Check who is invisible on on Yahoo messenger

See who is invisible in yahoo messenger

download this[100% working]

http://rapidshare.com/files/61785563/BuddySpySetup.exe
If you r scanning for a person be sure that he/she is in your friends list
If he/she is not in your friends list then you may not get the right result

enjoy

Incoming search terms for the article:

How to change your IP address

First let me explain a few things about MAC addresses. MAC stands for Media Access Control and in a sense the MAC address is a computer?s true name on a LAN. An Ethernet MAC address is a six byte number, usually expressed as a twelve digit hexadecimal number (Example: 1AB4C234AB1F).

IPs are translated to MAC address by a protocol called ARP (Address Resolution Protocol). Let?s say a computer with and IP of 192.168.1.1 wants to send information to another computer on the LAN that has an IP of 192.168.1.2 . First 192.168.1.1 will send out a broadcast to all stations on the LAN asking who has the IP 192.168.1.2. Then the box that has 192.168.1.2 will respond to 192.168.1.1 with it?s MAC address which is cached in 192.168.1.1?s ARP table for later use. To put this in Socratic Dialog form (with just a touch of Stallone):

Host 1 (199.160.1.1): Yo everyone on the LAN (FF:FF:FF:FF:FF:FF), who has the IP 199.160.1.2? My MAC is DE:AD:BE:EF:CA:FE so you can respond back to me.

Host 2 (199.16o.1.2): Hello DE:AD:BE:EF:CA:FE, I have IP 199.160.1.2 and my MAC address is 12:34:56:78:90:12 so you can send your IP packets to me.

You can see the ARP table of a box by dropping out to a command prompt and typing ?arp ?a? in Windows or just ?arp? in Linux. ARP can also work the other way by a host on the LAN sending its MAC address to another machine on the LAN for preemptive caching unless the host is configured to not accept un-requested ARP replies.

A person might want to change the MAC address of a NIC for many reasons:

1. To get past MAC address filtering on a router. Valid MAC addresses can be found by sniffing them and then the deviant user could assume the MAC of a valid host. Having two hosts on the same network can cause some network stability problems, but much of the time it’s workable. This is one of the reasons why MIC Address filtering on a wireless router is pointless. An attacker can just sniff the MAC address out of the air while in monitor mode and set his WiFi NIC to use it. Interestingly, a lot of hotels use MAC filtering in their “pay to surf” schemes, so this method can be an instant in for cheap skate road warriors.
2. Sniffing other connections on the network. By assuming another host’s MAC as their own they may receive packets not meant for them. However, ARP poisoning is generally a better method than MAC spoofing to accomplish this task.
3. So as to keep their burned in MAC address out of IDS and security logs, thus keeping deviant behavior from being connected to their hardware. For example, two of the main things a DHCP server logs when it leases an IP to a client is the MAC address and host name. If you have a wireless router look around on it’s web interface for where it logs this info. Luckily there are tools to randomize this information (MadMACs).
4. To pull off a denial of service attack, for instance assuming the MAC of the gateway to a sub net might cause traffic problems. Also, a lot of WiFi routers will lock up if a client tries to connect with the same MAC as the router’s BSSID.

Linux

To change your MAC address in Linux (and most *nix system) is easy as pie. All it takes is two easy to script commands:

ifconfig eth0 down hw ether 00:00:00:00:00:01

ifconfig eth0 up

These two little commands would set your eth0 interface to use the MAC 00:00:00:00:00:01. Just plug in the NIC you want to set and the MAC address you want to use into the commands above and your done. Changing your MAC address is one of those things that is much easier to do in Linux then under Windows.

Mac OS X

For versions of OS X before Tiger (OS X 10.4) you will need this patch:

http://slagheap.net/etherspoof/

Then you use a command like:

sudo ifconfig en0 lladdr 00:00:00:00:00:01

I’m not much of a Macintosh guy, so I pulled most of this info from:

http://www.macgeekery.com/gspot/2006-04/mac_address_spoofing

My understanding is that there are complications with some AirPort cards so you may also want to read:

http://rgov.org/airport-spoof/

Windows 2000/XP/Vista: The Hard Way

In XP you can use the regedit to edit the registry from a GUI or the reg command to edit it from the console, I?ll be using regedit. Information on all your NICs can be found the registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\ . Under this key you will find a bunch of sub keys labeled as 0000, 00001, 0002 and so forth. We can assume any MAC address we want by finding the key that controls the NIC we want to change, putting in a string value called ?NetworkAddress? and setting it to the MAC address we want to use formatted as a twelve digit hex number (example: 000000000001). To find out which key is which we can search through them for the value ?DriverDesc? until we find the one that matches the NIC we wish to alter. After you set ?NetworkAddress? to the address you want just restart the NIC by disabling it then enabling it (or in the case of PCMCIA cards, just eject and reinsert). You can confirm the MAC address change by using the ?getmac? or ?ipconfig /all? commands.

Windows 2000/XP/Vista: The Easy Way

Use Mac Makeup ( http://www.gorlani.com/publicprj/macmakeup/macmakeup.asp ), MadMACs (http://www.irongeek.com/i.php?page=security/madmacs-mac-spoofer), Smac ( http://www.klcconsulting.net/smac/ ) or Etherchange (http://ntsecurity.nu/toolbox/etherchange/ ). Mac Makeup is a cool little GUI and Command line tool that’s freeware, the creator also offers a Plugin for Bart’s PE builder. MadMACs is a tool to randomize your MAC address and host name on every reboot. Smac has a nice GUI and was free but has since gone commercial, there’s no reason to bother with it as there are free tools that are just as good. I use MadMACs since I wrote it and it lets me keep my host information randomized.

Have fun with your MAC addresses switching, but be careful not to cause network problems. My favorite MAC address is DEADBEEFCAFE, for other interesting MACs see:

http://www.binrev.com/forums/index.php?showtopic=15942

Enjoy.

After Notes:

After I posted my article Benjamin E. Pratt emailed me some other notes on changing your MAC address on different platforms and in different ways:
BSD

1) Bring down the interface: “ifconfig xl0 down”

2) Enter new MAC address: “ifconfig xl0 link 00:00:00:AA:AA:AA”

3) Bring up the interface: “ifconfig xl0 up”

Linux

1) Bring down the interface: “ifconfig eth0 down”

2) Enter new MAC address: “ifconfig eth0 hw ether 00:00:00:AA:AA:AA”

3) Bring up the interface: “ifconfig eth0 up”

Windows 2000/XP
Method 1:

This is depending on the type of Network Interface Card (NIC) you have. If you have a card that doesn?t support Clone MAC address, then you have to go to second method.

a) Go to Start->Settings->Control Panel and double click on Network and Dial-up Connections.

b) Right click on the NIC you want to change the MAC address and click on properties.

c) Under “General” tab, click on the “Configure” button

d) Click on “Advanced” tab

e) Under “Property section”, you should see an item called “Network Address” or “Locally Administered Address”, click on it.

f) On the right side, under “Value”, type in the New MAC address you want to assign to your NIC. Usually this value is entered without the “-” between the MAC address numbers.

g) Goto command prompt and type in “ipconfig /all” or “net config rdr” to verify the changes. If the changes are not materialized, then use the second method.

h) If successful, reboot your system.

Method 2:

This should work on all Windows 2000/XP systems

a) Go to Start -> Run, type “regedt32” to start registry editor. Do not use “Regedit”.

b) Go to “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}”. Double click on it to expand the tree. The subkeys are 4-digit numbers, which represent particular network adapters. You should see it starts with 0000, then 0001, 0002, 0003 and so on.

c) Find the interface you want by searching for the proper “DriverDesc” key.

d) Edit, or add, the string key “NetworkAddress” (has the data type “REG_SZ”) to contain the new MAC address.

e) Disable then re-enable the network interface that you changed (or reboot the system).

Method 3:

Use the program Etherchange from http://ntsecurity.nu/toolbox/etherchange/

Windows 9x

Use the same method as Windows 2000/XP except for the registry key location is “HKEY_LOCAL_MACHINE\System\ CurrentControlSet\Services\Class\Net” and you must reboot your system.

Incoming search terms for the article:

How to find senders IP address from received mail

Emails are very important part of our communication system
We think that we know everything about emails

we know how to compose email , how to attach a file , how to send it to others ,How to receive emails from others and many other things.This is all we know about emails.But this is not end of it .When you receive or send emails many other things are sent with it.

At this time when Email is progressively used for business and for many purposes, not to mention it is being used for phishing and other malicious intentions. It is of utmost priority to understand the other “messages” besides what has been sent or received by you.

Every email comes with a “Header” which is one part of an e-mail structure; call it DNA of the mail. It carries the basic fundamental information such as from whom the email comes, to whom it is addressed, date/time it was sent and the subject of the email. It is similar to an electronic postSeptemberk. Moreover, it also carries other detailed information which we usually don’t see.

This basic information comes in all brief/basic headers that most email programs automatically shows. This detail technical information can be viewed in a full header. All email programs can be set to show only brief header or full header and it is up to the users to set the program whether to view only “brief header” or “full header”.

Full header carries the information of the mail server’s name that the email passed through on its way to the recipient, and sender’s IP address and even the name of the email program and its version used.

Knowledge of this information is essential for analysis and investigation purposes on cases involving email abuse, spamming, harassment, forgeries and mail-bombing. It is worth mentioning, understanding of this tool would definitely help people to counter these attacks, and save themselves from unwarranted consequences. Well, this information could not be found in a brief header.

Here we will take the case of Google mail and Yahoo mail to find out the full header.

Google Mail.

Using your id/password, login to Gmail. Open the mail for which you wish to find the full header of the sender. Click on the inverted triangle placed just next to Reply.

You will get something like this…

Delivered-To: Mr.x@gmail.com
Received: by 10.36.81.3 with SMTP id e3cs239nzb; Tue, 12 September 2007 15:11:47 -0800 (PST)
Return-Path:
Received: from mail.emailprovider.com (mail.emailprovider.com [111.111.11.111]) by mx.gmail.com with SMTP id h19si826631rnb.2007.03.12.15.11.46; Tue, 12 September 2007 15:11:47 -0800 (PST)
Message-ID: <20070312231145.62086.mail@mail.emailprovider.com>
Received: from [11.11.111.111] by mail.emailprovider.com via HTTP; Tue, 12 September 2007 15:11:45 PST
Date: Tue, 12 September 2007 15:11:45 -0800 (PST)
From: Mr.y
Subject: Hello
To: Mr.x

In the example, headers are added to the message three times:

1. When Mr.y composes the email

Date: Tue, 12 September 2007 15:11:45 -0800 (PST)
From: Mr .y
Subject: Hello
To: Mr.x
2. When the email is sent through the servers of Mr.y’s email provider, mail.emailprovider.com

Message-ID: <20070312231145.62086.mail@mail.emailprovider.com>
Received: from [11.11.111.111] by mail.emailprovider.com via HTTP; Tue, 12 September 2007 15:11:45 PST

3.When the message transfers from Mr.y ‘s email provider to Mr. x’s Gmail account

Delivered-To: Mr.x@gmail.com
Received: by 10.36.81.3 with SMTP id e3cs239nzb;Tue, 12 September 2007 15:11:47 -0800 (PST)

Return-Path: Mr.y@emailprovider.com
Received: from mail.emailprovider.com (mail.emailprovider.com [111.111.11.111]) by mx.gmail.com with SMTP id h19si826631rnb; Tue, 12 September 2007 15:11:47 -0800 (PST)

Below is a description of each section of the email header:

Delivered-To: Mr.x@gmail.com

The email address the message will be delivered to.

Received: by 10.36.81.3 with SMTP id e3cs239nzb;
Tue, 29 Mar 2005 15:11:47 -0800 (PST)

The time the message reached Gmail’s servers.

Return-Path:

The address from which the message was sent.

Received: from mail.emailprovider.com
(mail.emailprovider.com [111.111.11.111])
by mx.gmail.com with SMTP id h19si826631rnb.2005.03.29.15.11.46;
Tue, 29 Mar 2005 15:11:47 -0800 (PST)

The message was received from mail.emailprovider.com, by a Gmail server on March 29, 2005 at approximately 3 pm.

Message-ID: 20050329231145.62086.mail@mail.emailprovider.com

A unique number assigned by mail.emailprovider.com to identify the message.

Received: from [11.11.111.111] by mail.emailprovider.com via HTTP; Tue, 29 Mar 2005 15:11:45 PST

Mr.y used an email composition program to write the message, and it was then received by the email servers of mail.emailprovider.com.

Date: Tue, 29 Mar 2005 15:11:45 -0800 (PST)
From: Mr y
Subject: Hello
To: Mr.x

The date, sender, subject, and destination — Mr. Jones entered this information (except for the date) when he composed the email.

And for IP, look for Received:from followed by the IP within square brackets [ ] e.g.

Received: from [11.11.111.111] by mail.emailprovider.com via HTTP; Tue, 12

Also importantly, there are times when you might find multiple Received: from entries, in that case, please select the last one as the valid choice.

Incoming search terms for the article: