May 22, 2020

How to print first page of every Excel worksheet

If you have a lot of worksheet and you would like to print all of it at the same, consider using VBA module code as follows
Sub PrintAllFirstPage() Dim sheet As Worksheet For Each sheet In Application.ActiveWorkbook.Worksheets sheet.PrintOut from:=1, To:=1 Next End Sub you can change the page range by editing the value of from:= and to:=

September 21, 2015

Compressing each folder with 7zip command line tool

If you have a lots of folder that you want to compressed, whether to save space or simply to upload to the web, compressing each of the folder individually can consume a lot of time.
However, you can simplify the process with the powerful 7zip compressor.
to do it,
step 1 - Open 'Run', or simply press the Windows Log on your keyboard and R. (Win Key+R).
Step 2 - Type CMD and press enter.
step 3 - Navigate to your folder location with the command CD then press enter.

For an easier method to directly open your folder in Command Prompt,
Simply presss the Shift key and right-click on your folder. A new link, 'Open command window here' will appear. Just click it, and the current directory of the CMD is that folder.
Next, start the compressing process with the following command;
FOR /D %d in (*.*) DO "%ProgramFiles(x86)%\7-zip\7z.exe" a -mx "%d.7z" "%d"
Use the following command if it give you error about the missing 7z.exe.
FOR /D %d in (*.*) DO "%ProgramFiles%\7-zip\7z.exe" a -mx "%d.7z" "%d"
It will start compressing your folder with the highest compression setting, Ultra.

November 24, 2014

Its time to upgrade your travelling bag. See why!


Easily open your locked bag without too much effort

Most travel bag usually come with a locking mechanism but this locking thing can be easily defeated or can be easily BYPASSED.

How the bypassing works

It works by peeling off the zip by using a pen, knife or whatever it is that can be use to peel the zip. Once the zip is peeled off, the perpetrator can steal any valuable things from your bag WITHOUT BREAKING YOUR LOCK OR BAG.
And the most shocking thing about this is, you wont suspect anything until you arrive at your destination and open your bag.

How can we avoid this?

As the video suggest, you can use a hard case bag with a normal padlock to lock it to avoid the use of zip.

I'm not using this kind of lock. I'm using the rotational number.

This too can be easily bypassed but with a different method. AND IT IS SO EASY TOO!

November 11, 2014

reset firefox newtab with unknown url

Some software downloaded from the internet come bundle with crapware (crap shitty software) that does nothing but inject your browser or any software from your computer with ad-ware. A malicious code to serve you ads that you don't want to.

This injection escalate to make your browser open an unknown URL and there is no setting to remove it. The only way to remove it is via the browser configuration file. Not the setting from the toolbar.

search conduit is one of the famous URL injected to your browser.

For Firefox, type about:config in the address bar. If you encounter any error, simple accept and proceed.

next, in the search box, type, browser.newtab.url. This will narrow down the config list. Double-click the browser.newtab.url below, a dialog box will pop up, and delete everything inside it then click OK. You can also set this to your preferred or favorite website.

Your browser will go back to normal every time you open a new tab.

August 7, 2014

Remove excel password without the password

Sometime we protect our Excel spreadsheet to make it easier for sharing and of course, to prevent us and anyone to make a silly mistake and delete all the formula in a cell.

June 2, 2014

Keep your IP Address to yourself - Use ULTRASURF

One of the concern for Internet users are Safety. But no matter how expensive you paid for your security suite, in the end of the day, the human element still plays the most important part for your safety. As most security expert says, the weakest link in security are human.

October 19, 2013

CAPTCHA:Drawing a line between human and machine

who the hell is Abduljabbar
An example of captcha from Facebook

Spam(including bots), malicious script and or repeated form sending are always the main problem when you open your website for user interaction.

May 17, 2013

Rapidleech with PHP FastCGI and NginX server

What is Rapidleech?
Rapidleech welcome page

taken from their website (http://rapidleech.com),
Rapid Leech is a free server transfer script for use on various popular upload/download sites such as megaupload.com, Rapidshare.com and more than 45 others. The famous Rapidleech script transfers files from Rapidshare, Megaupload, Depositfiles.com, Easy-share.com, etc, via your fast servers connection speed and dumps the file on your server. You may then download these files from your server anytime later.
not only it allow you to transfer files from other file-sharing host or from another FTP server, you also use it to upload a file to another file-sharing host or FTP server. You don't even need to worry about database plus, it's free with a very helpful community too.

January 23, 2013

connect to a wireless network using terminal in UNIX system

connecting to a wireless network is easy when a GUI program does all the hectic work to us. But how do one connect to a wireless network using the terminal? This tutorial is applicable to ALL UNIX-based computer. It's not limited to Backtrack only.
Before we begin, please familiar yourself with some of this term or command-line code.
  wireless key - your network password or the network security key
  essid - the wireless network name
  ifconfig - Enables your wireless device to communicate with the wireless network
  iwlist - List all available access point, or the wireless network that in range.
  iwconfig - to list all network card attach to your computer/laptop
  dhclient - get an IP Address via DHCP from the connected wireless network 

Lets get the working First, fire up your terminal. We need to know what is the name of our wireless device. To get your wireless device name, type iwconfig then press enter. it will list all available network card whether a wired or a wireless one. next, we will tell our wireless card to wake up. To do this, type ifconfig wlan0 up then press enter. In this post, wlan0 is the name of my wireless card. yours could be different.

We now need to scan if there is a wireless network nearby with a known security key. Now type, iwlist wlan0 scan, again, my wlan0 is the name of my wireless card. A list of available network will be printed out on the terminal. Then, we start a handshake with the network. to do this, type iwconfig wlan0 essid wifi key 5405507cd1 then press enter. Lets breakdown the command, iwconfig essid key .

That is the syntax to use the command of iwconfig. Beware though, if your network contain a spaces in their name, you need to wrap the network name with a quote or this, "".  For an example, suppose your network name is wifi net, you need to type the syntax like this, iwconfig wlan0 essid "wifi net" key 5405507cd1. Again, that syntax is for wireless network that use a HEX key.

To use an ASCII key, s: has to be put after the key command. If you are using ASCII key to connect, use it like this, iwconfig wlan0 essid "wifi net" key s: abc0134567892

After a successful connection, in order for us to connect to the internet, we need to have an IP Address. To get an IP Address, type in dhclient wlan0. you should now be fully connected and have your own IP Address.

December 13, 2012

how to convert FLV video to MP4 using FFMPEG

converting videos from FLV to MP4 can be done easily using FFMPEG with this little command.

ffmpeg -i video_source.FLV -vcodec libx264 -ar 22050 video_output.mp4

FFMPEG is a nice little tool to do anything that want with your multimedia files. have fun!

September 4, 2012

Encode any text using WS_FTP encryption

WS_FTP is supposedly help you to encrypt you FTP password so that nobody can know about your password. But the encryption is so poor that anybody/anyone who knew about programming and is able to convert from hexadecimal to decimal and vice versa can easily decrypt the password. this post will help you to encrypt you own text using encryption method used by WS_FTP.
Encode
Your ENCODED WS_FTP will be shown here
this is strictly for educational purpose ONLY!
Thats it! You now have a text that is encrypted in the same way as WS_FTP encrypt your password. you may decrypt your password using WS_FTP password decrypter

February 18, 2011

Report about the Morris Worm

A REPORT ON THE INTERNET WORM


Bob Page
University of Lowell
Computer Science Department


November 7, 1988




[Because of the many misquotes the media have been giving,
this report is Copyright (c) Bob Page, all rights reserved.
Permission is granted to republish this ONLY if you republish
it in its entirety.]



Here's the scoop on the "Internet Worm". Actually it's not a virus -
a virus is a piece of code that adds itself to other programs,
including operating systems. It cannot run independently, but rather
requires that its "host" program be run to activate it. As such, it
has a clear analog to biologic viruses -- those viruses are not
considered live, but they invade host cells and take them over, making
them produce new viruses.

A worm is a program that can run by itself and can propagate a fully
working version of itself to other machines. As such, what was loosed
on the Internet was clearly a worm.

This data was collected through an emergency mailing list set up by
Gene Spafford at Purdue University, for administrators of major
Internet sites - some of the text is included verbatim from that list.
Mail was heavy since the formation of the list; it continues to be on
Monday afternoon - I get at least 2-3 messages every hour. It's
possible that some of this information is incomplete, but I thought
you'd like to know what I know so far.

The basic object of the worm is to get a shell on another machine so
it can reproduce further. There are three ways it attacks: sendmail,
fingerd, and rsh/rexec.


THE SENDMAIL ATTACK:

In the sendmail attack, the worm opens a TCP connection to another
machine's sendmail (the SMTP port), invokes debug mode, and sends a
RCPT TO that requests its data be piped through a shell. That data, a
shell script (first-stage bootstrap) creates a temporary second-stage
bootstrap file called x$$,l1.c (where '$$' is the current process ID).
This is a small (40-line) C program.

The first-stage bootstrap compiles this program with the local cc and
executes it with arguments giving the Internet hostid/socket/password
of where it just came from. The second-stage bootstrap (the compiled
C program) sucks over two object files, x$$,vax.o and x$$,sun3.o from
the attacking host. It has an array for 20 file names (presumably for
20 different machines), but only two (vax and sun) were compiled in to
this code. It then figures out whether it's running under BSD or
SunOS and links the appropriate file against the C library to produce
an executable program called /usr/tmp/sh - so it looks like the Bourne
shell to anyone who looked there.


THE FINGERD ATTACK:

In the fingerd attack, it tries to infiltrate systems via a bug in
fingerd, the finger daemon. Apparently this is where most of its
success was (not in sendmail, as was originally reported). When
fingerd is connected to, it reads its arguments from a pipe, but
doesn't limit how much it reads. If it reads more than the internal
512-byte buffer allowed, it writes past the end of its stack. After
the stack is a command to be executed ("/usr/ucb/finger") that
actually does the work. On a VAX, the worm knew how much further from
the stack it had to clobber to get to this command, which it replaced
with the command "/bin/sh" (the bourne shell). So instead of the
finger command being executed, a shell was started with no arguments.
Since this is run in the context of the finger daemon, stdin and
stdout are connected to the network socket, and all the files were
sucked over just like the shell that sendmail provided.


THE RSH/REXEC ATTACK:

The third way it tried to get into systems was via the .rhosts and
/etc/hosts.equiv files to determine 'trusted' hosts where it might be
able to migrate to. To use the .rhosts feature, it needed to actually
get into people's accounts - since the worm was not running as root
(it was running as daemon) it had to figure out people's passwords.
To do this, it went through the /etc/passwd file, trying to guess
passwords. It tried combinations of: the username, the last, first,
last+first, nick names (from the GECOS field), and a list of special
"popular" passwords:


aaa cornelius guntis noxious simon

academia couscous hacker nutrition simple
aerobics creation hamlet nyquist singer
airplane creosote handily oceanography single
albany cretin happening ocelot smile
albatross daemon harmony olivetti smiles
albert dancer harold olivia smooch
alex daniel harvey oracle smother
alexander danny hebrides orca snatch
algebra dave heinlein orwell snoopy
aliases december hello osiris soap
alphabet defoe help outlaw socrates
ama deluge herbert oxford sossina
amorphous desperate hiawatha pacific sparrows
analog develop hibernia painless spit
anchor dieter honey pakistan spring
andromache digital horse pam springer
animals discovery horus papers squires
answer disney hutchins password strangle
anthropogenic dog imbroglio patricia stratford
anvils drought imperial penguin stuttgart
anything duncan include peoria subway
aria eager ingres percolate success
ariadne easier inna persimmon summer
arrow edges innocuous persona super
arthur edinburgh irishman pete superstage
athena edwin isis peter support
atmosphere edwina japan philip supported
aztecs egghead jessica phoenix surfer
azure eiderdown jester pierre suzanne
bacchus eileen jixian pizza swearer
bailey einstein johnny plover symmetry
banana elephant joseph plymouth tangerine
bananas elizabeth joshua polynomial tape
bandit ellen judith pondering target
banks emerald juggle pork tarragon
barber engine julia poster taylor
baritone engineer kathleen praise telephone
bass enterprise kermit precious temptation
bassoon enzyme kernel prelude thailand
batman ersatz kirkland prince tiger
beater establish knight princeton toggle
beauty estate ladle protect tomato
beethoven euclid lambda protozoa topography
beloved evelyn lamination pumpkin tortoise
benz extension larkin puneet toyota
beowulf fairway larry puppet trails
berkeley felicia lazarus rabbit trivial
berliner fender lebesgue rachmaninoff trombone
beryl fermat lee rainbow tubas
beverly fidelity leland raindrop tuttle
bicameral finite leroy raleigh umesh
bob fishers lewis random unhappy
brenda flakes light rascal unicorn
brian float lisa really unknown
bridget flower louis rebecca urchin
broadway flowers lynne remote utility
bumbling foolproof macintosh rick vasant
burgess football mack ripple vertigo
campanile foresight maggot robotics vicky
cantor format magic rochester village
cardinal forsythe malcolm rolex virginia
carmen fourier mark romano warren
carolina fred markus ronald water
caroline friend marty rosebud weenie
cascades frighten marvin rosemary whatnot
castle fun master roses whiting
cat fungible maurice ruben whitney
cayuga gabriel mellon rules will
celtics gardner merlin ruth william
cerulean garfield mets sal williamsburg
change gauss michael saxon willie
charles george michelle scamper winston
charming gertrude mike scheme wisconsin
charon ginger minimum scott wizard
chester glacier minsky scotty wombat
cigar gnu moguls secret woodwind
classic golfer moose sensor wormwood
clusters gorgeous morley serenity yaco
coffee gorges mozart sharks yang
coke gosling nancy sharon yellowstone
collins gouge napoleon sheffield yosemite
commrades graham nepenthe sheldon zap
computer gryphon ness shiva zimmerman
condo guest network shivers
cookie guitar newton shuttle
cooper gumption next signature


[I wouldn't have picked some of these as "popular" passwords, but
then again, I'm not a worm writer. What do I know?]

When everything else fails, it opens /usr/dict/words and tries every
word in the dictionary. It is pretty successful in finding passwords,
as most people don't choose them very well. Once it gets into
someone's account, it looks for a .rhosts file and does an 'rsh'
and/or 'rexec' to another host, it sucks over the necessary files into
/usr/tmp and runs /usr/tmp/sh to start all over again.


Between these three methods of attack (sendmail, fingerd, .rhosts)
it was able to spread very quickly.


THE WORM ITSELF:

The 'sh' program is the actual worm. When it starts up it clobbers
its argv array so a 'ps' will not show its name. It opens all its
necessary files, then unlinks (deletes) them so they can't be found
(since it has them open, however, it can still access the contents).
It then tries to infect as many other hosts as possible - when it
sucessfully connects to one host, it forks a child to continue the
infection while the parent keeps on trying new hosts.

One of the things it does before it attacks a host is connect to the
telnet port and immediately close it. Thus, "telnetd: ttloop: peer
died" in /usr/adm/messages means the worm attempted an attack.

The worm's role in life is to reproduce - nothing more. To do that it
needs to find other hosts. It does a 'netstat -r -n' to find local
routes to other hosts & networks, looks in /etc/hosts, and uses the
yellow pages distributed hosts file if it's available. Any time it
finds a host, it tries to infect it through one of the three methods,
see above. Once it finds a local network (like 129.63.nn.nn for
ulowell) it sequentially tries every address in that range.

If the system crashes or is rebooted, most system boot procedures
clear /tmp and /usr/tmp as a matter of course, erasing any evidence.
However, sendmail log files show mail coming in from user /dev/null
for user /bin/sed, which is a tipoff that the worm entered.

Each time the worm is started, there is a 1/15 chance (it calls
random()) that it sends a single byte to ernie.berkeley.edu on some
magic port, apparently to act as some kind of monitoring mechanism.


THE CRACKDOWN:

Three main 'swat' teams from Berkeley, MIT and Purdue found copies of
the VAX code (the .o files had all the symbols intact with somewhat
meaningful names) and disassembled it into about 3000 lines of C. The
BSD development team poked fun at the code, even going so far to point
out bugs in the code and supplying source patches for it! They have
not released the actual source code, however, and refuse to do so.
That could change - there are a number of people who want to see the
code.

Portions of the code appear incomplete, as if the program development
was not yet finished. For example, it knows the offset needed to
break the BSD fingerd, but doesn't know the correct offset for Sun's
fingerd (which causes it to dump core); it also doesn't erase its
tracks as cleverly as it might; and so on.

The worm uses a variable called 'pleasequit' but doesn't correctly
initialize it, so some folks added a module called _worm.o to the C
library, which is produced from:
int pleasequit = -1;
the fact that this value is set to -1 will cause it to exit after one
iteration.

The close scrutiny of the code also turned up comments on the
programmer's style. Verbatim from someone at MIT:
From disassembling the code, it looks like the programmer
is really anally retentive about checking return codes,
and, in addition, prefers to use array indexing instead of
pointers to walk through arrays.

Anyone who looks at the binary will not see any embedded strings -
they are XOR'ed with 81 (hex). That's how the shell commands are
imbedded. The "obvious" passwords are stored with their high bit set.

Although it spreads very fast, it is somewhat slowed down by the fact
that it drives the load average up on the machine - this is due to all
the encryptions going on, and the large number of incoming worms from
other machines.

[Initially, the fastest defense against the worm is is to create a
directory called /usr/tmp/sh. The script that creates /usr/tmp/sh
from one of the .o files checks to see if /usr/tmp/sh exists, but not
to see if it's a directory. This fix is known as 'the condom'.]


NOW WHAT?

None of the ULowell machines were hit by the worm. When BBN staffers
found their systems infected, they cut themselves off from all other
hosts. Since our connection to the Internet is through BBN, we were
cut off as well. Before we were cut off, I received mail about the
sendmail problem and installed a patch to disable the feature the worm
uses to get in through sendmail. I had made local modifications to
fingerd which changed the offsets, so any attempt to scribble over the
stack would probably have ended up in a core dump.

Most Internet systems running 4.3BSD or SunOS have installed the
necessary patches to close the holes and have rejoined the Internet.
As you would expect, there is a renewed interest in system/network
security, finding and plugging holes, and speculation over what
will happen to the worm's creator.

If you haven't read or watched the news, various log files have named
the responsible person as Robert Morris Jr., a 23-year old doctoral
student at Cornell. His father is head of the National Computer
Security Center, the NSA's public effort in computer security, and has
lectured widely on security aspects of UNIX.

Associates of the student claim the worm was a 'mistake' - that he
intended to unleash it but it was not supposed to move so quickly or
spread so much. His goal (from what I understand) was to have a
program 'live' within the Internet. If the reports that he intended
it to spread slowly are true, then it's possible that the bytes sent
to ernie.berkeley.edu were intended to monitor the spread of the
worm. Some news reports mentioned that he panicked when, via some
"monitoring mechanism" he saw how fast it had propagated.

A source inside DEC reports that although the worm didn't make much
progress there, it was sighted on several machines that wouldn't be
on its normal propagation path, i.e. not gateways and not on the same
subnet. These machines are not reachable from the outside. Morris
was a summer intern at DEC in '87. He might have included names or
addresses he remembered as targets for infesting hidden internal
networks. Most of the DEC machines in question belong to the group he
worked in.

The final word has not been written - I don't think the FBI have even
met with this guy yet. It will be interesting to see what happens.

Robert Thomas Morris

Robert T. Morris, the author of the Internet Worm program, was
convicted of a Federal felony in the case. The law involved was 18 USC
1030 (A)(5)(a), the Computer Crime and Abuse Act of 1986. He was found
guilty in February of 1990 in US District Court in Syracuse, NY.

In May of 1990, he was sentenced -- outside of Federal sentencing
guidelines -- to 3 years of probation, 400 hours of community service,
and $10,050 in fines plus probation costs. His lawyers appealed the
conviction to the Circuit Court of Appeals, and the conviction was
upheld. His lawyers then appealed to the Supreme Court, but the Court
declined to hear the case -- leaving the conviction intact.

For a while, Robert was (allegedly) working as a programmer
(non-security related) for CenterLine Software (makers of CodeCenter,
et. al.). More recently, Robert has been working on his Ph.D. under
the direction of H.T. Kung at Harvard University. He is also involved
with the ViaWeb company: .

To the best of my knowledge, he has not spoken publicly about the
incident, nor has he attempted to work in computer security.

--gene spafford
Feb 1996

Here's a [slightly edited] news article summarizing references to the
Internet Worm:

From: rgasch@nl.oracle.com (Robert Gasch)
Newsgroups: comp.virus
Subject: Internet Worm SUMMARY (UNIX)
Date: 23 Sep 92 11:33:51 GMT


A while back I requested references regarding papers about the
internet worm of November 88. Here is the promised summary of articles
which I have collected. These seem to be the major reports covering
the incident. There are doubtless a million other newspaper clippings
one could add to this list but I doubt that most of those would be
very informative as the articles below cover the subject in depth.

The number after the authors name indicates the source I
obtained the particular article from. All of these articles are
availible from numerous sources so don't be surprised when you stuble
across these articles somewhere else.

I'd like to apologize that it took me so long to compile this
list but I do not have direct FTP access and have to work via an FTP
server which slows things down. Lastly I'd want to thank all the
people who responded to my query and to all the kind souls that
actually sent me articles.

The archives which I obtained the articles from are a good
place to nose around for other interesting things regarding security
and viruses. I found some worthwhile reading there.

If anybody has any other articles which I did not catch then
please let me know as I'd like to read them myself.


Here's the list:
Eugene Spafford:
The Internet Worm Program: an Analysis (Purdue CS Technical
Report TR-CSD-823) (1)
The Internet Worm Incident (Purdue CS Technical Report
TR-CSD-933) (1)
The Internet Worm: Crisis and Aftermath (2)
ACM, June 1989, vol 32, number 6

Donn Seeley:
A Tour of the Worm (1)
- needs some hacking around before it will print on
a non-laserwriter

Mark Eichin and Jon Rochlins:
With a Microscope and Tweezers: An Analysis of the Internet Virus
of November 1988 (also knows as the MIT paper) (1)

The Cornell Commission (Ted Eisenberg, David Gries and others):
The Computer Worm (3)
Availible from Cornell (call 607-255-3324)

United States Court of Appeals (1)
Document 928 F2D 504 - Court statement on Morris' appeal

Denning
Computers Under Attack: Intruders, Worms and Viruses
Addison Wesley Pub Co Inc. (ISBN: 0-201-53067-8)
I've never seen this one so I can't judge if it's any decent
but I've included it for sake of completeness.



Sources:
(1) - coast.cs.purdue.edu (/pub/doc/morris_worm)
(2) - any good technical library
(3) - call or write cornell technical publications (607-255-3324)

January 7, 2011

Things about computer you can learn from movie

Funny things you see in every movie that has a computer scene. If you have more, please link it in the comment form.

December 16, 2010

USB unsuccessful installed in windows 7 vista

Installing USB driver seems to face a lot of problem in Windows 7 and Windows Vista. Even when you try to install your broadband driver, these two windows will give an error like, "Device driver software was not successfully installed". This problem is likely because some of your registry key is missing. This problem never appear on Windows XP machine. (i guess)

March 8, 2010

Dangers of Car Air-Conditioning

Danger of Car air-conditioning. I get this post from my friend through e-mail. Read CAREFULLY and please re-think of using car air-conditioning too much.

February 13, 2010

moviexplayer - A scam software

Recently, i download some preview movie using p2p program specifically ARES. It took a few days to finish and eat some of my internet bandwidth.

When the download complete, i try to open it but the movie is not playing correctly. All it display is the stupid advertisement to download some software in order to play the movie.


Go to their website and you will be presented with this stupid ads!


Guess what, this 'software' has it's own fans, see the pic below.
moviexplayer

ALL THESE TESTIMONIAL ARE FAKE!!

Please, do not buy or pay for this shitty software. They will only plant a spyware or some stupid virus in your computer to STEAL your personal info such as CREDIT CARD or banking info.

For those who already installed this software, use YourUninstaller to get rid of this stupid software. Update you antivirus and full scan your computer.

** If you had pay the money using paypal, simply put make a 'dispute' with your transaction. It will cancel their account and force them to give back your money.

** Never use p2p software such as ARES to download movie from p2p site. I recommend you go to fenopy, thePirateBay, or ISOhunt to download some movie

** DO read the comments before downloading the movie.

** These scammer will use famous ripper name/group such as aXXo, klaXXon, FXG, and other famous ripper group. But i think aXXo will not rip movie anymore.


ONCE again, never pay for this sofware. It is advisable for you to use the money to buy original DVD than buying this crap software.

If you are reading this, please spread it to your friend or family to avoid them getting scam by this fool.

January 30, 2010

worldwide handphone provider codes

A full-list of worldwide service provider for handset.

41220 = Telephone Development Co,Afghanistan
41201 = Telephone Systems Int Inc - Afghanistan
27601 = Albanian Mobile Comms - Albania
27602 = Vodafone - Albania
60301 = Algerian Telecom AMN - Algeria
60302 = Orascom Telecom Algerie Spa - algeria
54411 = Blue Sky - American Samoa
21303 = S.T.A. MobilAnd - Andorra
63102 = Unitel - Angola
34403 = APUA PCS - Antigua & Barbuda
72235 = PORT HABLE - Argentina
72234 = Telecom Personal SA - Argentina
72207 = UNIFON - Argentina
28301 = ArmenTel - Armenia
36301 = SETAR - Aruba
50506 = Hutchinson 3G - Australia
50501 = Telstra Mobile Comms - Australia
50503 = Vodafone - Australia
50502 = Singtel Optus - Australia
23205 = Connect Austria One - Austria
23210 = 3 AT - Austria
23201 = MobilKom Austria A1 - Austria
23203 = T-Mobile - Austria
23207 = Tele.ring - Austria
40001 = Azercell Telekom B.M. - Azerbaijan
40002 = J.V.Bakcell GSM 2000 - Azerbaijan
36439 = Bahamas Telcom Co - Bahamas
42601 = Batelco - Bahrain
47001 = Grameen Phone - Bangladesh
47003 = Sheba Telecom - Bangladesh
47002 = TM Int'l AKTEL - Bangladesh
342600 = Cable & Wireless - Barbados
342??? = Sunbeach Comms - Barbados
25702 = MTS - Belarus Republic
25701 = VELCOM - Belarus Republic
20620 = BASE - Belium
20601 = Belgacom Mobile Proximus - Belgium
20610 = Mobistar - Belgium
70267 = Belize Telecom - Belize
70268 = Int Telecom INTELCO - Belize
616004 = BBCOM - Benin
61601 = LIBERCOM - Benin
61603 = BeninCell - Benin
61602 = TELECEL BENIN - Benin
35002 = BTC MOBILITY - Bermuda
40211 = BpMobile - Bhutan
73602 = Entel SA - Bolivia
73601 = Nuevatel PCS - Bolivia
21803 = Eronet Mobile Comms - Bosnia Herzegovina
21805 = Mobilna Srpske - Bosnia Herzegovina
21890 = Public Enterprise GSMBIH - Bosnia Herzegovina
65201 = Mascom Wireless - Botswana
65202 = Orange - Botswana
724 03,02,04 = TIM Celular - Brazil
72431 = TNL PCS - Brazil
52811 = DST Communications - Brunei Darussalam
28405 = GLOBUL - Bulgaria
28401 = MobilTel AD M-TEL - Bulgaria
61302 = CELTEL - Burkina Faso
61303 = TELECEL Faso SA - Burkina Faso
64202 = SAFARIS Africell PLC - Burundi
64201 = Spacetel Burundi - Burndi
45601 = CamGSM - Cambodia
45602 = Cambodia Samart Comms - Cambodia
45618 = Cambodia Shinawatra - Cambodia
62401 = MTN Cameroon - Cameroon
64202-OrangelCameroon
30237 = Microcell Connexions Inc FIDO - Canada
302-00001 = Fido - Canada
30272 = Rogers AT&T - Canada
62501 = Cabo Verde Telecom CVMOVEL - Cape Verde
346140 = Cable & Wireless - Cavman Islands
623 = Telecel - Central African Republic
62201 = Celtel Tchad SA - Chad
62202 = LIBERTIS Tchad Mobile SA - Chad
73010 = Entel PCS Telecom. - Chile
73001 = Entel Telefonia Movil - Chile
73002 = Telefonica Movil de Chile - Chile
46000 = China MobileComms Corp - China
46001 = China Unicom CU-GSM - China
732103 = Colombia Movil SA - Colombia
62901 = CelTel Congo - Congo
62910 = LIBERTIS Telecom - Congo
63004 = CELLCO - Congo Republic
63002 = CelTel - Congo Republic
63089 = OASIS, SAIT Telecom - Congo Republic
63001 = Vodacom CONGO-GSM - Congo Republic
71201 = ICE - Costa Rica
61201 = Comstar Cellular Network - Cote d'Ivoire
61205 = Loteny Telecom Telecel - Cote d'Ivoire
61203 = Orange - Cote d'Ivoire
21901 = HTmobile - Croatia
21910 = VIPnet - Croatia
36801 = C_Com - Cuba
28001 = CYTA GSM - Cyprus
23003 = Cesky Mobil OSKAR MOBILE - Czech Republic
23002 = EuroTel Praha - Czech Republic
23001 = T-Mobile - Czech Republic
23800 = Debitel - Denmark
238-00001 = Debitel 3510i - Denmark
23830 = Orange - Denmark
23802 = Sonofon - Denmark
23801 = TDC Mobil - Denmark
23820 = Telia Denmark - Denmark
37001 = Orange - Dominican Republic
74001 = Conecel - Equador
60201 = MobiNil - Egypt
60202 = Vodafone - Egypt
70601 = CTE Telecom - El Salvador
62701 = GETESA - Equatorial Guinea
24801 = AS EMT Estonian Mobile Telephone - Estonia
24802 = Radiolinja Eesti - Estonia
24803 = TELE2 - Estonia
63601 = Ethiopian Telecoms Auth. - Ethiopia
28801 = Faroese Telecom - Faroe Islands
28802 = KALL-GSM - Faroe Islands
54201 = Vodafone Fiji - Fiji
24414 = Alands Mobiltelefon - Finland
24409 = Finnet Group - Finland
24405 = Radiolinja - Finland
24491 = Sonera Corporation - Finland
24412 = Suomen 2G Oy - Finland
24403 = Telia Finland - Finland
20820 = Bouygues Telecom - France
20801 = Orange - France
20810 = SFR - France
54720 = Tikiphone - French Polynesia
34020 = Bouygues Telecom - French West Indies
34001 = Orange Caraibe - French West Indies
34003 = Saint Martin - French West Indies
62803 = CelTel Gabon - Gabon Republic
62801 = Libertis - Gabon Republic
62802 = Telecel Gabon - Gabon Republic
60702 = AFricell - Gambia
60701 = GAMCELL - Gambia
28201 = Geocell Limited - Georgia
28202 = Magti GSM - Georgia
26203 = E-Plus Mobilfunk - Germany
26213 = Mobilcom Multimedia - Germany
26207 = O2 - Germany
26201 = T-Mobile - Germany
26202 = Vodafone - Germany
62002 = Ghana Telecom Mobile - Ghana
62003 = Millicom MOBITEL - Ghana
62001 = ScanCom SPACEFON - Ghana
26601 = Gibraltar Telecoms Gibtel - Gibraltar
20201 = Cosmote - Greece
20209 = Info Quest - Greece
20209 = Q-Telecom - Greece
20210 = Telestet - Greece
20205 = Vodafone Panafon - Greece
29001 = Tele Greenland - Greenland
35213 = Trans-World Telecom - Grenada
23455 = Cable & Wireless - Guernsey
61102 = Sotelgui Lagui - Guinea
61101 = Mobilis Guinea - Guinea
45400 = Hong Kong Telecom CSL - Hong Kong
45404 = Hutchison Telecom Orange Dual Band - Hong Kong
45403 = Hutchinson Telecom - Hong Kong
45410 = New World PCS - Hong Kong
45412 = Peoples Telephone - Hong Kong
45406 = SmarTone Mobile Comms - Hong Kong
45416 = Sunday Comms - Hong Kong
21601 = Pannon GSM - Hungary
21670 = Vodaphone - Hungary
21630 = Westel 900 GSM Mobile - Hungary
27404 = Viking Wireless - Iceland
27401 = Iceland Telecom Siminn - Iceland
27403 = Islandssimi - Iceland
27402 = TAL hf - Iceland
40415 = Aircel Digilink - India
40460 = Aircell Digilink Rajathan:India
40401 = Aircell Digilink Haryana - India
40442 = Aircell - India
40427 = BPL Mobile Maharashtra/Goa - India
40443 = BPL Mobile Nadu/Pondicherry - India
40446 = BPL Mobile Kerala - India
40421 = BPL Mobile Mumbai - India
404 34,38,51,53,54,55,57,58,59,62,64,66,71,72,73,74,75,76,77,79,80 = CellOne - India
40410 = Airtel - Delhi - India
40431 = AirTel - Kolkata - India
40496 = AirTel - Haryana - India
40495 = AirTel - Kerala - India
40494 = AirTel - Tamilnadu - India
40497 = AirTel - Uttar Pradesh (West) - India
40492 = AirTel - Mumbai Metro - India
40498 = AirTel - Gujarat - India
40490 = AirTel - Maharashtra - India
40493 = AirTel - Madhya Pradesh - India
40445 = AirTel - Karnataka - India
40449 = AirTel - Andhra Pradesh - India
40402 = AirTel - Punjab - India
40440 = AirTel - City Of Madras - India
40403 = AirTel - Himachai Pradesh Circle - India
40412 = ESCOTEL Haryana - India
40456 = ESCOTEL UP(W) - India
40419 = ESCOTEL Kerala - India
40405 = HUTCH - India
40470 = Oasis Cellular - India
40413 = HESL - Andhra Pradesh - India
40484 = HESL - Chennai - India
40486 = HESL - Karnataka - India
40411 = HUTCH - India
40420 = Orange - India
404030 = HUTCH - City of Calcutta - India
40422 = IDEA - Maharashtra Circle - India
40407 = IDEA - Andhra Pradesh Circle - India
40424 = IDEA - Gujarat Circle - India
40404 = IDEA - Delhi Circle - India
40478 = IDEA - Madhya Pradesh - India
40468 = Mahanagar Telephone Nigam Ltd Delhi - India
40469 = Mahanagar Telephone Nigam Ltd Mumbai - India
40441 = RPG MAA - India
404 09,18,36,50,52,67,85 = Reliance Telecom Private:India
40414 = SPICE - Punjab - India
40444 = SPICE - Karnataka - India
50521 = INDOSAT-M3 - Indonesia
50508 = Lippo Telecom - Indonesia
51001 = PT. Satelindo IND SATELINDOCEL - Indonesia
51010 = Telkomsel - Indonesia
51011 = PT. Excelcomindo Excelcom - Indonesia
43214 = Payam Kish - Iran
43211 = TCI - Iran
41801 = Iraq Telecom - Iraq
27203 = Meteor - Ireland
27202 = O2 Comms - Ireland
27201 = Vodaphone (was Eirecell) - Ireland
23458 = PRonto GSM - Isle Of Man
42502 = Cellcom - Israel
42501 = Partner Communications ORANGE - Israel
22299 = H3G - Italy
22201 = Telecom Italia Mobile TIM - Italy
22210 = Vodafone Omnitel - Italy
22288 = Wind Telecomunicazioni - Italy
338180 = Cable & Wireless Jamaica - Jamaica
33805 = Mossel DIGICEL - Jamaica
44020 = J-Phone - Japan
44010 = NTT DoCoMo - Japan
42505 = JAWWAL
23450 = Jersey Telecom JT GSM - Jersey
41601 = J.M.T.S Fastlink - Jordan
41677 = Petra Jordanian Mobile MOBILECOM - Jordan
40102 = K'Cell - Kazakhstan
40101 = K-Mobile - Kazakhstan
63903 = Kencell - Kenya
63902 = Safaricom - Kenya
54509 = Kiribati Frigate - Kiribati
41902 = Mobile Telecoms MTCNet - Kuwait
41903 = Wataniya Telecom - Kuwait
43701 = Bitel - Kyrgyz Republic
45702 = ETL Mobile - Lao
45703 = LAT Mobile - Lao
45701 = Lao Telecoms - Lao
45708 = Millicom Lao Co - Lao
24701 = Latvian Mobile Tel. - Latvia
24702 = TELE2 BALTCOM GSM - Latvia
41501 = FTML Cellis - Lebanon
41503 = LibanCell - Lebanon
65102 = Econet Ezi-Cel - Lesotho
65101 = Vodacom - Lesotho
61801 = Lonestar Cell Communications - Liberia
29505 = FL1 Mobilkom - Liechtenstein
29502 = Orange FL - Liechtenstein
29577 = Tele 2 AG - Liechtenstein
29501 = Telecom FL AG - Liechtenstein
24601 = Omnitel - Lithuania
24602 = UAB Bite GSM - Lithuania
24603 = TELE2 - Lithuania
27001 = P+T LUXGSM - Luxembourg
27077 = Millicom Tango GSM - Luxembourg
45501 = C.T.M. TELEMOVEL+ - Macau
45503 = Hutchinson Telecom - Macau
45500 = SMC Maca Smartone Mobile Comms - Macau
29401 = Macedonian Tel. MobiMak - Macedonia
29402 = MTS AD - Macedonia
64601 = Madacom - Madagascar
64602 = SMM Antaris - Madagascar
64603 = Sacel - Madagascar
65010 = CelTel - Malawi
65001 = Telekom Network Callpoint - Malawi
50219 = Celcom - Malaysia
50216 = DiGi Telecommunications - Malaysia
50212 = Maxis Mobile - Malaysia
50217 = TIMECel - Malaysia
50213 = Telekom Cellular TM Touch - Malaysia
50202 = My BSB - Malaysia
50203 = Binariang - Malaysia
47201 = DhiMobile GSM - Maldives
61002 = IKATEL - Mali
61001 = Malitel - Mali
27821 = go Mobile - Malta
27801 = Vodafone - Malta
60901 = MATTEL - Mauritania
60910 = MAURITEL - Mauritania
61701 = Cellplus Mobile Comms - Mauritius
61710 = EMTEL - Mauritius
33403 = MOVISTAR GSM - Mexico
334020 = TELCEL GSM - Mexico
55001 = FSM Telecoms - Micronesia
25902 = Moldcell - Moldova
25901 = Voxtel - Moldova
42899 = MobiCom - Mongolia
22001 = MOBTEL - Montenegro
22004 = MONET - Monenegro
22002 = YU O2 - Montenegro
22003 = Mobilna Telefonija Srbiji - Montenegro
60401 = Itissalat Al-Maghrib IAM - Morocco
60400 = Meditel - Morocco
64301 = T D M Mcel - Mozambique
41401 = MPT GAM Network - Myanmar
64901 = MTC - Namibia
42901 = Nepal Mobile - Nepal
20408 = KPN Telecom - Netherlands
20412 = O2 - Netherlands
20420 = Orange - Netherlands
20416 = T-Molbile - Netherlands
20404 = Vodafone Libertel - Netherlands
36269 = Curaco Telecom CF GSM - Netherlands Antilles
36291 = UTS Wireless Curacao - Netherlands Antilles
36251 = Telcell N.V. - Netherlands Antilles
54601 = OPT Mobilis - New Caledonia
53001 = Vodafone - New Zealand
53003 = Telecom NZ - New Zealand
53004 = Telstra - New Zealand
71021 = ENITEL - Nicaragua
71073 = SERCOM SA - Nicaragua
61402 = CelTEL Niger - Niger
62120 = Econet Wireless Nigeria - Nigeria
62150 = Glo Mobile - Nigeria
62130 = MTN Nigeria - Nigeria
62140 = NITEL GSM - Nigeria
193 = NEAT & T - North Korea
24202 = NetCom GSM - Norway
24201 = Telenor Mobil - Norway
42202 = OMAN MOBILE Oman Telecoms - Oman
41001 = Mobilink - Pakistan
41003 = Ufone - Pakistan
42505 = Palestine Telecomms Co - Palestinian Authority
71401 = Cable & Wireless - Panama
53701 = Bee Mobile Comms - Papua New Guinea
74401 = VOX - Paraguay
74402Hutchinson - Paraguay
71610 = TIM Peru - Peru
51505 = Digitel Mobile/Sun Cellular
51502 = Globe Telecom - Philippines
51501 = Isla Comms - Philippines
51503 = Smart Gold GSM - Philippines
26003 = IDEA Centertel - Poland
26001 = Polkomtel PLUS GSM - Poland
26002 = ERA GSM - Poland
26803 = Optimus Telecom. - Portugal
26806 = Telecom Moveis Nac. TMN - Portugal
26801 = Vodafone Telecel - Portugal
42701 = Q-Tel QATARNET - Qatar
64700 = Orange Reunion - Reunion(LA)
64702 = Outremer Telecom - Reunion (LA)
64710 = Societe Reunionnaise SFR REUNION - Reunion
22603 = Cosmorom - Romania
22601 = MobiFon CONNEX GSM - Romania
22610 = Orange - Romania
25007 = BM Telecom - Russia
25012 = BaykalWestCom - Russia
25019 = INDIGO CJSC Novgorod - Russia
25099 = BeeLine - Russia
25019 = INDIGO CJSC Volgograd - Russia
25020 = Cellular Comms Udmurtia - Russia
25001 = Tambov RUS - Russia
25020 = TELE2 - Russia
25019 = Dal Telecom Int - Russia
25010 = Don Telecom - Russia
25017 = Ermak RMS - Russia
25012 = Far Eastern Cellular - Russia
25002 = MegaFon Moscow - Russia
25012 = ULAN-UDE CELLULAR NETWORK - Russia
25028 = Extel - Russia
25012 = Sakhalin GSM - Russia
25039 = JSC Uralsvyazinform - Russia
25011 = Orensot - Russia
25099 = Bee Line GSM - Russia
25013 = Kuban GSM - Russia
25020 = ECC - Russia
25002 = MegaFon - Russia
25005 = Mibile Comms Systems - Russia
25001 = Mobile Telesystems - Russia
25016 = New Telphone Co - Russia
25003 = NCC - Russia
25019 = INDIGO - Russia
25092 = Primetelefon - Russia
25020 = TELE2 - Russia
25004 = SIBCHALLENGE - Russia
25005 = Sayantelecom LLC - Russia
25020 = TELE2-OMSK - Russia
25005 = SCS-900 - Russia
25012 = Sibintertelecom - Russia
25039 = South Ural Cellular Telephone - Russia
25020 = St Peterburg TELE2 - Russia
25044 = North Caucasian GSM - Russia
25001 = SANTEL - Russia
25005 = Tomsk Cellular Comm - Russia
25039 = Uratel - Russia
25005 = Yeniseitelecom - Russia
25007 = ZAO SMARTS - Russia
25015 = ZAO SMARTS-Ufa - Russia
25002 = ZAO Ural GSM MegaFon - Russia
63510 = MTN Rwandacell - Rwanda
62601 = CSTmovel - Sao Tome & Principe
42001 = Saudi Telecom Co. Al Jawal - Saudi Arabia
42007 = Electronics App' Est. EAE - Saudi Arabia
60802 = Sentel GSM - Senegal
60801 = Sonatel ALIZE - Senegal
22001 = MOBTEL - Serbia
22004 = MONET - Serbia
22002 = YU O2 - Serbia
22003 = Mobilna Telefonija Srbiji - Serbia
63301 = Cable & Wireless Seychelles - Seychelles
63310 = AIRTEL - Seychelles
61901 = Celtel SL - Sierra Leone
61900 = LINTEL - Sierra Leone
52503 = MobileOne - Singapore
52501 = SingTel. ST-GSM 900 - Singapore
52502 = SingTel. ST-GSM 1800 - Singapore
53505 = StarHub - Singapore
23102 = EuroTel GSM - Slovak Republic
23101 = Orange SK - Slovak Republic
29341 = Mobitel - Slovenia
29340 = Si.mobil - Slovenia
29370 = Vega - Slovenia
63701 = BARAKAAT - Somalia
63710 = Nationlink - Somalia
63782 = Telsom Mobile - Somalia
65507 = Cell C (Pty) - South Africa
65510 = MTN - South Africa
65501 = Vodacom - South Africa
450 02,08 = KT ICOM - South Korea
21401 = VODAFONE Airtel Movil - Spain
21403 = AMENA Retevision Movil - Spain
21407 = MOVISTAR Telefonica Moviles - Spain
21402 = MOVISTAR Nokia 6100 - Spain
21404 = XFERA Xfera Moviles - Spain
41303 = CellTel Infiniti - Sri Lanka
41302 = MTN Networks Dialog GSM - Sri Lanka
413071 = Mobitel (Pvt)ltd - Sri Lanka
63401 = MobiTel - Sudan
74601 = ICMS - Suriname
74602 = TELESUR GSM - Suriname
65310 = Swazi MTN - Swaziland
24002 = 3 HI3G Sccess - Sweden
24007 = Comviq GSM - Sweden
24001 = Telia Mobile - Sweden
24008 = Vodafone - Sweden
22803 = Orange - Switzerland
22801 = SWISS GSM Swisscom - Switzerland
22802 = Sunrise - Switzerland
41702 = Spacetel Syria 94 - Syria
41709 = Syrian Telecom Est. MOBILE SYRIA - Syria
411701 = SYRIATEL - Syria
46692 = LDTA GSM Chunghwa Telecom - Taiwan
46601 = Far EasTone GSM 900/1800 Telecoms - Taiwan
46688 = KG Telecom - Taiwan
46693 = Mobitai Communications - Taiwan
46689 = T3G - Taiwan
46697 = Pacific Cellular GSM 1800 - Taiwan
46606 = TUNTEX Telecom - Taiwan
46699 = TransAsia Telecoms - Taiwan
43602 = Indigo Tajikistan - Tajikistan
43601 = JSC Somonsom - Tajikistan
43603 = Mobile Lines of Tajikistan - Tajikistan
43605 = Tajik Tel - Tajikistan
64005 = Celtel Tanzania - Tanzania
64002 = Mobitel - Tanzania
64004 = Vodacom Tanzania - Tanzania
64003 = ZANTEL - Tanzania
64001 = Tritel - Tanzania
52015 = ACT Mobile - Thailand
52001 = Advanced Info Service AIS - Thailand
52023 = Digital Phone GSM 1800 - Thailand
52099 = TA Orange - Thailand
52018 = Total Access Worldphone DTAC - Thailand
52010 = WCS IQ - Thailand
61501 = Togo Telecom TOGO CELL - Togo
53943 = Shoreline Comms - Tonga
53901 = U-CALL - Tonga
37412 = TSTT - Trinidad & Tobago
60503 = TUNISIANA - Tunisia
60502 = Tunisie Telecom TUNTEL - Tunisia
28604 = AYCELL - Turkey
28603 = ARIA - Turkey
28602 = TELSIM Mobil Telekom. - Turkey
28601 = Turk Telekom Turkcell - Turkey
310 27,58,66,80 = T-Mobile - U.S.A.
310-26 T-Mobile phasing out to this - U.S.A.
310-16 T-Mobile U.S.A.
310-20 T-Mobile Idaho U.S.A.
310-20 T-Mobile Oregon U.S.A.
310-20 T-Mobile Washington State U.S.A.
310-21 T-Mobile Iowa U.S.A.
310-22 T-Mobile Kansas U.S.A.
310-22 T-Mobile Oklahoma U.S.A.
310-23 T-Mobile Utah U.S.A.
310-24 T-Mobile New Mexico U.S.A.
310-24 T-Mobile Texas U.S.A.
310-24 T-Mobile Arizona U.S.A.
310-25 T-Mobile Hawaii U.S.A.
310-26 T-Mobile Colorado U.S.A.
310-26 Western Wireless Voicestream U.S.A.
310-31 T-Mobile Florida U.S.A.
31038 = AT&T - U.S.A. New Phones
31064 = Airadigm Comms - U.S.A.
31019 = Alaska Wireless DUTCH HARBOUR - U.S.A.
31000 = Alaska Digital - U.S.A.
31063 = Choice Wireless - U.S.A.
31000 = Cincinnati Bell Wireless - U.S.A.
310 150,170,410 = Cingular Wireless - U.S.A.
31069 = Conestoga - U.S.A.
31026 = Cook Inlet T-Mobile - U.S.A.
31000 = Corr Wireless Comms - U.S.A.
31056 = Dobson - U.S.A.
31010 = Plateau Wireless - U.S.A.
31090 = Edge Wireless - U.S.A.
31034 = Westlink Comms - U.S.A.
31007 = Highland - U.S.A.
31077 = Iowa Wireless Services - U.S.A.
31053 = West Virginia Wireless - U.S.A.
31068 = NPI Wireless - U.S.A.
31010 = Platau Wireless New Mexico - U.S.A.
31045 = North East Colorado Cellular - U.S.A.
31079 = PinPoint Wireless - U.S.A.
31050 = Public Service Cellular - U.S.A.
31020 = Smith Bagley - U.S.A.
31046 = TMP Corp - U.S.A.
31010 = Plateau Wireless Texas - U.S.A.
31011 = Wireless 2000 Telephone - U.S.A.
24407 U.S.A. 3650 ATT 351102500 - U.S.A.
31038 U.S.A. 3650 ATT 351102501 - U.S.A.
31038 U.S.A. 3650 ATT 351102502 - U.S.A.
31059 = Cellular One - U.S.A.
31002 = APC Sprint Spectrum - U.S.A.
31000 = Yorkville Telephone Co - U.S.A.
31015 = BellSouth Mobility DCS - U.S.A.
31016 = Omnipoint Communications - U.S.A.
31017 = Pacific Bell Wireless - Cingular - U.S.A.
31026 = Western Wireless Voicestream - T-Mobile - U.S.A.
24407 U.S.A. 3650 T-Mobile 351102500 - U.S.A.
31038 U.S.A. 3650 T-Mobile 351102501 - U.S.A.
31038 U.S.A. 3650 T-Mobile 351102502 - U.S.A.
31027 = Powertel - U.S.A.
31031 = Aerial Communications - U.S.A.
64101 = Celtel Cellular - Uganda
64110 = MTN Uganda - Uganda
64111 = UTL Telecel - Uganda
25505 = Golden Telecom - Ukraine
25503 = Kyivstar GSM - Ukraine
25501 = Ukrainian Mobile Comms - Ukraine
25502 = Ukrainian Radio Systems WellCOM - Ukraine
42402 = UAE ETISALAT-G2 - United Arab Emirates
42401 = UAE ETISALAT-G1 - United Arab Emirates
43405 = Coscom - Uzbekistan
43404 = Daewoo Unitel - Uzbekistan
43407 = Uzdunrobita GSM - Uzbekistan
43402 = Uzmacom - Uzbekistan
43401 = Buztel - Uzbekistan
54101 = SMILE - Vanuatu
73402 = DIGITEL - Venezuela
73403 = DIGITEL C.A. - Venezuela
73401 = Infonet - Venezuela
45202 = Vinaphone GPC - Vietnam
45201 = MOBIFONE - Vietnam
42102 = Spacetel-Yemen - Yemen
42101 = Yemen Mobile Phone Co SABAFON - Yemen
22001 = MOBTEL - Yugoslavia
22002 = ProMonte GSM - Yugoslavia
64501 = CELTEL - Zambia
64502 = Telecel Zambia Ltd - Zambia
64501 = Zamcell - Zambia
64804 = Econet - Zombabwe
64801 = NET*ONE - Zimbabwe
64803 = Telecel - Zimbabwe