Friday, April 23, 2010

Get a Call from your own Cell Phone number

Here is a trick to get a call to your cell phone from your own number. Do you think I am crazy? No, I am not…….




Just try the following steps and you’ll get a call to your cell phone from your own number.


1. Just give a missed call to this number. You’ll not be charged!



+41445804650

2. Wait for a few seconds and you’ll get a call to your cell phone from your own number



3. Receive the call.You’ll hear a lady voice asking for a PIN number. Just enter some rubbish number.



4. She say’s- Your PIN cannot be processed and the call disconnects..



ANOTHER TRICK

Instead of giving a missed call, just continue calling. The call will not be received and will get disconnected just after a while. But now do you know what happen’s?



You will get a call from the number



+501

Reason behind this trick

God Knows!!



Just try and pass your comments. Tell me whether the second trick worked or not!!

Change IP Address

How to change your IP address in less than a minute? The following trick gives you a step-by-step procedure to change your IP address.






1. Click on “Start” in the bottom left hand corner of screen.



2. Click on “Run”.



3. Type in “command” and hit ok.You should now be at an MSDOS prompt screen.



4. Type “ipconfig /release” just like that, and hit “enter”.



5. Type “exit” and leave the prompt.



6. Right-click on “Network Places” or “My Network Places” on your desktop.



7. Click on “properties”.



You should now be on a screen with something titled “Local Area Connection”, or something close to that.



8. Right click on “Local Area Connection” and click “properties”.



9. Double-click on the “Internet Protocol (TCP/IP)” from the list under the “General” tab.



10. Click on “Use the following IP address” under the “General” tab.



11. Create an IP address (It doesn’t matter what it is. I just type 1 and 2 until i fill the area up).



12. Press “Tab” and it should automatically fill in the “Subnet Mask” section with default numbers.



13. Hit the “Ok” button here.



14. Hit the “Ok” button again.You should now be back to the “Local Area Connection” screen.



15. Right-click back on “Local Area Connection” and go to properties again.



16. Go back to the “TCP/IP” settings.



17. This time, select “Obtain an IP address automatically”.



18. Hit “Ok”.



19. Hit “Ok” again.



20. You now have a new IP address.



Some ISPs do not support this type of procedure and hence there are chances of getting back the same old IP address even after trying this hack.In this case you need to switch off the modem and then switch it on to get the new IP address.



NOTE: All these tricks works only if you have a dynamic IP address.But if you have a static IP address you have no option to change your IP.

What are IP Addresses

An IP address (Internet Protocol address) is a unique address that certain electronic devices currently use in order to identify and communicate with each other on a computer network utilizing the Internet Protocol standard (IP)—in simpler terms, a computer address. Any participating network device—including routers, switches, computers, infrastructure servers (e.g., NTP, DNS, DHCP, SNMP, etc.), printers, Internet fax machines, and some telephones—can have its own address that is unique within the scope of the specific network. Some IP addresses are intended to be unique within the scope of the global Internet, while others need to be unique only within the scope of an enterprise.


The IP address acts as a locator for one IP device to find another and interact with it. It is not intended, however, to act as an identifier that always uniquely identifies a particular device. In current practice, an IP address is less likely to be an identifier, due to technologies such as Dynamic assignment and Network address translation.

Web Proxies


In computer networks, a proxy server is a server (a computer system or an application program) which services the requests of its clients by forwarding requests to other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server provides the resource by connecting to the specified server and requesting the service on behalf of the client. A proxy server may optionally alter the client’s request or the server’s response, and sometimes it may serve the request without contacting the specified server. In this case, it would ‘cache’ the first request to the remote server, so it could save the information for later, and make everything as fast as possible.

A proxy server that passes all requests and replies unmodified is usually called a gateway or sometimes tunneling proxy.

A proxy server can be placed in the user’s local computer or at specific key points between the user and the destination servers or the Internet.



Caching proxy server

A proxy server can service requests without contacting the specified server, by retrieving content saved from a previous request, made by the same client or even other clients. This is called caching. Caching proxies keep local copies of frequently requested resources, allowing large organizations and Internet Service Providers to significantly reduce their upstream bandwidth usage and cost, while significantly increasing performance. There are well-defined rules for caching. Some poorly-implemented caching proxies have had downsides (e.g., an inability to use user authentication). Some problems are described in RFC 3143 (Known HTTP Proxy/Caching Problems).



Web proxy

Proxies that focus on WWW traffic are called web proxies. Many web proxies attempt to block offensive web content. Other web proxies reformat web pages for a specific purpose or audience (e.g., cell phones and PDAs)

Access control: Some proxy servers implement a logon requirement. In large organizations, authorized users must log on to gain access to the ‘WWW.’ . The organization can thereby track usage to individuals.



Anonymizing proxy server

A proxy server that removes identifying information from the client’s requests for the purpose of anonymity is called an anonymizing proxy server or anonymizer.



Transparent and non-transparent proxy server

The term “transparent proxy” is most often used incorrectly to mean “intercepting proxy” (because the client does not need to configure a proxy and cannot directly detect that its requests are being proxied).

However, RFC 2616 (Hypertext Transfer Protocol — HTTP/1.1) offers different definitions:

“A ‘transparent proxy’ is a proxy that does not modify the request or response beyond what is required for proxy authentication and identification.

“A ‘non-transparent proxy’ is a proxy that modifies the request or response in order to provide some added service to the user agent, such as group annotation services, media type transformation, protocol reduction, or anonymity filtering.”