBitter.de

What is Proxy Checker?

Proxy Checker is program that scans a list of proxies to see if they are bad or good. Therefore, with a list of good proxies, you can use then for any reason you ma have. You may use a proxy to protect your self from illegal activities during surfing in the internet or chat in yahoo messenger. If someone get your IP, its can be dangerous if they are attacking you. You can protect your IP using proxy to disguise your IP.

How to use it

Proxy Checker needs a list of proxys to be loaded in. First, you have to have a list of proxies in a text file .txt file. You can find a huge of proxy list thru the internet or you can also use proxies finder program to make this job. Click load and load the text file proxies then click start. The proxy checker will check and see whether they are bad or good. Check the ones that are bad and click it to remove bad proxy. Click to save a good proxy.

Sometimes, you can use a web proxy checker or proxy scanner to do this job. But, I rather suggest you to use proxy checker software than web proxy checker. Web proxy checker usually only scan a few number of proxies, and usually make a long time to scan all proxies you have. With proxy checker software, you can scan a huge number of proxies and usually have a faster speed scanning than using web proxy scanner.

HereI give you a link to download Demons Proxy Checker. Ones of good proxy checker that I ever used. It’s all free to download and use because it free proxy checker or scanner.

12:23 PM

AIM IP Tools: Find AIM Internet Protocol

Posted by C H I E F


n yahoo messenger you can find the Internet Protocol or Ip of your friend through special steps with command prompt or with Sharp IP Getter. If you can find or get the IP of YM friend in Yahoo, it also available for you to know the IP of your friend for AIM Messenger. You can use AIM IP Tools to seek and find or get Internet protocol of your friend in AIM messenger.

Click here to download

Internet Protocol or IP is an address used by a person to connect to the internet. An Internet Protocol address also mean the identity of the person in the World Wide Web. Internet Protocol also has the information of location where the person is stays and connects to internet. If the person who connects to internet doesn’t use proxy, we can track the location of her or his country by knowing his IP (Internet Protocol Address). Internet Protocol Address sometime can also track the city where the person location is.

Because this article is discussing about find or get IP from yahoo messenger, I want to share my knowledge about getting or finding person location by using yahoo messenger. Sometime when we are chatting with a friend via Private Message or Instant Message (PM or IM), we curious where the place of our friend is. If you using official yahoo messenger it is an easiest way to find your friend Internet Protocol address. Please read my tutorial below carefully and I guarantee you will be able to track and find the Internet Protocol Address of your friend.

First step we must to do is get a PM or IM with your friend user name or id. Then try to send a file (picture, mp3, etc), then wait until your friend accepted your file and your file begin transferred to him. If your and your friend connection has a huge bandwidth, I suggest you, to send a bigger byte of file. You also don’t have to do this step if you have their web cam yahoo messenger. After you done this thing, do the next step below (you can do this step before send a file).

Go to the command prompt application. If you don’t understand just follow this step (windows XP):

Start >> Run >> cmd >> Enter

Or

Start >> Programs >> Accessories >> Command Prompt

You will see a windows command prompt appear. Then write a command “netstat –n” or netstat –a” and press enter. Please note that the symbol “ not included when you type that command. You will see information under Active Connections list of Proto, Local Address, Foreign Address and State.

Active Connections indicate the connections being connected to your computer. Proto show the protocol you use to. Local Address refers to Internet Protocol in you LAN connection. Foreign Address indicates the Internet Protocol connection that connect to you and the port they used.

Now you just to seek a remote port that used by foreign address. Usually remote port 80 or 81 is used to transfer a file. Remote Port 5050 used for private message. And 5100 used for web cam. And Remote Port 5000 or 5001 used for voice chat.
The IP address of PM not the real IP of your friend. It belongs to yahoo server IP. But if you send a file or receive a web cam you will be get a real IP of your friend address because yahoo use Peer to Peer connection to service this utility.

Download Sharp IP Getter


If you want a better way to get Internet Protocol of your friend, there are many software that designed and developed to get IP address. One of this software I ever tested and worked is Sharp IP Getter. We do not need to send a file or get a web cam to know the Internet Protocol of your friend. We only need have Private Message.

Sharp IP Getter developed by a team of Sharp Team. You can also download this free software via this website Www.Sharp-Soft.Net or wWw.Sharp-Zone.Com .

You can also get IP address from AIM or MSN with AIM IP Getter and MSN IP Getter.

12:09 PM

Yahoo Boot Protection Tips That You Never Knew

Posted by C H I E F

Make a chat conversation in chat room of yahoo messenger with save without any problem from lamer sometime not as easy as learn how to boot. Unofficial Yahoo Messenger Chat Client such as YahElite Yahaven Yazak, YHook that been developed to protect from this annoying activity, some time didn’t enough, especially, if we did not familiar using that chat client. Now, after I wrote some tips and trick to protect your chat in yahoo messenger (you can read that posts here,here and here), I will give you another simple trick and tips.

First, you must know how to use Multi ID Yahoo Messenger and how to use and make Public ID Yahoo Messenger (Just follow the link to find the way to make and use Multi ID and Public ID). I give you that such condition need because of this tips will use that knowledge of using and making Multi ID and Public ID. Remember, this trick only tested in official Yahoo Messenger!

Now prepare to chat and do what I say to make you unbootable. Use Multi ID first. This means that you must login with 2 or more ID in yahoo messenger (Official Yahoo Messenger software run in two or three). One of 2 or more Yahoo ID must have Public ID (its can be 2 or more Public ID). Then please login in to chat room yahoo messenger that you desire or want to join (one of your ID). After that Log in with your another ID in a same room but in this time use your secondary ID (ones of your Public ID) not your primary ID. Now, your 2 ID has been joining in the same room. You have 2 Yahoo ID in the same room.

After that Read carefully this paragraph because this is the core of your protection. Dis-activate or Inactivate your Secondary ID (Public ID) through:

Yahoo Messenger >> Messenger >> My Profile >> Inactive (You secondary ID of Public ID that joining in chat room, not your Primary ID. Your Primary ID always active, and cannot be set to inactive mode)

Now your secondary ID is save with full of protection (in fact, you id is inactive so no one can bother your id). You still use voice talk chat or even webcam using this inactive ID. Amazing? But, wait. Why we must use another ID using Multi ID? The answer is because your inactive ID even still can use voice talk chat and viewing others people webcam, this inactive ID can not see the letter message typed in chat room. To know all activity, especially message text in chat room, you have to use another ID. But, don’t talk, type a message using this ID because this ID wasn’t protected! Just use this ID like ID Spy or Monitoring ID. Use your inactive ID to type a message text, and others activity.

End of tips and trick

I have given you software and a short article about proxy checker. To complete proxy checker, here, I give you software to get proxies as fast as possible and as more as possible. With this proxies finder or grabber program, all you have to do is waiting until the proxy grabber get a list of proxies that you desire. If you think it is enough proxies that been grabbed, you can stop proxy Grabber. Save the list of proxies that you get in notepad or .txt file.

You can see the proxy country and the port that the proxy used thru this proxy grabber. It is also available the type of your proxies. It can be anonymous proxies or may be transparent proxies. You can choice which type of proxy and belong to which country they are. After that, save in text file, than scan with proxy checker to check whether your proxies good or bad.

Here I give you a Leet grabber software to grab proxies and used as you want. I almost forget: It all free to download and to use proxy getter. May be I should be named: free proxy grabber or free proxy getter or free proxy finder. Its all up to you.

Webmaster Earn Money Here!