Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Monday, January 18, 2010

Breaking Administrator’s Password





Administrator password can be broken by replacing sam file in system32\config by the sam file in repair folder of windows. it can be easily done on a machine with dual operating systems, simply log on to os other then the one whoes password is to be cracked the way is exactly same as written above but if there is a single os on a machine then there is only one way i.e to use ms dos start up disk or some other boot disk and replace the sam file in config folder with the one in repair folder
note:- this method works only if hard drive is FAT32 formatted because NTFS drive does’nt take boot from Ms DOS
This way you can remove the old administratOr password as if the windows is newly installed and the password was’nt set.

Sunday, January 17, 2010

when Orkut is Blocked..Surf Anonymously using JAP!!



No problem if orkut/youtube etc is blocked in your office or college or school….and you are fed up of using proxy websites and there low urfing speeds.And what worse if these proxy websites are also blocked…..phew!!!!
But no problems….. Download JAP & Download Ultrasurf and easily surf any blocked website with anonymity

Step 1: Download JAP or ultrasurf
Step 2: Execute Setup file [may take few minutes depending upon internet speed]
Step 3: Change you Explorer LAN connection settings

Change the default gateway IP to 127.0.0.1 and port 4001

Thats it you have gained independence to free to surf any website….

when Orkut is Blocked..Surf Anonymously using JAP!!

Saturday, January 16, 2010

Find the “real” IP address of a web site



You can use the PING utility included with Windows to determine the “real” IP address of a web site. Before using this utility, make sure you are not mapping a host name to some IP address with HostName Commander, because if you do, the PING utility will show the address you’ve set up with HostName Commander, instead of the “real” IP address.
To run the PING utility, click on the Windows Start button, and choose Run from the Start Menu. If you use Windows 95,98, or Me, enter “command” (without the quotes) as the command line to run. If you use Windows XP,2000, or NT, enter “cmd” (again, without the quotes). Click OK and the command prompt window should appear on the screen.
ping.jpg

Now enter the word “ping” (without the quotes) followed by a space, followed by the host name you want to determine the IP address of, and press Enter:
In this example, the IP address of the host name www.rkgit.edu.in is 74.52.201.2 & IP Address of the host name www.kiet.edu is 220.225.19.55 . (Keep in mind that the IP address may change in the future!). If the PING utility reports an error, make sure your computer is connected to the Internet when you are running it.

Friday, January 8, 2010

Security Tips for CD

Security Tips for CD

CD-checking software package securities are practiced along nearly all platforms distributed on compact disk. The products therein category range from precise acerose defenses (that aren't actual security versus crackers in the least) to extremely advanced preventive software. The easier products exclusively check to catch whether a platform got down functioning without the exact compact disk, which would imperil the program's functionality. Thither is a lot of methods to discover whether the original compact disk has constituted stuck in into a compact disc read-only memory drive. And, while most overprotective software are helpless versus "burned" compact disks, it could leastwise come through inconceivable to merely copy a program to a hard drive.
One and only argue to apply such that simple defenses are to protect versus the questionable "ripping" of bets on. "Ripping" denotes to the removal of ample merely inessential portions of the game, like music, animation or DirectX. The shriveled games are then packed together so that people on slower connections could download them from the cyberspace, therefore importantly maximizing the amount of pirated copies.

The classical compact disk checkers have their place in the globe, and while correctly programmed, could cause troubles even for the finer crackers. All the same, these protections are frequently easy to discover and bump off.

Sunday, December 27, 2009

Locking the desktop

Locking the desktopIf you are leaving your computer for a while and do not wish to turn it off, but want to assure that no-one else can use the computer while you are away, locking the desktop is the best option.

By pressing WINDOWSKEY+L, you password protect your system just as if you had logged out or restarted the computer. The advantage is that any programs or processes that were running when you locked the desktop will stay open and running in the background, ready for you to resume work or play.


Windows XP is like a big ocean of tips and tricks. In the coming days I will add more and more Windows XP tips, tricks and hacks to this article.

Saturday, December 26, 2009

Force windows XP to reboot upon crashing

Force windows XP to reboot upon crashing
This registry edit will cause your system to reboot itself automatically upon crashing. This can be useful if you have a reason for keeping your system on 24/7:

Open REGEDIT

Navigate to 'HKEY_LOCAL_MACHINE\SYSTEM
\CurrentControlSet\Control\CrashControl'

Tuesday, December 22, 2009

Creating a desktop shortcut for locking your pc !

Creating a desktop shortcut for locking your pc !If you use your computer in an area where others may have access to it, and there are things on your system you would rather have kept confidential, locking your desktop when you leave the computer is an essential task. Here's a recipe for a desktop shortcut that will lock your computer in two easy clicks:

Right click on an empty area of the desktop and choose 'new' then 'shortcut.' The create shortcut wizard will open; in the first text box, type '%windir%\System32\rundll32.exe user32.dll,LockWorkStation' and then give your shortcut an appropriate name on the next page, and hit 'finish.'

You will notice that the shortcut you created has a blank icon. To select a more appropriate one, right click on the shortcut and hit 'properties.' In the 'shortcut' tab, click the 'change icon' button.

In the 'look for icons in this file' box, type '%SystemRoot%\system32\SHELL32.dll' then click 'ok' to see a range of icons for your new shortcut. Choose an appropriate icon. Your desktop locking shortcut is now ready for use. Test it out.

Tuesday, December 15, 2009

How to find the IP address of the email sender in Yahoo! Mail

Guide to tracking of emails to find sender's IP address using email headers.

In this tutorial i shall be writing about the trick to get the IP Address of sender in Yahoo Mail. This is useful if someone is spamming your inbox with junk mail or any other reason you may have to find the location of the email sender.

How to find the IP address of the email sender in Yahoo! Mail
Note: You won't be able to find the real IP address if the sender uses an anonymous proxy server.

Here is a step by step guide to get the IP address of an email sender in Yahoo! Mail:

1. Log into your Yahoo! mail with your username and password.
2. Click on Inbox or any folder where you have stored your mail.
3. Open the mail
4. At the bottom right region of the email, you'll see there is a drop-down option "Full Headers". If you can't find it press Ctrl+F and search for "header".

How to find the IP address of the email sender in Yahoo! MailHow to find the IP address of the email sender in Yahoo! Mail
5. Click on it and look for Received: from followed by the IP address between square brackets [ ].

How to find the IP address of the email sender in Yahoo! Mail
6. That should most likely be the IP address of the sender. If there are many instances of Received: from with the IP address, select the IP address in the last pattern. If there are no instances of Received: from with the IP address, select the first IP address in X-Originating-IP.

Now, you can find the exact location of the sender by using GeoBytes IP Locator or IP2Location.

Saturday, December 5, 2009

Recover Lost Instant Messenger Passwords with MessenPass

Recover your lost password for MSN Messenger, Yahoo Messenger, ICQ, etc.

Recover Lost Instant Messenger Passwords with MessenPassMessenPass is a password recovery tool that reveals the passwords of the most popular instant messenger applications, such as MSN Messenger, Live Messenger, Yahoo! Messenger, Google Talk, ICQ, Trillian, Gaim and many more.

Recover Lost Instant Messenger Passwords with MessenPass
MessenPass reveals the passwords of the following instant messenger applications:

  • MSN Messenger
  • Windows Messenger (In Windows XP)
  • Windows Live Messenger (In Windows XP And Vista)
  • Yahoo Messenger (Versions 5.x and 6.x)
  • Google Talk
  • ICQ Lite 4.x/5.x/2003
  • AOL Instant Messenger v4.6 or below, AIM 6.x, and AIM Pro.
  • Trillian
  • Trillian Astra
  • Miranda
  • GAIM/Pidgin
  • MySpace IM
  • PaltalkScene
  • Digsby
Download

The application can only be used to recover the passwords for the current logged-on user on your local computer, and it only works if you chose the remember your password in one of the above programs.

Sunday, November 22, 2009

Learn about Linux security

Learn about Linux security

General overview of security issues that face the administrator of Linux systems.

Although linux-based operating systems are considerably safer when compared to Windows and Mac OSX, there are still steps that you can take to ensure that your linux box stays safe and protected. In this post I will illustrate a few techniques you can use to keep your machine locked down tight.

1. Firewalls are your guardian angels.

First of all, keep a software firewall active on your system, and restrict access to ports that allow remote access into your system, a good idea is to allow only a few select hosts access to ports used by services such as ssh (port 22) or telnet (port 23). Keeping a firewall in place ensures that you alone dictate who gets to access remote services on your computer and who doesn’t. To set up a firewall in linux, you can use the iptables program which comes standard with most linux distributions. However, iptables is quite difficult and complicated to set up correctly, and you will need to spend some time fiddling with the command line, but it is very flexible and powerful once configured correctly.

If messing about with iptables dosen’t appeal to you, there are frontends to iptables that you can use to set up effective firewalls. One such frontend is ufw (uncomplicated firewall) this program comes standard on ubuntu and is quite simple to set up, to use it you first have to enable it by typing in ’sudo enable ufw’ in the terminal, once the ufw service is active, adding rules is as simple as ’sudo allow 22/tcp’ > this statement allows all tcp traffic on port 22, swap allow for deny and you have the ssh service blocked, Its that simple, much easier than mucking about with iptables.

Of course, there are many people who do not like the idea of using command-line programs and like all their apps to be graphical. If you prefer a GUI configured firewall, then firestarter is the choice for you. Firestarter is a breeze to use, and has good documentation available on the firestarter website.

2. Passwords are for your protection, choose them well

Choose good user passwords, especially for root. One way to choose a secure password is to take a sentence, reduce it to an acronym and then replace some letters of the acronym with symbols and add some numbers to it. this mixing of alphabets, numbers and symbols, along with its long length will be a strong password.

Never use actual words that have meaning as passwords. These types of passwords are weak and can be cracked using dictionary attacks. Also along those lines: Never use words that hold personal significance with you.. i.e don’t use passwords that people who know you will be inclined to think that you would use, like a favorite pet’s name.. etc.

And for god’s sake, don’t use the word ‘password’ as a password…. ( don’t laugh… thats one of the most common passwords .. )

3. Use antivirus

Yeaps you read right.. antivirus. Antivirus on linux you say? Yes, linux has antivirus suites as well , but this is more for cleaning off your thumbdrives that you may have used in an infected windows machine than for killing linux viruses, as the system of user permissions for executing files makes linux a very inhospitable place for computer viruses to live. clamAV is a good antivirus choice, with a GUI version available for most major distros.

4. Be careful what scripts you get off the net


Getting bash scripts off the net is convenient, but be careful what scripts you run on your system, and make sure you check them out first. If you suspect that a script you got has some nasty intentions behind it, but you do not have the expertise in bash scripting to be sure, post the script in text form on linux support forums and the community will help you out. Unfortunatly, there are idiots out there who write destructive shell scripts and release them into the wilds of the internet, in this case intuition is your best defence.

5. Encrypt sensitive data that you may have.

The concept behind encryption is relatively simple, make the data to be encrypted unreadable to anybody besides authorised users.
My favourite program for encrypting data on linux AND windows would have to be truecrypt. Truecrypt works by creating a virtual volume which you can then set a passphrase or security key to. When you mount the virtual volume, you can then add files to it, which will be totally encrypted and unviewable once unmounted. The only way to mount the drive is to supply the passphrase or key.

6. Keep your BIOS set to boot from your harddrive and then add a password to your bios.

This is to keep people from booting off from live CDs and cracking your password from them. Although it is relatively easy to reset the BIOS password, this should be at least a minor detterance to those who may try this cracking method.

Well, there you go.. hopefully you wil use these tips and make your system a safer box to work on.

For more information regarding iptables check out this site

Do you have questions, comments, or suggestions? Feel free to post a comment!

Tuesday, October 20, 2009

Ways to prevent your PEN drive from VIRUS

Ways to prevent your PEN drive from VIRUS
*Now go to Start--> Run and type cmd to open the Command Prompt window .

*Now go to My Computer and Check the Drive letter of your USB drive or Pen Drive.
( E.g. If it is written Kingston (I), then I: will be the drive letter .)

*In the Command Window ( cmd ) , type the drive letter: and Hit Enter .

*Now type dir/w/o/a/p and Hit Enter

*You will get a list of files . In the list , search if anyone of the following do exist

1. Autorun.inf

2. New Folder.exe

3. Bha.vbs

4. Iexplore.vbs

5. Info.exe
6. New_Folder.exe

7. Ravmon.exe
8. RVHost.exe or any other files with .exe Extension .

If you find any one of the files above , Run the command attrib -h -r -s -a *.* and Hit Enter.

Now Delete each File using the following Command del filename ( E.g del autorun.inf ) .

Monday, October 19, 2009

Free Security Enhancements

Free Security Enhancements
1. Check Windows Update and Office Update regularly (_http://office.microsoft.com/productupdates); have your Office CD ready. Windows Me, 2000, and XP users can configure automatic updates. Click on the Automatic Updates tab in the System control panel and choose the appropriate options.

2. Install a personal firewall. Both SyGate (_www.sygate.com) and ZoneAlarm (_www.zonelabs.com) offer free versions.


3. Install a free spyware blocker. Our Editors' Choice ("Spyware," April 22) was SpyBot Search & Destroy (_http://security.kolla.de). SpyBot is also paranoid and ruthless in hunting out tracking cookies.

4. Block pop-up spam messages in Windows NT, 2000, or XP by disabling the Windows Messenger service (this is unrelated to the instant messaging program). Open Control Panel | Administrative Tools | Services and you'll see Messenger. Right-click and go to Properties. Set Start-up Type to Disabled and press the Stop button. Bye-bye, spam pop-ups! Any good firewall will also stop them.

5. Use strong passwords and change them periodically. Passwords should have at least seven characters; use letters and numbers and have at least one symbol. A decent example would be f8izKro@l. This will make it much harder for anyone to gain access to your accounts.

6. If you're using Outlook or Outlook Express, use the current version or one with the Outlook Security Update installed. The update and current versions patch numerous vulnerabilities.

7. Buy antivirus software and keep it up to date. If you're not willing to pay, try Grisoft AVG Free Edition (Grisoft Inc., w*w.grisoft.com). And doublecheck your AV with the free, online-only scanners available at w*w.pandasoftware.com/activescan and _http://housecall.trendmicro.com.

8. If you have a wireless network, turn on the security features: Use MAC filtering, turn off SSID broadcast, and even use WEP with the biggest key you can get. For more, check out our wireless section or see the expanded coverage in Your Unwired World in our next issue.

9. Join a respectable e-mail security list, such as the one found at our own Security Supersite at _http://security.ziffdavis.com, so that you learn about emerging threats quickly and can take proper precautions.

10. Be skeptical of things on the Internet. Don't assume that e-mail "From:" a particular person is actually from that person until you have further reason to believe it's that person. Don't assume that an attachment is what it says it is. Don't give out your password to anyone, even if that person claims to be from "support."

Sunday, October 18, 2009

How to see secure sites?

How to see secure sites?
Fix the problem with seeing them secrue sites (banks or online stores) i found this very usefull to me at my work (isp backbone support lol, at the time i was regular support )

Any way... what u need to do is make a new notepad file and write in it the followng DLL's.. just copy-paste these

regsvr32 SOFTPUB.DLL
regsvr32 WINTRUST.DLL
regsvr32 INITPKI.DLL
regsvr32 dssenh.dll
regsvr32 Rsaenh.dll
regsvr32 gpkcsp.dll
regsvr32 sccbase.dll
regsvr32 slbcsp.dll
regsvr32 Cryptdlg.dll


and save it as > all file types, and make it something like securefix.bat.

then just run the file and ur problem shuld be gone.

Saturday, October 17, 2009

Trick to Lock ur PC yourself

Trick to Lock ur PC yourself
lock ur pc.. open notepad copy and paste the script below and save it .VBS extention
This wil create a shortcut.. run(click) it

set WshShell = WScript.CreateObject("WScript.Shell")
set oShellLink = WshShell.CreateShortcut(wshShell.SpecialFolders("Desktop") & "\LockWorkstation.lnk")
oShellLink.TargetPath = "%windir%\system32\rundll32.exe"
oShellLink.Arguments = "user32.dll,LockWorkStation"
oShellLink.Save

first select a folder for example i'll use a folder name movies in D drive D:\movies\

in the same drive u create a text file and type

ren movies movies.{21EC2020-3AEA-1069-A2DD-08002B30309D}

and save it as loc.bat

again u type in a notepad as

ren movies.{21EC2020-3AEA-1069-A2DD-08002B30309D} movies

and save it as key.bat

now in D drive u can see two batch files loc and key.. when u double click loc the movie folder will change to control panel and whn u double click key the control panel will change to normal folder..

there are two more different tricks in dis site to lock ur pc down in a unique ways.. donno where i have typed it.. !!!

Thursday, October 15, 2009

A Fork Bomb Used To Freeze A PC

A Fork Bomb Used To Freeze A PC
This is a small code , which will make a command run over and over until the computer cannot handle any more programs and the computer will freeze or shutdown.
THIS IS HARMLESS AND WILL DO NO DAMAGE TO YOUR COMPUTER

To make this open note pad and type:

@echo off
:START
start a.bat
GOTO START

The code above must be saved as a.bat and when the other person opens it nothing will appear but in the background it will keep opening its self until the computer freezes or shuts down.
You can try this on your friends by putting it in the Startup.

Sunday, September 6, 2009

how to find the best antivirus for pc

how to find the best antivirus for pc
There are many viruses, trojan or malware in the world wide web. Today many PC infected by these suck program. Or your PC's was infected.

Before purchasing of downloading antivirus program there are some factors that this software must have. These factors are:

1. Its efficacy during stealing viruses (check eccentric tests for unprejudiced results)
2. Its palliate of have use of (normally down to the user interface)
3. Its worth for income
4. Its patron as good as technical await (should be giveaway as good as 24/7 ideally)
5. Its rule of updates
6. Its empty upon complement resources
7. Its compatibility

When all the vital criteria were investigated you found which Kaspersky antivirus 7.0 to be the most appropriate all turn antivirus program upon the marketplace day. However, it might not encounter your mandate so it is critical to do your own review regulating the criteria above. Our commentary of the little of the tip sellers have been below. Hopefully this will give you the little superintendence of what is out there during the impulse as good as what might fit you.

Kaspersky Anti-Virus 7.0
The pathogen showing record which drives this program has achieved really good in eccentric tests as good as gained the clever repute inside of the industry. The technical await is glorious as good as the user interface intuitive.

The alternative categorical advantages with it have been the parental carry out facilities which have been not benefaction in alternative program (great for you relatives out there) as good as the cue stable remoteness control. We found which it had minimal outcome upon Personal Computer opening (apart from the primary indicate which did delayed things down). Finally, as good as really importantly it carried out programmed hourly updates as good as genuine time internet scanning.

The downsides were the cost $59.99 as good as the time it took to do the primary scan.

BitDefender Antivirus 2008
Another really in effect square of antivirus program is BitDefender. the scanning engines have been ICSA Labs certifies as good as it additionally adds the combined reward of antispyware as good as antiadware. Gamers should be gratified with the code new gamer chronicle which stops irritating cocktail ups during diversion play.

A pass value of this program over others is the rootkit showing as good as dismissal feature. Again this is something which sets it over as good as upon tip of the competition. Free 24/7 await as good as the in accord with cost ($24.95) have it the genuine contender to Kaspersky antvirus 7.0. The downsides to this chronicle have been the miss of modernized pattern options which will perplex the some-more modernized user. The scans were additionally upon the extensive side.

Norton Antivirus 2008
Despite carrying the clever code as good as most years of knowledge building antivirus program you consider Norton Antivirus 2008 to be the single of the misfortune upon the market. It does the basis ok though there have been as well most problems with it to be competitive. For example, there seems to be an arrogance usually IE users exist. Help conditions have been geared towards IE users as good as Browser Defender does not work with any alternative browsers.

It is the large 300MB, which is scarcely 6 times the distance of Kaspersky anti-virus 7.0. The singular opening does not clear this size. It slowed down the appurtenance measurably. The interface was horrible as good as configuring settings was the genuine pain. Finally, the anti-spyware was not really effective.

Thursday, September 3, 2009

How to remove JAY.EXE and MVEO.EXE Virus

How to remove JAY.EXE and MVEO.EXE Virus

Jay.exe virus infects internal and removable drives. Unfortunately some of the antivirus available isn’t good enough to remove this virus but manually removing this insect can do the trick. Here’s how you should do it.

Follow these steps to locate all the mveo.exe and jay.exe files.
  1. Open windows explorer window.
  2. On the Menu bar click Tools then click Folder Options.
  3. Select View tab. On the hidden files and folders menu click on show hidden files and folders.
  4. Uncheck hide extensions for known file types.
  5. Uncheck hide protected operating system files (recommended).
  6. Click Apply then OK.

Next we will have to remove the jay.exe and mveo.exe files.

  1. Press ctrl+alt+del to open Task Manager.
  2. In the PROCESSES tab look for the mveo.exe and click End Process.

If you could not bring up the task bar and you get a “Task Manager has been disabled by your Administrator” message, you probably have another virus in your system that prevents this.

To delete all the jay.exe and mveo files, search for it using the search for files and folder option in the start menu.

  1. Type jay.exe in the search bar.
  2. Click more advanced option.
  3. Put a check on search hidden files and folders.
  4. Then click on start search.
  5. Delete all jay.exe entries.
  6. Repeat steps 1-5 to search for mveo.exe.
  7. Also delete autorun.inf file.

To delete registry entries:

  1. Click on start -> run, then in the run text box type regedit.
  2. Press ctrl+f and type in the textbox jay.exe
  3. Delete all entries having jay.exe entries
  4. Press F3 to search the next entry.

Note: if an entry is in c:\windows… edit the value and go to the end of the string anddelete only the jay.exe text on the end of the string

To edit the IE windows back to its original name:

  1. Open regedit.
  2. Press ctrl+f, then type in the search bar window title.
  3. If the value that appears has the jaymyka.wen9.com value, change it to Internet Explorer.

Note: This would be the title bar of your Internet Explorer.
After all of these steps are done: try to look again for the jay.exe and mveo.exe files using the search for files and folders application of windows. After deleting all those files restart your computer.

This Trick worked for me and may or may not work for you,

Just Give a Try...

Friday, July 24, 2009

Virus Explained


What is the definition of computer virus exactly? Well, a computer virus is a program, a block of executable codes, which attach itself to, overwrite or otherwise replace another program in order to reproduce itself without a knowledge of a PC user.

There are many different types of computer virus: Boot sector virus, file virus, direct action virus, Multi partition virus, Polymorphic virus, Stealth virus, and Macro virus.

1. Boot sector Virus

This type of virus is a common virus; duplicate itself by oppressing the boot sector. So that when the computer is booting, the virus will be automatically executed in the computer’s memory.

2. File Virus

Attacking files which are executed by an operating system. Usually this kind of virus attack file that have .com or .exe extension.

3. Direct action Virus

This kind of virus will enter the computer’s memory to execute other files, and then execute the other program in order to deceive the user.

4. Multi partition Virus

This type of virus is the combination between boot sector virus and file virus.

5. Polymorphic Virus

A kind of virus which is designed to deceive AV program, by changing its structure, after executing some command.

6. Stealth Virus

Controlling DOS level instructions by controlling the interrupt table.

7. Macro Virus

Written in a programming language from an application, so that virus has platform independent characteristic.



The difference between Computer Virus and other Computer program

1. The ability to get some important information from the user’s computer.

Virus is designed to infect many files or programs. For example, virus will infect all .txt or . htt files, so that virus will look for information about the existing files or program. After they done it, those important information will be hidden in other directories in order to deceive the user.

2. The ability to check program or file

When a virus is infecting a file, virus should be able to check whether a file has infected or not.

3. The ability duplicating itself

This is the first ability which has to be had by a computer virus.

4. Ability to manipulate

This ability is used to show messages, picture, deleting files, stealing files or data, etc.

5. The ability to hide itself

All of the virus’s activity must be invisible either for the user and for computer.

The structure of Virus:

1. The virus identity code

Every single virus has a unique identity that no other virus has. For example, virus A has X identity, and virus B has Y identity, so those virus is recognized by antivirus from the unique identity.

2. Virus Duplicating Code

A program can’t be mentioned as a computer virus if it can’t duplicate itself. So this is one of the main structures of computer virus.

3. Protection and defend code

This code is needed by virus to deceive antivirus program. It can be done in many ways: encrypting the virus file, invisible the virus’s process on computer, or showing a redirecting message to prevent the user to open the antivirus program.

4. Manipulating code

The function of this code is to delete files, execute certain applications in order to steal or send data to an e-mail.

Because of the extraordinary development of computer technology, the variant of computer virus is going to be a huge in amount. Therefore, protect your PC with the latest antivirus and keep it update periodically, and not to send malicious data to your lovely computer.

Wednesday, July 15, 2009

How to merge rar files with Winrar

You have several rar files (file1.rar, file2.rar, file3.rar) you downloaded from internet and now you have to merge them into one file. First all that files must be in one folder. Do right click on file1.rar and go to Extract here. Chose folder what you like and extract. If you get pop up while extracting, like this:

rar password

that means you need password to merge files. Go to that page where you downloaded part rar files and you will see password there.

Wednesday, July 1, 2009

How To Trace Mobile Numbers in India

(India Only)
With rapid growth in mobile number subscribers in India and low call rates, most of calls we receive on our mobile are form other mobiles only. At the same time, to cater increasing userbase most operators come up with new series everyday which makes remembering a cell number increasingly hard. Also sometime we just want to trace a mobile number for reasons like unknown number in miss call list, to get hint of callers permanent location (sounds unlikely, I know…), etc.

But if you have a look at this wiki page, you can certainly trace any mobile number upto the level of its mobile operator and state (or zone) that’s too using first 4-digit only. It (wiki page) lists all mobile number series in nice tabular manner categorizing them according to mobile operator and state (or zone).
Like other wiki pages, this wiki also updated regularly and provide you almost latest information. I never got disappointed by it. I am using it from around a year.
If you prefer simpler interface where you can just enter your cell number and get the desired information, you can try this and this websites.

 
Powered by Blogger