Jump to content

Stop Internet Download Manager From Calling Home Easy Way


NOP-X4

Recommended Posts

-: Stop Internet Download Manager From Calling Home Easy Way :-


Internet Download Manager (IDM) has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. IDM increases download speeds by up to 5 times, resumes and schedules downloads. But it is not a free software so you have to buy it after 30 days of trial period. Here I am going to tell you how to Stop Internet Download Manager From Calling Home With CIDR IP Block Method. So you do not need of any crack/patch etc.

 

------------------------------------------------------------------------------------------------------------------------------
-: This Tutorial is For Educational Purpose Only :-

[ If You Like This Software, Support The Developers and Buy Internet Download Manager ]

https://secure.internetdownloadmanager.com/buy_idm.html

------------------------------------------------------------------------------------------------------------------------------

 

1. Download and Install Internet Download Manager From Here:

http://mirror2.internetdownloadmanager.com/commerce/2odlksMSLPFNW84503ksu99vnwud/idman628build15f.exe

OR

http://internetdownloadmanager.com/getlatestversion.html

2. Turn off The Internet.

3. Register with any IDM serial key.

4. Block all the IP Addresses listed below with your Firewall. :)

 

-----------------------------------------------------------------------------------------------------
-: List of IP Addresses To Be Blocked with Your Firewall :-
-----------------------------------------------------------------------------------------------------
 

Spoiler

 

---------------------------- 

184.173.149.184/30

----------------------------

184.173.188.104/30

----------------------------

50.22.78.28/30

----------------------------

50.97.41.96/29

----------------------------

169.55.0.224/30

----------------------------

169.55.40.5/28

----------------------------

185.80.221.18/28

----------------------------

31.78.22.50/28

----------------------------

 

 

-: List of IP Addresses Without CIDR Format :-

Spoiler

184.173.149.184
184.173.149.185
184.173.149.186
184.173.149.187
-------------------
184.173.188.104
184.173.188.105
184.173.188.106
184.173.188.107
-------------------
50.22.78.28
50.22.78.29
50.22.78.30
50.22.78.31
-------------------
50.97.41.96
50.97.41.97
50.97.41.98
50.97.41.99
50.97.41.100
50.97.41.101
50.97.41.102
50.97.41.103
-------------------
169.55.0.224
169.55.0.225
169.55.0.226
169.55.0.227
-------------------
169.55.40.0
169.55.40.1
169.55.40.2
169.55.40.3
169.55.40.4
169.55.40.5
169.55.40.6
169.55.40.7
169.55.40.8
169.55.40.9
169.55.40.10
169.55.40.11
169.55.40.12
169.55.40.13
169.55.40.14
169.55.40.15
-------------------
185.80.221.16
185.80.221.17
185.80.221.18
185.80.221.19
185.80.221.20
185.80.221.21
185.80.221.22
185.80.221.23
185.80.221.24
185.80.221.25
185.80.221.26
185.80.221.27
185.80.221.28
185.80.221.29
185.80.221.30
185.80.221.31
-------------------

31.78.22.49
31.78.22.50
31.78.22.51
31.78.22.52
31.78.22.53
31.78.22.54
31.78.22.55
31.78.22.56
31.78.22.57
31.78.22.58
31.78.22.59
31.78.22.60
31.78.22.61
31.78.22.62

-------------------

 

-----------------------------------------------------------------------------------------------------
-: For Windows Firewall :-
-----------------------------------------------------------------------------------------------------

 

  • IDM can easily Be Blocked Form Calling Home with Windows Firewall By Using IDM-Easy.Way.
  • As the name suggests IDM.EasyWay is a small App by Me which blockes all The IP Addresses listed above without any Fuss.
  • You can download IDM.EasyWay Here:

 

:)   IDM-Easy.Way.v.1.2.rar   :)

Site: https://www.upload.ee

Sharecode[?]: *SNIP*

VirusTotal: https://www.virustotal.com/file/67d8fedb48bfa3289c3a9ecbb879edfbda016eb581c4c64af7e5f6d4e984d0ac/analysis/  [0/56]

 

Name	: IDM-Easy.Way.v1.2.rar
Size	: 4 KB
MD5	: 8B3EF8908FF9E26A5F854560E9E9F1EB
SHA-1	: 2E2D6976A11949E45865727C302755DE86689E48
SHA-256	: 67D8FEDB48BFA3289C3A9ECBB879EDFBDA016EB581C4C64AF7E5F6D4E984D0AC

 

Link to comment
Share on other sites


  • Replies 132
  • Views 32.5k
  • Created
  • Last Reply

Why only 4 IPs? Does it safe to add only 4?

Link to comment
Share on other sites


Why only 4 IPs? Does it safe to add only 4?

These 4 IPs are actually IP ranges which contains 20 IPs.

I am using this method and never get any nag till date.

Link to comment
Share on other sites


For now is only available to kaspersky or can also be available to other antivirus, in my case I use NIS 2014?

Link to comment
Share on other sites


For now is only available to kaspersky or can also be available to other antivirus, in my case I use NIS 2014?

Well, This method can be used with any antivirus/firewall if it supports IPs in CIDR format.

I never used NIS so I do not whether it supports CIDR or not may be some other user who are using NIS can help you.

Link to comment
Share on other sites


this is the method once steven36 proposed. nothing new. i have been using this for 3 months

Link to comment
Share on other sites


this is the method once steven36 proposed. nothing new. i have been using this for 3 months

I am using this method since October 2012 and I do not know when stveven36 proposed this method.

Link to comment
Share on other sites


this is the method once steven36 proposed. nothing new. i have been using this for 3 months

I am using this method since October 2012 and I do not know when stveven36 proposed this method.

Ya may be. but i heard this from steven36........so you are doing this from Oct 2012 and report this now. don't you think you are very early to report this here? by the way nice idea.

Link to comment
Share on other sites


Ha ha, but I rarely visited this forum for one year or more and a thread related to this kind of stuff was already started so I think there is no need of it, but as the Mr. Perfectionist (OP of that thread) removed tutorial, I started this thread with CIDR method. B)

Link to comment
Share on other sites


Seems this trick does not work with eset smart security :(

2015_04_23_184934.png

Link to comment
Share on other sites


Seems this trick does not work with eset smart security :(

2015_04_23_184934.png

Have you added the IPs with /29 and /30 as they are given above?

Choose address range and then see.

Link to comment
Share on other sites


Seems this trick does not work with eset smart security :(

2015_04_23_184934.png

Have you added the IPs with /29 and /30 as they are given above?

Choose address range and then see.

I can't add that, eset bult-in firewall does not support CIDR IP, i can't add "/" sign.

Link to comment
Share on other sites


Adding 4 IPs is very easy as compared to 23 IPs, and this method can be used with any antivirus/firewall if it supports IPs in CIDR format.

Link to comment
Share on other sites


Seems this trick does not work with eset smart security :(

2015_04_23_184934.png

Have you added the IPs with /29 and /30 as they are given above?

Choose address range and then see.

I can't add that, eset bult-in firewall does not support CIDR IP, i can't add "/" sign.

Seems this trick does not work with eset smart security :(

2015_04_23_184934.png

Have you added the IPs with /29 and /30 as they are given above?

Choose address range and then see.

I can't add that, eset bult-in firewall does not support CIDR IP, i can't add "/" sign.

Seems this trick does not work with eset smart security :(

2015_04_23_184934.png

Have you added the IPs with /29 and /30 as they are given above?

Choose address range and then see.

I can't add that, eset bult-in firewall does not support CIDR IP, i can't add "/" sign.

You can use this to convert to IP range:

http://www.ipaddressguide.com/cidr

Link to comment
Share on other sites


Dukun Cabul

In other words
184.173.149.184/30 = IP range (184.173.149.184 - 184.173.149.187)
184.173.188.104/30 = IP range (184.173.188.104 - 184.173.188.107)
50.22.78.28/30 = IP range (50.22.78.28 - 50.22.78.31)
50.97.41.96/29 = IP range (50.97.41.96 - 50.97.41.103)

You can always do this with all AV as long as there is IP range field ;)

Link to comment
Share on other sites


CIDR Blocks

The ability to group blocks of addresses into a single routing network is the hallmark of CIDR, and the prefix standard used for interpreting IP addresses makes this possible. CIDR blocks share the first part of the bit sequence that comprises the binary representation of the IP address, and blocks are identified using the same decimal-dot CIDR notation system that is used for IPv4 addresses. For example, 10.10.1.16/32 is an address prefix with 32 bits, which is the highest number of bits allowed in IPv4. Addresses with identical prefixes and the same number of bits always belong to the same block. In addition, larger blocks can be easily distinguished from smaller blocks by the length of the prefix. Short prefixes allow for more addresses while large prefixes identify small blocks.

CIDR notation is also used for the newer IPv6 standard, and the syntax is the same. The only difference is that IPv6 addresses may contain up to 128 bits instead of the 32-bit maximum of IPv4. Even though IPv6 addresses may be up to 128 bits in length, it is important to note that subnets on MAC layer networks always use 64-bit host identifiers.

The assignment of CIDR blocks is handled by the Internet Assigned Numbers Authority (IANA). One of the duties of the IANA is to issue large blocks of IP addresses to regional Internet registries (RIRs). These blocks are used for large geographical areas, such as Europe, North America, Africa and Australia. It is then the duty of each RIR to create smaller, but still quite large, blocks of IP addresses to be assigned to local Internet registries (LIRs). Depending on the organization of regional and local registries, blocks may be subdivided further until they are assigned to end users. The size of blocks assigned to end users is dependent on how many individual addresses will be required by each user. Most end users receive their blocks from a single Internet service provider (ISP), but organizations that make use of multiple ISPs must obtain provider-independent blocks directly from an LIR or RIR.

* For routed subnets bigger than /31 or /32, two reserved addresses need to be subtracted from the number of available host addresses: the largest address, which is used as the broadcast address, and the smallest address, which is used to identify the network itself. In addition, any border router of a subnet typically uses a dedicated address.

Better explain,right ? Go HERE

Link to comment
Share on other sites


Blocking the 23 IP's with WFC is working just fine. I don't see any reason to switch to this method.

how can I block using Windows Firewall Control?

Link to comment
Share on other sites


Seems this trick does not work with eset smart security :(

2015_04_23_184934.png

Have you added the IPs with /29 and /30 as they are given above?

Choose address range and then see.

I can't add that, eset bult-in firewall does not support CIDR IP, i can't add "/" sign.

Seems this trick does not work with eset smart security :(

2015_04_23_184934.png

Have you added the IPs with /29 and /30 as they are given above?

Choose address range and then see.

I can't add that, eset bult-in firewall does not support CIDR IP, i can't add "/" sign.

Seems this trick does not work with eset smart security :(

2015_04_23_184934.png

Have you added the IPs with /29 and /30 as they are given above?

Choose address range and then see.

I can't add that, eset bult-in firewall does not support CIDR IP, i can't add "/" sign.

You can use this to convert to IP range:

http://www.ipaddressguide.com/cidr

Great site link. Thanks.
Link to comment
Share on other sites


What is the mean of this :

and updates from IDM servers.

I can't connect it to IDM server bro.

Link to comment
Share on other sites


atm...there 're so many better methods. but anyway. good job. keep it up

You're right I don't use IP blocking anymore my self even..but its good to know if its ever needed ..Its just to much of a hassle to worry with are they going add new ips and having to clean blacklist from the registry . There a much easier better way were you don't have worry with none of this anymore .

Link to comment
Share on other sites


What is the mean of this :
and updates from IDM servers.

I can't connect it to IDM server bro.

Means you can download update files from IDM servers. :unsure: [not from the IDM built-in update feature]

http://mirror2.internetdownloadmanager.com/updates/dfghrtv3465773FRJD843dedhx250dlAsb/idmupdt.exehttp://mirror3.internetdownloadmanager.com/updates/dfghrtv3465773FRJD843dedhx250dlAsb/idmupdt.exe
Link to comment
Share on other sites


this is the method once steven36 proposed. nothing new. i have been using this for 3 months

I am using this method since October 2012 and I do not know when stveven36 proposed this method.

Ya may be. but i heard this from steven36........so you are doing this from Oct 2012 and report this now. don't you think you are very early to report this here? by the way nice idea.

comodo-icon-32.png

I didn't patent it lol . I found it out about at appznet in like 2008 . I blocked ips overall in Comodo 3.0 and it worked fine . Blocked IPS in 2014 and 2015 and it still worked . But blocking IPs is not fool proof . All they have to do is update ips and there protection and it can cause a bunch of headaches if what has changed is not made public in time . Perfect example was build 10 a few weeks ago of this . If you use this method you better stay on your toes . Blocking in ranges may be more effective as long as they don't update ips outside those ranges . ;)

Link to comment
Share on other sites


Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...