Enable Javascript to access this page. Arena of An Artist: Easy
rss
twitter
    Find out what I'm doing, Follow Me :)
Showing posts with label Easy. Show all posts
Showing posts with label Easy. Show all posts

Tuesday, March 15, 2011

MyLikes Palringo- Make $$ with Twitter

MyLikes Palringo- Make $$ with Twitter

Q. What is Mylikes and how it works?

A. MyLikes is word-of-mouth advertising platform that connects advertisers with influencers on the web. Influencers can spread the word and earn money.Here you'll connect campaigns i.e ads to your twitter/facebook accounts and when people click the links.




http://thenextweb.com/socialmedia/files/2010/04/twitter-logo.png

Q. Is it legit?

A. Yes, it is.Search google if you dont believe me.I cant blog here.

Q.How do we make money?
A."Click Exchange".And for this we have made a Palringo group "Mylikes"

Q.What do we need to do?


A. 1) dwnload palringo and Install it.
2) Signup on Mylikes.com
3) Now join this group "Mylikes"
4)Exchange links with people online(without http://)
5) Open Chrome in Incognito window.
6) Go to their profile and click the links with -AD at their end

Thursday, February 24, 2011

Ethical Hacking -E-books Course Download for Easy Learning


Certied Ethical Hacking and Countermeasure Course v6.12 AIO

Well here is the perfect collection of CEH to be a Professional CEH



CEH-Classroom-Lab-Setup-v6.pdf
CEHv6 Module 00 Student Introduction.pdf
CEHv6 Module 01 Introduction to Ethical Hacking.pdf
CEHv6 Module 02 Hacking Laws.pdf
CEHv6 Module 03 Footprinting.pdf
CEHv6 Module 04 Google Hacking.pdf
CEHv6 Module 05 Scanning.pdf
CEHv6 Module 06 Enumeration.pdf
CEHv6 Module 07 System Hacking.pdf
CEHv6 Module 08 Trojans and Backdoors.pdf
CEHv6 Module 09 Viruses and Worms.pdf
CEHv6 Module 10 Sniffers.pdf
CEHv6 Module 11 Social Engineering.pdf
CEHv6 Module 12 Phishing.pdf
CEHv6 Module 13 Hacking Email Accounts.pdf
CEHv6 Module 14 Denial of Service.pdf
CEHv6 Module 15 Session Hijacking.pdf
CEHv6 Module 16 Hacking Webservers.pdf
CEHv6 Module 17 Web Application Vulnerabilities.pdf
CEHv6 Module 18 Web based Password Cracking Techniques.pdf
CEHv6 Module 19 SQL Injection.pdf
CEHv6 Module 20 Hacking Wireless Networks.pdf
CEHv6 Module 21 Physical Security.pdf
CEHv6 Module 22 Linux Hacking.pdf
CEHv6 Module 23 Evading IDS Firewall and Honeypot.pdf
CEHv6 Module 24 Buffer Overflows.pdf
CEHv6 Module 25 Cryptography.pdf
CEHv6 Module 26 Penetration Testing.pdf
CEHv6 Module 28 Writing Virus Codes.pdf
CEHv6 Module 29 Assembly ******** Tutorial.pdf
CEHv6 Module 30 Exploit Writing.pdf
CEHv6 Module 31 Exploit Writing.pdf
CEHv6 Module 32 Exploit Writing.pdf
CEHv6 Module 33 Reverse Engineering Techniques.pdf
CEHv6 Module 34 MAC OS X Hacking.pdf
CEHv6 Module 35 Hacking Routers, Cable Modems and Firewalls.pdf
CEHv6 Module 36 Hacking Mobile Phones, PDA and Handheld Devices.pdf
CEHv6 Module 37 Bluetooth Hacking.pdf
CEHv6 Module 38 VoIP Hacking.pdf
CEHv6 Module 39 RFID Hacking.pdf
CEHv6 Module 40 Spamming.pdf
CEHv6 Module 41 Hacking USB Devices.pdf
CEHv6 Module 42 Hacking Database Servers.pdf
CEHv6 Module 43 Cyber Warfare- Hacking Al-Qaida and Terrorism.pdf
CEHv6 Module 44 Internet Content Filtering Techniques.pdf
CEHv6 Module 45 Privacy on the Internet.pdf
CEHv6 Module 46 Securing Laptop Computers.pdf
CEHv6 Module 47 Spying Technologies.pdf
CEHv6 Module 48 Corporate Espionage by Insiders.pdf
CEHv6 Module 49 Creating Security Policies.pdf
CEHv6 Module 50 Software Piracy and Warez.pdf
CEHv6 Module 51 Hacking and Cheating Online Games.pdf
CEHv6 Module 52 Hacking RSS and Atom.pdf
CEHv6 Module 53 Hacking Web Browsers.pdf
CEHv6 Module 54 ***** Server Technologies.pdf
CEHv6 Module 55 Preventing Data Loss.pdf
CEHv6 Module 56 Hacking Global Positioning System.pdf
CEHv6 Module 57 Computer Forensics and Incident Handling.pdf
CEHv6 Module 58 Credit Card Frauds.pdf
CEHv6 Module 59 How to Steal Passwords.pdf
CEHv6 Module 60 Firewall Technologies.pdf
CEHv6 Module 61 Threats and Countermeasures.pdf
CEHv6 Module 62 Case Studies.pdf
CEHv6 Module 63 Botnets.pdf
CEHv6 Module 64 Economic Espionage.pdf
CEHv6 Module 65 Patch Management.pdf
CEHv6 Module 66 Security Convergence.pdf
CEHv6 Module 67 Identifying the Terrorists.pdf


DOWNLOAD

Part-1
http://rapidshare.com/files/193668787/HCv6_Sam_downarchive.part1.rar

Part-2
http://rapidshare.com/files/193668830/HCv6_Sam_downarchive.part2.rar

Part-3
http://rapidshare.com/files/193668755/HCv6_Sam_downarchive.part3.rar



ENJOY..!

Sunday, December 26, 2010

Tango Spanish Style Scrambled Eggs by Ashish

So one of the Oldest Dishes made by me and Too Simple.. even a child can make it at Home. This is a Fusion of Indian and Spanish Taste and Cooking. And when I made this Dish first time.. I was quite Proud of myself. Come On.. I was just 13 Years old.. :P. In This Recipe...Tomatoes are doing the Magic.


INGREDIENTS-
  • Eggs: 2
  • Tomatoes ( Medium Sized ): 2-3 Chopped
  • Onion ( Medium Sized ): 1 Chopped
  • Capsicum ( Medium Sized ): 1 Chopped
  • Green Chillies: 2 Cut into Half along length
  • Ginger: 20gms Chopped
  • Spring Onion: 1-2 Copped
  • Red Chili Powder: to Taste ( in my case I love Spicy :P)
  • Salt: to Taste
  • Cinnamon: 1 Teaspoon
  • Pepper: 1 Teaspoon
  • Olive Oil: 1 Tablespoon
  • Mustard Seeds: 9-10
  • Coriander Leaves
PROCEDURE:

  1. Take a Pan and put Oil in it. wait for it to get Heated up.
  2. Add Mustard Seeds and see the Magic. ( if you are new in Kitchen :P )
  3. Add Onions, Ginger and Green Chili and Cinnamon
  4. Wait for Onions to get Golden Brown and then add Tomato, Capsicum, Spring Onion.
  5.  Add Salt, Red Chili Powder, Pepper.
  6. Wait for Things to get along well and then Add two Eggs directly in it.
  7. Beat the Eggs inside with Everything well.
  8. When Egg gets Cooked Well turn Off the Gas Stove and Place the ready Eggs in a Plate
  9. Garnish with Coriander Leaves.
Taste Best with Tomato Sauce and also as filling in Sandwiches.

Enjoy Cooking..!

Saturday, November 6, 2010

Guaranteed Method to Hack a gmail account

first get a hacking tool no need to worry where to find just go to http://www.youtube.com and search "Runescape Hacker" or "Runescape Hacker Download Link"

you will get the downloading link in comments zone

now you have downloaded the hacker tool but -Don't open the Runescape Hacker Tool, It may be Backd00red Instead place it in a Safe area!

download and install hexworkshop now dont ask for link...google is your friend

now right click on tool ,,you will see "Edit this with HexWorkshop"...click it

you will see a mess of words and alphabets symbols....dont worry dont get confused believe me its easy to do!

now press ctrl+f... a boz will appear

-Now Before start Finding Anything Make sure you change the "Hex" to "String" value.

-Now Enter "Gmail" to the Box and Hit "Find".

-You will Get Popping Up a Black area. Don't touch it. Instead see on your Right for the Texts.

-Copy the Highlighted text and Paste it in a Text document (Newly Created).

-Remove the [.]>DOTs and You will see The Email ID + the Passwd.

Njoy Hacking!!

Friday, August 20, 2010

CPAlead complete setup tutorial

Chapter one

what is CPAlead?

CPAlead is no joke, Couple of my friends have been with CPAlead for over 1 year now and have made roughly 30,000$ ever since, one in particular his name is Alex he is a twenty two year old college drop out, his parents stopped supporting him when he dropped out he was left with a small apartment and literally 230$ in his pocket. He discovered CPAlead one night and from that night on it was a wrap, He's raking in about 7,000$ a month till this day, He has taught me the rules of trade pretty much everything I know, Now I'm teaching you guys! Everyday I browse the "monetizing techniques" I see threads like "Need help making $$" and plenty more, That is the only reason I'm making this tutorial, for the unfortunate people who don't know how to code a language, for the people who think posting adylf links is bringing in a decent income for them, for the people who beg for money..I guarantee that you will make money if you follow this guide word-for-word. Still not convinced? Here is some proof CPAlead is a cash pot..When you register for CPAlead there's a chatbox and you can see what people earn daily, monthly and lifetime..


Chapter two

getting started

Before we begin the thing first you will need to do is register to CPAlead, If you haven't already, you can start by going Here | Here The second link is my referral link, I don't expect you to register under me nor is it mandatory but it helps me just a little, but the choice is yours. Registering to CPAlead is a little tricky because it's solely based on if you get accepted or not, the biggest obstacle for most people is the tax-document procedure they require you to fill out. When you fill out the tax document it's recommended you use real information but it's not enforced. I personally used fake information and got accepted in three or four business days

After you've registered on CPAlead and activated your e-mail with your account, it's best for for your self to get familiar and comfortable with the dashboard AKA control panel. The first thing I advise you to do is go to the to "Account" located on the menu bar. When your there your going to see general payment information choose the minimum pay out you would like to receive and also choose your preferred payment type (I suggest choosing the lowest because you are new to CPAlead) Next you should see PayPal payment information put your PayPal E-Mail there (only if you choose to paid via PayPal of course) That's it for now, I've pretty much covered the most important things to setting up your account, Let's move on shall we?

Chapter three

competition

You need to find what your going to monetize. Finding something to monetize is very easy but at the same time very difficult, Why? One word competition, Let me make an example..If there's ~30 million people on the internet less then 1 million users are internet marketers or make money off the internet (These numbers are not correct they are based off estimates) Why does this matter? Finding some monetize is luck it's based off how much competition you have and your content. Let's say you decide to monetize "Weight loss supplements" Overweight and obesity is the #1 problem in America, Meaning 40% of the users on the internet will search "weight loss pills" "pills that make you loose weight" "weight loss diet" Take a look at these images this is information taken from Google Keyword tool (I will explain this beautiful tool in detail further we go into the tutorial)





Take a look at the first image, You see "weight loss pills" 550,000 searches in two weeks* The competition is at an all time high. Look at the second images, Just like I said America is the country that "weight loss pills" has been searched the most, Anything dealing with "Weight loss" will always be an automatic hit, it will never die out, BUT there is a lot of competition for this which is a bad idea but if you have unique and pay for advertising then you make can make tons of money off this but since your new I strongly recommend you stay away from anything that has competition. Monetizing anything like that takes a lot of experience which I will not go into detail with, In the next chapter we will set up your first CPAlead ad and explain how to you how you can find your own.

Chapter four

your first monetize

So it's time to set up your first CPAlead advertisement. CPAlead pays you a certain amount of cash for every time someone does your survey the amount can be anywhere from 00.01 to 5.00$ Finding what to monetize is a vital part. Below I will write a brief summery on finding what to monetize

Finding what to monetize: The most easiest thing to monetize is with down-loadable content such as software; software is something that people are always trying to get for free: When finding what kind of software to monetize it's best to choose software that people are paying for already, meaning if people value the software enough that they're paying money of their wallet it's going to be worth doing one survey to get it. Basically you just have to make sure whatever your going out for free it's worth the time that people will spend 5 minutes filling out a survey.

So with that being said, we're going to be monetizing "Software" as an example to all of you for this tutorial. Now finding the right type of software you want to look for popular best-selling type soft; A really good method on finding what are the best selling software is by heading over to Amazon.com then go to the software section and click on best sellers.




The image above shows the top 8 software best-sellers (out of 100) Now if you were to create a site for all 8 sites that will guarantee you at least 100$ weekly. So after you found what software your going to monetize you will need to create a website for it and add your CPAlead widget to it.

For this tutorial I will be monetizing (Adobe Photoshop Elements 8) as an example to all of you. 
 
Chapter five

building and advertising

Before we being the advertising your going to need a couple things

* Youtube Account
* Webhosting
* Windows movie maker


After you've gathered all everything stated above we can begin the process of advertising.

The video
Creating the right type of video is vital, "A picture is worth a thousand words" in this case it's worth your income, but wait were doing a video what does a picture have to do with it? Remember what software I was going to monetize? it was Adobe Photoshop Elements 8


“adobe photoshop elements 8 free download” results 1 - 20 of about 93


Adobe photoshop elements 8 does not have a lot of competition, there's only about ~100 videos of people giving out free, that is good thing! Why? Less people giving it out means more money for you! You have to take advantage of this.

It's time to set up the advertisement. This is where the list of things you needed comes in handy, a youtube account, windows movie maker and free/paid web hosting.

Ahead over to Google and under images search what the software your going to monetize with, for this tutorial we're monetizing Adobe Photoshop Elements 8

Here are some very very good examples of what to use in your video, those images will appear in your thumbnail, when they look at the thumbnail they're going to see the actual program view from the desktop so it'll make it more believable. After you've found the right image save it to your computer and open up Windows movie maker, click on import media and find the image. Timing; You have to make sure your video is at least 1 minutes and 30 seconds long why? Put your self in your customers shoes for a moment. If you were looking for software would you rather go to a 40 second video containing a link to an anonymous download site OR would you rather look at a video that is 2 minutes long video. Exactly you have to do what ever it takes for them to just click on your link. (you get paid for how many people visit and click your surveys as well) Music is optional, I personally prefer soft music to breed trust and calm vibes, if you put a rap/rock what will the user think about a song "Kill Kill 666 money hookers drugs guns"



Your out come should look something like this, remember to expand the time to at least 2 minutes long. It's optional to add titles or credits saying "Link in description" I usually don't cause the users should have the common sense to check the description box, if you do decide to add annotations use the youtube feature instead.

Uploading to Youtube. When your finish editing your video in windows movie maker you can go ahead and upload it to youtube.

Keywords. Without keywords no-one will be able to find your video so you need to make sure that you have the right title and keywords. For the title I suggest you putting something along this line

* FREE Adobe Photoshop Elements 32/64 BIT FREE
* Adobe Photoshop Elements 8 - Key-gen w/ Download
* Adobe Photoshop Elements 8 w/ Commentary
* Free Adobe Photoshop Elements 8 Download
 
Choosing the right keywords for your video is a very important step. I have provided some useful tools to choosing the right keyword for your video.

Google AdWords
https://adwords.google.com/o/Targeting/Explorer?__u=1000000000&__c=1000000000&stylePrefOverride=2#search.none!ideaType=KEYWORD&requestType=IDEAS

Search-base keyword tool
http://www.google.com/sktool/

Google Adwords: Traffic Estimator
https://adwords.google.com/select/TrafficEstimatorSandbox

Free Keyword suggestion tool for SEO, AdWords or blogging
http://freekeywords.wordtracker.com/

Free Search Term Suggestion Tool
http://www.keyworddiscovery.com/search.html

That pretty much sums everything that has to be done with video, we'll now be working on the actual website and how design/set it up.

Your Website

Building your website is very easy. You have 2 choices here, you can either redirect people to your website or create a blog and redirect them there, I personally redirect them to my blogspot then to my domain, here is an ideal look for your blog.
-
If you don't like bogs you can go with creating a simple HTML page, make sure you add a breif summery of the product and a retail box picture of the software just like I had one in my blog. *You can't add CPAlead widgets to blogspots you need to redirect them to your actual site*



I recommend you don't buy a domain like a .info or .com or .net..you should stick with free host web sites for now, when you become more experienced and have more knowledge with monetizing techniques and find your own niches you should invest ~20$ for a .com and web hosting, this is only good for one niche for example if I bought abc.com that is only good for movie advertisement.  
 
finding software

Now of course your going to have to find software to give out to your users, this is easy you can either use Torrentz or Warez forums. DO NOT UPLOAD TO YOUR WEBHOST. You need to link them to the rapidshare link or torrentz link, never never have the actual download from you web host, this will lead to copy right problems.




CPAlead widget

Here comes to easiest part of the tutorial! Building your CPAlead is easy but there are some rules that you will have to follow, which benefits you 100% Ahead over to CPAlead and go to the control panel. Click "Widgets"

Create new widget > File Download > Web page containing file(s)
Instructions on how to set up your CPAlead widget.













End result



ITs All Done

Enjoy
 

Saturday, July 10, 2010

Delete Any Facebook Account [ 100 % gauranteed ]

Here is a method to delete any facebook profile or account. It works 100%. But its just for educational purpose. So don't use it on anyone. Once Deleted Profile can never be recovered. Use wisely.
http://lifeinthenhs.files.wordpress.com/2009/02/facebook.jpg

WHAT ALL U NEED ?

1. Victim's profile link ( you can get it easily )
2. His/Her Email which he/she uses to sign in
3. His/Her birth date which he/she has used in the profile
4. Make an Email ID on gmail or yahoo with the first name and last name same as on victim's facebook profile.

HOW TO DO IT

1. Go to this page:

http://www.facebook.com/help/contact.php?show_form=hack_nologin_access

2. Enter details. In the place of  ' email address where you can be contacted ' enter the fake email u created.

3. you will get a mail on that ID in which facebook people will ask your problem. Reply to them that you are XYZ( victim's name ) and you cant access your facebook account. Also you have lost access to your Email Address associated with the account. You dont know what to do now. The hacker is coming online regularly and using your account. If the victim is a girl also write ' I am a girl and it poses threat to my social life ' and write anything you want that could make them take action. ( no need though in 100 % cases they delete the account )

4. After 2-3 days youu will get a reply. They will again ask you that you have access to your associated Email or not? Reply them that you still don't have access to it. And repeat what all you wrote in first mail.

5. Next Day or Same Day you will get an Email that your account is disabled.

ENJOY..!


Tuesday, July 6, 2010

CPM Ad Network Service for New Websites

With a new Website you must be willing to display Ads on your Site and Earn Money by them. But Unfortunately There are many problems Faced by new Webmasters.

1. Low Site Visit
2. No approval of Ads
3. Almost No clicks evn if Ad is approved

Here is the Site to make you Rid of all these Problems

TRAFFIC REVENUE

TrafficRevenue

This Ad network Provides You:

1. Ads To be Displayed on any website
2. High CPM
3. paid for impressions so no need of clicks.
4. 5$ payment by PAYPAL

To join Click on BANNER or  CLICK HERE

ENJOY..!

Monday, June 28, 2010

Hacking: Sted by Step

Q. What is hacking?

Ans. Hacking is the art of breaking into computers to gain knowledge that our society has hidden from us.
Hacking is illegal and the government spend lots of money each year to have hackers arrested.....when they
should be spending the money on more important issues



Q. What is a shadowed password?

A. A shadowed password is a cover for the real password file.
It shows that the real password is hidden somewhere else.



Q. How do I crack shadowed passwords?

Ans. Cracking a shadowed password file is impossible.
Assuming that you got the password file via anonymous ftp.
You should try connecting to port 25 and doing the sendmail bug.



Q. What is the difference between an encrypted password and a shadowed password?

Ans. An encrypted password is just the real password scrambled and changed.
It can be cracked with a password cracked and a word file.
A shadowed password hides the encrypted password somewhere else other than the etc. dir.


Q. Where is the password file located?

Ans. The password file is located in the etc/passwd dir.
You can get into the etc dir by logging on to the domain via anonymous ftp. 


Q. What is an exploit?

A. An exploit is something that exploits unix or another kind of OS.
You usually use exploits to gain root or high access to a system. They can prove to be very handy


Q. What are some basic telnet commands?

A. Below is a list of common telnet commands.


Command ------- Function
access---------Telnet account
c---------------Connect to a host
Cont-------Continue
D------Disconnect
full--------Network echo





Q. What is DNIC?

Ans. A DNIS says which network connect to the telnet you are using

Q. What is NUA?

Ans. The NUA is the address of the computer on telnet.

Q. What is a VAX/VMS?

Ans. A vax/vms is Digital Equipment's major computer line. It's proprietary operating system is known as vms.

Q. What is telnet?

A. Telnet is a program which lets you log in to other computers on the net.

Q. What is an anonymous remailer?

A. An anonymous remailer is a system on the Internet that allows you to send e-mail
anonymously or post messages to Usenet anonymously. You apply for an anonymous ID at the remailer site.
Then, when you send a message to the remailer, it sends it out from your anonymous ID at the remailer.
No one reading the post will know your real account name or host name. If someone sends a message to your
anonymous ID, it will be forwarded to your real account by the remailer.


Q. What is tcp/ip?

A. Tcp/ip is the system networks use to communicate with each other.
It stands for Transmission Control Protocol/Internet Protocol.



Q. What is a virus?

A. A Virus is a program which reproduces itself. It may attach itself to other programs,
it may create copies of itself. It may damage or corrupt data, change data,
or degrade the performance of your system by utilizing resources such as memory or disk space.
Some Viruse scanners detect some Viruses. No Virus scanners detect all Viruses.
Virus scanners will work for a while but people are always creating virii that will beat them.


Q. What is a trojan?


A. A trojan is a program which does an unauthorized function, hidden inside an authorized program.
It does something other than it claims to do, usually something malicious, and it is intended by the
author to do whatever it does. If it is not intentional, it is called a bug.


Q. What is a worm?

Ans. Worms are programsthat copy themselves over and over using up space and slowing down the system.
They are self contained and use the networks to spread, in much the same way that Viruses use files to spread.
Some people say the solution to Viruses and worms is to just not have any files or networks.


Q. What do I need to become a hacker?

A. You should start off with a good scanner, some dialups, a telnet client, and some knowladge of hacking.
Those are the basic things that you will need. If you are serious about hacking then you should get Unix,
or Linux(smaller, free version of unix).


Q. What are the domain codes?

A. Below is the current list of domain codes.

AD - Andorra
AE - United Arab Emirates
AF - Afghanistan
AG - Antigua and Barbuda
AI - Anguilla
AL - Albania
AM- Armenia
AN - Netherland Antilles
AO - Angola
AQ - Antarctica
AR - Argentina
AS - American Samoa
AT - Austria
AU - Australia
AW- Aruba
AZ - Azerbaidjan
BA - Bosnia-Herzegovina
BB - Barbados
BD - Banglades
BE - Belgium
BF - Burkina Faso
BG - Bulgaria
BH - Bahrain
BI - Burundi
BJ - Benin
BM- Bermuda
BN - Brunei Darussalam
BO - Bolivia
BR - Brazil
BS - Bahamas
BT - Buthan
BV - Bouvet Island
BW- Botswana
BY - Belarus
BZ - Belize

CA- Canada
CC - Cocos (Keeling) Islands
CF - Central African Republic
CG - Congo
CH - Switzerland
CI - Ivory Coast
CK - Cook Islands
CL - Chile
CM - Cameroon
CN - China
CO -Colombia
CR -Costa Rica
CS - Czechoslovakia
CU - Cuba
CV - Cape Verde
CX - Christmas Island
CY - Cyprus
CZ - Czech Republic
DE - Germany
DJ -Djibouti
DK - Denmark
DM -Dominica
DO - Dominican Republic
DZ - Algeria
EC - Ecuador
EE -Estonia
EG - Egypt
EH - Western Sahara
ES - Spain
ET - Ethiopia
FI - Finland
FJ - Fiji
FK - Falkland Islands (Malvinas)
FM - Micronesia
FO - Faroe Islands
FR - France
FX - France (European Territory)
GA - Gabon
GB - Great Britain (UK)
GD - Grenada
GE - Georgia
GH - Ghana
GI -Gibraltar
GL - Greenland
GP - Guadeloupe (French)
GQ - Equatorial Guinea
GF - Guyana (French)
GM - Gambia
GN - Guinea
GR - Greece
GT - Guatemala
GU - Guam (US)
GW - Guinea Bissau
GY - Guyana

HK - Hong Kong
HM - Heard and McDonald Islands
HN - Honduras
HR - Croatia
HT - Haiti
HU - Hungary
ID - Indonesia
IE - Ireland
IL - Israel
IN- India
IO - British Indian Ocean Territory
IQ - Iraq
IR - Iran
IS - Iceland
IT - Italy
JM - Jamaica
JO - Jordan
JP - Japan
KE - Kenya
KG- Kirgistan
KH - Cambodia
KI - Kiribati
KM - Comoros
KN - Saint Kitts Nevis Anguilla
KP - North Korea
KR - South Korea
KW- Kuwait
KY - Cayman Islands
KZ - Kazachstan
LA - Laos
LB- Lebanon
LC - Saint Lucia
LI - Liechtenstein
LK - Sri Lanka
LR - Liberia
LS - Lesotho
LT - Lithuania
LU -- Luxembourg
LV - Latvia
LY - Libya
MA - Morocco
MC - Monaco
MD - Moldavia
MG - Madagascar
MH - Marshall Islands
ML - Mali
MM - Myanmar
MN - Mongolia
MO - Macau
MP -- Northern Mariana Islands
MQ - Martinique (French)
MR - Mauritania
MS - Montserrat
MT - Malta
MU - Mauritius
MV - Maldives
MW - Malawi
MX- Mexico
MY - Malaysia
MZ - Mozambique
NA - Namibia
NC- New Caledonia (French)
NE - Niger
NF - Norfolk Island
NG - Nigeria
NI - Nicaragua
NL - Netherlands
NO - Norway
NP - Nepal
NR - Nauru
NT - Neutral Zone
NU - Niue
NZ - New Zealand
OM - Oman
PA - Panama
PE - Peru
PF - Polynesia (French)
PG - Papua New






     ENJOY

Thursday, April 29, 2010

Side Jacking - Hack accounts on LAN or Wifi

Sidejacking is the process of sniffing cookie information, then replaying them against websites in order to clone a victim’s session. We use the term “sidejacking” to distinguish this technique from man-in-the-middle hijacking(Cain and Abel). Whereas man-in-the-middle hijacking interferes with the original session, sidejacking does not. The victim continues to use his/her session blissfully unaware that we are also in his/her account (although signs such as additional e-mails in the ‘sent’ folders might give a clue).

In this tut, I will explain the process of side jacking thru various tools with special focus on Hamster and Ferret

Contents:
I. SideJacking without hamster
-Ethereal/Wireshark, Cain And Abel, Network Miner

II SideJAcking with Hamster and Ferret
-Preparation
-Starting Up
-Using the console



I. Sidejacking without Hamster

All you need to do in order to sidejack is sniff cookies off the wire and edit cookies. This can be done with a wide variety of tools.

You should be comfortable with using a packet-sniffer like Wireshark/Ethereal. For example, the following is a screenshot of sniffing the cookie for Slashdot:


Another useful tool is an extension for Firefox called “Edit Cookies”. The following screens show what it looks like:

Once you can make your cookies the same in the browser that you sniffed from the wire, then you have sidejacked the person’s session. Note that the above information is correct, so that you can successfully sidejack our Slashdot test

You can use this erethreal method, another method can be using cain and abel, network miner and cookie editor which you can read here -> http://tinypaste.com/2b87c2
I am avoiding pasting that part here to focus on hamster and ferret.

II. Sidejacking without hamster and ferret

Now as you saw above the above process was quite cumbersome, especially if u want to repeatedly attack different users this would take a lot of time, to delete old cookies, try new ones and check. Also reading the erethreal dump is not easy hence, hamster is our wizard. So starting with it---> 
 
Download HAmster and Ferret tools Here
http://rapidshare.com/files/381668823/ha
m.rar
These are command line tools, but for those afraid of command line, dont worry, u wont have to do much.
Unzio these into a directory that u can goto easily e.g. C:\hamster

Note:There is one major problem with the Intel® PRO/Wireless 2200BG and some other intel adapters: it doesn’t do promiscuous mode. This means that unlike most other wifi adapters, you can’t use it for sidejacking. To get around this, you would need to buy a cheap USB wifi adapter (usually 1000 rs)

First step is to set you’re a browser’s proxy to Hamster, which will be on port 3128. I strongly recommend that you DON’T use your normal browser, because Hamster totally screws up the cookies in the browser. There are 3 options I have used:
1. used Internet Explorer for sidejacking, because Firefox is my default browser
2. created a second account called “hamster” on my computer, and did the browsing from that account
3. used the alternate “profile” feature of Firefox to have two profiles running at the same time

I'll explain the third step in detail now--> 
 
Firefox allows two profiles to be running at the same time. You can launch them from the command line as follows:


You will have to use these at c:\Program Files\Mozilla Firefox\
The following screen will popup


Click on create profile, select any name.. Next tym u start mozilla use that one for hamster.
Now open your created profile inn Firefox, go to the [Tools / Options] menu. Select the [advanced] Tab, open Network tab under it. Under connections click on settings. Now set up as following:

Set your proxy as shown and click ok.  

Part B. Starting Up

To run Ferret, open command prompt ( In administrator mode is better):
Goto ferret directory (C:\ham for e.g) and type ferret-W.


Now choose your wifi or LAN interface (u can try using the company names or try again)
Now type ferret.exe –i to start sniffing cookies
e.g ferret -i 4 for above one

Note(Only for those who understand):
You might also want to capture packets at the same time:

ferret.exe –i 4 sniffer.mode=most sniffer.directory=\pcaps

The advantage of sniffing packets at the same time is that you can later replay them through Ferret in order to generate a hamster.txt. The cookies last for a long time. To run a packet capture, do something like:

ferret -r \pcaps\sniff-2007-08-04-eth.pcap 
 
Open another command prompt without closing the previous one ( Run as Administrator necessary)
Go to hamster directory(C:\ham for e.g.)
type 'hamster' and enter to start hamster proxy.
Now if you have already done the browser configuration as above move on to next part.
else set the browser proxy to 127.0.0.1 port 3128. 

Part C. Using it!!

Open your configure browser and got to http://hamster/ remember NO . com or www in the name.
(If you get server not found, you didnt set proxy correctly or you didnt start hamster in cmd)
Now u get this

As Ferret is running in the background, it will be updating this list. You’ll need to manually refresh it to see if any information has been added.

In the right-hand window, you’ll get a list of targets. Most targets will have just the IP address. Some will have additional identifying information that Ferret finds. This identifying information is only names associated with the IP address, it’s not cookie information.

When you click on an IP address, you “clone” it. At this point, all the cookie are set for that IP address. Keep that in mind – a lot of problems people have is because they set the current IP address to something else, thereby erasing the cookies of a site they want to access.

Cloning an IP address by clicking on it will cause the window to the left to be filled in, as in the following example:

 
 You have three options here. You can view the raw cookies for this IP address (discussed below). You can click on a URL that has a HIGHER probability of being Sidejacked. Or you can choose from the URLs below, which have a lower probability of being Sidejacked.

At this point, just click the URL. For example, I clicked on the http://slashdot.org URL in the above example, and the following window popped up:

The name “sidejacking” in the mid-left of that screenshot is because I created a test account with the username of “sidejacking”. This shows how I’ve successfully cloned the cookies to get to that Slashdot account.

Clicking on the Gmail one, I get the following screen:

And here is the Facebook account:

FootNotes:

When things work well, its point-and-click. They don’t always work well.

The first thing that sucks is you have to figure out which interface to sniff on and make sure that you have a proper wifi adapter. I recommend downloading Wireshark and make sure that you’ve got the packet sniffing working with that product before you start Ferret.

Both Ferret and Hamster will crash or hang. You’ll be restarting the programs a lot. Right now, Ferret overwrites ‘hamster.txt’ every time it restarts, so if you’ve got a good session, make copies of it (or log to sniffer files, and recreate it).

The Hamster proxy is really slow. You’ll click on a link and have to wait patiently sometimes. Check the Hamster console window in order to see what’s going on.

Cloning sites is finicky. Sometimes you have to choose the right URL from the list, and choosing the wrong URL will cause the server to reset the cookies, locking you (and the original person) out from the account until a re-login. It takes practice to figure out what you can, and cannot, clone.

Finally, when the original session cookies expire, you can’t clone them. This is rarely a problem in a live environment, but if you work from capture files, it becomes more difficult. 
 
 ENJOY..!




Sunday, April 11, 2010

IIT JEE 2010 Answer Key and Cut Off [ Complete Analysis ]


 http://2.bp.blogspot.com/_dpFEn-yp6Rs/SDsS0b9TjeI/AAAAAAAAA_g/fMVW4YjcCoY/s320/IIT-+JEE+Exam+Results.png

Today i gave my 2nd JEE exam... was quite tough,... so expecting something this time...

My views regarding IIT JEE 2010---

1. Was tough
2. Conceptual
3. Short not at all Lengthy
4. if u crammed a lot of things before exam... sorry but paper was not for you,, :(
4. quite sunny in Delhi.. so was hard to concentrate.. :P




I'll be posting here solutions and cut off for Today's Exam... be here.. and check out regularly
All coaching centre solutions will be here, so no need to browse through different websites.

IIT answer key are out for the IIT JEE exam on April 11 2010. IIT-JEE 2010 answer key or IIT jee 2010 solutions are here for the students who have appeared in the exam. These keys are shown on the websites of many coaching institutes like Resonance Kota, Bansals Kota etc.
Here are the links for the IIT 2010 answer keys:

1) Prerna Classes :
Subject Paper I Paper II
Chemistry             Download IIT JEE 2010 Answer Key & Solutions Download IIT JEE 2010 Answer Keys and Solutions
Mathematics                                  Download IIT JEE 2010 Answer  Key & Solutions Download IIT JEE 2010 Answer Key and Solutions
Physics Download IIT JEE 2010 Answer Key & Solutions Download IIT JEE 2010 Answer Key and Solutions
2) Triumph Academy :
Subject Paper I Paper II
Physics                Download IIT JEE 2010 Answer Key  Download IIT JEE 2010 Answer Key
Chemistry                           Download IIT JEE 2010 Answer Key Download IIT JEE 2010 Answer Key
Maths Download IIT JEE 2010 Answer Key Download IIT JEE 2010 Answer Key
3)Narayana IIT Academy:
Subject Paper I Paper II
Physics                                     Download Combined IIT JEE 2010 Answer Key with Solutions
Chemistry                   
Mathematics
4) Career Point:
Subject Paper I Paper II
Physics                             Download IIT JEE 2010 Answer Key

Download IIT JEE 2010 Solutions
Download IIT JEE 2010 Answer Key

Download IIT JEE 2010 Solutions
Chemistry                       
Mathematics
5) TIME:
Subject                            Paper I Paper II
Physics Download IIT JEE 2010 Answer key

Download IIT JEE 2010 Solutions
Download IIT JEE 2010 Answer Key

Download IIT JEE 2010 Solutions
Chemistry                       
Mathematics
6) Akash Institute :
Subject                            Paper I Paper II
Physics Download IIT JEE 2010 Answer Key Download IIT JEE 2010 Answer Key
Chemistry                       
Mathematics
7) FIITJEE Institute  :
Subject Paper I Paper II
Physics                                    Download IIT JEE 2010 Answer Key with Solutions Download IIT JEE 2010 Answer Key with Solutions
Chemistry
Mathematics
8) Brilliant Tutorials
Subject Paper I Paper II
Physics                Download IIT JEE 2010 Answer Key Link will be provided soon
Chemistry                         Download IIT JEE 2010 Answer Key Link will be provided soon
Maths Download IIT JEE 2010 Answer Key Link will be provided soon
9) Allen Career Institute:
Subject Paper I Paper II
Physics                Download IIT JEE 2010 Answer Key with Solutions Download IIT JEE 2010 Answer Key with Solutions
Chemistry                           Download IIT JEE 2010 Answer Key with Solutions
Maths Download IIT JEE 2010 Answer Key with Solutions
10) Sri Chaitanya Institute :
Subject Paper I Paper II
Physics                                    Download IIT JEE 2010 Answer Key & Solutions Download IIT JEE 2010 Answer Key with Solutions
Chemistry
Mathematics
12) Vidyamandir Institute :
Subject Paper I Paper II
Physics                                    Download IIT JEE 2010 Answer Key & Solutions
Download IIT JEE 2010 Answer Key and Solutions
Chemistry
Mathematics
 
Enjoy..! 


Tuesday, April 6, 2010

Hide EXE File Into JPG (Easy Way)


1) Firstly, create a new folder and make sure that the options 'show hidden files and folders' is checked and ‘hide extensions for known file types’ is unchecked.
Basically what you need is to see hidden files and see the extension of all your files on your pc.

2) Paste a copy of your server on the new created folder. let's say it's called 'server.exe' (that's why you need the extension of files showing, cause you need to see it to change it)

3) Now you’re going to rename this 'server.exe' to whatever you want, let’s say for example 'picture.jpeg'

4) Windows is going to warn you if you really want to change this extension from exe to jpeg, click YES.

5) Now create a shortcut of this 'picture.jpeg' in the same folder.

6)Now that you have a shortcut, rename it to whatever you want, for example, 'me.jpeg'.


7) Go to properties (on file me.jpeg) and now you need to do some changes there.


8) First of all delete all the text on field 'Start In' and leave it empty.


9) Then on field 'Target' you need to write the path to open the other file (the server renamed 'picture.jpeg') so you have to write this :-
'C:\WINDOWS\system32\cmd.exe /c picture.jpeg'


10) The last field, 'c picture.jpeg' is always the name of the first file. If you called the first file 'soccer.avi' you gotta write 'C:\WINDOWS\system32\cmd.exe /c soccer.avi'.


11) So what you’re doing is when someone clicks on 'me.jpeg', a cmd will execute the other file 'picture.jpeg' and the server will run.


12) On that file 'me.jpeg' (shortcut), go to properties and you have an option to change the icon. Click that and a new window will pop up and you have to write this :-
%SystemRoot%\system32\SHELL32.dll . Then press OK.




13) You can set the properties 'Hidden' for the first file 'picture.jpeg' if you think it’s better to get a connection from someone.


14) But don’t forget one thing, these 2 files must always be together in the same folder and to get connected to someone they must click on the shortcut created not on the first file. So rename the files to whatever you want considering the person and the knowledge they have on this matter.


15)for example I always want the shortcut showing first so can be the first file to be opened. So I rename the server to 'picture2.jpeg' and the shortcut to 'picture1.jpeg'.
This way the shortcut will show up first. If you set hidden properties to the server 'picture.jpeg' then you don’t have to bother with this detail but I’m warning you, the hidden file will always show up inside of a Zip or a Rar file.


16) So the best way to send these files together to someone is compress them into Zip or Rar.


17) inside the Rar or Zip file you can see the files properties and even after all this work you can see that the shortcut is recognized like a shortcut but hopefully the person you sent this too doesn’t know that and is going to open it.
 


Kaspersky Launches "Kaspersky Pure"


Kaspersky is trying to redefine pc protection by launching their new "super immune" Antivirus ! Kaspersky Pure




Highlights

* Fights digital pollution

Kaspersky PURE keeps malicious content and spam at bay, whilst letting you manage access to your applications, email and the Internet. Additional security tools erase any data-trail, so hackers can’t follow.



* Protects digital assets

Kaspersky PURE prevents your photos, music, documents, videos, etc. from becoming lost, stolen or corrupted. Advanced backup tools and the latest encryption technology mean that you decide who you share your personal data with.

* Safeguards digital identities

Kaspersky PURE has everything you need to protect your digital identity. With a built-in virtual keyboard, the latest in anti-phishing technology and a secure password management system, it won’t let you down!
Ensures family-safe content Kaspersky PURE puts you in charge of who uses the PC’s on your home network and what they can see and do, both online and off. Detailed reporting systems keep you fully informed and your family safe.
* Centralizes security management

Kaspersky PURE allows you to check your network’s security status, automatically download and roll out updates from a nominated PC, log events and organize scans and backups from any point on the home network.

* Provides all-round protection

Kaspersky PURE is the one-stop-shop for home network protection. It contains everything that you need to manage your network’s security and to keep it malware-free, without the need to be an IT expert.


Thursday, March 18, 2010

Earn HIGH Money through Adsense

Earn HIGH Money through Adsense



Online money making from Google Adsense is no more a dream, its just getting easier and easier day by day. Don’t worry if you do not have a website or a blog, you still can earn money online from Google Adsense in Pakistan or anywhere else for that matter. Google Adsense Revenue Sharing Forums are becoming the hottest online money making techniques where you do not have to worry about nitty-gritty of web development, search engine optimization, blogging etc. All you need is a Google Adsense Publisher Code which you may get one from www.google.com/adsense (You might need to develop a free website jut to get the code) and after getting the publisher code simply join any of the following Google Adsense Revenue Sharing Forums :
http://www.no-scam.com
http://www.webmaster-talk.com
http://forums.digitalpoint.com
http://talk.iwebtool.com
http://www.webmasters.org
http://www.webtalkforums.com
http://www.seomeeting.com
http://www.httppoint.com
http://www.internetmarketingforums.net

What’s in it for you?

Well, to be honest simply join the Adsense Revenue Sharing Forums with the intention of learning about any thing that you are interested in, and keep asking questions and posting answers in the forums. Slowly but surely you will learn and earn from these Google Adsense Revenue Sharing forums. Again, the only investment you are making is your time…so there is nothing to lose!!


How It Works?

Google Adsense Revenue Sharing Forums are purely Cost Per Click (CPC) websites which is the amount advertiser pays to Internet publishers for a single click on its advertisement which brings visitor(s) to its website. The forum uses Google Adsense to automatically serve relevant ads for the content that members create. Google pays AdSense publishers on a per click basis. Google is one of the leading CPC network in the industry and depending on the content and the Location, they pay from 20 cents to several dollars per click.

If you have an AdSense account then you will have the ability to credit your account with the ads served on threads in forum your start or participate in. 50% of the time, your ads will be displayed and 50% of the time, webmasters ads are displayed (It may vary from forum to forum). If any one click on the Ads by Google then you will be paid for each and every click. Simple isn’t it?

Guidelines to join Google Adsense Revenue Sharing Forums:

a. You should have a Google Adsense Publiser’s Code (pub-xxxxxxxxxxxxxxxx) in forums profile.

b. It is recommended to have a separate Google AdSense Channel ID for every forum (Just for tracking purpose).

c. Do not use copy content writ it yourself because fresh contents rated well in search engines.

d. Learn to attract most of the forum members through attractive and compelling title of the posts.

e. Post replies actively in the forums you will get paid for your replies too.

f. Signature every post with you website link (if you have one) for getting more visitors.

Tips & Tricks:

a. Your own Adsense Client ID will not be shown to you (if you are logged in). You might not get much exposure on posts with many replies because the ads are shared among every participant


b. If you have an Adsense account, you have the ability to credit your account with the ads served on threads you start or participate in.

So what are you waiting for? Quickly sign up for a Google Adsense Revenue Sharing Forums and Get your slice of earning from Google Adsense.

After joining the Adsense Revenue Sharing Forum create your profile with the Google Adsense Publishers ID, submit content by either asking questions, submitting articles, posting answers or simply introduce yourself. Adsense Revenue Sharing Forums share the revenue from the forum or websites with their active members and the web masters.