Blocking Cell Phone Number From Seen in Caller IDs

Freinds after reading this article you will be able to block your cell phone number from showing up on other people's caller IDs. It's very simple to block your cell phone number. You have two options: you can permanently block your phone number or you can block your number on a call by call basis.

Blocking Your Cell Phone Number Permanently:

The most permanent solution is to request a "line block" from your cell phone carrier.

1) To do this you simply need to call the customer service for your specific provider and they can block your number. When you do this your number will never show up to anyone.

2) To call your customer service to block your cell phone number, just dial 611 from your cell phone and you will reach them.

3) If there is a situation where you want your number to show up, you will still have an option. When you have a permanent block on your cell phone number you will need to dial *82 before dialing the number you are calling. When you do this your phone number will show up just once for that specific call. Ex: *82 (555) 555-5555.

Blocking Your Cell Phone Number Temporarily:

Sometimes you may want to block you number for a specific call. You might not want someone to know that you are trying to reach them for the 15th time in a row, or you might be calling a business and might not want them to know your number.

1) If you want to block your cell phone number on a call by call basis you need to dial *67 before dialing the number. Ex *67 (555) 555-5555.

2) When you do this you will not have any feedback that it worked. If you want to test this, just call your home phone, or anther phone that has a caller ID from your cell to confirm that your phone number is blocked.

NOTE:One important thing to remember is that your number will not be blocked from emergency services or any toll free numbers.

How to Find the Owner of a Cell Phone Number:

If you want to identify and unidentified phone number you can with reverse phone number search websites. You can do free reverse phone number search at http://www.infospace.com/ but if you want to find out who owns a cell phone number then use http://www.cellreversesearch.com/.

1 Step One
Go to www.cellreversesearch.com
2 Step Two
Enter any phone number
3 Step Three
Hit Search
4 Step Four
Check Results
5 Step Five
Sign up for owner's name, address and cell phone account history information

BLUESNARFING-Another Hacking Technique

Bluesnarfing-Mobile Hacking

What is Bluesnarfing?
Ans:Bluesnarfing is the unauthorized access of information from a wireless device through a bluetooth connection, often between phones, desktops, laptops, and PDAs that allows access to calendar, contact list, emails and text messages, and on some phones users can steal pictures and private videos,from Mobile or any other bluetooth device.

Watch video for Bluesnarfing

BlueSnarf exploits weak OBEX implementation on mobile phoneBlueSnarfexploitsweakOBEXimplementationonmobilephonesOPP: Object push profile, unauthorised access, for vCardOPP:Objectpushprofile,unauthorisedaccess,for vCardsSYNCH: Profile for exchange of private dataSYNCH:ProfileforexchangeofprivatedataCalendar, contacts, pictures, …Calendar,contacts,pictures,…Authorised access!Authorisedaccess!.Adv connects to OBEX push profileNo authentication, no pairing needed .invisible connection .In vulnerable implementations:.SYNCH profile exists parallel to OPP .Adv: retrieve files via filenames .Unauthorised, via OPP profile !!! .e.g. GET telecom/pb.vcf (contacts) Bluetooth being short range technology: NO security feature!

In order to perfom a BlueSnarf attack, the attacker needs to connect to the OBEX Push Profile (OPP), which has been specified for the easy exchange of business cards and other objects. In most of the cases, this service does not require authentication. Missing authentication is not a problem for OBEX Push, as long as everything is implemented correctly. The BlueSnarf attack connects to an OBEX Push target and performs an OBEX GET request for known filenames such as 'telecom/pb.vcf' for the devices phone book or 'telecom/cal.vcs' for the devices calendar file. (There are many more names of files in the IrMC Specification). In case of improper implementation of the device firmware, an attacker is able to retrieve all files where the name is either known or guessed correctly.



Mobile Security tips

1)To check Mobile name and date of manufacture: *#0000#

2)To check Serial Number: *#06#

3)To Format the cell phone(Restore all original setting): *#7370#

Check Mobile Quality:

You can easily check your mobile is original or not,to know this ,do the following:

1)Find the serial number of your mobile by pressing: *#06#
2)Check the 7th and 8th digit of the serial number.

1 2 3 4 5 6 7 8 9 10 11 12 13 14

A) IF the Seventh & Eighth digits are 02 or 20 this means your cell phone was assembled in Emirates which is very Bad quality.
B) IF the Seventh & Eighth digits are 08 or 80 this means your cell phone was manufactured in Germany which is fair quality.
C) IF the Seventh & Eighth digits are 01 or 10 this means your cell phone was manufactured in Finland which is very Good.
D) IF the Seventh & Eighth digits are 00 this means your cell phone was manufactured in original factory which is the best Mobile Quality.
E) IF the Seventh & Eighth digits are 13 this means your cell phone was assembled in Azerbaijan which is very Bad quality and also dangerous for your health.


A firewall is a hardware or software device which is configured to permit, deny, or proxy data through a computer network which has different levels of trust. The most common boundary where firewalls are applied is between an organization’s internal network and the interne t. This report will provide readers with a resource for understanding firewall design principles used in network security.

So , basically, a firewall is a barrier to keep destructive forces away from your property. In fact, that's why its called a firewall. Its job is similar to a physical firewall that keeps a fire from spreading from one area to the next.
Firewall Architectures
There are two classes of firewall architectures:
1)single layer and,
2) multiple layer.

In a single layer architecture, one host is allocated all firewall functions. This method is usually chosen when either cost is a key factor or if there are only two networks to connect. The advantage to this architecture is any changes to the firewall need only to be done at a single host.
•The biggest disadvantage of the single layer approach it provides single entry point.
If this entry point is breached, the entire network becomes vulnerable to an intruder.
In a multiple layer architecture the firewall functions are distributed among two or more hosts normally connected in series. This method is more difficult to design and manage, it is also more costly, but can provide significantly greater security by diversifying the firewall defense. A common design approach for this type of architecture using two firewall hosts with a demilitarized network (DMZ) between them separating the Internet and the internal network.
How does a firewall work?
There are two access denial methodologies used by firewalls. A firewall may allow all traffic through unless it meets certain criteria, or it may deny all traffic unless it meets certain criteria (see figure ). The type of criteria used to determine whether traffic should be allowed through varies from one type of firewall to another. Firewalls may be concerned with the type of traffic, or with source or destination addresses and ports. They may also use complex rule bases that analyse the application data to determine if the traffic should be allowed through. How a firewall determines what traffic to let through depends on which network layer it operates at. A discussion on network layers and architecture follows.
What different types of firewalls are?
Firewalls fall into four broad categories: 1)packet filters, 2)circuit level gateways, 3)application level gateways and 4) stateful multilayer inspection firewalls.
Packet filtering firewalls work at the network level of the OSI model, or the IP layer of TCP/IP. They are usually part of a router. A router is a device that receives packets from one network and forwards them to another network. In a packet filtering firewall each packet is compared to a set of criteria before it is forwarded. Depending on the packet and the criteria, the firewall can drop the packet, forward it or send a message to the originator.
Circuit level gateways work at the session layer of the OSI model, or the TCP layer of TCP/IP. They monitor TCP handshaking between packets to determine whether a requested session is legitimate. Information passed to remote computer through a circuit level gateway appears to have originated from the gateway. This is useful for hiding information about protected networks. Circuit level gateways are relatively inexpensive and have the advantage of hiding information about the private network they protect. On the other hand, they do not filter individual packets.
Application level gateways, also called proxies, are similar to circuit-level gateways except that they are application specific. They can filter packets at the application layer of the OSI model. Incoming or outgoing packets cannot access services for which there is no proxy. In plain terms, an application level gateway that is configured to be a web proxy will not allow any ftp, gopher, telnet or other traffic through. Because they examine packets at application layer, they can filter application specific commands such as http:post and get, etc.
Stateful multilayer inspection firewalls combine the aspects of the other three types of firewalls. They filter packets at the network layer, determine whether session packets are legitimate and evaluate contents of packets at the application layer. They allow direct connection between client and host, alleviating the problem caused by the lack of transparency of application level gateways. They rely on algorithms to recognize and process application layer data instead of running application specific proxies. Stateful multilayer inspection firewalls offer a high level of security, good performance and transparency to end users. They are expensive however, and due to their complexity are potentially less secure than simpler types of firewalls if not administered by highly competent personnel