NOP-X4 Posted April 23, 2015 Share Posted April 23, 2015 -: Stop Internet Download Manager From Calling Home Easy Way :- Internet Download Manager (IDM) has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. IDM increases download speeds by up to 5 times, resumes and schedules downloads. But it is not a free software so you have to buy it after 30 days of trial period. Here I am going to tell you how to Stop Internet Download Manager From Calling Home With CIDR IP Block Method. So you do not need of any crack/patch etc. -------------------------------------------------------------------------------------------------------------------------------: This Tutorial is For Educational Purpose Only :- [ If You Like This Software, Support The Developers and Buy Internet Download Manager ] https://secure.internetdownloadmanager.com/buy_idm.html ------------------------------------------------------------------------------------------------------------------------------ 1. Download and Install Internet Download Manager From Here: http://mirror2.internetdownloadmanager.com/commerce/2odlksMSLPFNW84503ksu99vnwud/idman628build15f.exe OR http://internetdownloadmanager.com/getlatestversion.html 2. Turn off The Internet. 3. Register with any IDM serial key. 4. Block all the IP Addresses listed below with your Firewall. ------------------------------------------------------------------------------------------------------: List of IP Addresses To Be Blocked with Your Firewall :------------------------------------------------------------------------------------------------------ Spoiler ---------------------------- 184.173.149.184/30 ---------------------------- 184.173.188.104/30 ---------------------------- 50.22.78.28/30 ---------------------------- 50.97.41.96/29 ---------------------------- 169.55.0.224/30 ---------------------------- 169.55.40.5/28 ---------------------------- 185.80.221.18/28 ---------------------------- 31.78.22.50/28 ---------------------------- -: List of IP Addresses Without CIDR Format :- Spoiler 184.173.149.184 184.173.149.185 184.173.149.186 184.173.149.187 ------------------- 184.173.188.104 184.173.188.105 184.173.188.106 184.173.188.107 ------------------- 50.22.78.28 50.22.78.29 50.22.78.30 50.22.78.31 ------------------- 50.97.41.96 50.97.41.97 50.97.41.98 50.97.41.99 50.97.41.100 50.97.41.101 50.97.41.102 50.97.41.103 ------------------- 169.55.0.224 169.55.0.225 169.55.0.226 169.55.0.227 ------------------- 169.55.40.0 169.55.40.1 169.55.40.2 169.55.40.3 169.55.40.4 169.55.40.5 169.55.40.6 169.55.40.7 169.55.40.8 169.55.40.9 169.55.40.10 169.55.40.11 169.55.40.12 169.55.40.13 169.55.40.14 169.55.40.15 ------------------- 185.80.221.16 185.80.221.17 185.80.221.18 185.80.221.19 185.80.221.20 185.80.221.21 185.80.221.22 185.80.221.23 185.80.221.24 185.80.221.25 185.80.221.26 185.80.221.27 185.80.221.28 185.80.221.29 185.80.221.30 185.80.221.31 ------------------- 31.78.22.49 31.78.22.50 31.78.22.51 31.78.22.52 31.78.22.53 31.78.22.54 31.78.22.55 31.78.22.56 31.78.22.57 31.78.22.58 31.78.22.59 31.78.22.60 31.78.22.61 31.78.22.62 ------------------- ------------------------------------------------------------------------------------------------------: For Windows Firewall :------------------------------------------------------------------------------------------------------ IDM can easily Be Blocked Form Calling Home with Windows Firewall By Using IDM-Easy.Way. As the name suggests IDM.EasyWay is a small App by Me which blockes all The IP Addresses listed above without any Fuss. You can download IDM.EasyWay Here: IDM-Easy.Way.v.1.2.rar Site: https://www.upload.ee Sharecode[?]: *SNIP* VirusTotal: https://www.virustotal.com/file/67d8fedb48bfa3289c3a9ecbb879edfbda016eb581c4c64af7e5f6d4e984d0ac/analysis/ [0/56] Name : IDM-Easy.Way.v1.2.rar Size : 4 KB MD5 : 8B3EF8908FF9E26A5F854560E9E9F1EB SHA-1 : 2E2D6976A11949E45865727C302755DE86689E48 SHA-256 : 67D8FEDB48BFA3289C3A9ECBB879EDFBDA016EB581C4C64AF7E5F6D4E984D0AC Link to comment Share on other sites More sharing options...
exodius Posted April 23, 2015 Share Posted April 23, 2015 Why only 4 IPs? Does it safe to add only 4? Link to comment Share on other sites More sharing options...
NOP-X4 Posted April 23, 2015 Author Share Posted April 23, 2015 Why only 4 IPs? Does it safe to add only 4?These 4 IPs are actually IP ranges which contains 20 IPs.I am using this method and never get any nag till date. Link to comment Share on other sites More sharing options...
vitorio Posted April 23, 2015 Share Posted April 23, 2015 For now is only available to kaspersky or can also be available to other antivirus, in my case I use NIS 2014? Link to comment Share on other sites More sharing options...
NOP-X4 Posted April 23, 2015 Author Share Posted April 23, 2015 For now is only available to kaspersky or can also be available to other antivirus, in my case I use NIS 2014?Well, This method can be used with any antivirus/firewall if it supports IPs in CIDR format.I never used NIS so I do not whether it supports CIDR or not may be some other user who are using NIS can help you. Link to comment Share on other sites More sharing options...
Karamjit Posted April 23, 2015 Share Posted April 23, 2015 this is the method once steven36 proposed. nothing new. i have been using this for 3 months Link to comment Share on other sites More sharing options...
NOP-X4 Posted April 23, 2015 Author Share Posted April 23, 2015 this is the method once steven36 proposed. nothing new. i have been using this for 3 monthsI am using this method since October 2012 and I do not know when stveven36 proposed this method. Link to comment Share on other sites More sharing options...
Karamjit Posted April 23, 2015 Share Posted April 23, 2015 this is the method once steven36 proposed. nothing new. i have been using this for 3 monthsI am using this method since October 2012 and I do not know when stveven36 proposed this method.Ya may be. but i heard this from steven36........so you are doing this from Oct 2012 and report this now. don't you think you are very early to report this here? by the way nice idea. Link to comment Share on other sites More sharing options...
NOP-X4 Posted April 23, 2015 Author Share Posted April 23, 2015 Ha ha, but I rarely visited this forum for one year or more and a thread related to this kind of stuff was already started so I think there is no need of it, but as the Mr. Perfectionist (OP of that thread) removed tutorial, I started this thread with CIDR method. B) Link to comment Share on other sites More sharing options...
exodius Posted April 23, 2015 Share Posted April 23, 2015 Seems this trick does not work with eset smart security :( Link to comment Share on other sites More sharing options...
NOP-X4 Posted April 23, 2015 Author Share Posted April 23, 2015 Seems this trick does not work with eset smart security :(Have you added the IPs with /29 and /30 as they are given above?Choose address range and then see. Link to comment Share on other sites More sharing options...
exodius Posted April 23, 2015 Share Posted April 23, 2015 Seems this trick does not work with eset smart security :(Have you added the IPs with /29 and /30 as they are given above?Choose address range and then see.I can't add that, eset bult-in firewall does not support CIDR IP, i can't add "/" sign. Link to comment Share on other sites More sharing options...
NOP-X4 Posted April 23, 2015 Author Share Posted April 23, 2015 Adding 4 IPs is very easy as compared to 23 IPs, and this method can be used with any antivirus/firewall if it supports IPs in CIDR format. Link to comment Share on other sites More sharing options...
kien_vip Posted April 23, 2015 Share Posted April 23, 2015 atm...there 're so many better methods. but anyway. good job. keep it up Link to comment Share on other sites More sharing options...
pokenguyen Posted April 23, 2015 Share Posted April 23, 2015 Seems this trick does not work with eset smart security :(Have you added the IPs with /29 and /30 as they are given above?Choose address range and then see.I can't add that, eset bult-in firewall does not support CIDR IP, i can't add "/" sign.Seems this trick does not work with eset smart security :(Have you added the IPs with /29 and /30 as they are given above?Choose address range and then see.I can't add that, eset bult-in firewall does not support CIDR IP, i can't add "/" sign.Seems this trick does not work with eset smart security :(Have you added the IPs with /29 and /30 as they are given above?Choose address range and then see.I can't add that, eset bult-in firewall does not support CIDR IP, i can't add "/" sign.You can use this to convert to IP range:http://www.ipaddressguide.com/cidr Link to comment Share on other sites More sharing options...
Dukun Cabul Posted April 23, 2015 Share Posted April 23, 2015 In other words184.173.149.184/30 = IP range (184.173.149.184 - 184.173.149.187)184.173.188.104/30 = IP range (184.173.188.104 - 184.173.188.107)50.22.78.28/30 = IP range (50.22.78.28 - 50.22.78.31)50.97.41.96/29 = IP range (50.97.41.96 - 50.97.41.103)You can always do this with all AV as long as there is IP range field ;) Link to comment Share on other sites More sharing options...
sirri Posted April 23, 2015 Share Posted April 23, 2015 CIDR BlocksThe ability to group blocks of addresses into a single routing network is the hallmark of CIDR, and the prefix standard used for interpreting IP addresses makes this possible. CIDR blocks share the first part of the bit sequence that comprises the binary representation of the IP address, and blocks are identified using the same decimal-dot CIDR notation system that is used for IPv4 addresses. For example, 10.10.1.16/32 is an address prefix with 32 bits, which is the highest number of bits allowed in IPv4. Addresses with identical prefixes and the same number of bits always belong to the same block. In addition, larger blocks can be easily distinguished from smaller blocks by the length of the prefix. Short prefixes allow for more addresses while large prefixes identify small blocks.CIDR notation is also used for the newer IPv6 standard, and the syntax is the same. The only difference is that IPv6 addresses may contain up to 128 bits instead of the 32-bit maximum of IPv4. Even though IPv6 addresses may be up to 128 bits in length, it is important to note that subnets on MAC layer networks always use 64-bit host identifiers.The assignment of CIDR blocks is handled by the Internet Assigned Numbers Authority (IANA). One of the duties of the IANA is to issue large blocks of IP addresses to regional Internet registries (RIRs). These blocks are used for large geographical areas, such as Europe, North America, Africa and Australia. It is then the duty of each RIR to create smaller, but still quite large, blocks of IP addresses to be assigned to local Internet registries (LIRs). Depending on the organization of regional and local registries, blocks may be subdivided further until they are assigned to end users. The size of blocks assigned to end users is dependent on how many individual addresses will be required by each user. Most end users receive their blocks from a single Internet service provider (ISP), but organizations that make use of multiple ISPs must obtain provider-independent blocks directly from an LIR or RIR. * For routed subnets bigger than /31 or /32, two reserved addresses need to be subtracted from the number of available host addresses: the largest address, which is used as the broadcast address, and the smallest address, which is used to identify the network itself. In addition, any border router of a subnet typically uses a dedicated address.Better explain,right ? Go HERE Link to comment Share on other sites More sharing options...
hackerz14 Posted April 23, 2015 Share Posted April 23, 2015 Blocking the 23 IP's with WFC is working just fine. I don't see any reason to switch to this method.how can I block using Windows Firewall Control? Link to comment Share on other sites More sharing options...
vitorio Posted April 23, 2015 Share Posted April 23, 2015 Seems this trick does not work with eset smart security :(Have you added the IPs with /29 and /30 as they are given above?Choose address range and then see. I can't add that, eset bult-in firewall does not support CIDR IP, i can't add "/" sign. Seems this trick does not work with eset smart security :(Have you added the IPs with /29 and /30 as they are given above?Choose address range and then see. I can't add that, eset bult-in firewall does not support CIDR IP, i can't add "/" sign. Seems this trick does not work with eset smart security :(Have you added the IPs with /29 and /30 as they are given above?Choose address range and then see. I can't add that, eset bult-in firewall does not support CIDR IP, i can't add "/" sign.You can use this to convert to IP range:http://www.ipaddressguide.com/cidrGreat site link. Thanks. Link to comment Share on other sites More sharing options...
NOP-X4 Posted April 23, 2015 Author Share Posted April 23, 2015 Everything explained here. B)CIDR (Wikipedia) Link to comment Share on other sites More sharing options...
Michael* Posted April 23, 2015 Share Posted April 23, 2015 This format is also supported by windows commands netsh advfirewall Link to comment Share on other sites More sharing options...
exodius Posted April 28, 2015 Share Posted April 28, 2015 What is the mean of this : and updates from IDM servers.I can't connect it to IDM server bro. Link to comment Share on other sites More sharing options...
steven36 Posted April 28, 2015 Share Posted April 28, 2015 atm...there 're so many better methods. but anyway. good job. keep it upYou're right I don't use IP blocking anymore my self even..but its good to know if its ever needed ..Its just to much of a hassle to worry with are they going add new ips and having to clean blacklist from the registry . There a much easier better way were you don't have worry with none of this anymore . Link to comment Share on other sites More sharing options...
NOP-X4 Posted April 28, 2015 Author Share Posted April 28, 2015 What is the mean of this : and updates from IDM servers.I can't connect it to IDM server bro.Means you can download update files from IDM servers. :unsure: [not from the IDM built-in update feature]http://mirror2.internetdownloadmanager.com/updates/dfghrtv3465773FRJD843dedhx250dlAsb/idmupdt.exehttp://mirror3.internetdownloadmanager.com/updates/dfghrtv3465773FRJD843dedhx250dlAsb/idmupdt.exe Link to comment Share on other sites More sharing options...
steven36 Posted April 28, 2015 Share Posted April 28, 2015 this is the method once steven36 proposed. nothing new. i have been using this for 3 monthsI am using this method since October 2012 and I do not know when stveven36 proposed this method.Ya may be. but i heard this from steven36........so you are doing this from Oct 2012 and report this now. don't you think you are very early to report this here? by the way nice idea.I didn't patent it lol . I found it out about at appznet in like 2008 . I blocked ips overall in Comodo 3.0 and it worked fine . Blocked IPS in 2014 and 2015 and it still worked . But blocking IPs is not fool proof . All they have to do is update ips and there protection and it can cause a bunch of headaches if what has changed is not made public in time . Perfect example was build 10 a few weeks ago of this . If you use this method you better stay on your toes . Blocking in ranges may be more effective as long as they don't update ips outside those ranges . ;) Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.