belajar dan berbagi bersama ~ Learn and Share Toge


Learn about Ethical Hacking

Posted in computer,Hacking,news,techno by lfisql on April 3, 2011

There’s a lot of information on this site and if you’re a beginner, it can be overwhelming. I created this quick guide just to give you an idea of what’s Ethical Hacking is .

I encourage you to read it through once without clicking on any of the links just so you can understand the big picture.  Then after you’ve absorbed the info, go back and click the links for more info.

Want to learn Ethical Hacking ?

While it’s very often that computers all across the world get hacked. But this site help you to protect computers from hacking, danger viruses and security threats.

My main goal is to show the public what hacking and phreaking is all about and to reveal confidential information to the hacking/phreaking community so that we can learn more about computers, telephones, electronics, etc.

Now Let’s see what are the basic terms related with hacking and ethical hacking.

  1. Hacker (n) – Hacker refers to a person who enjoys learning the details of computer systems and stretch      their capabilities.

  2. Hacking (v) – Hacking describes the rapid development of new programs or reverse engineering of already      existing software to make the code better and efficient.

  3. Cracker – Cracker refers to a person who uses his hacking skills for offensive purposes.

  4. Phreak – A Phreak is a hacker variant with an interest in telephones and telephone systems.

  5. Hactivism – Hactivism refers to an act of hacking in order to communicate a politically or socially      motivated message. An Internet enabled way to practice civil disobedience and protest.

  6. Ethical Hacker – refers to security professional who apply their hacking skills for defensive purposes on      behalf of its owners.

  7. Ethical Hacking – is also known as penetration testing, intrusion testing, red teaming.

  8. Ethical hacker looks for the following four basic questions:

  • What information/locations/systems can an intruder gain access?
  • What can an intruder see on the target?
  • What can an intruder do with available information?
  • Does anyone at the target system notice the attempts

History and Trend in Hacking Culture

Hacking Trends

Now if you really like hacking and want to learn it…then i suggest you to read carefully what is written down on the page , every basic term like Hacking,phreaking,Ethical Hacking are defined below.

1.Anatomy of a hack (Reconnaissance)

Anatony Of Hack

Refers to a preparatory phase where an attacker seeks to gather as much information as possible about the target of evaluation prior to launching an attack.

  • Passive reconnaissance involves monitoring network data for patterns and clues.
  • Active reconnaissance involves probing the network for
  • Accessible hosts
  • Open ports
  • Location of routers
  • Operating system details (if possible services)
  • Footprinting – is a blueprinting of the security profile of an organization, undertaken in a methodological manner.
  • Scanning – refers to a pre-attack phase when the hacker scans the network with a specific information gathered during footprinting.
  • Enumeration – involves active connections to systems and directed queries.

2.  Anatomy of a hack (Scanning)

This stage of a hack can be considered to be a logical extension
of active reconnaissance

  • Get a single point of entry to launch an attack and could be point of exploit when vulnerability of the system is detected.
  • Objectives of port scanning.
  • Open ports
  • Host operating system
  • Software or service versions
  • Vulnerable software versions

3. Anatomy of a hack (Gaining Access)

Gaining access refers to the true attack phase.

  • The exploit can occur over a LAN, locally, Internet, offline, as a
    deception or theft.
  • System Hacking
  • Sniffers
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Buffer Overflows
  • Rootkits
  • Hacking Web servers
  • Web application vulnerabilities
  • Web based password cracking
  • SQL injection
  • Hacking Wireless networks
  • Virus and Worms
  • Evading IDS, firewalls, Honeypots
  • Cryptography

4. Maintaining Access

  • Maintaining access refers to the phase when the attacker tries to
    retain his ‘ownership’ of the system.
  • Install tools such as
  • Rootkits.
  • Trojans and its backdoors.
  • Backdoors.

5. Covering Tracks

Covering tracks refers to remove the evidence of his presence
and activities.

  • Techniques include:
  • Tunnelling.
  • Altering/Clearing log files.
  • Disabling auditing

6. System Hacking

Remote password guessing

  • Privilege escalation.
  • Password cracking
  • Dictionary and Brute force attack
  • Social engineering and Shoulder sniffing
  • Dumpster Diving
  • Key loggers
  • Hiding files
  • Steganography

7. Sniffers

Sniffers refer to monitoring data like.

  • Network data.
  • Operating system data.
  • Spoofing.
  • Man in the Middle.
  • Passive Sniffers
  • Through compromising physical security
  • Using a Trojan Horse.
  • Active Sniffing
  • ARP spoofing.
  • DNS spoofing.

8. Denial of Service

An attack with which an attacker renders a system unusable or
significantly slowdown the system.

  • Methods include:
  • Flood a network.
  • Bandwidth/Throughput attacks.
  • Protocol attacks.
  • Software Vulnerability attacks.
  • Disrupt connections between two machines.
  • Prevent a particular individual from accessing a service.

9. Buffer Overflows

Buffer Overflows

10. Social Engineering

It is an art of using influence and persuasion to deceive people for the purpose of obtaining information or to perform some action.

  • Even with all firewalls, authentication processes, VPN, companies are still wide open to attacks.
  • Humans are the weakest link in the security chain.
  • It is the hardest form of attack to defend against.

11. Summary / Take home

There is no single set of methodology that can be adopted for ethical hacking. The terms of reference used for various phases in the anatomy of a hack may differ, but the essence is the same.

  • Hacking is not for everyone (there is not half-way) It takes an objective mind, a lot of free time, and dedication to keep up with things.NEVER use the knowledge for offensive purposes.

repost : http://www.ethicalcrack.co.gp

How To Hack Facebook Chat Application

Posted in computer,Hacking,news,techno by lfisql on March 23, 2011

 

In this post I will tell you how you can hack facebook chat applicationto run it from any windows, Using this hack you will be able to chat with your freinds on other browser pages, So here is the step by step guide to hack facebook chat application.
Note:This trick to hack facebook chat application works for firefox browser only
1.First of all log into your Facebook account 

2.Next visit the following link:
http://www.facebook.com/presence/popout.php



3.Next press control D and bookmark the Page

4.Next click on the bookmark option at the top beside history button and right click Facebook chat at the bottom and Check load this bookmark in the sidebar and click on ok.

Now you can load Facebook chat application from any browser

Taken From:http://hackingandcraking.blogspot.com/

Advance Multitab Widget For Blogger

Posted in computer,Hacking,news,techno by lfisql on March 21, 2011

In this tutorial I will teach you how to add a multitab widget to blogger blogs. Multitab widget is very useful and common widget. You can place four widgets in a place of one widget using multitab widget. There are many types of multitab widgets. I am giving you a 4 Tab widget. You can see the picture of multitab widget I am giving you on the left side. Below are the steps on how to add multitab widget to blogger.

Note: Don’t save your template until the last step is completed.

1. Go to Blogger.com.
2. Login to your Blogger account.
3. Go to your Blogger Layout > design > Edit HTML.
4. Click the box of expand widget templates.
5. Now find </head>.
6. Just below </head>, paste the following code.

<script type=’text/javascript’>
//<![CDATA[
document.write(‘<style type=”text/css”>.tabber{display:none;}<\/style>’);
function tabberObj(argsObj)
{
var arg;
this.div = null;
this.classMain = “tabber”;
this.classMainLive = “tabberlive”;
this.classTab = “tabbertab”;
this.classTabDefault = “tabbertabdefault”;
this.classNav = “tabbernav”;
this.classTabHide = “tabbertabhide”;
this.classNavActive = “tabberactive”;
this.titleElements = [‘h2′,’h3′,’h4′,’h5′,’h6’];
this.titleElementsStripHTML = true;
this.removeTitle = true;
this.addLinkId = false;
this.linkIdFormat = ‘<tabberid>nav<tabnumberone>’;
for (arg in argsObj) { this[arg] = argsObj[arg]; }
this.REclassMain = new RegExp(‘\\b’ + this.classMain + ‘\\b’, ‘gi’);
this.REclassMainLive = new RegExp(‘\\b’ + this.classMainLive + ‘\\b’, ‘gi’);
this.REclassTab = new RegExp(‘\\b’ + this.classTab + ‘\\b’, ‘gi’);
this.REclassTabDefault = new RegExp(‘\\b’ + this.classTabDefault + ‘\\b’, ‘gi’);
this.REclassTabHide = new RegExp(‘\\b’ + this.classTabHide + ‘\\b’, ‘gi’);
this.tabs = new Array();
if (this.div) {
this.init(this.div);
this.div = null;
}
}
tabberObj.prototype.init = function(e)
{
var
childNodes,
i, i2,
t,
defaultTab=0,
DOM_ul,
DOM_li,
DOM_a,
aId,
headingElement;
if (!document.getElementsByTagName) { return false; }
if (e.id) {
this.id = e.id;
}
this.tabs.length = 0;
childNodes = e.childNodes;
for(i=0; i < childNodes.length; i++) {
if(childNodes[i].className &&
childNodes[i].className.match(this.REclassTab)) {
t = new Object();
t.div = childNodes[i];
this.tabs[this.tabs.length] = t;
if (childNodes[i].className.match(this.REclassTabDefault)) {
defaultTab = this.tabs.length-1;
}
}
}
DOM_ul = document.createElement(“ul”);
DOM_ul.className = this.classNav;
for (i=0; i < this.tabs.length; i++) {
t = this.tabs[i];
t.headingText = t.div.title;
if (this.removeTitle) { t.div.title = ”; }
if (!t.headingText) {
for (i2=0; i2<this.titleElements.length; i2++) {
headingElement = t.div.getElementsByTagName(this.titleElements[i2])[0];
if (headingElement) {
t.headingText = headingElement.innerHTML;
if (this.titleElementsStripHTML) {
t.headingText.replace(/<br>/gi,” “);
t.headingText = t.headingText.replace(/<[^>]+>/g,””);
}
break;
}
}
}
if (!t.headingText) {
t.headingText = i + 1;
}
DOM_li = document.createElement(“li”);
t.li = DOM_li;
DOM_a = document.createElement(“a”);
DOM_a.appendChild(document.createTextNode(t.headingText));
DOM_a.href = “javascript:void(null);”;
DOM_a.title = t.headingText;
DOM_a.onclick = this.navClick;
DOM_a.tabber = this;
DOM_a.tabberIndex = i;
if (this.addLinkId && this.linkIdFormat) {
aId = this.linkIdFormat;
aId = aId.replace(/<tabberid>/gi, this.id);
aId = aId.replace(/<tabnumberzero>/gi, i);
aId = aId.replace(/<tabnumberone>/gi, i+1);
aId = aId.replace(/<tabtitle>/gi, t.headingText.replace(/[^a-zA-Z0-9\-]/gi, ”));
DOM_a.id = aId;
}
DOM_li.appendChild(DOM_a);
DOM_ul.appendChild(DOM_li);
}
e.insertBefore(DOM_ul, e.firstChild);
e.className = e.className.replace(this.REclassMain, this.classMainLive);
this.tabShow(defaultTab);
if (typeof this.onLoad == ‘function’) {
this.onLoad({tabber:this});
}
return this;
};
tabberObj.prototype.navClick = function(event)
{
var
rVal,
a,
self,
tabberIndex,
onClickArgs;
a = this;
if (!a.tabber) { return false; }
self = a.tabber;
tabberIndex = a.tabberIndex;
a.blur();
if (typeof self.onClick == ‘function’) {
onClickArgs = {‘tabber’:self, ‘index’:tabberIndex, ‘event’:event};
/* IE uses a different way to access the event object */
if (!event) { onClickArgs.event = window.event; }
rVal = self.onClick(onClickArgs);
if (rVal === false) { return false; }
}
self.tabShow(tabberIndex);
return false;
};
tabberObj.prototype.tabHideAll = function()
{
var i;
for (i = 0; i < this.tabs.length; i++) {
this.tabHide(i);
}
};
tabberObj.prototype.tabHide = function(tabberIndex)
{
var div;
if (!this.tabs[tabberIndex]) { return false; }
div = this.tabs[tabberIndex].div;
if (!div.className.match(this.REclassTabHide)) {
div.className += ‘ ‘ + this.classTabHide;
}
this.navClearActive(tabberIndex);
return this;
};
tabberObj.prototype.tabShow = function(tabberIndex)
{
var div;
if (!this.tabs[tabberIndex]) { return false; }
this.tabHideAll();
div = this.tabs[tabberIndex].div;
div.className = div.className.replace(this.REclassTabHide, ”);
this.navSetActive(tabberIndex);
if (typeof this.onTabDisplay == ‘function’) {
this.onTabDisplay({‘tabber’:this, ‘index’:tabberIndex});
}
return this;
};
tabberObj.prototype.navSetActive = function(tabberIndex)
{
this.tabs[tabberIndex].li.className = this.classNavActive;
return this;
};
tabberObj.prototype.navClearActive = function(tabberIndex)
{
this.tabs[tabberIndex].li.className = ”;
return this;
};
function tabberAutomatic(tabberArgs)
{
var
tempObj,
divs,
i;
if (!tabberArgs) { tabberArgs = {}; }
tempObj = new tabberObj(tabberArgs);
divs = document.getElementsByTagName(“div”);
for (i=0; i < divs.length; i++) {
if (divs[i].className &&
divs[i].className.match(tempObj.REclassMain)) {
tabberArgs.div = divs[i];
divs[i].tabber = new tabberObj(tabberArgs);
}
}
return this;
}
function tabberAutomaticOnLoad(tabberArgs)
{
var oldOnLoad;
if (!tabberArgs) { tabberArgs = {}; }
oldOnLoad = window.onload;
if (typeof window.onload != ‘function’) {
window.onload = function() {
tabberAutomatic(tabberArgs);
};
} else {
window.onload = function() {
oldOnLoad();
tabberAutomatic(tabberArgs);
};
}
}
/* Run tabberAutomaticOnload() unless the “manualStartup” option was specified */
if (typeof tabberOptions == ‘undefined’) {
tabberAutomaticOnLoad();
} else {
if (!tabberOptions[‘manualStartup’]) {
tabberAutomaticOnLoad(tabberOptions);
}
}
//]]>
</script>

7. Now find ]]></b:skin> and paste the following code before it.

/*———- Tabber Start——– */

.tabberlive{

margin:0;

padding:5px;

clear:both;

background:#fff;

}

.tabbernav {

margin-left: 3px;

margin-right: 6px;

padding: 3px 0;

border-bottom: 1px solid #dcdcdc;

font-family:Arial,Helvetica,sans-serif;

font-size:12px;

font-weight:bold;

}

.tabbernav li {

list-style:none;

margin:0;

display:inline;

}

.tabbernav li a {

padding:3px 0.5em;

margin-right:1px;

border:1px solid #dcdcdc;

border-bottom:none;

background:#191919;

text-decoration:none;

color:#ffffff;

}

.tabbernav li a:hover {

color:#191919;

background:#ffffff;

border-color:#dcdcdc;

text-decoration:none;

}

.tabbernav li.tabberactive a,

.tabbernav li.tabberactive a:hover {

background:#ffffff;

color:#191919;

border-bottom: 1px solid #ffffff;

}

.tabberlive .tabbertab {

padding:5px;

border:1px solid #dcdcdc;

border-top:0;

margin-left: 3px;

margin-right: 6px;

background:#ffffff;

}

.tabberlive .tabbertab h2,

.tabberlive .tabbertabhide {

display:none;

}

.tabbertab .widget-content ul{

list-style:none;

margin:0 0 10px 0;

padding:0;

}

.tabbertab .widget-content li {

border-bottom:1px solid #dcdcdc;

margin:0 5px;

padding:2px 0 5px 0;

}

/*——- Tabber End——–*/

You can change the style of widget by changing the given code.

8. Now find Variable Definitions and paste the following code below the variable definitions .

<Variable name=”tbbxbgcolor” description=”Tab box Background Color” type=”color” default=”#f8f8f8″ value=”#f8f8f8″>
<Variable name=”tbbxbrcolor” description=”Tab box Border Color” type=”color” default=”#dcdcdc” value=”#dcdcdc”>
<Variable name=”tbbxcolor1″ description=”Tab box Color 1″ type=”color” default=”#ffffff” value=”#ffffff”>
<Variable name=”tbbxcolor2″ description=”Tab box Color 2″ type=”color” default=”#5588aa” value=”#5588aa”>

9. If you don’t find Variable Definitions then paste the following code below #navbar-iframe .

/* Variable definitions

====================

<Variable name=”tbbxbgcolor” description=”Tab box Background Color” type=”color” default=”#f8f8f8″ value=”#f8f8f8″>

<Variable name=”tbbxbrcolor” description=”Tab box Border Color” type=”color” default=”#dcdcdc” value=”#dcdcdc”>

<Variable name=”tbbxcolor1″ description=”Tab box Color 1″ type=”color” default=”#ffffff” value=”#ffffff”>

<Variable name=”tbbxcolor2″ description=”Tab box Color 2″ type=”color” default=”#5588aa” value=”#5588aa”>

*/

10. Now find <div id=’sidebar-wrapper’> and paste the following code below it.

<div style=’clear:both;’/>

<div class=’tabber’>

<b:section class=’tabbertab’ id=’tab1′ maxwidgets=’1’/>

<b:section class=’tabbertab’ id=’tab2′ maxwidgets=’1’/>

<b:section class=’tabbertab’ id=’tab3′ maxwidgets=’1’/>

<b:section class=’tabbertab’ id=’tab4′ maxwidgets=’1’/>

</div>

11. Now save your template and go to page elements and check your multitab widget. It will look like the picture below.

If you are facing any problem related to this post, then comment me below.

Taken From:http://hackingandcraking.blogspot.com/

Hack Adsense & get unlimited Clicks

Posted in computer,Hacking,news,techno by lfisql on March 19, 2011

If You Are Thinking That This Hack Is About Getting The Passes Of The Adsense Accounts, Then You Are Wrong 

This Is About How To Get Unlimited Impressions And Ads Clicks Without Working For Even A Second


Get traffic into your site, NOW!

Wanna more traffic? YES, YOU CAN!

Need any investment? NO!

What do I have to do?

Nothing but keeps your computer ON.

Is that EASY? If you believe, IT IS.

Okay. Let us start doing this. As I am a web master as well, I 

used to buy traffic from others in order to increase my

website popularity. However, it doesn’t seem to be working

well as it doesn’t do much on the search engine bit and

most of them are either fake traffic or too expensive for me.

But here, today, I am introducing you a BRAND NEW

method that you should KNOW to increase traffic for your

site. You don’t have to have any skill or experience, just

follow my step you will walk into SUCCESS. You can do this

to your site, or you can even SELL traffic to others.

Site requirement in order to receive traffic:

‐ Less than 100kb (Will show you how to check)

‐ No Porn content included (On that page)

‐ No Virus/Malware

‐ No Fancy JavaScript (Those who slow the browser)
So how do I check my page size?

It is easy, open up your IE or FireFox. Press �”Ctrl+S�” or Files�->Save As and choose FULL WEB PAGE. Save it

anywhere you want and go to that location. Select the

folder and the html page and Right click�->Properties. Look

at their disk size and make sure they are under 100KB.

(Otherwise it MAY NOT WORK!)

What do I do NEXT? 

Get into this site and register with them: http://tinyurl.com/ccg4o2

Oh shit, they are in Chinese! Don’t worry, Just follow me.

When you enter the homepage, click on the highlighted link.

Then Follow This

Download the RAR File and Unrar it..

Now we have to set up your site in their index.

You are ALL DONE. Remember to run the software every time you

turn your computer on and it wills GENERATE UNLIMITED TRAFFIC

to your site. Thank you.

*If you have two computer (on different IP), you can use the

software with same username to increase traffic.
If You Don not Believe This Then I Am Giving You My Words

I Have Been Using It For MANY Days

I Am Earning Sometimes Above $10 And Some Times 2 or 3

My Account Has Not Been Blocked So That Means It Is Safe To Use

Enjoy!!!

Taken From:http://hackingandcraking.blogspot.com/

Click Exchange Program for Adsense

Posted in computer,Hacking,news,techno by lfisql on March 18, 2011

Hello friends , this tutorial is for those guys who has already created an account on adsense. If you haven’t created the account on adsense yet then check this topic EARN ONLINE WITH ADSENSE
Moreover herez a trick for creating adsense account in few days ….Approve adsense account in few days …… Try it too for adsense approval.

Anyways now come to the main tutorial. In this tutorial i m showing u that how can u increase your earning on google thru click exchange program.

What is Click Exchange Program ?
==========================

Its simple ,google doesnt allow u to click on ur own ads ….. so herez the solution u click on someone else blog and in return he will click on ur blog ….. but remember take much much care while doing so ….. if u do click exchange with just one person then google will disable u ….

Now read it carefully :
=================

Now This Is The Most Important Part Of The Work Becoz If You Dont Work Properly Then Members Wont WOrk With YOu Again So Understand It Completely

MAke A Yahoo ID And Sign In Yahoo Messanger . Now post ur yahoo account here and add the other yahoo accounts posted here.

After YOu Add The Members You See Different Messages Coming “free For Clicks”. This Means Members Want To Work .

How To Work??
=============

Before Start Working You Have To Understand Few Things
1. Ads
2. Impressions ( imp )
3. Bps

Members Will Work With Request Or Ask You To Req To Start Work

Request Will Be Like This Most Of The Time
3 Ads 30 imp 3 bps

That Means You Have To Open Three Ads On The Blog Of That Member, refresh The Blog 30 times And Open 3 subpages On Each of The Add You Just Opened.

So In The Meanwhile The Member Will Do The Same For You.

How To Know That Others Are Not Cheating And Doing Your Work While You Are Doing His WOrk???

Counter Is For That Purpose Becoz IMP Are Counted By The Counter , When The Member Refreshes Your Page Your Counter Ticks So YOu Will KNow That The Member Is Working.

About Add And Bps

For This There Is Another Solution

When You Open An Add Eg: http//:www.forex.com/productsID66uhrguds55
Copy And Paste The Add Link To The Other Member So That He Can Know What You Have Clicked On.

But Remember Donot Copy http And www Part Simply Copy From forex.com/productsID66uhrguds55 And Paste It.

Same Work With The Bps When YOu Open Bps In New Window Copy And Paste The Link And Send It To The Member.

This Way Cheating Is Avoided.

But remember :
============

Remember Never Click On YOur Own Add Becoz Your Account Will Be Closed Imediatly.

1st All Of The Users Here In This Community Start Working With Each Other To Practise The Method Of THe Work So That YOu DOnt Loose The Members.

If Anybody Form Gets Rejected Dont Worry Register Again With The Same Process.

On Forex Ads You Earn Almost 10 dollars On 25 Clicks On Ads

That Means If 1 Members Click On Your 3 Ads 10 Members click On 30 Ads= 10+ Dollars

If You Work With 10 Members In 1 Day It Means $10+ And 30 Days Means $300+

And The More YOu WOrk The More YOu Earn

 

Adsense integration now easier than ever with Blogger’s Monetize tab

Posted in computer,Hacking,news,techno by lfisql on March 17, 2011

Have you noticed the new “Monetize” tab at the top of your Blogger dashboard? 

This new section of our Blogger dashboards makes it easier than ever to integrate Google Adsense in our blogs and see just how much our blogs are earning.

Google’s Adsense program is a simple solution which many Bloggers use to monetize their sites. For some time now, Blogger have made it easy for us to include Adsense ads in the sidebar (as a page element) and around blog posts (as an option in the Layout>Page Elements section, when you click the “Edit” link for your blog posts).

If you have already configured Adsense in your blog by adding an Adsense page element to the layout, or enabling ads between posts, by clicking on the Monetize tab you will be able to see statistics for your earnings, like this:

On this page, there are also links to view your Adsense Payment History, earnings reports and to switch the account associated with this particular blog. You can also choose to “remove ads” from all aspects of your Blogger layout at the click of a button.

For those who have not yet chosen to monetize their sites with Adsense, or who have configured Adsense manually in their templates, you will see a page like this instead:

This means that your Adsense account has not been associated with this blog. No earnings reports will be displayed, even if – like me – you have manually configured Adsense by adding the required JavaScript to your Blogger template code.

For those of you yet to add Adsense to your layout, simply choose one of the ad-layout options most suitable for your needs anc click the “Next” button. You may be required to set up an Adsense account (or associate an existing account with your Blogger profile), after which your ads will be immediately placed in your layout. Then when you visit the Monetize tab, you will be able to see details of your Adsense earnings for the ads you have placed in your layout.

What you need to know about Adsense monetization and the new Monetize tab

Although Blogger have made it very easy for members to add Adsense to their blogs, not every applicant will be successful in getting their own Adsense account.

Adsense reviews all applicants to the program before agreeing to (or denying) a new account. In order to apply for an Adsense account, you must be over 18 years old and have a website which complies with Adsense policies. If you post any questionable content on your site, you really should check these policies to ensure your site complies before submitting your application.

Also, the reports displayed on the Monetize tab will only show page views and earnings from the time that you connected your Adsense account with this blog. If you have previously linked your Adsense account with your Blogger profile, it seems the “All Time” earnings will display earnings from today onwards (one of my blogs uses an Adsense Page Element, but is only displaying earnings from today).

A new channel in your Adsense account for each Blogger blog you monetize

If you log into your Adsense account, you will notice a new channel has been set up for each of your blogs, which contains the URL of your blog in the title.

The information from this channel is what’s used to present the earnings data for the Monetize section of each blog you write.

Not yet an ideal solution for everyone…

I am very happy to see that the Blogger team have put such effort towards integrating all of the Google services we Bloggers currently use. However, I am a little disappointed at some aspects of this new feature.

For my own blogs, I have added Adsense manually, by editing the Blogger template and inserting ad codes where I would like them to be displayed. For this reason, I am unable to see any reports on the Monetize tab. In fact, it appears as though I have not set Adsense up at all.

Also, the earnings displayed on the Monetize page will only include the earnings for this particular blog, not your total earnings from any different sites operated.

However, these are small issues, and perhaps these issues will not affect most other Blogger users.

What do you think?

Will this new “Monetize” dashboard feature make it easier for you to connect your Adsense account with your blogs? How well do you think this feature performs so far?

Please feel free to leave your comments and suggestions below.

Taken From:http://hackingandcraking.blogspot.com/

No more Adsense accounts in India

Posted in computer,Hacking,news,techno by lfisql on March 16, 2011

//

Its A Very Sad News To Share …

Adsense Stopped Approving New Accounts To India Neither You Can Change It From Some other Country To India
Basically It Means No More Accounts For Indians

The Only Way To Get An Account Is Make A Blog Now Keep Updating It A Little Bit For Six Months

And After 6 Months You Might Get An Account With That Blog

And Even Pakistan Is Also Added To The List Of Those Countries Where You Cannot Change Payee Name Neither Address And 6 Months Restriction Is Also Applied I Think

No sure For The Last Point

But Indeed a Very Sad News …..

Taken From:http://hackingandcraking.blogspot.com/

Web Site Promotion Services

Posted in computer,news,social,techno by lfisql on March 1, 2011

Have you considered using web site promotion services If you are looking for a clever, new way to market your web site, you may want to investigate some of the different web site promotion services that can do the work for you. Web site promotion services design and implement specialized web site marketing campaigns for online business owners.
Indian writers are also experts in book research and writing for authors, white paper research and writing, as well as journalistic writing that includes articles on current events and/or social events and issues. You can also outsource India for travel writing services that include reviews and site selection, magazine articles on almost any subject and business writing — case studies, communication, cultural and management issues.

What does targeted traffic mean? Consider this: two major search engines in the United States approximately receive 35 million visitors everyday; however, not all of these people may be looking for your site or may be able to locate your site. Those specific site users whose needs and wants specially match your products and services are your targeted traffic.

If you are planning to advertise through a Web site, employing the help of professional Web site promotion service providers is one of the wisest things you can do to ensure growth of your business and increase in sales. These service providers are experts in the field of Web site advertising and can dedicatedly plan, execute and monitor progress of promotional strategies for your site.

There are lists and then there are consumer reviews. Read the articles and also check the prices. The web host companies are listed as per their price, the service they provide and also the technical support they offer. The price varies; it can be anything between $4.90 and $19.90 per month. Cheap web hosting prices vary as per the facilities they provide. The disk space, the bandwidth, free set up etc.

However, the more specific you are, the better will be your results. Every one submits articles to get their products and services out in the market. This can be easily done by establishing a link in the web content or the site that the content is submitted to. And since many of the sites don’t accept articles that blatantly advertise the products or services, these articles are disguised as informative ones.

Try going to online marketplaces where individuals and companies offer specific services at very competitive prices. After your initial search, you can begin making calls to compare the companies you are considering based on the kind of service they provide and the rates they charge.

As per the industry standards, the best web host should beat others in terms of both service and options as well as should be able to solve any problem immediately that their clients may face. Apart from these, the best web host must have the courtesy to communicate and keep the client updated on the current status regarding solving their problems.

Spy Phone Software Program

Posted in computer,news,social,techno by lfisql on February 28, 2011

If you’ve a suspicion your spouse might be cheating on you, there’s a possibility that may be true. Strange telephone calls at all hours of the day, and secrecy that surrounds their cell phone doesn’t help matters. Sometimes they’re texting away to “a friend”.
But now you are able to know exactly what they are saying and texting at anytime. With spy phone software program you’ve the ability to read the messages coming into the telephone sent so they’re delivered on your phone or email address with no trace of it whatsoever. Maintain track of ingoing and outgoing messages and keep yourself protected.

Plus you are able to listen in to calls without having anybody ever knowing you are performing it. Access the spy phone software of your option, and use the listen in feature. From your computer with internet access you can listen in to the phone call and no 1 ever knows a third individual is on the line.

You are able to also see where the phone is heading with a basic tracking function. Plus when the telephone is turned off, you will know where it last went off, and where it went back on. Never wonder if he is turning it off in a meeting again or not. You will have that info directly at your hands.

But there’s much more than just cheating spouses to worry about. These functions can protect you in business too. If you have an employee that may be giving out info or working by using a competitor you will know that right away. Do not risk having your info leaked or given out before you’re ready to have it delivered.

With Spy phone software you will remain safe and guarded no matter what times. You are able to relax your nerves and learn the truth about what is going on around you. It’s safe, secure and undetectable. Best of all it can be added to a phone anytime discreetly having a simple chip placed into the back of the phone. When you’re done with it, merely pull it out. There’s nothing that remains for anybody to question.

But when you’re looking for spy phone software program, make sure it’s available for the target phone you’re looking for. Many software program programs are only designed to work with certain phones. Whenever you buy the spy phone software program make sure you know the exact model you are buying it for and be prepared to inquire about the truth.

Hack Ethernet ADSL Router

Posted in computer,news,techno by lfisql on February 26, 2011


Almost half of the Internet users across the globe use ADSL routers/modems to connect to the Internet however, most of them are unaware of the fact that it has a serious vulnerability which can easily be exploited even by a noob hacker just like you. In this post I will show you how to exploit a common vulnerability that lies in most ADSL routers so as to gain complete access to the router settings and ISP login details.

Every router comes with a username and password using which it is possible to gain access to the router settings and configure the device. The vulnerability actually lies in the Default username and password that comes with the factory settings. Usually the routers come preconfigured from the Internet Service provider and hence the users do not bother to change the password later. This makes it possible for the attackers to gain unauthorized access and modify the router settings using a common set of default usernames and passwords. Here is how you can do it.

Before you proceed, you need the following tool in the process

Angry IP Scanner

Here is a detailed information on how to exploit the vulnerability of an ADSL router.

Step-1: Go to http://www.whatismyipaddress.com. Once the page is loaded you will find your IP address. Note it down.

Step-2: Open Angry IP Scanner, here you will see an option called IP Range: where you need to enter the range of IP address to scan for.

Suppose your IP is 117.192.195.101, you can set the range something as 117.192.194.0 to 117.192.200.255 so that there exists atleast 200-300 IP addresses in the range.

Step-3: Go to Tools->Preferences and select the Ports tab. Under Port selection enter 80 (we need to scan for port 80). Now switch to the Display tab, select the option “Hosts with open ports only” and click on OK.

I have used Angry IP Scanner v3.0 beta-4. If you are using a different version, you need to Go to Options instead of Tools

Step-4: Now click on Start. After a few minutes, the IP scanner will show a list of IPs with Port 80 open as shown in the below image.

Step-5: Now copy any of the IP from the list, paste it in your browser’s address bar and hit enter. A window will popup asking for username and password. Since most users do not change the passwords, it should most likely work with the default username and password. For most routers the default username-password pair will be admin-admin or admin-password.

Just enter the username-password as specified above and hit enter. If you are lucky you should gain access to the router settings page where you can modify any of the router settings. The settings page can vary from router to router. A sample router settings page is shown below.

If you do not succeed to gain access, select another IP from the list and repeat the step-5. Atleast 1 out of 5 IPs will have a default password and hence you will surely be able to gain access.

What can an Attacker do by Gaining Access to the Router Settings?

By gaining access to the router settings, it is possible for an attacker to modify any of the router settings which results in the malfunction of the router. As a result the target user’s computer will be disconnected from the Internet. In the worst case the attacker can copy the ISP login details from the router to steal the Internet connection or play any kind of prank with the router settings. So the victim has to reconfigure the router in order to bring it back to action.

The Verdict:

If you are using an ADSL router to connect to the Internet, it is highly recommended that you immediately change your password to prevent any such attacks in the future. Who knows, you may be the next victim of such an attack.

Since the configuration varies from router to router, you need to contact your ISP for details on how to change the password for your model.

Warning!

All the information provided in this post are for educational purposes only. Please do not use this information for illegal purposes.

Next Page »