Minggu, 11 Januari 2009

Calculating the geography of crime

A mathematician fine-tunes how to blend crime records, geography to track down serial criminals

WASHINGTON, D.C. — Math as a tool for tracking down criminals has never been as precise as the TV show Numb3rs depicts. But mathematicians are developing better ways to at least estimate where a person on a crime spree might live.

Using information about the layout of a city, such as the location of similar crimes during the past few years, beefed up mathematical tools could improve estimates of where a criminal lives based on where he or she commits crimes, according to new research presented January 7 at the annual Joint Mathematics Meetings.

"I feel like I'm in a gold mine and I'm the only one who knows what gold looks like," says Mike O'Leary, an applied mathematician at Towson University in Maryland who performed the new research. "There are so many good mathematical problems in this field" of criminology.

A well established principle of criminology is that perpetrators will tend to commit more crimes close to their homes simply because of convenience and the realities of transportation. So older techniques estimate where a criminal lives based on the locations of a string of unsolved crimes that are all attributed to that criminal.

But those techniques ignore the actual geography of a city, assuming instead that the likelihood of a criminal striking near his or her home drops off evenly in all directions regardless of geography.

"They don't have any way to incorporate yet data about geography," O'Leary says. "Mathematically they just don't have the tools for it."

To find the perpetrator of a type of crime, such as robbing a convenience store, O'Leary's methods would use historical records of incidences of similar crimes to generate a likelihood distribution for that crime for the whole city. This distribution inherently contains geographic information such as where the major roads are located and where easy targets are located. The analysis also folds in census data about neighborhood demographics, as well as a mathematical analysis of how far from home criminals of different ages typically strike. Younger criminals tend to commit crimes closer to home.

Other researchers have also developed software tools in recent years that attempt to incorporate geographic information. However, "Up until now the majority of the research has been done by social scientists such as myself," comments Ned Levine, a geographical researcher at Ned Levine & Associates in Houston who developed crime-analysis software called CrimeStat. O'Leary has "added some insights into the mathematics that previously we were struggling with,” he says. “He's really cleaning up the mathematics."

At their best, such analyses, including O’Leary’s, are prone to error and only give police a starting point — perhaps for checking whether people previously convicted of the same crime live in the area identified by the techniques. O'Leary is working on computer software that performs his analysis. The code for the software will be made freely available, and the complete software package will be free for police departments to use.

"It's a lot of fun," O'Leary says. "I can't wait until this goes and does something
By Patrick Barry

[+/-] Selengkapnya...

Secret code all GSM and CDMA

for samsung

*#9998*228# : Battery status (capacity, voltage, temperature)
*#9998*246# : Program status
*#9998*289# : Change Alarm Buzzer Frequency
*#9998*324# : Debug screens
*#9998*364# : Watchdog
*#9998*377# : EEPROM Error Stack - Use side keys to select values. Cancel and ok.
*#9998*427# : Trace Watchdog
*#9998*523# : Change LCD contrast - Only with version G60RL01W
*#9998*544# : Jig detect
*#9998*636# : Memory status
*#9998*746# : SIM File Size
*#9998*778# : SIM Service Table
*#9998*785# : RTK (Run Time Kernel) errors - if ok then phn is reset, info is put in memory error.
*#9998*786# : Run, Last UP, Last DOWN
*#9998*837# : Software Version
*#9998*842# : Test Vibrator - Flash the screenligth during 10 seconds and vibration activated.
*#9998*862# : Vocoder Reg - Normal, Earphone or carkit can be selected
*#9998*872# : Diag
*#9998*947# : Reset On Fatal Error
*#9998*999# : Last/Chk

*#9998*9266# : Yann debug screen (=Debug Screens?)
*#9998*9999# : Software version

If the up Codes doesn't work, you should change *#9998* to *#0. i.e. *#9998*523# change to *#0523#. An other thing that will help is to remove your SIM card. *0001*s*f*t# : Changes serial parameters (s=?, f=0,1, t=0,1) (incomplete)
*0002*?# : unknown
*0003*?# : unknown

SP-unlock SGH-600 (and also SGH-Sgh-600)
*2767*3855# : Full EEPROM Reset ( THIS CODE REMOVES SP-LOCK!! )
But also changes IMEI to 447967-89-400044-0. (Doing this is illegal)

*2767*2878# : Custom EEEPROM Reset

*These codes have been tested with version FLD_2C6 G60SB03X of Samsung SGH-600

for d500

*#11[quote]11# S/W Version
*#1234# Firmware Version
*#2222# H/W Version
*#8999*8376263# All Versions Together

*#8999*8378# Test Menu
*#4777*8665# GPSR Tool
*#8999*523# LCD Brightness
*#8999*377# Error Menu
*#8999*327# EEP Menu
*#8999*3825523# Don't Know.
*#8999*667# Debug Mode
*#92782# PhoneModel (Wap)
#*5737425# JAVA Mode
*#2255# Call List
*#232337# Bluetooth MAC Adress
*#5282837# Java Version

#*4773# Incremental Redundancy
#*7752# 8 PSK uplink capability bit
#*7785# Reset wakeup & RTK timer cariables/variables
#*1200# ????
#*7200# Tone Generator Mute
#*3888# BLUETOOTH Test mode
#*#8999*324# ??
#*7828# Task screen
#*5111# ??
#*#8377466# S/W Version & H/W Version
#*2562# Restarts Phone
#*2565# No Blocking? General Defense.
#*3353# General Defense, Code Erased.
#*3837# Phone Hangs on White screen
#*3849# Restarts Phone
#*3851# Restarts Phone
#*3876# Restarts Phone
#*7222# Operation Typ: (Class C GSM)
#*7224# !!! ERROR !!!
#*7252# Operation Typ: (Class B GPRS)
#*7271# CMD: (Not Available)
#*7274# CMD: (Not Available)
#*7337# Restarts Phone (Resets Wap Settings)
#*2787# CRTP ON/OFF
#*2886# AutoAnswer ON/OFF
#*3737# L1 AFC
#*5133# L1 HO Data
#*7288# GPRS Detached/Attached
#*7287# GPRS Attached
#*7666# White Screen
#*7693# Sleep Deactivate/Activate
#*7284# L1 HO Data
#*2256# Calibration info? (For CMD set DEBUGAUTONOMY in cihard.opt)
#*2286# Databattery
#*2527# GPRS switching set to (Class 4, 8, 9, 10)
#*2679# Copycat feature Activa/Deactivate
#*3940# External looptest 9600 bps
#*4263# Handsfree mode Activate/Deactivate
#*4700# Please use function 2637
#*7352# BVMC Reg value (LOW_SWTOFF, NOMINAL_SWTOFF)
#*2558# Time ON
#*3370# Same as 4700
#*3941# External looptest 115200 bps
#*5176# L1 Sleep
#*7462# SIM Phase
#*7983# Voltage/Freq
#*7986# Voltage
#*8466# Old Time
#*2255# Call Failed
#*5187# L1C2G trace Activate/Deactivate
#*5376# DELETE ALL SMS!!!!
#*6837# Official Software Version: (0003000016000702)
#*7524# KCGPRS: (FF FF FF FF FF FF FF FF 07)
#*7562# LOCI GPRS: (FF FF FF FF FF FF FF FF FF FF FF FE FF 01)
#*2337# Permanent Registration Beep
#*2474# Charging Duration
#*2834# Audio Path (Handsfree)
#*3270# DCS Support Activate/Deactivate
#*3282# Data Activate/Deactivate
#*3476# EGSM Activate/Deactivate
#*3676# FORMAT FLASH VOLUME!!!
#*4760# GSM Activate/Deactivate
#*4864# White Screen
#*5171# L1P1
#*5172# L1P2
#*5173# L1P3
#*7326# Accessory
#*7683# Sleep variable
#*8465# Time in L1
#*2252# Current CAL
#*2836# AVDDSS Management Activate/Deactivate
#*3877# Dump of SPY trace
#*7728# RSAV
#*2677# Same as 4700
#*3797# Blinks 3D030300 in RED
#*3728# Time 2 Decod
#*3725# B4 last off
#*7372# Resetting the time to DPB variables
#*7732# Packet flow context bit Activate/Deactivate
#*6833# New uplink establishment Activate/Deactivate
#*3273# EGPRS multislot (Class 4, 8, 9, 10)
#*7722# RLC bitmap compression Activate/Deactivate
#*2351# Blinks 1347E201 in RED
#*4472# Hysteresis of serving cell: 3 dB
#*2775# Switch to 2 inner speaker
#*9270# Force WBS
#*7878# FirstStartup (0=NO, 1=YES)
#*3757# DSL UART speed set to (LOW, HIGH)
#*8726# Switches USBACM to Normal
#*8724# Switches USBACM to Generator mode
#*8727# Switches USBACM to Slink mode
#*8725# Switches USBACM to Loop-back mode
#*3838# Blinks 3D030300 in RED
#*2077# GPRS Switch
#*2027# GPRS Switch
#*0227# GPRS Switch
#*0277# GPRS Switch
#*22671# AMR REC START
#*22672# Stop AMR REC (File name: /a/multimedia/sounds/voice list/ENGMODE.amr)
#*22673# Pause REC
#*22674# Resume REC
#*22675# AMR Playback
#*22676# AMR Stop Play
#*22677# Pause Play
#*22678# Resume Play
#*77261# PCM Rec Req
#*77262# Stop PCM Rec
#*77263# PCM Playback
#*77264# PCM Stop Play
#*2872# CNT
*#8999*283# ???
#*22679# AMR Get Time
*288666# ???
*2886633# ???
*#8999*364# Watchdog

nokia cdma


*3001#12345#

LG CDMA SECRETS CODES

Field Test MENU > 0 > 000000 > Field Test Other Programming Secrets:

LGC-300 programming:

menu + 9 and enter SPC: "000000" or may be other SPC typed by user. A-Key: press STO for some time while you can see special code enter zone. Type 2539** and enter A-key

LGC-330W programming:

menu + 4 + 0 and enter SPC: "000000" or may be other SPC typed by user. A-Key: type 2539** and enter A-key

LGC-800W /500 programming:

menu + 0 and enter SPC: "000000" or may be other SPC typed by user. A-Key: type 2539** and enter A-key

LGC-510 programming:

menu + 3 + 0 and enter SPC: "000000" or may be other SPC typed by user. A-Key: type 2539** and enter A-key

LG1010, LG4NE1, TP2200, TP2100, Touchpoint, SB/DB, TP1100 and TP5200

Press ## Enter the OTKSL Scroll to SAVE and press OK Scroll to MIN and press OK Enter 10 digit MIN scroll to SAVE and press OK Scroll to SID and press OK (Skip on 4NE1 go to RESET PHONE and press OK to complete) Enter SID (4654) and scroll to SAVE and press OK Programming is complete

LG5350

Enter ## and enter the OTKSL and press the left soft key under the word “Save” At the Service Program display select Mobile Phone # and press the OK in the center of the 4 way navigation key Enter the 10 digit MIN and press OK Scroll down to 4. Advanced and press OK Scroll to NMSI and press OK Enter the MSID and press OK Scroll down to 9. Amps Phone # and press OK Enter the MSID and press OK

Press the END key


MOTOROLA PROGRAMING CODES

Analog Models

Changing the Banner: #PROGRAM# or [Fcn] 0000000000000 (13 0's)

Field Test: [Fcn] 0 0 * * TESTMODE [Sto]

Reset Timers: Follow the Field Test procedure above and then #32#

Alternative Programming Menu: #55#

(Not sure): # [SID code]#* SEND

Programming of various other models:

V60c Programming Mode:

74663 # [Menu] [Menu] (you will need the programming code)

Field Test: [Menu] 073887 * (you will need the security code -- try 000000)

To deactivate field test: Power phone up, hit MENU and the left button (should bring up the menu). There's a menu option for test-mode and at this point you can turn the menu off and return the phone to normal. Alternatively press menu and then the nearest button to the left (Phone book button) quickly and it will take you back to the main screen and your phone will look normal.

StarTac 7790

Field Test: [Fcn] 0 0 * * TESTMODE [Sto]

StarTac 7760, 7860

Field Test: [Fcn] 0 0 * * TESTMODE [Sto] Service Menu: [Fcn] 0 000000 000000 RCL

Complete system test (most models): (Phone OFF), Hold down any row of keys (1+2+3, 4+5+6, etc) and turn the phone ON

To access the diagnostic mode on the I30: #, *, MENU, JOYSTICK-RIGHT (Do these keystrokes fast)

To access the diagnostic mode on any of the older iDEN phones (pre-i1000): VOLUME DOWN, MENU, MENU, MENU, LEFT, MENU, MENU, LEFT (this is the reverse of the test menu routine)

To access the diagnostic mode on any of the new models (i1000+, i700+, i550+, etc): Hold down any three keys in a row across.

The unit will enter the test mode and can be stepped through the various functions with the keys and buttons. At the end of the test, power cycle the unit to return to normal function. This test will check various phone functions, including LCD display, speaker, earphone, microphone, LEDs, vibrator, backlight and all of the buttons and keys for the newer models

SAMSUNG CDMA SECET CODES

Older Models:

NAM Programming: 47*869#08#9

Test mode: *759#813580 OR 5809540*45680

Exit Test Mode: 02 A-Key: menu + 0,

code 25##

Samsung SPH-T100

MENU 820 > 810325

Samsung SCH-3500

MENU 820 > 295184

Programming of various other models:

Samsung A500

Enter ## and the 6 digitOTKSL

SERVICE MENU will appear and 1.Basic will be highlighted

Press OK Device will display NAM CDMA/ Phone Number

Enter 10 digit MIN Press OK (3 times) Display will return to Service Menu.

Press END. Programming is complete

Samsung N240 and N400

Enter ## and type in the 6 digit OTKSL

The display will show SVC MENU and 1. Phone Number

Press OK Enter the 10 digit MIN and press OK

The display will show NAM with Home SID on the second line (Note: SID is no longer used)

Press OK

The display will return to the SVC MENU

Press END to complete the programming


Samsung N300

Press ## followed by the OTKSL
SVC menu will be displayed
Press 1 for Phone #
Enter the 10 digit MIN and press OK
MIN that was entered will be displayed press OK
SVC Menu will display press 3 for NAM
Enter the 4 digit Home SID press OK
Press END and handset will power cycle

Samsung i300
Tap on the Phone Icon with stylus
Press #907*9#0 ENTER LOCK should appear on screen
ENTER OTKSL
SVC MENU will appear press 1
Enter 10 digit MIN and then press SAVE
Press SAVE again
Press 3 and then press SAVE 6 times
Enter the HOME SID and press SAVE once
Press END key twice

Samsung A400 and A460
Enter ## and OTKSL
Press 1 for Basic at MENU (1 of Phone # when using the MSL)
Enter 10 digit MIN and press OK
At 1.Basic Menu press the END key
Handset will power cycle

Samsung 3500, 8500, 6100, and N200
Press MENU
Press 6 0 (3500) 8 2 0 (8500/6100/N200)
Enter OTKSL
Press 1 at SVC MENU Screen
Enter MIN and press OK
Press OK 4 times
Enter SID (4654) and press OK
Press END key
Programming is complete

gsm NOKIA SECRET CODES

Nokia CodesThese Nokia codes will work on most Nokia mobile phones, however we accept no responsibility of any kind for damage done to your phone whilst trying these Nokia secret codes.

Nokia code Code function

*3370# This Nokia code activates Enhanced Full Rate Codec (EFR) - Your Nokia cell phone uses the best sound quality but talk time is reduced my approx. 5%

#3370# Deactivate Enhanced Full Rate Codec (EFR)

*#4720# Activate Half Rate Codec - Your phone uses a lower quality sound but you should gain approx 30% more Talk Time

*#4720# With this Nokia code you can deactivate the Half Rate Codec

*#0000# Displays your phones software version, 1st Line : Software Version, 2nd Line : Software Release Date, 3rd Line : Compression Type

*#9999# Phones software version if *#0000# does not work *#06# For checking the International Mobile Equipment Identity (IMEI Number)

#pw+1234567890+1# Provider Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)

#pw+1234567890+2# Network Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)

#pw+1234567890+3# Country Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)

#pw+1234567890+4# SIM Card Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)

GSM SAMSUNG SECRET CODES

*#06# -> Show IMEI

*#9999# -> Show Software version

*#0837# -> Show Software Version (instructions)

*#0001# -> Show Serial Parameters

*#9125# -> Activates the smiley when charging.

*#9998*228# -> Battery status (capacity, voltage, temperature)

*#9998*246# -> Program status

*#9998*289# -> Change Alarm Buzzer Frequency

*#9998*324# -> Debug screenslect values. Cancel and ok.

*#9998*427# -> Trace Watchdog

*#9998*523# -> Change LCD contrast - Only with version G60RL01W

*#9998*544# -> Jig detectService Table

*#9998*785# -> RTK (Run Time Kernel) errors - if ok then phn is reset, info is put inmemory error.

*#9998*786# -> Run, Last UP, Last DOWN

*#9998*837# -> Software Version

*#9998*842# -> Test Vibrator - Flash the screenligth during 10 seconds and vibrationactivated.

*#9998*862# -> Vocoder Reg - Normal, Earphone or carkit can be selected

*#9998*872# -> Diag

*#9998*947# -> Reset On Fatal Error

*#9998*999# -> Last/Chk

*#9998*9266# -> Yann debug screen (=Debug Screens?)

*#9998*9999# -> Software version

*0001*s*f*t# -> Changes serial parameters (s=?, f=0,1, t=0,1) (incomplete)

*0002*?# -> unknown

*0003*?# -> unknown SP-unlock SGH-600 and SGH 2100

*2767*3855# -> Full EEPROM Reset ( THIS CODE REMOVES SP-LOCK!! ) But also changes IMEI to 447967-89-400044-0

*2767*2878# -> Custom EEEPROM Reset These codes has been tested with version FLD_2C6 G60SB03X of Samsung SGH-600 type 8889 instead of 9998.

GSM MOTOROLA SECRET MOBILE CODES

Motorola

IMEI number: * # 0 6#
Net Monitor ON: * * * 1 1 3 * 1 * [OK]
Net Monitor OFF: * * * 1 1 3 * 1 * [OK]
* - press this until box shown up

To activate RBS:

(pause means the * key held in until box appears)

[pause] [pause] [pause] 1 1 3 [pause] 1 [pause] [ok]

You now have to press the [MENU] and scroll to the 'Eng Field Options' function with the keys, and enable it.

To de-activate RBS,

[pause] [pause] [pause] 1 1 3 [pause] 0 [pause] [ok]

This only works with some versions of software. Please report what works and doesn't for you.

Reported working, by country:

d460: IT
6200 Flare: UK (Orange), AU
7500: IT (model: F16 HW: 5.2 SW: 2.1)
8200: ES, AU, NL, BE
8400: IT, NL
8700: AU, IT, SG, DE, ES, ZA
Uses of RBS:

Distance From Base Station - Place a call, when it is answered, press [MENU] until 'Eng Field Option' is displayed, press [OK], select 'Active Cell', press [OK], press [MENU] until 'Time Adv xxx' appears, where xxx is a number. Multiply this number by 550, and the result is the distance from the RBS (Radio Base Station), in meters.

Signal Quality - press [MENU] until 'Eng Field Option' is displayed, press [OK], select 'Active Cell', press [OK], press [MENU] until 'C1' appears. This is the signal quality. If it becomes negative for longer than 5 seconds, a new cell is selected.

SONY ERICSSON SECRET CODE

General Secrets

IMEI (International Mobile Equipment Identity): *#06#

Firmware Version: >*<<*<*

Programming Checks: >*<<*<*> or >*<<*<*>


Accessing the phone without a SIM card: **04*0000*0000*0000# then on 'Wrong Pin' No


Reset English Menu: *#0000#


300, 600, 700 Series


Programming Menu (Short): 987 + >


Programming Menu (Long): 923885 + >


Field Test: 904090 + > (to exit 904090 + >;)


Phone Test: 904059 + > (to exit 3 + <;)


Phone Reset: 904060 + >


CDMA Mode: 904093 + menu


Analog Mode: 904095 + menu DM mode 904959 + menu


GSM PHILIPS SECRET CODES

Philips GENIE


To view IMEI number *#06#

*#2254*# is the statusregister: C, BS, RR, MMI, CREAT.

*#2255*# will activate and deactivate the "DEBUG CALL"-Mode

*#2558*# will display the time in days,hours and minutes you are connected to the GSM network

To force a reconnection to the network, type : *#2562*#

To view and modify the Security Code of the phone, type: *#7489*#

To view some info about your SIM card like the phase level, the name, type: *#7378*#

To obtain information on SIM lock, Init and Flags, press: *#3377*#

To activate or deactivate Sleep Mode: *#7693*#

To get info about Sleep Mode: *#8463*#


Philips FIZZ
IMEI: *#06#

Lock Code: *#1234#

Software Version
To find software version, enter *#8377*#

The output will look something like:

Version : 0916 - EEPROM : 00000000-00 - TDA : 2445 - KISS : 0502 SIM-LCK

..or extended software version *#5644*#

output:

Version : 09162205 - EEPROM : 00000000-00 - TDA : 2445 - KISS : 0502 SIM-LCK

SM ALCATEL SECRET MOBILE CODES

ALCATEL

* # 0 6 # : IMEI number
* # 0 6 # : Software version
0 0 0 0 0 0 * : Net Monitor

PINOUTS AND CODES FOR PANASONIC MOBILES

Panasonic G500

IEMI:
To view IMEI number *#06#


--------------------------------------------------------------------------------

PINOUTS

1 - Ground
2 - TX_Audio
3 - Audio_Ground
4 - HF_ON (L=ON) -> L=H/F ON
5 - AOP_Sense <- Data Adaptor Select
6 - Serial_Up <- UART up (9600,33.8kbps)
7 - Serial_Down -> UART down
8 - External_Power <- POWER FOR CHARGING
9 - Ground
10 - RX_Audio
11 - Radio_Mute -> L=MUTE
12 - HF_Sense <- L=H/F MODE
13 - Reserved L=FLASH WRITE ENABLE
14 - Ignition <- H=ON
15 - Logic_Power -> H=HANDSET ON
16 - PAON -> Power Amplifier Control Signal.

************************************************** **
Nokia 3310 Secret codes
Jul, 08 2003 - 06:20
contributed by: mef
*#06# To find IMEI (International Mobile Equipment Identity)

*#7780# Restores Factory Settings..(Memory, language, counters not included)

*#3110# For checking the phone's software (SW) - called firmware revision information.

*#746025625# [*#sim0clock#] To check if the Sim-Clock can be Stopped (Sim-clock-stop is a kind of standby mode which will save battery time)

*#92702689# [*#war0anty#] Phone asks 'warranty code:'

6232 (OK) Displays the Month and Year of Manufacture

9268 (OK) Displays Serial Number

7332 (OK) Displays the date of the last repairment - if found

7832 (OK) Displays (if found) the date where the phone was purchased

37832 (OK) Set the Purchasing Date MMYY (This date can be set only once!)

87267 (OK) Transfers ALL phone numbers, Logo's, and ringtones from other gsm phones

Nokia 101 cell phone lockcode
Jul, 10 2000 - 02:35
Nokia 101 cell phones set up by Bell Mobility in Toronto can have their lock code circumvented by the following method:

Type: * 3001 # 12345 [STO] 00
Wait for: NOT DONE
Type: [RCL] 01


Clear old lock code (the last four digits) and enter a new lock code. Be very careful not to delete other characters.

Type: [STO] 01 [STO]
Turn power off.

Nokia 9000/9000i
Nov, 25 2000 - 22:41
To view IMEI number *#06#
To view Software Version enter *#8110# Latest Version is under Phone Info.
To view Week and Year of manufacture enter *#3283#

Samsung SGH-600 / SGH-2100
Secret Codes

*#06# -> Show IMEI
*#9999# -> Show Software Version
*#0837# -> Show Software Version (instructions)
*#0001# -> Show Serial Parameters
*#9125# -> Activates the smiley when charging.

*#9998*228# -> Battery status (capacity, voltage, temperature)
*#9998*246# -> Program status
*#9998*289# -> Change Alarm Buzzer Frequency
*#9998*324# -> Debug screens
*#9998*364# -> Watchdog
*#9998*377# -> EEPROM Error Stack - Use side keys to select values. Cancel and ok.
*#9998*427# -> Trace Watchdog
*#9998*523# -> Change LCD contrast - Only with version G60RL01W
*#9998*544# -> Jig detect
*#9998*636# -> Memory status
*#9998*746# -> SIM File Size
*#9998*778# -> SIM Service Table
*#9998*785# -> RTK (Run Time Kernel) errors - if ok then phn is reset, info is put in memory error. *#9998*786# -> Run, Last UP, Last DOWN
*#9998*837# -> Software Version
*#9998*842# -> Test Vibrator - Flash the screenligth during 10 seconds and vibration activated.
*#9998*862# -> Vocoder Reg - Normal, Earphone or carkit can be selected
*#9998*872# -> Diag
*#9998*947# -> Reset On Fatal Error
*#9998*999# -> Last/Chk

*#9998*9266# -> Yann debug screen (=Debug Screens?)
*#9998*9999# -> Software version

*0001*s*f*t# -> Changes serial parameters (s=?, f=0,1, t=0,1) (incomplete)
*0002*?# -> unknown
*0003*?# -> unknown

SP-unlock SGH-600 and SGH 2100

*2767*3855# -> Full EEPROM Reset ( THIS CODE REMOVES SP-LOCK!! )
But also changes IMEI to 447967-89-400044-0, To restore your old IMEI use the IMEI program found on the software page.

*2767*2878# -> Custom EEEPROM Reset

These codes has been tested with version FLD_2C6 G60SB03X of Samsung SGH-600

Samsung 811
Jul, 08 2000 - 01:24
47*869#08#9

- unlock code / change roaming code / ID

SIEMENS S1 / S3 / S3 COM / S4

To view the software date and else with S3 com, S4, S4Power
press with SIM removed *#06# and left softkey.

To view some other stuff with S4Power
press with SIM removed *#06# and left softkey twice.

To view the software date with S3 com, S4, S4Power
press with SIM installed menu 98 and left softkey twice.

ACTIVATE MONITOR MODE

Siemens S1/S3

Menu, 9 (Phone Options), 7 (Phone Status), Left Display Button (left MENU key),
5553756, HangUp Button (Red HandSet key)

Siemens S3 COM/S4

Menu, 9 (Phone Options), 7 (Phone Status), Left Display Button
(left MENU key), 7684666, HangUp Button (Red HandSet key)

Note: Now Monitor should appear at the bottom of the Network Options menu.

MONITOR MODE

Pressing the right Display Button when in monitor mode will toggle into 1 and 2 modes

Pressing the right Display Button when in monitor mode will show a
list of the six cells with the strongest signals.

Test Mode Indicators: (* = only available when call in progress )

CH Channel Number

RX Signal Strength (dB)

N NCC (Colour Code)

B BCC (Colour Code)

CI Cell ID (in Hex)

C1+ How long before phone does forced hand over.(see RX and RXAM)

LAI Location Area Identity. Display Network ID code(42F010 = 240.01) and MSC

TXPWR Transmit Power (dB)

RXAM Receive signal strength cut-off point

TS* Time Slot Number

TA* Timing Advance. Distance from tower in Km X 2

PL* Power Level
SIEMENS S1

Here's a trick to play Tetris, also known as Klotz on a Siemens S1.
Turn the phone on. Enter PIN. Before the telephone has logged in to the
your GSM net do the following steps.

1: Choose F 9 (function settings)
2: Choose send own number and push the right button for choose.
3: Push 9

USE 2 as < and 8 as > , rotate the klotz with 5 and drop with 4.

I have just heard from one of the programmers of the phone that Tetris
was in the phone during development, but it was removed before it was produced.
Apparantly someone has the patent on games in mobile phones and Siemens
didn't want to pay the licensing fees. It was either in Menu F-9-9 or it's not there at all.

Siemens C 25

Secret Codes

SP unlock *#0003*(secret code 8 digits)#

*#06# for checking the IMEI (International Mobile Equipment Identity)

Resets language to automatic selection : * # 0000 # then Green button

Pin Out

1- GND
2- SB
3- POWER
4- NC
5- TX
6- RX
7- CLOCK
8- DATA
9- GND MIC
10- HF MIC
11- AUDIO
12- GND AUDIO


Sagem MC959

Secret Codes

MC959

in main menu press * for hot-menu:
lcd, led, vibra, tests, imei, software versions, battery voltage

Type MENU - 5 - 1 - 1 - # to enter Engineering menu on SAGEM (RC-712, 721, 815 and 815 plus) phones.

Panasonic G500

IEMI:
To view IMEI number *#06#


--------------------------------------------------------------------------------

PINOUTS

1 - Ground
2 - TX_Audio
3 - Audio_Ground
4 - HF_ON (L=ON) -> L=H/F ON
5 - AOP_Sense <- Data Adaptor Select
6 - Serial_Up <- UART up (9600,33.8kbps)
7 - Serial_Down -> UART down
8 - External_Power <- POWER FOR CHARGING
9 - Ground
10 - RX_Audio
11 - Radio_Mute -> L=MUTE
12 - HF_Sense <- L=H/F MODE
13 - Reserved L=FLASH WRITE ENABLE
14 - Ignition <- H=ON
15 - Logic_Power -> H=HANDSET ON
16 - PAON -> Power Amplifier Control Signal.

Mitsubishi MT- D30

Secret Codes

Monitor mode: Hold C and press 379
Secret menu: Hold C and press 987
Version number: Hold C and press 597
Phase1 and 2 : Hold C and press 499
Warm start : Hold C and press 179
Instant turn off: Hold C and press 999
Unlock menu: Hold C and press 787090

Mitsubishi Trium

*#0000# to reset the phones menu-language to natural language, set initially by the distributor.

*#06# for checking the IMEI (International Mobile Equipment Identity)

hold * then 5806 - show software version
hold * then 5807 - a littel bit diffrent
hold * then 5472 - Testmode for datacable (it seems so)
hold * then 4329 - Activate and deactivate NETMONITOR
hold * then 621342 - Activate and deactivate another NETMONITOR
hold * then 3926 - shutdown

SP lock
You can turn around the lock routin by entering **04*PIN*PIN*PIN# now the secretcode change was applied and the software turns back to main menue. It works not on all triums, only on thos with older sofware versions.

SIEMENS S1 / S3 / S3 COM / S4

To view the software date and else with S3 com, S4, S4Power
press with SIM removed *#06# and left softkey.

To view some other stuff with S4Power
press with SIM removed *#06# and left softkey twice.

To view the software date with S3 com, S4, S4Power
press with SIM installed menu 98 and left softkey twice.

ACTIVATE MONITOR MODE

Siemens S1/S3

Menu, 9 (Phone Options), 7 (Phone Status), Left Display Button (left MENU key),
5553756, HangUp Button (Red HandSet key)

Siemens S3 COM/S4

Menu, 9 (Phone Options), 7 (Phone Status), Left Display Button
(left MENU key), 7684666, HangUp Button (Red HandSet key)

Note: Now Monitor should appear at the bottom of the Network Options menu.

MONITOR MODE

Pressing the right Display Button when in monitor mode will toggle into 1 and 2 modes

Pressing the right Display Button when in monitor mode will show a
list of the six cells with the strongest signals.

Test Mode Indicators: (* = only available when call in progress )

CH Channel Number

RX Signal Strength (dB)

N NCC (Colour Code)

B BCC (Colour Code)

CI Cell ID (in Hex)

C1+ How long before phone does forced hand over.(see RX and RXAM)

LAI Location Area Identity. Display Network ID code(42F010 = 240.01) and MSC

TXPWR Transmit Power (dB)

RXAM Receive signal strength cut-off point

TS* Time Slot Number

TA* Timing Advance. Distance from tower in Km X 2

PL* Power Level
SIEMENS S1

Here's a trick to play Tetris, also known as Klotz on a Siemens S1.
Turn the phone on. Enter PIN. Before the telephone has logged in to the
your GSM net do the following steps.

1: Choose F 9 (function settings)
2: Choose send own number and push the right button for choose.
3: Push 9

USE 2 as < and 8 as > , rotate the klotz with 5 and drop with 4.

[+/-] Selengkapnya...

Proxy server

In computer networks, a proxy server is a server (a computer system or an application program) that services the requests of its clients by forwarding requests to other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server provides the resource by connecting to the specified server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it would 'cache' the first request to the remote server, so it could save the information for later, and make everything as fast as possible.
A proxy server that passes all requests and replies unmodified is usually called a gateway or sometimes tunneling proxy.
A proxy server can be placed in the user's local computer or at various points between the user and the destination servers or the Internet.

Caching proxy server

A caching proxy server accelerates service requests by retrieving content saved from a previous request made by the same client or even other clients. Caching proxies keep local copies of frequently requested resources, allowing large organizations to significantly reduce their upstream bandwidth usage and cost, while significantly increasing performance. Most ISPs and large businesses have a caching proxy. These machines are built to deliver superb file system performance (often with RAID and journaling) and also contain hot-rodded versions of TCP. Caching proxies were the first kind of proxy server.

The HTTP 1.0 and later protocols contain many types of headers for declaring static (cacheable) content and verifying content freshness with an original server, e.g. ETAG (validation tags), If-Modified-Since (date-based validation), Expiry (timeout-based invalidation), etc. Other protocols such as DNS support expiry only and contain no support for validation.
Some poorly-implemented caching proxies have had downsides (e.g., an inability to use user authentication). Some problems are described in RFC 3143 (Known HTTP Proxy/Caching Problems).
Another important use of the proxy server is to reduce the hardware cost. In organization there may be many systems working in the same network or under control of one server, now in this situation we can not have individual connection for all systems with internet. We can simply connect those systems with one proxy server and proxy server with the main server.
Web proxy
A proxy that focuses on WWW traffic is called a "web proxy". The most common use of a web proxy is to serve as a web cache. Most proxy programs (e.g. Squid) provide a means to deny access to certain URLs in a blacklist, thus providing content filtering. This is usually used in a corporate environment, though with the increasing use of Linux in small businesses and homes, this function is no longer confined to large corporations. Some web proxies reformat web pages for a specific purpose or audience (e.g., cell phones and PDAs).
AOL dialup customers used to have their requests routed through an extensible proxy that 'thinned' or reduced the detail in JPEG pictures. This sped up performance, but caused trouble, either when more resolution was needed or when the thinning program produced incorrect results. This is why in the early days of the web many web pages would contain a link saying "AOL Users Click Here" to bypass the web proxy and to avoid the bugs in the thinning software.
Content-filtering web proxy
A content-filtering web proxy server provides administrative control over the content that may be relayed through the proxy. It is commonly used in commercial and non-commercial organizations (especially schools) to ensure that Internet usage conforms to acceptable use policy.
Some common methods used for content filtering include: URL or DNS blacklists, URL regex filtering, MIME filtering, or content keyword filtering. Some products have been known to employ content analysis techniques to look for traits commonly used by certain types of content providers.
A content filtering proxy will often support user authentication, to control web access. It also usually produces logs, either to give detailed information about the URLs accessed by specific users, or to monitor bandwidth usage statistics. It may also communicate to daemon based and/or ICAP based antivirus software to provide security against virus and other malware by scanning incoming content in real time before it enters the network.
Anonymizing proxy server
An anonymous proxy server (sometimes called a web proxy) generally attempts to anonymize web surfing. These can easily be overridden by site administrators, and thus rendered useless in some cases. There are different varieties of anonymizers. One of the more common variations is the open proxy. Because they are typically difficult to track, open proxies are especially useful to those seeking online anonymity, from political dissidents to computer criminals.
Access control: Some proxy servers implement a logon requirement. In large organizations, authorized users must log on to gain access to the web. The organization can thereby track usage to individuals.
Hostile proxy
Proxies can also be installed in order to eavesdrop upon the dataflow between client machines and the web. All accessed pages, as well as all forms submitted, can be captured and analyzed by the proxy operator. For this reason, passwords to online services (such as webmail and banking) should always be exchanged over a cryptographically secured connection, such as SSL.
Intercepting proxy server
An intercepting proxy (also known as a "transparent proxy") combines a proxy server with a gateway. Connections made by client browsers through the gateway are redirected through the proxy without client-side configuration (or often knowledge).

Intercepting proxies are commonly used in businesses to prevent avoidance of acceptable use policy, and to ease administrative burden, since no client browser configuration is required.

It is often possible to detect the use of an intercepting proxy server by comparing the external IP address to the address seen by an external web server, or by examining the HTTP headers on the server side.
Transparent and non-transparent proxy server
The term "transparent proxy" is most often used incorrectly to mean "intercepting proxy" (because the client does not need to configure a proxy and cannot directly detect that its requests are being proxied). Transparent proxies can be implemented using Cisco's WCCP (Web Cache Control Protocol). This proprietary protocol resides on the router and is configured from the cache, allowing the cache to determine what ports and traffic is sent to it via transparent redirection from the router. This redirection can occur in one of two ways: GRE Tunneling (OSI Layer 3) or MAC rewrites (OSI Layer 2).
However, RFC 2616 (Hypertext Transfer Protocol -- HTTP/1.1) offers different definitions:
"A 'transparent proxy' is a proxy that does not modify the request or response beyond what is required for proxy authentication and identification".
"A 'non-transparent proxy' is a proxy that modifies the request or response in order to provide some added service to the user agent, such as group annotation services, media type transformation, protocol reduction, or anonymity filtering".
Forced proxy
The term "forced proxy" is ambiguous. It means both "intercepting proxy" (because it filters all traffic on the only available gateway to the Internet) and its exact opposite, "non-intercepting proxy" (because the user is forced to configure a proxy in order to access the Internet).

Forced proxy operation is sometimes necessary due to issues with the interception of TCP connections and HTTP. For instance interception of HTTP requests can affect the usability of a proxy cache, and can greatly affect certain authentication mechanisms. This is primarily because the client thinks it is talking to a server, and so request headers required by a proxy are unable to be distinguished from headers that may be required by an upstream server (esp authorization headers). Also the HTTP specification prohibits caching of responses where the request contained an authorization header.
Open proxy server
Because proxies might be used to abuse, system administrators have developed a number of ways to refuse service to open proxies. Many IRC networks automatically test client systems for known types of open proxy. Likewise, an email server may be configured to automatically test e-mail senders for open proxies.
Groups of IRC and electronic mail operators run DNSBLs publishing lists of the IP addresses of known open proxies, such as AHBL, CBL, NJABL, and SORBS.
The ethics of automatically testing clients for open proxies are controversial. Some experts, such as Vernon Schryver, consider such testing to be equivalent to an attacker portscanning the client host. [1] Others consider the client to have solicited the scan by connecting to a server whose terms of service include testing.
Reverse proxy server
A reverse proxy is a proxy server that is installed in the neighborhood of one or more web servers. All traffic coming from the Internet and with a destination of one of the web servers goes through the proxy server. There are several reasons for installing reverse proxy servers:
• Encryption / SSL acceleration: when secure web sites are created, the SSL encryption is often not done by the web server itself, but by a reverse proxy that is equipped with SSL acceleration hardware. See Secure Sockets Layer. Furthermore, a hoster can provide a single "SSL proxy" to provide SSL encryption for an arbitrary number of hosts; removing the need for a separate SSL Server Certificate for each host, with the downside that all hosts behind the SSL proxy have to share a common DNS name or IP address for SSL connections.
• Load balancing: the reverse proxy can distribute the load to several web servers, each web server serving its own application area. In such a case, the reverse proxy may need to rewrite the URLs in each web page (translation from externally known URLs to the internal locations).
• Serve/cache static content: A reverse proxy can offload the web servers by caching static content like pictures and other static graphical content.
• Compression: the proxy server can optimize and compress the content to speed up the load time.
• Spoon feeding: reduces resource usage caused by slow clients on the web servers by caching the content the web server sent and slowly "spoon feeds" it to the client. This especially benefits dynamically generated pages.
• Security: the proxy server is an additional layer of defense and can protect against some OS and WebServer specific attacks. However, it does not provide any protection to attacks against the web application or service itself, which is generally considered the larger threat.
• Extranet Publishing: a reverse proxy server facing the Internet can be used to communicate to a firewalled server internal to an organization, providing extranet access to some functions while keeping the servers behind the firewalls. If used in this way, security measures should be considered to protect the rest of your infrastructure in case this server is compromised, as its web application is exposed to attack from the Internet.
Circumventor
A circumventor is a method of defeating blocking policies implemented using proxy servers. Ironically, most circumventors are also proxy servers, of varying degrees of sophistication, which effectively implement "bypass policies".
A circumventor is a web-based page that takes a site that is blocked and "circumvents" it through to an unblocked web site, allowing the user to view blocked pages. A famous example is elgooG, which allowed users in China to use Google after it had been blocked there. elgooG differs from most circumventors in that it circumvents only one block.
Students are able to access blocked sites (games, chatrooms, messenger, offensive material, internet pornography, social networking, etc.) through a circumventor. As fast as the filtering software blocks circumventors, others spring up. However, in some cases the filter may still intercept traffic to the circumventor, thus the person who manages the filter can still see the sites that are being visited.
Circumventors are also used by people who have been blocked from a web site.
Another use of a circumventor is to allow access to country-specific services, so that Internet users from other countries may also make use of them. An example is country-restricted reproduction of media and webcasting.
The use of circumventors is usually safe with the exception that circumventor sites run by an untrusted third party can be run with hidden intentions, such as collecting personal information, and as a result users are typically advised against running personal data such as credit card numbers or passwords through a circumventor.
An example of one way to circumvent a content-filtering proxy server is by tunnelling through to another proxy server, usually controlled by the user, which has unrestricted access to the internet. This is often acheived by using a VPN type tunnel, such as VPN itself or SSH, through a port left open by the proxy (eg. Port 443 is nearly always left open to allow the use of HTTPS). Through the use of encryption, tunnelling to a remote proxy server, provided the remote proxy server is itself secure, is not only difficult to detect, but also difficult to intercept.
Content filter
Many work places, schools and colleges restrict the web sites and online services that are made available in their buildings. This is done either with a specialized proxy, called a content filter (both commercial and free products are available), or by using a cache-extension protocol such as ICAP, that allows plug-in extensions to an open caching architecture.
Requests made to the open internet must first pass through an outbound proxy filter. The web-filtering company provides a database of URL patterns (regular expressions) with associated content attributes. This database is updated weekly by site-wide subscription, much like a virus filter subscription. The administrator instructs the web filter to ban broad classes of content (such as sports, pornography, online shopping, gambling, or social networking). Requests that match a banned URL pattern are rejected immediately.
Assuming the requested URL is acceptable, the content is then fetched by the proxy. At this point a dynamic filter may be applied on the return path. For example, JPEG files could be blocked based on fleshtone matches, or language filters could dynamically detect unacceptable language. If the content is rejected then an HTTP fetch error is returned and nothing is cached.
Most web filtering companies use an internet-wide crawling robot that assesses the likelihood that a content is a certain type (i.e. "This content is 70% chance of porn, 40% chance of sports, and 30% chance of news" could be the outcome for one web page). The resultant database is then corrected by manual labor based on complaints or known flaws in the content-matching algorithms.
Unfortunately, web filtering proxies are not able to peer inside secure sockets HTTP transactions. As a result, users wanting to bypass web filtering will typically search the internet for an open and anonymous HTTPS transparent proxy. They will then program their browser to proxy all requests through the web filter to this anonymous proxy. Those requests will be encrypted with https. The web filter cannot distinguish these transactions from, say, a legitimate access to a financial website. Thus, content filters are only effective against unsophisticated users.
A special case of web proxies is "CGI proxies". These are web sites that allow a user to access a site through them. They generally use PHP or CGI to implement the proxy functionality. These types of proxies are frequently used to gain access to web sites blocked by corporate or school proxies. Since they also hide the user's own IP address from the web sites they access through the proxy, they are sometimes also used to gain a degree of anonymity, called "Proxy Avoidance".
Suffix proxy
A suffix proxy server allows a user to access web content by appending the name of the proxy server to the URL of the requested content (e.g. "en.wikipedia.org.6a.nl").
Suffix proxy servers are easier to use than regular proxy servers. The concept appeared in 2003 in form of the IPv6Gate and in 2004 in form of the Coral Content Distribution Network, but the term suffix proxy was only coined in October 2008 by "6a.nl"[citation needed].
Risks of using anonymous proxy servers
In using a proxy server (for example, anonymizing HTTP proxy), all data sent to the service being used (for example, HTTP server in a website) must pass through the proxy server before being sent to the service, mostly in unencrypted form. It is therefore possible, as has been demonstrated, for a malicious proxy server to record everything sent to the proxy: including unencrypted logins and passwords.
By chaining proxies which do not reveal data about the original requester, it is possible to obfuscate activities from the eyes of the user's destination. However, more traces will be left on the intermediate hops, which could be used or offered up to trace the user's activities. If the policies and administrators of these other proxies are unknown, the user may fall victim to a false sense of security just because those details are out of sight and mind.
The bottom line of this is to be wary when using proxy servers, and only use proxy servers of known integrity (e.g., the owner is known and trusted, has a clear privacy policy, etc.), and never use proxy servers of unknown integrity. If there is no choice but to use unknown proxy servers, do not pass any private information (unless it is properly encrypted) through the proxy.
An important fact is that even secure https (SSL) connections can not protect from a sniffing proxy. It has been demonstrated that the SSL handshake can be intercepted on the proxy. The browser will show a secure, encrypted connection but the proxy is able to read everything in clear text. When encrypting email traffic through a proxy, one more technique is frequently used to stop the encryption: The proxy intercepts the email servers response to the encryption (TLS, SSL) request and fakes a negative response. Almost all email clients use a default setting that uses cleartext transfer in such a case. Using a proxy is always dangerous if you do not own or trust it, keep this in mind. Even high anonymity and privacy services like Tor or Cloakfish can not protect from these risks. Whenever a proxy is used you are at risk that someone "in the middle" can read your data.
In what is more of an inconvenience than a risk, proxy users may find themselves being blocked from certain Web sites, as numerous forums and Web sites block IP addresses from proxies known to have spammed or trolled the site.



[+/-] Selengkapnya...

Rabu, 07 Januari 2009

run kursor without mouse

How To Running cursor withaout mouse

* Click Start.
* Click Run.
* Type “access.cpl“(tanpa quotes).
* Click pada ‘mouse‘ tab.
* Check ‘use mouse keys‘.
* Click OK.

Don't forget Activated NUMLOCK,you can running cursor by 9,3,1 or 7

[+/-] Selengkapnya...

Internet Explorer Keyboard Shortcuts & Tips

F1 Display the Internet Explorer Help, or when in a dialog box, display context help on an item
F11 Toggle between Full Screen and regular view of the browser window
TAB Move forward through the items on a Web page, the Address bar, and the Links bar
SHIFT+TAB Move back through the items on a Web page, the Address bar, and the Links bar

ALT+HOME Go to your Home page
ALT+RIGHT ARROW Go to the next page
ALT+LEFT ARROW or
BACKSPACE Go to the previous page
SHIFT+F10 Display a shortcut menu for a link
CTRL+TAB or
F6 Move forward between frames
SHIFT+CTRL+TAB Move back between frames
UP ARROW Scroll toward the beginning of a document
DOWN ARROW Scroll toward the end of a document
PAGE UP Scroll toward the beginning of a document in larger increments
PAGE DOWN Scroll toward the end of a document in larger increments
HOME Move to the beginning of a document
END Move to the end of a document
CTRL+F Find on this page
F5 or
CTRL+R Refresh the current Web page only if the time stamp for the Web version and your locally stored version are different
CTRL+F5 Refresh the current Web page, even if the time stamp for the Web version and your locally stored version are the same
ESC Stop downloading a page
CTRL+O or
CTRL+L Go to a new location
CTRL+N Open a new window
CTRL+W Close the current window
CTRL+S Save the current page
CTRL+P Print the current page or active frame
ENTER Activate a selected link
CTRL+E Open Search in Explorer bar
CTRL+I Open Favorites in Explorer bar
CTRL+H Open History in Explorer bar
CTRL+click In History or Favorites bars, open multiple folders

Using the Address bar

ALT+D Select the text in the Address bar
F4 Display the Address bar history
CTRL+LEFT ARROW When in the Address bar, move the cursor left to the next logical break (. or /)
CTRL+RIGHT ARROW When in the Address bar, move the cursor right to the next logical break (. or /)
CTRL+ENTER Add "www." to the beginning and ".com" to the end of the text typed in the Address bar
UP ARROW Move forward through the list of AutoComplete matches
DOWN ARROW Move back through the list of AutoComplete matches

Working with favorites

CTRL+D Add the current page to your favorites
CTRL+B Open the Organize Favorites dialog box
ALT+UP ARROW Move selected item up in the Favorites list in the Organize Favorites dialog box
ALT+DOWN ARROW Move selected item down in the Favorites list in the Organize Favorites dialog box

Editing

CTRL+X Remove the selected items and copy them to the Clipboard
CTRL+C Copy the selected items to the Clipboard
CTRL+V Insert the contents of the Clipboard at the selected location
CTRL+A Select all items on the current Web page

[+/-] Selengkapnya...

Selasa, 06 Januari 2009

Spam: prevention is better than cure!

Nowadays almost everyone who heard about the internet knows what spam is. And it is no longer surprise to receive a letter from God-knows-who advertising God-knows-what. Spam has become an annoying part of everyday life for an email user.

So, is it possible to get rid of spam? The answer is apparently negative because there will always exist people who read spam and react on it (you must have heard stories about 'Nigerian letters').

However, what you can do is protect your personal mailbox from the flow of spam. Spam is like rain - you cannot stop it but you can take an umbrella to stay dry and enjoy your walk.

There are two main ways to resist spam: filtering out the incoming spam and taking care not to receive it at all.

The first method requires using various client and server spam filters while the second is just a matter of being careful with your personal email address. Let's talk about the second one.
Web pages

First of all you need to realize that you receive spam because somehow spammers managed to find out your email address.

Very often spammers use special programs that send queries to search systems like Google, Yahoo or MSN in order to find web pages containing email addresses. Then the addresses are saved to a database and here it comes - spam.

This simply means that if your address is published somewhere in the internet then sooner or later you will get spam.

As you are unlikely to be happy about this you should find the web pages with your email address using different search systems.

If your address is unimportant in the context of the web page you should better delete it. Otherwise it is sensible to write the address in a different way: 'name(@)domain.com' or 'name(nospam)domain.com', for example.

When a person reads such an address, they can easily understand what this means but to a program this will not be a valid email address.
Instant messengers

Another source of email addresses are the various internet messengers like ICQ, Yahoo messenger and so on, where during the registration the user is usually asked to enter their email address.

After that the address becomes available to every user of the messenger service. So spammers use fake user names to get access to other users' personal information, particularly email addresses.

Fortunately, in more recent messenger versions users personal information is not available for everyone but it is sometimes still possible to trick the system - and many users still use older unprotected versions.

If you are using a messenger and your email address is in your personal information then your steps should be as above - delete your address or write it in a way inappropriate for automatic recognition.
Form filling

Finally, probably the most common way for an email address to get to spammers databases is when people carelessly enter their emails on some websites.

Often during the registration process for a product/service on the internet the company asks the client for their email address. And then it all depends on the company whether the address is used only to contact the client.

If the company is reliable and cares about its image then your email address will be kept in secret. In this case the only thing you need worry about is that you will be automatically subscribed to the company news-list.

If you are not interested in the newsletters you can always unsubscribe from the list. Unfortunately, there exist companies that do not really care about their clients and the safety of their personal data.

If you are unlucky enough to deal with such a company then quite soon your email address will be in various spammers databases.

A few times I myself have been in the situation where I started receiving spam on one of my email addresses. Remarkably, the address was new and known only to the company - one that seemed to be trustworthy at the beginning.

[+/-] Selengkapnya...

How to eliminate spam

Industry analysts estimate that spam currently accounts for close to 80 percent of email messages sent and causes close to £5 billion in economic losses annually.

The problem with spam is very similar to that of pollution: spammers profit from their activity at the expense of the rest of the population, just like polluters of the environment profit while annoying or endangering others.


So it seems reasonable that our understanding of the economics of pollution may give us some insight into the economics of spam. The work of Nobel laureate Ronald Coase is particularly useful for this.

In 1991, Coase was awarded the Bank of Sweden Prize in Economic Sciences in Memory of Alfred Nobel for his contributions to understanding how property rights and transaction costs affect the structure and functioning of an economy.

Coase showed that if we assume that transaction costs are negligible, as long as property rights are clearly defined, the equilibrium that a market will reach does not depend on who initially owns the affected property. All that will change is who profits from the transactions that lead to the equilibrium.

An example of this principle is a locomotive whose coal-burning engine showers sparks over the land that it passes. Reducing the level of sparks emitted is possible, but requires that the owner of the train incur the additional costs to purchase some sort of spark-reduction equipment.

To quantify this, let’s assume that a train normally produces 10 units of sparks, but these can be reduced at a cost of £200 per unit eliminated, and that each unit of sparks does £300 of damage to the land that it passes.

So if the train produces 10 units of sparks there will be no additional costs for the owner of the train, and the train will do £3,000 of damage to the land that it passes. If the train produces no sparks at all, there will be additional costs of £2,000 for the owner of the train, but the train will do no damage to the land that it passes.

If the owner of the train is free to shower sparks over the land that his train passes, the owners of the land will be willing to pay the owner of the train £300 for each unit of sparks that they eliminate.

This situation will reach an equilibrium where the owners of the land will pay the owner of the train £1,200 to reduce the sparks down to only four units, which the owner of the train will use to finance the modifications to his trains that the reduction in sparks requires.

On the other hand, if the owner of the land is free to deny the owner of the train the right to shower sparks on his land, then the train owner will be happy to pay the landowner £1,200 to compensate him for his inconvenience, and the landowner will then be happy to endure four units of sparks.

The end result that we arrive at is the same in both cases, with the only difference being who is paying whom. And since both parties prefer the arrangement where four units of sparks are produced to any other, it will be the state that this market eventually reaches.

Coase showed that this will always happen as long as there are no transaction costs. So as long as we have clearly-established property rights, we will reach an equilibrium between a polluter and the victims of the pollution, and the equilibrium that we will reach will be the same no matter who owns the property rights to the environment.

If we apply this model to spam, we see that spammers are analogous to the train owners and recipients of email are analogous to the owners of the land that the train will damage with its sparks. But in the case of spam, there is no way for spammers and recipients of email to reach an agreement that limits the amount of spam to a mutually-acceptable level.

First, there are no property rights to enforce; neither the spammers nor the legitimate users of email can claim any exclusive right to use the internet for messaging.

Next, there is no efficient way for spammers to reach an agreement with their victims. Because of this, the amount of spam sent remains unchecked by market forces, as does the annoyance suffered by users of email.

Thus Coase's result provides an easy solution to the problem of spam: define ownership of the internet and the rights to use it. Once we do this, market forces will then drive the amount of spam that is sent to an acceptable level, with slight inefficiencies possible due to the transaction costs involved.

And since the equilibrium that the market will reach does not depend on to whom we assign ownership of the internet, we will even end up with the same reduction in spam if we decide to assign the ownership of the internet to the spammers – a truly remarkable result.

[+/-] Selengkapnya...