Sunday, 23 October 2016

[bang loot] USE multiple SLIDE APP IN ONE PHONE.

How to use multiple slide apk in one phone
Points: 1. First you have to download this zip file that contains 20 slide apps --slide.zip   [PASSWORD=blogbuster756]
2.Then you have to install these apps one by one.
3.Create 20 gmail account via android mobile setting>account>google>add new account and then u have to skip phone number all time in creating accounts.
4.Then craete accounts on slide one by one for that you have to manage 20 phone numbers yourself. It's almost done. Daily 5x20=100.
5. If you want other apps like this post then comment in this post I will make what you want.
About slide app:
No.1 App for lock screen, Free Recharge and more rewards. Get paid to read!
For how many hours is the internet working on your mobile app? Does it reward you?
May be not!!!
Slide App ensures you earn and that too with content of your interest. Slide App helps you earn
whether while sitting idle or travelling, just slide on the content pieces. Read, learn and earn real
money.
Get productive and use every bit of your time reading content that’s fun, informative and what’s
better, it lets you earn that extra buck! So all you got to do is SLIDE to unlock!
Here are a few rules of thumb to slide:
- Swipe Right to Unlock, ah! You don’t want to do that now, that’s usual!
- Swipe Left to read up the content that pops up on your screen
and soon you land onto this page that tells you more on your topic of interest!
- Swipe Up to view options of content and continue earning!
We all do love choices! Now don’t we ;)
Content Buckets:
You can choose categories of your interest and view content in accordance with that, we have a broad
list of 13 different categories, well that’s the stuff that pops up on your locked screen! So choose as
per your interest.
Moreover, our direct referral program, for every friend you refer you will earn.
We are partnering with a number of leading brands in the F&B, Travel, Hospitality, Education and
Technology space to advertise and with content curators at a local level to publish content on Slide
App platform to offer rich and useful content hereby giving you ample opportunity to use the content
and earn at the same time.
When you unlock your phone, you are rewarded with points in your Slide App wallet which can be
redeemed for mobile phone recharges and a lot more. So now you won’t have to pay for your
recharge again. SLIDE is there to pay your mobile bills.
SLIDE and HOW?
1. Install the Slide App!
2. Select the categories of your interest
3. And that’s it! You can now start earning credits immediately by inviting your friends.
4. Once your phone is locked, SLIDE comes alive by showcasing content that you want to see!
Could you ask for more? ;)
And last but not the least,
1. Activity - You can trace your recharge activity and can keep a track of expenditure
2. Control your Lock screen - Using this feature, you can switch off the lock screen content
for a stipulated time period during your meditation hours and switch it back on again
when you are ready to earn!
Do visit our pages:
Website
India: http://www.slideapp.in
Pakistan: https://www.slideapp.pk/
Facebook
India: https://www.facebook.com/SlideIndia/?ref=hl
Pakistan: https://www.facebook.com/slidepakistan/?fref=ts

Friday, 21 October 2016

How to remove shortcut virus in computer/laptopslike removable disk(2gb).lnk,js.vbs ,IMG.exe etc

How to remove shortcut virus in computer/laptopslike removable disk(2gb).lnk,js.vbs ,IMG.exe etc.

  1. First of all you need to download the eset smart antivirus from link below for 32bit and 64 bit as u wish.
  2. 32bit-esest 32bit offline
  3. 64bit-eset 64 bit offline
  4. Remember no need to activate this antivirus because of this is works fine full access so don't worrY..
  5. ESET is privately held and has branch offices in San Diego, United States; Montreal, Canada;[10] Buenos Aires, Argentina; São Paulo, Brazil; Prague, Czech Republic; Kraków, Poland, Singapore; and Australia[11] as well as distributors in over 180 countries.
    According to Gartner, ESET showed the largest worldwide growth rate within the Consumer Security industry for 2011. ESET falls within the Niche Player category of the Gartner Magic Quadrant.[12] According to the Gartner report, "ESET has built a substantial installed base in Europe, the Middle East and Africa, particularly in Eastern Europe, and it has a rapidly growing Small and medium-sized business presence in North America. Its Completeness of Vision score benefits from good malware effectiveness in a lightweight client, but it still suffers from weak enterprise management capabilities and lack of investment in market-leading features, such as application control and virtualization support. ESET is a good shortlist option for organizations seeking an effective, lightweight anti-malware solution.".[13]
    According to Frost & Sullivan, "ESET offers high-performance, proactive endpoint security solutions, and the company goes above and beyond the competition to add value to its products by educating both Mac and PC users on how to defend themselves against the latest cyber threats" and it concluded that "ESET will continue to maintain a strong presence in the endpoint security market and provide high value to its customers.".[14] It awarded ESET the 2012 North American Endpoint Security Products Customer Value Enhancement Award and the 2011 Global Customer Value Enhancement Award.[15]

    Recognition

    ESET Endpoint Security was rated Five Stars by SC Magazine, and won the Best Antivirus Software of 2013 award by Maximum PC. It further received the Parent Tested Parent Approved seal from PTPA Media.[16][17]
    In 2009, CNET awarded ESET Smart Security 4 the CNET Editor's Choice Award under the Internet security suite category.[18] Reviewers stated that "ESET Smart Security is surprisingly light, consuming around 50MB of RAM when running" and concluded that "For getting all your security tools in one box, Smart Security is an effective and well-respected choice.".[19]
    In early 2013, Maximum PC awarded ESET Smart Security 5 a 6/10 rating and was impressed with its comparative strengths. Reviewers stated that "Things weren’t quite as bad as they were with McAfee, and ESET did a much better job at blocking polluted downloads and keeping us away from murky websites.", but concluded with "We had high hopes for ESET, but we are ultimately let down by this year’s release."[20]
    In late 2013, Maximum PC awarded ESET Smart Security 6 a 9/10 rating and was impressed with the improvements made in version 6. Reviewers were unimpressed with the user interface, stating that "There’s nothing flashy about ESET’s interface. It hasn’t been modernized for Windows 8 or touchscreen displays" although they concluded "We dinged the program last year for letting a few nasty containments through, a rare misstep for a program that’s collected a dozen straight VB100 awards from Virus Bulletin in the past two years. It fared much better in our tests this time around."[21]
    ESET products are tested and certified by organizations such as AV-Comparatives (Advanced+, Approved Corporate Product), AV-TEST, Virus Bulletin, ICSA Labs, West Coast Labs (Checkmark), CheckVir (Highest Advanced Rank), VMware (VMware Ready) and Microsoft (Windows 8 Certified).[17][16][22] ESET set a world-record when it received 80 consecutive VB100 awards from Virus Bulletin.[23]

    Products

    Main article: ESET NOD32
    Home/Home Office[24]
  6. ESET Smart Security 9
  7. ESET NOD32 Antivirus 9
  8. ESET Cyber Security Pro for Mac®
  9. ESET Cyber Security for Mac®
  10. ESET Mobile Security for Android™
  11. ESET Anti-Theft
Business Solutions[25]
  • ENDPOINT AND MOBILE SECURITY:
    • ESET Endpoint Security (OSX, Windows)
    • ESET Endpoint Antivirus (OSX, Windows)
    • ESET NOD32 Antivirus Business for Linux Desktop
    • ESET Endpoint Security for Android
  • SERVER SOLUTIONS:
    • ESET File Security For Windows Server
    • ESET File Security for Linux / BSD / Solaris
    • ESET Mail Security for Microsoft Exchange
    • ESET Mail Security for Linux / BSD / Solaris
    • ESET Mail Security for IBM Lotus Domino
    • ESET Security for Microsoft SharePoint
    • ESET Security for Kerio
    • ESET Gateway Security for Linux / BSD / Solaris
  • DATA & ACCESS PROTECTION:
    • ESET Secure Authentication
    • DESlock+ Data Encryption
  1.  

How to download hotstar videos that can't be downloaded from IDM and from other sources.

How to download hotstar videos that can't be downloaded from IDM and from other sources.
  1. First of all you need to know that you can't download full videos from hotstar via IDM.
  • So here is the trick for winows and android.
  • For windows u need to download this hotstarlivesportstraemer.zip from here-download.
  • Then open it and extract it. And goto the hotstarlivestreamer.bat  file and paste there you hotstar video page link in this.
  • Then select your desire video quality like 720 P etc.
  • 2.for android there is no trick but still you can download the copyrighted you tube videos from the trick below.
  • First of all you need to copy the video link from you tube. Then open a new tab and type ssyoutube.com and open.
  • Then paste you you tube video link there and you will see which quality you want to download the video , just select the quality and download popup dialogue will open and download your desired video.
  • I know you are thinking about UC browser that gives download option directly but this is not gives download option sometimes so this trick is helpful.
  •  
  • Hotstar is an online video streaming platform owned by Novi Digital Entertainment Private Limited, a wholly owned subsidiary of Star India Private Limited. Hotstar currently offers over 50,000 hours of TV content and movies across 8 languages, and every major sport covered live. Highly evolved video streaming technology and a high attention to quality of experience across devices and platforms, make Hotstar the most complete video destination for Over The Top (OTT) video consumers.

    A Video Experience Like No Other

    Seamless Video Playback - Our adaptive video streaming technology ensures that the best possible video quality is played back automatically based on the available bandwidth, therefore making it a great video experience on both mobile networks as well as WiFi internet connections. Our video is optimized to play on mobile networks with inconsistent throughput so that our users don’t have to compromise on their experience on the low end, and play HD quality video on the top end of bandwidth availability. Additionally, our users can manually select the quality of video that suits their taste.
    Smart Search - Content search on Hotstar has been optimized to reduce complexity and delay in accessing content. Accurate search results, with lightning fast autocomplete suggestions navigate users to video with minimal navigation friction and ease of use.
    Friendly User Interface - Content organization on Hotstar is a result of a thoughtful user experience approach and strong design principles that ensure that the user is not overwhelmed with the breadth of content available. Using a mix of algorithms and human curation, users at any stage of their interaction with Hotstar will discover content and see their experience evolve with their interaction patterns over time.
    Hot Content Catalogue - Hotstar offers the latest and popular TV, movies and knowledge-based content from India and the world. With content in 8 languages, spanning 15 TV channels, Hotstar is home to some of the longest running, and highest rated TV content in the country. Our roster of the biggest names in Indian cinema makes Hotstar the preferred destination for the biggest blockbusters from Bollywood and regional cinema.
    Originals - In our endeavour to drive meaningful engagement with our audience, Hotstar is investing in generating content keeping in mind the sentiments and attitudes of our consumers and has enjoyed great success with original programming content such as On Air with AIB, M Bole Toh, One Tip One Hand.
    Access - Hotstar is available on the Google Play Store and Apple App Store for mobile and tablet applications and can be accessed at www.hotstar.com.
     

A new way to earn paytm money , mobikwik money, and mobile balances With slide apk

A new way to earn paytm money , mobikwik money, and mobile balances With slide apk
  1. First of all you need to download the slide app via this link-Slide Latest click this link to download slide app-Link
  2. Note:You will redirected into playstore don't worry, it's recommed to get directly 5 rs to your account with installing this apk from play store.
  3. Now you dont need to download any apps from slide apk just lock and unlock your phone and get 0.15 rs every time and get 5 rs  from referring to your friends.
  4. Post completed.
  5.  
  6. No.1 App for lock screen, Free Recharge and more rewards. Get paid to read!For how many hours is the internet working on your mobile app? Does it reward you?
    May be not!!!
    Slide App ensures you earn and that too with content of your interest. Slide App helps you earn
    whether while sitting idle or travelling, just slide on the content pieces. Read, learn and earn real
    money.
    Get productive and use every bit of your time reading content that’s fun, informative and what’s
    better, it lets you earn that extra buck! So all you got to do is SLIDE to unlock!
    Here are a few rules of thumb to slide:
    - Swipe Right to Unlock, ah! You don’t want to do that now, that’s usual!
    - Swipe Left to read up the content that pops up on your screen
    and soon you land onto this page that tells you more on your topic of interest!
    - Swipe Up to view options of content and continue earning!
    We all do love choices! Now don’t we ;)
    Content Buckets:
    You can choose categories of your interest and view content in accordance with that, we have a broad
    list of 13 different categories, well that’s the stuff that pops up on your locked screen! So choose as
    per your interest.
    Moreover, our direct referral program, for every friend you refer you will earn.
    We are partnering with a number of leading brands in the F&B, Travel, Hospitality, Education and
    Technology space to advertise and with content curators at a local level to publish content on Slide
    App platform to offer rich and useful content hereby giving you ample opportunity to use the content
    and earn at the same time.
    When you unlock your phone, you are rewarded with points in your Slide App wallet which can be
    redeemed for mobile phone recharges and a lot more. So now you won’t have to pay for your
    recharge again. SLIDE is there to pay your mobile bills.
    SLIDE and HOW?
    1. Install the Slide App!
    2. Select the categories of your interest
    3. And that’s it! You can now start earning credits immediately by inviting your friends.
    4. Once your phone is locked, SLIDE comes alive by showcasing content that you want to see!
    Could you ask for more? ;)
    And last but not the least,
    1. Activity - You can trace your recharge activity and can keep a track of expenditure
    2. Control your Lock screen - Using this feature, you can switch off the lock screen content
    for a stipulated time period during your meditation hours and switch it back on again
    when you are ready to earn!
     

[updated]Different Apps are automatically downloading and installing to my android mobile What should I do?

 [updated]Different Apps are automatically downloading and installing to my android mobile
What should I do?
->First of all you need to know that this situation is called monkey virus.
->so how to remove it? Here is three methods.
*Method 1:
1.{via windows PC} You need to download the monkey virus removal tool and monkey virus service removal tool via below link and all the steps are specified in this link here-remove monkey virus.
*Method 2:
->The method 2 is the simplest method.
  1. Just download your phone's stock ROM or custom ROM from here-Link
  2. Now turn off your phone and connect with USB with PC for flashing.
  3. for flashing instructions go to -How to flash
4.  Done.
*Method 3: This is the simplest one from above two methods any one can do it.

1.First you need to download this bitdefender antivirus apk from this link-Link here

2.NOW install and open the antivirus and make sure your data connection is on because it scan online detect the viruses. This app has 14 day trial but forget about activating the antivirus just scan and remove virus and uninstall the app after 14 day and change your device ID then reinstall it u will get next 14 day. Thank YOU...


POST Completed

[True]*How to get 250mb daily Airtel sim card with zero balance via psiphone handlerui 108 apk

[True]*How to get 250mb daily Airtel sim card with zero balance via psiphone handlerui 108 apk

Here is how to get free daily 250mb  3G internet in airtel sim card .

*steps: 
1. First of all you need to download the psiphone handler apk via this link-download
2.Now tick on remove port and select proxy type as REAL Host Like this-

3.Now write the proxy server as buddies.airtelmoney.in like this-
4.after this now tap on save and click on tunnel whole device and make sure your data connection  is on.
5.wait at least 30 sec-1min it will 100% connect.
6.after 250mb usage disconnect it.{TESTED ALL STATES}
As a business grows, it might expand to multiple shops or offices across the country and around the world. To keep things running efficiently, the people working in those locations need a fast, secure and reliable way to share information across computer networks. In addition, traveling employees like salespeople need an equally secure and reliable way to connect to their business's computer network from remote locations.
One popular technology to accomplish these goals is a VPN (virtual private network). A VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together. The VPN uses "virtual" connections routed through the Internet from the business's private network to the remote site or employee. By using a VPN, businesses ensure security -- anyone intercepting the encrypted data can't read it.
VPN was not the first technology to make remote connections. Several years ago, the most common way to connect computers between multiple offices was by using a leased line. Leased lines, such as ISDN (integrated services digital network, 128 Kbps), are private network connections that a telecommunications company could lease to its customers. Leased lines provided a company with a way to expand its private network beyond its immediate geographic area. These connections form a single wide-area network (WAN) for the business. Though leased lines are reliable and secure, the leases are expensive, with costs rising as the distance between offices increases.
Today, the Internet is more accessible than ever before, and Internet service providers (ISPs) continue to develop faster and more reliable services at lower costs than leased lines. To take advantage of this, most businesses have replaced leased lines with new technologies that use Internet connections without sacrificing performance and security. Businesses started by establishing intranets, which are private internal networks designed for use only by company employees. Intranets enabled distant colleagues to work together through technologies such as desktop sharing. By adding a VPN, a business can extend all its intranet's resources to employees working from remote offices or their homes.
This article describes VPN components, technologies, tunneling and security. First, let's explore an analogy that describes how a VPN compares to other networking options.

*ALL C++ PROGRAMS of INSERTION AND DELETION OPERATIONS WITH OUTPUT*(DATA STRUCTURE)

*ALL C++ PROGRAMS of  INSERTION AND DELETION OPERATIONS WITH OUTPUT*(DATA STRUCTURE)

  • ->FOR PRGRAMS DOWNLOAD-HERE
  •  
  • C programming is a powerful general-purpose language. It is fast, portable and available in all platforms.
    If you are new to programming, C is a good choice to start your programming journey.
    This is a comprehensive guide on how to get started in C programming language, why you should learn it and how you can learn it.
    C is a general-purpose programming language used for wide range of applications from Operating systems like Windows and iOS to software that is used for creating 3D movies.
    C programming is highly efficient. That’s the main reason why it’s very popular despite being more than 40 years old.
    Standard C programs are portable. The source code written in one system works in another operating system without any change.
    As mentioned, it’s a good language to start learning programming. If you know C programming, you will not just understand how your program works, but you will also be able to create a mental picture on how a computer works.

     

The keyloggers for android mobile and windows pc.

The keyloggers for android mobile and windows pc.
->First of all you need to know what is keylogger : Keylogger is a just a software that monitors what you in device and saves all the keys on the device then after you can see in your device all the typed keys via keyboard entered via you or your friend.
->So we will take here the keylogger as a hacking software.
*For android users all versions.:
1.First you need to download this app called hackers keylogger link here--hackers keylogger.apk.
2.Now install and open the app and choose the keyboard as hackers keyboard by goto settings >language&input>choose keyboard>hacker keyboard.
3.Now is activated, now give you device to your friend and tell him to do some web surf that he desire. If he opens facebook or gmail or anything then you can see all the keys typed by your friend even passwords too.
4.so lets enjoy.
*For windows pc users:
1. First of all you need to download this software by link--keylogger windows.
2.It's same as android keylogger.
3. so enjoy.



A keylogger is a type of surveillance software (considered to be either software or spyware) that has the capability to record every keystroke you make to a log file, usually encrypted. A keylogger recorder can record instant messages, e-mail, and any information you type at any time using your keyboard. The log file created by the keylogger can then be sent to a specified receiver. Some keylogger programs will also record any e-mail addresses you use and Web site URLsyou visit.
Keyloggers, as  a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only. Unfortunately, keyloggers can also be embedded in spywareallowing your information to be transmitted to an unknown third party.
Safeguarding the Internet




How to set a video as a wallpaper on desktop or laptops.

How to set a video as a wallpaper on desktop or laptops.
Steps:
1. Open VLC Media Player. 
   2. Then Go to Tools > Preference Or press CTRL + P and Selecet Video from left panel
   3. Then Choose DirectX video output from output dropdown list
      as shown in below image .
 4. Save the changes ans restart VLC Media Player.
   5. Play any video you would like to set as your desktop wallpaper.
   6. Then click on Video and select DirectX Wallpaper from the dropdown list as show in below image.
  7. Now Minimize vlc player and you will see your video running on your desktop as wallpaper.
   8. If you want your default wallpaper back then uncheck DirectX Wallpaper from video dropdown list.
   9. Hope you like this simple trick share your thought about this trick in comment section.


Matrix effect on desktop.[PC]


        This is amazing notepad trick which will display matrix effect like you might have seen in movies, that is numbers flashes in green colour. Basically we will be creating a small batch file in notepad.

  • Go to Notepad and copy below codes
@echo off

color 02

:start

echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%

goto start
  • Save this file as matrix.bat 

  • Now open this file as see matrix effect on your screen.
SECOND EFFECT:

How To Create Matrix File ?

  1. Open Notepad and copy below code.

@echo off
color 0A
:A
echo b r E w e 4 e T r 8 M e F r a c h a S t 3 D a C r a s p e s T e 4 h 2 w r e G 2
ping -w .9 >nul
echo R E 9 8 8 R a t r e g 6 n u m A b R E X e Y A T u C 7 a D R a c r u C e B E p e
ping -w .9 >nul
echo c E B E s A d R u B R 3 H e R u D 7 g u d U 7 T a b u T 5 e p E 2 a v e 6 8 a Z
ping -w .9 >nul
echo n u r A X a j a s t a 9 h a 6 e h e G a s u t r a t r A y a f E q u 8 u b R u d
ping -w .9 >nul
echo k u v e 4 E 6 3 e t r a d r e f e y e q e 6 U H e z U b r u R a s 2 4 3 r A N a
ping -w .9 >nul
echo v u P R a b R u c e d U s w a h a c r a t h U 7 r a h u t u h u V e 7 U k u S a
ping -w .9 >nul
echo T e D r e 8 A p r a d a b u f U c u c E h E t 7 c r 5 s P a f r e t h u t 9 u t
ping -w .9 >nul
echo b R u G e p a R e s a P H e P a 2 U d 4 P r e F A b a t h a t h U s w a d R U d
ping -w .9 >nul
echo v U Y a C R e T R 9 k u b e D r a T 6 u j e 5 2 4 e B a f 2 u b 5 w A p a y U Y
ping -w .9 >nul
echo b r E w e 4 e n r 8 M e F r a c h a S t 3 D a C r a s p e s T e 4 a 2 w r e G 2
ping -w .9 >nul
echo k u v e 4 E 6 3 e t r a d r e f e y e q e 6 U H e z U b r u R a s 2 4 3 r A N a
ping -w .9 >nul
echo v u P R a b s u c e d U s w a 3 a c r a t h U 7 r a k u t u h u V e 7 U k u S a
ping -w .9 >nul
echo n u r A X a j a s t a 9 h a 6 e h e G a s u t r a t r A y a f E q u 8 u b u u d
ping -w .9 >nul
goto A

  2. Save the file as matrix.bat  (.bat is must)
  3. Done enjoy !!

In chemical analysis, matrix refers to the components of a sample other than the analyte[1] of interest. The matrix can have a considerable effect on the way the analysis is conducted and the quality of the results obtained; such effects are called matrix effects.[2] For example, the ionic strength of the solution can have an effect on the activity coefficients of the analytes.[3][4] The most common approach for accounting for matrix effects is to build a calibration curve using standard samples with known analyte concentration and which try to approximate the matrix of the sample as much as possible.[2] This is especially important for solid samples where there is a strong matrix influence.[5] In cases with complex or unknown matrices, the standard addition method can be used.[3] In this technique, the response of the sample is measured and recorded, for example, using an electrode selective for the analyte. Then, a small volume of standard solution is added and the response is measured again. Ideally, the standard addition should increase the analyte concentration by a factor of 1.5 to 3, and several additions should be averaged. The volume of standard solution should be small enough to disturb the matrix as little as possible.

How to download all paid apps of google play.[saves your thousands of dollars]


  • First of all you need to download the aio downloader from this link-download.
  • Then install and open it and search which app you want.
  • It has all paid apps and games that play store have.
  • Enjoy.
  • Important Warning: This post includes links to download paid apps for free, which is illegal and meant for trial only. This post is just meant for educational purposes and written just for illustration. We are not responsible for whatever you do with your knowledge and whatever consequence you face. Piracy is a crime and we don’t encourage it. We respect the app developers and suggest you to buy the apps from Google Play instead.
    We will discuss the sources to download android apps independently without redirecting to Google Play. This is called Third Party App Install. To install these apps, you must allow App Installing Permissions from unknown sources in your device settings. Go to Settings > Security and you can find the option somewhere inside it. Check mark it.
    So, let’s come to the top markets to grab apps from.
     

CALL ANYONE WITH FAKE SPOOFED NUMBER.[android]

spoof call image के लिए चित्र परिणाम
  • IF YOU WANT TO CALL ANYONE WITH YOUR DESIRED SPOOFED OR FAKE NUMBER THEN I WILL EXPLAIN IT HOW TO DO?

  1. First of all you have to download this application/software via this link-download here.
  2. Now install the app and open it then it will automatic register your device.
  3. Now enter the friends number and then enter your desired fake number which you want like 123456789 or 100 etc.
  4. Now make call.
  5. Done
  6. But this app giving only some credits then after you have to buy credits, but don't worry change your device id and imei and prank your all friends with spoofed number.
  7. enjoy
  8. Caller ID spoofing has been available for years to people with a specialized digital connection to the telephone company, called an ISDN PRI circuit. Collection agencies, law-enforcement officials, and private investigators have used the practice, with varying degrees of legality.
    The first mainstream Caller ID spoofing service, Star38.com, was launched in September 2004. Star38.com was the first service to allow spoofed calls to be placed from a web interface. It stopped offering service in 2005, as a handful of similar sites were launched.
    In August 2006, Paris Hilton was accused of using caller ID spoofing to break into a voicemail system that used caller ID for authentication.[1] Caller ID spoofing also has been used in purchase scams on web sites such as Craigslist and eBay. The scamming caller claims to be calling from Canada into the U.S. with a legitimate interest in purchasing advertised items. Often the sellers are asked for personal information such as a copy of a registration title, etc., before the (scammer) purchaser invests the time and effort to come see the for-sale items. In the 2010 election, fake caller IDs of ambulance companies and hospitals were used in Missouri to get potential voters to answer the phone.[2] In 2009, a vindictive Brooklyn wife spoofed the doctor’s office of her husband’s lover in an attempt to trick the other woman into taking medication which would make her miscarry.[3]
    Frequently, caller ID spoofing is used for prank calls. For example, someone might call a friend and arrange for "The White House" to appear on the recipient's caller display. In December 2007, a hacker used a Caller ID spoofing service and was arrested for sending a SWAT team to a house of an unsuspecting victim.[4] In February 2008, a Collegeville, Pennsylvania man was arrested for making threatening phone calls to women and having their home numbers appear "on their caller ID to make it look like the call was coming from inside the house."[5]
    In March 2008, several residents in Wilmington, Delaware reported receiving telemarketing calls during the early morning hours, when the caller had apparently spoofed the Caller ID to evoke the 1982 Tommy Tutone song "867-5309/Jenny."[6] By 2014, an increase in illegal telemarketers displaying the victim's own number, either verbatim or with a few digits randomised, was observed as an attempt to evade caller ID-based blacklists.[7]
    In the Canadian federal election of May 2, 2011, both live calls and robocalls are alleged to have been placed with false caller ID, either to replace the caller's identity with that of a fictitious person (Pierre Poutine of Joliette, Quebec)[8] or to disguise calls from an Ohio call centre as Peterborough, Ontario domestic calls. See Robocall scandal.
    In June 2012, a search on Google returned nearly 50,000 consumer complaints by individuals receiving multiple continuing spoofed Voice Over IP (VoIP) calls on lines leased / originating from “Pacific Telecom Communications Group” located in Los Angeles, CA (in a mailbox store), in apparent violation of FCC rules. Companies such as these lease out thousands of phone numbers to anonymous voice-mail providers who, in combination with dubious companies like “Phone Broadcast Club” (who do the actual spoofing), allow phone spam to become an increasingly widespread and pervasive problem. In 2013, the misleading caller name "Teachers Phone" was reported on a large quantity of robocalls advertising credit card services as a ruse to trick students' families into answering the unwanted calls in the mistaken belief they were from local schools.[9]
    On January 7, 2013, the Internet Crime Complaint Center issued a Scam Alert for various telephony denial of service attacks by which fraudsters were using spoofed caller ID to impersonate police in an attempt to collect bogus payday loans, then placing repeated harassing calls to police with the victim's number displayed.[10] While impersonation of police is common,[11][12] other scams involved impersonating utility companies to threaten businesses or householders with disconnection[13] as a means to extort money,[14] impersonating immigration officials[15] or impersonating medical insurers to obtain personal data for use in theft of identity.[16] Bogus caller ID has also been used in grandparent scams which target the elderly by impersonating family members and requesting wire transfer of money.[17]

    Technology and methods

    Caller ID is spoofed through a variety of methods and different technology. The most popular ways of spoofing Caller ID are through the use of VoIP or PRI lines.

    Voice over IP

    In the past, Caller ID spoofing required an advanced knowledge of telephony equipment that could be quite expensive. However, with open source software (such as Asterisk or FreeSWITCH, and almost any VoIP company), one can spoof calls with minimal costs and effort.
    Some VoIP providers allow the user to configure their displayed number as part of the configuration page on the provider's web interface. No additional software is required. If the caller name is sent with the call (instead of being generated from the number by a database lookup at destination) it may be configured as part of the settings on a client-owned analog telephone adapter or SIP phone. The level of flexibility is provider-dependent. A provider which allows users to bring their own device and unbundles service so that direct inward dial numbers may be purchased separately from outbound calling minutes will be more flexible. A carrier which doesn't follow established hardware standards (such as Skype) or locks subscribers out of configuration settings on hardware which the subscriber owns outright (such as Vonage) is more restrictive. Providers which market "wholesale VoIP" are typically intended to allow any displayed number to be sent, as resellers will want their end user's numbers to appear.
    In a rare few cases, a destination number served by voice-over-IP is reachable directly at a known SIP address (which may be published through ENUM telephone number mapping, a .tel DNS record or located using an intermediary such as SIP Broker). Some Google Voice users are directly reachable by SIP, as are all iNum Initiative numbers in country codes +883 5100 and +888. As a Federated VoIP scheme provides a direct Internet connection which does not pass through a signaling gateway to the public switched telephone network, it shares the advantages (nearly free unlimited access worldwide) and disadvantages (ernet applications.)

    Servi

    Some spoofing services work similarly to a prepaid calling card. Customers pay in advance for a personal identification number (PIN). Customers dial the number given to them by the company, their PIN, the destination number and the number they wish to appear as the Caller ID. The call is bridged or transferred and arrives with the spoofed number chosen by the caller—thus tricking the called party.
    Many providers also provide a Web-based interface or a mobile application where a user creates an account, logs in and supplies a source number, destination number and the bogus caller ID information to be displayed. The server then places a call to each of the two endpoint numbers and bridges the calls together.
    Some providers offer the ability to record calls, change the voice and send text messages.[18]