When you place an order on searchbug.com using a personal, business or verified business account you can retreive old searchbug reports from the same account (for as long as your account remains active and in good standing).
Even if you’re using a prepaid account or hitting one of the many integrated API’s and you need to pull up previously obtained reports you can simply look them up in your account without incurring additional fees. No need to rerun reports you already paid for. This is also handy if for some reason you were not able to see your reports when they initially completed due to internet errors or a broadband service interruption or even a computer malfunction. Your reports will always remain in your active account. We reserve the right to purged reports from inactive, suspended and abandon accounts.
The easiest way to retrieve your previous reports is to first, login to your searchbug account. See login link shown here.
Next, once you have successfully logged in, click on the “My Account” tab found in the right hand margin of the page. Once you click the My Account tab you will see an new set of tabs located under the yellow tabs. These are your My Account Functions. Click on the report tab to visit the reporting functions.
Next select the time period you wish to review. If your reports were run in the last 30 days the default date range is pre-selected. If you need older reports or simply a report from yesterday or today, use the drop down arrow next to the date range to change the date to make finding the information easier.
Once you have selected the appropriate date range, select the usage history to see a list of completed reports in date order. You can sort by date, search type, or cost. To view the reports simply click on the link under “Subject / Report”. If the text is not a link, then no report was generated and you were charged accordingly at the No Match, No Hit, or No Info rate. Some reports such as SSN, IP Address or Email address verifications (some of which are included in certain subscriptions) are not saved and can simply be run again.
Some portions of the images above have been blurred to protect our users and the subject information. If you need additional help please call our support line during business hours to speak with a customer service specialist.
There are over hundreds of thousands, if not more, of IP addresses used all over the world. The addresses are used to accurately identify the name and ownership association of a computer system, and can very often contain multiple IP addresses within one system or sets of systems.
Spam is also another one of those “things” that can be found on computers all over the world, and in large quantities as well. Spam is unwanted mail, and can be aggravating, annoying and to the recipient, a seemingly fruitless effort to fight. Getting rid of spam from computers can be a monumental task within itself, especially without the right tools and resources in place to help fight against it.
IP addresses identify a person’s computer system, so therefore users may use an IP address to block unwanted mail. This works very much as in the same manner as blocking unwanted postal mail. A recipient can “block” their mail addresses from receiving unwanted mail from a designated company by requesting that the company places their address on their “Do Not Mail” list. The company is then not allowed to mail or contact the recipient by mail for any reason.
For IP addresses, there is a digital block placed on the computer system that identifies from which IP location the email is originating, and when there is mail launched from that IP address, the software will block it from getting to the recipient’s email inbox. Customers love this method, especially if they are accustomed to getting tons of spam email from different places. Very often, companies or hackers will try to “change” their IP addresses, but since IP addresses can be an accurate identifying mechanism, there is no way to mask what launches from that particular computer. This is helpful for customers or individual email addresses that want to block those IP addresses that come from well-known mail servers who constantly try to attach email addresses.
How Does It Work?
The software that’s written to identify spam mail works pretty simple and straightforward. The software is written to reject any spam mail that originates from mail servers by locating the remote server’s IP address, then using the ip4r format to convert the address to a domain name. Afterwards, there will usually be a name lookup to see if there is a database where the IP address may be listed.
IP addresses that are listed on blacklists don’t immediately suggest that the originating address is a spam sender; however, the blacklisted addresses simply signal the computer to not accept any mail from the originating address.
Clearing your browser history can be one of the simplest ways to keep your search history private.
How To Clear Internet Browser History
Certainly at one time or another, every person has wanted to or needed to clear their Internet browser history. Whether it was simply to speed up the computer’s processor time or to remove the history so that no one would be able to see the sites where the user had been, clearing the history somewhat insures that they can keep their Internet searches anonymous. Or can they?
Internet browsing has become one of the most frequently used applications on the computer. Accessing the World Wide Web is used for personal and business reasons, and there are some individuals and companies who prefer to keep their browsing history private.
Each time a person browses the internet and visits a website, their viewed sites are saved to the computer’s local hard drive. There is nothing that the user has to do or launch in order for this to happen. It’s a default save that’s really designed to help the computer and make the user experience more enjoyable. By saving the internet web browsing history and locations, the frequently visited web pages are able to load and launch significantly faster. This is because the files are accessing the computer’s hard drive instead of the need to download the entire web page or website all over again. A re-launch each time would slow down the computer’s processing time significantly and make site-loads slower, more cumbersome and very annoying.
However, along with the convenience of having the pages and sites load faster, there are also down sides to this great idea. Since those loaded pages can take up a great amount of space on a person’s hard drive, it becomes frequently necessary to delete the computer’s Internet history and activity from time to time.
Unbeknownst to many computer users, the computer’s hard drive stores a great deal of information about the user’s search habits and activities. For instance, you can find out about the person’s shopping activity, banking activity, sites that they’ve visited, images and movies they’ve viewed and even activity they’ve done on social networking sites. The hard disk stores all of this information and takes up valuable disk space. Recouping that disk space can benefit the computer and speed up daily computer tasks as well.
It is quite easy to go into most any computer system setup and delete the history, simply by following a few steps that are for your operating system. It’s a good suggestion to do this as often as possible, or even to set a reminder for you to do this at regular intervals.
What kinds of things can and should you delete from the history?
- Browser history that shows where you’ve searched.
- Address bar history that eliminates the web site addresses of places you’ve been.
- Erase any autocomplete memory (prefilled password addresses).
- Saved passwords and usernames.
- Run and search histories.
- List of recent documents and any links to the works.
There are numerous software applications and services that can assist you in clearing your computer’s history. Sometimes simply hitting clear or delete is not enough to take care of removing files and history, and you may need to go into a more sophisticated browser and history clearing session. This is best determined by making a computer analysis of what already exists on your computer’s hard drive and what needs to be done in order to maximize any available space. Since this is a sensitive area for privacy reasons, it’s best to either do it yourself or enlist the services of a computer professional to ensure that it’s thoroughly and correctly.
We use the latest online fraud tools, Credit Card Encryption, a Comodo Security Certificate and other hi-tech methods to ensure our system is safe to use.
We go to great lengths to detect fraudulent card activity and actually help several government agencies and several local law enforcement agencies track down and prosecute suspects that have used stolen credit cards.
- If you are a new customer or do not have an order history with using our services, you will receive a call from our customer service staff to verbally verify your order.
- If you place several orders on line within a few day period, or the dollar amount of your requested searches exceeds our current processor guidelines you will be asked to complete a credit card validation form and fax it with proof that you are the cardholder (copy of credit card).
- If you plan to order several searches, or the dollar amount of your initial purchase exceeds $250, you should complete the form in advance to save time.
Review Credit Card Form and see forms under “quick links”
|ABOUT THE AUTHOR: Noah Wieder is and CEO of SearchBug, Inc. and the founder of bestpeoplesearch.com. Bestpeoplesearch is a private investigator portal and Information Retrieval Services web site where investigators offer searches to businesses and individuals with specific search needs.|